url
stringlengths
14
1.76k
text
stringlengths
100
1.02M
metadata
stringlengths
1.06k
1.1k
http://tex.stackexchange.com/questions/35356/strange-looking-table
# Strange looking table I am trying to print this rather odd looking table, below I know there is an package called exam, though I sort of want to do this "my own style" I did try to make the table below, but I was not even close in doing so. Most importantly is that the table looks good, not that it is an exact replica of the table. Could anyone be so kind as to help me? I have started learning latex recently, and stumbling down the path of learning =) EDIT: One could remove the vertical lines furthest to the left and right aswell, then the table would be more inline witht the standard of tables. Edit2: \documentclass[10pt,a4paper]{article} \usepackage{mathtools} \usepackage{booktabs} \usepackage{multirow} \usepackage{multicol} \begin{document} \noindent \begin{tabular*}{\textwidth}{@{}clccccccccccccccc@{}} \toprule & & & & & & Sum \\ \cmidrule{1-1}\cmidrule(l){2-16}\cmidrule(l){17-17} \multirow{2}{*}{Part 1} & Problem & 1a1) & 1a2) & 1b1) & 1b2) & 1c & 1d1) & 1d2) & 1e & 1f & 2a & 2b & 2c \\ & Score & 2 & 2 & 2 & 2 & 2 & 2 & 2 & 2 & 2 & 2 & 2 & 2 & 24 \\ \midrule \multirow{2}{*}{Part 1} & Problem & 1a1) & 1a2) & 1b1) & 1b2) & 1c & 1d1) & 1d2) & 1e & 1f & 2a & 2b & 2c \\ & Score & 2 & 2 & 2 & 2 & 2 & 2 & 2 & 2 & 2 & 2 & 2 & 2 & 24 \\ \cmidrule{1-1}\cmidrule(l){2-17}\cmidrule(l){17-17} & \multicolumn{5}{r}{Total number of points} & 14 \\ \bottomrule \end{tabular*} \end{document} - Can you post what you tried so we have something to start with. This should be compilable in that it should include the \documentclass and all the appropriate packages needed fir your version. –  Peter Grill Nov 19 '11 at 0:19 This table is not at all strange looking. :) –  Werner Nov 19 '11 at 0:19 I tried looking into the multirow and multicolumn packages as it seems this would work best. Will update with an minimal example. Reason why I did not do this, is as all my attempts to create the table would not even compile. Also using booktabs for extra nice tables. –  N3buchadnezzar Nov 19 '11 at 0:31 Updated again. Atleast it works for me now, but itss still broken. –  N3buchadnezzar Nov 19 '11 at 3:59 @N3buchadnezzar: what do you mean with "broken"? –  Gonzalo Medina Nov 19 '11 at 4:25 I would try changing the table layout, first of all, suppressing the vertical rules. Using the features provided by the booktabs package you can improve your tables layout. Here are two possibilities: \documentclass{article} \usepackage{multirow} \usepackage{booktabs} \begin{document} \noindent\begin{tabular}{@{}clccccc@{}} \toprule & & & & & & Sum \\ \cmidrule{1-1}\cmidrule(l){2-6}\cmidrule(l){7-7} \multirow{2}{*}{Part 1} & Problem & 1a & 2b & 3a & 5b & \\ & Score & 2 & 2 & 1 & 2 & 7 \\ \midrule \multirow{2}{*}{Part 1} & Problem & 6a & 6b & 7a & 8b & \\ & Score & 2 & 2 & 1 & 2 & 7 \\ \cmidrule{1-1}\cmidrule(l){2-6}\cmidrule(l){7-7} & \multicolumn{5}{r}{Total number of points} & 14 \\ \bottomrule \end{tabular} \vspace{2cm} \noindent\begin{tabular}{@{}lccccccccc@{}} \toprule & \multicolumn{8}{c}{Part} & Total \\ \cmidrule{2-9} & \multicolumn{4}{c}{1} & \multicolumn{4}{c}{2} \\ \cmidrule(r){1-1}\cmidrule(lr){2-5}\cmidrule(lr){6-9}\cmidrule(l){10-10} Problem & 1a & 2b & 3a & 5b & 6a & 6b & 7a & 8b \\ Score & 2 & 2 & 1 & 2 & 2 & 2 & 1 & 2 \\ \cmidrule(r){1-1}\cmidrule(lr){2-5}\cmidrule(lr){6-9}\cmidrule(l){10-10} Sum & \multicolumn{4}{c}{7} & \multicolumn{4}{c}{7} & 14 \\ \bottomrule \end{tabular} \end{document} Here's a third variant: \documentclass{article} \usepackage{multirow} \usepackage{booktabs} \begin{document} \noindent\begin{tabular}{@{}cccc@{}} \toprule Part & Problem & Score & Sum \\ \cmidrule(r){1-1}\cmidrule(lr){2-2}\cmidrule(lr){3-3}\cmidrule(l){4-4} \multirow{4}{*}{1} & 1a & 2 & \multirow{4}{*}{7} \\ & 2b & 2 & \\ & 3a & 1 & \\ & 5b & 2 & \\ \midrule \multirow{4}{*}{2} & 6a & 2 & \multirow{4}{*}{7} \\ & 6b & 2 & \\ & 7a & 1 & \\ & 8b & 2 & \\ \midrule & \multicolumn{2}{c}{Total} & 14 \\ \bottomrule \end{tabular} \end{document} - That looks really good =) I think I will use the bottom one. I have tried for almost 30 minutes now to produce something good. Could you perhaps take a look at my code and tell me why it will not compile? If i remove the multicol arguments in the second row, it compiles. I guess I need to learn this stuff too and not just copy =) Great job once again! –  N3buchadnezzar Nov 19 '11 at 1:24 @N3buchadnezzar: the second argument of \multicolumn can only take one value: l, r, c, p{<length>} (or any other column type, but only one value). –  Gonzalo Medina Nov 19 '11 at 1:32 @N3buchadnezzar: also, the third argument of \multicolumn cannot contain alignment characters &. The third argument is used for the material (text, in most cases) that will span the selected number of columns. –  Gonzalo Medina Nov 19 '11 at 2:33 Gah! Your code breaks down, with the number of elements I need in that table... I updated my first post. Perhaps your last solution is the best? –  N3buchadnezzar Nov 19 '11 at 3:37 @N3buchadnezzar: there are some strategies to reduce a table width: 1) Change \tabcolsep (default value = 6pt); you can say, for example, \setlength\tabcolsep{3pt} just before \begin{tabular}. 2) Reduce the font size; for this, you can use one of th font switches \small, \footnotesize; again this goes right before \begin{tabular}. To keep those changes local, you can use a pair of braces: {\small\begin{tabular}{...}...\end{tabular}}`. Of course you can try one or both methods. –  Gonzalo Medina Nov 19 '11 at 3:59
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8874163627624512, "perplexity": 787.2728226798628}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095677.90/warc/CC-MAIN-20150627031815-00309-ip-10-179-60-89.ec2.internal.warc.gz"}
https://alanarnholt.github.io/BSDA/reference/Blood.html
Data for Exercise 7.84 Blood ## Format A data frame/tibble with 15 observations on the following two variables machine blood pressure recorded from an automated blood pressure machine expert blood pressure recorded by an expert using an at-home device ## References Kitchens, L. J. (2003) Basic Statistics and Data Analysis. Pacific Grove, CA: Brooks/Cole, a division of Thomson Learning. ## Examples DIFF <- Blood$machine - Blood$expert shapiro.test(DIFF) #> #> Shapiro-Wilk normality test #> #> data: DIFF #> W = 0.92609, p-value = 0.2383 #> qqnorm(DIFF) qqline(DIFF) rm(DIFF) t.test(Blood$machine, Blood$expert, paired = TRUE) #> #> Paired t-test #> #> data: Blood$machine and Blood$expert #> t = 0.68162, df = 14, p-value = 0.5066 #> alternative hypothesis: true difference in means is not equal to 0 #> 95 percent confidence interval: #> -2.146615 4.146615 #> sample estimates: #> mean of the differences #> 1 #>
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.22561924159526825, "perplexity": 8985.245440790015}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662556725.76/warc/CC-MAIN-20220523071517-20220523101517-00124.warc.gz"}
https://www.gamedev.net/forums/topic/184330-scale-and-wireframe/
#### Archived This topic is now archived and is closed to further replies. # Scale and Wireframe ## Recommended Posts I have two questions. I''m currently working on a Pong game in 3D. The first question I have is what scale should the meshes be made? Is a paddle with a width of 500 too big or does it not matter as long as everything ''matches''? Second question is is there a way to display only the wireframes of my meshes? Thanks! ##### Share on other sites Scale wise, you can make your own scale. A value of 1 can represent 1 meter, 1 km, 1 cm or anything. You just have to make sure your coordinates are relative. (Also check your caps for the maximum coordinate size, but they are so huge that you''re pretty safe no matter what. Haven''t used meshes in DX, so I don''t know about the second question. ##### Share on other sites I don''t even know what meshes are yet but i''m using this for wireframe : m_pD3DDevice->SetRenderState(D3DRS_FILLMODE, 3DFILL_WIREFRAME); hope it works for you too • ### Forum Statistics • Total Topics 628356 • Total Posts 2982252 • 10 • 9 • 13 • 24 • 11
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.1737823188304901, "perplexity": 2581.4350951238}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806660.82/warc/CC-MAIN-20171122194844-20171122214844-00177.warc.gz"}
https://tex.stackexchange.com/questions/496088/what-is-the-correct-way-to-replace-csxdef-foreach-with-pure-expl3-code
# What is the correct way to replace “csxdef/foreach” with pure expl3 code? I'm trying to remove the dependencies of the packages pgffor and etoolbox from a code I own which uses expl3, but I don't know which is the correct equivalent of \csxdef in expl3. At the moment I have the following code, which works, but I don't know if it's the right way to replace it. \documentclass{article} \usepackage{xparse} \usepackage{etoolbox} \usepackage{pgffor} \ExplSyntaxOn \NewDocumentCommand{\mycmdone}{ m m } { \_csxdef_pgfetoolbox:nn { #1 } { #2 } } \cs_new_protected_nopar:Npn \_csxdef_pgfetoolbox:nn #1 #2 { \foreach \x [count=\n] in { #2 } { \csxdef{#1\n}{\x} } % save in \#1<n> } \NewDocumentCommand{\mycmdtwo}{ m m } { \_csxdef_expl:nn { #1 } { #2 } } \cs_new_protected_nopar:Npn \_csxdef_expl:nn #1 #2 { \clist_set:Nn \l_tmpa_clist {#2} \int_step_inline:nn { \clist_count:N \l_tmpa_clist } { \cs_set:cpx {l_#1##1:} { \clist_item:Nn \l_tmpa_clist { ##1 } } } } \ExplSyntaxOff \begin{document} Test mycmdone \mycmdone{A}{X,Y,Z,W} \csuse{A1} \csuse{A2} \csuse{A3} \csuse{A4} % repeat \mycmdone{A}{X,Y,Z,W} \csuse{A1} \csuse{A2} \csuse{A3} \csuse{A4} \par Test mycmdtwo \mycmdtwo{B}{P,Q,R} \ExplSyntaxOn \use:c{l_B1:} ~ \use:c{l_B2:} ~ \use:c{l_B3:} \ExplSyntaxOff % repeat Test mycmdtwo \mycmdtwo{B}{P,Q,R} \ExplSyntaxOn \use:c{l_B1:} ~ \use:c{l_B2:} ~ \use:c{l_B3:} \ExplSyntaxOff \end{document} Commands take two arguments, where the second is separated by commas and is not used directly in the document, \csuse is passed as an argument to another code I have defined. I don't know if what I should use is \cs_new: or \l_#1#2_tl or if expl3 has a function that already does this (I don't want to reinvent the wheel). Greetings. This is more of a comment that is too long for a comment.... Since it seems that you want to be able to redefine these commands I think that you need to use \cs_set:cpx (or \cs_gset:cpx or \cs_set:cx or \cs_set:cx), but you don't need two functions here and, instead, the following is sufficient: \documentclass{article} \usepackage{xparse} \usepackage{etoolbox} \usepackage{pgffor} \ExplSyntaxOn \NewDocumentCommand{\mycmdtwo}{ m m } { \clist_set:Nn \l_tmpa_clist {#2} \int_step_inline:nn {\clist_count:N \l_tmpa_clist} { \cs_set:cpx {l_#1##1:} { \clist_item:Nn \l_tmpa_clist {##1} } } } \NewDocumentCommand\mycmd{m}{\use:c{l_#1:}} \ExplSyntaxOff \begin{document} Test mycmdtwo \mycmdtwo{B}{P,Q,R} \mycmd{B1} \mycmd{B2} \mycmd{B3} % repeat Test mycmdtwo \mycmdtwo{B}{P,Q,R} \mycmd{B1} \mycmd{B2} \mycmd{B3} \end{document} I have also given a "helper" command \mycmd. You can also use \cs_set:cx or \cs_gset:cx but, as Joseph points out in the comments, \cs_set:cpx and \cs_gset:cpx are much faster. • Thank you very much for the explanation, in fact the saying using pgffor|csxdef I took it from (tex.stackexchange.com/a/378258/7832) which is an answer from yourself. – Pablo González L Jun 17 '19 at 1:25 • The p versions are much faster ... – Joseph Wright Jun 20 '19 at 12:02 • @JosephWright Thanks for pointing this out. – Andrew Jun 20 '19 at 22:06 I'd do a little different. The code as you put it iterates through the comma list 2+<num> times, with <num> being the number of items in the list. The first iteration is in \clist_set:Nn, which loops through it trimming spaces. The second iteration is in \clist_count:N, which loops again to count the number of items. And as many iterations as there are items in the list with \clist_item:Nn, which doesn't just skip to the item you want, but scans each item until it finds the one you want. It's rather suboptimal. In fact, using l3benchmark to measure the performance, 10 thousand iterations of your code runs in 1.32 s, while the code below runs in 0.39 s, more than 3x speedup. I suggest using \clist_map_inline:nn (or something similar), which will iterate only once through the list, and use an auxiliary counter to keep track of the item number. I'd say that you should use a <tl var> here with \tl_new:c and \tl_set:cx rather than \cs_set:cx (which, by the way, is much slower than \cs_set:cpx). And, since the generated items aren't functions (in expl3 terminology), but variables, this alternative seems better. Then the accessor function can just be changed to be \tl_use:c, which will check if the requested variable exists and issue an error if appropriate. Using \use:c here is not desired because if the requested variable does not exist it will expand to \relax and will not raise an error. Finally, if you plan to reuse the created token lists, then instead of \tl_new:c (which raises an error if the variable exists), you can use \tl_clear_new:c which will clear the variable, or create it, depending if it existed or not. \documentclass{article} \usepackage{xparse} \ExplSyntaxOn \int_new:N \l_pablo_tmp_int \NewDocumentCommand{\mycmdtwo}{ m m } { \int_zero:N \l_pablo_tmp_int \clist_map_inline:nn {#2} { \int_incr:N \l_pablo_tmp_int \tl_clear_new:c { l_pablo_#1 \int_use:N \l_pablo_tmp_int _tl } % Redundant here, but good practice in general \tl_set:cx { l_pablo_#1 \int_use:N \l_pablo_tmp_int _tl } {##1} } } \NewDocumentCommand\mycmd {m} { \tl_use:c { l_pablo_#1_tl } } \ExplSyntaxOff \begin{document} Test mycmdtwo \mycmdtwo{B}{P,Q,R} \mycmd{B1} \mycmd{B2} \mycmd{B3} % repeat Test mycmdtwo \mycmdtwo{B}{P,Q,R} \mycmd{B1} \mycmd{B2} \mycmd{B3} \end{document} TeXhackers note: \tl_set:cx does \cs_set_nopar:cpx (i.e., \expandafter\xdef\csname...\endcsname, so the \tl_new:c is redundant. But it is in the best practices to declare the variable before using it. • Thanks for the answer, I had my doubts about the correct use of cs_new vs \tl_new, putting \tl_new:c is almost obligatory in my case, otherwise it doesn't happen when using debug_on:n {...} (which I think is good practice :). Query ... Is there a difference between use:c and \tl_use:c? – Pablo González L Jun 17 '19 at 3:33 • @PabloGonzálezL \use:c{name} is exactly \csname name\endcsname. If \name exists it will be used and if it is not TeX will implicitly \let\name\relax and use it with no error message. \tl_use:c uses \tl_use:N, which checks if the tl var exists before using it and prints and error message if it does not. So again, in the realm of best practices, \tl_use:c is a better option because it will not silently do something you don't want it to. (Sorry for the delay, I posted the answer right before going to bed and just woke up :-) – Phelype Oleinik Jun 17 '19 at 8:56 • ...Okay, I understand, one last query (if you can add to your answer). If I need to rewrite \mycmdtwo (repeat) should I occupy \use:c or should I change \tl_new:c to \tl_clear_new:c ?...Saludos – Pablo González L Jun 17 '19 at 11:26 • @PabloGonzálezL If you want to do \mycmdtwo{B}{P,Q,R} again to overwrite the token lists, then \tl_clear_new:c is the way to go. I'll add to the answer. Only in very specific situations \use:c will be the correct choice, mainly due to its implicit behaviour. – Phelype Oleinik Jun 17 '19 at 11:33 • Thank you very much for the explanation and analysis. – Pablo González L Jun 17 '19 at 20:18 Token list variables are different from functions. Your code is meant to store token lists, rather than define actions. \documentclass{article} \usepackage{xparse} \ExplSyntaxOn \NewDocumentCommand{\mycmd}{mm} { \seq_set_from_clist:Nn \l__pablo_mycmd_seq { #2 } \seq_indexed_map_inline:Nn \l__pablo_mycmd_seq { \tl_clear_new:c { l_pablo_#1##1_tl } \tl_set:cn { l_pablo_#1##1_tl } { ##2 } } } \NewExpandableDocumentCommand{\pablouse}{m} { \tl_use:c { l_pablo_#1_tl } } \ExplSyntaxOff \begin{document} Test mycmd \mycmd{A}{X,Y,Z,W} \pablouse{A1} \pablouse{A2} \pablouse{A3} \pablouse{A4} \end{document} A benchmark of my solution compared with Phelype Oleynik's yields 8.22e-5 seconds (252 ops) 1.08e-4 seconds (321 ops) Top is my solution, bottom is Phelype's. • Thank you, I missed \seq_indexed_map_inline:Nn when reading the documentation. – Pablo González L Jun 20 '19 at 11:06 • Query, compared to the answer given by @Phelype Oleinik, which is more efficient? – Pablo González L Jun 20 '19 at 16:42 • @PabloGonzálezL I did the benchmark. – egreg Jun 22 '19 at 17:24 • Thank you very much...again. Saludos – Pablo González L Jun 22 '19 at 20:09
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.702775239944458, "perplexity": 3648.7149125040787}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607407.48/warc/CC-MAIN-20200122191620-20200122220620-00521.warc.gz"}
http://www.snowland.se/tag/function/
Change a folder LastWriteTime based on files within it A few days ago I wrote a script that copies some files. Did notice that everything except the date on the folders were ok. So I added a few more lines of powershell code. Did find a few suggestions on the web, but I like this one…. Since I wrote it. 😛 ```Function Set-FolderDate { Param ( [string] \$Path ) Trap [Exception] { Write-Debug \$("TRAPPED: " + \$_.Exception.Message); Write-Verbose "Could not change date on folder (Folder open in explorer?)" Continue } # Get latest filedate in folder \$LatestFile = Get-ChildItem \$Path | Sort-Object LastWriteTime -Descending | Select-Object -First 1 # Change the date, if needed \$Folder = Get-Item \$path if (\$LatestFile.LastWriteTime -ne \$Folder.LastWriteTime) { Write-Verbose "Changing date on folder '\$(\$Path)' to '\$(\$LatestFile.LastWriteTime)' taken from '\$(\$LatestFile)'" \$Folder.LastWriteTime = \$LatestFile.LastWriteTime } Return \$Folder } Set-FolderDate -Path "D:\temp" ```
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.84536212682724, "perplexity": 1100.8538981455115}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 5, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647681.81/warc/CC-MAIN-20180321180325-20180321200325-00541.warc.gz"}
https://motls.blogspot.com/2015/03/dwarf-galaxy-37-sigma-evidence-for-dark.html
## Tuesday, March 10, 2015 ... // ### Dwarf galaxy 3.7-sigma evidence for dark matter claimed A new astro-ph paper cross-linked to hep-ph, Evidence for Gamma-ray Emission from the Newly Discovered Dwarf Galaxy Reticulum 2 by Geringer-Sameth and 6 co-authors (Carnegie-Mellon/Brown/Cambridge), boasts that they have looked into the Fermi-LAT telescope data more carefully than the Fermi folks and found something that looks like a 3.7-sigma (or, with model-independent background estimates, 2.3-sigma) deviation from the expected gamma-ray backgrounds at frequencies $2$-$10\GeV$. The approximate shape of Reticulum 2, a dwarf galaxy, and the light it emits. If that deviation is a sign of new physics, and it is a huge "If" indeed, the interpretation is that the signal is due to a pairwise self-annihilating particle whose mass is a few times $100\GeV$. The signal-resembling observations have been made in Reticulum 2, a dwarf galaxy. One must realize that Reticulum 2 was "cherry-picked" as the "most signal-like dwarf galaxy" among a few dozens of dwarf galaxies which should reduce your faith (or certainty) that the signal is real. An excess: in the middle of the picture, the red crosses seem to be above the solid black line. Reticulum means a "small reticle" in Latin, and a "reticle" is a web, typically a system of thin lines (with a cross) in the circular visual field of a telescope. More importantly, Reticulum 2 (Ret2) is a dwarf galaxy which is really close – it is about 30 kpc away from Pilsen. ;-) It's further than Prague but it is very close – almost exactly equal to the diameter of the Milky Way (according to Wolfram Alpha). Ret2 is the third closest dwarf galaxy after Segue 1 (Seg1, 23 kpc) and Sagittarius (24 kpc). Ret2 is one of the 9 new low-luminosity objects. It (or they) may be viewed as "satellites of the Milky Way". Among the 9 guys, it's probably the most obvious one. Along with Eridanus 2 and no one else, it shows a statistically significant elongation (others are round) which may perhaps increase the density at some points and improve the odds that self-annihilation of dark matter takes place there. The signal-like optimistic interpretation is that a new particle, such as a superpartner, pairwise annihilates first into a pair of Standard Model $X\bar X$ particles before they create some gamma-rays. We don't know what the $X\bar X$ pair is. Depending on whether $X\bar X$ is $b\bar b$ or $\tau^+\tau^-$ or $hh$ or $\mu^+\mu^-$, the mass $m$ and $J\langle\sigma v \rangle$ of the dark matter particle may have different values – the mass is distributed in rather wide intervals roughly between $50$ and $1,000\GeV$. It's obviously incorrect to say that the dark matter has been discovered. After all, the significance level wouldn't be sufficient for a hard discovery even if one forgot about all the other possible reasons to question the bold claim suggested in this paper (Ret2 was cherry-picked; Fermi folks haven't noticed that; even according to these 7 authors, it may be due to astrophysical sources, etc.). Nevertheless, the evidence has some beef and it's plausible that the signal is real and in the future, with the hindsight, these folks will be quoted as those who already saw the actual proof of the dark matter. Thanks to Matt Buckley #### snail feedback (12) : I'm not a physicist, so please forgive my ignorant comment: I suspect dark matter is just as likely to exist as Gravity is likely to be in inisotropic. Maybe the fundamental solution needs to be revisited. "between 50 and 1000GeV" Between a chromium atom and 5.77 top quarks. The particle is stable for the current life of the universe and has no interaction except gravitation. It felicitously self-annihilates without providing universal background radiation or a beacon near galactic central black holes. Does it also fart rainbows? I've never quite understood what thermal equilibrium of the universe means physically if dark matter essentially only interacts gravitationally, or the consequences on cosmic expansion. Or how dark matter gets cold. So in trying to picture dark matter decay, it seems like dark matter should be fairly hot, implying many heavy unstable particles still around to decay. From that it seems like the difficulty in spotting the radiation is already fairly strong evidence against the predominance of primordial dark matter. Is there some reason why decay of unstable dark matter would be faster? Refresher course for the simple minded. If dark matter does not interact except gravitationally how can they produce photons? Also, is it possible that the dark matter world is as complex -- with atoms, molecules, etc., or something comparable -- as the world we know? no, skittles. Why do you suspect that these possibilities are equal? I'd say that's because you don't understand them enough to feel the difference. You can't just state that the fundamental principles should be changed. You should actually construct a viable model. And the fundamental principles are fundamental because they are very hard to dismiss. That's the theoretical problem with MOND (putting aside the observations) it's not so trivial to make consistent fundamental theory for it as you may think. And be sure, you will have to introduce new fields and particles. On the other hand some dark matter candidates like SUSY particles would be the truly revolutionary discovery Interesting article. But I do not understand the reason for cherry picking low luminosity objects. I would think that emission of lot of visible light would not obscure detection of gamma rays! I like your depiction of the dwarf galaxy, Reticulum 2 ;). I think this is what we call a Leprechaun in Ireland. There was another preprint yesterday from the Fermi-LAT and DES collaborations where they reported no excess of gamma ray radiation from 8 dwarf galaxies found by the Dark Energy Survey (http://arxiv.org/pdf/1503.02632v1.pdf). In this preprint Reticulum 2 is DES J0335.6􀀀5403. Low luminosity objects will have fewer astrophysical backgrounds like neutron stars, et cetera. The concentration of baryons to dark matter seems to drop in these objects, so the signal to noise of any dark matter signal could go up, all other things being equal. Thanks for the reply. I understand their hypothesis now. Then, if a convincing signal of dark matter is not found in these objects, their hypothesis of a smaller baryon to dark matter in these objects would be proven wrong.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 1, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8344977498054504, "perplexity": 1040.8641954814111}, "config": {"markdown_headings": true, "markdown_code": false, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574532.44/warc/CC-MAIN-20190921145904-20190921171904-00314.warc.gz"}
https://ask.sagemath.org/question/47774/determinants-of-matrices-with-symmetric-functions/?sort=votes
# Determinants of Matrices with Symmetric Functions edit I'm interested in calculating the determinant of the matrix $A = (a_{i+j})$ for $0\leq i,j\leq n$ in which $a_{k} = \frac{h_k}{e_k}$ where $h_k, e_k$ are the homogeneous (elementary, resp.) symmetric functions of degree $k$. I would like to express the numerator of $\det(A)$ in terms of monomial symmetric functions. I have written some code that I think does the job, but it seems an incredibly hacky way of doing it in my opinion. Since I am quite new to sage I was wondering whether someone might be able to take a look at what I've done and suggest a more sage-like way to tackle this problem? My code is below. I define a set of functions: # set up two matrices containing symbolic functions hh(i+j), ee(i+j), which are later replaced with symmetric functions h and e def heMatrices(N): hh = function('hh') ee = function('ee') H = matrix(SR,N,N,lambda i,j:hh(i+j)) E = matrix(SR,N,N,lambda i,j:ee(i+j)) return H,E # Pointwise divides two matrices (a bit like Hadamard division??) def elementwiseDivision( M, N ): assert( M.parent() == N.parent() ) nc, nr = M.ncols(), M.nrows() A = copy( M.parent().zero() ) for r in range(nr): for c in range(nc): A[r,c] = M[r,c] / N[r,c] return A # extracts numerator of determinant def extractNumerator(M): return det(M).numerator() # extracts denominator of determinant def extractDenominator(M): return det(M).denominator() # This is dodgy - treates expression as a python string and replaces e(x) with e[x], h(x) with h[x] def convertToSymmetricString(expr): st = str(expr) st = st.replace('(','[') st = st.replace(')',']') st = st.replace('ee','e') st = st.replace('hh','h') return st # Puts together the above functions. def evaluateDeterminant(N): h,e = heMatrices(N) A = elementwiseDivision(h,e) srExpression = extractNumerator(A) sageExpression = convertToSymmetricString(srExpression) return sageExpression Then I open sage in the command line and type the following: sage: Sym = SymmetricFunctions(QQ) sage: Sym.inject_shorthands(verbose=False) sage: ee = evaluateDeterminant(2) sage: ans = sage_eval(ee, locals=vars()) sage: ans = m(ans) which returns 2*m[2, 1, 1] + 2*m[2, 2] + 2*m[3, 1] + m[4] which I believe is what I'm after. edit retag close merge delete Sort by » oldest newest most voted Yeah that's quite hacky. Try this instead: N = 2 R = PolynomialRing(QQ, names=['h_{}'.format(k) for k in range(2*N)] + ['e_{}'.format(k) for k in range(2*N)]) H = R.gens()[0:2*N] E = R.gens()[2*N:] M = Matrix(R.fraction_field(), N, lambda i, j: H[i+j]/E[i+j]) Sym = SymmetricFunctions(QQ) e = Sym.elementary() h = Sym.homogeneous() m = Sym.monomial() he_subs = dict(zip(R.gens(), [h[k] for k in range(2*N)] + [e[k] for k in range(2*N)])) print(m(M.det().numerator().subs(he_subs))) A symbolic alternative (basically, a cleaner version of what you did): N = 4 Sym = SymmetricFunctions(QQ) e = Sym.elementary() h = Sym.homogeneous() m = Sym.monomial() H = function('H', nargs=1, print_func=lambda self, *args: 'h[{}]'.format(args[0])) E = function('E', nargs=1, print_func=lambda self, *args: 'e[{}]'.format(args[0])) M = Matrix(SR, N, lambda i, j: H(i+j)/E(i+j)) print(m(sage_eval(str(M.det().numerator()), locals={'h': h, 'e': e}))) more ( 2019-09-08 13:35:04 -0600 )edit Many thanks! Interestingly it seems as though for n = 4 your solution takes an age to finish computing whereas my original solution returns an answer within around 90 minutes (on my not-very-good computer). I'm not sure how much I can really trust my answer though. ( 2019-09-09 05:13:23 -0600 )edit
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.3782762587070465, "perplexity": 7530.145612337022}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250589861.0/warc/CC-MAIN-20200117152059-20200117180059-00525.warc.gz"}
https://archive.softwareheritage.org/browse/content/sha1_git:2f8d77e142aa4e0fe8b75b03de27804d9a58c972/?path=a6f55739957004d562490e2b8fda2d38d136a287/rope_range.Rd
rope_range.Rd % Generated by roxygen2: do not edit by hand % Please edit documentation in R/rope_range.R \name{rope_range} \alias{rope_range} \title{Find Default Equivalence (ROPE) Region Bounds} \usage{ rope_range(x, ...) } \arguments{ \item{x}{A \code{stanreg}, \code{brmsfit} or \code{BFBayesFactor} object.} \item{...}{Currently not used.} } \description{ This function attempts at automatically finding suitable "default" values for the Region Of Practical Equivalence (ROPE). } \details{ \cite{Kruschke (2018)} suggests that the region of practical equivalence could be set, by default, to a range from \code{-0.1} to \code{0.1} of a standardized parameter (negligible effect size according to Cohen, 1988). \itemize{ \item For \strong{linear models (lm)}, this can be generalised to \ifelse{html}{\out{-0.1 * SD<sub>y</sub>, 0.1 * SD<sub>y</sub>}}{\eqn{[-0.1*SD_{y}, 0.1*SD_{y}]}}. \item For \strong{logistic models}, the parameters expressed in log odds ratio can be converted to standardized difference through the formula \ifelse{html}{\out{&radic;(3)/&pi;}}{\eqn{\sqrt{3}/\pi}}, resulting in a range of \code{-0.055} to \code{-0.055}. \item For other models with \strong{binary outcome}, it is strongly recommended to manually specify the rope argument. Currently, the same default is applied that for logistic models. \item For \strong{t-tests}, the standard deviation of the response is used, similarly to linear models (see above). \item For \strong{correlations}, \code{-0.05, 0.05} is used, i.e., half the value of a negligible correlation as suggested by Cohen's (1988) rules of thumb. \item For all other models, \code{-0.1, 0.1} is used to determine the ROPE limits, but it is strongly advised to specify it manually. } } \examples{ library(rstanarm) model <- stan_glm(mpg ~ wt + gear, data = mtcars, chains = 2, iter = 200) rope_range(model) \dontrun{ library(rstanarm) model <- stan_glm(vs ~ mpg, data = mtcars, family = "binomial") rope_range(model) library(brms) model <- brm(mpg ~ wt + cyl, data = mtcars) rope_range(model) library(BayesFactor) bf <- ttestBF(x = rnorm(100, 1, 1)) rope_range(bf) } } \references{ Kruschke, J. K. (2018). Rejecting or accepting parameter values in Bayesian estimation. Advances in Methods and Practices in Psychological Science, 1(2), 270-280. \doi{10.1177/2515245918771304}. }
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.568780243396759, "perplexity": 9241.802961734975}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780054023.35/warc/CC-MAIN-20210917024943-20210917054943-00150.warc.gz"}
http://tex.stackexchange.com/questions/67552/in-tikz-how-to-make-the-text-on-an-edge-have-the-same-direction-as-the-edges
# In Tikz, how to make the text on an edge have the same direction as the edge's? I have created a simple node-edge graph in which I would like to have the texts on each edge aligned to the direction of the edge. \documentclass[class=minimal,border=0pt]{standalone} \usepackage{pgf} \usepackage{tikz} \usetikzlibrary{arrows,automata} \usepackage[latin1]{inputenc} \begin{document} \begin{tikzpicture}[->,>=stealth',shorten >=1pt,auto,node distance=2.8cm, semithick] \tikzstyle{every state}=[fill=red,draw=none,text=white] \node[state] (D) {$D$}; \node[state] (C) [below right of=D] {$C$}; \node[state] (B) [above right of=D] {$B$}; \node[state] (A) [below right of=B] {$A$}; \path (D) edge node {tdc} (C) (B) edge node {tbc} (C) (C) edge node {tca} (A); \end{tikzpicture} \end{document} For example, I would like the text tbc rotates -90 degrees automatically to be aligned to the direction of the edge connects the node B to the node C. Is that possible? - Try adding the key sloped to the relevant nodes (PGF Manual Section 16.8). Does that do what you want? –  Loop Space Aug 17 '12 at 12:24 Thanks! That's the solution! I was trying to figure out how to use text along path... however, the text is not aligned to the center of edge. any solution? –  Rasoul Aug 17 '12 at 12:30 The answer to the question of how to get the text to go along the path is to use the sloped key. This rotates the node to match the tangent of the path at the point at which the node would be placed (see Section 16.8 of the PGF Manual). However, as noted in the comments, this doesn't quite work as desired. This is because of the auto key. This shifts the node off the path. It does so by placing one of the node anchors at the placement point, the anchor chosen appropriately for the tangent of the path (I haven't looked at the code so I'm guessing as to how it chooses it). The problem comes with the fact that the anchor is chosen first and then the node is rotated. What ought to happen is that the node is rotated and then the anchor is chosen. But actually, this doesn't need any complicated code since the anchor will always be one of north or south (if allow upside down is set then it will always be south). So simply setting anchor=south instead of auto will do. Here's a simple example demonstrating the above analysis. The first three nodes are not sloped, the second three are. The first of the triples has no (other) options, the second is auto and the third is anchor=south. It's clear from the 2nd and 5th that the node has effectively been rotated around its anchor point. Here's your code with this change (plus a couple of minor stylistic changes: tikz loads pgf automatically, and \tikzstyle is depreciated). \documentclass{standalone} %\url{http://tex.stackexchange.com/q/67552/86} \usepackage{tikz} \usetikzlibrary{arrows,automata} \usepackage[latin1]{inputenc} \begin{document} \begin{tikzpicture}[ ->, >=stealth', shorten >=1pt, auto, node distance=2.8cm, semithick, every state/.style={fill=red,draw=none,text=white}, ] \node[state] (D) {$D$}; \node[state] (C) [below right of=D] {$C$}; \node[state] (B) [above right of=D] {$B$}; \node[state] (A) [below right of=B] {$A$}; \path[every node/.style={sloped,anchor=south,auto=false}] (D) edge node {tdc} (C) (B) edge node {tbc} (C) (C) edge node {tca} (A); \end{tikzpicture} \end{document} (NB the auto=false isn't necessary as the anchor=south overrides the auto key) And here's the result: - Thanks for your detailed answer. It helped me to get it to work properly. –  Rasoul Aug 18 '12 at 16:42
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8515960574150085, "perplexity": 973.5528059383994}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988924.75/warc/CC-MAIN-20150728002308-00214-ip-10-236-191-2.ec2.internal.warc.gz"}
https://www.physicsforums.com/threads/yo-yo-and-torque.146284/
# Yo-yo and torque 1. Dec 1, 2006 ### igor123d 1. A yo-yo lies on a frictionless table. If you apply a horizontal force F to the string to the right, how would the yo-yo move (linearly and rotationally) 2. EF=ma ET=I(alpha) 3. Initially I thought that the yo-yo would move to the right and rotate counter-clockwise (because the string lies below the com). On the test in class that was the right answer apparently. But I looked online and one study guide said that there would be no rotation and the yo-yo would be moving to the right. (which is how I had ultimately answered the question). The idea is that the sum of all forces is ma and that the only external force is the pulling force, F. So if it would rotate, some kinetic energy would go to rotational thus linear would be smaller and a would not be F/m. But how could there be no torque if the force is applied at a point that is not the center of mass and has a component perpendicular to the distance? Last edited: Dec 1, 2006 2. Dec 1, 2006 ### OlderDan I assume this is a qualitative question. Is the string pulling right or left? 3. Dec 1, 2006 ### turdferguson The answer is all of the above, it depends on the angle from horizontal. It has to do with where the torque is applied. If you pick the correct angle theta, the force is on the instantaneous axis of rotation and produces no torque, only translation. If its below (in your case it was horizontal), then your answer is correct. If the angle is greater than the axis, the yoyo will move in the opposite direction from which you pulled it. 4. Dec 1, 2006 ### igor123d Oh sorry forgot to mention, to the right. 5. Dec 1, 2006 ### igor123d Well but in this specific example, the force actos horizontally on a point below the center of mass, so there would have to be torque, right? 6. Dec 1, 2006 ### igor123d By the way here is an image of a similar situation (look at b): 7. Dec 1, 2006 ### OlderDan Then you are correct. The only horizontal force acting is F, so there will be an accleration F/m to the right. If the string is below the CM there will be a torqe CCW of F*r where r is the radius of the inner spool, so there will be a CCW rotation with angular acceleration. If there were sufficient friction to prevent slipping instead of no friction, the yo-yo would wind itself up on the string as it rolled to the right. Friction would oppose F and produce a greater CW torque than the CCW torque of the string. 8. Dec 1, 2006 ### igor123d But would this work with conservation of energy? I mean if the only force is F then the total work would have to be Fx. But in this case, you would also have rotational energy, so you would have Fx+K rotational. How could this work? 9. Dec 1, 2006 ### OlderDan It is a bit tricky to calculate the work. Think of you doing work on the string, and the string being an energy transmitter to the yo-yo. You apply a force over a distance. How does that distance compare to the distance the yo-yo moves? 10. Dec 2, 2006 ### igor123d Well I guess since the string moves around the yo-yo, its distance would be R*theta. Then would it also have a translational part x, so that d=R*theta+x But since the rotation is not what's casuing the linear motion, how would x be related to r*theta? 11. Dec 2, 2006 ### Hootenanny Staff Emeritus Some really useful comments you've been posting recently.... 12. Dec 2, 2006 ### OlderDan The relationship between x and r*θ will depend on the moment of inertia of the yo-yo. What is important is the relationship between W = F*(x + r*θ) and the total kinetic energy. Does F*x equal the translational KE and F*r*θ equal the rotational KE? 13. Dec 2, 2006 ### igor123d Yes, I guess they will. Ok thanks for your help Dan, this makes sense now.
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8900046348571777, "perplexity": 719.775559825865}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719033.33/warc/CC-MAIN-20161020183839-00288-ip-10-171-6-4.ec2.internal.warc.gz"}
https://www.physicsforums.com/threads/finding-the-electric-field-magnitude-in-each-region-of-a-sphere.771855/
# Finding the electric field magnitude in each region of a sphere 1. Sep 19, 2014 ### Joa Boaz 1. The problem statement, all variables and given/known data A charged insulating spherical shell has winner radius of a/3 an an outer radius of a. The cross section is as shown on the picture. The outer shell has a non-constant volume charge density of ρ = 6*α*r^3. Find the electric field magnitude in each region (outside the object, in the shell itself, and in the cavity contained in the shell). Find the electric potential in each region, and sketch a graph of the electric potential as a function of radius for r = 0 to r = 2a and label the potential at r = a/3, a, and 2a. The reference point for the potential is that V = 0 to r = ∞ 2. Relevant equations Not sure but, E = (1/4∏*ε) * Q/r^2 E = (1/4∏*ε) * (Q/r^3) * r 3. The attempt at a solution q(inside) = -Q(sphere) = - 4/3 * ∏ * (a^3) ρ = (-4/3)*∏*((a^6)/729)*6α = (-8/729)*(a^6)*∏*α q(outise) = - q(inside) = (8/729)*∏*α σ(outer) = q(outside)/4∏*a^2 = (2/729)*(a^4)*∏*α Not sure if the above is correct, but I am not sure what I have to do after this. Please can anyone help, thank you. #### Attached Files: • ###### IMG_0113.jpg File size: 60.7 KB Views: 133 2. Sep 20, 2014 ### vanhees71 I'm not so sure about your notation. In such cases it's much easier to integrate the electrostatic Poisson equation, $$\Delta \Phi=-\frac{1}{\epsilon_0} \rho.$$ In this case you have spherical symmetry and thus $\Phi=\Phi(r)$, where $r=|\vec{r}|$ is the distance from the origin (the center of your spheres). Just look up the Laplace operator in spherical coordinates and solve the differential equation in the different regions. The constants are determined by the appropriate boundary conditions. 3. Sep 20, 2014 ### Joa Boaz Thank you for your help. But I am not sure if I am allowed to use the Laplace operator since the professor has not gone over the Laplace transform. Is there any other way to tackle the above question without using Laplace transform? Thank you. 4. Sep 20, 2014 ### vanhees71 It's not about the Laplace transform but the Laplace operator. In Cartesian coordinates it reads $$\Delta \Phi=\partial_x^2 \Phi + \partial_y^2 \Phi + \partial_z^2 \Phi.$$ 5. Sep 20, 2014 ### vela Staff Emeritus It's not very clear at all what you're doing. As far as I can tell, you found a similar example in the book or your notes and just plugged in the values from this problem into the equations from the example. That approach doesn't require any real understanding, and it won't help you in the long run. In this case, you seemed to have picked an example that doesn't apply to the described situation. Try again, this time justifying why you're taking each step. To find the electric field, use Gauss's law. You have spherical symmetry here, so use it. Because the charge density is non-uniform, you'll need to integrate to find the enclosed charge. 6. Sep 20, 2014 ### Joa Boaz I do really appreciate your help. It seems that my level of physics is very low because I just don't see how I can use partial derivatives on this problem. But I really do appreciate your help. 7. Sep 20, 2014 ### Dr Transport This problem is solvable by Gauss's Law since it is spherically symmetric. Last edited: Sep 20, 2014 Draft saved Draft deleted Similar Discussions: Finding the electric field magnitude in each region of a sphere
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9501450061798096, "perplexity": 489.8971550442638}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806310.85/warc/CC-MAIN-20171121021058-20171121041058-00548.warc.gz"}
http://authors.library.caltech.edu/1313/
CaltechAUTHORS A Caltech Library Service # Unsteady forces on an accelerating plate and application to hovering insect flight Pullin, D. I. and Wang, Z. Jane (2004) Unsteady forces on an accelerating plate and application to hovering insect flight. Journal of Fluid Mechanics, 509 . pp. 1-21. ISSN 0021-1120. http://resolver.caltech.edu/CaltechAUTHORS:PULjfm04 Preview PDF See Usage Policy. 298Kb Use this Persistent URL to link to this item: http://resolver.caltech.edu/CaltechAUTHORS:PULjfm04 ## Abstract The aerodynamic forces on a flat plate accelerating from rest at fixed incidence in two-dimensional power-law flow are studied analytically and numerically. An inviscid approximation is made in which separation at the two plate edges is modelled by growing spiral vortex sheets, whose evolution is determined by the Birkhoff–Rott equation. A solution based on a similarity expansion is developed, valid when the scale of the separated vortex is much smaller than the plate dimension. The leading order is given by the well-known similarity growth of a vortex sheet from a semi-infinite flat plate, while equations at the second order describe the asymmetric sweeping effect of that component of the free-stream parallel to the plate. Owing to subtle cancellation, the unsteady vortex force exerted on the plate during the starting motion is independent of the sweeping effect and is determined by the similarity solution, to the order calculated. This gives a mechanism for dynamic stall based on a combination of unsteady vortex lift and pure added mass; the incidence angle for maximum vortex lift is $\arccos \sqrt{3/8}\,{\approx}\,52.2^\circ$ independent of the acceleration profile. Circulation on the flat plate makes no direct contribution. Both lift and drag force predictions from the unsteady inviscid theory are compared with those obtained from numerical solutions of the two-dimensional unsteady Navier–Stokes equations for an ellipse of high aspect ratio, and with predictions of Wagner's classical theory. There is good agreement with numerical results at high incidence and moderate Reynolds number. The force per unit span predicted by the vortex theory is evaluated for parameters typical of insect wings and is found to be in reasonable agreement with numerical simulations. Estimates for the shed circulation and the size of the start-up vortices are also obtained. The significance of this flow as a mechanism for insect hovering flight is discussed. Item Type: Article "Reprinted with the permission of Cambridge University Press." Received August 7 2003, Revised November 10 2003, Published Online 7 June 2004 D. I. P. wishes to thank P. E. Dimotakis for helpful discussions. Z. J.W. wishes to acknowledge the support by NSF Early Career grant, ONR YIP, AFOSR and the Packard Foundation. CaltechAUTHORS:PULjfm04 http://resolver.caltech.edu/CaltechAUTHORS:PULjfm04 http://dx.doi.org/10.1017/S0022112004008821 No commercial reproduction, distribution, display or performance rights in this work are provided. 1313 CaltechAUTHORS Archive Administrator 10 Jan 2006 26 Dec 2012 08:43 Repository Staff Only: item control page
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6373571157455444, "perplexity": 1647.638889582188}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936466999.23/warc/CC-MAIN-20150226074106-00002-ip-10-28-5-156.ec2.internal.warc.gz"}
https://kar.kent.ac.uk/53812/
# A preconditioner for the Ohta-Kawasaki equation Farrell, Patrick E, Pearson, John W (2017) A preconditioner for the Ohta-Kawasaki equation. SIAM Journal on Matrix Analysis and Applications, 38 (1). pp. 217-225. ISSN 0895-4798. E-ISSN 1095-7162. (doi:10.1137/16M1065483) PDF - Author's Accepted Manuscript Preview Official URL http://dx.doi.org/10.1137/16M1065483 ## Abstract We propose a new preconditioner for the Ohta-Kawasaki equation, a nonlocal Cahn-Hilliard equation that describes the evolution of diblock copolymer melts. We devise a computable approximation to the inverse of the Schur complement of the coupled second-order formulation via a matching strategy. The preconditioner achieves mesh independence: as the mesh is refined, the number of Krylov iterations required for its solution remains approximately constant. In addition, the preconditioner is robust with respect to the interfacial thickness parameter if a timestep criterion is satisfied. This enables the highly resolved finite element simulation of three-dimensional diblock copolymer melts with over one billion degrees of freedom. Item Type: Article 10.1137/16M1065483 Q Science > QA Mathematics (inc Computing science) > QA297 Numerical analysisQ Science > QA Mathematics (inc Computing science) > QA377 Partial differential equationsQ Science > QD Chemistry > QD473 Physical properties in relation to structure Faculties > Sciences > School of Mathematics Statistics and Actuarial Science > Applied Mathematics John Pearson 20 Jan 2016 17:21 UTC 29 May 2019 16:54 UTC https://kar.kent.ac.uk/id/eprint/53812 (The current URI for this page, for reference purposes)
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9321808218955994, "perplexity": 3388.6288311531716}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574039.24/warc/CC-MAIN-20190920134548-20190920160548-00445.warc.gz"}
https://www.aimsciences.org/article/doi/10.3934/dcdsb.2016003
# American Institute of Mathematical Sciences July  2016, 21(5): 1421-1434. doi: 10.3934/dcdsb.2016003 ## Free boundary problem of Barenblatt equation in stochastic control 1 School of Mathematical Sciences, South China Normal University, Guangzhou 510631, China 2 School of Finance, Guangdong University of Foreign Studies, Guangzhou 510006, China Received  January 2014 Revised  March 2014 Published  April 2016 The following type of parabolic Barenblatt equations min {$\partial_t V - \mathcal{L}_1 V, \partial_t V-\mathcal{L}_2 V$} = 0 is studied, where $\mathcal{L}_1$ and $\mathcal{L}_2$ are different elliptic operators of second order. The (unknown) free boundary of the problem is a divisional curve, which is the optimal insured boundary in our stochastic control problem. It will be proved that the free boundary is a differentiable curve. To the best of our knowledge, this is the first result on free boundary for Barenblatt Equation. We will establish the model and verification theorem by the use of stochastic analysis. The existence of classical solution to the HJB equation and the differentiability of free boundary are obtained by PDE techniques. Citation: Xiaoshan Chen, Fahuai Yi. Free boundary problem of Barenblatt equation in stochastic control. Discrete & Continuous Dynamical Systems - B, 2016, 21 (5) : 1421-1434. doi: 10.3934/dcdsb.2016003 ##### References: show all references ##### References: [1] Haiyang Wang, Zhen Wu. Time-inconsistent optimal control problem with random coefficients and stochastic equilibrium HJB equation. Mathematical Control & Related Fields, 2015, 5 (3) : 651-678. doi: 10.3934/mcrf.2015.5.651 [2] Jiongmin Yong. Time-inconsistent optimal control problems and the equilibrium HJB equation. Mathematical Control & Related Fields, 2012, 2 (3) : 271-329. doi: 10.3934/mcrf.2012.2.271 [3] Thierry Horsin, Peter I. Kogut, Olivier Wilk. Optimal $L^2$-control problem in coefficients for a linear elliptic equation. II. Approximation of solutions and optimality conditions. Mathematical Control & Related Fields, 2016, 6 (4) : 595-628. doi: 10.3934/mcrf.2016017 [4] Thierry Horsin, Peter I. Kogut. Optimal $L^2$-control problem in coefficients for a linear elliptic equation. I. Existence result. Mathematical Control & Related Fields, 2015, 5 (1) : 73-96. doi: 10.3934/mcrf.2015.5.73 [5] Alexander Arguchintsev, Vasilisa Poplevko. An optimal control problem by parabolic equation with boundary smooth control and an integral constraint. Numerical Algebra, Control & Optimization, 2018, 8 (2) : 193-202. doi: 10.3934/naco.2018011 [6] Jésus Ildefonso Díaz, Tommaso Mingazzini, Ángel Manuel Ramos. On the optimal control for a semilinear equation with cost depending on the free boundary. Networks & Heterogeneous Media, 2012, 7 (4) : 605-615. doi: 10.3934/nhm.2012.7.605 [7] Peter I. Kogut. On approximation of an optimal boundary control problem for linear elliptic equation with unbounded coefficients. Discrete & Continuous Dynamical Systems - A, 2014, 34 (5) : 2105-2133. doi: 10.3934/dcds.2014.34.2105 [8] Diana Keller. Optimal control of a linear stochastic Schrödinger equation. Conference Publications, 2013, 2013 (special) : 437-446. doi: 10.3934/proc.2013.2013.437 [9] Fulvia Confortola, Elisa Mastrogiacomo. Optimal control for stochastic heat equation with memory. Evolution Equations & Control Theory, 2014, 3 (1) : 35-58. doi: 10.3934/eect.2014.3.35 [10] Chonghu Guan, Xun Li, Zuo Quan Xu, Fahuai Yi. A stochastic control problem and related free boundaries in finance. Mathematical Control & Related Fields, 2017, 7 (4) : 563-584. doi: 10.3934/mcrf.2017021 [11] Max Gunzburger, Sung-Dae Yang, Wenxiang Zhu. Analysis and discretization of an optimal control problem for the forced Fisher equation. Discrete & Continuous Dynamical Systems - B, 2007, 8 (3) : 569-587. doi: 10.3934/dcdsb.2007.8.569 [12] Gökçe Dİlek Küçük, Gabil Yagub, Ercan Çelİk. On the existence and uniqueness of the solution of an optimal control problem for Schrödinger equation. Discrete & Continuous Dynamical Systems - S, 2019, 12 (3) : 503-512. doi: 10.3934/dcdss.2019033 [13] Chonghu Guan, Fahuai Yi, Xiaoshan Chen. A fully nonlinear free boundary problem arising from optimal dividend and risk control model. Mathematical Control & Related Fields, 2019, 9 (3) : 425-452. doi: 10.3934/mcrf.2019020 [14] Ugur G. Abdulla, Evan Cosgrove, Jonathan Goldfarb. On the Frechet differentiability in optimal control of coefficients in parabolic free boundary problems. Evolution Equations & Control Theory, 2017, 6 (3) : 319-344. doi: 10.3934/eect.2017017 [15] Lorena Bociu, Lucas Castle, Kristina Martin, Daniel Toundykov. Optimal control in a free boundary fluid-elasticity interaction. Conference Publications, 2015, 2015 (special) : 122-131. doi: 10.3934/proc.2015.0122 [16] Enrique Fernández-Cara, Juan Límaco, Laurent Prouvée. Optimal control of a two-equation model of radiotherapy. Mathematical Control & Related Fields, 2018, 8 (1) : 117-133. doi: 10.3934/mcrf.2018005 [17] Jitka Machalová, Horymír Netuka. Optimal control of system governed by the Gao beam equation. Conference Publications, 2015, 2015 (special) : 783-792. doi: 10.3934/proc.2015.0783 [18] Kai Wang, Dun Zhao, Binhua Feng. Optimal nonlinearity control of Schrödinger equation. Evolution Equations & Control Theory, 2018, 7 (2) : 317-334. doi: 10.3934/eect.2018016 [19] Bopeng Rao, Laila Toufayli, Ali Wehbe. Stability and controllability of a wave equation with dynamical boundary control. Mathematical Control & Related Fields, 2015, 5 (2) : 305-320. doi: 10.3934/mcrf.2015.5.305 [20] Maya Bassam, Denis Mercier, Ali Wehbe. Optimal energy decay rate of Rayleigh beam equation with only one boundary control force. Evolution Equations & Control Theory, 2015, 4 (1) : 21-38. doi: 10.3934/eect.2015.4.21 2018 Impact Factor: 1.008
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.5521870255470276, "perplexity": 5052.422695838861}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986688826.38/warc/CC-MAIN-20191019040458-20191019063958-00167.warc.gz"}
http://engineersphere.com/sine-functions
# Sine Functions ### Why do we need Sine functions? Much of what you will work with in electronics requires alternating current, meaning you will encounter sine waves, square waves, and triangle waves.  It might have been a few years since trigonometry, but you will quickly realize that mastering the basics of trigonometry is essential for your success in electrical engineering.  Sine functions are one thing you will be seeing a lot of in electrical engineering.  There is no avoiding them.  Later in the curriculum, you will even learn how to break down square waves and triangle waves into series of sine waves. The general equation for sinusoidal voltage signal is given by $v(t) = A \sin(\omega t + \Phi) + V_{DC} = A \sin( 2 \pi f t + \Phi) + V_{DC}$ Where A is the amplitude, $\omega$ is the angular frequency, t is time, $\Phi$ is phase shift, and $V_{DC}$ is a constant voltage. Likewise, current follows the same general equation. $i(t) = A \sin(\omega t + \Phi) + I_{DC} = A \sin( 2 \pi f t + \Phi) + I_{DC}$ The equation for the sine wave in Figure 1 is $v(t) = 4\cdot\sin(2 \pi \cdot 1000t) + 2V$.  The following sections will explain how to derive the equation for this sine wave as well as any other sine function that you may encounter. ### Amplitude The amplitude (A) is found by taking the difference between the highest point and the lowest point of a waveform and dividing by two.  In Figure 2, the highest point (VH) is 6 V while the lowest point (VL) is -2 V.  The amplitude, therefore, is 4 V. $A = \frac{V_{H} - V_{L}}{2} = \frac{6-(-2)}{2} = 4V$ ### Period, Frequency, and Angular Frequency The period (T) of a waveform is defined as the time it takes for that waveform to complete one cycle.  Figure 2 shows two periods, or cycles, of a sine wave.  For this sine wave, the period is equal to 1 ms.  Identifying the period length allows you to derive the frequency (f) and angular frequency (ω) of the signal. $\omega = 2 \pi \cdot f$       $\omega = \frac{2\pi}{T} = \frac{2\pi}{.001} = 6283 rad/s$     $f = \frac{1}{T} = \frac{1}{.001} = 1000Hz = 1kHz$ Frequency is defined as the number of cycles a waveform completes in one second.  One cycle per second is known as a Hertz (Hz).  The waveform above has a frequency of 1000 cycles per second, or 1 kHz. The units for angular frequency are radians per second (rad/s).  Angular frequency is similar to the frequency measured in Hertz, except now we are measuring radians rather than cycles.  Because one cycle is equal toradians (360°), the angular frequency is derived by multiplying the frequency by.  A common error in homework problems occurs when students neglect to convert one measure of frequency to another.  Pay attention to which form you should be using and always remember the equation $\omega = 2\pi \cdot f$. ### Offset Voltage When a DC voltage is applied to an AC voltage signal, the AC signal is said to have a DC offset voltage.  A signal’s offset voltage can also be seen as the signal’s average voltage.  You can use integration to find the average value of a time-varying function, but for sine functions, it is easier to use observation. Consider the sine wave in Figure 3.  The equation for this sine wave is $v(t) = 4 \sin(6283t)$. The waveform is oscillating around zero and has no offset.  In contrast, the sine wave in Figure 4 has an offset of 2 V.  This time, the waveform is oscillating around 2 and its equation is $v(t) = 4 \sin(6283t) + 2V$. When determining the offset of a sine function, remember that an offset is a constant value.  Adding a constant to a sine function only changes the level about which the sine wave oscillates. ### Phase Shift A sine function has a phase shift when it does not begin its cycle at t = 0. A phase shift is illustrated in the figure to the right. To calculate phase shift, use the equations, $\Phi_{degrees} = \frac{t_{1} - t_{2}}{T} \cdot 360 ^ {\circ}$ $\Phi_{radians} = \frac{t_{1} - t_{2}}{T} 2\pi rad$ where t1 is the waveform’s original starting point, t2 is where the wave’s starting point has been shifted to, and T is the period. Example: Find the phase shift of the sine function in Figure 5. Solution: The sine wave has been shifted from its original starting position (t1) of 0 ms to its new starting point (t2) at -0.4 ms.  Therefore, t1 = 0 ms, t2 = -0.4 ms, and T = 1 ms.  Solving for degrees, the phase shift is equal to 144°. $\phi = \frac{0-(-0.4 ms)}{1 ms} \cdot 360^ {\circ} = 144^ {\circ}$ Defining phase shift with respect to t = 0 works fine in mathematics, but real life won’t tell you when time is equal to zero.  In labs this semester you will be observing signals on an oscilloscope.  For a single signal, you can assume that there is no phase shift.  Phase shift becomes important when more than one signal is involved.  There are times when knowing the phase shift between two signals is crucial (the design of an audio system is one instance). In instances with multiple signals, the phase shift of one signal is measured relative to another signal. One wave is your reference point from which you measure all other waves.  Figure 6 shows V1 as the reference and V2 as the wave that has been shifted.  Figure 7 shows the opposite.  Once you decide on a reference, the same formula given above applies. $\phi = \frac{t_{1} - t_{2}}{T} \cdot 360^{\circ}$ The sign of the phase shift will vary depending on which signal you use as a reference.  The phase shift from V1 to V2 in Figure 6 is positive because V2 is shifted to an earlier time.  This is a confusing concept for many people.  Though it appears that V1 is ahead of V2, this is not the case.  V1 starts its cycle a full 3 ms before V2 does.  V1, therefore, is leading V2. Another way of explaining this is by using the equation.  In Figure 6, t1 – t2 must be positive because t1 is larger.  In Figure 7, t1 – t2 must be negative. $\phi_{figure6} = \frac{3 ms}{15 ms} \cdot 360^ {\circ} = 72^ {\circ}$ $\phi_{figure7} = \frac{-3 ms}{15 ms} \cdot 360^ {\circ} = -72^ {\circ}$ Written by Ryan Eatinger ([email protected]).  Thank you!
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 19, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8754701018333435, "perplexity": 673.8797890430773}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": false}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824293.62/warc/CC-MAIN-20171020173404-20171020193404-00118.warc.gz"}
https://brilliant.org/problems/reducible-1000-degree-polynomials/
# Reducible 1000 degree Polynomials For how many positive integers $n<1000$ can the polynomial $f_n(x)=x^{1000}+x^n+2$ be written as a product of two non-constant polynomials with integer coefficients? ×
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 2, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7017106413841248, "perplexity": 229.3952420052745}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348509264.96/warc/CC-MAIN-20200606000537-20200606030537-00304.warc.gz"}
https://www.springer.com/us/book/9783642204869?wt_mc=ThirdParty.RD.3.EPR653.About_eBook
CYBER DEAL: 50% off all Springer eBooks | Get this offer! # Inorganic Chemistry in Tables Authors: Turova, Nataliya Free Preview • Valuable supplement to Inorganic Chemistry textbooks • Easy to use • Each reference scheme presents information on one element, its derivatives and their transformation • Information on each double-sided sheet usually covered within one whole big chapter of a textbook • Clearly structured which simplifies considerably the search for necessary information. • see more benefits eBook $54.99 price for USA in USD • ISBN 978-3-642-20487-6 • Digitally watermarked, DRM-free • Included format: PDF • ebooks can be used on all reading devices • Immediate eBook download after purchase Softcover$69.99 price for USA in USD The present supplement to Inorganic Chemistry courses is developed in the form of reference schemes, presenting the information on one or several related element derivatives and their mutual transformations within one double-sided sheet. The compounds are placed from left to right corresponding to the increase in the formal oxidation number of the element considered. For each distinct oxidation state the upper position in the column is occupied by an oxide, its hydrated forms, followed then by basic (and oxo-) and normal salts. The position of each compound in this scheme is unambiguously determined in this approach by the central atom oxidation number (in the horizontal direction) and the nature of ligand (in the vertical one), which simplifies considerably the search for necessary information. The mutual transformations are displayed by arrows accompanied by the reagents or other factors responsible for the reaction (red arrows mean oxidation, green arrows mean reduction, black arrows – if the oxidation number is not changed). Modern training programs require the mastering of a tremendous amount of data. The present tables should serve as a useful addition to textbooks and lectures. Dr. Nataliya Turova is Senior Research of Inorganic Chemistry at Lomonosov Moscow State University. Her field of research comprises chemistry of coordinated compounds of metals with organic ligands. Her main work concerns investigating synthesis, physical and chemical properties and structure of metal alkoxides as well as theoretical principles of their use for  the preparation of oxides by sol-gel method. She is the author of more than 400 articles published in Russian and international academic journals among them Polyhedron, J. Chem. Soc., Chem. Commun., Dalton Trans., Inorg. Chem. Commun., Inorg. Chim. Acta, Eur. J. Inorg. Chem., Z. Anorg. Chem., J. Sol-Gel Sci. Techn., J. Mater. Sci. Based on Dr. Turova’s longstanding teaching experience in inorganic chemistry to students and postgraduates she wrote the reference- and schoolbook “Inorganic Chemistry in Tables” by which she aimed to simplify for the reader the searching of information scattered among handbooks, monographs or articles and making logical connections between separate binding classes, methods of their synthesis and further transformations. In the last 30 years the “Tables” were regularly reissued in Russia, were published in Japan (Kodansha Ltd., 1981) and are successfully used by students, postgraduates, lecturers and researchers of various specialties. In 2009 she prepared an abridged version of the “Tables” provided for schools of profound learning chemistry. • Introduction Pages 2-4 Turova, Dr. Nataliya • Abbreviation Pages 5-5 Turova, Dr. Nataliya • Halogens, Astatine Pages 6-11 Turova, Dr. Nataliya • Manganese Pages 12-13 Turova, Dr. Nataliya • Technetium, Rhenium Pages 14-15 Turova, Dr. Nataliya eBook $54.99 price for USA in USD • ISBN 978-3-642-20487-6 • Digitally watermarked, DRM-free • Included format: PDF • ebooks can be used on all reading devices • Immediate eBook download after purchase Softcover$69.99 price for USA in USD ## Bibliographic Information Bibliographic Information Book Title Inorganic Chemistry in Tables Authors 2011 Publisher Springer-Verlag Berlin Heidelberg Springer-Verlag Berlin Heidelberg eBook ISBN 978-3-642-20487-6 DOI 10.1007/978-3-642-20487-6 Softcover ISBN 978-3-642-20486-9 Edition Number 1 Number of Pages IV, 157 Number of Illustrations 44 b/w illustrations, 110 illustrations in colour
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.17708630859851837, "perplexity": 8605.195702319224}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141195656.78/warc/CC-MAIN-20201128125557-20201128155557-00327.warc.gz"}
http://manualzilla.com/doc/7391860/epson-priorityfax-3000-user-s-manual
• Home • Explore # Epson PriorityFAX 3000 Users manual Download Transcript ActFax Server User’s Manual 8th Extended Edition ActFax Communication-Software GmbH http://www.actfax.com [email protected] Remark This product or parts of it are only allowed to be used or reproduced according to the terms of the license agreement. Every other use of the software is not permitted. No parts of this manual are allowed to be reproduced, transferred, translated or stored on other media without the written declaration of consent of ActFax Communication. Changes of the content of this manual are reserved. The contents of this manual do not give a claim of any kind. According to the law, it is allowed to create a backup copy of the software for archiving purposes. Every other copy of the software – regardless of the purpose – is not permitted and will be prosecuted by law. Microsoft® and Windows® are registered trademarks of the Microsoft Corporation. UNIX® is a registered trademark of the American Telephone and Telegraph Company. Pentium® is a registered trademark of the Intel Corporation. Hewlett-Packard® is a registered trademark of the Hewlett-Packard Company. ZyXEL™ is a registered trademark of the ZyXEL Communication Corporation. The use of any trademark that is not explicitly named here, does not claim the right for free use of it. Part. No. 2511-S02-E ActFax User’s Manual 2 INSTALLATION. YOU ARE ONLY AUTHORIZED TO USE THE SOFTWARE WHEN YOU AGREE WITH THE TERMS OF THE FOLLOWING LICENSE AGREEMENT. BY USING THE SOFTWARE YOU PROFESS TO THE TERMS OF THAT AGREEMENT. IF YOU DO NOT AGREE WITH THAT LICENSE AGREEMENT YOU EITHER HAVE TO REMOVE THE SOFTWARE FROM YOUR HARD DISK OR YOU HAVE TO RETURN THE COMPLETE SOFTWARE AND GET BACK THE MONEY. By paying the license fee the licensee is granted the right to use the software under the following conditions: USE: It is only allowed to use the software on the number of computers that is named in the license agreement. It is not allowed to reassemble or recompile the software, except it is explicit allowed by law. COPIES AND MODIFICATIONS: It is allowed to make copies of the software for archive purposes or when it is necessary to transfer the software to another computer. It is not allowed to make copies of the software for any other purposes. OWNERSHIP: You agree that you have no rights on the software except the right for using the programs as defined in that agreement and the physical media. You know and accept that the software is protected by copyright laws. When you violate this law you can be made liable by the manufacturer. ASSIGNMENT OF RIGHTS: You are allowed to transfer the right of using the software to others when the terms of this agreement are accepted. When you transfer the right for using that software you are no longer allowed to use the software. SUBLICENSES: You are not allowed to borrow the software to others or distribute copies of the software. If you plan to redistribute or modify the software you need the assent of the manufacturer. EXPIRATION OF THIS AGREEMENT: When you violate this software license agreement the manufacturer can request the customer to undo that defamation of the agreement. When the customer is not following that request within 30 days the manufacturer can revoke the right for using the software. UPDATES AND ENHANCEMENTS: The customer accepts that there is no right for updates and enhancements that the manufacturer offers at a later time. SOFTWARE WARRANTY WARRANTY PERIOD: The manufacturer guaranties for the time of 6 months that the software will work in a manner that the main use of the software is not impaired. This warranty is only valid if you have installed all of the program files correctly. From the current position it is not possible to guaranty that the software is absolutely free of errors. If the software does not work in the desired manner within that warranty period you can ask for replacement or reparation. If it is not possible for the manufacturer to repair the error within a appropriate time the customer can cancel the contract with full return of the money. MEDIA: The manufacturer guaranties for the time of 6 months that the enclosed media are free of material faults. If you detect errors on the media within the warranty period you can order a replacement media from the manufacturer. If it is not possible for the manufacturer to replace the media within a appropriate time the customer can cancel the contract with full return of the money. ActFax User’s Manual 3 CLAIM OF WARRANTY: You have to inform the manufacturer at least 30 days after the end of the warranty period to report your claim of warranty. LIMITATIONS IN WARRANTY: There is no warranty that exceeds the above listed terms of warranty. There are no other agreements of any kind. The warranty period is limited to 6 months except otherwise defined by law. INDEMNIFICATION AND EXCLUSION OF LIABILITY: THERE IS NO RIGHT OF INDEMNIFICATION OF ANY KIND AGAINST THE MANUFACURER OR ANY OF ITS DISTRIBUTION PARTNERS REGARDLESS OF THE REASONS. This license agreement and the warranty terms only define the conditions between the manufacturer and the customer. Other agreements or warranty terms that are part of the package of other distributors are not practicable. ActFax User’s Manual 4 1. Introduction 10 1.1. ActFax vs. ActiveFax .................................................................................. 10 1.2. Using the Manual ...................................................................................... 10 1.2.1. Help System ........................................................................................................... 10 1.2.2. Information Symbols .............................................................................................. 11 1.3. What is ActiveFax? .................................................................................... 11 1.4. System Requirements................................................................................ 11 1.4.1. System Requirements Fax Server .......................................................................... 12 1.4.2. System Requirements Fax Client ........................................................................... 12 1.5. Software Concept ...................................................................................... 12 1.5.1. Outgoing Faxes (Sending) ...................................................................................... 13 1.5.2. Outgoing E-Mails .................................................................................................... 14 1.5.3. Incoming Faxes (Receiving) .................................................................................... 14 1.5.4. Fax-On-Demand ..................................................................................................... 14 1.6. Screen Description .................................................................................... 15 2. ActiveFax Installation 17 2.1. Program Overview ..................................................................................... 17 2.2. Running the Setup ..................................................................................... 18 2.3. Customizing Program Settings ................................................................... 21 2.4. Establishing a Client Connection ................................................................ 21 3. How to ... 23 3.1. Create a New Fax Message ........................................................................ 23 3.1.1. Faxing from Windows Applications ....................................................................... 23 3.1.2. Instant Fax Messages ............................................................................................. 24 3.1.3. File System ............................................................................................................. 25 3.1.4. Named Pipes .......................................................................................................... 25 3.1.4.1. Example in Programming Language C ................................................................................ 26 3.2. Access Fax Messages on other Computers ................................................ 28 3.2.1. Fax Client Installation ............................................................................................. 28 3.2.2. Establishing a Client Connection ............................................................................ 28 3.3. Send Fax Messages from UNIX / Linux ....................................................... 30 ActFax User’s Manual 5 3.3.1. Configuring LPD/LPR Printers in UNIX.................................................................... 30 3.3.1.1. IBM RS/6000 (AIX) .............................................................................................................. 30 3.3.1.2. HP-9000 (HP/UX) ................................................................................................................ 30 3.3.1.3. Other UNIX Systems ........................................................................................................... 30 3.3.2. Sending Fax Messages with LPD/LPR ..................................................................... 31 3.3.3. Alternatives to LPD/LPR ......................................................................................... 31 3.3.3.1. FTP, TFTP and RAW Sockets ............................................................................................... 31 3.3.3.2. Serial Connection (RS-232) ................................................................................................. 31 3.3.3.3. File System (NFS, Samba) ................................................................................................... 31 3.3.3.4. Printer Commands (HP-LaserJet PCL, Epson-LQ, Postscript, PDF) ...................................... 32 3.3.3.5. Data Fields .......................................................................................................................... 32 3.4. Enter valid Fax Numbers ............................................................................ 33 3.4.1. Examples for valid fax numbers ............................................................................. 33 3.5. Adjust the Screen View.............................................................................. 34 3.6. Change the Faxlist Columns ....................................................................... 35 3.6.1. Columns ................................................................................................................. 35 3.6.2. Colors ..................................................................................................................... 35 3.7. Select an Entry in the Faxlist ...................................................................... 37 3.7.1. Selecting Entries ..................................................................................................... 37 3.7.2. Sorting Entries ........................................................................................................ 37 3.7.3. Searching for Entries .............................................................................................. 37 3.8. Automatically Redial failed Fax Transmissions........................................... 39 3.8.1. Automatic Redialing ............................................................................................... 39 3.8.2. Send a Fax Message again ..................................................................................... 39 3.9. Automatically Print Fax Messages ............................................................. 41 3.9.1. Sending Report ....................................................................................................... 41 3.9.2. Compressed Printing .............................................................................................. 41 3.9.3. General Settings ..................................................................................................... 42 3.9.4. User-dependent Settings ....................................................................................... 42 3.10. Protect Faxes against Unauthorized Access ............................................. 44 3.10.2. Security Settings................................................................................................... 44 3.11. Block Fax Numbers (Blacklist) .................................................................. 46 3.11.1. Block Outgoing Fax Calls ...................................................................................... 46 3.11.2. Block Incoming Fax Calls ...................................................................................... 46 3.12. Use the Fax-On-Demand Server .............................................................. 48 3.12.1. Fax Polling ............................................................................................................ 48 3.12.2. Creating Fax-On-Demand Documents ................................................................. 48 3.13. Move Fax Messages to the Archive ......................................................... 50 3.13.1. Automatic Archive................................................................................................ 50 ActFax User’s Manual 6 3.13.2. Manual Archive .................................................................................................... 51 3.13.3. Individual Archive Folders .................................................................................... 51 3.14. Use Multiple Fax Servers ......................................................................... 52 3.14.1. Configure Fax Clients ........................................................................................... 52 3.14.2. Add ActiveFax Printers ......................................................................................... 53 3.14.3. Configure ActiveFax Printers................................................................................ 53 3.15. Create a Cover Page or Overlay ............................................................... 55 3.15.1. What is a Cover Page / Overlay? .......................................................................... 55 3.15.2. Creating Cover Pages / Overlays .......................................................................... 55 3.15.3. Using Cover Pages / Overlays............................................................................... 56 3.15.4. Using Color Images............................................................................................... 56 4. Configuration 58 4.1.1. User Permissions .................................................................................................... 59 4.1.2. Alias Names ............................................................................................................ 60 4.1.3. Predefined Settings ................................................................................................ 60 4.1.4. Automatic Printing ................................................................................................. 61 4.1.6. Fax Forwarding ....................................................................................................... 62 4.1.7. Archive (Export) ..................................................................................................... 63 4.1.8. Group of Users ....................................................................................................... 64 4.1.8.1. Passive Group Members ..................................................................................................... 64 4.1.10. Routing of Inbound Fax Messages ....................................................................... 65 4.1.10.1. Routing using Direct Dial Numbers (MSN, DDI, DID, DTMF) ............................................ 65 4.1.10.2. Routing using CSID (Sender Identification) ....................................................................... 66 4.1.10.3. Routing using Modem ...................................................................................................... 67 4.1.10.4. Manual Routing ................................................................................................................ 67 4.1.10.5. Order of Routing Methods ............................................................................................... 68 4.2. Phone Book ............................................................................................... 69 4.2.1. Importing the Phone Book ..................................................................................... 70 4.2.1.1. Import from ASCII File ........................................................................................................ 70 4.2.1.2. Import from ODBC Database .............................................................................................. 71 4.2.2. Exporting the Phone Book ..................................................................................... 71 4.3. Transmission Protocol ............................................................................... 72 4.3.1. Printing the Transmission Protocol ........................................................................ 72 4.3.1.1. Layout ................................................................................................................................. 73 4.3.1.2. Automatic Printing.............................................................................................................. 73 4.3.1.3. Sending Report ................................................................................................................... 73 4.3.2. Exporting the Transmission Protocol ..................................................................... 73 4.3.3. Archiving the Transmission Protocol ..................................................................... 74 ActFax User’s Manual 7 4.4. Charge Optimization.................................................................................. 75 4.4.1. Delayed Transmissions ........................................................................................... 75 4.4.2. Time Limitation ...................................................................................................... 76 4.4.3. Least Cost Routing.................................................................................................. 77 4.5. Modem & ISDN.......................................................................................... 78 4.5.1. Voice over IP (VoIP / T.38) ..................................................................................... 78 4.5.3. Modem Configuration ............................................................................................ 79 4.5.4. Modem Status ........................................................................................................ 81 4.6. E-Mail ........................................................................................................ 82 4.6.1. SMTP Server (Mail Server) Configuration .............................................................. 82 4.6.2. Mail Server Authentication .................................................................................... 83 4.6.3. E-Mail Options........................................................................................................ 83 4.7. ODBC Database ......................................................................................... 85 4.7.1. Selecting a Data Source.......................................................................................... 85 4.7.2. Importing the Phone Book ..................................................................................... 86 4.7.3. Exporting the Transmission Protocol ..................................................................... 87 4.8. Cost Account Manager .............................................................................. 89 4.8.1. Create Cost Account Codes .................................................................................... 89 4.8.2. Select Cost Account Codes ..................................................................................... 89 4.9. Network Scanners ..................................................................................... 91 4.9.1. Installation ............................................................................................................. 91 4.10. External Configuration File options.cfg .................................................... 92 5. Data Fields 93 5.1. Why do I need Data Fields? ....................................................................... 93 5.2. Syntax of Data Fields ................................................................................. 93 5.2.1. Masking Data Fields ............................................................................................... 93 5.3. Overview of the Data Fields....................................................................... 93 5.3.1. Sender Fields .......................................................................................................... 94 5.3.2. Recipient Fields ...................................................................................................... 94 5.3.3. Common Fields....................................................................................................... 95 5.3.4. Special Data Fields ................................................................................................. 98 5.4. Examples for Data Fields ........................................................................... 98 5.5. Embedding Bitmaps into Fax Messages ..................................................... 99 5.6. Embedding Data Fields into Applications................................................. 100 5.6.1. Windows Applications.......................................................................................... 100 ActFax User’s Manual 8 5.6.1.1. Reference File for Data Fields ........................................................................................... 101 5.6.1.2. Split Print Jobs (Mail Merge Documents) ......................................................................... 102 5.6.1.3. Example in Programming Language C .............................................................................. 102 5.6.2. UNIX, Linux and other Operating Systems ........................................................... 102 5.6.2.1. Example in Programming Language C .............................................................................. 103 5.6.2.2. Example in Programming Language INFORMIX 4GL ......................................................... 103 104 6.3. Fax Client Updates ................................................................................... 105 6.4. Update Period ......................................................................................... 105 7. Appendix 106 7.1. Glossary ................................................................................................... 106 7.2. Keyboard Hotkeys ................................................................................... 110 7.3. Frequently Asked Questions - FAQ .......................................................... 111 7.4. Problem Solutions ................................................................................... 113 7.5. Sample Applications ................................................................................ 115 7.5.1. Windows Application (WinApp.exe) .................................................................... 115 7.5.1.1. Program Summary ............................................................................................................ 115 7.5.1.2. Source Code ...................................................................................................................... 116 7.5.2. Socket Application (Socket.exe) ........................................................................... 118 7.5.2.1. Program Summary ............................................................................................................ 119 7.5.2.2. Source Code ...................................................................................................................... 119 7.6. Index ....................................................................................................... 121 ActFax User’s Manual 9 1. Introduction 1.1. ActFax vs. ActiveFax The terms “ActFax” and “ActiveFax” are used synonymously in this manual and also in the software itself. Both terms refer exactly to the same software. The reason why the software is known under ActFax and under ActiveFax is due to historical reasons. To preserve highest backward compatibility with existing installations, no adjustments to the names have been made in the software. Whenever this manual or the software refers to ActFax or ActiveFax, the same software product is addressed. 1.2. Using the Manual This manual describes how to install, configure and use ActiveFax. The topics of the manual are subdivided into different chapters. The first two chapters give an overview of the program features and the installation of the software. The other chapters contain information about the configuration of the software and a description of routine tasks. The addendum at the end of the manual includes the glossary, an overview of useful keyboard shortcuts, the frequently asked questions (FAQ), a troubleshooting guide, sample applications and the index. 1.2.1. Help System In addition to the contents of this manual, further help and information can also be found in ActiveFax’ help system. Using the context sensitive online help of ActiveFax, detailed information is available for all functions and program options. The help system can be activated either with the menu option Help / Contents and Index or with the Help button. ActFax User’s Manual 10 1.2.2. Information Symbols This manual uses graphical symbols to direct your attention to important text sections. These symbols are used to highlight cross references to additional information about specific topics, critical settings or other notes referring to a previously discussed topic. The “Information” symbol is used to direct your attention to additional information of the same topic. This symbol is also used to highlight useful tips simplifying daily work. The “Attention” symbol is used to direct your attention to common misunderstandings, error sources and critical settings. The “Stop” symbol is used to direct your attention to very critical settings that might cause loss of data. 1.3. What is ActiveFax? ActiveFax is one of the most powerful network fax solutions currently on the market. The ActiveFax software enables you to manage all your fax documents with just a few mouse clicks, without complicated and extensive administration work. Messages can be transmitted either by fax or as an email. The sophisticated user and security concept guarantees straightforward all fax messages is available from any workplace through the fax client program. Of course ActiveFax also supports all features and functions you can expected from a state-ofthe-art network fax solution, like detailed transmission protocols, global and private phone books, cover pages and overlays, as well as automatic transmission time optimization, least cost routing and inbound fax routing. Furthermore, ActiveFax can also be used as a fax-ondemand server. In addition to creating fax messages with any Windows application, ActiveFax can also be used to generate faxes from non-Windows operating systems like UNIX or Linux. The support of the network printer protocol LPD/LPR and printer commands of HP-LaserJet (PCL), Epson-LQ and Postscript as well as PDF guarantees simple and quick integration of fax and email services in UNIX and in Linux environments. 1.4. System Requirements When running ActiveFax, it is recommended to use a system with at least the following minimum requirements: The operating system can be Windows XP / 2003 / Vista / 2008 / 7 / 2012 / 8 / 10 (32-bit or 64-bit). You also need a fax modem, an ISDN adapter or a fax board from Brooktrout or Intel/Dialogic. To use the software on multiple computers, there also needs to be a TCP/IP network connection (LAN) available. The server computer should be at least an ActFax User’s Manual 11 Intel® Pentium model with 300 MHz and 256 MB RAM. The display adapter should be configured to a resolution of at least 1024x768 and 64k colors. Keep in mind, that these values are just approximate values. ActiveFax can also be installed on hardware equipment that does not meet these requirements; however performance of the software decreases significantly then. 1.4.1. System Requirements Fax Server Resource Minimum Recommended Requirement Requirement Processor (CPU) Working Memory (RAM) Available Disk Space Operating System Intel® Pentium/ 300 MHz 128 MB 100 MB 800x600, 256 colors Windows XP / SP3 Network TCP/IP or NetBeui Intel® i3 / 1 GHz 512 MB 1000 MB 1024x768, 16M colors Windows 2003 / 2008 / 7 / 2012 / 8 / 10 (32-bit or 64-bit) TCP/IP 1.4.2. System Requirements Fax Client Resource Minimum Recommended Requirement Requirement Processor (CPU) Working Memory (RAM) Available Disk Space Operating System Intel® Pentium/ 300 MHz 64 MB 20 MB 800x600, 256 colors Windows XP / SP3 Network TCP/IP or NetBeui Intel® i3 / 1 GHz 256 MB 100 MB 1024x768, 16M colors Windows XP / 2003 / Vista / 2008 / 7 / 2012 / 8 / 10 (32-bit or 64-bit) TCP/IP 1.5. Software Concept The primary idea behind ActiveFax is making all tasks as automated as possible. This has been consequently implemented in all parts of the software. The automation already starts at the installation of the software. According to the slogan “unboxing and starting”, all hardware connected to the system is fully automatically detected and configured. Thus there is almost no need for administrative work. To ensure high flexibility, all parts of the software can be individually configured to meet your requirements and preferences. The core part of ActiveFax is the fax server. The fax server stores and manages all fax and email messages and controls all communication tasks (communication to the outside world through modems, ISDN adapters and fax boards and internal communication through the LAN). The fax client component of ActiveFax is used to access the fax documents from any computer in ActFax User’s Manual 12 the network. The fax services provided by ActiveFax can be subdivided into three main categories: Outgoing fax messages (sending), incoming fax messages (receiving) and fax-on-demand (fax polling). 1.5.1. Outgoing Faxes (Sending) Outgoing fax documents can be created in various ways with ActiveFax. The easiest way to create a new fax messages is printing a document from a Windows application (i.e. Microsoft® Word). ActiveFax also supports a large number of communication services, so fax messages can also be created from UNIX, Linux and other non-Windows operating systems. Especially when using UNIX or Linux, the LPD/LPR printer service can be used to create new fax messages; with LPD/LPR, ActiveFax is accessed exactly the same way as every other physical printer in the network. Especially when sending fax messages from own (self-programmed) applications (i.e. ERP programs) the fax parameters (recipient, subject, priority, ...) can already be defined inside the application. That way, the fax transmission can be done fully automatically without user interaction (the user does not need to enter the recipient of the fax message twice in that case). When using that way of server connection, the fax parameters are transmitted to the fax server through data fields. Since data fields are embedded directly into the fax document, there is no need to deal with complex programming techniques like DDE (you just add the parameters the same way as normal text directly to the document). The transmission of pending fax documents is fully automatically processed by the fax server. Depending on the preferred transmission time and the priority of the fax messages, documents will be transmitted according to their chronological order. Fax messages for unreacha- ActFax User’s Manual 13 ble recipients (i.e. because of a busy line) will be automatically repeated periodically. The period between the redial attempts can be individually configured. If a fax message cannot be delivered within a pre-configured number of attempts, the message will be marked as “undeliverable”. Such fax messages are listed separately by ActiveFax. Furthermore, the permission for the individual users can also be configured to request sending clearance from an authorized user to start transmission of outgoing fax messages. 1.5.2. Outgoing E-Mails Transmission of emails is done exactly the same way as sending fax messages. The only difference is that you have to enter the email address of the recipient instead of the fax number. Depending on the configuration of the fax server, ActiveFax tries to convert documents to text format whenever possible to send the message directly in the body of the email. If the conversion to text format cannot be done, the document is sent as an email attachment in PDF, TIFF or GIF format. Delivery of the emails through the Internet is done fully automatically through a direct connection to an SMTP server (mail server) or a dialup connection with RAS (Remote Access Service). 1.5.3. Incoming Faxes (Receiving) One of the main advantages of a fax server is the capability of routing inbound fax messages to individual users. ActiveFax supports different methods of inbound fax routing. The most reliable method is using a dedicated direct dial number for each user. That way fax messages can be sent directly to individual users; the number of misrouted messages normally tends to zero with that type of routing. Due to technical reasons, direct dial numbers are only available when using an ISDN adapter or a DID (Direct Inward Dialing) capable modem or fax board. Another way of inbound fax routing is CSID routing (sender identification). When using that routing method, a phone book entry with the senders fax number (CSID) is mapped to a specific user. Inbound fax routing can also be done based on the modem (fax number) a fax is received on. When using that method, specific user entries are mapped to the available modems (fax numbers). Notification of new fax messages can be done in multiple ways. When using the fax client, the receipt of new fax messages can be signaled with a popup window automatically displayed on the client computer. As an alternative it is also possible to automatically print incoming fax messages. The automatic printing function can be configured to use an individual printer for each user, so it would be possible to print inbound fax messages directly on a user’s workplace printer. To save paper and costs it is also possible to print fax messages in compressed format. That way, multiple pages of a fax messages will be scaled down and printed on a single sheet of paper. What would also be possible is to automatically forward fax messages by email or to automatically export the faxes to a predefined directory. When forwarding faxes to multiple email addresses, separate the email addresses with a semicolon. 1.5.4. Fax-On-Demand ActiveFax also includes a fax-on-demand server. “Fax-On-Demand” means, that documents are made available to be requested from other fax machines. That way, different types of ActFax User’s Manual 14 documents (i.e. price lists, data sheets, ....) can be made accessible to a large number of people. A fax-on-demand document is either mapped to a specific fax modem (fax number) or when using an ISDN adapter to a direct dial number. The steps required to create fax-on-demand documents are exactly the same as for creating normal fax messages. Beside the function of using ActiveFax as a fax-on-demand server, the software can also be used to request documents from other fax-on-demand systems. This means that ActiveFax can be used to receive a fax document by calling the number of a different fax-on-demand system. 1.6. Screen Description  The Faxlist contains a list of all fax messages stored on the system. By selecting an entry of the faxlist, the selected fax message is automatically loaded and displayed. By doubleclicking or using the Faxlist menu, the settings of a faxlist entry can be displayed and modified. The Fax Selection Window is used to select the type of fax message that should be displayed in the faxlist. The fax selection window also includes the recycle bin and the archive. The User Selection Window is used to select the user or group that should be displayed in the faxlist. ActFax User’s Manual 15 The Communication Window displays the status of all communication services controlled by ActiveFax. With a mouse double-click or with the Communication menu, the settings for the individual communication services can be configured. The Fax Window displays the fax message currently selected in the faxlist. The zoom factor of the fax message can be changed with the left and right mouse button or with the zoom field of the toolbar. The number of fax pages displayed in the fax window can be changed with the menu View / View Properties. The Page Selection Window is used to change between the pages of a multi-page fax message. The Toolbar contains buttons for important and frequently used functions for fast and The Status Line displays the date and time as well as other status information of the fax software. ActFax User’s Manual 16 2. ActiveFax Installation 2.1. Program Overview ActiveFax mainly consists of two components, the fax server and the fax client program. The installation of the fax server needs to be done only once on a single computer; all other computers in the network have the fax client installed to automatically load fax documents directly from the fax server. The fax client needs to be installed on all computers in the network that should be able to create or access fax messages. It is recommended to install the fax server part of ActiveFax on a powerful system designed for server operation. Especially when using delayed fax transmissions you should also take care that the fax server computer is running 24 hours, 7 days a week and that the computer is not turned off during night hours. The above sample configuration shows a typical ActiveFax installation. This configuration contains the fax server as the core part of the faxing system, several fax clients and a UNIX server that has been integrated using the network protocol LPD/LPR. Documents on paper are scanned and submitted to the fax server with the HP Digital Sender network scanner. ActFax User’s Manual 17 2.2. Running the Setup Before you start with the installation of ActiveFax, you should define which computers in the network should have the fax client software installed and which computer should be used for the installation of the fax server software. ActiveFax is available in a 32-bit and in a 64bit version. If the installation is done on a 64bit Windows system, it is recommended to use the 64-bit version of ActiveFax for the installation. If it is required to communicate with other 32-bit programs (i.e. Microsoft® Exchange or Outlook) from within the fax server or fax client, you need to use the 32-bit ActiveFax version also for installations on 64bit Windows systems. You can mix any combination of 32-bit and 64-bit ActiveFax installations throughout the network. It is recommended to install the fax server first. After the installation of the fax server has been successfully completed install the fax clients. To execute the installation of ActiveFax, 1) Insert the program CD into the CD-ROM drive and start the Setup program or run actfax_setup_en.exe (32-bit version) or actfax_setup_x64_en.exe (64-bit version). Please note that most PCs automatically instructions of the Setup program that guides you through the installation procedure. 2) Choose the directory for the installation of the software. The default directory for the installation is the default Windows program directory (C:\Program Files\ActiveFax). The “Search” button can be used to change the target directory or drive for the installation. ActFax User’s Manual 18 3) Choose the installation procedure now. You can select between a complete installation (server and client), a server-only installation or a client-only installation. Take care that the fax server is normally only installed on a single computer in the network. If the fax server has already been installed, you typically choose a client installation here. 4) Select the program components that should be installed. According to the previously selected installation procedure, the correct settings are already preset here. Make sure there is enough disk space available on the installation drive. 5) Choose the program group that should be used to create the program icons. 6) Enter the name of the licensee and the license key. If you do not yet have a valid 00000-00000-00000-00000 to register a fully functioning demo version of ActiveFax. There are no restrictions or limitations in program features when you register a demo version of ActiveFax, but there is a “Demoversion” watermark printed on the faxes. 7) Specify if the fax server (or fax client) should be automatically started during system startup. It is strongly recommended to automatically start the fax server; the fax server is started as a service in that case and is running right after the computer has been booted, also when no user is logged on to the system. 8) Turn on all modems connected to the system and start the fax server. ActiveFax now scans the system for available fax modems, fax boards and ISDN adapters and configures them. 9) Enter your name (company name) and fax number and your area code. This information is displayed in the header of the ActFax User’s Manual 19 fax messages. If you plan to also send prefix needed for outgoing calls, specify the dial prefix in the next step. Especially when using phone systems (PBX), you normally have to specify a dial prefix to get an outside line. After the setup program has been finished, ActiveFax is completely installed and ready for a first test fax message. To create a test fax, just start any Windows application (i.e. Microsoft® Word or WordPad) and print a document to the ActiveFax printer. When the fax dialog window appears, enter the fax number of the recipient (light-blue input field) and confirm the fax with “OK”. The fax message is now automatically transmitted by the fax server as soon as a modem becomes available. For an automatic installation of ActiveFax it is also possible to run the setup with command line parameters. A complete list of all command line parameters can be displayed when you running the setup with command line parameters can also be found in the ActiveFax Knowledge Base at http://www.actfax.com/en/kbase.html?id=6822. Please note that it is not required to restart the computer after the installation of ActiveFax. All configuration settings are already active right after the setup program has been finished. When using Brooktrout fax boards (i.e. TR114, TR1034 or Trufax) you should install the drivers for the fax board before doing the installation of the fax server. Because Brooktrout does not directly provide drivers for their fax boards, drivers for Brooktrout fax boards are available at ActFax User’s Manual 20 2.3. Customizing Program Settings Most settings and parameters of the fax server are already initialized by the setup program with default values. These default values reflect the most common settings that normally do not need to be changed. However if you need to change some settings of the fax server, this can be done with the relating menu options directly on the fax server. The table below shows a listing of the most common settings: Setting Modem Configuration Email Configuration Users and Groups Access Rights Default Sender Fax Resolution Archive Settings Automatic Printing Fax Title Next Fax ID Number Automatic Startup Communication / Modem Communication / E-Mail Extras / Security Settings Extras / Predefined Settings Extras / Options / Modem Extras / Options / Archive Extras / Options / Printing Extras / Options / Fax Title Extras / Options / General File / Automatic Startup Please note that the above table is only a short summary of the most common configuration settings of ActiveFax. A detailed description of all settings can be found in the related chapters 2.4. Establishing a Client Connection When the fax client (or ActiveFax printer driver) is started for the first time, it tries to find the fax server in the network to establish a connection. ActiveFax supports three different ways the client can connect to the fax server. Normally the connection between the fax server and the fax client is done through one of the network protocols TCP/IP or NetBeui (Windows Network). If the fax server and fax client are installed on the same computer, it is also possible to use a direct connection (without network). Since the fax client automatically scans the network for all available fax servers, there is no need to recall network or IP addresses. The first fax server found by the automatic detection will be displayed and used as the default server. ActFax User’s Manual 21 The IP address of the fax server can also be set directly at the installation of the fax client when you run the setup with the command line parameter -IP:IP address. Example: actfax_setup_en.exe -Client -IP:192.168.0.1 ActFax User’s Manual 22 3. How to ... 3.1. Create a New Fax Message New fax messages can be created in various ways with ActiveFax. The easiest and most common way to create new fax messages is the printing function of a Windows application. As an alternative it would also be possible to create “Instant Fax Messages” with ActiveFax. Instant fax messages are used for short messages with just a few lines of text. With Named Pipes or RAW Sockets it is possible to create fax messages without using the Windows printer driver (no GDI interface). That way, fax messages can be created directly from inside an application without using the Windows printing subsystem. 3.1.1. Faxing from Windows Applications  Start the Windows application that should be used to create the fax message (i.e. Microsoft® Word).  Select the printing function of the application and print the document to the ActiveFax printer.  A dialog box appears. Enter the fax number of the recipient (light blue input field) there.  Confirm the fax with OK. After the document has been “printed” that way, it is automatically transferred to the fax server. Depending on the preferred transmission time and priority, the fax message is then automatically transmitted as soon as a modem becomes available. ActFax User’s Manual 23 3.1.2. Instant Fax Messages Fax messages often only contain just a few lines of text. If you do not want to create a Word document for such small messages, it is also possible to create the fax as an instant fax messages directly within the fax client program. An instant fax message is built by an optional cover page and the text of the fax message. It is not recommended to use instant fax messages for faxes larger than a single page or for faxes that require complex formatting of the text. In such cases, it is recommended to write the message with traditional text processing software and to print the document to the ActiveFax printer. Formatting limitations of instant fax messages only allow the same font to be used for the complete message. A preview window shows the appearance of the fax message in minimized view. To create a new instant fax message, follow these steps:      Choose the menu option File / New Instant Fax Message. Optionally select a cover page. Write the text of the fax message. Specify the recipient of the fax message. Confirm the fax with OK. The main advantage of instant fax messages is that it is possible to subsequently modify the text of the message through the fax dialog window. That way it is not required to create a completely new document when you encounter spelling mistakes after the fax has been created. ActFax User’s Manual 24 3.1.3. File System Another powerful method of sending fax jobs to ActiveFax is the file system method. Using that method, the files to be faxed just need to be stored in a predefined directory. ActiveFax automatically scans this directory for new fax jobs and imports them for further processing. When using the file system method, it is also possible to use data fields directly as part of the file name, which makes it very simple to set the recipients fax number. The file system method can be configured with the menu Communication / File System on the fax server. Sample File Name: C:\Import\Fax\[email protected] Duncan [email protected]@F211 [email protected] When importing files from a network share, take care to always use the complete UNC path for the network share (i.e. \\server\share). Do not use mapped drive letters, since mapped drive letters are normally not visible to processes running as a service. If you need to use special characters not allowed in a file name (i.e. * or ?) as part of the data fields used in the file name, it would be possible to code such characters with a % sign, followed by the ASCII code of the character in hexadecimal format (i.e. * can be coded as %2A). 3.1.4. Named Pipes When using “Named Pipes” it is possible to easily create fax messages directly from within applications without using the ActiveFax printer driver. When not using the ActiveFax printer driver, the main difference is, that the fax message is sent in plain text format in that case. Quite similar to fax transmissions from UNIX or Linux systems, printer commands of HP-LaserJet (PCL), Epson-LQ and optionally Postscript and PDF can be used to format the document. ActFax User’s Manual 25 Data fields can be added the same way as printer commands; they are written directly to the document. Named Pipes can be used as an alternative when you do not want to work with the Windows graphic subsystem (GDI). Take care that Named Pipes are only available on fax servers running on Windows XP / 2003 / Vista / 2008 / 7 / 2012 / 8 / 10 systems. To use Named Pipes, just a few small modifications have to be done in your application. Follow these steps to integrate the communication through Named Pipes with your application:  The Named Pipe needs to be configured on the fax server. To do so, choose the menu option Communication / RAW Server and create a new entry for a NetBeui connection. The name of the Named Pipe can be individually chosen (the default pipe name is “ActiveFax”).  Open the Named Pipe with writing permission in your application. This can be done with normal API file functions. The file name is built in the format “\\servername\pipe\pipename” (i.e. \\faxserver\pipe\activefax). To open a Named Pipe, use the API function call CreateHandle() or any corresponding function of your programming language.  Send the fax message directly to the previously opened file. You can use the API function call WriteFile() or any corresponding function of your programming language to write the data to the file. It is also possible to use printer commands and data fields in that case.  Close the Named Pipe with the API function call CloseHandle() or any corresponding function of your programming language. By closing the file (Named Pipe), the fax server automatically gets a signal that the fax message has been finished and can be transmitted. The function calls for opening, writing and closing files (Named Pipes) may be known under tool (i.e. Visual-C, Visual Basic, Delphi, Power Builder, ...). 3.1.4.1. Example in Programming Language C #include <windows.h> HANDLE DWORD BYTE BYTE DWORD hFile; dwError; szText[1024]; szFax[128]; dwWritten; int main(void) { hFile = CreateFile("\\\\faxserver\\pipe\\activefax", NULL, OPEN_EXISTING, 0, NULL); if (hFile == INVALID_HANDLE_VALUE) { dwError = GetLastError(); return 1; ActFax User’s Manual 26 } lstrcpy(szFax, "555-123-4567"); wsprintf(szText, "This is a [email protected] %[email protected]", szFax); WriteFile(hFile, szText, lstrlen(szText), &dwWritten, NULL); CloseHandle(hFile); return 0; } ActFax User’s Manual 27 3.2. Access Fax Messages on other Computers The fax client can be used to display and access fax messages from other computers in the network. Through a network connection to the fax server, access to all fax messages is available from any computer in the network with the fax client program installed. 3.2.1. Fax Client Installation The fax client needs be installed on every computer that should be used to display, create or control fax messages. The installation of the fax client is done with the same setup program as the installation of the fax server. When running the setup, take care to choose the option for a Client Installation, since a complete installation takes more disk space as required and the fax server part of ActiveFax should not be installed on client systems. 3.2.2. Establishing a Client Connection The first time the fax client is started the network is automatically scanned for all available fax servers. After the scan completed you can choose the preferred fax server from the list (normally there is only a single fax server in a network). When using a router for the network connection of the fax client, it could happen that the fax server cannot be automatically detected by the fax client because of blocked broadcast packages used to identify the fax server in the network. In that case you have to manually enter the IP address or hostname of the fax server. The connection between the fax server and the fax client is established with one of the network protocols TCP/IP or NetBeui (Windows Network). Take care that connections with NetBeui are only possible when the fax server has been installed on Windows a XP / 2003 / Vista / 2008 / 7 / 2012 / 8 / 10 system. If you have both of these network protocols available, it is recommended to always use the TCP/IP protocol, since TCP/IP requires less resources and is a bit faster compared to NetBeui. ActFax User’s Manual 28 Please note that the connection settings can be subsequently changed with the menu option Communication / Network Settings. The update of the data on the fax client is done automatically. Whenever the configuration of the fax server changes or when a fax message is created or modified, the data on the fax client is automatically refreshed on all client computers in the network. All clients have the same data set at any time that way. Take care that the total number of fax clients allowed to connect to the fax server is limited by the license. If you exceed the number of users registered with the license, a message is displayed on the fax client that exceeds the license limit; fax clients exceeding the license limit cannot connect to the fax server. Fax clients that connected to the fax server before the license limit has been reached are not affected. ActFax User’s Manual 29 3.3. Send Fax Messages from UNIX / Linux In addition to the capability of sending fax messages from Windows applications using the ActiveFax printer driver, it is also possible to create fax messages from other operating systems, like UNIX or Linux. Normally the connection between the UNIX / Linux server and ActiveFax is done through the LPD/LPR (Line Printer Daemon) protocol. Since this protocol is based on the TCP/IP standard and is therefore included with all UNIX systems and Linux, it is the preferred method for sending fax messages from UNIX. When using LPD/LPR, ActiveFax is accessed exactly the same way as any other network printer. The configuration of the printer in UNIX is done the same way as the configuration of any other printer server (i.e. Extended Systems, AXIS, Emulex, etc.). The host name of the remote printer is the address of the computer where ActiveFax has been installed. The queue name can be individually chosen, since it is ignored by ActiveFax when using default settings. By default the queue name “fax” is used. 3.3.1. Configuring LPD/LPR Printers in UNIX 3.3.1.1. IBM RS/6000 (AIX)  Start the system administrator program “smit”.  Choose the menu options Devices, Printer/Plotter, Manage Remote Printer, Client Services, Remote Printer Queues and Add a Remote Queue.  Fill in the dialog box. In the Destination Host field enter the host name of the computer where ActiveFax has been installed. The field Queue Name can be filled with any queue name (i.e. “fax”). 3.3.1.2. HP-9000 (HP/UX)     Start the system administrator program “sam”. Choose the menu option Printers and Plotters, Actions and Add Remote Printer. Fill in the dialog box. In the Remote Printer Name field enter the host name of the computer where ActiveFax has been installed. The field Queue Name can be filled with any queue name (i.e. “fax”). You should also enable the option Remote Printer is on a BSD System. 3.3.1.3. Other UNIX Systems To configure an LPD/LPR printer for other UNIX systems, it is recommended to consult your system documentation. Usually an LPD/LPR printer is created with an entry in the “/etc/printcap” file. Printer entries in the /etc/printcap file are created based to the following scheme: printername:\ :rm=hostname:\ :rp=queuename: ActFax User’s Manual fax:\ :rm=192.168.0.1:\ :rp=fax: 30 On some UNIX systems (i.e. SCO UNIX) it could also be required to activate the LPD/LPR protocol. For SCO UNIX this can be done with the command “mkdev rlp”. 3.3.2. Sending Fax Messages with LPD/LPR After the network printer has been created on the UNIX system, the “lp” command can be used to send print jobs to ActiveFax. To create a new print job with “lp”, use one of the following commands: lp –dprintername filename cat filename | lp –dprintername Using the “lpstat –t” command or “lpstat –oprintername” the current printer status can be displayed. 3.3.3. Alternatives to LPD/LPR The LPD/LPR protocol is for sure the easiest and most powerful method to send fax messages from UNIX systems. If it is not possible to use an LPD/LPR printer, ActiveFax also supports numerous other protocols to be used instead of LPD/LPR. A short overview about these protocols can be found in the following sections. 3.3.3.1. FTP, TFTP and RAW Sockets Using the TCP/IP network protocol it is also possible to send fax messages with FTP, TFTP and RAW sockets. When using the FTP or TFTP protocol, the files to be faxed just need to be transferred to the virtual FTP server built-in with ActiveFax. The steps are exactly the same as for RAW sockets, a direct TCP/IP connection to the fax server is established on a pre-set TCP/IP port. The fax data is sent directly through that connection without any underlying protocol. The fax message is finished by simply closing the TCP/IP connection. 3.3.3.2. Serial Connection (RS-232) If there is no network connection available, data exchange with ActiveFax can also be done through a serial interface. Using that method the UNIX system is connected through a serial cable to the fax server PC. On the UNIX system it is just required to configure a printer that sends the data to ActiveFax through the serial interface. 3.3.3.3. File System (NFS, Samba) Another way to send fax data to ActiveFax is using the file system. When using that method of data exchange, a predefined directory of the UNIX system is mounted (shared) on the fax server computer. This can be done quite easily with software tools like NFS or Samba. The mounted directory is automatically scanned for new fax files to be processed in that case. ActFax User’s Manual 31 3.3.3.4. Printer Commands (HP-LaserJet PCL, Epson-LQ, Postscript, PDF) Fax jobs sent from UNIX systems can also contain printer commands of HP-LaserJet (PCL and HPGL), Epson-LQ and optionally Postscript and PDF. That way the printer output does not need to be modified and you can send exactly the same output to the fax server that is normally sent to physical printers. For direct processing of Postscript and PDF files it is required to have the add-on software Ghostscript installed on the fax server (www.ghostscript.com). 3.3.3.5. Data Fields To set the recipients fax number or other parameters of a fax messages (i.e. subject, priority, etc.) already from within an application, it is possible to use data fields. Just like printer commands, data fields are embedded directly in the document to be faxed. in this manual in the chapter Data Fields and in the online help of the fax server. ActFax User’s Manual 32 3.4. Enter valid Fax Numbers There is no special format required for fax numbers processed by ActiveFax. It is permitted to use special characters like spaces, slashes, dashes or dots to format a fax number. Such characters are ignored by the fax server and are automatically removed for dialing. In general, fax numbers can be entered in international format as well as in national format. Depending on the local area code of your location the fax server automatically adjusts the number dialed by the modem. It makes no difference if the fax number is entered as a local number or as a complete number including country code and local area code. For a uniform appearance, it is recommended to enter fax numbers always in the same format. ActiveFax also supports internal fax numbers that do not use the dial prefix for dialing. By default, such numbers are marked with an “X” character at the beginning of the number. The character used to mark internal numbers can be changed in the modem configuration. 3.4.1. Examples for valid fax numbers Own Country Code: 1 (USA) Own Area Code: 712 Entered Fax Number Dialed Fax Number +1 934 431 7633 365-874-1297 712.887.3274 +49 89 102030-40 X125 19344317633 13658741297 8873274 011498910203040 125 (no dial prefix!) Own Country Code: 49 (Germany) Own Area Code: 089 Entered Fax Number Dialed Fax Number +49 40 102030-40 +43 1 98765 0043/1/987-65 0049 89 102030-40 089/102030-40 04010203040 0043198765 0043198765 10203040 10203040 ActFax User’s Manual 33 Through the menu View / View Properties you can change the number of pages to be displayed on the screen. You can set the number of pages to be displayed horizontally and the number of pages to be displayed vertically. Especially when using wide screens (16:9 aspect ratio) it makes sense to configure the number of pages to be displayed on the screen to 2 or 3 pages, because the space on the screen is used more efficiently in that case and fax pages in portrait format fit better on the screen. ActFax User’s Manual 34 3.6. Change the Faxlist Columns 3.6.1. Columns The columns displayed in the faxlist can be individually changed through the menu Faxlist / Faxlist Properties. You can configure the set of columns to be displayed in the faxlist as well as the position of each column within the faxlist. Please note that these settings can be individually configured for every fax client and for the fax server. 3.6.2. Colors In ActiveFax every status has a different color assigned to differentiate between the current status of the fax messages without having to read the status text. The color mapping for the fax status can be individually changed through the menu Faxlist / Faxlist Properties. ActFax User’s Manual 35 Please note that these settings can be individually configured for every fax client and for the fax server. ActFax User’s Manual 36 3.7. Select an Entry in the Faxlist 3.7.1. Selecting Entries Entries in the faxlist can be selected either with the left mouse button or with the arrow keys on the keyboard. To execute a function (i.e. locking or deleting a fax) on more than one faxlist entry, it would be possible to select multiple entries at the same time. The Ctrl key and the Shift key are used to select more than one entry in that case. When using the Ctrl key, individual entries are selected, when using the Shift key, entries in a from/to range are selected. To select all entries of the faxlist, the menu option Faxlist / Select all Entries can be used. 3.7.2. Sorting Entries By default, the faxlist is sorted by creation date and time in descending order (latest entries displayed first). The sort order can be individually changed to meet your requirements. The field selection as well as the sort order (ascending or descending) can be separately configured for each column. To change the sort order for the faxlist, follow these steps:  Use the left mouse button to click at the header of a column in the faxlist. The faxlist is now sorted by this column.  If you click at the same column header again, the sort order changes from ascending to descending and vice versa.  To add additional sort criteria (i.e. sort by date first, then by time), press and hold the Shift key and click on the next column header to be added as a sort criteria. The number of columns that can be used to sort the faxlist is not limited. Columns currently used as sort criteria are marked with an arrow symbol in the column header. Sort criteria settings are automatically stored when the program is closed. 3.7.3. Searching for Entries On systems with thousands of fax messages in the faxlist, finding a specific document can be very difficult. ActiveFax offers various functions that help finding fax messages again very fast. To search for a specific document, follow these steps:  Enter a known search term in the search field of the faxlist (i.e. subject, recipient name, fax number, ...). It is also possible to enter multiple search terms, separated with a pipe sign (|).  Select the user or group of the owner of the fax message in the user selection window.  Select the fax status of the fax message in the fax selection window (i.e. undelivered, sent,  Change the sort order of the faxlist by clicking on the column headers of the faxlist. The most efficient way to search for a fax message is entering a search term. When entering significant search terms the faxlist is normally reduced to just a few matching entries. ActFax User’s Manual 37 Please note that you do not need to enter the exact phrase when searching for a specific entry. It is normally sufficient to just enter a small part of the term you are searching for. For example if you want to search for a fax message that was sent to “George Smith”, you can enter just “Smi” or “george smi”. The search function is not case sensitive. It is also possible to search for more than one search term. In that case you have to separate the different search terms with a pipe sign (|). For example to search for the search terms “Smith” and “Los Angeles”, enter “Smith|Angeles” in the search field. ActFax User’s Manual 38 3.8. Automatically Redial failed Fax Transmissions 3.8.1. Automatic Redialing Failed fax transmissions are automatically redialed by the fax server. You can individually configure the number of attempts and the delay after each failed attempt through the menu Extras / Options / Redialing. If the number of transmission attempts should be set to less than the default number of 10 attempts, you need to configure a delay of 0 hours and 0 minutes for one of the attempts. The delay between the redial attempts should increase with each failed attempt, because it is very likely that there is a long-lasting interruption on the receiving fax machine when several consecutive transmission attempts fail. By choosing an increasing delay for each failed attempt, you can avoid that all redialing attempts are done within a short period of time. 3.8.2. Send a Fax Message again If the transmission of a fax messages fails with all transmission attempts, the status of the fax messages changes to Undeliverable. No further transmission attempts are done for that fax message then. You should check if the fax number is correct in that case and change the fax number as required. When changing the fax number of an undeliverable fax message, ActiveFax automatically asks the user if the message should be sent again. As an alternative it would also be possible to manually send the fax message again through the menu Faxlist / Send again. ActFax User’s Manual 39 If a user should be informed about the status of a fax transmission by email, you can configure ActFax User’s Manual 40 3.9. Automatically Print Fax Messages Automatic printing of fax messages can be done in various ways with ActiveFax. Fax messages can be printed either on a specific printer or in dependence of the owner of the fax to individual printers. 3.9.1. Sending Report The automatic printing function can be configured to either print the complete fax message in original format or as a sending report. The sending report is made up of status information of the fax transmission and a preview of the first pages of the fax message printed on a single sheet of paper. The number of fax pages printed on the sending report can be configured with the menu Extras / Options in the Printing tab. 3.9.2. Compressed Printing Compressed printing of fax messages helps to protect the environment and also reduces printing costs. When using compressed printing, multiple pages of a fax message are printed on a single sheet of paper in compressed format. The number of fax pages to be printed on a single page can be individually configured. ActFax User’s Manual 41 3.9.3. General Settings To activate automatic printing of inbound fax messages, follow these steps:  Choose the menu Extras / Options.  Choose the Printing tab.  Enable the option Automatically print incoming fax messages after receipt and select the preferred printer.  Optionally choose the Compression option to print multiple pages on a single sheet of paper.  Optionally activate the Print Report parameter to print a sending report instead of the complete fax message.  Complete the configuration with OK. Please note, that automatic printing of the transmission protocol can also be configured through the Printing tab in the menu Extras / Options. 3.9.4. User-dependent Settings Automatic printing can also be individually configured for each user. Depending on the owner of a fax message, printing can be done on different printers that way. To configure user-dependent printing, follow these steps:  Choose the menu option Extras / User Administrator or use the corresponding button in the toolbar.  Select the user entry and press the Modify button.  Change to the Automatic Printing tab. ActFax User’s Manual 42  Enable the option Use user-defined settings for automatic printing and select the preferred printer.  Optionally choose the Compression option to print multiple pages on a single sheet of paper.  Optionally activate the Print Report parameter to print a sending report instead of the complete fax message.  Complete the configuration with OK. Routing of inbound fax messages to individual user entries can be done in various ways. More information about inbound fax routing is available in the chapter User Administrator in this manual. ActFax User’s Manual 43 3.10. Protect Faxes against Unauthorized Access Since fax messages often contain confidential information that should not be read by unauthorized persons, ActiveFax supports security features to protect privacy of the documents. That way fax messages can be reliably protected against unauthorized access. The base of every reliable security concept should be a well-considered user structure. It is recommended to create a separate user account for every person working with the software and to only grant those permissions necessarily needed for daily work. Each user account should also be protected with a reliable password that is only known to the owner of the user account. ActiveFax also supports groups of users. Each user can be a member of multiple groups (i.e. purchasing department, sales, ...). The main advantage of building groups of users is to grant all members of a group access to each other’s fax messages (depending on permission settings). 3.10.2. Security Settings To activate access verification, security settings need to be activated on the fax server. Follow these steps to enable security settings:  Choose the menu option Extras / Security Settings or use the corresponding button in the toolbar.  Selected the preferred security level for server access and for client access.  Complete the configuration with OK. ActFax User’s Manual 44 Please note that security settings for the fax server and the fax client can be individually configured. To guarantee a high security level it is recommended to grant access to the fax server This ensures that the fax server configuration cannot be modified without having a valid Administrator password and access to the fax client is only possible with a valid user account. ActFax User’s Manual 45 3.11. Block Fax Numbers (Blacklist) To avoid that ActiveFax answers fax calls from certain fax numbers or that outgoing fax messages are sent to specific fax numbers, it would be possible to create a blacklist through the menu Communication / Modem / Blacklist. The blacklist contains all fax numbers that should be blocked by the fax server. 3.11.1. Block Outgoing Fax Calls If outgoing fax calls should be blocked by the fax server, take care to enable the option for outgoing faxes when you create the entry for the blacklist. When a user creates a fax message for a fax number stored in the blacklist, the fax message is automatically locked by the fax server. Sending such fax messages is still possible, when the fax is manually unlocked. Please note, that ActiveFax also supports wildcards (*) when you enter the fax number. When using wildcards, it would be possible to block a complete range of fax numbers with just a single entry. For example, to block all fax numbers starting with 555, enter 555* in the fax number field. 3.11.2. Block Incoming Fax Calls If incoming fax calls should be blocked by the fax server, take care to enable the option for incoming faxes when you create the entry for the blacklist. When the fax server detects an incoming call from a fax number stored in the blacklist, the call is automatically blocked by the fax server. ActFax User’s Manual 46 Keep in mind that incoming fax calls can only be blocked when the sending fax machine also submits a fax number. Please note, that ActiveFax also supports wildcards (*) when you enter the fax number. When using wildcards, it would be possible to block a complete range of fax numbers with just a single entry. For example, to block all fax numbers starting with 555, enter 555* in the fax number field. ActFax User’s Manual 47 3.12. Use the Fax-On-Demand Server The fax-on-demand capabilities of ActiveFax can be used in two ways. It would be possible to receive documents from other fax-on-demand servers and to use ActiveFax as a fax-on-demand server to make fax documents available to others. 3.12.1. Fax Polling A fax polling request (this means to receive a fax document from a fax-on-demand server) can be done with the following steps:  Choose the menu option Communication / Execute Polling (Fax-On-Demand).  Enter the fax number of the fax-on-demand server or use the phone book to import an existing phone book entry.  Complete the request with OK. The polling request is executed as soon as a modem becomes available. After the polling request has been successfully completed, the document is available in the faxlist as a received fax message. 3.12.2. Creating Fax-On-Demand Documents ActiveFax can also be used to make fax documents available for polling to other fax machines. In that case, the document gets an individual fax modem or extension number (when using ISDN) assigned. Especially when using ISDN adapters the number of documents that can be made available for polling is not limited, since every document is identified by its own direct dial number. To create a new fax-on-demand document, follow these steps: ActFax User’s Manual 48  Create the fax-on-demand document with a Windows application of your choice (i.e. Microsoft® Word).  Choose the printing function of the application (i.e. the menu File / Print in Microsoft® Word).  Select the ActiveFax printer to start the print job.  Change to the More Settings tab in the fax dialog window and activate the Create Fax-OnDemand Document option there.  Change to the Settings tab and select the modem to be used for the document. When using ISDN it is also recommended to enter a direct dial number (MSN) to be used for the document.  Complete the document with OK. After the document has been “printed” that way, the fax-on-demand message is automatically transferred to the fax server and is available for requests then. Take care that any existing faxon-demand document for the same modem or direct dial number (MSN) is automatically moved to the archive when a new fax-on-demand document is created. A counter with the total number of requests for the fax-on-demand document is available through the fax dialog window of the document. A complete list of fax numbers that already requested the document can also be found in the transmission protocol. ActFax User’s Manual 49 3.13. Move Fax Messages to the Archive To avoid that the faxlist with the fax messages becomes too big and confusing over the years, old fax messages should be moved to the archive. ActiveFax supports an automatic archive method as well as manual archiving. The fax server automatically creates an archive folder for each month. Please note, that ActiveFax only allows fax messages with the status Sent or Read to be moved to the archive. This is for security reasons to avoid that fax messages that have not yet been sent or read are moved to an archive folder by mistake. If it should still be possible to also move fax messages with a different status to the archive, you can activate this with the parameter ArchiveIgnoreStatus in the options.cfg file. 3.13.1. Automatic Archive By default the fax server automatically moves fax messages to the archive after 14 days. Only fax messages with the status Sent and Read are automatically archived in that case. Fax messages that have been locked are also excluded from automatic archiving. The settings for automatic archiving of fax messages and transmission protocol entries can be changed with the menu Extras / Options / Archive on the fax server. ActFax User’s Manual 50 3.13.2. Manual Archive Using the menu Faxlist / Move to archive or with a right-click at the faxlist entry it is also possible to manually move fax messages to the archive. As an alternative it would also be possible to manually move fax messages to an archive folder using drag-and-drop when moving the faxlist entry over to an archive folder. 3.13.3. Individual Archive Folders As an alternative to the archive folders automatically created by the system for each month, it would also be possible to create your own individual folder structure for the archive. Individual archive folders can be created with the menu File / Folders / New Folder or with a rightclick at the Archive icon in the fax selection window. Individual archive folders are organized in a tree structure; the level of subfolders is not limited. Please note, that the permission to create or modify individual folders can be separately configured for each user. ActFax User’s Manual 51 3.14. Use Multiple Fax Servers When you have more than one fax server installed in the network (i.e. a separate fax server for each branch office), it would be possible to create multiple ActiveFax printers and to add multiple desktop icons for the fax client on the user’s workstations to connect directly to a specific fax server. The address of the fax server does not need to be changed manually to connect to a specific fax server in that case then. 3.14.1. Configure Fax Clients When running multiple fax servers in the network, it would be possible to create a separate icon for each fax server connection on the Windows desktop. The desktop icon should include the name or the location of the fax server (i.e. ActiveFax Client New York). Through the Location field in the properties of the fax client icon, you can set the address of the fax server with When the fax client is started with the parameter -Server:IP-Address, it is possible to run multiple instances of the fax client. This allows a fax client window to be open for each fax server in the network. ActFax User’s Manual 52 To create new fax jobs directly on a specific fax server, it would be possible to add a separate ActiveFax printer for each fax server. The printer name should include the name or the location of the fax server (i.e. ActiveFax New York). The additional ActiveFax printers can be created directly through the ActiveFax Setup when you run the Setup with the command line It is also possible to use the -AddPrinter parameter multiple times to add more than one printer in a single Setup call. 3.14.3. Configure ActiveFax Printers After an ActiveFax printer has been added for a connection with a specific fax server, you need to configure the address of the fax server. You can configure the address of the fax server through the Location field in the properties of the ActiveFax printer with the -Server:IP-Address parameter. Take care, that none of the ActiveFax printers is in use when you install an update for ActiveFax at a later time, because otherwise the printer driver cannot be updated. ActFax User’s Manual 53 ActFax User’s Manual 54 3.15. Create a Cover Page or Overlay 3.15.1. What is a Cover Page / Overlay? In general, cover pages and overlays are created exactly the same way with ActiveFax. A cover page is a separate page added as the first page of a fax message. Cover pages normally contain information about the sender, recipient, subject and additional information like date, time and the number of pages of the document. Compared to cover pages, overlays are not added as a separate page at the beginning of a fax message. Overlays are always displayed at the same page as the fax message (the image is overlaying the fax page, just like printing on a form). That way it is possible to add bitmaps (i.e. company logos, order forms, …) to fax messages in a very simple way. 3.15.2. Creating Cover Pages / Overlays When creating a cover page or overlay, it is not differentiated between both. Cover pages and overlays are both created exactly the same way through the Cover Page Designer of ActiveFax. Just the way how a cover page or overlay is added to a fax messages determines whether it will be used as a cover page or an overlay. To create a new cover page or overlay, follow these steps:  Start the Cover Page Designer with the menu Extras / Cover Page Designer or use the corresponding button in the toolbar.  Select one of the design tools (i.e. text, graphics, data field, …) and design the cover page or overlay.  Save the cover page and close the Cover Page Designer with the menu File / Close Cover Page Designer. It is recommended to save cover pages and overlays to the fax server main directory (C:\Program Files\ActiveFax\Server by default), because only .cov files stored in that directory are automatically displayed in the dropdown list showing available cover pages and overlays. Please note that the menu Extras / Page Format can be used to configure the pages on which an overlay should be visible. That way it would for example be possible to specify that an overlay should only be displayed on the first page or on the last page of a fax message. ActFax User’s Manual 55 3.15.3. Using Cover Pages / Overlays Cover pages and overlays can be added to fax messages in various ways. One method is to choose the cover page or overlay in the fax dialog window of the ActiveFax printer. With the menu Extras / Predefined Settings or Extras / User Administrator / Modify / Predefined Settings it would be possible to configure default cover pages and overlays that are automatically added for new fax messages. Another way to add cover pages and overlays to fax messages is in the online help of the fax server and subsequent chapters of this manual. 3.15.4. Using Color Images When cover pages or overlays are also sent by email, it is recommended that you also provide a .jpg file of the image. The monochrome .bmp file is used whenever the message is sent by fax; when the message is sent by email, the fax server uses the .jpg file for the PDF document sent with the email. If the .bmp file and the .jpg file have the same file name (i.e. logo.bmp and logo.jpg), the .jpg file is automatically selected when an image is added to the cover page or overlay. For best quality, you should only use .jpg files in the format RGB 24-bit (without alpha channel) and a resolution of 200 dpi or better. The width and height of the .jpg file should be identical with the width and height of the .bmp file. ActFax User’s Manual 56 ActFax User’s Manual 57 4. Configuration The User Administrator of ActiveFax is used to manage the accounts for the users and to grant individual permissions to different users. Users can also be part of a group; each user can also be a member of multiple groups. There are two predefined users in the User Administrator, the Administrator and the Unknown user; these user accounts cannot be deleted. Each entry in the User Administrator is identified by a unique user name. It is recommended to use the first name or some kind of nickname for the users to get short user names that are easy to remember. Each user entry can also have a unique direct dial number (MSN) assigned. With that direct dial number it is possible to automatically route inbound fax messages directly to a specific user. Direct dial numbers are only available with ISDN adapters or DID (Direct Inward Dialing) capable modems and fax boards. When using normal fax modems, direct dial numbers are not available due to technical reasons. To avoid that fax messages are not processed during a long absence of a user, it is possible to configure absence substitutions. The user defined as the absence substitution has full access ActFax User’s Manual 58 to all fax messages of the absent user. Permission settings are however not transferred when specifying absence substitutions. To clearly define responsibilities and to increase security, it is recommended to only grant those permissions to a user that are necessarily needed for daily work. 4.1.1. User Permissions Permission Description Enables the user to modify important configuration settings of the fax server. Enables the user to access all fax messages of users that are members of the same group (exception: private fax messages). Enables the user to access all fax messages (exception: private fax messages). Access permission for the central phone book. Write Permission to Central Phone Book Write permission for the central phone book. Access and write permission for the transmission protocol. Automatic Sending Clearance Enables the user to send fax messages without confirmation of a supervisor. Grant Sending Clearance to other Users Enables the user to grant sending clearance to other users. Permission for International Calls Enables the user to send fax messages to recipients with international fax numbers. Execute Polling (Fax-On-Demand) Enables the user to request fax-on-demand documents from a fax-on-demand server. ActFax User’s Manual 59 Enables the user to create and manage fax-on-demand documents of the fax server. Permission to create, rename and delete individual user folders. Create Private Fax Messages Permission to create a private fax message, only visible to the owner of the fax message. Permission to Change Owner of a Fax Permission to change the owner of a fax message. Delete Fax Messages Permission to delete fax messages. 4.1.2. Alias Names Many users are known under different names or have multiple logins or user accounts (i.e. on UNIX systems). In such a case it is possible to configure all alias names for a user through the Alias Names tab. ActiveFax automatically checks for alias names and replaces them with the main user name, so it makes no difference which name is used to create a fax message. 4.1.3. Predefined Settings With the Predefined Settings tab it is possible to individually configure different settings for each user. You can choose between default sender settings and user-defined sender settings. Through that configuration screen it is also possible to specify default cover pages and overlays to be used for new fax messages. The default sender settings (without user reference) can be configured with the menu Extras / Predefined Setting. ActFax User’s Manual 60 4.1.4. Automatic Printing The settings for automatic printing can be individually configured for each user. That way it is possible to automatically print fax messages or sending reports directly on the workplace printer of a user. Select if you want to use the default settings or the user-dependent settings for automatic printing. The default settings for automatic printing can be configured through the Printing tab of the ActFax User’s Manual 61 Email notifications are used to notify a user about the status of outbound and inbound faxes. For notifications of outbound faxes, the notification for failed fax transmissions is sent after the last failed transmission attempt (when the status of the fax message changes to “Undeliverable”). As an optional parameter it would also be possible to attach the original fax message to the email as an attachment. For received faxes you can also automatically change the status of the faxlist entry to “read” when the notification email is sent. Email notifications that should be sent to more than one email address can be entered when you separate the email addresses with a semicolon (i.e. [email protected]; [email protected]; [email protected]). If the user’s email account requires separate credentials for the login at the mail server, you can configure this through the “Authentication” button. If email notifications for outgoing fax transmissions should only be sent for failed fax transmissions, it would be possible to configure this through the menu Extras / Options / General / 4.1.6. Fax Forwarding Fax forwarding is used to automatically send inbound fax messages to other fax numbers or email addresses. That way it is possible to forward fax messages received for a specific user to other fax machines or email addresses. ActFax User’s Manual 62 For a cost-saving forwarding of fax messages to other fax machines, it is possible to automatically set the priority of forwarded faxes to Low. In dependence of the charge optimization settings, fax messages are forwarded during night hours that way. 4.1.7. Archive (Export) The settings for the archive function (fax export) can be individually configured for each user. That way it is possible to use a different export directory for each user. Select if you want to use the default settings or the user-dependent settings for the archive. The default settings for the archive function can be configured through the Archive tab of the ActFax User’s Manual 63 4.1.8. Group of Users For a better overview about the users stored in the User Administrator, users should be arranged in groups. Every user can be a members of an unlimited number of groups. The group membership of a user also controls access to the fax messages of other group members. By default, a user can only see fax messages of other users of the same group. A user only has access to fax messages of other group members when the permission setting To avoid that a user can see all faxes stored on the system, it is important to have the option “Access to all users” disabled for the user. If this permission is enabled for a user, the user has 4.1.8.1. Passive Group Members If a user should be a member of a group, but other group members should not be able to see that user, you can define the user as a passive group member. To define a user as a passive group member, right-click at the user or group entry in the group selection window and select the option “Passive Group Member” from the menu. ActFax User’s Manual 64 When a user is a passive member of a group, the fax messages of that user are not visible to other group members. The user itself however has access to fax messages of all other (nonpassive) group members. A passive group membership is typically used for team leaders that should have access to the fax messages of all team members, but the team members should By default, the login of a user is done through the user account and password stored in the User Administrator of ActiveFax. That way, any user can login with an individual user account from any workstation in the network. As an alternative it would also be possible to use the user name from the Windows login for the login of the user. You can activate this with the Please note, that you still need to create the user accounts in the ActiveFax User Administrator, even when the Windows user name is used for the client login. This is required, because otherwise it would not be possible to configure individual settings for the users (i.e. notifications for fax transmissions). When using the Windows user name for the client login, it is not required to set a password for the users in the User Administrator. Since user authentication has already been done with the Windows login, no further authentication needs to be done by ActiveFax, so no passwords are required for the user accounts. 4.1.10. Routing of Inbound Fax Messages Routing of inbound fax messages can be done in various ways. Depending on the technical capabilities of the modem or ISDN adapter and the phone line, not all routing methods are always supported. ActiveFax uses the routing methods in the following order. 4.1.10.1. Routing using Direct Dial Numbers (MSN, DDI, DID, DTMF) This method of inbound fax routing is the most reliable way to route faxes, since every user has its own unique fax number in that case. Due to technical reasons, this routing method is ActFax User’s Manual 65 only available with ISDN adapters or DID (Direct Inward Dialing) capable fax modems or fax boards. It is not possible to use direct dial numbers with normal fax modems. To use direct dial capabilities of an ISDN adapter, it is required that the ISDN line supports either the MSN (Multiple Subscriber Number) or DDI (Direct Dial In) service. Activation of these services is normally done directly by the phone network provider. The direct dial numbers for the different users can be configured through the Direct Dial (MSN) field when you modify the settings for a user in the User Administrator. You just need to enter the direct dial number there; it is not required to enter the complete fax number. When using a phone system (PBX) it could be required to configure the ISDN line (S0 bus) to 4.1.10.2. Routing using CSID (Sender Identification) This kind of inbound fax routing is based on the sender identification (CSID) of a fax message. Based on user names mapped to phone book entries, faxes received from known fax numbers are automatically routed to individual users. To map a user to a phone book entry, follow these steps:  Open the phone book with the menu Extras / Phone Book or use the corresponding button in the toolbar.  Create a new phone book entry or select an existing entry.  Modify the entry with the Modify button or double-click on the entry.  Enter the sender identification in the CSID field. Please note that it is not required to fill in the CSID field if the CSID and the fax number are identical. Special characters, like spaces, slashes, dashes or dots are ignored when the fax number and CSID are compared.  Select the User that should be mapped to the phone book entry.  Complete the phone book entry with OK. ActFax User’s Manual 66 4.1.10.3. Routing using Modem When using this kind of inbound fax routing, a user is mapped directly to a modem (fax number). The limitation of that routing method is that it can only be used for a limited number of users, since a dedicated modem (fax line) is required for each user that should be routed. To configure modem based routing, follow these steps:  Choose the menu Communication / Modem or double-click on the corresponding icon in the communication window.  Select the modem and press the Modify button or double-click on the selected entry.  Select the user name that should be mapped to the modem in the Default User for Incoming Faxes field.  Complete the configuration with OK. 4.1.10.4. Manual Routing Manual routing is used when none of the above routing methods can be used. When using manual routing, the fax document needs to be manually opened on the fax client to check which user is the recipient of the fax message. The user has to be manually entered through the fax dialog window in that case. To specify the user for a fax message, follow these steps:  Select the fax message with the left mouse button and find out to which user the fax messages belongs.  Double-click on the faxlist entry to display the fax dialog windows and select the user name or move the faxlist entry over to the new user name in the user selection window left of the faxlist window using drag-and-drop.  Complete the fax dialog window with OK. ActFax User’s Manual 67 4.1.10.5. Order of Routing Methods The user for inbound fax messages is identified according to the following order of routing methods:  Check of direct dial numbers (if available).  Check of sender identification (CSID) using the phone book.  Check of default user mapped to the modem (default user is Administrator). ActFax User’s Manual 68 4.2. Phone Book Phone book entries in ActiveFax can be stored either in a global (central) or local phone book. The central phone book is shared by all users and can be accessed from any client computer in the network. The private phone book is stored directly with a user account and can only be accessed by the owner of the phone book. Phone book entries that should be visible to all users should be added to the central phone book; for confidential or private phone book entries, the user’s private phone book should be the preferred choice. It is recommended to organize phone book entries in groups, for example grouped by branch or department. Doing so makes it much easier to find phone book entries again. To search for a specific phone book entry, the search function of the phone book can be used. It is also possible to select more than one phone book entry at the same time by using the Ctrl or Shift key. Especially for fax mailings, faxes often need to be sent to a complete group of recipients. Using the right mouse button and the menu Select All it would be possible to select all entries displayed in the phone book. ActFax User’s Manual 69 4.2.1. Importing the Phone Book Phone book entries can be imported in two ways with ActiveFax. One method is to import the phone book entries from an external ASCII file (text file). The second method is to import the phone book entries from an external database using the ODBC standard. 4.2.1.1. Import from ASCII File To import phone book entries from an external ASCII file, follow these steps:     Select the Options / Import from File button. Enter the File Name of the import file or use the Search File button. Specify the Character Set and the Field Delimiter for the import file. Specify the field order for the import file. Fields not included in the import file are automatically left blank.  Check the settings in the preview window and start the import of the phone book entries. At the import process of the phone book entries the field ID-Number (i.e. customer or supplier number) and the fields Name 1 and Fax Number are compared. If there is a matching entry found in the phone book for these fields, the phone book entry is updated; otherwise a new entry is created in the phone book. ActFax User’s Manual 70 4.2.1.2. Import from ODBC Database Another method to import phone book entries is to bind the phone book to an ODBC data source. An external database is automatically checked for new and modified phone book entries in that case. More information about the import of phone book entries from an ODBC data source can be found in the chapter ODBC Database of this manual. 4.2.2. Exporting the Phone Book Phone book entries can be exported to an ASCII file (text file) with the Options / Export to File button. The export file always includes all data fields of the selected phone book entries. Before the phone book is exported, make sure to configure the correct character set and field delimiter. ActFax User’s Manual 71 4.3. Transmission Protocol The transmission protocol stores information about all outbound, inbound and fax-on-demand fax transmissions. This includes successful transmissions as well as status information for incomplete or failed transmission attempts. When using ISDN adapters with the ISDN service AOC (Advice of Charge) activated, the transmission protocol also includes charging information. That way it would be possible to calculate the total charges for a user or cost account code. Detailed information for a transmission protocol entry can be displayed with the Details button or when you double-click at the selected protocol entry. 4.3.1. Printing the Transmission Protocol The transmission protocol can be printed in three different ways. Use one of the buttons described below to print the protocol entries. Print Option Description Print All Entries All entries currently displayed in the transmission protocol list are printed. Only new entries that have not yet been printed are printed. Print only New Entries ActFax User’s Manual 72 Print only Selected Entries Only selected entries of the transmission protocol list are printed. 4.3.1.1. Layout Through the Options tab the sort order and layout for the printout of the transmission protocol can be changed. You can change between single-line and double-line layout there. 4.3.1.2. Automatic Printing The transmission protocol can also be automatically printed. Use the Printing tab in the menu Extras / Options to configure automatic printing of the transmission protocol. 4.3.1.3. Sending Report As an alternative to the printout of the transmission protocols it is also possible to automatically print a sending report for each fax message. Sending reports are automatically printed right after a fax message has been transmitted. The configuration for sending reports is done through the Printing tab of the menu Extras / Options or with the User Administrator if you need to configure individual printers for each user. 4.3.2. Exporting the Transmission Protocol The entries of the transmission protocol can be exported in three different ways. Use one of the methods below to do the export:  Use the Export button to export all selected protocol entries to an external ASCII file (text file). ActFax User’s Manual 73  Use ODBC data exchange to automatically export the transmission protocol entries to an external database.  Use FTP to retrieve the transmission protocol from other computers in the network (i.e. UNIX or Linux). 4.3.3. Archiving the Transmission Protocol The entries of the transmission protocol can be automatically moved to an internal archive to avoid that the protocol becomes too large over the years. Automatic archiving can be configured with the Archive tab in the menu Extras / Options. Old protocol entries are automatically moved to the archive after 14 days by default. ActFax User’s Manual 74 4.4. Charge Optimization 4.4.1. Delayed Transmissions Depending on the fax volume and the location of the recipients it would be possible to reduce phone charges by using delayed transmissions. When using automatic transmission delays, the best (cheapest) transmission time is automatically calculated based on the priority of a fax message and the phone rates of your phone network provider. To activate automatic optimization of the transmission time, follow these steps:  Choose the menu Extras / Charge Optimization or use the corresponding button in the toolbar.  Activate the option Enable Automatic Optimization of Charges.  Configure the maximum transmission delay admitted for the single priority levels.  Change to the Rates tab and configure the rates for the different days of the week and times of the day.  Complete the configuration with OK. Take care that automatic charge optimization is mainly affected by the priority of the fax messages. This makes it necessary to set the priority level of low-priority fax messages to “low”. As an alternative it would also be possible to manually change the preferred transmission time for a fax message. That way large fax mailings can be sent during night hours or at the weekend. ActFax User’s Manual 75 4.4.2. Time Limitation To avoid that fax messages are sent during specific times of the day or days of the week, it would be possible to configure a time frame for each priority level. Depending on the priority level of a fax, faxes are sent only during these times then. As an alternative it would also be possible to configure time limitations to be used to suspend fax transmissions for a specific time frame. ActFax User’s Manual 76 4.4.3. Least Cost Routing Another way to reduce phone charges is using least cost routing. Least cost routing can be used if you have more than one phone network provider; based on the area code of the fax number and the time of the day, ActiveFax automatically uses the best (cheapest) provider for the transmission. To activate least cost routing, follow these steps:  Choose the menu Extras / Modem or double-click on the corresponding icon in the communication window.  Change to the Least Cost Routing tab.  Activate the option Enable Least Cost Routing for outgoing calls.  Add an entry for each area code / time combination. Enter the area code first, followed by the weekday, time and net access number.  Complete the configuration with OK. Please note that it is not required to enter the complete area code when using least cost routing. “8” for example covers all fax numbers beginning with “8” (i.e. 89, 873, ...). ActFax User’s Manual 77 4.5. Modem & ISDN ActiveFax supports fax modems of all fax class standards, ISDN adapters compatible with the CAPI 2.0 standard as well as dedicated fax boards from Brooktrout and Intel/Dialogic. See the summary below for an overview of all fax standards supported by ActiveFax. Modem Class Standard Description Fax Class 1 / 1.0 TIA/EIA 578 This fax standard is supported by virtually all modems. Fax Class 2 SP-2388, TR-29.2 This standard is normally only supported by old modems and has been replaced with Fax Class 2.0. Fax Class 2.0 TIA/EIA 592 This standard is supported by most modern modem types. ISDN CAPI 2.0 This standard is supported by virtually all ISDN adapters. Take care that the ISDN adapter also needs to support the Fax Group 3 (T.30) service. BFAX Brooktrout Fax and Voice API This standard supports Brooktrout TR1034, TR114 and (BfvAPI) Trufax fax boards. GFAX Intel/Dialogic Gammalink API This standard support Intel/Dialogic fax boards of the CPi series. The number of modems, ISDN adapters and fax boards supported by ActiveFax is not limited. It is also possible to use different modems, ISDN adapters and fax boards on a single system. Please note that the term “modem” is used for fax modems as well as ISDN adapters and fax boards. Otherwise explicitly noted, there is no difference between fax modems, ISDN adapters and fax boards when the term “modem” is used. 4.5.1. Voice over IP (VoIP / T.38) Instead of using normal phone lines to transmit faxes, it would also be possible to use ActiveFax in combination with VoIP. When using VoIP, a special interface software is used instead of the fax modem or fax board. ActiveFax supports the XCAPI software from TE-Systems (www.xcapi.com) and the SoftIP software from Dialogic (www.dialogic.com) for VoIP integration. When using VoIP for fax transmissions, it is recommended to make sure that the VoIP connection also supports the T.38 (Fax over IP) standard. VoIP connections without T.38 support are often not reliable enough for solid fax transmissions. Compared to normal analog fax modems, using ISDN adapters offers several advantages. ISDN adapters might also be slightly cheaper compared to fax modems, especially when using ISDN ActFax User’s Manual 78  Availability of direct dial numbers (individual fax number for each user). Required ISDN service: MSN (Multiple Subscriber Number) or DDI (Direct Dial In).  Recording of transmission charges. Required ISDN service: AOC (Advice of Charge).  Simultaneous fax transmissions on multiple phone lines (channels). When using BRI (Basic Rate Interface) 2 channels are supported by default; when using PRI (Primary Rate Interface) up to 30 channels are available with a single ISDN controller. 4.5.3. Modem Configuration The setup program of ActiveFax automatically detects and configures all modems, ISDN adapters and fax boards connected to the system. To subsequently add or modify modems, use the menu option Communication / Modem or double-click on the modem icon in the communication window.  Use the New or Modify button to create a new entry or to modify an existing entry in the modem list.  Select the COM-Port (interface) the modem is connected to (i.e. COM01, COM02, ISDN, etc.). Optionally use the Port Settings button to change the configuration of the COM port.  Set the Modem Type or use the Auto Detection button to automatically detect the modem type.  When using an ISDN adapter, it is also recommended to enter at least one MSN (direct dial number) in the MSN field. It is possible to configure up to three MSN here. Additional MSN for the different users can be added through the User Administrator. Please note that ActiveFax answers to all incoming calls (also global calls), if you do not configure at least one valid MSN either in the modem configuration or the User Administrator.  Depending on the settings of your phone system (PBX) it could also be required to configure additional parameters (i.e. dial prefix, dial method, etc.). ActFax User’s Manual 79  Complete the configuration with OK. When using an old phone system (PBX) or the modem is connected to an analog phone system, it could be required to use pulse dialing instead of tone dialing. Take care to choose the correct dialing method in that case, since outgoing calls cannot be successfully dialed otherwise. When using an ISDN adapter, you should take care to configure a valid MSN (direct dial number) either in the modem configuration or the User Administrator (at least for one user). If there is no MSN configured for the fax server, ActiveFax answers to all incoming calls (also global calls). The Least Cost Routing tab can be used to automatically select the best (cheapest) phone network provider. Depending on the transmission time and area code of a fax message, net access be found in the chapter Charge Optimization of this manual or in the online help of ActiveFax. When using an ISDN adapter, multiple phone lines (B-channels) are available. To avoid that ActiveFax uses all available channels for fax transmissions, the number of channels used for faxing can be limited with the Extended button. Specify the total number of channels and the number of channels used for outgoing calls here. That way it would be possible to keep some channels in spare for other purposes (i.e. phone calls, Internet connections, ...). ActFax User’s Manual 80 4.5.4. Modem Status To display the current status of a modem, click on the modem icon in the communication window (i.e. Modem on ISDN01). The status window shows the following information about the fax transmission:        Current status (waiting, sending, receiving, error, etc.). Other party (fax number and name). Transmission parameters (transmission rate, resolution, compression). Additional modem information (direct dial code, charge). Transmission progress for the current page. Start time of the transmission. Duration of the transmission. ActFax User’s Manual 81 4.6. E-Mail As an alternative to fax transmissions, ActiveFax can also be used to send any document by email. Depending on the configuration of the fax server, ActiveFax tries to convert the document to text format whenever possible. If the conversion to text format cannot be done, the document is sent as an email attachment in PDF, TIFF or GIF format. 4.6.1. SMTP Server (Mail Server) Configuration Delivery of emails is done through an SMTP server (Simple Mail Transfer Protocol). To configure the email service in ActiveFax, you just need to specify the address of your SMTP server and the type of Internet connection for the fax server PC. If you do not know the address of  Enter the hostname or IP address of the SMTP server.  Specify whether you have direct access to the Internet or if you need to use dialup connections.  If you need to use dialup connections, configure the settings for the Remote Access Service (RAS). If you are using an external mail server (i.e. the mail server from your Internet Service Provider), it is strongly recommended to also enable one of the encryption protocols SSL/TLS or STARTTLS for encrypted communication between ActiveFax and the mail server. ActFax User’s Manual 82 4.6.2. Mail Server Authentication Many mail servers require the user to login on the mail server to send emails to protect the mail server from unauthorized access by spam senders. If your mail server requires authentication, you can configure this through the Authentication button. If your mail server requires the email address used for authentication to be identical with the email address of the sender, you need to configure individual authentication settings for each user. The user-dependent authentication settings can be configured through the menu Extras 4.6.3. E-Mail Options The settings of the email service can be individually configured to set the default attachment format and other parameters.  The option Use individual user names for the “From” field of an email is used to define if the complete user name should be used in the “From” field of the email. If this option is disabled, the Name field (company name) is used instead.  The option Convert fax message to text format whenever possible controls if the fax server should try to convert documents to text format (ASCII or HTML) whenever possible. If the conversion cannot be done, the document is sent as an email attachment in PDF, TIFF or GIF format.  The option Request receipt confirmation for emails is used to request a confirmation about the successful receipt of the email from the email recipient.  The option Enable cover page and overlays for emails defines if cover pages and overlays should be activated for messages sent by email.  The option Enable fax title for messages sent as an attachment controls if the header of the fax message should be added to emails.  The File format for fax messages sets the file format for email attachments. Documents are sent as an email attachment whenever it is not possible to convert a document to text format. The default file format is PDF. ActFax User’s Manual 83  The option Send emails always immediately is used to configure whether an email should be delivered immediately (as soon as it is received by the fax server) or if the fax server should wait for a predefined number of emails to be in the transmission queue. Especially when using dialup connections for Internet access, this option can be very useful to reduce phone charges.  The setting Share communication port for fax and email has to be activated if you share the same modem for fax transmissions and dialup connections for Internet access. The fax server automatically disconnects the modem connection in that case to give the Windows RAS manager the chance to do a dialup connection to the Internet. ActFax User’s Manual 84 4.7. ODBC Database Using the ODBC data exchange standard, data can be exchanged between ActiveFax and external databases. Since Windows ODBC drivers are available for virtually all database products, ActiveFax can be easily integrated with such databases. ActiveFax supports the automatic import of the phone book as well as the automatic export of the transmission protocol through ODBC. 4.7.1. Selecting a Data Source To use ODBC data exchange with ActiveFax, a data source has to be selected first. Follow these steps to select an ODBC data source:  Choose the menu Communication / ODBC Database or double-click on the corresponding icon in the communication window.  Selected a Data Source from the list of available data sources.  Enter the User Name and Password for the database connection. Please note that this information is not needed for all database types.  Test the database connection with the Test Connection button. Take care that the data source needs to be created through the Windows Control Panel first. the manual of your database product. To make sure the data source can also be accessed when the fax server is running as a service, it is recommended to only use System data sources (no User data sources). ActFax User’s Manual 85 Some ODBC drivers (i.e. some version of INFORMIX CLI) fail to release allocated system resources after a database connection has been closed. To save system resources, it is recommended to disable the option Automatic Disconnect when Idle in that case. The ODBC drivers of some database products are not fully compatible with the ODBC data exchange standard. When using such drivers, it could happen that data exchange with ActiveFax does not work as expected. In such cases you should try to get the latest ODBC driver 4.7.2. Importing the Phone Book The import of the phone book is done fully automatically; the fax server checks the database in predefined time intervals for new and modified phone book entries in that case. The import function compares the fields ID-Number (i.e. customer or supplier number), Name 1 and Fax Number to find existing phone book entries. If an existing entry is found, the entry is updated; otherwise a new entry is created in the phone book. Please note that the import of the phone book from an ODBC data source is always done for the Central Phone Book. To configure the automatic import of phone book entries from an ODBC data source, follow these steps:  Change to the Phone Book tab.  Set the time interval to be used for the automatic update of the phone book data.  Select the Table that contains the phone book entries from the list of available database tables. A default table can be created with the Use Default Table button. The default table is created with all fields available in the phone book.  Configure the field mapping to set the relationship between database columns and phone book fields. Fields not included in the database table are automatically imported with default or empty values. If you use the default table to import the phone book entries, the field mapping is automatically configured by ActiveFax.  Complete the configuration with OK. Please note that the conversion of different data types is automatically done by the fax server whenever possible. An alternative way to import phone book entries is to import the phone book data from an Book of this manual. ActFax User’s Manual 86 4.7.3. Exporting the Transmission Protocol Transmission protocol entries are automatically exported right after a fax transmission completes. As soon as a new entry has been added to the transmission protocol, ActiveFax automatically connects to the database and exports the new entry. If the database connection should be unavailable, the transmission protocol entries are automatically stored in the background and are exported as soon as the database becomes available again. To configure the automatic export of the transmission protocol to an ODBC data source, follow these steps:  Change to the Transmission Protocol tab.  Select the table to be used for the export of the transmission protocol entries. A default table can be created with the Use Default Table button. The default table is created with all fields available in the transmission protocol.  Configure the field mapping to set the relationship between the database columns and the transmission protocol fields. Fields not included in the database table are automatically ignored. If you use the default table for the export of the transmission protocol entries, the field mapping is automatically configured by ActiveFax.  Complete the configuration with OK. Please note that conversion of different data types is automatically done by the fax server whenever possible. ActFax User’s Manual 87 An alternative way to export the transmission protocol is the export to an ASCII file (text file). this manual. ActFax User’s Manual 88 4.8. Cost Account Manager Use the Cost Account Manager to assign individual cost account codes to fax messages. Cost account codes are mainly used by the accounting department. 4.8.1. Create Cost Account Codes Through the menu Extras / Cost Account Manager the list of available cost account codes can be created or changed. It would also be possible to enable an option to force users to always enter a cost account code. With this option enabled, fax messages cannot be created by a user without entering a cost account code. It would also be possible to enable an option to validate cost account codes. When having this option enabled, only cost account codes defined in the list of available cost account codes can be entered. 4.8.2. Select Cost Account Codes The selection of cost account codes can be done either through a dropdown list or through a separate selection window. The advantage of using the selection window is that you also have a search function available. Especially when working with a large catalog of cost account codes, the search function makes it very efficient to search for specific cost account codes. ActFax User’s Manual 89 Please note that the entries displayed in the transmission protocol can also be selected based on cost account codes. ActFax User’s Manual 90 4.9. Network Scanners Documents on paper can be automatically transmitted using special network scanners. You can use any scanner with ActiveFax that is supported either by the HP Digital Sending Software or by the Xerox Network Fax Server Enablement Kit (i.e. HP Digital Sender 9250C or Xerox Workcentre). As an alternative it would also be possible to use any other type of scanner (i.e. TWAIN compatible scanners) to send faxes on paper when you scan the document with the software shipped with the scanner and print the scanned image to the ActiveFax printer. 4.9.1. Installation ActiveFax is already pre-configured to connect to network scanners, so you just have to do the installation and configuration of the network scanner in that case. Due to technical reasons, the fax service of HP network scanners can only be used when the HP Digital Sending Software has been installed on a Windows XP / 2003 / Vista / 2008 / 7 / 2012 / 8 / 10 system. More information about the HP Digital Sending Software can be found in the administration manual of the scanner in the chapter LAN Fax-Products. For the installation and configuration of HP network scanners you should take special care of the following settings:  The data exchange directory of the scanner (default directory is hpfscan) is automatically created during the installation of ActiveFax in the ActiveFax base directory (i.e. C:\Program Files\ActiveFax\hpfscan). Take care to also configure this directory in the scanner software when you install the network scanner software.  The Data Exchange File Format for HP network scanners needs to be configured to PCL5 Packbits. website at www.hp.com. ActFax User’s Manual 91 4.10. External Configuration File options.cfg Because ActiveFax offers a huge number of configuration parameters, rarely used parameters are configured through an external configuration file to avoid that the user interface of the fax server becomes overloaded with an unmanageable number of settings. The configuration file options.cfg is located in the fax server main directory (C:\Program Files\ActiveFax\Server\options.cfg by default). This file is a normal text file that can be modified with any text editor (i.e. Windows Notepad). It is also possible to modify the options.cfg file directly through the fax server user interface with the menu Extras / Options / General / Extended Options / External Parameters. Take care to once stop and restart the fax server whenever the options.cfg file is modified, because modifications on that file only become active when the fax server is restarted. An overview of all parameters supported by the options.cfg file can be found in the fax server help. When modifying the options.cfg file through the fax server user interface, the parameter list can also be displayed through the Parameter Overview button. ActFax User’s Manual 92 5. Data Fields 5.1. Why do I need Data Fields? Each parameter of a fax message (i.e. fax number, priority, subject, ...) is stored by the fax server in data fields with unique field numbers. That way it is possible to set the value for such data fields (i.e. the recipients fax number) already from within an application. The user does not need to enter this information again when the fax is created. 5.2. Syntax of Data Fields Data fields are always formed using the same syntax and can always be written in plain text. The following sections describe how data fields are used and include a reference for all data @Fnnn [email protected] @F307 Purchase Order [email protected] @F211 [email protected] Syntax: Examples: A data field always starts with the character sequence @F followed by the 3-digit field number (nnn). The field number is followed by an optional space character and the content of the data field (xxxxxx). The end of a data fields is always marked with the @ character. The character set used for data fields depends on the character set used in the fax message and is automatically set by ActiveFax. If the content of a data field contains the @ character, you have to “mask” the @ character with a backslash (\). Otherwise the @ character would be treated as the end of the data field and the content of the data field would be truncated. It is not necessarily required to mask the @ sign for the email data fields @F111, @F212 and @F607, since ActiveFax automatically detects the @ sign of the email address for such data fields. Example: @F212 michael.miller\@[email protected] Please note that it is only required to mask the @ character. Other characters (including the backslash itself) do not need to be masked. 5.3. Overview of the Data Fields Since ActiveFax supports a total number of more than 50 different data fields, the fields have been subdivided into three groups (sender fields, recipient fields and common fields). Depending on the group, the data fields start with different field numbers. ActFax User’s Manual 93 Please note that only fields containing data need to be integrated with your application. Data fields not specified by your application are automatically filled with default values by the fax server. The most important data field is the data field for the recipients fax number (field @F211), since this field is at least required to automatically deliver a fax message. It is recommended to also use other data fields with additional information, for example the recipient’s name (field @F201) or the subject of the message (field @F307). A detailed summary of all data fields can be found in the following sections. More information 5.3.1. Sender Fields This group of data fields contains all parameters for the sender of a fax message. It is recommended to specify at least the fields Name 1 and Fax Number, since this information is printed on the fax title of a message. Please note that default values for the sender parameters can be specified through the menu Extras / Predefined Settings or with the User Administrator Field Number Field Name Description @F101 Name 1 Name 1 of the sender @F102 Name 2 Name 2 of the sender @F103 Name 3 Name 3 of the sender @F104 Name 4 Name 4 of the sender @F105 Name 5 Name 5 of the sender @F106 Department Department of the sender @F107 CC CC of the sender @F108 Phone 1 Phone number 1 of the sender @F109 Phone 2 Phone number 2 of the sender @F110 Fax Number Fax number of the sender @F111 E-Mail 5.3.2. Recipient Fields This group of data fields contains all parameters for the recipient of a fax message. It is recommended to specify at least the field Fax Number, since this field is always needed to automatically delivery a fax message. Field Number Field Name Description @F201 Name 1 Name 1 of the recipient @F202 Name 2 Name 2 of the recipient @F203 Name 3 Name 3 of the recipient @F204 Name 4 Name 4 of the recipient @F205 Name 5 Name 5 of the recipient @F206 Department Department of the recipient @F207 Attention Of Attention-of of the recipient ActFax User’s Manual 94 @F208 CC CC of the recipient @F209 Phone 1 Phone number 1 of the recipient @F210 Phone 2 Phone number 2 of the recipient @F211 Fax Number Fax number of the recipient @F212 E-Mail @F213 Communication Service Communication service Fax or Email (F=Fax, E=Email). Only needed if the fields @F211 and @F212 are both set @F299 Next Recipient Delimiter for the next recipient 5.3.3. Common Fields This group of data fields contains all parameters addressing neither the sender nor the recipient of a fax message. Field Number Field Name Description @F301 Priority Priority of the fax message (1=very high, 25=high, 50=normal, 99=low) @F302 Transmission Attempts Number of transmission attempts so far (this field is automatically filled) @F303 Transmission Date Preferred transmission date of the fax message @F304 Transmission Time Preferred transmission time of the fax message in the format HH:MM @F305 Cover Page Cover page for the fax message @F306 Overlay Overlay for the fax message @F307 Subject Subject of the fax message @F308 Free Text 1 @F309 Free Text 2 @F310 Free Text 3 @F311 User Name User name of the fax message @F312 Modem Preferred modem (i.e. COM1, COM2, ISDN) @F313 Resolution Preferred resolution (0=standard, 1=normal, 2=fine) @F314 Lock Lock status of the fax message (0=not locked, 1=locked) @F315 Cost Account Cost account code for the fax message @F316 Cover Page Text Text on the cover page. Line breaks can be added with \n @F317 Cover Page Text (cont.) This field is used in combination with @F316 to split long text to multiple data fields. The text in the @F317 field is always appended at the end of the text. The data field @F317 can be used as often as required @F320 ID-Number Phonebook Complete recipient’s data from the phone book entry with the specified ID number @F350 From Page Send from page n @F351 To Page Send to page n ActFax User’s Manual 95 @F360 Private Fax Message Mark fax message as private (0=public, 1=private) @F370 Fax-On-Demand Create a fax-on-demand document (0=normal Fax, 1=fax-on-demand document) @F500 Reference File This file will be evaluated for additional data fields and is deleted then. If you do not use this field, ActiveFax tries to search for data fields in the file Fields.dat in the installation directory (usually C:\Program Files\ActiveFax) @F501 Automatic Printing No dialog box to enter the recipient is displayed. Optional parameter (0=never display dialog window, 1=only display dialog window for messages without a recipient, 2=always display dialog window) @F502 Ignore Pages This data field is used to ignore pages at the end of a fax message. A positive parameter sets the total number of pages (without the cover page) that should be displayed. A negative parameter is used to set the number of pages that should be ignored at the end of the message @F503 Print Fax This data field can be used to automatically print a fax after it has been received by the server. As an optional parameter you can specify the printer name and, separated with a comma, the options D to delete the fax after it has been printed and the option H, to ignore the fax header for printing. Example: @F503 Laserjet,[email protected] @F504 Number of Copies This data field sets the number of copies when a fax message is automatically printed @F505 Export Fax This data field can be used to automatically export a fax after it has been received by the server. As an optional parameter you can specify the file name for the export file and, separated with a comma, the options D to delete the fax after it has been exported and the option H, to ignore the fax header for the export. Example: @F505 c:\export\test.pdf,[email protected] @F506 Export Format Specify export file format (tif, gif, bmp, pdf) and/or resolution. Example: @F506 gif,[email protected] @F507 Automatically Delete Fax Automatically delete fax after transmission (1=move fax to recycle bin, 2=delete fax). Example: @F507 [email protected] @F555 Control Command Send control command to ActiveFax. @F555 DELETE [email protected] @F555 RESEND [email protected] @F555 LOCK [email protected] @F555 UNLOCK [email protected] @F555 PRINT Fax-ID [printername]@ @F555 EXPORT Fax-ID [filename]@ Example: @F555 DELETE [email protected] @F599 New Fax Job Start a new fax job within the document. This command is used for mail merge documents, when the individual pages of a document should be sent to different recipients. Each time you use that field on a page, a new fax job is started at the beginning of that page ActFax User’s Manual 96 @F600 E-Mail Bitmap Format The email is always sent as an attachment. ActiveFax does not try to convert the message into text format @F601 E-Mail Line Break Number of characters after which ActiveFax forces an automatic line break when converting an email to text format (20-999). Normally this value is automatically calculated according to the width of a page @F602 E-Mail Attachment The email is always sent as an attachment, even when the original message is in text format. Optionally it is also possible to specify the attachment name with this data field (i.e. @F602 [email protected]) @F603 E-Mail Body Text Body text for emails that are sent as an attachment. If this field is not used, the standard text is used instead. Line breaks can be added with \n @F604 E-Mail Body Text (cont.) This field is used in combination with @F603 to split long text to multiple data fields. The text in the @F604 field is always appended at the end of the text. The data field @F604 can be used as often as required @F605 E-Mail Format Specify the email file format (tif, gif, bmp, pdf) and/or the resolution. Example: @F605 gif,[email protected] @F606 E-Mail Attachment Append files in original format to an email. Multiple files can be separated with a comma (,). The files need to be located on the fax server. As optional parameters you can use D (Delete = delete file after transmission) and R (Required = file is required, otherwise the message is not sent). Example: @F606 c:\dat\prices.pdf, c:\word\mailing.doc, [email protected] @F607 This data field is used to specify a reply-to email adfdress that is different from the senders email address @F608 E-Mail Confirmation This data field is used to request a confirmation from the recipient of the email that the email has been @F700 Accumulated Document This data field creates an accumulated document with the given reference number. If an accumulated document with that reference number already exists, the print job is added. As an optional parameter you can also specify a timeout in seconds after that the accumulated document is automatically terminated. The reference number needs to be a numeric value between 1 and 999,999,999. Examples: @F700 [email protected], @F700 1234,[email protected] @F701 Accumulated Doc End This data field terminates an accumulated document with the given reference number. Example: @F701 [email protected] @F702 Attachment Append files to the fax. The file format for the attachment needs to be either a text file or a file created through the ActiveFax printer driver. Multiple files can be separated with a comma (,). The files need to be located on the fax server. Example: @F702 c:\data\[email protected] ActFax User’s Manual 97 @F703 Overlay on/off Turns an overlay on/off (0=off, 1=on). When using 0+ or 1+, the overlay is turned on/off on the following page rather than on the current page @F000 Import Image Embed a bitmap into the document 5.3.4. Special Data Fields Please note that not all of the above data fields are data fields in the literal sense. Special fields are for example @F299, @F500, @F501, @F599 and @F000. The special meaning of these fields is described on the following pages. 5.4. Examples for Data Fields It is recommended to have a look at the sample file “sample.txt” to see how data fields are used. This file is automatically copied to the installation directory of the fax server. The file demonstrates how data fields, bitmap files and document formation with HP-LaserJet (PCL) printer commands can be done. Especially when sending fax messages from UNIX or Linux systems, this file would be a good point to start when integrating data fields. 5.4.1. Example 1 Recipient .......................... +43 1 1122 3344-12 Subject ............................. Purchase Order 123456 @F211 +43 1 1122 [email protected] @F307 Purchase Order [email protected] 5.4.2. Example 2 Sender .............................. Duncan Inc., +1 555-123-4567 Recipient .......................... Brown Import & Export, 0043 1 9072544 @F101 Duncan [email protected]@F110 +1 [email protected] @F201 Brown Import & [email protected]@F211 0043 1 [email protected] 5.4.3. Example 3 Sender .............................. Duncan Inc., 555-123-4567 Recipient 1 ....................... Miller Ltd., Fax: 444-110-2020 Recipient 2 ....................... Smith Inc., Fax: 333-220-3030 Recipient 3 ....................... Brown Corp., E-Mail: [email protected] Subject ............................. Latest Pricelist Xmit Date ......................... 31.01.2015 Xmit Time ......................... 20:15 Priority ............................. Low ActFax User’s Manual 98 @F101 @F201 @F201 @F201 @F307 @F301 Duncan [email protected]@F110 [email protected] Miller [email protected]@F211 [email protected]@[email protected] Smith [email protected]@F211 [email protected]@[email protected] Brown [email protected]@F212 [email protected]@ Latest [email protected]@F303 [email protected]@F304 20:[email protected] [email protected] The data field @F299 has been used as a delimiter between the single recipients in that example. Since this data field is only used as a delimiter, no content is required for that field. 5.4.4. Example 4 This example demonstrates how to embed bitmaps into a fax message using the special in the following section of this chapter. Yours sincerely @F000 [email protected] 5.5. Embedding Bitmaps into Fax Messages ActiveFax can be used to embed bitmaps at any position of a fax message. That way it would be possible to easily integrate individual company logos or signatures. Embedded bitmaps are normally used for fax messages that have been created on UNIX or Linux systems or other non-Windows operating systems. Quite similar to the syntax of data fields, bitmaps can be embedded into fax documents using the following syntax: Syntax: @F000 file[,X<pos>][,Y<pos>][,width-mm[,height-mm]]@ Example: @F000 sign.bmp,[email protected] The parameters X<pos> and Y<pos> as well as width-mm and height-mm are optional. If you do not specify these parameters, the size of the bitmap is automatically calculated. ActiveFax uses a default resolution of 300 dpi when calculating the size of the bitmap in that case. The parameters X<pos> and Y<pos> can be used to specify the exact position of the bitmap in mm (e.g. X100,Y75) measured from the upper left corner. It is recommended to only use bitmaps of the type Uncompressed Windows Bitmap (.bmp). It is recommended to use .bmp files in monochrome format (1-bit color depth). If you do not specify a path for the bitmap file, the file is automatically searched in the installation directory of the fax server (normally C:\Program Files\ActiveFax\Server). ActFax User’s Manual 99 5.5.1. Example 1 Bitmap with a default resolution of 300 dpi. Yours sincerely @F000 [email protected] 5.5.2. Example 2 Bitmap located in the directory C:\SCAN with a width of 50 mm (height calculated automatically). Yours sincerely @F000 c:\scan\mike.bmp,[email protected] 5.5.3. Example 3 Bitmap with a width of 50 mm and a height of 30 mm at position 100 mm x 75 mm. Yours sincerely @F000 mike.bmp,50,30,X100,[email protected] When having a .jpg file with the same file name as the original .bmp file stored at the same location as the .bmp file, the .jpg file is automatically used by the fax server whenever PDF documents are generated (i.e. companylogo.bmp and companylogo.jpg). The .jpg file should be of the same size as the.bmp file; the color format of the .jpg file should be RGB 24-bit. That way it would be possible to automatically use color bitmaps and logos for PDF documents generated by the fax server. The number of bitmaps that can be embedded into a single fax document is not limited. For an example of embedded bitmaps, have a look at the enclosed sample file “sample.txt”. This file is automatically copied to the installation directory of the fax server and is a good point to start when adding bitmaps to documents. 5.6. Embedding Data Fields into Applications 5.6.1. Windows Applications The easiest way to specify data fields from within Windows applications is to add them to the document name when printing. You just need to add the data fields at the end or at the beginning of the document name in that case. ActFax User’s Manual 100 Example: Document Name .............. Purchase Order 12345 Recipient .......................... Duncan Inc. Fax Number ...................... 555-123-4567 Purchase Order [email protected] Duncan [email protected]@F211 [email protected] As an alternative it would also be possible to embed data fields directly in the document. When using this method, it is important to format the data fields with the “ActiveFax” font. If you do not format data fields with that font, the data fields are ignored and printed as visible text on the document. Take care, that no additional text styles (bold, italic, underline) are allowed when formatting data fields with the ActiveFax font. Have a look at the enclosed sample file “Sample.rtf” for an example of data fields used directly in a document. This file is automatically copied to the installation directory of the fax server (C:\Program Files\ActiveFax\Server by default) and is a good point to start when adding data fields to a document. You can open that file with Microsoft® Word or Windows WordPad. 5.6.1.1. Reference File for Data Fields Another way to specify data fields is using an external reference file. The advantage of this method is that you do not have to set all data fields directly in the document name or the document itself. When using this method you just have to add a single data field, which is a reference to the file with the remaining data fields. The link to the reference file is done with the data field @F500 [email protected] in that case. Take care to use a unique file name for the ActFax User’s Manual 101 reference file to avoid conflicts with other fax jobs. After the print job has been processed, the reference file is automatically deleted by the fax server to ensure it is not re-used for other print jobs. Example: Document Name .............. Purchase Order 12345 Reference File .................. c:\tmp\ref251173.dat Purchase Order [email protected] c:\tmp\[email protected] In that example the data fields are located in the file c:\tmp\ref251173.dat. There is no special format required for the data fields in the reference file. It would be possible to write each data field to a separate line or to write all data fields in a single line. 5.6.1.2. Split Print Jobs (Mail Merge Documents) Sometimes it can be required to break up a single print job into multiple fax jobs (i.e. when using the mail merge function of Microsoft® Word). In that case the data field @[email protected] can be used to start a new fax job within a print job. When using the data field @[email protected] on a page, a new fax job is started on that page including all following pages up to the next @[email protected] data field. This data field is necessarily required when printing mail merge documents from Microsoft® Word, since Word generates a single huge print job for all fax pages of the mail merge document. 5.6.1.3. Example in Programming Language C DOCINFO BYTE BYTE BYTE DocInfo; szText[1024]; szName[128]; szFax[128]; lstrcpy(szName, "Duncan Inc."); lstrcpy(szFax, "555-123-4567"); wsprintf(szText, "Purchase [email protected] %[email protected]@F211 %[email protected]", szName, szFax); DocInfo.cbSize = sizeof(DOCINFO); DocInfo.lpszDocName = szText; DocInfo.lpszDatatype = NULL; ..... 5.6.2. UNIX, Linux and other Operating Systems To embed data fields in UNIX, Linux or other non-Windows operating systems, you can insert the data fields directly into the document as normal text (no special font is needed). The fax server automatically filters and evaluates the data fields, so they are not visible on the fax message. Such data fields can be added at any position of the document. Have a look at the enclosed sample file “sample.txt” for an example of data fields added to documents in UNIX and Linux. This file is automatically copied to the installation directory of the fax server and would be a good point to start for own projects. Please note that it is also ActFax User’s Manual 102 possible to use printer commands of HP-LaserJet (PCL), Epson-LQ and optionally Postscript and PDF to format fax messages. 5.6.2.1. Example in Programming Language C char char int char char szName[128]; szFax[128]; nPriority; szSubject[128]; szText[1024]; lstrcpy(szName, "Duncan Inc."); lstrcpy(szFax, "555-123-4567"); nPriority = 1; lstrcpy(szSubject, "Purchase Order 12345"); wsprintf(szText, "@F201 %[email protected]@F211 %[email protected]@F301 %[email protected]@F307 %[email protected]", szName, szFax, nPriority, szSubject); ..... 5.6.2.2. Example in Programming Language INFORMIX 4GL DEFINE faxdata RECORD name fax priority subject END RECORD CHAR(128), CHAR(128), SMALLINT, CHAR(128) faxdata.name = "Duncan Inc." faxdata.fax = "555-123-4567" faxdata.priority = 1 faxdata.subject = "Purchase Order 12345" PRINT "@F201 PRINT "@F211 PRINT "@F301 PRINT "@F307 ..... ", ", ", ", ActFax User’s Manual faxdata.name CLIPPED, "@"; faxdata.fax CLIPPED, "@"; faxdata.priority USING "#&", "@"; faxdata.subject CLIPPED, "@" 103 ActiveFax can notify you whenever a new software update is released. The automatic notification about new software releases can be configured with the menu Help / Check for Updates. By default, the update notification is already enabled. As soon as a new software update is released a notification message will be displayed on the fax server. If you have enabled email Before an update is downloaded from the Internet and installed on the system, you always need to confirm the update process. Under no circumstances, updates are automatically installed without asking the Administrator of the fax server first. Please note, that the check for new updates can only be done when the fax server PC is connected to the Internet. The fax server uses HTTP port 80 to check for updates. If this port is blocked by your firewall, it would be important to configure an exception for that port in the firewall. Please note, that you always only need to install the latest update. Any updates that have been released between your existing ActiveFax version and the latest ActiveFax version do not need to be installed. If your ActiveFax installation is a mixed installation of 32-bit and 64-bit systems or when using an installation with multiple languages, the fax server automatically downloads all files required for the update of the fax server and all fax clients. new software release can therefore be displayed with a delay of a few days compared to the release date of the update. ActFax User’s Manual 104 A manual check for new software updates can be done at any time through the menu Help / As soon as an update has been installed on the fax server, the update is also automatically on the fax clients can be configured with the menu Help / Check for Updates. The notification of fax clients is not enabled by default. The installation of an update on the fax client is always only done when the user confirms the update. Under no circumstances an update is automatically installed on a fax client without asking the user first. 6.4. Update Period New ActiveFax licenses automatically include free updates for 2 years. If you want to install an update after the update period has been reached, an update package would be required website www.actfax.com. Using the menu File / License Settings you can check the update period included with your The lifetime of a license is not affected by the update period. In general, licenses are always valid without a time limit. After the update period of a license has been reached, the license remains valid and the software can still be used without any limitations in the version that is installed on the system. ActFax User’s Manual 105 7. Appendix 7.1. Glossary 16-bit: The term “16-bit” is used for applications that are designed for the operating system Windows 3.x. 16-bit applications can also be executed on newer Windows version, but they do not fully use the new features of these operating systems. 32-bit: The term “32-bit” is used for applications designed for Windows 95 and newer. A 32-bit application is using the functions of the operating system more efficient than a 16-bit application and is therefore running faster and more stable. 32-bit applications cannot be executed on Windows 3.x. 64-bit: Starting with Windows XP, Microsoft® offers Windows as a 32-bit and as a 64-bit version. The main advantage of 64-bit Windows is that it can address more physical memory compared to 32-bit Windows. The overall performance of the fax server is almost identical on 32-bit and 64-bit Windows systems. Analog: The opposite of “digital”. Analog numbers can have any values, whereas digital numbers can only have values of a defined scale. For fax transmissions the term “analog” is usually used for the common phone network, whereas the term “digital” is used as a synonym for ISDN. ANSI: Abbreviation for “American National Standard Institute”. The ANSI standard for example defines the ANSI character set or the programming language ANSI C. API: Abbreviation for “Application Programming Interface”. The API defines a group of functions that is used for the processing of specific tasks. ASCII: Abbreviation for “American Standard Code for Information Interchange”. This code defines unique numbers for characters, numbers and other special and control characters. The values of the ASCII code are between 0 and 255 (at 7-bit between 0 and 127). Baudrate: Unit for the step rate of a modem. Baudot, who is giving the Baudrate its name, was a French engineer, who developed the Baudot-Code, which was used prior to the ASCII-Code. Please note that the terms Baudrate and Bitrate do not identify the same unit. Bit. A bit is the smallest possible information unit on a computer. A bit can have two different conditions (0 or 1). By concatenating multiple bits, every kind of information can be stored. In computers, 8 single bits usually build one so called Byte. Therefore a byte can store 256 different values. Bitrate: Unit for the data bits that are transferred in a given time period. This unit usually describes the numbers of transferred bits within one second. Please note that the term Baudrate and Bitrate do not identify the same unit. Broadcast: The term “Broadcast” means a sending method that accesses all devices in a network. Broadcast calls are mainly used to search for resources in a network. CAPI: Abbreviation for “Common ISDN API”. This defacto standard of the German company AVM is defining a programming interface for ISDN adapters of different manufacturers. ISDN adapters, which support at least CAPI version 2.0, can be used for the transmission of fax messages. CCITT: Abbreviation for “Comité Consultatif International Téléphonique et Télégraphique”. This committee is responsible for the standardization of telecommunication standards. See also ITU. Class 1/2/2.0: Standard for fax modems. Depending on the modem type, usually at least one of these standards is supported by a fax modem. ActFax User’s Manual 106 Client: A Client is a software program that is used to retrieve and process data from a so called Server. COM-Port: Other name for a serial interface (Communication Port) of a personal computer. CSID: The term “CSID” is used for the sender identification of a fax message. The CSID is transmitted with every fax messages and usually contains the fax numbers of the sender in international format. DCE: Abbreviation for “Data Communication Equipment”. The term “DCE” is usually used for modem devices. DLL: Abbreviation for “Dynamic Link Library”. Other than EXE files, DLL files cannot be directly executed. A DLL usually contains program code that is dynamically loaded by other executable programs. DTE: Abbreviation for “Data Terminal Equipment”. The term “DTE” is usually used for a computer. Digital: The opposite of “analog”. Digital numbers can only have values of a specified scale, whereas analog numbers can have any values. For fax transmissions the term “analog” is usually used for the common phone network, whereas the term “digital” is used as a synonym for ISDN. EIA: Abbreviation for “Electrical Industry Association”, the Association of the American Electronic Industry. The EIA for example, has standardized the serial interface (RS-232). Fax: A fax or also called facsimile is used to exchange image data between two fax machines. The images are usually compressed according to the compression standard “G3”. Fax-On-Demand: The term “Fax-On-Demand” means, receipt of a document from a so called Fax-OnDemand Server. FTP: Abbreviation for “File Transfer Protocol”. This protocol is mainly used for copying files. The FTP protocol, which was initially only used on UNIX system, is nowadays also used on the Internet. In ActiveFax, the FTP protocol can also be used for the creation of fax messages. G3 Fax Mode: The fax mode usually used for fax transmissions. The “G3” standard is specifying the compression method, the transfer speed (maximum 14.400 bps) and other parameters. GDI: Abbreviation for “Graphics Device Interface”. Under Microsoft® Windows, the GDI is used for painting the contents of a window and for printing purposes. Handshake: At the beginning of each fax transmission, the transmission speed has to be negotiated between the two fax devices (modems). This synchronizing phase is also called handshaking phase. HDLC: Abbreviation for “High Level Data Link Control”, the protocol used for synchrony data exchange. ISDN: Abbreviation for “Integrated Services Digital Network”. Using ISDN, all data and speech information is transmitted in digital format. Since this way of data exchange is usually much more stable and faster than analog data exchange, it is perfect for computer use. Other than the “normal” phone network, ISDN offers a lot of extra services, like direct dial information or charging information. ITU: The new name of CCITT. Least Cost Routing: Least Cost Routing is used to automatically identify the cheapest possible phone connection for a specific destination. LPD: Abbreviation for “Line Printer Daemon”. This protocol is usually used on UNIX systems for print jobs on network based printers. Modem: Abbreviation of the two words MOdulator and DEModulator. A modem is transforming the digital signals of a computer into analog signals (sounds). The other modem device is reconverting these sounds back to digital signals ActFax User’s Manual 107 MSN: Abbreviation for “Multiple Subscriber Number”. A MSN is used in ISDN and specifies different unique phone numbers for a single phone line. Named Pipe: Named Pipes are used in the NetBeui network protocol for data exchange. Named Pipes can be used in ActiveFax to directly send fax messages to the Fax Server. Named Pipes have to be specified using the format “\\server\pipe\pipename”. NetBeui: The NetBeui protocol, also called Windows Network, is used for the data exchange between two computers. The NetBeui protocol is only compatible with the Windows operating system and can also be used with ActiveFax when the Fax Server has been installed on either Windows XP / 2003 / Vista / 2008 / 7 / 2012 / 8 / 10. ODBC: Abbreviation for “Open Database Connectivity”. This standard is used for the data exchange between applications and database servers. Offline: The condition of a modem or other device, which means, that the device do not have an active connection. Online: The condition of a modem or other device, which means, that the device is having an active connection. Other Party: The term “Other Party” identifies the other fax device or fax modem. Overlay: An Overlay is used in ActiveFax to fade in some text or bitmaps (i.e. logos) into a fax message. PC: Abbreviation for “Personal Computer”. This term is usually used for all computers that are compatible to IBM Personal Computers. Polling: The term “Polling” is used for the receipt of a document from a so called Fax-On-Demand Server. Processor: The processor is often called the brain of a computer. All important tasks are controlled by the processor of a computer. Queue: The term “Queue” is usually used in the LPD protocol. A unique queue name is used to identify a single printer on LPD. RAM: Abbreviation for “Random Access Memory”. The RAM is the so called working memory of the computer. The content of the RAM is lost as soon as the computer is turned off, so the RAM can only be used to temporary store information. Serial Interface: Communication interface, where the data is sent one bit after the other. With serial data exchange, you only need to have one data line for sending and one line for receiving. Server: A Server is a software program that stores data which is made available to so called Client applications. Service: A service is used by the Windows operating system and means an application that is already executed during the boot time of the computer. One of the big advantages of a service is that it is always active, even when there is no user logged on. SMTP: Abbreviation for “Simple Mail Transfer Protocol”. This protocol is used in the Internet for E-Mail transmissions. Stream Socket: A data connection that is based on the TCP/IP network standard. T.4: Standard for the compression of fax data. T.30: Standard for the transmission of fax data. ActFax User’s Manual 108 T.38: Standard for the transmission of fax data over IP networks. TCP/IP: The TCP/IP protocol is a network protocol which is mainly used on the UNIX operating system and on the Internet. Nowadays TCP/IP is also widely used on Windows systems. TFTP: Abbreviation for “Trivial File Transfer Protocol”. This protocol is mainly used on the UNIX operating system and its primary use is the transfer of files. Nowadays the TFTP protocol is only used for some special reasons. In ActiveFax, TFTP can also be used for the creation of fax messages. Thread: A thread is a part of an application which is usually executing independently from the rest of the application. Timeout: A timeout is a specified amount of time, a given task may last. If a task is not completing within the timeout period, the specific task usually will be aborted. UNC: The default format of a path on the Windows network. The format of an UNC is “\\server\export\path\filename”. Unicode: A 16-bit character set, which can be used to code all currently existing characters. The operating system Windows NT is using Unicode only on system level. UNIX: An operating system, which has been developed by AT&T. UNIX is mainly used for multi user systems. Nowadays there exist a lot of UNIX derivatives; the operating system LINUX is one of the most famous UNIX derivatives. Other important UNIX derivatives are HP/UX, AIX and SCO-UNIX. VoIP: Abbreviation for “Voice over IP”. This standard is used for phone calls done through IP networks. Web Browser: A Web Browser is a software, that is used to display so called web pages on the local computer (i.e. Netscape, Internet Explorer, ...). Windows: The term “Windows” usually means the operating system of Microsoft®. World Wide Web: Also known as “the Web”. The World Wide Web is the global part of the Internet. Web Pages and other resources are linked together by so called Hypertext-Links. Therefore it is possible to access every web page from any location. Web Browsers are used to display the pages of the World Wide Web. WWW: Abbreviation for “World Wide Web”. WYSIWYG: Abbreviation for “What you see is what you get”. This means, that the document displayed on the screen is exactly of the same shape than the printout. XON/XOFF: Software method that is controlling the flow of the data transmission over a serial interface. The XON/XOFF protocol is using the ASCII codes 17 and 19 to control the flow of the transmitted data. ActFax User’s Manual 109 7.2. Keyboard Hotkeys Hotkey Function F3 F4 F5 F6 F7 F10 Phone Book Transmission Protocol Charge Optimization Execute Polling (Fax-On-Demand) Cover Page Designer Ctrl 1 Ctrl 2 Ctrl 3 Ctrl A Ctrl C Ctrl F Ctrl N Ctrl O Ctrl P Ctrl S Ctrl Z Rotate incoming fax message by 90° Rotate incoming fax message by 180° Rotate incoming fax message by 270° Select all entries of the faxlist Show or hide the communication window Show or hide the faxlist Create a new Instant Fax Message Create a new fax message from a file Print Save Suspend outgoing fax messages Ctrl Page-down Ctrl Page-up Display next page Display previous page Alt Enter Alt F4 Display fax dialog Close a window or the entire application Cursor down Cursor up Cursor left Cursor right Page-down Page-up Scroll the fax view down one line Scroll the fax view up one line Scroll the fax view to the left Scroll the fax view to the right Scroll the fax view down one page Scroll the fax view up one page Ctrl & Left mouse button Shift & Left mouse button Select multiple entries of a list view Select a from/to range of a list view ActFax User’s Manual 110 7.3. Frequently Asked Questions - FAQ to the questions are kept short, since detailed information about specific topics is also available in the corresponding chapters of this manual and in the online help of ActiveFax. Please note that additional FAQ are also available through the official ActiveFax website at www.actfax.com/en/faqs.html. Question: Is it possible to automatically start the fax server when the computer is booting? Using the menu option File / Automatic Startup, ActiveFax can be configured to automatically start during boot time. Question: Is it possible to select multiple entries of the faxlist at the same time? Using the Ctrl key and Shift key it is possible to select more than one entry of any list (not only the faxlist). Question: Is it possible to change the sort order of the faxlist? Clicking with the left mouse button on a column header changes the sort order of the faxlist. The Shift key can be used to specify multiple columns for sorting. Question: How can I quickly find a fax message again? The fastest way to find a specific fax message is to specify a search term in the search field of the faxlist. Question: How can I send a fax message from UNIX or Linux systems? Usually fax messages from UNIX or Linux systems are sent using the LPD/LPR protocol. When using LPD/LPR, ActiveFax is accessed exactly the same way as any other network printer. Question: Is it possible to change the default resolution used for outgoing fax messages? Using the Modem tab of menu option Extras / Options it is possible to change the preferred resolution (fine or normal) for outgoing as well as for incoming fax messages. Question: Is it possible to change the time interval for redialing? Using the Redialing tab of the menu option Extras / Options it is possible to specify an individual delay for each transmission attempt. Question: How can I archive a fax message? ActFax User’s Manual 111 Fax messages are normally automatically archived by ActiveFax. Through the Archive tab of menu option Extras / Options, the settings for the archive function can be individually configured. Please note that it is also possible to manually move fax messages to the archive. Question: Is it possible to automatically print fax messages or sending reports? Through the Printing tab of the menu option Extras / Options the settings for the automatic printing function and the sending report can be configured. Please note that the settings for automatic printing can also be individually configured for each user through the User Administrator. Question: Is it possible to automatically print the transmission protocol? Using the Printing tab of the menu option Extras / Options the settings for automatic printing of the transmission protocol can be configured. Question: Is it possible to change the information printed in the fax title? Using the Fax Title tab of the menu option Extras / Options the appearance of the fax title can be individually changed. Question: Is it possible to display a notification message upon receipt of a new fax message? Using the General tab of the menu option Extras / Options it is possible to activate this feature with the option Display notification message upon receipt of new fax messages. Question: Is it possible to automatically use the best (cheapest) transmission time for a fax message? Using the menu option Extras / Charge Optimization it is possible to configure the settings for the automatic optimization of transmission times. Question: Where can I specify the default parameters for the sender of a fax message? Using the menu option Extras / Predefined Settings the default parameters for the sender of fax messages can be configured. Please note that it is also possible to individually configure different settings for each user with the User Administrator. Question: Is it possible to protect fax message against unauthorized access? Using the menu option Extras / Security Settings it is possible to activate the security settings of ActiveFax. Question: Is it possible to create private fax messages only visible to the owner of the fax? Using the fax dialog window and the More Settings tab you can activate the option Private Fax Message to mark a fax message as private. ActFax User’s Manual 112 7.4. Problem Solutions Please note that additional problem solutions are also available through the Knowledge Base on the official ActiveFax website at www.actfax.com/en/kbase.html. Problem: Solution: The modem is dialing, but the connection cannot be established. Check whether tone or pulse dialing has to be used with the phone line. You should also make sure that you do not have to use a dial prefix for outgoing calls. When using a phone system (PBX) you should take care, that the option Wait for Dial Tone before Dialing is turned off. You should also try to dial the number with a different communication program (i.e. HyperTerminal) to check if the modem is ok. Problem: Solution: During the transmission of fax messages I often get transmission errors. Go to the modem configuration (menu Communication / Modem) and press the Extended button to change the settings for the modem. Disable the options Enable MR-Compression, Error Correction Mode and Allow Transfer Rates faster than 9.600 bps there. Problem: The connection between the fax server and the fax client cannot be established using the TCP/IP protocol. Use the PING command to make sure that the connection between the server and the client computer is ok. Make sure that the TCP/IP protocol is properly installed on the client and server computer. It could also help to reboot the system. Solution: Problem: Solution: The connection between the fax server and the fax client cannot be established using the NetBeui protocol (Windows Network). Check if the computer name of the server PC is listed in the Windows network list or use the Windows search function to check if the computer can be found in the network. Make sure that you have permission to connect to the server computer. It could also help to reboot the system. Problem: Solution: The TCP/IP port for the LPD server is already in use by another application. Close the other application or stop the service of that application. Please note that ActiveFax can also be used to redirect LPD print jobs to local printers. Problem: Solution: The printout of fax messages takes very long on laser printers. Use a maximum resolution of 300 dpi for printing in that case. Especially when using HP laser printers with insufficient memory installed you should disable the option Page Protection in the printer properties to save resources. Problem: Solution: Not all serial interfaces (COM ports) are listed in the modem configuration. The automatic port detection of Windows is not working correctly in that case. It is recommended to disable automatic COM port detection using the General tab of the menu option Extras / Options. ActFax User’s Manual 113 Problem: Solution: Received fax messages and fax messages from Windows applications are displayed incompletely. Choose the menu option Extras / Options and disable the option Enable Processing of Bitmaps above the 64K-Limit in the General tab. Problem: Solution: The system is very slow during transmission of fax messages. Choose the menu option Extras / Options and disable the option Enable Realtime Communication with the Modem Devices (Realtime-Priority) in the General tab. Problem: Data exchange with an ODBC database is not working and the program is terminating with a “General Protection Fault” message. This is usually caused by a bug in the ODBC driver. In such case, you should try to get the latest version of the ODBC driver from the manufacturer of the database. Solution: Problem: Solution: Problem: Solution: When sending fax messages using an ISDN adapter, it sometimes happens, that fax messages are transmitted twice as long as the original document. The ISDN adapter ignores the fax parameter for the resolution of the remote fax machine in that case and it is recommended to install the latest version of the ISDN driver (CAPI driver). I have forgotten the Administrator password and cannot access the fax server anymore. ActFax User’s Manual 114 7.5. Sample Applications Integration of ActiveFax in other applications is very simple. When using data fields, it is possible to specify the fax parameters (i.e. recipients fax number, subject, priority, etc.) already from within an application. Especially applications not running on Windows based operating systems (i.e. UNIX, Linux, DOS, etc.) can take advantage of the support of HP-LaserJet (PCL) and Epson-LQ printer commands for fax formatting. This chapter includes two examples that demonstrate how data fields can be embedded with applications. The examples have been designed as simple as possible to point out how data fields are added to the program code. Please note that the source codes for the sample applications as well as the executable files are available in the ActiveFax installation directory on the fax server. The sample files are located in the Server\Samples directory on the fax server. 7.5.1. Windows Application (WinApp.exe) This example in programming language C is used to demonstrate how data fields can be used with Windows applications. This sample application uses normal Windows API calls for printing. 7.5.1.1. Program Summary        Program starts at WinMain() Open the dialog box IDD_MAIN with DialogBox() Initialize the dialog box with WM_INITDIALOG Call the function PrintDocument() in WM_COMMAND Evaluate the dialog box fields with SendDlgItemMessage() Generate the document name for printing (add data fields) Check if we want to print without displaying the fax dialog ActFax User’s Manual 115      Open the “ActiveFax” printer with CreateDC() Create a new document with StartDoc() and StartPage() Write the message text with DrawText() Close the document with EndPage() and EndDoc() Close the printer with DeleteDC() 7.5.1.2. Source Code #include <windows.h> #include "resource.h" // This font is used for the message text LOGFONT LogFontText = {20, 0, 0, 0, FW_NORMAL, 0, 0, 0, DEFAULT_CHARSET, OUT_DEFAULT_PRECIS, CLIP_DEFAULT_PRECIS, DEFAULT_QUALITY, DEFAULT_PITCH | FF_DONTCARE, "Times New Roman"}; // Function prototypes LRESULT WINAPI DialogProcMain(HWND, UINT, WPARAM, LPARAM); BOOL PrintDocument(HWND); //-----------------------------------------------------------------------------------------// This is the main Windows function //-----------------------------------------------------------------------------------------int WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, LPSTR lpCmdLine, int nCmdShow) { // Create the main dialog window DialogBox(hInstance, MAKEINTRESOURCE(IDD_MAIN), NULL, DialogProcMain); return 0; } //-----------------------------------------------------------------------------------------// This function handles the messages of the dialog box //-----------------------------------------------------------------------------------------LRESULT WINAPI DialogProcMain(HWND hWnd, UINT uMsg, WPARAM wParam, LPARAM lParam) { switch (uMsg) { case WM_INITDIALOG: // Initialize the dialog box items SendDlgItemMessage(hWnd, ID_PRIORITY_NORMAL, BM_SETCHECK, BST_CHECKED, 0); SendDlgItemMessage(hWnd, ID_MESSAGE_TEXT, WM_SETTEXT, 0, (LPARAM) "Enter the text of the fax message here!"); return TRUE; break; case WM_COMMAND: switch (LOWORD(wParam)) { case ID_PRINT: // Execute the printing routine PrintDocument(hWnd); break; case ID_CANCEL: // Terminate the application EndDialog(hWnd, FALSE); break; } break; } return FALSE; } //-----------------------------------------------------------------------------------------// This function is used to print (fax) the message //-----------------------------------------------------------------------------------------BOOL PrintDocument(HWND hWnd) ActFax User’s Manual 116 { BYTE BYTE BYTE BYTE int BOOL RECT DOCINFO HDC HANDLE HANDLE szMessageText[1024]; szDocumentName[512]; szFaxNumber[128]; szSubject[128]; nPriority; bAuto; rRectText; DocInfo; hDC; hFontText; hFontOrig; // Retrieve the message text SendDlgItemMessage(hWnd, ID_MESSAGE_TEXT, WM_GETTEXT, sizeof(szMessageText), (LPARAM) szMessageText); // Retrieve the fax number SendDlgItemMessage(hWnd, ID_FAX_NUMBER, WM_GETTEXT, sizeof(szFaxNumber), (LPARAM) szFaxNumber); // Retrieve the subject SendDlgItemMessage(hWnd, ID_SUBJECT, WM_GETTEXT, sizeof(szSubject), (LPARAM) szSubject); // Retrieve the priority and set the correspond priority value (1, 25, 50 or 99) if (SendDlgItemMessage(hWnd, ID_PRIORITY_LOW, BM_GETCHECK, 0, 0) == BST_CHECKED) { nPriority = 99; } if (SendDlgItemMessage(hWnd, ID_PRIORITY_NORMAL, BM_GETCHECK, 0, 0) == BST_CHECKED) { nPriority = 50; } if (SendDlgItemMessage(hWnd, ID_PRIORITY_HIGH, BM_GETCHECK, 0, 0) == BST_CHECKED) { nPriority = 25; } if (SendDlgItemMessage(hWnd, ID_PRIORITY_VERY_HIGH, BM_GETCHECK, 0, 0) == BST_CHECKED) { nPriority = 1; } // Retrieve the options bAuto = (BOOL) (SendDlgItemMessage(hWnd, ID_AUTO, BM_GETCHECK, 0, 0) == BST_CHECKED); // Create the document name. The document name itself is "Testfax", // the rest are data fields wsprintf(szDocumentName, "[email protected] %[email protected]@F307 %[email protected]@F301 %[email protected]", szFaxNumber, szSubject, nPriority); // Check whether we want to see the fax dialog if (bAuto) { lstrcat(szDokumentname, "@[email protected]"); } else { lstrcat(szDokumentname, "@F501 [email protected]"); } // Open the printer hDC = CreateDC(NULL, "ActiveFax", NULL, NULL); // The printer name is always ActiveFax if (hDC == NULL) { MessageBox(hWnd, "The printer 'ActiveFax' cannot be found!", "Error", MB_OK | MB_ICONSTOP); return FALSE; } // Set the document information structure ZeroMemory(&DocInfo, sizeof(DocInfo)); DocInfo.cbSize = sizeof(DOCINFO); DocInfo.lpszDocName = szDocumentName; // Start a new document StartDoc(hDC, &DocInfo); // Create a new page StartPage(hDC); // Create and select an object for the font hFontText = CreateFontIndirect(&LogFontText); hFontOrig = SelectObject(hDC, hFontText); // Draw the message text SetRect(&rRectText, 50, 100, 2300, 3000); DrawText(hDC, szMessageText, lstrlen(szMessageText), &rRectText, DT_NOPREFIX | DT_WORDBREAK); ActFax User’s Manual 117 // Unselect and delete the font SelectObject(hDC, hFontOrig); DeleteObject(hFontText); // Finish the page EndPage(hDC); // Finish the document EndDoc(hDC); // Close the printer DeleteDC(hDC); return TRUE; } 7.5.2. Socket Application (Socket.exe) This sample application in programming language C demonstrates how data fields can be used in a program that uses TCP/IP Sockets to connect to the fax server. Since sockets are available in virtually all programming languages and operating systems (Windows, DOS, OS/2, UNIX, Linux, etc.) this is a simply way to send faxes if no other connection to the fax server is available. The connection to the fax server is done through stream sockets in that example. Please note that you first have to configure a RAW socket with the TCP/IP port number 3000 on the fax server; otherwise the connection to the fax server cannot be established. Follow these steps to configure a RAW socket on the fax server:  Choose the menu option Communication / RAW Server or double-click on the corresponding icon in the communication window.  Press the New button.  Set the option TCP/IP Connection with Stream Socket and enter the Port Number 3000.  Complete the configuration with OK. ActFax User’s Manual 118 7.5.2.1. Program Summary          Program starts at main() Data input with gets() Creating the fax message text with sprintf() Initialization of the socket library WinSock with WSAStartup() Create a new socket with socket() Establish a connection to the fax server (IP address 89.1.0.1, port 3000) with connect() Send the fax message with send() Close the socket with shutdown() and closesocket() Release the socket library with WSACleanup() 7.5.2.2. Source Code #include <stdio.h> #include <winsock.h> // Function prototypes int SendFax(char *, char *, char *); //-----------------------------------------------------------------------------------------// Main function of the program //-----------------------------------------------------------------------------------------int main(void) { char szFaxNumber[128]; char szSubject[128]; char szMessageText[512]; char szIP[128]; char szPort[128]; char szData[1024]; // Enter the data printf("Enter the fax number gets_s(szFaxNumber, 128); printf("Enter the subject gets_s(szSubject, 128); : "); : "); printf("Text of the fax message: "); gets_s(szMessageText, 512); printf("\n"); gets_s(szIP, 128); : "); printf("Port number : "); ActFax User’s Manual 119 gets_s(szPort, 128); printf("\n"); // Create a string for the fax message wsprintf(szData, "\033(s5H" "\033&d0D" "%s\n\n" "\033(s10H" "\033&[email protected]" "%s" "@F211 %[email protected]@F307 %[email protected]", szSubject, szMessageText, szFaxNumber, szSubject); // Send the fax message SendFax(szData, szIP, szPort); getchar(); return 0; } //-----------------------------------------------------------------------------------------// Send the fax message //-----------------------------------------------------------------------------------------int SendFax(char *MessageData, char *IP, char *Port) { SOCKET Socket; int nResult; // Initialize Windows Sockets if (nResult != 0) { printf("Error %d at WSAStartup()\n", nResult); return 0; } // Create a new socket Socket = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP); if (Socket == INVALID_SOCKET) { printf("Error %d at socket()\n", WSAGetLastError()); return 0; } // Establish a new connection if (nResult == SOCKET_ERROR) { printf("Error %d at connect()\n", WSAGetLastError()); return 0; } // Send fax data nResult = send(Socket, MessageData, lstrlen(MessageData), 0); if (nResult == SOCKET_ERROR) { printf("Error %d at send()\n", WSAGetLastError()); return 0; } // Close the socket shutdown(Socket, 1); closesocket(Socket); WSACleanup(); printf("The fax message has been created successfully\n"); return 1; } ActFax User’s Manual 120 7.6. Index A Access Verification ........................................ 44 Active Directory ............................................. 65 ActiveFax Installation .................................... 17 Alias Names ................................................... 60 Alternatives to LPD/LPR ................................ 31 Appendix ..................................................... 106 Archive........................................................... 50 Automatic Archive ................................... 50 Individual Archive Folders........................ 51 Manual Archive ........................................ 51 Authentication .............................................. 83 Automatic Printing ........................................ 61 General Settings....................................... 42 User Depending Settings ......................... 42 Automatic Redialing ...................................... 39 B Bitness 32-bit........................................................ 18 64-bit........................................................ 18 Blacklist ......................................................... 46 Block Incoming Fax Calls .......................... 46 Block Outgoing Fax Calls .......................... 46 Brooktrout ..................................................... 78 C Charge Optimization ..................................... 75 Compressed Printing ..................................... 41 Concept Fax-On-Demand ....................................... 14 Incoming Fax Message (Receiving) .......... 14 Configuration................................................. 58 Configuration Example .................................. 17 Configuring LPD Printers in UNIX .................. 30 HP-9000 (HP/UX) ..................................... 30 IBM RS/6000 (AIX) ................................... 30 Contents .......................................................... 5 Cost Account Codes....................................... 89 Create....................................................... 89 Select........................................................ 89 ActFax User’s Manual Cover Page Designer ..................................... 55 Creating Cover Pages / Overlays ............. 55 Using Color Images.................................. 56 Using Cover Pages / Overlays .................. 56 What is a Cover Page / Overlay? ............. 55 CSID....................................................14, 66, 68 Customizing Program Settings ...................... 21 D Data Fields .................................................... 32 Examples for Data Fields ......................... 98 Overview of the Data Fields .................... 93 Syntax of Data Fields ............................... 93 Why do I need Data Fields?..................... 93 Database ....................................................... 85 DDI ................................................................ 65 Delayed Transmissions ................................. 75 Demoversion ................................................ 18 Direct Dial Number ....................................... 14 DTMF ............................................................ 65 E E-Mail ............................................................ 82 Embedding Bitmaps into Fax Messages ....... 99 Embedding Data Fields into Applications ... 100 Epson-LQ....................................................... 32 Establishing a Client Connection ............ 21, 28 Examples for valid Fax Numbers .................. 33 External Configuration File options.cfg ........ 92 F FAQ ............................................................. 111 Fax Forwarding ............................................. 62 Fax Numbers ................................................. 33 Examples ................................................. 33 Format ..................................................... 33 Faxing from Windows Applications .............. 23 Faxlist ...................................................... 35, 37 Colors ...................................................... 35 Columns................................................... 35 Searching for Entries ............................... 37 Selecting Entries ...................................... 37 121 Sorting Entries.......................................... 37 Fax-On-Demand ...................................... 14, 48 Creating a Fax-On-Demand Document .... 48 Execute Polling ......................................... 48 File System .................................................... 25 File System (NFS, Samba) .............................. 31 Formatting Fax Messages.............................. 32 FTP ........................................................... 31, 74 FTP, TFTP and RAW Sockets .......................... 31 G Glossary ....................................................... 106 H Hardware Requirements ............................... 11 Help System................................................... 10 Hotkeys........................................................ 110 How to ... ....................................................... 23 access fax messages on other computers? ............................................................ 28 adjust the screen view? ........................... 34 automatically print a fax message? ......... 41 automatically redial failed fax transmissions? .................................... 39 block fax numbers? .................................. 46 change the faxlist columns? .................... 35 create a cover page or overlay? .............. 55 create a new fax message? ...................... 23 enter a fax number? ................................ 33 move fax messages to the archive? ......... 50 protect the data from unauthorized access?................................................ 44 select an entry in the faxlist? ................... 37 send a fax messages from UNIX? ............. 30 use multiple fax servers? ......................... 52 use the Fax-On-Demand Server? ............. 48 HP Digital Sending Software.......................... 91 HP LaserJet .................................................... 32 HP-9000 (HP/UX) ........................................... 30 HPGL .............................................................. 32 I IBM RS/6000 (AIX) ......................................... 30 Incoming Fax Messages................................. 14 Installation of the Fax Client ......................... 28 Installation procedure ................................... 18 Installing ActiveFax ........................................ 17 Customizing Program Settings ................. 21 ActFax User’s Manual Establishing a Client Connection ............. 21 Program Overview .................................. 17 Running the Setup ................................... 18 Instant Fax Messages.................................... 24 Introduction .................................................. 10 J JPG Files ................................................ 56, 100 K Keyboard Hotkeys....................................... 110 Knowledge Base.......................................... 113 L Least Cost Routing .................................. 77, 80 LPD/LPR .......................................11, 13, 17, 30 M Mail Merge Documents .............................. 102 Mail Server.................................................... 82 MSN .............................................................. 65 Multiple Fax Servers ..................................... 52 Configure ActiveFax Printers ................... 53 Configure Fax Clients............................... 52 N Named Pipes ................................................. 25 NetBeui ..............................................12, 21, 28 Network Scanners......................................... 91 NFS ................................................................ 31 O ODBC Database............................................. 85 options.cfg file .............................................. 92 Outgoing E-Mails .......................................... 14 Outgoing Fax Messages ................................ 13 P Passive Group Members............................... 64 Permissions ............................................. 44, 59 Phone Book................................................... 69 Postscript ...................................................... 32 Predefined Settings ...................................... 60 Problem Solutions ...................................... 113 Program Overview ........................................ 17 122 Fax Server ................................................ 12 R RAS ................................................................ 82 RAW Sockets ................................................. 31 Recycle Bin .................................................... 15 Redialing ........................................................ 39 Remote Access Service (RAS) ........................ 82 Report............................................................ 41 Routing of Incoming Fax Messages ............... 65 RS/232 Connection ........................................ 31 Running the Setup ......................................... 18 S Samba ............................................................ 31 Sample Applications .................................... 115 Sample Configuration .................................... 17 SCO UNIX ....................................................... 31 Screen Description ........................................ 15 Security Settings ............................................ 44 Sending Fax Messages with LPD/LPR ............ 31 Sending Report .............................................. 41 Serial Connection .......................................... 31 Setup program............................................... 18 SMTP Server .................................................. 82 SoftIP ............................................................. 78 Software Cocept Outgoing E-Mails...................................... 14 Software Concept .......................................... 12 Outgoing Fax Messages (Sending) ........... 13 Update Period ........................................ 105 Sorting of the Faxlist...................................... 37 SSL/TLS .......................................................... 82 STARTTLS ....................................................... 82 Symbols ......................................................... 11 System Requirements ................................... 11 Fax Client.................................................. 12 ActFax User’s Manual T T.38 ............................................................... 78 TCP/IP .................................... 12, 21, 28, 30, 31 TFTP .............................................................. 31 Time Limitation ............................................. 76 TR1034 .......................................................... 78 Transmission Protocol .................................. 72 TWAIN........................................................... 91 U UNIX ...................................................... 17, 102 Alias Names ............................................. 60 Archive (Export)....................................... 63 Automatic Printing .................................. 61 Fax Forwarding ........................................ 62 Group of Users ........................................ 64 Predefined Settings ................................. 60 User Permissions ..................................... 59 User Verification ........................................... 44 Using this Manual ......................................... 10 V Voice over IP ................................................. 78 VoIP............................................................... 78 W What is ActiveFax?........................................ 11 `
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.24309402704238892, "perplexity": 7902.590298261987}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590901.10/warc/CC-MAIN-20180719125339-20180719145339-00213.warc.gz"}
https://www.arxiv-vanity.com/papers/hep-ph/9406360/
Saclay, T94/078 Orsay, LPTHE 94/58 (June 1994) INTERMITTENCY AND EXOTIC CHANNELS A. Bialas On leave from: Institute of Physics, Jagellonian University, Reymonta 4, PL-30 059 Cracow, POLAND LPTHE, Bâtiment 211, Université Paris-Sud F-91405 Orsay, FRANCE R. Peschanski CEA, Service de Physique Théorique, CE de Saclay F-91191 Gif-sur-Yvette Cedex, FRANCE ABSTRACT It is pointed out that accurate measurements of short-range two-particle correlations in like-charge and in channels should be very helpful in determining the origin of the “intermittency” phenomenon observed recently for the like-charge pion pairs. Submitted to Phys. Rev. D (Brief Reports) It is now well established that the correlations between two pions at small relative momenta observed in different hadron-induced processes of multiparticle production are drastically different for the like and unlike pairs. The like pairs show the so-called “intermittency”  i.e. a strong (probably power-law) rise of the correlation function at small where Q2=(p1−p2)2=(p1+p2)2−4m2π is the square of the difference of particle momenta. This phenomenon finds a natural explanation in terms of quantum interference between identical particles (HBT correlations which is now commonly accepted This interpretation implies that the observed correlations have “geometrical” origin, i.e. they are related to the space-time structure of the volume from which the pions are emitted Before this picture is accepted, however, it is important to discuss if there perhaps exists other dynamical explanations for this phenomenon. In fact, it was already a long time ago pointed out and recalled recently that these effects can be related to another remarkable difference between and channels, namely their resonance structure. While the system contains many resonances, they are absent in the “exotic”  channels. It is of course an entirely open question if this difference implies or not a different behaviour of correlations at very low invariant mass. However, there exist an argument suggesting that this may actually be the case It can be summarized as follows. In the intermediate energy region, the amplitudes describing the cross-section are known to be dominated by exchange of Regge singularities in the -channel. The principle of duality implies that in the exotic channel the contribution of leading Regge poles exactly cancel each other We do not consider the Pomeron exchange contribution, as it is irrelevant for short-range correlations we are interested here.. Consequently, an exotic channel is dominated by exchange of singularities with low intercept It follows that the energy-dependent part of the cross-section is expected to fall with increasing invariant mass of the system following the power law σ∼(M2)α−1=(p1+p2)2(α−1) with Since there are no resonances in the exotic channel, this smooth behaviour is expected to hold even at relatively low energies. It is therefore perhaps not unreasonable to speculate that it continues even down to the threshold Of course the phase-space factors at the threshold must be corrected for. This, however, is to a large extent taken care of, when one considers normalized correlation functions .. This possibility is particularly suggestive, when compared to the data of Refs. which show precisely the same power law A closer look at the data shows that they follow a power law in rather than This is not a serious difficulty: the asymptotic formula (2), justified at large cannot distinguish these two possibilities. at small and medium . In contrast, for non-exotic channel the leading Regge poles do contribute, the intercept is much higher and, consequently, the expected dependence much weaker than in (2). Even more important, the presence of prominent resonances in the channel disturbs significantly the simple power-law behaviour and thus precludes its trivial continuation to the threshold. This completes the argument. Admittedly, it is not very convincing as it requires a rather bold extrapolation. We feel, however, that it should not be entirely dismissed, particularly in view of the experimental evidence shown in and Indeed, if one can (at least partly) explain the difference between like-change and unlike-change correlations without invoking quantum (HBT) interference, the interpretation of the existing data may be profoundly modified. Therefore it seems important to check carrefully this possibility. The main point of the present note is to indicate that there exists a feasible way to test these ideas and perhaps even to give access to a relative strength of the effects of quantum (HBT) interference and those of the exotic nature of the like-charge interactions. The idea is there exist particle combinations which are either (a) exotic but not identical (b) identical but non-exotic In the category (a) one can list and pairs. Since the particles are not identical, quantum interference cannot be responsible for short-range correlations. Therefore if the effect is present in channels it is probably due to their “exoticity”. In the category (b) one has channel. It is formed by identical particles, so if quantum interference is at work we expect a pattern similar to channel. On the other hand system forms with probability and with probability Only state is exotic and thus if the resonance structure is responsible we expect a weaker short-range correlation effect than in system. The early data of NA22 coll. and the more recent data of Aleph coll. indicate that the very short range correlations in the exotic channels, if present at all, are substantially weaker than in the channel. However, we feel that a precise comparison of the behavior at very small and at medium is necessary to assess correctly the role of exoticity in the channel. To summarize, we suggest that accurate measurements of short-range correlations in and channels, should help to determine the origin of the phenomenon of “intermittency”. It seems to us important to clarify this point before one can safely conclude that the present data can be attributed solely to the effect of quantum (HBT) interference. ACKNOWLEDGEMENTS We would like to thank Wolfram Kittel for the correspondence about data and Andrzej Krzywicki for interesting comments. This research was supported in part by the KBN grant REFERENCES 1 F. Mandl and B. Buschbeck, Vienna-preprint HEPHY-PUB-590-93 (May 1993); and Proc. XXII Int. Symp. on Multiparticle Dynamics, Santiago de Compostela Spain, 1992, p.561. A. Pajares (ed.) World Scientific, Singapore. 2 N.A. Agababyan et al., NA 22 coll., Z. Phys. C59 (1993) 405. 3 A. Bialas and R. Peschanski, Nucl. Phys. B273 (1986) 703.   For a recent review, see E.A. DeWolf, I.M. Dremin and W. Kittel, to be published in Phys. Rep. C. 4 R. Hanbury-Brown and R. Q. Twiss : Phil Mag. 45 (1954) 663; For a review see D.H. Boal et al., Rev. Mod. Phys. 62 (1990) 553. 5 H. Bächler et al., NA 35 Coll., Zeit. Phys. C61 (1994) 551. 6 P. Grassberger, Nucl. Phys. B120 (1977) 231. 7 A. Bialas, Acta Phys. Pol. B23 (1992) 561. 8 E.L. Berger, R. Singer, G.M. Thomas and T. Kafka, Phys. Rev. D15 (1977) 206. 9 I.V. Ajinenko et al., NA22 Coll., Zeit. Phys. C61 (1994) 567. 10 M. Adamus et al., NA22 Coll., Zeit. Phys. C37 (1988) 347, fig.3 e,f. 11 D. Decamp et al., NA22 Coll., Zeit. Phys. C54 (1992) 75, fig.7.
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8952919244766235, "perplexity": 1388.6212039334548}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038056325.1/warc/CC-MAIN-20210416100222-20210416130222-00105.warc.gz"}
http://mathhelpforum.com/advanced-math-topics/38431-advanced-transposition-problem.html
# Math Help - advanced transposition problem I'm having massive difficulty in rearranging the following to find d c/h=(d^2)*[1-exp-(2r^2/d^2)] taking the natural log of both sides normally helps when there is an exp function present but here it just gets in the way - no matter how hard I try I can't get d on its own (d in terms of c and r). can anyone help? showing the steps you took would help me tackle similar problems in the future so I'd be extremely grateful for this. Dan 2. There is no Algebra I method to solve such things. Have a look at Lambert's W-Function. This will suggest to you various methods that have been contemplated to deal with such structures. Lambert W-Function -- from Wolfram MathWorld Lambert W function - Wikipedia, the free encyclopedia Lambert's W-Function On the other hand, if you do not already know of the difficulty of solving what you attempted to solve, these discussions may not suggest much that you will find useful. On still another hand, have you considered what happens as 'd' increases without bound? $\frac{c}{h} = -2r^{2}$ Does that lead to anything useful? On yet another hand, after substituting $q = \frac{1}{d^{2}}$ and rearranging, we have $\frac{cq}{h} = 1-e^{2qr^{2}}$ ...and we can contemplate what happens for q = 0. 3. ## Thanks Many thanks for such a comprehensive reply. It's beyond the scope of my current level of understanding but i'll endevour to fill in the blanks by doing some background reading. Thanks once again Dan
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 3, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6575744152069092, "perplexity": 680.0315850016055}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430454576828.73/warc/CC-MAIN-20150501042936-00069-ip-10-235-10-82.ec2.internal.warc.gz"}
https://gitlab.math.unistra.fr/patapon/patapon/-/commit/48bf31eea8ac7aea526c285566689667442f9a73
Commit 48bf31ee by ph ### up parent 5c6b6a87 ... ... @@ -851,7 +851,7 @@ \subsection{Smooth vortex (performance test)} The smooth vortex test is a classical test for MHD codes. It is described for instance in \cite{dumbserJCP2016}. Because this is a exact solution, for instance in \cite{dumbserJCP2016}. Because this is an exact solution, it allows to assess the accuracy of the solver. Here we also used this test to evaluate the efficiency of the parallel implementation. The test case is built upon a single vortex, which is a stationary ... ... @@ -938,7 +938,7 @@ \end{tabular}\caption{Convergence and performance study\label{tab:Convergence-and-performance}. Some tests are done in single precision (float32) and others in double precision (float64). The efficiency'' is a comparison for N=1024 with the slowest device. "CU" means "Compute Units": it is the number of activated cores in a CPU computation or of OpenCL processing elements for a GPU computation. } with the slowest device. "CU" means "Compute Units": it is the number of activated cores in a CPU computation or of OpenCL compute units for a GPU computation. } \end{table} ... ... Markdown is supported 0% or . You are about to add 0 people to the discussion. Proceed with caution. Finish editing this message first!
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.956940233707428, "perplexity": 3134.280285128669}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038469494.59/warc/CC-MAIN-20210418073623-20210418103623-00149.warc.gz"}
http://mathhelpforum.com/advanced-algebra/177458-degree-basis.html
1. ## Degree/Basis 1.Find the degree and basis for Q(3^1/2,7^1/2) over Q. 2.For any positive integers a, b, show that Q(a^1/2+b^1/2)=Q(a^1/2,b^1/2) Ideas: 1. Well I know if I looked at (3)^1/2 over Q Then (3)^1/2 has minimal polynomial x^2-3, so degree 2 over Q (7)^1/2 has minimal polynomial x^2-7 so degree 2 over Q so entire thing has degree 2. 2.I started by computing the minimal polynomial of a^1/2+b^1/2 over Q x=a^1/2+b^1/2 x-a^1/2=b^1/2 x^2+2(a)^(1/2)x+a=3 x^2+a-3=2(a)^1/2 x^4+x^2a-3x^2+x^2a+a^2-3a-3x^2-3a+9=4a x^4+2x^2a-6x^2+a^2-6a+9-4a=0 I don't know how that would hekp me, though 2. For 1. Ideas: 1. Well I know if I looked at (3)^1/2 over Q Then (3)^1/2 has minimal polynomial x^2-3, so degree 2 over Q a basis is: $1, \sqrt{3}$ (7)^1/2 has minimal polynomial x^2-7 so degree 2 over Q a basis is $1, \sqrt{7}$ so entire thing has degree 2. this is wrong. a basis for the extension $\mathbb Q (\sqrt{3}, \sqrt{7})/ \mathbb Q$ is: $1, \sqrt{3}, \sqrt{7}, \sqrt{21}$ so the degree is 4. 3. 1. are you sure about this? remember Q(√3) is a subfield of R. the factorization of x^2 - 7 in R is (x + √7)(x - √7). if Q(√3,√7) has degree 2 over Q, wouldn't that force Q(√3,√7) to have degree 1 over Q(√3)? isn't this the same as saying √7 = a+b√3 for some rational a,b? i think you should look for a polynomial of degree 4 as the minimal polynomial. the basis elements should be obvious to write down. it is my contention that Q(√3,√7) = [Q(√3)](√7). 2. think about the basis elements you (hopefully) found for part (1). can you write √a + √b in terms of those basis elements, adapted to a,b instead of 3,7? if so, then Q(√a+√b) is contained in Q(√a,√b). look at your minimal polynomial. what can you say about the dimension over Q of Q(√a+√b)? can you use a theorem from linear algebra about subspaces here? 4. for 2, I guess I should show (a)^1/2 + (b)^1/2 is in Q((a)^1/2, (b)^1/2) and a^1/2, b^1/2 in Q((a)^1/2 + (b)^1/2) would this involve degrees and basises? a basis for Q((a)^1/2 , (b)^1/2) is 1, a^1/2, b^1/2, (ab)^1/2 a^1/2+ b^1/2 in Q((a)^1/2 , (b)^1/2) Q((a)^1/2 + (b)^1/2) has basis 1, (a)^1/2 + (b)^1/2? Not quite sure about finding this basis 5. 1.basis elements are 1, root 3, root 7, and root(21) 2.root a + root b= root a+ root b since root a and root b would be basis elements looking at the minimal polynomial, has dimension 4 Would I use this theorem: Let V ba an n dimensional vector space. If W is any subspace of V, then W=V iff W has dimension n? 6. that would be the one. you could show that you could express √a and √b in terms of powers of (√a+√b), but that seems like more work to me. 7. √a and √b in terms of powers of (√a+√b), but that seems like more work to me. I want to look at both ways, so if I were to do it this way: x=(√a+√b) x^2=a+2√ab+b ??? 8. well, the elements 1, √a+√b, (√a+√b)^2 = (a+b) + 2√a√b, (√a+√b)^3 = (2a+b)√a + (a+2b)√b all have to be linearly independent, since [Q(√a+√b):Q] = 4. so if we set √a+√b = u, √a = (1/(a-b))(u^3 - (a+2b)u), and √b = (1/(b-a))(u^3 - (2a+b)u) (you might want to double-check my algebra). this shows that Q(√a,√b) is contained in Q(√a+√b) (note as well, that this gives a different basis for Q(√a,√b): (it is an interesting exercise to show that if we set √a = x, √b = y, that the set {1,x+y,a+b+2xy,(2a+b)x+(a+2b)y} is linearly independent if {1,x,y,xy} is). 9. ok that makes sense 10. Ok this question is related to 1. What about degree and basis for Q(2^1/2,2^1/3) over Q 2^1/2 has minimal polynomial x^2-2 a basis would be 1,2^1/2 2^1/3 has minimal polynomial x^3-2 basis would be 1, 2^1/3,2^2/3 basis for Q(2^1/2,2^1/3) has degree 5 and basis 1, 2^1/3,2^2/3, 2^1/2,2^1/6? 11. no, 2*3 is not 5. x^3 - 2 still doesn't have any roots in Q(√2). any root still lies in a cubic extension of Q(√2). look at your set of "powers" of two: {0, 1/6, 1/3, 1/2, 2/3}. can you see what is missing from that list? hint: 1/3 = 2/6, 1/2 = 3/6, 2/3 = 4/6.... 12. degree 6 we need 5/6 13. Originally Posted by Deveno well, the elements 1, √a+√b, (√a+√b)^2 = (a+b) + 2√a√b, (√a+√b)^3 = (2a+b)√a + (a+2b)√b all have to be linearly independent, since [Q(√a+√b):Q] = 4. so if we set √a+√b = u, √a = (1/(a-b))(u^3 - (a+2b)u), and √b = (1/(b-a))(u^3 - (2a+b)u) (you might want to double-check my algebra). this shows that Q(√a,√b) is contained in Q(√a+√b) (note as well, that this gives a different basis for Q(√a,√b): (it is an interesting exercise to show that if we set √a = x, √b = y, that the set {1,x+y,a+b+xy,(2a+b)x+(a+2b)y} is linearly independent if {1,x,y,xy} is). I thing I understand the first part Now for showing Q(√a+√b) is contained in Q(√a,√b) Let √a = x, √b = y I have x+y=√a+√b (x+y)^2=a+b+2xy 14. my bad, that was a typo, it should be a+b+2xy
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 4, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8998640179634094, "perplexity": 2593.462330852159}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164954485/warc/CC-MAIN-20131204134914-00094-ip-10-33-133-15.ec2.internal.warc.gz"}
https://socratic.org/questions/how-much-is-70-degrees-fahrenheit-in-celsius
Chemistry Topics # How much is 70 degrees Fahrenheit in Celsius? Mar 12, 2017 ${70}^{\circ} F = 21. {\overline{1}}^{\circ} C$ #### Explanation: To convert Fahrenheit to Celsius, the normal method is to subtract $32$ then divide by $1.8$ (i.e. $\frac{9}{5}$). So in our example: $\frac{5}{9} \left(70 - 32\right) = \frac{5}{9} \left(38\right) = \frac{190}{9} = 21. \overline{1}$ Alternatively, since $- {40}^{\circ} F = - {40}^{\circ} C$, we can convert by adding $40$, multiplying by $\frac{5}{9}$, then subtracting $40$: $\frac{5}{9} \left(70 + 40\right) - 40 = \frac{5}{9} \left(110\right) - 40 = \frac{550}{9} - 40 = 61. \overline{1} - 40 = 21. \overline{1}$ The reverse conversion from Celsius to Fahrenheit can be done by either of the following: • Multiply by $\frac{9}{5}$ then add $32$. • Add $40$, multiply by $\frac{9}{5}$, then subtract $40$. ##### Impact of this question 4411 views around the world
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 15, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9863752126693726, "perplexity": 1299.9124928667657}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141181179.12/warc/CC-MAIN-20201125041943-20201125071943-00214.warc.gz"}
http://quant.stackexchange.com/tags/numerical-methods/hot?filter=year
# Tag Info ## Hot answers tagged numerical-methods 4 The method described in Hallerbach (2004) always worked well for me. We derive an estimator for Black-Scholes-Merton implied volatility that, when compared to the familiar Corrado & Miller [JBaF, 1996] estimator, has substantially higher approximation accuracy and extends over a wider region of moneyness. 3 I am not sure if I understood your question correctly but I will try to answer it anyway. If you have a standard normal random vector $z \sim N(\mathbb{0},I_n)$ (where $z,0 \in \mathbb{R}^{n\times1}$ and $I_n \in \mathbb{R}^{n\times n}$ is the identity matrix) and you want to transform it into a multivariate normal $x \sim N(\mu,\Sigma)$ you do it the ... 2 There is a qualitative shift in the shape of the density. When V is small it is monotone decaying. When V is large it looks more like a Gaussian. Another reason he uses two schemes is that he wants match two moments of the density. When V is small, the moment matching equations for the quadratic Gaussian are unsolvable. When V is large they are unsolvable ... 2 Peter Jaeckel wrote a paper just on how to solve this problem: By Implication (July 2006; Wilmott, pages 60-66, November 2006). Probably the most complicated trivial issue in financial mathematics: how to compute Black's implied volatility robustly, simply, efficiently, and fast downloadable from jaeckel.org In my experience the most important thing is to ... 2 To keep things simple let's assume you have a perfect random number generator (i.e. I will discuss only the statistics not the numerics of the problem). I will also focus on the practical matter and gloss over some mathematical details. From a practical perspective "convergence" means that you will never get an exact answer from Monte-Carlo but ... 2 the output of an MC simulation depends on the random numbers used and if the distribution used is not too weird, after 10,000 runs you will get an answer that is distributed $$\mu + \frac{\sigma}{\sqrt{n}} Z,$$ with $Z$ a standard normal. Here $n=10,000.$ With $\mu$ the quantity you want and $\sigma$ the standard deviation. So you won't get precisely the ... 1 It appears that you are plotting your analytical delta as a % of the delta of the underlying. This is why the delta converges to 100% As for the numerical delta, it could be that you are not adjusting for the DV01 of the underlying. This would explain why the numerical delta still increases as the option gets more in the money and why the distortion is ... 1 Presumably you are trying to use a finite difference method to solve a differential equation. The non-uniformity of the grid has an impact on accuracy. Hence, it is useful to include a parameter in the grid-generation algorithm that controls the rate at which the spacing increases away from the boundary. There are many approaches for generating non-uniform ... 1 The only special function needed for computing Black-Scholes option prices is the cumulative normal function ("N" or "Phi") or equivalently the error function ("erf"). These are very widely available with good standard library implementations. The erf function in single and double precision is part of the c99 and c++11 math standard libraries. For your ... 1 Below is the root search algorithm code I wrote in college. This is written in octave. It's simple to understand and re-write in C++. Develop numerical methods algos as a separate module and integrate with your pricing and other code I want to WARN you to re-check for bugs. It always converges for my objective functions First function is Dekker method ... 1 Bracketing methods such as Bisection and Regula Falsi are always known to converge but they are very slow. Newton Raphson and secant methods are fast (quadratic convergence) but has convergence problems. Google for Newton Raphson convergence pitfalls. Classical ones such as"Trapped in local minima", "Diverge instead of converge" etc Algorithms such as ... 1 Use your total wealth allocated to the trades as denominator. Total wealth allocated would include all collateral. In this way you (or your broker) make sure that the denominator is always positive. Presumably this would also reflect what you really want to track. The only problem that remains is what amount of your wealth needs to be allocated. But this is ... Only top voted, non community-wiki answers of a minimum length are eligible
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7556416392326355, "perplexity": 591.596537568107}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929832.32/warc/CC-MAIN-20150521113209-00209-ip-10-180-206-219.ec2.internal.warc.gz"}
http://physics.stackexchange.com/questions/9296/how-does-carbon-dioxide-or-water-vapour-absorb-thermal-infra-red-radiation-from
# How does carbon dioxide or water vapour absorb thermal infra red radiation from the sun? We are all told at school water vapour and carbon dioxide are the top two greenhouse gases, and that they absorb thermal infra red radiation, trap heat and warm up the Earth. My question is how do they do that? Why can't Oxygen or Nitrogen or any other gas not absorb infra red radiation as well as water vapour or CO2? - As you can see on these absorption spectra for $\textrm{H}_2\textrm{O}$ and $\textrm{C}\textrm{O}_2$, both molecules have moderate to strong absorbtion in the mid-IR wavelengths, with the absorption of $\textrm{C}\textrm{O}_2$ extending out into the longer wavelengths. Other molecules common in the atmosphere don't have such strong absorption at the wavelengths given off by thermal radiation. If you are asking why that is, I'm afraid I can't give you a very detailed answer, except to say that the absorption spectra of molecules (and atoms) is governed by quantum mechanics. Maybe somebody else can explain how they would be calculated from principles, but that is beyond my education. - The absorption of IR radiation is due to vibrations of molecules. When a vibration causes change in charge distribution (or dipole moment to be more specific) the IR radiation is absorbed. Generally, hetero-polar molecules, like $H_2O \; and \; CO_2$, have permanent dipole moment. The external oscillating electric field in this case perturbs the Hamiltonian and causes IR absorption. Hence, they contribute to "Green House effect" by absorbtion of heat. $H_2O$, which is non-linear molecule, has three fundamental modes of vibrations. Symmetrical Stretching, asymmetrical Stretching and scissoring (bending). $CO_2$, which is linear molecule, has four fundamental modes of vibrations. Symmetrical stretching, asymmetrical stretching and two degenerate scissoring modes, in planes perpendicular. The symmetric stretching mode in $CO_2$ does not produce or absorb any IR, as it does not cause change in dipole moment, but other modes do change charge distribution causing absorption of IR. Well, the homo-polar molecules, like $N_2 \; and \; O_2$, does not have any permanent dipole moment. The external oscillating electric field does not perturb the Hamiltonian for nuclear motion, and does not absorb IR, though it perturbs Hamiltonian for electronic motion. Hence, do not contribute for "Green House effect". - Chutsu was seen here last time 1st of may. And homo-polar is a nonsenseword. This words are used in chemistry for different types of bonds, but for polarity of molecules this words are nonsense. –  Georg Oct 27 '11 at 16:50 In some quantity, everything in the air including nitrogen and oxygen absorbs and emits black body radiation at frequencies which overlap the frequencies absorbed by CO2. In fact, the only reason why there is IR in the air is because the surface of the earth emits black body radiation in proportion to its temperature. The air then does the same thing at some level. The question then is, in what quantity is the atmosphere absorbing and emitting black body radiation. The emissivity of nitrogen and oxygen gasses should be closed to 100%, since they do not reflect IR significantly. But the larger question is how does the quantity of black body absorption compare to the fingerprint absorption of CO2. Actual measurements and numbers do not seem to exist. So promoters use computer models to divide up the heat of the atmosphere between pollutants such as CO2 and everything else. They then pull such numbers out of the hat which say increases in CO2 levels will create a global temperature increase of about 6 deg. This is about 20% of the 33 deg. which the atmosphere is said to contribute to the temperature of the globe.There are about 30 times as many water vapor molecules in the air as CO2 molecules, and water vapor has a more effective fingerprint spectrum. It is also much more variable. This means water vapor will swamp whatever CO2 does. It is obviously not being honest to say CO2 does twenty percent of the heating, when there is a hundred times as much water vapor doing the same thing. - The real fact is that all of the atmosphere is principally heated by thermal conduction and convection - heating the atmosphere by absorbing infrared radiation is negligible. Water vapour is accepted to be about 1% of a normal atmosphere. At the Earth's surface the mass of a cubic metre of air is about 1.205 kg. As we go up in the atmosphere pressure decreases and thus so does the mass of air per cubic metre. At 1% water vapour concentration by volume or about 1.5% by weight there are about 19 grams per cubic metre at sea level - significantly less at higher altitudes. Kiehl & Trenberth claim greenhouse gases produce "backradiation" of 324 Watts / square metre. A watt is equivalent to a Newton metre per second. A newton is a mass of 1 kilogram accelerated by gravity - 9.8 metres per second. Hence 324 Watts per square metre is equivalent to 324 Newton metres per second. 324 Newtons is 33 kg subjected to gravity's acceleration. If anyone can explain to me how a mere 12 grams of water vapour in every cubic metre of normal air at sea level can produce that sort of energy I would feel much enlightened - I simply say it is impossible without furnace like temperatures. As for Carbon Dioxide at 0.04% by volume which is 0.06% by weight it constitutes approximately 0.732 grams per cubic metre - again significantly less at high altitudes as it is heavier than air. By similar logic if any one can explain how such an insignificant mass of Carbon Dioxide can produce any detectable quantity of radiation I would feel much enlightened !! As data from the Moon orbiting satellites a heated surface radiating to space cools at a very slow rate. True the Moon can become very cold on the night side but that lunar night lasts 354 Earth hours and the surface cools about 290 degrees during that 354 hours - less than a degree per hour. At that rate the dark side of the Earth would "cool" less than 12 degrees before the Sun rose again. It is the period of rotation of the Earth that is significant into determining how much the Earth cools. It is the power of the Solar radiation that determines the maximum daytime temperature. The atmosphere and oceans reduce the temperature the Solar radiation is capable of causing and there is simple proof in that the Moon's surfaces are heated to over the boiling point of water whilst the Earth never approaches those extremes except when conduction/convection is suppressed or prevented entirely. Finally do you really believe that although Nitrogen and Oxygen do not significantly absorb Infrared radiation they do not radiate Infrared radiation ? A well known fact of physics is that everything that has a temperature above absolute zero radiates electromagnetic radiation ! At ambient air temperatures well established physics, Wien's law, predicts that the intensity of the emitted electromagnetic radiation is at a peak well within the Infrared radiation wavelength band. Almost all of the electromagnetic radiation in the atmosphere is coming from Nitrogen and Oxygen which constitute about 99% of the atmosphere. The only way Nitrogen and Oxygen would not constitute the vast bulk of this atmospheric radiation is if they were at absolute zero and all the warmth you feel came from 19 grams per cubic metre water vapour and 0.732 grams per cubic metre CO2. I think that proposition is absurd ! -
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8322540521621704, "perplexity": 621.0249246442244}, "config": {"markdown_headings": true, "markdown_code": false, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 5, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119651455.41/warc/CC-MAIN-20141024030051-00233-ip-10-16-133-185.ec2.internal.warc.gz"}
https://tex.stackexchange.com/questions/295317/beamer-custom-sidebar-with-navigation-within-subsubsections
# Beamer custom sidebar with navigation within subsubsections I would like to add a left handed sidebar to my beamer presentation slides, however there are some specifics as to how I would like to do this: • The sidebar would only be present on specified pages (the majority of slides will not have the sidebar) • The side bar would not show navigation to any of the sections or subsections for the rest of the presentation, instead it would have links to a series of other slides that would all also have this sidebar. • This sidebar would be able to be called multiple times in the presentation where it would follow the same format, but each time called it would be in a different place, referencing slides in that location. • I don't want this to effect the top navigation bar at all • Ideally, I would be putting everything that the side bar would be referring to in its own subsubsection, but not all subsubsections would have this sidebar It might help to know what this is for; I want to create a sidebar that will show steps of how to solve a math problem, where the content in the main part of the slide is the specifics for the particular problem. This is some code to provide something to work with: \documentclass[14pt]{beamer} \usetheme{Frankfurt} \begin{document} \section{Section 1} \subsection{Section 1.1} \begin{frame} \frametitle{1.1.1} \end{frame} \begin{frame} \frametitle{1.1.2} \end{frame} \subsection{Section 1.2} \begin{frame} \frametitle{1.2.1} \end{frame} \begin{frame} \frametitle{1.2.2} \end{frame} \subsection{Section 1.3} \begin{frame} \frametitle{1.3.1} \end{frame} \begin{frame} \frametitle{1.3.2} \end{frame} \section{Section 2} \subsection{Section 2.1} \subsubsection{Section 2.1.1} \begin{frame} \frametitle{2.1.1 part A} This would be the start to the problem \end{frame} \begin{frame} \frametitle{2.1.1 part B} This would start the solution \end{frame} \begin{frame} \frametitle{2.1.1 part C} This would have the next step \end{frame} \begin{frame} \frametitle{2.1.1 part D} This next step process would continue here (and to further slides if needed) \end{frame} \subsection{Section 2.2} \begin{frame} \frametitle{2.2.1} \end{frame} \begin{frame} \frametitle{2.2.2} \end{frame} \end{document} Where in this document I would like to have the sidebar be in the subsubsection part of this document. This would be a customized sidebar, but first would just like to focus on getting it there. Ideally, the sidebar in that subsubsection would have text that would link to the various slides in the subsubsection (but not necessarily all slides). • Please read the following SE question on how to write MWE for your questions: meta.tex.stackexchange.com/questions/228/… Most of the code you posted is completely unnecessary. Feb 22 '16 at 19:02 • I wanted the complete header that I'm using in case it caused some potential problems with the solution, but your point is well taken. I will edit my post down to not include all of that code. Feb 22 '16 at 19:13 Your problem sounds too specific to me, that a automated solution would be worth it. So why not just add the menu you need manually. You just have to add labels to the frames you want to link to. Then you can link to them from wherever you want – like a custom sidebar menu for example. \documentclass{beamer} \begin{document} \section{Section 2} \subsection{Section 2.1} \subsubsection{Section 2.1.1} \begin{frame}[label=problem]{2.1.1 part A} \begin{minipage}{0.25\linewidth} \footnotesize \begin{enumerate} \end{enumerate} \end{minipage}% \begin{minipage}{0.75\linewidth} This would be the start to the problem \end{minipage} \end{frame} \begin{frame}[label=solution]{2.1.1 part B} \begin{minipage}{0.25\linewidth} \footnotesize \begin{enumerate} \end{enumerate} \end{minipage}% \begin{minipage}{0.75\linewidth} This would start the solution \end{minipage} \end{frame} \begin{frame}[label=next]{2.1.1 part C} \begin{minipage}{0.25\linewidth} \footnotesize \begin{enumerate} \end{enumerate} \end{minipage}% \begin{minipage}{0.75\linewidth} This would have the next step \end{minipage}% \end{frame} \begin{frame}{2.1.1 part D} This next step process would continue here (and to further slides if needed) \end{frame} \subsection{Section 2.2} \begin{frame}{2.2.1} \end{frame} \begin{frame}{2.2.2} \end{frame} \end{document} • Thanks for taking a look at it. I'm wanting to have some of the customization possibilities that come with the sidebar rather than putting it as a minipage, but didn't see how to do that myself. Also, don't know if this happens for you, but when I click on the links to the slides as is coded above, it doesn't take me to that actual slide, but rather half way down that slide (where the text is). Also, I will likely have 20+ of these, rather than a few isolated instances, so automation would be helpful. Feb 22 '16 at 19:09
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6439240574836731, "perplexity": 1021.7146716931352}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585045.2/warc/CC-MAIN-20211016231019-20211017021019-00488.warc.gz"}
https://brilliant.org/discussions/thread/new-profiles/
# New profiles! Hey everyone, One of the feature requests that we've seen frequently is that when you come across an amazing user-submitted solution or discussion post, you want to see other solutions or posts by that same user. We've made this and much more possible in our recent update to everyone's profile pages. Check it out and let us know what you think! Cheers, The team at Brilliant Note by Suyeon Khim 6 years, 11 months ago This discussion board is a place to discuss our Daily Challenges and the math and science related to those challenges. Explanations are more than just a solution — they should explain the steps and thinking strategies that you used to obtain the solution. Comments should further the discussion of math and science. When posting on Brilliant: • Use the emojis to react to an explanation, whether you're congratulating a job well done , or just really confused . • Ask specific questions about the challenge or the steps in somebody's explanation. Well-posed questions can add a lot to the discussion, but posting "I don't understand!" doesn't help anyone. • Try to contribute something new to the discussion, whether it is an extension, generalization or other idea related to the challenge. MarkdownAppears as *italics* or _italics_ italics **bold** or __bold__ bold - bulleted- list • bulleted • list 1. numbered2. list 1. numbered 2. list Note: you must add a full line of space before and after lists for them to show up correctly paragraph 1paragraph 2 paragraph 1 paragraph 2 [example link](https://brilliant.org)example link > This is a quote This is a quote # I indented these lines # 4 spaces, and now they show # up as a code block. print "hello world" # I indented these lines # 4 spaces, and now they show # up as a code block. print "hello world" MathAppears as Remember to wrap math in $$ ... $$ or $ ... $ to ensure proper formatting. 2 \times 3 $2 \times 3$ 2^{34} $2^{34}$ a_{i-1} $a_{i-1}$ \frac{2}{3} $\frac{2}{3}$ \sqrt{2} $\sqrt{2}$ \sum_{i=1}^3 $\sum_{i=1}^3$ \sin \theta $\sin \theta$ \boxed{123} $\boxed{123}$ Sort by: Furthermore, Note that you can now attempt to solve any problem solved by a person who's profile you click on, regardless of what level it is in. So if you have ever been curious what people in other levels are solving you can now find out by clicking on their profiles. Staff - 6 years, 11 months ago Thank you so much for this update!!! I love being able to solve so many more problems :) - 6 years, 11 months ago Do you think you can develop some sort of search bar. So you can search for people you know? That would be awesome! - 6 years, 11 months ago Great work! I love the new profiles. Now that you are tweaking, can you do a little addition to "Past Solutions" section? I have been a member of this site from March 2013. Each week I left some of the problems unsolved. Recently, I have thought of returning back to those problems and try them again but it takes a lot of time to reach the previous problem sets. I mean I have to scroll down a lot and click "Load Previous Week" a numerous times to reach the first problem set I attempted. If possible, can you make this job a little easier for us, for example by adding a drop-down menu which lists all the problem sets? EDIT: Moreover, I wanted to report that the scroll bar which appears in the Past Solutions section, does not function at all in Google Chrome. I often need to switch to Mozilla Firefox for that. Thanks! - 6 years, 11 months ago Yes, the scroll bar doesn't work for me too. I opened a discussion thread about that but got no response. - 6 years, 11 months ago Just what I've been waiting for, thank you so much! I also like the details about every little thing, such as number of problems submitted. The only thing I'm still waiting for is the section which shows how many solutions have been featured. This came on Brilliant and was removed for some reason. Also, instead of featured solutions, voting goes on forever, which I think is less of a good idea than the featured solution idea. - 6 years, 11 months ago This is awesome. It's also great how we can even submit solutions for problems not in our problem set. Here are some minor suggestions: • Just like the solution vote count is shown in green, it would be cool if that would be done too for the topic vote count and comment vote count. • Maybe you can divide all activitiy of a user in tabs, e.g.: "Solves", "Solutions", "Comments", "Topics", and "Votes" for a better overview. • When visiting a problem from somebody else's problem set, it would be rather handy to have a badge or something similar indicate from which level it is. - 6 years, 11 months ago I think your first point is a good idea, and we will probably do it soonish. With your second point, are you asking for a way to easily filter your feed, or another person's feed? For example If I went to your profile and only wanted to see your discussions comments, I could click a button and it would only display your discussions comments chronologically. The last point is a little more complicated because there is so much overlap between levels, but we can definitely find someway to communicate what the difficulty of the problem is in the scheme of Brilliant. Staff - 6 years, 11 months ago I was talking about just any feed, actually, so I could see a list of just the problems someone has solved recently, or the comment's he's made, etc. Oh yes, I forgot about the overlap. Maybe the number of point that could be earned could be displayed, although that might be confusing, because you can't actually earn points on a problem not for your problem set. Maybe you could show the problem sets it appears in. - 6 years, 11 months ago excellent update!!! - 6 years, 11 months ago One thing, though, I don't know if I like the lifetime points disappearing under quick hover-profiles. I used that a lot. Unless Brilliant is trying to get us away from profiling and stereotyping by lifetime points, which makes sense since "lifetime" is relative. - 6 years, 11 months ago I see the lifetime points section. - 6 years, 11 months ago "quick hover-over profiles"... You must have special vision enabling you to see what doesn't exist. - 6 years, 11 months ago These unlabeled colorless bars are different... - 6 years, 11 months ago So many changes everywhere all in 24 hours... My brain... aaahhhh... This is not correct discussion but I don't want to start another one- My friends are empty because I don't have Facebook. I just have anonymous blurred imaginary friends. That is kind of sad and unnerving, knowing that blur will always be there. - 6 years, 11 months ago Hahaha, Brilliant is always growing and changing... :) We'll make the "blurry friends" smarter soon—you are probably going to have to tolerate it through the weekend though... Staff - 6 years, 11 months ago Now there are lots of colorful bars and problems are now called "a problem". I liked seeing the title of the problem. - 6 years, 11 months ago It says "a problem" in an event stream only when there isn't a name for the problem. This usually happens when the problem is in the Practice section... Staff - 6 years, 11 months ago Oooohhhhhhh... I'm not very smart. Thanks for revealing the obvious. - 6 years, 11 months ago Great work done by brilliant. I really appreciate that. Can you also add a section for Logical Reasoning. That would be great. - 6 years, 11 months ago I like the possibilities for many prompts instead of "intellectually exciting discoveries" and such. It leaves it open for more information. - 6 years, 11 months ago Keep in mind, you can also write your own prompt. You don't have to be limited by the random prompts we supply. Staff - 6 years, 11 months ago We can update our status too :) Thanks, Brilliant!! - 6 years, 11 months ago Your status displays in the little box when people hover over your profile with a cursor, so everybody can get a quick sense of what's going on with you. Staff - 6 years, 11 months ago Nice, all updates on Brilliant, Amazing!! - 6 years, 11 months ago from its too?but we can't to mention people but this is amazing - 6 years, 11 months ago It is possible that the ability to mention people in conversations you think are relevant to them will come out in the future. Like all things on Brilliant, your profiles will evolve. Staff - 6 years, 11 months ago This is the Amaziing of Brilliant Future sir.Two Thumbs For Brilliant (y) - 6 years, 11 months ago In my homepage, i am shown that i am in level 4 in number theory but on my profile it shows me that i am at level 3.. Please help.. - 6 years, 11 months ago Its fixed now...Thanks. - 6 years, 11 months ago This is beyond amazing. Good job guys :) - 6 years, 11 months ago In my profile, i am shown that i am in level 5 in number theory but on problem page, shows me that i am at level 4.. Please help..Thank's - 6 years, 11 months ago You probably was well in ur last answers, so now you've been promoted. In the next update u will answer the questions of level 5. :) - 6 years, 11 months ago I love it! - 6 years, 11 months ago The new profiles are brilliant - 6 years, 11 months ago ohh its wonderful....thanx... - 6 years, 11 months ago Feature Request: We could add a messageboard to everyone's profile that would be much like a talk page - 5 years, 9 months ago ×
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 8, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8078915476799011, "perplexity": 2160.904231198634}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 5, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736962.52/warc/CC-MAIN-20200806121241-20200806151241-00081.warc.gz"}
http://superuser.com/users/196505/edi9999?tab=activity
# edi9999 less info reputation 6 bio website javascript-ninja.fr location New York, United States age 22 member for 1 year, 6 months seen Aug 5 at 15:46 profile views 7 Creator of DocxgenJS, UI Interface Developper, JS, Coffeescript and Backbone Lover (sometimes Angular too :p) # 22 Actions Jun12 comment How do I modify a style so that it will appear as a section heading in a Table of Contents? I don't think they is a way to do this. The right way to do that is to `add 1` to all of your Headings Jun2 awarded Commentator Jun2 comment Is there a way to embed hidden information in a paragraph in Microsoft Word Can't you use the commenting functionnality ? Feb6 awarded Teacher Feb6 answered Copying all files from one folder to an other with command line in windows Feb6 comment Copying all files from one folder to an other with command line in windows I needed it to be done in command line because it's a task I wanted to do often (it's part off the creation of an installer) Feb6 comment Copying all files from one folder to an other with command line in windows Without the /s it works, except that the folders aren't copied Feb6 comment Copying all files from one folder to an other with command line in windows This command : `copy /s C:\wamp\www\poker-tell\server\*.* C:\wamp\www\poker-tell\build\window` raises the same error Feb6 comment Copying all files from one folder to an other with command line in windows I would like to copy subdirectories too... Feb6 comment Copying all files from one folder to an other with command line in windows I get "The syntax of the command is incorrect. " My command : `copy C:\\wamp\\www\\poker-tell\\server\\*.* C:\\wamp\\www\\poker-tell\\build\\window /s` Feb6 comment Copying all files from one folder to an other with command line in windows I get "insufficient memory" (seems that the content of the paths of some of the files exceed 254) Feb6 comment Copying all files from one folder to an other with command line in windows Actually this doesn't work either because I would like to copy the folders that are in src too Feb6 awarded Student Feb6 asked Copying all files from one folder to an other with command line in windows Sep26 awarded Autobiographer Sep10 comment converting html into word doc or pdf preserving styles (or how to use git for word documents) So you mean automatically using one command line ? Sep10 answered converting html into word doc or pdf preserving styles (or how to use git for word documents) Jul31 awarded Editor Jul31 revised how to use codefolding feature of notepad++ for normal text documents Image Inline, corrected typos Jul31 suggested suggested edit on how to use codefolding feature of notepad++ for normal text documents
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8833510279655457, "perplexity": 4593.745164563457}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917663.12/warc/CC-MAIN-20140901014517-00001-ip-10-180-136-8.ec2.internal.warc.gz"}
https://www.bartleby.com/solution-answer/chapter-111-problem-4e-precalculus-mathematics-for-calculus-6th-edition-6th-edition/9780840068071/11e50de8-c2b1-11e8-9bb5-0ece094302b6
# The equation relating x , y to z for the given conditions. BuyFind ### Precalculus: Mathematics for Calcu... 6th Edition Stewart + 5 others Publisher: Cengage Learning ISBN: 9780840068071 BuyFind ### Precalculus: Mathematics for Calcu... 6th Edition Stewart + 5 others Publisher: Cengage Learning ISBN: 9780840068071 #### Solutions Chapter 1.11, Problem 4E To determine Expert Solution ## Answer to Problem 4E The quantities x,y and z are related by equation z=12xy . ### Explanation of Solution Given: z is proportional to the product of x and y and z is 10 when x is 4 and y is 5. Definition: If the quantities x,y and z are related by an equation, z=kxy (1) For some constant k0 , we say that z is proportional to the product of x and y. The constant k is called the constant of proportionality. Calculation: It is given that z is proportional to the product of x and y. Compare the above equation with the definition of proportionality in equation(1). z=kxy (2) Substitute 10 for z, 4 for x and 5 for y in equation (2). 10=k×4×510=20k Simplify the above equation to find the value of k. 10=20kk=1020k=12 Substitute the value of k in equation (2) z=12xy Therefore, the quantities x,y and z are related by equation z=12xy . ### Have a homework question? Subscribe to bartleby learn! Ask subject matter experts 30 homework questions each month. Plus, you’ll have access to millions of step-by-step textbook answers! © 2021 bartleby. All Rights Reserved.
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8204250335693359, "perplexity": 2051.9526924159527}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": false}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057775.50/warc/CC-MAIN-20210925202717-20210925232717-00395.warc.gz"}
https://earthscience.stackexchange.com/questions/9911/what-are-the-formulae-for-calculating-the-thermal-heating-effect-of-back-radiati
# What are the formulae for calculating the thermal heating effect of back radiation in greenhouse gases? The ability of greenhouse gases to trap heat and re-radiate some of it back to the original heat source looks like a useful thermal property which could possibly be incorporated in things like double glazing, wall insulation, etc. What are the formulae which will enable us to calculate this additional thermal effect on top of the normal conductive heat loss parameters, heat capacity, U values etc ? We would also like to find details of the original experiments which were used to confirm the accuracy of said formulae as all I can find with internet searches are the well know school type experiments with plastic bottles and heat lamps which demonstrate the principle but are not sufficiently quantitatively accurate. We asked a similar question in Physics Stack Exchange as we considered it a question relating to fundamental physical (thermal) properties of gases but it got little response. • I think this question is appropriate for this site, given the generality, but you might also have better luck with a more specific question about double glazing over at physics.stackexchange.com – naught101 Mar 17 '17 at 2:10 As you have mentioned already, there are several physical phenomena which are responsible for heat and energy transfer. I'll just list them again for completeness, although you already addressed them in your question. 1. Conduction 2. Convection 3. Latent heat of vaporization To get to your question: Radiation is the transport of energy by means of electromagnetic waves emitted from a body of a absoulte temperature uneqal zero Kelvin. What does that mean? Radiation does not rely on contact or a transporting fluid as do conduction and convection. Instead it is equivalent to the fourth power of its absolute Temperature. This is what we know as "Black Body Radiation". The equation for this is: $$E = \sigma * T^4$$ where σ is the Stefan-Boltzman Constant and T is the absolute Temperature in Kelvin. This law is obtained by integrating Planck's law over the solid angle and wavelength, in order to determinate the energy which is transmitted not only by one particular wavelength, but the whole spectrum and in all directions. Combined with Kirchhoffs Law, which says, that the absorbtivity of an object equals its emissivity, you can calculate the radiated Energy of any object or atmospheric layer. The emissivity (ε) of a body is a value between zero and one with one being the perfect black body. For most things you can find values in the web. It also explains why aluminum foil is such a good insulator. $$E = ε * \sigma * T^4$$ To put all of this in an example: Everything around you radiates heat. Beginning with the most obvious, the sun. The sun's surface has an approximate temperature of 6000K. This means it emits radiation of the following spectrum: As you can see, the maximum of the energy of the sun is radiated in the part which we know as visible light. Also a big part of the radiated energy is absorbed in the atmosphere (the difference between yellow and red graphs). Responsible for these are particularly Ozone (O3), Water (H2O) and (CO2) which are also our most important greenhouse gases. What happens, is that the radiated energy of a particular wavelength "hits" the molecules and excites them into a state of higher kinetic energy. The average random kinetic energy of a substance is what we know as the temperature of this substance. Hence, also the atmosphere acts like a black body and radiates energy back to space but also back to earth. Unfortunately I can't really say much about the second part of your question. I don't know about the original experiments. But I suggest a read about Gustav Kirchhoff, who introduced the idea in 1860 which then has been proceeded by Josef Stefan in 1879 and Ludwig Boltzman (1884). Also Planck's works from 1900 could be helpful. I hope I was able to point you in the right direction with your studies. It is important to remember a number of things about the basic Stefan-Boltzmann equation. It is supposed to apply to a spherical black body at uniform temperature. This is a hypothetical thing ! It is spherical because if you have an irregular shaped object parts of it can radiate back onto itself. It is also supposed to be a body i.e. have a surface from which the radiation can be emitted (and also absorbed). This makes it trickier to use with something that is partially transparent to radiation i.e. some radiation can pass right through it (like gases). Of course we can adjust the basic S-B equation with an emissivity factor where a real world object is concerned. Finding an emissivity value for a gas is a bit tricky too. Especially when mixed with other gases. Even if pure, there can be a quite wide range of values, pure CO2 could be as low as 0.002 . When you have done all that however you need to understand something basic. The S-B equation gives you a figure for the radiative flux. It is NOT a figure for heat transfer. To obtain a figure for the actual heat transfer you need the temperature of the cold object (double glazing gas filling or earth atmosphere) and the temperature of the hot object (interior room or earth surface). S-B will give you the radiative HEAT transfer from the hot source to the cold sink. There is no heat transfer the other way even though there is radiation transfer both ways. Consider it as a NET radiative flux transfer if you like. The radiative flux which flows from the cold object to the hot one changes the net outflow of actual heat from the hot object, i.e. its rate of cooling will be slowed. This is effectively the same type of thing as insulation in a conductive or convective sense. The more insulation there is the slower the rate of cooling of the hot object. So for the Earth's atmosphere we can see that the so called "back radiation" (same as the measurable down welling long wave IR) are not transfering heat from anything but are in fact changing the net radiative flux at the earth's surface and thus slowing down it's rate of heat loss. The back radiation is not making the surface of the earth hotter per se but making it less cool when it loses heat. If you can get an equivalent effect to the atmospheric greenhouse gas effect by putting pure CO2 in a double glazing unit I wouldn't like to guess. I suspect the effect may be small but some lab experiments carefully designed to just measure radiation effects and eliminate conduction/convection would be a good idea. I am not aware of any past experiments having been done on this.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7625482678413391, "perplexity": 409.98680836878657}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038064520.8/warc/CC-MAIN-20210411144457-20210411174457-00441.warc.gz"}
http://tex.stackexchange.com/questions/65668/how-to-rotate-the-label-such-that-its-base-line-is-parallel-to-the-bisector?answertab=active
# How to rotate the label such that its base line is parallel to the bisector? How to rotate the label counter clockwise such that its base line is parallel to the bisector? \documentclass[border=0pt,pstricks]{standalone} \usepackage{pst-eucl} \psset{PointName=none,PointSymbol=none} \begin{document} \begin{pspicture}[showgrid=false](6,6) \pstGeonode[CurveType=polyline](1,1){A}(5,5){B}(4,1){C} \pstBissectBAC[linestyle=dotted,linecolor=red]{A}{B}{C}{C'} \pstMarkAngle[MarkAngleRadius=1.5,LabelSep=0.75]{A}{B}{C}{\tiny$180^\circ-\theta$} \end{pspicture} \end{document} - \documentclass[border=0pt,pstricks]{standalone} \usepackage{pst-eucl} \psset{PointName=none,PointSymbol=none} \begin{document} \begin{pspicture}[showgrid=false](6,6) \pstGeonode[CurveType=polyline](1,1){A}(5,5){B}(4,1){C} \pstBissectBAC[linestyle=dotted,linecolor=red]{A}{B}{C}{B'} \pcline[linestyle=none](B')(B)\ncput[nrot=:U,npos=0.84]{\tiny$180^\circ-\theta$} \end{pspicture} \end{document} a solution without knowing B' \documentclass{article} \usepackage{pst-eucl} \begin{document} \begin{pspicture}[showgrid=false](6,6) \pstGeonode[CurveType=polyline](1,1){A}(5,5){B}(4,1){C} \pcline[linestyle=none](! \psGetNodeCenter{A} \psGetNodeCenter{B} \psGetNodeCenter{C} /LengthBA B.x A.x sub dup mul B.y A.y sub dup mul add sqrt def /LengthBC C.x A.x sub dup mul C.y A.y sub dup mul add sqrt def /Factor LengthBC LengthBA div def A.x B.x sub Factor mul B.x add /A.x ED A.y B.y sub Factor mul B.y add /A.y ED A.x C.x add 2 div A.y C.y add 2 div )(B)\ncput[nrot=:U,npos=0.84]{\tiny$180^\circ-\theta$} \end{pspicture} \end{document} - It becomes more complicated :-) – kiss my armpit Aug 10 '12 at 14:27 no, because you do not need any coodinate – Herbert Aug 10 '12 at 14:30 I meant that your solution depends on B' while my solution does not. However, I cannot rotate the label clockwise. – kiss my armpit Aug 10 '12 at 14:35 no I do not need the B'. I used it only while it was defined. See edit for another solution – Herbert Aug 10 '12 at 15:15 The calculation in the second example will put the label on the median rather than on the angle bisector. – kiss my armpit Aug 10 '12 at 17:49 I got the solution even though it is not elegant enough. \documentclass[border=0pt,pstricks]{standalone} \usepackage{pst-eucl} \psset{PointName=none,PointSymbol=none} \begin{document} \begin{pspicture}[showgrid=false](6,6) \pstGeonode[CurveType=polyline](1,1){A}(5,5){B}(4,1){C} \pstMarkAngle[MarkAngleRadius=1.6,LabelSep=1]{A}{B}{C}{\rput{(B)}(0,0){\tiny$180^\circ-\theta$}} \end{pspicture} \end{document} Clockwise rotation: \documentclass[border=0pt,pstricks]{standalone} \usepackage{pst-eucl} \psset{PointName=none,PointSymbol=none} \begin{document} \begin{pspicture}[showgrid=false](6,6) \pstGeonode[CurveType=polyline](1,1){A}(5,5){B}(4,1){C} \pstMarkAngle[MarkAngleRadius=1.6,LabelSep=1]{A}{B}{C}{\rput{!\psGetNodeCenter{B} B.y B.x atan 180 sub}(0,0){\tiny$180^\circ-\theta$}} \end{pspicture} \end{document} -
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7584205865859985, "perplexity": 8656.545425241018}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 5, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701146302.25/warc/CC-MAIN-20160205193906-00007-ip-10-236-182-209.ec2.internal.warc.gz"}
http://mathhelpforum.com/geometry/217122-calculating-radius-circle-simple-trigonometry-geometry.html
# Math Help - Calculating the radius of a circle - simple trigonometry/geometry 1. ## Calculating the radius of a circle - simple trigonometry/geometry From the circle detailed in this video: To find the radius of the inner circle, why cannot we take the line down from OC to form a right angled triangle, and then do tan(pi/6)=r/6? Since tan is opposite over adjacent, why would this not work? Apparently the answer is r=2, that's now what you would get doing the above. Why is it wrong? 2. ## Re: Calculating the radius of a circle - simple trigonometry/geometry Hey Mukilab. I don't know what triangle you are referring to, but it isn't in any way reflecting the radius of the circle. What the video did is the best way to figure out the problem IMO. 3. ## Re: Calculating the radius of a circle - simple trigonometry/geometry Ah nevermind, I started drawing the circle/triangle on paint and I realised my mistake. Thank you for taking the time to post anyway
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8830304145812988, "perplexity": 562.6610181098512}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736682773.27/warc/CC-MAIN-20151001215802-00114-ip-10-137-6-227.ec2.internal.warc.gz"}
http://openvsp.org/wiki/doku.php?id=install
install # Windows OpenVSP should run on Windows without installation. Simply unzip the archive to the location of your choosing and double click vsp.exe. # MacOS Unzip the archive to the location of your choosing and run the vsp executable. # Linux For Ubuntu 18.04, a deb package is available at the OpenVSP downloads page. For other distributions, there are no pre-compiled Linux binaries produced at this time. In order to run OpenVSP on Linux, you must compile it yourself. For Debian based Linux distributions, see the following: Ubuntu Instructions For ArchLinux and its derivatives, OpenVSP is available in the AUR as openvsp. It is recommended to install the package using an AUR helper such as yay. To install OpenVSP on ArchLinux, simply run the following: $yay -S openvsp This will pull all the dependencies needed to compile OpenVSP. Then it will automatically fetch, compile and install OpenVSP in your system. # FreeBSD OpenVSP is available from the FreeBSD's port collection. Installation instructions: Method 1: $ cd /usr/ports/cad/openvsp $make install (as root) Method 2: $ portinstall openvsp (as root) This will pull all the dependencies needed to compile OpenVSP. Then it will automatically fetch, compile and install OpenVSP in your system.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.16493850946426392, "perplexity": 8876.222911497316}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250597458.22/warc/CC-MAIN-20200120052454-20200120080454-00251.warc.gz"}
https://de.zxc.wiki/wiki/Einsteinium
# Einsteinium properties [ Rn ] 5 f 11 7 s 2 99 it General Name , symbol , atomic number Einsteinium, Es, 99 Element category Actinoids Group , period , block Ac , 7 , f CAS number 7429-92-7 Atomic Atomic mass 252 and Electron configuration [ Rn ] 5 f 11 7 s 2 1. Ionization energy 6th.36758 (25) eV614.38 kJ / mol 2. Ionization energy 12.2 (4) eV1 180 kJ / mol 3. Ionization energy 22nd.7 (4) eV2 190 kJ / mol 4. Ionization energy 38.8 (4) eV3 740 kJ / mol 5. Ionization energy 54.1 (1.9) eV5 220 kJ / mol Physically Physical state firmly Modifications 1 Crystal structure cubic density (calculated) 8.84 g / cm 3 Melting point 1133 K (860 ° C) boiling point 1269 K (996 ° C) Chemically Oxidation states +2, +3 , (+4) Normal potential (Es 3+ + 3 e - → Es) Isotopes isotope NH t 1/2 ZA ZE (M eV ) ZP 248 it {syn.} 27 min ε (≈ 100%) 248 Cf α (≈ 0.25%) 244 Bk SF  (3 · 10 −5  %) ? ? 249 it {syn.} 102.2  min ε (≈ 100%) 249 Cf α (≈ 0.57%) 245 Bk 250 it {syn.} 8.6 h ε (> 97%) 2.100 250 cf α (?) 6.880 246 Bk 251 it {syn.} 33 h ε (?) 0.367 251 Cf α (0.5%) 6,597 247 Bk 252 it {syn.} 471.7 d α (78%) 6.760 248 Bk ε (22%) 1,260 252 Cf 253 it {syn.} 20.47 d α (100%) 6.739 249 Bk SF  (8.7 10 −6  %) ? ? 254 it {syn.} 275.7 d α (≈ 100%) 6.618 250 Bk ε (0.03%) 254 Cf 254 m es {syn.} 39.3 h β - (98%) 254 m SF (<3%) ? ? α (0.32%) 250 Bk 255 It {syn.} 39.8 d β - (92.0%) 0.288 255 ft α (8.0%) 251 Bk For other isotopes see list of isotopes Hazard and safety information GHS hazard labeling no classification available As far as possible and customary, SI units are used. Unless otherwise noted, the data given apply to standard conditions . Einsteinium is an exclusively artificially produced chemical element with the element symbol Es and the atomic number 99. In the periodic table it is in the group of actinides ( 7th period , f-block ) and is one of the transuranic elements . Einsteinium is a radioactive metal, which can only be produced with great effort in just weighable quantities. It was discovered in 1952 after the test of the first American hydrogen bomb and named in honor of Albert Einstein , who, however, had nothing to do with the discovery or research of Einsteinium. It is produced in very small quantities in nuclear reactors . The metal and its compounds are obtained in small quantities primarily for study purposes. ## history Einsteinium was discovered by Ivy Mike after the explosion . Elution curves : chromatographic separation of Fm (100), Es (99), Cf, Bk, Cm, Am. Albert Einstein, 1921, photograph by Ferdinand Schmutzer Einsteinium was found along with fermium after testing the first American hydrogen bomb, Ivy Mike , on November 1, 1952 on the Eniwetok Atoll . The first samples were obtained on filter papers that were carried when flying through the explosion cloud. Larger amounts were later isolated from corals. For reasons of military secrecy, the results were initially not published. An initial investigation of the remains of the explosion had shown the formation of a new plutonium isotope 244 Pu, which could only have resulted from the uptake of six neutrons by a uranium- 238 core and two subsequent β-decays . ${\ displaystyle \ mathrm {^ {238} _ {\ 92} U \ {\ xrightarrow [{- 2 \ \ beta ^ {-}}] {+ \ 6 \ (n, \ gamma)}} \ _ {\ 94} ^ {244} Pu}}$ At the time, it was believed that the absorption of neutrons by a heavy nucleus was a rare occurrence. However, the identification of 244 Pu led to the conclusion that uranium nuclei can capture many neutrons, resulting in new elements. The dissolved actinide ions were separated in the presence of a citric acid / ammonium citrate buffer in a weakly acidic medium ( pH  ≈ 3.5) with ion exchangers at an elevated temperature. Element 99 (Einsteinium) was quickly detected; the isotope 253 Es, a high-energy α-emitter (6.6 MeV), was first found. It is created by capturing 15 neutrons from 238 U, followed by seven β decays. This formation through continued neutron capture was possible because at the moment of detonation the neutron flux density was so high that most of the - radioactive - atomic nuclei that had formed in the meantime had not decayed by the next neutron capture. With a very high neutron flux, the mass number increases sharply without the atomic number changing. Only then do the resulting unstable nuclides decay over many β-decays to stable or unstable nuclides with a high atomic number: ${\ displaystyle \ mathrm {^ {238} _ {\ 92} U \ {\ xrightarrow [{- 7 \ \ beta ^ {-}}] {+ \ 15, \ 16, \ 17 \ (n, \ gamma) }} \ _ {\ \ \ \ \ \ \ \ \ \ \ \ 99} ^ {253, \ 254, \ 255} Es}}$ In September 1953, there was no telling when the results of the teams in Berkeley , Argonne and Los Alamos would be published. It was decided to produce the new elements through bombardment experiments; At the same time, it was assured that these results would not fall under secrecy and could therefore be published. Einsteinium isotopes were produced shortly afterwards at the University of California Radiation Laboratory by bombarding uranium ( 238 U) with nitrogen ( 14 N). It was noted that there is research on this element that has so far been kept secret. Isotopes of the two newly discovered elements were generated by irradiating the plutonium isotope 239 Pu, and the results were published in five publications in quick succession. The final reactions from Californium are: ${\ displaystyle \ mathrm {^ {252} _ {\ 98} Cf \ {\ xrightarrow {(n, \ gamma)}} \ _ {\ 98} ^ {253} Cf \ {\ xrightarrow [{17.81 \ d}] {\ beta ^ {-}}} \ _ {\ 99} ^ {253} Es \ {\ xrightarrow {(n, \ gamma)}} \ _ {\ 99} ^ {254} Es \ {\ xrightarrow [{}] {\ beta ^ {-}}} \ _ {100} ^ {254} Fm}}$ The Berkeley team was also concerned that another group of researchers might discover and publish the lighter isotopes of element 100 by ion bombardment before they could publish their classified research. Because at the end of 1953 and at the beginning of 1954 a working group from the Nobel Institute for Physics in Stockholm fired at uranium nuclei with oxygen nuclei; the isotope with the mass number 250 of the element 100 ( 250 μm) was formed. The Berkeley team has already published some results on the chemical properties of both elements. Finally, the results of the thermonuclear explosion were released in 1955 and then published. Ultimately, the Berkeley team's priority was universally recognized, as their five publications preceded the Swedish publication and they could rely on the previously secret results of the 1952 thermonuclear explosion. This was associated with the privilege of naming the new elements. They decided to name them after famous scientists who had already died. It was quickly agreed to give the names in honor of Albert Einstein and Enrico Fermi , both of whom had recently died: “We suggest for the name for the element with the atomic number 99, einsteinium (symbol E) after Albert Einstein and for the name for the element with atomic number 100, fermium (symbol Fm), after Enrico Fermi. "The announcement for the two newly discovered elements Einsteinium and Fermium was made by Albert Ghiorso at the 1st Geneva Atomic Conference , which took place from 8 to Took place on August 20, 1955. The element symbol for Einsteinium was later changed from E to Es . ## Isotopes All 17 nuclides and 3 nuclear isomers known to date are radioactive and unstable. The known mass numbers ranging from 241 to 258. The longest half-life has the isotope 252 may making it on earth no natural deposits give more with 471.7 days. 254 It has a half-life of 275.7 days, 255 Es of 39.8 days and 253 Es of 20.47 days. All other radioactive isotopes have half-lives below 40 hours, the majority of them are below 30 minutes. Of the 3 core isomers, 254 m Es is the most stable with t ½  = 39.3 hours. ## Extraction and presentation Einsteinium is created by bombarding lighter actinides with neutrons in a nuclear reactor. The main source is the 85  MW high-flux isotope reactor at Oak Ridge National Laboratory in Tennessee, USA, which is set up for the production of transcurium elements (Z> 96). In 1961 enough Einsteinium was synthesized to produce a weighable amount of the isotope 253 Es. This sample weighed about 0.01 mg and was used to make Mendelevium . Another Einsteinium was made at Oak Ridge National Laboratory by bombarding 239 Pu with neutrons . Approximately 3 milligrams were obtained in four years of continuous irradiation from one kilogram of plutonium and subsequent separation. ### Extraction of Einsteinium isotopes Small amounts of einsteinium and fermium were isolated and separated from plutonium , which was irradiated with neutrons. Four Einsteinium isotopes were found (with details of the half-lives measured at the time): • 253 Es: α-emitters with t ½  = 20.03 days and with a spontaneous fission half-life of 7 × 10 5  years • 254 m Es: β-emitter with t ½  = 38.5 hours • 254 Es: α emitters with t ½  ≈ 320 days • 255 Es: β-emitters with t ½  = 24 days Two fermium isotopes were found: • 254 Fm: α-emitters with t ½  = 3.24 hours and with a spontaneous fission half-life of 246 days • 255 Fm: α-emitter with t ½  = 21.5 hours Bombarding uranium with five-fold ionized nitrogen and six-fold ionized oxygen atoms also produced Einsteinium and Fermium isotopes. The isotope 248 Es was identified when 249 Cf was bombarded with deuterium. It decays mainly through electron capture (ε) with a half-life of 25 ± 5 minutes but also through the emission of α-particles (6.87 ± 0.02 MeV). The ratio (ε / α) of ∼ 400 could be identified by the amount of 248 Cf generated by electron capture . ${\ displaystyle \ mathrm {^ {249} _ {\ 98} Cf \ + \ _ {1} ^ {2} D \ \ longrightarrow \ _ {\ 99} ^ {248} Es \ + \ 3 \ _ {0 } ^ {1} n \ quad \ left (^ {248} _ {\ 99} Es \ {\ xrightarrow [{27 \ min}] {\ epsilon}} \ _ {\ 98} ^ {248} Cf \ right )}}$ The isotopes 249 Es, 250 Es, 251 Es and 252 Es were generated by bombarding 249 Bk with α-particles. Thereby 4 to 1 neutrons can leave the nucleus, so that the formation of four different isotopes is possible. ${\ displaystyle \ mathrm {^ {249} _ {\ 97} Bk \ {\ xrightarrow [{- \ 4 \ to \ 1 \ n}] {+ \ alpha}} \ _ {\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 99} ^ {249, ​​\ 250, \ 251, \ 252} Es}}$ Although the isotope 252 Es has the longest half-life, the isotope 253 Es is more easily accessible and is mainly used to determine the chemical properties. It was obtained by irradiating 100 to 200 μg 252 Cf with thermal neutrons (flux density: 2 to 5 × 10 14 neutrons × cm −2  s −1 , time period: 500 to 900 h). Ammonium α-hydroxyisobutyrate was used for the separation . ${\ displaystyle \ mathrm {^ {252} _ {\ 98} Cf \ {\ xrightarrow {(n, \ gamma)}} \ _ {\ 98} ^ {253} Cf \ {\ xrightarrow [{17.81 \ d}] {\ beta ^ {-}}} \ _ {\ 99} ^ {253} Es}}$ ### Depiction of elementary Einsteinium Einsteinium is obtained by reducing Einsteinium (III) fluoride with lithium or Einsteinium (III) oxide with lanthanum . ${\ displaystyle {\ ce {EsF3 + 3 Li -> Es + 3 LiF}}}$ ${\ displaystyle {\ ce {Es2O3 + 2 La -> 2 Es + La2O3}}}$ ## properties Quartz ampoule (9 mm diameter) with approx. 300 micrograms Es-253. The glow is created by the intense radiation. (Black and white photography) In the periodic table , the einsteinium with atomic number 99 is in the actinoid series, its predecessor is the californium, the following element is the fermium. Its analogue in the series of lanthanides is the holmium . ### Physical Properties Einsteinium is a radioactive metal with a melting point of 860 ° C, a boiling point of 996 ° C and a density of 8.84 g / cm 3 . It crystallizes in the cubic crystal system in the space group Fm 3 m (space group no. 225) with the lattice parameter a  = 575 pm, which corresponds to a face-centered cubic lattice (fcc) or a cubic closest packing of spheres with the stacking sequence ABC. The radioactivity is so strong that it destroys the metal grid. The metal is divalent and has a noticeably high volatility. ### Chemical properties Like all actinides, Einsteinium is very reactive. The trivalent oxidation state is most stable in aqueous solution , but bivalent and tetravalent compounds are also known. Bivalent compounds could already be represented as solids; the tetravalent state could already be postulated during chemical transport in tracer quantities, but a final confirmation is still pending. Aqueous solutions with Es 3+ ions are pale pink in color. ## safety instructions Classifications according to the CLP regulation are not available because they only include chemical hazard and play a completely subordinate role compared to the hazards based on radioactivity . The latter also only applies if the amount of substance involved is relevant. ## use Einsteinium is mainly used in the production of higher transuranic elements and transactinides . Otherwise, the metal and its compounds are primarily obtained in small quantities for study purposes. → Category: Einsteinium connection The study of einsteinium compounds is limited by several factors: • The most readily available isotope 253 It is only available once or twice a year on a microgram scale. • Long- range orders in solids are very quickly destroyed by the intense alpha radiation generated in around 20 days' half-life . • The radioactive decay produces the isotopes 249 Bk and 249 Cf, which quickly contaminate the sample. The rate is around 3% per day. ${\ displaystyle \ mathrm {^ {253} _ {\ 99} Es \ {\ xrightarrow [{20 \ d}] {\ alpha}} \ _ {\ 97} ^ {249} Bk \ {\ xrightarrow [{314 \ d}] {\ beta ^ {-}}} \ _ {\ 98} ^ {249} Cf}}$ ### Oxides Einsteinium (III) oxide  (Es 2 O 3 ) was obtained by calcining the corresponding nitrate in submicrogram quantities. The lattice parameter of the body-centered cubic crystal is 1076.6 (6)  pm . A monoclinic and a hexagonal lanthanum (III) oxide structure are also known. ### Oxyhalides The  oxyhalides Einsteinium (III) oxychloride (EsOCl), Einsteinium (III) oxibromide  (EsOBr) and Einsteinium (III) oxyiodide  (EsOI) are known. Einsteinium (III) oxychloride has a tetragonal structure of the PbFCl type. ### Halides Einsteinium (III) iodide (EsI 3 ), photographed in transmitted light Halides are known to have the +2 and +3 oxidation states. The most stable level +3 is known for all compounds from fluorine to iodine and is also stable in aqueous solution. Oxidation number F. Cl Br I. +3 Einsteinium (III) fluoride EsF 3 Einsteinium (III) chloride EsCl 3 orange Einsteinium (III) bromide EsBr 3 white-yellow Einsteinium (III) iodide EsI 3 amber colored +2 Einsteinium (II) chloride EsCl 2 Einsteinium (II) bromide EsBr 2 Einsteinium (II) iodide EsI 2 Einsteinium (III) fluoride  (EsF 3 ) can be prepared by precipitation from Einsteinium (III) chloride solutions with fluoride, as well as from Einsteinium (III) oxide by reaction with ClF 3 or F 2 at 1-2 atmospheres pressure and 300-400 ° C. The crystal structure could not be determined, but it is assumed that it corresponds to the LaF 3 type , as with Berkelium (III) fluoride  (BkF 3 ) and Californium (III) fluoride  (CfF 3 ) . Einsteinium (III) chloride  (EsCl 3 ) is an orange-colored solid and forms a hexagonal structure of the UCl 3 type , with the Es atom being coordinated 9 times. Einsteinium (III) bromide  (EsBr 3 ) is a white-yellow solid and forms a monoclinic structure of the AlCl 3 type . Einsteinium (III) iodide  (EsI 3 ) is an amber-colored solid and forms a hexagonal structure of the BiI 3 type . The divalent compounds of Einsteinium are produced by reducing the trivalent halides with hydrogen . ${\ displaystyle {\ ce {2 EsX3 + H2 -> 2 EsX2 + 2 HX}}}$ For einsteinium (II) chloride  (EsCl 2 ), einsteinium (II) bromide  (EsBr 2 ) and einsteinium (II) iodide  (EsI 2 ), no detailed crystallographic data are known, but measured values ​​of absorption bands are known. ## literature Commons : Einsteinium  - collection of images, videos and audio files Wiktionary: Einsteinium  - explanations of meanings, word origins, synonyms, translations ## Individual evidence 1. The values ​​of the atomic and physical properties (Infobox) are, unless otherwise stated, taken from: Richard G. Haire: Einsteinium , in: Lester R. Morss, Norman M. Edelstein, Jean Fuger (Ed.): The Chemistry of the Actinide and Transactinide Elements , Springer, Dordrecht 2006; ISBN 1-4020-3555-1 , pp. 1577-1620. 2. Entry on einsteinium in Kramida, A., Ralchenko, Yu., Reader, J. and NIST ASD Team (2019): NIST Atomic Spectra Database (ver. 5.7.1) . Ed .: NIST , Gaithersburg, MD. doi : 10.18434 / T4W30F ( https://physics.nist.gov/asd ). Retrieved June 13, 2020. 3. entry on einsteinium at WebElements, https://www.webelements.com , accessed on June 13, 2020. 4. The hazards emanating from radioactivity do not belong to the properties to be classified according to the GHS labeling. With regard to other hazards, this element has either not yet been classified or a reliable and citable source has not yet been found. 5. Albert Ghiorso: Einsteinium and Fermium , Chemical & Engineering News, 2003. 6. Albert Ghiorso , G. Bernard Rossi, Bernard G. Harvey, Stanley G. Thompson: Reactions of U 238 with Cyclotron-Produced Nitrogen Ions , in: Physical Review , 1954 , 93  (1), pp. 257-257 ( doi: 10.1103 / PhysRev.93.257 ). 7. SG Thompson, A. Ghiorso, BG Harvey, GR Choppin: Transcurium Isotopes Produced in the Neutron Irradiation of Plutonium , in: Physical Review , 1954 , 93  (4), pp. 908-908 ( doi: 10.1103 / PhysRev.93.908 ) . 8. BG Harvey, SG Thompson, A. Ghiorso, GR Choppin: Further Production of Transcurium Nuclides by Neutron Irradiation , in: Physical Review , 1954 , 93  (5), pp. 1129-1129 ( doi: 10.1103 / PhysRev.93.1129 ). 9. MH Studier, PR Fields, H. Diamond, JF Mech, AM Friedman, PA Sellers, G. Pyle, CM Stevens, LB Magnusson, JR Huizenga: Elements 99 and 100 from Pile-Irradiated Plutonium , in: Physical Review , 1954 , 93  (6), pp. 1428-1428 ( doi: 10.1103 / PhysRev.93.1428 ). 10. PR Fields, MH Studier, JF Mech, H. Diamond, AM Friedman, LB Magnusson, JR Huizenga: Additional Properties of Isotopes of Elements 99 and 100 , in: Physical Review , 1954 , 94  (1), pp. 209-210 ( doi: 10.1103 / PhysRev.94.209 ). 11. GR Choppin, SG Thompson, A. Ghiorso, BG Harvey: Nuclear Properties of Some Isotopes of Californium, Elements 99 and 100 , in: Physical Review , 1954 , 94  (4), pp. 1080-1081 ( doi: 10.1103 / PhysRev .94.1080 ). 12. Hugo Atterling, Wilhelm Forsling, Lennart W. Holm, Lars Melander, Björn Åström: Element 100 Produced by Means of Cyclotron-Accelerated Oxygen Ions , in: Physical Review , 1954 , 95  (2), pp. 585-586 ( doi: 10.1103 / PhysRev.95.585.2 ). 13. ^ GT Seaborg , SG Thompson, BG Harvey, GR Choppin: Chemical Properties of Elements 99 and 100 ( abstract ; machine script (July 23, 1954), Radiation Laboratory, University of California, Berkeley, UCRL-2591 (Rev.) ). 14. ^ SG Thompson, BG Harvey, GR Choppin, GT Seaborg: Chemical Properties of Elements 99 and 100 , in: J. Am. Chem. Soc. , 1954 , 76  (24), pp. 6229-6236 ( doi: 10.1021 / ja01653a004 ). 15. ^ A b A. Ghiorso, SG Thompson, GH Higgins, GT Seaborg ( Radiation Laboratory and Department of Chemistry, University of California, Berkeley, California ), MH Studier, PR Fields, SM Fried, H. Diamond, JF Mech, GL Pyle , JR Huizenga, A. Hirsch, WM Manning ( Argonne National Laboratory, Lemont, Illinois ), CI Browne, HL Smith, RW Spence ( Los Alamos Scientific Laboratory, Los Alamos, New Mexico ): New Elements Einsteinium and Fermium, Atomic Numbers 99 and 100 , in: Physical Review , 1955 , 99  (3), pp. 1048-1049 ( doi: 10.1103 / PhysRev.99.1048 ; Maschinoscript (June 9, 1955), Lawrence Berkeley National Laboratory. Paper UCRL-3036 ). 16. ^ PR Fields, MH Studier, H. Diamond, JF Mech, MG Inghram, GL Pyle, CM Stevens, S. Fried, WM Manning ( Argonne National Laboratory, Lemont, Illinois ); A. Ghiorso, SG Thompson, GH Higgins, GT Seaborg ( University of California, Berkeley, California ): Transplutonium Elements in Thermonuclear Test Debris , in: Physical Review , 1956 , 102  (1), pp. 180-182 ( doi: 10.1103 /PhysRev.102.180 ). 17. a b Richard G. Haire: Einsteinium , in: Lester R. Morss, Norman M. Edelstein, Jean Fuger (eds.): The Chemistry of the Actinide and Transactinide Elements , Springer, Dordrecht 2006; ISBN 1-4020-3555-1 , pp. 1577-1620. 18. G. Pfennig, H. Klewe-Nebenius, W. Seelmann-Eggebert (eds.): Karlsruher Nuklidkarte , 7th edition, 2006. 19. Irshad Ahmad, Frank Wagner, Jr .: Half-life of the longest-lived Einsteinium Isotope- 252 Es , in: J. Inorg. Nucl. Chem. , 1977 , 39  (9), pp. 1509-1511 ( doi: 10.1016 / 0022-1902 (77) 80089-4 ). 20. William McHarris, FS Stephens, F. Asaro, I. Perlman: Decay scheme of einsteinium-254 , in: Physical Review , 1966 , 144  (3), pp 1031-1045 ( doi: 10.1103 / PhysRev.144.1031 ). 21. G. Audi, O. Bersillon, J. Blachot, AH Wapstra: The NUBASE evaluation of nuclear and decay properties , in: Nuclear Physics A , 729, 2003, pp. 3–128. doi : 10.1016 / j.nuclphysa.2003.11.001 . ( PDF ; 1.0 MB). 22. ^ High Flux Isotope Reactor , Oak Ridge National Laboratory; Retrieved September 23, 2010. 23. Darleane C. Hoffman, Albert Ghiorso, Glenn Theodore Seaborg: The Transuranium People: The Inside Story , Imperial College Press, 2000, ISBN 978-1-86094-087-3 , pp. 190–191 ( limited preview in Google Book search). 24. M. Jones, RP Schuman, JP Butler, G. Cowper, TA Eastwood, HG Jackson: Isotopes of Einsteinium and Fermium Produced by Neutron Irradiation of Plutonium , in: Physical Review , 1956 , 102  (1), pp. 203-207 ( doi: 10.1103 / PhysRev.102.203 ). 25. LI Guseva, KV Filippova, Yu. B. Gerlit, VA Druin, BF Myasoedov, NI Tarantin: Experiments on the Production of Einsteinium and Fermium with a Cyclotron , in: Journal of Nuclear Energy , 1954 , 3  (4), pp. 341–346 (translated in November 1956) ( doi: 10.1016 / 0891-3919 (56) 90064-X ). 26. A. Chetham-Strode, LW Holm: New Isotope Einsteinium-248 , in: Physical Review , 1956 , 104  (5), pp. 1314-1314 ( doi: 10.1103 / PhysRev.104.1314 ). 27. ^ Bernard G. Harvey, Alfred Chetham-Strode, Albert Ghiorso, Gregory R. Choppin, Stanley G. Thompson: New Isotopes of Einsteinium , in: Physical Review , 1956 , 104  (5), pp. 1315-1319 ( doi: 10.1103 /PhysRev.104.1315 ). 28. SA Kulyukhin, LN Auerman, VL Novichenko, NB Mikheev, IA Rumer, AN Kamenskaya, LA Goncharov, AI Smirnov: Production of Microgram Quantities of Einsteinium-253 by the Reactor Irradiation of Californium , in: Inorganica Chimica Acta , 1985 , 110  ( 1), pp. 25-26 ( doi: 10.1016 / S0020-1693 (00) 81347-X ). 29. BB Cunningham, TC Parsons, USAEC Doc. UCRL-20426 (1971), p. 239. 30. ^ A b R. G. Haire, RD Baybarz: Studies of einsteinium metal , in: Journal de Physique Colloques , 1979 , 40  (C4), pp. 101-102 ( doi: 10.1051 / jphyscol: 1979431 ; PDF ; PDF ( machine script ) ). 31. ^ RG Haire: Properties of the Transplutonium Metals (Am-Fm) , in: Metals Handbook, Vol. 2, 10th Edition, (ASM International, Materials Park, Ohio, 1990), pp. 1198-1201. 32. Phillip D. Kleinschmidt, John W. Ward, George M. Matlack, Richard G. Haire: Henry's Law vaporization studies and thermodynamics of einsteinium ‐ 253 metal dissolved in ytterbium , in: J. Chem. Phys. , 1984 , 81 , pp. 473-477 ( doi: 10.1063 / 1.447328 ). 33. ^ AF Holleman , E. Wiberg , N. Wiberg : Textbook of Inorganic Chemistry . 102nd edition. Walter de Gruyter, Berlin 2007, ISBN 978-3-11-017770-1 , p. 1956. 34. ^ A b D. D. Ensor, JR Peterson, RG Haire, JP Young: Absorption spectrophotometric study of 253 EsF 3 and its decay products in the bulk-phase solid state , in: J. Inorg. Nucl. Chem. , 1981 , 43  (10), pp. 2425-2427 ( doi: 10.1016 / 0022-1902 (81) 80274-6 ). 35. a b R. G. Haire, RD Baybarz: Identification and Analysis of Einsteinium Sesquioxide by Electron Diffraction , in: J. Inorg. Nucl. Chem. , 1973 , 35  (2), pp. 489-496 ( doi: 10.1016 / 0022-1902 (73) 80561-5 ). 36. RG Haire, L. Eyring, in: Handbook on the Physics and Chemistry of Rare Earths , vol. 18 Lanthanoids and Actinides Chemistry (ed. By KA Gscheidner, Jr., L. Eyring, GR Choppin, GH Lander), North-Holland, New York 1994, pp. 414-505. 37. Jump up ↑ a b c d e J. P. Young, RG Haire, JR Peterson, DD Ensor, RL Fellow: Chemical Consequences of Radioactive Decay. 2. Spectrophotometric Study of the Ingrowth of Berkelium-249 and Californium-249 into Halides of Einsteinium-253 , in: Inorg. Chem. , 1981 , 20  (11), pp. 3979-3983 ( doi: 10.1021 / ic50225a076 ). 38. ^ A b J. R. Peterson, DD Ensor, RL Fellows, RG Haire, JP Young: Preparation, characterization, and decay of einsteinium (II) in the solid state , in: Journal de Physique Colloques , 1979 , 40  (C4), p. 111-113 ( doi: 10.1051 / jphyscol: 1979435 ; PDF ). 39. ^ AF Holleman , E. Wiberg , N. Wiberg : Textbook of Inorganic Chemistry . 102nd edition. Walter de Gruyter, Berlin 2007, ISBN 978-3-11-017770-1 , p. 1969. 40. JP Young, RG Haire, RL Fellows, JR Peterson: Spectrophotometric studies of transcurium element halides and oxyhalides in the solid state , in: Journal of Radioanalytical Chemistry , 1978 , 43  (2), pp. 479-488 ( doi: 10.1007 / BF02519508 ). 41. DK Fujita, BB Cunningham, TC Parsons, JR Peterson: The solution absorption spectrum of Es 3+ , in: Inorg. Nucl. Chem. Lett. , 1969 , 5  (4), pp. 245-250 ( doi: 10.1016 / 0020-1650 (69) 80192-3 ). 42. DK Fujita, BB Cunningham, TC Parsons: Crystal structures and lattice parameters of einsteinium trichloride and einsteinium oxychloride , in: Inorg. Nucl. Chem. Lett. , 1969 , 5  (4), pp. 307-313 ( doi: 10.1016 / 0020-1650 (69) 80203-5 ). 43. RL Fellows, JR Peterson, M. Noé, JP Young, RG Haire: X-ray diffraction and spectroscopic studies of crystalline einsteinium (III) bromide, 253 EsBr 3 , in: Inorg. Nucl. Chem. Lett. , 1975 , 11  (11), pp. 737-742 ( doi: 10.1016 / 0020-1650 (75) 80090-0 ). 44. ^ RG Haire, ORNL Report 5485, 1978 . 45. ^ JR Peterson: Chemical Properties of Einsteinium: Part II , in: GT Seaborg (Ed.): Proceedings of the 'Symposium Commemorating the 25th Anniversary of Elements 99 and 100' , January 23, 1978; Report LBL-7701, April 1979, pp. 55-64. 46. RL Fellows, JP Young, RG Haire, JR Peterson, in: The Rare Earths in Modern Science and Technology (edited by GJ McCarthy and JJ Rhyne), Plenum Press, New York 1977, pp. 493-499. 47. JP Young, RG Haire, RL Fellows, M. Noé, JR Peterson: Spectroscopic and X-ray Diffraction Studies of the Bromides of Cf-249 and Es-253 , in: Transplutonium 1975 (edited by W. Müller and R. Lindner), North Holland, Amsterdam 1976, pp. 227-234. This version was added to the list of articles worth reading on November 21, 2010 .
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 10, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7700989246368408, "perplexity": 14864.415571171246}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151866.98/warc/CC-MAIN-20210725205752-20210725235752-00524.warc.gz"}
http://www.maa.org/press/periodicals/convergence/sums-of-powers-of-positive-integers-pythagoras-c-570-500-bce-turkey-greece-italy
Sums of Powers of Positive Integers - Pythagoras (c. 570-500 BCE), Turkey-Greece-Italy Author(s): Janet Beery (University of Redlands) The Greek mathematician, philosopher, and mystic Pythagoras is said to have lived with his followers, the Pythagoreans, at Croton in what is now southern Italy. The Pythagoreans took as their motto “All is Number” and were believed to have experimented with number properties by arranging pebbles on a flat surface. As a result, they saw what we would describe as a sum of successive positive integers as a triangle or triangular number (Fig. 1). Figure 1. The first four triangular numbers Their pebble experiments led them to see that two copies of the same triangular number could be fitted together to form an oblong number; hence, for example, twice the triangular number 15 = 1 + 2 + 3 + 4 + 5 could be viewed as the oblong number 5 x 6 = 30 (Fig. 2). Figure 2. Twice a triangular number is an oblong number, or, in modern notation, $2(1 + 2 + 3 + \cdots + n) = n(n + 1).$ Here we see that $2(1 + 2 + 3 + 4 + 5) = 5\cdot 6.$ Equivalently, any triangular number was half an oblong number; for example, $1 + 2 + 3 + 4 + 5 = {{5 \cdot 6} \over 2},$ and, in general, $1 + 2 + 3 + \cdots + n = {{n(n + 1)} \over 2}$ for any positive integer n. Exercise 1: Use pebbles to illustrate that the sum of every two consecutive triangular numbers is a square number. Hint: Examples of pairs of consecutive triangular numbers include 6 and 10, 10 and 15, and 15 and 21. The solution to this exercise is available here. Janet Beery (University of Redlands), "Sums of Powers of Positive Integers - Pythagoras (c. 570-500 BCE), Turkey-Greece-Italy," Convergence (July 2010), DOI:10.4169/loci003284
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 2, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.5827512145042419, "perplexity": 921.1356759046046}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661905.96/warc/CC-MAIN-20160924173741-00275-ip-10-143-35-109.ec2.internal.warc.gz"}
https://en.m.wikiversity.org/wiki/Logical_disjunction
# Logical disjunction Logical disjunction, also called logical alternation, is an operation on two logical values, typically the values of two propositions, that produces a value of false if and only if both of its operands are false. The truth table of ${\displaystyle p~\operatorname {OR} ~q,}$ also written ${\displaystyle p\lor q,\!}$ appears below: ${\displaystyle p\!}$ ${\displaystyle q\!}$ ${\displaystyle p\lor q}$ ${\displaystyle \operatorname {F} }$ ${\displaystyle \operatorname {F} }$ ${\displaystyle \operatorname {F} }$ ${\displaystyle \operatorname {F} }$ ${\displaystyle \operatorname {T} }$ ${\displaystyle \operatorname {T} }$ ${\displaystyle \operatorname {T} }$ ${\displaystyle \operatorname {F} }$ ${\displaystyle \operatorname {T} }$ ${\displaystyle \operatorname {T} }$ ${\displaystyle \operatorname {T} }$ ${\displaystyle \operatorname {T} }$ ## Document history Portions of the above article were adapted from the following sources under the GNU Free Documentation License, under other applicable licenses, or by permission of the copyright holders.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 18, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6967623233795166, "perplexity": 618.4752526256788}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710801.42/warc/CC-MAIN-20221201053355-20221201083355-00174.warc.gz"}
https://www.discretization.de/movies/
Movies Some of our movies can be found on our Youtube channel. The Discrete Charm of Geometry A team of mathematicians is working together on a big project. Excitement of discovery, hope and disappointment, competition and recognition are shown from an infinitely close distance. Scientists united by the idea of discretization, which, in short, means: constructing continuous objects from basic building blocks. Akin to the scientists’ search for the right discretization of continuum, this film itself is composed of fragments – individual characters of different ages, temperaments and scientific approaches – which form a single continuous melody. The question of where the boundaries lie between mathematics and the lives of those who are involved in it and how much they are willing to sacrifice is as important as the search for precise scientific answers. A unique and unprecedented dive into the unknown world of mathematicians. conform! How can you make good flat maps of the round earth?' Our story begins with Mercator's world map of 1569, the first angle-preserving (or 'conformal') world map. His idea fell on fruitful soil, from which a new branch of mathematics has developed. The movie shows some of the highlights of this development, yielding a series of elegant visual forms which arise as 'conformal maps' on a variety of surfaces in 2- and 3-D. Featuring non-technical language, a simple aesthetic, compelling animation, and an original score, the movie builds an accessible bridge from everyday experience to a beautiful but little-known mathematical theory that continues to bear technological fruit today in fields such as computer graphics and architecture. Koebe Polyhedra and Minimal Surfaces This short experimental animation film explores the abstract mathematical world of Koebe Polyhedra and minimal surfaces. A 3D voyage thought the amazing world of discrete geometry, based on modern mathematical research. Georg Cantor - Der Entdecker der Unendlichkeiten Infinity has fascinated mankind for centuries. We wish for eternal life - looking up, space marks the final frontier. The idea of infinity for mathematics was invented by Georg Cantor; the 6th January 2018 marked the hundredth anniversary of his death. This documentary presents Georg Cantor’s life and his exploration of infinity for mathematics. Saxonia-Entertainment produced this documentary in collaboration with the SFB/TRR 109 and the TU Berlin for the MDR which will present it on Sunday, 4th March 2018 at 22:20 h. For further information please visit Saxonia-Entertainment or MDR. Six university professors of math and physics wanted to share the beauty of their research.They organize a competition with the hope of inspiring artists to create ground breaking pieces, based on modern science. A jury of six experts in art, fashion and architecture were invited to judge the results. One may think, that in contrast to mathematical beauty, artistic beauty can be appreciated without a complete understanding. Unexpectedly, mathematical rigor is replaced by artistic rigor; the overconfidence of scientists in the beauty of their research clashes with the modern artists world view. Math Circles Around the World Every week, hundreds of children in different cities of the world meet to solve complex problems. Who they are, why they do it and how, in the movie “Mathematical Circles Around the World”. Lobachevsky Space Like in Lobachevsky geometry where the space is in excess and the lines behave unusually, in the film "Lobachevsky space" unusual mathematics is spiced up by a good portion of background history and current politics. Past and present, science and politics, Russia and Germany, Lobachevsky and Gauss are confronted in a polyphonic dialogue. A modern portrait of a lonely genius, rector of the Kazan University, whose pioneering ideas forestalled the development of mathematics and science in general. Lobachevsky story reemerges through the observation of the daily life of scientists in Kazan, Berlin and Göttingen. Schrödinger's Smoke (SIGGRAPH 2016) We describe a new approach for the purely Eulerian simulation of incompressible fluids. In it, the fluid state is represented by a ℂ²-valued wave function evolving under the Schrödinger equation subject to incompressibility constraints. The underlying dynamical system is Hamiltonian and governed by the kinetic energy of the fluid together with an energy of Landau-Lifshitz type. The latter ensures that dynamics due to thin vortical structures, all important for visual simulation, are faithfully reproduced. This enables robust simulation of intricate phenomena such as vortical wakes and interacting vortex filaments, even on modestly sized grids. Our implementation uses a simple splitting method for time integration, employing the FFT for Schrödinger evolution as well as constraint projection. Using a standard penalty method we also allow arbitrary obstacles. The resulting algorithm is simple, unconditionally stable, and efficient. In particular it does not require any Lagrangian techniques for advection or to counteract the loss of vorticity. We demonstrate its use in a variety of scenarios, compare it with experiments, and evaluate it against benchmark tests. A full implementation is included in the ancillary materials. Inside Fluids: Clebsch Maps for Visualization and Processing (SIGGRAPH 2017) © 2017 California Institute of Technology, Technische Universität Berlin (Photo: Business Wire) Clebsch maps encode velocity fields through functions. These functions contain valuable information about the velocity field. For example, closed integral curves of the associated vorticity field are level lines of the vorticity Clebsch map. This makes Clebsch maps useful for visualization and fluid dynamics analysis. Additionally they can be used in the context of simulations to enhance flows through the introduction of subgrid vorticity. In this paper we study spherical Clebsch maps, which are particularly attractive. Elucidating their geometric structure, we show that such maps can be found as minimizers of a non-linear Dirichlet energy. To illustrate our approach we use a number of benchmark problems and apply it to numerically given flow fields. Shape from Metric (SIGGRAPH 2018) We study the isometric immersion problem for orientable surface triangle meshes endowed with only a metric: given the combinatorics of the mesh together with edge lengths, approximate an isometric immersion into $\mathbb{R}^3$. To address this challenge we develop a discrete theory for surface immersions into $\mathbb{R}^3$. It precisely characterizes a discrete immersion, up to subdivision and small perturbations. In particular our discrete theory correctly represents the topology of the space of immersions, i.e., the regular homotopy classes which represent its connected components. Our approach relies on unit quaternions to represent triangle orientations and to encode, in their parallel transport, the topology of the immersion. In unison with this theory we develop a computational apparatus based on a variational principle. Minimizing a non-linear Dirichlet energy optimally finds extrinsic geometry for the given intrinsic geometry and ensures low metric approximation error. We demonstrate our algorithm with a number of applications from mathematical visualization and art directed isometric shape deformation, which mimics the behavior of thin materials with high membrane stiffness. Watch the movie on https://youtu.be/FIVqa794w3U
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.16926756501197815, "perplexity": 1599.1464804939806}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00493.warc.gz"}
https://www.physicsforums.com/threads/kinematics-driving-question.260961/
# Kinematics, driving question 1. Oct 1, 2008 ### Jennifer001 1. The problem statement, all variables and given/known data you're driving down the highway late one night at 20ms when a deep steps onto the road 35m infront of you. your reaction time before steeping on the brakes is 0.5s and the max deceleration of ur car is 10m/s^2 what is the max speed you could have and still not hit the deer? deltaX=35m V=? a=-10m/s^2 reaction time = 0.5s 2. Relevant equations Xf= Xi+ViT+1/2aT^2 Vf-Vi=aT Vf^2=Vi^2+1/2a(deltaX) 3. The attempt at a solution so this is what i tried i pluged the numbers into the first equation to get 35=0+ViT+1/2(-10)T^2 and i have 2 missing variables so i tried to get it from the other equation Vf-Vi=aT 0-Vi=(-10)T then that didnt work so i tried the other equation Vf^2=Vi^2+1/2a(deltaX) 0=Vi^2+1/2(-10)35 Vi= 13.23m/s and i know that Vi can't be right because i did the question before it and it had Vi of 20m/s and it was 5m from hitting the deer...i dont know what i did wrong can someone help please? 1. The problem statement, all variables and given/known data 2. Relevant equations 3. The attempt at a solution 2. Oct 1, 2008 ### HallsofIvy Staff Emeritus In order to JUST miss hitting the deer, it must take all 35 meters to slow to 0 m/s. So you have TWO of the equations you just gave: 35=0+ViT+1/2(-10)T^2 for the 35 m and 0-Vi=(-10)T for the time to slow to 0. Now you have two equations in the two "unknown" numbers Vi and T. 0-Vi= -10T tells you that Vi= 10T. Replace Vi by that in the first equation to get a simple equation for T alone. Once you have found T, put that into Vi= 10T to find Vi. Similar Discussions: Kinematics, driving question
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8263382315635681, "perplexity": 1483.949907741207}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187828189.71/warc/CC-MAIN-20171024071819-20171024091819-00188.warc.gz"}
http://cdsweb.cern.ch/collection/L3%20Theses?ln=pt
Books, e-books, journals, periodicals, proceedings, standards and loaning procedures have been migrated on the 20th of April to the new website CERN Library Catalogue. See here for more information. # L3 Theses 2017-09-23 06:42 Messung der Myonpaarproduktion im Prozess e+ e- --> mu+ mu- (gamma) bei Schwerpunktsenergien von 89 GeV bis 183 GeV / Siedenburg, Thorsten Presented are the total cross-sections and forward-backward-asymmetries of the reaction at center of mass energies between 89 GeV and 183 GeV at the LEP-accelerator measured with the L3-Detector from 1995 to 1997 [...] PITHA-00-22 ; CERN-THESIS-2000-060. - 2000. - 125 p. Fulltext - Fulltext - Full text 2017-09-23 06:42 Kosmische Myonen im L3-Detektor / Saidi, Rachid Durch die Untersuchung des Mondschattens in der primaren kosmischen Strahlung konnen Informationen uber die Winkelau osung des L3-Detektors gewonnen werden, sowie mit ausreichender Statistik das Verhaltnis von Antiprotonen zu Protonen fur Protonenergien um 1 TeV abgeschatzt werden [...] CERN-THESIS-2000-066. - 2000. - 66 p. SERVER - Fulltext - Full text - Full text 2017-09-23 06:42 Analysis of Multi Muon Events in the L3 Detector / Schmitt, Volker The muon density distribution in air showers initiated by osmi parti les is sensitive to the hemi al omposition of osmi rays [...] CERN-THESIS-2000-067. - 2000. - 77 p. Full text - Full text 2017-09-22 06:23 Inclusive D*(+/-) production in two photon collisions at LEP / Prokofiev, Denis Olegovich In this thesis I present my results on the measurement of the open charm production in two-photon collision events done with the L3 detector at Large Electron Positron machine (LEP) [...] UMI-30-78734 ; CERN-THESIS-2001-073. - 2001. - 113 p. UMI - Purdue University 2017-09-22 06:23 Measurement of bottom quark production in two photon collisions / Saremi, Sepehr The cross section for bottom quark production in two-photon collisions, sigma( e+e- → e+e- bb¯X), is measured for the first time [...] UMI-30-42649 ; CERN-THESIS-2001-076. - 2001. - 160 p. UMI - Full text - Full text 2017-09-21 14:04 Search for scalar leptons at LEP with the L3 detector / Xia, Lei In this thesis, I present a search for scalar leptons in e+e- annihilation using the L3 detector at LEP [...] UMI-30-69427 ; CERN-THESIS-2002-097. - 2002. - 180 p. CT-THESIS - Fulltext - Full text 2017-09-21 14:04 Searches for the Standard Model Higgs boson in the leptonic decay channels / Yamamoto, Jin UMI-30-68997 ; CERN-THESIS-2002-098. - 2002. - 125 p. UMI 2017-09-21 14:04 Measurements of four fermion cross-sections at LEP / Kopal, Miroslav The production of four fermions in e+e− collisions at LEP allows the verification of the Standard Model of the Electroweak Interactions in the Charged and Neutral Current Sectors [...] UMI-30-99810 ; CERN-THESIS-2002-099. - 2002. - 124 p. 2017-09-19 11:15 Precision measurement of the W-boson properties with the L3 detector at LEP / Pal, Imre UMI-31-66688 ; CERN-THESIS-2004-095. - 2004. - 174 p. UMI 2017-09-19 11:15 Search for Antimatter in Cosmic Rays by using the Shadow of the Moon with the Muon Detector L3 / Parriaud, Jean-Francois CERN-THESIS-2003-062. - 2003. - 147 p. SERVER
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9414825439453125, "perplexity": 14039.563605052917}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 5, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039560245.87/warc/CC-MAIN-20210422013104-20210422043104-00016.warc.gz"}
https://mooseframework.inl.gov/source/markers/ErrorFractionMarker.html
# Errorfractionmarker Marks elements for refinement or coarsening based on the fraction of the min/max error from the supplied indicator. ## Description The ErrorFractionMarker utilizes the value from an Indicator as a measure of "error" on each element. Using this error approximation the following algorithm is applied: ErrorFractionMarker example calculation. 1. The elements are sorted by increasing error. 2. The elements comprising the "refine" fraction, from highest error to lowest, of the total error are marked for refinement. 3. The elements comprising the "coarsen" fraction, from lowest error to highest, of the total error are marked for refinement. ## Example Input Syntax [Adaptivity] [./Indicators] [./error] type = AnalyticalIndicator variable = u function = solution [../] [../] [./Markers] [./marker] type = ErrorFractionMarker coarsen = 0.1 indicator = error refine = 0.3 [../] [../] [] (test/tests/markers/error_fraction_marker/error_fraction_marker_test.i) ## Input Parameters • indicatorThe name of the Indicator that this Marker uses. C++ Type:IndicatorName Options: Description:The name of the Indicator that this Marker uses. ### Required Parameters • coarsen0Elements within this percentage of the min error will be coarsened. Must be between 0 and 1! Default:0 C++ Type:double Options: Description:Elements within this percentage of the min error will be coarsened. Must be between 0 and 1! • clear_extremesTrueWhether or not to clear the extremes during each error calculation. Changing this to false will result in the global extremes ever encountered during the run to be used as the min and max error. Default:True C++ Type:bool Options: Description:Whether or not to clear the extremes during each error calculation. Changing this to false will result in the global extremes ever encountered during the run to be used as the min and max error. • refine0Elements within this percentage of the max error will be refined. Must be between 0 and 1! Default:0 C++ Type:double Options: Description:Elements within this percentage of the max error will be refined. Must be between 0 and 1! • blockThe list of block ids (SubdomainID) that this object will be applied C++ Type:std::vector Options: Description:The list of block ids (SubdomainID) that this object will be applied ### Optional Parameters • outputsVector of output names were you would like to restrict the output of variables(s) associated with this object C++ Type:std::vector Options: Description:Vector of output names were you would like to restrict the output of variables(s) associated with this object • enableTrueSet the enabled status of the MooseObject. Default:True C++ Type:bool Options: Description:Set the enabled status of the MooseObject. • control_tagsAdds user-defined labels for accessing object parameters via control logic. C++ Type:std::vector Options: Description:Adds user-defined labels for accessing object parameters via control logic.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.16011415421962738, "perplexity": 3441.197734102124}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829140.81/warc/CC-MAIN-20181218102019-20181218124019-00088.warc.gz"}
http://sachinashanbhag.blogspot.com/2012/03/nonsingular-and-nondefective-random.html
## Thursday, March 1, 2012 ### Nonsingular and Nondefective Random Matrices In a previous post, I posed the folllowing question: Consider again, a random square n by n matrix A, whose entries are restricted to the set of integers {-p, -p+1, ..., 0, ... p-1, p}. Each of the 2p+1 values are equally probable. • What is the probability that this matrix is nonsingular? • What is the probability that this matrix is nondefective? For n = 3 and 4, using a simple Monte Carlo method, this is what I get. As p increases, we approach the continuous distribution of entries asymptotically. Blue lines are for n=3, and green for n=4. Triangles and squares denote the probability that a random matrix is nonsingular, and nondefective, respectively As we can see, both singular and defective matrices are extremely rare for large p. Between the two, defectiveness is a rarer feature.
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9356228113174438, "perplexity": 858.5306296866261}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 5, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102891.30/warc/CC-MAIN-20170817032523-20170817052523-00430.warc.gz"}
https://cracku.in/blog/number-series-questions-for-ssc-gd-pdf/
0 429 # Number Series Questions For SSC GD PDF Question 1: In the following question, select the missing number from the given series: 6, 19, 54, 167, 494, ? a) 1491 b) 1553 c) 1361 d) 1642 Question 2: In the following question, select the missing number from the given series: 67, 70, 74, 77, 81, 84 ? a) 87 b) 88 c) 86 d) 89 Question 3: In the following question, a series is given with one or more number (s) missing. Choose the correct alternative from the given options. 22, 22, 23, 20, 16, 17, 17, ?, ?, 8 a) 18, 9 b) 12, 13 c) 10, 9 d) 13, 10 Question 4: In the following question, a series is given with one or more number (s) missing. Choose the correct alternative from the given options. ?, 5, 30, 186, 1309, 10480 a) 0.25 b) 0.75 c) 1.00 d) 0 Question 5: In the following question, a series is given with one or more number (s) missing. Choose the correct alternative from the given options. 7, 51, 8, 65, 9, ? a) 79 b) 80 c) 81 d) 82 Question 6: In the following question, a series is given with one or more number (s) missing. Choose the correct alternative from the given options. 0.2, 0.16, 0.072, 0.0256, ? a) 0.0016 b) 0.004 c) 0.00512 d) 0.008 Question 7: Which of the following replaces ‘?’ in the following series? 10,21,45,84,500,? a) 1050 b) 1045 c) 985 d) 1025 Instructions In the following question, select the missing number from the given series. Question 8: 84, 42, 44, 22, 24, 12, ? a) 20 b) 14 c) 24 d) 28 Question 9: 1, 4, 13, 40, 121, ? a) 284 b) 286 c) 364 d) 396 Instructions In the following question, select the missing number from the given series. Question 10: 2, 7, 22, 67, ? a) 197 b) 198 c) 200 d) 202 Question 11: 1, 8, 29, 92, 281, ? a) 567 b) 628 c) 776 d) 848 Instructions In the following question, select the missing number from the given series. Question 12: 1, 7, 3, 9, 6, 12, 10, 16, 15, ? a) 18 b) 15 c) 20 d) 21 Question 13: 7, 10, 14, 19, 25, ? a) 32 b) 36 c) 38 d) 40 Question 14: In the following question, select the missing number from the given series. ?, 5, 15, 45, 113 a) 1 b) 2 c) 3 d) 4 Question 15: In the following question, select the missing number from the given series. 1, 1, 3, 4, 5, 9, 7, 16, 9, 25, 11, ? a) 17 b) 36 c) 49 d) 37 Instructions In the following question, select the missing number from the given series. Question 16: 2.2, 14.8, 40, 90.4, ? a) 191.2 b) 194.4 c) 196.2 d) 208.4 Question 17: 84, 42, 28, 21, ? a) 10.5 b) 16.8 c) 18.4 d) 19.6 Question 18: In the following series find 20th number 9, 5, 1, -3 -7, -11,…….. a) -64 b) -75 c) -70 d) -67 Instructions A series is given, with one from missing, Choose the correct alternative from the given ones that will complete the series. Question 19: 16, 61, 25, 52, 36, 63, 49, ? a) 36 b) 94 c) 72 d) 46 Question 20: Find the wrong number in the given series ? 15, 28, 30, 39, 48 a) 28 b) 15 c) 30 d) 39 Difference between the numbers is in the form of $[x][x^{2}]$ $10+[1][1^{2}]=10+11=21$ $21+[2][2^{2}]=21+24=45$ $45+[3][3^{2}]=45+39=84$ $84+[4][4^{2}]=84+416=500$ Next number: $500+[5][5^{2}]=500+525=1025$ The given series is an arithmetic progression with first term $a=9$ and common difference $d=-4$ $n^{th}$ term in an A.P. = $A_n=a+(n-1)d$ => $A_{20}=9+(20-1)\times(-4)$ = $9+(19)(-4)$ = $9-76=-67$ => Ans – (D)
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8662180304527283, "perplexity": 388.16329215612336}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703644033.96/warc/CC-MAIN-20210125185643-20210125215643-00167.warc.gz"}
https://www.physicsforums.com/threads/classical-equations-and-light.935851/
# B Classical equations and light 1. Jan 1, 2018 ### JulianM But momentum = mass x velocity so that part of the equation is E2 = c.(mv) If the mass is zero then that formulation also yields zero energy (which we know is not true) Last edited by a moderator: Jan 1, 2018 2. Jan 1, 2018 ### DrStupid This definition is based on another concept of mass. Today "mass" means invariant mass and that results in another equation for momentum. 3. Jan 1, 2018 ### PeroK The momentum of a photon is given by $p = hf/c$. Not by $p = mv$. In fact, $p = mv$ is a non-relativistic approximation of the momentum of a massive particle. The correct equation is: $p = \gamma mv$, where $\gamma = \frac{1}{\sqrt{1 - v^2/c^2}}$ 4. Jan 1, 2018 ### JulianM So lightarrow was wrong? 5. Jan 1, 2018 ### DrStupid No, he was and is still right. 6. Jan 1, 2018 ### JulianM Regardless of whether you include gamma this equation still contains mass. Anything multiplied by zero is still zero. 7. Jan 1, 2018 ### PeroK For a photon $E = cp$. So, he is right and you are not. $p = mv$, as I have already explained, is a classical equation for the momentum of a particle that is not valid in relativity - for any particle, massless or otherwise. Last edited by a moderator: Jan 1, 2018 8. Jan 1, 2018 ### DrStupid Again, this "m" is an outdated concept of mass. It dates back to classical mechanics and is not used anymore because it is frame dependent in relativity. With the modern concept of mass (invariant mass) the equations for momentum and energy are $p = \frac{{m \cdot v}}{{\sqrt {1 - \frac{{v^2 }}{{c^2 }}} }}$ $E = \frac{{m \cdot c^2 }}{{\sqrt {1 - \frac{{v^2 }}{{c^2 }}} }}$ Of course they cannot be used for photons (because v=c), but they result in equations like $p = \frac{{E \cdot v}}{{c^2 }}$ and $E^2 = m^2 \cdot c^4 + p^2 c^2$ which are valid for v=c and m=0. Last edited by a moderator: Jan 1, 2018 9. Jan 1, 2018 ### PeroK That equation is for a massive particle. It doesn't apply for a photon. In fact, it is not $0$ for a photon, it is undefined. Since the photon has zero mass and speed $c$ you would get: $p = \frac{mc}{0} = \frac00$ Which is undefined. So, you have to look elsewhere for the equation that gives the momentum of a photon. 10. Jan 1, 2018 ### JulianM So what is the equation in relativity? It can't be just multiplying momentum by gamma as PeroK did (above). That still gives zero energy. 11. Jan 1, 2018 ### PeroK The general equation for momentum is: $p^2c^2 = E^2 - m^2c^4$ That works for both massive and massless particles. For a massive particle the energy is $E = \gamma mc^2$ And, for a photon the energy is $E = hf$. 12. Jan 1, 2018 ### DrStupid But the limit for $v \to c$ (and therefore $m \to 0$) is defined. 13. Jan 1, 2018 ### JulianM How does $p^2c^2 = E^2 - m^2c^4$ work for a massless particle if p= m.v That would give (for v = c) ( mc^2).c^2 = E^2 - m^2.c^4 is equivalent to E^2 = m^2.c^4 - m^2.c^4 There's something wrong, surely it cannot apply to a massless particle which posses energy 14. Jan 1, 2018 ### PeroK What will it take for you to accept that $p = mv$ is not a valid equation? 15. Jan 1, 2018 ### Orodruin Staff Emeritus Again, as you have been told repeatedly, p = mv is not a valid equation relativistically. Repeating the same mistake does not make it true. 16. Jan 1, 2018 ### JulianM Well now you have me very confused. How do we know when to apply relativistic equations or not? 17. Jan 1, 2018 ### phinds For a massless particle, you have no choice. For massive particles, the relativistic equation is always true to but the slower the particle is, the less difference there is between the results of the classical equation and the relativistic equation. At human-scale speeds, the classical equation always gives results that are useful. 18. Jan 1, 2018 ### PeroK In principle, the relativistic equations are always valid and the classical equations are an approximation. If that approximation is good enough, then you can apply the classical equations. If the velocities involved are a significant proportion of the speed of light, then you definitely need the relativistic equations. In practice, it depends how accurate you need your answer. Time calculations for GPS satellites must be so accurate that relativistic equations are needed despite the modest speeds. But, normal engineering calculations are usually more than accurate enough with classical equations. 19. Jan 1, 2018 ### ZapperZ Staff Emeritus No, in THIS case, momentum is defined via the wavenumber, i.e. p=ħk So there is no requirement for a "mass" here. Zz. 20. Jan 1, 2018 ### Staff: Mentor You can always apply the relativistic equations, and you will always get the right answer. They're more exact than the non-relativistic ones. However, the relativistic equations are also more complicated and using them is more work, so we don't use them when the relativistic effects are small enough to ignore. For example: what is the kinetic energy and the momentum of a one-kilogram mass moving at ten meters per second? Try calculating that using the classical formulas and using the relativistic ones. Which was more work? And what difference did it make? The classical formulas can be used any time the speeds involved are small compared with the speed of light (equivalently, $\gamma$ is so close to 1 that you're OK with the approximation $\gamma=1$). Clearly this is not the case for particles travelling at the speed of light, so you know that the classical formulas can't be used here.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 2, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9619095921516418, "perplexity": 964.8592539168455}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945037.60/warc/CC-MAIN-20180421051736-20180421071736-00354.warc.gz"}
http://math.stackexchange.com/questions/241439/how-do-i-determine-coefficients-of-a-square-function-in-this-example
# How do I determine coefficients of a square function in this example? This point goes into plot of the function: P (-8, 6.25) I also know that: C= 11/12 The unknowns are A and B. Do I have enough data to solve this problem? - $$\;\;\;\;\;a(-8)^2+b(-8)+\frac{11}{12}=\frac{25}{4}=6.25\Longleftrightarrow 64a-8b+\frac{11}{12}=\frac{25}{6}$$
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8639755845069885, "perplexity": 1869.3689323055914}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049272823.52/warc/CC-MAIN-20160524002112-00150-ip-10-185-217-139.ec2.internal.warc.gz"}
http://farside.ph.utexas.edu/teaching/329/lectures/node83.html
Next: 2-d problem with Neumann Up: The diffusion equation Previous: An improved 1-d solution ## 2-d problem with Dirichlet boundary conditions Let us consider the solution of the diffusion equation in two dimensions. Suppose that (214) for , and . Suppose that satisfies mixed boundary conditions in the -direction: (215) at , and (216) at . Here, , , etc., are known functions of , whereas , are known functions of and . Furthermore, suppose that satisfies the following simple Dirichlet boundary conditions in the -direction: (217) As before, we discretize in time on the uniform grid , for . Furthermore, in the -direction, we discretize on the uniform grid , for , where . Finally, in the -direction, we discretize on the uniform grid , for , where . Adopting the Crank-Nicholson temporal differencing scheme discussed in Sect. 6.6, and the second-order spatial differencing scheme outlined in Sect. 5.2, Eq. (214) yields (218) where . The discretized boundary conditions take the form (219) (220) plus (221) Here, , etc., and , etc. Adopting the Fourier method introduced in Sect. 5.7, we write the in terms of their Fourier-sine harmonics: (222) which automatically satisfies the boundary conditions (221). The above expression can be inverted to give (see Sect. 5.9) (223) When Eq. (218) is written in terms of the , it reduces to (224) for , and . Here, , and . Moreover, the boundary conditions (219) and (220) yield (225) (226) where (227) etc. Equations (224)--(226) constitute a set of uncoupled tridiagonal matrix equations for the , with one equation for each separate value of . In order to advance our solution by one time-step, we first Fourier transform the and the boundary conditions, according to Eqs. (223) and (227). Next, we invert the tridiagonal equations (224)--(226) to obtain the . Finally, we reconstruct the via Eq. (222). Next: 2-d problem with Neumann Up: The diffusion equation Previous: An improved 1-d solution Richard Fitzpatrick 2006-03-29
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9880627393722534, "perplexity": 1363.7504573924564}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038078021.18/warc/CC-MAIN-20210414185709-20210414215709-00315.warc.gz"}
http://www.koreascience.or.kr/article/JAKO201511639883964.page
# 방열 기능형 고성능 스마트 전파흡수체 제조 방법 개발 및 전망 Kim, Dong Il;Jeon, Yong Bok 김동일;전용복 • Accepted : 2015.10.07 • Published : 2015.10.30 • 21 102 #### Abstract With the rapid progress of electronics and radio communication technology, human enjoys greater freedom in information communication. However, EMW(Electro-Magnetic Wave) environments have become more complicate and difficult to control. Thus, international organizations, such as the American National Standard Institution(ANSI), Federal Communications Commission(FCC), the Comite Internationale Special des Perturbations Radio Electrique(CISPR), etc, have provided standard for controlling the EM wave environments and for the countermeasure of the electromagnetic compatibility(EMC). In this paper, fabrication of the smart EMW absorber which has heat radiating function and high performance absorption abilities were suggested. Furthermore, we prospected future smart EMW absorbers. The designed smart EMW absorber is fabricated following process. Firstly, we applied high temperature heat treated to a mixture of Iron-oxide($Fe_2O_3$) and ceramics. Secondly, we applied low temperature heat treated to the mixture of heat treated material and a carbon material. Lastly, we made apertures on the absorber. The designed smart EM wave absorber has the absorption ability of more than 20 dB from 2 GHz to 2.45 GHz band, respectively. Thus, it is respected that these results can be applied as various EMC devices in electronic, communication, and controlling systems. #### Keywords Electro-Magnetic Wave Environment;Heat Radiating Function;Iron-Oxide;Heat Treatment;Smart EMW Absorber #### References 1. D. I. Kim, EMW Absorber Engineering, Dae-Young Pub. Co., 2006. 2. O. Hashimoto, Introduction to Wave Absorber, Morikita Publishing Co., 1997. 3. J. M. Song, H. J. Yoon, and Dong Il Kim, et al., "Dependence of electromagnetic wave absorption on ferrite particle size in sheet-type absorbers", J. Korea Phys. Soc., vol. 42, no. 5, pp. 671-675, 2003. 4. C. B. Mo, et al., "Fabrcating process and characristics of CNT/metal nano composite material", Korea Institute of Fine Engineering, vol. 24, no. 8, pp. 7-14, 2007. 5. J. H. Seong, et al., "Effects of mechanical characteristics on crystalization by variation of CNT and carbon- black reinforced rubber composite material", J. of Korea Institute of Mechanics, vol. 35, no. 9, pp. 999-1005, 2011. 6. A. Mehdipour, I. D. Rosca, C. W. Trueman, A. Sebak, and Suong Van Hoa, "Multi-wall carbon nanotube-epoxy composites with high shielding effectiveness for aeronautic applications", IEEE Transactions on Electromagnetic Compatibility, vol. 54, Issue. 1, pp. 28-36, 2012. https://doi.org/10.1109/TEMC.2011.2174241 7. E. Decrossas, M. A. El Sabbagh, S. M. El-Ghazaly, and V. F. Hanna, "Engineered carbon-nanotubes-based composite material for RF applications", IEEE Transactions on Electromagnetic Compatibility, vol. 54, Issue 1, pp. 52-59, Feb. 2003. 8. D. I. Kim, "Design of super wide-band ferrite EMW absorber in multi-layer type", J. of KIEES, vol. 7, no. 4, pp. 346-352, Oct. 1996. 9. Dong Soo Choi, Dong Il Kim, Do Yeol Kim, and Dong Han Choi, "A study on smart heat radiating sheet for protecting electronic equipments on the ship", International Journal of Navigation and Port Research, vol. 35, no. 7, pp. 569-573, Jul. 2011. https://doi.org/10.5394/KINPR.2011.35.7.569 10. 김동일, 최동한, 김기만, "옻의 특징과 옻을 지지재로 사용한 전자파 흡수체의 두께에 따른 전파흡수 특성 분석", 한국항해항만학회지, 28, pp. 861-867, 2004년 12월.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6079639792442322, "perplexity": 19552.283916051863}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527135.18/warc/CC-MAIN-20190419041415-20190419063415-00412.warc.gz"}
http://math.stackexchange.com/questions/58914/a2-i-det-a0-implies-ai-is-non-singular
# $A^2=I,\det A>0$ implies $A+I$ is non-singular Question: If a square matrix $A$ satisfies $A^2=I$ and $\det A>0$, show that $A+I$ is non-singular. I have tried to suppose a non-zero vector $x$ s.t. $Ax=x$ but fail to make a contradiction. And I tried to find the inverse matrix of $A+I$ directly, suppose $(A+I)^{-1}=\alpha I +\beta A$, but it still doesn't work. (Update: According to the two answers, this question itself is incorrect.) - This seems to be false: consider the $3 \times 3$ diagonal matrix with diagonal entries $1,-1,-1$. Similarly, taking an $n \times n$ diagonal matrix with two entries $-1$ and all the rest equal to $1$ gives a counterexample for any $n \geq 2$. (A comment on how I came up with this: the matrix $A+I$ is singular iff $-I-A$ is singular iff $-1$ is an eigenvalue of $A$. The condition $A^2 = I$ forces each of the eigenvalues to be $\pm 1$ and the condition $\operatorname{det} A > 0$ forces the number of instances of $-1$ to be even, but this is not enough to give the result.) Of course the above reasoning would also lead to Ricky Demer's counterexample, and probably should have. For some reason I thought of the above first. - $-I$ with even size is a counterexample. - $(I+A)(I-A)=0$, so $I+A$ is invertible (for $A$ satisfying $A^2=I$) if and only if $A=I$. This works for $A$ in any ring with unit [in which $2$ is invertible], not only a ring of square matrices. - Why $I+A$ is invertible implies $A=I$? There may be $A$ s.t. $A^2=I$ and $A\not=I,-I$. –  NGY Aug 22 '11 at 11:03 If I+A has inverse B, (I+A)(I-A)=0 implies B(I+A)(I-A)=B.0 hence I-A=0. –  Did Aug 22 '11 at 11:58 @Didier: thanks. Also, to go in the other direction, from A=I to (I+A) being invertible, I should have specified that there be no 2-torsion. –  zyx Aug 23 '11 at 3:11 A counter example is take matrix $A$ with diagonal entries 1 and -1. –  srijan May 12 '12 at 6:27
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.97335284948349, "perplexity": 276.19685402671604}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770324.129/warc/CC-MAIN-20141217075250-00029-ip-10-231-17-201.ec2.internal.warc.gz"}
http://physicshelpforum.com/kinematics-dynamics/4791-position-time.html
Physics Help Forum position time Kinematics and Dynamics Kinematics and Dynamics Physics Help Forum Aug 16th 2010, 09:31 AM #1 Senior Member   Join Date: Mar 2009 Location: Yadupatti Bazar,Sitamarhi Posts: 137 position time can anyone give me two examples having velocity and displcement just in opposite direction( if vel is +ve then disp is -ve and vice versa)? Thanks __________________ If science solves one problem, it creates ten other problems. Aug 16th 2010, 10:10 AM #2 Physics Team     Join Date: Jun 2010 Location: Morristown, NJ USA Posts: 2,352 I'll give you one example, then perhaps you can think of another on your own. When you throw a ball into the air, after some period of time it reaches its maximum height and then starts to fall back to the ground. While it is falling, and before it hits the ground, the displacement of the ball is positive (it's above the ground) but its velocity is negatrive (it is falling). I'm sure you can think of other example involving things like bouncing basketballs, or yo-yo's. Aug 16th 2010, 11:25 AM #3 Senior Member   Join Date: Mar 2009 Location: Yadupatti Bazar,Sitamarhi Posts: 137 suppose I take upward direction as +ve . Now, i throw a ball verticaly upward with a vel v. It reaches at maximum height +s(disp +ve, velocity also +ve) then falls down by covering -s(disp -ve,vel also -ve). Thus total disp: +s-s=0. I think in ur case it should be 2s( so how is it possible?) __________________ If science solves one problem, it creates ten other problems. Aug 17th 2010, 10:17 PM #4 Senior Member   Join Date: Mar 2009 Location: Yadupatti Bazar,Sitamarhi Posts: 137 can anyone comment? __________________ If science solves one problem, it creates ten other problems. Aug 18th 2010, 06:31 AM #5 Senior Member   Join Date: Mar 2009 Location: Yadupatti Bazar,Sitamarhi Posts: 137 i have got my answer. __________________ If science solves one problem, it creates ten other problems. Tags position, time Thread Tools Display Modes Linear Mode Similar Physics Forum Discussions Thread Thread Starter Forum Replies Last Post kerrymaid Kinematics and Dynamics 0 Jan 26th 2011 01:11 PM rodjav305 Kinematics and Dynamics 10 Oct 8th 2010 12:13 PM alessandro Kinematics and Dynamics 1 Jan 31st 2010 08:38 AM christina Kinematics and Dynamics 4 Dec 8th 2009 08:59 AM s3a Kinematics and Dynamics 4 Mar 12th 2009 07:40 AM
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8351492881774902, "perplexity": 5682.421140286371}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514576355.92/warc/CC-MAIN-20190923105314-20190923131314-00348.warc.gz"}
https://mathematica.stackexchange.com/questions/212286/cannot-remove-ragged-edges-of-transformedregion-plot
# Cannot remove ragged edges of TransformedRegion plot I am working with two mappings of a region in the complex plane and I can't eliminate the ragged edges of the region in the second map and do not see anyway to add points to make the perimeter smooth and was wondering if there is an option I'm not aware of?. The maps are: $$r1=\{z\in\mathbb{C} : |\log(z)\big|\leq 1\}$$ $$r2=\{z^{1/z}: z\in \text{r1}\}$$ I'm using the following code: r1 = ImplicitRegion[ Abs[Log[r Exp[I t]]] <= 1, {{r, 0, 3}, {t, -Pi, Pi}}] r1Plot = Region[r1, Axes -> True, PlotRange -> 3] g[{r_, t_}] := ReIm@((r Exp[I t])^(1/(r Exp[I t]))); r2 = TransformedRegion[r1, g]; r2Plot = Region[r2, Axes -> True, PlotRange -> 3] This produces (the perimeter edges are more noticeable in the notebook): • r1Plot = Style[Region[r1, Axes -> True, PlotRange -> 3, PerformanceGoal -> "Quality"], Antialiasing -> True]. I don't know how to avoid the mesh lines artifacts which shows up when using Antialiasing, however. See: mathematica.stackexchange.com/questions/381/…, mathematica.stackexchange.com/q/2629/55405 – WeavingBird1917 Jan 2 at 13:23 • Thanks. However, it's the second plot that has the polygon-like perimeter on part of the region I'm trying to smooth-out. And when I use those options on this plot, I still obtain the rough edges. Also, I know the region should be smooth by other methods. – Dominic Jan 2 at 13:36 If you use BoundaryDiscretizeRegion, you can control the resolution of the boundary: BoundaryDiscretizeRegion[r2, MaxCellMeasure -> "Length" -> 0.005]
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 2, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.15145476162433624, "perplexity": 2413.6134236675957}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735964.82/warc/CC-MAIN-20200805183003-20200805213003-00499.warc.gz"}
https://arxiv.org/abs/1406.3700
cs.CC # Title:The Parameterized Complexity of k-Biclique Authors:Bingkai Lin Abstract: Given a graph $G$ and a parameter $k$, the $k$-biclique problem asks whether $G$ contains a complete bipartite subgraph $K_{k,k}$. This is the most easily stated problem on graphs whose parameterized complexity is still unknown. We provide an fpt-reduction from $k$-clique to $k$-biclique, thus solving this longstanding open problem. Our reduction use a class of bipartite graphs with a threshold property of independent interest. More specifically, for positive integers $n$, $s$ and $t$, we consider a bipartite graph $G=(A\;\dot\cup\;B, E)$ such that $A$ can be partitioned into $A=V_1\;\dot\cup \;V_2\;\dot\cup\cdots\dot\cup\; V_n$ and for every $s$ distinct indices $i_1\cdots i_s$, there exist $v_{i_1}\in V_{i_1}\cdots v_{i_s}\in V_{i_s}$ such that $v_{i_1}\cdots v_{i_s}$ have at least $t+1$ common neighbors in $B$; on the other hand, every $s+1$ distinct vertices in $A$ have at most $t$ common neighbors in $B$. Using the Paley-type graphs and Weil's character sum theorem, we show that for $t=(s+1)!$ and $n$ large enough, such threshold bipartite graphs can be computed in $n^{O(1)}$. One corollary of our reduction is that there is no $f(k)\cdot n^{o(k)}$ time algorithm to decide whether a graph contains a subgraph isomorphic to $K_{k!,k!}$ unless the ETH(Exponential Time Hypothesis) fails. We also provide a probabilistic construction with better parameters $t=\Theta(s^2)$, which indicates that $k$-biclique has no $f(k)\cdot n^{o(\sqrt{k})}$-time algorithm unless 3-SAT with $m$ clauses can be solved in $2^{o(m)}$-time with high probability. Our result also implies the dichotomy classification of the parameterized complexity of cardinality constrain satisfaction problem and the inapproximability of maximum $k$-intersection problem. Subjects: Computational Complexity (cs.CC) ACM classes: F.2.2 Cite as: arXiv:1406.3700 [cs.CC] (or arXiv:1406.3700v3 [cs.CC] for this version) ## Submission history From: Bingkai Lin [view email] [v1] Sat, 14 Jun 2014 08:20:39 UTC (21 KB) [v2] Sat, 1 Nov 2014 05:46:37 UTC (25 KB) [v3] Sat, 8 Jun 2019 02:09:26 UTC (27 KB)
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7938564419746399, "perplexity": 568.388140462046}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998509.15/warc/CC-MAIN-20190617143050-20190617165050-00359.warc.gz"}
https://pub.uni-bielefeld.de/record/2331672
### Probing Backreaction Effects with Supernova Data Seikel M, Schwarz D (2009) In: PoS Cosmology. 029. Konferenzbeitrag | Veröffentlicht | Englisch Es wurden keine Dateien hochgeladen. Nur Publikationsnachweis! Autor*in Seikel, Marina; Schwarz, DominikUniBi Abstract / Bemerkung As the Einstein equations are non-linear, spatial averaging and temporal evolution do not commute. Therefore, the evolution of the averaged universe is affected by inhomogeneities. It is, however, highly controversial how large these cosmological backreaction effects are. We use the supernova data of the Constitution set up to a redshift of 0.1 in order to analyse to what extent the measurement of the Hubble constant is affected. The size of the effect depends on the size of the volume that is averaged over. The observational results are then compared to the theory of the backreaction mechanism. Erscheinungsjahr 2009 Titel des Konferenzbandes PoS Cosmology Seite(n) 029 Konferenz International Workshop on Cosmic Structure and Evolution Konferenzort Bielefeld , Germany Page URI https://pub.uni-bielefeld.de/record/2331672 ### Zitieren Seikel M, Schwarz D. Probing Backreaction Effects with Supernova Data. In: PoS Cosmology. 2009: 029. Seikel, M., & Schwarz, D. (2009). Probing Backreaction Effects with Supernova Data. PoS Cosmology, 029 Seikel, M., and Schwarz, D. (2009). “Probing Backreaction Effects with Supernova Data” in PoS Cosmology 029. Seikel, M., & Schwarz, D., 2009. Probing Backreaction Effects with Supernova Data. In PoS Cosmology. pp. 029. M. Seikel and D. Schwarz, “Probing Backreaction Effects with Supernova Data”, PoS Cosmology, 2009, pp.029. Seikel, M., Schwarz, D.: Probing Backreaction Effects with Supernova Data. PoS Cosmology. p. 029. (2009). Seikel, Marina, and Schwarz, Dominik. “Probing Backreaction Effects with Supernova Data”. PoS Cosmology. 2009. 029. Open Data PUB arXiv: 0912.2308 Inspire: 839834
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8895872831344604, "perplexity": 19873.31120514238}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107912807.78/warc/CC-MAIN-20201031032847-20201031062847-00244.warc.gz"}
https://icsecbsemath.com/2019/02/10/class-9-theorems-on-area-lecture-notes/
Area Axioms Area Axiom: Every polygonal region has an area and is measured in square units. Congruent Area Axiom: If $\triangle ABC$ and $\triangle DEF$ are two congruent triangles, then $ar(\triangle ABC) = ar(\triangle DEF)$. ie. two congruent regions have equal area. Rectangle Area Axiom: If $ABCD$ is a rectangular  region such that $AB = a$ units and $BC = b$ units, then $ar(ABCD) = ab$ square units. Parallelograms on the same base and between the same parallels Theorem 1: A diagonal of a parallelogram divides it into two triangles of same area In this case $ar (\triangle ABC) = ar (\triangle ADC)$ Also $ar (\triangle ABD) = ar (\triangle BCD)$ Theorem 2: Parallelograms on the same base and between the same parallels are equal  in area. $ar (ABCD) = AB \times h$ $ar (ABFE) = AB \times h$ $\therefore ar (ABCD) = ar (ABFE)$ Theorem 3: Area of a parallelogram is the product of its base and the corresponding altitude. Let the two adjacent sides of the parallelogram be $a$ and $b$.  Area $= Base \times Height$ Triangle Area Axiom Theorem 4: The area of a triangle is half the product of any  of its sides and the corresponding altitude. $a, b, c$ denotes the sides of the Triangle. Then: $\displaystyle \text{Area } = \frac{1}{2} \times Base \times Height = \frac{1}{2} bh$ Area $= \sqrt{s(s-a)(s-b)(s-c)}$. This is known as Heron’s Theorem. Theorem 5: If a triangle and parallelogram are on the same base and between the same parallels, the area of the triangle is equal to the half of the parallelogram. $ar (ABCD) = AB \times h$ $\displaystyle ar ( \triangle ABE) = \frac{1}{2} \times AB \times h$ $ar ( \triangle ABE) = ar (ABCD)$ Trapezium Area Axiom Theorem 6: The area of a trapezium is half the product of its heights and the sum of parallel sides. A trapezium is a quadrilateral two of whose sides are parallel. A trapezium whose non-parallel sides are equal is known as an isosceles trapezium. Let $a$ and $b$ be the parallel sides and $h$ be the distance between the parallel sides. $\displaystyle \text{Then Area } = \frac{1}{2} (a+b) \times h$ Triangles on the same base and between the same parallels Theorem 7: Triangles on the same base and the same parallels have the same area. $\displaystyle ar ( \triangle ABD) = \frac{1}{2} \times AB \times h$ $\displaystyle ar ( \triangle ABC) = \frac{1}{2} \times AB \times h$ $\displaystyle \therefore ar ( \triangle ABD) = ar ( \triangle ABC)$ Theorem 8: Triangles having equal areas and having one side of one of the triangles equal to one side of the other triangle, have their corresponding altitudes the same. Theorem 9: Two triangles having the same bases (or equal bases) and equal area lie between the same parallels.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 56, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8732918500900269, "perplexity": 342.26660405096226}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585504.90/warc/CC-MAIN-20211022084005-20211022114005-00279.warc.gz"}
https://mathhelpboards.com/threads/testing-latex-powered-by-mathjax.26/
### Welcome to our community • Moderator • #1 #### Chris L T521 ##### Well-known member Staff member Jan 26, 2012 995 $\int_0^{\infty}e^{-x^2}\,dx=\frac{\sqrt{\pi}}{2}$ This is inline: $$\frac{\sqrt{b^2-4ac}}{2a}$$ Other centered equation $$\Gamma(x)=\int_0^{\infty}e^{-t}t^{x-1}\,dt$$ Last edited: #### The Chaz ##### Member Jan 26, 2012 24 So LaTex in brackets is centered? Not sure I get the syntax, though I'm trying to scroll through it on the mobile... #### Ackbach ##### Indicium Physicus Staff member Jan 26, 2012 4,203 So \ ( and \ ), with no spaces, gives you inline. \ [ and \ ], with no spaces, gives you displayed. $$x^{2}+4x-4=0$$, but $x^{2}+4x-4=0.$ The first is inline, the second displayed. #### Prove It ##### Well-known member MHB Math Helper Jan 26, 2012 1,469 How odd. I was able to do centred fine using the dollar signs, but the others wouldn't work... #### Ackbach ##### Indicium Physicus Staff member Jan 26, 2012 4,203 How odd. I was able to do centred fine using the dollar signs, but the others wouldn't work... Yeah, it looks like the double-dollar signs are enabled for displayed equations, but the single are not enabled for inline, although MathJax is capable of doing those as well. Chris mentioned to me in an email that the reason for that is there are quite a few algebra problems concerning money, and newbies would have a hard time escaping those characters. #### ThePerfectHacker ##### Well-known member Jan 26, 2012 236 $$\Gamma(x)=\int_0^{\infty}e^{xt}t^{x-1}\,dt$$ Apparently LaTeX does not check for math mistakes. #### Prove It ##### Well-known member MHB Math Helper Jan 26, 2012 1,469 Yeah, it looks like the double-dollar signs are enabled for displayed equations, but the single are not enabled for inline, although MathJax is capable of doing those as well. Chris mentioned to me in an email that the reason for that is there are quite a few algebra problems concerning money, and newbies would have a hard time escaping those characters. I actually meant starting with the square and round brackets didn't work. Maybe I wasn't doing it right... Test: $$(a + b)^n = \sum_{r = 0}^n {n\choose{r}}a^{n-r}b^r$$ $\lim_{h \to 0}\frac{\sin{h}}{h} = 1$ Hmm, now it works >< #### CaptainBlack ##### Well-known member Jan 26, 2012 890 Test: Some text then inline $$f(x)=\sin(x^2/23)$$ OK $f(x)=\frac{1}{\sin(x)}$ OK $$\displaystyle f(x)=\frac{1}{\sin(x)}$$.....$$f(x)=\frac{1}{\sin(x)}$$ - just messing with the inline form more text. The thing that I don't like about the MathJax \ [ ... \ ] delimiters is the amount of white space inserted before and after the LaTeX Note the [ noparse] [ /noparse] taggs are not working CB • Moderator • #9 #### Chris L T521 ##### Well-known member Staff member Jan 26, 2012 995 Test: Some text then inline $$f(x)=\sin(x^2/23)$$ OK $f(x)=\frac{1}{\sin(x)}$ OK $$\displaystyle f(x)=\frac{1}{\sin(x)}$$.....$$f(x)=\frac{1}{\sin(x)}$$ - just messing with the inline form more text. The thing that I don't like about the MathJax \ [ ... \ ] delimiters is the amount of white space inserted before and after the LaTeX Note the [ noparse] [ /noparse] taggs are not working CB Since this being called from the MathJax js file, there was no need to create a BBcode for it. Hence, noparse will have no effect on it. #### Ackbach ##### Indicium Physicus Staff member Jan 26, 2012 4,203 Since this being called from the MathJax js file, there was no need to create a BBcode for it. Hence, noparse will have no effect on it. So question: how do we output raw LaTeX code? Verbatim? • Moderator • #11 #### Chris L T521 ##### Well-known member Staff member Jan 26, 2012 995 So question: how do we output raw LaTeX code? Verbatim? It turns out you can do that using the code tags. For example, Code: $\displaystyle\int_{\partial M} \omega$ would compile to $$\large{\displaystyle{\int_{\partial M} \omega}}$$. Last edited by a moderator: #### sbhatnagar ##### Active member Jan 27, 2012 95 Writing Inline LaTeX LaTeX without "\displaystyle" Code:\int_{0}^{\infty}\frac{\ln(x)}{(x-a)(x-b)}dx $$\int_{0}^{\infty}\frac{\ln(x)}{(x-a)(x-b)}dx$$ LaTeX with "\displaystyle" Code:\displaystyle \int_{0}^{\infty}\frac{\ln(x)}{(x-a)(x-b)}dx $$\displaystyle \int_{0}^{\infty}\frac{\ln(x)}{(x-a)(x-b)}dx$$ #### Markov ##### Member Feb 1, 2012 149 Re: Writing Inline LaTeX I just realized the LaTeX is showing itself nicely! That's good. Perhaps a little suggestion: I love to render LaTeX by using the dollar sign, but, is there a way to render fractions, sums, integrals, etc by not using \displaystyle? It's annoying to write it everytime! #### Ackbach ##### Indicium Physicus Staff member Jan 26, 2012 4,203 Re: Writing Inline LaTeX Try double-dollar signs (two to open, two to close). #### Markov ##### Member Feb 1, 2012 149 Re: Writing Inline LaTeX Well it didn't work that well, because by using doble dollar sign, it will center the content, and I don't always need to center the content. #### afwings ##### New member Mar 7, 2012 9 Just thought I'd test out some things too. Here's an inline equation $$u = \phi \cdot \exp \left\{ {{\textstyle{1 \over 2}}\sigma \left( {x + y} \right)} \right\}$$ and here's a display (centered) equation ${\rm{Bond Value}} = {\rm{C}}\left[ {\frac{{1 - \frac{1}{{{{\left( {1 + {\rm{r}}} \right)}^{\rm{t}}}}}}}{{\rm{r}}}} \right] + \frac{{{\rm{FV}}}}{{{{\left( {1 + {\rm{r}}} \right)}^{\rm{t}}}}}$ So, how'd that work out? #### afwings ##### New member Mar 7, 2012 9 Just thought I'd test out some things too. Here's an inline equation $$u = \phi \cdot \exp \left\{ {{\textstyle{1 \over 2}}\sigma \left( {x + y} \right)} \right\}$$ and... Ok, that's something I just noticed -- following the MathJax close delimiter -- \) -- even if I add a space, the space doesn't show up in the post. Wonder what happens if I add 2 spaces? Here's a shot at it: $${b^2} - 4ac % MathType!MTEF!2!1!+- % feaagGart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbdfgBPj % MCPbqedmvETj2BSbqefm0B1jxALjhiov2DGCKCLv2AGW0B3bqefqvA % Tv2CG4uz3bIuV1wyUbqee0evGueE0jxyaibaieYhf9irFfeu0dXdh9 % vqqj-hEeeu0xXdbba9frFj0-OqFfea0dXdd9vqai-hGuQ8kuc9pgc9 % q8qqaq-dir-f0-yqaiVgFr0xfr-xfr-xb9adbaqaaeGaciGaaiaabe % qaamaaeaqbaaGcbaGaamOyamaaCaaaleqabaGaaGOmaaaakiabgkHi % TiaaisdacaWGHbGaam4yaaaa!4201!$$ ok, I added 2 spaces, and still one showed up. Nice to know. (If it's already been pointed out, sorry I missed it.) Trying something else. Here's a simple matrix: $\left[ {\begin{array}{*{20}{c}}{10}&{20}\\{30}&4\end{array}} \right] % MathType!MTEF!2!1!+- % feaagGart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbdfgBPj % MCPbqedmvETj2BSbqefm0B1jxALjhiov2DGCKCLv2AGW0B3bqefqvA % Tv2CG4uz3bIuV1wyUbqee0evGueE0jxyaibaieYhf9irFfeu0dXdh9 % vqqj-hEeeu0xXdbba9frFj0-OqFfea0dXdd9vqai-hGuQ8kuc9pgc9 % q8qqaq-dir-f0-yqaiVgFr0xfr-xfr-xb9adbaqaaeGaciGaaiaabe % qaamaaeaqbaaGcbaWaamWaaeaafaqabeGacaaabaGaaGymaiaaicda % aeaacaaIYaGaaGimaaqaaiaaiodacaaIWaaabaGaaGinaaaaaiaawU % facaGLDbaaaaa!43CF!$ #### Jameson Staff member Jan 26, 2012 4,093 I'm not following what's going on in the matrix you made. Is that the intended output or did something go wrong? #### afwings ##### New member Mar 7, 2012 9 I'm not following what's going on in the matrix you made. Is that the intended output or did something go wrong? Jameson, thanks for following up on that. There are really 2 issues shown in my post, neither of which I believe to be MHB's error. 1. When viewing the forum in FF16 for Windows (and only in that configuration), the character immediately following an inline equation rendered by MathJax overlaps the right edge of the equation. If a period follows the equation, the period ends up inside the equation, like this one (again, this effect only happens on Windows, only in Firefox, and only with Math Renderer > MathML): $$\left( {x,y} \right) % MathType!MTEF!2!1!+- % feaagGart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbdfgBPj % MCPbqedmvETj2BSbqefm0B1jxALjhiov2DGCKCLv2AGW0B3bqefqvA % Tv2CG4uz3bIuV1wyUbqee0evGueE0jxyaibaieYhf9irFfeu0dXdh9 % vqqj-hEeeu0xXdbba9frFj0-OqFfea0dXdd9vqai-hGuQ8kuc9pgc9 % q8qqaq-dir-f0-yqaiVgFr0xfr-xfr-xb9adbaqaaeGaciGaaiaabe % qaamaaeaqbaaGcbaWaaeWaaeaacaWG4bGaaiilaiaadMhaaiaawIca % caGLPaaaaaa!40E2!$$. I've filed this as a MathJax bug, but it may be a Firefox bug. There are other things going on in Firefox 16. (And it may already be corrected; hard to tell.) 2. The second issue is related to how MathType codes matrices with the Math Help Boards translator, which will be added to Cut & Copy Preferences when MathType 6.9 is released (no projected release date yet). We've already corrected this. Bob #### Jameson Staff member Jan 26, 2012 4,093 Hi Bob, Glad it's all working then. I notice in your post how a long string of code renders a very short $$\displaystyle \left( {x,y} \right)$$. I'm guessing this is part of the Math Type plugin? Anyway, it sounds like you're more than on top of things so I won't ask you to explain it all to me. Just let me know if there's anything I can do and if any of the issues are on our end Best, Jameson #### Jay ##### New member Aug 19, 2014 14 So question: how do we output raw LaTeX code? Verbatim? You insert LaTeX code verbatim like this using CODE and /CODE tags enclosed within square brackets. Everything between the tags will be listed verbatim. Code: $$X = \sum_{n=0}^5\left(\left(\sum_{j=1}^k A_{X,n,j} \cdot {cos(B_{X,n,j} + t \cdot C_{X,n,j})}\right) \cdot t^n\right)$$ which means: $$X = \sum_{n=0}^5\left(\left(\sum_{j=1}^k A_{X,n,j} \cdot {cos(B_{X,n,j} + t \cdot C_{X,n,j})}\right) \cdot t^n\right)$$ Last edited:
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 2, "mathjax_display_tex": 2, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8584708571434021, "perplexity": 4662.702133482664}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304471.99/warc/CC-MAIN-20220124023407-20220124053407-00493.warc.gz"}
http://mathhelpforum.com/number-theory/202559-investigate-equality.html
# Math Help - Investigate Equality 1. ## Investigate Equality Problem: Investigate following equality: $\frac{2}{\pi }=\frac{\sqrt{2}}{2} \frac{\sqrt{2+\sqrt{2}}}{2} \frac{\sqrt{2+\sqrt{2+\sqrt{2}}}}{2} \text{...}$ Thanks. 2. ## Re: Investigate Equality What is there to investigate? Do you want to prove the equality? Do you want to formulate a partial product and see if it converges? 4. ## Re: Investigate Equality My thorough investigation revealed that this is Viète's formula. Now what? 5. ## Re: Investigate Equality Thanks a lot Vlasev, you are truly a good n efficient investigator...good to know the origin of the problem. 6. ## Re: Investigate Equality You can define a circle to be a regular polygon with an infinite number of sides. We can define \displaystyle \begin{align*} \pi \end{align*} as the circumference of a circle of diameter equal to 1 unit. Therefore, we can get an approximation for \displaystyle \begin{align*} \pi \end{align*} by evaluating the perimeter of said regular polygon. Some algebraic manipulation of this will give the result you are trying to prove. 7. ## Re: Investigate Equality This explanation is truly enlightening. Thanks a lot ProveIt. 8. ## Re: Investigate Equality That's indeed a magnificent proof!
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 3, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.994012176990509, "perplexity": 2370.008897634011}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802777454.142/warc/CC-MAIN-20141217075257-00068-ip-10-231-17-201.ec2.internal.warc.gz"}
http://thebeardsage.com/short-primer-on-probability/
# Short Primer on Probability ## Fundamentals A random variable is denoted in capital, and the values it can take is denoted in small . Consider a collection of random variables . Random variables can be thought of as features of a particular domain of interest. For example, the result of a coin toss can be represented using a single random variable, . This variable can take either of the categorical values or . If the same coin is tossed times, this can be represented using variables . Each of these values can be either or . ## Joint Probability An expression of the form is called a joint probability function over the variables . The joint probability is defined when the values of are respectively. This is denoted by the expression This is sometimes abbreviated as . For a fair coin toss, . If a fair coin is tossed five times, . The joint probability function satisfies ## Marginal Probability The marginal probability of one of the random variables can be computed if the values of all of the joint probabilities for a set of random variables are known. For example, the marginal probability is defined to be the sum of all those joint probabilities for which When dealing with propositional variables (True/False) TrueFalse is denoted as . ## Conditional Probabilities The conditional probability of given is denoted by . where is the joint probability of and and is the marginal probability of . Thus Joint conditional probabilities of several variables conditioned on several other variables is expressed as A joint probability can be expressed in terms of a chain of conditional probabilities. The general form of this chain rule is ## Bayes Rule Different possible orders give different expressions but they all have the same value for the same set of variable values. Since the order of variables is not important Which gives Bayes’ Rule ## Probabilistic Inference In set notation , , The variables having the values respectively is denoted by , where and are ordered lists. For a set , the variables in a subset of are given as evidence. For example, consider . The evidence is being false. In other words equates to . Thus need not be computed. ## Conditional Independence A variable is conditionally independent of a set of variables given a set if (1) (2) Saying that is conditionally independent of given also means that is conditionally independent of given . The same result also applies to sets and . As a generalization of pairwise independence, the variables are mutually conditionally independent, given a set if each of the variables is conditionally independent of all of the others given . (3) When is empty This implies that the variables are unconditionally independent. ### Thank You • Mark – for pointing out typos and errors ## 2 Comments →Short Primer on Probability 1. Mark Another great article! Nice, clear explanations. I do have some suggestions for improvement though: It seems there is an error in the Bayes Rule section. It should be P(V_i|V_j) = P(V_j|V_i)P(V_i)/P(V_j) I would also recommend explaining how you introduced the P and not P random variables in the Probabilistic Inference section as it is not quite clear how that works out. Finally, it seems your Latex implementation had trouble rendering for the fourth paragraph in the Conditional Independence section (\textbf{mutually conditionally independent}), right above equation (3). 1. TheBeard I have expanded the Probabilistic Inference section and fixed the errors you have pointed out. Thank you.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9611799716949463, "perplexity": 577.5965722055848}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334644.42/warc/CC-MAIN-20220926020051-20220926050051-00671.warc.gz"}
http://openstudy.com/updates/503e0c29e4b0c29115be4cfe
Here's the question you clicked on: 55 members online • 0 viewing ## anonymous 3 years ago y varies inversely as twice x. When x = 4, y = 1. Find y when x = 5. Delete Cancel Submit • This Question is Closed 1. anonymous • 3 years ago Best Response You've already chosen the best response. 0 y varies inversely as twice x will be something like $y = \frac{k}{2x}$ does that help? or do you need more hints? 2. anonymous • 3 years ago Best Response You've already chosen the best response. 0 i need more hints 3. anonymous • 3 years ago Best Response You've already chosen the best response. 0 good day vegas14, this is an example of a proportionality problem. what you need to do is read the problem word for word, each word will be giving you hint as to how to approach the problem. I will list the possible cases in this type of problem, I hope that it will help you. caseI: if the problem states that "y varies directly to x" it means that y is directly proportional to x "but", it will be proportional only if you multiply a proportionality constant "k" $y \alpha x$ this equation (eq1) symbolizes the direct proportionality of y to x, to be able to replace the proportionality symbol alpha to an equal (=) sign you must multiply x to a proportionality constant which is "k". therefore transforming the equation to, $y=k(x)$ 4. anonymous • 3 years ago Best Response You've already chosen the best response. 0 caseII: (this is the case of your problem) when the problem states that "y varies inversely as x" it means that your equation would be like this, $y \alpha \frac{ 1 }{ x }$ from this equation you should again have to replace the proportionality symbol "alpha" to an equal (=) sign. transforming the equation to be,$y=k(\frac{ 1 }{ x })$ which if simplified will become $y=\frac{ k }{ x }$ 5. anonymous • 3 years ago Best Response You've already chosen the best response. 0 of course problems may vary in this cases, for example "it may state twice as x therefore you should use "2x" or thrice as x use "3x" or may be as the square of x use $x^{2}$ it will now depend on your own analysis of the problem. 6. anonymous • 3 years ago Best Response You've already chosen the best response. 0 i really wanted to solve the problem for you, but it might be best if you do it on your own, just to test yourself if you really understand the logic behind =) but just to give you more tips: 1) Apply CaseII 2) Find the proportionality constant "k" ---- just this I will not give you which on the given you will use to solve for "k" =) 3) Solve for y(new) I hope this posts will help you. will check your answers soon. . . =) 7. Not the answer you are looking for? Search for more explanations. • Attachments: Find more explanations on OpenStudy ##### spraguer (Moderator) 5→ View Detailed Profile 23 • Teamwork 19 Teammate • Problem Solving 19 Hero • You have blocked this person. • ✔ You're a fan Checking fan status... Thanks for being so helpful in mathematics. If you are getting quality help, make sure you spread the word about OpenStudy.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.973931610584259, "perplexity": 1390.408053582421}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049270555.40/warc/CC-MAIN-20160524002110-00096-ip-10-185-217-139.ec2.internal.warc.gz"}
http://gorchilin.com/articles/energy/RLC_3?lang=en
2017-07-27 Research website of Vyacheslav Gorchilin All articles Parametric change of inductance in a RL-circuit. Back EMF In this note first we prove the theoretical possibility of obtaining additional energy from the back EMF in the inductor core. The proof is based on the classic formulas of electrical engineering. According to the classification here will be considered the generator of the first kind of first order partial cycle PCCIE. In our time, divorced many myths and legends about the inexhaustible possibilities of back EMF (AEDS) in the inductor. According to some researchers, OADS can give more energy than it expended, and their experiences, in some cases, confirm this. Theorists explain such powers by the ether theory or the unused energy of the atoms of ferromagnetic materials. We will try to draw conclusions based on mathematics and the theory of electrical circuits [1], which worked well and can fully display the necessary processes. Thus, the author reiterates the idea that issledovatelyam it is not necessary to go into the jungle of other theories and hypotheses, enough of a different angle to look at the classics. Next, we will show that the school or even high school — a nonparametric OATS — can increase the efficiency of the second kind $$(K_{\eta2})$$, so the outset that we consider only parametric coil which changes its inductance depending on the magnetic field $$(H)$$ in it. And since this tension is directly proportional to the current, as parameter we will have to address it. To convert the current back to $$H$$ is not extremely difficult, you need to know the parameters of the coil and core, i.e. the parameters of a particular device. In the previous section we showed that a parametric change in capacitance in the full cycle: charge-discharge, does not increase $$K_{\eta2}$$. The same can be said of inductance: it is enough to replace the voltage on the currents and to change some of the ratios in the diff. equation. But with the coil inductance, which will contain a ferromagnetic core, we can do a little differently. A typical graph of the magnetic permeability of the core is $$(\mu)$$ on the magnetic field $$H$$ to the left [2]. But the tension is proportional to the current, and the permeability of the inductance, this means that we can build a graph $$L(I)$$, which is proportional to $$\mu(H)$$. Thus, we obtain the parametric dependence of the inductance $$L$$ from the current $$I$$ flowing in it, and with this dependence, we will continue to work. As an example, compare the two charts to the actual measured characteristics of the ferrite from the flyback transformer: graph 1, graph 2. On the second chart the y coordinate $$M(I)$$ shows how changing the inductance of the coil compared to the original, and $$I$$ is the current in the coil. Recall that in this note we investigate AEDS, therefore, assume that the initial current $$I_0$$ in the coil already, and it will pass through the electric circuit consisting of inductance and resistance. How there came a shock we will discuss later, but for now we will use the classical formula for the calculation of the energy in the coil at the time of closure of the SW key: $W_L = \frac{L_0 I_0^2}{2} \qquad (3.1)$ where $$L_0$$ is the inductance of the coil at the time of closure of key SW. Now our task is this: to properly use this energy. It is necessary to find a mode in which the current in the circuit will produce the most work on active loading. The classic formula for this energy is: $W_R = R \int_0^T I(t)^2 dt \qquad (3.2)$ Where $$I(t)$$ is the current in the circuit depending on time, which is unknown to us. In order to find it, it is necessary to compile the differential equation for the transition process in our scheme [1]: ${L \over R} I(t)' + I(t) = 0 \qquad (3.3)$ where the inductance $$L$$ is a parameter from the current, and the current in turn — on time. For the solution of the equation it remains to determine the dependence of the inductance from the current for which we can take the polynomial $$M(I)$$ with coefficients $$..k_1 k_4$$. Its convenience — flexibility for various dependencies: $L = L_S\, M(I), \quad M(I) = {1 + k_1 I(t) + k_2 I(t)^2 \over 1 + k_3 I(t) + k_4 I(t)^3} \qquad (3.4)$ where $$L_S$$ is the initial inductance of the coil (no current). $$M(I)$$ must be proportional to $$\mu$$ from $$H$$ to the real core. We introduce the time constant of the circuit $$\tau = L_S/R$$, which will record the final shape of the diff. equation: $\tau\, M(I)\, I' + I = 0 , \quad I=I(t) \qquad (3.5)$ the Analytical solution of this equation in this form is complicated, so we use mathematical editor MathCAD and get it in a numerical form. In the editor we appreciate the real time operation of the circuit after closing of the key, we denote it $$T$$ and make this time a finite number. Why do we need time? Indeed, if we want to obtain the dependence of the increase in efficiency of $$\mu$$ (see top graph), why should we use one additional variable — the time? Will try to fix it. We rewrite (3.6) in another form: $-\tau\, M(I)\, I' = I, \quad I=I(t) \qquad (3.6)$ and substitute into the formula (3.2): $W_R = R \int_0^T \left[\tau\, M(I)\, I'\right]^2 dt \qquad (3.7)$ After some mathematical operations, the author obtained a rather unusual integral in which energy dissipation on resistance does not depend on $$t$$, and even from the resistance: $W_R = \frac{L_S}{2} \int_0^{I_0^2} M(\sqrt{J})\ dJ , \quad J = I^2 \qquad (3.8)$ Here you need to pay attention to the fact that in paginegialle functions are all $$I$$ change for $$J$$ by the rule: $$I=\sqrt{J}$$. To find the final formula calculates the energy gain, divide the energy dispersed on the active resistance on the starting energy in the coil is: $K_{\eta2} = {W_R \over W_L} \qquad (3.9)$ Given that $W_L = {L_0\, I_0^2 \over 2} = {L_S\, M(I_0)\, I_0^2 \over 2}, \quad M(I_0)= {1 + k_1 I_0 + I_0 k_2^2 \over 1 + I_0 k_3 + k_4 I_0^3} \qquad (3.10)$ substitute the previously obtained results and we get an incredibly interesting pattern that does not depend on the time coordinate: $K_{\eta2} = \frac{1}{M(I_0)\, I_0^2} \int_0^{I_0^2} M(\sqrt{J})\, dJ , \quad J = I^2 \qquad (3.11)$ Or this same formula in another form: $K_{\eta2} = \frac{2}{M(I_0)\, I_0^2} \int_0^{I_0} M(I) \, I \, dI \qquad (3.12)$ Well, if we all want the same thing to Express through the magnetic permeability of the core and the magnetic field $$\mu(H)$$, then the formula (3.12), simply replace the appropriate letters: $K_{\eta2} = \frac{2}{\mu (H_0)\, H_0^2} \int_0^{H_0} \mu (H) \, H \, dH \qquad (3.13)$ Equations (3.11-3.13) and are the mathematical expression of free energy for back EMF in the coil core! A more General approach for the derivation of this formula see here From it immediately clear that if a parametric dependency is missing, i.e. $$M(I)=M(J)=1$$, then a raise is not: $$K_{\eta2}=1$$. We have to learn to use this formula and find out whether there can be $$K_{\eta2}$$ is greater than one. What is the result? For example, take $$M(I)$$ from formulas (3.4) and substitute it into (3.11) replacing $$I$$ to $$J$$ by the rule: $$I=\sqrt{J}$$. The time dependence of ex and obtain: $K_{\eta2} = \frac{1}{M(I_0)\, I_0^2} \int_0^{I_0^2} {1 + k_1 J^{0.5} + k_2 J \over 1 + k_3 ^{0.5} + k_4 ^{1.5}}\, dJ \qquad (3.14)$ Again for example, enter the following current, and the coefficients are $$I_0=1.4, k_1=10, k_2=0, k_3=0, k_4=5$$. The left side shows a graph of the inductance of the coil from the current in accordance with these coefficients. As you can see, we work in growing, and in the drop-down field magnetization curve of the core and primary inductance is less than the maximum about 4 times, which is close to the real values of permeability of ferromagnets. Solving the integral (3.14) we get $$K_{\eta2}=2.07$$ is greater than one! To substitute other factors and to get your results you can in the editor MathCAD downloading there this program or to test it in the calculator. It a visible pattern, which confirms the assumption that the drop down part of the curve $$\mu$$ from $$H$$ gives the largest contribution to the energy increase. In addition to choosing the work area on the chart, to achieve a positive result, it is necessary that the device provide access to the coil for the desired mode of current and magnetic field strength. The rationale for the occurrence of additional energy in such devices, see here What in practice? You need to understand that we get according to equations (3.11-3.13) is the marginal value. Depending on the material of the core, when working on the right drop-down plot of $$M(I)$$, you may experience a variety of losses, mostly heat. But they will not always be equal to this increase, and therefore is described here the way to super devices still remains open. Izvestia of materials, good performance $$K_{\eta2}$$ should give Permalloy, on which chart, you can easily find the working site, even better — Metglas [8]. A little worse, in this sense, the situation with ferrites. Promising look some modern steels and certain core construction [5], however, we must not forget that part of the energy can be spent on Foucault. Permalloy is working in a relatively small frequency and therefore the device running on it cannot develop large capacities. Ferrite can withstand orders of magnitude for large frequencies, but it is much more fragile. However, as a result, it can operate at high capacity. The question remains open: how do you receive the initial current $$I_0$$ in the coil and how long it takes for the energy? For answer there are different approaches. One of them suggests that the core need to podmanivaya perpendicular to the primary field [3], and it can be done with short pulse whose energy is several times lower than required due to the inertia of a ferromagnet. The second approach [4-6] involves the ramp-up without additional perpendicular field. The third offers mechanical excitation of the core is a permanent magnet, and thus the initial current appears in the coil [7]. Given all the above it seems to us a very real seredinny receiving devices based on coils with ferromagnetic core. As you know, if math gave the green light, then the practical implementation will not take long. The results of this work was done by a specialized calculatorthat allows you to find the dependence of magnetic permeability of any core on the magnetic field and to calculate it is potentially achievable increment of efficiency of the second kind. The materials used
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8721423149108887, "perplexity": 298.5374576890251}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211935.42/warc/CC-MAIN-20180817084620-20180817104620-00475.warc.gz"}
https://www.gamedev.net/forums/topic/645924-sfml-crash-when-debugging-but-ok-on-release/
# SFML crash when debugging, but ok on release. ## Recommended Posts Meerul264    130 I tried to search regarding this problem on google but couldn't find a similar case. The problems I found is vice versa of mine - crash when release but ok when debugging. I already checked my project's configuration a dozen times but still can't find whats wrong. ##### Share on other sites alh420    5995 In what way is it crashing? My first guess is that it's because of uninitialized data. The value of the unintialized data will be different in release and debug, and might make one of the cases crash. My second guess is misuse of some pointer that either writes outside a buffer, or in already freed memory. That could also lead to one case crashing and the other not. In both cases it can go either way, release working and debug crashing, or debug working but release crashing. ##### Share on other sites SiCrane    11839 For SFML another possibility is that you've linked to the release version of the library in debug mode. ##### Share on other sites Meerul264    130 In what way is it crashing? Thanks for replying. The crash is that, it just produce white blank window. And when I try to click the window, it wouldn't respond (like when trying to click 'x' button to close the window). Also, this doesn't happen before I changed the code a bit. After I received this crash, I undo the changes I had made, but still get the crash. Why did this happen? For SFML another possibility is that you've linked to the release version of the library in debug mode. I don't think so. Under my Configuration -> Debug -> Linker -> Input -> Additional dependencies: sfml-graphics-d.lib sfml-window-d.lib sfml-system-d.lib If I'm not mistaken, "-d" for debug, without the "-d" for release. Also, I just realised I got this output when debugging: 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\dinput.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\hid.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\wintrust.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\crypt32.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\msasn1.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\ole32.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Unloaded 'C:\Windows\SysWOW64\ole32.dll' 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\apphelp.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\cmd.exe'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Unloaded 'C:\Windows\SysWOW64\cmd.exe' 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\cmd.exe'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Unloaded 'C:\Windows\SysWOW64\cmd.exe' 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\cmd.exe'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Unloaded 'C:\Windows\SysWOW64\cmd.exe' 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\cmd.exe'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Unloaded 'C:\Windows\SysWOW64\cmd.exe' [...and the lists of similar kind of error goes on...] I hope this can give you the clue to find what causes this crash. Thanks for the reply really appreciate it. ##### Share on other sites Meerul264    130 I also got this, is this important? 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Users\Amirul\Documents\Visual Studio 2012\Projects\Dragon Villa SFML\Dragon Villa SFML\sfml-graphics-d-2.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Users\Amirul\Documents\Visual Studio 2012\Projects\Dragon Villa SFML\Dragon Villa SFML\sfml-window-d-2.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Users\Amirul\Documents\Visual Studio 2012\Projects\Dragon Villa SFML\Dragon Villa SFML\sfml-system-d-2.dll'. Cannot find or open the PDB file. ##### Share on other sites Here's my general process for solving these kinds of problems: Step 1: "Rebuild all". This might fix your problem on its own. Step 2: Scatter a few breakpoints around areas where you think the crash is occurring. Step 3: Run your debugger, and when you hit a debugger, start stepping through the code (using your debugger's 'step' feature) bit by bit until it reaches the point where it crashes. This is how you know what line is causing the crash. Step 4: Find out why that line is crashing. Is a pointer uninitialized? Are you dividing by zero? Was the object already destroyed? Step 5: Fix the problem. If you need help with that part, after you've already found the cause of the problem, then show us the part that's crashing, and we might have a few ideas if, by that point, you haven't already solved it yourself - which is usually the case. It's also not a bad idea to occasionally run your code through a static analyzer like cppcheck. Static analyzers read your code, without compiling it, and look for common mistakes that compile fine but don't work fine. ##### Share on other sites Dragonsoulj    3212 In what way is it crashing? Thanks for replying. The crash is that, it just produce white blank window. And when I try to click the window, it wouldn't respond (like when trying to click 'x' button to close the window). Also, this doesn't happen before I changed the code a bit. After I received this crash, I undo the changes I had made, but still get the crash. Why did this happen? For SFML another possibility is that you've linked to the release version of the library in debug mode. I don't think so. Under my Configuration -> Debug -> Linker -> Input -> Additional dependencies: sfml-graphics-d.lib sfml-window-d.lib sfml-system-d.lib If I'm not mistaken, "-d" for debug, without the "-d" for release. Also, I just realised I got this output when debugging: 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\dinput.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\hid.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\wintrust.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\crypt32.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\msasn1.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\ole32.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Unloaded 'C:\Windows\SysWOW64\ole32.dll' 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\apphelp.dll'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\cmd.exe'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Unloaded 'C:\Windows\SysWOW64\cmd.exe' 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\cmd.exe'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Unloaded 'C:\Windows\SysWOW64\cmd.exe' 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\cmd.exe'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Unloaded 'C:\Windows\SysWOW64\cmd.exe' 'Dragon Villa SFML.exe' (Win32): Loaded 'C:\Windows\SysWOW64\cmd.exe'. Cannot find or open the PDB file. 'Dragon Villa SFML.exe' (Win32): Unloaded 'C:\Windows\SysWOW64\cmd.exe' [...and the lists of similar kind of error goes on...] I hope this can give you the clue to find what causes this crash. Thanks for the reply really appreciate it. Anytime I get a white screen it is because I am missing a .dll in the folder. ##### Share on other sites Meerul264    130 start stepping through the code (using your debugger's 'step' feature) Lol thanks for introducing me to this interesting feature. i wouldn't know this exist. Anyway i tried it out and found out that in main: TEXT.Set_Fonts(); // problem avoided when I commented this out and came back when I uncomment this TEXT.Set_Texts(); So I guess that is the root of the problem. But I couldn't figure out why is it so. //in Texts.cpp void Texts::Set_Fonts() { { for(int i = 0; i < 10; i++) { text[i].setFont(font); promptedText[i].setFont(font); } FPS.setFont(font); } else { std::cout << "Failed to load fonts " << std::endl; system("pause"); } } ##### Share on other sites Did you step through ("step into") that function also? My guess is that this part of the documentation might be causing some difficulty. The sf::Text only keeps a pointer to the sf::Font. You have to make sure the sf::Font stays around for longer than the sf::Texts are in use. Edited by Servant of the Lord ##### Share on other sites Meerul264    130 I figured out the problem. It was really a silly mistake. I made the array promptedText[] to have a size of 2 elements ( I should make it at least 10 ) and I forgot to change it to 10 . Really silly mistake.. But this make me wonder why it gives a green light on release. Oh well I got it now. Thanks man Edited by Meerul264 ##### Share on other sites Yeah, that kind of mistake occurs alot. Part of programming is learning good practices that reduces or removes those kind of mistakes. Two solutions: 1) Don't use "magic numbers" in your code. '10' in your code doesn't mean anything, and neither does '2'. Changing them in one place requires you to remember changing them in other places (sometimes dozens). Instead, it's much better to replace magic numbers with well-named constant variables. Changing the constant's value automaticly makes all the code that uses the constant still work properly. Example: //The value is only set once, in a specific location. const int PROMPTED_TEXT_COUNT = 10; //In one location: sf::Text promptedText[PROMPTED_TEXT_COUNT]; //In another location: for(size_t i = 0; i <  PROMPTED_TEXT_COUNT; i++) { ... } 2) You could make it a std::vector. Or, if you're using C++11, you could make it a std::array. std::vectors keep track of their size as part of their class, and can still be accessed through the [] subscript operator during for() loops, and can also be used with vector.at(n) which double-checks that that location is valid before accessing. Your for-loop would then look like: //If you're using C++11's new range-for() syntax: for(sf::Text &text : promptedText) { text.setFont(font); } //If you're not using C++11's range-for(): for(size_t i = 0; i < promptedText.size(); i++) { promptedText[i].setFont(font); } I'd also make sure "text[i].setFont(font);" and  "promptedText[i].setFont(font);" are in different for()-loops, unless you're 100% confident that they will always forever have the same number of elements as each other. Edited by Servant of the Lord ##### Share on other sites Meerul264    130 //If you're not using C++11's range-for(): for(int i = 0; i < promptedText.size(); i++) { promptedText[i].setFont(font); } You are using promptedText.size(). Doesn't that require promptedText.push_back(sf::Text &) first? Is this possible if I were to initialise the font of this text before i begin the game loop (i.e before window is open) ? Or you are saying that I have to implement the std::vector's reserve() or resize() first? Edited by Meerul264 ##### Share on other sites Oh, yes, most certainly resize to the correct size first. I was (incorrectly) assuming your code was already doing that in your existing array elsewhere. ##### Share on other sites Meerul264    130 I see. Thanks again :) ## Create an account Register a new account
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.22994227707386017, "perplexity": 9143.404117040633}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 5, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696182.97/warc/CC-MAIN-20170926141625-20170926161625-00002.warc.gz"}
http://mathhelpforum.com/algebra/25824-first-digit-after-comma.html
# Math Help - First digit after comma 1. ## First digit after comma Find first digit after comma of expression $(\sqrt2+\sqrt3)^{2008}$ 2. Originally Posted by terafull Find first digit after comma of expression $(\sqrt2+\sqrt3)^{2008}$ What comma? 3. Originally Posted by Plato What comma? I think he means "decimal point" for us US people. -Dan 4. Yes, I meant decimal point. 5. $2008log(\sqrt{2}+\sqrt{3})=999.5728$ Now, take $10^{.5728}=3.7394$ Those are the first few digits of this big number with about 1000 digits. 6. I dont understand why like this. And 3 is the first digit after decimal point or 7? $(\sqrt2+\sqrt3)^{2008}=10^{2008log(\sqrt2+\sqrt3)} =10^{999.5728}=10^{999}*10^{0.5728}$ And what now? 7. Originally Posted by galactus $2008log(\sqrt{2}+\sqrt{3})=999.5728$ Now, take $10^{.5728}=3.7394$ Those are the first few digits of this big number with about 1000 digits. But I must know first digit after decimal point. 8. I pretty much gave you the answer. Look at it. There are 1000 digits in the number. Therefore, counting off blocks of 3 from the far right of this huge number gives us 3,739,.................. So, the next number after the comma is 7. You could even run it through a calculator. My TI-92 gives me 3.7392622716E999 So, there are 999 digits after the 3 and the first one is 7. BTW, do you use decimal points instead of commas in Europe or wherever?. In the US, it's commas to separate the 1000's. For instance, 1,000,000,000 Would you write 1.000.000.000? If so, that's wacky and wrong. Do it the right way. 9. Originally Posted by galactus I pretty much gave you the answer. Look at it. There are 1000 digits in the number. Therefore, counting off blocks of 3 from the far right of this huge number gives us 3,739,.................. So, the next number after the comma is 7. You could even run it through a calculator. My TI-92 gives me 3.7392622716E999 So, there are 999 digits after the 3 and the first one is 7. BTW, do you use decimal points instead of commas in Europe or wherever?. In the US, it's commas to separate the 1000's. For instance, 1,000,000,000 Would you write 1.000.000.000? If so, that's wacky and wrong. Do it the right way. OK, thanks. I mean decimal point, not comma.. So, I must find first digit after decimal point of this expression. In Europe are 1/4=0,25 and 10^5=10.000 or =10 000.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 7, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.46589213609695435, "perplexity": 1437.5332383761338}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657131545.81/warc/CC-MAIN-20140914011211-00223-ip-10-196-40-205.us-west-1.compute.internal.warc.gz"}
https://socratic.org/questions/what-intermolecular-forces-are-present-in-c-2h-8o-1-propanol
Chemistry Topics # What intermolecular forces are present in C_2H_8O (1-Propanol)? ## ${C}_{2} {H}_{8} O$ Dec 6, 2016 The most obvious one in $\text{hydrogen bonding}$. #### Explanation: One of the best indicators of intermolecular interaction is the normal boiling point. Molecules with significant intermolecular interaction tend to have higher boiling points. Water, a small molecule, has an exceptionally high boiling point because of intermolecular hydrogen bonding, which persists BETWEEN molecules: H-O^(delta-)-H^(delta+)cdotsO^(delta-)-H^(delta+)""_2 Now $\text{1-propanol}$ has a normal boiling point of $97 - 98$ ""^@C. And we compare this to that of $\text{isopropanol}$, $82.6$ ""^@C, and $\text{ethanol}$, $78.0$ ""^@C. Given these data, there is another contributor to intermolecular interaction, and here it is the non-polar interaction between hydrocarbyl chains. The longer the chain, the greater the chain-chain interaction, and in long chain alcohols (and alkanes), boiling points will be elevated. Compare the boiling point of $\text{n-butanol,}$ $117.7$ ""^@C, and $\text{n-pentanol,}$ $137 - 139$ ""^@C. ##### Impact of this question 4801 views around the world
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 18, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.46977499127388, "perplexity": 2633.939849512711}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986670928.29/warc/CC-MAIN-20191016213112-20191017000612-00365.warc.gz"}
http://mathhelpforum.com/calculus/11275-calculus-vector-valued-func.html
# Thread: Calculus of Vector-Valued Func. 1. ## Calculus of Vector-Valued Func. 1.) Given: r(t)=tcos(t)i+e(t^2)j+ln(t)k, what is r'(t)? 2.) Suppose r(t) is a vector-valued func., What geometric/graphical info does r'(a) tell us? 3.) Let r(t)=cos(t)i+sin(t)j and s(t)=sin(5t)i+cos(5t)j. (a) What does the graphs of r(t) and s(t) look like? (b) Suppose the graphs of two vector-valued func. r(t) and s(t) are the same, then must r'(0)=s'(0)? (Explain whether this is a new result, or was it also true for functions f(x) and g(x)?) 2. Hello, fifthrapiers! Here's some help . . . 1) Given: . $\vec{r}(t)\;=\;t\cos(t)\vec{i} + e^{t^2}\vec{j} + \ln(t)\vec{k}$. . Find $\vec{r'}(t)$ $\vec{r'}(t)\;=\;(\cos t - t\sin t)\vec{i} + \left(2te^{t^2}\right)\vec{j} + \left(\frac{1}{t}\right)\vec{k}$ 3) Let $r(t)\:=\:\cos(t)i + \sin(t)j$ and $s(t)\:=\:\sin(5t)i + \cos(5t)j$ (a) What does the graphs of $r(t)$ and $s(t)$ look like? Both are unit circles, centered at the origin. (b) Suppose the graphs of two vector-valued func. $r(t)$ and $s(t)$ are the same, . . .then must $r'(0) = s'(0)$? . no Consider: . $\begin{array}{cc}\vec{r}(t) \;= & \cos(t)\vec{i} + \sin(t)\vec{j} \\ \vec{s}(t) \:= & \cos(t + \pi)\vec{i} + \sin(t + \pi)\vec{j} \end{array}$ When $t = 0:$ . . $\begin{array}{ccc}r(0) = \langle 1,\,0\rangle & \text{ and } & r'(0) = \langle 0,\,1\rangle\!:\;\uparrow \\ \\ s(0) = \langle \text{-}1,0\rangle & \text{ and } &s'(0) = \langle 0,\,\text{-}1\rangle\!: \;\downarrow\end{array}$ . . . different derivatives Explain whether this is a new result, or was it also true for functions $f(x)$ and $g(x)$ ? This is a new result. With rectangular functions, $y = f(x)$ and $y = g(x)$, . . if their graphs are identical, then the functions are identical. . . Hence, their derivatives are equal. With parametric functions, a graph can be generated in a number of ways. . . As seen in part (b), their derivatives need not be equal.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 17, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9071699976921082, "perplexity": 1937.1617174127648}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725451.13/warc/CC-MAIN-20161020183845-00090-ip-10-171-6-4.ec2.internal.warc.gz"}
https://physics.stackexchange.com/questions/361856/why-is-quantum-mechanics-called-01-dimensional-qft/361858
# Why is quantum mechanics called 0+1 dimensional QFT? I know that quantum mechanics is sometimes called 0+1 dimensional quantum field theory. What is the meaning? How should we understand it? In field theory, a field can be thought of as a map from the spacetime $M$, usually a Lorentzian manifold---a particularly popular choice is $\Bbb R^{1,n-1}$ (Minkowski space)---to some other space. For instance, a scalar field $\phi$ can be viewed as a map $\phi:M\to \Bbb R$, or equivalently as a global section of the trivial (real) line bundle over $M$. The spacetime $M^n$ has one timelike direction and $n-1$ spacelike directions, and one can say that one studies $(n-1)+1$-dimensional field theory. When doing mechanics, what do we use for a "field"? The position of the particle(s)! The position depends only on time, and hence we have maps $x_i:\Bbb R\to \Bbb R^n$ (in case the space in which the particles move is not simply $\Bbb R^n$, the target may be some other Riemannian manifold of dimension $n$) and fitting this into the general QFT picture we can identify $\Bbb R$ as our "spacetime", where we now have no spatial directions and only a timeline direction. Thus, we may call the theory a $0+1$-dimensional field theory. After quantization, one obtains a $0+1$-dimensional quantum field theory.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8996157646179199, "perplexity": 252.17069335200685}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669755.17/warc/CC-MAIN-20191118104047-20191118132047-00089.warc.gz"}
https://socratic.org/questions/what-is-the-value-of-cos-75
Trigonometry Questions Topics # What is the value of cos 75°? Then teach the underlying concepts Don't copy without citing sources preview ? #### Explanation Explain in detail... #### Explanation: I want someone to double check my answer 35 Nov 21, 2015 $\frac{\sqrt{6} - \sqrt{2}}{4}$ #### Explanation: Apply the trig identity: cos (a + b) = cos a.cos b - sin a.sin b $\cos \left(75\right) = \cos \left(30 + 45\right) = \cos 30 \cdot \cos 45 - \sin 30 \cdot \sin 45 =$ = $\left(\frac{\sqrt{3}}{2}\right) \left(\frac{\sqrt{2}}{2}\right) - \left(\frac{1}{2}\right) \left(\frac{\sqrt{2}}{2}\right) = \frac{\sqrt{6} - \sqrt{2}}{4}$ • 9 minutes ago • 10 minutes ago • 11 minutes ago • 16 minutes ago • 38 seconds ago • 5 minutes ago • 6 minutes ago • 6 minutes ago • 7 minutes ago • 7 minutes ago • 9 minutes ago • 10 minutes ago • 11 minutes ago • 16 minutes ago ##### Impact of this question 8294 views around the world
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 3, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7663098573684692, "perplexity": 22746.325842069728}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812259.18/warc/CC-MAIN-20180218192636-20180218212636-00213.warc.gz"}
https://forum.math2market.de/index.php?PHPSESSID=456c8d3b3f1f950d342df2f337eabb4b&action=profile;area=showposts;sa=messages;u=2
### Show Posts This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to. ### Messages - Aaron Widera Pages: [1] 2 1 ##### WeaveGeo / Re: how do i create a larger weave « on: October 12, 2021, 09:38:26 AM » Hi Sarah, you can change the size of the weaves in WeaveGeo by heading to the Domain tab and can add periodic cells of the weave in X-/Weft-Direction or Y-/Warp-Direction to the weave by chaning the Unit Cells option here. 2 ##### Forum FAQs / Re: Frequently asked questions: « on: September 29, 2021, 02:14:38 PM » How do I use the Latex Editor? • You can use the Latex Editor by clicking on the fMath formatting option above the text area. • There are two different options: • One that creates formulas inline $$A = \pi r^{2}$$ • And one that creates formulas in a new paragraph $A = \pi r^{2}$ • For latex code in a new paragraph, enter your latex code between this operators: Code: [Select] $A = \pi r^{2}$ • For latex code in line, enter your latex code between this two operators: Code: [Select] [latex=inline] A = \pi r^{2}[/latex] • You can create code blocks as seen above by using the code block tags: Code: [Select] [code] Your code here [/code ] 3 ##### Forum FAQs / Re: Frequently asked questions: « on: September 29, 2021, 02:08:26 PM » • How do I start a new board at the front page? • It is not intended to change the boards on the forums starting page. The starting page is read only. • How do I embedd an image into my posts? • You can attach your image to the post and use the [ attachimg=1] to insert the first attachment as inline attachment. To insert the second attachment use [ attachimg=2]. • You can upload your image to a web hosting service and use the tag: Code: [Select] [img]IMAGEPATH[/img] 4 ##### Forum FAQs / Re: Frequently asked questions: « on: September 29, 2021, 02:04:29 PM » 5 ##### Forum FAQs / Re: Frequently asked questions: « on: September 29, 2021, 01:58:04 PM » 6 ##### Property prediction (-Dict modules) / MOVED: Regarding how to create a macro for calculations with varying temperatures « on: September 27, 2021, 09:39:16 AM » 7 ##### Modelling of composites / Re: Modelling Rovings on the Basis of Support Points « on: August 18, 2021, 02:33:18 PM » Hi Marvin, I prepared you an example, I assume, that youzr python script to create the roving support points is named PolyNomial.py. It should look like that: Code: [Select] def test_func(parameter1, parameter2):  x = [[2e-05, 2e-05, 2e-05],[4.5e-05, 2e-05, 2e-05],[7e-05, 3e-05, 2e-05],[9.5e-05, 4e-05, 3e-05]]  y = [[2e-05, 2e-05, 2e-05],[2e-05, 4.5e-05, 2e-05],[3e-05, 7e-05, 2e-05]]  return [x, y]So it is just a function "test_func" that gets two parameters. Then it calculates and get two list (x and y) with the support points. In this case the list is set, but you just need to enter you polynomial function. Then the script returns the two lists combined as [x, y] Now for the important part, you can copy and paste this code block into a blank python script and use it, I will use comments marked by # to comment in the script what is happening: Code: [Select] Header =  {  'Release'      : '2021',  }Description = ''''''Variables = {  'NumberOfVariables' : 0,  }# until here it is just header and initialization which is not importantimport PolyNomial    #here we import the python scriptRoving_list = PolyNomial.test_func(123, 456) # by using .test_func(para1,para2) we are using the function from the script PolyNomial with the parameters para1 and para2. And save the returned values in the Roving_listdiam_1 = 2e-05      #Here you can set the Diameter of the Rovings. Here both Rovings in x and y directio have the same size. You could adapt it like below.diam_2 = 1e-05number_of_rovings = len(Roving_list)#now we define a dictionary that is filled with all information GeoDict needs to create the GAD-Objects#You might need to adjust the voxellenght and Domainsize (NX, NY, NZ) below by calculating the domainsizeGadAdd_args = {  'ResultFileName'  : 'GadAdd.gdr',  'KeepStructure'   : 0,  'NumberOfObjects' : number_of_rovings,  'Domain' : {    'PeriodicX'         : False,    'PeriodicY'         : False,    'PeriodicZ'         : False,    'OriginX'           : (0, 'm'),    'OriginY'           : (0, 'm'),    'OriginZ'           : (0, 'm'),    'VoxelLength'       : (1e-06, 'm'),    'DomainMode'        : 'VoxelNumber',   # Possible values: VoxelNumber, Length, VoxelNumberAndLength    'NX'                : 100,    'NY'                : 100,    'NZ'                : 100,    'Material' : {      'Type'        : 'Fluid',     # Possible values: Fluid, Solid, Porous      'Name'        : 'Undefined',      'Information' : '',      },    'OverlapMode'       : 'GivenMaterial', # Possible values: OverlapMaterial, NewMaterial, OldMaterial, GivenMaterial    'OverlapMaterialID' : 3,    'NumOverlapRules'   : 0,    'HollowMaterialID'  : 0,    'PostProcessing' : {      'ResolveOverlap'    : False,      'MarkContactVoxels' : False,      'ContactMaterialID' : 15,      },    },  }#This is the basic dictionary and now we fill it with the two Rovings. I Have it variable so when the polynomial script later returns more support lists, it should also work.for i in range(number_of_rovings):  GadAdd_args[f'Object{i+1}:MaterialID'] = 1  GadAdd_args[f'Object{i+1}:Type'] = 'CurvedEllipticalFiber'  GadAdd_args[f'Object{i+1}:NumberOfSegments'] = len(Roving_list[i])-1  GadAdd_args[f'Object{i+1}:FiberEndType1'] = 'Flat'  GadAdd_args[f'Object{i+1}:FiberEndType2'] = 'Flat'  GadAdd_args[f'Object{i+1}:Diameter1'] = diam_1  GadAdd_args[f'Object{i+1}:Diameter2'] = diam_2  GadAdd_args[f'Object{i+1}:Perpendicular'] = [-1,0,0]  #we iterate over the Roving number i and fill the Dictionary with Object1, Object2.  #The command GadAdd_args[f'Object{i+1}:Diameter1'] = diam_1 takes the dictionary GaddAdd_args at fills it at the entry Object i :Diameter1 with the value diam1  for j in range(len(Roving_list[i])):    GadAdd_args[f'Object{i+1}:Point{j+1}'] =  Roving_list[i][j]    #each support point generates a new entry in the dictionary, here we fill the dictionary with the entry from the Roving_list. Where i means whether it is Roving x or y and j means the current support point.    gd.runCmd("GadGeo:GadAdd", GadAdd_args, Header['Release']) If you copy code block 1 into a scirpt called PolyNomial.py and code block 2 into another python script "Rovingcreation.py" and then exectue the Rovingcreation.py it should generate a small example. Then you need to replace the test_func by your real polynomial function and it should still work. It is important that PolyNomial.py and Rovingcration.py are placed in the same folder. Please let me know if you have any questions, because coding can always become a bit tricky. 8 ##### Modelling of foams / Re: How to convert the channel structure to aerogel structure by GrainGeo? « on: August 16, 2021, 05:54:51 PM » You are welcome :) By the way this is very intersting application and combination of the FoamGeo and GrainGeo modules. Hopefully we are hearing about your work with GeoDict in one way or the other someday in the future. 9 ##### Modelling of foams / Re: How to convert the channel structure to aerogel structure by GrainGeo? « on: August 16, 2021, 10:20:09 AM » Hi Evren, sure we help you how to make such a Aerogel structure. You already are on the right track, you just need some more extra steps. So when you have the channel structure you have to: • Go to Model:ProcessGeo:Invert and invert the structure. • Go to GrainGeo:CreateGrains and select • Create in Current Domain and Keep Current Objects / Structure • Select the option Without (Remove) Object Overlap and click Edit Here you set the Overlap SVP / (%) to 0.1 • Set the Add Object solid Volume Percentage to a bit less than the amount of Pore in the inverted structure. So for example the inverted structure has 12% porosity, than you choose 10% • Finally you can set the diameter distributioin of your spheres as you need them and click on OK and Generate • When it is finished you are left with the Aerogel and the remains of the inverted structure. Just Reassign this material ID to Pore (ID 00) and you have only the Aerogel left That should give you the Aerogel. Please let me briefly know if it helped or if you have any questions left? Have a nice day, Aaron 10 ##### Modelling of composites / Re: Modelling Rovings on the Basis of Support Points « on: August 10, 2021, 05:04:00 PM » Hi Marvin, yes it is possible to create elliptical rovings with the support points automated by using the "Add GAD Object" option. You can use a python macro for that, the tricky question would be how to access the data form the excel sheet. Can you tell me a bit more how the support points in the sheet are formatted? Then I can explain you how you on that expample how to create a macro for that. So can you show a table here to show me how the data looks like? For example: Rovings Roving 1 Coordinates Roving 1 Diameters Roving 2 Coordinates Roving 2 Diameters Support Point 1 X, Y, Z Diameter1, Diameter2, Diameter3 X, Y, Z Diameter1, Diameter2, Diameter3 Support Point 2 X, Y, Z Diameter1, Diameter2, Diameter3 X, Y, Z Diameter1, Diameter2, Diameter3 further support points When I understand the table structure I can explain how to make the macro. 11 ##### Modelling of composites / Re: Voids in a composite « on: June 25, 2021, 11:11:33 AM » This is some wht depending. How did you acquire that model? Is the model a CT-Scan you imported to GeoDict or is it a digital model you generated inside GeoDict? 12 ##### Modelling of foams / Re: Anisotropic foam « on: June 25, 2021, 11:05:02 AM » In the FoamGeo module in the "Basis Geometry" tab you can set the "Basis Pore-Geometry" option to "Use Current Analytic Geometry (GAD)". This option generates the foam on the basis of the curretnly loaded structure in GeoDict. The loaded structure needs to be: • A periodic structure • An analytic strucutre, consisting only of GAD objects. Indicated by the green dot besides the "Objects"number in the top left corner • Consists only of objects of sphere or ellipsoid type So you need to generate an anisotropic ellipsoid structure on which you use FoamGeo on. 13 ##### FiberGeo / Re: When do I need to use Isolation Distance in FiberGeo? « on: June 25, 2021, 10:24:38 AM » Hello Tabea, This is a option where fibers are created such that a structure with non-touching fibers is made. In that option the fibers are placed in the structure and when they violate the given isolation distance to another fiber they are removed and a new fiber is placed and checked for violation. This happens until the stopping criterion is reached (for example a given Solid Volume Percentage or a given numbre of fibers). But in general this approach can take much time for high solid volume fractions so in general we recommen to use the "Remove Overlap" option, here you can also set an Isolation distance. 14 ##### DiffuDict / Re: Off-diagonal entries in matrix of Relative Diffusivity « on: June 25, 2021, 10:06:15 AM » Hello, of course we can: If you calculate the Diffusivity in x-direction, the entry in the main diagonal x_11 gives you the diffusivity in x-direction. The off-diagonal entries x_12, x_13, x_21 and x_31 give you the amount of diffusion going into y- and z-direction although the driving force, the concentration gradient, is only given in x -direction. The same goes for Diffusivity in y- and z- direction. Was that understandable? 15 ##### for CT and µCT images / Re: Coordinate Transformation after Cropping « on: June 16, 2021, 05:52:05 PM » Hi Marvin, yes such a transformation is possible with python and know how ProcessGeo Crop saves the settings to the gps file. As an example say you have a 200x300x400 (X x Y x Z) structure with a voxel length of 2 µm. And you are looking at the X-Y Plane for the Coordination investigation. Now you crop the structure in X direction for 20 voxel from the lower sider and 50 voxel from the higher side. That means the X direction is 70 voxels shorter (so it has 130 voxels in total). Similar you crop the structure in Y direction for 30 voxel from the lower sider and 60 voxel from the higher side. That means the X direction is 90 voxels shorter (so it has 210 voxels in total). This would mean that the X-Y Coordinates of your new Origin are at 40 µm x 60 µm of your old Origin. The corresponding ProcessGeo Crop gps looks like: Code: [Select]   <ProcessGeo>    <Crop>      XMinus 20      XPlus  50      YMinus 30      YPlus  60      ZMinus 0      ZPlus  0    </Crop>  </ProcessGeo>So when you obtain coordiantes from the new system X' and Y' you can transform them back to the old system by: $$X_{old} = X' - 20 * 2 µm$$ and $$Y_{old} = Y' - 30 * 2 µm$$ This you can automate by using GeoPython to access the Crop Seetings, here is a small example code: Code: [Select] import stringmapx_new = 1.04*1e-4y_new = 1.56*1e-4voxellength = 2*1e-6gpsMap = stringmap.parseGDR('PathToGPSFile/File.gps')x_crop = gpsMap.get('ProcessGeo:Crop:XMinus')y_crop = gpsMap.get('ProcessGeo:Crop:YMinus')x_trans = x_new + x_crop*voxellengthy_trans = y_new + y_crop*voxellengthIn this example your x and y coordiante values in the new system are 104 µm which is 1.04e-4 m and 156 µm which is 1.56e-4 m. And this code extracts the cropped value in x and y direction and uses it to transform the coordinates into the original coordiante system. Those coordinates are saved in the variable x_trans and y_trans
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 2, "mathjax_display_tex": 1, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6709709167480469, "perplexity": 7487.931162145185}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585196.73/warc/CC-MAIN-20211018031901-20211018061901-00167.warc.gz"}
https://mathematica.stackexchange.com/questions/146294/possible-bug-in-export-with-characterencoding-printableascii
# Possible bug in Export with CharacterEncoding -> “PrintableASCII” In the Documentation we read (emphasis is mine): By default, the Wolfram System uses the character encoding "PrintableASCII" when saving notebooks and packages. This means that when special characters are written out to files or external programs, they are represented purely as sequences of ordinary characters. This uniform representation is crucial in allowing special characters in the Wolfram Language to be used in a way that does not depend on the details of particular computer systems. When creating packages and notebooks, special characters are always written out using full names. ExportString["Lamé \[LongRightArrow] αβ+", "Package"] "(* Created by Wolfram Mathematica 10.0 : www.wolfram.com *) \"Lam\\[EAcute] \\[LongRightArrow] \\[Alpha]\\[Beta]+\" " In InputForm, all special characters are written out fully when using "PrintableASCII". ToString["Lamé \[LongRightArrow] αβ+", InputForm, CharacterEncoding -> "PrintableASCII"] "\"Lam\\[EAcute] \\[LongRightArrow] \\[Alpha]\\[Beta]+\"" In the above-cited examples the character é is converted into the corresponding Mathematica's platform-independent representation \[EAcute]. This is expected since this character isn't PrintableASCIIQ: PrintableASCIIQ@"é" ToCharacterCode@"é" ToCharacterCode["é", "ASCII"] False {233} None Hence I expect that Exporting this character with CharacterEncoding -> "PrintableASCII" will also give me \[EAcute]: Export["test1.txt", "é", "Text", CharacterEncoding -> "PrintableASCII"] // SystemOpen Export["test2.txt", "é", "String", CharacterEncoding -> "PrintableASCII"] // SystemOpen The first input produces a file containing e', the second – a file with é. Is this behavior correct? How can I export strings using only "PrintableASCII" and writing all the special characters in their FullForm as it happens when I Export as "Package"? ### Further considerations Wrapping the string by InputForm doesn't work: Export["test3.txt", InputForm@"é", "String", CharacterEncoding -> "PrintableASCII"] // SystemOpen produces a file containing "é" literally. It is worth to note that for ExportString wrapping by InputForm works: ExportString[InputForm@"é", "String", CharacterEncoding -> "PrintableASCII"] "\"\\[EAcute]\"" Wrapping by FullForm works but is unacceptable due to the quotation marks added: Export["test4.txt", FullForm@"é", "String", CharacterEncoding -> "PrintableASCII"] // SystemOpen produces a file containing "\[EAcute]" literally. Exporting as "Package" doesn't serve as a workaround because of the header added and also because strings are exported with the quotation marks. The same happens with CharacterEncoding -> None. I'm afraid support didn't answer your question correctly. However, "String" is one of the most confusing formats we have, so I am not totally suprised. If you look at the "Background and Context" on ref/format/String, you'll see • Arbitrary binary data represented as a Wolfram Language string. • Used for importing or exporting entire raw binary data. Note in particular that it is used for binary data--binary data in general does not use character encodings. The intended use case is something along the lines of Import["foo.png", "String"], when you wish to operate directly on the bytes of the PNG rather than the image it contains. In the import case, each byte gets mapped to the corresponding code point in the range 0-255. In the export case, we have to do something if a special character > 255 appears, so it is converted to its long name. You can think of this as akin to ToString[expr, CharacterEncoding->"ISO8859-1"]. In short, "String" is very different from "Text", which attempts to interpret textual data. In a world where we have ByteArray, we problably wouldn't have had the "String" format, as the ByteArray would be the natural data structure. We don't yet have this format, but it is certainly on our roadmap. For now, you can Export lists a ByteArray using the "Byte" format, and import "Byte" format and then pass it to ByteArray to convert it from a lists of bytes to a proper ByteArray object. I received a response from the official tech support on this issue ([CASE:3897096]): As I understand, you wish to Export characters using the ASCII or PrintableASCII character sets, but Export is not giving the correct output for the character "é". There seems to be a disregard for certain characters when Exporting with ASCII as the CharacterEncoding, regardless of their character codes. However, as a workaround, I have modified an example found in the CharacterEncoding documentation to get the desired output. Please see attached notebook. The code shows some characters that do not have the desired output and uses the self-defined function fullname[] in order to achieve the requested Export. Please note that this workaround will work for those characters that do have a full name. The excerpt from the attached notebook: Helper function in use: fullname[c_String] := StringReplace[ToString[c, InputForm, CharacterEncoding -> "ASCII"], "\"\\[" ~~ a__ ~~ "]\"" :> "\\[" ~~ a ~~ "]"] Comparison: Export["test2.txt", {"\[CirclePlus]", "\[Wolf]", "\[Del]", "\[RuleDelayed]", "\[CloverLeaf]", "\[Mu]", "\[PartialD]"}, "String", CharacterEncoding -> "PrintableASCII"] // SystemOpen Export["test2.txt", fullname /@ {"\[CirclePlus]", "\[Wolf]", "\[Del]", "\[RuleDelayed]", "\[CloverLeaf]", "\[Mu]", "\[PartialD]"}, "String", CharacterEncoding -> "PrintableASCII"] // SystemOpen The proposed workaround is (by the essence) the same as the one proposed in this answer with only difference that it won't handle correctly the characters without a full name. So that solution is better :). Also the support guy points out that the set of "disregarded" characters is wider than I originally supposed: apart from extended ASCII characters with codes 128-255 it contains also some named Unicode characters like \[CirclePlus]. Although in the response it isn't stated clearly that this behavior is a bug, I assume that usage of words "workaround" and "disregard" in this context implies that current behavior is wrong. So I'll tag this appropriately. • About the "extra" disregarded characters. That's because "String" is using OutputForm, and therefore some characters are using ascii-approximations, as explained in the tutorial you linked to in your question. So \[CirclePlus] gets converted into (+). This may not be the most useful behavior, but again, this is not the intended use case, so I won't lose any sleep over it. – Itai Seggev Jul 9 '17 at 23:34
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.2937783896923065, "perplexity": 3643.731659934919}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232262369.94/warc/CC-MAIN-20190527105804-20190527131804-00484.warc.gz"}
https://enacademic.com/dic.nsf/enwiki/26564/Thermodynamic_temperature
# Thermodynamic temperature Thermodynamic temperature is the absolute measure of temperature and is one of the principal parameters of thermodynamics. Thermodynamic temperature is an “absolute” scale because it is the measure of the fundamental property underlying temperature: its "null" or zero point, absolute zero, is the temperature at which the particle constituents of matter have minimal motion and can be no colder. ## Overview [ Fig. 1 The "translational motion" of fundamental particles of nature such as atoms and molecules gives a substance its temperature. Here, the size of helium atoms relative to their spacing is shown to scale under 1950 atmospheres of pressure. These room-temperature atoms have a certain, average speed (slowed down here two trillion fold). At any given instant however, a particular helium atom may be moving much faster than average while another may be nearly motionless. Five atoms are colored red to facilitate following their motions.] Temperature arises from the random submicroscopic vibrations of the particle constituents of matter. These motions comprise the kinetic energy in a substance. More specifically, the thermodynamic temperature of any bulk quantity of matter is the measure of the average kinetic energy of a certain kind of vibrational motion of its constituent particles called "translational motions." Translational motions are ordinary, whole-body movements in three-dimensional space whereby particles move about and exchange energy in collisions. "Fig. 1 "at right shows translational motion in gases; " "below shows translational motion in solids. Thermodynamic temperature’s null point, absolute zero, is the temperature at which the particle constituents of matter are as close as possible to complete rest; that is, they have motion, retaining only quantum mechanical motion. While scientists are achieving temperatures ever closer to absolute zero, they can not fully achieve a state of "“zero”" temperature. However, even if scientists could remove "all" kinetic heat energy from matter, quantum mechanical "zero-point energy" (ZPE) causes particle motion that can never be eliminated. Encyclopedia Britannica Online [http://britannica.com/eb/article-9078341 defines zero-point] energy as the “"vibrational energy that molecules retain even at the absolute zero of temperature."” ZPE is the result of all-pervasive energy fields in the vacuum between the fundamental particles of nature; it is responsible for the Casimir effect and other phenomena. See " [http://calphysics.org/zpe.html Zero Point Energy and Zero Point Field] ", which is an excellent explanation of ZPE by Calphysics Institute. See also " [http://www.phys.ualberta.ca/~therman/lowtemp/projects1.htm Solid Helium] " by the University of Alberta’s Department of Physics to learn more about ZPE’s effect on Bose–Einstein condensates of helium. Although absolute zero ("T"=0) is not a state of zero molecular motion, it "is "the point of zero temperature and, in accordance with the Boltzmann constant, is also the point of zero particle kinetic energy and zero kinetic velocity. To understand how atoms can have zero kinetic velocity and simultaneously be vibrating due to ZPE, consider the following thought experiment: two "T"=0 helium atoms in zero gravity are carefully positioned and observed to have an average separation of 620 pm between them (a gap of ten atomic diameters). It’s an “average” separation because ZPE causes them to jostle about their fixed positions. Then one atom is given a kinetic kick of precisely 83 yoctokelvin (1 yK = 1 × 10–24 K). This is done in a way that directs this atom’s velocity vector at the other atom. With 83 yK of kinetic energy between them, the 620-pm gap through their common barycenter would close at a rate of 719 pm/s and they would collide after 0.862 second. This is the same speed as shown in the "Fig. 1 "animation above. Before being given the kinetic kick, both "T"=0 atoms had zero kinetic energy and zero kinetic velocity because they could persist indefinitely in that state and relative orientation even though both were being jostled by ZPE. At "T"=0, no kinetic energy is available for transfer to other systems. The Boltzmann constant and its related formulas describe the realm of particle kinetics and velocity vectors whereas ZPE is an energy field that jostles particles in ways described by the mathematics of quantum mechanics. In atomic and molecular collisions in gases, ZPE introduces a degree of "chaos", i.e., unpredictability, to rebound kinetics; it is as likely that there will be "less" ZPE-induced particle motion after a given collision as "more." This random nature of ZPE is why it has no net effect upon either the pressure or volume of any "bulk quantity" (a statistically significant quantity of particles) of "T">0 K gases. However, in "T"=0 condensed matter; e.g., solids and liquids, ZPE causes inter-atomic jostling where atoms would otherwise be perfectly stationary. Inasmuch as the real-world effects that ZPE has on substances can vary as one alters a thermodynamic system (for example, due to ZPE, helium won’t freeze unless under a pressure of at least 25 bar), ZPE is very much a form of heat energy and may properly be included when tallying a substance’s internal energy. Note too that absolute zero serves as the baseline atop which thermodynamics and its equations are founded because they deal with the exchange of heat energy between "“systems”" (a plurality of particles and fields modeled as an average). Accordingly, one may examine ZPE-induced particle motion "within" a system that is at absolute zero but there can never be a net outflow of heat energy from such a system. Also, the peak emittance wavelength of black-body radiation shifts to infinity at absolute zero; indeed, a peak no longer exists and black-body photons can no longer escape. Due to the influence of ZPE however, "virtual" photons are still emitted at "T"=0. Such photons are called “virtual” because they can’t be intercepted and observed. Furthermore, this "zero-point radiation" has a unique "zero-point spectrum." However, even though a "T"=0 system emits zero-point radiation, no net heat flow "Q" out of such a system can occur because if the surrounding environment is at a temperature greater than "T"=0, heat will flow inward, and if the surrounding environment is at "T"=0, there will be an equal flux of ZP radiation both inward and outward. A similar "Q "equilibrium exists at "T"=0 with the ZPE-induced “spontaneous” emission of photons (which is more properly called a "stimulated" emission in this context). The graph at upper right illustrates the relationship of absolute zero to zero-point energy. The graph also helps in the understanding of how zero-point energy got its name: it is the vibrational energy matter retains at the "“zero kelvin point.”" Citation: "Derivation of the classical electromagnetic zero-point radiation spectrum via a classical thermodynamic operation involving van der Waals forces", Daniel C. Cole, Physical Review A, Third Series 42, Number 4, 15 August 1990, Pg. 1847–1862.] Zero kinetic energy remains in a substance at absolute zero (see "Heat energy at absolute zero", below). Throughout the scientific world where measurements are made in SI units, thermodynamic temperature is measured in kelvins (symbol: K). Many engineering fields in the U.S. however, measure thermodynamic temperature using the Rankine scale. By [http://www1.bipm.org/en/si/si_brochure/chapter2/2-1/2-1-1/kelvin.html international agreement,] the unit “kelvin” and its scale are defined by two points: absolute zero, and the triple point of Vienna Standard Mean Ocean Water (water with a specified blend of hydrogen and oxygen isotopes). Absolute zero—the coldest possible temperature—is defined as being precisely 0 K "and" −273.15 °C. The triple point of water is defined as being precisely 273.16 K "and" 0.01 °C. This definition does three things: #It fixes the magnitude of the kelvin unit as being precisely 1 part in 273.16 parts the difference between absolute zero and the triple point of water; #It establishes that one kelvin has precisely the same magnitude as a one-degree increment on the Celsius scale; and #It establishes the difference between the two scales’ null points as being precisely 273.15 kelvins (0 K = −273.15 °C and 273.16 K = 0.01 °C). Temperatures expressed in kelvins are converted to degrees Rankine simply by multiplying by 1.8 as follows: "T"K × 1.8 = "T"°R, where "T"K and "T"°R are temperatures in kelvins and degrees Rankine respectively. Temperatures expressed in Rankine are converted to kelvins by "dividing" by 1.8 as follows: "T"°R ÷ 1.8 = "T"K. ## Table of thermodynamic temperatures The full range of the thermodynamic temperature scale and some notable points along it are shown in the table below. A For Vienna Standard Mean Ocean Water at one standard atmosphere (101.325 kPa) when calibrated strictly per the two-point definition of thermodynamic temperature. B The 2500 K value is approximate. The 273.15 K difference between K and °C is rounded to 300 K to avoid false precision in the Celsius value. C For a true blackbody (which tungsten filaments are not). Tungsten filaments’ emissivity is greater at shorter wavelengths, which makes them appear whiter. D Effective photosphere temperature. The 273.15 K difference between K and °C is rounded to 273 K to avoid false precision in the Celsius value. E The 273.15 K difference between K and °C is ignored to avoid false precision in the Celsius value. F For a true blackbody (which the plasma was not). The Z machine’s dominant emission originated from 40 MK electrons (soft x–ray emissions) within the plasma. The relationship of temperature, motions, conduction, and heat energy The nature of kinetic energy, translational motion, and temperature At its simplest, “temperature” arises from the kinetic energy of the vibrational motions of matter’s particle constituents (molecules, atoms, and subatomic particles). The full variety of these kinetic motions contribute to the total heat energy in a substance. The relationship of kinetic energy, mass, and velocity is given by the formula "Ek" = frac|2"m" • "v" 2. [At non-relativistic temperatures of less than about 30 GK, classical mechanics are sufficient to calculate the velocity of particles. At 30 GK, individual neutrons (the constituent of neutron stars and one of the few materials in the universe with temperatures in this range) have a 1.0042 γ (gamma or Lorentz factor). Thus, the classic Newtonian formula for kinetic energy is in error less than half a percent for temperatures less than 30 GK.] Accordingly, particles with one unit of mass moving at one unit of velocity have precisely the same kinetic energy—and precisely the same temperature—as those with four times the mass but half the velocity. . The extent to which the kinetic energy of translational motion of an individual atom or molecule (particle) in a gas contributes to the pressure and volume of that gas is a proportional function of thermodynamic temperature as established by the Boltzmann constant (symbol: "kB"). The Boltzmann constant also relates the thermodynamic temperature of a gas to the mean kinetic energy of an individual particle’s translational motion as follows: :"Emean" = frac|3|2"kBT" ::where…::"Emean" is the mean kinetic energy in joules (symbol: J)::"kB" = val|1.3806504|(24)|e=-23|u=J/K::"T" is the thermodynamic temperature in kelvins While the Boltzmann constant is useful for finding the mean kinetic energy of a particle, it’s important to note that even when a substance is isolated and in thermodynamic equilibrium (all parts are at a uniform temperature and no heat is going into or out of it), the translational motions of individual atoms and molecules occurs across a wide range of speeds (see animation in "Fig. 1 "above). At any one instant, the proportion of particles moving at a given speed within this range is determined by probability as described by the Maxwell–Boltzmann distribution. The graph shown here in "Fig. 2 " shows the speed distribution of 5500 K helium atoms. They have a "most probable" speed of 4.780 km/s (0.2092 s/km). However, a certain proportion of atoms at any given instant are moving faster while others are moving relatively slowly; some are momentarily at a virtual standstill (off the "x"–axis to the right). This graph uses "inverse speed" for its "x"–axis so the shape of the curve can easily be compared to the curves in "" below. In both graphs, zero on the "x"–axis represents infinite temperature. Additionally, the "x" and "y"–axis on both graphs are scaled proportionally. The high speeds of translational motion Although very specialized laboratory equipment is required to directly detect translational motions, the resultant collisions by atoms or molecules with small particles suspended in a fluid produces Brownian motion that can be seen with an ordinary microscope. The translational motions of elementary particles are "very" fast [Even room–temperature air has an average molecular translational "speed" (not vector-isolated velocity) of 1822 km/hour. This is relatively fast for something the size of a molecule considering there are roughly 2.42 × 1016 of them crowded into a single cubic millimeter. Assumptions: Average molecular weight of wet air = 28.838 g/mol and "T" = 296.15 K. Assumption’s primary variables: An altitude of 194 meters above mean sea level (the world–wide median altitude of human habitation), an indoor temperature of 23 °C, a dewpoint of 9 °C (40.85% relative humidity), and 760 mmHg (101.325 kPa) sea level–corrected barometric pressure.] and temperatures close to absolute zero are required to directly observe them. For instance, when scientists at the NIST achieved a record-setting cold temperature of 700 nK (billionths of a kelvin) in 1994, they used optical lattice laser equipment to adiabatically cool caesium atoms. They then turned off the entrapment lasers and directly measured atom velocities of 7 mm per second to in order to calculate their temperature. [Citation: "Adiabatic Cooling of Cesium to 700 nK in an Optical Lattice", A. Kastberg "et al"., Physical Review Letters 74, No. 9, 27 Feb. 1995, Pg. 1542. It’s noteworthy that a record cold temperature of 450 pK in a Bose–Einstein condensate of sodium atoms (achieved by A. E. Leanhardt "et al". of MIT) equates to an average vector-isolated atom velocity of 0.4 mm/s and an average atom speed of 0.7 mm/s.] Formulas for calculating the velocity and speed of translational motion are given in the following footnote.The rate of translational motion of atoms and molecules is calculated based on thermodynamic temperature as follows: :$ilde\left\{v\right\} = sqrt\left\{frac$k_Bover 2} cdot T}mover 2}::where…::$ilde\left\{v\right\}$ is the vector-isolated mean velocity of translational particle motion in m/s::"kB" (Boltzmann constant) = 1.380 6504(24) × 10−23 J/K::"T" is the thermodynamic temperature in kelvins::"m" is the molecular mass of substance in kg/particle In the above formula, molecular mass, "m", in kg/particle is the quotient of a substance’s molar mass (also known as "atomic weight", "atomic mass", "relative atomic mass", and "unified atomic mass units") in g/mol or daltons divided by 6.022 141 79(30) × 1026 (which is the Avogadro constant times one thousand). For diatomic molecules such as H2, N2, and O2, multiply atomic weight by two before plugging it into the above formula. The mean "speed" (not vector-isolated velocity) of an atom or molecule along any arbitrary path is calculated as follows: :$ilde\left\{s\right\} = ilde\left\{v\right\} cdot sqrt\left\{3\right\}$::where…::$ilde\left\{s\right\}$ is the mean speed of translational particle motion in m/s Note that the mean energy of the translational motions of a substance’s constituent particles correlates to their mean "speed", not velocity. Thus, substituting $ilde\left\{s\right\}$ for "v" in the classic formula for kinetic energy, "Ek" = frac|2"m" • "v" 2 produces precisely the same value as does "Emean" = 3/2"kBT" (as shown in the section titled "The nature of kinetic energy, translational motion, and temperature)". Note too that the Boltzmann constant and its related formulas establish that absolute zero is the point of both zero kinetic energy of particle motion and zero kinetic velocity (see also "Note 1" above).] The internal motions of molecules and specific heat [ Fig. 3 Molecules have internal structure because they are composed of atoms that have different ways of moving within molecules. Being able to store kinetic energy in these "internal degrees of freedom" contributes to a substance’s "specific heat capacity", allowing it to contain more heat energy at the same temperature.] There are other forms of heat energy besides the kinetic energy of translational motion. As can be seen in the animation at right, molecules are complex objects; they are a population of atoms and thermal agitation can strain their internal chemical bonds in three different ways: via rotation, bond length, and bond angle movements. These are all types of "internal degrees of freedom". This makes molecules distinct from "monatomic" substances (consisting of individual atoms) like the noble gases helium and argon, which have only the three translational degrees of freedom. Kinetic energy is stored in molecules’ internal degrees of freedom, which gives them an "internal temperature." Even though these motions are called “internal,” the external portions of molecules still move—rather like the jiggling of a stationary water balloon. This permits the two-way exchange of kinetic energy between internal motions and translational motions with each molecular collision. Accordingly, as heat is removed from molecules, both their kinetic temperature (the kinetic energy of translational motion) and their internal temperature simultaneously diminish in equal proportions. This phenomenon is described by the equipartition theorem, which states that for any bulk quantity of a substance in equilibrium, the kinetic energy of particle motion is evenly distributed among all the active degrees of freedom available to the particles. Since the internal temperature of molecules are usually equal to their kinetic temperature, the distinction is usually of interest only in the detailed study of non-local thermodynamic equilibrium (LTE) phenomena such as combustion, the sublimation of solids, and the diffusion of hot gases in a partial vacuum. The kinetic energy stored internally in molecules allows a substance to contain more heat energy at a given temperature (and in the case of gases, at a given pressure and volume), and to absorb more of it for a given temperature increase. This is because any kinetic energy that is, at a given instant, bound in internal motions is not at that same instant contributing to the molecules’ translational motions. [The internal degrees of freedom of molecules cause their external surfaces to vibrate and can also produce overall spinning motions (what can be likened to the jiggling and spinning of an otherwise stationary water balloon). If one examines a "single" molecule as it impacts a containers’ wall, some of the kinetic energy borne in the molecule’s internal degrees of freedom can constructively add to its translational motion during the instant of the collision and extra kinetic energy will be transferred into the container’s wall. This would induce an extra, localized, impulse-like contribution to the average pressure on the container. However, since the internal motions of molecules are random, they have an equal probability of "destructively" interfering with translational motion during a collision with a container’s walls or another molecule. Averaged across any bulk quantity of a gas, the internal thermal motions of molecules have zero net effect upon the temperature, pressure, or volume of a gas. Molecules’ internal degrees of freedom simply provide additional locations where kinetic energy is stored. This is precisely why molecular-based gases have greater specific heat capacity than monatomic gases (where additional heat energy must be added to achieve a given temperature rise).] This extra kinetic energy simply increases the amount of heat energy a substance absorbs for a given temperature rise. This property is known as a substance’s specific heat capacity. Different molecules absorb different amounts of heat energy for each incremental increase in temperature; that is, they have different specific heat capacities. High specific heat capacity arises, in part, because certain substances’ molecules possess more internal degrees of freedom than others do. For instance, room-temperature nitrogen, which is a diatomic molecule, has "five" active degrees of freedom: the three comprising translational motion plus two rotational degrees of freedom internally. Not surprisingly, in accordance with the equipartition theorem, nitrogen has five-thirds the specific heat capacity per mole (a specific number of molecules) as do the monatomic gases. [When measured at constant-volume since different amounts of work must be performed if measured at constant-pressure. Nitrogen’s "CvH" (100 kPa, 20 °C) equals 20.8 J mol–1 K–1 vs. the monatomic gases, which equal 12.4717 J mol–1 K–1. Citations: [http://www.whfreeman.com/ W.H. Freeman’s] "Physical Chemistry", Part 3: Change ( [http://www.whfreeman.com/college/pdfs/pchem8e/PC8eC21.pdf 422 kB PDF, here] ), Exercise 21.20b, Pg. 787. Also [http://www.gsu.edu/ Georgia State University’s] " [http://hyperphysics.phy-astr.gsu.edu/hbase/kinetic/shegas.html Molar Specific Heats of Gases] ".] Another example is gasoline (see table showing its specific heat capacity). Gasoline can absorb a large amount of heat energy per mole with only a modest temperature change because each molecule comprises an average of 21 atoms and therefore has many internal degrees of freedom. Even larger, more complex molecules can have dozens of internal degrees of freedom. The diffusion of heat energy: Entropy, phonons, and mobile conduction electrons [ Fig. 4 The temperature-induced translational motion of particles in solids takes the form of "phonons. "Shown here are phonons with identical amplitudes but with wavelengths ranging from 2 to 12 molecules.] "Heat conduction "is the diffusion of heat energy from hot parts of a system to cold. A “system” can be either a single bulk entity or a plurality of discrete bulk entities. The term “bulk” in this context means a statistically significant quantity of particles (which can be a microscopic amount). Whenever heat energy diffuses within an isolated system, temperature differences within the system decrease (and entropy increases). One particular heat conduction mechanism occurs when translational motion—the particle motion underlying temperature—transfers momentum from particle to particle in collisions. In gases, these translational motions are of the nature shown above in "Fig. 1. "As can be seen in that animation, not only does momentum (heat) diffuse throughout the volume of the gas through serial collisions, but entire molecules or atoms can advance forward into new territory, bringing their kinetic energy with them. Consequently, temperature differences equalize throughout gases very quickly—especially for light atoms or molecules; convection speeds this process even more. [The "speed" at which thermal energy equalizes throughout the volume of a gas is very rapid. However, since gases have extremely low density relative to solids, the "heat flux"—the thermal power conducting through a unit area—through gases is comparatively low. This is why the dead-air spaces in multi-pane windows have insulating qualities.] Translational motion in "solids "however, takes the form of "phonons "(see "Fig. 4" at right). Phonons are constrained, quantized wave packets traveling at the speed of sound for a given substance. The manner in which phonons interact within a solid determines a variety of its properties, including its thermal conductivity. In electrically insulating solids, phonon-based heat conduction is "usually" inefficient [Diamond is a notable exception. Due to the highly quantized modes of phonon vibration occurring in its rigid crystal lattice, not only does diamond have exceptionally "poor" specific heat capacity, it also has exceptionally "high" thermal conductivity.] and such solids are considered "thermal insulators" (such as glass, plastic, rubber, ceramic, and rock). This is because in solids, atoms and molecules are locked into place relative to their neighbors and are not free to roam. Metals however, are not restricted to only phonon-based heat conduction. Heat energy conducts through metals extraordinarily quickly because instead of direct molecule-to-molecule collisions, the vast majority of heat energy is mediated via very light, mobile "conduction electrons." This is why there is a near-perfect correlation between metals’ thermal conductivity and their electrical conductivity. [Correlation is 752 (W m−1 K−1) / (MS•cm), σ = 81, through a 7:1 range in conductivity. Value and standard deviation based on data for Ag, Cu, Au, Al, Ca, Be, Mg, Rh, Ir, Zn, Co, Ni, Os, Fe, Pa, Pt, and Sn. Citation: Data from "CRC Handbook of Chemistry and Physics", 1st Student Edition and [http://www.webelements.com/ this link] to Web Elements’ home page.] Conduction electrons imbue metals with their extraordinary conductivity because they are "delocalized," i.e. not tied to a specific atom, and behave rather like a sort of “quantum gas” due to the effects of "zero-point energy" (for more on ZPE, see "Note 1" below). Furthermore, electrons are relatively light with a rest mass only frac|1836th that of a proton. This is about the same ratio as a .22 Short bullet (29 grains or 1.88 g) compared to the rifle that shoots it. As Isaac Newton wrote with his , :"“Law #3: All forces occur in pairs, and these two forces":" are equal in magnitude and opposite in direction.”" However, a bullet accelerates faster than a rifle given an equal force. Since kinetic energy increases as the square of velocity, nearly all the kinetic energy goes into the bullet, not the rifle, even though both experience the same force from the expanding propellant gases. In the same manner—because they are much less massive—heat energy is readily borne by mobile conduction electrons. Additionally, because they’re delocalized and "very" fast, kinetic heat energy conducts extremely quickly through metals with abundant conduction electrons. The diffusion of heat energy: Black-body radiation ", above). Black-body radiation diffuses heat energy throughout a substance as the photons are absorbed by neighboring atoms, transferring momentum in the process. Black-body photons also easily escape from a substance and can be absorbed by the ambient environment; kinetic energy is lost in the process. As established by the Stefan–Boltzmann law, the intensity of black-body radiation increases as the fourth power of absolute temperature. Thus, a black body at 824 K (just short of glowing dull red) emits "60 times" the radiant power as it does at 296 K (room temperature). This is why one can so easily feel the radiant heat from hot objects at a distance. At higher temperatures, such as those found in an incandescent lamp, black-body radiation can be the principal mechanism by which heat energy escapes a system. The heat of phase changes The kinetic energy of particle motion is just one contributor to the total heat energy in a substance; another is "phase transitions", which are the potential energy of molecular bonds that can form in a substance as it cools (such as during condensing and freezing). The heat energy required for a phase transition is called "latent heat." This phenomenon may more easily be grasped by considering it in the reverse direction: latent heat is the energy required to "break" chemical bonds (such as during evaporation and melting). Most everyone is familiar with the effects of phase transitions; for instance, steam at 100 °C can cause severe burns much faster than the 100 °C air from a hair dryer. This occurs because a large amount of latent heat is liberated as steam condenses into liquid water on the skin. Even though heat energy is liberated or absorbed during phase transitions, pure chemical elements, compounds, and eutectic At one specific thermodynamic point, the melting point (which is 0 °C across a wide pressure range in the case of water), all the atoms or molecules are—on average—at the maximum energy threshold their chemical bonds can withstand without breaking away from the lattice. Chemical bonds are quantized forces: they either hold fast, or break; there is no in-between state. Consequently, when a substance is at its melting point, every joule of added heat energy only breaks the bonds of a specific quantity of its atoms or molecules, [Water’s enthalpy of fusion (0 °C, 101.325 kPa) equates to 0.062284 eV per molecule so adding one joule of heat energy to 0 °C water ice causes 1.0021 × 1020 water molecules to break away from the crystal lattice and become liquid.] converting them into a liquid of precisely the same temperature; no kinetic energy is added to translational motion (which is what gives substances their temperature). The effect is rather like popcorn: at a certain temperature, additional heat energy can’t make the kernels any hotter until the transition (popping) is complete. If the process is reversed (as in the freezing of a liquid), heat energy must be removed from a substance. As stated above, the heat energy required for a phase transition is called "latent heat." In the specific cases of melting and freezing, it’s called "enthalpy of fusion" or "heat of fusion." If the molecular bonds in a crystal lattice are strong, the heat of fusion can be relatively great, typically in the range of 6 to 30 kJ per mole for water and most of the metallic elements. [Water’s enthalpy of fusion is 6.0095 kJ mol−1 K−1 (0 °C, 101.325 kPa). Citation: "Water Structure and Science, Water Properties, Enthalpy of fusion, (0 °C, 101.325 kPa)" (by London South Bank University). [http://www.lsbu.ac.uk/water/data.html Link to Web site.] The only metals with enthalpies of fusion "not" in the range of 6–30 J mol−1 K−1 are (on the high side): Ta, W, and Re; and (on the low side) most of the group 1 (alkaline) metals plus Ga, In, Hg, Tl, Pb, and Np. Citation: [http://www.webelements.com/ This link] to Web Elements’ home page.] If the substance is one of the monatomic gases, (which have little tendency to form molecular bonds) the heat of fusion is more modest, ranging from 0.021 to 2.3 kJ per mole. [Xenon value citation: [http://www.webelements.com/webelements/elements/text/Xe/heat.html This link] to WebElements’ xenon data (available values range from 2.3 to 3.1 kJ mol−1). It is also noteworthy that helium’s heat of fusion of only 0.021 kJ mol−1 is so weak of a bonding force that zero-point energy prevents helium from freezing unless it is under a pressure of at least 25 atmospheres.] Relatively speaking, phase transitions can be truly energetic events. To completely melt ice at 0 °C into water at 0 °C, one must add roughly 80 times the heat energy as is required to increase the temperature of the same mass of liquid water by one degree Celsius. The metals’ ratios are even greater, typically in the range of 400 to 1200 times. [Citation: Data from "CRC Handbook of Chemistry and Physics", 1st Student Edition and [http://www.webelements.com/ this link] to Web Elements’ home page.] And the phase transition of boiling is much more energetic than freezing. For instance, the energy required to completely boil or vaporize water (what is known as "enthalpy of vaporization") is roughly "540 times" that required for a one-degree increase. [H2O specific heat capacity, "Cp" = 0.075327 kJ mol−1 K−1 (25 °C); Enthalpy of fusion = 6.0095 kJ mol−1 (0 °C, 101.325 kPa); Enthalpy of vaporization (liquid) = 40.657 kJ mol−1 (100 °C). Citation: "Water Structure and Science, Water Properties" (by London South Bank University). [http://www.lsbu.ac.uk/water/data.html Link to Web site.] ] Water’s sizable enthalpy of vaporization is why one’s skin can be burned so quickly as steam condenses on it (heading from red to green in "Fig. 7 "above). In the opposite direction, this is why one’s skin feels cool as liquid water on it evaporates (a process that occurs at a sub-ambient wet-bulb temperature that is dependent on relative humidity). Water’s highly energetic enthalpy of vaporization is also an important factor underlying why “solar pool covers” (floating, insulated blankets that cover swimming pools when not in use) are so effective at reducing heating costs: they prevent evaporation. For instance, the evaporation of just 20 mm of water from a 1.29-meter-deep pool chills its water 8.4 degrees Celsius. Internal energy The total kinetic energy of all particle motion—including that of conduction electrons—plus the potential energy of phase changes, plus zero-point energy comprise the "internal energy" of a substance, which is its total heat energy. The term "internal energy" mustn’t be confused with "internal degrees of freedom." Whereas the "internal degrees of freedom of molecules" refers to one particular place where kinetic energy is bound, the "internal energy of a substance" comprises all forms of heat energy. Heat energy at absolute zero As a substance cools, different forms of heat energy and their related effects simultaneously decrease in magnitude: the latent heat of available phase transitions are liberated as a substance changes from a less ordered state to a more ordered state; the translational motions of atoms and molecules diminish (their kinetic temperature decreases); the internal motions of molecules diminish (their internal temperature decreases); conduction electrons (if the substance is an electrical conductor) travel "somewhat" slower; [ Mobile conduction electrons are "delocalized," i.e. not tied to a specific atom, and behave rather like a sort of “quantum gas” due to the effects of zero-point energy. Consequently, even at absolute zero, conduction electrons still move between atoms at the "Fermi velocity" of about 1.6 × 106 m/s. Kinetic heat energy adds to this speed and also causes delocalized electrons to travel farther away from the nuclei.] and black-body radiation’s peak emittance wavelength increases (the photons’ energy decreases). When the particles of a substance are as close as possible to complete rest and retain only ZPE-induced quantum mechanical motion, the substance is at the temperature of absolute zero ("T"=0). Note that whereas absolute zero is the point of zero thermodynamic temperature and is also the point at which the particle constituents of matter have minimal motion, absolute zero is not necessarily the point at which a substance contains zero heat energy; one must be very precise with what one means by “heat energy.” Often, all the phase changes that "can" occur in a substance, "will" have occurred by the time it reaches absolute zero. However, this is not always the case. Notably, "T"=0 helium remains liquid at room pressure and must be under a pressure of at least 25 bar to crystallize. This is because helium’s heat of fusion—the energy required to melt helium ice—is so low (only 21 J mol−1) that the motion-inducing effect of zero-point energy is sufficient to prevent it from freezing at lower pressures. Only if under at least 25 bar of pressure will this latent heat energy be liberated as helium freezes while approaching absolute zero. A further complication is that many solids change their crystal structure to more compact arrangements at extremely high pressures (up to millions of bars). These are known as "solid-solid phase transitions" wherein latent heat is liberated as a crystal lattice changes to a more thermodynamically favorable, compact one. The above complexities make for rather cumbersome blanket statements regarding the internal energy in "T"=0 substances. Regardless of pressure though, what "can" be said is that at absolute zero, all solids with a lowest-energy crystal lattice such those with a "closest-packed arrangement" (see "Fig. 8," above left) contain minimal internal energy, retaining only that due to the ever-present background of zero-point energy. [No other crystal structure can exceed the 74.048% packing density of a "closest-packed arrangement." The two regular crystal lattices found in nature that have this density are "hexagonal close packed" (HCP) and "face-centered cubic" (FCC). These regular lattices are at the lowest possible energy state. Diamond is a closest-packed structure with an FCC crystal lattice. Note too that suitable crystalline chemical "compounds", although usually composed of atoms of different sizes, can be considered as “closest-packed structures” when considered at the molecular level. One such compound is the common mineral known as "magnesium aluminum spinel" (MgAl2O4). It has a face-centered cubic crystal lattice and no change in pressure can produce a lattice with a lower energy state.] One can also say that for a given substance at constant pressure, absolute zero is the point of lowest "enthalpy" (a measure of work potential that takes internal energy, pressure, and volume into consideration). [Nearly half of the 92 naturally occurring chemical elements that can freeze under a vacuum also have a closest-packed crystal lattice. This set includes beryllium, osmium, neon, and iridium (but excludes helium), and therefore have zero latent heat of phase transitions to contribute to internal energy (symbol: "U)". In the calculation of enthalpy (formula: "H" = "U" + "pV)", internal energy may exclude different sources of heat energy—particularly ZPE—depending on the nature of the analysis. Accordingly, all "T"=0 closest-packed matter under a perfect vacuum has either minimal or zero enthalpy, depending on the nature of the analysis. Citation: "Use Of Legendre Transforms In Chemical Thermodynamics", Robert A. Alberty, Pure Appl.Chem., 73, No.8, 2001, 1349–1380 ( [http://iupac.org/publications/pac/2001/pdf/7308x1349.pdf 400 kB PDF, here] ).] Lastly, it is always true to say that all "T"=0 substances contain zero kinetic heat energy. ## Practical applications for thermodynamic temperature Thermodynamic temperature is useful not only for scientists, it can also be useful for lay-people in many disciplines involving gases. By expressing variables in absolute terms and applying Gay–Lussac’s law of temperature/pressure proportionality, the solutions to familiar problems are straightforward. For instance, how is the pressure in an automobile tire affected by temperature? If the tire has a “cold” pressure of 200 kPa-gage , then in absolute terms—relative to a vacuum—its pressure is 300 kPa-absolute. [Pressure also must be in absolute terms. The air still in a tire at 0 kPa-gage expands too as it gets hotter. It’s not uncommon for engineers to overlook that one must work in terms of absolute pressure when compensating for temperature. For instance, a dominant manufacturer of aircraft tires published a document on temperature-compensating tire pressure, which used gage pressure in the formula. However, the high gage pressures involved (180 psi ≈ 12.4 bar) means the error would be quite small. With low-pressure automobile tires, where gage pressures are typically around 2 bar, failing to adjust to absolute pressure results in a significant error. Referenced document: "Aircraft Tire Ratings" ( [http://airmichelin.com/pdfs/05%20-%20Aircraft%20Tire%20Ratings.pdf 155 kB PDF, here] ).] [Regarding the spelling “gage” vs. “gauge” in the context of pressures measured relative to atmospheric pressure, the preferred spelling varies by country and even by industry. Further, both spellings are often used "within" a particular industry or country. Industries in British English-speaking countries typically use the spelling “gauge pressure” to distinguish it from the pressure-measuring instrument, which in the U.K., is spelled “pressure gage.” For the same reason, many of the largest American manufacturers of pressure transducers and instrumentation use the spelling “gage pressure”—the convention used here—in their formal documentation to distinguish it from the instrument, which is spelled “pressure gauge.” (see "Honeywell-Sensotec’s" [http://sensotec.com/pressurefaq.shtml FAQ page] and Fluke Corporation’s [http://us.fluke.com/usen/Home/Search.asp?txtSearchBox=%22gage+pressure%22&x=0&y=0 product search page] ).] [A difference of 100 kPa is used here instead of the 101.325 kPa value of one standard atmosphere. In 1982, the International Union of Pure and Applied Chemistry (IUPAC) recommended that for the purposes of specifying the physical properties of substances, “"the standard pressure"” (atmospheric pressure) should be defined as precisely 100kPa (≈750.062Torr). Besides being a round number, this had a very practical effect: relatively few people live and work at precisely sea level; 100kPa equates to the mean pressure at an altitude of about 112 meters, which is closer to the 194–meter, worldwide median altitude of human habitation. For especially low-pressure or high-accuracy work, true atmospheric pressure must be measured. Citation: IUPAC.org, Gold Book, " [http://goldbook.iupac.org/S05921.html Standard Pressure] "] Room temperature (“cold” in tire terms) is 296 K. What would the tire pressure be if was 20 °C hotter? The answer is frac|316 K|296 K = 6.8% greater thermodynamic temperature "and" absolute pressure; that is, a pressure of 320 kPa-absolute and 220 kPa-gage. ## The origin of heat energy on Earth Earth’s proximity to the Sun is why most everything near Earth’s surface is warm with a temperature substantially above absolute zero. [The deepest ocean depths (3 to 10 km) are no colder than about 274.7 – 275.7 K (1.5 – 2.5 °C). Even the world-record cold surface temperature established on July 21, 1983 at Vostok Station, Antarctica is 184 K (a reported value of −89.2 °C). The residual heat of gravitational contraction left over from earth’s formation, tidal friction, and the decay of radioisotopes in earth’s core provide insufficient heat to maintain earth’s surface, oceans, and atmosphere “substantially above” absolute zero in this context. Also, the qualification of “most-everything” provides for the exclusion of lava flows, which derive their temperature from these deep-earth sources of heat.] Solar radiation constantly replenishes heat energy that Earth loses into space and a relatively stable state of equilibrium is achieved. Because of the wide variety of heat diffusion mechanisms (one of which is black-body radiation which occurs at the speed of light), objects on Earth rarely vary too far from the global mean surface and air temperature of 287 to 288 K (14 to 15 °C). The more an object’s or system’s temperature varies from this average, the more rapidly it tends to come back into equilibrium with the ambient environment. ## History of thermodynamic temperature * 1702–1703: Guillaume Amontons (1663 – 1705) published two papers that may be used to credit him as being the first researcher to deduce the existence of a fundamental (thermodynamic) temperature scale featuring an absolute zero. He made the discovery while endeavoring to improve upon the air thermometers in use at the time. His J-tube thermometers comprised a mercury column that was supported by a fixed mass of air entrapped within the sensing portion of the thermometer. In thermodynamic terms, his thermometers relied upon the volume / temperature relationship of gas under constant pressure. His measurements of the boiling point of water and the melting point of ice showed that regardless of the mass of air trapped inside his thermometers or the weight of mercury the air was supporting, the reduction in air volume at the ice point was always the same ratio. This observation led him to posit that a sufficient reduction in temperature would reduce the air volume to zero. In fact, his calculations projected that absolute zero was equivalent to −240 degrees on today’s Celsius scale—only 33.15 degrees short of the true value of −273.15 °C. * 1742: (1701 – 1744) created a “backwards” version of the modern Celsius temperature scale whereby zero represented the boiling point of water and 100 represented the melting point of ice. In his paper "Observations of two persistent degrees on a thermometer," he recounted his experiments showing that ice’s melting point was effectively unaffected by pressure. He also determined with remarkable precision how water’s boiling point varied as a function of atmospheric pressure. He proposed that zero on his temperature scale (water’s boiling point) would be calibrated at the mean barometric pressure at mean sea level. * 1744: ) [http://www.bipm.org/en/committees/cipm/cipm-1948.html formally adopted] “degree Celsius” (symbol: °C) in 1948.According to "The Oxford English Dictionary" (OED), the term “Celsius’s thermometer” had been used at least as early as 1797. Further, the term “The Celsius or Centigrade thermometer” was again used in reference to a particular type of thermometer at least as early as 1850. The OED also cites this 1928 reporting of a temperature: “My altitude was about 5,800 metres, the temperature was 28° Celsius.” However, dictionaries seek to find the earliest use of a word or term and are not a useful resource as regards the terminology used throughout the history of science. According to several writings of Dr. Terry Quinn CBE FRS, Director of the BIPM (1988 – 2004), including "Temperature Scales from the early days of thermometry to the 21st century" ( [http://www.imeko.org/publications/tc12-2004/PTC12-2004-PL-001.pdf 148 kB PDF, here] ) as well as "Temperature" (2nd Edition / 1990 / Academic Press / 0125696817), the term "Celsius" in connection with the centigrade scale was not used whatsoever by the scientific or thermometry communities until after the CIPM and CGPM adopted the term in 1948. The BIPM wasn’t even aware that “degree Celsius” was in sporadic, non-scientific use before that time. It’s also noteworthy that the twelve-volume, 1933 edition of OED didn’t even have a listing for the word "Celsius" (but did have listings for both "centigrade" and "centesimal" in the context of temperature measurement). The 1948 adoption of "Celsius" accomplished three objectives::1) All common temperature scales would have their units named after someone closely associated with them; namely, Kelvin, Celsius, Fahrenheit, Réaumur and Rankine. 2) Notwithstanding the important contribution of Linnaeus who gave the Celsius scale its modern form, Celsius’s name was the obvious choice because it began with the letter C. Thus, the symbol °C that for centuries had been used in association with the name "centigrade" could continue to be used and would simultaneously inherit an intuitive association with the new name. 3) The new name eliminated the ambiguity of the term “centigrade,” freeing it to refer exclusively to the French-language name for the unit of angular measurement.] * 1777: In his book "Pyrometrie" (Berlin: [http://www.spiess-verlage.de/html/haude___spener.html Haude & Spener,] 1779) completed four months before his death, Johann Heinrich Lambert (1728 – 1777)—sometimes incorrectly referred to as Joseph Lambert—proposed an absolute temperature scale based on the pressure / temperature relationship of a fixed volume of gas. This is distinct from the volume / temperature relationship of gas under constant pressure that Guillaume Amontons discovered 75 years earlier. Lambert stated that absolute zero was the point where a simple straight-line extrapolation reached zero gas pressure and was equal to −270 °C. * Circa 1787: Notwithstanding the work of Guillaume Amontons 85 years earlier, Jacques Alexandre César Charles (1746 – 1823) is often credited with “discovering”, but not publishing, that the volume of a gas under constant pressure is proportional to its absolute temperature. The formula he created was "V"1/"T"1 = "V"2/"T"2. * 1802: Joseph Louis Gay-Lussac (1778 – 1850) published work (acknowledging the unpublished lab notes of Jacques Charles fifteen years earlier) describing how the volume of gas under constant pressure changes linearly with its absolute (thermodynamic) temperature. This behavior is called Charles’s Law and is one of the gas laws. His are the first known formulas to use the number “273” for the expansion coefficient of gas relative to the melting point of ice (indicating that absolute zero was equivalent to −273 °C). * 1848: , (1824 – 1907) also known as Lord Kelvin, wrote in his paper, " [http://zapatopi.net/kelvin/papers/on_an_absolute_thermometric_scale.html On an Absolute Thermometric Scale] ," of the need for a scale whereby “infinite cold” (absolute zero) was the scale’s null point, and which used the degree Celsius for its unit increment. Like Gay-Lussac, Thomson calculated that absolute zero was equivalent to −273 °C on the air thermometers of the time. This absolute scale is known today as the Kelvin thermodynamic temperature scale. It’s noteworthy that Thomson’s value of “−273” was actually derived from 0.00366, which was the accepted expansion coefficient of gas per degree Celsius relative to the ice point. The inverse of −0.00366 expressed to five significant digits is −273.22 °C which is remarkably close to the true value of −273.15 °C. * 1859: William John Macquorn Rankine (1820 – 1872) proposed a thermodynamic temperature scale similar to William Thomson’s but which used the degree Fahrenheit for its unit increment. This absolute scale is known today as the Rankine thermodynamic temperature scale. * 1877 - 1884: (1844 – 1906) made major contributions to thermodynamics through an understanding of the role that particle kinetics and black-body radiation played. His name is now attached to several of the formulas used today in thermodynamics. * Circa 1930s: Gas thermometry experiments carefully calibrated to the melting point of ice and boiling point of water showed that absolute zero was equivalent to −273.15 °C. * 1948: [http://www.bipm.fr/en/CGPM/db/9/3/ Resolution 3] of the 9th CGPM (Conférence Générale des Poids et Mesures, also known as the General Conference on Weights and Measures) fixed the triple point of water at precisely 0.01 °C. At this time, the triple point still had no formal definition for its equivalent kelvin value, which the resolution declared “will be fixed at a later date.” The implication is that "if" the value of absolute zero measured in the 1930s was truly −273.15 °C, then the triple point of water (0.01 °C) was equivalent to 273.16 K. Additionally, both the CIPM (Comité international des poids et mesures, also known as the International Committee for Weights and Measures) and the CGPM [http://www.bipm.org/en/committees/cipm/cipm-1948.html formally adopted] the name “Celsius” for the “degree Celsius” and the “Celsius temperature scale.” * 1954: [http://www.bipm.fr/en/CGPM/db/10/3/ Resolution 3] of the 10th CGPM gave the Kelvin scale its modern definition by choosing the triple point of water as its second defining point and assigned it a temperature of precisely 273.16 kelvin (what was actually written 273.16 “degrees Kelvin” at the time). This, in combination with Resolution 3 of the 9th CGPM, had the effect of defining absolute zero as being precisely zero kelvin and −273.15 °C. * 1967/1968: [http://www.bipm.fr/en/CGPM/db/13/3/ Resolution 3] of the 13th CGPM renamed the unit increment of thermodynamic temperature “kelvin”, symbol K, replacing “degree absolute”, symbol °K. Further, feeling it useful to more explicitly define the magnitude of the unit increment, the 13th CGPM also decided in [http://www.bipm.fr/en/CGPM/db/13/4/ Resolution 4] that “The kelvin, unit of thermodynamic temperature, is the fraction 1/273.16 of the thermodynamic temperature of the triple point of water.” * 2005: The CIPM (Comité International des Poids et Mesures, also known as the International Committee for Weights and Measures) [http://www.bipm.fr/en/si/si_brochure/chapter2/2-1/kelvin.html affirmed] that for the purposes of delineating the temperature of the triple point of water, the definition of the Kelvin thermodynamic temperature scale would refer to water having an isotopic composition defined as being precisely equal to the nominal specification of Vienna Standard Mean Ocean Water. ## Derivations of thermodynamic temperature Strictly speaking, the temperature of a system is well-defined only if its particles (atoms, molecules, electrons, photons) are at equilibrium, so that their energies obey a Boltzmann distribution (or its quantum mechanical counterpart). There are many possible scales of temperature, derived from a variety of observations of physical phenomena. The thermodynamic temperature can be shown to have special properties, and in particular can be seen to be uniquely defined (up to some constant multiplicative factor) by considering the efficiency of idealized heat engines. Thus the "ratio" "T"2/"T"1 of two temperatures "T"1 and"T"2 is the same in all absolute scales. Loosely stated, temperature controls the flow of heat between two systems, and the universe as a whole, as with any natural system, tends to progress so as to maximize entropy. This suggests that there should be a relationship between temperature and entropy. To elucidate this, consider first the relationship between heat, work and temperature. One way to study this is to analyse a heat engine, which is a device for converting heat into mechanical work, such as the Carnot heat engine. Such a heat engine functions by using a temperature gradient between a high temperature "T"H and a low temperature "T"C to generate work, and the work done (per cycle, say) by the heat engine is equal to the difference between the heat energy "q"H put into the system at the high temperature the heat "q"C ejected at the low temperature (in that cycle). The efficiency of the engine is the work divided by the heat put into the system or :$extrm\left\{efficiency\right\} = frac \left\{w_\left\{cy${q_H} = frac{q_H-q_C}{q_H} = 1 - frac{q_C}{q_H} qquad (1) where wcy is the work done per cycle. Thus the efficiency depends only on qC/qH. Because "q"C and "q"H correspond to heat transfer at the temperatures "T"C and "T"H, respectively, the ratio "q"C/"q"H should be a function "f" of these temperatures: :$frac\left\{q_C\right\}\left\{q_H\right\} = f\left(T_H,T_C\right)qquad \left(2\right).$ Carnot’s theorem states that all reversible engines operating between the same heat reservoirs are equally efficient. Thus, a heat engine operating between temperatures "T"1 and "T"3 must have the same efficiency as one consisting of two cycles, one between "T"1 and another (intermediate) temperature "T"2, and the second between "T"2 and "T"3. This can only be the case if :$f\left(T_1,T_3\right) = frac\left\{q_3\right\}\left\{q_1\right\} = frac\left\{q_2 q_3\right\} \left\{q_1 q_2\right\} = f\left(T_1,T_2\right)f\left(T_2,T_3\right).$ Now specialize to the case that $T_1$ is a fixed reference temperature: the temperature of the triple point of water. Then for any "T"2 and "T"3,:$f\left(T_2,T_3\right) = frac\left\{f\left(T_1,T_3\right)\right\}\left\{f\left(T_1,T_2\right)\right\} = frac\left\{273.16 cdot f\left(T_1,T_3\right)\right\}\left\{273.16 cdot f\left(T_1,T_2\right)\right\}.$Therefore if thermodynamic temperature is defined by:$T = 273.16 cdot f\left(T_1,T\right) ,$then the function "f", viewed as a function of thermodynamic temperature, is simply:$f\left(T_2,T_3\right) = frac\left\{T_3\right\}\left\{T_2\right\},$and the reference temperature "T"1 will have the value 273.16. (Of course any reference temperature and any positive numerical value could be used &mdash; the choice here corresponds to the Kelvin scale.) It follows immediately that:$frac\left\{q_C\right\}\left\{q_H\right\} = f\left(T_H,T_C\right) = frac\left\{T_C\right\}\left\{T_H\right\}.qquad \left(3\right).$ Substituting Equation 3 back into Equation 1 gives a relationship for the efficiency in terms of temperature: :$extrm\left\{efficiency\right\} = 1 - frac\left\{q_C\right\}\left\{q_H\right\} = 1 - frac\left\{T_C\right\}\left\{T_H\right\}qquad \left(4\right).$ Notice that for "T"C=0 the efficiency is 100% and that efficiency becomes greater than 100% for "T"C<0. Since an efficiency greater than 100% violates the first law of thermodynamics, this requires that zero must be the minimum possible temperature. This has an intuitive interpretation: temperature is the motion of particles, so no system can, on average, have less motion than the minimum permitted by quantum physics. In fact, as of June 2006, the coldest man-made temperature was 450 pK. Subtracting the right hand side of Equation 4 from the middle portion and rearranging gives :$frac \left\{q_H\right\}\left\{T_H\right\} - frac\left\{q_C\right\}\left\{T_C\right\} = 0,$ where the negative sign indicates heat ejected from the system. This relationship suggests the existence of a state function "S" (i.e., a function which depends only on the state of the system, not on how it reached that state) defined (up to an additive constant) by :$dS = frac \left\{dq_mathrm\left\{rev\left\{T\right\}qquad \left(5\right),$ where the subscript indicates heat transfer in a reversible process. The function "S" corresponds to the entropy of the system, mentioned previously, and the change of "S" around any cycle is zero (as is necessary for any state function). Equation 5 can be rearranged to get an alternative definition for temperature in terms of entropy and heat: :$T = frac\left\{dq_mathrm\left\{rev\left\{dS\right\}.$ For a system in which the entropy "S" is a function "S"("E") of its energy "E", the thermodynamic temperature "T" is therefore given by :$frac\left\{1\right\}\left\{T\right\} = frac\left\{dS\right\}\left\{dE\right\},$ so that the reciprocal of the thermodynamic temperature is the rate of increase of entropy with energy. * Absolute zero * Black body * Boiling * Boltzmann constant * Brownian motion * Carnot heat engine * Celsius * Chemical bond * Condensation * Convection * Degrees of freedom * Delocalized electron * Diffusion * Elastic collision * Electron * Energy * Energy conversion efficiency * Enthalpy * Entropy * Evaporation * Fahrenheit * First law of thermodynamics * Freezing * Gas laws * Heat * Heat conduction * Heat engine * Internal energy * ITS-90 * Ideal gas law * Joule * Kelvin * Kinetic energy * Latent heat * Laws of thermodynamics * Maxwell–Boltzmann distribution * Melting * Mole * Molecule * Orders of magnitude (temperature) * Phase transition * Phonon * Planck’s law of black body radiation * Potential energy * Quantum mechanics: ** Introduction to quantum mechanics ** Quantum mechanics (main article) * Rankine scale * Specific heat capacity * Standard enthalpy change of fusion * Standard enthalpy change of vaporization * Stefan–Boltzmann law * Sublimation * Temperature * Temperature conversion formulas * Thermal conductivity * Thermodynamic equations * Thermodynamic equilibrium * Thermodynamics * * Timeline of temperature and pressure measurement technology * Triple point * Universal gas constant * Vienna Standard Mean Ocean Water (VSMOW) * Wien’s displacement law * Work (Mechanical) * Work (thermodynamics) * Zero-point energy ## Notes "In the following notes, wherever numeric equalities are shown in ‘concise form’—such as" 1.85487(14) × 1043"—the two digits between the parentheses denotes the uncertainty at "1σ" standard deviation "(68%" confidence level) in the two least significant digits of the significand." * " [http://www.chm.davidson.edu/ChemistryApplets/KineticMolecularTheory/index.html Kinetic Molecular Theory of Gases.] " An excellent explanation (with interactive animations) of the kinetic motion of molecules and how it affects matter. By David N. Blauch, [http://www.chm.davidson.edu/ Department of Chemistry] , [http://www2.davidson.edu/index.asp Davidson College] . * " [http://www.calphysics.org/zpe.html Zero Point Energy and Zero Point Field.] " A Web site with in-depth explanations of a variety of quantum effects. By Bernard Haisch, of [http://www.calphysics.org/index.html Calphysics Institute] . Wikimedia Foundation. 2010. ### Look at other dictionaries: • thermodynamic temperature — termodinaminė temperatūra statusas T sritis Standartizacija ir metrologija apibrėžtis Vienas iš pagrindinių SI dydžių, kurio matavimo vienetas kelvinas (K) yra vandens trigubojo taško termodinaminės temperatūros 1/273,16 dalis. atitikmenys: angl …   Penkiakalbis aiškinamasis metrologijos terminų žodynas • thermodynamic temperature — termodinaminė temperatūra statusas T sritis fizika atitikmenys: angl. thermodynamic temperature vok. thermodynamische Temperatur, f rus. термодинамическая температура, f pranc. température thermodynamique, f …   Fizikos terminų žodynas • thermodynamic temperature — termodinaminė temperatūra statusas T sritis Energetika apibrėžtis Temperatūra, apibūdinanti medžiagos dalelių šiluminio judėjimo intensyvumą ir nepriklausanti nuo pasirinktos medžiagos ir matavimo būdo. Žymima T. Termodinaminės temperatūros… …   Aiškinamasis šiluminės ir branduolinės technikos terminų žodynas • thermodynamic temperature — noun Temperature defined in terms of the laws of thermodynamics rather than the properties of a real material: expressed in kelvins …   Wiktionary • thermodynamic temperature scale — termodinaminė temperatūros skalė statusas T sritis Energetika apibrėžtis Nepriklauso nuo termometrinės medžiagos ir turi vieną atskaitos tašką – vandens trigubąjį tašką, kuriam suteikta T = 273,16 K vertė. Termodinaminė temperatūros skalė… …   Aiškinamasis šiluminės ir branduolinės technikos terminų žodynas • thermodynamic temperature scale — noun a temperature scale of which the unit is the kelvin (K) which is ¹⁄₂₇₃.₁₆ of the thermodynamic temperature of the triple point of water …   Australian English dictionary • thermodynamic temperature scale — termodinaminė temperatūros skalė statusas T sritis Standartizacija ir metrologija apibrėžtis Temperatūros skalė, pagrįsta absoliučiuoju nuliu, t. y. žemiausia temperatūra, kurią teoriškai galima būtų pasiekti ir kuri yra 273,16 °C žemiau ledo… …   Penkiakalbis aiškinamasis metrologijos terminų žodynas • thermodynamic temperature scale — termodinaminės temperatūros skalė statusas T sritis fizika atitikmenys: angl. thermodynamic temperature scale vok. thermodynamische Temperaturskala, f rus. термодинамическая шкала температур, f pranc. échelle thermodynamique des températures, f …   Fizikos terminų žodynas
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 18, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8314574360847473, "perplexity": 2009.9445610117443}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738950.61/warc/CC-MAIN-20200813014639-20200813044639-00029.warc.gz"}
http://mathhelpforum.com/advanced-statistics/138104-mean-variance-two-stochastic-variables-combined-print.html
# Mean and variance of two stochastic variables combined • April 9th 2010, 05:30 AM Eva BSc Mean and variance of two stochastic variables combined Hi, I'm stuck with a little problem that I need to use for my research. Let X and N be stochastic random variables. I need to show that: Mean: E(sum(X)) = E(N) * E(X) Variance: var(sum(X)) = E(N) * var(X) + var(N) * (E(X))^2 Anyone knowing to do this? Cheers, Eva • April 9th 2010, 08:16 AM Anonymous1 Quote: Originally Posted by Eva BSc Mean: E(sum(X)) = E(N) * E(X) When $N=n, \ \ S = \sum_i X_i$ has $E(S)=nE(X_i)$ Breaking things down according to the value of $N,$ we have... $E[S] = \sum_{n=0}^{\infty} E(S|N=n)P(N=n) = \sum_{n=0}^{\infty} nE(X_i)P(N=n) = E(N)E(X_i)$ • April 9th 2010, 08:27 AM Anonymous1 Quote: Originally Posted by Eva BSc Variance: var(sum(X)) = E(N) * var(X) + var(N) * (E(X))^2 When $N=n, \ \ S = \sum_i X_i$ has $Var(S) = nVar(X_i)$ and hence, $E(S^2|N=n)= nVar(X_i) + (nE(X_i))^2$ Then, $E[S^2] = \sum_{n=0}^{\infty} E(S^2|N=n)P(N=n) =$ $\sum_{n=0}^{\infty} \{nVar(X_i) + n^2 (E(X_i))^2 \}P(N=n) = E(N)Var(X_i) + E(N^2) (E(X_i))^2$ So, $Var(S) = E(S^2) - (E(S))^2 =$ $E(N)Var(X_i) + E(N^2)(E(X_i))^2 - (E(N)E(X_i))^2 = E(N)Var(X_i) + Var(N)(E(X_i))^2$ • April 9th 2010, 08:30 AM Eva BSc Thnx! • April 9th 2010, 08:30 AM Anonymous1 I had to prove this in my homework a while back. (Nerd) • April 9th 2010, 08:38 AM cgiulz I've used this fact before, but never seen its proof. Thanks! • April 10th 2010, 03:30 AM Moo • April 10th 2010, 12:26 PM Anonymous1 Just to confirm, my instructor verified that the proof above is valid and correct...
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 11, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.5973220467567444, "perplexity": 5743.226906906484}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447555354.63/warc/CC-MAIN-20141224185915-00007-ip-10-231-17-201.ec2.internal.warc.gz"}
https://stats.libretexts.org/Bookshelves/Applied_Statistics/Book%3A_Biological_Statistics_(McDonald)/1.0
# 1: Basics • 1.1: Data analysis steps • 1.2: Types of Biological Variables One of the first steps in deciding which statistical test to use is determining what kinds of variables you have. When you know what the relevant variables are, what kind of variables they are, and what your null and alternative hypotheses are, it's usually pretty easy to figure out which test you should use. I classify variables into three types: measurement variables, nominal variables, and ranked variables. • 1.3: Probability When dealing with probabilities in biology, you are often working with theoretical expectations, not population samples. For example, in a genetic cross of two individual Drosophila melanogaster that are heterozygous at the vestigial locus, Mendel's theory predicts that the probability of an offspring individual being a recessive homozygote (having teeny-tiny wings) is one-fourth, or 0.25. This is equivalent to saying that one-fourth of a population of offspring will have tiny wings. • 1.4: Basic Concepts of Hypothesis Testing The technique used by the vast majority of biologists, and the technique that most of this handbook describes, is sometimes called "frequentist" or "classical" statistics. It involves testing a null hypothesis by comparing the data you observe in your experiment with the predictions of a null hypothesis. You estimate what the probability would be of obtaining the observed results, or something more extreme, if the null hypothesis were true. • 1.5: Confounding Variables A confounding variable is a variable that may affect the dependent variable. This can lead to erroneous conclusions about the relationship between the independent and dependent variables. You deal with confounding variables by controlling them; by matching; by randomizing; or by statistical control. ## Contributor • John H. McDonald (University of Delaware)
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8294841647148132, "perplexity": 1270.4354430074698}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986666959.47/warc/CC-MAIN-20191016090425-20191016113925-00410.warc.gz"}
https://gmatclub.com/forum/if-f-x-4x-2-px-what-is-the-minimum-value-of-f-x-269678.html
GMAT Question of the Day - Daily to your Mailbox; hard ones only It is currently 11 Dec 2018, 15:12 ### GMAT Club Daily Prep #### Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email. Customized for You we will pick new questions that match your level based on your Timer History Track every week, we’ll send you an estimated GMAT score based on your performance Practice Pays we will pick new questions that match your level based on your Timer History ## Events & Promotions ###### Events & Promotions in December PrevNext SuMoTuWeThFrSa 2526272829301 2345678 9101112131415 16171819202122 23242526272829 303112345 Open Detailed Calendar • ### Free GMAT Prep Hour December 11, 2018 December 11, 2018 09:00 PM EST 10:00 PM EST Strategies and techniques for approaching featured GMAT topics. December 11 at 9 PM EST. • ### The winning strategy for 700+ on the GMAT December 13, 2018 December 13, 2018 08:00 AM PST 09:00 AM PST What people who reach the high 700's do differently? We're going to share insights, tips and strategies from data we collected on over 50,000 students who used examPAL. # If f(x) = 4x^2 + px, what is the minimum value of f(x)? Author Message TAGS: ### Hide Tags Math Revolution GMAT Instructor Joined: 16 Aug 2015 Posts: 6619 GMAT 1: 760 Q51 V42 GPA: 3.82 If f(x) = 4x^2 + px, what is the minimum value of f(x)?  [#permalink] ### Show Tags 04 Jul 2018, 00:52 00:00 Difficulty: 15% (low) Question Stats: 82% (01:27) correct 18% (01:37) wrong based on 48 sessions ### HideShow timer Statistics [GMAT math practice question] If $$f(x) = 4x^2 + px$$, what is the minimum value of $$f(x)$$? $$1) f(1) = -4$$ $$2) f(2) = 0$$ _________________ MathRevolution: Finish GMAT Quant Section with 10 minutes to spare The one-and-only World’s First Variable Approach for DS and IVY Approach for PS with ease, speed and accuracy. "Only $99 for 3 month Online Course" "Free Resources-30 day online access & Diagnostic Test" "Unlimited Access to over 120 free video lessons - try it yourself" Math Expert Joined: 02 Aug 2009 Posts: 7099 Re: If f(x) = 4x^2 + px, what is the minimum value of f(x)? [#permalink] ### Show Tags 04 Jul 2018, 01:41 MathRevolution wrote: [GMAT math practice question] If $$f(x) = 4x^2 + px$$, what is the minimum value of $$f(x)$$? $$1) f(1) = -4$$ $$2) f(2) = 0$$ Minimum value of $$4x^2+px$$ is at 8x+p=0 or when $$x=\frac{-p}{8}$$ So min value can be found if value of p is known... 1) f(1)=-4 f(x)=4x^2+px so f(1)=4*1^2+p*1=4+p=-4........ p=-8 So min value be at x=-8/-8=1 f(x)=4x^2-8x=4*(1)^2-8*1=-4 Sufficient 2)f(2)=0 f(x)=4x^2+px so f(2)=4*2^2+p*2=16+2p=0....... p=16/(-2)=-8 So min value be at x=-8/-8=1 f(x)=4x^2-8x=4*(1)^2-8*1=-4 Sufficient D _________________ 1) Absolute modulus : http://gmatclub.com/forum/absolute-modulus-a-better-understanding-210849.html#p1622372 2)Combination of similar and dissimilar things : http://gmatclub.com/forum/topic215915.html 3) effects of arithmetic operations : https://gmatclub.com/forum/effects-of-arithmetic-operations-on-fractions-269413.html GMAT online Tutor Senior Manager Joined: 04 Aug 2010 Posts: 310 Schools: Dartmouth College Re: If f(x) = 4x^2 + px, what is the minimum value of f(x)? [#permalink] ### Show Tags 04 Jul 2018, 01:52 3 MathRevolution wrote: [GMAT math practice question] If $$f(x) = 4x^2 + px$$, what is the minimum value of $$f(x)$$? $$1) f(1) = -4$$ $$2) f(2) = 0$$ To determine the minimum value of the graph, we need to know the value of p. Question stem, rephrased: What is the value of p? Statement 1: Substituting $$x=1$$ and $$f(x)=-4$$ into $$f(x) = 4x^2 + px$$, we get: $$-4 = 4(1^2) + p(1)$$ Since we can solve for $$p$$, SUFFICIENT. Statement 2: Substituting $$x=2$$ and $$f(x)=0$$ into $$f(x) = 4x^2 + px$$, we get: $$0 = 4(2^2) + p(2)$$ Since we can solve for $$p$$, SUFFICIENT. _________________ GMAT and GRE Tutor Over 1800 followers Click here to learn more [email protected] New York, NY If you find one of my posts helpful, please take a moment to click on the "Kudos" icon. Available for tutoring in NYC and long-distance. For more information, please email me at [email protected]. Math Revolution GMAT Instructor Joined: 16 Aug 2015 Posts: 6619 GMAT 1: 760 Q51 V42 GPA: 3.82 Re: If f(x) = 4x^2 + px, what is the minimum value of f(x)? [#permalink] ### Show Tags 06 Jul 2018, 00:41 => Forget conventional ways of solving math questions. For DS problems, the VA (Variable Approach) method is the quickest and easiest way to find the answer without actually solving the problem. Remember that equal numbers of variables and independent equations ensure a solution. Since we have 1 variable (p) and 0 equations, D is most likely to be the answer. So, we should consider each of the conditions on their own first. Condition 1) Since $$f(1) = -4,$$ we have $$4 + p = -4$$ and p = $$-8.$$ $$f(x) = 4x^2 -8x = 4( x^2 - 2x + 1 - 1 ) = 4(x-1)^2 – 4.$$ The minimum of $$f(x)$$ is $$-4$$. Condition 1) is sufficient. Condition 2) Since $$f(2) = 0$$, we have $$16 + 2p = 0$$ and $$p = -8.$$ $$f(x) = 4x^2 -8x = 4( x^2 - 2x + 1 - 1 ) = 4(x-1)^2 – 4.$$ The minimum of $$f(x)$$ is $$-4.$$ Condition 2) is sufficient. Therefore, D is the answer. Answer: D Note: Tip 1) of the VA method states that D is most likely to be the answer if condition 1) gives the same information as condition 2). If the original condition includes “1 variable”, or “2 variables and 1 equation”, or “3 variables and 2 equations” etc., one more equation is required to answer the question. If each of conditions 1) and 2) provide an additional equation, there is a 59% chance that D is the answer, a 38% chance that A or B is the answer, and a 3% chance that the answer is C or E. Thus, answer D (conditions 1) and 2), when applied separately, are sufficient to answer the question) is most likely, but there may be cases where the answer is A,B,C or E. _________________ MathRevolution: Finish GMAT Quant Section with 10 minutes to spare The one-and-only World’s First Variable Approach for DS and IVY Approach for PS with ease, speed and accuracy. "Only$99 for 3 month Online Course" "Free Resources-30 day online access & Diagnostic Test" "Unlimited Access to over 120 free video lessons - try it yourself" Re: If f(x) = 4x^2 + px, what is the minimum value of f(x)? &nbs [#permalink] 06 Jul 2018, 00:41 Display posts from previous: Sort by
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.2913222014904022, "perplexity": 8629.250087917193}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823705.4/warc/CC-MAIN-20181211215732-20181212001232-00216.warc.gz"}
https://jerseycityremodelers.com/32yb4k/uniform-priors-in-stan-cbb12e
Now, let’s load the data: If for some reason the column names are not read in properly, you can change column names using: What research question can we ask with these data? In this case this uniform prior is improper, because these intervals are unbounded. Let’s compare to our previous estimate with “lm”: Figure 3. It’s a great resource for understanding and diagnosing problems with Stan, and by posting problems you encounter you are helping yourself, and giving back to the community. The Stan documentation discourages uniform priors. We’re going to use normal priors with small standard deviations. } parameter can have every one-dimensional prior implemented in Stan, for instance uniform, Cauchy or even Gamma priors. We can also extract some of the key summary statistics from our simple model, so that we can compare them with the outputs of the Stan models later. Now let’s turn that into a dataframe for inputting into a Stan model. Figure 7. The examples are related to Bayesian data analysis course . However, uniform priors have very little place outside of textbooks. We can also look at the full posterior of our parameters by extracting them from the model object. Created by Max Farrell & Isla Myers-Smith. We can investigate mean posterior prediction per datapoint vs the observed value for each datapoint (default line is 1:1). While inferences based on the posterior mode are convenient, often other summaries of the posterior distribution are also of interest. y ~ normal(alpha + x * beta , sigma); The log of the uniform complementary cumulative distribution function (Double-check in the Stan manual to see which sampling statements have corresponding rng functions already coded up.). You just need to think carefully about each modelling decision you make! For traceplots, we can view them directly from the posterior: Figure 6. Use improper uniform priors from −∞−∞ to ∞∞ for all model parameters. Each row is an iteration (single posterior estimate) from the model. If $$\alpha \in \mathbb{R}$$ and $$\beta \in (\alpha,\infty)$$, then for R uniform_rng(reals alpha, reals beta) vectorized PRNG functions. A goal of the Stan development team is to make Bayesian modelling more accessible with clear syntax, a better sampler (sampling here refers to drawing samples out of the Bayesian posterior distribution), and integration with many platforms and including R, RStudio, ggplot2, and Shiny. Below, we explain its usage and list some common prior dist… And in a future tutorial, we will introduce the concept of a mixture model where two different distributions are modelled at the same time - a great way to deal with zero inflation in your proportion or count data! If you think diffuse inverse gamma priors are the answer, that was the second anti-pattern I alluded to earlier. Figure 2. If we want to use a previously written .stan file, we use the file argument in the stan_model() function. Comparing estimates across random posterior draws. As a negative side e ect of this exibility, correlations between them cannot be modeled as parameters. See our Terms of Use and our Data Privacy policy. All the files you need to complete this tutorial can be downloaded from this Github repository. model { Stan statements are processed sequentially and allow … Check out some Stan models in the ecological literature to see how those Bayesian models are reported. This year’s NCAA shooting contest was a thriller that saw Cassandra Brown of the Portland Pilots win the grand prize. You usually only need to worry is this number is less than 1/100th or 1/1000th of We can get summary statistics for parameter estimates, and sampler diagnostics by executing the name of the object: What does the model output show you? Typically, the data generating functions will be the distributions you used in the model block but with an _rng suffix. Suppose that instead of a uniform prior, we use the prior ⇠ Beta(↵,). real uniform_cdf(reals y, reals alpha, reals beta) The uniform cumulative distribution function of y given lower bound alpha and upper bound beta. First, let’s find a dataset where we can fit a simple linear model. set_prior is used to define prior distributions for parameters in brms models. If you are new to Stan, you can join the mailing list. This got me thinking, just how good is Cassandra Brown?
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.603280246257782, "perplexity": 1281.1930718122946}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363216.90/warc/CC-MAIN-20211205191620-20211205221620-00212.warc.gz"}
https://www.albert.io/ie/ap-physics-c-e-and-m/direction-of-emf-1
Free Version Moderate # Direction of EMF 1 APPHEM-0U81L4 A solenoid is hooked up to a battery and switch as shown in the figure below: In the moments just after the switch is closed, what direction is the emf of the solenoid coil? A Location $A$ is positive and Location $B$ is negative. B Location $A$ is positive and Location $B$ is positive. C Location$A$ is negative and Location $B$ is negative. D Location $A$ is negative and Location $B$ is positive. E There would be no emf on the solenoid​ coil.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.44025006890296936, "perplexity": 813.160111247991}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170286.6/warc/CC-MAIN-20170219104610-00391-ip-10-171-10-108.ec2.internal.warc.gz"}
https://www.physicsforums.com/threads/a-n-th-lg-n.35904/
# A[n] = Θ(lg n)? 1. Jul 20, 2004 ### e(ho0n3 a[n] = Θ(lg n)!? Suppose {a[n]} is an increasing sequence and whenever m divides n, then a[n] = a[n/m] + d where m is a positive integer and d is a real number. Show that a[n] = Θ(lg n). a[n/m] + d ≤ a[n/2] + d, and with this I can show that a[n] = O(lg n). All I need to do is show that a[n] = Ω(lg n). This is where I'm stuck. Any hints? 2. Jul 20, 2004 ### Hurkyl Staff Emeritus To show that something is in omega(log x), it suffices to find some sequence {x_i} such that a[x_i] grows like log x. By the way, I'm disconcerted with your reasoning that it is in O(log x); what if n is odd? I suppose you're just abbreviating the complete proof you have. 3. Jul 21, 2004 ### e(ho0n3 Sorry. What I meant was $$a_n = a_{\lfloor n/2 \rfloor} + d$$ My head is a total blank. I can't think of anything.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8493074774742126, "perplexity": 2402.271343606918}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00036-ip-10-171-6-4.ec2.internal.warc.gz"}
https://webwork.maa.org/moodle/mod/forum/discuss.php?d=6581&parent=17639
WeBWorK Problems Re: Why comments and latex \( do not work? by Alex Jordan - Number of replies: 0 This problem uses PGML, with the statement wrapped in BEGIN_PGML...END_PGML. The math delimiters for PGML are different than for regular PG. They are not slash-parens.  Here is some documentation: https://webwork.maa.org/wiki/Mathematical_notation_-_PGML For inline math, the delimiters are [...]. For a comment in PGML, see:
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.3604127764701843, "perplexity": 20434.945306327994}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103645173.39/warc/CC-MAIN-20220629211420-20220630001420-00462.warc.gz"}
https://codegolf.stackexchange.com/questions/47417/evaluate-a-chain-of-inequalities/47442
# Evaluate a chain of inequalities Write code to evaluate whether a chain of inequalities is true or false. An example input is the string 3<=4!=9>3==3 This is true because each of its components is true: (3<=4) and (4!=9) and (9>3) and (3==3) Input: A string that represents a chain of one or more inequalities. The allowed comparison operators are == equals != does not equal > is greater than >= is greater than or equal to < is less than <= is less than or equal to The allowed numbers are single-digit numbers 0 through 9. There won't be any spaces, parentheses, or other symbols. Output: The correctness of the inequality as a consistent Truthy or Falsey value. Consistent means every Truthy output is the same and every Falsey output is the same. Restriction: The intent of this challenge is for you to write code that processes the inequalities, rather than have them be evaluating them as code, even for a single inequality in the chain. As such, methods like Python's eval and exec that evaluate or execute code are banned. So are functions which look up a method or operator given its name as a string. Nor is it allowed to launching processes or programs to do the evaluation for you. Test cases: 3<=4!=9>3==3 True 3<=4!=4 False 5>5 False 8==8<9>0!=2>=1 True • Can we accept input with Unicode inequality signs like ≤ and ≥ instead of <= and >=? – FUZxxl Mar 5 '15 at 12:11 • @FUZxxl You can't. – xnor Mar 5 '15 at 21:58 # Ruby, 71 + 1 = 72 With command-line flag -n, run p (0..99).none?{|i|~/#{a=i%10}(#{%w/!=|. <?=* >?=*/[a<=>b=i/10]})#{b}/} Generates all possible failing regular expressions, and checks whether the input string matches any of them. Outputs true if none do, else false. Takes input via STDIN, separated by newlines. Tricks: • We get all possible pairs of digits by looping from 0 to 99 and extracting the 10s and 1s digits. • The only actual comparison we do is a<=>b, which returns -1,0,or 1 for less than, equal to, or greater. These all slice to different elements of a three-string array, finding the regular expression for comparisons that don't match. • What a clever strategy! – xnor Mar 5 '15 at 23:05 # Perl, 82 $_=<>;($'<=>$&)-61+ord$1&&($2&&$&==$')^('$'lt$1)&&die"\n"while/\d(.)(=?)/g;print 1 Prints 1 when true and a blank line when false, since the empty string is Perl's main falsey value. The while loop goes over the string matching the regex \d(.)(=?). Then the variables $1 and $2 correspond to the characters of the operator, and the special variables $& and \$' will behave as the two operands in a numerical context. The operands are compared with <=> and the result matched against the first character of the operator. Then equality and inequality is dealt with specially. # CJam, 60 bytes This code seems a bit ugly and potentially not fully optimized, but it's the best I've got so far. Try it online. q_A,sSer_S%@@-(])1\@z{~:X\:^i['=")<"P"(>"P'<'^'>PPP]=~e&X}/; ### Explanation q "Read the input"; _A,sSer "Copy the input and replace each digit with a space"; _S% "Split around spaces to obtain the operation list"; @@- "Remove operations from the input to obtain the operand list"; (])1\@z "Remove the first operand from the list to be the initial left operand, initialize the result to 1 (true), and pair up the operations and remaining operands"; { "For each operation-operand pair:"; ~:X "Let the operand be the right operand of this operation"; \:^i "Hash the operation (bitwise XOR of all characters)"; [ "Begin cases:"; '= " 0: Equals"; ")<" " 1: Less than or equal to"; P " 2: (Invalid)"; "(>" " 3: Greater than or equal to"; P " 4: (Invalid)"; '< " 5: Less than"; '^ " 6: Bitwise XOR (stand-in for not equal to)"; '> " 7: Greater than"; P " 8: (Invalid)"; P " 9: (Invalid)"; P "10: (Invalid)"; ]=~ "Execute the case selected by the operation hash modulo 11"; e& "Compute the logical AND of the result and the value produced by this operation to be the new result"; X "Let the right operand be the new left operand"; }/ "End for each"; ; "Clean up and implicitly print result"; # JavaScript (ES6) 110 116 Straightforward:scan string, c is current digit, l is last digit, o is operator. F=x=>(l='',[for(c of x)10-c?(v=!l||v&&(o<'<'?l!=c:(o[1]&&c==l)||(o<'='?l<c:o<'>'?c==l:l>c)),l=c,o=''):o+=c],v) Test In Firefox / FireBug console ;['3<=4!=9>3==3','3<=4!=4','5>5','8==8<9>0!=2>=1'] .forEach(s=>console.log(s,F(s))) 3<=4!=9>3==3 true 3<=4!=4 false 5>5 false 8==8<9>0!=2>=1 true # Haskell, 156 bytes r a=read[a]::Int l"!"=(/=) l"="=(==) l">"=(>=) l"<"=(<=) k">"=(>) k"<"=(<) []#_=1<2 (a:'=':b:c)#i=l[a]i(r b)&&c#r b (a:b:c)#i=k[a]i(r b)&&c#r b f(h:t)=t#r h Usage example: f "3<=4!=9>3==3" -> True f "3<=4!=4" -> False f "5>5" -> False f "8==8<9>0!=2>=1" -> True Ungolfed version: digitToInt d = read [d] :: Int lookup2 "!" = (/=) lookup2 "=" = (==) lookup2 ">" = (>=) lookup2 "<" = (<=) lookup1 ">" = (>) lookup1 "<" = (<) eval [] _ = True eval (op:'=':d:rest) i = lookup2 [op] i (digitToInt d) && eval rest (digitToInt d) eval (op:d:rest) i = lookup1 [op] i (digitToInt d) && eval rest (digitToInt d) evalChain (hd:rest) = eval rest (digitToInt hd) eval takes two arguments: the string to parse (starting always with a comparison operator) and a number i which is the left argument for comparison (and was the right argument in the previous round). The operator is returned by lookup2 if it's a two character operator (check only 1st char, because 2nd is always =) and by lookup1 if it's just a single character. eval calls itself recursively and combines all return values with logical and &&. # Common Lisp - 300185 169 165 (lambda(s)(loop for(a o b)on(mapcar'read-from-string(cdr(ppcre:split"([0-9]+)"s :with-registers-p t)))by #'cddr always(if o(funcall(case o(=='=)(!='/=)(t o))a b)t))) # Example (mapcar (lambda(s) ...) '("2<=3<=6>2<10!=3" "3<=4!=9>3==3" "3<=4!=4" "5>5" "8==8<9>0!=2>=1")) => (T T NIL NIL T) # Explanation (lambda (s) (loop for (a o b) on (mapcar 'read-from-string (cdr (cl-ppcre:split "([0-9]+)" s :with-registers-p t))) by #'cddr always (if o (funcall (case o (== '=) (!= '/=) (t o)) a b) t))) • ppcre:split splits on digits; for example: (ppcre:split "([0-9]+)" "2<=3<=6>2<10!=3" :with-registers-p t) => ("" "2" "<=" "3" "<=" "6" ">" "2" "<" "10" "!=" "3") Notice the first empty string, which is discarded using cdr • Mapping read-from-string to this list calls the read function for each strings, which returns symbols and numbers. • loop for (a op b) on '(3 < 5 > 2) by #'cddr iterates over the list by a step of 2 and thus binds a, op and b as follows, for each successive pass. a op b ---------- 3 < 5 5 > 2 2 nil nil • always checks whether the next expression is always true: either the operator is nil (see above) or the result of the comparison holds (see below). • the case selects a Common-Lisp comparison function, according to the symbol previously read; since some operators are identical in Lisp and the given language we can simply return o in the default case. # Python 2, 95 102 t=1 n=o=3 for c in map(ord,raw_input()): o+=c if 47<c<58:t&=627>>(o-c+3*cmp(n,c))%13;n=c;o=0 print t The loop is a straightforward pass through the string one character at a time. The t&=... part is where the magic happens. Basically, I hash the operator together with the value of cmp(lhs,rhs) (-1, 0, or 1 depending on if lhs is less, equal, or greater than rhs). The result is a key into a lookup table that gives 0 or 1 depending on whether the numbers compare properly given that operator. What lookup table, you ask? It's the number 627 = 0001001110011 in binary. Bitwise operators do the rest. This works on the four given test cases; let me know if you find an error for another case. I haven't tested it very rigorously. • You need to take in a as input. – xnor Mar 6 '15 at 4:36 • @xnor Whoops. Corrected. – DLosc Mar 6 '15 at 4:38 # Javascript 101 bytes a different approach from the js solution posted here F=(s,i=0,l=o="")=>[...s].every(c=>c>=0?[l^c,l==c,,l<c,l>c,l<=c,,l>=c]["!==<><=>=".search(o,l=c,o="")]:o+=c,l=o="") console.log(F("3<=4!=9>3==3")==true) console.log(F("3<=4!=4")==false) console.log(F("5>5")==false) console.log(F("8==8<9>0!=2>=1")==true) # Java 8, 283 bytes s->{String[]a=s.split("\\d"),b=s.split("\\D+");int i=0,r=1,x,y;for(;i<a.length-1;)if((x=new Byte(b[i]))!=(y=new Byte(b[++i]))&(a[i].equals("=="))|(a[i].equals("!=")&x==y)|(a[i].equals(">")&x<=y)|(a[i].equals(">=")&x<y)|(a[i].equals("<")&x>=y)|(a[i].equals("<=")&x>y))r--;return r>0;} Explanation: Try it here. s->{ // Method with String parameter and boolean return-type String[]a=s.split("\\d"), // All the inequalities b=s.split("\\D+"); // All the digits int i=0, // Index-integer (starting at 0) r=1, // Flag integer for the result, starting at 1 x,y; // Temp integer x and y for(;i<a.length-1;) // Loop from 0 to the length - 1 if((x=new Byte(b[i]))!=(y=new Byte(b[++i]))&(a[i].equals("==")) // If "==" and x and y as int are not equal: |(a[i].equals("!=")&x==y) // Or "!=" and x and y are equal |(a[i].equals(">")&x<=y) // Or ">" and x is smaller or equal to y |(a[i].equals(">=")&x<y) // Or ">=" and x is smaller than y |(a[i].equals("<")&x>=y) // Or "<" and x is larger or equal to y |(a[i].equals("<=")&x>y)) // Or "<=" and x is larger than y r--; // Decrease r by 1 // End of loop (implicit / single-line body) return r>0; // Return if r is still 1 } // End of method
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.3089540898799896, "perplexity": 6250.11474992339}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": false}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540527010.70/warc/CC-MAIN-20191210070602-20191210094602-00129.warc.gz"}
http://hiking-calculator.deadunicornz.org/
# Hiking calculator ## Build the path by clicking on the map to get range and time estimates Metric unit system Imperial unit system $V = V_0 * K_{slope} * K_{elevation} * K_{backpack}$ Where $V_0$ is a maximum safe and stable speed. Hiker achieves it descending -2.86° slope. Default $V_0 = 6 {km \over h}$ translates into 5 $km \over h$ on a flat terrain. $K_{slope} = e^{-3.5 \left|{h \over l} + 0.05\right|}$ is defined by Tobler's hiking function. $h$ is elevation gain/loss and $l$ is a distance. $K_{elevation} = e^{-9.80665 * 0.0289644 * (h - h_{acc}) \over {8.3144598 * 288.15}} = e^{-0.00011855(h - h_{acc})}$ and derived from the Barometric formula for atmosphere density. The idea here is that speed is decreased with atmosphere density decreasing, $h$ is elevation and $h_{acc}$ the elevation you are acclimatized for. $K_{backpack} = (1 - {m_b \over 100})$ coefficient determines how backpack mass slows you down. $m_b$ is backpack mass to body mass ratio, percents. Disclaimer: The calculator is intended for ballpark estimates. If you're not hiking in a ballpark use your discretion.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8059558272361755, "perplexity": 3531.812269070359}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948517845.16/warc/CC-MAIN-20171212173259-20171212193259-00043.warc.gz"}
https://crypto.stackexchange.com/questions/29713/inverting-rsa-function/29729
# Inverting RSA function I am in high school and I am writing a paper on RSA. I want to show that low values of the public key exponent can make it easy to 'invert' the function so that the encrypted message can be recovered. How is this done? I have tried to read the Handbook of Applied Cryptography but it's not making sense... Would this be inversion: Taking cipher text, and continuously adding the modulus, then taking the eth root of the sum. If the result is an integer, then it is the plaintext message. • PS. My paper is just covering plain old RSA, no padding or anything :) – EVELYN Oct 9 '15 at 2:32 • I suppose it should be the private key and not the public one. – user27950 Oct 9 '15 at 4:54 • RSA without padding is vulnerable, and should not be presented in introductory material without mention that it must not be used for serious purposes (except for random messages almost as wide as the modulus). Combined with low value of the public exponent, RSA without padding is even more vulnerable, but usually not because it is easier to invert the public function (the exception to that being in the end of poncho's answer) – fgrieu Oct 9 '15 at 13:09 I want to show that low values of the public key exponent can make it easy to 'invert' the function so that the encrypted message can be recovered. That is not known to be true; as long as the modulus is large enough to make factorization infeasible, there is no known way to compute e-th roots in general. Now, if the plaintext $p$ is small enough that $p^e < N$, then it is easy to recover $p$ (just take the e-th root over the integers, which is an easy problem). That's as close as we know to the result you're trying to get. Would this be inversion: Taking cipher text, and continuously adding the modulus, then taking the eth root of the sum. If the result is an integer, then it is the plaintext message. If $N$ is small enough to make work in a practical amount of time, then $N$ is small enough to factor. • I'm reading the last paragraph of the question as a simple extension of the e-th root attack, working when $p^e<k\cdot N$ for moderate $k$. I'm sure $k\approx2^{20}$ is feasible. I wish I knew how large $k$ needs to be in order to avoid a more sophisticated attack. This answer to a significantly different question does not tell. – fgrieu Oct 9 '15 at 16:26 • Hello, could you please explain k? I have not encountered a constant or variable k in my readings. – EVELYN Oct 10 '15 at 9:57 • @EVELYN : $\:$ k is a positive integer, and in this case that's all it is. $\;\;\;\;$ – user991 Oct 11 '15 at 8:39 While Poncho's answer is fully valid I'll hereby extend the part on the proposed idea being inferior to factoring. I want to show that low values of the public key exponent can make it easy to 'invert' the function so that the encrypted message can be recovered. As poncho said this is only feasible if the message's length is smaller than the modulus length divided by e, i.e. when no modular reduction takes place. Would this be inversion: Taking cipher text, and continuously adding the modulus, then taking the eth root of the sum. If the result is an integer, then it is the plaintext message. The problem of this approach is the run-time. For this approach to be viable you need to beat the General Number Field Sieve (GNFS) in terms of performance at least for some messages. So let's assume the best case scenario, where your algorithm starts operating: if $||m||\geq ||N||/e$, so for example for a 1025-bit message for 3072-bit RSA with $e=3$. To be beat the GNFS, you need to be able to carry out the attack on less than $2^{256}$ operations for this scenario. Clearly, the ciphertext will have length $||c||=3072$ bits with high probability and the term you're looking for $m^e$ has $1025*3=3075$ bits. So you have to test every single (or at least half) of all the multiples of $N$ in the 3075 bit range, which are $2^3=8$, which is indeed feasible. But which area of messages can you break using this technique? You can break any message for which the above equation holds and for which $(||m||-||N||/e)*e<2^{60}$, meaning for $e=3$ you "can break 20 more bits" (f.ex. 1025-1045). If you consider your technique "good" if it stays below factoring, you can even extend that to 80 bits. But in practice this kind of attack is already countered by randomized padding. • The approach in the question remains feasible when the message's length is slightly higher than the modulus length divided by $e$, at least up to $20/e$ extra bits, with modest means. I do not know what the upper limit is; this answer to a significantly different question does not tell. – fgrieu Oct 9 '15 at 16:22
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8214862942695618, "perplexity": 398.86665974370806}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038075074.29/warc/CC-MAIN-20210413213655-20210414003655-00283.warc.gz"}
https://wiki.freepascal.org/index.php?title=NumLib_Documentation&oldid=128664
# NumLib Documentation ## Introduction NumLib is a collection of routines for numerical mathematics. It was written by C.J.J.M. van Ginneken, W.J.P.M. Kortsmit, and L. Reij at the Technical University of Einhoven (Netherlands) and donated to the Free Pascal project. Its beginnings date back to 1965. Originally written in Algol 60, ported to poorly formatted Pascal with strange procedure names, it is hard stuff, in particular because an official documentation is not readily available (well... -- Dutch documentation files in TeX can be found at http://www.stack.nl/~marcov/numlib/). But after all, this library contains a series of very useful routines grouped into several units: • Calculation of special functions (unit spe) • Solution of systems of linear equations (unit sle) • Finding roots of equations (unit roo) • Fitting routines (unit ipf) • Basic operations with matrices and vectors (unit omv) • Matrix inversion (unit inv) • Calculation of determinants (unit det) • Calculation of eigenvalues (unit eig) Therefore, it is the intention of this wiki article to create some useful documentation. Each routine described here was tested and its description will be accompanied by a working code example. Note: This page heavily makes use of mathematical formulas written in LaTeX. In order to see these formulas in the browser JavaScript must be enabled. ### Naming convention of routines Would you imagine that a procedure named spears calculates the arcsin? The original NumLib routines limit the procedure/function names to 6 characters (maybe a limitation of Algol?). The first three characters always are identical with the name of the unit in which they are implemented. This leaves only three characters to differentiate between the routines... Routines later added to the original library are given more conventional names, such as normaldist for calculation of the normal distribution. ## Data types and declarations (unit typ) ### Basic floating point type, ArbFloat In NumLib, a new type ArbFloat is defined which is used as floating point type throughout the entire library. This allows to switch between IEEE Double (64bit) and Extended(80bit) (though big endian state is unknown at present). At the time of this writing the DEFINE ArbExtended is enabled, and therefore ArbFloat is identical to the standard type extended. In order to change the floating point type define or undefine ArbExtended and adapt the machineconstants to the type selected. ### Basic integer type, ArbInt Because in plain FPC mode the type Integer is 16-bits (for TP compatibility), and in Delphi 32-bits, all integers were changed to ArbInt. The basic idea is the same as with ArbFloat. ### Vectors NumLib often passes vectors to procedures as one ArbFloat plus some integer value. This ArbFloat value is the first value of an array containing the vector, the integer is the count of elements used from this array. Internally an array type is mapped over the first value in order to access the other array elements. This way both 0- and 1-based arrays as well as static and dynamic arrays can be passed to the functions and procedures of NumLib. procedure DoSomething(var AVector: ArbFloat; n: Integer); type TLocalVector = array[0..MaxElements] of ArbFloat; var i: Integer; x: TLocalVector absolute AVector; begin for i:=0 to n-1 do // do something with x[i] end; var x: array[1..100]; // Note: This array begins with index 1! ... DoSomething(x[1], 100); ### Matrices A matrix is a two-dimensional arrangement of numbers in m rows and n columns. ${A} = \left[ \begin{array}{cccc} a_{11} & a_{12} & a_{13} & \ldots & a_{1n}\\ a_{21} & a_{22} & a_{23} & \ldots & a_{2n}\\ \vdots & \vdots & \vdots & \ddots & \vdots\\ a_{m1} & a_{m2} & a_{m3} & \ldots & a_{mn} \end{array} \right]$ The matrix elements aij are addressed by row and column indexes, i and j, respectively. In mathematics, the index values usually start with 1 (i = 1..m, j = 1..n) while in computing the first index is preferred to be 0 (i = 0...m-1, j = 0...n-1). #### Generic matrices In this type of matrix, no assumption is made on symmetry and shape of the data arrangement. A constant (real) matrix can be declared in Pascal as a two-dimensional array of floating point numbers: A: array[1..m, 1..n] of ArbFloat (or A: array[0..m-1, 0..n-1] of ArbFloat in 0-based index notation). Similarly, a constant complex matrix can be declared as an array[1..m, 1..n] of complex. When a NumLib procedure needs a matrix the first (top left) matrix element must be passed as a var parameter, along with the number of rows and columns. It is even possible to allocate larger arrays as needed, and in this case the allocated row length (or number of columns) must be specified. Alternatively a matrix also can be specified as a one-dimensional array. This works because all data are found within the same memory block. The array index, k must be converted to the 2D matrix indexes, i, j: k := i * n + j <==> i = k div n, j := k mod n {for 0-based array and matrix indexes} k := (i-1) * n + j <==> i := (k-1) div n + 1, j := (k-1) mod n + 1 {for 1-based array and matrix indexes} Using a one-dimensional array is also the correct way to dynamically allocate memory for a matrix. The first idea of using an array of array of ArbFloat will not work because this does not allocate a single memory block. Instead, individual memory blocks will be allocated for the inner array (rows), and these pointers will be stored in the outer array - this way of storing 2D data is not compatible with the requirements of NumLib. Here is a simple example how to create, populate and read a matrix dynamically $A = \left[ \begin{array}{ccc} 1 & 2 & 3 \\ 4 & 5 & 6 \end{array} \right]$ var A: array of Arbfloat; // Note: the index in a dynamic array is 0-based. ij: Integer; i, j: Integer; p: ^ArbFloat; m, n: Integer; begin m := 2; n := 3; SetLength(A, m, n); A[0] := 1; A[1] := 2; A[2] := 3; A[3] := 4; A[4] := 5; A[5] := 6; for i := 0 to m-1 do begin for j := 0 to n-1 do begin ij := i * n + j; Write(A[ij]); end; WriteLn; end; // or p := @A[0]; // pointer to first array element for i:=0 to m - 1 do begin for j := 0 to n - 1 do begin WriteLn(p^); inc(p); // advance pointer to next array element end; WriteLn; end; #### Symmetric matrices The elements of a symmetric matrix are mirrored at the main diagonal, i.e. aij = aji. In other words: a symmetric matrix is equal to its transpose: A = AT. NumLib contains some routine optimized for such matrices. They require the matrix being stored like a generic matrix in a rectangular m x n array or a linear m*n array. However, only the half of the matrix below the diagonal must be populated (but it can be, of course). #### Symmetric positive definite matrices A matrix A is positive definite if the product dT A d is a positive number for any non-zero vector d. A matrix is symmetric positive definite if, additionally, AT = A. This type of matrices has some interesting properties (determinant is never 0, eigenvalues are real and positive). Therefore NumLib offers specialized routines for many matrix problems with symmetric positive matrices which are superior to those for general matrices. The matrix is stored in the conventional way like a rectangular 2D array of m rows and n columns or a linear 1D array with m*n elements. #### Band matrices A n x n band matrix has zero elements everywhere except for a band along the main diagonal characterized by a left and right bandwidth (l and r, respectively). The NumLib procedures for band matrices assume that the matrix stores only the elements of the band. It is expected the the matrix is passed as a 1D array. Starting at the top/left corner point of the matrix (element A11) the diagonal elements are collected by running along the rows of the matrix, from left to right and from top to bottom. In total, there will be n (l+1+r) - (r(r+1) + l(l+1)) div 2 elements. The calling procedure must allocate a 1D array of at least this size for the diagonal elements. Note that a band matrix cannot be passed as a 2D array. As an example, suppose this 7 x 7 matrix with left bandwidth 2 and right bandwidth 1: $A = \begin{bmatrix} A_{11} & A_{12} & 0 & 0 & 0 & 0 & 0 \\ A_{21} & A_{22} & A_{23} & 0 & 0 & 0 & 0 \\ A_{31} & A_{32} & A_{33} & A_{34} & 0 & 0 & 0 \\ 0 & A_{42} & A_{43} & A_{44} & A_{45} & 0 & 0 \\ 0 & 0 & A_{53} & A_{54} & A_{55} & A_{56} & 0 \\ 0 & 0 & 0 & A_{64} & A_{65} & A_{66} & A_{67} \\ 0 & 0 & 0 & 0 & A_{75} & A_{76} & A_{77} \end{bmatrix}$ The 1D data array to be passed to the NumLib routines consists of these elements const arr: array[1..24] of ArbFloat = ( A11, A22, A21, A22, A23, A31, A32, A33, A34, A42, A43, A44, A45, A53, A54, A55, A56, A64, A65, A66, A67, A75, A76, A77 ); #### Symmetric band matrices In a symmetric matrix, the matrix elements can be mirrored at the main diagonal of the matrix, i.e. Aij = Aji. All elements out side a band of width w to the left and right of the main diagonal are zero. Like with a generic band matrix, NumLib assumes that the only the elements of the diagonals are passed as a 1D array to the procedures dedicated to this matrix type. Since in a symmetric band matrix the left and right band widths are equal it is assumed that only the left band and the main diagonal are stored. Again the relevant diagonal elements are collected by running across the rows of the matrix from left to right and from top to bottom, stopping in each row at the main diagonal. In total, there will be n (w+1) - w(w+1) div 2 elements in the data array. As an example consider this 7 x 7 symmetric band matrix with band width 2: $A = \begin{bmatrix} A_{11} & A_{21} & A_{31} & 0 & 0 & 0 & 0 \\ A_{21} & A_{22} & A_{32} & A_{42} & 0 & 0 & 0 \\ A_{31} & A_{32} & A_{33} & A_{43} & A_{53} & 0 & 0 \\ 0 & A_{42} & A_{43} & A_{44} & A_{54} & A_{64} & 0 \\ 0 & 0 & A_{53} & A_{54} & A_{55} & A_{65} & A_{75} \\ 0 & 0 & 0 & A_{64} & A_{65} & A_{66} & A_{76} \\ 0 & 0 & 0 & 0 & A_{75} & A_{76} & A_{77} \end{bmatrix}$ The 1D array for the NumLib procedures is const arr: array[1..18] of ArbFloat = ( A11, A21, A22, A31, A32, A33, A42, A43, A44, A53, A54, A55, A64, A65, A66, A75, A76, A77 ); #### Tridiagonal matrices A tridiagonal matrix has zero elements everywhere except for the main diagonal and the diagonal immediately above and below it. This way the matrix can be stored more efficiently than a generic matrix because all the empty elements can be dropped. The elements of an n x n square tridiagonal matrix can be stored as three vectors • an array l with n-1 elements for the subdiagonal • an array d with n elements for the main diagonal, and • an array u with n-1 elements for the superdiagonal $A= \begin{bmatrix} d[0] & u[0] & & \dots & 0 \\ l[1] & d[1] & u[1] & & \\ & l[2] & d[2] & u[2] & \\ \vdots & & \ddots & \ddots & \ddots \\ & & l[n-1] & d[n-1] & u[n-1] \\ 0 & & & l[n] & d[n] \end{bmatrix}$ #### Symmetric tridiagonal matrices In these tridiagonal matrices, the subdiagonal and superdiagonal elements are equal. Consequently, NumLib requests only two, instead of three, one-dimensional arrays: • an array d with n elements for the main diagonal, and • an array c with n-1 elements for the superdiagonal and subdiagonal $A= \begin{bmatrix} d[0] & c[1] & & \dots & 0 \\ c[1] & d[1] & c[2] & & \\ & c[2] & d[2] & c[3] & \\ \vdots & & \ddots & \ddots & \ddots \\ & & c[n-1] & d[n-1] & c[n] \\ 0 & & & c[n] & d[n] \end{bmatrix}$ ### Complex numbers NumLib defines the type complex as a Turbo Pascal object. Real and imaginary parts are denoted as xreal and imag, respectively. Methods for basic operations are provided: type complex = object xreal, imag : ArbFloat; procedure Init(r, i: ArbFloat); // Initializes the number with real and imaginary parts r and i, resp procedure Add(c: complex); // Adds another complex number procedure Sub(c: complex); // Subtracts a complex number function Inp(z:complex):ArbFloat; // Calculates the inner product (a.Re * b.Re + a.Im * b.Im) procedure Conjugate; // Conjugates the value (i.e. negates the imaginary part) procedure Scale(s: ArbFloat); // Multiplies real and imaginary part by the real value s function Norm: ArbFloat; // Calculates the "norm", i.e. sqr(Re) + sqr(Im) function Size: ArbFloat; // Size = sqrt(Norm) function Re: ArbFloat; // Returns the real part of the complex number procedure Unary; // Negates real and imaginary parts function Im: ArbFloat; // Returns the imaginary part of the complex number function Arg: ArbFloat; // Calculates the phase phi of the complex number z = x + y i = r exp(i phi) procedure MinC(c: complex); // Converts itself to the minimum of real and imaginary parts of itself and another value, c procedure MaxC(c: complex); // Converts itself to the maximum of real and imaginary ports of itself and another value, c procedure TransF(var t: complex); end; The real and imaginary parts of a complex number can also be retrieved by these stand-alone functions: function Re(c: complex): ArbFloat; function Im(c: complex): ArbFloat; ## Basic operations with matrices and vectors (unit omv) ### Inner product of two vectors The result of the inner product of two vectors a = [a1, a2, ... an] and b = [b1, b2, ... bn] (also called "dot product" or "scalar product") is a scalar, i.e. a single number. It is calculated as the sum of the element-by-element products of the vectors. Both vectors must have the same lengths. $\mathbf{a} \cdot \mathbf{b} = \sum_{i=1}^n a_i b_i = a_1 b_1 + a_2 b_2 + \dots + a_n b_n$ NumLib provides the function omvinp for calculation of the inner product: function omvinp(var a, b: ArbFloat; n: ArbInt): ArbFloat; • a and b are the first elements of 1-dimensional arrays representing the vectors a and b, respectively. • n defines the dimension of the vectors (count of array elements). Both vectors must have the same number of elements. Example Calculate the dot product of the vectors a = [0, 1, 2, 2, -1] and b = [3, -1, -2, 2, -1]. program dot_product; uses typ, omv; const n = 5; a: array[0..n-1] of ArbFloat = (0, 1, 2, 2, -1); b: array[0..n-1] of Arbfloat = (3, -1, -2, 2, -1); var ab: ArbFloat; i: Integer; begin ab := omvinp(a[0], b[0], n); Write('Vector a = ['); for i:= Low(a) to High(a) do Write(a[i]:5:0); WriteLn(' ]'); Write('Vector b = ['); for i:= Low(b) to High(b) do Write(b[i]:5:0); WriteLn(' ]'); Write('Dot product a b = '); WriteLn(ab:0:0); end. ### Product of two matrices The product of a m x n matrix A and a n x p matrix B is a m x p matrix C in which the elements are calculated as the inner product of the row vectors of A and the column vectors of B (see here for more details): $C_{ij} = \sum_{k=0}^n A_{ik} B_{kj}$ The NumLib function to perform this multipication is omvmmm ("mmm" = multiply matrix by matrix): procedure omvmmm(var a: ArbFloat; m, n, rwa: ArbInt; var b: ArbFloat; p, rwb: ArbInt; var c: ArbFloat; rwc: ArbInt); • a is the first element of the first input matrix A. The array will not be changed. • m specifies the number of rows (or: column length) of matrix A. • n specifies the number or columns (or: row length) of matrix A. • rwa is the allocated row length of matrix A. This means that the array can be allocated larger than actually needed. Of course, rwa cannot be smaller than n. • b is the first element of the second input matrix B. Again, this array will not be changed. • p specifies the number or columns (or: row length) of matrix B. The number of rows is already defined by the number of columns of matrix A, n. • rwb is the allocated row length of matrix B. rwb cannot be smaller than p. • c is the first element of the output matrix C. After the calculation, this and the following array elements will contain the elements of the product matrix. • The size of the output matrix is m rows x p columns as set up by the input matrices A and B. • rwc is the allocated row length of matrix C. rwc cannot be smaller than p. Example Calculate the product of the matrices $A = \begin{bmatrix} 3 & \ 5 & 4 & 1 & -4 \\ -2 & \ 3 & 4 & 1 & 0 \\ 0 & \ 1 & -1 & -2 & 5 \end{bmatrix} \ \ \ \ \ B = \begin{bmatrix} 3 & 4 & -2 & 0 \\ 0 & -2 & 2 & 1 \\ -1 & 0 & 3 & 4 \\ -2 & -3 & 0 & 1 \\ 1 & 3 & 0 & -1 \end{bmatrix}$ program matrix_multiplication; uses typ, omv; const m = 3; n = 5; p = 4; A: array[1..m, 1..n] of ArbFloat = ( ( 3, 5, 4, 1, -4), (-2, 3, 4, 1, 0), ( 0, 1, -1, -2, 5) ); B: array[1..n, 1..p] of ArbFloat = ( ( 3, 4, -2, 0), ( 0, -2, 2, 1), (-1, 0, 3, 4), (-2, -3, 0, 1), ( 1, 3, 0, -1) ); var C: array[1..m, 1..p] of ArbFloat; i, j: Integer; begin // Calculate product omvmmm( A[1,1], m, n, n, B[1,1], p, p, C[1,1], p ); // Print A WriteLn('A = '); for i:= 1 to m do begin for j := 1 to n do Write(A[i, j]:10:0); WriteLn; end; WriteLn; // Print B WriteLn('B = '); for i:= 1 to n do begin for j := 1 to p do Write(B[i, j]:10:0); WriteLn; end; WriteLn; // Print C WriteLn('C = A B = '); for i:= 1 to m do begin for j := 1 to p do Write(C[i, j]:10:0); WriteLn; end; end. ### Product of a matrix with a vector A matrix A of size m x n multiplied with a vector b of length n yields another vector of length m. The elements of the result vector c are the dot products of the matrix rows with b. Note that the length of vector b must be equal to the number of columns of matrix A. \begin{align*} \mathbf{c} = A\ \mathbf{b}= \left[ \begin{array}{cccc} a_{11} & a_{12} & a_{13} & \ldots & a_{1n}\\ a_{21} & a_{22} & a_{23} & \ldots & a_{2n}\\ \vdots & \vdots & \vdots & \ddots & \vdots\\ a_{m1} & a_{m2} & a_{m3} & \ldots & a_{mn} \end{array} \right] \ \ \left[ \begin{array}{c} b_1\\ b_2\\ b_3\\ \vdots\\ b_n \end{array} \right] = \left[ \begin{array}{c} a_{11}b_1+a_{12}b_2 + a_{13}b_3 + \cdots + a_{1n} b_n\\ a_{21}b_1+a_{22}b_2 + a_{23}b_3 + \cdots + a_{2n} b_n\\ \vdots\\ a_{m1}b_1+a_{m2}b_2 + a_{m3}b_3 + \cdots + a_{mn} b_n\\ \end{array} \right]. \end{align*} NumLib's procedure for this task is called omvmmv ("mmv" = multiply a matrix with a vector): procedure omvmmv(var a: ArbFloat; m, n, rwidth: ArbInt; var b, c: ArbFloat); Example Calculate the product \begin{align*} \mathbf{c} = A\ \mathbf{b}= \left[ \begin{array}{cccc} 3 & 5 & 4 & 1 & -4\\ -2 & 3 & 4 & 1 & 0\\ 0 & 1 & -1 & -2 & 5 \end{array} \right] \ \ \left[ \begin{array}{c} 3\\ 0\\ -1\\ -2\\ 1 \end{array} \right] \end{align*} program matrix_vector_multiplication; uses typ, omv; const m = 3; n = 5; p = 4; A: array[1..m, 1..n] of ArbFloat = ( ( 3, 5, 4, 1, -4), (-2, 3, 4, 1, 0), ( 0, 1, -1, -2, 5) ); b: array[1..n] of ArbFloat = ( 3, 0, -1, -2, 1 ); var c: array[1..m] of ArbFloat; i, j: Integer; begin // Calculate product c = A b omvmmv( A[1,1], m, n, n, b[1], c[1] ); // Print A WriteLn('A = '); for i:= 1 to m do begin for j := 1 to n do Write(A[i, j]:10:0); WriteLn; end; WriteLn; // Print vector b WriteLn('b = '); for i:= 1 to n do Write(b[i]:10:0); WriteLn; WriteLn; // Print result vector c WriteLn('c = A b = '); for i:= 1 to m do Write(c[i]:10:0); WriteLn; end. ### Transpose matrix The transpose matrix AT of matrix A is obtained by flipping rows and columns: \begin{align*} {A} = \left[ \begin{array}{cccc} a_{11} & a_{12} & a_{13} & \ldots & a_{1n}\\ a_{21} & a_{22} & a_{23} & \ldots & a_{2n}\\ \vdots & \vdots & \vdots & \ddots & \vdots\\ a_{m1} & a_{m2} & a_{m3} & \ldots & a_{mn} \end{array} \right] \ \ \ {A^T} = \left[ \begin{array}{cccc} a_{11} & a_{21} & \ldots & a_{m1}\\ a_{12} & a_{22} & \ldots & a_{m2}\\ a_{13} & a_{23} & \ldots & a_{m3} \\ \vdots & \vdots & \ddots & \vdots \\ a_{1n} & a_{2n} & \ldots & a{mn} \end{array} \right] \end{align*} Use the procedure omvtrm to perform this operation with NumLib: procedure omvtrm( var a: ArbFloat; m, n, rwa: ArbInt; var c: ArbFloat; rwc: ArbInt ); • a denotes the first element of the input matrix A. The elements of this array are not changed by the procedure. • m is the number of rows of matrix A. • n is the number of columns of matrix A. • rwa is the number of allocated columns of A. This way the array of A can be larger than acutally needed. • c is the first element of the transposed matrix AT. It has n rows and m columns. • rwc is the number of allocated columns for the transposed matrix. Example Obtain the transpose of the 2x4 matrix ${A} = \left[ \begin{array}{cccc} 1 & 2 & 3 & 4 \\ 11 & 22 & 33 & 44 \end{array} \right]$ program transpose; uses typ, omv; const m = 2; n = 4; A: array[1..m, 1..n] of ArbFloat = ( ( 1, 2, 3, 4), (11, 22, 33, 44) ); var C: array[1..n, 1..m] of ArbFloat; i, j: Integer; begin // Transpose A omvtrm( A[1,1], m, n, n, C[1,1], m ); // Print A WriteLn('A = '); for i:= 1 to m do begin for j := 1 to n do Write(A[i, j]:10:0); WriteLn; end; WriteLn; // Print C WriteLn('AT = '); for i:= 1 to n do begin for j := 1 to m do Write(C[i, j]:10:0); WriteLn; end; end. ### Norm of vectors and matrices A norm is a function which assigns a positive "length" to a vector a or a matrix M. In case of vectors, NumLib supports these norms: • The 1-norm of a vector is defined as the sum of the absolute values of the vector components. It is also called "Taxicab" or "Manhattan" norm because it corresponds to the distance that a taxis has to drive in a rectangular grid of streets. $\|a\|_1 = \sum_{i=1}^n |{a_i}|$ • The 2-norm (also: Euclidian norm) corresponds to the distance of point a from the origin. $\|a\|_2 = \sqrt{\sum_{i=1}^n {a_i}^2}$ • The maximum infinite norm of a vector is the maximum absolute value of its components. $\|a\|_\infty = \max({a_1}, {a_2}, ... {a_n})$ The norms of matrices, as implemented by NumLib, are usually defined by row or column vectors: • The 1-norm of a matrix is the maximum of the absolute column sums: $\|M\|_1 = \max_{1 \le j \le {n}} \sum_{i=1}^m|M_{ij}|$ • The maximum infinite norm of a matrix is the maximum of the absolute row sum. $\|M\|_\infty = \max_{1 \le i \le\ m} \sum_{j=1}^n |M_{ij}|$ • Only the Frobenius norm is calculated by individual matrix elements. It corresponds to the 2-norm of vectors, only the sum runs over all matrix elements: $\|M\|_F = \sqrt{\sum_{i=1}^m \sum_{j=1}^n {M_{ij}}^2}$ These are the NumLib procedure for calculation of norms: function omvn1v(var a: ArbFloat; n: ArbInt): ArbFloat; // 1-norm of a vector function omvn1m(var a: ArbFloat; m, n, rwidth: ArbInt): ArbFloat; // 1-norm of a matrix function omvn2v(var a: ArbFloat; n: ArbInt): ArbFloat; // 2-norm of a vector function omvnfm(Var a: ArbFloat; m, n, rwidth: ArbInt): ArbFloat; // Frobenius norm of a matrix function omvnmv(var a: ArbFloat; n: ArbInt): ArbFloat; // Maximum infinite norm of a vector function omvnmm(var a: ArbFloat; m, n, rwidth: ArbInt): ArbFloat; // Maximum infinite norm of a matrix • a is the first element of the vector or matrix of which the norm is to be calculated • m, in case of a matrix norm, is the number of matrix rows. • n is the number of vector elements in case of a vector norm, or the number of columns in case of a matrix norm. • rwidth, in case of a matrix norm, is the allocated count of columns. This way a larger matrix can be allocated than actually needed. Example program norm; uses typ, omv; const n = 2; m = 4; a: array[0..m-1] of ArbFloat = (0, 1, 2, -3); b: array[0..m-1, 0..n-1] of Arbfloat = ((3, -1), (-2, 2), (0, -1), (2, 1)); var i, j: Integer; begin Write('Vector a = ['); for i:= Low(a) to High(a) do Write(a[i]:5:0); WriteLn(' ]'); WriteLn(' 1-norm of vector a: ', omvn1v(a[0], m):0:3); WriteLn(' 2-norm of vector a: ', omvn2v(a[0], m):0:3); WriteLn(' maximum norm of vector a: ', omvnmv(a[0], m):0:3); WriteLn; WriteLn('Matrix b = '); for i:= 0 to m-1 do begin for j := 0 to n-1 do Write(b[i,j]:5:0); WriteLn; end; WriteLn(' 1-norm of matrix b: ', omvn1m(b[0, 0], m, n, n):0:3); WriteLn('Forbenius norm of matrix b: ', omvnfm(b[0, 0], m, n, n):0:3); WriteLn(' maximum norm of matrix b: ', omvnmm(b[0, 0], m, n, n):0:3); ReadLn; end. ## Determinant of a matrix (unit det) Unit det provides a series of routines for calculation of the determinant of a square matrix. Besides a procedure for general matrices there are also routines optimized for special matrix types (tridiagonal, symmetric). In order to avoid possible overflows and underflows a factor may be split off during calculation, and the determinant is returned as a floating point number f times a multiplier 8k. In many cases, however, k = 0, and the determinant simply is equal to f. ### Determinant of a standard matrix The term "standard matrix" means here a matrix with is stored in the standard NumLib storage as described here, i.e. the matrix is stored as a 2D or 1D array of real numbers. The 2D array has at least n rows and n columns, the 1D array is dimensioned to contain at least '2 elements. Without making any assumptions on the properties of the matrix the determinant can be calculated by the procedure detgen. More efficient algorithms can be used, however, if the matrix has these particular properties: • symmetric matrix --> use procedure detgsy. • symmetric positive definite matrix --> use procedure getgpd. procedure detgen(n, rwidth: ArbInt; var a, f: ArbFloat; var k, term: ArbInt); // --> generic matrix procedure detgsy(n, rwidth: ArbInt; var a, f: ArbFloat; var k, term: ArbInt); // --> symmetric matrix procedure detgpd(n, rwidth: ArbInt; var a, f: ArbFloat; var k, term: ArbInt); // --> symmetric positive definite matrix • n determines the number of rows and columns of the input matrix (it must be square matrix). • rwidth specifies the allocated row length of the input matrix. This takes care of the fact that matrices can be allocated larger than actually needed. • a is the first (i.e. top/left) element of the input matrix. The entire matrix must be contained within the same allocated memory block. • f and k return the determinant of the matrix. The determinant is given by f * 8k. Usually k = 0, and the determinant simply is equal to f. Example Calculate the determinant of the 4x4 matrix $A= \left[ \begin{array}{rrrr} 4 & 2 & 4 & 1 \\ 30 & 20 & 45 & 12 \\ 20 & 15 & 36 & 10 \\ 35 & 28 & 70 & 20 \end{array} \right]$ The matrix is positive definite because all elements are positive and the product bT A b cannot become zero or negative for any non-zero vector b. While the routine detgpd is the best for this matrix type the code below contains also commented-out calls to the other routines. program determinant_spd_matrix; // "spd" = symmetric positive definite uses math, typ, det; const n = 4; const a: array[1..n, 1..n] of ArbFloat = ( ( 5, 7, 6, 5), ( 7, 10, 8, 7), ( 6, 8, 10, 9), ( 5, 7, 9, 10) ); var f: ArbFloat; k: Integer; term: Integer = 0; i, j: Integer; begin // write input matrix WriteLn('A = '); for i := 1 to n do begin for j := 1 to n do Write(a[i, j]:10:0); WriteLn; end; WriteLn; // Calculate determinant of symmetric positive definite matrix detgpd(n, n, a[1, 1], f, k, term); // or uncomment to use one of the other methods // detgen(n, n, a[1, 1], f, k, term); // detgsy(n, n, a[1, 1], f, k, term); if term = 1 then WriteLn('Determinant of A = ', f * intpower(8, k):0:9, ' (k = ', k, ')') else WriteLn('Incorrect input'); end. ### Determinant of a band matrix If a matrix has the shape of a band matrix then its determinant is best calculated by using the procedure detgba procedure detgba(n, l, r: ArbInt; var a, f: ArbFloat; var k, term:ArbInt); • n denotes the number of columns and rows of the matrix (it must be square). • l identifies the left bandwidth, i.e. how many diagonals the band extends to the left, or below, the main diagonal. • r identifies the right bandwidth, i.e. how many diagons the band extends to the right, or above, the main diagonsl. • a specifies the first element of a 1D array which contains the elements of the diagonal band, see this. This array contains only the band elements and is obtained by running across the rows of the band matrix from left to right and top to bottom, starting at element A11. It must be dimensioned to contain at least n*(l+1+r) - (r*(r+1)+l*(l+1)) div 2 elements. • f and k return the determinant of the matrix. The determinant is given by f * 8k. Usually k = 0, and the determinant simply is equal to f. Example Calculate the determinant of the 5x5 band matrix with left bandwidth l = 2 and right bandwidth r = 1 $A = \begin{bmatrix} 1 & 2 & 0 & 0 & 0 \\ 2 & 1 & 1 & 0 & 0 \\ 1 & 3 & 0 & 1 & 0 \\ 0 & 1 & 1 & 1 & 1 \\ 0 & 0 & 1 & 1 & 1 \end{bmatrix}$ program determinant_band_matrix; uses math, typ, det; const n = 5; L = 2; R = 1; nelements = n*(L+1+R) - (R*(R+1) + L*(L+1)) div 2; const // Diagonal elements arranged in rows, elements outside of the band omitted! a: array[1..nelements] of Arbfloat = ( 1, 2, 2, 1, 1, 1, 3, 0, 1, 1, 1, 1, 1, 1, 1, 1 ); var f: ArbFloat; term: Integer = 0; i, i1, i2, j, k: Integer; begin // Write diagonal elements WriteLn('n = ', n); Writeln('Left band width L = ', L); WriteLn('Right band width R = ', R); Write('Diagonal elements of A = ', a[1]:0:0); for k := 2 to nelements do Write(a[k]:5:0); WriteLn; WriteLn; // write reconstructed band input matrix (not needed for calculation) WriteLn('Reconstructed A = '); k := 1; for j := 1 to n do begin i1 := j - L; i2 := i1 + L + R; for i:=1 to i1-1 do Write(0.0:5:0); for i := i1 to i2 do if (i >= 1) and (i <= n) then begin Write(a[k]:5:0); inc(k); end; for i:= i2 + 1 to n do if i <= n then Write(0.0:5:0); WriteLn; end; WriteLn; // Calculate determinant detgba(n, l, r, a[1], f, k, term); if term = 1 then WriteLn('Determinant of A = ', f * intpower(8, k):0:9, ' (k = ', k, ')') else WriteLn('Incorrect input'); end. ### Determinant of a symmetric positive definite band matrix If a matrix has the shape of a band matrix and is symmetric positive definite then detgpb is the dedicated routine for calculation of its determinant. procedure detgpb(n, w: ArbInt; var a, f: ArbFloat; var k, term:ArbInt); • n denotes the number of columns and rows of the matrix (it must be square). • w identifies the bandwidth, i.e. how many diagonals the band extends to the left or to the right of the main diagonal. Left and right bandwidth must be equal. • a specifies the first element of a 1D array which contains the elements of the diagonal band, see this. This array contains only the left band elements and the elements of the main diagonal. It is obtained by running across the rows of the band matrix from left to right and top to bottom, but stopping at the main diagonal - the right band is ignored since it is equal to the left band. The array must be dimensioned to contain at least n*(w+1) - (w*(w+1)) div 2 elements. • f and k return the determinant of the matrix. The determinant is given by f * 8k. Usually k = 0, and the determinant simply is equal to f. Example Calculate the determinant of the 7x7 symmetric band matrix with bandwidth w = 2 $A= \begin{bmatrix} 5 & -4 & 1 & & & & \\ -4 & 6 & -4 & 1 & & & \\ 1 & -4 & 6 & -4 & 1 & & \\ & 1 & -4 & 6 & -4 & 1 & \\ & & 1 & -4 & 6 & -4 & 1 \\ & & & 1 & -4 & 6 & -4 \\ & & & & 1 & -4 & 5 \end{bmatrix}$ program determinant_spd_band_matrix; // "spd" = symmetric positive definite uses math, typ, det; const n = 7; w = 2; nelements = n * (w + 1) - (w * (w + 1)) div 2; const // Band elements arragned in rows, elements outside of the band omitted! a: array[1..nelements] of Arbfloat = ( 5, -4, 6, 1, -4, 6, 1, -4, 6, 1, -4, 6, 1, -4, 6, 1, -4, 5 ); function MatrixIndexToArrayIndex(i, j, n, w: Integer): Integer; function DiagElementIndex(i: Integer): Integer; var k: Integer; begin Result := 1; if i = 1 then exit; // Rows truncated at left for k := 2 to w do begin Result := Result + k; if k = i then exit; end; // full rows and those truncated at right for k := w+1 to n do begin Result := Result + w + 1; if k = i then exit; end; Result := n; end; var d: Integer; begin if j > i then begin Result := MatrixIndexToArrayIndex(j, i, n, w); exit; end; Result := DiagElementIndex(i); if (i = j) then exit; d := i - j; if d > w then Result := -1 else begin dec(Result, d); if (Result < 1) then Result := -1 end; end; var i, j, k: Integer; f: ArbFloat; term: Integer = 0; begin // Write diagonal elements WriteLn('n = ', n); Writeln('(One-sided) band width W = ', w); Write('Diagonal elements of A = ', a[1]:0:0); for k := 2 to nelements do Write(a[k]:3:0); WriteLn; WriteLn; // write reconstructed band input matrix (not needed for calculation) WriteLn('Reconstructed A = '); k := 1; for i := 1 to n do begin for j := 1 to n do begin k := MatrixIndexToArrayIndex(i, j, n, w); if k = -1 then Write(0.0:3:0) else Write(a[k]:3:0); end; WriteLn; end; WriteLn; // Calculate determinant detgpb(n, w, a[1], f, k, term); if term = 1 then WriteLn('Determinant of A = ', f * intpower(8, k):0:9, ' (k = ', k, ')') else WriteLn('Incorrect input'); end. ### Determinant of a tridiagonal matrix Calculation of the determinant of a tridiagonal matrix is done by the procedure detgtr: procedure detgtr(n: ArbInt; var l, d, u, f: ArbFloat; var k, term:ArbInt); • n denotes the number of columns and rows of the matrix (it must be square). • l specifies the first element in the subdiagonal of the matrix. This 1D array must be dimensioned to at least n-1 elements. • d specifies the first element along the main diagonal of the matrix. This 1D array must be dimensioned to contain at least n elements. • u specifies the first element along the superdiagonal of the matrix. The array must be dimensioned to have at least n-1 elements. • f and k return the determinant of the matrix. The determinant is given by f * 8k. Usually k = 0, and the determinant simply is equal to f. Example Calculate the determinant of the matrix $A= \left( \begin{array}{rrrr} 1 & 1 & & \\ 2 & 1 & 1 & \\ & 1 & 1 & 0 \\ & & 1 & 2 \end{array} \right)$ program determinant_tridiagonal_matrix; {mode objfpc}{\$H+} uses math, typ, det; const n = 4; const u: array[0..n-2] of ArbFloat = (-1, -1, -1 ); // superdiagonal d: array[0..n-1] of ArbFloat = ( 2, 2, 2, 2); // main diagonal l: array[1..n-1] of ArbFloat = ( -1, -1, -1); // subdiagonal var f: ArbFloat; k: Integer; term: Integer = 0; i, j: Integer; begin // write input matrix WriteLn('A = '); for i := 0 to n-1 do begin for j := 0 to i-2 do Write(0.0:5:0); if i > 0 then Write(l[i]:5:0); Write(d[i]:5:0); if i < n-1 then Write(u[i]:5:0); for j:=i+2 to n-1 do Write(0.0:5:0); WriteLn; end; WriteLn; // Calculate determinant detgtr(n, l[1], d[0], u[0], f, k, term); if term = 1 then WriteLn('Determinant of A = ', f * intpower(8, k):0:9, ' (k = ', k, ')') else WriteLn('Incorrect input'); end. ## Inverse of a matrix (unit inv) Suppose a square matrix A. Then the matrix A-1 is the inverse of A if the product A-1 A is the identity matrix I (all elements zero, except for the diagonal elements which are 1). The inverse matrix exists if the determinant of A is not zero. $A^{-1} A = I = \begin{bmatrix} 1 & & 0 \\ & \ddots & \\ 0 & & 1 \end{bmatrix}$ NumLib provides various routines for calculation of the inverse matrix. Which algorithm is used depends on the properties of the matrix A. All routines discussed here have in common that the matrix is stored in the standard NumLib way, i.e. as a 2D array of real numbers with n rows and m columns, or as a 1D array with n m elements. No special requirements are made for the matrix passed to invgen, except that it is square. The calculation in this routine is based on LU decomposition with partial pivoting. If the matrix is symmetric, it can be processed by invgsy which uses a reduction to tridiagonal form internally. A symmetric positive definite matrix can be passed to invgpd where the inverse is calculated by Cholesky decomposition. procedure invgen(n, rwidth: ArbInt; var ai: ArbFloat; var term: ArbInt); // --> generic matrix procedure invgsy(n, rwidth: ArbInt; var ai: ArbFloat; var term: ArbInt); // --> symmetric matrix procedure invgpd(n, rwidth: ArbInt; var ai: ArbFloat; var term: ArbInt); // --> symmetric positive definite matrix • n indicates the size of the matrix. • rwidth is length of the rows of the two-dimensional array which holds the matrix. Normally n = rwidth, but the matrix could have been declared larger than actually needed; in this case rwidth refers to the declared size of the data array. • ai is the first (top-left) element of the matrix in the data array. After the calculation the input data are overwritten by the elements of the inverse matrix in case of successful completion (term = 1); in other cases, the matrix elements are undefined. • term provides an error code: • 1 - successful completion, the elements of the inverse matrix can be found at the same place as the input matrix. • 2 - the inverse could not be calculated because the input matrix is (almost) singular. • 3 - incorrect input data, n < 1. Example Calculate the inverse of the symmetric matrix $A = \left[ \begin{array}{rrrr} 5 & 7 & 6 & 5 \\ 7 & 10 & 8 & 7 \\ 6 & 8 & 10 & 9 \\ 5 & 7 & 9 & 10 \end{array} \right]$ This matrix is symmetric and positive definite (the product bT A b with any vector b = [b1, b2, b3]T cannot become zero or negative since all elements of this matrix are positive). Therefore, invgpd is best-suited for this task although the other routines can be used as well (uncomment their calls below). program inverse_matrix; uses typ, inv, omv; const n = 4; D = 5; var // a is the input matrix to be inverted // Note that this is matrix must be symmetric positive definite. a: array[1..n, 1..n] of ArbFloat = ( (5, 7, 6, 5), (7, 10, 8, 7), (6, 8, 10, 9), (5, 7, 9, 10) ); b: array[1..n, 1..n] of Arbfloat; c: array[1..n, 1..n] of ArbFloat; term: Integer = 0; i, j: Integer; begin // write input matrix WriteLn('a = '); for i := 1 to n do begin for j := 1 to n do Write(a[i, j]:10:D); WriteLn; end; WriteLn; // Store input matrix because it will be overwritten by the inverse of a for i := 1 to n do for j := 1 to n do b[i, j] := a[i, j]; // Calculate inverse -- uncomment the procedure to be used. //invgen(n, n, a[1, 1], term); //invgsy(n, n, a[1, 1], term); invgpd(n, n, a[1, 1], term); // write inverse WriteLn('a^(-1) = '); for i := 1 to n do begin for j := 1 to n do Write(a[i, j]:10:D); WriteLn; end; WriteLn; // Check validity of result by multiplying inverse with saved input matrix omvmmm(a[1, 1], n, n, n, b[1, 1], n, n, c[1, 1], n); // write inverse WriteLn('a^(-1) x a = '); for i := 1 to n do begin for j := 1 to n do Write(c[i, j]:10:D); WriteLn; end; end. ## Solving systems of linear equations (unit sle) A system of linear equations (or linear system) is a collection of two or more linear equations involving the same set of variables, x1 ... xn. $\begin{cases} a_{11} x_1 + a_{12} x_2 + \dots + a_{1n} x_n = b_1 \\ a_{21} x_1 + a_{22} x_2 + \dots + a_{2n} x_n = b_n \\ \ \ \ \vdots \\ a_{m1} x_1 + a_{m2} x_2 + \dots + a_{mn} x_n = b_m \end{cases}$ In order to find a solution which satisfies all equations simultaneously the system of equations is usually converted to a matrix equation A x = b, where $A = \left [ \begin{array}{ccc} a_{11} & a_{12} & \dots & a_{1n} \\ a_{21} & a_{22} & \dots & a_{2n} \\ \vdots & \vdots & \ddots & \vdots \\ a_{m1} & a_{m2} & \dots & a_{mn} \end{array} \right ], \ \mathbf{x} = \left [ \begin{array}{c} x_1 \\ x_2 \\ \vdots \\ x_n \end{array} \right ], \ \mathbf{b} = \left [ \begin{array}{c} b_1 \\ b_2 \\ \vdots \\ b_m \end{array} \right ]$ NumLib offers several procedures to solve the matrix equation depending on the properties of the matrix. ### Square matrices with standard storage Here we describe several routines in which the matrix of the equation system is square, i.e. there are as many equations as unknowns. This matrix is assumed to be passed to the procedures in the standard NumLib way as the first element of a 2D or 1D array. The 2D array must be dimensioned to contain at least n rows and n columns, the 1D array must contain at least n2 elements. The most general procedure is slegen and applied to any square matrix A. The system is solved using the Gauss elimination procedure with partial pivoting. If the matrix A is symmetric then the reduction to tridiagonal form generally is more stable. This is done in routine slegsy. If A, furthermore, is a symmetric positive definite matrix, then the Cholesky method is best-suited. This is applied in routine slegpd. procedure slegen(n, rwidth: ArbInt; var a, b, x, ca: ArbFloat; var term: ArbInt); // generic matrix procedure slegsy(n, rwidth: ArbInt; var a, b, x, ca: ArbFloat; var term: ArbInt); // symmetric matrix procedure slegpd(n, rwidth: ArbInt; var a, b, x, ca: ArbFloat; var term: ArbInt); // symmetric positive definite matrix • n is the number of unknown variables. It must be the same as the number of columns and rows of the coefficent matrix. • rwidth identifies the allocated number of columns of the coefficient matrix. This is useful if the matrix is allocated larger than needed. It is required that n <= rwidth. • a is the first (i.e. top left) element of the coefficient matrix A; the other elements must follow within the same allocated memory block. The matrix will not be changed during the calculation. • b is the first element of the array containing the constant vector b. The array length at least must be equal to n. The vector will not be changed during the calculation. • x is the first element of the array to receive the solution vector x. It must be allocated to contain at least n values. • ca is a parameter to describe the accuracy of the solution. • term returns an error code: • 1 - successful completion, the solution vector x is valid • 2 - the solution could not have been determined because the matrix is (almost) singular. • 3 - error in input values: n < 1. Example Solve this system of linear equations: $\begin{cases} 5 x_1 + 7 x_2 + 6 x_3 + 5 x_4 = 57 \\ 7 x_1 + 10 x_2 + 8 x_3 + 7 x_4 = 79 \\ 6 x_1 + 8 x_2 + 10 x_3 + 9 x_4 = 88 \\ 5 x_1 + 7 x_2 + 9 x_3 + 10 x_4 = 86 \end{cases} \qquad \Rightarrow \qquad A= \left[ \begin{array}{rrrr} 5 & 7 & 6 & 5 \\ 7 & 10 & 8 & 7 \\ 6 & 8 & 10 & 9 \\ 5 & 7 & 9 & 10 \end{array} \right] , \; \mathbf{b} = \left[ \begin{array}{r} 57 \\ 79 \\ 88 \\ 86 \end{array} \right]$ This matrix is symmetric positive definite. Therefore, all routines presented here can be applied. Uncomment the requested line in the code below. As a test the result vector x is multiplied to matrix A, and the result must equal the constant vector b. program solve_sys_lin_eq; uses typ, sle, omv; const n = 4; A: array[1..n, 1..n] of ArbFloat = ( ( 5, 7, 6, 5), ( 7, 10, 8, 7), ( 6, 8, 10, 9), ( 5, 7, 9, 10) ); b: array[1..n] of ArbFloat = ( 57, 79, 88, 86 ); var x: array[1..n] of ArbFloat; b_test: array[1..n] of ArbFloat; ca: ArbFloat; i, j: Integer; term: Integer; begin WriteLn('Solve matrix system A x = b'); WriteLn; // Print A WriteLn('Matrix A = '); for i:= 1 to n do begin for j := 1 to n do Write(A[i, j]:10:0); WriteLn; end; WriteLn; // Print b WriteLn('Vector b = '); for i:= 1 to n do Write(b[i]:10:0); WriteLn; WriteLn; // Solve - select one of these methods slegen(n, n, A[1, 1], b[1], x[1], ca, term); // slegsy(n, n, A[1, 1], b[1], x[1], ca, term); // slegpd(n, n, A[1, 1], b[1], x[1], ca, term); if term = 1 then begin WriteLn('Solution vector x = '); for i:= 1 to n do Write(x[i]:10:0); WriteLn; WriteLn; omvmmv(A[1,1], n, n, n, x[1], b_test[1]); WriteLn('Check result: A x = (must be equal to b)'); for i:= 1 to n do Write(b_test[i]:10:0); WriteLn; end else WriteLn('Error'); end. ### Band matrix A special solution, slegba, is implemented for a band matrix, i.e. a matrix in which all elements are zero outside a band of width l below and of width r above the main diagonal. procedure slegba(n, l, r: ArbInt; var a, b, x, ca: ArbFloat; var term:ArbInt); • n denotes the number of columns and rows of the matrix (it must be square). • l identifies the left bandwidth, i.e. the number of diagonals the band extends below (or to the left of) the main diagonal. • r identifies the right bandwidth, i.e. the number of diagonals the band extends abofe (or to the right of) the main diagonsl. • a specifies the first element of a 1D array which contains the elements of the diagonal band, see this. This array contains only the band elements and is obtained by running across the rows of the band matrix from left to right and top to bottom, starting at element A11. It must be dimensioned to contain at least n*(l+1+r) - (r*(r+1)+l*(l+1)) div 2 elements. Note that a 2D array cannot be used for this routine. • b is the first element of the array containing the constant vector b. The array length at least must be equal to n. The vector will not be changed during the calculation. • x is the first element of the array to receive the solution vector x. It must be allocated to contain at least n values. • ca is a parameter to describe the accuracy of the solution. • term returns an error code: • 1 - successful completion, the solution vector x is valid • 2 - the solution could not have been determined because the matrix is (almost) singular. • 3 - error in input values: n < 1, l < 0, l >= n, r < 0, or r >= n Example Solve this system of linear equations: $\begin{array}{ccccccc} 5 x_1 & - & 4 x_2 & + & x_3 & & & & & & & & & = 0 \\ -4 x_1 & + & 6 x_2 & - & 4 x_3 & + & x_4 & & & & & & & = 0 \\ x_1 & - & 4 x_2 & + & 6 x_3 & - & 4 x_4 & & & & & & & = 0 \\ & & x_2 & - & 4 x_3 & + & 6 x_4 & - & 4 x_5 & & & & & = 1 \\ & & & & x_3 & - & 4 x_4 & + & 6 x_5 & - & 4 x_6 & + & x_7 & = 0 \\ & & & & & & x_4 & - & 4 x_5 & + & 6 x_6 & - & 4 x_7 & = 0 \\ & & & & & & & & x_5 & - & 4 x_6 & + & 5 x_7 & = 0 \\ \end{array} \qquad \Rightarrow \qquad A= \left[ \begin{array}{rrrr} 5 & -4 & 1 & 0 & 0 & 0 & 0 \\ -4 & 6 & -4 & 1 & 0 & 0 & 0 \\ 1 & -4 & 6 & -4 & 1 & 0 & 0 \\ 0 & 1 & -4 & 6 & -4 & 1 & 0 \\ 0 & 0 & 1 & -4 & 6 & -4 & 1 \\ 0 & 0 & 0 & 1 & -4 & 6 & -4 \\ 0 & 0 & 0 & 0 & 1 & -4 & 5 \end{array} \right] , \; \mathbf{b} = \left[ \begin{array}{r} 0 \\ 0 \\ 0 \\ 1 \\ 0 \\ 0 \\ 0 \end{array} \right]$ program solve_band; uses typ, sle, omv; const n = 7; L = 2; R = 2; nelements = n * (L + 1 + R) - (L * (L + 1) + R * (R + 1)) div 2; // Band elements arranged in rows, elements outside of the band omitted! a: array[1..nelements] of Arbfloat = ( 5, -4, 1, -4, 6, -4, 1, 1, -4, 6, -4, 1, 1, -4, 6, -4, 1, 1, -4, 6, -4, 1, 1, -4, 6, -4, 1, -4, 5 ); b: array[1..n] of ArbFloat = ( 0, 0, 0, 1, 0, 0, 0 ); var x: array[1..n] of ArbFloat; a_test: array[1..n, 1..n] of ArbFloat; b_test: array[1..n] of ArbFloat; ca: ArbFloat; i, j, k: Integer; term: Integer; begin WriteLn('Solve matrix system A x = b where A is a band matrix'); WriteLn; // Write diagonal elements WriteLn('Matrix A:'); WriteLn(' n = ', n); Writeln(' Left band width L = ', L); WriteLn(' Right band width R = ', R); WriteLn(' Diagonal elements of A = '); for k := 1 to nelements do Write(a[k]:5:0); WriteLn; WriteLn; // Solve slegba(n, l, r, A[1], b[1], x[1], ca, term); if term = 1 then begin // To test the result we multiply A with the solution vector x and check // whether the result is equal to b. // Since mutliplication of a matrix stored like a band matrix is quite // cumbersome we copy the band matrix into a standard matrix. FillChar(a_test, SizeOf(a_test), 0); k := 1; for i:=1 to L do for j := i-L to i+R do if (j >= 1) and (j <= n) then begin a_test[i,j] := A[k]; inc(k); end; for i:= L+1 to n-R do for j := i-L to i+R do begin a_test[i,j] := A[k]; inc(k); end; for i := n-R+1 to n do for j := i-L to i+R do if j <= n then begin a_test[i,j] := A[k]; inc(k); end; // Print A WriteLn('Matrix A ='); for i:=1 to n do begin for j:=1 to n do Write(a_test[i,j]:5:0); WriteLn; end; WriteLn; // Print b WriteLn('Vector b = '); for i:= 1 to n do Write(b[i]:10:0); WriteLn; WriteLn; // Print solution WriteLn('Solution vector x = '); for i:= 1 to n do Write(x[i]:10:3); WriteLn; WriteLn; omvmmv(a_test[1,1], n, n, n, x[1], b_test[1]); WriteLn('Check result: A x = (must be equal to b)'); for i:= 1 to n do Write(b_test[i]:10:0); WriteLn; end else WriteLn('Error'); end. ### Symmetric positive definite band matrix The optimized solution method for a symmetric positive band matrix is called slegpb. procedure slegpb(n, w: ArbInt; var a, b, x, ca: ArbFloat; var term: ArbInt); • n denotes the number of columns and rows of the matrix (it must be square). • w identifies the (one-sided) bandwidth, i.e. the number of diagonals the band extends below (or to the left of) the main diagonal. This is the same value as the number of diagonals the band extends above (or to the right of) the main diagonsl. • a specifies the first element of a 1D array which contains the elements of the diagonal band, see this. This array contains only the band elements and is obtained by running across the rows of the band matrix from left to right and top to bottom, starting at element A11, but stopping at the main diagonal. This means that the array contains only the left band and the main diagonal elements. It must be dimensioned to contain at least n*(w+1) - (w*(w+1)) div 2 elements. Note that a 2D array cannot be used for this routine. • b is the first element of the array containing the constant vector b. The array length at least must be equal to n. The vector will not be changed during the calculation. • x is the first element of the array to receive the solution vector x. It must be allocated to contain at least n values. If term is not 1 then the solution array contains undefined data. • ca is a parameter to describe the accuracy of the solution. • term returns an error code: • 1 - successful completion, the solution vector x is valid • 2 - the solution could not have been determined because the matrix is (almost) singular. • 3 - error in input values: n<1, w<0, or w>=n Example The matrix of the band matrix example is symmetrical positive definite. Therefore, procedure slegpb can be applied as well: program solve_spd; // "spd" = symmetric positive definite uses typ, sle, omv; const n = 7; w = 2; nelements = n * (w + 1) - (w * (w + 1)) div 2; // Band elements arranged in rows, elements outside of the band as well as right diagonals omitted! a: array[1..nelements] of Arbfloat = ( 5, -4, 6, 1, -4, 6, 1, -4, 6, 1, -4, 6, 1, -4, 6, 1, -4, 5 ); b: array[1..n] of ArbFloat = ( 0, 0, 0, 1, 0, 0, 0 ); var x: array[1..n] of ArbFloat; a_test: array[1..n, 1..n] of ArbFloat; b_test: array[1..n] of ArbFloat; ca: ArbFloat; i, j, k: Integer; term: Integer; begin WriteLn('Solve matrix system A x = b where A is a symmetric positive definite band matrix'); WriteLn; // Write diagonal elements WriteLn('Matrix A:'); WriteLn(' n = ', n); Writeln(' (One-sided) band width w = ', w); WriteLn(' Diagonal elements of A = '); for k := 1 to nelements do Write(a[k]:5:0); WriteLn; WriteLn; // Solve slegpb(n, w, A[1], b[1], x[1], ca, term); if term = 1 then begin // To test the result we multiply A with the solution vector x and check // whether the result is equal to b. // Since mutliplication of a matrix stored like a band matrix is quite // cumbersome we copy the band matrix into a standard matrix. FillChar(a_test, SizeOf(a_test), 0); i := 1; k := 1; while (k <= nelements) and (i <= n) do begin for j := i - w to i do if (j >= 1) and (j <= n) then begin a_test[i, j] := a[k]; a_test[j, i] := a[k]; inc(k); end; inc(i); end; // Print A WriteLn('Matrix A ='); for i:=1 to n do begin for j:=1 to n do Write(a_test[i,j]:5:0); WriteLn; end; WriteLn; // Print b WriteLn('Vector b = '); for i:= 1 to n do Write(b[i]:10:0); WriteLn; WriteLn; // Print solution WriteLn('Solution vector x = '); for i:= 1 to n do Write(x[i]:10:3); WriteLn; WriteLn; omvmmv(a_test[1,1], n, n, n, x[1], b_test[1]); WriteLn('Check result: A x = (must be equal to b)'); for i:= 1 to n do Write(b_test[i]:10:3); WriteLn; end else WriteLn('Error'); end. ### Tridiagonal matrix NumLib offers two specialized procedures for solving a system of linear equations based on a tridiagonal matrix A. Both rely on the memory-optimized storage of tridiagonal matrices as described here. They differ in the internal calculation algorithm and in the behavior with critical matrices. procedure sledtr(n: ArbInt; var l, d, u, b, x: ArbFloat; var term: ArbInt); procedure slegtr(n: ArbInt; var l, d, u, b, x, ca: ArbFloat; var term: ArbInt); • n is the number of unknown variables. It must be the same as the number of columns and rows of the coefficent matrix. • l specifies the first element in the subdiagonal of the matrix A. This 1D array must be dimensioned to at least n-1 elements. • d specifies the first element along the main diagonal of the matrix A. This 1D array must be dimensioned to contain at least n elements. • u specifies the first element along the superdiagonal of the matrix A. The array must be dimensioned to have at least n-1 elements. • b is the first element of the array containing the constant vector b. The array length at least must be equal to n. The vector will not be changed during the calculation. • x is the first element of the array to receive the solution vector x. It must be allocated to contain at least n values. • ca is a parameter to describe the accuracy of the solution. • term returns an error code: • 1 - successful completion, the solution vector x is valid • 2 - the solution could not have been determined because the matrix is (almost) singular. • 3 - error in input values: n < 1. sledtr is numerically stable if matrix A fulfills one of these conditions: • A is regular (i.e. its inverse matrix exists), and A is columnar-diagonally dominant; this means: • |d1| ≥ |l2|, • |di| ≥ |ui-1| + |li+1|, i = 2, ..., n-1, • |dn| ≥ |un-1| • A is regular, and A is diagonally dominant; this means: • |d1| ≥ |l2|, • |di| ≥ |ui| + |li|, i = 2, ..., n-1, • |dn| ≥ |un| • A is symmetric and positive-definite. However, this procedure does not provide the parameter ca from which the accuracy of the determined solution can be evaluated. If this is needed the (less stable) procedure slegtr must be used. Example Solve this tridiagonal system of linear equations for n = 8: $\begin{cases} 188 x_1 - 100 x_2 = 0 \\ -100 x_1 + 188 x_2 -100 x_3 = 0 \\ \vdots \\ -100 x_{n-2} + 188 x_{n-1} - 100 x_n = 0 \\ -100 x_{n-1} + 188 x_n = 0 \end{cases} \qquad \Rightarrow \qquad A= \left[ \begin{array}{rrrrr} 188 & -100 & & & 0 \\ -100 & 188 & -100 & & \\ & \ddots & \ddots & \ddots & \\ & & -100 & 188 & -100 \\ & & & -100 & 188 \\ \end{array} \right] , \; \mathbf{b} = \left[ \begin{array}{r} 88 \\ -12 \\ \vdots \\ -12 \\ 88 \end{array} \right]$ program solve_tridiag; uses typ, sle; const n = 8; u: array[1..n-1] of ArbFloat = (-100, -100, -100, -100, -100, -100, -100 ); d: array[1..n] of ArbFloat = ( 188, 188, 188, 188, 188, 188, 188, 188); l: array[2..n] of ArbFloat = ( -100, -100, -100, -100, -100, -100, -100); b: array[1..n] of ArbFloat = ( 88, -12, -12, -12, -12, -12, -12, 88); var A: array[1..n, 1..n] of ArbFloat; x: array[1..n] of ArbFloat; b_test: array[1..n] of ArbFloat; ca: ArbFloat; i, j: Integer; term: Integer; begin WriteLn('Solve tridiagonal matrix system A x = b'); WriteLn; Write('Superdiagonal of A:':25); for i := 1 to n-1 do Write(u[i]:10:0); WriteLn; Write('Main diagonal of A:':25); for i:= 1 to n do Write(d[i]:10:0); WriteLn; Write('Subdiagonal of A:':25); Write('':10); for i:=2 to n do Write(l[i]:10:0); WriteLn; Write('Vector b:':25); for i:=1 to n do Write(b[i]:10:0); WriteLn; // Solve slegtr(n, l[2], d[1], u[1], b[1], x[1], ca, term); { or: sledtr(n, l[2], d[1], u[1], b[1], x[1], term); } if term = 1 then begin Write('Solution vector x:':25); for i:= 1 to n do Write(x[i]:10:0); WriteLn; // Multiply A with x to test the result // NumLib does not have a routine to multiply a tridiagonal matrix with a // vector... Let's do it manually. b_test[1] := d[1]*x[1] + u[1]*x[2]; for i := 2 to n-1 do b_test[i] := l[i]*x[i-1] + d[i]*x[i] + u[i]*x[i+1]; b_test[n] := l[n]*x[n-1] + d[n]*x[n]; Write('Check b = A x:':25); for i:= 1 to n do Write(b_test[i]:10:0); WriteLn; end else WriteLn('Error'); end. ### Overdetermined systems (least squares) Unlike the other routines in unit sle which require a square matrix A, slegls can solve linear systems described by a rectangular matrix which has more rows than colums, or speaking in terms of equations, has more equations than unknowns. Such a system generally is not solvable exactly. But an approximate solution can be found such that the sum of squared residuals of each equation, i.e. the norm $\|\mathbf{b} - A \mathbf{x}\|_2$ is as small as possible. The most prominent application of this technique is fitting of equations to data (regression analysis). procedure slegls(var a: ArbFloat; m, n, rwidtha: ArbInt; var b, x: ArbFloat; var term: ArbInt); • a is the first (i.e. top left) element of an array with the coefficient matrix A; the other elements must follow within the same allocated memory block. The array will not be changed during the calculation. • m is the number of rows of the matrix A (or: the number of equations). • n is the number of columns of the matrix A (or: the number of unknown variables). n must not be larger than m. • rwidth identifies the allocated number of columns of the coefficient matrix A. This is useful if the matrix is allocated larger than needed. It is required that n <= rwidth. • b is the first element of the array containing the constant vector b. The array length must correspond to the number of matrix rows m, but the array can be allocated to be larger. • x is the first element of the array to receive the solution vector x. The array length must correspond to the number of matrix columns n, but the array can be allocated to be larger. • term returns an error code: • 1 - successful completion, the solution vector x is valid • 2 - there is no unambiguous solution because the columns of the matrix are linearly dependant.. • 3 - error in input values: n < 1, or n > m. The method is based on reduction of the array A to upper triangle shape through Householder transformations. Example Find the least-squares solution for the system A x = b of 4 equations and 3 unknowns with $A= \left( \begin{array}{rrr} 1 & 0 & 1 \\ 1 & 1 & 1 \\ 0 & 1 & 0 \\ 1 & 1 & 0 \end{array} \right), \ \ b= \left( \begin{array}{r} 21 \\ 39 \\ 21 \\ 30 \end{array} \right).$ program solve_leastsquares; uses typ, sle, omv; const m = 4; n = 3; A: array[1..m, 1..n] of ArbFloat = ( (1, 0, 1), (1, 1, 1), (0, 1, 0), (1, 1, 0) ); b: array[1..m] of ArbFloat = ( 21, 39, 21, 30); var x: array[1..n] of ArbFloat; term: ArbInt; i, j: Integer; b_test: array[1..m] of ArbFloat; sum: ArbFloat; begin WriteLn('Solve A x = b with the least-squares method'); WriteLn; // Display input data WriteLn('A = '); for i := 1 to m do begin for j := 1 to n do Write(A[i, j]:10:0); WriteLn; end; WriteLn; WriteLn('b = '); for i := 1 to m do Write(b[i]:10:0); WriteLn; // Calculate and show solution slegls(a[1,1], m, n, n, b[1], x[1], term); WriteLn; WriteLn('Solution x = '); for j:= 1 to n do Write(x[j]:10:0); WriteLn; // Calculate and display residuals WriteLn; WriteLn('Residuals A x - b = '); sum := 0; omvmmv(a[1,1], m, n, n, x[1], b_test[1]); for i:=1 to m do begin Write((b_test[i] - b[i]):10:0); sum := sum + sqr(b_test[i] - b[i]); end; WriteLn; // Sum of squared residuals WriteLn; WriteLn('Sum of squared residuals'); WriteLn(sum:10:0); WriteLn; WriteLn('----------------------------------------------------------------------------'); WriteLn; // Modify solution to show that the sum of squared residuals increases'; WriteLn('Modified solution x'' (to show that it has a larger sum of squared residuals)'); x[1] := x[1] + 1; x[2] := x[2] - 1; WriteLn; for j:=1 to n do Write(x[j]:10:0); omvmmv(a[1,1], m, n, n, x[1], b_test[1]); sum := 0; for i:=1 to m do sum := sum + sqr(b_test[i] - b[i]); WriteLn; WriteLn; WriteLn('Sum of squared residuals'); WriteLn(sum:10:0); end. ## Eigenvalues and eigenvectors (unit eig) A vector is an eigenvector if it does not change its direction after a linear transformation has been applied to it. In matrix terms: if a non-zero vector x of dimension n is multiplied to a square nxn matrix A and the product is the same vector multiplied by a scalar λ then x is an eigenvector, and λ is called an eigenvalue: $A \mathbf{x} = \lambda \mathbf{x} \qquad \Rightarrow \qquad A \mathbf{x} - \lambda \mathbf{x} = 0$ NumLib offers a variety of routines for calculation of eigenvectors and eigenvalues. They are optimized for the matrix type. Every matrix type will be supported by two or four procedures of various degree of complexity; they are identified by appended numbers 1 and 2, or 1 to 4: • The procedures with appended 1 calculate all eigenvalues. • The procedures with the appended 2 do the same but only for some eigenvalues which have an index in a specified range (λk1...λk2 out of λ1...λn). • The procedures with the appended 3 calculate all eigenvalues and all eigenvectors. • The procedures with the appended 4 do the same, but again return only some eigenvalues and eigenvectors having an index in the specified interval. ### Matrices with general storage The routines discussed here assume that the n x n matrix for which the eigenvalues are to be calculated is stored in the conventional way as a 2D (or 1D) array of ArbFloat values. The NumLib method for determining the eigenvalues and eigenvectors of a generic matrix are called eigge1 and eigge3 ("ge" = "generic"). Optimized calculation schemes exists for generic symmetric matrices and symmetric positive definite matrices; the corresponding routines are called eiggs1, eiggs2, eiggs3, and eiggs4 for generic symmetric matrices ("gs" = "generic symmetric")., and eiggg1, eiggg2, eiggg3, eiggg4 for symmetric positive definite matrices ("gg" = ??) // Generic matrix (without any special symmetries) procedure eigge1(var a: ArbFloat; n, rwidth: ArbInt; var lam: complex; var term: ArbInt); // all eigenvalues procedure eigge3(var a: ArbFloat; n, rwidtha: ArbInt; var lam, x: complex; rwidthx: ArbInt; var term: ArbInt); // all eigenvalues and eigenvectors // Generic symmetric matrix procedure eiggs1(var a: ArbFloat; n, rwidth: ArbInt; var lam: ArbFloat; var term: ArbInt); // all eigenvalues procedure eiggs2(var a: ArbFloat; n, rwidth, k1, k2: ArbInt; var lam: ArbFloat; var term: ArbInt); // some eigenvalues (index k1..k2) procedure eiggs3(var a: ArbFloat; n, rwidtha: ArbInt; var lam, x: ArbFloat; var term: ArbInt); // all eigenvalues and eigenvectors procedure eiggs4(var a: ArbFloat; n, rwidtha, k1, k2: ArbInt; var lam, x: ArbFloat; var term: ArbInt); // some eigenvalues and eigenvectors (index k1..k2) // Symmetric positive definite matrix procedure eiggg1(var a: ArbFloat; n, rwidth: ArbInt; var lam: ArbFloat; var term: ArbInt); // all eigenvalues procedure eiggg2(var a: ArbFloat; n, rwidth, k1, k2: ArbInt; var lam: ArbFloat; var term: ArbInt); // some eigenvalues (index k1..k2) procedure eiggg3(var a: ArbFloat; n, rwidtha: ArbInt; var lam, x: ArbFloat; var term: ArbInt); // all eigenvalues and eigenvectors procedure eiggg4(var a: ArbFloat; n, rwidtha, k1, k2: ArbInt; var lam, x: ArbFloat; var term: ArbInt); // some eigenvalues and eigenvectors (index k1..k2) • a is the first element of an array containing the matrix A for which the eigenvalue/eigenvector has to be calculated. The array must be dimensioned to provide space for at least n2 floating point values. • n specifies the size of the matrix A, i.e. the number of rows or columns. Note that the input matrix must be square, i.e. the number of rows and columns is equal. • rwidth is the allocated row length of the array a. It can be larger than n if the array is allocated larger than necessary, but normally rwidth = n. • lam is the first element of an array receiving the calculated eigenvalues. In case of a generic matrix (eigge1, eigge2) the eigenvalues can be complex; therefore, the array must be dimensioned for values of type complex as declared in unit typ. In the other cases (eiggs1..4 or eiggg1..4) the eigenvalues are real, and the array must be dimensioned for datatype ArbFloat. Since a nxn matrix has n eigenvalues the array must be allocated for at least n values, in case of the procedures with appended 2 or 4 only k2-k1+1 values are sufficient (see below). • term returns an error code: • 1 -- successful calculation • 2 -- calculation failed • 3 -- error in input data: n<1, k1<1, k1>k2, or k2>n. Additionally, in case of procedure eigge3, eigge4 , eiggg3 or eiggg4: • x is the first element of a matrix to receive the calculated eigenvectors. Again, the eigenvectors of a generic matrix can have complex components. Therefore, the matrix must be declared for the datatype complex, and it must be large enough to hold at least n2 values, in case of eigge4 or eiggg4 n * (k2-k1+1). If the matrix is symmetric or positive definite, the eigenvectors are real, and the array must be declared for datatype ArbFloat. In any case, the eigenvectors are normalized to unit length and arranged in the columns of this matrix. • rwidthx denotes the allocated row length of the matrix x. Thus it is possible to dimension the result matrix larger than actually needed. Additionally, in case of procedures eiggs2, eiggs4, eiggg2 and eiggg4: • k1 and k2 define the interval of indexes k for which the eigenvalues (λk) and eigenvalues (ck) are to be calculated. They are integers and must be ordered such that 1<=k1<=k2<=n. Example Calculate the eigenvalues and eigenvectors of the matrix $A= \begin{bmatrix} 8 & -1 & -5 \\ -4 & 4 & -2 \\ 18 & -5 & -7 \end{bmatrix}$ program eig_general_matrix; uses SysUtils, math, typ, eig; const n = 3; D = 3; var // a is the input matrix a: array[1..n, 1..n] of ArbFloat = ( ( 8, -1, -5), (-4, 4, -2), (18, -5, -7) ); lambda: array[1..n] of complex; x: array[1..n, 1..n] of complex; term: Integer = 0; i, j: Integer; function ComplexToStr(z: complex; Decimals: Integer): String; var sgn: array[boolean] of string = ('+', '-'); begin Result := Format('%.*f %s %.*fi', [Decimals, z.Re, sgn[z.Im < 0], Decimals, abs(z.Im)]); end; begin // write input matrix WriteLn('a = '); for i := 1 to n do begin for j := 1 to n do Write(a[i, j]:10:D); WriteLn; end; WriteLn; // Calculate eigenvalues/vectors eigge3(a[1,1], n, n, lambda[1], x[1,1], n, term); // write eigenvalues WriteLn('Eigenvalues: lambda = '); for i := 1 to n do Write(ComplexToStr(lambda[i], D):25); WriteLn; WriteLn; // Write eigenvectors WriteLn('Eigenvectors (as columns): x = '); for i := 1 to n do begin for j := 1 to n do Write(ComplexToStr(x[i, j], D):25); WriteLn; end; end. ### Symmetric band matrices NumLib provides four routines to calculate eigenvalues and eigenvectors of symmetric band matrices: eigbs1...eigbs4 ("bs" = band and symmetric): // All eigenvalues procedure eigbs1(var a: ArbFloat; n, w: ArbInt; var lam: ArbFloat; var term: ArbInt); // Some eigenvalues (index k1..k2) procedure eigbs2(var a: ArbFloat; n, w, k1, k2: ArbInt; var lam: ArbFloat; var term: ArbInt); // All eigenvalues and all eigenvectors procedure eigbs3(var a: ArbFloat; n, w: ArbInt; var lam, x: ArbFloat; rwidthx: ArbInt; var term: ArbInt); // Some eigenvalues, some eigenvectors (index k1..k2) procedure eigbs4(var a: ArbFloat; n, w, k1, k2: ArbInt; var lam, x: ArbFloat; rwidthx: ArbInt; var m2, term: ArbInt); • a specifies the first element of a 1D array which contains the diagonal elements of the left band and the main diagonal. It is obtained by running across the rows of the band matrix from left to right and top to bottom, but stopping at the main diagonal - the right band is ignored since it is equal to the left band. The array must be dimensioned to contain at least n*(w+1) - (w*(w+1)) div 2 elements. • n denotes the number of columns and rows of the matrix (it must be square). • w identifies the bandwidth, i.e. how many diagonals the band extends to the left or to the right of the main diagonal. Left and right bandwidth must be equal because the matrix is symmetric. • lam is the first element of a real-valued array receiving the calculated eigenvalues. The eigenvalues of a symmetric matric are real values. Since an n x n matrix has n eigenvalues the array must be allocated for at least n ArbFloat values. • x, in case of routines eigbs3 and eigbs4, is the first element of a matrix to receive the calculated eigenvectors. The matrix must be declared for the datatype Arbfloat, and it must be large enough to hold at least n x n values. The eigenvectors are normalized to unit length and are arranged in the columns of this matrix. • rwidthx, in case of routines eigbs3 and eigbs4, denotes the allocated row length of the matrix x. Thus it is possible to dimension the result matrix larger than actually needed. • k1 and k2, in case of procedures eigbs2 and eigbs4, define the interval of indexes k for which the eigenvalues λk and eigenvalues xk are to be calculated. They are integers and must be ordered such that 1<=k1<=k2<=n. • m2, in case of routine eigbs4, indicates the index of the largest eigenvalue for which an eigenvector has been calculated. • term returns an error code: • 1 -- successful calculation • 2 -- calculation failed • 3 -- error in input parameters: n<1, w<0, w>=n, k1<1, k1>k2, or k2>n. If the bandwidth w > n/3 then it is better to calculate all eigenvalues and eigenvectors even if not all of them are needed. Example Calculate the eigenvalues and eigenvectors of the symmetric 7 x 7 matrix $A= \begin{bmatrix} 5 & -4 & 1 & & & & 0 \\ -4 & 6 & -4 & 1 & & & \\ 1 & -4 & 6 & -4 & 1 & & \\ & 1 & -4 & 6 & -4 & 1 & \\ & & 1 & -4 & 6 & -4 & 1 \\ & & & 1 & -4 & 6 & -4 \\ 0 & & & & 1 & -4 & 5 \end{bmatrix}$ The eigenvalues are $\lambda_k = 16\sin^{4}\frac{k\pi}{16}, \qquad k=1,2,\ldots,7$ program eig_symmband_matrix; uses SysUtils, math, typ, eig; const n = 7; w = 2; nelements = n * (w + 1) - (w * (w + 1)) div 2; D = 3; // a contains the elements of the left and main diagonals of the input matrix a: array[1..nelements] of ArbFloat = ( 5, -4, 6, 1, -4, 6, 1, -4, 6, 1, -4, 6, 1, -4, 6, 1, -4, 5 ); function MatrixIndexToArrayIndex(i, j, n, w: Integer): Integer; function DiagElementIndex(i: Integer): Integer; var k: Integer; begin Result := 1; if i = 1 then exit; // Rows truncated at left for k := 2 to w do begin Result := Result + k; if k = i then exit; end; // full rows and those truncated at right for k := w+1 to n do begin Result := Result + w + 1; if k = i then exit; end; Result := n; end; var d: Integer; begin if j > i then begin Result := MatrixIndexToArrayIndex(j, i, n, w); exit; end; Result := DiagElementIndex(i); if (i = j) then exit; d := i - j; if d > w then Result := -1 else begin dec(Result, d); if (Result < 1) then Result := -1 end; end; var lambda: array[1..n] of ArbFloat; x: array[1..n, 1..n] of ArbFloat; term: Integer = 0; i, j, k: Integer; begin // Write diagonal elements WriteLn('n = ', n); Writeln('(One-sided) band width w = ', w); Write('Diagonal elements of A = ', a[1]:0:0); for k := 2 to nelements do Write(a[k]:3:0); WriteLn; WriteLn; // write reconstructed band input matrix (not needed for calculation) WriteLn('Reconstructed A = '); k := 1; for i := 1 to n do begin for j := 1 to n do begin k := MatrixIndexToArrayIndex(i, j, n, w); if k = -1 then Write(0.0:3:0) else Write(a[k]:3:0); end; WriteLn; end; WriteLn; // Calculate eigenvalues/vectors eigbs3(a[1], n, w, lambda[1], x[1,1], n, term); if term <> 1 then begin WriteLn('term = ', term, ' --> ERROR'); halt; end; // Write expected results of eigenvalues WriteLn('Expected eigenvalues:'); for i := 1 to n do Write(16 * intpower(sin(i*pi/16), 4):15:D); WriteLn; WriteLn; // write eigenvalues WriteLn('Calculated eigenvalues: lambda = '); for i := 1 to n do Write(lambda[i]:15:D); WriteLn; WriteLn; // Write eigenvectors WriteLn('Eigenvectors (as columns): x = '); for i := 1 to n do begin for j := 1 to n do Write(x[i, j]:15:D); WriteLn; end; end. ### Symmetric tridiagonal matrices This type of matrices is treated best by the routines eigts1..eigts4: // All eigenvalues procedure eigts1(var d, cd: ArbFloat; n: ArbInt; var lam: ArbFloat; var term: ArbInt); // Some eigenvalues (with indices k1..k2) procedure eigts2(var d, cd: ArbFloat; n, k1, k2: ArbInt; var lam: ArbFloat; var term: ArbInt); // All eigenvalues and all eigenvectors procedure eigts3(var d, cd: ArbFloat; n: ArbInt; var lam, x: ArbFloat; rwidth: ArbInt; var term: ArbInt); // Some eigenvalues and eigenvectors (with indices k1..k2) procedure eigts4(var d, cd: ArbFloat; n, k1, k2: ArbInt; var lam, x: ArbFloat; rwidth: ArbInt; var m2, term: ArbInt); • d specifies the first element along the main diagonal of the matrix. This 1D array must be dimensioned to contain at least n elements. • c specifies the first element in the subdiagonal of the matrix. This 1D array must be dimensioned to at least n-1 elements. • n denotes the number of columns or rows of the matrix (it must be square). • k1 and k2 define the interval of indexes k for which the eigenvalues (λk) and eigenvalues (ck) are to be calculated. They are integers and must be ordered such that 1<=k1<=k2<=n. • lam is the first element of an array receiving the calculated eigenvalues. Since there are n real eigenvalues the array must be dimensioned to contain at least n values of type ArbFloat. In case of the routines with appended 2 and 4, it is sufficient to provide space only for k2 - k1 + 1 values. • x is the first element of an array to receive the calculated eigenvectors. Since the eigenvectors are real the array must be prepared for data type ArbFloat. In case of routine eigts3, the array must be dimensioned for at least n2 elements, in case of routine eigts4 it must provide space for at least n * (k2-k1+1) values. The eigenvectors are normalized to unit length and arranged in the columns of this matrix. • rwidthx denotes the allocated row length of the matrix x. Thus it is possible to dimension the result matrix larger than actually needed. • term returns an error code: • 1 -- successful calculation • 2 -- calculation failed • 3 -- error in input data: n<1, k1<1, k1>k2, or k2>n. Example Calculate eigenvalues and eigenvectors of the matrix $A= \begin{bmatrix} 1 & 1 & 0 & 0 \\ 1 & 1 & 2 & 0 \\ 0 & 2 & 1 & 1 \\ 0 & 0 & 1 & 1 \end{bmatrix}$ The expected eigenvalues are $-\sqrt{2},\ 2-\sqrt{2},\ \sqrt{2},\ 2+\sqrt{2}$ program eig_symmtridiag_matrix; uses typ, eig; const n = 4; // a contains the elements of the main diagonal of the input matrix d: array[1..n] of ArbFloat = (1, 1, 1, 1); // c contains the elements of the subdiagonal c: array[2..n] of ArbFloat = (1, 2, 1); var lambda: array[1..n] of ArbFloat; x: array[1..n, 1..n] of ArbFloat; term: Integer = 0; i, j, k: Integer; begin // Write diagonals elements WriteLn('n = ', n); Write('Elements of main diagonal = ', d[1]:0:0); for k := 2 to n do Write(d[k]:3:0); WriteLn; Write('Elements of subdiagonal = ', ' ':3, c[2]:0:0); for k := 3 to n do Write(c[k]:3:0); WriteLn; WriteLn; // write reconstructed band input matrix (not needed for calculation) WriteLn('Reconstructed A = '); for i := 1 to n do begin for j := 1 to n do begin if j = i then Write(d[i]:3:0) else if (j = i-1) then Write(c[i]:3:0) else if (j = i+1) then Write(c[i+1]:3:0) else Write(0.0:3:0); end; WriteLn; end; WriteLn; // Calculate eigenvalues/vectors eigts3(d[1], c[2], n, lambda[1], x[1,1], n, term); if term <> 1 then begin WriteLn('term = ', term, ' --> ERROR'); halt; end; // Write expected results of eigenvalues WriteLn('Expected eigenvalues:'); Write(-sqrt(2):15:3, 2-sqrt(2):15:3, sqrt(2):15:3, 2+sqrt(2):15:3); WriteLn; WriteLn; // write eigenvalues WriteLn('Calculated eigenvalues: lambda = '); for i := 1 to n do Write(lambda[i]:15:3); WriteLn; WriteLn; // Write eigenvectors WriteLn('Eigenvectors (as columns): x = '); for i := 1 to n do begin for j := 1 to n do Write(x[i, j]:15:3); WriteLn; end; end. ## Finding the roots of a function (unit roo) The roots are the x values at which a function f(x) is zero. ### Roots of a polynomial A polynomial of degree n $z^n + a_1 z^{n-1} + a_2 z^{n-2} + ... + a_{n-1} z + a_n = 0$ always has n, not necessarily distinct, complex solutions. The datatype complex has been described in section complex numbers. These roots can be calculated by the function roopol: procedure roopol(var a: ArbFloat; n: ArbInt; var z: complex; var k, term: ArbInt); • a is the first element of an array containing the polynomial coefficients. Note that it is assumed that the polynomial has been normalized such that the coefficient of the highest-degree term is 1; this coefficient is not contained in the array. Therefore, the array must be dimensioned for at least n values. Since only real polynomials are handled here the array elements must be of datatype ArbFloat. The polynomial coefficients must be ordered from highest to lowest degree. Note that the data organization of the array is different from other polynomial routines in this library. • n is the degree of the polynomial. Must be a positive integer. • z is the first element in an array of complex values which returns the roots of the polynomial. The array must be dimensioned to contain at least n values. The returned values are undefined if an error had occurred (term <> 1). • k returns how many roots were found. Always must be equal to n, otherwise an error has occured. • term returns an error code: • 1 -- sucessful completion, the result array contains valid data. • 2 -- Not all roots could be detected, i.e. k < n. • 3 -- Error in input data: n < 1. Example Calculate the roots of the polynomial z5 + 3 z4 + 4 z3 - 8 z2. The expected zero points are: $z_1=0,\ z_2=0,\ z_3=1,\ z_4=-2+2i,\ z_5=-2-2i$ program polynomial; uses SysUtils, typ, roo; const n = 5; a: array[1..n] of ArbFloat = (3, 4, -8, 0, 0); var z: array[1..n] of complex; k: ArbInt; term: ArbInt; i: Integer; c: complex; function ComplexToStr(z: complex; Decimals: Integer): string; const SIGN: array[boolean] of string = ('+', '-'); begin Result := Format('%.*f %s %.*f i', [Decimals, z.re, SIGN[z.im <0], Decimals, abs(z.im)]); end; begin // Solve equation roopol(a[1], n, z[1], k, term); if term = 1 then begin // Display results WriteLn('Results of procedure roopol:'); for i:=1 to n do WriteLn(' Solution #', i, ': ', ComplexToStr(z[i], 6):20); WriteLn; // Display expected results Writeln('Expected results:'); c.Init(0, 0); // z1 = 0 WriteLn(' Solution #1: ', complexToStr(c, 6):20); c.Init(0, 0); // z2 = 0 WriteLn(' Solution #2: ', complexToStr(c, 6):20); c.Init(1, 0); // z3 = 1 WriteLn(' Solution #3: ', complexToStr(c, 6):20); c.Init(-2, +2); // z4 = -2 + 2 i WriteLn(' Solution #4: ', complexToStr(c, 6):20); c.Init(-2, -2); // z4 = -2 - 2 i WriteLn(' Solution #5: ', complexToStr(c, 6):20); end else WriteLn('ERROR'); end. ### Roots of the quadratic equation ${z}^2 + {p} {z} + {q} = 0$ is a special polynomal of degree 2. It always has two, not necessarily different, complex roots. These solutions can be determined by the procedure rooqua. procedure rooqua(p, q: ArbFloat; var z1, z2: complex); • p and q are the (real) coefficients of the quadratic equation • z1 and z2 return the two complex roots. See unit typ for the declaration of the type complex Note that rooqua assumes that the coefficient of the quadratic term has been normalized to be 1. Example Determine the roots of the equation z2 + 2 z + 5 = 0. program quadratic_equ; uses SysUtils, typ, roo; var z1, z2: complex; const SIGN: array[boolean] of string = ('+', '-'); begin rooqua(2, 5, z1, z2); WriteLn(Format('1st solution: %g %s %g i', [z1.re, SIGN[z1.im < 0], abs(z1.im)])); WriteLn(Format('2nd solution: %g %s %g i', [z2.re, SIGN[z2.im < 0], abs(z2.im)])); end. ### Roots of the binomial equation The equation $z^n = a$ is another special polynomial in which all terms except for the highest- and lowest-order terms have zero coefficients. It has n complex solutions which can be calculated by the procedure roobin: procedure roobin(n: ArbInt; a: complex; var z: complex; var term: ArbInt); • n is the exponent in the binomial equation used. n must be a positive integer. • a is the constant term a at the right side of the binomial equation. It is expected to be a complex value (see section on complex numbers). • z is the first element of an array of data type complex to receive the results of the procedure. It must be dimensioned for at least n complex values. • term returns an error code: • 1 -- successful termination • 2 -- error in input data: n < 1 Example Calculate the roots of the equation $z^4 = -1$ The exact solutions are $z_1 = \frac{1}{2} \sqrt{2} (1+i) ,\ z_2 = \frac{1}{2} \sqrt{2} (1-i) ,\ z_3= \frac{1}{2} \sqrt{2} (-1+i) ,\ z_4= \frac{1}{2} \sqrt{2} (-1-i)$ program binomial; uses SysUtils, typ, roo; const n = 4; var z: array[1..n] of complex; term: ArbInt; i: Integer; a: complex; c: complex; function ComplexToStr(z: complex; Decimals: Integer): string; const SIGN: array[boolean] of string = ('+', '-'); begin Result := Format('%.*g %s %.*g i', [Decimals, z.re, SIGN[z.im < 0], Decimals, abs(z.im)]); end; begin // Prepare constant term as a complex value a.Init(-1, 0); // Solve equation roobin(n, a, z[1], term); if term = 1 then begin // Display results WriteLn('Results of procedure roobin:'); for i:=1 to n do WriteLn(' Solution #', i, ': ', ComplexToStr(z[i], 6):20); WriteLn; // Display expected results Writeln('Expected results:'); c.Init(1, 1); c.Scale(0.5*sqrt(2)); WriteLn(' Solution #1: ', complexToStr(c, 6):20); c.Init(1, -1); c.Scale(0.5*sqrt(2)); WriteLn(' Solution #2: ', complexToStr(c, 6):20); c.Init(-1, 1); c.Scale(0.5*sqrt(2)); WriteLn(' Solution #3: ', complexToStr(c, 6):20); c.Init(-1, -1); c.Scale(0.5*sqrt(2)); WriteLn(' Solution #4: ', complexToStr(c, 6):20); end else WriteLn('ERROR'); end. ### Bisection In the bisection method two x values a and b are estimated to be around the expected root such that the function values have opposite signs at a and b. The center point of the interval is determined, and the subinterval for which the function has opposite signs at its endpoints is selected for a new iteration. The process ends when a given precision, i.e. interval length, is achieved. In NumLib, this approach is supported by the procedure roof1r: procedure roof1r(f: rfunc1r; a, b, ae, re: ArbFloat; var x: ArbFloat; var term: ArbInt); • f is the function for which the root is to be determined. It must be a function of one floating point argument (type ArbFloat). The type of the function, rfunc1r, is declared in unit typ. • a and b are the endpoints of the test interval. The root must be located between these two values, i. e. the function values f(a) and f(b) must have different signs. • ae and re determine the absolute and relative precision, respectively, with which the root will be determined. re is relative to the maximum of abs(a) and abs(b). Note that precision and speed are conflicting issues. Highest accuracy is achieved if ae is given as MachEps (see unit typ). Both parameters must not be negative. • x returns the value of the found root. • term returns whether the process has been successful: • 1 - successful termination, a zero point has been found with absolute accuracy ae or relative accuracy re • 2 - the required accuracy of the root could not be reached; However, the value of x is called the "best achievable" approach • 3 - error in input parameters: ae < 0 or re < 0, or f(a)*f(b) > 0 Example The following program determines the square root of 2. This is the x value at which the function f(x) = x^2 - 2 is zero. Since f(1) = 1^2 - 2 = -1 < 0 and f(2) = 2^2 - 2 = 2 > 0 we can assume a and b to be 1 and 2, respectively. program bisection_demo; uses typ, roo; function f(x: ArbFloat): ArbFloat; begin Result := x*x - 2; end; var x: ArbFloat = 0.0; term : ArbInt; begin roof1r(@f, 1.0, 2.0, 1e-9, 0, x, term); WriteLn('Bisection result ', x); WriteLn('sqrt(2) ', sqrt(2.0)); end. ### Roots of a system of nonlinear equations Procedure roofnr finds the roots of a system of (nonlinear) equations: $f_{i}(x_1,x_2,\ldots,x_n)=0, \; i=1,2,\ldots,n$ procedure roofnr(f: roofnrfunc; n: ArbInt; var x, residu: ArbFloat; ra: ArbFloat; var term: ArbInt); • f contains the address of the procedure that calculates the function values fi(x1, x2, ..., xn). The type of the function, roofnrfunc, is declared in unit typ to be type roofnrfunc = procedure(var x, fx: ArbFloat; var deff: boolean); • Here, x is the first element of an array of at least n ArbFloat values which provides the xj values at which the functions are to be calculated. • fx is the first element of another array of n ArbFloat values to receive the result of each function fi. Suppose, we want to solve the following system of equations $\begin{array}{l} f_1(x_1, x_2) = x_1^2 + x_2^2 - 2 = 0 \\ f_2(x_1, x_2) = -(x_1 - 1)^2 + x_2 = 0 \end{array}$ Then the function to be used as f can be written like this: procedure func(var x1, f1x: real; var deff: boolean); var x: array[1..2] of real absolute x1; f: array[1..2] of real absolute f1x; begin f[1] := sqr(x[1]) + sqr(x[2]) - 2; f[2] := -sqr(x[1] - 1) + x[2]; end; • The boolean parameter deff provides a way to stop the root finding process if some condition is met. The above example has two solutions, namely the intersection of a circle with a parabola. If only the intersection with x[1] >= 1 is requested then the process can be stopped as soon as a value x[1] < 1 is reached by setting deff to false: procedure func(var x1, f1x: real; var deff: boolean); far; var x: array[1..2] of real absolute x1; f: array[1..2] of real absolute f1x; begin deff := x[1] >= 1; if deff then begin f[1] := sqr(x[1]) + sqr(x[2]) - 2; f[2] := -sqr(x[1] - 1) + x[2]; end; end; • n is the number of equations or independent x values (xi) in the system. Both must be the same. • x is the first element of an array of at least n ArbFloat values which serves for both input and output. On input the array must contain estimates of the roots to be used as starting points of the iterative calculation. On output, the array is overwritten with the zero points found. Inspect the returned value of term to decide whether the output array contains a valid solution. • residu is the 2-norm of the vector of residuals in the calculated solution $\|f\|_2 = \sqrt{\Sigma_{i=1}^{n} f_i^2}$ • ra contains the relative accuracy with which the desired solution is to be calculated. Recommended values: 10-3, 10-5, 10-8 if ArbFloat is single, real, or double. • term returns an error code: • 1 -- successfull completion, a solution has been found with the desired accuracy • 2 -- the desired accuracy could not be reached, the returned values of x are the best ones achievable. • 3 -- Incorrect input data: n < 0, or re < 0 • 4 -- The calculation process has been stopped because an internal limit for the count of function calls has been reached. Retry with other starting values for x. • 5 -- Not enough progess, there may be no solution at all. If the solution is close to 0 choose another starting value. • 6 -- The procedure wants to calculate a value outside the range defined by deff. Example Calculate a solutions of the equation system $\begin{array}{l} f_1(x_1, x_2) = x_1^2 + x_2^2 - 2 = 0 \\ f_2(x_1, x_2) = -(x_1 - 1)^2 + x_2 = 0 \end{array}$ program nonlinsystem; uses SysUtils, typ, roo; const n = 2; ra = 1e-10; var x: array[1..n] of ArbFloat; f_check: array[1..n] of ArbFloat; residu: ArbFloat; i: Integer; term: Integer; deff: Boolean; procedure funcs(var x0, fx: ArbFloat; var deff: boolean); var xloc: array[1..n] of ArbFloat absolute x0; f: array[1..n] of ArbFloat absolute fx; x, y, z: ArbFloat; begin x := xloc[1]; y := xloc[2]; f[1] := sqr(x) + sqr(y) - 2; f[2] := -sqr(x - 1) + y; end; begin // Initial guessed values x[1] := 0; x[2] := 0; // Solve equation roofnr(@funcs, n, x[1], residu, ra, term); WriteLn('term = ', term); WriteLn; if term in [1, 2] then begin // Display results WriteLn('Results found by procedure roofnr:'); for i:=1 to n do WriteLn('Solution #' + IntToStr(i)+': ':20, x[i]:0:6); WriteLn; WriteLn('Norm of residuals: ', residu:0:15); WriteLn; // Test functions: f(x[1], f_check[1], deff); WriteLn('Check if the function values really are 0 at the found roots:'); for i := 1 to n do WriteLn('Function #' + IntToStr(i) + ': ':20, f_check[i]:0:15); end else WriteLn('ERROR'); end. ## Numerical integration of a function (unit int) The NumLib function int1fr calculates the integral of a given function between limits a and b with a specified absolute accuracy ae: procedure int1fr(f: rfunc1r; a, b, ae: ArbFloat; var integral, err: ArbFloat; var term: ArbInt); • f points to the function to be integrated. It must be a function of a single real variable (type ArbFloat) and return an Arbfloat. See the type rfunc1r declared in unit typ. • a, b are the limits of integration. a and/or b can attain the values +/-Infinity for integrating over an infinite interval. The order of a and b is handled in the mathematically correct sense. • ae determines the absolute accuracy requested. • integreal returns the value of the integral. It is only valid if term = 1. • err returns the achieved accuracy if the specified accuracy could not be reached. term has the value 2 in this case. • term returns an error code: • 1 - successful termination, the integral could be calculated with absolute accuracy ae. • 2 - the requested accuracy could not be reached. But the integral is approximated within the accuracy err. • 3 - incorrect input data: ae < 0, or a = b = infinity, or a = b = -infinity • 4 - the integral could not be calculated: divergence, or too-slow convergence. Example Calculate the integral $\int_a^b \frac 1 {x^2} \mathrm{d}x$ for several integration limits a and b. Since the function diverges at x = 0 the interval from a to b must not contain this point. The analytic result is $-1/{b} + 1/{a}$ program integrate; uses SysUtils, typ, int; function recipx2(x: ArbFloat): ArbFloat; begin Result := 1.0 / sqr(x); end; function integral_recipx2(a, b: ArbFloat): Arbfloat; begin if a = 0 then a := Infinity else if a = Infinity then a := 0.0 else a := -1/a; if b = 0 then b := Infinity else if b = Infinity then b := 0.0 else b := -1/b; Result := b - a; end; procedure Execute(a, b: ArbFloat); var err: ArbFloat = 0.0; term: ArbInt = 0; integral: ArbFloat = 0.0; begin try int1fr(@recipx2, a, b, 1e-9, integral, err, term); except term := 4; end; Write(' The integral from ' + FloatToStr(a) + ' to ' + FloatToStr(b)); case term of 1: WriteLn(' is ', integral:0:9, ', exected: ', integral_recipx2(a, b):0:9); 2: WriteLn(' is ', integral:0:9, ', error: ', err:0:9, ', exected: ', integral_recipx2(a, b):0:9); 3: WriteLn(' cannot be calculated: Error in input data'); 4: WriteLn(' cannot be calculated: Divergent, or calculation converges too slowly.'); end; end; begin WriteLn('Integral of f(x) = 1/x^2'); Execute(1.0, 2.0); Execute(1.0, 1.0); Execute(2.0, 1.0); Execute(1.0, Infinity); Execute(-Infinity, -1.0); Execute(0.0, Infinity); // NOTE: The next line will raise an exception if run in the IDE. This will not happen outside the IDE. // Integrate(-1.0, Infinity); end. ## Ordinary differential equations (unit ode) ### Solving a single first-order differential equation The routine odeiv1 solves an initial value problem described by a first-order differential equation of the form $\begin{cases} y' = f(x, y), \qquad x \in [a, b]\\ y(a) = \alpha \end{cases}$ with given a, b, f and initial condition y(a) = α. procedure odeiv1(f: rfunc2r; a, ya: ArbFloat; var b, yb: ArbFloat; ae: ArbFloat; var term: ArbInt); • f is the funtion to be processed. It depends on two real variables and returns a real value, as declared in unit typ as type rfunc2r = function(x, y: ArbFloat): ArbFloat. • a is the x value of the starting point of the interval in which the solution is determined. • ya is the value α of the function at the starting point a (initial value). • b is the x value of the end point of the interval in which the solution is determined. The case a > b is allowed. If, after the calculation, the error code term is 2 then the interval has been changed, and b contains the new endpoint to which the solution could be calculated with the desired accuracy, ae. In all other cases, b is unchanged. • yb returns the result of the calculation if term < 3. It is the value of the function at the end point b of the interval. If term = 3 then the result is undefined. • ae defines the absolute accuracy with which the value y(b) must be determined. • term returns an error code: • 1 - successful completion • 2 - the solution could not reach the point b with the required accuracy. However, yb is a sufficiently accurate approximation of y at the delivered b. • 3 - input error: ae <= 0 The algorithm is adaptive and is based on an explicit one-step Runge-Kutta method of order five. The procedure is not suitable for a rigid differential comparison. The accuracy can not be guaranteed in all cases. In so-called unstable problems, e.g. small variations in y(a) give large variations in y(b), the error may be significantly larger than what the result of the procedure suggests. Call the procedure with different values of ae to investigate this case. If one wants to solve the initial value problem for a number of points, e.g. from x = 0 to x = 1 with step size 0.1, then it is advisable to "integrate" and thus not to restart at x = 0 with every new step. Example Solve the differential equation y" = -10 (y - x2) with the initial condition y(0) = 0 for x = 0, 0.5, ..., 5. Compare with the exact solution y(x) = -0.02 exp(-10 x) + x2 - 0.2 x + 0.02 program solve_ode; uses typ, ode; function f(x, y: ArbFloat): Arbfloat; begin Result := -10 * (y - sqr(x)); end; function exact(x: real): real; far; begin Result := -0.02*exp(-10*x) + sqr(x) - 0.2*x + 0.02; end; const d = 0.5; // interval length ae = 1e-5; n = 10; var a, b: ArbFloat; ya, yb: ArbFloat; term: ArbInt; i: Arbint; begin // Set initial conditions a := 0.0; b := a + d; ya := 0.0; WriteLn('x':12, 'y':12, 'exact':12, 'error code':17); WriteLn; WriteLn(a:12:5, ya:12:5, exact(a):12:5, '-':17); for i := 1 to n do begin odeiv1(@f, a, ya, b, yb, ae, term); WriteLn(b:12:5, yb:12:5, exact(b):12:5, term:17); a := b; ya := yb; b := b + d; end; end. ### Solving a system of first-order differential equations An initial value problem described by system of first-order differential equations can be solved by the procedure odeiv2: $\begin{cases} \mathbf{y}' = \mathbf{f}(x, \mathbf{y}), \qquad x \in [a, b]\\ \mathbf{y}(a) = \mathbf{\alpha} \end{cases}$ where • y is an unknown n vector y: [a, b] --> Rn or: y = [y1(x), y2(x), ..., yn(x)] • f is a vector function f: [a, b] --> Rn or: f(x, y) = [f1(x,y), f2(x,y), ..., fn(x,y)] • a, b, and the initial conditions α = y(a) = [y1(a), y2(a), ... yn(a)] are given. The algorithm is based on an explicit one-step Runge-Kutta method of order five with variable step size. procedure odeiv2(f: oderk1n; a: ArbFloat; var ya, b, yb: ArbFloat; n: ArbInt; ae: ArbFloat; var term: ArbInt); • The parameter f contains the name of the procedure that calculates the function values fi(x, yi). The declaration of the procedure must match the type oderk1n = procedure(x: ArbFloat; var y, fxy: ArbFloat) declared in unit typ. Here x is the coordinate in the interval [a, b], and y is the first value of an array of y values to be used in each equation of the ODE system. The function result is returned in another array which is specified by its first value fxy. Both arrays must be dimensioned to provide at least n elements. • a is the begin of the calculation interval. • ya is the first element of an array containing the initial conditions for each ODE of the system, i.e. the function values yi(a) = αi. The array must be allocated to containt at least n elements. • b is the end of the calculation interval. The case a > b is allowed. If after the calculation term is 2 then the interval has been changed, and b contains the new endpoint to which the solution could have been calculated with the desired accuracy, ae. In all other cases, b is unchanged. • yb is the first element of an array which receives the results of the calculation. It must be dimensioned to contain at least n elements. • n denotes the number of equations in the system. • ae specifies the absolute accuracy with which the solution must be calculated. • term is an error code: • 1 - successful completion. • 2 - the solution could not reach the point b with the required accuracy. However, the values in the yb array are sufficiently accurate approximations of the y values at the delivered b. • 3 - input error: n < 1, or ae <= 0. Example Integrate the following initial value problem between x = 0 and x = 1 with step size 0.1: $\begin{cases} y'_{1}=2xy_{1}+y_{2} \\ y'_{2}=-y_{1}+2xy_{2}\\ y_1(0)=0,\ y_2(0)=1 \end{cases}$ The exact solutions are $\begin{cases} y_1(x)=\exp({x^2}) \sin(x) \\ y_2(x)=\exp({x^2}) \cos(x) \end{cases}$ program solve_ode_sys; uses typ, ode; const ae = 1e-5; procedure f(x: ArbFloat; var y, fxy: ArbFloat); var _y: array[1..2] of ArbFloat absolute y; _fxy: array[1..2] of ArbFloat absolute fxy; begin _fxy[1] := 2*x*_y[1] + _y[2]; _fxy[2] := -_y[1] + 2*x*_y[2] end; function exact1(x: ArbFloat): ArbFloat; begin Result := exp(x*x) * sin(x); end; function exact2(x: ArbFloat): ArbFloat; begin Result := exp(x*x) * cos(x); end; var a, b, d: ArbFloat; ya: array[1..2] of ArbFloat; yb: array[1..2] of ArbFloat; term: ArbInt; i: Arbint; n: ArbInt; begin // Set initial conditions a := 0.0; b := 0.1; d := b - a; ya[1] := 0.0; ya[2] := 1.0; n := 10; WriteLn('x':12, 'y[1]':12, 'y[2]':12, 'exact[1]':12, 'exact[2]':12, 'error code':17); WriteLn; WriteLn(a:12:5, ya[1]:12:5, ya[2]:12:5, exact1(a):12:5, exact2(a):12:5, '-':17); for i := 1 to n do begin odeiv2(@f, a, ya[1], b, yb[1], 2, ae, term); WriteLn(b:12:5, yb[1]:12:5, yb[2]:12:5, exact1(b):12:5, exact2(b):12:5, term:17); a := b; ya[1] := yb[1]; ya[2] := yb[2]; b := b + d; end; end. ## Interpolation and fitting (unit ipf) Unit ipf contains routines for • fitting a set of data points with a polynomial, • interpolating or fitting a set of data points with a natural cubic spline. A spline is a piecewise defined function of polynomials which has a high degree of smoothness at the connection points of the polynomials ("knots"). In case of a natural cubic spline, the polynomials have degree 3 and their second derivative is zero at the first and last knot. Fitting means: determine an approximating smooth function such that the deviations from the data points are at minimum. Interpolation means: determine a function that runs exactly through the data points. Use of polynomials or splines is recommended unless the data are known to belong to a known function in which there are still some unknown parameters, for example, the data are measurements of the function f(x) = a + b e-c x. In the most common case, the data contain measurement errors and appear to follow the shape of a "simple" function. Therefore, it is recommended to first try to fit with a low-degree polynomial, e.g. not higher than degree 5. If this is not successful or if the shape of the function is more complicated try to fit with a spline. If the data contain no (or very little) measurement noise, it is almost always wise to interpolate the data with a spline. ### Fitting with a polynomial For this purpose, the routine ipfpol can be applied. It uses given data points (xi, yi), i = 1, ..., m, and n given coefficients b0, ..., bn to calculate a polynomial $\operatorname{p}(x) = b_0 + b_1 x + \dots + b_n x^n$ In the sense of the least squares fitting, the coefficients b0 ... bn are adjusted to minimize the expression $\sum_{i=1}^m {(\operatorname{p}(x) - y_i)^2}$ procedure ipfpol(m, n: ArbInt; var x, y, b: ArbFloat; var term: ArbInt); • m denotes the number of data points. It is required that m ≥ 1 • n is the degree of the polynomial to be fitted. It is required that n > 0. • x is the first element of a one-dimensional array containing the x values of the data points. The array must be allocated to contain at least m values. • y is the first element of a one-dimensional array containing the y values of the data points. The array must be dimensioned to contain at least m values. • b is the first element of a one-dimenisonal array in which the determined polynomial coefficients are returned if term is 1. The array must have been dimensioned to provide space for at least n + 1 values. The returned coefficients are ordered from lowest to highest degree. • term returns an error code: • 1 - successful completion, the array b contains valid coefficients • 3 - input error: n < 0, or m < 1. After the coefficients b0, ..., bn once have been determined the value of p(x) can be calculated for any x using the procedure spepol from the unit spe. Note: With this routine, of course, an interpolating polynomial can also be determined by equaling n to m - 1. Example Fit a polynomial of degree 2 to these data points: $\begin{array}{ccc} \hline i & x_i & y_i \\ \hline 1 & 0.00 & 1.26 \\ 2 & 0.08 & 1.37 \\ 3 & 0.22 & 1.72 \\ 4 & 0.33 & 2.08 \\ 5 & 0.46 & 2.31 \\ 6 & 0.52 & 2.64 \\ 7 & 0.67 & 3.12 \\ 8 & 0.81 & 3.48 \end{array}$ program polynomial_fit; uses SysUtils, StrUtils, typ, ipf, spe; const m = 8; n = 2; x: array[1..m] of Arbfloat = ( 0.00, 0.08, 0.22, 0.33, 0.46, 0.52, 0.67, 0.81 ); y: array[1..m] of Arbfloat = ( 1.26, 1.37, 1.72, 2.08, 2.31, 2.64, 3.12, 3.48 ); var b: array[0..n] of ArbFloat; i: Integer; term: ArbInt; xint, yint: ArbFloat; begin WriteLn('Fitting a polynomial of degree 2: p(x) = b[0] + b[1] x + b[2] x^2'); WriteLn; WriteLn('Data points'); WriteLn('i':10, 'xi':10, 'yi':10); for i:=1 to m do WriteLn(i:10, x[i]:10:2, y[i]:10:2); WriteLn; // Execute fit ipfpol(m, n, x[1], y[1], b[0], term); // Display fitted polynomial coefficients WriteLn('Fitted coefficients b = '); WriteLn(b[0]:10:6, b[1]:10:6, b[2]:10:6); WriteLn; // Interpolate and display fitted polynomial for some x values WriteLn('Some interpolated data'); WriteLn('':10, 'x':10, 'y':10); for i:= 1 to 5 do begin xint := 0.2*i; yint := spepol(xint, b[0], n); WriteLn('':10, xint:10:2, yint:10:2); end; end. ### Interpolation with a natural cubic spline The routine ipfisn can be used for this purpose. It calculates the parameters of the spline. Once these parameters are known, the value of the spline can be calculated at any point using the ipfspn procedure. Assume that (xi, yi), i = 0, ..., n' are the given data points with x0 < x1 < ... < xn. Then assume a function g(x) which is twice continuously differentiable (i.e., the first and second derivatives exist and are continuous) and which interpolates the data (i.e., g(xi = yi). Imagine g(x) as the shape of a thin flexible bar. Then the bending energy (in first approximation) is proportional to $\int_{-\infty}^{\infty} g''(x)^2 dx$ The interpolating natural spline s can be understood as the function g which minimizes this integral and therefore the bending energy. The spline s has the following properties: • s is a cubic polynomial on the interval [xi, xi+1] • it is twice continuously differentiable on (-∞, ∞) • s"(x0) = s"(xn) = 0 • on (-∞, x0) and (xn, ∞) s is linear. procedure ipfisn(n: ArbInt; var x, y, d2s: ArbFloat; var term: ArbInt); • Calculates the second derivatives of the splines at the knots xi. • n is the index of the last data point, i.e. there are n+1 data points. • x is the first element of the array with the x coordinates of the data points. It must be dimensioned to contain at last n+1 values. The standard declaration would be var x: array[0..n] of ArbFloat. The data points must be in strictly ascending order, i.e. there must not be any data points for which xi >= xi+1. • y is the first element of the array with the y coordinates of the data points. It must be dimensioned to contain at last n+1 values. The standard declaration would be var y: array[0..n] of ArbFloat. • d2s is the first element of the array which receives the second derivatives of the splines at the knots if the returned error code term is 1. Note that the array does not contain values for the first and last data point because they are automatically set to 0 (natural splines). Therefore the array must be dimensioned to contain at least n-1 elements. The standard declaration would be: var d2s: array[1..n-1] of ArbFloat • term returns an error code: • 1 - successful completion, the array beginning at d2s contains valid data • 2 - calculation of the second derivatives was not successful • 3 - incorrect input parameters: n ≤ 1, or xixi+1 function ipfspn(n: ArbInt; var x, y, d2s: ArbFloat; t: ArbFloat; var term: ArbInt): ArbFloat; • Calculates the value of the spline function at any coordinate t. The calculation uses the second derivatives determined by ipnisn. • n, x, y, d2s have the same meaning as above • term returns an error code: • 1 - successful completion • 3 - The calculation could not be executed because n ≤ 1. Example Interpolate a natural cubic spline through the following data points: $\begin{array}{ccc} \hline i & x_i & y_i \\ \hline 0 & 0.00 & 0.980 \\ 1 & 0.09 & 0.927 \\ 2 & 0.22 & 0.732 \\ 3 & 0.34 & 0.542 \\ 4 & 0.47 & 0.385 \\ 5 & 0.58 & 0.292 \\ 6 & 0.65 & 0.248 \\ 7 & 0.80 & 0.179 \\ 8 & 0.93 & 0.139 \end{array}$ program spline_interpolation; uses typ, ipf; const n = 8; x: array[0..n] of Arbfloat = ( 0.00, 0.09, 0.22, 0.34, 0.47, 0.58, 0.65, 0.80, 0.93 ); y: array[0..n] of Arbfloat = ( 0.990, 0.927, 0.734, 0.542, 0.388, 0.292, 0.248, 0.179, 0.139 ); var s: array[0..n] of ArbFloat; d2s: array[1..n-1] of ArbFloat; i: Integer; term: ArbInt; xint, yint: ArbFloat; begin WriteLn('Interpolation with a natural cubic spline'); WriteLn; WriteLn('Data points'); WriteLn('i':10, 'xi':10, 'yi':10); for i:=0 to n do WriteLn(i:10, x[i]:10:2, y[i]:10:3); WriteLn; // Interpolation ipfisn(n, x[0], y[0], d2s[1], term); // Display 2nd derivatives of splines at xi WriteLn('s"(xi)'); Write(0.0:10:6); // 2nd derivative of 1st point is 0 for i:=1 to n-1 do Write(d2s[i]:10:6); WriteLn(0.0:10:6); // 2nd derivative of last point is 0 WriteLn; // Interpolate for some x values WriteLn('Some interpolated data'); WriteLn('':10, 'x':10, 'y':10); for i:= 1 to 5 do begin xint := 0.2 * i; yint := ipfspn(n, x[0], y[0], d2s[1], xint, term); WriteLn('':10, xint:10:2, yint:10:2); end; end. ### Fitting with a natural cubic spline The routine ipffsn can be used for this purpose. This routine calculates the spline-fit parameters. Once these parameters are known the value of the spline can be calculated at any point using the procedure ipfspn. Following the model with the bending energy in the previous chapter the calculated fit minimizes $\int_{-\infty}^{\infty} g''(x)^2 dx + \lambda \sum_{i=0}^n (g(x_i) - y_i)^2$ where the parameter λ must be determined. It is a measure of the compromise between the "smoothness" of the fit - which is measured by the integral (the bending energy) - and the deviation of the fit to the given data - which is measured by the sum of squares. The solution is again a natural cubic spline. Warning: The procedure ipffsn is buggy and crashes. Therefore, it is not documented at the moment. ## Special functions (unit spe) ### Evaluation of a polynomial Horner's scheme provides an efficient method for evaluating a polynomial at a specific x value: $\operatorname{p}(x) = a_0 + a_1 x + a_2 x^2 + ... + a_n x^n \ \Rightarrow \ \operatorname{p}(x) = a_0 + x (a_1 + x (a_2 + \dots + x (a_{n-1} + x a_n)))$ This method is applied in NumLib's procedure spepol: function spepol(x: ArbFloat; var a: ArbFloat; n: ArbInt): ArbFloat; • x is the argument at which the polynomial is evaluated. • a is the first element of an array containing the polynomial coefficients a0, a1, a2, ... an. The coefficient must be ordered from lowest to highest degree. • n is the degree of the polynomial, i.e. there are n+1 elements in the array. Example Evaluate the polynomial $\operatorname{p}(x) = 2 x^3 - 6 x^2 + 2 x - 1$ at x = 3. Note that the terms are not in the correct order for spepol and rearrange them to $\operatorname{p}(x) = -1 + 2 x - 6 x^2 + 2 x^3$ program polynomial; uses typ, spe; const n = 3; a: array[0..n] of ArbFloat = (-1, 2, -6, 2); var x, y: ArbFloat; begin x := 3.0; y := spepol(x, a[0], n); WriteLn(y:0:6); end. ### Error function The error function erf(x) and its complement, the complementary error function erfc(x), are the lower and upper integrals of the Gaussian function, normalized to unity: $\operatorname{erf}(x) = \frac {2} {\sqrt{\pi}} \int_0^x e^{-{t}^2} dt$ $\operatorname{erfc}(x) = \frac {2} {\sqrt{\pi}} \int_x^\infty e^{-{t}^2} dt = {1} - \operatorname{erf}(x)$ Both functions can be calculated by the NumLib functions speerf and speefc, respectively function speerf(x: ArbFloat): ArbFloat; // --> erf(x) function speefc(x: ArbFloat): ArbFloat; // --> erfc(x) Example A table of some values of the error function and the complementary error function is calculated in the following demo project: program erf_Table; uses SysUtils, StrUtils, typ, spe; const Wx = 7; Wy = 20; D = 6; var i: Integer; x: ArbFloat; fs: TFormatSettings; begin fs := DefaultFormatSettings; fs.DecimalSeparator := '.'; WriteLn('x':Wx, 'erf(x)':Wy+1, 'erfc(x)':Wy+1); WriteLn; for i:= 0 to 20 do begin x := 0.1*i; WriteLn(Format('%*.1f %*.*f %*.*f', [ Wx, x, Wy, D, speerf(x), Wy, D, speefc(x) ], fs)); end; end. ### Normal distribution The (cumulative) normal distribution is the integral of the Gaussian function with zero mean and unit standard deviation, i.e. $\operatorname{N}(x) = \frac{1}{\sqrt{2\pi}} \int_{-\infty}^{x} \operatorname{exp}(\frac{t^2}{2}) dt = \frac{1}{2}[1 + \operatorname{erf} (\frac{x}{\sqrt{2}})]$ Suppose a set of random floating point numbers which are distributed according to this formula. Then N(x) measures the probability that a number from this set is smaller than x. In NumLib, the normal distribution is calculated by the function normaldist: function normaldist(x: ArbFloat): ArbFloat; • x can take any value between -∞ and +∞. • The function result is between 0 and 1. The inverse normal distribution of y returns the x value for which the normal distribution N(x) has the value y. function invnormaldist(y: ArbFloat): ArbFloat; • y is allowed only between 0 and 1. • The function can take any value between -∞ and +∞. Note: The functions normaldist and invnormaldist are not available in fpc 3.0.x and older. Example Calculate the probabilities for x = -10, -8, ..., 12 for a normal distribution with mean μ = 2 and standard deviation σ = 5. In order to reduce this distribution to the standard normal distribution implemented by NumLib, we introduce a transformation xr = (x - μ)/σ. program normdist; uses typ, spe; const mu = 2.0; sigma = 5.0; x: array[0..12] of ArbFloat = (-10, -8, -6, -4, -2, 0, 2, 4, 6, 8, 10, 12, 14); var xr, y: ArbFloat; i: Integer; begin WriteLn('Normal distribution with mean ', mu:0:1, ' and standard deviation ', sigma:0:1); WriteLn; WriteLn('x':20, 'y':20); for i:= 0 to High(x) do begin xr := (x[i] - mu) / sigma; y := normaldist(xr); WriteLn(x[i]:20:1, y:20:6); end; end. ### Gamma function The gamma function is needed by many probability functions. It is defined by the integral $\Gamma({x}) = \int_0^{\infty}t^{x-1} e^{-t} dt$ NumLib provides two functions for its calculation: function spegam(x: ArbFloat): ArbFloat; function spelga(x: ArbFloat): ArbFloat; The first one, spegam, calculates the function directly. But since the gamma function grows rapidly for even not-too large arguments this calculation very easily overflows. The second function, spelga calculates the natural logarithm of the gamma function which is more suitable to combinatorial calculations where multiplying and dividing the large gamma values can be avoided by adding or subtracting their logarithms. Example The following demo project prints a table of some values of the gamma function and of its logarithm. Note that spegam(x) overflows above about x = 170 for data type extended. program Gamma_Table; uses SysUtils, StrUtils, typ, spe; const VALUES: array[0..2] of ArbFloat = (1, 2, 5); Wx = 7; Wy = 30; Wln = 20; var i: Integer; x: ArbFloat; magnitude: ArbFloat; begin WriteLn('x':Wx, 'Gamma(x)':Wy, 'ln(Gamma(x))':Wln); WriteLn; magnitude := 1E-3; while magnitude <= 1000 do begin for i := 0 to High(VALUES) do begin x := VALUES[i] * magnitude; if x <= 170 then // Extended overflow above 170 Write(FormatFloat('0.000', spegam(x)):Wy) else Write('overflow':Wy); WriteLn(spelga(x):Wln:3); if abs(x-1000) < 1E-6 then break; end; magnitude := magnitude * 10; end; end. ### Incomplete gamma function The lower and upper incomplete gamma functions are defined by $\operatorname{P}({s},{x}) = \frac{1}{\Gamma({s})} \int_0^{x}t^{s-1} e^{-t} dt$ $\operatorname{Q}({s},{x}) = \frac{1}{\Gamma({s})} \int_{x}^{\infty}t^{s-1} e^{-t} dt = 1 - \operatorname{P}({s}, {x})$ function gammap(s, x: ArbFloat): ArbFloat; function gammaq(s, x: ArbFloat): ArbFloat; • The parameter s must be positive: s > 0 • The argument x must not be negative: x ≥ 0 • The function results are in the interval [0, 1]. Note: The functions gammap and gammaq are not available in fpc v3.0.x and older. Example The following project prints out a table of gammap and gammaq values: program IncompleteGamma_Table; uses SysUtils, StrUtils, typ, spe; const s = 1.25; Wx = 7; Wy = 20; D = 6; var i: Integer; x: ArbFloat; fs: TFormatSettings; begin fs := DefaultFormatSettings; fs.DecimalSeparator := '.'; WriteLn('x':Wx, 'GammaP('+FloatToStr(s,fs)+', x)':Wy+1, 'GammaQ('+FloatToStr(s,fs)+', x)':Wy+1); WriteLn; for i := 0 to 20 do begin x := 0.5*i; WriteLn(Format('%*.1f %*.*f %*.*f', [ Wx, x, Wy, D, gammap(s, x), Wy, D, gammaq(s, x) ], fs)); end; end. ### Beta function The Beta function is another basis of important functions used in statistics. It is defined as $\operatorname{B}(a, b) = \frac{{\Gamma(a)}{\Gamma(b)}}{\Gamma(a+b)} = \int_0^1{t^{x-1} (1-t)^{y-1} dt}$ The NumLib routine for its calculation is function beta(a, b: ArbFloat): ArbFloat; • The arguments a and b must be positive: a > 0 and b > 1. • The calculation is based on the logarithms of the gamma function and therefore does not suffer from the overflow issues of the gamma function. Note: The function beta is not available in fpc v3.0.x or older. ### Incomplete beta function The (regularized) incomplete beta function is defined by $\operatorname{I}_x(a,b) = \frac {1}{\operatorname{B}(ab)} \int_0^x{t^{x-1} (1-t)^{y-1} dt}$ function betai(a, b, x: ArbFloat): ArbFloat; • The arguments a and b must be positive: a > 0 and b > 1. • x is only allowed to be in the range 0 ≤ x ≤ 1. • The function result is in the interval [0, 1]. The inverse incomplete beta function determines the argument x for which the passed parameter is equal to Ix(a, b): function invbetai(a, b, y: ArbFloat): ArbFloat; The arguments a and b must be positive: a > 0 and b > 1. y is only allowed to be in the range 0 ≤ x ≤ 1. The function result is in the interval [0, 1]. Note: The functions betai and invbetai are not available in fpc v3.0.x and older. Example Calculate the incomplete beta function for some values of x, a, b, and apply the result to the inverse incomplete beta function to demonstrate the validity of the calculations. program incomplete_beta_func; uses SysUtils, typ, spe; procedure TestBetai(a, b, x: ArbFloat); var xc, y: ArbFloat; begin y := betai(a, b, x); xc := invbetai(a, b, y, macheps); WriteLn(' x = ', x:0:6, ' ---> y = ', y:0:9, ' ---> x = ', xc:0:6); end; begin WriteLn('Incomplete beta function and its inverse'); WriteLn; WriteLn(' y = betai(1, 3, x) x = invbetai(1, 3, y)'); TestBetaI(1, 3, 0.001); TestBetaI(1, 3, 0.01); TestBetaI(1, 3, 0.1); TestBetaI(1, 3, 0.2); TestBetaI(1, 3, 0.9); TestBetaI(1, 3, 0.99); TestBetaI(1, 3, 0.999); WriteLn; WriteLn(' y = betai(1, 1, x) x = invbetai(1, 1, y)'); TestBetaI(1, 1, 0.001); TestBetaI(1, 1, 0.01); TestBetaI(1, 1, 0.1); TestBetaI(1, 1, 0.2); TestBetaI(1, 1, 0.9); TestBetaI(1, 1, 0.99); TestBetaI(1, 1, 0.999); WriteLn; WriteLn(' y = betai(3, 1, x) x = invbetai(3, 1, y)'); TestBetaI(3, 1, 0.001); TestBetaI(3, 1, 0.01); TestBetaI(3, 1, 0.1); TestBetaI(3, 1, 0.2); TestBetaI(3, 1, 0.9); TestBetaI(3, 1, 0.99); TestBetaI(3, 1, 0.999); WriteLn; end. Bessel functionsThe Bessel functions are solutions of the Bessel differential equation: ${x}^2 y'' + x y' + ({x}^2 - \alpha^2) {y} = 0$The Bessel functions of the first kind, or cylindrical harmonics, Jα(x), are the solutions which are not singular at the origin, in contrast to the Bessel functions of the second kind, Yα(x). Yα(x) is only defined for x > 0. Example Calculate the probability that random normal-distributed numbers are within 1, 2, and 3 standard deviations around the mean. Calculate the maximum deviation of normal-distributed deviates (in units of standard deviations) from the mean at probabilities 0.90, 0.95, 0.98, 0.99 and 0.999. The solutions for a purely imaginary argument are called modified Bessel functions of the first kind, Iα(x), and modified Bessel function of the second kind, Kα(x). Kα(x) is only defined for x > 0. NumLib implements only the solutions for the parameters α = 0 and α = 1: function spebj0(x: ArbFloat): ArbFloat; // Bessel function of the first kind, J0 (alpha = 0) function spebj1(x: ArbFloat): ArbFloat; // Bessel function of the first kind, J1 (alpha = 1) function speby0(x: ArbFloat): ArbFloat; // Bessel function of the second kind, Y0 (alpha = 0) function speby1(x: ArbFloat): ArbFloat; // Bessel function of the second kind, Y1 (alpha = 1) function spebi0(x: ArbFloat): ArbFloat; // modified Bessel function of the first kind, I0 (alpha = 0) function spebi1(x: ArbFloat): ArbFloat; // modified Bessel function of the first kind, I1 (alpha = 1) function spebk0(x: ArbFloat): ArbFloat; // modified Bessel function of the second kind, K0 (alpha = 0) function spebk1(x: ArbFloat): ArbFloat; // modified Bessel function of the second kind, K1 (alpha = 1) Other functionsThe unit spe contains some other functions which will not be documented here because they are already available in th FPC's standard unit math. Function   Equivalent function   in math Description function speent(x: ArbFloat): LongInt; floor(x) Entier function, calculates first integer smaller than or equal to x function spemax(a, b: Arbfloat): ArbFloat; max(a, b) Maximum of two floating point values function spepow(a, b: ArbFloat): ArbFloat; power(a, b) Calculates ab function spesgn(x: ArbFloat): ArbInt; sign(x) Returns the sign of x (-1 for x < 0, 0 for x = 0, +1 for x > 0) function spears(x: ArbFloat): ArbFloat; arcsin(x) Inverse function of sin(x) function spearc(x: ArbFloat): ArbFloat; arccos(x) Inverse function of cos(x) function spesih(x: ArbFloat): ArbFloat; sinh(x) Hyperbolic sine function specoh(x: ArbFloat): ArbFloat; cosh(x) Hyperbolic cosine function spetah(x: ArbFloat): ArbFloat; tanh(x) Hyperbolic tangent function speash(x: ArbFloat): ArbFloat; arcsinh(x) Inverse of the hyperbolic sine function speach(x: ArbFloat): ArbFloat; arccosh(x) Inverse of the hyperbolic cosine function speath(x: ArbFloat): ArbFloat; arctanh(x) Inverse of the hyperbolic tangent
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 2, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6581600308418274, "perplexity": 2523.8424012721784}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198942.13/warc/CC-MAIN-20200921050331-20200921080331-00073.warc.gz"}
https://eprints.soton.ac.uk/436064/
The University of Southampton University of Southampton Institutional Repository # Lattice-enhanced Fano resonances from bound states in the continuum metasurfaces Tan, Thomas C.W., Plum, Eric and Singh, Ranjan (2020) Lattice-enhanced Fano resonances from bound states in the continuum metasurfaces. Advanced Optical Materials, 8 (6), 1-10, [1901572]. Record type: Article ## Abstract Fano resonances in metamaterials are known for their high quality (Q) factor and high sensitivity to external perturbations, which makes them attractive for sensors, lasers, non-linear and slow light devices. However, Fano resonances with higher Q factors obtained through structural optimization of individual resonators are accompanied by lower resonance intensity, thereby limiting the overall figure of merit (FoM) of the resonance. This article reports a strategy for simultaneously enhancing the Q factor and FoM of Fano resonances in terahertz metamaterials. Coupling of the Fano resonance, which arises from a symmetry-protected bound state in continuum, to the first order lattice mode of the metamaterial array leads to stronger field confinement and substantial enhancement of both Q factor and FoM. As such enhancement occurs in planar metamaterials independently of the resonator geometry, the proposed approach can be utilized for a wide range of high-Q and high-sensitivity terahertz metadevices. Text FanoBIC-accepted version - Accepted Manuscript Restricted to Repository staff only until 13 January 2021. Request a copy Accepted/In Press date: 19 November 2019 e-pub ahead of print date: 13 January 2020 Published date: 19 March 2020 Keywords: Metamaterial, Fano resonance, Bound states in continuum, BIC, Lattice mode, Terahertz ## Identifiers Local EPrints ID: 436064 URI: http://eprints.soton.ac.uk/id/eprint/436064 ISSN: 2195-1071 ORCID for Eric Plum: orcid.org/0000-0002-1552-1840 ## Catalogue record Date deposited: 27 Nov 2019 17:30 ## Contributors Author: Thomas C.W. Tan Author: Eric Plum Author: Ranjan Singh
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8342658281326294, "perplexity": 14376.135964961002}, "config": {"markdown_headings": true, "markdown_code": false, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737645.2/warc/CC-MAIN-20200808110257-20200808140257-00385.warc.gz"}
https://space.stackexchange.com/questions/30501/how-could-the-2018-08-30-soyuz-ms-09-iss-leak-be-so-slow/30504
# How could the 2018-08-30 Soyuz MS-09 / ISS leak be so slow? The leak reportedly led the ISS to lose 0.8 millibars of air pressure per hour, which is both big considering what was at stake and low for a 2-mm hole when the outside is near to complete vacuum. Am I missing something? How could the German astronaut even block it with his finger without any damage if complete vacuum was on the other side? Per this comment, the value of 0.8 mbar/hr seems to come from: • Small holes and vacuum in general aren't as lethal as sci-fi would make you think. In fact, humans can produce quite a bit of suction by themselves. If you hold a drinking straw to your skin and suck in using your mouth, you can achieve down to around %10 air pressure and you won't be injured or probably even uncomfortable. See here someone measures human suction power: youtu.be/ANVI04QmthE – Dragongeek Sep 6 '18 at 21:51 • I was blocking a 10-bar hose of about 5mm diameter with my finger just fine. Blocking a hole against 1 bar suction is really nothing. – SF. Sep 6 '18 at 22:42 • There is a video on youtube by CodysLab who showed exactly that: blocking a tiny hole in vacuum against the pressure. – PlasmaHH Sep 7 '18 at 11:08 • I'm curious, where did the "0.8 millibars of air pressure per hour" figure come from exactly? Do you have a source? – uhoh Sep 7 '18 at 18:16 • @uhoh the only source is Stephen Clark from spaceflightnow.com/2018/08/30/…. There is no any mentions of the leak rate on other sources, including NASA site. But usually spaceflightnow.com is rather reliable source. – Heopps Sep 8 '18 at 6:28 The ISS is at 1 bar, i.e. 1 kgf/cm2, or 10 gramsf/mm2. So the pressure on that 2 mm hole is 31.4 gramsf, well within the range a human finger can handle. Also, the ISS is really big compared to the hole. It takes a long time for hundreds of m3 to evacuate through a 2 mm hole. • thank you, intuitively I thought the pressure would be much higher on the finger and as you say 2 mm is not much compared to the volume of the ISS, so it makes sense! I guess I must have been influenced by SF movies where everything explodes as soon as there's a leak ^^ I should have made the calculation instead of relying on my physical intuition. – tsnobip Sep 6 '18 at 14:15 • @tsnobip check this video Use Your Finger to Stop a Leak on the Space Station? . You can see how easy it's to stop the leak with your finger without any issue (maybe just a small hickey on your finger :) ) – bitcell Sep 7 '18 at 6:17 • well nice finding @bitcell, that's exactly the kind of thing I was looking for! But still, I think I would have probably hesitated a bit before putting my finger on a leak of the ISS in real life! ^^ – tsnobip Sep 7 '18 at 9:05 • Pressure is force per unit area, not mass per unit area or mass. – David Richerby Sep 7 '18 at 18:11 • fixed the units. – Hobbes Sep 7 '18 at 19:34 This is the image of the hole (news source, although the image is from NASA) The hole is 2mm in diameter. Even with a total vacuum on the other side, you're not talking a lot of volume getting through that hole. I used this calculator with a pressure gradient of 101kPa (ISS standard) and 0.1 kPa through a 2mm hole and got a water flow rate of ~0.1 cubic meters of water per hour (or 26.6 gallons per hour). For contrast, the US has a hard rule limit of 10 gallons per minute on gasoline pumps. As such, the pressure exerted through that 2mm hole is not going to be enough to pull much more than air or a nearby viscous liquid out. • You don't need a flow rate calculator. Simply use $\dot p/p=\dot m/m = \dot V/V$ and convert that 0.8 mb/hr pressure loss to a mass loss of about 0.9 kg/hr or a volumetric flow rate of 0.8 m$^3$/hr. (I'm keeping all the numbers to one place of accuracy, since that's what was given originally.) – David Hammen Sep 6 '18 at 14:32 • Also, the hole wasn't all the way through from the interior of the hull to the exterior. It was a hole in the internal layer of the hull, with a bunch of kevlar, aluminum, and other materials in-between that would further insulate his skin and may have potentially lowered the leak rates even more. – Magic Octopus Urn Sep 6 '18 at 19:08 • Using water or gasoline flow rates for comparison is, at least without further discussion, pretty useless. One might also compute that only, like, two grams of honey would drip the hole per second or something, but this wouldn't tell us anything about how much air goes through it. – leftaroundabout Sep 7 '18 at 12:23 • @leftaroundabout My point (which I guess got lost here) is that if not much liquid can escape that hole, air (which is mostly empty space itself) would produce even less pressure. Hobbes' answer was better by calculating pressure itself. – Machavity Sep 7 '18 at 13:40 • You should have used the right one calculator for an air flow. The water flow rate calculator is the wrong one. – Uwe Dec 26 '19 at 21:00 It's not really that the leak was slow, more that it took some time to manifest: Another source told the news agency the worker did not report the error and instead applied a sealant of some sort. After two months in orbit, the sealant apparently dried out, the source said, and was expelled by the cabin air pressure, opening up a leak. (The article is slightly incorrect; MS-09 docked with the ISS on June 06 and the leak was detected on the 29/30 August, so it actually took almost three months to become apparent). After the sealant failed, the leak was detected very quickly, and its small size meant that relatively little atmosphere escaped before the astronauts were able to patch it. Their temporary repair will not be a long-term issue for the ISS - the module with the leak is the orbital module of Soyuz, which is jettisoned to burn up into the atmosphere after the astronauts depart the ISS. • According to the article I referenced, the worker used glue to fix the hole. Had they reported it, they could have fixed it by welding it.. – Machavity Sep 7 '18 at 13:37 • @tsnobip have you seen this answer yet? I think this addresses the timing nicely, but it may have been posted after you accepted the other answer. – uhoh Sep 7 '18 at 18:18 tl;dr: How could the 2018-08-30 Soyuz MS-09 / ISS leak be so slow? By being about 2 millimeters in diameter! @DavidHammen's comment converts 0.8 mbar/hr to about 0.8 m^/hr air loss rate presumably at standard conditions. Let's see how that's done, how it checks against "a 2mm hole" and what it means if there were no response of any kind (human or make-up air). He uses the first order relationships $$\frac{\dot{p}}{p}=\frac{\dot{m}}{m}=\frac{\dot{V}}{V} = 0.8 \times 10^{-3}/hr$$ where I'm guessing $p$ is the pressure of the remaining air (assuming no make-up air and no change in temperature, which is reasonable considering the air is in intimate contact with so much solid surface area), $m$ is the mass of the remaining air, and $V$ is the equivalent volume of the remaining air if it were at standard conditions. An ISS pressurized volume above about 938 m^3 (matches values on the internet) times $$0.8 \times 10^{-3}/hr$$ does indeed give about 0.8 m^3/hr! Now let's see what a 2 mm hole in a thin plate is expected to do. I found two online calculators, although they may have somewhat different assumptions, and the hole has some depth (the wall thickness of the Soyuz at this location) and side roughness, but still we can try. Number 1. gives 2.74E-04 m^3/sec or 1.0 m^3/hr, almost identical to the quoted 0.8 m^3/hr value, and number 2 gives something at least close; about 3 m^3/hr. So baring any make-up air, that's about a 1% drop in pressure every ten hours. That's enough to be alarming, and of course would probably trigger an alarm in less than ten hours since strikes by meteorites and debris so likely over time that one would expect the ISS to be hyper-vigilant about leaks.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.4875454902648926, "perplexity": 1603.2896239261454}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178374391.90/warc/CC-MAIN-20210306035529-20210306065529-00614.warc.gz"}
http://clay6.com/qa/11146/the-linear-momentum-p-of-a-moving-body-varies-with-time-according-to-equati
Browse Questions # The linear momentum p of a moving body varies with time according to equation $p=a+bt^2$ where a,b are constants. Net force acting on the body is a) Constant b) proportional to $t^2$ c) Inversely proportional to t d) proportional to t $F=\large\frac{dp}{dt}=\frac{d}{dt}$$(a+bt^2)$ $F=2bt$ $f \;\alpha\; t$ Net force acting on the body is proportional to t Hence d is the correct answer. edited Jan 26, 2014 by meena.p +1 vote
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8251183032989502, "perplexity": 1410.9605479675272}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720962.53/warc/CC-MAIN-20161020183840-00559-ip-10-171-6-4.ec2.internal.warc.gz"}
https://papers.nips.cc/paper/1989/hash/92c8c96e4c37100777c7190b76d28233-Abstract.html
#### Authors Gintaras Reklaitis, Athanasios Tsirukis, Manoel Tenorio #### Abstract A nonlinear neural framework, called the Generalized Hopfield network, is proposed, which is able to solve in a parallel distributed manner systems of nonlinear equations. The method is applied to the general nonlinear optimization problem. We demonstrate GHNs implementing the three most important optimization algorithms, namely the Augmented Lagrangian, Generalized Reduced Gradient and Successive Quadratic Programming methods. The study results in a dynamic view of the optimization problem and offers a straightforward model for the parallelization of the optimization computations, thus significantly extending the practical limits of problems that can be formulated as an optimization problem and which can gain from the introduction of nonlinearities in their structure (eg. pattern recognition, supervised learning, design of content-addressable memories). 1 To whom correspondence should be addressed. 356 Reklaitis, Tsirukis and Tenorio 1 RELATED WORK The ability of networks of highly interconnected simple nonlinear analog processors (neurons) to solve complicated optimization problems was demonstrated in a series of papers by Hopfield and Tank (Hopfield, 1984), (Tank, 1986). The Hopfield computational model is almost exclusively applied to the solution of combinatorially complex linear decision problems (eg. Traveling Salesman Problem). Unfortunately such problems can not be solved with guaranteed quality, (Bruck, 1987), getting trapped in locally optimal solutions. Jeffrey and Rossner, (Jeffrey, 1986), extended Hopfield's technique to the nonlinear unconstrained optimization problem, using Cauchy dynamics. Kennedy and Chua, (Kennedy, 1988), presented an analog implementation of a network solving a nonlinear optimization problem. The underlying optimization algorithm is a simple transformation method, (Reklaitis, 1983), which is known to be relatively inefficient for large nonlinear optimization problems. 2 LINEAR HOPFIELD NETWORK (LHN) The computation in a Hopfield network is done by a collection of highly interconnected simple neurons. Each processing element, i, is characterized by the activation level, Ui, which is a function of the input received from the external environment, Ii, and the state of the other neurons. The activation level of i is transmitted to the other processors, after passing through a filter that converts Ui to a 0-1 binary value, Vi' The time behavior of the system is described by the following model: ~ T·V· - -' + I· ' ~ 'J J J
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8430560231208801, "perplexity": 1272.461616608657}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336921.76/warc/CC-MAIN-20221001195125-20221001225125-00255.warc.gz"}
https://cstheory.stackexchange.com/questions/35991/np-hardness-on-cayley-graphs/35993
# NP-hardness on Cayley graphs What is known about complexity of NP-hard problems on Cayley graphs? Suppose that the graph is given explicitly as the multiplication table of the group and the list of generators. So the input length is the size of the graph. Can we solve NP-complete problems on such graphs (maximum clique/max-cut) in polynomial time? What about some special cases of groups? For example, $\mathbb{Z}_n$ (a.k.a. circulant graphs) or $\mathbb{Z}_2^{\log(n)}$. That is, the input to the problem is the set of generators (and $1^n$ to represent the size of the graph).
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9370612502098083, "perplexity": 282.1104436839532}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316783.70/warc/CC-MAIN-20190822042502-20190822064502-00541.warc.gz"}
http://www.math.u-szeged.hu/mathweb/index.php/hu/component/jevents/icalrepeat.detail/2021/09/23/1509/-/sadegh-marzban-university-of-szeged-a-hybrid-pde-abm-model-for-infection-dynamics-study-on-stochastic-variability-application-to-sars-cov-2-and-influe?Itemid=110
Év szerint Hónap szerint Ugrás a hónaphoz ## Sadegh Marzban (University of Szeged): A hybrid PDE-ABM model for infection dynamics: study on stochastic variability, application to SARS-COV-2 and influenza, and exploring some treatment options Csütörtök, 23. Szeptember 2021, 11:00 - 12:30 Abstract. We propose a hybrid partial differential equation -- agent-based (PDE--ABM) model to describe the spatio-temporal viral dynamics in a cell population. The virus concentration is considered as a continuous variable and virus movement is modelled by diffusion, while changes in the states of cells (i.e. healthy, infected, dead) are represented by a stochastic agent-based model. The two subsystems are intertwined: the probability of an agent getting infected in the ABM depends on the local viral concentration, and the source term of viral production in the PDE is determined by the cells that are infected. We develop a computational tool that allows us to study the hybrid system and the generated spatial patterns in detail. We systematically compare the outputs with a classical ODE system of viral dynamics, and find that the ODE model is a good approximation only if the diffusion coefficient is large. We demonstrate that the model is able to predict SARS--CoV--2 infection dynamics, and replicate the output of in vitro experiments. Applying the model to influenza as well, we can gain insight into why the outcomes of these two infections are different. Hely : Riesz Lecture Hall, 1st Floor, Bolyai Institute, Aradi Vértanúk tere 1., Szeged
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8074097037315369, "perplexity": 1814.6329929075528}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499634.11/warc/CC-MAIN-20230128121809-20230128151809-00379.warc.gz"}
https://www.assignmentexpert.com/homework-answers/economics/other/question-67442
68 719 Assignments Done 100% Successfully Done In January 2019 # Answer to Question #67442 in Other Economics for saad A. aljibreen Question #67442 In a simultaneous move game, if both charge the low price (LP) they each earn $5K. If both charge the high price (HP) they each earn$10K. If they charge different prices, the one playing LP earns $15K and the other earns$1K. If the businesses play indefinitely, then a Nash Equilibrium is a. for one firm to charge a HP forever b. for your firm charge a LP when the other firm does c. for each firm to charge HP until the rival does not, and then to charge LP d. for each firm to charge LP until the rival does not, and then to charge a HP forever A common solution to a coordination game is a. to issue threats before the game starts b. to change the payoffs c. for one player to accommodate the other d. for one player to go first If the businesses play indefinitely, then a Nash Equilibrium is: d. for each firm to charge LP until the rival does not, and then to charge a HP forever A common solution to a coordination game is: c. for one player to accommodate the other. Need a fast expert's response? Submit order and get a quick answer at the best price for any assignment or question with DETAILED EXPLANATIONS!
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.2934344708919525, "perplexity": 6094.733804283696}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 5, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583700012.70/warc/CC-MAIN-20190120042010-20190120064010-00051.warc.gz"}
http://mathhelpforum.com/calculus/17256-parametric-equations.html
Math Help - Parametric equations 1. Parametric equations Hi, I'm completely lost in this problem .... can someone help me pls? Consider the parametric equations x= 4*cos^2(θ) and y = 2*sin(θ) and fill this chart. When t = -pi/2, x = ? and y = ? When t = -pi/4, x = ? and y = ? When t = pi/4, x = ? and y = ? When t = pi/2, x = ? and y = ? I also have to graph the equation in my pgrahing calculator. I tried to do it but I don't know if I did it right. - Isabel 2. Originally Posted by cuteisa89 Hi, I'm completely lost in this problem .... can someone help me pls? Consider the parametric equations x= 4*cos^2(θ) and y = 2*sin(θ) and fill this chart. When t = -pi/2, x = ? and y = ? When t = -pi/4, x = ? and y = ? When t = pi/4, x = ? and y = ? When t = pi/2, x = ? and y = ? I also have to graph the equation in my pgrahing calculator. I tried to do it but I don't know if I did it right. - Isabel When you say "When t = -pi/2" do you mean "When $\theta$ = -pi/2?" Just plug the angle into the given formulas for x and y. For example: $\theta = \pi/2 \implies x = 4cos^2(\pi/2) = 0 \text{ and }y = 2sin(\pi/2) = 2$ -Dan 3. Yeah.... t= θ. Thanks I think I've got it now. I just wasn't sure how to do it properly. Thanks Dan! 4. Originally Posted by cuteisa89 Hi, I'm completely lost in this problem .... can someone help me pls? Consider the parametric equations x= 4*cos^2(θ) and y = 2*sin(θ) and fill this chart. When t = -pi/2, x = ? and y = ? When t = -pi/4, x = ? and y = ? When t = pi/4, x = ? and y = ? When t = pi/2, x = ? and y = ? I also have to graph the equation in my pgrahing calculator. I tried to do it but I don't know if I did it right. - Isabel x=4(cost)^2=4(1-(sint)^2)=4-(2sint)^2=4-y^2 So it is a parabola like this: Attached Thumbnails
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 2, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8724790215492249, "perplexity": 1207.8493070874908}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776438539.21/warc/CC-MAIN-20140707234038-00003-ip-10-180-212-248.ec2.internal.warc.gz"}
https://web2.0calc.com/questions/nice_3
+0 # Nice! 0 323 2 +816 Find the solutions to $$z^3 = -8.$$ Enter the solutions, separated by commas. Dec 28, 2018 #1 +845 +1 if the question is find z because im not sure, z^3 = -8 (-2)^3 = -8 therefore z = -2 Dec 28, 2018 edited by YEEEEEET  Dec 28, 2018 edited by YEEEEEET  Dec 28, 2018 #2 +109519 +3 That is correct Zeet. The only real solution is z=-2 but I think mathtoo wants the complex solutions too.  It is a cubic so there are 3 solutions altogether. There will be equally spaced at   $$\frac{2\pi}{3}$$   radians apart on the complex plane. So the others are at $$\frac{\pi}{3}\;\;and \;\;\frac{-\pi}{3}$$ The modulus or absolute value is 2 so $$z=-2,\;\;2e^{(\pi/3)i},\;\;2e^{(-\pi/3)i}$$ $$2e^{(\frac{\pi}{3})i}\\=2[cos(\pi/3)+isin(\pi/3)]\\ =2[\frac{1}{2}+i\frac{\sqrt3}{2}]\\ =1+i\sqrt3\\~\\ 2e^{(\frac{\pi}{3})i}\\ =1-i\sqrt3$$ so $$z=-2,\;\;1+i\sqrt3,\;\;1-i\sqrt3$$ Here is the diagramatic representation.  Copied from Wolfram|Alpha. Melody  Dec 28, 2018 edited by Melody  Dec 28, 2018
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9683364629745483, "perplexity": 12013.677723608334}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347423915.42/warc/CC-MAIN-20200602064854-20200602094854-00506.warc.gz"}
http://mathhelpforum.com/number-theory/227581-help-i-m-stuck-question.html
# Math Help - Help I'm stuck with this question: 1. ## Help I'm stuck with this question: Prove that: If n is any integer that is not divisible by 2 or 3 then n^2 mod 12 =1? help i don't know what to do... 2. ## Re: Help I'm stuck with this question: If $n\not| 2$ or $n\not| 3$, then $n^2(\text{mod} 12) \equiv 1$ Is this what you mean? 3. ## Re: Help I'm stuck with this question: Originally Posted by mendax05 Prove that: If n is any integer that is not divisible by 2 or 3 then n^2 mod 12 =1? help i don't know what to do... $\exists\ p \in \mathbb Z\ such\ that\ n = 3p + k,\ where\ k = 1\ or\ k = 2.$ $CASE\ A:\ k = 1.$ Assume p is odd. Then 3p is odd. So 3p + 1 is even. Thus n is even. But by hypothesis n is not evenly divisible by 2 and so is not even. Contradiction. So p is even. $\exists\ q \in \mathbb Z\ such\ that\ 2q = p \implies n = 3p + 1 = 6q + 1 \implies$ $n^2 = 36q^2 + 12q + 1 \implies \dfrac{n^2}{12} = \dfrac{36q^2 + 12q + 1}{12} = 3q^2 + q + \dfrac{1}{12}.$ QED $CASE\ B:\ k = 2.$ Assume p is even. Then 3p is even. So 3p + 2 is even. Thus n is even. But by hypothesis n is not evenly divisible by 2 and so is not even. Contradiction. So p is odd. $\exists\ q \in \mathbb Z\ such\ that\ 2q + 1 = p \implies n = 3p + 2 = 3(2q + 1) + 2 = 6q + 5 \implies$ $n^2 = 36q^2 + 60q + 25 \implies \dfrac{n^2}{12} = \dfrac{36q^2 + 60q + 25}{12} = 3q^2 + 5q + 2 + \dfrac{1}{12}.$ QED 4. ## Re: Help I'm stuck with this question: It finally dawned on me that I made this proof MUCH harder than it needed to be. What we need is this lemma: for any three successive integers, exactly one is evenly divisible by 3. $n\ not\ evenly\ divisible\ by\ 2 \implies n + 1\ and\ n - 1\ evenly\ divisible\ by\ 2.$ $n\ not\ evenly\ divisible\ by\ 3 \implies either\ n + 1\ or\ else\ n - 1\ evenly\ divisible\ by\ 3.$ $\therefore n \pm 1\ is\ evenly\ divisible\ by\ 2\ and\ 3 \implies n \pm 1\ is\ evenly\ divisible\ by\ 6 \implies$ $\exists\ p \in \mathbb Z\ such\ that\ 6p = n \pm 1 \implies n = 6p \pm 1 \implies n^2 = 36p^2 \pm 12p + 1 \implies$ $\dfrac{n^2}{12} = \dfrac{36p^2 \pm 12p + 1}{12} = 3p^2 \pm p + \dfrac{1}{12} = an\ integer + \dfrac{1}{12}. QED.$ 5. ## Re: Help I'm stuck with this question: please don't post multiple copies of the same question. I answered this question here as well.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 3, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.937960684299469, "perplexity": 462.8406222471629}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064538.31/warc/CC-MAIN-20150827025424-00204-ip-10-171-96-226.ec2.internal.warc.gz"}
https://www.gradesaver.com/textbooks/math/algebra/linear-algebra-and-its-applications-5th-edition/chapter-1-linear-equations-in-linear-algebra-1-1-exercises-page-10/18
# Chapter 1 - Linear Equations in Linear Algebra - 1.1 Exercises: 18 No. The planes do not have a point of intersection; i.e., the system of equations is not consistent. #### Work Step by Step Simplifying the augmented matrix to triangular form provides the relations: $x_1=\frac{-14}{6}$, $x_2=\frac{-5}{6}$, and $0=\frac{-5}{6}$. This final condition is not true, so there is no $(x_1, x_2)$ such that the equations for the three specified planes are satisfied. After you claim an answer you’ll have 24 hours to send in a draft. An editor will review the submission and either publish your submission or provide feedback.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8061339855194092, "perplexity": 414.07023493374857}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 5, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589618.52/warc/CC-MAIN-20180717070721-20180717090721-00254.warc.gz"}
https://proceedings.neurips.cc/paper/2020/hash/09ccf3183d9e90e5ae1f425d5f9b2c00-Abstract.html
#### Authors Qian Huang, Horace He, Abhay Singh, Yan Zhang, Ser Nam Lim, Austin R. Benson #### Abstract <p>Incorporating relational reasoning into neural networks has greatly expanded their capabilities and scope. One defining trait of relational reasoning is that it operates on a set of entities, as opposed to standard vector representations. Existing end-to-end approaches for relational reasoning typically extract entities from inputs by directly interpreting the latent feature representations as a set. We show that these approaches do not respect set permutational invariance and thus have fundamental representational limitations. To resolve this limitation, we propose a simple and general network module called Set Refiner Network (SRN). We first use synthetic image experiments to demonstrate how our approach effectively decomposes objects without explicit supervision. Then, we insert our module into existing relational reasoning models and show that respecting set invariance leads to substantial gains in prediction performance and robustness on several relational reasoning tasks. Code can be found at github.com/CUAI/BetterSetRepresentations.</p>
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8799557685852051, "perplexity": 3366.089477514165}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178359497.20/warc/CC-MAIN-20210227204637-20210227234637-00519.warc.gz"}
https://bkamins.github.io/julialang/2022/06/17/missing.html
Introduction Some time ago I have written a post about ABC of handling missing values in Julia. Its objective was to give an introduction to the topic for the newcomers. However, occasionally users complain that working with missing values in Julia is less convenient than in e.g. Python or R. Such opinions are always debatable, so recently I decided to run a small pool on Julia Discourse about the skipmissing function. The question was if we want to shorten the skipmissing name into something that is more convenient to use in interactive work. To my surprise, a vast majority of voters preferred a verbose and explicit operation name. This preference regarding handling of missings, to my surprise, reminded me of several passages from The Zen of Python: • Explicit is better than implicit. • In the face of ambiguity, refuse the temptation to guess. So given this preference, how should Julia users retain convenience. Let me share some of my thoughts on this topic that did not make into my previous post. This post was written under Julia 1.7.2, Missings.jl 1.0.2, MissingsAsFalse.jl 0.1, and StatsBase.jl 0.33.16. Verbosity Indeed writing missing, skipmissing, and passmissing (the last one is defined in Missings.jl), in places where they are needed, might seem verbose. However, the good news is that most of the time you do not have to type them fully thanks to completions so in your editor/REPL: • instead of missing write mis<tab>; • instead of skipmissing write skipm<tab>; • instead of passmissing write pas<tab>. Let us compare. In R: sum(c(1, NA), na.rm=T) vs Julia: sum(skipmissing([1, missing])) seems longer. However, if you take into account the amount of typing you need to do (number of keystrokes) it is the same. Missing values in logical conditions As I have written in this post I personally strongly recommend using coalesce to handle missing values in logical conditions. This allows you, to follow the Explicit is better than implicit. principle by explicitly showing in the code if missing should be treated as true or as false. Here is a short example: julia> c = missing missing julia> c ? "true" : "false" ERROR: TypeError: non-boolean (Missing) used in boolean context julia> coalesce(c, false) ? "true" : "false" "false" However, some users find it more convenient to use @mfalse macro from the MissingsAsFalse.jl package: julia> using MissingsAsFalse julia> @mfalse c ? "true" : "false" "false" Correlation matrix with missing values A common, and relatively complex case of handling missing values, is computing of correlation matrix of data that contains missings. Let us check what Julia offers here. We will use the pairwise function from StatsBase.jl. julia> using Random julia> using StatsBase julia> using Statistics julia> Random.seed!(1234); julia> x = rand([1:10; missing], 16, 4) 16×4 Matrix{Union{Missing, Int64}}: 4 missing 2 10 7 8 missing 8 3 missing 7 5 10 9 8 10 4 2 7 6 5 6 1 missing missing 7 8 9 9 3 2 6 6 7 10 missing 9 3 4 6 7 2 9 8 9 7 3 3 1 8 6 5 3 9 4 7 5 7 3 2 8 5 missing 4 julia> pairwise(cor, eachcol(x)) 4×4 Matrix{Union{Missing, Float64}}: 1.0 missing missing missing missing 1.0 missing missing missing missing 1.0 missing missing missing missing 1.0 julia> pairwise(cor, eachcol(x), skipmissing=:pairwise) 4×4 Matrix{Float64}: 1.0 -0.218849 -0.0177704 0.0922413 -0.218849 1.0 0.00973122 0.102969 -0.0177704 0.00973122 1.0 0.364821 0.0922413 0.102969 0.364821 1.0 julia> pairwise(cor, eachcol(x), skipmissing=:listwise) 4×4 Matrix{Float64}: 1.0 -0.229568 -0.100028 0.247283 -0.229568 1.0 -0.127153 -0.0420058 -0.100028 -0.127153 1.0 0.67068 0.247283 -0.0420058 0.67068 1.0 By default pairwise for cor returns missing when at least one of the columns contains missing values. Use :pairwise value of skipmissing keyword argument to skip entries with a missing value in either of the two vectors passed to cor and use :listwise to skip entries with a missing value in any of the vectors passed to pairwise. In this example we see that since there are several ways how missing values should be handled by cor in pairwise computations, instead of using the skipmissing function, a keyword argument is used allowing to specify what the data scientist wants exactly. A similar situation is in the subset and subset! functions from DataFrames.jl, that also take a skipmissing keyword argument, to simplify handling of logical conditions specifying which rows from a source data frame should be kept. Conclusions In Julia the approach is that handling of missing values is explicit. This choice is guided by the fact that then in the code it is explicitly visible what was the developer’s decision about how they should be treated. This choice makes code more verbose. Today I have tried to show that, especially with a good editor/REPL support, in practice it does not introduce a large overhead.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.5158239603042603, "perplexity": 2395.7970908860757}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103915196.47/warc/CC-MAIN-20220630213820-20220701003820-00665.warc.gz"}
https://lists.nongnu.org/archive/html/auctex-devel/2022-11/msg00019.html
auctex-devel [Top][All Lists] ## Re: scope environment in TikZ From: Arash Esbati Subject: Re: scope environment in TikZ Date: Thu, 10 Nov 2022 14:14:53 +0100 User-agent: Gnus/5.13 (Gnus v5.13) Emacs/29.0.50 Hi Keita, Ikumi Keita <[email protected]> writes: > The next thing I'd like to discuss is scope environment in TikZ. You're drawing some TikZ pictures lately? ;-) > The scope environment is practically always accompanied by an optional > argument by its nature: > \begin{tikzpicture} > \begin{scope}[TikZ options...] > ... > \end{scope} > \end{tikzpicture} > In other words, its "optional" argument is virtually a kind of mandatory > argument. I'm not familiar with TikZ, but I had a brief look at the manual and indeed, using the scope environment without options is pretty pointless. > So I'm thinking to apply the attached patch. It modifies the AUCTeX > behavior with respect to the scope environment to insert a bracket pair > "[]" even when the user gave empty answer for query of optional > argument. In addition, it moves the point inside in that empty "[]", > assuming that the user actually expects to fill in that bracket > immediately, possibly with the help of in-buffer completion facility. Keep in mind that if you want to use in-buffer completion when you're inside the brackets, you need (TeX-arg-key-val key=vals)' in the hook, so I think the best would be if you could see if you achieve what you're looking after with LaTeX-env-args' -- but I think that wouldn't work because of the (save-excursion ...) it uses? > I admit that it might be a bit too aggresive. What do you think about > this idea? See above. Patching ConTeXt-insert-environment' seems reasonable to me. Best, Arash `
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9195736646652222, "perplexity": 6802.666797250063}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500619.96/warc/CC-MAIN-20230207134453-20230207164453-00466.warc.gz"}
https://lavelle.chem.ucla.edu/forum/search.php?author_id=16276&sr=posts&sid=6c724b216d8465756a23932c4c1ff857
## Search found 111 matches Sat Mar 14, 2020 5:48 pm Forum: Reaction Mechanisms, Reaction Profiles Topic: Order of Reactions Replies: 4 Views: 115 ### Re: Order of Reactions For an elementary step, the coefficients double as the order of the reactants. The order for a non-elementary reaction cannot be determined from the formula, only experimentally. Sat Mar 14, 2020 5:44 pm Forum: General Rate Laws Topic: Elementary steps Replies: 3 Views: 140 ### Re: Elementary steps Elementary steps make up each baby-step of the reaction, and sum to the total reaction. The total reaction is usually a non-elementary step. Sat Mar 14, 2020 5:43 pm Forum: Ideal Gases Topic: 5% Rule Replies: 6 Views: 228 ### Re: 5% Rule You also know that you can use the approximation if your equilibrium constant, K, is small enough. Sat Mar 14, 2020 5:41 pm Forum: Ideal Gases Topic: Kc Replies: 7 Views: 169 ### Re: Kc You use any products and reactants so long as they are not liquids or solids. Tue Mar 10, 2020 6:45 pm Forum: Arrhenius Equation, Activation Energies, Catalysts Topic: Activation Energy vs. Free Energy of Activation Replies: 3 Views: 94 ### Activation Energy vs. Free Energy of Activation What is the difference between activation energy and free energy of activation? Thu Mar 05, 2020 10:00 pm Forum: Method of Initial Rates (To Determine n and k) Topic: Determining n Replies: 5 Views: 161 ### Re: Determining n Do you mean n in electrochemistry, for the number of moles of electrons being transferred? Or n in kinetics, for the order of the reaction? Thu Mar 05, 2020 9:54 pm Forum: Method of Initial Rates (To Determine n and k) Topic: units of k Replies: 9 Views: 212 ### Re: units of k If the reaction is zero-order, K has units of M/s If the reaction is first-order, K has units of 1/s If the reaction is second-order, K has units of 1/M.s Thu Mar 05, 2020 4:48 pm Forum: General Rate Laws Topic: First vs Second Order Rate Laws Replies: 3 Views: 78 ### Re: First vs Second Order Rate Laws Increasing the concentration of a reactant does NOT increase the rate of the reaction. But as stated above, an increase in concentration would have a greater effect on a second rate reaction than a first rate reaction due to the exponent. Thu Mar 05, 2020 4:36 pm Forum: Kinetics vs. Thermodynamics Controlling a Reaction Topic: Comparing Experimental Data Replies: 3 Views: 123 ### Re: Comparing Experimental Data We created a ratio of concentration 2/concentration 1, both of which were raised to the power of m. 2.0 was the value of that ratio (2.0^m). The ratio of the actual rates was also 2, so m must be 1. Mon Mar 02, 2020 9:25 pm Forum: Galvanic/Voltaic Cells, Calculating Standard Cell Potentials, Cell Diagrams Topic: Inert Electrode Replies: 1 Views: 73 ### Inert Electrode How do you know if a half reaction needs an inert electrode like Pt? Sun Mar 01, 2020 10:34 pm Forum: Balancing Redox Reactions Topic: Self Test 6L.3 Replies: 1 Views: 84 ### Self Test 6L.3 I don't understand how the textbook found this answer. The questions asks us to write the chemical equation corresponding to a cell, and I found the correct oxidation and reduction equations, but not the correct full equation. reduction : Hg2(NO3)2 + 2e- --> 2Hg + 2NO3- oxidation : 2Hg + 2HCl --> Hg... Thu Feb 27, 2020 9:59 pm Forum: Work, Gibbs Free Energy, Cell (Redox) Potentials Topic: cell potential Replies: 3 Views: 111 ### Re: cell potential Cell potential is greatest when the cell reaction first begins to occur. Following this, the concentrations change and the potential is no longer at its maximum value. Thu Feb 27, 2020 9:57 pm Forum: Interesting Applications: Rechargeable Batteries (Cell Phones, Notebooks, Cars), Fuel Cells (Space Shuttle), Photovoltaic Cells (Solar Panels), Electrolysis, Rust Topic: Metal dissolution Replies: 10 Views: 495 ### Re: Metal dissolution I understand how to determine this based on Ecell values, but how would we determine this based off electrochemical properties?? Thu Feb 27, 2020 9:54 pm Forum: Balancing Redox Reactions Topic: Acidic/Basic Solutions Replies: 3 Views: 60 ### Re: Acidic/Basic Solutions We should be given that information because that affects how we solve the problem. Thu Feb 27, 2020 9:50 pm Forum: Balancing Redox Reactions Topic: When to add H+ or H20 Replies: 19 Views: 444 ### Re: When to add H+ or H20 You add H2O to balance the oxygen, and H+ to balance the hydrogen in an acidic solution. You add OH- to balance the oxygen, and H2O to balance the hydrogen in a basic solution. Thu Feb 27, 2020 9:48 pm Forum: Work, Gibbs Free Energy, Cell (Redox) Potentials Topic: Where to find Ecell values Replies: 15 Views: 274 ### Re: Where to find Ecell values Does anyone know when you would flip the sign in a half relation? I know that if you flip the equation the sign flips, but then do you not do this when calculating E(cell)? like if they give you the E value in the problem and the equation has to be flipped do you flip the sign? The Ecell values giv... Sat Feb 22, 2020 11:01 pm Forum: Balancing Redox Reactions Topic: Basic conditions Replies: 6 Views: 124 ### Re: Basic conditions In an acidic solution, you add H+ to balance the hydrogen in the equation. In a basic solution, however, you add OH- to balance the hydrogens (and then add H2O to balance that change in oxygen). Sat Feb 22, 2020 11:00 pm Forum: Appications of the Nernst Equation (e.g., Concentration Cells, Non-Standard Cell Potentials, Calculating Equilibrium Constants and pH) Topic: electrochemical series Replies: 4 Views: 122 ### Re: electrochemical series This is just a table, like what can be found in Appendix 2A for enthalpy, entropy, etc. Sat Feb 22, 2020 10:59 pm Forum: Student Social/Study Group Topic: Curve? Replies: 50 Views: 2138 ### Re: Curve? There is no specific guideline for this, Lavelle just "curves" according to the final, total class averages. Not much hope though, considering the average on the midterm was fairly high. Thu Feb 20, 2020 6:06 pm Forum: Galvanic/Voltaic Cells, Calculating Standard Cell Potentials, Cell Diagrams Topic: Reaction A Replies: 1 Views: 61 ### Reaction A What is reaction A? The textbook keeps referring to a 'reaction A' in order to find the amount of moles in a reaction. Can someone please explain and/or provide me with the page in the textbook that introduces this? Wed Feb 19, 2020 7:53 pm Forum: Galvanic/Voltaic Cells, Calculating Standard Cell Potentials, Cell Diagrams Topic: Hydrogen Galvanic Cell Replies: 1 Views: 89 ### Hydrogen Galvanic Cell The textbook states "Not all electrode reactions include a conducting solid as a reactant or product. For example, to use the reduction 2H+ + 2e- --> H2 at an electrode, a chemically inert metallic conductor, such as an unreactive metal or graphite, must carry the electrons into or out of the e... Sun Feb 16, 2020 2:02 pm Forum: Reaction Enthalpies (e.g., Using Hess’s Law, Bond Enthalpies, Standard Enthalpies of Formation) Topic: Hess Law Replies: 6 Views: 131 ### Re: Hess Law In order to use Hess's Law, you should be given multiple reactions so that you can add/subtract them as needed. Maybe if you aren't given multiple equations, you could use the reaction enthalpies for the formation of all the products and reactants, and create the equations yourself (ie creating an e... Sun Feb 16, 2020 1:58 pm Forum: Balancing Redox Reactions Topic: half reaction Replies: 8 Views: 147 ### Re: half reaction A half reaction is when a redox reaction is broken up into the reduction or oxidation components. Tue Feb 11, 2020 10:43 pm Forum: Entropy Changes Due to Changes in Volume and Temperature Topic: Change in entropy of an irreversible process. Replies: 3 Views: 62 ### Re: Change in entropy of an irreversible process. Jack Riley 4f wrote:delta S of the surroundings does equal 0 because it is free expansion, but delta S total must still increase so that only leaves delta S of the system to contribute to this. Thus, delta S total = delta S system =/= 0 Why does deltaS still have to increase? Tue Feb 11, 2020 9:10 pm Forum: Heat Capacities, Calorimeters & Calorimetry Calculations Topic: deltaU for an ideal gas Replies: 2 Views: 61 ### deltaU for an ideal gas Can someone please explain how to derive/where these equations come from? deltaU = 3/2nRdeltaT = 0 and Utot = 3/2nRT both for an ideal gas. Tue Feb 11, 2020 12:45 pm Forum: Concepts & Calculations Using Second Law of Thermodynamics Topic: Spontaneity - Enthalpy Replies: 1 Views: 52 ### Spontaneity - Enthalpy Is a spontaneous process accompanied by an increase in entropy of the surroundings, or of the system? Tue Feb 11, 2020 12:42 pm Forum: Entropy Changes Due to Changes in Volume and Temperature Topic: Change in entropy of an irreversible process. Replies: 3 Views: 62 ### Change in entropy of an irreversible process. Why is deltaS of an irreversible process not equal to zero? For example, 4I.9 states that for the irreversible process, deltaS is the same as deltaS for the reversible process. This does not make sense to me, because the process in this example is also free expansion. Therefore, w= 0, deltaU= 0, and... Tue Feb 11, 2020 12:37 pm Forum: Entropy Changes Due to Changes in Volume and Temperature Topic: How to think of entropy? Replies: 2 Views: 47 ### How to think of entropy? Prof. Lavelle has said multiple times not to think of entropy as disorder. If we don't think of entropy as disorder, how should we think of it? Sun Feb 09, 2020 2:16 pm Forum: Gibbs Free Energy Concepts and Calculations Topic: Entropy units Replies: 7 Views: 180 ### Re: Entropy units I'm sure either are fine, but if you have a large number of joules (1000+), it might be more useful to provide the answer in kilojoules. Sun Feb 09, 2020 2:15 pm Forum: Non-Equilibrium Conditions & The Reaction Quotient Topic: solids and liquids in the rxn quotient Replies: 8 Views: 169 ### Re: solids and liquids in the rxn quotient Yes, liquids and solids are excluded from calculating K or Q. Sun Feb 09, 2020 2:11 pm Forum: Entropy Changes Due to Changes in Volume and Temperature Topic: Cm Replies: 4 Views: 69 ### Re: Cm Cm is the molar specific heat of the compound. Sun Feb 09, 2020 2:10 pm Forum: Reaction Enthalpies (e.g., Using Hess’s Law, Bond Enthalpies, Standard Enthalpies of Formation) Topic: ST 4A.1A [ENDORSED] Replies: 3 Views: 337 ### Re: ST 4A.1A[ENDORSED] Chem_Mod wrote:What answer did you get? It might be an error because other students are getting different numbers as well. I got -.94kJ, not -.86kJ. I got -.95kJ as well. Tue Feb 04, 2020 2:21 pm Forum: Reaction Enthalpies (e.g., Using Hess’s Law, Bond Enthalpies, Standard Enthalpies of Formation) Topic: C = K? Replies: 5 Views: 143 ### C = K? Example 4A.4 in the textbook gives a change in temperature in celsius, then states that it is the same amount in kelvin. How is this possible? Tue Feb 04, 2020 2:13 pm Forum: Reaction Enthalpies (e.g., Using Hess’s Law, Bond Enthalpies, Standard Enthalpies of Formation) Topic: ST 4A.1A [ENDORSED] Replies: 3 Views: 337 ### ST 4A.1A[ENDORSED] I've done this problem so many times and I can't get the right answer. Can someone please write out the solution? Water expands when it freezes. How much work does 100. g of water do when it freezes at 0 deg. C and pushes back the metal wall of a pipe that exerts an opposing pressure of 1070 atm? Th... Wed Jan 29, 2020 7:25 pm Forum: Heat Capacities, Calorimeters & Calorimetry Calculations Topic: q vs deltaH Replies: 6 Views: 71 ### Re: q vs deltaH q represents the transfer of heat to or from the system. Delta H represents the sum of the internal energy in the system, taking into account the system's pressure and volume when necessary. Wed Jan 29, 2020 7:24 pm Forum: Heat Capacities, Calorimeters & Calorimetry Calculations Topic: memorize Replies: 6 Views: 83 ### Re: memorize We should be given a table with a number of different values, including the heat capacity of various elements/compounds. Wed Jan 29, 2020 7:23 pm Forum: Reaction Enthalpies (e.g., Using Hess’s Law, Bond Enthalpies, Standard Enthalpies of Formation) Topic: Enthalpies Replies: 4 Views: 68 ### Re: Enthalpies The standard enthalpy of formation is the change in enthalpy that accompanies the formation of one mole of a compound from its elements. The standard enthalpy of reaction is the change in enthalpy that occurs in a system when one mole of matter is transformed by a chemical reaction. Wed Jan 29, 2020 7:19 pm Forum: Reaction Enthalpies (e.g., Using Hess’s Law, Bond Enthalpies, Standard Enthalpies of Formation) Topic: Delta U Replies: 6 Views: 64 ### Re: Delta U Delta U is the internal energy of the system/reaction, or the total store of energy in a system. One way delta U can be calculated is by subtracting the internal energy of the initial system from the internal energy of the final system. Wed Jan 29, 2020 7:17 pm Forum: Reaction Enthalpies (e.g., Using Hess’s Law, Bond Enthalpies, Standard Enthalpies of Formation) Topic: Exothermic and Endothermic Replies: 11 Views: 439 ### Re: Exothermic and Endothermic The enthalpy for an exothermic reaction is negative because the system/reaction loses energy, and the surroundings gain energy. Similarly, an endothermic reaction requires energy, so the enthalpy value is positive. Sun Jan 26, 2020 9:02 pm Forum: Phase Changes & Related Calculations Topic: Enthalpy is said to be additive Replies: 10 Views: 122 ### Re: Enthalpy is said to be additive Enthalpy is additive because it is a state function, meaning it can be added or subtracted. Sun Jan 26, 2020 9:01 pm Forum: Phase Changes & Related Calculations Topic: Heat v Enthalpy Replies: 3 Views: 60 ### Re: Heat v Enthalpy Enthalpy is a state function that keeps tract of the losses of energy during heat transfer. Heat itself, however, like work, is not a state function because it depends on the path used to go from the initial to the final state. Sun Jan 26, 2020 8:58 pm Forum: Phase Changes & Related Calculations Topic: Phase Changes Replies: 7 Views: 99 ### Re: Phase Changes You should calculate the enthalpy, then add the enthalpy of the phase change. Sun Jan 26, 2020 8:45 pm Forum: Phase Changes & Related Calculations Topic: Why does steam cause burns? Replies: 29 Views: 372 ### Re: Why does steam cause burns? The steam has much higher enthalpy than the liquid, because more heat is required to achieve a gaseous state. Therefore, when it comes into contact with your skin and quickly condenses, it releases a large amount of heat in comparison to that that would be released by the liquid state. Sat Jan 25, 2020 6:47 pm Forum: Phase Changes & Related Calculations Replies: 5 Views: 83 What order did Prof. Lavelle recommend we read the textbook in, since he said he was going out of order for the Thermochemistry outline? Sat Jan 18, 2020 9:18 pm Forum: Applying Le Chatelier's Principle to Changes in Chemical & Physical Conditions Topic: 5.39 Replies: 1 Views: 29 ### 5.39 5.39 part b asks us to find the new equilibrium concentrations of two gases when the volume of the flask they are contained in is reduced by half. The original concentration of one of the gases was 0.020 M. The solutions manual immediately finds that the new concentration of this gas is 0.040 M. How... Fri Jan 17, 2020 3:23 pm Forum: Equilibrium Constants & Calculating Concentrations Topic: Kc & Kp Replies: 12 Views: 116 ### Re: Kc & Kp Can we just use K and not specify Kc or Kp? Or would we be marked down? Fri Jan 17, 2020 3:20 pm Forum: Ideal Gases Topic: PV=nRT equation manipulation Replies: 13 Views: 259 ### Re: PV=nRT equation manipulation Manipulating the PV=nRT is helpful because P gives the partial pressure of gases, which we can use when the problem provides us only with molar concentrations. Fri Jan 17, 2020 3:17 pm Forum: Non-Equilibrium Conditions & The Reaction Quotient Topic: Partial Pressure Replies: 19 Views: 151 ### Re: Partial Pressure How can we convert between atm and bars? The examples in the book show that the conversion is not 1:1. Fri Jan 17, 2020 3:11 pm Forum: Applying Le Chatelier's Principle to Changes in Chemical & Physical Conditions Topic: Inert Gas does not change pressure? Replies: 7 Views: 103 ### Re: Inert Gas does not change pressure? Do you have to change the volume in order to change the pressure? Or would adding a non-inert gas affect pressure as well? Wed Jan 15, 2020 9:10 pm Forum: Non-Equilibrium Conditions & The Reaction Quotient Topic: Self Test 5I.3b Replies: 4 Views: 47 ### Self Test 5I.3b I'm not sure how to start the calculations for Self Test 5I.3b. Can anyone explain how to begin? Hydrogen chloride gas is added to a reaction vessel containing solid iodine until its partial pressure reaches 0.012 bar. At the temperature of the experiment, K = 3.5 x 10^-32 for 2HCl(g) + I2(s) -> 2HI... Fri Jan 10, 2020 11:17 am Forum: Ideal Gases Topic: Understanding Q Replies: 13 Views: 134 ### Re: Understanding Q I believe we would omit pure solids and liquids because Q is calculated in the same way as K. Fri Jan 10, 2020 11:16 am Forum: Ideal Gases Topic: Solving for K (coefficients) Replies: 11 Views: 156 ### Re: Solving for K (coefficients) The reactants/products don't have to be in a specific order in the calculation of K itself, but the stoichiometric coefficients should be assigned to their respective reactant/product. Fri Jan 10, 2020 11:15 am Forum: Ideal Gases Topic: What is the Importance of homogeneous vs heterogeneous equilibria [ENDORSED] Replies: 12 Views: 221 ### Re: What is the Importance of homogeneous vs heterogeneous equilibria[ENDORSED] I believe it is important so that we use the correct state when calculated K (using brackets for aqueous reactants/products, P for gaseous reactants/products, and knowing not to include pure solids and liquids in the calculation). Fri Jan 10, 2020 11:13 am Forum: Ideal Gases Topic: K Replies: 10 Views: 135 ### Re: K Kc and Kp are the same, they are just used for reactions in different states. Fri Jan 10, 2020 11:12 am Forum: Ideal Gases Topic: Difference between K and Q Replies: 9 Views: 84 ### Re: Difference between K and Q Q can be taken at any point in a reaction while K is taken when the reaction has reached equilibrium. If K = Q, then the reaction was in equilibrium at the time Q was taken. K and Q can be compared to each other in order to determine if the forward or reverse reaction is favored. Thu Dec 05, 2019 5:10 pm Forum: Naming Topic: Ammine vs. Amine Replies: 1 Views: 47 ### Ammine vs. Amine When are we supposed to use ammine, and when should we use amine? For example, ethylenediamine (en) uses amine and has NH2 groups, but the ligand HN3 is called ammine. What is the reasoning? What about NH4+? Wed Dec 04, 2019 11:29 pm Forum: Shape, Structure, Coordination Number, Ligands Topic: Ligand Names Replies: 2 Views: 57 ### Ligand Names Are the ligands on the test (that we are expected to know) limited to the ligand table Prof. Lavelle created (named Ligand Names in Coordination Compounds)? Or are we expected to be able to recall more? Wed Dec 04, 2019 11:11 pm Forum: Naming Topic: Naming Compounds Replies: 2 Views: 55 ### Re: Naming Compounds I was hoping these wouldn't be on the final... but I'd like to know the answer as well. Wed Dec 04, 2019 11:10 pm Forum: Quantum Numbers and The H-Atom Topic: 1E.5 part d Replies: 1 Views: 102 ### Re: 1E.5 part d The more electron shielding an electron has, the lower the Zeff it experiences. Because the 1s orbital has more density near the nucleus than the 1p orbital, it is said to shield the 1p orbital from the full effective charge of the nucleus, Zeff. Key misunderstanding here is that the s and p orbital... Wed Dec 04, 2019 10:58 pm Forum: Properties & Structures of Inorganic & Organic Acids Topic: Stronger acid? Replies: 13 Views: 631 ### Re: Stronger acid? HCLO2 would be the stronger acid, because the greater the # of oxygen atoms attached to the central atom, the stronger the acid. Wed Dec 04, 2019 6:14 pm Forum: Calculating pH or pOH for Strong & Weak Acids & Bases Topic: K constant and pK value Replies: 3 Views: 50 ### K constant and pK value Do we need to know how to calculate the Ka, acid dissociation constant, and Kb, the base dissociation constant? Or are these the same as the K constant itself? Also, is Kw within our scope? Sun Dec 01, 2019 5:34 pm Forum: Lewis Acids & Bases Topic: acid v. base? Replies: 16 Views: 283 ### Re: acid v. base? The Lewis structure of a Lewis acid typically has a positive charge, making them capable and likely to accept an electron pair. Lewis bases typically have a lone pair available to donate. Sun Dec 01, 2019 5:28 pm Forum: Conjugate Acids & Bases Topic: NH3, acid or base? Replies: 12 Views: 4052 ### Re: NH3, acid or base? Ammonia is considered a Bronsted base because it loses its lone pair and accepts a proton to become NH4+. Sun Dec 01, 2019 5:20 pm Forum: Calculating pH or pOH for Strong & Weak Acids & Bases Topic: pH scale Replies: 12 Views: 190 ### Re: pH scale pH cannot be negative, which is why the formula for calculating pH is -log(H3O+). Sun Dec 01, 2019 5:15 pm Forum: Industrial Examples Topic: Biological examples of co-ordination compounds Replies: 3 Views: 175 ### Re: Biological examples of co-ordination compounds Prof. Lavelle did spend a significant amount of time on cisplatin, so I think we should understand that and the distinction between cis and trans. Sun Dec 01, 2019 5:10 pm Forum: Naming Topic: How to Know the Charge of Ions Replies: 7 Views: 152 ### How to Know the Charge of Ions How are we expected to know the charge of ions quickly (SO4 2-, CO3 2-)? Are we going to be given the ligand table shared by Prof. Lavelle on the final? If not, what is the method for accurately determining the charge of an ion? Sat Nov 23, 2019 9:50 pm Forum: Sigma & Pi Bonds Topic: How to Find Sigma Bonds and Pi Bonds Replies: 15 Views: 530 ### Re: How to Find Sigma Bonds and Pi Bonds The Lewis structure shows you how many single/double/triple bonds there are. Single bond = 1 sigma bond Double bond = 1 sigma bond + 1 pi bond Triple bond = 1 sigma bond + 2 pi bonds Sat Nov 23, 2019 9:47 pm Forum: Hybridization Topic: Hybridization Notation Replies: 5 Views: 95 ### Re: Hybridization Notation It should be written sp^3d. Sat Nov 23, 2019 9:46 pm Forum: Bronsted Acids & Bases Topic: Bronsted Acids vs Lewis acids Replies: 4 Views: 55 ### Re: Bronsted Acids vs Lewis acids I think they're two different acid-base theories; the difference is that a Lewis theory states that an acid is an electron acceptor and a base is an electron donor, and the Bronsted theory states that an acid is a proton donor and a base is a proton acceptor. Sat Nov 23, 2019 9:37 pm Forum: Shape, Structure, Coordination Number, Ligands Topic: Coordinate covalent bonds Replies: 2 Views: 41 ### Re: Coordinate covalent bonds I think the difference is that in a covalent bond, both atoms contribute electrons to the bond, but in a coordinate covalent bond, both electrons of the bond are donated from one of the atoms. Sat Nov 23, 2019 9:36 pm Forum: Naming Topic: Naming order Replies: 2 Views: 62 ### Re: Naming order The ligands should be ordered alphabetically Sun Nov 17, 2019 6:04 pm Forum: Octet Exceptions Topic: Octet expansion Replies: 6 Views: 259 ### Re: Octet expansion Elements in the p-block of the 3rd period or lower can have expanded octets. I don't think we've learned the maximum amount of electrons they can hold. Sun Nov 17, 2019 6:02 pm Forum: Determining Molecular Shape (VSEPR) Topic: single, double, and triple bonds Replies: 6 Views: 142 ### Re: single, double, and triple bonds Regardless of how many electrons are held within the bond, they all act as a single unit because they all lie in the same region. Sun Nov 17, 2019 6:00 pm Forum: SI Units, Unit Conversions Topic: Memorizing Conversions Replies: 25 Views: 645 ### Re: Memorizing Conversions The constants and equations sheet is on the class website, and that's the same one given for the midterm and final. You should check it out, and if there's anything that is not on there, you should memorize it. Sun Nov 17, 2019 5:56 pm Forum: Determining Molecular Shape (VSEPR) Replies: 7 Views: 137 Lavelle uses the class average at the end of the quarter to assign final grades.. I'd like to know an approximate of what an A would be though, percentage wise. Sun Nov 17, 2019 5:54 pm Forum: Formal Charge and Oxidation Numbers Topic: Calculating formal charge Replies: 8 Views: 259 ### Re: Calculating formal charge You should just calculate the formal charges of all the atoms, and use all of them to determine whether or not you need to change the structure (bonds/lone pairs). Sun Nov 10, 2019 1:59 pm Forum: Polarisability of Anions, The Polarizing Power of Cations Topic: Can polar molecules be more polar than another? Replies: 5 Views: 82 ### Re: Can polar molecules be more polar than another? Yes, some polar molecules can be more polar than another. This is related to the molecule's differences in electronegativity as well as their symmetry. Sun Nov 10, 2019 1:55 pm Forum: Dipole Moments Topic: Boiling Point Replies: 11 Views: 200 ### Re: Boiling Point Boiling points relate to dipole-dipole interactions because as the strength of these interactions increases, more energy is required to separate the molecules, leading to a proportional increase in boiling point. Sun Nov 10, 2019 1:53 pm Forum: Electronegativity Topic: Ionization energy of O vs N Replies: 6 Views: 338 ### Re: Ionization energy of O vs N It's easier understand this if you look at it visually, by drawing out the p-orbitals for each atom. N has one electron in each p-orbital, and O has one electron in 2 of the orbitals, and two electrons in one of the orbitals. N's electron configuration is more stable because its orbitals are half-fi... Sun Nov 10, 2019 1:45 pm Forum: Octet Exceptions Topic: General principles of octet exception Replies: 7 Views: 101 ### Re: General principles of octet exception When a central atom has empty d-orbitals close in energy to valence orbitals, it can accommodate an expanded octet. Basically, atoms in the p-block of period 3+ can accommodate an expanded octet, but the size of the central atom also matters. It has to be physically capable of forming bonds to more ... Sun Nov 10, 2019 1:43 pm Forum: SI Units, Unit Conversions Topic: Homework from Outline 3 due? Replies: 5 Views: 239 ### Re: Homework from Outline 3 due? I'd think the homework should be from Outline 3, considering the midterm only covered through 2D, and we haven't even really covered much of 2F or 2E yet. Sat Nov 02, 2019 10:51 pm Forum: Ionic & Covalent Bonds Topic: ionic vs. covalent Replies: 7 Views: 105 ### Re: ionic vs. covalent When drawing our Lewis structures, is it necessary to indicate if bonds are covalent or ionic? Sat Nov 02, 2019 10:45 pm Forum: Resonance Structures Topic: Visual structure of resonance structure Replies: 3 Views: 67 ### Re: Visual structure of resonance structure The electrons are not divided! Resonance just means that there are multiple possibilities for how the electrons are distributed around the structure. Sat Nov 02, 2019 10:43 pm Forum: Lewis Structures Topic: Lewis Structures Replies: 9 Views: 148 ### Re: Lewis Structures I think we're supposed to draw the one that is the most stable, i.e. lowest formal charges for each atom (I think that's what you're referring to by 'lowest energy'). Sat Nov 02, 2019 10:42 pm Forum: Ionic & Covalent Bonds Topic: Midterm Replies: 28 Views: 490 ### Re: Midterm The midterm will include outlines 1 and 2, and most of the curriculum from outline 3. It stops where the Friday lecture ended. Sat Nov 02, 2019 10:41 pm Forum: Wave Functions and s-, p-, d-, f- Orbitals Topic: Filling of Orbitals Replies: 2 Views: 52 ### Filling of Orbitals Why is the d-orbital filled before the s-orbital is filled for some atoms? For example, the electron configuration for Silver is [KR] 4d^10 5s^1. Why is the electron configuration not [KR] 4d^9 5s^2? Sun Oct 27, 2019 7:47 pm Forum: Wave Functions and s-, p-, d-, f- Orbitals Topic: p-orbitals Replies: 11 Views: 138 ### Re: p-orbitals You should use the simplified form unless specified otherwise (i.e. if the question wants to know which orbitals are occupied). Sun Oct 27, 2019 7:31 pm Forum: Trends in The Periodic Table Topic: Cations Replies: 8 Views: 151 ### Re: Cations Cations are smaller than their parents atoms because they have less electrons. Similarly, anions are larger than their parent atoms, because they have more electrons. Sun Oct 27, 2019 7:28 pm Forum: Formal Charge and Oxidation Numbers Topic: Formal Charge and Lone Pairs Replies: 4 Views: 111 ### Re: Formal Charge and Lone Pairs You count the number of bonded electrons, not the number of pairs. Sun Oct 27, 2019 7:16 pm Forum: General Science Questions Topic: Study Guides Replies: 6 Views: 117 ### Re: Study Guides If you purchased the textbook bundle from UCLA, there is a resource called Sapling Learning that is similar to Prof. Lavelle's focus topics, and I believe they have practice problems as well. Sun Oct 27, 2019 7:13 pm Forum: Properties of Electrons Topic: Electron removal Replies: 11 Views: 184 ### Re: Electron removal Ionization energy decreases as the size of the orbital increases. This is because as the orbital size increases, electrons become farther from the nucleus, and therefore farther from its positive charge, making them easier to remove than core electrons. Sun Oct 20, 2019 4:00 pm Forum: Properties of Electrons Topic: Shared Electrons Replies: 4 Views: 93 ### Re: Shared Electrons This has to do with Hund's rule. Basically, if more than 1 orbital in a sub shell is available, you should add electrons with parallel spins to different orbitals before filling up a singular orbital. This configuration has slightly lower energy than that of a paired arrangement because it maximizes... Sun Oct 20, 2019 3:51 pm Forum: Properties of Light Topic: Equations and Constants Replies: 6 Views: 109 ### Re: Equations and Constants Also, I don't believe the conversions are provided on the tests (all the 10^x formulas). Sun Oct 20, 2019 3:41 pm Forum: Properties of Light Topic: Unit for Wavelength Replies: 34 Views: 533 ### Re: Unit for Wavelength The unit for wavelength is meters... but, we aren't provided the conversions to nanometers, picometers, etc. on tests, so you should memorize the conversions for these. Sun Oct 20, 2019 3:37 pm Forum: Properties of Light Topic: Modules Replies: 5 Views: 108 ### Re: Modules Sapling Learning is a similar kind of resource. You should have access to it if you purchased the textbook bundle through UCLA, and there are some learning objective courses on there. Sun Oct 20, 2019 3:31 pm Forum: Properties of Light Topic: Balmer and Lyman series. Replies: 2 Views: 82 ### Balmer and Lyman series. Can someone please explain the significant of the Balmer and Lyman series'? I understand they are both sequences of lines corresponding to atomic transitions, but what is their use in this level of chemistry? Are the series going to be incorporated into questions, or are they provided to increase th... Sat Oct 12, 2019 11:13 pm Forum: DeBroglie Equation Topic: Knowing Which Equation to Use Replies: 4 Views: 134 ### Re: Knowing Which Equation to Use I usually begin by circling the quantities and units given in the problem, and what type of unit I need to find. Then, I just find which equation allows me work between what is given and the unknown. Sat Oct 12, 2019 11:10 pm Forum: DeBroglie Equation Topic: De Broglie's Equation Replies: 2 Views: 53 ### Re: De Broglie's Equation De Broglie's equation is reserved for objects that mass, like electrons, cars, or baseballs. Since light is, by definition, mass-less, De Broglie's equation does not apply. The wavelength of light can be determined given the speed and frequency of the light wave, as wavelength = c/v. Sat Oct 12, 2019 11:05 pm Forum: Properties of Electrons Topic: Wavelength and Electrons Replies: 4 Views: 76 ### Re: Wavelength and Electrons Wavelength depends on the speed that the object is moving at. The wavelength of any given electron is not constant. Wavelength can be determined using the De Broglie equation: h (Planck's constant) / (mass)(velocity) of the given object. Sat Oct 12, 2019 10:55 pm Forum: Properties of Light Topic: Equations We’ve Learned So Far Replies: 11 Views: 315 ### Re: Equations We’ve Learned So Far Anyone have any tips for distinguishing between formulas designated for electrons vs those related to light? I'm having trouble keeping all their meanings and uses straight.
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8250133395195007, "perplexity": 5388.553616925005}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038464146.56/warc/CC-MAIN-20210418013444-20210418043444-00612.warc.gz"}
https://eulumdat.blogspot.com/2015/05/improved-checks-and-privacy-in.html
## Wednesday, May 27, 2015 ### IES syntax coloring, keyword content assist in EulumdatTools 0.14.6.v20160115 A new version of EulumdatTools 0.14.6.v20160115 was published on January 15 at http://www.fold1.com/eulumdattools/. #### Improvements 0.14.6 • Improved IES syntax coloring, now also indicating periods as field separators • Added a QuickFix for missing item code in standard version and duplicate item code in sandbox version for EULUMDAT files. You can fill in product code from filename or product name. #### Improvements 0.14.5 • Code quality improvements #### Improvements 0.14.4 • IES file keywords now have content assist, activated on CTRL+SPACE on Windows/Linux and CMD+SPACE on Mac • IES files now have syntax coloring, with illegal characters immediately showing up in RED! • Fixed issue with hard coded expiry date #### Improvements 0.14.3 • All versions of EulumdatTools are now based on Eclipse 4.5.1 Mars. To upgrade reinstall from the download site listed below. The Mac version now looks like a regular Mac application. • Make it possible to retain Testlab and Testdate/Issuedate on conversion of IES to EULUMDAT and vice versa. Based on a suggestion/request by Mikulas Parma. • Allow setting of Test Lab name when there is a full license, to be used in conversions. • Removed some annoying behavior where latest blog post opened in external browser #### Improvements 0.14.2 • Fixed nasty conversion bug where IES to EULUMDAT conversion for IES files with absolute photometry had wrong DFF factors calculated. These can be caught and fixed by the Eulumdat validator, but now they are calculated correctly in the first place. If you have converted IES files to EULUMDAT with absolute photometry in the past and not validated the output, please reconvert your files! • NOTE: the same bug affected the online IES to EULUMDAT converter at http://ies2eulumdat.appspot.com, so if you have used that, reconvert also! #### Improvements 0.14.1 • A regression causing the IES validator to stop working was fixed (IES Validator Feature) #### Improvements 0.14.0 • Checking your license will now use the https: protocol instead of http: increasing your privacy • A problem where the cursor moved to start of line in the source editors when installed in Eclipse e4 was fixed • You can read this blog right in EulumdatTools so you will always be up to date on latest developments • EulumdatTools now contains a structured compare editor to make comparing 2 EULUMDAT files easier (see image) (Sandbox Feature) • A check for overlapping C-planes, where there are C-planes for both 0° and 360° was added (Sandbox Feature) #### Availability Registered users should update using Help / Check for Updates... and install the needed features following the steps below, new users should install EulumdatTools first. New users can download an apply for 30 day free evaluation license at the installation site #### Installation of EulumdatTools For use in Eclipse you can use the standard Eclipse update site For stand alone RCP versions of EulumdatTools choose your platform and perform update after installation.: #### Installation of Sandbox Feature Select menu Help / Install New Software... and choose the Eulumdat Tools Sandbox / Sandbox Feature, press Next and follow through with the installation. Also see here
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.3099767565727234, "perplexity": 13328.205312765616}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514570740.10/warc/CC-MAIN-20190915052433-20190915074433-00078.warc.gz"}
http://www.exambeat.in/aptitude/races-and-games/1710/
# Aptitude:: Races and Games @ : Home > Aptitude > Races and Games > General Questions ### Exercise " #### In a 100 m race, A can beat B by 25 m and B can beat C by 4 m. In the same race, A can beat C by: A. 21 m B. 26 m C. 28 m D. 29 m #### A runs $\dpi{150}&space;1\tfrac{2}{3}$ times as fast as B. If A gives B a start of 80 m, how far must the winning post be so that A and B might reach it at the same time? A. 200 m B. 300 m C. 270 m D. 160 m #### In a 300 m race A beats B by 22.5 m or 6 seconds. B's time over the course is: A. 86 sec B. 80 sec C. 76 sec D. None of these #### A can run 22.5 m while B runs 25 m. In a kilometre race B beats A by: A. 100 m B. C. 25 m D. 50 m #### In a 200 metres race A beats B by 35 m or 7 seconds. A's time over the course is: A. 40 sec B. 47 sec C. 33 sec D. None of these Page 1 of 3 Submit*
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 1, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.5496819019317627, "perplexity": 2582.129289879154}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00103-ip-10-171-10-70.ec2.internal.warc.gz"}
https://blogs.mathworks.com/steve/2006/12/13/poly2mask-and-roipoly-part-2/
# POLY2MASK and ROIPOLY – Part 2 I'm familiar with two basic ways to determine whether a point is inside a polygon. The first is to compute the winding number, which is the number of times that a closed curve encircles the point. This technique is used by the MATLAB function inpolygon. When computing point-inside-polygon for all the points on a pixel grid, the crossing test is more commonly used. You follow a ray from one side of the image to the other, counting the number of times the ray crosses an edge of the polygon. x1 = [30 80 60 30]; y1 = [30 50 90 30]; ray_x = [20 90]; ray_y = [70 70]; points_x = [30 60 80]; points_y = [70 70 70]; plot(x1,y1) hold on plot(ray_x,ray_y, 'r') plot(points_x,points_y,'Marker','o','MarkerSize',4,'Color','k',... 'MarkerFaceColor','k','LineStyle','none') text(30,70,'A','VerticalAlignment','bottom') text(60,70,'B','VerticalAlignment','bottom') text(80,70,'C','VerticalAlignment','bottom') axis off hold off title('Polygon 1') At point A, the ray has not crossed a polygon edge; A is outside the polygon. At point B, the ray has crossed a polygon edge one time; B is inside. At point C, the ray has crossed a polygon edge twice; C is outside. Polygons can get much more complex than a triangle, of course. Here are a couple of convex, nonsimple polygons. subplot(2,1,1) plot([30 70 70 30 30], [30 70 30 70 30]) hold on plot([20 80],[60 60],'r') hold off axis off title('Polygon 2') subplot(2,1,2) plot([30 70 70 40 40 60 60 30 30], ... [30 30 55 55 35 35 60 60 30]) hold on plot([20 80],[45 45],'r') plot(50,45,'Marker','o','MarkerSize',4,'MarkerFaceColor','k') text(50,45,'D','VerticalAlignment','bottom') ylim([25 75]) hold off axis off title('Polygon 3') In polygon 2, the ray crosses into and then out of the polygon twice. Polygon 3 is even more interesting. Is point D inside or outside the polygon? The answer is a matter of convention. A commonly-used convention is the even-odd rule. A point is outside the polygon if there have been an even number of edge crossings. A point is inside there have been an odd number. By this rule, point D is outside the polygon. The crossing test and the even-odd rule are easy to understand. The challenge is to avoid getting tripped up in the special cases. The troublesome cases include rays intersecting vertices, edge intersections, and coincident edges. Another case is when a ray is coincident with an edge. Here are some diagrams to illustrate. (Note that in polygon 7 there are two coincident edges on the left side of the polygon.) subplot(2,2,1) plot([20 30 40 30 20], [30 20 30 40 30]); hold on plot([10 50], [30 30], 'r') hold off axis off title('Polygon 4'), ylim([10 50]) subplot(2,2,2) plot([20 30 40 50 60 20], [30 10 20 10 30 30]); hold on plot([10 70], [10 10], 'r') hold off axis off title('Polygon 5'), ylim([0 40]) subplot(2,2,3) plot([20 50 20 50 20], [20 20 60 60 20]); hold on plot([10 60], [40 40], 'r') hold off axis off title('Polygon 6'), ylim([10 70]) subplot(2,2,4) plot([20 60 60 20 20 50 20 20], ... [20 20 50 50 20 35 50 20]); hold on plot([10 70],[35 35],'r') hold off axis off title('Polygon 7'), ylim([10 60]) In my next post on this topic, I'll get into the specific algorithm used by the Image Processing Toolbox functions polymask and roipoly. Here's Part 1 of this topic. Published with MATLAB® 7.3 |
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.41358625888824463, "perplexity": 1873.4583521492495}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487586465.3/warc/CC-MAIN-20210612222407-20210613012407-00242.warc.gz"}
https://www.biostars.org/p/329832/
1 0 Entering edit mode 4.4 years ago jonessara770 ▴ 240 Hi, I am a newbie in Retrotransposable/repeat elements analysis. I used UCSC table in order to get the sequence of RepeatMasker table in fasta format. When I download it through the webpage, the file is truncated at chr16 and does not have all chromosome. Thanks Sara repeat TE Retrotransposable/repeat • 2.8k views 0 Entering edit mode fastq file of RepeatMasker UCSC table Is that correct? I don't recollect there being an option to download fastq format files from table browser. 0 Entering edit mode Tagging: genecats.ucsc See the error below. 1 Entering edit mode 4.4 years ago mbk0asis ▴ 660 I don't think you can download repetitive sequences directly from UCSC genome browser as genomax mentioned. Instead, get the bed file of RepeatMasker and whole genome sequence of your organism from UCSC genome browser, and use 'bedtools getfasta' to extract the sequences of retroelements. 0 Entering edit mode You should be able to get the sequence using table browser (which is what OP was doing). It appears that their connection timed out and the entire file did not download. 0 Entering edit mode Thanks! I tied this but the file is truncated. 0 Entering edit mode Did you provide a file name to save the data to a file (rather than have to show up in the browser window)? If not try that. 0 Entering edit mode Yes, I did and I save the file but it is truncated from chr18 upwards. 0 Entering edit mode You are right in that the download from table browser is truncated after a certain length (I got a 1.6G file). You may want to get individual files for the remaining chromosomes and append them to the main. It may be worth reporting this as a bug to UCSC support people. I will tag them here as well.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.32405585050582886, "perplexity": 5435.076923285139}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711232.54/warc/CC-MAIN-20221208014204-20221208044204-00586.warc.gz"}
https://cloud.originlab.com/doc/Tutorials/Fitting-NLFit-MultiVar
# 4.2.2.30 Nonlinear Multiple Variables Fitting ## Summary Origin supports fitting functions with multiple dependent or independent variables. With the nonlinear fitting function, you can define multiple variables and separate them with semicolons. Since global fitting allows you to fit only one function at a time, this is a good way to defeat that limitation. Origin ships with three built-in functions with multiple dependent and independent variables. These functions, available in the Multiple Variables category, are actually composites consisting of two ordinary functions. The GaussianLorentz function, for example, is a combination of the Gaussian and Lorentz functions, sharing y0 and xc: $y_1 =y_0+\frac {A_1}{w_1\sqrt{\pi /2}}e^{-2\frac{(x-x_c)^2}{w_1^2}}$ $y_2=y_0+\frac{2A_2}\pi \frac {w_2} {4\left( x-x_c\right) ^2+w_2^2}$ This tutorial will demonstrate how to fit such multi-variable functions. ## What you will learn • Use Nonlinear Multiple Variables Fitting to fit a curve with two different functions. • Assign data to fitting variables. ## Steps 1. Start with a new project or create a new workbook and import the data file \samples\curve fitting\Gaussian.dat. 2. Highlight Column(A) and Column(B). In the main menu, click Analysis, then point to Fitting, and then click Nonlinear Curve Fit. 3. In the NLFit dialog’s left panel, select Function Selection. In the right panel, select Multiple Variables in the Category dropdown menu. In the Function dropdown menu, select GaussianLorentz. As you can see on the Sample Curve tab, the equations in this fitting function share the same parameters, y0 and xc. 4. In the NLFit dialog’s left panel, select Data Selection. In the right panel, expand the Range node and assign data to the fitting variables. In this example, we have assigned column B to both y1 and y2, which means that both expressions will fit the same dataset. 5. Click Fit until converged to fit, then OK. In the results sheet, compare parameters A and w, with the Gaussian and Lorentz functions sharing the same offset and peak center.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 2, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.3278099298477173, "perplexity": 2424.583230392903}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 5, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487623596.16/warc/CC-MAIN-20210616093937-20210616123937-00389.warc.gz"}
https://andjournal.sgu.ru/en/rubrika/determinirovannyy-haos?page=4
ISSN 0869-6632 (Print) ISSN 2542-1905 (Online) # Детерминированный хаос ## Experimental realization of lorenz model of liquid’s convective instability in vertical toroidal loop Stable and unstable regimes of glycerine convection in vertical toroidal loop are investigated experimentally. The results of Fourier-analysis, DFA, wavelet-, and correlation analysis of liquid’s motion peculiarities are presented. Chaotic attractor with Lorenz-attractor signs is constructed. ## Verification of hyperbolicity conditions for a chaotic attractor in a system of coupled nonautonomous van der pol oscillators We present a method and results of numerical computations on veri?cation of hyperbolic nature for the chaotic attractor in a system of two coupled nonautonomous van der Pol oscillators (Kuznetsov, Phys. Rev. Lett., 95, 2005, 144101). At selected parameter values, we indicate a toroidal domain in four-dimensional phase space of Poincar? e map (topologically, a direct product of a circle and a three-dimensional ball), which is mapped into itself and contains the attractor we analyze. ## Statistical properties of the intermittent transition to chaos in the quasi-periodically forced system By the example of the quasi-periodically forced logistic map we investigate statistical properties of the transition from strange nonchaotic attractor to chaos in the system with intermittent dynamics. The probability characteristics of laminar and chaotic phase distributions, as well as scaling laws for distributions of local Lyapunov exponents are studied at parameter values near the transition point. ## Influence of noise on chaotic self-sustained oscillations in the regime of spiral attractor In the present paper we analyze the in?uence of white and colored noise on chaotic selfsustained oscillations in the regime of spiral attractor. We study characteristics of instantaneous phase and spectra of noisy chaotic oscillations. The phenomenon of chaos synchronization by external narrow-band noise has been estimated. Synchronization phenomena under the in?uence of narrow-band noise signals with equal spectra and di?erent probability densities are compared. ## Critical behavior of asymmetrically coupled noisy driven nonidentical systems with period-doublings We investigated the in?uence of external noise on the critical behavior typical to nonidentical coupled systems with period-doubling. We obtained the numerical value of the scaling factor for noise amplitude by means of the renormalization group analysis. Also we demonstrated the selfsimilar structure of the parameter plane near the critical point in the model system of two noisy driven coupled logistic maps. ## Peculiarities of complex dynamics and transitions to chaotic regimes in the model of two interacting systems with phase control The work is devoted to investigation of complex dynamics in the model of two interacting systems with phase and delay control. Stability conditions of synchronous regime are determined. The processes of excitement of nonsynchronous regimes and transitions between them are considered. Scenarios of development of nonsynchronous regimes under variation of the systems parameters are determined. Routes to chaotic behavior of the model are discussed. Results are presented in the form of one-parameter bifurcation diagrams and phase portraits of the model attractors. ## About scaling properties of identical coupled logistic maps with two types of coupling without noise and under influence of external noise In this paper the in?uence of noise in system of identical coupled logistic maps with two types of coupling – dissipative and inertial – is discussed.   The corresponding renormalization group analysis is presented. Scaling property in the presence of noise is considered, and necessary illustrations in «numerical experiment style» are given. ## Analytical solution of spectral problem for the perron – frobenius operator of piece-wise linear chaotic maps Spectral properties of the linear non-self-adjoint Perron – Frobenius operator of piece-wise linear chaotic maps having regular structure are investigated. Eigenfunctions of the operator are found in the form of Bernoulli and Euler polynomials. Corresponding eigenvalues are presented by negative powers of number of map brunches. The solution is obtained in general form by means of generating functions for eigenfunctions of the operator. Expressions for eigenfunctions and eigenvalues are di?erent for original and inverse maps having even and odd number of branches. ## Synchronization in systems with bimodal dynamics Considering model with bimodal dynamics we investigate the synchronization of di?erent time scales. Transition between mode-locked and mode-unlocked chaotic attractors is investigated. It is shown that this transition involves a situation in which the synchronized chaotic attractor loses its band structure. ## Computation of Lyapunov exponents for spatially extended systems: advantages and limitations of various numerical methods Problems emerging in computations of Lyapunov exponents for spatially extended systems are considered. We concentrate on the incorrect orthogonalization of high sized ill conditioned matrices appearing in course of the computation, and on large errors emerging under certain conditions if the finite difference numerical method is applied to solve equations. The practical guidelines helping to avoid the mentioned problems are represented.
{"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8818835020065308, "perplexity": 1714.8783367307035}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154459.22/warc/CC-MAIN-20210803124251-20210803154251-00322.warc.gz"}
https://www.maplesoft.com/support/help/maple/view.aspx?path=Units/volume_flow&L=E
volume flow - Maple Help Units of Volume Flow Description • Volume flow has the dimension length cubed over time. The SI composite unit of volume flow is the cubic meter per second. • Maple knows the units of volume flow listed in the following table. Name Symbols Context Alternate Spellings Prefixes gallon_per_minute gpm US_liquid * gallons_per_minute UK US_dry cubic_foot_per_minute cfm standard * cubic_feet_per_minute An asterisk ( * ) indicates the default context, an at sign (@) indicates an abbreviation, and under the prefixes column, SI indicates that the unit takes all SI prefixes, IEC indicates that the unit takes IEC prefixes, and SI+ and SI- indicate that the unit takes only positive and negative SI prefixes, respectively.  Refer to a unit in the Units package by indexing the name or symbol with the context, for example, gallon_per_minute[US_liquid] or cfm[standard]; or, if the context is indicated as the default, by using only the unit name or symbol, for example, gallon_per_minute or cfm. The units of volume flow are defined as follows. A US liquid, US dry, or UK gallon per minute is defined as a gallon of the same context per minute. A standard cubic foot per minute is defined as a cubic standard foot per minute. Examples > $\mathrm{convert}\left('\mathrm{gpm}','\mathrm{dimensions}','\mathrm{base}'=\mathrm{true}\right)$ $\frac{{{\mathrm{length}}}^{{3}}}{{\mathrm{time}}}$ (1) > $\mathrm{convert}\left(1,'\mathrm{units}','\mathrm{gpm}',\frac{'\mathrm{gal}'}{'\mathrm{min}'}\right)$ ${1}$ (2) > $\mathrm{convert}\left(1,'\mathrm{units}','\mathrm{gpm}\left[\mathrm{UK}\right]',\frac{'\mathrm{gal}\left[\mathrm{UK}\right]'}{'\mathrm{min}'}\right)$ ${1}$ (3) > $\mathrm{convert}\left(1,'\mathrm{units}','\mathrm{gpm}\left[\mathrm{US_dry}\right]',\frac{'\mathrm{gal}\left[\mathrm{US_dry}\right]'}{'\mathrm{min}'}\right)$ ${1}$ (4) > $\mathrm{convert}\left(1,'\mathrm{units}','\mathrm{cfm}',\frac{{'\mathrm{ft}'}^{3}}{'\mathrm{min}'}\right)$ ${1}$ (5)
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 10, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.930768609046936, "perplexity": 2979.0493041167238}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363125.46/warc/CC-MAIN-20211204215252-20211205005252-00361.warc.gz"}
http://nag.com/numeric/fl/nagdoc_fl24/html/D03/d03pyf.html
D03 Chapter Contents D03 Chapter Introduction NAG Library Manual # NAG Library Routine DocumentD03PYF Note:  before using this routine, please read the Users' Note for your implementation to check the interpretation of bold italicised terms and other implementation-dependent details. ## 1  Purpose D03PYF may be used in conjunction with either D03PDF/D03PDA or D03PJF/D03PJA. It computes the solution and its first derivative at user-specified points in the spatial coordinate. ## 2  Specification SUBROUTINE D03PYF ( NPDE, U, NBKPTS, XBKPTS, NPOLY, NPTS, XP, INTPTS, ITYPE, UP, RSAVE, LRSAVE, IFAIL) INTEGER NPDE, NBKPTS, NPOLY, NPTS, INTPTS, ITYPE, LRSAVE, IFAIL REAL (KIND=nag_wp) U(NPDE,NPTS), XBKPTS(NBKPTS), XP(INTPTS), UP(NPDE,INTPTS,ITYPE), RSAVE(LRSAVE) ## 3  Description D03PYF is an interpolation routine for evaluating the solution of a system of partial differential equations (PDEs), or the PDE components of a system of PDEs with coupled ordinary differential equations (ODEs), at a set of user-specified points. The solution of a system of equations can be computed using D03PDF/D03PDA or D03PJF/D03PJA on a set of mesh points; D03PYF can then be employed to compute the solution at a set of points other than those originally used in D03PDF/D03PDA or D03PJF/D03PJA. It can also evaluate the first derivative of the solution. Polynomial interpolation is used between each of the break points ${\mathbf{XBKPTS}}\left(\mathit{i}\right)$, for $\mathit{i}=1,2,\dots ,{\mathbf{NBKPTS}}$. When the derivative is needed (${\mathbf{ITYPE}}=2$), the array ${\mathbf{XP}}\left({\mathbf{INTPTS}}\right)$ must not contain any of the break points, as the method, and consequently the interpolation scheme, assumes that only the solution is continuous at these points. None. ## 5  Parameters Note: the parameters U, NPTS, NPDE, XBKPTS, NBKPTS, RSAVE and LRSAVE must be supplied unchanged from either D03PDF/D03PDA or D03PJF/D03PJA. 1:     NPDE – INTEGERInput On entry: the number of PDEs. Constraint: ${\mathbf{NPDE}}\ge 1$. 2:     U(NPDE,NPTS) – REAL (KIND=nag_wp) arrayInput On entry: the PDE part of the original solution returned in the parameter U by the routine D03PDF/D03PDA or D03PJF/D03PJA. 3:     NBKPTS – INTEGERInput On entry: the number of break points. Constraint: ${\mathbf{NBKPTS}}\ge 2$. 4:     XBKPTS(NBKPTS) – REAL (KIND=nag_wp) arrayInput On entry: ${\mathbf{XBKPTS}}\left(\mathit{i}\right)$, for $\mathit{i}=1,2,\dots ,{\mathbf{NBKPTS}}$, must contain the break points as used by D03PDF/D03PDA or D03PJF/D03PJA. Constraint: ${\mathbf{XBKPTS}}\left(1\right)<{\mathbf{XBKPTS}}\left(2\right)<\cdots <{\mathbf{XBKPTS}}\left({\mathbf{NBKPTS}}\right)$. 5:     NPOLY – INTEGERInput On entry: the degree of the Chebyshev polynomial used for approximation as used by D03PDF/D03PDA or D03PJF/D03PJA. Constraint: $1\le {\mathbf{NPOLY}}\le 49$. 6:     NPTS – INTEGERInput On entry: the number of mesh points as used by D03PDF/D03PDA or D03PJF/D03PJA. Constraint: ${\mathbf{NPTS}}=\left({\mathbf{NBKPTS}}-1\right)×{\mathbf{NPOLY}}+1$. 7:     XP(INTPTS) – REAL (KIND=nag_wp) arrayInput On entry: ${\mathbf{XP}}\left(\mathit{i}\right)$, for $\mathit{i}=1,2,\dots ,{\mathbf{INTPTS}}$, must contain the spatial interpolation points. Constraints: • ${\mathbf{XBKPTS}}\left(1\right)\le {\mathbf{XP}}\left(1\right)<{\mathbf{XP}}\left(2\right)<\cdots <{\mathbf{XP}}\left({\mathbf{INTPTS}}\right)\le {\mathbf{XBKPTS}}\left({\mathbf{NBKPTS}}\right)$; • if ${\mathbf{ITYPE}}=2$, ${\mathbf{XP}}\left(\mathit{i}\right)\ne {\mathbf{XBKPTS}}\left(\mathit{j}\right)$, for $\mathit{i}=1,2,\dots ,{\mathbf{INTPTS}}$ and $\mathit{j}=2,3,\dots ,{\mathbf{NBKPTS}}-1$. 8:     INTPTS – INTEGERInput On entry: the number of interpolation points. Constraint: ${\mathbf{INTPTS}}\ge 1$. 9:     ITYPE – INTEGERInput On entry: specifies the interpolation to be performed. ${\mathbf{ITYPE}}=1$ The solution at the interpolation points are computed. ${\mathbf{ITYPE}}=2$ Both the solution and the first derivative at the interpolation points are computed. Constraint: ${\mathbf{ITYPE}}=1$ or $2$. 10:   UP(NPDE,INTPTS,ITYPE) – REAL (KIND=nag_wp) arrayOutput On exit: if ${\mathbf{ITYPE}}=1$, ${\mathbf{UP}}\left(\mathit{i},\mathit{j},1\right)$, contains the value of the solution ${U}_{\mathit{i}}\left({x}_{\mathit{j}},{t}_{\mathrm{out}}\right)$, at the interpolation points ${x}_{\mathit{j}}={\mathbf{XP}}\left(\mathit{j}\right)$, for $\mathit{j}=1,2,\dots ,{\mathbf{INTPTS}}$ and $\mathit{i}=1,2,\dots ,{\mathbf{NPDE}}$. If ${\mathbf{ITYPE}}=2$, ${\mathbf{UP}}\left(\mathit{i},\mathit{j},1\right)$ contains ${U}_{\mathit{i}}\left({x}_{\mathit{j}},{t}_{\mathrm{out}}\right)$ and ${\mathbf{UP}}\left(\mathit{i},\mathit{j},2\right)$ contains $\frac{\partial {U}_{\mathit{i}}}{\partial x}$ at these points. 11:   RSAVE(LRSAVE) – REAL (KIND=nag_wp) arrayCommunication Array The array RSAVE contains information required by D03PYF as returned by D03PDF/D03PDA or D03PJF/D03PJA. The contents of RSAVE must not be changed from the call to D03PDF/D03PDA or D03PJF/D03PJA. Some elements of this array are overwritten on exit. 12:   LRSAVE – INTEGERInput On entry: the size of the workspace RSAVE, as in D03PDF/D03PDA or D03PJF/D03PJA. 13:   IFAIL – INTEGERInput/Output On entry: IFAIL must be set to $0$, $-1\text{​ or ​}1$. If you are unfamiliar with this parameter you should refer to Section 3.3 in the Essential Introduction for details. For environments where it might be inappropriate to halt program execution when an error is detected, the value $-1\text{​ or ​}1$ is recommended. If the output of error messages is undesirable, then the value $1$ is recommended. Otherwise, if you are not familiar with this parameter, the recommended value is $0$. When the value $-\mathbf{1}\text{​ or ​}\mathbf{1}$ is used it is essential to test the value of IFAIL on exit. On exit: ${\mathbf{IFAIL}}={\mathbf{0}}$ unless the routine detects an error or a warning has been flagged (see Section 6). ## 6  Error Indicators and Warnings If on entry ${\mathbf{IFAIL}}={\mathbf{0}}$ or $-{\mathbf{1}}$, explanatory error messages are output on the current error message unit (as defined by X04AAF). Errors or warnings detected by the routine: ${\mathbf{IFAIL}}=1$ On entry, ${\mathbf{ITYPE}}\ne 1$ or $2$, or ${\mathbf{NPOLY}}<1$, or ${\mathbf{NPDE}}<1$, or ${\mathbf{NBKPTS}}<2$, or ${\mathbf{INTPTS}}<1$, or ${\mathbf{NPTS}}\ne \left({\mathbf{NBKPTS}}-1\right)×{\mathbf{NPOLY}}+1$, or ${\mathbf{XBKPTS}}\left(\mathit{i}\right)$, for $\mathit{i}=1,2,\dots ,{\mathbf{NBKPTS}}$, are not ordered. ${\mathbf{IFAIL}}=2$ On entry, the interpolation points ${\mathbf{XP}}\left(\mathit{i}\right)$, for $\mathit{i}=1,2,\dots ,{\mathbf{INTPTS}}$, are not in strictly increasing order, or when ${\mathbf{ITYPE}}=2$, at least one of the interpolation points stored in XP is equal to one of the break points stored in XBKPTS. ${\mathbf{IFAIL}}=3$ You are attempting extrapolation, that is, one of the interpolation points ${\mathbf{XP}}\left(i\right)$, for some $i$, lies outside the interval [${\mathbf{XBKPTS}}\left(1\right),{\mathbf{XBKPTS}}\left({\mathbf{NBKPTS}}\right)$]. Extrapolation is not permitted. ## 7  Accuracy See the documents for D03PDF/D03PDA or D03PJF/D03PJA.
{"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 61, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9940730929374695, "perplexity": 2969.950064281214}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931009004.88/warc/CC-MAIN-20141125155649-00133-ip-10-235-23-156.ec2.internal.warc.gz"}