query
stringlengths 8
1.13k
| pos
stringlengths 13
1.09k
| neg
stringlengths 11
1.07k
| query_lang
stringclasses 32
values | __index_level_0__
int64 41
1.05M
|
---|---|---|---|---|
Value-Aware Loss Function for Model-based Reinforcement Learning
|
Information Theory, Inference, and Learning Algorithms
|
Wechsler Intelligence Scale for Children-Fourth Edition (WISC-IV) short-form validity: A comparison study in pediatric epilepsy
|
eng_Latn
| 162,927 |
AlphaGo and Monte Carlo tree search: The simulation optimization perspective
|
Bandit Based Monte-Carlo Planning
|
language dominance in neurologically normal and epilepsy subjects : a functional mri study .
|
eng_Latn
| 162,928 |
UCB EXPLORATION VIA Q-ENSEMBLES
|
# exploration : a study of count - based exploration for deep reinforcement learning .
|
ENG: End-to-end Neural Geometry for Robust Depth and Pose Estimation using CNNs
|
yue_Hant
| 163,013 |
Towards Trainable Media: Using Waves for Neural Network-Style Training
|
Playing Atari with Deep Reinforcement Learning
|
Work role stressors and turnover intentions: a study of professional clergy in Hong Kong
|
eng_Latn
| 163,049 |
Self-Consistent Trajectory Autoencoder: Hierarchical Reinforcement Learning with Trajectory Embeddings
|
Mastering the game of Go with deep neural networks and tree search
|
Dynamic cardiovagal response to motion sickness: A point-process heart rate variability study
|
eng_Latn
| 163,055 |
Self-Imitation Learning
|
# exploration : a study of count - based exploration for deep reinforcement learning .
|
Challenges of Feature Selection for Big Data Analytics
|
eng_Latn
| 163,085 |
A pilot study to determine whether machine learning methodologies using pre-treatment electroencephalography can predict the symptomatic response to clozapine therapy
|
Bias in error estimation when using cross-validation for model selection
|
Sample-efficient Actor-Critic Reinforcement Learning with Supervised Data for Dialogue Management
|
eng_Latn
| 163,100 |
Encouraging Physical Activity in Patients With Diabetes: Intervention Using a Reinforcement Learning System
|
Informing sequential clinical decision-making through reinforcement learning: an empirical study
|
Reinforcement Learning And Its Application To Control
|
eng_Latn
| 163,209 |
Neuroevolution-based Inverse Reinforcement Learning
|
Automatic feature selection in neuroevolution
|
AM: a case study in AI methodology
|
eng_Latn
| 163,272 |
For the explosion of information in the World Wide Web, this paper proposed a new method of web news summarization via soft clustering algorithm. It used search engine to extract relevant documents, and mixed query sentence into sentences set which segmented from multi-document set, then this paper adopted efficient soft cluster algorithm SSSC (Sentence Similarity-Based Soft Clustering) to cluster all the sentences. Experimental result shows that the proposed summarization method can improve the performance of summary, soft clustering algorithm is efficient.
|
Following the recent adoption by the machine translation community of automatic evaluation using the BLEU/NIST scoring process, we conduct an in-depth study of a similar idea for evaluating summaries. The results show that automatic evaluation using unigram co-occurrences between summary pairs correlates surprising well with human evaluations, based on various statistical metrics; while direct application of the BLEU evaluation procedure does not always give good results.
|
We prove that groups acting geometrically on delta-quasiconvex spaces contain no essential Baumslag-Solitar quotients as subgroups. This implies that they are translation discrete, meaning that the translation numbers of their nontorsion elements are bounded away from zero.
|
eng_Latn
| 163,566 |
Extractive summarization of meeting recordings
|
Generic text summarization using relevance measure and latent semantic analysis
|
does happiness adapt ? a longitudinal study of disability with implications for economists and judges .
|
eng_Latn
| 163,666 |
Deep Learning Approaches to Text Production
|
Graph-based Neural Multi-Document Summarization
|
The anterior talofibular ligament: A detailed morphological study.
|
kor_Hang
| 163,685 |
topic - based visual text summarization and analysis 1 .
|
Multi-document summarization via sentence-level semantic analysis and symmetric matrix factorization
|
advancing students ' computational thinking skills through educational robotics : a study on age and gender relevant differences .
|
eng_Latn
| 163,735 |
To study the effect of these variables on electricity prices and markets, ICF developed a macro-driven spreadsheet program termed the technology retrofit and updating model.
|
The technology retrofit and updating model was developed by the ICF.
|
There is currently no program to study the effect of these variables on electricity prices and markets.
|
eng_Latn
| 163,784 |
Discussion of 'Regulating the New Financial Markets'
|
Richard Dale has provided us with an interesting survey of current regulatory and supervisory challenges. His focus is on three developments that are influencing the shape of financial markets – namely globalisation, functional integration, and innovation, especially in the form of derivative products. Underlying the discussion of these three developments is the theme that, in essence, the world is becoming a more dangerous place for financial intermediaries, and therefore, for the supervisors and regulators of those intermediaries. As a consequence some regulatory response is required. Those developments deserve examination.
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
eng_Latn
| 163,792 |
Overvalued and Underestimated. Veblen’s Contribution to the Analysis of (un-)Sustainable Consumption
|
Veblen’s concept of conspicuous consumption is often cited to explain why consumption habits in our consumer societies tend to be unsustainable and ever increasing. However, much more than blaming individual consumption habits Veblen sharply analyzed quite some of the societal and economic forces which drive the framework conditions for unsustainable consumption: the vested interests and the absentee ownership. The paper follows the path Veblen’s thoughts have taken trough economic and social literature over the last centuryand highlights how the actual sustainable consumption debate could make better use of Veblen’s insights e.g. in requesting the constitutive institutions for property. Opportunities for Strong Sustainable Consumption obviously presuppose radical changes, social innovations and thinking out of the box.
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
eng_Latn
| 163,795 |
Capitalism and Its Future Trend in Marx's Visual Field
|
Marx gave a sufficient consent to modern capitalist society such as in promoting productive forces higher, promoting laborers'quality wider, promoting modern scientific technology and culture transformation. He analyzed its dual characters in the development of productive forces and other aspects. He also made a scientific analysis of the developing trend of capitalist society. Today, Marx's capitalist theory still has important theoretical values and great significance for us to observe modern capitalist society.
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
eng_Latn
| 163,796 |
Mortgage default in Australia: nature, causes and social and economic impacts
|
The Australian housing system has undergone major structural change in the past 20 years. Continuing population growth, falling average household size, strong economic growth and rising average incomes have underpinned buoyant demand for housing focused on metropolitan areas, smaller provincial cities, natural resource centres and tourist regions. Increasing income and wealth inequalities have changed patterns of access to housing by location, tenure and quality. The growth in two-income households has also impacted negatively on the access and affordability of housing for single lower income households. At the institutional level, deregulation of Australia's financial system, starting in the late 1970s, gathering pace in the 1980s and culminating in the 1990s with the explosive growth of the secondary mortgage market, has resulted in a quantum leap in mortgage debt and helped drive a pronounced housing boom in the 1996 to 2007 period (Berry & Dalton 2004; Berry forthcoming).
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
eng_Latn
| 163,798 |
Understanding European Real Exchange Rates
|
We study good-by-good deviations from the Law-of-One-Price (LOP) for over 1,800 retail goods and services between all European Union (EU) countries for the years 1975, 1980, 1985, and 1990. We find that for each of these years, after we control for differences in income and value-added tax (VAT) rates, there are roughly as many overpriced goods as there are underpriced goods between any two EU countries. We also find that good-by-good measures of cross-sectional price dispersion are negatively related to the tradeability of the good, and positively related to the share of non-traded inputs required to produce the good. We argue that these observations are consistent with a model in which retail goods are produced by combining a traded input with a non-traded input.
|
Old and New European nations are merging their operations to gain large-scale efficiencies and reduce channel redundancies. Are there lessons for the United States?
|
eng_Latn
| 163,803 |
Is That an Elephant in the Room?: The Story (or Nonstory) of ETF Underperformance
|
Since ETFs were first launched in 1993, they have been compared to traditional index funds. This is not surprising because, in many cases, ETFs and index funds are far easier to compare than, for example, two actively managed mutual funds. Indeed, when an ETF and a mutual fund track the same index, they should ostensibly have the same performance. Early research on the relative performance of ETFs and mutual funds has tended to indicate ETF underperformance, but it has done so without analyzing why these differences exist. Are the performance differentials driven by structural differences between the two fund structures, or was it simply a question of differences in management style, which do not depend on fund structure and could entail more risk. We attempt to address these issues and to update the performance numbers with a comprehensive look at the data across nine major indexes.
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
eng_Latn
| 163,804 |
A Qualitative Exploration of the Challenges Organizations Face while Working with Generation Z Intrapreneurs
|
AbstractThis article presents preliminary findings of what challenges Indian organizations face when working with generation Z intrapreneurs. Organization will grow at a faster pace if the decision makers in the organization are entrepreneurial in their approach. These entrepreneurs when working within the organization by taking the approval and sanctions to use the organization resources are termed as intrapreneurs. Yet scholars know too little about what challenges Indian organization face while working with generation Z intrapreneurs. The findings reveal that Indian organizations have started hiring generation Z intrapreneurs and are facing challenges working with them. These findings support previous research which concludes organizational supportive environment is a facilitator for organization to spur intrapreneurial culture in the organization.
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
eng_Latn
| 163,805 |
Historical Incidences of Credit Rationing among Micro and Small Enterprises in Kenya
|
In the mid-2000s, the Government of Kenya recognised the existence of institutional barriers preventing micro and small enterprises (MSEs) from directly accessing credit from financial institutions. This development informed the change of lending policy from direct lending to group lending in government supported programmes. However, this change was effected without a comprehensive theoretical and empirical examination of the underlying reasons why MSEs failed to access credit. This study fills this gap by investigating the the underlying reasons MSEs were credit rationed in Kenya. The general consensus from this study is that there was a high incidence of credit rationing in Kenya in 1990s and 2000s which stemmed from information asymmetry. The study concludes that the Government’s current policy of promoting group lending is indeed workable if the mode can assist in mitigating information asymmetry in credit markets.
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
eng_Latn
| 163,806 |
Managing Capex in the telecom industry
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
SUBTITLE: SHIPPERS CAN LOOK FORWARD TO CONTINUING CAPACITY CONSTRAINTS AND PRICE INCREASES FOR THIS YEAR AND BEYOND. THE SOLUTION? TRY EVERYTHING, INCLUDING REDESIGNING YOUR SUPPLY-CHAIN NETWORK.
|
eng_Latn
| 163,809 |
From Cash To Accruals In Portuguese Local Government Accounting: What Has Truly Changed
|
As many countries, Portugal has been reforming governmental accounting since the beginning of the 1990s. The system in force results from the first law-based governmental accounting general plan passed in 1997, which was adapted to Local Government in 1999. Using double- entry, the Portuguese Local Government accounting framework currently combines cash-based budgetary accounting with accrual-based financial and cost accountings, providing information for both accountability and decision-making. While recognising considerable innovations, this paper presents some difficulties implementing the reforms, whereas highlighting some limitations still remaining in the Portuguese new local governmental accounting system. It also discusses why, together with other reasons, those shortcomings make budgetary cash-based information still to be given more importance, namely by internal users.
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
eng_Latn
| 163,812 |
Why There Might Not Be Many Damage Claims Arising from the Spanish Property Insurance Cartel
|
Inherent Defects Insurance (IDI) for new housing buildings is mandatory in Spain since May 2000. The instauration of this legal requirement prompted an upsurge in the IDI market. Being confronted with wild competition, the major insurance carriers active in that market promoted a minimum price agreement involving also IDI reinsurers. The role of reinsurers was key in propagating the effectiveness of the minimum price agreement all over the market. This article examines the features of the Spanish IDI cartel, uncovered by the Spanish National Competition Commission in 2009. The companies involved were punished with the largest fine ever imposed by competition authorities in Spain. However, potential damage claims by cartel victims may face several hurdles. Some of them are related to some specific features of the cartel itself, others have to do with the reluctance to damage claims for competition violations in Spain.
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
eng_Latn
| 163,814 |
Northeast Utilities' participation in the Kaman/NASA wind power program
|
The role of Northeast Utilities in the Kaman/NASA large wind generator study is reviewed. The participation falls into four principal areas: (1) technical assistance; (2) economic analysis; (3) applications; and (4) institutional and legal. A model for the economic viability of wind power is presented.
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
eng_Latn
| 163,815 |
Has the financial crisis shattered citizens' trust in national and European government institutions? CEPS Working Document No. 343/February 2011
|
The financial crisis has differently affected trust in national and European governmental institutions. Our paper analyses the determinants of trust in national and European institutions over the last decade – with particular focus on the 2007-09 period – and comes to the conclusion that citizens’ declining trust in national governments is related to an increase in unemployment in the EU-15 and EU-25. In the EU-25, falling trust levels in national parliaments are also associated with an increase in government debts. Trust in the European Commission and European Parliament seems strongly associated with the situation in the real economy (growth of GDP per capita). Furthermore, our analysis confirms that trust in national institutions has actually increased in the direct aftermath of the financial crisis.
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
eng_Latn
| 163,817 |
Does the Paris Warrants Market Present a Systemic Risk
|
The first part of the paper is of a statistical nature. It presents the characteristics of the Paris warrants market which are fivefold: a rapidly growing market; an unequal growth among the underlying assets; a large differentiation among assets; a very concentrated market; and whose issuers hold different portfolios.
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
eng_Latn
| 163,818 |
The roles and actions of sex traffickers in Cyprus: an overview
|
While the preponderance of delineation, exploration, and analysis of human trafficking concentrates on the victimization of trafficked people, the offenders’ criminal partaking is often left unexplored. That said, this study aims to examine the conundrum of human trafficking by exploring the traffickers’ demographics, tactics, connections, and collaborations. In order to accomplish this, data are drawn from the content analysis of 102 police interviews (Cyprus Police) with victims of trafficking and the study of police files of 18 persons convicted for human trafficking and sexual exploitation. In short (and contrary to widely held beliefs), the findings point out that human trafficking in Cyprus is not premised on well-established criminal syndicates with deep roots and solid networking, nor is dominated by cruel tactics actuated by meticulous crooks, linked to corrupt officials.
|
With the use of data and concrete examples, such as ::: a mini-case study, and a focus on the top 20 global players, this ::: thesis aims at tackling Capex issues in the telecom industry by ::: covering: – Uses, levels, inefficiencies in Capex management, ::: notably via insider perspective, and their impacts on capital ::: allocation; – Financing of Capex via debt and the recent ::: development of asset monetization; – Specific trends (NSA, VNOs) ::: and M&A in the telecom industry and their impacts on Capex, via ::: the case study of the French SFR-Numericable ::: transaction.
|
eng_Latn
| 163,820 |
Why Italian planning is worth studying
|
Italian planning seems to be underestimated outside Italy and the cause for this is unclear. There may be two possible explanations. On the one hand, it could be argued that Italian planning is ignored internationally as the consequence of a lack or of a small number of international articles about it published in international journals. On the other hand, it may be the perception that international scholars have of it, which in part depends on the articles published, but which means that there have been few attempts to spread knowledge concerning the practice of planning in Italy. This article provides a brief account of the development of Italian planning over time and seeks to emphasise the peculiarities of the discipline in Italy and to discuss what areas of study offer the best potentials for further studies either on a comparative basis with other countries or Italy focused.
|
The Impact of Extra-Curricular Activities Focused on Research Training and ::: Formative Research on 6th and 7th Semester Students of Modern Languages ::: Program at University of Quindio
|
eng_Latn
| 163,978 |
REIT Stock Repurchases: Completion Rates, Long-Run Returns, and the Straddle Hypothesis
|
By Adams, Gregory L Brau, James C; Holmes, Andrew Abstract This study of real estate investment trusts (REITs) analyzes three possible explanations for the stock price reaction to a repurchase announcement and the subsequent repurchase behavior of managers under each hypothesis.
|
Japanese stocks rebounded on Thursday from a three-week low as beaten-down technology stocks were buoyed by gains in their U.S. peers and as the yen resumed its slide against the dollar, boosting shares of major exporters.
|
eng_Latn
| 165,736 |
Predicting stock movement direction with machine learning: An extensive study on S&P 500 stocks
|
Using News Articles to Predict Stock Price Movements
|
Stability of Systems with Stochastic Delays and Applications to Genetic Regulatory Networks
|
eng_Latn
| 165,932 |
In this paper, we will present some local fixed point theorems for graphic contractions on a generalized metric space in the sense of Perov.
|
In this paper we explain the advantage of vector-valued norms and the role of matrices that are convergent to zero in the study of semilinear operator systems by means of some basic methods of nonlinear analysis: the contraction principle, Schauder's fixed point theorem, the Leray-Schauder continuation principle and Krasnoselskii's cone fixed point theorem. A vector version of Krasnoselskii's theorem is also established.
|
Berzelius failed to make use of Faraday's electrochemical laws in his laborious determination of equivalent weights.
|
eng_Latn
| 166,049 |
Some Applications of Geometric Theory of Approximations
|
We study sets with continuous selections of almost best approximations and discuss applications of the geometric theory of approximations to problems related to selections from multi-valued mappings, existence of fixed points, and smooth solutions of the eikonal equation.
|
In this paper, we obtain a $\alpha$-Suzuki fixed point theorem by using $C$ - class function on quasi metric spaces. Also we give an example which supports our main theorem.
|
kor_Hang
| 166,057 |
I am an undergraduate student and we have both linear algebra and metric space course in this semester.In linear algebra we studied norm and in metric spaces we studied metric.Now studying some examples I think every metric on vector space may define a norm and every norm can define a metric.I am sure about the last one but does every metric on vector space give rise to a norm?
|
I have studied that every normed space $(V, \lVert\cdot \lVert)$ is a metric space with respect to distance function $d(u,v) = \lVert u - v \rVert$, $u,v \in V$. My question is whether every metric on a linear space can be induced by norm? I know answer is no but I need proper justification. Edit: Is there any method to check whether a given metric space is induced by norm ? Thanks for help
|
I have studied that every normed space $(V, \lVert\cdot \lVert)$ is a metric space with respect to distance function $d(u,v) = \lVert u - v \rVert$, $u,v \in V$. My question is whether every metric on a linear space can be induced by norm? I know answer is no but I need proper justification. Edit: Is there any method to check whether a given metric space is induced by norm ? Thanks for help
|
eng_Latn
| 166,092 |
Everyone The U.S. Government Owes Money To, In One Graph
|
If Congress doesn't raise the debt ceiling soon, the U.S. government won't be able to pay its debts. Here's who the government owes money to — all the holders of U.S. Treasury debt, broken down by category and by how much government debt they hold. For more, see our story: What A U.S. Default Would Mean For Pensions, China And Social Security Update: There were two misspellings in the original version of the graphic. Thanks to the commenters who pointed this out.
|
On today's Planet Money: We hear and read stories of corruption every day, but finding cold hard data on the subject is so hard that MIT economics professor, Ben Olken, had to go dig up roads in Indonesia to get some. Olken and his team set out to measure the amount of raw materials that went missing when the government gave local villagers money for projects like building roads. The study not only required the researchers to dig up roads -- but also to build a few of their own. Download the podcast; or subscribe. Music: Broken Bells' "High Road." Find us: Twitter/ Facebook/ Flickr.
|
eng_Latn
| 166,811 |
How can I think like Sherlock Holmes?
|
How can I learn to make observations and conclusions like sherlock holmes?
|
What are the best tips to study philosophy?
|
eng_Latn
| 167,085 |
In this Lecture Notes we present, in a sufficiently self contained way, our contributions and interests in the field of Minimal Model Theory. We study Fano-Mori spaces, both from the biregular and the birational point of view. For the former we recall and develop Kawamata's Base Point Free technique and some of Mori's deformation arguments. For the latter we lean on Sarkisov and #-Minimal Model Programs. In writing these notes we want to give our point of view on this area of research. We are not trying to give a treatment of the whole subject. These notes collect some topics we presented in three mini-courses which were held in Wykno (Pl) (1999), Recife (Br) (2000) and Ferrara (It) (2000), respectively.
|
In this paper we study the class of compact K\"ahler manifolds with positive orthogonal Ricci curvature: $Ric^\perp>0$. First we illustrate examples of K\"ahler manifolds with $Ric^\perp>0$ on K\"ahler C-spaces, and construct ones on certain projectivized vector bundles. These examples show the abundance of K\"ahler manifolds which admit metrics of $Ric^\perp>0$. Secondly we prove some (algebraic) geometric consequences of the condition $Ric^\perp>0$ to illustrate that the condition is also quite restrictive. Finally this last point is made evident with a classification result in dimension three and a partial classification in dimension four.
|
The existence of a winning strategy in the well-known Banach-Mazur game in a completely regular topological space X is proved to be equivalent to the generic existence of solutions of optimization problems generated by continuous functions in X
|
eng_Latn
| 167,160 |
We formulate a pair of multiobjective nonlinear generalized symmetric dual variational problems involving vector-valued functions which unify the Wolfe and Mond–Weir models. For a special case, our problems become the symmetric dual pair of D. S. Kim and W. J. Lee (1998,J. Math. Anal. Appl.218, 34–48). Under invexity assumptions, we establish weak, strong, and converse duality theorems for our variational problems by using the concept of efficiency. Also, we give the static case of our multiobjective generalized symmetric duality results. Several known results are obtained as special cases.
|
We present some equivalences between some symmetric dualities in nonlinear programming and some matrix games. We study three pairs of dual problems: Wolfe, Mond–Weir and fractional types. For each pair, the paper presents two different zero-sum games whose Nash equilibria correspond to the solutions of the pair of nonlinear symmetric dual problems. And certain conclusions about symmetric dual fractional programming and its special cases are also treated.
|
We prove that groups acting geometrically on delta-quasiconvex spaces contain no essential Baumslag-Solitar quotients as subgroups. This implies that they are translation discrete, meaning that the translation numbers of their nontorsion elements are bounded away from zero.
|
eng_Latn
| 167,171 |
A decomposition scheme for the Hamilton-Jacobi equation
|
One way to compute optimal control in completely observable stochastic optimal control problems is to solve the Hamilton-Jacobi Equation. We propose to replace in the quasi linearization technique of Bellman [1] the step of inversion of a linear system of dimension n by several steps of n linear equations of dimension 1 in parallel or in sequence. We are then led to apply for instance splitting up methods-studied in particular in [3], [6], [8], [9]. We obtain what we call a decomposition scheme to approximate evolutive Hamilton-Jacobi Equation. We study convergence results as time steps converge to zero with compacity methods adapted from [4] and give some numerical results.
|
The present invention provides a process for the preparation of an enriched carboxylic acid compositions produced by the method of composition of the carboxylic acid is included in contact with the enrichment feed in the enrichment zone. The present invention is then to remove the catalyst from the carboxylic acid composition to a method and that the resulting composition for the preparation of a catalyst removal composition.
|
eng_Latn
| 167,185 |
An Algorithm for Rapidly Computing the Minimum Distance between Two Objects Collision Detection
|
A novel efficient algorithm for computing the minimum distance between two objects in collision detection is proposed, which is based on extracting the objects’ feature points set to represent the shape figure, and computing the point sets to get the minimum distance between the two objects. Theoretical analyses and experimental results show that the method reduces the computing complexity, improves the efficiency and meets the requirement of real time of collision detection.
|
In this article, we study nonsmooth convex minimax programming problems with cone constraint and abstract constraint. Our aim is to develop sequential Lagrange multiplier rules for this class of problems in the absence of any constraint qualification. These rules are obtained in terms of ∊-subdifferentials of the functions. As an application of these rules, a sequential dual is proposed and sequential duality results are presented.
|
eng_Latn
| 167,186 |
On the efficiency of nature-inspired metaheuristics in expensive global optimization with limited budget
|
Global optimization problems where evaluation of the objective function is an expensive operation arise frequently in engineering, decision making, optimal control, etc. There exist two huge but almost completely disjoint communities (they have different journals, different conferences, different test functions, etc.) solving these problems: a broad community of practitioners using stochastic nature-inspired metaheuristics and people from academia studying deterministic mathematical programming methods. In order to bridge the gap between these communities we propose a visual technique for a systematic comparison of global optimization algorithms having different nature. Results of more than 800,000 runs on 800 randomly generated tests show that both stochastic nature-inspired metaheuristics and deterministic global optimization methods are competitive and surpass one another in dependence on the available budget of function evaluations.
|
Given ?>0 andp?(0,1), we consider the following problem: findu such that $$\begin{gathered} - \Delta u + \lambda [u]_ + ^p = 0in\Omega , \hfill \\ u = 1on\partial \Omega , \hfill \\ \end{gathered} $$ whereΩ??2 is a smooth convex domain. We prove optimalH 1 andL ? error bounds for the standard continuous piecewise linear Galerkin finite element approximation. In addition we analyse a more practical approximation using numerical integration on the nonlinear term. Finally we consider a modified nonlinear SOR algorithm, which is shown to be globally convergent, for solving the algebraic system derived from the more practical approximation.
|
eng_Latn
| 167,187 |
An integral LP relaxation for a drayage problem
|
Abstract This paper investigates a drayage problem, where a fleet of trucks must ship container loads from a port to importers and from exporters to the same port, without separating trucks and containers during customer service. We present three formulations for this problem that are valid when each truck carries one container. For the third formulation, we also assume that the arc costs are equal for all trucks, and then we prove that its continuous relaxation admits integer optimal solutions by checking that its constraint matrix is totally unimodular. Under the same hypothesis on costs, even the continuous relaxations of the first two models are proved to admit an integer optimal solution. Finally, the third model is transformed into a circulation problem, that can be solved by efficient network algorithms.
|
After putting forward a lead-time reduction cost function with characteristics of subsection linear, which bases on the fact that additional investment is not necessary to reduce lead-time, this paper studied a two-stage (Q, r) policy coordination problem with service level constraint. By applying some means of optimization theory, the problem was decomposed into two problems: one problem without constraint and the other with equation constraint. Theoretic analysis and numerical study show that, service level can be improved prominently and the total cost can be minimized. The order quantity, reorder point and lead-time expediting factor were obtained at the same time.
|
eng_Latn
| 167,192 |
Implicit methods for two-dimensional unsteady free-surface flows
|
Beam and Warming implicit Unite difference schemes are introduced to integrate the equations describing the two-dimensional unsteady free-surface flows. These schemes are second-order accurate in space and time, allow sharp discontinuous initial conditions, and do not require isolation of a bore. Subcritical and supercritical flows may be present indifferent parts of the channel or they may occur in sequence. Depending upon the Courant number used in the computations, sharp discontinuities may be slightly smeared since they are not isolated. Different procedures for incorporating the boundary conditions are discussed. The analysis of two-dimensional unsteady free-surface (lows resulting from the breaking of a dam are presented to illustrate the aplication of the methods.
|
In this paper, we study the asymptotical optimal solutions for the general airline revenue management problem, considering both customer cancelations and no-shows. We study a simple case where there is only one fare-class; the management controls the opening and closing of the fare-class, with the objective of maximizing the total revenue. We first develop a fluid control problem, where the customer arrival and cancelation processes are treated as deterministic, whereas the no. of no-shows is random. The optimal fluid solution is shown to have a simple structure of accepting up to a single time point t* and rejecting afterwards. We show that this policy acts as an upper bound for the MDP problem. Applying the optimal fluid solution to the stochastic environment, we show that this policy is asymptotically optimal on the fluid scaling.
|
eng_Latn
| 167,198 |
Practical Analysis of Continuous-Variable Quantum Key Distribution Using a Nondeterministic Noiseless Linear Amplifier
|
We study the impact of the imperfections and the finite-size effect on the continuous-variable quantum key distribution (CVQKD) protocol with the nondeterministic noiseless linear amplifier (NLA). The imperfections of the homodyne detector and the imperfect amplification process as well as the finite-size effect on parameter estimation procedure are considered. We can see that despite the imperfections of the homodyne detector, the maximum improved transmission distance can still reach the equivalence of 20log10g dB losses theoretically. Moreover, the analysis shows the imperfect amplification process of the NLA will slightly decrease the performance of the system. And we find the finite-size effect significantly influence the secret key rates of the NLA CVQKD protocol and the performance will approach the ideal asymptotic case with the increase of block size.
|
CONTENTSIntroduction Chapter I. Foundations of the general theory of controlled random sequences and Markov chains with the expected reward criterion § 1. Controlled random sequences, Markov chains, and models § 2. Necessary and sufficient conditions for optimality § 3. The Bellman equation for the value function and the existence of (e-) optimal strategies Chapter II. Some problems in the theory of controlled homogeneous Markov chains § 4. Description of the solutions of the Bellman equation, a characterization of the value function, and the Bellman operator § 5. Sufficiency of stationary strategies in homogeneous Markov models § 6. The lexicographic Bellman equation References
|
eng_Latn
| 167,203 |
Linear systems over rings of measurable functions and conjugate gradient methods
|
We study the conjugate gradient method for solving s system of linear equations with coefficients which are measurable functions and establish the rate of convergence of this method.
|
In this note we show that a subgradient multifunction of a locally compactly Lipschitzian mapping satisfies a closure condition used extensively in optimisation theory. In addition we derive a chain rule applicable in either separable or reflexive Banach spaces for the class of locally compactly Lipschitzian mappings using a recently derived generalised Jacobian. We apply these results to the derivation of Karush-Kuhn-Tucker and Fritz John optimality conditions for general abstract cone-constrained programming problems. A discussion of constraint qualifications is undertaken in this setting
|
eng_Latn
| 167,224 |
Maximizing Polynomials Subject to Assignment Constraints
|
We study the q-adic assignment problem. We first give an O(n(q−1)/2))-approximation algorithm for the Koopmans--Beckman version of the problem, improving upon the result of Barvinok. Then, we introduce a new family of instances satisfying “tensor triangle inequalities” and give a constant factor approximation algorithm for them. We show that many classical optimization problems can be modeled by q-adic assignment problems from this family. Finally, we give several integrality gap examples for the natural LP relaxations of the problem.
|
In this work, we study the existence and multiplicity of positive solutions for the higher order p-Laplacian boundary value problem with even derivatives
|
eng_Latn
| 167,230 |
Common Fixed Point for Two Pairs of Mappings Satisfying (E.A) Property in Generalized Metric Spaces
|
Recently, Abbas et al. (2012) obtained some unique common fixed-point results for a pair of mappings satisfying (E.A) property under certain generalized strict contractive conditions in the framework of a generalized metric space. In this paper, we present common coincidence and common fixed points of two pairs of mappings when only one pair satisfies (E.A) property in the setup of generalized metric spaces. We present some examples to support our results. We also study well-posedness of common fixed-point problem.
|
This paper considers the problem of tuning natural frequencies of a linear system by a memoryless controller. Using algebro-geometric methods it is shown how it is possible to improve current sufficiency conditions.The main result is an exact combinatorial characterization of the nilpotency index of the $\bmod 2$ cohomology ring of the real Grassmannian. Using this characterization, new sufficiency results for generic pole assignment for the linear system with m-inputs, p-outputs, and McMillan degree n are given. Among other results it is shown that \[2.25 \cdot \max (m,p) + \min (m,p) - 3 \geq n\] is a sufficient condition for generic real pole placement, provided $\min (m,p) \geq 4$.
|
eng_Latn
| 167,231 |
Study on the attenuation of inelastic response spectra
|
To study the characteristics of inelastic response spectra,an attenuation relationship is established for inelastic response spectra involving earthquake magnitude,source-to-site distance,and site class based on 266 strong ground motion records which collected from 15 strong earthquakes in California of America.The effects of parameters such as magnitude,site class and ductility factor on inelastic response spectra are discussed.It is found that the inelastic response spectra increase with the increasing of magnitude and softening of site,but decrease with the increasing of ductility factor.The inelastic response spectra attenuate quickly with the increasing of distance.
|
We consider a classic scheduling problem for optimally allocating a resource to multiple competing users and place it in the framework of Stochastic Flow Models (SFMs). We derive Infinitesimal Perturbation Analysis (IPA) gradient estimators for the average holding cost with respect to resource allocation parameters. These estimators are easily obtained from a sample path of the system without any knowledge of the underlying stochastic process characteristics. Exploiting monotonicity properties of these IPA estimators, we prove the optimality of the well-known cμ-rule for an arbitrary finite number of queues and stochastic processes under non-idling policies and linear holding costs. Further, using the IPA derivative estimates obtained along with a gradient-based optimization algorithm, we find optimal solutions to similar problems with nonlinear holding costs extending current results in the literature.
|
eng_Latn
| 167,233 |
Folding Techniques for Low Complexity Acquisition of Modern GNSS Signals
|
In global navigation satellite system (GNSS) because of the long pseudo-random-noise (PRN) code period and high chip rate of the code rapid code acquisition is challenging. The difficulty is how to rapidly detect the correct cell from numerous code frequency cells. To speed up the search process several folding techniques have been proposed in the literature which directly reduces the code phases to be searched by folding either the local signal or the incoming signal. Unfortunately all the folding techniques work on the basis of a non-realistic assumption that there is no sign transition in the data set due to the navigation message bits. In this study we consider different variants of the already available folding methods such as extended replica folding acquisition search technique (XFAST) and discuss their performance in the presence of data sign transition
|
Given ?>0 andp?(0,1), we consider the following problem: findu such that $$\begin{gathered} - \Delta u + \lambda [u]_ + ^p = 0in\Omega , \hfill \\ u = 1on\partial \Omega , \hfill \\ \end{gathered} $$ whereΩ??2 is a smooth convex domain. We prove optimalH 1 andL ? error bounds for the standard continuous piecewise linear Galerkin finite element approximation. In addition we analyse a more practical approximation using numerical integration on the nonlinear term. Finally we consider a modified nonlinear SOR algorithm, which is shown to be globally convergent, for solving the algebraic system derived from the more practical approximation.
|
eng_Latn
| 167,236 |
Local solution method for the problem of enlargement of filtration
|
The enlargement of filtration theory is a study of semimartingales when the basic filtration changes. This theory provides particular techniques on stochastic calculus. We present here a technique, that we call the local solution method. We will show, with several examples, that the local solution method is an effective and flexible method. In particular, with the local solution method, we will give a unified proof of three of the classical formulas, namely Jacod's formula, the progressive enlargement formula and the enlargement formula with honest time. We also show that, besides its generality, this method, necessiting long (but interesting) computations, may not be optimal.
|
In this paper, a numerical method is given for solving fuzzy Fredholm integral equations of the second kind, by using Bernstein piecewise polynomial, whose coefficients determined through solving dual fuzzy linear system. Numerical examples are presented to illustrate the proposed method, whose calculations were implemented by using the Computer software MathCadV.14.
|
eng_Latn
| 167,241 |
A Convergent Algorithm for L2 Optimal Mimo Model Reduction
|
Often, the exact model of industrial processes turns out to be too complex for simulation and controller design. It is therefore mandatory to simplify the mathematical description of the process and/or the one of the controller. A particularly attractive simplification criterion is related to the minimization of the L 2 norm of the approximation error. This paper presents an algorithm for solving the L 2-optimal MIMO model reduction problem. It is shown that its convergence to the minima of the approximation error norm is guaranteed. The algorithm proves to be fast and efficient compared to other algorithms suggested in the literature to the same purpose.
|
In this article, we study nonsmooth convex minimax programming problems with cone constraint and abstract constraint. Our aim is to develop sequential Lagrange multiplier rules for this class of problems in the absence of any constraint qualification. These rules are obtained in terms of ∊-subdifferentials of the functions. As an application of these rules, a sequential dual is proposed and sequential duality results are presented.
|
kor_Hang
| 167,242 |
Mathematica® code for Stoner-Wohlfarth processes
|
A simple and robust numeric code written in Mathematica® is proposed in order to generate magnetic hysteresis loops and critical curves in the framework of the Stoner-Wohlfarth model, extended to take into account the effect on an external mechanical stress; a case study referring to the influence of the shear stress applied normal to the magnetic field direction is presented.
|
We consider the problem of finding the cheapest routing for a set of commodities over a directed graph, such that: i) each commodity flows through a single path, ii) the routing cost of each arc is given by a convex piecewise linear function of the load (i.e. the total flow) traversing it. We propose a new mixed-integer programming formulation for this problem. This formulation gives a complete description of the associated polyhedron for the single commodity case, and produces very tight linear programming bounds for the multi-commodity case.
|
eng_Latn
| 167,243 |
SEQUENTIAL LAGRANGE MULTIPLIER CONDITIONS FOR MINIMAX PROGRAMMING PROBLEMS
|
In this article, we study nonsmooth convex minimax programming problems with cone constraint and abstract constraint. Our aim is to develop sequential Lagrange multiplier rules for this class of problems in the absence of any constraint qualification. These rules are obtained in terms of ∊-subdifferentials of the functions. As an application of these rules, a sequential dual is proposed and sequential duality results are presented.
|
In this paper we consider certain prop- erties of an general access structure and its dual. In particular we prove that corer = corerL. We also es- tablish a new upper bound for the size of MSP, which computes connected access structure I?. We show that the size of a MSP is limited above by the sum of the number of minimal and the number of maximal sets minus one. This is the first upper bound on the size of MSPs to our knowledge.
|
yue_Hant
| 167,245 |
Multiple Meixner-Pollaczek polynomials and the six-vertex model
|
We study multiple orthogonal polynomials of Meixner-Pollaczek type with respect to a symmetric system of two orthogonality measures. Our main result is that the limiting distribution of the zeros of these polynomials is one component of the solution to a constrained vector equilibrium problem. We also provide a Rodrigues formula and closed expressions for the recurrence coefficients. The proof of the main result follows from a connection with the eigenvalues of block Toeplitz matrices, for which we provide some general results of independent interest. ::: The motivation for this paper is the study of a model in statistical mechanics, the so-called six-vertex model with domain wall boundary conditions, in a particular regime known as the free fermion line. We show how the multiple Meixner-Pollaczek polynomials arise in an inhomogeneous version of this model.
|
ABSTRACT : To perform a production process in producing a product, then the most important things that must exist in the production of factors of production or resources resources, such as raw materials, labor, equipment, and so forth. In this case the author has the objective of scientific writing: how to use the factors of production are limited in producing the maximum profit. To achieve this goal, we need a tool or method. The author uses a method in Linear Programming, the Simplex method. Simplex method can be used to solve the problem of minimizing or maximizing combination of products that can accommodate two or more variables.. When calculated using the simplex method known maximum benefits Rp.650.400, - with a combination of products, chocolate shell as many as 24 jars of cookies and real chocolate cookies as much as 30 jars.
|
eng_Latn
| 167,247 |
ON THE EXISTENCE OF POSITIVE SOLUTIONS TO SECOND ORDER PERIODIC BVPS
|
Abstract The existence of positive solutions to second-order periodic B V P s - u ″ + M u = f ( t , u ) , u ( 0 ) = u ( 2 π ) , u ′ ( 0 ) = u ′ ( 2 π ) a n d u ″ + M u = f ( t , u ) , u ( 0 ) = u ( 2 π ) ⋅ u ′ ( 0 ) = u ′ ( 2 π ) is proved by a simple application of a Fixed Point Theorem in cones due to Krasnoselskii.
|
We study a motion planning problem where items have to be transported from the top room of a tower to the bottom of the tower, while simultaneously other items have to be transported into the opposite direction. Item sets are moved in two baskets hanging on a rope and pulley. To guarantee stability of the system, the weight difference between the contents of the two baskets must always stay below a given ::: threshold. ::: ::: We prove that it is Pi-2-p-complete to decide whether some given initial situation of the underlying discrete system can lead to a given goal situation. Furthermore we identify several polynomially solvable special cases of this reachability problem, and we also settle the computational complexity of a number of related questions.
|
yue_Hant
| 167,254 |
Estimates for the Cauchy function of linear singular differential equations and some applications
|
For higher-order linear singular equations, we find sharp estimates for the Cauchy function and its partial derivatives. We use these estimates to study the properties of solutions of singular differential inequalities and obtain optimal sufficient conditions for the unique solvability of the linear singular Cauchy problem.
|
In this note we show that a subgradient multifunction of a locally compactly Lipschitzian mapping satisfies a closure condition used extensively in optimisation theory. In addition we derive a chain rule applicable in either separable or reflexive Banach spaces for the class of locally compactly Lipschitzian mappings using a recently derived generalised Jacobian. We apply these results to the derivation of Karush-Kuhn-Tucker and Fritz John optimality conditions for general abstract cone-constrained programming problems. A discussion of constraint qualifications is undertaken in this setting
|
eng_Latn
| 167,255 |
Numerical studies of the optimization of the first eigenvalue of the heat diffusion in inhomogeneous media
|
In this paper, we study optimization of the first eigenvalue of the heat equation with spatially nonuniform conductivity on a bounded domain under several constraints for the conductivity. We consider this problem in various boundary conditions and various type of topology of domains. As a result, we numerically observe several common criteria of the conductivity for optimizing eigenvalues in terms of corresponding eigenfunctions, which are independent of topology of domains and boundary conditions. The geometric characterization of optimizers are also numerically observed.
|
We consider an extended Merton's problem of optimal consumption and investment in continuous-time with stochastic volatility. The wealth process of the investor is approximated by a particular weak Ito-Taylor approximation called Euler scheme. It is shown that the optimal control of the value function generated by the Euler scheme is an e-optimal control of the original problem of maximizing total expected discounted HARA utility from consumption.
|
eng_Latn
| 167,258 |
A very mild and selective method for O-benzoylation of hydroxamic acids
|
Abstract Selective O-benzoylation of hydroxamic acids is achieved by the treatment of BPO and DABCO. Aliphatic alcohols are not reactive under these conditions. Various radical or oxidation sensitive functional groups are compatible with this protocol, and no anhydrous reagents or solvents are required for the high yields of the benzoylations.
|
One way to compute optimal control in completely observable stochastic optimal control problems is to solve the Hamilton-Jacobi Equation. We propose to replace in the quasi linearization technique of Bellman [1] the step of inversion of a linear system of dimension n by several steps of n linear equations of dimension 1 in parallel or in sequence. We are then led to apply for instance splitting up methods-studied in particular in [3], [6], [8], [9]. We obtain what we call a decomposition scheme to approximate evolutive Hamilton-Jacobi Equation. We study convergence results as time steps converge to zero with compacity methods adapted from [4] and give some numerical results.
|
eng_Latn
| 167,261 |
Interval Selection in the Streaming Model
|
A set of intervals is independent when the intervals are pairwise disjoint. In the interval selection problem, we are given a set \(\mathbb I\) of intervals and we want to find an independent subset of intervals of largest cardinality, denoted \(\alpha (\mathbb I)\). We discuss the estimation of \(\alpha (\mathbb I)\) in the streaming model, where we only have one-time, sequential access to \(\mathbb I\), the endpoints of the intervals lie in \(\{ 1,\dots ,n \}\), and the amount of the memory is constrained.
|
In this paper, we study the asymptotical optimal solutions for the general airline revenue management problem, considering both customer cancelations and no-shows. We study a simple case where there is only one fare-class; the management controls the opening and closing of the fare-class, with the objective of maximizing the total revenue. We first develop a fluid control problem, where the customer arrival and cancelation processes are treated as deterministic, whereas the no. of no-shows is random. The optimal fluid solution is shown to have a simple structure of accepting up to a single time point t* and rejecting afterwards. We show that this policy acts as an upper bound for the MDP problem. Applying the optimal fluid solution to the stochastic environment, we show that this policy is asymptotically optimal on the fluid scaling.
|
eng_Latn
| 167,273 |
Bounded error identification exploiting a-priori information on noise whiteness and noise/output correlation
|
In this paper we consider the problem of set-membership identification of nonlinear polynomial output error models, where output measurements are affected by bounded additive noise known to enjoy certain peculiar properties like whiteness and uncorrelation with the noiseless output sequence. More precisely, we propose an original approach to compute the so-called parameter uncertainty intervals by properly taking into account all the available a-priori information about the model structure and the properties of the noise. Parameters bounds are obtained by computing the solution to a set of polynomial optimization problems, where the decision variable are suitably selected and constrained in order to enforce the available a-priori information on the noise properties. Convex relaxation techniques are exploited to solve the formulated optimization problem. A simulation example is reported in order to show the effectiveness of the proposed approach.
|
Abstract The paper describes the application of a range of solution procedures to simple tie-bar models involving softening ‘stress-strain’ relationships. It illustrates the difficulties that can be encountered as a result of the associated localizations, ‘bifurcations’, and alternative equilibrium states. As a result of this study, a new solution procedure is tentatively proposed which requires the computer program to distinguish between ‘limit points’ and ‘bifurcations’. Once the latter has been detected, the solution is steered towards the ‘stable’ equilibrium path by adding to the current displacements a component of the eigenmode associated with the lowest eigenvector.
|
eng_Latn
| 167,276 |
Applied to Satellite Network of Modified Diffie-Hellman Scheme
|
This paper presented a key distribution scheme based on the Yacobi scheme that does not use the secret key provided by key distribution center as a power, but uses instead a random number generated by the user. The scheme is independent of the exposure of the secret key. Then this paper described modified Diffie-Hellman schemes based on the discrete logarithm and prime resolution into factors. The modified DH scheme was applied to point-to-multicasting, and broadcasting networks via satellite.
|
We describe preliminary results from an effort to quantify the uncertainties in parton distribution functions and the resulting uncertainties in predicted physical quantities. The production cross section of the $W$ boson is given as a first example. Constraints due to the full data sets of the CTEQ global analysis are used in this study. Two complementary approaches, based on the Hessian and the Lagrange multiplier method respectively, are outlined. We discuss issues on obtaining meaningful uncertainty estimates that include the effect of correlated experimental systematic uncertainties and illustrate them with detailed calculations using one set of precision DIS data.
|
eng_Latn
| 167,384 |
Real interference alignment for the K-user Gaussian interference compound wiretap channel
|
We study the K-user Gaussian interference wiretap channel with N external eavesdroppers. All the transmitters, receivers and eavesdroppers have a single antenna each. We propose an achievable scheme to lower bound the secure degrees of freedom (d.o.f.) for each transmitter-receiver pair. Our approach is based on the (real) interference alignment technique. Our achievable scheme not only aligns the interference at each receiver to prevent the d.o.f. from vanishing, but also aligns the signals observed by the eavesdroppers to reduce the secrecy penalty. The achievable secure d.o.f. of each transmitter-receiver pair is shown to be equations for almost all channel gains.
|
In order to improve the correctness of locally linear embedding caused by sparse data,a novel dimensionality reduction algorithm based on neighborhood rival linear embedding was proposed in this paper.According to the statistical information,it determines local linear dynamic range,adopts the cam distribution to find neighbors of data points,and avoids the lack of the direction of neighbor selection.In the case of sparse data sets,the algorithm can effectively obtain local and global information of data.The experiment to test the improved algorithm obtains a good effort of reducing dimension.The experimental results on the image retrieval using the Corel database show the efficiency of the algorithm.
|
eng_Latn
| 167,386 |
FPGA implementation of 16 bit BBS and LFSR PN sequence generator: A comparative study
|
Handbook of Applied Cryptography
|
A 3-D-Point-Cloud System for Human-Pose Estimation
|
eng_Latn
| 167,396 |
Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption
|
Blockchain for IoT security and privacy: The case study of a smart home
|
Deep Bilateral Learning for Real-Time Image Enhancement
|
eng_Latn
| 167,425 |
I have a (long) text in two versions, encrypted and plaintext. I think it was encrypted using a substitution cipher method (I'm pretty sure, indeed). I'm not good in this matter, I know little about it, but I would know if there's a way to know the function/secret used for encrypt that text. I'm ready to study, anyway :)
|
We had a quiz in class today where we had to break the ciphertext with the key given, but not the algorithm. Suffice to say that I wasn't able to decrypt it within the allotted time of 12 mins and will probably get a 0% score on the quiz. So, I was just wondering if there are some kind of standard techniques that are followed when decrypting a simple substitution ciphertext.
|
We had a quiz in class today where we had to break the ciphertext with the key given, but not the algorithm. Suffice to say that I wasn't able to decrypt it within the allotted time of 12 mins and will probably get a 0% score on the quiz. So, I was just wondering if there are some kind of standard techniques that are followed when decrypting a simple substitution ciphertext.
|
eng_Latn
| 167,536 |
Is it necessary to study the KPA security for asymmetric encryption algorithms in addition to CPA security?
|
Do known-plaintext attacks exist for public key encryption?
|
A fiber bundle over Euclidean space is trivial.
|
eng_Latn
| 167,605 |
Efficient Similarity Search over Encrypted Data
|
Privacy Preserving Keyword Searches on Remote Encrypted Data
|
An empirical study of ensemble-based semi-supervised learning approaches for imbalanced splice site datasets
|
eng_Latn
| 167,681 |
The data elements used in this study the number of addresses served; the number of stops; (for city carriers only) volume per address, and address per kilometer (for rural carriers only).
|
One of the data elements used in the study is the number of stops.
|
Volume per address was only studied for rural carriers only.
|
eng_Latn
| 168,690 |
canada area code 905
|
The 905 area code belongs to the Ontario (ON) province of Canada and some of the locations covered are Mississauga, Niagara Falls and more:he 905 area code belongs to the Ontario (ON) province of Canada and some of the locations covered are Mississauga, Niagara Falls and more:
|
The 905 area code was once used as a block of alternate numbers for calls from the United States to Mexico (+52-5-...) in the days when overseas calls otherwise would have needed to be placed through a telephone operator.his resulted in thousands of wasted numbers, and the proliferation of cell phones, fax lines, and secondary phone lines for home dial-up Internet use only exacerbated this. By 1999, the CRTC had established an ad-hoc committee to study NPA relief planning for area code 905.
|
eng_Latn
| 168,724 |
Tony Curtis took the Joe E. Brown role, not the Tony Curtis part, in a new musical based on this Billy Wilder film
|
Some Like It Hot (1959) - IMDb Comedy When two male musicians witness a mob hit, they flee the state in an all-female band ... With Marilyn Monroe, Tony Curtis, Jack Lemmon, George Raft. ... comedy from director Billy Wilder finds Tony Curtis Some Like It Hot -- Clip: Beach ..... Joe E. Brown (who also gets to deliver the film's blue-ribbon closing line).
|
I'm Just Wild About Harry - Wikipedia "I'm Just Wild About Harry" is a song written in 1921 with lyrics by Noble Sissle and music by Eubie Blake for the Broadway show Shuffle Along ... Blake disliked the suggestion and feared it would ruin his waltz but capitulated after ... The understudy was a singer who did not know the steps, so when he was unable to follow...
|
eng_Latn
| 170,681 |
The TV series "Kung Fu" was the idea of this martial artist, subject of the biopic "Dragon"
|
Free Flashcards about FILM BIOGRAPHIES - StudyStack JIM CARREY PLAYED ANDY KAUFMAN IN THIS 1999 BIOPIC, MAN ON THE MOON. PETER SHAFFER ... THE TV SERIES "KUNG FU" WAS THE IDEA OF THIS MARTIAL ARTIST, SUBJECT OF THE BIOPIC "DRAGON", BRUCE LEE.
|
George Gershwin - Wikipedia George Jacob Gershwin was an American composer and pianist. Gershwin's compositions ... He moved to Paris intending to study with Nadia Boulanger, who refused him, .... Gershwin gave the song, with a modified title, to UCLA to be used as a ..... In 1945, the film biography Rhapsody in Blue was made, starring Robert...
|
eng_Latn
| 170,720 |
who is josh turner?
|
Josh Turner (born Joshua Otis Turner, November 20, 1977 in Hannah, South Carolina) is an American country music singer-songwriter. Josh Turner is a country artist who describes his music as South Carolina Lowcountry. His voice and musical style has often been compared to that of Johnny Cash's. Hailing from the Hannah, South Carolina, Josh moved to Nashville in 1996 to study music at Belmont University.
|
He mentioned that he wanted it to sound like music in the 18th and 19th centuries. Turner performed at the Ryman Auditorium where a live album was recorded, singing a song called, Church in the Holler. Turner's album Josh Turner: Live At The Ryman was recorded in April and is available exclusively through Cracker Barrel restaurants. Turner, along with veteran songwriters Brett James and Don Schlitz, wrote a song entitled Say Yes; recorded and released by singer Dusty Drake in 2007, the song was a minor Top 40 country hit for Drake, peaking at No. 36.
|
eng_Latn
| 170,939 |
george harrison all things must pass chords and lyrics
|
â Back to top | George Harrison Chords for All Things Must Pass. Lyrics for acoustic guitar and electric guitar. Tablatures and chords are parodies/interpretations of the original songs.You may use it for private study, scholarship, research or language learning purposes only. Back to top | George Harrison Chords for All Things Must Pass. Lyrics for acoustic guitar and electric guitar. Tablatures and chords are parodies/interpretations of the original songs. You may use it for private study, scholarship, research or language learning purposes only.
|
George Harrison's most celebrated song on the White Album, While My Guitar Gently Weeps was inspired by the I Ching, and featured his friend Eric Clapton on lead guitar.
|
eng_Latn
| 170,946 |
who originally sang the logical song
|
The Logical Song is Supertramp's biggest chart hit in both the United States and their native United Kingdom and is amongst their most widely recognised radio hits. Roger Hodgson composed the song from an autobiographical point of view, from his experience of being sent away to boarding school for ten years.omposition and lyrics [edit]. The Logical Song was mostly penned by Roger Hodgson; Rick Davies wrote the vocal harmony on the second chorus. The song makes use of keyboards, castanets, and an instrumental section.
|
This article is about the musician. For the systematic study of arguments, see Logic. For other uses, see Logic (disambiguation). Sir Robert Bryson Hall II (born January 22, 1990), known by his stage name Logic, is an American rapper, singer, songwriter, and record producer.
|
eng_Latn
| 171,238 |
This trilogy is an awesome read. Set in the time of the Roman ...
|
This trilogy is an awesome read. Set in the time of the Roman Empire, it was a little hard to get into, but when I finally did, boy, I couldn't hardly put it down. I highly recommend all 3 books.
|
I am not usually a reviewer unless I absolutely LOVE something. But Inhate this book so much it prompted a review. This book is not a historical study of Constantine, Christianity or the Council of Nicea. It is a defense against Dan Brown and The Divinci Code. In other words, pathetic. It's defensiveness is shrill. Paveo comes of as an hysterical Christian rather than an assured historian, a real bummer if you are looking for some factual meat rather than dogmatic rhetoric about this important event.
Waste. Of. Money.
|
eng_Latn
| 171,628 |
DO NOT SPEND $$$ ON THIS BOOK
|
Im amazed at how many people liked this book. It really wasn't all of that. The reason behind the family disappearance was kind of absurd just from the stand point of Cynthias father being such a damn cowardThe book started off complicated and confusing a little. At first I didn't think the book being told from Cynthias husband was such a good thingbut that did change because he actually had some hilarious moments. I did like the secondary characters as they were kind of just as entertainingJane, Vince and the reality show host. As for the story and the ending, it was just not good enoughI was hoping for something more suspenseful and sinister. Since I don't want to use to spoilers to inform new readers how awful this book isI would strongly suggest readers to skip this book unless you have time to waste.
|
Fake reviews! None of them actually have mentioned their score on the TEAS.. I bought & returned because not the best too to study. Too many sections missing or not explained well enough.
|
kor_Hang
| 171,730 |
What does a B.mus. or M.mus. degree include?
|
Performers who have studied classical music extensively are said to be "classically trained". This training may be from private lessons from instrument or voice teachers or from completion of a formal program offered by a Conservatory, college or university, such as a B.mus. or M.mus. degree (which includes individual lessons from professors). In classical music, "...extensive formal music education and training, often to postgraduate [Master's degree] level" is required.
|
An in-depth study of MP3 audio quality, sound artist and composer Ryan Maguire's project "The Ghost in the MP3" isolates the sounds lost during MP3 compression. In 2015, he released the track "moDernisT" (an anagram of "Tom's Diner"), composed exclusively from the sounds deleted during MP3 compression of the song "Tom's Diner", the track originally used in the formulation of the MP3 standard. A detailed account of the techniques used to isolate the sounds deleted during MP3 compression, along with the conceptual motivation for the project, was published in the 2014 Proceedings of the International Computer Music Conference.
|
eng_Latn
| 173,994 |
what does 3G stand for?
|
In December 2012, Hormuud Telecom launched its Tri-Band 3G service for internet and mobile clients. The first of its kind in the country, this third generation mobile telecommunications technology offers users a faster and more secure connection.
|
An in-depth study of MP3 audio quality, sound artist and composer Ryan Maguire's project "The Ghost in the MP3" isolates the sounds lost during MP3 compression. In 2015, he released the track "moDernisT" (an anagram of "Tom's Diner"), composed exclusively from the sounds deleted during MP3 compression of the song "Tom's Diner", the track originally used in the formulation of the MP3 standard. A detailed account of the techniques used to isolate the sounds deleted during MP3 compression, along with the conceptual motivation for the project, was published in the 2014 Proceedings of the International Computer Music Conference.
|
eng_Latn
| 173,995 |
Besides the sugar and the four bases, what else does DNA consist of?
|
The vast majority of living organisms encode their genes in long strands of DNA (deoxyribonucleic acid). DNA consists of a chain made from four types of nucleotide subunits, each composed of: a five-carbon sugar (2'-deoxyribose), a phosphate group, and one of the four bases adenine, cytosine, guanine, and thymine.:2.1
|
An in-depth study of MP3 audio quality, sound artist and composer Ryan Maguire's project "The Ghost in the MP3" isolates the sounds lost during MP3 compression. In 2015, he released the track "moDernisT" (an anagram of "Tom's Diner"), composed exclusively from the sounds deleted during MP3 compression of the song "Tom's Diner", the track originally used in the formulation of the MP3 standard. A detailed account of the techniques used to isolate the sounds deleted during MP3 compression, along with the conceptual motivation for the project, was published in the 2014 Proceedings of the International Computer Music Conference.
|
eng_Latn
| 173,997 |
Where was an account of the study published?
|
An in-depth study of MP3 audio quality, sound artist and composer Ryan Maguire's project "The Ghost in the MP3" isolates the sounds lost during MP3 compression. In 2015, he released the track "moDernisT" (an anagram of "Tom's Diner"), composed exclusively from the sounds deleted during MP3 compression of the song "Tom's Diner", the track originally used in the formulation of the MP3 standard. A detailed account of the techniques used to isolate the sounds deleted during MP3 compression, along with the conceptual motivation for the project, was published in the 2014 Proceedings of the International Computer Music Conference.
|
The public sector effort continues with the goal to create a high-quality, draft genome sequence from reads generated by all sources. The public-sector effort has generated Sanger reads of BACs, fosmids, and plasmids as well as 454 reads. These later types of reads will be instrumental in assembling an initial draft of the D genome. In 2010, two companies (Monsanto and Illumina), completed enough Illumina sequencing to cover the D genome of G. raimondii about 50x. They announced that they would donate their raw reads to the public. This public relations effort gave them some recognition for sequencing the cotton genome. Once the D genome is assembled from all of this raw material, it will undoubtedly assist in the assembly of the AD genomes of cultivated varieties of cotton, but a lot of hard work remains.
|
eng_Latn
| 173,999 |
What are functional copies of a gene which have a loss of function due to mutation called?
|
The most common source of new genes in eukaryotic lineages is gene duplication, which creates copy number variation of an existing gene in the genome. The resulting genes (paralogs) may then diverge in sequence and in function. Sets of genes formed in this way comprise a gene family. Gene duplications and losses within a family are common and represent a major source of evolutionary biodiversity. Sometimes, gene duplication may result in a nonfunctional copy of a gene, or a functional copy may be subject to mutations that result in loss of function; such nonfunctional genes are called pseudogenes.:7.6
|
An in-depth study of MP3 audio quality, sound artist and composer Ryan Maguire's project "The Ghost in the MP3" isolates the sounds lost during MP3 compression. In 2015, he released the track "moDernisT" (an anagram of "Tom's Diner"), composed exclusively from the sounds deleted during MP3 compression of the song "Tom's Diner", the track originally used in the formulation of the MP3 standard. A detailed account of the techniques used to isolate the sounds deleted during MP3 compression, along with the conceptual motivation for the project, was published in the 2014 Proceedings of the International Computer Music Conference.
|
eng_Latn
| 174,003 |
What's the name of the software used to manage music and other media on Apple devices?
|
Apple's iTunes software (and other alternative software) can be used to transfer music, photos, videos, games, contact information, e-mail settings, Web bookmarks, and calendars, to the devices supporting these features from computers using certain versions of Apple Macintosh and Microsoft Windows operating systems.
|
An in-depth study of MP3 audio quality, sound artist and composer Ryan Maguire's project "The Ghost in the MP3" isolates the sounds lost during MP3 compression. In 2015, he released the track "moDernisT" (an anagram of "Tom's Diner"), composed exclusively from the sounds deleted during MP3 compression of the song "Tom's Diner", the track originally used in the formulation of the MP3 standard. A detailed account of the techniques used to isolate the sounds deleted during MP3 compression, along with the conceptual motivation for the project, was published in the 2014 Proceedings of the International Computer Music Conference.
|
eng_Latn
| 174,004 |
Which is less expensive, the ReWritable Audio CD or a CD-RW?
|
The ReWritable Audio CD is designed to be used in a consumer audio CD recorder, which will not (without modification) accept standard CD-RW discs. These consumer audio CD recorders use the Serial Copy Management System (SCMS), an early form of digital rights management (DRM), to conform to the United States' Audio Home Recording Act (AHRA). The ReWritable Audio CD is typically somewhat more expensive than CD-RW due to (a) lower volume and (b) a 3% AHRA royalty used to compensate the music industry for the making of a copy.
|
Short-term memory is believed to rely mostly on an acoustic code for storing information, and to a lesser extent a visual code. Conrad (1964) found that test subjects had more difficulty recalling collections of letters that were acoustically similar (e.g. E, P, D). Confusion with recalling acoustically similar letters rather than visually similar letters implies that the letters were encoded acoustically. Conrad's (1964) study, however, deals with the encoding of written text; thus, while memory of written language may rely on acoustic components, generalisations to all forms of memory cannot be made.
|
eng_Latn
| 174,213 |
We prove that 23, 11, and 7 do not divide the order of the automorphism group of a binary [96, 48, 20] doubly-even self-dual code. We construct 25 new inequivalent binary [96, 48, 16] doubly-even self-dual codes via an automorphism of order 23.
|
Self-orthogonal ternary codes of minimum weight 3 may be analyzed in a straightforward manner using the theory of glueing introduced in earlier papers. The present paper describes a method for studying codes of minimum weight 6 : the supports of the words of weight 6 form what is called a center set. Associated with each center set is a graph, and all the graphs that can arise in this way are known. These techniques are used to classify the ternary self-dual codes of length 20 : there are 24 inequivalent codes, 17 of which are indecomposable. Six of the codes have minimum weight 6 .
|
On the basis of the results of X-ray photoelectron spectroscopy, theoretical analyses, and numerical simulations, the failure mechanism of an S-band pillbox output window applied in a high-average-power klystron is discussed. The influence of the high-order cylindrical-guide modes on the microwave power loss, the direction of the power flow and the window disk cracking are investigated. The high-order cylindrical-guide TM11 mode existing on the surface of the window ceramic disk may cause the carbon film deposition and excessive radio frequency losses on the disk and lead to the breakdown of the window.
|
eng_Latn
| 174,553 |
I am studying bitwise operations in bash and understand all the other operations, but this one. It will be a great help if someone can explain (with examples) what the negation (~) operator does in bitwise operations. Couldn't understand from what I read here and elsewhere. TIA!
|
$ echo $(( 255 )) 255 $ echo $(( 33 )) 33 $ echo $(( ~33 )) -34 $ echo $(( ~255 )) -256 $ and my kernel is: $ uname -a Linux HOSTNAME 3.2.0-40-generic-pae #64-Ubuntu SMP Mon Mar 25 21:44:41 UTC 2013 i686 i686 i386 GNU/Linux QUESTION: ~ is for negating the number AFAIK. But why does ~33 produce -34 and why does ~255 produce -256?
|
How do we show that equality holds in the triangle inequality $|a+b|=|a|+|b|$ iff both numbers are positive, both are negative or one is zero? I already showed that equality holds when one of the three conditions happens.
|
eng_Latn
| 174,618 |
struct Node { char c; double d; int s; } Node; I recently started studying linked lists and in between just trying random things to explore. I tried getting size of the node at first i thought it would be 13 later on googling i found there is concept of padding and data alignment. So My system has 64bit processor and according to that i calculated (1(char) + 7(for padding) + 8(double) + 4(int) ) = 20 So why it comes out be 24. Also as you can see iam beginner can you provide some references where i can read more fundamental stuff or things which will be helpful. I appreciate any advice you give. Thanks
|
Why does the sizeof operator return a size larger for a structure than the total sizes of the structure's members?
|
The entire site is blank right now. The header and footer are shown, but no questions.
|
eng_Latn
| 174,629 |
Remove white spaces from latex How can the white spaces from the output of the following line: $C++$ be omitted so that there is no white space between 'C' and '+' and the last '+'. The current output is: C + + C and the pluses are considered operands and operators.
|
Prettiest way to typeset "C++" (cplusplus)? Writing "C++" in plain text results in an ugly setting, as the '+' signs are too big and too spaced: I've seen around the web several marcos for typesetting the "C++" symbol, ranging from mild kerning to shrinking, raising and lowering the '+' signs. What is your version of a \cpp{} macro?
|
Canonical vs. non-canonical terminal input I am studying for an exam and I am confused as to how canonical vs. non-canonical input/output works in Unix (e.g., curses). I understand that there is a buffer to which "line disciplines" are applied for canonical input. Does this mean that the buffer is bypassed for non-canonical input, or does it simply mean that no line disciplines are applied? How does this process differ for input and output operations? In the curses programs I have worked with that demonstrate canonical input, the input typed by a user is automatically entered either after a certain number of characters have been typed or a certain amount of time has passed. Are either of these things considered "line disciplines" or is this something else entirely?
|
eng_Latn
| 174,685 |
I am studying Compilers recently, and I want to implement a lexer. When I was designing the Symbol Table of lexer, I was thinking of to make the hash value of the identifier to the Symbol Table index. However, I was confused about which hash function I should use, can anyone give me some advice? I want to implement the lexer with C++, and say the identifier is made of letter, number and underscore, and it only starts with letter or underscore. Thank you in advance!
|
What is a good Hash function? I saw a lot of hash function and applications in my data structures courses in college, but I mostly got that it's pretty hard to make a good hash function. As a rule of thumb to avoid collisions my professor said that: function Hash(key) return key mod PrimeNumber end (mod is the % operator in C and similar languages) with the prime number to be the size of the hash table. I get that is a somewhat good function to avoid collisions and a fast one, but how can I make a better one? Is there better hash functions for string keys against numeric keys?
|
The entire site is blank right now. The header and footer are shown, but no questions.
|
eng_Latn
| 174,827 |
How do I copy to clipboard text I cut with Ctrl+U? In an interactive shell session, how do I copy to clipboard text that was cut with Ctrl+U? Without using the mouse, obviously. Thus making it available for other GUI applications, instead of pastable only with Ctrl+Y only in the terminal where the Ctrl+U was issued. Update: added bash tag to cover answers involving bash-only solutions.
|
Share the clipboard between bash and X11 In the top answer shows how to copy text that has been previously selected with the mouse on a gnome-terminal, to the clipboard in X11. My question is: Say I copy a piece of text from the terminal using bash set-mark and copy keyboard shortcuts (i.e. set-mark + M-w). Is it possible to share this clipboard with X11? EDIT: In the original question, I talked about sharing the clipboard with GNOME, but as Gilles points out below, GNOME doesn't specifically have a clipboard (it's general to X), so I have updated the question.
|
Canonical vs. non-canonical terminal input I am studying for an exam and I am confused as to how canonical vs. non-canonical input/output works in Unix (e.g., curses). I understand that there is a buffer to which "line disciplines" are applied for canonical input. Does this mean that the buffer is bypassed for non-canonical input, or does it simply mean that no line disciplines are applied? How does this process differ for input and output operations? In the curses programs I have worked with that demonstrate canonical input, the input typed by a user is automatically entered either after a certain number of characters have been typed or a certain amount of time has passed. Are either of these things considered "line disciplines" or is this something else entirely?
|
eng_Latn
| 174,874 |
t character definition
|
Character (noun). a distinctive mark; a letter, figure, or symbol. Character (noun). style of writing or printing; handwriting; the peculiar form of letters used by a particular person or people; as, an inscription in the Runic character.
|
Character (noun). a distinctive mark; a letter, figure, or symbol. Character (noun). style of writing or printing; handwriting; the peculiar form of letters used by a particular person or people; as, an inscription in the Runic character. written or printed symbol, or letter. character (Noun). A distinguishing feature; characteristic; A complex of mental and ethical traits marking a person or a group. A study of the suspect's character and his cast iron alibi ruled him out.
|
eng_Latn
| 175,153 |
Kinetic model for vacancy transport caused by moving dislocations in ionic crystals
|
A simplified kinetic model for the calculation of vacancy transport caused by moving dislocations is developed. The basic principle of the model is that the transport process is carried out by the diffusion of vacancies in the potential field of the moving dislocations. The numerical results obtained in ionic crystals agree well with the experimental results at room temperature, but at higher temperatures there is significant discrepancy between the theory and experiment. The estimations show that this discrepancy can be attributed to the unjustified neglects made during the evaluation of the measurements.
|
This paper focuses on the construction, development, and use of mathematical models by prospective science and mathematics teachers enrolled in a university physics course. By studying their involvement in an inquiry-based, experimental approach to learning kinematics, we address a fundamental question about the meaning and role of abstraction in modelling when such approaches involve students encountering and resolving experimental error. We use a “tensions” framework to explore the capability of learners to make necessary connections between abstract mathematical models and physical phenomena.
|
eng_Latn
| 175,264 |
Physicist scientist mainly study what?
|
What due physicist study?
|
What due physicist study?
|
eng_Latn
| 175,270 |
Clear introduction into current cosmology
|
Mr. Hawking introduces some modern hypotheses and theories about formation of the universe we live in, and discusses possible fate of it. He explains most scientific concepts very clearly.
This book can act as a very good introduction into today's world of science.
|
Highly entertaining read. My son is thinking about going to Uni to study science, so I will be suggesting this to him as it will make science come alive with the fascinating human element of discoveries, intrigue and overall steps in human development.
|
eng_Latn
| 175,274 |
Which is the best book to understand tensors?
|
Which is the best book to study TENSOR for general relativity from basic?
|
What books would you recommend for an engineering student in his first year?
|
eng_Latn
| 175,282 |
I am in my final semester graduating from a liberal arts college (physics/math major) and intend to study high-energy theory in graduate school. Coming from a smaller college I have not had the opportunity to take courses in partial differential equations, integral equations, or numerical/computational methods. What resources, in the aforementioned fields, might one recommend to a student looking to get sufficiently up to speed for graduate level coursework and research (n.b. I do solid math background, in general, including linear algebra and complex analysis, which might come in handy for such topis/learning)?
|
In his first lesson (transcripted in "Tips on Physics"), Feynman talks about math for physicists in a very cool and practical way. And at the end of the section he talks something like "so the first thing to do is to learn to learn derivative, integral and algebra" (I don't know how much precise I'm being because I've read it in Portuguese). I would to know if there is some book that deals with math as Feynman did it in this lesson (respecting formalities, but teaching how to use the practical rules)? Also, someone have any recommendations for algebra book (college level)?
|
I'd prefer as little formal definition as possible and simple mathematics.
|
eng_Latn
| 175,290 |
I'm looking for some books on abstract algebra which go into a lot of depth and still ensure I gain a lot of intuition. Any suggestions?
|
I've taken up self-study of math. (How smart can that be?) I've just about finished a course in real analysis which spent a lot of time on metric spaces and some time revisiting calculus. I was thinking of trying abstract algebra. I would appreciate any book recommendations. Thanks in advance. Andrew
|
I know that in the case of Gaussian mixture, the "intuition" is that you're drawing from a PDF which itself is just a sum of weighted Gaussian PDFs. I don't understand the intuition behind how the sum of two iid Gaussian RVs leads to a Gaussian RV. I know the maths behind it, but I'm having a hard time visualizing how the sum of two Gaussian RVs leads to a Gaussian RV (and not a mixture).
|
eng_Latn
| 175,291 |
I will soon start studying electrodynamics from Griffith's Electrodynamics. I tried to learn the math required from the first chapter but found that I couldn't understand it very well. So are there some good textbooks for learning multivariable calculus?
|
I am looking for a multivariable calculus book that is really physics oriented. Anyone know of any? EDIT: My wife is looking to brush up on multivariable at the same time she needs to brush up on the related physics.
|
The entire site is blank right now. The header and footer are shown, but no questions.
|
eng_Latn
| 175,294 |
In his first lesson (transcripted in "Tips on Physics"), Feynman talks about math for physicists in a very cool and practical way. And at the end of the section he talks something like "so the first thing to do is to learn to learn derivative, integral and algebra" (I don't know how much precise I'm being because I've read it in Portuguese). I would to know if there is some book that deals with math as Feynman did it in this lesson (respecting formalities, but teaching how to use the practical rules)? Also, someone have any recommendations for algebra book (college level)?
|
Every once in a while, we get a question asking for a book or other educational reference on a particular topic at a particular level. This is a meta-question that collects all those links together. If you're looking for book recommendations, this is probably the place to start. All the questions linked below, as well as others which deal with more specialized books, can be found under the tag (formerly ). If you have a question to add, please edit it in. However, make sure of a few things first: The question should be tagged It should be of the form "What are good books to learn/study [subject] at [level]?" It shouldn't duplicate a topic and level that's already on the list Related Meta:
|
In his first lesson (transcripted in "Tips on Physics"), Feynman talks about math for physicists in a very cool and practical way. And at the end of the section he talks something like "so the first thing to do is to learn to learn derivative, integral and algebra" (I don't know how much precise I'm being because I've read it in Portuguese). I would to know if there is some book that deals with math as Feynman did it in this lesson (respecting formalities, but teaching how to use the practical rules)? Also, someone have any recommendations for algebra book (college level)?
|
eng_Latn
| 175,300 |
Could anyone recommend introductory books on Green's functions with applications in the framework of classical electrodynamics?
|
For a physics major, what are the best books/references on Greens functions for self-studying? My mathematical background is on the level of Mathematical Methods in the physical sciences by Mary Boas.
|
It is stated as a problem in Spivak's Calculus and I can't wrap my head around it.
|
eng_Latn
| 175,306 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.