id int32 0 100k | text stringlengths 21 3.54k | source stringlengths 1 124 | similarity float32 0.79 0.89 |
|---|---|---|---|
99,700 | By Green's Theorem, this equals the double integral where D {\displaystyle D} is the closed unit disc. Its integrand is identically 0, so d f / d φ {\displaystyle df/d\varphi } is likewise identically zero. This implies that f(φ) is constant. The constant may be determined by evaluating f {\displaystyle f} at φ = 0 {\displaystyle \varphi =0}: Therefore, the original integral also equals 2 π {\displaystyle 2\pi } . | Leibniz Integral Rule | 0.789179 |
99,701 | If one defines: then φ {\displaystyle \varphi } may be differentiated with respect to α by differentiating under the integral sign, i.e., By the Heine–Cantor theorem it is uniformly continuous in that set. In other words, for any ε > 0 there exists Δα such that for all values of x in , On the other hand, Hence φ(α) is a continuous function. Similarly if ∂ ∂ α f ( x , α ) {\displaystyle {\frac {\partial }{\partial \alpha }}f(x,\alpha )} exists and is continuous, then for all ε > 0 there exists Δα such that: Therefore, where Now, ε → 0 as Δα → 0, so This is the formula we set out to prove. Now, suppose where a and b are functions of α which take increments Δa and Δb, respectively, when α is increased by Δα. Then, A form of the mean value theorem, ∫ a b f ( x ) d x = ( b − a ) f ( ξ ) , {\textstyle \int _{a}^{b}f(x)\,dx=(b-a)f(\xi ),} where a < ξ < b, can be applied to the first and last integrals of the formula for Δφ above, resulting in Dividing by Δα, letting Δα → 0, noticing ξ1 → a and ξ2 → b and using the above derivation for yields This is the general form of the Leibniz integral rule. | Leibniz Integral Rule | 0.789179 |
99,702 | Lemma. One has: Proof. From the proof of the fundamental theorem of calculus, and Suppose a and b are constant, and that f(x) involves a parameter α which is constant in the integration but may vary to form different integrals. Assume that f(x, α) is a continuous function of x and α in the compact set {(x, α): α0 ≤ α ≤ α1 and a ≤ x ≤ b}, and that the partial derivative fα(x, α) exists and is continuous. | Leibniz Integral Rule | 0.789179 |
99,703 | The bounded convergence theorem states that if a sequence of functions on a set of finite measure is uniformly bounded and converges pointwise, then passage of the limit under the integral is valid. In particular, the limit and integral may be exchanged for every sequence {δn} → 0. Therefore, the limit as δ → 0 may be passed through the integral sign. | Leibniz Integral Rule | 0.789178 |
99,704 | The above application of the mean value theorem therefore gives a uniform (independent of t {\displaystyle t} ) bound on f δ ( x , t ) {\displaystyle f_{\delta }(x,t)} . The difference quotients converge pointwise to the partial derivative fx by the assumption that the partial derivative exists. The above argument shows that for every sequence {δn} → 0, the sequence { f δ n ( x , t ) } {\displaystyle \{f_{\delta _{n}}(x,t)\}} is uniformly bounded and converges pointwise to fx. | Leibniz Integral Rule | 0.789178 |
99,705 | The difference of two integrals equals the integral of the difference, and 1/h is a constant, so We now show that the limit can be passed through the integral sign. We claim that the passage of the limit under the integral sign is valid by the bounded convergence theorem (a corollary of the dominated convergence theorem). For each δ > 0, consider the difference quotient For t fixed, the mean value theorem implies there exists z in the interval such that Continuity of fx(x, t) and compactness of the domain together imply that fx(x, t) is bounded. | Leibniz Integral Rule | 0.789178 |
99,706 | If the integrals at hand are Lebesgue integrals, we may use the bounded convergence theorem (valid for these integrals, but not for Riemann integrals) in order to show that the limit can be passed through the integral sign. Note that this proof is weaker in the sense that it only shows that fx(x,t) is Lebesgue integrable, but not that it is Riemann integrable. In the former (stronger) proof, if f(x,t) is Riemann integrable, then so is fx(x,t) (and thus is obviously also Lebesgue integrable). Let By the definition of the derivative, Substitute equation (1) into equation (2). | Leibniz Integral Rule | 0.789178 |
99,707 | Given a functional and a function ϕ(r) that vanishes on the boundary of the region of integration, from a previous section Definition, The second line is obtained using the total derivative, where ∂f /∂∇'ρ is a derivative of a scalar with respect to a vector. The third line was obtained by use of a product rule for divergence. The fourth line was obtained using the divergence theorem and the condition that ϕ = 0 on the boundary of the region of integration. Since ϕ is also an arbitrary function, applying the fundamental lemma of calculus of variations to the last line, the functional derivative is where ρ = ρ(r) and f = f (r, ρ, ∇ρ). | Variational derivative | 0.789178 |
99,708 | In physics, it is common to use the Dirac delta function δ ( x − y ) {\displaystyle \delta (x-y)} in place of a generic test function ϕ ( x ) {\displaystyle \phi (x)} , for yielding the functional derivative at the point y {\displaystyle y} (this is a point of the whole functional derivative as a partial derivative is a component of the gradient): This works in cases when F {\displaystyle F} formally can be expanded as a series (or at least up to first order) in ε {\displaystyle \varepsilon } . The formula is however not mathematically rigorous, since F {\displaystyle F} is usually not even defined. The definition given in a previous section is based on a relationship that holds for all test functions ϕ ( x ) {\displaystyle \phi (x)} , so one might think that it should hold also when ϕ ( x ) {\displaystyle \phi (x)} is chosen to be a specific function such as the delta function. However, the latter is not a valid test function (it is not even a proper function). | Variational derivative | 0.789178 |
99,709 | The substitution principle in sustainability is the maxim of how processes, services, and products should be replaced with alternatives that result in a lower environmental impact. An example of a strong, hazard-based interpretation of the substitution principle in application regarding chemicals considers the overall impact: "hazardous chemicals should be substituted by less hazardous alternatives or preferably alternatives that mitigates identifiable hazards impacts".The principle has historically been promoted by environmental groups. This concept is becoming increasingly mainstream, being a key concept in green chemistry and a central element of EU REACH regulation. Critics of the principle claim it is very difficult to implement in reality, especially in terms of legislation.Nonetheless, the concept is an important one and a key driver behind identifying "Substances of Very High Concern" in REACH and the development of hazardous substance lists such as the SIN List and the ETUC Trade Union Priority List. EU-funded projects such as SubsPort are under development to aid the identification and development of safer substitutes for hazardous chemicals. | Substitution principle (sustainability) | 0.789178 |
99,710 | One of the earliest uses of a cancelbot was by microbiology professor Richard DePew, to remove anonymous postings in science newsgroups. Perhaps the most well known early cancelbot was used in June 1994 by Arnt Gulbrandsen within minutes of the first post of Canter & Siegel's second spam wave, as it was created in response to their "Green Card spam" in April 1994. Usenet spammers have alleged that cancelbots are a tool of the mythical Usenet cabal. | Cancelbot | 0.789177 |
99,711 | The genus Lysobacter belongs to the family Xanthomonadaceae within the Gammaproteobacteria and includes at least 46 named species, including: Lysobacter enzymogenes, L. antibioticus, L. gummosus, L. brunescens, L. defluvii, L. niabensis, L. niastensis, L. daejeonensis, L. yangpyeongensis, L. koreensis, L. concretionis, L. spongiicola, and L. capsici. Lysobacter spp. were originally grouped with myxobacteria because they shared the distinctive trait of gliding motility, but they uniquely display a number of traits that distinguish them from other taxonomically and ecologically related microbes including high genomic G+C content (typically ranging between 65 and 72%) and the lack of flagella. The feature of gliding motility alone has piqued the interest of many, since the role of gliding bacteria in soil ecology is poorly understood. | Lysobacter enzymogenes | 0.789174 |
99,712 | Parentheses are used in chemistry to denote a repeated substructure within a molecule, e.g. HC(CH3)3 (isobutane) or, similarly, to indicate the stoichiometry of ionic compounds with such substructures: e.g. Ca(NO3)2 (calcium nitrate). In chemical nomenclature, parentheses are used to distinguish structural features and multipliers for clarity, for example in the polymer poly(methyl methacrylate).They can be used in various fields as notation to indicate the amount of uncertainty in a numerical quantity. For example: 1234.56789(11)is equivalent to: 1234.56789 ± 0.00011e.g. the value of the Boltzmann constant could be quoted as 1.38064852(79)×10−23 J⋅K−1 . | Curly bracket | 0.789174 |
99,713 | In relation to soft tissue, Davis' law explains how soft tissue remodels itself according to imposed demands. Refinement of Wolff's Law: Utah-Paradigm of Bone physiology (Mechanostat Theorem) by Harold Frost. | Wolff's law | 0.789174 |
99,714 | According to the Stone–von Neumann theorem, the unitary representations ρ and ρ ∘ j are unitarily equivalent, so there is a unique intertwiner W ∈ U(L2(R)) such that ρ ∘ j = W ρ W ∗ . {\displaystyle \rho \circ j=W\rho W^{*}.} This operator W is the Fourier transform. Many of the standard properties of the Fourier transform are immediate consequences of this more general framework. For example, the square of the Fourier transform, W2, is an intertwiner associated with J2 = −I, and so we have (W2f)(x) = f (−x) is the reflection of the original function f. | Table of Fourier transforms | 0.789174 |
99,715 | {\displaystyle f(x)=\sum _{n=-\infty }^{\infty }c_{n}\,e^{i2\pi {\tfrac {n}{P}}x}.} Similarly, under suitable conditions on f {\displaystyle f} , the Fourier inversion formula on R {\displaystyle \mathbb {R} } is:The complex number, f ^ ( ξ ) {\displaystyle {\hat {f}}(\xi )} , conveys both amplitude and phase of frequency ξ {\displaystyle \xi } . So Eq.2 is a representation of f ( x ) {\displaystyle f(x)} as a weighted summation of complex exponential functions. This is known as the Fourier inversion theorem, and was first introduced in Fourier's Analytical Theory of Heat, although a proof by modern standards was not given until much later. | Table of Fourier transforms | 0.789174 |
99,716 | The Fourier inversion theorem provides a synthesis process that recreates the original function from its frequency domain representation. A key to interpreting Eq.1 is that the effect of multiplying f ( x ) {\displaystyle f(x)} by e − i 2 π ξ x {\displaystyle e^{-i2\pi \xi x}} is to subtract ξ {\displaystyle \xi } from every frequency component of function f ( x ) . {\displaystyle f(x).} | Table of Fourier transforms | 0.789174 |
99,717 | In the case that ER is taken to be a cube with side length R, then convergence still holds. Another natural candidate is the Euclidean ball ER = {ξ: |ξ| < R}. In order for this partial sum operator to converge, it is necessary that the multiplier for the unit ball be bounded in Lp(Rn). For n ≥ 2 it is a celebrated theorem of Charles Fefferman that the multiplier for the unit ball is never bounded unless p = 2. In fact, when p ≠ 2, this shows that not only may fR fail to converge to f in Lp, but for some functions f ∈ Lp(Rn), fR is not even an element of Lp. | Table of Fourier transforms | 0.789174 |
99,718 | In this case the Tomas–Stein restriction theorem states that the restriction of the Fourier transform to the unit sphere in Rn is a bounded operator on Lp provided 1 ≤ p ≤ 2n + 2/n + 3. One notable difference between the Fourier transform in 1 dimension versus higher dimensions concerns the partial sum operator. Consider an increasing collection of measurable sets ER indexed by R ∈ (0,∞): such as balls of radius R centered at the origin, or cubes of side 2R. | Table of Fourier transforms | 0.789174 |
99,719 | The Fourier transform f̂(ξ) is related to the Laplace transform F(s), which is also used for the solution of differential equations and the analysis of filters. It may happen that a function f for which the Fourier integral does not converge on the real axis at all, nevertheless has a complex Fourier transform defined in some region of the complex plane. For example, if f(t) is of exponential growth, i.e., | f ( t ) | < C e a | t | {\displaystyle \vert f(t)\vert | Table of Fourier transforms | 0.789174 |
99,720 | The original GAN paper proved the following two theorems: Interpretation: For any fixed generator strategy μ G {\displaystyle \mu _{G}} , the optimal discriminator keeps track of the likelihood ratio between the reference distribution and the generator distribution:where σ {\displaystyle \sigma } is the logistic function. In particular, if the prior probability for an image x {\displaystyle x} to come from the reference distribution is equal to 1 2 {\displaystyle {\frac {1}{2}}} , then D ( x ) {\displaystyle D(x)} is just the posterior probability that x {\displaystyle x} came from the reference distribution: | Generative adversarial networks | 0.789172 |
99,721 | GANs are implicit generative models, which means that they do not explicitly model the likelihood function nor provide a means for finding the latent variable corresponding to a given sample, unlike alternatives such as flow-based generative model. Compared to fully visible belief networks such as WaveNet and PixelRNN and autoregressive models in general, GANs can generate one complete sample in one pass, rather than multiple passes through the network. Compared to Boltzmann machines and nonlinear ICA, there is no restriction on the type of function used by the network. Since neural networks are universal approximators, GANs are asymptotically consistent. Variational autoencoders might be universal approximators, but it is not proven as of 2017. | Generative adversarial networks | 0.789172 |
99,722 | The critic and adaptive network train each other to approximate a nonlinear optimal control.GANs have been used to visualize the effect that climate change will have on specific houses.A GAN model called Speech2Face can reconstruct an image of a person's face after listening to their voice.In 2016 GANs were used to generate new molecules for a variety of protein targets implicated in cancer, inflammation, and fibrosis. In 2019 GAN-generated molecules were validated experimentally all the way into mice.Whereas the majority of GAN applications are in image processing, the work has also been done with time-series data. For example, recurrent GANs (R-GANs) have been used to generate energy data for machine learning. | Generative adversarial networks | 0.789172 |
99,723 | In the most generic version of the GAN game described above, the strategy set for the discriminator contains all Markov kernels μ D: Ω → P {\displaystyle \mu _{D}:\Omega \to {\mathcal {P}}} , and the strategy set for the generator contains arbitrary probability distributions μ G {\displaystyle \mu _{G}} on Ω {\displaystyle \Omega } . However, as shown below, the optimal discriminator strategy against any μ G {\displaystyle \mu _{G}} is deterministic, so there is no loss of generality in restricting the discriminator's strategies to deterministic functions D: Ω → {\displaystyle D:\Omega \to } . In most applications, D {\displaystyle D} is a deep neural network function. As for the generator, while μ G {\displaystyle \mu _{G}} could theoretically be any computable probability distribution, in practice, it is usually implemented as a pushforward: μ G = μ Z ∘ G − 1 {\displaystyle \mu _{G}=\mu _{Z}\circ G^{-1}} . | Generative adversarial networks | 0.789172 |
99,724 | The GAN game is a general framework and can be run with any reasonable parametrization of the generator G {\displaystyle G} and discriminator D {\displaystyle D} . In the original paper, the authors demonstrated it using multilayer perceptron networks and convolutional neural networks. Many alternative architectures have been tried. Deep convolutional GAN (DCGAN): For both generator and discriminator, uses only deep networks consisting entirely of convolution-deconvolution layers, that is, fully convolutional networks.Self-attention GAN (SAGAN): Starts with the DCGAN, then adds residually-connected standard self-attention modules to the generator and discriminator. | Generative adversarial networks | 0.789172 |
99,725 | StyleGAN-3 improves upon StyleGAN-2 by solving the "texture sticking" problem, which can be seen in the official videos. They analyzed the problem by the Nyquist–Shannon sampling theorem, and argued that the layers in the generator learned to exploit the high-frequency signal in the pixels they operate upon. To solve this, they proposed imposing strict lowpass filters between each generator's layers, so that the generator is forced to operate on the pixels in a way faithful to the continuous signals they represent, rather than operate on them as merely discrete signals. They further imposed rotational and translational invariance by using more signal filters. The resulting StyleGAN-3 is able to solve the texture sticking problem, as well as generating images that rotate and translate smoothly. | Generative adversarial networks | 0.789172 |
99,726 | The terms champagne model and champagne flow were coined by Mexican astrophysicist Guillermo Tenorio-Tagle in a paper in 1979 (Astronomy and Astrophysics 1979A&A....71...59T). The model focus on the size, velocity field and the large density variations observed in HII regions. This article was followed by further hydrodynamical calculations in one and two dimensions, in collaboration with Drs. Peter Bodenheimer, Harold W. Yorke and Piet Bedijn see:1979ApJ...233…85B.1983A&A...127..313Y, 1979A&A....80..110T, 1982ASSL...93….1T, 1984A&A...138..325Y, 1981A&A....98…85B | Champagne flow model | 0.789171 |
99,727 | Offshore wind power is not a form of marine energy, as wind power is derived from the wind, even if the wind turbines are placed over water. The oceans have a tremendous amount of energy and are close to many if not most concentrated populations. Ocean energy has the potential of providing a substantial amount of new renewable energy around the world. | Power stations | 0.789171 |
99,728 | There are two situations in which the nerves will stimulate the sweat glands, causing perspiration: during physical heat and during emotional stress. In general, emotionally induced sweating is restricted to palms, soles, armpits, and sometimes the forehead, while physical heat-induced sweating occurs throughout the body.People have an average of two to four million sweat glands, but how much sweat is released by each gland is determined by many factors, including sex, genetics, environmental conditions, age and fitness level. Two of the major contributors to sweat rate are an individual's fitness level and weight. | Human sweat | 0.78917 |
99,729 | Of the four ACID properties in a DBMS (Database Management System), the isolation property is the one most often relaxed. When attempting to maintain the highest level of isolation, a DBMS usually acquires locks on data which may result in a loss of concurrency, or implements multiversion concurrency control. This requires adding logic for the application to function correctly. Most DBMSs offer a number of transaction isolation levels, which control the degree of locking that occurs when selecting data. | Isolation (database systems) | 0.78917 |
99,730 | For example, coordination mechanisms in human–robot collaboration are based on work in neuroscience which examined how to enable joint action in human–human configuration by studying perception and action in a social context rather than in isolation. These studies have revealed that maintaining a shared representation of the task is crucial for accomplishing tasks in groups. For example, the authors have examined the task of driving together by separating responsibilities of acceleration and braking i.e., one person is responsible for accelerating and the other for braking; the study revealed that pairs reached the same level of performance as individuals only when they received feedback about the timing of each other's actions. | Human–robot interaction | 0.789169 |
99,731 | Three conferences on Human–Robot Personal Relationships were held in the Netherlands during the period 2008–2010, in each case the proceedings were published by respected academic publishers, including Springer-Verlag. After a gap until 2014 the conferences were renamed as the "International Congress on Love and Sex with Robots", which have previously taken place at the University of Madeira in 2014; in London in 2016 and 2017; and in Brussels in 2019. Additionally, the Springer-Verlag "International Journal of Social Robotics", had, by 2016, published articles mentioning the subject, and an open access journal called "Lovotics" was launched in 2012, devoted entirely to the subject. | Human–robot interaction | 0.789169 |
99,732 | The International Congress on Love and Sex with Robots is an annual congress that invites and encourages a broad range of topics, such as AI, Philosophy, Ethics, Sociology, Engineering, Computer Science, Bioethics. The earliest academic papers on the subject were presented at the 2006 E.C. Euron Roboethics Atelier, organized by the School of Robotics in Genoa, followed a year later by the first book – "Love and Sex with Robots" – published by Harper Collins in New York. Since that initial flurry of academic activity in this field the subject has grown significantly in breadth and worldwide interest. | Human–robot interaction | 0.789169 |
99,733 | It needs to categorize objects, recognize and locate humans and further recognize their emotions. The need for dynamic capacities pushes forward every sub-field of robotics. | Human–robot interaction | 0.789169 |
99,734 | This close interaction needs new theoretical models, on one hand for the robotics scientists who work to improve the robots utility and safety and on the other hand to evaluate the risks and benefits of this new "friend" for our modern society. The subfield of physical human–robot interaction (pHRI) has largely focused on device design to enable people to safely interact with robotic systems, but is increasingly developing algorithmic approaches in an attempt to support fluent and expressive interactions between humans and robotic systems.With the advance in AI, the research is focusing on one part towards the safest physical interaction but also on a socially correct interaction, dependent on cultural criteria. The goal is to build an intuitive, and easy communication with the robot through speech, gestures, and facial expressions. | Human–robot interaction | 0.789169 |
99,735 | Examples of robots which demonstrate this trend include Willow Garage's PR2 robot, the NASA Robonaut, and Honda ASIMO. However, robots in the human–robot interaction field are not limited to human-like robots: Paro and Kismet are both robots designed to elicit emotional response from humans, and so fall into the category of human–robot interaction.Goals in HRI range from industrial manufacturing through Cobots, medical technology through rehabilitation, autism intervention, and elder care devices, entertainment, human augmentation, and human convenience. Future research therefore covers a wide range of fields, much of which focuses on assistive robotics, robot-assisted search-and-rescue, and space exploration. | Human–robot interaction | 0.789169 |
99,736 | A robot must obey the orders given it by human beings except where such orders would conflict with the First Law. A robot must protect its own existence as long as such protection does not conflict with the First or Second Laws.These three laws provide an overview of the goals engineers and researchers hold for safety in the HRI field, although the fields of robot ethics and machine ethics are more complex than these three principles. However, generally human–robot interaction prioritizes the safety of humans that interact with potentially dangerous robotics equipment. | Human–robot interaction | 0.789169 |
99,737 | Human–robot interaction has been a topic of both science fiction and academic speculation even before any robots existed. Because much of active HRI development depends on natural language processing, many aspects of HRI are continuations of human communications, a field of research which is much older than robotics. The origin of HRI as a discrete problem was stated by 20th-century author Isaac Asimov in 1941, in his novel I, Robot. Asimov coined Three Laws of Robotics, namely: A robot may not injure a human being or, through inaction, allow a human being to come to harm. | Human–robot interaction | 0.789169 |
99,738 | In civil engineering and structural engineering, serviceability refers to the conditions under which a building is still considered useful. Should these limit states be exceeded, a structure that may still be structurally sound would nevertheless be considered unfit. It refers to conditions other than the building strength that render the buildings unusable. | Serviceability (structure) | 0.789168 |
99,739 | The International Conference on Future Applications of AI, Sensors, and Robotics in Society explore the state of the art research, highlighting the future challenges as well as the hidden potential behind the technologies. The accepted contributions to this conference will be published annually in the special edition of the Journal of Future Robot Life. | Human–robot interaction | 0.789168 |
99,740 | Early work in time–frequency analysis can be seen in the Haar wavelets (1909) of Alfréd Haar, though these were not significantly applied to signal processing. More substantial work was undertaken by Dennis Gabor, such as Gabor atoms (1947), an early form of wavelets, and the Gabor transform, a modified short-time Fourier transform. The Wigner–Ville distribution (Ville 1948, in a signal processing context) was another foundational step. Particularly in the 1930s and 1940s, early time–frequency analysis developed in concert with quantum mechanics (Wigner developed the Wigner–Ville distribution in 1932 in quantum mechanics, and Gabor was influenced by quantum mechanics – see Gabor atom); this is reflected in the shared mathematics of the position-momentum plane and the time–frequency plane – as in the Heisenberg uncertainty principle (quantum mechanics) and the Gabor limit (time–frequency analysis), ultimately both reflecting a symplectic structure. An early practical motivation for time–frequency analysis was the development of radar – see ambiguity function. | Time-frequency analysis | 0.789168 |
99,741 | 3D, semi 3D or 2D map; Search engine for finding locations Pinch zoom and rotate the 3D map and move in all directions; “You are here” spot – indicates user's current location; Graphical route animation; Realtime 3D walkthrough; Route and coupons printout; Multilingual content – Arabic, Chinese, English, French, Hindi, Russian, Spanish etc.; Content Management System for remote management; Statistics of usage – tenant popularity, language popularity, popular search keywords, most popular advertisements; Custom user interface; Possible to integrate with different physical devices – proximity sensors, speakers, printers and others; Multiple integrations are possible – social networks, timetables, clock, weather, transportation, websites, campaigns and others. | 3D Wayfinder | 0.789168 |
99,742 | "Memeticist" was coined as analogous to "geneticist" – originally in The Selfish Gene. Later Arel Lucas suggested that the discipline that studies memes and their connections to human and other carriers of them be known as "memetics" by analogy with "genetics". Dawkins' The Selfish Gene has been a factor in attracting the attention of people of disparate intellectual backgrounds. | Memetics | 0.789167 |
99,743 | It has been proposed that just as memes are analogous to genes, memetics is analogous to genetics. The modern memetics movement dates from the mid-1980s. A January 1983 "Metamagical Themas" column by Douglas Hofstadter, in Scientific American, was influential – as was his 1985 book of the same name. | Memetics | 0.789167 |
99,744 | This proposal resulted in debate among anthropologists, sociologists, biologists, and scientists of other disciplines. Dawkins himself did not provide a sufficient explanation of how the replication of units of information in the brain controls human behaviour and ultimately culture (the principal topic of the book was genetics). Dawkins apparently did not intend to present a comprehensive theory of memetics in The Selfish Gene, but rather coined the term meme in a speculative spirit. | Memetics | 0.789167 |
99,745 | Thus what would otherwise be regarded as one individual influencing another to adopt a belief is seen as an idea-replicator reproducing itself in a new host. As with genetics, particularly under a Dawkinsian interpretation, a meme's success may be due to its contribution to the effectiveness of its host. | Memetics | 0.789167 |
99,746 | Meme pool – a population of interbreeding memes. Memetic engineering – The process of deliberately creating memes, using engineering principles. Memetic algorithms – an approach to evolutionary computation that attempts to emulate cultural evolution in order to solve optimization problems. | Memetics | 0.789167 |
99,747 | Since 1987, this program is one of the useful tools as it involves in many fields of research including heterogeneous and homogeneous catalysis, organic and inorganic chemistry, spectroscopy as well as biochemistry. This can be illustrated by citation records of Ahlrich's 1989 publication which is more than 6700 times as of 18 July 2020. In the year 2014, the second Turbomole article has been published. The number of citations from both papers indicates that the Turbomole's user base is expanding. | TURBOMOLE | 0.789166 |
99,748 | TURBOMOLE is an ab initio computational chemistry program that implements various quantum chemistry methods. It was initially developed by the group of Prof. Reinhart Ahlrichs at the University of Karlsruhe. In 2007, TURBOMOLE GmbH, founded by R. Ahlrichs, F. Furche, C. Hättig, W. Klopper, M. Sierka, and F. Weigend, took over the responsibility for the coordination of the scientific development of TURBOMOLE program, for which the company holds all copy and intellectual property rights. In 2018 David P. Tew joined the TURBOMOLE GmbH. | TURBOMOLE | 0.789166 |
99,749 | The word azimuth is used in all European languages today. It originates from medieval Arabic السموت (al-sumūt, pronounced as-sumūt), meaning "the directions" (plural of Arabic السمت al-samt = "the direction"). The Arabic word entered late medieval Latin in an astronomy context and in particular in the use of the Arabic version of the astrolabe astronomy instrument. Its first recorded use in English is in the 1390s in Geoffrey Chaucer's Treatise on the Astrolabe. The first known record in any Western language is in Spanish in the 1270s in an astronomy book that was largely derived from Arabic sources, the Libros del saber de astronomía commissioned by King Alfonso X of Castile. | Normal-section azimuth | 0.789166 |
99,750 | CSEB bridges both the research and practice aspects of epidemiology and biostatistics through close collaboration with other groups such as the Public Health Agency of Canada (PHAC), Health Canada, the Association of Public Health Epidemiologists in Ontario (APHEO), the Saskatchewan Epidemiology Association (SEA), the Statistical Society of Canada (SSC), and the International Joint Policy Committee of the Societies of Epidemiology (IJPC-SE). == References == | Canadian Society for Epidemiology and Biostatistics | 0.789166 |
99,751 | The Canadian Society for Epidemiology and Biostatistics (CSEB), or Société Canadienne d'épidémiologie et de biostatistique (SCEB), was founded in 1990 to promote epidemiology and biostatistics research in Canada; encourage the use of epidemiologic data in formulating public health policy; increase the level of epidemiology and biostatistics funding available through federal, provincial, and private sources; facilitate communications among epidemiologists and biostatisticians; and assist faculty or schools of medicine and public health to improve training in epidemiology and biostatistics. | Canadian Society for Epidemiology and Biostatistics | 0.789166 |
99,752 | In operator theory, an area of mathematics, Douglas' lemma relates factorization, range inclusion, and majorization of Hilbert space operators. It is generally attributed to Ronald G. Douglas, although Douglas acknowledges that aspects of the result may already have been known. The statement of the result is as follows: Theorem: If A {\displaystyle A} and B {\displaystyle B} are bounded operators on a Hilbert space H {\displaystyle H} , the following are equivalent: range A ⊆ range B {\displaystyle \operatorname {range} A\subseteq \operatorname {range} B} A A ∗ ≤ λ 2 B B ∗ {\displaystyle AA^{*}\leq \lambda ^{2}BB^{*}} for some λ ≥ 0 {\displaystyle \lambda \geq 0} There exists a bounded operator C {\displaystyle C} on H {\displaystyle H} such that A = B C {\displaystyle A=BC} .Moreover, if these equivalent conditions hold, then there is a unique operator C {\displaystyle C} such that ‖ C ‖ 2 = inf { μ: A A ∗ ≤ μ B B ∗ } {\displaystyle \Vert C\Vert ^{2}=\inf\{\mu :\,AA^{*}\leq \mu BB^{*}\}} ker A = ker C {\displaystyle \ker A=\ker C} range C ⊆ range B ∗ ¯ {\displaystyle \operatorname {range} C\subseteq {\overline {\operatorname {range} B^{*}}}} .A generalization of Douglas' lemma for unbounded operators on a Banach space was proved by Forough (2014). | Douglas' lemma | 0.789165 |
99,753 | In cryptography, the so-called product ciphers are a certain kind of cipher, where the (de-)ciphering of data is typically done as an iteration of rounds. The setup for each round is generally the same, except for round-specific fixed values called a round constant, and round-specific data derived from the cipher key called a round key. A key schedule is an algorithm that calculates all the round keys from the key. | Key scheduling | 0.789164 |
99,754 | To make a reasonably formally precise statement of the condition, it is necessary to define the following quantities: Spatial coordinate: one of the coordinates of the physical space in which the problem is posed Spatial dimension of the problem: the number n {\displaystyle n} of spatial dimensions, i.e., the number of spatial coordinates of the physical space where the problem is posed. Typical values are n = 1 {\displaystyle n=1} , n = 2 {\displaystyle n=2} and n = 3 {\displaystyle n=3} . Time: the coordinate, acting as a parameter, which describes the evolution of the system, distinct from the spatial coordinatesThe spatial coordinates and the time are discrete-valued independent variables, which are placed at regular distances called the interval length and the time step, respectively. Using these names, the CFL condition relates the length of the time step to a function of the interval lengths of each spatial coordinate and of the maximum speed that information can travel in the physical space. Operatively, the CFL condition is commonly prescribed for those terms of the finite-difference approximation of general partial differential equations that model the advection phenomenon. | Courant–Friedrichs–Lewy condition | 0.789164 |
99,755 | In mathematics, the convergence condition by Courant–Friedrichs–Lewy is a necessary condition for convergence while solving certain partial differential equations (usually hyperbolic PDEs) numerically. It arises in the numerical analysis of explicit time integration schemes, when these are used for the numerical solution. As a consequence, the time step must be less than a certain time in many explicit time-marching computer simulations, otherwise the simulation produces incorrect results. The condition is named after Richard Courant, Kurt Friedrichs, and Hans Lewy who described it in their 1928 paper. | Courant–Friedrichs–Lewy condition | 0.789164 |
99,756 | The EUON compiles information about nanomaterials from different databases and lists. NanoData – A database with information on the development of nanomaterials and nanotechnology, focusing mainly on the EU market. It gives information on different sectors using nanomaterials, including health, energy, photonics, manufacturing, and information and communication technology. It also lists products that use nanomaterials and nanotechnology, patents, and research projects funded by the EU.eNanoMapper – Database with data on the toxicological properties of nanomaterials. | European Union Observatory for Nanomaterials | 0.789162 |
99,757 | If the wall-to-wall distance, H, is less than the viscous boundary layer thickness then the velocity profile, defined as u(x,y) at x for all y, takes on a parabolic profile in the y-direction and the boundary layer thickness is just H/2. At the solid walls of the plate the fluid has zero velocity (no-slip boundary condition), but as you move away from the wall, the velocity of the flow increases without peaking, and then approaches a constant mean velocity ue(x). This asymptotic velocity may or may not change along the wall depending on the wall geometry. | Boundary layer thickness | 0.789161 |
99,758 | A telerobotic interface can be as simple as a common MMK (monitor-mouse-keyboard) interface. While this is not immersive, it is inexpensive. Telerobotics driven by internet connections are often of this type. A valuable modification to MMK is a joystick, which provides a more intuitive navigation scheme for the planar robot movement. | Remote handling | 0.78916 |
99,759 | Remote manipulators are used to handle radioactive materials. Telerobotics has been used in installation art pieces; Telegarden is an example of a project where a robot was operated by users through the Web. | Remote handling | 0.78916 |
99,760 | Metadata should be readable by humans as well as interpretable by programs. Redundancy should be avoided to prevent inconsistencies when writing data.Specific CF metadata descriptors use values of attributes to represent Data provenance: title, institution, contact, source (e.g. model), history (audit trail of operations), references, comment Description of associated activity: project, experiment Description of data: units, standard_name, long_name, auxiliary_variables, missing_value, valid_range, flag_values, flag_meanings Description of coordinates: coordinates, bounds, grid_mapping (with formula_terms); time specified with reference_time ("time since T0") and calendar attributes. Meaning of grid cells: cell_methods, cell_measures, and climatological statistics.A central element of the CF Conventions is the CF Standard Name Table. | Climate and Forecast Metadata Conventions | 0.789159 |
99,761 | This can be exploited as a means of transducing chemical binding events by measuring a change in the local dielectric constant (due to binding of the target species) as a shift in the spectral location and/or intensity of the EOT peak. Variation of the hole geometry alters the spectral location of the EOT peak such that the chemical binding events can be optically detected at a desired wavelength. EOT-based sensing offers one key advantage over a Kretschmann-style SPR chemical sensor, that of being an inherently nanometer-micrometer scale device; it is therefore particularly amenable to miniaturization. == References == | Extraordinary optical transmission | 0.789157 |
99,762 | The luminosity of a source bounded by a surface S {\displaystyle S} may be expressed with these relations as Now assuming that the opacity is a constant, it can be brought outside of the integral. Using Gauss's theorem and Poisson's equation gives where M {\displaystyle M} is the mass of the central object. This is called the Eddington Luminosity. | Eddington luminosity | 0.789157 |
99,763 | For Rees's Cyclopædia Dalton contributed articles on Chemistry and Meteorology, but the topics are not known. He contributed 117 Memoirs of the Literary and Philosophical Society of Manchester from 1817 until his death in 1844 while president of that organisation. Of these the earlier are the most important. In one of them, read in 1814, he explains the principles of volumetric analysis, in which he was one of the earliest researchers. In 1840 a paper on phosphates and arsenates, often regarded as a weaker work, was refused by the Royal Society, and he was so incensed that he published it himself. He took the same course soon afterwards with four other papers, two of which ("On the quantity of acids, bases and salts in different varieties of salts" and "On a new and easy method of analysing sugar") contain his discovery, regarded by him as second in importance only to atomic theory, that certain anhydrates, when dissolved in water, cause no increase in its volume, his inference being that the salt enters into the pores of the water. | Dalton model | 0.789156 |
99,764 | Arguably the most important of all Dalton's investigations are concerned with the atomic theory in chemistry. While his name is inseparably associated with this theory, the origin of Dalton's atomic theory is not fully understood. The theory may have been suggested to him either by researches on ethylene (olefiant gas) and methane (carburetted hydrogen) or by analysis of nitrous oxide (protoxide of azote) and nitrogen dioxide (deutoxide of azote), both views resting on the authority of Thomas Thomson.From 1814 to 1819, Irish chemist William Higgins claimed that Dalton had plagiarised his ideas, but Higgins' theory did not address relative atomic mass. Recent evidence suggests that Dalton's development of thought may have been influenced by the ideas of another Irish chemist Bryan Higgins, who was William's uncle. | Dalton model | 0.789156 |
99,765 | A lunar crater was named after Dalton. "Daltonism" is a lesser-known synonym of colour-blindness and, in some languages, variations on this have persisted in common usage: for example, 'daltonien' is the French adjectival equivalent of 'colour-blind', and 'daltónico'/'daltonica' is the Spanish and the Italian. The inorganic section of the UK's Royal Society of Chemistry is named the Dalton Division, and the society's academic journal for inorganic chemistry is called Dalton Transactions. | Dalton model | 0.789156 |
99,766 | In geology, a subaerial unconformity is a surface that displays signs of erosion by processes that commonly occur on the surface. These processes generating the subaerial unconformity can include wind degradation, pedogenesis, dissolution processes such as karstification as well as fluvial processes such as fluvial erosion, bypass and river rejuvenation. | Subaerial unconformity | 0.789155 |
99,767 | Cultural organisations such as the Mathematical Sciences Research Institute and the Institute for Advanced Study run events on geometric patterns and related aspects of Islamic art. In 2013 the Istanbul Center of Design and the Ensar Foundation ran what they claimed was the first ever symposium of Islamic Arts and Geometric Patterns, in Istanbul. The panel included the experts on Islamic geometric pattern Carol Bier, Jay Bonner, Eric Broug, Hacali Necefoğlu and Reza Sarhangi. In Britain, The Prince's School of Traditional Arts runs a range of courses in Islamic art including geometry, calligraphy, and arabesque (vegetal forms), tile-making, and plaster carving. | Arabic geometric patterns | 0.789155 |
99,768 | The results of experimental tests in 2007 and 2010 have shown agreement with quantum mechanics rather than the Leggett inequalities. Given that experimental tests of Bell's inequalities have ruled out local realism in quantum mechanics, the violation of Leggett's inequalities is considered to have falsified realism in quantum mechanics. In quantum mechanics "realism" means "notion that physical systems possess complete sets of definite values for various parameters prior to, and independent of, measurement". | Leggett inequality | 0.789155 |
99,769 | In electrical engineering and computer science, analog image processing is any image processing task conducted on two-dimensional analog signals by analog means (as opposed to digital image processing). Basically any data can be represented in two types named as 1.Analog 2.Digital if the pictorial representation of the data represented in analog wave formats that can be named as analog image. E.g.: television broadcasting in older days.. through the dish antenna systems.. Where as the digital representation or storing the data in digital form is termed as a digital image processing E.g.:image data stored in digital logic gates.. == References == | Analog image processing | 0.789154 |
99,770 | In mathematical physics, Yang–Mills theory is a gauge theory based on a special unitary group SU(n), or more generally any compact, reductive Lie algebra. Yang–Mills theory seeks to describe the behavior of elementary particles using these non-abelian Lie groups and is at the core of the unification of the electromagnetic force and weak forces (i.e. U(1) × SU(2)) as well as quantum chromodynamics, the theory of the strong force (based on SU(3)). Thus it forms the basis of our understanding of the Standard Model of particle physics. | Yang–Mills action | 0.789154 |
99,771 | In mathematics, in the field of general topology, a topological space is said to be mesocompact if every open cover has a compact-finite open refinement. That is, given any open cover, we can find an open refinement with the property that every compact set meets only finitely many members of the refinement.The following facts are true about mesocompactness: Every compact space, and more generally every paracompact space is mesocompact. This follows from the fact that any locally finite cover is automatically compact-finite. Every mesocompact space is metacompact, and hence also orthocompact. This follows from the fact that points are compact, and hence any compact-finite cover is automatically point finite. | Mesocompact space | 0.789152 |
99,772 | Column stores or transposed files have been implemented from the early days of DBMS development. TAXIR was the first application of a column-oriented database storage system with focus on information-retrieval in biology in 1969. Clinical data from patient records with many more attributes than could be analyzed were processed in 1975 and after by a time-oriented database system (TODS). Statistics Canada implemented the RAPID system in 1976 and used it for processing and retrieval of the Canadian Census of Population and Housing as well as several other statistical applications. | Column-oriented DBMS | 0.789152 |
99,773 | RAPID was shared with other statistical organizations throughout the world and used widely in the 1980s. It continued to be used by Statistics Canada until the 1990s. Another column-oriented database was SCSS.Later column-oriented database packages included: 1993: KDB 1995: Sybase IQSince about 2004 there have been additional open source and commercial implementations. | Column-oriented DBMS | 0.789152 |
99,774 | A relational database management system provides data that represents a two-dimensional table of columns and rows. For example, a database might have this table: This simple table includes an employee identifier (EmpId), name fields (Lastname and Firstname) and a salary (Salary). This two-dimensional format is an abstraction. | Column-oriented DBMS | 0.789152 |
99,775 | The operational wave forecasting systems at NOAA are based on the WAVEWATCH III (R) model. This system has a global domain of approximately 50 km resolution, with nested regional domains for the northern hemisphere oceanic basins at approximately 18 km and approximately 7 km resolution. Physics includes wave field refraction, nonlinear resonant interactions, sub-grid representations of unresolved islands, and dynamically updated ice coverage. Wind data is provided from the GDAS data assimilation system for the GFS weather model. Up to 2008, the model was limited to regions outside the surf zone where the waves are not strongly impacted by shallow depths.The model can incorporate the effects of currents on waves from its early design by Hendrik Tolman in the 1990s, and is now extended for near shore applications. | Wind wave model | 0.789152 |
99,776 | In fluid dynamics, wind wave modeling describes the effort to depict the sea state and predict the evolution of the energy of wind waves using numerical techniques. These simulations consider atmospheric wind forcing, nonlinear wave interactions, and frictional dissipation, and they output statistics describing wave heights, periods, and propagation directions for regional seas or global oceans. Such wave hindcasts and wave forecasts are extremely important for commercial interests on the high seas. For example, the shipping industry requires guidance for operational planning and tactical seakeeping purposes.For the specific case of predicting wind wave statistics on the ocean, the term ocean surface wave model is used. Other applications, in particular coastal engineering, have led to the developments of wind wave models specifically designed for coastal applications. | Wind wave model | 0.789152 |
99,777 | They included the “coupled hybrid” and “coupled discrete” formulations. Third generation models explicitly represent all the physics relevant for the development of the sea state in two dimensions. The wave modeling project (WAM), an international effort, led to the refinement of modern wave modeling techniques during the decade 1984-1994. | Wind wave model | 0.789152 |
99,778 | Programming languages that support nested subroutines also have a field in the call frame that points to the stack frame of the latest activation of the procedure that most closely encapsulates the callee, i.e. the immediate scope of the callee. This is called an access link or static link (as it keeps track of static nesting during dynamic and recursive calls) and provides the routine (as well as any other routines it may invoke) access to the local data of its encapsulating routines at every nesting level. Some architectures, compilers, or optimization cases store one link for each enclosing level (not just the immediately enclosing), so that deeply nested routines that access shallow data do not have to traverse several links; this strategy is often called a "display".Access links can be optimized away when an inner function does not access any (non-constant) local data in the encapsulation, as is the case with pure functions communicating only via arguments and return values, for example. Some historical computers, such as the Electrologica X8 and somewhat later the Burroughs large systems, had special "display registers" to support nested functions, while compilers for most modern machines (such as the ubiquitous x86) simply reserve a few words on the stack for the pointers, as needed. | Call frame | 0.78915 |
99,779 | CETAC is only open for students studying Computer Science & Engineering, Electrical Engineering, Engineering Physics, Engineering Mathematics or Software Engineering. CETAC helps their members with practical details such as insurances, visas, etc. with the support by the American-Scandinavian Foundation. Since May 1, 2006, CETAC has an alumni organization called CETAC Alumni | CETAC | 0.789149 |
99,780 | Mutations in the gene encoding OMP decarboxylase in yeast (URA3) leads to auxotrophy in uracil. In addition, a function OMP decarboxylase renders yeast strains sensitive to the molecule 5-fluoroorotic acid (5-FOA). The establishment of the URA3 gene as a selection marker with both positive and negative selection strategies has made the controlled expression of OMP decarboxylase a significant laboratory tool for the investigation of yeast genetics. | Orotidine 5'-phosphate decarboxylase | 0.789149 |
99,781 | If successful, the team hopes to reduce platinum use by 25%.Nanotechnology also has a prominent role in the fast developing field of Tissue Engineering. When designing scaffolds, researchers attempt to mimic the nanoscale features of a cell's microenvironment to direct its differentiation down a suitable lineage. For example, when creating scaffolds to support the growth of bone, researchers may mimic osteoclast resorption pits.Researchers have successfully used DNA origami-based nanobots capable of carrying out logic functions to achieve targeted drug delivery in cockroaches. It is said that the computational power of these nanobots can be scaled up to that of a Commodore 64. | Bulk technology | 0.789148 |
99,782 | Using platinum though, is inefficient in that it is expensive and unsustainable. Danish company InnovationsFonden invested DKK 15 million in a search for new catalyst substitutes using nanotechnology. The goal of the project, launched in the autumn of 2014, is to maximize surface area and minimize the amount of material required. | Bulk technology | 0.789148 |
99,783 | Cars are being manufactured using nanomaterials in such ways that car parts require fewer metals during manufacturing and less fuel to operate in the future.Scientists are now turning to nanotechnology in an attempt to develop diesel engines with cleaner exhaust fumes. Platinum is currently used as the diesel engine catalyst in these engines. The catalyst is what cleans the exhaust fume particles. | Bulk technology | 0.789148 |
99,784 | Bandages are being infused with silver nanoparticles to heal cuts faster. Video game consoles and personal computers may become cheaper, faster, and contain more memory thanks to nanotechnology. Also, to build structures for on chip computing with light, for example on chip optical quantum information processing, and picosecond transmission of information.Nanotechnology may have the ability to make existing medical applications cheaper and easier to use in places like the general practitioners' offices and at homes. | Bulk technology | 0.789148 |
99,785 | As of August 21, 2008, the Project on Emerging Nanotechnologies estimates that over 800 manufacturer-identified nanotech products are publicly available, with new ones hitting the market at a pace of 3–4 per week. The project lists all of the products in a publicly accessible online database. Most applications are limited to the use of "firstgeneration" passive nanomaterials which includes titanium dioxide in sunscreen, cosmetics, surface coatings, and some food products; Carbon allotropes used to produce gecko tape; silver in food packaging, clothing, disinfectants and household appliances; zinc oxide in sunscreens and cosmetics, surface coatings, paints and outdoor furniture varnishes; and cerium oxide as a fuel catalyst.Further applications allow tennis balls to last longer, golf balls to fly straighter, and even bowling balls to become more durable and have a harder surface. Trousers and socks have been infused with nanotechnology so that they will last longer and keep people cool in the summer. | Bulk technology | 0.789148 |
99,786 | Materials reduced to the nanoscale can show different properties compared to what they exhibit on a macroscale, enabling unique applications. For instance, opaque substances can become transparent (copper); stable materials can turn combustible (aluminium); insoluble materials may become soluble (gold). A material such as gold, which is chemically inert at normal scales, can serve as a potent chemical catalyst at nanoscales. Much of the fascination with nanotechnology stems from these quantum and surface phenomena that matter exhibits at the nanoscale. | Bulk technology | 0.789148 |
99,787 | Nanofibers are used in several areas and in different products, in everything from aircraft wings to tennis rackets. Inhaling airborne nanoparticles and nanofibers may lead to a number of pulmonary diseases, e.g. fibrosis. Researchers have found that when rats breathed in nanoparticles, the particles settled in the brain and lungs, which led to significant increases in biomarkers for inflammation and stress response and that nanoparticles induce skin aging through oxidative stress in hairless mice.A two-year study at UCLA's School of Public Health found lab mice consuming nano-titanium dioxide showed DNA and chromosome damage to a degree "linked to all the big killers of man, namely cancer, heart disease, neurological disease and aging".A Nature Nanotechnology study suggests some forms of carbon nanotubes – a poster child for the "nanotechnology revolution" – could be as harmful as asbestos if inhaled in sufficient quantities. Anthony Seaton of the Institute of Occupational Medicine in Edinburgh, Scotland, who contributed to the article on carbon nanotubes said "We know that some of them probably have the potential to cause mesothelioma. | Bulk technology | 0.789148 |
99,788 | One basic generalization is a weighing matrix. A weighing matrix is a square matrix in which entries may also be zero and which satisfies W W T = w I {\displaystyle WW^{\textsf {T}}=wI} for some w, its weight. A weighing matrix with its weight equal to its order is a Hadamard matrix.Another generalization defines a complex Hadamard matrix to be a matrix in which the entries are complex numbers of unit modulus and which satisfies H H* = n In where H* is the conjugate transpose of H. Complex Hadamard matrices arise in the study of operator algebras and the theory of quantum computation. Butson-type Hadamard matrices are complex Hadamard matrices in which the entries are taken to be qth roots of unity. The term complex Hadamard matrix has been used by some authors to refer specifically to the case q = 4. | Hadamard conjecture | 0.789148 |
99,789 | Olivia MFSK – an amateur-radio digital protocol designed to work in difficult (low signal-to-noise ratio plus multipath propagation) conditions on shortwave bands. Balanced repeated replication (BRR) – a technique used by statisticians to estimate the variance of a statistical estimator. Coded aperture spectrometry – an instrument for measuring the spectrum of light. The mask element used in coded aperture spectrometers is often a variant of a Hadamard matrix. Feedback delay networks – Digital reverberation devices which use Hadamard matrices to blend sample values Plackett–Burman design of experiments for investigating the dependence of some measured quantity on a number of independent variables. Robust parameter designs for investigating noise factor impacts on responses Compressed sensing for signal processing and under-determined linear systems (inverse problems) Quantum Hadamard gate for quantum computing and the Hadamard transform for quantum algorithms. | Hadamard conjecture | 0.789148 |
99,790 | Robots may share, store, and transmit sensory data as well as data based on such. They may learn from or interpret the same or related data in different ways and some robots may have remote senses (e.g. without local interpretation or processing or computation such as with common types of telerobotics or with embedded or mobile "sensor nodes"). Processing of sensory data may include processes such as facial recognition, facial expression recognition, gesture recognition and integration of interpretative abstract knowledge. | Robotic vision | 0.789147 |
99,791 | Engineering prototype devices may be modified using the ion beam in combination with gas-assisted material deposition in order to rewire an integrated circuit's conductive pathways. The techniques are effectively used to verify the correlation between the CAD design and the actual functional prototype circuit, thereby avoiding the creation of a new mask for the purpose of testing design changes. Materials science use sputtering for extending surface analytical techniques such as secondary ion mass spectrometry or electron spectroscopy (XPS, AES) so that they can depth profile them. | Ion beam etching | 0.789147 |
99,792 | In algebra, a parabolic Lie algebra p {\displaystyle {\mathfrak {p}}} is a subalgebra of a semisimple Lie algebra g {\displaystyle {\mathfrak {g}}} satisfying one of the following two conditions: p {\displaystyle {\mathfrak {p}}} contains a maximal solvable subalgebra (a Borel subalgebra) of g {\displaystyle {\mathfrak {g}}} ; the Killing perp of p {\displaystyle {\mathfrak {p}}} in g {\displaystyle {\mathfrak {g}}} is the nilradical of p {\displaystyle {\mathfrak {p}}} .These conditions are equivalent over an algebraically closed field of characteristic zero, such as the complex numbers. If the field F {\displaystyle \mathbb {F} } is not algebraically closed, then the first condition is replaced by the assumption that p ⊗ F F ¯ {\displaystyle {\mathfrak {p}}\otimes _{\mathbb {F} }{\overline {\mathbb {F} }}} contains a Borel subalgebra of g ⊗ F F ¯ {\displaystyle {\mathfrak {g}}\otimes _{\mathbb {F} }{\overline {\mathbb {F} }}} where F ¯ {\displaystyle {\overline {\mathbb {F} }}} is the algebraic closure of F {\displaystyle \mathbb {F} } . | Parabolic subalgebra | 0.789145 |
99,793 | Camera Link is a serial communication protocol designed for computer vision applications based on the National Semiconductor interface Channel-link. It was designed for the purpose of standardizing scientific and industrial video products including cameras, cables and frame grabbers. The standard is maintained and administered by the Automated Imaging Association, or AIA, the global machine vision industry's trade group. | Machine vision glossary | 0.789145 |
99,794 | Algebraic distance or algebraic error. The algebraic distance from a point xi to a curve or surface defined by f ( x , β ) = 0 {\displaystyle f(x,\beta )=0} is the value of f ( x i , β ) {\displaystyle f(x_{i},\beta )} , i.e. the residual in the least squares problem with data point (xi, 0) and model function f. This term is mainly used in computer vision. Aperture. | Machine vision glossary | 0.789145 |
99,795 | Telecentric lens. Compound lens with an unusual property concerning its geometry of image-forming rays. In machine vision systems telecentric lenses are usually employed in order to achieve dimensional and geometric invariance of images within a range of different distances from the lens and across the whole field of view. Telephoto lens. | Machine vision glossary | 0.789145 |
99,796 | Pattern recognition. This is a field within the area of machine learning. Alternatively, it can be defined as the act of taking in raw data and taking an action based on the category of the data. It is a collection of methods for supervised learning. | Machine vision glossary | 0.789145 |
99,797 | computer vision. The study and application of methods which allow computers to "understand" image content. | Machine vision glossary | 0.789145 |
99,798 | Ellen McGrattan proposed a list of four elements that are central to the new synthesis described by Goodfried and King: intertemporal optimization, rational expectations, imperfect competition, and costly price adjustment (menu costs). Goodfriend and King also find that the consensus models produce certain policy implications. In contradiction with some new classical thought, monetary policy can affect real output in the short-run, but there is no long-run trade-off: money is not neutral in the short-run but it is in the long-run. High inflation and fluctuations in the inflation rate, have negative welfare effects. It is important for central banks to maintain credibility through rules based policy like inflation targeting. | New neoclassical synthesis | 0.789145 |
99,799 | The following are common definitions related to the machine vision field. General related fields Machine vision Computer vision Image processing Signal processing | Machine vision glossary | 0.789145 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.