text
stringlengths 122
2.36k
| source
stringclasses 3
values |
|---|---|
Augmented reality
Possible applications
Flight training Building on decades of perceptual-motor research in experimental psychology, researchers at the Aviation Research Laboratory of the University of Illinois at Urbana–Champaign used augmented reality in the form of a flight path in the sky to teach flight students how to land an airplane using a flight simulator. An adaptive augmented schedule in which students were shown the augmentation only when they departed from the flight path proved to be a more effective training intervention than a constant schedule. Flight students taught to land in the simulator with the adaptive augmentation learned to land a light aircraft more quickly than students with the same amount of landing training in the simulator but with constant augmentation or without any augmentation.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Proliferating cell nuclear antigen
Expression in the nucleus during DNA synthesis
PCNA was originally identified as an antigen that is expressed in the nuclei of cells during the DNA synthesis phase of the cell cycle. Part of the protein was sequenced and that sequence was used to allow isolation of a cDNA clone. PCNA helps hold DNA polymerase delta (Pol δ) to DNA. PCNA is clamped to DNA through the action of replication factor C (RFC), which is a heteropentameric member of the AAA+ class of ATPases. Expression of PCNA is under the control of E2F transcription factor-containing complexes.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
TV-Anytime
The objectives
The TV-Anytime Forum has set up the following four objectives for their standardization work: Develop specifications that will enable applications to exploit local persistent storage in consumer electronics platforms.
Be network independent with regard to the means for content delivery to consumer electronics equipment, including various delivery mechanisms (e.g. ATSC, DVB, DBS and others) and the Internet and enhanced TV.
Develop specifications for interoperable and integrated systems, from content creators/providers, through service providers, to the consumers.
Specify the necessary security structures to protect the interests of all parties involved.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Market information systems
Types of market information systems
There is a wide variety of market information systems or services. OECD countries have traditionally emphasised the importance of information provision for the agricultural sector, a notable example being the service provided by the United States Department of Agriculture (USDA). Such systems are widely used in order to increase the transparency and the volume of information flowing through the supply chains for different agricultural products. The ability of market information systems to provide a valuable service was strengthened with the development of the Internet and the advance of electronic commerce (business-to-business (B2B), consumer-to-consumer, etc.). Industry structure, product complexity and the demanding nature of agricultural transactions are considered determining factors for the development of B2B electronic commerce in agriculture.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Creosote
Health effects
The International Agency for Research on Cancer (IARC) has determined that coal-tar creosote is probably carcinogenic to humans, based on adequate animal evidence and limited human evidence. The animal testing relied upon by IARC involved the continuous application of creosote to the shaved skin of rodents. After weeks of creosote application, the animals developed cancerous skin lesions and in one test, lesions of the lung. The United States Environmental Protection Agency has stated that coal-tar creosote is a probable human carcinogen based on both human and animal studies. As a result, the Federal Occupational Safety and Health Administration (OSHA) has set a permissible exposure limit of 0.2 milligrams of coal-tar creosote per cubic meter of air (0.2 mg/m3) in the workplace during an 8-hour day, and the Environmental Protection Agency (EPA) requires that spills or accidental releases into the environment of one pound (0.454 kg) or more of creosote be reported to them.There is no unique exposure pathway of children to creosote. Children exposed to creosote probably experience the same health effects seen in adults exposed to creosote. It is unknown whether children differ from adults in their susceptibility to health effects from creosote.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Apache SINGA
Apache SINGA
Apache SINGA is an Apache top-level project for developing an open source machine learning library. It provides a flexible architecture for scalable distributed training, is extensible to run over a wide range of hardware, and has a focus on health-care applications.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
NIL (programming language)
NIL (programming language)
New Implementation of LISP (NIL) is a programming language, a dialect of the language Lisp, developed at the Massachusetts Institute of Technology (MIT) during the 1970s, and intended to be the successor to the language Maclisp. It is a 32-bit implementation, and was in part a response to Digital Equipment Corporation's (DEC) VAX computer. The project was headed by Jon L White, with a stated goal of maintaining compatibility with MacLisp while fixing many of its problems.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Q:
solve for x - algebra and log function Have to solve this algebraic. I end up with the wrong result. I think I'm messing up with the log rules or something. Help please
$ 2 \cdot 1,3^x = 12 \cdot 0,9^x $
$ 1,3^x = 6 \cdot 0,9^x $
$ x \cdot \log(1,3) = x \cdot \log (6 \cdot 0,9 )$
A:
$ 2 \cdot 1,3^x = 12 \cdot 0,9^x $
$ 1,3^x = 6 \cdot 0,9^x $
$ x \log 1,3 = \log 6+ x\log 0,9$
$x(\log 1,3-\log 0,9) =\log 6$
$$x=\frac{\log 6}{\log 1,3-\log 0,9}$$
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
N-acetylphosphatidylethanolamine-hydrolysing phospholipase D
N-acetylphosphatidylethanolamine-hydrolysing phospholipase D
N-acetylphosphatidylethanolamine-hydrolysing phospholipase D (EC 3.1.4.54, NAPE-PLD, anandamide-generating phospholipase D, N-acyl phosphatidylethanolamine phospholipase D, NAPE-hydrolyzing phospholipase D) is an enzyme with systematic name 'N-acetylphosphatidylethanolamine phosphatidohydrolase. It catalyses the following chemical reaction N-acylphosphatidylethanolamine + H2O ⇌ N-acylethanolamine + a 1,2-diacylglycerol 3-phosphateThis enzyme is involved in the biosynthesis of anandamide.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Incendiary device
Development and use in World War II
The 4 lb (1.8 kg) incendiary bomb, developed by ICI, was the standard light incendiary bomb used by RAF Bomber Command in very large numbers, declining slightly in 1944 to 35.8 million bombs produced (the decline being due to more bombs arriving from the United States). It was the weapon of choice for the British "dehousing" plan. The bomb consisted of a hollow body made from aluminium-magnesium alloy with a cast iron/steel nose, and filled with thermite incendiary pellets. It was capable of burning for up to ten minutes. There was also a high explosive version and delayed high explosive versions (2–4 minutes) which were designed to kill rescuers and firefighters. It was normal for a proportion of high explosive bombs to be dropped during incendiary attacks in order to expose combustible material and to fill the streets with craters and rubble, hindering rescue services.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Critical realism (philosophy of the social sciences)
Disciplinary applications
Health Critical realism has been used widely within health research in several different ways, including (i) informing methodological decisions, (ii) understanding the causes of health and illness, and (iii) informing ways of improving health—whether in healthcare programmes or public health promotion.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Anti-reflective coating
Types
One approach is to use graded-index (GRIN) anti-reflective coatings, that is, ones with nearly continuously varying index of refraction. With these, it is possible to curtail reflection for a broad band of frequencies and incidence angles.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Earl Grey tea
History
References have been found in old advertisements dating to the 1850s and 1860s (after the death of the second Earl of Grey) to "Grey's Tea" or "Grey's mixture", with the earliest being attributed to a tea merchant known as William Grey in 1852. The first known published references to an "Earl Grey" tea are advertisements by Charlton & Co. of Jermyn Street in London in the 1880s. It has been suggested that the "Earl" title was added to make the tea seem more posh, or alternately that it became associated with Henry Grey, 3rd Earl Grey, who was alive at the time where the "Earl" title began to be attributed to the tea.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
SubPac (company)
Overview
Kyrie Irving joined SUBPAC as a key investor in 2016 after the media took notice of him wearing it during a pre-game NBA Finals press conference.In 2020, SUBPAC also announced a collaboration with Deadmau5, which led to the release of a limited edition, custom SUBPAC M2 model.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Arnold Palmer (drink)
Mass-produced versions
The drink has been sold under the Arnold Palmer trademark via a licensing arrangement with Innovative Flavors since 2001. Arizona Beverage Company began marketing and selling the beverage with Palmer's picture and signature on the bottle in 2002 and has handled distribution ever since. The line has expanded to include various flavors including Green Tea, Southern Style Sweet Tea and Pink Lemonade, Zero Calorie, Strawberry, Peach, Mango and Natural Energy. Lemonade combined with iced tea is also sold without the Arnold Palmer trademark by other companies, such as Nestea, Lipton Brisk, Honest Tea (as Half and Half), Nantucket Nectars (as Half and Half), Country Time, Sweet Leaf, XINGtea, Snapple, and Peace Iced Tea (as Caddyshack). It has 43 mg of caffeine per 23 oz drink. Recently, as of April 26, 2021, Chick-fil-A began selling its own version marketed as "Sunjoy."
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Q:
How to solve this differential equation? How to solve the following equation?
$$\frac{\mathrm{d}\, f }{\mathrm{d}x} = f(x) \left(1-f(x)\right)$$
(I've studied differential equations as an undergraduate some years ago but right now I don't know where to start with this equation.)
EDIT 1: equation corrected.
Solution:
$$f(x) = \frac{1}{1 + e^{-x + C}}$$
A:
Try separation of variables;
$$\int\frac{dy}{y(1-y)}dy = \int dx$$
$$ln(y) - ln(1-y) = x + const$$
$$y = \frac{e^x}{C+e^x}$$
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
Deborah number
History
The Deborah number was originally proposed by Markus Reiner, a professor at Technion in Israel, who chose the name inspired by a verse in the Bible, stating "The mountains flowed before the Lord" in a song by the prophetess Deborah in the Book of Judges; הָרִ֥ים נָזְל֖וּ מִפְּנֵ֣י יְהוָ֑ה hā-rîm nāzəlū mippənê Yahweh).
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Q:
The relationship with $(\mathbf{u}^TA\mathbf{v})$ and its transpose I have a linear algebra problem comes from analysis. But I'm not familar with linear algebra now. Let $\mathbf{u},~\mathbf{v}$ be two $n\times 1$ column vectors. $A$ be a symmetric matrix. Then does $(\mathbf{u}^TA\mathbf{v})^T$ equals to $(\mathbf{u}^TA\mathbf{v})$?
A:
$u^tAv$ is a scalar, so it is same as it's transpose, for any $n\times n$ matrix $A$. $A$ need not even be symmetric.
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
European Ophthalmic Pathology Society
European Ophthalmic Pathology Society
The European Ophthalmic Pathology Society is a learned society for advancing ophthalmic pathology, the study of the pathological basis of the diseases of the eye and its adnexa: the orbit, eyelids, conjunctiva and the lacrimal apparatus.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Q:
Ways to put numbered balls in boxes no box being empty I know the formula for putting $n$ identical balls in $r$ different boxes such that each box has at least 1 ball, but what is the formula for putting $n$ different balls in $r$ different boxes, no box being empty?
Thanks!
A:
You can do this by inclusion/exclusion. There are $\binom r0r^n$ ways of putting the $n$ balls into the $r$ boxes. From this we have to subtract the $\binom r1(r-1)^n$ ways of putting the $n$ balls into just $r-1$ of the boxes. To this we have to add the $\binom r2(r-2)^n$ ways of putting the $n$ balls into just $r-2$ of the boxes, and so on, so
$$a_n=\sum_{k=0}^r\binom rk(-1)^{r-k}k^n=\left.\left(q\frac{\partial}{\partial q}\right)^n(q-1)^r\right|_{q=1}\;.$$
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
Cofree coalgebra
Construction
The duality F[[τ]] × F[t] → F is determined by τj(tk) = δjk so that (∑j∈Najτj)(∑k=0Nbktk)=∑k=0Nakbk.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Shock cooling
Analysis
While the subject is very controversial, some believe shock cooling, as commonly explained, is nothing but a myth. This position is supported by the fact twin engine planes commonly experience ideal conditions for shock cooling during simulated, single engine failures, yet statistically show no difference in wear or damage probability distribution between engines. Doubts have been raised regarding the plausibility of achieving the temperature reduction in cylinder heads during flight that is purported to cause damage in most engines. Equally, it has been pointed out the rate cylinder head temperatures drop off after a normal engine shutdown is often much faster than the usual rates deemed to present a shock cooling risk. Complicating the analysis, high operating temperatures in of themselves, can contribute to excessive component wear and damage, which is typically associated with "shock cooling".
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
The Fields generated by a Moving Charged Particle. Consider a co-ordinate system in which a spinless charged particle moves with respect to the observer with a constant velocity v which is much smaller than the speed of light in vacuum, c : ie. (v/c)
<< 1. The electric and magnetic fields generated by such a slowly moving charge are given by
→
|
https://huggingface.co/datasets/izumi-lab/open-text-books
|
Product bundling
Advantages and disadvantages
A method of price discrimination.Disadvantages to the seller: Product bundling may lead to the cannibalization of branded products. These products can be purchased outside of the bundled sales package. For example, if a company sells bundled products and individual products at the same time, then the bundled products will get more sales, which will reduce the profit of the individual products.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
QED (text editor)
Later implementations
Ken Thompson later wrote a version for CTSS; this version was notable for introducing regular expressions. Thompson rewrote QED in BCPL for Multics. The Multics version was ported to the GE-600 system used at Bell Labs in the late 1960s under GECOS and later GCOS after Honeywell took over GE's computer business. The GECOS-GCOS port used I/O routines written by A. W. Winklehoff. Dennis Ritchie, Ken Thompson and Brian Kernighan wrote the QED manuals used at Bell Labs.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Comparison of topologies
Properties
Let τ1 and τ2 be two topologies on a set X. Then the following statements are equivalent: τ1 ⊆ τ2 the identity map idX : (X, τ2) → (X, τ1) is a continuous map.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Bipolar junction transistor
Theory and modeling
Both types of BJT function by letting a small current input to the base control an amplified output from the collector. The result is that the BJT makes a good switch that is controlled by its base input. The BJT also makes a good amplifier, since it can multiply a weak input signal to about 100 times its original strength. Networks of BJTs are used to make powerful amplifiers with many different applications.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
COPII
Function
Some proteins are found to be responsible for selectively packaging cargos into COPII vesicles. More recent research suggests the Sec23/Sec24-Sar1 complex participates in cargo selection. For example, Erv29p in Saccharomyces cerevisiae is found to be necessary for packaging glycosylated pro-α-factor.Sec24 proteins recognize various cargo proteins, packaging them into the budding vesicles.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Convolution theorem
Additional resources
For a visual representation of the use of the convolution theorem in signal processing, see: Johns Hopkins University's Java-aided simulation: http://www.jhu.edu/signals/convolve/index.html
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Marine primary production
Marine primary production
Primary production in the ocean can be contrasted with primary production on land. Globally the ocean and the land each produce about the same amount of primary production, but in the ocean primary production comes mainly from cyanobacteria and algae, while on land it comes mainly from vascular plants.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Birth–death process
Recurrence and transience
The random walk is transient if there exist c>1 , K≥1 and n0 such that for all n>n0 ln ln (j)(n)), where the empty sum for K=1 is assumed to be zero.
The random walk is recurrent if there exist K≥1 and n0 such that for all n>n0 ln (j)(n)).
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Lombard effect
Mechanisms
Development Both private and public loop processes exist in children. There is a development shift however from the Lombard effect being linked to acoustic self-monitoring in young children to the adjustment of vocalizations to aid its intelligibility for others in adults.
Neurology The Lombard effect depends upon audio-vocal neurons in the periolivary region of the superior olivary complex and the adjacent pontine reticular formation. It has been suggested that the Lombard effect might also involve the higher cortical areas that control these lower brainstem areas.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Newton-X
Capabilities
Spectrum Simulations Newton-X simulates absorption and emission spectra using the Nuclear Ensemble approach. In this approach, an ensemble of nuclear geometries is built in the initial state and the transition energies and transition moments to the other states are computed for each geometry in the ensemble. A convolution of the results provides spectral widths and absolute intensities.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Feed forward (control)
Model
Open system In systems theory, an open system is a feed forward system that does not have any feedback loop to control its output. In contrast, a closed system uses on a feedback loop to control the operation of the system. In an open system, the output of the system is not fed back into the input to the system for control or operation.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Biopac student lab
Concept
The data acquisition system connects to a PC running Windows or Macintosh operating systems, via USB. The electrodes and transducers employ sensors that allow the software to communicate with the students to ensure that they are using the correct devices and collecting good data. Software guides students by using onscreen instructions and a detailed lab manual follows the scientific method. Once students have collected data, they use analysis tools to measure the amplitude and frequency, plus a wide range of other values from the electrical signals. The analysis process allows students to make general comparisons with the data. They can compare their results to published normal values, or the values before and after a subject performed a specified task. They can also compare results with other students in the lab. The software is available in English, French, Spanish, Italian, Japanese and Chinese.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Schlichting jet
Flow description
The Reynolds number of the jet, Re=1ν(J2πρ)1/2=1ν(K2π)1/2≫1 is a large number for the Schlichting jet.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Social learning tools
Types of Environments
Virtual learning, is when learning is done via the use of web-based platforms in and out of school. This learning environment is almost always used for any social learning tool. The virtual learning environment (VLE) encourages students to explore, discover and exchange information quickly, creatively and independently.There are many social learning tools created for the sole purpose of education. The education system has adopted technology as a way to educate students in school and outside of school settings, where students have shown to work well in the VLE. Social learning tools including Moodle, Khan Academy, TED-Ed and TeacherTube can all be used both in school and at home through the use of the Internet. This goes to show that social learning tools can be both used within all learning environments while being used for educational purposes. However, it is important for these social learning tools to first be introduced in the formal learning environment, e.g. in the classroom, in order to be established as first an educational tool and second a social media platform that may be accessible outside of school.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Jewish meditation
Hasidism
In the Chabad presentation, every intellectual process must incorporate three faculties: Chochma, Binah, and Daat. Chochma (lit. wisdom) is the mind's ability to come up with a new insight into a concept that one did not know before. Binah (lit. understanding) is the mind's ability to take a new insight (from Chochma), analyze all of its implications and simplify the concept so it is understood well. Daat (lit. knowledge), the third stage, is the mind's ability to focus and hold its attention on the Chochma and the Binah.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Internet video
Video file formats
Practical online video streaming was only made possible with advances in data compression, due to the impractically high bandwidth requirements of uncompressed video. Raw digital video requires a bandwidth of 168 Mbit/s for SD video, and over 1 Gbit/s for FHD video.
MPEG-4 AVC (Advanced Video Coding) H.264/MPEG-4 AVC is the most widely used video coding format on the Internet. It was developed in 2003 by a number of organizations.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Rhoticity in English
Mergers characteristic of non-rhotic accents
Show–sure merger In Wells' terminology, this consists of the merger of the lexical sets GOAT and CURE. It may be present in those speakers who have both the dough–door merger described above, and also the pour–poor merger. These include some southern U.S. non-rhotic speakers, some speakers of African-American English (in both cases towards /oʊ/) and some speakers in Guyana.In Geordie, the merger (towards /ʊə/, phonetically [uə]) is variable and recessive. It is also not categorical, as GOAT can instead be pronounced as the close-mid monophthongs [oː] and [ɵː]. The central [ɵː] is as stereotypically Geordie as the merger itself, though it is still used alongside [oː] by young, middle-class males who, as younger speakers in general, reject the centering diphthongs for /oː/ (females often merge /oː/ with /ɔː/ instead, see thought-goat merger). This categorically undoes the merger for those speakers. Even when GOAT is realized as an opening-centering diphthong, it may be distinguished from CURE by the openness of the first element: [ʊə] or [oə] vs. [uə].Some of the words listed below may have different forms in traditional Geordie.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Q:
Recurrence Relation for Bit String Length n with No Consecutive 0s Consider the following:
Find a recurrence relation and give initial conditions for the number of bit strings of length n that do not have two consecutive 0s.
I am trying to understand the solution to this problem, but I am stuck on this line of the solution:
To obtain a recurrence relation for {an}, note that by the sum rule, the number of bit strings of length n that do not have two consecutive 0s equals the number of such bit strings ending with a 0 plus the number of such bit strings ending with a 1.
I don't understand why this is the case. For example, what if you have a bit string 000, it ends in 0, but has 2 consecutive 0s.
Could someone help me understand this?
A:
So, if you read it carefully, you'll see that it says the following:
there is a certain set $S$ of length-$n$ bit strings that don't contain two consecutive 0s
each $s\in S$ either ends with 0 or with 1
thus, if $S_1\subset S$ are those ending in 1 and $S_0\subset S$ are those ending in 0, we have $S = S_0\cup S_1$ as a disjoint union
so, $|S_1| + |S_2| = |S|$
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
Q:
Catalan's conjecture: GCD of an algebraic expression I am trying to solve and understand Catalan's conjecture from this source.
As it is known, the conjecture states that the only solution in terms of consecutive numbers for$$x^p-y^q=1 \tag*{(1)}$$ is $(x,y,p,q)=(3,2,2,3)$.
Now, to solve $(1)$ in the general sense, the source (Page no. 4) does the following,
$$x^p-1=y^q$$
$$(x-1)\frac{x^p-1}{x-1}=y^q \tag*{(2)}$$
then the source goes on to consider $x^p$ as $((x-1)+1)^p$. Later they conclude that the GCD of the terms on the left hand side of $(2)$ is either $p$ or $1$.
How do they find the GCD here? And how can there be two GCDs (i.e., $p$ or $1$)?
Any kind of help will be appreciated.
Cheers!
A:
$$
\frac{x^p - 1}{x - 1} = \sum_{k = 0}^{p - 1} x^k \equiv \sum_{k = 0}^{p - 1} 1^k = p \pmod{x - 1},
$$
so$$
\left( \frac{x^p - 1}{x - 1}, x - 1 \right) = (p, x - 1) = 1 \text{ or }p.
$$
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
GraalVM
Releases
GraalVM 21 GraalVM 20 GraalVM 20.3.0 GraalVM 20.3.0 was released in November 2020. It was marked as the first LTS enterprise version of GraalVM and as the final release for 2020. This version supports code sharing in the GraalVM LLVM runtime, allowing the AST and compiled code of common bitcode libraries to be shared between multiple contexts within a single engine.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Ionic liquid
Potential applications
Pharmaceuticals Recognizing that approximately 50% of commercial pharmaceuticals are salts, ionic liquid forms of a number of pharmaceuticals have been investigated. Combining a pharmaceutically active cation with a pharmaceutically active anion leads to a Dual Active ionic liquid in which the actions of two drugs are combined.ILs can extract specific compounds from plants for pharmaceutical, nutritional and cosmetic applications, such as the antimalarial drug artemisinin from the plant Artemisia annua.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Sodium sulfate symporter
Sodium sulfate symporter
Mammalian renal sodium/dicarboxylate cotransporter, which transports succinate and citrate.
Mammalian intestinal sodium/dicarboxylate cotransporter.
Chlamydomonas reinhardtii putative sulphur deprivation response regulator SAC1.This family also includes a number of bacterial symporters.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Q:
Where does this term come from? Fourier Series of $x+\sin(x)$ I'm starting to learn Fourier series and I've tried to find the Fourier series for
$$f(x) =x+\sin(x), \quad\quad -\pi<x<\pi $$
Since $f$ is odd, it has a Fourier series of the form
$$\sum_{n = 1}^{+\infty}b_n \sin(nx)$$
For $b_n$ i got
$$ b_n= -\frac{2\cos(n\pi)}{n} = \frac{2(-1)^{n+1}}{n}$$So, the Series can be written as
$$\sum_{n = 1}^{+\infty}\frac{2(-1)^{n+1}}{n} \sin(nx)$$
However, the solution that appears in the book (Linear Partial differential equations for scientists and engineers by Tyn Myint-U) is
$$\sin(x)+\sum_{n = 1}^{+\infty}\frac{2(-1)^{n+1}}{n} \sin(nx) $$
Thanks in advance
A:
Your Fourier series just describes $f(x)=x$. The additional $\sin(x)$ is the Fourier series representing just that, the other term $\sin(x)$.
As the Fourier representation is linear, you can just add both.
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
Flight controller
Commercial Crew, 2019-present
Flight Dynamics Officer (FDO) FDO is responsible for pre-mission planning and real-time execution of all CST-100 trajectory operations, including launch, undocking re-entry and landing.
Ground Control (GC) The GC team is responsible for the ground systems infrastructure and ground communications necessary to perform planning, training, testing, execution and evaluation of human spaceflight mission operations at the Johnson Space Center Mission Control Center for Boeing CST Mission Operations (MCC-CST).
Guidance, Navigation, and Control (GNC) GNC manages guidance, navigation and control hardware, and associated software during all phases of flight, including GPS, attitude controllers, the Vision-based Electro-optical Sensor Tracking Assemblies (VESTAs) and more.
Integrated Communications Officer (INCO) INCO is responsible for monitoring the health and status of the communications avionics including the Space-to-Ground (S/G) and Space-to-Space (S/S) systems, handheld radio communication, command encryption, audio systems and associated loose equipment functionality such as handheld microphones and headsets.
Mechanical and Power Officer (MPO) MPO is responsible for the CST-100 spacecraft electrical, mechanical, structural, and landing and recovery systems. These systems include batteries, solar arrays, power converters, interior lighting, vehicle structure, thermal protection, parachutes, airbags, crew hardware and more.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Dynamic time warping
Applications
Spoken-word recognition Due to different speaking rates, a non-linear fluctuation occurs in speech pattern versus time axis, which needs to be eliminated. DP matching is a pattern-matching algorithm based on dynamic programming (DP), which uses a time-normalization effect, where the fluctuations in the time axis are modeled using a non-linear time-warping function. Considering any two speech patterns, we can get rid of their timing differences by warping the time axis of one so that the maximal coincidence is attained with the other. Moreover, if the warping function is allowed to take any possible value, very less distinction can be made between words belonging to different categories. So, to enhance the distinction between words belonging to different categories, restrictions were imposed on the warping function slope.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Strong gravitational lensing
Observations
Galaxy lensing The foreground lens is a galaxy. When the background source is a quasar or unresolved jet, the strong lensed images are usually point-like multiple images; When the background source is a galaxy or extended jet emission, the strong lensed images can be arcs or rings. As of 2017, several hundred galaxy-galaxy (g-g) strong lenses have been observed. The upcoming Vera C. Rubin Observatory and Euclid surveys are expected to discover more than 100,000 such objects.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Extended file attributes
Implementations
BeOS/Haiku In the now-defunct BeOS and successors like Haiku, extended file attributes are widely used in base and third-party programs. The Be File System allows the indexing and querying of attributes, essentially giving the filesystem database-like characteristics. The uses of extended attributes in Be-like systems are varied: For example, Tracker and OpenTracker, the file-managers of BeOS and Haiku respectively, both store the locations of file icons in attributes, Haiku's "Mail" service stores all message content and metadata in extended file attributes, and the MIME types of files are stored in their attributes. Extended file attributes can be viewed and edited in Be-like systems' GUI through the file-manager, often Tracker or derivatives thereof.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Adverbial
Distinguishing an adverbial from an adjunct
All verb- or sentence-modifying adjuncts are adverbials, but some adverbials are not adjuncts.
If the removal of an adverbial does not leave a well-formed sentence, then it is not an adjunct If the adverbial modifies within a sentence element, and is not a sentence element in its own right, it is not an adjunct.
If the adverbial is not grammatically tied to the sentence it is not an adjunct, e.g.Mr Reninson, however, voted against the proposal. (adverbial conjunct not adjunct)
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Riemannian connection on a surface
Reading guide
One of the most comprehensive introductory surveys of the subject, charting the historical development from before Gauss to modern times, is by Berger (2004). Graduate-level treatments of the Riemannian connection can be found in Singer & Thorpe (1967), do Carmo (1976) and O'Neill (1997). Accessible introductions to Cartan's approach to connections using moving frames can be found in Ivey & Landsberg (2003) and Sharpe (1997). Classic treatments of principal bundles and connections can be found in Nomizu (1956), Kobayashi & Nomizu (1963), Sternberg (1964) and Chapter XX of Dieudonné (1974).
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Sequence (medicine)
Sequence (medicine)
In medicine, a sequence is a series of ordered consequences due to a single cause.It differs from a syndrome in that seriality is more predictable: if A causes B, and B causes C, and C causes D, then D would not be seen if C is not seen. However, in less formal contexts, the term "syndrome" is sometimes used instead of sequence.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
GNOME Shell
Software architecture
A fallback mode is offered in versions 3.0–3.6 for those without hardware acceleration which offers the GNOME Panel desktop. This mode can also be toggled through the System Settings menu. GNOME 3.8 removed the fallback mode and replaced it with GNOME Shell extensions that offer a more traditional look and feel.
Extensibility The functionality of GNOME Shell can be changed with extensions, which can be written in JavaScript. Users can find and install extensions using the GNOME extensions website. Some of these extensions are hosted in GNOME's git repository, though they are not official.
Gallery
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Changelog
Format
The GNU Coding standards recommend the following format: YYYY-MM-DD␣␣John Doe␣␣<johndoe@example.com> * myfile.ext (myfunction): my changes made additional changes * myfile.ext (unrelated_change): my changes made to myfile.ext but completely unrelated to the above * anotherfile.ext (somefunction): more changes made by me Note that between the date and the name, and again between the name and the email address, there are two spaces each. It is common to enclose the email address in < and >. The Emacs editor creates such entries when creating additional changelog entries.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Yarn
Materials
Comparison of material properties In general, natural fibers tend to require more careful handling than synthetics because they can shrink, felt, stain, shed, fade, stretch, wrinkle, or be eaten by moths more readily, unless special treatments such as mercerization or super washing are performed to strengthen, fix color, or otherwise enhance the fiber's own properties.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Marfan syndrome
Diagnosis
Differential diagnosis Many other disorders can produce the same type of body characteristics as Marfan syndrome. Genetic testing and evaluating other signs and symptoms can help to differentiate these. The following are some of the disorders that can manifest as "marfanoid": Congenital contractural arachnodactyly, also known as Beals-Hecht syndrome Ehlers–Danlos syndrome Homocystinuria Loeys–Dietz syndrome MASS phenotype Multiple endocrine neoplasia, type 2B Shprintzen–Goldberg syndrome Stickler syndrome
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Dark Gods
Plot summary
"Black Man with a Horn" is a tale in the vein of Lovecraft which treats of an elderly horror writer (modeled on Frank Belknap Long) and his discoveries about the dreaded Tcho-Tcho people. First published in Ramsey Campbell's New Tales of the Cthulhu Mythos, the novella was revised in the 2014 anthology "A Mountain Walked", edited by S. T. Joshi.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Figure 7.17 All reference planes are shown in the East view and 3D view
In the 3D view select all 5 profiles by holding down the Control key
On the Ribbon click the Create Form drop-down and choose the Solid Form icon
Select the exterior face of the wall behind the mass solid
In the Modify tab select the Set icon
Select the exterior face of the wall behind the mass solid
In the Level 1 view, choose the Model icon
Click the rectangle tool and draw a box around each window
Select one of the rectangles
On the ribbon click the Create Form drop-down and choose the Void Form icon
Use the green gumball arrow and pull it towards the exterior of the building to cut through the façade. See Figure 7.18
Figure 7.18 Void extrusion shown cutting through the mass solid
Click the green checkmark to finish the mass
Under the Architecture tab, click on the wall icon drop-down menu and select the Wall By Face icon
Apply a Generic – 6” Masonry wall to all the sides of the mass.
|
https://huggingface.co/datasets/izumi-lab/open-text-books
|
Maximum cut
Applications
A spin configuration partitions V(G) into two sets, those with spin up V+ and those with spin down V−.
We denote with δ(V+) the set of edges that connect the two sets. We can then rewrite the Hamiltonian as H[s]=−∑ij∈E(V+)Jij−∑ij∈E(V−)Jij+∑ij∈δ(V+)Jij=−∑ij∈E(G)Jij+2∑ij∈δ(V+)Jij=C+2∑ij∈δ(V+)Jij Minimizing this energy is equivalent to the min-cut problem or by setting the graph weights as wij=−Jij, the max-cut problem.
Circuit design The max cut problem has applications in VLSI design.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Animal euthanasia
Reasons
The reasons for euthanasia of pets and other animals include: Terminal illness, e.g. cancer or rabies Illness or accident that is not terminal but would cause suffering for the animal to live with, or when the owner cannot afford, or when the owner has a moral objection to the treatment A hunter's coup de grâce Behavioral problems (usually ones that cannot be corrected) e.g. aggression – Canines that have usually caused grievous bodily harm (severe injuries or death) to either humans or other animals through mauling are usually seized and euthanized ('destroyed' in British legal terms) Old age and deterioration leading to loss of major bodily functions, resulting in severe impairment of the quality of life Lack of home or caretaker or resources for feeding Research and testing – In the course of scientific research or testing, animals may be euthanized in order to be dissected, to prevent suffering after testing, to prevent the spread of disease, or other reasonsSmall animal euthanasia is typically performed in a veterinary clinic or hospital or in an animal shelter and is usually carried out by a veterinarian or a veterinary technician working under the veterinarian's supervision. Often animal shelter workers are trained to perform euthanasia as well. Some veterinarians will perform euthanasia at the pet owner's home—this is virtually mandatory in the case of large animal euthanasia. In the case of large animals which have sustained injuries, this will also occur at the site of the accident, for example, on a racecourse.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Music and mathematics
Tuning systems
Same two notes, set against an A440 pedal – this sample consists of a "dyad". The lower note is a constant A (440 Hz in either scale), the upper note is a C♯ in the equal-tempered scale for the first 1", and a C♯ in the just intonation scale for the last 1". Phase differences make it easier to detect the transition than in the previous sample.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Diameter Credit-Control Application
Purpose
Session-based charging A session-based credit control process uses several interrogations which may include first, intermediate and last interrogation. During interrogation money is reserved from the user account. Session-based charging is typically used for scenarios where the charged units are continuously consumed, e.g. charging for bytes upload/download.
Event-based charging An event-based credit control process uses events as charging mechanism. Event-based charging is typically used when units are not continuously consumed, e.g. a user sending an MMS.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Ball tree
Informal description
Ball-trees are related to the M-tree, but only support binary splits, whereas in the M-tree each level splits m to 2m fold, thus leading to a shallower tree structure, therefore need fewer distance computations, which usually yields faster queries. Furthermore, M-trees can better be stored on disk, which is organized in pages. The M-tree also keeps the distances from the parent node precomputed to speed up queries.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Dispersant
Applications
Oil drilling Dispersants in oil drilling aid in breaking up solids or liquids as fine particles or droplets into another medium. This term is often applied incorrectly to clay deflocculants. Clay dispersants prevent formation of "fish-eye" globules. For dispersing (emulsification) of oil into water (or water into oils), surfactants selected on the basis of hydrophilic-lipophilic balance (HLB) number can be used. For foam drilling fluids, synthetic detergents and soaps are used, along with polymers, to disperse foam bubbles into the air or gas.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
High-heeled shoe
Legislation
In Carmel-by-the-Sea, California, heels over 2 inches high with less than one square inch of bearing surface can be worn only with a permit.It has been argued by some union leaders that high heels in the workplace should be subject to a health and safety assessment.In the UK in 2016 temporary receptionist Nicola Thorp was sent home without pay after she refused to follow the dress code of the firm Portico. Thorp launched an online petition calling for the UK government to "make it illegal for a company to require women to wear high heels at work". Two parliamentary committees in January 2017 decided that Portico had broken the law, but by this time the company had already changed its terms of employment. The petition was rejected by the government in April 2017 as they stated that existing legislation was "adequate". Existing legislation in the UK allows women to be required to wear high heels, but only if it is considered a job requirement and men in the same job are required to dress to an "equivalent level of smartness".In April 2017 the Canadian province of British Columbia amended workplace legislation to prevent employers from requiring women to wear high heels at work. Other Canadian provinces followed suit.The Philippines forbade companies from mandating that female employees wear high heels at work in September 2017.The #KuToo campaign in Japan collected nearly 20,000 signatures on a petition for a ban on mandatory high heels. The government said that they had no plans to change. The Japanese Minister of Labor has stated that it is acceptable for companies and others to require women to wear high heels as long as it is necessary and appropriate for the job, with reference to socially accepted norms.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Identity-based encryption
Advantages
Apart from these aspects, IBE offers interesting features emanating from the possibility to encode additional information into the identifier. For instance, a sender might specify an expiration date for a message. He appends this timestamp to the actual recipient's identity (possibly using some binary format like X.509). When the receiver contacts the PKG to retrieve the private key for this public key, the PKG can evaluate the identifier and decline the extraction if the expiration date has passed. Generally, embedding data in the ID corresponds to opening an additional channel between sender and PKG with authenticity guaranteed through the dependency of the private key on the identifier.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Q:
How can I compute $\sum\limits_{k = 1}^n \binom{n - 1}{k - 1}$? I know what $n \choose k$ equals, but I don't see how that would help me solve the sum of $n - 1 \choose k - 1$ from $k = 1$ to $n$. Is there any special trick I should know?
A:
Hint: Binomial Expansion of $(1+1)^{n-1} = \sum_{k=1}^{n-1}{n-1 \choose k-1}1^k1^{n-k}$ will lead to the sum you have asked for.
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
Unified Modeling Language
Unified Modeling Language
The unified modeling language (UML) is a general-purpose visual modeling language that is intended to provide a standard way to visualize the design of a system.UML provides a standard notation for many types of diagrams which can be roughly divided into 3 main groups: behavior diagrams, interaction diagrams, and structure diagrams. The creation of UML was originally motivated by the desire to standardize the disparate notational systems and approaches to software design. It was developed at Rational Software in 1994–1995, with further development led by them through 1996.In 1997, UML was adopted as a standard by the Object Management Group (OMG), and has been managed by this organization ever since. In 2005, UML was also published by the International Organization for Standardization (ISO) as an approved ISO standard. Since then the standard has been periodically revised to cover the latest revision of UML.In software engineering, most practitioners do not use UML, but instead produce informal hand drawn diagrams; these diagrams, however, often include elements from UML.: 536
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Semi-professional sports
United Kingdom of Great Britain and Northern Ireland
In Scottish football, semi-professional teams compete at all levels below the Scottish Premiership, with most teams below the second-level Scottish Championship being semi-professional.
Historically, English rugby league and rugby union have had one full-time professional division, with semi-professional divisions at the next level down. The second tier of union, the RFU Championship, became fully professional beginning with the 2009–10 season.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Q:
Find all $n \in \mathbb{N}$ such that $30^n \equiv 20 \pmod {38}$ The full problem was to actually find all $n \in \mathbb{N}$ such that $w^{{30}^n} = -w^{4^5+21}$, with $w$ being a primitive 38th root of unity.
I've proven that the right side of the equation equals 1, so now I'm left with proving that $30^{n}+208 \equiv 0 \pmod {38}$ which leads to $30^n \equiv 20 \pmod{38}$
And here I got stuck, I've got no clue how to continue. Any help would be appreciated!
A:
Just write out the period
$30\equiv -8\pmod{38}$
$30^2\equiv 64\equiv-12\pmod{38}$
$30^3\equiv96\equiv20 \pmod{38}$
$30^4\equiv-160\equiv30\pmod{38}$
The period is short and you can see every $3k$ is a solution. Sometimes the dumb way is the best way.
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
Human analog mission
Analog activities
NASA Extreme Environment Mission Operations (NEEMO) – This NASA-funded program utilizes the Aquarius habitat, owned by NOAA and operated by the University of North Carolina Wilmington, to simulate operations in a challenging low-gravity environment. Groups of "aquanauts" live in Aquarius for up to three weeks at a time, performing EVAs around the habitat and the nearby coral reef.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Control system security
Industrial Cybersecurity Standards
NERC The most widely recognized and latest NERC security standard is NERC 1300, which is a modification/update of NERC 1200. The latest version of NERC 1300 is called CIP-002-3 through CIP-009-3, with CIP referring to Critical Infrastructure Protection. These standards are used to secure bulk electric systems although NERC has created standards within other areas. The bulk electric system standards also provide network security administration while still supporting best-practice industry processes.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Q:
Changing system of coordinates given a pair of vector fields. Given a pair of fields $X,Y$ in $\mathbb R^2$, how can one deduce that exists a system of coordinates $(u,v)$ defined in a open subset of $\mathbb R^2$ such that
$$X = \frac{\partial}{\partial u} \text{ and }Y = \frac{\partial}{\partial v}? \quad (I)$$
I'm not familiar with this kind of argument. Take of example the following fields:
$X = y \frac{\partial}{\partial z} + \frac{\partial}{\partial y}$ and $Y = \frac{\partial}{\partial x} + x \frac{\partial}{\partial y}$.
$X = \frac{\partial}{\partial z}$ and $Y = \frac{\partial}{\partial x} + \frac{\partial}{\partial y}$.
I don't know if the Lie brackets make any difference to conclude, but in the first case $[X,Y] = -x \frac{\partial}{\partial z}$ and in the second one the corresponding Lie Bracket is zero. How can I see if there exists such a system satisfying $(I)$?
A:
Hint Suppose we have coordinates $(u, v)$ in which the coordinate representations of $X, Y$ are $X = \partial_u$ and $Y = \partial_v$; what is $[X, Y]$?
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
Physiology of dinosaurs
Metabolism
hence predatory dinosaurs were warm-blooded. And since the earliest dinosaurs (e.g. Staurikosaurus, Herrerasaurus) were predators, all dinosaurs must have been warm-blooded.This argument was criticized on several grounds and is no longer taken seriously (the following list of criticisms is far from exhaustive): Estimates of dinosaur weights vary widely, and even a small variation can make a large difference to the calculated predator–prey ratio.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Particle counter
Applications
The industry is controlled through government oversight for the formulation, manufacture and release of all product, and controls are established and monitored to ensure production is maintained to the agreed quality criteria. Good Manufacturing Practices (GMP) ensures that product is manufactured to national and international standards by organizations such as the Food and Drug Administration (FDA), European Medicine Agency (EMA) and the World Health Organization (WHO), other national governmental bodies also regulate the manufacture of product for their countries.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Pier
Piers of the world
United Kingdom England and Wales The first recorded pier in England was Ryde Pier, opened in 1814 on the Isle of Wight, as a landing stage to allow ferries to and from the mainland to berth. It is still used for this purpose today. It also had a leisure function in the past, with the pier head once containing a pavilion, and there are still refreshment facilities today. The oldest cast iron pier in the world is Gravesend town pier, in Kent, which opened in 1834. However, it is not recognised by the National Piers Society as being a seaside pier.Following the building of the world's first seaside pier at Ryde, the pier became fashionable at seaside resorts in England and Wales during the Victorian era, peaking in the 1860s with 22 being built in that decade. A symbol of the typical British seaside holiday, by 1914, more than 100 pleasure piers were located around the UK coast. Regarded as being among the finest Victorian architecture, there are still a significant number of seaside piers of architectural merit still standing, although some have been lost, including two at Brighton in East Sussex, one at New Brighton in the Wirral and three at Blackpool in Lancashire. Two piers, Brighton's now derelict West Pier and Clevedon Pier, were Grade 1 listed. The Birnbeck Pier in Weston-super-Mare is the only pier in the world linked to an island. The National Piers Society gives a figure of 55 surviving seaside piers in England and Wales.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
System requirements (spacecraft system)
System specification structure
5. Interface requirements 5.1 System interfaces 5.1.1 Launcher 5.1.2 Ground stations 5.1.3 etc.
5.2 Subsystem interfaces 5.2.1 Electrical power 5.2.2 Data 5.2.3 etc.
6. Implementation requirements 6.1 Configuration 6.2 Budget Allocations 6.2.1 Mass 6.2.2 Electrical power 6.2.3 etc.
7. Preparation for delivery Attachments (Abbreviation list etc.)Each requirement paragraph consists of the requirement to be fulfilled by the product to be delivered and the verification requirement (Review of design, analysis, test, inspection).
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Dialer
Dialing modes
Power IVR Power IVR is used to deliver a pre-recorded message to a large call list. When a call is answered, Power IVR will play the audio file, and then collect touch tone key responses or speech command at the end of the message, and then transfer the call to an agent or remove the caller from the call list. In other words, IVR is a technology that allows a computer to interact with humans through the use of voice and DTMF tones input via keypad.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Configuration entropy
Calculation
The mathematical field of combinatorics, and in particular the mathematics of combinations and permutations is highly important in the calculation of configurational entropy. In particular, this field of mathematics offers formalized approaches for calculating the number of ways of choosing or arranging discrete objects; in this case, atoms or molecules. However, it is important to note that the positions of molecules are not strictly speaking discrete above the quantum level. Thus a variety of approximations may be used in discretizing a system to allow for a purely combinatorial approach. Alternatively, integral methods may be used in some cases to work directly with continuous position functions, usually denoted as a configurational integral.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
N-universes
N-universes
The n-universes are a conceptual tool introduced by philosopher Paul Franceschi. They consist of simplified models of universes which are reduced to their essential components, in order to facilitate the associated reasoning. In the study of thought experiments related to paradoxes and philosophical problems, the situations are generally complex and likely to give birth to multiple variations. Making use of Occam's razor, modeling in the n-universes makes it possible to reduce such situations to their essential elements and to limit accordingly the complexity of the relevant study.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Software Guard Extensions
List of SGX vulnerabilities
SGAxe SGAxe, an SGX vulnerability published in 2020, extends a speculative execution attack on cache, leaking content of the enclave. This allows an attacker to access private CPU keys used for remote attestation. In other words, a threat actor can bypass Intel's countermeasures to breach SGX enclaves' confidentiality. The SGAxe attack is carried out by extracting attestation keys from SGX's private quoting enclave that are signed by Intel. The attacker can then masquerade as legitimate Intel machines by signing arbitrary SGX attestation quotes. A security advisory and mitigation for this attack, also called a Processor Data Leakage or Cache Eviction, was originally issued January 27, 2020 and updated May 11, 2021.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Trumpet
Playing
Fingering On any modern trumpet, cornet, or flugelhorn, pressing the valves indicated by the numbers below produces the written notes shown. "Open" means all valves up, "1" means first valve, "1–2" means first and second valve simultaneously, and so on. The sounding pitch depends on the transposition of the instrument. Engaging the fourth valve, if present, usually drops any of these pitches by a perfect fourth as well. Within each overtone series, the different pitches are attained by changing the embouchure. Standard fingerings above high C are the same as for the notes an octave below (C♯ is 1–2, D is 1, etc.).
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Criticism of Myspace
MySpace China
The simplified Chinese version of MySpace, launched in April 2007, has many censorship-related differences from other international versions of the service. Discussion forums on topics such as religion and politics are absent, and a filtering system that prevents the posting of content about Taiwan independence, the Dalai Lama, Falun Gong, and other "inappropriate topics" has been added. Users are also given the ability to report the "misconduct" of other users for offenses including "endangering national security, leaking state secrets, subverting the government, undermining national unity, and spreading rumors or disturbing the social order."
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Shannon wavelet
Shannon wavelet
In functional analysis, the Shannon wavelet (or sinc wavelets) is a decomposition that is defined by signal analysis by ideal bandpass filters. Shannon wavelet may be either of real or complex type.
Shannon wavelet is not well-localized(noncompact) in the time domain,but its Fourier transform is band-limited(compact support). Hence Shannon wavelet has poor time localization but has good frequency localization. These characteristics are in stark contrast to those of the Haar wavelet. The Haar and sinc systems are Fourier duals of each other.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
CRAM (file format)
CRAM (file format)
Implementations of CRAM exist in htsjdk, htslib, JBrowse, and Scramble.The file format specification is maintained by the Global Alliance for Genomics and Health (GA4GH) with the specification document available from the EBI cram toolkit page.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Q:
Find a rational function $f(x)$ with H. asymptote of y=2, V. asymptotes at x=-3, x=3 and a y-intercept at $\frac{-2}{3}$ So first I multiplied the V. Asymptotes like so,
$$(x+3)(x-3)$$
to get $$(x^2-9)$$
And knowing that because the horizontal Asymptote is a non-negative number, that the leading coefficient in the numerator has to be double that of the leading coefficient in the denominator. Meaning it will be $2$ along with the same degree value as the denominator.
So up till now I have
$$f(x)=\frac{2x^2}{x^2-9}$$
This is where I get stuck because I am not sure how to incorporate the y-intercept.
A:
You can use $f(x)=\frac{2x^2+c}{x^2-9}$ and then use $x=0$ to get $$f(0)=\frac{c}{-9}=\frac{-c}{9}=\frac{-2}{3}$$ or $c=6$.
So you get $f(x)=\frac{2x^2+6}{x^2-9}$
More generally, you can use:
$$f(x)=\frac{2x^2+bx+6}{x^2-9}$$ where $b\neq \pm 8.$ (When $b=\pm 8$ you lose one of the vertical asymptotes.)
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
Batter (cooking)
Cuisine and batters
Batters made with wheat flour thicken with every second that passes after mixing because of the development of gluten. Strategies to reduce this effect include the use of ice water when mixing, alcohol (which does not mix with the flour to produce gluten), and making it at the last possible moment before use.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Q:
What's the time complexity of this alg $ for(i = 0; i \le (logn)^{\frac{\sqrt n}{2}}; i = i \cdot 3)$ Given algorithm:
$x \leftarrow 0$
$ for(i = 0; i \le (logn)^{\frac{\sqrt n}{2}}; i = i \cdot 3)$
$x \leftarrow x + 2$
Well, lines 1,3 are useless.
about line 2. I'm not sure how to build the equation but I think it is:
$3^i \le (logn)^{\frac{\sqrt n}{2}}$, can anyone help explain how to build the in-equality to find $i$?
A:
Assuming you meant to write $i = 1$ rather than $i = 0$, you're almost there. Just take the logarithm of both sides, and you'll get $$i \le \frac{\sqrt n\log\log n}{2\log 3}$$ So the number of iterations of the loop will be proportional to the square root of n, which may be sublinear or exponential in terms of input size, depending on whether n is the input itself or the size of the input.
Of course, if you do start with $i = 0$, you'll get an infinite loop.
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
Airline
Economy
Moreover, the industry is structured so that airlines often act as tax collectors. Airline fuel is untaxed because of a series of treaties existing between countries. Ticket prices include a number of fees, taxes and surcharges beyond the control of airlines. Airlines are also responsible for enforcing government regulations. If airlines carry passengers without proper documentation on an international flight, they are responsible for returning them back to the original country.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
First-order partial differential equation
Two dimensional case
The envelope of these planes is a cone, or a line if the PDE is quasi-linear. The condition for an envelope is Fpdp+Fqdq=0, where F is evaluated at (x0,y0,u0,p,q) , and dp and dq are increments of p and q that satisfy F=0. Hence the generator of the cone is a line with direction dx:dy:du=Fp:Fq:(pFp+qFq).
This direction corresponds to the light rays for the wave equation.
To integrate differential equations along these directions, we require increments for p and q along the ray. This can be obtained by differentiating the PDE: Fx+Fup+Fppx+Fqpy=0, Fy+Fuq+Fpqx+Fqqy=0, Therefore the ray direction in (x,y,u,p,q) space is dx:dy:du:dp:dq=Fp:Fq:(pFp+qFq):(−Fx−Fup):(−Fy−Fuq).
The integration of these equations leads to a ray conoid at each point (x0,y0,u0) . General solutions of the PDE can then be obtained from envelopes of such conoids.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Slope stability analysis
Limit equilibrium analysis
Limit equilibrium methods investigate the equilibrium of a soil mass tending to slide down under the influence of gravity. Translational or rotational movement is considered on an assumed or known potential slip surface below the soil or rock mass. In rock slope engineering, methods may be highly significant to simple block failure along distinct discontinuities. All these methods are based on the comparison of forces, moments, or stresses resisting movement of the mass with those that can cause unstable motion (disturbing forces). The output of the analysis is a factor of safety, defined as the ratio of the shear strength (or, alternatively, an equivalent measure of shear resistance or capacity) to the shear stress (or other equivalent measure) required for equilibrium. If the value of factor of safety is less than 1.0, the slope is unstable.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Urethrovaginal fistula
Urethrovaginal fistula
A urethrovaginal fistula is an abnormal passageway that may occur the urethra and the vagina. It is a sub-set of vaginal fistulas. It results in urinary incontinence as urine continually leaves the vagina. It can occur as an obstetrical complication, catheter insertion injury or a surgical injury.It is also called a urethral fistula and may be referred to as UVF. They are quite rare. In the developed world, they are typically due to injuries due to medical activity.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Q:
Finding Modulus for large numbers How would I find the modulus for the following?
$$744{,}121{,}837 \bmod 101$$
The answer for this is 95. But how can I solve for this manually?
A:
As pointed out in a comment, the trick here is based on the fact that $100\equiv -1$ (mod $101$). So you have
$$
744121837 =37 + 100\cdot18+100^2\cdot12+100^3\cdot44+100^4\cdot7\\ \equiv 37-18+12-44+7\\=-6
$$
(mod $101$), which is equivalent to $95$.
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
Q:
Are the Karush-Kuhn-Tucker conditions applicable when one or more of the constraints are nonlinear? I am just beginning to read about the use of "Concave Programming" methods and use of the Karush-Kuhn-Tucker conditions to identify the maximum value of a non-linear objective function subject to inequality constraints.
The examples I have seen in the text I have at hand, all involve only linear constraints. Is this method equally applicable to situations where not only are there multiple constraints, but where one or more of those constraints are non-linear ?
A:
The answers provided above are only partly valid. When there is at least one nonlinear constraint, the KKT conditions are necessary for optimality IF a constraint qualification holds! Consider for instance
$$
\min_x \ x \quad \text{s.t.} \ x^2 = 0.
$$
The KKT conditions are that $1 - 2 xy = 0$ and $x^2 = 0$. They have no solution. This is because no constraint qualification is satisfied at $x^* = 0$.
|
https://huggingface.co/datasets/flax-sentence-embeddings/stackexchange_math_jsonl
|
Adolescent cliques
Types of American cliques
Scenesters – Also known as Trendies, they are ever eager to fit in. They are dedicated followers of fashion, devoted to a particular band, club, or style. They dress in tight, fashionable clothing, wear sunglasses, and sport wild but styled hairdos (striped, streaked, or spiked). Social media platforms are totally essential to them. Scenesters sometimes get labeled posers or wannabes.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Locally convex vector lattice
Lattice semi-norms
The Minkowski functional of a convex, absorbing, and solid set is a called a lattice semi-norm. Equivalently, it is a semi-norm p such that |y|≤|x| implies p(y)≤p(x).
The topology of a locally convex vector lattice is generated by the family of all continuous lattice semi-norms.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Body reactivity
Body reactivity
Body reactivity is usually understood as the body's ability to react in a proper way to influence the environment. Resistance of an organism is its stability under the influence of pathogenic factors. The body reactivity can range from homeostasis to a fight or flight response. Ultimately, they are all governed by the nervous system.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
MacPublisher
MacPublisher
MacPublisher was the first Desktop Publishing program for the Apple Macintosh, introduced in 1984, the same year that Apple introduced the Macintosh. DTP competitors Ready, Set, Go! and Aldus PageMaker were introduced in 1985 when Apple delivered the 512K Macintosh.
MacPublisher was developed by Bob Doyle and distributed by Boston Software Publishers.Built on graphics primitives like QuickDraw that Bill Atkinson had originally developed for the Apple Lisa computer, MacPublisher included WYSIWYG layout for multi-column text and graphics. QuickDraw was incorporated in the Pascal toolbox for the new Macintosh and had been the basis for MacPaint.
The Desktop Publishing industry exploded in the year 1985 with the introduction of the Apple LaserWriter printer in January and in July the 512K "Fat Mac" and Aldus Corporation's PageMaker, which rapidly became the DTP industry standard software.
It was Paul Brainerd, Aldus's chairman, who gave the industry the name "desktop publishing." MacPublisher had been called "electronic publishing," after the industry then led by Atex Corporation, of which Brainerd had been a vice president.
MacPublisher was the first non-Apple application program to print in color on the ImageWriter II. It introduced spot color to desktop publishing. MacPublisher III was the first DTP program to rotate text and graphics, using a table look-up for the necessary sine functions in one-degree increments.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
Keek
Apps
Android The Keek Android app is compatible with Android devices running Android 2.3 or newer and can be downloaded from the Google Play store. It is currently rated 4.0 out of 5 stars (based on 117,691 user ratings) and has between 5,000,000 - 10,000,000 installs. The app is free to download.
|
https://huggingface.co/datasets/milkshake721/2.1M-wiki-STEM
|
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 8