source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/Language%20Interface%20Pack
|
In Microsoft terminology, a Language Interface Pack (LIP) is a skin for localizing a Windows operating system in languages such as Lithuanian, Serbian, Hindi, Marathi, Kannada, Tamil, and Thai. Based on Multilingual User Interface (MUI) "technology", a LIP also requires the software to have a base installed language and provides users with an approximately 80 percent localized user experience by translating a reduced set of user interface elements. Unlike MUI packs which are available only to Microsoft volume license customers and for specific SKUs of Windows Vista, a Language Interface Pack is available for free and can be installed on a licensed copy of Microsoft Windows or Office and a fixed "base language". In other words, if the desired additional language has incomplete localization, users may add it for free, while if the language has complete localization, the user must pay for it by licensing a premium version of Windows. (In Windows Vista and Windows 7, only the Enterprise and Ultimate editions are "multilingual".)
Typically, a Language Interface Pack is designed for regional markets that do not have full MUI packs or fully localized versions of a product. It is an intermediate localized solution that enables computer users to adapt their software to display many commonly used features in their native language. Each new Language Interface Pack is built using the glossary created by the Community Glossary Project in cooperation with the local government, academia, and local linguistic experts.
References
Software add-ons
|
https://en.wikipedia.org/wiki/Google%20Earth
|
Google Earth is a computer program that renders a 3D representation of Earth based primarily on satellite imagery. The program maps the Earth by superimposing satellite images, aerial photography, and GIS data onto a 3D globe, allowing users to see cities and landscapes from various angles. Users can explore the globe by entering addresses and coordinates, or by using a keyboard or mouse. The program can also be downloaded on a smartphone or tablet, using a touch screen or stylus to navigate. Users may use the program to add their own data using Keyhole Markup Language and upload them through various sources, such as forums or blogs. Google Earth is able to show various kinds of images overlaid on the surface of the Earth and is also a Web Map Service client. In 2019, Google revealed that Google Earth now covers more than 97 percent of the world, and has captured 10 million miles of Street View imagery.
In addition to Earth navigation, Google Earth provides a series of other tools through the desktop application, including a measure distance tool. Additional globes for the Moon and Mars are available, as well as a tool for viewing the night sky. A flight simulator game is also included. Other features allow users to view photos from various places uploaded to Panoramio, information provided by Wikipedia on some locations, and Street View imagery. The web-based version of Google Earth also includes Voyager, a feature that periodically adds in-program tours, often presented by scientists and documentarians.
Google Earth has been viewed by some as a threat to privacy and national security, leading to the program being banned in multiple countries. Some countries have requested that certain areas be obscured in Google's satellite images, usually areas containing military facilities.
History
The core technology behind Google Earth was originally developed at Intrinsic Graphics in the late 1990s. At the time, the company was developing 3D gaming software libraries. As a demo of their 3D software, they created a spinning globe that could be zoomed into, similar to the Powers of Ten film. The demo was popular, but the board of Intrinsic wanted to remain focused on gaming, so in 1999, they created Keyhole, Inc., headed by John Hanke. Keyhole then developed a way to stream large databases of mapping data over the internet to client software, a key part of the technology, and acquired patchworks of mapping data from governments and other sources. The product, called "Keyhole EarthViewer", was sold on CDs for use in fields such as real estate, urban planning, defense, and intelligence; users paid a yearly fee for the service. Despite making a number of capital deals with Nvidia and Sony, the small company was struggling to pay and retain employees.
Fortunes for the company changed in early 2003 during the 2003 invasion of Iraq, when Dave Lorenzini (Director at Keyhole) enticed CNN, ABC, CBS and other major news networks to use their sophisticated 3D flyb
|
https://en.wikipedia.org/wiki/Virtual%20IP%20address
|
A virtual IP address (VIP or VIPA) is an IP address that does not correspond to a physical network interface. Uses for VIPs include network address translation (especially, one-to-many NAT), fault-tolerance, and mobility.
Usage
For one-to-many NAT, a VIP address is advertised from the NAT device (often a router), and incoming data packets destined to that VIP address are routed to different actual IP addresses (with address translation). These VIP addresses have several variations and implementation scenarios, including Common Address Redundancy Protocol (CARP) and Proxy ARP. In addition, if there are multiple actual IP addresses, load balancing can be performed as part of NAT.
VIP addresses are also used for connection redundancy by providing alternative fail-over options for one machine. For this to work, the host has to run an interior gateway protocol like Open Shortest Path First (OSPF), and appear as a router to the rest of the network. It advertises virtual links connected via itself to all of its actual network interfaces. If one network interface fails, normal OSPF topology reconvergence will cause traffic to be sent via another interface.
A VIP address can be used to provide nearly unlimited mobility. For example, if an application has an IP address on a physical subnet, that application can be moved only to a host on that same subnet. VIP addresses can be advertised on their own subnet, so its application can be moved anywhere on the reachable network without changing addresses.
See also
Anycast, single IP bound simultaneously to many, potentially geographically disparate, NICs
IP network multipathing (IPMP), Solaris virtual IP implementation for fault-tolerance and load balancing
VLAN
Notes
References
Cluster computing
IP addresses
|
https://en.wikipedia.org/wiki/NRP
|
NRP may refer to:
Science
Neuropilin
Nonribosomal peptide
Nurse rostering problem, a problem in computer science
Political parties
National Renaissance Party (United States)
National Reform Party (disambiguation)
National Religious Party, in Israel
New Republic Party (South Africa)
New Reform Party of Ontario, a defunct party in Ontario, Canada
New Rights Party, in Georgia
Nordic Reich Party, in Sweden
Norodom Ranariddh Party, a royalist opposition party in Cambodia
Other
Maryland Department of Natural Resources Police, officially abbreviated as NRP
National Reading Panel
National Reconciliation Program, a political organization in Burma
National Reorganization Process, the military dictatorship in Argentina from 1976 to 1983
National Response Plan, former US Department of Homeland Security plan for domestic incidents
Navio da República Portuguesa, the ship prefix for Portuguese Navy ships
Neighbourhood Renewal Programme in Singapore
Neonatal Resuscitation Program
Nationally Registered Paramedic, a certification from the National Registry of Emergency Medical Technicians
Network resource planning
Nissan Revival Plan
Northern Rhodesia Police, the national police force of Northern Rhodesia, now Zambia
|
https://en.wikipedia.org/wiki/Mark%20Dean%20%28computer%20scientist%29
|
Mark E. Dean (born March 2, 1957) is an American inventor and computer engineer. He developed the ISA bus, and he led a design team for making a one-gigahertz computer processor chip. He holds three of nine PC patents for being the co-creator of the IBM personal computer released in 1981. In 1995, Dean was named the first ever African-American IBM Fellow.
Dean was elected as a member into the National Academy of Engineering in 2001 for innovative and pioneering contributions to personal computer development.
In 2000, Mark discussed a hand held device that would be able to display media content, like a digital newspaper. In August 2011, Dean stated that he uses a tablet computer instead of a PC in his blog.
Early life
Dean was born in Jefferson City, Tennessee. Dean displayed an affinity for technology and invention at a young age. His father, James, worked with electrical equipment for turbines and spillways. James would often bring Mark with him on work trips, introducing him to engineering. When Mark was young, he and his dad constructed a tractor from scratch. In middle school, Mark had made up his mind on becoming a computer engineer. Dean attended Jefferson City High School in Tennessee, where he excelled in both academics and athletics. While in high school, during the 1970s, Mark built his own personal computer.
Recognition
Dean is the first African-American to become an IBM Fellow, which is the highest level of technical excellence at the company. In 1997, he was inducted into the National Inventors Hall of Fame. He was elected to the National Academy of Engineering in 2001. In 1997, Dean was awarded the Black Engineer of the Year Presidents Award. From August 2018 to July 2019, Dean was the interim dean of the UT's Tickle College of Engineering.
As of April 26, 2019, April 25 is now officially Mark Dean Day in Knox County, Tennessee.
Career
Mark graduated with a bachelor's degree in electrical engineering during 1979. Soon after, Mark got a job at IBM as an engineer. His first task at the company was to create a word processor adapter for IBM's Datamaster terminal. During this time, he also created the ISA bus that allowed additional components to be connected to a PC. His work got him promoted in 1982 to chief engineer of PC design, where he worked with a team to develop the IBM PC. In the same year, Mark earned his master's degree in electrical engineering. 17 years later, in 1999, Dean and his team developed a gigahertz microchip, the first in the world.
Dean was an IBM Vice President overseeing the company's Almaden Research Center in San Jose, California. At one point, Mark was CTO for IBM Middle East and Africa. He retired from the company in 2013 and became a professor at University of Tennessee. Mark Dean is the John Fisher Distinguished Professor in the Department of Electrical Engineering and Computer Science at the University of Tennessee.
Dean now holds more than 20 patents, and his work led to development of the
|
https://en.wikipedia.org/wiki/Tabula%20Peutingeriana
|
(Latin for "The Peutinger Map"), also referred to as Peutinger's Tabula or Peutinger Table, is an illustrated (ancient Roman road map) showing the layout of the cursus publicus, the road network of the Roman Empire.
The map is a parchment copy dating from around 1200 of a Late Antique original. It covers Europe (without the Iberian Peninsula and the British Isles), North Africa, and parts of Asia, including the Middle East, Persia, and India. According to one hypothesis, the existing map is based on a document of the 4th or 5th century that contained a copy of the world map originally prepared by Agrippa during the reign of the emperor Augustus (27 BC–AD 14).
However, Emily Albu has suggested that the existing map could instead be based on an original from the Carolingian period. According to Albu, the map was likely stolen by the humanist Conrad Celtes, who bequeathed it to his friend, the economist and archaeologist Konrad Peutinger, who gave it to Emperor Maximilian I, as part of a large-scale book stealing scheme.
Named after the 16th-century German antiquarian Konrad Peutinger, the map has been conserved at the Austrian National Library (the former Imperial Court Library) in Vienna since 1738.
Archetype
The Tabula is thought to be a distant descendant of the map prepared under the direction of Marcus Vipsanius Agrippa, a Roman general, architect, and a confidant to the emperor Augustus; the map was engraved on stone and put on display in the Porticus Vipsania in the Campus Agrippae area in Rome, close to the Ara Pacis building.
The early imperial dating for the archetype of the map is supported by American historian Glen Bowersock, and is based on numerous details of Roman Arabia that look entirely anachronistic for a 4th-century map. Bowersock concluded that the original source is likely the map made by Vipsanius Agrippa. This dating is also consistent with the map's inclusion of the Roman town of Pompeii near modern-day Naples, which was never rebuilt after it had been destroyed in an eruption of Mount Vesuvius in AD 79.
The original Roman map, of which this may be the only surviving copy, was last revised in the 4th or early 5th century. It shows the city of Constantinople, founded in 328, and the prominence of Ravenna, seat of the Western Roman Empire from 402 to 476, which suggests a fifth-century revision according to Levi and Levi. The presence of certain cities of Germania Inferior that were destroyed in the mid-fifth century provides a terminus ante quem, i.e. the map's latest creation date, though Emily Albu suggests that this information could have been preserved in the textual, not cartographic, form. The map also mentions Francia, a state that came into existence only in the 5th century.
Map description
The is thought to be the only known surviving map of the Roman cursus publicus, the state-run road network. It has been proposed that the surviving copy was created by a monk in Colmar in 1265, but this is disputed. The
|
https://en.wikipedia.org/wiki/Music%20Player%20Daemon
|
Music Player Daemon (MPD) is a free and open source music player server. It plays audio files, organizes playlists and maintains a music database. In order to interact with it, a client program is needed. The MPD distribution includes mpc, a simple command line client.
MPD is used in proprietary audio hardware. The MPD project maintains a list of vendors, some of which infringe the GPL.
Design
MPD simply runs in the background playing music from its playlist. Client programs communicate with MPD to manipulate playback, the playlist, and the database. It is not a full-featured music player program such as Amarok, but its clients can serve such role.
MPD uses a flat file database to maintain the basic music file information when it is not running. Once the daemon has been started, the database is kept completely in-memory and no hard disk access is necessary to look up or search for local audio files. Generally, music files must be located in a sub-directory of the music directory and are only added to the database when the update command is sent to the server. Playback of arbitrary files is allowed but only for local clients which are connected to the server via a Unix Domain Socket. MPD does not provide a built-in tag editor; this functionality is handled by clients or external programs, though 3rd party patches do exist to add this functionality to the server.
The client–server model provides several advantages over all-inclusive music players. Clients may communicate with the server remotely over an intranet or over the Internet. The server can be a headless computer located anywhere on the network. Music playback can continue seamlessly when not using X or restarting X. Different clients can be used for different purposes – a lightweight client left open all the time for controlling playback with a more fully featured client used for intensive database searches. Several clients can use the same database, running simultaneously, remotely or under different user accounts.
Features
Plays Ogg Vorbis, FLAC, Opus, WavPack, MP2, MP3, MP4/AAC, MOD, Musepack, wave files and any other files supported by FFmpeg.
Remotely control MPD over a network (IPv4 and IPv6 supported).
Plays FLAC, OggFLAC, MP3 and Ogg Vorbis HTTP streams.
Reads and caches metadata information (ID3: ID3v1 and ID3v2), Vorbis Comments, and MP4 Metadata.
Metadata information can be searched.
Buffer support for playback (prevents skipping due to high load or network latency).
Gapless playback.
Crossfading support.
Seeking support.
Save, load, and manage playlists (in M3U format).
Native Zeroconf support.
libsamplerate and native sample rate conversion.
Support for ALSA, PulseAudio, PipeWire, OSS, MVP, JACK, Windows, and macOS.
Can be used as a source for an Icecast stream, in Ogg Vorbis and MP3. Other formats can be converted to Ogg/MP3 on the fly before output to the stream server.
Built-in HTTP streaming server, capable of producing Ogg Vorbis and MP3 streams of a
|
https://en.wikipedia.org/wiki/Information%20flow%20%28disambiguation%29
|
Information flow can have one of several meanings:
Information flow, in discourse-based grammatical theory
Information Flow: The Logic of Distributed Systems an influential handbook ( ) by Jon Barwise and Jerry Seligman for the analysis of theories using its framework based on a melange of topics from information, model, and discourse theory which is applied to give a formalization of the logic of Quantum Mechanics.
Information flow (information theory)
Information cascade in network theory
Information flow diagram
Communication
Knowledge sharing
|
https://en.wikipedia.org/wiki/Monty%20on%20the%20Run
|
Monty on the Run is a computer game created by the software house Gremlin Graphics and released in 1985 for the Commodore 64, ZX Spectrum, Amstrad CPC and Commodore 16, written by Peter Harrap for the ZX Spectrum with the iconic in-game music on the Commodore 64 provided by Rob Hubbard. It is the third game in the Monty Mole series.
Gameplay
On the run from the authorities after his intervention in the Miners' strike, Monty the mole must escape from his house and head for the English Channel and freedom in Europe. In traditional platform game fashion, along the way he needs to collect various objects and solve puzzles to complete his escape. Before the game, five objects must be chosen to form Monty's Freedom Kit. Choosing the wrong items will leave the player unable to pass certain screens. This also acted as an anti-piracy measure, since the objects were only given numbers onscreen meaning the player had to refer to the accompanying manual. The final screen sees Monty boarding a ferry to France. This was then the starting point for the follow-up Auf Wiedersehen Monty.
The game has a sense of British surrealness similar to Manic Miner and Jet Set Willy - in gameplay it is more similar to the latter. Enemies patrol every screen, water is deadly to the touch and Monty runs the risk of being squashed by the many pistons.
Ports
The Commodore 64 version was produced by Micro Projects Ltd, joint owned by Anthony Clarke and Jason Perkins, with graphical input by Mark Rodgers and music by Rob Hubbard. The music for the Commodore 64 version is regarded as one of the best computer game scores for that platform. The main game theme was, according to Hubbard, inspired by "Devil's Galop", the theme tune to the radio serial Dick Barton. It was rated #2 in Hardcore Gaming 101's Top 100 Western Video Game Music of all time.
A remake, titled was created for the Famicom Disk System in 1987 by Jaleco. The game bears very little resemblance to the original version. For instance, Monty Mole has been replaced with a human on the run from prison and now has to escape through various Aztec-like temples.
The only real association the game does have with the original is Gremlin's copyright and the familiar "in-game" theme playing on the title screen. Like many Famicom Disk System titles, Monty's Great Heart-pounding Escape is little known outside Japan as the game was never ported to cartridge for a Western NES release.
Reception
The game was critically and commercially successful in the UK. The Commodore 64 version was given a 90% overall rating by the reviewers of Zzap!64, while Crash magazine gave the Spectrum version an overall score of 94%.
The game entered the Spectrum, Commodore and All-Format charts at number one.
The game was voted second best platform game in the 1985 Computer Gamer Game of the Year Awards behind Impossible Mission. In 1991, Commodore Format listed the game as one of the 100 best Commodore 64 games. In 2007, the game was placed in 20t
|
https://en.wikipedia.org/wiki/Inverse%20dynamics
|
Inverse dynamics is an inverse problem. It commonly refers to either inverse rigid body dynamics or inverse structural dynamics. Inverse rigid-body dynamics is a method for computing forces and/or moments of force (torques) based on the kinematics (motion) of a body and the body's inertial properties (mass and moment of inertia). Typically it uses link-segment models to represent the mechanical behaviour of interconnected segments, such as the limbs of humans or animals or the joint extensions of robots, where given the kinematics of the various parts, inverse dynamics derives the minimum forces and moments responsible for the individual movements. In practice, inverse dynamics computes these internal moments and forces from measurements of the motion of limbs and external forces such as ground reaction forces, under a special set of assumptions.
Applications
The fields of robotics and biomechanics constitute the major application areas for inverse dynamics.
Within robotics, inverse dynamics algorithms are used to calculate the torques that a robot's motors must deliver to make the robot's end-point move in the way prescribed by its current task. The "inverse dynamics problem" for robotics was solved by Eduardo Bayo in 1987. This solution calculates how each of the numerous electric motors that control a robot arm must move to produce a particular action. Humans can perform very complicated and precise movements, such as controlling the tip of a fishing rod well enough to cast the bait accurately. Before the arm moves, the brain calculates the necessary movement of each muscle involved and tells the muscles what to do as the arm swings. In the case of a robot arm, the "muscles" are the electric motors which must turn by a given amount at a given moment. Each motor must be supplied with just the right amount of electric current, at just the right time. Researchers can predict the motion of a robot arm if they know how the motors will move. This is known as the forward dynamics problem. Until this discovery, they had not been able to work backwards to calculate the movements of the motors required to generate a particular complicated motion. Bayo's work began with the application of frequency-domain methods to the inverse dynamics of single-link flexible robots. This approach yielded non-causal exact solutions due to the right-half plane zeros in the hub-torque-to-tip transfer functions. Extending this method to the nonlinear multi-flexible-link case was of particular importance to robotics. When combined with passive joint control in a collaborative effort with a control group, Bayo's inverse dynamics approach led to exponentially stable tip-tracking control for flexible multi-link robots.
Similarly, inverse dynamics in biomechanics computes the net turning effect of all the anatomical structures across a joint, in particular the muscles and ligaments, necessary to produce the observed motions of the joint. These moments of force may then be us
|
https://en.wikipedia.org/wiki/Degree%20distribution
|
In the study of graphs and networks, the degree of a node in a network is the number of connections it has to other nodes and the degree distribution is the probability distribution of these degrees over the whole network.
Definition
The degree of a node in a network (sometimes referred to incorrectly as the connectivity) is the number of connections or edges the node has to other nodes. If a network is directed, meaning that edges point in one direction from one node to another node, then nodes have two different degrees, the in-degree, which is the number of incoming edges, and the out-degree, which is the number of outgoing edges.
The degree distribution P(k) of a network is then defined to be the fraction of nodes in the network with degree k. Thus if there are n nodes in total in a network and nk of them have degree k, we have .
The same information is also sometimes presented in the form of a cumulative degree distribution, the fraction of nodes with degree smaller than k, or even the complementary cumulative degree distribution, the fraction of nodes with degree greater than or equal to k (1 - C) if one considers C as the cumulative degree distribution; i.e. the complement of C.
Observed degree distributions
The degree distribution is very important in studying both real networks, such as the Internet and social networks, and theoretical networks. The simplest network model, for example, the (Erdős–Rényi model) random graph, in which each of n nodes is independently connected (or not) with probability p (or 1 − p), has a binomial distribution of degrees k:
(or Poisson in the limit of large n, if the average degree is held fixed). Most networks in the real world, however, have degree distributions very different from this. Most are highly right-skewed, meaning that a large majority of nodes have low degree but a small number, known as "hubs", have high degree. Some networks, notably the Internet, the World Wide Web, and some social networks were argued to have degree distributions that approximately follow a power law: , where γ is a constant. Such networks are called scale-free networks and have attracted particular attention for their structural and dynamical properties. However, a survey of a wide range of real world networks suggests that scale-free networks are rare when assessed using statistically rigorous measures. Some researchers have disputed these findings arguing that the definitions used in the study are inappropriately strict, while others have argued that the precise functional form of the degree distribution is less important than knowing whether the degree distribution is fat-tailed or not. The over-interpretation of specific forms of the degree distribution has also been criticised for failing to consider how networks may evolve over time.
Excess degree distribution
Excess degree distribution is the probability distribution, for a node reached by following an edge, of the number of other edges attached to that
|
https://en.wikipedia.org/wiki/LSQ
|
LSQ may refer to:
Les Stewart Quartet, a predecessor of the band The Quarrymen
Load-Store Queue, a structure used by some computer CPUs' memory disambiguation mechanisms
Agua Santa Airport (IATA airport code: LSQ), Los Ángeles, Chile
Quebec Sign Language (), a sign language used in Canada
Lone Scout Quill, a grade of scouting of the Lone Scouts of America
Least squares, a technique of equation fitting
|
https://en.wikipedia.org/wiki/KADN-TV
|
KADN-TV (channel 15) is a television station licensed to Lafayette, Louisiana, United States, affiliated with Fox and MyNetworkTV. It is owned by Allen Media Broadcasting alongside low-power NBC affiliate KLAF-LD (channel 14). Both stations share studios on Eraste Landry Road in Lafayette, while KADN-TV's transmitter is located south of Church Point, in rural Acadia Parish.
History
Prior use of channel 15 in Lafayette
Channel 15 in Lafayette was originally home to KLNI-TV (licensed to Lafayette and New Iberia), which operated as an NBC affiliate beginning on September 16, 1968. It was owned by Southwestern Louisiana Communications, Inc., and it was the first TV station built in southwestern Louisiana to broadcast in full color. Like other NBC affiliates in the region, it temporarily brought PBS programming, specifically Sesame Street, to the Acadiana area from 1970 until 1972. However, Lafayette was just barely large enough at the time to support three full network affiliates. KLNI-TV, a UHF station, found it difficult to compete against longer-established KATC-TV (channel 3) and KLFY-TV (channel 10). It did not help matters that WBRZ-TV in Baton Rouge and KPLC-TV in Lake Charles both provided strong grade B coverage to most of the market after relocating their transmission towers and increasing their respective heights. After suffering financial difficulties for most of its existence, KLNI discontinued operations on February 21, 1975. This left WBRZ (and later WRBT, now WVLA) and KPLC as the region's de facto NBC affiliates; the latter was carried by most cable providers in south-central Louisiana. The allocation for channel 15 in Lafayette as a commercial TV station remained after the demise of KLNI-TV, but the frequency stayed dark for the next five years.
Early years
KADN-TV, the current incarnation of channel 15, began broadcasting on March 1, 1980 as an independent station, offering mainly movies, old sitcoms, children's programming, and local sports. It was owned by Charles Chatelain and his company, Delta Media Corporation. The station used the on-air slogan "Acadiana's Alternative," and also called itself "The Movie Station."
Unusually for an independent station in what, then as now, was a fairly small market, KADN was innovative in creating its own original programming. It gained particular notice for its music programming. Shows such as The Larry Brasso Show (country music), Cypress with Warren Storm (swamp pop) and the long-running Laissez Les Bon Temps Rouler (Cajun French music) were Saturday mainstays during the station's early years. The latter program also aired in reruns aired weekday mornings under the title Bon Temps Rouler Encore. A music video hour aired daily called Acadiana Music Box around the same time MTV was catching on.
Also in the early years, KADN had its own news department, first with five-minute newsbreaks and then its own 5:00 p.m. daily newscast called Acadiana in Review. After just a couple of years, sta
|
https://en.wikipedia.org/wiki/8-bit%20color
|
8-bit color graphics are a method of storing image information in a computer's memory or in an image file, so that each pixel is represented by 8 bits (1 byte). The maximum number of colors that can be displayed at any one time is 256 per RGB channel or 28.
Color quantization
In order to turn a true color 24-bit image into an 8-bit image, the image must go through a process called color quantization. Color quantization is the process of creating a color map for a less color dense image from a more dense image.
The simplest form of quantization is to simply assign 3 bits to red, 3 bits to green and 2 bits to blue, as the human eye is less sensitive to blue light. This creates a so called 3-3-2 8-bit color image, arranged like on the following table:
Bit 7 6 5 4 3 2 1 0
Data R R R G G G B B
This process is sub optimal. There could be different groupings of colors that make evenly spreading the colors out inefficient and likely to misrepresent the actual image.
An alternative approach is to use a palette, with each of the 256 possible indexes pointing towards a larger color space (ex: 256 colors chosen from 4096).
Because the color map doesn't need to have every color in it and just needs to accurately represent the more color dense image, an arbitrary color can be assigned to each of the 256 available color indexes on the map.
Popular approaches for creating these maps (also known as palettes) include the popularity algorithm which chooses the 256 most common colors and creates a map from them. The more accurate median cut algorithm resorts and divides colors to find the median of different color groups resulting in a more accurate final color map.
Usage
Because of the low amount of memory and resultant higher speeds of 8-bit color images, 8-bit color was a common ground among computer graphics development until more memory and higher CPU speeds became readily available to consumers. 8-bit color was used in many different applications including:
The MSX2 series of personal computer
The Uzebox gaming console
The Atari Falcon
The NTSC version of the Atari GTIA
The Tiki 100 personal computer (limited to 16 simultaneous color display)
The Research Machines 380Z computer equipped with a High Resolution Graphics board.
Wearable OS smartwatches with ambient displays
Many scanners use an 8-bit grey scale as their standard
The VGA standard for graphical interface used a redefinable 256 color (8-bit) color palette, although these were selected from a 18-bit (6-bit per RGB channel, 262,144 colors) gamut. Developed in 1987 by IBM, the VGA interface supported a maximum resolution of 640x480 pixels. Due to this legacy, some image types such as GIF and TIFF use an 8-bit color palette system to store data.
Even though it is now outdated for most consumer applications, 8-bit color encoding can still be useful in imaging systems with limited data bandwidth or memory capacity. For example, both Mars Exploration Rovers used an 8-bit g
|
https://en.wikipedia.org/wiki/Master%20of%20Magic%20%281985%20video%20game%29
|
Master of Magic is a role-playing video game for the Commodore 64 and ZX Spectrum home computers. It was distributed by Mastertronic in 1985 under its M.A.D. label.
Description
The player controls an unnamed hero who has been dragged into a strange world by Thelric the Master of Magic while exploring caverns. Thelric is looking for an amulet which will provide him with immortality and, having taught the hero a few spells, sets him on a quest to find this artifact.
Music
The music for the Commodore 64 version was written by Rob Hubbard and is an arrangement of the track Shibolet by Synergy (on the album Audion).
Reception
Zzap!64 were impressed by the game, awarding it a score of 88%. Your Sinclair'''s review of the Spectrum version said that it was "a lot of fun to play".
The game also received reviews in contemporary gaming magazines, such as Sinclair User, Crash, ZX Computing, Computer Gamer and MicroHobby''.
References
External links
Master of Magic soundtrack - performed on Analog Synthesizer
Master of Magic - Solution maps
Master of Magic - further information
Theme music to Master of Magic on YouTube
Role-playing video games
1985 video games
Commodore 64 games
Mastertronic games
ZX Spectrum games
Video games scored by Rob Hubbard
Video games developed in the United Kingdom
|
https://en.wikipedia.org/wiki/Mpls
|
Mpls or MPLS may refer to:
Minneapolis, Minnesota, a city in the United States
Multiprotocol Label Switching, a data-carrying mechanism in computer networking
|
https://en.wikipedia.org/wiki/Obvio%21
|
Obvio! is a Brazilian automobile manufacturer that specializes in the production of microcars. Plans were made to sell their cars in the United States through the ZAP distribution network. The company was wound down for a while with the death of vehicle designer Anísio Campos in 2019.
Details
Obvio! vehicles are described as "high performance urban cars". The Obvio! 828 and the Obvio! 012 are mid-engined models powered by a 1.6 L 16-valve inline 4-cylinder Tritec engine producing . Versions producing or are also available. Fuel consumption is in the city or in highway. These are flexible-fuel vehicles that run on either gasoline, pure ethanol (E100), or any mix thereof. The cars are fitted with a continuously variable transmission (CVT) that can mimic a 6-speed sequential gearbox.
The chassis is designed as a series of ellipses (a system called "Niess Elliptical Survival Rings") to be strong yet light. The cars have one bench seat that seats three, and are fitted with airbags. It has McPherson suspension and disc brakes all around. The internal and external panels of the bodyshell are made in ABS/PMMA plastic. It uses scissor doors and also has a Boblbee backpack space integrated into the design.
The 828 has a list price of US$14,000 and the 012 has a list price of US$28,000. Extras offered are air conditioning (hot/cold), individual seats, power windows/rear mirror/central locking, leather seats and an iMobile Carputer.
The Obvio! 828H is hybrid electric concept car that runs on a flex-fuel engines and was presented in Rio de Janeiro in November 2010.
References
Brazilian brands
Car manufacturers of Brazil
Electric vehicle manufacturers of Brazil
|
https://en.wikipedia.org/wiki/Sangonet
|
SANGONeT is a South African organisation, whose acronym stands for The Southern African NGO Network.
It is a civil society organisation with a focus on ICT, which was founded in 1987, and has a history closely linked to the social and political changes experienced by South Africa during its transition to democracy.
In 2006, SANGONeT launched a new joint venture, called www.sangotech.org whose aim is to "meet and respond to the South African NGO sector's connectivity, hardware and e-business infrastructure * requirements."
Central Case Management System
The Central Case Management System (CCMS) is an open source software that was developed by SANGONeT for the paralegal sector in South Africa. Designed to allow multiple organisations and paralegal offices to access, input and modify a central database of case records, the CCMS is a web-based thin-client application that eliminates the need to install and maintain software at each office.
External links
NGO Pulse Website
Organizations established in 1987
Information technology organisations based in South Africa
|
https://en.wikipedia.org/wiki/Omega%20Virus
|
The Omega Virus is a talking electronic board game released by Milton Bradley in 1992. It involves collecting weapons and room keys to destroy the computer virus which has taken over a space station while either hurting or helping your fellow players.
Creator
Michael Gray designed The Omega Virus board game. He also created the boardgames Mall Madness, and Dream Phone.
Story/plot
It is the year 2051. Earth is now orbited by the great Battlesat1 station which protects earth from meteor impacts and stray comets with a super payload of plasma weapon silos. However, during a routine maintenance operation, something goes horribly wrong, and the station's master computer is infested by microscopic nano-phages that build a singular intelligence (foreign AI) in the computer core. While the humans aboard the station are forced to evacuate as all support systems shut down, the Earth leadership is contacted by the entity known as the Omega Virus, which threatens to turn the Battlesat's plasma weapons upon the planet. A power struggle ensues between four major global powers (the North American Federation, the Euro-National Force, the Oceanic Republic, and the Asiatic Alliance) to send a single techno-combatant to destroy the Virus (and potentially the other techno-combatants) and gain control of the Battlesat station for their government. The Techno combatants depart the Hauser air force base on individual craft, each bound for one of the station's four functioning docking bays where they will battle the Omega Virus – and each other – for control of the space station before the fiendish virus overloads the battle station's master computer and eliminates the techno-warriors.
Gameplay
The Omega Virus consists of a folding game board, an interactive electronic console that holds the game's weapons, probes and access cards; four folding cardboard-and-stand panels with a slot for the player's access cards, and four commandos.
Commandos and probes are the primary pawns of the game. They came in four colors: red, green, blue, and yellow. Each player starts out in the color-sector that matches their commando, each of which has a corresponding docking bay. The probes are placed in a peg in the central console that corresponds to each sector.
Play begins by selecting the number of players and the duration of the game. Each player then enters a secret code which would prove useful in accomplishing the game's objective.
The commando is the only pawn available initially; it moves three adjacent squares to enter a room. Rooms are entered by typing their three digit identifier into the console. Regardless of a player's color, green rooms are the only accessible ones at first.
Game actions are communicated through two voices, one of the besieged Battlesat1 computer and the other of the Virus itself. The computer said phrases like "Help me. We are running out of time." while the Virus mocked the computer and the players. One would inevitably hear "You human scum" o
|
https://en.wikipedia.org/wiki/Alvy%20Ray%20Smith
|
Alvy Ray Smith III (born September 8, 1943) is an American computer scientist who co-founded Lucasfilm's Computer Division and Pixar, participating in the 1980s and 1990s expansion of computer animation into feature film.
Education
In 1965 Alvy Smith received his bachelor's degree in electrical engineering from New Mexico State University (NMSU). He created his first computer graphic in 1965 at NMSU. In 1970 he received a Ph.D. in computer science from Stanford University, with a dissertation on cellular automata theory jointly supervised by Michael A. Arbib, Edward J. McCluskey, and Bernard Widrow.
Career
His first art show was at the Stanford Coffeehouse. From 1969 to 1973 he was an associate professor of Electrical Engineering and Computer Science at New York University, under chairman Herbert Freeman, one of the earliest computer graphics researchers. He taught briefly at the University of California, Berkeley in 1974.
While at Xerox PARC in 1974, Smith worked with Richard Shoup on SuperPaint, one of the first computer raster graphics editor, or 'paint', programs. Smith's major contribution to this software was the creation of the HSV color space, also known as HSB. He created his first computer animations on the SuperPaint system.
In 1975 Smith joined the new Computer Graphics Laboratory at New York Institute of Technology (NYIT), where he was given the job title "Information Quanta". There, working alongside a traditional cel animation studio, he met Ed Catmull and several core personnel of Pixar. Smith worked on a series of newer paint programs, including Paint3, the first true-color raster graphics editor. As part of this work he co-invented the concept of the alpha channel. He was also the programmer and collaborator on Ed Emshwiller's animation Sunstone, included in the collection of the Museum of Modern Art in New York. Smith worked at NYIT until 1979 and then briefly at the Jet Propulsion Laboratory with Jim Blinn on the Carl Sagan Cosmos: A Personal Voyage television series.
Smith was a founding member, with Ed Catmull, of the Lucasfilm Computer Division, which developed computer graphics software including early renderer technology. As director of the Computer Graphics Project, Smith created and directed the "Genesis Demo" in Star Trek II: The Wrath of Khan, and conceived and directed the short animated film The Adventures of André & Wally B., animated by John Lasseter. At some point in the 1980s a designer suggested naming a new digital compositing computer the "Picture Maker". Smith thought that the laser-based device needed a catchier name and came up with "Pixer", which after a meeting was changed to "Pixar".
Smith and Catmull co-founded Pixar in 1986 with financing from Steve Jobs. After the spinout from Lucasfilm of Pixar, he served on the board of directors and was executive vice president. According to Jeffrey Young and William Simon's Jobs biography, iCon, Alvy Ray quit Pixar in 1991 after a heated argument with Job
|
https://en.wikipedia.org/wiki/Mobile%20Telephone%20Service
|
The Mobile Telephone Service (MTS) was a pre-cellular VHF radio system that linked to the Public Switched Telephone Network (PSTN). MTS was the radiotelephone equivalent of land dial phone service.
The Mobile Telephone Service was one of the earliest mobile telephone standards. It was operator assisted in both directions, meaning that if one were called from a land line the call would be routed to a mobile operator, who would route it to one's phone. Similarly, to make an outbound call one had to go through the mobile operator, who would ask for the mobile number and the number to be called, and would then place the call.
This service originated with the Bell System, and was first used in St. Louis, Missouri, United States on June 17, 1946. The original equipment weighed , and there were initially only 3 channels for all the users in the metropolitan area, later more licenses were added bringing the total to 32 channels across 3 bands (see IMTS frequencies). This service was used at least into the 1980s in large portions of North America. On October 2, 1946, Motorola communications equipment carried the first calls on Illinois Bell Telephone Company's new car radiotelephone service in Chicago. Due to the small number of radio frequencies available, the service quickly reached capacity.
MTS was replaced by Improved Mobile Telephone Service (IMTS), introduced in 1964.
Channels
MTS uses 25 VHF radio channels in the United States and Canada. The channels are identified by pairs of letters taken from positions on a North American telephone dial that, when changed to digits, form (for 12-channel mobile sets) 55, 57, 95 and 97.
In the 1960s plan, the VHF high-band allocations provided for 11 channels in the United States: JL, YL, JP, YP, YJ, YK, JS, YS, YR, JK and JR. In Canada, two additional channels were available: JJ and JW.
Frequency problems and elimination of the service
These channels are prone to network congestion and interference since a radio closer to the terminal will sometimes take over the channel due to having a more powerful signal. The service uses technology that has been manufacturer discontinued for more than three decades.
The driver for replacement in most of North America, particularly large cities, was congestion, the inability of the network to carry more than two dozen channels in a geographic area. Cellular service resolved this congestion problem very effectively, especially since cellular frequencies, typically UHF, do not reach as far as VHF frequencies and can therefore be reused. The ability of a cellular system to use signal strength to choose channels and split cells into smaller units also helps expand channel capacity.
The driver for replacement in remote areas, however, is not network congestion, but obsolescence. Because the equipment is no longer manufactured, companies still using the service must struggle to keep their equipment operating, either by cannibalising from retired equipment or improvisin
|
https://en.wikipedia.org/wiki/Image%20moment
|
In image processing, computer vision and related fields, an image moment is a certain particular weighted average (moment) of the image pixels' intensities, or a function of such moments, usually chosen to have some attractive property or interpretation.
Image moments are useful to describe objects after segmentation. Simple properties of the image which are found via image moments include area (or total intensity), its centroid, and information about its orientation.
Raw moments
For a 2D continuous function f(x,y) the moment (sometimes called "raw moment") of order (p + q) is defined as
for p,q = 0,1,2,...
Adapting this to scalar (greyscale) image with pixel intensities I(x,y), raw image moments Mij are calculated by
In some cases, this may be calculated by considering the image as a probability density function, i.e., by dividing the above by
A uniqueness theorem (Hu [1962]) states that if f(x,y)
is piecewise continuous and has nonzero values only in a finite part of the xy
plane, moments of all orders exist, and the moment sequence (Mpq) is uniquely determined by f(x,y). Conversely, (Mpq) uniquely determines f(x,y). In practice, the image is summarized with functions of a few lower order moments.
Examples
Simple image properties derived via raw moments include:
Area (for binary images) or sum of grey level (for greytone images):
Centroid:
Central moments
Central moments are defined as
where and are the components of the centroid.
If ƒ(x, y) is a digital image, then the previous equation becomes
The central moments of order up to 3 are:
It can be shown that:
Central moments are translational invariant.
Examples
Information about image orientation can be derived by first using the second order central moments to construct a covariance matrix.
The covariance matrix of the image is now
.
The eigenvectors of this matrix correspond to the major and minor axes of the image intensity, so the orientation can thus be extracted from the angle of the eigenvector associated with the largest eigenvalue towards the axis closest to this eigenvector. It can be shown that this angle Θ is given by the following formula:
The above formula holds as long as:
The eigenvalues of the covariance matrix can easily be shown to be
and are proportional to the squared length of the eigenvector axes. The relative difference in magnitude of the eigenvalues are thus an indication of the eccentricity of the image, or how elongated it is. The eccentricity is
Moment invariants
Moments are well-known for their application in image analysis, since they can be used to derive invariants with respect to specific transformation classes.
The term invariant moments is often abused in this context. However, while moment invariants are invariants that are formed from moments, the only moments that are invariants themselves are the central moments.
Note that the invariants detailed below are exactly invariant only in the continuous domain. In a discr
|
https://en.wikipedia.org/wiki/KUCW
|
KUCW (channel 30) is a television station licensed to Ogden, Utah, United States, broadcasting the CW network to Salt Lake City and the state of Utah. It is owned and operated by network majority owner Nexstar Media Group alongside ABC affiliate KTVX (channel 4). Both stations share studios on West 1700 South in Salt Lake City, while KUCW's transmitter is located atop Farnsworth Peak in the Oquirrh Mountains.
KUCW has a large network of broadcast translators that extend its over-the-air coverage throughout Utah, as well as portions of Idaho, Nevada, and Wyoming.
History
There are two methods of accounting for the station's history: by license and by "intellectual unit" which is the combination of a station's call letters, programming, network affiliation, and staff. As the result of local marketing agreements struck in 1998, which launched a process that culminated in a station swap in 1999, KUCW's license history differs from its intellectual unit history prior to April 21, 1998.
License history
On May 24, 1983, the FCC granted an original construction permit to build a full-power television station on UHF channel 30 to serve the city of Ogden and the Salt Lake City market. The new station, owned by Ogden Television Inc., originally identified under its application number (830121KH) but took the call letters KOOG-TV in September 1985. It first signed on the air on October 7 and was licensed on January 16, 1986. Originally, the station maintained a general entertainment format airing cartoons, classic movies, drama series and classic sitcoms. In early 1986, the station began airing Home Shopping Network programming during the overnight hours, before expanding the network's programming to the midday hours in mid-1987. By 1988, KOOG was carrying HSN programming eighteen hours a day and general entertainment programming for six hours a day.
Ogden Television Inc. went into receivership in 1993 and the station was sold to the Miracle Rock Church in a deal finalized in March 1994. Ogden Television was programming approximately eight hours of general entertainment programs per day while Miracle Rock Church added about an hour per day of religious programming to the schedule and continued to air HSN approximately fifteen hours a day. On January 11, 1995, KOOG became a charter affiliate of The WB, which initially only carried prime time programming on Wednesday evenings (Sunday primetime shows were added nine months later). The following September, it also added cartoons from Kids' WB. Paxson Communications (now Ion Media Networks), having recently failed to complete an agreement to acquire 50% of KZAR-TV (channel 16, later KUWB and now KUPX-TV) in Provo, agreed to acquire KOOG in 1996 and the station dropped HSN in favor of Paxson's inTV infomercial network. The sale was finalized in June 1997 and the station continued to air programming from The WB. Almost immediately, Paxson began pursuing a television station swap with KZAR, which was at the time
|
https://en.wikipedia.org/wiki/Djezzy
|
Djezzy (Arabic: جازي) is one of Algeria's three main mobile network operators, with a market share of 65% (over 16.49 million subscribers in December 2016) and a network covering 90% of the population (48 wilayas). Djezzy is wholly owned by the Algerian state since 2022, previously was a subsidiary of the Egyptian company Global Telecom Holding (a subsidiary of VEON). Djezzy acquired Algeria's second GSM license on 11 July 2001, with a bid of $737 million, and was officially launched on February 15, 2002.
In January 2015, the National Investment Fund (FNI) took control of 51% of the capital of the company while the foreign partner, Global Telecom Holding, retained responsibility for the management of the company. In August 2022, VEON sold the remaining 45.57% stake in the company to the National Investment Fund for $682 million, making it the sole owner of Djezzy.
Djezzy covers 95% of the population across the national territory and its 3G services are deployed in 48 wilayas. Djezzy launched its 4G services, on October 1, 2016, in 20 wilayas and is committed to covering more than 50% of the population by 2021.
Djezzy is engaged in a process of transformation to become the leading digital operator in Algeria and allow customers to navigate the digital world. The company is headed by Vincenzo Nesci Executive Chairman and Matthieu Galvani, Chief Executive Officer.
Djezzy was part of VEON, an international communications and technology company.
The company provides a wide range of services such as the prepaid, post-paid, data, value-added services and SUT.
It has two competitors: the government-owned Mobilis and the privately owned Ooredoo Algeria.
Logos
References
External links
"Official site"
"Alcatel & Orascom"
"Bloomberg Profile"
Algerian brands
Companies based in Algiers
Telecommunications companies established in 2001
Internet service providers of Algeria
Telecommunications companies of Algeria
Orascom Group
VEON
|
https://en.wikipedia.org/wiki/Jaws%20Wired%20Shut
|
"Jaws Wired Shut" is the ninth episode of the thirteenth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on January 27, 2002. In the episode, Homer's jaw is broken when he collides with a statue of Drederick Tatum. Homer's jaw is wired shut, leaving him unable to speak. At first Marge enjoys Homer's inability to talk, since it makes him a better listener and a more compassionate person. Eventually Marge misses Homer's wild antics. Craving excitement, she enters a demolition derby.
The episode was written by Matt Selman and directed by Nancy Kruse. The plot idea for the episode was pitched by Selman, as was the setpiece, which originated from a discussion he had with current showrunner Al Jean. Comedian John Kassir guest-starred as one of the gay dogs in the pride parade in the episode. In its original broadcast, the episode was seen by approximately 8.7 million viewers, making it the most watched scripted program on Fox that night.
Following its home video release, "Jaws Wired Shut" received mostly positive reviews from critics.
Plot
When the Springfield gay pride parade passes by the Simpsons' house, Santa's Little Helper becomes tempted when three of the gay dogs start flirting with him. Uncomfortable, Homer drags his family to the Springfield Googolplex. After growing impatient at several previews and public service announcements preceding the film, Homer flies into a rampage and demands the movie start. Wielding oversized Kit Kat bars, the ushers chase Homer from the cinema. While Homer is fleeing, his head collides with the fist of a large metal statue of boxer Drederick Tatum.
At Springfield General Hospital, Dr. Hibbert wires Homer's broken jaw shut, leaving him unable to speak or eat solid food. Homer is forced to listen to his family, which pleases them, especially Marge. Since Homer is so well-behaved, Marge risks attending the annual formal event at the country club. When Homer's jaw wires are removed the next day, he and Marge appear on Afternoon Yak to discuss his transformation. With the help of the show's hosts, Marge pleads with Homer to abandon his "reckless ways" and stay well-behaved. Despite the temptation of an upcoming demolition derby, Homer behaves for Marge's sake.
Five weeks later, Marge — bored with the sudden peace and quiet — enters the demolition derby. When Homer wakes and finds Marge gone, he heads to the derby with the kids to stop her. At first Marge enjoys the derby, but things soon get too dangerous for her. Since he has given up recklessness, Homer has no idea how to save her. Bart has an idea: he orders a can of beer from a vendor. After Homer drinks the beer the way Popeye eats spinach for a burst of energy, he rescues Marge. She makes him promise not to make her the live wire of the family.
Production
The episode was written by executive producer Matt Selman and directed by Nancy Kruse. It was first broadcast on the Fox netwo
|
https://en.wikipedia.org/wiki/Terr
|
Terr. or TERR may refer to:
Abbreviation for territory (subdivision)
TIBCO Enterprise Runtime for R, a runtime engine for the R programming language developed by TIBCO Software
short for terrorist, used by white Rhodesians for the insurgents during the Rhodesian Bush War
People with the surname Terr include:
Lenore Terr (born 1936), an American psychiatrist
See also
|
https://en.wikipedia.org/wiki/Space%E2%80%93time%20block%20code
|
Space–time block coding is a technique used in wireless communications to transmit multiple copies of a data stream across a number of antennas and to exploit the various received versions of the data to improve the reliability of data transfer. The fact that the transmitted signal must traverse a potentially difficult environment with scattering, reflection, refraction and so on and may then be further corrupted by thermal noise in the receiver means that some of the received copies of the data may be closer to the original signal than others. This redundancy results in a higher chance of being able to use one or more of the received copies to correctly decode the received signal. In fact, space–time coding combines all the copies of the received signal in an optimal way to extract as much information from each of them as possible.
Introduction
Most work on wireless communications until the early 1990s had focused on having an antenna array at only one end of the wireless link — usually at the receiver. Seminal papers by Gerard J. Foschini and Michael J. Gans, Foschini and Emre Telatar enlarged the scope of wireless communication possibilities by showing that for the highly scattering environment, substantial capacity gains are enabled when antenna arrays are used at both ends of a link.
An alternative approach to utilizing multiple antennas relies on having multiple transmit antennas and only optionally multiple receive antennas. Proposed by Vahid Tarokh, Nambi Seshadri and Robert Calderbank, these space–time codes (STCs) achieve significant error rate improvements over single-antenna systems. Their original scheme was based on trellis codes but the simpler block codes were utilised by Siavash Alamouti, and later Vahid Tarokh, Hamid Jafarkhani and Robert Calderbank to develop space–time block-codes (STBCs). STC involves the transmission of multiple redundant copies of data to compensate for fading and thermal noise in the hope that some of them may arrive at the receiver in a better state than others. In the case of STBC in particular, the data stream to be transmitted is encoded in blocks, which are distributed among spaced antennas and across time. While it is necessary to have multiple transmit antennas, it is not necessary to have multiple receive antennas, although to do so improves performance. This process of receiving diverse copies of the data is known as diversity reception and is what was largely studied until Foschini's 1998 paper.
An STBC is usually represented by a matrix. Each row represents a time slot and each column represents one antenna's transmissions over time.
Here, is the modulated symbol to be transmitted in time slot from antenna . There are to be time slots and transmit antennas as well as receive antennas. This block is usually considered to be of 'length'
The code rate of an STBC measures how many symbols per time slot it transmits on average over the course of one block. If a block encodes symbols, t
|
https://en.wikipedia.org/wiki/WIFN%20%28AM%29
|
WIFN (1340 kHz "ESPN Atlanta 103.7 FM"), is an Atlanta AM radio station. The station is currently broadcasting a sports format, and is a sister station to WCNN "680 The Fan", running programming from ESPN Radio.
History and ownership
The station is co-owned with AM radio stations WCNN AM 680 and WFOM AM 1230. All three stations are owned by Dickey Broadcasting, with studios adjacent to Truist Park in Cobb County. The station previously aired a Spanish language sports/talk format and a gospel music format.
As WALR this station simulcast their former sister station WALR-FM (then known as "Kiss 104.7").
This station was a simulcast of WFOM on two occasions. In earlier years (as WIGO), the station was a black talk-formatted station with studios located on the west side of the city, and well before that (as WAKE), a well-known rock station, with studios at the Georgian Terrace Hotel on Peachtree Street in downtown Atlanta, and previously, initially was WBGE.
Since WCNN acquired Braves radio rights in 2010, WIFN broadcasts all weekday Spring Training games while WCNN broadcasts all weekend games. WIFN is also used as an alternate station for Braves coverage in the event of a conflict.
Facilities and callsign
WIFN's transmitting facility and tower is located in southwest Atlanta near the Atlanta University Center campus. Originally as WBGE then as WAKE (now assigned to a station in Valparaiso, Indiana), it broadcast from the Georgian Terrace Hotel. It was later WIGO (calls now on WIGO AM 1570 locally). "WIFN" was previously on a station in nearby Macon, Georgia, which is now WLXF 105.5 there.
References
External links
RecNet query for WIFN (AM)
FCC History Cards for WIFN
IFN (AM)
Radio stations established in 1947
|
https://en.wikipedia.org/wiki/Differential%20space%E2%80%93time%20code
|
Differential space–time codes are ways of transmitting data in wireless communications. They are forms of space–time code that do not need to know the channel impairments at the receiver in order to be able to decode the signal. They are usually based on space–time block codes, and transmit one block-code from a set in response to a change in the input signal. The differences among the blocks in the set are designed to allow the receiver to extract the data with good reliability. The first differential space-time block code was disclosed by Vahid Tarokh and Hamid Jafarkhani.
References
Encodings
|
https://en.wikipedia.org/wiki/Actrix%20%28computer%29
|
The Actrix computer, released in 1983 by Actrix Computer Corporation, was a Zilog Z80-based transportable personal computer running CP/M-80 V2.2. It was initially released as the Access Computer, made by Access Matrix Computer Corporation (later Actrix Computer Corporation), but both the company and its product changed names after trademark disputes.
Access Computer
Access Computer was the common name for the Access Matrix, a transportable personal computer introduced in 1982 by a United States computer company, Access Matrix Corp (AM CORP on FCC documentation).
Hardware
The Access Computer had dual 5.25-inch floppy drives (either 320k-DS or 168k-SS) a detachable keyboard, a 7" built-in amber CRT monitor, and a built-in 80 CPS Epson MX80 dot matrix printer with GRAFTRAX-80 chipset. It used the CP/M operating system, and also included a Bell-103 300baud modem with both acoustic-coupled and direct connections. Additional connectors for IEEE-488 (external hard disk), composite monitor, RS2-32 serial and Centronics parallel were provided. The mainboard has a 50-pin header designed to support 8-inch disk drives (4 heads on two double-sided disks - drive letters C:/D: and E:/F:)
Software
Access Matrix came bundled with MBASIC, CBASIC, the Perfect-series office software, Personal Pearl database and Fancy Font markup/formatting system. Custom-written software included a disk format/verify/duplication utility (DISKU.COM) that worked with both the internal A:/B: drives as well as optional external 8" disks (C:/D: and E:/F:). A custom-written Telecommunications utility (TELCOMU.COM) offered dialup address book, basic terminal emulation, XMODEM/Modem7 file transfer and other features for connection to BBS and other online systems or to operate as a drone to receive files uploaded from other computers.
Market
Although not truly portable the all-in-one design did allow for quick setup and shut-down. It was rugged and although weighing 15 kg, it was reasonably easy to transport in a car or in an aircraft's coat- locker. The Access Matrix had option of a padded cloth bag with shoulder-strap or a heavier-duty leather/cloth bound protective case with carry handle and shoulder-strap.
Apparently the system was popular with journalists who could use the inbuilt "OFFLINE" type-writer mode to create and print simple ad hoc single-page documents ready for immediate faxing to HQ from their hotel lobby. Another option was to combine the word processing and telecommunications features to create a document using the word processing software and immediately upload the document directly to either an online services such as CompuServe or indeed to another 'waiting' Access Matrix at their head office.
Actrix computer
The rebadged Actrix DS was presented at the Las Vegas Comdex in November 1983. There was another model called the Actrix SS with a 170k 5.25-inch disk drive.
Specifications
Hardware:
NEC D780C-1 (clone of Zilog Z80B) CPU @ 4 MHz
64 KB RAM
Two 320 KB DS-DD
|
https://en.wikipedia.org/wiki/Goertzel%20algorithm
|
The Goertzel algorithm is a technique in digital signal processing (DSP) for efficient evaluation of the individual terms of the discrete Fourier transform (DFT). It is useful in certain practical applications, such as recognition of dual-tone multi-frequency signaling (DTMF) tones produced by the push buttons of the keypad of a traditional analog telephone. The algorithm was first described by Gerald Goertzel in 1958.
Like the DFT, the Goertzel algorithm analyses one selectable frequency component from a discrete signal. Unlike direct DFT calculations, the Goertzel algorithm applies a single real-valued coefficient at each iteration, using real-valued arithmetic for real-valued input sequences. For covering a full spectrum (except when using for continuous stream of data where coefficients are reused for subsequent calculations, which has computational complexity equivalent of sliding DFT), the Goertzel algorithm has a higher order of complexity than fast Fourier transform (FFT) algorithms, but for computing a small number of selected frequency components, it is more numerically efficient. The simple structure of the Goertzel algorithm makes it well suited to small processors and embedded applications.
The Goertzel algorithm can also be used "in reverse" as a sinusoid synthesis function, which requires only 1 multiplication and 1 subtraction per generated sample.
The algorithm
The main calculation in the Goertzel algorithm has the form of a digital filter, and for this reason the algorithm is often called a Goertzel filter. The filter operates on an input sequence in a cascade of two stages with a parameter , giving the frequency to be analysed, normalised to radians per sample.
The first stage calculates an intermediate sequence, :
The second stage applies the following filter to , producing output sequence :
The first filter stage can be observed to be a second-order IIR filter with a direct-form structure. This particular structure has the property that its internal state variables equal the past output values from that stage. Input values for are presumed all equal to 0. To establish the initial filter state so that evaluation can begin at sample , the filter states are assigned initial values . To avoid aliasing hazards, frequency is often restricted to the range 0 to π (see Nyquist–Shannon sampling theorem); using a value outside this range is not meaningless, but is equivalent to using an aliased frequency inside this range, since the exponential function is periodic with a period of 2π in .
The second-stage filter can be observed to be a FIR filter, since its calculations do not use any of its past outputs.
Z-transform methods can be applied to study the properties of the filter cascade. The Z transform of the first filter stage given in equation (1) is
The Z transform of the second filter stage given in equation (2) is
The combined transfer function of the cascade of the two filter stages is then
This can be transfor
|
https://en.wikipedia.org/wiki/WUTB
|
WUTB (channel 24) is a television station in Baltimore, Maryland, United States, airing programming from the digital multicast network TBD. It is owned by Deerfield Media, which maintains a shared services agreement (SSA) with Sinclair Broadcast Group, owner of Fox/MyNetworkTV affiliate WBFF (channel 45), for the provision of certain services. Sinclair also operates CW affiliate WNUV (channel 54) under a separate local marketing agreement (LMA) with Cunningham Broadcasting. However, Sinclair effectively owns WNUV as the majority of Cunningham's stock is owned by the family of deceased group founder Julian Smith. The stations share studios on 41st Street off the Jones Falls Expressway in the Woodberry neighborhood of north Baltimore. Through a channel sharing agreement, WUTB and WBFF transmit using the latter station's spectrum from an antenna adjacent to the studios.
History
Prior history of channel 24 in Baltimore
The channel 24 allocation in Baltimore was originally occupied by WMET-TV, which began broadcasting on March 1, 1967, as the first UHF station in Baltimore and the city's fourth. It was a low-budget and low-powered station that was sister to WOOK-TV/WFAN-TV in Washington, D.C. Both stations were owned by United Broadcasting Company (which is unrelated to the United Television that was owned by Chris-Craft Industries, which later owned channel 24). The original channel 24 was headquartered in the former Avalon Theatre on Park Heights Avenue. In 1972, both stations ceased broadcasting due to financial difficulties.
As WKJL/WHSW
In February 1977, Jesus Lives, Inc., whose president hosted a syndicated talk show of the same name, applied to build a new station on channel 24. The firm promised to use the station "as a tool to spread the Gospel of Jesus Christ". A competing applicant, Buford Television of Maryland, eyed the station for possible use to transmit subscription television. Jesus Lives ended the comparative hearing in December 1980 by buying out Buford Television's bid.
The construction of WKJL-TV went very slowly. The founder, Rev. Philip Zampino, moved to Florida, and the license fight had saddled Jesus Lives with legal fees. By 1982, the station project a late 1984 launch. $75,000 had been raised to purchase and prepare a site in the Randallstown area, of $100,000 needed. However, fundraising continued to lag, and so too did construction activities. Jesus Lives, which renamed itself Look and Live Ministries, accepted a $100,000 loan from Liberty Baptist College, owned by Jerry Falwell, in late 1984 to accelerate the process. Right before going on air, Look and Live agreed to sell the station to Family Media Inc., a subsidiary of Christian publishing company Thomas Nelson.
Family Media completed construction, and on December 24, 1985, channel 24 returned to Baltimore nearly 14 years after it had left, as WKJL-TV. Family Media harbored intentions of possibly expanding with more stations to feature family programming and cons
|
https://en.wikipedia.org/wiki/VTech%20CreatiVision
|
The VTech CreatiVision is a hybrid computer and home video game console introduced by VTech in 1981 and released in 1982 during the second generation of video game consoles. It cost $295 Australian Dollars in Australia. The hybrid unit was similar in concept to computers such as the APF Imagination Machine, the older VideoBrain Family Computer, and to a lesser extent the Intellivision game console and Coleco Adam computer, all of which anticipated the trend of video game consoles becoming more like low-end computers. It was discontinued in 1986.
History
The CreatiVision was distributed in many European countries, including most German-speaking countries like West Germany, Austria and Switzerland and also Italy, South Africa, in Israel under the Educat 2002 name, as well as in Australia and New Zealand under the Dick Smith Wizzard name. Other names for the system (all officially produced by VTech themselves) include the FunVision Computer Video Games System, Hanimex Rameses (both released in Australia and New Zealand) and VZ 2000 (planned for release in France, likely unreleased). All CreatiVision and similar clones were designed for use with PAL standard television sets, except the Japanese CreatiVision (distributed by Cheryco) which was NTSC and is nowadays much sought after by collectors. However, the US release was planned but never sold efficiently.
The CreatiVision console sported an 8-bit Rockwell 6502 CPU at a speed of 2 MHz, 1KB of RAM and 16KB of Video RAM, and had a graphics resolution of 256 × 192 with 16 colors and 32 sprites. The console had two integrated joystick/membrane keypad controllers (much like the ColecoVision and Atari 5200) which, when set in a special compartment on top of the console, could be used as a computer keyboard. The CreatiVision had interfaces for a cassette player, an extra rubber keyboard, parallel I/O interface, floppy disk drive and modem (likely unreleased) and one memory expansion module for use with the Basic language cartridge. Any Centronics-compatible printer could be connected to the I/O module if present.
The CreatiVision was discontinued in late 1985/early 1986.
A computer was produced by VTech in 1984-1986, based on CreatiVision hardware and was compatible with most of its games: Laser 2001, which is also sold in West Germany and was brought to France.
It was also available in Finland through Salora, with the name of Manager. The Manager had a Finnish keyboard layout and character set.
A module allowing to play ColecoVision games was designed for use with the CreatiVision Mark-2 model (a later revision of the 1st model, incorporating hardware changes specifically designed to make the Coleco-module work). Before being produced, the module was modified internally and released for use on the Laser 2001 and Manager computers only. A special adaptor (homebrew) would be needed to make the Coleco-module work on the CreatiVision Mark-2.
List of games
In some regions, the console and its games wer
|
https://en.wikipedia.org/wiki/ITRON%20project
|
The ITRON project is the first of several sub-architectures of the TRON project.
Originally undertaken in 1984, ITRON is a Japanese open standard for a real-time operating system (RTOS) initiated under the guidance of Ken Sakamura. This project aims to standardize the RTOS and related specifications for embedded systems, particularly small-scale embedded systems. The ITRON RTOS is targeted for consumer electronic devices, such as mobile phones and fax machines. Various vendors sell their own implementations of the RTOS.
Details
ITRON, and µITRON (sometimes also spelled uITRON or microITRON) are the name of RTOS specifications coming out of ITRON projects. 'µ' means that the particular specification is meant for the smaller 8-bit or 16-bit CPU targets. Specifications are available for free. Commercial implementations are available, and offered under many different licenses. On 10 November 2017, the Institute of Electrical and Electronics Engineers acquired ownership of the 16- and 32- bit uITRON from TRON Forum.
A few sample sources exist, and there are many commercial source offerings, too.
Examples of open source RTOSes incorporating an API based on µITRON specification are eCos and RTEMS.
ITRON specification is meant for hard real-time embedded RTOS.
It is very popular in the embedded market, as there are many applications for it, i.e., devices with the OS embedded inside.
For example, there is an ACM Queue interview with Jim Ready, founder of MontaVista (realtime linux company), "Interview with Jim Reddy", April 2003, ACM Queue. He says in the interview, "The single, most successful RTOS in Japan historically is µITRON. This is an indigenous open specification led by Dr. Ken Sakamura of the University of Tokyo. It is an industry standard there."
Many Japanese digital cameras, for example, have use ITRON specification OS. Toyota automobile has used ITRON specification OS for engine control.
Supported CPUs are numerous. ARM, MIPS, x86, SH FR-V and many others including CPUs supported by open source RTOS eCos and RTEMS, both of which include the support for µITRON compatible APIs.
ITRON's popularity comes from many factors, but one factor is the notion of "loose standardization": the API specification is at the source level, and does not specify binary API compatibility. This makes it possible for implementers to make use of features of the particular CPU model to which the implementation is targeted. The developer even has the freedom of choosing to pass the parameters using a consolidated packet, or separate parameters to API (system call, library call, etc.). Such freedom is important to make the best use of not so powerful 8-bit or 16-bit CPUs. This makes keeping the binary compatibility among different implementations impossible. This led to the development of T-Kernel in the 2000s in order to promote binary compatibility for middleware distribution.
ITRON specification promotion was done by the various companies which sell the c
|
https://en.wikipedia.org/wiki/Snapshot%20%28computer%20storage%29
|
In computer systems, a snapshot is the state of a system at a particular point in time. The term was coined as an analogy to that in photography.
Rationale
A full backup of a large data set may take a long time to complete. On multi-tasking or multi-user systems, there may be writes to that data while it is being backed up. This prevents the backup from being atomic and introduces a version skew that may result in data corruption. For example, if a user moves a file into a directory that has already been backed up, then that file would be completely missing on the backup media, since the backup operation had already taken place before the addition of the file. Version skew may also cause corruption with files which change their size or contents underfoot while being read.
One approach to safely backing up live data is to temporarily disable write access to data during the backup, either by stopping the accessing applications or by using the locking API provided by the operating system to enforce exclusive read access. This is tolerable for low-availability systems (on desktop computers and small workgroup servers, on which regular downtime is acceptable). High-availability 24/7 systems, however, cannot bear service stoppages.
To avoid downtime, high-availability systems may instead perform the backup on a snapshot—a read-only copy of the data set frozen at a point in time—and allow applications to continue writing to their data. Most snapshot implementations are efficient and can create snapshots in O(1). In other words, the time and I/O needed to create the snapshot does not increase with the size of the data set; by contrast, the time and I/O required for a direct backup is proportional to the size of the data set. In some systems once the initial snapshot is taken of a data set, subsequent snapshots copy the changed data only, and use a system of pointers to reference the initial snapshot. This method of pointer-based snapshots consumes less disk capacity than if the data set was repeatedly cloned.
Implementations
Volume managers
Some Unix systems have snapshot-capable logical volume managers. These implement copy-on-write on entire block devices by copying changed blocksjust before they are to be overwritten within "parent" volumesto other storage, thus preserving a self-consistent past image of the block device. Filesystems on such snapshot images can later be mounted as if they were on a read-only media.
Some volume managers also allow creation of writable snapshots, extending the copy-on-write approach by disassociating any blocks modified within the snapshot from their "parent" blocks in the original volume. Such a scheme could be also described as performing additional copy-on-write operations triggered by the writes to snapshots.
On Linux, Logical Volume Manager (LVM) allows creation of both read-only and read-write snapshots. Writable snapshots were introduced with the LVM version 2 (LVM2).
File systems
Some file systems, s
|
https://en.wikipedia.org/wiki/Daxter%20%28video%20game%29
|
Daxter is a 2006 platform video game developed by Ready at Dawn and published by Sony Computer Entertainment on the PlayStation Portable on March 14, 2006. A spin-off of the Jak and Daxter series, Daxter takes place during the 2-year timeskip occurring during the opening cutscene of Jak II; unlike the other installments of the franchise focusing primarily on Jak, the game focuses on the adventures of his sidekick Daxter while Jak is imprisoned.
As of September 3, 2019, the game has sold 4.2 million copies, and received generally positive reviews from critics.
Gameplay
Players assume the role of Daxter in his role as a bug exterminator, while he is searching for his friend Jak throughout the game's story. Daxter can perform double jumping and ledge grabbing, can crouch to squeeze through narrow gaps, make use of trampolines to reach higher ledges and ride on ziplines, and make use of vehicles to move around the game world's map. Portals and gateways are encountered within the main environment which lead to locations containing missions that players must complete in order to advance the story.
Combat in the game focuses mainly on melee attacks using an electronic blue eco powered bug-swatter, with players able to perform combo attacks on multiple enemies. After the initial missions, the player gains access to an extermination tank which sprays green eco-based bug spray to stun enemies, with it later able to be upgraded with several new functions, including a jet pack to allow Daxter to fly, a flamethrower modification which can improve the effectiveness of the jet pack, and an ultrasonic attachment that shoots blue eco-based high radial damage projectiles. Damage taken from enemies and certain environmental hazards can be recovered by collecting green eco health packs, while the spray tank's supply can be regenerated by absorbing green eco clusters.
Two forms of collectibles can be found during the game, including Golden Bug-Gems, similar to the Metalhead Gems from the second and third installment of the Jak and Daxter series, along with the traditional Precursor Orbs, the latter of which can be used to unlock special features. In addition, players can unlock unique items by breaking picture frames found hidden throughout the game, and with a Jak X game connected to Daxter, can alter the character's goggles and, if the connected save file is 100% complete, a modified Hover Scooter paint scheme.
Plot
The game takes place in the final months of the 2-year gap presented in the opening of Jak II (and the aftermath of The Precursor Legacy), between the moment when Jak is taken prisoner by the Krimzon Guard and the time in which Daxter finally rescues him from the Krimzon Guard Fortress. The introduction shows Jak being captured, while Daxter manages to escape. Almost two years later (having no luck with rescuing Jak), Daxter has forgotten all about finding his friend. An old man named Osmo, whom Daxter meets, hires Daxter as an exterminator working
|
https://en.wikipedia.org/wiki/T%26E
|
T&E may refer to:
T+E (TV channel) - Canadian cable network
European Federation for Transport and Environment
Trial and error
Travel & entertainment
|
https://en.wikipedia.org/wiki/Conquest%20of%20Elysium%20II
|
Conquest of Elysium II ("II" denotes the version 2.0, the first Windows compatible version) is the title of a computer game produced by the Illwinter Game Design. Conquest of Elysium is a fantasy turn-based strategy game. The game can be played with up to eight human players. Single player against computer is possible. The game can run on very old computers and has support for Linux, Windows, Mac OS X and Solaris.
Game goal
The goal of the game is the elimination of other players by either eliminating their commanders or capturing their citadels. In the start the player can choose whether he wants to create a random map or load a scenario. Random maps ask not only the size of the map and the amount of some terrain features but they also require the player the select the so-called society the map will be based on. The societies range from early human settlements to a crumbled central empire. The societies affect how many settlements there will be, what kind of non-player creatures threaten the players and what kind of general shape the map takes. For example, the "Monarchy" setting has independent castles surrounded by farms and minor settlements as a dominant feature.
Characters
Next choice is what character to play. There are seventeen different characters to play. The characters are split into Warlords, Magic users, Priests and Non-humans. The character is in practice the "nation" the player selects. Different characters have different strengths and require vastly different playstyles. Warlords have strong military units and occasionally some special features such as the ability to levy soldiers or construct watchtowers. Magic users gather some unique resource and their strength is in their summoned or constructed creatures. Priests differ greatly from each other but they have either need to capture civilized settlements, either for converts or blood sacrifices, in order to use their powers which are at best quite apocalyptic or they need to gather herbs or fungi and use them for summoning or spiritual attacks.
The game map, made out of separate terrain tiles, is littered with different terrain types and locations such as old battlefields, settlements of varying size, mines and locations which can be used as additional citadels. Some locations have other uses for different player characters. Seasons change and affect the amount of money you get and how some spells work. Winter greatly reduces tax income and herbs and fungi don't grow.
Game play
The game is heavily combat oriented as the control of your nation is basically limited to buying units or changing the tax. Units are recruited centrally and are deployed into special structures called "citadels" which range from castles to wooden watchtowers. Large cities also double as citadels. The units cannot be moved without a commander who can command troops. Troops range from spearmen to siege engines and mythological and imaginary creatures of varying strength.
Combat is handled in a separa
|
https://en.wikipedia.org/wiki/Emacs%20Speaks%20Statistics
|
Emacs Speaks Statistics (ESS) is an Emacs package for programming in statistical languages. It adds two types of modes to emacs:
ESS modes for editing statistical languages like R, SAS and Julia; and
inferior ESS (iESS) modes for interacting with statistical processes like R and SAS.
Modes of types (1) and (2) work seamlessly together. In addition, modes of type (1) provide the capability to submit a batch job for statistical packages like SAS, BUGS or JAGS when an interactive session is unwanted due to the potentially lengthy time required for the task to complete.
With Emacs Speaks Statistics, the user can conveniently edit statistical language commands in one emacs buffer, and execute the code in a second. There are a number of advantages of doing data analysis using Emacs/ESS in this way, rather than interacting with R, S-PLUS or other software directly. First, as indicated above, ESS provides a convenient way of writing and executing code without frequently switching between programs. This also encourages the good practice of keeping a record of one's data analysis, equivalent to working from do-files in Stata. Third, since emacs is also an able editor of LaTeX files, it facilitates the integration of data analysis and written text with Sweave.
External links
ESS is freely available for download from the ESS website, which also contains documentation and links to a mailing list.
Emacs modes
Free R (programming language) software
Free statistical software
|
https://en.wikipedia.org/wiki/E0%20%28cipher%29
|
E0 is a stream cipher used in the Bluetooth protocol. It generates a sequence of pseudorandom numbers and combines it with the data using the XOR operator. The key length may vary, but is generally 128 bits.
Description
At each iteration, E0 generates a bit using four shift registers of differing lengths (25, 31, 33, 39 bits) and two internal states, each 2 bits long. At each clock tick, the registers are shifted and the two states are updated with the current state, the previous state and the values in the shift registers. Four bits are then extracted from the shift registers and added together. The algorithm XORs that sum with the value in the 2-bit register. The first bit of the result is output for the encoding.
E0 is divided in three parts:
Payload key generation
Keystream generation
Encoding
The setup of the initial state in Bluetooth uses the same structure as the random bit stream generator. We are thus dealing with two combined E0 algorithms. An initial 132-bit state is produced at the first stage using four inputs (the 128-bit key, the Bluetooth address on 48 bits and the 26-bit master counter). The output is then processed by a polynomial operation and the resulting key goes through the second stage, which generates the stream used for encoding. The key has a variable length, but is always a multiple of 2 (between 8 and 128 bits). 128 bit keys are generally used. These are stored into the second stage's shift registers. 200 pseudorandom bits are then produced by 200 clock ticks, and the last 128 bits are inserted into the shift registers. It is the stream generator's initial state.
Cryptanalysis
Several attacks and attempts at cryptanalysis of E0 and the Bluetooth protocol have been made, and a number of vulnerabilities have been found.
In 1999, Miia Hermelin and Kaisa Nyberg showed that E0 could be broken in 264 operations (instead of 2128), if 264 bits of output are known. This type of attack was subsequently improved by Kishan Chand Gupta and Palash Sarkar. Scott Fluhrer, a Cisco Systems employee, found a theoretical attack with a 280 operations precalculation and a key search complexity of about 265 operations. He deduced that the maximal security of E0 is equivalent to that provided by 65-bit keys, and that longer keys do not improve security. Fluhrer's attack is an improvement upon earlier work by Golic, Bagini and Morgari, who devised a 270 operations attack on E0.
In 2000, the Finn Juha Vainio showed problems related to misuse of E0 and more generally, possible vulnerabilities in Bluetooth.
In 2004, Yi Lu and Serge Vaudenay published a statistical attack requiring the 24 first bits of 235 Bluetooth frames (a frame is 2745 bits long). The final complexity to retrieve the key is about 240 operations. The attack was improved to 237 operations for precomputation and 239 for the actual key search.
In 2005, Lu, Meier and Vaudenay published a cryptanalysis of E0 based on a conditional correlation attack. Their best resul
|
https://en.wikipedia.org/wiki/Quantum%20programming
|
Quantum programming is the process of designing or assembling sequences of instructions, called quantum circuits, using gates, switches, and operators to manipulate a quantum system for a desired outcome or results of a given experiment. Quantum circuit algorithms can be implemented on integrated circuits, conducted with instrumentation, or written in a programming language for use with a quantum computer or a quantum processor.
With quantum processor based systems, quantum programming languages help express quantum algorithms using high-level constructs. The field is deeply rooted in the open-source philosophy and as a result most of the quantum software discussed in this article is freely available as open-source software.
Quantum computers, such as those based on the KLM protocol, a linear optical quantum computing (LOQC) model, use quantum algorithms (circuits) implemented with electronics, integrated circuits, instrumentation, sensors, and/or by other physical means.
Other circuits designed for experimentation related to quantum systems can be instrumentation and sensor based.
Quantum instruction sets
Quantum instruction sets are used to turn higher level algorithms into physical instructions that can be executed on quantum processors. Sometimes these instructions are specific to a given hardware platform, e.g. ion traps or superconducting qubits.
cQASM
cQASM, also known as common QASM, is a hardware-agnostic quantum assembly language which guarantees the interoperability between all the quantum compilation and simulation tools. It was introduced by the QCA Lab at TUDelft.
Quil
Quil is an instruction set architecture for quantum computing that first introduced a shared quantum/classical memory model. It was introduced by Robert Smith, Michael Curtis, and William Zeng in A Practical Quantum Instruction Set Architecture. Many quantum algorithms (including quantum teleportation, quantum error correction, simulation, and optimization algorithms) require a shared memory architecture.
OpenQASM
OpenQASM is the intermediate representation introduced by IBM for use with Qiskit and the IBM Q Experience.
Blackbird
Blackbird is a quantum instruction set and intermediate representation used by Xanadu Quantum Technologies and Strawberry Fields. It is designed to represent continuous-variable quantum programs that can run on photonic quantum hardware.
Quantum software development kits
Quantum software development kits provide collections of tools to create and manipulate quantum programs. They also provide the means to simulate the quantum programs or prepare them to be run using cloud-based quantum devices and self-hosted quantum devices.
SDKs with access to quantum processors
The following software development kits can be used to run quantum circuits on prototype quantum devices, as well as on simulators.
Perceval
An open-source project created by for designing photonic quantum circuits and developing quantum algorithms, based on
|
https://en.wikipedia.org/wiki/European%20Association%20for%20Theoretical%20Computer%20Science
|
The European Association for Theoretical Computer Science (EATCS) is an international organization with a European focus, founded in 1972. Its aim is to facilitate the exchange of ideas and results among theoretical computer scientists as well as to stimulate cooperation between the theoretical and the practical community in computer science.
The major activities of the EATCS are:
Organization of ICALP, the International Colloquium on Automata, Languages and Programming;
Publication of the Bulletin of the EATCS;
Publication of a series of monographs and texts on theoretical computer science;
Publication of the journal Theoretical Computer Science;
Publication of the journal Fundamenta Informaticae.
EATCS Award
Each year, the EATCS Award is awarded in recognition of a distinguished career in theoretical computer science. The first award was assigned to Richard Karp in 2000; the complete list of the winners is given below:
Presburger Award
Starting in 2010, the European Association of Theoretical Computer Science (EATCS) confers each year at the conference ICALP the Presburger Award to a young scientist (in exceptional cases to several young scientists) for outstanding contributions in theoretical computer science, documented by a published paper or a series of published papers. The award is named after Mojzesz Presburger who accomplished his path-breaking work on decidability of the theory of addition (which today is called Presburger arithmetic) as a student in 1929. The complete list of the winners is given below:
EATCS Fellows
The EATCS Fellows Program has been established by the Association to recognize outstanding EATCS Members for their scientific achievements in the field of Theoretical Computer Science. The Fellow status is conferred by the EATCS Fellows-Selection Committee upon a person having a track record of intellectual and organizational leadership within the EATCS community. Fellows are expected to be “model citizens” of the TCS community, helping to develop the standing of TCS beyond the frontiers of the community.
Texts in Theoretical Computer Science
EATCS Bulletin
The EATCS Bulletin is a newsletter of the EATCS, published online three times annually in February, June, and October respectively. The Bulletin is a medium for rapid publication and wide distribution of material such as:
EATCS matters;
information about the current ICALP;
technical contributions;
columns;
surveys and tutorials;
reports on conferences;
calendar of events;
reports on computer science departments and institutes;
listings of technical reports and publications;
book reviews;
open problems and solutions;
abstracts of PhD Theses;
information on visitors at various institutions; and
entertaining contributions and pictures related to computer science.
Since 2021 its editor-in-chief has been Stefan Schmid (TU Berlin).
EATCS Young Researchers Schools
Beginning in 2014, the European Association for Theoretical Computer Scienc
|
https://en.wikipedia.org/wiki/Connection-oriented%20communication
|
In telecommunications and computer networking, connection-oriented communication is a communication protocol where a communication session or a semi-permanent connection is established before any useful data can be transferred. The established connection ensures that data is delivered in the correct order to the upper communication layer. The alternative is called connectionless communication, such as the datagram mode communication used by Internet Protocol (IP) and User Datagram Protocol, where data may be delivered out of order, since different network packets are routed independently and may be delivered over different paths.
Connection-oriented communication may be implemented with a circuit switched connection, or a packet-mode virtual circuit connection. In the latter case, it may use either a transport layer virtual circuit protocol such as the TCP protocol, allowing data to be delivered in order. Although the lower-layer switching is connectionless, or it may be a data link layer or network layer switching mode, where all data packets belonging to the same traffic stream are delivered over the same path, and traffic flows are identified by some connection identifier reducing the overhead of routing decisions on a packet-by-packet basis for the network.
Connection-oriented protocol services are often, but not always, reliable network services that provide acknowledgment after successful delivery and automatic repeat request functions in case of missing or corrupted data. Asynchronous Transfer Mode, Frame Relay and MPLS are examples of a connection-oriented, unreliable protocol. SMTP is an example of a connection-oriented protocol in which if a message is not delivered, an error report is sent to the sender which makes SMTP a reliable protocol. Because they can keep track of a conversation, connection-oriented protocols are sometimes described as stateful.
Circuit switching
Circuit switched communication, for example the public switched telephone network, ISDN, SONET/SDH and optical mesh networks, are intrinsically connection-oriented communications systems. Circuit-mode communication provides guarantees that constant bandwidth will be available and bit stream or byte stream data will arrive in order with constant delay. The switches are reconfigured during a circuit establishment phase.
Virtual circuit switching
Packet switched communication may also be connection-oriented, which is called virtual circuit mode communication. Due to the packet switching, the communication may suffer from variable bit rate and delay, due to varying traffic load and packet queue lengths. Connection-oriented communication are not necessarily reliable protocols.
Transport layer
Connection-oriented transport layer protocols provide connection-oriented communications over connectionless communications systems. A connection-oriented transport layer protocol, such as TCP, may be based on a connectionless network layer protocol (such as IP), but still achieves
|
https://en.wikipedia.org/wiki/BootSkin
|
BootSkin is a computer program for Microsoft Windows 2000, Windows XP and Windows Vista that allows users to change the screen displayed while the operating system is booting. It is made by Stardock, and distributed for free under the WinCustomize brand.
BootSkin uses a boot-time device driver (vidstub.sys) to access the display directly using VESA BIOS Extensions (VBE), unlike other bootscreen changers which alter the boot screen image inside the kernel. This has the advantage of not modifying system files, and makes higher-resolution boot screens possible; standard boot screens are limited to 640x480 with 16 colors. Some graphics cards and chipsets do not support VBE well, preventing their use with BootSkin.
Due to severe restrictions on color depth, many images are not suitable for use as boot skins. Successful skins tend to take advantage of the limitations through the use of a limited palette and dithering.
Installing BootSkin unattended is simple matter of using the /silent switch, but there does not seem to be any way of applying a skin without actually clicking the apply button in the program
References
External links
BootSkin home page
BootSkin XP section on WinCustomize
BootSkin section on DeviantArt
Windows-only freeware
Stardock software
|
https://en.wikipedia.org/wiki/RDU-FM
|
RDU 98.5FM is a student radio station operating in Christchurch. It broadcasts on a frequency of 98.5 MHz, and is a member of the Student Radio Network of stations.
RDU began in 1976 on 1420kHz. During the period 1977 to 1985 the station was on 1230, 1503 (3XU) and 1422 kHz (3XB). FM broadcasts started in 1986 on 90.5 MHz and moved to 98.3 MHz in 1987 until 2003.
History
Wammo and Spanky became an infamous duo on the RDU Mornings show, most notably coaxing Don Brash into answering inappropriate love letters live on-air, and upsetting listeners by playing distasteful games poking fun at cancer victims. Wammo was scouted by Kiwi FM and was replaced by Kate Gorgeous, who hosted the show for a year till the end of 2007. After much searching for a new host, Spanky has returned to host the show solo under the new show title Breakfast with Spanky.
Many of the shows on RDU have been on air for many years. Girl School, The Mixtape Sessions, The Joint, Guitar Media, Dollar Mix, Hauswerk and Vintage Cuts are all popular long-running shows that are regular each week.
Since late 2006 RDU online streaming has been operating reliably, enabling the station's unique sound to now reach a global audience.
In 2007, the University of Canterbury Students' Association controversially agreed to sub-licence the RDU frequency to a newly formed company, RDU98.5FM Ltd and students against the sale selectively leaked information to the Press stating the station was sold for the price of $1. Actually the station's assets including broadcast equipment and transmitters were sold at market (book) value, a market level rental agreed for the space occupied and an annual licence fee agreed.
Various arrangements were debated over the preceding three years following the previous limited liability company (controlled by minority shareholders) trading insolvently which forced UCSA to inject funds and restructure the organisation.
References
External links
Official RDU website
Student radio stations in New Zealand
University of Canterbury
|
https://en.wikipedia.org/wiki/Swansea%20railway%20station
|
Swansea railway station serves the city of Swansea, Wales. It is measured from London Paddington (via Stroud) on the National Rail network.
In 2021/22 it was the third-busiest station in Wales (after Cardiff Central and Newport).
History
The station opened in 1850. It was built by the South Wales Railway, which amalgamated with the Great Western Railway (GWR) in 1863, but it was not originally on the South Wales Railway main line, planned to connect London with the port of Fishguard, and Swansea passengers had to change at Landore, two miles to the north until at least 1879. The station has been renovated and extended several times in its lifetime - most notably in the 1880s, when the stone-built office block facing High Street, on the west side of the station, was added, and in 1925-7 when the platforms were lengthened. The present-day frontage block, facing Ivey Place, was completed in 1934. Nothing now remains of the original wooden station with its two platforms and galvanised iron roof.
The majority of the rebuilt station remains intact, although the facilities have been reduced. The umbrella-type platform roofing which replaced the 1880s train-sheds in the 1920s is mostly intact although the canopy on platform 4 has been shortened. The number of platforms was reduced from five to four in 1973 under British Rail when the old Platform 1 was eliminated, along with the loading bays and fish dock that once stood beyond it. The remaining platforms were renumbered at the same time, so that what were platforms 2 to 5 are now platforms 1 to 4, respectively. On the east side of the station there was a connecting line which bypassed the platforms and ran at one time to coal tips on the North Dock (closed in 1929 and subsequently infilled) and on to a junction with the high-level line from Eastern Depot to Victoria station (closed in 1965). Part of the route of this line, alongside the station itself, is now a staff car park and the remainder, which was carried on viaducts alongside the Strand, has been obliterated by modern development. High Street goods station was on the west side of the line, just north of the passenger station. The site has been completely cleared and used for housing and also the dedicated bus road that runs from the Landore park-and-ride facility into the city centre. On the opposite side of the line were extensive carriage sidings (Maliphant sidings), large areas of which are, as of 2014, being redeveloped as the Hitachi IEP (Intercity Express Programme) rail service depot.
There was great competition between the different railway companies in the nineteenth and early twentieth centuries. Swansea had seven stations in 1895, owned by five different railway companies: High Street (GWR), St Thomas (Midland Railway), East Dock (GWR), Riverside (Rhondda & Swansea Bay Railway, by which it was called simply Swansea; renamed Swansea Docks by the GWR in 1924 and Riverside two years later), Victoria and Swansea Bay (both Lo
|
https://en.wikipedia.org/wiki/Ordination%20%28statistics%29
|
Ordination or gradient analysis, in multivariate analysis, is a method complementary to data clustering, and used mainly in exploratory data analysis (rather than in hypothesis testing). In contrast to cluster analysis, ordination orders quantities in a (usually lower-dimensional) latent space. In the ordination space, quantities that are near each other share attributes (i.e., are similar to some degree), and dissimilar objects are farther from each other. Such relationships between the objects, on each of several axes or latent variables, are then characterized numerically and/or graphically in a biplot.
The first ordination method, principal components analysis, was suggested by Karl Pearson in 1901.
Methods
Ordination methods can broadly be categorized in eigenvector-, algorithm-, or model-based methods. Many classical ordination techniques, including principal components analysis, correspondence analysis (CA) and its derivatives (detrended correspondence analysis, canonical correspondence analysis, and redundancy analysis, belong to the first group.
The second group includes some distance-based methods such as non-metric multidimensional scaling, and machine learning methods such as T-distributed stochastic neighbor embedding and nonlinear dimensionality reduction.
The third group includes model-based ordination methods, which can be considered as multivariate extensions of Generalized Linear Models. Model-based ordination methods are more flexible in their application than classical ordination methods, so that it is for example possible to include random-effects. Unlike in the aforementioned two groups, there is no (implicit or explicit) distance measure in the ordination. Instead, a distribution needs to be specified for the responses as is typical for statistical models. These and other assumptions, such as the assumed mean-variance relationship, can be validated with the use of residual diagnostics, unlike in other ordination methods.
Applications
Ordination can be used on the analysis of any set of multivariate objects. It is frequently used in several environmental or ecological sciences, particularly plant community ecology. It is also used in genetics and systems biology for microarray data analysis and in psychometrics.
See also
Multivariate statistics
Principal components analysis
Correspondence analysis
Multiple correspondence analysis
Detrended correspondence analysis
Intrinsic dimension
References
Further reading
, 1998. An Annotated Bibliography Of Canonical Correspondence Analysis And Related Constrained Ordination Methods 1986–1996. Botanical Institute, University of Bergen. World Wide Web: http://www.bio.umontreal.ca/Casgrain/cca_bib/index.html
1988 A theory of gradient analysis. Adv. Ecol. Res. 18:271-313.
, Jr. 1982. Multivariate Analysis in Community Ecology. Cambridge University Press, Cambridge.
, 1995. Data Analysis in Community and Landscape Ecology. Cambridge University Press, Cambridge.
, 2015. Me
|
https://en.wikipedia.org/wiki/Nickelodeon%20Magazine
|
Nick Magazine is a defunct American children's magazine inspired by the children's television network Nickelodeon. Its first incarnation appeared in 1990 and was distributed at participating Pizza Hut restaurants; the version of the magazine only saw two issues. The magazine returned in Summer 1993 with all types of content, primarily humor and comics. Originally published on a quarterly basis, it switched to bi-monthly with the February/March 1994 issue. It then went to ten times per year starting in March 1995, with a bi-annual December/January and June/July issue until its end in 2009.
For most of its run, the magazine's editor-in-chief was Laura Galen. She wrote the goodbye message for the 159th and final issue in 2009.
On February 5, 2015, Papercutz announced that they worked a deal with Nickelodeon to create a new version of the magazine. The first issue was released in June 2015, and the final issue was released in 2016.
Format
In spite of being related to the network it was named after, Nickelodeon Magazine covered many sorts of topics, not just what was on the network. The magazine contained informative non-fiction pieces, humor, interviews, comics, pranks and recipes (such as green slime cake). The magazine's mascot was Zelda Van Gutters, a Lakeland Terrier dog who appeared throughout the magazine with sarcastic asides on the articles. She was also the star of the magazine's semi-regular photo comic strip "Ruffing It".
Other contributors included Dan Abdo, John Accurso, Bill Alger, Graham Annable, Ian Baker, Tom Bunk, Martin Cendreda, Greg Cook, Dave Cooper, Jordan Crane, Mark Crilley, Scott Cunningham, Vincent Deporter, Stephen DeStefano, Evan Dorkin, Brent Engstrom, Feggo (Felipe Galindo), Gary Fields, Emily Flake, Ellen Forney, Francho (Arnoldo Franchioni), Dave Fremont, Tom Gauld, Justin Green, Tim Hamilton, Charise Maricle Harper, Paul Karasik, John Kerschbaum, Jacob Lambert, Roger Langridge, Chris Lanier, Robert Leighton, Alec Longstreth, Jason Lutes, Pat Moriarity, Dan Moynihan, Nate Neal, Mark Newgarden, Travis Nichols, Lark Pien, Johnny Ryan, P.Shaw!, Karen Sneider, Israel Sanchez, Jason Shiga, R. Sikoryak, Jen Sorensen, Art Spiegelman, Jay Stephens, Wayno, Todd Webb, Drew Weing, Steve Weissman, Kurt Wolfgang and Gahan Wilson.
In addition, Nick Magazines comic books also featured comics from characters of the network's programming, which normally appeared just before a season premiere or special film event for the property on the actual series. Among the shows featured in the comic book were:
Aaahh!!! Real Monsters
The Adventures of Jimmy Neutron, Boy Genius
The Angry Beavers
As Told by Ginger
Avatar: The Last Airbender
CatDog
Catscratch
ChalkZone
Danny Phantom
El Tigre: The Adventures of Manny Rivera
The Fairly OddParents
Hey Arnold!
Invader Zim
KaBlam!
Mr. Meaty
My Life as a Teenage Robot
Rocket Power
Rugrats (and its spin-off All Grown Up!)
SpongeBob SquarePants
The Mighty B!
The Ren & Stimpy Sho
|
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20Disney%20Channel
|
This article lists past, present and future television programming on American basic cable channel and former premium channel, Disney Channel, since its launch on April 18, 1983.
Current programming
Original
Live-action
Animated
Shorts
Acquired
Animated
Repeats of ended programming
Shorts
Disney Junior
A list of programs currently broadcast on the Disney Junior programming block of Disney Channel.
Upcoming programming
Original
====Animated====
Acquired
Animated
Disney Junior
Former programming
Original
Animated
1 Indicates program premiered episodes on Disney XD.
2 Indicates program only airs reruns on the Disney XD cable channel.
3 Indicates program is a Disney Junior original series.
Comedy
Drama
Reality
Games
Variety
Miniseries and specials
Shorts
Syndicated (Originals/Walt Disney Television/ABC)
Acquired
Animated
Comedy
Drama
Reality
Variety
Disney Junior
Programming blocks
Current
Mickey Mornings (formerly Playhouse Disney and Disney Junior; April 6, 1997 – present) (rebranded on February 14, 2011, and launched as a channel on March 23, 2012, rebranded as Mickey Mornings in 2020)
Commercial Free Weekend Mornings (June 22, 2019 – present)
Calling All the Monsters (October 1, 2021 – present)
Former
Movies
See also
List of Disney Channel original films
ABC Kids
DisneyNow
List of Canadian programs broadcast by Disney Channel
List of programs broadcast by Disney Junior
List of programs broadcast by Disney XD
Notes
References
Disney Channel original programming
Disney Channel
Disney Channel related-lists
|
https://en.wikipedia.org/wiki/Adaptec
|
Adaptec, Inc., was a computer storage company and remains a brand for computer storage products. The company was an independent firm from 1981 to 2010, at which point it was acquired by PMC-Sierra, which itself was later acquired by Microsemi, which itself was later acquired by Microchip Technology.
History
Larry Boucher, Wayne Higashi, and Bernard Nieman founded Adaptec in 1981. At first, Adaptec focused on devices with Parallel SCSI interfaces. Popular host bus adapters included the 154x/15xx ISA family, the 2940 PCI family, and the 29160/-320 family. Their cross-platform ASPI was an early API for accessing and integrating non-disk devices like tape drives, scanners and optical disks. With advancements in technology, RAID functions were added while interfaces evolved to PCIe and SAS.
Adaptec made a number of acquisitions in the mid-1990s to expand their reach in the SCSI peripheral market. In March 1993, they acquired Trantor Systems Ltd. of Fremont, California, for $10 million. In July 1995, they acquired Future Domain Corporation of Irvine, California, for $25 million.
On May 10, 2010, PMC-Sierra, Inc. and Adaptec, Inc. announced they had entered into a definitive agreement of PMC-Sierra acquiring Adaptec's channel storage business on May 8, 2010, which included Adaptec's RAID storage product line, the Adaptec brand, a global value added reseller customer base, board logistics capabilities, and SSD cache performance solutions. The transaction was expected to close in approximately 30 days, subject to customary closing conditions. Following the sale, Adaptec would retain its Aristos ASIC technology business, certain real estate assets, more than 200 patents, and approximately $400 million in cash and marketable securities.
On June 8, 2010, PMC-Sierra and Adaptec announced the completion of the acquisition. PMC-Sierra renamed the channel storage business "Adaptec by PMC". PMC-Sierra was in turn acquired by Microsemi in January 2016.
The old Adaptec, Inc. changed its name to ADPT Corporation, and then again to Steel Excel, Inc. Steel Excel is now an investment firm.
Products
Adaptec produced interface products involving SCSI, USB, IEEE 1394, iSCSI, Fibre Channel, and video. Adaptec once produced CD- and DVD-burning software under the brand names of Easy CD Creator and Toast, as well as network-attached storage devices such as the Snap Server product line.
The Adaptec brand is used to sell host bus adapters, RAID adapters, SAS expander cards, cables, and accessories.
Sources
The New York Times: November 2, 1999 - "Adaptec Looks To Strengthen Data-Storage Line"
References
External links
Funding Universe History of Adaptec
Technology companies established in 1981
Computer storage companies
Companies based in Sunnyvale, California
Electronics companies of the United States
1981 establishments in California
Defunct computer companies of the United States
|
https://en.wikipedia.org/wiki/Domain-specific%20modeling
|
Domain-specific modeling (DSM) is a software engineering methodology for designing and developing systems, such as computer software. It involves systematic use of a domain-specific language to represent the various facets of a system.
Domain-specific modeling languages tend to support higher-level abstractions than general-purpose modeling languages, so they require less effort and fewer low-level details to specify a given system.
Overview
Domain-specific modeling often also includes the idea of code generation: automating the creation of executable source code directly from the domain-specific language models. Being free from the manual creation and maintenance of source code means domain-specific language can significantly improve developer productivity. The reliability of automatic generation compared to manual coding will also reduce the number of defects in the resulting programs thus improving quality.
Domain-specific language differs from earlier code generation attempts in the CASE tools of the 1980s or UML tools of the 1990s. In both of these, the code generators and modeling languages were built by tool vendors. While it is possible for a tool vendor to create a domain-specific language and generators, it is more normal for domain-specific language to occur within one organization. One or a few expert developers creates the modeling language and generators, and the rest of the developers use them.
Having the modeling language and generator built by the organization that will use them allows a tight fit with their exact domain and in response to changes in the domain.
Domain-specific languages can usually cover a range of abstraction levels for a particular domain. For example, a domain-specific modeling language for mobile phones could allow users to specify high-level abstractions for the user interface, as well as lower-level abstractions for storing data such as phone numbers or settings. Likewise, a domain-specific modeling language for financial services could permit users to specify high-level abstractions for clients, as well as lower-level abstractions for implementing stock and bond trading algorithms.
Topics
Defining domain-specific languages
To define a language, one needs a language to write the definition in. The language of a model is often called a metamodel, hence the language for defining a modeling language is a meta-metamodel. Meta-metamodels can be divided into two groups: those that are derived from or customizations of existing languages, and those that have been developed specifically as meta-metamodels.
Derived meta-metamodels include entity–relationship diagrams, formal languages, extended Backus–Naur form (EBNF), ontology languages, XML schema, and Meta-Object Facility (MOF). The strengths of these languages tend to be in the familiarity and standardization of the original language.
The ethos of domain-specific modeling favors the creation of a new language for a specific task, and so there are un
|
https://en.wikipedia.org/wiki/Shriners%20Hospitals%20for%20Children
|
Shriners Children's is a network of non-profit medical facilities across North America. Children with orthopaedic conditions, burns, spinal cord injuries, and cleft lip and palate are eligible for care and receive all services in a family-centered environment, regardless of the patients' ability to pay. Care for children is usually provided until age 18, although in some cases, it may be extended to age 21.
Headquartered in Tampa, Florida, the hospitals are owned and operated by Shriners International, formally known as the Ancient Arabic Order of the Nobles of the Mystic Shrine, a Freemasonry-related organization whose members are known as Shriners. Patients are not required to have any familial affiliation with the Shriners order nor Freemasonry. The current advertising campaign for the healthcare system features the tagline, "Love to the Rescue."
History
In 1920, the Imperial Session of the Shriners was held in Portland, Oregon. During that session the membership unanimously passed a resolution put forward by W. Freeland Kendrick who (while serving as Imperial Potentate) put forth the resolution that created the Shriners Hospitals for Children. The first hospital in the system opened in 1922 in Shreveport, Louisiana. It provided pediatric orthopaedic care.
Shriners Hospitals for Children worked closely with the United States Southern Command and other military commands, including the Army and Air Force, the Guatemalan combined military force and via the U.S. embassy, the U.S. Department of Health & Human Services, and the U.S. State Department to arrange medical visas and transportation to the United States, "with a global commitment to children around the world".
In 1962, the Shriners of North America allocated $10 million to establish three hospitals that specialized in the treatment and rehabilitation of burned children. After visiting 21 university-based medical institutions, the decision was made to build their first pediatric burn hospital on the campus of the University of Texas Medical Branch in Galveston, Texas.
In 1994, the Chronicle of Philanthropy, an industry publication, released the results of the largest study of charitable and non-profit organization popularity and credibility. The study showed that the Shriners Hospitals were ranked as the 9th "most popular charity/non-profit in America" of over 100 charities researched with 40% of Americans over the age of 12 choosing "Love" and "Like A Lot" for the Shriners Hospitals.
In September 2008, the Shriner's Hospital in Galveston sustained significant damage from Hurricane Ike. The hospital was closed for renovation at that time, and care for children with acute burns was provided at other Shriners Hospitals for Children. The Shriners had considered closing facilities in Shreveport, Louisiana; Greenville, South Carolina; Erie, Pennsylvania; Spokane, Washington; Springfield, Massachusetts and Galveston, Texas, eliminating a total of 225 beds. However, in July 2009, the Shri
|
https://en.wikipedia.org/wiki/Shriners%20Hospital%20for%20Children%20%E2%80%93%20Canada
|
The Shriners Hospital for Children – Canada (; also known informally as the Montreal Shriner's Hospital) is the Canadian branch of the Shriners Hospitals for Children network. It is located in Notre-Dame-de-Grâce, Montreal, Quebec, at 1003 Decarie Boulevard. It overlooks downtown Montreal, and is close to Royal Victoria Hospital of the McGill University Health Centre (MUHC) hospital network, with which it is associated but not fully affiliated.
The hospital was previously located at 1529 Cedar Avenue, which had outgrown its facilities, and since it was surrounded by Mount Royal Park, it could not expand in that location before being moved to the new location in 2015.
The Shriner's Hospital for Children, along with McGill University was named number 1 in the world in expertise in Osteogenesis Imperfecta (OI) with researchers Frank Rauch ranked #1 and Francis H. Glorieux #3 in global expertise in Osteogenesis Imperfecta (OI).
History
Political uncertainty prior to relocation
Following years of wrangling within the Shriners and in Quebec, a general vote of the Shriners would decide the future of the Canadian hospital. Originally slated to move to the new MUHC superhospital site, the project had been delayed more than a decade before finally being moved in 2015. However the delay proved decisive in the new Shriners president wanting the hospital to move out of Montreal. With the push for an alternate site, Ottawa and London, Ontario both pushed for the new facility. The Ottawa Children's Hospital of Eastern Ontario hospital supported Montreal first, but if it were to move, it wanted it in Ottawa. An Ottawa location would not greatly affect access to those in the US Northeast, or eastern Canada, only being about 200 km from Montreal. The president of the Shriners brought up the potential threat of Quebec separation to influence the move out of the province. The search committee found that it was preferable to move to London, Ontario. However, the Shriners of Ottawa, Quebec, eastern Canada, and northeast USA oppose this decision. A vote to decide was held by the Shriners members at the meeting in Baltimore on July 5, 2005. Of a total of 1214 votes, 608 voted in favour of staying in Montreal, 605 of moving to London and one vote was refused. London Shriners withdrew their resolution on April 12, 2006.
Two years following, unsatisfied with the prior decision, the London Shriners decided to invoke a last minute resolution to move the hospital once again, based on the fact the Quebec government still continued to delay the project or fully decontaminate the land where the hospital is to be built. The issue was decided with another vote that was held on July 3, 2007. Once again the vote swung in favour of staying in Montreal, with 75% of members voting against the move. Despite the decision, construction was still delayed and only 90% of the land had been decontaminated. As of 2010, construction of the new super hospital was still delayed, and with it
|
https://en.wikipedia.org/wiki/Functional%20data%20analysis
|
Functional data analysis (FDA) is a branch of statistics that analyses data providing information about curves, surfaces or anything else varying over a continuum. In its most general form, under an FDA framework, each sample element of functional data is considered to be a random function. The physical continuum over which these functions are defined is often time, but may also be spatial location, wavelength, probability, etc. Intrinsically, functional data are infinite dimensional. The high intrinsic dimensionality of these data brings challenges for theory as well as computation, where these challenges vary with how the functional data were sampled. However, the high or infinite dimensional structure of the data is a rich source of information and there are many interesting challenges for research and data analysis.
History
Functional data analysis has roots going back to work by Grenander and Karhunen in the 1940s and 1950s. They considered the decomposition of square-integrable continuous time stochastic process into eigencomponents, now known as the Karhunen-Loève decomposition. A rigorous analysis of functional principal components analysis was done in the 1970s by Kleffe, Dauxois and Pousse including results about the asymptotic distribution of the eigenvalues. More recently in the 1990s and 2000s the field has focused more on applications and understanding the effects of dense and sparse observations schemes. The term "Functional Data Analysis" was coined by James O. Ramsay.
Mathematical formalism
Random functions can be viewed as random elements taking values in a Hilbert space, or as a stochastic process. The former is mathematically convenient, whereas the latter is somewhat more suitable from an applied perspective. These two approaches coincide if the random functions are continuous and a condition called mean-squared continuity is satisfied.
Hilbertian random variables
In the Hilbert space viewpoint, one considers an -valued random element , where is a separable Hilbert space such as the space of square-integrable functions . Under the integrability condition that , one can define the mean of as the unique element satisfying
This formulation is the Pettis integral but the mean can also be defined as Bochner integral . Under the integrability condition that is finite, the covariance operator of is a linear operator that is uniquely defined by the relation
or, in tensor form, . The spectral theorem allows to decompose as the Karhunen-Loève decomposition
where are eigenvectors of , corresponding to the nonnegative eigenvalues of , in a non-increasing order. Truncating this infinite series to a finite order underpins functional principal component analysis.
Stochastic processes
The Hilbertian point of view is mathematically convenient, but abstract; the above considerations do not necessarily even view as a function at all, since common choices of like and Sobolev spaces consist of equivalence classes, no
|
https://en.wikipedia.org/wiki/KTNQ
|
KTNQ (1020 AM) is a radio station licensed to Los Angeles, California, with a Spanish talk format. It is owned by Latino Media Network; under a local marketing agreement, it is programmed by former owner TelevisaUnivision's Uforia Audio Network. From its original licensing on March 13, 1925 until 1955 it was called KFVD. The station has studios on the Univision Broadcast Center building located on 5999 Center Drive (near I-405) in West Los Angeles, and the transmitter is located in the City of Industry. The station was originally restricted in its broadcast hours, signing off at local sunset to protect 1020 KDKA Pittsburgh from nighttime sky wave interference. Later, the FCC allowed geographically spread daytime stations to operate at night with a directional pattern away from the previously protected station. 1020 kHz in Los Angeles was then allowed to operate as a 24 hour station.
History
KFVD
J. Frank Burke was a "news-analyst, commentator, noted for his American progressiveness, tolerance, and liberalism", and owner and operator of both KFVD and KPAS. The FCC later gave notice to dispose of one of the stations.
From 1937 to 1939, Woody Guthrie broadcast regular shows from KFVD, then run by Frank Burke Sr. and his son Frank Burke First he accompanied his Cousin Leon "Oklahoma Jack" Guthrie, later with Maxine "Lefty Lou" Chrissman. The Woody and Lefty Lou-Show soon became the most popular on the station. When Chrissman resigned due to health reasons, Guthrie continued for another year as The Lone Wolf until he was sacked for his unrelenting support for the Soviet Union even after they invaded Poland.
KPOP & KGBS
From August 1, 1955 until 1960, it was called KPOP.
From June 29, 1960 until 1976, it was called KGBS.
KTNQ
On December 26, 1976, the station's call sign was changed to the current KTNQ, originally billed as "The New Ten Q." KTNQ would later change languages to Spanish at noon on July 31, 1979.
During the late 1970s along with competitor stations such as KHJ (AM) and San Diego-based XETRA-AM ("The Mighty 690"), the station specialized in Top 40 music, and was broadcast in English. The radio station figures prominently in the Ron Howard film Grand Theft Auto. where disc jockey "The Real" Don Steele is doing a live broadcast from a helicopter with the station's call sign following two star-crossed lovers.
Talk programming
KTNQ was a part of the Univision America Talk Radio network as of July 4, 2012. While the network itself ceased operations in 2015, KTNQ aired the remnants of Univision America's programming as well as local news, weather, and sports.
KTNQ has been the Spanish language flagship station of the Los Angeles Dodgers since 2011. It also broadcast Dodger games from 1979 to 1986.
Sports programming
On December 20, 2016, Univision announced that KTNQ would be one of the charter affiliates of Univision Deportes Radio, their new Spanish-language sports network launched in April 2017. It continued to broadcast the netw
|
https://en.wikipedia.org/wiki/Peter%20Bauer%20%28computer%20specialist%29
|
Peter Bauer (born October 29, 1957) is an author and computer graphics professional. He served as the Help Desk Director for KelbyOne (formerly the National Association of Photoshop Professionals)from 1999 to 2020. He is the author of "Photoshop for Dummies," as well as a number of other books on Adobe Photoshop, Adobe Illustrator, digital photography, and computer graphics. He also contributes to a number of graphics-related magazines and Internet sites. He received the Photoshop Pioneer award in September 2005 and was inducted into the Photoshop Hall of Fame in September 2010.
Bauer is a member of the Professional Photographers of America and his photography has won numerous awards, both nationally and internationally. He taught Photoshop in the University of Notre Dame's Department of Art, Art History and Design.
Bauer is a native of Detroit, Michigan and a graduate of the University of Detroit Jesuit High School and Regents College of the University of the State of New York (now Excelsior University). He served 11 years (1986–1997) in the United States Army as a military intelligence interrogator, including combat duty during the Gulf War (1991). Subsequent to his military service, he authored the "Statement on Interrogation Practices" for members of the United States Senate and House Committees on the Armed Forces (July 2006), which was signed by over 20 former military interrogators.
Bauer met and married his wife, Mary Ellen O'Connell while serving with the U.S. Army in Garmisch-Partenkirchen, Germany in 1996. O'Connell holds an endowed chair at the University of Notre Dame Law School.
References
1957 births
Living people
American photographers
University of Detroit Jesuit High School and Academy alumni
USNY Regents College alumni
Artists from Detroit
United States Army soldiers
|
https://en.wikipedia.org/wiki/Star%20Force
|
also released in arcades outside of Japan as Mega Force, is a vertical-scrolling shooter computer game released in 1984 by Tehkan.
Gameplay
In the game, the player pilots a starship called the Final Star, while shooting various enemies and destroying enemy structures for points.
Unlike later vertical scrolling shooters, like Toaplan's Twin Cobra, the Final Star had only two levels of weapon power and no secondary weapons like missiles and/or bombs. Each stage in the game was named after a letter of the Greek alphabet. In certain versions of the game, there is an additional level called "Infinity" (represented by the infinity symbol) which occurs after Omega, after which the game repeats indefinitely.
In the NES version, after defeating the Omega target, the player can see a black screen with Tecmo's logo, announcing the future release of the sequel Super Star Force. After that, the infinity target becomes available and the game repeats the same level and boss without increasing the difficulty.
Reception
In Japan, Game Machine listed Star Force on its December 1, 1984, issue as the fourteenth most-successful table arcade unit at the time.
Legacy
Sequels
Super Star Force: Jikūreki no Himitsu, released in 1986 for the Japanese Nintendo Famicom.
Final Star Force, released for arcades in 1992.
Ports and related releases
Star Force was ported and published in 1985 by Hudson Soft to both the MSX home computer and the Family Computer (Famicom) in Japan. Sales of the game were promoted through the first nationwide video game competition to be called "a caravan", although it was not the first event of its kind organized by Hudson (they had previously promoted Lode Runner with a similar event).
The North American and European versions for the Nintendo Entertainment System (NES) were published two years later, in 1987, with significant revisions, and with Tecmo credited rather than Hudson on the title screen and box art. Although the NES version is immediately recognizable as having a great deal in common with the Hudson version released in Japan, there are significant alterations to the graphics, music, and controls and gameplay. Several bugs in gameplay were fixed (debatably making the NES version more difficult) that allow the player (in the Japanese version) to prevent new enemies from appearing ("spawning") by not shooting the enemies already on screen.
Star Force was also ported to the SG-1000 by Sega, X68000 by Dempa Shimbunsha and mobile phones by Tecmo.
In 1995, along with two other NES shooters, the Famicom version of Star Force was remade by Hudson Soft with minimal upgrades for the Super Famicom as part of the Japan-only release of the Caravan Shooting Collection. The same version was also included in Hudson's compilation of NES shooters in 2006 in Hudson Best Collection Vol. 5.
The original arcade version was later added to the compilation titled Tecmo Classic Arcade, which was released for the Xbox. In 2009, the arcade version
|
https://en.wikipedia.org/wiki/Window%20on%20the%20World
|
Window on the World is an American variety show which aired on the now-defunct DuMont Television Network. The program aired from January 27, 1949, to April 14, 1949. Each episode was 30 minutes long.
Overview
Each episode featured performers from various countries, with film clips of exotic locales. Merle Kendrick conducted the orchestra. Other featured performers included comedian Gil Lamb and actress Irene Manning. The program, produced and distributed by DuMont, aired Thursday nights at 9 pm Eastern Time on most DuMont affiliates.
Episode status
The UCLA Film and Television Archive holds one episode from March 25, 1949.
See also
List of programs broadcast by the DuMont Television Network
List of surviving DuMont Television Network broadcasts
References
Bibliography
David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004)
Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980)
Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964)
External links
DuMont historical website
1949 American television series debuts
1949 American television series endings
1940s American variety television series
Black-and-white American television shows
DuMont Television Network original programming
English-language television shows
|
https://en.wikipedia.org/wiki/Recommended%20Records
|
Recommended Records (RēR) is a British independent record label and distribution network founded by Chris Cutler with Nick Hobbs in March 1978. RēR features largely "Rock in Opposition" and related music, but it also distributes selected music released on other independent labels.
In 1982 Cutler established November Books, the publishing wing of Recommended Records, and between 1985 and 1997, Recommended Records and November Books published RēR Quarterly, a "quarterly" sound-magazine edited by Cutler.
In 1989 Recommended Records became known as RēR Megacorp with a turnover of £180,000 in 1994.
History
When English avant-rock group Henry Cow toured Europe between 1975 and 1977 they encountered many bands in a similar situation to their own: they were forced to operate outside the music industry that refused to recognise their music. In 1978 these groups got together and formed Rock in Opposition (RIO). To provide a record label and distribution network for these artists, Chris Cutler of Henry Cow and Nick Hobbs, Henry Cow's manager at the time, established Recommended Records (RēR) as a model for a non-profit music company. When RIO folded as an organisation in late 1979, RēR continued RIO's work by representing and promoting marginalised musicians and groups. RēR became a "virtual RIO", and "part of the continuing legacy of RIO".
Recommended Records grew from "Ré", a private record label in 1978 to "RēR Megacorp" in 1989, an internationally recognised independent record company with distributors worldwide. They have consistently introduced new and interesting artists from around the world, many of whom might never have been able to release records. They have always put the artist first and commercial viability second.
Evolution of the name
When Henry Cow split up in 1978, Chris Cutler created a record label called Ré for his own projects with a distribution arm called Recommended Distribution, so called because he personally "recommended" the titles they distributed. The intention was to import and distribute new, interesting and experimental music from all over the world to the United Kingdom.
In 1979, Cutler established the Recommended label for releases other than his own. In 1987, he combined the Ré and Recommended labels to form RēR, and at the same time Recommended Distribution became a worker's cooperative enabling Cutler to concentrate on running the RéR label and writing RēR's mail order catalogue. This arrangement worked for a few years, but in 1989, due to enormous unpaid debts from Recommended Distribution, Cutler was forced to restart his own distribution system again, and RēR became RēR/Recommended. Recommended Distribution went on to become These Records, an affiliated label. RēR/Recommended became known as RēR Megacorp with a website and online shopping facilities.
RēR logos
Just as Recommended Records's name evolved over the years, so did its logo. Here are examples from 1979 and 1998:
Imprints
Recommended Records has the
|
https://en.wikipedia.org/wiki/Precision%20Time%20Protocol
|
The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a local area network, it achieves clock accuracy in the sub-microsecond range, making it suitable for measurement and control systems. PTP is employed to synchronize financial transactions, mobile phone tower transmissions, sub-sea acoustic arrays, and networks that require precise timing but lack access to satellite navigation signals.
The first version of PTP, IEEE 1588-2002, was published in 2002. IEEE 1588-2008, also known as PTP Version 2 is not backward compatible with the 2002 version. IEEE 1588-2019 was published in November 2019 and includes backward-compatible improvements to the 2008 publication. IEEE 1588-2008 includes a profile concept defining PTP operating parameters and options. Several profiles have been defined for applications including telecommunications, electric power distribution and audiovisual. is an adaptation of PTP for use with Audio Video Bridging and Time-Sensitive Networking.
History
According to John Eidson, who led the IEEE 1588-2002 standardization effort, "IEEE 1588 is designed to fill a niche not well served by either of the two dominant protocols, NTP and GPS. IEEE 1588 is designed for local systems requiring accuracies beyond those attainable using NTP. It is also designed for applications that cannot bear the cost of a GPS receiver at each node, or for which GPS signals are inaccessible."
PTP was originally defined in the IEEE 1588-2002 standard, officially entitled Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems, and published in 2002. In 2008, IEEE 1588-2008 was released as a revised standard; also known as PTP version 2 (PTPv2), it improves accuracy, precision and robustness but is not backward compatible with the original 2002 version. IEEE 1588-2019 was published in November 2019, is informally known as PTPv2.1 and includes backwards-compatible improvements to the 2008 publication.
Architecture
The IEEE 1588 standards describe a hierarchical master–slave architecture for clock distribution. Under this architecture, a time distribution system consists of one or more communication media (network segments), and one or more clocks. An ordinary clock is a device with a single network connection and is either the source of (master or leader) or destination for (slave or follower) a synchronization reference. A boundary clock has multiple network connections and can accurately synchronize one network segment to another. A synchronization master is selected for each of the network segments in the system. The root timing reference is called the grandmaster. The grandmaster transmits synchronization information to the clocks residing on its network segment. The boundary clocks with a presence on that segment then relay accurate time to the other segments to which they are also connected.
A simplified PTP system frequently consists of ordinary cloc
|
https://en.wikipedia.org/wiki/CFRE-DT
|
CFRE-DT (channel 11) is a television station in Regina, Saskatchewan, Canada, part of the Global Television Network. The station is owned and operated by network parent Corus Entertainment, and maintains studios on Hoffer Drive and McDonald Street on the northeast side of Regina; its transmitter is located near Louis Riel Trail/Highway 11, northwest of the city.
History
The Communications Tower (associated with the local early broadcasts in 1987) is the tallest structure in Saskatchewan at over with lights and top antenna. The Tower was constructed by Towerectors, a company that specialized in constructing Communications Towers. Towerectors was owned and operated by Gerhard F. Hein and George Anderson.
The station first signed on the air on September 6, 1987, under the ownership of Canwest. CFRE and its sister station in Saskatoon, CFSK, were branded as "STV", and became part of the CanWest Global System in 1990 until the Global Television Network brand was expanded to all of Canwest's stations in 1997.
News operation
CFRE-DT presently broadcasts 24½ hours of local newscasts each week (with 4½ hours each weekday and one hour each on Saturdays and Sundays). The station also airs the public affairs program Focus Saskatchewan.
On May 31, 2011, Shaw Media announced that a new local weekday morning newscast would begin broadcasting on CFRE in late-August 2011. The morning newscast runs for three hours from 6 to 9 a.m. On August 11, 2011, it was announced that Heather Anderson would anchor the program.
In late 2011, CFRE-DT became the first television station in the Regina market to begin broadcasting its local newscasts in high definition. On August 20, 2012, CFRE expanded its half-hour 10 p.m. newscast to one hour, and changed the name of the program from Prime News to News Hour Final (it has since been renamed Global News at 10); the addition of the morning newscast and the expansion of the prime time newscast was part of an expansion of local news programming on Global owned-and-operated stations across Canada as part of a benefits package that was included as a condition of the sale of the Global Television Network to Shaw Communications.
Starting in August 2015, Global News at 10 and all weekend news programming was being produced out of Toronto; anchors were provided by the centralized news operation, but the broadcasts continued to feature local reporting. However, local news anchors have since returned to the weekday broadcast on Global News at 10. The program is hosted by Global Regina anchors Carlyle Fiset and Elise Darwish, who also produce the newscasts at 6 and 10 for Global Saskatoon. Although the newscasts are anchored from Regina, Global Regina no longer has a permanent evening weather specialist. Instead, meteorologist Peter Quinlan from Global Saskatoon anchors Global Regina's weather reports. Weekend newscasts are still produced in Toronto and anchored by Mark Carcasole.
Technical information
Subchannel
Analogue-to-digita
|
https://en.wikipedia.org/wiki/CFSK-DT
|
CFSK-DT (channel 4) is a television station in Saskatoon, Saskatchewan, Canada, part of the Global Television Network. Owned and operated by network parent Corus Entertainment, the station has studios on Robin Crescent on the northwest side of Saskatoon (near the Saskatoon John G. Diefenbaker International Airport), and its transmitter is located on Agra and Settlers Ridge Roads (near Highway 41), northeast of the city.
History
The station first signed on the air on September 6, 1987, under the ownership of Canwest. CFSK and its sister station in Regina, CFRE-TV, were initially branded as "STV" (short for "Saskatchewan Television"). It joined the Canwest Global System in 1990. At the time that STV went on the air, it was Saskatoon's third locally based over-the-air television station, joining a market that included CTV's CFQC and the then-operational CBC affiliate, CBKST. However, technically it was Saskatoon's second fully licensed station; CBKST was licensed as a rebroadcaster of Regina's CBKT.
Canwest discontinued the STV branding, along with all other individual local station brandings in 1997, when the Global Television Network brand was expanded to all of Canwest's stations. One of STV's major broadcasts in its early years was the children's program Size Small Island (that show was originally broadcast on sister station CKND-TV in Winnipeg), which was syndicated around the world (the show's host, Helen Lumby, officially launched the mini-network's first broadcast in Saskatoon in 1987). Since the closure of CBKST in 2012, CFSK is one of only two over-the-air broadcast stations originating from Saskatoon.
News operation
CFSK-DT presently broadcasts hours of locally produced newscasts each week (with hours each weekday and one hour each on Saturdays and Sundays); it is among the few Global stations (and one of the few television stations in Canada) to carry a prime time newscast during the 10 p.m. hour.
On December 5, 2011, CFSK-DT debuted a three-hour newscast on weekday mornings (under Global's Morning News brand), which runs from 6 to 9 a.m. Around the same time, CFSK became the first television station in Saskatoon to begin broadcasting its local newscasts in high definition.
On August 20, 2012, CFSK expanded its half-hour 10 p.m. newscast to one hour, which was retitled from Prime News to News Hour Final; the addition of the morning newscast and the expansion of the prime time newscast is part of an expansion of local news programming on Global owned-and-operated stations across Canada as part of a benefits package that was included as a condition of the sale of the Global Television Network to Shaw Communications.
As of September 2023, Global Saskatoon's only newscast presented from its studios is Global News Morning from 6 to 9 a.m.
Global News at 5, Global News at 6 and Global News at 10 are presented by Lisa Dutton from the Global Winnipeg studios. The 5 p.m. newscast is a province-wide show (also seen on Global Regina), w
|
https://en.wikipedia.org/wiki/African%20Movement%20of%20Working%20Children%20and%20Youth
|
The African Movement of Working Children and Youth (AMWCY), or (Maejt) in french, is a network of associations of working children from 20 African countries. The purpose of this child-led organization is to protect working minors through the establishment of local benefit societies, awareness campaigns to influence public opinion, and negotiations with political authorities. The movement has a bulletin entitled Lettre de la rue and in 1999 it published the book ("Voice of the children of Africa"), which has been translated into several languages.
The movement was formally created in July 1994 in Bouaké (Côte d'Ivoire), where the first international meeting was held. At the Bouaké meeting, the movement's "vision" and a list of 12 priority rights for working children were outlined:
Vision: All African children must be born and grow in good condition, and enjoy their full rights to thrive, while at the same time helping their communities to develop harmoniously in peace and in a favorable environment.
Priority rights:
The right to be respected
The right to be taught a trade
The right to stay in the village (not to migrate)
The right to work in a safe environment
The right to light and limited work
The right to rest when sick
The right to be listened to
The right to healthcare
The right to learn to read and to write
The right to play
The right to self-expression and to form organizations
The right to equitable legal aid, in case of difficulty.
AMWCY has gained the support of ECOWAS, Save the Children, Plan, ILO and UNESCO and it has branches in 21 countries, including Angola, Benin, Burkina Faso, Burundi, Cameroon, Chad, Côte d'Ivoire, Democratic Republic of Congo, Ethiopia, Gambia, Guinea, Guinea Bissau, Madagascar, Mali, Mauritania, Niger, Nigeria, Rwanda, Senegal, Togo and Zimbabwe.
The AMWCY has also established relationships with similar organizations in other parts of the world (for example India and South America) and AMWCY delegates have been invited to several international meetings about minors and their rights, such as the 1996 Unicef convention on minor labour in Africa and the 2002 special UN session on infancy.
See also
Child sexual abuse
Child labour
References
VVAA. Voix des enfants d'Afrique
External links
MAEJT
Child labour-related organizations
Child-related organisations in Senegal
|
https://en.wikipedia.org/wiki/Richard%20Fateman
|
Richard J Fateman (born November 4, 1946) is a professor emeritus of computer science at the University of California, Berkeley.
He received a BS in Physics and Mathematics from Union College in June, 1966, and a Ph.D. in Applied Mathematics from Harvard University in June, 1971. He was a major contributor to the Macsyma computer algebra system at MIT and later to the Franz Lisp system. His current interests include scientific programming environments; computer algebra systems; distributed computing; analysis of algorithms; programming and measurement of large systems; design and implementation of programming languages; and optical character recognition. In 1999, he was inducted as a Fellow of the Association for Computing Machinery.
Richard Fateman is the father of musician Johanna Fateman.
References
External links
Home page.
Living people
Union College (New York) alumni
Harvard University alumni
UC Berkeley College of Engineering faculty
Fellows of the Association for Computing Machinery
Programming language researchers
1946 births
Lisp (programming language) people
Amateur radio people
|
https://en.wikipedia.org/wiki/Survivor%20Corps
|
Survivor Corps, formerly known as the Landmine Survivors Network, was a global network of survivors helping survivors to recover from war, rebuild their communities, and break cycles of violence. The organization currently operated programs in Albania, Armenia, Azerbaijan, Bosnia-Herzegovina, Burundi, Colombia, Croatia, El Salvador, Ethiopia, Georgia, Jordan, Kosovo, Macedonia, Montenegro, Serbia, Uganda, Rwanda, the United States and Vietnam.
Survivor Corps was a proponent of the peer support method, in which survivors are linked to one another to share information as well as emotional and practical support, and work together on issues affecting their lives. The Survivor Corps peer support program connected survivors with survivor role models to offer encouragement and motivation.
Survivor Corps also brought conflict survivors together to promote reconciliation and rebuilding through community service projects and local activism.
In May 2008, Survivor Corps emerged from Landmine Survivors Network. The name change reflects the expansion of the organization's mission to include all types of survivors of global conflict and war, including United States service members and veterans returning from the wars in Iraq and Afghanistan.
The organization closed in 2010.
Nobel Prize and international leadership
Survivor Corps has long played a leading role the International Campaign to Ban Landmines coalition (ICBL), which has over 1100 member organizations and whose goal is to abolish the production and use of anti-personnel landmines. Survivor Corps co-founders Jerry White and Ken Rutherford helped lead the coalition's efforts that secured the 1997 Mine Ban Treaty, which in turn earned the coalition the Nobel Peace Prize. Prominent Survivor Corps supporters have included Queen Noor of Jordan and Diana, Princess of Wales.
The Mine Ban Treaty bans the use, stockpiling, production and trade of antipersonnel mines. It was also the first arms control agreement in history to require governments to provide assistance to victims of the weapon. This was achieved by an unprecedented level of participation by survivors in the treaty process.
The Convention on the Rights of Persons with Disabilities entered into force on May 3, 2008, affecting 650 million people with disabilities around the world, including survivors of violent conflict. Survivor Corps helped ensure that this progressive human rights treaty addressed persons with disabilities not as charity cases, but as equal and autonomous citizens entitled to their human rights and full participation in society.
The Convention on Cluster Munitions was signed in Oslo on December 3, 2008, and entered into force on August 1, 2010. It bans the use, stockpiling, production and trade of cluster bombs due to the indiscriminate harm they cause to civilians. As a leader on the steering committee of the Cluster Munitions Coalition, Survivor Corps used its past experience with the Mine Ban Treaty to help ens
|
https://en.wikipedia.org/wiki/Reiner%20Protsch
|
Reiner Protsch (von Zieten), born 14 January 1939 in Berlin, is a German anthropologist who published allegedly erroneous carbon dating data of human fossils.
Protsch's fraud, which ended his 30-year-old academic career, was announced after it was discovered that he made up data and plagiarized the works of others. His misdeeds also included an attempt to destroy the University of Frankfurt's archives and to sell the institution's chimpanzee skull collection.
Concern regarding the anthropologist's works emerged during routine investigation conducted by Thomas Terberger and Martin Street. The scientists sought to guarantee the authenticity of the fossil samples that Protsch had dated. Their findings, which were based on the fossil reanalysis completed at Oxford University's Radiocarbon Accelerator Unit, revealed wrong dating for the Hahnhöfersand Man, Binshof-Speyer Woman, and the Paderborn-Sande Man. The University of Frankfurt launched an investigation after the publication of Terberger and Street's report. It later found that throughout Protsch's career as a professor of anthropology at the university, he had plagiarized the works of colleagues and systematically misdated numerous stone age fossils. Protsch's falsified works forced the revision of some 30 millennia's worth of human history as well as the knowledge of human evolution.
The German publication Der Spiegel also reported that Protsch lied about his background, having previously claimed he had ties to Prussian aristocracy.
References
Archaeology magazine, May/June 2005, page 15.
Article about Protsch in the Guardian UK
1939 births
German anthropologists
Living people
German paleoanthropologists
University of California, Los Angeles alumni
|
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20Noovo
|
This is a list of programs currently, formerly, and soon to be broadcast by Noovo. This includes programming that aired under the network's former brands of TQS and V.
Programs
0-9
2 laits, un sucre - morning news and talk show hosted by Dominic Paquet, François Maranda and Valérie Simard
10-07: L'affaire Zeus - drama
450, Chemin du Golf - comedy
A
À table avec mon ex! - reality
Action Réaction - game show
Agent Carter - drama
Agents of S.H.I.E.L.D. - drama
The Amazing Race - reality
Ambulance animales - reality
L'Amour est dans le pré
APB: Alerte d'urgence - drama
Après OD - reality aftershow
Elle écrit au meutre - drama
L'Arbitre - court show
L'Attaque à 5 - sports news
Automania
Aventures en nord
B
Le Bachelor - reality
Bellevue - drama
Big Brother - reality
Bleu Nuit - late night softcore porn
Blindés
Bob Gratton : Ma Vie, My Life - comedy
Les Bolés
Bootcamp: Le parcours extrême
Box-office
C
Cardinal - drama
Ce soir on char
Ces chiens qui sauvent des vies
Chicago Justice - drama
Chicago Med - drama
Chicago Police - drama
Code 111
Colocs!
Comme chien et chat
CSI Miami: Les Experts - drama
D
Danser pour gagner
Défi 21 jours bootcamp
Destin amoureux
Dragon Ball Z
Dumont - news/talk show hosted by Mario Dumont
Dutrizac - news/talk show
E
Les Effaceurs
Ellen's Game of Games - game show
En prison
Entre deux draps - comedy
F
La Ferme chez soi
La Fin du monde est à 7 heures - news satire
Flashpoint - police drama
La Fouille
G
Gâteaux en folie
G.O.A.T.
Gotham
Le Grand Journal - news
Grand Rire Bleue
La Guerre des clans - local adaptation of Family Feud
H
Haute sécurité
Huissiers
I
Imposteurs
J
Je suis chef - cooking competition
Le Journal du soir - news
K
Les Karineries
Le Killing - comedy
L
Lance et compte - drama
Loft Story - reality
Lucifer - drama
M
Maître du chantier
Le maître du jeu
Max et Livia
Mets-y le Paquet
Moment décisif
Moment détente
Mon ex à moi
N
NCIS: Los Angeles - drama
Ne jamais faire à la maison
NVL - news
O
Occupation Double - reality
L'Open Mic de...
P
Paquet de troubles
Pas le choix de rénover
Pas si bête que ça
Phil s'invite
Pompiers: La relève
La Porte des étoiles - science fiction
Pour toujours, plus un jour - drama
Pratique Privée - drama
Le Prochain stand-up - reality competition
Q
Qu'est-ce qui mijote
Qui sait chanter? — local adaptation of I Can See Your Voice
R
Les Recrues
Rire et délire - comedy
Rock et Belles Oreilles - sketch comedy
RPM
RPM+
S
SEAL Team : Cœur et courage
La Semaine des 4 Julie - talk show
Les Simpson - animated
S.O.S. Beauté
South Park - animated
Sports 30
Supère Mario Monde
Supergirl
Sur la route avec Cath Peach
T
Taxi payant
TKO: Total Knock Out
Tommy - drama
Tony Speed
Top Dogs: Homicides
Tout s'embellit avec Julie - home design
Transplanté - drama
Tu m'aimes, tu mens!
U
Un souper presque parfait - reality
V
Vendeurs de rêve - reality
Virage - dramatic anthology
W
Wipeout Québec - game show
X
The X-Files - science fiction
Y
Y'a plein d'soleil
References
Noovo
|
https://en.wikipedia.org/wiki/VSE
|
VSE may refer to:
Education
University of Economics, Prague (), in Czechia
Vancouver School of Economics, at the University of British Columbia
Science and technology
VSE (operating system)
Odakyu 50000 series VSE, a Japanese electric multiple unit
Vision for Space Exploration, a space policy of the United States
Visual Smalltalk Enterprise, a Smalltalk dialect
Stock exchanges
Vadodara Stock Exchange, India
Vancouver Stock Exchange, Canada
Varaždin Stock Exchange, Croatia
Vilnius Stock Exchange, Lithuania
Other uses
Viseu Airport, in Portugal
VSE Corporation, an American business services company
|
https://en.wikipedia.org/wiki/Nebulus%20%28video%20game%29
|
Nebulus is a platform game created by John M. Phillips and published by Hewson Consultants in the late 1980s for home computer systems. International releases and ports were known by various other names: Castelian, , Subline, and Tower Toppler.
The game's original 8-bit release received some critical acclaim, in particular the Commodore 64 release, which garnered a Gold Medal award from UK magazine Zzap!64.
Nebulus was followed by the lesser-known Nebulus 2 for the Amiga in the 1990s.
Gameplay
Nebulus is a platform game. The player character, a green creature called Pogo, is on a mission to destroy eight towers that have been built in the sea by planting bombs at the towers' peaks.
The actual gameplay happens at each tower in turn. Pogo starts from the bottom and finds the way to the top. The towers are cylinder-shaped and have ledges on their outside, either horizontal, forming stairs or connected by elevators. A notable feature of the game is that when Pogo walks left or right the tower behind him turns clockwise or counterclockwise with a convincing sense of depth. This was noted favourably in reviews of the game.
During the ascent, Pogo encounters many different enemies, mostly shaped like basic geometric shapes. Pogo can shoot some of the enemies, while some are impervious to shooting. Contact with an enemy knocks Pogo down to the ledge below. If there is no ledge below, Pogo falls into the sea and drowns.
At the top of the tower, Pogo enters a door to trigger the tower's destruction mechanism. Pogo then boards his submarine and enters a bonus stage (in some versions, but not for example in the ZX Spectrum version), where he can shoot various kinds of fish to score bonus points.
Releases and ports
The game was originally released by Hewson for the ZX Spectrum, Amstrad CPC, Commodore 64, Commodore Amiga, Atari ST and Acorn Archimedes. The US version, which was published by U.S. Gold, was released under the title Tower Toppler. A version for the Atari 7800 was also released with this title.
The Game Boy and Nintendo Entertainment System versions of Castelian were developed by Bits Studios and released in the United States by Triffix and in Japan by Hiro Entertainment; in these, the lead character is called Julius. The Game Boy and Nintendo versions were later released in Japan as Kyoro Chan Land, which replaced Julius with Kyorochan, jewels with Chocoballs, altered the enemy graphics and (in the Famicom version) added a password system and a pause feature. The Italian bootleg version was called Subline. The Nintendo versions were composed by David Whittaker, and the title songs were covered by Whittaker from the original Tower Toppler game's title screen. In the Famicom version, the title screen plays what is the bonus game theme from the US version.
In 2004 it was re-released on the C64 Direct-to-TV. The C64 DTV version made comeback on the Wii's Virtual Console download service in Europe on June 13, 2008 and later in North Ameri
|
https://en.wikipedia.org/wiki/Brawl%20in%20the%20Family%20%28The%20Simpsons%29
|
"Brawl in the Family" is the seventh episode of the thirteenth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on January 6, 2002. In the episode, the Simpsons get arrested for domestic violence, prompting social worker Gabriel to move in and make the family functional. After the family is declared acceptable, Amber and Ginger, the cocktail waitresses Homer and his neighbor Ned Flanders married in Las Vegas, show up at their doorsteps. This episode is the first episode of Season 13's DABF production line.
"Brawl in the Family" was directed by Matthew Nastuk and was the first full episode Joel H. Cohen received a writing credit for. It was the first episode on which Al Jean served as sole showrunner. The idea for the episode was pitched by Jean, who wanted to produce a sequel to the season 10 episode "Viva Ned Flanders", which he thought had a "loose end". The episode features Jane Kaczmarek as Judge Constance Harm, and Delroy Lindo as Gabriel.
In its original broadcast, the episode was seen by approximately 12.8 million viewers, making it the 28th most watched program the week it aired.
Later that year, the episode was nominated for an Environmental Media Awards in the category "Television Episodic - Comedy", which it ultimately lost to the Dharma & Greg episode "Protecting the Ego-System". Following its home video release, "Brawl in the Family" received mixed reviews from critics.
Plot
The Republican Party of Springfield decide to make caring for the environment a felony offense; the resulting pollution causes an acid rainfall, destroying the Simpsons' TV antenna and prompting them to stay inside and play a game of Monopoly to pass the time. When it is revealed that Bart has been cheating by using Lego bricks as hotel pieces, Bart threatens Lisa and Homer assaults him. Marge and Lisa try to pry them apart. Despite her inability to talk, Maggie calls the police on her family before taking hold of Marge and attempting to pull her off Homer. With help from an edible taffy-like substance and a robot, the entire Simpson family is arrested for causing a domestic disturbance.
After a short time in jail, they are released by a social worker named Gabriel, whom Homer continuously dismisses as an angel sent from Heaven. Gabriel moves in with the family to help them be functional again. After observing the family's quirks, Gabriel takes the family to a forest and diagnoses the family's problems accordingly: Marge tries to prove her self-worth to the family by medicating them with food, Bart is addicted to doing crazy stunts for attention, Lisa has a savior complex brought on by her ill-fated attempts to do good for the family, and Homer is simply a drunken buffoon. Gabriel then sets up a challenge to teach the Simpsons the importance of teamwork by setting up a picnic basket in a tree. The object is for the family to work together as a team to get it down, but when Gabriel mentions
|
https://en.wikipedia.org/wiki/VUI
|
VUI or Vui or variation, may refer to:
Computing
Voice user interface, a voice/speech platform that enables human interaction with computers
Video usability information, extra information that can be inserted into a video stream to enhance its use
Medicine and biology
VUI – 202012/01, a "variant under investigation" of SARS-CoV-2, the virus which causes COVID-19
Vattikuti Urology Institute, Henry Ford Hospital, Detroit, Michigan, USA
People
Vui Florence Saulo, American Samoan businesswoman and politician
Vui Manu'a, Western Samoan chief and politician
Chris Vui (born 1983) New Zealand rugby footballer
Shambeckler Vui (born 1997) Australian rugby player
See also
|
https://en.wikipedia.org/wiki/Voice%20user%20interface
|
A voice-user interface (VUI) enables spoken human interaction with computers, using speech recognition to understand spoken commands and answer questions, and typically text to speech to play a reply. A voice command device is a device controlled with a voice user interface.
Voice user interfaces have been added to automobiles, home automation systems, computer operating systems, home appliances like washing machines and microwave ovens, and television remote controls. They are the primary way of interacting with virtual assistants on smartphones and smart speakers. Older automated attendants (which route phone calls to the correct extension) and interactive voice response systems (which conduct more complicated transactions over the phone) can respond to the pressing of keypad buttons via DTMF tones, but those with a full voice user interface allow callers to speak requests and responses without having to press any buttons.
Newer voice command devices are speaker-independent, so they can respond to multiple voices, regardless of accent or dialectal influences. They are also capable of responding to several commands at once, separating vocal messages, and providing appropriate feedback, accurately imitating a natural conversation.
Overview
A VUI is the interface to any speech application. Only a short time ago, controlling a machine by simply talking to it was only possible in science fiction. Until recently, this area was considered to be artificial intelligence. However, advances in technologies like text-to-speech, speech-to-text, natural language processing, and cloud services contributed to the mass adoption of these types of interfaces. VUIs have become more commonplace, and people are taking advantage of the value that these hands-free, eyes-free interfaces provide in many situations.
VUIs need to respond to input reliably, or they will be rejected and often ridiculed by their users. Designing a good VUI requires interdisciplinary talents of computer science, linguistics and human factors psychology – all of which are skills that are expensive and hard to come by. Even with advanced development tools, constructing an effective VUI requires an in-depth understanding of both the tasks to be performed, as well as the target audience that will use the final system. The closer the VUI matches the user's mental model of the task, the easier it will be to use with little or no training, resulting in both higher efficiency and higher user satisfaction.
A VUI designed for the general public should emphasize ease of use and provide a lot of help and guidance for first-time callers. In contrast, a VUI designed for a small group of power users (including field service workers), should focus more on productivity and less on help and guidance. Such applications should streamline the call flows, minimize prompts, eliminate unnecessary iterations and allow elaborate "mixed initiative dialogs", which enable callers to enter several pieces of informati
|
https://en.wikipedia.org/wiki/E-reader%20%28disambiguation%29
|
An e-reader is a device or computer program used for reading electronic books.
E-reader may also refer to:
eReader (format), a file format for e-books
Nintendo e-Reader, an add-on for the Game Boy Advance portable video game system
A person who reads e-books
|
https://en.wikipedia.org/wiki/NUMAlink
|
NUMAlink is a system interconnect developed by Silicon Graphics (SGI) for use in its distributed shared memory ccNUMA computer systems. NUMAlink was originally developed by SGI for their Origin 2000 and Onyx2 systems. At the time of these systems' introduction, it was branded as "CrayLink" during SGI's brief ownership of Cray Research.
Hewlett Packard Enterprise entered an original equipment manufacturer (OEM) arrangement with Silicon Graphics International (SGI) to use Numalink as the foundation in some mission critical servers.
Notes
NUMAlink 2
There was no NUMAlink 1, as SGI's engineers deemed the system interconnect used in the Stanford DASH to be the first generation NUMAlink interconnect.
NUMAlink 2 (branded as CrayLink) was announced in October 1996 for the Onyx2 visualization systems, the Origin 200 and the Origin 2000 servers and supercomputers. The NUMAlink 2 interface is the Hub ASIC. NUMAlink 2 is capable of 1.6 GB/s of peak bandwidth through two 800 MB/s, PECL 400 MHz 16-bit unidirectional links.
NUMAlink 3
NUMAlink 3 is the third generation of the interconnect, introduced in 2000 and used in the Origin 3000 and Altix 3000. NUMAlink 3 is capable of 3.2 GB/s of peak bandwidth through two 1.6 GB/s unidirectional links.
The name NUMAflex reflects the modular design approach around this time.
NUMAlink 4
NUMAlink 4 is the fourth generation of the interconnect, introduced in 2004 and used in the Altix 4000. NUMAlink 4 is capable of 6.4 GB/s of peak bandwidth through two 3.2 GB/s unidirectional links.
NUMAlink 5
NUMAlink 5 is the fifth generation of the interconnect, introduced in 2009 and used in the Altix UV series. NUMAlink 5 is capable of 15 GB/s of peak bandwidth through two 7.5 GB/s unidirectional links.
NUMAlink 6
NUMAlink 6 is the sixth generation of the interconnect, introduced in 2012 and used in the SGI UV 2000, SGI UV 3000, SGI UV 30. NUMAlink 6 is capable of 6.7 GB/s of bidirectional peak bandwidth for up to 256 socket system and 64TB of coherent shared memory.
NUMAlink 7
NUMAlink 7 is the seventh generation of the interconnect, introduced in 2014 and used in the HPE Integrity MC990 X/SGI UV 300, SGI UV 30EX, SGI UV 300H, SGI UV 300RL. NUMAlink 7 is capable of 14.94 GB/s of bidirectional peak bandwidth for up to 64 socket system and 64TB of coherent shared memory.
NUMAlink 8 (Flex ASIC)
NUMAlink 8 is the eighth generation of the interconnect, introduced in 2017 and used in the HPE Superdome Flex. NUMAlink 8 provides 13.3 GB/s of bandwidth per port and systems using it are capable of 853.33 GB/s of bisection peak bandwidth (64 links are cut) across a 32 socket system with up to 48 TB of coherent shared memory.
See also
List of device bit rates
InfiniBand
RapidIO
Myrinet
Scalable Coherent Interconnect
QsNet II
QuickRing
References
Joseph Heinrich, Origin and Onyx2 Theory of Operations Manual, 007-3439-002, Silicon Graphics.
External links
HPE NUMAlink servers, Superdome Flex.
Silicon G
|
https://en.wikipedia.org/wiki/Pruning%20%28morphology%29
|
The pruning algorithm is a technique used in digital image processing based on mathematical morphology. It is used as a complement to the skeleton and thinning algorithms to remove unwanted parasitic components (spurs). In this case 'parasitic' components refer to branches of a line which are not key to the overall shape of the line and should be removed. These components can often be created by edge detection algorithms or digitization. Common uses for pruning include automatic recognition of hand-printed characters. Often inconsistency in letter writing creates unwanted spurs that need to be eliminated for better characterization.
Mathematical Definition
The standard pruning algorithm will remove all branches shorter than a given number of points. If a parasitic branch is shorter than four points and we run the algorithm with n = 4 the branch will be removed. The second step ensures that the main trunks of each line are not shortened by the procedure.
Structuring Elements
The x in the arrays indicates a “don’t care” condition i.e. the image could have either a 1 or a 0 in the spot.
Step 1: Thinning
Apply this step a given (n) times to eliminate any branch with (n) or less pixels.
Step 2: Find End Points
Wherever the structuring elements are satisfied, the center of the 3x3 matrix is considered an endpoint.
Step 3: Dilate End Points
Perform dilation using a 3x3 matrix (H) consisting of all 1's and only insert 1's where the original image (A) also had a 1. Perform this for each endpoint in all direction (n) times.
Step 4: Union of X1 & X3
Take the result from step 1 and union it with step 3 to achieve the final results.
MATLAB Code
%% ---------------
% Pruning
% ---------------
clear; clc;
% Image read in
img = imread('Pruning.tif');
b_img_skel = bwmorph (img, 'skel', 40);
b_img_spur = bwmorph(b_img_skel, 'spur', Inf);
figure('Name', 'Pruning');
subplot(1,2,1);
imshow(b_img_skel);
title(sprintf('Image Skeleton'));
subplot(1,2,2);
imshow(b_img_spur);
title(sprintf('Skeleton Image Pruned'));
MATLAB Example
In the MATLAB example below, it takes the original image (below left) and skeletonize it 40 times then prunes the image to remove the spurs as per the MATLAB code above. As shown (below right) this removed the majority of all spurs resulting in a cleaner image.
See also
Morphological image processing
External links
Morphological Pruning function in Mathematica
Morphological Operations in MATLAB
References
Digital geometry
Mathematical morphology
|
https://en.wikipedia.org/wiki/Roy%20Speer
|
Roy Merrill Speer Jr. (June 23, 1932 – August 21, 2012) was an American attorney, and entrepreneur. He was also the former CEO, co-founder and chairman of the Home Shopping Network.
Early life and education
Speer was born in Key West, Florida and graduated from Stetson University in Deland, Florida and from Stetson University College of Law in Gulfport, Florida.
Career
Speer left his job as an assistant state attorney two years after being hired in 1965.
Early in his legal career, Speer worked for the State of Florida in Tallahassee as a Special Assistant Attorney General. He also worked as Assistant Trial Staff Counsel for the U.S. Labor Relations Board. During this period, Speer developed a working relationship with A. Jay Cristol who is now Senior Federal Judge of the Southern Federal Bankruptcy Court. After leaving Tallahassee, he became a chief lobbyist for the City of St. Petersburg, specializing in water rights and laws. Later, Speer was appointed Assistant State Attorney for Pinellas County by Governor Haydon Burns. He then practiced law with John DeVito and Elizabeth A. Kovachevich, who is now a Senior Federal Judge. He dated Elizabeth A. Kovachevich in law school.
Speer established his first of many business partnerships with Estlon and JoAnn Pippin, experienced single-family homebuilders in Pasco County, Florida. They formed Tahitian Homes, Inc. and proceeded to build homes in western Pasco County. Later, Speer expanded his real estate development activities into a large multi-corporation company called Lanbanque, Inc. In order to supply utilities to his ever-expanding real estate projects, Speer and the Pippins established Aloha Utilities, Inc. which was the largest private water and sewer utility in Pasco County. During a slow-down in the real estate business, Speer spent three years in Europe, Saudi Arabia, and Kuwait formulating TACET (Technology and Capital Exchange Trust).
Speer was also involved in growing vegetables in Puerto Rico; he owned a beautician school, restaurants, lounges, a marina, marine dredging, data processing services, multi-level marketing of vitamins and cosmetics, cement block manufacturing, country-western music publishing and recording studios, telecommunications companies, a high-end boutique shop, general insurance agency, internet connection and data center, a walk-in medical clinic, wholesale gasoline and diesel fuel distribution operation, a travel agency, home security monitoring, mail order medical and diabetic supply company, a Big & Tall men's clothing store, an AM radio station, a mobile medical screening company, a book publishing company, a warehouse fulfillment and distribution company, an advertising media consulting firm, television stations, mobile home parks, a 225 room hotel in Nassau, Bahamas, a 500,000 square foot commercial warehouse complex in Las Vegas, and a five-star 23 story resort hotel and residences on Ft. Lauderdale Beach.
In early 1980, Speer formed U.S. Hydrocarbons
|
https://en.wikipedia.org/wiki/Ganglia%20%28software%29
|
Ganglia is a scalable, distributed monitoring tool for high-performance computing systems, clusters and networks. The software is used to view either live or recorded statistics covering metrics such as CPU load averages or network utilization for many nodes.
Ganglia software is bundled with enterprise-level Linux distributions such as Red Hat Enterprise Level (RHEL) or the CentOS repackaging of the same. Ganglia grew out of requirements for monitoring systems by Berkeley (University of California) but now sees use by commercial and educational organisations such as Cray, MIT, NASA and Twitter.
Ganglia
It is based on a hierarchical design targeted at federations of clusters. It relies on a multicast-based listen/announce protocol to monitor state within clusters and uses a tree of point-to-point connections amongst representative cluster nodes to federate clusters and aggregate their state. It leverages widely used technologies such as XML for data representation, XDR for compact, portable data transport, and RRDtool for data storage and visualization. It uses carefully engineered data structures and algorithms to achieve very low per-node overheads and high concurrency. The implementation is robust, has been ported to an extensive set of operating systems and processor architectures, and is currently in use on over 500 clusters around the world. It has been used to link clusters across university campuses and around the world and can scale to handle clusters with 2000 nodes.
The ganglia system comprises two unique daemons, a PHP-based web front-end, and a few other small utility programs.
Ganglia Monitoring Daemon (gmond)
Gmond is a multi-threaded daemon which runs on each cluster node you want to monitor. Installation does not require having a common NFS filesystem or a database back-end, installing special accounts or maintaining configuration files.
Gmond has four main responsibilities:
Monitor changes in host state.
Announce relevant changes.
Listen to the state of all other ganglia nodes via a unicast or multicast channel.
Answer requests for an XML description of the cluster state.
Each gmond transmits information in two different ways:
Unicasting or Multicasting host state in external data representation (XDR) format using UDP messages.
Sending XML over a TCP connection.
Ganglia Meta Daemon (gmetad)
Federation in Ganglia is achieved using a tree of point-to-point connections amongst representative cluster nodes to aggregate the state of multiple clusters. At each node in the tree, a Ganglia Meta Daemon (gmetad) periodically polls a collection of child data sources, parses the collected XML, saves all numeric, volatile metrics to round-robin databases and exports the aggregated XML over a TCP socket to clients. Data sources may be either gmond daemons, representing specific clusters, or other gmetad daemons, representing sets of clusters. Data sources use source IP addresses for access control and can be specified using mu
|
https://en.wikipedia.org/wiki/Kisekae%20Set%20System
|
Kisekae Set System (commonly known as KiSS) is a blending of art with computers originally designed to allow creation of virtual "paper dolls". Kisekae is short for , a Japanese term meaning "dress-up dolls". Unlike "computer art" which creates or displays traditional art via a computer, KiSS uses the computer as the medium, allowing the art to be not only animated, but also interactive.
Availability
KiSS is an open standard which has to some extent been implemented on many platforms, including several PDAs. It has also been implemented in Java and on the web.
History
KiSS originated in Japan in 1991 with "dolls" based on shōjo manga characters.
The original dolls, a series of simple, static images, could be moved about and layered on top of one another to look as if the doll image was wearing the clothing. Using computer graphics had the advantage over traditional paper dolls in allowing multiple layers to move in unison, including visually separate pieces, giving an illusion of depth not possible with physical paper.
The initial viewer software was designed for NEC PC-9800 series using a palette of 16 colours to display the doll. Shortly after, an enhanced standard was put forward (General Specification 2 known as 'KiSS/GS2') which included support for VGA cards and 256 or multiple 16 colour palettes. This standard is still the basis of KiSS, but several additional specifications have been incorporated into viewers since then, in particular "French KiSS", generally called FKiSS, for controlling interactivity and animation and "Cherry KiSS" (i.e. CKiSS) for 32-bit "true" colour support.
By the late 1990s KiSS had spread from the Japanese BBS communities internationally via the Internet with artists creating "dolls", programmers creating support tools, and fans appearing worldwide.
Note that although KiSS sets are often referred to generically as 'dolls' they are not confined to dress-up—they can be anything and there are "build-your-own" faces, wedding cakes, dollhouses, battleships, as well as puzzles, games and much more. Nonetheless such "unusual" sets are sometimes referred to as aberrant KiSS.
Format
A KiSS set consists of many files of a number of different formats. These are packaged for distribution as a single set or 'doll' in LZH format (a preferred archive format in Japan) which viewer programs can read as a whole to obtain the individual files.
Most files are 'cel' files which are raw, uncompressed graphics data analogous to animation cels. KiSS/GS2 specification cels also require a KCF (KiSS Colour File) as a palette, but CKiSS specification cels do not. A KCF also can control background colour and contain multiple palettes that can be swapped for lighting and colour change effects. All KiSS binary files (KCF, standard and CKiSS cels) since KiSS/GS2 share a common 32 byte binary header record identifying the size, type and format of KiSS data they contain.
A configuration file is also required to control field size, laye
|
https://en.wikipedia.org/wiki/Miss%20Chinese%20International%20Pageant
|
Miss Chinese International Pageant (, formerly 國際華裔小姐競選), or MCI () for short, is an annual international beauty pageant, organized and broadcast by TVB, a network television station in Hong Kong. It was established in 1988 and the Chinese name of the pageant was rebranded in 2007.
The current Miss Chinese International is Miss Hong Kong 2018 winner Hera Chan, who was crowned at the Miss Chinese International Pageant 2019.
The 31st Miss Chinese International Pageant of 2020, originally scheduled to take place February 2020, was postponed to 2021 due to the ongoing COVID-19 pandemic.
Composition
At its inception in 1988, in what was formerly British Hong Kong, delegates were either winners or runners-up of regional Chinese beauty pageants around the world excluding the country of China, as originally, this was a pageant for Chinese delegates from overseas. In 2007, pageant organizers altered the entry requirements to include delegates representing Mainland China. All delegates at the time of the pageant are between the ages at least of 17 and 25, with the upper age limit expanded to 27 in 2012. The delegates must be of at least partial Chinese descent.
In 2009, a record number of 11 delegates came from Mainland China, more than one-third of the total contestant count. The number of China delegates has since decreased, with the 2013 pageant having only one Mainland Chinese delegate, representing Foshan.
Chinese name change
Starting in 2007, the pageant allowed mainland Chinese participants, and the Chinese name of the pageant changed from 國際華裔小姐競選 (Cantonese: Gwokjai Wayeui Siuje Gingsyun; Mandarin: Guójì huáyì xiǎojiě jìngxuǎn), which literally translated to "Miss International of Chinese Descent Pageant" to 國際中華小姐競選 (Cantonese: Gwokjai Jungwa Siuje Gingsyun (Mandarin: Guójì zhōnghuá xiǎojiě jìngxuǎn) to reflect the change, matching the English pageant title of Miss Chinese International Pageant.
Participating regions
Africa
Johannesburg, South Africa (1989; 1992–1997; 2003; 2006–2007; 2016–2017)
The Americas
North America
Calgary, Alberta, Canada (1988–1996, 1998–2005, 2007–2008)
Chicago, United States (1989–2007, 2009–2015, 2019)
Edmonton, Alberta, Canada (1988–1993)
Honolulu, United States (1995; 1997; 1999; 2001–2002; 2018–present)
Los Angeles, United States (1993–2005; 2013–present)
Montreal, Quebec, Canada (1988–present)
New York City, United States (1993–present)
San Francisco, United States (1988–2010; 2014–2015; 2017-present)
Scarborough, Ontario, Canada (1988, 1991)
Seattle, United States (1988–2010; 2013–2015)
Toronto, Ontario, Canada (1988–present)
Vancouver, British Columbia, Canada (1988–present)
Victoria, British Columbia, Canada (1989–1994)
South America
Lima, Peru (2003–2006)
Europe
Amsterdam, Netherlands (2002–2010)
Frankfurt, Germany (2005)
The Hague, Netherlands (2002)
London, England (1988-1991; 1996–2000; 2012; 2019)
Paris, France (2008)
Rotterdam, Netherlands (2007)
Tübingen, Germany (2009)
Asia
Bangkok, Tha
|
https://en.wikipedia.org/wiki/Twisted%20Metal%204
|
Twisted Metal 4 is a vehicular combat video game developed by 989 Studios and published by Sony Computer Entertainment for the PlayStation. The game was released in North America on November 16, 1999 and was re-released for the Sony Greatest Hits line-up in 2000. Like the previous installment, it wasn't released in the PAL regions.
Twisted Metal 4 is the fourth installment in the Twisted Metal series and the second and last installment to be developed by 989 Studios. The game's plot centers on Sweet Tooth, the long-time mascot of the titular Twisted Metal competition, overthrowing Calypso, the mysterious organizer of the competition, in a coup d'état. He then takes over the mantle of granting the winner of the competition a single wish, regardless of price, size or even reality.
Twisted Metal 4 received mixed to positive reviews from critics, who considered it to be an improvement over the previous Twisted Metal III, particularly in terms of level design.
Gameplay
In concept, Twisted Metal 4 is a demolition derby which permits the usage of ballistic projectiles. Players choose a vehicle and an arena—or a series of arenas in the story mode—to engage in battle with opposing drivers. A variety of weapons are obtainable by pick-ups scattered throughout the stage. The objective of the game is to be the last one standing.
The game's plot takes a different turn of events compared to its predecessors. Its intro video details the tournament's story, starting around the 1900s as a circus-type caravan that traveled across the country spreading destruction everywhere. A young Sweet Tooth finds himself amazed by the contest and runs off in its pursuit, entering and eventually winning. As his wish, he desires to become the star of Twisted Metal, which Calypso gladly grants. At first revered by the chaos he created, as time went on Sweet Tooth became jealous of Calypso, until he decides to initiate a coup d'état helped by a group of little clowns, and takes control of Twisted Metal.
It is also discovered that Calypso's source of powers comes from a mysterious ring that consumes the souls of those who die, increasing his strength and youth, and Sweet Tooth having taken it, finds that he possess the same abilities as Calypso to grant wishes. He tends to cheat people with their wishes like Calypso does as well.
Development
After a contractual dispute with the developer of the first two games in the series, SingleTrac, Twisted Metal development duties were handed over to Sony's in-house development team, 989 Studios.
In development of Twisted Metal III, the source code and physics engine for Twisted Metal 2 weren't available because they were property of SingleTrac. Therefore, new ones had to be created from scratch instead. The new source code introduced advanced physics simulation and AI techniques to the series.
In development of Twisted Metal 4, the game was reworked to improve upon the shortcomings of Twisted Metal III, introducing smoother gameplay an
|
https://en.wikipedia.org/wiki/Gran%20Turismo%202
|
Gran Turismo 2 is a 1999 racing simulation video game developed by Polyphony Digital and published by Sony Computer Entertainment for the PlayStation. It is the sequel to Gran Turismo, the second installment of the Gran Turismo series and the first installment in the series without involvement from Japan Studio. It was a critical and commercial success, shipping 1.71 million units in Japan, 0.02 million in Southeast Asia, 3.96 million in North America, and 3.68 million in Europe for a total of 9.37 million units as of April 30, 2008, and eventually becoming a Sony Greatest Hits game.
Gameplay
Gran Turismo 2 is a racing simulation video game. The player must maneuver an automobile to compete against artificially intelligent drivers on various race tracks. The game uses two different modes: Arcade Mode and Simulation Mode (Gran Turismo Mode in PAL and Japanese versions). In the arcade mode, the player can freely choose vehicles they wish to use, and can enable damage, while the simulation mode requires the player to earn driver's licenses, pay for vehicles, and earn trophies in order to unlock new and returning courses. Gran Turismo 2 features nearly 650 automobiles and 27 racing tracks, including rally tracks.
Compared with Gran Turismo, the gameplay, physics and graphics are very similar: the only real noticeable difference in vehicle dynamics was the brakes, which became much less likely to lock up and cause the vehicle to oversteer. The major changes are the vastly expanded number of cars, tracks and races in simulation mode. Other differences include that the player can race events separately, if they do not want to enter the whole tournament. The player is no longer able to "qualify" for each race entered.
Development
After the unexpected success of Gran Turismo, lead developer Kazunori Yamauchi planned to make Gran Turismo 2 "an even better product". SCEA's marketing director (Ami Blaire) had high hopes, stating "the overwhelming and continuing popularity of Gran Turismo clearly positions Gran Turismo 2 to be one of the hottest titles available for the holidays and beyond". Jack Tretton (sales vice president of SCEA) had similar enthusiasm, expecting Gran Turismo 2 to "fly off the shelves faster than the original, continuing the momentum of this incredible franchise".
Upon the game's release, players shortly found various errors and glitches. SCEA did not ignore the outcry, and offered a replacement if any problems occurred. For example, in version 1.0 of the NTSC-U version of the game, the maximum attainable completion percentage was 98.2%. Another glitch was that no matter what, even if a player saves the game, cars can disappear from their garage. A third glitch was that certain cars would appear in the wrong races. This was most significant in the 30-lap Trial Mountain endurance race, where a 680 bhp Vector M12 LM edition may appear despite a 295-horsepower entry restriction, effectively making the race nearly impossible to win. The
|
https://en.wikipedia.org/wiki/Jet%20Moto%202
|
Jet Moto 2 (known as Jet Rider 2 in Europe and Jet Moto '98 in Japan) is a 1997 racing video game developed by SingleTrac and published by Sony Computer Entertainment for the PlayStation video game console. It is the sequel to the 1996 game Jet Moto. It was released in North America on November 11, 1997, in Europe in April 1998, and in Japan on August 6, 1998. In January 2008 Jet Moto 2 was made available for the PlayStation Portable and PlayStation 3 via the PlayStation Network. The PlayStation Greatest Hits version, branded within the game as Jet Moto 2: Championship Edition, is slightly different from the original in that the framerate is increased, the number of competitors is limited to four, and all the original Jet Moto tracks are unlocked from the start.
As with Jet Moto, gameplay in Jet Moto 2 revolves around the use of hoverbikes to traverse a race course, similar to modern day motorcross, but with the added ability to traverse water. Reviews for Jet Moto 2 were mixed. Some reviewers were satisfied with the improved controls and variety of tracks over the original, but some found the changes insufficient for what is normally expected of a sequel, and the unusual physics still drew some criticism. Jet Moto 2s popularity would spawn one additional sequel, Jet Moto 3.
Gameplay
Jet Moto 2 retains all of the basic gameplay from its predecessor. Players control hoverbikes which sit close to the ground and can be ridden over land and water. The courses in the game are designed to take advantage of this ability. Characters are split into teams, and bikes are adorned with logos of products such as Mountain Dew and JetSki, similar to real-life sponsored racing. The riders received an overhaul, with only a total of ten selectable characters being available, and subsequently only ten racers on the track at any given time.
The number of tracks available greatly increased, with ten new tracks added plus the ability to unlock all of the tracks from the original game. Track designs are more varied in Jet Moto 2, with each level containing a unique theme rather than the shared themes of the original. The courses range from earthquake-damaged cities, to desert canyons, ice-covered mountains, a roller coaster, and several other themes.
The difficulty was also increased in Jet Moto 2. In order to conserve CPU cycles for other things the developers used gameplay recordings in place of fully developed racer AI. As a result, most AI racers have a perfect run and any mistakes made by the player result in a quick loss of top racing positions. The PlayStation Greatest Hits version of the game, dubbed Jet Moto 2: Championship Edition further changed the gameplay mechanics. All Jet Moto tracks were immediately unlocked for the player. Additionally, the number of in-game racers would be reduced from ten to only four to allow the game to run at 30 frames per second.
Development
Jet Moto 2s original cut from 20 competitors to 10 was "to open the game up t
|
https://en.wikipedia.org/wiki/Apple%20Interactive%20Television%20Box
|
The Apple Interactive Television Box (AITB) is a television set-top box developed by Apple Computer (now Apple Inc.) in partnership with a number of global telecommunications firms, including British Telecom and Belgacom. Prototypes of the unit were deployed at large test markets in parts of the United States and Europe in 1994 and 1995, but the product was canceled shortly thereafter, and was never mass-produced or marketed.
Overview
The AITB was designed as an interface between a consumer and an interactive television service. The unit's remote control would allow a user to choose what content would be shown on a connected television, and to seek with fast forward and rewind. In this regard it is similar to a modern satellite receiver or TiVo unit. The box would only pass along the user's choices to a central content server for streaming instead of issuing content itself. There were also plans for game shows, educational material for children, and other forms of content made possible by the interactive qualities of the device.
Early conceptual prototypes have an unfinished feel. Near-completion units have a high production quality, the internal components often lack prototype indicators, and some units have FCC approval stickers. These facts, along with a full online manual suggest the product was very near completion before being canceled.
Infrastructure
Because the machine was designed to be part of a subscription data service, the AITB units are mostly inoperable. The ROM contains only what is required to continue booting from an external hard drive or from its network connection. Many of the prototypes do not appear to even attempt to boot. This is likely dependent on changes in the ROM. The ROM itself contains parts of a downsized System 7.1, enabling it to establish a network connection to the media servers provided by Oracle. The Oracle Media Server (OMS) initially ran on hardware produced by Larry Ellison's nCube Systems company, but was later also made available by Oracle on SGI, Alpha, Sun, SCO, Netware, Windows NT, and AIX systems. These servers also provided the parts of the OS not implemented in ROM of the AITB via the OMS Boot Service. Therefore, an AITB must establish a network connection successfully in order to finish the boot process. Using a command key combination and a PowerBook SCSI adapter, it is possible to get the AITB to boot into a preinstalled System 7.1 through an external SCSI hard drive.
In July 2016, images were published on a video game forum that appear to show a Super Nintendo Entertainment System cartridge designed to work with the British Telecom variant of the AITB. The cartridge is labeled "BT GameCart" and includes an 8-pin serial connector designed to connect to the Apple System/Peripheral 8 port on the rear of the box. A BT promotional film for the service trial discusses a way users could download and play Nintendo video games via the system.
Specifications
The Apple Interactive Television Box i
|
https://en.wikipedia.org/wiki/ManKind%20Project
|
ManKind Project (MKP) is a global network of nonprofit organizations focused on modern male initiation, self-awareness, and personal growth.
Scope
The ManKind Project has 12 regions: Australia, Belgium, Canada, French Speaking Europe, Germany, Mexico, New Zealand, Nordic (Norway, Denmark, Sweden, Finland), South Africa, Switzerland, The United Kingdom and Ireland, and 22 Areas in the United States. There are also three developing regions: Israel, The Netherlands, and Spain.
History
MKP has its origins in the mythopoetic men's movement of the early 1980s, drawing heavily on the works of Robert Bly, Robert L. Moore, and Douglas Gillette. In 1984, Rich Tosi, a former Marine Corps officer; Bill Kauth, a social worker, therapist, and author; and university professor Ron Hering, Ph.D. (Curriculum Studies); created an experiential weekend for men called the "Wildman Weekend" (later renamed "The New Warrior Training"). As the popularity of the training grew, they formed a New Warrior Network organization, which would later become The Mankind Project.
New Warrior Training Adventure
MKP states:
MKP states that those who undertake this journey pass through three phases characteristic to virtually all historic forms of male initiation: descent, ordeal and return. Participants surrender all electronic devices (cell phones, watches, laptops, etc.), weapons (guns, knives, etc.) and jewelry for the weekend. This was explained as way of removing the "noise of a man's life", separating the man "from what he is comfortable with," and ensuring the safety of all participants.
Participants agree to confidentiality of the NWTA processes, to create an experience "uncluttered by expectation" for the next man and to protect the privacy of all participants. MKP encourages participants to freely discuss what they learned about themselves with anyone.
Training courses usually involve 20 to 32 participants, and some 30 to 45 staff. The course usually takes place at a retreat center, over a 48-hour period, with a one-to-one ratio of staff to participants.
Research
Researchers reported on data from 100 men, whom they interviewed and administered a battery of questionnaires, before the men participated in a New Warrior Training Adventure during 1997-1999. The same men completed a set of follow-up questionnaires 18 months after they had completed the NWTA. The men endorsed changes such as "... [becoming more] assertive and clear with others about what I want or need" and "... accept[ing] total responsibility for all aspects of my life". The study findings also indicated that the men had more social support and experienced more life satisfaction 18 months after the NWTA.
The authors acknowledge limitations to their research, since they did not have a comparison or control group, which results in various "threats to internal validity" mentioned by the researchers, primarily history, maturation, and selection bias.
A second study accumulated data from 45 trainings held
|
https://en.wikipedia.org/wiki/The%20Corporate%20Machine
|
The Corporate Machine (known in Europe as Business Tycoon) is a business simulation computer game from Stardock in which the goal is to create a corporation in one of four industries (automobiles, aircraft, computers, or soft drinks) and eventually dominate rival companies. To win the player must dominate the chosen market (getting 55% to 65% of the market share depending on the number of opponents). The Corporate Machine is a follow-up to the game Business Tycoon, which was itself a sequel to the game Entrepreneur, all developed by Stardock.
Gameplay
Starting Out
When starting a game, the player picks a company specialty. Three specialties are available: marketing, labor and research. Each specialty doubles productivity in that area. After picking a specialty, the start screen allows choice of how many opponents to be faced, the difficulty of the game, what map will be used (both real and fictional maps are available), starting funds, and what industry is to be competed in.
Exploring
The game is started at the home site (which is randomly chosen on the map) and with one sales executive. To introduce and sell the product to other regions, the region must be investigated. This process can take from 3 to 10 weeks depending on how far they are from the sites. After an area is explored, the player will know the market leader, if opponents have sites or units there, if the region has a resource, as well as statistics like what the targeted area desires in a product, their concerns with price, and how rich the region is.
The Sales Executives
The sales executives increase market penetration (the percentage of stores carrying the product) in their regions and all regions up to two spaces away from each executive. The sales executive can be moved around the map freely by plane; however, while in transit he will not grant any penetration benefit. To gain more sales executives the profit must be increased to a certain level by the end of a year. This gets harder later on as the amount to gain a new executive increases. It is also possible to get them through the use of Direct Action Cards.
Your Company Sites
These places are the player's base of operations. Manufacturing, research, and marketing buildings can be built and upgraded. Additional sites can be purchased but they become progressively more expensive. On the player's first site there will be a sales office and a garage, but every site after will only have a sales office and everything else has to be built. Other buildings include an intelligence facility, which will generate and display information in the form of graphs. Company stores can be built at any site to decrease employee expenses (and therefore lower employee cost).
To get better performance a training center will increase employee efficiency. Employee happiness becomes a factor as well, as an unhappy employee's performance will suffer, so a recreation center will boost morale. If market leadership is lost in an area where a sit
|
https://en.wikipedia.org/wiki/Spyro%202%3A%20Ripto%27s%20Rage%21
|
Spyro 2: Ripto's Rage!, known as Spyro 2: Gateway to Glimmer in PAL regions, is a 1999 platform game developed by Insomniac Games and published by Sony Computer Entertainment for the PlayStation. It is the second game in the main Spyro series. A remake was released as part of the Spyro Reignited Trilogy in 2018.
Gameplay
Players control Spyro the Dragon as he fights against various enemies and obstacles using his flame breath, charge attack, and glide abilities. His health is indicated by the color of his dragonfly partner, Sparx, who can replenish his health by eating butterflies. Bottled butterflies will both completely restore Sparx's health and give Spyro an extra life. The game is split up into three main hub worlds containing portals to various realms. In order to progress through the first two hub worlds, the player must acquire a talisman from each realm, which is awarded for reaching the end of the level, before facing the boss of each world. Each level also contains a certain number of orbs, which can be earned by completing secondary tasks for particular NPCs, such as lighting a series of lamps or protecting characters from attacks. These orbs are required for opening some of the portals to certain levels, as well as progressing through the third hub world. Gems gathered throughout the game are required to pay fees Moneybags charges in order to progress through the game. As well as opening portals or granting access to certain areas, Moneybags also teaches Spyro three brand new abilities over the course of the game. Swimming lets Spyro dive underwater to reach submerged treasure and hidden tunnels, climbing lets Spyro climb up certain surfaces, and the headbash lets Spyro perform an overhead smashing attack which can break rocks and certain cages. In addition, each level has a power-up gate, activated after defeating a specific number of enemies in a level, which grants Spyro a temporary super-ability. The power-up can grant invulnerability or the abilities to fly, supercharge, super flame, breathe ice, or super jump to reach high up areas.
Characters and setting
The only characters from the original game to return as main characters in this game are Spyro, the game's protagonist, and Sparx, his dragonfly sidekick. Sparx functions as the player's health meter, and assists the player in gathering gems. This game introduces new characters into the Spyro series, many of whom would appear in later games. Both Hunter and Moneybags make recurring appearances in the series, while Ripto would make more series appearances than any other antagonist, making him the key villain of the original series. The dragons of the previous installment have been replaced with an entirely new cast of characters, including fauns, satyrs, anthropomorphic animals, and robotic businessmen, among others.
The world of Avalar is divided into three realms: the Summer Forest, the Autumn Plains, and the Winter Tundra. In every realm, there is a castle that, during t
|
https://en.wikipedia.org/wiki/Spyro%3A%20Year%20of%20the%20Dragon
|
Spyro: Year of the Dragon is a 2000 platform game developed by Insomniac Games and published by Sony Computer Entertainment for the PlayStation. Year of the Dragon is the third game in the Spyro series. The game follows the adventures of the purple dragon Spyro. After an evil sorceress steals magical dragon eggs from the land of the dragons, Spyro travels to the "Forgotten Realms" to retrieve them. Players travel across thirty different worlds gathering gems and eggs, defeating enemies, and playing minigames. Year of the Dragon introduced new characters and minigames to the series, as well as offering improved graphics and music.
Year of the Dragon received positive reviews from critics, who noted the game successfully built on the formula of its predecessors. The game sold more than 3 million copies worldwide. Year of the Dragon was the last Spyro title released for the first PlayStation, and the last developed by Insomniac Games; their next game would be Ratchet & Clank. Year of the Dragon was followed by the multiplatform title Spyro: Enter the Dragonfly, and was later remade as part of the Spyro Reignited Trilogy in 2018.
Gameplay
Year of the Dragon is a platforming video game primarily played from a third person perspective. The main objective is to recover stolen dragon eggs which are scattered across 37 levels. These eggs are hidden, or are given as rewards for completing certain tasks and levels. The worlds of Spyro are linked together by "homeworlds" or "hubs", large worlds which contain gateways to many other levels. To proceed to the next hub, the character must complete five worlds, gather a certain number of eggs, and defeat a boss. Players do not need to gather every egg to complete the main portion of the game or gain access to new levels; in fact, certain eggs can only be found by returning to the world at a later time. Gems are scattered across the worlds, hidden in crates and jars. These gems are used to bribe a bear named Moneybags to release captured characters and activate things which help Spyro progress through levels. Gems, along with the number of eggs collected, count to the total completion percentage of the game.
The player controls the dragon Spyro for much of the game. Spyro's health is measured by his companion Sparx, a dragonfly who changes color and then disappears after taking progressively more damage. If the player does not have Sparx, then the next hit would cause the player to lose a life and restart at the last saved checkpoint. Consuming small wildlife known as "fodder" regenerates Sparx. Spyro has several abilities, including breathing fire, swimming and diving, gliding, and headbutting, which he can use to explore and combat a variety of enemies, most of which are rhinoceros-like creatures called Rhynocs. Some foes are only vulnerable to certain moves. Spyro can run through "Powerup Gates", which give him special abilities for a limited period.
Year of the Dragon introduces new playable characters ot
|
https://en.wikipedia.org/wiki/Syphon%20Filter%203
|
Syphon Filter 3 is a third-person shooter video game developed by Bend Studio and published by Sony Computer Entertainment for PlayStation. It is the third installment in the Syphon Filter franchise and a sequel to 2000's Syphon Filter 2. It was added on January 17, 2023 as part of PS Plus Premium Classic Catalog.
Plot
Secretary of State Vince Hadden brings in Gabriel Logan, Lian Xing and Lawrence Mujari to testify in Congress about their relationship to the Agency. He believes all three to be guilty, and questions them after they assassinate Shi-Hao from a hotel in Japan. The three do not realize that Hadden is involved in the conspiracy, and is looking for scapegoats.
Gabe begins by describing the first Syphon Filter investigation. He and Lian went to Costa Rica to find missing Agent Ellis. When they arrive, the two see that Erich Rhoemer has ordered Ellis killed, but Gabe must continue his mission and identify what Rhoemer was doing at the drug plantation. Gabe chases Rhoemer onto an airplane despite his Agency superior Edward Benton denying him permission. Gabe did not know back then that Benton and the Agency controlled Rhoemer, who escaped from the plane.
Mujari testifies next, and tells Hadden how he once worked for a resistance during the Apartheid era in South Africa. At the Pugari Gold Mine, he discovered that mining slaves had caught a deadly plague and the mine owners were covering it up. Mujari retrieved samples and gave them to Teresa Lipan.
When it's Lian's turn to testify, she details her first encounter with Gabe during the Soviet–Afghan War and her role in the Costa Rica operation. Meanwhile, Gabe goes to Ireland with MI6 agent Maggie Powers in an effort to scuttle a shipment of Syphon Filter, denying possession to the consortium and the local IRA cell. On board the S.S. Lorelei, Gabe plants several explosives and finds a document that will point to a virus test site in Australia. He also looks for any information on the mysterious arms consortium that controls the Agency. Gabe uncovers a mole in MI6, Nigel Cummings, who is aiding them. He kills Nigel and secures the last viral transport on the docks. The Lorelei is sunk with all hands lost.
Back in Washington, D.C., Gabe talks about his first meeting with Benton during the Soviet–Afghan conflict. Benton claimed to be a CIA agent transporting weapons to Afghans rebelling against the Soviets, but when Gabe and Ellis escorted the convoy, the Afghans attacked them. Gabe reaches Kabul and meets Lian, who sets up the diversion. However, a tank gets in their way, so Gabe destroys it. He learns that Benton was supplying arms to the Soviets, and was really an Agency operative.
As Hadden questions Gabe, Lian teams up with Maggie to abduct Dr. Elsa Weissenger from the Australian test site. Elsa is ready to betray the conspirators since Aramov left her behind, and she has Lian assemble a vaccine for aborigines held captive by Commander Silvers. Silvers plans to kill the test subjects
|
https://en.wikipedia.org/wiki/Twisted%20Metal%3A%20Small%20Brawl
|
Twisted Metal: Small Brawl is a vehicular combat video game developed by Incognito Entertainment and published by Sony Computer Entertainment for the PlayStation. Santa Monica Studio assisted on development. It was released in North America on November 27, 2001.Twisted Metal: Small Brawl is the sixth installment in the Twisted Metal series of video games.
Gameplay
Twisted Metal: Small Brawl is a vehicular combat game in which the player takes control of one of twelve unique remote control vehicles. While in control of a vehicle, the player can accelerate, steer, brake, reverse, activate the turbo, turn tightly, toggle between and activate weapons using the game controller's d-pad, analog sticks and buttons.
Development
Tentatively titled Twisted Metal Kids during production, the game was announced under the title at a press event for Twisted Metal: Black in Santa Monica, California on March 2, 2001. The official title of Twisted Metal: Small Brawl was revealed at the Electronic Entertainment Expo on May 16. The game utilizes a physics engine based on what was used in Twisted Metal 2: World Tour.
Reception
Twisted Metal: Small Brawl received mixed reviews from critics. Trevor Rivers of GameSpot concluded that "some will immediately be turned away by the graphics and others by the more childish design, but if your PlayStation is still kicking, you might want to check it out". Play Magazine speculated that "this must be where Martha Stewart's evil siblings reside". The Badger of GameZone noted that the graphics felt "very unfinished" and the changes included in the game "[lacked] any real depth". Official U.S. PlayStation Magazine said that the game "isn't a bad game by any means, but it feels like a definite step in the wrong direction". GamePro said that the gameplay was "laboriously slow" and that "there's no real sense of speed". Mark Fujita of IGN remarked that the game's graphics, sound, gameplay and level design were all worse than previous Twisted Metal titles, criticizing the graphics as "appalling" and the menus as "horrendous". Kraig Kujawa of Electronic Gaming Monthly cited the "plumber's ass that sticks out from underneath the sink in the kitchen level" as the best feature in the game, while Shane Bettenhausen warned that "series veterans won't be impressed", and Christian Nutt dismissed the game as "a slapdash, sloppy and unimaginative retrofit". Andy McNamara of Game Informer remarked that the game "doesn't even live up to the first four PSX titles in the series".
Notes
References
External links
2001 video games
Incognito Entertainment games
Multiplayer and single-player video games
North America-exclusive video games
PlayStation (console) games
PlayStation (console)-only games
Santa Monica Studio games
Sony Interactive Entertainment games
Twisted Metal
Vehicular combat games
Video games developed in the United States
|
https://en.wikipedia.org/wiki/Anime%20Web%20Turnpike
|
Anime Web Turnpike (also known as Anipike) was a web directory founded in August 1995 by Jay Fubler Harvey. It served as a large database of links to various anime and manga websites. With well over 40,000 links, it had one of the largest organized collection of anime and manga related links. Users could add their own website to the database by setting up a username on the site and adding it to the applicable category. The website also had services such as a community forum, chat room and a magazine. The Anime Broadcasting Network, Inc. acquired the Anime Web Turnpike in 2000 with plans to enhance and expand the site, but multiple technical issues delayed these plans. As of Nov 2014, the site has gone offline. The site was back online as of July 2016, with no new posts since 2014. As of March 2021, the website has not been updated.
Reception
In 1995, the site was mentioned among 101 Internet sites to visit. The site and its creator were featured in the 2003 documentary film Otaku Unite! In 2003, Anime Web Turnpike was ranked the number three "must visit" anime website by the online magazine Animefringe.
References
External links
Official Website
Anime Web Turnpike
Anime and manga websites
Internet properties established in 1995
Web directories
|
https://en.wikipedia.org/wiki/WTIC-TV
|
WTIC-TV (channel 61) is a television station in Hartford, Connecticut, United States, serving the Hartford–New Haven market as an affiliate of the Fox network. It is owned by Tegna Inc. alongside Waterbury-licensed CW affiliate WCCT-TV (channel 20). Both stations share studios on Broad Street in downtown Hartford, while WTIC-TV's transmitter is located on Rattlesnake Mountain in Farmington.
The station was established in 1984 as an independent station, securing the Fox affiliation at the network's launch in 1986. The affiliation gave the station ratings success and the backing to launch a local newscast. From 2000 to 2013, the station was co-owned with the Hartford Courant, which led to newsroom collaboration and a significant expansion of local news programming as well as legal cases and criticism of the cross-ownership of the newspaper and the TV station. Tegna acquired WTIC-TV in 2019 as the result of divestitures related to the merger of Tribune Media with Nexstar Media Group.
History
Prior use of channel 61 in Hartford
Even though ultra high frequency (UHF) channel 61 had been allotted to Hartford since the mid-1960s, it was still not used by a full-power TV station by the end of the 1970s. However, there had been some interest in the allocation. Under the name of Kappa Television Corporation, a man from Rowayton applied in 1965 for a construction permit. His proposed station, WUHF-TV, would have focused on local sports and news coverage. It was intended to launch in 1967, but Kappa was unable to raise the money to build the station in the face of increased costs for color television equipment. As a result, in late 1968, the firm filed to sell its permit to Evans Broadcasting Corporation, a business of Thomas Mellon Evans. The Federal Communications Commission (FCC) approved the deal in April 1970, but Evans never went through with the purchase, and the permit was forfeited in 1971. There was also one group that stated its intention to file for the permit in 1973.
As the full-power allocation of channel 61 lay fallow, the FCC permitted its use by two translator stations during the 1970s. The first was established by Connecticut Public Television (CPTV), which built a translator to improve service to Waterbury in 1973. A second went on the air from Hartford in September 1980, rebroadcasting the programming of Spanish-language station WXTV in the New York City area.
Comparative hearing and construction
The successful advent of subscription television (STV) in the late 1970s led a number of applicants to express their interest in channel 61 in Hartford. The first two groups to do so each had plans to introduce STV on their stations: Golden West Broadcasters, the Los Angeles-based media company owned by Gene Autry, and Hartford Television, a subsidiary of the fledgling Sinclair Broadcast Group.
A third company, Arch Communications, entered the bidding in November 1979. Arch was a locally based consortium headed by Arnold Chase, the 28-year
|
https://en.wikipedia.org/wiki/Jacob%20Ziv
|
Jacob Ziv (; 27 November 1931 – 25 March 2023) was an Israeli electrical engineer and information theorist who developed the LZ family of lossless data compression algorithms alongside Abraham Lempel.
Biography
Born in Tiberias, British mandate Palestine, on 27 November 1931, Ziv received his B.Sc., Dip. Eng. (1954) and M.Sc. degrees (1957) in electrical engineering from the Technion – Israel Institute of Technology, and his D.Sc. degree, receiving the degree from the Massachusetts Institute of Technology in 1962. In 1970, Ziv joined the Technion – Israel Institute of Technology and was the Herman Gross Professor of Electrical Engineering and a Technion Distinguished Professor.
Ziv was dean of the Faculty of Electrical Engineering from 1974 to 1976 and vice president for Academic Affairs from 1978 to 1982. From 1987, Ziv had spent three sabbatical leaves at the Information Research Department of Bell Laboratories in Murray Hill, New Jersey.
From 1955 to 1959, he served as a senior research engineer for the Scientific Department of the Israel Ministry of Defense, focused on research and development of communication systems. While studying for his doctorate at M.I.T. from 1961 to 1962, he joined the Applied Science Division of Melpar, Inc. in Watertown, Massachusetts, where he was a senior research engineer performing research in communication theory. In 1962 he returned to the Israel Ministry of Defense's scientific department, as head of the Communications Division and was also a contributor to the Faculty of Electrical Engineering, Technion – Israel Institute of Technology. From 1968 to 1970 he was one of the technical staff members of Bell Laboratories, Inc., and, from 1985 to 1991, was the chairman of the Israeli Universities Planning and Grants Committee. He was also a member of the Israel Academy of Sciences and Humanities from 1981 to his death, and he served as its president between 1995 and 2004.
Ziv died on 25 March 2023, at age 91.
Awards
In 1993, Ziv was awarded the Israel Prize, for exact sciences. Ziv received in 1995 the IEEE Richard W. Hamming Medal, for "contributions to information theory, and the theory and practice of data compression", and in 1998 a Golden Jubilee Award for Technological Innovation from the IEEE Information Theory Society.
Ziv is the recipient of the 1997 Claude E. Shannon Award from the IEEE Information Theory Society and the 2008 BBVA Foundation Frontiers of Knowledge Award in the category of Information and Communication Technologies. In 2021, Ziv has been awarded the IEEE Medal of Honor, the highest recognition from IEEE, "for fundamental contributions to information theory and data compression technology, and for distinguished research leadership".
Ziv was elected to the American Philosophical Society in 2003 and the National Academy of Sciences in 2004.
See also
List of Israel Prize recipients
Lectures
1992 - Information measures of individual sequences with application to universal data com
|
https://en.wikipedia.org/wiki/Top%2040%20Tracks
|
Top 40 Tracks was a chart from Billboard magazine. It debuted in the issue dated December 5, 1998 to preserve the notion of Hot 100 Airplay when it expanded to include airplay data from radio stations of other formats such as R&B, rock and country. The Top 40 Tracks was compiled by measuring audience impressions (based on a station's ratings and when a song is played) from Mainstream Top 40, Rhythmic Top 40, and Adult Top 40 radio stations.
The chart was discontinued effective from issue date February 12, 2005, concurrent with the introduction of the Pop 100 and Pop 100 Airplay charts.
List of Top 40 Tracks number-one singles
References
Billboard charts
|
https://en.wikipedia.org/wiki/Social%20peer-to-peer%20processes
|
Social peer-to-peer processes are interactions with a peer-to-peer dynamic. These peers can be humans or computers. Peer-to-peer (P2P) is a term that originated from the popular concept of the P2P distributed computer application architecture which partitions tasks or workloads between peers. This application structure was popularized by file sharing systems like Napster, the first of its kind in the late 1990s.
The concept has inspired new structures and philosophies in many areas of human interaction. P2P human dynamic affords a critical look at current authoritarian and centralized social structures. Peer-to-peer is also a political and social program for those who believe that in many cases, peer-to-peer modes are a preferable option.
Definition
P2P is a specific form of relational dynamic, based on the assumed equipotency of its participants, organized through the free cooperation of equals in view of the performance of a common task, for the creation of a common good, with forms of decision making and autonomy that are widely distributed throughout the network.
There are several fundamental aspects of social P2P processes:
peer production - the collaborative production of use-value is open to participation and use to the widest possible number (as defined by Yochai Benkler, in his essay Coase's Penguin);
peer governance - production or project is governed by the community of producers themselves, not by market allocation or corporate hierarchy;
peer property - the use-value of property is freely accessible on a universal basis; peer services and products are distributed through new modes of property, which are not exclusive, though recognize individual authorship (i.e. the GNU General Public License or the Creative Commons licenses).
Peer production does not produce commodities for exchange value and does not use the price mechanism or corporate hierarchy to determine the allocation of resources. It must, therefore, be distinguished from both the capitalist market (though it can be linked and embedded in the broader market) and from production through state and corporate planning; as a mode of governance it differs from traditional linear hierarchies; and as a mode of property it differs from both traditional private property and state-based collective public property; it is rather the common property of its producers and users and the whole of humankind. Unlike private property, peer property is inclusive rather than exclusive — its nature is to share ownership as widely, rather than as narrowly, as possible.
Characteristics
P2P processes are not structureless but are characterized by dynamic and changing structures that adapt themselves to phase changes. Its rules are not derived from external authority, as in hierarchical systems, but are generated from within. It does not deny ‘authority’, but only fixed forced hierarchy, and therefore accepts authority based on expertise, initiation of the project, etc. P2P may be the first t
|
https://en.wikipedia.org/wiki/MDAC
|
MDAC may refer to:
Mental Disability Advocacy Center
Microsoft Data Access Components
Mississippi Department of Agriculture and Commerce
Multiple-dose activated charcoal
Multiplying digital-to-analog converter
Muscular Dystrophy Association of Canada
|
https://en.wikipedia.org/wiki/Crimeware
|
Crimeware is a class of malware designed specifically to automate cybercrime.
Crimeware (as distinct from spyware and adware) is designed to perpetrate identity theft through social engineering or technical stealth in order to access a computer user's financial and retail accounts for the purpose of taking funds from those accounts or completing unauthorized transactions on behalf of the cyberthief. Alternatively, crimeware may steal confidential or sensitive corporate information. Crimeware represents a growing problem in network security as many malicious code threats seek to pilfer valuable, confidential information.
The cybercrime landscape has shifted from individuals developing their own tools to a market where crimeware, tools and services for illegal online activities, can be easily acquired in online marketplaces. These crimeware markets are expected to expand, especially targeting mobile devices.
The term crimeware was coined by David Jevans in February 2005 in an Anti-Phishing Working Group response to the FDIC article "Putting an End to Account-Hijacking Identity Theft," which was published on December 14, 2004.
Examples
Criminals use a variety of techniques to steal confidential data through crimeware, including through the following methods:
Surreptitiously install keystroke loggers to collect sensitive data—login and password information for online bank accounts, for example—and report them back to the thief.
Redirect a user's web browser to a counterfeit website controlled by the thief even when the user types the website's proper domain name in the address bar, also known as pharming.
Steal passwords cached on a user's system.
Hijack a user session at a financial institution and drain the account without the user's knowledge.
Enable remote access into applications, allowing criminals to break into networks for malicious purposes.
Encrypt all data on a computer and require the user to pay a ransom to decrypt it (ransomware).
Delivery vectors
Crimeware threats can be installed on victims' computers through multiple delivery vectors, including:
Vulnerabilities in Web applications. The Bankash.G Trojan, for example, exploited an Internet Explorer vulnerability to steal passwords and monitor user input on webmail and online commerce sites.
Targeted attacks sent via SMTP. These social-engineered threats often arrive disguised as a valid e-mail message and include specific company information and sender addresses. The malicious e-mails use social engineering to manipulate users to open the attachment and execute the payload.
Remote exploits that exploit vulnerabilities on servers and clients
Concerns
Crimeware can have a significant economic impact due to loss of sensitive and proprietary information and associated financial losses. One survey estimates that in 2005 organizations lost in excess of $30 million due to the theft of proprietary information. The theft of financial or confidential information from corpora
|
https://en.wikipedia.org/wiki/Camlp4
|
Camlp4 is a software system for writing extensible parsers for programming languages. It provides a set of OCaml libraries that are used to define grammars as well as loadable syntax extensions of such grammars. Camlp4 stands for Caml Preprocessor and Pretty-Printer and one of its most important applications was the definition of domain-specific extensions of the syntax of OCaml.
Camlp4 was part of the official OCaml distribution which is developed at the INRIA. Its original author is Daniel de Rauglaudre. OCaml version 3.10.0, released in May 2007, introduced a significantly modified and backward-incompatible version of Camlp4. De Rauglaudre maintains a separate backward-compatible version, which has been renamed Camlp5. All of the examples below are for Camlp5 or the previous version of Camlp4 (versions 3.09 and prior).
Version 4.08, released in the summer of 2019, was the last official version of this library. It is currently deprecated; instead, it is recommended to use the PPX (PreProcessor eXtensions) libraries.
Concrete and abstract syntax
A Camlp4 preprocessor operates by loading a collection of compiled modules which define a parser as well as a pretty-printer: the parser converts an input program into an internal representation. This internal representation constitutes the abstract syntax tree (AST). It can be output in a binary form, e.g. it can be passed directly to one of the OCaml compilers, or it can be converted back into a clear text program. The notion of concrete syntax refers to the format in which the abstract syntax is represented.
For instance, the OCaml expression (1 + 2) can also be written ((+) 1 2) or (((+) 1) 2). The difference is only at the level of the concrete syntax, since these three versions are equivalent representations of the same abstract syntax tree. As demonstrated by the definition of a revised syntax for OCaml, the same programming language can use different concrete syntaxes. They would all converge to an abstract syntax tree in a unique format that a compiler can handle.
The abstract syntax tree is at the center of the syntax extensions, which are in fact OCaml programs. Although the definition of grammars must be done in OCaml, the parser that is being defined or extended is not necessarily related to OCaml, in which case the syntax tree that is being manipulated is not the one of OCaml. Several libraries are provided which facilitate the specific manipulation of OCaml syntax trees.
Fields of application
Domain-specific languages are a major application of Camlp4. Since OCaml is a multi-paradigm language, with an interactive toplevel and a native code compiler, it can be used as a backend for any kind of original language. The only thing that the developer has to do is write a Camlp4 grammar which converts the domain-specific language in question into a regular OCaml program. Other target languages can also be used, such as C.
If the target language is OCaml, simple syntax add-ons or syntact
|
https://en.wikipedia.org/wiki/The%20Hobbit%20%281982%20video%20game%29
|
The Hobbit is an illustrated text adventure computer game released in 1982 for the ZX Spectrum home computer and based on the 1937 book The Hobbit, by J. R. R. Tolkien. It was developed at Beam Software by Philip Mitchell and Veronika Megler and published by Melbourne House. It was later converted to most home computers available at the time including the Commodore 64, BBC Micro, and Oric computers. By arrangement with the book publishers, a copy of the book was included with each game sold.
The parser was very advanced for the time and used a subset of English called Inglish. When it was released, most adventure games used simple verb-noun parsers (allowing for simple phrases like "get lamp"), but Inglish allowed the player to type advanced sentences such as "ask Gandalf about the curious map then take sword and kill troll with it". The parser was complex and intuitive, introducing pronouns, adverbs ("viciously attack the goblin"), punctuation and prepositions and allowing the player to interact with the game world in ways not previously possible.
Gameplay
Many locations are illustrated by an image, based on originals designed by Kent Rees. On the tape version, to save space, each image was stored in a compressed format by storing outline information and then flood filling the enclosed areas on the screen. The slow CPU speed meant that it would take up to several seconds for each scene to draw. The disk-based versions of the game used pre-rendered, higher-quality images.
The game has an innovative text-based physics system, developed by Veronika Megler. Objects, including the characters in the game, have a calculated size, weight, and solidity. Objects can be placed inside other objects, attached together with rope and damaged or broken. If the main character is sitting in a barrel and this barrel is then picked up and thrown through a trapdoor, the player would go through.
Unlike other works of interactive fiction, the game is also in real time, insofar as a period of idleness causes the "WAIT" command to be automatically invoked and the possibility of events occurring as a result. This can be suppressed by entering the "PAUSE" command, which stops all events until a key is pressed.
The game has a cast of non-player characters (NPCs) entirely independent of the player and bound to precisely the same game rules. They have loyalties, strengths, and personalities that affect their behaviour and cannot always be predicted. The character of Gandalf, for example, would roam freely around the game world (some fifty locations), picking up objects, getting into fights and being captured.
The volatility of the characters, coupled with the rich physics and impossible-to-predict fighting system, enabled the game to be played in many different ways, though this would also lead to problems (such as an important character being killed early on). There are numerous possible solutions and with hindsight, the game might be regarded as one of the first exam
|
https://en.wikipedia.org/wiki/MUSASINO-1
|
The MUSASINO-1 was one of the earliest electronic digital computers built in Japan. Construction started at the Electrical Communication Laboratories of NTT at Musashino, Tokyo in 1952 and was completed in July 1957. The computer was used until July 1962. Saburo Muroga, a University of Illinois visiting scholar and member of the ILLIAC I team, returned to Japan and oversaw the construction of MUSASINO-1.
Using 519 vacuum tubes and 5,400 parametrons, the MUSASINO-1 possessed a magnetic core memory, initially of 32 (later expanded to 256) words. A word was composed of 40 bits, and two instructions could be stored in a single word. Addition time was clocked at 1,350 microseconds, multiplication at 6,800 microseconds, and division time at 26.1 milliseconds.
The MUSASINO-1's instruction set was a superset of the ILLIAC I's instructions, so it could generally use the latter's software. However, many of the programs for the ILLIAC used some of the unused bits in the instructions to store data, and these would be interpreted as a different instructions by the MUSASINO-1 control circuitry.
See also
FUJIC
ILLIAC I
List of vacuum-tube computers
References
Raúl Rojas and Ulf Hashagen, ed. The First Computers: History and Architectures. 2000, MIT Press, .
In memory of Saburo Muroga, CS @ Illinois Alumni Magazine, Summer 2011
External links
Descriptions of the MUSASINO-1 and its immediate successors at the IPSJ Computer Museum
IAS architecture computers
40-bit computers
Vacuum tube computers
Magnetic logic computers
|
https://en.wikipedia.org/wiki/The%20Trouble%20with%20Trillions
|
"The Trouble with Trillions" is the twentieth episode in the ninth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on April 5, 1998. It was written by Ian Maxtone-Graham and directed by Swinton O. Scott III. The episode sees Homer being sent by the Federal Bureau of Investigation to try to obtain a trillion dollar bill that Mr. Burns failed to deliver to Europe during the post-war era.
Plot
All of Springfield celebrates the arrival of the New Year except for Ned Flanders, who instead focuses on filing his tax returns. A few months later, as all of Springfield rushes to send out their returns just before midnight on April 15, Homer realizes he did not file his. He rushes and provides false information before delivering it to the post office. However, at the IRS the somewhat spherical package containing Homer's tax returns bounces into a “Severe Audit” bin, and the government arrests him for tax fraud. To avoid prison, Homer agrees to help Agent Johnson of the FBI. With a hidden microphone under his shirt, Homer uncovers that his coworker Charlie is leading a militia planning to assault all government officials, and has him arrested by the FBI for conspiracy.
Impressed, Johnson reveals to Homer that in 1945, President Harry S. Truman printed a one trillion-dollar bill to help reconstruct post-war Western Europe and enlisted Montgomery Burns to transport the bill. However, it never arrived and the FBI suspects Burns still has it with him. Homer is sent in to investigate. At the Burns estate, Homer searches for the bill before Burns, who believes Homer is a reporter from Collier's magazine, reveals that he keeps it in his wallet. Johnson and Agent Miller burst in and arrest Burns, who, insisting he's innocent, protests that the government oppresses the average American. Moved by Burns' speech, Homer knocks out the FBI agents and frees Burns.
The two men go to Smithers, who suggests they leave the country. Burns takes Smithers and Homer in his old plane, setting off to find an island and start a new country. The three land in Cuba and appear before Fidel Castro. Burns tries to buy the island, but Castro foils his plan when he asks to see the trillion-dollar bill and then refuses to give it back. Later, Burns, Smithers, and Homer are on a makeshift raft. Smithers asks whether Burns will be facing jail time; Burns replies that, if it is a crime to love one's country or steal a trillion dollars or bribe a jury, he is guilty.
Production
The episode was written by Ian Maxtone-Graham, though the original draft of the plot was much different. Originally, Homer was to learn that he was a Native American, and would try to exploit it to not have to pay taxes. The idea had been going well for a few days, but the staff did not actually know whether Native Americans had to pay taxes. When the writers found out that they did, the whole plot had to be scrapped. Executive producer Mike Sc
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.