chunk stringlengths 0 39.4k | embedding listlengths 1.02k 1.02k |
|---|---|
References
External links
Dragon's Lair Project
arcade-history.com
1984 video games
Arcade video games
Konami games
LaserDisc video games
MSX games
Video games developed in Japan
Western (genre) video games
Konami arcade games | [
-0.1618652344,
-0.4714355469,
-0.1359863281,
-0.09375,
-0.3784179688,
0.3625488281,
-0.3020019531,
-1.1611328125,
0.3686523438,
-0.3901367188,
-0.5161132812,
0.064453125,
-1.05078125,
0.9594726562,
-0.000449419,
0.3747558594,
-0.4921875,
-0.6020507812,
0.1270751953,
0.068298339... |
Alice Burks (née Rowe, August 20, 1920 – November 21, 2017) was an American author of children's books and books about the history of electronic computers. Burks was born as Alice Rowe in East Cleveland, Ohio, in 1920. She began her undergraduate degree at Oberlin College on a competitive mathematics scholarship and tr... | [
-0.357421875,
-0.5634765625,
0.1967773438,
0.3728027344,
-0.28125,
0.15625,
-0.76171875,
0.2783203125,
-0.3103027344,
-0.2211914062,
0.9702148438,
0.4645996094,
-0.8994140625,
1.1953125,
-0.5864257812,
0.3549804688,
-0.3210449219,
0.2785644531,
-1.197265625,
-0.3627929688,
0.... |
Starting in the 1970s following the decision of Honeywell v. Sperry Rand, the federal court case that invalidated the ENIAC patent, she and husband Arthur championed the work of John Vincent Atanasoff, the Iowa State College physics professor whom the court had ruled invented the first electronic digital computer (a ma... | [
-0.1153564453,
-0.0856933594,
0.5732421875,
0.3095703125,
-0.1765136719,
0.89453125,
-0.7045898438,
-0.1361083984,
-0.0559997559,
-0.0732421875,
1.015625,
0.87890625,
-0.2250976562,
1.568359375,
-0.5229492188,
-0.0618591309,
-0.3288574219,
-0.1539306641,
-1.328125,
0.0317993164... |
Failing badly and failing well are concepts in systems security and network security (and engineering in general) describing how a system reacts to failure. The terms have been popularized by Bruce Schneier, a cryptographer and security consultant. Failing badly
A system that fails badly is one that has a catastrophic ... | [
-0.2420654297,
-0.6098632812,
-0.990234375,
-0.2626953125,
-0.9907226562,
0.2565917969,
-0.712890625,
-0.2912597656,
-0.9174804688,
0.2491455078,
-0.0249328613,
0.607421875,
-0.4738769531,
0.9458007812,
-0.2827148438,
-0.2086181641,
-0.1132202148,
-0.3833007812,
-0.2858886719,
... |
Examples include:
Compartmentalized hulls in watercraft, ensuring that a hull breach in one compartment will not flood the entire vessel. Databases that do not allow downloads of all data in one attempt, limiting the amount of compromised data. Structurally redundant buildings conceived to resist loads beyond those ex... | [
-0.1208496094,
0.4467773438,
-0.0369567871,
0.4321289062,
-0.4047851562,
-0.1408691406,
-0.1837158203,
-0.5439453125,
-0.6845703125,
0.0200500488,
0.814453125,
0.6284179688,
-0.2419433594,
0.8481445312,
-0.1844482422,
-0.4836425781,
-0.3623046875,
0.6220703125,
0.5522460938,
-0... |
CTL* is a superset of computational tree logic (CTL) and linear temporal logic (LTL). It freely combines path quantifiers and temporal operators. Like CTL, CTL* is a branching-time logic. The formal semantics of CTL* formulae are defined with respect to a given Kripke structure. History
LTL had been proposed for the ... | [
-0.114440918,
0.1134033203,
-0.1005249023,
0.1732177734,
-0.0931396484,
-0.4353027344,
-0.0905761719,
0.1846923828,
-0.8662109375,
-0.2631835938,
1.04296875,
-0.7163085938,
-0.7900390625,
-0.051361084,
-1.2724609375,
0.1561279297,
-0.3952636719,
0.0974731445,
0.3884277344,
0.06... |
However, in CTL, every temporal operator () has to be directly preceded by a quantifier, while in CTL* this is not required. The universal path quantifier may be defined in CTL* in the same way as for classical predicate calculus , although this in not possible in the CTL fragment. Examples of formulae
CTL* formula... | [
0.0180969238,
0.2602539062,
0.1174316406,
0.5126953125,
-0.6591796875,
-0.0812988281,
-0.0250244141,
0.1929931641,
-1.2685546875,
-0.0473632812,
0.2448730469,
-0.4321289062,
-0.580078125,
-0.3894042969,
-0.4299316406,
0.0500793457,
0.3371582031,
-0.1265869141,
-0.287109375,
-0.... |
DOI= 10.1109/SFCS.1977.32
E. Allen Emerson, Joseph Y. Halpern: "Sometimes" and "not never" revisited: on branching versus linear time temporal logic. J. ACM 33, 1 (Jan. 1986), 151–178. DOI= http://doi.acm.org/10.1145/4904.4999
Ph. Schnoebelen: The Complexity of Temporal Logic Model Checking. Advances in Modal Logic 2... | [
-0.0892333984,
-0.2396240234,
0.9521484375,
-0.1994628906,
-0.1647949219,
-0.1331787109,
-0.0614318848,
-0.0998535156,
-1.482421875,
0.2100830078,
0.5009765625,
0.0924072266,
-1.109375,
0.3073730469,
-0.5170898438,
-0.3444824219,
0.0616760254,
0.4794921875,
0.1644287109,
-0.424... |
Grupa Lotos S.A. is a vertically integrated oil company based in Gdańsk, Poland. The company is listed in the Polish index WIG30. The Polish state is the majority shareholder with 53% percent. The company's main activity branches are: crude oil production, refining and marketing of oil products. The company is a leader... | [
0.98046875,
-0.2678222656,
-0.6098632812,
0.4299316406,
0.4528808594,
0.5810546875,
-0.8422851562,
0.2360839844,
0.8979492188,
-0.2951660156,
-0.515625,
0.5458984375,
0.8315429688,
-0.1024169922,
0.6176757812,
-0.0913085938,
-0.57421875,
0.3051757812,
0.4396972656,
0.0572814941... |
Grupa Lotos holding group consolidated net profit for whole 2005 financial year, estimated in accordance with IFRS reached approx. PLN 970 million. This is circa PLN 426 million more comparing to financial data from 2004. Capacity
Gdańsk refinery, owned by Grupa Lotos S.A., refines 6 million tons of crude oil per year... | [
0.4223632812,
-0.0410461426,
0.3415527344,
0.1419677734,
0.0498046875,
0.228515625,
-0.751953125,
-0.1329345703,
0.6108398438,
-0.6962890625,
-0.6879882812,
0.3564453125,
0.4196777344,
0.1920166016,
0.9091796875,
0.2897949219,
-0.7255859375,
0.5415039062,
0.1156616211,
0.367675... |
An incompressible string is a string with Kolmogorov complexity equal to its length, so that it has no shorter encodings. Example
Suppose we have the string 12349999123499991234, and we are using a compression method that works by putting a special character into the string (say '@') followed by a value that points to... | [
-0.8315429688,
-0.4172363281,
-0.9990234375,
-0.31640625,
-0.9208984375,
1.0458984375,
-0.173828125,
0.2873535156,
-1.4775390625,
-0.2507324219,
0.1728515625,
0.2863769531,
-0.3239746094,
0.0405883789,
0.7055664062,
0.466796875,
-0.2958984375,
-0.080078125,
-0.8774414062,
-0.34... |
If we were to store 88 and 99 in our dictionary, we would produce:
1234@1@1@0@04321
Unfortunately this is just as long as the original string, because our placeholders for items in the dictionary are 2 characters long, and the items they replace are the same length. Hence, this string is incompressible by our algorit... | [
-0.4187011719,
-1.0634765625,
-0.6938476562,
-0.1623535156,
-0.2183837891,
0.6962890625,
0.1856689453,
0.701171875,
-0.5395507812,
-0.224609375,
0.2047119141,
0.6791992188,
-0.0967407227,
0.8051757812,
0.275390625,
0.3154296875,
-0.7172851562,
-0.4455566406,
-0.583984375,
-0.45... |
In topology, Borel−Moore homology or homology with closed support is a homology theory for locally compact spaces, introduced by Armand Borel and John Moore in 1960. For reasonable compact spaces, Borel−Moore homology coincides with the usual singular homology. For non-compact spaces, each theory has its own advantages... | [
-0.2386474609,
-0.6049804688,
-0.8305664062,
0.1585693359,
-0.4274902344,
-0.3322753906,
-0.1320800781,
1.5546875,
0.3039550781,
0.39453125,
0.3022460938,
0.197265625,
0.2171630859,
-0.5234375,
0.6694335938,
-0.1638183594,
0.0919799805,
-0.546875,
0.2592773438,
-0.2255859375,
... |
In more detail, let be the abelian group of formal (infinite) sums
where σ runs over the set of all continuous maps from the standard i-simplex Δi to X and each aσ is an integer, such that for each compact subset S of X, only finitely many maps σ whose image meets S have nonzero coefficient in u. Then the usual defin... | [
0.029006958,
-0.5668945312,
0.1872558594,
0.2917480469,
-0.958984375,
-0.3881835938,
0.0789794922,
1.6396484375,
0.2418212891,
0.0908813477,
-0.1901855469,
-0.3850097656,
-0.041015625,
-0.3435058594,
0.84765625,
0.2568359375,
0.0699462891,
-0.2076416016,
-0.0982666016,
0.417236... |
Properties
Borel−Moore homology is a covariant functor with respect to proper maps. That is, a proper map f: X → Y induces a pushforward homomorphism for all integers i. In contrast to ordinary homology, there is no pushforward on Borel−Moore homology for an arbitrary continuous map f. As a counterexample, one can con... | [
-0.5434570312,
-1.2109375,
-0.0115509033,
0.4748535156,
0.1411132812,
-0.7548828125,
-0.4221191406,
0.8955078125,
0.0835571289,
0.658203125,
0.2897949219,
0.1920166016,
0.1041259766,
-0.5024414062,
0.837890625,
0.3598632812,
-0.3015136719,
0.0903320312,
-0.38671875,
0.097839355... |
In fact, in Borel−Moore homology, one can define a fundamental class for arbitrary (possibly singular) complex varieties. In this case the set of smooth points has complement of (real) codimension at least 2, and by the long exact sequence above the top dimensional homologies of and are canonically isomorphic. The f... | [
0.3388671875,
-1.0439453125,
-0.022354126,
0.0528259277,
-0.4387207031,
-0.2751464844,
-0.5053710938,
1.712890625,
-0.1298828125,
0.4052734375,
-0.5869140625,
-0.0122146606,
-0.0231323242,
0.0527038574,
0.8813476562,
-0.505859375,
-0.0363769531,
-0.5317382812,
-0.6918945312,
-0... |
Notice the previous computation with the fact that Borel-Moore homology is an isomorphism invariant gives this computation for the case . In general, we will find a -class corresponding to a loop around a point, and the fundamental class in . Double Cone
Consider the double cone . If we take then the long exact seque... | [
-0.3737792969,
-1.095703125,
0.2619628906,
0.4467773438,
-0.25,
0.0439147949,
-0.3930664062,
1.1650390625,
0.084777832,
0.3547363281,
-0.5634765625,
0.1793212891,
-0.39453125,
-0.2907714844,
0.0699462891,
-0.2932128906,
0.1575927734,
-0.5400390625,
-0.1975097656,
-0.2756347656,... |
The Burns stanza is a verse form named after the Scottish poet Robert Burns, who used it in some fifty poems. It was not, however, invented by Burns, and prior to his use of it was known as the standard Habbie, after the piper Habbie Simpson (1550–1620). It is also sometimes known as the Scottish stanza or six-line sta... | [
-0.447265625,
-0.7504882812,
-0.1437988281,
0.1055297852,
0.18359375,
0.4604492188,
-0.7861328125,
0.1746826172,
-1.1953125,
-0.3835449219,
-0.3801269531,
-0.2919921875,
0.478515625,
-0.4736328125,
0.2214355469,
0.41015625,
-0.2221679688,
-0.4489746094,
-0.4833984375,
0.2038574... |
This form is deployed, for example, in W. H. Auden's poem "Brother, who when the sirens roar" (also known as "A Communist to Others"):
Auden uses similar verse forms in other poems in the collection Look, Stranger! (also known as On This Island), such as "The Witnesses" and "Out on the Lawn I Lie in Bed" (also known a... | [
-0.7924804688,
-0.3154296875,
-0.0541381836,
0.4455566406,
0.470703125,
0.2006835938,
-0.4848632812,
0.0916748047,
-0.7421875,
-0.0014371872,
-0.2435302734,
0.611328125,
0.0072517395,
-0.1336669922,
1.0380859375,
0.2271728516,
0.0166320801,
0.6513671875,
-0.6884765625,
-0.18945... |
The following tables list the computational complexity of various algorithms for common mathematical operations. Here, complexity refers to the time complexity of performing computations on a multitape Turing machine. See big O notation for an explanation of the notation used. Note: Due to the variety of multiplication... | [
-1.189453125,
-0.2053222656,
-0.5888671875,
-0.3032226562,
-0.6625976562,
0.4208984375,
0.1707763672,
0.4724121094,
-0.4465332031,
-0.4936523438,
0.900390625,
-0.359375,
-0.0467224121,
-0.212890625,
-0.7485351562,
-0.4484863281,
0.1488037109,
-0.1435546875,
-0.9975585938,
-0.20... |
In 2005, Henry Cohn, Robert Kleinberg, Balázs Szegedy, and Chris Umans showed that either of two different conjectures would imply that the exponent of matrix multiplication is 2. Transforms
Algorithms for computing transforms of functions (particularly integral transforms) are widely used in all areas of mathematics,... | [
-0.5532226562,
0.36328125,
-0.83984375,
1.0751953125,
-0.53125,
0.4213867188,
0.2283935547,
0.2095947266,
-0.0292205811,
-0.6025390625,
1.384765625,
-0.3530273438,
-0.0091781616,
0.1727294922,
-0.6381835938,
-0.271484375,
-0.591796875,
0.7104492188,
-0.3657226562,
0.52734375,
... |
An internal sort is any data sorting process that takes place entirely within the main memory of a computer. This is possible whenever the data to be sorted is small enough to all be held in the main memory. For sorting larger datasets, it may be necessary to hold only a chunk of data in memory at a time, since it won’... | [
0.021697998,
-0.6694335938,
-1.3623046875,
-0.1015625,
-1.564453125,
0.1036987305,
-0.1240844727,
0.3178710938,
-0.5458984375,
-0.0411987305,
-0.1755371094,
0.1879882812,
-0.1083374023,
1.2109375,
-0.2434082031,
-0.0433654785,
-0.3696289062,
-0.580078125,
-0.4221191406,
-0.1770... |
If the data can all be held in memory as one large chunk, then this performance hit is avoided. On the other hand, some algorithms handle external sorting rather better. A Merge sort breaks the data up into chunks, sorts the chunks by some other algorithm (maybe bubblesort or Quick sort) and then recombines the chunks ... | [
0.5283203125,
-0.4521484375,
-1.51953125,
0.4704589844,
-1.4794921875,
0.5395507812,
-0.5004882812,
-0.0361938477,
-0.8544921875,
-0.0444946289,
-0.4558105469,
0.6752929688,
0.0335083008,
1.173828125,
-0.3559570312,
0.6782226562,
0.0175018311,
-0.5751953125,
0.1412353516,
-0.16... |
The correspondence problem refers to the problem of ascertaining which parts of one image correspond to which parts of another image, where differences are due to movement of the camera, the elapse of time, and/or movement of objects in the photos. Correspondence is a fundamental problem in computer vision — influentia... | [
0.3188476562,
-0.1752929688,
-0.1857910156,
0.1263427734,
0.0256652832,
0.30078125,
0.5087890625,
0.3559570312,
-0.2108154297,
0.5668945312,
0.2648925781,
0.1313476562,
0.357421875,
1.05859375,
0.0800170898,
-0.3435058594,
0.019744873,
0.0298614502,
0.4367675781,
0.0091018677,
... |
The correspondence problem can occur in a stereo situation when two images of the same scene are used, or can be generalised to the N-view correspondence problem. In the latter case, the images may come from either N different cameras photographing at the same time or from one camera which is moving relative to the sce... | [
0.564453125,
0.1450195312,
0.2178955078,
0.6313476562,
0.4177246094,
0.1826171875,
0.5395507812,
0.3298339844,
-0.3044433594,
0.6982421875,
0.7265625,
0.1744384766,
0.3620605469,
0.951171875,
0.4475097656,
-0.3676757812,
-0.2536621094,
0.2366943359,
0.3295898438,
0.3083496094,
... |
The correspondence problem is also the basis of the particle image velocimetry measurement technique, which is nowadays widely used in the fluid mechanics field to quantitatively measure fluid motion. Simple example
To find the correspondence between set A [1,2,3,4,5] and set B [3,4,5,6,7] find where they overlap and h... | [
0.6860351562,
0.5639648438,
-0.1068725586,
0.134765625,
-0.1613769531,
0.2409667969,
0.2937011719,
-0.0278625488,
-0.1356201172,
0.6484375,
0.5830078125,
0.6225585938,
0.673828125,
0.4626464844,
0.341796875,
-0.01171875,
-0.2388916016,
0.2357177734,
0.7456054688,
-0.2043457031,... |
A Taxonomy and Evaluation of Dense Two-Frame Stereo Correspondence Algorithms. (PDF)
External links
Middlebury Stereo Vision page
Geometry in computer vision
Stereoscopy
zh:图像对应问题 | [
-0.458984375,
-0.1693115234,
0.3054199219,
0.1573486328,
0.4318847656,
-0.3986816406,
0.1950683594,
1.1611328125,
-0.4162597656,
0.4816894531,
0.9399414062,
0.76171875,
-0.3498535156,
0.5615234375,
-0.5688476562,
-0.1368408203,
-0.102722168,
0.6025390625,
0.2719726562,
-0.32641... |
The Dix–Hallpike test — or Nylén–Bárány test — is a diagnostic maneuver used to identify benign paroxysmal positional vertigo (BPPV). Procedure
When performing the Dix–Hallpike test, patients are lowered quickly to a supine position (lying horizontally with the face and torso facing up) with the neck extended 30 degree... | [
1.5146484375,
0.5771484375,
0.8427734375,
0.6787109375,
1.4697265625,
-0.3139648438,
-0.7221679688,
0.0070838928,
-0.0432128906,
0.419921875,
-0.1629638672,
1.0205078125,
0.0254974365,
0.4990234375,
0.4475097656,
-1.0625,
0.1625976562,
-0.6059570312,
0.2839355469,
1.2431640625,... |
The head is rotated 45 degrees away from the side being tested, and the eyes are examined for nystagmus. Negative test
If the test is negative, it makes benign positional vertigo a less likely diagnosis and central nervous system involvement should be considered. Advantages
Although there are alternative methods to adm... | [
1.494140625,
0.2067871094,
0.7431640625,
0.0265045166,
1.0302734375,
-0.384765625,
0.1604003906,
-1.0478515625,
-0.2709960938,
0.3227539062,
0.0856323242,
0.8149414062,
0.2951660156,
0.2385253906,
-0.1614990234,
-0.2739257812,
-0.1075439453,
-0.5927734375,
0.2314453125,
1.40136... |
Precautions and contraindications
In rare cases a patient may be unable or unwilling to participate in the Dix–Hallpike test due to physical limitations. In these circumstances the side-lying test or other alternative tests may be used. Precautions
The Dix–Hallpike maneuver places a degree of stress on the patient's l... | [
0.7841796875,
0.7080078125,
1.2724609375,
0.8354492188,
1.1533203125,
0.3210449219,
-0.2214355469,
-0.3115234375,
0.90625,
0.6059570312,
-0.6796875,
0.8764648438,
0.3269042969,
0.3046875,
0.3959960938,
-0.3249511719,
0.26171875,
0.063659668,
-0.1409912109,
1.0673828125,
0.246... |
A multifractal system is a generalization of a fractal system in which a single exponent (the fractal dimension) is not enough to describe its dynamics; instead, a continuous spectrum of exponents (the so-called singularity spectrum) is needed. Multifractal systems are common in nature. They include the length of coast... | [
-0.4301757812,
0.0403442383,
-1.009765625,
-0.3972167969,
-0.1323242188,
0.0767822266,
0.114074707,
-0.0019044876,
0.0919189453,
0.1701660156,
0.8276367188,
0.8442382812,
-0.5395507812,
-0.8959960938,
-0.0235900879,
-0.0915527344,
-0.0939941406,
-0.5434570312,
-0.3664550781,
-0... |
Definition
In a multifractal system , the behavior around any point is described by a local power law:
The exponent is called the singularity exponent, as it describes the local degree of singularity or regularity around the point . The ensemble formed by all the points that share the same singularity exponent is ca... | [
-0.6552734375,
0.0534973145,
-0.8344726562,
0.6557617188,
-0.5180664062,
-0.1516113281,
0.3137207031,
0.1771240234,
-0.7026367188,
0.1612548828,
0.7587890625,
0.8154296875,
-0.5590820312,
-0.9038085938,
0.8247070312,
0.0453796387,
0.2172851562,
0.28515625,
-0.3972167969,
0.1187... |
While the determination of calls for some exhaustive local analysis of the data, which would result in difficult and numerically unstable calculations, the estimation of the relies on the use of statistical averages and linear regressions in log-log diagrams. Once the are known, one can deduce an estimate of thanks... | [
0.0571899414,
0.6518554688,
0.0148773193,
0.3376464844,
-0.0612487793,
0.4489746094,
-0.6474609375,
0.8017578125,
-1.9111328125,
0.1228637695,
1.7783203125,
0.810546875,
-0.6284179688,
-0.7041015625,
0.4106445312,
-0.6064453125,
0.2468261719,
0.0140686035,
-0.26171875,
0.034667... |
= an arbitrary scale (box size in box counting) at which the set is examined
= the index for each box laid over the set for an
= the number of pixels or mass in any box, , at size
= the total boxes that contained more than 0 pixels, for each
is used to observe how the pixel distribution behaves when distorte... | [
0.3120117188,
0.7553710938,
-0.2034912109,
0.3850097656,
0.2126464844,
0.6225585938,
0.361328125,
0.5903320312,
-0.3349609375,
-0.2885742188,
0.1794433594,
-0.0971069336,
0.2308349609,
0.2758789062,
0.3486328125,
-0.2578125,
0.0991821289,
0.5405273438,
0.2156982422,
0.416259765... |
Applications
Multifractal analysis has been successfully used in many fields, including physical, information, and biological sciences. For example, the quantification of residual crack patterns on the surface of reinforced concrete shear walls. Dataset distortion analysis
Multifractal analysis has been used in seve... | [
-0.3312988281,
0.3288574219,
-0.1951904297,
0.0848388672,
-0.033416748,
0.4074707031,
-0.0083694458,
-0.3366699219,
0.0941772461,
0.3659667969,
0.3120117188,
0.7763671875,
-0.4711914062,
-0.4965820312,
0.3205566406,
0.0160064697,
0.544921875,
0.111328125,
-0.2705078125,
-0.0541... |
The generalized dimension also gives important specific information. D(Q=0) is equal to the capacity dimension, which—in the analysis shown in the figures here—is the box counting dimension. D(Q=1) is equal to the information dimension, and D(Q=2) to the correlation dimension. This relates to the "multi" in multifracta... | [
-0.330078125,
-0.0626220703,
-0.2824707031,
0.361328125,
-0.6889648438,
-0.1168212891,
0.1815185547,
-0.4331054688,
-0.5141601562,
0.341796875,
-0.2631835938,
0.392578125,
-0.0624694824,
-0.3354492188,
0.0031147003,
0.1089477539,
0.4104003906,
0.1171264648,
-0.067199707,
0.0537... |
In an electric power system, a fault or fault current is any abnormal electric current. For example, a short circuit is a fault in which a live wire touches a neutral or ground wire. An open-circuit fault occurs if a circuit is interrupted by a failure of a current-carrying wire (phase or neutral) or a blown fuse or c... | [
-0.6391601562,
-0.3583984375,
-1.2451171875,
0.4475097656,
0.0416870117,
0.0953979492,
-0.0783081055,
-0.0225067139,
0.9326171875,
0.0288085938,
0.986328125,
-0.0454711914,
-0.5122070312,
0.5620117188,
-0.205078125,
0.4418945312,
-0.6025390625,
-0.3266601562,
-0.4399414062,
-0.... |
When a fault occurs, equipment used for power system protection operate to isolate the area of the fault. A transient fault will then clear and the power-line can be returned to service. Typical examples of transient faults include:
momentary tree contact
bird or other animal contact
lightning strike
conductor cla... | [
-0.3200683594,
-0.0639648438,
-1.201171875,
0.3195800781,
-0.0082931519,
0.1268310547,
0.3244628906,
-0.0399475098,
0.4992675781,
0.3532714844,
0.6948242188,
0.0863037109,
0.1721191406,
0.0866088867,
0.23828125,
0.2080078125,
-0.5830078125,
0.0650024414,
-0.3601074219,
0.028900... |
double line-to-ground fault - two lines come into contact with the ground (and each other), also commonly due to storm damage. In transmission line faults, roughly 15% - 20% are asymmetric double line-to-ground. Symmetric fault
A symmetric or balanced fault affects each of the phases equally. In transmission line fault... | [
-0.4685058594,
0.1051025391,
-1.1474609375,
0.8159179688,
0.6147460938,
0.7060546875,
0.0787963867,
-0.3864746094,
0.0992431641,
0.9873046875,
0.861328125,
0.5844726562,
-0.1760253906,
0.8022460938,
-0.166015625,
0.4340820312,
-0.2069091797,
-0.2521972656,
-0.6391601562,
-0.016... |
Wiring codes may require an insulation monitoring device to give an alarm in such a case, so the cause of the ground fault can be identified and remedied. If a second ground fault develops in such a system, it can result in overcurrent or failure of components. Even in systems that are normally connected to ground to l... | [
0.1983642578,
0.2453613281,
-0.4436035156,
0.5869140625,
0.7104492188,
0.0280914307,
0.7309570312,
-0.6176757812,
-0.0446777344,
-0.0347290039,
0.9775390625,
1.05859375,
-0.6655273438,
0.7338867188,
0.0361022949,
0.1922607422,
-0.0442810059,
-0.0121612549,
-0.6904296875,
0.3134... |
In residential wiring, electrical regulations may now require arc-fault circuit interrupters on building wiring circuits, to detect small arcs before they cause damage or a fire. Analysis
Symmetric faults can be analyzed via the same methods as any other phenomena in power systems, and in fact many software tools exi... | [
-0.0972290039,
0.51171875,
0.1369628906,
0.2381591797,
0.3122558594,
-0.0172576904,
-0.2486572266,
-0.5737304688,
0.1911621094,
0.1094360352,
1.18359375,
0.9604492188,
-0.4499511719,
0.3708496094,
0.3603515625,
0.435546875,
-0.3481445312,
0.3874511719,
-0.8442382812,
-0.1724853... |
However, due to the linearity of power systems, it is usual to consider the resulting voltages and currents as a superposition of symmetrical components, to which three-phase analysis can be applied. In the method of symmetric components, the power system is seen as a superposition of three components:
a positive-sequ... | [
-0.4455566406,
-0.455078125,
0.0545654297,
0.6884765625,
-0.2280273438,
0.1195068359,
-0.55078125,
-0.0098648071,
0.2849121094,
0.3188476562,
1.24609375,
0.2322998047,
-0.0848388672,
0.763671875,
0.1375732422,
-0.0207824707,
-0.3771972656,
0.1936035156,
-0.5356445312,
0.1894531... |
If a circuit is to be properly protected, the fault current must be high enough to operate the protective device within as short a time as possible; also the protective device must be able to withstand the fault current and extinguish any resulting arcs without itself being destroyed or sustaining the arc for any signi... | [
-0.2467041016,
-0.78515625,
-0.3459472656,
0.1309814453,
0.2817382812,
-0.1517333984,
0.400390625,
-0.3474121094,
0.0203399658,
-0.0378112793,
0.8413085938,
-0.0010709763,
-0.3811035156,
0.6850585938,
-0.6381835938,
0.5073242188,
-0.4584960938,
-0.2056884766,
-0.560546875,
-0.0... |
Terminal methods can be used to locate the general area of the fault, to expedite tracing on a long or buried cable. In very simple wiring systems, the fault location is often found through inspection of the wires. In complex wiring systems (for example, aircraft wiring) where the wires may be hidden, wiring faults are... | [
-0.0492858887,
-0.9624023438,
-0.3293457031,
0.6020507812,
-0.5380859375,
-0.4655761719,
0.1535644531,
-0.2448730469,
-0.1711425781,
0.054901123,
0.5229492188,
0.2260742188,
-0.3776855469,
0.6606445312,
-0.80078125,
0.2902832031,
-0.5981445312,
-0.4213867188,
-0.2443847656,
-0.... |
To make the ground fault current easier to detect, the grounding resistor of the system may be switched between two values so that the fault current pulses. Batteries
The prospective fault current of larger batteries, such as deep-cycle batteries used in stand-alone power systems, is often given by the manufacturer. I... | [
-0.1274414062,
-0.4929199219,
0.8154296875,
0.7211914062,
0.1165771484,
0.1452636719,
0.4758300781,
-1.0068359375,
-0.2294921875,
-0.2917480469,
0.8017578125,
0.3227539062,
-0.1661376953,
0.515625,
-0.0800170898,
0.0105285645,
-0.6127929688,
-0.0974121094,
0.0712280273,
0.02651... |
Structured light is the process of projecting a known pattern (often grids or horizontal bars) on to a scene. The way that these deform when striking surfaces allows vision systems to calculate the depth and surface information of the objects in the scene, as used in structured light 3D scanners. Invisible (or impercep... | [
-0.4724121094,
-0.0410461426,
-0.84765625,
-0.2924804688,
-0.1034545898,
-0.3410644531,
-0.1566162109,
-0.619140625,
0.055267334,
0.3125,
0.1552734375,
0.4064941406,
-0.2348632812,
-0.6284179688,
-0.0133056641,
-0.2556152344,
0.25390625,
0.1079711914,
0.734375,
-1.0556640625,
... |
Depth map
Laser Dynamic Range Imager
Lidar
Range imaging
Kinect
Time-of-flight camera
External links
Projector-Camera Calibration Toolbox
Tutorial on Coded Light Projection Techniques
Structured light using pseudorandom codes
High-accuracy stereo depth maps using structured light
A comparative survey on in... | [
-0.3366699219,
-0.6811523438,
-0.0240936279,
-0.6796875,
0.2509765625,
-0.094543457,
-0.1368408203,
-0.2420654297,
0.4030761719,
0.1442871094,
0.8959960938,
1.453125,
-1.3193359375,
-0.8540039062,
0.4477539062,
-1.1884765625,
-0.3728027344,
0.6713867188,
1.048828125,
-1.1113281... |
A surrogate model is an engineering method used when an outcome of interest cannot be easily measured or computed, so a model of the outcome is used instead. Most engineering design problems require experiments and/or simulations to evaluate design objective and constraint functions as a function of design variables. F... | [
0.5395507812,
0.2233886719,
-1.4609375,
-0.3933105469,
0.0211029053,
-0.2580566406,
-0.2963867188,
-0.4289550781,
0.7685546875,
-0.2172851562,
0.3901367188,
0.2276611328,
0.2358398438,
0.4602050781,
0.287109375,
-0.2685546875,
0.1771240234,
-0.287109375,
0.0473327637,
-0.369873... |
Though using surrogate models in lieu of experiments and simulations in engineering design is more common, surrogate modeling may be used in many other areas of science where there are expensive experiments and/or function evaluations. Goals
The scientific challenge of surrogate modeling is the generation of a surroga... | [
0.765625,
0.3156738281,
-0.8598632812,
-0.3442382812,
0.1030273438,
-0.5595703125,
-0.4460449219,
-0.1744384766,
0.513671875,
-0.0381164551,
0.4697265625,
0.529296875,
0.0476379395,
0.3239746094,
0.1004638672,
-0.1127319336,
0.2790527344,
-0.546875,
-0.138671875,
-0.3657226562,... |
In these cases, physics-based surrogates such as space-mapping based models are the most efficient. A recent survey of surrogate-assisted evolutionary optimization techniques can be found in. Spanning two decades of development and engineering applications, Rayas-Sanchez reviews aggressive space mapping exploiting surr... | [
0.7202148438,
0.5029296875,
-0.5170898438,
0.701171875,
-0.478515625,
-0.5913085938,
-1.099609375,
-0.8588867188,
-0.16796875,
0.4089355469,
0.9057617188,
0.71875,
-0.2325439453,
0.2464599609,
0.7333984375,
0.2379150391,
-0.3142089844,
0.2607421875,
0.2724609375,
0.0969238281,
... |
Iterate steps 2 to 4 until out of time or design 'good enough'
Depending on the type of surrogate used and the complexity of the problem, the process may converge on a local or global optimum, or perhaps none at all. In design space approximation, one is not interested in finding the optimal parameter vector but rathe... | [
1.1083984375,
-0.3117675781,
-0.8422851562,
0.4943847656,
-0.4833984375,
0.0703125,
0.1909179688,
-0.6044921875,
0.0466308594,
0.3547363281,
1.04296875,
0.8354492188,
0.0163574219,
0.1267089844,
0.5561523438,
0.2495117188,
0.3410644531,
-0.4484863281,
-0.1477050781,
-0.12329101... |
See also
Linear approximation
Response surface methodology
Kriging
Radial basis functions
Gradient-enhanced kriging (GEK)
OptiY
Space mapping
Surrogate endpoint
Surrogate data
Fitness approximation
Computer experiment
Conceptual model
Bayesian regression
Bayesian model selection
References
Reading
Queipo, N.V., Haft... | [
1.076171875,
-0.416015625,
-0.5649414062,
0.4836425781,
-0.1126098633,
-0.2810058594,
-0.0506896973,
-0.6030273438,
0.4689941406,
-0.0391540527,
0.5688476562,
1.5009765625,
-0.8090820312,
0.1153564453,
-0.1365966797,
-0.17578125,
0.7172851562,
-0.1256103516,
-0.5200195312,
-0.4... |
(2016) "An improved approach for estimating the hyperparameters of the kriging model for high-dimensional problems through the partial least squares method", Mathematical Problems in Engineering
External links
Matlab code for surrogate modelling
Matlab SUrrogate MOdeling Toolbox – Matlab SUMO Toolbox
Surrogate Mode... | [
1.0029296875,
-0.0773925781,
-0.9467773438,
0.0855102539,
-0.1763916016,
-0.0270843506,
0.8134765625,
0.2003173828,
0.6142578125,
-0.1911621094,
0.4846191406,
0.3615722656,
-0.6298828125,
-0.1583251953,
-0.2780761719,
0.2810058594,
0.4689941406,
-0.4526367188,
-0.4916992188,
-0... |
W32.Navidad is a mass-mailing worm program or virus, discovered in December 2000. It is designed to spread through email clients such as Microsoft Outlook while masquerading as an electronic Christmas card. Infected computers can be identified by blue eye icons which appear in the Windows system tray. Users who move th... | [
-0.1484375,
-0.6752929688,
0.7163085938,
-0.31640625,
-0.3342285156,
-0.1351318359,
-0.3459472656,
-0.3415527344,
-0.4440917969,
-0.6123046875,
0.4157714844,
-0.014465332,
0.1997070312,
0.6923828125,
-0.1715087891,
0.27734375,
-0.9814453125,
-0.5434570312,
0.8881835938,
-0.1755... |
In Unix computing, lxrun is a compatibility layer to allow Linux binaries to run on UnixWare, SCO OpenServer and Solaris without recompilation. It was created by Mike Davidson. It has been an open source software project since 1997, and is available under the Mozilla Public License. Both SCO and Sun Microsystems began ... | [
0.0300292969,
0.3679199219,
-1.0419921875,
-0.2156982422,
-0.2442626953,
0.2575683594,
-0.720703125,
-0.1647949219,
-1.306640625,
-0.6938476562,
-0.0864257812,
0.6015625,
0.4313964844,
0.7583007812,
-0.14453125,
0.5576171875,
-0.3532714844,
0.0458068848,
-0.3720703125,
-0.20092... |
Reasons cited for the declining interest in lxrun include the wide availability of real Linux machines, and the availability of more capable emulation systems, such as SCO's Linux Kernel Personality (LKP), OpenSolaris BrandZ, and various virtual machine solutions. Newer Linux applications and host operating systems are... | [
0.7119140625,
0.2966308594,
-0.21875,
0.2858886719,
-1.068359375,
0.3090820312,
-0.08984375,
-0.30859375,
-1.501953125,
0.1081542969,
-0.6391601562,
0.9028320312,
0.0621337891,
0.0608215332,
-0.1207275391,
1.431640625,
0.1096801758,
0.6206054688,
-0.2705078125,
-0.1705322266,
... |
Przybylski's Star (pronounced or ), or HD 101065, is a rapidly oscillating Ap star at roughly from the Sun in the southern constellation of Centaurus. Scientific history
In 1961, the Polish-Australian astronomer Antoni Przybylski discovered that this star had a peculiar spectrum that would not fit into the standard f... | [
-0.57421875,
-0.4543457031,
-0.7084960938,
-0.2465820312,
-0.4145507812,
0.1282958984,
0.1462402344,
0.4204101562,
0.85546875,
-0.74609375,
-0.4240722656,
-0.6176757812,
-0.4096679688,
0.9775390625,
0.1563720703,
-0.0394897461,
-0.8427734375,
-0.4797363281,
-0.5229492188,
0.148... |
Properties
HD 101065 is the prototype star of the rapidly oscillating Ap star (roAP) variable star class. In 1978, it was discovered to pulsate photometrically with a period of 12.15 min. A potential companion had also been detected, a 14th-magnitude star (in infrared) 8 arc seconds away. This could have meant a separa... | [
0.1038818359,
-0.1128540039,
-0.6733398438,
0.3640136719,
-0.8720703125,
0.3767089844,
0.8193359375,
0.3959960938,
0.4765625,
-0.6489257812,
0.5048828125,
0.1181030273,
-0.97265625,
0.8032226562,
1.2216796875,
-0.5546875,
-0.2102050781,
0.3937988281,
-0.572265625,
0.2425537109,... |
Druid is a hack and slash dungeon crawl developed by Electralyte Software and published by Firebird in 1986 for the Atari 8-bit family and Commodore 64. It was also ported to Amstrad CPC, ZX Spectrum, and by Nippon Dexter in 1988 for the MSX, although the MSX port was released in Japan only. Another Japanese port of Dr... | [
-0.7021484375,
-0.4167480469,
0.548828125,
0.8857421875,
-0.2758789062,
0.2563476562,
-1.9375,
-0.9985351562,
-0.1186523438,
-0.2082519531,
-0.3447265625,
-0.0994873047,
-0.3684082031,
0.5610351562,
0.3801269531,
0.4599609375,
-0.0383300781,
-0.1666259766,
0.060546875,
-0.08825... |
In both Atari 8-bit and Commodore 64 versions, a second player can take control of the golem using joystick port 2. References
External links
Druid at Atari Mania
1986 video games
Amstrad CPC games
Atari 8-bit family games
Commodore 64 games
Video games about demons
Famicom Disk System games
Jaleco games
MSX games
V... | [
-0.0914306641,
-0.1854248047,
0.5024414062,
0.7216796875,
-0.4165039062,
-0.5205078125,
-1.4755859375,
-1.5751953125,
-0.1840820312,
-0.1921386719,
-0.2299804688,
-0.3227539062,
-1.0693359375,
1.2939453125,
0.6567382812,
0.712890625,
-0.1489257812,
-0.0046615601,
-0.1553955078,
... |
An Nv network is a term used in BEAM robotics referring to the small electrical Neural Networks that make up the bulk of BEAM-based robot control mechanisms. Basic Building blocks
The most basic component included in Nv Networks is the Nv Neuron. The purpose of an Nv Neuron is simply to take an input, do something wit... | [
0.4011230469,
-0.011505127,
0.0693359375,
0.083984375,
0.7939453125,
-0.3684082031,
0.6943359375,
-0.7529296875,
-0.5356445312,
0.0541687012,
-0.6381835938,
0.4440917969,
-1.43359375,
0.9609375,
0.2469482422,
-0.0046081543,
-0.1412353516,
-0.72265625,
0.0066757202,
-0.331054687... |
Bicore
Probably the most utilized Nv Net topology in BEAM, the Bicore consists of two neurons placed in a loop that alternates current to the output. Input into the loop is given in the form of changing the resistance in each separate Neuron, which changes the rate at which the Neuron discharges, affecting the pace at ... | [
-0.1089477539,
0.3630371094,
0.4494628906,
0.2054443359,
0.255859375,
-0.6713867188,
0.38671875,
-0.650390625,
-0.6831054688,
0.3015136719,
-0.423828125,
0.4953613281,
-0.7612304688,
0.5400390625,
-0.6469726562,
0.169921875,
0.0950927734,
-0.6420898438,
0.5576171875,
-0.7690429... |
from light sensors) is present, the timing of each neuron in the loop is varied based on the input from the sensors, affecting the pace at which the loop oscillates. This affected pace is often used to alter the walking gait of a robot in order to steer it based on the input from its sensors. External articles and othe... | [
-0.3330078125,
0.4521484375,
-0.3503417969,
0.2200927734,
-0.0626831055,
-0.31640625,
0.5180664062,
-0.8149414062,
-0.1348876953,
-0.0952148438,
-0.2485351562,
0.1019287109,
-1.3447265625,
0.568359375,
-0.8154296875,
-0.1329345703,
0.1920166016,
-0.3212890625,
0.9145507812,
-0.... |
MuscleTech is a brand of dietary supplements, marketed by Iovate Health Sciences Inc., which includes Hydroxycut. It was owned by Canadian company Kerr Holdings which was acquired by the Xiwang Foodstuffs Company, a Chinese company, for $584 million in 2016. History
In 1998, MuscleTech launched Cell-Tech, a creatine-c... | [
0.6762695312,
0.8310546875,
-1.4658203125,
0.7705078125,
0.6298828125,
-0.2097167969,
-1.0625,
0.1552734375,
0.6381835938,
0.2756347656,
-0.3364257812,
0.7138671875,
-0.3984375,
1.19921875,
0.4755859375,
-0.0988769531,
-0.4006347656,
-0.7153320312,
0.37890625,
0.0706176758,
-... |
The Character of Physical Law is a series of seven lectures by physicist Richard Feynman concerning the nature of the laws of physics. Feynman delivered the lectures in 1964 at Cornell University, as part of the Messenger Lectures series. The BBC recorded the lectures, and published a book under the same title the foll... | [
-0.2004394531,
-0.0005860329,
0.1839599609,
0.0575561523,
-0.7631835938,
0.6806640625,
0.2717285156,
0.1922607422,
-0.7221679688,
0.349609375,
-0.0065917969,
-0.4736328125,
-0.0590820312,
0.4262695312,
-0.5126953125,
-0.8203125,
-0.7055664062,
-0.1627197266,
-0.1804199219,
0.24... |
Public-domain-equivalent license are licenses that grant public-domain-like rights and/or act as waivers. They are used to make copyrighted works usable by anyone without conditions, while avoiding the complexities of attribution or license compatibility that occur with other licenses. No permission or license is requi... | [
-0.3093261719,
-0.578125,
-0.0155410767,
-0.1140136719,
-0.1478271484,
-0.2416992188,
-1.3828125,
-1.232421875,
-0.2385253906,
-0.3322753906,
0.6381835938,
-0.0731201172,
-1.0068359375,
0.8754882812,
-1.169921875,
0.0444030762,
0.3381347656,
-0.1087646484,
-0.1955566406,
-0.104... |
The Free Software Foundation and the Open Knowledge Foundation approved CC0 as a recommended license to dedicate content to the public domain. The FSF and the Open Source Initiative, however, do not recommend the usage of this license for software due to inclusion of a clause expressly stating it does not grant patent ... | [
0.0871582031,
-0.3615722656,
-0.0468444824,
0.060333252,
-0.2429199219,
-0.1385498047,
-0.5747070312,
-1.1787109375,
-0.6298828125,
0.0560913086,
-0.1719970703,
0.3703613281,
-0.759765625,
1.38671875,
-1.1640625,
0.6025390625,
0.1906738281,
-0.5170898438,
-0.3022460938,
0.44165... |
In 2011, the Free Software Foundation added CC0 to its free software licenses and called it "the preferred method of releasing software in the public domain," while in general recommending the GNU General Public License. In February 2012, when the CC0 license was submitted to the Open Source Initiative for approval, co... | [
-0.0078277588,
-0.8168945312,
-0.0335998535,
-0.193359375,
0.0595397949,
-0.0335998535,
-0.87109375,
-1.22265625,
-0.2563476562,
0.1096191406,
0.1613769531,
0.1890869141,
-1.310546875,
0.98046875,
-1.7861328125,
0.7734375,
0.3081054688,
-0.6083984375,
0.0213012695,
-0.063476562... |
Intelligentsia Coffee is an American coffee roasting company and retailer based in Chicago, Illinois. Founded in 1995 by Doug Zell and Emily Mange, Intelligentsia is considered a major representative of third wave coffee. In 2015, Peet's Coffee & Tea (itself part of JAB Holding Company) acquired a majority stake in the... | [
-0.4240722656,
0.103515625,
-1.24609375,
0.0228424072,
0.3173828125,
-0.0126266479,
0.0426940918,
0.5849609375,
0.4086914062,
-0.19140625,
-1.1455078125,
-0.5444335938,
-0.0230560303,
0.599609375,
-0.6904296875,
-0.1397705078,
-0.2219238281,
-0.3029785156,
0.0357971191,
-0.5170... |
A 2008 decision to stop serving 20-ounce coffee and espresso beverages in stores was met with controversy. Zell stated that the proportions are altered at such large quantities and certain drinks become watered-down, arguing that 20-ounce drinks end up "masking and adulterating the pure, intense flavors we work hard to... | [
-0.1372070312,
0.2214355469,
-0.921875,
0.0469055176,
0.1506347656,
-0.2038574219,
-0.3000488281,
0.3981933594,
-0.3833007812,
-0.2340087891,
-1.025390625,
-0.4733886719,
-0.513671875,
0.4594726562,
-0.896484375,
-0.6030273438,
-0.2802734375,
-0.2639160156,
-0.666015625,
-0.185... |
See also
Blue Bottle Coffee
Counter Culture Coffee
La Colombe Coffee Roasters
Revelator Coffee
Stumptown Coffee Roasters
List of coffeehouse chains
List of coffee companies
Third wave of coffee
References
External links
Food and drink companies based in Chicago
Coffee houses of the United States
Retail c... | [
-0.2038574219,
0.3579101562,
-1.142578125,
0.4479980469,
1.6875,
0.4357910156,
0.4619140625,
-0.4685058594,
0.6206054688,
-0.0619812012,
-1.0703125,
0.5668945312,
-0.9653320312,
-0.2565917969,
-0.78125,
-0.685546875,
-0.0520629883,
0.8842773438,
-0.3063964844,
0.2893066406,
0... |
Alteon WebSystems, originally known as Alteon Networks, is a division of Radware that produces application delivery controllers. Alteon was acquired by Nortel Networks on October 4, 2000. On February 22, 2009 Nortel Networks sold the Alteon application switching line to Radware. History
Alteon Networks was founded in ... | [
-0.4914550781,
-0.4187011719,
-0.6088867188,
-0.4147949219,
0.0128173828,
-0.0264129639,
-0.7299804688,
0.3767089844,
0.2565917969,
-0.2548828125,
0.56640625,
0.3347167969,
-0.5356445312,
1.578125,
0.4291992188,
0.4631347656,
-0.28125,
-0.2457275391,
0.6069335938,
0.208984375,
... |
Nortel rolled the ACEDirector and ACESwitch products into its Personal Internet product line, but one year later sales had slowed down. On February 22, 2009 Nortel Networks announced they would sell the Alteon application switching line to Radware, for $17.65 million. In November 2013, Radware announced the Alteon NG, ... | [
-0.2626953125,
-0.2775878906,
-0.4787597656,
-0.3391113281,
0.4519042969,
0.1263427734,
-0.66015625,
0.9389648438,
-0.108215332,
-0.3659667969,
0.7817382812,
0.8452148438,
-0.1578369141,
0.8276367188,
0.1967773438,
0.4641113281,
-0.0655517578,
-0.3107910156,
0.9619140625,
0.331... |
The Milne model was a special-relativistic cosmological model proposed by Edward Arthur Milne in 1935. It is mathematically equivalent to a special case of the FLRW model in the limit of zero energy density and it obeys the cosmological principle. The Milne model is also similar to Rindler space, a simple re-parameteri... | [
0.0723876953,
-0.4282226562,
-0.6674804688,
-0.1389160156,
-0.2059326172,
0.015411377,
-0.2583007812,
0.7807617188,
-0.5615234375,
-0.2145996094,
-0.2434082031,
0.6103515625,
-0.8168945312,
-0.2863769531,
0.2954101562,
-0.4926757812,
-0.3850097656,
-0.0261535645,
-0.4143066406,
... |
As he initially described it, the model has no expansion of space, so all of the redshift (except that caused by peculiar velocities) is explained by a recessional velocity associated with the hypothetical "explosion". However, the mathematical equivalence of the zero energy density () version of the FLRW metric to Mil... | [
0.3415527344,
-0.1239013672,
-0.9995117188,
-0.1975097656,
-0.1260986328,
0.2563476562,
0.0369873047,
0.2961425781,
-1.150390625,
-0.0553588867,
-0.505859375,
1.20703125,
-0.7768554688,
-0.3142089844,
0.3293457031,
-0.2687988281,
-0.85546875,
-0.0352478027,
-0.7592773438,
0.975... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.