Personality and demographics are important variables in social sciences and computational sociolinguistics. However, datasets with both personality and demographic labels are scarce. To address this, we present PANDOR...
详细信息
In this paper we apply Perceptual Control theory to Braitenberg Vehicles. computational models explain systems in functional terms, as a transformation from input to output. Living, and indeed robotic systems are so m...
详细信息
"Image" is the core category of Chinese traditional aesthetics and the core spirit of Chinese art. Image landscape oil painting is the product of the fusion of "oil painting", a Western media, into...
详细信息
The article is devoted to search defects method, in continuous dynamic systems with a depth to a dynamic element using logical functions, based on binary diagnostic feature. This method streamlines using of the way, s...
详细信息
We report the synthesis and structural authentication of the ditungsten decarbonyl dianion in [(OC)(5)W-W(CO)(5)][K(18-crown-6)(THF)(2)](2)(1), completing the group 6 dianion triad over half a century since the area b...
详细信息
We report the synthesis and structural authentication of the ditungsten decarbonyl dianion in [(OC)(5)W-W(CO)(5)][K(18-crown-6)(THF)(2)](2)(1), completing the group 6 dianion triad over half a century since the area began. The W-W bond is long [3.2419(8) angstrom] and, surprisingly, in the solid-state the dianion adopts aD(4h)eclipsed rather thanD(4d)staggered geometry, the latter of which dominates the structural chemistry of binary homobimetallic carbonyls. computational studies at levels of theory from DFT to CCSD(T) confirm that theD(4d)geometry is energetically preferred in the gas-phase, being similar to 18 kJ mol(-1)more stable than theD(4h)form, since slight destabilisation of the degenerate W-CO pi 5d(xz) and 5d(yz) orbitals is outweighed by greater stabilisation of the W-W sigma-bond orbital. The gas-phase D-4h structure displays a single imaginary vibrational mode, intrinsic reaction coordinate analysis of which links the D-4h isomer directly to the D-4d forms, which are produced by rotation around the W-W bond by +/- 45 degrees. It is therefore concluded that the gas-phase transition state becomes a minimum on the potential energy surface when subjected to crystal packing in the solid-state.
This review covers most recent advances in computation of F-19 NMR chemical shifts and spin-spin coupling constants involving F-19 nucleus calculated at different levels of theory. It deals mainly with electronic and ...
详细信息
This review covers most recent advances in computation of F-19 NMR chemical shifts and spin-spin coupling constants involving F-19 nucleus calculated at different levels of theory. It deals mainly with electronic and stereochemical effects influencing these parameters, with a special emphasis on practical applications of such calculations. For F-19 NMR chemical shifts, a good deal of attention is focused on less common solid state studies, in addition to much more popular liquid state data. For spin-spin coupling constants, the main interest is concentrated on the most popular F-19 - H-1, F-19-C-13 and F-19 - F-19 couplings providing marked stereochemical behaviour. The bibliography includes 149 references. The bibliography includes 149 references. In memory of Professor Ruben Horacio Contreras, to commemorate his achievements in the field of theoretical and computational F-19 NMR.
For decades, computing logic uses Binary circuits based on CMOS technology. Ternary logic provides an edge over traditional Binary logic due to its ability to process more information content, thus reducing the Interc...
详细信息
The concept of exploit is central to computer security, particularly in the context of memory corruptions. Yet, in spite of the centrality of the concept and voluminous descriptions of various exploitation techniques ...
详细信息
The concept of exploit is central to computer security, particularly in the context of memory corruptions. Yet, in spite of the centrality of the concept and voluminous descriptions of various exploitation techniques or countermeasures, a good theoretical framework for describing and reasoning about exploitation has not yet been put forward. A body of concepts and folk theorems exists in the community of exploitation practitioners;unfortunately, these concepts are rarely written down or made sufficiently precise for people outside of this community to benefit from them. This paper clarifies a number of these concepts, provides a clear definition of exploit, a clear definition of the concept of a weird machine, and how programming of a weird machine leads to exploitation. The papers also shows, somewhat counterintuitively, that it is feasible to design some software in a way that even powerful attackers-with the ability to corrupt memory once-cannot gain an advantage. The approach in this paper is focused on memory corruptions. While it can be applied to many security vulnerabilities introduced by other programming mistakes, it does not address side channel attacks, protocol weaknesses, or security problems that are present by design.
As all computational programs, derivation sequences of functional dependences are twice partially ordered sets: by following the instructions in the program and by their execution in time. Order consistency is achieve...
详细信息
As all computational programs, derivation sequences of functional dependences are twice partially ordered sets: by following the instructions in the program and by their execution in time. Order consistency is achieved by the theoretical multiple embedding of one into another. Hereinafter, such sets are referred to as cascade ordered, and there is no need to resort to the terminology of the relational database theory for them. It is possible to represent the derivation sequence in the form of a special union of almost disjoint simple subsequences referred to as pointed sets here. It is achieved by applying a gluing operation ae to them. The process of forming a cascade-ordered set of pointed sets is reflected in the title by the term Synthesis.(1) This paper is aimed at studying this process. The final section of the paper sets forth the principles of Analysis,(2) i.e., decomposition of a specified cascade-ordered set into so-called AR cones. This issue will be completely resolved in subsequent papers. Here, logic schemes that are designed to calculate predicates from the given ones are applied for proofs. Flowcharts that are common to algorithmization are less frequently used. Their combined application serves the purposes of automating mathematical proofs. The logical toolkit of the paper is a prerequisite for constructing a mathematical model of artificial intelligence.
The circadian stimulus is an important, validated and updated metric that describes the invisible influences of light on the human circadian system explicitly and scientifically. However, an absolute spectral power di...
详细信息
The circadian stimulus is an important, validated and updated metric that describes the invisible influences of light on the human circadian system explicitly and scientifically. However, an absolute spectral power distribution must be supplied for its computation, which is only measurable by an expensive and complicated spectrometer. This paper proposes an alternative circadian stimulus computation model that is identified as the function CS(z, E-v) for white light sources based on the most common and simplest parameters of illuminance E-v in lux and the chromaticity coordinate z. These parameters are well known and widely used in both colour science and lighting technology. In order to prove the accuracy and availability of the model, an internal validation was performed with the adapted method repeating split data to check the goodness of the model fit. The fitted model achieved a maximum residual of 0.058 in the circadian stimulus quantity (R-2 = 0.998). An external validation with the maximum residual of 0.030 (R-2 = 0.999) provided stronger evidence for the usability of the model in applications.
暂无评论