title
stringlengths
1
149
section
stringlengths
1
1.9k
text
stringlengths
13
73.5k
Batch renaming
Problems
There are a few problems to take in consideration when renaming a file list. (→ means: renamed to) Detecting that the target filename already exist. file01 → file02 (file02 already exists in file-system) Detecting that the target filename is already used. file01 → file03 file02 → file03 (file03 is already used) Detecting cycle renaming (Solved by a two-pass renaming). file01 → file02 (file02 already exists in file-system)file02 → file03 (file03 already exists in file-system)file03 → file01 (file01 already exists in file-system)
Batch renaming
Two-pass renaming
Two-pass renaming uses a temporary filename (that doesn't exist in file-system) as shown below. (→ means: renamed to) First pass file01 → file01_AAAAA file02 → file02_AAAAB file03 → file03_AAAAC Second pass file01_AAAAA → file02 file02_AAAAB → file03 file03_AAAAC → file01 It solves the cycle renaming problem. If this approach is to be used care should be taken not to exceed any filename length limits during the rename, and also that the temporary names do not clash with any existing files.
Batch renaming
List of software
This is a list of notable batch renaming programs in the form of a comparison table.
Paint-on-glass animation
Paint-on-glass animation
Paint-on-glass animation is a technique for making animated films by manipulating slow-drying oil paints on sheets of glass. Gouache mixed with glycerine is sometimes used instead. The best-known practitioner of the technique is Russian animator Aleksandr Petrov; he has used it in seven films, all of which have won awards.
Paint-on-glass animation
Animators/films
Agamurad Amanov (Агамурад Аманов) Tuzik (Тузик) (2001) Childhood's Autumn, Осень детства (Osen detstva) (2005) (with Yekatirina Boykova) Martine Chartrand Black Soul (2000) Witold Giersz Little Western (Mały Western) (1960) Red and Black (Czerwone i czarne) (1963) Horse (Koń) (1967) The Stuntman (Kaskader) (1972) Fire (Pożar) (1975) Aleksey Karayev (Алексей Караев) Welcome, Добро пожаловать (Dobro pozhalovat) (1986) The Lodgers of an Old House, Жильцы старого дома (Zhiltsy starovo doma) (1987) I Can Hear You, Я вас слышу (Ya vas slyshu) (1992) Caroline Leaf The Street (1976) Marcos Magalhães Animando (1987) (partially; instructive film) Miyo Sato Fox Fears (2016) Mob Psycho 100 (2016, 2018) Natalya Orlova (Наталья Орлова) Hamlet (1992) King Richard III (1994) Moby Dick, Моби Дик (1999) Aleksandr Petrov (Александр Петров) (was art director on Karayev's Welcome in 1986) The Cow, Корова (Korova) (1989) The Dream of a Ridiculous Man, Сон смешного человека (Son smeshnovo cheloveka) (1992) The Mermaid, Русалка (Rusalka) (1997) The Old Man and the Sea (1999) Winter Days, 冬の日 (Fuyu no hi) (2003) (segment) My Love, Моя любовь (Moya lyubov) (2006) Georges Schwizgebel The Man With No Shadow, (L'homme sans ombre) (2004) Retouches, (Retouches) (2008) Vladimir Samsonov The Winter, Зима (Zima) (1979) Brightness, Блики (Bliki) (1981) Contrasts, Контрасты (Kontrasty) (1981) Contours, Контуры (Kontury) (1981) Masquerade, Маскарад (Maskarad) (1981) Still Life, Натюрморт (Natyurmort) (1981) Restoration, Реставрация (Restavratsiya) (1981) The Little Sun, Солнышко (Solnyshko) (1981) The Snail, Улитка (Ulitka) (1981) Magic Trick, Фокус (Fokus) (1981) Coloured Music, Цветомузыка (Tsvetomuzyka) (1981) The Bumblebee, Шмель (Shmel) (1981) Mood, Настроение (Nastroyeniye) (1982) The Landscape, Пейзаж (Peyzazh) (1982) Rendez-Vous, Свидание (Svidaniye) (1982) The Magpie, Сорока (Soroka) (1982) The Motif, Мотив (Motiv) (1984) Waiting for..., Ожидание (Ozhidaniye) (1984) Miniatures, Миниатюры (Miniatyury) (1985) Miniatures - 86, Миниатюры - 86 (Miniatyury - 86) (1986) Olive Jar Studios MTV: Greetings From The World (1988) Boris Stepantsev The Song About the Falcon, Песня о соколе (Pesnya o sokole) (1967) Wendy Tilby Strings (1991)
Modified Gibson Incision
Modified Gibson Incision
The Modified Gibson incision is a transverse incision above the pubis, frequently used in gynecological and urological surgeries. This incision can be made on either side of the midline, but often on the left. It is started 3 cm above and parallel to the inguinal ligament and extended vertically 3 cm medial to the anterior superior iliac spine up to the umbilicus. The modified Gibson incision allows proper access to the small bowel and pelvic organs and limited access to omentum. It is also possible to have tactile assessment of large bowel and subdiaphragmatic surfaces using this incision. This incision is preferred for lymph node dissection, as extra peritoneal approach of pelvic sidewall is possible. The inferior epigastric vessels and round ligament are ligated to provide easy exposure. If traction to the peritoneum is high, there is a chance for avulsion of the inferior mesenteric artery and inferior mesenteric vein.
Über quantentheoretische Umdeutung kinematischer und mechanischer Beziehungen
Über quantentheoretische Umdeutung kinematischer und mechanischer Beziehungen
Über quantentheoretische Umdeutung kinematischer und mechanischer Beziehungen ("Quantum theoretical re-interpretation of kinematic and mechanical relations") was a breakthrough article in quantum mechanics written by Werner Heisenberg, which appeared in Zeitschrift für Physik in September 1925.
Über quantentheoretische Umdeutung kinematischer und mechanischer Beziehungen
Über quantentheoretische Umdeutung kinematischer und mechanischer Beziehungen
Heisenberg worked on the article while recovering from hay fever on the island of Heligoland, corresponding with Wolfgang Pauli on the subject. When asked for his opinion of the manuscript, Pauli responded favorably, but Heisenberg said that he was still "very uncertain about it". In July 1925, he sent the manuscript to Max Born to review and decide whether to submit it for publication.In the article, Heisenberg tried to explain the energy levels of a one-dimensional anharmonic oscillator, avoiding the concrete but unobservable representations of electron orbits by using observable parameters such as transition probabilities for quantum jumps, which necessitated using two indexes corresponding to the initial and final states.Also included was the Heisenberg commutator, his law of multiplication needed to describe certain properties of atoms, whereby the product of two physical quantities did not commute. Therefore, PQ would differ from QP where, for example, P was an electron's momentum, and Q its position. Paul Dirac, who had received a proof copy in August 1925, realized that the commutative law had not been fully developed, and he produced an algebraic formulation to express the same results in more logical form.
Über quantentheoretische Umdeutung kinematischer und mechanischer Beziehungen
Historical context
The article laid the groundwork for matrix mechanics, later developed further by Born and Pascual Jordan. When Born read the article, he recognized the formulation as one which could be transcribed and extended to the systematic language of matrices. Born, with the help of his assistant and former student Pascual Jordan, began immediately to make the transcription and extension, and they submitted their results for publication; their manuscript was received for publication just 60 days after Heisenberg’s article. A follow-on article by all three authors extending the theory to multiple dimensions was submitted for publication before the end of the year.
Vouch by Reference
Vouch by Reference
Vouch by Reference (VBR) is a protocol used in Internet mail systems for implementing sender certification by third-party entities. Independent certification providers vouch for the reputation of senders by verifying the domain name that is associated with transmitted electronic mail. VBR information can be used by a message transfer agent, a mail delivery agent or by an email client. The protocol is intended to become a standard for email sender certification, and is described in RFC 5518.
Vouch by Reference
Operation
Email sender A user of a VBR email certification service signs its messages using DomainKeys Identified Mail (DKIM) and includes a VBR-Info field in the signed header. The sender may also use the Sender Policy Framework to authenticate its domain name. The VBR-Info: header field contains the domain name that is being certified, typically the responsible domain in a DKIM signature (d= tag), the type of content in the message, and a list of one or more vouching services, that is the domain names of the services that vouch for the sender for that kind of content: VBR-Info: md=domain.name.example; mc=type; mv=vouching.example:vouching2.example Email receiver An email receiver can authenticate the message's domain name using DKIM or SPF, thus finding the domains that are responsible for the message. It then obtains the name of a vouching service that it trusts, either from among the set supplied by the sender or from a locally configured set of preferred vouching services. Using the Domain Name System, the receiver can verify whether a vouching service actually vouches for a given domain. To do so, the receiver queries a TXT resource record for the name composed: domain.name.example._vouch.vouching.example The returned data, if any, is a space-delimited list of all the types that the service vouches, given as lowercase ASCII. They should match the self-asserted message content. The types defined are transaction, list, and all. Auditing the message may allow to establish whether its content corresponds. The result of the authentication can be saved in a new header field, according to RFC 6212, like so: Authentication-Results: receiver.example; vbr=pass header.mv=vouching.example header.md=domain.name.example
Vouch by Reference
Implementations and variations
OpenDKIM and MDaemon Messaging Server by Alt-N Technologies have been among the first software implementations of VBR. OpenDKIM provides a milter as well as a standalone library.
Vouch by Reference
Implementations and variations
Roaring Penguin Software's CanIt anti-spam filter supports VBR as of version 7.0.8 released on 2010-11-09.Spamhaus has released The Spamhaus Whitelist that includes a domain based whitelist, the DWL, where a domain name can be queried as, e.g., dwltest.com._vouch.dwl.spamhaus.org. Although the standard only specifies TXT resource records, following a long established DNSBL practice, Spamhaus has also assigned A resource records with values 127.0.2.0/24 for whitelist return codes. The possibility to query an address may allow easier deployment of existing code. However, their techfaq recommends checking the domain (the value of the d= tag) of a valid DKIM-Signature by querying the corresponding TXT record, and their howto gives details about inserting VBR-Info header fields in messages signed by whitelisted domains. By 2013, one of the protocol authors considered it a flop.
Simplicial localization
Simplicial localization
In category theory, a branch of mathematics, the simplicial localization of a category C with respect to a class W of morphisms of C is a simplicial category LC whose π0 is the localization C[W−1] of C with respect to W; that is, π0LC(x,y)=C[W−1](x,y) for any objects x, y in C. The notion is due to Dwyer and Kan.
Cyc
Cyc
Cyc (pronounced SYKE) is a long-term artificial intelligence project that aims to assemble a comprehensive ontology and knowledge base that spans the basic concepts and rules about how the world works. Hoping to capture common sense knowledge, Cyc focuses on implicit knowledge that other AI platforms may take for granted. This is contrasted with facts one might find somewhere on the internet or retrieve via a search engine or Wikipedia. Cyc enables semantic reasoners to perform human-like reasoning and be less "brittle" when confronted with novel situations.
Cyc
Cyc
Douglas Lenat began the project in July 1984 at MCC, where he was Principal Scientist 1984–1994, and then, since January 1995, has been under active development by the Cycorp company, where he is the CEO.
Cyc
Overview
The need for a massive symbolic artificial intelligence project of this kind was born in the early 1980s. Early AI researchers had ample experience over the previous 25 years with AI programs that would generate encouraging early results but then fail to "scale up"—move beyond the 'training set' to tackle a broader range of cases. Douglas Lenat and Alan Kay publicized this need, and they organized a meeting at Stanford in 1983 to address the problem. The back-of-the-envelope calculations by Lenat, Kay, and their colleagues (including Marvin Minsky, Allen Newell, Edward Feigenbaum, and John McCarthy) indicated that that effort would require between 1000 and 3000 person-years of effort, far beyond the standard academic project model. However, events within a year of that meeting enabled an effort of that scale to get underway.
Cyc
Overview
The project began in July 1984 as the flagship project of the 400-person Microelectronics and Computer Technology Corporation (MCC), a research consortium started by two dozen large United States based corporations "to counter a then ominous Japanese effort in AI, the so-called "fifth-generation" project." The US Government reacted to the Fifth Generation threat by passing the National Cooperative Research Act of 1984, which for the first time allowed US companies to "collude" on long-term high-risk high-payoff research, and MCC and Sematech sprang up to take advantage of that ten-year opportunity. MCC's first President and CEO was Bobby Ray Inman, former NSA Director and Central Intelligence Agency deputy director.
Cyc
Overview
The objective of the Cyc project was to codify, in machine-usable form, the millions of pieces of knowledge that compose human common sense. This entailed, along the way, (1) developing an adequately expressive representation language, CycL, (2) developing an ontology spanning all human concepts down to some appropriate level of detail, (3) developing a knowledge base on that ontological framework, comprising all human knowledge about those concepts down to some appropriate level of detail, and (4) developing an inference engine exponentially faster than those used in then-conventional expert systems, to be able to infer the same types and depth of conclusions that humans are capable of, given their knowledge of the world.
Cyc
Overview
In slightly more detail: The CycL representation language started as an extension of RLL (the so-called Representation Language Language, developed in 1979–1980 by Lenat and his graduate student Russell Greiner while at Stanford University), but within a few years of the launch of the Cyc project it became clear that even representing a typical news story or novel or advertisement would require more than the expressive power of full first-order logic, namely second-order predicate calculus ("What is the relationship between rain and water?") and then even higher-level orders of logic including modal logic, reflection (enabling the system to reason about its progress so far, on a problem on which it's working), and context logic (enabling the system to reason explicitly about the contexts in which its various premises and conclusions might hold), non-monotonic logic, and circumscription. By 1989, CycL had expanded in expressive power to higher-order logic (HOL).
Cyc
Overview
Triplestore representations (which are akin to the Frame -and-slot representation languages of the 1970s from which RLL sprang) are widespread today in AI. It may be useful to cite a few examples that stress or break that type of representation, typical of the examples that forced the Cyc project to move from a triplestore representation to a much more expressive one during the period 1984–1989: English sentences including negations ("Fred does not own a dog"), nested quantifiers ("Every American has a mother" means for-all x there-exists y... but "Every American has a President" means there-exists y such that for-all x...), nested modals such as "The United States believes that Germany wants NATO to avoid pursuing..." and it's even awkward to represent, in a Triplestore, relationships of arity higher than 2, such as "Los Angeles is between San Diego and San Francisco along US101." Cyc's ontology grew to about 100,000 terms during the first decade of the project, to 1994, and as of 2017 contained about 1,500,000 terms. This ontology included: 416,000 collections (types, sorts, natural kinds, which includes both types of things such as Fish and types of actions such as Fishing) a little over a million individuals representing 42,500 predicates (relations, attributes, fields, properties, functions), about a million generally well known entities such as TheUnitedStatesOfAmerica, BarackObama, TheSigningOfTheUSDeclarationOfIndependence, etc.
Cyc
Overview
An arbitrarily large number of additional terms are also implicitly present in the Cyc ontology, in the sense that there are term-denoting functions such as CalendarYearFn (when given the argument 2016, it denotes the calendar year 2016), GovernmentFn (when given the argument France it denotes the government of France), Meter (when given the argument 2016, it denotes a distance of 2.016 kilometers), and nestings and compositions of such function-denoting terms.
Cyc
Overview
The Cyc knowledge base of general common-sense rules and assertions involving those ontological terms was largely created by hand axiom-writing; it grew to about 1 million in 1994, and as of 2017 is about 24.5 million and has taken well over 1,000 person-years of effort to construct.
Cyc
Overview
It is important to understand that the Cyc ontological engineers strive to keep those numbers as small as possible, not inflate them, so long as the deductive closure of the knowledge base isn't reduced. Suppose Cyc is told about one billion individual people, animals, etc. Then it could be told 1018 facts of the form "Mickey Mouse is not the same individual as <Bullwinkle the Moose/Abraham Lincoln/Jennifer Lopez>". But instead of that, one could tell Cyc 10,000 Linnaean taxonomy rules followed by just 108 rules of the form "No mouse is a moose". And even more compactly, Cyc could instead just be given those 10,000 Linnaean taxonomy rules followed by just one rule of the form "For any two Linnaean taxons, if neither is explicitly known to be a supertaxon of the other, then they are disjoint". Those 10,001 assertions have the same deductive closure as the earlier-mentioned 1018 facts.
Cyc
Overview
The Cyc inference engine design separates the epistemological problem (what content should be in the Cyc KB) from the heuristic problem (how Cyc could efficiently infer arguments hundreds of steps deep, in a sea of tens of millions of axioms). To do the former, the CycL language and well-understood logical inference might suffice. For the latter, Cyc used a community-of-agents architecture, where specialized reasoning modules, each with its own data structure and algorithm, "raised their hand" if they could efficiently make progress on any of the currently open sub-problems. By 1994 there were 20 such heuristic level (HL) modules; as of 2017 there are over 1,050 HL modules.Some of these HL modules are very general, such as a module that caches the Kleene Star (transitive closure) of all the commonly-used transitive relations in Cyc's ontology.
Cyc
Overview
Some are domain-specific, such as a chemical equation-balancer. These can be and often are an "escape" to (pointer to) some externally available program or webservice or online database, such as a module to quickly "compute" the current population of a city by knowing where/how to look that up.CycL has a publicly released specification and dozens of HL modules were described in Lenat and Guha's textbook, but the actual Cyc inference engine code, and the full list of 1000+ HL modules, is Cycorp-proprietary.The name "Cyc" (from "encyclopedia", pronounced [saɪk], like "syke") is a registered trademark owned by Cycorp. Access to Cyc is through paid licenses, but bona fide AI research groups are given research-only no-cost licenses (cf. ResearchCyc); as of 2017, over 600 such groups worldwide have these licenses.
Cyc
Overview
Typical pieces of knowledge represented in the Cyc knowledge base are "Every tree is a plant" and "Plants die eventually". When asked whether trees die, the inference engine can draw the obvious conclusion and answer the question correctly.
Cyc
Overview
Most of Cyc's knowledge, outside math, is only true by default. For example, Cyc knows that as a default parents love their children, when you're made happy you smile, taking your first step is a big accomplishment, when someone you love has a big accomplishment that makes you happy, and only adults have children. When asked whether a picture captioned "Someone watching his daughter take her first step" contains a smiling adult person, Cyc can logically infer that the answer is Yes, and "show its work" by presenting the step by step logical argument using those five pieces of knowledge from its knowledge base. These are formulated in the language CycL, which is based on predicate calculus and has a syntax similar to that of the Lisp programming language.
Cyc
Overview
In 2008, Cyc resources were mapped to many Wikipedia articles. Cyc is presently connected to Wikidata. Future plans may connect Cyc to both DBpedia and Freebase.
Cyc
Overview
Much of the current work Cyc continues to be knowledge engineering, representing facts about the world by hand, and implementing efficient inference mechanisms on that knowledge. Increasingly, however, work at Cycorp involves giving the Cyc system the ability to communicate with end users in natural language, and to assist with the ongoing knowledge formation process via machine learning and natural-language understanding. Another large effort at Cycorp is building a suite of Cyc-powered ontological engineering tools to lower the bar to entry for individuals to contribute to, edit, browse, and query Cyc.
Cyc
Overview
Like many companies, Cycorp has ambitions to use Cyc's natural-language processing to parse the entire internet to extract structured data; unlike all others, it is able to call on the Cyc system itself to act as an inductive bias and as an adjudicator of ambiguity, metaphor, and ellipsis. There are few, if any, systematic benchmark studies of Cyc's performance.
Cyc
Knowledge base
The concept names in Cyc are CycL terms or constants. Constants start with an optional "#$" and are case-sensitive. There are constants for: Individual items known as individuals, such as #$BillClinton or #$France. Collections, such as #$Tree-ThePlant (containing all trees) or #$EquivalenceRelation (containing all equivalence relations). A member of a collection is called an instance of that collection. Functions, which produce new terms from given ones. For example, #$FruitFn, when provided with an argument describing a type (or collection) of plants, will return the collection of its fruits. By convention, function constants start with an upper-case letter and end with the string "Fn".
Cyc
Knowledge base
Truth functions, which can apply to one or more other concepts and return either true or false. For example, #$siblings is the sibling relationship, true if the two arguments are siblings. By convention, truth function constants start with a lower-case letter. Truth functions may be broken down into logical connectives (such as #$and, #$or, #$not, #$implies), quantifiers (#$forAll, #$thereExists, etc.) and predicates.Two important binary predicates are #$isa and #$genls. The first one describes that one item is an instance of some collection, the second one that one collection is a subcollection of another one. Facts about concepts are asserted using certain CycL sentences. Predicates are written before their arguments, in parentheses: (#$isa #$BillClinton #$UnitedStatesPresident) "Bill Clinton belongs to the collection of U.S. presidents." (#$genls #$Tree-ThePlant #$Plant) "All trees are plants." (#$capitalCity #$France #$Paris) "Paris is the capital of France." Sentences can also contain variables, strings starting with "?". These sentences are called "rules". One important rule asserted about the #$isa predicate reads: (#$implies (#$and (#$isa ?OBJ ?SUBSET) (#$genls ?SUBSET ?SUPERSET)) (#$isa ?OBJ ?SUPERSET)) "If OBJ is an instance of the collection SUBSET and SUBSET is a subcollection of SUPERSET, then OBJ is an instance of the collection SUPERSET". Another typical example is (#$relationAllExists #$biologicalMother #$ChordataPhylum #$FemaleAnimal) which means that for every instance of the collection #$ChordataPhylum (i.e. for every chordate), there exists a female animal (instance of #$FemaleAnimal), which is its mother (described by the predicate #$biologicalMother).The knowledge base is divided into microtheories (Mt), collections of concepts and facts typically pertaining to one particular realm of knowledge. Unlike the knowledge base as a whole, each microtheory must be free from monotonic contradictions. Each microtheory is a first-class object in the Cyc ontology; it has a name that is a regular constant; microtheory constants contain the string "Mt" by convention. An example is #$MathMt, the microtheory containing mathematical knowledge. The microtheories can inherit from each other and are organized in a hierarchy: one specialization of #$MathMt is #$GeometryGMt, the microtheory about geometry.
Cyc
Inference engine
An inference engine is a computer program that tries to derive answers from a knowledge base. The Cyc inference engine performs general logical deduction (including modus ponens, modus tollens, universal quantification and existential quantification). It also performs inductive reasoning, statistical machine learning and symbolic machine learning, and abductive reasoning (but of course sparingly and using the existing knowledge base as a filter and guide).
Cyc
Releases
OpenCyc The first version of OpenCyc was released in spring 2002 and contained only 6,000 concepts and 60,000 facts. The knowledge base was released under the Apache License. Cycorp stated its intention to release OpenCyc under parallel, unrestricted licences to meet the needs of its users. The CycL and SubL interpreter (the program that allows users to browse and edit the database as well as to draw inferences) was released free of charge, but only as a binary, without source code. It was made available for Linux and Microsoft Windows. The open source Texai project released the RDF-compatible content extracted from OpenCyc. A version of OpenCyc, 4.0, was released in June 2012. OpenCyc 4.0 included much of the Cyc ontology at that time, containing hundreds of thousands of terms, along with millions of assertions relating the terms to each other; however, these are mainly taxonomic assertions, not the complex rules available in Cyc. The OpenCyc 4.0 knowledge base contained 239,000 concepts and 2,093,000 facts.
Cyc
Releases
The main point of releasing OpenCyc was to help AI researchers understand what was missing from what they now call ontologies and knowledge graphs. It's useful and important to have properly taxonomized concepts like person, night, sleep, lying down, waking, happy, etc., but what's missing from the OpenCyc content about those terms, but present in the Cyc KB content, are the various rules of thumb that most of us share about those terms: that (as a default, in the ModernWesternHumanCultureMt) each person sleeps at night, sleeps lying down, can be woken up, is not happy about being woken up, and so on. That point does not require continually-updated releases of OpenCyc, so, as of 2017, OpenCyc is no longer available.
Cyc
Releases
ResearchCyc In July 2006, Cycorp released the executable of ResearchCyc 1.0, a version of Cyc aimed at the research community, at no charge. (ResearchCyc was in beta stage of development during all of 2004; a beta version was released in February 2005.) In addition to the taxonomic information contained in OpenCyc, ResearchCyc includes significantly more semantic knowledge (i.e., additional facts and rules of thumb) involving the concepts in its knowledge base; it also includes a large lexicon, English parsing and generation tools, and Java-based interfaces for knowledge editing and querying. In addition it contains a system for ontology-based data integration. As of 2017, regular releases of ResearchCyc continued to appear, with 600 research groups utilizing licenses around the world at no cost for noncommercial research purposes. As of December 2019, ResearchCyc is no longer supported. Cycorp expects to improve and overhaul tools for external developers over the coming years.
Cyc
Applications
There have been over a hundred successful applications of Cyc; listed here are a few mutually dissimilar instances: Pharmaceutical Term Thesaurus Manager/Integrator For over a decade, Glaxo has used Cyc to semi-automatically integrate all the large (hundreds of thousands of terms) thesauri of pharmaceutical-industry terms that reflect differing usage across companies, countries, years, and sub-industries. This ontology integration task requires domain knowledge, shallow semantic knowledge, but also arbitrarily deep common sense knowledge and reasoning. Pharma vocabulary varies across countries, (sub-) industries, companies, departments, and decades of time. E.g., what’s a gel pak? What’s the “street name” for ranitidine hydrochloride? Each of these n controlled vocabularies is an ontology with approximately 300k terms. Glaxo researchers need to issue a query in their current vocabulary, have it translated into a neutral “true meaning”, and then have that transformed in the opposite direction to find potential matches against documents each of which was written to comply with a particular known vocabulary. They had been using a large staff to do that manually. Cyc is used as the universal interlingua capable of representing the union of all the terms’ “true meanings”, and capable of representing the 300k transformations between each of those controlled vocabularies and Cyc, thereby converting an n² problem into a linear one without introducing the usual sort of “telephone game” attenuation of meaning. Furthermore, creating each of those 300k mappings for each thesaurus is done in a largely automated fashion, by Cyc.
Cyc
Applications
Terrorism Knowledge Base The comprehensive Terrorism Knowledge Base was an application of Cyc in development that tried to ultimately contain all relevant knowledge about "terrorist" groups, their members, leaders, ideology, founders, sponsors, affiliations, facilities, locations, finances, capabilities, intentions, behaviors, tactics, and full descriptions of specific terrorist events. The knowledge is stored as statements in mathematical logic, suitable for computer understanding and reasoning.
Cyc
Applications
Cleveland Clinic Foundation The Cleveland Clinic has used Cyc to develop a natural-language query interface of biomedical information, spanning decades of information on cardiothoracic surgeries. A query is parsed into a set of CycL (higher-order logic) fragments with open variables (e.g., "this question is talking about a person who developed an endocarditis infection", "this question is talking about a subset of Cleveland Clinic patients who underwent surgery there in 2009", etc.); then various constraints are applied (medical domain knowledge, common sense, discourse pragmatics, syntax) to see how those fragments could possibly fit together into one semantically meaningful formal query; significantly, in most cases, there is exactly one and only one such way of incorporating and integrating those fragments. Integrating the fragments involves (i) deciding which open variables in which fragments actually represent the same variable, and (ii) for all the final variables, decide what order and scope of quantification that variable should have, and what type (universal or existential). That logical (CycL) query is then converted into a SPARQL query that is passed to the CCF SemanticDB that is its data lake.
Cyc
Applications
MathCraft One Cyc application aims to help students doing math at a 6th grade level, helping them much more deeply understand that subject matter. It is based on the experience that we often have thought we understood something, but only really understood it after we had to explain or teach it to someone else. Unlike almost all other educational software, where the computer plays the role of the teacher, this application of Cyc, called MathCraft, has Cyc play the role of a fellow student who is always slightly more confused than you, the user, are about the subject. The user's role is to observe the Cyc avatar and give it advice, correct its errors, mentor it, get it to see what it's doing wrong, etc. As the user gives good advice, Cyc allows the avatar to make fewer mistakes of that type, hence, from the user's point of view, it seems as though the user has just successfully taught it something. This is a variation of learning by teaching.
Cyc
Criticisms
The Cyc project has been described as "one of the most controversial endeavors of the artificial intelligence history". Catherine Havasi, CEO of Luminoso, says that Cyc is the predecessor project to IBM's Watson. Machine-learning scientist Pedro Domingos refers to the project as a "catastrophic failure" for several reasons, including the unending amount of data required to produce any viable results and the inability for Cyc to evolve on its own.Robin Hanson, a professor of economics at George Mason University, gives a more balanced analysis: Of course the CYC project is open to criticism on its many particular choices. People have complained about its logic-like and language-like representations, about its selection of prototypical cases to build from (e.g., encyclopedia articles), about its focus on answering over acting, about how often it rebuilds vs. maintaining legacy systems, and about being private vs. publishing everything. But any large project like this would produce such disputes, and it is not obvious any of its choices have been seriously wrong. They had to start somewhere, and in my opinion they have now collected a knowledge base with a truly spectacular size, scope, and integration. Other architectures may well work better, but if knowing lots is anywhere near as important as Lenat thinks, I’d expect serious AI attempts to import CYC’s knowledge, translating it into a new representation. No other source has anywhere near CYC’s size, scope, and integration.
Cyc
Criticisms
A similar sentiment was expressed by Marvin Minsky: "Unfortunately, the strategies most popular among AI researchers in the 1980s have come to a dead end," said Minsky. So-called “expert systems,” which emulated human expertise within tightly defined subject areas like law and medicine, could match users’ queries to relevant diagnoses, papers and abstracts, yet they could not learn concepts that most children know by the time they are 3 years old. “For each different kind of problem,” said Minsky, “the construction of expert systems had to start all over again, because they didn’t accumulate common-sense knowledge.” Only one researcher has committed himself to the colossal task of building a comprehensive common-sense reasoning system, according to Minsky. Douglas Lenat, through his Cyc project, has directed the line-by-line entry of more than 1 million rules into a commonsense knowledge base.Gary Marcus, a professor of psychology and neural science at New York University and the cofounder of an AI company called Geometric Intelligence, says "it represents an approach that is very different from all the deep-learning stuff that has been in the news.” This is consistent with Doug Lenat's position that "Sometimes the veneer of intelligence is not enough".Stephen Wolfram writes: In the early days of the field of artificial intelligence, there were plenty of discussions of “knowledge representation”, with approaches based variously on the grammar of natural language, the structure of predicate logic or the formalism of databases. Very few large-scale projects were attempted (Doug Lenat’s Cyc being a notable counterexample).
Cyc
Criticisms
Marcus writes: The field might well benefit if CYC were systematically described and evaluated. If CYC has solved some significant fraction of commonsense reasoning, then it is critical to know that, both as a useful tool, and as a starting point for further research. If CYC has run into difficulties, it would be useful to learn from the mistakes that were made. If CYC is entirely useless, then researchers can at least stop worrying about whether they are reinventing the wheel.
Cyc
Criticisms
Every few years since it began publishing (1993), there is a new Wired Magazine article about Cyc, some positive and some negative (including one issue which contained one of each).
Cyc
Notable employees
This is a list of some of the notable people who work or have worked on Cyc either while it was a project at MCC (where Cyc was first started) or Cycorp.
Cedratine
Cedratine
Cedratine is a distilled beverage (liqueur) produced from citrus fruits with an alcohol percentage between 36 and 40 percent.It originated in Tunisia, where most of it is still produced. It is also popular in Corsica.Cedratine can be consumed either at room temperature, cold or served as the basis for many cocktails or fruit salads.
Native and foreign format
Native and foreign format
A native format, in the context of software applications, refers to the file format which the application is designed to work with. It captures the internal reality of the program as well as is possible. Most likely this is also the default format of the application. A native file format therefore most likely has a one to one relationship with the applications features. In turn, a foreign format is not a true reflection of application internals, even though it may be supported by an application. To read a foreign file causes translation of data, this can cause data loss and further editing may prevent faithful writing back to the foreign format.
Native and foreign format
Example
A document writer application may support a multitude of files, ranging from simple text files that only store characters and not font faces or sizes, to complex documents containing text effects and images. However, when these text files or documents are opened, they are not necessarily edited in their original format. Instead, the document writer may first convert the file into its own native data structure. Once the file is done being edited, the application will then convert the file back to its original format.
Native and foreign format
Example
In some cases, applications may be able to open (import) files, but not save (export) them in the same format. This may be due to licensing issues, or simply because the feature has not been implemented in the application's programming yet. However, the application will typically be able to save the document in its own native format or any of the other foreign formats it is programmed to export.
Native and foreign format
Example
For example, Microsoft Office Word 2003 is able to open Windows Write (*.wri) files, but cannot save them. Instead it is able to save them in its native Word Document (*.doc) format or a number of other common formats.
CourseManagement Open Service Interface Definition
CourseManagement Open Service Interface Definition
An open service interface definition (OSID) is a programmatic interface specification describing a service. These interfaces are specified by the Open Knowledge Initiative (OKI) to implement a service-oriented architecture (SOA) to achieve interoperability among applications across a varied base of underlying and changing technologies.
CourseManagement Open Service Interface Definition
Rationale
To preserve the investment in software engineering, program logic is separated from underlying technologies through the use of software interfaces each of which defines a contract between a service consumer and a service provider. This separation is the basis of any valid SOA. While some methods define the service interface boundary at a protocol or server level, OSIDs place the boundary at the application level to effectively insulate the consumer from protocols, server identities, and utility libraries that are in the domain to a service provider resulting in software which is easier to develop, longer-lasting, and usable across a wider array of computing environments.
CourseManagement Open Service Interface Definition
Rationale
OSIDs assist in software design and development by breaking up the problem space across service interface boundaries. Because network communication issues are addressed within a service provider and below the interface, there isn't an assumption that every service provider implement a remote communications protocol (though many do). OSIDs are also used for communication and coordination among the various components of complex software which provide a means of organizing design and development activities for simplified project management.
CourseManagement Open Service Interface Definition
Rationale
OSID providers (implementations) are often reused across a varied set of applications. Once software is made to understand the interface contract for a service, other compliant implementations may be used in its place. This achieves reusability at a high level (a service level) and also serves to easily scale software written for smaller more dedicated purposes.
CourseManagement Open Service Interface Definition
Rationale
An OSID provider implementation may be composed of an arbitrary number of other OSID providers. This layering technique is an obvious means of abstraction. When all the OSID providers implement the same service, this is called an adapter pattern. Adapter patterns are powerful techniques to federate, multiplex, or bridge different services contracting from the same interface without the modification to the application.
CourseManagement Open Service Interface Definition
List
Agent Assessment Authentication Authorization CourseManagement Dictionary Filing Grading Hierarchy Logging Messaging Repository Scheduling Workflow
Marketing exposure
Marketing exposure
Sometimes referred as Advertising Exposure, Marketing Exposure is the degree to which a company’s target market is exposed to the company’s communications about its product/ services, initiatives, etc. Exposure is the product of a marketing strategy, and once the strategy is implemented it is only a matter of time before exposure is put into action. Consumers recognize "marketing exposure" when the company creates and promotes a campaign. There are three types of marketing exposure: intensive, selective, and exclusive.
Marketing exposure
Overview
Marketing exposure is put into action after a marketing strategy has been implemented. In the marketing world, exposure is a number within a portfolio. In the consumer world, exposure is a company's campaign or brand that is trying to market specific products to help service the consumer. It is also a way to make a business stand out in the marketplace. Without marketing exposure, campaigns would be non-existent and therefore companies would suffer.
Marketing exposure
Purpose
Marketing exposure is a major part that determines a company's success in their market. Although it is never directly identified or defined, it crucial for helping a company progress, creating competition for other companies, making the company more credible with consumers, and overall benefit both the company while satisfying consumers. While all of this may seem easy, it typically takes months of preparation to create, launch, and manage a campaign. Campaigns must be exposed thoroughly in the market as much as possible without annoying or bothering consumers to the point of "overexposing" the campaign. There is a fine balance between keeping the consumers interested in a product or brand, and annoying them to the point that they have no interest in supporting a company. To expose a campaign successfully, many factors must be considered. Exposure is not only limited to a consumer base, exposure can also be to other companies in the market. These companies do not have to be similar to the business which aims for positive exposure, on the contrary the companies should be diverse which can reach into other markets opening up new pathways. Also as advised before diversifying into many sectors also reduces the risk of profit loss where as being too diverse means resources are stretched out very thin causing minimum returns. There must be a balances between taking risks and diversifying.
Marketing exposure
Objectives
Exposure objectives are the basic goals that the company is looking to accomplish in their campaign. Among the important goals, first understanding their consumer is key. For successful exposure, the company must create a target market—identify the specific consumer and their needs. Consumer factors and environmental factors can determine whether or not the company is capable of selling their product or service. Therefore, the company must evaluate what they have to offer and then determine how their product can help the consumer. Once the consumer and their needs have been identified, companies can figure out their goals and strategies as to how they can get the consumer to choose their product or service over the competitor's.
Marketing exposure
Objectives
Factors Within the objectives, factors must be taken into consideration. Factors fall into Environmental, Consumer, Product, and Company categories. Understanding these factors and how they effect the marketplace can greatly determine whether or not the objectives (or goals) can be attained.
Marketing exposure
Objectives
Environmental Environmental factors include change in every day consumer life. Examples include changes in family lifestyles, advances in technology, and the way consumers use the Internet. Companies cannot directly control changes in the environment, however they can create objectives or ways to market the product. If the company can expose the product in the right way, companies can convince the consumer that the product improves their environment and creates a service they believe they need.
Marketing exposure
Objectives
Consumer Consumer factors are key to selling a product. A company is capable of taking their product and selling it to potential buyers only if company understands their buyers. That is why companies must ask important questions such as: Who are potential customers? Where do they buy? When do they buy? How do they buy? What do they buy? Having a deeper understanding of these questions helps companies analyze their consumer and determine how to best approach them.
Marketing exposure
Objectives
Product The company's product is something that the company already has a deep understanding of. What makes the product such an important factor is determining its purpose and value in the marketplace. The purpose of the product depends on the tasks it completes, how small or large it is, and its complexity just to name a few.Next, the value in the particular marketplace is important. For example, a product such as a scientific computer is expensive, which eliminates many consumers because not many want to pay for a scientific computer. On the other hand, pepper, an inexpensive commodity, attracts many more consumers since they use it in everyday life—so the consumer demographic is much larger.
Marketing exposure
Objectives
Company Company factors are of highest importance. The company must understand their place in the marketplace and recognize their financial, human, and technological capabilities. The financial, human, and technological capabilities of a company determine how efficiently the company can execute their campaign. Once these factors are understood and recognized, the company can then create a successful campaign. Companies must also connect with other companies for the most effect in exposure. This is due to the reason that branching out to make connections will create bonds and pathways for companies to extend into other markets which they can receive more exposure. If done correctly the exposure gained will result on sales of goods and services increasing which would mean the exposure to these new markets would cause the investments into such sectors open and increase the return on investments
Marketing exposure
Strategizing
Once objectives are set, the company can begin strategizing how they can successfully approach and execute their campaign. The basic principles of marketing strategy are simply stated: to achieve persistent success in the marketplace over competition. With these basic principles, the company must recognize their competition, and strategize how they can be unique, while yielding positive results in the marketplace. To yield the best results in the market place requires two essential elements: the issue of the position, specifically within the 'strategic triangle' (the customers, competitors, and corporation), and of time (the analysis of the past and future). Using these principles and essential elements, companies must develop their campaign strategies. The company must develop these strategies and then determine their rate of exposure, who they are exposing it to, and how they plan on presenting the information. These strategies embody a range of marketing techniques from the campaign slogan to where advertising is placed.
Marketing exposure
Strategizing
Many Companies and brands use there 5 tactics i the brand or products marketing exposure. They are; online advertisement, for example any form of social media; product bundling which is pairing ur products with other small and inexpensive items to create an illusion of receiving more for what you're paying; giving your product away to influencers or even regular people in order to spread awareness on your product; "Buy one and get another free", one very popular yet not spoken about strategy which encourages people to buy your product over other products; and last but not least product testing which encourages others to trust not only the product but brand as well.
Marketing exposure
The Portfolio
The general goal of the portfolio is to compile data to show to customers or employers how successful or unsuccessful the campaign and exposure was. Since the global financial crisis, it has been crucial for companies to use portfolios. The marketing exposure portfolio holds all of the monetary information that assesses how the exposure is interacting with consumers in the marketplace, the amount of money being spent on the campaign, as well as the amount of returns the company is getting for the campaign from the consumers. This portfolio helps to determine the gross potential, and when the company can break even.After the campaign has ended, it also allows the company to assess how well their campaign worked and whether or not consumers embraced the company's product. After reviewing these numbers companies can then assess the effectiveness of the campaign and if in the future events the campaign needs to be changed. by keeping connected to the target market companies can read the thought patterns and plan for future implementations of the type of exposure which would result a high profit with the least amount of cost and use of resource.
Dichlorprop
Dichlorprop
Dichlorprop is a chlorophenoxy herbicide similar in structure to 2,4-D that is used to kill annual and perennial broadleaf weeds. It is a component of many common weedkillers. About 4 million pounds of dichlorprop are used annually in the United States.
Dichlorprop
Chemistry
Dichlorprop possesses a single asymmetric carbon and is therefore a chiral molecule, however only the R-isomer is active as an herbicide. When dichlorprop was first marketed in the 1960s, it was sold as racemic mixture of stereoisomers, but since then advances in asymmetric synthesis have made possible the production of the enantiopure compound. Today, only R-dichlorprop (also called dichlorprop-p or 2,4-DP-p) and its derivatives are sold as pesticides in the United States.
Dichlorprop
Chemistry
Dichlorprop is a carboxylic acid, and like related herbicides with free acid groups, it is often sold as a salt or ester. Currently, the 2-ethylhexyl ester is used commercially. The butoxyethyl and isooctyl esters were once popular, but are no longer approved for agricultural use. For the salts, the dimethylamine salt is still available, while the diethanolamine salt is no longer used.
Dichlorprop
Chemistry
According to the United States Environmental Protection Agency (EPA), "2,4-DP-p is thought to increase cell wall plasticity, biosynthesis of proteins, and the production of ethylene. The abnormal increase in these processes result in abnormal and excessive cell division and growth, damaging vascular tissue. The most susceptible tissues are those that are undergoing active cell division and growth."
Dichlorprop
Health effects
The EPA rates the oral acute toxicity of dichlorprop as "slight" based on a rat LD50 of 537 mg/kg, and its derivatives are even less toxic. It is, however, considered to be a severe eye irritant. There has been concern that chlorophenoxy herbicides including dichlorprop may cause cancer, and in 1987 the International Agency for Research on Cancer (IARC) ranked this class of compounds as group 2B "possibly carcinogenic to humans". The EPA classifies the R-isomer as “Not Likely to be Carcinogenic to Humans.”
Diamagnetic inequality
Diamagnetic inequality
In mathematics and physics, the diamagnetic inequality relates the Sobolev norm of the absolute value of a section of a line bundle to its covariant derivative. The diamagnetic inequality has an important physical interpretation, that a charged particle in a magnetic field has more energy in its ground state than it would in a vacuum.To precisely state the inequality, let L2(Rn) denote the usual Hilbert space of square-integrable functions, and H1(Rn) the Sobolev space of square-integrable functions with square-integrable derivatives.
Diamagnetic inequality
Diamagnetic inequality
Let f,A1,…,An be measurable functions on Rn and suppose that loc 2(Rn) is real-valued, f is complex-valued, and f,(∂1+iA1)f,…,(∂n+iAn)f∈L2(Rn) Then for almost every x∈Rn In particular, |f|∈H1(Rn)
Diamagnetic inequality
Proof
For this proof we follow Elliott H. Lieb and Michael Loss. From the assumptions, loc 1(Rn) when viewed in the sense of distributions and for almost every x such that f(x)≠0 (and ∂j|f|(x)=0 if f(x)=0 ). Moreover, So for almost every x such that f(x)≠0 . The case that f(x)=0 is similar.
Diamagnetic inequality
Application to line bundles
Let p:L→Rn be a U(1) line bundle, and let A be a connection 1-form for L In this situation, A is real-valued, and the covariant derivative D satisfies Dfj=(∂j+iAj)f for every section f . Here ∂j are the components of the trivial connection for L If loc 2(Rn) and f,(∂1+iA1)f,…,(∂n+iAn)f∈L2(Rn) , then for almost every x∈Rn , it follows from the diamagnetic inequality that The above case is of the most physical interest. We view Rn as Minkowski spacetime. Since the gauge group of electromagnetism is U(1) , connection 1-forms for L are nothing more than the valid electromagnetic four-potentials on Rn If F=dA is the electromagnetic tensor, then the massless Maxwell–Klein–Gordon system for a section ϕ of L are and the energy of this physical system is The diamagnetic inequality guarantees that the energy is minimized in the absence of electromagnetism, thus A=0
Red/black concept
Red/black concept
The red/black concept, sometimes called the red–black architecture or red/black engineering, refers to the careful segregation in cryptographic systems of signals that contain sensitive or classified plaintext information (red signals) from those that carry encrypted information, or ciphertext (black signals). Therefore, the red side is usually considered the internal side, and the black side the more public side, with often some sort of guard, firewall or data-diode between the two.
Red/black concept
Red/black concept
In NSA jargon, encryption devices are often called blackers, because they convert red signals to black. TEMPEST standards spelled out in Tempest/2-95 specify shielding or a minimum physical distance between wires or equipment carrying or processing red and black signals.Different organizations have differing requirements for the separation of red and black fiber optic cables. Red/black terminology is also applied to cryptographic keys. Black keys have themselves been encrypted with a "key encryption key" (KEK) and are therefore benign. Red keys are not encrypted and must be treated as highly sensitive material.
Red/black concept
Red/Gray/Black
The NSA's Commercial Solutions for Classified (CSfC) program, which uses two layers of independent, commercial off-the-shelf cryptographic products to protect classified information, includes a red/gray/black concept. In this extension of the red/black concept, the separated gray compartment handles data that has been encrypted only once, which happens at the red/gray boundary. The gray/black interface adds or removes a second layer of encryption.
Yergason's test
Yergason's test
Yergason's test is a special test used for orthopedic examination of the shoulder and upper arm region, specifically the biceps tendon.
Yergason's test
Purpose
It identifies the presence of a pathology involving the biceps tendon or glenoid labrum. The specific positive findings to the test include pain in the bicipital groove indicating biceps tendinitis, subluxation of the long head of the biceps brachii muscle, and presence of a SLAP tear.
Yergason's test
Procedure
Palpating the biceps tendon as it passes through the bicipital groove to identify any lesions, abnormal bumps, or abnormal movement (i.e. biceps tendon) in the involved area.
Yergason's test
Mechanism
To perform the test, the examiner must stand on the affected side of the patient. The patient needs to be in a seated position with the elbow flexed to 90°, forearm pronated (palm facing the ground), and the arm stabilized against the thorax. The examiner places the stabilizing hand on the proximal portion of the humerus near the bicipital groove, and the resistance hand on the distal forearm and wrist.The patient is instructed to actively supinate the forearm, externally rotate the humerus, and flex the elbow against the resistance of the examiner. Referred pain by the patient results in one of positive findings.
Yergason's test
Mechanism
Modification involves the examiner resisting elbow flexion as the humerus moves into external rotation.
Yergason's test
Results
Biceps tendinitis or subluxation of the biceps tendon can normally be addressed by palpating the long head of the biceps tendon in the bicipital groove. The patient will exhibit a pain response, snapping or both in the bicipital groove. Pain with no associated popping might indicate bicipital tendinopathy. A snapping indicates a tear or laxity of the transverse humeral ligament, which would prevent the ligament from securing the tendon in the groove. Pain at the superior glenohumeral joint is indicative of a SLAP tear.
Yergason's test
Adverse effects
This is a difficult test to perform for an accurate diagnosis. False positive findings can be the result of a rotator cuff tear, while pain in the superior glenohumeral region is a weak predictor of a SLAP tear.
Harvest Moon 3D: A New Beginning
Harvest Moon 3D: A New Beginning
Harvest Moon 3D: A New Beginning (牧場物語はじまりの大地, Bokujō Monogatari: Hajimari no Daichi, lit. "Ranch Story: Land of the Beginning") is a game for the Nintendo 3DS released by Natsume. It is the last entry in the franchise released on the Nintendo 3DS systems to receive the title of Harvest Moon.
Harvest Moon 3D: A New Beginning
Gameplay
The story involves reviving an abandoned town named Echo Village in order to allow the residents and animals to return.
Harvest Moon 3D: A New Beginning
Gameplay
New features to the Harvest Moon series include extensive character customization, design of the house and furniture of the protagonist, and the ability to customize the appearance of the village the game takes place in.The multiplayer mode is region-free, and players can bring their cows and furry animals like sheep and alpaca, and can milk or shear each other's animals. Sometimes a giant animal will spawn, which give players five big products. Starting players can get a lot of money from collecting animal products in multiplayer, thus the good reception of the multiplayer feature. Players must bring a gift which will be swapped randomly at the beginning of the session. Players can do multiplayer over local connection or Internet, and with "Anyone" or "Friends".
Harvest Moon 3D: A New Beginning
Gameplay
There are twelve marriage candidates for the player to choose from, six women and six men. Each are unlocked at different points during the game as the town is developed, and three are not unlocked until the end of the game including the Witch Princess, Amir, and Sanjay.
Harvest Moon 3D: A New Beginning
Plot
The player (male is by default named Henry and female is by default named Rachel) arrives in a town called Echo Village, where they meet Dunhill, the town's mayor. He reveals that the town is fallen into disarray and many villagers have moved away as a result. After showing the player their farm, the player attempts to revive the village and construct buildings to motivate the villagers into coming back and convince new people to move in. Aiding the player is the Harvest Goddess and two Harvest Sprites: Aaron and Alice. Once the player is successful, a firework celebration is held to honor their success in restoring Echo Village.
Harvest Moon 3D: A New Beginning
Development
Natsume, Inc. announced on May 29, 2012, that Harvest Moon 3D: A New Beginning would be released in North America. The game was released early by Natsume in North America and started shipping on October 19 instead of closer to its original street date, November 6. It was announced on June 5, 2013, that the game would be released in Europe by Marvelous AQL Europe during Q3 of 2013. A New Beginning is the first true 3DS Harvest Moon game, preceded by Harvest Moon: The Tale of Two Towns which was developed for the DS and released alongside a port for the 3DS. A New Beginning introduces features to the series, including the ability to fully customize the player, farm, and the town of setting.
Harvest Moon 3D: A New Beginning
Release
Special edition preorders included a stuffed cow doll, and regular version preorders included a yak doll. The publisher Natsume announced on October 17, 2012, that the game had gone gold and that there was "unprecedented" interest in the special 15th anniversary edition of the game.
Harvest Moon 3D: A New Beginning
Reception
The game received above-average reviews according to the review aggregation website Metacritic. IGN cited the edit features, character customization, extensive tutorials, and a gradual beginning. In Japan, Famitsu gave it a score of 32 out of 40.
Shinayakana Systems Approach
Shinayakana Systems Approach
The Shinayakana Systems Approach is a systems approach for "solving the complex systems with ill-defined structure" proposed by Sawaragi, Nakayama and Nakamori in 1987. This approach is interactive, intelligent and interdisciplinary, and emphasizes honesty, humanity and harmony.
Shinayakana Systems Approach
History
The Shinayakana Systems Approach was the first approach in a wave of East Asian systems scientists theorizing about their systems methodologies in the last decade of the twentieth century using the concepts of intuition and group collaboration, which has resulted in several new approached to knowledge creation.
Shinayakana Systems Approach
The Name
"Shinayakana" is an adjective in Japanese, the closest translation to English is "supple." The meaning is something between hard and soft.
Shinayakana Systems Approach
The Approach
The Shinayakana Systems Approach tried to resolve the controversy between hard and soft systems methodologies, using the Eastern philosophy of yin and yang. The approach does not specify an algorithmic recipe for knowledge and technology creation, only a set of principles for systemic problem solving:"Using intuition, keeping an open mind, trying diverse approaches and perspectives, being adaptive and ready to learn from mistakes, and being elastic like a willow but sharp as a sword - in short, Shinayakana."This approach is an interactive, intelligent and interdisciplinary (I3) system approach with emphasizing honesty, humanity and harmony (H3).