Random Articles (Page 2)

Have a deep view into what people are curious about.

πŸ”— Wikipedia: Signs of AI Writing

This is a list of phrases and formatting conventions typical of AI chatbots, such as ChatGPT, with real examples taken from Wikipedia articles and drafts. Note that not all text featuring the following indicators is AI-generated; large language models, which power AI-chatbots, have been trained on human writing, and humans might happen to have a writing style similar to that of an AI. Be cautious when relying on automated artificial intelligence detection software such as GPTZero. While these services perform better than random chance, they should not replace human judgment.

Beyond simply being indicators, the following phrasings and conventions often violate Wikipedia's Manual of Style or introduce a promotional or non-neutral tone; therefore appropriate use of AI chatbots on Wikipedia should not exhibit any of these indicators.

Discussed on

πŸ”— Object Oriented Role Analysis and Modeling

The Object Oriented Role Analysis and Modeling (OOram) is a method, based on the concept of role, for performing object-oriented modeling.

Originally (1989) coined Object Oriented Role Analysis, Synthesis and Structuring (OORASS), the method focuses on describing patterns of interaction without connecting the interaction to particular objects/instances. OOram was originally developed by Trygve Reenskaug (1996), a professor at the University of Oslo and the founder of the Norwegian IT company Taskon. The use of "roles" in OOram is similar in application to that of Agent-oriented programming.

Enterprise models created according to OOram may have a number of views, with each view presenting certain aspects of a model. The following ten views are proposed:

  1. Area of concern view: Textual description of a phenomenon represented in the role model.
  2. Stimulus-response view: Describes how environment roles may trigger activities in the organization (stimulus), together with the effect (response).
  3. Role list view: List describing all roles of a role model together with attributes and textual explanation.
  4. Semantic view: Describes meaning of roles and relationships between roles.
  5. Collaboration view: Describes patterns of roles and message paths.
  6. Interface view: Describes all messages that can be sent along a message path.
  7. Scenario view: Provides a sample sequence of messages flowing between roles (a concrete example).
  8. Process view: Describes data flow between roles and associated activities performed by the roles.
  9. State diagram view: For each role, the legal states can be described together with messages that trigger transitions.
  10. Method specification view: Describes what messages to send for each method belonging to a role. May also specify procedures to perform.

OOram suggests a varied mix of formal and informal notations and languages for representing and communicating models. Which view to use depends upon the needs in a particular situation.

Discussed on

πŸ”— Asynchronous (Clockless) CPU

πŸ”— Computing πŸ”— Electronics πŸ”— Electrical engineering

An asynchronous circuit, or self-timed circuit, is a sequential digital logic circuit which is not governed by a clock circuit or global clock signal. Instead it often uses signals that indicate completion of instructions and operations, specified by simple data transfer protocols. This type of circuit is contrasted with synchronous circuits, in which changes to the signal values in the circuit are triggered by repetitive pulses called a clock signal. Most digital devices today use synchronous circuits. However asynchronous circuits have the potential to be faster, and may also have advantages in lower power consumption, lower electromagnetic interference, and better modularity in large systems. Asynchronous circuits are an active area of research in digital logic design.

Discussed on

πŸ”— Chicago Principles

πŸ”— Freedom of speech

The Chicago principles are a set of guiding principles intended to demonstrate a commitment to freedom of speech and freedom of expression on college campuses in the United States. Initially adopted by the University of Chicago following a report issued by a designated Committee on Freedom of Expression in 2014 (β€³Report of the Committee on Freedom of Expressionβ€³), they came to be known as the β€œChicago principles”, as the Foundation for Individual Rights in Education (FIRE) led a campaign to encourage other universities across the country sign up to the principles or model their own based on similar goals.

Since 2014, a number of other universities have committed to the principles, including Princeton, Purdue, and Washington University in St. Louis. As of August 2020, FIRE reported that 76 U.S. colleges and universities had "adopted or endorsed the Chicago Statement or a substantially similar statement."

Discussed on

πŸ”— Rabin-Karp Algorithm for finding matching substrings in text

πŸ”— Computing πŸ”— Computer science πŸ”— Computing/Software πŸ”— Computing/Computer science

In computer science, the Rabin–Karp algorithm or Karp–Rabin algorithm is a string-searching algorithm created by Richard M. Karp and Michael O. RabinΒ (1987) that uses hashing to find an exact match of a pattern string in a text. It uses a rolling hash to quickly filter out positions of the text that cannot match the pattern, and then checks for a match at the remaining positions. Generalizations of the same idea can be used to find more than one match of a single pattern, or to find matches for more than one pattern.

To find a single match of a single pattern, the expected time of the algorithm is linear in the combined length of the pattern and text, although its worst-case time complexity is the product of the two lengths. To find multiple matches, the expected time is linear in the input lengths, plus the combined length of all the matches, which could be greater than linear. In contrast, the Aho–Corasick algorithm can find all matches of multiple patterns in worst-case time and space linear in the input length and the number of matches (instead of the total length of the matches).

A practical application of the algorithm is detecting plagiarism. Given source material, the algorithm can rapidly search through a paper for instances of sentences from the source material, ignoring details such as case and punctuation. Because of the abundance of the sought strings, single-string searching algorithms are impractical.

Discussed on

πŸ”— Kirkbride Plan

πŸ”— Architecture πŸ”— Psychology πŸ”— Sociology πŸ”— Correction and Detention Facilities πŸ”— Urban studies and planning πŸ”— Hospitals

The Kirkbride Plan was a system of mental asylum design advocated by American psychiatrist Thomas Story Kirkbride (1809–1883) in the mid-19th century. The asylums built in the Kirkbride design, often referred to as Kirkbride Buildings (or simply Kirkbrides), were constructed during the mid-to-late-19th century in the United States. The structural features of the hospitals as designated by Kirkbride were contingent on his theories regarding the healing of the mentally ill, in which environment and exposure to natural light and air circulation were crucial. The hospitals built according to the Kirkbride Plan would adopt various architectural styles, but had in common the "bat wing" style floor plan, housing numerous wings that sprawl outward from the center.

The first hospital designed under the Kirkbride Plan was the Trenton State Hospital in Trenton, New Jersey, constructed in 1848. Throughout the remainder of the nineteenth century, numerous psychiatric hospitals were designed under the Kirkbride Plan across the United States. By the twentieth century, popularity of the design had waned, largely due to the economic pressures of maintaining the immense facilities, as well as contestation of Kirkbride's theories amongst the medical community.

Numerous Kirkbride structures still exist, though many have been demolished or partially-demolished and repurposed. At least 30 of the original Kirkbride buildings have been registered with the National Register of Historic Places in the United States, either directly or through their location on hospital campuses or in historic districts.

Discussed on

πŸ”— Mathematical Manuscripts of Karl Marx

πŸ”— Mathematics πŸ”— Philosophy πŸ”— Socialism

The mathematical manuscripts of Karl Marx are a manuscript collection of Karl Marx's mathematical notes where he attempted to derive the foundations of infinitesimal calculus from first principles.

The notes that Marx took have been collected into four independent treatises: On the Concept of the Derived Function, On the Differential, On the History of Differential Calculus, and Taylor's Theorem, MacLaurin's Theorem, and Lagrange's Theory of Derived Functions, along with several notes, additional drafts, and supplements to these four treatises. These treatises attempt to construct a rigorous foundation for calculus and use historical materialism to analyze the history of mathematics.

Marx's contributions to mathematics did not have any impact on the historical development of calculus, and he was unaware of many more recent developments in the field at the time, such as the work of Cauchy. However, his work in some ways anticipated, but did not influence, some later developments in 20th century mathematics. These manuscripts, which are from around 1873–1883, were not published in any language until 1968 when they were published in the Soviet Union alongside a Russian translation. Since their publication, Marx's independent contributions to mathematics have been analyzed in terms of both his own historical and economic theories, and in light of their potential applications of nonstandard analysis.

Discussed on

πŸ”— 2013 Shahbag Protest

πŸ”— Bangladesh

On 5 February 2013, protests began in Shahbag, Bangladesh following demands for capital punishment for Abdul Quader Mollah, who had been sentenced to life imprisonment, and for others convicted of war crimes by the International Crimes Tribunal of Bangladesh. On that day, the International Crimes Tribunal had sentenced Mollah to life in prison after he was convicted on five of six counts of war crimes. Later demands included banning the Bangladesh Jamaat-e-Islami party from politics including election and a boycott of institutions supporting (or affiliated with) the party.

Protesters considered Mollah's sentence too lenient, given his crimes. Bloggers and online activists called for additional protests at Shahbag. Tens of thousands of people joined the demonstration, which gave rise to protests across the country.

A counter-protest, questioning the validity of the tribunal and the protest movement and demanding release of those accused and convicted, was launched by Jamaat-e-Islami as its leaders were the majority of those first identified for trial. The Bangladesh Nationalist Party (BNP) initially expressed its support for Jamaat-e-Islami, a political ally. But, the BNP cautiously welcomed the Shahbag protest, while warning the government not to make political mileage from a movement demanding capital punishment for war criminals.

During the protests, Ahmed Rajib Haider was killed outside his house. On 1 March, five students of North South University were arrested who 'confessed' involvement in Rajib's killing. On 27 February 2013, the tribunal convicted Delwar Hossain Sayeedi of war crimes and sentenced him to death. Jamaat followers protested and there were violent clashes with police. About 60 people were killed in the confrontations; most were Jamaat-Shibir activists, and others were police and civilians.

Discussed on

πŸ”— K-anonymity

πŸ”— Internet πŸ”— Cryptography πŸ”— Cryptography/Computer science

k-anonymity is a property possessed by certain anonymized data. The concept of k-anonymity was first introduced by Latanya Sweeney and Pierangela Samarati in a paper published in 1998 as an attempt to solve the problem: "Given person-specific field-structured data, produce a release of the data with scientific guarantees that the individuals who are the subjects of the data cannot be re-identified while the data remain practically useful." A release of data is said to have the k-anonymity property if the information for each person contained in the release cannot be distinguished from at least k βˆ’ 1 {\displaystyle k-1} individuals whose information also appear in the release.

K-anonymity received widespread media coverage in 2018 when British computer scientist Junade Ali used the property alongside cryptographic hashing to create a communication protocol to anonymously verify if a password was leaked without disclosing the searched password. This protocol was implemented as a public API in Troy Hunt's Have I Been Pwned? service and is consumed by multiple services including password managers and browser extensions. This approach was later replicated by Google's Password Checkup feature.

Discussed on

πŸ”— Nipkow disk

πŸ”— Technology πŸ”— Television

A Nipkow disk (sometimes Anglicized as Nipkov disk; patented in 1884), also known as scanning disk, is a mechanical, rotating, geometrically operating image scanning device, patented in 1885 by Paul Gottlieb Nipkow. This scanning disk was a fundamental component in mechanical television through the 1920s and 1930s.

Discussed on