Specification of the metric in xact.

How can I find the unknown function? V (r) specifying the metric met in this gravitational theory? I have defined the variety as:

DefManifold[M, 4, {[Alpha], [Beta], [Sigma], [Delta], [Iota], 
[Mu], [Omicron], [FinalSigma], [Tau], [Upsilon], [Chi], 
[Omega], [Nu], [Rho], [Gamma]}]

and also a table like:

DefChart[[ScriptCapitalB], M, {0, 1, 2, 3}, {t[],
r[], [Theta][], [Phi][]}, ChartColor -> Blue].

The Lagrangian of gravitational theory is:

[ScriptCapitalL] =
1 / (2 [Kappa]) (-two [CapitalLambda]0 + RicciScalarCD[]) ([Eta] P) //


P = 12 RiemannCD[-[-[-[-[Mu], [Rho], -[Nu], [Sigma]]RiemannCD[-[-[-[-[Rho], 
[Gamma], -[Sigma], [Delta]]RiemannCD[-[-[-[-[Gamma], [Mu], -[Delta], 
[Nu]]+ RiemannCD[[[[[Rho], [Sigma], -[Mu], -[Nu]]RiemannCD[
[Gamma], [Delta], -[Rho], -[Sigma]]RiemannCD[[[[[Mu], [Nu], -
[Gamma], -[Delta]]-
12 RiemannCD[-[-[-[-[Mu], -[Nu], -[Rho], -[Sigma]]RicciCD[[[[[Mu], 
[Rho]]RicciCD[[[[[Nu], [Sigma]]+
8 ricciCD[[[[[Nu], -[Mu]]RicciCD[[[[[Rho], -[Nu]]RicciCD[[[[[Mu], -

The scalar function that appears in the metric is V (r) and one can define it as:



met = MatrixForm[{{V[r[{{V[r[{{V[r[{{V[r[]], 0, 0, 4 n V[r[r[r[r[]]Cos[[[[[Theta][]]}, {0, 0, 0,
0}, {0, 0, (r[]^ 2 - n ^ 2), 0}, {4 n V[r[r[r[r[]]Cos[[[[[Theta][]], 0, 0,
4 n ^ 2 Cos[[[[[Theta][]]^ 2 V

r[]]+ (r[]^ 2 - n ^ 2) Sin[[[[[Theta][]]^ 2}}]

Now, the question is, how to replace the metric in the field equations and how to find the potential V (r)?

ray network – What is the Big-O bandwidth for LN? Can anyone answer this or provide a link to a specification that is sufficient for us to calculate it?

This is an excellent question, but probably a little below what is specified. Let me try to give an answer and elaborate.

When looking at the bandwidth of the network, there are several components that play in it.

The most obvious (and probably the most dominant) is specified in BOLT 07 routing-gossip. There are 4 messages that are used to provide information about the gossip protocol to each node.

  • the Ad_signatures Message
  • the channel announcement Message
  • the node ad Message
  • the channel_update Message

While the first is only sent between two pairs to decide whether a channel remains private or not, the second and third must be sent to each node. The way in which gossip accomplishes this is by forwarding the message to each pair if it was received and new to the node. Therefore, the amortized / expected network bandwidth for these messages should be O (E / V * (E + V)) where E / V It is the middle degree of the node. Y my the number of edges and V The number of nodes In the worst case (unrealistic) of a fully connected graphic we have E = V * V and therefore O (V ^ 3 + V ^ 2) = O (V ^ 3)

The situation is even worse for the fourth message. Each time the routing rates are adjusted by a node, this message should be sent to all other nodes and created O (E / V * (E)) messages While the 3rd and 4th messages will only be propagated when they are received first. The update message can be sent every second and will propagate every time. This requirement for network bandwidth can be arbitrary (? Still limited by the second), even for small networks. This is obviously also an attack vector ddos. There is the challenge of the million channels by oxidized to stimulate this behavior.

Other less dominant components are messages that are only exchanged between pairs to maintain channel status. While connecting, handshakes, etc. They seem to be negative, there is a case of routing. Assume, in a first step, that each routing process is successful, then the bandwidth will grow as O (b * t) with t being the number of transactions or payments made by the network and second being the intermediate centrality of the node in the rate chart that, according to this video, it is probable that this node is in the cheapest route. This should be corrected for the probability of routing failures. For the general network, it could be the product of the number of transactions by the average route times by the average number of routing attempts.

There is also the bandwidth of the network that comes from the Bitcoin node, but that should not change with the growth of the rays.

I hope I have not lost anything. Things change drastically with AMP routing, since each payment is divided into several small payments.

Software: conversion from DITA to PDF, correct use of the specification?

The company I work for recently asked me to take ownership of their files responsible for converting DITA to PDF.

I have little experience with DITA, but after reading a bit I am a bit confused. In the state of the DITA manual there are all these things that will happen when it is issued in a desired format depending on the attributes you set for what elements.

However, in the system of my company, everything is dictated by style sheets.

We have an application with a reduced version of Oxygen embedded in it. This application uses several XSL files together with Saxon.jar to combine several DITA files into one XML file and then transforms it into HTML. Then a CSS file with a third-party application is used to print in PDF.

This seems too complicated and a misuse of the specification; there is a toolkit provided by DITA that generates files as specified. But we write in DITA and then we transform it the way we want (because we want a completely different result than the DITA toolkit would give us), and we often have to look for solutions, since DITA does not have or does not allow the combination of Elements or attributes that we need.
Third-party software also does not comply with CSS specifications, for example, flex-boxes and grids are not compatible and edge collapse does not work as it should.

Does this make sense for someone to take care of the transformation in this way?
For me, it seems that we are using DITA only because there are large companies that use it, even if it does not suit our needs.

c # – What is the difference between the pattern pattern and the specification pattern

I am implementing a cli application in C # of the old game and wanted to know what is the best pattern to use to make the "AI" that would be the player vs. team in the case.

I've been looking at some patterns to do that and I wondered which one to use.

My doubt about the implementation of the strategy and the specification is that both are to validate some type of input and return the probable result for that input value. What would be the difference of implementation between the two and what is its usability, when should I use the strategy and when should I opt for the specification?

Is there any specification or standard for .mobileconfig?

I see many comments about mobileconfig files to create new boxes. It seems as if they were a configuration file for Profiles. Is there a specification or standard from which they are generated, or can they be analyzed?

Is there any where this is documented?

excel – the matrix specification in INDEX can be modified

This screenshot above is a fragment of my spreadsheet to date (all data values ​​are assumed to be composite). Column B of the file contains 54043 linenter image descriptions here of data .qif that produce 4574 definitional and transactional data. I have modified an INDEX to show the desired results. In summary, this method transforms a single vertical row into many horizontal rows.

I need help in two ways:
1 – I need to know the maximum difference found between two consecutive rows that contain a number in column D. A number in column D is a trigger for future action. For example, row # 5244 – row # 5237 = 8 which is the size of this matrix – $ B $ 5227: $ B $ 5244. Determining MAX will give me the number of columns (plus 4) that I need for this spreadsheet.
2 – Second, I am looking for a method to modify the configuration of the matrix in this statement:
= INDICE $ B $[beg row], $ B $: $ B[end row], A $ 1.1)

There are two results for this seemingly simple formula:
to. When matrix processing ends, #REF! it is winnowed. The use of ISREF will store "" for the rest of the cells in the row.
second. When you drag to the right, the column reference A $ 1 changes to B $ 1, C $ 1, D $ 1 … returning the column numbers 1,2,3,4 that are used as row numbers. Sparkly! By the way, the …, 1) is a coded column number within the matrix.

Can the matrix of an INDEX function be modified in part or in its entirety? [begin row] it is available in column D and can be a simple substitution. [end row] It is more difficult to determine. I need help here

A couple of thoughts:
1. Insert a column after D and generate a final row number after the initial row in D. This makes [begin row]/[end row] Substitution in INDEX and determination of MAX more simple.[Note:ifaperformanceconsiderationLAISREFhastoexecuteINDEXtwiceforeachstringcelltry#REF!Firstandagainproducingavalueinthisexample4574linesxaverageof10ccsperline2=90000executionsifitismade[Note:thisisalsoaperformanceconsiderationTheISREFhastoexecuteINDEXtwiceforeachcellinthearrayietesting#REF!FirstandthenagainproducingavalueInthisexample4574linesxavgof10colsperline2=90000executionsifperformingthe[Nota:estotambiénesunaconsideraciónderendimientoLaISREFdebeejecutarINDEXdosvecesparacadaceldadelamatrizesdecir¡probar#REF!PrimeroyluegonuevamenteproduciendounvalorEnesteejemplo4574líneasxpromediode10colsporlínea2=90000ejecucionessiserealizael[Note:thisisalsoaperformanceconsiderationTheISREFhastoexecuteINDEXtwiceforeachcellinthearrayietesting#REF!firstandthenagainproducingavalueInthisexample4574linesxavgof10colsperline2=90000executionsifperformingthe[end row] search within the INDEX function. To make sure that 90,00 executions are still made, but faster is to make simple substitutions. ]

  1. I have other options but the previous one is the cleanest so far.
    For example, a brute force option is this:
    "= INDIRECT (ADDRESS ((FILA ($ B2) -RECTO ($ B $ 1) +1) * 1 + COLUMN (B2) -COLUMN ($ B2), COLUMN ($ B2)))".
    Copy a vertical cell. When you drag to the right you get the next vertical cell and so on; it also advances the column number to the end of the set of columns.

Any solution (s) here or other ideas? all are valued

Compliance: Does the SOC 2 audit specification require credentials?

If we need to present a SOC 2 audit report to a third party, can we simply hire someone to review our software and the processes specified by our guide, or use an internal resource, or does the specification require that it be true? third party that makes the review and the report? Or, can we do this? Are there any requirements in the specification as to who does the audit and the report?

GUI design: problem with a product specification / data point that is generated by the user (the range may vary)

This may be a bit difficult to explain but I hope you can understand me.

I have this current problem. Let's say I have a website that is for a database of sports / water drinks with product information about it.

I have a capacity for users to measure the PH level at home and send it to the database. Now I have a problem, that is, if there are multiple presentations at the end of the PH spectrum, IE a presentation in 2 and a presentation in 9

My 2 questions are:

  1. When people want to search and filter our database by sending PH, what value should I assign to this product with the variable range?

  2. I'm confused how could I show this too

I hope this makes sense!

Formal methods – Specification language Z

I need to use formal methods to verify if a software behaves as it should. I could use the Z language for the specification, but I would prefer to use a more recent language. Does anyone know if there is a more recent specification language that is currently being used for the software specification? The language pack Z in MikTeX has been updated in 2005.

Web application – UX design specification format

We have a legacy product (based on desktop, developed since the 90's) that is quite successful despite having some defects of UX and UI. We have recently decided to redesign that as SPA.

In the process, we would like to start by trying to improve the UX (if it is not right) by having it designed by an UX professional outside the company so that it has a new and impartial point of view and sees the product. This will be our first experience with an adequate UX design.

I think we know the domain, we know what users want / appreciate, what operations are the most common and require quick access, etc.

As it is now, we have the specification (more or less) listed in the form of "essay" or "letter" that describes the functional, non-functional requirements, operations, etc. in free language.

We have deliberately decided not to make any wiring or detailed suggestions on how the system should look or behave so as not to influence the designer through our integrated minds. In addition to the suggestion that you should have a Material design, a small contradiction here;) We have also decided not to include the current product aspect.

We see that it should look like a modern application, with a design similar to GMail or Google Docs:

  • standard toolbar on top
  • Master views / details
  • some notifications arriving
  • some markers

… simply nothing extraordinary these days, but I would still like it to be designed correctly.

We hope that the designer comes back with more questions and we will be happy to provide you with answers. But our goal really is to let him / her do the work with the most open mind possible.

Is this approach naive / laughable?

Will the designer appreciate the freedom given? Or would you prefer to get a very detailed description with suggestions on what our vision is in terms of UX / UI and correct it?

Should we adopt a more structured and standard approach to the specification document? If so, any clues about the structure?

Second, if this does not close as too broad or depressed, what would be the price range, if someone can estimate on the basis of the above facts? (Ducks)

Thanks in advance.