AIMMS Function Reference - Set Functions
|
|
|
- Christian Alexander
- 10 years ago
- Views:
Transcription
1 AIMMS Function Reference - Set Functions This file contains only one chapter of the book. For a free download of the complete book in pdf format, please visit Aimms 3.13
2 Set Related Functions Aimms supports the following set related functions: ActiveCard Card CloneElement ConstraintVariables Element ElementCast ElementRange FindUsedElements First Last Ord RestoreInactiveElements RetrieveCurrentVariableValues SetAddRecursive SetElementAdd SetElementRename StringToElement SubRange VariableConstraints
3 Set Related Functions 41 ActiveCard The function ActiveCard returns the cardinality of active elements in its identifier argument, or the cardinality of active elements of a suffix of that identifier. Card( Identifier, [Suffix]! (input identifier reference! (optional element in the set AllSuffixNames Identifier A reference to a set or an indexed identifier. Suffix An element in the predefined set AllSuffixNames. If Identifier is a set, the function ActiveCard returns the number of active elements in Identifier. If Identifier is an indexed identifier, the function ActiveCard returns the number of nondefault values stored for Identifier. If Suffix is given, the number of nondefault values stored for the given suffix of Identifier. Remarks: The ActiveCard function cannot be applied to slices of indexed identifiers. In such a case, you can use the Count operator to count the number of nondefault elements. See also: The function Card and Count operator (see also Section of the Language Reference.
4 Set Related Functions 42 Card The function Card returns the cardinality of its identifier argument, or of the cardinality of a suffix of that identifier. Card( Identifier, [Suffix]! (input identifier reference! (optional element in the set AllSuffixNames Identifier A reference to a set or an indexed identifier. Suffix An element in the predefined set of AllSuffixNames. If Identifier is a set, the function Card returns the number of elements in Identifier. If Identifier is an indexed identifier, the function Card returns the number of nondefault values stored for Identifier. If Suffix is given, the number of nondefault values stored for the given suffix of Identifier. Remarks: The Card function cannot be applied to slices of indexed identifiers. In such a case, you can use the Count operator to count the number of nondefault elements. When the Card function is used inside the definition of a parameter or a set and the first argument is an index or element parameter into the set AllIdentifiers then the definition depends on all identifiers that can appear on the left hand side of an assignment (sets without a definition, parameters without a definition, variables and constraints. The cardinality will be computed for all identifiers, including those with a definition. These definitions will not be made up to date, however. This is illustrated in the following example. PARAMETER: identifier : A ; PARAMETER: identifier : B definition : A + 1 ; PARAMETER: identifier : TheCards index domain : IndexIdentifiers definition : Card( IndexIdentifiers, Level ; body: A := 1 ; display TheCards ;
5 Set Related Functions 43 See also: Here TheCards is computed in the display statement because A just changed. The definition of TheCards, that is made up to date by the display statement, will, however, not invoke the computation of B, although it is not up to date. This is done in order to avoid circular references while making set and parameter definitions up to date. In order to make B up to date consider using the Update statement, see also Section 7.3 of the Language Reference. The function ActiveCard and the Count operator (see also Section of the Language Reference.
6 Set Related Functions 44 CloneElement The procedure CloneElement copies the data associated with a particular element to another element. CloneElement( updateset,! (input, output a set identifier originalelement,! (input an element in the set clonename,! (input a string that is the name of the clone cloneelement,! (output an element parameter includedefinedsubsets! (optional an integer, default 0. The procedure CloneElement performs the following actions: 1. It creates or finds an element with name clonename: cloneelement. The element cloneelement is inserted into updateset if it is not already there. This insertion is only permitted if updateset does not have a definition. 2. For each domain set of updateset, say insertdomainset, the element cloneelement is inserted into insertdomainset if it is not already there. Such an insertion is only permitted if insertdomainset does not have a definition. 3. For each subset of updateset, say insertsubset in which originalelement is an element, cloneelement is also inserted into insertsubset. If includedefinedsubsets is 0, then insertsubset is skipped if it is a defined subset. 4. The domain sets of steps 1 and 2, and the sets modified in step 3 form a set, say modifiedsets. 5. Identifiers declared over a set in modifiedsets that meet one of the following criteria, are selected: It is a non-local multi-dimensional set without a definition. It is a non-local parameter without a definition. It is a variable. It is a constraint. These identifiers form the set modifiedidentifiers. 6. For each identifier in the set modifiedidentifiers, and all suffixes of this identifier, the data associated with element originalelement is copied to cloneelement. updateset A one-dimensional non-compound set. originalelement An element valued expression that should result in an element in updateset. clonename A string expression that should result in a name that is in the set updateset or can be added to that set.
7 Set Related Functions 45 cloneelement An element parameter, in which the resulting element is stored. includedefinedsubsets When non-zero, defined subsets are included in the modifiedsets as well. When these defined subsets are evaluated thereafter again, this may result in the creation of inactive data. Inactive data can be removed by a CLEANUP or CLEANDEPENDENTS statement, see Section 24.3 of the Language Reference. Defined subsets that are defined as an enumeration are never included. The procedure returns 1 if successful and 0 otherwise. Possible reasons for returning 0 are: originalelement is not in updateset. clonename equals name of originalelement. There are no identifiers modified. Remarks: If you want to make sure that the string clonename is not yet an element in updateset, use a statement like: if ( not ( clonename in updateset then CloneElement(... ; endif ; Example: With the following declarations (and initial data: SET: identifier : S index : i, j parameter : ep initial data : data { a } ; PARAMETER: identifier : P index domain : i initial data : data { a : 1 } ; PARAMETER: identifier : Q index domain : (i,j initial data : data { ( a, a : 1 } ; the statement CloneElement( S, a, "b", ep ; results in S, P, Q and ep having the following data:
8 Set Related Functions 46 See also: S := data { a, b } ; P := data { a : 1, b : 1 } ; Q := data { ( a, a : 1, ( a, b : 1, ( b, a : 1, ( b, b : 1 } ; ep := b ; The function StringToElement, the procedure FindUsedElements and the procedure RestoreInactiveElements.
9 Set Related Functions 47 ConstraintVariables The function ConstraintVariables returns all the symbolic variables that are referred in a certain collection of constraints, including the variables that are referred in the definitions of these variables. ConstraintVariables( Contraints! (input a subset of AllConstraints Contraints The set of constraints for which you want to retrieve the referred variables. The function returns a subset of the set AllVariables, containing the variables found. See also: The function VariableConstraints.
10 Set Related Functions 48 Element With the function Element you can retrieve then-th element from a set. Element( Set, n! (input set reference! (input integer expression Set n The set from which an element is to be returned. An integer expression indicating the ordinal number of the element to be returned. The function Element returns then-th element of set Set. Remarks: If there is non-th element in Set, the function returns the empty element instead.
11 Set Related Functions 49 ElementCast With the function ElementCast you can cast an element of one set to an (existing element with the same name in a set with a different root set. ElementCast( set,! (input a set expression element,! (input a scalar element expression [create]! (optional 0 or 1 set A set in which you want to find a specific element name. element A scalar element expression, representing the element that you want to convert to a different root set hierarchy. create (optional An indicator whether or not a nonexisting element are added to the set during the call. The function returns the existing element or, if the element cannot be converted to an existing element and the argument create is not set to 1, the function returns the empty element. If create is set to 1, nonexisting elements will be created on the fly. See also: The procedure SetElementAdd.
12 Set Related Functions 50 ElementRange With the function ElementRange you can create a set with elements in which each element can be constructed using a prefix string, a postfix string, and a a sequential number. ElementRange( from,! (input integer expression to,! (input integer expression [incr,]! (optional integer expression [prefix,]! (optional string expression [postfix,]! (optional string expression [fill]! (optional 0 or 1 from The integer value for which the first element must be created to The integer value for which the last element must be created incr (optional The integer-valued interval length between two consecutive elements. If omitted, then the default interval length of 1 is used. prefix (optional The prefix string for every element. If omitted, then the elements have no prefix (and thus start with the number. postfix (optional The postfix string for every element. If omitted, then the elements have no postfix (and thus end with the number. fill (optional This logical indicator specifies whether the numbers must be padded with leading zeroes. If omitted, then the default value 1 is used. The function returns a set containing the created elements.
13 Set Related Functions 51 FindUsedElements The procedure FindUsedElements finds all elements of a particular set that are in use in a given collection of indexed model identifiers. FindUsedElements( SearchSet,! (input a set SearchIdentifiers,! (input a subset of AllIdentifiers UsedElements! (output a subset SearchSet The set for which you want to find the used elements. SearchIdentifiers A subset of AllIdentifiers, holding identifiers that are indexed over SearchSet. UsedElements A subset of SearchSet. On return this subset will contain the elements that are currently used (i.e. have corresponding nondefault values in the identifiers contained in SearchIdentifiers.
14 Set Related Functions 52 First With the function First you can retrieve the first element from a set. First( Set,! (input set reference Set The set from which the first element is to be returned. The function First returns the first element of set Set. Remarks: If there is no element in Set, the function returns the empty element instead.
15 Set Related Functions 53 Last With the function Last you can retrieve the last element from a set. Last( Set,! (input set reference Set The set from which the last element is to be returned. The function Last returns the last element of set Set. Remarks: If there is no element in Set, the function returns the empty element instead.
16 Set Related Functions 54 Ord The function Ord returns the ordinal number of a set element relative to a set. Ord( index, [set]! (input element expression! (optional set reference index An element expression for which you want to obtain the ordinal number. set (optional The set with respect to which you want the ordinal number to be taken. If omitted, set is assumed to be the range of the argument index. The function Ord returns the ordinal number of index in set set. Remarks: A compile time error occurs if the argument set is not present, and Aimms is unable to determine the range of index.
17 Set Related Functions 55 RestoreInactiveElements The procedure RestoreInactiveElements finds and restores all elements that were previously removed from a particular set, but for which inactive data still exists in a given collection of indexed model identifiers. RestoreInactiveElements( SearchSet,! (input/output a set SearchIdentifiers,! (input a subset of AllIdentifiers UsedElements! (output a subset SearchSet The set for which you want to find the inactive elements. SearchIdentifiers A subset of AllIdentifiers, holding identifiers that are indexed over SearchSet. UsedElements A subset of SearchSet. On return this subset will contain all the inactive elements that are currently used (i.e. have corresponding nondefault values in the identifiers contained in SearchIdentifiers. Remarks: The inactive elements found are placed in the result-set, but are also automatically added to the search-set.
18 Set Related Functions 56 RetrieveCurrentVariableValues With the procedure RetrieveCurrentVariableValues you can obtain the variable values for a given collection of variables during a running solution process. This procedure can only be called from within the context of a solver callback procedure. RetrieveCurrentVariableValues( Variables! (input a subset of AllVariables Variables A subset of AllVariables, holding all the variables for which you want to retrieve the current values. See also: Solver callback procedures are discussed in full detail in Section 15.2 of the Language Reference
19 Set Related Functions 57 SetAddRecursive With the procedure SetAddRecursive you can merge the elements of one set into another set. SetAddRecursive( toset, fromset! (input/output a set! (input a set toset The set into which the elements of fromset are merged. fromset The set that you want to merge in toset. Remarks: The sets toset and fromset should have the same root set. The difference between this function and a regular set assignment is that in case fromset is not the domain of toset all elements added to toset will also be added to the domain set of toset
20 Set Related Functions 58 SetElementAdd With the procedure SetElementAdd you can add new elements to a set. When you apply SetElementAdd to a root set, the element will be added to that root set. When you apply it to a subset, the element will be added to the subset as well as to all its supersets, up to and including its associated root set. SetElementAdd( Setname,! (input/output a set Elempar,! (output an element parameter Newname! (input a scalar string expression Setname The root set or subset to which you want to add the element. Elempar An element parameter into Setname, that on return will point to the newly added element. Newname A string holding the name of the element to be added. Remarks: If the element already exists in the set, the procedure does not make any changes to the set, and on return the element parameter Elempar will point to the existing element. See also: The functionelementcast and the proceduressetelementrename andstringtoelement. The lexical conventions for set elements in Section 2.3 of the Language Reference.
21 Set Related Functions 59 SetElementRename With the procedure SetElementRename you can rename an element in a set. SetElementRename( Setname, Element, Newname! (input a set! (input an element parameter! (input a scalar string expression Setname The root set or subset in which you want to rename an element. Element The element that you want to rename. Newname A string holding the new name of the element. Remarks: If the new name for the element already exists in the set, the procedure will generate an execution error. Aimms will refuse to rename a set element, if an explicit reference to such an element exists in the model source. See also: The procedure SetElementAdd, and the function StringToElement. The lexical conventions for set elements in Section 2.3 of the Language Reference.
22 Set Related Functions 60 StringToElement With the function StringToElement you can convert a string into an (existing element of a set. StringToElement( Set,! (input a set expression Name,! (input a scalar string [create]! (optional 0 or 1, default 0 Set A set in which you want to find a specific element name. Name A scalar string expression, representing the string that you want to convert. create (optional An indicator whether or not a nonexisting element are added to the set during the call. The function returns the existing element or, if the string cannot be converted to an existing element and the argument create is not set to 1, the function return the empty element. If create is set to 1, nonexisting elements will be created on the fly. See also: The function ElementCast and the procedure SetElementAdd. The lexical conventions for set elements in Section 2.3 of the Language Reference.
23 Set Related Functions 61 SubRange The function SubRange extracts a subrange of consecutive elements from an existing set. SubRange( Superset, First, Last! (input a simple or compound set! (input an element! (input an element Superset The set containing the subrange of elements that you want to extract. First An element in Superset representing the first element of the subrange. Last An element in Superset representing the last element of the subrange. The function returns a set containing the subrange of elements extracted from Superset. If the element First is positioned after Last, then the empty set is returned.
24 Set Related Functions 62 VariableConstraints The function VariableConstraints returns all the symbolic constraints that refer to one or more variables in a given set of variables. VariableConstraints( Variables! (input a subset of AllVariables Variables The set of variables for which you want to retrieve the constraints that refer to them. This is a subset of AllVariables. The function returns a subset of the set AllConstraints, containing the constraints found. See also: The function ConstraintVariables.
AIMMS Function Reference - Data Change Monitor Functions
AIMMS Function Reference - Data Change Monitor Functions This file contains only one chapter of the book. For a free download of the complete book in pdf format, please visit www.aimms.com Aimms 3.13 Data
AIMMS User s Guide - Advanced Data Management
AIMMS User s Guide - Advanced Data Management This file contains only one chapter of the book. For a free download of the complete book in pdf format, please visit www.aimms.com or order your hardcopy
AIMMS Tutorial for Professionals - Quantities and Time
AIMMS Tutorial for Professionals - Quantities and Time This file contains only one chapter of the book. For a free download of the complete book in pdf format, please visit www.aimms.com Aimms 3.13 Copyright
AIMMS Function Reference - Arithmetic Functions
AIMMS Function Reference - Arithmetic Functions This file contains only one chapter of the book. For a free download of the complete book in pdf format, please visit www.aimms.com Aimms 3.13 Part I Function
AIMMS 4.0. Portable component Linux Intel version. Release Notes for Build 4.9. Visit our web site www.aimms.com for regular updates AIMMS
AIMMS 4.0 Portable component Linux Intel version Release Notes for Build 4.9 Visit our web site www.aimms.com for regular updates AIMMS September 2, 2015 Contents Contents 2 1 System Overview of the Intel
Glossary of Object Oriented Terms
Appendix E Glossary of Object Oriented Terms abstract class: A class primarily intended to define an instance, but can not be instantiated without additional methods. abstract data type: An abstraction
AP Computer Science Java Subset
APPENDIX A AP Computer Science Java Subset The AP Java subset is intended to outline the features of Java that may appear on the AP Computer Science A Exam. The AP Java subset is NOT intended as an overall
10CS35: Data Structures Using C
CS35: Data Structures Using C QUESTION BANK REVIEW OF STRUCTURES AND POINTERS, INTRODUCTION TO SPECIAL FEATURES OF C OBJECTIVE: Learn : Usage of structures, unions - a conventional tool for handling a
ORACLE 9I / 10G / 11G / PL/SQL COURSE CONTENT
ORACLE 9I / 10G / 11G / PL/SQL COURSE CONTENT INTRODUCTION: Course Objectives I-2 About PL/SQL I-3 PL/SQL Environment I-4 Benefits of PL/SQL I-5 Benefits of Subprograms I-10 Invoking Stored Procedures
09336863931 : provid.ir
provid.ir 09336863931 : NET Architecture Core CSharp o Variable o Variable Scope o Type Inference o Namespaces o Preprocessor Directives Statements and Flow of Execution o If Statement o Switch Statement
Automata Theory. Şubat 2006 Tuğrul Yılmaz Ankara Üniversitesi
Automata Theory Automata theory is the study of abstract computing devices. A. M. Turing studied an abstract machine that had all the capabilities of today s computers. Turing s goal was to describe the
The C Programming Language course syllabus associate level
TECHNOLOGIES The C Programming Language course syllabus associate level Course description The course fully covers the basics of programming in the C programming language and demonstrates fundamental programming
The Designer's Guide to VHDL
The Designer's Guide to VHDL Third Edition Peter J. Ashenden EDA CONSULTANT, ASHENDEN DESIGNS PTY. LTD. ADJUNCT ASSOCIATE PROFESSOR, ADELAIDE UNIVERSITY AMSTERDAM BOSTON HEIDELBERG LONDON m^^ yj 1 ' NEW
KITES TECHNOLOGY COURSE MODULE (C, C++, DS)
KITES TECHNOLOGY 360 Degree Solution www.kitestechnology.com/academy.php [email protected] [email protected] Contact: - 8961334776 9433759247 9830639522.NET JAVA WEB DESIGN PHP SQL, PL/SQL
Paper 70-27 An Introduction to SAS PROC SQL Timothy J Harrington, Venturi Partners Consulting, Waukegan, Illinois
Paper 70-27 An Introduction to SAS PROC SQL Timothy J Harrington, Venturi Partners Consulting, Waukegan, Illinois Abstract This paper introduces SAS users with at least a basic understanding of SAS data
The System Designer's Guide to VHDL-AMS
The System Designer's Guide to VHDL-AMS Analog, Mixed-Signal, and Mixed-Technology Modeling Peter J. Ashenden EDA CONSULTANT, ASHENDEN DESIGNS PTY. LTD. VISITING RESEARCH FELLOW, ADELAIDE UNIVERSITY Gregory
Agile Software Development
Agile Software Development Lecturer: Raman Ramsin Lecture 13 Refactoring Part 3 1 Dealing with Generalization: Pull Up Constructor Body Pull Up Constructor Body You have constructors on subclasses with
IBM SPSS Data Preparation 22
IBM SPSS Data Preparation 22 Note Before using this information and the product it supports, read the information in Notices on page 33. Product Information This edition applies to version 22, release
PL/SQL Overview. Basic Structure and Syntax of PL/SQL
PL/SQL Overview PL/SQL is Procedural Language extension to SQL. It is loosely based on Ada (a variant of Pascal developed for the US Dept of Defense). PL/SQL was first released in ١٩٩٢ as an optional extension
Lab 2 : Basic File Server. Introduction
Lab 2 : Basic File Server Introduction In this lab, you will start your file system implementation by getting the following FUSE operations to work: CREATE/MKNOD, LOOKUP, and READDIR SETATTR, WRITE and
PART-A Questions. 2. How does an enumerated statement differ from a typedef statement?
1. Distinguish & and && operators. PART-A Questions 2. How does an enumerated statement differ from a typedef statement? 3. What are the various members of a class? 4. Who can access the protected members
SQL Server. 2012 for developers. murach's TRAINING & REFERENCE. Bryan Syverson. Mike Murach & Associates, Inc. Joel Murach
TRAINING & REFERENCE murach's SQL Server 2012 for developers Bryan Syverson Joel Murach Mike Murach & Associates, Inc. 4340 N. Knoll Ave. Fresno, CA 93722 www.murach.com [email protected] Expanded
Java Application Developer Certificate Program Competencies
Java Application Developer Certificate Program Competencies After completing the following units, you will be able to: Basic Programming Logic Explain the steps involved in the program development cycle
Web Intelligence User Guide
Web Intelligence User Guide Office of Financial Management - Enterprise Reporting Services 4/11/2011 Table of Contents Chapter 1 - Overview... 1 Purpose... 1 Chapter 2 Logon Procedure... 3 Web Intelligence
Specifying Data. 9.1 Formatted data: the data command
9 Specifying Data As we emphasize throughout this book, there is a distinction between an AMPL model for an optimization problem, and the data values that define a particular instance of the problem. Chapters
Positional Numbering System
APPENDIX B Positional Numbering System A positional numbering system uses a set of symbols. The value that each symbol represents, however, depends on its face value and its place value, the value associated
AIMMS Tutorial for Professionals - Absentee and Planning Overviews
AIMMS Tutorial for Professionals - Absentee and Planning Overviews This file contains only one chapter of the book. For a free download of the complete book in pdf format, please visit www.aimms.com Aimms
Software Engineering
Software Engineering Lecture 04: The B Specification Method Peter Thiemann University of Freiburg, Germany SS 2013 Peter Thiemann (Univ. Freiburg) Software Engineering SWT 1 / 50 The B specification method
DATA STRUCTURES USING C
DATA STRUCTURES USING C QUESTION BANK UNIT I 1. Define data. 2. Define Entity. 3. Define information. 4. Define Array. 5. Define data structure. 6. Give any two applications of data structures. 7. Give
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY 2.1 Introduction In this chapter, I am going to introduce Database Management Systems (DBMS) and the Structured Query Language (SQL), its syntax and usage.
AIMMS Language Reference - Format of Text Data Files
AIMMS Language Reference - Format of Text Data Files This file contains only one chapter of the book. For a free download of the complete book in pdf format, please visit www.aimms.com or order your hardcopy
Integrating VoltDB with Hadoop
The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.
C++ Programming: From Problem Analysis to Program Design, Fifth Edition. Chapter 3: Input/Output
C++ Programming: From Problem Analysis to Program Design, Fifth Edition Chapter 3: Input/Output Objectives In this chapter, you will: Learn what a stream is and examine input and output streams Explore
Algebra 2 Notes AII.7 Functions: Review, Domain/Range. Function: Domain: Range:
Name: Date: Block: Functions: Review What is a.? Relation: Function: Domain: Range: Draw a graph of a : a) relation that is a function b) relation that is NOT a function Function Notation f(x): Names the
Package uptimerobot. October 22, 2015
Type Package Version 1.0.0 Title Access the UptimeRobot Ping API Package uptimerobot October 22, 2015 Provide a set of wrappers to call all the endpoints of UptimeRobot API which includes various kind
Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide
Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing
Chapter 13 - The Preprocessor
Chapter 13 - The Preprocessor Outline 13.1 Introduction 13.2 The#include Preprocessor Directive 13.3 The#define Preprocessor Directive: Symbolic Constants 13.4 The#define Preprocessor Directive: Macros
FEEG6002 - Applied Programming 5 - Tutorial Session
FEEG6002 - Applied Programming 5 - Tutorial Session Sam Sinayoko 2015-10-30 1 / 38 Outline Objectives Two common bugs General comments on style String formatting Questions? Summary 2 / 38 Objectives Revise
INF5140: Specification and Verification of Parallel Systems
INF5140: Specification and Verification of Parallel Systems Lecture 7 LTL into Automata and Introduction to Promela Gerardo Schneider Department of Informatics University of Oslo INF5140, Spring 2007 Gerardo
SESAM USER MANUAL BRIX EXPLORER SESAM CONFIGURATION. Best Engineering Practice DET NORSKE VERITAS
USER MANUAL BRIX EXPLORER SESAM CONFIGURATION Best Engineering Practice DET NORSKE VERITAS Sesam User Manual - Sesam Configuration Best Engineering Practice June 12 th, 2008 Valid from program version
Java (12 Weeks) Introduction to Java Programming Language
Java (12 Weeks) Topic Lecture No. Introduction to Java Programming Language 1 An Introduction to Java o Java as a Programming Platform, The Java "White Paper" Buzzwords, Java and the Internet, A Short
irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire [email protected] 25th
irods and Metadata survey Version 0.1 Date 25th March Purpose Survey of Status Complete Author Abhijeet Kodgire [email protected] Table of Contents 1 Abstract... 3 2 Categories and Subject Descriptors...
estatistik.core: COLLECTING RAW DATA FROM ERP SYSTEMS
WP. 2 ENGLISH ONLY UNITED NATIONS STATISTICAL COMMISSION and ECONOMIC COMMISSION FOR EUROPE CONFERENCE OF EUROPEAN STATISTICIANS Work Session on Statistical Data Editing (Bonn, Germany, 25-27 September
Relational Database: Additional Operations on Relations; SQL
Relational Database: Additional Operations on Relations; SQL Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin Overview The course packet
AIMMS The Network License Server
AIMMS The Network License Server AIMMS AIMMS 4.0 July 1, 2014 Contents Contents ii 1 The Aimms Network License Server 1 1.1 Software requirements........................ 1 1.2 Installing and deploying
Eventia Log Parsing Editor 1.0 Administration Guide
Eventia Log Parsing Editor 1.0 Administration Guide Revised: November 28, 2007 In This Document Overview page 2 Installation and Supported Platforms page 4 Menus and Main Window page 5 Creating Parsing
CS 2112 Spring 2014. 0 Instructions. Assignment 3 Data Structures and Web Filtering. 0.1 Grading. 0.2 Partners. 0.3 Restrictions
CS 2112 Spring 2014 Assignment 3 Data Structures and Web Filtering Due: March 4, 2014 11:59 PM Implementing spam blacklists and web filters requires matching candidate domain names and URLs very rapidly
HP Operations Manager Software for Windows Integration Guide
HP Operations Manager Software for Windows Integration Guide This guide documents the facilities to integrate EnterpriseSCHEDULE into HP Operations Manager Software for Windows (formerly known as HP OpenView
WESTMORELAND COUNTY PUBLIC SCHOOLS 2011 2012 Integrated Instructional Pacing Guide and Checklist Computer Math
Textbook Correlation WESTMORELAND COUNTY PUBLIC SCHOOLS 2011 2012 Integrated Instructional Pacing Guide and Checklist Computer Math Following Directions Unit FIRST QUARTER AND SECOND QUARTER Logic Unit
Optimum Database Design: Using Normal Forms and Ensuring Data Integrity. by Patrick Crever, Relational Database Programmer, Synergex
Optimum Database Design: Using Normal Forms and Ensuring Data Integrity by Patrick Crever, Relational Database Programmer, Synergex Printed: April 2007 The information contained in this document is subject
Database Access. 10.1 General principles of data correspondence
10 Database Access The structure of indexed data in AMPL has much in common with the structure of the relational tables widely used in database applications. The AMPL table declaration lets you take advantage
Efficient Data Structures for Decision Diagrams
Artificial Intelligence Laboratory Efficient Data Structures for Decision Diagrams Master Thesis Nacereddine Ouaret Professor: Supervisors: Boi Faltings Thomas Léauté Radoslaw Szymanek Contents Introduction...
PROBLEM SOLVING SEVENTH EDITION WALTER SAVITCH UNIVERSITY OF CALIFORNIA, SAN DIEGO CONTRIBUTOR KENRICK MOCK UNIVERSITY OF ALASKA, ANCHORAGE PEARSON
PROBLEM SOLVING WITH SEVENTH EDITION WALTER SAVITCH UNIVERSITY OF CALIFORNIA, SAN DIEGO CONTRIBUTOR KENRICK MOCK UNIVERSITY OF ALASKA, ANCHORAGE PEARSON Addison Wesley Boston San Francisco New York London
Streaming Lossless Data Compression Algorithm (SLDC)
Standard ECMA-321 June 2001 Standardizing Information and Communication Systems Streaming Lossless Data Compression Algorithm (SLDC) Phone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http://www.ecma.ch
Drupal Survey. Software Requirements Specification 1.0 29/10/2009. Chris Pryor Principal Project Manager
Software Requirements Specification 1.0 29/10/2009 Chris Pryor Principal Project Manager Software Requirements Specification Survey Module Revision History Date Description Author Comments 5/11/2009 Version
CLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
Handout 1. Introduction to Java programming language. Java primitive types and operations. Reading keyboard Input using class Scanner.
Handout 1 CS603 Object-Oriented Programming Fall 15 Page 1 of 11 Handout 1 Introduction to Java programming language. Java primitive types and operations. Reading keyboard Input using class Scanner. Java
Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification
Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 5 Outline More Complex SQL Retrieval Queries
Core Components Data Type Catalogue Version 3.1 17 October 2011
Core Components Data Type Catalogue Version 3.1 17 October 2011 Core Components Data Type Catalogue Version 3.1 Page 1 of 121 Abstract CCTS 3.0 defines the rules for developing Core Data Types and Business
Virto Active Directory Service for SharePoint. Release 4.1.2. Installation and User Guide
Virto Active Directory Service for SharePoint Release 4.1.2 Installation and User Guide 2 Table of Contents OVERVIEW... 3 SYSTEM REQUIREMENTS... 4 OPERATING SYSTEM... 4 SERVER... 4 BROWSER... 5 INSTALLATION...
Kofax Export Connector 8.3.0 for Microsoft SharePoint
Kofax Export Connector 8.3.0 for Microsoft SharePoint Administrator's Guide 2013-02-27 2013 Kofax, Inc., 15211 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved. Use is subject to
Database SQL messages and codes
System i Database SQL messages and codes Version 5 Release 4 System i Database SQL messages and codes Version 5 Release 4 Note Before using this information and the product it supports, read the information
C Compiler Targeting the Java Virtual Machine
C Compiler Targeting the Java Virtual Machine Jack Pien Senior Honors Thesis (Advisor: Javed A. Aslam) Dartmouth College Computer Science Technical Report PCS-TR98-334 May 30, 1998 Abstract One of the
Magit-Popup User Manual
Magit-Popup User Manual for version 2.5 Jonas Bernoulli Copyright (C) 2015-2016 Jonas Bernoulli You can redistribute this document and/or modify it under the terms of the GNU General
Compliance and Requirement Traceability for SysML v.1.0a
1. Introduction: Compliance and Traceability for SysML v.1.0a This document provides a formal statement of compliance and associated requirement traceability for the SysML v. 1.0 alpha specification, which
QuickScan L. Barcode Scanner. Advanced Data Formatting (ADF) Guide
QuickScan L Barcode Scanner Advanced Data Formatting (ADF) Guide Datalogic Scanning, Inc. 959 Terry Street Eugene, Oregon 97402 Telephone: (541) 683-5700 Fax: (541) 345-7140 An Unpublished Work - All rights
CS2Bh: Current Technologies. Introduction to XML and Relational Databases. The Relational Model. The relational model
CS2Bh: Current Technologies Introduction to XML and Relational Databases Spring 2005 The Relational Model CS2 Spring 2005 (LN6) 1 The relational model Proposed by Codd in 1970. It is the dominant data
Virto Create & Clone AD User Web Part for Microsoft SharePoint. Release 3.1.3. Installation and User Guide
Virto Create & Clone AD User Web Part for Microsoft SharePoint Release 3.1.3 Installation and User Guide 2 Table of Contents KEY FEATURES... 3 SYSTEM REQUIREMENTS... 3 OPERATING SYSTEM... 3 SERVER... 3
Debugging Complex Macros
Debugging Complex Macros Peter Stagg, Decision Informatics It s possible to write code generated by macros to an external file. The file can t be access until the SAS session has ended. Use the options
Web Document Clustering
Web Document Clustering Lab Project based on the MDL clustering suite http://www.cs.ccsu.edu/~markov/mdlclustering/ Zdravko Markov Computer Science Department Central Connecticut State University New Britain,
Coveo Platform 7.0. Oracle Knowledge Connector Guide
Coveo Platform 7.0 Oracle Knowledge Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing
CompuScholar, Inc. Alignment to Utah's Computer Programming II Standards
CompuScholar, Inc. Alignment to Utah's Computer Programming II Standards Course Title: TeenCoder: Java Programming Course ISBN: 978 0 9887070 2 3 Course Year: 2015 Note: Citation(s) listed may represent
Guide to SQL Programming: SQL:1999 and Oracle Rdb V7.1
Guide to SQL Programming: SQL:1999 and Oracle Rdb V7.1 A feature of Oracle Rdb By Ian Smith Oracle Rdb Relational Technology Group Oracle Corporation 1 Oracle Rdb Journal SQL:1999 and Oracle Rdb V7.1 The
THE DIMENSION OF A VECTOR SPACE
THE DIMENSION OF A VECTOR SPACE KEITH CONRAD This handout is a supplementary discussion leading up to the definition of dimension and some of its basic properties. Let V be a vector space over a field
Scaling up = getting a better machine. Scaling out = use another server and add it to your cluster.
MongoDB 1. Introduction MongoDB is a document-oriented database, not a relation one. It replaces the concept of a row with a document. This makes it possible to represent complex hierarchical relationships
CA IDMS SQL. Programming Guide. Release 18.5.00
CA IDMS SQL Programming Guide Release 18500 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
Database Programming with PL/SQL: Learning Objectives
Database Programming with PL/SQL: Learning Objectives This course covers PL/SQL, a procedural language extension to SQL. Through an innovative project-based approach, students learn procedural logic constructs
Command Scripts. 13.1 Running scripts: include and commands
13 Command Scripts You will probably find that your most intensive use of AMPL s command environment occurs during the initial development of a model, when the results are unfamiliar and changes are frequent.
create-virtual-server creates the named virtual server
Name Synopsis Description Options create-virtual-server creates the named virtual server create-virtual-server [--help] --hosts hosts [--httplisteners http-listeners] [--networklisteners network-listeners]
Utility Software II lab 1 Jacek Wiślicki, [email protected] original material by Hubert Kołodziejski
MS ACCESS - INTRODUCTION MS Access is an example of a relational database. It allows to build and maintain small and medium-sized databases and to supply them with a graphical user interface. The aim of
C++ Language Tutorial
cplusplus.com C++ Language Tutorial Written by: Juan Soulié Last revision: June, 2007 Available online at: http://www.cplusplus.com/doc/tutorial/ The online version is constantly revised and may contain
CS 145: NoSQL Activity Stanford University, Fall 2015 A Quick Introdution to Redis
CS 145: NoSQL Activity Stanford University, Fall 2015 A Quick Introdution to Redis For this assignment, compile your answers on a separate pdf to submit and verify that they work using Redis. Installing
JDK 1.5 Updates for Introduction to Java Programming with SUN ONE Studio 4
JDK 1.5 Updates for Introduction to Java Programming with SUN ONE Studio 4 NOTE: SUN ONE Studio is almost identical with NetBeans. NetBeans is open source and can be downloaded from www.netbeans.org. I
SQL Server Array Library 2010-11 László Dobos, Alexander S. Szalay
SQL Server Array Library 2010-11 László Dobos, Alexander S. Szalay The Johns Hopkins University, Department of Physics and Astronomy Eötvös University, Department of Physics of Complex Systems http://voservices.net/sqlarray,
Version 1.0.0 USER GUIDE
Magento Extension Grid Manager Version 1.0.0 USER GUIDE Last update: Aug 13 th, 2013 DragonFroot.com Grid Manager v1-0 Content 1. Introduction 2. Installation 3. Configuration 4. Troubleshooting 5. Contact
Domains and Competencies
Domains and Competencies DOMAIN I TECHNOLOGY APPLICATIONS CORE Standards Assessed: Computer Science 8 12 I VII Competency 001: The computer science teacher knows technology terminology and concepts; the
Oracle Database: Introduction to SQL
Oracle University Contact Us: +381 11 2016811 Oracle Database: Introduction to SQL Duration: 5 Days What you will learn Understanding the basic concepts of relational databases ensure refined code by developers.
Digital Imaging and Communications in Medicine (DICOM) Supplement 119: Frame Level Retrieve SOP Classes
Page i 5 Digital Imaging and Communications in Medicine (DICOM) Supplement 119: Frame Level Retrieve SOP Classes 10 15 20 Prepared by: Working Group 6 DICOM Standards Committee, Working Group 6 1300 N.
Java CPD (I) Frans Coenen Department of Computer Science
Java CPD (I) Frans Coenen Department of Computer Science Content Session 1, 12:45-14:30 (First Java Programme, Inheritance, Arithmetic) Session 2, 14:45-16:45 (Input and Programme Constructs) Materials
Formal Engineering for Industrial Software Development
Shaoying Liu Formal Engineering for Industrial Software Development Using the SOFL Method With 90 Figures and 30 Tables Springer Contents Introduction 1 1.1 Software Life Cycle... 2 1.2 The Problem 4 1.3
Simple Identity Management Profile
1 2 3 4 Document Number: DSP1034 Date: 2009-06-17 Version: 1.0.1 5 6 7 8 Document Type: Specification Document Status: DMTF Standard Document Language: E 9 DSP1034 10 11 Copyright Notice Copyright 2008,
Visual Basic Programming. An Introduction
Visual Basic Programming An Introduction Why Visual Basic? Programming for the Windows User Interface is extremely complicated. Other Graphical User Interfaces (GUI) are no better. Visual Basic provides
NLP Programming Tutorial 0 - Programming Basics
NLP Programming Tutorial 0 - Programming Basics Graham Neubig Nara Institute of Science and Technology (NAIST) 1 About this Tutorial 14 parts, starting from easier topics Each time: During the tutorial:
Release Document Version: 1.4-2013-05-30. User Guide: SAP BusinessObjects Analysis, edition for Microsoft Office
Release Document Version: 1.4-2013-05-30 User Guide: SAP BusinessObjects Analysis, edition for Microsoft Office Table of Contents 1 About this guide....6 1.1 Who should read this guide?....6 1.2 User profiles....6
6. SQL/XML. 6.1 Introduction. 6.1 Introduction. 6.1 Introduction. 6.1 Introduction. XML Databases 6. SQL/XML. Creating XML documents from a database
XML Databases Silke Eckstein Andreas Kupfer Institut für Informationssysteme Technische Universität http://www.ifis.cs.tu-bs.de in XML XML Databases SilkeEckstein Institut fürinformationssysteme TU 2 Creating
ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER
ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER Pierre A. von Kaenel Mathematics and Computer Science Department Skidmore College Saratoga Springs, NY 12866 (518) 580-5292 [email protected] ABSTRACT This paper
PowerDesigner WarehouseArchitect The Model for Data Warehousing Solutions. A Technical Whitepaper from Sybase, Inc.
PowerDesigner WarehouseArchitect The Model for Data Warehousing Solutions A Technical Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Data Warehouse Modeling.....................................4
The CLIPS environment. The CLIPS programming language. CLIPS production rules language - facts. Notes
The CLIPS environment The CLIPS environment CLIPS is an environment to develop knowledge based systems It defines a programming language that allows to represent declarative and procedural knowledge This
Using AD fields in Policy Patrol
Policy Patrol 9 technical documentation May 20, 2013 in Policy Patrol This document describes how to enter additional Active Directory merge fields in Policy Patrol and how to convert AD fields into a
