Auditory masking - Wikipedia, the free encyclopedia
Auditory masking - Wikipedia, the free encyclopedia:'via Blog this'
Auditory masking - Wikipedia, the free encyclopedia
Auditory masking - Wikipedia, the free encyclopedia:Scientists use iPods, car batteries to build a frog surveillance net | Ars Technica
Scientists use iPods, car batteries to build a frog surveillance net | Ars Technica: " Arbimon (Automated Remote Biodiversity Monitoring Network), was created by a team led by Dr. Mitchel Aide and Dr. Carlos Corrada-Bravo of the University of Puerto Rico. As described in a paper published by the team in PeerJ today, Arbimon's monitoring stations use an iPod recording application to capture up to 144 one-minute audio recordings per day of animal calls. Most of the components of the monitoring stations—the iPod, the battery, a voltage converter, a preamplifier for the microphone, and a router—are in a sealed watertight case. A 50-watt solar panel powers the system and charges the battery during the day."The Big Blob » Moore Neighbor Contour Tracing Algorithm in C++
The Big Blob » Moore Neighbor Contour Tracing Algorithm in C++: "This post shows the implementation of Moore’s neighbor tracing algorithm in C++. This algorithm performs what is called contour tracing i.e.Moore neighborhood - Wikipedia, the free encyclopedia
Moore neighborhood - Wikipedia, the free encyclopedia: "In cellular automata, the Moore neighborhood comprises the eight cells surrounding a central cell on a two-dimensional square lattice. The neighborhood is named after Edward F. Moore, a pioneer of cellular automata theory. It is one of the two most commonly used neighborhood types, the other one being the 4-cell von Neumann neighborhood. The well known Conway's Game of Life, for example, uses the Moore neighborhood. It is similar to the notion of 8-connected pixels in computer graphics."Exploring the HTML5 Web Audio: visualizing sound | Smartjava.org
Exploring the HTML5 Web Audio: visualizing sound | Smartjava.org: "Create an analyzer node: With this node we get realtime information about the data that is processed. This data we use to determine the signal strength2.6. Image manipulation and processing using Numpy and Scipy — Scipy lecture notes
2.6. Image manipulation and processing using Numpy and Scipy — Scipy lecture notes:How to keep files safe from accidental overwriting with noclobber under BASH shell
How to keep files safe from accidental overwriting with noclobber under BASH shell: "Sometime you just need to turn off noclobber for single operation. Use >| operator to force the file to be overwritten:linux - Bash Loop - How to stop the loop when I press Control-C inside a command? - Server Fault
linux - Bash Loop - How to stop the loop when I press Control-C inside a command? - Server Fault: "for DIR in * ; do rsync -a $DIR example.com:somewhere/ || break; done"Do Things that Don't Scale
Do Things that Don't Scale: "It's not enough just to do something extraordinary initially. You have to make an extraordinary effort initially. Any strategy that omits the effort—whether it's expecting a big launch to get you users, or a big partner—is ipso facto suspect."Magnolia - Wikipedia, the free encyclopedia
Magnolia - Wikipedia, the free encyclopedia: "Magnolia is a large genus of about 210[1] flowering plant species in the subfamily Magnolioideae of the family Magnoliaceae. It is named after French botanist Pierre Magnol."New HTML Parser: The long-awaited libxml2 based HTML parser code is live. It needs further work but already handles most markup better than the original parser.
Keep up with the latest Advogato features by reading the Advogato status blog.
If you're a C programmer with some spare time, take a look at the mod_virgule project page and help us with one of the tasks on the ToDo list!