Are you over 18 and want to see adult content?
More Annotations
![A complete backup of louisvilleky.gov](https://www.archivebay.com/archive2/9e3cdc86-d11f-42c9-a8d8-8fc055a26f60.png)
A complete backup of louisvilleky.gov
Are you over 18 and want to see adult content?
![A complete backup of larevuedessinee.fr](https://www.archivebay.com/archive2/5b4ff9e6-8d84-405f-9466-cfbfeb815aa6.png)
A complete backup of larevuedessinee.fr
Are you over 18 and want to see adult content?
![A complete backup of princerhetorics.com](https://www.archivebay.com/archive2/af122eab-bf81-4e6f-b955-5d4ee5f12d61.png)
A complete backup of princerhetorics.com
Are you over 18 and want to see adult content?
Favourite Annotations
![A complete backup of thickcurvylover.tumblr.com](https://www.archivebay.com/archive/ddb4a194-ee16-4074-b384-6383580fa9b8.png)
A complete backup of thickcurvylover.tumblr.com
Are you over 18 and want to see adult content?
![A complete backup of samplephonics.com](https://www.archivebay.com/archive/a48d3c76-dfa2-44b6-8492-d10342a6c723.png)
A complete backup of samplephonics.com
Are you over 18 and want to see adult content?
![A complete backup of escolademoz.blogspot.com](https://www.archivebay.com/archive/b00cb0a1-ff55-4059-96f8-251c57da810d.png)
A complete backup of escolademoz.blogspot.com
Are you over 18 and want to see adult content?
![A complete backup of pagonlinesanita.it](https://www.archivebay.com/archive/41047aa7-205c-4ac3-9ebb-52c60052f234.png)
A complete backup of pagonlinesanita.it
Are you over 18 and want to see adult content?
![A complete backup of atlantainjurylawyersblog.com](https://www.archivebay.com/archive/c74e0a88-afe8-47ac-800d-3e717349da2b.png)
A complete backup of atlantainjurylawyersblog.com
Are you over 18 and want to see adult content?
![A complete backup of cheermall.com.tw](https://www.archivebay.com/archive/dce4ecb7-138a-4f27-a222-69a00a9bedd5.png)
A complete backup of cheermall.com.tw
Are you over 18 and want to see adult content?
![A complete backup of goodearthorganiceatery.com](https://www.archivebay.com/archive/d73e97e2-7956-4919-a024-9141646ba036.png)
A complete backup of goodearthorganiceatery.com
Are you over 18 and want to see adult content?
Text
have
EMPTY STANDBY LIST
Empty Standby List. EmptyStandbyList.exe is a command line tool for Windows (Vista and above) that can empty: process working sets, the modified page list, the standby lists (priorities 0 to 7), or. the priority 0 standby list only. The executable file below is signed. F# CODE: MEMOIZE A RECURSIVE FUNCTION CANNOT TERMINATE THE PROCESS OF MCAFEE DVD), BSD. I'm using Process Hacker 2.39.124. My machine is running Windows 10 RS1 x64 with McAfeeTotal Protection 16 on it. I found that Process Hacker cannot terminate McAfee's processes when the feature of McAfee Access Protect is enabled. I tried the same scenario on Windwos 7 x64, the Process Hacker became freezed and had no response. CORRECTLY REPORT VIRTUALBOX'S MEMORY USAGE As seen at the above link, VMMap succeeds in counting this memory; that might help you understand what's going on. Funny enough, when you run VMMap, it lists every process, including VirtualBox with the *wrong* RAM usage (100 MB), but when you select VirtualBox, it then shows the correct usage (2.5 GB in my case). Top. dmex. PROCESSHACKER IS FLAGGED AS VIRUS I'm sure many viruses use powershell too, but that doesn't mean powershell is a virus. In this case I'd say process hacker accesses sensitive capability which can be abused, and it makes sense to warn about it in a reasonable way ("this program has x,y,and z capability which could be used for malicious or legitimate purposes. SET A PROCESS AS CRITICAL There is some malware which uses RtlSetProcessIsCritical in order to prevent its processes from being terminated. If you terminate a process which was flagged as critical it SELECT MAX CPU USAGE FOR PROCESS 6 core processor = 16.6% utilization per core. 8 core processor = 12.5% utilization per core. 10 core processor = 10% utilization per core. 12 core processor = 8.3% utilization per core. If you have 4 cores - each one has a maximum 25% utilization of 100% - If you limit the process to two cores it can only utilize 50% at maximum. USING MICROSOFT DEBUGGING SYMBOLS (*.PDB FILES) IN PROCESS Joined: Mon Jan 17, 2011 5:43 am. Re: Using Microsoft debugging symbols (*.pdb files) in Process Hacker. Mon Feb 01, 2016 2:07 am. Yes, you just need to configure the Symbol path in the Options window > Symbols. symbols.PNG. You do not have the required permissions to view the files attached to this post. Top. DELPHI: GET THE IMAGE FILE NAME OF ANY PROCESS FROM ANY Get the image file name of any process from any user on Vista and above http://wj32.wordpress.com/2010/03/30/ge and-above/ Delphitranslation
WJ32 – INFORMATION WHEN YOU NEED ITHOMEABOUTSOFTWAREMATHEMATICSPROCESS HACKERWJ’S BACKUP This patch allows you to use more than 3/4GB of RAM on an x86 Windows system. Works on Windows Vista SP2, Windows 7 SP0, Windows 7 SP1, Windows 8 and Windows 8.1. Instructions and source code included. Download: PatchPae2.zip (1712395 downloads) Before using this patch, make sure you have fully removed any other “RAM patches” you mayhave
EMPTY STANDBY LIST
Empty Standby List. EmptyStandbyList.exe is a command line tool for Windows (Vista and above) that can empty: process working sets, the modified page list, the standby lists (priorities 0 to 7), or. the priority 0 standby list only. The executable file below is signed. F# CODE: MEMOIZE A RECURSIVE FUNCTION CANNOT TERMINATE THE PROCESS OF MCAFEE DVD), BSD. I'm using Process Hacker 2.39.124. My machine is running Windows 10 RS1 x64 with McAfeeTotal Protection 16 on it. I found that Process Hacker cannot terminate McAfee's processes when the feature of McAfee Access Protect is enabled. I tried the same scenario on Windwos 7 x64, the Process Hacker became freezed and had no response. CORRECTLY REPORT VIRTUALBOX'S MEMORY USAGE As seen at the above link, VMMap succeeds in counting this memory; that might help you understand what's going on. Funny enough, when you run VMMap, it lists every process, including VirtualBox with the *wrong* RAM usage (100 MB), but when you select VirtualBox, it then shows the correct usage (2.5 GB in my case). Top. dmex. PROCESSHACKER IS FLAGGED AS VIRUS I'm sure many viruses use powershell too, but that doesn't mean powershell is a virus. In this case I'd say process hacker accesses sensitive capability which can be abused, and it makes sense to warn about it in a reasonable way ("this program has x,y,and z capability which could be used for malicious or legitimate purposes. SET A PROCESS AS CRITICAL There is some malware which uses RtlSetProcessIsCritical in order to prevent its processes from being terminated. If you terminate a process which was flagged as critical it SELECT MAX CPU USAGE FOR PROCESS 6 core processor = 16.6% utilization per core. 8 core processor = 12.5% utilization per core. 10 core processor = 10% utilization per core. 12 core processor = 8.3% utilization per core. If you have 4 cores - each one has a maximum 25% utilization of 100% - If you limit the process to two cores it can only utilize 50% at maximum. USING MICROSOFT DEBUGGING SYMBOLS (*.PDB FILES) IN PROCESS Joined: Mon Jan 17, 2011 5:43 am. Re: Using Microsoft debugging symbols (*.pdb files) in Process Hacker. Mon Feb 01, 2016 2:07 am. Yes, you just need to configure the Symbol path in the Options window > Symbols. symbols.PNG. You do not have the required permissions to view the files attached to this post. Top. DELPHI: GET THE IMAGE FILE NAME OF ANY PROCESS FROM ANY Get the image file name of any process from any user on Vista and above http://wj32.wordpress.com/2010/03/30/ge and-above/ Delphitranslation
NIGHTLY BUILDS
Process Hacker, A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. CHAPTER 1. SMOOTH MANIFOLDS Chapter 1. Smooth Manifolds Theorem 1. Let M be a topological manifold. Then any two smooth atlases for Mdetermine the same smooth structure if and only if their union is a smooth PAE PATCH UPDATED FOR WINDOWS 10 This patch allows you to use more than 3/4GB of RAM on an x86 Windows system. Works on Windows Vista SP2, Windows 7 SP0, Windows 7 SP1, Windows 8, Windows 8.1 and Windows 10 (build 10586). Instruct THE NT "RESERVE OBJECT" Two new system calls take advantage of the UserApcReserve object and IoCompletionReserve object: NtQueueApcThreadEx and NtSetIoCompletionEx, respectively. In NtQueueApcThreadEx we can see that if a user APC reserve handle/object is supplied, the function uses the space allocated for that object to store the APC, instead ofallocating from the
INJECT DLL WAS REMOVED? "In version 2.39 was "inject dll", but in version 3 not. Why? And what is version 3 anyway? Why do many sites, including wikipedia, say that the latest version is 2.39?" KASPERSKY LABS ANTIVIRUS DETECTS SERIOUS VIRUSES UPON It appears this software contains virus related terminology and coding. I found out about this "Process Hacker" software on a site that was listed on the URL of: https://www.maketecheasier.com This site featured this software (Process Hacker) as a popular and recommended software tool to install on the average power user's computer system to take the place of the default windows program SET A PROCESS AS CRITICAL Yep you are right, I think I can write a Plugin or Patch to fix this! Because I think this is only executed when we execute NtTerminateProcess in the kernel, you can use one of the termination options in the Terminator that circumvents calling this function inthe kernel.
HOW DO YOU COMPLETELY KILL PROCESS HACKER? First start the Process Hacker to shut down a process then shut down the the kernel module, my syntax would be along the lines of: Code: Select all. sc start KProcessHacker2 ProcessHacker.exe -c -ctype process -cobject Program.exe -caction terminate sc stopKProcessHacker2.
DELPHI: GET THE IMAGE FILE NAME OF ANY PROCESS FROM ANY Get the image file name of any process from any user on Vista and above http://wj32.wordpress.com/2010/03/30/ge and-above/ Delphitranslation
OPENPROCESS WINDOWS 10 I am trying to understand how PH is able to open any process on Windows 10 to get the command line (for example) of processes like smss.exe or csrss.exe. I tried to use AdjustTokenPrivileges to set SEDEBUG token on my program but this only works on Windows 7. If I try to open smss.exe process with PROCESS_VM_READ it always says Accessdenied, I
WJ32 – INFORMATION WHEN YOU NEED ITHOMEABOUTSOFTWAREMATHEMATICSPROCESS HACKERWJ’S BACKUP This patch allows you to use more than 3/4GB of RAM on an x86 Windows system. Works on Windows Vista SP2, Windows 7 SP0, Windows 7 SP1, Windows 8 and Windows 8.1. Instructions and source code included. Download: PatchPae2.zip (1712395 downloads) Before using this patch, make sure you have fully removed any other “RAM patches” you mayhave
EMPTY STANDBY LIST
Empty Standby List. EmptyStandbyList.exe is a command line tool for Windows (Vista and above) that can empty: process working sets, the modified page list, the standby lists (priorities 0 to 7), or. the priority 0 standby list only. The executable file below is signed. F# CODE: MEMOIZE A RECURSIVE FUNCTION CANNOT TERMINATE THE PROCESS OF MCAFEE DVD), BSD. I'm using Process Hacker 2.39.124. My machine is running Windows 10 RS1 x64 with McAfeeTotal Protection 16 on it. I found that Process Hacker cannot terminate McAfee's processes when the feature of McAfee Access Protect is enabled. I tried the same scenario on Windwos 7 x64, the Process Hacker became freezed and had no response. CORRECTLY REPORT VIRTUALBOX'S MEMORY USAGE As seen at the above link, VMMap succeeds in counting this memory; that might help you understand what's going on. Funny enough, when you run VMMap, it lists every process, including VirtualBox with the *wrong* RAM usage (100 MB), but when you select VirtualBox, it then shows the correct usage (2.5 GB in my case). Top. dmex. PROCESSHACKER IS FLAGGED AS VIRUS I'm sure many viruses use powershell too, but that doesn't mean powershell is a virus. In this case I'd say process hacker accesses sensitive capability which can be abused, and it makes sense to warn about it in a reasonable way ("this program has x,y,and z capability which could be used for malicious or legitimate purposes. SET A PROCESS AS CRITICAL There is some malware which uses RtlSetProcessIsCritical in order to prevent its processes from being terminated. If you terminate a process which was flagged as critical it SELECT MAX CPU USAGE FOR PROCESS 6 core processor = 16.6% utilization per core. 8 core processor = 12.5% utilization per core. 10 core processor = 10% utilization per core. 12 core processor = 8.3% utilization per core. If you have 4 cores - each one has a maximum 25% utilization of 100% - If you limit the process to two cores it can only utilize 50% at maximum. USING MICROSOFT DEBUGGING SYMBOLS (*.PDB FILES) IN PROCESS Joined: Mon Jan 17, 2011 5:43 am. Re: Using Microsoft debugging symbols (*.pdb files) in Process Hacker. Mon Feb 01, 2016 2:07 am. Yes, you just need to configure the Symbol path in the Options window > Symbols. symbols.PNG. You do not have the required permissions to view the files attached to this post. Top. DELPHI: GET THE IMAGE FILE NAME OF ANY PROCESS FROM ANY Get the image file name of any process from any user on Vista and above http://wj32.wordpress.com/2010/03/30/ge and-above/ Delphitranslation
WJ32 – INFORMATION WHEN YOU NEED ITHOMEABOUTSOFTWAREMATHEMATICSPROCESS HACKERWJ’S BACKUP This patch allows you to use more than 3/4GB of RAM on an x86 Windows system. Works on Windows Vista SP2, Windows 7 SP0, Windows 7 SP1, Windows 8 and Windows 8.1. Instructions and source code included. Download: PatchPae2.zip (1712395 downloads) Before using this patch, make sure you have fully removed any other “RAM patches” you mayhave
EMPTY STANDBY LIST
Empty Standby List. EmptyStandbyList.exe is a command line tool for Windows (Vista and above) that can empty: process working sets, the modified page list, the standby lists (priorities 0 to 7), or. the priority 0 standby list only. The executable file below is signed. F# CODE: MEMOIZE A RECURSIVE FUNCTION CANNOT TERMINATE THE PROCESS OF MCAFEE DVD), BSD. I'm using Process Hacker 2.39.124. My machine is running Windows 10 RS1 x64 with McAfeeTotal Protection 16 on it. I found that Process Hacker cannot terminate McAfee's processes when the feature of McAfee Access Protect is enabled. I tried the same scenario on Windwos 7 x64, the Process Hacker became freezed and had no response. CORRECTLY REPORT VIRTUALBOX'S MEMORY USAGE As seen at the above link, VMMap succeeds in counting this memory; that might help you understand what's going on. Funny enough, when you run VMMap, it lists every process, including VirtualBox with the *wrong* RAM usage (100 MB), but when you select VirtualBox, it then shows the correct usage (2.5 GB in my case). Top. dmex. PROCESSHACKER IS FLAGGED AS VIRUS I'm sure many viruses use powershell too, but that doesn't mean powershell is a virus. In this case I'd say process hacker accesses sensitive capability which can be abused, and it makes sense to warn about it in a reasonable way ("this program has x,y,and z capability which could be used for malicious or legitimate purposes. SET A PROCESS AS CRITICAL There is some malware which uses RtlSetProcessIsCritical in order to prevent its processes from being terminated. If you terminate a process which was flagged as critical it SELECT MAX CPU USAGE FOR PROCESS 6 core processor = 16.6% utilization per core. 8 core processor = 12.5% utilization per core. 10 core processor = 10% utilization per core. 12 core processor = 8.3% utilization per core. If you have 4 cores - each one has a maximum 25% utilization of 100% - If you limit the process to two cores it can only utilize 50% at maximum. USING MICROSOFT DEBUGGING SYMBOLS (*.PDB FILES) IN PROCESS Joined: Mon Jan 17, 2011 5:43 am. Re: Using Microsoft debugging symbols (*.pdb files) in Process Hacker. Mon Feb 01, 2016 2:07 am. Yes, you just need to configure the Symbol path in the Options window > Symbols. symbols.PNG. You do not have the required permissions to view the files attached to this post. Top. DELPHI: GET THE IMAGE FILE NAME OF ANY PROCESS FROM ANY Get the image file name of any process from any user on Vista and above http://wj32.wordpress.com/2010/03/30/ge and-above/ Delphitranslation
NIGHTLY BUILDS
Process Hacker, A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. CHAPTER 1. SMOOTH MANIFOLDS Chapter 1. Smooth Manifolds Theorem 1. Let M be a topological manifold. Then any two smooth atlases for Mdetermine the same smooth structure if and only if their union is a smooth PAE PATCH UPDATED FOR WINDOWS 10 This patch allows you to use more than 3/4GB of RAM on an x86 Windows system. Works on Windows Vista SP2, Windows 7 SP0, Windows 7 SP1, Windows 8, Windows 8.1 and Windows 10 (build 10586). Instruct THE NT "RESERVE OBJECT" Two new system calls take advantage of the UserApcReserve object and IoCompletionReserve object: NtQueueApcThreadEx and NtSetIoCompletionEx, respectively. In NtQueueApcThreadEx we can see that if a user APC reserve handle/object is supplied, the function uses the space allocated for that object to store the APC, instead ofallocating from the
INJECT DLL WAS REMOVED? "In version 2.39 was "inject dll", but in version 3 not. Why? And what is version 3 anyway? Why do many sites, including wikipedia, say that the latest version is 2.39?" KASPERSKY LABS ANTIVIRUS DETECTS SERIOUS VIRUSES UPON It appears this software contains virus related terminology and coding. I found out about this "Process Hacker" software on a site that was listed on the URL of: https://www.maketecheasier.com This site featured this software (Process Hacker) as a popular and recommended software tool to install on the average power user's computer system to take the place of the default windows program SET A PROCESS AS CRITICAL Yep you are right, I think I can write a Plugin or Patch to fix this! Because I think this is only executed when we execute NtTerminateProcess in the kernel, you can use one of the termination options in the Terminator that circumvents calling this function inthe kernel.
HOW DO YOU COMPLETELY KILL PROCESS HACKER? First start the Process Hacker to shut down a process then shut down the the kernel module, my syntax would be along the lines of: Code: Select all. sc start KProcessHacker2 ProcessHacker.exe -c -ctype process -cobject Program.exe -caction terminate sc stopKProcessHacker2.
DELPHI: GET THE IMAGE FILE NAME OF ANY PROCESS FROM ANY Get the image file name of any process from any user on Vista and above http://wj32.wordpress.com/2010/03/30/ge and-above/ Delphitranslation
OPENPROCESS WINDOWS 10 I am trying to understand how PH is able to open any process on Windows 10 to get the command line (for example) of processes like smss.exe or csrss.exe. I tried to use AdjustTokenPrivileges to set SEDEBUG token on my program but this only works on Windows 7. If I try to open smss.exe process with PROCESS_VM_READ it always says Accessdenied, I
Skip to content
WJ32
information when you need it Menu* Home
* About
* Software
* Process Hacker
* WJ’s Backup
* Empty Standby List* Other utilities
* Mathematics
Search for:
Hardware /Programming/Windows
PAE PATCH UPDATED FOR WINDOWS 10 Posted on February 1, 2016by
wj32 / 526 Comments This patch allows you to use more than 3/4GB of RAM on an x86 Windows system. Works on Windows Vista SP2, Windows 7 SP0, Windows 7 SP1, Windows 8, Windows 8.1 and Windows 10 (build 10586). Instructions and source code included. DOWNLOAD: PatchPae2.zip (1712814 downloads) SOURCE CODE: https://github.com/wj32/PatchPae2 Before using this patch, make sure you have fully removed any other “RAM patches” you may have used. This patch does NOT enable test signing mode and does NOT add any watermarks. Note: I do not offer ANY support for this. If this did not work foryou, either:
* You cannot follow instructions correctly, or * You cannot use more than 4GB of physical memory on 32-bit Windows due to hardware/software conflicts. See the comments on this pagefor more
information.
F# /Programming
F# CODE: MEMOIZE A RECURSIVE FUNCTION Posted on January 13, 2016 by wj32 / 2 Comments In this article we’ll look at how to memoize a general function f : ('a -> 'b) -> 'a -> 'b in F#, along with some interestingapplications.
GENERIC VERSION
Most versions of this code that you can find online only deal with the simple case 'a -> 'b, which doesn’t allow the function to call a memoized form of itself for recursion. This version does. The trick is to define mutually recursive functions g : 'a -> 'b and h : ('a -> 'b) -> 'a -> 'b, where g is the memoized form of f that will get passed to f itself, and h does the actual work. Continue reading →Mathematics
HORN’S INEQUALITY FOR SINGULAR VALUES VIA EXTERIOR ALGEBRA Posted on December 29, 2015 by wj32 / 0 Comment Horn’s inequality states that for any two compact operators σ,τσ,τ on a Hilbert space EE, ∏k=1nsk(στ)≤∏k=1nsk(σ)sk(τ)∏k=1nsk(στ)≤∏k=1nsk(σ)sk(τ) where s1(τ),s2(τ),…s1(τ),s2(τ),… are the singular values of ττ arranged in descending order. Alfred Horn’s original 1950 paperprovides a
short proof that relies on the following result: Continue reading →Website
NEW WEB HOST
Posted on September 14, 2014by wj32
/ 1 Comment
I’ve moved this website to Fresh Roasted Hosting because the previous host was awful in terms of reliability and support. The whole process only took a few hours (transfer domain, restore cPanel backups and settings), and hopefully there won’t be any more several day outages with the newhost.
Hardware /Programming/Windows
PAE PATCH UPDATED FOR WINDOWS 8.1 Posted on October 25, 2013by
wj32 / 303 Comments NOTE: AN UPDATED VERSION FOR WINDOWS 10IS AVAILABLE.
This patch allows you to use more than 3/4GB of RAM on an x86 Windows system. Works on Windows Vista SP2, Windows 7 SP0, Windows 7 SP1, Windows 8 and Windows 8.1. Instructions and source code included. DOWNLOAD: PatchPae2.zip (1712814 downloads) Before using this patch, make sure you have fully removed any other “RAM patches” you may have used. This patch does NOT enable test signing mode and does NOT add any watermarks. Note: I do not offer ANY support for this. If this did not work foryou, either:
* You cannot follow instructions correctly, or * You cannot use more than 4GB of physical memory on 32-bit Windows due to hardware/software conflicts. See the comments on this pagefor more
information.
Mathematics
LINE INTEGRALS: 3. APPLICATIONS TO COMPLEX ANALYSIS Posted on June 10, 2013 by wj32 / 2 Comments Navigation: 1. Exact, conservative and closed forms | 2. Locally exact forms and singular homology | 3. APPLICATIONS TO COMPLEX ANALYSISPRELIMINARIES
Let FF be a complex Banach space, let U⊆CU⊆C be an open set, and let f:U→Ff:U→F. Recall that the complex Fréchet derivative of ff at z∈Uz∈U, if it exists, is a CC-linear map Df(z):C→FDf(z):C→F. Not all real differentiable functions on CC are _complex_ differentiable: for example, the (real) derivative of f(z)=z¯¯¯f(z)=z¯ (i.e. f(x+yi)=x−yif(x+yi)=x−yi) at any point is represented by the matrix ,, but Df(z)Df(z) is clearly not a CC-linear map. Continue reading →Mathematics
LINE INTEGRALS: 2. LOCALLY EXACT FORMS AND SINGULAR HOMOLOGY Posted on June 3, 2013 by wj32 / 6 Comments Navigation: 1. Exact, conservative and closed forms | 2. LOCALLY EXACT FORMS AND SINGULAR HOMOLOGY | 3. Applications tocomplex analysis
As in part 1, E,FE,F are Banach spaces and U⊆EU⊆E is an open set. Recall that a form ω:U→L(E,F)ω:U→L(E,F) is EXACT if ω=Dfω=Df for some f:U→Ff:U→F, CLOSED if it is differentiable and Dω(x)∈L(E,E;F)Dω(x)∈L(E,E;F) is symmetric for every x∈Ux∈U, and LOCALLY EXACT if it is closed and for every x∈Ux∈U there is a neighborhood V⊆UV⊆U of xx on which ωω is exact. Last time we showed that every closed C1C1 form is locally exact, and that every closed form on an open subset of R2R2 is locally exact (even if is differentiable but not C1C1). So far, we have only defined line integrals along C1C1 paths and curves. It turns out that for locally exact forms, we can extend the definition to paths that are merely continuous (and not necessarilydifferentiable).
Continue reading →Mathematics
LINE INTEGRALS: 1. EXACT, CONSERVATIVE AND CLOSED FORMS Posted on June 1, 2013 by wj32 / 11 Comments Navigation: 1. EXACT, CONSERVATIVE AND CLOSED FORMS | 2. Locally exact forms and singular homology | 3. Applications to complex analysis The line integral is a useful tool for working with vector fields on RnRn, (co)vector fields on manifolds, and complex differentiable functions. However, it is often unclear how these different versions of the line integral are related to each other. In the next few posts, I will be presenting a very general form of the line integral along with the standard theorems and some basic applications. Familiarity with the Fréchet derivativeis
assumed.
Continue reading →Mathematics
FIRST-ORDER ODES, MATRIX EXPONENTIALS, AND DET(EXP) Posted on March 11, 2013 by wj32 / 0 Comment Last time we derived a formula for the derivative of the matrix exponential. Here we will be focusing instead on the expression Dexp(x)u=exp(x)u=uexp(x),Dexp(x)u=exp(x)u=uexp(x), which holds whenever uu commutes with xx. In this post, EE denotes a real Banach space and L(E)L(E) denotes the space of continuous linearoperators on EE.
ODES
The (matrix) exponential can be used to solve certain types of first-order linear systems of ordinary differential equations with non-constant coefficients: not only can we solve x′(t)y′(t)=x(t)+y(t)=x(t)+y(t),x′(t)=x(t)+y(t)y′(t)=x(t)+y(t), but we can also solve x′(t)y′(t)=tx(t)+y(t)=x(t)+ty(t).x′(t)=tx(t)+y(t)y′(t)=x(t)+ty(t). Continue reading →Mathematics
FRÉCHET DERIVATIVE OF THE (MATRIX) EXPONENTIAL FUNCTION Posted on February 28, 2013 by wj32 / 2 Comments Dexp(x)u=∫10esxue(1−s)xds.Dexp(x)u=∫01esxue(1−s)xds. This intriguing formula expresses the derivative of the exponential map on a Banach algebra as an integral. In particular, using “matrix calculus” notation we have the formula dexp(X)=∫10esX(dX)e(1−s)Xdsdexp(X)=∫01esX(dX)e(1−s)Xds when XX is a square matrix. As we’ll see, this is not too hard to prove. Continue reading →POSTS NAVIGATION
1 2 … 5
Next »
RECENT POSTS
* PAE patch updated for Windows 10 * F# code: memoize a recursive function * Horn’s inequality for singular values via exterior algebra* New web host
* PAE patch updated for Windows 8.1RECENT COMMENTS
* ıııııııııı on Process Hacker * Eniko Enn Salvaudon on PAE patch updated for Windows 10 * Pencil of Nature on PAE patch updated for Windows 10 * Foosking on PAE patch updated for Windows 7 SP1 * Juergen on PAE patch updated for Windows 10ARCHIVES
* February 2016
* January 2016
* December 2015
* September 2014
* October 2013
* June 2013
* March 2013
* February 2013
* January 2013
* December 2012
* November 2012
* October 2012
* April 2012
* December 2011
* October 2011
* February 2011
* July 2010
* May 2010
* March 2010
* January 2010
* May 2009
* April 2009
* February 2009
* January 2009
* October 2008
CATEGORIES
* F#
* Hardware
* Mathematics
* Programming
* Website
* Windows
META
* Log in
* Entries feed
* Comments feed
* WordPress.org
2021 wj32
Powered by WordPress | Theme: Graphyby Themegraphy
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0