Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Token, definition

In the following token definition all sets with only one element are denoted by this element. For example, if X is regular over the alphabet, and the character "a is an element of the alphabet, then Xa and (X a) ( or aX and (a 6c X), respectively) denote the set resulting from concatenating an element from X with a (or a with an element from X, respectively). [Pg.160]

Similarly, under the definition of the word pestilence, Forman quoted the Arabic medical authorities Haly Abbas and Avicenna, and concluded But I sale the pestilence or plague of pestilence is an infectiouse disease and infecteth the blode of man by reason of the ayer or smell therof whereof ensueth the botch and the blain and the token.Again he supported his position with examples from the Bible. [Pg.117]

In practice, Forman s definition of urine as a token would have allowed him to fulfil the expectations of his patients without compromising the principles of astrological physic. [Pg.138]

To index and retrieve data, SRS uses a token server. The meta definition is used to extract tokens, i.e. strings, from the database for indexing. When a query is performed, SRS searches for the query term against these indices and creates a set of entries which match that query. The fields of the entry which the user wants displayed are then extracted from the entry. This is done by using the connection made in the meta definition between a field and tokens received from the token server. [Pg.448]

To create the indices, SRS uses the rules given in the syntax description to create tokens. In this case, a token is defined as a piece of text from the database entry. These tokens are stored in token tables which are linked to a particular field in the database by a meta definition in the library meta definition object. [Pg.449]

These rules are also used to extract data from the database. An object loader, another object in the SRS system, can be defined in the meta definition layer and describes the way a token table relates to a field to be extracted and viewed. [Pg.449]

For each library a syntax description of the data must be supplied. This syntax description must describe the data in the database and takes the form of a set of rules, also called a grammar. This list of rules is written in the SRS programming language ICARUS. The rules in this case provide the syntax part of the ICARUS language (the other part being Meta Definition) and are called productions. Productions are used to extract pieces of text from a database entry, tokens which are written to token tables. It is the data which is in these token tables that is indexed and used when querying the database, or extracting parts of the database for display. [Pg.451]

The field information is related to a particular token table via the index-Token attribute in the Field object. Hence, when a particular piece of information from the description field of the EMBL databank is requested, SRS looks in the description field meta definition for the EMBL database... [Pg.452]

In the case of indexing databases, the token tables for each field which is to be indexed are constructed. This means that for each field defined in the LibFormat object, a token table is generated for that field based on the indexToken attribute in the meta definition. The values in the token table for each entry are then written to indices which are sorted and can be searched quickly. [Pg.453]

Since the narrow physical realizer of a C-type event is surely a part or constituent of that C-type event, then the reductive explanation of the regularity would not meet the definition of being undercutting for it would not entail that, in the case of every instance of the regularity not even a part or constituent of the C-type event token in each instance was a cause of the E-type event token in that instance. (2003, p. 160)... [Pg.97]

The marking enhancement consists in definition of possible values of unknown tokens (in PI, P2, P3) starting hy conditioning state represented by the token value in P2 which corresponds also to the value of the variable c in the schema. The set of possible colors in this case (in P2) is limited, hy definition, to two values Enable eeoADisable (notedP andZ)respectively). Corresponding values for the variable p are calculated toward the parameterized inverse of the function F3 which inputs are z and c. Results are shown in the tree Figure 7. [Pg.1875]

Advice in this section is usually given on the chemical resistance to strong and weak acids, to alkalis and to solvents. A strong acid, or a strong alkali, remains strong by definition, even when it is used diluted a weak acid, by the same token, is still weak even when it is used concentrated. Solvents may be polar or non-polar. The term means that the material is not balanced and so charge separation oh a molecular scale exists. Examples of polar solvents include water, alcohols, ketones, esters, and partially halogenated solvents. Non-polar solvents include carbon tetrachloride, benzene and hydrocarbons. [Pg.21]

Table 1. CPN initial marking, token colour definition and functions... Table 1. CPN initial marking, token colour definition and functions...
The choice of a particular network architecture will have a definite bearing on the choice of network adapter cards and less of an impact on the choice of media or network operating system. For instance, an ethernet network architecture requires ethernet adapter cards. As will soon be seen, it is the adapter card which holds the key, or media access control (MAC) layer protocol, which determines whether a network is ethernet, token ring, fiber distributed data interface (FDDI) or any other network architecture. Ethernet runs over thick or thin coaxial cable, shielded or unshielded twisted pair, fiber or wireless—clearly a wide choice of media options. [Pg.2129]

The integration of object concepts is attractive to describe static and structural aspects. Classes generate entities that encapsulate both attributes (such as continuous variables) and methods which handle these data (including equations). In PrODHyS, objects are introduced in Petri net as well as Petri nets are introduced inside objects (figure 3). Tokens are typed and carry various kind of objects. Individualization and definition of classes for tokens make the model more compact without information loss. Hence, an ODPTPN is also characterized by typed arcs (that ensure model coherence) and transitions with conditions (expression with attributes and methods of allowed tokens) and actions (instanciate or destroy tokens, execute allowed token methods). [Pg.846]

Building on the core notion, we will later be able to define notions of token-reduction, type reduction and theory reduction. Three notions of reduction that might be of particular importance, and which are not so easily obtainable from the above definition, are those of partial reduction, where the reduction base is not fully represented in the explanans of a reductive explanation, of plural reduction, where in a reduction statement, the explanans refers to a conjunction of constituents of the target of the explanandum (an idea pertinent in the debate on mechanistic explanation (see Chap. 4)), and what one may want to caU a generic notion of reduction (or better generic reduction statements ), which is best re-defined in terms of a meta-semantic notion. Intuitively, it is this notion that enables us to express general theses about how particular reduction statements are to be shaped. Partial reduction is parasitic on a notion of plural reduction. So, let us first address this latter conception. [Pg.108]

Based on this definition, the tokens of a connector should satisfy the following expression. [Pg.221]

We consider in a second stage security-related events that may lead to the same undesirable event a burglar can attack the person in the house to get the combination of a safe. The burglar can enter the house directly if the door is unlocked or he can force it if it is locked. We give in Fig. 2 the BDMP model covering both safety and security hazards. The Petri net models the fact that the door can be initially locked or unlocked with a probability of 0.5 for each alternative. Initially, a token is placed in pi. This token enables to activate at t=0 the transition locked door and at t > 0, the token is definitively either in place locked or in place unlocked. The Petri leaf door locked (resp. door unlocked) is true when there is a token in the locked (resp. unlocked) place (this is ensured through a non-graphical link between Petri leaves and the places). [Pg.331]


See other pages where Token, definition is mentioned: [Pg.583]    [Pg.29]    [Pg.294]    [Pg.692]    [Pg.58]    [Pg.160]    [Pg.120]    [Pg.157]    [Pg.196]    [Pg.214]    [Pg.527]    [Pg.48]    [Pg.8]    [Pg.18]    [Pg.180]    [Pg.228]    [Pg.237]    [Pg.323]    [Pg.11]    [Pg.54]    [Pg.85]    [Pg.48]    [Pg.181]    [Pg.530]    [Pg.40]    [Pg.42]    [Pg.196]    [Pg.376]    [Pg.2122]    [Pg.233]   
See also in sourсe #XX -- [ Pg.54 ]

See also in sourсe #XX -- [ Pg.54 ]




SEARCH



Tokens

© 2024 chempedia.info