text
stringlengths
60
353k
source
stringclasses
2 values
**Pivot point (technical analysis)** Pivot point (technical analysis): In financial markets, a pivot point is a price level that is used by traders as a possible indicator of market movement. A pivot point is calculated as an average of significant prices (high, low, close) from the performance of a market in the prior trading period. If the market in the following period trades above the pivot point it is usually evaluated as a bullish sentiment, whereas trading below the pivot point is seen as bearish. Pivot point (technical analysis): It is customary to calculate additional levels of support and resistance, below and above the pivot point, respectively, by subtracting or adding price differentials calculated from previous trading ranges of the market.A pivot point and the associated support and resistance levels are often turning points for the direction of price movement in a market. In an up-trending market, the pivot point and the resistance levels may represent a ceiling level in price above which the uptrend is no longer sustainable and a reversal may occur. In a declining market, a pivot point and the support levels may represent a low price level of stability or a resistance to further decline. Calculation: Several methods exist for calculating the pivot point (P) of a market. Most commonly, it is the arithmetic average of the high (H), low (L), and closing (C) prices of the market in the prior trading period: P = (H + L + C) / 3.Sometimes, the average also includes the previous period's or the current period's opening price (O): P = (O + H + L + C) / 4.In other cases, traders like to emphasize the closing price, P = (H + L + C + C) / 4, or the current periods opening price, P = (H + L + O + O) / 4. Calculation: Some technical analysts use additional levels just above and below the pivot point (P) to define a range called "Central Pivot Range" or simply "CPR". Hence, instead of focusing on just one single level, they consider a range or a zone. The lower boundary of this range is called BC (Bottom Central) and is calculated as : BC = (H + L) / 2 The upper boundary of this range is called TC (Top Central) and is calculated as : TC = (P - BC) + P Support and resistance levels: Price support and resistance levels are key trading tools in any market. Their roles may be interchangeable, depending on whether the price level is approached in an up-trending or a down-trending market. These price levels may be derived from many market assumptions and conventions. In pivot point analysis, several levels, usually three, are commonly recognized below and above the pivot point. These are calculated from the range of price movement in the previous trading period, added to the pivot point for resistances and subtracted from it for support levels.The first and most significant level of support (S1) and resistance (R1) is obtained by recognition of the upper and the lower halves of the prior trading range, defined by the trading above the pivot point (H − P), and below it (P − L). The first resistance on the up-side of the market is given by the lower width of prior trading added to the pivot point price and the first support on the down-side is the width of the upper part of the prior trading range below the pivot point. Support and resistance levels: R1 = P + (P − L) = 2×P − L S1 = P − (H − P) = 2×P − HThus, these levels may simply be calculated by subtracting the previous low (L) and high (H) price, respectively, from twice the pivot point value:The second set of resistance (R2) and support (S2) levels are above and below, respectively, the first set. They are simply determined from the full width of the prior trading range (H − L), added to and subtracted from the pivot point, respectively: R2 = P + (H − L) S2 = P − (H − L)Commonly a third set is also calculated, again representing another higher resistance level (R3) and a yet lower support level (S3). The method of the second set is continued by doubling the range added and subtracted from the pivot point: R3 = H + 2×(P − L) = R1 + (H − L) S3 = L − 2×(H − P) = S1 − (H − L)This concept is sometimes, albeit rarely, extended to a fourth set in which the tripled value of the trading range is used in the calculation. Support and resistance levels: Qualitatively, the second and higher support and resistance levels are always located symmetrically around the pivot point, whereas this is not the case for the first levels, unless the pivot point happens to divide the prior trading range exactly in half. Trading tool: The pivot point itself represents a level of highest resistance or support, depending on the overall market condition. If the market is directionless (undecided), prices may fluctuate greatly around this level until a price breakout develops. Trading above or below the pivot point indicates the overall market sentiment. It is a leading indicator providing advanced signaling of potentially new market highs or lows within a given time frame.The support and resistance levels calculated from the pivot point and the previous market width may be used as exit points of trades, but are rarely used as entry signals. For example, if the market is up-trending and breaks through the pivot point, the first resistance level is often a good target to close a position, as the probability of resistance and reversal increases greatly. Trading tool: Many traders recognize the half-way levels between any of these levels as additional, but weaker resistance or support areas. The middle or mid-point pivots between the pivot points have no standard label format unlike the support and resistance labels. It's common that the label start with the letter (M), and then a symbol or number after it. Trading tool: Using (+) and (-) symbols, the mid-point between the pivot point and R1 can be designated as M+, between R1 and R2 is M++. Below the pivot point the mid-points are labeled as M− and M−−. Using a number format starting from 0 to 5, the mid-points start as M0 between S3 and S2 up to M5 between R2 and R3.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Primary mediastinal B-cell lymphoma** Primary mediastinal B-cell lymphoma: Primary mediastinal B-cell lymphoma, abbreviated PMBL, is a rare type of lymphoma that forms in the mediastinum (the space in between the lungs) and predominantly affects young adults.It is a subtype of diffuse large B-cell lymphoma; however, it generally has a significantly better prognosis. Diagnosis: Diagnosis requires a biopsy, so that the exact type of tissue can be determined by examination under a microscope. PMBL is generally considered a sub-type of diffuse large B-cell lymphoma, although it is also closely related to nodular sclerosing Hodgkin lymphoma (NSHL). Tumors that are even more closely related to NSHL than typical for PMBL are called gray zone lymphoma. Treatment: Treatment commonly begins with months of multi-drug chemotherapy regimen. Either R-CHOP (rituximab, cyclophosphamide, doxorubicin, vincristine, prednisolone) or DA-EPOCH-R (dose-adjusted etoposide, prednisolone, vincristine, cyclophosphamide, doxorubicin, rituximab) has been typical. Other, more intense, regimens may be more effective.Radiation therapy may be added, especially if chemotherapy does not seem sufficient on its own. Radiation may cause other health problems later, such as breast cancer, and there is some debate about the best approach to it.FDG-PET scanning is not as useful for predicting treatment success in PMBL as it is in other lymphomas. Prognosis: Most people with PMBL are successfully treated and survive for many years. However, if the initial treatment is unsuccessful, or if it returns, the long-term prognosis is worse. Relapses generally appear within 12 to 18 months after the completion of treatment. Epidemiology: This lymphoma is most commonly seen in women between the age of 20 and 40.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Link margin** Link margin: In a wireless communication system, the link margin (LKM), measured in dB, is the difference between the minimum expected power received at the receiver's end, and the receiver's sensitivity (i.e., the received power at which the receiver will stop working). A 15 dB link margin means that the system could tolerate an additional 15 dB of attenuation between the transmitter and the receiver, and it would still just barely work. Link margin: It is typical to design a system with at least a few dB of link margin, to allow for attenuation that is not modeled elsewhere. For example, a satellite communications system operating in the tens of gigahertz might require additional link margin (vs. the link budget assuming lossless propagation), in order to ensure that it still works with the extra losses due to rain fade or other external factors. Link margin: A system with a negative link margin cannot transfer data, so one or more of the following are needed: more transmitter power; more antenna gain at the receiver or transmitter; less propagation loss (e.g., better antenna locations and/or shorter paths); lower receiver noise figure; improved error correction coding (FEC); reduced interference; or a lower data rate.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Hantzsch ester** Hantzsch ester: Hantzsch ester refers to an organic compound with the formula HN(MeC=C(CO2Et))2CH2 where Me = methyl (CH3) and Et = ethyl (C2H5). It is a light yellow solid. The compound is an example of a 1,4-dihydropyridine. It is named after Arthur Rudolf Hantzsch who described its synthesis in 1881. The compound is a hydride donor, e.g., for reduction of imines to amines. It is a synthetic analogue of NADH, a naturally occurring dihydropyridine. Preparation: Hantzsch ester can be made with a Hantzsch pyridine synthesis where formaldehyde, two equivalents of ethyl acetoacetate and ammonium acetate are combined to afford the product in high yield. Structure: As confirmed by X-ray crystallography, Hantzsch ester has a planar C5N core.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Content Protection for Recordable Media** Content Protection for Recordable Media: Content Protection for Recordable Media and Pre-Recorded Media (CPRM / CPPM) is a mechanism for controlling the copying, moving, and deletion of digital media on a host device, such as a personal computer, or other player. It is a form of digital rights management (DRM) developed by The 4C Entity, LLC (consisting of IBM, Intel, Matsushita and Toshiba). Content Protection for Recordable Media: The CPRM / CPPM specification defines a renewable cryptographic method for restricting content when recorded on physical media. The currently implemented method utilizes the Cryptomeria cipher (C2) algorithm for symmetric encryption. The types of physical media supported include, but are not limited to, recordable DVD media and flash memory. The most widespread use of CPRM is arguably in Secure Digital cards such as the SD-Audio standard. Note that the available 0.9 revision includes only the portions of the specification covering DVD media. Content Protection for Recordable Media: The CPRM / CPPM specification was designed to meet the requirements of intellectual property owners while balancing the implementation requirements of manufacturers. To accomplish these requirements, the system defined by the specification relies on public-key cryptography's key management for interchangeable media, content encryption, and "media-based renewability." The use of the CPRM specification and access to the cryptographic materials required to implement it requires a license from 4C Entity, LLC. The license includes a facsimile key for the product which uses CPRM / CPPM technology. Content Protection for Recordable Media: A controversial proposal to add generic key exchange commands (that could be utilized by CPRM and other content restriction technologies) to ATA specifications for removable hard drives was abandoned after outcry in 2001. CPRM is widely deployed in the popular Secure Digital card consumer-electronics flash memory format.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Fructose 1-phosphate** Fructose 1-phosphate: Fructose-1-phosphate is a derivative of fructose. It is generated mainly by hepatic fructokinase but is also generated in smaller amounts in the small intestinal mucosa and proximal epithelium of the renal tubule. It is an important intermediate of glucose metabolism. Because fructokinase has a high Vmax fructose entering cells is quickly phosphorylated to fructose 1-phosphate. In this form it is usually accumulated in the liver until it undergoes further conversion by aldolase B (the rate limiting enzyme of fructose metabolism). Fructose 1-phosphate: Aldolase B converts it into glyceraldehyde and dihydroxyacetone phosphate (DHAP). Glyceraldehyde is then phosphorylated by triose kinase to glyceraldehyde 3-phosphate. Metabolism of fructose thus essentially results in intermediates of glycolysis. This means that fructose has the same fate as glucose after it gets metabolised. The final product of glycolysis (pyruvate) may then undergo gluconeogenesis, enter the TCA cycle or be stored as fatty acids. Clinical significance: In hereditary fructose intolerance caused by defects in aldolase B, fructose 1-phosphate accumulates in the liver and causes a number of adverse defects. Hypoglycemia results from inhibition of glycogenolysis and gluconeogenesis. It depletes intracellular phosphate reserves which leads to loss of ATP and inhibition of biosynthetic pathways. Symptoms of hereditary fructose intolerance are apathy, drowsiness, sweatiness and tremulousness.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**HOT-2** HOT-2: HOT-2 (2,5-dimethoxy-4-(β-ethylthio)-N-hydroxyphenethylamine) is a psychedelic phenethylamine of the 2C family. It was presumably first synthesized by Alexander Shulgin and reported in his book PiHKAL. Chemistry: HOT-2's full chemical name is 2-[4-(2-ethylthio)-2,5-dimethoxyphenyl–N–hydroxyethanamine. It has structural properties similar to 2C-T-2 and to other drugs in the HOT- series, with the most closely related compounds being HOT-7 and HOT-17. General information: The dosage range of HOT-2 is typically 10-18 mg and its duration is approximately 6–10 hours according to Shulgin. HOT-2 produces visuals and moving, flowing lights. It also causes euphoria and increases blood pressure. Legality: United Kingdom This substance is a Class A drug in the Drugs controlled by the UK Misuse of Drugs Act.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Laboratoire de Zététique** Laboratoire de Zététique: The Laboratoire de Zététique (English: Zetetic Laboratory) is a structure founded by professor Henri Broch in 1998. Purpose and history: The laboratory is a research and information centre concerned with purported "paranormal" or "abnormal" phenomena. The goal is dissemination of the scientific method and zététique (defined as "the art of doubt", in English better known as scientific skepticism). Purpose and history: The Laboratoire de Zététique is run by an association called the Centre d'Analyse Zététique (Centre for Zetetic Analysis), which publishes the CAZette (a portmanteau of gazette and its abbreviation CAZ) since November 2011. Since 2005, it is affiliated with the Center for Inquiry as "Center for Inquiry–France", with Henri Broch as its spokesperson and ambassador of CFI–Transnational.Between 1987 and 2002, the laboratory offered the International Zetetic Challenge for an award of €200,000; no one has ever succeeded in demonstrating a paranormal phenomenon under these controlled conditions, however. Mediums and clairvoyants were challenged to show their powers, but all 275 (or 264) candidates failed.In 2004, the UFO skeptic Claude Maugé presented on the site of the laboratory his Composite Reductionist Theory (TCR) about UFOs to explain this phenomenon.Following Joe Nickell, Henri Broch once replicated the Shroud of Turin, demonstrating the bas-relief method as an easy explanation of how the Shroud could have been faked.In October 2007, Richard Monvoisin became the first Doctor of Science Education on the subject of skepticism. His thesis, titled Pour une didactique de l'esprit critique – Zététique & utilisation des interstices pseudoscientifiques dans les médias ("For Education in Critical Thinking. Skepticism & Usage of Pseudoscientific Interstices in the Media"), was co-edited by codirected by Henri Broch and Patrick Lévy (Institut du sommeil et de la vigilance, faculté de médecine, Grenoble 1). Together with other French academics from other universities in Grenoble, Marseille, Montpellier etc., he founded the Collectif de recherche transdisciplinaire esprit critique et sciences (Cortecs) ("Interdisciplinary Research Collective on Critical Thinking and Science"). As of 2015, the Laboratoire de Zététique no longer offers courses on skepticism, but they have been transferred to the Joseph Fourier University of Grenoble, where Monvoisin's lectures on "Zététique & autodéfense intellectuelle" ("Skepticism & Intellectual Self-Defence") attract up to 900 students.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Trading strategy** Trading strategy: In finance, a trading strategy is a fixed plan that is designed to achieve a profitable return by going long or short in markets. The main reasons that a properly researched trading strategy helps are its verifiability, quantifiability, consistency, and objectivity. Trading strategy: For every trading strategy one needs to define assets to trade, entry/exit points and money management rules. Bad money management can make a potentially profitable strategy unprofitable.Trading strategies are based on fundamental or technical analysis, or both. They are usually verified by backtesting, where the process should follow the scientific method, and by forward testing (a.k.a. 'paper trading') where they are tested in a simulated trading environment. Types of trading strategies: The term trading strategy can in brief be used by any fixed plan of trading a financial instrument, but the general use of the term is within computer assisted trading, where a trading strategy is implemented as computer program for automated trading. Technical strategies can be broadly divided into the mean-reversion and momentum groups. Long/short equity. A long short strategy consists of selecting a universe of equities and ranking them according to a combined alpha factor. Given the rankings we long the top percentile and short the bottom percentile of securities once every rebalancing period. Pairs trade. A pairs trading strategy consists of identifying similar pairs of stocks and taking a linear combination of their price so that the result is a stationary time-series. We can then compute z-scores for the stationary signal and trade on the spread assuming mean reversion: short the top asset and long the bottom asset. Swing trading strategy; Swing traders buy or sell as that price volatility sets in and trades are usually held for more than a day. Scalping (trading); Scalping is a method to making dozens or hundreds of trades per day, to get a small profit from each trade by exploiting the bid/ask spread. Day Trading; The Day trading is done by professional traders; the day trading is the method of buying or selling within the same day. Positions are closed out within the same day they are taken, and no position is held overnight. Trading the news; The news is an essential skill for astute portfolio management, and long term performance is the technique of making a profit by trading financial instruments (stock, currency...) just in time and in accordance to the occurrence of events. Trading Signals; Trading signal is simply a method to buy signals from signals provider. Social trading; using other peoples trading behaviour and activity to drive a trading strategy.All these trading strategies are basically speculative. In the moral context speculative activities are considered negatively and to be avoided by each individual. who conversely should maintain a long-term horizon avoiding any types of short term speculation. Development: The trading strategy is developed by the following methods: Automated trading; by programming or by visual development. Development: Trading Plan Creation; by creating a detailed and defined set of rules that guide the trader into and through the trading process with entry and exit techniques clearly outlined and risk, reward parameters established from the outset.The development and application of a trading strategy preferably follows eight steps: (1) Formulation, (2) Specification in computer-testable form, (3) Preliminary testing, (4) Optimization, (5) Evaluation of performance and robustness, (6) Trading of the strategy, (7) Monitoring of trading performance, (8) Refinement and evolution. Performance measurement: Usually the performance of a trading strategy is measured on the risk-adjusted basis. Probably the best-known risk-adjusted performance measure is the Sharpe ratio. However, in practice one usually compares the expected return against the volatility of returns or the maximum drawdown. Normally, higher expected return implies higher volatility and drawdown. The choice of the risk-reward trade-off strongly depends on trader's risk preferences. Often the performance is measured against a benchmark, the most common one is an Exchange-traded fund on a stock index. In the long term a strategy that acts according to Kelly criterion beats any other strategy. However, Kelly's approach was heavily criticized by Paul Samuelson. Executing strategies: A trading strategy can be executed by a trader (Discretionary Trading) or automated (Automated Trading). Discretionary Trading requires a great deal of skill and discipline. It is tempting for the trader to deviate from the strategy, which usually reduces its performance. Executing strategies: An automated trading strategy wraps trading formulas into automated order and execution systems. Advanced computer modeling techniques, combined with electronic access to world market data and information, enable traders using a trading strategy to have a unique market vantage point. A trading strategy can automate all or part of your investment portfolio. Computer trading models can be adjusted for either conservative or aggressive trading styles e.g. Scalping is considered a form of trading in financial markets with a very short-term approach that is why it is associated with aggressive style.Trading activity boost and development is connected with the era of internet inception. First online related trading activity and rapid growth of electronic commerce started in 1997–98.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Call capture** Call capture: Call Capture technology is both a phone and text-based technology that captures personal data from persons who inquire for information on something; usually a property for sale or rent. After the call is placed, the system notifies a client of the name and phone number of the person calling. The system was designed to generate leads specifically for the real estate industry.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Comparison of web server software** Comparison of web server software: Web server software allows computers to act as web servers. The first web servers supported only static files, such as HTML (and images), but now they commonly allow embedding of server side applications. Some web application frameworks include simple HTTP servers. For example the Django framework provides runserver, and PHP has a built-in server. These are generally intended only for use during initial development. A production server will require a more robust HTTP front-end such as one of the servers listed here. Features: Some features may be intentionally not included to web server to avoid featuritis. For example: TLS/HTTPS may be enabled with a separate stunnel daemon that terminates TLS and redirects raw HTTP packets to http daemon. NGINX and OpenBSD httpd authors decided not to include CGI interpretation but instead use FastCGI. For OpenBSD was developed a slowcgi gateway. BusyBox httpd doesn't have automatically generated directory listing but it may be implemented as a CGI script
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Activin and inhibin** Activin and inhibin: Activin and inhibin are two closely related protein complexes that have almost directly opposite biological effects. Identified in 1986, activin enhances FSH biosynthesis and secretion, and participates in the regulation of the menstrual cycle. Many other functions have been found to be exerted by activin, including roles in cell proliferation, differentiation, apoptosis, metabolism, homeostasis, immune response, wound repair, and endocrine function. Conversely, inhibin downregulates FSH synthesis and inhibits FSH secretion. The existence of inhibin was hypothesized as early as 1916; however, it was not demonstrated to exist until Neena Schwartz and Cornelia Channing's work in the mid-1970s, after which both proteins were molecularly characterized ten years later.Activin is a dimer composed of two identical or very similar beta subunits. Inhibin is also a dimer wherein the first component is a beta subunit similar or identical to the beta subunit in activin. However, in contrast to activin, the second component of the inhibin dimer is a more distantly-related alpha subunit. Activin, inhibin and a number of other structurally related proteins such as anti-Müllerian hormone, bone morphogenetic protein, and growth differentiation factor belong to the TGF-β protein superfamily. Structure: The activin and inhibin protein complexes are both dimeric in structure, and, in each complex, the two monomers are linked to one another by a single disulfide bond. In addition, both complexes are derived from the same family of related genes and proteins but differ in their subunit composition. Below is a list of the most common inhibin and activin complexes and their subunit composition: The alpha and beta subunits share approximately 25% sequence similarity, whereas the similarity between beta subunits is approximately 65%.In mammals, four beta subunits have been described, called activin βA, activin βB, activin βC and activin βE. Activin βA and βB are identical to the two beta subunits of inhibin. A fifth subunit, activin βD, has been described in Xenopus laevis. Two activin βA subunits give rise to activin A, one βA, and one βB subunit gives rise to activin AB, and so on. Various, but not all theoretically possible, heterodimers have been described. The subunits are linked by a single covalent disulfide bond. Structure: The βC subunit is able to form activin heterodimers with βA or βB subunits but is unable to dimerize with inhibin α. Function: Activin Activin is produced in the gonads, pituitary gland, placenta, and other organs: In the ovarian follicle, activin increases FSH binding and FSH-induced aromatization. It participates in androgen synthesis enhancing LH action in the ovary and testis. In the male, activin enhances spermatogenesis. Activin is strongly expressed in wounded skin, and overexpression of activin in epidermis of transgenic mice improves wound healing and enhances scar formation. Its action in wound repair and skin morphogenesis is through stimulation of keratinocytes and stromal cells in a dose-dependent manner. Activin also regulates the morphogenesis of branching organs such as the prostate, lung, and especially kidney. Activin A increased the expression level of type-I collagen suggesting that activin A acts as a potent activator of fibroblasts. Lack of activin during development results in neural developmental defects. Upregulation of Activin A drives pluripotent stem cells into a mesoendodermal fate, and thus provides a useful tool for stem cell differentiation and organoid formation. Inhibin In both females and males, inhibin inhibits FSH production. Inhibin does not inhibit the secretion of GnRH from the hypothalamus. However, the overall mechanism differs between the sexes: In females Inhibin is produced in the gonads, pituitary gland, placenta, corpus luteum and other organs. FSH stimulates the secretion of inhibin from the granulosa cells of the ovarian follicles in the ovaries. In turn, inhibin suppresses FSH. Inhibin B reaches a peak in the early- to mid-follicular phase, and a second peak at ovulation. Inhibin A reaches its peak in the mid-luteal phase.Inhibin secretion is diminished by GnRH, and enhanced by insulin-like growth factor-1 (IGF-1). In males It is secreted from the Sertoli cells, located in the seminiferous tubules inside the testes. Androgens stimulate inhibin production; this protein may also help to locally regulate spermatogenesis. Mechanism of action: Activin As with other members of the superfamily, activins interact with two types of cell surface transmembrane receptors (Types I and II) which have intrinsic serine/threonine kinase activities in their cytoplasmic domains: Activin type 1 receptors: ACVR1, ACVR1B, ACVR1C Activin type 2 receptors: ACVR2A, ACVR2BActivin binds to the Type II receptor and initiates a cascade reaction that leads to the recruitment, phosphorylation, and activation of Type I activin receptor. This then interacts with and then phosphorylates SMAD2 and SMAD3, two of the cytoplasmic SMAD proteins. Mechanism of action: Smad3 then translocates to the nucleus and interacts with SMAD4 through multimerization, resulting in their modulation as transcription factor complexes responsible for the expression of a large variety of genes. Inhibin In contrast to activin, much less is known about the mechanism of action of inhibin, but may involve competing with activin for binding to activin receptors and/or binding to inhibin-specific receptors. Clinical significance: Activin Activin A is more plentiful in the adipose tissue of obese, compared to lean persons. Activin A promotes the proliferation of adipocyte progenitor cells, while inhibiting their differentiation into adipocytes. Activin A also increases inflammatory cytokines in macrophages.A mutation in the gene for the activin receptor ACVR1 results in fibrodysplasia ossificans progressiva, a fatal disease that causes muscle and soft tissue to gradually be replaced by bone tissue. This condition is characterized by the formation of an extra skeleton that produces immobilization and eventually death by suffocation. The mutation in ACVR1 causes activin A, which normally acts as an antagonist of the receptor and blocks osteogenesis (bone growth), to behave as an agonist of the receptor and to induce hyperactive bone growth. On 2 September 2015, Regeneron Pharmaceuticals announced that they had developed an antibody for activin A that effectively cures the disease in an animal model of the condition.Mutations in the ACVR1 gene have also been linked to cancer, especially diffuse intrinsic pontine glioma(DIPG).Elevated Activin B levels with normal Activin A levels provided a possible biomarker for myalgic encephalomyelitis/chronic fatigue syndrome.Activin A is overexpressed in many cancers. It was shown to promote tumorigenesis by hampering the adaptive anti-tumor immune response in melanoma. Clinical significance: Inhibin Quantification of inhibin A is part of the prenatal quad screen that can be administered during pregnancy at a gestational age of 16–18 weeks. An elevated inhibin A (along with an increased beta-hCG, decreased AFP, and a decreased estriol) is suggestive of the presence of a fetus with Down syndrome. As a screening test, abnormal quad screen test results need to be followed up with more definitive tests. Clinical significance: It also has been used as a marker for ovarian cancer.Inhibin B may be used as a marker of spermatogenesis function and male infertility. The mean serum inhibin B level is significantly higher among fertile men (approximately 140 pg/mL) than in infertile men (approximately 80 pg/mL). In men with azoospermia, a positive test for inhibin B slightly raises the chances for successfully achieving pregnancy through testicular sperm extraction (TESE), although the association is not very substantial, having a sensitivity of 0.65 (95% confidence interval [CI]: 0.56–0.74) and a specificity of 0.83 (CI: 0.64–0.93) for prediction the presence of sperm in the testes in non-obstructive azoospermia.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**7-PET** 7-PET: 7-PET is an opioid analgesic drug that has 300 times the potency of morphine by weight. It was discovered by K.W. Bentley and is related to the more well known oripavine derivative etorphine, which is used as a veterinary painkiller and anesthetic medication for the sedation of large animals such as elephants, giraffes, and rhinos. 7-PET itself has a 3-O-methyl ether which reduces potency, but the 3-OH derivative is around 2200 times more potent than morphine, almost the same potency as etorphine as a μ agonist, and unexpectedly the 3-hydrogen compound is also around the same potency of 2000 times morphine.Unlike etorphine, 7-PET is not controlled under the UN drug conventions, but it might still be considered to be a controlled substance analogue of etorphine on the grounds of its related chemical structure in some jurisdictions such as the United States, Canada, Australia, and New Zealand.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Secular variation** Secular variation: The secular variation of a time series is its long-term, non-periodic variation (see decomposition of time series). Whether a variation is perceived as secular or not depends on the available timescale: a variation that is secular over a timescale of centuries may be a segment of what is, over a timescale of millions of years, a periodic variation. Natural quantities often have both periodic and secular variations. Secular variation is sometimes called secular trend or secular drift when the emphasis is on a linear long-term trend. Secular variation: The term is used wherever time series are applicable in history, economics, operations research, biological anthropology, and astronomy (particularly celestial mechanics) such as VSOP (planets). Etymology: The word secular, from the Latin root saecularis ("of an age, occurring once in an age"), has two basic meanings: I. Of or pertaining to the world (from which secularity is derived), and II. Of or belonging to an age or long period. The latter use appeared in the 18th century in the sense of "living or lasting for an age or ages". In the 19th century terms like secular acceleration and secular variation appeared in astronomy, and similar language was used in economics by 1895. Astronomy: In astronomy, secular variations are distinguished from periodic phenomena. In particular, astronomical ephemerides use secular to label the longest duration or non-oscillatory perturbations in the motion of planets, contrasted with periodic perturbations which exhibit repetition over the course of a given time frame. In this context it is referred to as secular motion. Solar System ephemerides are essential for the navigation of spacecraft and for all kinds of space observations of the planets, their natural satellites, stars and galaxies. Astronomy: Most of the known perturbations to motion in stable, regular, and well-determined dynamical systems tend to be periodic at some level, but in many-body systems, chaotic dynamics result in some effects which are unidirectional (for example, planetary migration). Astronomy: Solar System Secular phenomena create variations in the orbits of the Moon and the planets. The solar emission spectrum and the solar wind follow secular trends due to migration through the galactic plane. Consensus has determined these to have been among the smallest of factors to influence climate and extinction during human evolution, dwarfed by complex solar cycles and magnetic cycles. Astronomy: Moon The secular acceleration of the Moon depends on tidal forces. It was discovered early but it was some time before it was correctly explained. Astronomy: Earth Depending on the time frame, perturbations can appear secular even if they are actually periodic. An example of this is the precession of the Earth's axis considered over the time frame of a few hundred or thousand years. When viewed in this timeframe the so-called "precession of the equinoxes" can appear to be a secular phenomenon since the axial precession takes 25,771.5 years. Thus monitoring it over a much smaller timeframe appears to simply result in a "drift" of the position of the equinox in the plane of the ecliptic of approximately one degree per 71.6 years, influencing the Milankovitch cycles. Astronomy: Planets Secular variation also refers to long-term trends in the orbits of all of the planets. Several attempts have from time to time been undertaken to analyze and predict such gravitational deviations for planets, observing ordinary satellite orbits. Others are referred to as post-keplerian effects. Variations Séculaires des Orbites Planétaires (VSOP) is a modern numerical model that tries to address the problem. Market trends: Market trends are classified as secular, primary and secondary for long, medium and short time frames. Some traders identify market trends using technical analysis. Geomagnetic secular variation: Geomagnetic secular variation refers to some changes in the Earth's magnetic field. The field has variations on timescales from milliseconds to millions of years – its rapid ones mostly come from currents in the ionosphere and magnetosphere. The secular variations are those over periods of a year or more, reflecting changes in the Earth's core. Phenomena associated with these include geomagnetic jerk, westward drift and geomagnetic reversals. Biological anthropology: A secular trend, widely tapered off and in some places ended, in which case a discrete developmental shift, has been found to apply across the continents in the average age of onset of puberty (menarche/first menstruation and beginning of breast development) of girls from the 1940s to 2010s: beginning roughly 4 months earlier per decade. This is largely believed to be caused by nutritional changes in children over time.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Oyster cracker** Oyster cracker: Oyster crackers are small, salted crackers, typically rounds about 15 millimetres (5⁄8 inch) in diameter, although a slightly smaller hexagonal variety is also common. Oyster crackers are often served with oyster stew and clam chowder and have a flavor similar to saltine crackers. In cuisine: Oyster crackers are popular in the northeastern United States, where they are served as an accompaniment to soup, and in the Cincinnati area, where they are frequently served with that city's distinctive chili. In New England, oyster crackers are served with oyster stew and chowders. Plain oyster crackers are sometimes seasoned with various spices or pepper sauce and served as an appetizer or snack. Oyster crackers have a taste similar to saltine crackers, but usually are less salty. In other areas of the United States, they are among the choices for crackers with soup or salads and are often available in restaurants in single serving packages. In cuisine: Many different companies produce oyster crackers with different combinations of shortenings and other ingredients, but retaining the same general shape and size. Etymology: The origin of the term "oyster cracker" is unclear, but it may be that they were originally served with oyster stew or clam chowder or possibly that they look somewhat like an oyster in its shell. Other names include "water cracker," "Philadelphia cracker," and "Trenton cracker". Origins: The Westminster Cracker Company, currently of Rutland, Vermont, has been making oyster crackers since 1828. However, a counterclaim is that Adam Exton is credited with inventing the oyster cracker. Origins: Adam Exton, a baker in Trenton, New Jersey, immigrated to America from Lancashire, England, in 1842. In Trenton, Exton opened a cake and cracker bakery with his brother-in-law, Richard Aspden, in 1846. Although Aspden died the following year, Exton continued with the bakery (the "Exton Cracker Bakery" or "Adam Exton & Co."). He invented a machine that rolled and docked pastry and solved the sanitary problems of hand-rolling crackers. Origins: The history of the oyster cracker was related by Exton's nephew, also named Adam Exton, in the Trenton Evening Times newspaper on May 31, 1917: Even a cracker has a history. The past, present and future of the little disc of baked dough with "Exton" stamped across the face of it was discussed by Rotarian Adam Exton, of the Exton Cracker Company, at the weekly meeting of Trenton Rotary Club held this afternoon at Hildebrecht's... Manufacture of the Exton oyster cracker was started in Trenton, in the same location now occupied by the company's factory of Center Street, in 1847. Adam Exton, uncle of the speaker, was the originator of the oyster cracker. At the outset the factory had an output of 100 pounds of crackers a day, 36 of them to a pound, making a daily capacity of 3,600 crackers.} (for the record, oyster crackers of today are much smaller and a pound of oyster crackers runs between 350 and 400 crackers, depending on manufacturer)
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Egg shaker** Egg shaker: An egg shaker or ganzá is a hand percussion instrument, in the idiophone category, that makes a noise when shaken. Functionally it is similar to a maraca. Typically the outer casing or container is ovoidal or egg-shaped. It is partially full of small, loose objects, such as seeds or beads, which create the percussive sounds as they collide, both with each other and with the inside surface of the container. The egg shaker is a Latin American instrument, cheap to buy and relatively simple to play. Playing styles: The egg shaker can be played in a number of ways. It can be shaken up and down to create a fast percussion line or from side to side creating a slightly different sound. It is used alongside other instruments like maracas, but also in samba groups and mariachi bands using instruments such as the drumkit, piano, saxophone, bass guitar, violin, the vihuela, guitarrón, trumpet, occasionally acoustic guitar or electric guitar, and the voice. Construction: The egg shaker is created with a plastic mould, the main shape created in two halves. One half is filled with metal beads or seeds and then both halves are fitted together. Another sound can be made by holding the shaker in the palm of the hand tightly, then opening it whilst shaking it up and down. This makes a whirling sound not possible with other percussion instruments. Availability: Egg shakers are available in a number of colours, and are sold in most music shops at a reasonably low price, due to the use of inexpensive materials like plastic and seeds. They are often sold in packets alongside other similar percussion instruments such as maracas, tambourines, finger cymbals etc.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Regional Atmospheric Modeling System** Regional Atmospheric Modeling System: The Regional Atmospheric Modeling System (RAMS) is a set of computer programs that simulate the atmosphere for weather and climate research and for numerical weather prediction (NWP). Other components include a data analysis and a visualization package.RAMS was developed in the 1980s at Colorado State University (CSU), spearheaded by William R. Cotton and Roger A. Pielke, for mesoscale meteorological modeling. Subsequent development is primarily done by Robert L. Walko and Craig J. Tremback under the supervision of Cotton and Pielke. It is a comprehensive non-hydrostatic model. It is written primarily in Fortran with some C code and it runs best under the Unix operating system. Version 6 was released in 2009.RAMS is the basis for a system simulating the Martian atmosphere that is named MRAMS.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**D-glutamate oxidase** D-glutamate oxidase: In enzymology, a D-glutamate oxidase (EC 1.4.3.7) is an enzyme that catalyzes the chemical reaction D-glutamate + H2O + O2 ⇌ 2-oxoglutarate + NH3 + H2O2The 3 substrates of this enzyme are D-glutamate, H2O, and O2, whereas its 3 products are 2-oxoglutarate, NH3, and H2O2. This enzyme belongs to the family of oxidoreductases, specifically those acting on the CH-NH2 group of donors with oxygen as acceptor. The systematic name of this enzyme class is D-glutamate:oxygen oxidoreductase (deaminating). Other names in common use include D-glutamic oxidase, and D-glutamic acid oxidase. This enzyme participates in d-glutamine and d-glutamate metabolism.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Samantabhadra Meditation Sutra** Samantabhadra Meditation Sutra: The Samantabhadra Meditation Sūtra (traditional Chinese: 觀普賢菩薩行法經; simplified Chinese: 观普贤菩萨行法经; pinyin: guān pǔxián púsà xíngfǎ jīng; Japanese: 普賢経; rōmaji fugen-kyō; Vietnamese: Kinh Quán Phổ Hiền Bồ Tát Hạnh Pháp; Korean: 관보현보살행법경; Gwanbohyeonbosalhaengbeop Gyeong), also known as the Sūtra of Meditation on the Bodhisattva Universal Virtue, is a Mahayana Buddhist sutra teaching meditation and repentance practices. Samantabhadra Meditation Sutra: The extant Chinese text of the meditation sutra was translated by Dharmamitra between 424 and 442 CE (T09n277). The Samantabhadra Meditation Sūtra is often included in the so-called "Threefold Lotus Sutra," along with the Lotus Sutra and the Innumerable Meanings Sutra. It is not known, however, when or by whom the sutra was first recited, but it is considered by many Mahayana sects to be a continuation (an epilogue) of the Buddha's teachings found within the Lotus Sutra. This sutra is believed to have followed two earlier translations, including one by Kumarajiva, which are now lost; no original Sanskrit translation has been found. Samantabhadra Bodhisattva: According to the sutra itself, Samantabhadra Bodhisattva ("Universal Virtue") was born in the east Pure Wonder Land and whose form was already mentioned clearly by the Buddha in the Avatamsaka Sutra. In the Threefold Lotus Sutra, the chapter preceding the Samantabhadra Meditation Sūtra, chapter 28 of the Lotus Sutra, describes Samantabhadra as a perfect example of an adherent to the four practices: He practices the teachings of the Lotus Sutra. Samantabhadra Bodhisattva: He protects the Dharma teachings from every kind of persecution. He witnesses the merits obtained by those who practice the teachings and the punishments of those who slander the Dharma or persecute the practitioners. Samantabhadra Bodhisattva: He proves that those who violate the Dharma can be delivered from their transgressions if they are sincerely penitent.In the Meditation Sutra, the Buddha describes Universal Virtue's body as unlimited in size, and the range of his voice and the forms of his image are also described as unlimited. He possesses divine powers that enable him to come into the world when he wishes and shrink down to a smaller size. Through his wisdom-power, he appears transformed as if mounted on a white elephant to the people of Jambudvīpa defiled by the three heavy hindrances: Arrogance, envy, and covetousness. The Buddha Shakyamuni describes in detail the form of the elephant on which Universal Virtue is mounted. Samantabhadra Bodhisattva: Universal Virtue rides the white elephant for the sole purpose of guiding the people of Jambudvīpa, or the sahā-world, through practices that are associated with their environment. The bodhisattva riding on his white elephant is a symbolic image of Buddhist practice, as well as a representation of purity. The purity of the six sense organs is represented by the six tusks of Universal Virtue's white elephant.It is undeniable that the Meditation Sutra is a continuation of the Lotus Sutra, because the sutra itself testifies to the "Dharma Flower Sutra" three times. Meaning of Repentance: The denotational meaning of the word "repentance" in a general sense, is the confession or remorse of one's own past physical and mental misdeeds, or transgressions. When we repent, we purify our minds and we free ourselves from a sense of sin, and we feel greatly refreshed. Psychoanalysts have applied this principle in helping many people who are mentally afflicted. Meaning of Repentance: Contemplation of Reality In Japan, the text is also called the Repentance Sutra (Japanese: 懺悔經; Rōmaji: Sange-kyō). The second chapter of the Lotus Sutra explains in detail the concept of Tathātā, or "Suchness". The sutra emphasizes repentance by means of meditating on "the true aspect of reality" and the "Vaipulya sutras."The essence of Buddhist repentance is summed up in the following lines from the verse spoken by the Buddha concerning the purification of the six sense organs: The ocean of impediment of all karma Is produced from one's false imagination. Meaning of Repentance: Should one wish to repent of it Let him sit upright and meditate on the true aspect of reality. All sins are just as frost and dew, So wisdom's sun can disperse them. Sources: Kato, Bunno (1993). The Threefold Lotus Sutra (PDF). Tokyo: Kosei Publishing Company. p. 348. ISBN 4333002087.Archive index at the Wayback Machine Niwano, Nikkyo (1976), Buddhism For Today: A Modern Interpretation of the Threefold Lotus Sutra (PDF), Tōkyō: Kōsei Publishing Co., ISBN 4-333-00270-2, archived from the original (PDF) on July 22, 2013 Reeves, Gene (2008). The Lotus Sutra: A Contemporary Translation of a Buddhist Classic. Somerville: Wisdom Publications. ISBN 0861715713.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Exponential factorial** Exponential factorial: The exponential factorial is a positive integer n raised to the power of n − 1, which in turn is raised to the power of n − 2, and so on in a right-grouping manner. That is, n(n−1)(n−2)⋯ The exponential factorial can also be defined with the recurrence relation a1=1,an=nan−1 The first few exponential factorials are 1, 2, 9, 262144, ... (OEIS: A049384 or OEIS: A132859). For example, 262144 is an exponential factorial since 262144 =4321 Using the recurrence relation, the first exponential factorials are: 21 = 2 32 = 9 49 = 262144 5262144 = 6206069878...8212890625 (183231 digits)The exponential factorials grow much more quickly than regular factorials or even hyperfactorials. The number of digits in the exponential factorial of 6 is approximately 5 × 10183 230. Exponential factorial: The sum of the reciprocals of the exponential factorials from 1 onwards is the following transcendental number: 1.611114925808376736 111111111111 111111111111 183212 272243682859 … This sum is transcendental because it is a Liouville number. Like tetration, there is currently no accepted method of extension of the exponential factorial function to real and complex values of its argument, unlike the factorial function, for which such an extension is provided by the gamma function. But it is possible to expand it if it is defined in a strip width of 1. Similarly, there is disagreement about the appropriate value at 0; any value would be consistent with the recursive definition. A smooth extension to the reals would satisfy f(0)=f′(1) , which suggests a value strictly between 0 and 1.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**SCO1** SCO1: Protein SCO1 homolog, mitochondrial, also known as SCO1, cytochrome c oxidase assembly protein, is a protein that in humans is encoded by the SCO1 gene. SCO1 localizes predominantly to blood vessels, whereas SCO2 is barely detectable, as well as to tissues with high levels of oxidative phosphorylation. The expression of SCO2 is also much higher than that of SCO1 in muscle tissue, while SCO1 is expressed at higher levels in liver tissue than SCO2. Mutations in both SCO1 and SCO2 are associated with distinct clinical phenotypes as well as tissue-specific cytochrome c oxidase (complex IV) deficiency. Structure: SCO1 is located on the p arm of chromosome 17 in position 13.1 and has 6 exons. The SCO1 gene produces a 33.8 kDa protein composed of 301 amino acids. The protein is a member of the SCO1/2 family. It contains 3 copper metal binding sites at positions 169, 173, and 260, a transit peptide, a 25 amino acid topological domain from positions 68–92, a 19 amino acid helical transmembrane domain from positions 93–111, and a 190 amino acid topological domain from positions 112–301 in the mitochondrial intermembrane. Additionally, SCO1 has been predicted to contain 10 beta-strands, 7 helixes, and 2 turns and is a single-pass membrane protein. Function: Mammalian cytochrome c oxidase (COX) catalyzes the transfer of reducing equivalents from cytochrome c to molecular oxygen and pumps protons across the inner mitochondrial membrane. In yeast, 2 related COX assembly genes, SCO1 and SCO2 (synthesis of cytochrome c oxidase), enable subunits 1 and 2 to be incorporated into the holoprotein. This gene is the human homolog to the yeast SCO1 gene. It is predominantly expressed in muscle, heart, and brain tissues, which are also known for their high rates of oxidative phosphorylation. SCO1 is a copper metallochaperone that is located in the inner mitochondrial membrane and is important for the maturation and stabilization of cytochrome c oxidase subunit II (MT-CO2/COX2). It plays a role in the regulation of copper homeostasis by controlling the localization and abundance of CTR1 and is responsible for the transportation of copper to the Cu(A) site on MT-CO2/COX2. Clinical relevance: Mutations in the SCO1 gene are associated with hepatic failure and encephalopathy resulting from mitochondrial complex IV deficiency also known as cytochrome c oxidase deficiency. This is a disorder of the mitochondrial respiratory chain with heterogeneous clinical manifestations, ranging from isolated myopathy to severe multisystem disease affecting several tissues and organs. Features include hypertrophic cardiomyopathy, hepatomegaly, and liver dysfunction, hypotonia, muscle weakness, exercise intolerance, developmental delay, delayed motor development, mental retardation, and lactic acidosis. Some affected individuals manifest fatal hypertrophic cardiomyopathy resulting in neonatal death. A subset of patients also suffers from Leigh syndrome. Specifically, cases of pathogenic SCO1 mutations have resulted in fatal infantile encephalopathy, neonatal-onset hepatic failure, and severe hepatopathy. The P174L and M294V mutations have been identified and implicated in these diseases and phenotypes. It has also been suggested that mutations in SCO1, as well as SCO2, can result in a cellular copper deficiency, which can occur separately from cytochrome c oxidase assembly defects. Model organisms: Model organisms have been used in the study of SCO1 function. A conditional knockout mouse line, called Sco1tm1a(KOMP)Wtsi was generated as part of the International Knockout Mouse Consortium program—a high-throughput mutagenesis project to generate and distribute animal models of disease.Male and female animals underwent a standardized phenotypic screen to determine the effects of deletion. Twenty-two tests were carried out on mutant mice and two significant abnormalities were observed. No homozygous mutant embryos were identified during gestation, and therefore none survived until weaning. The remaining tests were carried out on heterozygous mutant adult mice; no additional significant abnormalities were observed in these animals. Interactions: SCO1 has been shown to have 127 binary protein-protein interactions including 120 co-complex interactions. SCO1 interacts with COA6, TMEM177, COX20, COX16, COX17, WDR19, CIDEB, and UBC7. It is also found in a complex with TMEM177, COX20, COA6, MT-CO2/COX2, COX18, and SCO2.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**EN 590** EN 590: EN 590 is a standard published by the European Committee for Standardization that describes the physical properties that all automotive diesel fuel must meet if it is to be sold in the European Union and several other European countries. Based on 98/70/EG it allows the blending of up to 7% fatty acid methyl ester biodiesel with 'conventional' diesel - a 7:93 mix. History: The EN 590 had been introduced along with the European emission standards. With each of its revisions the EN 590 had been adapted to lower the sulphur content of diesel fuel - since 2007 this is called ultra low sulphur diesel as the former function of sulphur as a lubricant is absent (and needs to be replaced by additives). Winter Diesel: The standard EN 590 puts diesel fuel into two groups destined for specific climatic environments. For the "temperate" climatic zones the standard defines six classes from A to F. For the "arctic" climatic zones the standard defines five classes from 0 to 4. Winter Diesel: Many countries in Europe require diesel fuel to meet a specific class in winter times. In Central and Western Europe the Winter Diesel (Winterdiesel, diesel d'hiver) must meet Class F conditions at least from the beginning of December to the end of February. During a transitional period (mostly October and April) a lower Class must be met. In the Scandinavian countries the Winter Diesel (Vinterdiesel) must meet Class 2 conditions. Some mineral groups offer both types commonly known as Winter Diesel (Winterdiesel, diesel d'hiver) and Arctic Diesel (Polardiesel, diesel polaires).
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Identification badges of the Uniform Services of the United States** Identification badges of the Uniform Services of the United States: Identification badges of the Uniformed Services of the United States are insignia worn by service members conducting special duties, many of which can be awarded as permanent decorations if those duties are performed successfully. There are a few identification badges that are awarded to all services (such as the Presidential Service Badge), others are specific to a uniform service (such as the U.S. Army's Drill Sergeant Identification Badge). The Office of the President and Vice President and department/service headquarters badges are permanent decorations for those who successfully serve in those assignments. Some of the service level identification badges can be permanent decorations and others are only worn by a service member while performing specific duties, such as the Military Police Badge.Command insignia/badges are another form of identification badge used to identify an officer or non-commissioned officer who is/was in command or in-charge of a unit. If the service member performs their leadership duties successfully, the command insignia/badge they wear can become a permanent uniform decoration regardless of their next assignment.The following is a list of identification badges currently in use by the uniformed services: Department of Defense: U.S. Army U.S. Marine Corps U.S. Navy U.S. Air Force U.S. Space Force Department of Health and Human Services: U.S. Public Health Service Commissioned Corps Department of Commerce: U.S. National Oceanic and Atmospheric Administration Commissioned Corps
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Wachregiment** Wachregiment: In German military tradition, a Wachregiment ("guard regiment") is a regiment that also performs guard of honor duties. It is not to be confused with a Guards unit in Soviet military tradition. Wachregimente include: Wachregiment Berlin (Weimar Republic) Wachregiment "Feliks E. Dzierzynski" (East Germany) Wachregiment "Friedrich Engels" (WR-1) (East Germany) Wachregiment "Hugo Eberlein" (WR-2) (East Germany)
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Projection body** Projection body: In convex geometry, the projection body ΠK of a convex body K in n-dimensional Euclidean space is the convex body such that for any vector u∈Sn−1 , the support function of ΠK in the direction u is the (n – 1)-dimensional volume of the projection of K onto the hyperplane orthogonal to u. Minkowski showed that the projection body of a convex body is convex. Petty (1967) and Schneider (1967) used projection bodies in their solution to Shephard's problem. Projection body: For K a convex body, let Π∘K denote the polar body of its projection body. There are two remarkable affine isoperimetric inequality for this body. Petty (1971) proved that for all convex bodies K ,Vn(K)n−1Vn(Π∘K)≤Vn(Bn)n−1Vn(Π∘Bn), where Bn denotes the n-dimensional unit ball and Vn is n-dimensional volume, and there is equality precisely for ellipsoids. Zhang (1991) proved that for all convex bodies K ,Vn(K)n−1Vn(Π∘K)≥Vn(Tn)n−1Vn(Π∘Tn), where Tn denotes any n -dimensional simplex, and there is equality precisely for such simplices. Projection body: The intersection body IK of K is defined similarly, as the star body such that for any vector u the radial function of IK from the origin in direction u is the (n – 1)-dimensional volume of the intersection of K with the hyperplane u⊥. Equivalently, the radial function of the intersection body IK is the Funk transform of the radial function of K. Intersection bodies were introduced by Lutwak (1988). Projection body: Koldobsky (1998a) showed that a centrally symmetric star-shaped body is an intersection body if and only if the function 1/||x|| is a positive definite distribution, where ||x|| is the homogeneous function of degree 1 that is 1 on the boundary of the body, and Koldobsky (1998b) used this to show that the unit balls lpn, 2 < p ≤ ∞ in n-dimensional space with the lp norm are intersection bodies for n=4 but are not intersection bodies for n ≥ 5.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Earth Similarity Index** Earth Similarity Index: The Earth Similarity Index (ESI) is a proposed characterization of how similar a planetary-mass object or natural satellite is to Earth. It was designed to be a scale from zero to one, with Earth having a value of one; this is meant to simplify planet comparisons from large databases. The scale has no quantitative meaning for habitability. Formulation: The ESI, as proposed in 2011 by Schulze-Makuch et al. in the journal Astrobiology, incorporates a planet's radius, density, escape velocity, and surface temperature into the index. Thus the authors describe the index as having two components: (1) associated with the interior which is associated with the mean radius and bulk density, and (2) associated with the surface which is associated with the escape velocity and surface temperature. An article on the ESI formulation derivation is made available by Kashyap Jagadeesh et al.(2017). ESI was also referenced in an article published in Revista Cubana de Física.For exoplanets, in almost every case only the planet's orbital period along with either the proportional dimming of the star due to the planet's transit or the radial velocity variation of the star in response to the planet is known with any degree of certainty, and so every other property not directly determined by those measurements is speculative. For example, while surface temperature is influenced by a variety of factors including irradiance, tidal heating, albedo, insolation and greenhouse warming, as these factors are not known for any exoplanet, quoted ESI values use planetary equilibrium temperature as a stand-in.A webpage maintained by one of the authors of the 2011 Astrobiology article, Abel Méndez at the University of Puerto Rico at Arecibo, lists his calculations of the index for various exoplanetary systems. Méndez's ESI is calculated as ESI=∏i=1n(1−|xi−xi0xi+xi0|)win ,where xi and xi0 are properties of the extraterrestrial body and of Earth respectively, wi is the weighted exponent of each property, and n is the total number of properties. It is comparable to, and constructed from, the Bray–Curtis Similarity Index. The weight assigned to each property, wi , are free parameters that can be chosen to emphasize certain characteristics over others or to obtain desired index thresholds or rankings. The webpage also ranks what it describes as the habitability of planets and moons according to three criteria: the location in the habitable zone, ESI, and a speculation as to a capacity to sustain organisms at the bottom of the food chain, a different index collated on the webpage identified as the "Global Primary Habitability scale".The 2011 Astrobiology article and the ESI values found in it received press attention at the time of the article's publication. As a result, Mars was reported to have the second-highest ESI in the Solar System with a value of 0.70. A number of exoplanets listed in that article were reported to have values in excess of this. Formulation: Other ESI values that have been reported by third parties include the following sources: No relation to habitability: Although the ESI does not characterize habitability, given the point of reference is the Earth, some of its functions match those used by habitability measures. As with the definition of the habitable zone, the ESI uses surface temperature as a primary function (and the terrestrial point of reference). A 2016 article uses ESI as a target selection scheme and obtains results showing that the ESI has little relation to the habitability of an exoplanet, as it takes no account of the activity of the star, planetary tidal locking, nor the planet's magnetic field (i.e. ability to protect itself) which are among the keys to habitable surface conditions.It has been noted that ESI fails to differentiate between Earth similarity and Venus similarity, where planets with a lower ESI have a greater chance at habitability. Planets with an Earth-like size: The classification of exoplanets is difficult in that many methods of exoplanet detection leave several features unknown. For example, with the transit method, measurement of radius can be highly accurate, but mass and density are often estimated. Likewise with radial velocity methods, which can provide accurate measurements of mass but are less successful measuring radius. Planets observed via a number of different methods therefore can be most accurately compared to Earth. Similarity of non-planets to Earth: The index can be calculated for objects other than planets, including natural satellites, dwarf planets and asteroids. The lower average density and temperature of these objects give them lower index values. Only Titan (a moon of Saturn) is known to hold on to a significant atmosphere despite an overall lower size and density. While Io (a moon of Jupiter) has a low average temperature, surface temperature on the moon varies wildly due to geologic activity.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Bertrand–Diguet–Puiseux theorem** Bertrand–Diguet–Puiseux theorem: In the mathematical study of the differential geometry of surfaces, the Bertrand–Diguet–Puiseux theorem expresses the Gaussian curvature of a surface in terms of the circumference of a geodesic circle, or the area of a geodesic disc. The theorem is named for Joseph Bertrand, Victor Puiseux, and Charles François Diguet. Bertrand–Diguet–Puiseux theorem: Let p be a point on a smooth surface M. The geodesic circle of radius r centered at p is the set of all points whose geodesic distance from p is equal to r. Let C(r) denote the circumference of this circle, and A(r) denote the area of the disc contained within the circle. The Bertrand–Diguet–Puiseux theorem asserts that lim lim 12 πr2−A(r)πr4. Bertrand–Diguet–Puiseux theorem: The theorem is closely related to the Gauss–Bonnet theorem.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Levolor** Levolor: Levolor is an American manufacturer of custom window blinds and shades, as well as stock blinds and shades. History: The company was founded in 1914 in Hoboken, New Jersey by Hans K. Lorentzen, (June 23, 1887 – January 17, 1974) a Danish immigrant who originally started out as a tool and die maker. Considered the Henry Ford of the window blinds industry, Lorentzen introduced the concepts of standardization, vertical integration, metal manufacturing and assembly lines. In 1993, Levolor was acquired by Newell (known today as Newell Brands). In July 2016, Levolor was sold to Hunter Douglas, a Dutch custom window blind manufacturer, for US$260 million. Locations: Levolor is headquartered in the Atlanta, Georgia metropolitan area, and has operations in the United States, Canada, Mexico, and China. As of 2016, the company had approximately 2600 employees. Levolor products are sold through a number of major retailers including Home Depot, Lowe's, JC Penney's, and RONA, as well as independent dealers and stores. In Popular Culture: The rock band Veruca Salt wrote a song titled 'Number One Blind' singing the company name in the chorus. The song is about window blinds keeping the sun away, making it difficult to know what time of day it is.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Physical comedy** Physical comedy: Physical comedy is a form of comedy focused on manipulation of the body for a humorous effect. It can include slapstick, clowning, mime, physical stunts, or making funny faces.Physical comedy originated as part of the Commedia dell'arte. It is now sometimes incorporated into sitcoms; for example, in the sitcom Three's Company, actor John Ritter frequently performed pratfalls (landing on the buttocks). Cartoons, particularly film shorts, also commonly depict an exaggerated form of physical comedy (incorporating cartoon physics), such as in Tom and Jerry and Wile E. Coyote and the Road Runner.Slapstick elements include the trip, the slip, the double take, the collide, the fall (or faint), and the roar. Examples: Charlie Chaplin started his film career as a physical comedian; although he developed additional means of comic expression, Chaplin's mature works continued to contain elements of slapstick. Other comedians to employ physical comedy as a medium for their characters include Don Knotts, Jerry Lewis, Danny Kaye, Martin Short, Marilyn Monroe, the Keystone Kops, Laurel and Hardy, Abbott and Costello, Marx Brothers, The Three Stooges. Examples: In the movies, physical comedy is used by, for example, Jacques Tati as Monsieur Hulot, Peter Sellers as Chief Inspector Clouseau in The Pink Panther film series, Jackie Chan in many of his Hong Kong action comedy films, Zero Mostel's character Max Bialystock in The Producers, Bette Midler's, Goldie Hawn's and Diane Keaton's characters in The First Wives Club, Arnold Schwarzenegger's and Danny DeVito's characters in Twins, Will Ferrell's and John C. Reilly's characters in Step Brothers, Zac Efron's and Adam DeVine's characters in Mike and Dave Need Wedding Dates. Examples: Sacha Baron Cohen’s characters Borat Sagdiyev and Brüno Gehard in Borat (and its sequel Borat Subsequent Moviefilm) and Brüno.In sitcoms, the use of physical comedy was seen in, for example, Dick van Dyke's character Rob Petrie in The Dick Van Dyke Show, Lucille Ball's character Lucy Ricardo in I Love Lucy, Martin Lawrence’s character Martin Payne in Martin, Larry Hagman's character Major Anthony Nelson in I Dream of Jeannie, John Ritter's character Jack Tripper in Three's Company, The two main characters of Mark Linn-Baker and Bronson Pinchot in Perfect Strangers, Michael Richards's character Cosmo Kramer in Seinfeld, Penny Marshall's character Laverne DeFazio and Cindy Williams' character Shirley Feeney in Laverne & Shirley, Jennifer Saunders' character Edina Monsoon and Joanna Lumley's character Patsy Stone in Absolutely Fabulous, Nicholas Lyndhurst's character Rodney Trotter in Only Fools and Horses, Neil Morrissey's character Tony in Men Behaving Badly, Jennifer Aniston's character Rachel Green in Friends, Rowan Atkinson's character Mr. Bean, Jaleel White's character Steve Urkel in Family Matters, Rik Mayall's and Adrian Edmondson's characters Richard Richard and Eddie Hitler in Bottom, James Corden's character Neil Smith in Gavin & Stacey Jim Belushi and Larry Joe Campbell's characters Jim and Andy in According to Jim.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Tree diagram (probability theory)** Tree diagram (probability theory): In probability theory, a tree diagram may be used to represent a probability space. Tree diagram (probability theory): Tree diagrams may represent a series of independent events (such as a set of coin flips) or conditional probabilities (such as drawing cards from a deck, without replacing the cards). Each node on the diagram represents an event and is associated with the probability of that event. The root node represents the certain event and therefore has probability 1. Each set of sibling nodes represents an exclusive and exhaustive partition of the parent event. Tree diagram (probability theory): The probability associated with a node is the chance of that event occurring after the parent event occurs. The probability that the series of events leading to a particular node will occur is equal to the product of that node and its parents' probabilities.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Stock car racing in the United Kingdom** Stock car racing in the United Kingdom: Stock car racing in the United Kingdom covers a number of different oval racing formulas. Contact is allowed in UK stock car racing, that is, if you are unable to pass an opponent using speed alone, you are allowed to push or hit your opponent in order to pass. The degree of contact allowed varies between categories. History: Stock car racing was brought to Britain in 1954. Taking place on existing greyhound or speedway tracks, the cars were mostly road cars from the 1930s with locked rear axle differentials and added armour for contact racing. After the first couple of years custom-built cars began to appear eventually making the 'stock' car name something of a misnomer. Since the early days of stock car racing in Britain the sport has developed into many different classes. In addition, non-contact oval racing became known as Hot Rods, while the original kind of armoured road car used in the 1950s developed into saloon stock cars and unarmoured cars raced in full contact banger racing. Open-wheel Stock car formulas: Stock car formulas are largely split into two organisations broadly based in the north and south, BriSCA and Spedeworth. Open-wheel Stock car formulas: BriSCA Formula 1 Stock Cars are the most sophisticated stock car formula. Each vehicle races with a race-tuned V8 engine developing approximately 650 bhp. The cars are also fitted with quick-change axles, roof-mounted aerofoils, cambered wheels and brake setups for constant left turning. The chassis of each vehicle is also offset. Large bumpers are mandatory and contact is encouraged to push opponents out of the way. The Smaller BriSCA Formula 2 Stock Cars are also very popular. They are essentially a downsized version of the Formula 1 Stock Car, being powered by a 2-litre Ford engine. V8 Hotstox are a third BriSCA formula that race. They are a much cheaper class to race and use the Rover V8 engine. This class is often used as a stepping stone to the Formula 1 class. Open-wheel Stock car formulas: Licensed and promoted by Spedeworth are the Superstox. Superstox are similar to BriSCA Formula 2 Stock Cars with the main visual difference being a smaller wing on the roof. These cars are also powered by the 2-litre Ford Pinto engine. Spedeworth also run V8 Stock Cars, which are similar in design to the BriSCA Hotstox, but use small-block 5-litre Chevrolet engines. Open-wheel Stock car formulas: Stoxkarts are the smallest and probably the cheapest formula, running 13 hp Honda engines. This formula is one of the only where more than one driver can use the same car in the same meeting. At the budget end of the racing spectrum is the rapidly growing Modstox formula. Visually similar to Formula 2 and Superstox, the formula is limited to the 850cc Reliant engine with other prescribed budget components, making it an ideal starter or 'last chance' formula for more senior drivers. Closed-wheel Stock car formulas: In 2001 the ASCAR Racing Series was formed and ran until 2008, the series was a "NASCAR" style racing series that was predominantly ran at Rockingham Motor Speedway as well as briefly on the continent. The first season was won by John Mickel. Other notable champions were Nicolas Minassian and Ben Collins who also played as The Stig on Top Gear. The field was usually populated by professional or semi-professional stock car drivers, however notable drivers who were famous from other areas of motorsport either took part in single races or for one complete season, they included Colin McRae, Jason Plato, Matt Neal, Darren Manning, Max Papis, John Cleland and former NASCAR drivers Brandon Whitt and Randy Tolsma. Closed-wheel Stock car formulas: Another one of the most popular forms of UK stock car racing are the 2-Litre National Saloon Stock Cars, regulated by the Saloon Stock Car Association. This formula is typically based on heavily armoured Ford Sierra, Ford Mondeo, Vauxhall Vectra and Audi A6 models, purposely reconstructed for this full contact class. Closed-wheel Stock car formulas: The 1300cc Stock Cars hold very similar build specification to the 2-Litre Nationals, with cars being armoured all the way around. The major difference between the two are the different cars used. The smaller engine capacity means cars are a lot smaller and lighter. Most are front-wheel drive like the Vauxhall Corsa, Vauxhall Tigra and Honda Civic, however the class does allow the rear-wheel drive Toyota Starlet. Closed-wheel Stock car formulas: Rebels are a one-make purpose built formula also using the 850cc reliant engine with slight modifications, in a steel chassis with 'retro' plastic panels designed to give the look of a scaled down post-war Ford Popular. Hot Rods: Hot Rods are a non-contact race formula where each vehicle is based on a road car, or made to resemble a road going counterpart. The concept for the National series is similar to that of NASCAR. The cars that race resemble production cars, but are in fact purpose built space frame chassis with a Kevlar body which mimics a production car. Other Hot Rod categories do make use of standard production body/chassis. Hot Rods: Classes include;- National Hot Rods, 2 litre Hot Rods, Classic Hot Rods, Stock Rods, Lightning Rods, Rookie Rods, MASCAR Other non-contact categories which might be included as Hot Rod classes are Legends, Midgets Bangers: Bangers are production cars that are raced with modifications for safety such as reinforced drivers' doors, H-Frame Roll Cages added and all glass removed. The racing can be either Full Contact or Limited Contact. Full Contact is when wrecking usually takes more importance than the racing with drivers some times having head on crashes to take out opponents. Limited Contact on the other hand only allows some lighter crashing and spinning of cars with the racing aspect still being a key focal point. That said, this sport is not a Destruction Derby, although some banger meetings do end with one. Junior formulas: Ministox are one of the most popular routes for junior drivers to progress into senior stock car classes. Every car racing in must be derived from a Mini branded car. The cars resemble both senior closed wheel stock car classes in their build, but the speeds reached are generally lower to reduce risk levels. Drivers are encouraged to learn the racecraft and tactics that the senior drivers use in the 1300cc and 2-Litre Nationals. Junior formulas: Together with the Ministox, there are several formulae that cater for junior drivers interested in progressing up contact formulas. Classes include;- Junior Micra Stock Cars, Junior Bangers, Junior Stoxkarts, Micro F2 Stock Cars There are also several non-contact classes for the juniors, which are often cheap and accessible steps towards the senior rod formulas. Classes include;- Ninja Karts, Junior Rods, JASCAR
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Hallucinatory realism** Hallucinatory realism: Hallucinatory realism is a term that has been used with various definitions since at least the 1970s by critics in describing works of art. In some occurrences the term has had connections to the concept of magical realism, although hallucinatory realism is usually more specific to a dream-state. The term occurs in the motivation for Mo Yan's Nobel Prize in Literature. History: In 1975, Clemens Heselhaus used it to describe the poetry of Annette von Droste-Hülshoff, although it was criticized in a book review as an "oxymoronic" term that did not fully capture the striking imagery of the poems. Professor Elisabeth Krimmer, of the University of California Davis, praised von Droste-Hülshoff's hallucinatory realism, saying that "the transition to the dream world is even more compelling because it is preceded by a detailed description of the natural environment."In 1981, The Oxford Companion to Twentieth Century Art listed hallucinatory realism as one trend of surrealism—"a careful and precise delineation of detail, yet a realism which does not depict an external reality since the subjects realistically depicted belong to the realm of dream or fantasy."In 1983, in his paper Halluzinatorischer Realismus (page 183.) Burkhardt Lindner defined hallucinatory realism as the attempt to make the bygone present with a documentary factuality and at an Aesthetic enhancement of the reality.Goethe University Frankfurt professor Burkhardt Lindner discussed it in the paper "Hallucinatory Realism: Peter Weiss' Aesthetics of Resistance, Notebooks, and the Death Zones of Art" (New German Critique, 1983). In this paper about Peter Weiss, Lindner says: Weiss calls his Trotsky drama "a play that is documentary only in a limited sense, and would rather have take shape as a vision, almost hallucinatory." The expressions vision, hallucination, and schizophrenia should make one suspicious of the claim to true-to-life reproduction. Hallucinatory Realism - this is the attempt to blend the numerous characters into a breadth, an openness, a secret connection, a synchronism and a network of memory into a "We".Lindner goes on to say "The treatment of hallucinatory realism seeks to achieve a dream-analogous authenticity." The term occurs in the motivation for Mo Yan's Nobel Prize in Literature. History: The term is used in four of the five official versions of the press release (English, French, German, and Spanish); however, in the presumably original Swedish version, the term "hallucinatorisk skärpa" ("hallucinatory sharpness") is used instead. The award was announced in Swedish and English.In a review by Joy Press of the novel My Life as a Fake by Peter Carey, hallucinatory realism is used to describe how the book manages to make imaginary universes feel concrete and believable. In an essay on the filmmaker Maya Deren, the term hallucinatory realism is used in a sentence about making reality and subjectivity indistinguishable. History: The term hallucinatory realism has also been used by different critics to describe works by the writers Peter Weiss and Tomi Ungerer,Pasolini's film The Gospel According to St Matthew, and the novel Paradise Alley by Kevin Baker.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Dehn plane** Dehn plane: In geometry, Max Dehn introduced two examples of planes, a semi-Euclidean geometry and a non-Legendrian geometry, that have infinitely many lines parallel to a given one that pass through a given point, but where the sum of the angles of a triangle is at least π. A similar phenomenon occurs in hyperbolic geometry, except that the sum of the angles of a triangle is less than π. Dehn's examples use a non-Archimedean field, so that the Archimedean axiom is violated. They were introduced by Max Dehn (1900) and discussed by Hilbert (1902, pp. 127–130, or pp. 42–43 in some later editions). Dehn's non-archimedean field Ω(t): To construct his geometries, Dehn used a non-Archimedean ordered Pythagorean field Ω(t), a Pythagorean closure of the field of rational functions R(t), consisting of the smallest field of real-valued functions on the real line containing the real constants, the identity function t (taking any real number to itself) and closed under the operation ω ↦ 1 + ω 2 {\textstyle \omega \mapsto {\sqrt {1+\omega ^{2}}}} . The field Ω(t) is ordered by putting x > y if the function x is larger than y for sufficiently large reals. An element x of Ω(t) is called finite if m < x < n for some integers m, n, and is called infinite otherwise. Dehn's semi-Euclidean geometry: The set of all pairs (x, y), where x and y are any (possibly infinite) elements of the field Ω(t), and with the usual metric ‖(x,y)‖=x2+y2, which takes values in Ω(t), gives a model of Euclidean geometry. The parallel postulate is true in this model, but if the deviation from the perpendicular is infinitesimal (meaning smaller than any positive rational number), the intersecting lines intersect at a point that is not in the finite part of the plane. Hence, if the model is restricted to the finite part of the plane (points (x,y) with x and y finite), a geometry is obtained in which the parallel postulate fails but the sum of the angles of a triangle is π. This is Dehn's semi-Euclidean geometry. It is discussed in Rucker (1982, pp. 91–2). Dehn's non-Legendrian geometry: In the same paper, Dehn also constructed an example of a non-Legendrian geometry where there are infinitely many lines through a point not meeting another line, but the sum of the angles in a triangle exceeds π. Riemann's elliptic geometry over Ω(t) consists of the projective plane over Ω(t), which can be identified with the affine plane of points (x:y:1) together with the "line at infinity", and has the property that the sum of the angles of any triangle is greater than π The non-Legendrian geometry consists of the points (x:y:1) of this affine subspace such that tx and ty are finite (where as above t is the element of Ω(t) represented by the identity function). Legendre's theorem states that the sum of the angles of a triangle is at most π, but assumes Archimedes's axiom, and Dehn's example shows that Legendre's theorem need not hold if Archimedes' axiom is dropped.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Digital Storage Systems Interconnect** Digital Storage Systems Interconnect: The Digital Storage Systems Interconnect (DSSI) is a computer bus developed by Digital Equipment Corporation for connecting storage devices and clustering VAX systems. It was designed as a smaller and lower-cost replacement for the earlier DEC Computer Interconnect that would be more suitable for use in office environments. DSSI was superseded by Parallel SCSI.It was introduced in 1988 and has a bandwidth of 32 Mbit/s (4 MB/sec) and was typically limited to a length of 25 metres (82 ft). DSSI support was later extended to MIPS-based DECsystems and DEC Alpha-based AlphaServer systems. Digital Storage Systems Interconnect: DSSI peripherals could be distinguished from narrow SCSI devices by their characteristic five-conductor power connector featuring an extra lead intended for Battery/UPS connection to power critical components in the event of a power failure. Characteristics: The major characteristics of the DSSI bus are: Eight-bit data path Up to eight nodes on the bus including variable numbers of initiators and targets Distributed arbitration Peak bandwidth of 4 megabytes per second All systems connected to the same DSSI bus must have a common power/ground. "The Q-Bus 5-Enclosure Rule": For Q-bus VMScluster configurations, a maximum of five enclosures, excluding SF200/210s, can be configured on a single DSSI bus. Note that only one (1) SF100 is allowed on any DSSI bus. "The VAX 6000 Cabinet Rule": For a VAX 6000 DSSI VMScluster system, a maximum of two or three VAX 6000 systems and one storage cabinet, typically an SF200 or SF210, can be configured on a single DSSI bus. Maximum DSSI bus length cannot exceed 27 meters (89 feet) and ground offset voltage cannot exceed 30mv (dc) or 10.5mv (rms). Bus Length Allowable Offset Meters/Feet (DC) (AC) ----------- ---------------- up to 20/65 200mv 70mv (rms) 20-25/65-82 40mv 14mv (rms) VAX6000 QUAD-Host--> 27/89 30mv 10.5mv (rms) VAX7000 VAX10000 Operating system support in VAX/OpenVMS: DSSI SUPPORT IN OpenVMS: OpenVMS VAX V5.0-2: o Single- and Dual-Host support with 2 EDA640s (MicroVAX 3300/3400 series). o Systems Communications Services (SCS) for the VMScluster is run over the Network Interconnect (NI) for MicroVAX 3300/3400. OpenVMS VAX V5.1: o Standalone support for the KFQSA. o Up to 6 ISEs on a single DSSI bus regardless of whether 1 or 2 hosts systems are attached to the bus. OpenVMS VAX V5.1-1: o Dual host support for KFQSAs (1 KFQSA per system). OpenVMS VAX V5.2: o For 3300/3400 series, SCS communication over the DSSI. o Multiple KFQSA's per system, but *not* multiple dual-hosted DSSI's per system (here, multiple means 2, since only 2 hosts are allowed on the DSSI bus). o DSSI adapter must connect to another like adapter, e.g. EDA640 to EDA640 or KFQSA to KFQSA. o Up to 7 ISEs on a single DSSI bus when only 1 host system is attached to the bus. OpenVMS VAX V5.3: o Mixed DSSI adapters, i.e. EDA640 to KFQSA. o Mixed DSSI adapters, i.e. EDA640 to KFQSA. o Double dual-host configurations, i.e. 2 DSSI buses between two CPUs. Each bus is terminated at its own pair of adapters. OpenVMS VAX V5.3-2: o Support for VAX 4000. (The VAX 4000 has 2 SHACs and can support two KFQSAs on the bus, so it can have up to 4 DSSI buses). OpenVMS VAX V5.4-2: o Support for the KFMSA, an XMI to DSSI adapter. The KFMSA may only be used to single-host a VAX 6000 model or dual-host 2 VAX 6000 models together. OpenVMS VAX V5.4-3: o Tri-host configurations supported. OpenVMS VAX V5.5-2: o Quad-host configurations with VAX 6000, VAX 7000/10000 series systems now supported. NOTE: KFQSAs do not support SCS communication over the DSSI bus, they MUST have a NI connection in order to run the cluster software. OpenVMS Alpha V1.5, OpenVMS VAX V6.0: o Quad-host DSSI configurations with DEC 4000 AXP systems supported. DEC 4000 systems can be configured only as end nodes on a DSSI bus, therefore, quad-host configurations must include at least two VAX systems. o KFQSA Q-bus to DSSI configurations supported. VAX processors that use the KFQSA adapter can be placed on the same DSSI bus as DEC 4000 processors. Third Party Peripherals: Other companies, such as CMD and Symbios Logic made DSSI compatible chipsets or peripherals, for example, CMD manufactured various models of the CDI-4000 which would allow SCSI peripherals to be used on a DSSI bus.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**ARHGEF2** ARHGEF2: Rho guanine nucleotide exchange factor 2 is a protein that in humans is encoded by the ARHGEF2 gene. Function: Rho GTPases play a fundamental role in numerous cellular processes that are initiated by extracellular stimuli that work through G protein-coupled receptors. The encoded protein may form complex with G proteins and stimulate rho-dependent signals. Interactions: ARHGEF2 has been shown to interact with PAK1.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**CVVTCS** CVVTCS: Continuous Variable Valve Timing Control System (CVVTCS) is an automobile variable valve timing technology developed by Nissan. It is also used in a twin CVTC configuration on engines like the Nissan Juke's MR16DDT engine. CVVTCS is the successor to Nissan's earlier valve timing implementation NVCS. Engines with CVVTCS: HR15DE HR16DE HR12DE MR18DE MRA8DE (twin intake/exhaust) MR20DE MR16DDT (twin intake/exhaust) QR25DE VQ23DE VQ25DET VQ25DD (NEO-Di)(eVTC) VQ30DD (NEO-Di)(eVTC) VQ25HR (twin intake/exhaust) (eVTC) VQ35DE (single intake/twin exhaust on some variants) VQ35HR (twin intake/exhaust) (eVTC) VQ37VHR (twin intake/exhaust) (eVTC) (also uses Variable Valve Event and Lift) VQ40DE VR38DETT VK45DE VK50VE (twin intake/exhaust) (also uses Variable Valve Event and Lift) VK56DE (2007+) VK56VD (twin intake/exhaust) (also uses Variable Valve Event and Lift)
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Loop-level parallelism** Loop-level parallelism: Loop-level parallelism is a form of parallelism in software programming that is concerned with extracting parallel tasks from loops. The opportunity for loop-level parallelism often arises in computing programs where data is stored in random access data structures. Where a sequential program will iterate over the data structure and operate on indices one at a time, a program exploiting loop-level parallelism will use multiple threads or processes which operate on some or all of the indices at the same time. Such parallelism provides a speedup to overall execution time of the program, typically in line with Amdahl's law. Description: For simple loops, where each iteration is independent of the others, loop-level parallelism can be embarrassingly parallel, as parallelizing only requires assigning a process to handle each iteration. However, many algorithms are designed to run sequentially, and fail when parallel processes race due to dependence within the code. Sequential algorithms are sometimes applicable to parallel contexts with slight modification. Usually, though, they require process synchronization. Synchronization can be either implicit, via message passing, or explicit, via synchronization primitives like semaphores. Example: Consider the following code operating on a list L of length n. Example: Each iteration of the loop takes the value from the current index of L, and increments it by 10. If statement S1 takes T time to execute, then the loop takes time n * T to execute sequentially, ignoring time taken by loop constructs. Now, consider a system with p processors where p > n. If n threads run in parallel, the time to execute all n steps is reduced to T. Example: Less simple cases produce inconsistent, i.e. non-serializable outcomes. Consider the following loop operating on the same list L. Example: Each iteration sets the current index to be the value of the previous plus ten. When run sequentially, each iteration is guaranteed that the previous iteration will already have the correct value. With multiple threads, process scheduling and other considerations prevent the execution order from guaranteeing an iteration will execute only after its dependence is met. It very well may happen before, leading to unexpected results. Serializability can be restored by adding synchronization to preserve the dependence on previous iterations. Dependencies in code: There are several types of dependences that can be found within code. In order to preserve the sequential behaviour of a loop when run in parallel, True Dependence must be preserved. Anti-Dependence and Output Dependence can be dealt with by giving each process its own copy of variables (known as privatization). Example of true dependence S2 ->T S3, meaning that S2 has a true dependence on S3 because S2 writes to the variable a, which S3 reads from. Example of anti-dependence S2 ->A S3, meaning that S2 has an anti-dependence on S3 because S2 reads from the variable b before S3 writes to it. Example of output-dependence S2 ->O S3, meaning that S2 has an output dependence on S3 because both write to the variable a. Example of input-dependence S2 ->I S3, meaning that S2 has an input dependence on S3 because S2 and S3 both read from variable c. Dependence in loops: Loop-carried vs loop-independent dependence Loops can have two types of dependence: Loop-carried dependence Loop-independent dependenceIn loop-independent dependence, loops have inter-iteration dependence, but do not have dependence between iterations. Each iteration may be treated as a block and performed in parallel without other synchronization efforts. In the following example code used for swapping the values of two array of length n, there is a loop-independent dependence of S1 ->T S3. In loop-carried dependence, statements in an iteration of a loop depend on statements in another iteration of the loop. Loop-Carried Dependence uses a modified version of the dependence notation seen earlier. Example of loop-carried dependence where S1[i] ->T S1[i + 1], where i indicates the current iteration, and i + 1 indicates the next iteration. Loop carried dependence graph A Loop-carried dependence graph graphically shows the loop-carried dependencies between iterations. Each iteration is listed as a node on the graph, and directed edges show the true, anti, and output dependencies between each iteration. Types: There are a variety of methodologies for parallelizing loops. Types: DISTRIBUTED Loop DOALL Parallelism DOACROSS Parallelism HELIX DOPIPE ParallelismEach implementation varies slightly in how threads synchronize, if at all. In addition, parallel tasks must somehow be mapped to a process. These tasks can either be allocated statically or dynamically. Research has shown that load-balancing can be better achieved through some dynamic allocation algorithms than when done statically.The process of parallelizing a sequential program can be broken down into the following discrete steps. Each concrete loop-parallelization below implicitly performs them. Types: DISTRIBUTED loop When a loop has a loop-carried dependence, one way to parallelize it is to distribute the loop into several different loops. Statements that are not dependent on each other are separated so that these distributed loops can be executed in parallel. For example, consider the following code. The loop has a loop carried dependence S1[i] ->T S1[i+1] but S2 and S1 do not have a loop-independent dependence so we can rewrite the code as follows. Note that now loop1 and loop2 can be executed in parallel. Instead of single instruction being performed in parallel on different data as in data level parallelism, here different loops perform different tasks on different data. Let's say the time of execution of S1 and S2 be TS1 and TS2 then the execution time for sequential form of above code is n∗(TS1+TS2) , Now because we split the two statements and put them in two different loops, gives us an execution time of n∗TS1+TS2 . We call this type of parallelism either function or task parallelism. Types: DOALL parallelism DOALL parallelism exists when statements within a loop can be executed independently (situations where there is no loop-carried dependence). For example, the following code does not read from the array a, and does not update the arrays b, c. No iterations have a dependence on any other iteration. Types: Let's say the time of one execution of S1 be TS1 then the execution time for sequential form of above code is n∗TS1 , Now because DOALL Parallelism exists when all iterations are independent, speed-up may be achieved by executing all iterations in parallel which gives us an execution time of TS1 , which is the time taken for one iteration in sequential execution. Types: The following example, using a simplified pseudo code, shows how a loop might be parallelized to execute each iteration independently. DOACROSS parallelism DOACROSS Parallelism exists where iterations of a loop are parallelized by extracting calculations that can be performed independently and running them simultaneously.Synchronization exists to enforce loop-carried dependence. Consider the following, synchronous loop with dependence S1[i] ->T S1[i+1]. Types: Each loop iteration performs two actions Calculate a[i-1] + b[i] + 1 Assign the value to a[i]Calculating the value a[i-1] + b[i] + 1, and then performing the assignment can be decomposed into two lines(statements S1 and S2): The first line, int tmp = b[i] + 1;, has no loop-carried dependence. The loop can then be parallelized by computing the temp value in parallel, and then synchronizing the assignment to a[i]. Types: Let's say the time of execution of S1 and S2 be TS1 and TS2 then the execution time for sequential form of above code is n∗(TS1+TS2) , Now because DOACROSS Parallelism exists, speed-up may be achieved by executing iterations in a pipelined fashion which gives us an execution time of TS1+n∗TS2 DOPIPE parallelism DOPIPE Parallelism implements pipelined parallelism for loop-carried dependence where a loop iteration is distributed over multiple, synchronized loops. The goal of DOPIPE is to act like an assembly line, where one stage is started as soon as there is sufficient data available for it from the previous stage.Consider the following, synchronous code with dependence S1[i] ->T S1[i+1]. Types: S1 must be executed sequentially, but S2 has no loop-carried dependence. S2 could be executed in parallel using DOALL Parallelism after performing all calculations needed by S1 in series. However, the speedup is limited if this is done. A better approach is to parallelize such that the S2 corresponding to each S1 executes when said S1 is finished. Implementing pipelined parallelism results in the following set of loops, where the second loop may execute for an index as soon as the first loop has finished its corresponding index. Types: Let's say the time of execution of S1 and S2 be TS1 and TS2 then the execution time for sequential form of above code is n∗(TS1+TS2) , Now because DOPIPE Parallelism exists, speed-up may be achieved by executing iterations in a pipelined fashion which gives us an execution time of n∗TS1+(n/p)∗TS2 , where p is the number of processor in parallel.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Quantum fluctuation** Quantum fluctuation: In quantum physics, a quantum fluctuation (also known as a vacuum state fluctuation or vacuum fluctuation) is the temporary random change in the amount of energy in a point in space, as prescribed by Werner Heisenberg's uncertainty principle. They are minute random fluctuations in the values of the fields which represent elementary particles, such as electric and magnetic fields which represent the electromagnetic force carried by photons, W and Z fields which carry the weak force, and gluon fields which carry the strong force.Vacuum fluctuations appear as virtual particles, which are always created in particle–antiparticle pairs. Since they are created spontaneously without a source of energy, vacuum fluctuations and virtual particles are said to violate the conservation of energy. This is theoretically allowable because the particles annihilate each other within a time limit determined by the uncertainty principle so they are not directly observable.The uncertainty principle states the uncertainty in energy and time can be related by ΔEΔt≥12ℏ , where 1/2ħ ≈ 5.27286×10−35 Js. This means that pairs of virtual particles with energy ΔE and lifetime shorter than Δt are continually created and annihilated in empty space. Although the particles are not directly detectable, the cumulative effects of these particles are measurable. For example, without quantum fluctuations, the "bare" mass and charge of elementary particles would be infinite; from renormalization theory the shielding effect of the cloud of virtual particles is responsible for the finite mass and charge of elementary particles. Another consequence is the Casimir effect. One of the first observations which was evidence for vacuum fluctuations was the Lamb shift in hydrogen. In July 2020, scientists reported that quantum vacuum fluctuations can influence the motion of macroscopic, human-scale objects by measuring correlations below the standard quantum limit between the position/momentum uncertainty of the mirrors of LIGO and the photon number/phase uncertainty of light that they reflect. Field fluctuations: In quantum field theory, fields undergo quantum fluctuations. A reasonably clear distinction can be made between quantum fluctuations and thermal fluctuations of a quantum field (at least for a free field; for interacting fields, renormalization substantially complicates matters). An illustration of this distinction can be seen by considering quantum and classical Klein-Gordon fields: For the quantized Klein–Gordon field in the vacuum state, we can calculate the probability density that we would observe a configuration φt(x) at a time t in terms of its Fourier transform φ~t(k) to be exp ⁡[−1ℏ∫d3k(2π)3φ~t∗(k)|k|2+m2φ~t(k)]. Field fluctuations: In contrast, for the classical Klein–Gordon field at non-zero temperature, the Gibbs probability density that we would observe a configuration φt(x) at a time t is exp exp ⁡[−1kBT∫d3k(2π)3φ~t∗(k)12(|k|2+m2)φ~t(k)]. Field fluctuations: These probability distributions illustrate that every possible configuration of the field is possible, with the amplitude of quantum fluctuations controlled by Planck's constant ℏ , just as the amplitude of thermal fluctuations is controlled by kBT , where kB is Boltzmann's constant. Note that the following three points are closely related: Planck's constant has units of action (joule-seconds) instead of units of energy (joules), the quantum kernel is |k|2+m2 instead of 12(|k|2+m2) (the quantum kernel is nonlocal from a classical heat kernel viewpoint, but it is local in the sense that it does not allow signals to be transmitted), the quantum vacuum state is Lorentz invariant (although not manifestly in the above), whereas the classical thermal state is not (the classical dynamics is Lorentz invariant, but the Gibbs probability density is not a Lorentz invariant initial condition).We can construct a classical continuous random field that has the same probability density as the quantum vacuum state, so that the principal difference from quantum field theory is the measurement theory (measurement in quantum theory is different from measurement for a classical continuous random field, in that classical measurements are always mutually compatible – in quantum mechanical terms they always commute).
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Claves** Claves: Claves (; Spanish: [ˈklaβes]) are a percussion instrument consisting of a pair of short, wooden sticks about 20–25 centimeters (8–10 inches) long and about 2.5 centimeters (1 inch) in diameter. Although traditionally made of wood (typically rosewood, ebony or grenadilla) many modern manufacturers offer claves made of fiberglass or plastic. When struck, claves produce a bright, penetrating clicking noise. This makes them useful when playing in large dance bands. Claves are sometimes hollow and carved in the middle to amplify the sound. History: Claves have been very important in the development Afro-Cuban music, such as the son and guaguancó. They are often used to play an ostinato, or repeating rhythmic figure, throughout a piece known as the clave.Many examples of clave-like instruments can be found around the world. Technique: The basic principle when playing claves is to allow at least one of them to resonate. The usual technique is to hold one lightly with the thumb and fingertips of the non-dominant hand, with the palm up. This forms the hand into a resonating chamber for the clave. Holding the clave on top of fingernails makes the sound clearer. The other is held by the dominant hand at one end with a firmer grip, much like how one normally holds a drumstick. With the end of this clave, the player strikes the resting clave in the center.Traditionally, the striking clave is called el macho ("the male") and the resting clave is called la hembra ("the female"). This terminology is used even when the claves are identical. Technique: A roll can be achieved on the claves by holding one clave between the thumb and first two fingers, and then alternating pressure between the two fingers to move the clave back and forth. This clave is then placed against the resonating clave to produce a roll. Use in popular music: Among the bands to have used claves are the Beatles in their recording "And I Love Her" and The Who in their song "Magic Bus". Claves are also utilized in the interstitial spaces of the Night Court theme. Use in classical music: Many composers looking to emulate Afro-Cuban music will often use claves such as Arturo Márquez with Danzón No. 2 or George Gershwin with his Cuban Overture. Steve Reich's Music for Pieces of Wood is written for five pairs of claves. Sources: F. Ortiz, La Clave, Editorial Letras Cubanas, La Habana, Cuba, 1995. D. Peñalosa, The Clave Matrix – Afro-Cuban Rhythm: Its Principles and African Origins, Bembe Books, Redway California, U.S.A., 2009. O. A. Rodríguez, From Afro-Cuban Music to Salsa, Piranha, Berlin, 1998. E. Uribe, The Essence of Afro-Cuban Percussion and Drum Set, Warner Brothers Publications, Miami, Florida, 1996.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Graham Steell murmur** Graham Steell murmur: A Graham Steell murmur is a heart murmur typically associated with pulmonary regurgitation. It is a high pitched early diastolic murmur heard best at the left sternal edge in the second intercostal space with the patient in full inspiration, originally described in 1888. Graham Steell murmur: The murmur is heard due to a high velocity flow back across the pulmonary valve; this is usually a consequence of pulmonary hypertension secondary to mitral valve stenosis. The Graham Steell murmur is often heard in patients with chronic cor pulmonale (pulmonary heart disease) as a result of chronic obstructive pulmonary disease.In cases of mitral obstruction the murmur is occasionally heard over the pulmonary area and below this region, for the distance of an inch or two along the left border of the sternum. It's also rarely over the lowest part of the bone itself, a soft blowing diastolic murmur immediately following P2.It is named after Graham Steell.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Technology, Education, Management, Informatics** Technology, Education, Management, Informatics: Technology, Education, Management, Informatics (TEM) is a quarterly peer-reviewed academic journal covering technology and business. The journal has a significant impact as evidenced by citations in Google Scholar. It is indexed by Scopus, Web of Science, and other citation indices. Publication: TEM is published by UIKTEN – Association for Information Communication Technology Education and Science, Serbia. It is open access, and does not require a subscription or registration. All previous issues are accessible online.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Tulip (software)** Tulip (software): Tulip is an information visualization framework dedicated to the analysis and visualization of relational data. Tulip aims to provide the developer with a complete library, supporting the design of interactive information visualization applications for relational data that can be tailored to the problems being addressed. It is developed at LaBRI, the laboratory for research in computer science of the University of Bordeaux. Tulip (software): Written in C++, the framework enables the development of algorithms, visual encodings, interaction techniques, data models, and domain-specific visualizations. Tulip allows the reuse of components; this makes the framework efficient for research prototyping as well as the development of end-user applications. It has a binding for Python.Tulip is easy to use and offers very appealing visualization.Initially, Tulip targeted only graph visualization. Since then, it has evolved to be a more general-purpose data visualization software. Tulip can work with very huge data sets, e.g. 1,000,000 nodes and 5,000,000 edges.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Electromagnetic formation flight** Electromagnetic formation flight: Electromagnetic formation flight (EMFF) investigates the concept of using electromagnets coupled with reaction wheels in place of more traditional propulsion systems to control the positions and attitudes of a number of spacecraft in close proximity. Unlike traditional propulsion systems, which use exhaustible propellants that often limit lifetime, the EMFF system uses solar power to energize a magnetic field. The Massachusetts Institute of Technology Space Systems Laboratory is exploring this concept by developing dynamics and control models as well as an experimental testbed for their validation. How it works: The magnetic fields for EMFF are generated by sending current through coils of wire. The interaction between the magnetic dipoles created is easily understood with a far field approximation where the separation distance between two vehicles is large compared to the physical size of the dipole. By controlling the dipoles on various vehicles, attraction, repulsion, and shear forces can be created. Combined with reaction wheels, any desired maneuver can be performed as long as the formation’s center of mass is not required to change. Applications: The EMFF system is most applicable in cases where multiple spacecraft are free-flying relative to one another and there is no need to control the center of mass of the system. NASA’s Terrestrial Planet Finder (TPF) mission and space telescope assembly are just two such types of missions. EMFF provides the foremost advantage of reduced dependence on consumables. In addition, it eliminates thruster plumes and enhances the capability of replacing a failed element more economically. Testbed: The MIT-SSL constructed two EMFF testbed vehicles for demonstrating control of 2-D formations on a large flat floor. Vehicles are suspended on a frictionless air carriage and are completely self-contained using RF communications, microprocessors, and a metrology system. Liquid Nitrogen maintains cryogenic temperatures and batteries provide the power to the high-temperature superconductive (HTS) coils. The testbed has demonstrated control of the relative degrees of freedom (DOF) in open loop and closed loop control using linearized controllers and a nonlinear sliding mode controller. Awards: Former Space Systems Lab associate director Dr. Raymond Sedwick (now at the University of Maryland, College Park) has been awarded the first Bepi Colombo Prize for a paper on electromagnetic formation flight. According to Aero-Astro Professor Manuel Martinez-Sanchez, who worked with Colombo and was a juror in the competition, "The jury was unanimous in that Ray's paper best represented 'Bepi' Colombo's spirit of innovation and originality, combined with rigor." Collaborators: Research on electromagnetic formation flight or similar projects is also ongoing at: The Institute of Space and Astronautical Science / JAXA Space Research Centre, Polish Academy of Sciences Michigan Technogical University on Colomb Force Spacecraft Other journal articles: Elias, Laila M., Kwon, Daniel W., Sedwick, Raymond J., and Miller, David W., "Electromagnetic Formation Flight Dynamics including Reaction Wheel Gyroscopic Stiffening Effects" Journal of Guidance, Control, and Dynamics, Vol. 30, No. 2, Mar–Apr. 2007, pp. 499–511.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Teletex** Teletex: Teletex was ITU-T specification F.200 for a text and document communications service that could be provided over telephone lines. It was rapidly superseded by e-mail but the name Teletex lives on in several of the X.500 standard attributes used in Lightweight Directory Access Protocol. Overview: Teletex was designed as an upgrade to the conventional telex service. The terminal-to-terminal communication service of telex would be turned into an office-to-office document transmission system by teletex. Teletex envisaged direct communication between electronic typewriters, word processors and personal computers. These units had storage for transmitting and receiving messages. The use of such equipment considerably enhanced the character set available for document preparation. Features: Character sets In addition to the standard character set, a rich set of graphic symbols and a comprehensive set of control characters were supported in teletex. The set of control characters helped in preparation and reproduction of documents. In particular, they permitted the positioning of the printing element, specification of page orientation, left and right margins, vertical spacing and the use of underlining. The page control feature allowed standard A4 size papers to be used for receiving messages instead of the continuous stationery used in conventional telex systems. Features: Transmission and reception A background/foreground operation was envisaged in teletex. Transmission/reception of messages should proceed in the background without affecting the work which the user might be carrying out in the foreground with the equipment. In other words, a user might be preparing a new document, while another document was being transmitted or received. The teletex would also maintain compatibility with the present telex system and inter-operate with it. Telex procedures called for the exchange of header information before the actual document transfer took place. The header information consisted of four parts: Part 1: Destination ID, Part 2: Originator ID, Part 3: Date and time stamp, Part 4: Document reference.Twenty four characters were used for source/destination ids, 14 characters for date and time stamp, and 7 characters for document reference which also specified the number of pages in the document. Destination/source ID consisted of four fields: Field 1: Country/Network code, Field 2: National subscriber number, Field 3: Reserved for future use, Field 4: Terminal/Owner code.The number of characters allotted to each of the above fields was variable, subject to a maximum for each field, the total being 24 characters.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**MOS Technology 8502** MOS Technology 8502: The MOS Technology 8502 is an 8-bit microprocessor designed by MOS Technology and used in the Commodore 128 (C128). It is an improved version of the MOS 6510 used in the Commodore 64 (C64). It was manufactured using the HMOS process, allowing it to have higher transistor density, and lower cost, while dissipating less heat. The 8502 allows the C128 to run at double the clock rate of the C64 with some limitations. Description: Memory access in 8-bit machines Common random access memory (RAM) of the Commodore C64-era allowed accesses at 2 MHz. If the CPU and display chip both shared the same memory to communicate, which was the common solution in the era when RAM was expensive, then one would normally have to have the CPU and display chip chips mediate access to the bus so that only one of them used it at a time, generally by having one pause the other. Assuming the two chips require roughly equal access, that means the chips are paused half of the time, effectively running at 1 MHz.The 6502-family had a feature that eased the design of such systems. The 6502 used a two-phase clock to drive its internal circuitry, but only accessed memory during one of the two phases. That meant the display chip could access memory during alternating clock phases without having to pause the CPU. The major advantage of this style of access is that the two chips do not have to communicate to pause each other, they simply watch the already-existing clock signal present on the 6502's pins. In the original C64, this timing trick was used to allow the VIC-II to interleave its access to main memory with that of the 6510. Description: 8502 The 8502 is mostly a conversion of the original 6502 to be fabricated on Intel's HMOS-II process, introduced in 1979 and available for 3rd party use. This process used smaller feature sizes, which allowed the same chip to be produced within a smaller area, and thus be lower cost. As a result of being smaller, the chip also required less energy to run and dissipated less heat. This made it useful in some roles where the original 6502 might not be appropriate. Description: The original 6502 came in three versions, A, B and C, differing in their maximum speed, 1, 2 or 4 MHz, respectively. There was no physical difference between these designs; if a particular chip ran successfully at 2 MHz in testing it was labeled B, otherwise A. With the move to the HMOS process, most of the 8502s were capable of running at 2 MHz, the equivalent of the 6502B. Description: Changing the running speed of a 6502-based processor is as simple as changing the input clock signal, which meant the 8502 could easily switch between 2 MHz and the 6510's 1 MHz. When the clock runs at double-speed, it faces the problem that there is not enough time for the VIC to access memory during the free half-cycles. For this reason, the 8502 could only run at double-speed full-time when being used with the 80-column VDC in the C128, which had separate memory for the display that was not being directly accessed by the CPU. Description: When running a VIC display mode, the two chips began to share access as was the case in the C64, and this meant the CPU had to return to its normal ~1 MHz speed. Programs could disable the screen during CPU-intensive calculations to allow the CPU to run at its faster speed. A smaller speed gain, about 35%, was also possible while keeping the VIC display active by switching the CPU to 2 MHz only while the VIC is drawing the empty border along the top and bottom of the screen, since the VIC performs no RAM access during that time. Description: The pinout is slightly different than the 6510. The 8502 has an extra I/O-pin (the built-in I/O port mapped to addresses 0 and 1 is extended from 6 to 7 bits) and lacks the ϕ2-pin that the 6510 had. The 8502 family also includes the MOS 7501, 8500 and 8501.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Open-source software assessment methodologies** Open-source software assessment methodologies: Several methods have been created to define an assessment process for free/open-source software. Some focus on some aspects like the maturity, the durability and the strategy of the organisation around the open-source project itself. Other methodologies add functional aspects to the assessment process. Existing methodologies: There are more than 20 different OSS evaluation methods. Existing methodologies: Open Source Maturity Model (OSMM) from Capgemini Open Source Maturity Model (OSMM) from Navica Open Source Maturity Model (OSSMM) by Woods and Guliani Methodology of Qualification and Selection of Open Source software (QSOS) Open Business Readiness Rating (OpenBRR) Open Business Quality Rating (OpenBQR) QualiPSo QualiPSo Model for Open Source Software Trustworthiness (MOSST) Towards A Trustworthiness Model For Open Source Software: How to evaluate Open Source Software QualOSS – Quality of Open Source Evaluation Framework for Open Source Software A Quality Model for OSS Selection Atos Origin Method for Qualification and Selection of Open Source Software (QSOS) Observatory for Innovation and Technological transfer on Open Source software (OITOS) Framework for OS Critical Systems Evaluation (FOCSE) Comparison: Comparison criteria Stol and Babar have proposed a comparison framework for OSS evaluation methods. Their framework lists criteria in four categories: criteria related to the context in which the method is to be used, the user of the method, the process of the method, and the evaluation of the method (e.g., its validity and maturity stage). The comparison presented below is based on the following (alternative set of) criteria: Seniority : the methodology birth date. Comparison: Original authors/sponsors : original methodology authors and sponsoring entity (if any) License : Distribution and usage license for the methodology and the resulting assessments Assessment model : Detail levels : several levels of details or assessment granularity Predefined criteria : the methodology provides some predefined criteria Technical/functional criteria : the methodology permits the use of domain specific criteria based on technical information or features Scoring model : Scoring scale by criterion Iterative process : the assessment can be performed and refined using several steps improving the level of details Criteria weighting : it is possible to apply weighting on the assessed criteria as part of the methodology scoring model Comparison : the comparison process is defined by the methodology Comparison chart
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**O-1812** O-1812: O-1812 is an eicosanoid derivative related to anandamide that acts as a potent and highly selective agonist for the cannabinoid receptor CB1, with a Ki of 3.4 nM at CB1 and 3870 nM at CB2. Unlike most related compounds, O-1812 is metabolically stable against rapid breakdown by enzymes, and produces a cannabinoid-like discriminative effect in rats, which is similar but not identical to that produced by cannabinoid drugs of other chemical classes.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Diamond–Dybvig model** Diamond–Dybvig model: The Diamond–Dybvig model is an influential model of bank runs and related financial crises. The model shows how banks' mix of illiquid assets (such as business or mortgage loans) and liquid liabilities (deposits which may be withdrawn at any time) may give rise to self-fulfilling panics among depositors. Diamond and Dybvig, along with Ben Bernanke, were the recipients of the 2022 Nobel Prize in Economics for their work on the Diamond-Dybvig model. Theory: The model, published in 1983 by Douglas W. Diamond of the University of Chicago and Philip H. Dybvig, then of Yale University and now of Washington University in St. Louis, shows how an institution with long-maturity assets and short-maturity liabilities can be unstable. A similar basic concept had formed part of the nineteenth century British Banking School theory of financial crises. Theory: Structure of the model Diamond and Dybvig's paper points out that business investment often requires expenditures in the present to obtain returns in the future. Therefore, they prefer loans with a long maturity (that is, low liquidity). The same principle applies to individuals seeking financing to purchase large-ticket items such as housing or automobiles. On the other hand, individual savers (both households and firms) may have sudden, unpredictable needs for cash, due to unforeseen expenditures. So they demand liquid accounts which permit them immediate access to their deposits (that is, they value short maturity deposit accounts). Theory: The banks in the model act as intermediaries between savers who prefer to deposit in liquid accounts and borrowers who prefer to take out long-maturity loans. Under ordinary circumstances, banks can provide a valuable service by channeling funds from many individual deposits into loans for borrowers. Individual depositors might not be able to make these loans themselves, since they know they may suddenly need immediate access to their funds, whereas the businesses' investments will only pay off in the future (moreover, by aggregating funds from many different depositors, banks help depositors save on the transaction costs they would have to pay in order to lend directly to businesses). Since banks provide a valuable service to both sides (providing the long-maturity loans businesses want and the liquid accounts depositors want), they can charge a higher interest rate on loans than they pay on deposits and thus profit from the difference. Theory: Nash equilibria of the model Diamond and Dybvig point out that under ordinary circumstances, savers' unpredictable needs for cash are likely to be random, as depositors' needs reflect their individual circumstances. Since depositors' demand for cash are unlikely to occur at the same time, by accepting deposits from many different sources the bank expects only a small fraction of withdrawals in the short term, even though all depositors have the right to withdraw their full deposit at any time. Thus, a bank can make loans over a long horizon, while keeping only relatively small amounts of cash on hand to pay any depositors that wish to make withdrawals. However a different outcome is also possible. Since banks lend out at long maturity, they cannot quickly call in their loans. And even if they tried to call in their loans, borrowers would be unable to pay back quickly, since their loans were, by assumption, used to finance long-term investments. Therefore, if all depositors attempt to withdraw their funds simultaneously, a bank will run out of money long before it is able to pay all the depositors. The bank will be able to pay the first depositors who demand their money back, but if all others attempt to withdraw too, the bank will go bankrupt and the last depositors will be left with nothing. Theory: This means that even healthy banks are potentially vulnerable to panics, usually called bank runs. If a depositor expects all other depositors to withdraw their funds, then it is irrelevant whether the banks' long term loans are likely to be profitable; the only rational response for the depositor is to rush to take his or her deposits out before the other depositors remove theirs. In other words, the Diamond–Dybvig model views bank runs as a type of self-fulfilling prophecy: each depositor's incentive to withdraw funds depends on what they expect other depositors to do. If enough depositors expect other depositors to withdraw their funds, then they all have an incentive to rush to be the first in line to withdraw their funds. Policy implications: In practice, due to fractional reserve banking, banks faced with a bank run usually shut down and refuse to permit more withdrawals. However, Diamond and Dybvig argue that unless the total amount of real expenditure needs per period is known with certainty, suspension of convertibility cannot be the optimal mechanism for preventing bank runs. Instead, they argue that a better way of preventing bank runs is deposit insurance backed by the government or central bank. Such insurance pays depositors all or part of their losses in the case of a bank run. If depositors know that they will get their money back even in case of a bank run, they have no reason to participate in a bank run. Policy implications: Thus, sufficient deposit insurance can eliminate the possibility of bank runs. In principle, maintaining a deposit insurance program is unlikely to be very costly for the government: as long as bank runs are prevented, deposit insurance will never actually need to be paid out. However an IMF working paper has questioned the effectiveness of deposit insurance in a crisis. Policy implications: Case from US economic history Bank runs became much rarer in the U.S. after the Federal Deposit Insurance Corporation was founded in the aftermath of the bank panics of the Great Depression. On the other hand, a deposit insurance scheme is likely to lead to moral hazard: by protecting depositors against bank failure, it makes depositors less careful in choosing where to deposit their money, and thus gives banks less incentive to lend carefully. Without effective deposit insurance, cryptocurrency exchanges have been vulnerable to bank runs, with several collapsing in 2022.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Metacharacter** Metacharacter: A metacharacter is a character that has a special meaning to a computer program, such as a shell interpreter or a regular expression (regex) engine. Metacharacter: In POSIX extended regular expressions, there are 14 metacharacters that must be escaped (preceded by a backslash (\)) in order to drop their special meaning and be treated literally inside an expression: opening and closing square brackets ([ and ]); backslash (\); caret (^); dollar sign ($); period/full stop/dot (.); vertical bar/pipe symbol (|); question mark (?); asterisk (*); plus and minus signs (+ and -); opening and closing curly brackets/braces ({ and }); and opening and closing parentheses (( and )). Metacharacter: For example, to match the arithmetic expression (1+1)*3=6 with a regex, the correct regex is \(1\+1\)\*3=6; otherwise, the parentheses, plus sign, and asterisk will have special meanings. Other examples: Some other characters may have special meaning in some environments. In some Unix shells the semicolon (";") is a statement separator. In XML and HTML, the ampersand ("&") introduces an HTML entity. It also has special meaning in MS-DOS/Windows Command Prompt. In some Unix shells and MS-DOS/Windows Command Prompt, the less-than sign and greater-than sign ("<" and ">") are used for redirection and the backtick/grave accent ("`") is used for command substitution. In many programming languages, strings are delimited using quotes (" or '). In some cases, escape characters (and other methods) are used to avoid delimiter collision, e.g. "He said, \"Hello\"". In printf format strings, the percent sign ("%") is used to introduce format specifiers and must be escaped as "%%" to be interpreted literally. In SQL, the percent is used as a wildcard character. In SQL, the underscore ("_") is used to match any single character. Escaping: The term "to escape a metacharacter" means to make the metacharacter ineffective (to strip it of its special meaning), causing it to have its literal meaning. For example, in PCRE, a dot (".") stands for any single character. The regular expression "A.C" will match "ABC", "A3C", or even "A C". However, if the "." is escaped, it will lose its meaning as a metacharacter and will be interpreted literally as ".", causing the regular expression "A\.C" to only match the string "A.C". Escaping: The usual way to escape a character in a regex and elsewhere is by prefixing it with a backslash ("\"). Other environments may employ different methods, like MS-DOS/Windows Command Prompt, where a caret ("^") is used instead.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Multipoint ground** Multipoint ground: A multipoint ground is an alternate type of electrical installation that attempts to solve the ground loop and mains hum problem by creating many alternate paths for electrical energy to find its way back to ground. The distinguishing characteristic of a multipoint ground is the use of many interconnected grounding conductors into a loose grid configuration. There will be many paths between any two points in a multipoint grounding system, rather than the single path found in a star topology ground. This type of ground may also be known as a Signal Reference Grid or Ground (SRG) or an Equipotential Ground. Advantages: If installed correctly, it can maintain reference ground potential much better than a star topology in a similar application across a wider range of frequencies and currents. Disadvantages: A multipoint ground system is more complicated to install and maintain over the long term, and can be more expensive to install. Disadvantages: Star topology systems can be converted to multipoint systems by installing new conductors between old existing ones. However, this should be done with care as it can inadvertently introduce noise onto signal lines during the conversion process. The noise can be diminished over time as noisy and failed components are removed and repaired, but some isolation of high current (e.g. motors and lighting) and sensitive low current (e.g. amplifiers and radios) equipment may always be necessary. Design considerations: A multipoint grounding system can solve several problems, but they must all be addressed in turn. The size of the conductors must be designed to meet the expected load in operations and in lightning protection. The amount of cross bonding, and the topology of the grids, is determined by the expected frequencies in the signals to be carried and the uses the installation will be put to. Design considerations: A ground grid is provided primarily for safety, and the size of the conductors is probably governed by local building or electrical code. One factor to keep in mind is that since the final grid will have multiple paths to ground, the final system resistance to ground will likely be lower than for a typical star ground. But this does not change the need for adequate conductor size to any given piece of equipment in case of a fault. Design considerations: Lightning protection is provided by bonding the multipoint ground grid to one or more grounding rods under or at the perimeter of the building, and then up to the lightning rods. If the building has significant metal framing elements, these should be bonded to the lightning rods and grounding rods as well. Design considerations: If the building has large motors, driving such things as fans, pumps, elevators, etc., these should also be on the multipoint grid. However, they should not be on segments of the grid that will service equipment such as audio amplifiers, small signal radio circuits, computer networks, sensitive electrical instrumentation, etc. Since building two grids into the same building may be prohibitively expensive, a good compromise is to connect the low frequency, high current equipment to the grid at or near the ground rods and entrance transformers, in such a way that their load will not flow across the segment of the grid connected to the low current equipment. Thus the system is still an electrically continuous unit, but motor noise does not impinge directly into signal paths. Design considerations: The cross bonding is governed by the frequencies and wavelengths to be protected against. A multipoint ground is at its best when it allows currents of many different frequencies to find a path to ground. If the system is expected to always have no more than main current present, the wavelengths involved at 50 or 60 Hz will cause the system design to become a star topology. But if higher frequencies are present, they need to be closer. In general, the spacing between nodes should be less than 1/8 of the shortest wavelength present. This will guarantee that current can always flow no matter which path it tries to take. If less than 1/8 wavelength node spacing cannot be achieved, then at least include as many cross connects as possible, as closely spaced as possible.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Almond pressed duck** Almond pressed duck: Almond pressed duck, also known as Mandarin pressed duck (Chinese: 窩燒鴨; pinyin: wōshāoyā; Jyutping: wo1 siu1 ngaap3 ), was a popular Cantonese dish in Chinese and Polynesian-themed restaurants in the United States in the middle of the 20th century. Crispy and boneless, it is deep-fried and served in either medium-sized pieces of uniform shape or as an entire duck. It is generally served with a sauce poured over it, either brown or sweet and sour. Crushed or powdered almonds are frequently sprinkled over it just before eating, hence one of its names. Its preparation can be a lengthy process involving a number of steps over a period of several days, making this relatively simple-appearing dish a labor-intensive process. This may explain its virtual disappearance from present-day restaurants: today only a handful of restaurants feature it on their regular menus. Almond pressed duck: A Cantonese dish, one source says that it originated in the north of China and was brought south in the 17th century at the end of the Ming dynasty by the many people who fled the new Manchu rulers. There are at least three major variations in the method of preparing it, although both the taste and the general procedures remain fairly close. In all cases, a whole duck is seasoned and either steamed or simmered until tender. Its flesh is then flavored and coated with a batter or some form of flour. It may then be steamed a second time; eventually, just before serving, the meat is deep-fried until crispy. Before this final cooking, however, some recipes call for the duck meat (with its skin discarded) to be shredded and then molded into a patty or patties; other recipes have the various pieces of the boned duck pressed firmly together within an envelope of the reserved skin; a third method is to carefully bone the entire duck while preserving its appearance. In the latter case, the whole duck is eventually deep-fried and presented to the table. Sources: The Chinese Cook Book, Wallace Yee Hong, Crown Publishes, New York, 1952—an early cookbook of mostly Cantonese recipes The Key to Chinese Cooking, Irene Kuo, Alfred A. Knopf, New York, 1980—the Chinese equivalent of Julia Child's Mastering the Art of French Cooking, by the same publisherThis article incorporates material from the Citizendium article "Almond Pressed Duck", which is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License but not under the GFDL.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**TrueAllele** TrueAllele: TrueAllele is a software program by Cybergenetics that analyzes DNA using statistical methods, a process called probabilistic genotyping. It is used in forensic identification. The program can be used in situations unsuited to traditional methods, such as when a mixture of multiple people's DNA is in a sample.Some studies, mostly conducted by Cybergenetics' Chief Scientific Officer Mark W. Perlin, have validated the program's accuracy. In one study, TrueAllele distinguished between the genetic code of first-degree relatives with "great accuracy". The President's Council of Advisors on Science and Technology has noted that many validation studies were made by people affiliated with TrueAllele and are therefore not independent, demanding more independent research. In one case, TrueAllele's results differed from the results of STRMix, another probabilistic genotyping program, leading to the judge rejecting the DNA evidence.The proprietary nature of the code has led to concerns over its reliability. Unlike some similar programs, TrueAllele is not open source, so judges and attorneys cannot check the program's code.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Pantheon (role-playing game)** Pantheon (role-playing game): Pantheon and other Roleplaying Games is a 24-page book that includes five self-contained role-playing games for 3-6 players and designed to be completed in 1–2 hours. History: Pantheon and Other Roleplaying Games (2000), by Robin Laws, was published by Hogshead Publishing as one of their New Style role-playing games. System: Pantheon and Other Roleplaying Games consisted of five separate competitive storytelling role-playing games or scenarios, all with the same "Narrative Cage Match TM" system, in which players engage in storytelling rather than playing their characters. Each player tells one sentence of a story on their turn, and needs to mention their character every turn, while the other players have the opportunity to challenge this sentence with die-rolling and bidding using tokens. When all of the players run out of tokens, they finish the story and tally points on a score sheet.Pantheon introduced a system called Narrative Cage Match (NCM) that differs from traditional role-playing game systems in that there is no referee or gamemaster. Players control a character that co-operates and competes with other characters to try to steer the course of the story so that their character finishes in a better position than all the others. Players influence the narrative outcomes of the games they are playing using a bidding mechanism that uses beads and traditional six-sided dice. Games: Pantheon includes 5 games called: Grave and Watery - Action and horror in an undersea base. Boardroom Blitz - Players battle for control of a family megacorporation. The Big Hole - Modern-day gangsters in a tale of crime, revenge and blackmail. Destroy all Buildings - Giant monsters ravage Tokyo. Pantheon - Create the universe. New Style: Pantheon was one in a series of experimental/alternative role-playing games published by Hogshead Publishing. Other games in the series included the award-nominated The Extraordinary Adventures of Baron Münchhausen, Violence, and Puppetland/Powerkill. Sources: Review at RPG.net Another Review at RPG.net New Style Games
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Magical tools in Wicca** Magical tools in Wicca: In the neopagan religion of Wicca a range of magical tools are used in ritual practice. Each of these tools has different uses and associations and are commonly used at an altar, inside a magic circle. Magical tools in Wicca: In the traditional system of Gardnerian magic, there was as an established idea of covens which were groups composed of initiated members that conducted rituals involving magical tools and secret books (Book of Shadows). These tools were predominately kept within a specific coven because they were considered sacred. These items were owned and used by individual Wiccans, but could also be used collectively by the coven. Magical tools in Wicca: This practice may derive partly from Masonic traditions (such as the use of the Square and Compasses), from which Wicca draws some material, and partly from the rituals of the Hermetic Order of the Golden Dawn. The latter made much use of material from medieval grimoires such as the Key of Solomon, which has many illustrations of magical tools and instructions for their preparation. Usage: In Wicca, magical tools are used during rituals which both honour the deities and work magic. The general idea is that the tool directs psychic energies to perform a certain action. Usage: In modern-day Wicca, there is an encouragement of solitary practice of rituals and study. Covens are still a part of Wicca and related doctrines but there is now insistence that solitary practice is permissible. The allowance of solitary practice is clearly an important factor in terms of the growth of adherents, as the requirement to join a coven would involve transaction costs of locating fellow members and/or being initiated. Usage: In Gardnerian Wicca as laid down by Gerald Gardner, someone who had been initiated in the first degree had to create (or, alternately purchase and then engrave) their own ritual tools. One of the requirements for being initiated into the second degree is that adherents had to name all of the ritual tools and explain what their purpose and associations were. Usage: Consecrating tools Before tools are used in ritual they first are consecrated. In the Gardnerian Book of Shadows, there is a section based entirely on consecrating ritual items. The Book of Shadows states items must be consecrated within a magic circle, at the centre of which lies a pentacle (or paten). Each item that is to be consecrated is placed upon the pentacle, sprinkled with salt and water and then passed through some incense. This is followed by the declaration, Aradia and Cernunnos, deign to bless and to consecrate this [tool], that it may obtain necessary virtue through thee for all acts of love and beauty. Aradia and Cernunnos, bless this instrument prepared in thine honour. The Primary tools: Various different tools are used in Wiccan ritual. Chief amongst them in importance are the pentacle (or paten), Athame (or sword), wand, and chalice, each of which represents one of the four elements of earth, air, fire and water. The Primary tools: Pentacle (or Paten) The Pentacle (or Paten) is a disc-shaped altar consecration tool with a sigil or magical symbol engraved or inscribed upon it. The most common symbol is a pentagram within a circle, specifically a pentacle, although some other symbols may be used such as the triquetra. The disc is symbolic of the element of earth. It is typically used during evocation as a symbol which blesses items, as well as magically energizing that which is placed upon it. The Primary tools: Sword and knife A sword or a ritual knife, commonly known as Athame, is often used in Wiccan ritual. In Gardnerian Wicca these are symbolic of the element of fire. Athame is elemental in nature while the sword is planetary in nature.Athame is traditionally black-handled and usually inscribed (sometimes in the Theban alphabet). It is used to direct energy for the casting of magic circles, controlling of spirits and other ritual purposes. Gerald Gardner described it as "the true Witch's weapon" in the Bricket Wood Book of Shadows, something which he has been criticized for, by Frederic Lamond believing there should be no "weapons" in Wicca. In some traditions, it is never used under any circumstances to draw blood, becoming tainted and requiring destruction if it does.The term "Athame" in its modern spelling first appears in Wicca, but it originates from words found in two historical copies of the Key of Solomon. The version currently held in the Bibliothèque de l'Arsenal, Paris, uses the term "arthame" to describe a black-handled knife. This was adopted by C.J.S. Thompson in his 1927 book The Mysteries and Secrets of Magic and by Grillot de Givry in his 1931 book Witchcraft, Magic and Alchemy. The historian Ronald Hutton theorized that Gardner got it either directly or indirectly from one of these sources, although with a modified spelling. The Primary tools: Wand In Gardnerian Wicca, the wand is symbolic of the element of air, though in some traditions it instead symbolizes fire. It can be made from any material, including wood, metal and rock, and Wiccan wands are sometimes set with gemstones or crystals.In his Book of Shadows, Gerald Gardner stated the wand is "used to summon certain spirits with whom it would not be meet to use the athame". Frederic Lamond states this referred to elemental spirits, who were traditionally believed to be scared of iron and steel. The Primary tools: Chalice The chalice, or goblet, is symbolic of the element of water. Many Wiccans do not consider it to be a tool, but instead to be a symbol of the Goddess, particularly her womb. The chalice bears many similarities with the Holy Grail, except for its symbolism used in witchcraft. Rather than being the blood of Christ, it is symbolic of the Goddess' womb. The chalice is traditionally used to hold wine. Other tools: Boline The boline is a knife, traditionally with a curved blade like that of a crescent moon. It is used for harvesting and cutting herbs. A Kirfane which is a white handled knife is used for inscribing candles with symbols or sigils, or cutting ritual cords and often mistaken for the Boline. Unlike the Athame, the Kirfane is used in the physical process of magical works such as ritual cutting; the Kirfane serves for the physical plane what Athame serves for work in the spiritual/astral planes. Other tools: Censer and incense The censer is used to dispense incense. Scourge The scourge is a type of religious whip. It is used in Gardnerian Wicca to flagellate members of the coven, primarily in initiation rites. Frederic Lamond said that whilst Gardner never told his Bricket Wood coven which element this was associated with, he believed that as an "instrument for exercising power over others" then it should be Fire. The scourge stands in contrast to "the Kiss" in Gardnerian and other forms of Wicca. Being representative of the "gifts of the Goddess," the scourge standing for sacrifice and suffering one is willing to endure to learn, the kiss being the blessings of abundance in all life's aspects. Other tools: Cingulum In the various forms of British Traditional Wicca, cords, known as cingulum, or singulum (which literally translates as "girdle" or "belt"), are worn about the waist by adherents. These are often given to a Wiccan upon their initiation, and worn at each subsequent ritual. Traditionally they are nine feet in length (nine being three times three, the magical number), and are used to measure the circumference of the magic circle so that it can be set up correctly.In many traditions of Wicca, the colour of a person's cingulum indicates what rank of initiate they are; in several Australian covens for instance, green denotes a novice, white denotes an initiate of the first degree, blue for the second and a plaited red, white and blue for the third, with the High Priest wearing a gold cingulum (symbolising the sun), and the High Priestess wearing silver (symbolising the moon).Wiccan High Priest Raymond Buckland stated the cingulum should not be worn, but kept especially for spellcraft. Other tools: Besom The besom or broom, is often associated with witches and witchcraft. The stories of witches flying on brooms originated from the besom. In Wicca, it is used in handfasting ceremonies wherein a couple jumps over it. The besom is also used in seasonal fertility dances as a representation of a phallus. Other tools: Cauldron A cauldron is often associated with witches and witchcraft in western culture. In Wicca, it is sometimes used to represent the womb of the Goddess, like the chalice. It is often used for making brews (such as oils), incense-burning, and can be used to hold large, wide pillar candles depending on how small it is. A fire is often lit within the vessel and the flames are leaped over as a simple fertility rite, or at the end of a handfasting. If filled with water, a cauldron can be used for scrying. It plays a large role in Celtic magic in a similar fashion to that of Cerridwen's cauldron. Other tools: Spear In the tradition of Seax-Wica, the spear is used as a ritual tool symbolizing the god Woden, who, in Seax-Wicca tradition, is viewed as an emanation of God in place of the Horned God. According to Norse mythology, the god Odin who is the Norse equivalent to the Anglo-Saxon Woden carried the spear Gungnir. For the purpose of comparison it is notable Seax-Wica is not a part of traditional initiatory Wicca, nor is it substantially linked to the Gardnerian or Alexandrian traditions. Ritual: There are elaborate rituals prescribed for the creation and consecration of magical tools. These often include the ritual passing of the tool through representations of the four elements. Some tools are ascribed correspondences to a particular element, one commonly cited correspondence being: These four tools may be seen in the occult tarot deck designed by Golden Dawn members A.E.Waite and Pamela Colman Smith, most obviously in the card known as The Magician. Some practitioners distinguish high magic and low magic. The former includes ceremonial magic and theurgy, and may be more commonly practiced in Alexandrian covens. The latter is more typical of the hedgewitch, who would be more likely to use everyday tools and utensils, rather than fabricating specially made magical tools.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Water splitting** Water splitting: Water splitting is the chemical reaction in which water is broken down into oxygen and hydrogen: 2 H2O → 2 H2 + O2Efficient and economical water splitting would be a technological breakthrough that could underpin a hydrogen economy, based on green hydrogen. A version of water splitting occurs in photosynthesis, but hydrogen is not produced. The reverse of water splitting is the basis of the hydrogen fuel cell. Electrolysis: Electrolysis of water is the decomposition of water (H2O) into oxygen (O2) and hydrogen (H2) due to an electric current being passed through the water. Vion, U.S. Patent 28,793, "Improved method of using atmospheric electricity", June 1860.In power-to-gas production schemes, the excess power or off peak power created by wind generators or solar arrays is used for load balancing of the energy grid by storing and later injecting the hydrogen into the natural gas grid. Electrolysis: Production of hydrogen from water is energy intensive. Potential electrical energy supplies include hydropower, wind turbines, or photovoltaic cells. Usually, the electricity consumed is more valuable than the hydrogen produced so this method has not been widely used. In contrast with low-temperature electrolysis, high-temperature electrolysis (HTE) of water converts more of the initial heat energy into chemical energy (hydrogen), potentially doubling efficiency to about 50%. Because some of the energy in HTE is supplied in the form of heat, less of the energy must be converted twice (from heat to electricity, and then to chemical form), and so the process is more efficient.Currently energy efficiency for electrolytic water splitting is 60% - 70%. Water splitting in photosynthesis: A version of water splitting occurs in photosynthesis, but the electrons are shunted, not to protons, but to the electron transport chain in photosystem II. The electrons are used to convert carbon dioxide into sugars. Water splitting in photosynthesis: When photosystem I gets photo-excited, electron transfer reactions get initiated, which results in reduction of a series of electron acceptors, eventually reducing NADP+ to NADPH and PS I is oxidized. The oxidized photosystem I captures electrons from photosystem II through a series of steps involving agents like plastoquinone, cytochromes and plastocyanine. The photosystem II then brings about water oxidation resulting in evolution of oxygen, the reaction being catalyzed by CaMn4O5 clusters embedded in complex protein environment; the complex is known as oxygen evolving complex (OEC). Water splitting in photosynthesis: In biological hydrogen production, the electrons produced by the photosystem are shunted not to a chemical synthesis apparatus but to hydrogenases, resulting in formation of H2. This biohydrogen is produced in a bioreactor. Photoelectrochemical water splitting: Using electricity produced by photovoltaic systems potentially offers the cleanest way to produce hydrogen, other than nuclear, wind, geothermal, and hydroelectric. Again, water is broken down into hydrogen and oxygen by electrolysis, but the electrical energy is obtained by a photoelectrochemical cell (PEC) process. The system is also named artificial photosynthesis. Photocatalytic water splitting: The conversion of solar energy to hydrogen by means of water splitting process is a way to achieve clean and renewable energy. This process can be more efficient if it is assisted by photocatalysts suspended directly in water rather than a photovoltaic or an electrolytic system, so that the reaction takes place in one step. Radiolysis: Nuclear radiation routinely breaks water bonds, in the Mponeng gold mine, South Africa, researchers found in a naturally high radiation zone, a community dominated by a new phylotype of Desulfotomaculum, feeding on primarily radiolytically produced H2. Spent nuclear fuel is also being investigated as a potential source of hydrogen. Nanogalvanic aluminum alloy powder: An aluminum alloy powder invented by the U.S. Army Research Laboratory in 2017 was shown to be capable of producing hydrogen gas upon contact with water or any liquid containing water due to its unique nanoscale galvanic microstructure. It reportedly generates hydrogen at 100 percent of the theoretical yield without the need for any catalysts, chemicals, or externally supplied power. Thermal decomposition of water: In thermolysis, water molecules split into their atomic components hydrogen and oxygen. For example, at 2200 °C about three percent of all H2O are dissociated into various combinations of hydrogen and oxygen atoms, mostly H, H2, O, O2, and OH. Other reaction products like H2O2 or HO2 remain minor. At the very high temperature of 3000 °C more than half of the water molecules are decomposed, but at ambient temperatures only one molecule in 100 trillion dissociates by the effect of heat. The high temperatures and material constraints have limited the applications of this approach. Thermal decomposition of water: Nuclear-thermal One side benefit of a nuclear reactor that produces both electricity and hydrogen is that it can shift production between the two. For instance, the plant might produce electricity during the day and hydrogen at night, matching its electrical generation profile to the daily variation in demand. If the hydrogen can be produced economically, this scheme would compete favorably with existing grid energy storage schemes. What is more, there is sufficient hydrogen demand in the United States that all daily peak generation could be handled by such plants.The hybrid thermoelectric Copper-chlorine cycle is a cogeneration system using the waste heat from nuclear reactors, specifically the CANDU supercritical water reactor. Thermal decomposition of water: Solar-thermal The high temperatures necessary to split water can be achieved through the use of concentrating solar power. Hydrosol-2 is a 100-kilowatt pilot plant at the Plataforma Solar de Almería in Spain which uses sunlight to obtain the required 800 to 1,200 °C to split water. Hydrosol II has been in operation since 2008. The design of this 100-kilowatt pilot plant is based on a modular concept. As a result, it may be possible that this technology could be readily scaled up to megawatt range by multiplying the available reactor units and by connecting the plant to heliostat fields (fields of sun-tracking mirrors) of a suitable size.Material constraints due to the required high temperatures are reduced by the design of a membrane reactor with simultaneous extraction of hydrogen and oxygen that exploits a defined thermal gradient and the fast diffusion of hydrogen. With concentrated sunlight as heat source and only water in the reaction chamber, the produced gases are very clean with the only possible contaminant being water. A "Solar Water Cracker" with a concentrator of about 100 m² can produce almost one kilogram of hydrogen per sunshine hour. Research: Research is being conducted over photocatalysis, the acceleration of a photoreaction in the presence of a catalyst. Its comprehension has been made possible ever since the discovery of water electrolysis by means of the titanium dioxide. Artificial photosynthesis is a research field that attempts to replicate the natural process of photosynthesis, converting sunlight, water and carbon dioxide into carbohydrates and oxygen. Recently, this has been successful in splitting water into hydrogen and oxygen using an artificial compound called Nafion.High-temperature electrolysis (also HTE or steam electrolysis) is a method currently being investigated for the production of hydrogen from water with oxygen as a by-product. Other research includes thermolysis on defective carbon substrates, thus making hydrogen production possible at temperatures just under 1000 °C.The iron oxide cycle is a series of thermochemical processes used to produce hydrogen. The iron oxide cycle consists of two chemical reactions whose net reactant is water and whose net products are hydrogen and oxygen. All other chemicals are recycled. The iron oxide process requires an efficient source of heat. Research: The sulfur-iodine cycle (S-I cycle) is a series of thermochemical processes used to produce hydrogen. The S-I cycle consists of three chemical reactions whose net reactant is water and whose net products are hydrogen and oxygen. All other chemicals are recycled. The S-I process requires an efficient source of heat. Research: More than 352 thermochemical cycles have been described for water splitting or thermolysis., These cycles promise to produce hydrogen oxygen from water and heat without using electricity. Since all the input energy for such processes is heat, they can be more efficient than high-temperature electrolysis. This is because the efficiency of electricity production is inherently limited. Thermochemical production of hydrogen using chemical energy from coal or natural gas is generally not considered, because the direct chemical path is more efficient. Research: For all the thermochemical processes, the summary reaction is that of the decomposition of water: Heat 2H2+O2 All other reagents are recycled. None of the thermochemical hydrogen production processes have been demonstrated at production levels, although several have been demonstrated in laboratories. There is also research into the viability of nanoparticles and catalysts to lower the temperature at which water splits.Recently Metal-Organic Framework (MOF)-based materials have been shown to be a highly promising candidate for water splitting with cheap, first row transition metals.Research is concentrated on the following cycles:
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Octol** Octol: Octol is a melt-castable, high explosive mixture consisting of HMX and TNT in different weight proportions. Composition: Two formulations are commonly used: 70% HMX & 30% TNT 75% HMX & 25% TNTGiven that HMX has a much higher detonation velocity than TNT (over 2,000 metres per second faster) and forms the main part of this explosive blend, the brisance characteristics of Octol can be inferred. Applications: The applications of Octol are generally military; e.g., shaped charges and warheads used in guided missiles and submunitions. Octol is somewhat more expensive than RDX-based explosives, such as Composition B and Cyclotol. The advantage of Octol is that it significantly reduces the size and weight of the explosive charge required. These are important considerations where smart weapons such as guided missiles are concerned. A light (but effective) warhead means a superior power to weight ratio. This in turn results in a higher velocity missile with a longer range and shorter flight time. As a result, the target has less opportunity to recognise and evade the attack. Alternative names: Octol is also referred to as Oktol, particularly in Eastern Europe.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Radical 193** Radical 193: Radical 193 or radical cauldron (鬲部) meaning "cauldron" or "tripod" is one of the 8 Kangxi radicals (214 radicals in total) composed of 10 strokes. In the Kangxi Dictionary, there are 73 characters (out of 49,030) to be found under this radical. 鬲 is also the 189th indexing component in the Table of Indexing Chinese Character Components predominantly adopted by Simplified Chinese dictionaries published in mainland China. Literature: Fazzioli, Edoardo (1987). Chinese calligraphy : from pictograph to ideogram : the history of 214 essential Chinese/Japanese characters. calligraphy by Rebecca Hon Ko. New York: Abbeville Press. ISBN 0-89659-774-1.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**CURSOR** CURSOR: CURSOR: Programs for PET Computers was an early computer-based "magazine" that was distributed on cassette from 1978 and into the early 1980s. Each issue, consisting of the cassette itself and a short newsletter including a table of contents, contained programs, utilities, and games. Produced for users of the Commodore PET, and available by subscription only, CURSOR was a forerunner of the later disk magazines ("diskmags") that came about as floppy disk drives became common, and eventually ubiquitous, in home and personal computing during the 1980s. CURSOR: Ron Jeffries and Glen Fisher, of the software company The Code Works of Goleta, California, was CURSOR's publisher and editor, respectively. CURSOR: Each issue came with five or six programs, preceded by a "cover page" program (which was initially a simple animation, but in later issues became more sophisticated, allowing the user to select a program to be loaded from the tape). Among programs circulated by CURSOR included rudimentary animations, such as "Dromeda", which was an adaptation of the film The Andromeda Strain; games, such as a version of the Star Trek text-based campaign game, "Twonky" (a version of Hunt the Wumpus), and "Ratrun", an early dungeon crawl-style game (only with the player as a mouse searching for a piece of cheese in a 3D maze); and simple utility programs such as spreadsheets and code-tweakers (including a utility that allowed the PET to display lower-case lettering). Initially, programs (specifically games and animations) distributed on Cursor did not have sound, as the PET did not initially have this capability. As external audio devices such as Soundware became available for PET models, sound-capable programs began to appear in Cursor; these programs were identified by an exclamation point (!) in the title. For example: "Aliens!" or "Dromeda!". CURSOR: CURSOR was discontinued in the early 1980s when the PET was superseded by other platforms. In total, 30 issues of the magazine were published. Issue #30 had the date May, 1982.In 1981, McGraw-Hill published the book PET Fun and Games: Selected CURSOR Programs by Jeffries and Fisher (ISBN 0-931988-70-5), which included the Commodore Basic source code for 31 of the game programs previously released on CURSOR cassettes.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Marine energy** Marine energy: Marine energy or marine power (also sometimes referred to as ocean energy, ocean power, or marine and hydrokinetic energy) refers to the energy carried by ocean waves, tides, salinity, and ocean temperature differences. The movement of water in the world's oceans creates a vast store of kinetic energy, or energy in motion. Some of this energy can be harnessed to generate electricity to power homes, transport and industries. Marine energy: The term marine energy encompasses both wave power i.e. power from surface waves, and tidal power i.e. obtained from the kinetic energy of large bodies of moving water. Offshore wind power is not a form of marine energy, as wind power is derived from the wind, even if the wind turbines are placed over water. The oceans have a tremendous amount of energy and are close to many if not most concentrated populations. Ocean energy has the potential of providing a substantial amount of new renewable energy around the world. Global potential: There is the potential to develop 20,000–80,000 terawatt-hours per year (TWh/y) of electricity generated by changes in ocean temperatures, salt content, movements of tides, currents, waves and swells Indonesia, as an archipelagic country that is three quarters ocean, has 49 GW recognized potential ocean energy and has 727 GW theoretical potential ocean energy. Forms of ocean energy: The oceans represent a vast and largely untapped source of energy in the form of surface waves, fluid flow, salinity gradients, and thermal differences. Marine and Hydrokinetic (MHK) or marine energy development in U.S. and international waters includes projects using the following devices: Wave power converters in open coastal areas with significant waves; Tidal turbines placed in coastal and estuarine areas; In-stream turbines in fast-moving rivers; Ocean current turbines in areas of strong marine currents; Ocean thermal energy converters in deep tropical waters. Forms of ocean energy: Marine current power Strong ocean currents are generated from a combination of temperature, wind, salinity, bathymetry, and the rotation of the Earth. The Sun acts as the primary driving force, causing winds and temperature differences. Because there are only small fluctuations in current speed and stream location with no changes in direction, ocean currents may be suitable locations for deploying energy extraction devices such as turbines. Forms of ocean energy: Ocean currents are instrumental in determining the climate in many regions around the world. While little is known about the effects of removing ocean current energy, the impacts of removing current energy on the farfield environment may be a significant environmental concern. The typical turbine issues with blade strike, entanglement of marine organisms, and acoustic effects still exists; however, these may be magnified due to the presence of more diverse populations of marine organisms using ocean currents for migration purposes. Locations can be further offshore and therefore require longer power cables that could affect the marine environment with electromagnetic output. Forms of ocean energy: Osmotic power At the mouth of rivers where fresh water mixes with salt water, energy associated with the salinity gradient can be harnessed using pressure-retarded reverse osmosis process and associated conversion technologies. Another system is based on using freshwater upwelling through a turbine immersed in seawater, and one involving electrochemical reactions is also in development. Forms of ocean energy: Significant research took place from 1975 to 1985 and gave various results regarding the economy of PRO and RED plants. It is important to note that small-scale investigations into salinity power production take place in other countries like Japan, Israel, and the United States. In Europe the research is concentrated in Norway and the Netherlands, in both places small pilots are tested. Salinity gradient energy is the energy available from the difference in salt concentration between freshwater with saltwater. This energy source is not easy to understand, as it is not directly occurring in nature in the form of heat, waterfalls, wind, waves, or radiation. Forms of ocean energy: Ocean thermal energy Water typically varies in temperature from the surface warmed by direct sunlight to greater depths where sunlight cannot penetrate. This differential is greatest in tropical waters, making this technology most applicable in water locations. A fluid is often vaporized to drive a turbine that may generate electricity or produce desalinized water. Systems may be either open-cycle, closed-cycle, or hybrid. Forms of ocean energy: Tidal power The energy from moving masses of water – a popular form of hydroelectric power generation. Tidal power generation comprises three main forms, namely tidal stream power, tidal barrage power, and dynamic tidal power. Forms of ocean energy: Wave power Solar energy from the Sun creates temperature differentials that result in wind. The interaction between wind and the surface of water creates waves, which are larger when there is a greater distance for them to build up. Wave energy potential is greatest between 30° and 60° latitude in both hemispheres on the west coast because of the global direction of wind. When evaluating wave energy as a technology type, it is important to distinguish between the four most common approaches: point absorber buoys, surface attenuators, oscillating water columns, and overtopping devices.The wave energy sector is reaching a significant milestone in the development of the industry, with positive steps towards commercial viability being taken. The more advanced device developers are now progressing beyond single unit demonstration devices and are proceeding to array development and multi-megawatt projects. The backing of major utility companies is now manifesting itself through partnerships within the development process, unlocking further investment and, in some cases, international co-operation. Forms of ocean energy: At a simplified level, wave energy technology can be located near-shore and offshore. Wave energy converters can also be designed for operation in specific water depth conditions: deep water, intermediate water or shallow water. The fundamental device design will be dependent on the location of the device and the intended resource characteristics. Marine energy development: The UK is involved in wave and tidal (marine) power generation. The world's first marine energy test facility was established in 2003 to kick start the development of the marine energy industry in the UK. Based in Orkney, Scotland, the European Marine Energy Centre (EMEC) has supported the deployment of more wave and tidal energy devices than at any other single site in the world. The centre was established with around £36 million of funding from the Scottish Government, Highlands and Islands Enterprise, the Carbon Trust, UK Government, Scottish Enterprise, the European Union and Orkney Islands Council, and is the only accredited wave and tidal test centre for marine renewable energy in the world, suitable for testing a number of full-scale devices simultaneously in some of the harshest weather conditions while producing electricity to the national grid. Marine energy development: Clients that have tested at the centre include Aquamarine Power, AW Energy, Pelamis Wave Power, Seatricity, ScottishPower Renewables and Wello on the wave site, and Alstom (formerly Tidal Generation Ltd), ANDRITZ HYDRO Hammerfest, Kawasaki Heavy Industries, Magallanes, Nautricity, Open Hydro, Scotrenewables Tidal Power, and Voith on the tidal site. Marine energy development: Beyond device testing, EMEC also provides a wide range of consultancy and research services, and is working closely with Marine Scotland to streamline the consenting process for marine energy developers. EMEC is at the forefront in the development of international standards for marine energy, and is forging alliances with other countries, exporting its knowledge around the world to stimulate the development of a global marine renewables industry. Environmental effects: Common environmental concerns associated with marine energy developments include: the risk of marine mammals and fish being struck by tidal turbine blades the effects of EMF and underwater noise emitted from operating marine energy devices the physical presence of marine energy projects and their potential to alter the behavior of marine mammals, fish, and seabirds with attraction or avoidance the potential effect on nearfield and farfield marine environment and processes such as sediment transport and water qualityThe Tethys database provides access to scientific literature and general information on the potential environmental effects of marine energy.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Outer plexiform layer** Outer plexiform layer: The outer plexiform layer (external plexiform layer) is a layer of neuronal synapses in the retina of the eye. It consists of a dense network of synapses between dendrites of horizontal cells from the inner nuclear layer, and photoreceptor cell inner segments from the outer nuclear layer. It is much thinner than the inner plexiform layer, where amacrine cells synapse with retinal ganglion cells.The synapses in the outer plexiform layer are between the rod cell endings or cone cell branched foot plates and horizontal cells. Unlike in most systems, rod and cone cells release neurotransmitters when not receiving a light signal.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Direct cable connection** Direct cable connection: Direct Cable Connection (DCC) is a feature of Microsoft Windows that allows a computer to transfer and share files (or connected printers) with another computer, via a connection using either the serial port, parallel port or the infrared port of each computer. It is well-suited for computers that do not have an ethernet adapter installed, although DCC in Windows XP can be configured to use one (with a proper crossover cable if no Ethernet hub is used) if available. Connection types: Serial port If using the serial ports of the computer, a null modem cable (or a null modem adapter connected to a standard serial cable) must be used to connect each of the two computers to communicate properly. Such connection uses PPP protocol. Parallel port If the parallel ports are used, Windows supports standard or basic 4-bit cable (commonly known as LapLink cable), Enhanced Capabilities Port (ECP) cable, or Universal Cable Module (UCM) cable (which was known as DirectParallel cable by Parallel Technologies). IR Infrared communication ports, like the ones found on laptop computers (such as IrDA), can also be used. Connection types: USB Connecting any two computers using USB requires a special proprietary bridge cable. A directly connected pin-to-pin USB type A cable does not work, as USB does not support such a type of communication. In fact, attempting to do so may even damage the connecting computers, as it will effectively short the two computers' power supplies together by connecting their 5V and GND lines. This can possibly destroy one or both machines and cause a fire hazard since the two machines may not have exactly the same USB source voltage. Therefore, Direct Cable Connection over USB is not possible; a USB link cable must be used, as seen in the Microsoft knowledge base article 814982. However, with a USB link cable, a program which supports data transfer using that cable must be used. Typically, such a program is supplied with the USB link cable. The DCC wizard or Windows Explorer cannot be used to transfer files over a USB link cable. Connection types: Newer hardware technology with identical functionality There are at least 2 known famous USB-crossover cables capable of bidirectional data-transfer between computers similar to RJ45/Ethernet cables: ProlificUSA.com's TE-C0372 High Speed USB 2.0 Host to Host Bridge Cable (PL25A1 Chipset) and ProlificUSA.com's TE-C0363 Superspeed USB 3.0 Host to Host Bridge Cable (PL27A1 Chipset), and drivers for these seem to have been included in newer versions of the Linux kernel. Windows Vista changes: Windows Vista drops support for the Direct cable connection feature as ethernet, Wi-Fi and Bluetooth have become ubiquitous on current generation computers. To transfer files and settings, Windows Vista includes Windows Easy Transfer, which uses a proprietary USB-to-USB bridge cable known as the Easy Transfer Cable.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Acetylcarnitine** Acetylcarnitine: Acetyl-L-carnitine, ALCAR or ALC, is an acetylated form of L-carnitine. It is naturally produced by the human body, and it is available as a dietary supplement. Acetylcarnitine is broken down in the blood by plasma esterases to carnitine which is used by the body to transport fatty acids into the mitochondria for breakdown. Biochemical production and action: Carnitine is both a nutrient and made by the body as needed; it serves as a substrate for important reactions in which it accepts and gives up an acyl group. Acetylcarnitine is the most abundant naturally occurring derivative and is formed in the reaction: acetyl-CoA + carnitine ⇌ CoA + acetylcarnitinewhere the acetyl group displaces the hydrogen atom in the central hydroxyl group of carnitine. Coenzyme A (CoA) plays a key role in the Krebs cycle in mitochondria, which is essential for the production of ATP, which powers many reactions in cells; acetyl-CoA is the primary substrate for the Krebs cycle, once it is de-acetylated, it must be re-charged with an acetyl-group in order for the Krebs cycle to keep working.Most cell types appear to have transporters to import carnitine and export acyl-carnitines, which seems to be a mechanism to dispose of longer-chain moieties; however many cell types can also import ALCAR.Within cells, carnitine plays a key role in importing acyl-CoA into mitochondria; the acyl-group of the acyl-CoA is transferred to carnitine, and the acyl-carnitine is imported through both mitochondrial membranes before being transferred to a CoA molecule, which is then beta oxidized to acetyl-CoA. A separate set of enzymes and transporters also plays a buffering role by eliminating acetyl-CoA from inside mitochondria created by the pyruvate dehydrogenase complex that is in excess of its utilization by the Krebs cycle; carnitine accepts the acetyl moiety and becomes ALCAR, which is then transported out of the mitochondria and into the cytosol, leaving free CoA inside the mitochondria ready to accept new import of fatty acid chains. ALCAR in the cytosol can also form a pool of acetyl-groups for CoA, should the cell need it.Excess acetyl-CoA causes more carbohydrates to be used for energy at the expense of fatty acids. This occurs by different mechanisms inside and outside the mitochondria. ALCAR transport decreases acetyl-CoA inside the mitochondria, but increases it outside. Health effects: Carnitine and ALCAR supplements carry warnings of a risk that they promote seizures in people with epilepsy, but a 2016 review found this risk to be based only on animal trials. Research: Reviews Peripheral neuropathy: Meta-analyses from 2015 and 2017 both conclude that the current evidence suggests ALC reduces pain from peripheral neuropathy with few adverse effects. The 2017 review also suggested ALC improved electromyographic parameters. Both called for more randomized controlled trials. An updated Cochrane review in 2019 of four studies with 907 participants was very uncertain as to if ALC caused a pain reduction after 6 to 12 months of treatment. Research: Chemotherapy-induced peripheral neuropathy (CIPN): A review of two studies concluded that ALC may be a treatment option for paclitaxel- and cisplatin-induced CIPN, while a clinical trial showed it did not prevent CIPN and appeared to worsen the conditions in taxane therapy. Male infertility: Scientific reviews from 2016 and 2014 showed mixed results, with some studies showing a positive relationship between ALC and sperm motility, and others showing no relationship. Dementia: A 2003 Cochrane review sought to determine the safety and efficacy of ALCAR in dementia but the reviewers found only clinical trials studies on Alzheimer's disease; the review found that the pharmacology of ALCAR was poorly understood and that based on the lack of efficacy, ALCAR was unlikely to be an important treatment for AD. Research: Depression: One 2014 review assessed the use of ALCAR in fourteen clinical trials for various conditions with depressive symptoms; the trials were small (ranging from 20 to 193 subjects) and their design was so different that results could not be generalized; most studies showed positive results and a lack of adverse effects. The mechanism of action by which ALCAR could treat depression is not known. A meta-analysis from 2014 concluded that ALCAR could only be recommended for the treatment of persistent depressive disorder if publication bias was deemed improbable. A 2018 systematic review and meta-analysis of 12 randomized controlled trials found "supplementation significantly decreases depressive symptoms compared with placebo/no intervention, while offering a comparable effect with that of established antidepressant agents with fewer adverse effects." The review also indicates that "the effect of ALC in younger subjects was not more effective than placebo in improving these symptoms." indicating a need for more research explaining the age/effect relation. Research: Fragile X syndrome: A 2015 Cochrane review of ALCAR in fragile X syndrome found only two placebo-controlled trials, each of low quality, and concluded that ALCAR is unlikely to improve intellectual functioning or hyperactive behavior in children with this condition. Hepatic encephalopathy: ALCAR has been studied in hepatic encephalopathy, a complication of cirrhosis involving neuropsychiatric impairment; ALCAR improves blood ammonia levels and generates a modest improvement in psychometric scores but does not resolve the condition – it may play a minor role in managing the condition. Studies In a small clinical study, when ALCAR was administered intravenously and insulin levels were held steady and a meal low in carnitine but high in carbohydrates was taken by healthy young men, ALCAR appeared to decrease glucose consumption in favor of fat oxidation. Mitochondrial decay and oxidative damage to RNA/DNA increases with age in the rat hippocampus, a region of the brain associated with memory. Memory performance declines with age. These increases in decay and damage, and memory loss itself, can be partially reversed in old rats by feeding acetyl-L-carnitine. Other reviews: Jane Higdon, "L-Carnitine", Micronutrient Information Center, Linus Pauling Institute, Oregon State University Carnitine (L-carnitine), University of Maryland Medical Center
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Nasal glioma** Nasal glioma: Nasal glioma is a rare benign congenital lesion, usually a firm, incompressible, reddish-blue to purple lesion occurring on the nasal bridge or midline near the root.: 622
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Spear carrier** Spear carrier: A spear carrier is a minor actor in a play or, by extension, a person whose actions are of little significance. Overview: In the world of opera, the term is sometimes used literally: When a male chorus is required, as in Aida, for example, the onstage "army", armed with spears or swords, usually consists of several singers and as many who remain silent, filling out the group. The silent ones are known as spear carriers, to differentiate them from the male chorus members. Overview: The Ancient Greek term for spear carrier (δορυφόρος doryphóros, from δόρυ, "spear," and φέρω, "to carry") originally meant a soldier armed with a spear acting as a bodyguard or ceremonial guard to noblemen. The modern meaning has its roots in classical Greek tragedy; as plays such as Antigone and Oedipus Rex concerned the tragic fate of nobles, several nondescript soldiers or guards were required to appear in the background, and the term was used to describe the guards who just escorted the main characters. The term has survived verbatim but evolved in meaning from its metaphorical use, and today carries the general meaning of satellite in Modern Greek.The 1968 Nebula Award-winning novel Rite of Passage, by Alexei Panshin, mentions the protagonist's observations of the role of spear carriers in real life: A spear carrier is somebody who stands in the hall when Caesar passes, comes to attention and thumps his spear. A spear carrier is the anonymous character cut down by the hero as he advances to save the menaced heroine. A spear carrier is a character put in a story to be used like a piece of disposable tissue. In a story, spear carriers never suddenly assert themselves by throwing their spears aside and saying, "I resign. I don't want to be used." They are there to be used, either for atmosphere or as minor obstacles in the path of the hero. The trouble is that each of us is his own hero, existing in a world of spear carriers. We take no joy in being used and discarded. I was finding then, that wet, chilly, unhappy night, that I took no joy in seeing other people used and discarded.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Granuloma** Granuloma: A granuloma is an aggregation of macrophages that forms in response to chronic inflammation. This occurs when the immune system attempts to isolate foreign substances that it is otherwise unable to eliminate. Such substances include infectious organisms including bacteria and fungi, as well as other materials such as foreign objects, keratin, and suture fragments. Definition: In pathology, a granuloma is an organized collection of macrophages.In medical practice, doctors occasionally use the term granuloma in its more literal meaning: "a small nodule". Since a small nodule can represent any tissue from a harmless nevus to a malignant tumor, this use of the term is not very specific. Examples of this use of the term granuloma are the lesions known as vocal cord granuloma (known as contact granuloma), pyogenic granuloma, and intubation granuloma, all of which are examples of granulation tissue, not granulomas. "Pulmonary hyalinizing granuloma" is a lesion characterized by keloid-like fibrosis in the lung and is not granulomatous. Similarly, radiologists often use the term granuloma when they see a calcified nodule on X-ray or CT scan of the chest. They make this assumption since granulomas usually contain calcium, although the cells that form a granuloma are too tiny to be seen by a radiologist. The most accurate use of the term granuloma requires a pathologist to examine surgically removed and specially colored (stained) tissue under a microscope. Definition: Histiocytes (specifically macrophages) are the cells that define a granuloma. They often fuse to form multinucleated giant cells (Langhans giant cell). The macrophages in granulomas are often referred to as "epithelioid". This term refers to the vague resemblance of these macrophages to epithelial cells. Epithelioid macrophages differ from ordinary macrophages in that they have elongated nuclei that often resemble the sole of a slipper or shoe. They also have larger nuclei than ordinary macrophages, and their cytoplasm is typically pinker when stained with eosin. These changes are thought to be a consequence of "activation" of the macrophage by the offending antigen.The other key term in the above definition is the word "organized" which refers to a tight, ball-like formation. The macrophages in these formations are typically so tightly clustered that the borders of individual cells are difficult to appreciate. Loosely dispersed macrophages are not considered to be granulomas. Definition: All granulomas, regardless of cause, may contain additional cells and matrix. These include lymphocytes, neutrophils, eosinophils, multinucleated giant cells, fibroblasts, and collagen (fibrosis). The additional cells are sometimes a clue to the cause of the granuloma. For example, granulomas with numerous eosinophils may be a clue to coccidioidomycosis or allergic bronchopulmonary fungal disease, and granulomas with numerous neutrophils suggest blastomycosis, granulomatosis with polyangiitis, aspiration pneumonia, or cat-scratch disease. Definition: In terms of the underlying cause, the difference between granulomas and other types of inflammation is that granulomas form in response to antigens that are resistant to "first-responder" inflammatory cells such as neutrophils and eosinophils. The antigen causing the formation of a granuloma is most often an infectious pathogen or a substance foreign to the body, but sometimes the offending antigen is unknown (as in sarcoidosis).Granulomas are seen in a wide variety of diseases, both infectious and noninfectious. Infections characterized by granulomas include tuberculosis, leprosy, histoplasmosis, cryptococcosis, coccidioidomycosis, blastomycosis, and cat-scratch disease. Examples of noninfectious granulomatous diseases are sarcoidosis, Crohn's disease, berylliosis, granulomatosis with polyangiitis, eosinophilic granulomatosis with polyangiitis, pulmonary rheumatoid nodules, and aspiration of food and other particulate material into the lung.An important feature of granulomas is whether or not they contain necrosis, which refers to dead cells that, under the microscope, appear as a mass of formless debris with no nuclei present. A related term, caseation (literally: turning to cheese) refers to a form of necrosis that, to the unaided eye, appears cheese-like ("caseous"), and is typically a feature of the granulomas of tuberculosis. The identification of necrosis in granulomas is important because granulomas with necrosis tend to have infectious causes. Several exceptions to this general rule exist, but it nevertheless remains useful in day-to-day diagnostic pathology. Diseases with granulomas: Tuberculosis Mycobacterium tuberculosis can cause the granulomas of tuberculosis which tend to contain necrosis ("caseating tubercules"), but non-necrotizing granulomas may also be present. Multinucleated giant cells with nuclei arranged like a horseshoe (Langhans giant cell) and foreign body giant cells are often present, but are not specific for tuberculosis. A definitive diagnosis of tuberculosis requires identification of the causative organism by microbiologic cultures. Diseases with granulomas: Leprosy In leprosy, granulomas are found in the skin and tend to involve nerves. The appearance of the granulomas differs according to the precise type of leprosy. Aquarium granuloma The other Mycobacterium species, Mycobacterium marinum can cause a rare infection known as "aquarium granuloma." Schistosomiasis Some schistosome ova that are laid in intestinal and urinary venules backwash into the liver via the portal vein, causing granuloma formation in the liver. Histoplasmosis Granulomas are seen in most forms of histoplasmosis (acute histoplasmosis, histoplasmoma, chronic histoplasmosis). Histoplasma organisms can sometimes be demonstrated within the granulomas by biopsy or microbiological cultures. Cryptococcosis When Cryptococcus infection occurs in persons whose immune systems are intact, granulomatous inflammation is typically encountered. The granulomas can be necrotizing or non-necrotizing. Using a microscope and appropriate stains, organisms can be seen within the granulomas. Diseases with granulomas: Cat-scratch disease Cat-scratch disease is an infection caused by the bacterial organism Bartonella henselae, typically acquired by a scratch from a kitten infected with the organism. The granulomas in this disease are found in the lymph nodes draining the site of the scratch. They are characteristically "suppurative", i.e., pus-forming, containing large numbers of neutrophils. Organisms are usually difficult to find within the granulomas using methods routinely used in pathology laboratories. Diseases with granulomas: Rheumatic fever Rheumatic fever is a systemic disease affecting the periarteriolar connective tissue and can occur after an untreated group A, beta-hemolytic streptococcal pharyngeal infection. It is believed to be caused by antibody cross-reactivity. Diseases with granulomas: Sarcoidosis Sarcoidosis is a disease of unknown cause characterized by non-necrotizing ("non-caseating") granulomas in multiple organs and body sites, most commonly the lungs and lymph nodes within the chest cavity. Other common sites of involvement include the liver, spleen, skin, and eyes. The granulomas of sarcoidosis are similar to those of tuberculosis and other infectious granulomatous diseases. In most cases of sarcoidosis, though, the granulomas do not contain necrosis and are surrounded by concentric scar tissue (fibrosis). Sarcoid granulomas often contain star-shaped structures called asteroid bodies or lamellar structures termed Schaumann bodies, but these structures are not specific for sarcoidosis. Sarcoid granulomas can resolve spontaneously without complications or heal with residual scarring. In the lungs, this scarring can cause a condition known as pulmonary fibrosis that impairs breathing. In the heart, it can lead to rhythm disturbances, heart failure, and even death. Diseases with granulomas: Crohn's disease Crohn's disease is an inflammatory condition of uncertain cause characterized by severe inflammation in the wall of the intestines and other parts of the abdomen. Within the inflammation in the gut wall, granulomas are often found and are a clue to the diagnosis. Listeria monocytogenes Listeria monocytogenes infection in infants can cause potentially fatal disseminated granulomas, called granulomatosis infantiseptica, following in utero infection. Leishmania spp. Leishmaniases are a group of human diseases caused by Leishmania genus and transmitted by a sandfly bite can lead to granulomatous inflammation in skin (cutaneous form of the disease) and liver (visceral form), with research suggesting effective granuloma formation to be desirable in the resolution of the disease. Pneumocystis pneumonia Pneumocystis infection in the lungs is usually not associated with granulomas, but rare cases are well documented to cause granulomatous inflammation. The diagnosis is established by finding Pneumocystis yeasts within the granulomas on lung biopsies. Diseases with granulomas: Aspiration pneumonia Aspiration pneumonia is typically caused by aspiration of bacteria from the oral cavity into the lungs, and does not result in the formation of granulomas. Granulomas may form, though, when food particles or other particulate substances such as pill fragments are aspirated into the lungs. Patients typically aspirate food because they have esophageal, gastric, or neurologic problems. Intake of drugs that depress neurologic function may also lead to aspiration. The resultant granulomas are typically found around the airways (bronchioles), and are often accompanied by foreign body-type, multinucleated giant cells, acute inflammation, or organizing pneumonia. The finding of food particles in lung biopsies is diagnostic. Diseases with granulomas: Rheumatoid arthritis Necrotizing granulomas can develop in patients with rheumatoid arthritis, typically manifesting as bumps in the soft tissues around the joints (so-called rheumatoid nodules) or in the lungs. Granuloma annulare Granuloma annulare is a skin disease of unknown cause in which granulomas are found in the dermis of the skin, but it is not a true granuloma. Typically, a central zone of necrobiotic generation of collagen is seen, with surrounding inflammation and mucin deposition on pathology. Foreign-body granuloma A foreign-body granuloma occurs when a foreign body (such as a wood splinter, piece of metal, glass etc.) penetrates the body's soft tissue followed by acute inflammation and formation of a granuloma. In some cases the foreign body can be found and removed even years after the precipitating event. Childhood granulomatous periorificial dermatitis Childhood granulomatous periorificial dermatitis is a rare granulomatous skin disorder of unknown cause. It is temporary and tends to affect children, usually of African descent. Granulomas associated with vasculitis: Certain inflammatory diseases are characterised by a combination of granulomatous inflammation and vasculitis (inflammation of the blood vessels). Both the granulomas as well as the vasculitis tend to occur in association with necrosis. Classic examples of such diseases include granulomatosis with polyangiitis and eosinophilic granulomatosis with polyangiitis. Etymology: The term is from Latin grānulum 'small grain' and -oma, a suffix used to indicate tumors or masses. The plural is granulomas or granulomata. The adjective granulomatous means "characterized by granulomas".
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Switchel** Switchel: Switchel, switzel, swizzle, switchy, ginger-water or haymaker's punch is a drink made of water mixed with vinegar, and often seasoned with ginger. It is usually sweetened with molasses, though honey, sugar, brown sugar, or maple syrup are sometimes used instead. In the U.S. state of Vermont, oatmeal and lemon juice were sometimes added to the beverage. Switchel: Switchel debatably originated in the Caribbean, but New England also holds credit as the source of switchel, and it became a popular summer drink in the American Colonies in the late 17th century. By the 19th century, it had become a traditional drink to serve to thirsty farmers at hay harvest time, hence the nickname haymaker's punch. Herman Melville wrote in I and My Chimney, "I will give a traveler a cup of switchel, if he want it; but am I bound to supply him with a sweet taste?" In The Long Winter Laura Ingalls Wilder describes a switchel-like beverage that her mother had sent for Laura and her father to drink while haying: "Ma had sent them ginger-water. She had sweetened the cool well-water with sugar, flavored it with vinegar, and put in plenty of ginger to warm their stomachs so they could drink till they were not thirsty. Ginger-water would not make them sick, as plain cold water would when they were so hot." The Vermont physician D. C. Jarvis recommended a similar drink (a mixture of honey and cider vinegar), which he called "honegar".Switchel is experiencing a renewed interest and has become a steadily-growing category in the ready-to-drink beverage industry. As of 2015, there are several companies that produce and distribute switchel beverages throughout the US. Canada has two commercial switchel producers.Switchel was sometimes mixed with rum, especially at sea, and it was served in the House of Representatives where it was "Flavored with the finest Jamaica rum."
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Computational engineering** Computational engineering: Computational Engineering is an emerging discipline that deals with the development and application of computational models for engineering, known as Computational Engineering Models or CEM. At this time, various different approaches are summarized under the term Computational Engineering, including using computational geometry and virtual design for engineering tasks, often coupled with a simulation-driven approach In Computational Engineering, algorithms solve mathematical and logical models that describe engineering challenges, sometimes coupled with some aspect of AI, specifically Reinforcement Learning.In Computational Engineering the engineer encodes their knowledge using logical structuring. The result is an algorithm, the Computational Engineering Model, that can produce many different variants of engineering designs, based on varied input requirements. The results can then be analyzed through additional mathematical models to create algorithmic feedback loops.Simulations of physical behaviors relevant to the field, often coupled with high-performance computing, to solve complex physical problems arising in engineering analysis and design (as well as natural phenomena (computational science). It is therefore related to Computational Science and Engineering, which has been described as the "third mode of discovery" (next to theory and experimentation).In Computational Engineering, computer simulation provides the capability to create feedback that would be inaccessible to traditional experimentation or where carrying out traditional empirical inquiries is prohibitively expensive. Computational engineering: Computational Engineering should neither be confused with pure computer science, nor with computer engineering, although a wide domain in the former is used in Computational Engineering (e.g., certain algorithms, data structures, parallel programming, high performance computing) and some problems in the latter can be modeled and solved with Computational Engineering methods (as an application area). It is typically offered as a masters or doctorate program. Methods: Computational Engineering methods and frameworks include: High performance computing and techniques to gain efficiency (through change in computer architecture, parallel algorithms etc.) Modeling and simulation Algorithms for solving discrete and continuous problems Analysis and visualization of data Mathematical foundations: Numerical and applied linear algebra, initial & boundary value problems, Fourier analysis, optimization Data Science for developing methods and algorithms to handle and extract knowledge from large scientific dataWith regard to computing, computer programming, algorithms, and parallel computing play a major role in Computational Engineering. The most widely used programming language in the scientific community is FORTRAN. Recently, C++ and C have increased in popularity over FORTRAN. Due to the wealth of legacy code in FORTRAN and its simpler syntax, the scientific computing community has been slow in completely adopting C++ as the lingua franca. Because of its very natural way of expressing mathematical computations, and its built-in visualization capacities, the proprietary language/environment MATLAB is also widely used, especially for rapid application development and model verification. Python along with external libraries (such as NumPy, SciPy, Matplotlib) has gained some popularity as a free and Copycenter alternative to MATLAB. Applications: Computational Engineering finds diverse applications, including in: Aerospace Engineering and Mechanical Engineering: combustion simulations, structural dynamics, computational fluid dynamics, computational thermodynamics, computational solid mechanics, vehicle crash simulation, biomechanics, trajectory calculation of satellites Astrophysical systems Battlefield simulations and military gaming, homeland security, emergency response Biology and Medicine: protein folding simulations (and other macromolecules), bioinformatics, genomics, computational neurological modeling, modeling of biological systems (e.g., ecological systems), 3D CT ultrasound, MRI imaging, molecular bionetworks, cancer and seizure control Chemistry: calculating the structures and properties of chemical compounds/molecules and solids, computational chemistry/cheminformatics, molecular mechanics simulations, computational chemical methods in solid state physics, chemical pollution transport Civil Engineering: finite element analysis, structures with random loads, construction engineering, water supply systems, transportation/vehicle modeling Computer Engineering, Electrical Engineering, and Telecommunications: VLSI, computational electromagnetics, semiconductor modeling, simulation of microelectronics, energy infrastructure, RF simulation, networks Epidemiology: influenza spread Environmental Engineering and Numerical weather prediction: climate research, Computational geophysics (seismic processing), modeling of natural disasters Finance: derivative pricing, risk management Industrial Engineering: discrete event and Monte-Carlo simulations (for logistics and manufacturing systems for example), queueing networks, mathematical optimization Material Science: glass manufacturing, polymers, and crystals Nuclear Engineering: nuclear reactor modeling, radiation shielding simulations, fusion simulations Petroleum engineering: petroleum reservoir modeling, oil and gas exploration Physics: Computational particle physics, automatic calculation of particle interaction or decay, plasma modeling, cosmological simulations Transportation
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Discharging method (discrete mathematics)** Discharging method (discrete mathematics): The discharging method is a technique used to prove lemmas in structural graph theory. Discharging is most well known for its central role in the proof of the four color theorem. The discharging method is used to prove that every graph in a certain class contains some subgraph from a specified list. The presence of the desired subgraph is then often used to prove a coloring result.Most commonly, discharging is applied to planar graphs. Discharging method (discrete mathematics): Initially, a charge is assigned to each face and each vertex of the graph. Discharging method (discrete mathematics): The charges are assigned so that they sum to a small positive number. During the Discharging Phase the charge at each face or vertex may be redistributed to nearby faces and vertices, as required by a set of discharging rules. However, each discharging rule maintains the sum of the charges. The rules are designed so that after the discharging phase each face or vertex with positive charge lies in one of the desired subgraphs. Since the sum of the charges is positive, some face or vertex must have a positive charge. Many discharging arguments use one of a few standard initial charge functions (these are listed below). Successful application of the discharging method requires creative design of discharging rules. An example: In 1904, Wernicke introduced the discharging method to prove the following theorem, which was part of an attempt to prove the four color theorem. Theorem: If a planar graph has minimum degree 5, then it either has an edge with endpoints both of degree 5 or one with endpoints of degrees 5 and 6. Proof: We use V , F , and E to denote the sets of vertices, faces, and edges, respectively. We call an edge light if its endpoints are both of degree 5 or are of degrees 5 and 6. An example: Embed the graph in the plane. To prove the theorem, it is sufficient to only consider planar triangulations (because, if it holds on a triangulation, when removing nodes to return to the original graph, neither node on either side of the desired edge can be removed without reducing the minimum degree of the graph below 5). We arbitrarily add edges to the graph until it is a triangulation. Since the original graph had minimum degree 5, each endpoint of a new edge has degree at least 6. So, none of the new edges are light. An example: Thus, if the triangulation contains a light edge, then that edge must have been in the original graph. An example: We give the charge 6−d(v) to each vertex v and the charge 6−2d(f) to each face f , where d(x) denotes the degree of a vertex and the length of a face. (Since the graph is a triangulation, the charge on each face is 0.) Recall that the sum of all the degrees in the graph is equal to twice the number of edges; similarly, the sum of all the face lengths equals twice the number of edges. Using Euler's Formula, it's easy to see that the sum of all the charges is 12: 12. An example: We use only a single discharging rule: Each degree 5 vertex gives a charge of 1/5 to each neighbor.We consider which vertices could have positive final charge. An example: The only vertices with positive initial charge are vertices of degree 5. Each degree 5 vertex gives a charge of 1/5 to each neighbor. So, each vertex is given a total charge of at most d(v)/5 . The initial charge of each vertex v is 6−d(v) . So, the final charge of each vertex is at most 6−4d(v)/5 . Hence, a vertex can only have positive final charge if it has degree at most 7. Now we show that each vertex with positive final charge is adjacent to an endpoint of a light edge. An example: If a vertex v has degree 5 or 6 and has positive final charge, then v received charge from an adjacent degree 5 vertex u , so edge uv is light. If a vertex v has degree 7 and has positive final charge, then v received charge from at least 6 adjacent degree 5 vertices. Since the graph is a triangulation, the vertices adjacent to v must form a cycle, and since it has only degree 7, the degree 5 neighbors cannot be all separated by vertices of higher degree; at least two of the degree 5 neighbors of v must be adjacent to each other on this cycle. This yields the light edge.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Skip-It** Skip-It: Skip-It is a children's toy invented by Avi Arad, Maggie Harvey and Mel Kennedy and manufactured by Tiger Electronics. The Skip-It apparatus was designed to be affixed to the child's ankle via a small plastic hoop and spun around in a 360 degree rotation while continuously skipped by the user. Time magazine included it in their 100 greatest toys ever.During its initial release in the 1980s, the Skip-It apparatus became a commercial success through its advertisements on daytime Nickelodeon broadcasting as well as other children's programming.It was based on 1960s toy Lemon Twist, which featured a lemon-shaped weight which was spun round the ankle.During a second production occurring in the early 1990s—that was referred to by the then-CEO as a "Skip-It Renaissance"—the toy was manufactured with a counter on the Skip-It ball to record the number of skips. As a result, sales doubled from the late 1980s. Some Skip-Its had colorful glitter filled and covered plastic decorations that can be slid on in order to make colorful patterns while being twirled about. There were also ribbon streamers, charms and stickers to decorate Skip Its, which were discontinued sometime in 2009. Skip-It: A version of the toy was featured in the Hong Kong martial art movie Butterfly and Sword (1993) where the character Miu Siu Siu / Ho Ching is seen playing with it.In 2013, a spin-off of the board game Twister was developed, Twister Rave Skip-It.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**G major** G major: G major (or the key of G) is a major scale based on G, with the pitches G, A, B, C, D, E, and F♯. Its key signature has one sharp. Its relative minor is E minor and its parallel minor is G minor. The G major scale is: Notable compositions: Baroque period In Baroque music, G major was regarded as the "key of benediction".Of Domenico Scarlatti's 555 keyboard sonatas, G major is the home key for 69, or about 12.4%, sonatas. In the music of Johann Sebastian Bach, "G major is often a key of 68 chain rhythms", according to Alfred Einstein, although Bach also used the key for some 44-based works, including his third and fourth Brandenburg Concertos. Pianist Jeremy Denk observes that the Goldberg Variations are 80 minutes in G major. Classical era Twelve of Joseph Haydn's 106 symphonies are in G major. Likewise, one of Haydn's most famous piano trios, No. 39 (with the Gypsy Rondo), and one of his last two complete published string quartets (Op. 77, No. 1), are in G major. Notable compositions: In addition, G major is the home key of Mozart's Eine kleine Nachtmusik, serving as the tonic for three of its four movements (the only exception being the second movement, titled Romanze which is in the subdominant key of C major). However, almost none of his large-scale works such as his symphonies or concertos are in this key; exceptions are the Violin concerto no. 3, Piano Concerto No. 17, Flute Concerto No. 1 and his String Quartet No. 14, along with some examples among his juvenilia. Notable compositions: For Ludwig van Beethoven, G major was a key for optimism and cheerful energy. He regularly used this key, for instance in Piano Sonata No. 10, Op. 14/2 Piano Sonata No. 16, Op. 31/1 Piano Sonata No. 20, Op. 49/2 Piano Sonata No. 25, Op. 79 Rondo for piano, Op. 51/2 Rondo à Capriccio "Rage over a lost Penny" (in German "Die Wut über den verlorenen Groschen") for piano, Op. 129 Violin Sonata No. 8, Op. 30/3 Violin Sonata No. 10, Op. 96 String Trio No. 2, Op. 9/1 String Quartet No. 2, Op. 18/2 Piano Trio No. 2, Op. 1/2 Romance for violin and orchestra, Op. 40 Piano Concerto No. 4, Op. 58.Franz Schubert rarely used the key of G major, although a few important compositions are written in this key, including Mass No. 2 D 167, String Quartet No. 15 D 887 and Piano Sonata op. 78 D 894. Notable compositions: Romantic era The Romantic composers often used keys distant from G major. Composers like Robert Schumann, Felix Mendelssohn, César Franck, Max Bruch, Anton Bruckner, Modest Mussorgsky, Alexander Borodin, César Cui and Sergei Rachmaninoff only used this key in a few small-scale or miscellaneous compositions, or even avoided it completely. Nonetheless, some important Romantic music was written in G major. Frédéric Chopin's Prelude Op. 28/3, his Nocturne Op. 37/2 and his Mazurka Op. 50/1 are in G major. Notable compositions: It is also the key of three major chamber music compositions by Johannes Brahms: String Sextet No. 2 Op. 36, Violin Sonata No. 1 Op. 78 and String Quintet No. 2 Op. 111. Antonín Dvořák wrote four important pieces in G major: String Quintet No. 2, Op. 77, Symphony No. 8 Op. 88, Sonatina for Violin and Piano Op. 100, which he wrote for his children, and String Quartet No. 13, Op. 106. Notable compositions: The Violin Sonata No. 2 Op. 13 by Edvard Grieg is in G major. Camille Saint-Saëns chose G major as the key for his String Quartet No. 2 and his Sonata for Bassoon and Piano. Gabriel Fauré only wrote one major composition in this key: his second Barcarolle for Piano, Op. 41. Notable compositions: The three major compositions in G major of Pyotr Ilyich Tchaikovsky are his Piano Concerto No. 2 Op. 44 and his orchestral suites No. 3, Op. 55 and No. 4 "Mozartiana" Op. 61. Three Préludes for Piano (Op. 11/3, Op. 13/3 and Op. 39/3) by Alexander Scriabin are in G major, as well as the Mazurka for orchestra op. 18, the String Quartet No. 3 Op. 26 and the Oriental Rhapsody for orchestra Op. 29 by Alexander Glazunov. Notable compositions: post-Romantic and modern era Gustav Mahler's Symphony No. 4 and Richard Strauss's tone poem Aus Italien Op. 16, are in G major. It's the key for the opening 'Sinfonia' of Igor Stravinsky's Pulcinella suite, and for the Piano Concerto for two hands and the Violin Sonata No. 2 by Maurice Ravel. The fifth sonata of the Six Sonatas for solo violin by Eugène Ysaÿe is also in G major. Sergei Prokofiev wrote his Piano Concerto No. 5 Op. 55 in this key, and Dmitri Shostakovich chose it for his Cello Concerto No. 2 Op. 126 and his String Quartet No. 6 Op. 101. In popular culture: G major is the key stipulated for the royal anthem of Canada, "God Save the King". The anthem "God Defend New Zealand" ("Aotearoa") was originally composed by John Joseph Woods in A-flat major, but after becoming New Zealand's national anthem in 1977, it was rearranged into G major to better suit general and massed singing. According to Spotify, G major is the most common key of music on the streaming service (closely followed by C major).
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Pitch (resin)** Pitch (resin): Pitch is a viscoelastic polymer which can be natural or manufactured, derived from petroleum, coal tar, or plants. Pitch produced from petroleum may be called bitumen or asphalt, while plant-derived pitch is also known as resin. Rosin refers to pitch made from plant resin. Tar is sometimes used interchangeably with pitch, but generally refers to a more liquid substance derived from coal production or from plants. Uses: Pitch was traditionally used to help caulk the seams of wooden sailing vessels (see shipbuilding), and to coat earthenware vessels for the preservation of wine. Pitch may also be used to waterproof wooden containers and in the making of torches. Petroleum-derived pitch is black in colour, hence the adjectival phrase, "pitch-black".The viscoelastic properties of pitch make it well suited for the polishing of high-quality optical lenses and mirrors. In use, the pitch is formed into a lap or polishing surface, which is charged with iron oxide (Jewelers' rouge) or cerium oxide. The surface to be polished is pressed into the pitch, then rubbed against the surface so formed. The ability of pitch to flow, albeit slowly, keeps it in constant uniform contact with the optical surface. Uses: Chasers pitch is a combination of pitch and other substances, used in jewellery making. Viscoelastic properties: Naturally occurring asphalt/bitumen, a type of pitch, is a viscoelastic polymer. This means that even though it seems to be solid at room temperature and can be shattered with a hard impact, it is actually fluid and will flow over time, but extremely slowly. The pitch drop experiment taking place at University of Queensland is a long-term experiment which demonstrates the flow of a piece of pitch over many years. For the experiment, pitch was put in a glass funnel and allowed to slowly drip out. Since the pitch was allowed to start dripping in 1930, only nine drops have fallen. It was calculated in the 1980s that the pitch in the experiment has a viscosity approximately 230 billion (2.3×1011) times that of water. The eighth drop fell on 28 November 2000, and the ninth drop fell on 17 April 2014. Another experiment was started by a colleague of Nobel Prize winner Ernest Walton in the physics department of Trinity College in Ireland in 1944. Over the years, the pitch had produced several drops, but none had been recorded. On July 11, 2013, scientists at Trinity College caught pitch dripping from a funnel on camera for the first time.Winchester College has a 'pitch glacier' demonstration which has been running since 21 July 1906, but does not have records of regular measurements. Production: The heating (dry distilling) of wood causes tar and pitch to drip away from the wood and leave behind charcoal. Birchbark is used to make birch-tar, a particularly fine tar. The terms tar and pitch are often used interchangeably. However, pitch is considered more solid, while tar is more liquid. Traditionally, pitch that was used for waterproofing buckets, barrels and small boats was drawn from pine. It is used to make Cutler's resin. Production: A 10th-century redaction of an earlier Greek Byzantine agricultural work brings down the ancient method of applying pitch to ceramic wine casks: [A wood-based pitch] is put into an earthen vessel, and it is put over a small fire in the sun, then some hot water percolated through wood-ashes is poured on it, and the pitch is stirred; when it has afterward stood, it is poured out after two hours, then there is as much water again poured in. Having therefore done this thrice every day for three days and having taken up the moisture on the surface, they make the pitch that is left exceedingly good. Dry pitch is also bitter, but being boiled with wine it becomes more useful; [...] and having boiled the mixture to a third part, they use it as properly qualified: but some throw wood-ashes into it and boil it down. In Italy they use pitch of this kind: forty minæ of pitch, one of wax, eight drams of sal ammoniac, six drams of manna. Thus, having pounded them and boiled them together, they sprinkle eight ounces (uncia) of well-ground fenugreek over them and they pitch the cask with them when they are well mixed. Production: The ceramic ware was pitched, both inside and out, immediately while they were removed from the kiln and still hot. Literary references: The ability of pitch to contaminate those in contact with it is mentioned by Dogberry, a character in Shakespeare's Much Ado About Nothing, and the same point is made in a speech by Falstaff in Henry IV, Part 1, who refers to "ancient writers" who have made this observation. The Jewish deuterocanonical Book of Sirach states that "whoever touches pitch gets dirty, and whoever associates with a proud person becomes like him".
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Brodmann area 13** Brodmann area 13: Area 13 is part of the Orbitofrontal cortex, a subdivision of the cerebral cortex as defined by cytoarchitecture. Location: Area 13 is located in the posterior part of the Orbitofrontal cortex , and can be subdivided into areas 13a, 13b, 13m, 13l. Area 13a is anterior to the junction of olfactory tract and area 13b occupies a region just anterior to 13a along the olfactory sulcus. Area 13m is on the medial part of the middle orbital gyrus, whereas 13l is in the lateral part of the gyrus. Subregions: Areas 13m and 13l are dysgranular regions of cortex. These areas are differentiated from the more anterior area 11 by a lack of continuous granular layer, and from the more posterior agranular Insular cortex. Area 13b is a thin and dysgranular cortical area, often characterized by crossing patterns of striations in layers III and V. Area 13a has an agranular structure.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Cloacal membrane** Cloacal membrane: The cloacal membrane is the membrane that covers the embryonic cloaca during the development of the urinary and reproductive organs. Cloacal membrane: It is formed by ectoderm and endoderm coming into contact with each other. As the human embryo grows and caudal folding continues, the urorectal septum divides the cloaca into a ventral urogenital sinus and dorsal anorectal canal. Before the urorectal septum has an opportunity to fuse with the cloacal membrane, the membrane ruptures, exposing the urogenital sinus and dorsal anorectal canal to the exterior. Later on, an ectodermal plug, the anal membrane, forms to create the lower third of the rectum. It ruptures in the seventh week of gestation.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Mugineic acid** Mugineic acid: Mugineic acid is the organic compound consisting of a azetidine group and three carboxylates. A colorless solid, it is a siderophore. More specifically, it is a phytosiderophore, i.e. a plant-produced siderophore. It functions as an iron accumulating agent for barley and other plants. Related phytosiderophores include nicotianamine and avenic acid. It is biosynthesized from S-methylmethionine. The compound binds metal ions as a hexadentate ligand.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Sodium nitroprusside** Sodium nitroprusside: Sodium nitroprusside (SNP), sold under the brand name Nitropress among others, is a medication used to lower blood pressure. This may be done if the blood pressure is very high and resulting in symptoms, in certain types of heart failure, and during surgery to decrease bleeding. It is used by continuous injection into a vein. Onset is nearly immediate and effects last for up to ten minutes.It is available as a generic medication. Side effects and mechanism: Common side effects include low blood pressure and cyanide toxicity. Other serious side effects include methemoglobinemia. It is not generally recommended during pregnancy due to concerns of side effects. High doses are not recommended for more than ten minutes. It works by increasing nitric oxide levels in the blood, which increases cGMP levels in cells, and causes dilation of blood vessels. History, society and culture: Sodium nitroprusside was discovered as early as 1850 and found to be useful in medicine in 1928. It is on the World Health Organization's List of Essential Medicines. Sodium nitroprusside is light sensitive, so it needs to be shielded from light to prevent degradation. Medical use: Sodium nitroprusside is intravenously infused in cases of acute hypertensive crises. Its effects are usually seen within a few minutes.Nitric oxide reduces both total peripheral resistance and venous return, thus decreasing both preload and afterload. So, it can be used in severe congestive heart failure where this combination of effects can act to increase cardiac output. In situations where cardiac output is normal, the effect is to reduce blood pressure. It is sometimes also used to induce hypotension (to reduce bleeding) for surgical procedures (for which it is also FDA, TGA, and MHRA labelled).The medication is extremely beneficial for use in medical patients because the effects of the medication will directly stop the second that it stops being infused. This is due to the metabolism of the drug, and the rapid inactivation to thiocyanate once conversion of the drug stops. Medical use: This compound has also been used as a treatment for aortic valve stenosis, oesophageal varices, myocardial infarction, pulmonary hypertension, respiratory distress syndrome in the newborn, shock, and ergot toxicity. Adverse effects: Adverse effects by incidence and severityCommon Unknown frequency Serious Ileus Reduced platelet aggregation Haemorrhage Increased intracranial pressure Metabolic acidosis Methaemoglobinaemia Cyanide poisoning Thiocyanate toxicity Contraindications Sodium nitroprusside should not be used for compensatory hypertension (e.g. due to an arteriovenous stent or coarctation of the aorta). It should not be used in patients with inadequate cerebral circulation or in patients who are near death. It should not be used in patients with vitamin B12 deficiency, anaemia, severe renal disease, or hypovolaemia. Patients with conditions associated with a higher cyanide/thiocyanate ratio (e.g. congenital (Leber's) optic atrophy, tobacco amblyopia) should only be treated with sodium nitroprusside with great caution. Its use in patients with acute congestive heart failure associated with reduced peripheral resistance is also not recommended. Its use in hepatically impaired individuals is also not recommended, as is its use in cases of pre-existing hypothyroidism.Its use in pregnant women is advised against, although the available evidence suggests it may be safe, provided maternal pH and cyanide levels are closely monitored. Some evidence suggests sodium nitroprusside use in critically ill children may be safe, even without monitoring of cyanide level. Adverse effects: Interactions The only known drug interactions are pharmacodynamic in nature, that is it is possible for other antihypertensive drugs to reduce the threshold for dangerous hypotensive effects to be seen. Adverse effects: Overdose Due to its cyanogenic nature, overdose may be particularly dangerous. Treatment of sodium nitroprusside overdose includes the following: Discontinuing sodium nitroprusside administration Buffering the cyanide by using sodium nitrite to convert haemoglobin to methaemoglobin as much as the patient can safely tolerate Infusing sodium thiosulfate to convert the cyanide to thiocyanate.Haemodialysis is ineffective for removing cyanide from the body but it can be used to remove most of the thiocyanate produced from the above procedure. Adverse effects: Toxicology The cyanide can be detoxified by reaction with a sulfur-donor such as thiosulfate, catalysed by the enzyme rhodanese. In the absence of sufficient thiosulfate, cyanide ions can quickly reach toxic levels. Hydroxocobalamin can be administered to reduce the risk of thiocyanate toxicity induced by nitroprusside. Mechanism of action: As a result of its breakdown to nitric oxide (NO), sodium nitroprusside has potent vasodilating effects on arterioles and venules (arterial more than venous), whereas other nitrates exhibit more selectivity for veins (e.g. nitroglycerin).Sodium nitroprusside breaks down in circulation to release nitric oxide (NO). It does this by binding to oxyhaemoglobin to release cyanide, methaemoglobin and nitric oxide. NO activates guanylate cyclase in vascular smooth muscle and increases intracellular production of cGMP. cGMP activates protein kinase G which activates phosphatases which inactivate myosin light chains. Myosin light chains are involved in smooth muscle contraction. The result is vascular smooth muscle relaxation, which allow vessels to dilate. This mechanism is similar to that of phosphodiesterase 5 (PDE5) inhibitors such as sildenafil (Viagra) and tadalafil (Cialis), which elevate cGMP concentration by inhibiting its degradation by PDE5.A role for NO in various common psychiatric disorders including schizophrenia, bipolar disorder and major depressive disorder has been proposed and supported by several clinical findings. These findings may also implicate the potential of drugs that alter NO signalling such as SNP in their treatment. Such a role is also supported by the findings of the recent SNP clinical trial. Structure and properties: Nitroprusside is an inorganic compound with the chemical formula Na2[Fe(CN)5NO], usually encountered as the dihydrate, Na2[Fe(CN)5NO]·2H2O. This red-colored sodium salt dissolves in water or ethanol to give solutions containing the free complex dianion [Fe(CN)5NO]2−. Nitroprusside is a complex anion that features an octahedral iron(II) centre surrounded by five tightly bound cyanide ligands and one linear nitric oxide ligand (Fe-N-O angle = 176.2 °). The anion possesses idealized C4vsymmetry. Structure and properties: Due to the linear Fe-N-O angle, the relatively short N-O distance of 113 pm and the relatively high stretching frequency of 1947 cm−1, the complex is formulated as containing an NO+ ligand. Consequently, iron is assigned an oxidation state of 2+. The iron center has a diamagnetic low-spin d6 electron configuration, although a paramagnetic long-lived metastable state has been observed by EPR spectroscopy.The chemical reactions of sodium nitroprusside are mainly associated with the NO ligand. For example, addition of S2− ion to [Fe(CN)5(NO)]2− produces the violet colour[Fe(CN)5(NOS)]4− ion, which is the basis for a sensitive test for S2− ions. An analogous reaction also exists with OH− ions, giving [Fe(CN)5(NO2)]4−. Roussin's red salt (K2[Fe2S2(NO)4]) and Roussin's black salt (NaFe4S3(NO)7) are related iron nitrosyl complexes. The former was first prepared by treating nitroprusside with sulfur. Preparation: Sodium nitroprusside can be synthesized by digesting a solution of potassium ferrocyanide in water with nitric acid, followed by neutralization with sodium carbonate: K 4 [ Fe ( CN ) 6 ] + 6 HNO 3 ⟶ H 2 [ Fe ( CN ) 5 ( NO ) ] + CO 2 + NH 4 NO 3 + 4 KNO 3 {\textstyle {\ce {K4[Fe(CN)6] + 6 HNO3 -> H2[Fe(CN)5(NO)] + CO2 + NH4NO3 + 4 KNO3}}} H 2 [ Fe ( CN ) 5 NO ] + Na 2 CO 3 ⟶ Na 2 [ Fe ( CN ) 5 ( NO ) ] + CO 2 + H 2 O {\textstyle {\ce {H2[Fe(CN)5NO] + Na2CO3 -> Na2[Fe(CN)5(NO)] + CO2 + H2O}}} Alternatively, the nitrosyl ligand can be introduced using nitrite: [ Fe ( CN ) 6 ] 4 − + H 2 O + NO 2 − ⟶ [ Fe ( CN ) 5 ( NO ) ] 2 − + CN − + 2 OH − {\textstyle {\ce {[Fe(CN)6]^4- + H2O + NO_2^- -> [Fe(CN)5(NO)]^2- + CN- + 2OH-}}} Other uses: Sodium nitroprusside is often used as a reference compound for the calibration of Mössbauer spectrometers. Sodium nitroprusside crystals are also of interest for optical storage. For this application, sodium nitroprusside can be reversibly promoted to a metastable excited state by blue-green light, and de-excited by heat or red light.In physiology research, sodium nitroprusside is frequently used to test endothelium-independent vasodilation. Iontophoresis, for example, allows local administration of the drug, preventing the systemic effects listed above but still inducing local microvascular vasodilation. Sodium nitroprusside is also used in microbiology, where it has been linked with the dispersal of Pseudomonas aeruginosa biofilms by acting as a nitric oxide donor. Other uses: Analytical reagent Sodium nitroprusside is also used as an analytical reagent under the name sodium nitroferricyanide for the detection of methyl ketones, amines, and thiols. It is also used as a catalyst in the quantitative determination of ammonia in water samples via the phenate method. Other uses: Ketones The nitroprusside reaction is used for the identification of ketones in urine testing. Sodium nitroprusside was found to give a reaction with acetone or creatine under basic conditions in 1882. Rothera refined this method by the use of ammonia in place of sodium or potassium hydroxide. The reaction was now specific for methyl ketones. Addition of ammonium salts (e.g. ammonium sulfate) improved the sensitivity of the test, too.In this test, known as Rothera's test, methyl ketones (CH3C(=O)-) under alkaline conditions give bright red coloration (see also iodoform test). Rothera's test was initially applied to detecting ketonuria (a symptom of diabetes) in urine samples. This reaction is now exploited in the form of urine test strips (e.g. "Ketostix"). Other uses: Thiols and cysteine The nitroprusside reaction is a chemical test used to detect the presence of thiol groups of cysteine in proteins. Proteins with the free thiol group give a red colour when added to a solution of sodium nitroprusside in aqueous ammonia. Some proteins test positive when denatured, indicating that thiol groups are liberated.Sodium nitroprusside is used in a separate urinalysis test known as the cyanide nitroprusside test or Brand's test. In this test, sodium cyanide is added first to urine and let stand for about 10 minutes. In this time, disulfide bonds will be broken by the released cyanide. The destruction of disulfide bonds liberates cysteine from cystine as well as homocysteine from homocystine. Next, sodium nitroprusside is added to the solution and it reacts with the newly freed sulfhydryl groups. The test will turn a red/purple colour if the test is positive, indicating significant amounts of amino acids were in the urine (aminoaciduria). Cysteine, cystine, homocysteine, and homocystine all react when present in the urine when this test is performed. This test can indicate inborn errors of amino acid transporters such as cystinuria, which results from pathology in the transport of dibasic amino acids. Other uses: Amines Sodium nitroprusside is also used to detect amines, including those in illicit drugs. This compound is thus used as a stain to indicate amines in thin layer chromatography. Sodium nitroprusside is similarly used as a presumptive test for the presence of alkaloids (amine-containing natural products) common in illicit substances. The test, called Simon's test, is performed by adding 1 volume of a solution of sodium nitroprusside and acetaldehyde in deionized water to a suspected drug, followed by the addition of 2 volumes of an aqueous sodium carbonate solution. The test turns blue for some secondary amines. The most common secondary amines encountered in forensic chemistry include 3,4-methylenedioxymethamphetamine (MDMA, the main component in ecstasy) and phenethylamines such as methamphetamine. Sodium nitroprusside is also useful in the identification the mercaptans (thiol groups) in the nitroprusside reaction. History: Sodium nitroprusside is primarily used as a vasodilator. It was first used in human medicine in 1928. By 1955, data on its safety during short-term use in people with severe hypertension had become available. Despite this, due to difficulties in its chemical preparation, it was not finally approved by the US FDA until 1974 for the treatment of severe hypertension. By 1993, its popularity had grown such that total sales in the US had totalled US$2 million.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Deep-water soloing** Deep-water soloing: Deep-water soloing (DWS), also known as psicobloc (from "psycho-bouldering"), is a form of free solo climbing where any fall should result in the climber entering deep water below the route. DWS is therefore considered safer than normal free solo climbing, however, DWS brings a number of unique additional risks including trauma from uncontrolled high-speed water entry, injury from hitting hazards above and below the water while falling, and drowning in rough or tidal seas, and is thus considered riskier than normal bouldering. Deep-water soloing: Deep-water soloing was largely started in Mallorca in 1978 by Miquel Riera and his discovery of Cova Del Diablo, and was further popularised and developed by British climbers Tim Emmett, Mike Robertson, and Neil Gresham, and Austrian climber Klem Loskot. DWS came to worldwide attention with Chris Sharma's 2006 ascent of the dramatic sea arch of Es Pontas, which at 5.15a (9a+) was one of the hardest climbing routes in the world. Deep-water soloing: DWS uses the sport climbing grading systems (mostly French sport climbing grades) with an additional S-grading system to reflect the unique risks of DWS on any route; DWS routes can vary from less then 5 metres (16 ft) to over 40 metres (130 ft) in height at the extreme end. Competition deep-water soloing has become popular, particularly in head-to-head "dueling" formats, and the "Psicobloc Masters Series" (2011, 2012–2018), which later evolved into the "Psicobloc Open Series" is one of the most notable DWS competitions. Description: Deep-water soloing, or DWS, is free solo climbing where any fall should land the climber in deep water below the route. It is thus considered a safer version of free solo climbing. It is not considered as safe as bouldering as the DWS climber encounters hazards that are unique to DWS, including injury or trauma on impact with the water or hitting hazards in the water (particularly from higher falls or uncontrolled falls), risk of drowning in rough seas and hitting the rock face before entering the water. Changing tides is a serious risk in DWS, as routes that might be very safe at high tide can become dangerous at lower tide, bringing new underwater hazards into play.DWS routes can vary from safe "bouldering-type" overhanging routes that are only a few metres in height above calm clear deep water, where any fall is almost guaranteed to result in clean low-speed entry into the water; which are graded S0-S1 DWS routes. At the other of the scale are DWS routes that are high (e.g. over 15 metres (49 ft), and going up to even 40–45 metres (131–148 ft) in height at the most extreme end), and where the climber needs to push themselves off the rock face to ensure that they enter the water cleanly, and control their surface impact as it will be at high speed; which are graded S2-S3 DWS routes. Description: Types of routes and locations While DWS can be done on any rock face over or beside the water, it is particularly suited to certain areas that have at least slightly overhanging rock faces (i.e. ensuring the DWS climber lands in the water), has clear and deep water (i.e. so that any underwater hazards can be identified and/or avoided), and are in warmer climates (so the DWS climber does not have to wear a wetsuit, and the water is generally calmer). Description: A number of locations that meet most of the above criteria have become particularly attractive for DWS: Mallorca in Spain (and the Cova del Diablo cliffs in particular, and Cala Varques), the birthplace of DWS, and contains many of the world's hardest and most famous DWS routes, including Es Pontas 9a+ (5.15a).Other leading European DWS locations include Croatia (Split and Sustipan), Portugal (Azores), Sardinia (Capo Testa and Capo Caccia), and Malta (cliffs of Gozo and Comino).In the British Isles, DWS locations include Dorset, Devon, and Pembrokeshire, and Ailladie in Ireland.In SE Asia, leading DWS locations include Thailand (all along Railay Beach), Vietnam (Hạ Long Bay and Cát Bà Island in particular), Malaysia (at Langkawi), and the Philippines (at El Nido, Palawan). History: Deep-water soloing has its roots in Mallorca when in 1978, Miquel Riera became frustrated with the aid climbing routes in his local area so he went to Porto Pi, Palma with his friends Jaume Payeras, Eduardo Moreno, and Pau Bover to find routes they could free climb. This became Mallorca's first bouldering venue, and as time progressed, Riera moved onto the nearby sea cliffs where they established DWS routes. Riera and his companions named it "psicobloc" (translated into English, means "Psycho Bouldering"), and published articles and photographs in climbing magazines on their activities. Towards the end of the 1980s, Miquel, aided by Pepino Lopez, Xisco Meca, Pepe Link, and Miki Palmer, had discovered the short sea cliffs of Cala Varques, Cala Serena, and a particularly impressive cliff in Porto Cristo, which was to become known as Cova del Diablo. Three notable routes were established at Cova del Diablo: Surfing in the Bar, Surfer Dead, and Surfing Bird. History: The 1990s saw an explosion in Britain for what was called "Deep Water Soloing" (DWS), starting with Nick Buckley's ascent of The Conger (1983). Britain's southern coast saw new DWS routes from the Cook brothers, Mike Robertson, Steve Taylor, and Pete Oxley. In 1996, the British Climbers' Club, published Into the Blue: A guide to Deep Water Soloing in Dorset, the first-ever DWS guidebook in the world, and proposed an evolved S-grading system and climbing style to Britain. In 2001, British climber Tim Emmett received an email from Miquel showing Cova Del Diablo and led to a trip by Emmett with other leading climbers such as Mike Robertson, Neil Gresham, and Austrian Klem Loskot. In February 2002, Robertson published an article titled 'Sympathy for the Devil' in Climber magazine describing Cova Del Diablo and the twenty-six new routes (from 4+ to 8a) that Emmett's party had added to the existing three routes.The publication of Robertson's article led to more international teams coming to Cova Del Diablo to create additional routes and explore new Mallorcan cliffs such as Cala Sa Nau, Cala Barques, Cala Mitjana, and Porto Cristo Novo. These teams also introduced Dutch climber Toni Lamprecht to Mallorcan DWS, which resulted in a vast number of new lines being established, chiefly at Cala Barques. DWS became more mainstream and globally recognized amongst climbers when a couple of short films were made by climbing filmmakers such as Udo Neumann in 2001, and Josh and Brett Lowell in 2003. The films featured some of the sport's pioneers: Emmett, Lamprecht, Klem Loskot, and a newcomer to the style, Chris Sharma.In September 2006, DWS came to international attention when Sharma completed the right-hand finish to a line that climbed the underside of the dramatic 15-metre (49 ft) Es Pontàs arch in Mallorca and carried a grade of 9a+ (5.15a), the hardest-ever DWS grade. Sharma had been looking for a DWS-equivalent to his 2001 sport climb, Realization, also 9a+ (5.15a), and his first free ascent was featured in the iconic 2007 film King Lines. Competition DWS: There have been numerous competitions held in DWS, the most notable of which is the "Psicobloc Masters Series" that began in 2011 in Bilbao, Spain organized by Spanish climber Finuco Martinez. From 2013 to 2018, the "Psicobloc Masters" was held in Utah Olympic Park and organized by a consortium that included Chris Sharma. In 2019, the series moved to Montreal, and was later rebranded as the "Psicobloc Open Series". The general format is a circa 50-foot (15 m) outdoor artificial climbing wall that severely overhangs a circa 12-foot (3.7 m) swimming pool. Climbers "duel" in head-to-head races on the wall in a series of knock-out rounds until the ultimate winner is decided. Climbers compete in men's, women's, and youth's formats. Risks: DWS presents a number of specific risks not normally encountered in rock climbing. Risks: Water entry: A fall into deep water from a height of over 10 metres (33 ft) can seriously injure the climber, particularly if the entry is not controlled. On difficult DWS routes, a fall can happen spontaneously, and from a position where the climber was on an overhang, and is thus falling onto their back. DWS climbers spend time at lower S-grades building up their skills around controlling their body position in any water entry. Risks: Underwater hazards: There may be rock features under the water's surface that the falling DWS may hit on a forceful or high-speed water entry. DWS climbers sometimes use an "armchair landing" technique to limit the depth of water they penetrate which involves adopting a quasi-sitting position while falling. This technique is very effective and can absorb a 30 feet (9.1 m) fall in just 5-foot (1.5 m) of water, but "armchair landings" are difficult to master and dangerous at greater heights. Risks: Effect of tides: All of the S-grades are specific to high tides. A DWS route graded S0-S1 at high tide, can become an S2 or S3 at low tides (e.g. Neil Gresham's 2012 DWS route Olympiad in Pembroke in Wales, has a DWS grade of F8b S1 at high tide, but is a non-DWS route with a traditional climbing English grade of E10 6c at low tide); particularly if underwater features come increasingly into play. DWS climbers need to understand the tidal system in the area and plan their climbs accordingly. Risks: Rough seas: DWS climbers have drowned, overcome by rough or swelling seas from which they were unable to escape (and often in a fatigued state). DWS climbers avoid climbing alone and have a support climber either in an inflatable dingy or in a position to lower a rope from above. Equipment: Like free solo climbing DWS needs very little climbing equipment outside of the chalk bag and rock climbing shoes. A number of additional items of equipment have become common amongst DWS climbers, including: Bench seats/ladders. Some DWS routes have makeshift wooden benches and small rope ladders installed at the base of the routes, hanging from pieces of protection, to enable the DWS climber to access the route, and rest/dry-off between attempts. Equipment: Inflatable dingy. DWS climbers sometimes employ a lightweight inflatable dingy that they can anchor at the bottom of the route and use for both recovery after falls, and resting between attempts; it can also be used by a second DWS climber for stand-by assistance. Tape harnesses. DWS climbers do not typically use a climbing harness; however, many DWS routes require the climber to abseil down the rock face to access the route (unless they can use the inflatable dingy). For this, they can use a make-shift harness made from a climbing sling. Grading: French sport grades The main DWS grade is "technical grade" which reflects the difficulty of the hardest movements or sequences on the route. The French sport climbing grades (e,g, 6a, 6b, 6c, ... 8b, 8b+, 8c, etc.) are generally the most popular technical grades in European DWS. In England, the traditional English grading system is sometimes used, although where French sport grades are quoted in England an "F" suffix is often placed before the grade to clarify that it is a French grade and not an English grade (e.g. F6a to distinguish from the English E4 6a). Grading: S-grades In circa 1995, British DWS climbers developed the S-grade system to give an additional grade for the objective level of danger that deep water soloing a given route presented to the climber in addition to the "technical difficulty" grade (above). British climbers felt that the English E-grade suffix reflected traditional climbing dangers (e.g. how good is the level of protection available to the traditional climber on the route), and not the dangers specific to the DWS climber (who was not going to be placing traditional climbing protection on the route); it is akin to the "R/X" suffix of American grades. For example, British climber Neil Gresham's 2012 DWS route Olympiad, has a DWS grade of F8b S1, but a traditional climbing English grade of E10 6c.The four levels of S-grade, as described by Mike Robinson in Deep Water (2007), are as follows: S0: "Safe at most tides, not particularly high crux moves. Avoid bottling out of an S0 if possible. These are essentially safe, so climb until you fall. Commitment normally pays off!"S1: "Care required; either the tide or the water depth needs checking, or maybe there is a highish crux on the route. Remember that, in big-tide venues, a huge tide and good timing can turn an S1 into an S0".S2: "A little more care than S1 required. Possibly spring-tide only (higher water levels). Check your tide timetable. 'Landings' can be more significant – maybe a crash landing into shallow-ish water is required, or a slight 'push' to clear rock or a slight slab/reef below. Likely to have a high crux".S3: "Expect the water to be either too shallow or too far away! You can't really afford to fall off an S3 without a large measure of control or timing. Failure on the route might require a full body-length crash landing into the deepest water available, or a long and scary downward flight. If you're operating in a tidal venue, wait for the biggest high tide possible". Notable ascents and milestones: A number of DWS ascents are particularly notable in the sport: 2006: Es Pontàs 9a+ (5.15a), Mallorca (ESP). First ascent was by Chris Sharma who left it ungraded but famously took over 50 attempts to complete the 7-foot (2.1 m) dyno high up on the dramatic 15-metre (49 ft) sea arch; the DWS route of Es Pontàs launched DWS to a much wider global audience and its first ascent featured prominently in Sharma's iconic 2007 climbing film, King Lines. Was repeated by Jernej Kruder (2016), Jan Hojer (2018), and Jakob Schubert in 2021 with a consensus that the grade is circa 5.15 (being a high DWS brings additional complexity in grading), which was the first-ever in DWS.2016: Alasha 9a (5.14d), Mallorca in Spain. First ascent was by Chris Sharma, who left it ungraded and named it after his daughter; there was speculation it was harder than Es Pontàs and possibly at 9b (5.15b); Jakob Schubert and Jernej Kruder made the first repeats in 2021, and estimated that its grade to be circa 9a, which takes account of the fact that the crux is at an intimidating height of 15 metres (49 ft).2017: The King 8b+ (5.14a), Pont d'Arc in France. First ascent by Chris Sharma; while not one of Sharma's hardest DWS routes, the great height of the arch (30 metres (98 ft) at the apex) and its natural beauty, attracted significant attention; locals named it The King in his honor.2018: Weatherman 8a+ (5.13c), Mallorca in Spain. Julia Kruder repeated Chris Sharma's route, and becomes the first female to climb a DWS route at the grade of 8a+.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Personal Genetics Education Project** Personal Genetics Education Project: The Personal Genetics Education Project (pgEd) aims to engage and inform a worldwide audience about the benefits of knowing one's genome as well as the ethical, legal and social issues (ELSI) and dimensions of personal genetics. pgEd was founded in 2006, is housed in the Department of Genetics at Harvard Medical School and is directed by Ting Wu, a professor in that department. It employs a variety of strategies for reaching general audiences, including generating online curricular materials, leading discussions in classrooms, workshops, and conferences, developing a mobile educational game (Map-Ed), holding an annual conference geared toward accelerating awareness (GETed), and working with the world of entertainment to improve accuracy and outreach. Online curricular materials and professional development for teachers: pgEd develops tools for teachers and general audiences that examine the potential benefits and risks of personalized genome analysis. These include freely accessible, interactive lesson plans that tackle issues such as genetic testing of minors, reproductive genetics, complex human traits and genetics, and the history of eugenics. pgEd also engages educators at conferences as well as organizes professional development workshops. All of pgEd's materials are freely available online. Map-Ed, a mobile quiz: In 2013, pgEd created a mobile educational quiz called Map-Ed. Map-Ed invites players to work their way through five questions that address key concepts in genetics and then pin themselves on a world map. Within weeks of its launch, Map-Ed gained over 1,000 pins around the world, spanning across all 7 continents. Translations and new maps linked to questions on topics broadly related to genetics are in development. GETed conference: pgEd hosts the annual GETed conference, a meeting that brings together experts from across the United States and beyond in education, research, health, entertainment, and policy to develop strategies for accelerating public awareness. Topics covered during these conferences have included reproductive technologies, human behavior and cognition, microbiomes, the intersection of faith and genetics, interplanetary travel, the importance of engaging the political sphere, and the power of entertainment and gaming to reach millions. Education and Entertainment Interface: pgEd is working with Sandra de Castro Buffington and Hollywood, Health & Society at the Norman Lear Center, University of Southern California (USC) Annenberg School for Communication, to advance awareness about personal genetics through television. They have also worked with the Broad Institute on outreach via fiction. Advisory board: pgEd's advisory board includes Sandra de Castro Buffington, Director, Hollywood Health and Society, George M. Church, Professor of Genetics, Harvard Medical School, Juan Enriquez, Managing Director at Excel Venture Management, and Marc Hodosh, Co-Creator of TEDMED.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Polygon-circle graph** Polygon-circle graph: In the mathematical discipline of graph theory, a polygon-circle graph is an intersection graph of a set of convex polygons all of whose vertices lie on a common circle. These graphs have also been called spider graphs. This class of graphs was first suggested by Michael Fellows in 1988, motivated by the fact that it is closed under edge contraction and induced subgraph operations.A polygon-circle graph can be represented as an "alternating sequence". Such a sequence can be gained by perturbing the polygons representing the graph (if necessary) so that no two share a vertex, and then listing for each vertex (in circular order, starting at an arbitrary point) the polygon attached to that vertex. Closure under induced minors: Contracting an edge of a polygon-circle graph results in another polygon-circle graph. A geometric representation of the new graph may be formed by replacing the polygons corresponding to the two endpoints of the contracted edge by their convex hull. Alternatively, in the alternating sequence representing the original graph, combining the subsequences representing the endpoints of the contracted edge into a single subsequence produces an alternating sequence representation of the contracted graph. Polygon circle graphs are also closed under induced subgraph or equivalently vertex deletion operations: to delete a vertex, remove its polygon from the geometric representation, or remove its subsequence of points from the alternating sequence. Recognition: M. Koebe announced a polynomial time recognition algorithm; however, his preliminary version had "serious errors" and a final version was never published. Martin Pergel later proved that the problem of recognizing these graphs is NP-complete. It is also NP-complete to determine whether a given graph can be represented as a polygon-circle graph with at most k vertices per polygon, for any k ≥ 3. Related graph families: The polygon-circle graphs are a generalization of the circle graphs, which are intersection graphs of the chords of a circle, and the trapezoid graphs, intersection graphs of trapezoids that all have their vertices on the same two parallel lines. They also include the circular arc graphs.Polygon-circle graphs are not, in general, perfect graphs, but they are near-perfect, in the sense that their chromatic numbers can be bounded by an (exponential) function of their clique numbers.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Remote SIM provisioning** Remote SIM provisioning: Remote SIM provisioning is a specification realized by GSMA that allows consumers to remotely activate the subscriber identity module (SIM) embedded in a portable device such as a smart phone, smart watch, fitness band or tablet computer. The specification was originally part of the GSMA's work on eSIM and it is important to note that remote SIM provisioning is just one of the aspects that this eSIM specification includes. The other aspects being that the SIM is now structured into "domains" that separate the operator profile from the security and application "domains". In practise "eSIM upgrade" in the form of a normal SIM card is possible (using the Android 9 eSIM APIs) or eSIM can be included into an SOC. The requirement of GSMA certification is that personalisation packet is decoded inside the chip and so there is no way to dump Ki, OPc and 5G keys. Another important aspect is that the eSIM is owned by the enterprise, and this means that the enterprise now has full control of the security and applications in the eSIM, and which operators profiles are to be used. Background to the specification: In the background of the technology looked to address the following issues: The development of non-removable SIM technology - a new generation of SIM-cards like MFF which are soldered into the device. The appearance and support by mobile operators of the concept of ABC (always best connected) – the opportunity get quality connections from any mobile operator at any point in time. The explosive growth of the Internet of Things (IoT) - according to Gartner about 8.4 billion connections in 2017 (up 31% from 2016). The cost and effort required to swap a SIM in a device that has been deployed in the field. Origin: The GSM Association (GSMA) which brings together about 800 operators and 250 mobile ecosystem companies became the first to come up with the Consumer Remote SIM Provisioning initiative. The beginning of creation the technology was announced in the summer 2014. The complete version of the specification was realized in February, 2016. Initially, the specification was supposed to be used just by M2M devices, but since December, 2015 it has begun being spread over various custom wearable devices, and into enterprise applications like authentication and identity management. "This new specification gives consumers the freedom to remotely connect devices, such as wearables, to a mobile network of their choice and continues to evolve the process of connecting new and innovative devices," Alex Sinclair, Chief Technology Officer, GSMA. Besides, the right of independent service providers to transmit commands of loading profiles to SIM-cards in the device has been amended and the possibility to store arrays of profiles in independent certified data centers (Subscriptions manager) has appeared. Functions and benefits: The specification that covers the carrier selection aspects aims to allow consumers to choose a mobile network operator from a wide range to activate the SIM embedded in a device via a subscription. It aims to simplify the users’ life by connecting their multiple devices through the same subscription. It should also motivate mobile device manufacturers to develop the next generation of the mobile-connected devices that will suit better the wearable technology applications. The specification that covers the carrier selection for M2M devices is simpler since typically there is no subscriber involved (e.g. changing the operator in an electricity meter). Functions and benefits: The language that is used to describe these specification is a little confusing since eSIM is not a physical format (or "form factor" - the phrase that is used to describe the various SIM sizes). The eSIM describes the functionality in the SIM, not the physical size of the SIM - and there are eSIMs in many formats (2FF, 3FF, 4FF, MFF). Functions and benefits: GSMA have also developed a compliance framework for eSIM devices, eUICCs, and subscription management products - to help with interoperability and security for products supporting eSIM. This is published by the GSMA as SGP.24, the eSIM compliance process describes common compliance requirements for: Functional interoperability eUICC security eUICC production site security Subscription Management site security Operation: Remote provisioning on the host device is initiated by the Local Profile Assistant (LPA), a software package that follows the RSP specification. When the LPA wants to retrieve a carrier profile it contacts a subscription manager (SM) service on the internet via HTTPS. The address of the SM can be defined: in a QR code scanned by the user by manually entering the SM's host name/Activation code on screen hard coded by the host device manufacturer in firmware. Operation: via a universal discovery service operated by the GSMA.The LPA is responsible for validating the X.509 certificate of the SM is valid and issued by the GSMA certificate authority. Once validation is complete the LPA will coordinate a secure channel between the eUICC and the SM using challenge-response authentication to enter programming mode. The LPA will request carrier profiles available for download, either by submitting the activation code provided by the user or the eSIM ID (EID) of the eUICC. The SM will provide the requested profile encrypted in a way that only the eUICC can decrypt/install to ensure the network authentication key remains secure.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Lists of Game Boy games** Lists of Game Boy games: Lists of Game Boy games cover video games developed for Nintendo's original Game Boy and for other platforms in the Game Boy family. Lists of Game Boy games: List of Game Boy games, for the original Game Boy List of Game Boy Color games for games supporting the additional features of the Game Boy Color system List of Game Boy Advance games List of Super Game Boy games for games supporting the additional features of the Super Game Boy peripheral List of multiplayer Game Boy games List of best-selling Game Boy video games
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Cranial nerve ganglia** Cranial nerve ganglia: In neuroanatomy, the cranial nerve ganglia are ganglia of certain cranial nerves. They can be parasympathetic or sensory. All cranial nerve ganglia are bilateral. Parasympathetic: The four cranial parasympathetic ganglia are: ciliary ganglion pterygopalatine ganglion otic ganglion submandibular ganglion Sensory: trigeminal ganglion (CN V) geniculate ganglion (CN VII) spiral ganglion (CN VIII) vestibular ganglion aka Scarpa's ganglion (CN VIII) superior ganglion of glossopharyngeal nerve inferior ganglion of glossopharyngeal nerve superior ganglion of vagus nerve inferior ganglion of vagus nerve
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**EudraCT** EudraCT: EudraCT (European Union Drug Regulating Authorities Clinical Trials) is the European Clinical Trials Database of all clinical trials of investigational medicinal products with at least one site in the European Union commencing 1 May 2004 or later. The EudraCT database has been established in accordance with Directive 2001/20/EC. The EudraCT Number is unique and is needed on other documents relating to the trials (e.g. SUSAR reports). Public Side: The public side of EudraCT is for organisations to register any of their clinical trials as defined by Directive 2001/20/EC. The process of applying and registering a clinical trial should be completed before submitting an application to any of the Member State/s in which they anticipate running the trial. The public side of EudraCT does not save any of the trial detail entered by the user, and instead provides a saved data file in the form of an XML which the user must store on their own local hard drive. Public Side: Applying for an EudraCT Number Application for an EudraCT number is made via the EudraCT website. To generate the EudraCT number some basic information about the requestor's organisation and the trial is required: Requestor's organisation name, town/city and country. Sponsor's protocol number. Requestor name. E-mail to which the EudraCT number will be sent. Security code. Whether the clinical trial is contained in a Paediatric Investigation Plan (PIP). Whether the clinical trial will be conducted in a third country (outside of the EU/EEA). The Member States where it is anticipated that the trial will be run.Once the requestor submits the form, the EudraCT Number will be assigned and an e-mail called "EudraCT Receipt" sent. The EudraCT number has the format YYYY-NNNNNN-CC, where: YYYY is the year in which the number is issued. NNNNNN is a six digit sequential number. CC is a check digit.The Clinical Trial Application (CTA) form is also created via the EudraCT system. Version details: The EudraCT database is currently on Version 9. Current Versions Version 9 of EudraCT was released in November 2013. New features for Version 9 include: Protocol-related information Sponsors can: Create, save XML/PDF files of clinical trial applications locally. Load locally saved clinical trial applications to complete, validate, compare, or to prepare a package for submission to a National Competent Authority.PIP addressees can: Create, save XML/PDF files of third country files locally. Create and post third country files to the EudraCT database. Version details: Load locally saved third country files to complete, validate or post to the EudraCT database. To post third country files you will need to be registered as a PIP addressee.Result-related information To use result related functionality you will need to be registered as a results user, and log in.Results users can: Create, update, validate and post result data sets, and load summary attachments to the EudraCT database. Version details: Save locally XML/PDF files of result data sets. Upload XML files.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Tk (software)** Tk (software): Tk is a cross-platform widget toolkit that provides a library of basic elements of GUI widgets for building a graphical user interface (GUI) in many programming languages. It is free and open-source software released under a BSD-style software license. Tk (software): Tk provides many widgets commonly needed to develop desktop applications, such as button, menu, canvas, text, frame, label, etc. Tk has been ported to run on most flavors of Linux, macOS, Unix, and Microsoft Windows. Like Tcl, Tk supports Unicode within the Basic Multilingual Plane, but it has not yet been extended to handle the current extended full Unicode (e.g., UTF-16 from UCS-2 that Tk supports). Tk (software): Tk was designed to be extended, and a wide range of extensions are available that offer new widgets or other capabilities.Since Tcl/Tk 8, it offers "native look and feel" (for instance, menus and buttons are displayed in the manner of "native" software for any given platform). Highlights of version 8.5 include a new theming engine, originally called Tk Tile, but it is now generally referred to as "themed Tk", as well as improved font rendering. Highlights of version 8.6 include PNG support and angled text. History: Tk was developed by John Ousterhout as an extension for the Tcl scripting language. It was first publicly released in 1991. Tk versioning was done separately from Tcl until version 8.0. History: Tk was written originally for Unix/X11, and proved extremely popular with programmers in the 1990s by virtue of its being easier to learn and use than Motif and other X11 toolkits of the time. Tk was also ported to Microsoft Windows and Macintosh platforms, starting with Tk 4.2 and improved with native look and feel in Tk 8.0 (released 1997). To mark the popularity and significance of Tk in the 1990s, Ousterhout was given the ACM Software System Award in 1997 for Tcl/Tk: Interest in Tk waned significantly from the late 1990s and onward. The default look and feel on Unix still emulated Motif, despite the mainstream replacement of Motif by toolkits such as FLTK, Qt, and GTK. Widgets that became commonly used in applications (e.g. trees, combo boxes, tabbed notebooks) were not available in the Tk core, but only via multiple, often competing add-ons.Tk 8.5, released in late 2007, corrected some of these problems by adding missing widgets to the core, introducing a new theming engine and modernizing the look and feel on Unix. History: However, because some code changes were required to incorporate these advancements, many existing applications retain the older Motif-inspired feel that Tk had become known for. Architecture: Tk is a platform-independent GUI framework developed for Tcl. From a Tcl shell (tclsh), Tk may be invoked using the command package require Tk. The program wish (WIndowing SHell) provides a way to run a tclsh shell in a graphical window as well as providing Tk.Tk has the following characteristics: Platform-independent: Like Tcl, Tk is interpreted. It has been ported to multiple platforms and can easily run on all of them without modification. Architecture: Customizable: Almost all the features of a widget in Tk are customizable through options during the creation of the widget or later on through the configure command. Configurable: Many of the options can be stored in an option database, making it very easy to parameterize the look of an application (such as the color scheme). This also means that storing the application-specific options is only a matter of saving the option add commands and executing them on loading the application. Architecture: Language bindings A library written in one programming language may be used in another language if bindings are written; Tk is integrated with the Tcl language. Various other languages have bindings for Tk, a partial list of which is on the Tk website. Bindings exist for additional languages which might not be listed, including Ada (called TASH), Haskell (called HTk), Perl, Python (called Tkinter), R (through the standard package: tcltk), Ruby, Rexx, and Common Lisp. Architecture: There are several ways to use Tk from Perl: the Tcl::Tk and Tkx Perl modules, both of which use Tcl as a bridge to access Tk, and Perl/Tk, which provides native Perl access to Tk structures. The Python binding uses Tcl as a bridge to Tk. Features: Tk provides various widgets. Basic widgets are embedded into toplevel widgets, which in turn are usually hosted by the operating system in floating windows that can be moved around on the screen. Basic widgets Top-level widgets tk_chooseColor – pops up a dialog box for the user to select a color. tk_chooseDirectory – pops up a dialog box for the user to select a directory. tk_dialog – creates a modal dialog and waits for a response. tk_getOpenFile – pops up a dialog box for the user to select a file to open. tk_getSaveFile – pops up a dialog box for the user to select a file to save. tk_messageBox – pops up a message window and waits for a user response. tk_popup – posts a popup menu. toplevel – creates and manipulates toplevel widgets. Geometry managers Basic widgets are arranged in toplevel windows using geometry managers: place – positions widgets at absolute locations grid – arranges widgets in a grid pack – packs widgets into a cavity
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**False protagonist** False protagonist: In fiction, a false protagonist is a literary technique, often used to make the plot more jarring or more memorable by fooling the audience's preconceptions, that constructs a character who the audience assumes is the protagonist but is later revealed not to be. False protagonist: A false protagonist is presented at the start of the fictional work as the main character, but then is eradicated, often by killing them (usually for shock value or as a plot twist) or changed in terms of their role in the story (i.e. making them a lesser character, a character who leaves the story, or revealing them to actually be the antagonist). Overview: In film, a character can be made to seem like the main protagonist based on a number of techniques (beyond just simply focusing the plot on their role). Star power is a very effective method; audience members generally assume that the biggest "name" in a film will have a significant part to play. An abundance of close-ups can also be used as a subliminal method. Generally, the star of a film will get longer-lasting and more frequent close-ups than any other character, but this is rarely immediately apparent to viewers during the film. Alternatively, the false protagonist can serve as a narrator to the film, encouraging the audience to assume that the character survives to tell their tale later.Many of the same techniques used in film can also apply to television, but the episodic nature adds an additional possibility. By ending one or more episodes with the false protagonist still in place, the show can reinforce the viewers' belief in the character's protagonist status. Also, because TV shows often have changes of cast between seasons, some series can have unintentional false protagonists: characters who begin the series as the main character but then are replaced early in the show's run by another character entirely. When the series is viewed as a whole, this can lead to the appearance of a false protagonist.In video games, a false protagonist may initially be a playable character, only to be killed or revealed to be the antagonist. One key way in which video games employ the method that differs from uses in non-interactive fiction is by granting the player direct control over the false protagonist. Since most video games allow a player to control only the main characters (and their success or failure is based on playing skill, not pre-determined story), the sudden demise of the character that is being controlled serves to surprise the player. Examples: Literature The Book of Samuel begins with Samuel's birth and God's call to him as a boy. At this point, the readers are led to believe that Samuel is the central figure in the book. Though by the sixteenth chapter, the book starts to primarily focus on David. Examples: The well-known story of Aladdin in the Arabian Nights begins with a wizard undertaking a difficult quest all the way from Morocco to China to recover a powerful magical lamp. Only gradually does it become clear that the boy Aladdin, whom the Wizard meets in China, is the true protagonist, and the wizard turns out to actually be the story's villain. Examples: Robert A. Heinlein's 1940 science fiction short story The Roads Must Roll begins with an orator stirring up a rebellion among the workers of the story's "roadtowns" (wide rapidly moving passenger platforms). The orator's enumerating the workers' grievances gains their sympathy, and the reader's, and he seems set to become the protagonist. However, the rebelling workers then callously cause mass death and injuries among commuters, and the true protagonist is seen to be the director working effectively and courageously to put down the rebellion. By the end, the original orator is depicted as a rather cowardly and contemptible villain. Examples: George R. R. Martin's novel A Game of Thrones, the first entry in the A Song of Ice and Fire epic fantasy series, features chapters told from the point of view of numerous characters, though the most prominent is Ned Stark. In the television adaptation Game of Thrones he was portrayed by Sean Bean, who received top billing among the cast for Season One. Stark is generally assumed to be the series' main protagonist until the final chapters of the novel (corresponding to the penultimate episode of the first season) where he is unexpectedly executed. Examples: The light novel Goblin Slayer introduces a Warrior, Mage, and Monk who recruit a Priestess for a goblin killing quest. The three are eaten, poisoned to death, and sexually assaulted to the point of ending up in a vegetative state. The Priestess is rescued by the legendary Goblin Slayer who replaces her escorts as the protagonist. The escorts were featured in promotional marketing material for the novel and its anime adaptation until the first episode was released. Examples: Juan Rulfo's novel Pedro Paramo, features a man by the name of Juan Preciado as the main protagonist of the story early in the novel, who is searching for his father as a final wish made to his dying mother. Halfway through the novel, Juan Preciado unexpectedly dies in the abandoned town of Comala. The latter half of the novel focuses exclusively on the life of Pedro Paramo, his rise to power, and how his ambition and ruthlessness would lead to Comala's demise. Examples: Film Alfred Hitchcock's film Psycho opens with Marion Crane as the main character. However, she is killed partway through the film, making the murder far more unexpected and shocking. Hitchcock felt that the opening scenes with Marion as the false protagonist were so important to the film that when it was released in theaters, he compelled theater owners to enforce a "no late admission" policy. Examples: In the action film Executive Decision, the character played by Steven Seagal is introduced as a major protagonist only to be killed at the end of the first act, leaving the character played by Kurt Russell as the film's true hero. Examples: Video games In Call of Duty 4: Modern Warfare, the player assumes the roles of two alternating player characters, SAS operative Sgt. John "Soap" MacTavish and U.S. Marine Sgt. Paul Jackson, during the game's first act. At the end of the first act, Sgt. Jackson is killed in a nuclear explosion, after which Soap is the sole player character for the rest of the game. Examples: In Fatal Frame, the player assumes the role of Mafuyu in the prologue. Then after that, Miku, Mafuyu's sibling, becomes the main protagonist. In Metal Gear Solid 2: Sons of Liberty, the player initially plays as Solid Snake, protagonist of the original Metal Gear games. However, the majority of the game after that is played with Raiden, with Snake taking on only a minor role in the story. In Final Fantasy XII, the player start the game playing as a young soldier named Reks. After less than an hour of gameplay, Reks is suddenly killed, and the game resumes play following Vaan, Reks' younger brother. Examples: In Kingdom Hearts II, Roxas is initially portrayed as the protagonist in the first few hours of gameplay. However, after finding the pod in which Sora has been imprisoned for more than a year, he vanishes, and Sora regains his role as protagonist. Though Roxas continues to appear throughout the game in Organization XIII flashbacks, he does not return to playable status, only being revealed as Sora's Nobody, created from the time that he had become a Heartless in the original game. Examples: In The Godfather: The Game, scenes introduce a gangster, who works for the Corleone family. The gangster is shown saving his son's life from the resultant fire, after which the player is allowed to control the gangster as the primary character while he defeats the thugs. When all the enemies are defeated, the game cuts to an FMV scene where the gangster is surprisingly shot dead by Barzini thugs. Play resumes with the player in control of the true protagonist of the game: his previously-mentioned son, who wants revenge for his father's death. Examples: In Star Fox Adventures, one first uses Krystal, but then she is captured by Andross, and Fox McCloud regains his position as main character throughout the game. In Fire Emblem: Seisen no Keifu Siglud is the main character at first. However, at the middle of the story, he is killed by Alvis, and his son Celice takes over from him as the protagonist. Examples: In Xenoblade, Dunban is portrayed as the protagonist during the prologue. However, after he is unable to wield the Monado anymore due to his right arm being severely injured, the character Shulk becomes the protagonist. Dunban later joins up with Shulk and fights alongside him for the remainder of the game as a "supporting main character." In Assassin's Creed III, Haytham Kenway is portrayed as the protagonist during the prologue. However, after initiating Charles Lee into the order, it is revealed that Haytham was actually a Templar master and becomes the game's antagonist. The game then proceeds to switch to Haytham's son Connor Kenway, who becomes an assassin after his village is burned down. Examples: In Silent Hill 4: The Room, during the prologue Joseph Schreiber is portrayed as the protagonist, but is later killed by Walter Sullivan. After the prologue the game proceeds to Henry Townsend, who comes to live in the apartment previously inhabited by Joseph. In Danganronpa V3: Killing Harmony, Kaede Akamatsu is initially portrayed as the protagonist of the game. However, she is later executed at the end of chapter 1, and her role as protagonist is replaced by Shuichi Saihara.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Semantic file system** Semantic file system: Semantic file systems are file systems used for information persistence which structure the data according to their semantics and intent, rather than the location as with current file systems. It allows the data to be addressed by their content (associative access). Traditional hierarchical file-systems tend to impose a burden, for example when a sub-directory layout is contradicting a user's perception of where files would be stored. Having a tag-based interface alleviates this hierarchy problem and enables users to query for data in an intuitive fashion. Semantic file system: Semantic file systems raise technical design challenges as indexes of words, tags or elementary signs of some sort have to be created and constantly updated, maintained and cached for performance to offer the desired random, multi-variate access to files in addition to the underlying, mostly traditional block-based filesystem.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Core Keeper** Core Keeper: Core Keeper is a survival sandbox game developed by Pugstorm. Currently in early access, the game features mechanics similar to other games in the sandbox genre such as Minecraft and Terraria, including mining, crafting, farming and exploration in a procedurally generated underground world. It was released to Steam in early access on 8 March 2022 and received praise for its game mechanics, art style, and tone and atmosphere. Gameplay: Core Keeper is a top-down sandbox game based around survival and crafting mechanics similar to games such as Minecraft and Terraria. It can be played single-player or cooperatively with up to 8 players. Players also have the ability to host a server which anyone can join at any time up to a maximum of 8 players. The game begins with a cutscene explaining the backstory of the player character before placing the character in a procedurally generated network of caverns. The starting location, called the Core chamber, is the same biome for all players, containing the same starting enemies and resources. It also contains three devices representing bosses that can be found and defeated within the game. It is a dark area at the beginning of the game but can be illuminated with the use of torches or a lantern. Torches can be made using gathered wood which is the first resource encountered in the area.The world is built up of square tiles of dirt and other materials which can be dug or mined to further explore the map and to gather resources. Blocks of ore glitter, helping players to know in which direction to dig to find them. Gathered resources can be used to craft tools and workbenches which unlock new items to craft. A furnace can also be crafted which allows the player to smelt ores to create weapons and armour. Players must also gather food to prevent their character from starving which occurs when their "hunger bar" becomes empty. This can be done by finding food in the world or by planting and watering seeds using a hoe and watering can. Later in the game, watering crops can be automated with the use of sprinklers. Additionally, fish can be caught in a fishing rhythm minigame using a fishing rod. Food can also be combined into meals using a cooking pot which can be crafted in the game. Meals cooked in this way provide an additional health boost and perks compared to naturally occurring food.Exploration in the game is facilitated with an in-game map which can be opened as an overlay. It is also facilitated with the use of portals which allow the player to traverse great distances across the map. As players explore other areas of the game world, different biomes containing new resources and enemies are revealed. As enemies move around the game, they spread the environment in which they spawn, meaning that clearing an area of enemies requires cleaning the floor as well as defeating them. If a player dies during combat, they respawn at the Core in the starting area. They can retrieve their lost belongings by returning to the area where they died and reclaiming them from the tombstone dropped there. New regions also contain large boss enemies. Once defeated, bosses drop items that can be used to summon NPC merchants to live at the player's base. The first three bosses included in the game are Glurch the Abominous Mass, a giant, jumping, orange slime, Ghorm the Devourer, a massive insect creature that tunnels throughout the map, and The Hive Mother, a fleshy creature that spits acid and summons other enemies. Upon being defeated, these bosses drop items which can be used to activate the Core in the Core chamber, unlocking new items such as a drill for automatically mining ores and new bosses. Furthermore, whilst the areas accessible to the player are initially limited by a wall that surrounds the first few starting areas, upon activating the core this wall is removed, revealing new biomes and an infinitely generated map.The game allows for a wide array of ways to play ranging from focusing on fighting bosses to avoiding bosses in favour of crafting and base-building. This is reflected in the game's skill system which rewards activities taken by the player with points to improve skills related to them. For example, running a lot improves the character's speed, mining resources improves the character's efficiency in mining, and fighting improves the character's strength. Players also choose a starting class during character creation before they begin the game which gives bonuses to specific skills and relevant starting resources. The look of the player character can also be customised by using vanity slots in the inventory. Development and release: Core Keeper was developed by Pugstorm and published by Fireshine Games. It was announced during an IGN livestream on 11 June 2021. It was launched in open alpha later that year for a period of two weeks from 1–14 December. A demo of the game was also released for Steam Next Fest In February 2022. It was released to Steam in early access on 8 March 2022. It supports Windows and Linux. It reached a quarter-million sales within a week and half a million in two weeks. PC Gamer attributed the early success in sales to positive coverage of the game from online streamers, reporting that the game had received almost 2 million views on Twitch by 23 March. The game reached 1 million sales by July 2022, having sold an additional 500,000 copies since the end of March.The first seasonal event in the game, called "The Great Egg Hunt", ran from 13–19 April 2022 and added hidden eggs that could be combined to craft a Golden Egg item used to unlock hidden bonuses. The first major update for the game entitled "The Sunken Sea" was released on 15 June, introducing boats, islands and a new water biome to the game, as well as new fish, ores, enemies and weapons. A smaller update introducing cosmetic items called "Cozy Caverns" was released on 14 September, followed by a crossover with Terraria on 26 September that introduced a King Slime boss to the game, and a Halloween event called "Creepy Costume Party" that ran until 5 November. The next major update "The Desert of Beginnings" is set to release on 10 November and will introduce a new desert biome, two new bosses, go-karts and bug-hunting. A currently unnamed crystal biome is also planned to release in 2023. Reception: Rick Lane of NME compared the presentation of the game favourably to the 1997 game Dungeon Keeper for its underground setting, dark atmosphere and pixel art style. He felt that although the game's mechanics do "little to innovate or iterate" upon previous games in the genre such as Minecraft, its theme and tone "reframe the mechanics so that they don’t feel staid". He also felt that the game's choice to stick to well-known mechanics made it more immediately playable, even in its early access form. Nicole Clark of Polygon described the game as a "top-down Terraria" and compared it to other games in the sandbox genre, but argued that it isn't derivative because it "weaves tried-and-true survival sim elements into a tight play loop where the game is the grind in a way that feels meditative without being too repetitive." She also stated that the game "does a great job of slowly revealing its crafting system" and praised its ability to let the player learn by doing which she called "a rare quality in a genre that can be encumbered by many archaic rules and difficult-to-navigate screens." Jason Coles of PCGamesN praised features of the game that he felt gave implicit direction to the player on what to do, such as its introductory cutscene, starting location items, and crafting progression. Overall he felt that these features "result in a game that – like Minecraft – is built around crafting and survival, but offers a clear path forward for players who need a little more direction."Christopher Livingstone of PC Gamer enjoyed the contrast between the game's "genuinely spooky areas and scary moments" and its "cozy, comfy, warm and happy Stardew Valley feel". He praised the "charming art and animation" as well as the fishing, farming and cooking aspects of the game. Harry Alston of TheGamer called the visual design of the game "gorgeous" and praised the combat as "straightforward but nuanced". He also praised the peaceful, slow living atmosphere of the game which he compared to Stardew Valley, concluding that "Core Keeper is comfortable, the sort of game that makes you feel nostalgic even though you’ve never played it before."In April 2022, Vulture included the game on its list of "The Best Video Games of 2022 (So Far)", describing it as "[striking] a sublime balance between precarious dungeoneering and the cozy chores back home." In October 2022, Polygon listed Core Keeper as one of the best co-op management games. In November 2022, PCGamer described Core Keeper as the year's best co-op survival game.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Ettringite** Ettringite: Ettringite is a hydrous calcium aluminium sulfate mineral with formula: Ca6Al2(SO4)3(OH)12·26H2O. It is a colorless to yellow mineral crystallizing in the trigonal system. The prismatic crystals are typically colorless, turning white on partial dehydration. It is part of the ettringite-group which includes other sulfates such as thaumasite and bentorite. Discovery and occurrence: Ettringite was first described in 1874 by J. Lehmann, for an occurrence near the Ettringer Bellerberg Volcano, Ettringen, Rheinland-Pfalz, Germany. It occurs within metamorphically altered limestone adjacent to igneous intrusive rocks or within xenoliths. It also occurs as weathering crusts on larnite in the Hatrurim Formation of Israel. It occurs associated with portlandite, afwillite and hydrocalumite at Scawt Hill, Ireland and with afwillite, hydrocalumite, mayenite and gypsum in the Hatrurim Formation. It has also been reported from the Zeilberg quarry, Maroldsweisach, Bavaria; at Boisséjour, near Clermont-Ferrand, Puy-de-Dôme, Auvergne, France; the N’Chwaning mine, Kuruman district, Cape Province, South Africa; in the US, occurrences were found in spurrite-merwinite-gehlenite skarn at the 910 level of the Commercial quarry, Crestmore, Riverside County, California and in the Lucky Cuss mine, Tombstone, Arizona.Ettringite is also sometimes referred in the ancient French literature as Candelot salt, or Candlot salt. Occurrence in cement: In concrete chemistry, ettringite is a hexacalcium aluminate trisulfate hydrate, of general formula when noted as oxides: 6CaO·Al2O3·3SO3·32H2Oor 3CaO·Al2O3·3CaSO4·32H2O.Ettringite is formed in the hydrated Portland cement system as a result of the reaction of tricalcium aluminate (C3A) with calcium sulfate, both present in Portland cement. Occurrence in cement: C3A + 3 CaSO4 → ettringiteThe addition of gypsum (CaSO4·2H2O) to clinker during the grinding operation to obtain the crushed powder of Portland cement is essential to avoid the flash setting of concrete during its early hydration. Indeed, the tricalcium aluminate (C3A) is the most reactive phase of the four main mineral phases present in Portland cement (C3S, C2S, C3A, and C4AF). C3A hydration is very exothermic and also occurs very fast in the fresh concrete mix as the temperature quickly increases with the progress of the hydration reaction. The effect of gypsum addition is to promote the formation of a thin impervious film of ettringite at the surface of the C3A grains, passivating their surface, and so slowing down their hydration. The addition of gypsum to Portland cement is needed to control the concrete setting.Ettringite, the most prominent representative of AFt phases or (Al2O3 − Fe2O3 − tri), can also be synthesized in aqueous solution by reacting stoichiometric amounts of calcium oxide, aluminium oxide, and sulfate. Occurrence in cement: In the cement system, the presence of ettringite depends on the ratio of calcium sulfate to tri-calcium aluminate (C3A); when this ratio is low, ettringite forms during early hydration and then converts to the calcium aluminate monosulfate (AFm phases or (Al2O3 − Fe2O3 − mono)). When the ratio is intermediate, only a portion of the ettringite converts to AFm and both can coexist, while ettringite is unlikely to convert to AFm at high ratios. Occurrence in cement: The following standard abbreviations are used to designate the different oxide phases in the cement chemist notation (CCN): AFt and AFm phases AFt: abbreviation for "alumina, ferric oxide, tri-substituted" or (Al2O3 − Fe2O3 − tri). It represents a group of calcium aluminate hydrates. AFt has the general formula [Ca3(Al,Fe)(OH)6•12H2O]2•X3•nH2O where X represents a doubly charged anion or, sometimes, two singly charged anions. Ettringite is the most common and prominent member of the AFt group (X in this case denoting sulfate), and often simply called Alumina Ferrite tri-sulfate (AFt). Occurrence in cement: AFm: abbreviation for "alumina, ferric oxide, mono-substituted" or (Al2O3 − Fe2O3 − mono). It represents another group of calcium aluminate hydrates with general formula [Ca2(Al,Fe)(OH)6]2•X•nH2O where X represents a singly charged anion or 'half' a doubly charged anion. X may be one of many anions. The most important anions involved in Portland cement hydration are hydroxyl (OH−), sulfate (SO2−4), and carbonate (CO2−3). Structure: The mineral ettringite has a structure that runs parallel to the c axis -the needle axis-; in the middle of these two lie the sulfate ions and H2O molecules, the space group is P31c. Ettringite crystal system is trigonal, crystals are elongated and in a needle like shape, occurrence of disorder or twining is common, which affects the intercolumn material. The first X-ray diffraction crystallographic study was done by Bannister, Hey & Bernal (1936), which found that the crystal unit cell is of a hexagonal form with a = 11.26 and c = 21.48 with space group P63/mmc and Z = 2, where Z is a number of formula units per unit cell. From observations on dehydration and chemical formulas there were suggestions of the structure being composed of Ca2+ and Al(OH)3−6, were between them lie SO2−4 ions and H2O molecules. Further X-ray studies ensued; namely Wellin (1956) which determined the crystal structure of thaumasite, and Besjak & Jelenic (1966) which gave confirmation of the structure nature of ettringite.An ettringite sample extracted from Scawt Hill was analysed by C. E. Tilley, the crystal was 1.1 × 0.8 × 0.5 mm, with specific gravity of 1.772±0.002, possessed five prism faces of the form m{1010} and a small face a{1120}, with no pyramidal or basal faces. Upon X-ray diffraction a Laue diagram along the c-axis revealed a hexagonal axis with vertical planes of symmetry, this study showed that the structure has a hexagonal and not a rhombohedral lattice. Further studies conducted on synthetic ettringite by use of X-ray and powder diffraction confirmed earlier assumptions and analyses.Upon analyzing the structure of both ettringite and thaumasite, it was deduced that both minerals have hexagonal structures, but different space groups. Ettringite crystals have a P31c with a=11.224 Å, c=21,108 Å, while thaumasite crystals fall into space group P63 with a=11.04 Å, c=10.39 Å. While these two minerals form a solid solution, the difference in space groups lead to discontinuities in unit cell parameters. Differences between structures of ettringite and thaumasite arise from the columns of cations and anions: Ettringite cation columns are composed of Ca3[Al(OH)6·12H2O]3+, which run parallel to the c axis, and the other columns of sulfate anions and water molecules in channels parallel to these columns. In contrast, thaumasite containing a hexacoordinated silicon complex of Si(OH)2–6 (a rare octahedral configuration for Si) consists of a cylindrical column of Ca3[Si(OH)6·12H2O]4+ in the c axis, with sulfate and carbonate anions in channels between these columns which contain water molecules as well. Further research: Ongoing research on ettringite and cement phase minerals is performed to find new ways to immobilize toxic anions (e.g., borate, selenate and arsenate) and heavy metals to avoid their dispersion in soils and the environment; this can be achieved by using the proper cement phases whose crystal lattice can accommodate these elements. For example, copper immobilization at high pH can be achieved through the formation of C-S-H/C-A-H and ettringite. The crystal structure of ettringite Ca6Al2(SO4)3(OH)12·26H2O can incorporate a variety of divalent ions: Cu2+, Pb2+, Cd2+ and Zn2+, which can substitute for Ca2+.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Real-Time Media Flow Protocol** Real-Time Media Flow Protocol: The Secure Real-Time Media Flow Protocol (RTMFP) is a protocol suite developed by Adobe Systems for encrypted, efficient multimedia delivery through both client-server and peer-to-peer models over the Internet. The protocol was originally proprietary, but was later opened up and is now published as RFC 7016. Operation: RTMFP allows users of live, real‐time communications, such as social networking services and multi‐user games, to communicate directly with each other using their computer's microphone and webcam. RTMFP is a peer-to-peer system, but is only designed for direct end user to end user communication for real-time communication, not for file sharing between multiple peers using segmented downloading. Facebook uses this protocol in its Pipe applicationRTMFP enables direct, live, real‐time communication for applications such as audio and video chat and multi‐player games. RTMFP flows data between the end‐user clients and not the server, bandwidth is not being used at the server. RTMFP uses the User Datagram Protocol, (UDP) to send video and audio data over the Internet, so needs to handle missing, dropped, or out of order packets. RTMFP has two features that may help to mitigate the effects of connection errors. Operation: Rapid Connection Restore: Connections are re‐established quickly after brief outages. For example, when a wireless network connection experiences a dropout. After reconnection, the connection has full capabilities instantly. IP Mobility: Active network peer sessions are maintained even if a client changes to a new IP address. For example, when a laptop on a wireless network is plugged into a wired connection and receives a new address. Difference between RTMP and RTMFP: The principal difference is how the protocols communicate over the network. RTMFP is based on User Datagram Protocol (UDP), whereas Real-Time Messaging Protocol (RTMP) is based on Transmission Control Protocol (TCP). UDP‐based protocols have some specific advantages over TCP‐based protocols when delivering live streaming media, such as decreased latency and overhead, and greater tolerance for dropped or missing packets, at the cost of decreased reliability. Difference between RTMP and RTMFP: Unlike RTMP, RTMFP also supports sending data directly from one Adobe Flash Player to another, without going through a server. A server‐side connection will always be required to establish the initial connection between the end‐users and can be used to provide server‐side data execution or gateways into other systems. The user of a Flash Media Server will also be required to authorize network address lookup and NAT traversal services for the clients to prevent Flash Player from being used in an unmanaged way. Application-level multicast: Flash Player 10.0 allowed only one-to-one communication for P2P, but from 10.1 application-level multicast is allowed. Flash Player finds appropriate distribution route (overlay network), and can distribute to the group, which is connected by P2P. History: RTMFP's underlying protocols are the result of Adobe's acquisition of Amicima in 2006; strong architectural similarities exist between RTMFP and Amicima's GPL-licensed Secure Media Flow Protocol (MFP).
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Software engineering professionalism** Software engineering professionalism: Software engineering professionalism is a movement to make software engineering a profession, with aspects such as degree and certification programs, professional associations, professional ethics, and government licensing. The field is a licensed discipline in Texas in the United States (Texas Board of Professional Engineers, since 2013), Engineers Australia(Course Accreditation since 2001, not Licensing), and many provinces in Canada. History: In 1993 the IEEE and ACM began a joint effort called JCESEP, which evolved into SWECC in 1998 to explore making software engineering into a profession. The ACM pulled out of SWECC in May 1999, objecting to its support for the Texas professionalization efforts, of having state licenses for software engineers. ACM determined that the state of knowledge and practice in software engineering was too immature to warrant licensing, and that licensing would give false assurances of competence even if the body of knowledge were mature. History: The IEEE continued to support making software engineering a branch of traditional engineering. History: In Canada the Canadian Information Processing Society established the Information Systems Professional certification process. Also, by the late 1990s (1999 in British Columbia) the discipline of software engineering as a professional engineering discipline was officially created. This has caused some disputes between the provincial engineering associations and companies who call their developers software engineers, even though these developers have not been licensed by any engineering association.In 1999, the Panel of Software Engineering was formed as part of the settlement between Engineering Canada and the Memorial University of Newfoundland over the school's use of the term "software engineering" in the name of a computer science program. Concerns were raised over inappropriate use of the name "software engineering" to describe non-engineering programs could lead to student and public confusion, and ultimately threaten public safety. The Panel issued recommendations to create a Software Engineering Accreditation Board, but the task force created to carry out the recommendations were unable to get the various stakeholders to agree to concrete proposals, resulting in separate accreditation boards. Ethics: Software engineering ethics is a large field. In some ways it began as an unrealistic attempt to define bugs as unethical. More recently it has been defined as the application of both computer science and engineering philosophy, principles, and practices to the design and development of software systems. Due to this engineering focus and the increased use of software in mission critical and human critical systems, where failure can result in large losses of capital but more importantly lives such as the Therac-25 system, many ethical codes have been developed by a number of societies, associations and organizations. These entities, such as the ACM, IEEE, EGBC and Institute for Certification of Computing Professionals (ICCP) have formal codes of ethics. Adherence to the code of ethics is required as a condition of membership or certification. According to the ICCP, violation of the code can result in revocation of the certificate. Also, all engineering societies require conformance to their ethical codes; violation of the code results in the revocation of the license to practice engineering in the society's jurisdiction. Ethics: These codes of ethics usually have much in common. They typically relate the need to act consistently with the client's interest, employer's interest, and most importantly the public's interest. They also outline the need to act with professionalism and to promote an ethical approach to the profession. A Software Engineering Code of Ethics has been approved by the ACM and the IEEE-CS as the standard for teaching and practicing software engineering. Examples of codes of conduct The following are examples of codes of conduct for Professional Engineers. These 2 have been chosen because both jurisdictions have a designation for Professional Software Engineers. Ethics: Engineers and Geoscientists of British Columbia (EGBC): All members in the association's code of Ethics must ensure that government, the public can rely on BC's professional engineers and Geoscientists to act at all times with fairness, courtesy and good faith to their employers, employee and customers, and to uphold the truth, honesty and trustworthiness, and to safe guard human life and the environment. This is just one of the many ways in which BC's Professional Engineers and Professional Geoscientists maintain their competitive edge in today's global marketplace. Ethics: Association of Professional Engineers and Geoscientists of Alberta (APEGA): Different with British Columbia, the Alberta Government granted self governance to engineers, Geoscientists and geophysicists. All members in the APEGA have to accept legal and ethical responsibility for the work and to hold the interest of the public and society. The APEGA is a standards guideline of professional practice to uphold the protection of public interest for engineering, Geoscientists and geophysics in Alberta. Ethics: Opinions on ethics Bill Joy argued that "better software" can only enable its privileged end users, make reality more power-pointy as opposed to more humane, and ultimately run away with itself so that "the future doesn't need us." He openly questioned the goals of software engineering in this respect, asking why it isn't trying to be more ethical rather than more efficient. In his book Code and Other Laws of Cyberspace, Lawrence Lessig argues that computer code can regulate conduct in much the same way as the legal code. Lessig and Joy urge people to think about the consequences of the software being developed, not only in a functional way, but also in how it affects the public and society as a whole. Ethics: Overall, due to the youth of software engineering, many of the ethical codes and values have been borrowed from other fields, such as mechanical and civil engineering. However, there are many ethical questions that even these, much older, disciplines have not encountered. Questions about the ethical impact of internet applications, which have a global reach, have never been encountered until recently and other ethical questions are still to be encountered. This means the ethical codes for software engineering are a work in progress, that will change and update as more questions arise. Independent licensing and certification exams: Since 2002, the IEEE Computer Society offered the Certified Software Development Professional (CSDP) certification exam (in 2015 this was replaced by several similar certifications). A group of experts from industry and academia developed the exam and maintained it. Donald Bagert, and at later period Stephen Tockey headed the certification committee. Contents of the exam centered around the SWEBOK (Software Engineering Body of Knowledge) guide, with the additional emphasis on Professional Practices and Software Engineering Economics knowledge areas (KAs). The motivation was to produce a structure at an international level for software engineering's knowledge areas. Criticism of licensing: Professional licensing has been criticized for many reasons. Criticism of licensing: The field of software engineering is too immature Licensing would give false assurances of competence even if the body of knowledge were mature Software engineers would have to study years of calculus, physics, and chemistry to pass the exams, which is irrelevant to most software practitioners. Many (most?) computer science majors don't earn degrees in engineering schools, so they are probably unqualified to pass engineering exams. Licensing by country: United States The Bureau of Labor Statistics (BLS) classifies computer software engineers as a subcategory of "computer specialists", along with occupations such as computer scientist, Programmer, Database administrator and Network administrator. The BLS classifies all other engineering disciplines, including computer hardware engineers, as engineers.Many states prohibit unlicensed persons from calling themselves an Engineer, or from indicating branches or specialties not covered licensing acts. In many states, the title Engineer is reserved for individuals with a Professional Engineering license indicating that they have shown minimum level of competency through accredited engineering education, qualified engineering experience, and engineering board's examinations.In April 2013 the National Council of Examiners for Engineering and Surveying (NCEES) began offering a Professional Engineer (PE) exam for Software Engineering. The exam was developed in association with the IEEE Computer Society. NCEES ended the exam in April 2019 due to lack of participation.The American National Society of Professional Engineers provides a model law and lobbies legislatures to adopt occupational licensing regulations. The model law requires: a four-year degree from a university program accredited by the Engineering Accreditation Committee (EAC) of the Accreditation Board for Engineering and Technology (ABET), an eight-hour examination on the fundamentals of engineering (FE) usually taken in the senior year of college, four years of acceptable experience, a second examination on principles and practice, and written recommendations from other professional engineers.Some states require continuing education. Licensing by country: In Texas Donald Bagert of Texas became the first professional software engineer in the U.S. on September 4, 1998 or October 9, 1998. As of May 2002, Texas had issued 44 professional engineering licenses for software engineers. Rochester Institute of Technology granted the first Software Engineering bachelor's degrees in 2001. Other universities have followed. Licensing by country: Canada In Canada, the use of the job title Engineer is controlled in each province by self-regulating professional engineering organizations who are also tasked with enforcement of the governing legislation. The intent is that any individual holding themselves out as an engineer has been verified to have been educated to a certain accredited level and their professional practice is subject to a code of ethics and peer scrutiny. It is also illegal to use the title Engineer in Canada unless an individual is licensed. Licensing by country: IT professionals with degrees in other fields (such as computer science or information systems) are restricted from using the title Software Engineer, or wording Software Engineer in a title, depending on their province or territory of residence.In some instances, cases have been taken to court regarding the illegal use of the protected title Engineer.Most Canadians who earn professional software engineering licenses study software engineering, computer engineering or electrical engineering. Many times these people already qualified to become professional engineers in their own fields but choose to be licensed as software engineers to differentiate themselves from computer scientists. Licensing by country: In British Columbia, The Limited Licence is granted by the Engineers and Geoscientists of British Columbia. Fees are collected by EGBC for the Limited Licensee. Licensing by country: Ontario In Ontario, the Professional Engineers Act stipulates a minimum education level of a three-year diploma in technology from a College of Applied Arts and Technology or a degree in a relevant science area. However, engineering undergraduates and all other applicants are not allowed to use the title of engineer until they complete the minimum amount of work experience of four years in addition to completing the Professional Practice Examination (PPE). If the applicant does not hold an undergraduate engineering degree then they may have to take the Confirmatory Practice Exam or Specific Examination Program unless the exam requirements are waived by a committee.A person must be granted the “professional engineer” licence to have the right to practise professional software engineering as a Professional Engineer in Ontario. Licensing by country: To become licensed by Professional Engineers Ontario (PEO), one must: Be at least 18 years of age. Be a citizen or permanent resident of Canada. Be of good character. Applicants will be requested to answer questions and make a written declaration on the form as a test of ethics. Meet PEO's stipulated academic requirements for licensure. Pass the Professional Practice Examination. Licensing by country: Fulfill engineering work experience requirements.Many graduates of Software Engineering programs are unable to obtain the PEO licence since the work they qualify for after graduation as entry-level is not related to engineering i.e. working in a software company writing code or testing code would not qualify them as their work experience does not fulfill the work experience guidelines the PEO sets. Also Software Engineering programs in Ontario and other provinces involve a series of courses in electrical, electronics, and computers engineering qualifying the graduates to even work in those fields. Licensing by country: Quebec A person must be granted the “engineer” licence to have the right to practise professional software engineering in Quebec. To become licensed by the Quebec order of engineers (in French : Ordre des ingénieurs du Québec - OIQ), a candidate must: Be at least 18 years of age. Be of good character. The candidate will be requested to answer questions and make a written declaration on the application form to test their ethics. Meet OIQ's stipulated academic requirements for licensure. In this case, the academic program should be accredited by the Canadian Engineering Accreditation Board - CEAB) Pass the Professional Practice Examination. Fulfill engineering work experience requirements. Licensing by country: Pass the working knowledge of French exam Software engineering (SEng) guidelines by Canadian provinces The term "engineer" in Canada is restricted to those who have graduated from a qualifying engineering programme. Some universities’ "software engineering" programmes are under the engineering faculty and therefore qualify, for example the University of Waterloo. Others, such as the University of Toronto have "software engineering" in the computer science faculty which does not qualify. This distinction has to do with the way the profession is regulated. Degrees in "Engineering" must be accredited by a national panel and have certain specific requirements to allow the graduate to pursue a career as a professional engineer. "Computer Science" degrees, even those with specialties in software engineering, do not have to meet these requirements so the computer science departments can generally teach a wider variety of topics and students can graduate without specific courses required to pursue a career as a professional engineer. Licensing by country: Europe Throughout the whole of Europe, suitably qualified engineers may obtain the professional European Engineer qualification. France In France, the term ingénieur (engineer) is not a protected title and can be used by anyone, even by those who do not possess an academic degree. However, the title Ingénieur Diplomé (Graduate Engineer) is an official academic title that is protected by the government and is associated with the Diplôme d'Ingénieur, which is one of the most prestigious academic degrees in France. Licensing by country: Iceland The use of the title tölvunarfræðingur (computer scientist) is protected by law in Iceland. Software engineering is taught in Computer Science departments in Icelandic universities. Icelandic law state that a permission must be obtained from the Minister of Industry when the degree was awarded abroad, prior to use of the title. The title is awarded to those who have obtained a BSc degree in Computer Science from a recognized higher educational institution. Licensing by country: New Zealand In New Zealand, the Institution of Professional Engineers New Zealand (IPENZ), which licenses and regulates the country's chartered engineers (CPEng), recognizes software engineering as a legitimate branch of professional engineering and accepts application of software engineers to obtain chartered status provided they have a tertiary degree of approved subjects. Software Engineering is included whereas Computer Science is normally not.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**7α-Thiomethylspironolactone** 7α-Thiomethylspironolactone: 7α-Thiomethylspironolactone (7α-TMS; developmental code name SC-26519) is a steroidal antimineralocorticoid and antiandrogen of the spirolactone group and the major active metabolite of spironolactone. Other important metabolites of spironolactone include 7α-thiospironolactone (7α-TS; SC-24813), 6β-hydroxy-7α-thiomethylspironolactone (6β-OH-7α-TMS), and canrenone (SC-9376).Spironolactone is a prodrug with a short terminal half-life of 1.4 hours. The active metabolites of spironolactone have extended terminal half-lives of 13.8 hours for 7α-TMS, 15.0 hours for 6β-OH-7α-TMS, and 16.5 hours for canrenone, and accordingly, these metabolites are responsible for the therapeutic effects of the drug.7α-TS and 7α-TMS have been found to possess approximately equivalent affinity for the rat ventral prostate androgen receptor (AR) relative to that of spironolactone. The affinity of 7α-TS, 7α-TMS, and spironolactone for the rat prostate AR is about 3.0 to 8.5% of that of dihydrotestosterone (DHT). 7α-Thiomethylspironolactone: 7α-TMS has been found to account for around 80% of the potassium-sparing effect of spironolactone, whereas canrenone accounts for the remaining approximate 10 to 25% of the potassium-sparing effect of the drug.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**MyBatis** MyBatis: MyBatis is a Java persistence framework that couples objects with stored procedures or SQL statements using an XML descriptor or annotations. MyBatis is free software that is distributed under the Apache License 2.0. MyBatis is a fork of iBATIS 3.0 and is maintained by a team that includes the original creators of iBATIS. Feature summary: Unlike ORM frameworks, MyBatis does not map Java objects to database tables but Java methods to SQL statements. MyBatis lets you use all your database functionality like stored procedures, views, queries of any complexity and vendor proprietary features. It is often a good choice for legacy or de-normalized databases or to obtain full control of SQL execution. It simplifies coding compared to JDBC. SQL statements are executed with a single line. MyBatis provides a mapping engine that maps SQL results to object trees in a declarative way. SQL statements can be built dynamically by using a built-in language with XML-like syntax or with Apache Velocity using the Velocity integration plugin. MyBatis integrates with Spring Framework and Google Guice. This feature allows one to build business code free of dependencies. Feature summary: MyBatis supports declarative data caching. A statement can be marked as cacheable so any data retrieved from the database will be stored in a cache and future executions of that statement will retrieve the cached data instead hitting the database. MyBatis provides a default cache implementation based on a Java HashMap and default connectors for integrating with: OSCache, Ehcache, Hazelcast and Memcached. It provides an API to plug other cache implementations. Usage: SQL statements are stored in XML files or annotations. Below depicts a MyBatis mapper, that consists of a Java interface with some MyBatis annotations: The sentence is executed as follows. SQL statements and mappings can also be externalized to an XML file as follows. Statements can also be executed using the MyBatis API. For details, please refer to the User Guide available at MyBatis site. See external links. Spring integration: MyBatis integrates with Spring Framework. This module allows MyBatis to participate in Spring transactions. It will also build MyBatis mappers and sessions and inject them into other beans. The following sample shows a basic XML configuration that sets up a mapper and injects it into a "BlogService" bean. Calling MyBatis is now just calling a bean: Velocity language: The Velocity language driver lets you use Apache Velocity to generate your dynamic SQL queries on the fly. MyBatis Generator: MyBatis provides a code generator. MyBatis Generator will introspect a database table (or many tables) and generate MyBatis artifacts needed to perform CRUD operations (Create, Retrieve, Update, Delete). An Eclipse plugin is available. It will preserve any custom code in case of regeneration but only if you use the Eclipse plugin. MyBatis Migrations: MyBatis Migrations is a Java command line tool that keeps track of database schema changes managing DDL files (known as migrations). Migrations allows to query the current status of the database, apply schema changes and also undo them. It also helps to detect and solve concurrent database schema changes made by different developers. History: MyBatis project is a subsidiary of iBATIS 3.0 and maintained by a team which includes the original creators of iBATIS. The project was created on May 19, 2010 when Apache iBATIS 3.0 was published and the team announced that the development will continue under a new name and a new home at Google Code.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**People-watching** People-watching: People-watching or crowd watching is the act of observing people and their interactions as a subconscious doing. It involves picking up on idiosyncrasies to try to interpret or guess at another person's story, interactions, and relationships with the limited details they have. This includes speech in action, relationship interactions, body language, expressions, clothing and activities. Eavesdropping may accompany the activity, though is not required.For some people, it is considered a hobby, but for many others, it is a subconscious activity they partake in every day without even realizing it. People-watching is not to be confused with naturalistic observation. Naturalistic observation is used for scientific purposes, whereas people-watching is a casual activity, used for relaxation or inspiration for characters or characters' mannerisms in their own creative works. It should also not be confused with street photography; while the street photographer necessarily does people-watching, they do so for the purpose of taking photographs of the people for art and documentary purposes.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Quad digital audio processor** Quad digital audio processor: The quad digital audio processor (QDAP) was a digital signal processor (DSP) based printed circuit card designed at Computer Consoles Inc. (CCI) in Rochester, NY. The QDAP was a service circuit module developed as part of the companies digital telephony switching system. The main function of the card was the processing of incoming digital audio to detect the speech patterns using speaker independent speech recognition. The CCI digital switch was deployed as part of the Digital Audio Intercept System (DAIS II), Automatic Voice Response (AVR), and Interactive Voice System (IVS) products. The initial QDAP board is notable for introducing speech recognition into the public telephone network to automate the handling of operator assisted telephone calls. Variants: QDAP-I: This printed circuit card, designed by Mark A. Indovina, was introduced in late 1987 and contained four TMS320C25 16-bit fixed point DSP chips operating at 40 MHz. Features: Each TMS320C25 DSP core processed four simultaneous digital audio channels. The card deployed speaker independent speech recognition for multiple languages The speaker independent speech recognition vocabulary database could be efficiently changed by downloading an update over the switch time-slot network at any time The speaker independent speech recognition vocabulary database could created by the hosting telephone company as necessary based on the call scenario
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Nanoradio** Nanoradio: A nanoradio (also called carbon nanotube radio) is a nanotechnology acting as a radio transmitter and receiver by using carbon nanotubes. One of the first nanoradios was constructed in 2007 by researchers under Alex Zettl at the University of California, Berkeley where they successfully transmitted an audio signal. Due to the small size, nanoradios can have several possible applications such as radio function in the bloodstream. History: The first observation of a nanoradio can be accredited to a Japanese physicist Sumio Iijima in 1991 who saw a "a luminous discharge of electricity" coming from a carbon nanotube on a graphite electrode. On October 31, 2007, a team of researchers under Alex Zettl at the University of California, Berkeley created one of the first nanoradios. Their experiment consisted of placing a multilayered nanotube placed on a silicon electrode and connecting it to a counter electrode through a wire and a DC battery. Both the electrode and nanotube were also put in a vacuum of about 10−7 Torr. They then placed the apparatus into a high-resolution transmission electron microscope to document the movement of the nanotube. They observed the nanoradio vibrating and transmitted a song called "Layla" by Eric Clapton. After some minor adjustments, the team was able to transmit and receive signals from a couple meters across the laboratory; however, the initial audio receptions from the radio were scratchy which Zettl believed was due to the lack of a better vacuum. Properties: The small size, roughly 10 nanometers wide and hundreds of nanometers long, and composition of nanoradios provide several distinct properties. The small size of nanoradios enables electrons to pass through without much friction, making nanoradios efficient conductors. Nanoradios can also come in different sizes; they can be double-walled, tripled-walled and multi-walled. Aside from the different sizes, nanoradios can also take different shapes such as bent, straight or toroidal. Common among all nanoradios is how relatively strong they are. The resistance can be attributed to the strength of the bonds between carbon atoms. Function: The fundamental parts of a radio are the antenna, tuner, demodulator and amplifier. Carbon nanotubes are special in that they can function as these parts without the need of extra circuitry. Function: Antenna The nanoradio is small enough for electromagnetic signals to mechanically vibrate the nanoradio. The nanoradio essentially acts as an antenna by vibrating with the same frequency as the signal from incoming electromagnetic waves; this is in contrast with traditional radio antennas, which are generally stationary. The nanotube can vibrate in high frequencies, from "thousands to millions of times per second." Tuner The nanoradio can also function as a tuner by extending or reducing the length of the nanotube; doing so changes the resonance frequency at which it vibrates, enabling the radio to tune into specific frequencies. The length of the nanotube can be extended by pulling the tip with a positive electrode and can be shortened by removing atoms off the tip. Consequently, changing the length is permanent and can't be reversed; however, the method of varying the electric field can also affect the frequency that the nanoradio responds without being permanent. Function: Amplifier As a benefit of the microscopic size and needle-like shape, the nanoradio functions naturally as an amplifier. The nanoradio exhibits field emission, in which a small voltage emits a flow of electrons; due to this, a small electromagnetic wave would produce a large flow of electrons, amplifying the signal. Demodulator Demodulation is essentially the separation of the information signal from the carrier wave. When the nanoradio vibrates in sync with the carrier wave, the nanoradio responds only to the information signal and ignores the carrier wave; and so, the nanoradio can act as a demodulator without the need of circuitry. Medical Application: Currently, chemotherapy uses chemicals that harm not only cancerous cells, but also healthy ones since they are put into the blood stream. Nanoradios can be used to prevent damage to healthy cells by remotely communicating with the radio to release drugs and specifically target cancerous cells. Nanoradios can also be injected into individual cells to release certain chemicals, enabling repair of specific cells. Nanoradios can also be used to monitor insulin levels of diabetes patients and use that information to release a drug or chemical. Complications: The implanting of nanoradios in the body are currently not feasible due to power dissipation. The nanoradio radiates about 4.5 x 10−27 W of electromagnetic power; however, much of this power would be lost when passing through the body. The amount of energy input can be increased, but would generate too much heat in the body, posing a safety risk. Other issues include the difficulty of constructing a nanoradio due to its nanoscale size, requiring quantum models and precision to manufacture.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Adornment** Adornment: An adornment is generally an accessory or ornament worn to enhance the beauty or status of the wearer. They are often worn to embellish, enhance, or distinguish the wearer, and to define cultural, social, or religious status within a specific community. When worn to show economic status, the items are often either rare or prohibitively expensive to others. Adornments are usually colourful, and worn to attract attention. Adornment: They have a long history, around the world, from feathers or bone, to modern accessories, such as jewellery. Items of adornment are also used by warriors, and by other members of the military to show rank or achievement. Items of adornment: These include cosmetics, jewellery, clothing accessories, facial hair, fingernail modification, piercing, lip plates, tattooing, braiding, and headgear. Cultures, subcultures, and institutions: Groups who practice adornment include the Yakuza, military, religious institutions, tribal groups, and the punk culture. Items of adornment can tell us about a person's rank, social status, gender role, area of origin, etc. An example would be the beaded jewelry worn by the Maasai tribe, which is very specific to them and some related tribes.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Wakeby distribution** Wakeby distribution: The Wakeby distribution is a five-parameter probability distribution defined by its quantile function, W(p)=ξ+αβ(1−(1−p)β)−γδ(1−(1−p)−δ) ,and by its quantile density function, W′(p)=w(p)=α(1−p)β−1+γ(1−p)−δ−1 ,where 0≤p≤1 , ξ is a location parameter, α and γ are scale parameters and β and δ are shape parameters.This distribution was first proposed by Harold A. Thomas Jr., who named it after Wakeby Pond in Cape Cod. Applications: The Wakeby distribution has been used for modeling distributions of flood flows, citation counts, extreme rainfall, tidal current speeds, and peak flows of rivers. Parameters and domain: The following restrictions apply to the parameters of this distribution: β+δ≥0 Either β+δ>0 or β=γ=δ=0 If γ>0 , then δ>0 γ≥0 α+γ≥0 The domain of the Wakeby distribution is ξ to ∞ , if δ≥0 and γ>0 ξ to ξ+(α/β)−(γ/δ) , if δ<0 or γ=0 With two shape parameters, the Wakeby distribution can model a wide variety of shapes. CDF and PDF: The cumulative distribution function is computed by numerically inverting the quantile function given above. The probability density function is then found by using the following relation (given on page 46 of Johnson, Kotz, and Balakrishnan): f(x)=(1−F(x))(δ+1)αt+γ where F is the cumulative distribution function and t=(1−F(x))(β+δ) An implementation that computes the probability density function of the Wakeby distribution is included in the Dataplot scientific computation library, as routine WAKPDF.An alternative to the above method is to define the PDF parametrically as (W(p),1/w(p)),0≤p≤1 . This can be set up as a probability density function, f(x) , by solving for the unique p in the equation W(p)=x and returning 1/w(p)
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Superscripts and Subscripts (Unicode block)** Superscripts and Subscripts (Unicode block): Superscripts and Subscripts is a Unicode block containing superscript and subscript numerals, mathematical operators, and letters used in mathematics and phonetics. The use of subscripts and superscripts in Unicode allows any polynomial, chemical and certain other equations to be represented in plain text without using any form of markup like HTML or TeX. Other superscript letters can be found in the Spacing Modifier Letters, Phonetic Extensions and Phonetic Extensions Supplement blocks, while the superscript 1, 2, and 3, inherited from ISO 8859-1, were included in the Latin-1 Supplement block. History: The following Unicode-related documents record the purpose and process of defining specific characters in the Superscripts and Subscripts block:
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Geometry C** Geometry C: The Geometry C is a battery-powered compact crossover produced by Chinese auto manufacturer Geely under the Geometry brand. Overview: The Geometry C is the second model of the Geometry brand. It was developed based on the Geely Emgrand GS, and comes in a choice of two battery capacities, a 53 kWh and a longer-range 70 kWh providing a NEDC range of 400 and 500 km (249 and 311 mi) respectively, with the cells in both batteries coming from CATL. The electric motors were produced by Nidec and can produce up to 150 kW. The motors are called the Ni150Ex and will cover a power range from 50 kW to 200 kW. Geometry C has 200 hp (150 kW; 200 PS) that drives the front wheels and has a top speed of 150 km/h (93 mph).The Geometry C became Israel's top-selling vehicle in August of 2022, marking the first time that an electric car held the top spot in total vehicle sales in the Israeli market.On February 9, 2023, Geely Geometry C was introduced to the African market for the first time, and launched in the Egyptian market. Overview: Geometry G6 The Geometry M6 is the facelifted variant of the Geometry C launched in September 2022. The M6 features restyled front and rear end designs as well as the Harmony OS operating system by Huawei. The power comes from a 150kW electric motor with two variants offering a 450km and 580km electric range respectively.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Leukorrhea** Leukorrhea: Leukorrhea or (leucorrhoea British English), also known as fluor albus, is a thick, whitish, yellowish or greenish vaginal discharge. It has also been referred to as "the whites". Leukorrhea: There are many causes of leukorrhea, the usual one being estrogen imbalance. The amount of discharge may increase due to vaginal infection, and it may disappear and reappear from time to time. This discharge can keep occurring for years, in which case it becomes more yellow and strong-smelling. It is usually a non-pathological symptom secondary to inflammatory conditions of the vagina or cervix.Leukorrhea can be confirmed by finding >10 WBC per high-power field under a microscope when examining vaginal fluid.Vaginal discharge is normal, and causes of change in discharge include infection, malignancy, and hormonal changes. It sometimes occurs before an adolescent female has her first period, and is considered a sign of puberty. Etymology: The word leukorrhea comes from Greek λευκός (leukós, “white”) + ῥοία (rhoía, “flow, flux”). In Latin leukorrhea is fluor albus (fluor, "flow" & albus, "white"). Types: Physiologic leukorrhea It is not a major issue but is to be resolved as soon as possible. It can be a natural defense mechanism that the vagina uses to maintain its chemical balance, as well as to preserve the flexibility of the vaginal tissue. The term "physiologic leukorrhea" is used to refer to leukorrhea due to estrogen stimulation.Leukorrhea may occur normally during pregnancy. This is caused by increased bloodflow to the vagina due to increased estrogen. Female infants may have leukorrhea for a short time after birth due to their in-uterine exposure to estrogen. Types: Inflammatory leukorrhea It may also result from inflammation or congestion of the vaginal mucosa. In cases where it is yellowish or gives off an odor, a doctor should be consulted since it could be a sign of several disease processes, including an organic bacterial infection (aerobic vaginitis) or STD.After delivery, leukorrhea accompanied by backache and foul-smelling lochia (post-partum vaginal discharge, containing blood, mucus, and placental tissue) may suggest the failure of involution (the uterus returning to pre-pregnancy size) due to infection. A number of investigation such as wet smear, Gram stain, culture, pap smear and biopsy are suggested to diagnose the condition. Types: Parasitic leukorrhea Leukorrhea is also caused by trichomonads, a group of parasitic protozoan, specifically Trichomonas vaginalis. Common symptoms of this disease are burning sensation, itching and discharge of frothy substance, thick, white or yellow mucous. Treatment: Leukorrhea may be caused by sexually transmitted diseases; therefore, treating the STD will help treat the leukorrhea. Treatment may include antibiotics, such as metronidazole. Other antibiotics common for the treatment of STIs include clindamycin or tinidazole.
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded
**Dumsor** Dumsor: In Ghana, dumsor (Akan pronunciation: [dum sɔ] 'off and on') is a persistent, irregular, and unpredictable electric power outage. The frequent Ghanaian blackouts are caused by power supply shortage. Ghanaian generating capacity by 2015 was 400-600 megawatts, less than Ghana needed. Ghanaian electricity distributors regularly shed load with rolling blackouts.At the beginning of 2015, the dumsor schedule went from 24 hours with light and 12 without to 12 hours with light and 24 without. The long blackouts contrast with the practice in other countries, where blackouts roll rapidly so that no residential area is without power for more than one hour at a time.The re-introduction of dumsor in 2019 without publishing the requisite load shedding schedule came along with the term dumsaa meaning off for a considerably long time or off all the time. Terminology: The term is derived from two separate words from the Asante Twi, the Akuapem Twi or Fante dialects of the Akan language, dum ('to turn off or quench') and sɔ ('to turn on or to kindle'), and so the term roughly translates as "off-and-on". The term has also recently evolved into dum dum: sɔ no mma ('off and off') because of the increase in the intensity of the power outages.In 2018, a new term was coined by the energy minister who referred to the dumsor as dum koraa, as compared to the intermittent power outages now dum so, as the country faces outages.By early 2019, Ghanaians began to experience another wave of a controversial dumsor or load shedding, whose schedule was not published, despite the norm. Ghana's Parliament was even divided on how to call it. This thus ushered in the term dumsaa: supposedly, a superlative form of dumsor. Terminology: While officials of Ghana's energy sector regulators claimed that dumsaa, the new wave of dumsor, was due to transmission failures, sector analysts believed dumsaa was a matter of gross corporate liquidity mismanagement. History: Ghana's power supply became erratic in early 2001. There was reduced generation capacity, due to a significant drop in water levels at the Akosombo Dam (Ghana's main hydro-electric dam). Water levels rose and the power crisis was temporarily resolved in late 2008. In August 2012, the government told Ghanaians that a ship's anchor cut the West African Gas Pipeline (WAGP), forcing gas turbines to shut down for lack of fuel. Since 2012, load shedding has become a regular experience, and the country has plunged into a major power crisis. Social and economic effects: Many Ghanaian companies were collapsing due to the irregularity of the power supply. The Institute of Statistical, Social and Economic Research (ISSER), in a report, stated that Ghana lost about 1 billion dollars in 2014 alone because of dumsor. Social and economic effects: A woman in labour at the Bawku Presby Hospital who gave birth and was on oxygen lost both her life and that of the unborn baby after power supply went off in February 2016.Electronic equipment has been avoidably damaged, and refrigerated food regularly spoiled. Contrary to the published load shedding schedule, blackouts concentrated on poorer neighbourhoods of Accra. Health and safety was also harmed, with hospitals having no light, and electricity to run fans, contributed to an increasing malaria risk. Political effects: The 2004-2005 load shedding period happened under President John Agyekum Kufuor's administration but was not too frequent as during the tenure of John Dramani Mahama. The 2009–2011 load shedding period began when John Dramani Mahama was in government as Vice President. After the death of then-President John Evans Atta Mills during when the persistent on and off nature of the power supply in the country became abhorrent, Ghanaians out of frustration named the situation dumsor. The Mahama government blamed it on the government's inability to add significant generating capacity over the years and promised to fix this. Karpower Burge was brought in to solve the problem.The Ghanaian transmission system has been criticized by the World Bank for its poor financial and operational practices.The Ghanaian Ministry of Power was created in November 2014, using the same staff as the continuing Ghanaian Ministry of Energy. Political effects: Ghanaian actress Yvonne Nelson then started the #dumsormuststop campaign on social media and other Ghanaian celebrities joined her. Subsequently, hundreds attended a vigil in Accra on 16 May 2015 to protest against dumsor. Mitigation: The Ghanaian government has plans to diversify its energy sources, using more renewables. It is also working to encourage energy conservation. Usage: The word has been used by the general public in Ghana since 2012 in expressing anger, fun, mockery, worry and disappointment about the authorities and the ruling government.It has also gained popularity via social media websites such as Twitter and Facebook with the hashtag #Dumsor. In 2015, John Mahama used the word in a state visit to Germany while talking with Angela Merkel. He said he has been nicknamed "Mr. Dumsor" due to the power crisis, which he attributed to Nigeria for not supplying gas as required to Ghana through the West Africa Gas Pipeline.In a recent speech lamenting the poor electricity supply across Sub-Saharan African states, P. L. O. Lumumba, the Kenya lawyer and Pan-Africanist used the phrase dumsor dumsor making a statement that, "this dumsorization of African must stop".
kaggle.com/datasets/mbanaei/all-paraphs-parsed-expanded