page_content stringlengths 51 3.15k |
|---|
Electronic entropy Application to different materials classes Electronic_entropy > Application to different materials classes However, when oxides are metallic (i.e. the Fermi level lies within an unfilled, flat set of bands), oxides exhibit some of the largest electronic entropies of any material. Thermoelectric materials are specifically engineered to have large electronic entropies. The thermoelectric effect relies on charge carriers exhibiting large entropies, as the driving force to establish a gradient in electrical potential is driven by the entropy associated with the charge carriers. |
Eye contact Communicating attention Eye_contact > Effects > Communicating attention A person's direction of gaze may indicate to others where their attention lies. |
Adaptive market hypothesis Summary Adaptive_market_hypothesis This suggests that investors are capable of an optimal dynamic allocation. Lo argues that much of what behaviorists cite as counterexamples to economic rationality—loss aversion, overconfidence, overreaction, and other behavioral biases—are consistent with an evolutionary model of individuals adapting to a changing environment using simple heuristics. Even fear and greed, which are viewed as the usual culprits in the failure of rational thinking by the behaviorists, are driven by evolutionary forces. |
GotoBLAS Summary GotoBLAS GotoBLAS's matrix-matrix multiplication routine, called GEMM in BLAS terms, is highly tuned for the x86 and AMD64 processor architectures by means of handcrafted assembly code. It follows a similar decomposition into smaller "kernel" routines that other BLAS implementations use, but where earlier implementations streamed data from the L1 processor cache, GotoBLAS uses the L2 cache. The kernel used for GEMM is a routine called GEBP, for "General block-times-panel multiply", which was experimentally found to be "inherently superior" over several other kernels that were considered in the design.Several other BLAS routines are, as is customary in BLAS libraries, implemented in terms of GEMM.As of January 2022, the Texas Advanced Computing Center website states that Goto BLAS in no more maintained and suggests the use of BLIS or MKL. |
Thermodynamical equilibrium Number of real variables needed for specification Equilibrium_state > Characteristics of a state of internal thermodynamic equilibrium > Number of real variables needed for specification Kirkwood and I. Oppenheim point out that a state of thermodynamic equilibrium may be defined by a special subclass of intensive variables, with a definite number of members in that subclass. If the thermodynamic equilibrium lies in an external force field, it is only the temperature that can in general be expected to be spatially uniform. Intensive variables other than temperature will in general be non-uniform if the external force field is non-zero. In such a case, in general, additional variables are needed to describe the spatial non-uniformity. |
Photographic lens Summary Camera_lens While in principle a simple convex lens will suffice, in practice a compound lens made up of a number of optical lens elements is required to correct (as much as possible) the many optical aberrations that arise. Some aberrations will be present in any lens system. It is the job of the lens designer to balance these and produce a design that is suitable for photographic use and possibly mass production. |
Gradient-index optics In nature Gradient_index_lens > In nature The lens of the eye is the most obvious example of gradient-index optics in nature. In the human eye, the refractive index of the lens varies from approximately 1.406 in the central layers down to 1.386 in less dense layers of the lens. This allows the eye to image with good resolution and low aberration at both short and long distances.Another example of gradient index optics in nature is the common mirage of a pool of water appearing on a road on a hot day. The pool is actually an image of the sky, apparently located on the road since light rays are being refracted (bent) from their normal straight path. |
Layer 2 Tunneling Protocol Tunneling models Layer_2_Tunneling_Protocol > Tunneling models An L2TP tunnel can extend across an entire PPP session or only across one segment of a two-segment session. This can be represented by four different tunneling models, namely: voluntary tunnel compulsory tunnel — incoming call compulsory tunnel — remote dial L2TP multihop connection |
Pointer analysis Introduction Pointer_analysis > Introduction Flow sensitivity: An analysis can model the impact of intraprocedural control flow on points-to facts. Heap modeling: Run-time allocations may be abstracted by: their allocation sites (the statement or instruction that performs the allocation, e.g., a call to malloc or an object constructor), a more complex model based on a shape analysis, the type of the allocation, or one single allocation (this is called heap-insensitivity). Heap cloning: Heap- and context-sensitive analyses may further qualify each allocation site by a summary of the control flow leading to the instruction or statement performing the allocation. Subset constraints or equality constraints: When propagating points-to facts, different program statements may induce different constraints on a variable's points-to sets. Equality constraints (like those used in Steensgaard's algorithm) can be tracked with a union-find data structure, leading to high performance at the expense of the precision of a subset-constraint based analysis (e.g., Andersen's algorithm). |
Prosopographical network Overview Prosopographical_network > Overview With the advent of the study of complex systems, graph theory provides analysts of historical groups and collective lives with relatively simple tools for answering questions such as: how many degrees of separation on average separate all members of the prosopographical group? Which historical character is connected to the most other members of the studied range? How densely or loosely connected was the group as a whole? Such questions hold a natural interest for prosopographers, who can then begin to look for certain characteristics –class, office, occupation, gender, faction, ethnic background – and identify patterns of connectivity that they might have otherwise missed when confronted with a mass of data too large for normal synthetic approaches. The concepts and methods of social network analysis in historical research are recently being used not only as a mere metaphor but are increasingly applied in practice |
Borderline personality disorder Diagnostic and Statistical Manual Borderline_personality_disorder > Diagnosis > Diagnostic and Statistical Manual In addition, the DSM-5 proposes alternative diagnostic criteria for BPD in section III, "Alternative DSM-5 Model for Personality Disorders". These alternative criteria are based on trait research and include specifying at least four of seven maladaptive traits. According to Marsha Linehan, many mental health professionals find it challenging to diagnose BPD using the DSM criteria, since these criteria describe such a wide variety of behaviors. To address this issue, Linehan has grouped the symptoms of BPD under five main areas of dysregulation: emotions, behavior, interpersonal relationships, sense of self, and cognition. |
Methyl transferase Summary Methyl_transferase These types include protein methyltransferases, DNA/RNA methyltransferases, natural product methyltransferases, and non-SAM dependent methyltransferases. SAM is the classical methyl donor for methyltransferases, however, examples of other methyl donors are seen in nature. The general mechanism for methyl transfer is a SN2-like nucleophilic attack where the methionine sulfur serves as the leaving group and the methyl group attached to it acts as the electrophile that transfers the methyl group to the enzyme substrate. |
Method of variation of parameters Intuitive explanation Variation_of_parameters > Intuitive explanation {\displaystyle x(t)=\int _{0}^{t}F(s)\sin(t-s)\,ds.} To verify that this satisfies the required equation: x ′ ( t ) = ∫ 0 t F ( s ) cos ( t − s ) d s {\displaystyle x'(t)=\int _{0}^{t}F(s)\cos(t-s)\,ds} x ″ ( t ) = F ( t ) − ∫ 0 t F ( s ) sin ( t − s ) d s = F ( t ) − x ( t ) , {\displaystyle x''(t)=F(t)-\int _{0}^{t}F(s)\sin(t-s)\,ds=F(t)-x(t),} as required (see: Leibniz integral rule). The general method of variation of parameters allows for solving an inhomogeneous linear equation L x ( t ) = F ( t ) {\displaystyle Lx(t)=F(t)} by means of considering the second-order linear differential operator L to be the net force, thus the total impulse imparted to a solution between time s and s+ds is F(s)ds. |
Arterial pressures Pulmonary pressure Diastolic_pressure > Pulmonary pressure Normally, the pressure in the pulmonary artery is about 15 mmHg at rest.Increased blood pressure in the capillaries of the lung causes pulmonary hypertension, leading to interstitial edema if the pressure increases to above 20 mmHg, and to pulmonary edema at pressures above 25 mmHg. |
Conformational analysis Equilibrium of conformers Alkane_stereochemistry > Free energy and equilibria of conformational isomers > Equilibrium of conformers (The "1.36 rule" is useful in general for estimation of equilibrium constants at room temperature from free energy differences. At lower temperatures, a smaller energy difference is needed to obtain a given equilibrium constant.) Three isotherms are given in the diagram depicting the equilibrium distribution of two conformers at different temperatures. |
Permutation pattern Generalizations Permutation_pattern > Generalizations Another generalization is that of a barred pattern, in which some of the entries are barred. For π to avoid the barred pattern β means that every set of entries of π which form a copy of the nonbarred entries of β can be extended to form a copy of all entries of β. West (1993) introduced these types of patterns in his study of permutations which could be sorted by passing them twice through a stack. (Note that West's definition of sorting twice through a stack is not the same as sorting with two stacks in series.) Another example of barred patterns occurs in the work of Bousquet-Mélou & Butler (2007), who showed that the Schubert variety corresponding to π is locally factorial if and only if π avoids 1324 and 21354. |
Heap overflow Consequences Heap_overflow > Consequences An accidental overflow may result in data corruption or unexpected behavior by any process that accesses the affected memory area. On operating systems without memory protection, this could be any process on the system. For example, a Microsoft JPEG GDI+ buffer overflow vulnerability could allow remote execution of code on the affected machine.iOS jailbreaking often uses heap overflows to gain arbitrary code execution. |
Algorithm characterizations 1954 A. A. Markov Jr.'s characterization Algorithm_characterization > 1954 A. A. Markov Jr.'s characterization Andrey Markov Jr. (1954) provided the following definition of algorithm: "1. In mathematics, "algorithm" is commonly understood to be an exact prescription, defining a computational process, leading from various initial data to the desired result....""The following three features are characteristic of algorithms and determine their role in mathematics: "a) the precision of the prescription, leaving no place to arbitrariness, and its universal comprehensibility -- the definiteness of the algorithm; "b) the possibility of starting out with initial data, which may vary within given limits -- the generality of the algorithm; "c) the orientation of the algorithm toward obtaining some desired result, which is indeed obtained in the end with proper initial data -- the conclusiveness of the algorithm." (p.1)He admitted that this definition "does not pretend to mathematical precision" (p. |
Cryptographic key types Summary Cryptographic_key_types A cryptographic key is a string of data that is used to lock or unlock cryptographic functions, including authentication, authorization and encryption. Cryptographic keys are grouped into cryptographic key types according to the functions they perform. |
Technology stack Summary Solution_stack Typically, the name is an acronym representing the individual components.The term "solution stack" has, historically, occasionally included hardware components as part of a final product, mixing both the hardware and software in layers of support.A full-stack developer is expected to be able to work in all the layers of the application (front-end and back-end). A full-stack developer can be defined as a developer or an engineer who works with both the front and back end development of a website, web application or desktop application. This means they can lead platform builds that involve databases, user-facing websites, and working with clients during the planning phase of projects. |
Rotational transition Sigma states Rotational_transition > Diatomic molecules > Rotational energy levels > Sigma states As nuclear motion for a stable molecule is generally confined to a small interval around R0 where R0 corresponds to internuclear distance for minimum value of potential Es(R0), rotational energies are given by, with I0 is moment of inertia of the molecule corresponding to equilibrium distance R0 and B is called rotational constant for a given electronic state Φs. Since reduced mass μ is much greater than electronic mass, last two terms in the expression of E′s(R) are small compared to Es. Hence even for states other than sigma states, rotational energy is approximately given by above expression. |
Transactional memory History Transactional_memory > History One of the earliest implementations of transactional memory was the gated store buffer used in Transmeta's Crusoe and Efficeon processors. However, this was only used to facilitate speculative optimizations for binary translation, rather than any form of speculative multithreading, or exposing it directly to programmers. Azul Systems also implemented hardware transactional memory to accelerate their Java appliances, but this was similarly hidden from outsiders.Sun Microsystems implemented hardware transactional memory and a limited form of speculative multithreading in its high-end Rock processor. This implementation proved that it could be used for lock elision and more complex hybrid transactional memory systems, where transactions are handled with a combination of hardware and software. |
Central pattern generator Mechanism of rhythmic generators: post-inhibitory rebound Central_pattern_generator > Functions > Mechanism of rhythmic generators: post-inhibitory rebound Rhythmicity in CPG's can also result from time-dependent cellular properties such as adaptation, delayed excitation, and post-inhibitory rebound (PIR). PIR is an intrinsic property that elicits rhythmic electrical activity by depolarizing the membrane once hyperpolarizing stimulus is gone. It can be produced by several mechanisms including hyperpolarization-activated cation current (Ih), low-voltage activated calcium current, or deinactivation of depolarization-activated inward currents. |
Rigid rotor General references Rotational_constant > General references Bibcode:1951RvMP...23..213V. doi:10.1103/RevModPhys.23.213. McQuarrie, Donald A (1983). |
High blood potassium Ineffective elimination High_blood_potassium > Causes > Ineffective elimination NSAIDs such as ibuprofen, naproxen, or celecoxib inhibit prostaglandin synthesis, leading to reduced production of renin and aldosterone, causing potassium retention. The antibiotic trimethoprim and the antiparasitic medication pentamidine inhibits potassium excretion, which is similar to mechanism of action by amiloride and triamterene.Mineralocorticoid (aldosterone) deficiency or resistance can also cause hyperkalemia. Primary adrenal insufficiency are: Addison's disease and congenital adrenal hyperplasia (CAH) (including enzyme deficiencies such as 21α hydroxylase, 17α hydroxylase, 11β hydroxylase, or 3β dehydrogenase). Type IV renal tubular acidosis (aldosterone resistance of the kidney's tubules) Gordon's syndrome (pseudohypoaldosteronism type II) ("familial hypertension with hyperkalemia"), a rare genetic disorder caused by defective modulators of salt transporters, including the thiazide-sensitive Na-Cl cotransporter. |
Social statistician Reliability Social_statistics > Statistics in the social sciences > Reliability The use of statistics has become so widespread in the social sciences that many universities such as Harvard, have developed institutes focusing on "quantitative social science." Harvard's Institute for Quantitative Social Science focuses mainly on fields like political science that incorporate the advanced causal statistical models that Bayesian methods provide. However, some experts in causality feel that these claims of causal statistics are overstated. There is a debate regarding the uses and value of statistical methods in social science, especially in political science, with some statisticians questioning practices such as data dredging that can lead to unreliable policy conclusions of political partisans who overestimate the interpretive power that non-robust statistical methods such as simple and multiple linear regression allow. Indeed, an important axiom that social scientists cite, but often forget, is that "correlation does not imply causation." |
Power set algebra Basis Power_set_algebra > Basis The operations need not be all explicitly stated. A basis is any set from which the remaining operations can be obtained by composition. A "Boolean algebra" may be defined from any of several different bases. |
Cognitive load Measurement Cognitive_load > Measurement Greater pupil dilation is found to be associated with high cognitive load. Pupil constriction occurs when there is low cognitive load. Task-invoked pupillary response shows a direct correlation with working memory, making it an effective measurement of cognitive load explicitly unrelated to learning. |
Pattern recognition receptors Neurodegenerative and metabolic disease Cytoplasmic_PRR > Clinical significance > Neurodegenerative and metabolic disease Through its induction of proinflammatory cytokines, IL-1β and IL-18 it has been proposed, that inhibition of inflammasome may also serve as an efficient therapeutic method. The involvement of inflammasome has also been researched in several other diseases including experimental autoimmune encephalomyelitis (EAE), Alzheimer's and Parkinson's diseases and in atherosclerosis connected with type II diabetes in patients. The suggested therapies include degradation of NLRP3 or inhibit the proinflammatory cytokines. |
Cube root Real numbers Cubic_root > Properties > Real numbers For any real number x, there is one real number y such that y3 = x. The cube function is increasing, so does not give the same result for two different inputs, and it covers all real numbers. In other words, it is a bijection, or one-to-one. Then we can define an inverse function that is also one-to-one. For real numbers, we can define a unique cube root of all real numbers. |
Trihydrogen cation Destruction Protonated_molecular_hydrogen > Destruction The most common destruction pathway for OH+3 is dissociative recombination, yielding four possible sets of products: H2O + H, OH + H2, OH + 2H, and O + H2 + H. While water is a possible product of this reaction, it is not a very efficient product. Different experiments have suggested that water is created anywhere from 5–33% of the time. Water formation on grains is still considered the primary source of water in the interstellar medium. |
Kelvin–Planck statement Introduction Second_law_of_thermodynamics > Introduction The first law of thermodynamics provides the definition of the internal energy of a thermodynamic system, and expresses its change for a closed system in terms of work and heat. It can be linked to the law of conservation of energy. Conceptually, the first law describes the fundamental principle that systems do not consume or 'use up' energy, that energy is neither created nor destroyed, but is simply converted from one form to another. The second law is concerned with the direction of natural processes. |
Residual stress Summary Residual_stress Residual stresses can result from a variety of mechanisms including inelastic (plastic) deformations, temperature gradients (during thermal cycle) or structural changes (phase transformation). Heat from welding may cause localized expansion, which is taken up during welding by either the molten metal or the placement of parts being welded. When the finished weldment cools, some areas cool and contract more than others, leaving residual stresses. Another example occurs during semiconductor fabrication and microsystem fabrication when thin film materials with different thermal and crystalline properties are deposited sequentially under different process conditions. The stress variation through a stack of thin film materials can be very complex and can vary between compressive and tensile stresses from layer to layer. |
Sedoheptulose-bisphosphatase Regulation Sedoheptulose-bisphosphatase > Regulation In the light reactions of photosynthesis, light energy powers the transport of electrons to eventually reduce ferredoxin. The enzyme ferredoxin-thioredoxin reductase uses reduced ferredoxin to reduce thioredoxin from the disulfide form to the dithiol. Finally, the reduced thioredoxin is used to reduced a cysteine-cysteine disulfide bond in SBPase to a dithiol, which converts the SBPase into its active form. |
Helium-6 Helium-3 Helium-9 > Helium-3 In stars, however, 3He is more abundant, a product of nuclear fusion. Extraplanetary material, such as lunar and asteroid regolith, has trace amounts of 3He from solar wind bombardment. For helium-3 to form a superfluid, it must be cooled to a temperature of 0.0025 K, or almost a thousand times lower than helium-4 (2.17 K). This difference is explained by quantum statistics, since helium-3 atoms are fermions, while helium-4 atoms are bosons, which condense to a superfluid more easily. |
Rayleigh quotient Summary Rayleigh_quotient It can be shown that, for a given matrix, the Rayleigh quotient reaches its minimum value λ min {\displaystyle \lambda _{\min }} (the smallest eigenvalue of M {\displaystyle M} ) when x {\displaystyle x} is v min {\displaystyle v_{\min }} (the corresponding eigenvector). Similarly, R ( M , x ) ≤ λ max {\displaystyle R(M,x)\leq \lambda _{\max }} and R ( M , v max ) = λ max {\displaystyle R(M,v_{\max })=\lambda _{\max }} . The Rayleigh quotient is used in the min-max theorem to get exact values of all eigenvalues. |
Physical Chemistry Summary Physical_Chemistry Physical chemistry is the study of macroscopic and microscopic phenomena in chemical systems in terms of the principles, practices, and concepts of physics such as motion, energy, force, time, thermodynamics, quantum chemistry, statistical mechanics, analytical dynamics and chemical equilibria. Physical chemistry, in contrast to chemical physics, is predominantly (but not always) a supra-molecular science, as the majority of the principles on which it was founded relate to the bulk rather than the molecular or atomic structure alone (for example, chemical equilibrium and colloids). Some of the relationships that physical chemistry strives to resolve include the effects of: Intermolecular forces that act upon the physical properties of materials (plasticity, tensile strength, surface tension in liquids). Reaction kinetics on the rate of a reaction. |
Belief–desire–intention software model Extensions and hybrid systems Belief–desire–intention_software_model > BDI agent implementations > Extensions and hybrid systems JACK Teams CogniTAO (Think-As-One) Living Systems Process Suite Brahms JaCaMo |
Vitamin D Research Vitamin_D > Research Another meta-analysis covering over 350,000 people concluded that vitamin D supplementation in unselected community-dwelling individuals does not reduce skeletal (total fracture) or non-skeletal outcomes (myocardial infarction, ischemic heart disease, stroke, cerebrovascular disease, cancer) by more than 15%, and that further research trials with similar design are unlikely to change these conclusions. As of 2022, there is insufficient evidence for an effect of vitamin D supplementation on the risk of cancer. A 2019 meta-analysis found a small increase in risk of stroke when calcium and vitamin D supplements were taken together. |
Low energy nuclear reaction Excess heat and energy production Low_energy_nuclear_reaction > Reported results > Excess heat and energy production An excess heat observation is based on an energy balance. Various sources of energy input and output are continuously measured. Under normal conditions, the energy input can be matched to the energy output to within experimental error. In experiments such as those run by Fleischmann and Pons, an electrolysis cell operating steadily at one temperature transitions to operating at a higher temperature with no increase in applied current. |
Test Track Queue Test_Track > Ride overview > 1999–2012 > Queue During the first part of the queue, guests viewed a sample repair and test shop. As guests entered the queue in the welcome center they were shown tests performed on cars and parts before being released. The queue wound by different tests for tires and car doors, an anechoic chamber for radio receivers, and an area for crash test dummies to be tested. At the end of the queue, a group of guests would be brought into a briefing room where they were shown automobile testing facilities and examples of tests being performed. |
Hopfian object Summary Hopfian_object In the branch of mathematics called category theory, a hopfian object is an object A such that any epimorphism of A onto A is necessarily an automorphism. The dual notion is that of a cohopfian object, which is an object B such that every monomorphism from B into B is necessarily an automorphism. The two conditions have been studied in the categories of groups, rings, modules, and topological spaces. |
29 (number) Mathematics 29_(number) > Mathematics 29 is the tenth prime number, and the fourth primorial prime. 29 forms a twin prime pair with thirty-one, which is also a primorial prime. Twenty-nine is also the sixth Sophie Germain prime. 29 is the sum of three consecutive squares, 22 + 32 + 42. |
Sludge treatment Anaerobic digestion Sludge_treatment > Treatment processes > Digestion > Anaerobic digestion The sludge is fed into large tanks and held for a minimum of 12 days to allow the digestion process to perform the four stages necessary to digest the sludge. These are hydrolysis, acidogenesis, acetogenesis, and methanogenesis. In this process the complex proteins and sugars are broken down to form more simple compounds such as water, carbon dioxide, and methane.Anaerobic digestion generates biogas with a high proportion of methane that may be used to both heat the tank and run engines or microturbines for other on-site processes. |
Fitts's law Welford's model: innovations driven by predictive power Fitts's_law > Welford's model: innovations driven by predictive power Not long after the original model was proposed, a 2-factor variation was proposed under the intuition that target distance and width have separate effects on movement time. Welford's model, proposed in 1968, separated the influence of target distance and width into separate terms, and provided improved predictive power: This model has an additional parameter, so its predictive accuracy cannot be directly compared with 1-factor forms of Fitts's law. However, a variation on Welford's model inspired by the Shannon formulation, The additional parameter k allows the introduction of angles into the model. |
Baroreflex Activation Baroreflex > Activation Sympathetic activation leads to an elevation of total peripheral resistance and cardiac output via increased contractility of the heart, heart rate, and arterial vasoconstriction, which tends to increase blood pressure. Conversely, parasympathetic activation leads to decreased cardiac output via decrease in heart rate, resulting in a tendency to lower blood pressure.By coupling sympathetic inhibition and parasympathetic activation, the baroreflex maximizes blood pressure reduction. Sympathetic inhibition leads to a drop in peripheral resistance, while parasympathetic activation leads to a depressed heart rate (reflex bradycardia) and contractility. The combined effects will dramatically decrease blood pressure. In a similar manner, sympathetic activation with parasympathetic inhibition allows the baroreflex to elevate blood pressure. |
The nervous system Cerebellum The_nervous_system > Structure > Brain > Cerebellum The cerebellum lies behind the pons. The cerebellum is composed of several dividing fissures and lobes. Its function includes the control of posture and the coordination of movements of parts of the body, including the eyes and head, as well as the limbs. Further, it is involved in motion that has been learned and perfected through practice, and it will adapt to new learned movements. |
Lie point symmetry Lie groups and Lie algebras of infinitesimal generators Lie_point_symmetry > Geometrical framework > Lie groups and Lie algebras of infinitesimal generators Lie algebras can be generated by a generating set of infinitesimal generators as defined above. To every Lie group, one can associate a Lie algebra. Roughly, a Lie algebra g {\displaystyle {\mathfrak {g}}} is an algebra constituted by a vector space equipped with Lie bracket as additional operation. The base field of a Lie algebra depends on the concept of invariant. Here only finite-dimensional Lie algebras are considered. |
Dm-cache Use with LVM Dm-cache > Use with LVM Logical Volume Manager includes lvmcache, which provides a wrapper for dm-cache integrated with LVM. |
BOINC client–server technology Summary BOINC_client–server_technology BOINC client–server technology refers to the model under which BOINC works. The BOINC framework consists of two layers which operate under the client–server architecture. Once the BOINC software is installed in a machine, the server starts sending tasks to the client. The operations are performed client-side and the results are uploaded to the server-side. |
Lorentz Force Law Charged particle Lorentz_Force_Law > Equation > Charged particle The force F acting on a particle of electric charge q with instantaneous velocity v, due to an external electric field E and magnetic field B, is given by (in SI units): where × is the vector cross product (all boldface quantities are vectors). In terms of Cartesian components, we have: In general, the electric and magnetic fields are functions of the position and time. Therefore, explicitly, the Lorentz force can be written as: in which r is the position vector of the charged particle, t is time, and the overdot is a time derivative. A positively charged particle will be accelerated in the same linear orientation as the E field, but will curve perpendicularly to both the instantaneous velocity vector v and the B field according to the right-hand rule (in detail, if the fingers of the right hand are extended to point in the direction of v and are then curled to point in the direction of B, then the extended thumb will point in the direction of F). |
Smart farming Machine learning Precision_agriculture > Emerging technologies > Machine learning Machine learning is commonly used in conjunction with drones, robots, and internet of things devices. It allows for the input of data from each of these sources. The computer then processes this information and sends the appropriate actions back to these devices. |
Social learning theory Modeling and underlying cognitive processes Social_learning_theory > Theory > Modeling and underlying cognitive processes Attention is impacted by characteristics of the observer (e.g., perceptual abilities, cognitive abilities, arousal, past performance) and characteristics of the behavior or event (e.g., relevance, novelty, affective valence, and functional value). In this way, social factors contribute to attention – the prestige of different models affects the relevance and functional value of observation and therefore modulates attention. Retention – In order to reproduce an observed behavior, observers must be able to remember features of the behavior. |
Inferior olive Summary Inferior_olive The inferior olivary nucleus (ION), is a structure found in the medulla oblongata underneath the superior olivary nucleus. In vertebrates, the ION is known to coordinate signals from the spinal cord to the cerebellum to regulate motor coordination and learning. These connections have been shown to be tightly associated, as degeneration of either the cerebellum or the ION results in degeneration of the other.Neurons of the ION are glutamatergic and receive inhibitory input via GABA receptors. |
Argon oxygen decarburization Desulfurization Argon_oxygen_decarburization > Process > Desulfurization After sulfur levels have been achieved the slag is removed from the AOD vessel and the metal bath is ready for tapping. The tapped bath is then either sent to a stir station for further chemistry trimming or to a caster for casting. Usually desulfurization step is the first step of the process. |
Exceptional memory Neuroscience Exceptional_memory > Savants > Neuroscience has no episodic memory (which is highly associative or relational in nature) and must rely on memorizing facts. He will memorize entire conversations, so as to remember even general content later. He also remembers events by memorizing A-B-C predicates—item-specific memory with a memorized (specific) association connecting them. |
Visual spatial attention Summary Visual_spatial_attention Visual spatial attention is a form of visual attention that involves directing attention to a location in space. Similar to its temporal counterpart visual temporal attention, these attention modules have been widely implemented in video analytics in computer vision to provide enhanced performance and human interpretable explanation of deep learning models. Spatial attention allows humans to selectively process visual information through prioritization of an area within the visual field. |
Relativistic Doppler effect Relativistic longitudinal Doppler effect Relativistic_Doppler_effect > Derivation > Relativistic longitudinal Doppler effect The receiver will measure the received frequency to be Eq. 1: f r = f r , s γ {\displaystyle f_{r}=f_{r,s}\gamma } = 1 − β 1 − β 2 f s {\displaystyle ={\frac {1-\beta }{\sqrt {1-\beta ^{2}}}}f_{s}} = 1 − β 1 + β f s . {\displaystyle ={\sqrt {\frac {1-\beta }{1+\beta }}}\,f_{s}.} The ratio f s f r = 1 + β 1 − β {\displaystyle {\frac {f_{s}}{f_{r}}}={\sqrt {\frac {1+\beta }{1-\beta }}}} is called the Doppler factor of the source relative to the receiver. |
Integrated Operations Contents of the term Integrated_Operations > Contents of the term The most striking part of IO has been the use of always-on videoconference rooms between offshore platforms and land-based offices. This includes broadband connections for sharing of data and video-surveillance of the platform. This has made it possible to move some personnel onshore and use the existing human resources more efficiently. Instead of having e.g. an expert in geology on duty at every platform, the expert may be stationed on land and be available for consultation for several offshore platforms. |
Turing completeness Examples Turing_complete > Examples These two elements make this architecture Turing-complete. Even pure functional languages are Turing-complete.Turing completeness in declarative SQL is implemented through recursive common table expressions. Unsurprisingly, procedural extensions to SQL (PLSQL, etc.) are also Turing-complete. |
Grammar induction Methodologies Grammatical_inference > Methodologies For approaches to infer subclasses of regular languages in particular, see Induction of regular languages. A more recent textbook is de la Higuera (2010), which covers the theory of grammatical inference of regular languages and finite state automata. D'Ulizia, Ferri and Grifoni provide a survey that explores grammatical inference methods for natural languages. |
Iterated exponentiation Summary Tetration Tetration is also defined recursively as a ↑↑ n := { 1 if n = 0 , a a ↑↑ ( n − 1 ) if n > 0 , {\displaystyle {a\uparrow \uparrow n}:={\begin{cases}1&{\text{if }}n=0,\\a^{a\uparrow \uparrow (n-1)}&{\text{if }}n>0,\end{cases}}} allowing for attempts to extend tetration to non-natural numbers such as real and complex numbers. The two inverses of tetration are called super-root and super-logarithm, analogous to the nth root and the logarithmic functions. None of the three functions are elementary. Tetration is used for the notation of very large numbers. |
Metre rule Evolution of the rule Metre_rule > Development of the International rule > Evolution of the rule The International rule eventually became the backbone of yacht racing. The Rule created a formula that took into account most problematic areas that had previously caused dissent among the racing nations. It does not restrict size—many individual classes were created. It allowed designers a degree of latitude—yet controlled unsafe extremes. It laid down construction rules and governed the use of materials—yet understood that the Rule must develop. |
Meningococcal infection Treatment Neisseria_meningitidis > Treatment Persons with confirmed N. meningitidis infection should be hospitalized immediately for treatment with antibiotics. Because meningococcal disease can disseminate very rapidly, a single dose of intramuscular antibiotic is often given at the earliest possible opportunity, even before hospitalization, if disease symptoms look suspicious enough. Third-generation cephalosporin antibiotics (i.e. cefotaxime, ceftriaxone) should be used to treat a suspected or culture-proven meningococcal infection before antibiotic susceptibility results are available. Clinical practice guidelines endorse empirical treatment in the event a lumbar puncture to collect cerebrospinal fluid (CSF) for laboratory testing cannot first be performed. Antibiotic treatment may affect the results of microbiology tests, but a diagnosis may be made on the basis of blood-cultures and clinical examination. |
Immunopathology Cancer Immunopathology > Cancer Natural killer (NK) cells, dendritic cells, and macrophages are some examples of innate immune cells that can detect and eliminate cancer cells.Adaptive immunity, on the other hand, is more specific and targeted. It involves the activation of T cells and B cells, which can recognize and attack cancer cells that have specific antigens on their surface. T cells can directly kill cancer cells or help activate other immune cells to attack cancer cells. |
Diehard tests Test descriptions Diehard_tests > Test descriptions This test uses n = 224 and m = 29, so that the underlying distribution for j is taken to be Poisson with λ = 227 / 226 = 2. A sample of 500 js is taken, and a chi-square goodness of fit test provides a p value. The first test uses bits 1–24 (counting from the left) from integers in the specified file. |
Protected Mode Operating systems Protected_Mode > Operating systems Updating well-behaved programs using the MARK utility with the MEMORY parameter avoids this dialog. It is not possible to have some GUI programs running in 16-bit protected mode and other GUI programs running in real mode. In Windows 3.1, real mode was no longer supported and could not be accessed. In modern 32-bit operating systems, virtual 8086 mode is still used for running applications, e.g. DPMI compatible DOS extender programs (through virtual DOS machines) or Windows 3.x applications (through the Windows on Windows subsystem) and certain classes of device drivers (e.g. for changing the screen-resolution using BIOS functionality) in OS/2 2.0 (and later OS/2) and 32-bit Windows NT, all under control of a 32-bit kernel. However, 64-bit operating systems (which run in long mode) no longer use this, since virtual 8086 mode has been removed from long mode. |
Damp proofing Methods Damp_proofing > Methods Damp proofing is accomplished several ways including all: A damp-proof course (DPC) is a barrier through the structure designed to prevent moisture rising by capillary action such as through a phenomenon known as rising damp. Rising damp is the effect of water rising from the ground into property. The damp proof course may be horizontal or vertical. A DPC layer is usually laid below all masonry walls, regardless if the wall is a load bearing wall or a partition wall. |
Lean design Design for lean manufacturing and development principles Design_for_lean_manufacturing > Design for lean manufacturing and development principles The design for lean manufacturing equation is design for lean manufacturing success = strategic values minus the drivers of design and process wastes. A good design is one that simultaneously reduces waste and delivers value. There are multiple drivers that cause product, process, and lifecycle wastes. |
Cycles per instruction Explanation Cycles_per_instruction > Explanation Let us assume a classic RISC pipeline, with the following five stages: Instruction fetch cycle (IF). Instruction decode/Register fetch cycle (ID). Execution/Effective address cycle (EX). Memory access (MEM). |
Database-as-IPC Controversy Database-as-IPC > Controversy The issue arises if there is a performance issue, and if additional systems (and servers) can be justified. In terms of performance, recent advancements in database systems provide more efficient mechanisms for signaling and messaging, and database systems also support memory (non-persisted) tables. There are databases with built-in notification mechanisms, such as Postgres, SQL Server, and Oracle. |
Steel building Advantages Metal_building > Advantages Steel provides several advantages over other building materials, such as wood: Steel is structurally sound and manufactured to strict specifications and tolerances. Steel does not easily warp, buckle, twist or bend, and is therefore easy to modify and offers design flexibility. Steel is also easy to install. Steel is cost effective and rarely fluctuates in price. |
Mobilome Mobilome in prokaryotes Mobilome > Mobilome in prokaryotes Plasmids were discovered in the 1940s as genetic materials outside of bacterial chromosomes. Prophages are genomes of bacteriophages (a type of virus) that are inserted into bacterial chromosomes; prophages can then be spread to other bacteria through the lytic cycle and lysogenic cycle of viral replication.While transposable elements are also found in prokaryotic genomes, the most common mobile genetic elements in the prokaryotic genome are plasmids and prophages.Plasmids and prophages can move between genomes through bacterial conjugation, allowing horizontal gene transfer. Plasmids often carry genes that are responsible for bacterial antibiotic resistance; as these plasmids replicate and pass from one genome to another, the whole bacterial population can quickly adapt to the antibiotic. Prophages can loop out of bacterial chromosomes to produce bacteriophages that go on to infect other bacteria with the prophages; this allows prophages to propagate quickly among the bacterial population, to the harm of the bacterial host. |
Multidimensional seismic data processing Data acquisition Multidimensional_seismic_data_processing > Data acquisition For example, in case of vertical seismic profiling, the receivers are aligned vertically, spaced approximately 15 meters apart. The vertical travel time of the wave to each of the receivers is measured and each such measurement is referred to as a “check-shot” record. Multiple sources may be added or a single source may be moved along predetermined paths, generating seismic waves periodically in order to sample different points in the sub-surface. The result is a series of check-shot records, where each check-shot is typically a two or three-dimensional array representing a spatial dimension (the source-receiver offset) and a temporal dimension (the vertical travel time). |
Wheelchair access Buildings Wheelchair_access > Mobility and access > Buildings Adapting the built environment to make it more accessible to wheelchair users is one of the key campaigns of disability rights movements and local equality legislation such the Americans with Disabilities Act of 1990 (ADA). The social model of disability defines 'disability' as the discrimination experienced by people with impairments as a result of the failure of society to provide the adaptions needed for them to participate in society as equals. This includes both physical adaptions of the built environment and adaption of organizational and social structures and attitudes. A core principle of access is universal design - that all people regardless of disability are entitled to equal access to all parts of society like public transportation and buildings. |
Virtual leak M Glossary_of_engineering:_M–Z > M The molar mass is appropriate for converting between the mass of a substance and the amount of a substance for bulk quantities. MoldingMolding (American English) or moulding (British and Commonwealth English; see spelling differences) is the process of manufacturing by shaping liquid or pliable raw material using a rigid frame called a mold or matrix. |
Dieudonné determinant Summary Dieudonné_determinant In linear algebra, the Dieudonné determinant is a generalization of the determinant of a matrix to matrices over division rings and local rings. It was introduced by Dieudonné (1943). If K is a division ring, then the Dieudonné determinant is a homomorphism of groups from the group GLn(K) of invertible n by n matrices over K onto the abelianization K×/ of the multiplicative group K× of K. For example, the Dieudonné determinant for a 2-by-2 matrix is the residue class, in K×/, of det ( a b c d ) = { − c b if a = 0 a d − a c a − 1 b if a ≠ 0 . {\displaystyle \det \left({\begin{array}{*{20}c}a&b\\c&d\end{array}}\right)=\left\lbrace {\begin{array}{*{20}c}-cb&{\text{if }}a=0\\ad-aca^{-1}b&{\text{if }}a\neq 0\end{array}}\right..} |
Apparent oxygen utilisation O2 trends and AOU in the ocean Apparent_oxygen_utilisation > O2 trends and AOU in the ocean O2 concentrations in the ocean have decreased since the 1980s. Part of this decrease is due to increased ocean heat content (OHC) from global warming decreasing O2 solubility. As solubility in surface oceans decreases, O2 out gasses to the atmosphere. |
Immune adherence Function of the immune adherence (in vivo) Immune_adherence > Function of the immune adherence (in vivo) Phagocytes expressing CR1, CR3, and Fcγ receptors effect a transfer of the immune complexes to their surface. Then erythrocytes leave the liver and spleen bearing off immune complexes and work on the next round of transfer of immune complexes after adhering to them. == References == |
Time loop Summary Time_loop The time loop or temporal loop is a plot device in fiction whereby characters re-experience a span of time which is repeated, sometimes more than once, with some hope of breaking out of the cycle of repetition. The term "time loop" is sometimes used to refer to a causal loop; however, causal loops are unchanging and self-originating, whereas time loops are constantly resetting: when a certain condition is met, such as a death of a character or a clock reaching a certain time, the loop starts again, possibly with one or more characters retaining the memories from the previous loop. |
Concurrent hash table Applications Concurrent_hash_table > Applications Naturally, concurrent hash tables find application wherever sequential hash tables are useful. The advantage that concurrency delivers herein lies within the potential speedup of these use-cases, as well as the increased scalability. Considering hardware such as multi-core processors that become increasingly more capable of concurrent computation, the importance of concurrent data structures within these applications grow steadily. |
Anti-obesity medication History Diet_pill > History Based on its effectiveness for hypothyroidism, thyroid hormone became a popular treatment for obesity in euthyroid people. It had a modest effect but produced the symptoms of hyperthyroidism as a side effect, such as palpitations and difficulty sleeping. |
Traffic sign design Conceptual compatibility Traffic_sign_design > Design principles > Conceptual compatibility The correct association between the physical symbols on a sign and the information the sign is trying to convey. Good conceptual compatibility means that a driver will know the meaning of a symbol without having to reflect and interpret its meaning. For example, a sign with a picture of an airplane is a clear indication that the sign is providing direction to an airport. |
Mathematical descriptions of the electromagnetic field Geometric calculus approach Mathematical_descriptions_of_the_electromagnetic_field > Discussion > Geometric calculus approach The derivatives that appear in Maxwell's equations are vectors and electromagnetic fields are represented by the Faraday bivector F. This formulation is as general as that of differential forms for manifolds with a metric tensor, as then these are naturally identified with r-forms and there are corresponding operations. Maxwell's equations reduce to one equation in this formalism. This equation can be separated into parts as is done above for comparative reasons. |
History of electric power transmission Transformers and alternating current History_of_electric_power_transmission > Transformers and alternating current The new ZBD transformers were 3.4 times more efficient than the open-core bipolar devices of Gaulard and Gibbs.In the closed-core transformer the iron core is a closed ring around which the two coils are wound. In the shell type transformer, the windings are passed through the core. In both designs, the magnetic flux linking the primary and secondary windings travels almost entirely within the iron core, with no intentional path through air. |
Implementation inheritance Summary Subclassing_(OOP) To distinguish these concepts, subtyping is sometimes referred to as interface inheritance (without acknowledging that the specialization of type variables also induces a subtyping relation), whereas inheritance as defined here is known as implementation inheritance or code inheritance. Still, inheritance is a commonly used mechanism for establishing subtype relationships.Inheritance is contrasted with object composition, where one object contains another object (or objects of one class contain objects of another class); see composition over inheritance. Composition implements a has-a relationship, in contrast to the is-a relationship of subtyping. |
Snatch block Rove to (dis)advantage Snatch_block > Mechanical advantage > Rove to (dis)advantage The mechanical advantage of any tackle can be increased by interchanging the fixed and moving blocks so the rope is attached to the moving block and the rope is pulled in the direction of the lifted load. In this case the block and tackle is said to be "rove to advantage." "Rove to advantage" – where the pull on the rope is in the same direction as that in which the load is to be moved. The hauling part is pulled from the moving block. |
G protein-coupled estrogen receptor Central nervous system activity G_protein-coupled_estrogen_receptor > Animal studies > Central nervous system activity GPER and ERα, but not ERβ, have been found to mediate the antidepressant-like effects of estradiol. Contrarily, activation of GPER has been found to be anxiogenic in mice, while activation of ERβ has been found to be anxiolytic. There is a high expression of GPER, as well as ERβ, in oxytocin neurons in various parts of the hypothalamus, including the paraventricular nucleus and the supraoptic nucleus. It is speculated that activation of GPER may be the mechanism by which estradiol mediates rapid effects on the oxytocin system, for instance, rapidly increasing oxytocin receptor expression. Estradiol has also been found to increase oxytocin levels and release in the medial preoptic area and medial basal hypothalamus, actions that may be mediated by activation of GPER and/or ERβ. Estradiol, as well as tamoxifen and fulvestrant, have been found to rapidly induce lordosis through activation of GPER in the arcuate nucleus of the hypothalamus of female rats. |
Dynamical systems and chaos theory Functional analysis Dynamical_systems_and_chaos_theory > Related fields > Functional analysis Functional analysis is the branch of mathematics, and specifically of analysis, concerned with the study of vector spaces and operators acting upon them. It has its historical roots in the study of functional spaces, in particular transformations of functions, such as the Fourier transform, as well as in the study of differential and integral equations. This usage of the word functional goes back to the calculus of variations, implying a function whose argument is a function. Its use in general has been attributed to mathematician and physicist Vito Volterra and its founding is largely attributed to mathematician Stefan Banach. |
Adrenal gland Congenital adrenal hyperplasia Adrenal_gland > Clinical significance > Adrenal insufficiency > Congenital adrenal hyperplasia Congenital adrenal hyperplasia is a congenital disease in which mutations of enzymes that produce steroid hormones result in a glucocorticoid deficiency and malfunction of the negative feedback loop of the HPA axis. In the HPA axis, cortisol (a glucocorticoid) inhibits the release of CRH and ACTH, hormones that in turn stimulate corticosteroid synthesis. As cortisol cannot be synthesized, these hormones are released in high quantities and stimulate production of other adrenal steroids instead. |
Polymer Monomers and repeat units Organic_polymer > Structure > Monomers and repeat units Polyethylene terephthalate, even though produced from two different monomers (ethylene glycol and terephthalic acid), is usually regarded as a homopolymer because only one type of repeat unit is formed. Ethylene-vinyl acetate contains more than one variety of repeat unit and is a copolymer. Some biological polymers are composed of a variety of different but structurally related monomer residues; for example, polynucleotides such as DNA are composed of four types of nucleotide subunits. A polymer containing ionizable subunits (e.g., pendant carboxylic groups) is known as a polyelectrolyte or ionomer, when the fraction of ionizable units is large or small respectively. |
Comparison of Chernobyl and other radioactivity releases Chernobyl compared with an atomic bomb Comparison_of_Chernobyl_and_other_radioactivity_releases > Chernobyl compared with an atomic bomb Note that in the event of a low altitude or ground bursted nuclear detonation that fractionation of the volatile and non volatile radionuclides occurs, also during the Chernobyl accident the ratio between the different elements released by the accident did change as a function of time. A ground burst of a nuclear weapon creates considerably more local deposited fallout than the air bursts used at Hiroshima or Nagasaki. This is due in part to neutron activation of ground soil and greater amounts of soil being sucked into the nuclear fireball in a ground burst than in a high air burst. In the above neutron activation is neglected, and only the fission product fraction of the total activity resulting from the ground burst is shown. |
Data consistency Disk caching systems Data_consistency > Point-in-time consistency > Disk caching systems Suppose a caching algorithm determines it would be fastest to write these items to disk in the order 4-3-1-2, and starts doing so, but the power gets shut down after 4 get written, before 3, 1 and 2, and so those writes never occur. When the computer is turned back on, the file system would then show it contains a file named XYZ which is located in sector 123, but this sector really does not contain the file. (Instead, the sector will contain garbage, or zeroes, or a random portion of some old file - and that is what will show if the file is opened). |
Immunoglobulin E Summary Immunoglobulin_E_antibodies IgE is also utilized during immune defense against certain protozoan parasites such as Plasmodium falciparum. IgE may have evolved as a defense to protect against venoms.IgE also has an essential role in type I hypersensitivity, which manifests in various allergic diseases, such as allergic asthma, most types of sinusitis, allergic rhinitis, food allergies, and specific types of chronic urticaria and atopic dermatitis. IgE also plays a pivotal role in responses to allergens, such as: anaphylactic reactions to drugs, bee stings, and antigen preparations used in desensitization immunotherapy. Although IgE is typically the least abundant isotype—blood serum IgE levels in a normal ("non-atopic") individual are only 0.05% of the Ig concentration, compared to 75% for the IgGs at 10 mg/ml, and are the isotypes responsible for most of the classical adaptive immune response—it is capable of triggering anaphylaxis, one of the most rapid and severe immunological reactions. |
Ronald N. Bracewell Chapter contributions Ronald_N._Bracewell > Chapter contributions J. A. Roberts, 1984 Fourier Techniques and Applications The Life of Joseph Fourier and Fourier Techniques and Applications, ed. J. F. Price, 1985 Yearbook of Science and Technology Wavelets, 1996 Encyclopedia of Applied Physics Fourier and Other Mathematical Transforms 1997 Cornelius Lanczos—Collected Published Papers with Commentaries The Fast Fourier Transform andSmoothing Data by Analysis and by Eye ed. W. R. Davis et al., 1999 |
Frequency-modulated continuous-wave radar Unmodulated continuous-wave Frequency_Modulated_Continuous_Wave > Types > Unmodulated continuous-wave This kind of radar can cost less than $10 (2021). Return frequencies are shifted away from the transmitted frequency based on the Doppler effect when objects are moving. There is no way to evaluate distance. This type of radar is typically used with competition sports, like golf, tennis, baseball, NASCAR racing, and some smart-home appliances including light-bulbs and motion sensors. The Doppler frequency change depends on the speed of light in the air (c’ ≈ c/1.0003 is slightly slower than in vacuum) and v the speed of the target: f r = f t ( 1 + v / c ′ 1 − v / c ′ ) {\displaystyle f_{r}=f_{t}\left({\frac {1+v/c'}{1-v/c'}}\right)} The Doppler frequency is thus: f d = f r − f t = 2 v f t c ′ − v {\displaystyle f_{d}=f_{r}-f_{t}=2v{\frac {f_{t}}{c'-v}}} Since the usual variation of targets' speed of a radar is much smaller than c ′ , ( v ≪ c ′ ) {\displaystyle c',(v\ll c')} , it is possible to simplify with c ′ − v ≈ c ′ {\displaystyle c'-v\approx c'}: f d ≈ 2 v f t c ′ {\displaystyle f_{d}\approx 2v{\frac {f_{t}}{c'}}} Continuous-wave radar without frequency modulation (FM) only detects moving targets, as stationary targets (along the line of sight) will not cause a Doppler shift. Reflected signals from stationary and slow-moving objects are masked by the transmit signal, which overwhelms reflections from slow-moving objects during normal operation. |
Endotherm Generating and conserving heat Facultative_endothermy > Mechanisms > Generating and conserving heat Less drastic intermittent reduction in body temperature also occurs in other larger endotherms; for example human metabolism also slows down during sleep, causing a drop in core temperature, commonly of the order of 1 degree Celsius. There may be other variations in temperature, usually smaller, either endogenous or in response to external circumstances or vigorous exertion, and either an increase or a drop.The resting human body generates about two-thirds of its heat through metabolism in internal organs in the thorax and abdomen, as well as in the brain. The brain generates about 16% of the total heat produced by the body.Heat loss is a major threat to smaller creatures, as they have a larger ratio of surface area to volume. |
Distribution (pharmacology) Removal rate Distribution_(pharmacology) > Factors that affect distribution > Removal rate This will mean that the drug concentration in the first tissue will be greater than the plasma concentration and the drug will move from the tissue back into the plasma. This phenomenon will continue until the drug has reached equilibrium over the whole organism. The most sensitive tissue will therefore experience two different drug concentrations: an initial higher concentration and a later lower concentration as a consequence of tissue redistribution. |
Radius of curvature (mathematics) Applications Radius_of_curvature_(mathematics) > Applications For the use in differential geometry, see Cesàro equation. For the radius of curvature of the Earth (approximated by an oblate ellipsoid); see also: arc measurement Radius of curvature is also used in a three part equation for bending of beams. Radius of curvature (optics) Thin films technologies Printed electronics Minimum railway curve radius AFM probe |
Software performance testing Technology Software_performance_testing > Technology Does its failure cause collateral damage? Analytical Performance Modeling is a method to model the behavior of a system in a spreadsheet. The model is fed with measurements of transaction resource demands (CPU, disk I/O, LAN, WAN), weighted by the transaction-mix (business transactions per hour). |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.