text stringlengths 31 999 | source stringclasses 5 values |
|---|---|
Casimersen, sold under the brand name Amondys 45, is an antisense oligonucleotide medication used for the treatment of Duchenne muscular dystrophy (DMD) in people who have a confirmed mutation of the dystrophin gene that is amenable to exon 45 skipping. It is an antisense oligonucleotide of phosphorodiamidate morpholino oligomer (PMO). Duchenne muscular dystrophy is a rare disease that primarily affects boys | https://huggingface.co/datasets/fmars/wiki_stem |
Custirsen, with aliases including custirsen sodium, OGX-011, and CC-8490, is an investigational drug that is under clinical testing for the treatment of cancer. It is an antisense oligonucleotide (ASO) targeting clusterin expression. In metastatic prostate cancer, custirsen showed no benefit in improving overall survival | https://huggingface.co/datasets/fmars/wiki_stem |
Eteplirsen (brand name Exondys 51) is a medication to treat, but not cure, some types of Duchenne muscular dystrophy (DMD), caused by a specific mutation. Eteplirsen only targets specific mutations and can be used to treat about 14% of DMD cases. Eteplirsen is a form of antisense therapy | https://huggingface.co/datasets/fmars/wiki_stem |
Golodirsen, sold under the brand name Vyondys 53, is a medication used for the treatment of Duchenne muscular dystrophy (DMD). It is an antisense oligonucleotide drug of phosphorodiamidate morpholino oligomer (PMO) chemistry. The most common side effects include headache, fever, fall, cough, vomiting, abdominal pain, cold symptoms (nasopharyngitis) and nausea | https://huggingface.co/datasets/fmars/wiki_stem |
Viltolarsen, sold under the brand name Viltepso, is a medication used for the treatment of Duchenne muscular dystrophy (DMD). Viltolarsen is a Morpholino antisense oligonucleotide. The most common side effects include upper respiratory tract infection, injection site reaction, cough, and pyrexia (fever) | https://huggingface.co/datasets/fmars/wiki_stem |
The Journal of Applied Microbiology is a monthly peer-reviewed scientific journal covering applied microbiology. It was established in 1939 as the Proceedings of the Society of Agricultural Bacteriologists, and published under the name Journal of Applied Bacteriology from 1954 to 1996, obtaining its current name in 1997. It is published by Wiley-Blackwell on behalf of the Society for Applied Microbiology | https://huggingface.co/datasets/fmars/wiki_stem |
Bioremediation broadly refers to any process wherein a biological system (typically bacteria, microalgae, fungi, and plants), living or dead, is employed for removing environmental pollutants from air, water, soil, flue gasses, industrial effluents etc. , in natural or artificial settings. The natural ability of organisms to adsorb, accumulate, and degrade common and emerging pollutants has attracted the use of biological resources in treatment of contaminated environment | https://huggingface.co/datasets/fmars/wiki_stem |
Bioretention is the process in which contaminants and sedimentation are removed from stormwater runoff. The main objective of the bioretention cell is to attenuate peak runoff as well as to remove stormwater runoff pollutants.
Construction of a bioretention area
Stormwater is firstly directed into the designed treatment area, which conventionally consists of a sand bed (which serves as a transition to the actual soil), a filter media layer (which consists of layered materials of various composition), and plants atop the filter media | https://huggingface.co/datasets/fmars/wiki_stem |
Applied ecology is a sub-field within ecology that considers the application of the science of ecology to real-world (usually management) questions. It is also described as a scientific field that focuses on the application of concepts, theories, models, or methods of fundamental ecology to environmental problems.
Concept
Applied ecology is an integrated treatment of the ecological, social, and biotechnological aspects of natural resource conservation and management | https://huggingface.co/datasets/fmars/wiki_stem |
An arborloo is a simple type of composting toilet in which feces are collected in a shallow pit and a fruit tree is later planted in the fertile soil of the full pit. Arborloos have: a pit like a pit latrine but less deep; a concrete, ferrocement or other strong floor; a superstructure (toilet house or outhouse) to provide privacy; and possibly a ring beam to protect the pit from collapsing. The pit should remain well above the water table in the soil, so as to not contaminate groundwater | https://huggingface.co/datasets/fmars/wiki_stem |
Biological augmentation is the addition of archaea or bacterial cultures required to speed up the rate of degradation of a contaminant. Organisms that originate from contaminated areas may already be able to break down waste, but perhaps inefficiently and slowly.
Bioaugmentation is a type of bioremediation in which it requires studying the indigenous varieties present in the location to determine if biostimulation is possible | https://huggingface.co/datasets/fmars/wiki_stem |
Polychorinated biphenyls, or PCBs, are a type of chemical that was widely used in the 1960s and 1970s, and which are a contamination source of soil and water. They are fairly stable and therefore persistent in the environment. Bioremediation of PCBs is the use of microorganisms to degrade PCBs from contaminated sites, relying on multiple microorganisms' co-metabolism | https://huggingface.co/datasets/fmars/wiki_stem |
Bioremediation of radioactive waste or bioremediation of radionuclides is an application of bioremediation based on the use of biological agents bacteria, plants and fungi (natural or genetically modified) to catalyze chemical reactions that allow the decontamination of sites affected by radionuclides. These radioactive particles are by-products generated as a result of activities related to nuclear energy and constitute a pollution and a radiotoxicity problem (with serious health and ecological consequences) due to its unstable nature of ionizing radiation emissions.
The techniques of bioremediation of environmental areas as soil, water and sediments contaminated by radionuclides are diverse and currently being set up as an ecological and economic alternative to traditional procedures | https://huggingface.co/datasets/fmars/wiki_stem |
Biosurfactant usually refers to surfactants of microbial origin. Most of the biosurfactants produced by microbes are synthesized extracellularly and many microbes are known to produce biosurfactants in large relative quantities. Some are of commercial interest | https://huggingface.co/datasets/fmars/wiki_stem |
Biotransformation is the biochemical modification of one chemical compound or a mixture of chemical compounds. Biotransformations can be conducted with whole cells, their lysates, or purified enzymes. Increasingly, biotransformations are effected with purified enzymes | https://huggingface.co/datasets/fmars/wiki_stem |
Dehalococcoides is a genus of bacteria within class Dehalococcoidia that obtain energy via the oxidation of hydrogen and subsequent reductive dehalogenation of halogenated organic compounds in a mode of anaerobic respiration called organohalide respiration. They are well known for their great potential to remediate halogenated ethenes and aromatics. They are the only bacteria known to transform highly chlorinated dioxins, PCBs | https://huggingface.co/datasets/fmars/wiki_stem |
Dehalogenimonas lykanthroporepellens is an anaerobic, Gram-negative bacteria in the phylum Chloroflexota isolated from a Superfund site in Baton Rouge, Louisiana. It is useful in bioremediation for its ability to reductively dehalogenate chlorinated alkanes.
Discovery and description
Dehalogenimonas lykanthroporepellens cells are Gram-negative, non-motile, irregular cocci that are 0 | https://huggingface.co/datasets/fmars/wiki_stem |
Desulfatibacillum alkenivorans AK-01 is a specific strain of Desulfatibacillum alkenivorans.
Strain AK-01 was isolated from the Arthur Kill, NJ/NY waterway. This site has a history of contamination from petrochemical industry | https://huggingface.co/datasets/fmars/wiki_stem |
Gordonia sp. nov. Q8 is a bacterium in the phylum of Actinomycetota | https://huggingface.co/datasets/fmars/wiki_stem |
Hydrocarbonoclastic bacteria (also known as hydrocarbon degrading bacteria, oil degrading bacteria or HCB) are a heterogeneous group of prokaryotes which can degrade and utilize hydrocarbon compounds as source of carbon and energy. Despite being present in most of environments around the world, several of these specialized bacteria live in the sea and have been isolated from polluted seawater.
Taxonomy and distribution
The taxonomic diversity of hydrocarbon-degrading bacteria has not changed dramatically if we consider the higher taxa, many studies have provided information on 25 kinds of hydrocarbon-degrading bacteria and 25 kinds of fungi isolated from marine environments | https://huggingface.co/datasets/fmars/wiki_stem |
A hyperaccumulator is a plant capable of growing in soil or water with very high concentrations of metals, absorbing these metals through their roots, and concentrating extremely high levels of metals in their tissues. The metals are concentrated at levels that are toxic to closely related species not adapted to growing on the metalliferous soils. Compared to non-hyperaccumulating species, hyperaccumulator roots extract the metal from the soil at a higher rate, transfer it more quickly to their shoots, and store large amounts in leaves and roots | https://huggingface.co/datasets/fmars/wiki_stem |
This list covers known nickel hyperaccumulators, accumulators or plant species tolerant to nickel.
See also:
Hyperaccumulators table – 1 : Ag, Al, As, Be, Cr, Cu, Hg, Mn, Mo, Naphthalene, Pb, Pd, Se, Zn
Hyperaccumulators table – 3 : Cd, Cs, Co, Pu, Ra, Sr, U, radionuclides, hydrocarbons, organic solvents, etc. Notes
In the genus Alyssum, free histamin (His) is an important Ni binding ligand that increases in the xylem proportionately to root Ni uptake | https://huggingface.co/datasets/fmars/wiki_stem |
This list covers hyperaccumulators, plant species which accumulate, or are tolerant of radionuclides (Cd, Cs-137, Co, Pu-238, Ra, Sr, U-234, 235, 238), hydrocarbons and organic solvents (Benzene, BTEX, DDT, Dieldrin, Endosulfan, Fluoranthene, MTBE, PCB, PCNB, TCE and by-products), and inorganic solvents (Potassium ferrocyanide).
See also:
Hyperaccumulators table – 1 : Ag, Al, As, Be, Cr, Cu, Hg, Mn, Mo, Naphthalene, Pb, Pd, Se, Zn
Hyperaccumulators table – 2 : Nickel
Notes
Uranium: The symbol for Uranium is sometimes given as Ur instead of U. According to Ulrich Schmidt and others, plants' concentration of uranium is considerably increased by an application of citric acid, which solubilizes the uranium (and other metals) | https://huggingface.co/datasets/fmars/wiki_stem |
Bioremediation is the process of decontaminating polluted sites through the usage of either endogenous or external microorganism. In situ is a term utilized within a variety of fields meaning "on site" and refers to the location of an event. Within the context of bioremediation, in situ indicates that the location of the bioremediation has occurred at the site of contamination without the translocation of the polluted materials | https://huggingface.co/datasets/fmars/wiki_stem |
Mangrove restoration is the regeneration of mangrove forest ecosystems in areas where they have previously existed. The practice of mangrove restoration is grounded in the discipline of restoration ecology, which aims to “[assist] the recovery of resilience and adaptive capacity of ecosystems that have been degraded, damaged, or destroyed”. Since environmental impacts are an ongoing threat, to successfully restore an ecosystem implies not merely to recreate its former condition, but to strengthen its capacity to adapt to change over time | https://huggingface.co/datasets/fmars/wiki_stem |
Microbial biodegradation is the use of bioremediation and biotransformation methods to harness the naturally occurring ability of microbial xenobiotic metabolism to degrade, transform or accumulate environmental pollutants, including hydrocarbons (e. g. oil), polychlorinated biphenyls (PCBs), polyaromatic hydrocarbons (PAHs), heterocyclic compounds (such as pyridine or quinoline), pharmaceutical substances, radionuclides and metals | https://huggingface.co/datasets/fmars/wiki_stem |
Domestic violence is violence or other abuse that occurs in a domestic setting, such as in a marriage or cohabitation. Domestic violence is often used as a synonym for intimate partner violence, which is committed by one of the people in an intimate relationship against the other person, and can take place in relationships or between former spouses or partners. In its broadest sense, domestic violence also involves violence against children, parents, or the elderly | https://huggingface.co/datasets/fmars/wiki_stem |
The following outline is provided as an overview of and topical guide to domestic violence:
Domestic violence – pattern of abusive behaviors by one or both partners in an intimate relationship, such as marriage, dating, family, or cohabitation. It is also known as domestic abuse, spousal abuse, battering, family violence, and intimate partner violence (IPV).
What type of thing is domestic violence?
Domestic violence can be described as all of the following:
Violence – use of physical force to apply a state to others contrary to their wishes and may include some combination of verbal, emotional, economic, physical and sexual abuse | https://huggingface.co/datasets/fmars/wiki_stem |
Abusive power and control (also controlling behavior and coercive control) is behavior used by an abusive person to gain and/or maintain control over another person. Abusers are commonly motivated by devaluation, personal gain, personal gratification, psychological projection, or the enjoyment of exercising power and control. The victims of this behavior are often subject to psychological, physical, mental, sexual, or financial abuse | https://huggingface.co/datasets/fmars/wiki_stem |
Narcissistic personality disorder (NPD) is a personality disorder that involves self-loathing, a fragile self-esteem and compensatory self-importance. It is also associated with primitive defence mechanisms and a superiority complex that protect the individual psychologically. The conduct of one's life is often disingenuous in the patient population and the avoidance of the appearance of inferiority (dependence) is common | https://huggingface.co/datasets/fmars/wiki_stem |
Child abduction or child theft is the unauthorized removal of a minor (a child under the age of legal adulthood) from the custody of the child's natural parents or legally appointed guardians.
The term child abduction includes two legal and social categories which differ by their perpetrating contexts: abduction by members of the child's family or abduction by strangers:
Parental child abduction is the unauthorized custody of a child by a family relative (usually one or both parents) without parental agreement and contrary to family law ruling, which may have removed the child from the care, access and contact of the other parent and family side. Occurring around parental separation or divorce, such parental or familial child abduction may include parental alienation, a form of child abuse seeking to disconnect a child from targeted parent and denigrated side of family | https://huggingface.co/datasets/fmars/wiki_stem |
A contact centre is a neutral place where children of separated families can enjoy contact with their non-resident parents and sometimes other family members, in a comfortable and safe environment. Child contact services are classified into two distinct categories, supported and supervised (which handle cases with safeguarding issues). Its primary role is to support and promote contact between those parents, grandparents, guardians and children that do not have a Residence Order (non-resident parent) | https://huggingface.co/datasets/fmars/wiki_stem |
Christianity and domestic violence deals with the debate in Christian communities about the recognition and response to domestic violence, which is complicated by a culture of silence and acceptance among abuse victims. There are some Bible verses that abusers use to justify discipline of their wives.
Abuse within marriage
Christian groups and authorities generally condemn domestic violence as inconsistent with the general Christian duty to love others and to the scriptural relationship between husband and wife | https://huggingface.co/datasets/fmars/wiki_stem |
A Domestic Abuse Restraining Order (DARO) is a form of restraining order or order of protection used under the domestic abuse laws of the state of Wisconsin, USA, and enforceable throughout the US under invocation of the Full Faith and Credit Clause in the Violence Against Women Act (18 U. S. C | https://huggingface.co/datasets/fmars/wiki_stem |
Pregnancy when coupled with domestic violence is a form of intimate partner violence (IPV) where health risks may be amplified. Abuse during pregnancy, whether physical, verbal or emotional, produces many adverse physical and psychological effects for both the mother and fetus. Domestic violence during pregnancy is categorized as abusive behavior towards a pregnant woman, where the pattern of abuse can often change in terms of severity and frequency of violence | https://huggingface.co/datasets/fmars/wiki_stem |
The effects of domestic violence on children have a tremendous impact on the well-being and developmental growth of children witnessing it. Children who witness domestic violence in the home often believe that they are to blame, live in a constant state of fear, and are 15 times more likely to be victims of child abuse. Close observation during an interaction can alert providers to the need for further investigation and intervention, such as dysfunctions in the physical, behavioral, emotional, and social areas of life, and can aid in early intervention and assistance for child victims | https://huggingface.co/datasets/fmars/wiki_stem |
Elder abuse (also called elder mistreatment, senior abuse, abuse in later life, abuse of older adults, abuse of older women, and abuse of older men) is "a single, or repeated act, or lack of appropriate action, occurring within any relationship where there is an expectation of trust, which causes harm or distress to an older person. " This definition has been adopted by the World Health Organization (WHO) from a definition put forward by Hourglass (formerly Action on Elder Abuse) in the UK. Laws protecting the elderly from abuse are similar to and related to laws protecting dependent adults from abuse | https://huggingface.co/datasets/fmars/wiki_stem |
Humiliation is the abasement of pride, which creates mortification or leads to a state of being humbled or reduced to lowliness or submission. It is an emotion felt by a person whose social status, either by force or willingly, has just decreased. It can be brought about through intimidation, physical or mental mistreatment or trickery, or by embarrassment if a person is revealed to have committed a socially or legally unacceptable act | https://huggingface.co/datasets/fmars/wiki_stem |
Amid the COVID-19 pandemic many countries have reported an increase in domestic violence and intimate partner violence. United Nations Secretary-General António Guterres, noting the "horrifying global surge", has called for a domestic violence "ceasefire". UN Women stated that COVID-19 created "conditions for abuse that are ideal for abusers because it forced people into lockdown" thus causing a "shadow pandemic" that exacerbated preexisting issues with domestic violence globally | https://huggingface.co/datasets/fmars/wiki_stem |
The term international child abduction is generally synonymous with international parental kidnapping, child snatching, and child stealing. However, the more precise legal usage of international child abduction originates in private international law and refers to the illegal removal of children from their home by an acquaintance or family member to a foreign country. In this context, "illegal" is normally taken to mean "in breach of custodial rights" and "home" is defined as the child's habitual residence | https://huggingface.co/datasets/fmars/wiki_stem |
The relationship between Islam and domestic violence is disputed. Even among Muslims, the uses and interpretations of Sharia, the moral code and religious law of Islam, lack consensus. Variations in interpretation are due to different schools of Islamic jurisprudence, histories and politics of religious institutions, conversions, reforms, and education | https://huggingface.co/datasets/fmars/wiki_stem |
Isolation (physical, social or emotional) is often used to facilitate power and control over someone for an abusive purpose. This applies in many contexts such as workplace bullying, elder abuse, domestic abuse, child abuse, and cults. Isolation reduces the opportunity of the abused to be rescued or escape from the abuse | https://huggingface.co/datasets/fmars/wiki_stem |
The Journal of Family Violence is a quarterly peer-reviewed scientific journal dedicated to the study of family violence. It was established in 1986 and is published by Springer Science+Business Media. The editor-in-chief is Rebecca J | https://huggingface.co/datasets/fmars/wiki_stem |
The management of domestic violence deals with the treatment of victims of domestic violence and preventing repetitions of such violence. The response to domestic violence in Western countries is typically a combined effort between law enforcement, social services, and health care. The role of each has evolved as domestic violence has been brought more into public view | https://huggingface.co/datasets/fmars/wiki_stem |
MOSAIC threat assessment systems (MOSAIC) is a method developed by Gavin de Becker and Associates to assess and screen threats and inappropriate communications.
Walt Risler of Indiana University assisted in the early development of the method, and Robert Martin, founding commander of the Los Angeles Police Department Threat Management Unit played a role in later development and enhancements. (Martin now heads up the MOSAIC threat assessment Unit at Gavin de Becker & Associates | https://huggingface.co/datasets/fmars/wiki_stem |
Murder of pregnant women is a type of homicide, often resulting from domestic violence. Domestic violence—or intimate partner violence (IPV)—is suffered by many, and when analyzing cases in which victims came forward, men are more likely than women to commit acts of severe domestic battery, and women are more likely to suffer serious injury as a result. Many of these women fear harm not just to themselves but also to their unborn children | https://huggingface.co/datasets/fmars/wiki_stem |
A narcissistic parent is a parent affected by narcissism or narcissistic personality disorder. Typically, narcissistic parents are exclusively and possessively close to their children and are threatened by their children's growing independence. This results in a pattern of narcissistic attachment, with the parent considering that the child exists solely to fulfill the parent's needs and wishes | https://huggingface.co/datasets/fmars/wiki_stem |
On April 10, 2007, the National Football League (NFL) introduced a new conduct policy to help control on and off-field behavior by its players and preserve the league's public image. The policy, introduced by NFL commissioner Roger Goodell, implements a tougher, new personal-conduct policy, and under conditions of the previous policy handed down two of the harshest suspensions in NFL history for off-field misdeeds. Each player that has been suspended must reapply for reinstatement | https://huggingface.co/datasets/fmars/wiki_stem |
A nuisance ordinance, also referred to as a crime-free ordinance or a disorderly house ordinance, is a local law usually passed on the town, city, or municipality level of government that aims to legally punish both landlords and tenants for crimes that occur on a property or in a neighborhood. These laws impose penalties under programs referred to as nuisance abatement when crimes are reported, regardless of whether crimes actually occurred or what the police action entailed. The result of these ordinances is for landlords to tell tenants to not report crimes, refuse to renew the lease of anyone involved in reporting a crime, and eviction of tenants involved in any crimes, even if the tenants were the victims of said crimes | https://huggingface.co/datasets/fmars/wiki_stem |
Abuse of parents by their children, also known as child-to-parent violence (CPV), is a form of domestic violence where parents receive maltreatment from their child or children. It is one of the most under-reported and under-researched subject areas in the field of psychology. Parents are quite often subject to levels of childhood aggression in excess of normal childhood aggressive outbursts, typically in the form of verbal or physical abuse | https://huggingface.co/datasets/fmars/wiki_stem |
Parental alienation is a theorized process through which a child becomes estranged from one parent as the result of the psychological manipulation of another parent. The child's estrangement may manifest itself as fear, disrespect or hostility toward the distant parent, and may extend to additional relatives or parties. The child's estrangement is disproportionate to any acts or conduct attributable to the alienated parent | https://huggingface.co/datasets/fmars/wiki_stem |
Bullying is the use of force, coercion, hurtful teasing or threat, to abuse, aggressively dominate or intimidate. The behavior is often repeated and habitual. One essential prerequisite is the perception (by the bully or by others) of an imbalance of physical or social power | https://huggingface.co/datasets/fmars/wiki_stem |
Parricide refers to the deliberate killing of one's own father and mother, spouse (husband or wife), children, and/or close relative. However, the term is sometimes used more generally to refer to the intentional killing of a near relative. It is an umbrella term that can be used to refer to acts of matricide and patricide | https://huggingface.co/datasets/fmars/wiki_stem |
Power and Control: Domestic Violence in America is a documentary film released in 2010 that depicts the issue of domestic violence in the U. S. as told through the personal story of Kim Mosher, a mother of three from Wabasha, Minnesota, and victim of physical and emotional abuse | https://huggingface.co/datasets/fmars/wiki_stem |
The Protection from Abuse (Scotland) Act 2001 (asp 14) is an Act of the Scottish Parliament. It was passed on 4 October 2001, receiving Royal Assent on 6 November.
Background and legislation
In January 2000, following the devolution of the Scottish Parliament the previous year, Justice Minister Jim Wallace announced proposals to reform family law in Scotland, which would include new legislation on domestic abuse | https://huggingface.co/datasets/fmars/wiki_stem |
Sibling abuse includes the physical, psychological, or sexual abuse of one sibling by another. More often than not, the younger sibling is abused by the older sibling. Sibling abuse is the most common of family violence in the US, but the least reported | https://huggingface.co/datasets/fmars/wiki_stem |
Sibling rivalry is a type of competition or animosity among siblings, whether blood-related or not.
Siblings generally spend more time together during childhood than they do with parents. The sibling bond is often complicated and is influenced by factors such as parental treatment, birth order, personality, and people and experiences outside the family | https://huggingface.co/datasets/fmars/wiki_stem |
The Signal for Help (or the Violence at Home Signal for Help) is a single-handed gesture that can be used over a video call or in person by an individual to alert others that they feel threatened and need help. Originally, the signal was created as a tool to combat the rise in domestic violence cases around the world linked to self-isolation measures that were related to the COVID-19 pandemic. The signal is performed by holding one hand up with the thumb tucked into the palm, then folding the four other fingers down, symbolically trapping the thumb by the rest of the fingers | https://huggingface.co/datasets/fmars/wiki_stem |
Strangulation in the context of domestic violence is a potentially lethal form of assault. Unconsciousness may occur within seconds of strangulation and death within minutes. Strangulation can be difficult to detect and until recently was often not treated as a serious crime | https://huggingface.co/datasets/fmars/wiki_stem |
Trauma- and violence-informed care (TVIC) describes a framework for working with and relating to people who have experienced negative consequences after exposure to dangerous experiences. There is no one single TVIC framework, or model, and some go by slightly different names, including Trauma Informed Care (TIC). They incorporate a number of perspectives, principles and skills | https://huggingface.co/datasets/fmars/wiki_stem |
V-Day is a global activist movement to end violence against women and girls started by author, playwright and activist Eve Ensler. V-Day began on February 14, 1998, when the very first V-Day benefit performance of Ensler's play The Vagina Monologues took place in NYC, raising over $250k for local anti-violence groups. V-Day was formed and became a 501(c)(3) organization with a mission to raise funds and awareness to end violence against all women and girls (cisgender, transgender, and those who hold fluid identities that are subject to gender based violence) | https://huggingface.co/datasets/fmars/wiki_stem |
Drowning is a type of suffocation induced by the submersion of the mouth and nose in a liquid. Most instances of fatal drowning occur alone or in situations where others present are either unaware of the victim's situation or unable to offer assistance. After successful resuscitation, drowning victims may experience breathing problems, vomiting, confusion, or unconsciousness | https://huggingface.co/datasets/fmars/wiki_stem |
Electric shock drowning is a term used in the US to describe a cause of death that occurs when swimmers are exposed to electric currents in the water. In some cases the shock itself is fatal, since the person will suffocate when their diaphragm is paralyzed, while in others it incapacitates the swimmer causing them to drown. The main cause of electric shock drownings is faulty electrical wiring on boats or piers that causes electric current to leak into the water | https://huggingface.co/datasets/fmars/wiki_stem |
The instinctive drowning response is an instinctive reaction that occurs in humans, particularly in non-swimmers, when close to drowning. It is focused on attempting to keep the mouth above water to the exclusion of useful effort to attract help or self rescue, and is often not recognized by onlookers. The reaction is characterized by lateral arm movements, a vertical posture, tilting back the head, and inability to keep the mouth above the water or talk | https://huggingface.co/datasets/fmars/wiki_stem |
Pool suction drain injury, also known as suction entrapment, occurs when the drain of a wading pool, swimming pool, hot tub, or fountain sucks in a swimmer's jewelry, torso, limbs, hair or buttocks. Evisceration, also known as disembowelment, could happen in case of buttock entrapment.
A standard 8 inches (20 cm) main drain can develop up to 350 pounds (160 kg) of force, which could hold a person underwater in tight grip until the suction is released | https://huggingface.co/datasets/fmars/wiki_stem |
A drug overdose (overdose or OD) is the ingestion or application of a drug or other substance in quantities much greater than are recommended. Typically it is used for cases when a risk to health will potentially result. An overdose may result in a toxic state or death | https://huggingface.co/datasets/fmars/wiki_stem |
An opioid overdose is toxicity due to excessive consumption of opioids, such as morphine, codeine, heroin, fentanyl, tramadol, and methadone. This preventable pathology can be fatal if it leads to respiratory depression, a lethal condition that can cause hypoxia from slow and shallow breathing. Other symptoms include small pupils (with the exception of pethidine, where there may be dilated pupils), and unconsciousness, however its onset can depend on the method of ingestion, the dosage and individual risk factors | https://huggingface.co/datasets/fmars/wiki_stem |
Supervised injection sites (SIS) are medically supervised facilities designed to provide a hygienic environment in which people are able to consume illicit recreational drugs intravenously and prevent deaths due to drug overdoses. The legality of such a facility is dependent by location and political jurisdiction. Supervised injection sites are part of a harm reduction approach towards drug problems | https://huggingface.co/datasets/fmars/wiki_stem |
Gun-related violence is violence committed with the use of a firearm. Gun-related violence may or may not be considered criminal. Criminal violence includes homicide (except when and where ruled justifiable), assault with a deadly weapon, and suicide, or attempted suicide, depending on jurisdiction | https://huggingface.co/datasets/fmars/wiki_stem |
#MyLastShot is a gun-violence prevention campaign created by students from Columbine High School and activists passionate about the issue. The project involves students placing stickers on their driver's licenses, student ID's, or phones that states their wishes to have the graphic photos of their bodies publicized if they die in a shooting. The project launched on March 27, 2019, less than one month before the 20th anniversary of the Columbine Shooting which took place on April 20, 1999 | https://huggingface.co/datasets/fmars/wiki_stem |
Gunshot residue (GSR), also known as cartridge discharge residue (CDR), gunfire residue (GFR), or firearm discharge residue (FDR), consists of all of the particles that are expelled from the muzzle of a gun following the discharge of a bullet. It is principally composed of burnt and unburnt particles from the explosive primer, the propellant (gunpowder), and vaporized lead. The act of firing a bullet incites a very violent explosive reaction that is contained within the barrel of the gun, which can cause the bullet, the barrel, or the cartridge to become chipped | https://huggingface.co/datasets/fmars/wiki_stem |
A gunshot wound (GSW) is a penetrating injury caused by a projectile (e. g. a bullet) from a gun (typically firearm or air gun) | https://huggingface.co/datasets/fmars/wiki_stem |
A mass shooting is a violent crime in which an attacker kills or injures multiple individuals simultaneously using a firearm. There is no widely-accepted definition of "mass shooting" and different organizations tracking such incidents use different definitions. Definitions of mass shootings exclude warfare and sometimes exclude instances of gang violence, armed robberies, and familicides | https://huggingface.co/datasets/fmars/wiki_stem |
Shooting incident reconstruction is the examination of the physical evidence recovered or documented at the scene of a shooting. Shooting reconstruction may also include the laboratory analysis of the evidence recovered at the scene. The goal is an attempt to gain an understanding of what may or may not have happened during the incident | https://huggingface.co/datasets/fmars/wiki_stem |
Projax stands for Prototype and Ajax. This is a port of RoR prototype and script. aculo | https://huggingface.co/datasets/fmars/wiki_stem |
In object-oriented programming, an interface or protocol type is a data type that acts as an abstraction of a class. It describes a set of method signatures, the implementations of which may be provided by multiple classes that are otherwise not necessarily related to each other. A class which provides the methods listed in a protocol is said to adopt the protocol, or to implement the interface | https://huggingface.co/datasets/fmars/wiki_stem |
A protothread is a low-overhead mechanism for concurrent programming.
Protothreads function as stackless, lightweight threads, or coroutines, providing a blocking context cheaply using minimal memory per protothread (on the order of single bytes).
Protothreads are used to accomplish a non-preempted form of concurrency known as cooperative multitasking and, therefore, do not incur context switch when yielding to another thread | https://huggingface.co/datasets/fmars/wiki_stem |
Pilo Visual Tools for Scheme (Pvts) is a basic interpreter implementation with visualization tools of the Scheme programming language developed at Rollins College. It is written in Java. PVTS contains an interpreter (also known as a read-eval-print loop) as well as three visualization modules: a global environment viewer, a function call viewer, and a data structure viewer | https://huggingface.co/datasets/fmars/wiki_stem |
Pyrex is a programming language for creating Python modules. Its syntax is very close to Python and it makes it easy for Python programmers to write non-Python supporting code for interfacing modules in a language which is as close to Python as possible.
Python itself only provides a C API to write extension modules, which allows writing of functions and datatypes in C | https://huggingface.co/datasets/fmars/wiki_stem |
RainbowCrack is a computer program which generates rainbow tables to be used in password cracking. RainbowCrack differs from "conventional" brute force crackers in that it uses large pre-computed tables called rainbow tables to reduce the length of time needed to crack a password drastically. RainbowCrack was developed by Zhu Shuanglei, and implements an improved time–memory tradeoff cryptanalysis attack which originated in Philippe Oechslin's Ophcrack | https://huggingface.co/datasets/fmars/wiki_stem |
In computer science, the term range may refer to one of three things:
The possible values that may be stored in a variable.
The upper and lower bounds of an array.
An alternative to iterator | https://huggingface.co/datasets/fmars/wiki_stem |
In computing, the red zone is a fixed-size area in a function's stack frame below (for a push-down stack) the current stack pointer that is reserved and safe to use. It is most commonly used in leaf functions (functions that don't call other functions) for allocating additional stack memory, without moving the stack pointer, which saves an instruction.
Whether a red zone is present depends on the calling convention | https://huggingface.co/datasets/fmars/wiki_stem |
In computer science, remote evaluation is a general term for any technology that involves the transmission of executable software code from a client computer to a server computer for subsequent execution at the server. After the code has finished executing, the results of its execution are sent back to the client.
Remote evaluation belongs to the family of mobile code, within the field of code mobility | https://huggingface.co/datasets/fmars/wiki_stem |
Role-oriented programming as a form of computer programming aims at expressing things in terms that are analogous to human conceptual understanding of the world. This should make programs easier to understand and maintain. The main idea of role-oriented programming is that humans think in terms of roles | https://huggingface.co/datasets/fmars/wiki_stem |
RPMsg (Remote Processor Messaging) is a protocol enabling inter-processor communication inside multi-core processors.
Background
Modern SoCs usually employ heterogeneous processors in Asymmetric multiprocessing (AMP) configurations, each of which may be running a different instance of an Operating system. Typically, SoCs have a central multi-core processor running a high-level OS, such as Linux, in a Symmetric multiprocessing (SMP) configuration, and additional remote processors running various flavors of a Real-time operating system | https://huggingface.co/datasets/fmars/wiki_stem |
A Runtime Callable Wrapper (RCW) is a proxy object generated by the . NET Common Language Runtime (CLR) in order to allow a Component Object Model (COM) object to be accessed from managed code. Although the RCW appears to be an ordinary object to | https://huggingface.co/datasets/fmars/wiki_stem |
Sigar is a free software library (under the Apache License) that provides a cross-platform, cross-language programming interface to low-level information on computer hardware and operating system activity. The library provides bindings for many popular computer languages and has been ported to over 25 different operating system/hardware combinations. Sigar stands for System Information Gatherer And Reporter and was originally developed by Doug MacEachern, the author of the popular mod_perl module for the Apache web server | https://huggingface.co/datasets/fmars/wiki_stem |
The singly rooted hierarchy, in object-oriented programming, is a characteristic of most (but not all) OOP-based programming languages. In most such languages, in fact, all classes inherit directly or indirectly from a single root, usually with a name similar to Object; all classes then form a common inheritance hierarchy.
This idea was introduced first by Smalltalk, and was since used in most other object-oriented languages (notably Java and C#) | https://huggingface.co/datasets/fmars/wiki_stem |
Petri net (PN) slicing is a syntactic technique used to reduce a PN model based on a given criterion. Informally, a slicing criterion could be a property for which a PN model is analyzed or is a set of places, transitions, or both. A sliced part constitutes only that part of a PN model that may affect the criteria | https://huggingface.co/datasets/fmars/wiki_stem |
Source-code compatibility (source-compatible) means that a program can run on computers (or operating systems), independently of binary-code compatibility and that the source code is needed for portability. The source code must be compiled before running, unless the computer used has an interpreter for the language at hand. The term is also used for assembly language compatibility, where the source is a human-readable form of machine code that must be converted into numerical (i | https://huggingface.co/datasets/fmars/wiki_stem |
In the jargon of computer programming, a source upgrade is a modification of a computer program's source code, which adds new features and options to it, improves performance and stability, or fixes bugs and errors from the previous version. There are two popular types of source upgrades, which are listed here:
Patch: source upgrade, where the modification of original source is provided in a special patch program. The patch is released by the developer of software | https://huggingface.co/datasets/fmars/wiki_stem |
Stack is a tool to build Haskell projects and manage their dependencies. It uses the Cabal library but with a curated version of the Hackage repository called Stackage. Stack competes against Cabal's binary cabal-install and has been created as a result of the overall criticism about dependency problems | https://huggingface.co/datasets/fmars/wiki_stem |
Strong Key is a naming convention used in computer programming. There can be more than one component (e. g | https://huggingface.co/datasets/fmars/wiki_stem |
strsafe. h is a non-standard C header file provided with the Windows SDK starting with Windows XP Service Pack 2 that provides safer buffer handling than that which is provided by the standard C string functions, which are widely known to have security issues involving buffer overruns when not used correctly.
Description
The functions included in strsafe | https://huggingface.co/datasets/fmars/wiki_stem |
STUDENT is an early artificial intelligence program that solves algebra word problems. It is written in Lisp by Daniel G. Bobrow as his PhD thesis in 1964 (Bobrow 1964) | https://huggingface.co/datasets/fmars/wiki_stem |
SUnit is a unit testing framework for the programming language Smalltalk. It is the original source of the xUnit design, originally written by one of the creators of Extreme Programming, Kent Beck. SUnit allows writing tests and checking results in Smalltalk | https://huggingface.co/datasets/fmars/wiki_stem |
Symbolics Document Examiner is a powerful and early hypertext system developed at Symbolics (a manufacturer of high-end workstations) by Janet Walker in 1985. The Symbolics Document Examiner was first used for a hypertext implementation of the Symbolics manual in the sixth release of the Genera operating system, and was well liked, winning an award from the Society for Technical Documentation.
History
The Symbolics manual was an 8,000-page document that was represented in a 10,000-node "hyperdocument" containing 23,000 links in all | https://huggingface.co/datasets/fmars/wiki_stem |
In computer science, a syntax error is an error in the syntax of a sequence of characters or tokens that is intended to be written in a particular programming language.
For compiled languages, syntax errors are detected at compile-time. A program will not compile until all syntax errors are corrected | https://huggingface.co/datasets/fmars/wiki_stem |
In operating systems, a task manager is a system monitor program used to provide information about the processes and applications running on a computer, as well as the general status of the computer. Some implementations can also be used to terminate processes and applications, as well as change the processes' scheduling priority. In some environments, users can access a task manager with the Control-Alt-Delete keyboard shortcut | https://huggingface.co/datasets/fmars/wiki_stem |
A terminal pager, paging program or simply pager is a computer program used to view (but not modify) the contents of a text file moving down the file one line or one screen at a time. Some, but not all, pagers allow movement up a file. A popular cross-platform terminal pager is more, which can move forwards and backwards in text files but cannot move backwards in pipes | https://huggingface.co/datasets/fmars/wiki_stem |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.