text
stringlengths
858
3.18k
subdomain_id
stringclasses
9 values
similarity_score
float64
0.5
0.79
token_count
int64
256
512
source_dataset
stringclasses
1 value
source_id
stringlengths
47
47
chunk_index
int64
0
235
filtering_threshold
float64
0.5
0.5
created_at
stringdate
2025-12-19 07:35:31
2025-12-19 11:31:47
this tutorial, developed for high school physics students, uses multiple graphs and animations to study the relationship between the motion of an object and its graph of velocity vs. time. users explore the relationship between position and velocity, positive and negative velocities, slope and shape of graphs, and acceleration. interactive self - evaluations are included. see related materials for an accompanying lab by the same author. this item is part of the physics classroom, a comprehensive set of tutorials and multimedia resources for high school physics. editor ' s note : education research indicates that many students have difficulty differentiating velocity and acceleration, and often plot velocity graphs as the path of an object. see related materials for a free research - based diagnostic tool to probe misconceptions related to velocity. 6 - 8 : 4f / m3b. if a force acts towards a single center, the object ' s path may curve into an orbit around the center. 9 - 12 : 4f / h1. the change in motion ( direction or speed ) of an object is proportional to the applied force and inversely proportional to the mass. 9 - 12 : 4f / h8. any object maintains a constant speed and direction of motion unless an unbalanced outside force acts on it. 9. the mathematical world 9b. symbolic relationships 6 - 8 : 9b / m3. graphs can show a variety of possible relationships between two variables. as one variable increases uniformly, the other may do one of the following : increase or decrease steadily, increase or decrease faster and faster, get closer and closer to some limiting value, reach some intermediate maximum or minimum, alternately increase and decrease, increase or decrease in steps, or do something different from any of these. 9 - 12 : 9b / h4. tables, graphs, and symbols are alternative ways of representing data and relationships that can be translated from one to another. 9 - 12 : 9c / h3c. a graph represents all the values that satisfy an equation, and if two equations have to be satisfied at the same time, the values that satisfy them both will be found where the graphs intersect. common core state standards for mathematics alignments expressions and equations ( 6 - 8 ) represent and analyze quantitative relationships between dependent and independent variables. ( 6 ) 6. ee. 9 use variables to represent two quantities in a real - world problem that change in relationship to one another ; write an equation to express one quantity, thought of as the dependent variable, in terms of the other quantity, thought of
subdomain_quantum_field_theory
0.620093
512
HuggingFaceFW/fineweb-edu
<urn:uuid:9c52facc-6efa-4158-bbd2-7f8905b6f5a6>
0
0.5
2025-12-19T11:31:46.845129
) 6. ee. 9 use variables to represent two quantities in a real - world problem that change in relationship to one another ; write an equation to express one quantity, thought of as the dependent variable, in terms of the other quantity, thought of as the independent variable. analyze the relationship between the dependent and independent variables using graphs and tables, and relate these to the equation. understand the connections between proportional relationships, lines, and linear equations. ( 8 ) 8. ee. 5 graph proportional relationships, interpreting the unit rate as the slope of the graph. compare two different proportional relationships represented in different ways. use functions to model relationships between quantities. ( 8 ) 8. f. 5 describe qualitatively the functional relationship between two quantities by analyzing a graph ( e. g., where the function is increasing or decreasing, linear or nonlinear ). sketch a graph that exhibits the qualitative features of a function that has been described verbally. high school — functions ( 9 - 12 ) interpreting functions ( 9 - 12 ) f - if. 4 for a function that models a relationship between two quantities, interpret key features of graphs and tables in terms of the quantities, and sketch graphs showing key features given a verbal description of the relationship.? linear, quadratic, and exponential models? ( 9 - 12 ) f - le. 1. b recognize situations in which one quantity changes at a constant rate per unit interval relative to another. f - le. 1. c recognize situations in which a quantity grows or decays by a constant percent rate per unit interval relative to another. f - le. 2 construct linear and exponential functions, including arithmetic and geometric sequences, given a graph, a description of a relationship, or two input - output pairs ( include reading these from a table ). common core state reading standards for literacy in science and technical subjects 6 — 12 craft and structure ( 6 - 12 ) rst. 9 - 10. 4 determine the meaning of symbols, key terms, and other domain - specific words and phrases as they are used in a specific scientific or technical context relevant to grades 9 — 10 texts and topics. range of reading and level of text complexity ( 6 - 12 ) rst. 9 - 10. 10 by the end of grade 10, read and comprehend science / technical texts in the grades 9 — 10 text complexity band independently and proficiently. this resource is part of a physics front topical unit. topic : kinematics : the physics of motion unit title : graphing a companion to the resource above
subdomain_quantum_field_theory
0.594613
512
HuggingFaceFW/fineweb-edu
<urn:uuid:9c52facc-6efa-4158-bbd2-7f8905b6f5a6>
1
0.5
2025-12-19T11:31:46.846121
this material has 2 associated documents. select a document title to view a document ' s information. the einstein cannon model computes and displays the trajectory of cannonballs ( particles ) shot from a cannon in the vicinity of a black hole. it was created for the study of einstein ' s theory of general relativity and the schwarzschild metric. the main window displays a map of space in the vicinity of the black hole using schwarzschild coordinates and a cannon located a distance r0 from the center black hole ' s center. the position and firing angle of the cannon can be adjusted by dragging a marker and the number of cannon balls and their initial speed can be changed using input fields. the maximum speed of the cannon ball is the speed of light c = 1 in accordance with einstein ' s theory. newton suggested that a cannon ball fired from a high mountain could fall to earth, orbit the earth, or fly away depending on how it was fired. the same is true in general relativity but there are many important differences. this model demonstrates these differences. the einstein cannon model is a supplemental simulation for the article " when action is not least for orbits in general relativity " by c. g. gray and eric poisson in the american journal of physics 79 ( 1 ), 43 - 55 ( 2011 ) and has been approved by the authors and the american journal of physics ( ajp ) editor. the simulation was developed using the easy java simulations ( ejs ) modeling tool and is distributed as a ready - to - run ( compiled ) java archive. double clicking the ejs _ gr _ einsteincannon. jar file will run the program if java is installed. last modified june 12, 2013 this file has previous versions.
subdomain_quantum_gravity
0.603179
347
HuggingFaceFW/fineweb-edu
<urn:uuid:30473464-14c9-4b83-96a9-e55a7faabbb7>
0
0.5
2025-12-19T11:31:46.848130
1. a fatal disease of cattle that affects the central nervous system. 4. the small projection of a mammary gland. 8. the act of slowing down or falling behind. 11. a drug combination found in some over - the - counter headache remedies ( aspirin and phenacetin and caffeine ). 12. goddess of the dead and queen of the underworld. 13. a hospital unit staffed and equipped to provide intensive care. 14. a police officer who investigates crimes. 15. divulge information or secrets. 16. a logarithmic unit of sound intensity equal to 10 decibels. 17. a radioactive element of the actinide series. 19. a range of mountains ( usually with jagged peaks and irregular outline ). 24. open - heart surgery in which the rib cage is opened and a section of a blood vessel is grafted from the aorta to the coronary artery to bypass the blocked section of the coronary artery and improve the blood supply to the heart. 25. a piece of furniture that provides a place to sleep. 27. resinlike substance secreted by certain lac insects. 29. a family of sino - tibetan languages spoken in southeastern asia. 31. a highly unstable radioactive element ( the heaviest of the halogen series ). 34. an official prosecutor for a judicial district. 35. a soft silvery metallic element of the alkali earth group. 36. ( greek mythology ) goddess of the earth and mother of cronus and the titans in ancient mythology. 38. the protoplasm of the germ cells that contains chromosomes and genes. 41. the blood group whose red cells carry both the a and b antigens. 42. a summary that repeats the substance of a longer discussion. 46. aircraft landing in bad weather in which the pilot is talked down by ground control using precision approach radar. 47. call upon in supplication. 49. ( irish ) mother of the tuatha de danann. 50. united states liquid unit equal to 4 quarts or 3. 785 liters. 51. a condition ( mostly in boys ) characterized by behavioral and learning disorders. 52. a strategically located monarchy on the southern and eastern coasts of the arabian peninsula. 53. a loose sleeveless outer garment made from aba cloth. 1. a chadic language spoken south of lake chad. 2. a detailed description of design criteria for a piece of work. 3. ( computer science ) a coding system that incorporates extra parity bits
subdomain_quantum_optics
0.597156
512
HuggingFaceFW/fineweb-edu
<urn:uuid:f3edb1ee-4cf4-49bc-aaa3-16f61148920b>
0
0.5
2025-12-19T11:31:46.897291
sleeveless outer garment made from aba cloth. 1. a chadic language spoken south of lake chad. 2. a detailed description of design criteria for a piece of work. 3. ( computer science ) a coding system that incorporates extra parity bits in order to detect errors. 4. a bachelor ' s degree in theology. 5. the fatty flesh of eel. 6. by bad luck. 7. a sock with a separation for the big toe. 8. a small faint zodiacal constellation in the southern hemisphere. 9. sour or bitter in taste. 10. a russian prison camp for political prisoners. 18. a person forced to flee from home or country. 20. liquid containing proteins and electrolytes including the liquid in blood plasma and interstitial fluid. 21. not divisible by two. 22. english essayist ( 1775 - 1834 ). 23. a white metallic element that burns with a brilliant light. 26. ( akkadian ) god of wisdom. 28. a compartment in front of a motor vehicle where driver sits. 30. the sixth month of the civil year. 32. united states abolitionist ( 1786 - 1865 ). 33. a bantu language spoken by the chaga people in northern tanzania. 37. in bed. 38. being ten more than one hundred ninety. 39. someone who works ( or provides workers ) during a strike. 40. the arch of bone beneath the eye that forms the prominence of the cheek. 43. the capital and largest city of japan. 44. a rotating disk shaped to convert circular into linear motion. 45. ( irish ) mother of the ancient irish gods. 46. a heavy brittle diamagnetic trivalent metallic element ( resembles arsenic and antimony chemically ). 48. a ductile silvery - white ductile ferromagnetic trivalent metallic element of the rare earth group.
subdomain_quantum_optics
0.569175
380
HuggingFaceFW/fineweb-edu
<urn:uuid:f3edb1ee-4cf4-49bc-aaa3-16f61148920b>
1
0.5
2025-12-19T11:31:46.898404
a laparoscopy ( lap - uh - ross - coe - pee ) is a surgical procedure in which a small instrument is inserted through an incision in the navel. this instrument, called a laparoscope ( lap - uh - roe - scope ), functions like a miniature telescope, with a light on the end, giving doctors an internal view of the abdominal cavity. sometimes, the abdomen is inflated with carbon dioxide gas, so internal organs can be re - positioned as needed. a laparoscopy may be done to investigate a problem like pelvic pain, or infertility when a tubal blockage is suspected. it ' s also used to remove an ectopic embryo, which is one that ' s developed in a fallopian tube by mistake, instead of in the uterus. one of the most common uses of laparoscopy is in tubal sterilization procedures. here, both the laparoscope and the laser or other cutting instrument are passed through the navel, thus eliminating any abdominal scar. examination of the liver, gallbladder, and appendix may also be done by laparoscopy. regardless of its purpose, the operation is typically done under general anesthesia, on an outpatient basis. to find out more about laparoscopy, speak with a physician.
subdomain_quantum_metrology
0.527496
270
HuggingFaceFW/fineweb-edu
<urn:uuid:1b4f7c26-bf59-491a-9bcb-5700c1647efb>
0
0.5
2025-12-19T11:31:46.913354
previous dailytech stories have detailed recent cooling experienced by the planet, and highlighted some of the scientists currently predicting extended global cooling. even the un ipcc has stated that world temperatures may continue to decline, if only briefly. now, an expert in geophysics at the national autonomous university of mexico has added his voice to the fray. victor manuel velasco herrera, a researcher at unam ' s institute of geophysics, has predicted an imminent period of cooling intense enough to be called a small ice age. speaking to a crowd at a conference at the center for applied sciences and technological development, herrera says the sun can both cool and warm the planet. variations in solar activity, he says, are causing changes in the earth ' s climate. " so that in two years or so, there will be a small ice age that lasts from 60 to 80 years ", he said. " the most immediate result will be drought. " herrera says satellite temperature data indicates this cooling may have already begun. recent increases in glacier mass in the andes, patagonia, and canada were given as further evidence of an upcoming cold spell. herrera also described the predictions of the intergovernmental panel on climate change ( ipcc ) as " erroneous ". according to herrera, their forecasts “ are incorrect because are only based on mathematical models which do not include [ factors such as ] solar activity ". herrera pointed to the so - called " little ice age " which peaked in the 17th century, as a previous cooling event caused by solar fluctuations. herrera made his remarks at unam, located in mexico city, is the oldest university on the north american continent.
subdomain_quantum_thermodynamics
0.512529
334
HuggingFaceFW/fineweb-edu
<urn:uuid:b541eb1c-8210-4607-99fd-7ed44c1918fe>
0
0.5
2025-12-19T11:31:46.943661
new solar cell gives its " 110 percent " in efficiency december 20, 2011 6 : 23 pm comment ( s ) - last by like tebow, these new solar cells are giving their " 110 percent " week in and week out. gains to quantum efficiency could yield around a 35 percent gain in conversion efficiency, the key metric using quantum dots - - tiny nanometer scale semiconductor crystals - - researchers at the u. s. national renewable energy laboratory have cracked an important physical barrier and achieved levels of performance long considered impossible for a solar cell. i. giving its 110 percent the special design used by the team utilized quantum dot nanocrystals in the 1 - 20 nm range. the nanocrystals were composed of lead selenide treated with ethanedithol and hydrazine. the photon - harvesting quantum dot - populated plane was sandwiched between a nanostructured zinc oxide layer and a thin gold electrode. a top layer was formed using a transparent conductor. the overall design is in line with the " thin - film " methodology, which is currently rising in commercial production. thin film cells tend to rely on scarce ( i. e. expensive on a per mass basis ) resources, such as rare earth metals. however, they use so little of them - - given the low mass of the thin film - - that they are not significantly more expensive than existing polycrystalline silicon cells. generally, the only major extra cost to thin film is the initial cost of shifting the production technology. the new nrel cell shatters the quantum efficiencies of previous designs, posting a peak external quantum efficiency of 114 ± 1 % and a peak internal quantum efficiency of 130 %. in order to understand these numbers and how any power efficiency device can be more than " 100 percent " efficient, you must understand the meaning of quantum efficiency ( qe ), which is overall quite different, but related to conversion efficiency ( which will be over 100 percent - - or even to 100 percent - - in traditional physics ). the new cell is a thin film design. [ image source : nrel ] quantum efficiency is a measure of how many electrons come out of a cell for every photon that goes into the cell. traditional silicon solar cells can achieve near 100 percent quantum efficiency at around 600 nm, but drop to around 80 percent on either end of the 500 - 1000 nm range ( visible light is 380 to 740 nm ). what this means is that the perfect " color " of light for silicon cells is orangish, while purple light can
subdomain_quantum_thermodynamics
0.604245
512
HuggingFaceFW/fineweb-edu
<urn:uuid:1a9a77dc-6a26-4c11-9a4e-634f9162f5e6>
0
0.5
2025-12-19T11:31:46.953914
but drop to around 80 percent on either end of the 500 - 1000 nm range ( visible light is 380 to 740 nm ). what this means is that the perfect " color " of light for silicon cells is orangish, while purple light can have a less than 45 percent conversion rate. as white light ( sunlight ) is a mixture of different wavelengths, the lower quantum efficiency of certain parts of the spectrum leads to lower average quantum efficiency. external efficiency directly uses the number of input photons and the number of output electrons from a device. internal efficiency, by contrast, uses theory to adjust these numbers to account for losses due to reflection and absorption. we took the liberty of borrowing ( fair use clause title 17 > chapter 1 > § 107 ) the charts for their 0. 72 ev bandgap cell ( their best - performing design ) and comparing it to a traditional pc silicon cell, adding a helpful reference that shows what evs roughly correspond to in the visible light range : comparing the external quantum efficiencies of the new nrel design ( top ) and the ps silicon design ( bottom ) over the visible light range ( middle bar ), we see that the new cell is slightly less efficient in capturing red - end light, but is much more efficient in capturing blue - end light. ( the black line in bottom graph and the blue line in the top right graph are the internal qes. ) overall this could grant up to a 35 percent efficiency gain versus today ' s standard ps silicon cells, according to the paper ' s authors. ii. you " cannot change the laws of physics " - - so pick a better law! the better blue - range performance comes thanks to multiple exciton generation ( meg ), a unique quantum effect, which like other oddball quantum effects, occurs at an extremely small scale. in an meg scenario, a single photon hits an atom, but rather than simply knocking off one electron via the formation of an " exciton " ( an electron / hole pair ), it puts multiple electrons into the flow. meg - - multiple exciton generation - - bends the traditional laws of physics. [ image source : los alamos science & tech mag. / u. s. department of energy ' s nnsa ] the exact quantum mechanics of this phenomena are being debated by physics. currently the three leading hypotheses are : - - the high energy exciton ( " x " ) becomes a " multi " - x, decaying through a dense range of multi - x
subdomain_quantum_optics
0.612627
512
HuggingFaceFW/fineweb-edu
<urn:uuid:1a9a77dc-6a26-4c11-9a4e-634f9162f5e6>
1
0.5
2025-12-19T11:31:46.954936
of this phenomena are being debated by physics. currently the three leading hypotheses are : - - the high energy exciton ( " x " ) becomes a " multi " - x, decaying through a dense range of multi - x states. - - a mixed " virtual " state consisting of multi - x and x ( think superposition ) is triggered by photon energetic absorption. - - photon absorption creates standard x, but in the special material x waffles back and forth, switching identity from x to multi - x and back, slowly dropping in energy, in the process. without meg, no solar cell can have more than a 100 percent internal or external qe. hence no traditional solar cell has had greater than a 100 percent qe, even at its optimal part of the spectrum ( e. g. orange light for silicon cells ). this means that the overall efficiency ( ce ) of a traditional cell - - even if perfectly optimized - - would not exceed 32 percent. cumulatively this 100 / 32 ( qe / ce ) limit is named the shockley - queisser limit after its discoverers ( s - q limit, for short ). as scotty would say " you cannot change the laws of physics. " but sometimes you have your cake and eat it to, if only you find the right quirk in complex and poorly understood physics of our universe. that ' s fundamentally what has been done here. meg was first theorized by nrel researcher arthur j. nozik, ph. d back in 2001, and was later confirmed to work in quantum dots, thanks to their special scale. this method is also known as " hot carrier generation ". using this quantum effect, later proved in the laboratory, the s - q performance barrier could be shattered. a useful property of quantum dots, is that their size determines their band gap, and hence the efficiency. thus building the " perfect " meg cell is simply a matter of picking the right size dots. as the bandgap tends to decrease as the quantum dot size and efficiency increase, the trick is to pick a quantum dot that is as big as possible, without losing the quantum effects. quantum dots don ' t just look pretty, they have some handy physics quirks too! [ image source : elec - intro ] quantum dots also generate electron / hole pairs easier, with room temperature being enough excite ( generate electricity ) in some quantum dot materials. the most recent paper was [ abstract ] in the peer - reviewed journal
subdomain_quantum_optics
0.678599
512
HuggingFaceFW/fineweb-edu
<urn:uuid:1a9a77dc-6a26-4c11-9a4e-634f9162f5e6>
2
0.5
2025-12-19T11:31:46.955882
[ image source : elec - intro ] quantum dots also generate electron / hole pairs easier, with room temperature being enough excite ( generate electricity ) in some quantum dot materials. the most recent paper was [ abstract ] in the peer - reviewed journal, with matthew c. beard taking the distinction of senior author and octavi e. semonin the distinction of being first author. professor novik was listed second to last, after four additional nrel colleagues. iii. third generation solar cells - - finally a solar tech. worth investing in " first " and " second " generation solar cells use various bulk semiconductors such as silicon, cadmium telluride, or copper indium gallium ( di ) selenide, which are then mixed with third, fourth, and fifth column ( in the periodic table ) elements to improve performance. ideally quantum dot cells could be combined with these traditional thin - film semiconductor cell designs, or applied using a mixture of nanocrystalline quantum dots optimized for different wavelengths. either methodology could yield an optimized " third " generation ( aka. next generation ) design. such a cell would enjoy the best of both worlds - - silicon cells ' excellent red range performance, along with quantum dots excellent performance on the higher end ( blue ) of the visible light spectrum. one approach to make a third generation ultra - efficient cell is to use a mixture of wavelength optimized quantum dots. [ image source : los alamos science & tech mag. / u. s. department of energy ' s nnsa ] while quantum dots are generally thought to be amenable to thin film cell " roll - to - roll " printing processes, the precise methods to do this on a mass production scale still have to be ironed out. furthermore, the quantum dot cells measured in this study exhibited a pretty low 4. 5 percent efficiency. while that sounds quite bad, it ’ s largely a result of the lower amount of quantum dots used in the absorbing layer. if quantum dot deposition techniques can be refined, the aforementioned " third " generation mixed cell could be finally realized. if somebody is going to do that, it will probably be professor nozik ' s team at the nrel. after all, they ' re who first discovered how to play the grand meg prank on the laws of physics in the first place. with these third generation solar cells, the technology may finally have the legs under it to compete with cheaper power generation methods ( e. g. carbon - based fuels and nuclear energy
subdomain_quantum_thermodynamics
0.595545
512
HuggingFaceFW/fineweb-edu
<urn:uuid:1a9a77dc-6a26-4c11-9a4e-634f9162f5e6>
3
0.5
2025-12-19T11:31:46.956971
play the grand meg prank on the laws of physics in the first place. with these third generation solar cells, the technology may finally have the legs under it to compete with cheaper power generation methods ( e. g. carbon - based fuels and nuclear energy ). that ' s not only good news for mankind ' s terrestrial future ; it ' s good news for future interstellar travellers, who will likely rely heavily on a mixture of solar and nuclear ( fusion ) energy this article is over a month old, voting and posting comments is disabled re : the break through needed 12 / 20 / 2011 10 : 17 : 47 pm you can also allow more water to flow through hydro dams at night and when overcast, the point is not to be dependent on one source. re : the break through needed 12 / 21 / 2011 4 : 13 : 34 am exactly. there is too much negativity towards solar. of course it won ' t work if this is our sole method of power generation but it definitely has its place. " well, there may be a reason why they call them ' mac ' trucks! windows machines will not be trucks. " - - microsoft ceo steve ballmer scientists cook up artificial leaf, quantum dots for solar cells march 29, 2011, 8 : 32 am " snowflake " plasma containment field could hold key to fusion ' s future november 8, 2010, 1 : 30 pm ucsd scientists create direct electron to photon circuitry june 23, 2008, 2 : 24 pm nasa introduces asteroid grand challenge to protect earth june 18, 2013, 8 : 48 pm nsa leaker may be killed in drone strike says ron paul june 17, 2013, 11 : 18 am airbus a350 xwb " msn1 " has successful first flight june 17, 2013, 11 : 02 am study : gamers have better visual, decision - making skills than non - gamers june 12, 2013, 11 : 26 am airbus a350 xwb to take first flight friday, looks to challenge boeing dreamliner june 11, 2013, 8 : 20 pm berkeley lab tests artificial photosynthesis with new microfluidic test - bed june 11, 2013, 11 : 41 am most popular articles source : don ' t worry, nsa spies on " 99 percent " of americans ' locations, call records june 14, 2013, 3 : 57 pm xbox chief : if you can ' t get online, don ' t buy an xbox one june 12, 2013, 9 : 57 am gigahertz wars 2. 0?
subdomain_quantum_entanglement
0.546129
512
HuggingFaceFW/fineweb-edu
<urn:uuid:1a9a77dc-6a26-4c11-9a4e-634f9162f5e6>
4
0.5
2025-12-19T11:31:46.957985
defining a wireless solution, page 2 5. 1 wireless building blocks before jumping into the mechanics of solution development, it is worth reviewing the basic building blocks that compose a complete wireless solution. while wireless solutions vary widely in characteristics, they all draw items from four categories of architectural components : client devices, wireless applications, information infrastructure, and wireless networks. these components are shown in figure 5. 2. client devices are the most visible component of a wireless solution. they are the physical platform for wireless applications and provide services such as voice communications, data capture and display, information processing, and location detection. these devices may be carried by users, mounted within shipping containers, or installed inside a car. client devices include smart phones, pagers, pdas, e - mail appliances, and special - purpose units for scanning, bar coding, and credit card reading. the components of a complete wireless solution wireless applications supply the business functionality behind the wireless solution. they can cover any need from personal productivity to safety and asset monitoring. depending on the functionality required, these applications may be " off - the - shelf " packages, custom developed, or " re - purposed " from existing web applications. the information infrastructure is the repository of knowledge incorporated within the wireless solution. although these data components are invisible to most users, access to information is the " raison d ' etre " for most wireless solutions. this information may be environmental data captured on an oil rig for display at a monitoring station or it may be an amalgam of customer information drawn from a variety of corporate information systems and databases. the information infrastructure consists of the back - end applications, databases, voice systems, e - mail systems, middleware, and other components needed to support the information requirements of the chosen wireless application. wireless networks serve as the conduit, or transport mechanism, between devices or between devices and traditional wired networks ( corporate networks, the internet, etc. ). these networks vary widely in cost, coverage, and transmission rates ; they include options such as infrared, bluetooth, wlan, digital cellular, and satellite. together, these four components constitute the wireless solution ' s architecture. in the simplest case, this architecture consists of a single device type, using a single application and connected to a single network. however, many business solutions will be more complex, supporting multiple client devices, offering a variety of applications, and stitching together multiple networks to gain the desired level of coverage. the solution ' s implementation and support infrastructure provides the processes, tools, and resources used
subdomain_quantum_cryptography
0.562007
512
HuggingFaceFW/fineweb-edu
<urn:uuid:39212adc-e0c7-407c-8ba0-75f6f1e6973b>
0
0.5
2025-12-19T11:31:46.964417
many business solutions will be more complex, supporting multiple client devices, offering a variety of applications, and stitching together multiple networks to gain the desired level of coverage. the solution ' s implementation and support infrastructure provides the processes, tools, and resources used to create, operate, and support the wireless solution. this infrastructure ensures that users are trained, data is backed up, secured and synchronized, system and application software is kept up - to - date, devices remain functional, and networks operate efficiently. although not part of the wireless architecture, the quality of this infrastructure is crucial for the success of the overall solution. as such, it merits as much consideration as the other wireless components when designing the solution. business processes form the final component of a complete wireless solution. these are the processes that inspired the solution in the first place. depending on the goals of the project, the wireless solution should enable your company to perform these processes faster, cheaper, and more efficiently than before. gaining these benefits, however, requires redesigning and implementing new versions of processes that take advantage of the wireless solution. to capture the benefits of immediate, on - site invoicing offered by the field service example in chapter 2, a company needs to change processes and job responsibilities in the customer service, field service, and billing organizations. without these changes, work orders will still be entered manually in the company ' s systems by customer service, invoices will still be produced by the billing department, and the wireless device will simply end up as a new toy in the hands of the field service worker. while they are an integral part of a successful solution, business processes are usually outside the scope of responsibility of the technical team implementing and supporting the wireless solution. implementing new business processes is its own project and requires knowledgeable resources backed by management commitment to the change.
subdomain_quantum_cryptography
0.504095
367
HuggingFaceFW/fineweb-edu
<urn:uuid:39212adc-e0c7-407c-8ba0-75f6f1e6973b>
1
0.5
2025-12-19T11:31:46.965360
| related fields and sub - fields | information technology ( it ) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. the term is commonly used as a synonym for computers and computer networks, but it also encompasses other information distribution technologies such as television and telephones. several industries are associated with information technology, such as computer hardware, software, electronics, semiconductors, internet, telecom equipment, e - commerce and computer services. in a business context, the information technology association of america has defined information technology as " the study, design, development, application, implementation, support or management of computer - based information systems ". the responsibilities of those working in the field include network administration, software development and installation, and the planning and management of an organisation ' s technology life cycle, by which hardware and software is maintained, upgraded, and replaced. humans have been storing, retrieving, manipulating and communicating information since the sumerians in mesopotamia developed writing in about 3000 bc, but the term " information technology " in its modern sense first appeared in a 1958 article published in the harvard business review ; authors harold j. leavitt and thomas l. whisler commented that " the new technology does not yet have a single established name. we shall call it information technology ( it ). " based on the storage and processing technologies employed, it is possible to distinguish four distinct phases of it development : pre - mechanical ( 3000 bc – 1450 ad ), mechanical ( 1450 – 1840 ), electromechanical ( 1840 – 1940 ) and electronic ( 1940 – present ). this article focuses on the most recent period ( electronic ), which began in about 1940. history of computers devices have been used to aid computation for thousands of years, probably initially in the form of a tally stick. the antikythera mechanism, dating from about the beginning of the first century bc, is generally considered to be the earliest known mechanical analog computer ; it is also the earliest known geared mechanism. comparable geared devices did not emerge in europe until the 16th century, and it was not until 1645 that the first mechanical calculator capable of performing the four basic arithmetical operations was developed. electronic computers, using either relays or valves, began to appear in the early 1940s. the electromechanical zuse z3, completed in 1941, was the world ' s first programmable computer, and by modern standards one of the first machines that could be considered a complete computing
subdomain_quantum_cryptography
0.554745
512
HuggingFaceFW/fineweb-edu
<urn:uuid:28b9e8de-30d8-4245-a0e2-cb89a69e3e7b>
0
0.5
2025-12-19T11:31:47.000220
valves, began to appear in the early 1940s. the electromechanical zuse z3, completed in 1941, was the world ' s first programmable computer, and by modern standards one of the first machines that could be considered a complete computing machine. colossus, developed during the second world war to decrypt german messages was the first electronic digital computer. although it was programmable, it was not general - purpose, being designed to perform only a single task. it also lacked the ability to store its program in memory. instead, programming was carried out using plugs and switches to alter the internal wiring. the first recognisably modern electronic digital stored - program computer was the manchester small - scale experimental machine ( ssem ), which ran its first program on 21 june 1948. early electronic computers such as colossus made use of punched tape, a long strip of paper on which data was represented by a series of holes, a technology now obsolete. electronic data storage, which is used in modern computers, dates from the second world war, when a form of delay line memory was developed to remove the clutter from radar signals, the first practical application of which was the mercury delay line. the first random - access digital storage device was the williams tube, based on a standard cathode ray tube, but the information stored in it and delay line memory was volatile in that it had to be continuously refreshed, and thus was lost once power was removed. the earliest form of non - volatile computer storage was the magnetic drum, invented in 1932 and used in the ferranti mark 1, the world ' s first commercially available general - purpose electronic computer. most digital data today is still stored magnetically on devices such as hard disk drives, or optically on media such as cd - roms. it has been estimated that the worldwide capacity to store information on electronic devices grew from less than 3 exabytes in 1986 to 295 exabytes in 2007, doubling roughly every 3 years. database management systems emerged in the 1960s to address the problem of storing and retrieving large amounts of data accurately and quickly. one of the earliest such systems was ibm ' s information management system ( ims ), which is still widely deployed more than 40 years later. ims stores data hierarchically, but in the 1970s ted codd proposed an alternative relational storage model based on set theory and predicate logic and the familiar concepts of tables, rows and columns. the first commercially available relational database management system ( rdbms
subdomain_quantum_computing
0.526098
512
HuggingFaceFW/fineweb-edu
<urn:uuid:28b9e8de-30d8-4245-a0e2-cb89a69e3e7b>
1
0.5
2025-12-19T11:31:47.001326
' s general - purpose computers doubled every 18 months during the same two decades ; the global telecommunication capacity per capita doubled every 34 months ; the world ' s storage capacity per capita required roughly 40 months to double ( every 3 years ) ; and per capita broadcast information has doubled every 12. 3 years. massive amounts of data are stored worldwide every day, but unless it can be analysed and presented effectively it essentially resides in what have been called data tombs : " data archives that are seldom visited ". to address that issue, the field of data mining – " the process of discovering interesting patterns and knowledge from large amounts of data " – emerged in the late 1980s. in an academic context, the association for computing machinery defines it as " undergraduate degree programs that prepare students to meet the computer technology needs of business, government, healthcare, schools, and other kinds of organizations.... it specialists assume responsibility for selecting hardware and software products appropriate for an organization, integrating those products with organizational needs and infrastructure, and installing, customizing, and maintaining those applications for the organization ’ s computer users. " the business value of information technology lies in the automation of business processes, provision of information for decision making, connecting businesses with their customers, and the provision of productivity tools to increase efficiency. | category | | 2012 spending | | 2013 spending | | data center systems | | 141 | | 147 | - breaches of copyright by those downloading files stored without the permission of the copyright holders - employers monitoring their employees ' emails and other internet usage - unsolicited emails - hackers accessing online databases - web sites installing cookies or spyware to monitor a user ' s online activities - " format " refers to the physical characteristics of the stored data such as its encoding scheme ; " structure " describes the organisation of that data. - daintith, john, ed. ( 2009 ), " it ", a dictionary of physics, oxford university press, retrieved 1 august 2012 ( subscription required ) - " free on - line dictionary of computing ( foldoc ) ". retrieved 9 feb. 2013. - chandler, daniel ; munday, rod, " information technology ", a dictionary of media and communication ( first ed. ), oxford university press, retrieved 1 august 2012 ( subscription required ) - on the later more broad application of the term it, keary comments - " in its original application ' information technology ' was appropriate to describe the convergence of technologies with application in the broad field of data storage, retrieval, processing, and dissemination.
subdomain_quantum_cryptography
0.574977
512
HuggingFaceFW/fineweb-edu
<urn:uuid:28b9e8de-30d8-4245-a0e2-cb89a69e3e7b>
3
0.5
2025-12-19T11:31:47.003686
- on the later more broad application of the term it, keary comments - " in its original application ' information technology ' was appropriate to describe the convergence of technologies with application in the broad field of data storage, retrieval, processing, and dissemination. this useful conceptual term has since been converted to what purports to be concrete use, but without the reinforcement of definition... the term it lacks substance when applied to the name of any function, discipline, or position. " anthony ralston ( 2000 ). encyclopedia of computer science. nature pub. group. isbn 978 - 1 - 56159 - 248 - 7. retrieved 12 may 2013.. - proctor 2011, preface. - butler, jeremy g., " a history of information technology and systems ", university of arizona, retrieved 2 august 2012 - leavitt, harold j. ; whisler, thomas l. ( 1958 ), " management in the 1980s ", harvard business review 11 - schmandt - besserat, d. ( 1981 ), " decipherment of the earliest tablets ", science 211 ( 4479 ) : 283 – 285, doi : 10. 1126 / science. 211. 4479. 283, pmid 17748027 ( subscription required ) - wright 2012, p. 279 - childress 2000, p. 94 - chaudhuri 2004, p. 3 - lavington 1980 - enticknap, nicholas ( summer 1998 ), " computing ' s golden jubilee ", resurrection ( the computer conservation society ) ( 20 ), issn 0958 - 7403, retrieved 19 april 2008 - alavudeen & venkateshwaran 2010, p. 178 - lavington 1998, p. 1 - " early computers at manchester university ", resurrection ( the computer conservation society ) 1 ( 4 ), summer 1992, issn 0958 - 7403, retrieved 19 april 2008 - universitat klagenfurt ( ed. ), " magnetic drum ", virtual exhibitions in informatics, retrieved 21august 2011 - the manchester mark 1, university of manchester, retrieved 24 january 2009 - wang & taratorin 1999, pp. 4 – 5. - hilbert, martin ; lopez, priscilla, " the world ' s technological capacity to store, communicate, and compute information ", science 332 ( 6025 ) : 60 – 65, retrieved 1 august 2012 - " video animation on the world ' s technological capacity to store, communicate, and compute information from 1986 to 2010 -
subdomain_quantum_computing
0.57132
512
HuggingFaceFW/fineweb-edu
<urn:uuid:28b9e8de-30d8-4245-a0e2-cb89a69e3e7b>
4
0.5
2025-12-19T11:31:47.004569
capacity to store, communicate, and compute information ", science 332 ( 6025 ) : 60 – 65, retrieved 1 august 2012 - " video animation on the world ' s technological capacity to store, communicate, and compute information from 1986 to 2010 - ward & dafoulas 2006, p. 2 - olofson, carl w. ( october 2009 ), " a platform for enterprise data services ", idc, retrieved 7 august 2012 - ward & dafoulas 2006, p. 3 - pardede 2009, p. 2 - pardede 2009, p. 4 - kedar 2009, pp. 1 – 9 - van der aalst 2011, p. 2 - dyche 2000, pp. 4 – 6 - weik 2000, p. 361 - pardede 2009, p. xiii. - lewis 2003, pp. 228 – 231. - han, kamber & pei 2011, p. 5 - han, kamber & pei 2011, p. 8 - han, kamber & pei 2011, p. xxiii - the joint task force for computing curricula 2005. computing curricula 2005 : the overview report ( pdf ) - " forecast alert : it spending, worldwide, 4q12 update ", gartner, retrieved 2 january 2013 - bynum 2008, p. 9. - reynolds 2009, pp. 20 – 21. - alavudeen, a. ; venkateshwaran, n. ( 2010 ), computer integrated manufacturing, phi learning, isbn 978 - 81 - 203 - 3345 - 1 - bynum, terrell ward ( 2008 ), " norbert wiener and the rise of information ethics ", in van den hoven, jeroen ; weckert, john, information technology and moral philosophy, cambridge university press, isbn 978 - 0 - 521 - 85549 - 5 - chaudhuri, p. pal ( 2004 ), computer organization and design, phi learning, isbn 978 - 81 - 203 - 1254 - 8 - childress, david hatcher ( 2000 ), technology of the gods : the incredible sciences of the ancients, adventures unlimited press, isbn 978 - 0 - 932813 - 73 - 2 - dyche, jill ( 2000 ), turning data into information with data warehousing, addison wesley, isbn 978 - 0 - 201 - 65780 - 7 - han, jiawei ; kamber, micheline ; pei, jian ( 2011 ), data
subdomain_quantum_cryptography
0.509006
512
HuggingFaceFW/fineweb-edu
<urn:uuid:28b9e8de-30d8-4245-a0e2-cb89a69e3e7b>
5
0.5
2025-12-19T11:31:47.005480
jill ( 2000 ), turning data into information with data warehousing, addison wesley, isbn 978 - 0 - 201 - 65780 - 7 - han, jiawei ; kamber, micheline ; pei, jian ( 2011 ), data minining : concepts and techniques ( 3rd ed. ), morgan kaufman, isbn 978 - 0 - 12 - 381479 - 1 - kedar, seema ( 2009 ), database management systems, technical publications, isbn 978 - 81 - 8431 - 584 - 4 - lavington, simon ( 1980 ), early british computers, digital press, isbn 978 - 0 - 7190 - 0810 - 8 - lavington, simon ( 1998 ), a history of manchester computers ( 2 ed. ), the british computer society, isbn 978 - 1 - 902505 - 01 - 5 - lewis, bryn ( 2003 ), " extraction of xml from relational databases ", in chaudhri, akmal b. ; djeraba, chabane ; unland, rainer et al., xml - based data management and multimedia engineering – edbt 2002 workshops, springer, isbn 978 - 3540001300 - pardede, eric ( 2009 ), open and novel issues in xml database applications, information science reference, isbn 978 - 1 - 60566 - 308 - 1 - proctor, k. scott ( 2011 ), optimizing and assessing information technology : improving business project execution, john wiley & sons, isbn 978 - 1 - 118 - 10263 - 3 - reynolds, george ( 2009 ), ethics in information technology, cengage learning, isbn 978 - 0 - 538 - 74622 - 9 - van der aalst, wil m. p. ( 2011 ), process mining : discovery, conformance and enhancement of business processes, springer, isbn 978 - 3 - 642 - 19344 - 6 - wang, shan x. ; taratorin, aleksandr markovich ( 1999 ), magnetic information storage technology, academic press, isbn 978 - 0 - 12 - 734570 - 3 - ward, patricia ; dafoulas, george s. ( 2006 ), database management systems, cengage learning emea, isbn 978 - 1 - 84480 - 452 - 8 - weik, martin ( 2000 ), computer science and communications dictionary 2, springer, isbn 978 - 0 - 7923 - 8425 - 0 - wright, michael t. ( 2012 ), " the front dial of the
subdomain_quantum_cryptography
0.540302
512
HuggingFaceFW/fineweb-edu
<urn:uuid:28b9e8de-30d8-4245-a0e2-cb89a69e3e7b>
6
0.5
2025-12-19T11:31:47.006392
452 - 8 - weik, martin ( 2000 ), computer science and communications dictionary 2, springer, isbn 978 - 0 - 7923 - 8425 - 0 - wright, michael t. ( 2012 ), " the front dial of the antikythera mechanism ", in koetsier, teun ; ceccarelli, marco, explorations in the history of machines and mechanisms : proceedings of hmm2012, springer, pp. 279 – 292, isbn 978 - 94 - 007 - 4131 - 7 - allen, t., and m. s. morton, eds. 1994. information technology and the corporation of the 1990s. new york : oxford university press. - gleick, james ( 2011 ). the information : a history, a theory, a flood. new york : pantheon books. - shelly, gary, cashman, thomas, vermaat, misty, and walker, tim. ( 1999 ). discovering computers 2000 : concepts for a connected world. cambridge, massachusetts : course technology. - webster, frank, and robins, kevin. ( 1986 ). information technology — a luddite analysis. norwood, nj : ablex. a portion of the proceeds from advertising on digplanet goes to supporting wikipedia.
subdomain_quantum_cryptography
0.575787
257
HuggingFaceFW/fineweb-edu
<urn:uuid:28b9e8de-30d8-4245-a0e2-cb89a69e3e7b>
7
0.5
2025-12-19T11:31:47.006839
) strongly. additionally, the atmosphere is opaque at most infrared wavelengths. this necessitates lengthy exposure times and greatly decreases the ability to detect faint objects. it could be compared to trying to observe the stars at noon. previous space - based satellites ( such as iras, the infrared astronomical satellite, and iso, the infrared space observatory ) were operational during the 1980s and 1990s and great advances in astronomical technology have been made since then. most of the early concepts envisioned repeated flights aboard the nasa space shuttle. this approach was developed in an era when the shuttle program was expected to support weekly flights of up to 30 days duration. a may 1983 nasa proposal described sirtf as a shuttle - attached mission, with an evolving scientific instrument payload. several flights were anticipated with a probable transition into a more extended mode of operation, possibly in association with a future space platform or space station. sirtf would be a 1 - meter class, cryogenically cooled, multi - user facility consisting of a telescope and associated focal plane instruments. it would be launched on the space shuttle and remain attached to the shuttle as a spacelab payload during astronomical observations, after which it would be returned to earth for refurbishment prior to re - flight. the first flight was expected to occur about 1990, with the succeeding flights anticipated beginning approximately one year later. however, the spacelab - 2 flight aboard sts - 51 - f showed that the shuttle environment was poorly suited to an onboard infrared telescope due to contamination from the relatively " dirty " vacuum associated with the orbiters. by september 1983 nasa was considering the " possibility of a long duration [ free - flyer ] sirtf mission ". spitzer is the only one of the great observatories not launched by the space shuttle, which had been originally intended. however after the 1986 challenger disaster, the centaur lh2 / lox upper stage, which would have been required to place it in its final orbit, was banned from shuttle use. the mission underwent a series of redesigns during the 1990s, primarily due to budget considerations. this resulted in a much smaller but still fully capable mission which could use the smaller delta ii expendable launch vehicle. one of the most important advances of this redesign was an earth - trailing orbit. cryogenic satellites that require liquid helium ( lhe, t ≈ 4 k ) temperatures in near - earth orbit are typically exposed to a large heat load from the earth, and consequently entail large usage of lhe coolant, which then tends to dominate the total payload mass and limits mission life
subdomain_quantum_metrology
0.534549
512
HuggingFaceFW/fineweb-edu
<urn:uuid:93ae5210-f5df-4b6d-9f49-16f0d8cc451d>
2
0.5
2025-12-19T11:31:47.030926
an infrared spectrometer with four sub - modules which operate at the wavelengths 5. 3 – 14 µm ( low resolution ), 10 – 19. 5 µm ( high resolution ), 14 – 40 µm ( low resolution ), and 19 – 37 µm ( high resolution ). each module uses a 128×128 - pixel detector — the short wavelength pair use arsenic - doped silicon blocked impurity band technology, the long wavelength pair use antimony - doped silicon blocked impurity band technology. the principal investigator is james r. houck of cornell university ; the flight hardware was built by ball aerospace. - mips ( multiband imaging photometer for spitzer ), three detector arrays in the far infrared ( 128 × 128 pixels at 24 µm, 32 × 32 pixels at 70 µm, 2 × 20 pixels at 160 µm ). the 24 µm detector is identical to one of the irs short wavelength modules. the 70 µm detector uses gallium - doped germanium technology, and the 160 µm detector also uses gallium - doped germanium, but with mechanical stress added to each pixel to lower the bandgap and extend sensitivity to this long wavelength. the principal investigator is george h. rieke of the university of arizona ; the flight hardware was built by ball aerospace. as an example of data from the different instruments, the nebula henize 206 was imaged in 2004, allowing comparison of images from each device. the first images taken by sst were designed to show off the abilities of the telescope and showed a glowing stellar nursery ; a big swirling, dusty galaxy ; a disc of planet - forming debris ; and organic material in the distant universe. since then, many monthly press releases have highlighted spitzer ' s capabilities, as the nasa and esa images do for the hubble space telescope. as one of its most noteworthy observations, in 2005, sst became the first telescope to directly capture the light from extrasolar planets, namely the " hot jupiters " hd 209458b and tres - 1. ( it did not resolve that light into actual images though. ) this was the first time extrasolar planets had actually been visually seen ; earlier observations had been indirectly made by drawing conclusions from behaviors of the stars the planets were orbiting. the telescope also discovered in april 2005 that cohen - kuhi tau / 4 had a planetary disk that was vastly younger and contained less mass than previously theorized, leading to new understandings of how planets are formed. while some time on
subdomain_quantum_metrology
0.535117
512
HuggingFaceFW/fineweb-edu
<urn:uuid:93ae5210-f5df-4b6d-9f49-16f0d8cc451d>
4
0.5
2025-12-19T11:31:47.033241
were orbiting. the telescope also discovered in april 2005 that cohen - kuhi tau / 4 had a planetary disk that was vastly younger and contained less mass than previously theorized, leading to new understandings of how planets are formed. while some time on the telescope is reserved for participating institutions and crucial projects, astronomers around the world also have the opportunity to submit proposals for observing time. important targets include forming stars ( young stellar objects, or ysos ), planets, and other galaxies. images are freely available for educational and journalistic purposes. in 2004, it was reported that spitzer had spotted a faintly glowing body that may be the youngest star ever seen. the telescope was trained on a core of gas and dust known as l1014 which had previously appeared completely dark to ground - based observatories and to iso ( infrared space observatory ), a predecessor to spitzer. the advanced technology of spitzer revealed a bright red hot spot in the middle of l1014. scientists from the university of texas at austin, who discovered the object, believe the hot spot to be an example of early star development, with the young star collecting gas and dust from the cloud around it. early speculation about the hot spot was that it might have been the faint light of another core that lies 10 times further from earth but along the same line of sight as l1014. follow - up observation from ground - based near - infrared observatories detected a faint fan - shaped glow in the same location as the object found by spitzer. that glow is too feeble to have come from the more distant core, leading to the conclusion that the object is located within l1014. ( young et al., 2004 ) in 2005, astronomers from the university of wisconsin at madison and whitewater determined, on the basis of 400 hours of observation on the spitzer space telescope, that the milky way galaxy has a more substantial bar structure across its core than previously recognized. also in 2005, astronomers alexander kashlinsky and john mather of nasa ' s goddard space flight center reported that one of spitzer ' s earliest images may have captured the light of the first stars in the universe. an image of a quasar in the draco constellation, intended only to help calibrate the telescope, was found to contain an infrared glow after the light of known objects was removed. kashlinsky and mather are convinced that the numerous blobs in this glow are the light of stars that formed as early as 100 million years after the
subdomain_quantum_optics
0.517862
512
HuggingFaceFW/fineweb-edu
<urn:uuid:93ae5210-f5df-4b6d-9f49-16f0d8cc451d>
5
0.5
2025-12-19T11:31:47.034347
, was found to contain an infrared glow after the light of known objects was removed. kashlinsky and mather are convinced that the numerous blobs in this glow are the light of stars that formed as early as 100 million years after the big bang, red shifted by cosmic expansion. in march 2006, astronomers reported an 80 - light - year - long nebula near the center of the milky way galaxy, the double helix nebula, which is, as the name implies, twisted into a double spiral shape. this is thought to be evidence of massive magnetic fields generated by the gas disc orbiting the supermassive black hole at the galaxy ' s center, 300 light years from the nebula and 25, 000 light years from earth. this nebula was discovered by the spitzer space telescope, and published in the magazine nature on march 16, 2006. in may 2007, astronomers successfully mapped the atmospheric temperature of hd 189733 b, thus obtaining the first map of some kind of an extrasolar planet. since september 2006 the telescope participates in a series of surveys called the gould belt survey, observing the gould ' s belt region in multiple wavelengths. the first set of observations by the spitzer space telescope were completed from september 21, 2006 through september 27. resulting from these observations, the team of astronomers led by dr. robert gutermuth, of the harvard - smithsonian center for astrophysics reported the discovery of serpens south, a cluster of 50 young stars in the serpens constellation. scientists have long wondered how tiny silicate crystals, which need high temperatures to form, have found their way into frozen comets, born in the very cold environment of the solar system ' s outer edges. the crystals would have begun as non - crystallized, amorphous silicate particles, part of the mix of gas and dust from which the solar system developed. this mystery has deepened with the results of the stardust ( spacecraft ) sample return mission, which captured particles from comet wild 2. many of the stardust ( spacecraft ) particles were found to have formed at temperatures in excess of 1000 k. in may 2009, spitzer researchers from germany, hungary and the netherlands found that amorphous silicate appears to have been transformed into crystalline form by an outburst from a star. they detected the infrared signature of forsterite silicate crystals on the disk of dust and gas surrounding the star ex lupi during one of its frequent flare - ups, or outbursts, seen by spitzer in april 2008. these crystals were not present in
subdomain_quantum_optics
0.545641
512
HuggingFaceFW/fineweb-edu
<urn:uuid:93ae5210-f5df-4b6d-9f49-16f0d8cc451d>
6
0.5
2025-12-19T11:31:47.036448
the infrared signature of forsterite silicate crystals on the disk of dust and gas surrounding the star ex lupi during one of its frequent flare - ups, or outbursts, seen by spitzer in april 2008. these crystals were not present in spitzer ' s previous observations of the star ' s disk during one of its quiet periods. these crystals appear to have formed by radiative heating of the dust within 0. 5 au of ex lupi. in august 2009, the telescope found evidence of a high - speed collision between two burgeoning planets orbiting a young star. in october 2009, astronomers anne j. verbiscer, michael f. skrutskie, and douglas p. hamilton published findings of the " phoebe ring " of saturn, which was found with the telescope ; the ring is a huge, tenuous disc of material extending from 128 to 207 times the radius of saturn. spitzer observations, announced in may 2011, indicate that tiny forsterite crystals might be falling down like rain on to the protostar hops - 68. the discovery of the forsterite crystals in the outer collapsing cloud of the proto - star is surprising, because the crystals form at lava - like high temperatures, yet they are found in the molecular cloud where the temperatures are about minus 170 degrees celsius. this led the team of astronomers to speculate that the bipolar outflow from the young star may be transporting the forsterite crystals from near the star ' s surface to the chilly outer cloud. in january 2012, it was reported that further analysis of the spitzer observations of ex lupi can be understood if the forsterite crystalline dust was moving away from the protostar at a remarkable average speed of 38 kilometres per second. it would appear that such high speeds can only arise if the dust grains had been ejected by a bipolar outflow close to the star. such observations are consistent with an astrophysical theory, developed in the early 1990s, where it was suggested that bipolar outflows garden or transform the disks of gas and dust that surround protostars by continually ejecting reprocessed, highly heated material from the inner disk, adjacent to the protostar, to regions of the accretion disk further away from the protostar. glimpse and mipsgal surveys glimpse, the galactic legacy infrared mid - plane survey extraordinaire, is a survey spanning 300° of the inner milky way galaxy. it consists of approximately 444, 000 images taken at four separate wavelengths using the infrared array camera. mipsgal is a
subdomain_quantum_optics
0.522181
512
HuggingFaceFW/fineweb-edu
<urn:uuid:93ae5210-f5df-4b6d-9f49-16f0d8cc451d>
7
0.5
2025-12-19T11:31:47.037580
galactic legacy infrared mid - plane survey extraordinaire, is a survey spanning 300° of the inner milky way galaxy. it consists of approximately 444, 000 images taken at four separate wavelengths using the infrared array camera. mipsgal is a similar survey covering 278° of the galactic disk at longer wavelengths. on june 3, 2008, scientists unveiled the largest, most detailed infra - red portrait of the milky way, created by stitching together more than 800, 000 snapshots, at the 212th meeting of the american astronomical society in st. louis, missouri. this composite survey is now viewable with the glimpse / mipsgal viewer. artificial color image of the double helix nebula, thought to be generated at the galactic center by magnetic torsion 1000 times greater than the sun ' s. a cluster of new stars forming in the serpens south cloud - spitzer space telescope ( 2008 ). " about spitzer : fast facts ". nasa / jpl. archived from the original on 2007 - 02 - 02. retrieved 2007 - 04 - 22. - spitzer space telescope. " spitzer technology : telescope ". nasa / jpl. archived from the original on 2007 - 02 - 24. retrieved 2007 - 04 - 22. - spitzer science center. " cycle - 6 warm mission ". nasa / jpl. retrieved 2009 - 09 - 16. - " who was lyman spitzer? ". nasa : for educators. california institute of technology and the jet propulsion laboratory. 11 march 2004. retrieved 6 january 2009. - " up close and personal ". physics world ( institute of physics ). 2 march 2009. retrieved 20 april 2009. - please refer to hubble space telescope. - hubble vision : further adventures with the hubble space telescope. cup archive. 1998. p. 193. isbn 0 - 521 - 59291 - 7. - zimmerman, robert ( 2008 ). the universe in a mirror : the saga of the hubble telescope and the visionaries who built it. princeton university press. p. 10. isbn 0 - 691 - 13297 - 6. - william harwood ( december 18, 2003 ). " first images from spitzer space telescope unveiled ". spaceflight now. retrieved 2008 - 08 - 23. - watanabe, susan ( 2007 - 11 - 22 ). " studying the universe in infrared ". nasa. retrieved 2007 - 12 - 08. - kwok, johnny ( fall 2006 ). " finding a way : the spit
subdomain_quantum_gravity
0.512295
512
HuggingFaceFW/fineweb-edu
<urn:uuid:93ae5210-f5df-4b6d-9f49-16f0d8cc451d>
8
0.5
2025-12-19T11:31:47.038656
23. - watanabe, susan ( 2007 - 11 - 22 ). " studying the universe in infrared ". nasa. retrieved 2007 - 12 - 08. - kwok, johnny ( fall 2006 ). " finding a way : the spitzer space telescope story ". academy sharing knowledge. nasa. archived from the original on 2007 - 09 - 08. retrieved 2007 - 12 - 09. - spitzer science center home page - - public information. - ssc observatory general information page, 4 oct 2009. - ssc observatory overview, 4 oct 2009. - ssc science information home page, 4 oct 2009. - spitzer observers ' manual, reference for technical instrument information, ver 8, 15 aug 2008. - ssc irac ( mid ir camera ) science users information page, 4 oct 2009. - ssc irs ( spectrometer ) science users ' information page, 4 oct 2009. - ssc mips ( long wavelength 24um, 70um, & 160um ) imaging photometer and spectrometer science users ' information page, 4 oct 2009. - press release : nasa ' s spitzer marks beginning of new age of planetary science. - infrared glow of first stars found : scientific american. - jpl news | spitzer catches star cooking up comet crystals - abraham et al. ( published online may 14, 2009 ). " episodic formation of cometary material in the outburst of a young sun - like star ". nature 459 ( 7244 ) : 224 – 226. arxiv : 0906. 3161. bibcode : 2009natur. 459.. 224a. doi : 10. 1038 / nature08004. - bbc news | science & environment | traces of planet collision found - verbiscer, anne ; michael skrutskie, douglas hamilton ( published online october 7, 2009 ). " saturn ' s largest ring ". nature 461 ( 7267 ) : 1098 – 100. bibcode : 2009natur. 461. 1098v. doi : 10. 1038 / nature08515. pmid 19812546. - nasa mission news | spitzer sees crystal rain in infant star outer clouds - poteet, c. a., et al. ( published online june, 2011 ). " a spitzer infrared spectrograph detection of crystalline silicates in a protostellar envelope ". the astrophysical journal letters 733 ( 2 ) : l32. arxiv :
subdomain_quantum_optics
0.53915
512
HuggingFaceFW/fineweb-edu
<urn:uuid:93ae5210-f5df-4b6d-9f49-16f0d8cc451d>
9
0.5
2025-12-19T11:31:47.039744
et al. ( published online june, 2011 ). " a spitzer infrared spectrograph detection of crystalline silicates in a protostellar envelope ". the astrophysical journal letters 733 ( 2 ) : l32. arxiv : 1104. 4498. bibcode : 2011apj... 733l.. 32p. doi : 10. 1088 / 2041 - 8205 / 733 / 2 / l32. - juhasz, a., et al. ( published online january, 2012 ). " the 2008 outburst of ex lup — silicate crystals in motion ". the astrophysical journal 744 ( 2 ) : 118. arxiv : 1110. 3754. bibcode : 2012apj... 744.. 118j. doi : 10. 1088 / 0004 - 637x / 744 / 2 / 118. - liffman k. and brown m. ( published online october, 1995 ). " the motion and size sorting of particles ejected from a protostellar accretion disk ". icarus 116 ( 2 ) : 275 – 290. bibcode : 1995icar.. 116.. 275l. doi : 10. 1006 / icar. 1995. 1126. - galactic legacy infrared mid - plane survey extraordinaire, university of wisconsin – madison department of astronomy - press release : spitzer captures stellar coming of age in our galaxy - released images and videos of milky way mosaic - glimpse / mipsgal viewer | wikimedia commons has media related to : spitzer space telescope | - spitzer space telescope official site - spitzer space telescope profile by nasa ' s solar system exploration - spitzer images - spitzer newsroom - spitzer podcasts - spitzer video podcasts - simulation of spitzer ' s orbit - zoomable version of the glimpse / mipsgal surveys a portion of the proceeds from advertising on digplanet goes to supporting wikipedia.
subdomain_quantum_optics
0.532771
413
HuggingFaceFW/fineweb-edu
<urn:uuid:93ae5210-f5df-4b6d-9f49-16f0d8cc451d>
10
0.5
2025-12-19T11:31:47.040547
manufacturer i helped raise capital for a few years ago. for confidentiality reasons, let me label it company x. the company, located near a port city in nigeria, had as primary competitors two ailing local manufacturers and low - cost exporters from south east asia. on paper, company x should have been very competitive given its seaport location, locally abundant primary raw materials, low real interest rates, and proximity to the domestic market. in reality, its products were uncompetitive with imported products. glass manufacturing requires blasting a furnace round the clock, every day of the week. shutting the furnace abruptly or too quickly could result in very expensive damage. it also requires copious amounts of water for cooling. since the public grid is epileptic, fluctuates when available and was believed destructive for sensitive equipment, company x built its own electricity generation capacity. two plants — each with 150 percent of the required capacity — ran in sequence as the primary energy source. the public grid served as back - up power for none - core equipment. the company also installed a large fuel storage tank and maintained a three - week fuel reserve as a necessary buffer against perennial fuel shortage. the story continues. company x built a borehole, water treatment, and distribution equipment for the factory. it also required certain industrial chemicals as additives in the production process. these chemicals cost roughly the same in south east asia, however, shipping costs ( in 2010 nigeria had the second - highest shipping insurance costs on earth ) and an obtuse clearing process at the port, spiked the costs. in the final analysis, company x ’ s products cost significantly more than its foreign competitors in the domestic market without an appreciable quality advantage. without tariff protection, its performance outcomes fell below projections. the energy challenge a similar narrative exists with small businesses and households. these economic units face challenges in energy supply, potable water, transportation, and — in urban areas — security. while the more affluent households have power generators, boreholes, and private security arrangements, poorer households — which happen to comprise the majority — live with dilapidated public utilities or pre - modern forms of energy supply. increasingly available mobile communications, internet access, and school enrollment, convolve to increase the need for domestic energy. today, more than one in two africans owns a cell phone ( itu data 2011 ) and the attendant energy requirement for charging handsets. in a similar vein, more than two of three children are enrolled in school and often need lighting to read at night. there
subdomain_quantum_thermodynamics
0.515185
512
HuggingFaceFW/fineweb-edu
<urn:uuid:cf722514-9fbd-4036-a8b9-efea44552f3a>
1
0.5
2025-12-19T11:31:47.056069
than one in two africans owns a cell phone ( itu data 2011 ) and the attendant energy requirement for charging handsets. in a similar vein, more than two of three children are enrolled in school and often need lighting to read at night. there are also a multitude of public and private projects across the region that aim to increase computer usage, ownership and internet access. increasing urbanization, high urban poverty levels, urban congestion, scarcity and cost of modern fuels have deepened the energy challenge households face for cooking. middle - income households and small businesses have either adapted through a bewildering array of sub - optimal solutions or avoided certain modern necessities entirely. energy and the environment there is a temptation to accept the notion that low environmental standards are permissible for countries at a lower stage of development. some emerging market nations — notably china — have argued for exemption from environment protection requirements applicable to oecd nations. their contention is premised on ( i ) equity and ( ii ) development necessity. the equity argument is philosophical at its core. in this paradigm, wealthy industrialized nations produced the preponderance of historic pollution, either in absolute terms or on a per capita basis. wealthier nations should therefore bear a proportional portion of emission reduction. development necessity is a more tenuous argument, given the state of technology today. it is difficult to subscribe to the nation that large - scale development is incompatible with rigorous environmental standards. i believe the following ingredients can catalyze environmentally friendly development : intelligent engineering and design ; sound public policy ; pragmatic regulatory frameworks ; and, stakeholder education. domestic energy solutions decades of planning, international conventions, and development aid have failed to resolve the energy challenge for ssa. if we borrow a leaf from the telecommunications industry, growth and access to communications occurred when the public sector relegated its role to mostly regulation and opened up the industry to private business. furthermore, technology enhanced the scalability and unit cost of mobile telephony to overcome constrains earlier faced by fixed telephony infrastructure. today, scientists have made significant advancements in affordable and clean domestic energy solutions. american researchers continue to create ingenious designs that use a diverse range of energy sources — solar, biomass, fossil fuels, chemicals, and hydro — that can provide domestic energy at affordable costs. the challenge is commercializing these ideas by providing manufacturing scale, distribution, and logistics competence. the prospective market is huge. at viridis energy, we project 180 to 300 million ssa consumers can purchase capital products that
subdomain_quantum_thermodynamics
0.542434
512
HuggingFaceFW/fineweb-edu
<urn:uuid:cf722514-9fbd-4036-a8b9-efea44552f3a>
2
0.5
2025-12-19T11:31:47.057223
domestic energy at affordable costs. the challenge is commercializing these ideas by providing manufacturing scale, distribution, and logistics competence. the prospective market is huge. at viridis energy, we project 180 to 300 million ssa consumers can purchase capital products that will provide domestic lighting, low electricity and cooking needs. our vision is to provide affordable, clean retail energy solutions to ssa households and small businesses. we are currently building a pipeline of partnerships with innovative individuals and institutions to provide retail energy solutions. we have commenced relationships with researchers, industrial designers and an academic institution with a view to bringing two innovative retail products to market by first quarter 2013. our criteria for product development qualification are simple : a product concept must be affordable, environmentally neutral and easy to transport. we are currently building distribution, support and marketing channels in nigeria, ghana, and kenya. we are optimistic that private sector involvement in investment, and healthy policy contestation and collaboration with governments and non - profits, would secure energy supply without worsening climate change. market - driven measures can improve lighting, access to power, clean cooking facilities and ultimately lead to a massive reduction in energy poverty. matthias chika mordi spent over two decades in the finance industry across africa where he led and co - led the turnaround of three ailing financial institutions. the most notable one is united bank for africa plc, now one of africa ’ s largest banking groups. this article was originally published in the july / august edition of the diplomatic courier.
subdomain_quantum_thermodynamics
0.533909
298
HuggingFaceFW/fineweb-edu
<urn:uuid:cf722514-9fbd-4036-a8b9-efea44552f3a>
3
0.5
2025-12-19T11:31:47.058702
scientists in oregon have created embryos with genes from one man and two women, using a provocative technique that could someday be used to prevent babies from inheriting certain rare incurable diseases. the researchers at oregon health & sciences university said they are not using the embryos to produce children, and it is not clear when or even if this technique will be put to use. but it has already stirred a debate over its risks and ethics in britain, where scientists did similar work a few years ago. the genes they want to replace aren ' t the kind most people think of, which are found in the nucleus of cells and influence traits such as eye color and height. rather, these genes reside outside the nucleus in energy - producing structures called mitochondria. these genes are passed along only by mothers, not fathers. about 1 in every 5, 000 children inherits a disease caused by defective mitochondrial genes. the defects can cause many rare diseases with a host of symptoms, including strokes, epilepsy, dementia, blindness, deafness, kidney failure and heart disease. the new technique, if approved someday for routine use, would allow a woman to give birth to a baby who inherits her nucleus dna but not her mitochondrial dna. here ' s how it would work : doctors would need unfertilized eggs from the patient and a healthy donor. they would remove the nucleus dna from the donor eggs and replace it with nucleus dna from the patient ' s eggs. so, they would end up with eggs that have the prospective mother ' s nucleus dna, but the donor ' s healthy mitochondrial dna. for you formed my inward parts ; you knitted me together in my mother ' s womb. i praise you, for i am fearfully and wonderfully made. wonderful are your works ; my soul knows it very well. my frame was not hidden from you, when i was being made in secret, intricately woven in the depths of the earth. your eyes saw my unformed substance ; in your book were written, every one of them, the days that were formed for me, when as yet there was none of them. ( psalm 139 : 13 - 16 ) because of the fall, some children are born with illness, just as, because of the fall, some men and women suffer illness in their later years. because of the fall, some children may even be the product of horrific circumstances, but this does not make them any less of a creation of god. this does not make them unworthy of life. earlier this week,
subdomain_quantum_entanglement
0.515836
512
HuggingFaceFW/fineweb-edu
<urn:uuid:0a60b306-2431-495f-b0b6-3917977135bf>
0
0.5
2025-12-19T11:31:47.067003
high blood pressure ( hypertension ) learn about simple tests that assess you risk of having a heart attack or stroke? blood pressure is the pressure of the blood against the walls of the arteries. blood pressure results from two forces. the heart creates one force as it pumps blood into the arteries and through the circulatory system. the other is the force of the arteries as they resist the blood flow. the higher, systolic number represents the pressure while the heart contracts to pump blood to the body. the lower, diastolic number represents the pressure when the heart relaxes between beats. the systolic pressure is always stated first and the diastolic pressure second. for example : 118 / 76 ( 118 over 76 ) ; systolic = 118, diastolic = 76. according to the american heart association, blood pressure below 120 over 80 mmhg ( millimeters of mercury ) is considered ideal for adults. a systolic pressure of 120 to 139 mmhg or a diastolic pressure of 80 to 89 mmhg is considered " pre – hypertension " and needs to be watched carefully. a blood pressure reading of 140 over 90 or higher is considered elevated or high. high blood pressure usually has no symptoms. in fact, many people have high blood pressure for years without knowing it. that ' s why it ' s called the " silent killer. " hypertension is the medical term for high blood pressure. it doesn ' t refer to being tense, nervous or hyperactive. you can be a calm, relaxed person and still have high blood pressure. the only way to find out if you have high blood pressure is to have your blood pressure checked. your doctor or other qualified health professional should check your blood pressure at least once every two years, or more often as necessary. a single elevated blood pressure reading doesn ' t mean you have high blood pressure, but it ' s a sign that further observation is required. how can i tell if i have high blood pressure and what is truly normal? high blood pressure or hypertension is the most common medical diagnosis in the united states with 35 million office visits occurring each year. current treatments to control our nation ’ s elevated blood pressure leave a lot to be desired. most people still have less than ideal blood pressure in spite of medication use. high blood pressure is not the consequence of aging. it is the result of the standard american diet ( sad ) utilized by most developed countries in the world today. rich in processed foods, salt and saturated fat animal products, over many
subdomain_quantum_optics
0.507155
512
HuggingFaceFW/fineweb-edu
<urn:uuid:73a2a549-e01f-4df3-8558-57bf24a1d095>
0
0.5
2025-12-19T11:31:47.095356
estimations of magnetic core loss are of great interest to power electronics engineers and magnetic material scientists. however, conventional measurement methods, like four - wire and calorimeters are typically not accurate at high frequency, or are too complicated and time consuming. a cpes research team has developed a series of new methods to measure high - frequency magnetic core loss that are simple, fast, accurate and adaptive for any excitation waveform and dc flux level. the new methods compare the core being tested with air core by using reactive cancellation concept, explains mingkai mu, a ph. d. student who invented these methods. “ since the air core is lossless, ” he says, “ the difference in the two cores represents the loss for the core being tested. ” the measurement accuracy of the new method is more robust with phase discrepancy, which is the major problem for high - frequency core loss measurement, he notes. the new methods are appropriate for high frequency ( 1 mhz – 100 mhz, or even higher ) measurement. “ with these new methods, core loss for different flux waveforms can be accurately measured and many magnetic phenomena and models can be verified, ” he says. the new methods can be the standard methods for high - frequency magnetic materials loss characterization, and be built as high - accuracy measurement instruments. ”
subdomain_quantum_metrology
0.545551
267
HuggingFaceFW/fineweb-edu
<urn:uuid:fb11ae81-e1d5-439c-ba77-b3586e04e701>
0
0.5
2025-12-19T11:31:47.115922
one issue addressed in my lab is : what are the key synaptic proteins that regulate activity - development of the cerebral cortex and how do they regulate synaptic development? the brain develops as a result of a complex interplay between genetic instruction ( nature ) and experience ( nurture ). our laboratory is interested in genes that allow the brain to learn and store information during development. at the heart of both childhood and adult learning and memory are the molecules that regulate the way neurons communicate, namely neurotransmitter receptors and their downstream signaling pathways. recently several forms of childhood cognitive impairment, including fragile x syndrome ( fxs ), have been shown to result from genetic alteration of genes encoding proteins that regulate glutamate receptors signaling and synaptic development. fxs is the most common form of genetically inherited cognitive impairment with a prevalence of approximately 1 : 4000 boys and 1 : 8000 girls. fxs results from genetic silencing of the fragile x mental retardation gene ( fmr1 ), which encodes the fragile x mental retardation protein ( fmrp ). fmrp is a key regulator of synaptic development and belongs to a family of “ synaptopathies ” caused by genetic disruption of genes that encode synaptic proteins that result in altered synaptic development. other synaptic proteins being examined in the laboratory whose disruption leads to cognitive impairment in humans include syngap and sap - 102. finally we are examining the role of the tuberous sclerosis genes ( tsc1 and tsc2 ) in cortical development. the research projects in my laboratory are addressing several key issues : mcmahon ac, barnett mw, o ’ leary ts, stoney pn, collins mo, papadia s, choudhary js, komiyama nh, grant sgn, hardingham ge, wyllie dja and kind pc ( 2012 ) activity - dependent alternative promoter usage and alternative splicing enable syngap isoforms to exert opposing effects on synaptic strength. nature communications. 3. martel m - a, ryan t, bell kf, fowler jh, mcmahon a, al - mubarak b, komiyama n, horsburgh k, kind pc, grant sg, wyllie dj, hardingham ge the subtype of glun2 ( 2012 ) c - terminal domain determines the response to excitotoxic insults. neuron. 74 : 543 - 556. till sm
subdomain_quantum_computing
0.524924
512
HuggingFaceFW/fineweb-edu
<urn:uuid:cda9fb5f-ccf7-4f63-8baa-1d0252574aae>
0
0.5
2025-12-19T11:31:47.126278
, grant sg, wyllie dj, hardingham ge the subtype of glun2 ( 2012 ) c - terminal domain determines the response to excitotoxic insults. neuron. 74 : 543 - 556. till sm, wijetunge ls, seidel vg, harlow e, wright a, bagni c, contractor a, gillingwater th, kind pc ( 2012 ) genetic deletion of fmrp alters the trajectory of specific cellular processes during cortical development. human molecular genetics. 21 : 2143 - 2156 jaffer s, vorobyov v, kind pc, sengpiel f ( 2012 ) experience dependent regulation of functional maps in synaptic protein expression in cat visual cortex. eur. j neurosci. in press. kind pc, sengpiel f, beaver cj, kelly gm, matthews rt and mitchell de ( 2012 ) development and activity - dependent expression of aggrecan in the cat visual cortex. cerebral cortex. in press. harlow eg, till sm, russell ta, wijetunge ls, kind pc and contractor a ( 2010 ) critical period plasticity is disrupted in the barrel cortex of fmr1 knockout mice. neuron, 65, 385 - 398. thomson re, kind pc, graham na, etherson ml, kennedy j, fernandes ac, marques cs, hevner rf, iwata t. ( 2009 ) fgf receptor 3 activation promotes selective growth and expansion of occipitotemporal cortex. neural dev. 4 : 4. wijetunge l, till s, ingham c, gillingwater t and kind pc ( 2008 ) mglur5 regulates glutamate - dependent development of the mouse somatosensory cortex. j. neurosci. 28 : 13028 - 13037. watson rf, abdel - majid rm, barnett mw, willis bs, katsnelson a, gillingwater th, mcknight gs, kind pc *, and neumann pe ( 2006 ) involvement of protein kinase a in patterning of the mouse somatosensory cortex. j. neurosci. 17 : 5393 - 5361. * pc kind is communication author. mitchell de, kind pc sengpiel f, murphy k ( 2006 ) short periods of concordant binocular vision prevent the development of deprivation amblyopia. eur. j
subdomain_quantum_gravity
0.51731
512
HuggingFaceFW/fineweb-edu
<urn:uuid:cda9fb5f-ccf7-4f63-8baa-1d0252574aae>
1
0.5
2025-12-19T11:31:47.127205
- 5361. * pc kind is communication author. mitchell de, kind pc sengpiel f, murphy k ( 2006 ) short periods of concordant binocular vision prevent the development of deprivation amblyopia. eur. j. neurosci. 23 : 2458 - 2466. barnett mw, watson r, vitalis t, porter k, komiyama nh, stoney pn, gillingwater th, grant sgn and kind pc syngap regulates pattern formation in the trigeminal system of mice. j. neurosci. 26 : 1355 - 1365. porter k, komiyama nh, vitalis t, kind pc & grant sgn ( 2005 ) differential expression of two nmda receptor interacting proteins, psd - 95 and syngap during mouse development. eur. j. neurosci. 21 : 351 - 362. spires tl, molnar z, kind pc, cordery pm, upton al, blakemore c, hannan aj. ( 2005 ) activity - dependent regulation of synapse and dendritic spine morphology in developing barrel cortex requires phospholipase c - b1 signalling. cereb. cortex 15 : 385 - 393. mitchell de, kind pc, sengpiel f, murphy k. ( 2003 ) brief daily periods of binocular vision prevent deprivation - induced acuity loss. curr. biol. 13 : 1704 - 8. sengpiel, f and kind, pc ( 2002 ) the role of activity in the development of the visual system. curr. biol. 12 : r818 - 826. vitalis t, cases o, gillies k, hanoun n, hamon m, seif i, gaspar p, kind pc, and price dj ( 2002 ) interactions between trkb - signalling and serotonin excess in the developing murine somatosensory cortex : a role in tangential and radial organisation of thalamocortical axons. j. neurosci. 22 : 4987 - 5000. kind pc, mitchell de, ahmed b, blakemore c, bonhoeffer t and sengpiel f ( 2002 ) correlated binocular activity guides recovery from monocular deprivation. nature 416 : 430 - 433. hannan aj, blakemore c, katsnelson a, huber k, roder jk, bear m, kim d
subdomain_quantum_optics
0.561228
512
HuggingFaceFW/fineweb-edu
<urn:uuid:cda9fb5f-ccf7-4f63-8baa-1d0252574aae>
2
0.5
2025-12-19T11:31:47.128122
person who censors. " verb example - - " soldiers ' letters from war zones are frequently censored to avoid passing on sensitive information. " noun example - - " the soldier would have to carefully word his letter so that it would pass the censor. " the activity or condition of censoring is called censorship, the suffix is like the - ship suffix in friendship. i recently heard one of the elected representatives speak of " censureship of the president. " there is no such word. one would think that a professional lawmaker would understand that. now if the president were sent to prison, then what he wrote might be censored by prison authorities. ( please understand, i am trying to carefully not take a stand here on the political issue : i am just using this as an example. ) the word censor has been bandied about loosely in political contexts. we sometimes read of parents of schoolchildren or patrons of libraries objecting to certain books. teachers ' unions and some activist organizations may refer to such things as " censorship " or such parents or patrons as " censors. " this is not censorship in most cases. there is usually no call to legally ban or rewrite the books in question. it is usually a call to either not have their own children read them or to remove the book from the curriculum. ( i teach ; i have experienced this ). on the other hand, the lord ' s prayer has been censored, at least in u. s. public schools, since 1963. that was an official act of the supreme court limiting this kind of speech in public schools. occasionally college incidents that may involve censorship make the news. many campuses have " underground " or " alternative " newspapers. on a few campuses, students opposed to the these papers have seized as many copies as they could before the papers could be distributed. in some cases there were hardly any copies left. such students were acting as censors, though they had no official backing. at at least three campuses in the united states, the administration supported such seizures. when it became officially sanctioned as it was in these cases, then the act became censorship. if there were any questions of censorship surrounding president clinton ' s difficulties, they had to do with the content of the special prosecutor ' s report and testimonies of some of the witnesses. some did argue that the special prosecutor ' s report should have been censored to remove some of the explicit details the way that the nixon tapes were during the water
subdomain_quantum_cryptography
0.511246
512
HuggingFaceFW/fineweb-edu
<urn:uuid:fcadf8c7-e91c-4c5d-9684-26537b38a359>
1
0.5
2025-12-19T11:31:47.156467
of the special prosecutor ' s report and testimonies of some of the witnesses. some did argue that the special prosecutor ' s report should have been censored to remove some of the explicit details the way that the nixon tapes were during the watergate hearings. the famous " expletive deleted " from the transcripts of the watergate tapes is an example of censorship. to sum up, censoring is regulating or prohibiting types of speech or writing. censuring is an official rebuke of a person for some offense. this may help you as you sort through the news in the coming weeks. i do hope to continue with the idea of what a grammar checking program can and cannot do next time. our program grammar slammer deluxe includes many words like censor / censure that people often confuse. these words are ones that spell checkers and grammar checkers often overlook because both are real words in english. grammar slammer deluxe has two components - - grammar slammer ( demo available for download ) and spelling slammer ( grammar slammer demo includes sample ). this handy resource will help you overcome such confusion. go to http : / / englishplus. com / pub / grmslm20. zip for latest grammar slammer demo the weekly computer magazine infoworld has been carrying a series of articles on what it calls the " technopropisms " caused by unthinking dependence on spell and grammar checkers. grammar slammer deluxe was created to help you overcome this. some of those articles are linked below. a recent article on the seizure and destruction of campus newspapers can be found at http : / / www. usnews. com / usnews / issue / 981207 / 7john. htm. for the original work on freedom of the press and speech, see milton ' s areopagitica from 1644 at a " modernist " interpretation of areopagitica is at http : / / www. yale. edu / lawweb / lawschool / occpaper / blasi. htm we wish you the best in 1999, and may all your anguish be vanquished, your friends at english plus + any suggestions for our web site, please send them to firstname. lastname @ example. org
subdomain_quantum_mechanics
0.543738
466
HuggingFaceFW/fineweb-edu
<urn:uuid:fcadf8c7-e91c-4c5d-9684-26537b38a359>
2
0.5
2025-12-19T11:31:47.160510
business across cultures : the meaning of words translate this page one of the most common sources of intercultural friction in a multinational office in indonesia is a misunderstanding between a foreign professional and an indonesian manager. often there is no fault to be found in such a circumstance. it may well be because of the way people ' s understanding of the meaning of words or concepts differs between cultures. for instance, indonesian managers often speak of the need for respect and politeness in business transactions. the meaning of those terms, “ what is respect? ”, “ what is polite? ” vary with the perceptions of the person or persons involved. what can be considered impolite in indonesian business culture may be a commonplace and accepted facet of western business culture. however, the miscommunication or misperception of meanings by a foreign co - worker is often a reason for cultural friction. one of the most frustrating conflicts in meaning for both western and indonesian managers is the question of proper feedback or of “ closing the loop ”. what may seem sufficient response and information on an on - going assignment to one party, may be considered grossly insufficient by another and this insufficiency may never be properly addressed. one of the benefits of a cross - cultural training program is having the different cultural sides of a team or office sit down together and decide on what terms and words mean exactly in the separate cultural context of their own office. it should be a basic premise of these programs that indonesians are not expected to become westerners in outlook and neither are the expatriates expected to become indonesian, but rather both have to work towards establishing a separate corporate culture one that works best to meet the bottom - line goals of their company in indonesia. “ closing the loop ” normally involves four distinct information steps. these are giving, receiving, acting, and reporting. each of these steps are important and each contain the seeds for misinterpretation. for instance, there is often a general disagreement as to the level of the reporting or “ feedback ” required in an office. the feeling of many indonesian managers is that a lesser level of feedback to superiors is considered sufficient than many expatriate managers are comfortable with. one thought on the indonesian side being that delays may not be within the manager ' s power to control. many expatriate managers disagree that such lower levels of feedback are acceptable feeling that indonesian managers should not wait until an action is completed before reporting progress on an action being important also. these are issues that need to be discussed and decided by the
subdomain_quantum_field_theory
0.535378
512
HuggingFaceFW/fineweb-edu
<urn:uuid:a9e2633b-88a7-4013-9691-899f763348bd>
0
0.5
2025-12-19T11:31:47.271390
. many expatriate managers disagree that such lower levels of feedback are acceptable feeling that indonesian managers should not wait until an action is completed before reporting progress on an action being important also. these are issues that need to be discussed and decided by the people who work on the team or in the office. ignoring or complaining that the other party is not giving proper feedback, or worse, that the other party is incompetent, will not improve the harmony of the office. these miscommunications can be resolved if the different cultural sides of an office take the time and effort to try to understand one another. for instance, i recently facilitated a mixed, cross - cultural program for a major multinational operating in the financial sector. the indonesian and expatriate sides in the discussion thought that they had understood what each other expected. as it turned out, there was a large gap in those expectations. after several hours of guided discussions, the following agreement on meaning was reached. “ closing the loop ” is taking responsibility that you give information clearly, that you indicate that you have received and understood the information, that you act promptly on that information, and that you report back not only when the action is complete, but when there is additional information that is of importance. “ some western managers think that these kind of mission statements ' go without saying '. that they are clearly understood by anyone working in an international business environment. i sometimes wonder how many times i have heard an expatriate participant on one of my programs exclaim, ” well, they [ indonesian managers ] must understand that! ' when it is clear that they do not. the culture that one grows up in effects the entire way that he or she perceives actions and words. these perceptions are altered through personal observation, experience, and training. however, the assumption that someone else looks at a particular situation the same way that you do is often incorrect and can lead to many cross - cultural conflicts. the way around these cultural barriers is through mutual understanding. multicultural offices and teams need to take the time and effort to set the ground rules for future cooperation. they need to determine the meaning of words and concepts so that their understanding is clear. denial, often a criticism of indonesian managers in problem resolution, is one trait that is also often found in their expatriate counterparts. this article was generously contributed by george b. whitfield, iii when he was a technical advisor with executive orientation services. copyright © 1997 - 2012, expat web site association jakarta
subdomain_quantum_mechanics
0.507236
512
HuggingFaceFW/fineweb-edu
<urn:uuid:a9e2633b-88a7-4013-9691-899f763348bd>
1
0.5
2025-12-19T11:31:47.273282
28th mayo 2010 masters student uses pedal power to create novel machine an innovative bicycle - powered water pump, created by a student at the university of sheffield, has proved a huge success and is now in regular production in guatemala, transforming the lives of rural residents. jon leary, 24, a meng student in the university ’ s department of mechanical engineering, took his bicycle machine design from a steel city drawing board to the heart of guatemala as part of his dissertation, which required him to ‘ make something useful out of rubbish. ’ during his four month stint in guatemala, jon spent time improving the design for his bicibomba movil – a mobile bicycle - powered water pump to be used for irrigation and general water distribution - by working with the guatemalan ngo maya pedal, who design and build a variety of weird and wonderful bicycle machines using abandoned bikes sent over from the us and canada. maya pedal ’ s aim is to produce machines which can improve the daily lives of locals, without them having to resort to expensive electrical or environmentally damaging fossil fuelled machines. their machines, which are human - powered sustainable energy sources, range from the bicilavadora ( bicycle washing machine ) to the bicimolino ( corn grinder ). jon created the machine using a normal bike, which is plugged into a frame with an old electrical pump converted to a friction drive attached to the back wheel. the back tyre of the bike makes direct contact with the former armature of the motor, which is covered with rubber from an old tyre to give better grip. the machine was tested to a range of heights and on flat ground the pump can achieve a 40 litres per minute flow rate - equal to about three normal showers. at 26 meters, a flow rate of 5 liters per minute can be achieved. the bike frame can be built quickly and easily using only basic workshop tools and materials, including a few lengths of angle iron, some flat lengths of metal, bicycle seat posts and seat tubes, and a scrapped standard electric centrifugal water pump. prior to jon ’ s design, maya pedal had already produced a popular machine capable of drawing water from up to 30m below the surface, however many farmers lived on steep inclines and wanted to distribute the water once it had been extracted from the well. as a result, unlike maya pedal ’ s other static designs, jon ’ s bike is completely mobile - when a person is done pumping, they can simply flip the frame upside down and it will sit on top of the back wheel like a pan
subdomain_quantum_thermodynamics
0.514387
512
HuggingFaceFW/fineweb-edu
<urn:uuid:d496057c-420a-4a90-8e8b-6cad80d3b615>
0
0.5
2025-12-19T11:31:47.319679
by the lead project published august 2012 list price : $ 24. 95, your amazon. com price : $ 13. 95 amazon. com sales rank : 1, 750 availability : usually ships in 24 hours scratch is the wildly popular educational programming language used by millions of first - time learners in classrooms, libraries, and homes worldwide. by dragging together colorful blocks of code, kids quickly learn computer programming concepts and make cool games and animations. in super scratch programming adventure!, kids learn programming fundamentals as they make their very own playable video games. they ' ll create projects inspired by classic arcade games that can be programmed ( and played! ) in an afternoon. the book ' s patient, step - by - step explanations of the code and fun programming challenges will have kids creating their own games in no time. this full - color comic book makes programming concepts like flow control, subroutines, and data types effortless to absorb. packed with ideas for games that kids will be proud to show off, super scratch programming adventure! is the perfect first step for the budding programmer. gdnet staff review : super scratch programming adventure is a departure from the typical books i review. for one, it is for kids. and it is written in the style of a comic book ( or " graphic novel " as some soon - to - be - mentioned kids corrected me ). it is a book designed to gently get kids involved in game programming using the already - gentle " scratch " programming / animating tool for kids. as for my reviewers, i knew i was so far out of the target demographic that i wouldn ' t be able to fairly review this title, so i recruited a couple of local kids to help me. my first reviewer was my ten year - old daughter, and the second was her 12 year - old male manga - obsessed friend from across the street. i figured they would give me a good idea of how this book would appeal to kids. my daughter was already a bit of a scratch - adept, having taken a one - week course in it over the summer. she was also a bit lazy in her approach, as each chapter of the book is a two - page framing story followed by several pages of " how to make a scratch program that resolves the situation in the story ". there are plenty of code listings and screenshots, but since scratch is such a colorful lego - esque environment to start with, the code listings merge in seamlessly with the comic characters. and that ' s how programmers start
subdomain_quantum_gravity
0.513443
512
HuggingFaceFW/fineweb-edu
<urn:uuid:fd3f0937-976f-4ea9-a9ae-3b56b7ce80c3>
0
0.5
2025-12-19T11:31:47.360981
the length of amyloid fibrils found in diseases such as alzheimer and parkinson appears to play a role in the degree of their toxicity, according to researchers at the university of leeds. their findings are published in the journal of biological chemistry in a paper titled “ fibril fragmentation enhances amyloid cytotoxicity. ” sheena radford, ph. d., and colleagues systematically analyzed the effects of fragmentation on three of the 30 or so proteins that form amyloid in human diseases. their results showed that in addition to the expected relationship between fragmentation and the ability to seed, the length of fibrils also correlated with their ability to disrupt membranes and reduce cell viability. this was evident even when there were no other changes in molecular architecture. co - author, eric hewitt, ph. d., says that while the findings provide scientists with unexpected new insights for the development of therapeutics against amyloid deposit - related diseases, the next stage of research will involve looking at a greater numbers of the proteins that form amyloid fibrils. “ we anticipate that when we look at amyloid fibers formed from other proteins, they may well follow the same rules. ” “ it may be that because they ’ re smaller it ’ s easier for them to infiltrate cells, ” dr. hewitt suggests. “ we ’ ve observed them killing cells, but we ’ re not sure yet exactly how they do it. nor do we know whether these short fibers form naturally when amyloid fibers assemble or whether some molecular process makes them disassemble or fragment into shorter fibers. these are our next big challenges. ”
subdomain_quantum_field_theory
0.518746
329
HuggingFaceFW/fineweb-edu
<urn:uuid:957a39d1-d98f-461e-8b3f-b4e3363f7224>
0
0.5
2025-12-19T11:31:47.368091
* * * i ' ve posted a copy of this in here, but you may want to check the link at the bottom as it gives a variety of resources. * * * did you know that with one wrong mouse click you could make it possible for someone to read all your email, documents, or instant messages? that they could also view your grades, online bank accounts, or change your course schedule? that they could read or change anything on your computer? or anything accessed from it? that they could turn on your computer ' s microphone to listen in on conversations? or command your computer to attack other network users or sites? or use your computer for a computer crime for which you may be blamed? did you know a newly installed windows xp, 2000, nt, or linux computer is likely vulnerable to the same type of compromise without even a mouse click just by being attached to the network? did you know several such incidents have occurred on computers at jmu... from windows 95 and macintosh desktops to windows nt and unix servers? that they ' ve been used to attack other computers and divulge information? did you know all our computers are scanned constantly from around the world by people hoping to take advantage of them? did you know that your behavior impacts your neighbors ' security and their behavior yours? the internet, paired with today ' s software, provides us astonishing capabilities for sharing and communication. however, these same capabilities also provide access and computer power to more than 300 million people around the world... some of whom may not share our behavioral expectations. examples, such as random acts of vandalism, can be found in any local newspaper. the threats associated with online folks ' behavior are very different from similar threats in the physical world. using the same freedom and functionality we treasure, they can communicate with our computers almost instantaneously, almost anonymously, and en masse from around the world. they don ' t even need to be a computer expert. it only takes one person to write a destructive program to enable many people without technical knowledge to cause problems, just as all of us use word processors and web browsers without knowing how they work or being able to write one ourselves. while the risks associated with these threats can be decreased by limiting communications, limiting computer functionality, and increasing the complexity involved with our computing environment, they can ' t be eliminated because security is never absolute. moreover, the more we wish to maintain our current freedom in communications and computing, the more necessary it is that we individually take steps to
subdomain_quantum_cryptography
0.535176
512
HuggingFaceFW/fineweb-edu
<urn:uuid:a93f60cb-9faf-459c-96d0-25a9190a15a2>
0
0.5
2025-12-19T11:31:47.409830
, and increasing the complexity involved with our computing environment, they can ' t be eliminated because security is never absolute. moreover, the more we wish to maintain our current freedom in communications and computing, the more necessary it is that we individually take steps to take care of ourselves and reduce the need for outside controls and limitations. the only person ultimately in control of a computer is the operator in front of the keyboard. that person presently has the freedom to run any software he or she wants and communicate with anyone around the world. each of us must do his or her part to help ensure the integrity of our network by operating our computers safely. our computers can do almost anything we tell them to do. unfortunately, this versatility makes them very complicated. a certain amount of awareness and skill is necessary to operate such a complicated device safely on a world wide network. the goal of the r. u. n. s. a. f. e. program is to help you attain the knowledge and skills necessary for safely operating an internet connected computer. the information and associated steps listed on this page are key components to everyone ' s online security. everyone should understand them and be able to take the actions described. r. u. n. s. a. f. e. workshops are offered once per semester that describe the incidents we ' ve seen at jmu, the threats we ' re exposed to, and that teach the defensive concepts and procedures described here. onsite workshops are also available to groups. ( contact gary flynn to schedule one ). click here to download the runsafe workshop powerpoint presentation. if you don ' t have powerpoint, you can get a free viewer from microsoft here. a sixteen minute runsafe awareness video is available. it can be downloaded here. the material is copyrighted by jim blackburn but may be used for educational purposes. the file is 161 mb in size. r. u. n. s. a. f. e. goal for all computer operators on the jmu network : * understand the material on this page. * run anti - virus software and update it weekly. preferably the campus supported norton anti - virus. * treat email attachments and other unknown programs with caution. * use the windows update site on every new installation and monthly thereafter. * choose strong passwords for your own desktop, particularly windows nt / 2000 / xp machines, and on servers which you may use and keep them confidential. * use care if you enable microsoft file sharing. * visit the hot topics! page at
subdomain_quantum_cryptography
0.556593
512
HuggingFaceFW/fineweb-edu
<urn:uuid:a93f60cb-9faf-459c-96d0-25a9190a15a2>
1
0.5
2025-12-19T11:31:47.411058
. * choose strong passwords for your own desktop, particularly windows nt / 2000 / xp machines, and on servers which you may use and keep them confidential. * use care if you enable microsoft file sharing. * visit the hot topics! page at least monthly. * for all server operators ( windows 2000 / iis / unix / mac / whatever ) and all unix desktop operators : 1. set up new computers with the network cable disconnected. 2. turn off all services running on the newly installed computer. 3. connect to network and download and install patches. 4. turn on only needed services. 5. subscribe to vendor security bulletins and check the hot topics page weekly. refuse to run unknown programs our computers operate the way they do entirely because of the programs we run on them. when we run a program, we give control of our computer to the author of the program. in fact, a computer break - in is just someone running a program on our computer. a perpetrator may convince us to run their program which then takes control of our computer. or they may force our computer to run their program by using software defects or unintentional access. the program may then tell our computer to email viruses to our friends. it may tell our computer to collect and reveal our passwords. it may tell our computer to disable its anti - virus and personal firewall protection. it may tell our computer to flood a web site with traffic in an attempt to disable it. or it may tell our computer to break into someone else ' s computer to help hide the identity of the perpetrator. since programs control the computer and everything the computer does or has access to, it is very important that we not run programs written by people we don ' t know or trust. almost every other security precaution depends upon our having control of our computers. if we run unknown programs, we don ' t. a program can take many forms. it might be a windows. exe file. it might be a microsoft word macro. it might be a script. we may find programs in many places. they may be offered to us in email attachments. they may be on web sites. they may be on shared folders. as we ' ll see later, they even may be forced on us over the network if we don ' t keep our computers up to date. for now, we ' ll concentrate on the programs over which we have a choice about running. in our point and click world, knowing what to
subdomain_quantum_cryptography
0.543574
512
HuggingFaceFW/fineweb-edu
<urn:uuid:a93f60cb-9faf-459c-96d0-25a9190a15a2>
2
0.5
2025-12-19T11:31:47.412011
pif ", ". shs ", ". js ", ". hta ", ". vbs ", or any ending you ' re not familiar with as you would hazardous waste material. find out what it is from the sender before opening it! - - > more information on refusing unknown programs... update our computers regularly computer programs frequently contain defects. some of these defects can allow third parties to run programs of their choice on our computers without any action on our part. this allows the third party to take control of our computers, and all the resources and data they have access to, for their own purposes. * defects in client programs like browsers, email clients, and media players may allow unwanted programs to run if we click a link to a malicious web page or receive malicious email. these types of defects can cause us to lose control of our computer simply by browsing the web or starting our email client. * defects in server programs like web or file servers, can allow someone to force unwanted programs to be run on our server. they exploit the defect by making malicious web or file requests. the exploitation might be carried out by an individual or by an automated program like a worm. running defective, vulnerable software on our networked computers is similar to leaving broken windows in our homes and offices for strangers to enter. except with the internet, people can enter these " windows " from anywhere in the world. large scale scans from around the world are often seen within days of new vulnerabilities being announced. machines with defective software or vulnerable configurations have been known to be compromised within hours of being attached to the network both here and elsewhere. most software is out - of - date and full of vulnerable defects on the installation cds and even sometimes when downloaded from vendor web sites. scanners and automated worms may find a vulnerable server almost as soon as it is connected to the network. it is necessary to check for updates as soon as new software is installed and regularly thereafter. microsoft windows systems windows desktop operators : * use the windows update service after every new installation. * re - use the windows update service once a month to keep the computer up to date. * if microsoft office is installed and you ' re not using jmu ' s novell services for software management, visit the office update site monthly. you ' ll need the original distribution media to install office patches. people using jmu ' s novell services can wait until office patches are available through the jmuapps menu or use the office update
subdomain_quantum_cryptography
0.520435
512
HuggingFaceFW/fineweb-edu
<urn:uuid:a93f60cb-9faf-459c-96d0-25a9190a15a2>
5
0.5
2025-12-19T11:31:47.415040
non - microsoft software, subscribe to vendor security bulletins or check their web site regularly for updates. linux and other unix systems these systems often have server programs running after even a desktop default installation. * never bring up a server until all patches and configuration changes have been completed. unpatched servers have been found and compromised in minutes by automated worms and scripts. install the software while the machine is disconnected from the network, make sure all services started in the inetd. conf file, / etc / rc * files, or your vendor ' s equivalent have been disabled, connect to the network and download the patches, disconnect from the network, and apply patches. * subscribe to vendor security bulletins and apply patches as soon after they are available as possible. click here for a list of various vendor security sites and notification services. * review computer security hot topics page at least monthly for announcements of software defects or other issues that may affect you. server operators should check both the hot topics and serious defects pages weekly. macintosh osx is based on unix. many unix related defects also affect macintosh osx. * current security roll - up patches can be viewed and downloaded at http : / / www. info. appl... ty _ updates. html * software updates can be requested using the software update pane in system preferences. * email notification of security defects in macosx can be obtained by subscribing to the apple notification service at http : / / lists. apple. c... curity - announce * review computer security hot topics page at least monthly for announcements of software defects or other issues that may affect you. * keep anti - virus software up to date. * if available, check your vendor ' s security site monthly for critical security updates. - - > more information on updating our computers... nullify unneeded risks whether by operator mistakes, attempts at making computers easy to use, or encouraging open access, our computer ' s software sometimes grants more access to our computers than is needed. we can decrease risk by eliminating unneeded access to our computers. * microsoft windows generally installs with several open doors by default. shut these doors by following the following precautions : o assign a good password to all windows nt, 2000, and xp accounts paying particular attention to the administrator and other privileged accounts. o disable network access to the windows administrator account. o be very careful with microsoft file sharing. it is commonly misconfigured. don ' t share more
subdomain_quantum_cryptography
0.513486
512
HuggingFaceFW/fineweb-edu
<urn:uuid:a93f60cb-9faf-459c-96d0-25a9190a15a2>
7
0.5
2025-12-19T11:31:47.417215
password passwords are the combination locks used to protect our computer accounts. it goes without saying that giving out our combination or leaving the lock unlatched ( i. e. walking away from a logged on computer ), compromises our security. however, technology provides ways for people to obtain our combination even if we aren ' t careless. to thwart such misuse, we must choose complex combinations. there are three elements to a complex combination : 1. it can ' t be obvious. that is, it can ' t exist in an attack dictionary. * every word in an english language dictionary can be tried in minutes. attack dictionaries also include names, common misspellings, words with numbers, and other commonly used passwords. you also don ' t want the password to have any personal significance to you... your dog ' s name for example. using a dictionary word for a password is like using a locker number for a combination. 2. it can ' t be a short * a combination lock with a two number combination wouldn ' t protect very well. anything less than an eight character password is like having a such a combination. it simply won ' t hold up for long on the network. 3. it can ' t be made up of just a few characters * a combination lock with only ten numbers on the dial isn ' t as effective as one with fifty. using just lower case letters is like limiting a combination lock to ten numbers. on systems that support them, passwords should contain at least one of each of the following characters : o uppercase letters ( a - z ) o lowercase letters ( a - z ) o numbers ( 0 - 9 ) o punctuation marks (! @ # $ % ^ & * ( ) _ + = - ) etc. different systems have different capabilities. some will not let you use all the strength features mentioned here. when you get an account or change your password on a system, you should be given instructions on any limitations. how, you may ask, am i ever going to remember such a complicated password? * pick a sentence that reminds you of the password. for example : o if my car makes it through 2 semesters, i ' ll be lucky ( imcmit2s, ibl ) o only bill gates could afford this $ 70. 00 textbook ( obgcat $ 7t ) o what time is my accounting class in showker 240? ( wtimacis2? ) * if you absolutely have to, record it in
subdomain_quantum_cryptography
0.604191
512
HuggingFaceFW/fineweb-edu
<urn:uuid:a93f60cb-9faf-459c-96d0-25a9190a15a2>
9
0.5
2025-12-19T11:31:47.419126
and network access controls often cross os, web server, web development, application server, and database realms. perhaps less well known due to vendor marketing efforts and perhaps our own wishful thinking, a service needs ongoing monitoring and maintenance regardless of platform. without this care, the server may not remain in operation long, it may not preserve the confidentiality and integrity of resident data and accounts, or it may be used as a base of operations for criminal activity including attacks on other computers. * budget planning, hiring procedures, staffing levels, and job descriptions should reflect the need for developer and administrator training and ongoing monitoring and maintenance in a complex and ever changing environment. * allow time for regular maintenance * elevate security and ongoing maintenance to the same level of consideration as cost, ease of use, functionality, and performance. - - > more information on assuring system care... it is impossible to provide absolute security for our computers just as it is impossible to provide absolute security for ourselves or our possessions in the physical world. insecurity is a fact of life. there are no technical panaceas. there are 200 million people connected to the internet and we cannot control their actions. they have world - wide, almost instantaneous and anonymous access to our computers ' network ports. there are practical compromises in the design of our computers and networks that may leave them vulnerable to certain activities. accordingly, we must temper our actions with awareness and take some precautions. * regularly backup critical or hard to replace data * be careful about whom and what you trust. don ' t believe everything you see on the web or in email messages. * do not ignore warning messages. in particular, those associated with : o web browsers warning about site certificate mismatches o web browsers warning about file downloads or potential security problems o ssh clients like putty, f - secure, and securecrt warning about host key mismatches o repeated virus warnings - - > more information on facing insecurity... everybody needs to do their part your particular computer may not seem to be a desirable target of a compromise attempt but any computer is attractive as a stepping stone or attack vehicle. simple windows 95 and macintosh desktops have been involved in security incidents. even with switched networks, a compromised computer may be used to sniff network traffic from neighboring computers. thus, your security is dependant upon your neighbors ' security and their security on yours. in the days of standalone computers, reckless or unauthorized use of a computer affected just one computer. with a network
subdomain_quantum_cryptography
0.504689
512
HuggingFaceFW/fineweb-edu
<urn:uuid:a93f60cb-9faf-459c-96d0-25a9190a15a2>
11
0.5
2025-12-19T11:31:47.421350
be used to sniff network traffic from neighboring computers. thus, your security is dependant upon your neighbors ' security and their security on yours. in the days of standalone computers, reckless or unauthorized use of a computer affected just one computer. with a networked computer and its access to shared network resources and common communications lines, the same actions may affect many computers, accounts, services, or people. as long as we want to continue to have relatively open computing and communications choices, and preserve our privacy, services, and data, each one of us must do his or her part to help ensure the integrity of our network. * do your part - runsafe * encourage and help your peers to do their part - runsafe - - > more information on doing our part... feel free to use or derive from r. u. n. s. a. f. e. material as long as you give credit to jmu. a note to email @ example. com describing your project would be greatly appreciated! sponsored by : sparkhost - hosting without compromises! hybrid performance web hosting spark host stream hosting hybrid irc & ircd server shell accounts no replies to this topic 0 user ( s ) are reading this topic 0 members, 0 guests, 0 anonymous users
subdomain_quantum_cryptography
0.565773
258
HuggingFaceFW/fineweb-edu
<urn:uuid:a93f60cb-9faf-459c-96d0-25a9190a15a2>
12
0.5
2025-12-19T11:31:47.421834
organizations or clubs are designed for students in diverting their attention and with purpose of bringing them extra form of relaxation and interaction with other students. it may be innumerable but almost serving the same purpose, they may differ from types of it. some are into music, religion, science, major subjects or let us say law, theatre, political, sports, community service and groups that are dedicated with the all about of “ essay on speech writing and presentation. ” approval of the faculty and the dean is significant in order to make it formal and legal. these organizations are led by fellow students who they thought would best fit the position of being the president. advantages lie from joining and participating from the aforesaid. it keeps you on track, active and away from vices. school clubs also serves a training ground for selected participants and haven especially with their free time. social interaction is enhanced and which develop at its best that will be beneficial on their future. the students are draw closer despite of their differences. sharing ideas, swopping of opinions can bring them together which in the end can give them positive result in terms of personality building. today, students are always up for challenges and responsibilities, and these clubs is counted in. at times, being not able to attend the class they make these clubs as an excuse. but is taken for granted to the fullest that sometimes affect their performance in school. the policies of school organizations when not executed well will always be the reason of irresponsible students in skipping classes.
subdomain_quantum_field_theory
0.51398
306
HuggingFaceFW/fineweb-edu
<urn:uuid:e26a914b-f360-45c5-83f2-12de14718409>
0
0.5
2025-12-19T11:31:47.428965
field biology laboratory the field biology laboratory is not only a space for the continuing study of the flora and fauna of north carolina, but is also a rich source of archival materials collected over many decades. the lab contains a collection of study skins and mounts of birds native to north carolina, and a collection of bird nests from the piedmont region. this laboratory houses two historical collections of bird eggs gathered in the 1800s, including the t. gilbert pearson egg collection. in addition, students have access to a herbarium of north carolina plants, and reference collections of preserved reptiles, amphibians, and mammal skulls of species native to north carolina and beyond. anatomy and physiology laboratory students investigate various aspects of human physiology using computer - based software for recording electrocardiograms, electromyograms, and electroencephalograms. advanced studies in neuroscience include the recording of individual neuronal action potentials. an associated laboratory for field studies in fisheries biology houses a complete array of equipment for the investigation of aquatic ecology, limnology, and ichthyology. microbial genetics and molecular biology facility standard and advanced equipment in the molecular biology and microbial genetics lab provide students with the tools for the study of the phylogenetic relationship between microbial organisms and the molecular analysis of signaling processes in nematodes. in their independent research projects, students utilize instrumentation for the growth of organisms under a variety of conditions, and the isolation, purification and quantification of genomic dna. students routinely utilize the techniques of pcr, pulsed - field gel electrophoresis, fluorescent microscopy, recombinant dna technologies and rnai. the department has two fully - equipped laboratories dedicated to independent, student research projects. forensic biology laboratory the forensic biology laboratory supports advanced forensics students in molecular cell biology and forensic anthropology. students pursue the identification of drugs and toxins utilizing the gas chromatograph - mass spectrograph, which provides definitive identification of these substances. the laboratory is also where students investigate a variety of topics related to cause of death, e. g., identification of diatoms related to deaths by drowning, and skeletal damage due to ballistics, cutting and blunt force trauma. the highlight of the forensic anthropology course, the investigation of clandestine graves, utilizes the equipment and archival materials of the forensic biology lab for this capstone experience in forensics. forensic chemistry laboratory students utilize research - grade microscopes for the analysis of trace forensic evidence, and explore a variety of chemical methods for developing latent fingerprints. forensic chemistry students employ the fully automated shimadzu
subdomain_quantum_optics
0.528818
512
HuggingFaceFW/fineweb-edu
<urn:uuid:ed68498d-e8d3-4bc6-a69b-9a9461bb5124>
0
0.5
2025-12-19T11:31:47.436645
a period of millions of years. there is other evidence of a turbulent past ; jumbled conglomerates lie here and there. conglomerates usually gather where a vigorous, fast flowing river or stream connects with a slower moving body of water or lake. the vigorous river then dumps its detritus ( wood, gravel, rocks, etc ) into the slow body, where it might compact over years and turn into a conglomerate. the higgledy - piggledy patterns of the conglomerate rocks on this beach point to violent flooding and recession as the seas washed in and out of the ancient desert. the desert was eventually covered in ocean, marking the beginning of the lower jurassic period. the iridescent ammonites found here ( caloceras johnstoni ) are the ' zone fossils ' for the lower jurassic. a zone fossil marks definitive borders between one age and the next. when a fossil is particularly common worldwide, strata can be identified and dated by their presence. sea - shells, bone - beds and iridescent ammonites among the more famous fossils along this stretch are the bone beds. these are, as the name would suggest, beds of fossils composed of bones, mainly of fishes, but also containing scales and teeth. entire fishes have been found a little further on. there are also what appear to be miniature scallops in profusion, captured in a dark, hard rock. but the most obvious of fossils in this area have to be the aforementioned iridescent ammonites. some are over two feet across, and when wet, shine like mother of pearl. this researcher has a 12 " by 10 " slate covered edge to edge with ammonites of this nature, none larger than an inch across. people have been down to this beach with pneumatic drills and other heavy equipment to dig these prizes out of the rock. this is a huge shame, as some of the largest ammonites are otherwise too heavy to move, and would have given the casual passer - by enjoyment for years to come. is there somewhere else you could go? the short and happy answer is yes. britain is brimming with fossils, some of which are easier to find than others. the easiest of all are in gravel paths and driveways. have a good look in among the stones and, if you find one that has a patterned surface ( rather like someone has pushed a sponge into it ) you have found yourself a fossil coral. also, everyone has heard about lyme regis. again, caution is advised under the cliffs
subdomain_quantum_gravity
0.517225
512
HuggingFaceFW/fineweb-edu
<urn:uuid:3b8a0940-ea85-45d1-93d2-074c25d605ee>
2
0.5
2025-12-19T11:31:47.447299
power is actualized only where word and deed have not parted company, where words are not empty and deeds not brutal, where words are not used to veil intentions but to disclose realities, and where deeds are not used to violate and destroy but to establish relations and create new realities. - hannah arendt, the human condition arendt ’ s conception of power is one of the most subtle and elusive features of her political theory. here arendt poses the problem of power in terms of power ’ s loss, of powerlessness, which is also what she calls “ the death of political communities. ” what is powerlessness? what, exactly, is lost when power is lost? there are many ways to become powerless in the world of twenty - first century politics. in the united states we often imagine that citizens would be powerless without their constitutional rights – the vote, free speech, due process. in and around the world ’ s many war zones, the loss of military protection seems to produce a very different kind of powerlessness, one that is linked to both our physical vulnerability to violence as human beings and the persistence of violence between sovereign states ( and within them. ) there is also the powerlessness that seems to follow from the dislocations or migrations of peoples, a condition that arendt calls mass homelessness, which may come from the movement of peoples across borders or the redrawing of borders across peoples. poverty appears to be another form of powerlessness altogether, one that disrupts our capacity to appropriate nonhuman nature through labor and work and thereby sustain our lives. arendt argues that mass destitution, alongside mass homelessness, is a form of powerlessness that is peculiar to the political condition of the modern age. many other kinds of powerlessness can be added to this list. the list is disturbing not only for its variety and length, but also because the felt urgency of each danger invites us to elevate one or two above the others, so that we risk settling for powerlessness of several kinds in order to secure power in one or two “ emergency ” domains. we choose between the power of kill lists and drone strikes and the power of due process for americans accused of terrorism. we weigh our powerlessness in the face of global warming against the powerlessness caused by the great recession, where the hoped - for “ recovery ” will be defined by consumption - led “ growth, ” rendered tangible by lower gas prices and more crowded shopping malls. or, we may think that us power in the globalizing world of
subdomain_quantum_field_theory
0.560137
512
HuggingFaceFW/fineweb-edu
<urn:uuid:5c84692a-36a3-49c7-8db1-eef8950dcfea>
0
0.5
2025-12-19T11:31:47.461433
by the great recession, where the hoped - for “ recovery ” will be defined by consumption - led “ growth, ” rendered tangible by lower gas prices and more crowded shopping malls. or, we may think that us power in the globalizing world of free trade and faster capital flows is dependent upon “ securing our national borders, ” achieved through the quasi - militarization of immigration enforcement. hard choices are the stuff of politics - they are supposed to be what power is all about - but the dilemmas of modern powerlessness are peculiarly wrenching in large part because they are not readily negotiable by political action, by those practices of public creativity and initiative that are uniquely capable of redefining what is possible in the common world. rather, these “ choices ” and others like them seem more like dead - ends, tired old traps that mark the growing powerlessness of politics itself. the death of the body politic, which can only occur by way of the powerlessness of politics itself, is arendt ’ s main concern in the above quote. in contrast to hobbes, rousseau, weber, and habermas, among others, arendt distinguishes power from domination, strength, rationality, propaganda, and violence. located within the open and common world of human speech and action, power reveals its ethical and political limits when it is overcome by deception, empty words, destruction, and “ brutality. ” rooted in the human conditions of natality and plurality, and constituted by the gathered actions of many in a public space of appearance, power exists only in its actualization through speech and deed. like action, power depends upon the public self - disclosure of actors in historical time. actors acting together with other actors generate power. yet because we do not know “ who ” we disclose ourselves to be in the course of collective action, or what the effects of our actions will turn out to mean in the web of human stories, power itself is always “ boundless and unpredictable, ” which in part explains its peculiar force. given its boundlessness and unpredictability, power cannot be stored up for emergencies, like weapons or food and water, nor kept in place through fixed territories, as with national sovereignty. power therefore co - exists only uneasily with machpolitik. power can overcome violence and strength through the gathered voices and acts of the many ; it can also be destroyed ( but not replaced ) through the dispersal of the many and the dissolution of the space of appearance. in - between gathering and dispersal, power
subdomain_quantum_field_theory
0.554287
512
HuggingFaceFW/fineweb-edu
<urn:uuid:5c84692a-36a3-49c7-8db1-eef8950dcfea>
1
0.5
2025-12-19T11:31:47.462696
. power can overcome violence and strength through the gathered voices and acts of the many ; it can also be destroyed ( but not replaced ) through the dispersal of the many and the dissolution of the space of appearance. in - between gathering and dispersal, power is preserved through what arendt calls “ organization, ” the laws, traditions, habits, and institutions that sustain the space of appearance during those interims when actors disperse temporarily and withdraw back into the private realm, only to reappear later. for arendt, the loss of power is the loss of our capacity to act with others in a way that generates, sustains, and discloses a common world. powerlessness is marked by the receding of public spaces. this may occur, for example, through the gentle decline of a formally constituted public realm into the technocratic shadows of the social, or through the brutal sovereign repression of spontaneously emergent spaces of appearance. in both cases, our ethical and political incapacities to act together, and the philosophical inability to recognize power when we see it, are at the root of modern political powerlessness. power - seekers, on arendt ’ s view, would be well advised to cultivate a deeper political appreciation for both the immaterial force and fragility of human natality, plurality, and public space, which will be lost when power is mistaken for its rivals, like reason, strength, violence, or sovereignty. congratulations and welcome to the newest hannah arendt center fellows, wyatt mason, bill dixon, laura ephraim, and ursula ludz. wyatt mason ( senior arendt center fellow ) is a contributing editor of harper ' s magazine and a contributing writer to the new york times magazine. his writing also appears in the new york review of books and the new yorker. modern library publishes his translations of the works of arthur rimbaud, rimbaud complete and i promise to be good. a 2003 - 2004 fellow of the cullman center for scholars and writers at the new york public library, he received the 2005 nona balakian citation from the national book critics circle and a national magazine award in 2006. he teaches non - fiction in the bennington writing seminars and will be senior fellow at the hannah arendt center at bard college for 2010 - 2011. charles ( bill ) dixon ( post - doctoral fellow ) is a political theorist and a phd. candidate in political science at johns hopkins university. dixon ’ s research interests include ancient and modern theories of democracy, political judgment and action, political economy, and
subdomain_quantum_field_theory
0.543273
512
HuggingFaceFW/fineweb-edu
<urn:uuid:5c84692a-36a3-49c7-8db1-eef8950dcfea>
2
0.5
2025-12-19T11:31:47.463726
depression is a mental illness characterized by feelings of profound sadness and lack of interest in enjoyable activities. it may cause a wide range of symptoms, both physical and emotional. unlike a blue mood, depression can last for weeks, months, or years, and rarely subsides without treatment. depression in college here ’ s what you need to know about how to prevent and treat depression while you or your child is in college. can folic acid help ease depression? folic acid, the b - vitamin that is famous for its role in preventing birth defects, is now under scrutiny for its effects on another devastating condition — depression. how to choose a therapist or counselor perhaps you have a chronic or difficult problem, or maybe you feel depressed or sad. before you jump into therapy, there are important issues that you need to consider. could your depression be related to your medication? after two weeks of taking accutane, an acne medication, 19 - year - old joe began experiencing fatigue, lack of motivation, sleep problems, and crying spells. he was diagnosed with depression — something his healthcare provider eventually believed was related to his use of accutane. creativity and depression : is there a link? history is filled with writers, poets, artists, musicians, composers, and other creative people who wrestled with mood disorders. but is this portrayal just a stereotype, or is there really a link between creativity and depression? depression screening advised for all adults soon your doctor may start asking more questions about your mental health. prompting these changes are innovative new recommendations from the us preventive services task force on screening for depression in adults. the role of depression in adolescent obesity about 5 % of children and adolescents in the unites states suffer from depression. could this put them at increased risk for obesity? a study from the journal explores the possible link.
subdomain_quantum_optics
0.53215
368
HuggingFaceFW/fineweb-edu
<urn:uuid:0d94eade-91ef-4e44-af28-eaafbce43652>
0
0.5
2025-12-19T11:31:47.467180
international healthcare worker safety center global initiative for healthcare worker safety a forum for sharing research and best practices worldwide in the prevention of needlesticks and occupational exposures to bloodborne pathogens defining the problem... healthcare workers are a critical resource in every corner of the globe - - the infrastructure without which healthcare cannot exist. but in caring for us, they place themselves at risk daily of contracting life - threatening infections from bloodborne pathogens, including hiv, hepatitis b and hepatitis c. injuries from needles and other sharp medical devices, along with accidental exposures to blood and body fluids from splashes and sprays, are the most serious occupational hazard faced by healthcare workers. ( read more )... and the solution. who should use this site? devices with engineered sharps injury protection are highly effective in reducing the risk of needlesticks and sharps injuries. we know that a combination of safer devices, hepatitis b vaccine and basic barrier garments save lives. the challenge is to get protective devices and products into the hands of healthcare workers who need them most - - in every corner of the globe. - occupational health and infection control practitioners looking for training and educational resources in needlestick prevention and - researchers looking for the latest articles and abstracts related to occupational - hospital and healthcare administrators looking for information about epinet, a sharps injury surveillance program - epinet users worldwide who want to share ask technical questions - medical device manufacturers looking to improve their products and participate in the global strategy for healthcare worker protection we welcome your comments, questions, and suggestions for additions to this website. to submit a comment, please click here. to learn more about the center ' s global initiative for healthcare worker safety and how you can participate, click here.
subdomain_quantum_field_theory
0.506456
349
HuggingFaceFW/fineweb-edu
<urn:uuid:6e66dfe1-1c66-4d56-9468-1ff63c97743a>
0
0.5
2025-12-19T11:31:47.469928
unique to middle europe. likewise, equating the disintegration of the holy roman empire with the disintegration of the german state gives central european history a uniquely anarchic and " backward " character. this in turn implies that german history in particular is cursed with a lingering barbarism, preventing germans from forming a modern state. the rulers of central european states like austria, bavaria, prussia, and wurttemberg thus appear as purely destructive forces of decentralization rebelling against an imaginary german kingdom that never was. any reconsideration of the empire ' s place in european history really depends on emancipating ourselves from the nationalist presuppositions of the last two centuries and beginning with entirely new categories. but to ask whether the nation - state was the inevitable culmination of some developmental sequence is ultimately to question whether historical outcomes are always predetermined. one way to approach this question is to examine the emerging science of " chaos. " according to evolutionary paleontologist stephen jay gould, a distinction must be made between historical and experimental knowledge. while theoretical physics may attempt to deduce universal laws which can be tested in the lab, historical explanations depend on " contingent detail " that occurs only once. although " we can explain an event after it occurs, " gould argues that " contingency precludes its repetition, even from an identical starting point. " 3 astro nomer stephen dole affords an example of this contingency on a vast scale. with the aid of a computer program known as acrete, dole suggests how the present planetary system might have evolved from a primeval gas cloud. specifying the exact size and shape of the gas, dole simulated the evolution of a number of alternative solar systems out of more or less the same cloud. some of the solar systems generated featured planets even larger than jupiter, while others ended up with a number of smaller planets. in a later discussion of dole ' s work, richard isaacman and carl sagan noted that it was possible to generate very different solar systems by only slightly varying the initial conditions. 4 if isaacman and sagan are correct, the history of our solar system apparently depended on contingencies which preclude that history being repeated, even if one started with more or less the same conditions. at some point in the historical process, the chance collision of two gas molecules might have set in motion a chain of events leading to the formation of a very different solar system. moreover, even if we
subdomain_quantum_field_theory
0.568272
512
HuggingFaceFW/fineweb-edu
<urn:uuid:1e4ccea4-ad23-4e76-a5d0-90e8510c8b64>
1
0.5
2025-12-19T11:31:47.488132
one started with more or less the same conditions. at some point in the historical process, the chance collision of two gas molecules might have set in motion a chain of events leading to the formation of a very different solar system. moreover, even if we accept the inevitability of our solar system and the formation of earth as we know it, the human species ' rise to prominence was by no means guaranteed. gould thus argues that humanity ' s ascension to dominance was the result of a " curious chain of events " that " would probably never happen again. " 5 a matter of probability now, i would argue that the history of europe lends itself to a chaos approach. although authors of the major texts write as if nationalism was some ineluctable component of " modernity, " the emergence of nations such as france or germany may have actually been a mere matter of probability. if the carolinian empire had either held together or fallen apart completely, the history of the west would have been radically different. even the treaty of verdun in 843 was, according to geoffrey barraclough, " the result not of racial or provincial differences, but simply of dynastic conflicts within the royal house " in which power was up for grabs. 6 in this context, the emergence of the various states in the west appears as a fortuitous accretion of territorial units not unlike the emergence of our solar system out of some primeval gas cloud. while the cloud ( europe ) might have resolved itself into a single star ( empire ) or fragmented into billions of asteroids ( anarchy ), it ended up slowly resolving itself into a number of small planets ( nations ). that the western frankish kingdom eventually resolved itself into one state while the eastern developed into a number of states may have been the result of a series of unpredictable choices made by real individuals at crucial points in the historical process. the constant division and redivision of the carolinian realm after verdun meant that any rival king within that realm had the right to take the imperial power if he was strong enough. no supposed " national character " predisposed otto the great, rather than his royal contemporary across the rhine, to take the imperial title. not only was the imperial title not reserved for the eastern ( as opposed to the western ) franks, but otto ' s assumption of the imperial crown was a kind of accident. if otto had died or a west frankish ruler of equal ability had arisen, the latter might have taken the imperial crown, intervened in papal affairs and fragmented
subdomain_quantum_field_theory
0.552688
512
HuggingFaceFW/fineweb-edu
<urn:uuid:1e4ccea4-ad23-4e76-a5d0-90e8510c8b64>
2
0.5
2025-12-19T11:31:47.489347
, if chance events could have enormous long - run consequences, we can ask ourselves what might have happened if the emperors had been successful in creating a chinese - like europe dominated by a universal empire, or if the west frankish rather than the east frankish rulers had taken the imperial crown. clearly, a different europe with different national boundaries, or perhaps no nations at all as we understand them, might have resulted. by opening up a new appreciation of the unpredictability of the historical process, the study of the holy roman empire might well have a truly universal significance to students of history after all. lawrence birken teaches history at ball state university. his most recent book is hitler as philosophe : remnants of the enlightenment in national socialism ( new york : praeger, 1995 ). he is currently working on a new intellectual history of modern europe. 1. see john gagliardo, reich and nation : the holy roman empire as idea and reality, 17631806 ( bloomington : indiana university press, 1980 ), 3. 2. thomas greer and galvin lewis, a brief history of the western world, 6th ed. ( new york : harcourt brace jovanovich, 1992 ), 214 ; marvin perry, western civilization : a brief history, 3rd ed. ( boston : houghton mifflin, 1997 ), 260. 3. stephen jay gould, wonderful life : the burgess shale and the nature of history ( new york : w. w. norton and co., 1989 ), 278. 4. stephen dole, " computer simulation of the formation of planetary systems, " icarus 13 ( 1970 ) : 494508 ; richard isaacman and carl sagan, " computer simulation of planetary accretion dynamics : sensitivity to initial conditions, " icarus 31 ( 1977 ) : 530. 5. gould, wonderful life, 285. 6. geoffrey barraclough, factors in german history ( westport, conn. : greenwood, 1979 ), 6. 7. d. j. a. matthew, " reflections on the medieval roman empire, " history 77 ( october 1992 ), 36869, 390. 8. geoffrey barraclough, turning points in world history ( london : thames and hudson, 1977 ), 2122. 9. james a. vann, the making of a state : wurttemberg, 15931793 ( ithaca : cornell university, 1984 ), 1819, 3435. 10. mary fulbrook, a concise history of germany ( new
subdomain_quantum_mechanics
0.54354
512
HuggingFaceFW/fineweb-edu
<urn:uuid:1e4ccea4-ad23-4e76-a5d0-90e8510c8b64>
5
0.5
2025-12-19T11:31:47.493935
smte will develop, research, and evaluate an instructional model and a prototypical six - week hybrid learning experience that consists of an educational computer game with screen - based 3 - d design simulations ( three weeks ) and follow - up hands - on physical modeling activities and reflection time ( three weeks ). the game will situate the students in an inhospitable environment and invite them to undertake a quest that requires solving technological design problems to sustain themselves. the quest will contextualize grades 6 - 8 standards for technological literacy ( pi hacker was a member of the stl development team ) and apply standards - based mathematics and science. development of materials will be guided by the process described by wiggins and mctigue in understanding by design ( ubd ), and will be informed by nrc ’ s how people learn and by research on anchored instruction. the project will follow the planning process described in ubd : 1 ) identify desired results, 2 ) determine acceptable evidence, and 3 ) plan learning experiences and instruction. grant and denise wiggins will serve as project consultants to ensure congruence with the ubd model. the project will foster a thoughtful pedagogical approach to design that will serve as the core instructional strategy. the nsf - developed informed design model melds guided inquiry with open - ended design and leads students to develop conceptual understanding before they engage in design activity. consequently, students approach design from a more “ informed ” perspective. ctl co - directors burghardt and hacker will embed the informed design pedagogy into both the 3 - d simulations and the physical modeling. bloomsburg university ’ s institute for interactive technologies will provide the expertise in gaming, game development, and instructional design. bloomsburg faculty and students will build the active 3 - d worlds, design the background scenery, and develop animated human - like characters ( avatars ). knowledge and skill builder activities ( see informed design text box ), designed to teach important stem background concepts and skills, will be presented as realistic 3 - d simulations. the simulations will be driven by a knowledge - based engineering ( kbe ) framework. using kbe ( an object - oriented programming language tightly integrated with a geometric modeling tool ), developers capture knowledge about a design process, so that users, aided by 3 - d simulations, can evaluate the effect of design changes. tom robertson, president and ceo, kinetics inc., chapel hill, nc, is one of the nation ’ s foremost kbe experts. he will serve as a
subdomain_quantum_gravity
0.540354
512
HuggingFaceFW/fineweb-edu
<urn:uuid:9cb4b691-9b06-47d3-910e-cd78ea633639>
0
0.5
2025-12-19T11:31:47.521427
the fruit of the church is holiness. it was therefore natural for the long process of the establishment of the orthodox church in america to be climaxed by witness of holiness - - the canonization of the holy elder herman of alaska. for those who participated in the ceremonies of the canonization in alaska, as well as for those who prayed to the newly glorified saint in churches throughout the united states and canada, this holiness was manifested in the depth of the holy elder ' s humility and in the strength of his faith. the act of canonization eclipsed everything else - - human plans for the future, fears, accomplishments, successes and failures. all this was illumined by new light, the light of sanctity now shining above america - - a light surpassing human reason and bringing the fullness of divine grace into the life of the church. in the course of its 175 - year existence the russian orthodox greek catholic church in america and canada went through many phases of a sociological and psychological nature. it began with the missionary efforts of the valaam monks and was at first totally involved in the christian enlightenment of the aleut natives and in the planting of christian morality and christian socio - economic foundations among them. it spread throughout the american continent and began to create new pan - orthodox units in america, continuing to be concerned about mission among the americans on the one hand, and organizing the first parishes for orthodox immigrants o all national origins on the other. when the orthodox immigrants were divided into more definite ethnic groups in which orthodoxy began to coincide with and sometimes was even replaced by ethnic aspirations, the church naturally began to expend much energy on the organization of our socio - ethnic " ghettos. " in these ghettos all that was brought from the old world was not developed but " preserved ", beginning with recipes and ending with language, culture and provincial politics. this period, which continued for a considerable time, had an undisputed significance in the process of church growth and development. thanks to this period a number of important principles in the areas of liturgical life, piety, traditions, character and order were preserved. it also created a prolonged crisis which caused members of our younger generations who were leaving their ethnic and parochial ghetto and associated it with something totally contradictory to the " american way of life " to reject not only their sociological roots but orthodoxy as well - - orthodoxy being so closely associated with sociological factors. in the last two or three decades a new current has appeared in our church life. the desire to " conserve " traditional values
subdomain_quantum_field_theory
0.513162
512
HuggingFaceFW/fineweb-edu
<urn:uuid:1067d8ce-4c77-4d2e-9ef2-5b4722150ed8>
0
0.5
2025-12-19T11:31:47.534560
of life " to reject not only their sociological roots but orthodoxy as well - - orthodoxy being so closely associated with sociological factors. in the last two or three decades a new current has appeared in our church life. the desire to " conserve " traditional values, so predominant in the sociological ghetto, began to be replaced gradually by the attempt to integrate orthodoxy into american life. these efforts were not always successful ; quite often they carried with them the danger simply of replacing what is russian, carpatho - russian, ukrainian by what is american. this, in terms of its quality, threatened to be as provincial as everything that preceded it. at the same time there was a growth of the healthy tendency to accomplish the " churching of americanism, " if one may put it that way, rather than the " americanization of orthodoxy. " there began an era of the discovery of orthodoxy in all it untarnished value of orthodoxy as a self - sufficient principle, to which all other principles must be subordinate. there began a rediscovery of the church ' s sacramental life, in which were to be found the sources of spiritual and intellectual sustenance. at first, orthodoxy was an " embarrassment " because it was a " foreign faith, " because it was something contradictory to " american culture. " later, orthodoxy became a source of " pride, " as one can be " proud " of exotic costumes, traditions and background. now, glory be to god, we have begun to live orthodoxy, that is, to understand fully that orthodoxy is not a museum, not a repository, not exoticism, but life. for many long years our ecclesiastical and social interests were concentrated almost exclusively upon ourselves, upon our own problems. even when we thought we were speaking about america our point of departure was our ethnic identity. america for us was " they " and not " we ". if, as a church, we participated in the life of the nation, this participation expressed itself first of all in the fact that we sent our children to the front, where they fought heroically for the country ' s freedom. as for the rest, our reactions always concentrated on negative things : we warned the country ( and were justified in doing so ) about political, moral and social dangers. although a portion of our participation was directed to creative ends, basically our participation was concentrated upon ourselves and the solution of our " internal problems. " we are accustomed to this approach ; it will not be easy for us to survive the crisis which has been placed before us by the
subdomain_quantum_field_theory
0.502376
512
HuggingFaceFW/fineweb-edu
<urn:uuid:1067d8ce-4c77-4d2e-9ef2-5b4722150ed8>
1
0.5
2025-12-19T11:31:47.535801
participation was directed to creative ends, basically our participation was concentrated upon ourselves and the solution of our " internal problems. " we are accustomed to this approach ; it will not be easy for us to survive the crisis which has been placed before us by the course of historical and ecclesiastical events. the resolution of this crisis is the major theme of the extremely important test to which our autocephaly has called us. it is useful to remember that in greek the world " crisis " means " judgment ". now the meaning of this word is relevant for us in the most direct way. god ' s judgment is being done to us, the judgment of history and the judgment of our conscience. in the light of this judgment we will have to justify the gift which has been handed to us by the church, the gift of maturity and independence. we wanted this and our desire has been fulfilled. looking with gratitude to all our past, to the entire and great tradition of russian and ecumenical orthodoxy which we have inherited, we should see in this a good and favorable wind and not a crutch for our support nor eyeglasses through which we can look at the reality of life. in accepting autocephaly we witnessed to our maximal loyalty to the historical road of america and canada. in accepting autocephaly our church accepted american and canadian citizenship ; the acceptance of citizenship always implies liberation from and rejection of any other historical and political loyalties. in turning from the 14th all - american sobor of the metropolia to the first council of the orthodox church in america we close the last volume of our 175 - year history and place it together with the other volumes on the shelf of experience and respect, simultaneously opening a fresh page of a new book of our ecclesiastical life. the title page of this book bears the inscription " orthodox church in america. " what will appear on the pages after the title depends on us. and so our autocephaly has placed our church face to face with america. all those things which earlier could stand between us psychologically - - " russian heritage, " our " emigre identity, " " tradition " and all similar factors - - have now disappeared. there is nothing that can shelter us from the reality before which god has placed us. to what extent does american life need us as a christian spiritual force, and to what degree do we need american reality? the second part of this question is so clear that no one is asking it : american life is our life. even those of us who have become american not by
subdomain_quantum_field_theory
0.531948
512
HuggingFaceFW/fineweb-edu
<urn:uuid:1067d8ce-4c77-4d2e-9ef2-5b4722150ed8>
2
0.5
2025-12-19T11:31:47.536794
excessive " freedom, police control of the population. the profound causes of the crisis are on the spiritual level ; therefore its solution requires a colossal effort of the spiritual strength of the nation. doubtless at the root of the crisis there is a wrong understanding of freedom. the error extends in two directions. those who wish to limit freedom forget that the limitation of freedom has no end - - how can we know when to stop, how can we make certain that the limitation of freedoms will not lead to a police state and concentration camps for dissenters. those who lean in the other direction forget ( or do not want to remember ) that freedom without responsibility is not freedom but arbitrariness, anarchy, nihilism. those who struggle against the establishment do not think about the fact that " anti - system " can become a much more frightful system than the " establishment. " therefore the country is torn by the radicalism of two beliefs, both of which are intent on tearing the country apart. in addition to all this, and notwithstanding all the horrors that are so zealously described in our press, we must remember, first of all, the great majority represented by those whom the president has called the " silent majority. " these words are often repeated ironically, but they are a very good description of the mass of american people to which most of us belong and which, like a working horse, pulls the country out of moral, economic and political crises. secondly, among the young ( and sometimes not so young ) representatives of the " new culture " who give us such a fright and whom we are ready to bury in the mass grave of historical forgetfulness it is good to look for those who depart from " normal " american life for a number of reasons deserving our full attention. due to a lack of spiritual guidance as well as because of inbred american conformity, they often take the wrong road and perish ignominiously and uselessly. it is good to scrutinize the fundamental themes, the motivations, which drive these young people out of well - to - do homes, a successful life, practical materialism. close analysis inevitably leads us to the fact that youth is repulsed by complacent satisfaction with american well - being, by the false sense of security, by the exaggerated individualism that pushes people into loneliness and isolation, by the rationalization of even religious experience, by social injustice. these are negative themes. the positive ones are a desire for spiritual experience, for liberation from captivity to material values
subdomain_quantum_mechanics
0.544224
512
HuggingFaceFW/fineweb-edu
<urn:uuid:1067d8ce-4c77-4d2e-9ef2-5b4722150ed8>
4
0.5
2025-12-19T11:31:47.538950
security, by the exaggerated individualism that pushes people into loneliness and isolation, by the rationalization of even religious experience, by social injustice. these are negative themes. the positive ones are a desire for spiritual experience, for liberation from captivity to material values, a search for spiritual reality and mystical experience, for a sacramental justification of life in all its details - - love, sex, friendship, race, and so on. there is a search for the realities of life and death, which were so long concealed by our " funeral home culture " and were so cruelly revealed by the conflict in vietnam. youth is only partially responsible for the uncontrolled spiritualistic experimentation which has brought and is bringing so many of them to a tragic end ; a great - - much greater - - responsibility lies on those who did not support, reveal, teach, be an example in time. we also bear responsibility, particularly because we - - our church - - have long possessed first - class answers to all these questions. what can we, as a church, as the heirs of a spiritual experience of many centuries, say to contemporary young america? even on the basis of our historical experience, on a purely negative plane, we can witness to the ease with which freedom can be lost. the trouble is that freedom, like good health, the comforts of life, or even hot water every day, is understood best when it is no longer available. we know very well what not - freedom is. what it is to be endangered when you think, to be in even greater danger when you speak, and to invite catastrophe when you set thoughts on paper. we know what it is to be unfree to believe, to pray, to go to church when you choose. what it is to be unfree to leave your country when you wish. what it is to be unfree to organize your life as you see fit. it is our holy duty to share our negative experience with all politically naive people, with all those who are easily caught in the net of the demonic propaganda of the other side, where man means nothing. where " the death of one man is a tragedy - - the death of ten thousand is a statistic, " in the words of one ideologist on the " other side. " this is not a political statement, for it concerns not only " political freedoms " but, first of all, the freedom of the spirit. this is witnessing to the real presence of the demonic in politics, in history, in sociology, of demonism
subdomain_quantum_field_theory
0.52123
512
HuggingFaceFW/fineweb-edu
<urn:uuid:1067d8ce-4c77-4d2e-9ef2-5b4722150ed8>
5
0.5
2025-12-19T11:31:47.540359
the term “ heart failure ” can be very alarming. while it does not mean the heart has “ failed ” or stopped working, it is a serious condition. congestive heart failure ( chf ) means the heart does not pump as well as it should to meet the body ’ s oxygen demands, often due to heart diseases such as cardiomyopathy or cardiovascular disease. chf can result from either a reduced ability of the heart muscle to contract or from a mechanical problem that limits the ability of the heart ’ s chambers to fill with blood. when weakened, the heart is unable to keep up with the demands placed upon it ; blood returns to the heart faster than it can be pumped out so that it gets backed up or congested — hence the name of the disorder. chf occurs most frequently in those over age 60 and is the leading cause of hospitalization and death in that age group. in over 50 percent of cases, sudden death occurs due to a cardiac arrhythmia, or irregular heartbeat. unfortunately, antiarrhythmic medications may not be effective in controlling arrhythmias caused by chf. patients with chf can enjoy better health if they treat the underlying cause, if possible. for many patients the outlook is uncertain and depends on the extent of the disease and the patient ’ s response to therapy. however, in other cases, restricted salt intake and medication are used to ease the strain on the heart and to relieve symptoms. while chf is a serious health risk, it is possible for patients to live with chf and manage many symptoms effectively with proper treatment if they adhere to prescribed regimens. noncompliance with a doctor ’ s recommendations regarding diet or medication increases the risk that the disease will worsen. when to call an ambulance call an ambulance immediately if you experience severe breathlessness or crushing chest pain with or without nausea, vomiting, profuse sweating, weakness or intense feelings of dread. such symptoms may indicate a heart attack. - make an appointment with a doctor if you regularly experience fatigue and shortness of breath after mild physical activity. - call your doctor if you experience any of the following during treatment for congestive heart failure : fever, rapid or irregular heartbeat, wheezing, severe shortness of breath or any worsening of the other symptoms of congestive heart failure. congestive heart failure is a progressive process and should not be confused with a heart attack, which involves sudden tissue death of the heart muscle. although heart failure may occur suddenly in
subdomain_quantum_optics
0.501077
512
HuggingFaceFW/fineweb-edu
<urn:uuid:47eccbdd-3596-4916-b652-e83e574e521b>
0
0.5
2025-12-19T11:31:47.556785
may be given a portable ecg device, known as a holter monitor, to measure the heart ’ s electrical activity over a 24 - hour period. - exercise stress tests, also known as treadmill tests, help determine irregular heart rhythms during exercise. during this test, the heart ’ s electrical activity is monitored through small metal sensors applied to your skin while you exercise on a stationary bicycle or treadmill. - your doctor may order an echocardiogram to evaluate heart function. during this test, sound waves bounced off the heart are recorded and translated into images. the pictures can reveal abnormal heart size, shape and movement. echocardiography also can be used to calculate the ejection fraction, or volume of blood pumped out to the body when the heart contracts. - coronary angiography, or x - ray of the heart ’ s blood vessels, may be performed to evaluate pressures in the heart chambers and the pumping function. in this procedure, a tiny catheter is inserted into an artery of a leg or arm and threaded up into the coronary arteries. a contrast material is then injected from the end of the catheter into the coronary arteries, which provides a clear image of the blood vessels on x - ray. for more information about terms used in this section, please visit our heart and circulatory system glossary. the johns hopkins cardiomyopathy and heart failure practice, as described in the previous section, evaluates and manages patients with heart failure due to any cause. core components of treatment : - clinical care of patients with heart failure and following cardiac transplantation. - basic science, hemodynamic, genetic and clinical research pertaining to cardiomyopathy, heart failure and cardiac transplantation. - education directed at both patients and professionals regarding cardiomyopathy, heart failure and cardiac transplantation. - all facets of clinical care of patients with cardiomyopathy, heart failure or cardiac transplantation. - left ventricular assist devices. - novel research programs for patients with cardiomyopathy or heart failure. - endomyocardial biopsy. possible courses of treatment : - lifestyle changes such as reducing salt intake ( salt contributes to fluid retention and swelling ), eating smaller, more frequent meals ( less effort is required to digest smaller portions ) and avoiding caffeine ( which can exacerbate heartbeat irregularities ) may be helpful. - wearing support stockings can help reduce swelling in the legs. - most often, some type of medication is prescribed for heart failure patients. - va
subdomain_quantum_metrology
0.530521
512
HuggingFaceFW/fineweb-edu
<urn:uuid:47eccbdd-3596-4916-b652-e83e574e521b>
4
0.5
2025-12-19T11:31:47.563990
london, dec mber 6 : a new has demonstrated for the first time that a simple breath test could be used for colorectal cancer screening. cancer tissue has different metabolism compared to normal healthy cells and produces some substances which can be detected in the breath of these patients. analysis of the volatile organic compounds ( vocs ) linked to cancer is a new frontier in cancer screening. led by donato f. altomare, md, of the department of emergency and organ transplantation at the university aldo moro of bari, researchers collected exhaled breath from 37 patients with colorectal cancer and 41 healthy controls which was processed offline to evaluate the voc profile. vocs of interest had been identified and selected, and voc patterns able to discriminate patients from controls set up. a probabilistic neural network ( pnn ) was used to identify the pattern of vocs that better discriminated between the two groups. results showed that patients with colorectal cancer have a different selective voc pattern compared with healthy controls, based on analysis of 15 of 58 specific compounds in exhaled breath samples. the pnn in this study was able to discriminate patients with colorectal cancer with an accuracy of over 75 percent, with the model correctly assigning 19 patients. “ the technique of breath sampling is very easy and non - invasive, although the method is still in the early phase of development, ” altomare notes. “ our study ’ s findings provide further support for the value of breath testing as a screening tool. ” the study has been published in bjs. ( ani )
subdomain_quantum_entanglement
0.507982
323
HuggingFaceFW/fineweb-edu
<urn:uuid:0f62443b-d83c-41e3-85bf-71bc8ac2b7a8>
0
0.5
2025-12-19T11:31:47.591903
recent medical advancements have made it seem possible that the fountain of youth is only a decade away from reality. but even if we could develop something that enables us to achieve immortality, should we? recently, morgan freeman asked a tantalizing question on sci fi ’ s popular show “ through the wormhole. ” it is a question that has baffled scientists, doctors, adventurers and philosophers since humans ’ earliest times. the question of " can we live forever " is beyond fascinating for many of us, and even if it were possible, is that a good thing and is it really " possible " according to the laws of physics? first though, one must consider the broader implications of such a scientific breakthrough that extends beyond the planet earth and even human beings. for example, if in the hypothetical sequence posed, eternal life actually became common, how does it escape most accepted theories of the universe, which explicably say the universe has a beginning and an end? furthermore, there seems to be two competeting theories on the universe and its beginning and demise. the almost collectively accepted theory of the “ big bang ” seems to satisfy a genesis for the universe, whereas its end is controversial. physicists differ on how the universe may end in what are called " the big rip " and " the big freeze " or " big crunch. " see, astronomers have discovered that other stars are moving away from our star, the sun, at a faster rate than light would seemingly allow. this presents a major problem for scientists, because it seemingly violates the laws of physics. but because the universe is filled with exotic things such as dark matter and dark energy, it is impossible to truly calculate why this phenomenon is happening. so let us assume that this dark energy is something that naturally occurred before the big bang, so therefore it does not violate any natural laws, and it explains the faster - than - light growth of the universe and it would give credence to " the big rip " theory. this means, all matter would rip apart, which includes " us, " regardless of how long you have lived. in the other scenario, the universe expands like a big fat balloon and then, presumably gravity, contracts the universe and bang, it crunches " us " all. so again, regardless of age, there seems to be no escape. but, some scientists have explained there are other dimensions that could, again in theory, connect us to other universes ’, which could hypothetically extend life. but until that is proven, it is a long
subdomain_quantum_gravity
0.55348
512
HuggingFaceFW/fineweb-edu
<urn:uuid:bb3597c3-465e-4ee7-9598-62105fc9ca71>
0
0.5
2025-12-19T11:31:47.638588
, there seems to be no escape. but, some scientists have explained there are other dimensions that could, again in theory, connect us to other universes ’, which could hypothetically extend life. but until that is proven, it is a long shot, and even if true, these other universes could be inhospitable to us. so why are we fascinated with living forever then, when if you look at the science, even if we prolong life, we will still " die " anyway? well, let us look at the recent fountain of youth advancements that may enable this philosophical paradox to even exist. currently, most data and scientists seem to conclude that the answer for longevity is in the dna. while some believe that singling out specific dna sequencing could help slow the aging process, others look to something called “ removing the garbage. ” essentially, this is based on the belief that proper cell division is hindered because too much “ garbage ” accumulates around the cells, causing them and us to advance more rapidly towards death. it seems that of all the data presented, a combination of gene therapy would be needed, because even if you slow the aging process or remove the dna sequence that makes death inevitable, we would just stay young longer and maybe not as active, or we would just live long but become old and handicapped. either of those two is not ideal, and only when combined is the fountain of youth humans desire accomplished. but again, the eventual death of the universe and the adverse societal impact it would have, makes the fountain of youth a scary proposition. if a sort of combined gene therapy were created that could keep us young and forever living, it would not only be groundbreaking, but dangerous. as we have witnessed with divisive debate over the recent health care bill that simply wanted to allow universal health care, a fountain of youth pill could create a massive war. who would be allowed to live forever? when we look at our current political climate, which even routine things such as raising the debt ceiling are impossible tasks, how could we ever develop a fair system based off of something so naturally intoxicating? well, i do not believe we could, so even if we could develop a form of therapy to allow eternal life, it is pointless for two specific reasons. for one, it still only prolongs the inevitable and it would probably cause the end of the world because something so good would allow people to believe it is ok to kill over, like we have done numerous times through out our history. so
subdomain_quantum_gravity
0.565837
512
HuggingFaceFW/fineweb-edu
<urn:uuid:bb3597c3-465e-4ee7-9598-62105fc9ca71>
1
0.5
2025-12-19T11:31:47.639527
depression ), alcoholism or some other form of substance abuse. by definition, in generalized anxiety disorder, the person has persistent worry or anxiety that lasts for at least six months. this worry or anxiety is excessive, troubling and hard to control, and it often interferes with a person ' s ability to function at home, at work or in social situations. to be diagnosed with generalized anxiety disorder, a person has to have at least three of the following symptoms : people with generalized anxiety disorder also may have a wide range of anxiety - related physical symptoms that may seem like symptoms of heart disease, respiratory illness, digestive diseases and other medical illnesses. you may consult a primary care doctor first if you suspect your physical symptoms are part of a medical illness. your doctor may do tests to check for medical problems. if the results are normal, your doctor may ask about your family history, your history of any mental distress, current anxieties, recent stresses, and daily use of prescription and nonprescription drugs. some drugs can cause anxiety symptoms. the doctor then may refer you to a psychiatrist for care. your psychiatrist will diagnose generalized anxiety disorder based on a full psychiatric evaluation that includes : the psychiatrist also may order diagnostic tests, if necessary, to check for a medical illness. these won ' t be needed if they already have been done by the doctor who referred you to the psychiatrist. symptoms of generalized anxiety disorder can last for many months, but the condition can last longer ( many years ) especially without treatment, with symptoms occurring over many years. since stress is a normal part of life, there is usually no way to prevent generalized anxiety disorder in someone who is vulnerable. however, once diagnosed, various treatments can effectively reduce symptoms. if you have generalized anxiety disorder, the most effective treatment is usually a combination of medications and psychotherapy. research shows that using both has a more lasting positive effect than either one alone. your doctor may also offer treatment for other conditions that may be making matters worse, such as a medical problem or depression. you may need to try more than one approach before you find the right one. many different kinds of medications can relieve anxiety. here are the most common categories prescribed : a number of psychotherapy techniques may be helpful. here are some examples : your therapist may combine any of the above approaches or may discuss others - - for example, meditation, hypnosis or exercise - - with you so that the approach fits your specific problems and needs. when to call a professional see your doctor if you are troubled
subdomain_quantum_optics
0.500247
512
HuggingFaceFW/fineweb-edu
<urn:uuid:3d75db56-3c93-4eee-b581-29f666374031>
1
0.5
2025-12-19T11:31:47.649715
taqwa with their lord gardens of bliss " ; salvation from the fire because of his words " then we will save the ones who had taqwa ". there are ten things which awaken taqwa : fear of punishment in the next life ; fear [ of punishment in ] this life ; hope of worldly reward ; hope of the reward of the next world ; fear of the reckoning ; shyness and bashfulness before the gaze of allah, and this is the station of fearful watchfulness ( muraqabah ) ; showing gratitude for his blessings by obeying him ; knowledge, because of his words, " they only fear allah, of his slaves, the ones who have knowledge " ; exalting and honouring his majesty, and it is the station of awe ; sincerity in love because of the words of the one who said : " you disobey god while you make apparent that you love him, this, by my life, in analogy is a marvel. if your love were sincere you would obey him, truly, the lover towards the one he loves is obedient. " and to allah be attributed the good of the one who said : " she said, and she had asked about the state of her lover, ' for allah ' s sake, describe him and do not omit nor exceed! ' i said, ' if he had feared death from thirst, and you had said, " stop! don ' t approach the water! " then he would not have approached. ' " the third section there are five degrees of taqwa : that the slave should protect himself from kufr ( covering over the truth ), and that is the station of islam ; that he should protect himself from acts of disobedience and forbidden things, and it is the station of turning or repentance ( tawbah ) ; that he should protects himself from doubtful matters, and that is the station of caution or carefulness ( wara ' ) ; that he should protect himself from even those things that are permitted, and that is the station of doing without ( zuhd ) ; that he should protect himself from the presence of other than allah in his heart, and it is the presence of witnessing ( mushahadah ). that ends what ibn juzayy al - kalbi wrote on taqwa. edited by administrator
subdomain_quantum_field_theory
0.514933
480
HuggingFaceFW/fineweb-edu
<urn:uuid:d4829824-535c-460e-94c2-b51fa4535a5c>
1
0.5
2025-12-19T11:31:47.668270
you have been there before. the best part of any professional development activity is the collaboration with other teachers. hearing the struggles and successes of others helps us to articulate our own ideas and spark new excitement in our own curriculum. we hope to strengthen the community of chemistry educators and provide a place for discussion and collaboration right here at this site. summer is one of my favorite times as a teacher! like most teachers i like to take a little time away from school, but, once i ' ve rested a bit, its my favorite time to do research as well. i encourage you to take time this summer to explore labs and activities that you think may work for your classroom, but just didn ' t have time to examine with your busy teaching schedule. call for symposia and workshops for the 23rd bcce at grand valley state university – greener on the grand : empowering chemical educators for a greener tomorrow, august 3 – 7, 2014 i ’ d like to report on one of the end - of - year research projects that two of my general chemistry students completed during class this year. if you ’ d like read more about these end - of year research projects in general, click here. wow! talk about an interesting idea! a very neat experiment, called “ hydroglyphics ”, has been published by philseok kim, jack alvarenga, joanna aizenberg and raymond sleeper in the journal of chemical education. i came across a simple, yet interesting experiment that was first described by elizabeth sumner walter in 2001. she merely had students pour water into a dish containing some gobstoppers candies. i showed this experiment to some of my college chemistry students while they were workin inquiry is a fluid concept. there are some truly fabulous activities on grand valley state university ' s target inquiry ( ti ) website ( www. gvsu. edu / targetinquiry ). yes, i am biased as i was part of the first ti cohort, but there are several labs now that were written later and they, too, are terrific.
subdomain_quantum_optics
0.579274
421
HuggingFaceFW/fineweb-edu
<urn:uuid:1a10dc22-8dfe-43ea-996d-c0ded06725f0>
0
0.5
2025-12-19T11:31:47.683165
. 5 million. the construction of a modern highway system has constricted the ability of the landscape to drain and recycle water. technological societies like israel and the united states have manipulated environments with determination but little understanding of the long - term impacts. lining riverbeds with concrete, as with the ayalon and throughout los angeles, gives the illusion of mastering nature. in average years, the consequences are mostly invisible ; the absence of thriving ecosystems is apparent, but not the failure of the aquifers to be recharged. then, the inevitable flooding causes surprise. when it comes to environmental issues, liberal democratic societies have been partially self - correcting. they periodically take steps, like dismantling dams in the pacific northwest and reflooding parts of the huleh basin, to ameliorate and undo negative conditions. arguably, however, israel ’ s environmental progress is slipping, a victim of both politics and economics. still, if israel and the united states have been environmentally overconfident and insensitive, other countries have been catastrophically cruel. the communist legacy of environmental destruction in russia, eastern europe, and china is nearly beyond description. soviet engineers reversed the flow of entire rivers and nearly emptied the entire aral sea, leaving a chemical - laden dustbowl. communist politics demanded that technology master and subjugate nature to demonstrate the wisdom and superiority of the party. zionists were never so absolute ; they were and, one hopes, are capable of learning to work with nature. the flooding in israel and elsewhere shows that nature will not be mastered. the response to the hundred - year storm or, worse, the earthquake and tsunami, can be planned up to a point — after which matters are in god ’ s hands. humans push the limits, ignoring, minimizing, or rationalizing risks as only they can. but flooded highways are gentle reminders that nature has its own reclamation project, which will triumph over ours. comments are closed for this article.
subdomain_quantum_mechanics
0.511834
406
HuggingFaceFW/fineweb-edu
<urn:uuid:91946c23-450f-426b-a3f9-30237fd4ea63>
3
0.5
2025-12-19T11:31:47.698948
any wages. the jews were also reported, apparently, to be transferring businesses to german figureheads in order to alleviate the results of this persecution ; accordingly the committee declared that any property so transferred was to be considered as jewish for the purpose of the boycott ( 2154 - ps ). it is therefore clear that early in 1933 streicher was taking a leading part, as appointed by the government, in the persecution against the jews. further extracts from streicher ' s newspapers illustrate the form which his propaganda developed as the years went on. an article in the new year ' s issue of a new paper founded and edited by streicher - - a semimedical paper called " the people ' s health through blood and soil " - - is an example of the remarkable lengths to which he went in propagandizing against the " it is established for all eternity ; alien albumen is the sperm of a man of alien race. the male sperm in cohabitation is partially or completely absorbed by the female, and thus enters her bloodstream. one single cohabitation of a jew with an aryan woman is sufficient to poison her blood forever. together with the alien albumen she has absorbed the alien soul. never again will she be able to bear purely aryan children, even when married to an aryan. they will all be bastards, with a dual soul and a body of a mixed breed. their children will also be crossbreeds ; that means, ugly people of unsteady character and with a tendency to illnesses. now we know why the jew uses every artifice of seduction in order to ravish german girls at as early an age as possible ; why the jewish doctor rapes his patients while they were under anaesthetic. he wants the german girl and the german woman to absorb the alien sperm of the jew. she is never again to bear german children. but the blood products of all animals right down to the bacteria like the serum, lymph, extracts from internal organs etc., are all alien albumen. they have a poisonous effect if directly introduced into the blood stream either by vaccination or by injection. by these products of sick animals the blood is ravished, the aryan is impregnated with an alien species. the author and abettor of such action is the jew. he has been aware of the secrets of the race question for centuries, and therefore plans systematically the annihilation of the nations which are superior to him. science and authorities are his instruments for the
subdomain_quantum_field_theory
0.516198
512
HuggingFaceFW/fineweb-edu
<urn:uuid:966660c5-178b-400d-801e-156b83d45946>
3
0.5
2025-12-19T11:31:47.735004
what may be the meaning of all this? ' she asked herself and her heart was pounding. and again she thought of the warning of her leader in the league of german girls. " inge was already waiting for an hour. again she takes the journals in an endeavor to read. then the door opens. inge looks up. the jew appears. she screams. in terror she drops the paper. horrified she jumps up. her eyes stare into the face of the jewish doctor. and this face is the face of the devil. in the middle of this devil ' s face is a huge crooked nose. behind the spectacles two criminal eyes. and the thick lips are grinning, a grinning that expresses : ' now i got you at last, you little " and then the jew approaches her. his fleshy fingers stretch out after her. but now inge has composed herself. before the jew can grab hold of her, she smacks the fat face of the jew doctor with her hand. one jump to the door. breathlessly inge runs down the stairs. breathlessly she escapes the jew house. " ( 1778 - ps ). another photograph shows youthful admirers standing around looking at streicher ' s picture, with the following " ' without a solution of the jewish question there will be no salvation for mankind. ' that is what he shouted to us. all of us could understand him. and when, at the end, he shouted ' sieg heil ' for the fuehrer, we all acclaimed him with tremendous enthusiasm. for two hours streicher spoke at that occasion. to us it appeared to have been but a few minutes. " the effect of all this propaganda is evident from the columns of " der stuermer " itself. in april 1936 there was published a letter, which is typical of many others that appear in other copies from children of all ages. the third paragraph of this letter, signed by the boys and girls of the national socialist youth hostel at grossmuellen, reads : " * * * today we saw a play on how the devil persuades - the jew to shoot a conscientious national socialist. in the course of the play the jew did it too. we all heard the shot. we would have all liked to jump up and arrest the jew. but then the policeman came and after a short struggle took the jew along. you can imagine, dear stuermer, that we heartily cheered the policeman. in the whole play not one name was mentioned,
subdomain_quantum_field_theory
0.520395
512
HuggingFaceFW/fineweb-edu
<urn:uuid:966660c5-178b-400d-801e-156b83d45946>
19
0.5
2025-12-19T11:31:47.752947
simulink basics tutorial simulink is a graphical extension to matlab for modeling and simulation of systems. in simulink, systems are drawn on screen as block diagrams. many elements of block diagrams are available, such as transfer functions, summing junctions, etc., as well as virtual input and output devices such as function generators and oscilloscopes. simulink is integrated with matlab and data can be easily transfered between the programs. in these tutorials, we will apply simulink to the examples from the matlab tutorials to model the systems, build controllers, and simulate the systems. simulink is supported on unix, macintosh, and windows environments ; and is included in the student version of matlab for personal computers. for more information on simulink, contact the mathworks. the idea behind these tutorials is that you can view them in one window while running simulink in another window. system model files can be downloaded from the tutorials and opened in simulink. you will modify and extend these system while learning to use simulink for system modeling, control, and simulation. do not confuse the windows, icons, and menus in the tutorials for your actual simulink windows. most images in these tutorials are not live - they simply display what you should see in your own simulink windows. all simulink operations should be done in your simulink windows. simulink is started from the matlab command prompt by entering the following command : alternatively, you can hit the new simulink model button at the top of the matlab command window as shown below : when it starts, simulink brings up two windows. the first is the main simulink window, which appears as : the second window is a blank, untitled, model window. this is the window into which a new model can be drawn. in simulink, a model is a collection of blocks which, in general, represents a system. in addition, to drawing a model into a blank model window, previously saved model files can be loaded either from the file menu or from the matlab command prompt. as an example, download the following model file by clicking on the following link and saving the file in the directory you are running matlab from. open this file in simulink by entering the following command in the matlab command window. ( alternatively, you can load this file using the open option in the file menu in simulink,
subdomain_quantum_field_theory
0.523407
512
HuggingFaceFW/fineweb-edu
<urn:uuid:9d7bfa1c-7172-4686-ad6c-26f6646fb89c>
0
0.5
2025-12-19T11:31:47.803984
in the directory you are running matlab from. open this file in simulink by entering the following command in the matlab command window. ( alternatively, you can load this file using the open option in the file menu in simulink, or by hitting ctrl + o in simulink. ) the following model window should appear. a new model can be created by selecting new from the file menu in any simulink window ( or by hitting ctrl + n ). there are two major classes of items in simulink : blocks and lines. blocks are used to generate, modify, combine, output, and display signals. lines are used to transfer signals from one block to another. there are several general classes of blocks : blocks have zero to several input terminals and zero to several output terminals. unused input terminals are indicated by a small open triangle. unused output terminals are indicated by a small triangular point. the block shown below has an unused input terminal on the left and an unused output terminal on the right. - sources : used to generate various signals - sinks : used to output or display signals - discrete : linear, discrete - time system elements ( transfer functions, state - space models, etc. ) - linear : linear, continuous - time system elements and connections ( summing junctions, gains, etc. ) - nonlinear : nonlinear operators ( arbitrary functions, saturation, delay, etc. ) - connections : multiplex, demultiplex, system macros, etc. lines transmit signals in the direction indicated by the arrow. lines must always transmit signals from the output terminal of one block to the input terminal of another block. on exception to this is a line can tap off of another line, splitting the signal to each of two destination blocks, as shown below ( click the figure to download the model file called split. mdl ). lines can never inject a signal into another line ; lines must be combined through the use of a block such as a summing junction. a signal can be either a scalar signal or a vector signal. for single - input, single - output systems, scalar signals are generally used. for multi - input, multi - output systems, vector signals are often used, consisting of two or more scalar signals. the lines used to transmit scalar and vector signals are identical. the type of signal carried by a line is determined by the blocks on either end of the the simple model ( from the model file section ) consists of three blocks : step, transfer fc
subdomain_quantum_optics
0.520695
512
HuggingFaceFW/fineweb-edu
<urn:uuid:9d7bfa1c-7172-4686-ad6c-26f6646fb89c>
1
0.5
2025-12-19T11:31:47.804926
the lines used to transmit scalar and vector signals are identical. the type of signal carried by a line is determined by the blocks on either end of the the simple model ( from the model file section ) consists of three blocks : step, transfer fcn, and scope. the step is a source block from which a step input signal originates. this signal is transfered through the line in the direction indicated by the arrow to the transfer function linear block. the transfer function modifies its input signal and outputs a new signal on a line to the scope. the scope is a sink block used to display a signal much like an oscilloscope. there are many more types of blocks available in simulink, some of which will be discussed later. right now, we will examine just the three we have used in the simple model. a block can be modified by double - clicking on it. for example, if you double - click on the " transfer fcn " block in the simple model, you will see the following dialog box. this dialog box contains fields for the numerator and the denominator of the block ' s transfer function. by entering a vector containing the coefficients of the desired numerator or denominator polynomial, the desired transfer function can be entered. for example, to change the denominator to s ^ 2 + 2s + 1, enter the following into the denominator [ 1 2 1 ] and hit the close button, the model window will change to the which reflects the change in the denominator of the transfer function. the " step " block can also be double - clicked, bringing up the following the default parameters in this dialog box generate a step function occurring at time = 1 sec, from an initial level of zero to a level of 1. ( in other words, a unit step at t = 1 ). each of these parameters can be changed. close this dialog before continuing. the most complicated of these three blocks is the " scope " block. double clicking on this brings up a blank oscilloscope screen. when a simulation is performed, the signal which feeds into the scope will be displayed in this window. detailed operation of the scope will not be covered in this tutorial. the only function we will use is the autoscale button, which appears as a pair of binoculars in the upper portion of the window. to run a simulation, we will work with the following model file : download and open this file in simulink following the previous
subdomain_quantum_field_theory
0.545189
512
HuggingFaceFW/fineweb-edu
<urn:uuid:9d7bfa1c-7172-4686-ad6c-26f6646fb89c>
2
0.5
2025-12-19T11:31:47.805876
field. close the dialog box. - double - click your gain block. change the gain to 2. 5 and close the dialog box. - double - click the leftmost transfer function block. change the numerator to [ 1 2 ] and the denominator to [ 1 0 ]. close the dialog - double - click the rightmost transfer function block. leave the numerator, but change the denominator to [ 1 2 4 ]. close the dialog box. your model should appear as : - change the name of the first transfer function block by clicking on the words " transfer fcn ". a box and an editing cursor will appear on the block ' s name as shown below. use the keyboard ( the mouse is also useful ) to delete the existing name and type in the new name, " pi controller ". click anywhere outside the name box to finish editing. - similarly, change the name of the second transfer function block from " transfer fcn1 " to " plant ". now, all the blocks are entered properly. your model should appear as : connecting blocks with lines now that the blocks are properly laid out, you will now connect them together. follow these steps. - drag the mouse from the output terminal of the step block to the upper ( positive ) input of the sum block. let go of the mouse button only when the mouse is right on the input terminal. do not worry about the path you follow while dragging, the line will route itself. you should see the following. the resulting line should have a filled arrowhead. if the arrowhead is open, as shown below, it means it is not connected to anything. you can continue the partial line you just drew by treating the open arrowhead as an output terminal and drawing just as before. alternatively, if you want to redraw the line, or if the line connected to the wrong terminal, you should delete the line and redraw it. to delete a line ( or any other object ), simply click on it to select it, and hit the delete key. - draw a line connecting the sum block output to the gain input. also draw a line from the gain to the pi controller, a line from the pi controller to the plant, and a line from the plant to the scope. you should now have the following. - the line remaining to be drawn is the feedback signal connecting the output of the plant to the negative input of the sum block. this line is
subdomain_quantum_computing
0.505638
512
HuggingFaceFW/fineweb-edu
<urn:uuid:9d7bfa1c-7172-4686-ad6c-26f6646fb89c>
5
0.5
2025-12-19T11:31:47.810102
icmake part 2 icmake source files are written according to a well - defined syntax, closely resembling the syntax of the c programming language. this is no coincidence. since the c programming language is so central in the unix operating system, we assumed that many people using the unix operating system are familiar with this language. providing a new tool which is founded on this familiar programming language relieves everybody of the burden of learning yet another dialect, thus simplifying the use of the new system and allowing its new users to concentrate on its possibilities rather than on its grammatical form. considering icmake ' s specific function, we have incorporated a lot of familiar constructs from c into icmake : most c operators were implemented in icmake, as were some of the standard c runtime functions. in this respect icmake ' s grammar is a subset of the c programming language. however, we have taken the liberty of defining two datatypes not normally found in c. there is a datatype ` string ' ( yes, its variables contain strings ) and a datatype ` list ', containing lists of strings. we believe these extensions to the c programming language are so minor that just this paragraph would probably suffice for their definition. however, they will be described in somewhat greater detail in the following sections. also, some elements of c + + are found in icmake ' s grammar : some icmake - functions have been overloaded ; they do different but comparable tasks depending on the types of arguments they are called with. again, we believe this to be a minor departure from the ` pure c ' grammar, and think this practice is very much in line with c + + ' s philosophy. one of the tasks of the preprocessor is to strip the makefile of comment. icmake recognizes two types of comment : standard c - like comment and end - of - line comment, which is also recognized by the gnu c compiler and by microsoft ' s c compiler. standard comment must be preceded by / * and must be closed by * /. this type of comment may stretch over more than one line. end - of - line comment is preceded by / / and ends when a new line starts. lines which start with #! are skipped by the preprocessor. this feature is included to allow the use of executable makefiles. apart from the #! directive, icmake recognizes two more preprocessor directives : # include and # define.
subdomain_quantum_cryptography
0.543271
512
HuggingFaceFW/fineweb-edu
<urn:uuid:031f7ec1-ba10-4fc6-af49-782fc65e4df5>
0
0.5
2025-12-19T11:31:47.819437
skipped by the preprocessor. this feature is included to allow the use of executable makefiles. apart from the #! directive, icmake recognizes two more preprocessor directives : # include and # define. all preprocessor directives start with a ` # ' - character which must be located at the first column of a line in the makefile. the # include directive must obey the following syntax : when the preprocessor icm - pp encounters this directive, ` filename ' is read. the filename may include a path specification. when the filename is surrounded by double quotes, icm - pp attempts to access this file exactly as stated. when the filename is enclosed by < and >, icm - pp attempts to access this file relative to the directory pointed to by the environment variable im. using the # include directive, large icmake scripts may be modularized, or a set of standard icmake source scripts may be used to realize a particular icmake script. the # define directive is a means of incorporating constants in a makefile. the directive follows the following syntax : # define identifier redefinition - of - identifier the defined name ( the name of the defined constant ) must be an identifier according to the c programming language : the first character must be an underscore or a character of the alphabet ; subsequent characters may be underscores or alphanumerics. the redefinition part of the # define directive consists of spaces, numbers, or whatever is appropriate. the preprocessor simply replaces all occurrences of the defined constant following the # define directive by the redefinition part. note that redefinition ' s are not further expanded ; an already defined name which occurs in the redefinition part is not processed but is left as - is. also note that icm - pp considers the redefinition part to be all characters found on a line beyond the defined constant. this would also include comment, if found on the line. consequently, it is normally not a good idea to use comment - to - end - of - line on lines containing # define directives. | non - linux foss : libnotify, os x style | | jun 18, 2013 | | containers — not virtual machines — are the future cloud | | jun 17, 2013 | | lock - free multi - producer multi - consumer queue on ring buffer
subdomain_quantum_field_theory
0.526012
512
HuggingFaceFW/fineweb-edu
<urn:uuid:031f7ec1-ba10-4fc6-af49-782fc65e4df5>
1
0.5
2025-12-19T11:31:47.820347
foss : libnotify, os x style | | jun 18, 2013 | | containers — not virtual machines — are the future cloud | | jun 17, 2013 | | lock - free multi - producer multi - consumer queue on ring buffer | | jun 12, 2013 | | weechat, irssi ' s little brother | | jun 11, 2013 | | one tail just isn ' t enough | | jun 07, 2013 | | introduction to mapreduce with hadoop on linux | | jun 05, 2013 | - containers — not virtual machines — are the future cloud - non - linux foss : libnotify, os x style - linux systems administrator - validate an e - mail address with php, the right way - lock - free multi - producer multi - consumer queue on ring buffer - senior perl developer - technical support rep - ux designer - rss feeds - introduction to mapreduce with hadoop on linux free webinar : hadoop how to build an optimal hadoop cluster to store and maintain unlimited amounts of data using microservers realizing the promise of apache® hadoop® requires the effective deployment of compute, memory, storage and networking to achieve optimal results. with its flexibility and multitude of options, it is easy to over or under provision the server infrastructure, resulting in poor performance and high tco. join us for an in depth, technical discussion with industry experts from leading hadoop and server companies who will provide insights into the key considerations for designing and deploying an optimal hadoop cluster. some of key questions to be discussed are : - what is the “ typical ” hadoop cluster and what should be installed on the different machine types? - why should you consider the typical workload patterns when making your hardware decisions? - are all microservers created equal for hadoop deployments? - how do i plan for expansion if i require more compute, memory, storage or networking?
subdomain_quantum_cryptography
0.514484
393
HuggingFaceFW/fineweb-edu
<urn:uuid:031f7ec1-ba10-4fc6-af49-782fc65e4df5>
2
0.5
2025-12-19T11:31:47.821245
homocysteine, total, plasma as an aid for screening patients suspected of having an inherited disorder of methionine metabolism including : - cystathionine beta - synthase deficiency ( homocystinuria ) - methylenetetrahydrofolate reductase deficiency ( mthfr ) and its thermolabile variants : - methionine synthase deficiency - cobalamin ( cbl ) metabolism : - combined methyl - cbl and adenosyl - cbl deficiencies : cbl c2, cbl d2, and cbl f3 deficiencies - methyl - cbl specific deficiencies : cbl d - var1, cbl e, and cbl g deficiencies - transcobalamin ii deficiency : - adenosylhomocysteinase ( ahcy ) deficiency - glycine n - methyltransferase ( gnmt ) deficiency - methionine adenosyltransferase ( mat ) i / iii deficiency clinical information discusses physiology, pathophysiology, and general clinical aspects, as they relate to a laboratory test to be used in conjunction with plasma amino acids and urine organic acids to aid in the biochemical screening for primary and secondary disorders of methionine metabolism. homocysteine is an intermediary in the sulfur - amino acid metabolism pathways, linking the methionine cycle to the folate cycle. inborn errors of metabolism that lead to homocysteinemia / - uria include cystathionine beta - synthase deficiency ( homocystinuria ) and various defects of methionine re - methylation. genetic defects in vitamin cofactors ( vitamin b6, b12, and folate ) and nutritional deficiency of b12 and folate also lead to abnormal homocysteine accumulation. homocysteine concentration is an indicator of acquired folate or cobalamin deficiency, and is a contributing factor in the pathogenesis of neural tube defects. homocysteine also was thought to be an independent predictor of cardiovascular disease ( atherosclerosis, heart disease, thromboembolism ), as early observational studies prior to 2000 linked homocysteine to cardiovascular risk and morbidity and mortality. however, following fda - mandated folic acid supplementation in 1998, homocysteine concentrations decreased by approximately 10 % without a similar change in cardiovascular or ischemic events. currently, the use of homocysteine
subdomain_quantum_metrology
0.504611
512
HuggingFaceFW/fineweb-edu
<urn:uuid:c4f96c52-3887-4a28-bbfc-d2de7f170e59>
0
0.5
2025-12-19T11:31:47.869855
a cortisol level is a blood test that measures the amount of cortisol, a steroid hormone produced by the adrenal gland. how the test is performed a blood sample is needed. for information on how this is done, see : venipuncture how to prepare for the test usually, the health care provider will ask that the test be done in the morning. this is important, because cortisol levels vary throughout the day. the health care provider may ask you to stop taking drugs that can affect the test. drugs that can increase cortisol measurements include : human - made ( synthetic ) glucocorticoids, such as prednisone and prednisolone drugs that can decrease cortisol measurements include : how the test will feel when the needle is inserted to draw blood, some people feel moderate pain, while others feel only a prick or stinging sensation. afterward, there may be some throbbing. why the test is performed the test is done to check for increased or decreased cortisol production. cortisol is a steroid hormone released from the adrenal gland in response to acth, a hormone from the pituitary gland in the brain. cortisol affects many different body systems. it plays a role in : metabolism of fats, carbohydrates, and protein different diseases, such as cushing ' s disease and addison ' s disease, can lead to either too much or too little production of cortisol. cortisol levels are often measured to help diagnose these conditions and to evaluate how well the pituitary and adrenal glands are working. normal values for a blood sample taken at 8 in the morning are 6 - 23 micrograms per deciliter ( mcg / dl ). the examples above are common measurements for results for these tests. normal value ranges may vary slightly among different laboratories. some labs use different measurements or may test different specimens. talk to your doctor about the meaning of your specific test results. what abnormal results mean higher than normal levels may indicate : the pituitary gland near the brain makes too much of the hormone acth ( called cushing ' s disease ) because of excess growth of the pituitary gland, or a tumor in the pituitary gland or elsewhere in the body ( such as the pancreas, lung, and thyroid ) veins and arteries vary in size from one patient to another and from one side of the body to the other. obtaining a blood sample from
subdomain_quantum_optics
0.507766
512
HuggingFaceFW/fineweb-edu
<urn:uuid:2b2e4d60-6602-4bcc-8051-088101c1901a>
0
0.5
2025-12-19T11:31:47.896868