Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Hidden text

Moving through the revelations of the Bible, the Koran and other religious texts Gardiner also delves into the "hidden" knowledge of the alchemists and the infamous Knights Templar to make public the secret once and for all"... [Pg.502]

A bar code is a computer or machine-readable representation of information. It is usually made of dark ink on a light background to create high and low reflectance which is converted to Is and Os, when read by the computer program. A similar result may be achieved by patterns of dots, concentric circles, or text codes hidden within images. A bar code containing stored data in the widths and spacings of printed parallel lines or other patterns as... [Pg.145]

My suggestion is to open the pdf datasheet of any prospective switcher IC and carry out a text search (Ctrl + F) for the world foldback. If you find it, question the vendor about its full impact before you select the part for your application. Foldback is, in general, a good idea in terms of protecting the converter under abnormal conditions, but it should be used very judiciously so as not to impact normal behavior. For example, the Simple Switcher family has a hidden second-level current limit protection at which frequency foldback (or skipped pulses) occurs. But that trip level can only be encountered under very severe conditions—namely, a sudden overload with a completely incorrectly sized inductor that hard-saturates in the process. At other times it is not encountered and doesn t therefore interfere. It is considered transparent to all but the most novice engineers. And that is what I consider the right type of foldback. [Pg.191]

HHP technique, 14 106-107 HIAC particle counter, IS 150 Hibernia Scholven three-step MIBK process, 16 338 Hibiscus cannabinus, 11 293 Hibiscus sabdariffa, 11 293 Hi-Capacity thickener, 22 66 Hicks and Turner experimental design text versus other texts, S 395t Hidden failure, 15 477 Hide, in paints, 18 57-58, 59 Hide paint, 18 62 Hiding power... [Pg.433]

Unlike other sections in this book, the questions that you answer in this section are based on concrete information, rather than hidden or implied material within the text. So the most important thing is to pay attention to every detail. Read every set of directions as many times as necessary. Also, read the title and footnotes carefully. [Pg.139]

The default is strikethrough (a line going through the words(s) you remove). If you select Hidden, the deleted text can be shown or hidden with the Show/Hide button on the Standard toolbar. To prevent the deleted text from appearing on the screen, select the" or symbol. [Pg.152]

It can be difficult if not impossible to find the domain structure of a protein of interest from the primary literature. The sequence may contain many common domains, but these are usually not apparent from searches of literature. Articles defining new domains may include the protein, but only in an alignment figure, which are not searchable. Perhaps, with the advent of online access to articles, the full text including figures may become searchable. Fortunately there have been several attempts to make this hidden information available in away that can be easily searched. These resources, called domain family databases, are exemplified by Prosite, Pfam, Prints, and SMART. These databases gather information from the literature about common domains and make it searchable in a variety of ways. They usually allow a researcher to look at the domain organization of proteins in the sequence database that have been precalculated and also provide a way to search new sequences... [Pg.143]

All CNSforum figures are reprinted with permission from www.cnsforum.com. Original colour images, with and without text, can be found on CNSforum. Reuse of the images is permitted, as long as the copyright notice on the images is not hidden or removed. [Pg.218]

One way to impart structure to otherwise unstructured documents is to utilize a suitable markup language. The function of markup languages is to combine the text of a document with further information about the text (markup languages typically add metadata - data about data) and while metadata is normally hidden from the view of a human reader, it is available to processing software. XML allows an author to add arbitrary metadata to documents through the use of tags, which are user-defined and annotate data sources. [Pg.121]

Although the results of my attempts to translate the whole text remain otherwise tenaciously devoid of any apparent sense, the format overall, now revealing his previously hidden authorship, appears to be derived from a traditional esoteric scheme unquestionably familiar to Arensberg, namely magic squares. [Pg.173]

Branch currents can be hidden using a procedure similar to what we used to hide node voltages. Click the LEFT mouse button on the text 7.954/114 at the bottom of the screen. It will become highlighted in pink ... [Pg.166]

Fig. 19.1. Learning acquisition in the spatial reference memory version of a water maze test of mixed background C3B6 mice in two different animal colonies. Mice in the colony A were kept in a quiet room with appropriate for behavioral experiments husbandry practices, while the colony B had increased noise level and sub-optimal for behavioral studies conditions. The mice trained in the colony A showed a significant improvement in finding a hidden platform location during training (their search path was on average about 5 m shorter at the end of training as compared to at the beginning of training). On the other hand, the mice in colony B showed no improvement (the rate of improvement between day 1 and day 5 was about 1 m). See text for further details. Fig. 19.1. Learning acquisition in the spatial reference memory version of a water maze test of mixed background C3B6 mice in two different animal colonies. Mice in the colony A were kept in a quiet room with appropriate for behavioral experiments husbandry practices, while the colony B had increased noise level and sub-optimal for behavioral studies conditions. The mice trained in the colony A showed a significant improvement in finding a hidden platform location during training (their search path was on average about 5 m shorter at the end of training as compared to at the beginning of training). On the other hand, the mice in colony B showed no improvement (the rate of improvement between day 1 and day 5 was about 1 m). See text for further details.
The Oxford scholar, like his great predecessor of the eleventh century, Marpa ("The Translator"), who rendered Indian Buddhist texts into Tibetan, thereby preserving them from extinction, saw the vital importance of these doctrines and made them accessible to many. The "secret" is no longer hidden "the art of dying is quite as important as the art of living."... [Pg.7]

We desire our students to read this entire chapter, of which our text above is the first and second verses. It recounts the great wealth of Solomen, and incidentally reveals to the student of wisdom the source of his gold. We may as well understand this matter first as last, so we propose to tear aside all the veils that have so long hidden this mystery from the eyes of the vulgar, and make plain to you the fact that this whole account of Solomon is purely fabulous and allegorical. [Pg.45]

When a document is parsed (read) by a software application, the contained data is transformed into structures that can be further processed by computer. This resembles the process of human reading, where the eyes see long rows of characters while the brain gives meaning to these rows. People are very good in discovering structures hidden inside texts, but computers need much more help. [Pg.100]

Figure 36. Defect concentration and conductance effects for three different thicknesses Li L2 Lj. The mesoscale effect on defect concentration (l.h.s.) discussed in the text, when L < 4J, is also mirrored in the dependence of the conductance on thickness (r.h.s.). If the boundary layers overlap , the interfacial effect previously hidden in the intercept is now resolved. It is presupposed that surface concentration and Debye length do not depend on L. (Both can be violated, c , at sufficiently small L because of interaction effects and exhaustibility of bulk concentrations.)36 94 (Reprinted from J. Maier, Defect chemistry and ion transport in nanostructured materials. Part II. Aspects of nanoionics. Solid State Ionics, 157, 327-334. Copyright 2003 with permission from Elsevier.)... Figure 36. Defect concentration and conductance effects for three different thicknesses Li L2 Lj. The mesoscale effect on defect concentration (l.h.s.) discussed in the text, when L < 4J, is also mirrored in the dependence of the conductance on thickness (r.h.s.). If the boundary layers overlap , the interfacial effect previously hidden in the intercept is now resolved. It is presupposed that surface concentration and Debye length do not depend on L. (Both can be violated, c , at sufficiently small L because of interaction effects and exhaustibility of bulk concentrations.)36 94 (Reprinted from J. Maier, Defect chemistry and ion transport in nanostructured materials. Part II. Aspects of nanoionics. Solid State Ionics, 157, 327-334. Copyright 2003 with permission from Elsevier.)...
In Chapter 2 (Section 2.9) we see how the cluster bonding requirements for the icosahedron, plus two-center and three-center inter-cluster bonds perfectly uses the three available valence electrons and four available valence orbitals in a covalently bonded cluster network. Once one has these advanced bonding models in hand, then the explanation of the B network structure is no more difficult than that of the C diamond structure. One purpose of this text is to provide these advanced models, but for now the solution to the problem remains hidden. Hey, a little suspense always helps the story line. At this empirical stage of the presentation you have learned that the nature of bonding (distribution of electrons) is expressed in geometry. The tricky bit is to interpret the empirical nuclear position in terms of a useful (simplest one that answers the question asked) model for the distribution of valence electrons. [Pg.336]

Many people find reading literature a difficult task because in literature (fiction, drama, and poetry), the main idea is almost never expressed in a clear topic sentence. Instead, readers have to look for clues often hidden in the language of the text. For example, the following fictional paragraph describes a character. Read it carefully, make your observations, and then identify the main idea of the paragraph ... [Pg.136]


See other pages where Hidden text is mentioned: [Pg.343]    [Pg.192]    [Pg.343]    [Pg.192]    [Pg.976]    [Pg.552]    [Pg.56]    [Pg.116]    [Pg.133]    [Pg.595]    [Pg.42]    [Pg.78]    [Pg.141]    [Pg.20]    [Pg.170]    [Pg.174]    [Pg.194]    [Pg.236]    [Pg.259]    [Pg.340]    [Pg.33]    [Pg.9]    [Pg.50]    [Pg.127]    [Pg.95]    [Pg.17]    [Pg.60]    [Pg.171]    [Pg.21]    [Pg.35]    [Pg.18]    [Pg.59]   
See also in sourсe #XX -- [ Pg.192 ]




SEARCH



Hidden

© 2024 chempedia.info