Thursday, April 16, 2009
Waldenstrom macroglobulinemia
Waldenstrom macroglobulinemia can occur in younger people but is usually seen in people over age 65. The disease is more common among men than women and among whites than blacks.
Signs and symptoms of the disease may include enlarged lymph nodes or spleen (splenomegaly), fatigue, headaches, weight loss, a tendency to bleed easily, visual problems, confusion, dizziness, and loss of coordination. The symptoms are largely due to the thickening of the blood. In extreme cases, the increased concentration of IgM in the blood can lead to heart failure.
The treatment depends upon the viscosity of the patient's blood. Patients with pronounced hyperviscosity usually receive chemotherapy (anticancer drugs). A type of treatment called plasmapheresis may be performed to relieve symptoms such as excessive bleeding and dizziness. In this procedure, the blood plasma (which contains the antibody IgM) is removed from the patient.
Other parts of the blood (red blood cells, white blood cells, and platelets) are returned to the patient along with a plasma substitute. Interferon alpha, a form of biological therapy, may also help relieve symptoms.
Tuesday, April 7, 2009
Bacterial prostatitis, chronic
The defect in the prostate is the focal point for the persistent infection. Effective treatment requires identification and correction of this defect before antibiotics can be effective.
Bacterial prostatitis, acute
The prostate, a small organ about the size of a walnut, is below the bladder (where urine is stored) and surrounds the urethra (the tube that carries urine from the bladder). The prostate normally produces a fluid that becomes part of the semen
Bacterial artificial chromosome
Bacterial artificial chromosome is abbreviated BAC.
Monday, April 6, 2009
Acoustic neuroma
The early diagnosis of an acoustic neuroma is the key to preventing its serious consequences. Unfortunately, early detection of the tumor is sometimes difficult because the symptoms may be subtle and may not appear in the beginning stages of growth. Once the symptoms do appear, a thorough ear examination and hearing test are essential for diagnosis. Computerized tomography (CT) scans and magnetic resonance imaging (MRI) are helpful in determining the location and size of a tumor and also in planning its microsurgical removal.
If an acoustic neuroma is surgically removed when it is still very small, hearing may be preserved and accompanying symptoms may go away. As the tumor grows larger, surgical removal is often more complicated because the tumor may become firmly attached to the nerves that control facial movement, hearing, and balance.
The removal of tumors attached to hearing, balance, or facial nerves can make the patient's symptoms worse because sections of these nerves must also be removed with the tumor. As an alternative to conventional surgical techniques, radiosurgery may be used to reduce the size or limit the growth of the tumor. Radiosurgery, utilizing carefully focused radiation, is sometimes performed on the elderly, on patients with tumors on both hearing nerves, or on patients with a tumor growing on the nerve of their only hearing ear. If the tumor is not removed, MRI is used to carefully monitor its growth.
There are two types of acoustic neuroma: unilateral and bilateral. Unilateral acoustic neuromas affect only one ear. They account for approximately 8 percent of all tumors inside the skull. Symptoms may develop at any age but usually occur between the ages of 30 and 60 years.
Bilateral acoustic neuromas, which affect both ears, are hereditary. Inherited from one's parents, this tumor results from a genetic disorder known as neurofibromatosis-2 (NF2). Affected individuals have a 50 percent chance of passing this disorder on to their children. Unlike those with a unilateral acoustic neuroma, individuals with NF2 usually develop symptoms in their teens or early adulthood. Because NF2 patients usually have multiple tumors, the surgical procedure is more complicated than the removal of a unilateral acoustic neuroma. Further research is needed to determine the best approach in these circumstances.
In addition to tumors arising from the hearing and balance nerves, NF2 patients may develop tumors on other cranial nerves associated with swallowing, speech, eye and facial movement, and facial sensation. NF2 patients may also develop tumors within the spinal cord and on the brain's thin covering.
Both types of acoustic neuroma occur following a loss of the function of a gene on chromosome 22. A gene is a small section of DNA responsible for a particular trait like hair color or skin tone. This particular gene on chromosome 22 suppresses the growth of Schwann cells. When this gene malfunctions, Schwann cells can grow out of control. This gene may help suppress other types of tumor growth. In NF2 patients, the faulty gene on chromosome 22 is inherited.
Acoustic neuroma is also called an acoustic neurinoma or a vestibular schwannoma
Acoustic neurofibromatosis
NF2 is inherited in an autosomal dominant manner and is due to mutation in the NF2 gene in chromosome band 22q12.2 which encodes a protein called merlin. About 50% of persons with NF2 inherit it from an affected parent and the other 50% with NF2 have a new gene mutation. Anyone with NF2 has a 50% risk of transmitting it to each of their children. Prenatal testing is available.
Also known as bilateral acoustic neurofibromatosis and central neurofibromatosis.
Acoustic neurinoma
The early diagnosis of an acoustic neurinoma is the key to preventing its serious consequences. Unfortunately, early detection of the tumor is sometimes difficult because the symptoms may be subtle and may not appear in the beginning stages of growth. Once the symptoms do appear, a thorough ear examination and hearing test are essential for diagnosis. Computerized tomography (CT) scans and magnetic resonance imaging (MRI) are helpful in determining the location and size of a tumor and also in planning its microsurgical removal.
If an acoustic neurinoma is surgically removed when it is still very small, hearing may be preserved and accompanying symptoms may go away. As the tumor grows larger, surgical removal is often more complicated because the tumor may become firmly attached to the nerves that control facial movement, hearing, and balance.
The removal of tumors attached to hearing, balance, or facial nerves can make the patient's symptoms worse because sections of these nerves must also be removed with the tumor. As an alternative to conventional surgical techniques, radiosurgery may be used to reduce the size or limit the growth of the tumor. Radiosurgery, utilizing carefully focused radiation, is sometimes performed on the elderly, on patients with tumors on both hearing nerves, or on patients with a tumor growing on the nerve of their only hearing ear. If the tumor is not removed, MRI is used to carefully monitor its growth.
There are two types of acoustic neurinoma: unilateral and bilateral. Unilateral acoustic neurinomas affect only one ear. They account for approximately 8 percent of all tumors inside the skull. Symptoms may develop at any age but usually occur between the ages of 30 and 60 years.
Bilateral acoustic neurinomas, which affect both ears, are hereditary. Inherited from one's parents, this tumor results from a genetic disorder known as neurofibromatosis-2 (NF2). Affected individuals have a 50 percent chance of passing this disorder on to their children. Unlike those with a unilateral acoustic neurinoma, individuals with NF2 usually develop symptoms in their teens or early adulthood. Because NF2 patients usually have multiple tumors, the surgical procedure is more complicated than the removal of a unilateral acoustic neurinoma. Further research is needed to determine the best approach in these circumstances.
In addition to tumors arising from the hearing and balance nerves, NF2 patients may develop tumors on other cranial nerves associated with swallowing, speech, eye and facial movement, and facial sensation. NF2 patients may also develop tumors within the spinal cord and on the brain's thin covering.
Both types of acoustic neurinoma occur following a loss of the function of a gene on chromosome 22. A gene is a small section of DNA responsible for a particular trait like hair color or skin tone. This particular gene on chromosome 22 suppresses the growth of Schwann cells. When this gene malfunctions, Schwann cells can grow out of control. This gene may help suppress other types of tumor growth. In NF2 patients, the faulty gene on chromosome 22 is inherited.
Acoustic neurinoma is also called an acoustic neuroma or a vestibular schwannoma.
Acoustic nerve
Acoustic aphasia
Acoustic
Acid, folic
A deficiency of folic acid after birth causes a kind of anemia, namely, megaloblastic anemia in which there is a paucity of red blood cells and those that are made are unusually large and immature (so-called blast cells).
Lack of adequate folic acid during pregnancy was first found to increase the risk for the baby to have a birth defect involving the spinal cord and brain -- a neural tube defect such as spina bifida (meningomyelocele) or anencephaly.
The association was then investigated between the mother's use of drugs that act as folic acid antagonists in the first trimester of pregnancy and the birth of a child with a congenital malformation (birth defect). It was found that folic acid antagonists increased the risk not only of neural tube defects but also of congenital heart malformations, cleft lip and palate , and urinary tract defects. Folic acid. it now is clear, reduces the risks for a remarkably broad gamut of birth defects.
In order for folic acid to be effective in preventing these birth defects, the vitamin must be consumed every day beginning before conception and continuing through the first three months of pregnancy. Educating women (and their doctors) about the importance of folic acid is going to require a major effort. According to one study, only 10% of women know that folic acid should be taken before pregnancy.
Acid, fatty
Fatty acids come from animal and vegetable fats and oils. Fatty acids play roles outside the body; they are used as lubricants, in cooking and food engineering, and in the production of soaps, detergents, and cosmetics.
Related terms include the following:
Essential fatty acid: An essential fatty acid is a polyunsaturated fatty acid needed by the body that is synthesized by plants but not by the human body and is therefore a dietary requirement.
Free fatty acids: By-products of the metabolism of fat in adipose tissues.
Omega-3 fatty acids: Omega-3 fatty acids are a class of fatty acids found in fish oils, especially in salmon and other cold-water fish, that lowers the levels of cholesterol and LDL (low-density lipoproteins) in the blood. (LDL cholesterol is the "bad" cholesterol.)
Trans fatty acid: Trans fatty acids (trans fats) are made through hydrogenation to solidify liquid oils. They increase the shelf life of oils and are found in vegetable shortenings and in some margarines, crackers, cookies, and snack foods. Intake of trans fatty acids increases blood LDL-cholesterol ("bad" cholesterol) levels and raises the risk of coronary heart disease.
Acid, bile
On a more technical level, bile acids are steroid carboxylic acids derived from cholesterol. The primary bile acids are cholic and chenodeoxycholic acids. They are conjugated with glycine or taurine before they are secreted into the bile.
Acid, amino
Amino acids are molecules that (in technical terms) contain a basic amino (NH2) group, an acidic carboxyl (COOH) group and a side chain attached to an alpha carbon atom.
The 20 amino acids are alanine, arginine, asparagine, aspartic acid, cysteine, glutamic acid, glutamine, glycine, histidine, isoleucine, leucine, lysine, methionine, phenylalanine, proline, serine, threonine, tryptophan, tyrosine, and valine.
The term "amino acids" dates to the middle of the 19th century. The idea that amino acids are "Bausteine" (building stones) came from the Nobel Prize winning German biochemist Albrecht Kossel (1853-1927).
Acid reflux
Acid rain
Acid rain also poses serious human health risks by contributing to heart and lung disorders such as asthma and bronchitis. Acid rain can be reduced by the regulation of industrial emissions and the adoption of energy efficiency alternatives and pollution prevention programs. Acid rain is a form of acid deposition.
Acid phosphatase
Abnormally high serum levels of the enzyme may, for example, indicate prostate disease (infection, injury, or cancer).
Acid indigestion
Acid deposition
Achillodynia
The Achilles tendon is one of the better known anatomic features in sports medicine due to the abrupt dramatic nature of some injuries to this tendon. It is in the back of the lower leg and connects the calf muscle (the triceps surae) with the calcaneus bone in the heel. This tendon is so named for the hero whose heel, according to Greek mythology, was the only part of his body where he could be hurt.
Inflammation in the Achilles bursa is specifically known as achillobursitis.
Achillobursitis
The Achilles tendon is one of the better known anatomic features in sports medicine due to the abrupt dramatic nature of some injuries to this tendon. It is in the back of the lower leg and connects the calf muscle (the triceps surae) with the calcaneus bone in the heel. This tendon is so named for the hero whose heel, according to Greek mythology, was the only part of his body where he could be hurt.
Inflammation in the Achilles tendon and bursa is collectively known as achillodynia.
Achilles tendonitis
Achilles tendonitis causes pain and often swelling over the Achilles tendon. The tendon is tender and may be swollen. There is pain on rising up on the toes and pain with stretching of the tendon. The range of motion of the ankle may be limited.
The causes of Achilles tendonitis include overuse of the tendon, overly tight calf muscles or Achilles tendons, excess uphill running, sudden increase in the intensity of training, sometimes along with switching to racing shoes, or wearing high heels at work and then switching to a lower heeled workout shoe. Exerting rapid stress on the Achilles tendon when it is inflamed can result in rupture of the tendon.
Treatment includes ice packs to the Achilles tendon, raising the lower leg, and an anti-inflammatory medication. In some severe cases of Achilles tendonitis, a cast may be needed for several weeks. The doctor may also prescribe a heel lift insert for the shoe to prevent future overstretching of the Achilles tendon.
Prevention of Achilles tendonitis includes stretching the calf muscles and Achilles tendons carefully before doing vigorous activities. If the Achilles tendons or calf muscles are especially tight, it is a good idea to stretch them twice a day whether or not sports activities are planned that day.
Historical aside: According to Greek mythology, Achilles's mother held him as a baby by the heel and dipped him in the river Styx to make him invulnerable but the heel by which she held him remained unimmersed and hence vulnerable, as Paris' arrow in Achilles' heel later proved. As anyone who has suffered Achilles tendonitis knows, the Achilles tendon is indeed a point of vulnerability.
Achilles tendon
According to Greek mythology, Achilles's mother held him as a baby by the heel and dipped him in the river Styx to make him invulnerable but the heel by which she held him remained unimmersed and hence vulnerable, as Paris' arrow in Achilles' heel later proved.
Achilles
"...But save me. Take me to the ship, cut this arrow out of my leg, wash the blood from it with warm water and put the right things on it - the plants they say you have learned about from Achilles who learned them from Chiron, the best of the Centaurs." (The Iliad of Homer, Book XI).
Acetabular labrum
Injuries to the acetabular labrum can occur from chronic trauma due to repetitive hip motion or from acute trauma as, for example, from a direct blow to the hip or a violent motion of the hip.
Signs and symptoms of a acetabular labrum injury include pain accompanying hip motion, occasional pain in the hip at night or during daily activities, decreased range of motion and loss of strength in the hip.
Treatment may include anti-inflammatory medication and rest. Exercises to strengthen the hip muscles may then be recommended. If these measures are not effective, arthroscopic surgery may be done.
In medicine, a labrum is a ring of fibrocartilage around the edge of the articular (joint) surface of a bone. The Latin "labrum" means "lip." The term is used generally to designate a lip, edge, or brim. Plural, labra.
Acetabular
The acetabulum is not just cup-shaped. The word "acetabulum" in Latin means cup, a vinegar cup.
Aceruloplasminemia
Ceruloplasmin normally removes iron from cells. The absence of ceruloplasmin leads to the abnormal deposition of iron in cells, including those of the pancreas, liver, retina and the basal ganglia region of the brain. The iron deposition damages these tissues and leads to the clinical features of the disease which usually appear between 30 and 50 years of age.
In a typical case, a man in his 40s had a recent history of excessive thirst and urination (due to diabetes) and of progressive confusion. Treatment of the diabetes was begun. One day he suddenly left work and was found at home the next day sitting in a chair with the appearance of not having been to bed. When asked why he was not at work he replied, "What work?" Dementia progressed thereafter.
Aggressive treatment with deferoxamine, a chelating agent that takes up iron, may halt the progression of these complications.
Aceruloplasminemia is caused by mutations in the gene encoding ceruloplasmin on chromosome 3q. The gene is located in bands 3q23-q25.
Aceruloplasminemia is inherited as an autosomal recessive condition. Men and women with the disease have a pair of mutant ceruloplasmin genes, one from each of their parents.
Ceruloplasmin is an essential ferroxidase, an enzyme which catalyzes the oxidation of ferrous iron to ferric iron. This disease reveals the critical role of a copper-containing protein in iron trafficking. In aceruloplasminemia, the balance between the compartmentalization and storage of iron and the mobilization and transport of iron is disrupted.
Acentric chromosome
Accessory placenta
Accessory neuropathy
Damage to the accessory nerve can be confined to the accessory nerve or it may also involve the ninth and tenth cranial nerves which exit through the same opening (foramen) from the skull . Accessory neuropathy can sometimes occur and recur for unknown reasons. Most patients recover.
Paralysis of the accessory nerve prevents rotation of the head away from that side and causes drooping of the shoulder
Accessory nerve
Damage to the accessory nerve can be isolated (confined to the accessory nerve) or it may also involve the ninth and tenth cranial nerves which exit through the same opening (foramen) from the skull . Accessory neuropathy (nerve disease) can sometimes occur and recur for unknown reasons. Most patients recover.
Paralysis of the accessory nerve prevents rotation of the head away from that side and causes drooping of the shoulder.
Accessory dwelling unit
Accessory digestive organ
Abuse, verbal child
It is likely that emotional child abuse is greatly underreported, since it can be difficult to detect and difficult to document.
Emotional child abuse includes acts of commission or omission by the parents and other caregivers that could cause the child to have serious behavioral, emotional, or mental disorders. In some instances of emotional child abuse, the acts of parents or other caregivers alone, without any harm yet evident in the child's behavior or condition, are sufficient to warrant the intervention of child protective services. For example, the parents or caregivers may use extreme or bizarre forms of punishment, such as confinement of a child in a dark closet.
Emotional child abuse is also sometimes termed psychological child abuse or mental injury of a child.
Abuse, Substance
A definition of substance abuse that is frequently cited is that in DSM-IV, the fourth edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM) issued by the American Psychiatric Association. The DSM-IV definition is as follows:
A. A maladaptive pattern of substance use leading to clinically significant impairment or distress, as manifested by one (or more) of the following, occurring within a 12-month period:
Recurrent substance use resulting in a failure to fulfill major role obligations at work, school, or home (e.g., repeated absences or poor work performance related to substance use; substance-related absences, suspensions or expulsions from school; neglect of children or household)
Recurrent substance use in situations in which it is physically hazardous (e.g., driving an automobile or operating a machine when impaired by substance use)
Recurrent substance-related legal problems (e.g., arrests for substance-related disorderly conduct
Continued substance use despite having persistent or recurrent social or interpersonal problems caused or exacerbated by the effects of the substance (e.g., arguments with spouse about consequences of intoxication, physical fights)
B. The symptoms have never met the criteria for Substance Dependence for this class of substance.
Abuse, steroid
Abuse, sexual child
Sexual abuse is the least frequently reported form of child abuse (6% of all cases). Experts believe that sexual abuse may be the most underreported type of child maltreatment because of the secrecy, the "conspiracy of silence" that so often surrounds these cases.
Sexual abuse includes fondling a child's genitals, intercourse, incest, rape, sodomy, exhibitionism, and commercial exploitation through prostitution or the production of pornographic materials.
The diagnosis, treatment and prevention of sexual child abuse are complex. Several points might be made here:
The diagnosis of sexual child abuse involves a thorough nonjudgmental history of the immediate events as well as a review of potential similar experiences often independently done by a physician, social worker, and the police department. A complete physical exam of the child which may include the taking of photographs to document sexual abuse is necessarily followed by x-rays and possible laboratory tests.
Pedophiles (people who sexually abuse children) often require intense psychological and pharmacological therapy prior to release into the community, because of the high rate of repeat offenders.
Children's school programs regarding "good touch...bad touch" can provide parents and other caregivers with a forum in which to role-play and learn to avoid potentially harmful scenarios.
Parents should make sure that their child's daycare center/preschool is licensed and has an open door policy regarding parental visitation.
Abuse, psychological child
It is likely that emotional child abuse is greatly underreported, since it can be difficult to detect and difficult to document.
Emotional child abuse includes acts of commission or omission by the parents and other caregivers that could cause the child to have serious behavioral, emotional, or mental disorders. In some instances of emotional child abuse, the acts of parents or other caregivers alone, without any harm yet evident in the child's behavior or condition, are sufficient to warrant the intervention of child protective services. For example, the parents or caregivers may use extreme or bizarre forms of punishment, such as confinement of a child in a dark closet.
Emotional child abuse is also sometimes termed verbal child abuse or mental injury of a child.
Abuse, pregnancy
Pregnancy abuse is not only bad for the pregnant woman, it may also affect the health of her unborn baby. In a study of 1,004 women interviewed within 3 days of delivery, over 5% reported they had been abused during their pregnancy by their partners. The maternal abuse showed a significant correlation with the baby's low birth weight. Pregnant women who had been abused by their partners were more likely to deliver low birth weight babies. Low birth weight babies have more health problems than infants born at normal weight. (Reference: American Journal of Epidemiology 1999;150:714-726.)
Abuse, physical child
Physical child abuse is physical injury inflicted upon the child with cruel and/or malicious intent. Physical abuse can be the result of punching, beating, kicking, biting, burning, shaking, or otherwise harming a child physically.
The parent or caretaker who abused the child may not have intended to hurt the child, but rather the child's injury may have resulted from overly harsh discipline or physical punishment. There is, in this regard, a substantial debate going on about certain forms physical discipline such as spanking and slapping and their relationship to more orthodox forms of physical abuse.
Abuse, emotional child
It is likely that emotional child abuse is greatly underreported, since it can be difficult to detect and difficult to document.
Emotional child abuse includes acts of commission or omission by the parents and other caregivers that could cause the child to have serious behavioral, emotional, or mental disorders. In some instances of emotional child abuse, the acts of parents or other caregivers alone, without any harm yet evident in the child's behavior or condition, are sufficient to warrant the intervention of child protective services. For example, the parents/caregivers may use extreme or bizarre forms of punishment, such as confinement of a child in a dark closet.
Emotional child abuse is also sometimes termed psychological child abuse, verbal child abuse, or mental injury of a child.
abuse, Elder
Elder abuse is an umbrella term used to describe one or more of the following:
Physical abuse is the willful infliction of physical pain or injury,such as slapping, bruising, sexually molesting, or restraining.
Sexual abuse is the infliction of non-consensual sexual contact of any kind.
Emotional or psychological abuse is the infliction of mental or emotional anguish, such as humiliating, intimidating, or threatening.
Financial or material exploitation is the improper act or process of an individual, using the resources of an older person, without his/her consent, for someone else's benefit.
Neglect is the failure of a caretaker to provide goods or services necessary to avoid physical harm, mental anguish or mental illness, such as abandonment, denial of food or health related services.
Self-neglect is characterized as the behavior of an elderly person that threatens his/her own health or safety.
Like child abuse, elder abuse is a crime that all health and social services professionals are mandated to report.
The US National Academy of Sciences has defined elder abuse as: "(a) intentional actions that cause harm or create a serious risk of harm (whether or not harm is intended), to a vulnerable elder by a caregiver or other person who stands in a trust relationship to the elder, or (b) failure by a caregiver to satisfy the elder's basic needs or to protect the elder from harm."
The World Health Organization (WHO) defines elder abuse as "a single or repeated act, or lack of appropriate action, occurring within any relationship where there is an expectation of trust which causes harm or distress to an older person."
All satisfactory definitions of elder abuse encompass two key ideas: that the old person has suffered injury, deprivation, or unnecessary danger, and that a specific other individual (or individuals) is responsible for causing or failing to prevent it.
Abuse, child
Child neglect is the most frequently reported form of child abuse and the most lethal. This form of abuse is defined as the failure to provide for the shelter, safety, supervision and nutritional needs of the child. Child neglect can be physical, educational, or emotional neglect.
Physical neglect includes refusal of or delay in seeking health care, abandonment, expulsion from the home or refusal to allow a runaway to return home, and inadequate supervision.
Educational neglect includes the allowance of chronic truancy, failure to enroll a child of mandatory school age in school, and failure to attend to a special educational need.
Emotional neglect includes such actions as marked inattention to the child's needs for affection, refusal of or failure to provide needed psychological care, spouse abuse in the child's presence, and permission of drug or alcohol use by the child.
Physical abuse is the second most frequently reported form of child abuse and is defined as physical injury inflicted upon the child with cruel and/or malicious intent. Physical abuse can be the result of punching, beating, kicking, biting, burning, shaking, or otherwise harming a child. The parent or caretaker may not have intended to hurt the child, rather the injury may have resulted from over-discipline or physical punishment.
Emotional abuse is the third most frequently reported form of child abuse and includes acts or omissions by the parents or other caregivers that could cause serious behavioral, emotional, or mental disorders. For example, the parents/caregivers may use extreme or bizarre forms of punishment, such as confinement of a child in a dark closet. Emotional child abuse is also sometimes termed psychological child abuse, verbal child abuse, or mental injury of a child.
Sexual abuse is the least frequently reported form of child abuse and is believed to be the most under-reported type of child maltreatment because of the secrecy or "conspiracy of silence" that so often characterizes these cases. Sexual abuse includes fondling a child's genitals, intercourse, incest, rape, sodomy, exhibitionism, and commercial exploitation through prostitution or the production of pornographic materials.
Fatal injuries from maltreatment can result from many different acts including severe head trauma (injury), shaken baby syndrome, trauma to the abdomen or chest, scalding, burns, drowning, suffocation, poisoning, etc.
Factors affecting the likelihood of potential abuse and predisposing to child abuse include:
The abuser's childhood: child abusers often were abused as children.
The abuser's substance abuse: at least half of all child abuse cases involve some degree of substance abuse (alcohol, drugs, etc) by the child's parents.
Family stress: the disintegration of the nuclear family and its inherent support systems has been held to be associated with child abuse.
Social forces: experts debate whether a postulated reduction in religious/moral values coupled with an increase in the depiction of violence by the entertainment and informational media may increase child abuse.
The child: children at higher risk for child abuse include infants who are felt to be "overly fussy", handicapped children, and children with chronic diseases.
Specific "trigger" events that occur just before many fatal parental assaults on infants and young children include: an infant's inconsolable crying, feeding difficulties, a toddler's failed toilet training, and exaggerated parental perceptions of acts of "disobedience" by the child.
Children can be neglected and abused by parents, other caregivers, or society.
Child abuse should be reported, investigated and evaluated.
The treatment and prevention of child abuse include a support group structure coupled with visiting nurse home visits to reinforce good parenting skills and monitor the child's well-being. Children's school programs regarding "good touch...bad touch" can provide parents with a forum in which to role-play and learn to avoid potentially harmful scenarios. Parents should make sure that their child's daycare center is licensed and has an open door policy regarding parental visitation. The best strategy is to prevent child abuse.
Not until the 19th century were children granted the same legal status as domesticated animals in regard to protection against cruelty and/or neglect. In 1962 the term "battered child syndrome" entered medicine. By 1976 all states in the United States had adopted laws mandating the reporting of suspected instances of child abuse.
Abortion, therapeutic
Abortion, spontaneous
A spontaneous abortion is as opposed to an induced abortion. In a spontaneous abortion, it is purely accidental, that is spontaneous.
Abortion, recurrent
Recurrent abortion (or, as it is sometimes called, habitual abortion) is a form of infertility. It may be due to chromosome abnormalities.
Abortion, multiple
Abortion, induced
Abortion, habitual
Habitual or recurrent abortion is a form of infertility. It is sometimes due to chromosome abnormalities or other genetic causes.
Abortion, artificial
Absinthe
The first important medical research on absinthe was initiated in 1864 by a psychiatrist, Valentin Jacques Joseph Magnan, who exposed a veritable Noah's arkful of animals to wormwood oil (the essence of absinthe) and alcohol (the base of absinthe). He put cats, rabbits, and guinea pigs under an individual glass case next to a saucer of either wormwood oil or alcohol. The animals that breathed the alcohol fumes became drunk while those that inhaled the vapors of wormwood had epileptic seizures, reported Dr. Magnan in the medical journal The Lancet.
Prolonged drinking of absinthe causes convulsions, blindness, hallucinations, and mental deterioration. Absinthe has been banned but something of its taste of absinthe is still available in such drinks as ouzo in Greece and in France, pastis, long considered "the mother's milk of Provence."
Absent eye
Absent eye: Also called anophthalmia, a congenital malformation (birth defect) of the globe.
Anophthalmia refers, strictly speaking, to absence of the globe and ocular tissue from the orbit. However, in most cases of anophthalmia, CT scans show some remnants of the globe, indicating they represent severe microphthalmia (small eyes).
Anophthalmia/microphthalmia may involve one or both eyes. It may occur in isolation with no associated malformations or it may be part of a multiple congenital malformation syndrome as, for example, the congenital rubella syndrome, the triploidy syndrome (due to the presence of 69 chromosomes), the trisomy 13 syndrome (Patau syndrome, due to an extra chromosome 13), and the Wolf-Hirschorn syndrome (which is due to deletion of part of the short arm of chromosome 4).
Anophthalmia comes from the Greek an-, absence + ophthalmos, eye + absence of the eye.
Absence seizure
Also called a petit mal seizure.
Absence of the nipple
The Poland sequence (named for Alfred Poland, a celebrated 19th-century British surgeon and ophthalmologist) is a unique pattern of one-sided malformations characterized by a defect of the chest (pectoralis) muscle on one side of the body and webbing of the fingers (cutaneous syndactyly) of the ipsilateral hand (the hand on the same side). It is right-sided three times more often than it is left-sided. The disorder is currently considered "a nonspecific developmental field defect" occurring at about the sixth week of fetal development. The cause is uncertain. In Poland syndrome there is aplasia of the sternal head of the pectoralis major: the end of the main chest muscle that normally attaches to the breastbone is missing. On that side of the body, nearby chest muscles (the serratus anterior and latissimus dorsi muscles) may also be absent as may be the armpit (axillary) hair. In girls, the breast on that side is also usually absent (amastia) and there is no nipple. There is athelia.
Ectodermal dysplasia is not one but a number of hereditary conditions usually characterized by the abnormal development of skin, absence of sweat glands, dry eyes and abnormal development of teeth -- all structures derived from the ectoderm (the outside layer in early embryonic development). The absence of sweat glands leads to an inability to sweat and heat intolerance.
Athelia also occurs in association with the progeria (premature aging) syndrome and the Yunis-Varon syndrome (a multiple congenital malformation first reported in 1980).
Athelia is distinguished from amastia, wherein the breast is absent, and from amazia, wherein breast tissue is absent but the nipple is still resent.
Abdominal cavity
The abdominal cavity is hardly an empty space. It contains a number of crucial organs including the lower part of the esophagus, the stomach, small intestine, colon, rectum, liver, gallbladder, pancreas, spleen, kidneys, and bladder.
Abdominal guarding
Guarding is a characteristic finding in the physical examination for an abruptly painful abdomen (an acute abdomen) with inflammation of the inner abdominal (peritoneal) surface due, for example, to appendicitis or diverticulitis. The tensed muscles of the abdominal wall automatically go into spasm to keep the tender underlying tissues from being touched.
Abdominal muscle deficiency syndrome
Abdominal muscle deficiency syndrome was first recognized in the 19th century. The renowned physician William Osler wrote: "In the summer of 1897 a case of remarkable distension of the abdomen was admitted to the wards, with greatly distended bladder, and on my return in September, Dr. Futcher, knowing that I would be interested in it, sent for the child."
Abdominal pain
Occasionally, pain may be felt in the abdomen even though it is arising from organs that are close to but not within the abdominal cavity, for example, the lower lungs, the kidneys, and the uterus or ovaries. This latter type of pain is called "referred" pain because the pain, though originating outside the abdomen, is being referred to (felt) in the abdominal area.
Abdominal pain can be acute and sudden in onset, or the pain can be chronic and longstanding. Abdominal pain may be minor and of no great significance, or it can reflect a major problem involving one of the organs in the abdomen. The characteristics of the pain--location, timing, duration, etc. are important in diagnosing its cause. Persistent or severe abdominal pain should be evaluated by a physician.
Acute abdominal pain may require urgent surgery such as for a twisted ovarian cyst, ectopic pregnancy, intestinal obstruction, appendicitis, peritonitis, perforated peptic ulcer, perforated diverticulitis, or abdominal aortic aneurysm. Patients with gallbladder disease, pancreatitis, or a kidney stone may also need urgent treatment. Acute or chronic abdominal pain may also call for medical (nonsurgical) therapy.
The causes of abdominal pain depend on sex and age of the patient. A woman may have a twisted ovarian cyst while a man may have testicular torsion with a twisted testis. Abdominal pain in infants and small children may be due to intestinal obstruction from atresia or stenosis of the intestine, esophageal webs, intussusception, volvulus, imperforate anus, and Hirschsprung disease. These causes of abdominal pain are rarely, if ever, encountered in adults.
Abdominal muscles
Abdominal hysterectomy
Aarskog-Scott syndrome
Aarskog-Scott syndrome: A syndrome of wide spaced eyes (ocular hypertelorism), front-facing (anteverted) nostrils, a broad upper lip, a malformed ("saddle-bag") scrotum, and laxity of the ligaments resulting in bending back of the knees (genu recurvatum), flat feet, and overly extensible fingers. There are X-linked and autosomal forms of the disease. The gene for the X-linked form has been mapped to chromosome band Xp11.21 and identified as the FGD1 gene.
The disease is named for DJ Aarskog (1928-) and CI Scott, Jr. (1934-), Norwegian and American pediatricians, who described it in 1970 and 1971. It is also known as Aarskog syndrome, faciodigitogenital dysplasia, and faciogenital dysplasia.
Abdominal aneurysm
Definition of AANAT
Enterprise Technology Life Cycle
For purposes of the ETLC, a campus enterprise and/or mission critical system meets one or more of the following qualifications:
It is widely used across the campus
Unsuccessful operation of the system will result in a major disruption of mission-critical campus activities
If not widely used on campus, use of the system is encouraged to meet campus wide strategic objectives
The system or technology is part of a technology reference set included in a campus enterprise architecture roadmap.
Examples of campus enterprise and/or mission critical systems that are expected to follow ETLC guidelines include, but are not limited to, the following:
Business Applications (email, calendaring, student information systems, financial systems, on-line electronic payment systems, payroll and human resources systems, asset management applications, etc.)
Campus identity management infrastructure (authentication, authorization, directory services, master person data management)
Network infrastructure (hardware purchases, wireless expansions, network applications)
Information management applications (enterprise data warehouse, reporting and analysis tools, imaging and document management systems, content management systems, customer relationship management systems, etc.)
The campus student learning and course management systems
Enterprise collaboration applications
SOA infrastructure applications
Enterprise portal environments
Any tools used to develop or maintain enterprise and/or mission critical systems, including modeling tools, version control and change management systems, issue tracking or ticketing systems, testing tools, etc.
The ETLC is maintained by the campus Information Technology Architecture Committee (ITAC) with oversight from the Campus Technology Council (CTC).
Diffusion of Innovations
Diffusion of Innovations offers three valuable insights into theprocess of social change:
- What qualities make an innovation spread successfully.
- The importance of peer-peer conversations and peer networks.
- Understanding the needs of different user segments.
These insights have been tested in more than 6000 research studiesand field tests, so they are amongst the most reliable in the social sciences.
What qualities make innovations spread?
Diffusion of Innovations takes a radically different approach to mostother theories of change. Instead of focusing on persuadingindividuals to change, it sees change as being primarily about theevolution or “reinvention” of products and behaviours so theybecome better fits for the needs of individuals and groups. In Diffusion of Innovations it is not people who change, but theinnovations themselves.
Why do certain innovations spread more quickly than others? Andwhy do others fail? Diffusion scholars recognise five qualities thatdetermine the success of an innovation.
Reinvention is a key principle in Diffusion of Innovations. The success of an innovation depends on how well it evolves to meet the needs of more and more demanding and risk-averse individuals in a population (the history of the mobile phone is a perfectexample). A good way to achieve this is to make users into partners in a continuous process of redevelopment.
Computer games companies, pharmaceutical corporations and rural research institutes are examples of organisations that seek to make users active partners in improving innovations by supporting user communities or by applying participative action research techniques.
Tuesday, March 24, 2009
Black Hole Thermodynamics
The realisation from Quantum Mechanics that we can think of all matter-energy as waves.
The realisation from classical physics that in a confined region, waves exist as standing waves.
The realisation from thermodynamics that the entropy can be viewed as a measure of the number of combinations or permutations of an ensemble that are equivalent. This is equivalent to viewing the entropy more conventionally as a measure of the heat divided by the temperature of a body. According to the Second Law of Thermodynamics, in a closed system the entropy never decreases.
The realisation from Heisenberg's Uncertainty Principle that we can violate the principle of Conservation of Energy so long as we do it for only a short period of time.
The realisation from classical physics that all objects with a temperature above absolute zero radiate away energy as electromagnetic radiation.
Feynman's theory of antimatter as regular matter going backwards in time.
Virtual Pair Production
Recall Heisenberg's Uncertainty Principle. It basically puts a limit on how much we can reduce the disturbance we introduce in a system by doing a measurement on it. There are a number of forms of the principle, and here we shall use only one of them:
The uncertainty in any measurement of the energy of an object times the uncertainty in when the object had that energy will always be at least equal to a universal constant.
Technical note: The universal constant is Planck's constant h divided by 2 pi.
A moment's reflection on the implications of this form of the Uncertainty Principle may convince you that this means that the energy does not even have a definite value but only a lower and upper bound.
Thus the principle of conservation of energy can be violated so long as the violation occurs for only a brief period of time.
Now consider Dirac's infinite sea of negative energy electrons. One of those electrons can violate conservation of energy by spontaneously jumping into a positive energy state provided it falls back into the hole quickly enough. You will recall that we interpret the hole in the sea as a positron. Thus, we believe that this virtual pair production is occurring everywhere in the universe. The pair can only exist for a time of about 10-35 seconds, i.e. 34 zeroes followed by a 1 to the right of the decimal point; this is called the Planck time.
Similarly we believe virtual pairs of proton-antiprotons, neutron-antineutrons etc. are continually being formed and disappearing everywhere in the universe. Wheeler, then, characterises the vacuum at a scale of very small distances as being quantum foam.
Satellite Navigation Using GPS
The NAVSTAR Global Positioning System
The NAVSTAR Global Positioning System,usually called GPS, consists of three components: a space segment of GPS satellites, acontrol segment that monitors and operatesthose satellites and a user segment that employsGPS receivers to observe and recordtransmissions from the satellites and performposition, velocity, attitude and time calculations.
The GPS Space Segment
The space segment is based on three-axisstabilized satellites orbiting in near-circularorbits with a period of half a sidereal day andan inclination of 55 degrees. There are six orbitalplanes, each of them with four satellites.This constellation provides global coveragewith more than four satellites in view at alltimes.
The significance of the visibility of at least four satellites is that the GPS system is intendedto allow instantaneous real time determinationof the user position (3 variables) and thetime of the fix (one more variable). Previouspositioning systems, like the methods used inthe Transit and Tsikada systems, were basedon the processing of several passes of data(requiring hours to days) and did not providethe instantaneous solutions that GPS (orGLONASS) offers.
The GPS satellites carry very stable atomicclocks that are used to derive the ranging signals.The basic signal for civil use, L1, has afrequency of 1575.42 MHz and it is modulatedwith a Clear Acquisition (C/A) PseudoRandom Noise (PRN) code at 1.023 MHz thatis different for every satellite.
The signal isalso modulated with a 10.23 MHz Precise (P)code that is usually encrypted and only availableto authorized users. On top of this thereis a 50-bit-per-second modulation which isused to transmit the satellite ephemerides(predicted orbit and clock) and other information.
Authorized users have also access tothe Precise code on a second frequency L2,that allows users to correct for ionosphericpropagation delays. Some receivers are ableto measure the delay between the signal inthe L1 frequency and the L2 frequency withoutaccess to the P code. There are plans toadd in future satellites another frequency forcivil users so they can easily correct for ionosphericdelays.
The GPS Control Segment
The GPS control segment tracks and monitorsthe signal from the GPS space segmentand estimates the orbits and clock behaviourof the satellites. This information is uploadedto the satellites so it can be transmitted to users.
The GPS User SegmentThe GPS user segment can perform two basicmeasurements of the GPS signals. It cancompare the C/A or P code that it is receivingwith a locally generated copy in order tocompute the transmission delay between thesatellite and the receiver. This measurementis called pseudorange. Pseudoranges to fouror more satellites can be used to determinethe position of the user once the position ofthe GPS satellites has been obtained usingthe ephemerides of the navigation message.
The second and more precise method is toobtain the difference in phase between thereceived carrier signal and a receiver generatedsignal at the same frequency. Thismeasurement is known as the carrier phaseobservable and it can reach millimetre precision,but it lacks the accuracy of the pseudorangebecause the phase when the trackingis started can only be known with an ambiguityof an unknown number of times the carrierwavelength (about 19 cm for L1)
GPS Global Positioning System
GPS coversthe whole earth and any point on the earth surface can be pin-pointed. The reasonfor choosing GPS satellite is because of its continuous availability throughout theyear.
If the future GPS satellites like GLONASS, GALILEO, etc., are equipped withirradiation measuring instruments like Total Irradiance Monitor [SORCE], etc., andmoreover, if the measurements are made continuously over the earth’s atmospherethen the amount of irradiation data available are enormous which will lead to betterresults in irradiance monitoring.
During any particular year at least a minimum of 12satellites will be facing the Sun and monitoring the irradiance over that region and theorbital paths of the satellite will be well-known.
One more added advantage of usingthe GPS satellite is the repetitive coverage over an area on a single day, so the variationin the same area over a short period of time can also be calculated.
Space- and ground-based measurement and monitoring
At any instant nearly 12 satellites will be facing the Sun and they will measure theirradiance. The orbital path of the satellites are predefined and well-known. To measurethe irradiation precisely the measurement should be made at ground also at thesame instant of time when the satellite is passing over a certain area.
The ground measurementsare performed to reveal the solar irradiation available on the ground afterseveral atmospheric path losses. The reasons to measure the irradiation both on topof the atmosphere and on the ground are to understand the changes occurring in theirradiation during their travel to the surface, etc. Ground instruments are required atseveral clearly available places for measurement.
For example, if the satellite is at a specific location in space and their co-ordinates interms of latitude and longitude are knownby pre-calculations, e.g., 13◦00 N80◦00 E,the satellite measures the irradiation at that particular position in space and if themeasurements are made in the ground at the same place then we can compare thechanges in the values.
If more number of ground stations are established then for eachground station data we will obtain the top of the atmosphere data from the satellite.More stations will lead to better results, because we can compare more ground datawith the satellite data.
For a particular instant of time and at a particular point we will get the irradiation atthe top of the atmosphere, at the ground, the difference in irradiation, the amount of loss during that time and the variation in irradiation when compared to the correspondingprevious readings at the same point of observation.
Though the irradiation variationon the top of the atmosphere is very small, monitoring those small variations will alsohelp us to understand the influence of solar radiation on earth. The ground monitoringis difficult also because of the multiple scattering of radiation from the ground whichmakes the reading difficult.
Though there are some difficulties, the data obtained fromthese calculations will be better than the interpolated or extrapolated values which arewidely used.
Compaq Presario CQ60-101AU laptop drivers for Windows XP
please follow these steps
I. Get the following drivers and install in the given order only.
——————————————————————————
01. Chipset drivers - nVidia nForce chipset driver & Networking controller.exe (117MB)
02. AMD Processor Update - sp35445 (3MB)
03. WinXPSP2 Enhancements - sp28668_Enh4WinXPSP2.exe (3.3MB)
04. VGA/Display - see the manual Installation step below
05. UAA Driver for HD Audio - sp33566_UAA Bus Driver for HD Audio.exe (54MB)
06. HDMI Audio - HDMI-nForce_HDA_10.3.exe (7.5 MB)
07. Audio/Sound - download CQ60-101AU audio driver (3MB) (see help below to see how to install)
08. Modem - sp33839_Modem with SmartCP.exe(6MB)
09. Wireless - Wireless_Atheros.zip (2.2MB), sp34510_HP Wireless Assistant.exe (3.2MB)
10. Webcam - sp35414_HP 1.3MP Webcam Software Drivers.exe (5MB)
11. Dotnetfx2.0 - dotnetfx_2.0.exe (22MB)
12. Touchpad - Synaptics Touchpad.exe (6MB)
13. Quick launch - Quick launch buttons.exe (14MB)
14. Bluetooth - CQ60-101AU driver for bluetooth (98 MB)
——————————————————————–
I. Manual Installation Help for (04. VGA/Display)
——————————————————————–
1. Click START
2. Click RUN
3. Type “devmgmt.msc” in the prompt and click “OK”
4. In other devices>> right click “VGA adapter..”
5. Click “update driver”
6. Select “No, not this time” and Click “Next”
7. Select “Install from a list or specific location(Advanced)” and Click “Next”
8. Select “Don`t search. I will choose” and Click “Next”
9. From the list scroll down and select “Show All Devices” (the first option and not “Sound and video..”)
10. Click “Have Disk..”
11. Click “Browse” and choose this folder (the previous installation temp folder of chipset driver)
12. Select the “C:\NVIDIA\nForceWin2K\18.11\English\Display\nv4_disp.inf″ file and Click “Open”
13. Click “OK”
14. Select “NVIDIA GeForce 8200″
15. Click “Next”
16. Click “Finish”
—————————————————————-
II. Manual Installation Help for (07. Audio/Sound)
—————————————————————-
0. Download the corresponding file and unzip.
01. Click START02. Click RUN0
3. Type “devmgmt.msc” in the prompt and click “OK”
04. In other devices>> You will see two nos of “Audio Device on HD Audio Bus”
05. Right Click the first one and Click “disable”
06. In other devices>> right click the second Audio Device on ……..
07. Click “update driver”
08. Select “No, not this time” and Click “Next”
09. Select “Install from a list or specific location(Advanced)” and Click “Next”
10. Select “Don`t search. I will choose” and Click “Next”
11. From the list scroll down and select “Sound, video and game controller” and Click next
12. Click “Have Disk..”
13. Click “Browse” and choose this folder
14. Select the “/XP32/WiSVHe5″ file and Click “Open”
15. Click “OK”
16. Click “Next”
17. A menu appears saying “Installing …. Do you want to continue?” Click “YES”
18. Click “Continue Anyway”
===============================================================
—————————————————————-
III. Manual Installation Help for (09. Wireless )
—————————————————————-
0. Download the corresponding file and unzip.
1. Click START
2. Click RUN
3. Type “devmgmt.msc” in the prompt and click “OK”
4. In other devices>> right click “Ethernet Controller”
5. Click “update driver”
6. Select “No, not this time” and Click “Next”
7. Select “Install from a list or specific location(Advanced)” and Click “Next”
8. Select “Don`t search. I will choose” and Click “Next”
9. From the list scroll down and select “network Adapters” and Click “Next” wait
10. Click “Have Disk..”
11. Click “Browse” and choose this folder
12. Select the “/Atheros/net5211″ file and Click “Open”
13. Click “OK”
14. Click “Next”
15. Click “Finish”
SWF File compression strategy
Reuse—The structure of the character dictionary makes it easy to reuse elements in a SWF file. For example, a shape, button, sound, font, or bitmap can be stored in a file once and referenced many times.
Compression—Shapes are compressed by using an efficient delta encoding scheme; often the first coordinate of a line is assumed to be the last coordinate of the previous line. Distances are also often expressed relative to the last position.
Default values—Some structures, like matrixes and color transforms, have common fields that are used more often than others. For example, for a matrix, the most common field is the translation field. Scaling and rotation are less common. Therefore, if the scaling field is not present, it is assumed to be 100%. If the rotation field is not present, it is assumed that there is no rotation. This use of default values helps to minimize file sizes.
Change Encoding—As a rule, SWF files only store the changes between states. This is reflected in shape data structures and in the place-move-remove model that the display list uses.
Shape Data Structure—The shape data structure uses a unique structure to minimize the size of shapes and to render anti-aliased shapes efficiently on the screen.
The SWF header
The header begins with a three-byte signature of either 0x46, 0x57, 0x53 (“FWS”); or 0x43,0x57, 0x53 (“CWS”). An FWS signature indicates an uncompressed SWF file; CWSindicates that the entire file after the first 8 bytes (that is, after the FileLength field) wascompressed by using the ZLIB open standard. The data format that the ZLIB library uses isdescribed by Request for Comments (RFCs) documents 1950 to 1952. CWS file compressionis permitted in SWF 6 or later only.
A one-byte version number follows the signature. The version number is not an ASCIIcharacter, but an 8-bit number. For example, for SWF 4, the version byte is 0x04, not theASCII character “4” (0x35).
The FileLength field is the total length of the SWF file, including the header. If this is anuncompressed SWF file (FWS signature), the FileLength field should exactly match the filesize. If this is a compressed SWF file (CWS signature), the FileLength field indicates the totallength of the file after decompression, and thus generally does not match the file size. Havingthe uncompressed size available can make the decompression process more efficient.
The FrameSize field defines the width and height of the on-screen display. This field is stored as a RECT structure, meaning that its size may vary according to the number of bits needed to encode the coordinates. The FrameSize RECT always has Xmin and Ymin value of 0; the Xmax and Ymax members define the width and height.
The FrameRate is the desired playback rate in frames per second. This rate is not guaranteed if, for example, Flash Player is running on a slow or busy CPU. The Frame Count is the total number of frames in this SWF file.
SWF file format specification
The SWF file format isdesigned to be an efficient delivery format, not a format for exchanging graphics betweengraphics editors.
It is designed to meet the following goals:
On-screen display—The format is primarily intended for on-screen display and supportsanti-aliasing, fast rendering to a bitmap of any color format, animation, and interactivebuttons.
Extensibility—The format is a tagged format, so it can be evolved with new features whilemaintaining backward compatibility with earlier versions of Flash Player.
Network delivery—The format can travel over a network with limited and unpredictable bandwidth. The files are compressed to be small and support incremental rendering throughstreaming. The SWF file format is a binary format and is not human readable like HTML. The SWF file format uses techniques such as bit-packing and structures with optional fieldsto minimize file size.
Simplicity—The format is simple so that Flash Player is small and easily ported. Also, FlashPlayer depends upon a limited set of operating system features only.
File independence—The files display without dependence on external resources suchas fonts.
Scalability—The files work well on limited hardware, and can take advantage of betterhardware when it is available. This ability is important because computers have differentmonitor resolutions and bit depths.
Speed—The files render with quick, high quality.
Scriptability—The format includes tags that provide sequences of byte codes to beinterpreted by a stack machine. The byte codes support the ActionScript™ language. FlashPlayer provides a runtime ActionScript object model that allows interaction with drawingprimitives, servers, and features of Flash Player.
SWF files have the extension .swf and a MIME type of application/x-shockwave-flash.
The SWF format has evolved through several versions. Through SWF 5, substantial additionswere made to the SWF tag set. Starting with SWF 6 and later, the SWF format changes less,as more new features are implemented partly or entirely at the ActionScript level. Startingwith SWF 9, the ActionScript 3.0 language, which employs the new ActionScript VirtualMachine 2 (AVM2) can be used. Anyone planning to generate SWF file content that usesnewer features should become familiar with the ActionScript object model that Flash Playerexposes. Some references for this information are Programming ActionScript 3.0 (seelivedocs.adobe.com/flex/2/docs/wwhelp/wwhimpl/js/html/wwhelp.htm?href=Part5_ProgAS.html), ActionScript 3.0 Language Reference (seelivedocs.adobe.com/flash/9.0/ActionScriptLangRefV3/), and the Adobe ActionScript VirtualMachine 2 (AVM2) Overview at www.adobe.com/go/avm2overview/ (PDF file).Adobe seriously considers all feedback to the SWF file format specification. E-mail anyunclear or potentially erroneous information within the specification to Adobe atflashformat@adobe.com. All such email submissions shall be subject to the Submitt
QTFF Defining Media Data Layouts
Using QuickTime Files and Media Layouts
A QuickTime file can reference media data stored in a number of files, including the file itself. If a QuickTimefile references only media data contained within itself, the file is said to be self-contained. A QuickTime filecan also reference media data stored in files that are not QuickTime files. This is because the QuickTime fileformat references media within a URL by file offset, rather than by a data structuring mechanism of a particularfile format. This allows a QuickTime file to refer to data stored in any container format.
Often, it is convenient to store a single media stream per file, for example, when encoding content. It is alsouseful for purposes of reusing content. (To reuse an elementary stream, it is not necessary to extract it froma larger, possibly multiplexed file.)
Because QuickTime can reference media stored in any file, it is not required that media be stored in theQuickTime file format. However, this is recommended. Putting the elementary streams in a QuickTime filehas several advantages, particularly in enabling interchange of the content between different tools. Further,the QuickTime file format adds very little overhead to the media—as little as a few hundred bytes in manycases—so there is no great penalty in storage space.
One of the issues facing any device (a server or a local workstation) that is attempting to play back a QuickTimefile in real time is the number of file seeks that must be performed.
It is possible to arrange the data in a QuickTime file to minimize, and potentially eliminate, any seeks duringthe course of normal playback. (Of course, random access and other kinds of interactivity require seeks.)Minimizing seeks is accomplished by interleaving the media data in the QuickTime file in such a way thatthe layout of the media in the file corresponds to the order in which the media data will be required. It isexpected that most servers, for example, will stream QuickTime media using the facilities of the hint tracks.
Take a scenario where the QuickTime file contains a single hint track that references an audio and a visualmedia stream. In order to eliminate all seeks, the hint track media must be interleaved with the audio andvisual stream data. Because the hint track sample must always be read before the audio and visual mediathat it references, the hint track samples must always immediately precede the samples they reference.
A simple illustration of the ordering of data (that is, time and file offset increasing from left to right) is asfollows:
H0 A0 H1 V1 H2 V2 H3 A1 H4 A2 V3 H5 V4
When a single hint sample references multiple pieces of media data, those pieces of media data must occurin the order that they are referenced.
QuickTime File Format Specification
QuickTime movies are stored on disk, using two basic structures for storing information: atoms (also knownas simple atoms or classic atoms), and QT atoms. To understand how QuickTime movies are stored, you needto understand the basic atom structures described in this chapter. Most atoms you encounter in the QuickTimeFile Format are simple or classic atoms. Both simple atoms and QT atoms, however, allow you to constructarbitrarily complex hierarchical data structures. Both also allow your application to ignore data they don’tunderstand.
Metadata
A QuickTime file stores the description of its media separately from the media data. The description, ormetadata, is called the movie resource, movie atom, or simply the movie, and contains information such asthe number of tracks, the video compression format, and timing information. The movie resource also containsan index describing where all the media data is stored.
The media data is the actual sample data, such as video frames and audio samples, used in the movie. Themedia data may be stored in the same file as the QuickTime movie, in a separate file, in multiple files, inalternate sources such as databases or real-time streams, or in some combination of these.
Atoms
The basic data unit in a QuickTime file is the atom. Each atom contains size and type fields that precede anyother data. The size field indicates the total number of bytes in the atom, including the size and type fields.The type field specifies the type of data stored in the atom and, by implication, the format of that data. Insome cases, the size and type fields are followed by a version field and a flags field. An atom with theseversion and flags fields is sometimes called a full atom.
Atom types are specified by a 32-bit unsigned integer, typically interpreted as a four-character ASCII code.Apple, Inc. reserves all four-character codes consisting entirely of lowercase letters. Unless otherwise stated,all data in a QuickTime movie is stored in big-endian byte ordering, also known as network byte ordering,in which the most significant bytes are stored and transmitted first.
Atoms are hierarchical in nature. That is, one atom can contain other atoms, which can contain still others,and so on. This hierarchy is sometimes described in terms of a parent, children, siblings, grandchildren, andso on. An atom that contains other atoms is called a container atom. The parent atom is the container atomexactly one level above a given atom in the heirarchy.
For example, a movie atom contains several different kinds of atoms, including one track atom for each trackin the movie. The track atoms, in turn, contain one media atom each, along with other atoms that defineother track characteristics. The movie atom is the parent atom of the track atoms. The track atoms are siblings.The track atoms are parent atoms of the media atoms. The movie atom is not the parent of the media atoms,because it is more than one layer above them in the hierarchy.
An atom that does not contain other atoms is called a leaf atom, and typically contains data as one or morefields or tables. Some leaf atoms act as flags or placeholders, however, and contain no data beyond their sizeand type fields.
The format of the data stored within a given atom cannot always be determined by the type field of theatom alone; the type of the parent atom may also be significant. In other words, a given atom type cancontain different kinds of information depending on its parent atom. For example, the profile atom inside amovie atom contains information about the movie, while the profile atom inside a track atom containsinformation about the track. This means that all QuickTime file readers must take into consideration not onlythe atom type, but also the atom’s containment hierarchy.
Tuesday, March 17, 2009
Windows Secrets Codes
If you ever lose the Desktop but Explorer is still running with the Start Button, you can do this to bring back your Desktop in a Windows box.
1. Click Start
2. Click Run
3. Type a period " . "
4. Then press Enter
Creating a New E-Mail Shortcut
To create a shortcut that will open your default e-mail program starting a new e-mail,
1. Right click on an open area of the desktop
2. Select New / Shortcut
3. For the Command Line, enter mailto:
4. For the title enter something like New E-Mail
5. When you click on this your default e-mail program should start with a new e-mail form.
Creating 3D Window Effect
You can create a nice 3D effect for your windows
1. Start Regedit
2. Go to HKEY_CURRENT_USER \ Control Panel \ Colors
3. Make sure the following setting are there:
. ButtonHilight=128 128 128
. ButtonShadow=255 255 255
Creating Shutdown, Restart and Logoff Icons
To create the icons, create a shortcut on the desktop.
For Shutdown, the command is C:\WINDOWS\RUNDLL.EXE user.exe,exitwindows
For Restart, the command is C:\WINDOWS\RUNDLL.EXE user.exe, exit windows exec
For Logoff, the command is C:\WINDOWS\RUNDLL.EXE shell32.dll,SHExitWindowsEx 0
Having your Favorites and Start Menus Sort Alphabetically
If your Start Menu Program or Favorites are not sorting alphabetically, it is easy to fix this:
1. Start Regedit
2. Go to HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Explor er/MenuOrder
3. Under here is are Favorites and Start Menu folders
4. In each there is a value called Order
5. Simply delete (or rename this) and restart Windows
6. Your Favorites or Start Menus should now sort alphabetically
Increasing the Icon Cache
1. Run Reg edit
2. Go to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explo rer
3. Create a new string called Max Cached Icons
4. Give it a value of 10000
5. This will increase response time in windows and give the Shellicon cache file more elbow room.
Make Icons 256 Color 16-Bit
1. Open the Registry
2. Hit Ctrl+F
3. Type Shell Icon BPP
4. When found, right click the Shell Icon BPP icon
5. Click Modify
6. Change the value from 4 to 16
7. Click Ok
8. Close the registry
9. Restart your computer
Removing Shortcut Arrows
An easy way to remove those irritating arrows from your desktop shortcut icons and not change their properties
1. Right click the Desktop / Properties / Appearance tab
2. Select Item
3. Scroll for Icon
4. The default size is 32
5. Change this to 30
6. Clicking Apply
Adding the Control Panel to the Start Menu
1. Open up the Explorer
2. Go to \WINDOWS\Start Menu
3. Right click in the right-hand panel
4. Add a new folder
5. Name it Control Panel.{21ec2020-3aea-1069-a2dd-08002b30309d}
6. This makes getting to the Control Panel items a little easier
Making Desktop Changes Permanent
To make changes to the Desktop like window size, positon after rebooting:
1. Start Regedit
2. Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policie s\Explorer
3. Create a New Binary Value
4. Name it NoSaveSettings
5. Give it a value of 01 00 00 00
Easy Shortcuts on the Desktop
Here is an easy way to put shortcuts on the Desktop where they can easily be moved to other group icons.
1. Using the Explorer, create a SHORTCUT to the \Windows\Desktop directory in your \Windows\SEND TO directory.
2. Now whenever you want to make a shortcut and move it to the desktop:
3. Just make the shortcut you want using Explorer
4. Right click on that shortcut
5. In the pop up menu select the Send To and Desktop shortcut.
Changing a Folder's Icon
To change the icon of a Folder on desktop:
1. Using the Explorer, move the folder from the Desktop directory to another directory on the hard drive
2. Right click on the new folder and select "Create Shortcut"
3. Move the shortcut to the Desktop
4. Right click and select a new icon
Full Window Drag ( Without Plus! )
1. Start Regedit
2. Open HKEY_CURRENT_USER /ControlPanel /Desktop /DragFullWindows
3. On "DragFullWindows" properties change 0 to 1
Fixing Corrupted Desktop Icons
Easier way to reset icons then deleting SHELLICONCACHE.
There's no need to exit Win95 and delete the SHELLICONCACHE file in order to reset icons that you may have changed (like Network Neighborhood).
1. Go to Control Panel, Display, Appearance Tab.
2. Select Icon from the Item drop down list.
3. Change the Size up or down one and apply.
4. Change the Size back to your original and apply.
If your Start Menu is slow or your icons are black for some reason, it means your Shelliconcache file is corrupt and should be deleted.