tab

CSS play responsive single level menu suitable for touch screen devices

A responsive single level menu that works on touch screen devices including Android OS and IE10.




tab

CSSplay - PC, tablet and Smartphone Menu

A multi level mini menu suitable for PCs, Tablets and Smartphones.




tab

CSSplay - PC, tablet and Smartphone Menu verson 2

A second multi level mini menu suitable for PCs, Tablets and Smartphones.




tab

CSSplay - PC, tablet and Smartphone droplist animated menu

A droplist animated menu suitable for PCs, Tablets and Smartphones.




tab

CSSplay - PC, tablet and Smartphone vertical concertina animated menu

A vertical concertina animated menu suitable for PCs, Tablets and Smartphones.




tab

A Review of Double-Diffusion Wood Preservation Suitable For Alaska

Currently, all treated lumber used in Alaska is imported from the 48 contiguous states and Canada because there are no wood-treating facilities in Alaska. This report explores conventional and alternative wood-treating methods and reviews previous studies and laboratory tests on treated wood. In investigating wood treatment as a possible processing option for Alaska forest products manufacturers, the double-diffusion method of using sodium fluoride followed by a copper sulfate appeared to be the most advantageous approach. This method of treating wood was identified because it can be used to treat freshly cut or green wood. This was an important factor to consider, owing to the limited drying capacity in Alaska. Little information was available as to the chemical retention after treating and its resistance to leaching.




tab

Taper equation and volume tables for plantation-grown red alder

A taper equation and associated tables are presented for red alder (Alnus rubra Bong.) trees grown in plantations. The data were gathered from variable-density experimental plantations throughout the Pacific Northwest. Diameter inside bark along the stem was fitted to a variable exponent model form by using generalized nonlinear least squares and a first-order continuous autoregressive process. A number of parameterizations of the exponent were examined in a preliminary analysis, and the most appropriate form was determined. This was achieved by examining alternative models across geographic locations and silvicultural treatments on the basis of their ability to behave well outside the range of the modeling data by using an independent evaluation data set from across the region and a model validation procedure. Incorporating three easily measured tree variables--diameter at breast height, total tree height, and crown ratio--provided the best fit among location and treatment. This taper equation can be used to estimate diameter inside bark anywhere along the stem, inside bark volume of the entire stem to any top height diameter, and merchantable height and volume between any two points along the stem (i.e., individual log volumes). The flexibility of the model allows for accurate volume predictions across a range of operational stand conditions and management activities and is therefore an improvement over previously published red alder volume and taper equations.




tab

A spatial database for restoration management capability on national forests in the Pacific Northwest USA

Understanding the capacity to reduce wildfire risk and restore dry forests on Western national forests is a key part of prioritizing new accelerated restoration programs initiated by the Forest Service.




tab

ALSC announces 2020 Notable Children’s Recordings

CHICAGO — The Association for Library Service to Children (ALSC), a division of the American Library Association (ALA), has selected its 2020 list of Notable Children’s Recordings. The list includes recordings for children 14 years of age and younger of especially commendable quality that demonstrate respect for young people’s intelligence and imagination; exhibit venturesome creativity and reflect and encourage the interests of children and young adolescents in exemplary ways.
 
The recordings selected are:




tab

ALSC names 2020 Notable Children's Books

CHICAGO — The Association for Library Service to Children (ALSC), a division of the American Library Association (ALA), has selected its 2020 list of Notable Children’s Books. The list of titles, published in the previous year, includes fiction, nonfiction, poetry and picturebooks of special interest, quality, creativity and value to children 14 years of age and younger.

The titles include:

Younger Readers




tab

ALSC announces 2020 Notable Children’s Digital Media list

CHICAGO — The Association for Library Service to Children (ALSC), a division of the American Library Association (ALA), is pleased to announce its 2020 list of outstanding digital media for children. The list includes real-time, dynamic and interactive media content for children 14 years of age and younger that enables and encourages active engagement and social interaction while informing, educating and entertaining in exemplary ways.

The media selected include:




tab

iHeartMedia Establishes 'Small Business Crisis Resource' Website, Newsletter

iHEARTMEDIA has launched a "Small Business Crisis Resource" initiative with resources including a newsletter and website to offer relevant news and information, including … more




tab

RosettaBooks

RosettaBooks is the leading independent eBook publisher, annually selling over 1,000,000 eBooks worldwide. The company launched in 2001 initially with a list of 100 preeminent backlist titles. Headquartered in New York City, today the company’s 500-plus title list includes leading...




tab

Statement: Leaders of nation’s charitable nonprofits urge Congress to go further

WASHINGTON, D.C. (March 23) —The organizations highlighted below express thanks to the Senate for taking the first step in recognizing nonprofits in its proposed relief package. However, we believe Congress needs to take further actions to ensure our...




tab

Leaders of nation’s charitable nonprofits respond to passage of CARES

WASHINGTON, D.C., March 26, 2020 — Following days of heated marathon negotiations, the Senate approved the Coronavirus Aid Relief and Economic Security (CARES) Act, the largest emergency aid package in U.S. history. The CARES Act includes more than $2...




tab

10 notable examples of 3-team trades

When it comes to pulling off a trade, three is sometimes not a crowd, but a necessity. With that in mind, here is a look back at 10 of the most notable three-way trades from recent history.




tab

How to Duplicate WordPress Database using phpMyAdmin

Do you want to duplicate your WordPress database using phpMyAdmin? WordPress stores all your website data in a MySQL database. Sometimes you may need to quickly clone a WordPress database to transfer a website or to create manual backups.




tab

How To Build A Vue Survey App Using Firebase Authentication And Database

https://www.smashingmagazine.com/2020/05/vue-survey-app-firebase-authentication-database/




tab

Hex Opacity Table

We’ve used hex colors for years but 8-digit hexadecimal is still relatively new. While rgba is simple to understand, 8-digit hex is more difficult, as you need to provide a hex representation of a numeric value. The following is a hexadecimal chart of opacity! Opacity Value Hex Code 100 FF 99 FC 98 FA 97 […]

The post Hex Opacity Table appeared first on David Walsh Blog.




tab

Unforgettable Road Trips in the UK-A new of enjoying your next travel

Scenic Road Trips in the UK that are Worth Capturing by Camera Some people like hiking. Some people like cycling. But, after chatting with online car dealership Carspring, it seems you can have just as much fun exploring your next trip in the complete, climate-controlled comfort of your car. Here we go through the most unforgettable road trips in England, Scotland and Wales. Drives that offer driving heaven, stunning scenery and plenty of fun along the way. All you need is the right company and you are all set to enjoy! England: Road from Glastonbury to Cheddar Gorge – Check out the route here. This route gives you a proper feel of medieval England. Begin deep in England’s spiritual realm on the outskirts of the hallowed town on Glastonbury (Therefore avoid at a certain summer weekend). Start at the Tor on the edge of town, where hippies will tell you ... Read more

The post Unforgettable Road Trips in the UK-A new of enjoying your next travel appeared first on Digital Photography Tutorials.




tab

Reestablishing a Social Life on Campus with Other Veterans and Civilians Post-TBI

Transitioning from military to civilian life can take time and can be tricky. Adam talks about how student veteran groups on college campuses can help vets reintegrate socially in their own way and  time.




tab

Everything is Figureoutable with Marie Forleo

You know her, the award-winning host, author and speaker, Marie Forleo returns to the podcast to talk about her new book , Everything Is Figureoutable. In the New York Times Best-Selling book, Marie gives readers tactics to look at setbacks positively and overcome obstacles creatively, so you can start reaching your dreams.  In this episode, we sit down to talk about how her life experiences influenced the book. She shares stories of fear, failure and always having fun have impacted her life. And we discuss a quote of hers (that I repeat all the time) that can help you get into the creative zone. Enjoy! FOLLOW MARIE: instagram | twitter | website Listen to the Podcast Subscribe   Watch the Episode  This podcast is brought to you by CreativeLive. CreativeLive is the world’s largest hub for online creative education in photo/video, art/design, music/audio, craft/maker, money/life and the ability to make a living in any of those disciplines. They are high quality, highly curated classes taught by the world’s top experts — Pulitzer, Oscar, Grammy Award winners, New York Times best selling authors and the best entrepreneurs of our times.

The post Everything is Figureoutable with Marie Forleo appeared first on Chase Jarvis Photography.




tab

Getting Comfortable with Being Uncomfortable

Being uncomfortable isn’t usually fun. In fact, we’re probably more likely to try to avoid uncomfortable situations than actually run toward them. Yet, it is a valuable skill. Not only in dealing with adversity but giving us confidence and trust in ourselves to recover quickly from failure, manage our fears, and explore the unknown. In today’s episode, we dive a big deeper into this topic and I share a few ways we can all practice getting comfortable with being uncomfortable. Enjoy! FOLLOW CHASE: instagram | twitter | website Listen to the Podcast Subscribe   This podcast is brought to you by CreativeLive. CreativeLive is the world’s largest hub for online creative education in photo/video, art/design, music/audio, craft/maker, money/life and the ability to make a living in any of those disciplines. They are high quality, highly curated classes taught by the world’s top experts — Pulitzer, Oscar, Grammy Award winners, New York Times best selling authors and the best entrepreneurs of our times.

The post Getting Comfortable with Being Uncomfortable appeared first on Chase Jarvis Photography.




tab

How To Build A Vue Survey App Using Firebase Authentication And Database

In this tutorial, you’ll be building a Survey App, where we’ll learn to validate our users form data, implement Authentication in Vue, and be able to receive survey data using Vue and Firebase (a BaaS platform). As we build this app, we’ll be learning how to handle form validation for different kinds of data, including reaching out to the backend to check if an email is already taken, even before the user submits the form during sign up.




tab

Some Quot schemes in tilted hearts and moduli spaces of stable pairs. (arXiv:2005.02202v2 [math.AG] UPDATED)

For a smooth projective variety $X$, we study analogs of Quot functors in hearts of non-standard $t$-structures of $D^b(mathrm{Coh}(X))$. The technical framework is that of families of $t$-structures, as studied in arXiv:1902.08184. We provide several examples and suggest possible directions of further investigation, as we reinterpret moduli spaces of stable pairs, in the sense of Thaddeus (arXiv:alg-geom/9210007) and Huybrechts-Lehn (arXiv:alg-geom/9211001), as instances of Quot schemes.




tab

Nonlinear stability of explicit self-similar solutions for the timelike extremal hypersurfaces in R^{1+3}. (arXiv:1907.01126v2 [math.AP] UPDATED)

This paper is devoted to the study of the singularity phenomenon of timelike extremal hypersurfaces in Minkowski spacetime $mathbb{R}^{1+3}$. We find that there are two explicit lightlike self-similar solutions to a graph representation of timelike extremal hypersurfaces in Minkowski spacetime $mathbb{R}^{1+3}$, the geometry of them are two spheres. The linear mode unstable of those lightlike self-similar solutions for the radially symmetric membranes equation is given. After that, we show those self-similar solutions of the radially symmetric membranes equation are nonlinearly stable inside a strictly proper subset of the backward lightcone. This means that the dynamical behavior of those two spheres is as attractors. Meanwhile, we overcome the double roots case (the theorem of Poincar'{e} can't be used) in solving the difference equation by construction of a Newton's polygon when we carry out the analysis of spectrum for the linear operator.




tab

A theory of stacks with twisted fields and resolution of moduli of genus two stable maps. (arXiv:2005.03384v1 [math.AG])

We construct a smooth moduli stack of tuples consisting of genus two nodal curves, line bundles, and twisted fields. It leads to a desingularization of the moduli of genus two stable maps to projective spaces. The construction of this new moduli is based on systematical application of the theory of stacks with twisted fields (STF), which has its prototype appeared in arXiv:1906.10527 and arXiv:1201.2427 and is fully developed in this article. The results of this article are the second step of a series of works toward the resolutions of the moduli of stable maps of higher genera.




tab

Fourier transformation and stability of differential equation on $L^1(Bbb{R})$. (arXiv:2005.03296v1 [math.FA])

In the present paper by the Fourier transform we show that every linear differential equations of $n$-th order has a solution in $L^1(Bbb{R})$ which is infinitely differentiable in $Bbb{R} setminus {0}$. Moreover the Hyers-Ulam stability of such equations on $L^1(Bbb{R})$ is investigated.




tab

On the Gorenstein property of the Ehrhart ring of the stable set polytope of an h-perfect graph. (arXiv:2005.03259v1 [math.CO])

In this paper, we give a criterion of the Gorenstein property of the Ehrhart ring of the stable set polytope of an h-perfect graph: the Ehrhart ring of the stable set polytope of an h-perfect graph $G$ is Gorenstein if and only if (1) sizes of maximal cliques are constant (say $n$) and (2) (a) $n=1$, (b) $n=2$ and there is no odd cycle without chord and length at least 7 or (c) $ngeq 3$ and there is no odd cycle without chord and length at least 5.




tab

The growth rate over trees of any family of set defined by a monadic second order formula is semi-computable. (arXiv:2004.06508v3 [cs.DM] UPDATED)

Monadic second order logic can be used to express many classical notions of sets of vertices of a graph as for instance: dominating sets, induced matchings, perfect codes, independent sets or irredundant sets. Bounds on the number of sets of any such family of sets are interesting from a combinatorial point of view and have algorithmic applications. Many such bounds on different families of sets over different classes of graphs are already provided in the literature. In particular, Rote recently showed that the number of minimal dominating sets in trees of order $n$ is at most $95^{frac{n}{13}}$ and that this bound is asymptotically sharp up to a multiplicative constant. We build on his work to show that what he did for minimal dominating sets can be done for any family of sets definable by a monadic second order formula.

We first show that, for any monadic second order formula over graphs that characterizes a given kind of subset of its vertices, the maximal number of such sets in a tree can be expressed as the extit{growth rate of a bilinear system}. This mostly relies on well known links between monadic second order logic over trees and tree automata and basic tree automata manipulations. Then we show that this "growth rate" of a bilinear system can be approximated from above.We then use our implementation of this result to provide bounds on the number of independent dominating sets, total perfect dominating sets, induced matchings, maximal induced matchings, minimal perfect dominating sets, perfect codes and maximal irredundant sets on trees. We also solve a question from D. Y. Kang et al. regarding $r$-matchings and improve a bound from G'orska and Skupie'n on the number of maximal matchings on trees. Remark that this approach is easily generalizable to graphs of bounded tree width or clique width (or any similar class of graphs where tree automata are meaningful).




tab

Establishing the Quantum Supremacy Frontier with a 281 Pflop/s Simulation. (arXiv:1905.00444v2 [quant-ph] UPDATED)

Noisy Intermediate-Scale Quantum (NISQ) computers are entering an era in which they can perform computational tasks beyond the capabilities of the most powerful classical computers, thereby achieving "Quantum Supremacy", a major milestone in quantum computing. NISQ Supremacy requires comparison with a state-of-the-art classical simulator. We report HPC simulations of hard random quantum circuits (RQC), which have been recently used as a benchmark for the first experimental demonstration of Quantum Supremacy, sustaining an average performance of 281 Pflop/s (true single precision) on Summit, currently the fastest supercomputer in the World. These simulations were carried out using qFlex, a tensor-network-based classical high-performance simulator of RQCs. Our results show an advantage of many orders of magnitude in energy consumption of NISQ devices over classical supercomputers. In addition, we propose a standard benchmark for NISQ computers based on qFlex.




tab

Successfully Applying the Stabilized Lottery Ticket Hypothesis to the Transformer Architecture. (arXiv:2005.03454v1 [cs.LG])

Sparse models require less memory for storage and enable a faster inference by reducing the necessary number of FLOPs. This is relevant both for time-critical and on-device computations using neural networks. The stabilized lottery ticket hypothesis states that networks can be pruned after none or few training iterations, using a mask computed based on the unpruned converged model. On the transformer architecture and the WMT 2014 English-to-German and English-to-French tasks, we show that stabilized lottery ticket pruning performs similar to magnitude pruning for sparsity levels of up to 85%, and propose a new combination of pruning techniques that outperforms all other techniques for even higher levels of sparsity. Furthermore, we confirm that the parameter's initial sign and not its specific value is the primary factor for successful training, and show that magnitude pruning cannot be used to find winning lottery tickets.




tab

Database Traffic Interception for Graybox Detection of Stored and Context-Sensitive XSS. (arXiv:2005.03322v1 [cs.CR])

XSS is a security vulnerability that permits injecting malicious code into the client side of a web application. In the simplest situations, XSS vulnerabilities arise when a web application includes the user input in the web output without due sanitization. Such simple XSS vulnerabilities can be detected fairly reliably with blackbox scanners, which inject malicious payload into sensitive parts of HTTP requests and look for the reflected values in the web output.

Contemporary blackbox scanners are not effective against stored XSS vulnerabilities, where the malicious payload in an HTTP response originates from the database storage of the web application, rather than from the associated HTTP request. Similarly, many blackbox scanners do not systematically handle context-sensitive XSS vulnerabilities, where the user input is included in the web output after a transformation that prevents the scanner from recognizing the original value, but does not sanitize the value sufficiently. Among the combination of two basic data sources (stored vs reflected) and two basic vulnerability patterns (context sensitive vs not so), only one is therefore tested systematically by state-of-the-art blackbox scanners.

Our work focuses on systematic coverage of the three remaining combinations. We present a graybox mechanism that extends a general purpose database to cooperate with our XSS scanner, reporting and injecting the test inputs at the boundary between the database and the web application. Furthermore, we design a mechanism for identifying the injected inputs in the web output even after encoding by the web application, and check whether the encoding sanitizes the injected inputs correctly in the respective browser context. We evaluate our approach on eight mature and technologically diverse web applications, discovering previously unknown and exploitable XSS flaws in each of those applications.




tab

Expressing Accountability Patterns using Structural Causal Models. (arXiv:2005.03294v1 [cs.SE])

While the exact definition and implementation of accountability depend on the specific context, at its core accountability describes a mechanism that will make decisions transparent and often provides means to sanction "bad" decisions. As such, accountability is specifically relevant for Cyber-Physical Systems, such as robots or drones, that embed themselves into a human society, take decisions and might cause lasting harm. Without a notion of accountability, such systems could behave with impunity and would not fit into society. Despite its relevance, there is currently no agreement on its meaning and, more importantly, no way to express accountability properties for these systems. As a solution we propose to express the accountability properties of systems using Structural Causal Models. They can be represented as human-readable graphical models while also offering mathematical tools to analyze and reason over them. Our central contribution is to show how Structural Causal Models can be used to express and analyze the accountability properties of systems and that this approach allows us to identify accountability patterns. These accountability patterns can be catalogued and used to improve systems and their architectures.




tab

Mortar-based entropy-stable discontinuous Galerkin methods on non-conforming quadrilateral and hexahedral meshes. (arXiv:2005.03237v1 [math.NA])

High-order entropy-stable discontinuous Galerkin (DG) methods for nonlinear conservation laws reproduce a discrete entropy inequality by combining entropy conservative finite volume fluxes with summation-by-parts (SBP) discretization matrices. In the DG context, on tensor product (quadrilateral and hexahedral) elements, SBP matrices are typically constructed by collocating at Lobatto quadrature points. Recent work has extended the construction of entropy-stable DG schemes to collocation at more accurate Gauss quadrature points.

In this work, we extend entropy-stable Gauss collocation schemes to non-conforming meshes. Entropy-stable DG schemes require computing entropy conservative numerical fluxes between volume and surface quadrature nodes. On conforming tensor product meshes where volume and surface nodes are aligned, flux evaluations are required only between "lines" of nodes. However, on non-conforming meshes, volume and surface nodes are no longer aligned, resulting in a larger number of flux evaluations. We reduce this expense by introducing an entropy-stable mortar-based treatment of non-conforming interfaces via a face-local correction term, and provide necessary conditions for high-order accuracy. Numerical experiments in both two and three dimensions confirm the stability and accuracy of this approach.




tab

Distributed Stabilization by Probability Control for Deterministic-Stochastic Large Scale Systems : Dissipativity Approach. (arXiv:2005.03193v1 [eess.SY])

By using dissipativity approach, we establish the stability condition for the feedback connection of a deterministic dynamical system $Sigma$ and a stochastic memoryless map $Psi$. After that, we extend the result to the class of large scale systems in which: $Sigma$ consists of many sub-systems; and $Psi$ consists of many "stochastic actuators" and "probability controllers" that control the actuator's output events. We will demonstrate the proposed approach by showing the design procedures to globally stabilize the manufacturing systems while locally balance the stock levels in any production process.




tab

How Personalized Landing Pages Can Make Your Site More Profitable

Personalization is one of the most effective marketing techniques to connect with customers online. While the exact methods are different for every business, adding personalized elements to landing pages is a proven method of driving conversions on your site. But why is it so successful? The simple answer is that personalization shows customers that you […]

The post How Personalized Landing Pages Can Make Your Site More Profitable appeared first on WebFX Blog.




tab

The Complete Tutorial on the Top 5 Ways to Query Your Relational Database in JavaScript - Part 2

Welcome back! In the first part of this series, we looked at a very "low-level" way to interact with a relational database by sending it raw SQL strings and retrieving the results. We created a very simple Express application that we can use as an example and deployed it on Heroku with a Postgres database.

In this part, we're going to examine a few libraries which build on top of that foundation, adding layers of abstraction that let you read and manipulate database data in a more "JavaScript-like" way.




tab

Best match processing mode of decision tables

An input combination of at least one condition value to be evaluated against at least one rule of a decision table is received. The at least one rule includes at least one condition and the rule is associated with a result. The at least one rule is evaluated against the input combination to determine conditions fulfilled for the at least one condition value. In one aspect, a rule from the at least one rule that best matches the input combination is determined and a result associated with the rule that best matches the input combination is outputted.




tab

Learning rewrite rules for search database systems using query logs

Methods and arrangements for conducting a search using query logs. A query log is consulted and query rewrite rules are learned automatically based on data in the query log. The learning includes obtaining click-through data present in the query log.




tab

Data mining and model generation using an in-database analytic flow generator

Embodiments are described for a system and method of providing a data miner that decouples the analytic flow solution components from the data source. An analytic-flow solution then couples with the target data source through a simple set of data source connector, table and transformation objects, to perform the requisite analytic flow function. As a result, the analytic-flow solution needs to be designed only once and can be re-used across multiple target data sources. The analytic flow can be modified and updated at one place and then deployed for use on various different target data sources.




tab

Coated conductor with voltage stabilized inner layer

Disclosed are polymeric compositions with improved breakdown strength. The polymeric compositions contain a polyolefin and a voltage stabilizing agent. The voltage stabilizing agent contains a triazine. The triazine may include a substituent that enables keto-enol tautomerism, which provides the voltage stabilizing agent with additional energy dissipation capacity. The present polymeric compositions exhibit improved breakdown strength when applied as an insulating layer for power cable.




tab

Piperidine compounds and their use as stabilizers

Compounds of formula (I) ##STR1## in which R1 is hydrogen, O°, CN, NO, cyanomethyl, C1 -C12 -alkyl, C3 -C12 -alkenyl or C3 -C12 -alkynyl subject to the proviso that the carbon atom attached to the nitrogen atom is a primary carbon atom, C7 -C12 -aralkyl, C1 -C12 -acyl, 2,3-epoxypropyl, OH-monosubstituted C2 -C6 -alkyl or 2,3-dihydroxypropyl, R2 is hydrogen, C1 -C18 -alkyl, C5 -C18 -cycloalkyl, C6 -C18 -aryl or C7 -C18 -aryalkyl, R3 is C6 -C18 -aryl or a group of the formula (II) ##STR2## in which R1 is as defined above, n is an integer from 1 to 4 and R4 is an organic or inorganic radical of a valency equal to n are useful for stabilizing organic material against oxidative, thermal and/or light induced degradation.




tab

Certain heterocyclic substituted diphosphonate compounds pharmaceutical compositions, and methods of treating abnormal calcium and phosphate metabolism

The present invention relates to novel heterocycle-substituted diphosphonic acids, and the pharmaceutically-acceptable salts and esters thereof, in which the diphosphonate-substituted carbon atom moiety is attached to a carbon atom in a nitrogen-containing six membered ring heterocycle, preferably a piperidine ring. The heterocycle-substituted diphosphonic acid compounds have the general structure: ##STR1## wherein Z is a nitrogen-containing six membered ring heterocycle moiety selected from piperidinyl, diazinyl and triazinyl; m, n and m+n are from 0 to 10; Q is a covalent bond or a moiety selected from oxygen, sulfur or nitrogen; and R1, R2, R3 and R4 are substituent groups.The present invention further relates to pharmaceutical compositions containing these novel compounds. Finally this invention relates to methods for treating or preventing diseases characterized by abnormal calcium and phosphate metabolism by utilizing a compound or pharmaceutical composition of the present invention.




tab

Carbohydrate substituted dibenzo[D,G][1,3,2]dioxaphosphocin stabilizers

Carbohydrate substituted dibenzo[d,g][1,3,2]dioxaphosphocin compounds of formula I ##STR1## where A is a carbohydrate residue are effective stabilizers for polymers processed at elevated temperatures and subject to thermal or oxidative degradation.




tab

Carbohydrate substituted dibenzo[d,f][1,3,2]dioxaphosphepin stabilizers

Carbohydrate substituted dibenzo[d,f][1,3,2]dioxaphosphepin compounds of formula I ##STR1## where A is a carbohydrate residue are effective stabilizers for polymers processed at elevated temperatures and subject to thermal or oxidative degradation.




tab

Powder comprising stabilized zirconia granules and a binder having Tg of 25C or lower

The invention relates to a granulated powder intended, in particular, for the production of ceramic sintered parts, said powder having the following chemical weight composition, based on dry matter, namely: a zirconia stabiliser selected from the group containing Y2O3, Sc2O3, MgO, CaO, CeO2, and mixtures thereof, the weight content of stabiliser, based on the total zirconia and stabiliser content, being between 2% and 20% and the MgO+CaO content being less than 5% based on the total zirconia and stabiliser content; at least 1% of a first binder having a glass transition temperature less than or equal to 25° C.; 0-4% of an additional binder having a glass transition temperature greater than 25° C.; 5-50% alumina; 0-4% of a temporary additive different from the first binder and the additional binder, the total content of the first binder, the additional binder and the temporary additive being less than 9%; less than 2% impurities; and ZrO2 to make up 100%. According to the invention, the median diameter D50 of the powder is between 80 and 130 μm, the percentile D99.5 is less than 500 μm and the relative density of the granules is between 30% and 60%.




tab

Method for increasing thermal stability of a fuel composition using a solid phosphoric acid catalyst

This invention relates to a method for increasing thermal stability of fuel, as well as in reducing nitrogen content and/or enhancing color quality of the fuel. According to the method, a fuel feedstock can be treated with a solid phosphoric acid catalyst under appropriate catalyst conditions, e.g., to increase the thermal stability of the fuel feedstock. Preferably, the fuel feedstock can be treated with the solid phosphoric acid catalyst at a ratio of catalyst mass within a contact zone to a mass flow rate of feedstock through the zone of at least about 18 minutes to increase the thermal stability of the fuel feedstock, along with reducing nitrogen content and/or enhancing color quality.




tab

Salts of dehydroacetic acid as a pyrithione stabilizer in plastics

The invention provides a method for preventing discoloration of pyrithione-containing materials, in particular plastic materials or other material such as paints, coatings, adhesives or textiles which are exposed to an outdoor environment. The method is likewise suited for preventing discoloration of other pyrithione-containing materials such as personal care compositions like shampoos. A discoloration inhibitor that includes dehydroacetic acid or a salt thereof is added to the pyrithione-containing material. The discoloration is prevented without the addition of a cyclic organic phosphoric acid ester or an organic phosphite. Use of the discoloration inhibitor does not interfere with the antimicrobial effect of the pyrithione.




tab

Additive process for production of dimensionally stable three dimensional objects

Generally, compositions and methods of producing dimensionally stable three dimensional objects using an additive build up process. Specifically, materials combinable in an additive build up process using a materials printer for the production of stable three dimensional molds useful in the production of molded or formed parts.