text stringlengths 8 5.77M |
|---|
Q:
IKImageView resize is blocky
I am putting an image into an IKImageView, and immediately sizing it to fit. Whenever I do this, the image originally appears at 1-1 size (huge) and then resizes down, which would be fine if the animation was smooth. However, the animation looks ... fluttery? There are big blocks, like 2 inches square, of the image that appear and shrink independently of each other. The effect is a little annoying, and almost to the level where it might give an epileptic a seizure... (I'm exaggerating a little).
Is this a bug in IKImageView? Is it a bug in the animation? Will it go away if I turn off the animation (How do I do that? setAnimates: NO doesn't seem to do anything, nor does overloading animates to return NO in my subclass...
EDIT: addedcode:
NSImage* image = [doc currentImage];
[imageView setImage: image];
[imageView zoomImageToFit: self];
This is in the app controller, so self is the application (or plugin, depending on which version I'm looking at)
A:
If you tell the IKImageView to autoresize, then it won't animate the new image to the new size and the artefacts will not be a problem. The image will be sized to fit in the image view immediately.
imageView.autoresizes = YES;
|
Q:
If $a+b+c \ge 1$ and $a,b,c>0$, prove that $\frac{1}{2a+s}+\frac{1}{2b+s}+\frac{1}{2c+s} \ge \frac{1}{s}$, where $s=ab+bc+ca$.
What I know is that $$s \le \frac{(a+b+c)^2}{3} \ge \frac{1}{3}$$But as you can see the sign is pointing to different sides. So I can't see how this could be helpful. Just a small observation. I don't have any other ideas and I'd like to get some help. Thanks.
A:
first we prove $a+b+c=1$ case:
$\dfrac{1}{2a+s}+\dfrac{1}{2b+s}+\dfrac{1}{2c+s} \ge \dfrac{1}{s} \iff s^3+s^2-4abc\ge 0$
let $x=3a,y=3b,z=3c,3u=x+y+z=3,3v^2=xy+yz+xz=9s,w^3=xyz=27abc$
$s^3+s^2-4abc\ge 0 \iff v^6+3v^4-4w^3 \ge 0 \iff v^6+3v^4\ge 4w^3$
accoding to $uvw$ method, $w^3\le 3v^2-2+2\sqrt{(1-v^2)^3}$
$\iff v^6+3v^4 \ge 12v^2-8+8\sqrt{(1-v^2)^3} \iff v^6+3v^4 -12v^2+8\ge 8\sqrt{(1-v^2)^3} \iff (v^6+3v^4 -12v^2+8)^2 \ge 64(1-v^2)^3 \iff v^{12}+6v^{10}-15v^8+8v^6 \ge 0 \iff v^6+6v^4-15v^2+8 \ge 0 \iff (v-1)^2(v^2+8)(v+1)^2\ge 0$
when $v=1$ the "="hold $\implies x=y=z=1 \implies a=b=c=\dfrac{1}{3}$
for $a'+b'+c'>1$, let$ a'+b'+c'=k(a+b+c) \to k > 1, ,a'=ka,b'=kb,c'=kc,s'=k^2s$
$\dfrac{1}{2a'+s'}+\dfrac{1}{2b'+s'}+\dfrac{1}{2c'+s'} \ge \dfrac{1}{s'} \iff \dfrac{1}{2\frac{a}{k}+s}+\dfrac{1}{2\frac{b}{k}+s}+\dfrac{1}{2\frac{c}{k}+s} \ge \dfrac{1}{s}$
$\frac{a}{k} < a \implies \dfrac{1}{2\frac{a}{k}+s}>\dfrac{1}{2a+s} $ so the inequlity hold.
QED.
|
J-S49044-18
2018 PA Super 288
COMMONWEALTH OF PENNSYLVANIA : IN THE SUPERIOR COURT OF
: PENNSYLVANIA
:
v. :
:
:
ELIUD MONTANEZ-CASTRO :
:
Appellant : No. 462 MDA 2018
Appeal from the Judgment of Sentence December 28, 2017
In the Court of Common Pleas of Dauphin County Criminal Division at
No(s): CP-22-CR-0003013-2016
BEFORE: SHOGAN, J., STABILE, J., and STEVENS*, P.J.E.
OPINION BY STEVENS, P.J.E.: FILED OCTOBER 22, 2018
Appellant, Eliud Montanez-Castro, appeals from the judgment of
sentence entered in the Court of Common Pleas of Dauphin County, which,
sitting as finder of fact in his non-jury trial, found him guilty of luring a child
into a motor vehicle, disorderly conduct, and harassment.1 Sentenced to
serve an eleven-and-one-half to 23-month sentence of incarceration, to be
followed by one year of probation, Appellant challenges the sufficiency of the
evidence with respect to his conviction for luring a child into a motor vehicle.
We affirm.
The trial court sets forth the pertinent facts and procedural history, as
follows:
On April 15, 2016, the two minors (T.G. and M.R.) were walking
to school. Neither recalled inclement weather or any sort of
natural disaster that would prompt anyone to offer a ride. As they
____________________________________________
1 18 Pa.C.S. §§ 2910(a), 5503(a)(4), and 2709(3), respectively.
____________________________________
* Former Justice specially assigned to the Superior Court.
J-S49044-18
were walking along South Harrisburg Street, a white car sharply
turned left from Walnut Street onto South Harrisburg Street. It
pulled up to the curb beside them, with the driver’s side window
closest. The window was open and the driver, Appellant, asked
them to pick a number. The minors stopped walking and after
being confused, each picked a number. After T.G. picked a
number, Appellant said “Mommy, you were right” and that she
won a prize. T.G. thought this was all odd.
Appellant held out a soda can and water bottle with no label and
told her to pick on[e]. T.G. refused. Both girls recalled that
[Appellant] held the drinks out with bent elbows, not arms
extended, and was fairly close [just several feet away]. T.G. and
M.R. recognized that T.G. would have had to approach the car,
though, to take one of the drinks. T.G. and M.R. were nervous
and scared after this interaction and walked quickly to school.
Appellant never asked her to enter the car or go anywhere with
him. He never asked them to approach closer, he never
threatened them, he never commanded or directed them to do
anything, and he never opened the door. Appellant did not follow
them. Upon arriving at school, T.G. told the principal what had
happened.
Sometime later, T.G. viewed a photo array with Detective
Robbins. He showed her pictures one at a time and she
immediately identified picture six as the man who had approached
her. M.R. also viewed a photo array complied [sic] by Detective
Morris. He used the same technique as [Detective] Robbins and
showed M.R. pictures one by one until she identified one as the
man she had seen in the car.
M.R. recalled that some days later, she and T.G. were on the porch
when T.G. pointed out a man to her. M.R. looked and recognized
Appellant on the sidewalk. He looked up at them and they went
inside because they were scared.
Counsel presented a stipulation that Appellant did not have the
expressed or implied permission of any parent or guardian of the
victims in this case to give them a ride anywhere.
***
Following a trial by judge on [October 18, 2017], Appellant was
found guilty [of all charges and sentenced as indicated, supra].
-2-
J-S49044-18
On March 6, 2018, [the trial court] received a timely Notice of
Appeal filed with the Superior Court of Pennsylvania. [The trial
court] ordered Appellant on March 7, 2018, to file a concise
statement of matters complained of on appeal pursuant to
Pa.R.A.P. 1925(b). Appellant complied with said Order on March
26, 2018.
Trial Court Opinion, 8/6/18, at 1-3.
Appellant presents one question for our consideration:
I. [WAS] THE EVIDENCE PRESENTED AT TRIAL [ ]
INSUFFICIENT TO CONVICT APPELLANT OF THE
CRIME OF LURING A CHILD INTO A MOTOR VEHICLE
AND DISORDERLY CONDUCT WHEN THE APPELLANT
MERELY OFFERED A SODA TO A GIRL(S) [SIC]
THROUGH A PASSENGER WINDOW OF HIS VEHICLE
BUT NEVER OFFERED A RIDE TO THE GIRL(S) OR
PULLED THEM CLOSER TO HIS VEHICLE[?]
Appellant’s brief, at 4.
Our standard of review for challenges to the sufficiency of the evidence
is well-settled:
The standard we apply in reviewing the sufficiency of the evidence
is whether viewing all the evidence admitted at trial in the light
most favorable to the verdict winner, there is sufficient evidence
to enable the fact-finder to find every element of the crime beyond
a reasonable doubt. In applying [the above] test, we may not
weigh the evidence and substitute our judgment for the fact-
finder. In addition, we note that the facts and circumstances
established by the Commonwealth need not preclude every
possibility of innocence. Any doubts regarding a defendant's guilt
may be resolved by the fact-finder unless the evidence is so weak
and inconclusive that as a matter of law no probability of fact may
be drawn from the combined circumstances. The Commonwealth
may sustain its burden of proving every element of the crime
beyond a reasonable doubt by means of wholly circumstantial
evidence. Moreover, in applying the above test, the entire record
must be evaluated and all evidence actually received must be
considered. Finally, the [finder] of fact while passing upon the
-3-
J-S49044-18
credibility of witnesses and the weight of the evidence produced,
is free to believe all, part or none of the evidence.
Commonwealth v. Harden, 103 A.3d 107, 111 (Pa.Super. 2014) (citation
omitted).
Appellant argues that evidence failed to support his conviction on the
charge of luring a child into a motor vehicle. Merely talking with the girls and
offering them drinks from his car window, without ever inviting or
commanding them to enter his vehicle, fails to satisfy the first evidentiary
requirement of attempting to lure a child into a vehicle, he submits. On this
point, he elaborates:
The Commonwealth failed to establish that Appellant lured or
attempted to lure either lady into his motor vehicle. In this case,
neither lady called 911. Neither lady testified that he said “get in
the car” or offered them to get into the vehicle [sic] or that he
pulled them into the car. He never opened the rear car door for
them to get in. He did not even say “come here.” He did not
beckon them. He did not threaten them. He did not command
them to come closer or open the door. At no time did he even
touch them.
Appellant’s brief, at 9.2
The pertinent statute provides: “(a) Offense.—Unless the
circumstances reasonably indicate that the child is in need of assistance, a
person who lures or attempts to lure a child into a motor vehicle or structure
____________________________________________
2 Throughout the “Brief for Appellant,” counsel repeatedly refers to the two
minor girls in question as “ladies.” Assigning an adult title to minors subjected
to an offense that frequently involves the actual or attempted sexual abuse of
a child is unacceptable, particularly where clear sexual overtones attended
Appellant’s conduct toward the girls. Therefore, we strongly admonish counsel
for what was, at best, a careless description of the minor victims in this case.
-4-
J-S49044-18
without the consent, express or implied, of the child's parent or guardian
commits an offense.” 18 Pa.C.S. § 2910(a). As stated by our Supreme Court:
Section 2910 ... sets forth three requirements the Commonwealth
must establish beyond a reasonable doubt to convict an individual
of the offense of attempted luring of a child into a motor vehicle:
(1) the individual attempted to lure a child into a motor vehicle;
(2) without the express or implied consent of the child's parent or
guardian; and (3) under circumstances which did not reasonably
indicate the child is in need of assistance.
Commonwealth v. Hart, 28 A.3d 898, 908–09 (Pa. 2011). The Court has
explained further that “a ‘lure’ involves the making of a promise of pleasure
or gain, the furnishing of a temptation or enticement, or the performance of
some other affirmative act calculated to strongly induce another individual to
take a particular action, usually and most often likely to result in his or her
harm.” Id at 909.
Here, two ninth-grade girls walking to school witnessed Appellant
abruptly turn his vehicle off the course he was traveling and drive onto the
curb alongside where they were walking. He immediately stopped the girls
and engaged them in conversation, invited each to “pick a number,” and
offered to the girl whom he declared the winner a bottled drink as her prize.
In order to claim her prize, however, the girl, whom Appellant was now
calling “Mommy,” was required to walk up to Appellant’s car window. There
Appellant awaited, holding the bottle with his arm bent inward toward himself
so that the girl would have to come right to his side to retrieve it. The girls
were scared and nervous at this point, and they walked away.
-5-
J-S49044-18
When viewed in a light most favorable to the Commonwealth as verdict
winner, the totality of circumstances allows for the reasonable inference that
Appellant did not stop two random girls on their way to school to give them a
drink and send them on their way. Appellant was, instead, attempting to
entice at least one girl to come within his area of control as he waited in his
car, and he used his apparent brand of charm and a bottled drink—kept closely
to his side—as a lure to achieve this end.
Indeed, Appellant neither knew the girls nor had any reason to believe
they were in need of assistance. Yet, he stopped them anyway. He
immediately focused on one girl, declared her a winner, gave her the
suggestive pet name “Mommy,” and invited her to come to him where he sat
in his car and claim her prize.
Therefore, it was reasonable for the finder of fact to conclude, beyond a
reasonable doubt, that Appellant’s affirmative actions, manipulative and
suggestive words, and enticements were designed to gain the minor girl’s
entry into his car to her own detriment. Accordingly, evidence adduced at
trial sufficed to establish that Appellant committed the offense of attempting
to lure a child into his vehicle.3
Judgment of sentence affirmed.
____________________________________________
3 Although Appellant’s “Statement of the Question Presented” also raises a
sufficiency challenge to his disorderly conduct conviction, he presents no
argument to support this claim. Therefore, he has waived this claim. See
Pa.R.A.P. 2119(c); Commonwealth v. Plante, 914 A.2d 916 (Pa.Super.
2006) (failure to develop an argument with citation to authority waives the
issue on review).
-6-
J-S49044-18
Judgment Entered.
Joseph D. Seletyn, Esq.
Prothonotary
Date: 10/22/2018
-7-
|
A survey of vitamin D level in people with learning disability in long-stay hospital wards in Hong Kong.
Serum vitamin D level was measured in 122 patients with learning disabilities in long-term care wards. Such people are at risk of developing vitamin D deficiency. Low vitamin D is often attributed to lack of sunshine, poor dietary intake and the deleterious effect of anticonvulsant therapy. The results of this study confirmed that a low level of vitamin D (14.38 +/- 7.9 nmol/l) prevails, regardless of anticonvulsant usage. Sunshine exposure was virtually non-existent for most patients. Research has shown that when sunlight exposure is limited, osteomalacia in the British Asian community is determined by dietary factors. Our subjects had three types of diet: standard, soft and tube feeding. For both males and females, the tube feeding group had a significantly higher mean level of vitamin D than the other groups. Regular sunshine exposure is recommended for people requiring long-term infirmary care; alternatively, dietary supplement of vitamin D should be considered. |
Packard Society: Leadership Giving
Vision. Leadership. Philanthropy.
The Packard Society is a community of distinguished alumni, parents, and friends who have a passion for Tufts and play a leadership role in supporting the university with their annual gifts to the Tufts Fund for Arts, Sciences, and Engineering.
These donors have chosen to make the university a philanthropic priority, and their gifts serve as a commitment to provide students with a rich experience and a powerful education. They are supporting extraordinary faculty and creating positive change on campus and across the globe.
Together, these leaders are lighting the way to an even brighter future for Tufts.
Facts and Figures
Financial aid has increased more than 60 percent in the last decade.
Each year, more than 2,700 alumni, parents, and friends give to the Tufts Fund at leadership levels.
Parents contribute more than $1.3 million annually in support of the Tufts Fund.
Deans' Inner Circle members are a select group within the Packard Society. These giving levels are an opportunity to commemorate the years and achievements since your graduation from Tufts. Leadership gifts at the Deans' Inner Circle level assist the university in preparing outstanding leaders, provide resources for financial aid, research, and internships, and nurture exploration of life beyond Tufts. Young alumni are especially encouraged to use this opportunity to support Tufts at a leadership level.
All Deans' Inner Circle members are also members of the Packard Society. |
Introduction
============
The detection of polypoid lesions of the gallbladder (PLGs) has increased significantly due to the widespread use of ultrasonography (US) imaging techniques ([@b1-ol-05-05-1629]--[@b3-ol-05-05-1629]). US is the first choice in the diagnosis of this disease and enhanced computed tomography (CT) and magnetic resonance imaging (MRI) confirm its nature ([@b4-ol-05-05-1629]--[@b8-ol-05-05-1629]). Many studies have indicated that the size of tumor is vital for diagnosis. A diameter \>10 mm is regarded as the threshold for malignancy ([@b3-ol-05-05-1629],[@b9-ol-05-05-1629]--[@b11-ol-05-05-1629]). In this study, a large tumor size did not necessarily mean that the lesion was malignant; the configuration of the tumor and the gallbladder wall and the existence of space between the two were the main indicators of the nature of the lesion. This knowledge will enable optimal management of this type of patient. In this article, a retrospective analysis of clinical data of PLG patients over a 5-year time period was performed.
Materials and methods
=====================
Patients
--------
The study was approved by the Ethics Committee of Zhejiang Provincial People's Hospital, Hangzhou, China. The study was retrospective so consent was not required. Two qualified radiologists reviewed images from 130 patients from 2005 to 2011 with PLGs larger than 10 mm who consented to the removal of the gallbladder or biopsy. All patients were pathologically diagnosed by routine postoperative examination; the age of patients ranged from 28 to 82 years old.
CT, MR and US protocol
----------------------
Patients fasted for at least 8 h before examination; no oral contrast medium or water was administered. CT examinations were performed using Phlilips Brilliance 16 (Philips Medical Systems, Best, Netherlands). Each patient received 100 ml of a nonionic contrast material (iopromide; Ultravist 370, Bayer HealthCare, Berlin, Germany) through an 18-gauge angiographic catheter inserted into a forearm vein. CT scans were routinely obtained with the patient in a supine position. The contrast material was injected at a rate of 3 ml/sec with an automatic power injector. Magnetic resonance cholangiopancreatography was taken using a Siemens 3.0 Tesla MR magnet (Megnetom Trio; Siemens AG, Erlangen, Germany); sonography was performed using Esaote MyLab 70 (Esaote SPA, Genova, Italy) with 1--8 MHz linear array probes or a Toshiba (Applio XG 790; Toshiba, Tokyo, Japan) with 3--6 MHz 6C1 probes. Specific attention was given to the size and the base of the lesion, the space between the lesion and the wall, and the configuration of the wall to elucidate the differences between benign and malignant lesions.
Results
=======
Patient characteristics
-----------------------
Twenty-two patients were diagnosed as malignant by CT and 20 of them were confirmed by biopsy or postoperative pathological examination. Two patients with lesions larger than 50 mm were suspected to be malignant preoperatively but were benign on histological examination. One patient had two polypoid lesions. On pathological examination one was benign and the other was malignant ([Table I](#t1-ol-05-05-1629){ref-type="table"}).
Differences in morphology between large adenoma and protruding type cancer
--------------------------------------------------------------------------
Before the operation, 2 patients were diagnosed with gallbladder cancer due to the large size of their tumors but these were revealed to be adenoma. One was tubular adenoma and the other was rare villious adenoma. Following CT scans, the villious adenoma turned out to be akin to dendritic processes; there were spaces within the mass, the surface had no contraction and the whole shape appeared to be natural like dendritic processes in the MRI scan ([Fig. 1](#f1-ol-05-05-1629){ref-type="fig"}). The CT and MRI image of the tubular adenoma was different from that of villious adenoma, the appearance was similar to a congregation of mulberries ([Fig. 2](#f2-ol-05-05-1629){ref-type="fig"}). In contrast, the surface of the malignant tumor was uneven, the enhancement of the solid entity of the tumor seemed to be inhomogenous and grew in a solid mass ([Fig. 3](#f3-ol-05-05-1629){ref-type="fig"}). In [Fig. 4](#f4-ol-05-05-1629){ref-type="fig"}, where a benign and malignant tumor grew together in the same gallbladder, the malignant tumor became more enhanced than the benign one ([Fig. 4](#f4-ol-05-05-1629){ref-type="fig"}).
Difference in the base size of the tumor, and the space between the tumor and the gallbladder wall
--------------------------------------------------------------------------------------------------
The base of the benign polypus was smaller than the malignant one and there was space between the tumor and the gallbladder wall. In the case of tubular adenoma, the CT and MR images showed that the mass had almost no contact with the gallbladder wall and the whole mass appeared to be floating in the water. Macroscopically, the mass was connected to the wall of the gallbladder with small and slender fibers and could easily be removed from the wall of the gallbladder, while the gallbladder wall remained smooth with integrity ([Fig. 2](#f2-ol-05-05-1629){ref-type="fig"}). In the case where benign and malignant tumors coexisted, there was a space between the wall and the tumor, while the space disappeared between the malignant tumors and the wall ([Fig. 4](#f4-ol-05-05-1629){ref-type="fig"}). In the case where the lesion was a polypoid with a slender pedicel, the CT scan showed a strip parallel with the wall resembling a trailing plant, and was separated from the wall by a narrow space ([Fig. 5](#f5-ol-05-05-1629){ref-type="fig"}). In contrast, the base of the protruding carcinoma was wide, the space between the polypus and the gallbladder wall disappeared and the enhancement became more evident close to the base of the tumor ([Figs. 4](#f4-ol-05-05-1629){ref-type="fig"} and [6](#f6-ol-05-05-1629){ref-type="fig"}).
Shape of the gallbladder wall
-----------------------------
The gallbladder wall with the benign tumor was smooth and soft, had the normal thickness and normal extent of enhancement, with the normal space between the wall and the liver. The wall of malignant lesions, however, became thicker and stiff and the space became obscure. In some cases it disappeared. In certain cases, the wall had broken and the lesion had infiltrated the liver parenchyma, which was a sign of a malignant lesion.
Discussion
==========
Polypoid lesions of the gallbladder are an imaging feature, which indicate a wide variety of pathology. They affect ∼5% of the adult population ([@b3-ol-05-05-1629],[@b12-ol-05-05-1629],[@b13-ol-05-05-1629]). Although most of these lesions are benign, some early carcinomas of the gallbladder present as polypoid lesions; malignant transformation is always a concern. The differentiation of benign and malignant lesions can be challenging. Several features, including patient age, tumor size and the speed of growth of the lesions, are important discriminating features between benign and malignant polyps. Many studies have shown that age \>50 years and a polyp size \>1 cm are the two most important factors predicting malignancy in polypoid lesions of the gallbladder ([@b3-ol-05-05-1629],[@b9-ol-05-05-1629]--[@b11-ol-05-05-1629]).
Microscopically, malignant tumors no longer possess the normal structure of the original tissue. There is frequent necrosis and subsequent repair within the tumor; the surface of a malignant tumor is often uneven and the whole configuration is unnatural and becomes stiff ([@b14-ol-05-05-1629]). Growing in an infiltrative way, the malignant tumors invade neighboring tissue; thus, the demarcation between the tumor and the normal tissue is obscure. Benign tumors do not grow uncontrollably; most benign tumors have a similar structure to the tissue they originate from and do not invade neighboring tissues and spread throughout the body. Since adenoma has the structure of gland tube, which is characterized by short fibrovascular stalks that are covered by dysplastic or neoplastic cells, the CT and MR images of large adenoma have the similar shapes, akin to float grass. In contrast, gallbladder cancer infiltrates the base and there is necrosis on the inside of the tumor and the image appears to be inhomogenous without a natural texture. Macroscopically, the gallbladder tumors are classified into the protruding, flat or infiltrative type ([@b15-ol-05-05-1629]). US, CT and MR images are used to classify these types ([@b8-ol-05-05-1629],[@b16-ol-05-05-1629]--[@b20-ol-05-05-1629]).
In this study, pathological differences in the shape and texture of the mass, the base of the mass, the space between the tumor and gallbladder wall, and the changes of the gallbladder wall were used to determine whether the lesion was benign or malignant. The results support the differences between large adenoma and protruding type carcinoma. In gallbladder adenoma, even though the lesions were very large there were still spaces within the tumor, indicating that the tumor was not a solid mass; in the villous adenoma, the spaces were narrow and resembled dendritic processes; in the tubular adenoma, the spaces were irregular. Microscopically, this kind of spaces exist between the fibrovascular stalks that are covered with gland. Since the malignant tumor grows in an infiltrative way and always has a wide base, there is no space between the tumor and the gallbladder wall and the gallbladder walls are always thickened and contracted; the spaces between the gall-bladder wall and the liver disappear when the tumors break the gallbladder wall and invade the liver parenchyma.
Many studies have demonstrated that lesion size and patient age are strong indicators of a malignant tumor. In this study, the large size of polypoid lesions of the gallbladder did not necessarily mean the tumor was malignant. A possible reason for this may be that the cancerous change needs time and the speed of this change is relatively slow. Conversely, small adenoma does not always mean benign. According to a study conducted by Roa *et al*([@b21-ol-05-05-1629]), adenomas associated with cancer may measure \<5 mm. Using polyp size to decide surgical behavior may, therefore, be misleading. Adenoma is a precancerous disease which could transform to adenocarcinoma in an adenoma-dysplasia-cancer manner ([@b22-ol-05-05-1629],[@b23-ol-05-05-1629]). A protruding type of gallbladder was likely the result of adenoma under continuing stimuli such as gallstones or chronic inflammation. In this study, the co-existence of a benign and malignant tumor in one patient was evidence of this theory.
Although it is difficult to discriminate between large adenoma and cancer, removing the gallbladder by open laparotomy is usually the first choice of treatment for these two diseases. However, in an era of minimally invasive surgery, both doctors and patients prefer to choose laparoscopic cholecystectomy. Size may not be the key indicator to discriminate benign from malignant lesions, or the indication for a laparoscopic or open procedure. Preoperative images indicate that the feasibility of laparoscopic cholecystectomy mainly depends on the lesion's configuration; they should be confined to the lumen of the gallbladder, the wall of the gallbladder should be smooth and thin and the space between the wall and liver should be clear; this indicates that the separation of the gallbladder from the liver should be relatively simple. Many articles have reported that even PLGs with a diameter \>1.5 mm, a potential early-stage cancer, could still be resected by laparoscopic cholecystectomy with full-thickness dissection ([@b24-ol-05-05-1629]--[@b26-ol-05-05-1629]). The key issue with such surgery is to maintain the integrity of the gallbladder and protect the Trocar port in order to avoid the dissemination of the cancer in case the lesion is malignant ([@b27-ol-05-05-1629],[@b28-ol-05-05-1629]).
{#f1-ol-05-05-1629}
{#f2-ol-05-05-1629}
{#f3-ol-05-05-1629}
{#f4-ol-05-05-1629}
{#f5-ol-05-05-1629}
{#f6-ol-05-05-1629}
######
Patients' clinical data.
Characteristics No. Percentage
-------------------------------- --------- ------------
Total (n=130)
Benign 110/130 85
Malignant 20/130 15
Malignant (n=20)
Platform 13/20 65
Protruding lesions 7/20 35
Female 16/20 80
Male 4/20 20
Benign (n=110)
Lesion \>20 mm 8/110 7
Lesion \>50 mm 2/110 1.8
Laparoscopic cholecystectomy 102/110 93
Open cholecystectomy 8/110 7
|
Joe Biden’s disastrous results in Iowa and New Hampshire have spooked Democratic donors who are preparing to jump ship and throw their money behind someone else — even as his campaign vowed Wednesday that the best is yet to come.
New York heavyweight donors raising money for Biden are alarmed by the former vice president’s fifth-place finish in the New Hampshire primary and are privately wondering whether he can make it to Super Tuesday on March 3.
“There’s a great deal of concern,” said a donor who is bundling contributions for a Biden fundraiser in New York Thursday.
“It wasn’t expected that he would perform great in Iowa or New Hampshire. But we did not anticipate that he would fare this poorly. It was a significant decline,” said the bundler, who requested anonymity.
Still, the Biden campaign was trying to project an image of strength Wednesday.
His camp released a new ad on social media that optimistically declared, “This is only getting started” — after he bolted from the Granite State before the polls had closed.
Biden even gave a speech to the supporters he’d abandoned in New Hampshire, from South Carolina on Tuesday night as the dreadful results rolled in and staff began panicking.
“This is horrendous. We’re all scared,” a Biden adviser told Politico. “I think we’re going to make it to South Carolina. I know we’re supposed to say we’re going to and we’re going to win. But I just don’t know.”
Gov. Andrew Cuomo is believed to have helped Biden’s struggling campaign raise money, but the feeling among Democrats is turning grim.
“The word that is going around most of my colleagues in politics is that it’s sad,” veteran Democratic consultant George Arzt said. “No one wants someone to end their political career on a down note. He is a very decent man.”
There’s also the Mike Bloomberg factor. The billionaire former three-term mayor has peeled off support from Biden in New York’s corporate class, sources said.
“Even before this setback, Biden has struggled to raise money this election cycle. It’s hard to see how he raises the money to propel him forward,” one source told The Post. “I know a lot of people who are with Bloomberg.”
Kathryn Wylde, head of the NYC Partnership, said a lot of the regular New York Democratic donors are still with Biden, but now “some are holding out” for Bloomberg.
Another source said Bloomberg has won over some corporate honchos who’ve regularly contributed to Cuomo’s campaigns.
Cuomo on Wednesday conceded that while the former veep had “not done well,” he was not ready to give up on him yet. |
1. Field of the Invention
The present invention relates to a toner suitable for electrophotography, electrostatic recording, electrostatic printing and the like, to an efficient production process for the same, and to an image forming method using the toner.
2. Description of the Related Art
Image forming based on electrophotography generally involves a series of the following individual steps: a latent electrostatic image formation step in which using a variety of means a latent electrostatic image is formed on a photosensitive layer having photoconductive substances; a developing step in which the formed latent electrostatic image is developed by application with toner to form a toner image; a transferring step in which the toner image is transferred to a recording member such as paper; a fixing step in which the toner image transferred to the recording member is fixed thereto by applying heat, pressure, heat/pressure, or solvent's vapor; and a cleaning step in which toner particles remained with the photosensitive layer are removed, for example.
It is required that toners for electrophotography be produced by more energy-saving, environment-friendly processes. The conventional method of kneading and pulverization is employed in current toner production processes.
In such toner production processes that use the kneading and pulverization method, how uniformly each constituent material is dispersed and pulverized is important to ensure that the resultant toner particles have uniform shapes. In general, toner particles have amorphous shapes with randomly-sized cross sections, and control of the shape or structure of toner particles become very difficult. Moreover, when coloring materials, releasing agents, charge-controlling agents and the like are added to the toner, these additives tend to migrate to the surfaces of toner particles during a pulverization process because they cleavage along their crystal plane, resulting in a problem that toner characteristics (e.g., flowability and charging properties) may be reduced. e.g., variations may occur in the charging properties among individual toner particles.
Thus, in recent years, liquid media-based chemical methods (polymerization methods such as emulsion polymerization method, suspension polymerization method, dispersion polymerization method, dissolution and suspension method, and dissolution, suspension and extension method) have been used in most cases for the production of toners.
In the suspension polymerization method, toner materials containing monomers, a polymerization initiator and the like are dispersed in an aqueous medium to form oil droplets, followed by heat treatment to cause a polymerization reaction to take place for the production of toner.
In the emulsion polymerization method, toner materials containing polymers and the like are mixed with an aqueous medium to form oil droplets by allowing the toner materials to be dispersed or emulsified in or with the aqueous medium for the production of toner (see Japanese Patent Application Laid-Open (JP-A) No. 05-66600 and 08-211655).
The dissolution and suspension method is disclosed in Japanese Patent (JP-B) No. 3141783, for example.
In view of recent environmental problems, as chemical toners produced through these chemical methods (polymerization methods), chemical toners termed as “capsule toner”, “core shell toner”, etc. are available that are provided in a form that makes efficient provision of desired functions possible.
Toner production processes that involve any of the foregoing polymerization methods can produce spherical toner particles that have smaller diameters and a narrower particle size distribution than those produced by toner production processes involving the pulverization method; however, it is difficult to form droplets of desired shape in the dispersion medium, the range of choice of available materials is small, and variations occur in the charging properties among individual toner particles due to variations in the toner constituting materials. In addition, delicate controlling of the degree of emulsification is required for each color toner, resulting in poor robustness in toner production.
The most challenging problem is that toner surface becomes hydrophilic because toner is produced either in water or hydrophilic medium, reducing charging properties of toner particles and environmental characteristics with time. This may cause such problems as abnormal development and transfer operations, toner splashes, or poor image quality.
Moreover, the polymerized toners described above have a basic problem that the production process thereof entails generation of a large amount of waste solution and requires a large amount of energy for drying of produced toner particles. This may potentially increases the production costs. For this reason, an environment-friendly toner production process has been sought after in view of pollution of water resources and generation of carbon dioxide.
As a toner production process using a supercritical fluid, for example, Japanese Patent Application (JP-A) No. 2001-312098 proposes a method for producing toner particles using RESS (Rapid Expansion of Supercritical Solutions) technique. This technique, however, is applicable to only resin that can be dissolved in supercritical fluids, and provides a narrow range of choice of applicable resins. For example, the solubilities of high-molecular weight ingredients or gels (called H body) needed in the toner are of extremely low solubility. In addition, inexpensive and potent styrene-acrylic resins and polyester resins that are generally used in the toner field are also of extremely low solubility. Thus, there is a problem that they cannot be used as they are.
To solve the foregoing problems Japanese Patent Application (JP-A) No. 2004-161824, 2004-144778 and 2005-107405 propose a technique in which rather than dissolving resin in a supercritical fluid, colored resin that has been previously melted and kneaded is granulated by application of shearing force using a dispersing agent. This technology has a problem that it broadens the particle size distribution, though a wide range is ensured for the choice of materials. In particular, broader particle distributions are a critical drawback for obtaining high-resolution images as required by recent toners.
No toner production process has been provided that ensures a sharp particle size distribution and excellent toner characteristics (e.g., charging properties, environmental impact, and temporal stability), creates little waste solution, produces toner containing no monomers left over, and requires no drying process. Likewise, neither a toner produced by this toner production process nor an image forming apparatus using the toner have been provided. |
Locals in San Luis, part of the central-western Colombian province of Tolima, called the police recently after finding what they believed to be a crashed UFO in a nearby forest.
"It was smoking and a strange liquid was leaking from it," said one local resident.
Those who witnessed the strange debris were at first convinced it must have been something otherworldly.
"We all thought it was a UFO or the remains of a space craft," reported the surprised residents to local newspaper El Tiempo.
The mysterious remains were identified by local police as belonging to one of X's (formerly Google X) Project Loon balloons. The balloons are released high into the atmosphere carrying equipment meant to bring internet connections to remote locations across the globe.
"It's a technological device used by Google which moves around and is held aloft by a balloon," said Tolima police commander Jorge Esguerra. |
[](https://www.npmjs.com/package/web-webpack-plugin)
[](https://travis-ci.org/gwuhaolin/web-webpack-plugin)
[](https://www.npmjs.com/package/web-webpack-plugin)
[](https://npmjs.org/package/web-webpack-plugin)
# web-webpack-plugin
### [中文文档](https://github.com/gwuhaolin/web-webpack-plugin/blob/master/readme_zh.md)
---
想全面学习 Webpack?试试它:
<p align='center'>
<a href='http://webpack.wuhaolin.cn/'>
<img src='http://ou8vcvyuy.bkt.clouddn.com/dive-into-webpack.png' width='306px' height='411px'/>
</a>
</p>
## [在线阅读全书](http://webpack.wuhaolin.cn/)
A good alternatives for [html-webpack-plugin](https://github.com/jantimon/html-webpack-plugin), can make webpack use HTML as entry and handle multi pages.
# Install
```bash
npm i web-webpack-plugin --save-dev
```
```js
const { WebPlugin, AutoWebPlugin } = require('web-webpack-plugin');
```
# Feature
## output html file [demo](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/out-html)
**webpack config**
```js
module.exports = {
entry: {
A: './a',
B: './b',
},
plugins: [
new WebPlugin({
// file name or full path for output file, required.
// pay attention not to duplication of name,as is will cover other file
filename: 'index.html',
// this html's requires entry,must be an array.dependent resource will inject into html use the order entry in array.
requires: ['A', 'B'],
}),
],
};
```
will output an file named `index.html`,this file will auto load js file generated by webpack form entry `A` and `B`,the out html as below:
**output html**
```html
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
</head>
<body>
<script src="A.js"></script>
<script src="B.js"></script>
</body>
</html>
```
**output directory**
```
├── A.js
├── B.js
└── index.html
```
## use html template [demo](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/use-template)
**webpack config**
```js
module.exports = {
entry: {
A: './a',
B: './b',
},
plugins: [
new WebPlugin({
filename: 'index.html',
// html template file path(full path relative to webpack.config.js)
template: './template.html',
requires: ['A', 'B'],
}),
],
};
```
**html template**
```html
<!DOCTYPE html>
<html lang="zh-cn">
<head>
<meta charset="UTF-8">
<!--load a chunk file config and output in webpack-->
<script src="B"></script>
<!--load a local reset style file direct without local var webpack-->
<link rel="stylesheet" href="./reset.min.css?_inline">
<!--load a local google analyze file direct without local var webpack-->
<script src="./google-analyze.js"></script>
</head>
<body>
<!--SCRIPT-->
<footer>web-webpack-plugin</footer>
</body>
</html>
```
* use `<script src="B"></script>` in html template to load required entry, the `B` in `src="B"` means entry name config in `webpack.config.js`
* comment `<!--SCRIPT-->` means a inject position ,except for resource load by `<script src></script>` left required resource config in `WebPlugin's requires option`. if there has no `<!--SCRIPT-->` in html template left required script will be inject ad end of `body` tag.
**output html**
```html
<!DOCTYPE html>
<html lang="zh-cn">
<head>
<meta charset="UTF-8">
<!--load a chunk file config and output in webpack-->
<script src="B.js"></script>
<!--load a local reset style file direct without local var webpack-->
<style>body {
background-color: rebeccapurple;
}</style>
<!--load a local google analyze file direct without local var webpack-->
<script src="google-analyze.js"></script>
</head>
<body>
<script src="A.js"></script>
<footer>web-webpack-plugin</footer>
</body>
</html>
```
## config resource attribute [demo](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/config-resource)
every resource required by html,it can config some attribute as below:
* `_dist` only load in production environment
* `_dev` only load in dev environment
* `_inline` inline resource content info html,inline script and css
* `_ie` resource only required IE browser,to achieve by `[if IE]>resource<![endif]` comment
there has two way to config resource attribute:
### config in html template
**webpack config**
```js
module.exports = {
entry: {
'ie-polyfill': './ie-polyfill',
inline: './inline',
dev: './dev',
googleAnalytics: './google-analytics',
},
plugins: [
new WebPlugin({
filename: 'index.html',
template: './template.html',
}),
],
};
```
**html template**
```html
<!DOCTYPE html>
<html lang="zh-cn">
<head>
<meta charset="UTF-8">
<script src="inline?_inline"></script>
<script src="ie-polyfill?_ie"></script>
</head>
<body>
<script src="dev?_dev"></script>
<!--load a local google analyze file direct without local var webpack-->
<script async src="./google-analytics.js?_dist"></script>
</body>
</html>
```
[output html file](https://github.com/gwuhaolin/web-webpack-plugin/blob/master/demo/config-resource/dist-template/index.html)
### config in `webpack.config.js`
**webpack config**
```js
module.exports = {
plugins: [
new WebPlugin({
filename: 'index.html',
requires: {
'ie-polyfill': {
_ie: true,
},
inline: {
_inline: true,
_dist: true,
},
dev: {
_dev: true,
},
//load a local google analyze file direct without local var webpack
'./google-analytics.js': {
_dist: true,
},
},
}),
],
};
```
[output html file](https://github.com/gwuhaolin/web-webpack-plugin/blob/master/demo/config-resource/dist-js/index.html)
### inject attr for HTML tag [demo](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/config-html-attribute)
other attribute in config without name start with **\_** will be treat as attribute for HTML tag in output HTML file. e.g if a script resource with query `?crossorigin=anonymous` will lead to output HTML be `<script src="B.js" crossorigin="anonymous"></script>`.
## auto detect html entry [demo](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/auto-plugin)
`AutoWebPlugin` plugin can find all page entry in an directory, then auto config an `WebPlugin` for every page to output an html file, you can use it as below:
**webpack config**
```js
const autoPlugin = new AutoWebPlugin(
// the directory hold all pages
'./src/pages',
{
// all props below is not required
// {string,function}
// the template file path used by all pages
// if typeof template ===string: template config is html template file full path
// if typeof template ===function: template config is function(pageName)=>newFullPath ,ask user for detail
template: './src/template.html',
// { function(pageName,templateFullPath)=>htmlString }
// if provide AutoWebPlugin will use Compiler to compile org template file to html content before used it in WebPlugin
templateCompiler: (pageName, templateFullPath) => '',
// {string,function}
// get WebPlugin template's string content, high priority than template
// typeof===string: template config is html template file string content
// typeof===function: template config is function,ask user for detail
templateContent: `<!DOCTYPE html>....`,
// {string,function}
// javascript main file for current page,if it is null will use index.js in current page directory as main file
// typeof entry===string: entry config is entry file full path
// typeof entry===function: entry config is function(pageName)=>newFullPath ,ask user for detail
entry: null,
// {function}
// get WebPlugin output filename,default filename is pageName
// set filename as function(pageName)=>filename to add custom logic
filename: null,
// {Array} pre append to all page's entry
preEntrys: ['./path/to/file1.js'],
// {Array} post append to all page's entry
postEntrys: ['./path/to/file2.js'],
// {string} publicPath for css file,for js file will use webpack.publicPath
stylePublicPath: null,
// page name list will not ignore by AutoWebPlugin(Not output html file for this page name)
ignorePages: ['pageName'],
// whether output a pagemap.json file which contain all pages has been resolved with AutoWebPlugin in this way:
// {"page name": "page url",}
outputPagemap: true,
}
);
module.exports = {
// AutoWebPlugin will generate a entry for every page find in the directory hold all pages
// autoPlugin.entry({}) used to pass entrys find by AutoWebPlugin to webpack config
entry: autoPlugin.entry({
youAdditionalEntryName: 'you additional entry path',
}),
};
```
**src directory**
```
── src
│ ├── home
│ │ └── index.js
│ ├── ie_polyfill.js
│ ├── login
│ │ └── index.js
│ ├── polyfill.js
│ ├── signup
│ │ └── index.js
│ └── template.html
```
**output directory**
```
├── dist
│ ├── common.js
│ ├── home.html
│ ├── home.js
│ ├── ie_polyfill.js
│ ├── login.html
│ ├── login.js
│ ├── polyfill.js
│ ├── signup.html
│ └── signup.js
```
`AutoWebPlugin` find all page `home login signup` directory in `./src/`,for this three page `home login signup`:
* will use `index.js` as main file add three chunk `home login signup`
* output three html file `home.html login.html signup.html`
* auto inject resource required by ever page. e.g(inject home chunk to home.html)
AutoWebPlugin find all page `home login signup` in dir `./src/` then:
* use index.js as entry for every page to make a chunk named `chunk home login signup`
* output html files for every page `home.html login.html signup.html`
* auto inject resource required by every page(e.g home.html will inject home chunk)
### ignorePages attribute
`ignorePages` page name list will not ignore by AutoWebPlugin(Not output html file for this page name),type is array of string.
### template attribute
`template` if template is a string , i will regard it as file path for html template(full path relative to webpack.config.js)
In the complex case,You can set the template to a function, as follows using the current page directory index.html file as the current page template file
**webpack config**
```js
new AutoWebPlugin('./src/', {
// Template files used by all pages
template: (pageName) => {
return path.resolve('./src', pageName, 'index.html');
},
});
```
### entry attribute
The entry property is similar to template, and also supports callback functions for complex situations. But if the entry is empty to use the current page directory `index.jsx?` As the entrance
## config publicPath [demo](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/public-path)
## load css [demo](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/extract-css)
The resource for each entry may contain css code.
If you want to extract the css code to load alone rather than sneaking into the js where you need to load
[extract-text-webpack-plugin](https://github.com/webpack/extract-text-webpack-plugin)
Separated css code, the rest of the things to me, I will automatically deal with the same as the above js css
**webpack config**
```js
// webpack.config.js
module.exports = {
module: {
loaders: [
{
test: /\.css$/,
loader: ExtractTextPlugin.extract({
fallbackLoader: 'style-loader',
loader: 'css-loader',
}),
},
],
},
entry: {
1: './1',
2: './2',
3: './3',
4: './4',
},
plugins: [
new ExtractTextPlugin('[name].css'),
new WebPlugin({
filename: 'index.html',
template: './template.html',
requires: ['1', '2', '3', '4'],
}),
],
};
```
**html template**
```html
<!DOCTYPE html>
<html lang="zh-cn">
<head>
<meta charset="UTF-8">
<link rel="stylesheet" href="1">
<link rel="stylesheet" href="2?_inline">
<link rel="stylesheet" href="3?_ie">
<script src="1"></script>
<!--STYLE-->
</head>
<body>
<script src="2"></script>
<!--SCRIPT-->
<footer>footer</footer>
</body>
</html>
```
**output html**
```html
<!DOCTYPE html>
<html lang="zh-cn">
<head>
<meta charset="UTF-8">
<link rel="stylesheet" href="1.css">
<style>
/**2.css**/
body {
background-color: rebeccapurple;
}</style>
<!--[if IE]>
<link rel="stylesheet" href="3.css">
<![endif]-->
<script src="1.js"></script>
<link rel="stylesheet" href="4.css">
</head>
<body>
<script src="2.js"></script>
<script src="3.js"></script>
<script src="4.js"></script>
<footer>footer</footer>
</body>
</html>
```
**output directory**
```
├── 1.css
├── 1.js
├── 2.css
├── 2.js
├── 3.css
├── 3.js
├── 4.css
├── 4.js
└── index.html
```
## minify output html [demo](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/minify-html)
`WebPlugin` and `AutoWebPlugin` support `htmlMinify` options to minify output html use the following rules:
* if `htmlMinify` is set - if `htmlMinify` is `true`, builtin html minify function will used to minify output html(minify HTML only,not CSS or JS) - if `htmlMinify` is `false`, builtin html pretty function will used to output human read friendly html - if `htmlMinify` is a `function`,use this function `function(orgHTMLString)=>minifyHTMLString` to minify html
* if `htmlMinify` is missing(`undefined`) - if environment is `production`, builtin html minify function will used to minify output html(minify HTML only,not CSS or JS)
* if environment is not `production`, builtin html pretty function will used to output human read friendly html
# Distinguish the environment
This plugin takes into account both **development** environment and **production** environment. And only if `process.env.NODE_ENV = production` current environment is **production** environment, others are considered to be development environment.
`webpack -p` will use DefinePlugin define `NODE_ENV=production`。
# In practice
* [redemo](https://github.com/gwuhaolin/redemo) elegant react demo component
* [stickylist](https://github.com/gwuhaolin/stickylist) react sticky header listview component
* [resume](https://github.com/gwuhaolin/resume) my resume
* [remd](https://github.com/gwuhaolin/remd) fast react markdown component
* [use template compiler to pre-translate template](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/use-template-complier)
* [webpack 原理与实战](https://github.com/gwuhaolin/blog/issues/4)
* [webpack2 终极优化](https://github.com/gwuhaolin/blog/issues/2)
* [使用模版引擎预处理模版](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/use-template-complier)
* [使用 HTML 模版配置资源注入到 HTML](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/use-template)
* [给 HTML 标签注入属性](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/config-html-attribute)
* [在 webpack 里直接通过 JS 配置资源注入到 HTML](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/config-resource)
* [管理多个单页应用](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/auto-plugin)
* [从 JS 中提取出 CSS](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/extract-css)
* [直接注入本地文件](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/load-local-file)
* [设置 PublicPath](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/public-path)
* [编辑 HTML 模版时,监听模式下会自动编译和刷新](https://github.com/gwuhaolin/web-webpack-plugin/tree/master/demo/watch-template)
|
I prepped my WFO oven for Zane to cook DS at the Driveway Throwdown, but he only did one in it then used the kitchen oven. Although it worked fine, my door is a PIA and you can't keep an eye on the pie like you can in the kitchen. It is a delicate dance to get the WFO to 550 degrees within a small time window anyway.
Now that you have acclimatized to the Detroit style, with your personalized spin on it, have you come to any conclusions as to that style as compared with the other styles you have had?
Peter
Thank you Peter. It's interesting because I've never liked any sort of thick crust pizza before. I've always loved crispy cheese however. I love to crisp cheese in a skillet and eat it like a cracker. Sometimes I throw in diced salted jalapenos too. It's more than that though. I've come to appreciate the Pizzarium style as well. I guess it's more about thin toppings for me than thin crust. I can't stand deep dish. Even when I lived in Chicago, I couldn't stomach it.
CL
Logged
"We make great pizza, with sourdough when we can, commercial yeast when we must, but always great pizza."Craig's Neapolitan Garage
I prepped my WFO oven for Zane to cook DS at the Driveway Throwdown, but he only did one in it then used the kitchen oven. Although it worked fine, my door is a PIA and you can't keep an eye on the pie like you can in the kitchen. It is a delicate dance to get the WFO to 550 degrees within a small time window anyway.
Thanks Tom, I've been thinking about this for a while. I know what you mean about the "delicate dance" I may have to try this style in the camper one of these days.
Last time the cheese around the edge was the HEB artisan white cheddar from the deli section. This time it was HEB extra sharp white cheddar from the regular cheese section. It was half the cost, and I liked it better. How about that?
I agree - the "artisan" cheddar is disappointing, kind of chalky with little sharp character.
DS is looking good! I'm always surprised at how many pizzerias don't use jalapenos, at least in Texas. Last time I was at Home Slice they didn't offer them (said "they don't use jalapenos in New York so we don't have either"), haven't been back since.
And so incredibly yummy too! The corner pieces are the first to go in my house (I cut the 8x10s into six or eight slices and the 10x14 in 12ths, so there's some slices with only a strip of cheese crust).
And so incredibly yummy too! The corner pieces are the first to go in my house (I cut the 8x10s into six or eight slices and the 10x14 in 12ths, so there's some slices with only a strip of cheese crust).
I went with all 8x10 pans specifically to maximize the cheese crust/pizza area ratio.
Logged
"We make great pizza, with sourdough when we can, commercial yeast when we must, but always great pizza."Craig's Neapolitan Garage
I went with all 8x10 pans specifically to maximize the cheese crust/pizza area ratio.
Craig,
Strategically, it seems that the Hunt boys at Via 313 have concentrated on the 8" x 10" 4-square size, maybe for the very reason you mentioned. I can't tell you how many times I have read reviews on the Detroit style pizzas made in 8" x 10" pans where the diners said, "Gee, the pizza is small". But after eating two slices, especially with a few toppings, they were full. I have also read reports where people buy two 4-square pizzas rather than one 8-square pizza.
Strategically, it seems that the Hunt boys at Via 313 have concentrated on the 8" x 10" 4-square size, maybe for the very reason you mentioned. I can't tell you how many times I have read reviews on the Detroit style pizzas made in 8" x 10" pans where the diners said, "Gee, the pizza is small". But after eating two slices, especially with a few toppings, they were full. I have also read reports where people buy two 4-square pizzas rather than one 8-square pizza.
Peter
Zane told me he gets a fair number of people who say the pizza is small.
When you look at what goes into it, it's not small as you noted.
CL
Logged
"We make great pizza, with sourdough when we can, commercial yeast when we must, but always great pizza."Craig's Neapolitan Garage
I recently went back to the Via 313 Saveur video at http://www.youtube.com/watch?feature=player_detailpage&v=nFthReFgxxA and for the first time stumbled across a couple of things that I had missed before about the cheeses that Via 313 uses. Specifically, starting at around 1:26, the narrator of the video, Neil, talks about "a secret blend of two cheeses, one of which is spread along the sides of the pan to create a crispy cheesy crust." Assuming that Neil stated the matter correctly, this would seem to suggest that there is a combination (a mixture) of the two cheeses and also a separate source of the cheese that is spread along the sides of the pan. I realize that in preparing videos, some production values are involved that may result in a portrayal that is not entirely correct or accurate, but the cheese that is spread along the sides of the pan clearly appears to be shredded, whereas the cheese (presumably a blend of the two cheeses) that ends up in the middle area of the pizza appears to be diced, as can most clearly be seen at 1:49 in the video. All of this makes me wonder whether using shredded cheese along the sides of the pan is a better way to create the crispy cheesy crust and maybe has better thermodynamics for creating the crispy cheese than would diced cheese. Also, having two forms of the cheese, shredded and diced, reduces the likelihood of error in assembling the pizzas.
Yep, folks love that crust...I believe Jets even offers a large size pie(more than 4 slices) but ALL of the slices are corners.
Bob,
That is correct. The pizza is called the 8 Corner Pizza: http://jetspizza.com/menu/pizza. However, Jet's does not characterize its square pizzas as Detroit style pizzas. The pizza is assembled in the traditional way starting with the dough, then a layer of sauce followed by the cheese (shredded Grande low moisture, part skim mozzarella), and, for a pepperoni pizza, the pepperoni is put on top of the cheese, not under it. Also, there are no sauce racing stripes. They do use the same pans, however, and their dough preparation and management is similar to what Buddy's does.
Thanks for the info Peter. I see that Jets Pizza hails from Sterling Heights, Michigan. For being so close to Detroit(approx.45 miles)they sure put a twist on the Detroit style of pies being discussed here. Craig's dough is awesome and it makes me wonder if I should even bother with the newly opened Jets now available here in Raleigh, NC.
All of this makes me wonder whether using shredded cheese along the sides of the pan is a better way to create the crispy cheesy crust and maybe has better thermodynamics for creating the crispy cheese than would diced cheese. Also, having two forms of the cheese, shredded and diced, reduces the likelihood of error in assembling the pizzas.
I have been using shredded only, sides and tops, but after looking at Norma's pics of the frozen Buddy's with the diced cheese on top, I was planning on using shredded cheddar on the edge and a mix of cubed cheddar and mozzarella on top for the next run in an attempt to increase the oven temp a little (for a crispier crust) without over-cooking the top.
All of this makes me wonder whether using shredded cheese along the sides of the pan is a better way to create the crispy cheesy crust and maybe has better thermodynamics for creating the crispy cheese than would diced cheese. Also, having two forms of the cheese, shredded and diced, reduces the likelihood of error in assembling the pizzas.
This is the only way I've tried it. It makes sense. the thinner strips should melt faster, and the sooner they melt, the sooner they can get to browning.
CL
Logged
"We make great pizza, with sourdough when we can, commercial yeast when we must, but always great pizza."Craig's Neapolitan Garage
The pies in the last set of pictures is shredded cheddar around the edge and mostly shredded mozz in the middle. I put the mozz up to the edges (lightly on the edge), so there is a little mozz sitting on top of the cheddar at the edge. I also sprinkled a little cheddar over the mozz in the center (maybe 20% of the total cheese in the center), but they were not pre-mixed.
Logged
"We make great pizza, with sourdough when we can, commercial yeast when we must, but always great pizza."Craig's Neapolitan Garage
Craig, your latest DS pies look great. You've motivated me to make a SicillianDS hybrid for dinner. I don't have a proper steel pan so I'll be using my deep cast iron pan. This may have already been covered, but do you think the crustiness of the cheese is a result of contact with the side walls of the hot pan?
Craig, your latest DS pies look great. You've motivated me to make a SicillianDS hybrid for dinner. I don't have a proper steel pan so I'll be using my deep cast iron pan. This may have already been covered, but do you think the crustiness of the cheese is a result of contact with the side walls of the hot pan?
Also you aren't using any sauce between the dough and cheese right?
Chau
Thanks Chau,
Yes, for sure the cheese crust is from contact with the pan. I think the thin steel pans work well because they heat pretty fast and go to work on the cheese. Thin dark aluminium may work better, but I have no idea where to find such a thing. Cast iron might not work well as it will take some time to heat.
Correct, no sauce between the dough and cheese.
CL
Logged
"We make great pizza, with sourdough when we can, commercial yeast when we must, but always great pizza."Craig's Neapolitan Garage |
Published 4:56 pm, Thursday, November 3, 2011
Albany city lawmakers still aim to vote on a resolution backing the two-week-old Occupy Albany movement on Monday night.
But the game plan has changed a bit.
An initial resolution supporting the encampment and urging Mayor Jerry Jennings to continue allowing the protesters to remain in Academy Park in violation of the city park's 10 p.m. curfew appeared to have had enough support to pass the 15-member Common Council earlier this week.
But at Wednesday's caucus, the lawmakers agreed to split the measure in two, with one resolution expressing broad support for the demonstrators' message and a second resolution explicitly urging the city not to enforce the curfew to block the peaceful demonstration.
The split, as outlined in an email from Council President Pro Tempore Richard Conti to his colleagues -- all fellow Democrats -- stems from concerns about mixing a policy to not enforce the curfew with a show of support for a political message. In this case, one of the protesters' goals is an extension of New York's so-called millionaires' tax.
He had "concerns with a resolution that advocates non-enforcement of local law based on the political content of the speech," wrote Conti, who has publicly supported the local offshoot of Occupy Wall Street, which began in September.
"This has nothing to do with my position with regard to Occupy Albany, nor should it," Conti wrote. "It has everything to do with my understanding of the content neutral protections of our constitution."
Councilman Anton Konev, the lead sponsor for the initial resolution, said he is on board with the division into two measures as long as both are offered for a vote.
Konev's resolution had at least eight co-sponsors, the minimum needed for passage, so it would seem the new pair has a strong chance of passing.
Councilman Ron Bailey -- who represents the 3rd Ward, including Academy Park-- right across Eagle Street from City Hall -- has said if it were up to him, he would enforce the curfew.
"I believe in free speech, but I also believe there's a need to uphold the letter of the law," Bailey told Insider last week. "I think everyone should be treated the same. I'm not criticizing the mayor, I'm not criticizing the chief of police. I understand where they're at with this. But my thing is, the law is the law."
Looking to have a say
It's for the kids, right?
The Albany school board race, which has had no candidates other than incumbents in recent years, has been infused with some political vitriol this year. But the primary at times has seemed not to be about how to solve the issues that plague the district, like low high school graduation rates and schools on state watch lists.
Instead, partisans are trying to turn the board race into a referendum on charter schools. That's been a bitter issue in the district for a decade because the publicly funded, privately run schools siphon off about 2,000 district students and $30 million in taxpayer money, even though the school board has no say over the charter schools.
The fingerprints of the Brighter Choice Foundation, which supports the city's 11 charter schools, are on a mailer for Melissa Mackey, who is running for a second term. Mackey said she didn't ask the charters for their support and her priority is improving educational opportunities for all children in the city, particularly poor and minority students in danger of being left behind. She said the board has spent too much time and money going after charter schools, when it should be concerned with improving its own academics.
School board President Dan Egan, and a coterie of supporters, including Common Council and former board members, want Mackey gone. Egan sent out a scathing letter attacking Mackey the moment it was clear she was seeking re-election, and he has been backing the other candidates, Sue Adler and Ginnie Farrell
Wedding, fundraiser
Not long after the state Legislature legalized same-sex marriage in New York in June, Albany Councilman Richard Conti hinted that he and his partner, Steve Snow, might be planning a "fall event."
On Tuesday, their 25th anniversary together, the couple was married at 5:15 p.m. by Albany County Family Court Judge Margaret "Peggy" Walsh in a small, private ceremony at the University Club on Washington Avenue.
Their marriage preceded Conti's fundraiser at the club -- though the four-term Democrat from Center Square said the timing was purely coincidental.
He said they made no formal announcement at the event but acknowledged, "once you told one person, it got around."
He said he and Snow had discussed planning something for their anniversary for sometime and finally decided Friday to go forward with it.
On Monday, they headed to City Hall -- where Conti spends many hours a week on council matters -- to get their marriage license in accordance with the state's 24-hour waiting period.
Inside Politics is a companion to the Local Politics blog -- http://blogs.timesunion.com/localpolitics -- and compiled by Jordan Carleo-Evangelist. Scott Waldman contributed. Reach the Insider via email at jcarleo-evangelist@timesunion.com, on the phone at 454-5445 or on Twitter @JCEvangelist_TU |
Pulmonary lesions associated with Sjögren's syndrome: radiographic and CT findings.
The aim of this study was to analyse and compare the chest radiographic and CT findings in patients with primary and secondary Sjögren's syndrome. We retrospectively evaluated the frequency of abnormality and findings of both the chest radiography (n=107) and CT (n=59) in patients with Sjögren's syndrome. Abnormal cases were classified into five patterns based on predominant CT findings. Chest radiographic and CT abnormalities were seen in 24 (22%) and in 34 (58%) patients, respectively. Most frequently observed abnormal findings were linear and reticular opacities on chest radiograph, and ground-glass opacity, interlobular septal thickening and intralobular interstitial thickening on CT in both primary and secondary Sjögren's syndrome. Centrilobular abnormalities were significantly more common in patients with primary Sjögren's syndrome (p=0.018). According to our CT classification, interstitial pneumonia (IP) pattern was the most common in patients with both primary and secondary Sjögren's syndrome. Bronchiolitis pattern was more common in patients with primary Sjögren's syndrome and lymphoproliferative disorder (LPD) pattern was only observed in primary Sjögren's syndrome. In conclusion, although the most frequently observed pattern in our CT classification was IP pattern in both primary and secondary Sjögren's syndrome, centrilobular abnormalities and LPD pattern were relatively characteristic in patients with primary Sjögren's syndrome. |
They drive me nuts [7]. Not because I have a problem with the concept of cognitive bias, but because I always know I’m missing something obvious.
It’s just out there. A better solution to a problem, something I’m doing wrong and can’t see it, a problem I don’t even know I have. Something in my blind spot that’s closing fast. An opportunity, a threat an ….. argggggggghhh!
Cognitive bias is why, more than most people I know, I’m always seeking criticism. That includes anybody, often not a friend [2], who is happy to tell me why I’m an idiot. Every so often see what I missed, and the joy of that correction more than compensates for minor tweaks of my thick skin.
Their recent research has explored cognitive error in expert chess players whose very expertise leads them to errors more naive players would avoid. They seem to have adopted their visual cortex to solve certain thinking problems [4], and thus to be afflicted by the visual processing adaptations that evolved for the physical world (emphases mine)…
… Building on Luchins’s early work, psychologists replicated the Einstellung effect in many different laboratory studies with both novices and experts exercising a range of mental abilities, but exactly how and why it happened was never clear. Recently, by recording the eye movements of highly skilled chess players, we have solved the mystery. It turns out that people under the influence of this cognitive shortcut are literally blind to certain details in their environment that could provide them with a more effective solution. New research also suggests that many different cognitive biases discovered by psychologists over the years—those in the courtroom and the hospital, for instance— are in fact variations of the Einstellung effect.
… the mere possibility of the smothered mate move was stubbornly masking alternative solutions… infrared camera revealed that even when the players said they were looking for a faster solution—and indeed believed they were doing so—they did not actually shift their gaze away from the squares they had already identified as part of the smothered mate move.
I think of Delusion as an extreme manifestation of the Einstellung effect. Given our emerging understanding of autism and schizophrenia as similar manifestations of a neural network injury, I wonder if we’ll find connections between delusional beliefs and visual networks…
[2] My favorite corrector is an app.net correspondent who I don’t know enough to claim as a friend, but who is a wonderfully cordial correspondent. That’s the best of all.
[3] An extraordinarily brilliant college roommate, who was later disabled by a schizophrenia like disorder, first suggested this to me in 1981. So the modern literature did not surprise me. Incidentally, he subsequently acquired a PhD and joined a NASA research facility. He found a way around his disorder.
[4] No, I cannot resist thinking of using GPUs to solve parallelism problems faster than CPUs.
[5] I personally think of delusion as an extreme form of cognitive closure; and I think it’s far more common than the psychotic disorders. An area ripe for research.
“The human understanding when it has once adopted an opinion . . . draws all things else to support and agree with it. And though there be a greater number and weight of instances to be found on the other side, yet these it either neglects or despises, or else by some distinction sets aside and rejects.... Men ... mark the events where they are fulfilled, but where they fail, though this happen much oftener, neglect and pass them by. But with far more subtlety does this mischief insinuate itself into philosophy and the sciences, in which the first conclusion colours and brings into conformity with itself all that comes after.”
Bacon always amazes. I’d declare him “father of cognitive science” for this quote alone. “Epistemic closure” is not new …
[7] This isn’t a new obsession. As a first year med student @1982 I devoured a 1970s text on clinical diagnosis that listed common cognitive errors, beginning with confirmation bias. This book has been rewritten many times since, alas the title and author are lost to my memory.
2 comments:
The final paragraph of the SciAm article has the following gold from Darwin: “I had ... during many years, followed a golden rule, namely, that whenever a published fact, a new observation or thought came across me, which was opposed by my general results, to make a memorandum of it without fail and at once,” he wrote. “For I had found by experience that such facts and thoughts were far more apt to escape from memory than favourable ones.” |
/*
* Sonar Objective-C Plugin
* Copyright (C) 2012 OCTO Technology
* dev@sonar.codehaus.org
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 3 of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02
*/
package org.sonar.objectivec.lexer;
import static com.sonar.sslr.api.GenericTokenType.LITERAL;
import static com.sonar.sslr.impl.channel.RegexpChannelBuilder.commentRegexp;
import static com.sonar.sslr.impl.channel.RegexpChannelBuilder.regexp;
import org.sonar.objectivec.ObjectiveCConfiguration;
import com.sonar.sslr.impl.Lexer;
import com.sonar.sslr.impl.channel.BlackHoleChannel;
public class ObjectiveCLexer {
private ObjectiveCLexer() {
}
public static Lexer create() {
return create(new ObjectiveCConfiguration());
}
public static Lexer create(ObjectiveCConfiguration conf) {
return Lexer.builder()
.withCharset(conf.getCharset())
.withFailIfNoChannelToConsumeOneCharacter(false)
// Comments
.withChannel(commentRegexp("//[^\\n\\r]*+"))
.withChannel(commentRegexp("/\\*[\\s\\S]*?\\*/"))
// All other tokens
.withChannel(regexp(LITERAL, "[^\r\n\\s/]+"))
.withChannel(new BlackHoleChannel("[\\s]"))
.build();
}
}
|
/**
******************************************************************************
* Xenia : Xbox 360 Emulator Research Project *
******************************************************************************
* Copyright 2013 Ben Vanik. All rights reserved. *
* Released under the BSD license - see LICENSE in the root for more details. *
******************************************************************************
*/
#include "xenia/cpu/backend/backend.h"
#include <cstring>
namespace xe {
namespace cpu {
namespace backend {
Backend::Backend() { std::memset(&machine_info_, 0, sizeof(machine_info_)); }
Backend::~Backend() = default;
bool Backend::Initialize(Processor* processor) {
processor_ = processor;
return true;
}
void* Backend::AllocThreadData() { return nullptr; }
void Backend::FreeThreadData(void* thread_data) {}
} // namespace backend
} // namespace cpu
} // namespace xe
|
<?php
/*
+-----------------------------------------------------------------------+
| Localization file of the Roundcube Webmail Managesieve plugin |
| |
| Copyright (C) The Roundcube Dev Team |
| |
| Licensed under the GNU General Public License version 3 or |
| any later version with exceptions for skins & plugins. |
| See the README file for a full license statement. |
+-----------------------------------------------------------------------+
For translation see https://www.transifex.com/projects/p/roundcube-webmail/resource/plugin-managesieve/
*/
$labels['filters'] = 'පෙරහණ';
$labels['moveup'] = 'ඉහළට ගෙනයන්න';
$labels['movedown'] = 'පහළට ගෙනයන්න';
$labels['filterany'] = 'සියලු පණිවිඩ';
$labels['filtercontains'] = 'අඩංගු';
$labels['messagedelete'] = 'පණිවිඩය මකන්න';
$labels['add'] = 'එක් කරන්න';
$labels['del'] = 'මකන්න';
$labels['sender'] = 'යවන්නා';
$labels['recipient'] = 'ලබන්නා';
$labels['vacationsubject'] = 'පණිවිඩයේ මාතෘකාව:';
$labels['enable'] = 'සක්රීය කරන්න/අක්රීය කරන්න';
$labels['active'] = 'සක්රීය';
$labels['none'] = 'කිසිවක් නැත';
$labels['flagread'] = 'කියවන්න';
$labels['flagdeleted'] = 'මකන ලදී';
$labels['flagdraft'] = 'කටු සටහන';
$labels['notifymethodmailto'] = 'විද්යුත් තැපෑල';
$labels['notifymethodtel'] = 'දුරකථනය';
$labels['nextstep'] = 'මීලග පියවර';
$labels['...'] = '...';
$labels['datetest'] = 'දිනය';
$labels['address'] = 'ලිපිනය';
$labels['envelope'] = 'ලියුම් කවරය';
$labels['modtype'] = 'වර්ගය:';
$labels['allparts'] = 'සියල්ල';
$labels['vacation.subject'] = 'මාතෘකාව';
$messages['nametoolong'] = 'නම දිග වැඩිය.';
|
Offshore wind developer Deepwater Wind and nonprofit organization Conservation Law Foundation (CLF) have formed an agreement designed to protect endangered North Atlantic right whales during the construction of the Block Island Wind Farm, a 30 MW demonstration-scale offshore wind project proposed in state waters about three miles off the Block Island coast.
After extensive discussions with CLF, Deepwater Wind has agreed to voluntarily adjust its planned construction period to minimize potential impacts on migrating North Atlantic right whales. Right whales have been documented feeding in Rhode Island Sound throughout the month of April.
Deepwater Wind had originally planned to begin the pile driving necessary to secure its wind farm to the ocean floor in April of its construction year, which is expected to be either 2014 or 2015. However, as a result of the agreement, the company will not begin the pile driving before May 1 of that year.
The pile driving is required to fasten the five proposed turbine steel foundations to the seafloor using steel piles that are hammered up to 250 feet beneath the ocean floor.
“Deepwater Wind has worked diligently to try to understand the key issues for the project area, and because we share a common interest in advancing renewable energy in Rhode Island, we have been motivated to work together to develop solutions that keep us moving forward,” explains Tricia K. Jedele, vice president and director of CLF’s Rhode Island office.
As a result of the agreement, Deepwater Wind has filed an amended project schedule with the U.S. Army Corps of Engineers and the Rhode Island Coastal Resources Management Council.
The agreement adopts the seasonal-restriction concept set forth in a right-whale-protections agreement established last month for the Mid-Atlantic region by a Deepwater Wind-led coalition of offshore wind developers and national environmental organizations.
The coalition - which includes Deepwater Wind, CLF, the Natural Resources Defense Council (NRDC), the National Wildlife Federation (NWF), Energy Management Inc. (Cape Wind) and NRG Bluewater Wind - agreed to a set of protective measures that the developers will voluntarily implement over the next four years in the Mid-Atlantic wind energy areas, which stretch from New Jersey to Virginia.
The measures outlined in that agreement provide protections for the North Atlantic right whales, primarily by limiting sound impacts from exploratory activities such as underwater geological surveys and the construction of temporary towers to measure weather conditions. NRDC, NWF and CLF plan to pursue a similar agreement with interested developers for the federal wind energy area in Rhode Island Sound.
The Block Island Wind Farm will be connected to both Block Island and mainland Rhode Island via the bidirectional Block Island Transmission System.
this content item is from North American Windpower
( http://www.nawindpower.com/e107_plugins/content/content.php?content.11077 ) |
Modal Box
110% PRICE PROTECTION GUARANTEE
FAST & EASY RETURNS
ENCRYPTED SECURE CHECKOUT
Product Info
Questions
About the brand
More from this collection
Return policy
Product Info
Overview
From its wide metal scrolls with intricate twists and curls, to the slightly floral shape of its candelabra with broad bobeches, Seville exudes the Old World charm of finely crafted, hand-forged wrought iron. Painstakingly crafted and beautifully finished, Seville beguiles with its romantic Latin charms.
Craftmade
Craftmade offers a wide range of products that can transform the look of your home both inside and out. Whether its modern or casual, traditional or youth, theres a style to fit any dicor. In addition to ceiling fans, we have an extensive lighting collection that includes bath vanities, chandeliers, light bulbs, and outdoor sconces, pendants, and posts. We also carry door chimes, pushbuttons, and an ever expanding array of home and garden accessories. Established in 1985, Craftmade is renowned for its extensive lines of ceiling fans that are among the most reliable, durable, energy-efficient and cost-effective in the industry. Our channels of distribution provide diversity as well. Catering to both the new construction and remodeling markets, Craftmade products are marketed through a nationwide network of nearly 2,000 specialized premium lighting showrooms, patio dealers and electric wholesalers. In 2008, Craftmade purchased Woodard, LLC, a leading manufacturer of outdoor furniture. The Woodard acquisition provides strategic diversification into a market not directly related to new home construction, and offers other important synergies as well. Representing time-proven dependability and enduring value, Craftmade continues to break ground in both quality of construction and design innovation.
Shop all from Craftmade
More from this collection
Return policy
General Return Policy
Return it for 30 days! Capitol Lighting prioritizes the customer experience above all else. We want to make sure the products you purchase from us meet all of your expectations. All uninstalled non-closeout and non-custom products may be returned within 30 days of receipt. Simply call 1.800.544.4846 or chat with us to start your return and we'll issue your return shipping labels or help arrange pickup on your behalf (for oversized products). |
In the immediate wake of Monday's Rose Parade—which takes place annually on New Year's Day in Pasadena, California—hundreds of residents and advocates took over the parade route with a march of their own as they called for 'Medicare for All' and demanded passage of a bill currently stalled in the state legislature that would provide every Californian with healthcare coverage.
"People should pay attention to California because it is the example, the model, the bellwether, for what is possible and as California has set the trend for the rest of the country on a myriad of other important issues, it is and will set the trend on guaranteed, single-payer healthcare for all." —RoseAnn DeMoro, CNA/NNUThose who marched, reports the Pasadena Star-News, waved large banners reading "Medicare for all" and "Public health not corporate wealth" as they sang songs, danced along the streets, and emphasized to onlookers the need for a universal healthcare system that excludes nobody.
"What we’re saying is health care for all, rich, poor, and no matter what race you are," Sam Schwiner, a local resident and one of the marchers, told the newspaper.
"SB... 5... 6... 2!" chanted members of the parade. "It's good for me! It's good for you!"
Healthcare for All and Medicare for All protesters close #roseparade singing This plan is your plan, this plan is my plan #SB562 pic.twitter.com/9b1XfSqEyt — Sarah Reingewirtz (@sarahimages) January 1, 2018
As Common Dreams has reported, the progress of SB 562—the proposed bill that would establish a single-payer system in California, the nation's most populous state—was derailed in June of 2017 when Assembly Speaker Anthony Rendon, a Democrat, decided to pull the plug on its progress by shelving it for the legislative session.
Though Rendon received plenty of criticism from the major backers of the bill, including the California Nurses Association/National Nurses United (CNA/NNU) and the Healthy California campaign, its supporters have continued to push for its passage, sweeping the state with a tireless door-to-door campaign and vowing to see it brought back before state lawmakers in 2018.
SCROLL TO CONTINUE WITH CONTENT Never Miss a Beat. Get our best delivered to your inbox.
According to RoseAnn DeMoro, CNA/NNU's executive director, support for the single-payer cuts across ideological divisions and remains extremely popular across the state.
The parade on Pasadena on Monday "signifies the ongoing popularity of the issue among all facets of our society," DeMoro told Common Dreams in an email.
"There is nothing more mainstream in California than the Rose Parade and to see this level of turnout, enthusiasm and commitment in the early morning of a New Year's Day is impressive," she continued.
Despite the ongoing hostility from its opponents—which DeMoro identified as "establishment Democrats" and financial donors from the insurance and pharmaceutical industry, for-profit hospitals, right-wing operatives, and corporate interests—she says support for SB562 is only getting stronger.
Quoting longtime organizer Bill Moyer—who once said that "movements succeed when they win over ever-greater levels of public support for their cause and undermine the pillars of support" of the status quo—DeMoro says that is precisely what's happening in California's ongoing battle for single-payer.
"People should pay attention to California because it is the example, the model, the bellwether, for what is possible and as California has set the trend for the rest of the country on a myriad of other important issues, it is and will set the trend on guaranteed, single-payer healthcare for all," she said. "And people are hip to faux solutions and incrementalism and are not buying it. They want Medicare for All—and they want it now."
The time for Medicare for All, she said, has finally come. |
A PR/MEDIA/COMMUNICATIONS consultant and commentator, drawing on a wealth of experience at the highest level. This includes editing the Sunday Mirror and the deputy editorships of the Daily Mirror and News of the World, as well as an award-winning record as a foreign correspondent, war correspondent, investigative reporter and political correspondent. Connew has worked in Latin America, Africa and the Middle East and for several years was Bureau Chief for the Mirror Group in the US, based variously in New York, Washington and Los Angeles.
In addition to his print media background, Connew has worked extensively in radio and TV, including being MD of an independent TV production company making documentaries for the BBC, editing Kirsty Young's award-winning Breakfast Show for Talk Radio and producing programmes for talkSport radio. Connew has overseen production of films for both the corporate and charity sectors.
In the charity sector, Connew filled the key role of Director of Communications for Sparks, the high-profile children's medical research charity founded by and supported by many of Britain's leading sports and entertainment industry figures. As a member of the charity's management board, he was instrumental in achieving record-breaking fundraising levels, managing the charity's huge celebrity support base, Royal Patron relationships and the charity's major corporate support relationships, such as Deutsche Bank, BG Energy, BGC, the BOA and many others. He was also responsible for the production of high-quality magazines and appeal literature and in editorial collaboration projects with leading universities and teaching hospitals throughout the UK and abroad. Connew was also the public face of the charity in terms of media appearances and statements.
An experienced scriptwriter and speechwriter, Connew has recently been in demand by a number of broadcast and print media outlets for his views on high-profile issues such as privacy in the modern media age.
With a tremendous contact network, Connew, who is also available for lecturing work, is an expert in the art of generating positive publicity through both traditional and social media options while--where neccessary--advising on the skilful handling of reputational and crisis management issues.
Connew, who has also served on a number of media and charity government liaison groups, is a longstanding judge of the prestigious British Press Awards.
Email:paulconnew@hotmail.co.uk
Mobile: 07711984785
Editors from Newspapers, Magazines, Radio, TV and Digital Media.
All available to support your business.
We can assist you with internal and external comms, appraisals and evaluations of your communications, creative writing - from press release to business plan
A skilled bank of professional editors, with the expertise and experience to help you work with and for the media.
CALL NOW ON 01223 304080 |
package org.simpleflatmapper.reflect.getter;
import org.simpleflatmapper.reflect.Getter;
import java.util.UUID;
public final class StringUUIDGetter<R> implements Getter<R, UUID> {
private final Getter<R, String> stringGetter;
public StringUUIDGetter(final Getter<R, String> stringGetter) {
this.stringGetter = stringGetter;
}
@Override
public UUID get(final R target) throws Exception {
final String o = stringGetter.get(target);
if (o == null) return null;
return UUID.fromString(o);
}
@Override
public String toString() {
return "StringUUIDGetter{" +
"stringGetter=" + stringGetter +
'}';
}
}
|
Trump wants US troops in Iraq to ‘keep an eye’ on Iran
A political storm brewing in Iraq after Donald Trump said he wants to keep troops there, to ‘keep an eye’ on Iran. |
//
// SrlEncoder.h
// Sereal
//
// Created by Andrea Guzzo on 8/8/13.
// Copyright (c) 2013 Andrea Guzzo. All rights reserved.
//
#import <Foundation/Foundation.h>
@interface SrlEncoder : NSObject
- (NSData *)encode:(id)obj error:(NSError **)err;
- (NSData *)encode:(id)obj;
@property (nonatomic, readonly) NSError *error;
@property (nonatomic, assign) BOOL compress;
@property (nonatomic, assign) NSUInteger compressionThreshold;
// force hash keys to be string
@property (nonatomic, assign) BOOL strictHashKeys;
// assume binary/shortbinary contains strings (perl compatibility)
@property (nonatomic, assign) BOOL binaryStrings;
@end
|
Search results for 'stack-on'
This is a biometric safe but like many biometric safe it gives you other options. Once you see how fast and easy the fingerprint recognition is, you will probably prefer that lock. However, you could let another user use the simple key pad lock and have you both know the code. Stack-on has chosen to give you a third option which is a key overide.The safe comes with a removable shelf and the interior is also lined with a protective fabric. This is an attractive black safe with chrome accents.
With this Stack-On gun safe get the triple protection of high security features, ETL waterproof rating and ETL fire rating. In addition, this gun safe has a drill resistant combination lock with a solid steel plate behind the lock. This Stack-On gun safe can hold up to 28 long guns. The interior can be configured to meet your needs. If you only need to store 14 or less rifles, you can have side shelves for handguns or other valuables. Or if you simply want to use it for storage of small items you can have up to 6 shelves and a total of twelve cubby holes.
When your purchase a QAS-1304-E pistol safe your package will Include a mounting plate. The mounting plate can be affixed to a location such as an RV or in the trunk of your vehicle. The pistol safe affixes to the mounting plate with one bolt inside the pistols safe. With pre-drilled for direct mounting, the pistol safe can be bolted down under the bed or another location.
The QAS-1000-E pistol safe has an easy-to program and use electronic key pad. When you enter the code on the key pad, the locking mechanism is released and the drawer pops out. A ball-bearing drawer slide allows the drawer to slide in and out without binding. The California Department of Justice has approved this pistol safe for the secure storage of a firearm. This pistol safe is designed to be secured with a cable which is included.
This Stack-On 36 capacity gun safe has great looks and great security. Have the peace of mind of knowing you are storing your firearms in a fire rated and waterproof Stack-on gun safe. The exterior finish is grey and silver attractive paint with chrome accents. Its interior is fully carpeted, protecting its contents from scratches. The Stack-On gun safe has a re-configurable interior. Set it up with the number of shelves you chose. The electronic key pad lock is fast, easy to use, and you can change your code at any time.
This Stack-On gun safe, model TD-36-SB-C, has two very high security features. First, its bolting system includes 7 live locking bolts and 3 dead bolts. Second, the California Department of Justice has approved TD-36-SB-C for firearm storage partially due to the solid steel plate behind the lock which makes it highly drill resistant. Other important features on the Stack-On gun safe are its ETL waterproof rating and ETL fire protection rating. In addition you can configure the interior to hold up to 36 long guns or if you own 18 or less, you can add shelves down the side.
If you need indoor delivery for this 493 lb safe, please call 1-877-442-9964. There is an extra charge.
This electronic gun safe from Stack-On has high security features such as a reinforced door, 5 live locking bolts and 3 dead bolts. An ETL waterproof and ETL fire rating are attached to this electronic gun safe. The interior is fully carpeted; has adjustable shlves and has gun barrel rests and stand offs for scoped guns. You can store up to 28 long guns in this Stack-On model. The electronic gun safe features a battery operated key pad that offers quick access. It is pre-drilled for bolt down to the floor.
If you need indoor delivery for this 651lb safe, please call 1-877-442-9964. There is an extra charge.
This large Stack-On gun safe can store up to 48 long guns. It comes with shelves which can be put into four different configurations. The Stack-On gun safe shelves can be set up to store 32 guns or less with shelves down the side for smaller items. If you only collect hand guns, it can be set up with all shelves. Most customers use a Stack-On gun safe with its fire rating and high security to store other valuables besides firearms. You will have space for jewelry, important papers and other valuables. The electronic key pad lock is simple to use and allows fast access.
Stack-On gun safes provide high security and peace of mind for those who own firearms. This Stack-On 36 long gun safe has high security features such as a re-inforced door and 7 live locking bolts and 3 dead bolts. The reinforced door resists drill attacks and the bolts allow 10 points of contact where the door is bolted to the safe. The interior of the Stack-On gun safe is designed for your convenience. It has an adjustible interior. You can set up the interior of the gun safe to hold a total of 36 long guns or you can set it up with side storage shelves if you own fewer guns. Each Stack-On gun safe interior includes patented gun barrel rests and patented stand offs for scoped guns. Stand offs allow scoped firearms to stand upright in the Stack-on gun safe without taking extra space. Inside and out, this is great storage for firearms.
The FS-8-MB-E Stack-On electronic guns safe allows easy and fast access with its key pad lock. Stack-On makes sure their electronic gun safe is just as drill resistant as a product with a combination lock would be because it includes a drill resistant, hardened steel plate behind the lock. The electronic gun safe lock operates with 4 AA batteries which can be changed from the front of the safe. This feature plus the over-ride key assure you will never be locked out. Add the ETL fire rating and you can't find a better small electronic gun safe! |
Officials: Body Found In Lake Is Missing Oak Lawn Man
Alpha Sabbithi, 27, was reported missing after he was last seen on Aug. 19, 2012. His body was found two days later in a lake in a Cook County forest preserve. (Credit: Oak Lawn Police)
PALOS PARK, Ill. (STMW) — Officials confirmed the body of a man found Tuesday morning in a Cook County forest preserve is that of a missing Oak Lawn man whose car, wallet and cell phone were found Sunday at the preserve.
Alpha Sabbithi, 28, of the 4100 block of West 93rd Street in Oak Lawn, was found unresponsive in a lake near 95th Street and Wolf Road, according to the Cook County Medical Examiner’s office. He was dead at the scene.
A citizen spotted the body of a man at 8:40 a.m. Tuesday in Maple Lake, located near that intersection in unincorporated Palos Park, Cook County Forest Preserve Officer Karen Vaughan said.
Oak Lawn police had been looking for Sabbithi, who suffers from depression and was last seen Sunday, according to a missing persons alert issued Monday, his 28th birthday.
There were no signs of foul play found Tuesday afternoon, according to a spokeswoman for Cook County Sheriff’s office.
An autopsy to determine the cause and manner of his death is scheduled for Wednesday.
Oak Lawn police Division Chief Mike Kaufmann said late Monday afternoon that police spent much of the day searching Maple Lake, Saganashkee Slough and the Cal Sag Channel without finding a trace of evidence.
Police used boats to search the lake and the slough, which is west of 104th Avenue and south of 107th Street. They also used a helicopter, on loan from the Cook County Sheriff’s Department and Chicago Police to fly over the channel, Kaufmann said.
Friends of the Sabbithi family also searched the forests near the lake and slough Sunday and Monday, said Victor Sabbithi, the missing man’s brother. Like the police, they found no clues.
Victor Sabbithi said six friends braved heavy rains Monday to walk up and down trails in the forest.
Alpha Sabbithi was supposed to start a new job Tuesday in the IT department at the Lutheran School of Theology at Chicago, where he is enrolled, Victor Sabbithi said.
Police said they found his car about 4 a.m. Sunday parked near Maple Lake. Inside the locked car, they discovered his cell phone, wallet and car keys, the alert said.
A bloodhound led police to a boat launch for the Saganashkee Slough, the alert said, but Sabbithi was not found.
Victor Sabbithi said Sunday that Sabbithi recently returned from a monastery in Michigan and was acting calmer since his return.
“It was a personal thing for him,” he said of his brother’s two-week retreat.
He added that his brother, whom he last saw Saturday, was not acting unusual and did not seem disturbed about anything. |
Q:
Paying a Shadchan
The Minhag in Klal Yisroel is to pay a Shadchan for introducing husband and wife.
#1 - What is considered the norm to pay a Shadchan?
#2 - Suppose a Shidduch breaks. Does the Shadchan have to return the money or gift received?
#3 - Can a Shadchan demand payment?
A:
#1 I believe is usually $2,000.
You might take a look at Baltimore's Star-K shadchan incentive program. They're now paying $2500, which is supposed to approximately match what the shadchan would receive from the family. In fact, it's conditional on the shadchan receiving at least $1500.
The Star-K program pays the shadchan shortly after the wedding, and thus won't pay if the engagement is broken before the wedding. I don't know if traditionally a shadchan is paid upon engagement or marriage, though it would seem strange to pay someone and then demand it back (barring the shadchan hiding some serious, serious problem about the prospective bride/groom).
There seems to be some norms and standards about paying shadchanim of which I'm unaware, hopefully others will fill it in. For instance the Star K says if Mrs. Goldstein thinks of the shidduch, but then hands the idea to Mrs. Cohen who spends hours and hours on the phone making it happen, Mrs. Goldstein is paid 1/3 and Mrs. Cohen 2/3.
|
[Absence of effect of propranolol on urinary excretion of 3-methylhistidine in hyperthyroidism].
Lean body mass and muscle protein breakdown were evaluated in euthyroid and hyperthyroid subjects by measuring the urinary excretion of creatinine and 3-methylhistidine. Since catecholamines probably have an inhibitory effect on muscle protein catabolism through a beta-receptor mechanism, the effects of propranolol on 3-methylhistidine excretion were also evaluated in hyperthyroid subjects. Hyperthyroid subjects had a lower lean body mass (34.9 +/- 6.3 kg versus 47.7 +/- 8.9 kg, p less than 0.001) and a greater 3-methylhistidine excretion (25.1 +/- 7.4 versus 19.0 +/- 4.8 mumol/mmol creatinine, p less than 0.05) than euthyroid subjects. Propranolol administered orally to hyperthyroid subjects decreased pulse rate (p less than 0.01) and plasma triiodothyronine concentrations (from 5.40 +/- 2.28 to 3.61 +/- 1.61 nmol/l, p less than 0.01), but did not modify urinary 3-methylhistidine excretion (24.8 +/- 8.7 versus 25.1 +/- 7.4 mumol/mmol creatinine). These results suggest that muscle wasting in hyperthyroidism is related to increased protein catabolism. This increased protein breakdown is not modified by short term administration of propranolol, a beta-blocking agent widely used in the management of hyperthyroidism. |
Chris Smith untangled this sticky question...
Spiders do eat their webs. The web material is protein, so spiders do consume them them, sometimes every day, to recover some of the energy they've expended on building them in the first place.
Another interesting use of spider webs is that they've got quite a lot of a vitamin K in them, which can help your blood to clot; and before the use of gauze, people used to put spider webs on wounds!
People are currently looking into what makes spider webs so strong, with the hope of making the material artificially: spiders' webs would make great bullet-proof vests.
They've found the proteins in them that make them strong, called Spidroin 1 and Spidroin 2, and you can produce these in the lab. But they have to use insect cells to grow it, because the insect cells do some chemical modification and insects are more closely related to spiders.
They're not at the point where you can scale it up to a bullet-proof vest yet, but it's certainly interesting! |
Management of pre-eclampsia: issues for anaesthetists.
Pre-eclampsia is a leading cause of maternal morbidity and mortality. Substandard care is often present and many deaths are preventable. The aim of this review is to summarise the key management issues for anaesthetists in the light of the current literature. A systematic literature search of electronic databases was undertaken including MEDLINE, EMBASE and the Cochrane Library using the key words obstetrics, pregnancy, pregnancy complications, maternal, pre-eclampsia, preeclampsia, cardiac function, haemodynamics, haemolysis, elevated liver enzymes, low platelets (HELLP), eclampsia, anaesthesia, anesthesia, neuraxial. Relevant Colleges and Societies websites were examined for pertinent guidelines. The disease is defined within the context of hypertensive diseases, and early recognition of pre-eclampsia and its complications, as well as multidisciplinary expert team management is highlighted. Accurate monitoring and recording of observations including the use of transthoracic echocardiography is discussed. The importance of the treatment of systolic blood pressure>180 mmHg and the use of intravenous antihypertensive medication as well as the use of parenteral magnesium sulphate for the treatment and prevention of eclampsia is emphasised . Restricted intravenous fluid therapy and avoidance of ergometrine is discussed. Neuraxial analgesia and anaesthesia, and general anaesthesia for birth is summarised as well as postpartum management including analgesia, thromboprophylaxis, management of acute pulmonary oedema and the use of pharmacological agents in the setting of breastfeeding. |
President Donald Trump on Sunday criticized Illinois Gov. J.B. Pritzker and "a very small group" of other governors for "blaming" his administration "for their own shortcomings."
".@JBPritzker, Governor of Illinois, and a very small group of certain other Governors, together with Fake News @CNN & Concast (MSDNC), shouldn't be blaming the Federal Government for their own shortcomings," Trump tweeted. "We are there to back you up should you fail, and always will be!"
(NBC News is a division of NBCUniversal, which is owned by Comcast Corp.)
Pritzker responded to Trump on Twitter soon after, saying, "You wasted precious months when you could've taken action to protect Americans & Illinoisans.
"You should be leading a national response instead of throwing tantrums from the back seat," he added. "Where were the tests when we needed them? Where's the PPE? Get off Twitter & do your job."
"I want to thank the many public servants in the military, in @fema & other parts of the fed. government who are actually doing the work to keep people safe," he added. "My staff and I are grateful for your experience and your willingness to act courageously on behalf of your fellow American."
Full coverage of the coronavirus outbreak
The Trump administration has come under criticism for its production and distribution of testing kits of essential hospital items, like masks and ventilators, to the states. The administration has insisted that it has ramped up production of testing kits and has gotten private industry to increase the manufacturing of such items. Sunday afternoon, 3M announced that more than "500,000 respirators are on the way to two of the more critically impacted areas, New York and Seattle, with arrivals expected starting tomorrow."
Governors, leading Democrats and hospitals have implored the administration to use the Defense Production Act to increase the capacity to produce needed equipment. The 1950 law allows the president to mobilize businesses to fulfill orders deemed necessary for the national defense, in addition to other measures. Trump authorized the law last week but has yet to use it.
Federal Emergency Management Agency Administrator Pete Gaynor on Sunday threw cold water on hopes that the federal government will use the law.
"Yeah, so I think it's an insurance policy," Gaynor said on NBC News' "Meet the Press. "It's a lever. If we have to throw that lever, we will. And it's pretty amazing. You know, companies from around the country volunteering to do all sorts of different things to help Americans. And so we haven't had to use it yet.
"Will we have to use it? Maybe. But right now, this is what makes America so great — every company pitching in making sure we can beat this virus. And so it's been really great to see."
Let our news meet your inbox. The news and stories that matters, delivered weekday mornings. This site is protected by recaptcha
He added that if governors can find masks "on the open market, go buy it," because "FEMA will reimburse you."
Speaking at the White House coronavirus task force press conference later Sunday, top White House aide Peter Navarro said, "We're getting what we need without putting the heavy hand of government down."
Pressed further on it, Trump said, "We're a country not based on nationalizing our business" and pointed to Venezuela.
Responding to Gaynor's remarks, former Vice President Joe Biden, the Democratic presidential front-runner, said in a statement that Trump "is still failing."
"Mr. President, stop lying and start acting," Biden added. "Use the full extent of your authorities, now, to ensure that we are producing all essential goods and delivering them where they need to go. President Trump's dithering on preparing us for this global pandemic and his lies about his response to this dangerous crisis is one of the most unjustifiable failures of presidential leadership in American history."
Speaking on CNN's "State of the Union," Pritzker said the federal government's response to the crisis has improved since earlier this month but that Illinois has gotten only about a quarter of the personal protective equipment it has requested from the Trump administration.
"We ... got a call this morning, before I went on the air, that we're going to receive another shipment of PPE later today or tomorrow from FEMA," he said. "But it's a fraction still of what we have requested. We need millions of masks and hundreds of thousands of gowns and gloves and the rest. And, unfortunately, we're getting still just a fraction of that."
Pritzker said that, as a result, his state has to compete on the open market — against other states — for those items. Trump has pushed for states to secure masks and other essential items on their own.
"We're all competing against each other. This should have been a coordinated effort by the federal government," he said. "And the national defense authorization that the president has to essentially push this manufacturing really hasn't gone into effect in any way. And, so, yes, we're competing against each other. We're competing against other countries. It's a ... Wild West, I would say, out there. And, indeed, we're overpaying, I would say, for PPE because of that competition."
Pritzker echoed other governors who spoke Sunday. Maryland Gov. Larry Hogan, a Republican, said the lack of protective equipment "is a problem that everyone's been talking about for a week."
"We pushed for action, and we are getting progress," Hogan said. "Now, it's not nearly enough, it's not fast enough, we're way behind the curve, but ... we're trying to figure out what to do moving forward. They are making progress, it's not fast enough, but on all of those things, on respirators, on PPEs, on the masks, on the tests, we're ramping up."
Hogan added that "failures were made and things should've happened sooner."
"But I just want to focus on where we go from here, because our job is to save the citizens," he said.
Download the NBC News app for full coverage and alerts about the coronavirus outbreak
On ABC News' "This Week," New Jersey Gov. Phil Murphy said the state is "desperate for more PPE equipment, personal protective equipment."
"We've had a big ask into the strategic stockpile in the White House," he said. "They've given us a fraction of our ask. We are, as a state, private sector, public sector, nonprofits turning over every stone, but we need a lot more PPE, both to protect our health care workers and to treat the sick."
Also on "This Week," Michigan Gov. Gretchen Whitmer said her biggest issue remains not having enough test kits, saying her state needs better data to make important decisions moving forward.
"We're all building the airplane as we fly it right now," she said. "We're doing the best that we can. We're going to continue to be aggressive, and we're continually monitoring what the next move we can make is.
"But we need the federal government to get us those test kits. We need PPEs, as Phil was just saying, we need clear, directive and — guidance from the federal government," she said. "And frankly, a patchwork strategy of each state doing what they can is — we're going to do it if we have to, but it would be nice to have a national strategy."
Whitmer added: "We've got to have those masks."
"Had the federal government really started focusing when it became clear that the whole world was going to be confronting this, we would be in a stronger position right now," she said, adding, "I can't afford to have a fight with the White House, but the fact of the matter is at some point we are going to have to analyze where all the failures were. ... Lives will be lost because we weren't prepared." |
Hyperinsulinemic hypoglycemia of infancy. Recent insights into ATP-sensitive potassium channels, sulfonylurea receptors, molecular mechanisms, and treatment.
Persistent hyperinsulinemic hypoglycemia of infancy (PHHI), previously termed "nesidioblastosis," is an important cause of hypoglycemia in infancy and childhood. Recent studies have defined this syndrome at the molecular, genetic, and clinical level. This article reviews the genetic and molecular basis of these entities, describes their clinical manifestations, and discusses the rationales for available therapeutic options. |
Is interational dating healthy
”“I think I’m just terrified of getting to that point of having to go, ‘I really care about this person,’ but then to have them become this terrible person that looks down upon my family. But it’s something you have to figure out.”It feeds right into the general vulnerability of dating.“Yeah. I broke up with my ex-boyfriend last year, and then I decided that I wanted to go on a date a week, and I met a lot of great people. It really opened my eyes up to the fact that, even though I still have anxiety about how I look and where I come from, I live in a very open city where people are incredibly lovely and open-minded.That’s hard to remember sometimes, because I’ve also met people who would rather put their head in the sand than understand what you’re going through — even friends.“It’s incredibly difficult, and sometimes I’d rather be alone than have to put up with that.The site works well for the people naturally shy and provide them with a great opportunity of meeting like-minded individuals, overcome their shyness and explore the world of dating, romance and love., I'll be talking to people with a broad range of experiences to see how things are different — and how they're the same.Enter your mobile number or email address below and we'll send you a link to download the free Kindle App.Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.“I think it’s taken me 30 years to realise that I’m worth something. I still question my boyfriend all the time about whether I am attractive to him. But I’m more comfortable being me and not having to define myself by how attractive I am anymore.”And it’s got to be hard, after the abusive relationship that you were in, to trust that your partner is with you for the right reasons, and they find you attractive for the right reasons. I’m constantly like, And it hurts that I have to think like that, but I feel like I have to be skeptical in order to protect myself.And it can really hinder love from happening — when you become so overly worried and anxious all the time.
uk is a dating site offering making friends, finding pen pals and romantic relationship for the UK residents and people of other countries.
They don’t get that, growing up, I might have felt more ugly because I was constantly told that being dark is ugly.“My parents also did pressure me to work hard and make a lot of money. I do want to do a lot of great things, but I do have a lot of self-doubt, and it was built by a lot of gender and cultural anxieties.”Ooh! How are you feeling about the prospect of your partner meeting your parents? It’s strange that I have this anxiety, because our mutual friends have assured me that he’s dated women of other cultures before. But again, you still always worry what are they going to say? What if in the middle of the dinner he decides he doesn’t want to be with me because it’s too culturally different?
The men I meet don’t understand this need for perfection I have of myself. And I wonder if other people feel this way — worried about how it’s going to work out?
Jesus stands out among the many faiths of the world because He's the only religious leader who claimed to be God. Lewis wrote, He's either a lunatic for making such outrageous claims, yet every other thing about his life was very sane.
As professional women always on the lookout for the best and the brightest life has to offer, we can’t help but reflect back on our past dating experiences, as well as the ones we are currently exploring and those we’ve yet to discover. If you don’t have a valentine, hang out with your girlfriends, don’t go looking for someone. I’ve since learned the key to a good date is to pay attention to her. If you kiss on the first date and it’s not right, then there will be no second date. It’s really difficult to see who is who, so it is important to be yourself. Mary Tyler Moore was a working woman whose story lines were not always about dating and men. You’re not as trusting, or as eager to get back out there and expose yourself to someone. If I’m with a man, is that going to prevent me from achieving my goal? |
Article content
Sir Ian McKellen was offered US$1.5 million to dress as his beloved Lord of the Rings character Gandalf at billionaire Sean Parker’s wedding.
The offer was made to McKellen through an intermediary on behalf of Parker, who was Facebook’s first president, and the co-founder of the music streaming service Napster. Though the actor refused, he said he still would have considered officiating the 2013 ceremony if Parker hadn’t demanded that he be in character.
We apologize, but this video has failed to load.
tap here to see other videos from our team. Try refreshing your browser, or 'Gandalf doesn't do weddings': Ian McKellen turned down $1.5 million to officiate Lord of the Rings wedding Back to video
“I was offered one and a half million dollars to marry a very famous couple in California, which I would perhaps have considered doing but I had to go dressed as Gandalf,” McKellen said in Britain’s The Daily Mail. “So I said, ‘I am sorry, Gandalf doesn’t do weddings.'”
The real McKellen, however, is available for weddings. Having qualified as a celebrant in 2013, when he officiated the civil wedding of friend and actor Patrick Stewart with musician Sunny Ozell. |
Borderlands 2 Sets The Stage With Launch Trailer
It’s nearly time. Borderlands 2 launches tonight at midnight EST, and Gearbox Software is setting the stage for their biggest story yet with a launch trailer showing just how hectic this game is really going to be. Make no mistake, Handsome Jack is waging a war to get to the next vault, and he does fancy himself the hero of this monumental sequel.
Watch as Salvador, Maya, Axton, and Zer0 do whatever they can to put Hyperion down. Warning, the trailer actually spoils what the hell is in the vault, so keep in mind that if you don’t want to know until you play the game, this may not be the trailer for you. Otherwise, sit back and enjoy the launch trailer. Fist bumps are too good.
I'm a twenty-seven year old video game design student from Sunset Park, Brooklyn. If I'm not working or doing schoolwork, I can typically be found on Xbox Live under the name "Red Ring Ryko". I am thoroughly enamored with video games as a means of interactive expression, and am fully dedicated to bolstering the legitimacy of the medium and its culture. |
The Wait… My Story.
You heard of it, on television, radio and even seen it in the bookstores and on websites. This book is growing more popular by the second. I have to admit that I’m enjoying the book. Not that The Wait is anything new, however in a sex crazed world, it’s certainly a breath of fresh air.
I’ve been celibate going on 5 years, so I’ve been “waiting” but it’s awesome to know that this unlikely choice is becoming more and more desired.
My own choice to wait came after 5 abortions, 7 different sexual partners including the father of my child, with whom I was in relationship with for 10 years. It wasn’t really that hard of a decision, I just stopped. One day I just didn’t desire it anymore. Just like that my need for that stimulating feeling just dried up.
I can remember during that time in my life, I always thought of sex as a high. That was my drug of choice. I would always have to have that feel good feeling, so if I couldn’t have actual sex, I would masturbate. I would watch porn. I did what I needed to do to feel that climatic feeling.
Clearly at this time in my life, I didn’t value my body. Having sex was clouding my judgment, had I not been involved in that behavior, I would have made wiser choices when it came to giving my body away freely. I mean how it that Jesus paid a price for me, the son of God, the king of kings and here I am just giving myself away to people who couldn’t pay the cost to be with me. Although there is no monetary cost on my body, there is a cost of love, respect and commitment.
And there is a cost for you too.
In my celibacy, I’ve noticed how unclouded my judgement has been, how I am able to make sound decisions on who I spend my time with and how I spend my time.
Just as they said in the book, the wait isn’t about punishment. I actually find it quite rewarding. Choosing to wait, actually keeps you from wasting time. You are no longer a slave to your feelings and emotions. Your perception of a potential mate isn’t distorted. You can really see someone for who they truly are when sex is off the table.
Is choosing to wait EASY. No, but I can tell you through experience, it’s worth it. I wish I knew then what I know now.
Which is why I started a business based on the christian principle of celibacy, purity and abstinence. I’m on a pursuit of becoming that Titus 2 woman, that says the older women are to teach what is good.
My hope is that through my transparency, that you can find your true value. For God said, you worth is far above rubies (Proverbs 31:10) and whether you choose to believe it or not, you are precious to God. I want women (and men too) to know that YOU ARE WORTH THE WAIT.
It’s not to late to realize your worth and demand that others see it too. You can start your own story of “the wait” today, right now. It’s sure to be a story of courage and bravery. |
Q:
which gstreamer rtp payloader element should I use to wrap AAC audio?
I am trying to figure out the proper gstreamer element to use to transmit AAC audio over RTP.
By dumping the dot graph of a playbin on the file I can conclude that the caps coming out of the tsdemux is audio/mpeg,mpegversion:2,stream-format:adts .
If I use the following pipeline
gst-launch-1.0 -v filesrc location=$BA ! tsdemux ! audio/mpeg ! rtpmpapay ! filesink location=/tmp/test.rtp
it fails:
Setting pipeline to PAUSED ...
Pipeline is PREROLLING ...
/GstPipeline:pipeline0/GstCapsFilter:capsfilter1: caps = audio/mpeg
WARNING: from element /GstPipeline:pipeline0/GstTSDemux:tsdemux0: Delayed linking failed.
Additional debug info:
/var/tmp/portage/media-libs/gstreamer-1.12.3/work/gstreamer-1.12.3/gst/parse/grammar.y(510): gst_parse_no_more_pads (): /GstPipeline:pipeline0/GstTSDemux:tsdemux0:
failed delayed linking some pad of GstTSDemux named tsdemux0 to some pad of GstRtpMPAPay named rtpmpapay0
ERROR: from element /GstPipeline:pipeline0/GstTSDemux:tsdemux0: Internal data stream error.
Additional debug info:
/var/tmp/portage/media-libs/gst-plugins-bad-1.12.3/work/gst-plugins-bad-1.12.3/gst/mpegtsdemux/mpegtsbase.c(1613): mpegts_base_loop (): /GstPipeline:pipeline0/GstTSDemux:tsdemux0:
streaming stopped, reason not-linked (-1)
ERROR: pipeline doesn't want to preroll.
Setting pipeline to NULL ...
Freeing pipeline ...
Which gstreamer element should I be using to wrap AAC audio in an RTP packet?
A:
I guess its rtpmp4apay: RTP MPEG4 audio payloader. Maybe you want/need aacparse before the payloader as well.
|
Reads R to L (Japanese Style), for T+ audiences. Iku is witness to a disturbance during a Board of Education speech on protecting children from the danger of books. The perpetrators are two young boys protesting the banning of their favorite books. But while Iku wants to reach out to the next generation of book lovers, Dojo insists that they can't play favorites. Will Dojo's prickly insistence on sticking to the rules ruin their budding friendship? |
Q:
Is a transistor appropriate for this?
I have a thermal camera whose external shutter doesn't close when commanded to by the camera. I think it is a current issue. Something is fried or worn out within the camera's electronics. The shutter works fine as I can get it to close by applying Vcc to the correct pin on the shutter. When the camera commands pin A to go high, it goes high, but all that happens is there is a very high pitched whine heard from the camera and the shutter never closes. Vcc is 3v, and when A goes high it is also 3v. How would I make it so that when A goes high, a switch is closed connecting Vcc to A?
A:
simulate this circuit – Schematic created using CircuitLab
|
The cost-effectiveness of implementing a new guideline for cardiovascular risk management in primary care in the Netherlands.
A new Dutch guideline for cardiovascular disease management substantially extends the number of individuals for whom treatment with statins and/or antihypertensive agents is recommended. We estimated the cost-effectiveness of implementing the new guideline at the national level. First, the number of currently untreated individuals who would become eligible for cholesterol-lowering or antihypertensive treatment under the new guideline was estimated using data from a recent population study. Cost-effectiveness of treating this group of patients was then assessed using a mathematical model. Implementing the guideline in the age category 30-69 years would lead to an additional 465,000 individuals requiring treatment. Over a period of 20 years, the cumulative incidence of acute myocardial infarction in the whole population would drop by 3.0%, that of stroke by 3.9%, and all-cause mortality would drop by 0.9%. The lifetime cost-effectiveness ratio was calculated to be 15,000 Euro per quality-adjusted life year gained. In the age categories 70-79 years and 80 years or above, an additional 600,000 and 450,000 persons, respectively, would need to be treated, resulting in corresponding reductions in cumulative incidences of 14 and 18% (acute myocardial infarction), 17 and 22% (stroke), and 1.2 and 0.6% (all-cause mortality) with cost-effectiveness ratios of 20,800 and 32,300 Euro, respectively, per quality-adjusted life year. Complete implementation of the new guideline would lead to a considerable increase in the number of individuals requiring treatment. This would be cost-effective up to the age of 70 years. |
Q:
.NET Antialias not working on server
I have an ASP.NET web application that display some images. For thumbnail display, I have to resize them. Here is my code:
var newImage = new Bitmap(sourceImage, width, height);
var g = Graphics.FromImage(newImage);
g.InterpolationMode = InterpolationMode.HighQualityBicubic;
g.SmoothingMode = SmoothingMode.AntiAlias;
g.PixelOffsetMode = PixelOffsetMode.HighQuality;
g.DrawImage(newImage, 0, 0, newImage.Width, newImage.Height);
newImage.Save(path,GetEncoder(ImageFormat.Jpeg), myEncoderParameters);
Everything looks ok if I run in LOCALHOST. However, when I publish on server, the image quality is very poor and broken.
As Microsoft documentation (http://msdn.microsoft.com/en-us/library/system.drawing.graphics.smoothingmode%28v=vs.110%29.aspx), the System.Drawing namespace is not support for some platform, but seems like that's not my case (I'm not very sure). This is my server system specification: http://i.stack.imgur.com/ByVZ1.jpg (Please follow the link, I do not have enough reputation to post image).
Can anyone please help me with this. Thanks very much.
A:
I got an answer by myself. The problem is when I call
g.DrawImage(newImage, 0, 0, newImage.Width, newImage.Height);
It will draw an resized image into itself, that is the object:
new Bitmap(sourceImage, width, height));
so all the settings of the graphic object is not affected. The resize functioned actually at the above line of code.
The correct solution should be:
g.DrawImage(sourceImage, 0, 0, newImage.Width, newImage.Height);
And everything works now.
|
Your Reviews
"I bought this book after having used What to Expect:…"
28-Mar-2008
I bought this book after having used What to Expect: the First Year which I found very useful. I like the dip-in, dip-out style, which means that you can choose which bits you want to read and which to skip, without problems.
The Authors' style is quite relaxed, which I felt very comfortable with. Even if DS is my PFB, this book did not increase anxiety or concerns about any issues and generally gave good, level-headed and balanced advice.
Mumsnetter spamm
""Excellent in terms of thoroughness, the only thing they miss…"
07-Jan-2007
"Excellent in terms of thoroughness, the only thing they miss out is the phone number of the author so that parents can have a sympathetic ear when their kid isn't sleeping.. again! (but it's OK because I've got mumsnet!)" "It includes many extra chapters on topics like childcare, potty training, weaning, teething and illnesses that all parents want to know about." "It covers up to age three with lots of useful age-appropriate advice" and" though the tone is a textbook l and formal at times, it's comprehensiveness and accessible Q and A style (plus milestones) can't be faulted." |
/*global window: false, $: false*/
var core = require('duality/core');
exports['rewriteGroups'] = function (test) {
test.same(core.rewriteGroups('/some/path', '/some/path'), {});
test.same(
core.rewriteGroups('/path/:name', '/path/somename'),
{name: 'somename'}
);
test.same(
core.rewriteGroups('/:one/:two/:three', '/a/b/c'),
{one: 'a', two: 'b', three: 'c'}
);
test.same(
core.rewriteGroups('/path/:name', '/path/foo?test=123'),
{name: 'foo'}
);
test.done();
};
exports['replaceGroups'] = function (test) {
test.equal(
core.replaceGroups('/some/string', {some: 'groups'}),
'/some/string'
);
test.equal(
core.replaceGroups('/some/:group', {group: 'val'}),
'/some/val'
);
test.equal(
core.replaceGroups('/:one/:two/:three', {
one: 'a',
two: 'b',
three: 'c'
}),
'/a/b/c'
);
test.equal(
core.replaceGroups('/some/:group/*', {
group: 'val'
}, 'splat/value'),
'/some/val/splat/value'
);
test.equal(
core.replaceGroups('static/*', {}, 'splat/value'),
'static/splat/value'
);
test.done();
};
exports['rewriteSplat'] = function (test) {
test.strictEqual(
core.rewriteSplat('/some/path', '/some/path'),
undefined
);
test.strictEqual(
core.rewriteSplat('/some/path/*', '/some/path/'),
''
);
test.equal(
core.rewriteSplat('/some/path/*', '/some/path/splat/value'),
'splat/value'
);
test.done();
};
exports['script tag context'] = function (test) {
test.expect(2);
// a new script tag should access the same context as the originally loaded
// code, persisting module state between script tags.
var events = require('duality/events');
events.on('_test_script_tag_context_event', function () {
test.ok(true, '_test_script_tag_context_event fired');
});
window._script_tag_context = function () {
test.ok(true, '_script_tag_context called');
};
$(document).append('<script>' +
'window._script_tag_context();' +
'require("duality/events").emit("_test_script_tag_context_event");' +
'</script>');
test.done();
};
exports['circular requires'] = function (test) {
test.equal(require('lib/module_a').b_name(), 'Module B');
test.equal(require('lib/module_b').a_name(), 'Module A');
test.done();
};
|
Microencapsulated ciliary neurotrophic factor: physical properties and biological activities.
Controlled drug release in the CNS and PNS is still an obstacle to the treatment of neurodegenerative disorders. We have prepared a variety of microspheres containing either ciliary neurotrophic factor (CNTF) or genetically engineered cells able to synthesize and release this cytokine. CNTF is a multifunctional cytokine that can regulate the survival and differentiation of many types of developing and adult neurons. However, when given in therapeutically effective doses by systemic injections, it produces numerous adverse side effects. In order to minimize these effects we have microencapsulated it in biopolymers (chitosans, alginates, and copolymers in various proportions to achieve different kinetic properties). Size distribution profiles were determined by an image analysis system and surface characteristics were assessed by electron microscopy. The total content of CNTF as well as the amounts released per day were determined by ELISA and in vitro bioassays. The results from the release kinetics demonstrate that long-term secretion (up to 24 days) of CNTF is achieved by combining chitosan with copolymerized lactic and glycolic acid, whereas microspheres made of alginate provided only relatively short-term release (2-12 days). Neuron survival and neurite outgrowth in cultures of ciliary ganglia were supported by microencapsulated CNTF, indicating biological stability of CNTF. Genetically engineered human kidney cells 293 continued synthesizing CNTF within spheres and the released amounts of CNTF in the culture medium were comparable to the amounts secreted from monolayers (1 ng/ml of supernatant from confluent cultures) or even higher. These studies provide a basis for future testing of CNTF in encapsulated preparations using animal models of neurodegenerative disorders. |
Windows
General discussion
floppy drive will not read in 98
have loaded three different version of 98, loaded it three different ways, even loaded 95. The floppy dirve works during the instalation process, as soon as 98se is functional the floppy drive will not read
All Comments
floppy drive will not read in 98
It could be a couple of things. It could be a BIOS issue, a controller issue or an IRQ, address or DMA conflict.
I guess I would first look at Device Manager and see if there are any resource conflicts.
Then I would look at the BIOS setup tosee if anything wierd like drive swapping is enabled.
Then I would try swapping out the controller - if it's embedded in the motherboard, you'll have to disable it in the BIOS and use a multi-I/O card with everything disabled except the FDC.I've only seen this once and it turned out to be a problem with the FDC controller embedded on the motherboard.
floppy drive will not read in 98
Start or search
Create a new discussion
If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.
Post type
Subject title
Topic Tags
Select up to 3 tags (1 tag required)
Cloud
Piracy
Security
Apple
Microsoft
IT Employment
Google
Open Source
Mobility
Social Enterprise
Community
Smartphones
Operating Systems
Windows
Mac
Malware
Tablets
Networking
Browser
Hardware
Software
Web Developerment
Linux
Off Topic
Message Body
Track this discussion and email me when there are updates
Please note: Do not post advertisements, offensive material, profanity, or personal attacks. Please remember to be considerate of other members. If you're new to the TechRepublic Forums, please read our TechRepublic Forums FAQ. All submitted content is subject to our Terms Of Use. |
Q:
Set Person field type in a SharePoint Designer Workflow best practices
In SP Designer, when using the "Set Field in Current Item" action, if the field you are setting is a Person type, there are several choices to "return" the data as. For example, if setting your Person field to the current item's Modified By or Created By, these are also Person fields but can be returned as one of the following:
As String
Display Name
Email Address
Login Name
User ID Number
Is there any gotcha in choosing one of these to set a Person field as? Is there any choice that won't set the person correctly and resolve it to a SharePoint person type?
A:
I always use the User ID Number since that will always be unique for the user. Depending on the set up and management of users the Display Name, Email Address and String may not be unique.
|
1. Field of the Invention
The present invention relates to a vaporizer for liquid fuel for producing a fuel-air mixture including a vaporization member for the fuel and which is arranged within a flow chamber for combustion air. The surface of the vaporization member which is streamed against by the combustion air is moistened with fuel.
2. Discussion of the Prior Art
Vaporizers of this type are known in the art. Thus, for example, in U.S. Pat. No. 4,486,362 there is described an arrangement for the formation of a mixture which is constituted of liquid fuel and combustion air, in which the fuel from a surface moistened by fuel vaporizes in preheated combustion air which flows past the surface. However, for example, during the utilization of heating oil as the liquid fuel, deposits are accumulated on the vaporization surface, which adversely influence the long-term operation of the vaporizer. Moreover, with consideration given to the trickle film which is formed on the vaporization member as a result of gravitation, and whose vaporization surface cannot be constructed sufficiently large, the air temperature is set higher than would be desirable in order to avoid the formation of cracking products in the heating oil. In addition thereto, it is difficult to avoid the discharge or carrying out of fuel droplets which are dragged along by the fuel-air mixture, in order to be able to obtain a fuel- air mixture which is only constituted of fuel vapor and combustion air and to thereby achieve a combustion of the fuel-air mixture which is almost devoid of any noxious materials. |
456 N.W.2d 135 (1990)
STATE of South Dakota, Plaintiff and Appellee,
v.
Craig Alan HANSON, Defendant and Appellant.
No. 16729.
Supreme Court of South Dakota.
Considered on Briefs March 19, 1990.
Decided May 16, 1990.
*136 George H. Danforth, Huron, for defendant and appellant.
Diane Best, Asst. Atty. Gen., Pierre, for plaintiff and appellee; Roger A. Tellinghuisen, Atty. Gen., on brief.
*137 SABERS, Justice.
Craig Alan Hanson appeals his conviction for attempted rape in the first degree.
Facts
In late April of 1988, a man walked up to the Dairyland counter in the Huron Mall shortly before closing at 9:00 p.m. A sixteen-year-old girl, who was working alone, waited on the man. She asked him if he would like anything. He replied: "You," and began to talk about the girl's body, describing it as good-looking and "hot." Eventually, the girl walked to the back room and the man left.
On May 9 or 10, the man again encountered the girl working alone at Dairyland. As before, he approached the counter shortly before closing, and the girl asked if she could help him. He asked her if she was ready yet and said: "Can't you get the hint yet." She walked to the back and picked up the phone. When she turned around, the man was gone.
The girl worked alone again on the evening of May 12, 1988. After closing about 9:00 p.m., she took the garbage to a dumpster in a well-lighted, enclosed area outside of the mall. She was also carrying a money bag with money, a T-shirt, and some books. When she got to the dumpster, she put the money bag, T-shirt, and books on the ground, lifted the dumpster lid and tossed the garbage inside. Just as she released the garbage, she was grabbed from behind and thrown to the ground by the man. He wrapped his legs around hers and sat on top of her. She began to scream and fight, trying to get the man off her. He kept telling her to shut up, then began grabbing at her shirt and smock. When he started opening the smock, she proceeded to fight even harder. Some buttons were ripped off the smock in the process. After struggling for a minute or two, the man got up and ran out of the dumpster area.
After the man ran off, the girl picked up her things and went home. She told her step-father about the attack, and he called the police. She noticed that she was bruised and had fingernail scrapes down her face.
Approximately one week after the attack, the girl went to the police station to look at some police sketches. How many sketches she looked at is uncertain, but she identified one as her attacker. That sketch had been prepared for another case.
Over the course of the summer, the girl was asked on two or three occasions to come to the police station to look at an individual. On each occasion she determined the person she looked at was not her attacker. In September, she went to the police station to look at a photo lineup. The officer in charge of the investigation, Dave Rand, had prepared a book with eight photos in it. The girl was told to look at the book and was left alone in an interview room. She promptly identified Hanson's picture as that of her assailant. The officer then showed her a full-length picture of Hanson, and she confirmed that he was her assailant.
Hanson was charged with attempted rape in the first degree. At the trial, over defense counsel's objection, the girl identified Hanson as her attacker. The jury found Hanson guilty and he was sentenced to serve twelve and one-half years in the state penitentiary. Hanson raises three issues on appeal. He claims:
1. The trial court erred in failing to suppress the in-court identification,
2. The crime of attempted rape in the first degree was not, as a matter of law, committed, and
3. The evidence presented at trial was insufficient to support the conviction.
1. Suppression of the in-court identification.
Hanson claims the trial court should have refused to allow the girl's in-court identification of him as her assailant. He argues the identification procedure was conducted in such an improper manner that the identification is unreliable. The argument is based upon several claimed improprieties in the investigation process, including the showing of sketches and several one-person showups without a record of *138 these activities. However, Hanson's main claim is that in June of 1988 the girl observed him at the police station and said he was not her attacker, making her later identification of him unreliable.
At the hearing to consider the motion to suppress the in-court identification, Hanson offered testimony that on the morning of June 13, 1988, two law enforcement officers went to his house and asked him to come down to the police station. Hanson says he went to the station and answered questions regarding this case. He claimed the officer conducting the investigation asked him if he would mind if someone came down to look at him. Hanson said he would not mind, so the officer had the girl come to the police station. When the girl arrived, Hanson says she looked at him and told the officer he was not her attacker.
In contrast, the State offered testimony that Hanson was never called to the police station for questioning. Rand testified that he never interviewed Hanson, and the reason he went to Hanson's house was to look for Hanson's brother, whose car had been identified in another case. The officer accompanying Rand likewise testified that the reason they went to Hanson's house was to check on a suspect vehicle in a rape case and Hanson's brother was the owner of that vehicle. Rand claims that Hanson's brother came to the police station later and was questioned by someone. In addition, the girl testified that she was called to the station to look at a man and a car, and she identified a picture of Hanson's brother as the person she saw when she was called to the police station for that purpose.
The evidentiary rulings of a circuit court will be disturbed only if the court abused its discretion. State v. Bartlett, 411 N.W.2d 411 (S.D.1987); accord State v. Wedemann, 339 N.W.2d 112 (S.D.1983). In-court identifications will be suppressed when they stem from a procedure "that is so impermissibly suggestive as to result in a very substantial likelihood of irreparable misidentification." State v. Iron Thunder, 272 N.W.2d 299, 301 (S.D.1978); accord State v. Jaeb, 442 N.W.2d 463 (S.D.1989); Simmons v. United States, 390 U.S. 377, 88 S.Ct. 967, 19 L.Ed.2d 1247 (1968). The party seeking to suppress the in-court identification bears the burden of establishing the impermissible suggestiveness of the identification procedure. Id. The suggestiveness of the procedure is evaluated by examining the totality of the circumstances surrounding the identification procedure. Jaeb, supra. Under the totality of the circumstances, if there is not a very substantial likelihood of irreparable misidentification, then the reliability of an in-court identification is for the jury to weigh. As the United States Supreme Court explained in Manson v. Brathwaite, 432 U.S. 98, 116, 97 S.Ct. 2243, 2254, 53 L.Ed.2d 140, 155 (1977):
We are content to rely upon the good sense and judgment of American juries, for evidence with some element of untrustworthiness is customary grist for the jury mill. Juries are not so susceptible that they cannot measure intelligently the weight of identification testimony that has some questionable feature.
Hanson has not met his burden of establishing the impermissible suggestiveness of the identification procedure. Although there are questions about the identification procedure, they do not rise to the level of a very substantial likelihood of irreparable misidentification. If the testimony of the State's witnesses is believed, then it is unlikely any particular identification was suggested. Furthermore, the girl got a good look at her attacker on three separate occasions, making it unlikely that she would be confused about the identity of the attacker. Consequently, the court did not abuse its discretion in allowing the jury to determine the reliability of the identification.
2. Whether the crime of attempted rape was committed.
Hanson claims the crime of attempted rape in the first degree could not be committed under the facts of this case as a matter of law. SDCL 22-4-1 provides in part that:
*139 Any person who attempts to commit a crime and in the attempt does any act toward the commission of the crime, but fails or is prevented or intercepted in the perpetration thereof, is punishable[.]
In other words, the statute makes criminal any unequivocal act toward the commission of a crime that would result in the accomplishment of the crime unless frustrated by intervening circumstances. State v. Martinez, 88 S.D. 369, 220 N.W.2d 530 (1974).
Hanson claims the facts of this case show neither an unequivocal act nor an intervening force preventing the commission of the crime. He claims one of the parties would have to have clothes removed before conduct could be deemed an unequivocal attempt to rape. Such a requirement would construe the statute too narrowly. An unequivocal act is an act that "no longer strike[s] the jury as being equivocal but unequivocally demonstrate[s] that a crime is about to be committed." Id., 88 S.D. at 372, 220 N.W.2d at 531. In this case, the jury was justified in concluding that the act of grabbing the girl, throwing her to the ground, and pawing at her clothes demonstrated that the crime of rape was about to be committed.
Hanson also argues that the abandonment of the crime was not caused by intervening circumstances required by the statute. He claims the intervening circumstances that frustrate an attempted crime must be more than the usual resistance expected from someone being attacked. Hanson again construes the statute too narrowly. As we explained in State v. Judge, 81 S.D. 128, 131 N.W.2d 573 (1964), the intervening circumstance frustrating the commission of the crime need only be independent of the will of a defendant. Indeed, the statute provides that it is sufficient if the attempt simply "fails." Therefore, the resistance of a victim is sufficient to constitute an intervening circumstance frustrating the commission of a crime.
3. Sufficiency of the evidence.
Hanson contends the evidence submitted at trial was insufficient to support his conviction. We disagree. In determining the sufficiency of the evidence on appeal, our review is limited to determining whether there is evidence in the record which, if believed by the fact finder, will sustain a finding of guilt beyond a reasonable doubt. State v. LaCroix, 423 N.W.2d 169 (S.D.1988); see also State v. Ashker, 412 N.W.2d 97 (S.D.1987). We must accept the most favorable inferences that can be drawn from the evidence in support of a verdict. State v. Miskimins, 435 N.W.2d 217 (S.D.1989). Furthermore, in determining the sufficiency of the evidence to sustain a conviction, it is not the province of this court "to resolve conflicts in the evidence, pass on the credibility of witnesses, or weigh the evidence." State v. Faehnrich, 359 N.W.2d 895, 900 (S.D. 1984).
Hanson does not argue that there is insufficient evidence in the record to sustain the finding of guilt beyond a reasonable doubt, but instead argues that there is evidence in the record that supports his innocence. In other words, Hanson is asking this court to accept his evidence rather than the evidence presented by the State. To do so we would have to resolve conflicts in the evidence, pass on the credibility of witnesses, and weigh the evidence. That is the function of the jury, not this court. We must accept the jury's treatment of the evidence, and may only look to determine whether there is evidence in the record to support their conclusion. Since the testimony of the girl, if believed by the jury, supports the conviction, it must be upheld.
WUEST, C.J., and MORGAN and MILLER, JJ., concur.
HENDERSON, J., concurs specially.
HENDERSON, Justice (concurring specially).
Hanson's claim that attempted rape was not committed falls on deaf ears, at this judicial window. A stranger, he accosted her in the store where she worked with suggestive language. Later, he grabbed her outside of the store and threw her to *140 the ground. He entwined his legs around her and sat on her pelvic area. He ripped at her shirt and the smock supplied by her employer, trying to open them. His vocal overtures to have sex with him, accompanied by his force, creates an attempt to commit a crime under the definition of SDCL 22-4-1. Said statute, when tied in with the definition of rape under SDCL 22-22-1(1) establishes, in law, an "act." It was for the jury to decide if his act was of such nature to be an "equivocal act" to ensure that the intended result was a crime and not any other innocent act. State v. Martinez, 88 S.D. 369, 220 N.W.2d 530, 531 (1974). An act is supposed to unequivocally demonstrate that a crime is about to be committed. Martinez id., 220 N.W.2d at 531. Very recently, this Court applied the Martinez analysis in a sexual assault appeal. State v. Haase, 446 N.W.2d 62 (S.D. 1989). Surely, had this young lady not fought like a cougar, she would have been raped.
|
Stage III diffuse lamellar keratitis following conductive keratoplasty over a LASIK flap.
A 48-year-old man who had conductive keratoplasty (CK) for consecutive hyperopia following myopic laser in situ keratomileusis (LASIK) developed progressive diffuse lamellar keratitis. To our knowledge, this is the first report of CK after LASIK that required surgical intervention for interface inflammation. |
Stephen E Prettyman
Stephen E Prettyman, has NPI number #1417077264, practices at 301 West Burlington Avenue, Fairfield IA. Stephen E Prettyman specializes in clinical social worker and has over 13 years of experience in the field of medicine. New patients are welcome to contact Stephen's office, call (641) 472 1684 to the doctoc's office to know doctor's practice, includes clinics, staff, opening hours and medical advice or book an appointment.
Office Location & Contact Information
Stephen practice address, contact phone number and fax are as below. Check locations where Stephen practices near Ottumwa IA for appointment.
Malpractice information The doctor has not made a payment on a malpractice claim in Fairfield, Iowa.Medicare Assignment He may accept accept the Medicare-approved amount as full payment for covered services.
Advertisements
Hours of Operation
These hours represent this office's business hours. Stephen E Prettyman's opening hours may vary from the office hours displayed here.
Stephen E Prettyman has been identified as specializing in clinical social worker and has been in practice for more than 13 years.
Medical Licenses
He can have one or more medical licenses for different specialities in Iowa or the different states. Related medical licenses for Stephen E Prettyman are as mentioned below.
Taxonomy: 1041C0700X
Speciality: Clinical
Type: Social Worker
Licence Number: 06375 (Iowa)
Definition: A Social Worker Who Holds A Master's Or Doctoral Degree In Social Work From An Accredited School Of Social Work In Addition To At Least Two Years Of Post-master's Supervised Experience In A Clinical Setting. The Social Worker Must Be Licensed, Certifi.
Participated in the Medicare Maintenance of Certification Program: N/A
Heart health through the Million Hearts® initiative: N/A.
Appointments
Appointments may be made for routine visits or new problems that you may be experiencing. Knowing what questions to ask before, during and after appointments is vital to better understand, and therefore manage, an illness.
This doctor profile contains information from Centers for Medicare & Medicaid Services (CMS), you may contact Stephen E Prettyman at 301 West Burlington Avenue, Lifesolutions Behavioral Health, Fairfield IA for for public information or questions about the doctor's profile. If you are Stephen Prettyman and let us know if this information is out of date or incorrect, please report a correction to update this doctor profile!
Patient Reviews
There are currently no reviews for Stephen. Tell us about your experience by posting a comment or review about Stephen to help others decide which doctor is right for them. |
Q:
only return records with odd count in a table with sql command
I have a warehouse table in my Access database that looks like this:
product_id
10
20
20
30
30
30
40
40
40
40
Now I need an SQL query to return 10, 30
product_ids which have odd count in the table.
SELECT product_id, Count(product_id) AS cnt
FROM warehouse
GROUP BY product_id;
This query returns the count of each value, but how can I edit it to only return rows with odd cnt?
A:
You could use a having clause with the mod operator:
SELECT product_id, COUNT(product_id) AS cnt
FROM warehouse
GROUP BY product_id
HAVING COUNT(product_id) MOD 2 = 1;
|
Two Degrees of Reality TV
Here’s the thing: you live in Los Angeles, you’re going to know people involved in television, movies and music. It’s just like if you lived in Omaha, you’d probably know someone in insurance or, I dunno, steaks. It’s just one of the industries.
That means it’s easy to become jaded when you hear about someone being on TV, especially if it’s the reality kind. I’ve known twopeople who appeared on reality shows, and the only charm was seeing my high school classmate get ribbed for sticking with her assclown of a boyfriend (and, yes, I hang my head in shame that I watched Temptation Island). I think we watched only one episode of Alex’s Survivor, and that was because it was at the end of a TnT workout and there was food and beer involved.
However, it’s tough not to be excited when Diana sent this link around. Holy crap! Here’s hoping our man Anthony takes all! |
def f(implicit i: Int) = {}
println(/* offset: 4, applicable: false */ f) |
With just over two months to go to the Bitcoin halving, price prediction models are popping up more frequently. One well-noted model, known as ‘stock-to-flow,’ is painting a profitable future for BTC if history repeats.
Bitcoin has spent most of this week consolidating in the high-$8,000 region. The longer it stays here the less likely it is to make another massive dump. Momentum could be building for the upcoming halving which could create exponential gains if this particular model stays true.
Bitcoin Stock-to-Flow on Track
The stock-to-flow (S2F) model is the brainchild of an analyst who goes by the handle ‘PlanB’ (@100trillionUSD). It was originally published in March 2019 and examines the relationship between the production of supply and the current stock available — essentially calculating Bitcoin’s value through scarcity.
With just 67 days to go until the next halving, the analyst has revisited his S2F model noting that things are still on track. Plotting prices that exactly match the model shows how accurate it has been in the past.
As happened in 2012 and 2016, the price may lag below the model for another year, represented by the red dots in the graph. However, if it can catch up at some time in 2021 it will put Bitcoin prices at around $100,000 according to this theory.
Where Will The Money Come From?
It’s all very well predicting six-figure Bitcoin prices, but that inflow of capital has to come from somewhere. So far this year BTC has gained 22.5% to current levels, but it’s going to take a lot more to reach new highs.
When asked about where this new capital will come from, the analyst speculated several sources. He suggested that some will come from silver and gold, as institutional investors discover the best performing asset over the past ten years.
Additionally, and this is much more relevant today than when the paper was written, inflow could come from countries with negative interest rates such as Japan, parts of Europe, and soon to be the U.S.
Predatory governments such as Turkey, Venezuela, Iran, and China could create new momentum as could investors fearing more quantitative easing measures. India can now be added to that list as it has just been given the green light for cryptocurrency transacting. |
Limited Liability Partnerships restructuring as new tax laws loom
3rd February 2014
Limited Liability Partnerships (LLPs) are considering whether and how to restructure themselves following new laws in April 2014 which could result in LLPs and their members having to pay more tax.
Under existing law, LLP members are taxed as if they are partners in an 'ordinary' partnership, even though an LLP is a corporate entity and members' liability for its debts is limited. However, it is possible for membership of an LLP to be structured in such a way that some members work on terms very similar to those of an employee in a limited company. For example, a member may be given a fixed salary rather than a share in profits.
This could mean a salaried member of an LLP pays less tax than an employee of a limited company (or even a partner in an 'ordinary' partnership), even though they both work on similar terms. In addition, the LLP does not have to pay employers' national insurance (NI). The Government has therefore been concerned that LLPs were being used to avoid employment taxes.
When the new legislation comes into force on 6 April 2014, an LLP member is to be taxed as an employee, and its LLP is therefore liable to pay employers' national insurance contributions if the member satisfies all of the following conditions:
They perform services for the LLP in their capacity as a member.
They are to be wholly or substantially rewarded through a 'disguised salary'. This means earnings that are fixed (or, if they are varied, are varied without reference to the profits or losses of the LLP). The member is likely to be 'substantially' rewarded by a disguised salary if more than 20 per cent of their projected income is based on the LLP's profits.
They do not have 'significant influence' over the whole of the affairs of the LLP. Influence over, for instance, an office or department only will not be 'significant' and the more members there are, the harder this test will be to meet.
They contribute less than 25% of their 'disguised salary' as capital – ie the member runs a real risk of losing a significant investment, made for the duration of their membership, if the LLP fails.
As well as having to pay NI contributions, LLPs may have to provide for auto-enrolment pensions for the relevant members, and identify any benefits in kind they receive so they can be taxed too.
Furthermore, if the LLP's profits vary each year, the LLP may find some of its members are within the 20 per cent rule in some years but not others. This means one year they may be taxed as an employee and the next as a member. The situation can quickly become complex.
Recommendation
LLPs should review members' terms to check if any could be liable to taxation as employees under the new rules and, if so, whether their terms should be changed so they no longer satisfy all the conditions – for example, that they contribute more than 25 per cent of their disguised salary as capital.
Your login details have been used by another user or machine. Login details can only be used once at any one time so you have therefore automatically been logged out. Please contact your sites administrator if you believe this other user or machine has unauthorised access. |
/* @flow */
export const VARIANT = {
danger: 'danger',
success: 'success',
warning: 'warning'
};
|
Q:
How does $3\cdot 3^k - 3^k$ become $2 \cdot 3^k$?
Sorry for the really simple question. I am trying to help my kid with her SAT practice homework.
Step 1
$$3\cdot 3^k - 3^k = m$$
Step 2
$$2 \cdot 3^k = m$$
Step 3
$$3^k = \frac{m}{2}$$
I cannot grasp how they went from Step 1 to Step 2. Can someone please explain in the most basic steps possible? Thank you in advance.
Chris
A:
For equations like this, is can often help to replace the confusing part with a simpler variable - here we could say that $$3^k=A$$
Now we can rewrite the equation so that it is $$3\cdot A-A=m$$
Hopefully it is now quite easy to see that \begin{align}3\cdot A-A&=3\cdot A-1\cdot A\\
&=(3-1)\cdot A\\
&=2\cdot A\\
&=2\cdot 3^k\end{align}
You can also just think of it as "apples" - if you have $3$ apples and you take away one apple, then you are left with $2$ apples
|
The U.S. Grains Council brought the delegation to Minnesota to learn more about dried distillers grains (DDGS), which are a by-product of the ethanol process and a high-nutrient feed source for livestock and other farm animals. Every bushel of corn grown can produce 2.8 gallons of ethanol and 18 pounds of feed.
On Monday, U.S. Agriculture Secretary Tom Vilsack and Minnesota Governor Mark Dayton officially launched a new agricultural water quality pilot program designed to enhance water quality in the state. The Minnesota Agricultural Water Quality Certification program is the first of its kind in the nation and is the product of a state-federal Memorandum of Understanding signed by Governor Dayton, Secretary Vilsack and former EPA Administrator Lisa Jackson in January 2012.
Under the certification program, farmers who implement and maintain approved conservation plans will be certified and...
Yesterday, U.S. Senator Al Franken sent a letter to USDA Secretary Tom Vilsack requesting assistance in alleviating the feed and forage shortage facing livestock producers in southern Minnesota. In his letter, Franken expresses an urgen request for waiving USDA rules against harvesting emergency forage crops before the November 1st date.
Find the full letter below, as dictated by the Al Franken official website.
The Minnesota State Fair and Minnesota Farm Bureau congratulate the Minnesota farms that have been recognized as 2013 Century Farms. Qualifying farms are those that have been in a continuous family ownership for a minimum of 100 years and are 50+ acres.
With the cold, wet spring causing delays across the board here in the Midwest, we are almost to June and hearing farmers are just wrapping up planting or are still waiting for conditions to dry to complete their corn and/or beans planting.
With today's technology and size of planters, farmers are reminded just how much work they can get done in a few hours. How much of that time is spent in the tractor being absolutely bored as auto steering takes away much of the work? Watch as this farmer showcases a mockup of just what might be happening out there in the fields...hope it's some...
The USDA has confirmed that porcine epidemic diarrhea virus (PEDV) has been identified in the United States for the first time through testing at the National Veterinary Services Laboratory. It has been rumored to have appeared in Iowa and Minnesota but sources can only confirm it in the Iowa hog population.
PEDV is not a new virus, nor is it a regulatory/reportable disease. Since PEDV is widespread in many countries, it is not a trade-restricting disease, but rather a production-related disease. PEDV may appear clinically to be the same as transmissible gastroenteritis (TGE) virus...
This year's finalists for the title of Princess Kay of the Milky Way have been named. The 12 young women from dairy farm backgrounds were selected at the conclusion of a three-day event for county dairy princesses held in St. Joseph. The finalists include:
After a late-night session Wednesday, the House Agriculture Committee voted to approve a $940 billion farm bill, a day after the Senate passed its version. The vote was 36 to 10, with mostly Democrats voting against the bill after nine hours of debate.
The House farm bill passed the committee with strong bipartisan support but exposed a division among committee members over the size of cuts to the food stamp program, which has long been a target of conservatives. Committee members also rejected an amendment that would strip the supply management provision of the bill's dairy title,...
In a unanimous ruling delivered today, the U.S. Supreme Court affirmed its support for protecting U.S. innovations that are a critical part of supporting the world's growing needs. The case, Bowman v. Monsanto, centered on the protection of intellectual property and its outcome was crucial for innovations that deliver benefits to millions of Americans.
The Supreme Court's decision affirms the basic purpose of the U.S. patent system – providing an incentive to innovate by providing inventors a meaningful opportunity to recover costs on their R&D investments. The decision also... |
Q:
Asp.net mvc dropdown code in model or controller
I Have created ASP.NET MVC 4 web application which has registration page. it contains two dropdown items.
i want to know where is it feasible to place code for filling up drop down items.as of now its in registation controller but because of server side validation i wrote same code twice in each method.
Registration Index
public ActionResult Index()
{
var model = new RegisterModel
{
TitleList = new SelectList(DataAccess.DAL.DropDownValues("Title"), "Value", "Text"),
BankList = new SelectList(DataAccess.DAL.DropDownValues("Bank"), "Value", "Text")
};
return View("Register", model);
}
Registration Post Action
[HttpPost]
[ActionName("doRegister")]
public ActionResult doRegister([Bind(Exclude = "TitleList")] RegisterModel registerModel)
{
var model = (RegisterModel)null;
if (ModelState.IsValid)
{
if (DataAccess.DAL.registerCustomer(registerModel))
{
return RedirectToAction("Index", "Login");
}
}
else
{
model = new RegisterModel
{
TitleList = new SelectList(DataAccess.DAL.DropDownValues("Title"), "Value", "Text"),
BankList = new SelectList(DataAccess.DAL.DropDownValues("Bank"), "Value", "Text")
};
}
return View("Register", model);
}
If i didnt initialize model object with dropdown values it throws error in my view
@Html.DropDownListFor(m => m.Title, new SelectList(Model.TitleList, "Value", "Text"),
"Select Title", new { @class = "form-control" })
I want to know where i can place my dropdown code ?
A:
You can create function right in your controller and call it from both spots. I Don't see anything wrong with that. Besides you are creating instances of SelectList, and I think this falls ok into controller's responsibility.
public RegisterModel FillModel()
{
return new RegisterModel
{
TitleList = new SelectList(DataAccess.DAL.DropDownValues("Title"), "Value", "Text"),
BankList = new SelectList(DataAccess.DAL.DropDownValues("Bank"), "Value", "Text")
};
}
|
The Miami Bed boasts clean lines and ultra modern styling. The headboard and footboard are designed with square tubing which adds to the contemporary construction and feel of the bed. Elongated vertical rectangles comprise the grills. Contrasting the square tubing and the angular design, the warm Coffee finish has a slight texture. The virtually maintenance free finish blends with almost any color scheme you may choose.
Wipe with a clean, damp cloth
Disclaimers:
*Additional discounts can be applied to this item. See checkout for details. Clearance, doorbusters, hot buys, overstock and temporary price cut items are not eligible for discounts. |
Endothelial mesenchymal transition: a therapeutic target in retrocorneal membrane.
A single layer of corneal endothelial cells covers the posterior surface of the Descemet membrane. Normally, corneal endothelial cells do not proliferate, suggesting that factors inhibit their undergoing mitosis. Fibroblastic transformation of corneal endothelial cells due to syphilitic interstitial keratitis or alkali burn may result in stromal opacification. Various growth factors such as fibroblast growth factor 2 and transforming growth factor β are involved in "endothelial-mesenchymal transition (EnMT)." Endothelial wound-healing assay experiments revealed that cell migration toward artificial wound defect was mediated by p38 and c-Jun N-terminal kinase. To understand whether Smad signal might have an important role in EnMT regulation, gene transfer of Smad7 was employed to block transforming growth factor β/Smad signal in rat corneal endothelium 3 days before alkali burning. EnMT during healing interval after alkali burn was markedly suppressed by Smad7 overexpression associated with upregulation of cell proliferation. Therefore, blocking Smad signal effectively suppresses injury-induced EnMT and fibrogenic reaction by corneal endothelium without impairing repair of wound defect. Strategies that block Smad may be useful for prevention and treatment of fibrogenic disorders in the corneal endothelium. |
The delivery of medicament through a person's skin utilizing electrophoresis is well known where the drug is one whose molecules are ionic in solution or suspension. The solution or suspension is made subject to an electric field and if the electrode having the same charge as that of the ions is above the solution adjacent the skin which is the site of administration, the ions will be repelled and migrate through the skin into the blood stream.
A variety of problems associated with this technique have limited severly the extent of the use of this type of apparatus. Reference to or disclosure of such apparati is shown in the following U.S. Patents, where it will be noted that there is great emphasis in developing electrodes which are disposable and/or more effective:
______________________________________ 2,493,155 4,141,359 4,250,878 3,163,166 4,166,457 4,273,135 3,289,671 4,239,052 4,367,745 3,677,268 4,243,052 ______________________________________
It will be noted from U.S. Pat. Nos. 3,289,671 and 4,141,359, in particular, that the rate of drug delivery is a function of current flow and that control over current flow is crucial to having the correct amount of medicament applied.
There have also been attempts to provide an apparatus for such electrotherapy which is self-contained, so that the patient can wear the device carrying on normal activities while the drug is being administered. Devices of this type are disclosed in U.S. Pat. Nos. 385,556, 486,902, and 2,784,715.
One problem with such prior art devices was that they were bulky and lacked the necessary drug delivery rate control.
Another significant problem associated with such prior art devices is that the user, in wearing the device, was unable to determine whether the drug was being administered, and more particularly whether the drug was being administered in the proper desired dosage.
Now there is provided by the present invention, an indicator which is formed with a compact electrophoretic drug delivery device so as to positively indicate the flow of the proper dosage of medicament. |
//*@@@+++@@@@******************************************************************
//
// Copyright © Microsoft Corp.
// All rights reserved.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are met:
//
// • Redistributions of source code must retain the above copyright notice,
// this list of conditions and the following disclaimer.
// • Redistributions in binary form must reproduce the above copyright notice,
// this list of conditions and the following disclaimer in the documentation
// and/or other materials provided with the distribution.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
// AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
// ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
// LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
// CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
// SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
// CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
// ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
// POSSIBILITY OF SUCH DAMAGE.
//
//*@@@---@@@@******************************************************************
#include "strcodec.h"
#include "decode.h"
#if defined(WMP_OPT_SSE2)
#include <emmintrin.h>
#include <windows.h>
//================================================================
static __m128i g_const_d0;
static __m128i g_const_d1;
__m128i g_const_d3;
__m128i g_const_d4;
__m128i g_const_d0x80;
__m128i g_const_w0x80;
__m128i g_const_b0x80;
//================================================================
#if defined(WMP_OPT_CC_DEC)
__declspec(naked) void __stdcall storeRGB24_5(
U8* pbYCoCg,
size_t cbYCoCg,
const U8* pbRGB,
size_t cbRGB,
size_t cmb)
{
#define DISP 8
UNREFERENCED_PARAMETER( pbYCoCg );
UNREFERENCED_PARAMETER( cbYCoCg );
UNREFERENCED_PARAMETER( pbRGB );
UNREFERENCED_PARAMETER( cbRGB );
UNREFERENCED_PARAMETER( cmb );
__asm {
push ebp
push ebx
push esi
push edi
mov ebx, [esp + 36] // $ebx = cmb
mov edi, [esp + 28] // $edi = pbRGB
lea ebx, [ebx + ebx * 2] // $ebx = cmb * 3
mov edx, [esp + 32] // $edx = cbRGB
shl ebx, 4 // $ebx = cmb * 3 * 16
mov esi, [esp + 20] // $esi = pbYCoCg
add edi, ebx // $edi = pbRGB + 3 * 16 * cmb
mov ebp, [esp + 24] // $ebp = cbYCoCg
neg ebx
mov eax, esp
and esp, 0xffffff80
sub esp, 64 * 4 + DISP
mov [esp], eax // original $esp
mov [esp + 4], edi
}
Loop0:
__asm {
mov edi, [esp + 4] // $edi = pbRGB + 3 * 16 * cmb
// first 8 pixels
pxor xmm1, xmm1
pxor xmm5, xmm5
movdqa xmm0, [esi]
movdqa xmm4, [esi + 16]
psubd xmm1, [esi + ebp]
psubd xmm5, [esi + ebp + 16]
movdqa xmm2, [esi + ebp * 2]
movdqa xmm6, [esi + ebp * 2 + 16]
paddd xmm0, [g_const_d0x80]
paddd xmm4, [g_const_d0x80]
// ICC
movdqa xmm3, xmm1 // g -= r >> 1
movdqa xmm7, xmm5
psrad xmm3, 1
psrad xmm7, 1
psubd xmm0, xmm3
psubd xmm4, xmm7
movdqa xmm3, [g_const_d1] // r -= ((b + 1) >> 1) - g
movdqa xmm7, [g_const_d1]
paddd xmm3, xmm2
paddd xmm7, xmm6
paddd xmm1, xmm0
paddd xmm5, xmm4
psrad xmm3, 1
psrad xmm7, 1
psubd xmm1, xmm3
psubd xmm5, xmm7
paddd xmm2, xmm1 // b += r
paddd xmm6, xmm5
pslld xmm0, 8
pslld xmm2, 16
pslld xmm4, 8
pslld xmm6, 16
por xmm0, xmm1
por xmm4, xmm5
por xmm0, xmm2
por xmm4, xmm6
movdqa [esp + DISP + 64 * 0 + 16 * 0], xmm0
pslld xmm0, 8
movdqa [esp + DISP + 64 * 0 + 16 * 1], xmm4
pslld xmm4, 8
movdqa [esp + DISP + 64 * 0 + 16 * 2], xmm0
movdqa [esp + DISP + 64 * 0 + 16 * 3], xmm4
// second 8 pixels
pxor xmm1, xmm1
pxor xmm5, xmm5
movdqa xmm0, [esi + 32]
movdqa xmm4, [esi + 48]
psubd xmm1, [esi + ebp + 32]
psubd xmm5, [esi + ebp + 48]
movdqa xmm2, [esi + ebp * 2 + 32]
movdqa xmm6, [esi + ebp * 2 + 48]
paddd xmm0, [g_const_d0x80]
paddd xmm4, [g_const_d0x80]
// ICC
movdqa xmm3, xmm1 // g -= r >> 1
movdqa xmm7, xmm5
psrad xmm3, 1
psrad xmm7, 1
psubd xmm0, xmm3
psubd xmm4, xmm7
movdqa xmm3, [g_const_d1] // r -= ((b + 1) >> 1) - g
movdqa xmm7, [g_const_d1]
paddd xmm3, xmm2
paddd xmm7, xmm6
paddd xmm1, xmm0
paddd xmm5, xmm4
psrad xmm3, 1
psrad xmm7, 1
psubd xmm1, xmm3
psubd xmm5, xmm7
paddd xmm2, xmm1 // b += r
paddd xmm6, xmm5
pslld xmm0, 8
pslld xmm2, 16
pslld xmm4, 8
pslld xmm6, 16
por xmm0, xmm1
por xmm4, xmm5
por xmm0, xmm2
por xmm4, xmm6
movdqa [esp + DISP + 64 * 1 + 16 * 0], xmm0
pslld xmm0, 8
movdqa [esp + DISP + 64 * 1 + 16 * 1], xmm4
pslld xmm4, 8
movdqa [esp + DISP + 64 * 1 + 16 * 2], xmm0
movdqa [esp + DISP + 64 * 1 + 16 * 3], xmm4
//================
add esi, 64
// first 8 pixels
pxor xmm1, xmm1
pxor xmm5, xmm5
movdqa xmm0, [esi]
movdqa xmm4, [esi + 16]
psubd xmm1, [esi + ebp]
psubd xmm5, [esi + ebp + 16]
movdqa xmm2, [esi + ebp * 2]
movdqa xmm6, [esi + ebp * 2 + 16]
paddd xmm0, [g_const_d0x80]
paddd xmm4, [g_const_d0x80]
// ICC
movdqa xmm3, xmm1 // g -= r >> 1
movdqa xmm7, xmm5
psrad xmm3, 1
psrad xmm7, 1
psubd xmm0, xmm3
psubd xmm4, xmm7
movdqa xmm3, [g_const_d1] // r -= ((b + 1) >> 1) - g
movdqa xmm7, [g_const_d1]
paddd xmm3, xmm2
paddd xmm7, xmm6
paddd xmm1, xmm0
paddd xmm5, xmm4
psrad xmm3, 1
psrad xmm7, 1
psubd xmm1, xmm3
psubd xmm5, xmm7
paddd xmm2, xmm1 // b += r
paddd xmm6, xmm5
pslld xmm0, 8
pslld xmm2, 16
pslld xmm4, 8
pslld xmm6, 16
por xmm0, xmm1
por xmm4, xmm5
por xmm0, xmm2
por xmm4, xmm6
movdqa [esp + DISP + 64 * 2 + 16 * 0], xmm0
pslld xmm0, 8
movdqa [esp + DISP + 64 * 2 + 16 * 1], xmm4
pslld xmm4, 8
movdqa [esp + DISP + 64 * 2 + 16 * 2], xmm0
movdqa [esp + DISP + 64 * 2 + 16 * 3], xmm4
// second 8 pixels
pxor xmm1, xmm1
pxor xmm5, xmm5
movdqa xmm0, [esi + 32]
movdqa xmm4, [esi + 48]
psubd xmm1, [esi + ebp + 32]
psubd xmm5, [esi + ebp + 48]
movdqa xmm2, [esi + ebp * 2 + 32]
movdqa xmm6, [esi + ebp * 2 + 48]
paddd xmm0, [g_const_d0x80]
paddd xmm4, [g_const_d0x80]
// ICC
movdqa xmm3, xmm1 // g -= r >> 1
movdqa xmm7, xmm5
psrad xmm3, 1
psrad xmm7, 1
psubd xmm0, xmm3
psubd xmm4, xmm7
movdqa xmm3, [g_const_d1] // r -= ((b + 1) >> 1) - g
movdqa xmm7, [g_const_d1]
paddd xmm3, xmm2
paddd xmm7, xmm6
paddd xmm1, xmm0
paddd xmm5, xmm4
psrad xmm3, 1
psrad xmm7, 1
psubd xmm1, xmm3
psubd xmm5, xmm7
paddd xmm2, xmm1 // b += r
paddd xmm6, xmm5
pslld xmm0, 8
pslld xmm2, 16
pslld xmm4, 8
pslld xmm6, 16
por xmm0, xmm1
por xmm4, xmm5
por xmm0, xmm2
por xmm4, xmm6
movdqa [esp + DISP + 64 * 3 + 16 * 0], xmm0
pslld xmm0, 8
movdqa [esp + DISP + 64 * 3 + 16 * 1], xmm4
pslld xmm4, 8
movdqa [esp + DISP + 64 * 3 + 16 * 2], xmm0
movdqa [esp + DISP + 64 * 3 + 16 * 3], xmm4
//================================
// RGBX32 -> RGB24
mov eax, [esp + DISP + 64 * 0 + 4] // ..B1G1R1
mov ecx, [esp + DISP + 64 * 0 + 32] // B0G0R0..
shld eax, ecx, 24 // R1B0G0R0
mov [edi + ebx + 0], eax
mov eax, [esp + DISP + 64 * 0 + 20] // ..B5G5R5
mov ecx, [esp + DISP + 64 * 0 + 36] // B1G1R1..
shld eax, ecx, 16 // G5R5B1G1
mov [edi + ebx + 4], eax
mov eax, [esp + DISP + 64 * 0 + 16] // ..B4G4R4
mov ecx, [esp + DISP + 64 * 0 + 52] // B5G5R5..
shld eax, ecx, 8 // B4G4R4B5
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
mov eax, [esp + DISP + 64 * 0 + 4 + 8] // ..B3G3R3
mov ecx, [esp + DISP + 64 * 0 + 32 + 8] // B2G2R2..
shld eax, ecx, 24 // R3B2G2R2
mov [edi + ebx + 0], eax
mov eax, [esp + DISP + 64 * 0 + 20 + 8] // ..B7G7R7
mov ecx, [esp + DISP + 64 * 0 + 36 + 8] // B3G3R3..
shld eax, ecx, 16 // G7R7B3G3
mov [edi + ebx + 4], eax
mov eax, [esp + DISP + 64 * 0 + 16 + 8] // ..B6G6R6
mov ecx, [esp + DISP + 64 * 0 + 52 + 8] // B7G7R7..
shld eax, ecx, 8 // B6G6R6B7
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
// RGBX32 -> RGB24
mov eax, [esp + DISP + 64 * 1 + 4 + 8] // ..B3G3R3
mov ecx, [esp + DISP + 64 * 1 + 32 + 8] // B2G2R2..
shld eax, ecx, 24 // R3B2G2R2
mov [edi + ebx + 0], eax
mov eax, [esp + DISP + 64 * 1 + 20 + 8] // ..B7G7R7
mov ecx, [esp + DISP + 64 * 1 + 36 + 8] // B3G3R3..
shld eax, ecx, 16 // G7R7B3G3
mov [edi + ebx + 4], eax
mov eax, [esp + DISP + 64 * 1 + 16 + 8] // ..B6G6R6
mov ecx, [esp + DISP + 64 * 1 + 52 + 8] // B7G7R7..
shld eax, ecx, 8 // B6G6R6B7
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
mov eax, [esp + DISP + 64 * 1 + 4] // ..B1G1R1
mov ecx, [esp + DISP + 64 * 1 + 32] // B0G0R0..
shld eax, ecx, 24 // R1B0G0R0
mov [edi + ebx + 0], eax
mov eax, [esp + DISP + 64 * 1 + 20] // ..B5G5R5
mov ecx, [esp + DISP + 64 * 1 + 36] // B1G1R1..
shld eax, ecx, 16 // G5R5B1G1
mov [edi + ebx + 4], eax
mov eax, [esp + DISP + 64 * 1 + 16] // ..B4G4R4
mov ecx, [esp + DISP + 64 * 1 + 52] // B5G5R5..
shld eax, ecx, 8 // B4G4R4B5
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
// RGBX32 -> RGB24
mov eax, [esp + DISP + 64 * 2 + 4] // ..B1G1R1
mov ecx, [esp + DISP + 64 * 2 + 32] // B0G0R0..
shld eax, ecx, 24 // R1B0G0R0
mov [edi + ebx + 0], eax
mov eax, [esp + DISP + 64 * 2 + 20] // ..B5G5R5
mov ecx, [esp + DISP + 64 * 2 + 36] // B1G1R1..
shld eax, ecx, 16 // G5R5B1G1
mov [edi + ebx + 4], eax
mov eax, [esp + DISP + 64 * 2 + 16] // ..B4G4R4
mov ecx, [esp + DISP + 64 * 2 + 52] // B5G5R5..
shld eax, ecx, 8 // B4G4R4B5
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
mov eax, [esp + DISP + 64 * 2 + 4 + 8] // ..B3G3R3
mov ecx, [esp + DISP + 64 * 2 + 32 + 8] // B2G2R2..
shld eax, ecx, 24 // R3B2G2R2
mov [edi + ebx + 0], eax
mov eax, [esp + DISP + 64 * 2 + 20 + 8] // ..B7G7R7
mov ecx, [esp + DISP + 64 * 2 + 36 + 8] // B3G3R3..
shld eax, ecx, 16 // G7R7B3G3
mov [edi + ebx + 4], eax
mov eax, [esp + DISP + 64 * 2 + 16 + 8] // ..B6G6R6
mov ecx, [esp + DISP + 64 * 2 + 52 + 8] // B7G7R7..
shld eax, ecx, 8 // B6G6R6B7
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
// RGBX32 -> RGB24
mov eax, [esp + DISP + 64 * 3 + 4 + 8] // ..B3G3R3
mov ecx, [esp + DISP + 64 * 3 + 32 + 8] // B2G2R2..
shld eax, ecx, 24 // R3B2G2R2
mov [edi + ebx + 0], eax
mov eax, [esp + DISP + 64 * 3 + 20 + 8] // ..B7G7R7
mov ecx, [esp + DISP + 64 * 3 + 36 + 8] // B3G3R3..
shld eax, ecx, 16 // G7R7B3G3
mov [edi + ebx + 4], eax
mov eax, [esp + DISP + 64 * 3 + 16 + 8] // ..B6G6R6
mov ecx, [esp + DISP + 64 * 3 + 52 + 8] // B7G7R7..
shld eax, ecx, 8 // B6G6R6B7
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
mov eax, [esp + DISP + 64 * 3 + 4] // ..B1G1R1
mov ecx, [esp + DISP + 64 * 3 + 32] // B0G0R0..
shld eax, ecx, 24 // R1B0G0R0
mov [edi + ebx + 0], eax
mov eax, [esp + DISP + 64 * 3 + 20] // ..B5G5R5
mov ecx, [esp + DISP + 64 * 3 + 36] // B1G1R1..
shld eax, ecx, 16 // G5R5B1G1
mov [edi + ebx + 4], eax
mov eax, [esp + DISP + 64 * 3 + 16] // ..B4G4R4
mov ecx, [esp + DISP + 64 * 3 + 52] // B5G5R5..
shld eax, ecx, 8 // B4G4R4B5
mov [edi + ebx + 8], eax
//================================
add esi, 256 - 64
add ebx, 12
jnz Loop0
//================
pop esp
pop edi
pop esi
pop ebx
pop ebp
ret 20
}
}
Int outputMBRow_RGB24_Lossless_1(CWMImageStrCodec* pSC)
{
#ifdef REENTRANT_MODE
const size_t cHeight = min((pSC->m_Dparam->cROIBottomY + 1) - (pSC->cRow - 1) * 16, 16);
const size_t iFirstRow = ((pSC->cRow - 1) * 16 > pSC->m_Dparam->cROITopY ? 0 : (pSC->m_Dparam->cROITopY & 0xf));
#endif
const size_t cbRGB = pSC->WMIBI.cbStride;
const U8* const pbRGB = (U8*)pSC->WMIBI.pv + cbRGB * (pSC->cRow - 1) * 16;
U8* const pbY = (U8*)pSC->a0MBbuffer[0];
U8* const pbU = (U8*)pSC->a0MBbuffer[1];
// U8* const pbV = (U8*)pSC->a0MBbuffer[2];
const size_t cmbColumn = (pSC->WMII.cWidth + 15) / 16;
assert(BD_8 == pSC->WMII.bdBitDepth);
assert(CF_RGB == pSC->WMII.cfColorFormat);
assert(24 == pSC->WMII.cBitsPerUnit);
assert(pSC->WMII.bRGB);
assert(O_NONE == pSC->WMII.oOrientation);
assert(YUV_444 == pSC->m_param.cfColorFormat);
assert(!pSC->m_param.bScaledArith);
assert(pSC->m_Dparam->bDecodeFullFrame);
storeRGB24_5(pbY + 64 * 0, pbU - pbY, pbRGB + cbRGB * 0, cbRGB, cmbColumn);
storeRGB24_5(pbY + 64 * 2, pbU - pbY, pbRGB + cbRGB * 8, cbRGB, cmbColumn);
#ifdef REENTRANT_MODE
pSC->WMIBI.cLinesDecoded = cHeight - iFirstRow;
#endif
return ICERR_OK;
}
__declspec(naked) void __stdcall storeRGB24_3(
U8* pbYCoCg,
size_t cbYCoCg,
const U8* pbRGB,
size_t cbRGB,
size_t cmb,
const U8* Shift)
{
UNREFERENCED_PARAMETER( pbYCoCg );
UNREFERENCED_PARAMETER( cbYCoCg );
UNREFERENCED_PARAMETER( pbRGB );
UNREFERENCED_PARAMETER( cbRGB );
UNREFERENCED_PARAMETER( cmb );
UNREFERENCED_PARAMETER( Shift );
__asm {
push ebp
push ebx
push esi
push edi
mov ecx, [esp + 40] // $ecx = Shift
mov ebx, [esp + 36] // $ebx = cmb
mov edi, [esp + 28] // $edi = pbRGB
lea ebx, [ebx + ebx * 2] // $ebx = cmb * 3
mov edx, [esp + 32] // $edx = cbRGB
shl ebx, 4 // $ebx = cmb * 3 * 16
mov esi, [esp + 20] // $esi = pbYCoCg
add edi, ebx // $edi = pbRGB + 3 * 16 * cmb
mov ebp, [esp + 24] // $ebp = cbYCoCg
neg ebx
mov eax, esp
and esp, 0xffffff80
sub esp, 320
mov [esp], eax // original $esp
mov [esp + 4], edi
mov [esp + 8], ecx
}
Loop0:
__asm {
mov edi, [esp + 4] // $edi = pbRGB + 3 * 16 * cmb
//================
// first 8 pixels
movdqa xmm0, [esi]
movdqa xmm4, [esi + 16]
movdqa xmm3, [esi + ebp]
movdqa xmm7, [esi + ebp + 16]
movdqa xmm2, [esi + ebp * 2]
movdqa xmm6, [esi + ebp * 2 + 16]
mov ecx, [esp + 8]
movdqa xmm1, [ecx]
movdqa xmm5, [g_const_d0x80]
pslld xmm5, xmm1
paddd xmm5, xmm1
paddd xmm0, xmm5 // bias
paddd xmm4, xmm5 // bias
pxor xmm1, xmm1
pxor xmm5, xmm5
psubd xmm1, xmm3
psubd xmm5, xmm7
// ICC
movdqa xmm3, xmm1 // g -= r >> 1
movdqa xmm7, xmm5
psrad xmm3, 1
psrad xmm7, 1
psubd xmm0, xmm3
psubd xmm4, xmm7
movdqa xmm3, [g_const_d1] // r -= ((b + 1) >> 1) - g
movdqa xmm7, [g_const_d1]
paddd xmm3, xmm2
paddd xmm7, xmm6
paddd xmm1, xmm0
paddd xmm5, xmm4
psrad xmm3, 1
psrad xmm7, 1
psubd xmm1, xmm3
psubd xmm5, xmm7
paddd xmm2, xmm1 // b += r
paddd xmm6, xmm5
// clip
movdqa xmm3, [g_const_w0x80]
packssdw xmm0, xmm4
packssdw xmm1, xmm5
packssdw xmm2, xmm6
mov ecx, [esp + 8]
movdqa xmm4, [ecx]
psraw xmm0, xmm4
psraw xmm1, xmm4
psraw xmm2, xmm4
psubw xmm0, xmm3
psubw xmm1, xmm3
psubw xmm2, xmm3
movdqa [esp + 16], xmm0
movdqa [esp + 32], xmm1
movdqa [esp + 48], xmm2
//================
// second 8 pixels
movdqa xmm0, [esi + 32]
movdqa xmm4, [esi + 48]
movdqa xmm3, [esi + ebp + 32]
movdqa xmm7, [esi + ebp + 48]
movdqa xmm2, [esi + ebp * 2 + 32]
movdqa xmm6, [esi + ebp * 2 + 48]
mov ecx, [esp + 8]
movdqa xmm1, [ecx]
movdqa xmm5, [g_const_d0x80]
pslld xmm5, xmm1
paddd xmm5, xmm1
paddd xmm0, xmm5 // bias
paddd xmm4, xmm5 // bias
pxor xmm1, xmm1
pxor xmm5, xmm5
psubd xmm1, xmm3
psubd xmm5, xmm7
// ICC
movdqa xmm3, xmm1 // g -= r >> 1
movdqa xmm7, xmm5
psrad xmm3, 1
psrad xmm7, 1
psubd xmm0, xmm3
psubd xmm4, xmm7
movdqa xmm3, [g_const_d1] // r -= ((b + 1) >> 1) - g
movdqa xmm7, [g_const_d1]
paddd xmm3, xmm2
paddd xmm7, xmm6
paddd xmm1, xmm0
paddd xmm5, xmm4
psrad xmm3, 1
psrad xmm7, 1
psubd xmm1, xmm3
psubd xmm5, xmm7
paddd xmm2, xmm1 // b += r
paddd xmm6, xmm5
// clip
movdqa xmm3, [g_const_w0x80]
packssdw xmm0, xmm4
packssdw xmm1, xmm5
packssdw xmm2, xmm6
mov ecx, [esp + 8]
movdqa xmm4, [ecx]
psraw xmm0, xmm4
psraw xmm1, xmm4
psraw xmm2, xmm4
psubw xmm0, xmm3
psubw xmm1, xmm3
psubw xmm2, xmm3
//================
// 16 pixels
movdqa xmm3, [g_const_b0x80]
packsswb xmm0, [esp + 16]
packsswb xmm1, [esp + 32]
packsswb xmm2, [esp + 48]
psubb xmm0, xmm3
psubb xmm1, xmm3
psubb xmm2, xmm3
pxor xmm7, xmm7
movdqa xmm4, xmm0
movdqa xmm5, xmm1
movdqa xmm6, xmm2
punpckhbw xmm0, xmm7
punpckhbw xmm1, xmm7
punpckhbw xmm2, xmm7
punpcklbw xmm4, xmm7
punpcklbw xmm5, xmm7
punpcklbw xmm6, xmm7
// spill second 8 pixels
movdqa [esp + 16], xmm4
movdqa [esp + 32], xmm5
movdqa [esp + 48], xmm6
// first 8 pixels
movdqa xmm4, xmm0
movdqa xmm5, xmm1
movdqa xmm6, xmm2
punpcklwd xmm0, xmm7
punpcklwd xmm1, xmm7
punpcklwd xmm2, xmm7
punpckhwd xmm4, xmm7
punpckhwd xmm5, xmm7
punpckhwd xmm6, xmm7
pslld xmm0, 8
pslld xmm2, 16
pslld xmm4, 8
pslld xmm6, 16
por xmm0, xmm1
por xmm4, xmm5
por xmm0, xmm2
por xmm4, xmm6
movdqa [esp + 64], xmm0
pslld xmm0, 8
movdqa [esp + 80], xmm4
pslld xmm4, 8
movdqa [esp + 96], xmm0
movdqa [esp + 112], xmm4
// second 8 pixels
movdqa xmm0, [esp + 16]
movdqa xmm1, [esp + 32]
movdqa xmm2, [esp + 48]
movdqa xmm4, xmm0
movdqa xmm5, xmm1
movdqa xmm6, xmm2
punpcklwd xmm0, xmm7
punpcklwd xmm1, xmm7
punpcklwd xmm2, xmm7
punpckhwd xmm4, xmm7
punpckhwd xmm5, xmm7
punpckhwd xmm6, xmm7
pslld xmm0, 8
pslld xmm2, 16
pslld xmm4, 8
pslld xmm6, 16
por xmm0, xmm1
por xmm4, xmm5
por xmm0, xmm2
por xmm4, xmm6
movdqa [esp + 128], xmm0
pslld xmm0, 8
movdqa [esp + 144], xmm4
pslld xmm4, 8
movdqa [esp + 160], xmm0
movdqa [esp + 176], xmm4
//================================
add esi, 64
//================
// first 8 pixels
movdqa xmm0, [esi]
movdqa xmm4, [esi + 16]
movdqa xmm3, [esi + ebp]
movdqa xmm7, [esi + ebp + 16]
movdqa xmm2, [esi + ebp * 2]
movdqa xmm6, [esi + ebp * 2 + 16]
mov ecx, [esp + 8]
movdqa xmm1, [ecx]
movdqa xmm5, [g_const_d0x80]
pslld xmm5, xmm1
paddd xmm5, xmm1
paddd xmm0, xmm5 // bias
paddd xmm4, xmm5 // bias
pxor xmm1, xmm1
pxor xmm5, xmm5
psubd xmm1, xmm3
psubd xmm5, xmm7
// ICC
movdqa xmm3, xmm1 // g -= r >> 1
movdqa xmm7, xmm5
psrad xmm3, 1
psrad xmm7, 1
psubd xmm0, xmm3
psubd xmm4, xmm7
movdqa xmm3, [g_const_d1] // r -= ((b + 1) >> 1) - g
movdqa xmm7, [g_const_d1]
paddd xmm3, xmm2
paddd xmm7, xmm6
paddd xmm1, xmm0
paddd xmm5, xmm4
psrad xmm3, 1
psrad xmm7, 1
psubd xmm1, xmm3
psubd xmm5, xmm7
paddd xmm2, xmm1 // b += r
paddd xmm6, xmm5
// clip
movdqa xmm3, [g_const_w0x80]
packssdw xmm0, xmm4
packssdw xmm1, xmm5
packssdw xmm2, xmm6
mov ecx, [esp + 8]
movdqa xmm4, [ecx]
psraw xmm0, xmm4
psraw xmm1, xmm4
psraw xmm2, xmm4
psubw xmm0, xmm3
psubw xmm1, xmm3
psubw xmm2, xmm3
movdqa [esp + 16], xmm0
movdqa [esp + 32], xmm1
movdqa [esp + 48], xmm2
//================
// second 8 pixels
movdqa xmm0, [esi + 32]
movdqa xmm4, [esi + 48]
movdqa xmm3, [esi + ebp + 32]
movdqa xmm7, [esi + ebp + 48]
movdqa xmm2, [esi + ebp * 2 + 32]
movdqa xmm6, [esi + ebp * 2 + 48]
mov ecx, [esp + 8]
movdqa xmm1, [ecx]
movdqa xmm5, [g_const_d0x80]
pslld xmm5, xmm1
paddd xmm5, xmm1
paddd xmm0, xmm5 // bias
paddd xmm4, xmm5 // bias
pxor xmm1, xmm1
pxor xmm5, xmm5
psubd xmm1, xmm3
psubd xmm5, xmm7
// ICC
movdqa xmm3, xmm1 // g -= r >> 1
movdqa xmm7, xmm5
psrad xmm3, 1
psrad xmm7, 1
psubd xmm0, xmm3
psubd xmm4, xmm7
movdqa xmm3, [g_const_d1] // r -= ((b + 1) >> 1) - g
movdqa xmm7, [g_const_d1]
paddd xmm3, xmm2
paddd xmm7, xmm6
paddd xmm1, xmm0
paddd xmm5, xmm4
psrad xmm3, 1
psrad xmm7, 1
psubd xmm1, xmm3
psubd xmm5, xmm7
paddd xmm2, xmm1 // b += r
paddd xmm6, xmm5
// clip
movdqa xmm3, [g_const_w0x80]
packssdw xmm0, xmm4
packssdw xmm1, xmm5
packssdw xmm2, xmm6
mov ecx, [esp + 8]
movdqa xmm4, [ecx]
psraw xmm0, xmm4
psraw xmm1, xmm4
psraw xmm2, xmm4
psubw xmm0, xmm3
psubw xmm1, xmm3
psubw xmm2, xmm3
//================
// 16 pixels
movdqa xmm3, [g_const_b0x80]
packsswb xmm0, [esp + 16]
packsswb xmm1, [esp + 32]
packsswb xmm2, [esp + 48]
psubb xmm0, xmm3
psubb xmm1, xmm3
psubb xmm2, xmm3
pxor xmm7, xmm7
movdqa xmm4, xmm0
movdqa xmm5, xmm1
movdqa xmm6, xmm2
punpckhbw xmm0, xmm7
punpckhbw xmm1, xmm7
punpckhbw xmm2, xmm7
punpcklbw xmm4, xmm7
punpcklbw xmm5, xmm7
punpcklbw xmm6, xmm7
// spill second 8 pixels
movdqa [esp + 16], xmm4
movdqa [esp + 32], xmm5
movdqa [esp + 48], xmm6
// first 8 pixels
movdqa xmm4, xmm0
movdqa xmm5, xmm1
movdqa xmm6, xmm2
punpcklwd xmm0, xmm7
punpcklwd xmm1, xmm7
punpcklwd xmm2, xmm7
punpckhwd xmm4, xmm7
punpckhwd xmm5, xmm7
punpckhwd xmm6, xmm7
pslld xmm0, 8
pslld xmm2, 16
pslld xmm4, 8
pslld xmm6, 16
por xmm0, xmm1
por xmm4, xmm5
por xmm0, xmm2
por xmm4, xmm6
movdqa [esp + 192], xmm0
pslld xmm0, 8
movdqa [esp + 208], xmm4
pslld xmm4, 8
movdqa [esp + 224], xmm0
movdqa [esp + 240], xmm4
// second 8 pixels
movdqa xmm0, [esp + 16]
movdqa xmm1, [esp + 32]
movdqa xmm2, [esp + 48]
movdqa xmm4, xmm0
movdqa xmm5, xmm1
movdqa xmm6, xmm2
punpcklwd xmm0, xmm7
punpcklwd xmm1, xmm7
punpcklwd xmm2, xmm7
punpckhwd xmm4, xmm7
punpckhwd xmm5, xmm7
punpckhwd xmm6, xmm7
pslld xmm0, 8
pslld xmm2, 16
pslld xmm4, 8
pslld xmm6, 16
por xmm0, xmm1
por xmm4, xmm5
por xmm0, xmm2
por xmm4, xmm6
movdqa [esp + 256], xmm0
pslld xmm0, 8
movdqa [esp + 272], xmm4
pslld xmm4, 8
movdqa [esp + 288], xmm0
movdqa [esp + 304], xmm4
// RGBX32 -> RGB24
mov eax, [esp + 68] // ..B1G1R1
mov ecx, [esp + 96] // B0G0R0..
shld eax, ecx, 24 // R1B0G0R0
mov [edi + ebx + 0], eax
mov eax, [esp + 84] // ..B5G5R5
mov ecx, [esp + 100] // B1G1R1..
shld eax, ecx, 16 // G5R5B1G1
mov [edi + ebx + 4], eax
mov eax, [esp + 80] // ..B4G4R4
mov ecx, [esp + 116] // B5G5R5..
shld eax, ecx, 8 // B4G4R4B5
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
mov eax, [esp + 76] // ..B3G3R3
mov ecx, [esp + 104] // B2G2R2..
shld eax, ecx, 24 // R3B2G2R2
mov [edi + ebx + 0], eax
mov eax, [esp + 92] // ..B7G7R7
mov ecx, [esp + 108] // B3G3R3..
shld eax, ecx, 16 // G7R7B3G3
mov [edi + ebx + 4], eax
mov eax, [esp + 88] // ..B6G6R6
mov ecx, [esp + 124] // B7G7R7..
shld eax, ecx, 8 // B6G6R6B7
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
// RGBX32 -> RGB24
mov eax, [esp + 140] // ..B3G3R3
mov ecx, [esp + 168] // B2G2R2..
shld eax, ecx, 24 // R3B2G2R2
mov [edi + ebx + 0], eax
mov eax, [esp + 156] // ..B7G7R7
mov ecx, [esp + 172] // B3G3R3..
shld eax, ecx, 16 // G7R7B3G3
mov [edi + ebx + 4], eax
mov eax, [esp + 152] // ..B6G6R6
mov ecx, [esp + 188] // B7G7R7..
shld eax, ecx, 8 // B6G6R6B7
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
mov eax, [esp + 132] // ..B1G1R1
mov ecx, [esp + 160] // B0G0R0..
shld eax, ecx, 24 // R1B0G0R0
mov [edi + ebx + 0], eax
mov eax, [esp + 148] // ..B5G5R5
mov ecx, [esp + 164] // B1G1R1..
shld eax, ecx, 16 // G5R5B1G1
mov [edi + ebx + 4], eax
mov eax, [esp + 144] // ..B4G4R4
mov ecx, [esp + 180] // B5G5R5..
shld eax, ecx, 8 // B4G4R4B5
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
// RGBX32 -> RGB24
mov eax, [esp + 196] // ..B1G1R1
mov ecx, [esp + 224] // B0G0R0..
shld eax, ecx, 24 // R1B0G0R0
mov [edi + ebx + 0], eax
mov eax, [esp + 212] // ..B5G5R5
mov ecx, [esp + 228] // B1G1R1..
shld eax, ecx, 16 // G5R5B1G1
mov [edi + ebx + 4], eax
mov eax, [esp + 208] // ..B4G4R4
mov ecx, [esp + 244] // B5G5R5..
shld eax, ecx, 8 // B4G4R4B5
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
mov eax, [esp + 204] // ..B3G3R3
mov ecx, [esp + 232] // B2G2R2..
shld eax, ecx, 24 // R3B2G2R2
mov [edi + ebx + 0], eax
mov eax, [esp + 220] // ..B7G7R7
mov ecx, [esp + 236] // B3G3R3..
shld eax, ecx, 16 // G7R7B3G3
mov [edi + ebx + 4], eax
mov eax, [esp + 216] // ..B6G6R6
mov ecx, [esp + 252] // B7G7R7..
shld eax, ecx, 8 // B6G6R6B7
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
// RGBX32 -> RGB24
mov eax, [esp + 268] // ..B3G3R3
mov ecx, [esp + 296] // B2G2R2..
shld eax, ecx, 24 // R3B2G2R2
mov [edi + ebx + 0], eax
mov eax, [esp + 284] // ..B7G7R7
mov ecx, [esp + 300] // B3G3R3..
shld eax, ecx, 16 // G7R7B3G3
mov [edi + ebx + 4], eax
mov eax, [esp + 280] // ..B6G6R6
mov ecx, [esp + 316] // B7G7R7..
shld eax, ecx, 8 // B6G6R6B7
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
mov eax, [esp + 260] // ..B1G1R1
mov ecx, [esp + 288] // B0G0R0..
shld eax, ecx, 24 // R1B0G0R0
mov [edi + ebx + 0], eax
mov eax, [esp + 276] // ..B5G5R5
mov ecx, [esp + 292] // B1G1R1..
shld eax, ecx, 16 // G5R5B1G1
mov [edi + ebx + 4], eax
mov eax, [esp + 272] // ..B4G4R4
mov ecx, [esp + 308] // B5G5R5..
shld eax, ecx, 8 // B4G4R4B5
mov [edi + ebx + 8], eax
add edi, edx // $edi = pbRGB += cbRGB
//================================
add esi, 256 - 64
add ebx, 12
jnz Loop0
//================
pop esp
pop edi
pop esi
pop ebx
pop ebp
ret 24
}
}
Int outputMBRow_RGB24_Lossy_3(CWMImageStrCodec* pSC)
{
#ifdef REENTRANT_MODE
const size_t cHeight = min((pSC->m_Dparam->cROIBottomY + 1) - (pSC->cRow - 1) * 16, 16);
const size_t iFirstRow = ((pSC->cRow - 1) * 16 > pSC->m_Dparam->cROITopY ? 0 : (pSC->m_Dparam->cROITopY & 0xf));
#endif
const size_t cbRGB = pSC->WMIBI.cbStride;
const U8* const pbRGB = (U8*)pSC->WMIBI.pv + cbRGB * (pSC->cRow - 1) * 16;
U8* const pbY = (U8*)pSC->a0MBbuffer[0];
U8* const pbU = (U8*)pSC->a0MBbuffer[1];
// U8* const pbV = (U8*)pSC->a0MBbuffer[2];
const size_t cmbColumn = (pSC->WMII.cWidth + 15) / 16;
__declspec(align(16)) U8 Shift[16];
assert(BD_8 == pSC->WMII.bdBitDepth);
assert(CF_RGB == pSC->WMII.cfColorFormat);
assert(24 == pSC->WMII.cBitsPerUnit);
assert(pSC->WMII.bRGB);
assert(O_NONE == pSC->WMII.oOrientation);
assert(YUV_444 == pSC->m_param.cfColorFormat);
assert(pSC->m_Dparam->bDecodeFullFrame);
_mm_store_si128((__m128i *) Shift, pSC->m_param.bScaledArith ? g_const_d3 : g_const_d0);
storeRGB24_3(pbY + 64 * 0, pbU - pbY, pbRGB + cbRGB * 0, cbRGB, cmbColumn,
Shift);
storeRGB24_3(pbY + 64 * 2, pbU - pbY, pbRGB + cbRGB * 8, cbRGB, cmbColumn,
Shift);
#ifdef REENTRANT_MODE
pSC->WMIBI.cLinesDecoded = cHeight - iFirstRow;
#endif
return ICERR_OK;
}
#endif
//================================================================
#if defined(WMP_OPT_TRFM_DEC)
FORCE_INLINE Void strDCT2x2up_OPT(PixelI *pa, PixelI *pb, PixelI *pc, PixelI *pd)
{
PixelI a, b, c, d, C, t;
a = *pa;
b = *pb;
C = *pc;
d = *pd;
a += d;
b -= C;
t = ((a - b + 1) >> 1);
c = t - d;
d = t - C;
a -= d;
b += c;
*pa = a;
*pb = b;
*pc = c;
*pd = d;
}
FORCE_INLINE Void invOdd_OPT(PixelI *pa, PixelI *pb, PixelI *pc, PixelI *pd)
{
PixelI a, b, c, d;
a = *pa;
b = *pb;
c = *pc;
d = *pd;
/** butterflies **/
b += d;
a -= c;
d -= (b) >> 1;
c += (a + 1) >> 1;
/** rotate pi/8 **/
#define IROTATE2(a, b) (a) -= (((b)*3 + 4) >> 3), (b) += (((a)*3 + 4) >> 3)
IROTATE2(a, b);
IROTATE2(c, d);
/** butterflies **/
c -= (b + 1) >> 1;
d = ((a + 1) >> 1) - d;
b += c;
a -= d;
*pa = a;
*pb = b;
*pc = c;
*pd = d;
}
FORCE_INLINE Void invOddOdd_OPT(PixelI* pa, PixelI* pb, PixelI* pc, PixelI* pd)
{
PixelI a, b, c, d, t1, t2;
a = *pa;
b = *pb;
c = *pc;
d = *pd;
/** butterflies **/
d += a;
c -= b;
a -= (t1 = d >> 1);
b += (t2 = c >> 1);
/** rotate pi/4 **/
a -= (b * 3 + 3) >> 3;
b += (a * 3 + 3) >> 2;
a -= (b * 3 + 4) >> 3;
/** butterflies **/
b -= t2;
a += t1;
c += b;
d -= a;
/** sign flips **/
*pa = a;
*pb = -b;
*pc = -c;
*pd = d;
}
FORCE_INLINE Void strDCT2x2dn_SSE2_1(PixelI* p)
{
__m128i* const pdq = (__m128i*)p;
__m128i a = pdq[0];
__m128i b = pdq[1];
const __m128i C = pdq[2];
__m128i d = pdq[3];
__m128i t;
__m128i c;
a = _mm_add_epi32(a, d);
b = _mm_sub_epi32(b, C);
t = _mm_sub_epi32(a, b);
t = _mm_srai_epi32(t, 1);
c = _mm_sub_epi32(t, d);
d = _mm_sub_epi32(t, C);
a = _mm_sub_epi32(a, d);
b = _mm_add_epi32(b, c);
pdq[0] = a;
pdq[1] = b;
pdq[2] = c;
pdq[3] = d;
}
Void strIDCT4x4Stage1_OPT_H1(PixelI* p)
{
/** top left corner, butterfly => butterfly **/
strDCT2x2up_OPT(p + 0, p + 1, p + 2, p + 3);
/** top right corner, -pi/8 rotation => butterfly **/
invOdd_OPT(p + 5, p + 4, p + 7, p + 6);
/** bottom left corner, butterfly => -pi/8 rotation **/
invOdd_OPT(p + 10, p + 8, p + 11, p + 9);
/** bottom right corner, -pi/8 rotation => -pi/8 rotation **/
invOddOdd_OPT(p + 15, p + 14, p + 13, p + 12);
}
FORCE_INLINE Void strIDCT4x4Stage1_OPT_H2(PixelI* p)
{
/** butterfly **/
strDCT2x2dn_SSE2_1(p);
}
Void strIDCT4x4Stage1_OPT5(PixelI* p0, PixelI* p1)
{
_mm_prefetch((char*)(p0 - 96 + 256), _MM_HINT_T0);
strIDCT4x4Stage1_OPT_H1(p0 - 96);
strIDCT4x4Stage1_OPT_H1(p0 - 80);
strIDCT4x4Stage1_OPT_H1(p0 - 32);
strIDCT4x4Stage1_OPT_H1(p0 - 16);
_mm_prefetch((char*)(p0 - 32 + 256), _MM_HINT_T0);
strIDCT4x4Stage1_OPT_H1(p0 + 32);
strIDCT4x4Stage1_OPT_H1(p0 + 48);
strIDCT4x4Stage1_OPT_H1(p0 + 96);
strIDCT4x4Stage1_OPT_H1(p0 + 112);
_mm_prefetch((char*)(p0 + 32 + 256), _MM_HINT_T0);
strIDCT4x4Stage1_OPT_H1(p1 - 128);
strIDCT4x4Stage1_OPT_H1(p1 - 112);
strIDCT4x4Stage1_OPT_H1(p1 - 64);
strIDCT4x4Stage1_OPT_H1(p1 - 48);
_mm_prefetch((char*)(p0 + 96 + 256), _MM_HINT_T0);
strIDCT4x4Stage1_OPT_H1(p1 + 0);
strIDCT4x4Stage1_OPT_H1(p1 + 16);
strIDCT4x4Stage1_OPT_H1(p1 + 64);
strIDCT4x4Stage1_OPT_H1(p1 + 80);
strIDCT4x4Stage1_OPT_H2(p0 - 96);
strIDCT4x4Stage1_OPT_H2(p0 - 80);
strIDCT4x4Stage1_OPT_H2(p0 - 32);
strIDCT4x4Stage1_OPT_H2(p0 - 16);
strIDCT4x4Stage1_OPT_H2(p0 + 32);
strIDCT4x4Stage1_OPT_H2(p0 + 48);
strIDCT4x4Stage1_OPT_H2(p0 + 96);
strIDCT4x4Stage1_OPT_H2(p0 + 112);
strIDCT4x4Stage1_OPT_H2(p1 - 128);
strIDCT4x4Stage1_OPT_H2(p1 - 112);
strIDCT4x4Stage1_OPT_H2(p1 - 64);
strIDCT4x4Stage1_OPT_H2(p1 - 48);
strIDCT4x4Stage1_OPT_H2(p1 + 0);
strIDCT4x4Stage1_OPT_H2(p1 + 16);
strIDCT4x4Stage1_OPT_H2(p1 + 64);
strIDCT4x4Stage1_OPT_H2(p1 + 80);
}
//================================
__declspec(naked) void __stdcall strPost4x4Stage1_alternate_ASM5(PixelI* p0, PixelI* p1)
{
UNREFERENCED_PARAMETER( p0 );
UNREFERENCED_PARAMETER( p1 );
__asm {
push ebp
push ebx
push esi
push edi
//================
// pointer array
mov eax, [esp + 20] // $esi = p0
mov edx, [esp + 24] // $edi = p1
mov ecx, 4 * 16
mov ebx, 4 * 48
prefetcht0 [eax + 512]
prefetcht0 [eax + 768]
prefetcht0 [eax + 1024]
prefetcht0 [eax + 1280]
add edx, ecx
add eax, ebx
push edx
sub edx, ecx
push edx
push edx
sub edx, ebx
push eax
push eax
sub eax, ecx
push eax
push eax
sub eax, ecx
push eax
sub eax, ecx
push edx
sub edx, ecx
push edx
sub eax, ecx
push edx
sub edx, ebx
push eax
push eax
sub eax, ecx
push eax
push eax
sub eax, ecx
push eax
sub eax, ecx
push edx
sub edx, ecx
push edx
sub eax, ecx
push edx
sub edx, ebx
push eax
push eax
sub eax, ecx
push eax
push eax
sub eax, ecx
push eax
sub eax, ecx
push edx
sub edx, ecx
push edx
sub eax, ecx
push edx
push eax
push eax
sub eax, ecx
push eax
push eax
sub eax, ecx
push eax
mov ebp, (4 + 4) * -16
push ebp
}
Loop0:
__asm {
mov esi, [esp + (4 + 4) * 16 + 4 + ebp ] // $esi = p0
mov edi, [esp + (4 + 4) * 16 + 4 + ebp + 4] // $edi = p1
//================
movdqa xmm2, [esi + 4 * 12] // a = xmm2
movdqa xmm1, [esi + 4 * 72] // b = xmm1
movdqa xmm6, [edi + 4 * 4] // c = xmm6
movdqa xmm7, [edi + 4 * 64] // d = xmm7
//================
// buttefly
paddd xmm2, xmm7
psubd xmm1, xmm6
movdqa xmm0, xmm2 // a = xmm0
psubd xmm2, xmm1
psrad xmm2, 1
movdqa xmm3, xmm2
psubd xmm2, xmm7 // c = xmm2
psubd xmm3, xmm6 // d = xmm3
paddd xmm1, xmm2
psubd xmm0, xmm3
//================
// bottom right corner: -pi/8 rotation => -pi/8 rotation
pshufd xmm7, xmm3, 0x3
movd eax, xmm3
movd edx, xmm7
pshufd xmm7, xmm3, 0x1
movd ebx, xmm7
pshufd xmm7, xmm3, 0x2
movd ecx, xmm7
add edx, eax
sub ecx, ebx
mov esi, edx
sar esi, 1
mov edi, ecx
sar edi, 1
sub eax, esi
add ebx, edi
lea ebp, [ebx + ebx * 2 + 6]
sar ebp, 3
sub eax, ebp
lea ebp, [eax + eax * 2 + 2]
sar ebp, 2
add ebx, ebp
lea ebp, [ebx + ebx * 2 + 4]
sar ebp, 3
sub eax, ebp
mov ebp, [esp]
sub ebx, edi
add eax, esi
add ecx, ebx
sub edx, eax
mov esi, [esp + (4 + 4) * 16 + 4 + ebp ] // $esi = p0
mov edi, [esp + (4 + 4) * 16 + 4 + ebp + 4] // $edi = p1
movd xmm3, eax
movd xmm4, ebx
movd xmm5, ecx
movd xmm6, edx
punpckldq xmm3, xmm4
punpckldq xmm5, xmm6
punpcklqdq xmm3, xmm5
//================
// anti diagonal corners: rotation by -pi/8
movdqa xmm5, g_const_d1
movdqa xmm6, g_const_d1
pshufd xmm2, xmm2, 0xd8 // 7, 5, 6, 4
movdqa xmm4, xmm1 // 75, 74, 73, 72
punpckhqdq xmm1, xmm2 // 7, 5, 75, 74
punpcklqdq xmm4, xmm2 // 6, 4, 73, 72
paddd xmm5, xmm1
psrad xmm5, 1
psubd xmm4, xmm5
paddd xmm6, xmm4
psrad xmm6, 1
paddd xmm1, xmm6
movdqa xmm2, xmm4 // 6, 4, 73, 72
punpckhqdq xmm4, xmm1 // 7, 5, 6, 4
punpcklqdq xmm2, xmm1 // 75, 74, 73, 72
pshufd xmm4, xmm4, 0xd8 // 7, 6, 5, 4
//================
// butterfly
// a = xmm0, b = xmm2, c = xmm4, d = xmm3
paddd xmm0, xmm3
movdqa xmm1, xmm0 // a = xmm1
psrad xmm0, 1
psubd xmm0, xmm3 // d = xmm0
movdqa xmm3, xmm0 // d = xmm3
paddd xmm0, xmm0
paddd xmm0, xmm3
psrad xmm0, 3
paddd xmm1, xmm0
movdqa xmm0, xmm1 // a = xmm0
paddd xmm1, xmm1
paddd xmm1, xmm0
psrad xmm1, 4
paddd xmm3, xmm1
movdqa xmm5, xmm0 // a
psrad xmm5, 7
paddd xmm3, xmm5 // d += (a >> 7)
psrad xmm5, 3
psubd xmm3, xmm5 // d -= (a >> 10)
movdqa xmm5, [g_const_d4]
movdqa xmm1, xmm3 // d = xmm1
psubd xmm2, xmm4
paddd xmm5, xmm3
paddd xmm3, xmm3
paddd xmm3, xmm5
psrad xmm3, 3
paddd xmm0, xmm3
movdqa xmm3, xmm2 // b = xmm3
psrad xmm2, 1
psubd xmm1, xmm2
movdqa xmm2, xmm0 // a = xmm2
psubd xmm0, xmm3
psrad xmm0, 1
psubd xmm0, xmm4 // c = xmm0
paddd xmm3, xmm1
psubd xmm2, xmm0
//================
movdqa [edi + 4 * 4], xmm1
movdqa [edi + 4 * 64], xmm0
movdqa [esi + 4 * 12], xmm2
movdqa [esi + 4 * 72], xmm3
add ebp, 8
mov [esp], ebp
jnz Loop0
//================
add esp, (4 + 4) * 16 + 4
pop edi
pop esi
pop ebx
pop ebp
ret 4 * 2
}
}
Int invTransformMacroblock_YUV444_Center5(CWMImageStrCodec * pSC)
{
const OVERLAP olOverlap = pSC->WMISCP.olOverlap;
int i = 0;
assert(0 < pSC->cRow && pSC->cRow < pSC->cmbHeight);
assert(0 < pSC->cColumn && pSC->cColumn < pSC->cmbWidth);
assert(0 == pSC->WMII.cPostProcStrength);
assert(YUV_444 == pSC->m_param.cfColorFormat);
assert(3 == pSC->m_param.cNumChannels);
assert(pSC->m_Dparam->bDecodeFullWidth);
assert(1 == pSC->m_Dparam->cThumbnailScale);
for (i = 0; i < 3; ++i)
{
PixelI* const p0 = pSC->p0MBbuffer[i];
PixelI* const p1 = pSC->p1MBbuffer[i];
//================================
// second level inverse transform
strIDCT4x4Stage2(p1);
if (pSC->m_param.bScaledArith) {
strNormalizeDec(p1, (i != 0));
}
//================================
// second level inverse overlap
if (OL_TWO <= olOverlap)
{
strPost4x4Stage2Split_alternate(p0, p1);
}
//================================
// first level inverse transform
strIDCT4x4Stage1_OPT5(p0, p1);
//================================
// first level inverse overlap
if (OL_ONE <= olOverlap)
{
strPost4x4Stage1_alternate_ASM5(p0, p1);
}
}
return ICERR_OK;
}
#endif
#endif
//================================================================
void StrDecOpt(CWMImageStrCodec* pSC)
{
#if defined(WMP_OPT_SSE2)
if (IsProcessorFeaturePresent(PF_XMMI64_INSTRUCTIONS_AVAILABLE))
{
CWMImageInfo* pII = &pSC->WMII;
// CWMIStrCodecParam* pSCP = &pSC->WMISCP;
g_const_d0 = _mm_setzero_si128();
g_const_d3 = _mm_set1_epi32(3);
g_const_d1 = _mm_set_epi32(1, 1, 1, 1);
g_const_d4 = _mm_set_epi32(4, 4, 4, 4);
g_const_d0x80 = _mm_set_epi32(0x80, 0x80, 0x80, 0x80);
g_const_w0x80 = _mm_set_epi16(0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80);
g_const_b0x80 = _mm_set_epi8(0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80, 0x80);
if (pSC->WMII.fPaddedUserBuffer &&
//pSC->m_Dparam->bDecodeFullFrame &&
//((pII->cWidth & 0xf) == 0) &&
//(((int) pSC->WMIBI.pv & 0xf) == 0) &&
BD_8 == pII->bdBitDepth &&
CF_RGB == pII->cfColorFormat &&
24 == pII->cBitsPerUnit &&
pII->bRGB &&
O_NONE == pII->oOrientation &&
YUV_444 == pSC->m_param.cfColorFormat &&
pSC->p1MBbuffer[1] - pSC->p1MBbuffer[0] == pSC->p1MBbuffer[2] - pSC->p1MBbuffer[1] &&
pSC->m_Dparam->bDecodeFullFrame &&
1)
{
#if defined(WMP_OPT_CC_DEC)
if (pSC->m_param.bScaledArith || pSC->WMISCP.olOverlap != OL_NONE)
{
pSC->Load = outputMBRow_RGB24_Lossy_3;
}
else
{
pSC->Load = outputMBRow_RGB24_Lossless_1;
}
#endif // WMP_OPT_CC_DEC
}
if (YUV_444 == pSC->m_param.cfColorFormat &&
pSC->p1MBbuffer[1] - pSC->p1MBbuffer[0] == pSC->p1MBbuffer[2] - pSC->p1MBbuffer[1] &&
pSC->m_Dparam->bDecodeFullWidth &&
pSC->m_param.cSubVersion == CODEC_SUBVERSION_NEWSCALING_SOFT_TILES &&
1 == pSC->m_Dparam->cThumbnailScale)
{
#if defined(WMP_OPT_TRFM_DEC)
pSC->TransformCenter = invTransformMacroblock_YUV444_Center5;
#endif
}
}
#else
UNREFERENCED_PARAMETER( pSC );
#endif
}
|
Heavy volumes on limes from Mexico
After the U.S. market experienced a somewhat tight spring market, limes are seeing heavy volumes right now. “We’re seeing about 500-600, maybe even 650 loads a week crossing the border into the U.S. from Mexico,” notes J.B. Cutsinger of International Citrus and Produce in Burlingame, Ca. “Compared to last year, it’s probably a little heavier on volume this year.”
Not surprisingly, the reason for the soft market on limes is weather-related. “Mexico had a period where they didn’t get any rain for a long time,” says Cutsinger. “Then they got some rain followed by some high temperatures so you might see a quality issue coming up here in the not too distant future.”
Demand not bad Meanwhile demand for limes is fair—Cutsinger estimates about a 7 on a scale of one to 10. “Demand should be higher,” he says. “It’s fair because the prices are so cheap for limes.” Prices have been on a steady decline for limes in the past several weeks. “In terms of price, it’s about 20 per cent lower than this time last year,” he notes.
So looking ahead, what does Cutsinger see? “I think we’ll still see a heavy volume for the next couple of weeks or so,” he says. |
Harry’s Place contributor says rape isn’t that bad
Last year we ran a piece on former English Defence League activist Andy Hughes, proprietor of the Islamic Far-Right in Britain blog, whose articles denouncing the Islamist threat to western civilisation are regularly crossposted at the notorious Islamophobic blog Harry’s Place.
We pointed out that, in addition to declaring his admiration for convicted thug Joel Titus, the ex-leader of the EDL’s youth section, Hughes had made antisemitic comments on the Expose Facebook page under the pseudonym of Arry Bo. Expressing his dislike of “Yids” who “think they are superior beings and the rest of us are scum”, Hughes wrote that this explained “why Jews have been kicked out of so many countries” .
Given HP’s readiness to denounce opponents of the state of Israel as antisemites, you might have thought they would be quick to dissociate themselves from Hughes and his vile remarks. But no. Sarah Annes Brown, who presents herself as the voice of reason at Harry’s Place (competition isn’t exactly fierce), happily accepted Hughes’ laughable explanation that in posting these antisemitic comments he was simply trying to wind people up. She attributed this to the fact that Hughes is “a bit – skittish”!
Earlier today Hughes joined a discussion at Expose, posting comments under one of his other aliases, Arry Ajalami. Although he has in the past insisted that he has broken with the EDL and rejects its current methods and ideology (which is why HP say they have no problem with publishing his articles), this didn’t prevent Hughes from posting a number of comments that show he still identifies closely with this gang of racists and fascists.
Even more disgusting, however, was Hughes’ reaction to the posting of a screenshot from the EDL LGBT Division’s Facebook page, in which one EDL supporter advocated a sexual assault on Expose admin Darcy Jones. A denunciation of “these muslim dogs and the liberal garbage who protect them”, was followed by: “Let them rape Darcy. She likes these dogs so much.”
Hughes’ response was: “Well my cousin’s mate was raped and she said it wasn’t THAT bad. She didn’t like it but said it wasn’t as bad as when she got beaten up by a gang of Muslims.” Quite rightly, the comment was almost immediately removed, but not before Expose had taken a screenshot which can be viewed here. You’ll notice, by the way, that Hughes had adopted the National Front logo as his profile picture.
During the past week Harry’s Place has been making hay over the Socialist Workers Party’s failure to deal properly with an accusation of rape against one of its leading figures. Before that, HP attacked George Galloway over his remarks trivialising the rape charges against Julian Assange. So you might think that, in all consistency, they would have to sever links with Hughes over his own reprehensible views on sexual violence and cease crossposting articles from his Islamic Far-Right in Britain blog.
But, again, this would almost certainly be a mistaken assumption. If you’re prepared to assist in the witch-hunting of Muslim organisations, then you can announce your admiration for a violent hooligan, express atrocious antisemitic views, declare your support for a street movement of anti-Muslim thugs, claim that being raped isn’t such a bad experience after all, and you’ll probably get a free pass from Harry’s Place. They’ll put it all down to your skittish personality. |
test_that("it can parse a simple person", {
input <- list(first_name = "Foo", last_name = "Bar, Ph.D.")
expect_equal(
`environment<-`(resource()$parser, environment())(),
utils::person("Foo", "Bar, Ph.D.")
)
})
|
---
title: IVMHardDisk Parent property (VPCCOMInterfaces.h)
description: Parent of the differencing virtual hard disk.
ms.assetid: 9a400fa0-ee0d-4474-a410-82756ea544fe
keywords:
- Parent property Virtual PC
- Parent property Virtual PC , IVMHardDisk interface
- IVMHardDisk interface Virtual PC , Parent property
topic_type:
- apiref
api_name:
- IVMHardDisk.Parent
- IVMHardDisk.get_Parent
- IVMHardDisk.put_Parent
api_location:
- VPCCOMInterfaces.h
api_type:
- COM
ms.topic: reference
ms.date: 05/31/2018
---
# IVMHardDisk::Parent property
\[Windows Virtual PC is no longer available for use as of Windows 8. Instead, use the [Hyper-V WMI provider (V2)](/windows/desktop/HyperV_v2/windows-virtualization-portal).\]
Retrieves and sets the parent of the differencing virtual hard disk.
This property is read/write.
## Syntax
```C++
HRESULT put_Parent(
[in] IVMHardDisk *parent
);
HRESULT get_Parent(
[out, retval] IVMHardDisk **parent
);
```
## Property value
Sets the [**IVMHardDisk**](ivmharddisk.md) object associated with the parent hard disk image.
## Error codes
| Name/value | Meaning |
|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| <dl> <dt>S\_OK</dt> <dt>0</dt> </dl> | The operation was successful.<br/> |
| <dl> <dt>E\_POINTER</dt> <dt>0x80004003</dt> </dl> | The parameter is **NULL**.<br/> |
| <dl> <dt>S\_FALSE</dt> <dt>1</dt> </dl> | This is not a differencing hard disk, so it has no parent.<br/> |
| <dl> <dt>HRESULT\_FROM\_WIN32(ERROR\_FILE\_NOT\_FOUND)</dt> <dt>0x80070002</dt> </dl> | The system could not find the parent virtual hard disk file.<br/> |
| <dl> <dt>HRESULT\_FROM\_WIN32(ERROR\_PATH\_NOT\_FOUND)</dt> <dt>0x80070003</dt> </dl> | The system could not find the path to the parent virtual hard disk file.<br/> |
| <dl> <dt>VM\_E\_HD\_IMAGE\_OPEN\_FAIL</dt> <dt>0xA004067C</dt> </dl> | An error occurred while attempting to open the current hard disk image file.<br/> |
| <dl> <dt>VM\_E\_HD\_IMAGE\_ACCESS</dt> <dt>0xA0040681</dt> </dl> | An error occurred while attempting to access the current hard disk image file.<br/> |
| <dl> <dt>VM\_E\_PARENT\_CHILD\_ID\_MISMATCH</dt> <dt>0xA0040685</dt> </dl> | The virtual hard disk image located by the *parent* parameter does not have the same ID as the child disk image. Make sure the parent virtual hard disk image located by the *parent* parameter is the same image used to create the differencing virtual hard disk image.<br/> |
| <dl> <dt>DISP\_E\_EXCEPTION</dt> <dt>0x80020009</dt> </dl> | An unexpected error has occurred.<br/> |
## Remarks
This property is only valid with differencing hard disk images.
## Requirements
| | |
|-------------------------------------|-----------------------------------------------------------------------------------------------|
| Minimum supported client<br/> | Windows 7 \[desktop apps only\]<br/> |
| Minimum supported server<br/> | None supported<br/> |
| End of client support<br/> | Windows 7<br/> |
| Product<br/> | Windows Virtual PC<br/> |
| Header<br/> | <dl> <dt>VPCCOMInterfaces.h</dt> </dl> |
| IID<br/> | IID\_IVMHardDisk is defined as ffa14ae6-48f5-42a4-8a22-186f2e5c7db0<br/> |
## See also
<dl> <dt>
[**IVMHardDisk**](ivmharddisk.md)
</dt> </dl>
|
Lake George, Yarmouth County, Nova Scotia
Lake George is a Canadian rural community located in Yarmouth County, Nova Scotia.
See also
Royal eponyms in Canada
Category:Communities in Yarmouth County, Nova Scotia |
Tag Archives: fairy tale magic
Guys I am geeking out so hard right now! Not only am I going to an special early showing of the new Beauty & the Beast movie tomorrow night, I just found out that you can have your very own enchanted rose. This is some real life crazy fairy tale awesome! The company is called Forever Rose, and they are offering up living flowers that can last up to three years without water or sunlight and theoretically last indefinitely if they are kept in their protected glass domes.
When I saw these white ones, all I could think was how they would be amazing centerpieces at a wedding. Heck, they would probably even upstage the all-important wow of the wedding dress. Oh, and of course I need a full arrangement to live in my work office.
I can’t even begin to articulate how badly I want one of these. It’s one thing to have to get a shirt or a mug with images from the movie on it, but to be able to to have a real piece of the magic? It doesn’t get any better than that for me. Now all I need is a yellow ball gown and a talking teapot and I will be set. |
Q:
Java default JRE parameters on Unix
Is it possible to configure java in unix to always add a JRE parameter whenever java is run?
e.g. -Dcom.sun.management.jmxremote.port=25800
A:
You can create a wrapper script and add it to your path. Something like this
#!/bin/bash
java -Dcom.sun.management.jmxremote.port=25800 "$@"
Call it java-local.sh or some other fancy name and just use it in place of the java binary. Of course this one is pretty basic but I am sure it caters for like 90% of the cases. As a shell exercise, you could make it an alias for your user (but then it only works for your user):
# alias java='java -Dcom.sun.management.jmxremote.port=25800'
A:
You could create an alias
alias java='java -Dcom.sun.management.jmxremote.port=25800'
You could also play around with Application Resource Files which may be more appropriate.
A:
IBM java has support for a SystemDefault.properties file, where each line specifies one Java system property or command line option. but I can't see anything similar for the oracle JDK, and there is a similar thread gone unanswered here;
https://forums.oracle.com/forums/thread.jspa?threadID=2131751
stracing openjdk during startup, seems to indicate that it does not look for any ".properties" files, so I am guessing that the answer is no. But there might be a Java expert come along with a better answer.
|
Watch Iron Man Vs Zombie Apocalypse In GTA IV
So who would win between an Iron Man suit being piloted by a young douchy kid or a zombie apocalypse taking place during a carmageddon? I would put my money either on the undead hordes or a bunch of burning, flying cars taking over the city. That's exactly what happens when one player dons the Mark XXVII Iron Man suit and heads to a turbulent Liberty City.
If you can get through all the guy's ridiculous antics for about the first four minutes or so, which basically includes him pricking around with Iron Man's repulsor beams and blasting civilians into bits and pieces, totally opposite of the Iron Man in the movies. Things eventually pick up when Carmageddon mode is activated followed by the Zombie Apocalypse mode, also known as the Left 4 Liberty Mod.
The combination of mods actually turns Grand Theft Auto IV into a completely different experience, and in the hands of a better editor (and player) there is some serious potential for some really cool videos.
I'm just impressed that people are still modding the crap out of GTA IV even though GTA V is right around the corner. You can even check out the latest trailers for GTA V right here.
If the above video made your stomach churn with all the Iron Man terrorism that happened, fear not, for there are better forces in the world working towards global peace...or at least, trying to keep the streets of Liberty City safe. You can see several members of the RCMP clan escorting a prisoner and trying to avoid one clusterfail of intensity at a time, just until they get ambushed by some terrorists (ambush starts at the 4:00 min mark).
Man, I would have loved to have seen the RCMP clan deal with that terrorist Iron Man. |
-h*f + 2686 = -1612. What is the units digit of f?
7
Suppose 27 - 7 = -4*m. Let l be ((-525)/5 - 5) + m. Let x = l + 233. What is the tens digit of x?
1
Let w = 100 - 106. What is the tens digit of w*(-2 + -4) + 3?
3
Let f(j) = 1019*j + 22. Suppose -5*z + 83 - 78 = 0. What is the tens digit of f(z)?
4
Suppose -4096*l + 4094*l = 16, v - l - 2054 = 0. What is the hundreds digit of v?
0
Suppose 27405 = -14*q - 15*q. Let h = -124 - q. What is the tens digit of h?
2
Suppose 4*z - 5*g = 176 + 130, z - 71 = 4*g. Let h = 160 - z. What is the units digit of h?
1
Let y = 6728 - -370. What is the tens digit of y?
9
Let u(a) = 3*a**2 + 7*a - 124. Let i be u(-33). Suppose -6*g = -1996 - i. What is the tens digit of g?
1
What is the ten thousands digit of (-7 + 576/81)*105093?
1
Suppose -124 = 23*o - 19*o. Let c = 15 + o. What is the tens digit of c/(-24)*369/(3 - 0)?
8
Suppose -8*y + 105 = 393. What is the tens digit of -2*(-6)/(y/(-978))?
2
Let v(o) = -o**2 - 16*o - 22. Let f be v(-4). What is the hundreds digit of 4/f - 84573/(-117)?
7
Let n = -73324 - -107266. What is the ten thousands digit of n?
3
Suppose -3*i + 5*n = -17, 3*i + 3*n - 7*n - 19 = 0. Let h(a) = a**2 - 10*a - 3. Let l be h(i). What is the tens digit of 38 + 3/3 + l/4?
3
Let h = 2254 - -9128. What is the hundreds digit of h?
3
Let f(x) = 10*x**2 + 8*x - 74. Let p be f(5). Let k = -30 + p. What is the tens digit of k?
8
Let j(u) = -2*u + 3. Let q be j(-15). Let f = q + -33. Suppose f*b = b + 5, -2*g + 4*b + 148 = 0. What is the units digit of g?
4
Suppose 4*u = 130*u - 1500912. What is the thousands digit of u?
1
Let w be (-2 + 11)/(1 - 2). Let r be (5 + -8)*((-24)/w)/(-2). What is the hundreds digit of (((-1170)/r)/5)/((-3)/6)?
1
Let b(r) = r**2 + 18*r - 11. Let m(o) = o**3 - 43*o**2 + 43*o - 29. Let x be m(42). What is the units digit of b(x)?
2
Let g(i) = -i**3 - 3*i**2 - 2*i - 4. Let t be g(-3). Let q be (0*1/2*-2)/t. Suppose 13*y - 1128 - 224 = q. What is the hundreds digit of y?
1
Let s(p) = -33*p**2 + 41*p - 6. Let k(f) = -34*f**2 + 41*f - 4. Let l(b) = -6*k(b) + 5*s(b). What is the tens digit of l(-5)?
7
Suppose 3 - 1 = c. Suppose c = 10*s - 8. What is the tens digit of ((-1)/s)/(3/(-51))?
1
Let j(q) be the first derivative of 55*q**2/2 - 209*q - 223. What is the tens digit of j(27)?
7
Let a(n) be the first derivative of -5*n**4/4 - 2*n**3/3 + 7*n + 111. What is the units digit of a(-3)?
4
Let y(r) = 45*r**3 - 479*r**2 - 16*r - 37. What is the tens digit of y(14)?
3
Let d(b) = -11*b**3 + b**2 + b. Let t be d(-1). Suppose 11312 = t*w + 17*w. What is the units digit of w?
4
Let y(k) = -20*k**3 - 8*k**2 + 15*k + 24. What is the thousands digit of y(-6)?
3
Suppose 40*b + 181404 - 269130 = 400674. What is the ten thousands digit of b?
1
Suppose -4*k - 21216 = -3*b + 36811, 19347 = b + k. What is the thousands digit of b?
9
Let g = -12270 + 18145. What is the hundreds digit of g?
8
Let x = 3000 + -2515. What is the hundreds digit of x?
4
Suppose -g = 4, -3*t - 944 = -6*t + 5*g. What is the units digit of -8*(-7)/t - (-9478)/22?
1
Suppose 7*g = g + 858. Let h = 55 - g. Let n = h - -228. What is the units digit of n?
0
Let o(v) = 57*v + 198. Let z be o(6). Let l be (-16)/(-6) + (-4)/6. Suppose k = -l*b + z, -4*b = -k + 346 - 1426. What is the hundreds digit of b?
2
Suppose -24*u + 52734 = -119754. What is the hundreds digit of u?
1
Suppose 23*x - 130775 + 4945 - 95039 = 0. What is the thousands digit of x?
9
What is the thousands digit of (3/12)/((-84)/(-1986768))?
5
Suppose -19 + 2 = 17*b. What is the units digit of -2 - (-1212)/(b + 5)?
1
Let k = -4482 - -9865. What is the hundreds digit of k?
3
Suppose -l - 3 = -7. Suppose 0 = -2*d + 8 - 2, 66 = m - l*d. What is the units digit of m?
8
Let m be ((-8)/(-6))/(868/210 - 4). Suppose -m*r + 2347 = -8*r + j, 4*j = -4*r + 4700. What is the hundreds digit of r?
1
Let c be (5/4)/((-76)/(-304)). What is the units digit of (-6945)/(-15) - c/(5/3)?
0
Let n be 8/((-16)/(-3))*(1092 - 2). Suppose -v + d + 470 = 0, 2*d - 220 = 3*v - n. What is the tens digit of v?
7
Let l be (4 - 3)*3*-1. Let f be 708/16 + l/12. What is the units digit of f - (-2 - -1)/(2/6)?
7
Suppose v + 3*n = 3, 4*n + 1 = 3*v + 5*n. Suppose v = -199*p + 197*p + 1864. What is the hundreds digit of p?
9
Let d(o) = 667*o + 6769. What is the ten thousands digit of d(12)?
1
Let q(c) = -c**3 + 8*c**2 + 24*c - 2. Let f be 30/(-12)*-4*1. Let l be q(f). Let h = l - -2. What is the tens digit of h?
4
Suppose 6051 = 2*u - 5*s, 0 = -21*u + 16*u + 4*s + 15136. What is the thousands digit of u?
3
Suppose 0 = -4*i + 20, 9*k - 14*k - 3*i + 12890 = 0. What is the thousands digit of k?
2
Suppose -121*l + 133*l = 120312. Suppose 62*n + l = 71*n. What is the thousands digit of n?
1
Let a = 1319 + 1481. What is the tens digit of a?
0
What is the tens digit of -25 + 18 - (-5 + -72826)?
2
Suppose 0 = -4*v - 16, t + 4*v = 5*v + 521. Let r = -348 - -410. Suppose -t = -7*g - r. What is the units digit of g?
5
Let h = -3457 - -40303. What is the thousands digit of h?
6
Let z = -28 + 32. What is the hundreds digit of -5 + z + (-3 - -407)?
4
Suppose -15*n = -5*y - 12*n + 302248, 4*y - 241766 = -3*n. What is the hundreds digit of y?
4
Let y be (-5)/(105/(-29151)) - 5/35. Let t = 2240 - y. What is the hundreds digit of t?
8
Let f(v) = -23*v**2 + 14*v - 8. Let d be f(16). What is the tens digit of (-1 + -1 + -1)*d/24?
0
Let a = 49433 - 31950. What is the hundreds digit of a?
4
Let o(a) = 959*a**2 - 325*a + 2637. What is the thousands digit of o(8)?
1
Let s = 50 + -49. Let m be (-6 - -5) + s + -1521. What is the units digit of m/26*4/(-6)?
9
Let b = 112 - 114. Let o(x) = -6*x - 6. Let c be o(b). Suppose 0 = 4*p - 3*j - 50, -p - 2*j - 66 = -c*p. What is the tens digit of p?
1
Let g = 2929 - 2521. What is the hundreds digit of g?
4
Let x(g) = -5*g**2 - 3 + 3*g + 1 + g**3 - 1. Let k be x(4). Let l(u) = u**3 + 10*u**2 + 9*u - 7. What is the tens digit of l(k)?
7
Let p(i) = i + i**3 - 19*i**2 - 10*i + 3220 - 3273. What is the tens digit of p(20)?
6
Suppose -21*h = -312 + 39. Suppose -h*q = -21*q + 10664. What is the units digit of q?
3
Suppose -6*u + 45 = 15. Suppose 0 = 5*h - u*a - 2070, -3*a = -h + 2*a + 394. What is the units digit of h?
9
Let b(n) be the second derivative of 55*n**3/6 - 5*n**2 + 15*n. Let r be b(4). Let d = r - 118. What is the units digit of d?
2
Let y(j) be the third derivative of -1/2*j**4 + 0*j + 0 - 6*j**3 - 5*j**2. What is the tens digit of y(-9)?
7
Let q(x) = -x**3 + 14*x**2 + 17*x - 31. Let a be q(15). Let m be 5/(5/(-13))*a*4. Suppose 3*z = -8*u + 3*u + m, -5*z - 16 = -u. What is the units digit of u?
1
Let n = -46 - -47. What is the tens digit of 4/(-12) + n*(-5572)/(-12)?
6
Let l(j) = -j**2 + 15*j + 18. Let k be l(16). Suppose 0 = 2*c + k*n - 39 - 135, 253 = 3*c + 5*n. What is the tens digit of c?
9
Suppose -2*s - 130869 = -3*g, 14*s + 174475 = 4*g + 17*s. What is the hundreds digit of g?
6
Suppose -857*m + 69688 = -852*m + 2*d, -5*m + 5*d = -69660. What is the units digit of m?
6
Suppose 3*j = 5*x + 14863, 14849 = 3*j + 73*x - 71*x. What is the units digit of j?
1
Let m be (6 + (-28)/6)/((-2)/21). Let p be (-28)/(-98) - 2964/m. Suppose x - p = 5*z + 16, 4*x + 4*z = 792. What is the hundreds digit of x?
2
Let v = 16 - 10. Suppose -2*g - g = -v*g. Let y = 99 - g. What is the tens digit of y?
9
Suppose -5*l + 8571 = -4*o, 5*o - 4*o = l - 1715. Suppose -3*z - l = -5*y, -2*y + 2*z = -569 - 117. What is the tens digit of y?
4
Suppose 3*z - 3*v = 2*v, 5*z + 3*v = 0. Suppose g - 208 = -3*g + 4*j, -j - 1 = z. Suppose 5*p = 3*p + 5*f + 102, p = -f + g. What is the units digit of p?
1
Let x = -2415 - -9847. What is the tens digit of x?
3
Suppose 3*g + s = 6*s - 20, -3*g - 8 = -2*s. Suppose g = -412*n + 421*n - 9324. What is the hundreds digit of n?
0
Let a(r) = -142*r**3 + r**2 - 12*r + 5. What is the tens digit of a(-5)?
4
Let p = -18117 + 70979. What is the hundreds digit of p?
8
Suppose -9 = -n - p, -4*p - 1 + 41 = 5*n. Suppose n*o - 5*d - 2877 = 0, -2*o = -6*d + 5*d - 1443. What is the units digit of o?
3
Let v(l) = 36*l**3 - 2*l**2 - l + 3. Let d be 0 + 6/45 + (-28)/(-15). What is the hundreds digit of v(d)?
2
Let f = -2211 - -2495. What is the hundreds digit of f?
2
Suppose -8*x + 4*x + |
Broken Shattered Destroyed Will she ever find a way to overcome the guilt? The anger. The pain. Healing seems impossible. Moving on… Unbearable Until him. He’s the only one who can save her. But it comes with a heavy price.
Sylvie and Linc were best friends since 5th grade. Their lives were always intertwined until one night for Sylvie changes everything. A night on her 16th birthday when she gave herself to Dean because she couldn’t tell Linc how she felt. That one night that changed her life in more ways than she could imagine. Now she is a single mom and reeling with guilt over what happened to Dean. In her eyes, she doesn’t deserve to be happy.
EXCERPT
Today, I’m helping Linc finish packing. He didn’t have much left to box up. The movers had done most of the heavy stuff already, but there were some personal stuff he didn’t want them touching. Like his father’s things. Most of which he kept in his office. His father’s medals from the war were displayed in a glass case, along with the folded, framed American flag from his funeral. I remember when he died, how devastated Linc was. It took him months before he would even talk to me about it.
It was music that helped him through that dark time of his life. It’s what kept him going.
Carefully, I wrap up the remaining photos in his office. There are several of him and his father when he was younger. One where they are camping. Linc’s father was a real outdoorsman, loved wildlife and nature. They were always going on camping trips. When we were younger, I even tagged along a few times. There are a few shots of his mom and dad together over the years. It’s so obvious by the look on their faces how much they love each other, and I silently wonder, as I tuck another newspaper-wrapped frame inside the large cardboard box, if people say the same thing about us.
Do they see it written all over our faces? How much we love each other, how deep that love runs?
When I turn around to grab the next picture from the shelf, my breath catches in my throat. I blink, not really sure of what I’m seeing. It’s a picture of me, taken when I was about sixteen. I’m sitting on the bed of his truck, my bare feet dangling while my hands cup the edge of the tailgate. I’m leaning forward, a half smile on my face and my hair blowing on a slight breeze. The edges look to be crinkled and worn, as if someone has spent a lot of time looking at it. Tears prick my eyes.
Linc softly kisses my cheek before slipping the picture from my grasp. He looks at it thoughtfully, a wistful smile playing on his lips as he rounds the desk to sit in the big leather chair behind it.
He holds the photo close, as if seeing it for the first time. “There are certain days that stand out the most in my mind. Like the day we met. The day I sang to you the first song I ever wrote. The day we went swimming at the lake and you lost your top. Prom.”
Exhaling a long sigh, he continues. “We didn’t do anything special this particular day. We’d been to the lake, then shared a pizza at Emilio’s, then we hung out at my house for a while my mom was at work. We sat on the tailgate and I played around on my guitar. It was a day like so many before, yet so different. You kept telling me how proud you were of me and how someday I would shine brighter than any of the stars in the sky. But all I could think about was how the setting sun would catch your eyes just the right way and how they would sparkle every time you smiled. How the summer wind whipped your hair across your face, the delicate strands kissing your porcelain skin. I knew I had to capture the moment or it would be lost forever. So I ran inside and grabbed my mom’s digital camera. You called me a dork, among other things, and refused to smile for me. But I did manage to get this one. Then the very next day I had it developed.”
I stand in front of him, my eyes filled with unshed tears. “I’ve carried this around in my guitar case ever since. Every time I opened it you were right there, smiling at me, encouraging me. I can’t tell you how many times I wanted to give up, but every time a door would slam in my face I would look at this picture and remember this day. You’re the reason I kept going. You’re the reason I never gave up.”
I climb onto his lap, draping my legs over the arm of the chair while tucking myself into his arms. “You’re not the kind of man who gives up on anything.”
“I came pretty damn close a few times, with my music and trying to make it in this crazy fucking business, but I could never give up on us.” |
Q:
Apply function to dataframe based on column with other dataframe based on index
I would like to perform some operation (e.g. x*apples^y) on the values of column apples, based on their color. The corresponding values are in a seperate dataframe:
import pandas as pd
import numpy as np
df1 = pd.DataFrame({'apples': [2, 1, 5, 6, 7], 'color': [1, 1, 1, 2, 2]})
df2 = pd.DataFrame({'x': [100, 200], 'y': [0.5, 0.3]}).set_index(np.array([1, 2]), 'color')
I am looking for the following result:
apples color
0 100*2^0.5 1
1 100*1^0.5 1
2 100*5^0.5 1
3 200*6^0.3 2
4 200*7^0.3 2
A:
Use DataFrame.join with default left join first and then operate with appended columns:
df = df1.join(df2, on='color')
df['apples'] = df['x'] * df['apples'] ** df['y']
print (df)
apples color x y
0 141.421356 1 100 0.5
1 100.000000 1 100 0.5
2 223.606798 1 100 0.5
3 342.353972 2 200 0.3
4 358.557993 2 200 0.3
There is left join, so append to new column in df1 should working:
df = df1.join(df2, on='color')
df1['apples'] = df['x'] * df['apples'] ** df['y']
print (df1)
apples color
0 141.421356 1
1 100.000000 1
2 223.606798 1
3 342.353972 2
4 358.557993 2
Another idea is use double map:
df1['apples'] = df1['color'].map(df2['x']) * df1['apples'] ** df1['color'].map(df2['y'])
print (df1)
apples color
0 141.421356 1
1 100.000000 1
2 223.606798 1
3 342.353972 2
4 358.557993 2
|
Manager of Education Programs serves as a direct contact to staff to ensure development and implementation of positive learning experiences for our guests. The Manager coordinates the design, implementation, and evaluation of School and Professional Development Programs. In addition, the Manager is responsible for the coordination of specialty programs, camps and special needs.
• Knowledge of wildlife conservation, research and environmental issues.
• Excellent time management skills.
• Excellent communication skills.
• Proficiency with Microsoft Office Products.
The Georgia Aquarium and Marineland Dolphin Adventure offers an aggressive benefit and compensation packaged. Please visit our website www.georgiaaquarium.org for additional information and to apply for this opening. Georgia Aquarium Inc. is an EOE and supports a Drug Free Workplace! |
Q:
Is it possible to use anonymous classes in C++?
I have seen anonymous classes in C++ code on Quora. It's successfully compiled and run.
Code here:
#include <iostream>
auto func()
{
class // no name
{
public:
int val;
} a;
a.val = 5;
return a;
}
int main()
{
std::cout << func().val << std::endl;
return 0;
}
So, Is it valid in C++?
Also, I am curious to know, Is it possible to use anonymous classes in C++?
A:
Not only that, you can create more instances of the class by using decltype.
#include <iostream>
class
{
public:
int val;
} a;
int main()
{
decltype(a) b;
a.val = 10;
b.val = 20;
std::cout << a.val << std::endl;
std::cout << b.val << std::endl;
return 0;
}
Output:
10
20
A:
In C++, an anonymous union is a union of this form:
union { ... } ;
It defines an unnamed object of an unnamed type. Its members are injected in the surrounding scope, so one can refer to them without using an <object>. prefix that otherwise would be necessary.
In this sense, no anonymous classes (that are not unions --- in C++ unions are classes) exist.
On the other hand, unnamed classes (including structs and unions) are nothing unusual.
union { ... } x;
class { ... } y;
typedef struct { ... } z;
x and y are named object of unnamed types. z is a typedef-name that is an alias for an unnamed struct. They are not called anonymous because this term is reserved for the above form of a union.
[](){}
Lambdas are unnamed objects of unnamed class types, but they are not called anonymous either.
A:
It was always possible to write something like this:
typedef struct { int a; } type;
Now, if you look at struct { int a } part, this is an anonymous struct. In C++, there's basically no difference between structs and classes (Except the default access modifiers). So, it's possible to have anonymous structs/classes.
|
TL;DR version: The HuffPo bus people severely underestimated how long it would take to get 10,000 people onto 210 buses. I didn't end up getting there until about the same time as Qwerty, apparently. I'll post a more in-depth account of my travels, plus pictures, when I have time.
Yeah, the sense I got is that no one expected A) as many people to go (including the people putting on the dang event) and B) how long it would take to get into DC. So, a lot of people were late, or unable to attend entirely, and because of the sheer amount of people on the mall (and the lack of cell phone reception, and the ensuing battery drain from searching for the network), if you weren't at the right time and place to meet people, you it was nigh impossible to meet up. Next time we need to make sure to exchange numbers as well. XD
I was really pumped to do some proselytizing and in character preaching. I think we should look into other DC events that it would be appropriate to show up to, now that we have more than one forum members near DC.
Long version: The day started with me getting in the car service car at 4:30 am and driving to CitiField. At about 4:50 am we arrived at CitiField, which started the two big themes of the day: waiting in lines, and everyone at every level of the organization of this thing underestimating. There was a traffic jam of all the cars and taxis trying to get to the entrance; the driver was all like "it's 5 am and there's a traffic jam in Flushing Queens, WTF!?" So I get out and get in line for the bus. Oh, the line:
The perspective is a bit lost in the pic, but the line extended all the way down to those light on the side of CitiField and around the corner for another 50 feet, about 10-15 thick the entire way. They were supposed to start getting everyone on the buses at 5:30 am and everyone would leave by 6 am. HAH!
That picture was taken about 10 minutes before I left. Notice how light it got out. It was about 7:35 am when I left, I'm guessing the last of the buses left at about 8 am. The bus ride consisted mostly of me trying to sleep, eating a little, and peeing in the charter bus "bathroom" . So, I didn't end up getting there until about 12:50 pm, and then waiting in line for tickets and riding the DC metro system chewed up another 30 minutes (I think I'm going to have to give the DC metro system its own little rant down in RR&M). I finally arrive at the National Mall at 1:20 pm. Now, finding either the Ubis or Qwerty at this point would have been nigh on impossible. The National Mall greens were packed. The side streets were packed. The stairs and public areas of the Smithsonian museums were packed. People even got up on the port-o-potties to get a view. CBS estimated the crowd to be 215,000 strong (by comparison, they totaled the Glenn Beck rally at 87,000 ). And even if we had exchanged cell numbers beforehand, service was pretty much dead in the area. I only was able to communicate via text message with my brother who showed up, and those took a long time to send.
I can confirm, however, that I was keeping the pirate-y goodness flowing on the south side of the Mall:
I can also confirm that faith in the FSM is strong. I was surprised and delighted by how many positive cheers and cries of "I too have been touched by His Noodly Appendage!" I received over my sign and costume. One woman came up to approve of the sign was wearing the same FSM "fish" logo as a pin on her jacket. Me and my brother had a nice conversation about religion with a Pastafarian with red hair, a beard and a fedora. And then there was this guy, whose sign completely pwned mine:
People even took pictures of my sign on the NYC subway on the way home.
So the Rally ends, I head back to the metro at 3:30 pm, and encounter my last long, obnoxious line of the day at the Federal Center SW station:
(Seriously, DC metro system: DIAF) After that last bit of bleh, back on the bus, which was uneventful (well, except for those horrid bathrooms again). Arrived back in NYC around 9:20 pm, home at 10:20 pm.
The rally itself was worth it, even if I missed half of it. And I am going to have to watch it again on Comedy Central or the Internets. But to me, the whole of the experience almost wasn't about what was on stage, but the atmosphere. Sitting around CitiField talking with random folks, breaking into (bad) impromptu renditions of "Don't Stop Believin'", checking out signs, impressing some guy by telling him I saw Mitch Hedberg live. The human element is what made it special.
Ubi Dubium continues to work on uploading photos. You can see us on FriendlyAtheist.com until we get them up here.
PKMKII, don't judge Metro too harshly based on Saturday. The demand on it was way beyond the available capacity. They might have done better if the crowd hadn't exceeded the official estimate by 155,000!
We too took a long time getting there. We left home at 8:30 am, for what was usually a 1 hour, 15 minute trip. If I had an appointment, I'd leave a 1 hour 30 minutes and be comfortable with that. It took 3 hours. In line at the station, we saw some great signs and costumes. We found Waldo for the first time. We found him about a dozen more times during the day. We met Mr. Spock who seemed to like our costumes and signs. A lot of people did. Many people took pictures of our small band of cutthroats, too. Our favorite sign while we waited was a very nicely done one with a photo of Pres. Obama labeled, "Not Hitler"; then one of Beck labeled, "Not Hitler;' and then one of Hitler labeled, "Hitler".
We waited at the designated gathering spot and met a young man from Long Island and his mom. After we waited for quite some time, the Flying Spaghetti Monster walked up and touched all of us with his noodly appendages! We were near a large group campaigning for legalized pot. Zombie Abraham Lincoln was there too. After a while, we tried to get into the rally itself and failed. We got separated from our Long Island friends at that point. We finally staked out a spot under a tree near the edge of the mall and watched the parade. Somebody argued with Ubi Dubium for a while thinking we were tea-baggers (the hats? I don't know) and he finally stopped and said, "Wait a minute. You're on my side!"
We took the Metro to Dupont Circle to join the American Humanists and the Friendly Atheist at a restaurant. Ubi Dubium was pleased to not only meet her favorite bloggers, Hemant and Richard Wade and especially pleased that Richard said he'd been looking forward to meeting her!
After another frustrating adventure on the Metro, we got off our train at the Dunn Loring station. As the train pulled out, we saw Qwerty waving wildly through a window! We did get to see him the next day; I'll let him tell of his adventure.
That evening, we left the Ubikids at home and headed for a friend's famous Halloween Party. We hadn't been to a party without the kids since we had them. Details will not be posted here. Because the party is limited to 21 and up, and we hadn't been willing to leave the kids behind before, we had not attended this particular party in prior years. Unfortunately, we were so tired from the Rally, that we left pretty early.
Anyway, we've been trying to catch up on what actually went on at the Rally. We never even got in range of a jumbotron! We did see people climbing trees and sitting on top of porta-potties to get a view. When you get that much sanity in one place, it's insane!
OK, I've got a little while to post. Ubi Dubius is out working at the polls, and the kids have off of school today, so it's just me and the computer for a change this morning.
Rally Photos! I'm going to do something I really haven't done here before, and post real photos of the UbiFamily. My photos would be pretty boring if I didn't. First, here's us:UDK#2's sign got cut off in the photo, but it says "Is this thing on?"
Here's his Noodliness:
The subway was the problem in getting all of us together. Here's why:
Next time we try to get together we should exchange cell phone numbers in advance, but that might not have helped ths time, since all the local networks were totally overloaded. This is what the crowd on the periphery looked like. We never managed to squeeze our way in to the main bulk of the crowd. This was the steps of the National Gallery. |
Q:
J1939 Is address claiming necessary before requesting spesific data? Difference between address claiming and parameter group claiming?
In or order to request spesific data from one node that uses J1939 protocol, is it necessary to claim address before requesting that data? Do we also need to request PGN before that process? Or can we directly request data without requesting PGN or claiming address? Thanks.
A:
Address claiming indicate that you are owner of the perticular address AND there is no other node with same address.
If you know the network will not have any other node with your node address, you can directly request the data. However, you will not comply with J1939 standards.
Your device will not be generic and will be specific to your own network (where you are sure that no other node is using same address).
In short, You can do away address claiming but you should not!
|
Q:
Remove duplicate rows from table
Possible Duplicate:
Remove duplicate rows in MySQL
I'd like to create an unique index on single attribute in a huge table, but there are duplicite values, so I need to remove the duplicity. Only duplicite records can be deleted. What is the best solution in phpmyadmin or mysql query to do this?
The only solution I figured out is to make select into another table, but I'd prefer to delete data from original table.
The table looks like this (I'd like to put unique index on id)
|id|...
+--+---
| 1|x
| 2|a <-- duplicity
| 2|b <-- duplicity
| 3|c
| 4|d
This would be the best result
|id|...
+--+---
| 1|x
| 2|a
| 3|c
| 4|d
This is also acceptable result
|id|...
+--+---
| 1|x
| 3|c
| 4|d
A:
ALTER IGNORE TABLE my_table ADD UNIQUE INDEX (id);
|
In the United States we maintain a public
records system that varies from state to state. This system is controlled by
"recording statutes." Simply, this means that in each and every county there is
a public office where people may have their deeds or other written instruments
relating to title recorded in permanent record books. The public records provide
constructive notice to everyone as to the rights and interests of parties in a
particular piece of property. There may be other rights and interests that are
not disclosed by the public records (i.e., secret marriages, incompetency,
unknown heirs, forgery, etc.). The public recording offices and their records
constitute the most important source of information about title to real estate.
The offices in which these public records are maintained have different
names in different states. In fact, there usually are several different
offices in each and every county. One office may be for the recording of
deeds, mortgages, and documents pertaining exclusively to land. Other
offices in the same counties may contain the records of other matters
affecting the title to the land. Lawsuits, marriages, divorces, insanity
proceedings, and probate may all affect the title to the land. Still
other offices may contain the records relating to taxes against the
properties or, in some instances, recorded surveys.
In a very limited number of states the Registered Land System (also
known as a "Torrens System") is used. Under this system, a court
proceeding has been brought naming parties who have an adverse interest
in the property. If everything in the proceeding is completed and
handled properly, the plaintiff is said to have a good title as of that
date. This title, however, is not guaranteed by the state. The Torrens
System has been abandoned by most states primarily because the
associated court proceedings complicated title transferring and delayed
real estate sales proceedings caused extra and unnecessary expenses. |
How to block computer from accessing network completely...
Here's the issue - one of my roommates's girlfriend is leeching our internet daily. She has her own place but doesn't pay for cable/internet there because she gets it for free here. The router is a Linksys WGT624 v3 router. I've asked repeatedly for him to not allow this, but it continues, and I'm at my wit's end. My first thought was to disable the DHCP server and enable static IPs, but the roommate knows enough that he would probably be able to get around that. Looking at the administration area, I was able to restrict the WIRELESS access to specified MAC addresses, but she usually plugs in. Router can be changed or upgraded to accommodate me and my plans for it - but I need a resolution soon (today/tomorrow)
I basically need to know how to configure this router to either A)allow only specified wired mac addresses or B)disable network connectivity for a certain mac address OR I need to know of a router that can handle my requests..
Yes I do - Issues that in no way relate to the current problem at hand. Because it is a dually signed lease, I cannot kick him out, and nor can I leave the house. Therefore, she will be paying for her share of the bills or she will stop using them. She is not a casual visitor. She is here..every night...every day..taking showers, using my washer and dryer, and so forth. She has the apartment because her parents are paying for it.
Regardless of whether or not you agree with me, I need help with this. I have offered her plenty of chances to make agreements on utility usage and she has declined all. It is time to take action here.
If you don't want to help, that is fine. No further comments are necessary.
Yes I do - Issues that in no way relate to the current problem at hand. Because it is a dually signed lease, I cannot kick him out, and nor can I leave the house. Therefore, she will be paying for her share of the bills or she will stop using them. She is not a casual visitor. She is here..every night...every day..taking showers, using my washer and dryer, and so forth. She has the apartment because her parents are paying for it.
Regardless of whether or not you agree with me, I need help with this. I have offered her plenty of chances to make agreements on utility usage and she has declined all. It is time to take action here.
If you don't want to help, that is fine. No further comments are necessary.
sounds like your just right. i wouldnt like that if someone done that to me
I'm an idiot (I've been so tired lately). It is a netgear. My old Linksys died on me a couple of weeks ago and I had had it forever, so I guess I'm still referring to it. It is a Netgear router, but like I said - if it can't perform the required functions, I will spend money to get one that can.
Kevin
I actually did think about that, but then didn't because the IPs are dynamic. Therefore, all it would require is a simple /renew and she'd be back on. Static IPs are out of the question because it's easy to get around....This is so frustrating. I just wish I didn't have to do this..
I dont see a way of doing this unless she has her own laptop or something she brings round.
If she does, then its simple. In you LAN settings on your NETGEAR admin panel, change the IP range your DHCP can distribute to ***.***.*.2 - ***.***.*.4 (if you have 2 computers) then when she connects her's up an ip wont be given unless the lease has expired on one of your machines.
GENIUS! (Yes, she does bring her laptop..usually plugs in but sometime uses wireless..I've got the wireless blocked but not the wired)
I'll set reserved IPs for the 4 computers of the actual housemates..then I'll set the DHCP server to only give out those specific 4 IPs...so when she tries to connect, it will just sit in limbo forever...
I think that should do it.
Kevin
Personally I'd add a reservation for the laptops MAC address and null route as I suggested above, else you will end up with constant broadcast traffic from the laptop as it looks for an IP. In actual fact a reservation will probably not be required since a Windows box will always request the previous address when renewing a lease.
Could just be me but unnecessary broadcast traffic is my pet hate and I do everything to get rid of it.
But in all honesty, playing clever games with a router isn't going to solve your problem. You need to stand up to it.
Well, it was stood up to tonight. He resorted to violence. I have a fractured wrist and he has a broken nose.....
I just told him that if she's going to act like she lives here, she needs to help out - just a teency weency bit......He threw a punch..didn't connect..I threw a punch..twice...it hurt, but it got the point across...
I despise violence (but having boxing experience doesn't hurt)..UGH..so essentially nothing was accomplished tonight but having doctors bills... |
Q:
How to persist student online quiz data in case of power failure
I need a suggestion about a scenario. E.g. if a student is taking assessment quiz online from his home and during this quiz ...the elecricity failure happens in the middle of quiz. so in that scenario, how would we manage the state. I mean what could be the possible solution for that.. the solution can be in any form. Please give ur suggestions about how would you handle that situation. Previously, the states are being stored using sessions and cache.
Thanks in advance.
A:
Electricity failure on student's side
Your quiz probably flows from page to page where each page POSTs data to the server. You should just save posted data to some persistent medium (database would be best).
Identifying users after restart
Users are anonymous
If your users don't need to login before taking the quiz you have to identify them somehow. Give them a persistent cookie with some identifier that you use in your DB to store their answers, so if power goes down and when they come back you will still be able to know who they are, because cookie will be sent to you automatically. The problem here is of course what happens when multiple students use the same machine. You'd have to solve that too. The easiest way is to let your users login to your quiz app.
Users are logged in
This is the simple case where you simply save their answers along with their ID. It works similar to first example but with the difference, that you know who they are exactly (know their name etc.)
What if you have several quizzes?
If that's the case you probably don't want to create a separate table for each one to store answers in. Th best way in this case would be to have a single table schema:
UserID, QuizID, CurrentStep, Answers
-------------------------------------
This will give you all the information about where users are in the quiz (so you they can continue after power failure) and save answers as XML data. Current step may help you when quiz is a stepped process and users return to existing unfinished quiz. This will help you display the first unfinished step to them, so they can easily continue where they left.
This will give you enough possibilities to store several different quizzes in the same table. XML data can provide simple straightforward answers or branched ones. Depends what your quizzes are like.
What kind of DB should you choose?
You can either choose schematic database like MySql, Oracle or SQL Server or you can go with a document-oriented database that may be much more suited to your needs. Depending on the platform you use you will find a suitable doc-type DB.
Assessment based on pool of questions
As you say you have a pool of questions and I suspect a DB schema like this should support the business process. You'd have these tables:
Subject - this table is needed in case you'd have a centralized application for various study subjects
Group - has defined question groups and relates to Subject table; groups may be semester 1, semester 2 or similar; These groups will make it possible to select a set of assessment questions that are related to some subject and are part of the group that should be assessed
Question - this is the actual pool of questions; Every question has related data to table Group; this table could have additional metadata that would have information about question level which could count toward result question/answer points
Student - your students must most likely login into this application and as pointed out by several answerers here it's also recommended approach especially since I suspect students will be using common facility workstations which means that multiple students may be using the same computer
Assessment - this is one of the central tables, that holds data about students taking assessment test; it's related to Student table, has timestamp when assessment started etc.
AssessmentQuestion - a relational table that's used to record student's answers; When assessment starts an X number of records within this table are created, that actually point to particular questions that were selected for a student out of the appropriate question pool; it has at least three columns: StudentID, QuestionID and answer (nullable); additional columns are needed in case students are allowed to set an answer of don't know or similar; in this case an additional column AnswerState would be added and would relate to a lookup table with predefined states.
When a student starts an assessment and in the meantime a power failure occurs, you can always know which questions student already answered and which ones should still be answered.
You could also have additional tables with correct answers so assessment would be automated, giving results immediately after assessment questions are all completed.
Algorithm that chooses questions could be done in a way so questions are equally distributed on the long run.
But you could make the system even more complicated with even more administrative data that would automate as much tasks as possible and make them configurable so it would be more widely useful.
|
Who is the Colorado Criminal Justice Reform Coalition?
Our mission is to reverse the trend of mass incarceration in Colorado. We are a coalition of nearly 7,000 individual members and over 100 faith and community organizations who have united to stop perpetual prison expansion in Colorado through policy and sentence reform.
Our chief areas of interest include drug policy reform, women in prison, racial injustice, the impact of incarceration on children and families, the problems associated with re-entry and stopping the practice of using private prisons in our state.
Friday, January 19, 2007
Gov. Bill Ritter described prison costs as spiraling - "some would say spiraling out of control," he said in a meeting with the JBC on Tuesday. We know that they have been cutting other state budgets to cover the cost of prisons for years. It can't go on as CCJRC has been trying to point out over that same amount of time. Our last administration was disinclined to do anything about the crisis. However this governor and his staff seem to understand that defunding education and funding incarceration will give you exactly what you pay for. |
<h1>Listing game_ids</h1>
<table>
<thead>
<tr>
<th>Id</th>
<th></th>
<th></th>
<th></th>
</tr>
</thead>
<tbody>
<% @game_ids.each do |game_id| %>
<tr>
<td><%= game_id.id %></td>
<td><%= link_to 'Show', game_id %></td>
<td><%= link_to 'Edit', edit_game_id_path(game_id) %></td>
<td><%= link_to 'Destroy', game_id, method: :delete, data: { confirm: 'Are you sure?' } %></td>
</tr>
<% end %>
</tbody>
</table>
<br>
<%= link_to 'New Game', new_game_id_path %>
|
DMT Radial 2.0 Road Shoe 2013
Sorry - this product is no longer available
5360082726
DMT Radial 2.0 Road Shoe 2013
DMT
USD
Lightness and high tech performance characterise the Radial 2.0. Ideal for those looking for comfort, the 3 strap build adds a sure footing. The external counter adds an anatomical fit, while the New Carbon Sole makes this a lighter option.
Lightness and high tech performance characterise the Radial 2.0. Ideal for those looking for comfort, the 3 strap build adds a sure footing. The external counter adds an anatomical fit, while the New Carbon Sole makes this a lighter option.
Top Features of the DMT Radial 2.0 Road Shoe 2013
New Carbon Sole - Made from Toray MR60, a 9 layer construction with adjustable orientation
Product Data
Road:
Yes
Cleat Fitting - 3 Bolt Look Type:
Yes
Sole Material:
Carbon fibre
High Visibility:
No
New Carbon SoleThis sole is made from Toray MR60, a 40Ton High Modulus Carbon Fiber. The 9 layer construction has fibers which are orientated at 0, 45 and 90 degrees. The New Carbon also has a special reference table for the cleat positioning, allowing you to get the ideal fit on your shoe. A porous surface helps prevent wear from rough materials encountered on your ride.
External CounterThe external counter is designed to give anatomic support, providing a very high level of cycling stability and increasing the constraint of the heel. Anti-shock and Anti-slip keep your foot protected while you ride.
TongueAnatomic, padded and lined tongue for greater comfort in the riding position.
About Road Shoes
Road racing cycling shoes are designed without compromise to provide optimum power transfer between your foot and the pedal, a good quality road cycling shoe is a wise investment for performance and weight saving and is often overlooked. High-tech materials and precision manufacture keep weight down and stiffness up, this means your rotational mass is lower and power transfer is higher, resulting in more forward momentum for your effort.
About the DMT brand
DMT (Diamant) have been leaders in cycle footwear since 1978. Design and technology are the key goals of this company in developing high quality cycling shoes. Thanks to its experience, Diamant represents the main reference point for engineering and development for Nike, one of the giant companies in the global sportswear field.
37
38
39
40
40.5
41
41.5
42
42.5
43
43.5
44
44.5
45
45.5
46
47
48
49
50
EU Shoe Size
EU Shoe
37
38
39
40
40.5
41
41.5
42
42.5
43
43.5
44
44.5
45
45.5
46
47
48
49
50
UK Shoe Size
UK Shoe
4.5
5
6
6
6.5
7
7
7.5
8
8.5
9
9
9.5
10
10.5
11
12
12.5
13.5
14
US Men's Size
US Male Shoe
5
5.5
6.5
7.5
7.5
8
8
8.5
9
9.5
10
10
10.5
11
11.5
12
12.5
13.5
14.5
15
Centimeters
cm
23.5cm
24cm
24.5cm
25cm
25.3cm
26cm
26.3cm
26.6cm
26.9cm
27.5cm
27.8cm
28cm
28.3cm
29cm
29.3cm
30cm
30.6cm
31.3cm
32cm
32.6cm
37
38
39
40
40.5
41
41.5
42
42.5
43
43.5
44
44.5
45
45.5
46
47
48
49
50
EU Shoe Size
EU Shoe
37
38
39
40
40.5
41
41.5
42
42.5
43
43.5
44
44.5
45
45.5
46
47
48
49
50
UK Shoe Size
UK Shoe
4.5
5
6
6
6.5
7
7
7.5
8
8.5
9
9
9.5
10
10.5
11
12
12.5
13.5
14
US Men's Size
US Male Shoe
5
5.5
6.5
7.5
7.5
8
8
8.5
9
9.5
10
10
10.5
11
11.5
12
12.5
13.5
14.5
15
Centimeters
Delivery Information
We are sorry, but due to your delivery destination USA we can not dispatch this item.
International Delivery
Wiggle ships to over 100 countries. To see what delivery options are available for other destinations you can update your delivery destination via the International Options feature at the top right of the website.
Stunning shoe, shame about the fit
The shoes themselves are beautiful and are clearly well made. However, you definitely need to go a full size up in these. I am usually a size 12 which is what I went for but I would need the 13 really.
25 July 2013 |
const scopes = require('@commitlint/config-lerna-scopes')
const prefix = 'ps-design-system-'
module.exports = {
extends: ['@commitlint/config-conventional'],
rules: {
'scope-enum': ctx =>
scopes.rules['scope-enum'](ctx).then(([level, applicable, packages]) => [
level,
applicable,
packages
.map(pkg => (pkg.includes(prefix) ? pkg.replace(prefix, '') : pkg))
.concat(['examples', 'docs', 'scripts'])
])
}
}
|
Recurrent pancreatitis secondary to type V hyperlipidemia: report of one case.
With the exception of cystic fibrosis and hereditary pancreatitis, case reports about pancreatitis in children have rarely been mentioned. We report here an 11-year-old boy with type V hyperlipidemia, who suffered from two episodes of acute pancreatitis. Sudden onset of severe upper abdominal pain, fever, and hypertriglyceridemia were the common presentations. Initial treatments including analgesics, fasting, parenteral nutrition support and following diet control with medium-chain triglycerides seem to be successful in our case. |
Ben Chapman (footballer, born 1998)
Benjamin Scott Chapman (born 31 December 1998) is an English professional footballer who plays for Dulwich Hamlet as a central midfielder.
Club career
Born in Aylesford, Chapman had stints at Crystal Palace and Bearsted's youth setups before graduating with Gillingham. On 14 March 2017, he signed a professional deal with the club. He made his professional debut on 8 August 2017, coming on as a substitute for Jake Hessenthaler in a 2–0 away loss against Reading in the EFL Cup.
He was offered a new contract by Gillingham at the end of the 2018–19 season. However, Chapman moved to National League South side Dulwich Hamlet.
References
External links
Category:1998 births
Category:Living people
Category:Sportspeople from Aylesbury
Category:English footballers
Category:Association football midfielders
Category:English Football League players
Category:Gillingham F.C. players
Category:Dulwich Hamlet F.C. players |
South Africa thrash India by 141 runs in the 1st ODI
Indian cricket team crashed to a massive 141-run defeat to the hosts in the opening cricket one-dayer at Jo’burg
Johannesburg: Indian batsmen found the going tough against South Africa’s lethal pace attack as the team crashed to a massive 141-run defeat to the hosts in the opening cricket one-dayer here.
After hammering the Indian bowlers into submission with a massive score of 358 for four, the five-pronged South African pace attack came out all guns blazing to bowl out the visitors for 217 in 41 overs yesterday.
It was a thoroughly professional performance by South Africa as Indians were outplayed in all departments of the game to take a 1-0 lead in the three-match series.
This was the second biggest margin of victory by the South Africans against India in the ODIs played between the two teams.
Skipper Mahendra Singh Dhoni fought hard scoring 65 off 71 balls, including eight fours and a six, but most of the top-order batsmen found it difficult to counter the pace of Dale Steyn (3/25), bounce generated by Morne Morkel (1/29) and the controlled swing bowling by Ryan McLaren (3/49).
The South African attack once again exposed Indian batsmen’s inability to cope with pace, swing and bounce in adverse conditions after the trio of Quinton de Kock (135), AB De Villiers (77) and JP Duminy (59 no) pulverised the young Indian bowlers hitting them all around the park.
From the onset, Indian openers Rohit Sharma (18) and Shikhar Dhawan (12) found it difficult to score runs as Steyn and Morkel swung the ball making life difficult for the batsmen.
Rohit, in fact, played and missed a lot of deliveries before getting off the mark only in the 17th delivery that he faced.
Dhawan on the other hand hit three boundaries but when a Morkel delivery kicked up, the Delhi lad mistimed a pull-shot which was taken by wicketkeeper de Kock running backwards.
Rohit and Virat Kohli (31) batted for nearly 10 overs adding 46 runs in the process but Steyn and Morkel bowled with controlled aggression as they gave away very little.
Morkel was unlucky not to dismiss Kohli batting on two, when he got one to kick from short of good length but de Kock in his bid to engage in premature celebrations dropped the nick.
Kohli, in fact, took a blow on the rib cage but played some lovely drives including a forward defensive push off Steyn that raced through extra cover while another on-drive off the very next delivery also fetched him a boundary. |
Tuesday, November 8, 2016 is the day that Donald Trump was elected 45th President of the United States. Many people across the country believed that Hillary Clinton’s victory was all but inevitable, adding to the shock and surprise of this momentous event. Because of this, there has been a massive effort underway to try to understand how he could have won. One main school of thought is that Trump’s victory can be mostly contributed to right wing identity politics. The other is that there have been many people in the country who have struggled economically, have legitimate grievances with the current political establishment, and found Trump’s populist rhetoric very appealing.
I in no way would make the claim that right wing identity politics didn’t play a role in this election, and doing so would be foolish to say the least. However, not acknowledging the role that the rise in populist fervor played in Trump’s victory would be equally as foolish. There is plenty of circumstantial evidence to support this. Bernie Sanders received over 44% of the Democratic primary vote when facing Hillary Clinton, a mainstay in Democratic politics for the three decades. Now he is the most popular politician in the country according to most polls, including a Harvard-Harris poll released this past week. The Rust Belt, a part of the country that supported Bernie Sanders and Donald Trump in their respective primaries, was likely the part of the country that contributed to Hillary Clinton losing the electoral college.
When discussing the role that economics played in Trump’s win, the main rebuttal is that “The people who voted for Donald Trump never would have voted for a Democrat, regardless of who it was!” Well, that’s a hypothesis that can be scrutinized empirically by looking at election, demographic, and economic data. We can analyze the effect of the Obama to Trump voters, and more importantly, how right wing identity politics and poor economic outcomes contributed to this effect. With the proper data in hand, we can analyze the contributing factors to this shift.
The data I will be analyzing is county level data from both the 2012 and 2016 elections, as well as economic and demographic data from various points, from 2010-2016. I have data from all counties and equivalents not in Alaska. There are several measures that can approximate the support that moved from Obama in 2012 to Trump in 2016, but the one I will focus on I will call Trump’s “share shift”. This is devised from taking the percentage of votes from Donald Trump, and subtracting off Romney and independent and third-party votes. If we were to hold voting populations constant across the 2012 and 2016 elections, this would be the amount that remains would be the Obama voters that switched to Trump. Even though this is almost certainly not the case, it does describe how a county’s overall support moved from Obama in 2012 to Trump in 2016, and provides a good proxy for Obama to Trump voters.
I will be testing the following four indicators of poor economic outcomes:
1. Unemployment year annually from 2016
2. Unemployment change over the past 20 years.
3. Percent living below the poverty line in 2014
4. Loss in overall population from 2010-2014.
I will test these variables after controlling for white population, Hispanic population, the log of income, female population, population that are veterans, population density, change in voter participation from the 2012 election, and for state fixed effects. Sure enough, negative economic indicators contributed significantly to the shift in votes from Obama to Trump.
When running all four variables at once, they are all positively correlated with share shift, and are all significant with 97% confidence or higher. When each variable is regressed alone with the controls, they are all significant and positively correlated. The cross terms for 2016 unemployment and population loss were both positive and significant in their respective regressions. Furthermore poor economic outcomes are significant when dividing the population into certain subsets, like counties Obama won and the 500 top densely populated counties, and even remained when weighting each county by 2014 population[1].
The conclusion I have reached based on the empirical evidence? Negative economic indicators almost certainly contributed to people shifting away from Obama in 2012 to Trump in 2016, and Trump’s populism was almost certainly one of the factors that helped him win the election.
So how large was the impact of negative economic indicators on per county shift share of votes from Obama to Trump? 2.71% of the vote per county on average. You could say that this doesn’t control for the vastly different sizes in population, except this number only drops to 2.29% percent of the vote when you weight the counties by population, meaning it had a huge impact even when you control for population[2]. The bottom line is that while some of the country’s darker tendencies contributed significantly to Donald Trump being the 45th president of the United States, so too did negative economic outcomes for many voters, contributing in part to the anti-establishment and populist sentiments growing in popularity both here at home and abroad.
Note: If you have trouble reading the tables below, here is a link to the tables in a Word document. |
Q:
CSS' calc() in styled-components
Trying this:
const styledDiv = styled.div`
${props => props.takeViewportHeight && `min-height: calc(100vh-16px);`}
`
It's not working. Am I missing something about calc in styled components?
A:
A funny tip about CSS calc:
whitespaces are required between +/-
meaning:
const styledDiv = styled.div`
${props => props.takeViewportHeight && `min-height: calc(100vh - 16px);`}
`
should work
|
A police spokeswoman said McCarthy had hoped to display 25 weapons from among the more than 300 seized since Jan. 1 — but in fact the ones shown were from last year. Some dated from last summer, according to inventory tags on the weapons.
Reporters attending the news conference at the Gresham Police District station, 7808 S Halsted St., noticed the inventory tags, and McCarthy was asked about them. He said the guns weren’t the actual ones seized in 2013, but were “representative” of them.
"Well, you know what the point is? These are representative of what we're recovering today," McCarthy said. "The problem is that many of the guns we’re recovering today are arrest evidence, and we can't display them. So what we'll do is substitute one for the other. OK?"
Police spokeswoman Melissa Stratton said the department had intended to show this year's seizures, but the firearms weren't inventoried in time. The weapons shown "match the guns that we took off the street" in characteristics like maker and caliber, she said.
Despite having among the strictest gun laws in the nation, Chicago had more murders than the much more populous cities of New York and Los Angeles.
Statements made by commenters on this blog do not necessarily match the views of the web site owner--the comments are unmoderated. Not deleting a post deemed offensive by others does not mean an endorsement of that comment. Report any offensive comments to the above e-mail address. |
Inkjet printing has become a pervasive printing technology. Inkjet printing systems include one or more arrays of drop ejectors provided on an inkjet printing device, in which each drop ejector is actuated at times and locations where it is required to deposit a dot of ink on the recording medium to print the image. A drop ejector includes a pressurization chamber, a drop forming mechanism (such as a resistive heater) and a nozzle. In a thermal inkjet drop ejector, ink is supplied to the pressurization chamber. A resistive heater, formed for example as a patterned thin film, is at least partially enclosed within the pressurization chamber. When one or more electrical pulses of predetermined amplitude and duration are applied to the resistive heater, ink in contact with the resistive heater is vaporized to form a bubble. The bubble grows and causes a drop of ink to be ejected through a nozzle associated with the pressurization chamber. The ink vapor bubble either is vented through the nozzle or condenses within the pressurization chamber, depending upon the design of the drop ejector. Subsequently, additional ink fills the pressurization chamber and the drop ejector is ready to eject another drop of ink. Thermal inkjet printing devices, having several hundred or more drop ejectors per printing device, also typically include driver and logic electronics to facilitate electrical interconnection to the resistive heaters.
Thermal inkjet printing devices are typically fabricated as a plurality of die on a wafer. One or more die are packaged into an inkjet printhead, and the printhead is installed in an inkjet printer that includes one or more ink supplies, a pulse source, a controller, and an advance system for advancing recording medium relative to the inkjet printhead. The reliability, energy efficiency and drop volume uniformity associated with the inkjet printhead can depend upon the manufacturing variability of the resistive heaters from die to die and from wafer to wafer. In particular, as disclosed in U.S. Pat. No. 5,504,507, in determining the appropriate voltage amplitude and/or the pulse duration for the resistive heaters on a particular inkjet printhead, it is helpful to characterize the resistance of the resistive heaters on the one or more printhead die included in the printhead. As disclosed in U.S. Pat. No. 5,504,507, since the power transformed into heat by applying a voltage V to a resistive heater having a resistance R is V2/R, the higher the resistance R, the less power is available for generating heat to form the vapor bubble to eject the ink drop. As disclosed in U.S. Pat. No. 5,504,507, one or more resistive heaters on the printhead die can be tested and the test data can be encoded on the printhead die in electrically readable digital form. The data can be subsequently read in the printer and used to appropriately set the pulse amplitude and/or duration.
Typically in the printer, the voltage and/or pulse duration applied to the resistive heaters is somewhat larger than the “threshold” pulse conditions that are known to begin to eject drops of ink. For example, a pulse voltage can be set to be 10% higher than the threshold voltage. This higher voltage assures that drops are ejected even if resistances vary within the die, or if firing conditions vary (such as due to different amounts of voltage sag associated with parasitic resistances associated with firing more than one heater at a time, or firing heaters toward the center of the die as opposed to heaters nearer to the edge of the die). Although such an “overvoltage” is effective in assuring drop ejection, excessive overvoltage can result in overheating the resistive heaters, leading to premature heater burnout and lower energy efficiency. In addition, drop size uniformity from printhead to printhead can be related to the amount of energy dissipation in the resistive heaters.
Although measuring the resistance of the resistive heaters as disclosed in U.S. Pat. No. 5,504,507 provides an improved level of control of the appropriate pulsing conditions, it provides only an approximation. This is because what is more important in characterizing heating of the resistive heaters is the power density in the heater rather than the power itself. The power density in the heater is the power P dissipated in the heater divided by the area A of the heater. For a rectangular heater having a length L, a width W, a thickness t and a resistivity ρ, R=ρL/Wt, and A=LW. Therefore the power density in the resistive heater is given by:P/A=(V2/R)/LW=V2t/ρL2=V2/ρsL (1),where ρs=ρ/t is the sheet resistivity of the resistive heater material. Due to manufacturing variability, ρs can vary due to both chemical composition and thickness of the deposited resistive heater material. The length L of the resistive heater can also vary, for example due to variation in the placement of the edges of metal electrodes contacting the resistive heater, due to variation in etching processes for example.
Therefore, what is needed for improved control of the appropriate level of pulse amplitude and/or duration for a particular printhead die, as well as for improved manufacturing control of printhead wafers, is improved test structures that are capable of determining the actual sheet resistivity ρs, the actual length L, and optionally the actual width W of the resistive heaters on a printhead die. |
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
var DivisionService = function($http, ENV, locationUtils, messageModel) {
this.getDivisions = function(queryParams) {
return $http.get(ENV.api['root'] + 'divisions', {params: queryParams}).then(
function(result) {
return result.data.response;
},
function(err) {
throw err;
}
);
};
this.getDivision = function(id) {
return $http.get(ENV.api['root'] + 'divisions', {params: {id: id}}).then(
function(result) {
return result.data.response[0];
},
function(err) {
throw err;
}
);
};
this.createDivision = function(division) {
return $http.post(ENV.api['root'] + 'divisions', division).then(
function(result) {
messageModel.setMessages(result.data.alerts, true);
locationUtils.navigateToPath('/divisions');
return result;
},
function(err) {
messageModel.setMessages(err.data.alerts, false);
throw err;
}
);
};
// todo: change to use query param when it is supported
this.updateDivision = function(division) {
return $http.put(ENV.api['root'] + 'divisions/' + division.id, division).then(
function(result) {
messageModel.setMessages(result.data.alerts, false);
return result; },
function(err) {
messageModel.setMessages(err.data.alerts, false);
throw err;
}
);
};
// todo: change to use query param when it is supported
this.deleteDivision = function(id) {
return $http.delete(ENV.api['root'] + 'divisions/' + id).then(
function(result) {
messageModel.setMessages(result.data.alerts, true);
return result;
},
function(err) {
messageModel.setMessages(err.data.alerts, false);
throw err;
}
);
};
};
DivisionService.$inject = ['$http', 'ENV', 'locationUtils', 'messageModel'];
module.exports = DivisionService;
|
Long-term outcomes of stent placement for symptomatic nonthrombotic iliac vein compression lesions in chronic venous disease.
To assess the clinical and patency results of stent placement for the management of symptomatic nonthrombotic iliac vein compression lesions (NIVCLs) in chronic venous disease (CVD). A retrospective analysis of patients with CVD was conducted at a single institution from January 2000 to May 2010. In 2,093 patients with CVD, venous computed tomography (CT) angiography or transfemoral venography was selectively performed in patients with severe symptoms and in patients with symptom recurrence after endovenous laser ablation (EVLA) for superficial venous insufficiency in the left lower extremity. NIVCLs were found in 297 patients (41 NIVCLs were found in 74 patients whose symptoms recurred after EVLA for superficial venous insufficiency). In 205 patients, NIVCLs were successfully treated with stent placement. Among these 205 patients, 117 patients (132 limbs) with associated superficial reflux were treated by EVLA for superficial venous insufficiency. Quality of life and the severity of venous disorders were evaluated by questionnaire and clinical examination before and after treatment. Patency was evaluated by duplex Doppler ultrasound. A total of 227 stents were placed in 205 patients (224 limbs; median age, 50.53 years). The rate of technical success was 100%. Three limbs were treated with two stents because of proximal migration of the incipient stent. Follow-up periods ranged from 1-117 months (mean 50 months ± 36). The primary and assisted-primary cumulative patency rates at a mean of 4 years were 98.7% and 100%. The cumulative edema relief rate was 89.1% (156 of 175), and the healing rate for active ulcers was 82.3% (51 of 62). The pain level (using a visual analogue scale from 0-10) declined from a median level of 4.3 before the procedure to 0.4 after the procedure. Quality of life improved significantly after intervention. Complications were minor and improved quickly. Venous stent placement is an effective and durable treatment for NIVCL, with long-term high patency and results in significant relief of the major symptoms of CVD. NIVCL is an important reason for symptom recurrence after left lower extremity varicose vein surgery. |
A Smart Way to Trim the Fat From the Federal Government
Last week President Trump proposed merging the departments of Education and Labor, and that’s got people thinking about reorganizing government. |
Degenerative Mitral Stenosis: From Pathophysiology to Challenging Interventional Treatment.
Mitral stenosis (MS) is characterized by obstruction of left ventricular inflow as a result of narrowing of the mitral valve orifice. Although its prevalence has declined over the last decade, especially in developed countries, it remains an important cause of morbidity and mortality. The most often cause of MS worldwide is still postrheumatic mitral valve disease. However, in developed countries, degenerative or calcific changes cause MS in a siginificant proportion of patients. Although the range of treatment for mitral valve disease has grown over the years in parallel with transcatheter therapies for aortic valve disease, these improvements in mitral valve disease therapy have experienced slower development. This is mainly due to the more complex anatomy of the mitral valve and entire mitral apparatus, and the interplay of the mitral valve with the left ventricle which hinders the development of effective implantable mitral valve devices. This is especially the case with degenerative MS where percutaneous or surgical comissurotomy is rarely employed due to the presence of extensive annular calcification and at the base of leaflets, without associated commissural fusion. However, the last few years have witnessed innovations in transcatheter interventional procedures for degenerative MS which consequently hinted that in the future, transcatheter mitral valve replacement could be the treatment of choice for these patients. |
Q:
What exactly does (&:id) do in Product.all.map(&:id)
Here's the line of code I'm trying to wrap my head around:
Category.all.map(&:id).each { |id| Category.reset_counters(id, :products) }
Hoping someone can help me understand what (&:id) is doing and how it impacts the rest of the line? I believe it turns the symbol :id into a proc that'll respond to id?!? But then it gets confusing...
Thanks in advance!
A:
Category.all.map(&:id)
is shorthand for
Category.all.map { |a| a.id }
as for how it affects the rest of the line, the above section returns all id values as a single Array. This Array of ids is then passed into another call to each, which iteratively passes each id into reset_counters.
|
The animals under the care of Lagoon Amusement Park (Farmington, UT) look sickly and unhealthy. Lagoon provides plenty of amusement with rides, games, etc without having to imprison animals for entertainment of humans.
Lagoon Corporation has failed to meet minimal federal standards for the care of animals used in exhibitions as established in the Animal Welfare Act (AWA). The U.S. Department of Agriculture (USDA) has cited Lagoon Corporation numerous times for failure to provide veterinary care to sick and dying animals, filthy enclosures, inadequately trained employees, and failure to provide animals with adequate space.
There has been over 18 violations of the Animal Welfare Act given by the USDA. *See http://bit.ly/zUS1nq for USDA reports on the Animal Welfare Act violations.
Other occurences not recorded:
• The conductor of the Wild Kingdom Train blew hot steam into Tippy-the-bears face resulting in second degree burns.
• Children throwing rocks and other trash at the animals.
HOW CAN YOU HELP?
1) "Like" the Facebook page and share with your friends! Visit: http://LagoonSucks.com
2) Let Lagoon know what you think of their actions by posting on their Facebook page (must "Like" to post. be sure to "Unlike" after posting), and emailing or calling them directly.
Facebook Page: https://www.facebook.com/lagoonpark
Phone: (801) 451-8060
Email: market@lagoonpark.com
See also: LagoonAbusesAnimals.com for more info |
Moyamoya disease of adult onset brain stem haemorrhage associated with bilateral occlusion of the vertebral arteries--case report.
An unusual and first case of moyamoya disease of adult onset brain stem haemorrhage associated with occlusion of both vertebral arteries is reported. A 30-year-old man suddenly suffered from dyspnea, dysphagia, and left-sided hemisensory disturbance. Computed tomography and magnetic resonance imaging revealed a fresh haematoma in the left medulla oblongata and various-sized old infarcts in both parietal lobes. Cerebral angiograms disclosed occlusion of the bilateral internal carotid arteries on both sides at their intracranial portion, accompanied with the developed basal moyamoya vessels. The right vertebral artery occluded at its V2-V3 segment, in which the posterior inferior cerebellar artery was opacified via the posterior spinal artery, and the basilar artery was filled from the anterior spinal artery. The left vertebral artery was also occluded at the craniovertebral junction (V4) with collateral flow. Only one case of moyamoya disease associated with bilateral occlusion of the vertebral artery has been reported previously, and a haemorrhage into the medulla oblongata in moyamoya disease has never been described. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.