text
stringlengths
1
3.78M
meta
dict
// go run mksyscall.go -l32 -openbsd -arm -tags openbsd,arm syscall_bsd.go syscall_openbsd.go syscall_openbsd_arm.go // Code generated by the command above; see README.md. DO NOT EDIT. // +build openbsd,arm package unix import ( "syscall" "unsafe" ) var _ syscall.Errno // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func getgroups(ngid int, gid *_Gid_t) (n int, err error) { r0, _, e1 := RawSyscall(SYS_GETGROUPS, uintptr(ngid), uintptr(unsafe.Pointer(gid)), 0) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func setgroups(ngid int, gid *_Gid_t) (err error) { _, _, e1 := RawSyscall(SYS_SETGROUPS, uintptr(ngid), uintptr(unsafe.Pointer(gid)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func wait4(pid int, wstatus *_C_int, options int, rusage *Rusage) (wpid int, err error) { r0, _, e1 := Syscall6(SYS_WAIT4, uintptr(pid), uintptr(unsafe.Pointer(wstatus)), uintptr(options), uintptr(unsafe.Pointer(rusage)), 0, 0) wpid = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func accept(s int, rsa *RawSockaddrAny, addrlen *_Socklen) (fd int, err error) { r0, _, e1 := Syscall(SYS_ACCEPT, uintptr(s), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen))) fd = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func bind(s int, addr unsafe.Pointer, addrlen _Socklen) (err error) { _, _, e1 := Syscall(SYS_BIND, uintptr(s), uintptr(addr), uintptr(addrlen)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func connect(s int, addr unsafe.Pointer, addrlen _Socklen) (err error) { _, _, e1 := Syscall(SYS_CONNECT, uintptr(s), uintptr(addr), uintptr(addrlen)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func socket(domain int, typ int, proto int) (fd int, err error) { r0, _, e1 := RawSyscall(SYS_SOCKET, uintptr(domain), uintptr(typ), uintptr(proto)) fd = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func getsockopt(s int, level int, name int, val unsafe.Pointer, vallen *_Socklen) (err error) { _, _, e1 := Syscall6(SYS_GETSOCKOPT, uintptr(s), uintptr(level), uintptr(name), uintptr(val), uintptr(unsafe.Pointer(vallen)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func setsockopt(s int, level int, name int, val unsafe.Pointer, vallen uintptr) (err error) { _, _, e1 := Syscall6(SYS_SETSOCKOPT, uintptr(s), uintptr(level), uintptr(name), uintptr(val), uintptr(vallen), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func getpeername(fd int, rsa *RawSockaddrAny, addrlen *_Socklen) (err error) { _, _, e1 := RawSyscall(SYS_GETPEERNAME, uintptr(fd), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen))) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func getsockname(fd int, rsa *RawSockaddrAny, addrlen *_Socklen) (err error) { _, _, e1 := RawSyscall(SYS_GETSOCKNAME, uintptr(fd), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen))) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Shutdown(s int, how int) (err error) { _, _, e1 := Syscall(SYS_SHUTDOWN, uintptr(s), uintptr(how), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func socketpair(domain int, typ int, proto int, fd *[2]int32) (err error) { _, _, e1 := RawSyscall6(SYS_SOCKETPAIR, uintptr(domain), uintptr(typ), uintptr(proto), uintptr(unsafe.Pointer(fd)), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func recvfrom(fd int, p []byte, flags int, from *RawSockaddrAny, fromlen *_Socklen) (n int, err error) { var _p0 unsafe.Pointer if len(p) > 0 { _p0 = unsafe.Pointer(&p[0]) } else { _p0 = unsafe.Pointer(&_zero) } r0, _, e1 := Syscall6(SYS_RECVFROM, uintptr(fd), uintptr(_p0), uintptr(len(p)), uintptr(flags), uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(fromlen))) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func sendto(s int, buf []byte, flags int, to unsafe.Pointer, addrlen _Socklen) (err error) { var _p0 unsafe.Pointer if len(buf) > 0 { _p0 = unsafe.Pointer(&buf[0]) } else { _p0 = unsafe.Pointer(&_zero) } _, _, e1 := Syscall6(SYS_SENDTO, uintptr(s), uintptr(_p0), uintptr(len(buf)), uintptr(flags), uintptr(to), uintptr(addrlen)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func recvmsg(s int, msg *Msghdr, flags int) (n int, err error) { r0, _, e1 := Syscall(SYS_RECVMSG, uintptr(s), uintptr(unsafe.Pointer(msg)), uintptr(flags)) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func sendmsg(s int, msg *Msghdr, flags int) (n int, err error) { r0, _, e1 := Syscall(SYS_SENDMSG, uintptr(s), uintptr(unsafe.Pointer(msg)), uintptr(flags)) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func kevent(kq int, change unsafe.Pointer, nchange int, event unsafe.Pointer, nevent int, timeout *Timespec) (n int, err error) { r0, _, e1 := Syscall6(SYS_KEVENT, uintptr(kq), uintptr(change), uintptr(nchange), uintptr(event), uintptr(nevent), uintptr(unsafe.Pointer(timeout))) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func utimes(path string, timeval *[2]Timeval) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_UTIMES, uintptr(unsafe.Pointer(_p0)), uintptr(unsafe.Pointer(timeval)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func futimes(fd int, timeval *[2]Timeval) (err error) { _, _, e1 := Syscall(SYS_FUTIMES, uintptr(fd), uintptr(unsafe.Pointer(timeval)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func poll(fds *PollFd, nfds int, timeout int) (n int, err error) { r0, _, e1 := Syscall(SYS_POLL, uintptr(unsafe.Pointer(fds)), uintptr(nfds), uintptr(timeout)) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Madvise(b []byte, behav int) (err error) { var _p0 unsafe.Pointer if len(b) > 0 { _p0 = unsafe.Pointer(&b[0]) } else { _p0 = unsafe.Pointer(&_zero) } _, _, e1 := Syscall(SYS_MADVISE, uintptr(_p0), uintptr(len(b)), uintptr(behav)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Mlock(b []byte) (err error) { var _p0 unsafe.Pointer if len(b) > 0 { _p0 = unsafe.Pointer(&b[0]) } else { _p0 = unsafe.Pointer(&_zero) } _, _, e1 := Syscall(SYS_MLOCK, uintptr(_p0), uintptr(len(b)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Mlockall(flags int) (err error) { _, _, e1 := Syscall(SYS_MLOCKALL, uintptr(flags), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Mprotect(b []byte, prot int) (err error) { var _p0 unsafe.Pointer if len(b) > 0 { _p0 = unsafe.Pointer(&b[0]) } else { _p0 = unsafe.Pointer(&_zero) } _, _, e1 := Syscall(SYS_MPROTECT, uintptr(_p0), uintptr(len(b)), uintptr(prot)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Msync(b []byte, flags int) (err error) { var _p0 unsafe.Pointer if len(b) > 0 { _p0 = unsafe.Pointer(&b[0]) } else { _p0 = unsafe.Pointer(&_zero) } _, _, e1 := Syscall(SYS_MSYNC, uintptr(_p0), uintptr(len(b)), uintptr(flags)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Munlock(b []byte) (err error) { var _p0 unsafe.Pointer if len(b) > 0 { _p0 = unsafe.Pointer(&b[0]) } else { _p0 = unsafe.Pointer(&_zero) } _, _, e1 := Syscall(SYS_MUNLOCK, uintptr(_p0), uintptr(len(b)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Munlockall() (err error) { _, _, e1 := Syscall(SYS_MUNLOCKALL, 0, 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func pipe2(p *[2]_C_int, flags int) (err error) { _, _, e1 := RawSyscall(SYS_PIPE2, uintptr(unsafe.Pointer(p)), uintptr(flags), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getdents(fd int, buf []byte) (n int, err error) { var _p0 unsafe.Pointer if len(buf) > 0 { _p0 = unsafe.Pointer(&buf[0]) } else { _p0 = unsafe.Pointer(&_zero) } r0, _, e1 := Syscall(SYS_GETDENTS, uintptr(fd), uintptr(_p0), uintptr(len(buf))) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getcwd(buf []byte) (n int, err error) { var _p0 unsafe.Pointer if len(buf) > 0 { _p0 = unsafe.Pointer(&buf[0]) } else { _p0 = unsafe.Pointer(&_zero) } r0, _, e1 := Syscall(SYS___GETCWD, uintptr(_p0), uintptr(len(buf)), 0) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func ioctl(fd int, req uint, arg uintptr) (err error) { _, _, e1 := Syscall(SYS_IOCTL, uintptr(fd), uintptr(req), uintptr(arg)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func sysctl(mib []_C_int, old *byte, oldlen *uintptr, new *byte, newlen uintptr) (err error) { var _p0 unsafe.Pointer if len(mib) > 0 { _p0 = unsafe.Pointer(&mib[0]) } else { _p0 = unsafe.Pointer(&_zero) } _, _, e1 := Syscall6(SYS___SYSCTL, uintptr(_p0), uintptr(len(mib)), uintptr(unsafe.Pointer(old)), uintptr(unsafe.Pointer(oldlen)), uintptr(unsafe.Pointer(new)), uintptr(newlen)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func ppoll(fds *PollFd, nfds int, timeout *Timespec, sigmask *Sigset_t) (n int, err error) { r0, _, e1 := Syscall6(SYS_PPOLL, uintptr(unsafe.Pointer(fds)), uintptr(nfds), uintptr(unsafe.Pointer(timeout)), uintptr(unsafe.Pointer(sigmask)), 0, 0) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Access(path string, mode uint32) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_ACCESS, uintptr(unsafe.Pointer(_p0)), uintptr(mode), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Adjtime(delta *Timeval, olddelta *Timeval) (err error) { _, _, e1 := Syscall(SYS_ADJTIME, uintptr(unsafe.Pointer(delta)), uintptr(unsafe.Pointer(olddelta)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Chdir(path string) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_CHDIR, uintptr(unsafe.Pointer(_p0)), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Chflags(path string, flags int) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_CHFLAGS, uintptr(unsafe.Pointer(_p0)), uintptr(flags), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Chmod(path string, mode uint32) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_CHMOD, uintptr(unsafe.Pointer(_p0)), uintptr(mode), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Chown(path string, uid int, gid int) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_CHOWN, uintptr(unsafe.Pointer(_p0)), uintptr(uid), uintptr(gid)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Chroot(path string) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_CHROOT, uintptr(unsafe.Pointer(_p0)), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Close(fd int) (err error) { _, _, e1 := Syscall(SYS_CLOSE, uintptr(fd), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Dup(fd int) (nfd int, err error) { r0, _, e1 := Syscall(SYS_DUP, uintptr(fd), 0, 0) nfd = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Dup2(from int, to int) (err error) { _, _, e1 := Syscall(SYS_DUP2, uintptr(from), uintptr(to), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Dup3(from int, to int, flags int) (err error) { _, _, e1 := Syscall(SYS_DUP3, uintptr(from), uintptr(to), uintptr(flags)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Exit(code int) { Syscall(SYS_EXIT, uintptr(code), 0, 0) return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Faccessat(dirfd int, path string, mode uint32, flags int) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall6(SYS_FACCESSAT, uintptr(dirfd), uintptr(unsafe.Pointer(_p0)), uintptr(mode), uintptr(flags), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Fchdir(fd int) (err error) { _, _, e1 := Syscall(SYS_FCHDIR, uintptr(fd), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Fchflags(fd int, flags int) (err error) { _, _, e1 := Syscall(SYS_FCHFLAGS, uintptr(fd), uintptr(flags), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Fchmod(fd int, mode uint32) (err error) { _, _, e1 := Syscall(SYS_FCHMOD, uintptr(fd), uintptr(mode), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Fchmodat(dirfd int, path string, mode uint32, flags int) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall6(SYS_FCHMODAT, uintptr(dirfd), uintptr(unsafe.Pointer(_p0)), uintptr(mode), uintptr(flags), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Fchown(fd int, uid int, gid int) (err error) { _, _, e1 := Syscall(SYS_FCHOWN, uintptr(fd), uintptr(uid), uintptr(gid)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Fchownat(dirfd int, path string, uid int, gid int, flags int) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall6(SYS_FCHOWNAT, uintptr(dirfd), uintptr(unsafe.Pointer(_p0)), uintptr(uid), uintptr(gid), uintptr(flags), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Flock(fd int, how int) (err error) { _, _, e1 := Syscall(SYS_FLOCK, uintptr(fd), uintptr(how), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Fpathconf(fd int, name int) (val int, err error) { r0, _, e1 := Syscall(SYS_FPATHCONF, uintptr(fd), uintptr(name), 0) val = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Fstat(fd int, stat *Stat_t) (err error) { _, _, e1 := Syscall(SYS_FSTAT, uintptr(fd), uintptr(unsafe.Pointer(stat)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Fstatat(fd int, path string, stat *Stat_t, flags int) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall6(SYS_FSTATAT, uintptr(fd), uintptr(unsafe.Pointer(_p0)), uintptr(unsafe.Pointer(stat)), uintptr(flags), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Fstatfs(fd int, stat *Statfs_t) (err error) { _, _, e1 := Syscall(SYS_FSTATFS, uintptr(fd), uintptr(unsafe.Pointer(stat)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Fsync(fd int) (err error) { _, _, e1 := Syscall(SYS_FSYNC, uintptr(fd), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Ftruncate(fd int, length int64) (err error) { _, _, e1 := Syscall6(SYS_FTRUNCATE, uintptr(fd), 0, uintptr(length), uintptr(length>>32), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getegid() (egid int) { r0, _, _ := RawSyscall(SYS_GETEGID, 0, 0, 0) egid = int(r0) return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Geteuid() (uid int) { r0, _, _ := RawSyscall(SYS_GETEUID, 0, 0, 0) uid = int(r0) return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getgid() (gid int) { r0, _, _ := RawSyscall(SYS_GETGID, 0, 0, 0) gid = int(r0) return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getpgid(pid int) (pgid int, err error) { r0, _, e1 := RawSyscall(SYS_GETPGID, uintptr(pid), 0, 0) pgid = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getpgrp() (pgrp int) { r0, _, _ := RawSyscall(SYS_GETPGRP, 0, 0, 0) pgrp = int(r0) return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getpid() (pid int) { r0, _, _ := RawSyscall(SYS_GETPID, 0, 0, 0) pid = int(r0) return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getppid() (ppid int) { r0, _, _ := RawSyscall(SYS_GETPPID, 0, 0, 0) ppid = int(r0) return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getpriority(which int, who int) (prio int, err error) { r0, _, e1 := Syscall(SYS_GETPRIORITY, uintptr(which), uintptr(who), 0) prio = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getrlimit(which int, lim *Rlimit) (err error) { _, _, e1 := RawSyscall(SYS_GETRLIMIT, uintptr(which), uintptr(unsafe.Pointer(lim)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getrtable() (rtable int, err error) { r0, _, e1 := RawSyscall(SYS_GETRTABLE, 0, 0, 0) rtable = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getrusage(who int, rusage *Rusage) (err error) { _, _, e1 := RawSyscall(SYS_GETRUSAGE, uintptr(who), uintptr(unsafe.Pointer(rusage)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getsid(pid int) (sid int, err error) { r0, _, e1 := RawSyscall(SYS_GETSID, uintptr(pid), 0, 0) sid = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Gettimeofday(tv *Timeval) (err error) { _, _, e1 := RawSyscall(SYS_GETTIMEOFDAY, uintptr(unsafe.Pointer(tv)), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Getuid() (uid int) { r0, _, _ := RawSyscall(SYS_GETUID, 0, 0, 0) uid = int(r0) return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Issetugid() (tainted bool) { r0, _, _ := Syscall(SYS_ISSETUGID, 0, 0, 0) tainted = bool(r0 != 0) return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Kill(pid int, signum syscall.Signal) (err error) { _, _, e1 := Syscall(SYS_KILL, uintptr(pid), uintptr(signum), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Kqueue() (fd int, err error) { r0, _, e1 := Syscall(SYS_KQUEUE, 0, 0, 0) fd = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Lchown(path string, uid int, gid int) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_LCHOWN, uintptr(unsafe.Pointer(_p0)), uintptr(uid), uintptr(gid)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Link(path string, link string) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } var _p1 *byte _p1, err = BytePtrFromString(link) if err != nil { return } _, _, e1 := Syscall(SYS_LINK, uintptr(unsafe.Pointer(_p0)), uintptr(unsafe.Pointer(_p1)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Linkat(pathfd int, path string, linkfd int, link string, flags int) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } var _p1 *byte _p1, err = BytePtrFromString(link) if err != nil { return } _, _, e1 := Syscall6(SYS_LINKAT, uintptr(pathfd), uintptr(unsafe.Pointer(_p0)), uintptr(linkfd), uintptr(unsafe.Pointer(_p1)), uintptr(flags), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Listen(s int, backlog int) (err error) { _, _, e1 := Syscall(SYS_LISTEN, uintptr(s), uintptr(backlog), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Lstat(path string, stat *Stat_t) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_LSTAT, uintptr(unsafe.Pointer(_p0)), uintptr(unsafe.Pointer(stat)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Mkdir(path string, mode uint32) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_MKDIR, uintptr(unsafe.Pointer(_p0)), uintptr(mode), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Mkdirat(dirfd int, path string, mode uint32) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_MKDIRAT, uintptr(dirfd), uintptr(unsafe.Pointer(_p0)), uintptr(mode)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Mkfifo(path string, mode uint32) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_MKFIFO, uintptr(unsafe.Pointer(_p0)), uintptr(mode), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Mkfifoat(dirfd int, path string, mode uint32) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_MKFIFOAT, uintptr(dirfd), uintptr(unsafe.Pointer(_p0)), uintptr(mode)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Mknod(path string, mode uint32, dev int) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_MKNOD, uintptr(unsafe.Pointer(_p0)), uintptr(mode), uintptr(dev)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Mknodat(dirfd int, path string, mode uint32, dev int) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall6(SYS_MKNODAT, uintptr(dirfd), uintptr(unsafe.Pointer(_p0)), uintptr(mode), uintptr(dev), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Nanosleep(time *Timespec, leftover *Timespec) (err error) { _, _, e1 := Syscall(SYS_NANOSLEEP, uintptr(unsafe.Pointer(time)), uintptr(unsafe.Pointer(leftover)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Open(path string, mode int, perm uint32) (fd int, err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } r0, _, e1 := Syscall(SYS_OPEN, uintptr(unsafe.Pointer(_p0)), uintptr(mode), uintptr(perm)) fd = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Openat(dirfd int, path string, mode int, perm uint32) (fd int, err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } r0, _, e1 := Syscall6(SYS_OPENAT, uintptr(dirfd), uintptr(unsafe.Pointer(_p0)), uintptr(mode), uintptr(perm), 0, 0) fd = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Pathconf(path string, name int) (val int, err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } r0, _, e1 := Syscall(SYS_PATHCONF, uintptr(unsafe.Pointer(_p0)), uintptr(name), 0) val = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Pread(fd int, p []byte, offset int64) (n int, err error) { var _p0 unsafe.Pointer if len(p) > 0 { _p0 = unsafe.Pointer(&p[0]) } else { _p0 = unsafe.Pointer(&_zero) } r0, _, e1 := Syscall6(SYS_PREAD, uintptr(fd), uintptr(_p0), uintptr(len(p)), 0, uintptr(offset), uintptr(offset>>32)) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Pwrite(fd int, p []byte, offset int64) (n int, err error) { var _p0 unsafe.Pointer if len(p) > 0 { _p0 = unsafe.Pointer(&p[0]) } else { _p0 = unsafe.Pointer(&_zero) } r0, _, e1 := Syscall6(SYS_PWRITE, uintptr(fd), uintptr(_p0), uintptr(len(p)), 0, uintptr(offset), uintptr(offset>>32)) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func read(fd int, p []byte) (n int, err error) { var _p0 unsafe.Pointer if len(p) > 0 { _p0 = unsafe.Pointer(&p[0]) } else { _p0 = unsafe.Pointer(&_zero) } r0, _, e1 := Syscall(SYS_READ, uintptr(fd), uintptr(_p0), uintptr(len(p))) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Readlink(path string, buf []byte) (n int, err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } var _p1 unsafe.Pointer if len(buf) > 0 { _p1 = unsafe.Pointer(&buf[0]) } else { _p1 = unsafe.Pointer(&_zero) } r0, _, e1 := Syscall(SYS_READLINK, uintptr(unsafe.Pointer(_p0)), uintptr(_p1), uintptr(len(buf))) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Readlinkat(dirfd int, path string, buf []byte) (n int, err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } var _p1 unsafe.Pointer if len(buf) > 0 { _p1 = unsafe.Pointer(&buf[0]) } else { _p1 = unsafe.Pointer(&_zero) } r0, _, e1 := Syscall6(SYS_READLINKAT, uintptr(dirfd), uintptr(unsafe.Pointer(_p0)), uintptr(_p1), uintptr(len(buf)), 0, 0) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Rename(from string, to string) (err error) { var _p0 *byte _p0, err = BytePtrFromString(from) if err != nil { return } var _p1 *byte _p1, err = BytePtrFromString(to) if err != nil { return } _, _, e1 := Syscall(SYS_RENAME, uintptr(unsafe.Pointer(_p0)), uintptr(unsafe.Pointer(_p1)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Renameat(fromfd int, from string, tofd int, to string) (err error) { var _p0 *byte _p0, err = BytePtrFromString(from) if err != nil { return } var _p1 *byte _p1, err = BytePtrFromString(to) if err != nil { return } _, _, e1 := Syscall6(SYS_RENAMEAT, uintptr(fromfd), uintptr(unsafe.Pointer(_p0)), uintptr(tofd), uintptr(unsafe.Pointer(_p1)), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Revoke(path string) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_REVOKE, uintptr(unsafe.Pointer(_p0)), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Rmdir(path string) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_RMDIR, uintptr(unsafe.Pointer(_p0)), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Seek(fd int, offset int64, whence int) (newoffset int64, err error) { r0, r1, e1 := Syscall6(SYS_LSEEK, uintptr(fd), 0, uintptr(offset), uintptr(offset>>32), uintptr(whence), 0) newoffset = int64(int64(r1)<<32 | int64(r0)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Select(nfd int, r *FdSet, w *FdSet, e *FdSet, timeout *Timeval) (n int, err error) { r0, _, e1 := Syscall6(SYS_SELECT, uintptr(nfd), uintptr(unsafe.Pointer(r)), uintptr(unsafe.Pointer(w)), uintptr(unsafe.Pointer(e)), uintptr(unsafe.Pointer(timeout)), 0) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Setegid(egid int) (err error) { _, _, e1 := RawSyscall(SYS_SETEGID, uintptr(egid), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Seteuid(euid int) (err error) { _, _, e1 := RawSyscall(SYS_SETEUID, uintptr(euid), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Setgid(gid int) (err error) { _, _, e1 := RawSyscall(SYS_SETGID, uintptr(gid), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Setlogin(name string) (err error) { var _p0 *byte _p0, err = BytePtrFromString(name) if err != nil { return } _, _, e1 := Syscall(SYS_SETLOGIN, uintptr(unsafe.Pointer(_p0)), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Setpgid(pid int, pgid int) (err error) { _, _, e1 := RawSyscall(SYS_SETPGID, uintptr(pid), uintptr(pgid), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Setpriority(which int, who int, prio int) (err error) { _, _, e1 := Syscall(SYS_SETPRIORITY, uintptr(which), uintptr(who), uintptr(prio)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Setregid(rgid int, egid int) (err error) { _, _, e1 := RawSyscall(SYS_SETREGID, uintptr(rgid), uintptr(egid), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Setreuid(ruid int, euid int) (err error) { _, _, e1 := RawSyscall(SYS_SETREUID, uintptr(ruid), uintptr(euid), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Setresgid(rgid int, egid int, sgid int) (err error) { _, _, e1 := RawSyscall(SYS_SETRESGID, uintptr(rgid), uintptr(egid), uintptr(sgid)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Setresuid(ruid int, euid int, suid int) (err error) { _, _, e1 := RawSyscall(SYS_SETRESUID, uintptr(ruid), uintptr(euid), uintptr(suid)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Setrlimit(which int, lim *Rlimit) (err error) { _, _, e1 := RawSyscall(SYS_SETRLIMIT, uintptr(which), uintptr(unsafe.Pointer(lim)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Setrtable(rtable int) (err error) { _, _, e1 := RawSyscall(SYS_SETRTABLE, uintptr(rtable), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Setsid() (pid int, err error) { r0, _, e1 := RawSyscall(SYS_SETSID, 0, 0, 0) pid = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Settimeofday(tp *Timeval) (err error) { _, _, e1 := RawSyscall(SYS_SETTIMEOFDAY, uintptr(unsafe.Pointer(tp)), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Setuid(uid int) (err error) { _, _, e1 := RawSyscall(SYS_SETUID, uintptr(uid), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Stat(path string, stat *Stat_t) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_STAT, uintptr(unsafe.Pointer(_p0)), uintptr(unsafe.Pointer(stat)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Statfs(path string, stat *Statfs_t) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_STATFS, uintptr(unsafe.Pointer(_p0)), uintptr(unsafe.Pointer(stat)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Symlink(path string, link string) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } var _p1 *byte _p1, err = BytePtrFromString(link) if err != nil { return } _, _, e1 := Syscall(SYS_SYMLINK, uintptr(unsafe.Pointer(_p0)), uintptr(unsafe.Pointer(_p1)), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Symlinkat(oldpath string, newdirfd int, newpath string) (err error) { var _p0 *byte _p0, err = BytePtrFromString(oldpath) if err != nil { return } var _p1 *byte _p1, err = BytePtrFromString(newpath) if err != nil { return } _, _, e1 := Syscall(SYS_SYMLINKAT, uintptr(unsafe.Pointer(_p0)), uintptr(newdirfd), uintptr(unsafe.Pointer(_p1))) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Sync() (err error) { _, _, e1 := Syscall(SYS_SYNC, 0, 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Truncate(path string, length int64) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall6(SYS_TRUNCATE, uintptr(unsafe.Pointer(_p0)), 0, uintptr(length), uintptr(length>>32), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Umask(newmask int) (oldmask int) { r0, _, _ := Syscall(SYS_UMASK, uintptr(newmask), 0, 0) oldmask = int(r0) return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Unlink(path string) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_UNLINK, uintptr(unsafe.Pointer(_p0)), 0, 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Unlinkat(dirfd int, path string, flags int) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_UNLINKAT, uintptr(dirfd), uintptr(unsafe.Pointer(_p0)), uintptr(flags)) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func Unmount(path string, flags int) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall(SYS_UNMOUNT, uintptr(unsafe.Pointer(_p0)), uintptr(flags), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func write(fd int, p []byte) (n int, err error) { var _p0 unsafe.Pointer if len(p) > 0 { _p0 = unsafe.Pointer(&p[0]) } else { _p0 = unsafe.Pointer(&_zero) } r0, _, e1 := Syscall(SYS_WRITE, uintptr(fd), uintptr(_p0), uintptr(len(p))) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func mmap(addr uintptr, length uintptr, prot int, flag int, fd int, pos int64) (ret uintptr, err error) { r0, _, e1 := Syscall9(SYS_MMAP, uintptr(addr), uintptr(length), uintptr(prot), uintptr(flag), uintptr(fd), 0, uintptr(pos), uintptr(pos>>32), 0) ret = uintptr(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func munmap(addr uintptr, length uintptr) (err error) { _, _, e1 := Syscall(SYS_MUNMAP, uintptr(addr), uintptr(length), 0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func readlen(fd int, buf *byte, nbuf int) (n int, err error) { r0, _, e1 := Syscall(SYS_READ, uintptr(fd), uintptr(unsafe.Pointer(buf)), uintptr(nbuf)) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func writelen(fd int, buf *byte, nbuf int) (n int, err error) { r0, _, e1 := Syscall(SYS_WRITE, uintptr(fd), uintptr(unsafe.Pointer(buf)), uintptr(nbuf)) n = int(r0) if e1 != 0 { err = errnoErr(e1) } return } // THIS FILE IS GENERATED BY THE COMMAND AT THE TOP; DO NOT EDIT func utimensat(dirfd int, path string, times *[2]Timespec, flags int) (err error) { var _p0 *byte _p0, err = BytePtrFromString(path) if err != nil { return } _, _, e1 := Syscall6(SYS_UTIMENSAT, uintptr(dirfd), uintptr(unsafe.Pointer(_p0)), uintptr(unsafe.Pointer(times)), uintptr(flags), 0, 0) if e1 != 0 { err = errnoErr(e1) } return }
{ "pile_set_name": "Github" }
/** * Copyright 2016 IBM Corp. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ /** * AUTOMATICALLY GENERATED CODE - DO NOT MODIFY */ package services import ( "fmt" "strings" "github.com/softlayer/softlayer-go/datatypes" "github.com/softlayer/softlayer-go/session" "github.com/softlayer/softlayer-go/sl" ) // The SoftLayer_Survey data type contains general information relating to a single SoftLayer survey. type Survey struct { Session *session.Session Options sl.Options } // GetSurveyService returns an instance of the Survey SoftLayer service func GetSurveyService(sess *session.Session) Survey { return Survey{Session: sess} } func (r Survey) Id(id int) Survey { r.Options.Id = &id return r } func (r Survey) Mask(mask string) Survey { if !strings.HasPrefix(mask, "mask[") && (strings.Contains(mask, "[") || strings.Contains(mask, ",")) { mask = fmt.Sprintf("mask[%s]", mask) } r.Options.Mask = mask return r } func (r Survey) Filter(filter string) Survey { r.Options.Filter = filter return r } func (r Survey) Limit(limit int) Survey { r.Options.Limit = &limit return r } func (r Survey) Offset(offset int) Survey { r.Options.Offset = &offset return r } // Provides survey details for the given type func (r Survey) GetActiveSurveyByType(typ *string) (resp datatypes.Survey, err error) { params := []interface{}{ typ, } err = r.Session.DoRequest("SoftLayer_Survey", "getActiveSurveyByType", params, &r.Options, &resp) return } // getObject retrieves the SoftLayer_Survey object whose ID number corresponds to the ID number of the init parameter passed to the SoftLayer_Survey service. You can only retrieve the survey that your portal user has taken. func (r Survey) GetObject() (resp datatypes.Survey, err error) { err = r.Session.DoRequest("SoftLayer_Survey", "getObject", nil, &r.Options, &resp) return } // Retrieve The questions for a survey. func (r Survey) GetQuestions() (resp []datatypes.Survey_Question, err error) { err = r.Session.DoRequest("SoftLayer_Survey", "getQuestions", nil, &r.Options, &resp) return } // Retrieve The status of the survey func (r Survey) GetStatus() (resp datatypes.Survey_Status, err error) { err = r.Session.DoRequest("SoftLayer_Survey", "getStatus", nil, &r.Options, &resp) return } // Retrieve The type of survey func (r Survey) GetType() (resp datatypes.Survey_Type, err error) { err = r.Session.DoRequest("SoftLayer_Survey", "getType", nil, &r.Options, &resp) return } // Response to a SoftLayer survey's questions. func (r Survey) TakeSurvey(responses []datatypes.Survey_Response) (resp bool, err error) { params := []interface{}{ responses, } err = r.Session.DoRequest("SoftLayer_Survey", "takeSurvey", params, &r.Options, &resp) return }
{ "pile_set_name": "Github" }
name=Gauntlets of Chaos image=https://magiccards.info/scans/en/5e/373.jpg value=2.909 rarity=R type=Artifact cost={5} ability={5}, Sacrifice SN: Exchange control of target artifact, creature, or land you control and target permanent an opponent controls that shares one of those types with it. If those permanents are exchanged this way, destroy all Auras attached to them. timing=artifact oracle={5}, Sacrifice Gauntlets of Chaos: Exchange control of target artifact, creature, or land you control and target permanent an opponent controls that shares one of those types with it. If those permanents are exchanged this way, destroy all Auras attached to them. status=not supported: multiple-targets
{ "pile_set_name": "Github" }
NEWSWEEK Cover: We Are All Socialists Now -- NEW YORK, Feb. 8 /PRNewswire/ -- NEWSWEEK Cover: We Are All Socialists Now Jon Meacham and Evan Thomas on Why "We Are All Socialists Now" "Can America Adopt a More European Model, Only With a Faster Rate of Growth?" A F NEWSWEEK FEB. 16 COVER NEWSWEEK FEB. 16 COVER In the February 16 issue of Newsweek (on newsstands February 9), "We Are All Socialists Now," Newsweek Editor Jon Meacham and Evan Thomas observe that the America of 2009 has become a more ... Facebook Twitter Pinterest A F NEWSWEEK FEB. 16 COVER NEWSWEEK FEB. 16 COVER In the February 16 issue of Newsweek (on newsstands February 9), "We Are All Socialists Now," Newsweek Editor Jon Meacham and Evan Thomas observe that the America of 2009 has become a more socialist country, and the shift began not under a Democrat but a Republican. Plus: how the United States is turning European; the draw of gangs in L.A.; the blackberry president; why Americans don't hate the rich; and an interview with the Prime Minister of Pakistan. (PRNewsFoto/NEWSWEEK)[BH] ... NEW YORK, Feb. 8 /PRNewswire/ -- "Whether we want to admit it or not the America of 2009 is moving toward a modern European state," Newsweek Editor Jon Meacham and Editor-at-Large Evan Thomas write in an essay opening the February 16 Newsweek cover package, "We Are All Socialists Now" (on newsstands Monday, February 9). Meacham and Thomas write that the America of 2009 was moving toward a European social democracy, even before President Obama proposed the largest fiscal bill in American history. "If we fail to acknowledge the reality of the growing role of government in the economy, insisting instead on fighting 21st-century wars with 20th-century terms and tactics, then we are doomed to a fractious and unedifying debate. The sooner we understand where we truly stand, the sooner we can think more clearly about how to use government in today's world," they write. Meacham and Thomas observe that this shift towards more government intervention in the economy began not under a Democrat but a Republican. "The architect of this new era of big government? History has a sense of humor, for the man who laid the foundations for the world Obama now rules is George W. Bush, who moved to bail out the financial sector last autumn with $700 billion." The Obama administration is now caught in a paradox, having to borrow and spend to fix a crisis created by borrowing and spending. "Obama talks of the need for smart government. To get the balance between America and France right, the new president will need all the smarts he can summon," Meacham and Thomas write. Also in the cover package, Europe Editor Michael Freedman reports on the extent to which the United States is turning European. When Obama said that it was time to get past stale arguments over whether government is big or small, he was echoing the eclectic philosophy of French president Nicolas Sarkozy, and in endorsing the "Buy American" rules, members of the Obama administration were seconding the old French culture of "economic patriotism." "Until the financial crisis began last year, this kind of business bashing and protectionism was largely relegated to the far left, and it seemed axiomatic in the United States that the business of America was business," Freedman writes. "But with an urgency not seen since Ronald Reagan declared that government was in fact the problem, policymakers are now reconsidering the relationship between government and the private sector." While it's impossible to know just what the day after the crisis will look like, the broad contours of the new economic world are becoming visible. "Now one of the big debates in the U.S. is how to bridge the gap between business and government in a way that avoids stagnation while still satisfying the intense demand for financial and social services. In other words, can America adopt a more European model, only with a faster rate of growth?" Freedman believes that if Obama can somehow forge a middle path that builds upon the best of the European safety net while also encouraging the dynamism and innovation that has helped the U.S. prosper, it will provide evidence that government can actually be a part of the solution.
{ "pile_set_name": "Pile-CC" }
--- address: | Institut d’Astrophysique de Paris, 98bis Bd Arago,\ 75014 Paris, France author: - 'N. PRANTZOS' title: 'STELLAR RADIOACTIVITIES AND DIFFUSE GAMMA-RAY LINE EMISSION IN THE MILKY WAY' --- Introduction ============ Shortly after the discovery of the phenomenon of radioactivity, radionuclides revealed to be unique ”’probes” in our study of the cosmos and important agents in its evolution (radioactive dating of the Earth, meteorites and stars; radioactive heating of planetary and supernova interiors; radioactive origin of abundant stable nuclei, like , and of isotopic anomalies in meteorites, etc). As most other stable nuclei, radionuclides are produced in stellar interiors and ejected in the interstellar medium through stellar winds and explosions (nova or supernova). In a few cases, concerning extra-solar objects, the characteristic -ray line signature of their radioactive decay has been detected and used as a probe of a large variety of astrophysical sites; indeed, -ray line astronomy with cosmic radioactivities has grown to a mature astrophysical discipline in the last decade. See. e.g. Diehl and Timmes 1998, Arnould and Prantzos 1999, Knödlseder and Vedrenne 2001, for recent reviews; also, the proceedings of the [*Astronomy with Radioactivities*]{} Conference, organised every two years, nicely reflects the status of that discipline (web site: [ http://www.mpe.mpg.de/gamma/science/lines/workshops/radioactivity.htm ]{} ). In this review I shall focus on radioactivities produced by massive stars (SNII and WR stars); radioactivities produced by exploding white dwarfs (novae and SNIa) are reviewed by Hernanz (this volume). A short history of stellar radioactivities and $\gamma$-ray line astronomy ========================================================================== The main theoretical ideas underlying $\gamma$-ray line astronomy emerged slowly in the 60ies, while observational evidence came only about 20 years later. This history is largely dominated by two rather independent “programmes” of research: an astronomical one, seeking for the explanation of the late lightcurves of supernovae, and a nucleosynthetic one, seeking for the origin of the most abundant heavy nucleus, . An exceptionally clear and vivid account of that history is given in the text of Clayton (1999), on which much of this section is based. In the early 50ies, the exponential decline of the late lightcurves of SNIa was attributed to the radioactive decay of $^7$Be (Borst 1950) or $^{59}$Fe (Anders 1959) or $^{254}$Cf (Anders 1959, Burbidge et al. 1956), all those nuclei having half-lives of $\sim$45-55 days. In his PhD thesis (1962), the mineralogist T. Pankey Jr suggested that  is produced as unstable , and that the radioactive chain $\ra$$\ra$ can explain the lightcurves of supernovae; however, his suggestion went completely unnoticed by astronomers and nuclear physicists alike. Indeed, up to the mid-sixties it was thought that  is produced as such in stellar interiors (Hoyle 1946; Burbidge et al. 1957; Fowler and Hoyle 1964), through the so-called [*“e-process”*]{}, despite the fact that the issue of its [*ejection*]{} in the interstellar medium (which might modify its abundance) was far from being clear. The role of [*explosive Si-burning*]{}, leading to the production (and natural ejection from supernovae) of doubly-magic  was clarified through semi-analytical calculations of Bodansky et al. (1968), after hints from pioneering numerical nucleosynthesis calculations of Truran et al. (1966). Based on those results, Colgate and McKee (1969) convincingly argued that the radioactive chain $\ra$$\ra$ powers the lightcurves of supernovae; as time goes on, an increasing percentage of that power escapes the SN ejecta (which become progressively more transparent to $\gamma$-rays) and as a result the optical light curve declines more rapidly (by a factor of 2 every $\sim$55 days) than the amount of  (half-life: 77 days). The implications of those ideas for $\gamma$-ray line astronomy were studied in the 60ies at the Rice University, where Clayton and Craddock (1965) first calculated the expected $\gamma$-ray flux and spectrum from the Crab remnant, on the assumption that the $^{254}$Cf hypothesis was correct; finding that extremely large overabundances of other heavy elements (Os, Ir, Pt) should be obtained in that case, they expressed doubts on the correctness of that hypothesis. After this “false-start”, the implications of production in Si-burning were fully clarified in the landmark paper of Clayton, Colgate and Fishman (1969), which opened exciting perspectives to the field by suggesting that any supernova within the local group of galaxies should be detectable in $\gamma$-ray lines. In the 70ies D. Clayton identified most of the radionuclides of astrophysical interest (i.e. giving a detectable $\gamma$-ray line signal); for that purpose he evaluated their average SN yields, by assuming that the corresponding daughter stable nuclei are produced in their solar system abundances. Amazingly enough (or naturally enough, depending on one’s point of view) his predictions of average SNII radionuclide yields (Table 2 in Clayton 1982) are in excellent agreement with modern yield calculations, based on full stellar models and detailed nuclear physics (see Fig. 1). Only the importance of  escaped Clayton’s (1982) attention, perhaps because its daughter nucleus $^{26}$Mg is produced in its stable form, making the evaluation of the parent’s yield quite uncertain. That uncertainty did not prevent Arnett (1977) and Ramaty and Lingenfelter (1977) from arguing (on the basis of Arnett’s (1969) explosive nucleosynthesis calculations) that, even if only 10$^{-3}$ of solar $^{26}$Mg is produced as , the resulting Galactic flux from tens of thousands of supernovae (during the $\sim$1 Myr lifetime of ) would be of the order of 10$^{-4}$ . In the case of   nature appeared quite generous, providing a -ray flux even larger than the optimistic estimates of Ramaty and Lingenfelter (1977): the HEAO-3 satellite detected the corresponding 1.8 MeV line from the Galactic center direction at a level of 4 10$^{-4}$ (Mahoney et al. 1984). That detection, the first ever of a cosmic radioactivity, showed that nucleosynthesis is still active in the Milky Way; however, the implied large amount of galactic  ($\sim$3 per Myr, assuming steady state) was difficult to accomodate in conventional models of galactic chemical evolution if SNII were the main  source (Clayton 1984), since $^{27}$Al would be overproduced in that case; however, if the “closed box model” assumption is dropped and [*infall*]{} is assumed in the chemical evolution model, that difficulty is removed, as subsequently shown by Clayton and Leising (1987). Another welcome mini-surprise came a few years later, when the -ray lines were detected in the supernova SN1987A, a $\sim$20 star that exploded in the Large Magellanic Cloud. On theoretical grounds, it was expected that a SNIa (exploding white dwarf of $\sim$1.4  that produces $\sim$0.7  of ) would be the first to be detected in -ray lines; indeed, the large envelope mass of SNII ($\sim$10 ) allows only small amounts of -rays to leak out, making the detectability of such objects problematic (Woosley et al. 1981, Gehrels et al. 1987). Despite the intrinsically weak -ray line emissivity of SN1987A, the proximity of LMC allowed the first detection of the tell-tale -ray line signature from the famous radioactive chain $\ra$$\ra$, thus confirming a 25-year old conjecture (namely, that the abundant  is produced in the form of radioactive ). Those discoveries laid the observational foundations of the field of -ray line astronomy with radioactivities. The next steps were made in the 90ies, thanks to the performances of the Compton Gamma-Ray Observatory (CGRO). First, the [*OSSE*]{} instrument aboard CGRO detected the  -ray lines from SN1987A (Kurfess et al. 1992); the determination of the abundance ratio of the isotopes with mass numbers 56 and 57 offered a unique probe of the physical conditions in the innermost layers of the supernova, where those isotopes are synthesized (Clayton et al. 1992). On the other hand, the [*COMPTEL*]{}  instrument mapped the Miky Way in the light of the 1.8 MeV line and found irregular emission along the plane of the Milky Way and prominent “hot-spots” in directions tangent to the spiral arms (Diehl et al. 1995); that map implies that massive stars (SNII and/or WR) are at the origin of galactic  (as suggested by Prantzos 1991, 1993) and not an old stellar population like novae or AGB stars. Furthermore, [*COMPTEL*]{}   detected the 1.16 MeV line of radioactive  in the Cas-A supernova remnant (Iyudin et al 1994); that discovery offered another valuable estimate of the yield of a radioactive isotope produced in a massive star explosion (although, in that case the progenitor star mass is not known, contrary to the case of SN1987A). After that short historical introduction to the field of -ray line astronomy, we turn in the next section into a discussion of the theoretically predicted yields of radioactivities from massive stars, the associated uncertainties and the relevant observational constraints. Stellar Radioactivities: Yields, constraints, detectability =========================================================== Overview -------- All nuclei (except for the primordial isotopes of H and He and those of Li, Be and B) are thermonuclearly synthesized in the hot and dense stellar interiors, which are opaque to -rays. Released -ray photons interact with the surrounding material and are Compton-scattered down to X-ray energies, until they are photoelectrically absorbed and their energy is emitted at longer wavelengths. To become detectable, radioactive nuclei have to be brought to the surface (through vigorous convection) and/or ejected in the interstellar medium, either through stellar winds (AGB and WR stars) or an explosion (novae or supernovae). Their detection provides then unique information on their production sites. -2.8 cm -4.4 cm The intensity of the escaping -ray lines gives important information on the yields of the corresponding isotopes and the physical conditions (temperature, density, neutron excess etc.) in the stellar zones of their production, as well as on other features of the production sites (extent of convection, mass loss, hydrodynamic instabilities, position of the “mass-cut” in SNII, etc.). The shape of the -ray lines reflects the velocity distribution of the ejecta, modified by the opacity along the line of sight and can give information on the structure of the ejecta (see e.g. Burrows 1991 for the potential of -ray lines as a tool of supernova diagnostics). Up to now, only the 0.847 MeV  line from SN1987A and the 1.8 MeV  line from the inner Galaxy have been resolved (both with the same instrument, the balloon borne GRIS spectrometer), but their “message” is not quite understood yet. Obviously, radionuclides of interest for -ray line astronomy are those with high enough yields and short enough lifetimes for the emerging -ray lines to be detectable. On the basis of those criteria, Table 1 gives the most important radionuclides (or radioactive chains) for -ray line astronomy, along with the corresponding lifetimes, line energies and branching ratios, production sites and nucleosynthetic processes.[^1] When the lifetime of a radioactive nucleus is not very large w.r.t. the timescale between two nucleosynthetic events in the Galaxy, those events are expected to be seen as point-sources in the light of that radioactivity. In the opposite case a diffuse emission along the Galaxy is expected from the cumulated emission of hundreds or thousands of sources. Characteristic timescales between two explosions are $\sim$1-2 weeks for novae (from their estimated Galactic frequency of $\sim$30 yr$^{-1}$, Della Vale and Livio 1995), $\sim$50-100 yr for SNII+SNIb and $\sim$200-400 yr for SNIa (from the corresponding Galactic frequencies of $\sim$2 SNII+SNIb century$^{-1}$ and $\sim$0.25-0.5 SNIa century$^{-1}$, Tammann et al. 1994, Cappellaro et al. 1997). Comparing those timescales to the decay lifetimes of Table 1 one sees that in the case of the long-lived  and a diffuse emission is expected; the spatial profile of that emission should reflect the Galactic distribution of the underlying sources. All the other radioactivities of Table 1 should be seen as point sources in the Galaxy except, perhaps, $^{22}$Na from Galactic novae; indeed, the most prolific producers, O-Ne-Mg rich novae, have a frequency $\sim$1/3 of the total (i.e. $\sim$10 yr$^{-1}$), resulting in $\sim$40 sources active in the Galaxy during the 3.8 yr lifetime of $^{22}$Na. Yields ------ Yields of radioactive isotopes produced in SNII are displayed in Fig. 1. On the left part of the diagram, Clayton’s (1982) “educated guess” of those yields is presented for illustration purposes; as discussed in Sec. 2, it is in excellent agreement with modern yield calculations. In Fig. 1 it appears that the stellar mass does not affect substantially those yields; at least in the 15-25  mass range, yields do not vary by more than a factor of $\sim$2-3 (notice, however, that they do not always behave monotonically with mass). Unfortunately, the uncertainties in those yields are difficult to quantify at present, because of the many factors involved: nuclear physics (for instance, the $^{12}$C($\alpha,\gamma$) rate or n-capture and n-production cross sections), convection and mass loss prescriptions, position of the mass-cut, neutrino spectra (for some nuclei that may receive conribution from neutrino-induced nucleosynthesis) etc. Taking all those uncertainties into account, it is safe to assume that theoretical yields at present are uncertain by at least a factor of 2 (and, quite probably, by much larger factors). In particular, the yield of all Fe-peak radioactivities (including ) are quite sensitive to the position of the mass-cut; some discussion on relevant constraints is given in Sec. 3.3. Here we proceed to a comparison between results of 2 recent calculations, by Rauscher et al. (2002 or RHHW2002) and Chieffi and Limongi (2002 or CL2002), performed with state-of-the-art stellar evolution models (including mass loss and a simulation of the explosion) and extended nuclear reaction networks with updated physics. These results illustrate well current uncertainties for  and , two radioactivities produced outside the stellar Fe-core. - In the case of , the overall agreement is rather good: the RHHW2002 yields are larger by a factor of 2.5 on average than those of CL2002, the difference been more pronounced in the 15  star than in the 25  case. The two calculations converge in the more massive stars, where  production is dominated by pre-explosive nucleosynthesis in the Ne and H shells. In lower mass stars  production is dominated by explosive Ne-burning; several factors may then explain the differences between the two calculations: the detailed pre-supernova structure through which the shock-wave runs; the amount of seed nuclei ($^{23}$Na, $^{25}$Mg etc) which are products of C-burning and depend thereoff on the carbon abundance left off from He-burning, that is on the $^{12}$C($\alpha,\gamma$) reaction rate; the $\nu$-induced nucleosynthesis (included in RHHW2002 but not in CL2002), etc. - In the case of  the situation is not as satisfactory as for .  is mainly produced by explosive Ne-burning, through neutron captures on stable  and $^{58}$Fe; its yield depends on the available amount of $^{22}$Ne, which releases those neutrons through $^{22}$Ne($\alpha$,n), as well as on available $^{58}$Fe. There is a factor of $\sim$10 difference between the two calculations, for both the 15  and the 25  stars. An explanation of such a large difference appears difficult, especially when the non-monotonic behaviour of the RHHW2002 yields of  with stellar mass is taken into account: according to RHHW2002, the $\sim$20  region marks the transition from exoergic convective carbon burning (for M$<$20 ) to stars where energy production from central C-burning just compensates for neutrino losses (M$>$20 ); the effect of that transition on the  yields has not been investigated yet. Notice that the  yields of RHHW2002 are much larger than those of the previous calculations of that same group (Woosley and Weaver 1995). Notice also that the  yields of RHHW2002 are larger than the corresponding ones of , a situation that is not encountered either in CL2002 or in Woosley and Weaver (1995). Constraints ----------- The issue of the  and  yields in massive stars is of importance, in view of current observational constraints and forthcoming [*INTEGRAL*]{} measurements (see Sec. 4.2). Fig. 1 displays some other observational constraints on SNII radioactivities, obtained for SN1987A (paralellograms for ,  and , for a 18-20  star) and for other supernovae (on the right of the figure; the corresponding stellar mass is irrelevant in the latter case). In the case of SN1987A, the   yield (0.07 ) is obtained through extrapolation of the supernova lightcurve, assumed to be powered by  decay, to the day of the explosion (e.g. Arnett et al. 1989). The yield of  is obtained in three different ways: a) through the measured intensity of the 0.122 Mev line of  and assuming a low optical depth for those photons; b) through the study of the late bolometric lightcurve of SN1987A and assuming that it is dominated by   decay at days 1100-2000 (this analysis is far less straightforward than in the case of ); c) through an analysis of the infrared emission lines of the ejecta. All those methods converge to a value of  mass of $\sim$ 3 10$^{-3}$ (see Fransson and Kozma 2002). Finally, the yield of  is evaluated through methods (b) and (c), albeit with substantial difficulties, due to the complex physics of supernova heating and coooling involved and the role of positrons; current estimates give values in the 0.5-2 10$^{-4}$  range (Fransson and Kozma 2002), while Sollerman (2002) suggests an upper limit of 1.1 10$^{-4}$ . These observational constraints compare rather well with theoretical predictions for 18-20  stars (the estimated progenitor mass of SN1987A, on the basis of its optical luminosity, e.g. Arnett et al. (1989)). Notice, however, that model results in Fig. 1 correspond to stars calculated with initial metallicity Z=, while the progenitor of SN1987A presumably had LMC metallicity, namely Z$\sim$0.3 . Notice also that Thielemann et al. (1996) obtain a larger  yield for the 20  star (1.7 10$^{-4}$ ), due to a difference in the way of simulating the explosion: the “thermal bomb” they use leads to a larger entropy and more important $\alpha$-rich freeze-out than in the case of the piston-driven explosion adopted by RHHW2002. Such a high  yield is marginally detectable by [*INTEGRAL*]{} (see next section). Data on the right of Fig. 1 concern  yield estimates for extragalactic SNII. Based on a sample of 8 SNIIP (the “standard” SNII, with a “plateau” in the optical lightcurve) and assuming a bolometric correction similar to the one of SN1987A, Sollerman (2002) finds a mean value of 0.075  with a standard deviation of 0.03 . He notices, however, that SNII with much lower and higher yields than the “canonical” one have also been found. In the former case belong SN1994W: the extremely rapid fading of its lightcurve suggests a  yield lower than 0.015 . On the other hand, SN1998bw is the most -rich supernova today: detailed modelling of its late emission requires  yields of 0.5-0.9 , and simple arguments lead to a lower limit of 0.3  (Sollerman et al. 2002). Thus, it appears that the  yield of massive stars is far from being a “universal constant” of $\sim$0.075 , a fact that may have interesting implications for stellar models as well as galactic chemical evolution, especially concerning the observed scatter of abundance ratios in halo stars (Ishimaru et al. 2002). Finally, the  yield of CasA is inferred from the 1.16 MeV line flux of $^{44}$Sc decay detected by [*COMPTEL*]{} (3.3$\pm$0.6 10$^{-5}$ ) and the CasA distance (3.4 kpc) and age (320 yr) and amounts to $\sim$1.7 10$^{-4}$ (Iyudin et al. 1999). An independent evaluation of the  yield in CasA came recently, through detection of the low energy decay lines of  by [*Beppo-SAX*]{}: the detected flux at 68 and 78 keV implies a  mass of 1-2 10$^{-4}$ , depending on the modelisation of the underlying continuum spectrum (Vink et al. 2001; Vink and Laming this volume). These yields are larger than the average  yields of RHHW2002 (see Fig. 1), typically by a factor of $\sim$3, but compatible with those of Thielemann et al. (1996). Notice, however, that these estimates suffer from uncertainties related to the ionisation state of the SN remnant; an ionised medium could slow down the electron-capture decay of that radionuclide and explain the observed flux with a smaller yield (see Mochizuki et al. 1999). Detectability ------------- For tutorial purposes, we present in Fig. 2 a schematic view of the -ray line emissivity of a “typical” SNII, over three different timescales: 10 years, 10 centuries and a few Myrs. The figure is based on the yields of Fig. 1 and is calculated by assuming a SN1987A-like opacity for the ejecta. Notice that, if the RHHW2002 yields of $^{60}$Co are correct, the lines might dominate the -ray line emission of the SN for a couple of years, between 5 and 8 years after the explosion; that possibility was suggested by Clayton (1982) for very young SN remnants in the Milky Way. Unfortunately, the expected flux from SN1987A was below the sensitivity limits of instruments aboard CGRO and it will also be below the detection threshold of [*INTEGRAL*]{} (which is launched $\sim$15 years after the explosion, while  has a mean life of 7.6 yr). The role of   for the late lightcurve of SN1987A was studied in Timmes et al. (1996). It may well be that the current difficulties in modelling the late bolometric lightcurve of that supernova and its infrared line emissivity (see previous section) may be, at least partially, due to an inadequate account of the energy input from that isotope. The expected 1.16 MeV -ray line flux from  in SN1987A ($\sim$10$^{-5}$ ) lies at the detection limit of [*INTEGRAL*]{} and will be one of the prime targets of the SPI instrument aboard that satellite. Even a 3-$\sigma$ upper limit would bring important information on the position of the mass-cut and the explosion mechanism of that supernova, since  yield is more sensitive to the mass-cut than other isotopes (e.g. Timmes et al. 1996). On the other hand, Fig. 2 reveals also that  from centuries-old SN remnants in the Milky Way should be detectable by [*INTEGRAL*]{}; here again, a positive detection will reveal hitherto unknown Galactic SN remnants, while a negative result is expected to place interesting constraints on the frequency of the production sites of that isotope and on the corresponding yields. Indeed, on the basis of Woosley and Weaver (1995) yields Timmes et al. (1996) estimate that, in order to explain the solar abundance of $^{44}$Ca, one has to invoke either a higher SN frequency in the Galaxy or high  yields or production of $^{44}$Ca in rare events, like sub-Chandrasekhar mass SNIa. An analysis of [*COMPTEL*]{}  map of the inner Galaxy in the light of 1.16 MeV suggests that the first two possibilities should be excluded, otherwise more and/or brighter “hot-spots” than actually observed should be found by [*COMPTEL*]{}  (The et al. 2000). In that respect, it is interesting to notice that tantalizing hints for  emission from the nearby source GRO J0852-4642, a previously unknown supernova remnant, were recently reported (Iyudin et al. 1998, Aschenbach et al. 1999; but, see also Schönfelder et al. 2000). Long -lived radioactivities are difficult to detect from individual sources, even with next generation instruments. For instance, in the case of , an exceptionally close site (closer than $\sim$0.3 kpc) is required for its 1.8 MeV line to be detectable by [*INTEGRAL*]{}; the Vela region might offer just such a chance, in view of some intriguing hints from [*COMPTEL*]{}   observations (see Sec. 4.4). In the following we shall focus on the long-lived radioactivities  and . During their $\sim$Myr lifetimes the collective emission from tens of thousands of sources gives rise to a diffuse emission along the plane of the Milky Way; only the  emission has been detected up to now. Diffuse -ray line emission from long-lived  and  in the Milky Way ================================================================= Overview -------- [*COMPTEL*]{}   is the only instrument with imaging capabilities that detected the Galactic 1.8 MeV line emission (Fig. 3). The data shows clearly a diffuse, irregular, emission along the Galactic plane, allowing to eliminate: i) a unique point source in the Galactic centre and/or a nearby local bubble in that direction; ii) an important contribution of the Galactic bulge, signature of an old population and iii) any class of sources involving a large number of sites with low individual yields (like nova or low mass AGB stars), since a smooth flux distribution is expected in that case (Diehl et al. 1995). Identification of some of the observed features (“hot-spots”) with tangents to spiral arms seems quite plausible and suggests that massive stars are at the origin of  (Prantzos and Diehl 1996). Estimates of the galactic mass of  rely on assumptions about the spatial distribution of the underlying sources. All plausible disk models tested by the [*COMPTEL*]{}   team yield a mass of $\sim$2 . Introducing a spiral structure to the axisymmetric disk models improves the fit to the data and implies that between 60 and 100 $\%$ of the  may lie on the spiral arms (Diehl et al. 1998). It should be noticed that the derived spatial distribution of  depends on the method of analysis. As shown by Knödlseder et al. (1999) some imaging analysis methods lead to all-sky maps with more pronounced localised features than some others; still, the irregular nature of the 1.8 MeV emission along the Galactic plane and the localised “hot-spots” are revealed by all imaging methods, in a statistically significant way (Plüschke et al. 2001a). Sources of  and the role of ---------------------------- The  yields presented in Fig. 1 concern massive stars exploding as SNII. Even more massive stars ($>$30 ) may produce substantial amounts of  during central ([*hydrostatic*]{}) H-burning and eject them through their powerful stellar winds, in the WR stage (Prantzos and Cassé 1986); the WR yields are relatively well determined (e.g. Meynet et al. 1997), but the [*explosive*]{} yields of those stars (which ultimately explode as SNIb) are very poorly known at present. Under the most favorable conditions (highest possible yields for SNII allowed by current uncertainties; accounting for the strong metallicity dependence of WR yields, which favours sources in the inner Galaxy; adopting a mildly steep IMF, i.e. with the Salpeter slope of -1.35 instead of the Scalo slope of -1.7), it turns out that both SNII and WR can account for $\sim$2 /Myr of (e.g. Prantzos and Diehl 1996). It may well be that both classes of sources contribute equally to the Galactic (a coincidence not “stranger” than the quasi-equality between the solar abundances of s- and r- elements, or between the contributions of the dark matter and dark energy to the density of the Universe). However, it is interesting to see whether independent constraints can be used to distinguish between the SNII and WR contributions and identify a dominant component (assuming that there is one). One such constraint is the flux ratio of the -ray lines of  (1.17 and 1.33 MeV) and  (1.8 MeV). Indeed,  is predicted to be co-produced with   in SNII (in almost the same zones and in similar amounts, Fig. 1), but not in WR stars. If SNII dominate galactic  production, an important  emission is then expected (flux ratio: ${^{60}Fe}\over{^{26}Al}$ = ${Y_{60}/60/\tau_{60}}\over{Y_{26}/26/\tau_{26}}$, where Y represent yields averaged over the IMF and $\tau$ the corresponding decay lifetimes); if WR stars are dominant, the -ray line flux ratio of / is expected to be extremely low. The ${^{60}Fe}\over{^{26}Al}$ ratio of SNII depends on stellar models (and slightly on the IMF). The Woosley and Weaver (1995) yields lead to a flux ratio of 0.16 (Timmes et al. 1995), and so do the recent ones of CL2002 (note that the absolute  and  yields of CL2002 are $\sim$ 4 times lower than those of WW1995); however, the most recent results of the Santa Cruz group (RHHW2002) lead to a surprisingly large flux ratio ${^{60}Fe}\over{^{26}Al}$$\sim$0.4. On the other hand, current observational upper limits, obtained by GRIS (Naya et al. 1998) and [*COMPTEL*]{}  (Diehl 2000) are close to 0.15. It appears then that: a) the RHHW2002 yields can produce $\sim$1  of Galactic , but should be excluded by the non-detection of ; b) the CL2002 yields produce a Galactic  mass of $\sim$0.4 , too low to explain the detected 1.8 MeV flux. Taken at face value, the most recent SNII yields apparently exclude SNII as dominant sources of Galactic . Does this mean that WR stars constitute a viable alternative? WR stars can indeed provide $\sim$2 /Myr of (Meynet et al. 1997), provided that the strong metallicity dependence of the yields is taken into account. Moreover, Knödlseder (1999) showed that a map of the ionising power from massive stars (derived from the COBE data, after correction for synchrotron contribution) corresponds to the 1.809 MeV map of galactic  in all significant detail; assuming a standard stellar initial mass function, his calculation reproduces consistently the current galactic supernova rate and massive star population from both maps, and suggests that most of  is produced by WR stars of high metallicity in the inner Galaxy. Finally, Knödlseder et al. (2001) point out that one of the prominent “hot-spots” in the [*COMPTEL*]{}  1.8 MeV sky-map, the Cygnus region, is an association of massive stars with no sign of recent supernova activity. All these observational and theoretical indices favour WR stars as dominant  contributors. However, in that case, the 1.8 MeV longitude profile (or, equivalently, the  radial profile) should be steeper than observed (see Fig. 5). In summary, there is no satisfactory explanation at present for the flux of the 1.8 MeV line and its spatial distribution in the Milky Way. [*INTEGRAL*]{} is expected to provide a more detailed spatial profile than COMPTEL and to put more stringent limits (or, perhaps, to detect) emission from . Only when the nature of the major  sources is clarified it will become possible to tackle the question of their Galactic distribution (i.e. with any yield dependence on metallicity - or other factors - properly taken into account). The  line width: a hint for mixing of SN ejecta in the ISM? ----------------------------------------------------------- The width of the  line was already discussed by Ramaty and Lingenfelter (1977) who pointed outh that  ejected from SN should deccelerate in the ISM in a timescale short compared with its decay timescale; as a consequence, the emitted -ray line should be quite narrow (narrower than the $\sim$2 keV width imposed by Galactic rotation), making its detection relatively easy. The HEAO-3 Ge detectors found the line to be narrow indeed: FWHM$<$3 keV (Mahoney et al. 1984); however, the GRIS instrument measured a FWHM=5.4$\pm$1.4 keV, $\sim$3 times larger than HEAO-3 and much larger than allowed by Galactic rotation (Naya et al. 1996). If real, that large width can be interpreted either as kinematic (with the bulk of  moving with velocities $\sim$540 km/s) or thermal (with most  atoms brough to temperatures T$\sim$4.5 10$^8$ K). The thermal origin seems improbable, since it would imply that all  is produced in $\sim$200 mini-starburst regions in the inner Galaxy regions (Chen et al. 1997). A non-thermal origin could be understood if  nuclei are incorporated in dust grains, which are launched by the SN explosion (Chen et al. 1997), or accelerated by the SN shock wave (Ellison et al. 1997) or repeatedly accelerated by SN shocks (Sturner and Naya 1999). The SPI instrument of [*INTEGRAL*]{} will clarify that issue, by measuring the line width and also the latitude distribution of the line emission. Already, [*COMPTEL*]{}  measurements imply a vertical scaleheight of $<$220 pc for the  distribution and suggest that the velocity of the bulk of  has not as large a component perpendicularly to the Galactic plane as suggested by the kinematic interpretation of the GRIS measurements (Oberlack 1997).  “hot-spots”: monitoring stars, superbubbles and young stellar associations --------------------------------------------------------------------------- The study of individual “hot-spots” revealed by [*COMPTEL*]{}  bears on our understanding of the evolution of young stellar associations (in the cases of Cygnus, Carina and Centaurus-Circinus) and even individual stars (in the case of Vela). The Cygnus regions was studied with population synthesis models by two groups (Cervinho et al. 2001, Plüschke et al. 2001b). The resulting morphology of the 1.8 MeV emission compares well with the [*COMPTEL*]{}  data. However, in the case of Carina, the predicted absolute flux is smaller (by a factor of 5-20) than detected by [*COMPTEL*]{} (Knödlseder et al. 2001). That discrepancy may imply something interesting, either for the (in)completeness of the stellar census of that association or for the  yields. [*INTEGRAL*]{} will establish more accurately the morphology of those “hot-spots” and further test the “massive star group” origin of . Another target of importance for future 1.8 MeV studies is the Orion/Eridanus region. [*COMPTEL*]{}  surveys of the anticenter region show significant (5 $\sigma$) extended emission towards the south of the Orion molecular clouds. That emission could be attributed (Diehl 2002) to  ejected by the prominent Orion OB1 association and expanded into the low density cavity of the Eridanus bubble. The exansion of supernova ejected into a previously formed cavity of peculiar shape (and not into a medium with radial symmetry) is a novel and interesting field of study, opened by [*COMPTEL*]{}  and left for [*INTEGRAL*]{} to explore. Finally, the Vela region offers the opportunity to measure (or put upper limits on)  yields from individual sources. The morphology of the rather extened 1.8 MeV emission detected by [*COMPTEL*]{}  does not allow identification with any of the three known objects in the field (the Vela SNR, the closest WR star $^2$ Vel and SNR RX-J0852-4622); all three objects lie closer than 260 pc, according to recent estimates. [*COMPTEL*]{}  measurements are compatible with current yields of SNII (in the case of Vela SNR) and marginally compatible with current yields of $^2$ Vel (Oberlack et al. 2000). [*INTEGRAL*]{} measurements in the Vela region are then expected to place more stringent constraints on stellar models. Summary ======= The aim of [*Gamma-Ray Astronomy with Radioactivities*]{}, as explicitly defined by the “founding fathers” of the field in the 60ies (see Sec. 2) was to probe stellar nucleosynthesis as well as supernova structure and energetics. This original aim was reached in a spectacular way in the case of SN1987A (which, however, remains today - and, probably, for sometime in the future - a unique object in that respect). On the other hand, the legacy of HEAO-3 and [*COMPTEL*]{}  set new aims to the field of [*Gamma-Ray Astronomy with long-lived Radioactivities*]{}: to probe the large-scale distribution of active nucleosynthesis sites in the Galaxy and the properties/history of any clusterings in that distribution (young stellar associations, individual objects). [*INTEGRAL*]{} is expected to perform this next step. Acknowledgements {#acknowledgements .unnumbered} ================ I am grateful to Roland Diehl for his critical suggestions and comments. References {#references .unnumbered} ========== [99]{} E. Anders . D. Arnett . D. Arnett . D. Arnett, J. Bachall, R. Kirchner and S. Woosley . B. Aschenbach, A. Iyudin and V. Schönfelder . D. Bodansky, D. Clayton and W. Fowler . L. Borst . G. Burbidge, F. Hoyle, M. Burbidge, R. Christy and W. Fowler . G. Burbidge, M. Burbidge, W. Fowler and F. Hoyle . A. Burrows, in [*Gamma-Ray Line Astrophysics*]{}, Eds. Ph. Durouchoux and N. Prantzos, (New York: AIP, Vol 232), p. 297 (1991). E. Cappellaro, M. Turatto, D. Tsvetkov . M. Cervinho, J. Knödlseder, D. Schaerer, P. von Ballmoos and G. Meynet . W. Chen et al. in [*The Transparent Universe*]{}, eds. C. Winkler et al., (ESA SP-382), p. 105, (1997) A. Chieffi and M. Limongi, in press, . D. Clayton in [*Essays in Nuclear Astrophysics*]{}, eds C. Barnes et al., (Cambridge University Press), p. 401, (1982). D. Clayton . D. Clayton . D. Clayton and W. Craddock . D. Clayton, S. Colgate and G. Fishman . D. Clayton and M. Leising . D. Clayton, M. Leising, L.-S. The, W. Johnson and J. Kurfess . S. Colgate and C. McKee . M. Della Vale and M. Livio . R. Diehl in [*INTEGRAL School*]{}, unpublished [2000]{}. R. Diehl, in press, . R. Diehl and F. Timmes . R. Diehl et al. . R. Diehl et al. in [*AIP Conf. Proc. 410*]{}, eds. C. Dermer et al., p. 1109, (1998). D. Ellison, L. Drury and J.-P. Meyer . W. Fowler and F. Hoyle . C. Fransson and C. Kozma, astro-ph/0112405 and in press, . N. Gehrels, M. Leventhal and C. MacCallum . F. Hoyle . Y. Ishimaru, N. Prantzos and S. Wanajo, in preparation. A. Iyudin et al. . A. Iyudin et al. . A. Iyudin et al. [*Astro. Let. and Communications*]{}, [**38**]{}, 313, (1999). W. Johnson, F. Harnden and R. Haymes . R. Kinzer, P. Milne, J. Kurfess, M. Strickman, W. Johnson, W. Purcell . J. Knödlseder [*PhD Thesis*]{}, Univ. Paul Sabatier, Toulouse (unpublished),(1997). J. Knödlseder . J. Knödlseder, K. Bennett, H. Bloemen, et al. . J. Knödlseder et al. astro-ph/0104074 and [*Proceedings of 4th INTEGRAL Workshop*]{}, Eds. A. Gimenez, V. Reglero & C. Winkler, [*ESA SP-459*]{}, p.47 (2001). J. Knödlseder and G. Vedrenne, astro-ph/0101018 and [*Proceedings of 4th INTEGRAL Workshop*]{}, Eds. A. Gimenez, V. Reglero & C. Winkler, [*ESA SP-459*]{}, p.23 (2001). J. Kurfess et al. . W. Mahoney, J. Ling, A. Wheaton, A. Jacobson . G. Meynet, M. Arnould, G. Paulus and N. Prantzos Y. Mochizuki, K. Takahashi,H-Th. Janka, W. Hillebrandt and R. Diehl, . J. Naya et al. . J. Naya et al. . U. Oberlack, [*PhD Thesis*]{}, (unpublished), (1997). U. Oberlack, U. Wessolowski, R. Diehl et al. . T. Pankey Jr, [*PhD Thesis*]{}, (unpublished), (1962). S. Plüschke, R. Diehl, V. Schönfelder et al., in [*Proceedings of 4th INTEGRAL Workshop*]{}, Eds. A. Gimenez, V. Reglero & C. Winkler, [*ESA SP-459*]{}, p.55 (2001a). S. Plüschke, K. Kretschmer, R. Diehl, D. Hartmann and U. Oberlack, in [*Proceedings of 4th INTEGRAL Workshop*]{}, Eds. A. Gimenez, V. Reglero & C. Winkler, [*ESA SP-459*]{}, p.91 (2001b). N. Prantzos, in [*Gamma-Ray Line Astrophysics*]{}, Eds. Ph. Durouchoux and N. Prantzos (New York: AIP, Vol. 232), p. 129 (1991) N. Prantzos . N. Prantzos and M. Cassé . N. Prantzos and R. Diehl . R. Ramaty and R. Lingenfelter . T. Rauscher, A. Heger, R. Hoffman and S. Woosley, astro-ph/0112478 and ApJ (2002). V. Schönfelder, H. Bloemen, W. Collmar et al. in [*Proceedings of 5th Compton Symp.*]{}, Eds. M. McConnel and J. Ryan (New York: AIP, Vol. 510), p. 54 (2000). J. Sollerman, astro-ph/0204469, and in press, . J. Sollerman et al., astro-ph/0204498 and in press, [*A&A*]{} (2002). S. Sturner and J. Naya . G. Tammann, W. Loffler and A. Schroeder, . L.S. The, R. Diehl, D. Hartmann et al., in [*Proceedings of 5th Compton Symp.*]{}, Eds. M. McConnel and J. Ryan(New York: AIP, Vol. 510) , p. 64 (2000) K.-F. Thielemann, K. Nomoto and M. Hashimoto, . F. Timmes et al. . F. Timmes et al. . J. Truran, A. G. W. Cameron and A. Gilbert . J. Vink et al. . S. Woosley and T. Weaver . S. Woosley, T. Axelrod and T. Weaver . [^1]: The 511 keV line of e$^+$-e$^-$ annihilation is, in fact, the first -ray line ever detected (Johnson et al. 1972), although its origin (probably related to the radionuclides of Table 1) and spatial distribution in the Galaxy are not well understood yet (see Kinzer et al. 2001, and references therein).
{ "pile_set_name": "ArXiv" }
Predicting common foldings of homologous RNAs. A new approach is proposed for determining common RNA secondary structures within a set of homologous RNAs. The approach is a combination of phylogenetic and thermodynamic methods which is based on the prediction of optimal and suboptimal secondary structures, topological similarity searches and phylogenetic comparative analysis. The optimal and suboptimal RNA secondary structures are predicted by energy minimization. Structural comparison of the predicted RNA secondary structures is used to find conserved structures that are topologically similar in all these homologous RNAs. The validity of the conserved structural elements found is then checked by phylogenetic comparison of the sequences. This procedure is used to predict common structures of ribonuclease P (RNAase P) RNAs.
{ "pile_set_name": "PubMed Abstracts" }
/**************************************************************************\ * Copyright (c) Kongsberg Oil & Gas Technologies AS * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are * met: * * Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * Neither the name of the copyright holder nor the names of its * contributors may be used to endorse or promote products derived from * this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. \**************************************************************************/ #ifndef COIN_SOSUBNODEENGINEP_H #define COIN_SOSUBNODEENGINEP_H // The macro definitions in this file is used internally by Coin // classes, and mirrors some of the public macros available in // SoSubEngine.h with a few modifications so they are suited for the // builtin classes. // // The macros in this file are not made visible for use by the // application programmer. #ifndef COIN_INTERNAL #error this is a private header file #endif // !COIN_INTERNAL #include <Inventor/engines/SoSubNodeEngine.h> #include "tidbitsp.h" // Be aware that any changes to the SO_ENGINE_INTERNAL_CONSTRUCTOR // macro should be matched by similar changes to the constructor in // the SO_INTERPOLATE_SOURCE macro (which have to use // SO_ENGINE_CONSTRUCTOR because it is "public"). // Update 2006-08-11, pederb: // The INIT_CLASS macros will now set the node type to VRML97. All // node-engines in Coin are VRML97 nodes. If we add node engines that // are not VRML97 nodes we need to add some new macros. #define SO_NODEENGINE_INTERNAL_CONSTRUCTOR(_class_) \ do { \ SO_NODEENGINE_CONSTRUCTOR(_class_); \ /* Restore value of isBuiltIn flag (which is set to FALSE */ \ /* in the SO_ENGINE_CONSTRUCTOR() macro). */ \ this->isBuiltIn = TRUE; \ } while (0) #define SO_NODEENGINE_INTERNAL_INIT_CLASS(_class_) \ do { \ const char * classname = SO__QUOTE(_class_); \ PRIVATE_COMMON_NODEENGINE_INIT_CODE(_class_, &classname[2], &_class_::createInstance, inherited); \ SoNode::setCompatibilityTypes(_class_::getClassTypeId(), SO_VRML97_NODE_TYPE); \ coin_atexit((coin_atexit_f*)_class_::atexit_cleanupnodeengine, CC_ATEXIT_NORMAL); \ coin_atexit((coin_atexit_f*)_class_::atexit_cleanup, CC_ATEXIT_NORMAL); \ } while (0) #define SO_NODEENGINE_INTERNAL_INIT_ABSTRACT_CLASS(_class_) \ do { \ const char * classname = SO__QUOTE(_class_); \ PRIVATE_COMMON_NODEENGINE_INIT_CODE(_class_, &classname[2], NULL, inherited); \ SoNode::setCompatibilityTypes(_class_::getClassTypeId(), SO_VRML97_NODE_TYPE); \ coin_atexit((coin_atexit_f*)_class_::atexit_cleanupnodeengine, CC_ATEXIT_NORMAL); \ coin_atexit((coin_atexit_f*)_class_::atexit_cleanup, CC_ATEXIT_NORMAL); \ } while (0) #endif // COIN_SOSUBNODEENGINEP_H
{ "pile_set_name": "Github" }
![](glasgowmedj75937-0073){#sp1 .153} ![](glasgowmedj75937-0074){#sp2 .154} ![](glasgowmedj75937-0075){#sp3 .155} ![](glasgowmedj75937-0076){#sp4 .156}
{ "pile_set_name": "PubMed Central" }
Q: Что я делаю не так? Есть вот такая функция - function getauth(account_id,session,callback){ make_key(account_id,function(err,result){ if(result!=null){ session.auth_key=result.toString('hex'); session.account_id=account_id; findclient({name:account_id},function(err,result){ if(err!=null){ console.log(err); }else{ console.log('Findlcient on getauth: sid='+result.accounts[0].sid+',token='+result.accounts[0].auth_token); session.account_sid=result.accounts[0].sid; session.account_token=result.accounts[0].auth_token; console.log(session); } }); callback(null,session.auth_key); }else{ callback(err,null); } }); } В результате её выполнения почему-то console.log(session) отдает всё как надо: { cookie: { path: '/', _expires: null, originalMaxAge: null, httpOnly: true }, auth_key: 'c684c0bf8139fc3903ffcdb7b25180544f8f408a79aceeb4952d315a49627b80', account_id: 'ss', account_sid: 'ACba7f95311673301adf8203bda6ebd01f', account_token: '860c23f6afdb7e05163fe0374a94c55c' } но в Mongo я вижу только это - { cookie: {"originalMaxAge":null,"expires":null,"httpOnly":true,"path":"/"}, "auth_key":"c684c0bf8139fc3903ffcdb7b25180544f8f408a79aceeb4952d315a49627b80", "account_id":"ss" } Как мне всё же заставить записаться недостающие два поля? PS: модули: var express = require('express'); var session = require('express-session'); var MongoStore = require('connect-mongo')(session); A: По какой-то причине express-session не замечает изменения объекта session. Попробуйте принудительное сохранение session.save().
{ "pile_set_name": "StackExchange" }
The new facility for GSU's Theatre and Art Departments houses a black box theatre, two student art galleries and the Georgia Artists Gallery designed to accommodate exhibits of local artists. ​ The primary circulation element is a two-story, wedge shaped atrium with a vaulted roof soaring over 30 feet above the second level. The atrium is designed to bring natural daylight into the art galleries, as well as serving as the primary entrance for both levels of the building.
{ "pile_set_name": "Pile-CC" }
The backcourt will win championships in the Missouri Valley and Bradley boasts a couple of the best in the conference. Point guard Daniel Ruffin and wing Jeremy Crouch both averaged 13.8 points per game last season and are quality shooters. Crouch is one of the best in the nation and shot 50 percent from long range and made over three per game. Ruffin is a smart floor leader and averaged 5.4 assists and only 2.4 turnovers per game. Who’s Out: Ruffin and Crouch do lose their backcourt mate and the team’s leading scorer Will Franklin. Franklin was the third dangerous threat from three-point land and averaged 14.6 points per game on the season. Fellow starting guard J.J. Tauai has also run out of eligibility. Tauai, the fourth of last year’s starting guards if you are keeping track, was never a great scorer, but he was a solid defender and did a lot of work on the glass despite his 6-3 stature. The big man around those four guards is also gone. Zach Andrews averaged 11.1 points and a team-high 7.0 rebounds during his senior campaign. Forward Danny Adams was usually one of the first players off the bench and little used guard Saihou Jassey has transferred to SIU-Edwardsville. Who’s In: Despite all the losses, four junior college transfers are expected to use their experience and contribute immediately. The frontcourt needs the most help and David Collins and Rashad Austin fit the bill. Collins, a seven-footer, is a decent rebounder and shot blocker and will at least be a big body off the bench. It is Austin who is garnering larger expectations after averaging 13.3 points and 7.9 rebounds at Northeastern Junior College in Colorado. However, at 6-7, Austin is not the biggest of big men around. Theron Wilson will do a little bit of everything and the 6-5 wing will be effective inside and outside, on offense and defense. Guard Tyron Cole-Scott is a terrific scorer. He scored nearly 1,100 points during his junior college career and will continue to shoot lights out from anywhere on the floor. The only knock on the Waterloo, Iowa native is his height. At 5-10 he may have more trouble finding clean looks in the MVC than he did at the junior college level. That fills all the holes Bradley was concerned about this year, but a few other newcomers will help build for the future. Center Anthony Thompson needs to put on a little weight, but he is a good athlete who can hit the mid-range jumper. For now, it will be his defensive presence that moves him up the depth chart. Will Egolf is another versatile big man who can handle the ball, but it will be difficult for the incoming freshmen to see many minutes in a suddenly crowded frontcourt. Point guard Sam Maniscalco will learn behind Ruffin, but the 6-0 Chicago product is mentally and physically prepared to earn some quality minutes as a backup. Coach Jim Les ran a two point guard offense last year and it is not out of the question that Maniscalco could see some minutes on the court at the same time as Ruffin as well. Who to Watch: Matt Salley was a junior college transfer and had a decent campaign his first year in Peoria. The 6-7 forward started 13 games and, with a more traditional lineup expected, Salley should step into a starting position at the four spot. Salley is a strong rebounder and can step outside and hit the jumper. His versatility and upside could turn into a big, big season for the senior. The only other returning player up front is Sam Singh. The 6-9, 266 pound junior has struggled with injuries much of his career but, if healthy, Singh could develop into a quality reserve. Final Projection: Andrew Warren had a good freshman season and will battle with the newcomers for minutes on the wing. He only averaged 4.1 points per game, but Warren is a quality scorer and could drastically increase that number with the increase in playing time he will most certainly see this season. The only thing stopping Bradley from being really, really good is fitting all the new faces together. Once everybody learns their roles, the Braves are good enough to win the conference and make some noise in the NCAA Tournament. SPONSORS About Joel Welser ColumnistCollege Preview Editor Contactjwelser@collegehoops.net Background "Joel Welser does a tremendous job covering college basketball. He gives his readers knowledgeable and insightful information on college hoops." -Ernie Zeigler, Head Basketball Coach, Central Michigan University "Joel Welser writes clean, knowledgeable copy that always hits deadline." -Greg Eno, former editor-in-chief, Motor City Sports Magazine Growing up in Michigan, Joel Welser inherited a love for Big Ten sports. After defying all family traditions and not going to Michigan State, Joel headed out west to earn his bachelor degree from California State University, Northridge in Cinema Television Arts, specializing in screenwriting. For reasons still unknown, after his stint in Hollywood, Joel headed back to Michigan where he remains to this day complaining about the cold. Joel has found a successful formula with the popular top 144 series at collegehoops.net and has also written college football and college basketball previews and articles for various websites and magazines.
{ "pile_set_name": "Pile-CC" }
KODL KODL (1440 AM) is a radio station licensed to serve The Dalles, Oregon, United States. The station, which began broadcasting in October 1940, is currently owned by Larson-Wynn, Inc. The station was assigned the KODL call sign by the Federal Communications Commission (FCC). Programming KODL broadcasts an oldies music format featuring the "Good Time Oldies" satellite-fed programming service from Westwood One. In addition to its usual music programming, KODL airs hourly newscasts from CBS News, a one-hour block of news each weekday morning, a daily tradio program called "The KODL Trading Post", Dave Ramsey's Daily Money Makeover, the "KODL Coffee Break" daily talk show, a one-hour noon newscast, the Northwest Regional edition of The Lars Larson Show, and one hour of news each weekday evening with a mix of local and national programming. KODL also airs Oregon State Beavers football and Seattle Seahawks games. History Western Radio Corporation's KODL began broadcasting in October 1940, although sources differ on whether these broadcasts began on October 12, October 19, or October 20th. The station originally broadcast on a frequency of 1230 kHz with 250 watts of power during the day and 100 watts at night. KODL originally aired a mix of recorded and live popular music, including a number of local musical talents. The station changed broadcast frequencies to 1440 kHz and was allowed to increase its signal strength to 1,000 watts, day and night, beginning in 1955. KODL's founder and Western Radio Corporation owner, V. Barney Kenworthy, sold the station to the Sterling Recreation Organization in September 1967. The Seattle-based SRO immediately flipped KODL's format to rock music. In late 1973, Sterling owner Fredric A. Danz had the station's call sign changed to KGLX and flipped the format to a "contemporary gold" music mix. The station was acquired by Larson-Wynn, Inc., on September 1, 1974. The new owners immediately restored the historic KODL call sign and began broadcasting a mix of rock and middle of the road music. In the late 1970s, KODL received permission from the FCC to increase its daytime signal strength to 5,000 watts while maintaining its 1,000 watt signal at night. By 1979, KODL would be playing a pure MOR format but in 1982, in the wake of Urban Cowboy and the sudden growth in country music, KODL switched to a country music format. From 1940 to 1999, KODL broadcast from a studio building and tower located on west Scenic Drive. Since 1999, KODL's studios have been located in downtown The Dalles. In 2000, KODL switched musical formats to a satellite-delivered adult standards and nostalgia format branded as "America's Best Music". Former on-air staff Paul E. Walden worked at KODL for 27 years, more than 20 of them as station manager, and served as the president of the Oregon Association of Broadcasters from 1954 to 1956. He later purchased KIHR in Hood River, Oregon, and establish KCGB-FM, during his 48-year career in broadcasting as an announcer, manager, and engineer. Walden also served three terms as a member of the Oregon House of Representatives in the 1970s. Previous logo References External links KODL official website ODL Category:Oldies radio stations in the United States Category:Radio stations established in 1940 Category:Wasco County, Oregon Category:1940 establishments in Oregon
{ "pile_set_name": "Wikipedia (en)" }
Liverpool: Liverpool manager Jurgen Klopp has termed Sunday's Premier League meeting with Tottenham Hotspur as a 'six-point' clash but believes his team hold the advantage with the game being played at Anfield. In-form Liverpool are unbeaten in 14 league games but face a tough challenge against a Tottenham team high on confidence after their dominant 2-0 win over second-placed Manchester United in midweek. File image of Liverpool manager Jurgen Klopp. AFP "These are 'six-point' games and the only advantage one team can have in a situation like this is to play at home, at Anfield in this case," Klopp said. "That's really good and I'm looking forward to it." Liverpool are third in the league with 50 points and ahead of champions Chelsea on goal difference while Tottenham are two points behind as they target a Champions League spot. "With the situation in the table, our targets and what we want to do and where we want to finish the season, it is clear it is a very important game," Klopp said. Asked about winger Sadio Mane, who has scored two goals in his last four league games but missed chances in the 3-0 victory over Huddersfield Town, Klopp said, "Even if Sadio is not at his best, he is still a threat for the other team. "Mane had the two biggest chances in Huddersfield and didn't score. No problem when you win 3-0. You need to carry on. "You have to go through. You have to build on the good things and work on the not-so-good things. Sadio on an average day is still a fantastic player, that's the good news." Klopp said he was pleased with new signing Virgil van Dijk's progress in his first month at Merseyside. "We will all see Van Dijk at his best after the summer but we don't have the time to wait until then, why should we? He can bring a lot of things in already and that's good."
{ "pile_set_name": "Pile-CC" }
<?php /** * PHPCI - Continuous Integration for PHP * * @copyright Copyright 2014, Block 8 Limited. * @license https://github.com/Block8/PHPCI/blob/master/LICENSE.md * @link https://www.phptesting.org/ */ namespace PHPCI\Helper; /** * User Helper - Provides access to logged in user information in views. * @author Dan Cryer <dan@block8.co.uk> * @package PHPCI * @subpackage Web */ class Build { /** * Returns a more human-friendly version of a plugin name. * @param $name * @return mixed */ public function formatPluginName($name) { return str_replace('Php', 'PHP', ucwords(str_replace('_', ' ', $name))); } }
{ "pile_set_name": "Github" }
Earth worms were considered to be one of the most most important forms of workhorses of and in the soil. Temperature, moisture, organic carbon and tillage practices were cited as affecting earthworm populations. Non-tilled areas of North Dakota possessed the highest earthworm populations.
{ "pile_set_name": "Pile-CC" }
# Default values for node projects. # This is a YAML-formatted file. # Declare variables to be passed into your templates. replicaCount: 1 image: repository: draft tag: dev pullPolicy: IfNotPresent service: name: activiti-modeling-app type: ClusterIP externalPort: 80 internalPort: 8080 annotations: fabric8.io/expose: "true" fabric8.io/ingress.annotations: "kubernetes.io/ingress.class: nginx" resources: limits: cpu: 400m memory: 256Mi requests: cpu: 200m memory: 128Mi probePath: / livenessProbe: initialDelaySeconds: 60 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 readinessProbe: periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 terminationGracePeriodSeconds: 10
{ "pile_set_name": "Github" }
Q: OpenCV 3.0.0 with Xcode 6.3 I'm trying to compile a simple opencv code using Xcode but I'm getting a compilation error. The opencv version is 3.0.0 and Xcode version is 6.3 (OS X 10.10.3) In Xcode, Apple LLVM 6.1 Language C++ settings are: c++ Language Dialect : C++11[-std=c++11] c++ Standard Library : libc++ the error is: Undefined symbols for architecture x86_64: "cv::imread(cv::String const&, int)", referenced from: _main in main.o ld: symbol(s) not found for architecture x86_64 clang: error: linker command failed with exit code 1 (use -v to see invocation) When I change the c++ standard library to libstdc++, then the error was: /usr/local/include/opencv2/hal/defs.h:271:14: 'cstdint' file not found Can someone show me how to get opencv work with Xcode? I've already followed lot of forums and guides but still getting the same error. A: I had the same problem, either I got the "Undefined symbols x86_64" with libc++, or "cstdint file not found" with libstdc++. What finally made it work for me was that I needed to add a lot more libs than I'm used to, it wasn't enough to add just core, imgproc, and highgui for even a simple project. So I went to Build Settings, searched for Linking, and in Other Linker Flags I added the whole lot: -lopencv_calib3d -lopencv_core -lopencv_features2d -lopencv_flann -lopencv_highgui -lopencv_imgcodecs -lopencv_imgproc -lopencv_ml -lopencv_objdetect -lopencv_photo -lopencv_shape -lopencv_stitching -lopencv_superres -lopencv_ts -lopencv_video -lopencv_videoio -lopencv_videostab I'm using OpenCV 3.0.0 and Xcode 6.4. C++ Standard Library set to libc++ and C++ Language Dialect C++11. Hope this helps!
{ "pile_set_name": "StackExchange" }
Lithuanian Electricity Association Lithuanian Electricity Association was established on 5 June 1998. It consist of 45 electricity production, transmission, distribution, energy supply companies, construction organizations and other associated power structures as well as individual economic operators involved in energy production, supply and power facilities design activities. In 2001, LEA was one of the members who founded Lithuanian Committee for World Energy Council that represents Lithuania in World Energy Council. See also National Lithuanian Electricity Association References External links Official website Category:Trade associations based in Lithuania Category:Electric power companies of Lithuania Category:1998 establishments in Lithuania
{ "pile_set_name": "Wikipedia (en)" }
1. Field of the Invention Embodiments disclosed herein generally relate to wellbore fluids for forming and subsequently removing filtercake residue from subterranean formations. 2. Background Art During the drilling or completion of an oil and gas well, the walls of oil and gas formations are often exposed to wellbore fluids which may damage producing formations. To prevent such damage, a wellbore often requires the deposit of a low-permeability filtercake on the walls of the wellbore to seal the permeable formation exposed by the drilling operation. The filtercake functions to limit drilling fluid losses from the wellbore as well as protect the formation from possible damage by the fluids filtering into the walls of the wellbore. Solids, such as particulate fines, suspended in the drilling fluid may also contribute to damaging hydrocarbon producing formations. To protect formations from damaging fluids and solids, a filtercake is formed and/or deposited on the surface of the subterranean formation. Filtercakes are formed when particles suspended in a wellbore fluid coat and plug the pores in the subterranean formation such that the filtercake prevents or reduce both the loss of fluids into the formation and the influx of fluids present in the formation. A number of ways of forming filtercakes are known in the art, including the use of bridging particles, cuttings created by the drilling process, polymeric additives, and precipitates. Fluid loss pills may also be used where a viscous pill comprising a polymer may be used to reduce the rate of loss of a wellbore fluid to the formation through its viscosity After drilling or completion operations have been completed, removal of filtercake (formed during drilling and/or completion) remaining on the sidewalls of the wellbore may be necessary. Although filtercake formation and use of fluid loss pills are essential to drilling and completion operations, the barriers can be a significant impediment to the production of hydrocarbon or other fluids from the well if, for example, the rock formation is still plugged by the barrier. Because filtercake is compact, it often adheres strongly to the formation and may not be readily or completely flushed out of the formation by fluid action alone. Typically filtercake residue is removed by filling the open hole section with a clean up fluid (often referred to as a breaker fluid) that attacks the filtercake. In some situations, such as wells with gravel packed completions or other types of screen/slotted liners, ensuring that the treatment effectively contacts the filtercake on the wellbore face can present challenges. For example, in the case of unconsolidated formations, where it is often desirable to gravel pack the wellbore after drilling an interval but before the filtercake is completely removed, the act of gravel packing the wellbore may further limit the fluid's contact with the filtercake, as it both reduces the physical volume of fluid that can be present in the zone and restricts direct flow to the filtercake. As a consequence, the effectiveness of the breaking of the filtercake is dramatically reduced. One of the most problematic issues that exist with many of the methods used by the prior art references in removing the filtercake downhole, includes the problem of controlling the breaking of the filtercake so that production fluids may not enter the wellbore before the entire, or at least most, of the filtercake is degraded. When degrading a filtercake with a breaker fluid, the breaker fluid may not have completely covered the entire interval of exposed formation, causing premature flowing of production fluids or the loss of breaker fluids into the formation from one portion of the interval before another portion has even been exposed to breaker fluid. Accordingly, there exists a continuing need for wellbore fluids that effectively remove filtercake residue and debris in subterranean formations after drilling or completing a well.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Call the JFrame from another class i have simple JFRAME (create by Netbeans) and i want to call frame.setState(Frame.NORMAL) from another class. How to do call? public class Myclass{ public void Frame_normal{ ...? ???frame.setState(Frame.NORMAL); } } A: Basicaly you create an attribute in your class and you give it the reference to your JFrame. public class Myclass{ JFrame frame; public MyClass(JFrame aFrame){ this.frame = aFrame; } public void Frame_normal{ frame.setState(Frame.NORMAL); } } MyClass class = new Myclass(theJFrame); class.Frame_normal();
{ "pile_set_name": "StackExchange" }
Sylan Esso have just announced a series of six special shows happening this fall in four cities where they'll be collaborating with some of their friends and favorite musicians, including singer Amelia Meath's two Mountain Man bandmates. "We asked 8 of our favorite musicians to join us on 'WITH', a short run of shows we're playing this fall," say Sylvan Esso, adding, "We'll be playing our songs like we've never played them before." Details are still forthcoming but they have announced the dates and who's opening each show: Los Angeles' Walt Disney Concert Hall on November 14 with Hand Habits, then two nights at NYC's Beacon Theatre on November 17 & 18 with Daughter of Swords (aka Alexandra Sauser-Monnig of Mountain Man), Nashville's Ryman Auditorium on November 20 with Flock of Dimes (Jenn Wasner of Wye Oak), and finally two nights at Durham, NC's DPAC on November 22 & 23 with Molly Sarlé of Mountain Man. Tickets for the NYC, Nashville and Durham shows shows go on sale Friday, February 22 at 10 AM local time, and the Los Angeles show goes on sale Friday at 8 AM Pacific. There's a Sylvan Esso presale for all dates starting Thursday (2/21) at 11 AM locale time -- sign up for their mailing list for the presale password. Hand Habits' new album is out March 1; Flock of Dimes just released a new single; and Molly Sarle has a new album on the way, and Mountain Man have shows too. All WITH dates are listed, along with a stream of Sylvan Esso's 2017 album What Now, below. SYLVAN ESSO PRESENTS “WITH” TOUR DATES: 11/14 - Los Angeles, CA - Walt Disney Concert Hall * 11/17 - New York, NY - The Beacon Theatre ^ 11/18 - New York, NY - The Beacon Theatre ^ 11/20 - Nashville, TN - The Ryman Auditorium # 11/22 - Durham , NC - DPAC % 11/23 - Durham, NC - DPAC % * with Hand Habits ^ with Daughter of Swords # with Flock of Dimes % with Molly Sarlé
{ "pile_set_name": "OpenWebText2" }
1. Field of the Invention The present invention relates to a printed circuit board having fuse housings; and an electric junction box for vehicles that houses a printed circuit board having fuse housings. More particularly, output terminals, which project into the fuse housings provided in a plurality of tiers in the electric junction box, include terminals projecting from the printed circuit board housed in the electric junction box; and input terminals include terminals extending from bus bars. 2. Description of Related Art Japanese Patent Laid-open Publication No. 2006-187052 discloses a conventional electric junction box of such a type, wherein terminals connected to a printed circuit board housed therein project inside a fuse housing. For such an electric junction box, the terminals are fixed to a fuse holder in advance, and the fuse holder to which the terminals are fixed is mounted on the printed circuit board. When mounted on the printed circuit board, the fuse holder is positioned thereon, thereby allowing the terminals fixed to the fuse holder to accurately fit onto and pass through terminal holes in the printed circuit board. The terminals passed through the respective terminal holes are then fixed with soldering, press-fitting, or the like. Further, when the printed circuit board is positioned horizontally in the electric junction box, and the terminals projecting into the fuse housing project into the fuse housing provided on a side surface of the electric junction box, the terminals are passed through and fixed to the fuse holder, and then are bent orthogonally, so that the other end is connected to the printed circuit board. When fuse housings are provided in a plurality of tiers, and a fuse is included having an allowable current capacity of 15 A or less, however, it is difficult to form an input terminal of the fuse as a terminal projecting from the printed circuit board, since the current capacity of the terminal connected to the printed circuit board is small. Conversely, when a fuse having greater than 15 A is used, an input terminal, similar to an output terminal, can be formed of a terminal connected to the printed circuit board and project into the fuse housings. As described above, when fuses having different capacities are provided in the fuse housings having a plurality of vertically-stacked tiers, it is difficult to press-fit or insert-form a bus bar terminal, which has a large and complicated shape, into a fuse holder (fuse case) in advance, and then to bend the bus bar to into an L shape.
{ "pile_set_name": "USPTO Backgrounds" }
Brown is the new black. At least that’s what Skoda would like you to think, as it launches the all-new Octavia Laurin & Klement. Slotting in neatly as the flagship of the Octavia range, the Laurin & Klement features what Skoda is calling “an exclusive and luxurious brown L&K interior”. It certainly makes a change from sombre grey or standard black. The Octavia Laurin & Klement is offered in both hatchback or estate body styles, with a choice of either the 1.8-litre TSI petrol engine or the 2.0-litre TDI. Both are offered with either a six-speed manual gearbox or DSG automatic. There’s no 4×4 option available on the hatchback, but anyone requiring some extra traction from their Laurin & Klement may wish to the consider the 4×4 estate which – at £28,665 – is the most expensive Octavia you can buy. It’s available with the 2.0-litre TDI engine. The top trim Octavia feels a world away from the entry-level 1.2-litre S model, which can be yours for just £16,310. But it shows the strength and confidence of the Skoda brand that it can launch a Golf-based car for a price knocking on for £30,000. And with 590 litres of luggage space in the hatch, a 5-star Euro NCAP safety rating and generous levels of equipment, it might just be the UK’s ultimate family car. And who said family cars can’t have brown interiors? About Motoring Research Motoring Research is a multimedia publisher that’s been delivering the goods to clients since 1986. We are growing fast, developing the Motoring Research Network of freelancers around our highly experienced in-house team. Together, we have more than half a century’s experience of motoring journalism…
{ "pile_set_name": "Pile-CC" }
Additive effect of glucan and streptozotocin on endotoxicosis in mice. Mice were sensitized to endotoxin lethality after pretreatment with either glucan, or a single intraperitoneal injection of streptozotocin (SZN); the effect of glucan plus SZN was clearly additive. Triamcinolone acetonide (TA) protected animals under all these conditions. SZN alone did not influence the activity of the reticuloendothelial system (RES) in either normal or glucan-injected mice. TA actually diminished the RES activation as a result of glucan pretreatment and this was also true in normal mice. Within 4 h, SZN and/or TA did not influence glycaemia in either normal or glucan-injected animals. Endotoxin very quickly depressed glycaemia and this was unaltered when various combinations of TA and SZN were given with the toxin in glucan-pretreated mice. Glucan and/or SZN did not influence basal liver carbohydrate levels but TA induced liver glycogen within 4 h in glucan-injected mice, even in presence of SZN. Endotoxin depleted liver carbohydrates within 4 h and these could not be increased even by a dose of TA that fully protected against death. These observations stress the need to redefine the hypotheses regarding the mechanism of action of bacterial endotoxins.
{ "pile_set_name": "PubMed Abstracts" }
--- author: - | Predrag Prester\ Max Planck Institute for Gravitational Physics (Albert Einstein Institute)\ Am Mühlenberg 1, D-14476 Golm, Germany\ \ Theoretical Physics Department, Faculty of Natural Sciences and Mathematics\ p.p. 331, HR-10002 Zagreb, Croatia\ \ E-mail: title: Lovelock type gravity and small black holes in heterotic string theory --- Introduction ============ Recently black holes in heterotic string theory had attracted a lot of attention[^1]. Special class are 2-charge small black holes. On the string side these black holes should correspond to perturbative half-BPS states of heterotic string compactified on $T^{9-D}\times S^1$, with momentum and winding on $S^1$ equal to $n$ and $w$, respectively, for which one can easily calculate asymptotic expression ($n,w\gg1$) for the number of states [@DabHar89; @DaGiHaRR90]. Logarithm (which is the entropy in microcanonical ensamble) is in the leading order given by $$\label{entropy} S=4\pi\sqrt{nw}$$ This result, obtained for a free string, due to supersymmetry remains to be valid after switching on the string coupling $g_s$. Now, as the string coupling is increased, at one point de Broglie-Compton wavelength $1/M$ becomes smaller then the corresponding Schwarzschild radius $\ell_P^2 M \sim g_s^2 \alpha' M$, which should lead to formation of (extremal) black hole. This is a one way to argue that elementary string states with mass large enough should describe black holes [@thoft90; @sussk93; @SusUgl94; @HorPol96]. Indeed, exact black hole solutions of the low energy effective action of heterotic string theory in the leading order in $\alpha'$ were found which decribe D-dimensional extremal black holes with “correct” quantum numbers (e.g., they have two electric charges proportional to $n$ and $w$) [@sen9411; @peet95]. They are in some sense pathological having null singularities and zero horizon area[^2]. This implies vanishing Bekenstein-Hawking entropy which is obviously in disagreement with the string result (\[entropy\]). To understand what is happening, one should go back to the derivation of (\[entropy\]) – and to see that although it is perturbative in string coupling, it is [*nonperturbative*]{} in $\alpha'$. This means that on the gravity side one should start from the complete tree-level (in string coupling) effective action which contains all $\alpha'$ higher-derivative corrections. This is also visible from the structure of the solution in the leading order – singularity of the horizon implies that one cannot neglect higher curvature terms (or treat them as perturbation) in the efective action near the horizon, as it is usually done for large black holes. In fact, a priory all terms should be of the same importance. The remarkable property of small black holes is that they give us some information on the [*complete*]{} tree-level (in string coupling) effective action. In [@dabh0409; @DakaMa04; @sen0411; @HuMaRa04; @sen0502; @sen0504] it was shown in $D=4$ that adding to the action just one type of the higher-derivative terms, obtained by supersymmetrizing square of the Weyl tensor [@CaWiMo98; @CaWiKaMo99; @CaWiKaMo00], one obtains that corrected black holes have regular horizon of $AdS_2\times S^2$ type, for which generalised Wald entropy formula[^3] [@wald93; @IyWa94; @JaKaMy94] gives a desired result (\[entropy\]). This result is at the same time exciting and mysteriuos, because there is no apparent reason why should only terms quadratic in curvature contribute to the entropy, with all higher-order terms somehow cancelling.[^4] It is important to note that for the entropy one only needs behaviour of the solution near the horizon, so this cancelation could just appear there (as a consequence of the $AdS_2\times S^2$ geometry). Indeed, numerical extrapolations to the far-away region show that solution does not aproach to Schwarzschild solution but has oscillating behaviour connected with spurious degrees of freedom typicaly present in higher order gravity theories [@sen0411; @HuMaRa04]. This could suggest that other higher order terms become important away from horizon. A natural question is what is happening in $D>4$? Unfortunately, it is imposible to perform the same analysis, as it is not known how to supersymmetrize $R^2$-terms in the action. In lack of this, Sen [@sen0505] took as a “toy-model” just the gravitational part, which is proportional to Gauss-Bonnet density[^5], and analysed near-horizon behaviour of the solution (for which he assumed $AdS_2\times S^{D-2}$ geometry). Although this action is not supersymmetric, surprisingly, Wald entropy formula again gave (\[entropy\]), now in $D=4$ and $D=5$ (but not for $D\ge6$). Even more surprisingly, in the recent paper [@sen0508], it was shown that for the same type of the action, applied to the large class of 8-charge black holes in $D=4$, entropy, near horizon metric, gauge field strengths and the axion-dilaton field are identical to those obtained in [@CaWiMo9906; @CaWiKaMo04] from a supersymmetric version of the theory based on squared Weyl tensor. In this paper we extend Sen’s analysis of two-charge black holes to any number of dimensions $D\ge4$. For the effective action near the horizon we take obvious generalisation, i.e., we use extended Gauss-Bonnet densities as higher-order terms in curvature [@love71; @love72]. These “Lovelock type” actions have several appealing properties, e.g, they are of the first order (no ghosts or spurious states [@zwibach85; @zumino86]), have good boundary value problem, and contain only finite number of terms. We perform near horizon analysis assuming $AdS_2\times S^{D-2}$ geometry and, using Wald formula, calculate entropy, which has a complicated dependance on $D$ and[^6] $[D/2]$ coupling constants[^7] $\lambda_m$. We show that there is a unique choice for $\lambda_m$ (independent of $D$) which gives exactly the expression (\[entropy\]) in [*any*]{} $D$. It should be emphasized that this is a nontrivial result, in the sence that to fix the entropy for $D$ black holes one has only $[D/2]$ free parameters to play with (or, in other words, for each couple of dimensions enters only one parameter). This result trivially extends to black holes with more electric charges, connected with heterotic string compactifications on $M_D\times T^{10-D-k}\times (S^1)^k$. Effective action with extended Gauss-Bonnet terms ================================================= We are interested in heterotic string compactified on $T^{9-D}\times S^1$, for which effective low energy action in the leading order in string coupling can be written in the form $$\label{treeea} S = \frac{1}{16\pi G_N} \int d^Dx \sqrt{-g} \,S \sum_{m=1} \alpha'^{m-1} \mathcal{L}_m$$ where $S$ is the dilaton field, which is connected to the effective closed string coupling constant $g$ by $S=1/g^2$. Leading order term in $\alpha'$ is given by [@sen0505] $$\label{alpha0} \mathcal{L}_1 = R + S^{-2}(\nabla S)^2 - T^{-2}(\nabla T)^2 - T^2 \left(F_{\mu\nu}^{(1)}\right)^2 - T^{-2} \left(F_{\mu\nu}^{(2)}\right)^2$$ where we assumed that all other fields are vanishing. In this order exact half-BPS electricaly charged extremal black hole solutions in any $D$ were found [@peet95] which have the same quantum numbers as perturbative half-BPS string states (where two electric charges are proportional to momentum and winding of the string along $S^1$). These solutions have singular horizon (null singularity) with a vanishing area, on which effective string coupling also vanishes. This properties are in contrast with what one expects from string theory, which for example gives the nonvanishing result for the entropy (\[entropy\]). It is obvious what is wrong in the above analysis. As the horizon is singular, the curvature invariants (and some other fields like $S$) are also, which means that in the effective action (\[treeea\]) one cannot neglect higher-order terms which typicaly contain higher powers and/or derivatives of the Riemann tensor. In $D=4$ dimensions it was shown in [@dabh0409; @DakaMa04; @sen0411; @HuMaRa04] that if one adds a particular class of higher-derivative terms (obtained by supersymmetrization of the square of the Weyl tensor), corrections completely change the nature of singularity - one gets timelike singularity hidden behind a horizon with the finite area. Also, the dilaton field $S$ becomes finite on the horizon, which means that effective string coupling is nonvanishing. Using Wald formula it was shown that the entropy is equal to the string result (\[entropy\]). Now, the mystery is why other terms, which are known to be present in the effective action (especially ones containing higher powers of the Riemann tensor), are appearing to be irrelevant for the entropy calculation. One way to understand what is happening would be to make the same analysis in higher dimensions. Unfortunately, for $D>4$ supersymmeric version of the action containing curvature squared terms is not known. In lack of this, in [@sen0505] Sen took as a toy model an action obtained by adding just the Gauss-Bonnet term. Although this action is not supersymmetric, from the near horizon analysis he obtained that the entropy is again given by (\[entropy\]), but only in $D=4,5$. Now, the interesting thing is that in $D=6$ a next extended Gauss-Bonnet term is present, so the natural question to ask is what is happening if we include in the action all extended Gauss-Bonnet terms. That is the main subject of this paper. We propose to analyse the actions of the Lovelock type where higher order terms in $\alpha'$ in (\[treeea\]) are given by the extended Gauss-Bonnet densities [@love71; @love72] $$\label{lgbm} \mathcal{L}_m = \lambda_m \mathcal{L}^{GB}_m = \frac{\lambda_m}{2^{m}} \, \delta_{\mu_1\nu_1\ldots\mu_m\nu_m}^{\rho_1\sigma_1\ldots \rho_m\sigma_m} \, {R^{\mu_1\nu_1}}_{\rho_1\sigma_1}\cdots {R^{\mu_m\nu_m}}_{\rho_m\sigma_m}\;, \qquad m=2,\ldots,[D/2]$$ where $\lambda_m$ are some (at the moment free) dimensionless parameters, $\delta_{\alpha_1\ldots\alpha_k}^{\beta_1\ldots\beta_k}$ is totally antisymmetric product of $k$ Kronecker deltas, normalized to take values 0 and $\pm 1$, $[x]$ denote integer part of $x$, and all greek indeces are running from 0 to $D-1$. Extended Gauss-Bonnet densities $\mathcal{L}^{GB}_m$ are in many respects generalisation of the Einstein term (note that $\mathcal{L}^{GB}_1=R$). Especially, $m$-th term is topological in $D=2m$ dimensions. Also note that they identicaly vanish for $m>[D/2]$, so for any $D$ there is a finite number of terms in the action. Near horizon analysis ===================== We want to study solutions of the action given by (\[treeea\]–\[lgbm\]) which should be deformations of the exact small black hole solutions obtained in lowest order in $\alpha'$. We do not know how to exactly solve equations of motion, but we are primarly interested in the entropy which is given by the Wald formula [@wald93; @IyWa94; @JaKaMy94] $$\label{wald} S = 2\pi \int_\mathcal{H} \hat{\epsilon} \, \frac{\partial\mathcal{L}}{\partial R_{\mu\nu\rho\sigma}} \eta_{\mu\nu}\eta_{\rho\sigma}$$ Important here is to notice that integration is done on the cross section of the horizon $H$, so to calculate the entropy one only needs to know a solution near the horizon. Now, in [@sen0506] it was shown that symmetries of the horizon can enormously simplify calculation of the entropy. In $D=4$ case it was shown that near horizon geometry is of $AdS_2 \times S^2$ type, where effect of $\alpha'$ corrections was to make radius of horizon nonvanishing. Following [@sen0505] we conjecture that the same happens in $D>4$ so the near horizon geometry should be $AdS_2 \times S^{D-2}$. This implies that near the horizon fields have the following form $$\begin{aligned} && ds^2 = g_{\mu\nu}\, dx^\mu dx^\nu = v_1 \left( -x^2 dt^2 + \frac{dx^2}{x^2} \right) + v_2\,d\Omega_{D-2}^2 \nonumber \\ && S = u_S \nonumber \\ && T = u_T \nonumber \\ && F_{rt}^{(i)} = e_i \;, \qquad i=1,2 \label{horfie}\end{aligned}$$ where $v_i$, $u_S$, $u_T$, $e_i$ are constants, and moreover that the covariant derivatives of the scalar fields $S$ and $T$, the gauge fields $F_{\mu\nu}^{(i)}$ and the Riemann tensor $R_{\mu\nu\rho\sigma}$ vanish on the horizon $x=0$. This makes solving the equations of motions (EOM’s) near the horizon (i.e., finding $v_i$, $u_S$, $u_T$ and $e_i$) very easy. One first defines $$\label{fuve} f(\vec{u},\vec{v},\vec{e}) = \int_{S^{D-2}} \sqrt{-g} \, \mathcal{L}$$ where the integration is over $S^{D-2}$, and one uses (\[horfie\]). Equations of motion are near the horizon given by $$\label{eom} \frac{\partial f}{\partial u_S}=0 \;,\qquad \frac{\partial f}{\partial u_T}=0 \;,\qquad \frac{\partial f}{\partial v_1}=0 \;, \qquad \frac{\partial f}{\partial v_2}=0$$ Notice that configuration (\[horfie\]) solves EOM’s for gauge fields identicaly on the horizon for any $e_i$. We also need to know electric charges $q_i$. In [@sen0506] it was shown that they are given by $$\label{charge} q_i = \frac{\partial f}{\partial e_i} \;,\qquad i=1,2$$ We would also like to connect conserved charges (\[charge\]) with corresponding quantum numbers of half-BPS states of heterotic string, which are momentum $n$ and winding $w$ around $S^1$. This is given by [@sen0508] $$\label{q-nw} q_1 = \frac{2\,n}{\sqrt{\alpha'}} \;,\qquad q_2 = \frac{2\,w}{\sqrt{\alpha'}}$$ It was shown in [@sen0506] that the entropy for the configuration (\[horfie\]) is given by $$S = 2\pi \left( \sum_{i=1}^2 e_i \, q_i - f \right)$$ For the actions of the type (\[treeea\]) EOM for dilaton $S$ implies that $f$ vanishes on-shell near the horizon, so we have just $$\label{ent} S = 2\pi \sum_{i=1}^2 e_i \, q_i$$ Entropy of small black holes ============================ We now apply procedure from the previous section to analyse extremal small black hole solutions in $D$ dimensions, with the $AdS_2\times S^{D-2}$ horizon geometry, when the action is given by (\[treeea\]–\[lgbm\]). First we need to calculate function $f$ (\[fuve\]) using (\[horfie\]). It was shown [@PP02] that for the metrics of the type $$\label{gsph} ds^2 = \gamma_{ab}(x) dx^a dx^b + r(x)^2 d\Omega_{D-2}\;,\qquad a,b=1,2$$ the Gauss-Bonnet densities, integrated over the unit sphere $S^{D-2}$, give $$\begin{aligned} \label{lmint} \int_{S^{D-2}} \sqrt{-g}\,\mathcal{L}_m &=& - \Omega_{D-2} \lambda_m \frac{(D-2)!}{(D-2m)!} \sqrt{-\gamma}\,r^{D-2m-2} \left[1-(\nabla r)^2\right]^{m-2} \nonumber \\ &&\times \bigg\{ 2m(m-1)r^2\left[(\nabla_a\nabla_br)^2-(\nabla^2r)^2\right] \nonumber\\ &&\quad+2m(D-2m)r\nabla^2r\left[1-(\nabla r)^2\right] -m\mathcal{R}r^2\left[1-(\nabla r)^2\right] \nonumber \\ &&\quad\left. -(D-2m)(D-2m-1)\left[1-(\nabla r)^2\right]^2\right\}\;.\end{aligned}$$ where $\mathcal{R}$ is a two-dimensional Ricci scalar calculated from $\gamma_{ab}$. Specializing further to $AdS_2\times S^{D-2}$ metric (\[horfie\]) all terms having covariant derivatives vanish on the horizon and using this and (\[horfie\]) one obtains the following expression for the function $f$ $$\begin{aligned} \label{fgb} f &=& \frac{\Omega_{D-2}}{16\pi G_N}\,u_S\,v_1\,v_2^{(D-2)/2} \left\{ \frac{2\,u_T^2\,e_1^2}{v_1^2} + \frac{2\,e_2^2}{u_T^2\,v_1^2} \right. \\ \nonumber && + \sum_{m=1}^{[D/2]} \alpha'^{m-1} \lambda_m \frac{(D-2)!}{(D-2m)!} \left. v_2^{-m} \left[(D-2m)(D-2m-1) - 2m\frac{v_2}{v_1} \right] \right\}\end{aligned}$$ where $\lambda_1=1$. Now we can use (\[eom\]–\[ent\]) to calculate entropy. For better understanding we specialize first to $D\le7$ and then take the general case. $D=4,5$ ------- In this case we have only $m=1,2$ terms in (\[fgb\]). Although the analysis was already done in [@sen0505], for completeness we shall repeat it here. From (\[fgb\]) we get $$\label{fgb45} f = \frac{\Omega_{D-2}}{16\pi G_N}\,u_S\,v_1\,v_2^{(D-2)/2} \left[ \frac{2\,u_T^2\,e_1^2}{v_1^2} + \frac{2\,e_2^2}{u_T^2\,v_1^2} - \frac{2}{v_1} + \frac{(D-2)(D-3)}{v_2} \left( 1 - \frac{4\,\alpha' \lambda_2}{v_1} \right) \right]$$ Now we impose EOM’s (\[eom\]), and use (\[charge\],\[q-nw\]) to express results in terms of $n$ and $w$. One obtains a unique solution $$\begin{aligned} v_1 &=& 4\,\alpha' \lambda_2 \label{v145} \\ v_2 &=& 2(D-2)(D-3) \alpha' \lambda_2 \\ u_T &=& \sqrt{\frac{n}{w}} \label{uT45} \\ u_S &=& \frac{4\pi G_N}{\Omega_{D-2}} \frac{v_1}{v_2^{(D-2)/2}} \frac{q_1}{e_2} = \frac{4\pi G_N}{\Omega_{D-2}} \frac{v_1}{v_2^{(D-2)/2}} \frac{\sqrt{2nw}}{\alpha'\sqrt{\lambda_2}} \label{uS45} \\ e_1 &=& \sqrt{2\,\alpha' \lambda_2 \frac{w}{n}} \;,\qquad\qquad e_2 = \sqrt{2\,\alpha' \lambda_2 \frac{n}{w}} \label{e1245}\end{aligned}$$ Using (\[v145\]-\[e1245\]) and (\[q-nw\]) in (\[ent\]) we obtain the entropy $$\label{ent45l} S = 4\pi \sqrt{8\,\lambda_2} \sqrt{nw}$$ We now see that to match the statistical entropy of string states (\[entropy\]) one has to take $$\label{lam2} \lambda_2 = \frac{1}{8}$$ As noticed in [@sen0505] this is exactly the value which appears in front of the Gauss-Bonnet term in the low energy effective action of heterotic strings. Observe also that by fixing only one parameter $\lambda_2$ one obtains (\[entropy\]) for both $D=4$ and $D=5$. Notice here some aspects of solution which we shall show to be common for all $D$. First, dilaton field $u_S\propto\sqrt{nw}$, so for the effective string coupling on the horizon $g^2=1/u_S\propto 1/\sqrt{nw}\ll 1$ for $n,w\gg1$. So, tree level in string coupling is a good approximation. Second, $v_i\propto\alpha'$, which means that all terms in our effective action are of the same order in $\alpha'$. All higher curvature terms ar a priori important. $D=6,7$ ------- When we go up to $D=6$ and $D=7$, we see from (\[fgb\]) that the function $f$ receives additional contribution (comparing to (\[fgb45\])), given by $$\label{fgb67} \Delta f_{6,7} = \frac{\Omega_{D-2}}{16\pi G_N}\,u_S\,v_1\,v_2^{(D-2)/2} (D-2)(D-3)(D-4)(D-5) \frac{\alpha'}{v_2^2} \left( \lambda_2 - \frac{6\,\alpha' \lambda_3}{v_1} \right)$$ We saw in the previous subsection that $\lambda_2=1/8$. Now we solve the EOM’s. It is obvious that we again obtain (\[uT45\]) and the first equality in (\[uS45\]). Solving EOM’s for $v_1$ and $v_2$ we obtain $$t_1 = \frac{t_2^2 + a(t_2+48b\lambda_3)}{a (t_2-8b)}$$ where $t_2$ is a solution of the cubic equation $$\label{cubic} t_2^3 - (a-b) t_2^2 - 144ab\lambda_3 t_2 - 48ab^2\lambda_3 = 0$$ In the above formulae we have used the notation $$t_i \equiv \frac{4v_i}{\alpha'}\;,\qquad a \equiv (D-2)(D-3)\;,\qquad b \equiv (D-4)(D-5)$$ For any given $\lambda_3$ we have generally three solutions for $v_{1,2}$, but it can be shown that there is only one physicaly interesting for which both $v_1,v_2$ are real and positive. Using this solution one can proceed further and as in $D=4,5$ solve all EOM’s and calculate the entropy. As the corresponding expressions are cumbersome and noniluminating functions of $\lambda_3$, we shall not write them explicitely. The entropy (\[ent\]) has the form $$\label{entD} S = \omega(\lambda_3,D) \sqrt{nw}$$ where $\omega$ is some complicated function of $\lambda_3$ and $D$. Now, we search for such $\lambda_3$ for which in $D=6$ and $D=7$ we obtain (\[entropy\]). One way to fix $\lambda_3$ is to demand[^8] that entropy is the same in both dimensions $$\omega(\lambda_3,D=6) = \omega(\lambda_3,D=7)$$ It is easy to show that the only solution is $$\label{lam3} \lambda_3 = \frac{1}{96}$$ Now we use this value for $\lambda_3$ in (\[entD\]) and obtain that the entropy is given by $$S = 4\pi\sqrt{nw}$$ which is again exactly the string result (\[entropy\]). For the choice (\[lam3\]) solution is given by $$\begin{aligned} v_1 &=& \frac{\alpha'}{2} \label{v167} \\ v_2 &=& \frac{\alpha'}{8} (D-2)(D-3) \left[ 1 + \sqrt{1+\frac{2(D-4)(D-5)}{(D-2)(D-3)}} \,\right] \label{v267} \\ u_T &=& \sqrt{\frac{n}{w}} \label{uT67} \\ u_S &=& \frac{4\pi G_N}{\Omega_{D-2}} \frac{v_1}{v_2^{(D-2)/2}} \frac{q_1}{e_2} = \frac{8\pi G_N}{\Omega_{D-2}} \frac{\sqrt{nw}}{v_2^{(D-2)/2}} \label{uS67} \\ e_1 &=& \sqrt{\frac{\alpha'}{4} \frac{w}{n}} \;,\qquad\qquad e_2 = \sqrt{\frac{\alpha'}{4} \frac{n}{w}} \label{e1267}\end{aligned}$$ General dimensions ------------------ We now pass to general number of dimensions $D$ recursively. From (\[fgb\]) we see that passing from (odd) dimension $D=2m-1$ to $D=2m$ and $D=2m+1$ the function $f$ gets additional contribution $$\Delta f = \frac{\Omega_{D-2}}{16\pi G_N}\,u_S\,v_1\,v_2^{(D-2)/2} \alpha'^{m-2} \frac{(D-2)!}{(D-2m)!} v_2^{-m+1} \left( \lambda_{m-1} - \frac{2m\alpha'}{v_1} \lambda_m \right)$$ We assume that all $\lambda_{k}$, $k=1,\ldots,m-1$ are determined from lower-dimensional analyses, so the only free parameter at the moment is $\lambda_m$. In principle we could apply the same analysis as in previos subsections, i.e., solve the EOM’s, calculate the entropy for general $\lambda_m$ and then look is there a value of $\lambda_m$ for which the entropy is equal to (\[entropy\]). The problem is that for this one has to solve polinomial equation, like (\[cubic\]), which is now of the order $(2m-3)$ and so for $m\ge4$ cannot be solved analyticaly for general $\lambda_m$. However, closer inspection of the solution (\[v167\]-\[e1267\]) for $D\le7$ reveals the shortcut. We notice that only $v_2$ depends on $D$, and that $v_1$, $u_T$, $e_i$ are depending just on $n$ and $w$. From (\[q-nw\]) and (\[ent\]) we see that to obtain for the entropy string result (\[entropy\]) it is necessary that $e_i$ are given by (\[e1267\]). One obvious way to have this is to fix $m\lambda_m/\lambda_{m-1}$ to be the same for all $m$. Then $$\label{v1gen} v_1 = 2m\alpha'\frac{\lambda_m}{\lambda_{m-1}}$$ is one solution of EOM. Then, to have (\[e1267\]) we see that $v_1$ has to be given by (\[v167\]), which combined with (\[v1gen\]) gives the coupling constants $$\label{coup} \lambda_m = \frac{\lambda_{m-1}}{4m} = \frac{4}{4^m m!}$$ where we have used $\lambda_1=1$. To summarise, for the choice of coupling constants given in (\[coup\]) there is a solution[^9] of EOM for any $D$ given by (\[v167\]), (\[uT67\]-\[e1267\]), and with $v_2=\alpha'y(D)$, where $y(D)$ is some complicated function of $D$ (which is a real and positive root of $(m-1)$-th order polynomial), for which the Wald entropy formula gives $$S=4\pi\sqrt{nw} \;.$$ And this is exactly the statistical entropy of half-BPS states of heterotic string given in (\[entropy\]). Some remarks ============ Before discussing our results, let us make two remarks. First, we would like to note that the gravitational part of the Lovelock type action with coefficients given by (\[coup\]) apparently can be written in the exponential form $$\label{llexp} S_{grav} = \frac{1}{4\pi G_N \alpha'} \int d^Dx \sqrt{-g} \,S \left[ \exp \left( \sum_{m=1} \frac{\alpha'^m}{4} \lambda_m \tilde{\mathcal{L}}^{GB}_m \right) - 1 \right]$$ where $\tilde{\mathcal{L}}^{GB}_m$ are obtained from the extended Gauss-Bonnet densities $\mathcal{L}^{GB}_m$ given in (\[lgbm\]) by throwing away all terms which are products of two or more scalars (like e.g., $R^2$, $R(R_{\mu\nu})^2$, etc.). We do not have a proof of this, but we have checked it explicitely for terms up to $\alpha'^3$ order, and also confirmed that terms of the type $R^k X$ are in agreement with the known recursion relation $$\frac{\partial \mathcal{L}^{GB}_m}{\partial R} = m \mathcal{L}^{GB}_{m-1} \;.$$ This makes us believe that (\[llexp\]) is correct. As far as we know, the Lovelock action with the particular choice of parameters given in (\[coup\]) was not mentioned in the literature before. For a second remark, notice that from (\[fgb\]) and (\[coup\]) follows that $f$ function can be put in the form $$\label{actgen} f = \frac{\Omega_{D-2}}{16\pi G_N}\,u_S\,v_1\,v_2^{(D-2)/2} \left[ \frac{2\,u_T^2\,e_1^2}{v_1^2} + \frac{2\,e_2^2}{u_T^2\,v_1^2} - \frac{2}{v_1} - \left(\frac{1}{v_1}-\frac{2}{\alpha'}\right) A \right]$$ where the function $A$ is given by $$A = A(v_2) = \sum_{m=1}^{[D/2]} \alpha'^m \lambda_{m+1} \frac{2m(D-2)!}{(D-2m-2)!} \frac{1}{v_2^m}$$ Equation for $v_2$ ($\partial f/\partial v_2=0$) gives directly a solution $v_1=\alpha'/2$, which substituted back into $f$ leaves just the term $$-\frac{2}{v_1} = R_{AdS_2}$$ plus the terms with gauge fields. In equation for dilaton $u_S$ (equivalent to $f=0$) all dependence on $v_2$ vanishes and we obtain $$e_1 e_2 = \frac{\alpha'}{4}$$ from which, using (\[ent\]), we obtain result (\[entropy\]) for the entropy without ever needing to solve for $v_2$. It is obvious that in the arguments above a precise form of the function $A$ was completely arbitrary, moreover it could depend also on $v_1$ and $e_i$. One always gets (\[v167\],\[uT67\]-\[e1267\],\[entropy\]) where the exact form of $A(v_1,v_2)$ only affects the solution for $v_2$ (which affects also dilaton $u_S$ through (\[uS67\].). As a consequence, any action which for the $AdS_2\times S^{D-2}$ near horizon geometry has the form (\[actgen\]) will give the same result for the entropy of 2-charged black holes, i.e., (\[entropy\]). The same conclusion does not hold for 4-charged and 8-charged black holes in $D=4$. In these cases there is additional term inside the square brackets in (\[actgen\]) proportional to $v_2^{-2}$ [@sen0508] and only for some special choices of the function $A$ one would get the entropy equal to statistical entropy of string states. Discussion ========== We have analysed solutions with $AdS_2\times S^{D-2}$ geometry in the theories with actions of the Lovelock type which contain all extended Gauss-Bonnet densities. We expect that these solutions describe $D$-dimensional asymptoticaly flat two-charge black holes near the horizon. The idea was to check could Sen’s results for $D=4,5$ [@sen0505] be generalized to all dimensions. In the lowest order in $\alpha'$ and string these actions are equal to truncated tree level (in string coupling [*and*]{} tension $\alpha'$) low energy effective actions of the heterotic string compactified on $T^{9-D}\times S^1$, for which analytic black hole solutions having singular horizon with vanishing area, and thus also the entropy, were found [@sen9411; @peet95]. They are believed to correspond to perturbative half-BPS states of heterotic string, for which the statistical entropy (i.e., logarithm of the number of states) is asymptoticaly given by (\[entropy\]) [@DabHar89; @DaGiHaRR90]. A reason for the discrepancy in the results for the entropy is that these black holes are small, in fact singular, with the curvature diverging on the horizon. This suggests that higher curvature terms in the action are important. On the other hand, dilaton field near the horizon is large, which means that string coupling is small. One concludes that it is necessary to consider effective action which is tree level in string coupling, but [*not*]{} in $\alpha'$. Now, the small black holes we have analysed in this paper are obviously some deformations of these singular black hole solutions, but of course the question is have they anything at all with the black holes of heterotic string. We have shown that parameters which appear in the Lovelock type action can be uniquely chosen such that the black hole entropy matches statistical entropy of heterotic string states for [*all*]{} $D$. Moreover, this choice is nontrivial, in the sence that there is “one parameter for every couple of dimensions”. Certainly, this matching could be just a coincidence. But, recently it was shown [@sen0508] that the same type of the action applied to 4-charge and 8-charge black holes in $D=4$ produced the same results for the entropy, gauge field strengths and the axion-dilaton field as in the analyses based on supersymmetric action obtained by supersymmetrizing square of the Weyl tensor [@CaWiMo9906; @CaWiKaMo04]. Unfortunately, as corresponding supersymmetric formulations in $D>4$ are unknown it is impossible to make simmilar comparison in our case. In spite of this, these results are hinting that there could be some connection between the Lovelock type action we used and the heterotic string on the tree level in the string coupling. If true, then our analysis shows how increasing the dimension $D$ naturally introduces terms of higher and higher order in curvature ($[D/2]$-order in $D$ dimensions). Obviously, the action we used differs from the low energy effective action of heterotic string on $M_D\times T^{9-D}\times S^1$ background. Alhough we do not know the exact form of the latter, we do know that it should be supersymmetric and to contain additional higher curvature terms beside extended Gauss-Bonnet ones, and also higher derivative terms including gauge fields. Moreover, it is known that $\mathcal{L}^{GB}_3$ term is not present in the low energy effective action, and that some of the terms on the $m=4$ level are proportional to the transcedental number $\zeta(3)$. This is in contrast to our results $\lambda_3=1/96$ and $\lambda_4=1/3\cdot 2^9$. On the other hand, as noted in [@sen0505], the result $\lambda_2=1/8$ is exactly the value which appears in the low energy effective action of heterotic string [@MetTse87; @GroSlo87]. Curiously, $\lambda_3=1/96$ is exactly the value which appears in the case of the bosonic string. Here the following observation is important. Any term which is obtained by multiplying and contracting $m$ Riemann and field strength tensors evaluated on $AdS_2\times S^{D-2}$ background (\[horfie\]) gives just a linear combination of terms $v_1^{-k}v_2^{k-m}$, $k=1,\ldots,m$ with some coefficients generally depending on $D$. Now, there is an infinite set of actions which are equivalent to ours when evaluated on this background, and even bigger one consisting of actions which lead to the more general form (\[actgen\]). It can be explicitely shown that one can use above this freedom to avoid disagreement with cubic and quartic higher curvature terms mentioned above. The question can supersymmetry be accomodated is opened. We shall present details elsewhere ([@PP2]). It is clear that the sole results from this paper and from [@sen0505; @sen0508] are insufficient for making any strong claims. One can construct other actions leading to same results. As an illustration, let us consider an action obtained by adding higher curvature correction $$\mathcal{L}_2 = \frac{1}{8} \left[ (R_{\mu\nu\rho\sigma})^2 - (R_{\mu\nu})^2 \right]$$ to the leading term given by (\[alpha0\]). This action does not belong to the type (\[actgen\]). It can be shown that it gives the same result for the entropy (\[entropy\]) as Lovelock type action for 2-charged black holes in $D=4$ and $D=5$, and for 4-charge and 8-charge black holes in $D=4$. In fact, we could with this action repeat the analysis in [@sen0508] and obtain exactly the same solutions, including the atractor equations (4.11). Adding apropriate higher derivative terms (with coefficients not depending on $D$) it is posible to match the entropy of 2-charge black holes in any dimension $D$. To conclude, the results in this paper support and extend to all dimensions Sen’s suggestion of a possible role of Gauss-Bonnet densities in description of black holes in heterotic string theory. It would be interesting to relate our results to the anomaly cancelation arguments of [@KraLar0506; @KraLar0508], especially concidering the topological origin of the extended Gauss-Bonnet densities. In any case, further analyses, including more examples, could either clarify this role, or to show that obtained agreement is accidental. I would like to thank J. Kappeli, A. Kleinschmidt, K. Peeters and S. Theisen for valuable discussions. This work was supported by Alexander von Humbold Foundation and by Ministry of Science, Education and Sport of Republic of Croatia (contract No. 0119261). [999]{} B. de Witt, . G. ’t Hooft, . L. Susskind, in [*The black hole*]{}, Teitelboim, C. (ed.), 118-131, . L. Susskind and J. Uglum, . G. T. Horowitz and J. Polchinski, . A. Dabholkar and J. A. Harvey, . A. Dabholkar, G. W. Gibbons, J. A. Harvey and F. Ruiz Ruiz, . A. Sen, . A. Peet, . A. Dabholkar, . A. Dabholkar, R. Kallosh and A. Maloney, . A. Sen, . V. Hubeny, A. Maloney and M. Rangamani, . A. Sen, . A. Sen, . G. Lopes Cardoso, B. de Wit and T. Mohaupt, . G. Lopes Cardoso, B. de Wit, J. Kappeli and T. Mohaupt, . G. Lopes Cardoso, B. de Wit, J. Kappeli and T. Mohaupt, . R. M. Wald, . V. Iyer and R. M. Wald, . T. Jacobson, G. Kang and R. C. Myers, . P. Kraus, F. Larsen, . P. Kraus, F. Larsen, . A. Sen, . A. Sen, . A. Sen, . G. Lopes Cardoso, B. de Wit and T. Mohaupt, . G. Lopes Cardoso, B. de Wit, J. Kappeli and T. Mohaupt, . D. Lovelock, . D. Lovelock, . B. Zwiebach, . B. Zumino, . M. Cvitan, S. Pallua, P. Prester, . R.R. Metsaev and A.A. Tseytlin, . D.J. Gross, J.H. Sloan, P. Prester, in preparation. [^1]: A overview of recent results for black holes in string theory is given in [@witt0511]. [^2]: This is the reason why they are called small or microscopic. [^3]: Note that although Wald derivation demands existence of the bifurkate Killing horizon, and so does not apply to extremal black holes, one can formally take the limit of extremality in the final formula. [^4]: In [@KraLar0506; @KraLar0508] an explanation was presented based on anomalies induced by particular Chern-Simons terms. However, it is not clear to us why only those terms should contribute. [^5]: There is also a term proportional to the Pontryagin density, but it vanishes identicaly in $AdS_2\times S^n$ background. [^6]: $[x]$ denote integer part of $x$. [^7]: $[D/2]$ is the number of extended Gauss-Bonnet terms in $D$ dimensions, including the Einstein term. [^8]: Equivalently, we could ask that $\omega=4\pi$ for $D=6$, and then check do we obtain the same result for $D=7$. [^9]: We have checked that for $D\le9$ this is a unique solution with both $v_1$, $v_2$ real and positive.
{ "pile_set_name": "ArXiv" }
Discovery of boronic acid-based fluorescent probes targeting amyloid-beta plaques in Alzheimer's disease. A boronic acid-based fluorescent probe was developed for diagnosis of amyloid-β (Aβ) plaques from Alzheimer's disease (AD). Probe 4c, which included boronic acid as a functional group, exhibited a significant increase (64.37-fold, FAβ/F0) in fluorescence intensity as a response to Aβ aggregates, with a blue shift (105nm) in the maximum emission wavelength. We found that boronic acid as a functional group improved the binding affinity (KD value=0.79±0.05μM for 4c) for Aβ aggregates and confirmed that 4c selectively stained Aβ plaques in brain sections from APP/PS1 mice. Ex vivo fluorescence imaging using mice (normal and APP/PS1) also revealed that 4c was able to penetrate the blood-brain barrier (BBB) and to stain Aβ plaques in the brain. From these results, we believe that 4c will be useful as a fluorescent probe in preclinical research related to AD. Furthermore, we believe that our results with boronic acid also provide valuable information for the development of a probe for Aβ plaques.
{ "pile_set_name": "PubMed Abstracts" }
/* SPDX-License-Identifier: GPL-2.0 */ /* * rt1016.h -- RT1016 ALSA SoC audio amplifier driver * * Copyright 2020 Realtek Semiconductor Corp. * Author: Oder Chiou <oder_chiou@realtek.com> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. */ #ifndef __RT1016_H__ #define __RT1016_H__ #define RT1016_DEVICE_ID_VAL 0x6595 #define RT1016_RESET 0x00 #define RT1016_PADS_CTRL_1 0x01 #define RT1016_PADS_CTRL_2 0x02 #define RT1016_I2C_CTRL 0x03 #define RT1016_VOL_CTRL_1 0x04 #define RT1016_VOL_CTRL_2 0x05 #define RT1016_VOL_CTRL_3 0x06 #define RT1016_ANA_CTRL_1 0x07 #define RT1016_MUX_SEL 0x08 #define RT1016_RX_I2S_CTRL 0x09 #define RT1016_ANA_FLAG 0x0a #define RT1016_VERSION2_ID 0x0c #define RT1016_VERSION1_ID 0x0d #define RT1016_VENDER_ID 0x0e #define RT1016_DEVICE_ID 0x0f #define RT1016_ANA_CTRL_2 0x11 #define RT1016_TEST_SIGNAL 0x1c #define RT1016_TEST_CTRL_1 0x1d #define RT1016_TEST_CTRL_2 0x1e #define RT1016_TEST_CTRL_3 0x1f #define RT1016_CLOCK_1 0x20 #define RT1016_CLOCK_2 0x21 #define RT1016_CLOCK_3 0x22 #define RT1016_CLOCK_4 0x23 #define RT1016_CLOCK_5 0x24 #define RT1016_CLOCK_6 0x25 #define RT1016_CLOCK_7 0x26 #define RT1016_I2S_CTRL 0x40 #define RT1016_DAC_CTRL_1 0x60 #define RT1016_SC_CTRL_1 0x80 #define RT1016_SC_CTRL_2 0x81 #define RT1016_SC_CTRL_3 0x82 #define RT1016_SC_CTRL_4 0x83 #define RT1016_SIL_DET 0xa0 #define RT1016_SYS_CLK 0xc0 #define RT1016_BIAS_CUR 0xc1 #define RT1016_DAC_CTRL_2 0xc2 #define RT1016_LDO_CTRL 0xc3 #define RT1016_CLASSD_1 0xc4 #define RT1016_PLL1 0xc5 #define RT1016_PLL2 0xc6 #define RT1016_PLL3 0xc7 #define RT1016_CLASSD_2 0xc8 #define RT1016_CLASSD_OUT 0xc9 #define RT1016_CLASSD_3 0xca #define RT1016_CLASSD_4 0xcb #define RT1016_CLASSD_5 0xcc #define RT1016_PWR_CTRL 0xcf /* global definition */ #define RT1016_L_VOL_MASK (0xff << 8) #define RT1016_L_VOL_SFT 8 #define RT1016_R_VOL_MASK (0xff) #define RT1016_R_VOL_SFT 0 /* 0x04 */ #define RT1016_DA_MUTE_L_SFT 7 #define RT1016_DA_MUTE_R_SFT 6 /* 0x20 */ #define RT1016_CLK_SYS_SEL_MASK (0x1 << 15) #define RT1016_CLK_SYS_SEL_SFT 15 #define RT1016_CLK_SYS_SEL_MCLK (0x0 << 15) #define RT1016_CLK_SYS_SEL_PLL (0x1 << 15) #define RT1016_PLL_SEL_MASK (0x1 << 13) #define RT1016_PLL_SEL_SFT 13 #define RT1016_PLL_SEL_MCLK (0x0 << 13) #define RT1016_PLL_SEL_BCLK (0x1 << 13) /* 0x21 */ #define RT1016_FS_PD_MASK (0x7 << 13) #define RT1016_FS_PD_SFT 13 #define RT1016_OSR_PD_MASK (0x3 << 10) #define RT1016_OSR_PD_SFT 10 /* 0x22 */ #define RT1016_PWR_DAC_FILTER (0x1 << 11) #define RT1016_PWR_DAC_FILTER_BIT 11 #define RT1016_PWR_DACMOD (0x1 << 10) #define RT1016_PWR_DACMOD_BIT 10 #define RT1016_PWR_CLK_FIFO (0x1 << 9) #define RT1016_PWR_CLK_FIFO_BIT 9 #define RT1016_PWR_CLK_PUREDC (0x1 << 8) #define RT1016_PWR_CLK_PUREDC_BIT 8 #define RT1016_PWR_SIL_DET (0x1 << 7) #define RT1016_PWR_SIL_DET_BIT 7 #define RT1016_PWR_RC_25M (0x1 << 6) #define RT1016_PWR_RC_25M_BIT 6 #define RT1016_PWR_PLL1 (0x1 << 5) #define RT1016_PWR_PLL1_BIT 5 #define RT1016_PWR_ANA_CTRL (0x1 << 4) #define RT1016_PWR_ANA_CTRL_BIT 4 #define RT1016_PWR_CLK_SYS (0x1 << 3) #define RT1016_PWR_CLK_SYS_BIT 3 /* 0x23 */ #define RT1016_PWR_LRCK_DET (0x1 << 15) #define RT1016_PWR_LRCK_DET_BIT 15 #define RT1016_PWR_BCLK_DET (0x1 << 11) #define RT1016_PWR_BCLK_DET_BIT 11 /* 0x40 */ #define RT1016_I2S_BCLK_MS_MASK (0x1 << 15) #define RT1016_I2S_BCLK_MS_SFT 15 #define RT1016_I2S_BCLK_MS_32 (0x0 << 15) #define RT1016_I2S_BCLK_MS_64 (0x1 << 15) #define RT1016_I2S_BCLK_POL_MASK (0x1 << 13) #define RT1016_I2S_BCLK_POL_SFT 13 #define RT1016_I2S_BCLK_POL_NOR (0x0 << 13) #define RT1016_I2S_BCLK_POL_INV (0x1 << 13) #define RT1016_I2S_DATA_SWAP_MASK (0x1 << 10) #define RT1016_I2S_DATA_SWAP_SFT 10 #define RT1016_I2S_DL_MASK (0x7 << 4) #define RT1016_I2S_DL_SFT 4 #define RT1016_I2S_DL_16 (0x1 << 4) #define RT1016_I2S_DL_20 (0x2 << 4) #define RT1016_I2S_DL_24 (0x3 << 4) #define RT1016_I2S_DL_32 (0x4 << 4) #define RT1016_I2S_MS_MASK (0x1 << 3) #define RT1016_I2S_MS_SFT 3 #define RT1016_I2S_MS_M (0x0 << 3) #define RT1016_I2S_MS_S (0x1 << 3) #define RT1016_I2S_DF_MASK (0x7 << 0) #define RT1016_I2S_DF_SFT 0 #define RT1016_I2S_DF_I2S (0x0) #define RT1016_I2S_DF_LEFT (0x1) #define RT1016_I2S_DF_PCM_A (0x2) #define RT1016_I2S_DF_PCM_B (0x3) /* 0xa0 */ #define RT1016_SIL_DET_EN (0x1 << 15) #define RT1016_SIL_DET_EN_BIT 15 /* 0xc2 */ #define RT1016_CKGEN_DAC (0x1 << 13) #define RT1016_CKGEN_DAC_BIT 13 /* 0xc4 */ #define RT1016_VCM_SLOW (0x1 << 6) #define RT1016_VCM_SLOW_BIT 6 /* 0xc5 */ #define RT1016_PLL_M_MAX 0xf #define RT1016_PLL_M_MASK (RT1016_PLL_M_MAX << 12) #define RT1016_PLL_M_SFT 12 #define RT1016_PLL_M_BP (0x1 << 11) #define RT1016_PLL_M_BP_SFT 11 #define RT1016_PLL_N_MAX 0x1ff #define RT1016_PLL_N_MASK (RT1016_PLL_N_MAX << 0) #define RT1016_PLL_N_SFT 0 /* 0xc6 */ #define RT1016_PLL2_EN (0x1 << 15) #define RT1016_PLL2_EN_BIT 15 #define RT1016_PLL_K_BP (0x1 << 5) #define RT1016_PLL_K_BP_SFT 5 #define RT1016_PLL_K_MAX 0x1f #define RT1016_PLL_K_MASK (RT1016_PLL_K_MAX) #define RT1016_PLL_K_SFT 0 /* 0xcf */ #define RT1016_PWR_BG_1_2 (0x1 << 12) #define RT1016_PWR_BG_1_2_BIT 12 #define RT1016_PWR_MBIAS_BG (0x1 << 11) #define RT1016_PWR_MBIAS_BG_BIT 11 #define RT1016_PWR_PLL (0x1 << 9) #define RT1016_PWR_PLL_BIT 9 #define RT1016_PWR_BASIC (0x1 << 8) #define RT1016_PWR_BASIC_BIT 8 #define RT1016_PWR_CLSD (0x1 << 7) #define RT1016_PWR_CLSD_BIT 7 #define RT1016_PWR_25M (0x1 << 6) #define RT1016_PWR_25M_BIT 6 #define RT1016_PWR_DACL (0x1 << 4) #define RT1016_PWR_DACL_BIT 4 #define RT1016_PWR_DACR (0x1 << 3) #define RT1016_PWR_DACR_BIT 3 #define RT1016_PWR_LDO2 (0x1 << 2) #define RT1016_PWR_LDO2_BIT 2 #define RT1016_PWR_VREF (0x1 << 1) #define RT1016_PWR_VREF_BIT 1 #define RT1016_PWR_MBIAS (0x1 << 0) #define RT1016_PWR_MBIAS_BIT 0 /* System Clock Source */ enum { RT1016_SCLK_S_MCLK, RT1016_SCLK_S_PLL, }; /* PLL1 Source */ enum { RT1016_PLL_S_MCLK, RT1016_PLL_S_BCLK, }; enum { RT1016_AIF1, RT1016_AIFS, }; struct rt1016_priv { struct snd_soc_component *component; struct regmap *regmap; int sysclk; int sysclk_src; int lrck; int bclk; int master; int pll_src; int pll_in; int pll_out; }; #endif /* __RT1016_H__ */
{ "pile_set_name": "Github" }
Fitting and Support for Plus Sizes 5 day class Overview Fitting and Support for Plus Sizes (5 days) This class is a combination of Fitting and Support for Plus Sizes and the Power Bars class. You will learn how to fit these larger cup sizes as well as the larger frame sizes using fabrics and styles that support well and make the job easier. Learn to change the seam lines and use support elements such as slings and power bars to create supportive, well-fitting bras specific to the needs of the plus-sized woman or larger cup sizes. The Fitting and Support for Plus Sizes is recommended for advanced or professional bra-makers. This 5 day class is spent working with plus sizes only – other smaller sizes will not be covered. You must have your own well-fitting bra pattern or be sewing bras for others. You will learn to draft each of the many types of support elements, then make samples of them so you will always have them for reference.If time permits, learn to draft and insert mastectomy bra pockets, make them to fit your bra pattern, as well as any existing bra. Machines available for rent for students who do not wish to bring their own machine. Machine rental is $50 for the 5 days. $900.00 CAD Please note: • Class begins at 9:30 am and ends at 4:00 pm. Doors open at 9:30 am. • You can bring your lunch or you can buy lunch out. We have a fridge, sink and microwave in our classroom kitchen. Plus Size Fitting The Fitting and Support for Plus Sizes Class is for advanced or professional bra-makers. This 5 day class is spent working with all types of fabrics, styles, fitting techniques and support elements especially suited to the plus size woman. Five day class. $900.00 CAD What’s included in the class The class includes the class notes, as well as the materials to make all the reference samples you will be making in the class. Skill Level You must be familiar with the construction of a basic bra as this will not be taught, however we do teach the specifics of attaching power bars, slings and collars, as well as how to make a pocketed bra. More Info Dates The next available dates for the Power Bars/ Pockets/ Slings class: This class has been combined with the Fitting and Support for Plus Sizes. FAQs Classes start at 9:30 am and end at 4 pm, however the doors open at 9:30. Where do I get lunch? We have a small kitchen with microwave, fridge and toaster oven, so you can bring your own lunch. There are also several fine restaurants and cafes in close walking distance of the store. What about a sewing machine? You will always do your best work on your own sewing machine, however that is not always possible. We have sewing machines available for rent for your use in the class. $50 is the rental fee for this 5 day class.
{ "pile_set_name": "Pile-CC" }
Ferdinando De Matthaeis Ferdinando De Matthaeis (born May 29, 1961) Is a retired professional Italian Footballer who played for the New York Cosmos. He currently serves as head coach of Miami United FC in the National Premier Soccer League. Playing career De Matthaeis spent the majority of his fifteen-year professional career in New York, with short stints in Italy. He was called in to one National team training camp towards the end of his career. While he played with the New York Cosmos he enjoyed minutes playing alongside some of the greats like Carlos Alberto, Franz Beckenbauer, and Giorgio Chinaglia. He appeared 38 times over 4 years for the New York Cosmos from 1981 to 1984. During his career with the Cosmos he scored 17 times and assisted on 12 goals in both indoor and outdoor competitions. Coaching career De Matthaeis coached at IMG Academy in Sarasota, Florida for a number of years, where he developed young athletes in preparation for the next level. In 2014 De Matthaeis moved to Miami, Florida where he became head coach of Miami United FC (NPSL). During his only year in charge he posted a record of 7–3–0 and won the NPSL Sunshine Conference. He became the only Miami United FC head coach to go undefeated during the regular season. In 2015 with the help of another ownership group he founded the Miami Fusion FC of the NPSL. He would coach them in their first season of play to a NPSL Sunshine Conference championship over his former team Miami United FC. With this win he would secure a place for the Miami Fusion FC in the 2016 US Open Cup in their first season. References Category:1961 births Category:Living people Category:North American Soccer League (1968–1984) players Category:New York Cosmos players Category:Association football midfielders Category:Italian footballers Category:Italian expatriate footballers Category:Expatriate soccer players in the United States Category:Italian emigrants to the United States Category:Brooklyn Italians players Category:New Jersey Eagles players Category:Boston Bolts players Category:New Jersey Stallions players
{ "pile_set_name": "Wikipedia (en)" }
Tag Archives: onion Usually, during Christmas Eve, we prepare food that we can serve the next day. It’s for random people who visit our house for the usual “pamamasko.” But, last year, I was too busy with my new work. So, my mom and sister decided to “outsource” our Noche Buena feast for that year. Despite that, my sister still insisted that I should at least prepare two dishes. It’s like her request for me to cook her favorite food. I obliged, since it’s always been my tradition for us to cook our family dinner anyway. She wanted tacos and fried chicken. My mom knew my ingredients for fried chicken so all she had to do was to put everything in the turbo broiler. My taco recipe is also simple. If you’ve been reading my posts, you’re now aware that my sister is a picky eater. Anything fancy would come under tight scrutiny. The more simple the dish is, the more she’ll appreciate it. It’s ok to combine ground pork and beef if you so desire. That’s what I do on ordinary days, as it’s cheap and tastes almost the same. But, on special occasions, I’d say you can splurge a little and use 100% ground beef. So here’s the recipe for my Simple Taco. I’m going to use 1 kilo of beef here, but if it’s too much for your family, just make the necessary adjustments. Procedure In a bowl, mix the ground beef, salt and pepper and the 2 T of grated parmesan cheese. Remember, since we’re putting in cheese, you might try to put just a little amount of salt at a time. You can always adjust it as you taste. Then sauté onions and garlic until they turn translucent. Add in the beef, cook for about 15 minutes or until the beef is tender. You can add a few teaspoons of your taco sauce if you want, but I prefer to keep it simple. The rest of the ingredients will be assembled by the diners. This is why eating tacos is fun! It’s like building your own castle. But don’t overdo it, especially if you’re using the hard taco shells. Your taco skyscraper will just spill all over you. Oh, and a word of advice: use a plate or have a tissue in hand when eating a taco 😉 Hope you enjoy my Simple Taco recipe at your Noche Buena! You can use crabs or any kind of shellfish for this recipe. I often use alimango because they’re cheap and easily available in the market. If you’re using crabs though, may I suggest you use the “female” crab instead of a “male” one? You’ll know that the crab is a girl by looking at its abdomen, which is located at the back. It’s circular compare to the pointed one of the male. Ingredients Niyog (a type of coconut) 1 kilo of Alimango 2 cups of freshly-squeezed gata (usually the 1st squeeze is the best to use) Siling haba Onion/garlic Salt and pepper I don’t normally include ginger in this recipe since I usually pre-cook the alimango before sautéing them in the gata mixture. But if you’re cooking it straight, then half a head of ginger, thinly slice is enough to remove the “lansa” taste from the crabs. Procedure Steam your crabs with a couple of teaspoons of water and some salt sprinkled on top of them. After a few minutes, depending on the weight and number of your crabs, remove them from heat and let them rest for awhile. If the alimango or crab are too big, try to cut them in half, just so they’ll be easy to eat and the meat of the crab will also absorb the gata sauce. Heat your saucepan with 2 tablespoons of cooking oil. Then add the onions and garlic (ginger if needed) then wait for the onions to turn translucent before adding in the alimango (crabs). Sautee the alimango for a few minutes then add in the gata and the sili. The pan should be on medium heat because you don’t want the gata to boil or else it’ll curdle. Stir once in awhile, have it simmer for at least 15 minutes. Don’t forget to add your salt and pepper gradually. You can serve it as is or you can top it with fresh basil leaves and slices of fresh siling haba. I’m not a morning person but because I work at home, I’m tasked to cook breakfast. Well ok, not just breakfast, but lunch and dinner too. Of all the three meals, I always find breakfast to be the most difficult. Half of our household eats rice and the rest prefer bread. And it doesn’t help either that my family are picky eaters. With lunch and dinner, I have no problem preparing for a meal plan for a week 😉 Eggs are a staple in my breakfast menu. I either do scrambled, or sunny-side up. When I was still in culinary school, we spent one day just cooking eggs. I’ve never had so much egg in my life ’til then. I can’t say that I’ve perfected the craft of cooking perfect scrambled eggs, but I do know a few tricks on making your ordinary scrambled eggs look appetizing. Typical Scrambled Egg I usually sauté the onions first since I don’t like the burnt taste of garlic in my food. When the onions begin to turn translucent, add the garlic. Beat the eggs with the milk. I don’t salt my eggs, but if you want, you could. I usually add the salt and pepper when I pour the scrambled eggs on the pan. Slowly mix it to avoid burning and to incorporate everything. A scrambled egg is good when it’s still a little bit runny. It’s not advisable to serve dry scrambled eggs, but my family prefers it a little dry, a little over-cooked. You may want decorate it with snippets of chives or basil. You could also add in tomatoes and mushrooms to make it extra special. I don’t suggest a throwing in mayo, since that’s too much cholesterol. Maybe once in awhile, I add in parmesan cheese, just to make it luxurious. It’s always sunny in the Philippines. For the past few weeks, we’ve been experiencing the wrath of the sun. I don’t like the feel of always being sticky, but being stuck inside the room with the AC fully cranked is also not my idea of FUN. Whether I like it or not, I’d still need to go out and do my normal duties, which means getting stickier than before. That’s why I drink lots of water every day. Eight glasses is such an understatement, these days, my average is usually around 12 glasses of water. Not to mention my addiction to calamansi juice. Yes. I know that calamansi is a little bit expensive nowadays, but it’s really good in refreshing you. It’s like our local version of the lemonade. And it’s healthier than drinking a can of soda or sweetened canned juice. It took me awhile to think of what food I’ll feature today, the reason being I tried avoiding being in the kitchen for the past few weeks. I planned my menu where I’ll be in and out of the kitchen within 30 minutes, tops. But last week, my dad requested if I can cook ginisang monggo for him. It would’ve been easier to cook the said dish if I would just boil the beans and not mash and remove their casings. But I like my ginisang monggo smooth. Therefore, my 30 minutes was spent with the mongos alone. Here’s my recipe for ginisang monggo: Ingredients for ginisang monggo Ingredients 1 bag of mongo beans Shrimps or ground pork (while others will opt to use pork belly) Garlic, onion Tomatoes (enough to have a hint of tartness to the soup) Water Salt and pepper (you can use fish sauce too) Procedure Boil the mongo beans first, then mash them. You can do that either with your hands (but that will take time because you have to cool them off first before you can touch them) or do what I do: get an ordinary sifter and use the back of a ladle and mash it. I throw most of the skin but saved enough to include the soup, just to add texture. I sauté then the garlic, onion and tomatoes. If you’re using pork belly, render the fat of the pork belly first, then use that oil for sautéing. After the onion becomes translucent and the tomatoes softened, put in the shrimps or the ground pork or the belly. Saute for awhile, and don’t forget to season it with salt and pepper. After a few minutes, pour in the mashed mongo beans and add water. Depends on the consistency you want, make sure the water’s not too much. It’s better to add water later than trying to spoon out extra water from your soup. Wait a few minutes for it to boil, or until the meat’s tender then the soup’s ready to be served. In my family, we have an abundant supply of chicharon since we’re from Pampanga, so instead of garnishing it with parsley and other herbs, I throw in some chicharon right before serving it. I did have my stint at culinary school, but I feel in my heart that my passion for cooking is genetic. How else would I learn how to cook regular dishes without any supervision or a recipe book in front of me? I rely on both of my sense of taste and sight. My mom always tells me that her mom didn’t teach her neither, it just came naturally. But I do study to learn the basics (what to do and what not to do) and also to acquire further knowledge in cooking and baking. And one thing that I love about cooking is that you discover something new in the kitchen every time you cook. Not everybody is meant to be the queen of the kitchen, but I know that for most of the people out there, they don’t really have a choice because they’re married or living on their own. Not all of us can afford help, go through a culinary course, or order take out foods every day. That’s why I feel bad when I hear my friends tell me that all they feed their children is fried food. Honestly, it took me a while to perfect the art of cooking fried chicken, but frying is the simplest form of cooking for most of the moms out there. It will be good if once in a while you’ll feed your love ones something nutritious aside from fried chicken, fried eggs and hotdogs. They need nourishment and it’s about time that you man-up and start familiarizing yourself with different types of cooking. You don’t need to be a Martha Stewart; Rachael Ray is fine (Rachael Ray did not graduate from any culinary school). Don’t be discouraged when you don’t succeed during your first try. It takes a while, but once you get the hang of it, you’ll find that the kitchen is not as frightening as it used to be. Here’s one recipe you could try: Sinigang na Salmon sa Miso Ingredients for sinigang na salmon sa miso Ingredients: 1 kilo of Salmon (whatever part is available in the market will do) 1 pack of Sinigang sa Miso mix Sili Onions, ginger Talbos ng kamote (or, if you prefer, kangkong) 2 cups of water Usually in sinigang, you just boil the meat and then add the vegetables and the sinigang mix. I find that it tastes better when you sauté it first with onions and tomatoes, but since I’m using fish and Miso mix, I’ll use ginger instead of tomatoes. Ginger is pampatangal ng lansa, so you don’t really need to put a lot. Depending in the part of fish that you’ll use make sure to mix it gently because you don’t want to end up with a mushy fish in your soup. Put at least two cups of water, and if you want it to be more soupy, then you can add more water. Just make sure to taste everything along the way. Then pour in the sinigang mix, plus the vegetables. Wait for it to boil, then it’s done. Sinigang na isda usually doesn’t take long to cook. You just have to make sure that your vegetables are cooked, and you’re ready to serve your Sinigang. If you have any questions, feel free to ask me here. I’ll try my best to answer all of your queries. Until next time! My family loves Ampalaya. It’s one of the few vegetables that my sister actually eats. Since she’s a very picky eater, we usually plan our meals around her favorite dishes. Here’s a simple recipe of Ginisang Ampalaya, especially useful now that it’s the Lenten season and some people would prefer eating non-meat dishes. Ingredients 2 small size Ampalaya 5 medium size ripe tomatoes Garlic and onion Some fresh shrimps (depends on the size that are available in the market) Salt, pepper and vinegar to taste Directions I boil my Ampalaya for a few minutes just to lessen the taste of bitterness in them. I don’t overdo it because I still want the crispness of vegetable. I then sauté the onions, garlic and tomatoes. I wait till the onions turn translucent before adding in the shrimps. I have pre-cooked shrimps already, but fresh shrimps are always better. Then, add in the Ampalaya, and season it with salt and pepper. You may add water if the tomatoes are not juicy enough. Then before simmering it for a few minutes, I like to add a touch of vinegar in it. Not too much, just a tablespoon or so, to enhance the acidity of the tomatoes. Don’t mix it yet, cover it for a few minutes then it’s done.
{ "pile_set_name": "Pile-CC" }
A dental Design and Build Company. With over 30 years of experience in the business for design and build. The company name is : Onter Construction Inc. Company specializes in Design and Build of Dental and Medical Offices. Need a new Brand Identity with a Logo Design New Dental Distribution Company Company name is called Dental Plus - Colors I would like to use is Green. Similar to the O-Desk Green color. A fresh and Clean look. We supply and distribute dental equipment and supplies to dentist. I currently have the SPLASH Themeforest template uploaded on cloudaccess.net. I have set up most of the Menu, Articles and Sliders but I need the following help- 1. Clean up of the existing Articles and help set up content, structure and configuration 2. Help clean up and create about 25 default templates. 3. Help add a video on the revolution slider and clean up and edit a few other slides. 4. Help create a logo if possible 5. make ... Moldremovalninjas.com we are looking to hire the right candidate to complete this project within 24 hours. We are in need of 3 banners on our page that all have to match the same color scheme AND fit into our sliders. Please visit the site and give any input necessary to complete this job. All banner content will be given upon hiring. Please respond as soon as possible as we have a deadline to meet Thank You The job consists in designing and developping the Ecommerce website of Local Factory, a new clothing French brand. Please find in attachment the macro specfications within a draft of some pages. Thanks Franck Hi I need a website mockup doing for a simple directory website I have drafted what i want, positioning, colors etc etc Almost everything is done I need an extremely high level excellent website that looks awesome and gives people - 100% confidence to subscribe and pay for directory listing - solid look and feel that means "business" - positive look - new fresh, dynamic look You will be give full instructions, just need a creative, proven mind Experienced professionals only Need to see ... I'm looking to update my branding for my small computer business in Vancouver Canada. I would like to re-brand and create a website with some search engine optimization. I'd like you to take a look at the current site and suggest an alternative design with new logo. Once the design is there I will give you the altered content (or you will alter content) which you will place on the pages. I need a logo designer to create a simple, clean logo for a company. It will be an IT Development company. Company Name: Active Source. Slogan: The active source is full of creative sources Color: only 2 It is very easy and straightforward. Must be creative. I currently have an idea with sample. Please check Attachment. I am interesting in, just need a few additional change to make creative pieces to choose from. If you use copyrighted work, you will ...
{ "pile_set_name": "Pile-CC" }
14 A Park and Resort Railway Line in the Hakone District Originated by a Resort-oriented Real Estate Fund : Focusing on Hands-on Schemes for the ODAWARA Electric Railway, Formed and Managed by ARINOBU FUKUHARA, President of TEIKOKU Life Isao Ogawa Arinobu Fukuhara, president of TEIKOKU Life, a major life insurance company, formed a real estate syndicate with 22 close, wealthy friends in 1907 when Japan was experiencing an investment boom. Among the group were the Fukuzawa brothers, members of the founding family of Keio Universit y, a major university in Japan. This syndicate was a type of real estate fund organized to invest in tourism in the Hakone district located close to Tokyo. But it actually acted as a structured investment vehicle (SIV) for making prior acquisitions of real estate for the ODAWARA Electric Railway, of which the investors where stakeholders. It purchased vast tracts of land to be developed as a resort area in Gora in Hakone, which was to be the last stop of the planned new railway line. These purchases generated multiple benefits for the venture capitalists. They offered prospects for diversifying the new railway business, and the investors enjoyed the proceeds from the land transactions and also the comforts of owning a second house in a resort area. TEIKOU Life acted as an investment bank and managed all the various financial transactions necessary in a real estate business, from purchase to sale of the properties. It can be said that the company was the originator of a series of financial schemes managed by the fund. This investment fund, which specialized in tourism, not only provided the financiers with high returns and comfortable resort living, but also developed and completed the most advanced, full-scale mountain railway system aimed at providing transportation for tourists in Japan and a superior mountainous resort area with a private amusement park attached. A Park and Resort Railway Line in the Hakone District Originated by a Resort-oriented Real Estate Fund Isao Ogawa 135 Abstract From the beginning the study of land companies of Japan has mainly been developed by Dr. KYOZO TAKECHI. In general, those companies are so shortlived and historical investigation is strongly limited Evaluation of the Social Benefits of the Regional Medical System Based on Land Price Information -A Hedonic Valuation of the Sense of Relief Provided by Health Care Facilities- Takuma Sugahara Ph.D. Abstract 48 2006 21 36 Koya KISHIDA, Shuji HISAMUNE, Toshihiko OSHIMA and Akira TAKEI Recently, when the accident occurs, the social influences of the accident became more and more severe. Keifuku Electric Railroad The purpose of this study is to clarify a process that Awa dance developed into tourist resources and the factors that it spread out in all over Japan. Consideration was made with the memory magazines, Housing Purchase by Single Women in Tokyo Yoshilehl YUI* Recently some single women purchase their houses and the number of houses owned by single women are increasing in Tokyo. And their housing demands SUMMARY Japan is one of the most earthquakeprone country in the world, and has repeatedly experienced serious major damages. No matter how serious the impact of earthquake disasters, each and every time, 262 F s PRO A Community Investment and the Role of Non-profit Organizations: Present Conditions in the US, the UK, and Japan Takashi Koseki Abstract 1. The issue of SRI (Socially Responsible Investment) JAPANESE SHIP-OWNERS AND WORLD BULK MARKET BETWEEN THE TWO WORLD WARS Mariko Tatsuki Keisen University After World War I, Japanese shipping suffered for a long time from an excess of tonnage and severe No. 19 January 19 2013 19 Regionalism at the 19 th National Assembly Elections Focusing on the Yeongnam and Honam Region Yasurou Mori As the biggest issue of contemporary politics at South Korea, there SUMMARY This paper evaluates the livelihood recovery programs in the affected area of the Great East Japan Earthquake disasters, conducted by NPO/NGOs, private companies and governments. This was the first No.43 2008 12 Abstract The national pension system aims to provide a common "basic pension" to all residents in Japan. So, all people aged between 20 and 59 living in Japan must join the National Pension No.149 Feb/1999 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Learned From Japanese Life and Experiences in Kagoshima When I first came to Japan I was really surprised by almost everything, the weather, SUMMARY Although the situation where sufficient food was not supplied for the victims occurred in the Great East Japan Earthquake, this is a serious problem at the time of catastrophic disasters like the 2011 8 6 2011 5 7 [1] 1 2 i ii iii i 3 [2] 4 5 ii 6 7 iii 8 [3] 9 10 11 cf. Abstracts in English In terms of democracy, the patience and the kindness Tohoku people have shown will be dealt with as an exception. 542012 4157 Nishino Toshiaki The purpose of this paper is to analyze the present conditions of the mountain villages of Japan in the early 21 st century. The revolution of fuel sources from a predominance 1 2 3 4 This product (including software) is designed under Japanese domestic specifications and does not conform to overseas standards. NEC *1 will not be held responsible for any consequences resulting Transformation and Various Aspects of Community Popular Education in Tokyo in Meiji Era Takeo Matsuda The purpose of this paper is to examine the variety and transformation of community popular education 008 stress behavior at the joint of stringer to cross beam of the steel railway bridge 1115117 1..FEM FEM 3. 4. ABSTRACT 1. BackgroundPurpose The occurrence of fatigue crack is reported in the joint of Japanese Civilian Control in the Cold War Era Takeo MIYAMOTO In European and American democratic countries, the predominance of politics over military, i.e. civilian control, has been assumed as an axiom. Abstract The Heian Period witnessed the development of various techniques for adding decoration to costumes, applying decorations directly to the fabric, in order to give the costumes new qualities. This The Development of Chonaikai in Tokyo before The Last War Hachiro Nakamura The urban neighborhood association in Japan called Chonaikai has been more often than not criticized by many social scientists. The Japanese economy in FY2015 suffered from sluggish growth in individual consumption, while the foreign exchange market remained unstable with high volatility. Even in such an economic environment, MSF An Aspect of Development in Clothing Education in Japan (Part 2) The Method of Teaching Sewing in the Meiji Era ( 2 ) Tetsuko HIGUCHI 1. Following Part 1, here I have analyzed and discussed some characteristic 論 文 Hospitality in the Tourism Industry: Present Conditions and Problems Kazuko TATENO and Ryozo MATSUMOTO Abstract The meaning and usage of hospitality varies according to different fields of study and A PEX Chasing Our Dreams - A complete line of customized car and automotive parts developed with state of the theart technology and new ideas. Our company is A'PEX which means the highest in quality. This Summary Shiki Theatrical Company (Gekidan Shiki) which was formed as nonprofit has grown into one of the most successful commercial theatres in Japan. This article focuses on their outstanding director SUMMARY An advanced husbandry system was developed in Johoku region (Houtaku, Kamoto, Tamana and Kikuchi County) in Kumamoto Prefecture from Meiji era to World War II. This study named the system as Higo Establishment and Challenges of the Welfare Benefits System for Elderly Foreign Residents In the Case of Higashihiroshima City Naoe KAWAMOTO Graduate School of Integrated Arts and Sciences, Hiroshima University Abstract The main theme of this paper is the effect on trade caused by the process of establishing the Chubu Region Scheme as the third broad economic area in Japan followed by the Tokyo Metropolitan Area 28 2004 pp. 145 159 1 Received October 29, 2004 In 1999, North Korea reversed the negative economic growth of the 90s, and displayed a positive trend which, although weak, was maintained at 1.8% in 2003. Research in Higher Education - Daigaku Ronshu No.24 (March 1995) 77 A Study of the Process of Establishing the Student Stipend System in the Early Years of the PRC Yutaka Otsuka* This paper aims at explicating A Study on The Space Composition of Traditional Houses and Village of Okinawa Island PARK Chanpil This paper is the investigation for village and traditional houses in Okinawa Island. The purpose of this Speedy & Simple Kenji, Yoshio, and Goro are good at English. They have their ways of learning. Kenji often listens to English songs and tries to remember all the words. Yoshio reads one English book every The social image of Muay Thai in Thailand Hishida yoshifumi Abstract Muay Thai is a martial art which is a root of Japanese Kick Boxing and K-1. It has become a famous sport among Thai as a martial art. A study of actual condition of ownership and intention of utilizing the land in Local City - Case Study of Central District in Fukui City- Toshinari Fukuoka Shinji Nojima' This paper aims to clarify the Abstract A study on students' satisfaction with campus life in educational psychology. Are university students satisfied with campus life? Koshi Makino Yukiko Mori The purpose of this study was to explore On Shishi Bunroku s Oban : from Speculation to Investment, from Entertainment to Literature Tsukasa Izumi The novel Oban, by Shishi Bunroku, is a popular fiction set in the pre- to post-wwii period, describing Modeling for Change by Latent Difference Score Model: Adapting Process of the Student of Freshman at Half Year Intervals Kazuaki SHIMIZU and Norihiro MIHO Abstract The purpose of this paper is to present
{ "pile_set_name": "Pile-CC" }
It’s more than okay to be obsessed with Killing Eve. The first season of the BBC America series made it into the top five of our (and pretty much everyone else’s) Best TV Shows of 2018. On top of much-deserved neverending praise, Killing Eve star Sandra Oh just won a Critics’ Choice Award, a Golden Globe, and a SAG Award for her work on the show as Eve. (I’m still waiting on justice for co-stars Jodie Comer and Fiona Shaw though.) The official trailer for season two appropriately — in the series’ twisted sort of way — dropped yesterday on Valentine’s Day, and now April really can’t get here soon enough. Until then, there is this: Uproxx recently spoke with Sandra Oh during the winter TCA Press Tour about the overwhelming response to the series, as well as what to expect from the new season, which sees Emerald Fennell is taking over for Phoebe Waller-Bridge as lead writer on the show. But first, we had to get to the bottom of a very pressing issue. First things first: What did you choose on the menu? I chose the tuna. But I’m a sharer and I want a bite of everything, so I’m sharing a bunch of stuff with my team too. But I always feel like at these events, no matter what – [after] every award show I always have a burger. I always have a big burger. Where do you usually get the burger from? I don’t want to say where I live, but there is this burger place near my house … and they have great burger. I had a burger after the Globes, and it was a burger from the Beverly Hilton. It doesn’t matter where it is. As long as there’s a burger. Burger and fries. Burger and fries. What kind of burger though? No cheese. A lot of mayo. A lot of pickles. Yeah. Medium rare, but I don’t like it flat. I like homemade fat patties. I like a lot of mayo, and I like a lot of pickles. And no cheese. Now that that’s been revealed, what can you say – I guess without spoiling too much, but if you want to spoil, go ahead – about season two of Killing Eve? You know, I’d say definitely for Eve’s character – her journey – it gets super dark. I feel like she is pushed to the limit in her, not so much pursuit of Villanelle at this point, but her dynamic with Villanelle and her pursuit of her job. And she’s pushed to the limit, and then she goes over. She fell over. Yeah. I want to congratulate you just for all your recent success. You just won the Golden Globe for the series. Did you expect the show to be this critically-acclaimed and beloved? No, you can’t. You can’t ever. I felt that the show was special – I felt it from the very beginning, from the pilot. And I felt even when we were shooting the first series, even if we didn’t get everything we wanted… I felt, “That scene’s great.” But you can’t – I don’t think we could’ve possibly known. And it’s not what you think it’s going to be. An integral part of the series is the dark humor, and after seeing the first two episodes of the new season, the dark humor is definitely still there. Were you slightly worried or at least curious about how things would change with a new head writer? Oh yeah, sure. But Emerald [Fennell] and Phoebe [Waller-Bridge] are very good friends, and they really come from the same kind of mindset. But of course Emerald has her own take on things and her own ways. How do you think your voice and Emerald’s voice matched? Well, I think that – again, it’s like there is a great thing that happens between Eve and Villanelle. I think there is a great thing that happens between myself and Jodie (Comer), and I think that same creative energy, that same very strong dynamic between the actor and the writer was definitely what we were following. With Jodie, I think one of the most interesting things about this show is how you two have this dynamic, but a lot of it is you rarely actually being on camera together. Yeah, but you know what? It’s like your character is thinking of the other character all the time. All the time, right? So then, Jodie and I also really like each other as people. It’s really nice to be able to kinda share the screen with her ‘cause it’s special. And we really bring our game. What was your very first scene – the hospital bathroom scene – together like, just in general? That was great because… Eve does not know anything, and in some ways Villanelle doesn’t know anything. She knows that she’s about to go kill a bunch of people. But it’s almost like… Eve is really the innocent one in that scene. She doesn’t know what going on, she’s just in the bathroom, she has no idea that her life is about to change. But what’s so interesting I think about that scene is that something starts rumbling first for Villanelle, you know what I mean? It really starts rumbling when she just sees Eve. I really love that scene because, there’s this thing that I feel like, thematically, we’re both in a mirror. And I always feel like that kinda continues on even in the second season. When did you I first notice that people were really responding to this show? Was it immediately? No. So, it came out last year in April here. And television is consumed differently. BBC America, baby – week by week by week, which is old-fashioned watching. But it was great because people would actually wait and watch it for real. I’ll tell you a story: So before I was going to go back for the second season, I would say this must have been in May, I had to go get my visa for to work in the EU, right? And so I went down to like Rodeo and Crenshaw. I got there early, so I drove around and looked at the beauty boutiques [to see] what is going on in the African-American community. What are the hair products, because that’s also what I use that a lot on my own hair. So I was in there, and … I felt like the woman behind the counter was Asian, right? Her clientele African-American. So, Crenshaw and Rodeo – somewhere down there – and this woman goes, “Are you on that show?” And I absolutely feel like, “Oh, she’s gonna say Grey’s Anatomy.” And then I ask, “Oh, what show?” and she goes, “Killing Eve.” And this is in May, right? This is only a month after it’s opened. Then I’m like, “Yes, yes I am.” And then she goes to her client, to this woman – African-American – and she say, “Oh, you need to see that show. You need to see, she’s on this show.” And I just thought, “Oh my God.” That’s when I realized it was outside of the Hollywood bubble. That it wasn’t “just” a “critically-acclaimed” show. It’s not like that kind of thing. The lady who sells wigs and the women who buy wigs are potentially watching this show, and that’s when I felt like there was a shift. But your question, as in the rise of it, you know I was not here. I was then in the UK for the next six months, and I feel like I’ve only really felt it since coming back and doing the Globes. Speaking of the Globes, is it possible for you and Andy Samberg to host every award show from here to eternity? That dude is the best. He is such a great guy. I would do anything that he would ask me to do, but I wouldn’t host another award show. So it was just a one-shot kind of thing? One and done. I felt like I did what I wanted to do so. You did well – you hosted and you won. So I guess that’s a mic drop on award shows now. Yeah, I guess so. Alison Herman from The Ringer wrote a piece about how Killing Eve and Barry – two fantastic shows that came out around the same time – make bad fans of us all. Obviously, we all love Villanelle. We also love Barry. We love them both, but how do you feel about the fact that you have a show that is making bad fans of us all? You wanna know what it is? I say it’s that classic – not the classic anti-hero, it’s a new hero … The new flawed, killer hero. We’re not actually rooting for Villanelle to kill Eve. I guess we just want you to ride off into the murderous sunset, whatever that might look like. I don’t know, I guess you’ll just have to stick around to see if they can make that work. “How can these two crazy kids make it work?” Oh my god. If season three goes off the rails and becomes a completely stylistically different thing, no. If there is a season three, I should say. But I just think we have the template, we have the foundation of a family of really strong characters, let’s keep on exploring. Yeah. Do you think about things like the possibility of a sophomore slump and how to avoid that? Those things, I leave it to the creative gods. All I know is that we were there working hard and making the best TV that we could. How that comes out and what you guys think … All I know is that I feel good about it. Final question: How would you describe the show to someone who hasn’t yet hopped on the Killing Eve bandwagon? How would you sell it to them?
{ "pile_set_name": "OpenWebText2" }
Taysom gets every now and again, but clearly when http://www.officiallaramsauthentic.com/Dominique-Easley-Jersey.html he’s the game he is pretty effective on special teams a large way.his debut with he guided to their first 30-win .Combined, McDyess and make almost $20 million and are the last of contracts.Since then, Gates has fallen off — perhaps a sign of what’s to come 2015. Pollard, who like Byard wore No.31 with the Titans , expects the safeties to be more involved.However, Barcelona have since signed Bordeaux winger for a fee that could rise to £37m which could spell the end of their interest .NFL Network Insider Rapoport reported that Dupree is going to have surgery to fix a core muscle tear, per a source. • noted that you’re not going to see as many seven-step drops Chicago, which could cut down on the sacks allowed. Every rep I can get, it counts, said Ridley.The coach, though, was seen by as Public Enemy No.The former Tennessee defensive end get plenty of opportunities.We’ve all grown accustomed to pro athletes using tired cliches interviews, but who knew they were actually being spoonfed some of their non-answers from their coaches? Brandon and Shepard were hurt on the same series the second quarter.To cast such a vote, fans should tweet the first and last name of the player, or the player’s official Twitter handle, along with the hashtag: #ProBowlVote.Adversaries like Texans linebacker Cushing said that, at the height of Manning’s career, opponents could tell just from looking at Manning when he had deciphered what opposing defense was trying to do — and they knew he would slice through them from then on.retrospect, Green Bay can be faulted for a lack of killer instinct, as well as mental breakdowns by coaches and players on some pivotal plays.He’s second on the team with 20 catches and leads Buffalo with 258 yards, and tied for the team lead with two touchdowns. Jankowski scored a goal and assist while adding four shots and a plus-1 rating Wednesday’s 5 win over the Sabres.We did what we do.Behind Trubisky on the quarterback depth chart is�?.Murphy has had a large role on the blue line since being called up from the AHL as he’s averaging 18 minutes of ice time per game.rushed for 101 yards and a touchdown despite missing most of the fourth quarter after aggravating ankle injury, and No. Roethlisberger said he felt something funny his knee after the game, per NFL Media’s Aditi Kinkhabwala.Senior WR Leggett look to catch his fair share of passes Offensive Coordinator Patrick Nix’s pass Womens Dominique Easley Jersey schemes.It’s not something that I feel would be my style or beneficial to me.Even his twilight, as the seasons dwindled and other quarterbacks began to eclipse him on the field, Manning remained what he had been since NFL teams first began to covet him, since defenses first feared him, since he started to bend offenses to his .Hansen sold the horse to South Korean interests where he now stands.18 – Avilan blew his first save, allowing two runs on one hit and one walk 0 innings, as the Chicago White Sox lost to the Oakland Athletics 12 on Wednesday. The public have heard about the Hall of Fame August during induction ceremonies and the http://www.authenticangelsshop.com/authentic-7-zack-cozart-jersey.html Hall of Fame game, which opens the NFL pre-, and then again perhaps during Super Bowl week when the official inductee class for that year is announced, , evp-marketing for Phillips- Heusen, said during interview with NYSportsJournalism during the Fan’s Choice Class of 2011 launch event this past .He landed roughly on his right shoulder and neck while getting thrown down by Funches late the first half, and the Bruins decided not to risk his health further.The team should update his status again when it returns home from the West Coast swing, but Tkachuk’s next opportunity to play arrives Wednesday.I do not know what it does statistically but that being said it does a heap for us the confidence department when you talk about knowing you can Zack Cozart Womens Jersey go into a battle and be down and come back and win those . I’d be shocked if these guys came even close to what they accomplished last year.• Moore is an underrated player.It was the largest deficit a Manning-led team had faced a victory.DeBartolo Corp.He and each have children from previous marriages, and their decision six years ago to devote their charitable energies to the American Family Children’s Hospital was hardly coincidental. The winner is expected to be next for the winner of the UFC main event between heavyweight champion Fabricio Werdum and Cain Velasquez.His record .She is biggest fan and is always there to help me time of need!Puck drop between the Capitals and Golden Knights is only about eight hours away. There’s no excuse any more, Bullard said.Go get him!’ I talked to him on the phone, and he’s like, ‘Everything behind us?’ I’m like, ‘Let’s http://www.authenticpittsburghpenguinsstore.com/authentic-tom-barrasso-jersey go win.’ He goes, ‘Let’s go to war.’ Done.Speaking of the quarterbacks, I’m also tempted to place Luck even higher.Past captains such as Shea Weber and Fisher should provide a template for success that eyes can look to for guidance.trained me to replace him, he made comments every single day about how foot was on his back and you’re http://www.officialnationalshop.com/authentic-26-adam-lind-jersey.html just trying to push me out the door and I’ve given you all of this stuff and this is how you repay but at the end of the day, he’s joking but it’s true, you’re training your replacement when you help a younger player. I mean, I ‘t want to speak for him, Adam Lind Jersey but that’s the sense I get.And when adversity comes — as it always does — the team should be better equipped to handle it.It is unfortunate they won’t take Duke on at full strength but that still help their RPI.Skip to content The Nashville Predators probably weren’t expecting to make a steal with their late first-round pick the 2017 NHL Entry Draft.We’re appreciative of ‘s dedication to the Colts, and we wish him the best moving forward. Coaches watch and re-watch practice, every day.Well, this weekend, of the Tom Barrasso Jersey biggest stars once again be the West and the biggest storyline be the continuing bitterness between Conference All-Stars – Westbrook and Durant.Had three carries for 16 yards and two catches for 35 yards at Green Bay , including a 13-yard catch on third-and-nine with under two minutes remaining the first half, helping set up a Buccaneers field goal.NESN’s Lyons and Pellerin discussed the return of Sale’s velocity and what might account for it Thursday before the Red Sox took on the Seattle Mariners.I mean, we used to draft off the All-American teams the newspapers, says longtime general manager Accorsi. Throughout April, we’ve been hearing plenty of chatter that is the pick of .And that’s what we’re doing here.1 on the country charts since it debuted at the top spot December.Back then, he was on the rise and really doing well. Projected winner: Hillman — Elway’s boy — earn a spot behind McGahee.We’ve all seen the person with five plays on a Sunday having loaded up on one lock, only to win the four small bets and lose the big for overall loss.Red first saw Briere at Womens Danton Heinen Jersey the Penguins’ training camp of 1969.That question shape their decisions the days and weeks ahead.28, started the second game of NFL career as the Packers opened with three safeties, with him appearing on 33 defensive plays and registered two solo tackles and one pass defensed. People are going to look at this series and say: `Oh, 4.One who’d been at the Superdome spoke of the makeshift shelter as a house of horrors: No lights, no water, people getting shot.After a – , he didn’t experience the cold streaks with his passing that plagued previous years.took that skill, as well as his speed and size, to the Chicago Bears, for whom he became a breakout last .Utah Jazz 10 PM The WNBA said the Las Vegas Aces have forfeited a game scheduled to be played on Aug.Former Kings Dean Lombardi’s name http://www.bruinsofficialauthenticshop.com/Danton_Heinen_Jersey_Adidas has also been thrown around a bit, and he might end up being the guy Dalvin Tomlinson Jersey if can’t lure BriseBois away from the competition. The 33-year-old will be available later fantasy drafts than we’ve seen over the past decade.He agreed to chat, however, part because he knows he’s talking to a kindred spirit.As I told them the huddle a couple times, we were right where we wanted to be, and we had our opportunities, coach Dixon said.Probably a that thinks he’s got all the answers.Record: Week 15 Ranking: No. If Eichel progresses his third year like he progressed his second, and stays healthy, it’s hard to imagine him not putting up at least 90 points 2017.His decommitment, his father acknowledged, was part because of Hardaway getting hired by Memphis shortly after Jeffries committed to Kentucky.With that out of the way, let’s get this thing started: • This wouldn’t have made the list before Marshawn Lynch ‘s arrest.He is progressing fine, said.And there is another side to this idea that retaining his coordinator turns up the pressure on himself. By eschewing the huddle, the offense forces the defense to stay alert and ready, while also restricting the defensive coordinator from sneaking replacements and specialists to get after the passer.November 2015, congratulated students at Pinellas Park Middle School for winning the Fuel Up To Play 60 Defend Your Turf Challenge through a special assembly and P.E.The Bruins defeated the Devils 3. By playing for Waterloo, Tomek won’t a year of playing if he decides to then transfer to another school afterwards. As soon as the rang, she wildly charged at Rousey with a flying knee.7 Record: Week 14 Ranking: No.ZTE also has official partnership with the .While other Steelers made the occasional play, steadily put up 137 yards from scrimmage, inching him ever closer to 2 …I too get excited whenever he gets out of the pocket, and I too am wowed at his freakish playmaking ability. Played three seasons at California before joining Illinois 2016 as a graduate transfer …We’ve put together a plan of how we wanted to build our team and our guys have bought into it.He made a ton of tough throws but also a lot of bad decisions where he forced things.On WR Roddy White and his process of maturing over the last few years: Roddy has a great skill set terms of what you’re looking for a wide receiver.He is a good passer, both transition and from the point.Just play fast. Sacramento State has lost six a row.Christmas Day Schedule �?Milwaukee Bucks vs.I’m hoping this setback — it shocks us to get things right.There never seems to be a moment on or off field that is too big for Dareus to handle.Forward is fourth the NHL with 293 assists, and first with 193 primary assists, since 2012.It’s hardly a surprise that the Bears go with Trubisky considering how badly Glennon has struggled. Also being sold mass quantities for the Big Game: 14 tons of chips, 1 billion chicken wings and more than eight million pounds of guacamole, per WalletHub.There were unforgettable visuals on the day – from the packed stands at Stadium, to the Penguins taking the ice while a heavy snow fell and sliding the puck past Ryan Miller to end the contest, to name a few.I was more worried about, ‘Let’s get this thing done fast before anything does happen,’ said Loewen, who explained why he felt like moving the victim was the right decision.Paxton Lynch appears to be a first round bust and has not shown much either.The Bison shot 28 percent the first half and went into the break trailing 53.Ownership was willing to let the front office use the full mid-level exception on , who isn’t the sexiest pickup to fans but whose defensive numbers San were outstanding. Some 60 rubber ducks drop off the Wabash Bridge into the Chicago River on Aug.Understanding the profound connection between New Orleanians and their football team, Benson sought a quick turnaround after purchasing the team 1985 to prevent it from moving to a new city.Hodges was pulling three all-night library sessions per week to stop a slow bleed http://www.dallasstarsofficialonline.com/Adidas-Ty-Dellandrea-Jersey on his grade point average.He was cut before the first game. The point being: Whoever wins the training camp battle between Bullard and Robertson- play more snaps Week 1, but not necessarily by a wide margin.3 against the Washington Mystics DC as the Aces failed to appear.When I talked with his camouflaged four-wheeler, he explained to me why Smith’s presence — just being there on the field — was important.Harvin gave the Vikings one of the league’s most dynamic threats.KA13 is fresh off a vintage performance against the Bills when he caught 12-of-13 targets for 159 yards and a pair of TDs.The Jaguars have simply told Robinson to stay home and rest his this offseason. It brings fear to offenses.9 nationally the AP and USA Today polls during the .results are on the Watkins race results . 2 Related Tocchet: I honestly ‘t know.Their http://www.nflpantherslockerroom.com/elite-ryan-kalil-jersey metrics is actually much better than a lot of teams from BCS leagues but they are just 17 and really ‘t have as much juice as you’d expect from such a good league.has one more year left on his contract before he can become unrestricted free agent the of 2019.And the next competition here is underway: To be the first one of this bumper crop to have his tag pulled Chicago.14: returning for , who emerged as offensive threat under interim coach Orgeron, announced that he return to school next . Obviously I’m fighting for a job right now, production is huge for all of us out there.stood outside the cafeteria at Saint College, the shadows of the Basilica, took a look around and smiled.New Ravens Offensive Coordinator Mornhinweg said he’s still the middle of trying to figure out how much of his fingerprint to put on the offense at this point.He has the soft hands to make moves on defenders and get himself the open space to get a shot off, as well as the hockey sense and the elusiveness to find open spots the defence where a teammate can Ryan Kalil Youth Jersey hit him with a pass.Look for new special teams coach Ben Kotwica to improve the unit, but that will Ty Dellandrea Jersey require better play from the lower half of the roster.Dan Marino, Sr., QB, Pittsburgh 5. Patterson displayed explosive playmaking ability the return game, out of the backfield and improved skill the pass attack as the year progressed.it was emotional.The Baltimore Ravens reported to training camp yesterday, while the majority of teams begin on July 24.That should balance out, and put them the top 10 on offense for the fourth straight year.I saw him scramble around and make a play to Harbor.The Pats aren’t giving up this request. Which is why their next attempt was very disappointing.9 – How do new coaches approach a preseason opener?Unfortunately for the Hurricanes, their decision to sign Darling as the team’s starting goalie has not worked out.16 Record: Week 22 Ranking: No.Still, too times, ‘s protection couldn’t hold the fort past the three-second mark. Just ask Turley.Cleveland Cavaliers 9.Another injury could possibly be career ending — and if it happens, could impact the Cardinals’ 2018 drastically.It’s not experience I’m eager to repeat anytime soon.4 and Oklahoma No.- Dean Blandino November 14 That’s great stuff from Blandino. Green Bay’s secondary has been upgraded, especially with the play of rookie safety -Dix down the stretch, and finished 10th overall against the pass 2014.37 South – Buy Them Grothe might have been the best freshman quarterback the country last year.Analysis: Henson has shot 50 percent or better each of the last 11 , a stretch where he’s averaging 11 points and 6 rebounds while going 54 of 82 from the floor.If you’re the Oilers, you can’t trade for Price and keep Talbot. They are going to take a huge step backwards, as their schedule and lack of talent should lead to a 6 and another bowl failure.He was coming off two good playoff years, but he had not been coaching three superstars.Mahomes displayed his big arm, athleticism and fearlessness, taking several big shots. Gaborik, who scored the first goal Wild history and remains the franchise leader several categories, was moved up to Los ‘ top line with Kopitar and Brown late the second period, and the trio quickly produced results.Check out the AFC West entry below.T started his 161st consecutive regular game, tied for the second-most starts among active offensive lineman.There are teams planted the Top 10 that have absolutely no chance of competing for a national title while other stronger, more skilled teams get brushed aside to the Others Receiving Votes category .1 — and going to work for O’Leary’s old protégé, current Houston Texans head coach Bill O’Brien — brings that out spades. Maybe folks the organization have realized things didn’t have to be that way.After the snap, Mariota reverse pivots and rolls to the right.Parcells and sometimes sparred, largely because Parcells wanted greater control of personnel.family has a Bichon Frise named What sports did you play growing up? Prior to joining our team http://www.officialpanthersfootballstore.com/Ed_Dickson_Jersey that , started 76 six years with Tampa Bay.I am very excited about joining the team at Products Company, said a statement.But for exceptionally taller players like McGee and the 11-foot Damian Jones, the Slovak suggested whittling down surplus Ed Dickson Youth Jersey telephone poles or ripping out redwoods from the Redwood National Park when no one’s http://www.nflramsofficialonline.com/RAMS-JAMON-BROWN-JERSEY looking.Looking back on yesterday the disappointment is still there, said Verstappen, who has now retired from four races this .Just Womens Jamon Brown Jersey sign up for account, and you can use the $60 free picks for any Doc’s Sports Advisory Board handicapper and any sport.NFL Network Insider Ian Rapoport reported Edelman suffered what is believed to be a torn ACL, according to sources informed of the injury. He is out there swagging it.Analysis: Giannis has scored 30 or more points five the last eight .Johnson and Trey Hopkins, and cornerback William , as well as kicker Bullock.He was tied with 212-pounder Jeff of Division II Saginaw Valley State for the fifth-fastest time. And when we initially got our meetings started, we talked about the tradition of this team and where it’s been and where we want to go, and the prior players and the great players that have played for this city. is battling a lumbar spine issue and hoped to avoid surgery, Rapoport reported Friday.There’s no rush. NFL Commissioner Goodell addressed for the first time Wednesday a recent Wall Street Journal report that detailed a dip television ratings over the first few weeks of the 2016 regular . Ives, I met a with seven wives — and debating religion and the nature of life and death.Korver is simply untrustworthy.According to a Gainesville Police Incident report, Smith, then 24, alleged Zach Smith had picked her up by the T-shirt and slammed her into the wall. For that coach to come out and say that, that’s not what a should do.Useful Statistics Toronto is 4th the league with 111 points per game this year.The blue-chip stock on the roster upgraded immediately.Min odds bet and payment method exclusions apply.That play alone summed up the entire game Authentic D.J. Fluker Jersey on Jan. It’s about getting game ready, Olson said.Kobe has a sense of the game similar to playmaking ability and skill, said Lakers coach Phil .They did what they had to do, Balkman said of the Knicks dealing him.Standing around the kitchen, she and told the story of what happened when she opened her letter.Crew chief has been fined $65 and suspended from the next three Monster Energy NASCAR Cup Series points events. While the split looks like how we it up, the results do now.The 30-second spot takes place on a golf course with golfers being challenged by a difficult course.That’s why the Patriots must make a concerted effort to take http://www.seahawksshopfooball.com/Dj_Fluker_Jersey away Philadelphia’s rushing attack a Foles-led offense.He’s petitioning the NFL to be listed as a wide receiver rather than at tight end, which would increase his tender from $7 million to $12 million. The Colorado Avalanche takes on the Ottawa Senators the first of a two-game series on Friday.No need for him to commit yet – and he never have to – but the fact he’ll get to late his minor-league career assures him a higher of success at one or the other.With Strickland expected to miss at least six weeks, it’s unlikely Dyson’s leash would be short enough that he’d be jeopardy of losing the closer job due to just one bad outing, but former closer Watson is waiting the wings should he continue to struggle.A statement read that the CAF Referees Committee has confirmed the recommendation of the CAF Disciplinary Board to ban Nigeria referee Ogabor from any official mission for one year for attempted match manipulation.END OF STREAK Turner was hitless five at-bats, ending his league-leading 14-game hitting streak.Some of this is about adjustment to a high level of college basketball. You can get this on the English transfer market.Koscielny found himself unmarked the centre but could only direct his header from Persie’s free-kick against the crossbar with Cech rooted to the spot, before the Dutch marksman fired straight at the keeper after being picked out by a fine pass from .That was not the case 2017.This week, the put the school’s record-keeper to work, as well.has a two-year offer worth more than $50 million from the Nuggets.Seattle is a legit team once again. State’s fiery big seems content his new surroundings and wants the hardware to show for it.24 Richardson, CHA Three-time major winner Spieth appeared in danger of missing the cut for the fourth straight year after opening with a 75, but he got into the weekend with DeForest Buckner Jersey a valiant 68 and, by the end of https://www.49ersofficialonlineprostores.com/49ers+deforest+buckner+jersey his third round, he had climbed into the top 10 alongside Tiger Woods.The ball bounced kindly for Carney, who touched down the corner.His recent availability.We wouldn’t be the situation that we’re without him and his commitment to the organization and to our players. The USA Basketball Showcase presented by Verizon schedule incudes: July 22 USA vs.The knee injury cost Scandrick the entire 2015 .Unfortunately for them, they play a division with Rodgers, Kirk Cousins, and Stafford.The most foolish thing you could do — and I won’t — is completely cross off the Texans from postseason consideration. On the ice, Steen is still productive with 39 points 60 this .While ILB Todd recovers from a sprained shoulder, Nelson has handled first-team work. the fourth round, the team rolled the dice on one of the smallest players available that draft class: a 5 137 pound forward from the United States Hockey League named Gaudreau.Hoffman E T4.The Warriors grossed approximately $95 million with eight home dates 2017.Very aware from zone coverage. 23 – Lopez scored eight points Saturday, going 3 of 5 from the field, as the Chicago Bulls lost to the Boston Celtics 117.He played the first thirty-one of the and scored seventeen points before breaking his wrist.Round 7 the seventh round, the Raiders drafted forward Gross from Las Vegas, NV 141st overall.It’s more, no this is the core of the team and this is what it’s going to be for the next handful of Ryder Cups and this is how we are going to do it, McIlroy continued.Getting back to Karlsson, the contract should leave the Lightning with about $3 million available cap space as of today, per Cap Friendly. Cameron Brate was second on the team and well behind Evans with 19 percent.United sits atop the league standings after a pair of 4 wins to start the , while Leicester is with five goals scored through two matches.As even as their first matchup was, the Panthers-Penguins rematch was�less .I told these guys I was going to give it everything I’ve got.His rookie not win him the Calder Trophy , but his 36 goals 64 points over 73 as 18-year-old was pretty impressive. He helped the Rams move from the 32nd-ranked scoring offense 2016 to the league’s top-scoring team 2017, marking the first time league history a team has gone from last to first scoring., this divided family.He never gives up.He joined a team with a deep running back corps, that had drafted another back the fourth round, and played his way onto the roster and into the Saints Hall of Fame.Strong safety Dennis Briggs is another fifth-year , and he has talent and experience around him with free safety Damar Hamlin and cornerback .It has been easy winner the last two years and now is the time to jump on board with a veteran handicapper that has 47 years of experience the industry. What does this mean for the EaglesThey had a point differential of 1 as they averaged 105 points per contest while giving up 104 per game.Jerome Miron-USA TODAY Sports Fraser recalled how heading into his first preseason he had elaborate plan for how he was going to revamp the team, at which point reality smacked him the face.Analysis: Markkanen failed to hit a 3-pointer for the first time 16 but did shoot 50 percent or better for the first time five contests. Peak position on chart: 4 Date it peaked on the chart: Dec.88 SS and be featured on ‘s No.On opening night, the Warriors were stunned Oakland and the Celtics’ high hopes took a tumble.Last it was the TSA line that Peters used consistently for a while.The Pacers lost to the Pistons a close game on Wednesday. Barford, though, scored 12 of his points the first half to help Arkansas recover and push its lead to as as 15 points the first half.was rated at 96 last year.This was the second consecutive week where we saw veteran Celek not only out-snap the rookie , but also outpace him in production as well.We analyze how the Warriors will look after the acquisition of Kevin Durant and the 3 collapse in the Finals, how their new additions fit in, potential breakout and regression candidates, overrated and underrated players, playing time and lineup issues, key questions for success this year, and finally give our predictions for the Warriors .He went on to rip off a 4 40-yard dash at Baylor’s pro day. Greyson from Peterson, MN Because of the controversy regarding the Martellus signing and release, is there a possible scenario where his signing does not affect the compensatory picks received by the PackersWith the now nearly over, a group of socially committed players remains at odds — with Kaepernick as the dividing line.Since that time, a traditional 4-bore space Chevy combination does still power the ‘Bu, but the block and cylinder heads are custom and made from billet due to durability needed when the Garrett GTX turbochargers Womens Amari Cooper Jersey are stuffing more than 70 psi of boost into it.However, Texas law has a safe harbor clause that allows students to take banned substances if under doctor’s care for a valid medical purpose. pays attention to the details of everything from week-to-week, Edwards said.On paper, that shouldn’t be that monumental a task.For sure this was the toughest of the four .Monster series for street and casual rap music have their own unique interpretation.It’s always good to come http://www.officialathleticshop.com/authentic-34-rollie-fingers-jersey.html back and know that you’ve won on a golf course like this because it is tough, and obviously the weekend changes, the speed of the rounds happened very quickly. Hand the ball off.Despite those valid points, Krause’s words revealed jealousy that received most of the for Chicago’s success during the 1990s.Cousins went 2 of 6 from behind the arc.In perfect timing, just as we finished getting set, the sun was right where it needed to be for the best shot!It could come up to the before , Griffin told ESPN. is under contract for this and the 12 , but he can opt out of the final year of his contract, which would pay him $11 million.With that mind, we came up Authentic Rollie Fingers Jersey with the top six NFL endorsements we would like to see.25 — at Hornets.Just eight other pitchers have made 15 such appearances, and no others have topped 20. USA Trials-May 2015: Superior size complemented by agility, footwork bring next level impact; shot blocker, defender key with mobility uptempo game; emerging offensive game; among the elite post performers the 2018 class.Barnes looks ahead to this weekend’s Six Nations action and reflects on the latest PRO14, Top 14 and Super Rugby talking points.met with after he saw him fraternizing with Dwyane at halftime.No, I haven’t! What took you The fact that is of Asian descent is also helping to bolster the Rockets’ international connection.It would be a major boost to either of those clubs to make the group stage this .It’s safe to say is happy to be home, and the fans are more than happy to welcome the future Hall-of-Famer back. WHERE’S Staley said Coates watched the game at home instead of on South ‘s bench on the advice of the university’s medical staff.Simply put, if something extraordinary happens, you shouldn’t count on it happening again.15 Nate Robinson, New He showed off his new look during the live finale of The Celebrity Apprentice New City that same year. Sunday, they made two errors and had three runners picked off, continuing – — make that two – — trends.We’re bringing back this year, President Bird said.Number 17 has been part of some of the greatest teams Chargers history, including squads that went 14, made the AFC Championship team and so on.AFC cornerback Hayward of the Los Chargers , attempts to intercept a ball intended for NFC wide receiver Odell Beckam Jr. Second-team selection on Associated Press All-Pro team …This is something we find out as the moves forward.1st November.Honestly, just consulted a lot of my family and closest friends, and just realizing this is what I love to do, and http://www.officialauthenticdolphinsprostore.com/Nike-Akeem-Spence-Jersey.html I’m not ready to give it up regardless of the hardships, Tuck said.won’t play against the Flames, Chip of The News & Observer reports. Gary Tanguay, Trenni Kusnierek, and Hardy discuss the results of the survey.That’s Manning above the window.now Spoelstra has to text and say, ‘What do I do this situation’ And , who has iron-fist rules, answers, ‘You are on the plane.There is a stand near the on-field entrance for fans with four flavors. We’re barely half way through.The veteran right-hander start out the Cardinals’ bullpen, though he’ll remain option to start should opportunity arise.I had three houses, and they were destroyed.No Obligation. With added Authentic Akeem Spence Jersey game tape to reference, defenses learn to scheme against the option with more success, but the relevence of the attack likely reflects to the type of quarterbacks entering the league.But there’s a reason why has such a positive reputation around the league.I found out when I came into the locker room and Vermeil was naming all the players and the last one he named was me, said.Weak competition or not, the Cardinals ‘ 3 start is no mirage — as evidenced by their record with the lineup over the past two and a half years.Turris places as low as he does, because he not fit most definitions of a prototypical No. City were reduced to ten men just before the hour when Gael Clichy was dismissed for a second bookable offence for a late challenge on Ramires.Fluellen enjoys bowling, mini-golf and watching movies with his wife his free time.We haven’t had nearly enough Tice our lives since he was the head coach Minnesota.The Shock square off with the Mayhem on Wednesday at 9 p.m.To add some staying power, however, he must adjust to the game all situations. Then gets it back to Sampson who nails a three and the lead Joey Gallo Jersey grows to 6 points.If he is anything like his dad, the future King should be excited about what his genes have store for him.However, when a team also fails to make a dent when it comes to the running game, the issues could logically be traced to the offensive front.Projected to skate on the left side of center Trocheck, who is himself http://www.authentictexasrangershop.com/Joey-Gallo-Jersey coming off a cracker of a 75-point campaign, the 28-year-old scoring winger should burst through the 30-goal for the first time his NHL career, along with amassing a similar number of assists.Timberwolves, 7 p.m.21 – Zipser scored five points Thursday, going 2 of 4 from the field, as the Chicago Bulls lost to the Cavaliers 115. Bayern’s coach Udo Lattek said: We were sat on the bench just laughing after each goal went .
{ "pile_set_name": "Pile-CC" }
BBW Blazing Her Trail Demmy Blaze likes to spend time at the gym. That''s good for Demmy and good for distracting the guys who are trying to workout at the same time. Going to a spa or a salon for the day is like a mini-holiday for Demmy so she tries to fit that in at least once a month. "People think I''m famous and try to make pics with me," Demmy said. Demmy developed early and her top shelf got plenty of developmental attention. "My breasts got big when I was 15. I had the biggest breasts of all my girlfriends," said Demmy. "When I was 15, I had DD-cups. Now I have H-cups. The next time I see the people at Score maybe I can dance.
{ "pile_set_name": "Pile-CC" }
" But Professor..." " No." "The answers are all there in the test." "Aren't you forgetting something?" "I know." "It's something to do with the third differential coefficient." " Not that, Tonight," " What?" "Emma?" " What time is it?" " Almost5... 00," "Oh, God." "My proposal for utilizing solar power, rejected," "My concepts for harnessing micro-energy waves, rejected," "The dean suggests that I focus on something that might actually help mankind," "Like his study on the benefits of tobacco consumption," "Alex, the problem is your ideas are a bit too... radical," "The problem is with the faculty." "They're dinosaurs." "They're already extinct;" "they just don't know it." "They'll be discovered by some future archaeologist, and he won't know what to make of them." "Their dim little eyes, devoid of any curiosity..." "Alex, it's your first year as associate professor." "You might want to play things a little more conservatively." "You sound just like my father." "Look at them, Philby." "All alike." "All in identical bowler hats." "Do you want your students to turn out like that?" "I want my students prepared for the realities of the world they're about to greet." "Well, I don't." "I want them to run along this street and knock off every bowler they see." "Mrs. Watchit!" "Oh, huzzah, the master's home." " Did you get it?" " Hello, Mr. Philby." "Hello, Mrs. Watchit." "You're looking in the pink." "Must be all the exercise I get scampering up and down these stairs like a wee lad." " Don't torture me." "Did you get it?" " I got it." " Good." "Let me see." " But don't you think for one moment..." "I'm going to let you go out in that filthy jacket." "Now, go in there and change." "And you've got another letter from that annoying little man." "Well, go ahead, Switch it on," " It'll help people keep their teeth well into their 40s," " You might think about having that cleaned." " Oh, who has the time?" " How did you know with Molly?" " Know what?" " You were meant to be together." " She made the best shepherd's pie I ever tasted." "Don't you have a single romantic bone in your body?" "No." "I'm all bowler hat." "Why do you waste your time on that crackpot?" "Because he has some very interesting ideas." "A professor at Columbia should not be corresponding with a crazy German bookkeeper." "He's a patent clerk, not a bookkeeper." "I think Mr. Einstein deserves all the support I can give him." "I wonder if we'll ever go too far?" " With what?" " With this." "With all of this." "No such thing." "All right." "How do I look?" "Practically decent." "Really, Alex." "Good luck tonight." "She's a fine girl." "She's done wonderful things for you." "Don't worry." "You still have that alluring smell of chalk." "Oh, gotta hurry." "Now, that's more like it." "You look a proper gentleman for once." "Well, you better hope so." "If Emma turns me down, you'll be next." " Oh, I'm already swooning." "All right." "Wish me luck." "Thank you." "Fresh flowers." "Fresh flowers." " Have some flowers, sir." " Not tonight, thanks." "No." "I promised her flowers." "Spectacular." "Spectacular waste of money." "Damn thing's always breaking down." " Do you need a lift?" " Yes, yes." " How do you keep the water temperature stable?" " There's a cantilevered gasket..." " On the fuel regulator..." "Oh, God." "Uh..." "Much obliged." "I'm always forgetting the damn brake." "Hop in." "I'll give you a perambulation before it breaks down again." "Oh, uh, I'm afraid I have a prior engagement." "Well, another time then." "We perambulate here most every night." "Certainly." " Get a horse!" "Yes." "Alexander?" " Oh!" "Whoa." " You're late, Professor." " I got here as soon as I could." "Well, they say it's all the rage in Paris." "But I just picked it up..." " Five dollars at Macy's." "Silly, isn't it?" " Very silly." "I like it." "Well, where are they?" " What?" " The flowers." "You promised me flowers tonight." "Don't you even remember?" "Oh, I'm sorry." "I..." "Well, I was distracted." "Well, there's something new." " Uh, Emma, I need to talk to you." " Oh, uh, shall we walk through the park?" " Yes." "Professor, you're shivering." "I hope you're not coming down with something." "Well, I'm afraid I am." "I'm not sleeping very well, and even when I'm awake, I'm not much use." "I can't eat or think or do much of anything anymore." "And the worst part is, I don't know that I'll ever be well." "I think there's only one remedy, and that's for you to marry me..." " And spend the rest of your life with me." "Oh, Emma, I know it's right." "I know we're meant to be together." "It's the only thing in my entire life I've never had to think about." "Oh, Alex." "Uh-Uh, wait." "I have something for you." "You know, the moment is rather dying here." "l-I know." "Hold on." "Oh." " I know it's not a diamond." " A moonstone." "Well, it's your birthstone." "I thought..." "You thought right." "I just might cry," "I couldn't help but overhear." "Two fine young people starting out on the road of life." " I wish you the very best." " Well, thank you." " And as much as I hate to do this... moved as I am by your..." "protestations of love..." "I'll be needing your money now." " Sir?" " And your jewellery too." "I guess we could call this your first little bump on the road to marital bliss." " I don't understand..." " Don't make a scene." "There's no cause for that." " Just give me your wallet, will you?" " Hmm?" "Did you hear me, lad?" "Uh, all right, all right." "Here." "That's everything." "And your watch." "And the gloves." " And the ring." " No." "I'm afraid so, darling." " And maybe he'll buy you a diamond now." " Please, please." "Not that." "Don't!" "Why did you do that?" "It's only a ring." "Emma?" "Emma?" "Oh!" " What?" "Oh." "Oh, sir, Mr. Philby's here." " Here?" " Yes, sir, He insisted on coming..." " Tell him to go away, I'm busy," " I won't go away, Alex." "My God." "What's happened to you?" "I've been..." "I've been working." "You remember that?" "You used to care about your work." "I care more about my life." "And yours." "I came by the house every day after the funeral... and every week and every other month." "Then I stopped coming." "Did you even notice?" " It hurt me, Alex... very much." " Then why are you here now?" " There are some things I have to say you may not like hearing..." " I know." "I know." "You're concerned." "I know." "I hear it from Mrs. Watchit every day." "But really..." "I need you to go." " I won't leave." "Not with you hiding down here." " I'm not hiding." "You know that's what it is." "Mrs. Watchit says you're in here all hours... day and night." "Alex, will you please stand still and look at me!" "It wasn't your fault." "No." "It wasn't my fault." "Maybe we should blame Mrs. Watchit for picking up the ring from the jeweller." "Or the jeweller for making it." "Or the poor bastard who tore the stone from the earth." "Maybe I should blame you for introducing me to Emma in the first place." "Yes." "Alexander, nothing will ever change what happened." "No, you're wrong, because I will change it." "David, I appreciate your concern." "I do." "But I ask you to have faith in me." "Well, l-I want to have faith in you, Alex, but..." "Wha..." "What are..." "What are you doing here?" "I'll tell you what." "Why don't you come by for dinner in a week, and I'll show you?" " Why don't you come home with me now?" "Molly..." " Did you not hear me, David?" "I can't leave when I'm so close." "All right." "We'll continue this conversation in a week." "In a week, we'll never even have had this conversation." "Ah." "Thank you, my good man." "You're early." "That's a first." "I wanted to see you." "Well, where are they?" " What?" " The flowers." "You promised me flowers tonight." "Don't you even remember?" "You never cease to surprise me." "Emma, I need to talk to you." " Shall we walk through the park?" " No!" "No," "No." "Let's go into the city." " Alex, what is it?" " Nothing." "Let's just hurry." "Running along is all very well for you." "You're not wearing a corset." " Bleecker Street, and be quick about it." "Now you're all gallant." "Professor, you're shivering." "I hope you're not coming down with something." "No, no." "I'm fine." "I'm wonderful." "I'm walking down the street with you again." "But we took a walk three days ago." "Well, not like this." "Never like this." " Heavens, look at that car." " Oh, I've seen it." "Now I know you're ill." "You're passing up the chance to explore some new gadget." " It's only a machine." " Alexander, tell me what's going on." " Is something wrong?" " No." "No." "Emma, listen to me." "I need to leave you now, but I want you to go straight home and stay there." "I promise you I'll come by sometime later tonight, and I won't make any sense." "I'll be all upset that you didn't meet me in the park, but you must trust me." "Everything will be all right." "Just know how much I love you, how much I'll always love you." "All right." "But first, where are my flowers?" " Flowers it is." "Wait right there." "Don't move." " Oh, can I help you, sir?" " Yes, a dozen roses." "White." " No, no." "Red." " Look out!" " Easy." "Easy." "I'm looking for Professor Hartdegen." "Alex, I'm..." "I'm so sorry." " This was not supposed to happen." " Of course not." " I know there's nothing I can say." " We were out of the park, Philby." "We were safe." "Why can't I change it?" "I could come back a thousand times." "See her die a thousand ways." "I don't..." "I don't understand." "I can't find the answer here." "Not here." "Not now." "The future is now." "Certain restrictions apply." "Blackout periods on availability subject to change." " For full details, contact lunar leisure living." "Com," "Hi, friends, The latest update from Lunar Leisure Living," "Our engineers are currently preparing for the first 20-megaton detonation... to create the subterranean living chambers for Lunar Leisure Living." "Imagine fishing in our fully-stocked Sea of Tranquility, golfing on our championship course, home of the Neil Armstrong Open." "Fifteen-hundred-yard drives?" "Whoa-ho, no problem!" "At one-sixth Earth's gravity, you're guaranteed to get back on the dance floor." "So contact Lunar Leisure Living today to reserve your own little piece of heaven, because the future is now." "Certain restrictions apply, Blackout periods on availability subject to change," "For full details, contact lunarleisureliving." "Com," " Hey." " Hello." "Nice suit." "Very retro." "Thank you." "Bet that makes a hell of a cappuccino," "That thing." "I'll see you." "Hi, friends." "The latest update from Lunar Leisure Living." "Our engineers are currently preparing for the first 20-megaton detonation... to create the subterranean living chambers for Lunar Leisure Living," " All right, attention, everyone," "Class 23, could we gather, please?" "Our next stop is Antiquities." "Please make sure that your microscans are charged for download." " Two by two." "Let's look lively." "Two by two." " Stop!" "Quit!" "Tommy, if you do that again, I will re-sequence your D.N.A., so help me!" "Now, march." "March, march, Two by two, please, Look lively," "Welcome to Vox System, How may I help you?" "I didn't see you there." "I always seem to have that effect." "How may I help you, sir?" " What is that thing?" " That is my photonic memory core, or P.M.C., as we say in the trade." "Over here, sir." "What are you?" "I'm the Fifth Avenue Public Library information unit, Vox registration NY-1 1 4." "How may I help you?" " A stereopticon of some sort." " Stereopticon?" "Oh, no, sir," "I am a third-generation, fusion-powered photonic, with verbal and visual link capabilities connected to every database... on the planet," "Photonic?" "A compendium Of all human knowledge." " Oh." " Area of inquiry?" " Do you know anything about physics?" " Ah, accessing physics." "Mechanical engineering." "Dimensional optics." "Chronography." "Temporal causality, temporal paradox." " Time travel?" " Yes." "Accessing science fiction." "No, no." "Practical application." "My question is why can't one change the past?" "Because one cannot travel into the past." " Wh-What if one could?" " One cannot." "Excuse me, this is something you should trust me on." "Accessing the writings Of Isaac Asimov, H.G. Wells," "Harlan Ellison, Alexander Hartdegen..." " Tell me about him." " Alexander Hartdegen, 1869 to 1903," "American scientist given to eccentric postulation." "Found writings include treatise on the creation of a time machine." " Tell me about the time machine." " Time Machine was written by H.G. Wells in 1 894." "It was a motion picture by George Pal and a stage musical By Andrew Lloyd Webber..." " That's not what I mean." " Would you like to hear selections from the score?" " No." " ¶There's a place called tomorrow ¶" "¶A place of joy not of sorrow ¶" "¶ Can't you see it's a place for you and... ¶" "Thank you." "That's quite enough." "Will there be anything else?" "Uh, no." "No, I think I'll have better luck in a few hundred years." "Live long and prosper." "Sir, where is your designated evacuation centre?" "Sir, you are subject to arrest under martial law..." "Please put your hands out, palms together." "You will be held in detention until your evacuation centre clears you for transport." " Wait, wait!" " Just take it easy." " Hey, we got to get out of here!" " Wait." "How did this happen?" "The moon." "Come on." "Move it." " That's impossible, What happened?" " You been living under a rock?" "Yes, I've been living under a rock." "Now, tell me." "The demolitions for the lunar colonies screwed up the orbit, okay?" "The moon's breaking up." "All right?" "Come on." " Hey!" "Forget him!" "Come on!" "Emma?" "Shh!" "Hello?" "Hello." " Don't be afraid." "Oh, wait." "Don't..." "Don't go." "Wait." "I just want to talk to you." " Hello." "Oh, I'm sorry." "I don't understand you." " Do you know my words?" " Yes." "The lex, the stone language." "The stone language?" "But do you understand me?" "Do you understand me?" "We all learn it when we're young," "They tor'jen, Forget." "They forget it." " But I teach," " What is he saying?" " They're trying to decide if we should throw you in the river." "Tell me quickly, and tell me the truth." "Where do you come from?" "Well, actually, I'm from here." "Uh, just not from now." "You see, I built a machine that allows me to travel through time." "I'm from the past." "Oh." "I told them you hit your head... and you are a wandering idiot." " What are you doing?" " Getting ready for the mor," " The night." " Oh." "I'll come with you." " Eloi?" " What are your people named?" "Well, l-I guess you'd call us New Yorkers." "New Yorkers." "Are they friendly?" "Until you talk to them." " Tell me about your village." " It's a very busy place." "Everyone seems to be in a hurry." "And they all wear identical bowler hats." "Little black round things on their heads." " What do you do there?" " Well, I was a teacher like Mara." " And I make things," " Mealso," "I made a sess'quin'tan with my father." "We still use it." "A sess'quin'tan?" "Mara, der'enjen'wenlen?" "Sess'quin'tan, Steps of rope." "Oh, a rope ladder." "We can make one." "I will teach you." "Will you tell me more lon'el on the next day?" "Tomorrow?" "Yes, I will." "Why don't you take care Of this for me tonight?" " Thank you." " Good night." " Good night." "Kalen will tire you if you let him." "He's always been questioning." "Our parents were firm, but it is his way." " Where are your parents?" " They've gone from this place." "Oh, I'm sorry." "You were right, Philby." "I did go too far." "Sit with me." "Mara, why do you pull the boats up at night?" "Afraid they'll be stolen?" "Stolen?" "I do not know that word." "Well, are you afraid that someone will take them?" " It is just more safe this way." " Oh." " You must do things to be safe where you come from?" " Of course," "Or when you come from." "Ah, so I'm not just a wandering idiot." "Col'mar," "Maybe we could find some tomorrow." "Flowers?" "Alexander, Alexander," "Ah!" "Morlock!" " Is he all right?" " He had a dream." "Oh." "So did I." "I was moving through a jungle..." "And you saw a shape ahead of you." "Well, a face that..." "called my name." "We all have that dream." " All of you?" " Yes." "Now go back asleep." "You're still not well," "What does that mean, " Morlock"?" "A child's dream." "No more." "Go back asleep," "We keep these stones In many places," "This is the room where my parents taught me for the first time." "Why do you learn this language if you don't use it?" "It's a tradition we hand down." "It meant something once." "Must be here for a reason." ""One generation passeth away, and another cometh." "But the earth abideth forever."" "Why have you come here?" "Why have you travelled through time?" "To have a question answered." "Question?" "Yes." "Why can't I change the past?" "Why would you want to?" "You've lost someone." "Some one you loved very much." " Mara, why are there no older people here?" " What do you mean?" "Older people, your parents' age or grandparents' age." "They've gone from this place." "You mean, they're dead?" "Yes." "All of them?" "How is that possible?" "There are things better left not said." "We don't dwell on the past, Alexander." " We do something else." " What?" "We remember them... with these," "Alexander!" "Alexander." " Are you coming to work now?" "Come with me..." " No." "Alexander's not well enough." "We're going to see his machine." " Now?" " Stay with Toren." " Go the next day, tomorrow." " I need to see that it's all right." " This way." "Will you tell me more about N-New York tonight?" "I will." "Oh, good." "It seems fine." "We had quite a ride together." " It's ready?" " Appears so." "Will you use it now?" "Go back to your own time?" "Well, I..." "I guess I could." "Uh... it seems so long ago." "No." "You should go." "And I need to ask, Will you take Kalen with you?" " Why?" " Alexander, take him away, back to your time." "Will you?" " Mara, why?" " Please." "You don't know." " Take him away from here." "Kalen!" "Mara, what's going on?" "They're early!" "We must get Kalen!" "Kalen!" "Kalen!" "Kalen!" "Mara!" " Kalen!" " No, stay here." "Stay in the group!" "Run!" "Mara!" "Mara!" "Where did they take them?" " We have to follow them." "We have to find them." " We do not." "Col'quin tor," " Why not?" " This is nem Eloi'tas, our life here." " How can you just do nothing?" " How can tor'tasal'mor," " It is the day and the night." " The day and the night." " This is the world." " Why don't you fight back?" "Fight back." "Why not?" "Those who farquil'pax..." "fight... are taken first." " Kalen, do you know where they're taken?" " No." " Do they ever come back?" " No." " Has anyone ever followed them?" " I don't know." " Well, what about the Morlocks?" "There must be a leader." " We're not supposed to talk." "Kalen, listen to me." "Listen." "Sometimes we need to accept what's happening to us even if we don't want to." "And other times we have to fight, even if we're afraid." "Now, it's difficult to understand, I know." "Believe me, I know." "Now, they're afraid, and I'm asking you not to be." "So will you tell me what you know?" "We can save her." "Please." "When they go, we're not supposed to talk about it." " But we all know the place." " What place?" "Where the ghosts are." "Here it is." "Welcome to VOXsystem, How may I help you?" " It's all right." " How may I serve you?" "What can I get you?" "Oh, let's see." "Um, Henry James." "Oh, no." "Yes?" "No, no, no, Too depressing, Hemingway, perhaps?" "No, Too sweaty," "Plato, Proust, Pinter, Poe, Pound?" "No." "Complete Works Of Martha Stewart?" "Ah, I have it!" "Jules Verne." " Right up your alley, I would think," " Photonic, right?" "Or what's left of one, What's left of all of them," "I am the last, and "these fragments I have shored against my ruins."" "T, S, Eliot," "You wouldn't know him yet, but he is so depressing, yet so divine." "Oh, I'm sorry." "The lending library is temporarily out of service." "Not to worry." "I have them all right here... every page of every volume." "Can you tell me what's happening here?" "Well, my sources are no longer fully annotated, and my information is somewhat anecdotal, but I believe what was once one race... is now two." "One above and one below." "Two distinct species that have evolved." " And how do those below survive?" " That is there alquestion, isn't it?" " I don't believe it." " Well, if you don't like the answers, you should avoid asking the questions." "Look at them." "They have no knowledge of the past, no ambition for the future," " So lucky," " Why would you say something like that?" "Can you even imagine what it's like to remember everything?" "I remember a six-year-old girl who asked me about dinosaurs 800,000 years ago." "I remember the last book I recommended:" "Look Homeward, Angel, by Thomas Wolfe." "And yes, I even remember you," "Time travel:" "practical application." "How do you know about the Morlocks if you can't leave this place?" "There was one Eloi who managed to escape, He told me everything," "We spent years together, just talking." "The conversation's a little spotty now, but I do remember." " It's good to have a friend." " Then you can help us find the Morlocks, find Mara." "And if the truth is so horrible, and will haunt your dreams for all time?" "Well, I think I'm used to that." "My friend said he came from the east, from the jungle." " Will you describe it?" " I don't have to." "Just follow the breathing." "In the dream, we're moving Toward it, but I think it was meant to keep us away," " I might just go in by myself." " No." "Mara would be very cross with me if you got hurt." "Now, I'll find her, but I need you to go back to the village and light a fire so we can find our way home." " All right?" "Will you do that for me?" " I lost your pocket watch." "They took it from my room." "I'm sorry." "Why would they take it?" "Oh." "Stupid." "Mara?" "Mara?" "Mara." "Mara?" "Come a little closer." "I don't bite." "Do I surprise you?" " A little." "Yes." " Hmm." "We weren't always like this." "After the moon fell from the sky, the Earth could no longer sustain the species." "Some managed to stay above," "The rest of us Escaped underground," "Then centuries later, when we tried to re-emerge into the sun again, we couldn't," "So we bred ourselves into castes." "Some to be our eyes and ears." " Some to be our muscles and sinews." " You mean, your hunters." "Yes." "Bred to be predators, but bred also to be controlled." "You see, my caste concentrated... on expanding our cerebral abilities." " You control their thoughts." " Not just theirs." "The Eloi." "So it's not enough that you hunt them down like animals." " That's their role here." " To be your food?" "Yes." "And for those who are suitable, to be breeding vessels... for our other colonies." "You see, I'm just one of many," "I don't understand how you can sit there and speak so coldly about this." "Have you not considered the human cost of-of what it is you're doing?" "We all pay a price..." "Alexander." "Don't worry." "You're safe." "I control them." "Without that control, they would exhaust the food supply... in a matter of months." "Food supply?" "They're human beings!" "Who are you... to question 800,000 years... of evolution?" " This is..." "This is a perversion of every natural law." "And what is time travel But your pathetic attempt to control the world around you," " Your futile effort to have a question answered?" "Do you think I don't know you, Alexander?" "I can look inside your memories, your nightmares, your dreams." "You're a man haunted by those two most terrible words:" "What if?" "Look at you!" " And a long ponytail..." " Daddy!" " Who's that?" "Is it Daddy?" " Daddy!" " Long ponytail," "And we're still having lots of fun," " Right, Right," "Da-da!" "Daddy." "You built your time machine because of Emma's death." "If she had lived, it would never have existed." "So how could you use your machine to go back to save her?" "You are the inescapable result... of your tragedy, just as I... am the inescapable result..." "of you." "You have your answer." "Now go." "I believe you have something that belongs to me." " We all have our time machines, don't we?" "Those that take us back are memories... and those that carry us forward... are dreams." " You're forgetting one thing." " Huh?" " What if?" " What are you doing with it?" " Changing the future." "Come on." "Wait." "Wait here." "Go." " Hurry!" "Huh?" "Alexander!" "I'm sorry you lost your machine." "Oh, it's all right." "It was only a machine." ""The congregation rose and stared..." ""while the three dead boys came marching up the aisle..." ""Tom in their lead, Joe next," ""and Huck, a ruin of drooping rags," " "sneaking sheepishly in the rear." ""They had hid in an unused gallery, listening to their own funeral sermon." "Aunt Polly, Mary and the Harpers threw themselves upon them..."" "This is the place." "So it is." " But there's nothing here." " Well, it was different then." "My laboratory was all around here." "The kitchen was up there where that tree is." "Not that Mrs. Watchit ever let me go in there." "I don't know what to tell you, sir." "He's been gone this whole week." "And you've no idea where he went?" " No, sir." " This would be my greenhouse," "There was a garden outside." "Gren 'tormar'tas?" "Yes." " I'm glad." " Sir?" "I'm glad he's gone." "Maybe he's finally found someplace where he can be happy." " This was my home." " His home." "Long ago." "You know, Molly and I were talking about engaging a housekeeper, someone to live with us and help take care of Jamie." "Would you be interested?" " Perhaps just until the master returns." " Of course." " But there'd be some changes made." "I run a tight house." "Oh, I have no doubt of that." "I'll call by in the morning, and we'll arrange it." " Good night, Mrs. Watchit." " Good night, Mr. Philby." " Godspeed, my fine lad." "Godspeed."
{ "pile_set_name": "OpenSubtitles" }
[@scale < 3000] { mark: symbol(circle); :mark { fill: gray; size: 5; }; [type = 'important'] { mark: symbol(triangle); :mark { fill: red; stroke: yellow; } } }
{ "pile_set_name": "Github" }
Frozen Party Create your special day with this "Frozen Party" confetti. Perfect to decorate tabletops, play areas and add to gift bags.  Around 30 grams in mixture of various fun confetti .  *Colours may run and stain when it's wet 
{ "pile_set_name": "Pile-CC" }
Q: What is the cardinality of the set of all higher order functions mapping real functions to real functions? What is the cardinality of the set of all higher order functions mapping real functions to real functions? To be specific, this set includes all higher order functions with the type signature: $(\mathbb{R} \rightarrow \mathbb{R}) \rightarrow (\mathbb{R} \rightarrow \mathbb{R}) $, an example of which being the differential operator (i.e. taking the derivative of some function). Since the cardinality of the set of all functions $\mathbb{R} \rightarrow \mathbb{R} $ is $\aleph_2$, I'd assume it's $\aleph_3$, but I'm not sure. A: First, let me correct you. The cardinality of functions from $\Bbb R$ to itself is not $\aleph_2$ in general. This is a common mistake, but the aleph numbers are not defined by taking power sets, but rather by climbing up the ordinals until we increased the cardinality. So we can only prove that $\aleph_1\leq|\Bbb R|$, but we can't prove equality. To ease up on notation, we have the $\beth$ numbers which are defined using power sets, so $\beth_0=\aleph_0=|\Bbb N|$, and then we define $\beth_{n+1}=2^{\beth_n}$ (I'll spare you the full definition). So now we have that $|\Bbb R|=\beth_1$, and $|\Bbb{R^R}|=\beth_2$. But again, we can only prove that $\aleph_n\leq\beth_n$, and we cannot prove equality. The reason is that it is consistent that the inequality is strict. But let us not dwell on that, since it doesn't matter for the purpose of this question. What matters is that you can't claim the cardinality is $\aleph$ this or $\aleph$ that, but you can definitely say what it is in terms of $\beth$ numbers. What we can prove is this: If $X$ is infinite, then the set of all functions from $X$ to itself, denoted by $X^X$, has the same cardinality as $\mathcal P(X)$, namely $2^{|X|}$. The proof is simple if you are familiar with cardinal arithmetic (in particular exponentiation laws), but uses the axiom of choice. $$X<2^X\leq X^X\implies X^X\leq 2^{X^2}\leq X^{X^2}=X^X$$ The axiom of choice was used to have that $X^2$ and $X$ have the same cardinality. However in the case of $\Bbb R$ and the sets we are interested in, we can prove that this property is true without appealing to the axiom of choice. Therefore in the case of our interest, we can prove without the axiom of choice that: $$\Bbb{\left|\left(R^R\right)^{R^R}\right|}=|\cal P(P(P(\Bbb N)))|=\beth_3.$$
{ "pile_set_name": "StackExchange" }
Q: How to add data into List in ASP.NET MVC 4.0? I am new in MVC. I have a class in Models like below. public class UserInfo { public string Name{get;set;} public string Surname{get;set;} } And I have a controller like this. public class HomeController : Controller { // // GET: /Home/ List<UserInfo> Users = new List<UserInfo>(); public ActionResult Index() { return View(); } public ActionResult Create() { return View(); } [HttpPost] public ActionResult Create(UserInfo userInfo) { if (ModelState.IsValid) { Users.Add(userInfo); return RedirectToAction("Index"); } return View(); } } And every time when i press Create button in browser, it redirects to Index View. But List<UserInfo> is empty. Why it happens? How to save data into List and show from grid or table from that List? A: Controllers are stateless. A new instance is created each time you call an action, this is why your list is always empty. If you want to persist the list between controller actions, you will need some sort of persistence mechanism - database, caching, etc. A: Make your list static static List<UserInfo> Users = new List<UserInfo>();
{ "pile_set_name": "StackExchange" }
We are entering an exciting era in pediatric rheumatology. New treatment approaches are improving the lives of children with juvenile idiopathic arthritis (JIA) to such a degree that it's now rare to see wheelchairs or crutches in our waiting rooms. Even splints, commonly used in the past to treat joint contractures, are seldom seen on our patients. Despite our progress, remission in JIA is rare. Recent work by our collaborator, Dr. Carol Wallace, has shown that only 5% of children with the polyarticular JIA (the most severe form of this disease) are in remission 5 years after diagnosis. Part of our problem in achieving remission is that, at the biological level, we don't really understand what "remission" is. It's a classic case of the difficulty of getting somewhere when you don't really know where you're trying to get. This grant application is about learning where we are trying to get. In this application, we aim to achieve a better understanding of what "remission" is using microarray-based biomarkers. Research from the Cobb (acute inflammation) and Jarvis (chronic inflammation) laboratories has demonstrated the feasibility of using genome-wide expression profiling can be used to define disease "states" (e.g., infected vs. not infected;in remission or not in remission). Furthermore, the Jarvis laboratory has demonstrated the promise of using these same technologies to predict clinical outcomes. For each group, these promising preliminary studies must be validated using larger patient populations and prospective study designs. In this application, we propose to validate peripheral blood biomarkers that already suggest that: (1) remission in juvenile arthritis can be identified at the molecular level through distinct gene expression signatures;(2) those signatures include the balance of both pro- and anti- inflammatory gene networks;and (3) the clinical course of children who reach an inactive disease state can be predicted based on molecular signatures that emerge in the peripheral blood mononuclear cells. Furthermore, we will take another step toward clinical application of this work by developing PCR-based whole blood assay to identify the most robust indicators of remission or clinical outcome. This project brings together two experienced investigators from two very different disciplines: pediatric rheumatology (Dr. Jarvis) and surgical intensive care (Dr. Cobb). Furthermore, the project brings together two computational biology groups spanning multiple disciplines, as well as other experienced pediatric rheumatology investigators. Thus, the project is highly responsive to the goals of the most recent NIH roadmap.
{ "pile_set_name": "NIH ExPorter" }
Q: Retrofit: How to get request properties in requestInterceptor I need to apply an Authorization header in a request interceptor, but I need to sign the request method, URI, and date. Inside the request interceptor I get a RequestInterceptor.RequestFacade, which only has "setter methods" Is there any way I can get request properties inside a request interceptor? A: Ah, did some more googling. The way to do this is to use a client wrapper. Observe... public class SigningClient implements Client { final Client wrapped; public SigningClient(Client client) { wrapped = client; } @Override public Response execute(Request request) { Request newRequest = sign(request); return wrapped.execute(newRequest); } private void sign(Request request) { // magic } } Found it here: https://github.com/square/retrofit/issues/185#issuecomment-17819547
{ "pile_set_name": "StackExchange" }
Q: Recursive mergeSort to Iterative in c++ using deque I'm trying to do the iterative version of this multiple recursive mergesort: I only need to make iterable this sort function: template<class T> deque<T> mergesort<T>::sort(deque<T> &right){ int size = right.size(); if (size <= 1){ return right; } int middle = size/2; deque<T> left; for(int i = 0; i < middle; i++){ left.push_back(right.front()); right.pop_front(); } left = sort(left); right = sort(right); return merge(left, right); } The merge function can be the same: template<class T> deque<T> mergesort<T>::merge(deque<T> &left, deque<T> &right){ deque<T> result; while(left.size() > 0 || right.size() > 0){ if (left.size() > 0 && right.size() > 0){ if (getOrder(left.front(),right.front())){ result.push_back(left.front()); left.pop_front(); } else{ result.push_back(right.front()); right.pop_front(); } } else if(left.size() > 0){ result.push_back(left.front()); left.pop_front(); } else if(right.size() > 0){ result.push_back(right.front()); right.pop_front(); } } return result; } It's hard for me to make the tranformation of multiple recursive function to iterative function. Thanks everyvody and kind regards. A: Do you have to use dequeue? The iterative version of merge sort is called a bottom-up merge sort. There's really no need to store extra information.
{ "pile_set_name": "StackExchange" }
Quantification of anti-angiogenesis using the capillaries of the chick chorioallantoic membrane demonstrates that the effect of human angiostatin is age-dependent. We present a method whereby en face estimation of the chorionic capillary plexus can be generated in the living chick chorioallantoic membrane (CAM) and confirmed by post-fixation cross section analysis. This value does not alter significantly with age and provides a reliable and simple method to evaluate anti-angiogenesis. Anti-angiogenesis may be induced by an intervention, such as a pharmacological agent, applied to the surface of the CAM. We describe the use of silastic rings that are associated with minimal inflammatory reaction, in this process. By estimating changes in the chorionic capillary plexus to quantify anti-angiogenesis, together with silastic rings, we examined the anti-angiogenic effect of human angiostatin and demonstrated that although there is a significant loss of capillaries en face after exposure from days 7 to 9 of incubation, in contrast there is no significant inhibition after exposure to a similar dose of angiostatin from days 11 to 13 of incubation. This not only demonstrates the important effects on neo-angiogenesis compared to mature vessels, but also illustrates the potential of the CAM to readily provide a means for such a comparison.
{ "pile_set_name": "PubMed Abstracts" }
The solution (short of buying a mac) is not to buy from these computer-building companies like Dell but to instead build the machine yourself. They use crap parts that will break and then the tech support sucks. If you choose your own quality parts and put them together, you will not only have a more reliable system but you will be familiarize yourself with computers and be able to diagnose and fix problems yourself. My family's first computer (not including some random really old laptop that I wasn't allowed to use) was a Micron with a 90 MHz pentium processor, 16 mb of ram, a 2mb graphics card, and a 15 inch monitor. it cost … Boca Raton is more of an old people place, but I suppose it gets its share of tourists for the beach. We have lots of shops/restaurants and parks, plus a farely big art museum. We used to have the Museum of …
{ "pile_set_name": "Pile-CC" }
context("Machine Learning Random Forest Clustering") options <- jasptools::analysisOptions("mlClusteringRandomForest") options$addClusters <- FALSE options$clusterColumn <- "" options$clusterEvaluationMetrics <- TRUE options$importanceTable <- TRUE options$modelOpt <- "validationOptimized" options$plot2dCluster <- TRUE options$predictors <- list("Alcohol", "Malic", "Ash", "Alcalinity", "Magnesium", "Phenols", "Flavanoids", "Nonflavanoids", "Proanthocyanins", "Color", "Hue", "Dilution", "Proline") options$seedBox <- TRUE options$tableClusterInfoBetweenSumSquares <- TRUE options$tableClusterInfoSilhouette <- TRUE options$tableClusterInfoTotalSumSquares <- TRUE options$withinssPlot <- TRUE options$plotClusterMeans <- TRUE options$showBars <- TRUE options$oneFigure <- TRUE set.seed(1) results <- jasptools::run("mlClusteringRandomForest", "wine.csv", options) test_that("Evaluation Metrics table results match", { table <- results[["results"]][["clusterEvaluationMetrics"]][["data"]] expect_equal_tables(table, list("Maximum diameter", 11.1799587393255, "Minimum separation", 1.91296244175494, "Pearson's <unicode><unicode>", 0.556526809045383, "Dunn index", 0.171106395502703, "Entropy", 1.07850807265, "Calinski-Harabasz index", 64.0845132710531)) }) test_that("Cluster Information table results match", { table <- results[["results"]][["clusterInfoTable"]][["data"]] expect_equal_tables(table, list(1, 0.201146634109287, 0.409774198440774, 57, 267.166873258102, 2, 0.605247626150293, 0.0820430005029718, 75, 803.901673729259, 3, 0.19360573974042, 0.394537832399485, 46, 257.15091062954 )) }) test_that("All predictors plot matches", { plotName <- results[["results"]][["clusterMeans"]][["collection"]][["clusterMeans_oneFigure"]][["data"]] testPlot <- results[["state"]][["figures"]][[plotName]][["obj"]] expect_equal_plots(testPlot, "all-predictors", dir="mlClusteringRandomForest") }) test_that("Random Forest Clustering table results match", { table <- results[["results"]][["clusteringTable"]][["data"]] expect_equal_tables(table, list(0.27, 1406.22, 1530.31, 3, 0.422764251361625, 178)) }) test_that("Variable Importance table results match", { table <- results[["results"]][["importanceTable"]][["data"]] expect_equal_tables(table, list(20.9122039237879, "Flavanoids", 16.7564424183852, "Phenols", 16.1286527609624, "Dilution", 14.8508385264296, "Proline", 14.5421300011253, "Color", 13.6772809549555, "Hue", 13.4601315432519, "Alcohol", 13.4314873093631, "Proanthocyanins", 11.6570120327778, "Malic", 11.0596207822425, "Alcalinity", 10.9112870469843, "Nonflavanoids", 10.058673972256, "Magnesium", 10.0524690645575, "Ash")) }) test_that("Elbow Method Plot matches", { plotName <- results[["results"]][["optimPlot"]][["data"]] testPlot <- results[["state"]][["figures"]][[plotName]][["obj"]] expect_equal_plots(testPlot, "elbow-method-plot", dir="mlClusteringRandomForest") }) test_that("t-SNE Cluster Plot matches", { skip("Does not reproduce on windows <-> osx") plotName <- results[["results"]][["plot2dCluster"]][["data"]] testPlot <- results[["state"]][["figures"]][[plotName]][["obj"]] expect_equal_plots(testPlot, "t-sne-cluster-plot", dir="mlClusteringRandomForest") })
{ "pile_set_name": "Github" }
In the largest-ever assessment of substance use among people with severe psychiatric illness, researchers at Washington University School of Medicine in St. Louis and the University of Southern California have found that rates of smoking, drinking and drug use are significantly higher among those who have psychotic disorders than among those in the general population. The study is published online in the journal JAMA Psychiatry. The finding is of particular concern because individuals with severe mental illness are more likely to die younger than people without severe psychiatric disorders. “These patients tend to pass away much younger, with estimates ranging from 12 to 25 years earlier than individuals in the general population,” said first author Sarah M. Hartz, MD, PhD, assistant professor of psychiatry at Washington University. “They don’t die from drug overdoses or commit suicide — the kinds of things you might suspect in severe psychiatric illness. They die from heart disease and cancer, problems caused by chronic alcohol and tobacco use.” The study analyzed smoking, drinking and drug use in nearly 20,000 people. That included 9,142 psychiatric patients diagnosed with schizophrenia, bipolar disorder or schizoaffective disorder — an illness characterized by psychotic symptoms such as hallucinations and delusions, and mood disorders such as depression. The investigators also assessed nicotine use, heavy drinking, heavy marijuana use and recreational drug use in more than 10,000 healthy people without mental illness. The researchers found that 30 percent of those with severe psychiatric illness engaged in binge drinking, defined as drinking four servings of alcohol at one time. In comparison, the rate of binge drinking in the general population is 8 percent. Among those with mental illness, more than 75 percent were regular smokers. This compares with 33 percent of those in the control group who smoked regularly. There were similar findings with heavy marijuana use: 50 percent of people with psychotic disorders used marijuana regularly, versus 18 percent in the general population. Half of those with mental illness also used other illicit drugs, while the rate of recreational drug use in the general population is 12 percent. “I take care of a lot of patients with severe mental illness, many of whom are sick enough that they are on disability,” said Hartz. “And it’s always surprising when I encounter a patient who doesn’t smoke or hasn’t used drugs or had alcohol problems.” Hartz said another striking finding from the study is that once a person develops a psychotic illness, protective factors such as race and gender don’t have their typical influence. Previous research indicates that Hispanics and Asians tend to have lower rates of substance abuse than European Americans. The same is true for women, who tend to smoke, drink and use illicit drugs less often than men. “We see protective effects in these subpopulations,” Hartz explained. “But once a person has a severe mental illness, that seems to trump everything.” That’s particularly true, she said, with smoking. During the last few decades, smoking rates have declined in the general population. People older than age 50 are much more likely than younger people to have been regular smokers at some point in their lives. For example, about 40 percent of those older than 50 used to smoke regularly. Among those younger than 30, fewer than 20 percent have been regular smokers. But among the mentally ill, the smoking rate is more than 75 percent, regardless of the patient’s age. “With public health efforts, we’ve effectively cut smoking rates in half in healthy people, but in the severely mentally ill, we haven’t made a dent at all,” she said. Until recently, smoking was permitted in most psychiatric hospitals and mental wards. Hartz believes that many psychiatrists decided that their sickest patients had enough problems without having to worry about quitting smoking, too. There also were concerns about potential dangers from using nicotine-replacement therapy while continuing to smoke because smoking is so prevalent among the mentally ill. Recent studies, however, have found those concerns were overblown. The question, she said, is whether being more aggressive in trying to curb nicotine, alcohol and substance use in patients with severe psychiatric illness can lengthen their lives. Hartz believes health professionals who treat the mentally ill need to do a better job of trying to get them to stop smoking, drinking and using drugs. “Some studies have shown that although we psychiatrists know that smoking, drinking and substance use are major problems among the mentally ill, we often don’t ask our patients about those things,” she said. “We can do better, but we also need to develop new strategies because many interventions to reduce smoking, drinking and drug use that have worked in other patient populations don’t seem to be very effective in these psychiatric patients.” Funding for this research comes from the National Institute on Drug Abuse (NIDA), the National Institute on Alcohol Abuse and Alcoholism (NIAAA), the National Institute of Mental Health (NIMH) and the National Cancer Institute (NCI) of the National Institutes of Health (NIH), and the American Cancer Society. NIH grant numbers R01 DA032843, R01 DA025888, U10 AA008401, UL1 RR024992, P01 CA089392, R01 MH085548, R01 MH085542, K08 DA032680-1, Kl2 RR024994, K01 DA025733. Hartz SM, Pato CN, Medeiros H, Cavazos-Rehg P, Sobell JL, Knowles JA, Bierut LJ, Pato MT and the Genomic Psychiatry Cohort Consortium. JAMA Psychiatry. Online Jan. 1, 2014. doi:10.1001/jamapsychiatry.2013.3276 Washington University School of Medicine’s 2,100 employed and volunteer faculty physicians also are the medical staff of Barnes-Jewish and St. Louis Children’s hospitals. The School of Medicine is one of the leading medical research, teaching and patient care institutions in the nation, currently ranked sixth in the nation by U.S. News & World Report. Through its affiliations with Barnes-Jewish and St. Louis Children’s hospitals, the School of Medicine is linked to BJC HealthCare.
{ "pile_set_name": "OpenWebText2" }
Q: What is the difference between Jhana and Samadhi? In Sutta pitaka we find two Suttas namely Jhana sutta and Samadhi sutta. What is the difference? http://www.accesstoinsight.org/tipitaka/an/an04/an04.041.than.html http://www.accesstoinsight.org/tipitaka/an/an09/an09.036.than.html A: Samadhi is a general term for concentration. Jhanas are stages you achieve in Samatha meditation when your concentration reaches a certain level. To give an analogy, Samadhi is like the temperature of ice. When the temperature reaches a certain level, it becomes water. That's like reaching the first Jhana. If you keep heating, it will become steam. That is like reaching the second Jhana and so on.
{ "pile_set_name": "StackExchange" }
Q: Recieved String to useable variable in Arduino I'm trying to use data sent via Bluetooth from a mobile app to the Arduino. There will be 2 strings received dependent on the function required. First function: When the string "ledon" or "ledoff" received turn on or turn off an led. Second Function: from the app I get the data a user has typed into 2 boxes, one a text box the other a password box, this is received by the Arduino as one string with comma's as a delimiter so the string can be separated into it's component parts, which in this case are an "ssid name" and a "network key". These details I will be intending to write to an onboard sd card so that the wifi module will be able to logon to the network that the ssid and network key are relevant too. So far I can get the led light to do as it should, I can also get the string read, separated by the delimiter and printed out to the serial monitor. However when I try to combine the two codes the led function fails to turn on or off the led light although the correct command is printed into the serial monitor. I have researched how to solve this trying each requirement as a standalone function and calling them in the loop section, which individually they work but when called together again the led fails to come on. This is the code i'm presently using: const int ledPin = 11; String readString; void setup() { Serial.begin(9600); pinMode (ledPin, OUTPUT); } void loop() { while (Serial.available()) { delay(3); char c = Serial.read(); readString += c; } //turns led on or off if (readString.length() >0) { Serial.println(readString); if (readString == "ledon") { digitalWrite (ledPin, HIGH); } if (readString == "ledoff") { digitalWrite (ledPin, LOW); } readString=""; //seperates the string into 2 lines using the delimiter "," String first = Serial.readStringUntil(','); Serial.read(); //next character is comma, so skip it using this String second = Serial.readStringUntil(','); Serial.read(); Serial.println(first); Serial.println(second); readString=""; } } If I comment out the string part of the code the led turns on and off fine, if I try and run the code as is the code prints everything you would expect but the led doesn't come on. I'm pretty new to Arduino,c and c++ and I cannot seem to figure this out so any help would be great. The app I'm using to control this is being built in Mit's App Inventor 2 A: I have finally resolved this. I decided to look at other logical steps to find a solution. I considered the issue could be having different strings that did different things which may be conflicting in some way. In my research I found reference to the fact that the Bluetooth module HC-05 has 2 pins that in my case were not being utilised, the key pin and the state pin, in this stack overflow discussion Tell when Bluetooth module connects on Arduino and decided this logic of using the "State pin" to signify Bluetooth connection would negate the possibility of any conflicts within the String logic. Once I had figured out the best way to place and order the "where" statements I managed to get the functionality at this point in my project which then allows me to move on to the next step in the development. The code I have now arrived at: const int ledPin1 = 11; const int ledPin2 = 4; String readString; boolean BTconnected = false; void setup() { Serial.begin(9600); pinMode (ledPin1, OUTPUT); pinMode (ledPin2, INPUT); } void loop() { while (!BTconnected) { if ( digitalRead(ledPin2)==HIGH) { BTconnected = true;}; } digitalWrite(ledPin1, HIGH); Serial.println("HC-05 is now connected"); Serial.println(""); while (BTconnected) { if ( digitalRead(ledPin2)==LOW) { BTconnected = false; digitalWrite(ledPin1, LOW); Serial.println("HC-05 is now disconnected"); Serial.println(""); }; while (Serial.available()) { delay(3); char c = Serial.read(); readString += c; } if (readString.length() >0) { //Serial.println(readString); //readString=""; String first = Serial.readStringUntil(','); Serial.read(); //next character is comma, so skip it using this Serial.println(first); //readString=""; String second = Serial.readStringUntil(','); Serial.read(); Serial.println(second); Serial.println(""); //readString=""; } } }
{ "pile_set_name": "StackExchange" }
Fate and risk assessment of heavy metals in residue from co-liquefaction of Camellia oleifera cake and sewage sludge in supercritical ethanol. The fate and risk assessment of heavy metals (HMs) in solid residue from co-liquefaction of sewage sludge (SS) and Camellia oleifera cake (COC) in supercritical ethanol (SCE) were investigated. SCE effectively stabilized HMs in solid residues and a better stabilization was presented on Zn than Cd. Moreover, SCE significantly transformed Cd, Cu and Zn into F4, which reduced the risk to the environment. Furthermore, risk assessments of Igeo, Er(i), RI and RAC demonstrated that the addition of COC was beneficial to the contamination decrement of HMs since pollution levels of HMs all decreased after treatment, and the lowest pollution level was obtained with SC-350. Therefore, SS treated by SCE with the addition of COC could be a promising technology for disposal of SS, especially considering the safety of COC as regards HMs problem.
{ "pile_set_name": "PubMed Abstracts" }
This invention relates generally to brake systems, and more specifically to devices for positioning discs within brake systems. Most conventional disc brake systems have a fixed brake disc and a caliper configuration with a piston and a cylinder. The caliper includes a sliding bridge which slides on pins and a pair of brake pads. An outer brake pad is on an outboard end (wheel side) of the bridge, and an inner brake pad is on an inboard end (chassis side) of the bridge. The fixed brake disc is located between the outer brake pad and the inner brake pad and is fixed rotatably and axially fast with a shaft connected to a wheel. When the brake is operated, the piston engages and slides the inner brake pad along the bridge into contact with an inside face of the fixed brake disc. A reaction force causes the slidable caliper to slide on the pins and force the outer brake pad into contact with an outer side of the fixed brake disc. Equal forces are applied to the brake disc from the outer pad and the inner pad. Frictional engagement of the brake disc with the brake pads causes deceleration of the clamped disc and therefore decelerates the connected wheel and consequently the vehicle. When the brake is released, the brake pads return to a position where there is a running clearance between the brake pads and the fixed brake disc. Therefore, the present invention provides an improved braking system.
{ "pile_set_name": "USPTO Backgrounds" }
Q: VimL: Checking if function exists right now I'm cleaning up my .vimrc file to make sure it's compatible on most systems. In my statusline I use a function that another plugin sets, the GitBranchInfoString() function introduced by this plugin. What I wanna do is check if this function is set, and only then add it to the statusline. It would be in it's own line so I just need to check for it. What would be the simplest way to accomplish this? Thanks for all your help! EDIT: I have the following: if exists('*GitBranchInfoString') let &stl.='%{GitBranchInfoString()}' endif A: Use if exists("*GitBranchInfoString") " do stuff here endif A: The currently selected answer doesn't work for me (using Vim 7.4 / Ubuntu). I believe that's because: .vimrc is sourced before any plugins are loaded As @ZyX noted this in a comment. My preferred method is just to check for the existence of the plugin file. I find this cleaner than writing a separate function in an external file. if !empty(glob("path/to/plugin.vim")) echo "File exists." endif A: Just as an alternative you may also use a regexp to decide if the plugin at hand is in your runtimepath: if &rtp =~ 'plugin-name' ... endif This has the advantage that it works with plugins that only have vimscript code in the autoload directory, which in turn can't be detected when .vimrc is initially parsed since the autoload snippets are loaded at the time of a function call.
{ "pile_set_name": "StackExchange" }
# Startup Demo This demo shows how to load a texture, ask the engine to tell us when all textures have loaded into memory, create a scene, viewport and a custom entity class that is defined in the gameClasses/Rotator.js class which we use to make a couple of fairy entities from. This demo is a client-side only demo. Load the index.html file.
{ "pile_set_name": "Github" }
According to sexual conflict theory females are the choosy sex ([@zow090-B63]; [@zow090-B41]; [@zow090-B7]) and should choose males of higher quality as potential mates ([@zow090-B75], [@zow090-B76]; [@zow090-B5]; [@zow090-B31]; [@zow090-B38]; [@zow090-B32]; [@zow090-B30]). By choosing a high quality partner the female provides offspring with resources ([@zow090-B26]) or with a better genetic background ([@zow090-B23]; [@zow090-B4]). Androgen-dependent male sexual traits (STs), including behavioral characteristics, as well as immunocompetence, are theoretically assumed to be key indicators for female mate choice. The expression of androgen-dependent traits and the maintenance of a male's physical health are costly processes causing a tradeoff between competing functional systems. According to the "Immunocompetence handicap" hypothesis, when the female chooses a male, she focuses on signs of his innate health, although high levels of testosterone may negatively affect immunity ([@zow090-B19]). Theoretically, a female can base a choice on any optional trait indicating a male's quality, but the interdependence between such traits and expression of secondary sexual characters, immunocompetence, androgens, or androgen-dependent behavior is assumed. The Campbell dwarf hamster is a small, polyoestral, seasonally breeding rodent with highly pronounced sexual dimorphism, inhabiting the dry steppes and semi-deserts of Central Asia ([@zow090-B18]; [@zow090-B58]; [@zow090-B17]). Ready to mate females (of different ages) weigh from 22 g to 45 g, and males weigh from 32 g to 60 g. Males have a large specific skin gland in the middle ventral part of the body. They use a secretion of the gland to mark extensive overlapping home ranges. Information about their mating system in nature is quite scarce, so it is safe to speak only about polygamy ([@zow090-B64]; [@zow090-B72]; [@zow090-B61]; [@zow090-B60]). Receptive females attract males from a distance of up to 1 km, and may mate with several males ([@zow090-B72]; [@zow090-B60]). In captivity, adult males act aggressively toward each other from the age of 2 months, and their cohabitation in the same cage often leads to the death of one of them. Success in mating with the female can be related positively to aggressive dominance in male--male conflicts. However, this does not exclude the possibility of selective responses in the female. When a male and female share one cage, they demonstrate pronounced features of social monogamy including male participation in care of pups ([@zow090-B70], [@zow090-B71]; [@zow090-B65]). Fragmental observations in nature also signify to the close contact of a male with the female and juveniles ([@zow090-B72]; [@zow090-B59]; [@zow090-B71]). We studied experimentally the choice by receptive and sexually motivated (SM) female *Phodopus campbelli* between 2 male full-sibs that differed in the degree of expression of external STs. In addition to morphological characteristics in these males, we estimated levels of testosterone and cortisol in their blood, intensity of specific immune response to antigens, and their aggressive and sexual behavior when males competed for the female. We estimated cortisol concentrations to characterize stress level. Glucocorticoid stress hormones can play a role in sexual selection. In terms of mate choice, individuals can exhibit preferences for mates with either low baseline or peak glucocorticoid levels ([@zow090-B28]). Siblings were used in order to minimize the genetic component of variance for the female choice since it is known that the female may choose a partner according to the difference in MHC genes ([@zow090-B73]; [@zow090-B42]; [@zow090-B36]). We tested 3 hypotheses in this study: 1) The potential predictors of female mate choice (male STs, intermale aggressiveness and sexual dominance, endocrine and immune characteristics of males) will be correlated with each other. 2) A SM female will choose a partner between 2 male full-sibs divergent in the expression of ST. 3) Mate choice can be explained by a greater expression of ST, an increased level of testosterone, higher behavioral competitiveness, higher (indicator of health), or lower (reciprocal relationship with testosterone) specific immunocompetence, or by a combination of these characteristics. Materials and Methods ===================== Males ----- We obtained 18 litter with 3 or more juvenile males from 57 pairs of hamsters (aged from 6 months to a year) in 2014 and 30 litter from 120 such pairs in 2015. At 25 days we removed juvenile males from parental cages and kept them together by litter (males without females) in Ferplast plastic cages (70 × 40 × 40 cm) for up to 2 months. At 2 months the animals were photographed with a digital camera (Nikon 7000) in fixed positions with their ventrum up against a ruler for measurements of STs on the computer screen ([@zow090-B56]). We fixed animal by hand ventrum up, so that the testes became visible in scrotum. ST measurements included body mass and characteristics of male specific external morphology (both secondary and primary sexual characters): area (length × width) of mid-ventral skin gland, distance between anal and genital openings, and the testes size (average length of testes) in their external outlines from a live animal. In each litter we chose 2 males with maximal differences in body mass, area of mid-ventral gland, ano-genital distance, and testes size. From 8 to 9 AM we took a blood sample from the sublingual vein (0.3 mL) of each male. The whole procedure of sampling blood lasted no longer than 2 min, which is 2 times less than the time of glucocorticoid signal in the blood in response to handling. Samples were centrifuged at 3,000 rpm for 15 min, and the serum was separated from the hematocrite and frozen at −18°C. Then selected males were placed in individual cages 30 × 22 × 20 cm, where they lived during the experiment ([Figure 1](#zow090-F1){ref-type="fig"}). ![Time schedule of experimental study.](zow090f1){#zow090-F1} Over 2 years 45 pairs of male sibs were selected for testing. One male died. Thus, for the statistical analysis we used the data set for 88 individuals (44 male pairs). Females ------- Young females after removal from the parental cage at the age of 25 days were kept in groups of 7--8 individuals in plastic cages "Ferplast" (70 × 40 × 40 cm). At 3--4 months the majority of sexually mature females remained in diestrus. A week before the experiment we stimulated females by placing an adult male, confined in a small box of metal mesh, in the female's cage for 1 h, which was enough time to stimulate the female's estrous cycle. We tracked the females' cycle daily (1--2 h before testing) by viewing their vaginal smears under a microscope (×20). In the tests we used virgin females 3--4 months old in the phase of transition from proestrus to estrus. Our preliminary observations showed that the female was SM only at this stage of the estrous cycle and actively looked for contact with a male. Although the female remains attractive to male during most of estrus, in the middle and at the end of estrus she opposes his attempts to mate and escapes into an area of the experimental enclosure inaccessible to the male. In Campbell's hamster a vaginal estrus, registered in smears, may not coincide with behavioral receptivity ([@zow090-B16]). Thirty minutes before the test began the female was paired in a neutral arena with an adult male for 1--2 min to ensure that she was positively motivated. All females we used were not sisters of tested males. During the test, males were able to copulate with a female. In each test (with each pair of males) we used a new female. Animals housing --------------- The animals belonged to the laboratory population of hamsters at the A.N. Severtsov Institute of Ecology and Evolution, RAS. This population is descended from hamsters taken in the 1980s from Mongolia (MPR). All hamsters were kept in a room with a constant long-day regime (14 h). Food (formula feed for rats and mice, oat, vegetables, as additives, sunflower seeds, low fat cottage cheese, boiled chicken) and water were *ad libitum*. Thin wood shavings and sawdust were used as bedding, and pieces of cardboard served for shelters. Animal care mandated that we change the bedding once every 2 weeks and check on the reproductive and health state every week. Test 1: mate choice by the female --------------------------------- For each pair of male siblings at the age of 3 months ([Figure 1](#zow090-F1){ref-type="fig"}) we selected a SM female (in transition from proestrus to estrus). Before testing we exposed this female to the odor of the litter from individual male cages for 5 min. This was done to minimize the likelihood that sexual intercourse would take place as a result of the female's accidental first entry into the compartment of 1 of the 2 males. Testing was performed in a chamber made of organic glass (Plexiglas), consisting of 3 compartments---1 central and 2 lateral of 25 × 25 × 30 cm each. Compartments were partially isolated by walls with gate-passes 10 × 10 cm on each side of the center compartment, but could be isolated completely by removable dividers---privacy screens ([Figure 2](#zow090-F2){ref-type="fig"}). ![Experimental apparatus for Test 1. Dimensions are given in cm.](zow090f2){#zow090-F2} We placed a SM female in the central compartment with gates, covered by screens. After a 5 min adaptation, 2 samples of the litter from male cages were exposed to the female in Petri plates (5 cm diameter) that were mounted at the mid-center line of the compartment at a distance of 5 cm one from another. The installation of plates took 2--3 s. During the next 5 min we recorded the time spent sniffing each odor sample using 2 stopwatches. After 5 min, the Petri plates were removed. The female was left for next 5 min in the central compartment. Meanwhile, flexible nylon collars were placed on each male. We used tightening nylon cable straps, usually used to tie up wiring (cable tie 3 × 100 white). The collars were attached to 25 cm of flexible tungsten fishing leads, the free end of which was fastened on the far wall of the lateral compartment. The fastening was designed so that three-fourth of the compartment floor was available for the male, while the female had free access to come into the compartment of each male, but remained inaccessible to the male in one-fourth of its area. After a 5 min adaptation the screens that blocked passages to the side compartments were removed, allowing the female to enter freely the males' areas. Within the next 60 min one observer recorded female transitions from section to section using a computer program designed by A.V. Tchabovsky in Excel macros. We gave animals only 5 min time for familiarization or adaptation to the experimental situation due to their very high sexual motivation. Our preliminary observations showed that longer periods of adaptation could impair the result of the test and, thus, would not provide any advantage. For each female in each test, we estimated the number of transitions from compartment to compartment and the time the female spent in each compartment. The time intervals were used as a primary data for analysis ([@zow090-B68]). Simultaneously, during the entire time of the test a second observer recorded the following patterns of the males' behavior: 1) male grooming of the female, 2) series of mounts, and 3) intromissions (recognized as mounts associated with grooming of genitals; [@zow090-B53]; [@zow090-B24]). In females we recorded: 1) approaches to the male, 2) defensive postures (fall on the back), 3) vocalizations (squeals associated with defense); and 4) aggression toward the male (rushes, bites). A male starts to groom the female in the shoulder area before mounting and holds her slightly biting on the shoulder while mounting, presumably stimulating the female for copulation. However, the actions of the male can be rough. Such "aggressive grooming" can be easily identified by the defensive postures of the female and squeals. In contrast, a "non-aggressive grooming" is not associated with any expression of discontent. In parallel, we recorded the behavior of animals during the test with digital video camcorder Canon G30, and these records served as the main resource for further analysis. Afterwards the testing males were weighed and photographed in fixed positions with ventrum up against the ruler scale. If in one test the male with the higher expression of ST was tethered in the right compartment, in the next test this compartment was occupied by the male with the lower expression of ST. The choice of a male by the female was based on the amount of time the female spent with each male. We assumed that a female did make a choice if she spent ≥ 2/3 (66.7%) of the time with one male from the total time spent with males. In 75% of cases SM females spent less than 10% of the test time (Median = 8.4%, *n *= 34) in the central compartment. Although the social preference (estimated by time in the compartment) and the mating preference (sexual experience) may not be the same (for instance, in prairie voles, mating was not essential for partner preference formation; however, preferences developed more rapidly when mating occurred; [@zow090-B68]). The time the choosing individual spends with a potential partner is a common measure in studies of mate preferences ([@zow090-B74]). Test 2: encounter of males and free access to the female -------------------------------------------------------- Ten days after the end of the mate choice experiment we estimated the competitiveness of male sibs (aggressive and sexual dominance) in a series of independent tests with free access of both males to another SM female ([Figure 1](#zow090-F1){ref-type="fig"}). Males could freely contact with each other and mount the female. Males were paired in a round arena 50 cm in diameter. The arena was surrounded by an organic glass wall and was subdivided into 2 equal sections by a removable partition. A fresh sheet of filter paper was used as the substrate. After a 5 min adaptation of each male in a separate section we removed the partition wall, and during the next 5 min registered the patterns of aggressive dominance behavior (attacks, rushes, chases, fights), and defensive subordinate behavior (defensive postures on the back, escaping behavior and flights, submissive vocalization, positions under in fights). After 5 min of males' testing we placed a new non-relative SM female in the arena for 10 min and registered the aggressive and defensive behavior of males by the same scheme as before, as well as the frequency of mount series and intromissions. The behavior of the males was registered by video camcorder. We estimated the occurrence of each form of behavior within 5 s intervals of the time scale of the test. In the analyses we used number of intervals with a certain behavior during the test. Test 3: reproductive success of males ------------------------------------- Three-month old sexually mature virgin females in transition from proestrus to estrus (SM females) were introduced to males in their individual cages (1 per cage) 3 weeks after the males' immunization with sheep's red blood cells (SRBC) and 2 weeks after blood sampling ([Figure 1](#zow090-F1){ref-type="fig"}). We recorded the date of birth of the first litter and the number of young per litter. If a female did not give birth within 50 days after pairing with a male she was considered non-breeding. Male characteristics used as predictors for mate choice by the female --------------------------------------------------------------------- We used the following predictors, for female choice: 1) body weight (g), 2) mid-ventral gland area (*D*~max* *~×*~ ~d*~min~; cm^2^), 3) ano-genital distance (mm), 4) mean length of the testes (mm), 5) concentration of cortisol in the blood at 2 months old (ng/mL), 6) concentration of testosterone at the age of 2 months (ng/mL), 7) concentration of cortisol at the peak of the immune response to SRBC (ng/mL), 8) testosterone concentration at the peak of the immune response to SRBC (ng/mL), 9) intensity of the cutaneous DTH reaction to phytohemagglutinin (T-cell immunity test, mm), and 10) intensity of the immune response to SRBC (titre of antibodies in the blood). The characteristics of behavior recorded in Test 2 and used for evaluation of the males' competitiveness were as follows: 1) the aggressiveness of the male in encounter test with the sibling male (sum of 5 s intervals with aggression; first 5 min without the female), and 2) mounts on the female (sum of 5 s intervals with mounts; next 10 min with the female). Immunity: T-cell immunocompetence --------------------------------- An estate of adaptive T-cell immunity of males was estimated using a cutaneous delayed type hypersensitivity response to phytohemagglutinin (PHA-P, L8754-25mg, Sigma--Aldrich Co.), a mitogen of plant origin causing rapid T-cell recruitment and proliferation in the inflammation focus ([Figure 1](#zow090-F1){ref-type="fig"}). This assay is widely used in ecological immunological research, and a study by [@zow090-B62] confirmed its appropriateness for adaptive immunity studies. We dissolved PHA-P in PBS (E404--200TABS, 100 mL Sigma) to 2.5 mg/mL ([@zow090-B57]), and 50 mL of this solution were injected intradermally in the heel of the right hind foot using an insulin syringe, while the left hind heel was injected for the control with the same amount of PBS. The paw thickness was measured before the injection and 24 h after the injection with a soft digital caliper, and the difference between the measurements (Δ = *d*~after~−*d*~before~) was used to compare the reaction in the right and the left foot. Since the response of the control (left) foot to PBS was not pronounced and there was a highly significant difference in responses of the left and right (test) foot (*T*-test for matched pairs, *P *\< 0.001), in our further analysis we used the difference in thickness of only the paw inoculated with PHA-P. Immunity: B-cell immunocompetence --------------------------------- We injected experimental hamster males intraperitoneally with 2% suspension of SRBCs in saline and control animals (*n *= 14) with the same amount of saline (2 mL per gram of body weight). SRBCs were prewashed three times and then suspended in saline to the required concentration. The immune response was measured by hemagglutination assay ([@zow090-B67]; [@zow090-B51]) with blood serum obtained from the sublingual vein 7 days post-immunization, at the immune reaction peak (observed between days 5 and 10; [Figure 1](#zow090-F1){ref-type="fig"}). Reaction was performed with 0.5% SRBC suspension in saline. In the first well of a 96 well microbiological plate, 25 mL of experimental serum were thoroughly mixed with 75 mL of saline, and 50 mL of the resulting suspension were transferred into the next well; then the procedure was sequentially repeated. The incubation temperature was experimentally optimized as +38°C. The immune response to SRBC (serum antibody titer) was evaluated after 2 h of incubation as the number of the last well in this series of sequential saline dilutions that contained the quantity of antibodies sufficient for hemagglutination ([@zow090-B50]). As we expected, immunized animals showed a significantly stronger immune response than control ones, in whom the reaction was close to zero (Mann--Whitney *U* test: *Z *= 4.6; *P *\< 0.001, *n*~1 ~=~ ~68, *n*~2 ~=~ ~14). Hormones -------- We measured cortisol and testosterone concentrations in hamster blood serum specimens ([Figure 1](#zow090-F1){ref-type="fig"}) by enzyme linked immunosorbent assay (ELISA) using IEA cortisol and IEA TS (testosterone) commercial test systems (NPO Immunotech, Russia) according to the protocol suggested by the manufacturer. The cortisol--testosterone cross reaction for the above kits was 0.08%. Optical densities were measured at 450 nm using a Uniplan plate spectrophotometer (Russia). In rare cases of high concentrations of testosterone we diluted samples with the "Buffer for serum dilution" produced by "NPO Immunotech". Statistical analysis -------------------- We applied the principal component analysis (PCA) to all four variables describing male morphological traits in order to simplify the analysis and to reduce the dimensionality of the data. All variables were standardized, and the single principal component was extracted ([Table 1](#zow090-T1){ref-type="table"}). The component (ST expression) explained 60% of the total variance in the morphological variables and reflects the increase of body mass, the size of ventral glands, the testes size, and the anogenital distance. Table 1.Summary of principal components (PCs) analysis of 4 morphological variables describing male STsInformationPC1Eigenvalue2.38Percentage of total variance explained60.0Factor loadings:Body mass0.68Size of ventral glands0.81Testes size0.85Ano-genital distance0.74 The testosterone and cortisol levels at 60 days and after SRBC immunization did not conform to the assumptions of normality (Shapiro--Wilk's *W* test, *P *\< 0.05) and, therefore, were log-transformed to access the normal distribution. To test the possibilities of future reduction of the dimensionality in the dataset and to reveal any high correlation among variables, the correlation analysis (Pearson's correlation) was performed among male individual characteristics ([Table 2](#zow090-T2){ref-type="table"}). Male--male aggressiveness and the intensity of the male's mounting behavior in TEST 2 (conducted with the same males that participated in TEST 1 and the other female) did not conform to the assumptions of normality (Shapiro--Wilk's *W* test, *P *\< 0.05) and could not be transformed into a normal distribution. Thus, correlation statistics for these variables were assessed with Spearman's rank-order correlation. Table 2.Correlation matrix (Pearson's *r*) among all male individual characteristics (boldface type indicates significant effects; *n *=* *88)ST expressionCortisol (60 days)Cortisol (SRBC)Testosteron (60 days)Testosteron (SRBC)Immune response to SRBCImmune response to PHAST expression^[a](#tblfn1){ref-type="table-fn"}^Cortisol (60 days)^[b](#tblfn2){ref-type="table-fn"},[c](#tblfn3){ref-type="table-fn"}^**−0.25**Cortisol (SRBC)^[c](#tblfn3){ref-type="table-fn"},[d](#tblfn4){ref-type="table-fn"}^−0.060.17Testosterone (60 days)^[b](#tblfn2){ref-type="table-fn"},[c](#tblfn3){ref-type="table-fn"}^0.000.02**0.21**Testosterone (SRBC)^[c](#tblfn3){ref-type="table-fn"},[d](#tblfn4){ref-type="table-fn"}^0.18−0.01**0.400.23**Immune response to SRBC−0.04−0.130.09−0.10**0.23**Immune response to PHA0.15−0.030.14−0.12**0.26**0.16[^1][^2][^3][^4] Test 1. To determine the subset of variables that best discriminated between "preferred" and "non-preferred" males in tests with clear female choice (≥ 66.7% of time), we conducted General Discriminant Analysis (GDA; forward stepwise, *P*~to\ enter/remove~ = 0.05) ([@zow090-B25]). All male individual characteristics were included as possible predictors in the GDA; additionally, the study year was fitted in the model. To obtain a quantitative estimation of the female choice, we conducted forward stepwise general regression analysis (GRM, *P*~to\ enter~ = 0.05, *F*~to\ enter ~= 1.0) with the time that females spent with the preferred male in Test 1. Standardized differences between all individual characteristics of "preferred" males and "non-preferred" males ([Table 3](#zow090-T3){ref-type="table"}) were used as potential predictors in the model; in addition, the study year was included in the initial model as a categorical predictor. All tests were included in this analysis, *n *= 44. Table 3.Spearman's correlation coefficients for male--male aggressiveness and male--female mounting activity in Test 2 (boldface type indicates significant effect, *p* \< 0.05 *n *= 88)AggressivenessMounting activityST expression−0.130.10Cortisol (60 days)−0.100.04Cortisol (SRBC)−0.05**−0.28**Testosterone (60 days)−0.07−0.15Testosterone (SRBC)−0.10−0.18Immune response to SRBC−0.03−0.15Immune response to PHA−0.160.05Mounting activity (Test 2)−0.01 We used McNemar's test for paired nominal data to estimate the effect of male behavior on the female choice in Test 1. The forward stepwise GDA was used in order to find variables that best discriminated between aggressive and nonaggressive males (with respect to male grooming). Test 2. The Wilcoxon matched pairs test was used to estimate variation between the "preferred" and "non-preferred" males in the tests with clear female choice (*n *= 34). The differences between "preferred" and "non-preferred" males in aggressiveness and mounting behavior were normally distributed. Therefore, we performed the general regression model with differences in aggressiveness and mounting behavior as predictors and the time with the "preferred" male in TEST 1 as dependent variable (study year included as additional factor). **Test 3.** To compare the litter sizes in the preferred and non-preferred males we used Student's *T*-test for paired samples. The birth dates of litters produced by preferred and non-preferred males did not fit demands for normality. To compare the birth dates the Wilcoxon matched pairs test was used. Statistical analyses were performed using STATISTICA version 8.0 (StatSoft). All tests were 2-tailed, with a significance level of 0.05. Ethical principles in treatment of animals ------------------------------------------ In our study we followed the requirements of the "Principles of Laboratory Animal Care" (NIH Publication Vol. 25, No. 28 revised 1996; <http://grants.nih.gov/grants/guide/notice-files/not96-208.html>), of "Guidelines for the treatment of animals in behavioural research and teaching" ([@zow090-B2]) and the Federal Law of the Russian Federation. Results ======= Correlations between male traits -------------------------------- Contrary to expectation, we did not find any strong relationships among different male characteristics ([Table 2](#zow090-T2){ref-type="table"}). Namely, the correlations between ST expression and hormones, ST expression and immune status, and hormonal and immune status were low or absent. Most correlations were not significant, and the highest correlations did not exceed medium-sized effects ([@zow090-B12]; [@zow090-B29]). Thus, we did not reduce dimensionality of the dataset due to substantial information loss. Male--male aggressiveness as well as the intensity of mounting in Test 2 (conducted with the same males that participated in Test 1 and the other female) also did not correlate with most individual characteristics of the males and between themselves ([Table 3](#zow090-T3){ref-type="table"}). The number of mount series per test the tethered male made in Test 1 did not correlate with the number of mount series the male made when freely competing with a sibling for the female in Test 2 (Spearman's *r *= 0.12, *P *= 0.26, *n *= 88). Female choice between 2 tethered males (Test 1) ----------------------------------------------- In 77% of the tests (*n *= 44) females preferred 1 male and spent substantially more time with him (≥ two-third of the test duration) than with the other male. On average, females spent 82.4 ± 1.6% of the total time with the preferred male. Hence, in most tests the "preferred" and "non-preferred" males were evident. We defined tests in which females spent more than 67% of the total time with the "preferred" male as tests with a clear female choice. In 41 of 44 tests (93%) females copulated with both males. Males preferred as social partners (justified by the time a female spent with the male) also were preferred as sexual partners. For non-preferred males the total number of series of mounts per test correlated positively with the total time that the female spent in the male's compartment (*r *= 0.82, *P *= 0.0001, *n *= 34). For preferred males the total number of mount series per test did not relate to total time the female spent with the male ([Figure 3](#zow090-F3){ref-type="fig"}; *P *= 0.97, *n = *34). The preferred males demonstrated significantly higher number of mount series per test than non-preferred males \[median and limits: 79 (3--178) and 28 (0--85), respectively; Wilcoxon matched pairs test: *t *= 160, *P *\< 0.001, *n*~1 ~= *n*~2 ~=34\]. The same was true for mounts with intromissions \[median and limits for preferred male: 35 (0--95), for non-preferred males: 10 (0--67); Wilcoxon matched pairs test: *t *= 86, *P *\< 0.001, *n*~1 ~= *n*~2 ~=~ ~34\]. The high sexual activity of the preferred male may lead to exhaustion; in many cases the male falls down on his back becoming rigid up to 1 min. This was the reason for the lower number of mounts per unit time in preferred males compared with non-preferred males \[median and limits for preferred male: 1.62 (0.06--3.80), for non-preferred male: 3.29 (0--6.67); Wilcoxon matched pairs test: *t *= 95, *P *\< 0.001, *n*~1 ~= *n*~2 ~=~ ~34\]. The same was true for mounts with intromissions \[median and limits: 0.83 (0--1.92) and 0.95 (0--9.72), respectively; Wilcoxon matched pairs test: *t *= 168, *P *= 0.073, *n*~1 ~= *n*~2 ~=34\]. ![The relation between the number of series of mounts and the time that the female spent with preferred and non-preferred males.](zow090f3){#zow090-F3} We did not find a relationship between the visiting order of the males and female choice: among 34 tests with clear female choice the first-visited male became the preferred male in 19 (55.9%) cases and in the other tests females preferred the second visited male (ч^2* *^=^* *^0.47, *P *= 0.5). The stepwise GDA with the ST expression, hormonal characteristics and characteristics of the male immune status included as predictors, and the study year as an additional factor failed to discriminate between preferred and non-preferred males (in tests with clear female choice). No predictor contributed significantly in the discrimination and was selected for the model (Wilk's *π *= 1.0*, P *\> 0.1). From the initial set of predictors that included differences between the variables of preferred and non-preferred males, the stepwise GRM revealed 3 variables which significantly influenced the time that females spent with the "preferred" male. Namely, the lower values were the ST expression and the immune responses to SRBC, and the higher value was the testosterone level after SRBC immunization in the preferred males compared with the non-preferred males, the more time the females spent with the "preferred" males in the test ([Table 4](#zow090-T4){ref-type="table"}). Table 4.Summary of forward stepwise general regression model (GRM) in which the dependent variable was the time that females spent with preferred males and independent variables (predictors) were represented by differences in trait values (Δ) between preferred and non-preferred males (*p*~to\ enter~ = 0.05, *F*~to\ enter ~= 1.0, *R*^2 ^=^ ^0.32, *F *= 5.9, *P *= 0.002, all tests, boldface type indicates significant effect, *p* \< 0.05 *n *= 44)EstimatesSE*FP*Intercept39.671.3**\<0.0001**Δ ST expression−2.270.95.9**0.02**Δ Testosterone (SRBC)0.190.085.8**0.02**Δ Immune response to SRBC−1.240.47.9**0.008**Δ Immune response to PHAOut of the model0.0021.0Δ Cortisol (60 days)Out of the model1.70.2Δ Cortisol (SRBC)Out of the model0.060.8Δ Testosterone (60 days)Out of the model0.20.6Year effectOut of the model0.0080.9 Effect of the male's behavior on the female's choice (Test 1) ------------------------------------------------------------- The strongest factor that affected female choice in the tests was the male's behavior during copulations. Some males used aggressive grooming during sexual contact, and females obviously avoided such situations. From 34 tests with clear female choice, among the "preferred" males only 4 males groomed females aggressively and the other 30 did not; but among the non-preferred males there was a ratio of 20:14 aggressive to non-aggressive groomers (McNemar test for paired samples, *χ*^2* *^=^* *^9.4, *P *= 0.002). Females demonstrated significantly more defensive postures (fall on the back) per unit time with non-preferred male \[median and limits: 1.09 (0--6.96) compared with preferred males (median and limits: 0.65 (0--3.14); Wilcoxon matched pairs test: *t *= 149, *P *\< 0.011, *n*~1 ~= *n*~2 ~=34\]. They also initiated more contacts per unit time with non-preferred males than with preferred males \[median and limits respectively: 2.46 (0.28--23.32) and 1.15 (0.08--7.33); Wilcoxon matched pairs test: *t *= 2, *P *\< 0.001, *n*~1 ~= *n*~2 ~=34\]. The reason is that the higher sexual activity of the preferred male may lead to his sexual exhaustion; from time to time the male falls down on his back becoming rigid up to 1 min. The stepwise GDA model did not reveal any discrimination between males demonstrating aggressive and non-aggressive grooming (all 44 tests included). No predictor contributed significantly in the discrimination and was selected for the model (Wilk's *π *= 1.0, *P *\> 0.1). Encounter of males and free access to the female (Test 2) --------------------------------------------------------- Paired comparison of the "preferred" and "non-preferred" males from the tests with clear female choice (Test 1) did not reveal significant differences in their aggressiveness and mounting behavior in the encounter test (Wilcoxon matched pairs test: *t *= 195.5, *P *= 0.6, *n*~1 ~= *n*~2 ~=34 and *t *= 267, *P *= 0.8, *n*~1 ~= *n*~2 ~=~ ~34, respectively). GRM with aggressiveness and mounting behavior as predictors and the time with "preferred" male in TEST 1 as dependent variable (study year included as additional factor) did not reveal any significant effects (multiple *r*^2 ^=^ ^0.16, *F *= 2.5, *P *= 0.07). Reproductive success in the "preferred" and "non-preferred" males (Test 3) -------------------------------------------------------------------------- After the males that participated in Test 1 were paired with virgin females ready to mate in the male's cages, neither date of birth (Wilcoxon matched pairs test: *t *= 99.5, *P *= 0.2, *n*~1 ~= *n*~2 ~=28) nor litter size differed for the first litters between the 2 categories of males (*t*-test for paired samples: *t *= 0.98, *P *= 0.3, *n*~1 ~= *n*~2 ~=~ ~22). Discussion ========== Among hypotheses we tested, only the second one received definite support. SM female hamsters chose their male partner from a pair of tethered male siblings, and the final mate choice was not a consequence of the first visit to the male. Other hypotheses did not receive support in results of our experiment. Correlations between male traits we studied and which are assumed to affect female choice were low or absent. Females did not make choice based on a higher expression of male STs, higher level of blood testosterone, with aggressiveness in the encounter with the sibling male or with sexual dominance in a situation when males could freely compete for the female. The choice was not associated with the intensity of T-cell immune response to phitohemagglutinin (PHA). The only characteristic that influenced female choice with high statistical support was non-aggressive grooming by males during sexual contact. Females also tended to choose males with a lower expression of ST and with a lower immune response to SRBC associated with higher testosterone after immunization. We, therefore, are unable to explain our results in the framework of the widely discussed hypotheses of "good genes" ([@zow090-B23]) or immunocompetence handicap ([@zow090-B19]). We expected females to prefer males with a higher expression of ST in combination with a lower specific immune response to antigens (in case of tradeoff between the expression of androgen-dependent traits and specific immunity). Inconsistency of our results with the theory can be explained by low correlations between dependent and predictor variables, but also by the vulnerability of any inferences based on the analysis of correlations with androgens. The result of recent cross-species meta-analyses of relationships between circulating sex hormone level and immune function was not statistically significant for either testosterone or estrogen. The meta-analysis of results of experiments, presupposing control of external and internal conditions, confirmed the effect ([@zow090-B20]).The testosterone concentration in blood is very unstable in *Ceteris paribus*. Thus, it would be more productive to focus on the concentration thresholds of sensitivity of the target tissue receptors rather than routine concentrations of the hormones, although it is difficult to realize this approach in practical work ([@zow090-B69]). Effects of sex hormones on immunity may depend on body conditions, and resources availability ([@zow090-B35]; [@zow090-B52]). The leptin, which can prevent the immunosuppressive effect of testosterone, may be the reason ([@zow090-B3]). The effect of testosterone on immune function may also depend on stress levels ([@zow090-B45], but see [@zow090-B48]; [@zow090-B49] for contradictory findings). Stress hormones can be the key mediators of many condition-dependent, sexually selected traits that serve as honest signals of mate quality. It is typically thought that 2-way interactions exist between glucocorticoid stress hormones, sex steroids, and body condition. In terms of mate choice, it appears that glucocorticoid stress hormones could mediate some of the condition-dependent traits used to assess mates ([@zow090-B28]). It also needs to be taken into account that results obtained in the laboratory may not be the same as in natural conditions ([@zow090-B11]). In a superb fairy-wrens *Malurus cyaneus* testosterone treatment depresses the immune response under laboratory conditions but not under natural conditions ([@zow090-B44]). The immunocompetence handicap hypothesis proposed by [@zow090-B19] summarized what was known about the interactions between sexual signals, androgens, parasites, and the immune system. The main prediction was that there would be a trade-off between sexual displays on one hand and immune function on the other hand. At a later date most of the attention was directed to this dual effect of testosterone enhancing STs/displays, but suppressing immunity. Little attention was paid to the possible effect of testosterone on redistribution of immune cells rather than to its direct suppressive effect on the immune system ([@zow090-B10]). [@zow090-B47] revised studies that tested the suppressive role of testosterone in immunocompetence by means of meta-analysis and found this effect controversial; on average it was small and far from statistically significant. On the other hand, a meta-analysis of the effect of parasites on sexual signals revealed that experimental exposure to parasites significantly suppressed sexual signals ([@zow090-B37]). Finally, the meta-analysis of published data on the effects of experimental immune activation on testosterone showed a strong suppressive effect on testosterone. The trade-off between immunocompetence and STs/displays may primarily be generated by the effect of immune activation on testosterone, rather than the opposite effect that has received most attention ([@zow090-B9]). In addition to the above, a recent review of genetic benefits of extra-pair paternity in birds ([@zow090-B1]) found no convincing evidence for genetic benefits of the phenomenon and rejects the good genes hypothesis. Taken all together these results show that Folstad and Karter's as well as Hamilton and Zuk's ideas may not be as solid as has been assumed by many people. Although most empirical research is based on the assumption that females seek a male of the highest possible quality (in terms of the genes or resources the male can provide), manipulation of the female condition can lead to divergent female preferences ([@zow090-B46]). For instance, it was shown on zebra finches ([@zow090-B27]) and house sparrows ([@zow090-B22]) that females of lower quality prefer low-quality males. High-quality female zebra finches preferred high-quality males and the high-quality female of house sparrows did not discriminate between the quality of a male (determined by the size of the black spot on the breast). Although we kept female hamsters under standardized conditions, we were limited in the possibility to control their internal state. Females that participated in the experiment were young (3--4 months), had no sexual experience, and were in the same stage of the estrous cycle. However, we were unable to standardize strictly their age and weight. These variables introduced into the model as predictors showed no statistically significant effects. However, this does not exclude the possibility of their limited impact, as well as of the impact of unaccounted factors, on the overall variation. In a set of experimental studies the choosing females had greater reproductive success (in terms of offspring viability and survival to independence or reproductive age) when paired with preferred males ([@zow090-B14]; [@zow090-B54]; [@zow090-B8]; [@zow090-B6]). In house mice *Mus domesticus* per cent of juveniles at reproductive age was higher in females paired with the preferred male, but there was no significant difference in the number of pups born ([@zow090-B14], [@zow090-B15]). Fecundity was even higher in parental pairs with non-preferred males (*P *\< 0.1; [@zow090-B14]; [@zow090-B21]). In our study we found no difference in reproductive success between preferred and non-preferred males paired with a ready to breed new female. In test situation (Test 1) female choice was constrained by the experimental design. She was forced to choose between 2 sibling males which differed in ST expression. In nature she might not have preferred either male. We also restricted our estimation of reproductive success to the first litters the females produced after pairing with experimental males. Usually the first litters born by young females of Campbell dwarf hamsters are more variable in size and viability, and we expected the impact of male traits on breeding success to be more pronounced at first reproduction event. At the same time, we cannot exclude completely the possibility of underestimation of reproductive differences between preferred and non-preferred males. Interpreting our results we should take into consideration the species specific features of Campbell dwarf hamsters. In fact the spectrum of species for the experimental study of mate choice among rodents is still limited. Because many experiments were conducted on mice *Mus musculussensu lato*, the support of the "good genes" theory is largely associated with this species. Campbell hamsters differ from house mice in many aspects. Despite the high plasticity of the social organization of house mice (*M. musculus* s.l., [@zow090-B33]), at moderate densities of the population of synanthropic house mice (first and foremost, *M. m. domesticus*), despotic dominance of a male provides him with access to most of the group's females ([@zow090-B13]; [@zow090-B34]; [@zow090-B43]). It was the house mouse that provided good evidence for positive relationships between androgens, aggressive dominance, and expression of STs, or the negative impact of androgens on the system of acquired immunity ([@zow090-B55]; [@zow090-B40]; [@zow090-B66]; [@zow090-B39]). The negative effect of activation of specific immunity function on testosterone level has also been confirmed in the house mouse ([@zow090-B9]). Despite the pronounced sexual dimorphism in Campbell hamsters, polygyny in the conventional sense (males desperately compete for females, and many females become available for the winner male) is uncommon for the species. The mating system of Campbell hamsters in nature, apparently, has some characteristics of promiscuity. Males mate with more than 1 female, and their female partners can mate with other males. Fragmentary observations made in nature support the opinion that males do not monopolize females ([@zow090-B64]; [@zow090-B61]; [@zow090-B60]; [@zow090-B72]). It is also possible that the female focuses on other quality markers of the male, unrelated to those, which determine the advantage in direct competition between males (body mass, aggressiveness, testosterone). On the other hand, the breeding system of Campbell dwarf hamsters has the features of social monogamy ([@zow090-B70], [@zow090-B71]; [@zow090-B65]). Among hamsters reared in captivity the male always cares for the young. Deprivation among pups of male paternal care, and in particular of the opportunity to receive a secretion of his specific glands, affects the growth and survival of offspring ([@zow090-B65]). Some observations in nature also point to the participation of a male in caring of juveniles. The male was observed carrying food into the burrow with pups ([@zow090-B59]; [@zow090-B71]) and marking pups ([@zow090-B59]). In this respect it is possible that in choosing a non-aggressive male, the female focuses on the parental quality of a potential partner. This assumption suggests a separate study on parental behavior of preferred and non-preferred males; their actual reproductive success should be estimated by the number of juveniles surviving to reproductive age. Also, results of experimental studies of mate choice, including ours, should be interpreted with accuracy due to their basic restriction---females in test situations are limited in making a totally free choice. Under other equal conditions the choice made by the female could be influenced by the activity (mating or courting behavior) of males. Direct tactile and subsequent sexual contacts with both males could enhance asymmetry in preference exhibited by the female. Our finding that females preferred gentle males supports this suggestion. This situation looks realistic in the natural context (in the wild), however, it leaves questions open. We did not find a correlation between the number of mount series of tethered males and number of mount series of freely competing males. This could indicate significant impact of female activity on the net result (ultimate choice), but a complete understanding of how the mechanism of female mate choice works seems feasible only through performing a separate experiment in which the participation of males in female mate choice is limited by a lattice, making sexual intercourse impossible. To what extent the results of this and earlier experiments will coincide is a question for future research. The authors are deeply grateful to Prof. Jan A. Randall for comments and corrections to the English, to Dr A. V. Tchabovsky for valuable suggestions throughout the study and the opportunity to use his original program for registration of hamsters' behavior. We are greatly indebted to 2 anonymous reviewers for their constructive remarks, useful comments and suggestions. Funding ======= This research was supported by the Russian Foundation of Basic Research (RFBS) \[Grant Nos 14-04-00854 and 16-04-01376\]. [^1]: ^a^ The combined variable characterizing STs expression. Result of PCA of males' morphological characteristics. [^2]: ^b^ Hormone concentration in blood serum at the age of 60 days. [^3]: ^c^ Variables that were log-transformed. [^4]: ^d^ Hormone concentration in blood serum at the peak of immune response to SRBC.
{ "pile_set_name": "PubMed Central" }
Q: Direct3d 9 z-buffer fails drastically I have just completed my custom mesh class and my engine is very basic right now, but now I am facing this strange issue. I have posted the pictures bellow, it seems like z-buffer is not working properly. I am using the following for projection matrix D3DXMatrixPerspectiveFovLH((D3DXMATRIX*)&m_proj, toRad( 45.f ), aspect_ratio, 0.f, 100.0f ); and this is my clear call void Context::clear( Vec4& color ) { if( this->m_is_lost ) return; this->m_device->Clear(0, NULL , D3DCLEAR_TARGET | D3DCLEAR_ZBUFFER | D3DCLEAR_STENCIL, D3DCOLOR_XRGB(0,0,50), 1.0, 0); } If I give anything other than 0 for near plane the model barely shows up and if camera is zoomed the geometry seems to be appearing partly and disappearing. I know that my view matrix is ok because if I use 0 near plane the geometry is rendered correctly but then the flickering happens. I used simple HLSL posted bellow. If someone faced the same situation please assist me.. EDIT : I used blender to export mesh to custom format, although unlikely but is there any winding order issue causing this problem?? void GameApp::renderScene() { LPDIRECT3DDEVICE9 dev = ((LPDIRECT3DDEVICE9)Engine::Context()->ptr()); HRESULT hr = 0; Matrix u; bool res; w = u; v = m_cam->view_copy(); p = *Engine::DefaultView()->fov(); Matrix wvp = w * v * p; hr = dev->SetRenderState(D3DRS_DITHERENABLE, TRUE); hr = dev->SetRenderState( D3DRS_LIGHTING, FALSE ); //dev->SetRenderState( D3DRS_CULLMODE, D3DCULL_NONE ); hr = dev->SetRenderState( D3DRS_ZENABLE, TRUE ); hr = dev->SetRenderState( D3DRS_STENCILENABLE, FALSE ); dev->SetTransform( D3DTS_PROJECTION, (D3DXMATRIX*)&p); res = this->sh->vs_wvp( wvp ); res = this->sh->tex0( m_tex ); res = this->sh->use(); this->m_mesh->test_draw(); dev->SetPixelShader(NULL); dev->SetVertexShader(NULL); } #include "constants.hlsl" struct VS_INPUT { float3 position : POSITION0; float3 normal : NORMAL0; float2 tex0 : TEXCOORD0; float4 color0 : COLOR0; }; /* vertex shader output */ struct VS_OUTPUT { float4 hposition : POSITION0; float4 color0 : COLOR0; float2 tex0 : TEXCOORD0; }; VS_OUTPUT main( VS_INPUT IN ) { VS_OUTPUT OUT = (VS_OUTPUT)0; OUT.hposition = mul( float4( IN.position, 1.0 ), gWVP ); OUT.tex0 = IN.tex0; return OUT; } /* The pixel shader */ #include "constants.hlsl" sampler gTEX0; /* primary texture */ struct VS_OUTPUT { float4 hposition : POSITION0; float4 color0 : COLOR0; float2 tex0 : TEXCOORD0; }; struct PS_OUTPUT { float4 color : COLOR; }; PS_OUTPUT main( VS_OUTPUT IN ) { PS_OUTPUT OUT; OUT.color = tex2D( gTEX0, IN.tex0 ); return OUT; } A: The near plane parameter shall be strictly larger than zero. The smaller it is the more precision you burn close to the camera, and with zero, the projection matrix degenerates into unusability. If your geometry isn't where you want it to be when you use a conformant projection matrix, address that problem instead.
{ "pile_set_name": "StackExchange" }
Involvement of redox events in caspase activation in zinc-depleted airway epithelial cells. Airway epithelial cells (AEC) contain both pro- and anti-apoptotic factors but little is known about mechanisms regulating apoptosis of these cells. In this study we have examined the localization of pro-caspase-3 and Zn(2+), a cellular regulator of pro-caspase-3, in primary sheep and human AEC. Zn(2+) was concentrated in both cytoplasmic vesicles and ciliary basal bodies, in the vicinity of both pro-caspase-3 and the antioxidant Cu/Zn superoxide dismutase (Cu/Zn SOD). Depletion of intracellular Zn(2+) in sheep AEC, using the membrane permeant Zn(2+) chelator TPEN, increased lipid peroxidation in the apical cell membranes (as assessed by immunofluorescence with anti-hydroxynonenal) as well as increasing activated pro-caspase-3 and apoptosis. There were smaller increases in caspase-2 and -6 but not other caspases. Activation of caspase-3 in TPEN-treated AEC was inhibited strongly by N-acetylcysteine and partially by vitamin C and vitamin E. These findings suggest that cytoplasmic pro-caspase-3 is positioned near the lumenal surface of AEC where it is under the influence of Zn(2+) and other anti-oxidants.
{ "pile_set_name": "PubMed Abstracts" }
# Add project specific ProGuard rules here. # You can control the set of applied configuration files using the # proguardFiles setting in build.gradle. # # For more details, see # http://developer.android.com/guide/developing/tools/proguard.html # If your project uses WebView with JS, uncomment the following # and specify the fully qualified class name to the JavaScript interface # class: #-keepclassmembers class fqcn.of.javascript.interface.for.webview { # public *; #} # Uncomment this to preserve the line number information for # debugging stack traces. #-keepattributes SourceFile,LineNumberTable # If you keep the line number information, uncomment this to # hide the original source file name. #-renamesourcefileattribute SourceFile
{ "pile_set_name": "Github" }
Fashion Shows Adopted a See-Now, Buy-Now Model. Has It Worked? “The current way of showing a collection four months before it is available to customers is an antiquated idea, and one that no longer makes sense,” Tom Ford said last February, before announcing that in September he would join Burberry as it moved to a “see now, buy now” model, with collections available immediately after appearing on the runway. Tommy Hilfiger followed suit, as did Ralph Lauren. At one point, it seemed fashion might have a fully fledged revolution on its hands. Fast-forward six months. Did the predictions come to pass? Did see-now, buy-now upend all expectations? The brands, not surprisingly, say yes. But there is little concrete evidence to back up their claims. No global brand at the forefront of this movement has presented detailed numbers to support assertions of a spike in sales thanks to shoppable runways. And several still decline to comment on their strategy shift. So far this season, the movement appears to have no new recruits. “I don’t see anyone moving into this aggressively at this point,” said Luca Solca, a luxury analyst at Exane BNP Paribas. “So far, we are in experimental mode.” Image Burberry’s runway show last September during London Fashion Week.CreditLauren Fleishman for The New York Times Still, many who led the charge are increasing their bets this season. Last September, the Tommy Hilfiger brand built a Tommy Pier at South Street Seaport for the Tommy Now unveiling (a fair complete with a Ferris wheel, lobster rolls, a temporary tattoo parlor and 10,000 guests over a week). The brand’s next show, on Wednesday at Venice Beach in Los Angeles, is said to be even bigger. “Tommyland,” a music festival-inspired extravaganza, will feature amusement rides, graffiti artists, roller skaters, musical performances and on-site boutiques with runway products. Every item shown on the runway will be immediately available online. The day after the show, these runway items will appear in 280 Tommy Hilfiger stores in over 70 countries. “We’re delivering on the desire for instant gratification and blending the worlds of fashion and pop culture together,” the designer Tommy Hilfiger said. Despite considerable restructuring costs, Avery Baker, chief brand officer of Tommy Hilfiger, said traffic to Tommy.com increased by 900 percent in the first 48 hours after the Tommy Now unveiling. Multiple styles sold out in 24 hours after the September show and sales grew by double digits across the women’s category, with the highest gains in the United States, Japan and China. And the brand’s third-quarter sales for the period ending Oct. 30 rose by 4 percent, to $927 million, compared with the same period a year earlier, driven largely by international growth. However, its parent company, PVH, reported a considerable decline at the brand’s North American stores in tourist locations. “Obviously it has been a huge learning curve for all of us,” Ms. Baker said. “A switch to this kind of operational model requires extremely intense collaboration between teams that would typically work in a relatively siloed approach. It has been an incredibly exciting and intense period.” Across the Atlantic, Burberry is preparing for its second see-now, buy-now show, inspired by the artist Henry Moore on Feb. 20. The first event, which was last September, generated more than 15 million views for the brand across social media platforms, with particularly strong subsequent sales in the immediately available military-infused outerwear and Bridle bags (now its third-best-selling style worldwide). Although the company has released no official performance figures related to the move, Charlotte Cowley, head of investor relations, said the collection had been “extremely popular” and produced “great commercial results” on a trading update call with analysts last month. E-tailers and department store buyers seem to agree. Alison Loehnis, president of Net-a-Porter, said that while its see-now, buy-now offerings remained a relatively small percentage of the site’s total inventory, they appeared to be popular, especially with younger customers (members of what the consumer psychologist Kit Yarrow called the “I want what I want when I want it” generation). “This isn’t just a marketing tool,” Ms. Loehnis said. “‘See now, buy now’ is also about consumers being able to ‘wear now,’ and addressing the seasonality issues that have become more of a practical issue for retailers and customers around the world.” Ken Downing, fashion director of Neiman Marcus, the American retailer that has worked with Rebecca Minkoff, Burberry, Tom Ford and Ralph Lauren on see-now, buy-now collections, said: “The new model is simple and effective. We buy quietly in the showrooms from samples under embargo, and our choices then go into production without the extravaganza of the runway.” Mr. Downing suggested that he had seen a halo effect for many of these brands, with resulting sales boosts to brands’ cosmetics or accessories businesses. “There was no question for us that customers were getting tired of product long before it had even arrived in the store,” he said. “Retailers are in the midst of a very challenged trading environment right now, so for the future health of the industry, this is a model that in some variation more of the fashion community will realize it has to embrace in some capacity.” Big shifts in company structure can require even bigger leaps of faith for those involved in the process, including investors. Image The runway show and shopping party for Ralph Lauren.CreditElizabeth Lippman for The New York Times Ralph Lauren was one of the first houses to embrace the see-now, buy-now strategy with its show last September on the Upper East Side of Manhattan. But Stefan Larsson, brought in as chief executive in 2015 to help the brand adapt to the modern era, stepped down last week citing differences with the designer Ralph Lauren over “product, shopping and marketing experience.” (Mr. Larson was a champion of the see-now, buy-now model.) On the day of the announcement, shares in the company fell by 12 percent, to $76.61, the biggest one-day plunge in a year. Even before the plummet, the stock had fallen by 22 percent in the last 12 months. Perhaps that is why for some, the middle ground appears to be the best position. Massimo Ferretti, executive president of Aeffe, the Italian parent group of brands including Moschino and Alberta Ferretti, was an early adopter of the runway-capsule model with Jeremy Scott’s debut collection for Moschino in 2014. Today, around 10 percent of the Moschino business is made up of see-now, buy-now sales, with 38,000 pieces in production and 10,000 cellphone covers created in the days before the show at Milan Fashion Week on Feb. 23. But, Mr. Ferretti said: “I would never consider moving the entire business over to this new and experimental strategy. Ultimately, quality ready-to-wear needs time for true creativity and quality to flourish. It is just not conceivable to create and scale collections three months in advance.” His sister, Alberta Ferretti, who introduced the Rainbow Week capsule collection last month, agreed. “Our first pieces have sold out all over the world, but they are seven cashmere sweaters in seven different colors,” Ms. Ferretti said. “Beautiful, practical pieces, but ultimately relatively easy for us to conceive of and produce and very different to our runway and precollections.” Heather Gramston, women’s wear buying manager at Selfridges, said that for all the hype, see-now, buy-now wasn’t replacing the traditional fashion buying calendar, but instead “was offering an alternative” for retailers, brands and shoppers alike. “The traditional seasonal runway show structure is still where the vast majority of our buys come from,” Ms. Gramston said. “It is not going out of fashion just yet.” A version of this article appears in print on , Section D, Page 9 of the New York edition with the headline: Awaiting a Verdict on the See-Now, Buy-Now Model. Order Reprints | Today’s Paper | Subscribe
{ "pile_set_name": "Pile-CC" }
Pharmacokinetics of ciprofloxacin with reference to other fluorinated quinolones. The third generation quinolones, ciprofloxacin, enoxacin, fleroxacin, norfloxacin, ofloxacin and pefloxacin are all quickly and quantitatively well (75-95% of an oral dose) absorbed upon oral administration. The maximum serum concentrations appear after 1-2 hours. The serum and urine concentrations after oral or intravenous ciprofloxacin are directly proportional with the doses and follow normal, dose-independent pharmacokinetics. Ciprofloxacin and norfloxacin reach the same serum levels after the same doses. Steady-state levels are indifferent from those after the first dose. In contrast, enoxacin, oflaxacin and pefloxacin do reach somewhat higher levels after chronic administration. Ciprofloxacin is eliminated by the kidneys (active tubular secretion which is blocked by probenecid) (60% after an intravenous administration), by metabolism and by the transintestinal route. Metabolism is minimal (ca. 15-20% for ciprofloxacin and norfloxacin). Transintestinal elimination implies that the drug is eliminated by transport across the intestinal wall without significant biliary elimination (which is less than 1%). Penetration into tissues occurs readily. Concentrations in prostate secretion are high for ciprofloxacin and norfloxacin. Ciprofloxacin reaches high intracellular concentrations; within human neutrophils the levels reach 6 times the concentrations in the surrounding fluid. Concentrations in bile and tissues are in general comparable to those in serum. Cerebrospinal fluid (CSF) concentrations are low when meningi are normal, but 40-90% of the serum levels when the meninges are inflamed. Because the transintestinal route of elimination compensates for loss of renal elimination, the serum half-life of ciprofloxacvin is raised only to 5-10 hours even in total renal failure.(ABSTRACT TRUNCATED AT 250 WORDS)
{ "pile_set_name": "PubMed Abstracts" }
[Hirsutism - etiopathogenesis, diagnostics and treatment]. Hirsutism is defined as excessive terminal hair growth in distribution typical for postpubertal men. It affects approximately 5-10 % of women and most frequently manifests in puberty. Significant cosmetic stigmatization is the usual complaint that brings patient to the doctor and it is crucial to always rule out any primary underlying disease causing hirsutism - benign or malignant. In this review etiopathogenesis, diagnostic procedures and treatment options are discussed.
{ "pile_set_name": "PubMed Abstracts" }
The preparation of 5-chlorocarbonyl-5H-dibenz[b,f]azepine (CCDA) (I) from iminostilbene or 5H-dibenz[b,f]azepine of formula (III) ##STR3## was described for the first time by W. Schindler in German DAS No. 1,136,707, and in Swiss patent No. 54,023. According to this method, the iminostilbene of formula (III) is suspended in toluene. Phosgene is introduced into the suspension while heating the reaction mixture to 70.degree. C. Then the reaction mixture is refluxed during the further addition of phosgene, and is kept at boiling until the iminostilbene completely reacted and the evolution of hydrogen chloride has ceased. The introduction of phosgene is discontinued as soon as the reaction solution is free of iminostilbene. Excess phosgene is removed from the reaction mixture with dry nitrogen or dry air, such as is described in German DAS No. 1,001,271, in which the excess phosgene is blown out with dry air at the end of the phosgenation of 5H-10,11-dihydro-dibenz[b,f]azepine, or iminodibenzyl. The so detoxified reaction solution, is worked up in a manner known per se and then the CCDA of formula (I) is recovered by crystallization is amidized in a manner known per se to the carbamazepine of formula (II). The known methods all use an inert, anhydrous solvent such as toluene, chlorobenzene or o-dichlorobenzene at temperatures above 100.degree. C. See, for example, the patents referred to in the survey article by B. Renfroe, C. Harrington and G. R. Proctor in "Heterocyclic Compounds", Vol. 43, "Azepines", part I, published by John Wiley & Sons, NY, 1984, page 524, Table 118. In all known industrial methods the iminostilbene hydrochloride formed by the phosgenation is thermally dissociated into hydrogen chloride gas and free iminostilbene. This is carried out by heating the reaction mixture to the boiling point in an inert solvent, and introducting phosgene under reflux conditions. The known high temperature phosgenations are all carried out at 100.degree. C. and higher temperatures, to achieve a complete phosgenation of the iminostilbene, or the iminodibenzyl. The known methods of synthesizing carbamic acid chlorides from secondary amines are summarized in a table in the Houben-Weyl organic chemistry methodology mannual (vol. E 4pages 46-50, Georg Thieme Verlag, Stuttgart, N.Y., Publisher, 1983). Usually especially aromatic hydrocarbons, such as benzene, toluene or chlorobenzene are used as solvent. Methods have also been described, in which the reaction is carried out in chloroform, in 1,4-dioxane, and in ethyl acetate. If the reaction is carried out at low temperatures, only half of the amine is converted into the desired carbamic acid chloride when the phosgene is passed into a solution of the secondary amine in an inert solvent. This is because the hydrogen chloride liberated during the reaction, converts the other half of the amine into the hydrochloride. The amine hydrochloride precipitates in crystalline form. Therefore, the yield of the carbamic acid chloride can even in the most favorable case amount only to 50%. Since the work of H. Erdmann and P. Huth (J. Prakt. Chem. (2) 56, 7, 1897), it is known that the conversion can be completed if an inert, anhydrous base, such as pyridine, is used in an at least equimolar amount. According to Houben-Weyl (see above) in addition to pyridine, triethylamine and of course, the amine itself that is to be reacted are suitable as inert bases. The cold phosgenation becomes more costly since at least equimolar amounts of inert base are always required. The process is costly because the amine hydrochloride has to be separated out for recovering the inert base. Therefore, the cold phosgenation in the presence of inert auxiliary bases is of importance only for the reaction of temperature sensitive, secondary amines, which increasingly tend to undergo undersirable side reactions at the high temperatures of the hot phosgenation. In industry, the reaction is preferably carried out at temperatures above 100.degree. C. In this connection Houben-Weyl (see above) states that "[A]dvantageously, the reaction mixture is heated to temperatures above 100.degree. C. while further phosgene is introduced, and the entire amine chloride is converted into the carbamic acid chloride." In this thermal dissociation the hydrogen chloride gas carries along appreciable amounts of phosgene. Therefore, the off-gas decontamination must be detoxified and destroyed in special off-gas equipment. Such a procedure can seriously endanger the environment in the case of an accident, because of the danger presented by the extremely poisonous nature of phosgene which is a gas under ambient conditions. The procedure of high temperature phosgenation has, the following more significant serious disadvantages: the burden of having to deal with large amounts of liberated hydrogen chloride off-gas, including phosgene, and the entrained solvent vapors, and the resulting environmental protection problems; PA0 long reaction times of more than 18-24 hours in contact with highly corrosive media; PA0 a number of side reactions, and the dark coloration of the reaction product resulting in a low quality of the carbamazepine end product; and PA0 increasing formation of unwanted 9-methylacridine byproduct temperatures above 90.degree. C. represents a contraction of the 7-membered ring of the iminostilbene. Only at temperatures of about 90.degree. C. does the thermal dissociation of the iminostilbene hydrochloride into free iminostilbene and hydrogen chloride gas proceed sufficiently rapidly to achieve reaction times, which are acceptable for industrial purposes. However, iminostilbene is a temperature sensitive amine. Therefore, iminostilbene is suitably phosgenated by the method of Schnidler described in the aforementioned German DAS No. 1,136,707. The process variant preferred by Schindler is dividing the phosgenation into two stages, a cold phosgenation stage resulting in an about 50% conversion in the first phase, and a hot phosgenating stage. Conversion carried out in a second stage has clear advantages over a direct single stage hot phosgenation, because the yields are appreciably increased in this manner, the side reactions that take place above 90.degree. C. are suppressed, and the quality and color of the end product are improved. Nevertheless, the aforementioned disadvantages continue to exist in the second stage of the reaction, i.e. from the start of the heating to 90.degree. C. and during the thermal dissociation of the iminostilbene hydrochloride until the end of the reaction. An excess of phosgene is introduced into the reaction mixture to utilize the gentle reaction conditions of the first, the cold phosgenating stage as much as possible. A pressure surge can occur if the reaction mixture is heated subsequently to dissociate thermally the iminostilbene hydrochloride. This dangerous possibility is also mentioned in Houben-Weyl (volume E 4, page 744). When a pressure surge occurs, the spontaneously released hydrogen chloride gas also carries along appreciable amounts of phosgene. Therefore, the apparatus for destroying or detoxifying the off-gases must be sufficiently large to avoid the release of phosgene into the atmosphere. The reaction is advisably carried out at temperatures of between 90.degree. C. and 100.degree. C. to suppress the unwanted side reactions and the formation of the methylacridine byproduct. The phosgenation proceeds sufficiently rapidly at this temperature. However, the partial pressure of the phosgene is appreciably increased at the higher temperature, compared to that of the cold phosgenation, therefore it is not possible to prevent the steady escape of large quantities of phosgene being carried along by the liberated hydrogen chloride. This can, of course, be also realized from the fact that appreciably less time is required for the conversion of the first half of the iminostilbene in the cold phosgenation stage, than for the conversion of the second half in the hot phosgenation stage. The reaciton solution has to be detoxified after the complete conversion of the iminostilbene. The excess phosgene is blown out of the reaction solution with dry nitrogen as a rule, or a portion of the solvent is distilled off until the reaction mixture is free of phosgene. This detoxification method has the disadvantage that phosgene can leak into the atmosphere if there are any leaks due to the high gas pressure in the apparatus. Therefore, in the long run there is a constant danger of atmospheric contamination by the escaping phosgene. Other methods are also known for preparing CCDA. These other methods start from 10,11-dihydro-5H-dibenz[b,f]azepine, or iminodibenzyl of formula (IV) ##STR4## In this connection see British patent No. 1,246,606 and East German patents Nos. 82,719; 100,948; 101,671; 102,149; 102,150; 102,151; 108,535; 133,052; 234,862 Al: and 234,863 Al. According to the methods described in these references, iminodibenzyl is reacted with phosgene in a boiling, inert, aromatic solvent, preferably toluene, or chlorobenzene. Phosgene is introduced into the refluxing material. Thus these methods also employ hot phosgenation with all of its attendant disadvantages. The resulting 5-chlorocarbonyl-5H-10,11-dibenz[b,f]-azepine of formula (V) ##STR5## is reacted in an inert organic solvent with elemental bromine, or is otherwise subjected to selective bromination and the corresponding 10-monobromo derivative formula (VI) ##STR6## and/or the 10,11-dibromo-derivative formula (VII) ##STR7## is formed. The bromo compounds (VI) and/or (VII) are subsequently dehydrobrominated and/or are thermally debrominated. A partial exchange (30-40%) of the chlorine atom of the 5-chlorocarbonyl group for a bromine atom takes place during such a thermal process. Due to the required high reaction temperatures (150.degree. C.-170.degree. C.) and because of the liberated bromine, these drastic reaction conditions necessarily lead to uncontrollable side reactions, such as bromination of the ring, resinification, cracking, and discoloration. Thus the CCDA prepared by these processes contains, in addition to numerous, particularly bromine-containing, byproducts also some greasy, tarry, colored contaminants, the removal of which requires an undue effort. The nature and structure of these byproducts is not known. The customary purification methods lead to appreciable losses. No purification method was known until now, which can economically solve the problem of the residual bromine content. Thus, as determinedly high pressure liquid chromatography, the CCDA so prepared is present the average in an amount of 90%, and the precursor for the carbamazepine end product, contains about 10% impurities.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Why can't I get netcat talking to my Rails server? I have a Thin server running locally, serving a Rails app. Following an example in the netcat man page, I'm trying to use nc to talk to my server: echo -n "GET / HTTP/1.1\r\n\r\n" | nc 0.0.0.0 3000 But I get a 400 response: HTTP/1.1 400 Bad Request Content-Type: text/plain Connection: close Server: thin 1.6.1 codename Death Proof What am I missing? A: HTTP 1.1 requires providing a Host: header. You also need to add the -e flag to the echo command to escape character sequences, so echo -en "GET / HTTP/1.1\r\nHost: localhost\r\n\r\n" | nc 0.0.0.0 3000 would work, or alternatively you could use HTTP 1.0 which does not require the Host: header, so echo -en "GET / HTTP/1.0\r\n\r\n" | nc 0.0.0.0 3000
{ "pile_set_name": "StackExchange" }
----- Forwarded by Elizabeth Sager/HOU/ECT on 05/15/2000 11:28 AM ----- Christian Yoder 05/11/2000 02:22 PM To: Elizabeth Sager/HOU/ECT@ECT cc: Subject: WSPP memo I can provide chapter and verse if you need it, but thought just making the main point might be enough. ----cgy
{ "pile_set_name": "Enron Emails" }
This interview was originally published by Refinery29. In honor of World Teachers’ Day on Oct 5, Refinery29 is publishing a special theme week of Money Diaries, featuring teachers from across America. This collaboration is part of the Guardian’s teacher takeover. To celebrate back-to-school season, we spoke with four teachers – who are also previous Money Diarists – around the country to learn more about their financial lives. Teachers dedicate their lives to their students, so why are they so under-appreciated? Teacher pay has declined along with classroom budgets. In 2018, the teachers’ fight for fairness is far from over. Today, we speak to an English teacher from Rockford, Michigan who earns $43,000 a year. Though she feels fulfilled in her career, she worries about the future and feels she won’t be able to afford a big purchase, such as a home, without being in a dual-income household. Location Rockford, Michigan Role English teacher Salary $43,000 (previously $41,000) When did you start working as a teacher? I began teaching in 2015. This is my fourth year in the classroom. Has your attitude toward the job changed since you started? If so, how? The longer I teach, the more I feel it’s my responsibility to inspire my students to become change-makers and empower them to be informed problem-solvers in our community and beyond. So often what happens in a classroom has little context or purpose outside of those four walls. The further I get into my career, the harder I work to connect our learning to global issues and communities outside of our own. I don’t want to just teach my students about the world; I want to teach them out to change it. Is there anything you would do differently in your career? I feel fortunate saying this, but no, there isn’t anything significant I would have done differently. I hit the ground running, so to speak, and tenaciously created many opportunities for myself and my students. For example, I’ve initiated new field trips and volunteer opportunities in the community, traveled domestically and abroad with students, and participated in teacher fellowships through the National Writing Project and the National Endowment for the Humanities. Each of these things were demanding, but ultimately the most worthwhile moments in my career so far. In general, how do you feel about teaching as a career? Who has more fun at their job than a teacher? So much of my day is spent smiling, laughing, and conversing with young people who continually surprise me. Each day, each hour, each student is distinct, and that means my role is never just limited to instruction. Teaching is a daily challenge that tests every part of my skill and emotional stamina. I can’t imagine a more fulfilling career, though. I know that what I do makes a difference because I see it in the way my students act and through the decisions they make. Most days I come home feeling proud of what I do. I don’t know if that sense of fulfillment is found in many other careers. Teaching demands everything you’ve got – your time, talents, and emotional fortitude This country is facing an education crisis and many teachers are leaving the profession for other fields with higher pay. How has this affected you? The timing of this question is unnerving. Just yesterday I pored over my finances and updated my monthly budget to determine how in the world I could ever afford a down payment on a house. It seems unattainable for me, and I’m someone who is stringent with my spending and generously contributes to my savings. I don’t see how I’ll ever be able to afford a big purchase like that on my own and that dependency is frustrating. I can’t travel more than I do now, upgrade my car, or even purchase a home without being a dual-income household. When I acknowledge that to myself, I feel trapped, like I can’t really extend beyond what I already do. I’m considering getting a graduate degree in a field outside of education to diversify my career opportunities. Out of curiosity, I recently found myself cruising Indeed.com for jobs in the area I’m qualified for outside of education. I wanted to see if anything would pique my interest. I’m relieved nothing did. I don’t actually want to leave teaching, but I imagine my relatively stagnant salary will become less tolerable as I continue in my career. Do you think teachers generally are underpaid or undervalued? Do you think you are? “Underpaid” and “undervalued” go hand-in-hand. I’d say I feel valued by my community because I’m often sincerely thanked for what I do. I’ve met many professionals outside of education that speak on the merit of teachers. The people in my life tend to hold teachers in high regard. However, the most meaningful way to show an employee or public servant you value them is to compensate them adequately. Districts can support its teachers, too, and encourage professional growth by funding professional development opportunities and graduate-level courses. My district, for example, used to partially fund courses for teachers pursuing a master’s degree or beyond. Over the last few years, though, they’ve rescinded that offer. So, there’s a dissonance between the words I hear and the actions I see. How do you think being a teacher in your city/school compares to the rest of the country? I recognize and am grateful for the privileges I’m afforded by the city I work in. Our community consistently supports our schools, often passing millages to fund repairs and improvements to our buildings. Parents are actively involved in their students’ education. I’m able to purchase books each year for my classroom library using community-funded grants. My district provides each teacher with an annual allowance to buy supplies for their classrooms so we don’t have to pay for materials out of pocket. I know these qualities are considered luxuries to many educators. They shouldn’t be, of course; all students and teachers should have access to quality facilities, books, and opportunities to learn outside of the classroom. All students and teachers should have access to facilities, books, and opportunities to learn outside the classroom Do you feel fulfilled in your career? Yes – teaching is intellectually stimulating and emotionally invigorating. Teaching has helped me become a inspiring leader, engaging speaker, and stronger writer, all of which give me confidence in the professional world. Being an educator, too, has given me opportunities to travel because I seek out grants and fellowships specifically for teachers. I feel so much love from my students and that motivates me to give 100 percent each day I’m there. The demand for creativity and problem-solving that comes with teaching energizes me, too. There’s never a dull moment. Would you recommend a teaching career to others? Why or why not? Honestly, I think it takes a certain kind of person to be a successful teacher and flourish long-term in the career. You have to constantly be a bright light in an often-dark world. Teaching demands everything you’ve got – your time, talents, and emotional fortitude – and the only way to thrive is to learn how to balance those demands and maintain enough for yourself. Nothing about teaching is easy, but it can be endlessly rewarding and inspiring. I’d recommend teaching to someone who fully understands what they are getting into and is not adverse to the challenges. If someone is feeling doubtful about their decision to be a teacher, it isn’t for them.
{ "pile_set_name": "OpenWebText2" }
215 Cal.App.2d 826 (1963) ROBERT T. GRIFFITH, Plaintiff and Appellant, v. PETER B. ZAVLARIS, Defendant and Respondent. Civ. No. 20675. California Court of Appeals. First Dist., Div. One. May 8, 1963. Hollander, Lipian & Horwitz and Jack H. Lipian for Plaintiff and Appellant. Hadsell, Murman & Bishop and G. William Filley for Defendant and Respondent. BRAY, P. J. Plaintiff appeals from judgment of dismissal. Question Presented In an action for alleged legal malpractice, when does the statute of limitations commence to run? *827 Record December 30, 1960, plaintiff filed a complaint against defendant attorney for malpractice. The complaint alleged that on or about February 8, 1956, plaintiff employed defendant to advise him with regard to "the purchase of a one-third share interest" in a certain corporation; that pursuant to such employment defendant advised that the promissory note, copy of which is set forth in the complaint, could "be executed by the plaintiff for the establishment of his one-third interest" in the said corporation. The note is dated March 29, 1956, is for $7,000, payable to plaintiff one year after date and executed by Robert Rohrig. The note gives an alternative to payment of money "or to be payable by the transfer of seventy (70) shares of stock of the Quality Beverage Company of Santa Clara, Inc., when said stock issued to Robert Rohrig." The complaint further states that defendant "could, by exercise of due diligence and skill, have advised the plaintiff the California Corporate Securities Act, Corporation Code 25000 et seq. does not permit any Company to obtain money for the issuance of securities prior to the obtaining of a permit to issue from the Division of Corporations and that any and all violations of the said Corporation Act are made criminal offenses by the said Corporate Securities Act, Corporation Code 26102, 26103"; that defendant negligently and carelessly advised plaintiff that the note could properly be executed, that the corporation could receive funds pursuant to his prepayment of $7,000 to the said corporation and that the execution of the note and the payment by plaintiff of $7,000 to the corporation was not in violation of the act and that plaintiff could receive stock pursuant to his prepayment of $7,000 to the Quality Beverage Corporation of Santa Clara, Inc.; that on May 6, 1958, plaintiff brought suit on the promissory note for $7,000 in the Santa Clara County Superior Court; that on December 31, 1959, that court ordered that neither plaintiff nor the defendant Robert Rohrig have judgment against the other because said promissory note was against the policy of law; that both parties were at fault and were in pari delicto with one another. That court ordered "No recovery." Plaintiff then alleged that thereby he lost the means of recovering said $7,000 and was required to pay court costs and attorneys' fees. Plaintiff seeks judgment for the $7,000 and all attorneys' fees and costs in that action. Defendant demurred generally and on the ground that the *828 action was barred by section 339, subdivision 1, Code of Civil Procedure. The court sustained the demurrer granting plaintiff 15 days to amend. [fn. 1] Plaintiff failing to amend, defendant moved for a dismissal. The court granted the motion and judgment of dismissal was entered thereon. Commencement of Statute of Limitations [1a] The applicable statute is section 339, subdivision 1, Code of Civil Procedure, which reads, in pertinent part, that the time for commencing action is "Within two years: (1) An action upon a contract, obligation or liability not founded upon an instrument of writing. ..." But the question is: within two years of what? Heretofore, the only cases determining the time of commencement of the two years have held that in actions for legal malpractice the statute commences to run from the date the negligent act occurs. Among these are Hays v. Ewing (1886) 70 Cal. 127 [11 P. 602], failure of the attorney to plead absence of the defendants from the state to toll the statute of limitations set up as a defense to an action on a promissory note; Jensen v. Sprigg (1927) 84 Cal.App. 519 [258 P. 683], neglect of duty of the attorney in the management of a law suit; De Garmo v. Luther T. Mayo, Inc. (1935) 4 Cal.App.2d 604 [41 P.2d 366], negligence of attorney in obtaining a judgment in less amount than that to which the plaintiff claimed to be entitled. There the court said, "The negligence if any occurred prior to entry of the judgment. ..." (P. 606.) In Wheaton v. Nolan (1934) 3 Cal.App.2d 401 [39 P.2d 457], an action for failure of attorneys "to diligently and promptly commence suit and attachment proceedings," the court did not state when the statute started to run, but based its decision upon its finding that "the allegations made to overcome the running of the statute of limitations were insufficient under the decisions of this state to accomplish that purpose. Means and sources of knowledge of the alleged breach and injury were at all times available to plaintiffs and ordinary *829 diligence on their part in consulting such means and sources would have furnished them with all the information sufficient to discover the breach and commence suit within the two-year period" (P. 403.) The action against the attorneys was filed more than four years after the plaintiffs claimed to have been damaged by the negligence of the attorneys. There is nothing in this case which gives comfort to plaintiff's contention that the true rule is that the statute does not start to run from the date of the negligent act but from the date of discovery thereof. In Lally v. Kuster (1918) 177 Cal. 783 [171 P. 961], an action against an attorney for negligence in allowing an action for the foreclosure of a note and mortgage to be dismissed for delay in prosecuting it, the attorney contended that the plaintiffs' right of action against him accrued at the time he first disobeyed the orders of his client to proceed diligently. This was approximately three years before the action was dismissed. The plaintiff claimed that the right of action against the attorney did not accrue until the dismissal of the other action. The court said that the question is not "free from difficulty, and yet where the disobedience complained of consists in delay only, the cause of action cannot be said to arise until such delay has resulted in some injury, as it did when the court dismissed the case because of the delay." (P. 791; italics added.) At first blush, Lally would appear to be opposed to the rule of the other cases, namely, that the statute runs from the time of the negligent act. On the contrary, it supports the rule. There the negligent act out of which a cause of action arose, was allowing the action to be dismissed for lack of prosecution. The attorney's delay in prosecuting the action did not become a negligent act for which redress might be sought, until the time when the action became dismissible because of that delay. Jensen v. Sprigg, supra, 84 Cal.App. 519, states that the appellant urged that the cause of action against the attorney did not accrue until the delay resulted in damages or injury to the plaintiff, citing Lally, supra. The court then stated that it agreed with the plaintiff's contention and pointed out that the plaintiff's loss of remedy in the action being prosecuted by the attorney did not occur until the action was delayed to the point where the defendant therein was adjudged a bankrupt. It was at that point that the attorney's act of *830 negligence occurred, and the statute of limitations in any action against the attorney started to run. [2] In the case at bench, the act of negligence alleged occurred when the attorney misadvised plaintiff, even though plaintiff did not discover the negligence nor the fact that he had been damaged thereby until later. [1b] Plaintiff cites no authorities supporting his contention that the statute does not commence to run in a legal malpractice case until the discovery of the loss. He states in his brief: "Appellant is well aware that the cases of De Garmo v. Luther T. Mayo, Inc. (1935) 4 Cal.App.2d 604 [41 P.2d 366], and Hays v. Ewing (1886) 70 Cal. 127 [11 P. 602], appear to establish the principle that the statute begins to run at the time of the occurrence of the negligence, and not at the time of the discovery of the negligence." However, he contends that the proviso in section 339, subdivision 1, applies. That proviso, however, does not apply because by its very terms it is limited to actions founded upon contracts of title insurance and allied contracts or obligations, for the proviso states, "provided, that the cause of action upon a contract, obligation or liability evidenced by a certificate, or abstract or guaranty of title of real property or policy of title insurance shall not be deemed to have accrued until the discovery of the loss or damage suffered by the aggrieved party thereunder." Obviously liability for legal malpractice is not included in this proviso. Moreover, the fact that the proviso is limited to certain contracts and obligations indicates that the Legislature intended not to place such a limitation upon contracts, obligations or liabilities not founded upon instruments in writing. Plaintiff urges that the rule of medical malpractice cases be applied to legal malpractice cases, citing Huysman v. Kirsch (1936) 6 Cal.2d 302 [57 P.2d 908], holding in spite of earlier cases which held that the statute of limitations ran from the date of the physician's act, that the statute does not begin to run until the discovery by the patient of the negligence of the physician. However, medical malpractice is governed by section 340, subdivision 3, Code of Civil Procedure (one year) while legal malpractice is governed by section 339, subdivision 1 (two years). The Legislature has in no way made these two malpractice actions analogous. Although the application of the rules of legal malpractice actions may seem harsh, nevertheless it would appear that if the time-honored rule as to the commencement of the limitation provided in section *831 339, subdivision 1, is to be changed, it should be changed by the Legislature with appropriate conditions, so that the liability of an attorney would not exist indefinitely. Judgment affirmed. Sullivan, J., and Molinari, J., concurred. NOTES [fn. 1] 1. The allegations of the complaint are uncertain in that it is alleged that defendant advised that the promissory note could be executed by plaintiff when apparently it was to be and was executed by Rohrig. Further, it is alleged, in effect, that the $7,000 which by the note was to be repaid by Rohrig was paid to the corporation and the shares which the note states were to be delivered by Rohrig to plaintiff were to be issued to plaintiff by the corporation. However, as the parties mainly present the question as to whether, if a cause of action existed, it is barred by the statutes of limitation, and we determine herein that it is so barred, we deem it unnecessary to determine upon what other grounds the demurrer was sustained.
{ "pile_set_name": "FreeLaw" }
Is it time to abandon the use of amphotericin B bladder irrigation? In this article, we review the issues surrounding funguria and its management. With this background, the value of bladder irrigation with amphotericin B for the management of funguria is directly examined. Amphotericin B bladder irrigation is used frequently in clinical practice. Although its use is not standardized, there are multiple studies that attempt to show the impact on funguria management. These bladder irrigations have been used either for treatment of funguria or (less commonly) as a diagnostic test in attempts to identify upper urinary tract disease. Despite their widespread therapeutic use and relative safety, it is not clear from our experience and a review of the literature that amphotericin B bladder irrigations have any diagnostic or therapeutic value. The patient may be best served by removal of the urinary catheter, if possible, rather than by instillation of bladder irrigation with amphotericin B.
{ "pile_set_name": "PubMed Abstracts" }
WVU Struggling to Find Winning Formula West Virginia wide receiver Ronald Carswell makes this 50-yard catch in the first half of Saturday's 35-12 loss at Kansas State. The Mountaineers produced 293 of their 367 yards of offense in the first three quarters of the game. All-Pro Photography/Dale Sparks photo MANHATTAN, Kan. - College football is a four-quarter, 60-minute contest and West Virginia right now is not making enough plays at the end of games to win them. “It’s a huge concern,” admitted Mountaineer coach Dana Holgorsen. “We talk about it being a fourth-quarter game. We talk about we’ve got to finish everything that we do. That doesn’t happen to good football teams.” Two weeks ago against Texas Tech, the Mountaineers had a 27-16 lead early in the third quarter before watching the Red Raiders score 21 unanswered points to pull out a 37-27 victory. Saturday at Kansas State, West Virginia had a five-point lead with 10:40 remaining in the third quarter after Josh Lambert’s 50-yard field goal made the score 12-7. Then, K-State answered with a 14-play, 78-yard drive that ate eight minutes off the clock and enabled the Wildcats to retake the lead at 14-12. Three times quarterback Daniel Sams made critical plays on third down to extend the drive. On third and six at the K-State 40, Sams found running back John Hubert uncovered in the flat for 15 yards to the WVU 45. Three plays later, on third and 11 at the WVU 46, Sams hit Tyler Lockett for 14 yards to the WVU 32. Then on third and goal at the West Virginia 9, Sams hooked up with Lockett in the back of the end zone for the go-ahead score. “It came down to those critical third downs and that’s where the confidence shows up,” said defensive coordinator Keith Patterson. “There were two critical third downs and if we get off the field on those it’s a different deal.” Following the K-State score that put the Wildcats back in the lead, the Mountaineers started well when Clint Trickett hit Daikiel Shorts for a 20-yard gainer to the Kansas State 49. Another Trickett pass to Shorts and a Dreamius Smith run set up a third and five at the K-State 44. Trickett had tight end Cody Clay open toward the near sideline, but he threw the ball behind him. Holgorsen chose to punt the ball back to the Wildcats on fourth down in hopes that his defense could get the ball right back for the offense. It didn’t. Again, Kansas State made two big third-down conversions, one on third and eight at its own 24 when backup quarterback Jake Waters found Curry Sexton for a 32-yard completion to the Mountaineer 44, and then on third and six at the 40 when Waters scrambled for 10 yards to the WVU 30 to set up his 30-yard TD pass to Tramaine Thompson. “The third and (six) when he pulls the ball down and runs for the first down … we’ve got everybody covered and just play with your eyes,” said Patterson. “Boom. We get him and we’re off the field.” Now trailing by nine, 21-12, West Virginia moved the chains twice on first-down plays by running back Charles Sims and Shorts before getting the football back into K-State territory on a Trickett scramble for first-down yardage to the Wildcat 46. But he fumbled on the play and the ball was recovered by Dante Barnett. Five plays later, Kansas State was right back in the end zone and for all intents and purposes the game was over. “You’ve got to be able to throw to open people and complete it and Clint was not doing a good job of that,” said Holgorsen. “We turned the ball over and at that point when we were down two touchdowns we obviously have to pick the pace up on offense. “We have to throw the ball and Clint wasn’t doing a very good job of that so we went with Paul (Millard) because Paul has a little bit of experience at just spreading the ball around. I thought he did a very average job.” In its last two games, West Virginia has been outscored 35-0 in the fourth quarter. Against Texas Tech, the Mountaineer offense generated just 29 yards in the fourth quarter and yesterday against Kansas State, the offense had 293 of its 367 total yards after the first three quarters. “We are not playing winning offensive football,” said Holgorsen. “Are we improving and does it look better at times? Yes. But is it enough to win Big 12 football games? Absolutely not.” Is it a product of inexperience, a lack of depth, a lack of explosive playmakers or a void in leadership? In reality, it’s probably a combination of the four. “We’re not scoring and we’re not finishing drives and blocks. We’re not making people miss in the open, we’re not catching the ball downfield and it keeps me up at night,” admitted Holgorsen. The coach mentioned before the season that he wasn’t losing any sleep over some of the key personnel losses that he had to replace on offense. Now, Holgorsen says he is losing sleep because of the way his young football team is performing. “I thought we could coach them up a little bit and the continuity would take care of itself just by practicing,” said Holgorsen. “Leading into this game we have shown improvement, but it’s not winning football. And then your confidence takes a hit and you get discouraged and it’s tough. They’re trying. I do think our guys are trying, but it’s just not clicking.”
{ "pile_set_name": "Pile-CC" }
Marlyn Glen has received figures from Dundee City Council on the number of classes in the new August intake in Primaries 1-3 have a maximum of 18 pupils in them. Ms. Glen said that they indicate ” that the Scottish Government has abandoned its commitment to ensure the 18 maximum class size in two years time.” The number of P1 classes in Dundee in the new intake with 18 or less pupils is 13 out 60 classes ( in April the corresponding figure was 8 classes out of 56.) For P2 classes – the number of classes in the new intake with 18 or less pupils is 1 out of 49 classes ( six months ago, the figure was 2 classes out of 43 ) For P3 P3 classes – there are no classes in the new intake with 18 or less pupils six months ago , the figure was 1 class out of 39 ) These figures exclude 9 composite classes in P1/P2, 10 in P2/P3 and 14 in P3/P4 Ms. Glen said, “The SNP Government promise of a maximum of 18 pupils in each class in primary years 1, 2 and 3 by 2011 is in shreds. “These Dundee figures confirm it. “As further proof, the SNP Government has indicated this week that it is considering setting the legal maximum class size in primary at 25, well above the maximum size of 18 promised by them in their election manifesto. ” I have repeatedly called on them, in vain, to provide Dundee City Council with more money to employ more primary teachers to guarantee that 18 class size upper limit.” 15 people have been successfully prosecuted in Dundee and 19 overall in Tayside under the Emergency Workers (Scotland) Act 2005, in the latest available year, according to an answer to a parliamentary Question raised by Marlyn Glen. Justice Secretary Kenny MacAskill told her that in 2007-08, 5 of the successful prosecutions in the city came under Section 2(1) of the Act, referring to assaulting or impeding certain emergency workers responding to emergency circumstances. A further 10 successful prosecutions came under Section 5(1) of the Act which applies only to incidents that occur “in a hospital or on land adjacent to and used wholly or mainly for the purposes of a hospital”. The Act makes it a specific offence to assault, obstruct or hinder someone providing an emergency service – or someone assisting an emergency worker in an emergency situation. It covers a wide range of occupations such as police, fire and ambulance staff, doctors, nurses and midwives in hospitals. Police, fire and ambulance workers and medical staff in hospitals are covered whenever they are on duty, as well as when they are actually dealing with emergencies. Ms. Glen said, “Work-related irresponsible behaviour should never be regarded as an ‘ occupational hazard’. “This is particularly so for emergency staff who have the right to carry out their life-saving work without the threat of aggression, obstruction or abuse.” Marlyn Glen has welcomed news from Solicitor-General for Scotland, Frank Mullholland, that 43 members of staff in Tayside in the Crown Office and Procurator Fiscal Service have completed training as specialists to prosecute cases in sexual crime. Ms. Glen had raised the matter with the Scottish Government following the publication of the Sexual Offences (Scotland) Bill which will now provide a statutory definition of rape and consent. In the last two years 2006-2008, there were a total of 113 cases of rape reported to the police in Tayside, only 3 of which resulted in prosecution, and none of which was proved. Ms. Glen said, ” It is concern with low rates of prosecutions that have led to calls for marked changes in the way that rape is handled by the police and the courts in Scotland. ” The appointment of those with specialist training is a welcome recognition of the need to improve the level of successful prosecutions. “Many more women must receive the justice that they are entitled to under the law.” In reply to Ms. Glen, Mr. Mulholland said, “In 2004, the COPFS conducted a review of how rape and serious sexual offences are investigated and prosecuted which produced a report that led to the Law officers making fifty recommendations for change June 2006. “The Lord Advocate gave a commitment to delivering on the recommendations over a three-year period. “One of the principal recommendations of the review was that specialism in the investigation of sexual offences be achieved by the development of a system of approval for all staff working in this area. “The first condition of approval is that staff undertake a programme of specialist training in sexual crime. “A comprehensive programme of training has been developed and delivered to prosecution staff through the delivery of interactive electronic learning modules. ( e-learning modules) and a two day sexual offences training course at the Scottish Prosecution College. “The training programme includes training from senior police officers, Rape Crisis Scotland, Crown Counsel and Procurators Fiscal on all aspects of the investigation of sexual crime. “To date, 43 members of staff who have worked within the Tayside area of COPFS have completed that programme. “The final condition of the approval process requires trained staff to demonstrate that they can meet the standards required by the training and guidance in the work that they undertake. “To this end trained staff are required to satisfy Crown Office when completing a sexual offence pre-recognition that the key elements of the guidance and training have been implemented. “Since 1st. July of this year, only members of legal and pre-cognition staff who have been trained and approved to investigate sexual offences in accordance with the Service’s approval criteria will investigate and supervise sexual offences cases.”
{ "pile_set_name": "Pile-CC" }
Fantastic sleeping pussy Natalia Rossi is sleeping quietly and she looks really hot. She's wearing a Christmas hat and there's a candy cane in her mouth to open it wide and make room for the cock. The guy gets hard in her mouth and then he guides his cock into her sleeping pussy and fucks her hard. Natalia Rossi Sleep Creep A beautiful young girl is sleeping peacefully when a dude with a camera creeps into the bedroom and takes advantage. He fingers her pussy, forces his cock into her mouth and fucks her hard until cumming on her face. That's every scene at Sleep Creep and it's hot as hell.
{ "pile_set_name": "Pile-CC" }
592 F.2d 832 2 ITRD 1078, 50 A.L.R.Fed. 372 INGRAM CONTRACTORS, INC., Plaintiff-Appellant,v.UNITED STATES of America, Michael Blumenthal, Secretary ofthe Treasury, the Department of the Treasury,Robert E. Chason, Commissioner ofCustoms and U. S. CustomsService, Defendants-Appellees. No. 78-2542 Summary Calendar*.United States Court of Appeals,Fifth Circuit. April 4, 1979. Monroe & Lemann, Robert J. Fritz, Benjamin R. Slater, Jr., Richmond Eustis, New Orleans, La., for plaintiff-appellant. John P. Volz, U.S. Atty., Michaelle F. Pitard, Asst. U.S. Atty., New Orleans, La., for defendants-appellees. Appeal from the United States District Court for the Eastern District of Louisiana. Before GOLDBERG, RONEY and TJOFLAT, Circuit Judges. PER CURIAM: 1 Ingram Contractors, Inc. (Ingram), brought suit in the district court to avoid payment of over $200,000 in customs duties. Jurisdiction was invoked pursuant to 28 U.S.C. §§ 1331(a)1 and 1355 (1976).2 The defendants moved for dismissal for want of subject matter jurisdiction, Fed.R.Civ.P. 12(b)(1), on the ground that Congress has given controversies such as this one exclusively to the United States Customs Court to resolve. The district court granted the motion and entered final judgment dismissing the action. We affirm. 2 On March 5, 1970, Derrick Barge No. 3, owned by Ingram and documented under the laws of the United States, arrived at Orange, Texas. The barge had been outside the United States and had undergone certain repairs in a foreign country. On March 6, 1970, Vessel Repair Entry No. 10006, covering these foreign repairs, was made with the Bureau of Customs (now the United States Customs Service, hereinafter referred to as Customs). Ingram subsequently urged Customs to exempt the barge from duty, claiming, alternatively, that the vessel was not subject to duty and that the repairs had been brought about by stress of weather. Customs granted Ingram several extensions of time, through September 30, 1972, to file an application for relief from the duties. On September 28, 1972, Ingram wrote Customs reiterating its position that the barge was not subject to duty. On February 2, 1977, Customs denied Ingram's application for relief and advised Ingram that the duties would be finally computed. On March 4, 1977, Ingram replied that the Government's claim for duties had become time-barred. 3 On April 4, 1978, Customs demanded payment of the duties; on May 3, it refused to grant Ingram any further extension and advised Ingram that the matter would be forwarded to the United States Attorney's Office for collection. Five days later Ingram instituted this suit to enjoin the Government's collection effort. Ingram also filed a petition with Customs requesting that the Secretary of the Treasury review the imposition of the duties. That petition is still pending. 4 Ingram contends that its claim "arises under" the laws of the United States; therefore, the district court's subject matter jurisdiction was properly invoked under 28 U.S.C. § 1331(a) (1976). Congress has provided, however, that the Customs Court shall have exclusive jurisdiction of all civil actions challenging an administrative decision of Customs. 28 U.S.C. § 1582(a) (1976).3 As this court has noted, the purpose of section 1582 is to provide " 'a complete system of corrective justice with respect to matters arising under the customs laws.' " Argosy Ltd. v. Hennigan, 404 F.2d 14, 20 (5th Cir. 1968). Thus, the exclusive jurisdictional grant of section 1582 overrides the general grant of jurisdiction conferred on district courts by sections 1331 and 1355 and any other statute. This court did note in Argosy that "in exceptional or extraordinary circumstances a district court may properly enjoin acts by (the Customs Service), when such acts threaten irreparable injury." We explained there, however, that "the term 'exceptional or extraordinary circumstances' implies the unavailability of an adequate remedy at law." Id. at 21. The remedy provided by Congress in the customs regulatory scheme is generally deemed adequate, even though it may impose some hardship on the claimant, See Horton v. Humphrey, 146 F.Supp. 819, 821 (D.D.C.), Aff'd, 352 U.S. 921, 77 S.Ct. 224, 1 L.Ed.2d 157 (1956). 5 Ingram contends that it has no adequate remedy at law because it has not met the procedural jurisdictional prerequisites of the Customs Court, See19 C.F.R. § 4.14 (1978). It is debatable whether Ingram has filed a proper protest with Customs and, if it has, whether the protest has been disposed of administratively in such a manner that Ingram is now entitled to institute proceedings in the Customs Court.4 Ingram suggests that any inability on its part to satisfy the prerequisites to Customs Court jurisdiction has been caused by Customs's failure to abide by its own regulations. This failure, Ingram says, may have prevented it from filing a valid protest and operated as a denial of due process. 6 These arguments, as well as the other objections Ingram has interposed to avoid payment of the duties in question, should be addressed to the Customs Court, not to the district court and this court of appeals. See J. C. Penney Co. v. United States Treasury Department, 439 F.2d 63, 68 (2d Cir.), Cert. denied, 404 U.S. 869, 92 S.Ct. 60, 30 L.Ed.2d 113 (1971). The Customs Court has full power to rule on the constitutional and procedural questions Ingram has raised. Morgantown Glassware Guild v. Humphrey, 98 U.S.App.D.C. 375, 236 F.2d 670, 671-72, Cert. denied, 352 U.S. 896, 77 S.Ct. 133, 1 L.Ed.2d 87 (1956); See, e. g., Cottman Co. v. Dailey, 94 F.2d 85, 89 (4th Cir. 1938). 7 In sum, Ingram still has an adequate remedy in Customs Court; or it had an adequate remedy that it failed to pursue. Moreover, once Ingram's pending petition with Customs has received final disposition, that decision can be appealed to the Customs Court. See Suwannee Steamship Co. v. United States, 354 F.Supp. 1361, 1369 (Cust.Ct.1973). Ingram has failed to demonstrate that it has no adequate remedy at law or that Customs has deprived him of the remedies provided him by law. It has not presented the "exceptional circumstances" that must exist before a district court may exercise jurisdiction over a matter committed to the Customs Court for resolution. 8 Because we are convinced that the district court lacked subject matter jurisdiction, it is unnecessary for us to discuss the last argument pressed by Ingram in this appeal the propriety of the district court's stay of discovery pending its disposition of the jurisdictional issue. Therefore, the judgment of the district court is AFFIRMED. * Rule 18, 5 Cir.; See Isbell Enterprises, Inc. v. Citizens Casualty Company of New York et al., 5 Cir., 1970, 431 F.2d 409, Part I 1 28 U.S.C. § 1331(a) (1976) provides: The district courts shall have original jurisdiction of all civil actions wherein the matter in controversy exceeds the sum or value of $10,000, exclusive of interest and costs, and arises under the Constitution, laws, or treaties of the United States except that no such sum or value shall be required in any such action brought against the United States, any agency thereof, or any officer or employee thereof in his official capacity. 2 28 U.S.C. § 1355 (1976) provides: The district courts shall have original jurisdiction, exclusive of the courts of the States, of any action or proceeding for the recovery or enforcement of any fine, penalty, or forfeiture, pecuniary or otherwise, incurred under any Act of Congress. 3 28 U.S.C. § 1582(a) (1976) provides: The Customs Court shall have exclusive jurisdiction of civil actions instituted by any person whose protest pursuant to the Tariff Act of 1930, as amended, has been denied, in whole or in part, by the appropriate customs officer, where the administrative decision, including the legality of all orders and findings entering into the same, involves: (1) the appraised value of merchandise; (2) the classification and rate and amount of duties chargeable; (3) all charges or exactions of whatever character within the jurisdiction of the Secretary of the Treasury; (4) the exclusion of merchandise from entry or delivery under any provisions of the customs laws; (5) the liquidation or reliquidation of an entry, or a modification thereof; (6) the refusal to pay a claim for drawback; or (7) the refusal to reliquidate an entry under section 520(c) of the Tariff Act of 1930, as amended. 4 28 U.S.C. § 1582(c) (1976) provides: The Customs Court shall not have jurisdiction of an action unless (1) either a protest has been filed, as prescribed by section 514 of the Tariff Act of 1930, as amended, and denied in accordance with the provisions of section 515 of the Tariff Act of 1930, as amended, or if the action relates to a decision under section 516 of the Tariff Act of 1930, as amended, all remedies prescribed therein have been exhausted, and (2) except in the case of an action relating to a decision under section 516 of the Tariff Act of 1930, as amended, all liquidated duties, charges or exactions have been paid at the time the action is filed.
{ "pile_set_name": "FreeLaw" }
User reviews For w3 Upload 2.0Publisher's description w3 Upload is a Scripts software developed by Dimac Development. After our trial and test, the software is proved to be official, secure and free. Here is the official description for w3 Upload: BSEditor: The w3 Upload component makes it possible for you to upload multiple files using simple ASP and HTML-coding technologies, and to control the maximum FileSize or to limit the content type of the uploaded files. The placement of uploaded files can be directed and named by the user who. w3 Upload allows you to mix standard forms with the upload form, thus making it possible for you to seamlessly integrate w3 Upload into your forms. w3 Upload version 2 introduces some new features: The ability to create, Extract and manipulate zip archives, and a Progress-property, so you know how your upload is going. Also, better support for form-fields with multiple names as well as the ability to For-Each-loop through the form. you can free download w3 Upload 2.0 now.
{ "pile_set_name": "Pile-CC" }
To millions of fans, Noel Gallagher is the face of the ­biggest band since The Beatles. As lead guitarist and songwriter with Oasis, he portrayed himself as a booze-and-drug loving “Manc” who could be brawling with brother Liam one day while sipping champagne with Prime Minister Tony Blair the next. But according to new revelations, Noel, 43, was a ­calculating late-comer who rewrote ­contracts to ensure he was in total control of the band that went on to make millions. Drummer and founder member Tony McCarroll, 38, who played on the first Oasis hits ­including Some Might Say, discovered the shock truth as he and the band including Paul “Guigsy” McGuigan were leaving a hotel. Angry Tony, who was touring in Japan with the band as they began to hit the big-time, said: “We made our way through the huge hotel lobby towards a fleet of taxis that awaited us. “Guigs stepped in front of me. He turned to me with an angry look. “He said, ‘Noel added a three-month notice period to the record contract you signed. If he wants to sack you, he can. That’s you f****d. See you later’. “This was the first time anyone had mentioned a change in the contract. We were all in serious trouble. Noel’s ­masterplan was ­exactly that. Noel’s.” Tony, who grew up in the same tough south Man-chester district as Noel, also claims in a new book that the star… MADE SURE ­music journalists saw the so-called fights ­between him and Liam. SNIFFED so much glue as a kid he was nicknamed Bostik. BOTTLED OUT of a fight as a Manchester City supporter against rival fans. TRIED to stop Tony and Guigsy ­escaping from a racist gang beating up kids of Irish descent. Tony says: “It’s funny to think how prevalent such prejudices were, even two decades ago.” Tony claims they were confronted by Noel as they tried to ­escape the gang in a local park. He says: “One of the two friends with me recognised Noel. My friend said ‘What the f*** are you doing trying to catch us? You’re as Irish as the rest of us, you ­nugget’.” Two years ago Noel claimed in an interview: “I am as Irish as the next person.” Despite the confrontational start, Tony and Noel began meeting in the park to play football. Tony said: “After some while, though, it became apparent that Noel was starting to spend time up the trees. A strange place to sniff glue, I thought. Surely there was a danger of falling out. “Over the next three months, I would watch them all as slowly they fell out of the trees, one by one. It could be a ­dangerous spot for dog walkers.” Tony recalls that Noel – nicknamed Bostik – played football high on glue-sniffing with “that vacant look that a glue-sniffer develops. I looked back at our first meeting and thought he was a confused fella”. Noel was also part of the gang which followed Manchester City and scrapped with rival fans. On one away trip, Noel, Tony and ­others were confronted by a mob of angry Nottingham Forest supporters. Tony said: “I looked at Noel, who looked back terrified. ‘F*** this,’ he shouted and was gone, a vanishing Mancunian flash.” By the summer of 1990, Tony joined his three pals, Guigsy, Paul “Bonehead “ Arthurs and Chris “Huts” Hutton in a band called The Rain. Within a year, the band ditched Huts and brought in Noel’s brother Liam. Tony said: “He was a right handful. But if we were going to be a rock and roll band, that was exactly what we needed. “Although Liam had started to style himself on Ian Brown (lead singer with the Stone Roses) he could never be accused of not being his own man. “Liam had something about him. It might have been menacing and slightly evil but it was still something.” And within weeks, Liam showed his muscle by deciding he didn’t like the name The Rain, telling the band: “It’s a s*** name. Any ideas? No? Right, we’ll call ourselves Oasis.” The first outing of Oasis was at The Boardwalk club in Manchester in 1991 with Liam “extra menacing that evening”. Noel was in the ­audience and ­after the gig told his ­brother the band were “f*****g s***”. Liam decided to ­replace Guigsy with Noel. Tony said: “My first reaction was surprise. My second was to get angry. I reminded Liam that it was Guigs who had set up this outfit. “To Liam’s credit, he looked guilty and almost immediately backed down and apologised – unusual for him.” Tony agreed to Noel becoming lead guitarist. He said: “I thought I had made the best decision of my life and good times lay ahead. It was the best of ­decisions, the worst of decisions.” Most of the band were still ­having to clean cars to make ends meet when Liam was tricked into going to a house in posh Prestbury, Cheshire, thinking he was delivering an invoice. Manchester City fan Liam was unaware the home ­owner was the then-Manchester United player Mark Hughes – and the envelope contained a love letter. Mark – now Fulham manager – opened the letter which read: “I think I love you, I’m going to make you mine.” Tony said: “Mark Hughes laughed and turned the card to show him. Liam read the card in horror and then began to stammer that he had no feelings ­whatsoever for Mark.” But as Oasis’s fame increased the laughs got fewer – and the band Tony helped start was moving away from him. On the day he signed the first contract, he arrived drunk to read in “clear black ink” the names Noel Gallagher, Liam Gallagher, Paul McGuigan, Paul Arthurs – and Tony’s name added “in biro”. He said: “I couldn’t tell anyone that I just had a bad feeling about this, so I reluctantly scrawled my moniker.” Bad Tony only later realised the name Oasis was now owned by Noel and Liam. He said: “What’s more, it had given Noel the power to fire any member of the band he thought unfit for purpose.” Meanwhile Noel and Liam were ­becoming notorious for their drunken spats, including when they arrived at their first London gig in 1993. Tony said: “Noel screamed at Liam and threw a plastic chair in his direction. It seemed that Liam had started a trend for hurling plastic chairs. Noel looked around afterwards though to make sure that all the relevant music journalists had recorded the altercation.” As the band topped the charts in 1995 with Some Might Say, Tony was told he was being dropped. He denies the reason was a fight with Noel and says: “Noel was telling anyone who would listen how s*** I was at doing the thing I cared about so much. It was a cheap and easy shot and one that still hangs over me. Just lucky I’m not a sensitive soul.” Tony sued the band for £18 million but accepted an out-of-court settlement of £600,000. Oasis became one of the most successful acts in pop history with a string of hits including Wonderwall and Don’t Look Back In Anger. Last year Noel and Liam’s combined fortune was ­estimated at £52million. features@people.co.uk
{ "pile_set_name": "OpenWebText2" }
Introduction ============ The prevalence of diabetes mellitus is increasing worldwide with approximately half of all persons with diabetes living in Asia \[[@B1]\]. The herb fenugreek (*Trigonella foenum-graecum* L., Fabaceae family) is used both in cooking and for the treatment of diabetes in many parts of the world, especially in China, Egypt, India and Middle Eastern countries \[[@B2]-[@B4]\]. In low-income countries, individuals with diabetes often do not have access to appropriate medications due to a lack of financial resources \[[@B5]\]. Active compounds of fenugreek included soluble fiber \[[@B6]-[@B8]\], saponins \[[@B9],[@B10]\], trigonelle \[[@B11]\], diosgenin \[[@B12]\], and 4-hydroxyisoleucine \[[@B13],[@B14]\]. Hypoglycemic activities have mainly been attributed to dietary fiber \[[@B6],[@B7]\] and saponin \[[@B9]\]. Fenugreek is a widely used herbal medicine for diabetes, but its efficacy for glycemic control remains unclear. Animal studies have shown that fenugreek seed extracts have the potential to slow enzymatic digestion of carbohydrates, reduce gastrointestinal absorption of glucose, and thus reduce post-prandial glucose levels \[[@B8]\]. In addition, fenugreek stimulated glucose uptake in peripheral tissues \[[@B15]\] and had insulinotropic properties in isolated rat pancreatic cells \[[@B16]\]. In humans, fenugreek seeds acutely reduced postprandial glucose and insulin levels \[[@B17]-[@B20]\]. In addition, several longer-term clinical trials showed reductions in fasting and post-prandial glucose levels and glycated haemoglobin (HbA1c) \[[@B9],[@B21]-[@B23]\], but some trials did not show benefit \[[@B24],[@B25]\]. Systematic reviews that have evaluated the effect of various alternative therapies for diabetes included only a few clinical trials of fenugreek \[[@B26]-[@B29]\]. We therefore conducted a systematic review and meta-analysis of the effects of fenugreek on glucose homeostasis based on a comprehensive literature search leading to the identification of a reasonably large number of trials with an evaluation of potential explanations for differences in study results. Methods ======= Data sources and searches ------------------------- To identify articles on the effect of fenugreek on glucose homeostasis we searched MEDLINE (PubMed), SCOPUS, Web of Science, BIOSIS, and Cochrane Trials Registry from inception through Nov 29, 2013 using key search terms related to fenugreek ("fenugreek", "trigonella"), an experimental study design ("trial", "clinical trial", "intervention", "therapy"), to identify potentially relevant articles. The search strategy utilized both index terms and free text to search for synonyms of trigonella, fenugreek and diabetes/healthy subjects, and was limited to human studies. Grey literature such as conference proceedings, abstracts, dissertations and technical reports was identified using the same key terms through the electronic search engines Google Scholar, SCIRUS, CINAHL, and ProQuest. No language restriction was applied. The results (titles, abstracts and citations) of electronic searches were downloaded into EndNote software (EndNote X5, 2011, Thomson Reuters, Philadelphia) and initial screening for eligibility was performed by two independent reviewers (Nithya Neelakantan, Madanagopal Narayanan). When assessment of eligibility based on the title and abstract was insufficient, the full text of the articles was obtained. The second screening of those full text articles was then independently performed by at least two reviewers (Nithya Neelakantan, Madanagopal Narayanan, Rob M van Dam). Disagreements were resolved by consensus. The kappa for the inter-reviewer reliability was 0.78. Study authors were contacted to verify results and methodological quality of retrieved articles where necessary. We used the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) statement to report our findings \[[@B30]\]. Study selection --------------- We included clinical trials that compared single herb preparations of fenugreek in any dose or form with a control intervention that was either placebo or no treatment and evaluated effects on markers of glycemia \[fasting blood glucose, 2 hr postload glucose, glycosylated hemoglobin (% HbA1c) and/or fasting serum insulin levels\]. We excluded trials that used combination preparations of fenugreek with other herbs, non-human studies, observational studies, literature reviews/editorials/letters/case reports, and articles not reporting the outcomes of interest. We also excluded trials with interventions that lasted less than 7 days. The number of articles that did not meet the eligibility criteria and the reasons for their exclusion are shown in Figure [1](#F1){ref-type="fig"}. ![**Selection of trials for meta-analysis.** (Search was conducted to identify articles up to 29 Nov 2013).](1475-2891-13-7-1){#F1} Data extraction and quality assessment -------------------------------------- Details of trial design, study setting, population, randomization, blinding, sample size, duration of follow-up, participant characteristics, interventions, total daily dose and outcome characteristics were independently extracted by two reviewers (Nithya Neelakantan, Madanagopal Narayanan), using a standardized data extraction form. Differences in data extraction were resolved by a third reviewer (Rob M van Dam). The quality assessment was conducted using the CONSORT statement for herbal trials \[[@B31]\] by two reviewers (Nithya Neelakantan, Madanagopal Narayanan), with disagreements resolved by consensus. From each trial, data on mean and SD for all outcomes of interest were extracted. If trials reported fasting blood glucose and 2 hr postload glucose (glucose concentrations 2 hours after the start of the oral glucose tolerance test) in units of mg/dL, this was converted to the standardized international unit \[[@B32]\] of mmol/L by multiplying the glucose values in mg/dL by 0.0555; for fasting serum insulin, we divided the serum insulin values reported in pmol/L by 6.945 and reported the results in mU/L. Parallel trials generally reported the baseline mean and standard deviation and follow-up mean and standard deviation, but not the standard deviation (SD) of change for the intervention and control groups. For parallel trials, the net changes in each outcome measure were calculated as the change in the intervention group minus the change in the control group. For crossover trials, net changes in the outcome measures were calculated as the value of the outcome measure at the end of the intervention period minus the value of the outcome measure at the end of control period. We estimated the SD of the change on the basis of reported p values for differences in means, if available \[[@B33]\]. We used the p-values cutoff if it was only reported that a p-value was below a threshold (e.g., 0.05 if p \< 0.05 was reported) leading to conservative estimates \[[@B34],[@B35]\]. If p-values were not reported, we imputed SD of the change by using a pooled correlation coefficient between baseline and final measurements from a meta-analysis of correlation coefficients from those trials reporting sufficient data. We derived correlation coefficients for individual trials according a standard formula \[[@B33]\] and we then imputed these correlations into the meta-analysis as transformed z scores (±SEs) to estimate the pooled correlation coefficient \[[@B36]\]. For HbA1c and fasting serum insulin measures, due to small number of trials, we estimated the SDs of the change assuming a conservative 0.5 correlation and performed a sensitivity analysis assuming alternative values of 0.25 or 0.75. To investigate the effect of imputed within-person correlation coefficients, we performed sensitivity analyses with a range of correlation coefficients (0.25, 0.50 and 0.75) \[[@B37]\], the pooled estimates did not change substantially. Meta-analysis ------------- The meta-analysis was performed according to the methods described by Curtin et al. \[[@B38]\]. In the combined design meta-analysis, the pooled estimate of treatment effect combining parallel and crossover trial results was the weighted sum of the separate treatment effects estimated, respectively, from parallel and crossover trials divided by the sum of the associated weights. We anticipated large differences in the fenugreek drug preparation format, active components/chemical composition, administration of supplements, and dosages as well as variation in the study population and study design. Therefore, we *a priori* decided to use a random effects model for this meta-analysis. Hence, for each outcome measure, weighted mean differences and corresponding 95% confidence intervals (CI) were calculated by using DerSimonian and Laird random-effects models. We also conducted separate meta-analyses for parallel and crossover trials for the primary outcome measures, fasting blood glucose, and 2 hr post prandial glucose. Heterogeneity in study results was tested by using the Cochran *Q* statistic (and associated p value), and was quantified by the *I*^2^ statistic. The *I*^*2*^ provides an estimate of the percentage of variation in study results that is explained by between-study heterogeneity rather than sampling error \[[@B39]\]. Potential sources of heterogeneity were investigated using *a priori* defined stratified analyses by study design (parallel or crossover), daily dose of fenugreek extract (\<5 g, 5--10 g or \>10 g), study duration (\<30 days or \> =30 days), randomization (yes or no), blinding (yes or no), baseline BMI (\<25 or \> =25 kg/m^2^), study precision (SE of the effect estimate above or below the median), geographical region (India vs. other countries) and age (above or below the median mean age of all studies). Meta-regression analyses were used to assess the significance of differences in the effects of fenugreek between strata. p-values for the overall F-test for a common mean amongst three or more groups were obtained using one way ANOVA. Publication bias was investigated by visual inspection of funnel plots and by the Egger regression test and the Begg adjusted correlation test \[[@B40]\]. The robustness of the findings of the meta-analysis to different assumptions were examined in a sensitivity analysis using both fixed and random effects models, in which the meta-analysis estimates were computed omitting one trial at a time to assess the influence of each individual trial \[[@B41]\]. All tests were two-sided and p \<0.05 was considered statistically significant. The data were analyzed by using Stata version 11 (StataCorp, College Station, Texas). Results ======= Search results -------------- We identified 161 potentially relevant articles and screened the abstracts for eligibility. The flow of trial selection is reported in Figure [1](#F1){ref-type="fig"}. We evaluated 32 full text articles in detail. Nine articles reporting 10 trials met the inclusion criteria for the meta-analysis. Of these 10 trials, one trial \[[@B42]\] reported results separately for participants with mild and severe type 2 diabetes, and thus 11 data points are presented in Table [1](#T1){ref-type="table"}. Five of these had a parallel design and six had a crossover design. ###### Characteristics of the 10 trials (11 data points) included in the meta-analysis of the effects of fenugreek seeds on glycemia **Lead author, year and country** **Population, medication** **Design** **Age, y** **Male (%)** **Sample size, N** **Duration, days** **Fenugreek, preparation** **Daily dose, g** **Control** **Outcomes** **Study quality** ------------------------------------------- ---------------------------- ------------ ------------ -------------- -------------------- -------------------- ---------------------------- ------------------- ------------- ------------------------------- ------------------- ---- ----- Bordia et al., 1997 \[[@B42]\], India Mild T2DM, NR PL NR NR 40 30 Capsule, PS 5 Placebo FBG, 2 hr glucose NR NR NR Bordia et al., 1997 \[[@B42]\], India Severe T2DM, NR PL NR NR 40 30 Capsule, PS 5 Placebo FBG, 2 hr glucose NR NR NR Chevassus et al., 2010 \[[@B43]\], France Overweight, NR PL 38.0 100 40 42 Capsule, H 1.176 Placebo FBG, FSI Yes DB 5% Gupta et al., 2001 \[[@B23]\], India T2DM, SU, BI PL 51.0 76 25 56 Capsule, H 1 Placebo FBG, 2 hr glucose, HbA1c, FSI Yes DB 4% Lu et al., 2008 \[[@B9]\], China T2DM, SU PL 54.4 55 69 84 Capsule, PS 6.3 Placebo FBG, 2 hr glucose, HbA1c Yes DB NR Alamdari et al., 2009 \[[@B17]\], Iran T2DM, Diet, OAD CO 43.1 100 12 56 PS 8 Unspecified FBG, 2 hr glucose, HbA1c Yes NR 25% Chevassus et al., 2009 \[[@B25]\], France Healthy, NR CO 22.0 100 12 14 Capsule, H 1.176 Placebo FBG, FSI Yes DB 0% Raghuram et al., 1994 \[[@B7]\], India T2DM, BI CO 46.6 NR 10 15 Chapati^a^, PS 25 Chapati FBG, 1 hr glucose, HbA1c Yes NR NR Sharma et al., 1990 \[[@B44]\], India T1DM, Insulin therapy CO 22.7 70 10 10 Chapati^a^, DPS 100 Chapati FBG, 2 hr glucose, FSI Yes NR NR Sharma et al., 1990 \[[@B22]\], India T2DM, BI/metformin CO 46.0 67 15 10 Chapati^a^, DPS 100 Chapati FBG, 2 hr glucose, FSI Yes NR NR Sharma et al., 1990 \[[@B22]\], India T2DM, NR CO 42.0 NR 5 20 Chapati^a^, DPS 100 Chapati FBG, 2 hr glucose Yes NR NR *Abbreviations*: *NR* not reported, *T1DM* type 1 diabetes mellitus, *T2DM* type 2 diabetes mellitus, *SU* sulfonylurea, *BI* biguanides, *OAD* oral antidiabetic drug, *PL* parallel, *CO* crossover trials, Daily dose, *g* fenugreek total daily dose in grams, *PS* powdered fenugreek seeds, *H* Hydro-alcoholic extract of fenugreek seeds, *DPS* Debitterized fenugreek seed powder, *FBG* fasting blood glucose, *HbA1c* % glycosylated hemoglobin, *FSI* fasting serum insulin, *RCT* randomized control trial, *DB* double blinded, ^a^Fenugreek incorporated into chapati (unleavened bread). Trial characteristics --------------------- The mean age of participants in the trials ranged from 22.0 to 54.4 years (median: 43.1 y), and the median percentage of males was 76%. Most trials included participants with type 2 diabetes treated with diet or oral anti-diabetic medication (Table [1](#T1){ref-type="table"}). One trial was conducted in persons with type 1 diabetes and two trials included overweight or non-overweight participants without diabetes. The sample size ranged from 5 to 15 participants for crossover trials and from 25 to 69 participants for parallel trials. The sample size for all trials combined was 278. The daily dose of fenugreek seed ranged from 1 g to 100 g (median: 25 g), and the study duration from 10 to 84 days (median: 30 days). Fenugreek supplements were administered as powdered fenugreek seeds, debitterized powdered fenugreek seeds, or hydro-alcoholic seed extract either in form of capsules or as an ingredient of unleavened bread. These were provided in equal doses 2 to 3 times per day. All 10 trials \[[@B7],[@B9],[@B17],[@B22],[@B23],[@B25],[@B42]-[@B44]\] (11 data points) reported fasting blood glucose, 7 trials \[[@B7],[@B9],[@B17],[@B22],[@B23],[@B42],[@B44]\] (8 data points) reported 2 hr glucose, 5 trials \[[@B22],[@B23],[@B25],[@B43],[@B44]\] reported fasting serum insulin and 3 trials \[[@B9],[@B17],[@B23]\] reported HbA1c. With regard to study quality, one trial \[[@B42]\] did not report whether groups were randomized, none of the trials reported details on the method of randomization or allocation concealment, and most trials \[[@B7],[@B17],[@B22],[@B42],[@B44]\] did not report the blinding status. Only four trials reported the percentage of drop-outs \[[@B17],[@B23],[@B25],[@B43]\]. Of which three studies \[[@B23],[@B25],[@B43]\] have reported low percentage drop-out ranging between 0 to 5% and one study \[[@B17]\] has reported 25% drop-out. These subjects were not included in the statistical analyses that were conducted for the primary studies. Most trials provided information on the concentration of components of the used fenugreek preparations. Reported components included diosgenine, saponins, trigonelline (1.4%) and 4-hydroxyisoleucine (1.5%) for the hydro-alcoholic extract \[[@B25],[@B43]\]; alkaloids, carpaine, erythricine, trigonelline, meletin, and saponins for powdered fenugreek seeds \[[@B22],[@B44]\]; and lipids (0.1%), protein (28.3%), starch (6.5%), total fiber (51.7% \[gum 19.2%\]) for debitterized fenugreek seeds \[[@B22],[@B44]\]. Effect on glucose homeostasis ----------------------------- ### Fasting blood glucose All 10 trials (11 data points) were included in the meta-analysis of fasting blood glucose. The individual trial results and the pooled estimates by trial designs are shown in Figure [2](#F2){ref-type="fig"}. Based on the overall pooled estimate, fenugreek significantly reduced blood glucose levels as compared with control treatments (pooled mean difference = -0.96 mmol/l; 95% CI: -1.52, -0.40; p = 0.001). There was large heterogeneity in study results (I^2^ = 80%; p \< 0.001). There were no significant differences in the effects of fenugreek on fasting glucose by study design, study duration, geographical region, mean age and mean BMI of the study population (Table [2](#T2){ref-type="table"}). However, the effect of fenugreek on fasting blood glucose differed significantly by diabetes status with substantial effects in persons with type 1 diabetes and type 2 diabetes, but not in persons without diabetes. There was a large variation in the dose of fenugreek used ranging from 1 g per day to 100 g per day of fenugreek seeds. The effect size differed significantly by the dose of fenugreek used suggesting no effects for the studies using low doses (\<5 g/day) and greater effects with higher doses of fenugreek. Effects of fenugreek on fasting glucose also differed by preparation method of the fenugreek supplement. Studies using debitterized fenugreek powdered showed the greatest reduction in glucose levels, but these were mostly the same trials that administered the highest dose of fenugreek. Similarly, the trials using a hydro-alcoholic extract were the same trials that used the lowest dose. Heterogeneity in effects on fasting glucose was partly explained by fenugreek dose (I^2^~residual~ = 69%; adjusted R^2^ = 47%), fenugreek preparation method (I^2^~residual~ = 38%; adjusted R^2^ = 83%), and diabetes status of the study population (I^2^~residual~ = 55%; adjusted R^2^ = 61%). ![**Forest plot of the effect of fenugreek on fasting blood glucose.** The effects in individual trials are depicted as open squares with 95% confidence intervals (CIs). Pooled estimates with 95% CIs are depicted as open diamonds.](1475-2891-13-7-2){#F2} ###### Stratified meta-analyses of the effects of fenugreek on fasting blood glucose and 2 hour postload glucose according to trial and participant characteristics **Characteristics** **Fasting blood glucose** **2 hr-postload glucose** ---------------------------- --------------------------- --------------------------- ------------- --------- ------- ---- ---------------------- ------------- ------- ------ Overall 11 -0.96 (-1.52, -0.40) 80 (65, 89) \<0.001   8 -2.19 (-3.19, -1.19) 71 (40, 86) 0.001   Study design                       Parallel 5 -0.78 (-1.93, 0.37) 86 (69, 94) \<0.001 0.48 4 -1.71 (-2.73, -0.70) 59 (0, 86) 0.07 0.33   Crossover 6 -1.20 (-2.03, -0.38) 77 (49, 90) 0.01   4 -3.32 (-5.90, -0.75) 82 (54, 93) 0.001 Region                       India 7 -1.43 (-2.26, -0.60) 48 (0, 78) 0.07 0.21 6 -2.60 (-4.06, -1.13) 73 (39, 88) 0.002 0.50   Others 4 -0.55 (-1.25, 0.16) 89 (75, 95) \<0.001   2 -1.59 (-3.08, -0.10) 74 (0, 94)   Study precision^a^                       Below median 5 -0.54 (-1.15, 0.07) 86 (69, 94) \<0.001 0.10 4 -1.55 (-2.52, -0.57) 67 (2, 89) 0.03 0.11   Above median 6 -1.68 (-2.62, -0.74) 43 (0, 77) 0.12   4 -3.42 (-5.56, -1.28) 67 (4, 89) 0.03   Study population^b^                       Healthy 2 0.05 (-0.51, 0.61) 82 (23, 96) 0.02   \- \- \- \-     T1DM 1 -4.20 (-6.73, -1.67) \- \- 0.01 1 -3.20 (-6.92, 0.52) \- \- 0.79   T2DM 8 -1.21 (-1.69, -0.73) 26 (0, 67) 0.22   7 -2.14 (-3.19, -1.09) 74 (45, 88) 0.001   Randomization                       Yes 9 -0.94 (-1.56, -0.32) 83 (69, 91) \<0.001 0.83 6 -2.54 (-3.87, -1.21) 73 (37, 88) 0.003 0.49   Unknown 2 -1.11 (-2.10, -0.12) 0 (0, 100) 0.49   2 -1.58 (-3.61, 0.45) 81 (17, 95) 0.02   Blinding status                       Double-blinded 4 -0.44 (-1.22, 0.34) 88 (72, 95) \<0.001 0.15 2 -1.95 (-3.02, -0.88) 16 (0, 55) 0.28 0.74   Unknown 7 -1.37 (-2.08, -0.67) 47 (0, 78) 0.08   6 -2.43 (-3.82, -1.04) 78 (50, 90) 0.000   Daily dose (grams)^b^                       \<5 3 0.02 (-0.46, 0.50) 63 (0, 89) 0.07   1 -1.34 (-2.83, 0.14) \- \-     5-10 4 -1.27 (-1.80, -0.74) 21 (0, 88) 0.28 0.01 4 -1.55 (-2.52, -0.57) 67 (2, 89) 0.04 0.02   \>10 4 -2.07 (-3.58, -0.55) 68 (9, 89) 0.02   3 -4.42 (-5.96, -2.89) 8 (0, 35) 0.58   Preparation^b^                       Powdered seed 5 -1.12 (-1.63, -0.61) 29 (0, 72) 0.23   4 -1.55 (-2.52, -0.57) 67 (2, 89) 0.03     Hydro-alcoholic extract 3 0.02 (-0.46, 0.50) 63 (0, 89) 0.07 0.002 1 -1.34 (-2.83, 0.14) \- \- 0.05   Debitterized seed powder 3 -2.68 (-3.82, -1.54) 0 (0, 90) 0.42   3 -4.42 (-5.96, -2.89) 0 (0, 90) 0.58   Study duration (days)                       \<30 5 -1.48 (-2.64, -0.32) 80 (52, 91) 0.001 0.39 3 -4.42 (-5.96, -2.89) 8 (0, 35) 0.58 0.02   \> = 30 6 -0.78 (-1.68, 0.11) 83 (65, 92) \<0.001   5 -1.49 (-2.28, -0.70) 55 (0, 84) 0.06   Mean Age (years)                       \<43.1 4 -0.73 (-1.61, 0.16) 86 (67, 94) \<0.001   2 -4.14 (-5.80, -2.47) 0 (0, 100) 0.58     \> = 43.1 5 -1.11 (-1.76, -0.47) 45 (0, 80) 0.12 0.60 4 -1.90 (-3.19, -0.61) 67 (4, 89) 0.03 0.21 Mean BMI (kg/m^2^)                       \<25 3 -1.62 (-3.21, -0.02) 93 (82, 97) \<0.001 0.29 2 -2.52 (-3.75, -1.30) 0 (0, 100) 0.71 0.17   \> = 25 3 -0.19 (-1.14, 0.76) 74 (12, 92) 0.02   2 -1.01 (-1.72, -0.30) 0 (0, 100) 0.62   *Abbreviations*: *BMI* body mass index, *CI* confidence interval, *P*~*hetr*~ p value for heterogeneity, *P*~*EM*~ p value for effect modification. ^a^The cutoffs are based on the median of standard error of the effect size for fasting blood glucose and 2hr glucose respectively; For mean age and study duration, the cutoffs are based on the median values of 11 data points. ^b^P~EM~-value for the overall F-test for a common mean amongst the three groups (i.e., study population, and fenugreek drug preparation format), the overall p-value for daily dose was obtained by modeling this as a continuous variable in meta-regression analysis. The funnel plot for effects of fenugreek on fasting blood glucose by study precision appeared to be asymmetrical (Additional file [1](#S1){ref-type="supplementary-material"}: Figure S1, Begg test, p = 0.10) and the Egger test was significant (p = 0.03) suggesting potential publication bias. However, these tests are based on detecting an association between study precision (lower SE of effect estimates) and effect size. Less precise studies also tended to use a greater dose of fenugreek (r = 0.51 between dose and SE of the effect estimates) and we could therefore not distinguish between potential publication bias and the dose of fenugreek used. ### 2 hr glucose Seven trials (8 data points) reported effects of fenugreek on 2 hr glucose values. Forest plots of 2 hr glucose effects in individual trials and the pooled analyses are shown in Figure [3](#F3){ref-type="fig"}. Meta-analysis of the trials yielded a pooled estimate for the effect of fenugreek on 2 hr glucose of -2.19 mmol/l (95% CI: -3.19, -1.19, p \<0.001). There was large heterogeneity in study results (I^2^ = 71%; p = 0.001). Stratified analyses of effects of fenugreek on 2 hr glucose according to study characteristics are presented in Table [2](#T2){ref-type="table"}. As observed for fasting glucose, a higher dose was associated with greater effects on 2 hr glucose concentrations. We also observed stronger effects for trials with study duration less than 30 days than for trials with a longer duration and for trials that administered debitterized fenugreek seed powder than for trials using other fenugreek preparations. However, the trials of short duration that used debitterized fenugreek powder were the same three trials that administered a substantially higher dose of fenugreek than the other trials. Heterogeneity in effects of fenugreek on 2 hr glucose was partly explained by fenugreek dose (I^2^~residual~ = 42%; adjusted R^2^ = 72%) and fenugreek preparation method (I^2^~residual~ = 50%; adjusted R^2^ = 61%). The funnel plot for 2 hr glucose data appeared to be asymmetrical (Additional file [1](#S1){ref-type="supplementary-material"}: Figure S2, Begg test, p = 0.05) and the Egger test (p = 0.03) also provided evidence for publication bias. Again, less precise studies also tended to use a greater dose of fenugreek (r = 0.54 between dose and SE of the effect estimates) and we could not distinguish between potential publication bias and the dose of fenugreek used. ![**Forest plot of the effect of fenugreek on 2 hour postload glucose.** The effects in individual trials are depicted as open squares with 95% confidence intervals (CIs). Pooled estimates with 95% CIs are depicted as open diamonds.](1475-2891-13-7-3){#F3} ### Other outcome measures (HbA1c and fasting serum insulin) Three trials (2 parallel and 1 crossover trial) reported the effects of fenugreek on HbA1c. Fenugreek significantly reduced HbA1c values as compared with control treatment (pooled mean difference -0.85%; 95% CI: -1.49%, -0.22%, p = 0.009) (Additional file [1](#S1){ref-type="supplementary-material"}: Figure S3) without significant heterogeneity in study results (I^2^ = 0%; p = 0.78). Five trials reported fasting serum insulin concentrations. However, fasting insulin may have been affected by exogenous insulin use in persons with type 1 diabetes and fasting insulin values had a strongly skewed distribution in persons with type 2 diabetes. Therefore, we only included two trials \[[@B25],[@B43]\] in persons without diabetes in our meta-analysis of the effects of fenugreek on fasting insulin. The pooled effect of fenugreek on fasting serum insulin was not statistically significant (pooled mean difference = -1.42 mU/L; 95% CI: -3.04, 0.19 mU/L; p = 0.08) (Additional file [1](#S1){ref-type="supplementary-material"}: Figure S4). Heterogeneity for effects on fasting insulin was substantial, but not statistically significant (I^2^ = 62%; p = 0.10). Subgroup analyses were not performed for HbA1c and fasting serum insulin because of the limited number of trials for these outcomes. Sensitivity analyses -------------------- We conducted a sensitivity analysis excluding the trial that did not report randomization status. This exclusion had little effect on the pooled effect on fasting blood glucose (-0.94; 95% CI: -1.56, -0.32) or 2 hr glucose (-2.54; 95% CI: -3.87, -1.21). We also conducted sensitivity analyses for the effects of fenugreek on fasting blood glucose and 2 hr glucose concentrations omitting one study at a time. None of the individual trials dramatically influenced pooled effect estimates, which ranged from -0.78 mmol/l (95% CI: -1.31, -0.25) to -1.20 (95% CI: -1.85 to -0.56) for fasting blood glucose and from -1.79 mmol/l (95% CI: -2.69, -0.90) to -2.52 (95% CI: -3.64 to -1.39) for 2 hr glucose. We also conducted sensitivity analyses with simultaneous exclusion of trials conducted by the same researchers. The three trials reported by Sharma et al. \[[@B22],[@B44]\] had a much larger dose of fenugreek than the other trials and also the lowest precision. In a sensitivity analysis that excluded these trials, the pooled effect on fasting blood glucose (-0.62 mmol/l, 95% CI: -1.14, -0.10) and 2 h glucose (-1.49 mmol/l, 95% CI: -2.28, -0.70) remained statistically significant. We also conducted a sensitivity analysis after excluding the Chevassus trials (\[[@B25],[@B43]\]) that were the only trials in persons without diabetes, used a low dose, and had the largest precision. After exclusion of these studies, the pooled effect estimate for fasting glucose was larger (-1.35 mmol/L; 95% CI: -1.92, -0.74). Adverse effects --------------- Chevassus et al. reported 2 cases of specific urine smell and 1 case of abdominal pain in one trial \[[@B25]\] and 4 cases of mild gastrointestinal symptoms, and 1 case of specific urine and sweat smell in both the treatment group and the control group in their other trial \[[@B43]\]. Of the 12 participants in the treatment group in the study by Gupta et al. \[[@B23]\], 5 developed dyspepsia and mild abdominal distention for the first few days of therapy. This subsided on continuation of the therapy. No renal or hepatic side effects were reported and there were no withdrawals due to the side effects. Lu et al. \[[@B9]\] reported that 2 out of 46 participants of the treated group suffered from stomach discomfort and nausea, and one from diarrhea during the treatment period. These symptoms disappeared after 2 day drug withdrawal without special treatment. No adverse reaction was found after the treatment resumed and all participants finished the trial. Discussion ========== In our meta-analysis of 10 clinical trials, intake of fenugreek seeds resulted in a significant reduction in fasting blood glucose, 2 hr glucose, and HbA1c. However, we observed substantial heterogeneity in study results. Differences in the diabetes status of participants and the large variation in dose of fenugreek seed extract used and type of preparation appeared to be contributors to variation in study results. No major harmful side effects of fenugreek were reported in all included studies. We only found a significant reduction in glucose parameters for trials that administered medium to high doses (≥5 g) of fenugreek seed powder and not for trials that administered low doses (\< 2 g) of hydro-alcoholic extracts. Medium to high doses (range: 5--25 g) of fenugreek seed powder also lowered postprandial glucose levels in acute studies \[[@B6],[@B18],[@B19],[@B21],[@B45],[@B46]\]. Lower doses, as used in three of the trials in our meta-analyses, were not evaluated in acute studies of fenugreek. The mechanisms by which fenugreek may lower blood glucose levels have not been well established in humans. Acute hypoglycemic effects of fenugreek seeds and its extract have been evaluated in individuals with and without diabetes \[[@B18],[@B22],[@B44]\]. Whole fenugreek raw seeds, extracted seed powder, cooked seeds (25 g) and gum isolate of seeds (5 g) decreased postprandial glucose levels, whereas degummed seeds (25 g) showed little effect \[[@B18]\]. These findings suggest that acute effects of fenugreek seeds are mainly due to the gum fraction, but do not exclude a longer term effect of other fenugreek components on glycemia. Animal studies also indicate that the soluble fiber fraction of fenugreek seeds reduces the rate of enzymatic digestion and the absorption of glucose from the gastrointestinal tract \[[@B8]\]. However, data from other studies suggest an effect of other fenugreek components on glucose homeostasis. In diabetic rats, trigonelline ingestion increased insulin sensitivity and reduced blood glucose levels \[[@B47]\]. In addition, a novel amino acid derivative extracted from fenugreek seeds, 4-hydroxyisoleucine, stimulated glucose-dependent insulin release in isolated rat and human pancreatic islet cells \[[@B14]\]. In a trial of acute effects in healthy volunteers, trigonelline reduced the early glucose response during an OGTT \[[@B48]\]. The only previous meta-analysis of the effects of fenugreek on glycemia included only two clinical trials as compared with 10 in the current meta-analysis \[[@B26]\]. Strengths of our study included the comprehensive literature search leading to the identification of a reasonably large number of trials and a detailed analysis of potential sources of heterogeneity in study results. Our study also has several limitations that need to be considered in the interpretation of the results. First, the quality of the included trials was generally poor. None of the trials reported the methods of randomization or allocation concealment, and only a few trials provided information on blinding status and drop-out rates. In addition, with some exceptions \[[@B9]\] it was unclear whether other diabetes medication remained constant during the trial. Most of the included crossover trials did not test the carryover effect or report a washout period. However, we did not find a difference in results between parallel and cross-over trials suggesting that carryover effects did not substantially affect the results. Second, tests for publication bias suggested that such bias may have been present. Tests for publication bias are based on detecting differences in effect sizes by study precision with a greater effect size for less precise (\'smaller') studies suggesting the presence of publication bias. In our meta-analysis less precise studies were also more likely to use larger doses of fenugreek. Differences in dose are thus a possible alternative explanation for the observed \'small study effect', but we were unable to distinguish between the effects of dose and publication bias on effect sizes. Finally, we only found a significant effect on glycemia for powdered fenugreek seeds and our findings do not apply to other forms of fenugreek and may differ for other strains as a result of natural variation in active ingredients. Our systematic review and meta-analysis suggest that fenugreek seeds may contribute to better glycemic control in persons with diabetes mellitus with a similar magnitude of effect as intensive lifestyle \[[@B49]\] or other pharmaceutical treatment added to standard treatment \[[@B50]\]. Fenugreek is widely available at low cost and generally accepted in resource poor countries such as India and China where a large proportion of persons with diabetes in the world reside. Therefore, fenugreek may be a promising complementary option for the clinical management of diabetes. The previously reported lipid lowering effect of fenugreek may be an additional benefit \[[@B19],[@B44],[@B51]\]. However, given the limited quality of the included trials and potential for publication bias, a larger double blind randomized trial should be conducted according to rigorous standards for herbal interventions \[[@B31]\] with an appropriate randomization procedure, an adequate method of allocation concealment and transparent reporting of these methods. The fenugreek herbal product must be standardized and tested for the composition and can be administered in the form of capsules with a recommended dose of at least 5 g per day. In order to provide more conclusive evidence on the benefit of fenugreek for glucose homeostasis, a trial in at least 100 (50 subjects in each of the study arms) persons with diabetes is warranted. The duration should preferably be at least three months to be able to evaluate effects on HbA1c levels and given the longer duration a parallel trial appears most appropriate. Competing interest ================== The authors declare that they have no competing interest. Authors' contributions ====================== NN, MN and RMvD contributed to the conception and design of the study. NN and MN conducted the literature search and data extraction. NN performed the statistical analyses. NN and MN drafted the manuscript. RMvD supervised the study. NN, RJD and RMvD contributed to the interpretation of data and critically revised the manuscript for important intellectual content. All authors gave final approval. NN and RMvD are the guarantors of this work and, as such, had full access to all the data in the study and take responsibility for the integrity of the data and the accuracy of the data analysis. Supplementary Material ====================== ###### Additional file 1: Figure S1 Funnel plot for effect of fenugreek on fasting blood glucose. The solid line represents the pooled effect estimate expressed as the weighted mean difference and the dashed lines represent pseudo-95% confidence limits. **Figure S2.** Funnel plot for effect of fenugreek on 2 hour postload glucose. The solid line represents the pooled effect estimate expressed as the weighted mean difference and the dashed lines represent pseudo-95% confidence limits. **Figure S3.** Forest plot of the effect of fenugreek on HbA1c. The effects in individual trials are depicted as open squares with 95% confidence intervals (CIs). The pooled estimate with 95% CI is depicted as an open diamond. **Figure S4.** Forest plot of the effect of fenugreek on fasting serum insulin. The effects in individual trials are depicted as open squares with 95% confidence intervals (CIs). Pooled estimate with 95% CI is depicted as an open diamond. ###### Click here for file Acknowledgements ================ This work was supported by Saw Swee Hock School of Public Health, National University of Singapore. Funding ======= Saw Swee Hock School of Public Health, National University of Singapore.
{ "pile_set_name": "PubMed Central" }
Scott Reynolds Scott Reynolds may refer to: Scott Reynolds (singer), punk rock vocalist with the band All from 1989-1993 Scott Reynolds (writer), television writer
{ "pile_set_name": "Wikipedia (en)" }
Q: jQuery code works in jsFiddle, but not on my site I've written a script for a login that creates a username by concatenating first + last name (on blur), removing whitespaces and removing special characters. Everything works fine in jsFiddle, but not on my site - I get 3 times error '$str' is not defined - so my guess is that the replace function on line 5 + 10 isn't fired. Any ideas what's wrong? http://jsfiddle.net/Hxjyy/2/ The code: jQuery().ready(function() { jQuery('#firstname').blur(function() { var $login = jQuery('#firstname').val().toLowerCase()+jQuery('#firstname').val().toLowerCase(); $login = $login.replace(/\s/g, ""); $login = replaceChars($login); jQuery("#login").val($login); }); jQuery('#lastname').blur(function() { var $login = jQuery('#firstname').val().toLowerCase()+jQuery('#lastname').val().toLowerCase(); $login = $login.replace(/\s/g, ""); $login = replaceChars ($login); jQuery("#login").val($login); }); function replaceChars($str) { var charMap = { é:'e',è:'e',ë:'e',ê:'e',à:'a', ç:'c',á:'a',ö:'o' }; var str_array = $str.split(''); for( var i = 0, len = str_array.length; i < len; i++ ) { str_array[ i ] = charMap[ str_array[ i ] ] || str_array[ i ]; } $str= str_array.join(''); return($str); } }); A: I just discovered that the problem was caused by the special characters in the replaceChars function - if I replace them with the Javascript entities like \u00EB it works fine...
{ "pile_set_name": "StackExchange" }
Play testing Rock Band’s challenging new play modes. You know, challenging — kind of like music. Alli Thresher, community moderator, and Jessa Brezinski, intern. What Harmonix has achieved with Rock Band, and their original Guitar Hero, is remarkable. At their core, these games are descended from arcade rhythm games, reducing music to simple coordination of a few buttons. Yet numerous studies and anecdotal evidence suggest that, in an age in which recording has made musical experience passive for many, the fantasy of holding a plastic instrument is enough to convince people to explore music making again. Rock Band’s collaborative gameplay has people singing and playing again, karaoke style, and more than a few gamers have decided to graduate to real instruments and lessons. Don’t be surprised to walk into a Best Buy and see instruments and pro audio tech in the aisle next to Xbox 360 and PlayStation 3. The genius of Harmonix is that music is again entertainment, not specialization. What people may not realize is that designing these games is hard. The illusion of simplicity, the experience of fun – these are some of the most daunting challenges in design, period. So what happens when Rock Band evolves beyond mere rhythm game? John Drake of Harmonix colorfully sums up the spirit of the new, real-transcription Pro game: “Good luck on that solo, asshole.” Ramping up the difficulty of a game to real music was a transformative design challenge. We go behind the scenes to hear how Harmonix approached it, what it means for how music works, and what it can mean for your music — or the next time you want to use a game with friends to hone your musical chops. Emeen Zarookian, sound designer. I’m not sure what happened just before this shot was taken, though it does appear he was just p0wned on Crazy Train. Use your imagination. A New Game Rock Band 3, released today, introduces new instruments and new play modes that blur the line between rhythm game and musical exercise. The hardware inputs are now actual MIDI controllers. A new guitar, the US$150 Fender Mustang Pro, uses around 100 buttons to allow real chord fingering positions – minus the callouses. A new keyboard features two octaves, velocity sensitivity, and touch controls. The guitar and keyboard each have standard MIDI DIN output feature extensive mappings of even the Xbox buttons onboard to MIDI control changes and custom MIDI assignments. A MIDI adapter lets you use your own MIDI hardware. (Ironically, this puts the Mad Catz-built hardware ahead of many supposedly “pro” sub-$100 devices, which now have only USB connections. CDM will have a detailed hands-on with information on how to make use of that MIDI controller in a separate article.) Accordingly, “Pro Mode” songs feature more extensive transcriptions; learning them is tantamount to simply learning the music. Chords are real chords, and, while reduced to an octave or so, the keyboard parts really are what’s in the song. Needless to say, the presence of a keyboard also opens the floodgates to properly providing keyboard music in the game, from Elton John to John Lennon. To understand how these changes came about, we have an epic interview with some of the folks at Harmonix. Even if you’re not a music gamer, there’s plenty of reason to pay attention: what they have to say could be relevant to getting your music to a wider audience, and many of the design considerations reveal insights into how people process musical information visually. And if you are a musician and gamer, you may finally have found a music game you can share with non-musicians without dumbing down your playing. Speaking to CDM: Daniel Sussman, Rock Band 3 project leader, John Drake, program manager of the Rock Band Network, and Matt “Nord” Nordhaus, senior producer for Rock Band Network. (RBN allows musicians to author their own content for the game and distribute it to players.) Beyond Rhythm Games CDM: We know already that your games have turned people on to music, and now it seems Rock Band 3 bridges some of the gulf between game and music. What does that mean for the evolution of Rock Band? John: From my perspective, it’s certainly opened up a whole new angle to approach people who aren’t rhythm gamers. And as rhythm gamers, people who laugh at Expert guitar charts and say, I can five-star this on a five-button guitar, no problem, like Harmonix are wusses. And I’m like, okay, now you have [Ozzy Osborne's] Crazy Train on expert, so, good luck on that solo, asshole. Daniel: Rock Band 3 is welcoming and doesn’t take into consideration any kind of musical background or education. As it relates to a feature set, we really look at making our game musical, but also fun and crazy interactive. What’s unique about the Rock Band Network aspect is that the RBN experience is not really so much a game – it’s more of a pipeline that musicians can use to get their content, their songs into the Rock Band world. If you think about the musical community out there, the ecosystem is really a way into that musical community. You have a game that appeals to a non-musician, they play the game, they have fun, maybe they take a greater interest in music. They use the game to learn how to play guitar or drums, to appreciate music. They start writing their own music, and then put that into the game world for other people to play and interact with. It’s a kind of funny thing. I don’t think it was totally intentional – the idea that Rock Band would get to the point where you’re able to play the game on controllers that then you can plug into your laptop to make music and then use that same laptop to do all the game authoring and then put that back into Rock Band. That was sort of where we ended up, and it’s great because it all works really well together, but it speaks to the ambition of the studio. Do you have a sense of what will happen as these new hardware inputs make their way into gamers hands? I guess you have to wait and see. Daniel: We’re very excited to see what happens. If you read a lot of the statements we’ve made about the ambition for Rock Band Pro, part of it was to draw a deeper connection to the music. Another part of it, really, was to provide a new gameplay experience to an audience of gamers that had been playing the same game for five years on the guitar, or three years on the drums. Really the problem we had to solve was, how can we reinvigorate the category? How can we give these gamers something new to play? And how can we continue to challenge the music gamer in a way that doesn’t just involve the content? Can we build gameplay around something new and unique, and then use that to drive the progression of the franchise? What’s been interesting is that we get these hardcore gamers who are the cream of the crop in the Rock Band world, they can beat every song on Expert the day it comes out. And then we sit them down with the Pro guitar, and we say, alright hotshot, you probably want to start on easy. I know that’s a novel concept to you know, but try it. And they do, and what happens is, they’re getting like three stars and 60-65% of the notes. And it’s kind of the same experience they had when they first played Guitar Hero 1, or they first tried the drums in Rock Band 1. And that’s really the phenomenal thing here, is that we’ve found a way to reconnect people to all of this great music through the gameplay. And almost as a bonus, the gameplay is totally steeped in actual musical ability, so by playing the game you develop skill that can be applied to things outside the game. But really, that’s secondary, from our standpoint. What does that mean for play testing and authoring, then, to have these new tiers of difficulty? I know in the past, the first step in authoring was to just do a full transcription of a song, and then try to reduce it to what’s playable on the game controls at different difficulty levels. Daniel: Well, I think we still start at the Expert authoring level, which is the basic note-for-note transcription of the song. And then as you pare down from there to get to hard, medium, and easy, consider that it’s more like the “campfire” version of the song. On Easy, it’s really root notes of chords on downbeats. It’s more like you’re playing along with the song; you’re not playing exactly what the song is. And then on Medium, we introduce power chords, so you’re playing that root-fifth combination on downbeats. And then on hard, you start playing the full chords, major-minor chords, open chords, and riffs. Expert is everything. We use a lot of the same design strategy as we pare down from expert to easy that we do in the core game, in the core five-lane game. Alli Thresher, Aaron Trites, community manager, and Jessa Brezinski. Rock Band’s Place in the Music World It seems like there’s a strong awareness of what RB3 is doing in the game community, that it is at this new level of musicianship, but maybe not in the music community yet. Daniel: Our focus really has been on the gamer out there, because we want to make sure the experience is accessible and not intimidating. But we see a lot of potential for an intermediate- to pro-level guitar player or keyboard player who wants to use Rock Band 3 as a way to learn new music, to learn new songs. And I suspect that we’ll get there as the game gets out and people realize what’s going on, the guitars get out and people put it together. I spoke at a panel earlier this week; it was a panel that was sponsored by NARAS. [That's the National Academy of Recording Arts and Sciences - yes, the folks who give out the Grammy.] We were talking about digital distribution in this day and age, and how musicians can take advantage of some of the tools. And I was stunned at how few people were aware of RBN, and Rock Band 3. And I still think that in the musical community, music games have this stigma as a game, as a toy. And I don’t think enough musicians out there are as aware of the powerful distribution that’s offered through the Rock Band franchise, and then the actual musical benefits that our game has afforded all the way back. I’m looking for the tide to change within the musical community. I’m in two bands, a lot of people here are very musical people, and deeply, we feel that we want to use the Rock Band platform to promote music and to promote musical experiences, and to encourage people to be musicians. We want to be a part of the musical community, not competing with the musical community in any way. Have you gotten feedback from musicians as you worked on Rock Band 3, apart from, obviously, the numerous musicians who work for Harmonix? Daniel: Some. We worked pretty closely with a couple of folks at Berklee College of Music. We’re building this game, we want to make sure that we don’t want to teach people any horrible habits, and all of our chord language is correct, and our fingering is correct, and our ramp is from easy to medium and medium to hard, following loosely with stable, academic doctrine. And so we had a couple of people come in on a weekly basis to play the game. And people were very excited. I think a lot of people have seen the potential of this within the music community. So there are certainly people that are very impressed with what we’ve done and are looking forward to applying it as a tool in the music community. Do you have hard numbers on the relationship of the game and this game genre to people going out and learning instruments? It seems Rock Band 3 has the potential to make that happen even more. Daniel: Obviously, it’s too soon to tell what the impact of RB3 will be on, you know, the society that we live in. [laughs] There have been studies, vendors have done studies, Cornell did a study, just on the attach rate between music gamer and how many people play Guitar Hero and then go buy a guitar, how many people play Rock Band and take musical instrument lessons. I know that it’s an interesting topic in the musical academic world. And I think RB3 definitely changes the game. The connection between the game and the actual musical ability is way less tenuous than it has been in previous games. It’s pretty real. I think you’ll see a higher attach rate, but you know, we’ll see. Some of those hard number… Harmonix provided us with a study, announced in January of 2009, by Fender and non-profit music education organization Little Kids Rock, looking at schools around the United States. The results: educators widely attribute a renewed interest in music education to the games. The study looked at teachers with students in the 8-13-year-old age group. Results: 67% said guitar enrollment increased as a result of Rock Band and Guitar Hero; 46% bass, and 52% drums. A tiny fraction thought it decreased. 78% said they felt these games had a positive effect. 88% said it had increased interest in classic, guitar-based rock, and a whopping 95% said the two games would help attract new students. Top: Eric Pope. Above: Alli Thresher and Aaron Trites. Rock Band Network, Meet Pro Mode, Keys How are the tools being received in the Rock Band Network community? Matt: We’re working on the toolset now to add keyboards and harmony to Rock Band Network. The creative community has been incredibly excited about it. I know a lot of them are both holding songs back that have keyboard parts in it, and sort of going after artists who they know might be interested in it. We’ve already had interest from a few major-label artists who have already gotten in touch with us to try to get their stuff in. So I think it’s going to certainly expand the RBN stuff into the keyboard-centric area. What made the difference for them — is it, okay, now I have an engine that can represent my music, is it that now it’s something that I can take more seriously, or a combination? Matt: I think it’s more the former. I think these are people who are very keyboard-centric. Billy Joel’s a great example of someone who was added. We’ve had people who said, oh, cool, you have keyboards? I really want to get my songs in there, people who are known for playing keyboards. John: I think it’s people who make music on that instrument want to see even the representational gameplay. Even if you’re playing keys mode, you don’t have to play the two octaves, we still have that five-button-style gameplay even on the keyboard, I think we’ve always felt a little weird about it when it’s been like, play the organ solo to Smokin’ by Boston on a guitar controller. We did it because it’s an amazing song and we didn’t want to hold it back, but it makes so much more sense, and it’s so much more fun for them to see their music expressed on an instrument, even in a simulation format that’s that much closer to reality. I think it opens the door for them to get excited about it. And then once they’re excited about it, it’s kind of a no-brainer to get their music in. Of course, as a keyboardist, I’m pleased to see the addition of keyboards; what does that change mean for Harmonix, especially coming from only the guitar and drums? John: The exciting thing for us is, keyboard is so fundamental in terms of the way that people process and understand music. It’s probably the most linear layout of notes that you can have. It makes a lot of sense to be able to look at a keyboard and be able to understand what that harmonic structure is, versus a guitar. When you see people trying to learn theory from a guitar, they’re able to do it, but it’s a very disconnected and disjointed thing in their minds a lot of the time, if they’re not musicians. I come from a jazz background. You have great pianists and great piano solos in the context of jazz, but at laest half the time you’re comping. That’s always part of it. It’s such a versatile instrument that can do all those things. I think with Rock Band Network and with Rock Band DLC, what we’re seeing a lot of is the ability to highlight those songs. We’ve got music like Billy Joel, like Imagine by John Lennon, like Bohemian Rhapsody, where the piano has those stand-out moments, where we’re really looking at the keyboardist as featured player. But also we have have songs like Roundabout by Yes, or Freebird by Leonard Skynard, where the keyboard has a standout section or there’s a crazy keyboard solo or sort of insane part, but really it does work as an instrument that’s part of a collaborative effort, which is what Rock Band’s all about. Rock Band’s not about Guitar Heroes, and it’s not about drum solos. It’s about your band playing together. So the keyboard will have its stand-out moments, it’ll cast more light on an instrument that’s often overshadowed. Matt: The thing about RBN is that you typically see the more the fringe-y, niche-y stuff. It seems likely to be that we’re going to get some of those, like maybe we’ll get a jazz tune where the keyboard comps the whole time. And that would be cool. It’s the sort of thing that we probably wouldn’t release as DLC, because we have more high-profile bands in front of it. But it’s exactly the sort of thing that people put into RBN because they’re passionate about the bands they love and the kind of music they like. What will the impact of these new levels be on the authoring process? I know you’re working on releasing new tools to work with the new implementations for Rock Band Network; what are you changing? Matt: We’ve improved a whole bunch of the audition tools to make auditioning much, much quicker and easier — like adding rewind and skip forward, vocal guide pitches and keyboard guide pitches. We actually brought a group of people in, some of the more advanced authors, to check out the MIDI spec, and one of the things they reacted to is that the keyboards are really, really complicated. The difference between five lanes and two octaves doesn’t seem that big, but when you figure out that you’ve got chords and it’s real stuff in real time, it’s a very significant increase in difficulty. John: Both to author and to play test. Matt: — and to play. So we’re trying to add some tools to allow them to make sure what they’ve done is correct according to what’s actually in the song. John: The thing now is that it’s pitch-accurate. So it’s not just charting what feels right; it’s charting what is right. There’s still compression going on. It’s not the same compression that we do to take all the sonic stuff that you’re hearing down to five colors, but we’re still talking about, if you have a full keyboard part, taking it down to about an octave and a half — you have to think about both the theoretical, what is the best way to do that to make it feel right from a gameplay standpoint, but also how to communicate information so that it’s still pitch-accurate, and it still plays well, with jumping around. When do you leave the bass note in, when do you take the bass note out? It’s a lot of thinking. It’s not like when we launched originally, when we had four years of guitar authoring under our belts. So it’s like doing a transcription, in other words — it’s like doing an orchestral transcription for piano, or in this case a piano transcription for toy piano. John: Yeah, exactly. That’s sort of a funny way to refer to it, but it’s pretty accurate. It’s more an art than a craft. John Drake, PR and Communications Manager. Learning Music with Rock Band Last week we got to see GarageBand ’11, with additional lessons, and metrics behind those lessons. In a way, the games and the music tools are converging. It seems like what the games are doing can help with learning music. John: You know, I grew up playing piano. I’m a classically-trained percussionist, and learned piano when I was six years old, and all that good stuff. And the thing that sucks about learning an instrument in isolation is that you play scales, and you play Mary Had a Little Lamb, and you play your A harmonic minor scale. And when you mess up, it sounds bad. And when you do it right, it doesn’t sound that great either. It sounds like a scale. The fun thing with Rock Band 3 is that the stories we have, we back you with a full band of music all the time. Even when you’re playing your C major scale, or your C major triad, you’re playing it on top of a bluegrass band, or a metal riff. And you feel like you’re accomplishing something. And it makes you want to get over that hump and get over that musical boredom and inertia that holds people down, where they’re not getting engaged on a real instrument. I’m hopeful we get people to feel like they’re learning, to feel like they’re engaging with a game and playing something, and they actually develop some chops and maybe some habits that can get them thinking about musical theory and maybe taking a piano lesson, or reading Keyboard Magazine, or downloading some GarageBand lessons. That’s all good. John: Exactly. Oh, God, those tapes… I was trained on those tapes. I was trained on… oh, God. They’re good. They’re torture. So, now we have these full guitars and real two-octave keyboards — was there some iteration to arrive at that solution? I got to poke a little fun at the process when the announcement was made, mocking up a whole staff coming at you in the interface. Maybe at one point there was even something a little like that. John: God, there was tons of iteration on that. I think this is sort of the genius of Harmonix games. To be very clear. I’m not a UI designer, that’s not my job or my baby, but having seen the iteration process it went through, when you see the end result, when you see the polish, you think, “oh, it must have been a really natural process to come up with this.” But what you’re looking at is hundreds of hours of painstaking thought and work that went into it. With keyboards specifically, I think the biggest challenge was really getting people who are not used to reading piano roll, and not used to understanding the difference between a fourth and a fifth onscreen, being able to identify that quickly through a seamless UI and jump right in. And I think that our team did a killer job of what’s coming down the display on the screen. I think it’s pretty much the only way you can do it. The idea of having one octave of gameplay at a time, because we tried it with more than one octave. Matt: And you know, adding the colors. I sat in on all those meetings. I go to all the design meetings. It was fascinating to watch us work through it. We tried not having black and white notes and coloring all the notes, and eventually we ended up on black and white because people are used to that. We struggled with, like, do you light up the lanes when you press them? How thick are the dividers between the lanes? We were tweaking stuff literally until the last day. And it was a nonstop process of iteration through the whole cycle to get it right. It’s very, very hard. John: And it’s because people are so deep into music here, and want so badly to give people that experience and make it accessible. We can get my mom to play keyboards, and then get a great keyboard player, both being able to sightread something on easy and having a good time, not feeling like they’re reading music and suffering through a rehearsal process. Matt I think it was a huge debate whether we had a key signature list at the beginning of each song. The keyboard people wanted it, and the design and UI people didn’t want it because they felt it was clutter. We went back and forth on that a bunch of times. John: At the end of the day, that’s what designing games really is for something like this. If we’re translating a real-world experience, making decisions to give the most amount of information to people without overwhelming them. I think Rock Band Pro really walks that line of filling that screen with all the notes in the keyboard solo in Roundabout, without making you feel like you’re going to have an aneurysm from trying to play them. My favorite thing is what people said about the pro guitar — that’s been in development as long, if not longer, than keyboards. We’ve been futzing around with that for two-plus years. And playtesting it, people were saying, oh, sure, you can play on it, and it makes sense to you, but you’re a guitar player. And to bring people in who never played guitar before, and give them our tutorial system, to see them like an hour later playing power chords? Playing I Love Rock and Roll? I mean, they’re not mastering it and no one’s playing crazy guitar solos, but to be able to fret three or four chords based on learning it through the game in an hour or two hours. Having them have to stop because their hands hurt — they were grinning from ear to ear, and they were doing it and loving it. That’s the power of someone learning an instrument and getting excited about it. That’s what we had hoped would happen. The idea that anyone could pick up a guitar and spend two or three hours in our game and walk away knowing two or three chords and how open notes work and how they can move their way around a fretboard — that’s pretty crazy. Hopefully these tools and instruments will enable a lot more kids to start creating their own music and make it a creative outlet instead of just playing along with other music. http://www.inoutfest.org Flplsx Anything that tries to bridge the unfortunate gap between "music performer" and "music listener" is good in my book. In Western culture especially, there's this notion that only talented people can play music, which is not true in the slightest. Anyone can play music. The rise of the "professional musician" some 500-600 years ago has ingrained this thought in people's heads that only certain people can play music. Side note: Any coverage on Power Gig by Seven45 Studios? wi_ngo Oh, man… my college roomates and I used to jam to those Aebersold records (RECORDS) all the time. Ahh, the memories…. http://cflickster.noisepages.com/ Flick I did my senior project in college turning the old rockband guitars and drums into MIDI instruments using Max… and now they have done that for us already! Thats gonna change my game SO MUCH! Even if I don't get the actual game I may have to get one of those guitars… Though $150 vs $25 and software I have already developed, it's still a tough sell. Would LOVE to hear your take on the controller as you promise, Peter. One thing my current build lacks greatly is velocity control. Eagerly waiting! http://truechip.org peter I cant wait to hear more about the midi spec of these controllers. Billy K HECK YEAH. i really want one of these to use for midi, holla! Polite Great read. I'm looking forward to my copy of the game rocking up, and also to checking out the midi specs of those new instruments. I have a couple of synth patches in mind that i really want to try out on the mustang midi guitar. http://www.figby.com/ Michael Moncur We bought the game and the keytar today – the "pro" guitars aren't out yet. Playing keys in Rock Band was lots of fun. As a casual keyboard player (I can play a few simple things on piano 2-handed, otherwise just plink out melodies) the "Pro" mode was HARD. I had to keep it on Easy difficulty to survive, although I managed Medium on some songs. You get one octave on the display, but not always the same octave, so you have to watch the colored sections of the piano roll to figure out your hand position. You also get both white and black keys even on Easy difficulty. No chords on Easy or (apparently) Medium, but the melodies are hard enough. I wish they HAD included key signatures – it would have actually helped. As it was, I was running through my poor grasp of music theory in my head – "this is in E, so which notes are sharp or flat?" The great thing is that it all makes perfect musical sense. Unlike the (old) plastic guitars, you're really playing the right notes.I'd like a better song selection, but otherwise it's amazing. It's definitely making me a better keyboard player. Can't wait to try the guitars. (This is all in "Pro Keys" mode. The regular "Keys" mode only uses 5 of the keys, so it's like a Rock Band guitar you don't have to strum.) http://www.hispasonic.com Mudo … Lots of ideas in my head… … AMRA Details on the squier guitar controller? That is a potentially game changing instrument for laptop/guitar musicians! Jamire I dunno – those of us from long became real musicians from learning on real instruments. I'm no fuddy duddy, but I feel weird about this stuff. http://www.createdigitalmusic.com Peter Kirn @Jamire: too old-fashioned to actually read the article? They say over and over and over again that part of their hope is that people go buy the real instruments and get actual lessons. The guy I interviewed learned on Aebersold tapes, for crying out loud. We have music education systems that has traditionally introduced people to some very suspect instruments – like horrible plastic Yamaha recorders or tinny xylophones. (I remember dreading music class sometimes.) I think if kids get their first taste through RB3 – through, say, that pro piano, which actually *is* a real velocity-sensitive, two-octave MIDI keyboard – that's not a bad thing. And the survey by Fender suggests that music teachers think, by overwhelming majorities, that playing those games at home is increasing interest in music classes that teach on real instruments, not Rock Band. Gary Gore I'm kind of excited about the guitar controller. I've used the sonuus guitar to midi box which isn't polyphonic and the much pricier Roland VG units, this is a very cheap alternative controller. Hopefully this triggers more ideas for other alternative controllers. Maybe they could try making a Jazz Band or Funk Band adding a cheap wind controller. More different midi input devices will inspire some interesting new musical ideas midihendrix As an old fashioned musician who embraces technology….i cant wait for this as a controller!!!!!!!!!! http://www.createdigitalmusic.com Peter Kirn To be fair, too, there are some nice, very old-fashioned instruments that are spectacular for turning people on to music. The woman who taught me ear training was a great advocate of the Autoharp, true to her Appalachian roots. I think we'll see a lot of that stuff come back. And in a way, there's a direct connection between those things. There have always been instruments that are insanely hard to play. There have likewise always been instruments that have greater popular appeal that simplify the experience. If you start at the assumption that everyone makes music, you have both, and not necessarily by "dumbing down" the experience, but simply by providing people a broad range of things, and assuming that even the challenge of playing things can be fun. matt Rockband has already done wonders for my real life drumming skills (which were always dormant until I actually had a "kit" to use and "people" to play with) and I hope the keys can do the same. I am a guitarist and have no interest in the pro guitar, but I bought the keyboard right away. As a self taught piano player who can get by with a performance, followed by some good old piano roll cleanup, i thought this game could actually help. It might after some more practice, but it is devilishly hard to tell what keys are coming down the lane once things get more hectic. They could fix this all by actually putting the note of the key so you had some sort of reference when the music is flying down the screen. Lots of fun none the less. chompers In that second picture above, I think Emeen is PayPal-ing you with his Droid 3. Great article, Peter. Thank you. Still have to pick up the keytar and initial guitar. Making myself wait for the great gear is something I endure though, so you all enjoy it for me until I jump on in. leakeg If I can use the guitar as a midi controller in my DAW… that is amazing. God I hope one of my friends forks out the cash for this game! http://www.whereisjohnwilson.com whereisjohnwilson I agree 100% with the idea of putting the notes on the keys (as a display option only). What a great way to remember – when it's a C my fingers go here, when it's this certain chord, my fingers go there. That would make an excellent update. Anthony Conner awesome info for the avid harmonixer! Robert Manning You all have accomplished a wonderful thing here. I am a classically trained violinist. Yet, I have learned to play the guitar, bass, and my all-time favourite drums, all in pro mode. I pulled out my son’s acoustic guitar and was amazed that the guitar chords were accurate on that instrument (never having played guitar). I have never had a single drum lesson, but your tutorials are top notch and I am surprised that more people haven’t learned the valuable lessons they can teach (drummers are hard to come by online). I’ve been shocked at how playable the mustang pro bass/pro guitar and pro keyboards can be, once you take the time to learn with the tutorials. Kudos to you all – you have done a remarkable job at introducing the lay instrumentalist to the instrument of their choice.
{ "pile_set_name": "Pile-CC" }
Letter to the editor: Chronicle for an orphan trait: comment on Hofer, Shair, Masmela, & Brunelli, "Developmental effects of selective breeding for an infantile trait: the rat pup ultrasonic isolation call". Hofer, Brunelli, Shair, and Masmela (2001) examined several behavioral and physiological measures in low, high, and unselected lines obtained from a divergent selection for ultrasound production (USP) in young rats. Although the response to selection was clear-cut, few correlated responses appeared. This surprising result could be explained by two reasons. USP has polygenic correlates in this population, and most of the chromosomal regions that are linked with these measures only contribute to a small part of the genetic variance. Therefore, correlated responses to selection might exist, but the common genetic variance between the trait under selection and the indirectly selected trait is too small to be detected by a selective breeding strategy.
{ "pile_set_name": "PubMed Abstracts" }
576 F.3d 810 (2009) UNITED STATES of America, Plaintiff-Appellee, v. Gary McMULLIN, Defendant-Appellant. No. 08-3477. United States Court of Appeals, Eighth Circuit. Submitted: April 15, 2009. Filed: August 17, 2009. *811 John M. Albright, argued, Poplar Bluff, MO, for Appellant. Paul W. Hahn, AUSA, argued, Keith D. Sorrell, AUSA, on the brief, Cape Girardeau, MO, for Appellee. Before MURPHY, BRIGHT, and BYE, Circuit Judges. *812 BRIGHT, Circuit Judge. Defendant-appellant Gary McMullin appeals his conviction for being a felon in possession of a firearm in violation of 18 U.S.C. § 922(g)(1), challenging the district court's denial of his motion to suppress firearms evidence discovered during a United States Marshal's second entry into McMullin's house. McMullin asserts that the marshal lacked legal authority to re-enter his house, while the government contends that McMullin never withdrew the consent he granted for the initial entry. Having jurisdiction pursuant to 28 U.S.C. § 1291, we reverse the district court and remand for further proceedings. I. Factual Background United States Marshals Sean Newlin and Dave Davis had received an assignment to locate Daryl Crowder, for whom the state of Illinois had issued several arrest warrants in 2006. During the assignment, Marshal Newlin learned that Crowder had placed telephone calls from a residence in Missouri. After checking the address, Marshal Newlin discovered that another sex offender and felon, McMullin, resided there. On October 10, 2007, Marshals Newlin and Davis drove to McMullin's residence in an attempt to locate Crowder. The marshals did not have a search warrant for the house. They arrived early in the morning in an unmarked vehicle but wore jackets marked "U.S. Marshal." As the marshals drove up the driveway to the residence, Marshal Newlin observed a person looking out of the front window of the house. After stopping the vehicle, Marshal Davis walked around to the back of McMullin's house, while Marshal Newlin headed toward the front of the house. Around this time, Marshal Newlin heard a person yell from within the house, "The U.S. Marshals are here." Marshal Newlin climbed the steps to the front door, which McMullin opened. Marshal Newlin recognized him from a photo on the sex offender registry website. Marshal Newlin and McMullin exchanged greetings. Marshal Newlin asked if anybody else was in the house. McMullin replied, "You know, I'm just having coffee with my uncle." Marshal Newlin asked, "May I come in and talk with you?" McMullin replied, "Yeah, sure, come on in. We're just having coffee." McMullin stepped back inside the house and started walking through the house. Marshal Newlin followed him down a hallway to a kitchen table. As they were walking down the hall, Marshal Newlin again asked if anyone else was in the house. McMullin replied, "No. I'm just having coffee with my uncle." Marshal Newlin asked for the uncle's name and McMullin responded, "Carroll." When they arrived at the kitchen, Marshal Newlin saw an older man sitting at the table. McMullin said, "This is my uncle. We're just sitting here having coffee." Marshal Newlin again asked if anyone else was present in the house. McMullin replied, "No. It's just my uncle and I." However, Marshal Newlin noticed three cups of coffee on the table and asked about the third cup. McMullin reiterated that only he and his uncle were in the house. This conversation lasted between two to three minutes. At this point, Marshal Newlin heard Marshal Davis yell from outside the house, "Get down. Get down on the ground." Marshal Newlin attempted to leave the house through a back door, but could not find his way through the house. McMullin showed Marshal Newlin the way to the back door. Marshal Newlin emerged from the house into the backyard and saw Marshal *813 Davis and Daryl Crowder in an area near the back door. Crowder was prone on the ground, with his hands on top of his head. Marshal Newlin asked Crowder for his identity; Crowder replied with his correct name. McMullin also emerged from the back door of the house. Marshal Newlin asked McMullin about Crowder's identity. McMullin first said he did not know, and then said his name was Thomas Junior. Marshal Newlin told McMullin to turn around because he was being detained. McMullin complied and Marshal Newlin handcuffed him. Marshal Newlin again asked about the man's identity. McMullin said that "he told me his name was Thomas Junior." Marshal Newlin then warned McMullin about obstruction of justice. Although it was an early morning in October, McMullin wore only gym shorts and sandals. Marshal Newlin then said, "Well, let's go back into the house and talk." Marshal Newlin had to physically bring the handcuffed McMullin into the house before following him into the breakfast area. By this time, Evelyn Moore, McMullin's aunt, also sat at the kitchen table.[1] Marshal Newlin asked McMullin if he felt comfortable talking in front of his aunt and uncle. McMullin replied, "Yeah, that's fine, I'll talk. You know I don't have a problem talking in front of them." Marshal Newlin told McMullin that he knew the identity of the man in the backyard. McMullin dropped his shoulders and said, "Yeah, that's Daryl Crowder." When he returned to the kitchen, Marshal Newlin noticed some ammunition in an ashtray sitting on a desk. He then told McMullin that he had seen the bullets and asked whether there were guns in the house. McMullin said, "Yes, there are," motioning his head toward a wall by the kitchen. Marshal Newlin looked in that direction and observed seven long guns lined up along the wall. Additionally, Moore told Marshal Newlin about the location of a handgun in a desk drawer. The marshals seized these firearms, which Marshal Newlin had not noticed during his first visit to the house. Marshal Newlin had not drawn his service weapon during these events, nor did he give Miranda warnings to McMullin. II. Procedural History Following an investigation, a grand jury indicted McMullin for being a felon in possession of a firearm in violation of 18 U.S.C. § 922(g)(1). After his initial appearance, McMullin moved to suppress the firearms evidence seized from his house, asserting that the search violated his reasonable expectation of privacy in his house as guaranteed by the Fourth Amendment to the United States Constitution. In the motion to suppress, McMullin argued that Marshal Newlin had no legal authority to be in his house. In his reply to the government, McMullin further stated that Marshal Newlin's re-entry fell outside the scope of consent. Meanwhile, the government argued that McMullin gave Marshal Newlin consent to enter the house and never revoked it. At the suppression hearing, the government presented its evidence, and McMullin testified on his own behalf. He testified, contrary to his grand jury testimony, that he never gave consent for the marshal to enter his house. Instead, McMullin stated that just after Marshal Newlin arrived at his front door, McMullin heard shouts coming from the *814 rear of the house. After hearing this shouting, Marshal Newlin allegedly drew his service pistol and ran into the house, looking for the back door. In his Report and Recommendation, the magistrate judge recommended denying McMullin's motion to suppress and found McMullin's version of the facts to lack credibility. McMullin filed an objection to the report. In June 2008, the district court issued its order, adopting the magistrate's recommendation and denying McMullin's motion to suppress. McMullin filed a motion to reconsider, asking the district court to accept Marshal Newlin's report on the firearms seizure as additional evidence, and then raised a new ground for suppression: that the consent did not continue for Marshal Newlin to re-enter the house. In July 2008, the district court denied McMullin's motion to reconsider. On July 24, 2008, McMullin pleaded guilty to being a felon in possession of a firearm as charged in the indictment. However, McMullin reserved his right to appeal the district court's ruling on his motion to suppress. The district court sentenced McMullin to fifty-six months' imprisonment, three years' supervised release, and a $100 special assessment. McMullin timely appealed, arguing, among other things, that Marshal Newlin had no legal authority to re-enter McMullin's house. III. Discussion The dispositive issue presented on appeal is whether the second warrantless entry into McMullin's house by Marshal Newlin violated the Fourth Amendment. We turn to that issue. This Court reviews factual findings underlying the district court's denial of a motion to suppress for clear error and the question of whether the Fourth Amendment has been violated de novo. See United States v. Hughes, 517 F.3d 1013, 1016 (8th Cir.2008). In this case, it is important to recall the Fourth Amendment to the United States Constitution: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. This amendment fundamentally protects a person from unreasonable searches. Id. In particular, Fourth Amendment law recognizes the inherent sanctity of a person's house. "The caselaw has consistently recognized that considerably more protection is to be afforded a home than other premises. The leading decisions ... are each heavily predicated upon the ancient precept that `a man's home is his castle.'" United States v. Agrusa, 541 F.2d 690, 700 (8th Cir.1976); see also Payton v. New York, 445 U.S. 573, 588-90, 100 S.Ct. 1371, 63 L.Ed.2d 639 (1980). Therefore, "to search a private place, person, or effect, law enforcement must obtain from a judicial officer a search warrant supported by probable cause." United States v. Williams, 346 F.3d 796, 798 (8th Cir.2003). It is therefore well-established that the police may not invade a person's house without a warrant except under very limited circumstances, such as the presence of exigent circumstances or an occupant's consent. Exigent circumstances permit warrantless entries when "lives are threatened, a suspect's escape is imminent, or evidence is about to be destroyed." United States v. Ball, 90 F.3d 260, 263 (8th Cir.1996). Additionally, the consent of a *815 house's occupant makes a warrantless entry into a house reasonable for the purposes of the Fourth Amendment. See United States v. Spotted Elk, 548 F.3d 641, 652 (8th Cir.2008). In this circuit, we recognize that when an occupant of the house gives consent for entry, he must make an unequivocal act or statement to indicate the withdrawal of the consent. See United States v. Sanders, 424 F.3d 768, 774 (8th Cir. 2005). "Withdrawal of consent need not be effectuated through particular `magic words,' but an intent to withdraw consent must be made by unequivocal act or statement." United States v. Gray, 369 F.3d 1024, 1026 (8th Cir.2004). If equivocal, police officers may reasonably continue their search in the premises entered pursuant to the initial grant of authority. See Sanders, 424 F.3d at 774. Additionally, "[t]he standard for measuring the scope of a [person's] consent under the Fourth Amendment is that of `objective' reasonableness—what would the typical reasonable person have understood by the exchange between the officer and the suspect?" Florida v. Jimeno, 500 U.S. 248, 251, 111 S.Ct. 1801, 114 L.Ed.2d 297 (1991). In assessing the scope of a person's consent, we must examine the totality of the circumstances, which includes the language of a person's consent and his actions during the officers' search. See United States v. Starr, 533 F.3d 985, 996 (8th Cir.2008). After reviewing de novo the constitutionality of the search of McMullin's house, we conclude that the search violated McMullin's Fourth Amendment rights. Neither party contests on appeal that Marshal Newlin received McMullin's consent to enter the house the first time, making the initial warrantless entry valid. In dispute, however, is Marshal Newlin's second entry into McMullin's house, following the handcuffing of McMullin in the backyard.[2] The government contends that McMullin's initial consent continued to the second entry because McMullin never effectively withdrew the consent. The cases relied upon by the government for this proposition, however, are distinguishable in that Marshal Newlin actually left and then re-entered the house after detaining McMullin in the backyard, having to physically bring him into the house. For example, in United States v. Parker, 412 F.3d 1000, 1001 (8th Cir.2005), the officers remained in the house during the entire search. In Sanders, 424 F.3d at 771-72, the agent also never left the hotel room being searched. The government further relies on United States v. Diaz, 814 F.2d 454, 459 (7th Cir.1987), in which the Seventh Circuit permitted a second entry when the officer originally entered with consent, established the existence of probable cause to effectuate an arrest or search, and momentarily stepped out to seek help from other officers. Here, however, Marshal Newlin did not leave McMullin's house to seek help, did not establish probable cause to search the house, and in fact fulfilled his visit's purpose by arresting Crowder and detaining McMullin outside of the house in the backyard. None of these cases support the government's proposition that Marshal Newlin had legal authority to re-enter McMullin's house under the circumstances. In fact, *816 the language of one of the cases cited by the government does not necessarily support the second entry in this case. See id. ("We do not intend to suggest by our analysis that one consensual entry means that law enforcement agents may thereafter enter and exit a home at will."). The precise issue here is not withdrawal of consent, but whether, as McMullin argues, a new consent was required for the second entry. By the time Marshal Newlin sought re-entry into McMullin's house, it is undisputed that the marshals had already completed their task of arresting Crowder in the backyard. There was no necessity or legal basis for the officer to re-enter the house. Under the circumstances of this case, we determine that Marshal Newlin's re-entry exceeded the scope of McMullin's consent and therefore violated the Fourth Amendment prohibition against unreasonable entries into a person's house. Cf. United States v. Jones, 269 F.3d 919, 929 (8th Cir.2001) (determining that a trooper's detention of defendant "past the point necessary to complete his traffic stop investigation exceeded the scope of a lawfully initiated traffic stop."). We have examined the second entry cases in this circuit, none of which support a second, warrantless entry under the facts presented by the record. For example, in United States v. Carter, 854 F.2d 1102, 1104-06 (8th Cir.1988), the officers first entered the motel room without a search warrant but with consent, and a second time, pursuant to a warrant issued based on plain view observation of cocaine on a table. Carter suggests that the proper procedure here should have been to secure a search warrant prior to the second entry. Carter also discusses exigent circumstances relating to an officer's entry to a motel room to obtain clothes, mentioning similar circumstances in United States v. Gilbert, 774 F.2d 962, 963-64 (9th Cir. 1985), but these entries were made pursuant to consent as well. See 854 F.2d at 1106. Importantly, however, Carter notes the expectation of privacy associated with a person's house. Id. at 1105. Furthermore, in United States v. Weston, 443 F.3d 661, 665 (8th Cir.2006), a first search occurred pursuant to consent, while a subsequent search followed the issuance of a search warrant. Finally, in United States v. Lakoskey, 462 F.3d 965, 974 (8th Cir. 2006), this Court concluded that an officer's second warrantless entry without consent or exigent circumstances violated the Fourth Amendment. The government further argues that exigent circumstances, in the form of Marshal Newlin's safety, made the re-entry reasonable under Fourth Amendment law. Although officer safety indeed constitutes exigent circumstances permitting a warrantless search, see United States v. Hill, 430 F.3d 939, 941 (8th Cir.2005), this exception is inapplicable in light of the facts presented by the record. There was no testimony that the marshals feared Crowder and McMullin, and in any event, both had been detained and handcuffed in the backyard.[3] As for the other occupants of the house, Marshal Newlin's testimony is insufficient to justify his re-entry into the house on grounds of officer safety. For example, Marshal Newlin did not testify that the occupants of the house acted belligerently or in a hostile manner. He did not testify that Crowder or McMullin signaled to the occupants in the house for *817 help. Marshal Newlin did testify, however, that he observed no firearms or ammunition during his first visit in the house. On this record, it is not apparent that officer safety required re-entering the house, as opposed to keeping Crowder and McMullin in the backyard or taking them to the marshals' vehicle. The government also urges this Court to join several other circuits in recognizing a defendant's scant clothing to constitute exigent circumstances permitting a warrantless entry in search of proper clothing for the defendant.[4]See, e.g., United States v. Gwinn, 219 F.3d 326, 335 (4th Cir.2000) (determining that a defendant's lack of shirt and shoes while outdoors justified an officer's warrantless re-entry into the house); United States v. Butler, 980 F.2d 619, 621-22 (10th Cir.1992) (permitting police to retrieve a defendant's shoes from his house, but noting that entry into the house does not immediately follow from "the desire of law enforcement officers to complete the arrestee's wardrobe"); United States v. Di Stefano, 555 F.2d 1094, 1101 (2d Cir.1977) (allowing an officer's entry into a bedroom solely for the purpose of maintaining control over defendant while she dressed herself). However, McMullin wore shorts and sandals, missing only a shirt. Marshal Newlin did not reenter the house to retrieve a shirt for McMullin in a "carefully circumscribed [area] to minimize the intrusion," as in Gwinn, 219 F.3d at 330, or to maintain control over McMullin while he dressed himself, as in Di Stefano, 555 F.2d at 1101. Instead, he brought McMullin into the house as part of a further investigation. This record does not establish circumstances considered exigent which would validate a re-entry into McMullin's house. IV. Conclusion For the foregoing reasons, we reverse the district court, vacate its judgment, and remand for further proceedings in accordance with this opinion. MURPHY, Circuit Judge, dissenting. I respectfully dissent from the majority's conclusion that appellant McMullin's consent to Deputy U.S. Marshal Newlin's presence in his kitchen ended before appellant pointed out the firearms that were present in his home. The Fourth Amendment suppression issue here cannot be resolved without careful consideration of how the fast moving events unfolded within minutes after Newlin's consented entry into McMullin's home. Sounds from Crowder's apprehension in the backyard caused Newlin and McMullin to step outside. Then, after McMullin had clearly lied about Crowder's identity, Newlin warned him about obstruction of justice, handcuffed him, and said "Well, let's go back into the house and talk." McMullin said nothing in response. He made no objection of any kind to Newlin's reentry, only indicating that because of the handcuffs he needed assistance to manage the high step. Back inside the house, McMullin did not protest or ask Newlin to leave. Instead, McMullin sat down at the kitchen table with the deputy and his aunt and uncle. Deputy Newlin asked McMullin whether he minded answering questions in front of his aunt and uncle. McMullin said "Yeah, that's fine, I'll talk," and then admitted that he had known the man staying in his home was Crowder. After Newlin noticed ammunition in an ashtray, he asked McMullin whether there were firearms in the house. McMullin pointed to seven *818 firearms lined up against the wall, and his aunt volunteered that a handgun was stashed in a desk drawer. Knowing that McMullin had a felony record, the deputy arrested him and seized the firearms. It is undisputed that there was valid consent by McMullin for Deputy Newlin to enter his home at the outset. Once consent is given, it may be withdrawn, but only by an "unequivocal act or statement." United States v. Gray, 369 F.3d 1024, 1026 (8th Cir.2004) (expressions of impatience do not amount to an unequivocal statement of withdrawal); United States v. Martel-Martines, 988 F.2d 855, 858 (8th Cir.1993) (passively watching in silence as search was expanded not sufficient to withdraw consent); see also United States v. Sanders, 424 F.3d 768, 775 (8th Cir.2005) (repeated use of hands to block officer's search of pockets demonstrated unequivocal withdrawal of consent). Newlin left the house only to go into the backyard to assist his partner who was attempting to arrest Crowder. In the yard McMullin incriminated himself which gave Newlin reason to talk to him further. McMullin made no objection to his returning inside, and Newlin's reason for reentering was within the scope of the consent granted by McMullin which was to talk and ask questions. See United States v. Castellanos, 518 F.3d 965, 970 (8th Cir. 2008) (distinguishing consent for officer merely to enter from consent to a search). Newlin's reentry was thus a continuation of his consented presence in the house.[5] The burden remained on McMullin to withdraw affirmatively and unequivocally his consent for Newlin to be inside his home. The district court found that McMullin never withdrew his consent—a factual finding that we review for clear error, see Gray, 369 F.3d at 1026-27, and I see none. To ascertain whether McMullin withdrew his consent, we ask what "the typical reasonable person [would] have understood by the exchange between the officer and the suspect." Florida v. Jimeno, 500 U.S. 248, 251, 111 S.Ct. 1801, 114 L.Ed.2d 297 (1991). There is no evidence in the record to indicate that McMullin ever withdrew his consent, much less that he did so by an "unequivocal act or statement." Gray, 369 F.3d at 1026. McMullin had the opportunity to communicate that he did not consent to Newlin's reentry, but he did nothing of the sort. He nevertheless now argues that Newlin should have understood that his consent had been withdrawn because he had to help McMullin back into the house and because McMullin would have been afraid to refuse him entry after watching the deputies arrest Crowder. This explanation is not only late, but it is unpersuasive because McMullin did not take any action to communicate that his consent was withdrawn. After Newlin suggested that the two men go back into the house, McMullin indicated that he physically could not make the step. This could reasonably have been interpreted as a request for Newlin's assistance and continuing consent to Newlin's presence. Moreover, McMullin never told Newlin that he was afraid not to let him in. Withdrawal of consent requires an "unequivocal act or statement" which makes an officer aware that it has been withdrawn. Gray, 369 F.3d at 1026. McMullin also acquiesced in Newlin's questioning after they were back inside. See United States v. Parker, 412 F.3d 1000, 1002 (8th Cir.2005) (holding that a *819 suspect's assistance to officers conducting a search was inconsistent with having withdrawn consent for that search). Under these circumstances a reasonable person could conclude that McMullin had not withdrawn his consent, and in fact, McMullin himself testified before the grand jury that he had "allowed [the deputies] to search [his] bedroom and every other area of the house they wanted to." (emphasis added). None of the cases cited by the majority, including United States v. Weston, 443 F.3d 661 (8th Cir.2006), United States v. Lakoskey, 462 F.3d 965 (8th Cir.2006), and United States v. Carter, 854 F.2d 1102 (8th Cir.1988), involve facts remotely analogous to those in this case. In Weston and Carter, the police saw contraband during a consented entry but seized it only after obtaining a search warrant. 443 F.3d at 665, 854 F.2d at 1105. The suggestion that Newlin should have obtained a search warrant ignores the critical fact that he had not entered the home in order to search, but rather only to question McMullin. Lakoskey, 462 F.3d at 974, is inapposite because there the defendant specifically refused to allow officers to enter his home. Given the lack of evidence that McMullin ever made an unequivocal act or statement to withdraw his consent for Deputy Newlin to be in his house, the majority seeks to reframe the question to be whether McMullin ever granted a second consent to enter. As support for that theory, it urges that the purpose for the deputies' visit had been accomplished once Crowder was arrested. That approach overlooks the fact that the intervening events had raised reasonable suspicion about whether McMullin had violated the law by knowingly harboring Crowder or by obstructing justice in lying about his identity. The deputies were not required to ignore evidence that another crime may have been committed. McMullin told Newlin several lies about Crowder's presence and identity, raising a reasonable suspicion that McMullin had made a false statement to a federal agent. See 18 U.S.C. § 1001 (2009); United States v. Lanier, 578 F.2d 1246, 1249 (8th Cir.1978) (knowingly and willfully making a false statement related to a material matter within federal jurisdiction). Newlin was therefore justified in detaining McMullin for further questioning. See Terry v. Ohio, 392 U.S. 1, 88 S.Ct. 1868, 20 L.Ed.2d 889 (1968). McMullin's house was a practical and appropriate location for further questioning, and Newlin had a legal basis for reentering the house. McMullin and Newlin had been standing within the curtilage, McMullin had left the back door open, and was only wearing gym shorts on a chilly morning. See United States v. Montano— Gudino, 309 F.3d 501, 503-04 (8th Cir. 2002) (reasonable to move a suspect inside for questioning when it was snowing heavily). Newlin would have been justified in arresting McMullin for making false statements, and his decision to question McMullin inside his house was not unreasonable. Once inside, Newlin did not conduct a protective sweep or search of the residence, and there is no evidence that his reentry was a pretext to search. It was only when he saw the ammunition in plain view that he asked if there were any firearms. Since Newlin had legal authority to be in McMullin's house when he saw the ammunition in plain view and McMullin pointed out the firearms, I would affirm the district court and respectfully dissent from the suppression of this legally obtained evidence. NOTES [1] The record does not clearly reveal when the aunt entered McMullin's kitchen. The third coffee cup may have been hers, or possibly Crowder's. The record does not disclose this information. [2] Although McMullin does not claim Marshal Newlin arrested him in the backyard, the detention of McMullin may well have required Miranda warnings, which were not given, because Marshal Newlin talked to McMullin about obstruction of justice and handcuffed him. However, we do not rest our decision on whether the handcuffing constituted an arrest. [3] In the context of vehicle searches, the Supreme Court recently held that "Belton does not authorize a vehicle search incident to a recent occupant's arrest after the arrestee has been secured and cannot access the interior of the vehicle." Arizona v. Gant, ___ U.S. ___, 129 S.Ct. 1710, 1714, 173 L.Ed.2d 485 (2009) (emphasis added). [4] In the district court, however, the government did not contend that McMullin's partially clothed status created an exigent circumstance. [5] The majority expresses concern about any rule that would permit law enforcement officers to "enter and exit a home at will" after once obtaining consent to enter. The facts of this case, however, have nothing to do with "at will" entries.
{ "pile_set_name": "FreeLaw" }
Labels Thursday, December 3, 2015 Chennai: Race to rescue India flood victims A massive rescue operation is under way to reach stranded people in the flood-hit southern Indian city of Chennai (Madras). More than 2,000 people have been rescued by the army, while the navy has decided to deploy a warship carrying divers, boats and relief material. The city's airport will remain closed until Sunday and train services are suspended. A depression in the Bay of Bengal has triggered rains in coastal areas. Last month, non-stop rain for nearly a week brought the city to a standstill. Three days of fresh rains have again led to massive flooding, inundating homes, hospitals, roads, railway tracks and the city's airport. Prime Minister Narendra Modi has tweeted that he was "leaving for Chennai to take stock of the situation arising due to the devastating floods". Schools, colleges and factories are shut, exams postponed and power supply suspended in most parts of the city. Authorities said all flights to and from Chennai have been cancelled as the city's international airport will remain shut until Sunday. A naval air base at Arakkonam, 70km (43 miles) from the Tamil Nadu state capital, will now be used as an alternative airport for relief operations. "The biggest challenge is to find a way to clear the inundated airport and main roads," Anurag Gupta of the National Disaster Management Authority told the Reuters news agency. The federal weather office has predicted three more days of torrential rain in the southern state, where nearly 70 million people live. "There will be no respite," weather official Laxman Singh Rathore told reporters. A total of 269 people are now known to have died in floods in Tamil Nadu state since last month. Image copyrightEPAImage captionMore than 2,000 flood-affected people have been rescuedImage copyrightAFPImage captionNon-stop rain for nearly a week has brought the city to a standstillImage copyrightAPImage captionRescue workers are distributing food in affected areasImage copyrightAFPImage captionThousands of people have been rescued by the army and policeImage copyrightReutersImage captionTrain services have been suspended after railway tracks were floodedImage copyrightReutersImage captionPeople are using boats to travel to safer placesImage copyrightEPAImage captionA temple submerged in flood waters in ChennaiImage copyrightAFPImage captionThe federal weather office has predicted three more days of torrential rains
{ "pile_set_name": "Pile-CC" }
Eglykada Eglykada (Greek: Εγλυκάδα, meaning "sweetness") is a neighbourhood in the eastern part of the city of Patras, 7 km by road from the city center. Eglykada is accessed with the Patras-Ekilistra Road which is 2 km long in the neighbourhood. Since 2002, it is linked with the Patras Bypass in which it was first constructed in the late-1990s and the interchange later on. Its interchange is circular with only one access from the entrance lane but it does not have any tolls and the intersection is by the entrance and the merging lanes. It is 200 m south of the road and 500 m from its nearest tunnel. The origin of the name is a corruption of the name Glykada and it is name since still today are made up of oranges, lemons, etc. The area was entirely rural until the 1960s. It had a sanatorium during the Medieval Times. A cypress tree in the area was burnt down by Turkish forces Turks during the Greek War of Independence of 1821. Nearest places Perivola, south Romanos, north Souli, east Streets Road linking Patras and Ekilistra Geography The hilly setting is filled with agricultural lands and surrounding houses. Sporadic forest cover and several hills lie to the east. The total area is approximately 2 km², its length is 1 km from north to south, and from east to west. The mountains dominate the northern part. The Panachaiko mountains lies to the east. People Germanos III of Old Patras References ''The first version of the article is translated and is based from the article at the Greek Wikipedia (el:Main Page) Category:Neighborhoods in Patras
{ "pile_set_name": "Wikipedia (en)" }
e? False Suppose 453 - 17585 = -4*l. Suppose 22*x - 26*x + 44 = 0. Suppose x = -2*w + 5, 5*w = 4*c - l. Is c a prime number? False Let n(h) = -136706*h + 781. Is n(-3) prime? True Let h = 2154 + 49543. Is h a prime number? False Suppose 4*k + 2*b - 246722 = 0, 185038 = 3*k + 235*b - 230*b. Is k a composite number? False Let b(p) = -114*p**3 + 4*p**2 + p - 2. Let y be b(-2). Let v be (1/(-4))/((-21)/y). Suppose 3485 = v*x - 6*x. Is x prime? False Let p be (27/(-5) - -7)*(-15)/(-6). Let z(x) = -x**3 + 9*x**2 - 21. Is z(p) a composite number? False Let k be 1 + -3 - 3288/(-5 - -3). Suppose 0 = -4*u + 4*v + 8708, -4881 = -3*u + v + k. Is u a prime number? False Let d(w) = 9*w - 50. Let h be d(6). Suppose -h*x = 2*x - 2352. Suppose 2*t - x = 4790. Is t composite? False Let h = 61168 - 20297. Is h composite? True Suppose 3*o + 4*d = 131807, 4*d = 24 - 16. Is o composite? False Suppose -q = 4*u - 18657, -5*u + 476*q = 481*q - 23340. Is u composite? False Let d be (-1)/2*-36682 + 4. Suppose 23*u - d = 18*u. Is u a prime number? False Suppose -22*c - 1 = -23*c. Let k(u) = 7359*u + 34. Is k(c) a prime number? True Let z be 17810/6 - (-2)/(-6). Let o(x) = x**3 + 23*x**2 + 20*x - 41. Let v be o(-22). Suppose r - h - z = -0*r, 2*h + 8907 = v*r. Is r prime? True Let x = 1935 + -1303. Suppose -10*w = -2598 - x. Suppose -w = -5*p + 482. Is p a prime number? False Is -7*55021/2*-2 composite? True Suppose -17*w = -18*w - 3*t + 1635835, -5*w + 8179115 = 5*t. Is w composite? False Suppose -5*t + 28 + 2 = 0. Let u(k) = 156*k + 46. Let c be u(t). Is c + 6*(-3)/6 a prime number? False Suppose -5*d - 10 = -0*d - 3*l, -d - 3*l = 20. Let x = d - -9. Suppose x*h = 12*h - 4696. Is h composite? False Let r be 4/10 - 22473/(-5). Is ((-28)/8 - -3) + r/10 prime? True Let r(w) = 779*w**3 - 5*w**2 + 23*w - 52. Is r(3) prime? False Let s(j) = -j**3 - 41*j**2 - 77*j + 53. Let o be s(-39). Let n(w) = 4*w**3 + 7*w**2 - 19*w + 15. Is n(o) prime? True Is 228/(-6726) + 5800827/177 prime? False Let z = 541891 + -247430. Is z a prime number? True Suppose 4*w + t = 85704, -4*t - 23308 - 126697 = -7*w. Is w a composite number? True Let j(d) = 50*d**2 + 16*d - 57. Suppose 0 = 2*k + 6*g - 11*g + 5, -12 = -4*g. Is j(k) prime? False Let c(k) = -k + 10. Let v be c(10). Suppose v = -10*w + 606 - 196. Suppose -w*s = -45*s + 812. Is s prime? False Let v = 758 - 1270. Let t = 2429 - v. Is t a composite number? True Let j be (-60)/(-27) + (-6)/27. Suppose x = -3*y + 6, 5*y - x - 3*x = 27. Suppose y*g + 1423 = 5*n, 3*n - j*g - 942 = -89. Is n a prime number? False Suppose -123*c + 48*c = 55*c - 57927090. Is c composite? True Let z = -229 + 233. Suppose -5*n + 5959 = -z*u, 5*n + 1347 = -2*u + 7300. Is n a composite number? True Suppose -5*t - 17*y = -12*y - 40, -2*t = 3*y - 18. Suppose 40101 = 2*l + 5*p, -7*p = -2*l - t*p + 40107. Is l a prime number? False Suppose l - 516414 = -2*g + 2*l, -5*l - 774607 = -3*g. Is g a composite number? True Suppose -2*y = 3*f + 59091, 15 = 4*f + 3. Let z = -11790 - y. Suppose r - 1332 = 5*p + 3078, 4*r + 4*p - z = 0. Is r a composite number? True Let c = 44 - 24. Suppose 74 = -2*s + c. Let j(w) = -48*w - 79. Is j(s) a composite number? False Let n(x) = 131*x**2 + 9*x - 49. Suppose -4*c + 3*f + 13 + 14 = 0, -3*c - 5*f = -13. Is n(c) a composite number? False Suppose 21 = 4*q - 3*d - 4, -5*q + 5*d = -35. Suppose q = 6*k + 4. Suppose 0 = 2*l - 5*n - 302, 2*l + 5*n = -k*n + 342. Is l composite? True Suppose 267349 = -19*d + 1795790 + 598248. Is d a composite number? True Let b(l) = -6*l + 139. Let c be b(23). Is ((-30)/5 + 4553)/c prime? True Let o(v) = 31*v**3 - 7*v**2 + 12*v + 4. Let q(p) = -15*p**3 + 4*p**2 - 6*p - 2. Let y(m) = -2*o(m) - 5*q(m). Is y(3) a composite number? False Let y be (-3)/(-2) - (-4 + (-68)/(-8)). Is 3/(-2)*2/y*8285 prime? False Suppose -44 = 3*a - 14*a. Suppose 12 = 2*j - 6*j, -a*j = -2*k + 20. Is ((-5748)/(-30))/(k/10) prime? True Let z = 10917 + 6900. Is z prime? False Let o(t) = t**3 - 25*t**2 + 20*t + 98. Let u be o(24). Suppose 0 = -u*y - 4*z + 17689 + 26721, -111025 = -5*y - z. Is y prime? False Suppose -2*x = -3*z - 120686, 6*x - 23*z - 362026 = -18*z. Is x prime? True Let a = 25417 - 15246. Let s = -7232 + a. Is s a prime number? True Let c(a) = 104*a**2 - 15*a - 20. Let p be c(6). Let h = 16425 - p. Is h a prime number? True Let q(r) = 2604*r**2 + 135*r - 34. Is q(13) prime? True Let f = -217 - -225. Is 3/(-2)*(f - (-4792)/(-12)) composite? False Let r = 34476 + 27337. Is r a prime number? True Let b(r) = -6*r + 1508. Let u(i) = 13*i + 2*i + 3*i - 13*i - 1509. Let n(m) = -2*b(m) - 3*u(m). Is n(0) a prime number? True Let m be (-3640)/(-4) + -5 + 3. Suppose -3*u = 5*x - m, -5*u + 1994 = -3*x + 492. Is u prime? False Suppose -20 = -7*r + 8. Suppose -13 - 20 = -5*t + k, -t = r*k + 6. Suppose 4*c + 1041 = d, 4*c - t*c = d - 1071. Is d a composite number? False Suppose 20 = 5*b - b. Suppose -x + 2812 = 5*l, -b*l - 2*x = 2*x - 2803. Suppose q - l = 3*f, q - 348 = -3*f + 203. Is q composite? False Let i = -5257641 - -9297992. Is i a prime number? False Let w(t) = -174*t**3 - 6*t**2 - 13*t - 18. Let r be (-1)/((-4 - 105/(-25))/1). Is w(r) a prime number? True Let l(d) = -d**2 + 15*d + 21. Let a be l(16). Suppose a*m = 3*b - b + 1641, -m = -b - 327. Is m a composite number? True Suppose -49 = -5*u + 71. Let q be ((-4164)/u)/((-1)/2). Suppose -r = -0*r - q. Is r a composite number? False Suppose 24*i + 280948 - 510448 = 725148. Is i composite? True Suppose -27*v + 17051224 = 6624229. Is v a prime number? False Let v = -20 - -26. Is (v + -10)/(-2) + 4325 a prime number? True Let c(y) = -1648*y + 118. Let i = 326 + -333. Is c(i) composite? True Let x = -21283 + 1494. Let p = -12420 - x. Is p a composite number? False Suppose b + 2545 = 8442. Let z = b + -2760. Is z composite? False Suppose -11947 = -s - 5*f, -4*f - 47692 = -213*s + 209*s. Is s prime? True Let y(d) = -82090*d - 259. Is y(-3) composite? False Suppose 0 = 2*x - 293 - 91. Suppose 396 = -4*a - p, 7*p - 5*p + x = -2*a. Is (-69040)/a - 6/(-10) composite? False Suppose 15 - 13 = -c. Let z be (-3)/(-6)*-8691*c. Suppose -2*j = j - z. Is j composite? False Let b(z) = 10986*z - 6215. Is b(7) prime? True Let a = 94250 - -176219. Is a prime? False Is (-155577340)/(-2670)*(7/2 + -1 - 1) a prime number? True Suppose 7*p = -34 + 34. Suppose 5*t + 0*t + 4*n - 86415 = p, 2*n - 86425 = -5*t. Is t a prime number? False Let q(p) be the first derivative of p**4/4 + 25*p**3/3 - 16*p**2 - 25*p + 172. Is q(-18) composite? False Let t(r) = 76*r**3 + 5*r**2 - 13*r + 14. Let q be t(5). Suppose -5*s + f = -3*s - 9564, 2*s = -4*f + q. Is s composite? False Let m = -35192 - -55970. Suppose -73*y = -79*y + m. Is y composite? False Suppose 1250*d - 1279*d = -1387273. Is d composite? False Suppose 48 = 5*q - 3*w + 2*w, 27 = 4*q + 3*w. Suppose -8248 = -q*m + m. Is m composite? False Let l be ((-8)/(-14))/2 + (-16960)/70. Suppose 213 + 2592 = 5*u. Let v = l + u. Is v a composite number? True Let m(d) = d**3 + 4*d**2 + 4*d + 16. Let z be m(-4). Let n(f) = -f**2 - f + 4153. Is n(z) prime? True Let o(c) = 10*c - 5. Suppose -3*r + 18 = 15. Let u be o(r). Suppose -u*m + 3*t + 10790 = 0, m - 1739 = -3*t + 401. Is m a prime number? False Suppose 6*j - 7*j = 8. Is (-211)/(-2 + (-7 - j)) prime? True Is 2/(2/(-18) - (-4227195)/38042325) composite? True Let n(w) = w - 6. Let l be n(2). Let o be (-58635)/(-60) + (1/l - 0). Suppose -266 = -c + o. Is c a composite number? True Let u be 0 + -1 + 5 + -5. Let s be 3/u*(-5 + 2)/3. Suppose 2*b - s*t = 283, b - 6*b - 3*t = -739. Is b a composite number? True Suppose 203*x - 30012290 = 36763545. Is x prime? False Let o be (-3)/(-1 - -4)*35/(-5). Suppose -2*a + o*a - 10086 = -m, 4*a = 3*m + 8065. Is a a composite number? False Is (-14)/91*(-13)/2*36811 composite? True Let p be (0 + 1 + 711)/((-64)/(-192)). Let w = 5627 - p. Is w a prime number? True Let t be ((-14)/5)/14 - (-13098)/(-10). Let b = 3473 - t. Is b composite? False Let r be 1*3*8/12. Suppose -4*h = 16, -h + 3*h = 4*b - 28. Suppose -2*s = r*s + c - 2777, s = b*c + 689. Is s prime? False Suppose -2*x - 32 = -2*j, -4*j - 4 = -2*x - 62. Let b(m) = -m**3 + 19*m**2 - 23*m + 36. Is b(j) composite? False Let p(s) = -101*s + 93*s
{ "pile_set_name": "DM Mathematics" }
Furniture Bærum kommune | PublishedMay 18, 2017 - Deadline June 16, 2017 cpvs 39100000, 39130000, 39151000, 39153000, 39156000, 39200000 The objective of the tender contest is to enter into parallel framework agreements with three suppliers for the procurement of used furniture and fixtures, provided that a sufficient number of suitable tenderers and tenders are submitted. Library furniture The aim of the procurement is to enter into a contract with a full-range supplier for the delivery of furniture and fittings for Sandvika Library and furnishing of Rykkinn Library. The libraries shall appear as modern and appealing. The contracting authority wants a library that appears inviting for Bærum municipality's inhabitants, both established and new library users. The contracting authority will i.a. focus on some of the strategic goals that were prepared in connection with the Library Report, which also correspond with the guidelines given in the new National Library Strategy: — Bærum Library shall appear as modern and future-oriented. — Bærum Library shall carry out active literature, knowledge and culture communication. — Bærum Library shall be a meeting place and an arena for experiences, conflict mediations, debates and cultural diversity. Fittings for Bekkestua library. The aim of the procurement is to enter into a contract with a total supplier for fittings for Bekkestua library. Bekkestua library shall be completely renovated during Autumn/Winter 2015/2016. The library shall be fitted out with new furniture and shelving. The renovation work shall, according to the plan, be completed in February 2016. The fittings shall be delivered in March 2016 at the latest. Fittings for Bekkestua library The aim of the procurement is to enter into a contract with a total supplier for fittings for Bekkestua library. Bekkestua library shall be completely renovated during autumn/winter 2015/2016. The library shall be fitted out with new furniture and shelving. The renovation work shall, according to the plan, be completed in February 2016. The fittings shall be delivered in March 2016 at the latest. Fittings for Bekkestua library. The aim of the procurement is to enter into a contract with a total supplier for fittings for Bekkestua library. Bekkestua library shall be completely renovated during autumn/winter 2015/2016. The library shall be fitted out with new furniture and shelving. The renovation work shall, according to the plan, be completed in February 2016. The fittings shall be delivered when the renovation of the premises has been completed, in February 2016. Interior of Bekkestua library The purpose of the contract is to contract with a supplier for delivery of furniture to Bekkestua library. Bekkestua library full renovation during autumn / winter 2015/2016. On this occasion, the library fitted with much furniture and shelving. Renovation work will according to plan be completed in February 2016. Delivery of fittings shall be made not later than March 2016. Interior of Bekkestua library The purpose of the contract is to contract with a supplier for delivery of furniture to Bekkestua library. Bekkestua library full renovation during the fall / winter 2015/2016. On this occasion, the library fitted with new furniture and shelving. Renovation work will according to plan be completed in February 2016. Delivery of fittings shall be made when renovating premises are completed, in February 2016. Interior of Bekkestua library Bærum kommune | PublishedJune 9, 2016 Winner BS Eurobib AS cpvs 39155000, 39100000, 39151000 The purpose of the contract is to contract with a supplier for the delivery of furnishings to Bekkestua library. Bekkestua library full renovation during harvest / winter 2015/2016. On this occasion, the library fitted with much furniture and shelving. Renovation work will according to plan be completed in February 2016. Delivery of fittings shall be no later than March 2016. Moving and cleaning services and more for NAV Bærum Bærum kommune | PublishedOctober 8, 2015 - Deadline November 3, 2015 cpvs 98392000, 63120000, 90911100, 90910000, 98390000 NAV Bærum need for services related to moving, storage and disposal of furniture and other belongings and move washing units for social assistance, etc. Principal intends to enter into one framework. The contractual relationship will be governed by the attached contract. In addition comes NS 8431 for washing / cleaning. The contract has a duration of one year with an option to extend one or more times up to 3 years. Maximum contract period can be of a maximum of four years, including options. Veg and VA - Johan Nygårds gate, Otta city center Asplan Viak AS | PublishedMay 31, 2017 cpvs 45000000 Sel municipality will renew the water and drainage network in Johan Nygårds gate north of Storgata. Street to be renewed with new street design. Displayed plan solutions are on a principle / sketch level, and more detailed drawings and descriptions will be added at the announcement of the competition. The project comprises 250 meters of road with a lane, bicycle field, sidewalks and furniture zone, as well as auxiliary VA remediation. New VA pipelines will also be added over Martnasplassen.
{ "pile_set_name": "Pile-CC" }
Impact of irrigation flow rate and intrapericardial fluid on cooled-tip epicardial radiofrequency ablation. The optimal irrigation flow rate (IFR) during epicardial radiofrequency (RF) ablation has not been established. This study specifically examined the impact of IFR and intrapericardial fluid (IPF) accumulation during epicardial RF ablation. Altogether, 452 ex vivo RF applications (10 g for 60 seconds) delivered to the epicardial surface of bovine myocardium using 3 open-irrigated ablation catheters (ThermoCool SmartTouch, ThermoCool SmartTouch-SF, and FlexAbility) and 50 in vivo RF applications delivered (ThermoCool SmartTouch-SF) in 4 healthy adult swine in the presence or absence of IPF were examined. Ex vivo, RF was delivered at low (≤3 mL/min), reduced (5-7 mL/min), and high (≥10 mL/min) IFRs using intermediate (25-35 W) and high (35-45 W) power. In vivo, applications were delivered (at 9.3 ± 2.2 g for 60 seconds at 39 W) using reduced (5 mL/min) and high (15 mL/min) IFRs. Ex vivo, surface lesion diameter inversely correlated with IFR, whereas maximum lesion diameter and depth did not differ. While steam pops occurred more frequently at low IFR using high power (ThermoCool SmartTouch and ThermoCool SmartTouch-SF), tissue disruption was rare and did not vary with IFR. In vivo, charring/steam pop was not detected. Although there were no discernible differences in lesion size with IFR, surface lesion diameter, maximum diameter, depth, and volume were all smaller in the presence of IPF at both IFRs. Cooled-tip epicardial RF ablation created using reduced IFRs (5-7 mL/min) yields lesion sizes similar to those created using high IFRs (≥10 mL/min) without an increase in steam pop/tissue disruption, whereas the presence of IPF significantly reduces the lesion size.
{ "pile_set_name": "PubMed Abstracts" }
Q: Integer number truncated when writing to text file in PHP? I wrote a download counter: $hit_count = @file_get_contents('download.txt'); $hit_count++; @file_put_contents('download.txt', $hit_count); header('Location: file/xxx.zip'); As simple as that. The problem is the stats number is truncated to 4 digits thus not showing the real count: http://www.converthub.com/batch-image-converter/download.txt The batch image converter program gets downloaded a couple hundred times per day and the PHP counter has been in place for months. The first time I found out about this was about 2 months ago when I was very happy that it hit 8000 mark after a few weeks yet a week after that it was 500 again. And it happened again and again. No idea why. Why? A: You're probably suffering a race condition in the filesystem, you're attempting to open and read a file, then open the same file and write to it. The operating system may not have fully released its original lock on the file when you close it for reading then open it for writing again straight away. If the site is as busy as you say, then you could even have issues of multiple instances of your script trying to access the file at the same time Failing that, do all your file operations in one go. If you use fopen (), flock (), fread (), rewind (), fwrite () and fclose () to handle the hit counter updating you can avoid having to close the file and open it again. If you use r+ mode, you'll be able to read the value, increment it, and write the result back in one go. None of this can completely guarantee that you won't hit issues with concurrent accesses though. I'd strongly recommend looking into a different approach to implementing your hit counter, such as a database driven counter.
{ "pile_set_name": "StackExchange" }
The teenager artist Ana is raised in Ibiza by her German father Klaus in a naturalist lifestyle in a cave. One day, she meets a woman called Justine that invites Ana to move to Madrid, offering education and economical support, to live in an old house with other artists having classes of Arts and with the only commitment of studying. Ana befriends her mate Linda (Bebe) and falls in love for the problematic Said, having her first sexual experience with him. After a period together, Said leaves Ana, and then she is hypnotized by Anglo, discovering her past lives and deaths.
{ "pile_set_name": "Pile-CC" }
"It takes courage to grow up and become who you really are". -E.E. Cummings Hi, and welcome to my blog! I'm Oona, a finnish girl living near Helsinki, Finland. Get a grip-blog is my way of sharing the sweetness of life, expressing my style and and inspiring you. Your eyes will be catching lots of outfit-posts, but also my secret recipes and even my normal life have space in this blog. If you're in a need for photography services, check out my website www.oonalinna.com! For matters relating to my blog, contact me via email getagripblog@gmail.com
{ "pile_set_name": "Pile-CC" }
Molecularly imprinted spin column extraction coupled with high-performance liquid chromatography for the selective and simple determination of trace nitrophenols in water samples. In this study, we developed a simple and selective spin column extraction technology utilizing hydrophilic molecularly imprinted polymers as the sorbents for extracting nitrophenol pollutants in water samples (the East Lake, the Yangtze River, and wastewater). The whole procedure was achieved by centrifugation of the spin column, and multiple samples were simultaneously processed with a low volume of solvent and without evaporation. Under the optimized condition, recoveries of nitrophenol compounds on the spin column packed with hydrophilic molecularly imprinted polymers ranged from 87.3 to 92.9% and an excellent purification effect was obtained. Compared with activated carbon, multi-walled carbon nanotubes, LC-C18 sorbents, hydrophilic molecularly imprinted polymers exhibited a highly selective recognition ability for nitrophenol compounds and satisfactory sample extraction efficiency. Subsequently, the spin column extraction coupled with high-performance liquid chromatography was established, which was found to be linear in the range of 2-1000 ng/mL for 2,4-dinitropehnol and 2-nitrophenol, and 6-1000 ng/mL for 4-nitrophenol with correlation coefficients greater than 0.998. The detection limits ranged from 0.3-0.5 ng/mL. It is shown that the proposed method can be used for the determination of trace nitrophenol pollutants in complex samples, which is not only beneficial for water quality analysis but also for environmental risk assessment.
{ "pile_set_name": "PubMed Abstracts" }
Q: Proving the set of all finite or countable unions of intervals is not a Sigma Algebra I would like to extend on a question I asked here Consider a set $J$ of all (open, closed, half-open, singleton, empty) intervals on $[0,1]$ Now consider further a set $B$ which is the set of all finite or countable unions of elements of $J$. According to the text I'm reading, $B$ is not a $\sigma$-algebra. I suspect that it is because it is not closed under countable intersections, however I can't understand why. Surely any countable intersection is simply an interval or the empty set? Can't come up with any sort of contradiction. A: The complement of the middle-thirds Cantor set is a countable union of (open) intervals. However, the Cantor set itself has uncountably many elements, and any two of them are separated by a point not in the Cantor set. So no countable union of intervals can produce it. Thus $B$ is not closed under complement and therefore it is not a $\sigma$-algebra.
{ "pile_set_name": "StackExchange" }
Substance use risk behaviors and decision-making skills among cancer-surviving adolescents. The aims of this study were to compare decision making and substance use risk behaviors of a cohort of cancer-surviving adolescents to those of 2 earlier cohorts as well as adolescents in the US general population and to determine the relationship of decision making to substance use risk behaviors. This correlational study used a semistructured interview at the time of the annual clinic visit to obtain data. Teen cancer survivors (N = 76), ages 14-19 years, were recruited from 5 clinics within the United States. Adherence to quality decision-making skills reported by different cancer-surviving adolescent cohorts appears to remain the same over time. However, reported substance use risk behaviors by these teen survivor cohorts have decreased over time. The prevalence rates for lifetime use for the 2004 cohort of teen cancer survivors were 25%, 49%, and 16%, for cigarettes, alcohol, and marijuana use, respectively. These rates are somewhat lower than those in the US general population; yet, they are high given the health vulnerability of cancer-surviving adolescents. Poor-quality decision making was significantly associated with higher levels of substance use risk behaviors for these teen cancer survivors. In conjunction with the statistics related to higher health risks in this vulnerable group of teens, these findings support continued efforts in developing interventions for risk behavior counseling.
{ "pile_set_name": "PubMed Abstracts" }
Plans Speak Farsi Complete Course: This is the main course and the most popular course which contains all of the 24 Farsi videos (12 hours). This is all you need to be able to speak in Farsi. Videos are available online, and for download. ​ Other Courses: ​ Premium Speak Farsi Course: This course has the exact same material as the main course. However, in addition to that, it provides the students with four hours of online personal instructor assistant and it also offers a completion certificate. Videos are available online, and for download. ​ Speak Farsi Course in 2 Packages - Package one: This is the first half of the main course. It contains the first 12 videos of the main course (6 hours). The second half (second package) will be offered to those students who already finished package one of this course. Videos are available online, and for download. ​ Speak Farsi Course in 3 Packages - Package one: This course contains the first 8 videos of the main course. [The main course contains 24 videos.] The next parts (8 videos for the second package, and 8 videos for third package) will be offered to those students who already finished package one of this course. Videos are available online. ​ -------------------------------------- Farsi Alphabet and Farsi Words Course: In addition to the above courses, for those of our students who (besides learning how to speak in Farsi) are also interested to learn how to read and how to write in Farsi, Fluent Farsi offers a Farsi Alphabet and Farsi Words Course (12 additional videos!) which works as an optional supplement to the main course and is included in all of the above plans for free. ('Optional' in the sense that you can choose to use it, or not to use it.) ​ If you are not interested to learn the Farsi alphabet, then Fluent Farsi efficiently teaches you to speak in Farsi without learning the Farsi alphabet. You choose your approach, and Fluent Farsi teaching and learning system perfectly accommodates your needs. ​ Please go to the Free Course to learn more about the details of the exact content of this optional course. ​
{ "pile_set_name": "OpenWebText2" }
Virginia Democrat gubernatorial candidate Ralph Northam finally cracked under pressure, flip-flopped, and admitted that he would sign legislation that would ban sanctuary cities in Virginia. Republican gubernatorial candidate Ed Gillespie rose in the polls in recent months by appealing to Trump’s nationalist-populist and conservative base, promising to ban sanctuary cities in Virginia and crack down on the dangerous MS-13 gang in Northern Virginia. On Wednesday, Northam said that under certain circumstances he would sign legislation that would ban sanctuary cities. “If that bill comes to by desk … I sure will. I’ve always been opposed to sanctuary cities. He knows that,” Northam said, speaking of his Republican opponent, Ed Gillespie. Northam defended his previous vote that prevented a bill banning sanctuary cities from going to the governor’s desk, calling the previous bill a “political game,” which was meant to “promote fearmongering.” In the third and final debate between Ed Gillespie and Ralph Northam, the Democrat dodged the question as to whether he would sign legislation banning sanctuary cities by arguing that Virginia currently had no sanctuary cities. Northam’s campaign is mired in controversy after a new report revealed that the Northam campaign and the Latino Victory Fund coordinated an ad that featured an Ed Gillespie supporter attempting to run over minority children. The Latino Victory Fund pulled the ad in the wake of a terrorist attack in New York City. Breitbart News reported that the race between Gillespie and Northam remains tight. The election is on Tuesday, November 7. Gillespie took the opportunity to chastise Northam, who flip-flopped about “the very bill he has bragged about voting against.” “I sincerely hope that this change of heart is real,” Gillespie said in a statement. “That Ralph Northam recognizes MS-13 is a real issue, and a serious threat, and that allowing for the creation of sanctuary cities here would only make things worse. Given his track record on this issue, I’m not sure where the lieutenant governor stands.”
{ "pile_set_name": "Pile-CC" }
The brewers of Natural Light, a staple of many college parties, announced that they are selling a special limited edition case of 77 beers. The 77-pack of cheap beer will only be available for a limited time, and will only be sold in College Park, Maryland, home of the University of Maryland. The hexagon-shaped case of 77 beers will weigh over 60 pounds and cost around $30, according to The Takeout. Natural Light, commonly referred to as "Natty Light" or "Natty Ice," decided to make the 77-pack of beer to honor their founding in 1977. Natural Light, which is made by Anheuser-Busch, is the sixth best selling light beer in the country, raking in nearly $350 million in sales annually. Photo: Natural Light
{ "pile_set_name": "OpenWebText2" }
Come On Over (play) Come on Over is a 2001 one-act play written by Conor McPherson, the Irish playwright and film director. Overview The play consists of two overlapping monologues given by Matthew, a former Jesuit priest and Margaret, his lover from the village he grew up in. Production Come On Over was produced at the Gate Theatre, Dublin, Ireland, as part of a three-play trilogy. The plays, which included works by Brian Friel and Neil Jordan as well as McPherson, ran in October 2001. McPerson directed his play, which starred Jim Norton and Dearbhla Molloy. References Category:2001 plays Category:Plays by Conor McPherson
{ "pile_set_name": "Wikipedia (en)" }
I thought it would be interesting to try to compile my Top 10 Scottish cyclists of all time, after being inspired by a podcast called the Two Johns, during an episode where they discussed a Top 10 list of American cyclists. My main criteria for this list are achievements on the international stage- be that Grand Tours, Olympic Games, World Championships or Commonwealth Games. This has been deemed by some as a limiting factor- favouring racing cyclists. But after all, isn’t racing a way to measure greatness? Anyway, some acknowledgment has been given to Scotland’s touring greats, but I doubt if I will please everyone. In addition to medals and results, other Scottish qualities are also valued, including: hard work, innovation, determination against bigger, stronger opponents, honesty, and other “underdoglike” traits such as riding well but not winning, or being a contender for a big victory. As ever, this type of list is never definitive, all about opinions, and really just a bit of fun. Please feel free to comment. 10. Jason McIntyre Jason McIntyre’s achievements came in the face of adversity, and this often typifies Scottish sport. Tragically his career was cut short by a fatal road accident, which ended his life just as his career was belatedly taking off. 10th spot in my list could have gone to any number of riders, but I give it to Jason for the way he battled back from hardship in his personal life to become a National champion in his 30s, achieved so much from a relatively remote base in the highland, with little support, and looked to have much more to offer before his career was cut short. 15th Commonwealth games road race 2002 first Scot to win the British 25-Mile Championship- 2006 and 2007 Beat Graeme Obree’s 10 mile TT record – the mark of 18m 47s still stands (2017) Tour of the Trossachs 50 mile TT – great write-up here on Pez 9. Mark Beaumont Mark Beaumont’s 2008 round the world record- 18,297 miles (29,446 km) in 194 days and 17 hours- is sometimes hotly debated as a cycling achievement, but for me it embodies the ultimate in the cycle touring tradition. For some it is a feat of logistics as much as cycling, but consider this- 100 miles a day for nearly 200 days, in all weathers and conditions. Carrying 30-4kg of equipment. Unsupported. Logistics is naturally a challenging part of this feat, but then logistics is a part of any cycle tour, or even a road race. The team support for the Tour de France is a vital part He didn’t just cycle around the world at a leisurely pace. He did it faster than anyone else, ever, smashing the previous record by 80 days. Beaumont took the round-the-world to another level, and it is being attempted in 2009 by another cyclist, Compare this to Ellen McArthur, who sailed round the world in record time- an achievement that necessitated overcoming logistical problems as well as supreme endurance. The world sailing circumnavigation record is a prized goal, but for some reason, the cycling equivalent was not. Beaumont’s record has taken this event to the next level, and I’d say Beaumont is the McArthur of the cycling world, and his feat should be recognised more prominently. Mark’s record was subsequently beaten several times, and in 2017 he is embarking on a new round the world record – in just 80 days. 8. Craig Maclean Craig Maclean raced, and won, at the top of the track scene for several years in the late 90s and early 00s. As such he will always be in Hoy’s shadow somewhat, but with Ross Edgar he was part of a formidable Scottish team sprint team at the 2006 Commonwealth Games. His other medals include UCI Gold and Olympic Silver- Craig was a very strong rider and a consistent performer for many years. Gold Team Sprint 2002 UCI World Track Championships Gold Team Sprint 2006 Commonwealth Games (Scotland) Silver Team Sprint 2000 Sydney Olympics Silver Team Sprint 1999, 2000 UCI World Track Championships Bronze Team Sprint 2001, 2003, 2004 UCI World Track Championships 1st place: various individual and team sprints events, British National and World Cup series level. Read about Craig Maclean’s achievements within Chris Hoy’s autobiography. He is also part of the rise of British track cycling recounted the in Heroes, Villains and Velodromes book. 7. Brian Smith Brian Smith won the 1991 British professional road race championship (his first pro season) and went on to complete the 1994 Giro d’Italia for Motorola, on a team that included Andy Hampsten and a young Lance Armstrong. Internationally he represented Scotland at the 1984, 1990 and 1998 Commonwealth Games and Britain at the 1996 Atlanta Games. He also won races in the USA for Plymouth Racing Team. He continues to have an influence in the Scottish cycling world through the Braveheart Cycling Fund, which supports young Scottish riders of all disciplines. A worthy cause- I look forward to seeing the next Scot challenging for the Tour de France! Selected palmares 3 Commie Games ’86, ’90 + ’98 Twice GB PRO Champ ’91 + ’94 (2nd ’92 +’93) 1994 GP Midbank first European victory for Motorola CT 6. Billy Bilsland A stellar international amateur career ensued with stage victories in The Tour of Czechoslovakia, the Peace Race, the Tour de l’Avenir, the Scottish Milk Race and the Milk Race. He rode the 1968 Olympics, making it into the winning break until a puncture ended dreams of a medal. -He recounts his 14th place in the 1971 world championship road race in an interview here. He raced for three years as a pro with Peugeot, finishing 11th in Paris – Tours and 10th in the Tour of Lombardy. Making it on the continent in those days was not easy- as Ken Laidlaw, Robert Millar and Graeme Obree could attest to. After retiring, he set up a bike shop, which his son now runs. Other palmares 2nd British national road race 1974 3rd British national road race 1973 Bilsland was part of an early generation of British cyclist to make forays into Europe. The best account of it is William Fotheringham’s book, Roule Britannia. 5. Ken Laidlaw Laidlaw is somewhat of a forgotten man of Scottish cycling. He is not frequently mentioned, but finishing the world’s greatest bike race is a big achievement in itself. From a British point of view, this might sound like a ‘plucky loser’ tag, but it isn’t. Over the Channel, the French afford considerable respect to the last man- the Lanterne Rouge- because to finish the Tour is such a feat. Ken was interviewed in 2004 by a local newspaper in Savannah, Georgia. Re gave an account of the 1961 TdF, and what racing was like then. “In my tour, we averaged 139 miles a day – flat out”. In those days, the tour was 800 miles longer than it is today.” Without the nutrition, sports science and bike technology of today, it would have been significantly more difficult. Interview is reblogged here. Selected palmares: First Scot to finish the Tour de France 1961. Most aggressive rider of the day during stage 16 1961- led the stage but fell back with 7km to go to finish 19th. 65th place overall- only 72 of the 132 riders finished. 6th Briton to finish the Tour? ref Ken Laidlaw is also mentioned in William Fotheringham’s book, Roule Britannia. 4. David Millar David Millar’s career as a whole must be viewed in the context of the 2-year ban he received in 2004 for admitting the use of EPO. However his honesty and determination to spread an anti-doping message have set him apart from other banned riders, and he is now seen as an ambassador for clean cycling. For me, he took the punishment and then went on to make significant amends- not only being outspoken, but working with WADA, and helping to establish a stringently clean, independently-tested team in Slipstream. Although the suspension does tarnish his reputation, he won Grand Tour stages and races before and after it and these results still put him amongst the most successful Scottish cyclists of all time. He was the youngest ever holder of the yellow jersey in 2000. It is tempting to ‘relegate’ him a place or two for the doping, but I feel his anti-doping work have made up for it, and even the non-doped results are still stronger than any other Scottish road racer. There is a slight question over his Scottishness though- he was born in Malta, and has lived in Hong Kong, England and Spain. His parents are Scottish and he was selected (but did not compete) for Scotland in the 2002 Commonwealth Games. He is generally known as a Scot (as listed as Scottish on the Garmin-Slipstream site, and frequent media references). I would be very interested to know his personal feelings towards Scotland and whether he has a connection to the place. Tour de France 1 stage win: 2000 stage 1. (2 stage wins during doping period? 2002 stg 13, 2003 stg 19) Vuelta a Espana 2 stage wins: 2006 stage 14, 2009. (2 stage wins during doping period? 2001 stg 1, 2003 stg 17) UK Time Trial champion and Road Race champion 2007 Tour of California 2008- 2nd place overall. various other palmares David Millar has published two books: Racing Through the Dark – establishing his career, doping, and subsequent renewal The Racer – an inside look at the life of a bike racer 3. Graeme Obree The value of Graeme Obree‘s achievements is heightened by the fact that he undertook them as an amateur and in the face of great adversity. For me this embodies the Scottish underdog spirit. He broke the hour record and won world pursuit championships on a bike he designed and built himself, and in the face of obstruction from the UCI. He overcame personal problems to achieve these results and as such, is an inspiration to cyclists and people everywhere. After the records, he entered the pro cycling world at the height of the doping era. When he refused to take anything, he was unceremoniously dumped- a great shame that we did not get a chance to see more of him. Now in 2009, he has announced he will attempt the hour record again. As before, he has pushed the bounds of innovation and created his own bike, to meet the UCI regulations but to match his riding style. He has massive gear ratios, a custom hand position, but traditional frame and wheels. Good luck Graeme! Selected palmares: World hour record: twice holder, in 1993 and 1994. Beat a nine-year record held by all-time great Francesco Moser. Beaten first by Chris Boardman, before regaining the record and then Miguel Indurain. Individual pursuit (4000m) world champion 1993 and 1995. British 10mile Time Trial record holder- 18:57. Graeme Obree’s autobiography is an honest and dark account of his struggles and triumphs Ed Pickering’s book, The Race Against Time, focuses on the Obree-Boardman hour record rivalry His training manual, The Obree Way, shows you specific advice and ways to think outside the box. His wife has also published a book, Mrs Flying Scotsman, recounting the highs and lows during their time together. 2. Sir Chris Hoy Track champion Chris Hoy’s three gold medals on the track at Beijing 2008 speak for themselves. 3 golds at a games is was the best medal haul for any Brit, for over 100 years. This is before you mention his numerous world championship medals at the kilo, the team sprint and the keirin. And his valiant attempt at the outright kilo world record, where he came up 0.005 seconds short at altitude in La Paz in 2007. He has simply dominated short-track racing for almost the past decade. And he made it look so easy. Good luck for 2012 Sir Chris, we’ll be rooting for you. [2015 – edit – Chris Hoy continued to win with 2 gold medals in 2012. He set a new World Record in the team sprint and his performance to win the keirin is one of the most outstanding performances I have ever seen, making him the most decorated British Olympian of all time. I’d put him #1 if I was rewriting this list today] Chris Hoy’s autobiography charts his start in BMX racing through to his olympic success. Chris Hoy also now writes the Flying Fergus series of children’s books. 1. Robert Millar Robert Millar’s King of the Mountains win, and his fourth overall place in the 1984 Tour de France puts him ahead of any other Scottish (or even British) cyclist, so for those two achievements, he is the #1. But he also has three Tour stage wins to his name, as well a Giro and a Vuelta stage win. He might have won the Vuelta a Espana, had Spanish riders (of different teams) not worked together against him to preventing him retaining his time advantage in the GC. Millar is known an enigmatic and elusive character. It is the stubborness of this quality (also displayed in several of Scotland’s other top cyclists) which afforded him the single-minded determination to succeed in the sometimes unwelcoming world of European cycling. His achievements and subsequent disappearance are recounted by Richard Moore in his book, In Search of Robert Millar. Tour de France 3 stage wins KOM winner 1984 Tour De France (first time a Briton had won a major Tour classification) 4th overall 1984 Tour De France (highest Tour classification of any British rider, ever) Giro D’Italia 1 stage win KOM winner 1987 2nd overall 1987. Vuelta a Espana 1 stage win. 2nd overall in 1985 and 1986 KOM winner 1987 NOTABLE OTHERS Evan Oliphant, currently a pro in the british peloton, is going well and can progress further. He was three-time Scottish road race champion riding for Plowman Craven although he has recently switched team to Scottish-based Endura Racing (June 2009). Ian Steel was a Glaswegian rider who won international recognition as winner of the Warsaw-Prague road race (Peace Race 1952?), and he also won the Tour of Britain in 1951, including three stages, and the British National Road Race championship in 1962. Jackie Bone of the Glasgow Wheelers acquired national fame when he became the first British cyclist to attain an average speed of more than 20 mph in a 12-hour race. Jackie also rode as a member of the British team in the road race at the 1936 Berlin Olympics. George Berwick is another great in the touring/randonneur tradition, and although not a racer with competitive palmares to his name, he still holds numerous records for touring routes and annual mileage totals. Tommy Chambers– cycle touring great who would ride 18,000 miles a year, and was once credited in the Guinness Boook of Records. Davie Bell, pioneering off road cyclist and tourer/randonneur extreme, and for years had one of Scotland’s toughest one-day races held annually in his honour. David Bell’s The Highyway Man cycling column, was published as a book that is now difficult to find. His articles were originally published in the Ayrshire Post, and subsequently published as a book in the 1970s. Ross Edgar, a prolific track racer who also represented Scotland but was born and lives in England. Silver: Keirin 2008 Beijing Olympics, Team Sprint 2007 UCI world champs; Bronze Keirin 2007 UCI world champs; Gold 2006 Team Sprint Commonwealth Games. Caroline Alexander, born in Lancashire but represented Scotland. Good palmares, and the only mountain biker in and around this list- strange with the quality of Scotland’s trails. British National Mountain Bike Champion (XC) 6 times, 1995 European Cross Country Champion, 1998 British National Cyclo-cross Champion, 2nd UCI Mountain Bike World Cup Series 2 times (according to wikiP).
{ "pile_set_name": "OpenWebText2" }
Local intra-arterial thrombolysis in the carotid territory: does recanalization depend on the thromboembolus type? Little is known about whether recanalization of carotid territory occlusions by local intra-arterial thrombolysis (LIT) depends on the type of the occluding thromboembolus. We retrospectively analysed the records of 62 patients with thromboembolic occlusions of the intracranial internal carotid artery (ICA) bifurcation or the middle cerebral artery who were undergoing LIT with urokinase within 6 h of symptom onset. We determined the influence of thromboembolus type (according to the TOAST criteria), thromboembolus location, leptomeningeal collaterals, time interval from onset of symptoms to onset of thrombolysis, and patient's age on recanalization. The thromboembolus type was atherosclerotic in six patients, cardioembolic in 29, of other determined etiology in four, and of undetermined etiology in 23 patients. Thirty-three (53%) thromboembolic occlusions were recanalized. The thromboembolus location but not the TOAST stroke type nor other parameters affected recanalization. In the TOAST group of patients with cardioembolic occlusions recanalization occurred significantly less frequently when transoesophageal echocardiography showed cardiac thrombus. The present study underlines the thromboembolus location as being the most important parameter affecting recanalization. The fact that thromboembolic occlusions originating from cardiac thrombi had a lower likelihood of being resolved by thrombolysis indicates the thromboembolus type as another parameter affecting recanalization.
{ "pile_set_name": "PubMed Abstracts" }
Mice homozygous for disruptions in this gene display abnormalities in telencephalic neurons, reduced long term potentiation, and behavioral abnormalities including hypoactivity, reduced anxiety, and learning deficiencies.
{ "pile_set_name": "Pile-CC" }
Perhaps I just have a bias against parallel dimensions (as evidenced from my interpretation of Silent Hill's otherworld), but I want to take some time to clear up what might be a mis-conception in the conventional wisdom interpretation behind Dark Souls' multiplayer summoning mechanics. Dark Souls co-op is not necessarily based on parallel dimensions, as many players seem to assume. It might, in fact, be intended to be an abstraction of some kind of time travel. I've noticed that many players online already seem to refer to the multiplayer mechanic of these games in terms of time travel, but I've yet to see any wikis, lore videos, or blogs that seem to explain multiplayer as a time travel mechanic. I want to preface this analysis by stating that I'm not asserting that the following explanation is the absolute, 100% correct interpretation of the mechanic. Individual players may disagree based on their own reading of the game, and I'm personally somewhat conflicted on the topic myself. I merely want to propose this as a possible alternative to the defacto "parallel worlds" interpretation. I'm going to point out in-game evidence that supports the idea that Dark Souls' multiplayer is based on time travel, but there is also in-game evidence and mechanical evidence that flat-out contradicts that interpretation. I will address those contradictions as well. So that being said, please keep an open mind, and enjoy the read! The summoning mechanic There are two games in the series that are not part of the Dark Souls franchise, and which have different in-game explanations and rules for the same multiplayer features (more or less). Those games are, of course, Demon's Souls and Bloodborne. Both have asynchronous multiplayer and summoning mechanics that work similarly to Dark Souls. Demon's Souls summoning operates under the idea of summoning the spirit of a fellow adventurer who's soul is trapped in the Nexus. This is why you must be in soul form in order to be summoned. Bloodborne's beckoning operates [similarly] under the principle of manifesting hunters out of dreams (which seems to operate under a similar cyclical paradigm to Dark Souls, but I'm not 100% sure). In Dark Souls, you aren't necessarily summoning ghosts (as you do in Demon's Souls), since the undead in Dark Souls are more akin to zombies than ghosts. Also, characters in Dark Souls can leave summon signs whether they are hollowed (dead) or in human form (revived), which is a significant alteration from Demon's Souls. A lore reason for summoning is provided in Dark Souls: Solaire explains to us how summoning works: "We are amidst strange beings, in a strange land. The flow of time itself is convoluted; with heroes centuries old phasing in and out. The very fabric wavers, and relations shift and obscure. There's no telling how much longer your world and mine will remain in contact. But, use this, to summon one another as spirits, cross the gaps between worlds, and engage in jolly co-operation!" Both Solaire's dialogue, and the White Sign Soapstone (along with other online play items) make references to other "worlds", which leads to many jumping to the conclusion that each player's game is a sort of parallel universe within the Dark Souls lore. However, this may not necessarily be correct. Both Solaire's dialogue and the soapstone also provide explanations for these worlds: "time is convoluted | distorted". This seems to be the explanation for what is meant by "worlds", and it seems that Solaire and the in-game descriptions may be using "time" and "world" interchangeably (could it be a translation / localization issue?). The phrasing in the white soapstone's description joins "the flow of time is distorted", and "the White Soapstone allows undead to assist one another", into a single, compound sentence, which definitely implies that the two phrases (and ideas) are linked. "Online play item. Leave summon sign. Be summoned to another world as a phantom through your sign, and defeat the area boss to acquire humanity. In Lordran, the flow of time is distorted, and the White Sign Soapstone allows Undead to assist one another" The dialogue of Saulden (the Crestfallen Warrior of Dark Souls II) is even more explicit... There has been a sad dearth of hard science fiction movies in recent memory. While comic book and alien invasion movies and the like have been proliferating (and some of them have been very good), there haven't been as many movies that have been willing to take science fiction subject matter seriously. The only mainstream releases that I can think of off the top of my head are District Nine, Inception, and Gravity, neither of which really wowed me. District Nine was alright, but I felt that its racism allegory fell flat since the aliens themselves considered the majority of their species to be mindless automatons. Inception was a fun ride, but nowhere near as clever or complicated as people made it out to be. And Gravity wasn't really "science fiction"; more like just "space drama" disaster porn. That's why I've been very excited about Christopher Nolan's new movie, Interstellar. It had all the trappings of a modern-day 2001: A Space Odyssey, which (confusing psychedelic ending aside - read the book!) is one of the best hard science fiction movies ever made. Interstellar definitely lived up to this expectation, but it's a much gloomier and more depressing epic than Arthur Clark and Stanley Kubrick's masterpiece. The space travel plot is, in fact, almost identical to 2001. A crew must travel in hypersleep in an experimental spacecraft to investigate an anomaly around Saturn (the original 2001 book placed the monolith in orbit around Saturn, but it was changed to Jupiter for the film). The sleeping crew is even overseen by intelligent robots. The rising action has conspiratorial undertones, and the climax dives deep into metaphysical fringe science. Interstellar[LEFT] is very similar to Arthur Clark and Stanley Kubrick's 2001: a Space Odyssey[RIGHT] in its detail-oriented depiction of space travel. A lot of the science in the first half of the movie is solid, and it's actually integral to the narrative and drama between the characters. The second half takes a lot more creative license for the sake of plot. There are significant issues with relativity with regard to a black hole, metaphysical stuff about a "ghost", and some ham-fisted mumbo jumbo about the power of love transcending time and space. But despite some silly science, there's a very real possibility that audiences might leave the theater with a better understanding and appreciation of relativity. A gamer's thoughts Welcome to Mega Bears Fan's blog, and thanks for visiting! This blog is mostly dedicated to game reviews, strategies, and analysis of my favorite games. I also talk about my other interests, like football, science and technology, movies, and so on. Feel free to read more about the blog. And check out my colleague, David Pax's novel Without Gravity on his website! Featured Post Sekiro may be FromSoft's first Souls-like with a truly exclusionary difficulty06/10/2019I never got into Tenchu because the demos were too hard for younger me. Oh, boy, was this a tough game to play and review! Frequent readers should probably know that I'm a huge Souls-Borne fan -- to the point of writing strategies and lore analyses. Sekiro is a bit different, however. It's much further divorced from Dark Souls... Random Post Madden 18 is for pay-to-win online competitors, not for me09/29/2017Oh boy, booting up Madden 18 for the first time was like watching a slow motion train wreck -- before the train had even left the station. After a few start-up questions to set my play style and difficulty level, the game immediately loaded into a demo game of a Superbowl rematch between the Falcons and Patriots. Except it crashed...
{ "pile_set_name": "Pile-CC" }
Q: How to save dynamic select list value into config table in Drupal 8? I wanted to show list of fields per content type in admin config form. After saving the form, selected list value should get save into config table. public function buildForm(array $form, FormStateInterface $form_state) { foreach (node_type_get_types() as $content_type) { $entity_type_id = 'node'; $fields = \Drupal::entityManager()->getFieldDefinitions('node', $content_type->get('type')); if ($fields) { $options = array(); foreach ($fields as $field_name => $field_definition) { if (!empty($field_definition->getTargetBundle())) { $options[$field_name] = $field_definition->getLabel(); } } $form['test']['test_' . $content_type->get('type') . '_field'] = array( '#type' => 'select', '#title' => $content_type->get('name'), '#options' => array_merge(array('0' => t('Auto')), $options), '#default_value' => $config->get('test_' . $content_type->get('type') . '_field') ? $config->get('test_' . $content_type->get('type') . '_field') : '', ); } } } Here is submit handler public function submitForm(array &$form, FormStateInterface $form_state) { foreach (node_type_get_types() as $content_type) { $this->config('test.settings') ->set('test_' . $content_type->get('type') . '_field', $form_state->getValue('test', 'test_' . $content_type->get('type') . '_field')) ->save(); } parent::submitForm($form, $form_state); } After saving admin form, test_article_field and test_page_field is getting saved instead of selected field. Any help would be appreciated? A: There is some problem in the submit handler. Replace $this->config('test.settings') ->set('test_' . $content_type->get('type') . '_field', $form_state->getValue('test', 'test_' . $content_type->get('type') . '_field')) ->save(); line with $this->config('test.settings') ->set('test_' . $content_type->get('type') . '_field', $form_state->getValues('test_' . $content_type->get('type') . '_field')) ->save(); Hope that this helps you.
{ "pile_set_name": "StackExchange" }
Need a mood boost? Listen to these upbeat songs and they'll be sure to put a smile on your face.
{ "pile_set_name": "OpenWebText2" }
Sees you have something on your face Texts you 117 shares
{ "pile_set_name": "OpenWebText2" }