text
stringlengths 1
3.78M
| meta
dict |
|---|---|
Mossad's 'I've Got a Secret' Pays Off in 'Debt'
August 31, 2011
Ménage a Mossad?
Three is not the charm as deployed in The Debt, which goes through the trials and terror of a trio of Mossad agents of the '60s inexcusably failing to execute a plan to kidnap and carry a Nazi war criminal from his disguise of a life in East Berlin to Israel for prosecution.
In their failure comes the success of The Debt, an enormously entertaining and enterprising remake of the Israeli film Ha-Hov(2007), in which the Israeli secret service serves up a totally different picture of what had been shown as honed at efficiency and excellence.
Mossad post-Munich was one mission.
Mossad as messed up in The Debt quite another.
Which is what we get in The Debt, which owes more than a paycheck to director John Madden, whose depiction of the maddeningly complex kidnap scheme and ineptitude of the trio chills as it spills out a diorama of deception and decayed morality.
Any crypto messages about krav maga? The Cambridge-educated director laughs at the mere idea that he has taken a chop at the Israel martial art so artfully displayed in The Debt. Yes, he kids, it helped him get what he wants on set: "I would yell, 'Keep out of my way!' "
It was his own take on cinematic art -- not the martial kind -- that got him his way and that earned respect, with acclaim and accolades coming for Ethan Frome, TV's Prime Suspect: The Lost Child (starring Debt headliner Helen Mirren); Her Majesty, Mrs. Brown, Shakespeare in Love (an Oscar nominee for his work on the Oscar-winning pic) andProof.
Proof that you can improve on a genre -- and The Debt pays off as topnotch thriller-chiller material -- is his upgrade of a take on Ha-Hov, which Madden viewed as "a chamber piece" and then proceeded to put bullets in the chambers to fire off his own victory of a version. (Debt producer Eitan Evan served in the same capacity on the Israeli original.)
As Mossad misfits, the three agents are no match that Yenta would be proud of: All damaged psychologically by their links to Holocaust tragedy, the two men and one woman fall in lust and loss in a romantic roundelay that makes for a Mossad moshpit.
Is This Any Way to Conduct Espionage?
Love, look at the three of them? Where's their professionalism and precision, the dispassionate dimension conjured up by years of living dangerously?
"It's a useful reminder," reminds Madden, "that there was an ad hoc quality to Mossad in its early years, and that things" -- including sex and the sedition -- "don't always go by the plan."
The acclaimed director of Broadway's Grown Ups (1981), cartoonist Jules Feiffer's fiery three-dimensional evocation of a Jewish family at war with itself, Madden's mature approach to art pays off again here. "I resist the kind of simplification" seen in other story lines of relationships, he concedes.
"Complexity is the point."
He offers a tip of the hat also to moviegoers who get that point: "Audiences deserve to be treated as grown ups."
And here, in The Debt -- fiction at its most convincing -- purchasing an adult ticket gains admission to a confession that the Israeli secret service's secret wasn't always in service to its country.
|
{
"pile_set_name": "Pile-CC"
}
|
M2
What is 'M2'
M2 is a measure of the money supply that includes all elements of M1 as well as "near money." M1 includes cash and checking deposits, while near money refers to savings deposits, money market securities, mutual funds and other time deposits. These assets are less liquid than M1 and not as suitable as exchange mediums, but they can be quickly converted into cash or checking deposits.
BREAKING DOWN 'M2'
M2 is a broader money classification than M1, because it includes assets that are highly liquid but are not cash. A consumer or business typically doesn't use savings deposits and other non-M1 components of M2 when making purchases or paying bills, but it could convert them to cash in relatively short order. M1 and M2 are closely related, and economists like to include the more broadly defined definition for M2 when discussing the money supply, because modern economies often involve transfers between different account types. For example, a business may transfer $10,000 from a money market account to its checking account. This transfer would increase M1, which doesn’t include money market funds, while keeping M2 stable, since M2 contains money market accounts.
The Money Supply
The money supply measures the amount of monetary assets available in an economy. This is an important metric in macroeconomics, because it can dictate inflation and interest rates. Inflation and interest rates have major ramifications for the general economy, as these heavily influence employment, consumer spending, business investment, currency strength and trade balances. In the United States, the Federal Reserve publishes money supply data every Thursday at 4:30 p.m., but this only covers M1 and M2. Data on large time deposits, institutional money market funds, and other large liquid assets is published on a quarterly basis, and it is included in the M3 money supply measurement.
Changes in Money Supply
M2 in the United States has grown along with the economy, rising from $4.6 trillion in January 2000 to $12.8 trillion in June 2016. The supply never shrank year-over-year at any point in that period. The most extreme growth occurred in September 2001, January 2009 and January 2012, when the rate of M2 expansion topped 10%. These accelerated periods coincided with recessions and economic weakness, during which expansionary monetary policy was deployed by the central bank.
In response to economic weakness, central banks often enact policy that increases the money supply, promotes inflation and reduces interest rates. This creates incentive for businesses to invest and for consumers to maintain their purchase activities. The Phillips Curve illustrates an inverse relationship between interest rates and unemployment, and the Federal Reserve's mandate is to balance these two important macroeconomic statistics. M2 provides important insight into the direction, extremity and efficacy of central bank policy.
|
{
"pile_set_name": "Pile-CC"
}
|
Isaac Mizrahi FABULOUS Rollerball Customer Reviews
In the 1996 documentary Unzipped, Isaac Mizrahi quipped, “Either it works or it doesn’t.” Happily, the fashion-mogul’s debut scent definitely falls in the former category. With bright citrus and soft floral notes, the blend is fresh and sweet without being overly girly. And yes, as the name implies—it will make you feel fabulous no matter what.
Springtime floral
I am so happy with this scent! It is bringing spring to me during a bitter cold February. It's a very good scent. It's not overpowering and cloying, which is my problem with some floral scents. It's so very feminine and sexy. I am not kidding, I put this on and my cat came over and licked my wrist. That was a puzzling one, certainly, but he must enjoy it as much as I do. This is going to be my go-to scent for the coming months and I think it would make a "fabulous" gift as well.
5
Was this review helpful to you?
Yes |
NoWas this review helpful to you?
Yes |
No
Floral
Fabulous has a delicious scent that reminds me of a spring wild flower meadow with a dash of vanilla and orange. It's so subtle that it won't be overpowering, but you'll pick up hints of fragrance as your wrist meets your nose during the day.
4
Was this review helpful to you?
Yes |
NoWas this review helpful to you?
Yes |
No
Lovely fragrance
I'd been looking for this perfume for quite some time and never could find it in stores. I snatched it up as soon as I saw it on Birchbox and I don't regret it. It smells amazing! I've had a few people compliment me on how nice and fresh it smells, without being too flowery. I'd like to purchase the full-size bottle soon.
5
Was this review helpful to you?
Yes |
NoWas this review helpful to you?
Yes |
No
A New Favorite!
I absolutely LOVE this scent. I recieved the sample as part of the "Be Bold" gift with purchase from my most recent order. I had never smelled the fragrance before but it is now one of my favorites. It is rare for me to find a fragrance I truly love, and I've found myself wanting to use it more and more in place of my usual perfume. This is musky, yet floral and super feminine without being too heavy a scent. The roller ball fits perfectly in my purse or clutch (it's the size of a lip gloss or mascara tube), so as soon as it runs out I'll probably need to get another!
5
Was this review helpful to you?
Yes |
No1 of 1
found this review helpful.
Was this review helpful to you?
Yes |
No
LOVE this perfume
This little rollerball not only comes in a great package, but it's a great fragrance that makes me smell fresh all day! I am a waitress so I need something to keep me smellin' great all day. This does just the trick!
5
Was this review helpful to you?
Yes |
NoWas this review helpful to you?
Yes |
No
|
{
"pile_set_name": "Pile-CC"
}
|
Methodology for the assessment of lung protection. Human pulmonary artery endothelial cell preservation using haemaccel.
This investigation was designed to show an original methodology for the assessment of lung preservation and to analyze the efficacy of a low potassium polygelin solution (haemaccel [HM]) on isolated human pulmonary artery endothelial cells. The effects of HM were compared with those of low potassium dextran (LPD), Belzer (University of Wisconsin [UWS]), and Euro-Collins solutions. The viability of the endothelial cultures was assessed by means of both total protein content and recovery of metabolic cellular function expressed as the protein synthesis rate after 6 hr and 16 hr of incubation at 10 degrees C. Our results failed to show any significant difference in the total protein content for HM, LPD, and UWS, both after 6 and 16 hr of incubation; however, the Euro-Collins-preserved sample revealed a significant drop in this parameter as early as 6 hr after the start. This finding was regarded as a clear indication of cellular cytotoxicity. In contrast, the metabolism recovery capacity of the cells varied significantly between HM and UWS at 6 hr and among HM, LPD, and UWS at 16 hr; at 6 hr, however, no significant difference was observed between HM and LPD. In conclusion, HM appears to exert a more significant effect on human pulmonary artery endothelial cell metabolism recovery than do the other fluids, thus suggesting its suitability as a long-term pulmonary perfusate.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Week Review - July 16-22, 2017
This week featured the Squirt Selects, Peewee Selects and Bantam Super Selects groups. You can catch all the action in this weeks highlight video!
Group Photos
Saturday Final Exhibition Games
There's no better way to end the week than the highly anticipated final exhibition game. Coach Steve introduces every camper and they get the opportunity to step out onto the ice, skate through the giant Heartland "H", all while the spotlight is on them. It's an NHL caliber introduction and it's always a pleasure to see the camper's enjoy the experience. Check out the Squirts, Peewees, and Bantams final exhibition games below!
New Mile Run Record!
Bryce O'Brien shattered the Peewee mile record by 6 seconds with a time of 5:34! Incredible run by Bryce and it was great to see the entire group congratulate him!
Follow us on Social
Want to stay up to date with what's going on at Heartland Hockey Camp? Follow us on our social media channels! We offer camp updates, promotions, free giveaways, and more!
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
How to Disable drawer in fragment and back back to correct fragment
I have a main Activity with a Fragment layout. The drawer has 3 option:
Fragment[1], Fragment[2], Fragment[3].
Inside Fragment[2] and Fragment[3] is one button. This button open other fragment. Fragment[4].
I want Fragment[4] without drawer but with a back button.
This is the onClick code in Fragment[2]
Fragment fragment = new InstalacionesEncontradasFragment();
Bundle bundle = new Bundle();
bundle.putSerializable("key", this.instalacionesConCategorias);
fragment.setArguments(bundle);
FragmentManager fragmentManager = getFragmentManager();
FragmentTransaction mFragmentTransaction = fragmentManager.beginTransaction();
mFragmentTransaction.addToBackStack(null);
mFragmentTransaction.replace(R.id.main_frame_container, fragment, "ACTIVIDADES").commit();
And in Fragment[4]
onCreate method:
getActivity().getActionBar().setDisplayHomeAsUpEnabled(true);
But this solution doesn't work.
How to disable the drawer? Where should I implement the back button? In Fragment[2] or Fragment[3]?
A:
You can use :
mDrawerLayout.setDrawerLockMode(DrawerLayout.LOCK_MODE_LOCKED_CLOSED);
This will lock drawer opening on swipe
Add the line
getActivity().getActionBar().setDisplayHomeAsUpEnabled(true);
in Activity which makes all fragments like Fragment 1, 2,3 and 4. May be in your case, Fragment 4 is from differenct activity than Fragment 2. So, back button press is not working
|
{
"pile_set_name": "StackExchange"
}
|
// Copyright 2014 Citra Emulator Project
// Licensed under GPLv2 or any later version
// Refer to the license.txt file included.
#pragma once
#include <optional>
#include <boost/icl/interval_set.hpp>
#include <boost/serialization/set.hpp>
#include "common/common_types.h"
#include "common/serialization/boost_interval_set.hpp"
namespace Kernel {
struct AddressMapping;
class VMManager;
struct MemoryRegionInfo {
u32 base; // Not an address, but offset from start of FCRAM
u32 size;
u32 used;
// The domain of the interval_set are offsets from start of FCRAM
using IntervalSet = boost::icl::interval_set<u32>;
using Interval = IntervalSet::interval_type;
IntervalSet free_blocks;
/**
* Reset the allocator state
* @param base The base offset the beginning of FCRAM.
* @param size The region size this allocator manages
*/
void Reset(u32 base, u32 size);
/**
* Allocates memory from the heap.
* @param size The size of memory to allocate.
* @returns The set of blocks that make up the allocation request. Empty set if there is no
* enough space.
*/
IntervalSet HeapAllocate(u32 size);
/**
* Allocates memory from the linear heap with specific address and size.
* @param offset the address offset to the beginning of FCRAM.
* @param size size of the memory to allocate.
* @returns true if the allocation is successful. false if the requested region is not free.
*/
bool LinearAllocate(u32 offset, u32 size);
/**
* Allocates memory from the linear heap with only size specified.
* @param size size of the memory to allocate.
* @returns the address offset to the beginning of FCRAM; null if there is no enough space
*/
std::optional<u32> LinearAllocate(u32 size);
/**
* Frees one segment of memory. The memory must have been allocated as heap or linear heap.
* @param offset the region address offset to the beginning of FCRAM.
* @param size the size of the region to free.
*/
void Free(u32 offset, u32 size);
private:
friend class boost::serialization::access;
template <class Archive>
void serialize(Archive& ar, const unsigned int file_version) {
ar& base;
ar& size;
ar& used;
ar& free_blocks;
}
};
} // namespace Kernel
|
{
"pile_set_name": "Github"
}
|
Citation: Khodayarian M, Mazloomi-Mahmoodabad SS, Lamyian M, Morowatisharifabad MA, Tavangar H. Response costs of mammography adherence: Iranian women's perceptions. Health Promot Perspect. 2016;6(2):85-91. doi:[10.15171/hpp.2016.15](http://dx.doi.org/10.15171/hpp.2016.15).
Introduction {#s1}
============
Breast cancer, as a global health problem, is a prevalent cancer among women, worldwide.^[@R1]^ it is, also, the most frequently diagnosed cancer among women in countries of the Eastern Mediterranean Regional Office (EMRO) and the fifth common cause of death among women in Iran.
In general, fundamental changes in the socioeconomic status among developing countries have made a shift in the lifestyles of people in these countries to those of the industrialized countries. Such a shift in the lifestyle, which is associated with reproductive, hormonal, and dietary risk factors, has led to an increase in the burden of breast cancer.^[@R2]^
It is noteworthy that the age of onset for breast cancer among Iranian women is reported to be up to ten years earlier than that in the developed countries.^[@R3]^ Epidemiological studies based on the age-specific incidence in Yazd province showed breast cancer as the most prevalent cancer.^[@R4]^ Despite the annual increase in the incidence rate of the disease among Iranian women, there is a lack of recent evidence on its various aspects in Yazd, Iran.^[@R5]^
Mammography screening has been shown to be associated with early detection and, therefore, mortality and morbidity reduction of breast cancer.^[@R6]^ Although mammography screening programs are being implemented for all older than 40 women in several countries like the United Kingdom and the United States,^[@R7]^ there is no formal mammography screening program in Iran. Unfortunately, 70% of Iranian women with breast cancer are diagnosed in the advanced stages, when it is too late for successful treatment.^[@R8],[@R9]^ It is estimated that patients with breast cancer living in the lower-income countries have lower 5-year survival rates in comparison with their counterparts in the higher-income countries at any stage of the diagnosis.^[@R10]^ Lack of mass media education and screening programs, poverty, poor access to health care facilities, cultural barriers, and poor breast awareness are associated with lower breast cancer survival in the developing countries.^[@R11]^
Based on those mentioned above and, also, the recommendation of the World Health Organization (WHO) on mammography as the only effective breast cancer screening method, it seems to be necessary to encourage Iranian women for mammography adherence (MA).^[@R12]^
There are some perceived barriers influencing the mammography behavior; for instance, Donnelly et al in a study on the Qatari women showed that socioeconomic factors and awareness of recommended national guidelines of breast cancer screening may influence breast health seeking behaviors.^[@R13]^ Moreover, Lwin reported the lack of mammography awareness among Singaporean women in a way that they did not believe on the necessity of mammography behavior.^[@R14]^ According to the findings noted by Thomas et al, Iranian women experience several barriers in relation with breast cancer prevention and control such as the lack of knowledge, personal functioning, motivation, availability of information, health communication, and support.^[@R15]^ In the present qualitative study, the framework for interview questions and data analysis was based on the protection motivation theory (PMT). PMT was originally proposed by Rogers in 1975. It is encompasses of two independent appraisal pathways resulting from fear appeals; threat appraisal and coping appraisal.^[@R16]^ people might respond adaptively or maladaptively to the health information.^[@R17]^ In the threat appraisal pathway, an increase in severity, vulnerability, and fear may result in a decrease in the probability of occurrence of the maladaptive response. In the coping appraisal pathway, people evaluate the usefulness of the behaviors (response efficacy) and their ability to perform, successfully, preventive behaviors (also called self-efficacy). Two important factors that might increase the likelihood of maladaptive response are intrinsic and extrinsic rewards (e.g., pleasure and social approval of unhealthy actions), and response costs (barriers). The key point in this theory is adaptive behavioral change, which is reinforced through motivation.^[@R18]^ Protection motivation is the result of these two cognitive pathways (i.e., intention to perform a recommended behavior like mammography).^[@R19],[@R20]^ Because of the differences exist in cultural contexts, the perceptions of women in Yazd about the breast cancer preventive behaviors may be different from those of the other countries. Thus, the findings in the other cultures may not be applicable for Iranian women. This study was designed to explore the perceptions of women about response costs of MA and to provide more insight on this cultural sensitive topic.
Methods {#s2}
=======
In this qualitative study, directed content analysis was employed to analyze the data obtained by in-depth interview approach. The semi-structured interviews were conducted after designing a flexible framework for interview questions based on the PMT. The method section was provided based on the consolidated criteria for reporting qualitative research (COREQ) guideline. In the current study, the following key question was explored: What are the perceptions of women about the response costs of MA?
The study participants were 12 women, one oncology nurse, and a breast cancer survivor, all from Yazd, Iran, who were invited to participate in the study through purposive sampling. The eligibility criteria for the women were considered to be as the following: (*a*) having the age of 35 years or higher, (*b*) not suffering from mental disorders based on their records, and (*c*) the ability to communicate. The inclusion criteria for the nurse were as follow: (*a*) being with at least one year of nursing experience in an oncology unit, (*b*) having, at least, a bachelor degree in nursing, and (*c*) being female. Breast cancer survivor and oncology nurse were elected as critical cases in this study. The critical cases were considered to be interviewed hoping to address the relations that were being studied.^[@R21]^ Since oncology nurses have close interaction with breast cancer patients and their families, they were considered as key informants or experts in the study. Their perceptions and experiences were valuable to arrive a deep understanding of the effective factors on women's breast health-seeking behaviors. Since the real experience of the participants is important in a qualitative study, a breast cancer survivor was chosen as a key informant, as well. The breast cancer survivors may have a good experience and deep understanding about the process of diagnosis and treatment of the disease. Moreover, as factors like nulliparity and the old age at the first live labor could enhance the chance of breast cancer occurrence, two old girls were interviewed as the persons at the higher risk for the disease. Thus, it was possible to get more insight about the subject. Maximum variation in sampling was considered with the participants' age, marital status, education, occupation, and the breast disease history.
The interviews were continued until data saturation was appeared. In other words, emerging all possible aspects and domains of the main theme and categories was confirmed by the researchers. The pilot interviews were conducted with three women and the final form of the interview was prepared. The framework for the interview questions was the same in all three different groups of the participants (healthy women, oncology nurse, and breast cancer survivor). Meanwhile it was very flexible because of using semi-structured and in-depth individual interviews. So, when needed, some necessary changes were made in the interview questions by the interviewer. The first researcher was the main interviewer and data analyzer. A set of 14 audio-taped interviews was carried out from September to December 2014. The other researchers, who were faculty members affiliated with the Yazd University of Medical Sciences, Yazd-Iran and Tarbiat Modares University, Tehran-Iran, monitored and revised the data analysis process, step by step, to fulfill the systematic analysis. Fourteen participants aged 35 and older participated in the study. All were living in Yazd city, Iran. [Table 1](#T1){ref-type="table"} presents further demographic data.
Table 1Participants′ demographics (n = 14)**Variables**Age, mean (SD)39.42 (4.61)Range35-48Marital status, n (%)Single2 (14.3)Married10 (71.4)Divorced2 (14.3)Education, n (%)Primary school1 (7.1)School diploma6 (42.9)Higher education7 (50.0)Occupation, n (%)Housewife1 (7.1)Employed13 (92.9)Breast disease history, n (%)Yes, Benign diseases4 (28.6)Yes, Breast cancer survived1 (7.1)No9 (64.3)
The interviews were performed with prior appointment with the participants and they lasted for 30-90 minutes in a quiet and calm room at a clinic near to the participant's home. The interviews started with open and general questions; however, the questions became gradually more detailed as the interviews were being progressed. The interviewer tried to keep the participants in the main path of the study in order to achieve the research objectives. The main focus of the interview questions were "what is the meaning of cancer in your idea?," "what factors may prevent you from doing mammography?," and "what are the ideas of the persons close to you about MA?"
The current study was an attempt to identify the response costs of MA among women in Yazd, as a part of a more comprehensive exploratory mixed method study for the first author's doctoral dissertation. Directed qualitative content analysis based on the constructs of the PMT was used to data analysis, but, in this paper the results of the qualitative data analysis on the construct of response costs were, only, reported.
Data analysis {#s2-1}
-------------
In this study, qualitative directed content analysis was performed using Burnard's 14-stage approach.^[@R22]^ Each interview was transcribed verbatim. The texts were imported into MAXQDA software version 10 for computer-assisted qualitative data analysis. The researcher read the texts several times to obtain a whole sense on the data. Unit of analysis and meaning units were considered. Open coding technique was adopted. The initial codes were organized into categories and subcategories. Different methods have been used in order to increase the trustworthiness of data analysis. For example, sufficient time was allocated for data collection and analysis. Constant comparative analysis was used throughout the process of analysis. The researcher bracketed her thoughts, preconceptions, and beliefs before and while performing the data analysis to ensure credibility. Some other strategies such as prolonged engagement with participants, faculty member's revisions, and member checks were used to enhance the rigority of the data.
Results {#s3}
=======
Analysis of the understandings of the Iranian women about their perceived response costs of MA led to formation of one main theme, two categories, nine subcategories, and 143 initial codes. Response costs factor was considered as the main theme. Psychological barriers and maladaptive coping modes were determined as categories. The subcategories underlying the category of psychological barriers were *embarrassment, worry about being diagnosed with cancer, preoccupation with underlying diseases, misconceptions about mammography, need for an accompanying person, and internalizing the experiences of the others*. The subcategories underlying the category of maladaptive coping modes were *religious faith, fatalism,* and*avoidance and denial*. Brief overview of the thematic structure of the results could be found in [Table 2](#T2){ref-type="table"}. The above mentioned categories and their related subcategories were explained separately in the following section.
Table 2Thematic structure**Main ThemeCategorySubcategoryExtracted Codes**Response costsPsychological barriersEmbarrassmentEmbarrassment of older unmarried girls because of:\
1) Narrow territory of to seek mammography\
2) Late referral to a gynecologist\
3) Being ashamed of disease follow-up\
4) Bad impression of others about reasons to go to a gynecologist\
5) Not being comfortable to announce the gynecologist visit time to the familyWorry about being diagnosed with cancer1) Worry about mammography result\
2) Worry about hearing bad newsPreoccupation with underlying diseasesSuffering from another physical problemMisconceptions about mammography1) Harm of mammography for breast tissue\
2) Uncertainty about the harmfulness of mammography raysMaladaptive coping modesNeed for an accompanying person1) Loosing time to find an accompanyInternalization the experiences of the others1) Internalization unpleasant experiences about mammography\
2) Easy access to unaware and close person to ask questions rather than health care providersReligious faith1) Lack of belief in the possibility of being affected by breast cancer\
2) Considering breast cancer as a gift of God or God\'s will\
3) turning to spirituality, praying, and putting the problem in God\'s hand for cancer treatment\
4) breast cancer: a type of punishment from the God because of errors in the pastFatalism1) chance: a determinant factor\
2) Having the feeling of lack of control or powerlessness against deathAvoidance and denial\
1) Unreal optimistism and given immunity as restrictive factors\
2) Try not to think about breast cancer
Psychological barriers {#s3-1}
----------------------
Embarrassment
Some participants stated that they were ashamed of mammography screening. In this regard, the old girls with no partner had comments different from the married women. They reported to experience a higher level of embarrassment than the married women because of their narrow territory to seek mammography, late referral to a gynecologist, being ashamed of disease follow-up, misunderstanding of the others about the reasons forgoing to a gynecologist, and, finally, not being comfortable to announce the family about the gynecologist visit. For instance, some participants reflected these concerns as follows:
"*In Yazd, when a girl goes to a gynecologist clinic, the others have a reproachful glareat her and think on what has happened that she visits a gynecologist. The family also has the same opinion*", (P8). Another participant told: "*It is mentally difficult for a girl to announce her family about visiting a gynecologist. One can easily speak about visiting a dentist, but the case for a gynecologist appointment is not so easy*" (P7).
*Worry about being diagnosed with cancer*
Worry about the mammography result is another barrier. In other words, worry about hearing bad news (being diagnosed with cancer) and have no preparedness to confront with breast cancer may reduce the women's motivation for MA. For example, one of the participants said:
"*If now I undergo mammography, the result may be OK. But I am afraid that if six months later I did the procedure, the result would be bad. Then, how should I deal with the disease. We always are waiting to hear good news. Nevertheless, I expect to be affected by breast cancer, as the disease has been occurred in my family*" (P9).
Preoccupation with underlying diseases
Women announced that suffering from another physical health problem may be a competing priority with breast cancer preventive behavior that may lead to a negative attitude toward mammography. For instance, one of the participants with diabetes said:
*"Since I have diabetes, I do not like to do anything with my physical health. I am mostly dealing with my blood sugar. Two years ago, I visited a doctor who prescribed me a medication that disturbed the level of my blood sugar. I am afraid that I visit a doctor for the breast issues, and then I had to take some medications which may increase the level of my blood sugar"* (P2).
Misconceptions about mammography
The most of the women participated in the study believed that mammography might be harmful for breast tissue. Some of them noted that breast cysts could be ruptured during mammography procedure. For example, one participant reflected her concern as it follows: "*Since I have many breast cysts and I have undergone a surgery once, I am worry about the stimulation and rupture of the cysts during mammography procedure. Won't they \[the cysts\] be pressured a lot while mammography procedure?*" (P6). Uncertainty about the harmfulness of the mammography rays was another concern mentioned by women: "*I don't know what kind of radiations mammography has? However, I have heard that it may be harmful for the body and should not be performed frequently*" (P13).
Need for an accompanying person
In the current study, the participants expressed that they need for a reliable and close person to accompany them while going to the mammography center. Because of this, they might lose the time or quite forget it. One of the participants said: "*I would like to be accompanied with a close person when going to mammography. When I find someone to be accompanied with, a long period of time has been passed*" (P5).
*Internalizing the experiences of the others*
According to the women's statements, they could be highly influenced by each other. In other words, when women talk about mammography, they may describe their unpleasant experiences about it and thus decide not to uptake the mammography test:
"*I am a hairdresser. Once, one of my customers came to me just after undergoing mammography. She was very pale and had nausea. It seems that she was compressed. For that reason, I never want to undergo mammography*" (P6).
Also in relation to breast cancer, the women may ask their questions from unaware and close persons rather than health care providers because of having easy access to them. One participant explained this matter as follows: "*Everyone asks an intimate friend; one who understands her and is available. It is not easy for me to visit a doctor and consult her*" (P8).
Maladaptive coping modes {#s3-2}
------------------------
*Religious faith*
Participants' religious beliefs have been found to be strong barriers for seeking mammography. the belief in the possibility of not being affected by breast cancer and considering it as a gift of God or God's will were other issues discussed by the participants. This consideration has been well expressed by one of the participants:
"*It is natural for people to believe in not being affected by breast cancer. Maybe God has created us in this way. If it was in another way, perhaps we were tortured. God may have put it inside us*" (P10).
Another woman said: "*It is God's will that people are being affected by breast cancer. God draws some of us for the disease. God is the one who draws*" (P7).
Participants mentioned that the best way for dealing with cancer is turning to spirituality, praying, and delegating the problem to God. For instance, one of the participants commented as follows:
"*If I were diagnosed with breast cancer, I would pray for God more and more as I believe that the doctors cannot do anything for me and only God can cure me*" (P10).
Another woman stated that having breast cancer maybe a type of punishment from God because of mistakes people do in the past. She, also, noted that: "*Being affected by cancer is related to our deeds, and when someone has cancer, God examines her or him"* (P3).
Fatalism
Women participated in the current study mainly emphasized on the role of chance as an important factor which may limit the women's power to prevent breast cancer. One of the participants quoted: "*All these things occur by chance. I think that chance plays a very important role in every event*" (P3). Another participant expressed that the cause of death for each person is being determined, previously, and an individual is considered to have a limited control over his/her death: "*Everybody must die in a way; one in a car accident, another experiences stroke, and some others may be diagnosed with breast cancer. There must always be a cause for death*" (P4).
Avoidance and denial
Some of the participants declared that they never think about breast cancer. Issues related to this subcategory were optimistic bias and an unreal assumption of being safe which may be considered as restrictive factors for mammography uptake. For instance, a participant said:
"*You know, I think I will never be affected by breast cancer, as in a proverb it is said 'human beings think that all other people will die except themselves'*" (P1).
Another participant reflected the fact as follows:
"*When I think about something, for example when I have flank pain and think about it, it seems that the pain aggravates. It is really in this way; thinking to pain worsens it. I try not to think about breast cancer and if it comes to my mind, I remove it*" (P11).
Discussion {#s4}
==========
The findings of the current study demonstrated a wide range of factors including psychological barriers and maladaptive coping modes that may affect the women's adherence to mammography. Some of the aspects are new and there is no evidence about in the literature. These new findings are valuable as they show the effect of cultural context on the breast health-seeking behaviors of the Iranian women.
In the present study, according to the participant's statements, embarrassment associated with mammography was considered as a vital response cost. This is consistent with those found by Fleming et al.^[@R23]^ The new and unique aspect of this study was the comments of the old girls about the shyness of referring to a gynecologist clinic or seeking help for breast cancer prevention. To the best of our knowledge, no report is available in the literature in this regard. The interviewer (the first author) is from Yazd city, Iran and notes that the old girls especially in the older ages are not willing to present any abnormal sign of breast or genital organs because of their fear about the opinions of the people around. In some cases, they might lose some suitable opportunities for marriage in the future. Therefore, in such a cultural context, it is considered inappropriate for an old girl to go to a gynecologist; in the other hand, the family may become remarkably worried about. Unfortunately, the old girls in Yazd are dealing with this problem and there is no evidence to compare the aforementioned results and, so, further investigation is needed.
Moreover, worry about being diagnosed with cancer was mentioned as another psychological barrier by the participants, which is in line with the findings reported by Whitaker et al.^[@R24]^
Similar with those reported by Lamyian et al,^[@R25]^ another psychological barrier found in the present study was preoccupation with underlying diseases which was considered as a part of the competing concerns.
There were, also, some misconceptions about the mammography procedure emerged during the qualitative analysis in the present study. For example, there was a belief that mammography might have severe complications for the breast tissue and, so, some participants especially those who had the history of breast cysts avoided from mammography uptake. The participants declared that they were less likely to undergo mammography because they follow what they hear from the others. Therefore, the impact of subjective norms is recalled as an important factor in the process of personal decision-making.^[@R26]^ Also, satisfaction with medical care was found to be important especially among asymptomatic women who decide to uptake mammography.^[@R27]^ Another factor was being worry about x-rays as a major barrier for mammography, which is consistent with the results of Sadikoglu et al.^[@R28]^
According to the participants' comments, it was difficult for them to go to mammography clinics alone and they prefer to be accompanied by a close person like a sister or a close friend. It was concluded that embarrassment and fear of being diagnosed with cancer may affect the women's self-esteem in MA. This issue could certainly waste the golden time for the early detection of breast cancer. Therefore, proper communication among the health care providers and women referring to the mammography centers may enhance the mutual trust and peace of mind. Accordingly, Meguerditchian et al showed that communication skills could be principal predictors of MA.^[@R29]^
As all the study participants in the present study were Muslim, religious belief was another issue that was emphasized by the participants. This concept was titled as maladaptive coping modes and grouped into three broad sub-categories. In a previous study, Zarghami stated that religion and spirituality were as significant barriers for Iranian women to seek medical screening and care in early stages of breast cancer; nevertheless, the role of such religious factors on cancer screening behaviors among women is not well understood.^[@R30]^ Some of the participants in the present study believed that being affected by breast cancer might be a God's gift. The others expressed that the disease could be a probe or punishment from God, as they may already have committed a sin or guilt in their lifetime. These findings are similar to the results of a qualitative study by Azaiza and Cohen.^[@R31]^ Moreover, Hatefnia et al showed that religious beliefs have significant association with mammography uptake among Iranian women.^[@R32]^ The study participants believed that medical treatment for breast cancer is useless and God could cure them, only. Mitchell et al declared that it is likely for delay to be happened in presenting a self-discovered breast lump among women with strong religious beliefs; especially belief in "religious intervention in place of treatment." The researchers suggested the interaction between clinicians and clergies to correct wrong beliefs to enhance breast health-seeking behaviors.^[@R33]^
Fatalism was conceptualized as "passively denying personal control" and encompasses the dimensions such as personal perceived lack of control over external events, luck, predetermination of a disease, and belief of inevitable death by a serious disease.^[@R34]^ The participants in the present study claimed that human beings have no control on his/her death and cancer diagnosis will, certainly, result in death. Spurlock and Cullins pointed out that fatalism could negatively influence breast cancer screening behaviors.^[@R35]^ Also, the results of the study conducted by Donnelly et al showed that Arab women living in Qatar reported being diagnosed with cancer as a bad luck.^[@R36]^ It was concluded that women's perceptions on cancer fatalism is a cultural issue and should be further investigated especially in countries such as Iran that holds culturally diverse population groups.
The most of the women in this study noted that they have never thought about the likelihood of being diagnosed with breast cancer and the role early detection in the disease survival. They always supposed to have immunity against the disease; thus, they feel no need to have a mammogram. This finding is consistent with those of reported by Hasson et al. who revealed that 16.5% of the participants reported no thinking about undergoing mammography.^[@R37]^
Conclusion {#s5}
==========
The current results gave us a more detailed picture on how Iranian women perceive response costs of breast health-seeking behaviors. Although, women are responsible for their own health within the context of breast cancer prevention, governmental policy makers are, also, responsible for provision of women's health care facilities. In Iran, despite the high incidence of breast cancer, mammography screening is not an integrated routine service in the health care system. It was concluded that women in Yazd perceive some cultural-based barriers for MA. It is necessary to identify the priorities and the existing gaps in the country through accomplishing interdisciplinary scientific researches and specific interventions. Beside the development of women's health policy in Iran, it is suggested that religious and cultural belief systems be incorporated into the educational programs applying persuasion- based health monitoring approach. Health educators may have good opportunities to design theory-based educational interventions within which the belief systems are being incorporated with the hope to initiate adaptive coping reactions.
Ethical approval {#s6}
================
Research protocol was approved by the Research Council and Ethics Committee affiliated by Yazd Shahid Sadoughi University of Medical Sciences, Yazd, Iran. Voluntary participation, anonymity, confidentiality, and withdrawing from the study at any time without any penalty were some issues that were explained for the participants. All the interviews were recorded with a sound recorder after obtaining permission and signing an informed written consent form by the participants.
Competing interests {#s7}
===================
The authors declare no conflict of interest.
Authors' contributions {#s8}
======================
MK was the main investigator and contributed to development of research protocol, implementation of the research, and drafted the manuscript. SSMM supervised the study and scientific integrity of data collection and revision of the manuscript. ML was advisor to the qualitative study, participated in the design of the study and interpretation of data and revising the manuscript. MAM and Ht were advisor to the study, participated in the interpretation of data and revising the manuscript. All authors have read and approved the final manuscript.
Acknowledgements {#s9}
================
This study was financially supported by Shahid Sadoughi University of Medical Sciences, Yazd-Iran. The authors are grateful to all women who participated in the study.
|
{
"pile_set_name": "PubMed Central"
}
|
Q:
Word2Vec and Gensim parameters equivalence
Gensim is an optimized python port of Word2Vec (see http://radimrehurek.com/2013/09/deep-learning-with-word2vec-and-gensim/)
I am currently using these vectors: http://clic.cimec.unitn.it/composes/semantic-vectors.html
I am going to rerun the model training with gensim because there was some noisy tokens in their models. So i would like to find out what are some equivalent parameters for word2vec in gensim
And the parameters they used from word2vec are:
2-word context window, PMI weighting, no compression, 300K dimensions
What is the gensim equivalence when i train a Word2Vec model?
Is it:
>>> model = Word2Vec(sentences, size=300000, window=2, min_count=5, workers=4)
Is there a PMI weight option in gensim?
What is the default min_count used in word2vec?
There's another set of parameters from word2vec as such:
5-word context window, 10 negative samples, subsampling, 400 dimensions.
Is there a negative samples parameter in gensim?
What is the parameter equivalence of subsampling in gensim?
A:
The paper you link to compares word embeddings from a number of schemes, including Continuous Bag of Words (CBOW). CBOW is one of the models implemented in Gensim's "word2vec" model. The paper also discusses word embeddings obtained from Singular Value Decomposition with various weighting schemes, some involving PMI. There is no equivalence between SVD and word2vec, but if you want to do an SVD in gensim, it's called "LSA" or "Latent Semantic Analysis" when done in natural language processing.
The min_count parameter is set to 5 by default, as can be seen here.
Negative Sampling and Hierarchical Softmax are two approximate inference methods for estimating a probability distribution over a discrete space (used when a normal softmax is too computationally expensive). Gensim's word2vec implements both. It uses hierarchical softmax by default, but you can use negative sampling by setting the hyperparameter negative to be greater than zero. This is documented in comments in gensim's code here as well.
|
{
"pile_set_name": "StackExchange"
}
|
As integrated circuit (IC) geometries continue to decrease, and with the advent of Micro-Electro Mechanical Systems (MEMS), the need for reliable, high density packaging solutions increases. A promising solution for providing reliable packaging for chips of continually decreasing size is Wafer Level Packaging (WLP). WLP is a packaging method in which packaging is formed at the wafer level in an IC foundry or other processing location, allowing testing and burn-in to be performed before the dicing of individual chips.
In certain wafer level packaging (WLP) methods, small cavities or enclosures of an IC or MEMS package may be filled with fluid. In many such applications, fluid filling of a WLP may need to be performed in such a way as to prevent bubbles or gaseous pockets from forming in the fluid filled cavities.
Fluid packaging may perform a number of functions essential for an IC or MEMS device. Packaging may provide electrical connection, electrical isolation or passivation from moisture and electrolytes, physical isolation from the environment to provide structural integrity of mechanical devices, thermal and optical protection to prevent undesirable performance changes, and chemical isolation to protect from harsh chemical environments. Electrical connection and isolation may include providing electrical connections from the outside of the MEMS package to electrical or mechanical components of the MEMS device inside the package, electrostatic shielding of the MEMS device, and preventing penetration of moisture and subsequent corrosion of electrical components or undesired interface adhesion. Mechanical protections may provide rigidity allowing mechanical stability throughout the MEMS product life- and may also help prevent undesirable interface stress between dissimilar materials. If the packaging protection is compromised, the MEMS device may fail, producing no output for a given input or producing invalid or inaccurate output for a given input.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Gambling problem symptom patterns and stability across individual and timeframe.
Few studies investigate gambling problems at the symptom level; even fewer investigate how symptom patterns change throughout the course of a gambling disorder. The current study utilized the National Epidemiological Survey on Alcohol and Related Conditions (NESARC; Grant et al., 2004) to investigate how the specific symptoms of disordered gambling relate to its severity and course. Results demonstrated that symptom patterns and stability changed as the number of symptoms endorsed increased. Symptom patterns varied considerably from prior to past year (PPY) to past year (PY) timeframes. Certain symptoms were more stable than others and held predictive value as markers of emerging pathological gambling (PG). In particular, gambling to escape problems was one of the most stable symptoms and also predictive of progression to PG; reliance on others to support gambling was predictive of progression to PG among participants at-risk for PG. The differential diagnostic value of various reported symptoms, as well as their lack of stability, has implications for both researchers and clinicians.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
The development of reliable immunologic compositions useful as reagents in immunoassays to determine the presence or absence of antigens or antibodies in a test fluid has and continues to be a sought after goal. One approach which has received a great deal of attention has been the development of reagents for hemagglutination and hemagglutination inhibition systems. These systems employ red blood cells also known as erythrocytes which, for use, are joined with antigenic or antibody substances so as to provide an indicator system which can be used to detect the homologous antibody or the antigenic substance itself.
An early development in hemagglutination inhibition or passive hemagglutination tests was described by Wide and Gemzell, Acta Endocr. 35(1960) 261. They established that the red blood cells (Rbc) coated by or attached to the antigen must be stabilized to be useful hemagglutination inhibition tests, otherwise the red blood cells would need to be fresh daily. While Wide et al. stabilized the erythrocytes before attachment of the antigen, others have stabilized following attachment of the antigen.
Stabilization of Rbc was originally described by Boyden using formaldehyde, J. Exp. Med., 93, 107 (1951) and the concept was extended by Wide, Acta Endocr., supp. 70, 41(1962), when following pretreatment of formaldehyde treated RBC with tannic acid, it was shown that hCG could be absorbed onto the cell surface of the Rbc.
Ling, Brit. J. Haemat., 7, 229(1961), also showed the pyruvic aldehyde could beneficially replace formalin and that pretreatment with tannic acid was not necessary for antigen attachment. However for stabilization, Ling decreed that 48 hours at +4.degree. was necessary. But, the coated erythrocytes are unstable and are also time consuming to prepare.
One approach to improving stability and also of obtaining erythrocytes with higher hemagglutination titers were disclosed in U.S. Pat. No. 3,714,345; 3,715,427 and 3,925,541. There the erythrocytes were treated sequentially with pyruvic aldehyde and then formaldehyde for periods in excess of 12 hours for treatment prior to coating the thus stabilized erythrocyte with an antigen or antibody. The double aldehyde treated erythrocytes were in some cases further subjected to a lengthy freeze-thaw cycle at very low temperatures.
Another approach to obtain antigen sensitized erythrocytes was through the use of bivalent reagents as coupling agents between antigens and erythrocytes, e.g., bis diazotized benzidines illustrated in U.S. Pat. No. 3,236,732; various diols and quinones described in U.S. Pat. No. 3,322,634; toluene-2,4-diisocynates described in Immunochemistry 1:43(1964); etc. Since even the coupling coated erythrocytes are still readily susceptible to decomposition, formaldehyde treatment was usually employed prior to coating with antigen or simultaneously as described in U.S. Pat. No. 3,987,159 where the coupling agent employed was glutaraldehyde. In still a different approach described in U.S. Pat. No. 3,991,175, glutaraldehyde was also utilized as a coupling agent but gelatin was used to stabilize the composition.
The various compositions and methods already noted and numerous others suffer individually from various disadvantages such as instability, lack of reproducibility, false positive results, low hemagglutination titres, cost or time of preparation, and others.
It has now been found that the compositions and methods of this invention demonstrated in part by use in hemagglutination tests, provide a superior grade of stabilized, sensitized cells. The composition of this invention have higher hemagglutination titres, are stable for long periods of time, and give reproducible patterns and results. Another advantage of the herein disclosed invention is the stability of results obtained. For example, in utilizing a commercially available reagent the hemagglutination patterns change with time. Thus, in a pregnancy test, a negative result, i.e., complete hemagglutination within 2 hours, will change over 24 hours to show a quasiinhibition pattern; results recorded from 2-24 hours at room temperature will therefore indicate a significant number of false positive results. However, utilizing the composition and methods of this invention, results are obtained within 2 hours of testing and will not change for about 11 days thereafter or more. Other advantages will become apparent as the description of the invention unfolds.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Q:
PHP I have two arrays, I want to extract items from Array 1 if it's not already in Array 2
Like the title says, I have two arrays and I just want to get everything from the first array that's not already in the second array. How do I do this?
A:
Use array_diff:
$array1 = array("a" => "green", "red", "blue", "red");
$array2 = array("b" => "green", "yellow", "red");
$result = array_diff($array1, $array2);
print_r($result);
Result:
Array
(
[1] => blue
)
See it working online: ideone
|
{
"pile_set_name": "StackExchange"
}
|
Having a challenge figuring out how to do something? Here’s a technique straight from the ProNagger’s designer bag of creative ideas. Write yourself an email as if you were asking for help from an expert in the field you need help in. Let the email sit for...
|
{
"pile_set_name": "Pile-CC"
}
|
This website and blog are written in English, but Iam Norwegian. Its not always I find the right word or sentences, so feel free to correct me! Leave a comment an I will be happy to check out your blog :)
HI, I’m not gone, but my work, my normal daytime work is taking all my time. Well I sit in front of a computer and construct steel to the oil industry. Engineering is fun but here in north it is so cold and dark these two month before Christmas. So I sleep a lot after making dinner to children and so on. Days fly by. Daydreaming a lot when I drive or when I can’t sleep at night. Dream about my sewing machinery and all the project I want to do but almost never have a chance to do.
Well this dress was on my project list for Autumn and I have been sewing on this 5 minute here, 15 min there in several weeks. And I think it is so far the most advanced project i have done. So a little bit proud The pattern are SS and so are all the fabric. Satin..yes its slippery!! bah..cursed a lot.
The first picture is from the SS (stoffogstil) catalog. This is the dress the way its supposed to to turn out.
Beware i don’t were any makeup, and the picture are taking before we are going to a Christmasparty at work the next day. Do you think I accomplished it? The flower-fabric is a see-true fabric and was very difficult to hem, wasn’t pleased but turned out ok. Haha noticed my feet are kind of disappearing on the picture to. We have almost black floor, sorry Anyway the dress fit so perfectly in size 36 eu. And now i have a really nice dress
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Convergence of $\sum_{n=1}^{\infty}\dfrac{(-1)^n}{n^{1+1/n}}$
Does the series $$\sum_{n=1}^{\infty}\dfrac{(-1)^n}{n^{1+1/n}}$$
converge absolutely, converge conditionally, or diverge?
I've tried applying the ratio test and the root test, and in both cases the limit is $1$, so I cannot conclude anything.
A:
This series does not converge absolutely, by the limit comparison test
$$ \lim_{n\to\infty} \frac{1/n^{1+1/n}}{1/n} = \lim_{n\to\infty} \frac{1}{n^{1/n}} = 1 $$
with the divergent harmonic series $\sum \frac{1}{n}$.
But since
$$ \frac{1}{n^{1+1/n}} = \frac{1}{n} \exp\left( - \frac{\log n}{n} \right) = \frac{1}{n} + O\left(\frac{\log n}{n^2} \right), $$
the series converges conditionally by noting that
$$ \sum_{n=1}^{\infty} \frac{(-1)^{n}}{n^{1+1/n}} = \sum_{n=1}^{\infty} (-1)^{n} \left( \frac{1}{n} + O\left(\frac{\log n}{n^2} \right) \right), $$
which is a sum of two convergent series. This is my favorite style of argument for proving that an alternating series with complicated term converges.
If you feel uncomfortable with the Big-Oh notation, then consider the function
$$ f(x) = x^{-1-\frac{1}{x}} = \exp\left( - \frac{x+1}{x}\log x \right). $$
Then by the logarithmic differentiation,
$$\frac{f'(x)}{f(x)} = -\frac{x+1-\log x}{x^2} < 0 $$
for large $x$ and thus $f(x)$ is a non-negative decreasing function. Since it is immediate that $f(x) \to 0$ s $x \to \infty$, the conclusion follows from the alternating series test that
$$ \sum_{n=1}^{\infty} \frac{(-1)^{n}}{n^{1+1/n}} = \sum_{n=1}^{\infty} (-1)^{n} f(n) $$
converges.
|
{
"pile_set_name": "StackExchange"
}
|
Alveolar epithelial cells (AEC) cover the alveolar surface of the lung, which is the major acid-excreting organ in mammals. Because these cells are subject to an inconstant extracellular milieu with respect to pCO2, the regulation of intracellular pH (pHi) in alveolar epithelial cells is of particular significance. In previous work it has been established that alveolar pneumocyte pHi is regulated by several ion transport mechanisms that are capable of effecting acid/base entry or extrusion from the cell. These ion transport mechanisms are plasma membrane proteins asymmetrically distributed across polarized epithelial cell surfaces, thereby making transepithelial transport of acid/base equivalents possible. Their distribution with respect to membrane polarity across the alveolar epithelium, whose apical lining fluid pH is acidic (6.9), has not previously been established. We will investigate the mechanisms whereby acid/base transport by AEC is regulated by studying three hypotheses: (1) Acid/base transport by AEC occurs via specific ion transport mechanisms having a characteristic distribution with respect to membrane polarity across the cells, and which represent the activity of specific transport protein isoforms. (2) These ion transport mechanisms are both acutely and chronically regulable in AEC with respect to activity, expression, and polarity by specific extracellular stimuli that can thereby modulate acid/base transport under normal conditions and in disease states. (3) Regulation and localization of acid/base transport mechanisms in AEC influence alveolar fluid pH. The objectives of the studies proposed herein are therefore to further characterize the acid/base transport mechanisms in AEC, and in particular, to study regulation of their activity, expression, and polarity by specific exogenous factors and lung injury. We will use rat alveolar epithelial cell monolayers cultured on tissue culture-treated polycarbonate filters for many of these studies. This model is especially well suited for studies on alveolar epithelial polarity and acid/base transport. We will validate our findings using in situ studies on rat alveolar epithelium. The long term goals of this project are to define the importance of acid/base transport in intracellular homeostasis of alveolar epithelial cells, and to demonstrate the role of acid/base transport by alveolar epithelial cells in modulation of the extracellular alveolar milieu.
|
{
"pile_set_name": "NIH ExPorter"
}
|
A conventional technique for controlling the intensity of an instrument cluster on a motor vehicle dashboard incorporates a mechanical rheostat in series with a voltage supply. The series resistance of the rheostat attenuates power delivered to the panel lamps and allows the automobile operator to adjust the light intensity from the dash panel. The use of a series limiting resistance in a rheostat dissipates unnecessary amounts of heat which is not only inefficient, but can alter the operating characteristics of other instrument panel components. In addition, the rheostat power adjustment technique of the prior art results in variable operation between different electronic subassemblies.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Q:
Is there a convenient way to initialize simple structs in C++?
Let's say I have a simple struct like this:
struct Simple
{
int weight;
std::string name;
float power;
};
I'd like to be able to initialize one of these without creating a constructor for it and without having to individually set its parameters. I dream of a syntax like this, for example:
Simple s( 4, "bill", 3.1f );
...or perhaps...
Simple s = { 4, "bill", 3.1f };
...or verily...
Simple s{ 4, "bill", 3.1f };
I know that I can get the first example to work by adding a braindead constructor of my own. Tedious.
Likewise, the last example will work in C++11, but I believe I have to provide the constructor.
Is there a way to simply and elegantly initialize a struct in C++ without having to provide a constructor?
A:
Simple s = { 4, "bill", 3.1f };
Simple s{ 4, "bill", 3.1f };
These are valid.
This syntax will map each value in the above groups/sets to each struct member variable depending on the order and you don't even need to define a constructor.
|
{
"pile_set_name": "StackExchange"
}
|
The first implementation of a privacy-preserving and account-based blockchain.
By Osuke(@zoom_zoomzo)
We are very excited to announce Zerochain which is a privacy-preserving blockchain on Substrate.
Zerochain is basically designed to store encrypted data. Usually, all data on blockchain is public and everyone can see it, while the data on Zerochain is encrypted so that no-one can see the data without the key for decryption.
Zerochain is built on Substrate which is the blockchain framework developed by Parity, and also using the bellman library developed by Zcash for zero-knowledge proof system. I appreciate these great implementations.
All implementations of Zerochain is an OSS, so you can see all of the code on GitHub and try running it, sending confidential transaction.
Basic features of Zerochain
A goal of Zerochain project is to be the infrastructure for developing decentralized applications using lots of kind of privacy-preserving computation and encrypted data.
The most obvious example of “the decentralized application for privacy-preserving” is confidential payment. For instance, the balance stored in smart contracts on ethereum is public, it is like the details of your bank account made public via the Internet.
All balances on Zerochain are encrypted to solve the above privacy problems.
Encrypted balance on Zerochain
Similarly, all transferred amounts are also encrypted, so anyone cannot see it.
Confidential payment on Zerochain
All information tied with accounts would not be public because the additive homomorphic property allows computation on ciphertexts for updating the encrypted balances. It is a basic idea for privacy-preserving in Zerochain that all data on blockchain would be encrypted (quite simple, isn’t it?).
Some of the most famous examples of privacy-preserving blockchains would be Zcash, Monero, and Grin. These take different zero-knowledge approaches, but all of these are UTXO-based blockchain. On the other hand, Zerochain is an account-based blockchain. The point is that the elements of Key-Value mappings are encrypted.
Zerochain is a first account-based blockchain implementation for privacy-preserving.
In addition, the pros of account-based are followings.
The optimization for the zero-knowledge proving cost
The cost of zero-knowledge proving usually represents as a number of constraints (similar to a number of multiplication gates in an arithmetic circuit).
The zero-knowledge proving in Zcash(Sapling) is 106,604 constraints. On the other hand, it is 18,278 constraints in Zerochain. It achieves reducing by 83 %! (w/o address anonymity)
The optimization for the on-chain storage cost
One of the big problem in UTXO-based is that the storage cost would be getting bigger and bigger because of the increasing UTXO and other metadata. But Zerochain is not the case because it is account-based, the encrypted balances are just overwritten for each transaction.
The flexibility for the privacy-preserving applications
UTXO-based is highly suitable for only payment. As I said above, Zerochain aims for being infrastructure for privacy-preserving Dapps, so more flexibility would be needed. Account-based is so much easier to add various functionalities like confidential whitelists for assets, anonymous voting, and hopefully arbitrary computation.
However, there are some cons for account-based which are like complex implementation for anonymous transactions and necessity protecting from front running attacks.
Zerochain and Substrate
As I said above, Zerochain is based on Substrate which is basically a blockchain framework. In particular, the core blockchain logics like the p2p network and consensus algorithm are provided by Substrate, and the privacy-protecting logics are provided by Zerochain top of it.
Zerochain on Substrate
Zerochain is a first implementation of privacy-preserving blockchain on Substrate. In the future, Zerochain would work as a privacy-preserving blockchain connecting to Polkadot network.
You can find more details of substrate here: https://docs.substrate.dev/
Dive into Zerochain
Zerochain has mainly three core techniques which are key components, encryption algorithm, and zero-knowledge proof system. I will describe these high-level schemes.
Key components
In Zerochain, a couple of key pairs are provided in order to get a privacy-preserving property and various authorities.
Key components
Basically, the authority level for keys is getting weaker as it goes bellow and each key has the specific features.
Origin Key: same as the secret key of usual blockchain(e.g. ethereum)
Proof Generation Key: the key for using computing zero-knowledge proofs
Signing Key: one-time key for signing a transaction to get anonymity
Verification Key: one-time key for verifying a signature to get anonymity
Decryption Key: the key for decrypting the transferred amounts and balances
Encryption Key: the key for encrypting the transferred amounts and balances (alias for address)
The separating authorities for keys allow these to specify their own features. For instance, you cannot steal the other’s balance just by getting the Decryption Key. You can only decrypt the balance and see what amount of coin he or she has. In other words, Decryption Key works as an auditable key to a specific account.
Additive homomorphic encryption
As I said above, all transferred amounts and balances are encrypted in Zerochain, but you have to compute(add or sub) these with encrypted at the time of the payment.
Zerochain achieves it by using the special encryption algorithm called “Additive homomorphic encryption”. As you can guess from the name, it can compute the addition(or subtraction) with encrypted. More specifically, Zerochain uses “Lifted-ElGamal encryption” to get efficient encryption and additive homomorphic property. (You can think it’s like Pedersen commitment in terms of additive homomorphic property, but Lifted-Elgamal is an asymmetric key encryption algorithm, not a commitment.)
Encryption
You can compute the ciphertext like bellow.
ciphertext:
where v: transferred amount, r: pseudorandomness, G: generator point, s: secret key (the corresponding public key: sG)
Decryption
You can decrypt it by using the given ciphertext and secret key.
Then, you realize you have to solve the discrete logarithm problem to get the amount “v”. Practically, “v” would be just a small bits integer (like 32bits) and vG(v=1,2,…) are computed in advance. (On the other hand, the secret key “s” and pseudorandom “r” will be a huge number so that one cannot solve the discrete logarithm.)
The decryption of Lifted-ElGamal is not efficient like this, but we chose it as an encryption algorithm in Zerochain due to the efficient encryption and the good compatibility with zero-knowledge proof.
Additive homomorphic
Let’s think the case the user has encrypted 10 coins as his balance, then is transferred encrypted 5 coins. That is the addition of ciphertext with v = 10 as balance and v’ = 5 as amount.
This is the same form as the ciphertext you see above. You can get the amount “15” by using secret key “s” in the same way. All the additions of ciphertext are computed on-chain at the time of updating the balance.
Zero-knowledge proof
What is Zero-knowledge proof? From the post of Zcash here.
“Zero-knowledge” proofs allow one party (the prover) to prove to another (the verifier) that a statement is true, without revealing any information beyond the validity of the statement itself
A bit confusing though, basically that is getting the validity for the data sending to on-chain in the context of the blockchain.
Let’s think the case Alice sends encrypted 10 coins to Bob. In practice, Alice sends just a byte array(64 bytes) to on-chain because it’s encrypted. Can the nodes on the blockchain network validate whether the transaction is valid or not? In other words, does Alice actually encrypt the “10 coins”? Does Alice have more than “10 coins” in her encrypted balance? In addition, can the ciphertext be decrypted only by Alice or Bob?
All the above is impossible for nodes to validate these, just by giving “bytes array”. However, zero-knowledge proof makes it possible. It means zero-knowledge proof can give the validity for the above things without revealing the number of “10 coins”.
zk-SNARK which is a kind of Zero-knowledge proof systems is used in Zerochain. Particularly, the following things are proved and verified in the confidential payment.
A transferred amount is within a valid range. (The amount is not negative.) A sender balance is within a valid range. (The remaining balance is not negative.) An encryption algorithm is correct by using the sender’s encryption key and the encrypted amount is correct. An encryption algorithm is correct by using the recipient’s encryption key and the encrypted amount is correct. (It should be the same value as 3.) An input balance proving in 2. is actually corresponding to the sender’s remaining balance. A signature verification key is computed correctly.
The zk-proof proving the above things with the encrypted amount are sent to blockchain and verify it on-chain.
BTW, I highly recommend you to watch the Zero Knowledge Summit #3 Videos (especially Harry’s talk for understanding the low-level SNARKs) to get the picture of Zero-knowledge Proofs.
As a summary, here is a high-level overview of the Zerochain scheme.
For more details, you can find it in the code. Feel free to submit issues and PRs.
What’s coming next?
The alpha-level implementation for confidential payment using zk-SNARKs have been already done, but lack of many basic features like…
Protecting from security issues like DoS and front running attacks
Computing zk-proofs on a browser as a wasm wallet(it gets better UX but additional security issues might come up)
An anonymous payment which is hiding addresses
Other zero-knowledge proof systems for mitigating the trusted setup (SONICs, Bulletproofs, zkSTARKs)
Feel free to ask any question. You can find me on Twitter or Gitter.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
PHP Array to XML with no numbers
PHP array to XML problem. I have an array and when trying to convert it into an xml file, it is counting the total fields using "item0" "item1"...so on. I only want it to display "item" "item". Examples below. Thank you.
PHP code turning the array($store) into an XML file.
// initializing or creating array
$student_info = array($store);
// creating object of SimpleXMLElement
$xml_student_info = new SimpleXMLElement("<?xml version=\"1.0\"?><student_info></student_info>");
// function call to convert array to xml
array_to_xml($student_info,$xml_student_info);
//saving generated xml file
$xml_student_info->asXML('xmltest.xml');
// function defination to convert array to xml
function array_to_xml($student_info, &$xml_student_info) {
foreach($student_info as $key => $value) {
if(is_array($value)) {
if(!is_numeric($key)){
$subnode = $xml_student_info->addChild("$key");
array_to_xml($value, $subnode);
}
else{
$subnode = $xml_student_info->addChild("item$key");
array_to_xml($value, $subnode);
}
}
else {
$xml_student_info->addChild("$key","$value");
}
}
}
What the XML file looks like (with the item# error)
<student_info>
<item0>
<item0>
<bus_id>2436</bus_id>
<user1>25</user1>
<status>2</status>
</item0>
<item1>
<bus_id>2438</bus_id>
<user1>1</user1>
<status>2</status>
</item1>
<item2>
<bus_id>2435</bus_id>
<user1>1</user1>
<status>2</status>
</item2>
</item0>
</student_info>
Once again, I just want each "item" to display "item" with no number. and the first and last "item0"... I dont know what thats about. Thanks for any help!
A:
Answer to question
Replace this:
else{
$subnode = $xml_student_info->addChild("item$key");
array_to_xml($value, $subnode);
}
with this:
else{
$subnode = $xml_student_info->addChild("item");
array_to_xml($value, $subnode);
}
Answer to comment
I don't know how your array is structured but, from the output, I would guess the problem is in the following line:
$student_info = array($store);
So, change to this:
if (!is_array($store)) {
$student_info = array($store);
} else {
$student_info = $store;
}
This should fix it
|
{
"pile_set_name": "StackExchange"
}
|
The St George Illawarra Dragons have granted Gerard Beale a formal release from his current playing contract.
Beale has been granted an early release to take-up a multi-year opportunity with the Cronulla-Sutherland Sharks.
Beale made his first-grade debut for the Club in opening round of the 2013 campaign against the Melbourne Storm and made 29 appearances in total.
“Gerard has been provided an opportunity to join the Cronulla-Sutherland Sharks on a multi-year contact which he has accepted ahead of next season,” said Head Coach Paul McGregor.
“The Dragons would like to thank him for his services to our Club and wish him the very best for his future.”
|
{
"pile_set_name": "OpenWebText2"
}
|
Adalimumab for the treatment of moderate to severe psoriasis: subanalysis of effects on scalp and nails in the BELIEVE study.
This post hoc analysis examined the effects of adalimumab in patients with scalp and/or nail psoriasis from BELIEVE (a randomized, controlled, multicentre phase 3 safety and efficacy trial). Efficacy was assessed in the pooled treatment group (adalimumab with or without calcipotriol plus betamethasone dipropionate) by Psoriasis Area and Severity Index (75% improvement; PASI 75), Psoriasis Scalp Severity Index (PSSI), Nail Psoriasis Severity Index (NAPSI), Dermatology Life Quality Index (DLQI) and a visual analog scale (VAS) for pain. Of the 730 enrolled patients, 663 (91.3%), 457 (63.1%) and 433 (60.1%) had psoriasis of the scalp, nails, or both, respectively. Similar proportions of patients with (68.2%) and without (63.5%) scalp involvement achieved a PASI 75 response at week 16 [adjusted odds ratio (OR), 1.34; P = 0.320]. PASI 75 response rates were lower in patients with nail psoriasis compared with patients without nail psoriasis at week 8 (53.0% vs. 62.9%; OR, 0.68; P = 0.019) and week 16 (65.0% vs. 73.0%; OR, 0.70; P = 0.052). PASI 75 response rates were 66.1% in patients with scalp and nail involvement and 70.8% in patients without both scalp and nail involvement at week 16 (OR, 0.87; P = 0.423). Patients in all scalp and nail subgroups reported improvements in DLQI and VAS pain scores throughout the study. Patients with scalp psoriasis exhibited large improvements in scalp symptoms demonstrated by a median (mean ± SD) decrease from baseline PSSI at week 16 of 100% (77.2 ± 96.9%). Patients with nail psoriasis improved, demonstrated by a median (mean ± SD) decrease from baseline NAPSI at week 16 of 39.5% (9.4 ± 164.5%). Our results indicate that adalimumab improves overall psoriasis and scalp and nail symptoms in this patient population with scalp psoriasis and/or nail involvement. In addition, similar PASI 75 response rates are achieved in patients with and without scalp involvement, whereas patients with nail involvement demonstrate a moderate (perhaps delayed) PASI 75 response rate.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
The present invention relates to a process of removing sulfate, i.e., sulfate anions, from aqueous alkali metal chlorate solutions containing chromate and sulfate. More particularly, this invention relates to the removal of sulfate from aqueous chromate-containing sodium chlorate solutions without simultaneous removal of significant quantities of chromate.
Aqueous alkali metal chlorate solutions, e.g., sodim chlorate solutions, are conventionally produced by electrolysis of alkali metal chloride brines in electrolytic cells, usually bipolar electrolytic cells. A cell liquor containing both the alkali metal chlorate and alkali metal chloride is recovered from the cells. It is conventional to add chromate, e.g., sodium dichromate, to the solution in the cell, because chromate improves the current efficiency of the cell during conversion of sodium chloride to sodium chlorate. By the term "chromate" is meant a chromium-containing species such as a chromate ion (CrO.sub.4.sup..dbd.), a monobasic chromate ion (HCrO.sub.4.sup.-) or a dichromate ion (Cr.sub.2 O.sub.7.sup..dbd.), the particular species being determined primarily by the pH in the solution.
The alkali metal chloride brine used as feed for these cells can be obtained by dissolving solid salt, for example, by solution mining of rock salt. Brine formed from dissolving solid salt can contain various impurities including sulfate salts. While complete removal of sulfate from the brine is unnecessary, electrolysis of brine having sulfate levels above 25 grams per liter (g/l) can damage the anode coatings. In a typical process for producing the alkali metal chlorate, the cell liquor is recovered from the cell, a portion of the alkali metal chlorate product is crystallized and separated from the liquor, the liquor is resaturated with alkali metal chloride and the liquor is then recycled to the electrolytic cell. Without removal of some sulfate, sulfate levels would rise above acceptable levels. Sulfate levels may be reduced to acceptable levels by adding calcium chloride to precipitate calcium sulfate. Such sulfate removal can be achieved by treatment of a sidestream of the aqueous chlorate liquor. It has been found that chromate ions within the chlorate liquor tend to precipitate with the calcium sulfate. Such precipitation can result in calcium sulfate precipitates having chromium levels in the range of several thousand parts per million (ppm). It is desirable to minimize the chromium level in the sulfate-containing precipitate thereby reducing toxic waste problems with the precipitate.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Who’s ready for some fun in the sun summertime mini sessions? Our new lemonade stand is ADORABLE! We are having one more round of lemonade stand mini’s this Sunday, June 26th. These will be held in Keller, TX in the SHADE! These will probably be our last outdoor mini’s until the fall, so don’t miss out! The kiddos had so much fun! There’s a few spots left… Book online here: http://bit.ly/1cRlUcF
We have officially put all of our upcoming 2014 MINI Sessions for our Keller, TX studio location on the calendar and they are now booking! We are expecting all of these sessions to fill up quickly, so be sure to book early to secure your session day and time. These are 15 minute sessions with special reduced pricing and packages. Summertime Goodness – August 1st and 9th (featuring colorful backgrounds, watermelons & ice cream!) Back To School – August 30 (will {Read More}
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
PHP Check if dynamic named folder exists
I'm having problems checking if a dinamically named folder exists using php. I know i can use
file_exists()
to check if a folder or file exists, but the problem is that the name of the folders I'm checking may vary.
I have folders where the first part of the name is fixed, and the part after "_" can vary. As an example:
folder_0,
where every folder will start with "folder_" but after the "_" it can be anything.
Anyway i can check if a folder with this property exists?
Thanks in advance.
SR
A:
You make a loop to go through all the files/folders in the parent folder:
$folder = '/path-to-your-folder-having-subfolders';
$handle = opendir($folder) or die('Could not open folder.');
while (false !== ($file = readdir($handle))) {
if (preg_match("|^folder_(.*)$|", $file, $match)) {
$curr_foldername = $match[0];
// If you come here you know that such a folder exists and the full name is in the above variable
}
}
|
{
"pile_set_name": "StackExchange"
}
|
338 F.Supp. 1304 (1972)
UNITED STATES of America, Plaintiff,
v.
Thomas Marcelino ESPINOZA, Defendant.
Crim. No. 12247.
United States District Court, S. D. California.
March 2, 1972.
*1305 Harry D. Steward, U. S. Atty., Catherine A. Chandler, Asst. U. S. Atty., San Diego, Cal., for plaintiff.
James M. Gattey, San Diego, Cal., for defendant.
MEMORANDUM DECISION AND ORDER
GORDON THOMPSON, Jr., District Judge.
Defendant herein has moved the Court for an order suppressing certain physical evidence consisting of approximately four grams of heroin hydrochloride emitted from the stomach of the defendant at approximately 12:55 A.M. on the morning of October 11, 1971. This evidence was seized as a result of a warrantless arrest and search occurring on October 10, 1971, at approximately 10:50 P.M., as the defendant entered the United States from Mexico on foot at the port of entry at San Ysidro, California. An evidentiary hearing was conducted on February 7, 1972, at the conclusion of which the matter was taken under submission by the Court.
Thereafter, on February 9, 1972, the defendant, his counsel, and the United States Government, desiring to waive a trial by jury in this matter, executed the jury waiver which this Court approved after orally inquiring of the defendant, his counsel and Government counsel, of their desire so to do. Thereafter, the case was submitted on the facts elicited at the hearing on the motion to suppress evidence, together with a written stipulation executed by the defendant, defense counsel and the Government, and the matter was thereafter submitted to the Court for determination as to the guilt or innocence of this defendant.
FACTS
The evidence established at the hearing on the motion to suppress revealed that Agents Walters and Holleron received information from a reliable informant that a Mexican male by the name of Thomas Espinoza, described as wearing *1306 hornrim glasses and a blue coat, would be entering the United States from Mexico on foot at the port of entry at San Ysidro, California, carrying a quantity of heroin in his stomach. Inspector Walters testified that on October 10, 1971, at approximately 9:30 in the evening, he was present at the port at the pedestrian gate entrance when he observed defendant Espinoza and overheard him give a negative declaration as he attempted to enter the United States in the pedestrian lane. Defendant, who was known to Agent Walters, was then questioned as to what he was bringing from Mexico. His declaration was that he was bringing tortillas only. Agent Walters testified that the defendant appeared to be in an extremely nervous condition, shuffling about, and in his opinion, under the influence of something. Inspector Walters observed that the defendant was "well-tracked" and was a user of narcotics. Subsequently, a personal search of the defendant was conducted with negative results.
Agent Holleron, who has been a Senior Special Agent with the Treasury Department, Bureau of Customs, for a period of about 13 years, testified that at approximately 10:00 P.M. that same evening he had a conversation with the defendant at the port of entry at San Ysidro in the presence of Special Agent Dominic Aragona, and after advising defendant Espinoza of his rights, defendant stated that he was a user of narcotics and had taken his last fix about two weeks prior to that date. Agent Holleron testified that in his opinion the puncture wounds which appeared on the arms and hands of the defendant were less than two weeks old, were reddened, that the defendant appeared somewhat nervous, his eyes being pin-pointed, and that based thereon, Agent Holleron formed the opinion that the defendant was under the influence of a drug or narcotic and had a "shot" more recently than two weeks prior.
Agent Holleron further testified that Espinoza was the subject of a look-out based upon information received from a reliable informant who named Thomas Espinoza and who stated that he would come across the border at San Ysidro from Mexico carrying narcotics within his body. Agent Holleron testified that he could recall at least ten cases that the same informant had made for Customs, that in each of those cases the information proved to be reliable, resulted in arrests of the individuals involved, and in the majority of cases the information related to body cavity concealment of narcotics. Agent Holleron testified that in his opinion the information on this occasion received from an informant named by the Supervisory Customs Inspector was reliable.
Agent Holleron further testified that after a conversation with the defendant which lasted approximately 20 minutes, he was taken to the office of Dr. Paul Salerno for an examination; that Dr. Salerno was asked to perform a routine-type examination of defendant, checking his heartbeat, blood pressure, reflexes, arms, and eyes, to determine whether the defendant was under the influence of narcotics at that time. After conducting the examination requested by Agent Holleron, the testimony reflects that Dr. Salerno informed Agent Holleron that, in his opinion, defendant Espinoza was under the influence of a narcotic. Agent Holleron testified that he and Agent Aragona asked Dr. Salerno to conduct a body probe, which he did. The rectal probe proved to be negative and the agents then requested Dr. Salerno to perform an emetic-type probe, which was done.
Dr. Salerno testified that on October 10, 1971, at approximately 10:50 P.M., defendant was brought to his office in the custody of Agents Holleron and Aragona, and that Agent Holleron initially requested that he conduct a physical examination of Espinoza to ascertain the condition of the needle marks found on defendant's arms and whether the individual was under the influence of a narcotic drug. Dr. Salerno testified that his investigation revealed both old and recent venous scarring of Espinoza's *1307 right arm, that the left arm showed scarring over the upper forearm, that the lower forearm and lateral wrist showed a two-inch scar, venous segment, with seven recently-made needle marks, that the blood pressure was 140 over 95, that the pulse rate was 130 per minute, that the pupils of the eyes were abnormally constricted with impaired responses to changes in illumination, that the pupillary diameter was two millimeters in the light and four millimeters in the darkness, and that the deep tendon reflexes of the lower extremities were abnormally hyperactive. Dr. Salerno, based upon said examination, stated that he formed the opinion that the defendant was "under the primary influence of a narcotic drug" and that he had also taken an amphetamine-type drug which tended to elevate the blood pressure and pulse rate and to some degree counteract the physiological effects of the narcotic drug on the body. The needle marks, according to Dr. Salerno, were made within the past several days, but not more than a week previous.
Dr. Salerno further testified that after he had examined the defendant and stated his opinion to the agents that then and only then did the customs agents ask that he conduct both a rectal probe and an examination to determine the contents of the defendant's stomach, which he did. He further testified that the rectal probe was performed in a medically-approved manner with negative results. Thereafter defendant was given a six-ounce 10% saline solution to induce vomiting. The doctor testified that the defendant agreed to swallow the solution, followed by an additional ten ounces of plain water in order to clear his stomach. The evidence shows that Dr. Salerno informed the defendant prior to the defendant's consent to swallowing the saline solution that the alternative would be the pumping of the stomach. After approximately 45 minutes, Dr. Salerno observed vomiting action, accompanied by re-swallowing maneuvers. The defendant was then requested to use a wooden tongue depressor in order to facilitate and encourage the vomiting. Subsequently, when defendant would remove the depresser in order to re-swallow the material expelled from the stomach, Dr. Salerno aided him in the use of the tongue depresser which resulted, according to the testimony, in a regurgitation from defendant's stomach of three rubber latex enclosed packets, later determined to be the heroin hydrochloride. Dr. Salerno testified that the only time that the defendant was handcuffed during the one hour and 55 minutes that he was present in the doctor's office was when he was brought in and when he was taken out, that he was not handcuffed during the interim and was cooperative throughout, displaying no anger or other untoward emotion. Dr. Salerno reiterated under cross-examination on several occasions that the body cavity searches of the rectum and stomach were made at the request and direction of Agents Holleron and Aragona.
Further evidence was introduced on the day of trial by way of stipulation that the substance brought into the United States by the defendant concealed in his stomach on or about October 10, 1971, was four grams of heroin. The defendant offered no evidence either at the hearing on the motion to suppress nor at the court trial which followed.
MOTION TO SUPPRESS
Personal Search of Defendant:
The initial detention and questioning of the defendant as he approached the International Border from Mexico on foot, and when first observed by Inspector Walters, has as its basis the statutory authority of 19 U.S.C. § 482.[1]
*1308 It is not unreasonable for immigration and/or customs officers to detain, on mere suspicion, an entrant in order to conduct a routine investigation and a search of his luggage, vehicle, and personal effects. Henderson v. United States, 390 F.2d 805 (9th Cir. 1967). It must be remembered, however, that the Fourth Amendment rights of the individual extend to persons crossing the borders of this country. This is so because the Fourth Amendment protects people not places. Terry v. Ohio, 392 U.S. 1, 88 S.Ct. 1868, 20 L.Ed.2d 889 (1967).
In order to justify an intrusion into that reasonable expectation of privacy, there must be some justification for initiating a search. This justification may be reasonably anticipated when one approaches and attempts to cross an international border from a foreign country into the United States. Such routine inspections and detentions are not deemed unreasonable searches. Carroll v. United States, 267 U.S. 132, 45 S.Ct. 280, 69 L.Ed. 543 (1925).
It must be remembered that "border searches" must be reasonable under all the circumstances. One approaching an international border does not normally contemplate that his Fourth Amendment right of privacy would be invaded to the extent that he would be required to expose to view his nude body or to subject his body cavities to search even under the most medically-approved circumstances. In order to justify what is commonly known as a personal or "strip search" initiated by customs officials at the port of entry, they must have "at least a real suspicion directed specifically to the person to be searched." United States v. Guadalupe-Garza, 421 F.2d 876 (9th Cir. 1970). That case defined "real suspicion" as "subjective suspicion supported by objective, articulable facts that would reasonably lead an experienced, prudent customs official to suspect that a particular person seeking to cross our border is concealing something on his body for the purpose of transporting it into the United States contrary to law." 421 F. 2d at 879. That court also stated that the "objective, articulable facts must bear some reasonable relationship to suspicion that something is concealed on the body of the person to be searched; otherwise, the scope of the search is not related to the justification for its initiation, as it must be to meet the reasonableness standard of the Fourth Amendment." Id. It was there indicated that subjective good faith alone on the part of customs officials, unsupported by such facts, would do violence to the protections afforded individuals under the Fourth Amendment.
Applying those standards to the case at bar, it is clear that Inspector Walters, as he observed defendant attempt to enter the United States from Mexico, had sufficient information upon which to detain the defendant and to question him relative to what, if anything, he was bringing into the United States. This is so because the defendant was the subject of a look-out based upon information received by customs officials of which Inspector Walters was aware. Inspector Walters testified that he had searched Espinoza on several prior occasions and was present in the customs office when he had seen the defendant patted down by other inspectors. After escorting him to the baggage room and patting him down for weapons, Inspector Walters noticed that defendant was shuffling around and appeared to be under the influence in that he was more nervous than he had ever noticed before. On observation of defendant's arms, Inspector Walters observed that he was "well-tracked" and that to his knowledge defendant was a user of narcotics.
*1309 Without question and based upon these facts, Inspector Walters not only had subjective suspicion based upon the information previously received as to this defendant, but that the information was supported overwhelmingly by the objective, articulable facts. Certainly there existed at this point "at least a real suspicion, directed specifically to the person to be searched." Guadalupe-Garza, supra.
Accordingly, the personal search of the defendant was justified by a real suspicion, directed specifically to defendant, that he was carrying contraband.
Body Cavity Search:
While many cases have indicated that visual inspection of the surface of the body in the anal area and elsewhere is permissible in a skin search, the intrusion into the body cavity must satisfy a more stringent test than that required for the so-called personal or skin search. Prior to such a search there must be a "clear indication" or "plain suggestion" of the presence of contraband concealed in the cavity. Rivas v. United States, 368 F.2d 703, 710 (9th Cir. 1966). Therein it was stated:
While we know of no accepted meaning of that term [clear indication] in law or as a word of art, it can be readily defined. "Indication" is defined as "an indicating; suggestion." "Clear" is defined as "free from doubt;" "free from limitation;" "plain."
While Rivas requires that there must exist facts creating a "clear indication," or a "plain suggestion," of the smuggling, it is not necessary that those facts reach the dignity of, nor be the equivalent of, "probable cause" which is necessary for an arrest and search at a place other than a border.
Rivas held that a "clear indication" existed when a convicted registered user of narcotics crossed the border under the influence of narcotics, as indicated by his eyes, an extremely nervous manner, and recent needle marks on both arms. The court stated that it is "required as a fact of life to recognize that many people crossing the border, desiring to smuggle goods, and more particularly narcotics, do, and unless stopped, will continue to utilize body cavities, including any of an adequate size that will make such smuggling economically profitable." 368 F.2d at 710.
The threshold question, then, is did the customs officials have a "clear indication" that smuggling was taking place by use of the body cavity of defendant, thus justifying a search of the defendant as he crossed the border; or, did the search violate the Fourth Amendment rights of the defendant herein?
The Court finds that the customs officials did have a "clear indication" or "plain suggestion" that the body cavity of the defendant concealed contraband. The information given Agents Walters and Holleron which caused the defendant to be the subject of a look-out not only was detailed and reliable, but proved precisely accurate in every respect within the ambit of their perception short of the actual body cavity intrusion. Draper v. United States, 358 U.S. 307, 79 S.Ct. 329, 3 L.Ed.2d 327 (1959). The objective, articulable facts observed by the officers confirmed the information received. In order to confirm the information relative to the defendant's stomach, the customs officials, acting out of an abundance of caution, transported the defendant to the offices of Dr. Salerno where the latter performed a medical examination to determine whether or not the information received and the observations made by the customs officials were accurate. This examination was conducted at the request of the customs officials. Having confirmed by medical diagnosis their own observations and the information previously received, the customs officers requested and instructed Dr. Salerno to perform a body probe, including first a rectal probe, then followed by the administering of an emetic.
This is not a Rochin situation with its physical assault on the defendant, both *1310 before the stomach pumping and at the time of its occurrence. It was the physical assault in Rochin which caused the reversal. Here the evidence shows a technical physical assault but no degrading or shameful physical assault upon the person in the sense the Supreme Court found in Rochin v. California, 342 U.S. 165, 72 S.Ct. 1205, 96 L.Ed. 183 (1952).
Defendant argues at length that the motion to suppress should be sustained on the authority of Huguez v. United States, 406 F.2d 366 (9th Cir. 1968). The thrust of defendant's argument is that Dr. Salerno, acting in the capacity in which he was in this case, lacked a "clear indication" or "plain suggestion" of the presence of the contraband concealed in the cavity, because he did not have the prior information relayed to the customs officers from the reliable informant at the time he conducted the probe. With that proposition, this Court disagrees.
Huguez is readily distinguishable from the case at bar in several respects:
First: In Huguez, the customs officers who escorted the defendants therein to the baggage area (not a medical room) were not possessed of the information which would give rise to a "clear indication" of contraband concealed in the body cavity. In this case Agents Holleron and Aragona had such information.
Second: There was no confirmation of the previously acquired information in the Huguez case, while in the present case the confirmation of the information previously received from the reliable informant was in abundance both by the objective, articulable facts perceived by the customs officers and the defendant's own admission that he was a user of narcotics and had had his last fix about two weeks prior.
Third: The body cavity probe was conducted at the office of Dr. Salerno and not in an unhygienically, unsterilized baggage room at the port of entry.
Fourth: Here the examination was conducted at the specific request and direction of the customs agents only after medical confirmation of their own observations and the defendant's admissions, while in Huguez it was the doctor who made the request to probe the body cavity.
Fifth: In Huguez, there was a substantial and excessive use of force in the probing of the body cavity; there was no such evidence in this case.
It seems to the Court that this case parallels the Rivas case in substantially all of the facts and circumstances known to the customs officers which gave rise to the "clear indication" or "plain suggestion" that the defendant was smuggling contraband into the United States in a body cavity. Added thereto is the information from a reliable informant, the accuracy of which is indisputable, which included the fact that the defendant was carrying the contraband in his stomach. Additionally, the defendant admitted to being a narcotics user and having "fixed" approximately two weeks prior to his border crossing. At this point it can clearly be said that not only was there a "clear indication" of contraband being smuggled across the border, but in fact probable cause existed for the defendant's arrest even before the body cavity probe began. Draper v. United States, supra. Certainly if there was probable cause to arrest, there was "clear indication" and "plain suggestion" that defendant was carrying narcotics within his body, thus allowing the body cavity search.
In the opinion of this Court had the customs officials acted in any other manner than they did in an effort to secure the contraband from the body cavity of the defendant, they would have acted unreasonably and in dereliction of their duty. There was not here present a violation of the Fourth Amendment rights of the defendant.
Accordingly, the motion to suppress is denied.
*1311 VERDICT OF THE COURT
Based upon a review of the facts set forth above, it is the verdict of the Court that the defendant, THOMAS MARCELINO ESPINOZA, is guilty as charged of the illegal importation of a controlled substance in violation of 21 U.S.C. §§ 952, 960, and 963.
NOTES
[1] "Any of the officers or persons authorized to board or search vessels may stop, search, and examine, ... any vehicle, beast, or person, on which or whom he or they shall suspect there is merchandise which is subject to duty, or shall have been introduced into the United States in any manner contrary to law, ... and if any such officer or other person so authorized shall find any merchandise on or about any such vehicle, beast, or person, ... which he shall have reasonable cause to believe is subject to duty, or to have been unlawfully introduced in the United States, whether by the person in possession or charge, or by, in, or upon such vehicle, beast, or otherwise, he shall seize and secure the same for trial."
|
{
"pile_set_name": "FreeLaw"
}
|
Vitreous fluorophotometry and retinal blood flow studies in proliferative retinopathy.
The permeability of the blood-retinal barrier and retinal blood flow were evaluated by two new fluorophotometric methods in a series of patients with proliferative retinopathy, due either to retinal vein occlusion or to diabetes. A breakdown of the blood-retinal barrier and a decrease in retinal blood flow were observed in these patients. The breakdown of the blood-retinal barrier could be quantitated by vitreous fluorophotometry, which revealed very high concentrations of fluorescein in the vitreous after intravenous administration. The decrease in retinal blood flow appeared to be due mainly to appreciable narrowing of the retinal arteriolar vessels.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
How to send a batch with emails in android?
I want to send several emails to different recipients, but the text of the letters may differ. And I also want to authorize the user and send mail on his behalf, by Intent and the built-in mail client app. And is there any way to do this with one button click, rather than calling up a new email window (activity) for each of these letters and forcing the user to confirms the sending of each letter?
And is there any way to not call the new e-mail window for each of these letters, so that the user confirms the sending of each letter, and do this at the touch of a button?
Maybe are there any third-party libraries or free mail services for this purpose?
A:
You can use simple-java-mail to achieve that.
public static void SendMail(String recipientName,String recipientAddress,String subject,String message,File file,String myAdress,String password) throws IOException{
System.out.println("File size "+file.length());
Email email = new Email();
email.setFromAddress(myAdress.split("@")[0], myAdress);
email.addRecipient(recipientName, recipientAddress, Message.RecipientType.TO);
email.setSubject(subject);
email.setText(message);
if(file!=null)
email.addAttachment(file.getName(),
FileUtils.readFileToByteArray(file),"application/pdf");
String host = myAdress.split("@")[1];
new Mailer(
new ServerConfig("smtp."+host, 587, myAdress, password),
TransportStrategy.SMTP_TLS,
new ProxyConfig("socksproxy."+host, 1080, "proxy user", "proxy password")
).sendMail(email);
}
If your client is using Gmail, they have to allow third parties to send mail in their settings
|
{
"pile_set_name": "StackExchange"
}
|
Q:
The Kephas.Model package seems a bit heavy weight for my requirements of extensible metadata. Is there a lighter alternative?
My requirement is to use some kind of metadata system for the entities we use, but extensible, meaning that we need to support some kind of custom metadata additionally to querying for properties and methods. The standard Type/TypeInfo classes are useful to some extent, but they cannot be customized to add specific properties to support various patterns we have: tree nodes, master-detail, and other.
Kephas.Model provides a complex infrastructure for supporting such cases, including advanced features like mixins and dimensions, but this is however a bit too much for our system. We need something more lightweight for the code-first entities we have.
Is there a suggestion about what can we use for this kind of requirements? I noticed the Kephas.Reflection namespace, and this seems like a proper candidate, but I am not sure how to use it properly.
A:
That's right, Kephas.Runtime namespace provides a lightweight extensible metadata through the base IRuntimeTypeInfo interface (in Kephas.Core package). There are mainly two ways of accessing it using extension methods:
// get the type information from an object/instance.
var typeInfo = obj.GetRuntimeTypeInfo();
// convert a Type/TypeInfo to a IRuntimeTypeInfo
typeInfo = type.AsRuntimeTypeInfo();
From here on you can manipulate properties, fields, methods, annotations (attributes), and so on, typically indexed by their names. A very nice feature is that IRuntimeTypeInfo is an expando, allowing adding of dynamic values at runtime.
Please note that IRuntimeTypeInfo specializes ITypeInfo (in Kephas.Reflection namespace), which is the base interface in Kephas.Model, too. You are right that Kephas.Model provides a more complex functionality which might make sense for a more elaborate metadata model, including entities, services, activities, and whatever classifiers you can think of, as well as loading the model also from sources other than the .NET reflection (JSON, XML, database, so on).
Another aspect is that up to version 5.2.0, the IRuntimeTypeInfo would be implemented by the sealed RuntimeTypeInfo class. Starting with version 5.3.0, it will be possible to provide your own implementations, which can be more than one.
|
{
"pile_set_name": "StackExchange"
}
|
Media Analysis
Performs multiple analytics within target media.
The Media Analysis API allows you to perform multiple Media Analytics API functions on the same input file. For example, you can create a transcript of the text in the media file, and detect scene changes in the same file.
This API is similar to running the individual Media Analytics APIs, but it can use the media processing resources more efficiently because it does not need to decode the input file multiple times. This approach can improve the performance, and the API unit cost of using the API, compared to using the media analytics APIs individually.
Note: The Analyze Media API is not the same as a Combination. A Combination runs each of the APIs individually, while Analyze Media runs all of them in a single job.
Quick Start
You can upload a media file to the API by using a POST request method. For example:
You can also provide a file as a URL or a Haven OnDemand object store reference.
Note: Because input files for this API can be large and take a long time to process, the API runs only in asynchronous mode.
Note: The API processes only the first 60 seconds of any input file and processes for a maximum of 2 hours (the processing time is not necessarily the same as the length of the input file). After 2 hours, the API returns the results it has processed, truncating anything after that time. Input files are also subject to a maximum size quota. For more information, see Rate Limiting, Quotas, Data Expiry, and Maximums.
You specify the operations that you want to perform by submitting a JSON object that defines the input parameters for each API that you want to run. You must specify at least one analytic.
The Analyze Media API can run the following APIs on the file that you upload:
The source_information response field contains information about the media that you send. This field is returned only once in the Analyze Media API response, rather than appearing in each analytic subsection.
Asynchronous Use
Additional requests are required to get the result if this API is invoked asynchronously.
You can use /1/job/status/<job-id> to get the status of the job, including results if the job is finished.
You can also use /1/job/result/<job-id>, which waits until the job has finished and then returns the result.
Model
This is an abstract definition of the response that describes each of the properties that might be returned.
Media Analysis Response {
source_information (
Source_information
, optional)
Metadata information about a media file
license_plates (
License_plates
, optional)
scene_changes (
Scene_changes
, optional)
faces (
Faces
, optional)
objects (
Objects
, optional)
transcription (
Transcription
, optional)
classes (
Classes
, optional)
}
Media Analysis Response:Source_information {
mime_type (
string
)
MIME type of the document.
video_information (
Video_information
, optional)
Information about the video track if one is present.
audio_information (
Audio_information
, optional)
Information about the audio track if one is present.
image_information (
Image_information
, optional)
Information about the image track if one is present.
document_information (
Document_information
, optional)
Information about the document track. This is only available if the source media is a multi-page image, presentation file, or PDF.
}
Media Analysis Response:Source_information:Video_information {
width (
integer
)
The width of the video in pixels.
height (
integer
)
The height of the video in pixels.
codec (
string
)
The algorithm used to encode the video.
pixel_aspect_ratio (
string
)
The aspect ratio of pixels in the video. For example, if the video is made up of square pixels this value is 1:1.
}
Media Analysis Response:Source_information:Audio_information {
codec (
string
)
The algorithm used to encode the audio.
sample_rate (
integer
)
The frequency at which the audio was sampled.
channels (
integer
)
The number of channels present in the audio. For example, for stereo this value is 2.
}
Media Analysis Response:Source_information:Image_information {
width (
integer
)
The width of the image in pixels.
height (
integer
)
The height of the image in pixels.
}
Media Analysis Response:Source_information:Document_information {
page_count (
integer
)
The estimated number of pages in the document.
}
Media Analysis Response:License_plates {
items (
array[Items]
)
All of the detected license plates from the source media.
}
Media Analysis Response:License_plates:Items {
start_time_offset (
number
, optional)
Time offset from the start of the video to where the license plate first appears. This value is expressed as a non integer number. This is only available if the source media is a video.
end_time_offset (
number
, optional)
Time offset from the start of the video to where the license plate is no longer visible. This value is expressed as a non integer number. This is only available if the source media is a video.
time_offset (
number
, optional)
Time offset from the start of the video to where the license plate was identified. This value is expressed as a non integer number. This is only available if the source media is a video.
page (
integer
, optional)
Page in the document where the license plate is located. This is only available if the source media is a multi-page image, presentation file, or PDF. The minimum possible value of this property is 1, which means that the license plate is located on the first page.
origin (
enum<Origin>
)
The location that the license plate originates from (that is, the license plate registration location, rather than the location where the video was captured). This field has the same possible values as the source_location parameter.
location_adjusted_text_components (
array[string]
)
An array of strings that represent the different textual information extracted from the license plate. For example, Saudi Arabian license plates consist of 3 letters and up to 4 numbers; these two components are represented as separate elements of the array. This field uses the ocr_text information and applies corrections, according to the format specified by the identified origin. This always contains at least one item, and each item contains at least one character.
ocr_text (
string
)
The characters identified by Optical Character Recognition (OCR) before any corrections are applied according to the format specified by the recognized origin.
shape (
enum<Shape>
)
The shape of the license plate.
confidence (
number
)
A value (0-100) of confidence in the license plate identification.
source_region_coordinates (
array[Source_region_coordinates]
)
A set of coordinates (relative to the top left of the source) that represents the bounding region where the license plate can be found in the source media. If the source media is a video then this region is where the license plate was found at time_offset in the video. This always contains at least 3 co-ordinates
Time offset from the start of the video to where the scene change occurred. This value is expressed as a non integer number.
}
Media Analysis Response:Faces {
items (
array[Items]
)
An array of Face objects.
}
Media Analysis Response:Faces:Items {
start_time_offset (
number
, optional)
Time from the start of the video to where the face first appears. This value is expressed as a non integer number. This is only available if the source media is a video.
end_time_offset (
number
, optional)
Time from the start of the video to where the face is no longer visible. This value is expressed as a non integer number. This is only available if the source media is a video.
time_offset (
number
, optional)
Time offset from the start of the video to where the face was detected. This value is expressed as a non integer number. This is only available if the source media is a video.
page (
integer
, optional)
The page (1-based index) in the document where the face is located. This is only available if the source media is a multi-page image, presentation file, or PDF.
age (
enum<Age>
, optional)
The age range of the face.
source_region_coordinates (
array[Source_region_coordinates]
)
An array of coordinates (relative to the top left of the source) that represents the bounding region where the face can be found. If the source media is a video then this region is where the face was found at time_offset in the input source.
Time from the start of the video to where the object first appears. This value is expressed as a non integer number. This is only available if the source media is a video.
end_time_offset (
number
, optional)
Time from the start of the video to where the object is no longer visible. This value is expressed as a non integer number. This is only available if the source media is a video.
time_offset (
number
, optional)
Time offset from the start of the video to where the object was detected. This value is expressed as a non integer number. This is only available if the source media is a video.
page (
integer
, optional)
The page (1-based index) in the document where the object is located. This is only available if the source media is a multi-page image, presentation file, or PDF.
source_region_coordinates (
array[Source_region_coordinates]
)
An array of coordinates (relative to the top left of the source) that represents the bounding region where the object can be found. If the source media is a video then this region is where the object was found at time_offset in the input source.
Haven OnDemand uses cookies to enhance and improve the experience it provides. By continuing to use this site or pressing Continue,
we will assume that you accept receiving all cookies. If you would like to change which cookies are set, you can change your settings.
|
{
"pile_set_name": "Pile-CC"
}
|
<!DOCTYPE html
PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title><div> with role alert; inherited supported state or property "aria-expanded" value
of "false"
</title>
</head>
<body>
<div id="test" role="alert" aria-expanded="false">Placeholder content</div>
<div id="obj1">obj1</div>
<div id="obj2">obj2</div>
</body>
</html>
|
{
"pile_set_name": "Github"
}
|
After reviewing more than 35 pages of email from top Hillary Clinton aide Huma Abedin, Judicial Watch observes that Abedin advised a State Department staffer that it was “very important” to review phone calls with Clinton because she was “often confused.”
Judicial Watch notes that Abedin emailed State Department Clinton aide and companion Monica Hanley from her “Huma@clintonemail.com” to alert her about the need to go over phone calls with Clinton.
advertisement
Additionally, Abedin’s emails reveal “repeated security breaches, with the Secretary’s schedule and movements being sent and received through Abedin’s non-governmental and unsecured Clinton server account,” states Judicial Watch.
On January 26, 2013, Abedin had the following email exchange with Hanley:
Abedin: Have you been going over her calls with her? So she knows singh is at 8? [India Prime Minister Manmohan Singh]
Hanley: She was in bed for a nap by the time I heard that she had an 8am call. Will go over with her
Abedin: Very imp to do that. She’s often confused.
The emails also provide specific details of Clinton’s last day in office on January 31, 2013. Exact times and locations of all her appointments during the day are given.
“Huma Abedin’s description of Hillary Clinton as ‘easily confused’ tells you all you need to know why it took a federal lawsuit to get these government emails from Clinton’s illegal email server,” said Judicial Watch President Tom Fitton. “These emails also show that Hillary Clinton’s and Huma Abedin’s decision to use the Clinton email server to conduct government business was dangerous and risky.”
|
{
"pile_set_name": "Pile-CC"
}
|
Lung micronodules: automated method for detection at thin-section CT--initial experience.
An automated system was developed for detecting lung micronodules on thin-section computed tomographic images and was applied to data from 15 subjects with 77 lung nodules. The automated system, without user interaction, achieved a sensitivity of 100% for nodules (>3 mm in diameter) and 70% for micronodules (<or=3 mm). With the same images, a radiologist detected nodules and micronodules with sensitivities of 91% and 51%, respectively, without system input. With assistance from the automated system, these sensitivities increased to 95% and 74%, respectively. Preliminary results indicate that the automated system considerably improved the radiologist's performance in micronodule detection.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Jean Delumeau
Jean Léon Marie Delumeau (18 June 1923 – 13 January 2020) was a French historian specializing in the history of the Catholic Church, and author of several books regarding the subject. He held the Chair of the History of Religious Mentalities (1975–1994) at the Collège de France (former emeritus professor) and was a member of the Académie des inscriptions et belles-lettres.
Career
Jean Léon Marie Delumeau was born in Nantes on 18 June 1923 and obtained his early education in several Catholic boarding schools. In 1943 he entered the École Normale Supérieure, and he later studied at the École Française de Rome, where Fernand Braudel was one of his mentors, and he taught history at École Polytechnique, University of Rennes 2, and University of Paris 1 Pantheon-Sorbonne.
He was director of the Armorican Center for Historical Research (1964–1970), director of studies at the École pratique des hautes études (1963–1975) and at School for Advanced Studies in the Social Sciences (1975–1978), and professor emeritus at the Collège de France, where he occupied the chair of "History of Religious Mentalities in the Modern Western World" (1975–1994).
He was a member of the editorial board of several academic journals and a visiting professor at several universities in North America, Europe and Asia, and was also an honorary member of the Institut Universitaire de France and the Academia Europaea.
On 26 February 1988, Delumeau was elected a member of the Académie des Inscriptions et Belles-Lettres in the chair of Georges Dumézil. He was given his épée d'académicien on 27 September 1989 by . During the ceremony, speeches were made by Nicole Lemaître, Alain Cabantous, Michel Mollat du Jourdin, Wolff and himself. He was a candidate for the Académie française in 2002.
Later life, death, and legacy
On 26 April 2017, he was one of the signatories of a forum of researchers and academics announcing that their support for Emmanuel Macron in the first round of the 2017 French presidential election and calling to vote for him the second, in particular because of his commitment to higher education and research. Delumeau died on 13 January 2020 in Brest.
Delumeau has been described as "one of the most prominent representatives of the so-called history of mentalities" by , a French historical journal
Awards and honors
Delumeau was an honorary member of the Observatoire du patrimoine religieux, a multi-faith association that works to preserve and promote French cultural heritage. He was also a member of the sponsorship committee of the Coordination pour l'éducation à la non-violence et à la paix.
He was made knight of the Legion of Honour on 28 Octobre 1978, promoted to officier on 31 December 1989, and to commander on 31 December 1999. He was made officer of the Ordre national du Mérite on 19 November 1995 and promoted to commander on 7 May 2007. He was also a commander of both the Ordre des Palmes académiques and the Ordre des Arts et des Lettres, the latter of which he was made on 24 November 1994.
Delumeau received honorary degrees from the University of Porto in 1984, the University of Sherbrooke in 1986, the University of Liège in 1992, the University of Deusto (1996), and the University of Bucharest in 2011.
He received the Grand prix Gobert for his book La civilisation de la Renaissance (1968), the 1975 Prix Thiers for his book Rome, the 1977 Prix Monseigneur Marcel for his book La civilisation de la Renaissance, and the 1980 Prix Montyon for his book Histoire vécue du peuple chrétien. He received the 1977 Grand prix catholique de littérature for his book Le Christianisme va-t-il mourir?.
Bibliography
Collective, Homo Religiosus. Autour de Jean Delumeau, Paris, Fayard, 1997.
.
References
External links
Category:École Normale Supérieure alumni
Category:Collège de France faculty
Category:Members of the Académie des Inscriptions et Belles-Lettres
Category:1923 births
Category:2020 deaths
Category:People from Nantes
Category:French male non-fiction writers
Category:Place of death missing
Category:French historians of religion
Category:20th-century French historians
Category:21st-century French historians
Category:21st-century French male writers
Category:20th-century French male writers
|
{
"pile_set_name": "Wikipedia (en)"
}
|
High birthweight was not associated with altered body composition or impaired glucose tolerance in adulthood.
To investigate whether a high birthweight was associated with an increased proportion of body fat or with impaired glucose tolerance in adulthood. Our cohort comprised 27 subjects with birthweights of 4500 g or more, and 27 controls with birthweights within ±1 standard deviation scores, born at Uppsala University Hospital 1975-1979. The subjects were 34-40 years old at the time of study. Anthropometric data was collected, and data on body composition was obtained by air plethysmography and bioimpedance and was estimated with a three-compartment model. Indirect calorimetry, blood sampling for fasting insulin and glucose as well as a 75 g oral glucose tolerance test were also performed. Insulin sensitivity was assessed using homoeostasis model assessment 2 and Matsuda index. There were no differences in body mass index, body composition or insulin sensitivity between subjects with a high birthweight and controls. In this cohort of adult subjects, although limited in size, those born with a moderately high birthweight did not differ from those with birthweights within ±1 standard deviation scores, regarding body composition or glucose tolerance.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
---
- name: copy waybar configuration
tags: waybar
synchronize:
src: waybar
dest: ~/.config/
- name: template styles.css
template:
src: style.j2
dest: ~/.config/waybar/style.css
|
{
"pile_set_name": "Github"
}
|
Q:
Difference between OpenPGP symmetric encryption and AES-256?
I would like to understand the difference between:
OpenPGP symmetric encryption
and
AES-256 using Winzip/7-zip?
I mean if you encrypt a file with an OpenPGP program like GnuPG, using AES-256 symmetric encryption. And do the same with Winzip/7-zip using AES-256. What is the difference?
[I am not asking about the asymmetric encryption in OpenPGP with public-private keys]
Thanks.
A:
OpenPGP is a standard defining a message format. That message format is fairly complex, but in short, it contains:
Which algorithm it's using, if any
Any required parameters for that algorithm (e.g. nonces)
The (encrypted) message body
Some other metadata which isn't relevant here
OpenPGP is, notably, not an encryption algorithm. It can use encryption (and that's its whole raison d'être, so it normally does) but the algorithm it uses is variable.
AES-256, on the other hand, is a specific algorithm. It takes as input a secret key and a message, and it encrypts that key with that message.
AES-256 is one of the many encryption algorithms that the OpenPGP standard supports.
Encrypting something with AES-256 and the same key with OpenPGP is going to lead to the same ciphertext (encrypted text) as using any other software. However, there are two things to note:
Bad implementations of AES do exist, and can be exploited, depending on context. Bad usages also exist; for example, the AES mode can be any number of things -- ECB, CBC, GCM -- and picking the wrong one could break your security.
Because they're in different formats, the files produced by telling 7zip to encrypt a zipfile versus telling OpenPGP to encrypt a message will likely be different. However, this has nothing to do with their implementation of AES-256; as long as it's not broken, it'll still produce the same ciphertext. It's just represented differently.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
HTML5 dialog element close button not working properly
I'm looking at this question post, and I'm having trouble applying it to work in my code.
It's confusing me because I'm doing the exact same thing for the save button as I am the cancel button (at least, the part about it closing) and nothing happens upon clicking cancel.
<dialog class="my-modal">
<p>Add Cust</p>
<label for="nameField">Name</label><input id=nameField><br>
<label for="addressField">Address</label><input id=addressField><br>
<label for="cityField">City</label><input id=cityField><br>
<label for="stateField">State</label><input id=stateField size=2>
<label for="zipField">Zip</label><input id=zipField><br>
<br>
<button onclick="closeAndSave()">Save</button>
<button onclick="close()">cancel</button>
</dialog>
function close(){
const modal = document.querySelector('.my-modal');
modal.close();
}
Have also tried:
<button class="btn btn-default" data-dismiss="my-modal" aria-label="Close">Cancel</button>
A:
Another way to approach this would be to bind behavior to buttons in your script, rather than to specify functionality for buttons with the inline "onclick" attribute.
The "inline onclick method" can lead to unexpected behavior (which may be the cause of the problem in your case). An example would be, if close() is redefined/reassigned elsewhere in your apps global scope, then that would cause "the wrong close function" to be called by the dialog's close button.
Consider revising your HTML and script so that event binding is delegated to your script for better control, as shown below:
/* Obtain modal as before */
const modal = document.querySelector('.my-modal')
/* Select buttons from modal and bind click behavior */
modal.querySelector("button.cancel").addEventListener("click", () => {
/* Call close method on modal to dismiss */
modal.close();
});
modal.querySelector("button.save").addEventListener("click", () => {
alert("save data");
modal.close();
});
/* Added for snippet to prelaunch dialog */
modal.showModal();
<dialog class="my-modal">
<p>Add Cust</p>
<label for="nameField">Name</label><input id=nameField><br>
<label for="addressField">Address</label><input id=addressField><br>
<label for="cityField">City</label><input id=cityField><br>
<label for="stateField">State</label><input id=stateField size=2>
<label for="zipField">Zip</label><input id=zipField><br>
<br>
<!-- Replace onclick with classes to identify/access each button -->
<button class="save">Save</button>
<button class="cancel">cancel</button>
</dialog>
Hope that helps!
|
{
"pile_set_name": "StackExchange"
}
|
Melanie Hebert
Melanie Ann Hebert (born in Marrero, Louisiana, United States) is an American journalist. She formerly anchored the weekday morning news at the city's NBC affiliate WDSU and anchoring weekday mornings at the CBS affiliate WWL-TV in New Orleans. Hebert has also appeared in several films and TV shows as a news reporter.
Career
Hebert's TV career began behind the scenes in Los Angeles with the entertainment news magazine Extra before she returned to Louisiana to join WVLA-TV, the NBC affiliate in Baton Rouge, as a news anchor and reporter. During this time, she covered Hurricane Katrina and its aftermath and co-anchored a two-week special for the Olympics, "Baton Rouge to Athens", on which she also served as Executive Producer.
Hebert's success in Baton Rouge and the national attention generated by Hurricane Katrina led her to return to California in 2005 where she became the morning and noon anchor for KESQ-TV in Palm Springs. The morning news team received an Emmy Award for the devastating wildfires in California. Hebert returned to New Orleans to produce a one-week special covering the first anniversary of Hurricane Katrina while working at KESQ.
In June 2008, Hebert once more returned to Louisiana to join the WDSU NewsChannel 6 team in New Orleans as the morning anchor.
She has also served as the Director of Publicity for the Baton Rouge Ballet Theatre and has been involved in charity work with Big Brothers Big Sisters, United Way, and Louisiana Amyotrophic Lateral Sclerosis Association.
Education
Melanie Hebert attended St. Mary's Dominican High School and the New Orleans Center for Creative Arts before attending Louisiana State University in Baton Rouge. At LSU she earned a Bachelor of Arts in Mass Communication and was a member and captain of the Golden Girls dance team.
Hebert was crowned the 2001 LSU Homecoming Queen.
Filmography
Film
Green Lantern (2011) - News reporter
Get Hard (2015) - News reporter
The Free World (2016) - News reporter
The Dirt (2019) - MTV VJ
Television
Reckless (2014) - News anchor (ep. 1, "Pilot")
Zoo (2015) - News reporter
References
External links
Category:Living people
Category:Television anchors from New Orleans
Category:Louisiana State University alumni
Category:People from Marrero, Louisiana
Category:Year of birth missing (living people)
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Set to celebrate its silver anniversary next year, LUSAT-1 — which is also known as OSCAR 19 or LO-19 — appears once again to be functioning, sort of, when not in sunlight. At this point, OSCAR 19 is only transmitting telemetry; its digital transponder has not been reported to be operational.
“We knew that our LUSAT started transmitting again a couple of years ago, but only when illuminated by sunlight and was not heard during the night,” Pedro Converso, LU7ABF, reported to the AMSAT-BB. During a recent nighttime pass, though, he was surprised to hear “the usual strong 900 mW continuous carrier on 437.125 MHz,” 22 minutes after LO-19 had emerged from Earth’s shadow.
“It’s almost a miracle that after almost 25 years, LUSAT’s vintage Ni-Cd batteries can receive and hold [a] charge,” he said.
Launched in 1990 from Kourou, French Guyana, on an Ariane 4 vehicle, the satellite — Argentina’s first — has completed more than 128,000 orbits, and is one of the oldest active Amateur Radio satellites. The satellite carries a digital store-and-forward packet transponder with uplink frequencies at 145.84, 145.86, 145.88, and 145.90 MHz 1200 bps FM, with AX.25 protocol downlink at 437.125 MHz SSB.
An audio clip, tracking information, and listener reports are available via the AMSAT-LU website. Reports are welcome via e-mail.
|
{
"pile_set_name": "OpenWebText2"
}
|
Benign human enterovirus becomes virulent in selenium-deficient mice.
Coxsackieviruses have been implicated as possible co-factors in the etiology of the selenium (Se)-responsive cardiomyopathy known as Keshan disease. Here we report that a cloned and sequenced amyocarditic coxsackievirus B3 (CVB3/0), which causes no pathology in the hearts of Se-adequate mice, induces extensive cardiac pathology in Se-deficient mice. CVB3/0 recovered from the hearts of Se-deficient mice inoculated into Se-adequate mice induced significant heart damage, suggesting mutation of the virus to a virulent genotype. We demonstrate the important role of host nutritional status in determining the severity of a viral infection.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
King's Disappointment
Both King and Gandhi were frustrated that they could get people to protest but not to serve.
Thinking that my friend Martin Luther King might turn over in his grave if he knew the holiday in his name was becoming just another day of shopping, TV, and relaxation, in 1994 I went to one of Martin's comrade-in-arms, Congressman John Lewis. "How do we make it a day on, not a day off?" I asked.
As legislators (I was a senator from Pennsylvania at the time), our solution was a bill. Congress passed the law charging the new Corporation for National Service and the Federal King Holiday Commission with organizing it as a national day of service.
It seemed so obvious. After all, it was King who had said, "Everybody can be great because everybody can serve." And he said, "Life's most persistent and urgent question is 'What are you doing for others?'" King and "service" are virtually synonymous, we thought.
Advertisement
Yet I have a confession. The holiday we created emphasizes something for which King was not known.
Rather, he was most closely associated with civil disobedience, struggle, a season of suffering, marching through unfriendly streets, facing snarling dogs, and going to jail. And, of course, as one whom Martin used to describe as the only lawyer in his camp who would help him go to jail instead of using all the tricks of the trade to keep him out of jail, I know that his insistence on nonviolent action changed the course of history.
Advertisement
Yet I believe that Martin would be deeply disappointed that his name were connected only with the fight for racial justice and nonviolent protest.
Time and again, Martin talked with me about a side of Mahatma Gandhi that deeply appealed to him. Not just the Gandhi of the salt march, and the years in prison, but Gandhi the servant leader.
Advertisement
Gandhi said that
satyagraha
--the name he gave to his way of action, "firmness in truth"--had two sides: civil disobedience and, the other side of the coin, constructive service.
Gandhi often said that his purpose in life was to live the sermon on the mount. He asked the Indian independence movement to carry out a 13-point plan of constructive service that included personal action to end untouchability by working, eating, and serving side by side with untouchables, by adopting them as members of one's family. It included teaching all Indians to read and bringing health care to every village.
|
{
"pile_set_name": "Pile-CC"
}
|
Guest writer: Cathy Hornback, Community Volunteer Support Senior Specialist at Geocaching HQ
A geocache description is the information you write for other geocachers on your cache page about your cache and its location. It’s also a good way to share information about interesting things to see while there, things to avoid, and what kind of equipment you’ll need. A good cache description can attract more people to visit and find your geocache. Below are two examples of a geocache description. Which cache would you want to visit?
Cache description one:
Cache description two:
Did you choose the second one? Most people would because it makes the cache location sound beautiful and inspiring, with interesting things to see. Here are some additional tips to help you take your cache descriptions to the next level and inspire people to choose your cache as the next one they will visit.
Describe the experience finders will have
Tell people why they should visit your cache. Describe the location (hopefully you chose a nice one), or explain why the place inspires you. Do you have a great story about the cache? Tell that story! Describe your cool container, or the theme of your gadget cache. Do you have a surprise for them and don’t want to share the secret until they get there? That’s OK, tell them you have a fun surprise waiting for them.
Don’t make it too long.
No one wants to read a wall of text. Try to be concise, and break it into paragraphs if it is still seems long. If you have a lot of history and information to share, consider adding a link to a web page that has the information instead of writing it all in the description. Then people who want to know more can follow the link and those who just want a smiley can get the information they need, find the cache and carry on.
Consider including photos.
A picture paints a thousand words, and they can help divide sections of text. A photo of your beautiful location will make people want to go there. An amusing image that matches the theme of your cache will make them want to go there and see what the joke is.
Do you have an especially good cache description that you have written? Or maybe one you have read for a cache you’ve found? Share it in the comments!
Share with your Friends:
Tweet
More
Print
|
{
"pile_set_name": "OpenWebText2"
}
|
With the rise of deep submicron CMOS technologies, integrated circuit designs are becoming more complex incorporating more and more of a system onto a single chip. System interconnects (i.e., signal lines), previously accessible to standard test and measurement equipment, such as oscilloscopes, spectrum analyzers, and the like, are no longer observable. Advanced BIST (Built-In Self-Test) and DFM (Design For Manufacturing)/DFT (Design For Test) approaches are required to verify that the silicon is designed and operating properly. Several companies, such as LogicVision (a part of Mentor Graphics Corporation in Wilsonville, Oreg., USA), are actively attempting to supply solutions to this problem by providing embedded test IP (Intellectual Property). However, this solution cannot solve a problem of not providing a signal to and from an inter-chip signal line to and from an outside test and measurement instrument.
At the same time, speed and signal densities are driving package manufacturers to use advanced technologies such as MCM (Multi-Chip Module) with ceramic and Silicon-Carrier substrates. The MCM can incorporate several dies or bare ICs (Integrated Circuits) as DUTs (Devices Under Test). FIG. 1 shows a magnified perspective view of a conventional MCM 10. It should be noted that the scales of the elements are not the same in FIG. 1. Two dies 12 and 14 as DUTs are mounted on an upper surface of a module substrate 16 made of ceramic and these dies are connected together via one or more conductive paths (shown by dotted lines) in the module substrate 16. The conductive paths may be on surface traces or buried traces, connected with through-holes so as to transmit signals for the DUTs 12 and 14. A lower surface of the ceramic substrate 16 is mounted on an upper surface of an ECB (etched circuit board) 18 having plural electrodes (or pads) 20 so that the conductive paths of the ceramic substrate 16 are electrically connected to the corresponding electrodes 20 of the circuit board 18 via bumps 22. These electrodes 20 are electrically connected to contacts or pins of a MCM package. A specific kind of cover 23 over the dies 12 and 14 would be a hardened liquid, sometimes called “glob”. Other standard kinds of covers can be a single IC cover, epoxied to the package, or a multichip module cover, epoxied, bolted or screwed to the module.
The above described configuration shown in FIG. 1 allows for significant portions of the system to be pulled together into a single package. This creates the same problem for signal assessability and observability as seen with advanced CMOS designs. To date, no one has offered a solution to observability for package integration.
JTAG architecture was standardized by IEEE std. 1149.1-1990 as Standard Test Access Port and Boundary-Scan Architecture. FIG. 2 shows a simplified block diagram of a conventional IC 30 using JTAG architecture. The IC 30 comprises an inherent IC function block 32, “PIN Test” blocks 34 each inserted between a terminal of the inherent IC function block 32 and a respective contact “I/O PIN”, test logic blocks 36 and 38 each connected between contacts “Test Data In” and “Test Data Out”, and a test access port controller 40 connected to contacts “Test Clock”, “Test Reset” and “Test Mode Select”. The contacts “Test Data In” and “Test Data Out” are connected to both of the lowest “PIN Test” blocks 34. In a normal operation of the IC 30, each “PIN Test” block 34 connects its respective contact “I/O PIN” to the inherent IC function block 32, so that the blocks 36-40 do not operate. In BST (Boundary Scan Test) mode, test data at the contact “Test Data In” is applied to a selected terminal of the inherent IC function block 32 via the “PIN Test” blocks 34 and an output from a selected terminal of the inherent IC function block 32 is applied to the contact “Test Data Out” via the “PIN Test” block 34 under control of the test access port controller 40 that is controlled by a signal from the contact “Test Mode Select”. However, this test mode is difficult to program and needs skilled test engineers. In addition, the test circuits, such as the test logic block and the test access port controller, should be contained in the IC 30 as the DUT. Recently, JTAG architecture has used not only the boundary scan test mode but also a communication method. Therefore, a signal at a desired terminal of the inherent IC function block 32 can be provided from the contact “Test Data Out” to circuitry external to the IC 30 under control of the “PIN Test” blocks 34. In this manner, the contact “Test Data Out” acts as a JTAG interface port.
Applying JTAG architecture to the MCM 10 shown in FIG. 1, a plurality of specified electrodes 42 of the circuit board 18 are connected via the signal paths to specified terminals of the die 14 and are further connected to a JTAG interface port. This is shown in the drawings as a simple, generic, interface and called out as “JTAG or other interface ports”. The JTAG implementation takes more than one physical path of connections. In the prior art shown in FIG. 2, five extra pins involved to implement JTAG would be more typical. In order to avoid this complexity, FIG. 1 is simplified. One skilled in the art will recognize that another appropriate interface port may be used instead of the JTAG interface port. Therefore, the desired signals of the dies 12 and 14 can be read from the JTAG interface port. Since the JTAG architecture is implemented, the dies 12 and 14 should include the test circuit. Moreover, integration of systems onto single die and multi-chip modules make observability and accessibility of system signals difficult.
What is needed is a method and device for measuring inter-chip signals by leading such signals to the outside of the module and measuring such signals with a conventional test and measurement instrument, recognizing that such methods and circuits will also lend themselves to applying stimulus signals to the DUT.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
The insulin and glucose responses to meals of glucose plus various proteins in type II diabetic subjects.
We previously have shown that ingested beef protein is just as potent as glucose in stimulating a rise in insulin concentration in type II diabetic patients. A synergistic effect was seen when given with glucose. Therefore, we considered it important to determine if other common dietary proteins also strongly stimulate an increase in insulin concentration when given with glucose. Seventeen type II (non-insulin-dependent) untreated diabetic subjects were given single breakfast meals consisting of 50 g glucose, or 50 g glucose plus 25 g protein in the form of lean beef, turkey, gelatin, egg white, cottage cheese, fish, or soy. The peripheral plasma concentrations of glucose, insulin, glucagon, alpha amino nitrogen, urea nitrogen, free fatty acids, and triglycerides were measured. Following ingestion of the meals containing protein, the plasma insulin concentration was increased further and remained elevated longer compared with the meal containing glucose alone. The relative area under the insulin response curve was greatest following ingestion of the meal containing cottage cheese (360%) and was least with egg white (190%) compared with that following glucose alone (100%). The glucose response was diminished following ingestion of the meals containing protein with the exception of the egg white meals. The peripheral glucagon concentration was decreased following ingestion of glucose alone and increased following all the meals containing protein. The alpha amino nitrogen concentration varied considerably. It was decreased after glucose alone, was unchanged after egg white ingestion, and was greatest after ingestion of gelatin. The free fatty acid concentration decrease was 4- to 8-fold greater after the ingestion of protein with glucose compared with ingestion of glucose alone.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Do processors need to be hardened against vibration?
Rockets are very loud, and seems to have a lot of vibration caused by turbulence. They're also run by microchips, which I tend to think of as fragile. Do the microchips need to be specially designed or encased to withstand these forces?
A:
Well, yes and no. The most important feature for modern space-bound CPUs (aside from 100% reliability) is radiation hardening. Radiation hardening is considered at every step of the design process from the materials used to the configuration of the transistors in each internal circuit. These chips are specifically designed to withstand any bombardment of radiation that can be thrown at them.
That being said, there have been some improvements considering susceptibility to vibration in recent history. Traditionally processor circuits for devices meant to live in the harshness of space contain a simple (or in the case of the Voyager 10/11 crafts completely discrete logic) devices that are supported by a large array of discrete logic. This was done, again, in pursuit of radiation hardening. Such circuits were composed of a large number of components with exposed leads. Below is an image one of the main computer boards for the (now retired) space shuttle:
Nowadays the dense CPUs (such as the CPU in the BAE RAD750 single board computer) are designed with some variety of a leadless (the pins are underneath the component) footprint. This document shows the features of the CPU contained within the RAD750, and there is a section on the device's reliability:
The RAD750 will be packaged in a Ceramic Column
Grid Array (CGA) package, constructed by attaching
extended columns to the original Ball Grid Array (BGA)
360 pin package employed for the 0.25 micron
PowerPC 750. The CGA package has been adopted
because it is better suited to the stresses of launch
and the space environment. The CGA has
demonstrated significantly increased reliability during
temperature cycling and stress, when compared to
BGA packages, as shown in Figure 3. The CGA
package has also passed shock and vibration testing
for the space launch environment.
As you can imagine, the column grid array components are much more rigid than the leaded components. More information on CGA can be found here.
|
{
"pile_set_name": "StackExchange"
}
|
Cybercrime. Cyber Terrorism. Cyber Warfare.
US Army Organizing First Cyber Warfare Combat Team to Fight Future Wars Read
The U.S. Army is now organizing the first unit in a new cyber warfare force that will be deployed in future combat zones and manned by “cyber soldiers,” electronic warfare experts and (for the first time) good, old fashioned hackers.
The detachment is led by Brig. Gen. Patricia Frost, Director of Cyber, Office of the Deputy Chief of Staff, Army G-3/5/7. In this position, she heads the new Cyber Directorate (which also covers electronic warfare) of the army’s headquarters staff in the Pentagon.
Gen. Frost has made her career in military intelligence and cyber warfare and is an acknowledged expert in her field. She’s a graduate of the U.S. Army Military Intelligence Officer Basic and Advanced Courses; Combined Arms Services and Staff School; the Command and General Staff College and the U.S. Army War College.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
How do i make JOIN when need to carried out first table column values?
I have two tables rawtable and tradetable
rawtable
rawid companyname uniqueID
1 AAA-XA 9CV
2 BBB-DEMO 10K
3 CCC-XOXO 7D
tradetable
tradeid securityname CUSIP
1 AAACOMP 9CV
2 BBBCOMP 10K
Now what I need is companyname from rawtable is bit mixed so I need to have securityname from tradetable as companyname for that I used LEFT JOIN
declare DataSourceId = 3;
SELECT DISTINCT
@DataSourceId,
dbo.CleanText(tradetable.securityname)
FROM tradetable
LEFT JOIN
(
SELECT DISTINCT
companyname,
uniqueID
FROM
rawtable
) rawtable ON tradetable.cusip = rawtable. uniqueID
which will give me names from tradetable but here I will miss the new not matching names from rawtable but I want those name too but in select statement
if I use
declare DataSourceId = 3;
SELECT DISTINCT
@DataSourceId,
dbo.CleanText(rawtable.securityname) --instead of tradetable
then I will select wrong mixed name
So how can I solve this problem? or from somewhere else I need to carried out correct names as I want it like tradetable securityname
OUTPUT I EXPECTED :
rawtable
companyname uniqueID
AAA-XA 9CV
BBB-DEMO 10K
CCC-XOXO 7D
tradetable
securityname CUSIP
AAACOMP 9CV
BBBCOMP 10K
I WANT A securityname i.e companyname in proper format for that i'm checking uniqueID
if it is matching then it will fetch securityname from tradetable
NOW
when there is an addition record in rawtable like CCC_XOXO is there it actual name might be CCC so for taking CCC i should have to take that CCC from where it is present in 3rd table or is there any other way?
means i need to import that 3rd table also in my JOIN right?
A:
You mean you want to take the value from tradetable and if it doesn't exist, take it from rawtable? Like this (sqlfiddle)?
SELECT dbo.CleanText(COALESCE(t.securityname,r.companyname)) AS companyname,
COALESCE(t.CUSIP,r.uniqueID) AS uniqueID
FROM rawtable r
LEFT OUTER JOIN tradetable t ON r.uniqueID = t.CUSIP
Output is:
COMPANYNAME UNIQUEID
AAACOMP CV
BBBCOMP 10K
CCC-XOXO 7D
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Using nested resources without the parent ID in Rails
I have a class called Imprintables with nested resources Styles, Brands, Colors, and Sizes. I currently have this in my routes file:
resources :imprintables do
resources :styles, :brands, :colors
resources :sizes do
collection do
post 'update_size_order'
end
end
end
Which produces routes like this:
/imprintables/:imprintable_id/brands
/imprintables/:imprintable_id/colors
/imprintables/:imprintable_id/styles
/imprintables/:impritnable_id/sizes
I don't want to have all my nested resources tied to 1 specific imprintable. I want to have my routes look like:
/imprintables/brands
/imprintables/styles
/imprintables/colors
/imprintables/sizes
...etc.
Whats the best way to go about this?
A:
resources :imprintables do
collection do
resources :styles, :brands, :colors
end
end
|
{
"pile_set_name": "StackExchange"
}
|
Handle Your Feelings Skillfully
You might want to think of yourself as a rational being, however, in fact, your life is motivated by emotions. Emotions upset you, drive you, intimidate you, and inspire you. They inspire decisions, move you to action, or paralyze you in anxiety, stress, and fear. They are the cornerstone of your finest memories and the bond that produces deep connections with other people. In this article, we’ll explore four principles for skillfully working with your emotions and three tips to handle intense feelings such as anxiety, anger, and sadness when they threaten to overwhelm you.
It is possible to feel anxious one minute, angry the next, and then have waves of despair flood through you seemingly out of nowhere. Since they could take you on such wild rides, it is natural to be somewhat wary of strong emotions – and do what you can to prevent them or keep them at bay.
You have seen what can happen when so-called”negative” emotions like fear, anger, and sadness overwhelm you or others. You have memories of unskillful expressions of these feelings you wish you could forget. Images of emotional trauma are stored deep in your subconscious, warning you to be wary once you feel these emotions yourself or witness them in different people.
In the face of vulnerable feelings, a more logical approach may feel safer. It’s easier to concentrate on your thoughts and not venture into the scary world of feelings. Yet, reason has its limits. You may think you are more rational than you are. While you can logically weigh choices or consider unique thoughts, the closing”Yes this” and”Not that” arises from what”feels right.” Even when you’re focused on thinking instead of feeling, in the long run, your decisions and actions are based on your own”gut feelings.”
Because emotions are so powerfully connected to actions and decisions, as well as being connected to threatening memories and your most powerful inspirations and social connections, it’s important to learn how to handle them skillfully. Let’s explore four principles for relating to emotions in a mindful, intentional, and empowered way. Practicing these principles grows your Emotional Intelligence, which is a skillset for handling emotions well.
Four Principles to Handle Emotions Skillfully
1.
While your first inclination when you feel overwhelmed by uncomfortable feelings, such as fear, anger, and sadness, may be to divert yourself, downplay the feeling, or run away, this just causes emotions to go underground, into your subconscious mind, where they’re saved as strain on your body, eat away at your reassurance, and eventually surface as sickness. Repressed emotions are the cornerstone of compulsions and bad habits, in addition to the source of overwhelm and flareups in relationships. You want to address them.
Emotions arise to offer you specific details on what is happening inside you, around you, and with others-and this information will stick with you until it’s acknowledged and heeded. So, it’s important to shift your perspective from fear of emotions to viewing them as helpful guides. Emotions arise with information you need about your life and the ability to take action on this information. Thus, the number one principle of handling emotions is to stop ignoring them and listen to what they have to show you.
You can begin by paying attention to how you feel, in your body, right now. What are the sensations happening inside your skin? Especially, notice any areas of current discomfort, as these hold important clues to what you will need to know and do now.
If you’re not accustomed to checking in like this, you may not feel much at all or you may feel strong aversion to feeling discomfort. Stay with it. Remain current with whatever feeling or lack of sense is there. Attention to feelings requires practice. It is a real skill you can learn. Bear in mind, if you do not pay attention to what your emotions are trying to tell you, they get stuck on repeat and keep cycling through you.
2. Mindfulness of everything you feel shifts your connection to it.
Mindfulness is paying attention, on purpose, in the present moment, without judgment. When extreme feelings arise, instead of immediately trying to do something about them, make time to witness, listen to, and feel them. This action of mindfulness brings new neural connections into your habitual emotional patterns which enables them to shift. You bring a layer of awareness to your emotions that affects how they impact you.
Mindfulness prevents you from being”gripped by” your emotions in a way that”takes you over.” You gain freedom and space inside and around the feelings you”have,” by recognizing that feelings do not define”who you are.” They’re simply information about what is going on inside you, around you, and others.
3.
Knowing that emotions are transient is reassuring when emotions run strongly or cycle repetitively. When you shine the light of awareness in your emotions, you can see what they must show you, take suitable action, and enable them to release.
4.
As soon as you’ve tuned into the sensation of an emotion in your body, ask it what message it’s for you. What’s this feeling telling you about how you’re relating to a circumstance, to yourself, and with other people?
Given this information, what action would be useful for others and yourself? Simply notice what comes to mind.
Because we are not generally taught to comprehend the significance in emotions, we often overlook, ignore, or prevent their messages. When we do this, emotional energy assembles into overblown high play to receive our attention. It is as if our feelings state,”O.K. you didn’t get the message in my civil indoor voice, so I’m going to shout it in you.” You then feel extreme anger, overwhelming sadness, or anxiety that is through the roof.
When emotion has amped up to there, it can be useful to bring it down a notch to a manageable level. A few simple actions can help you do so.
3 Tips to Handle Intense Emotions
1. Pause, close your eyes, and take a few slow, deep, gentle breaths.
Stop what you’re doing, close your eyes, and focus on slow, deep, gentle breathing, in and out through your nose. Closing your eyes and engaging in this type of breathing activates your body’s natural relaxation response, which helps dissipate the pressure, energy, and intensity of strong emotions.
2. Feel the feeling of the emotion in your body.
Notice where the emotion can be found inside your body. Feel the quality of feeling there. Noticing feelings as sensations helps you see them objectively, so you obtain space from what you are feeling.
3. Adopt the mindful perspective of a curious observer and query the emotion as if it is a friend who wants to tell you something important.
Bear in mind that Mindfulness means paying attention, on purpose, at the present moment, without judgment. With this attitude, ask your emotion questions, as though it is a friend who is attempting to provide you valuable information and you are a scientist seeking discovery.
When you follow these tips, you shift your perspective and take the”over-the-top” extreme edge from what you are feeling. Extreme anger can downshift into a firm”no,” intense sadness can mellow into”letting go,” and higher anxiety can settle into a motivating spur to action.
Once a feeling has downshifted in strength, it’s easier to listen to it, feel it, and respond appropriately. You can take action to address the current situation.
The main point is that, as opposed to fearing the emotional intensity of fear, anger, and sadness, see if you can move toward these feelings with a mindful, curious attitude. As you do that, notice how they change and guide you to what you will need to do right now.
|
{
"pile_set_name": "Pile-CC"
}
|
Different functional domains of GLUT2 glucose transporter are required for glucose affinity and substrate specificity.
GLUT2 is the major glucose transporter in pancreatic beta-cells and hepatocytes. It plays an important role in insulin secretion from beta-cells and glucose metabolism in hepatocytes. To better understand the molecular determinants for GLUT2's distinctive glucose affinity and its ability to transport fructose, we constructed a series of chimeric GLUT2/GLUT3 proteins and analyzed them in both Xenopus oocytes and mammalian cells. The results showed the following. 1) GLUT3/GLUT2 chimera containing a region from transmembrane segment 9 to part of the COOH-terminus of GLUT2 had Km values for 3-O-methylglucose similar to those of wild-type GLUT2. Further narrowing of the GLUT2 component in the chimeric GLUTs lowered the Km values to those of wild-type GLUT3. 2) GLUT3/GLUT2 chimera containing a region from transmembrane segment 7 to part of the COOH-terminus of GLUT2 retained the ability to transport fructose. Further narrowing of this region in the chimeric GLUTs resulted in a complete loss of the fructose transport ability. 3) Chimeric GLUTs with the NH2-terminal portion of GLUT2 were unable to express glucose transporter proteins in either Xenopus oocytes or mammalian RIN 1046-38 cells. These results indicate that amino acid sequences in transmembrane segments 9-12 are primarily responsible for GLUT2's distinctive glucose affinity, whereas amino acid sequences in transmembrane segments 7-8 enable GLUT2 to transport fructose. In addition, certain region(s) of the amino-terminus of GLUT2 impose strict structural requirements on the carboxy-terminus of the glucose transporter protein. Interactions between these regions and the carboxy-terminus of GLUT2 are essential for GLUT2 expression.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
David Villa was named New York City FC’s Most Valuable Player for the 2015 season. The Captain led the team with 18 goals and five assists.
Villa’s 18 goals landed him fourth overall in goals scored for Major League Soccer. The Captain had six game-winning goals and had seven penalty kick goals, which led all of Major League Soccer.
"It is an honor for me to receive this award, thank you very much," said Villa. "I will try to keep working hard to win again next season and especially to help improving the collective result of the team."
Villa was named Major League Soccer player of the week twice. Villa’s first player of the week nod came in week two, when the forward scored the first New York City FC goal at Yankee Stadium on March 15 against the New England Revolution.
The second time he won the award, came in week 15, he scored a goal and had an assist against Montreal on June 13.
Villa’s most productive month came in July when he scored six goals and registered an assist. For his effort, Villa was named New York FC’s Etihad Airways Player of the Month for July.
RELATED: Best Images of David Villa from the 2015 Season
Villa also was named a Major League Soccer All-Star and scored a goal in the match.
In the final game of the season, Villa had the lone goal in the Club’s 3-1 loss to New England on Oct. 25.
|
{
"pile_set_name": "OpenWebText2"
}
|
2 pounds beef stew meat, cut into bite-sized pieces
1 teaspoon salt, plus more for seasoning
1/2 teaspoon freshly ground black pepper, plus more for seasoning
2 tablespoons olive oil
1 small red onion, finely diced
3 (4-ounce) cans diced green chiles
1/4 cup crumbled bacon
1 cup tomato puree
1 tablespoon salt-free Mexican seasoning
1/2 teaspoon chili powder
1/2 cup low-sodium beef stock
1 scallion, sliced
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Print what percent of numbers are even and print out even numbers in the array
I'm recently learning arrays, and I am stuck on this question.
I basically have to ask the user to input the numbers that will go into the array, and have to print out the percent of the numbers even and have to print all even numbers in the format that follows.
Even values are : 89,22,-8, 0
My code is this
import java.util.*;
public class Change {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.println("How many numbers in the array?");
int num = input.nextInt();
int count=0;
int count1=0;
for (int i=1; i<=num; i++) {
System.out.println("Enter an integer: ");
count++;
int integer= input.nextInt();
if(integer%2==0) {
int list[]=new int[integer];
count1++;
}
}
System.out.println("There were "+((double)count1/count)*100+" percent of even numbers.");
System.out.println("Even values are "+Arrays.toString(list)+"");
}
}
This code ends up with an error message, saying "list" is not initialized.
I know that because "list" is inside the for loop, the system doesn't realize that it has been initialized, but I have no idea how to have the system recognize "list".
Any help or comments are appreciated. :)
A:
package com.inlet.ifserver;
import java.util.*;
public class x {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.println("How many numbers in the array?");
int num = input.nextInt();
int count1 = 0;
Integer[] evens = new Integer[num];
for (int i = 0; i < num; i++) {
System.out.println("Enter an integer: ");
int integer = input.nextInt();
if (integer % 2 == 0)
evens[count1++] = integer;
}
evens = Arrays.copyOfRange(evens, 0, count1);
System.out.println("There were " + ((double) count1 / num) * 100 + " percent of even numbers.");
System.out.println("Even values are " + Arrays.toString(evens) + "");
}
}
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Can't install Grapefruit on Windows 10
When running cabal install grapefruit-ui-gtk I get build errors on the dependency TypeCompose. The exact command I run is
cabal install grapefruit-ui-gtk
and get the following error output:
Resolving dependencies...
Configuring TypeCompose-0.9.12...
Configuring hashtables-1.2.3.1...
Building TypeCompose-0.9.12...
Building hashtables-1.2.3.1...
Failed to install TypeCompose-0.9.12
Build log ( C:\Users\me\AppData\Roaming\cabal\logs\ghc-8.4.3\TypeCompose-0.9.12-4FepCXFvbF94E2D2EggnNC.log ):
Preprocessing library for TypeCompose-0.9.12..
Building library for TypeCompose-0.9.12..
src\Data\Title.hs:1:33: warning:
-XOverlappingInstances is deprecated: instead use per-instance pragmas OVERLAPPING/OVERLAPPABLE/OVERLAPS
|
1 | {-# LANGUAGE FlexibleInstances, OverlappingInstances, TypeOperators, TypeSynonymInstances #-}
| ^^^^^^^^^^^^^^^^^^^^
[ 1 of 10] Compiling Control.Instances ( src\Control\Instances.hs, dist\build\Control\Instances.o )
[ 2 of 10] Compiling Data.Bijection ( src\Data\Bijection.hs, dist\build\Data\Bijection.o )
[ 3 of 10] Compiling Control.Compose ( src\Control\Compose.hs, dist\build\Control\Compose.o )
src\Control\Compose.hs:596:10: error:
* Could not deduce (Semigroup (Flip j o a))
arising from the superclasses of an instance declaration
from the context: (Applicative (j a), Monoid o)
bound by the instance declaration
at src\Control\Compose.hs:596:10-61
* In the instance declaration for `Monoid (Flip j o a)'
|
596 | instance (Applicative (j a), Monoid o) => Monoid (Flip j o a) where
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
src\Control\Compose.hs:645:10: error:
* Could not deduce (Semigroup (App f m))
arising from the superclasses of an instance declaration
from the context: (Applicative f, Monoid m)
bound by the instance declaration
at src\Control\Compose.hs:645:10-54
* In the instance declaration for `Monoid (App f m)'
|
645 | instance (Applicative f, Monoid m) => Monoid (App f m) where
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
src\Control\Compose.hs:851:1: error:
* Could not deduce (Semigroup (Arrw j f g a))
arising from the superclasses of an instance declaration
from the context: Monoid (j (f a) (g a))
bound by the instance declaration
at src\Control\Compose.hs:851:1-63
* In the instance declaration for `Monoid (Arrw j f g a)'
|
851 | deriving instance Monoid (f a `j` g a) => Monoid (Arrw j f g a)
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
cabal: Leaving directory 'C:\Users\me\AppData\Local\Temp\cabal-tmp-17748\TypeCompose-0.9.12'
Installed hashtables-1.2.3.1
cabal.exe: Error: some packages failed to install:
TypeCompose-0.9.12-4FepCXFvbF94E2D2EggnNC failed during the building phase.
The exception was:
ExitFailure 1
grapefruit-frp-0.1.0.7-28vOfRvsiGH71mjsrgG35Q depends on
grapefruit-frp-0.1.0.7 which failed to install.
grapefruit-records-0.1.0.7-Ih2DxRIbFnG7TB7BHtPbwq depends on
grapefruit-records-0.1.0.7 which failed to install.
grapefruit-ui-0.1.0.7-DMol4wZpyyFEHFP2NRKthr depends on grapefruit-ui-0.1.0.7
which failed to install.
grapefruit-ui-gtk-0.1.0.7-EsNz0f5KGlp47W2BX85WRG depends on
grapefruit-ui-gtk-0.1.0.7 which failed to install.
GHC Version:
The Glorious Glasgow Haskell Compilation System, version 8.4.3
Cabal version:
cabal-install version 2.2.0.0 compiled using version 2.2.0.1 of the
Cabal library
What could be causing this issue? I have tried installing it in a fresh directory with cabal init, and that didn't seem to have any effect.
A:
This is a known issue with TypeCompose under 8.4, which has been fixed but not put on Hackage yet.
You might be able to configure your cabal commands with an older version of GHC (see this question), such as 8.2.2, which shouldn't have this issue.
Alternatively, use stack, which will let you switch ghc versions per-project, and which provides TypeCompose for 8.2.2 on the LTS resolver.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Cirqus: "Expected an event with sequence number 0." exception
Every once in a while I receive exceptions in Cirqus when trying to process commands. It happens with different types of commands, however it always happens with this specific aggregate root type (let's say its a registration form). We haven't deleted events nor messed with the Events table in any way, so I'm wondering what else can cause the issue.
The exact (but anonymized) error message is: Tried to apply event with sequence number 12 to aggregate root of type RegistrationForm with ID d863ac79-6bc0-480d-9d83-30b7696e7ea1 with current sequence number -1. Expected an event with sequence number 0.
So for example to debug the latest instance of the exception I queried the database for this aggregate id and got 37 events in return. I then checked the sequences and the sequences seemed correct. I also checked that the global sequences were at least also chronologically correct. Then I checked to see if the "meta" column had a different global sequence than the record, but that also checked out OK.
What I find most confusing is that other registration forms are able to go through. Looking at our logs there's no pattern I can identify, and also it only happens about 3-5% of the time.
I guess what I'm wondering is: what can cause this issue? how can I debug it? how can I prevent it from happening in the future?
System specifics: We're running under .net 4.5, using Cirqus 0.63.12 (and then also tested on 0.66.4), using Postgres 9.4 as the database (and using v0.63.12 of the Cirqus.Postgres package).
A:
I found the issue! It seems that the PostgreSQL event source's SQL code was missing an Order By clause and in some cases my events were being returned out of order. I submitted this pull request as a proposed fix to the problem: https://github.com/d60/Cirqus/pull/75
|
{
"pile_set_name": "StackExchange"
}
|
Kakvo srce, kakav povratak! Hrvati će igrati u finalu EP-a
Nevjerojatan podvig napravili su mladi Hrvati. Ova je portugalska generacija pobjeđivala i Španjolce, koji su svijet za sebe, neokrznuta je prošla kroz skupinu, ali onda joj se ispriječila Hrvatska
<p><strong>Hrvatska </strong>je u finalu Europskog prvenstva u futsalu do 19 godina! U pravoj polufinalnoj drami u Rigi nakon penala (5-4) izbacila je moćni <strong>Portugal </strong>i subotu u 19 sati igrat će za naslov prvaka protiv Španjolske koja je očekivano izbacila Poljsku (3-1).</p><p>Nevjerojatan podvig napravili su mladi Hrvati. Ova je portugalska generacija pobjeđivala i Španjolce, koji su svijet za sebe, neokrznuta je prošla kroz skupinu, ali onda joj se ispriječila Hrvatska. I hrvatsko srce koje se dvaput vratilo iz bezizlazne situacije. Prvi put dvije sekunde prije kraja utakmice, a onda i pretposljednjoj minuti drugog produžetka. Pa sve naplatila projektilima sa šest metara.</p><p>Zašto je Portugal bio veliki favorit za finale, vidjeli smo u većem dijelu utakmice kojom je dominirao, stvarao brojne prilike pred našim golom koji je spašavao <strong>Čizmić </strong>ili, pak, loše reakcije portugalskih igrača.</p><h2>Jurlina za produžetak</h2><p>Nije da ni Hrvatska nije stvarala opasnosti, samo ne u tolikoj mjeri iako je za golmana <strong>Paca </strong>moglo biti još opasnije da su reakcije Jurline, Mužara i ostalih bili malo brže i točnije.</p><p>Onda se dogodila 31. minuta. Jurlina je previše čekao u dobroj poziciji za udarac, Paco je uzeo loptu, povukao preko cijelog terena i na desnoj strani uposlio Celija koji je prizemnim udarcem našao prostor kroz Čizmićeve noge. Nažalost, gol ide na dušu našeg golmana.</p><p>U završne tri minute izbornik je naredio maksimalan rizik. Čizmić je izašao s gola, igrali smo bez golmana i potrošili pola vremena samo se dodavajući na deset metara od protivničkog gola. Vrijeme je curilo i onda dvije sekunde prije kraja naš najbolji igrač Jurlina opalio je ljevicom s osam-devet metara. Takav se "špic" ne brani. </p><p>Na našoj klupi nastao je delirij i na tim krilima u prvim sekundama produžetka skoro smo i poveli, ali Jurlinin udarac prošao je nekoliko decimetara kraj gola. </p><p>Dok je istjecala posljednja minuta prvog produžetka Portugalci su iskoristili trenutak naše nepažnje i opet poveli. Imali su udarac sa strane, Mužar nije gledao svog igrača koji mu se prikrao i matirao Čizmića.</p><h2>Dajte sve što imate</h2><p>Istim receptom kao u regularnom dijelu napali smo Portugalce kada se opet nije vidio izlaz. Tri minute prije kraja opet smo zaigrali golmana. Vukelić je u jednom napadu, koji nije previše obećavao, u pretposljednjoj minuti htio ubaciti s boka, ali uz puno sreće lopta je završila u golu za novo izjednačenje.</p><p>Preživjeli smo novi portugalski udar i odveli utakmicu do izvođenja šesteraca. Prostora za greške nije bilo jer izvode se samo tri serije.</p><p>- Sve što imate, dajte u taj udarac - govorio je prije trenutaka odluke svojim igračima izbornik Mavrović.</p><p>Upalilo je. U prve dvije (Mudronja, Cvišić) nitko golmanima, kojima svaka čast na hrabrosti, dao šanse, a onda je u trećoj <strong>Neves </strong>opucao kao po kazni i Čizmić mu je to lagano skinuo. Loptu odluke uzeo je, a tko će drugi, Jurlina i pogodio za pobjedu. Za finale!</p><p>Tako se to radi!</p><p><strong>Europsko prvenstvo, polufinale:</strong></p><p><strong>Hrvatska </strong>- Portugal 5-4 (1-1; 2-2)</p>
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Compile Groovy files in Eclipse
My java web project includes some Groovy code. But eclipse is not recognizing Groovy files and not generating any classes out of it.
I have installed Groovy plugin in Eclipse. Installed Groovy in my windows machine and setup GROOVY_HOME and include groovyall jar file in my lib folder. But no luck.
Please help.
A:
You could also use STS, when the dashboard opens up click on the "extensions" tab and click on the Groovy language feature and install it. Then right click on project, -> Spring -> configure groovy nature to use groovy also.
Another option is create a new Groovy project, the upshot is that you can use any java file within a groovy project since they are so well coupled.
|
{
"pile_set_name": "StackExchange"
}
|
Okay, we’ve been dormant awhile, not that Enemy Central ever rests. But the last few years everyone knew who the Enemy of Week, day, year, was. No use naming names when it’s the same name that kept coming up.
Lady Hillary, ever truthful in her claims against the VRWC, lapped the field – by November 8, she was at least 500 laps ahead, a first for anyone competing in Indiana or any other NASCAR location, but let’s not veer off course.
It didn’t help that she didn’t have a good 9/11 this year. We can be cruel at Enemy Central, but not when it comes to picking on someone when they’re down, and out, and dragged into an ugly black van. We thought it pathetic, when she trotted out the Billy Bush tapes in a desperate attempt to tarnish Mr. Trump’s boy scout past. But then it’s been an old Democrat habit to spread fake news. Remember John Kerry, the pro-Hanoi antiwar traitor pretending to have been a Swift Boat hero in his run for the White House? So now Hillary was going after a guy said to hit on women. She’d never heard of such behavior before! (Except, of course, in the case of that one guy who turned out to be her meal ticket — but let’s not go there. “Zone of privacy,” we think it’s called.) It never ceases to amaze what some machismos get away with when they’re standing atop the proverbial glass ceiling.
Now Mr. Trump, being the boy scout that he at heart is, tried to do the gentlemanly thing and post-election said many nice things about the woman he defeated. He even suggested he may not sic the Feds on her for all her Clinton Foundation criminality.
How did she thank him? She began to underwrite someone named Jill Stein’s efforts to bring about a recount in three upper Midwest states that Trump carried and Hillary, in final testimony to her ineptness, failed to secure. Maybe she’s just desperate, knowing she’s collected hundreds of millions from very fat cats who don’t like to be made fools of. How to repay them even ten cents on the dollar? Hang around until she can run again in 2020, that’s how, evidently.
Yesterday she showed up at Dingy Harry’s farewell and confirmed she’s in the 2020 race for good now, unleashing even harsher talk on the fake news front. You may not know it, she let on, but the real reason she lost last month was that wackos were accusing her and David Brock of running a child sex delivery service out of a pizzeria in Washington, D.C.’s NPR country. That’s kind of funny, given that the only comparable story we heard during the campaign involved her dear husband’s cavorting with convicted pedophile Jeffrey Epstein. The fake news mainstream media has judged that story too real to use.
So what next for Lady Hillary? Her hair at the Harry event was expensively made up, a far cry from the cheapo hippie look she sported in her previous post-election appearance, at the Children’s Defense Fund gala, when the official line was that she’d lost not because of fake news but because of FBI Director James Comey’s actions, the same Comey who had let her off the hook last summer. Hillary, we have learned, has always been a hard one to please. Everything about her may be fake, but has ever there been such utter perfection in so false an American pol? If she wants to go another four years, we’re standing by.
|
{
"pile_set_name": "OpenWebText2"
}
|
At a website, colors perform various functions, such as conveying a certain impression on a website and to cause an idea associated with a specific service through a combination of colors.
Various tools have been developed that extract colors used in a website to acquire a color arrangement. For example, some web services provide the ability to analyze colors of a site based on a URL only using a simple operation of inputting a URL.
In organizational activities of companies, organizations or schools, e.g., colors (also referred to as corporate colors, symbol colors or school colors) perform important functions. These colors are often used to symbolize a corporation, organization, or school.
In addition, image colors or package colors of products or services themselves perform important roles for causing consumers to recognize products or services. Thus, for advertising corporations or their products or services, in all fields including websites, the corporations and the like tend to use an integral color scheme (also called a theme color). For instance, colors of logotypes of corporations and colors of packages of products are used as color schemes of websites.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
or of 2 and 25?
1
Calculate the highest common divisor of 1417 and 109.
109
Calculate the highest common factor of 207 and 36.
9
What is the highest common factor of 77 and 1001?
77
What is the highest common factor of 95 and 15?
5
Calculate the greatest common divisor of 17897 and 11.
11
Calculate the greatest common divisor of 81 and 135.
27
What is the greatest common divisor of 320 and 180?
20
Calculate the greatest common divisor of 29 and 1943.
29
Calculate the greatest common divisor of 110 and 1782.
22
Calculate the highest common factor of 58 and 12557.
29
What is the highest common divisor of 98 and 287?
7
What is the greatest common factor of 24 and 1792?
8
What is the highest common factor of 108 and 171?
9
What is the greatest common divisor of 106 and 2?
2
Calculate the highest common divisor of 244 and 305.
61
Calculate the greatest common factor of 624 and 6.
6
Calculate the highest common divisor of 30 and 1830.
30
Calculate the greatest common factor of 1 and 487.
1
What is the highest common divisor of 71 and 1136?
71
Calculate the highest common divisor of 51379 and 191.
191
What is the greatest common divisor of 1024 and 288?
32
Calculate the highest common divisor of 46283 and 31.
31
Calculate the highest common divisor of 50 and 1150.
50
What is the greatest common divisor of 414 and 18?
18
What is the highest common divisor of 31 and 2015?
31
Calculate the greatest common factor of 256 and 160.
32
What is the highest common factor of 2964 and 1596?
228
Calculate the highest common divisor of 75 and 915.
15
What is the highest common divisor of 2130 and 210?
30
What is the greatest common divisor of 319 and 261?
29
Calculate the greatest common divisor of 1040 and 30.
10
What is the highest common factor of 12 and 210?
6
Calculate the greatest common factor of 78 and 273.
39
What is the highest common divisor of 234 and 65?
13
Calculate the highest common divisor of 249 and 7387.
83
Calculate the highest common divisor of 1485 and 55.
55
What is the highest common divisor of 595 and 350?
35
Calculate the highest common factor of 35 and 140.
35
Calculate the greatest common factor of 2613 and 78.
39
Calculate the highest common divisor of 600 and 210.
30
Calculate the highest common divisor of 1248 and 234.
78
Calculate the greatest common factor of 221 and 39.
13
Calculate the highest common factor of 14 and 3661.
7
What is the greatest common factor of 79 and 5?
1
Calculate the greatest common factor of 4320 and 72.
72
What is the highest common divisor of 18 and 1962?
18
What is the highest common factor of 16 and 13712?
16
Calculate the greatest common factor of 4 and 122.
2
Calculate the highest common factor of 1752 and 32.
8
Calculate the greatest common factor of 2941 and 17.
17
Calculate the greatest common divisor of 49 and 28.
7
What is the greatest common factor of 24 and 552?
24
What is the highest common factor of 31 and 279?
31
What is the greatest common divisor of 21 and 35?
7
What is the greatest common divisor of 174 and 6?
6
What is the highest common divisor of 44 and 32?
4
Calculate the greatest common factor of 903 and 105.
21
What is the greatest common divisor of 976 and 61?
61
What is the highest common factor of 110 and 350?
10
What is the greatest common factor of 208 and 32?
16
Calculate the highest common divisor of 684 and 152.
76
What is the highest common divisor of 414 and 2116?
46
Calculate the highest common divisor of 17 and 18173.
17
Calculate the highest common divisor of 243 and 36.
9
Calculate the greatest common factor of 91 and 325.
13
Calculate the highest common factor of 29824 and 128.
128
What is the highest common divisor of 3652 and 22?
22
Calculate the greatest common divisor of 19 and 57.
19
What is the greatest common factor of 696 and 96?
24
Calculate the highest common factor of 9936 and 18.
18
Calculate the greatest common divisor of 18 and 708.
6
What is the greatest common factor of 35 and 77?
7
Calculate the highest common divisor of 406 and 116.
58
What is the greatest common factor of 88 and 2156?
44
Calculate the greatest common factor of 171 and 95.
19
What is the greatest common factor of 3424 and 642?
214
What is the highest common divisor of 954 and 1219?
53
What is the greatest common divisor of 84 and 63?
21
What is the greatest common factor of 620 and 62?
62
What is the highest common divisor of 11 and 7601?
11
Calculate the highest common divisor of 2279 and 424.
53
Calculate the greatest common divisor of 425 and 17.
17
What is the highest common factor of 34 and 986?
34
What is the greatest common factor of 8694 and 6?
6
What is the greatest common factor of 128 and 320?
64
Calculate the highest common factor of 116 and 14.
2
Calculate the highest common divisor of 58 and 34.
2
What is the greatest common divisor of 90 and 1035?
45
Calculate the greatest common divisor of 784 and 16.
16
Calculate the highest common divisor of 18 and 8958.
6
Calculate the greatest common factor of 336 and 21.
21
Calculate the greatest common divisor of 41 and 13817.
41
What is the greatest common factor of 1331 and 33?
11
Calculate the highest common factor of 59 and 2.
1
What is the highest common divisor of 42 and 8862?
42
What is the highest common factor of 6244 and 84?
28
What is the highest common factor of 98 and 406?
14
Calculate the greatest common divisor of 1 and 9.
1
What is the highest common divisor of 8889 and 3?
3
Calculate the highest common divisor of 68 and 36074.
34
What is the greatest common factor of 126 and 1638?
126
Calculate the greatest common factor of 77 and 371.
7
Calculate the highest common divisor of 910 and 130.
130
Calculate the highest common divisor of 52 and 182.
26
Calculate the greatest common divisor of 32 and 928.
32
What is the highest common divisor of 11615 and 46?
23
Calculate the highest common divisor of 3242 and 2.
2
Calculate the greatest common divisor of 26 and 13.
13
What is the greatest common factor of 512 and 352?
32
What is the greatest common factor of 3 and 687?
3
Calculate the greatest common divisor of 2 and 1298.
2
What is the highest common factor of 231 and 495?
33
What is the highest common divisor of 820 and 20?
20
Calculate the greatest common divisor of 7584 and 576.
96
What is the highest common factor of 147 and 245?
49
What is the highest common factor of 42 and 12?
6
What is the highest common divisor of 2759 and 2047?
89
What is the highest common factor of 294 and 52?
2
What is the highest common factor of 1683 and 99?
99
What is the greatest common factor of 40 and 15?
5
Calculate the highest common factor of 848 and 1961.
53
Calculate the greatest common divisor of 20 and 1250.
10
Calculate the greatest common factor of 380 and 608.
76
Calculate the highest common factor of 3267 and 33.
33
What is the greatest common factor of 306 and 561?
51
Calculate the greatest common factor of 400 and 16.
16
Calculate the greatest common divisor of 13 and 4966.
13
Calculate the highest common divisor of 280 and 1170.
10
What is the highest common divisor of 19312 and 272?
272
What is the greatest common divisor of 1029 and 14?
7
What is the greatest common divisor of 12 and 124?
4
Calculate the highest common factor of 10 and 670.
10
Calculate the greatest common factor of 231 and 42.
21
Calculate the highest common divisor of 20 and 3750.
10
Calculate the greatest common factor of 182 and 224.
14
What is the greatest common divisor of 114 and 1653?
57
What is the greatest common divisor of 48 and 72?
24
What is the highest common factor of 62 and 279?
31
Calculate the highest common divisor of 6 and 6378.
6
Calculate the highest common divisor of 15 and 105.
15
What is the greatest common divisor of 10 and 8180?
10
Calculate the greatest common factor of 799 and 34.
17
What is the highest common divisor of 204 and 276?
12
What is the highest common divisor of 13 and 793?
13
Calculate the greatest common divisor of 308 and 224.
28
What is the greatest common divisor of 3708 and 1339?
103
Calculate the greatest common divisor of 44 and 55.
11
Calculate the greatest common divisor of 172 and 2.
2
Calculate the highest common divisor of 20 and 565.
5
What is the highest common factor of 39 and 7397?
13
W
|
{
"pile_set_name": "DM Mathematics"
}
|
Ingredients
Directions
1 tablespoon House Seasoning, recipe follows
Preheat grill. Combine all ingredients, except the House Seasoning and honey, in a large stock pot and bring to a low boil. Add turkey legs and boil for 30 minutes or until the turkey legs register 165 degrees F. Put turkey legs on the grill, season with House Seasoning and brush with honey. Grill over medium heat for about 15 minutes, rotating occasionally as needed. The turkey legs should be crispy and golden brown when done.
|
{
"pile_set_name": "Pile-CC"
}
|
When something switches quickly, it generates a broadband RF burst (Fourier theory tells us that something narrow in the time domain is wide in the frequency domain).
The RF will generally be both radiated into the air and conducted in the AC wiring.
Unless your system is close to the switching unit, then probably you are mostly hearing the results of RF that is conducted through the AC wiring. But maybe it's possible that the wiring also radiates some of the RF, at some distance from the actual switch.
Anyway, the first thing I would try is low-pass filtering. There are two main locations at which to try filtering, initially.
One location for an RF filter is across the AC Mains, before your power transformer, i.e. across the primary winding's connections of the transformer. There are special capacitors that are safe for use across the AC Mains. Soldering one across the transformer's primary connections might be enough. There are also more-complicated filter topologies, and some ready-made power-line filters, that you could try. But I am not enough of an expert to try to tell you what to use, there.
The second location for an RF filter is the signal input to the preamp. You can easily install a low-pass RC passive RF filter, there. It's just a resistance in series with the signal input and a capacitor to ground, downstream from the resistor. (But if you are using the inverting input, then you shouldn't connect a cap to ground directly from the inverting input. So you use two resistors, and connect the cap to ground from between the two resistors.)
You want to put the -3dB "cutoff" frequency of the filter at about ten times the highest frequency that you don't want to affect. So 220 kHz or more should be OK.
For an RC lowpass filter, the cutoff frequency is
f = 1 / (2 π R C) and
C = 1 / (2 π R f)
So you can just choose an R value and calculate the C that is needed.
Note that C is in Farads and f is in Hz. (So multiply the resulting C value by 1000000 to convert it to uF.)
Example, with 1000 Ohms and 220000 Hz:
C = 1 / ( 2(3.14)(1000)(220000))
C = 723 pF (0.000723 uF)
You could use a standard value like 680 pF.
Or, pick a C value and calculate the needed R value:
R = 1 / (2 π f C)
Example for C = 0.01 uF and 220 kHz:
R = 1 / (2(3.14)(220000)(0.00000001)
R = 72.3 Ohms
Using a slightly-different value for R will not matter very much.
----
You should have an RF filter on your signal input, anyway. So I would install that, first, and leave it there, whether or not it solves the popping problem you have right now.
(Another location for RF filtering is at the DC power inputs for the opamp. You should already have sufficient decoupling capacitors from the power pins to the load ground. Installing a small resistance (33 Ohms?) in series with each DC rail, just before the first decoupling capacitor, might help.)
If RADIATED (i.e. over the air) RF is causing the problem, the first things to check are the wires for the input signal and ground. They must never be apart or separated from each other. Otherwise you have made an antenna. They should be tightly twisted together ALL the way from end to end. Shielded twisted pair cable would be even better, with the shield connected to the chassis at one end, and to nothing at the other end.
Also, the wire pairs to and from the transformer should be tightly twisted, everywhere.
RF can also get in through the output (speaker cables) and through everything else.
I bulit a AD815 preamp with the simple LM317/337 regulator... I found the spark noise ("pakpak") from AC line when the fan or air condition switch on or off... Any way can solve it? Thanks!
What is an AD815 preamp? Is that based on the Analog Devices AD815 amplifier? What is the input impedance? I'm guessing high. Is the amp and power supply regulators properly bypassed? Do you have a scope to see what is misbehaving?
Yes. I was going to ask about the bypassing and decoupling caps but forgot.
The power pins of the op amp must have a small cap to ground, which must each be connected extremely close to the pin; more than 2 mm is probably too far away. The other end of each cap should go to power ground, as close as possible. These caps help to prevent high frequency instability, which would possibly occur because of the hidden positive feedback loop(s) through the power rails that most transistor amplifiers have.
You also must have some larger capacitors from each power pin to the load ground, for decoupling. They supply the fast transient currents and prevent those from inducing voltages across the inductances of the main power and ground rails. The decoupling caps should also be connected as close as possible to the power pins. If multiple cap sizes are used, the smallest ones should be closest to the pins.
I bulit a AD815 preamp with the simple LM317/337 regulator... I found the spark noise ("pakpak") from AC line when the fan or air condition switch on or off... Any way can solve it? Thanks!
Another possibility:
If your AC Line voltage dips lower, momentarily, when a large load switches on, maybe you are hearing the sound caused by your regulator(s) going out of regulation.
Where is the schematic?
What is the rated transformer output voltage, what kind of rectification is used, what is the total reservoir capacitance per rail, what are the nominal rail voltages after the regulators, what is the nominal load impedance, what capacitance values are installed from the AD815 power pins to ground, and what is the rated maximum load current per rail? You would also need to know the clipping voltages of the AD815, i.e. between each power pin and the output pin, under your operating conditions.
To diagnose whether or not the headroom for the regulators is the problem, it might be simpler to just temporarily try a much larger reservoir capacitance per rail, after the rectifiers, unless you are already cutting it too close and have very small ripple amplitude. Or you could instead try a transformer with secondary voltages that are a few volts higher.
The input bias currents and offset Voltages are a bit high for low noise preamps. 400 mA currents and 100 MHz seems a little excessive for a preamp.
Amplifiers at this speed usually do better on 4 layer boards with a ground plane to keep it under control. I'd be leary of a 2 layer board and can almost guarantee you bad results on a single layer.
There are many chips better suited as a 'preamp'. For driving audio balanced line the SSM2142 or DRV134 are better suited.
|
{
"pile_set_name": "Pile-CC"
}
|
Arctic Winter Games Arena
The Arctic Winter Games Arena is a 2,500-seat multi-purpose arena in Iqaluit, Nunavut, Canada. It opened to the public in October 2001. This arena was initially constructed to house the hockey and speed skating events of the 2002 Arctic Winter Games, but it is now used as a youth centre and to host large community events.
The venue hosted CBC Television's Hockey Day in Canada in 2003, and a White Stripes concert in 2007. The arena was also site to four professional wrestling events, featuring WWE superstars Christian and Gail Kim, as well as Tracy Brooks, Robert Roode and Rhino in 2008.
The surface of the arena had become unusable (for ice) after a portion the floor sank in 2006, however, on August 18, 2009, $2.2 million was allocated by the Government of Canada to repair the surface.
References
Category:Indoor arenas in Nunavut
Category:Indoor ice hockey venues in Canada
Category:Sports venues in Nunavut
Category:Buildings and structures in Iqaluit
Category:Sport in the Arctic
Category:Sports venues completed in 2001
Category:2001 establishments in Nunavut
|
{
"pile_set_name": "Wikipedia (en)"
}
|
VIDÉO - L'entreprise Theranos et sa patronne prétendaient révolutionner les analyses sanguines. Ils ont en fait trompé les investisseurs pour lever des centaines de millions de dollars.
La SEC, le gendarme boursier américain, a accusé mercredi Theranos, sa dirigeante-fondatrice Elizabeth Holmes et son ancien président Ramesh Balwani, d'être parvenus à lever «plus de 700 millions de dollars auprès d'investisseurs au travers d'une fraude élaborée qui a duré plusieurs années, pendant lesquelles ils ont exagéré ou menti à propos de la technologie, des activités et des performances financières de l'entreprise» de biotechnologie.
À lire aussi : Ces femmes du numérique qui ont changé le cours de l'histoire
Ce dénouement, que la SEC présente comme une «leçon» pour la Silicon Valley, vient acter la chute d'Elizabeth Holmes, que certains comparaient à Steve Jobs, le défunt patron-fondateur d'Apple. En lançant Theranos en 2003, à 19 ans, elle promettait des diagnostics plus rapides et moins chers que ceux des laboratoires traditionnels aux États-Unis, grâce à des méthodes présentées comme révolutionnaires, permettant jusqu'à 200 analyses avec une toute petite quantité de sang. Mais une série d'articles parus fin 2015 dans le Wall Street Journal avait commencé à semer le doute sur la véracité de ces affirmations. Quelques mois plus tard, le ministère de la Santé avait lui aussi fait part de ses réserves.
À lire aussi : Le rêve de la start-up Theranos tourne au cauchemar
En réalité, affirme la SEC dans son communiqué mercredi, le système vanté par la start-up - basée à Palo Alto, en plein cœur de la Silicon Valley - «ne permettait de réaliser qu'une toute petite quantité de tests, et la société réalisait l'immense majorité des tests des patients avec d'autres dispositifs fabriqués par d'autres» entreprises.
«Dire la vérité»
Theranos, Elizabeth Holmes et Ramesh Balwani avaient même affirmé que leurs produits étaient utilisés par le ministère américain de la Défense sur le terrain en Afghanistan et que l'entreprise aurait un chiffre d'affaires de 100 millions de dollars en 2014: en fait, le gouvernement n'a jamais utilisé ces produits et Theranos a dégagé en 2014 un revenu de... 100.000 dollars.
Pour la SEC, cette affaire doit servir d'exemple à la Silicon Valley, qui fourmille de start-up cherchant des financements et d'investisseurs aux poches pleines, avides de parier sur des entreprises qui se présentent presque toutes comme révolutionnaires. Cette affaire «est une leçon importante pour la Silicon Valley», selon Jina Choi, directrice du bureau de la SEC à San Francisco, citée dans le communiqué de la SEC. «Les innovateurs qui cherchent à révolutionner et à bouleverser un secteur doivent dire aux investisseurs la vérité sur ce dont sont capables leurs technologies aujourd'hui, et non ce qu'ils espèrent qu'elles pourront faire un jour», ajoute Jina Choi.
Theranos et Elizabeth Holmes ont signé avec la SEC un accord amiable, aux termes duquel la dirigeante accepte de payer une amende de 500.000 dollars, cède le contrôle de l'entreprise et n'a pas le droit de diriger une entreprise cotée pendant dix ans. Elle devra aussi rendre à Theranos près de 19 millions d'actions qu'elle détient dans la start-up, qui était encore valorisée à près de 10 milliards de dollars en 2014. Cet accord, qui ne vaut pas aveu, n'empêche pas des poursuites judiciaires. L'ancien président Ramesh Balwani sera poursuivi en justice par la SEC en Californie, a en revanche précisé un responsable de la SEC, Steven Peikin, pendant une conférence téléphonique. «L'entreprise se réjouit de voir se clore cette affaire et a hâte de faire progresser sa technologie», ont indiqué dans un communiqué les «membres indépendants» du conseil d'administration de Theranos.
Sur la sellette depuis plus de deux ans, Theranos avait frôlé le dépôt de bilan et licencié l'an dernier 155 personnes, près de la moitié de ses effectifs, après avoir dû fermer fin 2016 laboratoires et centres, mettant au chômage du même coup 340 salariés. La chute d'Elizabeth Holmes, jeune femme blonde à l'esprit combatif et brillant, est d'autant plus marquante qu'elle figura en 2015 sur la liste des 100 personnalités les plus influentes de la planète du magazine Time. Sa fortune était en 2014 évaluée à 3,6 milliards de dollars par le magazine Forbes, faisant d'elle la plus jeune milliardaire n'ayant pas hérité de sa fortune.
|
{
"pile_set_name": "OpenWebText2"
}
|
(NaturalNews) As the debate over health care reform remains stalled in Congress, many U.S. residents are taking matters into their own hands by simply driving to Mexico for affordable care and prescriptions."I'm very lucky to live near enough to Mexico to get good healthcare at a reasonable price," said retired police officer Bob Ritz, who lives in Tombstone, Ariz. Although Ritz does have insurance, many of his medical costs are simply not covered, or the co-pays and deductibles are so high that he cannot afford them on his fixed income."I pay $400 a month for my health insurance, and it's still cheaper to come to Mexico," he said.In contrast to Ritz, approximately 46 million U.S. residents live without any medical insurance at all.According to a study by the University of California-Los Angeles' Center for Health Policy Research, roughly one million people go to Mexico for dental or medical care or prescriptions every year from California alone.The primary difference between Mexican and U.S. health care is the cost -- with many U.S. doctors having trained at Mexican medical schools and vice versa, and similar hygienic standards in place. Responding to the influx of people from the U.S. seeking affordable care, clinics in Mexican border towns now offer everything from regular dental care to cosmetic and weight-loss surgeries or other major procedures like hysterectomies.In Naco, Mexico, Dr. Sixto de la Pena Cortes charges roughly $20 for a standard checkup. He says he gets about 15 patients from the United States every week. The most common complaints that he treats are "bronchitis, pneumonia and stomach problems," he said, but he has also treated broken bones. Once, he referred a patient to a hospital for an appendix removal operation that cost $2,000."I waste up to four hours coming to an appointment, but it's worth it as we'll save thousands of dollars," said Beatriz Iturriaga of Eastlake, California, who paid $6,500 for bariatric surgery in Tijuana.A typical bariatric surgery in the United States costs as much as $40,000.Sources for this story include: www.reuters.com
|
{
"pile_set_name": "OpenWebText2"
}
|
Molecular and serological evidence for Anaplasma platys and Babesia sp. infection in a dog, imported in Belgium, from Southern Spain.
This case report describes a dog suffering from a co-infection with Babesia and Anaplasma parasites. Anaplasma platys was found to be responsible for the anaplasmosis by molecular biology techniques, while microscopical and serological evidence was found for a coexistent babesiosis, although this could not be confirmed by polymerase chain reaction. Moreover, the possible risk of import of exotic pathogens is highlighted.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
<?xml version="1.0" encoding="utf-8"?>
<!-- Copyright (C) 2014 The Android Open Source Project
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<ripple xmlns:android="http://schemas.android.com/apk/res/android"
android:color="#ff9cdfd9">
<item>
<shape android:shape="oval">
<solid android:color="#9cc8c4" />
<size android:width="@dimen/recents_lock_to_app_size"
android:height="@dimen/recents_lock_to_app_size" />
</shape>
</item>
</ripple>
|
{
"pile_set_name": "Github"
}
|
Students will sometimes ask me — often hesitantly, out of fear of offending — if it’s true what they’ve heard, that I’m a liberal.
“Don’t you ever call me a liberal again,” I tell them, feigning outrage. “I’m a leftist and a radical feminist.” Once they realize I’m not angry, I explain the important differences between left and liberal.
A distinction between left and liberal may seem esoteric or self-indulgent given the steady ascendancy of right-wing ideas in U.S. politics. Is now the time for this conversation? Liberals ask leftists to put aside differences toward the goal of resisting the reactionary right, and I’m all for pragmatic politics (coalitions are necessary and potentially creative) to mount challenges to dangerous policies. (Donald Trump, Mike Pence and Paul Ryan pose serious threats on ecological, social and economic fronts.)
But strategies should be based on a clear understanding of shared values. And with a carnival-barker president leading a party so committed to a failed ideology that it’s willing to risk ecocide, radical left ideas have never been more compelling. In the face of conservative and liberal failures to deal with our most basic problems, leftists offer reality-based solutions.
Let’s start with a general distinction: Liberals typically support existing systems and hope to make them more humane. Leftists focus on the unjust nature of the systems themselves. Two of these key systems are capitalism (an economic system that, to a leftist, celebrates inequality and degrades ecosystems) and imperialism (a global system in which First World countries have long captured a disproportionate share of the world’s wealth through violence and coercion).
Liberals don’t oppose capitalism or U.S. imperialism, arguing instead for kinder-and-gentler versions. Leftists see the systems as incompatible with basic moral principles of social justice and ecological sustainability.
Things get more complicated with white supremacy (historical and contemporary practices rooted in white or European claims of a right to rule) and patriarchy (men’s claim to a natural role over women in systems of institutionalized male dominance). Leftists disagree among themselves about how these systems interact with capitalism and imperialism. Some on the left focus on class inequality and decry “identity politics,” which they define as reducing all political questions to race, gender or sexual identity. Others reject putting economic inequality alone at the center of politics and argue for an equal focus on white supremacy or patriarchy.
Complicating things more are leftists who disagree with radical feminist opposition to the sexual-exploitation industries of prostitution, pornography and stripping, arguing that women’s participation means the industries can’t be challenged and shifting the focus away from why men choose to use women.
What is a leftist?
If this all this is getting a bit bewildering, welcome to left politics. Rather than generalizing about what “real” leftists should believe, I’ll summarize my views:
Capitalism is an unjust wealth-concentrating system that is ecologically unsustainable. Either we transcend the pathology of capitalism or dystopian science fiction will become everyday life in the not-so-distant future. There is no credible defense of the obscene inequality or disregard for the larger living world that’s inherent in capitalism.
The assertion by the U.S. that it’s the world’s exemplar and natural leader is a dangerous delusion that must yield to meaningful diplomacy and trade policies based on moral principles. not raw power. There is no hope for global cooperation when the U.S. maintains hundreds of military bases and facilities in other countries, designed not for defense but to assert U.S. dominance.
Liberals and conservatives disagree about how government policy should constrain the sociopathic nature of capitalism, but both embrace capitalist ideology. Liberals and conservatives disagree about how the U.S. should run the world, but neither challenge the country’s right to dominate.
What do leftists propose as an alternative to a global capitalist economy undergirded by military might? I’m not a revolutionary utopian, preferring innovative ways to work toward left values. Two examples:
The worker cooperative movement helps people establish worker-owned and worker-managed businesses within capitalism, creating spaces for real democracy in the economy. An example in my hometown of Austin is ATX Coop Taxi, owned and managed by the drivers. The most well-known cooperative enterprise is Mondragón, a Spanish federation of cooperatives with thousands of worker-owners. These businesses offer a model for a transition out of capitalism.
National health insurance, sometimes known as single-payer or Medicare-for-all, would lower health care costs while rejecting the cruel capitalist assertion that people without money are expendable. Most developed countries have adopted this, but U.S. politicians routinely reject it, even though polls show a majority or a plurality of U.S. voters like the idea. This kind of commitment to collective flourishing challenges obsessions with amoral individualism so common among U.S. capitalists.
Untangling white supremacy
The history of white supremacy cannot be untangled from the history of capitalism and imperialism, in Europe or the U.S. Ideologies of racial superiority have been used to justify imperialism abroad (the infamous “white man’s burden” to civilize the natives), while at home, racism is a key component of the wealthy’s divide-and-conquer strategy to suppress worker organizing across racial lines (offer white workers a sense of racial superiority so that they focus their anger at nonwhite people rather than the bosses).
A critique of patriarchy, the oldest of these domination/subordination systems, is at the heart of any credible left politics, though it is the social system most routinely ignored by leftists. The patriarchal claim that such hierarchy is inevitable is one of the most dangerous myths in human history, long used to justify men’s control of women’s reproductive power and sexuality.
Defending women’s reproductive rights, including abortion, is a core principle, and just as central is challenging men’s claim to a right to buy and sell objectified female bodies for sexual pleasure. We must confront men who buy women for sex as we act in feminist solidarity with prostituted women (what liberals call “sex workers”), supporting programs that help women and vulnerable men exit the sexual-exploitation industries.
Men’s claims to own or control women’s sexuality are also at the heart of the oppression of lesbians (who dare to opt out of male dominance in intimate relationships) and gay men (who are targeted for their perceived threat to patriarchy’s rigid sexual norms). Lesbian/gay liberation is inseparable from women’s liberation.
Liberals and conservatives are all over the political map on racism and sexism, but consistently fail to face the depth of the depravity of white supremacy and patriarchy, or the degree to which those systems continue to define everyday life. Leftists strive to face these realities.
Realistic solutions
What kind of leftist am I? I don’t call myself a Marxist, communist, socialist or anarchist, though all of those traditions offer insights along with lessons from their failures. I don’t belong to what are called “left sectarian” organizations, which typically remain committed to 19th- or 20th-century doctrines and political figures (such as Marxist-Leninist or Maoist groups). I call myself an anti-capitalist and anti-imperialist leftist rooted in a critique of white supremacy and a radical feminist critique of patriarchy. Not the pithiest label, but accurate.
My left politics also focus on the human species’ intensifying assault on the larger living world — multiple, cascading ecological crises that we can’t afford to ignore. Modern humans’ arrogance puts us all at risk. The naïve assumptions of the high-energy and high-technology industrial world — especially the idea that we can solve all problems with more energy-intensive technology — must be abandoned as we struggle to understand how many people can live sustainably on the planet.
There’s not a widely used term for going beyond liberal environmentalism’s half measures, but some people call it “ecospherism,” the understanding that humans must find our place in the ecosphere rather than try to dominate. Ecospherists reject the idea that humans really “own” the Earth and fight to end the accompanying abuse and exploitation of land, water, air and other creatures.
Liberals and conservatives typically ignore ecological realities, but so does much of the left. The overwhelming nature of the challenge scares many into silence, but problems ignored are not problems solved. For example, research on renewable energy is important, but no combination of so-called clean energy sources (and let’s remember that wind turbines and solar panels are industrial products, which can’t be manufactured cleanly) can power the affluence of the First World. The solution is dramatically lower levels of consumption in the developed world.
Many people in the U.S. disagree with this kind of left/radical feminist analysis. Many people have told me that these views make me unfit to teach at a state university. I welcome serious challenges, but left political positions are too often dismissed as crazy because that’s the one thing both liberals and conservatives agree on.
The U.S. is a dramatically right-wing society when compared with other industrialized countries, illustrated by Bernie Sanders’ 2016 campaign. He offered no foundational critique of U.S. systems, opting instead for a traditional social democratic platform to make our institutions more humane. Yet in America, such policy proposals were seen by many as revolutionary and Sanders was often dismissed as a wild-eyed radical.
In a recent call to action, Sanders supported a single-payer plan for health care and stated “our current economic model is a dismal failure,” but he did not dare use the term capitalism or even hint at a deeper structural critique. His discussion of the ecological crises stopped with a weak call for renewable energy, and there was no mention of racism, sexism or U.S. foreign policy. I realize politicians shape rhetoric to win votes, but let’s not pretend this is a left agenda.
(For the record, I’m not a Democrat, but I’m also not purist in electoral politics; I voted for Sanders in the Democratic primary and Hillary Clinton in the general election.)
Sanders’ success suggests more people might support a candidate with an even deeper critique of illegitimate structures of authority. If in the short term the best we can hope for is reform of existing systems, we can pursue those reforms with an eye on more radical long-term goals.
It’s hard to imagine a decent human future — perhaps any human future at all — if these radical ideas are not part of the mix. “Radical” is often used as a political insult, suggesting people who focus on violence and destruction. But the word simply means “going to the root,” and at the root of our contemporary crises of justice and sustainability are capitalism, imperialism, white supremacy, patriarchy, and the human willingness to destroy the world in pursuit of affluence.
Leftists are told that we have to be realistic, and I agree. But how realistic is it to expect solutions to human injustices and ecological crises to emerge from the systems that have created the problems?
If you want to be realistic, get radical.
Ed. note: This post also appeared in the Dallas News.
Teaser photo credit: The old Co-operative building behind the Gateshead Millennium Bridge in Newcastle upon Tyne. CC BY 2.0, https://commons.wikimedia.org/w/index.php?curid=341058
|
{
"pile_set_name": "OpenWebText2"
}
|
#include "apue.h"
#include <ctype.h>
int main() {
int c;
while ((c = getchar()) != EOF) {
if (isupper(c)) {
c = tolower(c);
}
if (putchar(c) == EOF) {
err_sys("output error");
}
if (c == '\n') {
fflush(stdout);
}
}
exit(0);
}
|
{
"pile_set_name": "Github"
}
|
Wednesday, May 28, 2014
The Post-Memorial Day Assessment of the United States Military
President Obama spoke earlier today at the West Point Commencement. He purportedly laid out his foreign policy.
I have no idea what he said because what matters is what his Administration is doing.
I have no idea what he said because after 5½ years in office a President who has to explain his foreign policy has no foreign policy.
A strong foreign policy depends upon a strong military. A strong foreign policy depends upon a military, which can project force, and a President willing to project force.
We have neither.
Don't judge the President by his words, but by his acts.
President Obama has been carrying out one of the most important goals of America’s left – the decline of America’s military. They believe that America’s military has been used to secure oil and other natural resources (“Bush invaded Iraq for oil”), to prop up petty dictators, and to enslave third world nations.
Sadly, the Congressional Republicans played into President Obama’s hands through the sequestration, half of which would be Pentagon cuts.
The United States projects power through the Navy’s aircraft carriers. The Navy is now down to 10 active carriers, several of which are always being refitted at base in the United States.
The Navy now has fewer ships than any time since pre-World War I.
China is now asserting control over the South China Sea, and pushing Japan, the Philippines, and Vietnam around. The Russian Bear has emerged from hibernation. The Mideast is a tinderbox of Islamic militants fueled by Iran.
Regardless of what happened in Benghazi on 9/11, 2012 the military claimed it had no assets available to come to the rescue of the besieged Americans. The Pentagon is asserting that neither the Army, the Navy, the Marines, nor the Air Force were able to come to the assistance of American diplomats under military attack. The once powerful Mediterranean Sixth Fleet had no vessel, which could have come to the assistance of the Americans.
No ship, no plane, no helicopter was available!
That is the true tragedy of Benghazi.
Secretary of Defense Hagel said the Army will downsize to 440,00 – 450,000, it’s smallest size since 1940.
The Pentagon, which never liked the A10 Warthog, wants to scrap the plane eventhough it is the best ground support plane in the world. No other plane comes close to its effectiveness and durability. The ugly plane can fly low and slow unlike the jet fighters.
Remember the devastation the improvised explosive devices early brought to American and allied soldiers? The Pentagon came up with MRAPs (Mine Resistant Ambush Protected) vehicles to protect the troops at roughly $500,000 each.
The Pentagon plans to scrap about 20% of its equipment ($7 billion) in Afghanistan, including thousands of MRAPs. It claims it would be too difficult and expensive to bring the equipment back to the States.
The President announced in 2013 that he ensure the security of America and its allies by reducing the strategic nuclear weapon by a third below the level set in the START Treaty.
50 ICBM's were recently removed from their North Dakota silos and placed in storage. The Air Force will see its force of strategic bombers reduced to 60 from 93. The Navy’s nuclear subs will carry 54 fewer nuclear bombs.
Many of the existing nuclear weapons are degrading, but the President is not spending funds to maintain or upgrade them.
The United States can still claim the strongest military in the world, but the President lacks the will to project or sustain it.
|
{
"pile_set_name": "Pile-CC"
}
|
How to come up with an architectural concept
Creating and developing architectural concepts is something a lot of students and indeed many architects struggle with. This may be due to project pressures, writers block, limited inspiration, or just the fact that for many students their architecture schools particularly in the first couple of years, don’t teach and stress the importance of them.
As we discuss here in “How to develop an architecture concept”, the best conceptual approaches should always aim to provide the backbone and foundation to a new project, and form part of the initial process as much as your site analysis should do.
There are many methods of coming up with a concept, and by following the process’s described in the above articles, they can be derived from almost anything; personal experiences and influences, emotions, perceptions, research, analysis …there are many
Here we provide a list of 21 concept ideas that can be used as starting points for your conceptual development and help steer you in the right direction as your project develops. Note though, that to create a meaningful approach these listed ideas must be tied back to your own thought processes, interpretations and analysis, in order for them to be bespoke to your project …there is not a one size fits all.
Following each description we provide a Pinterest link to a list of examples that demonstrate how each concept can be used in a real world scenario, or how it can be explained through concept sketches and models.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Retrieve the PK using @@identity
I'm building a website using ASP.NET and SQL Server, and I use
SELECT PK FROM Table WHERE PK = @@identity
My question is which is better and more reliable to retrieve the last inserted PK for multiuser website, using @@identity or using this:
SELECT MAX(PK) FROM Table WHERE PK = Session ("UserID")
A:
I'm not sure exactly what you want to achieve, but the recommended way to retrieve the primary key value of the last statement on a connection is to use SCOPE_IDENTITY()
@@Identity is particularly risky where you are using triggers, since it returns the last generated identity value, including those generated by triggers flowing on from a statement.
MSDN has the following to say:
SCOPE_IDENTITY and @@IDENTITY return
the last identity values that are
generated in any table in the current
session. However, SCOPE_IDENTITY
returns values inserted only within
the current scope; @@IDENTITY is not
limited to a specific scope.
You should certainly use SCOPE_IDENTITY() in favour of the MAX(PK) approach - any number of possible future changes could invalidate this method.
A:
For SQL Server 2005 and above...
You can do the INSERT and SELECT in one call using the OUTPUT clause...
INSERT MyTable (col1, col2, ..., coln)
OUTPUT INSERTED.keycol, INSERTED.col1, INSERTED.col2, ..., INSERTED.coln
VALUES (val1, val2, ..., valn)
Otherwise, you only use SCOPE_IDENTITY()
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Delete the [wish], [harry-potter], and other tags?
IMO, wish (deleted) and harry-potter (deleted) do not appear to serve any useful purpose and can be deleted. Other tags which appear ripe for deletion/synonymisation:
ic
ian
tech-speak
management-speak
genericized-trademarks
polisemy
productiveness
I'm not sure about these either:
untagged
idiomaticity (Suggested as a synonym of idioms)
acceptability
Edit: I've added a (deleted) note to those tags which have been deleted. Users who can should visit the suggested synonyms page and vote on any pending suggestions.
A:
Yes, delete those tags! I just noticed the wish tag too! There are four instances of it, I believe. Consider also as candidates for deletion:
schwa: There is only one question on the entire site with that tag.
word and its synonym words: It seems to be used primarily by one person (user account).
term and terms: Neither have any associated questions.
A:
I agree.
Synonyms will stop deleted tags being resurrected in the future.
Perhaps management-speak should be a synonym of business-language.
Perhaps tech-speak should be a synonym of computing.
Perhaps idiomaticity should be a synonym of idioms.
A:
Questions with genericized-trademarks should have been retagged with trademarks, rather than untagged. Unless trademarks should be deleted, or genericized-trademarks were a mistagging in the first place. Please take more care next time!
|
{
"pile_set_name": "StackExchange"
}
|
American Headache Society Members (Worldwide)
1,600 TOTAL MEMBERS @ $ 315.00 / F
PROFILE: Members of the American Headache Society (AHS) who are physicians, dentists and related scientists interested in the study of headaches. The association brings together practitioners in different fields of medicine to discuss ideas and beliefs about headache and and head pain. Members receive THE JOURNAL OF HEADACHE AND FACE PAIN as part of their membership. NOTE: Formerly called the American Association For The Study of Headache (AASH).
TERMS: PREPAYMENT REQUIRED WITH EACH ORDER. Cancellations accepted only upon return of order BEFORE MAIL DATE. Cancellations AFTER MAIL DATE subject to ALL rental and shipping charges. Cancelled orders are CONDITIONAL UPON ACCEPTANCE by list owner and may incur running, shipping or penalty fees.
We believe this information is accurate. However, NO WARRANTY is implied nor are results guaranteed from rental or use of this mailing list.
GreatList # 3448
LIST CONTAINSPostal addresses
LIST UPDATED
MONTHLY
UNIT OF SALE$125/yr membership.
FULFILLMENT OPTIONSP/S labels only @ N/C
KEYING
Not Available.
MULTIPLE USENot Available.
MINIMUM ORDEREntire list
DELIVERY
10 working days from receipt of a fully documented mailing list order and prepayment (if required).
|
{
"pile_set_name": "Pile-CC"
}
|
Daniel Boulud takes us to his butcher in New York's Meat Packing District to choose the cut for his famed Seared Rib Eye and Red Wine Braised Short Ribs, teamed with a Tomato in a Light Choron Sauce stuffed with Marmalade, Spinach Fondue, Diced Buffalo Mozzarella Salad and a heavenly serving of Pommes Dauphines. We recreate coveted dishes from the acclaimed restaurant Boulud: Peekytoe Crab Salad in a mold of Persian Cucumber-Black Sesame Coulis, draped with Early Mesclun and Radishes. Dessert is arguably the best molten lava cake in the world: a Warm Guanaja Chocolate Coulant filled with oozing Liquid Caramel and paired with a Creamy Milk Sorbet.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
How do I use my Stack Exchange OpenID?
I'm trying to sign up for mrmoneymustache.com, but I'm not sure about where to find my Stack Exchange OpenID URL.
I entered https://openid.stackexchange.com/, but it did not work for me:
A:
You need to set Vanity OpenID (second field) by editing your profile (accepts "Only letters, numbers, periods, and dashes").
Then in your profile copy the link going after "Vanity Id", and paste it where you were going to log in. I think it should work.
OR: click "Use your own URL to log in" and copy the link from the second tag.
|
{
"pile_set_name": "StackExchange"
}
|
The county has been planning for the change for four years, Sleeter said. That included researching digital communications, writing grants and installing equipment, he said.
The change to digital radios is a voluntary response to a federal mandate to narrow-band communications. The federal government has ordered some radio licensees to reduce their bandwidth, which is the slice of the radio wave spectrum each licensee uses to broadcast.
Less bandwidth can mean quieter transmissions or smaller coverage areas, Sleeter said. He advocated for, and county officials agreed, to change to digital equipment to make up for the loss of bandwidth.
The county tested the new system earlier this month.
Individuals can continue listening to local emergency voice traffic, but they must buy digital scanners or radios to do so.
|
{
"pile_set_name": "Pile-CC"
}
|
By25-year-old Dhanashri Godave was on her way to work when she apparently lost her balance between Dombivali and Koper.Overcrowding of locals on the Central Railway claimed another life on the stretch between Dombivali and Koper on Monday. Dhanashri Godave died after she fell off a CSTbound train during peak hours.The fatal mishap occurred around 8.35 am. According to the General Railway Police (GRP) officials, the 25-year-old woman might have boarded the 8.31 CST fast from Dombivali. The GRP was alerted about the accident at 8.42 am.DCP Rupali Ambure said Dhanashri was taken to the hospital, but was declared dead on arrival. The Dombivali resident was an employee of a private firm at Cuffe Parade and was on her way to work on Monday morning.“It was like any other working day for Dhanshri. Little did she know that the ride would be her last,” said her brother Subham. Her father, who runs a printing press, was not in a state to talk to the media.Over the years, the rail route between Kalyan and Thane has emerged as the killer stretch. Out of 545 deaths on the Central line, over 200 people died in train-related accidents on this part of the network. Since January, 16 people have fallen off local between Thakurli and Diva.The death of 21-year-old Bhavesh Nakate, another Dombivali resident, between Kopar and Diva in November 2015 had raised safety concerns of commuters using a transport system that is operating way beyond its capacity.Nakate’s fall, which was recorded by a fellow commuter, had shocked the conscience of the city. In the clip, he could be seen slowly losing grip of the grab rod and pleading for help. He is then hit by a signal pole close to the tracks.The incident had prompted Union Railway Minister Suresh Prabhu to set up a high-level committee to identify the problems faced by rail commuters in Mumbai – about 70 lakh people use the city’s local train network daily. The committee is expected to submit its report in this week.“The trains at Dombivali are always overcrowded. She must have thought that missing a train would not make any difference. No matter how many of them you miss, it is always this crowded,” said Anil Kale maternal uncle of Dhanshri.While Dombivali, as per information obtained under RTI, has emerged as the most crowded station on CR with roughly 2.34 lakh passengers, the number of services catering to this burgeoning commuter base is 56, one up from the count in 2010 – when the footfall at the station was about 2 lakh.Asked why the frequency of locals has remained unchanged in the last five years, particularly between Kalyan and Thane, a senior Central Railway (CR) official pointed to an as-yet unfinished project. “Work on 5th and 6th lines between Diva and Dombivali is still incomplete. That's why we have not been able to add new services that start from Dombivali.”“We are also going through the CCTV footage at Dombivali station, from where Dhanashri had boarded the train. It will help us understand her journey better,” said a GRP officer.Zonal Railway Users’ Consultative Committee member Subhash Gupta said the suburban railway network was on the verge of collapse. “A local train's capacity is around 1,700 people. But during rush hours, it carries around 5,000 people. You can imagine the plight of the commuters. It's a miracle that people don’t die of suffocation inside the compartments.”In another incident, a commuter, Manoj Gauda, sustained serious injuries after he fell off a moving train near Thane around 11.30 am. The police said Gauda, who was standing on the footboard, was commuting in a CST-bound fast local when he lost balance after complaining of giddiness.
|
{
"pile_set_name": "OpenWebText2"
}
|
Intentional replantation of a molar with several endodontic complications.
When non-surgical and surgical endodontic retreatments are impractical, intentional replantation (IR) might be employed as an accepted endodontic treatment procedure. This report describes an IR and root amputation of a tooth with several endodontic complications. A 28-year-old woman was referred for management of tooth #37. The tooth had a history of root canal therapy by a general dentist. Clinically the tooth was sensitive to palpation/percussion. Radiographic evaluation showed concurrent root/furcal perforations associated with radiolucent lesions, an inadequate root canal treatment and massive gutta-percha overextensions via perforation sites. The tooth was atraumatically extracted. After mesial root amputation and root-end/furcal preparations, the cavities were filled with calcium-enriched mixture cement. The tooth was then quickly replanted. During one-year clinical follow-ups, the tooth was functional and free of signs/symptoms; radiographic evaluation revealed complete bone healing. This case highlights that IR in hopeless teeth with several endodontic complications might be a successful approach.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Liberals’ anti-Conservative ideology overrides common sense, whatever the reason behind it
Joe Oliver: In their single-minded determination to overturn almost every Tory initiative, perhaps the Liberals envisage Trudeau as Han Solo battling the Galactic Empire
|
{
"pile_set_name": "OpenWebText2"
}
|
Knowledge of rare diseases among health care students – the effect of targeted education
Poor knowledge on rare diseases (RD) results in a significant delay in their diagnosis and treatment. So far there are no standards of university education in RD. We assessed knowledge on RD among healthcare students and the effectiveness of targeted education. We conducted an internet-based survey among students of the faculty of medicine, pharmacy and health sciences. Questions regarded personal information, definition and epidemic data on RD. The survey was used to assess the effect of targeted education about RD in an additional group of students. We enrolled 270 students (females: n=181; 67%), aged 22±1.7 years. Most of them (87.8%) declared to be familiar with the term RD. However only 20.7% knew the correct definition of RD, 14% knew that RD affect a significant (6-8%) proportion of population, 21.4% that there are 5-8 thousands of different RD’ entities, 73.7% recognized the most common cause of RD. 12.6% knew, that the RD most frequently occur in the adulthood. Targeted education applied in the additional group of 18 students resulted in a significant improvement of students’ knowledge on RD: definition (by 33%; p=0.007), percentage of population affected by RD (by 67%; p=0.001 ), total number of different RD (by 61%; p=0.003), time of onset of RD (by 61% p=0.003). Despite the declared recognition of the term: RD, knowledge on RD among medical students is poor independently on the year of study. However it can be improved with use of targeted education.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
University of Cincinnati research is revealing early farming in a former wetlands region that was largely cut off from Western researchers until recently. The UC collaboration with the Southern Albania Neolithic Archaeological Project (SANAP) will be presented April 20 at the annual meeting of the Society for American Archaeology (SAA).
UC students Kassi Bailey (yellow shirt), Michael Crusham (blue shirt), and Kathleen Forste (red shirt) at work on the excavation.
Susan Allen, a professor in the UC Department of Anthropology who co-directs SANAP, says she and co-director Ilirjan Gjipali of the Albanian Institute of Archaeology created the project in order to address a gap not only in Albanian archaeology, but in the archaeology in Eastern Europe as a whole, by focusing attention on the initial transition to farming in the region. Allen was awarded a $191,806 (BCS- 0917960) grant from the National Science Foundation to launch the project in 2010.
“For Albania, there has been a significant gap in documenting the Early Neolithic (EN), the earliest phase of farming in the region,” explains Allen. “While several EN sites were excavated in Albania in the ‘70s and ‘80s, plant and animal remains – the keys to exploring early farming – were not recovered from the sites, and sites were not dated with the use of radiocarbon techniques,” Allen says.
“At that time (under communist leader Enver Hoxha), Albania was closed to outside collaborations and methodologies that were rapidly developing elsewhere in Europe, such as environmental archaeology and radiocarbon dating. The country began forming closer ties with the West following Hoxha’s death in 1985 and the fall of communism in 1989, paving the way for international collaborations such as SANAP, which has pushed back the chronology of the Albanian Early Neolithic and helped to reveal how early farmers interacted with the landscape.”
The findings show that Vashtëmi, located in southeastern Albania, was occupied around 6,500 cal BC, making it one of the earliest farming sites in Europe. The location of early sites such as Vashtëmi near wetland edges suggests that the earliest farmers in Europe preferentially selected such resource-rich settings to establish pioneer farming villages.
During this earliest phase of farming in Europe, farming was on a small scale and employed plant and animal domesticates from the Near East. At Vashtëmi, the researchers have found cereal-based agriculture including emmer, einkorn and barley; animals such as pigs, cattle and sheep or goats (the two are hard to tell apart for many bones of the skeleton); and deer, wild pig, rabbit, turtle, several species of fish and eels. What seems evident is that the earliest farmers in the region cast a wide net for food resources, rather than relying primarily on crops and domesticated animals, as is widely assumed.
Allen and Gjipali’s research team included graduate and undergraduate students from UC’s departments of anthropology and classics. SANAP is an international collaboration with researchers representing the U.S., Spain, France, Greece and Albania.
The Society for American Archaeology is an international organization that is dedicated to the research, interpretation and protection of the archaeological heritage of the Americas.
|
{
"pile_set_name": "Pile-CC"
}
|
Orthodontic treatment is highly predictable and immensely successful. Depending on the severity of the malocclusion (bad bite) or irregularity, orthodontic treatments may occur in either two or three distinct phases.
The benefits of correcting misaligned teeth are many. Straight teeth are pleasing to look at and greatly boost confidence and self esteem. More importantly, properly aligned teeth enhance the biting, chewing and speaking functions of the jaw. There are several types of irregularities, including:
Overbite – The upper teeth protrude further than or completely cover the lower teeth.
Underbite – The lower teeth protrude further than the upper teeth causing the chin to look prominent.
Crossbite – Some of the upper teeth may close inside the lower teeth rather than on the outside.
Overcrowding – Insufficient room on the arch causes some adult teeth to erupt incorrectly and become rotated.
The Phases of Orthodontic Treatment
Generally, orthodontic treatment takes between six and thirty months to complete. The treatment time will largely depend on the classification of the malocclusion, the type of dental devices used to correct it and the perseverance of the patient.
Here is a general overview of the three major stages of treatment:
Phase 1 – The Planning Stage
The orthodontist makes an exact diagnosis in order to realign the teeth in the most effective and expedient way. The first several visits may comprise of some of the following evaluations:
Medical and dental evaluations – Dental and physical problems tend to go hand in hand. Problems in the oral cavity can lead to (or be caused by) medical problems. The goal of this evaluation is to ensure that prior medical and dental issues are completely under control before treatment begins.
Study model (castings/bite impressions) – The patient is asked to bite down into a dental tray filled with a gel substance that hardens around the teeth. The trays are removed from the teeth and filled with plaster to create models of the patient’s teeth. Study models enable the orthodontist to scrutinize the position of each tooth, and how it relates to the other teeth.
Panoramic X-rays – X-rays are fantastic tools for viewing potential complications or pre-existing damage to the jaw joint. X-rays also allow the orthodontist to see the exact position of each tooth and its corresponding root(s).
Computer generated images – Such images allow the orthodontist to treatment plan and examine how specific treatments may affect the shape of the face and symmetry of the jaw.
Photographs – Many orthodontists like to take “before, during and after” photographs of the face and teeth to assess how treatment is progressing, and the impact the treatment is having on the patient’s face shape.
Phase 2 – The Active Phase
All of the above diagnostic tools will be used to diagnosis and develop a customized treatment plan for the patient. Next, the orthodontist will recommend custom orthodontic device(s) to gently move the teeth into proper alignment. This orthodontic appliance may be fixed or removable. Most commonly, traditional fixed braces are affixed, which utilizes individual dental brackets connected by an archwire. Lingual braces are also fixed, but fit on the inside (tongue side) of the teeth to make them less visible.
Removable devices are an alternative to fixed braces. Examples of removable devices include the Invisalign system, headgear and facemask. These devices are designed to be worn for a specified amount of hours each day to expedite treatment.
Whatever the orthodontic device, the orthodontist will regularly adjust it to ensure adequate and continual pressure is being applied to the teeth. It is essential to visit the orthodontist at the designated intervals and to call if part of the device breaks or becomes damaged.
Phase 3: The Retention Phase
When the teeth have been correctly aligned, fixed braces and removable devices will be removed and discontinued. The most cumbersome part of the orthodontic treatment is now over. The orthodontist will next create a custom retainer. The goal of the retainer is to ensure that the teeth do not begin to shift back to their original positions. Retainers need to be worn for a specified amount of time per day for a specified time period. During the retention phase, the jawbone will reform around the realigned teeth to fully stabilize them in the correct alignment.
If you have any questions about orthodontic treatments, please contact our office.
LOOK YOUR BEST
We combine experience with the latest in dental technology to deliver the best patient experience possible.
|
{
"pile_set_name": "Pile-CC"
}
|
---
author:
- 'Peter Beelen[^1]'
title: 'A note on the generalized Hamming weights of Reed–Muller codes'
---
Preliminaries {#sec:in}
=============
Let ${\mathbb{F}_q}$ be the finite field with $q$ elements and denote by $\AA^m:=\AA^m({\mathbb{F}_q})$ the $m$-dimensional affine space defined over ${\mathbb{F}_q}$. This space consists of $q^m$ points $(a_1,\dots,a_m)$ with $a_1,\dots,a_m \in {\mathbb{F}_q}$. Let $T(m):={\mathbb{F}_q}[x_1, \dots , x_m]$ denote the ring of polynomials in $m$ variables and coefficients in ${\mathbb{F}_q}.$ Further let $T_{\le d}(m)$ be the set of polynomials in $T(m)$ of total degree at most $d$. A monomial $X_1^{\alpha_1}\cdots X_m^{\alpha_m}$ is called reduced if $(\alpha_1,\dots,\alpha_m) \in \{0,1,\dots,q-1\}^m$. Similarly a polynomial $f \in T(m)$ is called reduced if it is an ${\mathbb{F}_q}$-linear combination of reduced monomials. We denote the set of reduced polynomials by $T^{\mathrm{red}}(m)$ and define $T^{\mathrm{red}}_{\le d}(m):=^T_{\le d}(m) \cap T^{{\mathrm{red}}}(m)$.
One reason for considering reduced polynomials comes from coding theory. Indeed Reed–Muller codes are obtained by evaluating certain polynomials in the points of $\AA^m$, but the evaluation map $${\mathrm{Ev}}: T(m) \to {\mathbb{F}_q}^{q^m}, \ \makebox{defined by} \ {\mathrm{Ev}}(f)=(f(P))_{P \in \AA}$$ is not injective. However, its restriction to $T^{\mathrm{red}}(m)$ is. In fact the kernel of ${\mathrm{Ev}}$ consists precisely of the ideal $I \subset T(m)$ generated by the polynomials $x_i^q-x_i$ ($1 \le i \le m$). Working with reduced polynomials is simply a convenient way to take this into account, since for two reduced polynomials $f_1,f_2 \in T(m)$ the equality $f_1+I=f_2+I$ holds if and only if $f_1=f_2$.
The Reed–Muller code ${\mathrm{RM}_q}(d,m)$ is the set of vectors from ${\mathbb{F}_q}^{q^m}$ obtained by evaluating polynomials of total degree up to $d$ in the $q^m$ points of $\AA^m$, that is to say: $${\mathrm{RM}_q}(d,m):=\{(f(P))_{P \in \AA^m} \, : \, f \in T_{\le d}(m)\}.$$ By the above, we also have ${\mathrm{RM}_q}(d,m):=\{(f(P))_{P \in \AA^m} \, : \, f \in T_{\le d}^{\mathrm{red}}(m)\}$ and moreover, we have $$\label{eq:dimRM0}
\dim {\mathrm{RM}_q}(d,m)=\dim T^{\mathrm{red}}_{\le d}(m).$$ Reed–Muller codes ${\mathrm{RM}_q}(d,m)$ have been studied extensively for their elegant algebraic properties. Their generalized Hamming weights $d_r({\mathrm{RM}_q}(d,m))$ have been determined in [@HP] by Heijnen and Pellikaan. For a general linear code $C \subseteq {\mathbb{F}_q}^n$ these are defined as follows: $$d_r(C):=\min_{D \subseteq C: \dim D=r}|\mathrm{supp}(D)|,$$ where the minimum is taken over all $r$-dimensional ${\mathbb{F}_q}$-linear subspaces $D$ of $C$ and where $\mathrm{supp}(D)$ denotes the support size of $D$, that is to say $$\mathrm{supp}(D):=\#\{i \, : \, \exists \, (c_1,\dots,c_n) \in D, \ c_i \not = 0\}.$$ In case of Reed–Muller codes, there is a direct relation between generalized Hamming weights and the number of common solutions to systems of polynomial equations. Indeed, if $D \subset {\mathrm{RM}_q}(d,m)$ is spanned by $(f_i(P))_{P \in \AA}$ for $f_1,\dots,f_r \in T_{\le d}^{\mathrm{red}}(m)$, then $\mathrm{supp}(D)=q^m-\#{\mathsf{Z}}(f_1,\dots,f_r)$ where ${\mathsf{Z}}(f_1, \dots , f_r):=\{P \in \AA^m \,:\, f_1(P)=\cdots =f_r(P)=0\}$ denotes the set of common zeros of $f_1, \dots , f_r$ in the $m$-dimensional affine space $\AA^m$ over ${\mathbb{F}_q}$. Therefore, if we define $$\label{erdmA}
\bar e^{\AA}_r(d,m): = \max\left\{ \left| {\mathsf{Z}}(f_1, \dots , f_r) \right| \,:\, f_1, \dots , f_r \in T^{\mathrm{red}}_{\le d}(m) \; \text{ linearly independent}\right\} ,$$ then $d_r({\mathrm{RM}_q}(d,m))=q^m-\bar e^{\AA}_r(d,m).$ Note that $T^{\mathrm{red}}(m)$ is a vector space over ${\mathbb{F}_q}$ of dimension $q^m$ and that a reduced polynomial has total degree at most $m(q-1)$. Therefore $T^{\mathrm{red}}(m)=T^{\mathrm{red}}_{\le m(q-1)}(m)$. This implies in particular that ${\mathrm{RM}_q}(d,m)={\mathbb{F}_q}^{q^m}$ for $d \ge m(q-1)$. Therefore, we will always assume that $d \le m(q-1).$
The result of Heijnen–Pellikaan in [@HP] on the value of $d_r({\mathrm{RM}_q}(d,m))$ can now be restated as follows, see for example [@BD]. $$\label{Hrdm}
\bar e^{\AA}_r(d,m)= \sum_{i=1}^m \mu_i q^{m-i},$$ where $(\mu_1, \dots, \mu_{m})$ is the $r$-th $m$-tuple in descending lexicographic order among all $m$-tuples $(\beta_1, \dots , \beta_{m})\in \{0,1,\dots,q-1\}^m$ satisfying $\beta_1+ \cdots + \beta_{m} \le d$.
Following the notation in [@HP], we denote with $\rho_q(d,m)$ the dimension of ${\mathrm{RM}_q}(d,m)$. Equation implies that $\rho_q(d,m)=\dim(T_{\le d}^{\mathrm{red}}(m)).$ In particular, we have $$\rho_q(d,m)=\dim(T_{\le d}(m))=\binom{m+d}{d}, \ \makebox{if $d \le q-1$},$$ since $T_{\le d}(m)=T_{\le d}^{\mathrm{red}}(m)$ if $d<q.$ Here as well as later on we use the convention that $\binom{a}{b}=0$ if $a<b$. In particular we have $\rho_q(d,m)=0$ if $d<0$. As shown in [@AK §5.4], for the general case $d \le m(q-1)$, we have $$\label{eq:dimRM}
\rho_q(d,m)=\dim(T^{\mathrm{red}}_{\le d}(m))=\sum_{i=0}^d \sum_{j=0}^{m} (-1)^j \binom{m}{j} \binom{m-1+i-qj}{m-1}.$$
In this note, we will present an easy-to-obtain expression for $\bar e^{\AA}_r(d,m)$ involving a certain representation of the number $\rho_q(d,m)-r$ that we introduce in the next section.
The $d$-th Macaulay representation with respect to $q$
======================================================
Let $d$ be a positive integer. The $d$-th Macaulay (or $d$-binomial) representation, of a nonnegative integer $N$ is a way to write $N$ as sum as certain binomial coefficients. To be precise $$N=\sum_{i=1}^d \binom{s_i}{i},$$ where the $s_i$ integers satisfying $s_d>s_{d-1}> \cdots > s_1 \ge 0$. The usual convention that $\binom{a}{b}=0$ if $a<b$, is used. For example, the $d$-th Macaulay representation of $0$ is given by $0=\sum_{i=1}^d \binom{i-1}{i}.$ Given $d$ and $N$ the integers $s_i$ exist and are unique. The Macaulay representation is among other things used for the study of Hilbert functions of graded modules, see for example [@green]. It is well known (see for example [@green]) that if $N$ and $M$ are two nonnegative integers with Macaulay representations given by $(k_d,\dots,k_1)$ and $(\ell_d,\dots,\ell_1)$ then $N \le M$ if and only if $(k_d,\dots,k_1) \preccurlyeq (\ell_d,\dots,\ell_1)$, where $\preccurlyeq$ denotes the lexicographic order.
For our purposes it is more convenient to define $m_i:=s_i-i$. We then obtain $$\label{eq_Macaulay}
N=\sum_{i=1}^d \binom{m_i+i}{i},$$ where $m_i$ are integers satisfying $m_d \ge m_{d-1} \ge \cdots \ge m_1 \ge -1.$ The reason for this is that for $d \le q-1$ we have $\rho_q(d,m)=\binom{m+d}{d}$. Therefore, we can interpret Equation as a statement concerning dimensions of the Reed–Muller codes ${\mathrm{RM}_q}(i,m_i)$. For a suitable choice of $N$, it turns out that the $m_i$ completely determine the value of $\bar e^{\AA}_r(d,m)$ if $d \le q-1$. For $d \ge q$, even though the dimension $\rho_q(d,m)$ is not longer given by $\binom{m+d}{d}$, there exists a variant of the usual $d$-th Macaulay representation that turns out to be equally meaningful for Reed–Muller codes. Before stating this representation, we give a lemma.
\[lem:help\] Let $m \ge 1$ be an integer. We have $$\rho_q(d,m) = \sum_{i=0}^{\min\{d,q-1\}}\rho_q(d-i,m-1).$$
Any polynomial $f \in T(m)$ can be seen as a polynomial in the variable $X_m$ with coefficients in $T(m-1)$. This implies that $T(m) = \sum_{i \ge 0} X_m^i T(m)$, where the sum is a direct sum. Similarly we can write $$T^{\mathrm{red}}_{\le d}(m)=\sum_{i=0}^{\min\{d,q-1\}}X_m^iT^{\mathrm{red}}_{\le d-i}(m-1).$$ The result now follows.
A consequence of this lemma is the following.
\[cor:help\] Let $d=a(q-1)+b$ for integers $a$ and $b$ satisfying $a \ge 0$ and $1 \le b \le q-1.$ Further suppose that $m \ge a$. Then $$\rho_q(d,m)-1=\sum_{j=0}^{a-1} \sum_{\ell=0}^{q-2} \rho_q(d-j(q-1)-\ell,m-j-1) + \sum_{i=1}^b\rho_q(i,m-a-1).$$
This follows using Lemma \[lem:help\] repeatedly. First applying the lemma to each sum within the double summation on the right-hand side, we see that $$\begin{gathered}
\sum_{j=0}^{a-1} \sum_{\ell=0}^{q-2} \rho_q(d-j(q-1)-\ell,m-j-1) = \\
\sum_{j=0}^{a-1} \left( \rho_q(d-j(q-1),m-j)-\rho_q(d-(j+1)(q-1),m-j-1) \right) = \\
\rho_q(d,m)-\rho_q(d-a(q-1),m-a) = \rho_q(d,m)-\rho_q(b,m-a).\end{gathered}$$ Using the same lemma to rewrite the single summation on the right-hand side in Equation we see that if $m>a$ $$\sum_{i=1}^b\rho_q(i,m-a-1)=\rho_q(b,m-a)-\rho_q(0,m-a-1)=\rho_q(b,m-a)-1,$$ while if $m=a$, the single summation equals $0$ and the double summation simplifies to $\rho_q(d,m)-1$. In either case, we obtain the desired result
We can now show the following.
\[thm:genrepMac\] Let $N \ge 0$ and $d \ge 1$ be integers and $q$ a prime power. Then there exist uniquely determined integers $m_1,\dots,m_d$ satisfying
1. $N=\sum_{i=1}^d \rho_q(i,m_i),$
2. $-1 \le m_1 \le \cdots \le m_d,$
3. for all $i$ satisfying $1 \le i \le d-q+1$, either $m_{i+q-1} > m_i$ or $m_{i+q-1}=m_i=-1$.
We start by showing uniqueness. Suppose that $$\label{eq:uniqueness}
N=\sum_{i=1}^d \rho_q(i,m_i)=\sum_{i=1}^d \rho_q(i,n_i)$$ and the integers $n_1,\dots,n_d$ and $m_1,\dots m_d$ satisfy the conditions from the theorem. First of all, if $m_d=-1$ or $n_d=-1$ then $N=0$. Either assumption implies that $(m_d,\dots,m_1)=(-1,\dots,-1)=(n_d,\dots,n_1)$. Indeed $n_i\ge 0$ or $m_i \ge 0$ for some $i$ directly implies that $N>0$. Therefore we from now on assume that $m_d\ge 0$ and $n_d \ge 0$. To arrive at a contradiction, we may assume without loss of generality that $n_d \le m_d-1$.
Define $e$ to be the smallest integer such that $n_e \ge 0$. Equation can then be rewritten as $$\label{eq:uniqueness1}
N=\sum_{i=1}^d \rho_q(i,m_i)=\sum_{i=e}^d \rho_q(i,n_i)$$ Condition 3 from the theorem implies that $n_{i-q+1}<n_i$ for all $i$ satisfying $e \le i \le d $. Now write $d-e+1=a(q-1)+b$ for integers $a$ and $b$ satisfying $a \ge 0$ and $1 \le b \le q-1$. With this notation, we obtain that for any $0 \le j \le a-1$ and $0 \le \ell \le q-2$ we have that $$n_{d-j(q-1)-\ell} \le n_d-j \le m_d-j-1.$$
In particular choosing $j=a-1$ and $\ell=0$, this implies that $m_d \ge a+n_{q-1+b} \ge a+1+n_b \ge a$. Using these observations, we obtain from Equation that $$\label{eq:uniqueness2}
\rho_q(d,m_d) \le N = \sum_{i=e}^d \rho_q(i,n_i) \le \sum_{j=0}^{a-1} \sum_{\ell=0}^{q-2} \rho_q(d-j(q-1)-\ell,m_d-j-1) + \sum_{i=1}^b\rho_q(e+i-1,m_d-a-1).$$ Applying the same technique as in the proof of Corollary \[cor:help\], we derive that $$\sum_{j=0}^{a-1} \sum_{\ell=0}^{q-2} \rho_q(d-j(q-1)-\ell,m_d-j-1)=\rho_q(d,m_d)-\rho_q(b+e-1,m_d-a)$$ and Equation can be simplified to $$\label{eq:uniqueness3}
\rho_q(d,m_d) \le \rho_q(d,m_d)-\rho_q(b+e-1,m_d-a) + \sum_{i=1}^b\rho_q(e+i-1,m_d-a-1).$$ For $m_d=a$ the right-hand side equals $\rho_q(d,m_d)-1$, leading to a contradiction. If $m_d>q$, Equation implies $$\begin{array}{rcl}
\rho_q(b+e-1,m_d-a) &\le & \sum_{i=1}^b\rho_q(e+i-1,m_d-a-1)\\
\\
&= & \sum_{j=0}^{b-1}\rho_q(e+b-1-j,m_d-a-1)\\
\\
&< & \sum_{j=0}^{\min\{e+b-1,q-1\}}\rho_q(e+b-1-j,m_d-a-1)
\\
& = & \rho_q(b+e-1,m_d-a),
\end{array}$$ where in the last equality we used Lemma \[lem:help\]. Again we arrive at a contradiction. This completes the proof of uniqueness of the $d$-th Macaulay representation with respect to $q$.
Now we show existence. Let $d$, $N$ and $q$ be given. We will proceed with induction on $d$. For $d=1$, note that $\rho_q(1,m)=m+1$ for any $m \ge -1$. Therefore, for a given $N \ge 0$, we can write $N=\rho_q(1,N-1)$.
Now assume the theorem for $d-1$. There exists $m_d \ge -1$ such that $$\label{eq:existence}
\rho_q(d,m_d) \le N < \rho_q(d,m_d+1).$$ Applying the induction hypothesis on $N-\rho_q(d,m_d)$, we can find $m_{d-1},\dots,m_1$ satisfying the conditions of the theorem for $d-1$. In particular we have that
1. $N-\rho_q(d,m_d)=\sum_{i=1}^{d-1} \rho_q(i,m_i),$
2. $-1 \le m_1 \le \cdots \le m_{d-1},$
3. $m_{i+(q-1)} > m_i$ for all $1 \le i \le d-q.$
Clearly this implies that $N=\sum_{i=1}^{d} \rho_q(i,m_i),$ but it is not clear a priori that $m_1,\dots,m_d$ satisfy conditions 2 and 3 as well. Conditions 2 and 3 would follow once we show that $m_d \ge m_{d-1}$ and either $m_d > m_{d-q+1}$ or $m_d=m_{d-q+1}=-1$. First of all, if $m_d=-1$, then $N=0$ and $(m_d,\dots,m_1)=(-1,\dots,-1)$. Hence there is nothing to prove in that case. Assume $m_d \ge 0$. From Equation and Lemma \[lem:help\] we see that $$\label{eq:existence1}
N-\rho_q(d,m_d)<\rho_q(d,m_d+1)-\rho_q(d,m_d)=\sum_{i=1}^{\min\{d,q-1\}}\rho_q(d-i,m_d).$$ First suppose that $d \le q-1$. First of all, Condition 3 is empty in that setting. Further, Equation implies $$N-\rho_q(d,m_d) < \sum_{i=1}^{d}\rho_q(d-i,m_d) = \sum_{i=1}^{d-1}\rho_q(d-i,m_d) +1$$ and hence $$N-\rho_q(d,m_d) \le \sum_{i=1}^{d-1}\rho_q(d-i,m_d)= \sum_{j=0}^{d-2}\rho_q(d-1-j,m_d) < \rho_q(d-1,m_d+1).$$ This shows that $m_{d-1} \le m_d$ as desired.
Now suppose that $d \ge q$. In this situation Equation implies $$N-\rho_q(d,m_d) < \sum_{i=1}^{q-1}\rho_q(d-i,m_d) = \sum_{j=0}^{q-2}\rho_q(d-1-j,m_d)< \rho_q(d-1,m_d+1).$$ Hence $m_{d-1} \le m_d$ as before. Finally assume that $m_d \le m_{d-q+1}$. Then by the previous and Condition 2, we have $m_{d}= m_{d-1}=\cdots = m_{d-q+1}$. Hence $N \ge \sum_{i=0}^{q-1}\rho_q(d-i,m_d)=\rho_q(d,m_d+1)$ which is in contradiction with Equation . This concludes the induction step and hence the proof of existence.
We call the representation of $N$ in the above theorem the $d$-th Macaulay representation of $N$ with respect to $q$. One retrieves the usual $d$-th Macaulay representation letting $q$ tend to infinity. We refer to $(m_d,\dots,m_1)$ as the coefficient tuple of this representation. A direct corollary of the above is the following.
\[cor:greedy\] The coefficient tuple $(m_d,\dots,m_1)$ of the $d$-th Macaulay representation with respect to $q$ of a nonnegative integer $N$ can be computed using the following greedy algorithm: The coefficient $m_{d-i}$ can be computed recursively (starting with $i=0$) as the unique integer $m_{d-i} \ge -1$ such that $$\rho_q(d-i,m_{d-i}) \le N-\sum_{j=d-i+1}^{d}\rho_q(j,m_j) <\rho_q(d-i,m_{d-i}+1).$$
From the existence-part of the proof of Theorem \[thm:genrepMac\] it follows directly that the given greedy algorithm finds the desired coefficients.
A further corollary is the following. As before $\preceq$ denotes the lexicographic order.
\[cor:lexorder\] Suppose the $N$ and $M$ are two nonnegative integers whose respective coefficient tuples are $(n_d,\dots,n_1)$ and $(m_d,\dots,m_1)$. Then $$N \le M \ \makebox{if and only if} \ (n_d,\dots,n_1) \preceq (m_d,\dots,m_1).$$
Assume $(n_d,\dots,n_1) \preceq (m_d,\dots,m_1).$ It is enough to show the corollary in case $n_d < m_d$. We know from the previous corollary that $n_d$ and $m_d$ may be determined using the given greedy algorithm. In particular this implies that $n_d < m_d$ implies $$N < \rho_q(d,n_d+1) \le \rho_q(d,m_d) \le M.$$
Assume that $N \le M$. We use induction on $d$. The induction basis is trivial: If $d=1$, then $m_1=M-1$ and $n_1=N-1$. For the induction step, note that $N \le M < \rho_q(d,m_d+1)$ implies by the greedy algorithm that $n_d \le m_d$. If $n_d < m_d$, we are done. If $n_d=m_d$, we replace $N$ with $N-\rho_q(d,m_d)$ and $M$ with $M-\rho_q(d,m_d)$ and use the induction hypothesis to conclude that $(n_d,\dots,n_1) \preceq (m_d,\dots,m_1)$.
A simple expression for $\bar e^{\AA}_r(d,m)$
=============================================
We are now ready to state and prove the relation between the Macaulay representation with respect to $q$ and $\bar e^{\AA}_r(d,m)$.
\[thm:main\] For $1 \le r \le \rho_q(d,m)$, let the $d$-th Macaulay representation of $\rho_q(d,m)-r$ with respect to $q$ be given by $$\rho_q(d,m)-r=\sum_{i=1}^d \rho_q(i,m_i).$$ Denoting the floor function as $\lfloor \cdot \rfloor$, we have $$\bar e^{\AA}_r(d,m)=\sum_{i=1}^d \lfloor q^{m_i} \rfloor.$$
We know from Equation that we need to show that $$\sum_{i=1}^d \lfloor q^{m_i} \rfloor=\sum_{i=1}^m \mu_i q^{m-i},$$ with $(\mu_1, \dots, \mu_{m})$ is the $r$-th element in descending lexicographic order among all $m$-tuples $(\beta_1,\dots,\beta_m)$ in $\{0,1,\dots,q-1\}^m$ satisfying $\beta_1+ \cdots + \beta_{m} \le d$. First of all note that since $r \ge 1$, we have $\rho_q(d,m)-r < \rho_q(d,m)$. In particular this implies that $m_d \le m-1$. Therefore the coefficients of the $d$-tuple $(m_d,\dots,m_1)$ are in $\{-1,0,\dots,m-1\}$. Now for $1 \le i \le m+1$ define $\mu_i:=|\{j \, : \, m_j=m-i\}|.$ Since the $d$-tuple $(m_d,\dots,m_1)$ is nonincreasing by Condition 2 from Theorem \[thm:genrepMac\], we can reconstruct it uniquely from the $(m+1)$-tuple $(\mu_{1},\mu_2,\dots,\mu_{m+1}).$ Moreover, Condition 3 from Theorem\[thm:genrepMac\], implies that $(\mu_1,\dots,\mu_m) \in \{0,1,\dots,q-1\}^m$, but note that $\mu_{m+1}$ could be strictly larger than $q-1$. Further by construction we have $\mu_1+\cdots+\mu_m+\mu_{m+1}=d$, implying that $\mu_1+\cdots+\mu_m \le d$. Note that $\mu_{m+1}$ is determined uniquely by $(\mu_1,\dots,\mu_m)$, since $\mu_0=d-\mu_1-\cdots-\mu_m$. Therefore the correspondence between the $d$-tuples $(m_d,\dots,m_1)$ of coefficients of the $d$-th Macaulay representations with respect to $q$ of integers $0 \le N < \rho_q(d,m)$ and the $m$-tuples $(\mu_1, \dots , \mu_{m})\in \{0,1,\dots,q-1\}^m$ satisfying $\mu_1+ \cdots + \mu_{m} \le d$, is a bijection. Moreover by construction we have $$\sum_{i=1}^d\lfloor q^{m_i} \rfloor =\sum_{j=1}^{m+1} \mu_j \lfloor q^{m-j} \rfloor = \sum_{j=1}^{m} \mu_j q^{m-j}.$$
What remains to be shown is that the constructed $m$-tuple coming from the integer $\rho_q(d,m)-r$ is in fact the $r$-th in descending lexicographic order. First of all, by Corollary \[cor:help\] we see that for $r=1$ and $d=aq+b$ that the $m$-tuple associated to $\rho_q(d,m)-1$ equals $(q-1,\dots,q-1,b,0,\dots,0)$, which under the lexicographic order is the maximal $m$-tuple among all $m$-tuples $(\beta_1, \dots , \beta_{m})\in \{0,1,\dots,q-1\}^m$ satisfying $\beta_1+ \cdots + \beta_{m} \le d$. Next we show that the conversion between $d$-tuples $(m_d,\dots,m_1)$ to $m$-tuples $(\mu_1,\dots,\mu_m)$ preserves the lexicographic order. Suppose therefore that $1\le r \le s \le \rho_q(d,m)$. We write $N:=\rho_q(d,m)-s$ and $M:=\rho_q(d,m)-r.$ and denote their Macaulay coefficient tuples with $(n_d,\dots,n_1)$ and $(m_d,\dots,m_1)$. Since $N \le M$, Corollary \[cor:lexorder\] implies that $(n_d,\dots,n_1) \preceq (m_d,\dots,m_1)$. Also, since these $d$-tuples are nonincreasing, this implies that their associated $m$-tuples $(\nu_1,\dots,\nu_m)$ and $(\mu_1,\dots,\mu_m)$ satisfy $(\nu_1,\dots,\nu_m) \preceq (\mu_1,\dots,\mu_m)$. Indeed assuming without loss of generality that $\nu_1<\mu_1$ we see that $m_i=n_i=m-1$ for $d-\nu_1 \le i \le d$ but $n_i < m_i=m-1$ for $i=\nu_1+1$. Now the desired result follows immediately.
Combining this theorem with the greedy algorithm in Corollary \[cor:greedy\], it is very simple to compute values of $\bar e^{\AA}_r(d,m)$ or equivalently of $d_r({\mathrm{RM}_q}(d,m))$. We illustrate this in the two following examples. The parameters in these example also occur in examples from [@HP].
Let $q=4$, $r=8$, $d=m=3$. Since $d\le q-1$, we may work with the usual Macaulay representation when applying Theorem \[thm:main\]. We have $\rho_q(d,m)=\binom{6}{3}=20$ and hence $$\rho_q(d,m)-r=12=\binom{5}{3}+\binom{2}{2}+\binom{1}{1}=\rho_4(3,2)+\rho_4(2,0)+\rho_4(1,0)$$ is the $3$-rd Macaulay representation of $12$. Theorem \[thm:main\] implies that $\bar e^{\AA}_8(3,3)=4^2+4^0+4^0=18$ and hence $d_8(\mathrm{RM}_4(3,3))=64-18=46$ in accordance with Example 6.10 in [@HP].
Let $q=2$, $r=10$, $d=3$ and $m=5$. We have $\rho_2(3,5)=26$ by Equation and hence applying the greedy algorithm from Corollary \[cor:greedy\], we compute that $$\rho_q(d,m)-r=16=15+1+0=\rho_2(3,4)+\rho_2(2,0)+\rho_2(1,-1)$$ is the $3$rd Macaulay representation of $16$ with respect to $2$. Theorem \[thm:main\] implies that $\bar e^{\AA}_{10}(3,3)=2^4+2^0=17$ and hence $d_8(\mathrm{RM}_2(3,5))=32-17=15$ in accordance with Example 6.12 in [@HP].
Theorem \[thm:main\] is somewhat similar in spirit as Theorem 6.8 from [@HP] in the sense that in both theorems a certain representation in terms of dimensions of Reed–Muller codes is used to give an expression for $d_r({\mathrm{RM}_q}(d,m))$. Where we studied decompositions of $\rho_q(d,m)-r$, in [@HP] the focus was on $r$ itself. This suggest there may exist a duality between the two approaches, but the similarities seem to stop there. The representation in [@HP] is not the Macaulay representation with respect to $q$ that we have used here. For us it is for example very important that each degree $i$ between $1$ and $d$ occurs once in Theorem \[thm:genrepMac\] (implying that the greedy algorithm terminates after at most $d$ iterations), while this is not the case in Theorem 6.8 [@HP]. It could be interesting future work to determine if a deeper lying relationship between the two approaches exists.
[22]{} E.F. Assmus Jr. and J.D. Key, Designs and their Codes, Cambridge University Press, 1992.
P. Beelen and M. Datta, Generalized Hamming weights of affine Cartesian codes, Finite Fields and Applications 51, 130–145, 2018.
M. Green, Restrictions of linear series to hyperplanes, and some results of Macaulay and Gotzmann, In: Algebraic Curves and Projective Geometry, Lecture Notes in Mathematics 1389, 76–86, 2006.
P. Heijnen and R. Pellikaan, Generalized [H]{}amming weights of [$q$]{}-ary [R]{}eed-[M]{}uller codes, IEEE Trans. Inform. Theory 44(1), 181–196, 1998.
[^1]: Department of Applied Mathematics and Computer Science, Technical University of Denmark, DK-2800, Kongens Lyngby, Denmark, pabe@dtu.dk
|
{
"pile_set_name": "ArXiv"
}
|
A blog for passing time, and passing messages about media, about media ecology which is the study of media as environments, about language and symbols, about technology, about communication, about consciousness, about culture, about life and the universe, about everything and nothing, about time...
Tuesday, February 26, 2013
So, Alfred Korzybski published his magnum opus on general semantics in 1933 under the title of Science and Sanity, because he believed that scientific method gives us our best understanding of the world, our most accurate maps, as it were, of a territory that we can only really know indirectly. As a scientific approach to mental health, education, and social, political, economic, and ethical progress, general semantics caught the imagination of many science fiction writers, among them Robert Heinlein, Frank Herbert, and A. E. van Vogt. As a form of quasi-therapy, general semantics influenced a number of significant therapists, including Albert Ellis, Fritz Perls, and Albert Bandler of Neuro-Linguistic Programming fame.Another well known figure who credited Korzybski and general semantics with having had an important impact on his thinking was L. Ron Hubbard. Understandably, many individuals associated with general semantics do not want to be associated with Hubbard, or have general semantics be connected to him in any way. And arguably, whatever Hubbard took from Korzybski he didn't use in a way that Korzybski intended or would have approved of.But Hubbard was, early on, a science fiction writer. I haven't read his books, I must confess, but I did see the one movie that was made based on his work. It wasn't very good, but John Travolta was quite amusing, unintentionally of course, as an alien:
Now that's what I call Saturday Night Fever!Anyway, Hubbard eventually shifted his focus from fiction to psychotherapy (well, some say he never shifted his focus away from fiction, but that's another matter). That's when he came up with his own brand of therapy, called Dianetics. That link will take you over to the Wikipedia entry, where it says:
When Hubbard formulated Dianetics, he described it as "a mix of Western technology and Oriental philosophy". He said that Dianetics "forms a bridge between" cybernetics and General Semantics (a set of ideas about education originated by Alfred Korzybski, which received much attention in the science fiction world in the 1940s)—a claim denied by scholars of General Semantics, including S. I. Hayakawa, who expressed strong criticism of Dianetics as early as 1951.
Be that as it may, after coming up with his Dianetics, Hubbard went on to create Scientology, and note the link here between Science and Sanity, science fiction, and Scientology as a belief system. And as you no doubt know, Hubbard established Scientology as a religion, founding the Church of Scientology in 1953. It's a religion that has been embraced by a number of celebrities, and quoting now from the Wikipedia entry on the Church, here's the section on celebrities:
Hubbard envisaged that celebrities would have a key role to play in the dissemination of Scientology, and in 1955 launched Project Celebrity, creating a list of 63 famous people that he asked his followers to target for conversion to Scientology. Former silent-screen star Gloria Swanson and jazz pianist Dave Brubeck were among the earliest celebrities attracted to Hubbard's teachings.Today, Scientology operates eight churches that are designated Celebrity Centers, the largest of these being the one in Hollywood. Celebrity Centers are open to the general public, but are primarily designed to minister to celebrity Scientologists. Entertainers such as John Travolta, Kirstie Alley, Lisa Marie Presley, Nancy Cartwright, Jason Lee, Isaac Hayes, Edgar Winter, Tom Cruise, Chick Corea and Leah Remini have generated considerable publicity for Scientology.
Now I don't know about you, but I was a bit surprised when, while watching the Superbowl a few weeks ago, this commercial popped up:According to a piece by Cavan Sieczkowski in the Huffington Post entitled Church Of Scientology Super Bowl Ad Raises Eyebrows, the Church did not actually buy a Superbowl ad, the most expensive of all possible commercial placements. A small portion of advertising time is reserved for the local and regional stations running the Superbowl network feed, and the Church bought time on the stations in a few major markets, including New York and Los Angeles, a much cheaper proposition, but one that gave the impression that they were willing and able to afford the highest advertising rates in the universe. Sieczkowski goes on to relate the following:
The Atlantic –- the one time publisher of Mark Twain, Nathaniel Hawthorne and Edith Wharton –- is now publishing Scientology propaganda. The "sponsored
content", bought and paid for by the Church of Scientology, went
up Monday around noon and features all sorts of breathless praise for
Scientology and its alleged growth last year.The
post—an example of the kind of advertising many publishers are
turning to as display ad revenue stagnates—is basically one long
tribute to David Miscavige, the "ecclesiastical leader of the
Scientology religion":
And here, Berman provides a quote from the sponsored article in The Atlantic:
Mr. Miscavige is unrelenting in his work for millions of parishioners and the cities served by Scientology Churches. He has led a renaissance for the religion itself, while driving worldwide programs to serve communities through Church-sponsored social and humanitarian initiatives.
Berman goes on to note that the article focues "on Miscavige's plans to expand the religion's already existing churches" and adds another quote from The Atlantic:
David Miscavige spearheaded a program to build every Church of Scientology into what Scientology Founder L. Ron Hubbard termed "Ideal Organizations" (Ideal Orgs). This new breed of Church is ideal in location, design, quality of religious services and social betterment programs. Each is uniquely configured to accommodate the full array of Scientology services for both parishioners and the surrounding community. Ideal Orgs further house extensive public information multimedia displays that introduce every facet of Dianetics and Scientology, along with libraries, course and seminar rooms for an introduction to and study of Scientology Scripture. Chapels serve to host Sunday Services and other congregational gatherings. It is from these Ideal Churches that Scientologists extend their humanitarian programs to mitigate intolerance, illiteracy, immorality and drug abuse.
And Berman then adds
The post then lists the "unprecedented 12 Ideal Scientology Churches"
built around the world last year, including locations in Germany,
California, Italy and Israel, with accompanying pictures of each
opening's celebration.And let's not forget the comments. Of the
17 comments posted as of this writing, 11 are so pro-Scientology they
read as though they're an extension of the original post. A bold, proud
day for The Atlantic and its fine history of journalistic excellence.
Well, it is not surprising that The Atlantic removed the piece, given this sort of scathing criticism. Berman's critique ends with the following update:
The Atlantic took down the post,
writing: "We have temporarily suspended this advertising campaign
pending a review of our policies that govern sponsor content and
subsequent comment threads."
A lot of magazines sell sponsored content to advertisers. (Business Insider
has several sponsored content series running right now, for instance.)
The usual rule is that such stories must be clearly labeled so that
readers can see whether editorial may have been influenced by
advertisers. Normally, however, both the publisher and the advertiser
try to make the content credible or useful in some way, because readers
can spot blatant propaganda a mile away -- and that's of no use to
anyone.Blatant propaganda, however, is exactly what The Atlantic appears to
have published. The article, titled "David Miscavige Leads Scientology
to Milestone Year," was an encomium to the the "ecclesiastical" leader
of the church and his many accomplishments (which mostly include buying
old buildings and turning them into new churches, according to the
article).The Atlantic is a highbrow magazine known for it famous writers and agenda-shaping journalism. This, decidedly, was not it.
So now for the good part. A journalist by the name of Mike Daly writes for an online news site by the name of Adotas, described as where interactive advertising begins, and Mike's bio goes like this:
Mike Daly is an award-winning writer and editor with nearly 30 years of
experience in publishing. He began his career in 1983 at The News of
Paterson, N.J., a long-since defunct daily paper, where at age 22 he was
promoted to the position of Editorial Page Editor. Since then he has
served in managerial capacities with several news organizations,
including Arts Weekly Inc. and North Jersey Media Group in New Jersey
and Examiner Media in New York. His work has been honored on numerous
occasions by the New Jersey Press Association and the Society for
Professional Journalists.
So he's the real deal. And Daly does a feature on Adotas called Today's Burning Question, and on January 18th the burning question was, "What can be learned from The Atlantic’s Scientology Sponsored Story debacle?" He then collects answers from industry contacts, which in this case includes
“The Atlantic’s embarrassed retraction of sponsored content serves as a reminder that the established ways of doing business for traditional media industries are no longer working. When print media dominated, it was easy to specialize and compartmentalize content and operations, leading to the journalistic ideal of strict separation between advertising and news, and more generally between financial considerations and editorial judgment, often invoked metaphorically as “church and state”. The public relations industry sought to scale the walls by providing ready-made content for news media, for example in the form of press releases, but this content was typically offered free of charge and taken up by news media free of charge. For this reason, public relations professionals were previously viewed with great suspicion by journalists and advertisers alike, but today emerge as having superior ethics overall than many news and advertising professionals. As electronic media came to dominate the culture, beginning with broadcasting, but more fully with the Internet, we’ve seen the boundaries between different types of content blurring in many different areas, such as docudrama, edutainment, infomercials, advertorials, and product placement in motion pictures and television programming. And online, the boundaries grow even fuzzier, as it is often not clear whether the source of a particular blog or YouTube video is a private individual, organization, or business. Digital technologies have presented new challenges to advertising that have led to efforts to break out of the compartment of a labeled advertisement, as it becomes easier and easier for audiences to ignore that type of content, while the same technologies have severely undermined the business model of periodicals such as The Atlantic, so both of these traditional media industries are struggling financially, and sponsored content must seem like a marriage made in heaven. What they failed to take into account is that in the electronic media environment, there are intrinsic values that differ from those of the print media environment. Print media favored content, facts, logical structure and organization. Electronic media favor transparency, honesty, self-disclosure, and a sense of genuineness in the presentation of real personality and appearance. Much of what is valued in the electronic media environment was missing in the way that The Atlantic presented Scientology’s sponsored content, and so the content and the sources were immediately rejected and ridiculed by audiences, and this can have a negative effect on the reputations of the magazine, and possibly the sponsor as well.” — Dr. Lance Strate, Professor of Communication and Media Studies and Director of the Professional Studies in New Media program at Fordham University.
Now, that is rather long winded, I must admit, and it is the longest of the responses. How it stacks up to the others I leave up to you to judge. One thing is certain, however, and that is that the science of sponsored content has a long way to go yet before it reaches a state of sanity, and that the new media environment is very unforgiving of maps that mislead us about the territory they are supposed to represent.
Monday, February 4, 2013
I have been fascinated with the development of augmented reality technology (see, for example, my previous post, The New Hyperreality ), and believe that it will play an increasingly more important role for the future of new media. Here's a video from a news report that I haven't included in any previous post. It's a few years old now, but gets across the basic idea:
And yes, I agree with this report, it seems quite clear to me that hands-free is the most effective mode for using AR, rather than looking through your cell phone's camera, just as we tend to favor bluetooth headphones or ear pieces over holding the phone up to your ear. So this suggests AR goggles will be very big at some point in the near future. Now, here is Nokia's projection of a future development of a hand's free visual display, Nokia future vision:
The eyewear is a substitute for a screen in this instance, as opposed to at true form of AR where the actual world we're looking at is augmented by electronic data. A more complete picture is presented in Google's vision for the future, called Project Glass: One Day...:And here's the write-up on it:
We believe technology should work for you — to be there when you need it and get out of your way when you don't.
A
team within our Google[x] group started Project Glass to build this
kind of technology, one that helps you explore and share your world,
putting you back in the moment.
Follow along with us at http://g.co/projectglass as we share some of our ideas and stories. We'd love to hear yours, too. What would you like to see from Project Glass?
To be honest, I can't imagine going skydiving myself, and this seems somewhat less ambitious than the previous video, simply a matter of adding a video camera to the glasses to record whatever it is you're looking at. This also seems to be the case for this other video from Google, Glass Session: Madame & Bébé Gayno:
Using the glasses for a live streaming video chat, specifically a Google Hangout, adds something new to the mix, admittedly, and makes sense in this context. But for a regular video call, such as you might do via Skype, I guess you'd have to look in the mirror, a technique used in this next video, DVF [through Glass]:
You can see that, in this case, the glasses provided raw footage which was later edited. Here's the write-up:
Experience the DVF Spring 2013 show at New York Fashion Week through the
eyes of the people who made it happen—the stylists, the models and
Diane von Furstenberg herself. All the footage you see here was filmed
using only Glass, Google's latest technology that lets you capture
moments from a unique, new perspective. See what happens when fashion
and technology come together like you've never seen before.
So, yeah, it all seems pretty cool, especially if you want to document your life, an idea that began with written diaries during the print era, became increasingly more visual with the addition of photography, especially as cameras were made increasingly more accessible and portable, and continued with the introduction of home movies, home video cameras, and now blogging, tweeting, social media profiles, status updates, Instagram and the like. So this is just one more step in creating a complete record of everything we say and do, and see.But this is a far cry for the AR depicted in the first video, and that's because those much more sophisticated Google glasses are just an idea for now, and the video does not depict an actual technology. But here's one that's much closer to realization, iOptik - a glimpse into the future -vers 1.1:
And here's their write-up:
Innovega's wearable transparent
heads-up display, enabled by iOptik contact lens technology, delivers
mega-pixel content with a panoramic field-of-view. This
high-performance and stylish eyewear is perfectly suited for the
enjoyment of immersive personal media. The first part of the video is a
CGI compilation provided by CONNECT, San Diego and the second part is
actual footage through our system.
One big problem that none of the videos I've included here so far makes clear is that there are limitations to what the human eye can focus on at very close range, so it may not be possible to simply have AR glasses that work in the way depicted. Remember that with AR on mobile devices, the devices are held at a much farther distance from the eye than glasses are. This is a key point that Evan Ackerman discusses in an article on the DVICE website. And according to Ackerman,
The way Innovega gets around this problem is by modifying your
eyeballs to focus much, much closer. Innovega has developed a special
contact lens called iOptik that is completely transparent, except that
it can refocus polarized light (like the light from a display) so that
you have no problems seeing it. And it's not an either-or thing: with
the contact lenses in, the world looks completely normal, except
that you can suddenly see a high resolution display that's projected on
a pair of glasses, superimposed transparently across up to 120 degrees
of your field of view.
Ackerman also notes that while Google glasses have a long way to go, Innovega's innovation may be ready roll out later this year. For a more technical explanation, here's Randall Sprague, CTO of Innovega, in a video called I Can See for Inches and Miles:
As well, this iOptikCameraDemo video provides a somewhat dry, technical, but revealing demonstration of the technology as it interacts with human vision:What's also quite interesting are the markets listed by Innovega for its optical technology. They include augmented reality, of course, interfacing with mobile devices, and immersive video and 3D gaming, and also simulation and training, which makes sense. What may give some folks pause is that their list of markets also includes "defense and covert operations" and "field operations for warfighters," but if you think about it, this should not be surprising, as all of new media, and communication technologies in general, have military applications. What is quite valuable in human terms, especially given our longer lifespans and aging population, is the market for low vision. This technology will be a great boon for those suffering from Macular degeneration, and similar problems.One further question comes to mind, from a media ecology angle. McLuhan argues that changing the way we use our senses changes our sensibility, our thought processes, and ultimately our culture and social organization.And recent research backs him up by showing that reading, along with other types of media, actually rewire the brain. So how will this new technology affect our sense ratios, the balance of our senses, and our outlook on the world, individually and collectively? This could be the most radical shift in vision since the introduction of reading itself!
Saturday, February 2, 2013
In a post back in June, Robert Priest, Dr. Poetry, and the Viral Verbal Vortex, I wrote about my friend Robert Priest, a poet and musician, and shared an essay I wrote about him for the online poetry and creative writing journal/magazine, Big Bridge, which was also entitled, "Robert Priest, Dr. Poetry, and the Viral Verbal Vortex". And in the essay, I included some discussion of his meme splices or meme switches, a technique he employs where he switches out similar sounding words in a series of familiar phrases and sayings, so that substituting splice for spice yields, "the splice of life," "the splice garden," and "the splice trade," for example. It's a great technique for poetry, humor, and also what in general semantics is referred to as consciousness of abstracting—in this instance by substituting one word for another, it makes us more aware and more critical of the meanings we attribute to the words we use.And readers of Blog Time Passing are no doubt quite familiar with my views on gun violence and the second amendment by now. If not, or if you're in need of a refresher course, you can go back and read the following posts: You can start with What to Blame for the Colorado Shooting? from this past July, in response the Aurora movie theater shooting. And I shared a poem on the topic the following month, Second Amen Dementia. And then, in December, reacting to the unspeakable horror of the Sandy Hook Elementary School shooting, I posted On Guns and More, followed by Human Sacrifice and the False Idol of Firearms. And in that last post, I included commentary from Rabbi Eric H. Yoffie on how gun worship is blasphemy, and from a leading Roman Catholic intellectual, on how guns have become the new, American Moloch (Moloch being the most despised of false gods in the bible, because his worshipers required that children be thrown into the fire as sacrifices to him).And so, it occurred to me to apply Robert Priest's technique to the terms gun and god, as another way to express the idea that idolatry and blasphemy is alive and well in America, in the form of gun worship. I posted the result on my poetry blog over on MySpace last month, and I thought I would share it here as well. I will leave you with this poem, rather than try to add some final concluding words to this post, as I feel that at the end of this piece, there really is nothing more to be said.
Machine Gun Moloch (A Meme Splice)
I am the Lord, thy GunI, the Lord thy Gun, am a jealous GunThou shalt not take the name of the Lord thy Gun in vainThere is no Gun but GunTo the greater glory of Gun!In Gun we trustGun bless youGun is everywhereYou cannot hide from GunDo you believe in Gun?Have faith in GunPraise be to GunGun's will be doneHave you found Gun?Pray to the almighty GunOur Gun and Gun of our fathersMay Gun bless you and keep youMay the face of Gun smile upon youAs Gun is my witnessIt was an act of GunGun damn you!We are assured of victory for we have Gun on our sideHe just thinks he's Gun's gift to usOh my Gun!Have you heard Gun's voice?Gun is our help and our saviorThe law of GunGun does not give you anything you cannot handleYour arm's too short to box with GunGun speaks to usGun wants us to worship HimGun demands our obedienceGive thanks to GunCan you feel the presence of Gun?Walk with GunThere but for the grace of Gun go ISubmit to Gun's judgmentStand before GunKneel before GunApproach Gun's altarKnow Gun's peaceGun is justGun is loveSwear to GunSo help me Gun!It's in the hands of GunAwait the kingdom of GunGun willing!For Gun's sake!Honest to Gun!Dear Gun!Gun is a circle whose center is everywhereIf Gun did not exist, it would be necessary to invent HimI believe in Gun even when He is silentMan plans, Gun laughsOh for the love of Gun!You must fight for your Gun-given rightsThis will put the fear of Gun into you!Why Gun? Why me?One nation, under Gun
About Me⎯Lance Strate
Lance Strate is Professor of Communication & Media Studies at Fordham University. He is a founder of the Media Ecology Association & served as their President for over a decade. He is a Trustee & former Executive Director of the Institute of General Semantics, President of the New York Society for General Semantics, & Past President of the New York State Communication Association.
He is the author of Echoes & Reflections; On the Binding Biases of Time; Amazing Ourselves to Death; Thunder at Darwin Station; 麦克卢汉与媒介生态学 (a collection of essays published in Mandarin translation under the title McLuhan & Media Ecology); & Media Ecology: An Approach to Understanding the Human Condition; & co-editor of Communication & Cyberspace; Critical Studies in Media Commercialism; The Legacy of McLuhan; Korzybski and…; The Medium is the Muse; La Comprensión de los Medios en la Era Digital; & Taking Up McLuhan's Cause.
He is the recipient of the MEA's Walter Ong Award for Scholarship & Marshall McLuhan Award for Outstanding Book; the NYSCA's Neil Postman Mentor Award &Wilson Fellow Award, & the Eastern Communication Association’s Distinguished Research Fellow Award.
|
{
"pile_set_name": "Pile-CC"
}
|
A New Comic Called ‘Trump’s Titans’ Is Some Kind Of Parody, But Of What, And Why?
With little fanfare, a new comic book series hit Comixology today, but it’s not likely to stay under the radar for long. Trump’s Titans, published by Keenspot Comics, bills itself as “unbelievable presidential parody,” but if you’re looking for biting satire, that doesn’t appear to be what the book has to offer.
Arguably, the barely hidden SS logo in the book’s title is as critical as the book gets. Beyond that, the book seems to deliver unironically on the solicit’s promise of “an alternate reality just slightly to the right of our own, where President Donald J. Trump is not only the most powerful man in the world, but the most powerful being in the universe!”
Though the comic mocks Trump’s underlings and exaggerates Trump’s already unbelievable personality, there doesn’t seem to be any underlying message beyond what never amounts to more than playful needling of the Trump administration’s quirks and eccentricities. How do we know? Because after reading the three page preview above, we shelled out the five bucks — yes, this 25-page comic costs five bucks — to see if there was any payoff.
Spoiler alert: there was not. Some more spoilers follow…
In Trump’s Titans, we see President Trump punching out President Obama…
…in order to gain access to lost Reagan era technology that turns The Donald and his companions, Steve Bannon, Mike Pence, and Jared Kushner, into superheroes.
Trump puts his new powers to use fighting “globalists” in the Middle East.
Where he’s invited to join them by their mysterious leader (who we’re guessing is secretly Ivanka, based on how Trump hits on her):
And his wife, Melania, makes an appearance as well:
And their interaction epitomizes the book’s primary flaw. Trump’s behavior is outlandish and despicable (though arguably hardly more so than it is in real life), but there’s no consequences; no comeuppance. For the kind of humor Trump’s Titans seems to be going for, the success of the jokes relies on an implicit expression of purpose which is nowhere to be found in the book. When Trump says that women belong in the kitchen, we can read it as condemning that sort of obviously sexist belief. But it could just as easily be read as celebrating it, depending on the perspectives of the reader and the author.
There are a lot of Trump supporters who don’t seem to have any problem with anything Trump does. His most recent approval ratings show 37% of all people think he’s doing a good job. 79% percent of Republicans approve of Trump, even after his comments in the wake of the Charlottesville white supremacist rally. How many Trump supporters would cheer, without a hint of irony, for the idea of Trump punching out Obama? Trump’s Titans takes no side in the debate.
As a result, it’s impossible to tell whether the satire here is aimed at Trump and the right, or at the left’s dismay over Trump’s actions. And that makes it impossible to tell who the book’s audience should be. And all of that reduces the book to little more than an SS logo prominently displayed on comiXology’s website, pissing people off for no discernible reason.
Perhaps that’s the author’s intent. Perhaps the story’s failure to punish Trump for his misdeeds is meta commentary on his seeming lack of consequences in real life. Maybe Trump’s Titans‘ refusal to commit to a position on the subject matter it tackles represents the lack of responsibility accepted by others who profited while helping Trump rise to power, such as the media that reveled in the increased ratings and subscription numbers brought by the Trump media circus until about a month before the election, when they realized he might actually win. Or maybe it’s exactly what it looks like: a fast and cheap cash grab, like a Bluewater/StormFront/TidalWave comic about Paula Deen, but with admittedly less frightening artwork.
As far as we can tell, there’s no second issue of Trump’s Titans scheduled for release anytime soon, though the book does promise a follow-up called Trump’s Titans Vs. Fidget Spinner Force #1. Maybe there’s a payoff planned for some point in the future that will make the book’s intentions clearer, but it isn’t present in Trump’s Titans #1. We could ask the creator, John Barron, but he almost certainly doesn’t exist — John Barron was the name Trump famously used while pretending to be his own publicist.
And as the book makes explicitly clear, nobody else involved is willing to take any responsibility for it:
There’s room for a good Trump satire comic out there, but Trump’s Titans, at least so far, isn’t it. If you want to form your own opinion on the book, you can find it on comiXology.
A prophecy says that in the comic book industry's darkest days, a hero will come to lead the people through a plague of overpriced floppies, incentive variant covers, #1 issue reboots, and super-mega-crossover events.
Scourge of Rich Johnston, maker of puns, and seeker of the Snyder Cut, Jude Terror, sadly, is not the hero comics needs right now... but he's the one the industry deserves.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Is there a better way to write this SQL query in sybase?
I have a stored procedure with the following query. Based on the @range parameter I am adding more conditions to the where clause. The query below is giving me the correct results. I was wondering if I can avoid repeating the previous "Idx", "IdxType" as the range increases. Is there a better way to write this query?
SELECT TOP 1 *
FROM
MyTable
WHERE
ID1 = @Id1
and Id1Type = @Id1Type
and
(
(@range = 2 and ID2 = @Id2 and ID2Type = @Id2Type)
or
(@range = 3 and ID2 = @Id2 and ID2Type = @Id2Type
and ID3 = @Id3 and ID3Type = @Id3Type)
or
(@range = 4 and ID2 = Id2 and ID2Type = @Id2Type
and ID3 = @Id3 and ID3Type = @Id3Type
and ID4 = @Id4 and ID4Type = @Id4Type)
or
(@range = 5 and ID2 = @Id2 and ID2Type = @Id2Type
and ID3 = @Id3 and ID3Type = @Id3Type
and ID4 = @Id4 and ID4Type = @Id4Type
and ID5 = @Id5 and ID5Type = @Id5Type)
)
A:
What you can do is to regroup terms atleast using simple boolean logic
SELECT TOP 1 *
FROM
MyTable
WHERE
ID1 = @Id1 and Id1Type = @Id1Type and
(@range < 2 or ID2 = @Id2 and ID2Type = @Id2Type) and
(@range < 3 or ID3 = @Id3 and ID3Type = @Id3Type) and
(@range < 4 or ID4 = @Id4 and ID4Type = @Id4Type) and
(@range < 5 or ID5 = @Id5 and ID5Type = @Id5Type)
|
{
"pile_set_name": "StackExchange"
}
|
Reduced retinal nerve fiber layer (RNFL) thickness in ALS patients: a window to disease progression.
To assess RNFL thickness in ALS patients and compare it to healthy controls, and to detect possible correlations between RNFL thickness in ALS patients and disease severity and duration. Study population consisted of ALS patients and age- and sex-matched controls. We used the revised ALS functional rating scale (ALSFRS-R) as a measure of disease severity. RNFL thickness in the four quadrants were measured with a spectral domain OCT (Topcon 3D, 2015). We evaluated 20 ALS patients (40 eyes) and 25 healthy matched controls. Average RNFL thickness in ALS patients was significantly reduced compared to controls (102.57 ± 13.46 compared to 97.11 ± 10.76, p 0.04). There was a significant positive correlation between the functional abilities of the patients based on the ALSFRS-R and average RNFL thickness and also RNFL thickness in most quadrants. A linear regression analysis proved that this correlation was independent of age. In ALS patients, RNFL thickness in the nasal quadrant of the left eyes was significantly reduced compared to the corresponding quadrant in the right eyes even after adjustment for multiplicity (85.80 ± 23.20 compared to 96.80 ± 16.96, p = 0.008). RNFL thickness in ALS patients is reduced compared to healthy controls. OCT probably could serve as a marker of neurodegeneration and progression of the disease in ALS patients. RNFL thickness is different among the right and left eyes of ALS patients pointing to the fact that asymmetric CNS involvement in ALS is not confined to the motor system.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Bicuculline
Bicuculline is a phthalide-isoquinoline compound that is a light-sensitive competitive antagonist of GABAA receptors. It was originally identified in 1932 in plant alkaloid extracts and has been isolated from Dicentra cucullaria, Adlumia fungosa, and several Corydalis species (all in subfamily Fumarioideae, previously known as family Fumariaceae). Since it blocks the inhibitory action of GABA receptors, the action of bicuculline mimics epilepsy; it also causes convulsions. This property is utilized in laboratories across the world in the in vitro study of epilepsy, generally in hippocampal or cortical neurons in prepared brain slices from rodents. This compound is also routinely used to isolate glutamatergic (excitatory amino acid) receptor function.
The action of bicuculline is primarily on the ionotropic GABAA receptors, which are ligand-gated ion channels concerned chiefly with the passing of chloride ions across the cell membrane, thus promoting an inhibitory influence on the target neuron. These receptors are the major targets for benzodiazepines and related anxiolytic drugs.
The half-maximal inhibitory concentration (IC50) of bicuculline on GABAA receptors is 3 μM.
In addition to being a potent GABAA receptor antagonist, bicuculline can be used to block Ca2+-activated potassium channels.
Sensitivity to bicuculline is defined by IUPHAR as a major criterion in the definition of GABAA receptors
See also
Picrotoxin
Hydrastine (very similar in structure)
References
Category:GABAA receptor antagonists
Category:Glycine receptor antagonists
Category:Convulsants
Category:3-(5,6,7,8-tetrahydro-(1,3)dioxolo(4,5-g)isoquinolin-5-yl)-3H-2-benzofuran-1-ones
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Effects of interleukin 2 therapy on lymphocyte magnesium levels.
Interleukin 2 (IL-2) can cause partial or complete tumor regression in approximately 20% of patients with renal cell carcinoma. Among the many physiologic effects of IL-2, decreased serum levels of the divalent cations magnesium (Mg) and calcium have been demonstrated, with corresponding decreases in their urinary excretion. We investigated the effect of IL-2 on lymphocyte Mg levels among patients receiving three different dosing regimens. Twenty-eight patients with metastatic renal cell carcinoma were treated with high-dose intravenous, low-dose intravenous, or subcutaneous IL-2 therapy. Serum ionized Mg, urinary Mg, and peripheral blood mononuclear cell Mg levels were measured in samples from patients during treatment and compared with pretreatment levels. Serum Mg and ionized Mg levels decreased for all patients within 12 hours of treatment (P <.005) and remained low for the duration of therapy. Urinary Mg decreased in parallel with serum levels in all patients (P <.005). The peripheral blood mononuclear cell Mg content per cell increased within 24 hours of treatment (P <.005). The magnitude of these changes was similar during the first week of treatment for patients receiving intravenous or subcutaneous administration of IL-2. During IL-2 therapy, lymphocyte Mg increases coincident with serum Mg depletion. Mg availability may have functional implications for lymphocyte proliferation and integrin function.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Executing Python application built with Pyinstaller gives "Failed to execute script main"
I have a python program that uses tkinter for the GUI. My python project is a PyCharm project. It is organized as Project\main.py Project\my_class.py Project\images\favicon.ico Project\common\util\util1.py Project\common\util\util2.py Project\venv Inside the terminal I move to C:\..\Desktop\Project folder and run pyinstaller --windowed main.py If someone wonders what is the output in the terminal here it is
62 INFO: PyInstaller: 3.5
62 INFO: Python: 3.7.5
62 INFO: Platform: Windows-10-10.0.17763-SP0
62 INFO: wrote C:\Users\User\Desktop\Project\main.spec
62 INFO: UPX is not available.
62 INFO: Extending PYTHONPATH with paths
['C:\\Users\\User\\Desktop\\Project',
'C:\\Users\\User\\Desktop\\Project']
62 INFO: checking Analysis
78 INFO: Building Analysis because Analysis-00.toc is non existent
78 INFO: Initializing module dependency graph...
78 INFO: Initializing module graph hooks...
78 INFO: Analyzing base_library.zip ...
2124 INFO: running Analysis Analysis-00.toc
2124 INFO: Adding Microsoft.Windows.Common-Controls to dependent assemblies of final executable
required by c:\users\user\appdata\local\programs\python\python37\python.exe
3900 INFO: Caching module hooks...
3900 INFO: Analyzing C:\Users\User\Desktop\Project\main.py
4306 INFO: Processing pre-find module path hook distutils
5040 INFO: Processing pre-find module path hook site
5040 INFO: site: retargeting to fake-dir 'c:\\users\\user\\appdata\\local\\programs\\python\\python37\\lib\\site-packages\\PyInstaller\\fake-modules'
5925 INFO: Processing pre-safe import module hook setuptools.extern.six.moves
7668 INFO: Loading module hooks...
7668 INFO: Loading module hook "hook-distutils.py"...
7671 INFO: Loading module hook "hook-encodings.py"...
7743 INFO: Loading module hook "hook-lib2to3.py"...
7747 INFO: Loading module hook "hook-numpy.core.py"...
7845 INFO: Loading module hook "hook-numpy.py"...
7846 INFO: Loading module hook "hook-pkg_resources.py"...
8092 INFO: Processing pre-safe import module hook win32com
Traceback (most recent call last):
File "<string>", line 2, in <module>
ModuleNotFoundError: No module named 'win32com'
8150 INFO: Processing pre-safe import module hook win32com
Traceback (most recent call last):
File "<string>", line 2, in <module>
ModuleNotFoundError: No module named 'win32com'
8327 INFO: Loading module hook "hook-pydoc.py"...
8328 INFO: Loading module hook "hook-setuptools.py"...
8742 INFO: Loading module hook "hook-sysconfig.py"...
8742 INFO: Loading module hook "hook-xml.dom.domreg.py"...
8742 INFO: Loading module hook "hook-xml.py"...
8742 INFO: Loading module hook "hook-_tkinter.py"...
9133 INFO: checking Tree
9133 INFO: Building Tree because Tree-00.toc is non existent
9148 INFO: Building Tree Tree-00.toc
9211 INFO: checking Tree
9211 INFO: Building Tree because Tree-01.toc is non existent
9211 INFO: Building Tree Tree-01.toc
9258 INFO: Looking for ctypes DLLs
9273 INFO: Analyzing run-time hooks ...
9273 INFO: Including run-time hook 'pyi_rth_pkgres.py'
9289 INFO: Including run-time hook 'pyi_rth_multiprocessing.py'
9289 INFO: Including run-time hook 'pyi_rth__tkinter.py'
9289 INFO: Looking for dynamic libraries
18180 INFO: Looking for eggs
18180 INFO: Using Python library c:\users\user\appdata\local\programs\python\python37\python37.dll
18180 INFO: Found binding redirects:
[]
18180 INFO: Warnings written to C:\Users\User\Desktop\Project\build\main\warn-main.txt
18445 INFO: Graph cross-reference written to C:\Users\User\Desktop\Project\build\main\xref-main.html
18492 INFO: checking PYZ
18492 INFO: Building PYZ because PYZ-00.toc is non existent
18492 INFO: Building PYZ (ZlibArchive) C:\Users\User\Desktop\Project\build\main\PYZ-00.pyz
19259 INFO: Building PYZ (ZlibArchive) C:\Users\User\Desktop\Project\build\main\PYZ-00.pyz completed successfully.
19274 INFO: checking PKG
19274 INFO: Building PKG because PKG-00.toc is non existent
19274 INFO: Building PKG (CArchive) PKG-00.pkg
19290 INFO: Building PKG (CArchive) PKG-00.pkg completed successfully.
19290 INFO: Bootloader c:\users\user\appdata\local\programs\python\python37\lib\site-packages\PyInstaller\bootloader\Windows-64bit\runw.exe
19290 INFO: checking EXE
19290 INFO: Building EXE because EXE-00.toc is non existent
19290 INFO: Building EXE from EXE-00.toc
19290 INFO: Appending archive to EXE C:\Users\User\Desktop\Project\build\main\main.exe
19306 INFO: Building EXE from EXE-00.toc completed successfully.
19306 INFO: checking COLLECT
19306 INFO: Building COLLECT because COLLECT-00.toc is non existent
19306 INFO: Building COLLECT COLLECT-00.toc
22581 INFO: Building COLLECT COLLECT-00.toc completed successfully.
And here the error
How can I solve this problem? Have you any idea?
A:
Solved
- install pywin32 to fix the ModuleNotFoundError: No module named 'win32com' in the venv\Lib\site-packages folder of the Project
- install tornado in the venv\Lib\site-packages folder of the Project
- open terminal and move to the project folder
- run setlocal
- run set PATH=C:\Users\User\AppData\Local\Programs\Python\Python37\;%PATH% <br>
- runpyinstaller -y -D --paths "C:\Windows\System32\downlevel" --paths "C:\Users\User\Desktop\Project\venv\Lib\site-packages" main.py<br>
- copied theimagesfolder fromProjectinto thedistfolder made bypyinstallerto get thefavicon.ico` in my GUI
Now I can run it either from the terminal or by double-clicking
|
{
"pile_set_name": "StackExchange"
}
|
Effects of clopidogrel on the pharmacokinetics of sibutramine and its active metabolites.
Sibutramine is metabolized by the enzymes CYP2B6 and CYP2C19 into 2 active metabolites, M1 (mono-desmethyl sibutramine) and M2 (di-desmethyl sibutramine). Clopidogrel is a mechanism-based inhibitor of CYP2B6 and CYP2C19. In this study, 13 extensive metabolizers of CYP2B6 and CYP2C19 were evaluated to clarify whether clopidogrel inhibits the formation of the active metabolites of sibutramine. In the control phase, each subject received a 15-mg oral dose of sibutramine. After a washout period of 2 weeks, in the clopidogrel phase, the subjects received 300 mg of clopidogrel on the first day and then 75-mg once daily for 6 days. One hour after the last dosing of clopidogrel, all subjects received 15-mg of sibutramine. Compared with the control phase, the mean sibutramine and M1 plasma concentrations were higher after clopidogrel treatment. Clopidogrel significantly increased the half-life (242% of control phase) and area under the plasma concentration-time curve from 0 to infinity (AUC(inf)) (227% of control phase) of sibutramine and decreased the apparent oral clearance (31% of control phase) of sibutramine. Pharmacokinetic analysis showed significant increases in the AUC(inf) (162% of control phase) of M1. The CYP2B6 and CYP2C19 inhibitor clopidogrel significantly inhibited the formations of M1 from sibutramine and M2 from sibutramine by 37% and 64%, respectively. Therefore, CYP2B6 and CYP2C19 are in vivo catalysts for the formation of the 2 active metabolites of sibutramine.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Teamcity trigger builds for github pull-requests
I want to build each pull request merged with master. I have setup teamcity the following way:
http://blog.jetbrains.com/teamcity/2013/02/automatically-building-pull-requests-from-github-with-teamcity/
Branch specification:
+:refs/pull/(*/merge)
Default branch:
master
I have setup github teamcity Service Hook.
http://www.jaxzin.com/2011/02/teamcity-build-triggering-by-github.html
When I enable the teamcity hook. The job recognizes the change but the build stays in 'pending' and is not triggered. Do I need to setup a VCS Trigger?
I tried setting-up without the teamcity service hook, but builds for all the Pull-Requests are re-triggered whenever a new PR is submitted. The builds also get triggered on PRs which are closed.
Can someone please share their configuration to trigger the build only once and not build any closed PRs?
A:
There is no need in TeamCity GitHub hook, you can go with simple VCS trigger.
All active branches will be triggered on first start. From docs:
A branch considered active if:
it is present in the VCS repository and has recent commits (i.e.
commits with the age less than the value of
teamcity.activeVcsBranch.age.days parameter, 7 days by default). or it
has recent builds (i.e. builds with the age less than the value of
teamcity.activeBuildBranch.age.hours parameter, 24 hours by default).
Try to just wait until it's done or cancel all builds.
Hope it helps.
|
{
"pile_set_name": "StackExchange"
}
|
<?xml version="1.0" encoding="utf-8"?>
<Project ToolsVersion="15.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<Import Project="$(MSBuildExtensionsPath)\$(MSBuildToolsVersion)\Microsoft.Common.props" Condition="Exists('$(MSBuildExtensionsPath)\$(MSBuildToolsVersion)\Microsoft.Common.props')" />
<PropertyGroup>
<Configuration Condition=" '$(Configuration)' == '' ">Debug</Configuration>
<Platform Condition=" '$(Platform)' == '' ">AnyCPU</Platform>
<ProjectGuid>{5ADECD4D-5FD3-4D0F-AF9A-DD809EFE2A21}</ProjectGuid>
<OutputType>Library</OutputType>
<AppDesignerFolder>Properties</AppDesignerFolder>
<RootNamespace>DeptCtrl_BackEnd_Tesselate</RootNamespace>
<AssemblyName>DeptCtrl_BackEnd_Tesselate</AssemblyName>
<TargetFrameworkVersion>v2.0</TargetFrameworkVersion>
<FileAlignment>512</FileAlignment>
<LangVersion>8.0</LangVersion>
<Deterministic>true</Deterministic>
</PropertyGroup>
<PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Debug|AnyCPU' ">
<DebugSymbols>true</DebugSymbols>
<DebugType>full</DebugType>
<Optimize>false</Optimize>
<OutputPath>bin\Debug\</OutputPath>
<DefineConstants>DEBUG;TRACE</DefineConstants>
<ErrorReport>prompt</ErrorReport>
<WarningLevel>4</WarningLevel>
</PropertyGroup>
<PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Release|AnyCPU' ">
<DebugType>pdbonly</DebugType>
<Optimize>true</Optimize>
<OutputPath>bin\Release\</OutputPath>
<DefineConstants>TRACE</DefineConstants>
<ErrorReport>prompt</ErrorReport>
<WarningLevel>4</WarningLevel>
<AllowUnsafeBlocks>true</AllowUnsafeBlocks>
</PropertyGroup>
<ItemGroup>
<Compile Include="Properties\AssemblyInfo.cs" />
</ItemGroup>
<Import Project="..\..\PixelFarm\BackEnd.Tesselate_SH\BackEnd.Tesselate_SH.projitems" Label="Shared" />
<Import Project="$(MSBuildToolsPath)\Microsoft.CSharp.targets" />
</Project>
|
{
"pile_set_name": "Github"
}
|
Alcohol-use patterns through medical school. A longitudinal study of one class.
We describe the patterns of alcohol use of one medical school class assessed repeatedly over time from the first day of medical school to a point several months short of graduation. Although male students consistently drank more than their female counterparts during the preclinical years, the men reduced their alcohol intake during the clinical years to converge on the lower, more consistent intake rates of their female classmates. Over the four years of medical school, 11% of the students met criteria for excessive drinking for at least one six-month period and 18% were identified as alcohol abusers by Research Diagnostic Criteria during the first two years. More than half of the excessive drinkers met abuse criteria, whereas only one third of the alcohol abusers were also excessive drinkers. Alcohol abusers had better first-year grades and better overall scores on the National Board of Medical Examiners, part I, test than their classmates. The implications of these findings for designing and implementing alcoholism intervention/prevention programs in medical schools are discussed herein.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
How to in PHP / HTML to pass a specific class name to specific tag
I'm still new to Front End Development and working on my first really big site / wordpress blog.
So my question is this, I have a Menu that will be the same on all pages on the site. However each section will have it's name highlighted in the Menu Nav.
Current Nav_Bar markup:
<div id="nav_bar">
<ul class="nav">
<li class="nav_li"><a href="../index.html">Home</a></li>
<li class="nav_li"><a href="#">About</a></li>
<li class="nav_li selected"><a href="#blog_content">Blog</a></li>
<li class="nav_li"><a href="#">Book</a></li>
<li class="nav_li"><a href="#">Media</a></li>
<li class="nav_li"><a href="#">Events</a></li>
<li class="nav_li"><a href="#">Services</a></li>
<li class="nav_li"><a href="#">Contact</a></li>
<li class="search">
<input type="text" onfocus="if(this.value == 'Search') { this.value = ''; }" value="Search" />
</li>
<li class="search_btn">
<a href="#" title="Lets find it!"><div class="search_button">Go</div></a>
</li>
</ul>
</div><!-- nav_bar -->
Now I've build pages before using this simple PHP code: <?php include("menu.php"); ?>
However, how would you guys 1st: organize this menu to accept and incoming value, like menu.php+select="home" and 2nd how would you pass in that value to add a class of selected to one of the Menu items?
A:
Before the include, set a value in some parameter, like $page = 'blog' and then in the menu.php
<li class="nav_li<?php echo $page === 'blog' ? " selected='selected'" : "" ?>"><a href="#blog_content">Blog</a></li>
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Automounting SD card when inserted in Ubuntu
I am trying to write a BASH script that automounts an SD card once it is inserted in the card reader, then move all pictures to a folder in the HDD and renaming each file to the date and time the picture was taken at.
Any ideas how to achieve that? I am using Ubuntu 12.04 with no GUI Thanks :)
A:
Just to provide a full answer for you:
Auto mount and copy over data
Advanced Way (how you should do it)
You will want to use UDEV rules that are specific to the UUID of your device (pardon my above type of udid).
Lazy Way (how you could do it)
Run a CRON Job to execute your script at a specified interval. You would obviously need the script to verify that the SD is plugged in and/or mounted before executing the rest).
Rename / Move
To get EXIF data
$ identify -verbose imageFile.jpg
That spits out loads of goodies, so let's suppose you want the creation date from that - let's filter that down:
$ identify -verbose imageFile.jpg | awk '/exif:/' (or grep exif)
Update:
OP requested another method in the comments:
You are asking to nest folders instead, for example November 20, 2012 would be ~/2012/11/20/*.jpg's
Here is the script I made to try this, it works with EXIF now (the initial items for you were based on creation date, which would be floating as you move or copy the file). It's hosted on my blank site for you and I will post a screenshot too (since it's a lot of effort to make it formatted here). imageByEXIF.sh
I would recommend you test this on a limited scale before implementing it. I put in Command Line Args for testing, so I was doing ~/Pictures to ~/Documents (although it prefers the full path)
|
{
"pile_set_name": "StackExchange"
}
|
Abstract - Project 4: Cure rates for pediatric patients with relapsed or metastatic solid tumors remain unacceptably low. Cancer immunotherapies hold great promise, but scores of disappointing studies highlight our relative ignorance in understanding the immunosuppressive microenvironment within solid tumors. Because of their central role in mediating immunosuppression, tumor associated macrophages (TAMs), typically ?polarized? to a so-called M2- like immunosuppressive phenotype, and myeloid-derived suppressor cells (MDSC), are thought to be important therapeutic targets. We have found a clinically viable strategy that simultaneously reduces TAMs/MDSC (we dub ?myelolytic?) and polarizes the microenvironment (via oncolytic virus infection), resulting in significant antitumor efficacy. We hypothesize that targeting TAM and MDSC by combining ?myelolytic? therapies with pro- inflammatory therapies activates innate antitumor mechanisms that cause cancer regressions and reshapes the solid tumor microenvironment to be more permissive to cellular immunotherapies. In aim 1, we will determine the mechanism(s) by which combined myelolytic-virotherapy drives tumor regressions. We will use novel technologies such as fluorescent nanodiamonds to determine effects on innate immune cell phagocytosis of tumor cells. We will utilize the Genomics & Immune Monitoring Shared Resource Core B directed by Dr. Elaine Mardis to conduct flow cytometry with time-of-flight mass spectrometry and single cell transcriptomics to determine the effects on immune cell composition and polarization. We will also utilize gain- and loss-of-function approaches to determine if loss of MDSC are critical for enabling tumor regressions with myelolytic-virotherapy. We will also test combination therapies in xenograft and immunocompetent models of other cancer types to confirm its generalizability (osteosarcoma, Ewing sarcoma, rhabdomyosarcoma, neuroblastoma). In aim 2, we will determine the effects of myelolytic-virotherapy on T cell-mediated immunotherapies. We will examine the effect of myelolysis alone and combined with virotherapy on the efficacy of antitumor T cells in a T cell exhaustion setting and with CAR-T cells (with Project 1 Leader Dean Lee and co- investigator Ruoning Wang, PI-DDN U01 member). We will work with Core B to examine the effects on T cell clonality using TCR sequencing. In aim 3, we will determine whether combined myelolytic-virotherapy enhances the efficacy of NK-based cellular therapies. We will work with Project 1 Leader Dean Lee and Project 2 Leader Mitch Cairo to study the effects on adoptive NK and CAR-NK cell therapy. Overall, with this project we will further elucidate, test and develop strategies to modulate the tumor microenvironment to facilitate innate immune cells as cancer therapy. Our findings may be applicable across a broad panel of pediatric cancer types and thus fits well into the aims of the Pediatric Immunotherapy Discovery and Development Network.
|
{
"pile_set_name": "NIH ExPorter"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.