text
stringlengths
1
3.78M
meta
dict
Amplification of "defective" retrotransposon gtwin in D. melanogaster strain carrying large complex chromosomal aberration. Transposable elements (TE) are found in all eukaryotic genomes and play a significant role in their structure and functioning. The majority of mobile elements are silent in the genomes indicating the existence of cell control mechanisms of their activity. Establishment of immunity to TE is of great interest, but it cannot be studied directly and there are only few examples of present or recent active transpositions of mobile elements. G32, a Drosophila melanogaster strain, is characterized by the presence of large complex chromosomal aberration in the 3rd chromosome, active transpositions of gtwin in the past, and its stability at present. To address the question as to what had happened to the element while the cell took it under the control, we performed the detailed cytological and molecular analyses of gtwin's structure and its distribution in G32. Two variants of gtwin were found, one of which is amplified in G32 despite the alteration of tRNA-primer binding site. This element is accumulated in the aberrant chromosome and associated with the inversions breakpoints. Gtwin copies are predominantly localized in euchromatic regions and at least three of them are situated in heterochromatin. One copy was found in the piRNA cluster that might have caused silencing of the element.
{ "pile_set_name": "PubMed Abstracts" }
Image caption Sammy Wilson rejected claims that his tweet was offensive An Alliance MLA has complained about the DUP's Sammy Wilson to the assembly standards commissioner over a "tasteless" tweet. Mr Wilson described politicians who reported previous comments he made about TUV leader Jim Allister to the commissioner as "assembly jihadists". "Starting free speech campaign: Je Suis Sammy," he wrote. Alliance MLA Stewart Dickson said the remark was in bad taste, but Mr Wilson said he had no regrets. Mr Dickson said: "This remark by Sammy Wilson is extremely tasteless given the 17 people who were murdered in Paris and the ongoing threat by Islamic State in the Middle East. "The 'Je Suis Charlie' phrase became the global response to the despicable scenes in France, so for Sammy Wilson to make his own version for a relatively trivial matter is disrespectful to those who lost their lives at Charlie Hebdo." Last October, a Northern Ireland Assembly committee hearing was suspended after Mr Wilson called Mr Allister a "thug". His comments were referred to the assembly standards commissioner, Douglas Bain. Mr Wilson said his tweet was "mocking the process by which assembly members can run to someone in authority every time they're offended". He said the Stormont assembly was a "debating institution which is confrontational at times", and to try to sanitise it was "totally against the idea of free speech". Mr Wilson, who joined Twitter earlier this month, said his tweet was "not insulting to those who lost their lives in Paris". "The whole point was that this was about freedom of speech - this has now become the slogan of people who wish to have the right to express themselves in whatever way they want," he told BBC Radio Ulster's Talkback programme. "I was actually mocking those who felt they had to run and hang onto the coattails of the assembly standards commissioner." Image copyright Getty Images Image caption Thousands have expressed solidarity with the victims of the Charlie Hebdo massacre Mr Dickson called for Mr Wilson to retract his remark and apologise for the offence he had caused. "As an elected representative he should be mindful of what he says," he said. "Politicians should be held to the highest standard. "I have raised this matter in the assembly and have written to the speaker and assembly standards commissioner, as well as the speaker of the House of Commons, as Mr Wilson is also an MP."
{ "pile_set_name": "OpenWebText2" }
The move is bound to face stiff opposition from Congressional Republicans, who both favor private solutions and worry that the FCC may misuse its authority to over-regulate American internet access. It's not clear that the FCC's mandate lets it get involved with intrastate politics on this level. However, there's no doubt that city governments feel they're getting a raw deal at the moment. They previously petitioned the FCC for help, complaining that the laws do too much to protect established cable and phone companies. It's certainly no secret that legislation limiting municipal broadband is often written by those companies in an attempt to protect a duopoly or monopoly. In that sense, the FCC might succeed by arguing that it's leveling the playing field and giving you more say over the kinds of services your city can provide. [Image credit: Mark Wilson/Getty Images]
{ "pile_set_name": "OpenWebText2" }
Q: Haskell - Maybe arithmetic I have been asked to implement a function which uses the following profile: maybe_divide :: Maybe Integer -> Maybe Integer -> Maybe Integer and responds in the following manner: > maybe_divide (Just 5) (Just 2) Just 2 > maybe_divide (Just (-5)) (Just 2) Just (-3) > maybe_divide (Just (-5)) (Just 0) Nothing > maybe_divide Nothing (Just 1) Nothing > maybe_divide (Just 1) Nothing Nothing I have written the following but it will not compile. Do you guys have any suggestions? maybe_divide :: Maybe Integer -> Maybe Integer -> Maybe Integer maybe_divide x y = case x of Just x' -> case y of Just y' | y' == 0 -> Nothing | otherwise -> x' `div` y' Nothing -> Nothing A: Separate from the output type, I'd like to point out a few alternative styles you may prefer for writing this sort of code: First, you can case on multiple expressions by putting them in a tuple: case (x,y) of (_ , Just 0) -> Nothing (Just x', Just y') -> Just (x' `div` y') _ -> Nothing there are a couple different ways to write this using guards, or even the function Control.Monad.guard. case (x,y) of (Just x', Just y') -> (x' `div` y') <$ guard (y' /= 0) _ -> Nothing The second approach would start with a function: safeDiv :: Integer -> Integer -> Maybe Integer safeDiv x 0 = Nothing safeDiv x y = Just (x `div` y) Now that you have safeDiv, you can lift it into Maybe-wrapped arguments. It's pretty close to Applicative style code, except for an extra layer of Maybe in the output. Fortunately nested monads (e.g. Maybe (Maybe t)) are trivial to collapse: maybe_divide x y = join $ safeDiv <$> x <*> y or even maybe_divide = (join .) . liftM2 safeDiv if you're fluent in point-free. Personally, I would use one of the two tuple-case variants. But it's fairly common to already have a function like safeDiv, in which case the second form can be useful. A: You should post the error you are getting, but x' `div` y' has type Integer and not Maybe Integer. Perhaps you need to wrap this in a Just. A: You need to wrap the successful result in Just here: ... | otherwise -> Just (x' `div` y')
{ "pile_set_name": "StackExchange" }
Introduction {#Sec1} ============ Almost one century ago D'Arcy Thomson proposed that the spatiotemporal alterations in tissue mechanics inevitably alter its mechanoenvironemtal properties. These local biphasic mechanical properties, such as stiffness and fluidity, determine the system response to generated forces. This theory has been accepted widely^[@CR1]--[@CR7]^. Rheological techniques are rarely used for medical diagnosis of living tissue due to the invasive nature of rheological tests such as indentation experiments, torsional resonators and oscillatory shear testing devices^[@CR8]--[@CR10]^. These methods do allow for exploration of the viscoelastic properties of the medium in a wide range of frequencies, including the ultra-low frequency range (less than 1 Hz). Although a rheometer can assess the viscoelastic behavior of a medium in ultra-low frequency ranges, it is a time consuming and cumbersome process to use it in such a low frequency range^[@CR11]--[@CR13]^. Over a decade ago, non-invasive elastography methods were developed with the capability of remotely inducing shear waves in tissue and measuring its elasticity by recording the deflection response by MRI^[@CR14]^ and ultrasound^[@CR15]^. Later the *in vivo* application of elastography in measuring the stiffness of different tissues and organs like liver^[@CR16]--[@CR18]^, breast^[@CR19],[@CR20]^, brain^[@CR21],[@CR22]^, heart^[@CR23],[@CR24]^ and muscle^[@CR25],[@CR26]^ were reported. Although elasticity measurements were the focus of these efforts, a few studies considered the estimation of both elasticity and viscosity of *in vivo* tissues^[@CR20],[@CR22],[@CR27],[@CR28]^. While it is possible to use shear wave elastography methods for *in vivo* cases, the frequency range to explore the viscoelasticity of tissue is much narrower than with rheology methods^[@CR20],[@CR22],[@CR27]^. With shear wave elastography methods, reaching the ultra-low frequency range is almost impossible because there is always a tradeoff between the resolution of the resulting map and the frequency of vibration and shear waves^[@CR29]^. In this paper, we introduce the noninvasive, Loss Angle Mapping (LAM) method, which is based on measuring the local displacement and strain behaviors under constant stress as a function of frequency. Technical details were explained in our previous work^[@CR30]^. The LAM method can monitor the viscoelastic properties of the tissue with high resolution due to its high accuracy in displacement measurement at the micrometer level. High frame rate ultrasound strain imaging, which is the essential part of the LAM method, allows capturing the local viscoelastic parameters *in vivo* like breast tissue. The main components of the LAM test are a compression mechanism that is used to exert an approximately step-force on the tissue and a high-frame rate ultrasound system for monitoring the internal local strain responses. In other words, a step-force is used as a stimulus for a certain amount of time, and the transient strain response, which is governed by viscoelastic properties of the medium, is monitored by analyzing a sequence of radiofrequency (RF) data during the excitation^[@CR31],[@CR32]^. In the LAM method the local tissue behavior in the sub-Hertz frequency range is used because at this frequency range the local biphasic behavior of tissue is more evident compared to other frequency ranges^[@CR33]--[@CR37]^. Results {#Sec2} ======= Viscoelastic gel phantom {#Sec3} ------------------------ Gel phantom can be used as a simplified mechanical model for breast tissue. Gel consists of collagen type I matrix that is saturated in water^[@CR38]^, similar to breast tissue. The matrix peptide chain in this type of collagen is responsible for the dense electric charge associated with the hydrophilic properties of collagen fibers and culminates in the viscoelastic properties of the medium^[@CR39]^. The same mechanism can happen in breast tissue in which the glycoproteins are responsible for viscoelastic properties due to their hydrophilic nature^[@CR39]^. The viscosity of the fluid for these two media, however, is different. The solid matrix in both gel and tissue makes a porous structure which helps move the fluid when the medium is compressed or under load^[@CR40]^. Fluid viscosity is responsible for the viscoelastic response of the media or tissue. In addition the hydrogen crosslinks between the fibers in a solid matrix can trigger the viscoelastic response^[@CR40]^. To verify the performance of the proposed model-free method, a viscoelastic inclusion phantom was made. The inclusion part of the phantom was made with 25.14 grams of gelatin (Sigma-Aldrich, St. Louis, MO), 60 ml propylene glycol (Sigma-Aldrich, St. Louis, MO), and 4 grams cellulose (ultrasound scattering; Sigma-Aldrich) in distilled water for a total volume of 300 ml. The background part of the phantom was made with 32.3 grams gelatin, 30 ml Vanicream Lite (Pharmaceutical Specialties, Inc., Rochester, MN), 6 grams cellulose (ultrasound scatterer; Sigma-Aldrich) and potassium sorbate (preservative; Sigma-Aldrich) in distilled water with a total volume of 600 ml^[@CR30]^. The inclusion phantom dimensions were 7.5 cm × 5.5 cm × 5.5 cm (L × W × H), with the cylindrical inclusion having a diameter of 1.5 cm. An ultrasound B-mode image of the gel phantom can be seen in Fig. [1](#Fig1){ref-type="fig"}. For demonstration purposes, two points were selected: point 1 in the background and point 2 in the inclusion. The results of the temporal strain profile for these points can be seen in Fig. [2a](#Fig2){ref-type="fig"}. Loss angle profiles for these 2 points were obtained in the frequency range less than 10 Hz (Fig. [2b](#Fig2){ref-type="fig"}) and less than 0.35 Hz (c). Similar to the above mentioned 2 points the viscoelastic map created by processing all the spatial points at a frequency of 0.033 Hz using the LAM method as shown in Fig. [2(d)](#Fig2){ref-type="fig"}.Figure 1Ultrasound Verasonics B-mode image of the gel phantom with the inclusion part indicated with a dashed line. 1 = a point in the background; 2 = a point in the inclusion.Figure 2Profiles obtained on the inclusion gel phantom. (**a**) Temporal strain profile of point 1 (background, red) and point 2 (inclusion, blue) in the phantom imaged in Fig. [1.](#Fig1){ref-type="fig"} (**b**) Loss angle profile of point 1 (background, red) and point 2 (inclusion, blue) in a frequency range less than 10 Hz. (**c**) Loss angle profile of point 1 (background, red) and point 2 (inclusion, blue) in a frequency range less than 0.35 Hz. (**d**) Viscoelastic map produced at 0.033 Hz based on the LAM method. ***In vivo*** patient study {#Sec4} --------------------------- ### **Patient study** {#Sec5} The phantom study results encouraged us to apply the LAM method on breast patients. The patient study was approved by the Institutional Review Board of the Mayo Clinic, Rochester MN, and informed consent was signed by each enrolled patient. This study was also compliant with the Health Insurance Portability and Accountability Act (HIPPA) in the Mayo Clinic. A total of 156 female patients with visible breast lesions in US images were recruited at Mayo Clinic from November 2014 to September 2016. The data from the first five patients were used to test the device and algorithm and were eliminated from the final study. Thus, a total of 151 breast patients were included in the study. Amongst them after applying the motion compensated cross-correlation metric (MCCC), 45 patients were selected for analysis. The rest of the patients were rejected. The mean patient age was 56 ± 15 years within the age range of 25--85 years. Breast lesions were categorized using the Breast Imaging Reporting and Data System (BI-RADS). Figure [3](#Fig3){ref-type="fig"} illustrates the distribution of lesion type in this patient population and Table [1](#Tab1){ref-type="table"} shows the BI-RADS distribution among them.Figure 3Distribution of lesion type in patient population.Table 1Distribution of patients.BI-RADS23456Number of patients08102424 **BI-RADS determination of lesions.** The BI-RADS value was determined for each lesion according to the sonographic features found in clinical US images obtained during a clinical procedure at Mayo Clinic. The patient's eligibility for biopsy was decided based on this value. For BI-RADS 5 and 6, a biopsy is always prescribed; as such, cases are highly suggestive of malignancy. A BI-RADS value of 3 or 4 is challenging as this covers a wide range of suspicion, including low, intermediate, and moderate. In our study, all the BI-RADS 3 and BI-RADS 4 were biopsied. The LAM technique was performed after determination of the lesion BI-RADS and location, and prior to the biopsy procedure. **Histology.** Surgical excision biopsy or US-guided core needle biopsy was performed as a part of clinical care and the histology results for all patients in this study were available. In the latter cases, five core biopsy samples of each lesion were acquired by one of our certified radiologists. An experienced Mayo Clinic pathologist with more than 15 years of experience provided the histopathological diagnosis. Surgical histopathology was considered conclusive over core needle biopsy. **LAM results.** As mentioned before, 156 patients were recruited for the study. The statistical results related to the whole patient population are depicted in supplementary part of this paper. Amongst those patients, 45 patients passed, the criterion set by MCCC metric. Only these female patients with a suspicious breast lesion (15.93 ± 8 mm) visible in ultrasound images were considered in this study. The mean and median age for this group was 56 and 55 years, respectively. The youngest participant was 25 and the oldest was 85 years old. All the patients underwent a biopsy procedure after the LAM test. Figures [4](#Fig4){ref-type="fig"}--[7](#Fig7){ref-type="fig"} illustrate examples of the loss angle maps of various malignant and benign lesion types. In all of these images, the LAM map is created at the frequency of 0.033 Hz. for each patient. we examined the clinical image, the corresponding B-mode image as seen using the I-Q data from the programmable ultrasound machine (Verasonics), an overlay of the estimated loss angle, a loss angle map with unreliable areas excluded (white areas in Figs [4(d)](#Fig4){ref-type="fig"},[5(d)](#Fig5){ref-type="fig"},[6(d)](#Fig6){ref-type="fig"} and [7(d)](#Fig7){ref-type="fig"}), a graph of the normalized applied stress, and representative temporal normalized strain curves from the lesion and normal tissue areas and corresponding estimated loss angle as a function of frequency.Figure 4Imaging of a benign tumor. (**a**) Ultrasound clinical B-mode image of a benign tumor. (**b**) Ultrasound Verasonics B-mode image of the same tumor. (**c**) 2D color map of the loss angle overlay on the B-mode image produced at 0.033 Hz based on the LAM method. (**d**) 2D color map of the loss angle produced at 0.033 Hz. (**e**) Normalized strain temporal behavior of the two specified points in (**d**) accompanied with a normalized stress profile. **(f)** Spectral behavior of the two specified points in (**d**) in a frequency range less than 1 Hz.Figure 5Imaging of a malignant tumor. (**a**) Ultrasound clinical B-mode image of a malignant tumor. (**b**) Ultrasound Verasonics B-mode image of the same tumor. (**c**) 2D color map of the loss angle overlay on the B-mode image produced at 0.18 rad/s (\~0.03 Hz) based on the LAM method. (**d**) 2D color map of the loss angle produced at 0.03 Hz. (**e**) Normalized strain temporal behavior of two specified points in (**d**) accompanied with the normalized stress profile. **(f)** Spectral behavior of two specified points in (**d**) in a frequency range less than 1 Hz.Figure 6Imaging of a malignant tumor. (**a**) Ultrasound clinical B-mode image of a malignant tumor. (**b**) Ultrasound Verasonics B-mode image of same tumor. (**c**) 2D color map of the loss angle overlay on B-mode image produced at 0.033 Hz based on the LAM method. (**d**) 2D color map of the loss angle produced at 0.033 Hz. (**e**) Normalized strain temporal behavior of two specified points in (**d**) accompanied with the normalized stress profile. **(f)** Spectral behavior of two specified points in (**d**) in a frequency range less than 1 Hz.Figure 7Imaging of benign tumor. (**a**) Ultrasound clinical B-mode image of  benign tumor. (**b**) Ultrasound Verasonics B-mode image of the same tumor. (**c**) 2D color map of the loss angle overlay on the B-mode image produced at 0.033 Hz based on the LAM method. (**d**) 2D color map of the loss angle produced a0.033 Hz. (**e**) Normalized strain temporal behavior of two specified points in (**d**) accompanied with the normalized stress profile. (**f**) Spectral behavior of two specified points in (**d**) in a frequency range less than 1 Hz. Among 45 patients, 27 cases were diagnosed as benign and 18 as malignant. LAM method, Eqs ([1](#Equ1){ref-type=""} and [2](#Equ2){ref-type=""}), is used to estimate the complex modulus parameters (storage, loss) as was illustrated in Figs [4](#Fig4){ref-type="fig"}--[7](#Fig7){ref-type="fig"} for delta, δ. The overall results are depicted in following figures. Figure [8](#Fig8){ref-type="fig"} shows the result based on the contrast, average and standard deviation measured in tumor part.Figure 8Summary of loss angle modulus parameters: Storage, Loss and Delta in 45 breast lesions. In the next step, the Logistic regression is applied on all of these aforementioned parameters shown in Fig. [8](#Fig8){ref-type="fig"}. The relevant ROC (Receiver Operating Characteristic) curve for each analysis is illustrated in Fig. [9](#Fig9){ref-type="fig"}.Figure 9ROC curve for 45 breast lesions. (**a**) ROC based on measuring the contrast. (**b**) ROC based on lesion average (**c**) ROC based on standard deviation. The measured sensitivity is 77.8%, and the estimated specificity is 96.3%. The accuracy comes to 88.9%. The Area under Curve, AUC, is 0.94. The standard error is 0.04. 95% Confidence interval is 0.82 to 0.99. Detailed information is shown in Table [2](#MOESM1){ref-type="media"} in the supplementary part. It should be noted that, the BI-RDAS results were considered in the aforementioned statistical results. Discussion {#Sec6} ========== Due to biphasic properties of soft tissue, there is always some phase lag between applied stress and the resulting strain. In addition to storage and loss modulus magnitude, the LAM method can leverage the phase lag between these two parameters to study the local viscoelastic properties of living tissue in more details^[@CR31],[@CR41]^. The resulting contrast based on the storage and loss modulus or their ratio can be even more conspicuous in a lower frequency range. Mizuno *et al*.^[@CR11]^ reported that nonequiliburium fluctuations were observable in cytoskeletal networks in a frequency range less than 10 Hz using an active rheometer. Implementing micro rheology on cardiac thin filaments also demonstrated that, in a frequency range less than 10 Hz, both the storage and loss modulus had been elevated by increasing the Ca^2+[@CR12]^. In addition, it has been shown that in living cells, more complex behavior at low frequency ranges can occur^[@CR42]^. Rheometry techniques also have been used on variety of tissue samples to validate the newly developed elastography techniques^[@CR43]--[@CR45]^. In the most recent study, the rheometer results confirmed the higher contrast in viscosity in the frequency range less than 1 Hz^[@CR45]^. Benign breast tumors are generally more viscous with higher phase lag, Fig. [8(g)](#Fig8){ref-type="fig"}, than the malignant ones, particularly with fibroadenoma cases^[@CR31],[@CR32]^. The extra cellular matrix (ECM) is mainly made of a collagen fiber network to which proteoglycan molecules are attached^[@CR46]--[@CR49]^. The primary part of these molecules is the dense and hydrophilic sulfate groups^[@CR50]^. Increasing the concentration of proteoglycan, and consequently the surrounding water molecules in ECM, can cause an increase in viscosity^[@CR31]^. The collagen fibers in ECM are interconnected toward their ends but sparsely connected in the middle, with strong covalent cross-links, which are responsible for the elastic response of the tissue to stress^[@CR31]^. According to electron microscopy observation of malignant breast lesions such as infiltrating ductal carcinoma, the number of sulfated proteoglycan molecules, which are mainly responsible for viscosity, declines at least five times per unit in connective tissues. Thus, while viscosity decreases in malignant lesions, they can be stiffer than surrounding tissue due to increased collagen fibers and covalent cross-links^[@CR46],[@CR49],[@CR50]^. There is, however, no sign of elevation in viscosity in the formation course of this kind of lesions^[@CR46],[@CR49]^. The common feature in benign solid lesions, such a fibroadenomas, is higher collagen density compared to surrounding tissues. An increase in the number of fibers leads to a greater number of proteoglycan molecules and decreased inter-fiber distance. The lower distance between collagen fibers will cause a greater H-bonded cross-link density. Generally, H-bonds help in stabilizing the ECM matrix by keeping the helical shapes within fibers. This functionality of H-bonded cross-links has an important role in creating an elastic restoring force immediately after being stressed. However, these fragile bonds break and reform during the stress application and some of the strain energy is dissipated. This causes the strain response delay in returning to the initial steady state, (usually in less than 5 seconds^[@CR31]^). In other words, this is the reason for viscoelastic response of the external compression, which occurs at a very low frequency range based on its retardation time. Thus, collagen density determines the strength and density of inter-fiber H-bonded links. Some fibrous tumors are not necessarily stiffer than surrounding regions, but due to higher cross-link density, can create a longer delay for a full strain response^[@CR32],[@CR46]--[@CR50]^. This phenomenon is the basis of viscoelastic methods like LAM method. Thus, in the case of fibroadenomas and other collagenous benign lesions, the lesion can be stiffer than the surrounding tissues but they are more viscous in contrast to malignant lesions^[@CR31],[@CR32],[@CR49]^ Fig. [8(g)](#Fig8){ref-type="fig"} also showed that phenomena. To observe such differences, it is necessary to evaluate tissue's viscoelastic response in a period of 1--10 s, which corresponds to a frequency range less than 1 Hz^[@CR32],[@CR34]^. This work on breast patients showed that considering the viscoelastic behavior of tissue by estimating the complex elasticity parameters like storage, loss and delta in an ultra-low frequency range could provide reliable biomarkers for differentiation of benign and malignant tumors in breast patients. The distinctive characteristic of the LAM method is its sensitivity to viscoelastic properties of breast tissue in this range of frequency. This characteristic correlates well with the biochemical construction of benign and malignant breast lesions. The sensitivity and specificity of this method in differentiation of benign and malignant lesions were 77.8% and 96.3% respectively. A possible contributing factor in misclassifications is measurement error. Lesion mobility can adversely affect the quality of recorded data. Patient motion during a test can also negatively affect data quality. Some patients were not able to hold their breath for the entire duration of data collection, which resulted in tissue motion. Cardiac motion was not considered as a major source of error as the frequency of such motion is around 1 Hz, which is somewhat outside the frequency band of these ultra-low frequency range calculation, less than 0.05 Hz. Due to all aforementioned reasons, we tried to apply more restrictions on our motion measurement algorithm. The initial patient population that was considered for this study was 156 patients. The statistical outcomes of these patients are shown in Figs [S1](#MOESM1){ref-type="media"} and [S2](#MOESM1){ref-type="media"}, Tables [S1](#MOESM1){ref-type="media"} and [S2](#MOESM1){ref-type="media"} in supplementary part. However, applying MCCC algorithm in order to detect the out-of-plane and non-axial motion while doing compression was a great assistance to identify cases with mostly axial compression with minimal out-of-plane motions. While this is done retrospectively, if implemented to operate in real-time, such metric can be utilized to ensure proper lesion compression and data collection. Reconsidering these data and using MCCC algorithm resulted in 45 cases out of 156 cases as they have been discussed already. In addition, a multi-parameters analysis using the features obtained from the all creep data (i.e. storage, loss modulus and delta) in conjunction with contrast, average and standard deviation measurement, provided and enhanced classification of the breast tumors in this study, Figs [8](#Fig8){ref-type="fig"} and [9](#Fig9){ref-type="fig"}. Future studies would include expanding the cohort and studying the sources of error in our measurement. This multi factorial analysis is another advantage of the LAM method. LAM can be utilized in conjunction of other ultrasound-derived lesion characteristics such as BI-RADS and size. Comparing Tables [2](#Tab2){ref-type="table"} and [3](#Tab3){ref-type="table"}, with and without considering BI-RADS respectively shows that both the specificity and sensitivity have been elevated from 89.29% to 96.3% and 68.42% to 77.78% respectively. The combined value of LAM and ultrasound imaging features promise better diagnosis without requiring more expensive and contrast-based imaging modalities such as contrast-enhanced magnetic resonance imaging.Table 2Classification table when using MCCC, BI-RADS number and tumor size (Cut-off value = 0.5).Actual groupPredicted groupPercent correct01Benign cases26196.30%Malignant cases41477.78%Percent of cases correctly classified88.89%**ROC curve analysis**Area under the ROC curve (AUC)0.938Standard Error0.03995% Confidence interval0.824 to 0.988Table 3Classification table when using MCCC but not BI-RADS number or tumor size (Cut-off value = 0.5).Actual groupPredicted groupPercent correct01Benign cases25389.29%Malignant cases61368.42%Percent of cases correctly classified80.85%**ROC curve analysis**Area under the ROC curve (AUC)0.868Standard Error0.05695% Confidence interval0.738 to 0.949 Another important aspect of this study is the automated ROI (Region of Interest) selection to remove the subjectivity associated with manual selection of data processing. In other words, all of the patient data was processed in a consistent manner without human input for selecting the region of interest or changing other parameters involved in data processing. First, the eligibility of data was tested for out-of-plane motions and then the processing began automatically either in selecting the lesion from normal part or in setting the creep legitimate time duration in which the monotonous increasing of compliance curve was counted. This procedure went through all the collected patient data. It should be noted that as the results show, the LAM method could be a very effective method in the context of non-invasive diagnostic/prognostic mechanical testing especially for soft tissue; however, it may not be a solid candidate for mechanical property estimation in general. In addition, the LAM method was observed to present a solid contrast between benign and malignant lesions at frequency range less than 0.033 Hz, however it needs more comprehensive studies to find the optimum frequency with highest contrast in this ultra-low frequency range. This would be explored in future work. Methods {#Sec7} ======= **LAM technique** {#Sec8} ----------------- In this patient study, an automated compression device was used to apply a ramp-and-hold force excitation for a duration of time automatically set based on monotonically elevation of creep response. The ultrasound probe is part of this device for recording the viscoelastic response of the underlying tissue. This device is portable, light-weight and easy to use for patient studies to explore the tissue dynamics under external stress^[@CR30]^. For the gel study, 8 N force with the speed of 16 N/s ramp was used. For the patient study, 2--4 N force with 8--12 N/s ramp were applied. To monitor the local viscoelastic response, an ultrasound system (Verasonics, Inc., Kirkland, WA, USA) with a linear array transducer (L11-4v, Verasonics, Inc., Kirkland, WA, USA) was used. In these experiments, the ultrasound center frequency was 6.43 MHz and the frame rate was 200 Hz during the acquisition time of 12 seconds. To track the fast tissue deformation under compression, a two-dimensional autocorrelation method was employed for a particle velocity calculation from adjacent frames. The integration of the particle velocity in time resulted in a displacement estimation^[@CR51]^. After performing the displacement estimation for all consecutive IQ data, the gradient of the resulting displacement was computed to measure the corresponding local strain^[@CR30]^. For patient studies, an experienced sonographer with more than 28 years of experience in breast ultrasound assisted with manual delineation of the lesion in B-mode US images obtained from the Verasonics system at the beginning of each patient data acquisition. Using the radiofrequency data, the loss angle maps were reconstructed offline at a frequency range less than one Hertz. Supplementary video is available online. ### **Dynamic complex measurement** {#Sec9} It was shown that the dynamic complex modulus in the frequency domain, *E*\*(*ω*), can be directly derived using the strain time data (local creep response) in a model-free fashion with some assumption about the experimental creep response^[@CR13],[@CR52],[@CR53]^, Eq. [1](#Equ1){ref-type=""}.$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${E}^{\ast }(\omega )=\frac{i\omega }{i\omega J(0)+\frac{{e}^{-i\omega t(N)}}{\eta }+{\sum }_{n=1}^{N}(\frac{J(n)-J(n-1)}{t(n)-t(n-1)})({e}^{-i\omega t(n-1)}-{e}^{-i\omega t(n)})},n=1:N$$\end{document}$$where J(n) represents the strain data sampled at time point with index *n*. The parameter $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\eta $$\end{document}$ represents the steady state viscosity which is estimated by extrapolation of strain data to *t* → *∞*. Hence, the loss angle can be directly derived as$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\delta =arctan(\frac{{E}_{l}^{\ast }(\omega )}{{E}_{s}^{\ast }(\omega )})$$\end{document}$$where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${E}_{l}^{\ast }(\omega )$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${E}_{s}^{\ast }(\omega )$$\end{document}$ are the imaginary and the real parts of the complex shear modulus, corresponding to the loss and storage modulus, respectively, and δ is the loss angle which represents the phase difference between the storage and loss modulus of the medium due to its viscoelastic properties^[@CR13],[@CR52]^. ### **Measurement** {#Sec10} **Strain Quality Assessment, SQA.** Our main assumption in this study is the linear viscoelastic behavior of the material being tested (phantoms or tissue). Applying an approximate step force results in a temporal strain response, or creep response, which increases monotonically. This behavior is called a normal strain response. Applying this method for *in vivo* studies, however, requires introduction of additional constraints to avoid estimation of unrealistic values. Here, we define a new parameter as Strain Quality Assessment (SQA). SQA verifies two parameters: the total strain and the slope of the final part of the creep response. For each point in the viscoelasticity map reconstruction domain, SQA assigns a value of one for points that have both a positive total strain value and positive final slope, and zero if either of these criteria is violated. All the white areas in Figs [4(d)](#Fig4){ref-type="fig"}, [5(d)](#Fig5){ref-type="fig"}, [6(d)](#Fig6){ref-type="fig"} and [7(d)](#Fig7){ref-type="fig"} are excluded due to SQA. **Contrast:** Contrast refers to a comparison between features of a lesion to those of the surrounding, or background, tissues. For *in vivo* studies, measuring contrast parameters is important for diagnostic purposes. In some cases, measuring the contrast is even more important than measuring the parameter values^[@CR32]^. In order to measure contrast we use the Eq. ([3](#Equ3){ref-type=""}).$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Contrast=\frac{{S}_{lesion}-{S}_{background}}{({S}_{lesion}+{S}_{background})/2}=\frac{Difference}{Average}$$\end{document}$$ In this equation *S*~*lesion*~ is the mean value in the lesion area and *S*~*background*~ represents the mean value of the normal background tissue surrounding the lesion. To measure contrast, the mean value of S for the lesion and background parts should be determined. This is performed by first determining the lesion boundaries from a registered B-mode image within the region of interest (ROI). The automatic ROI was applied to remove the subjectivity about lesion and normal tissue values. In addition, the creep duration was selected automatically based on monotonic increasing compliance curve. As it has been emphasized before all data in this manuscript was analyzed at 0.033 Hz. **Rejection of data based on MCCC metric:** The displacement field obtained from the phase sensitive speckle tracking was utilized to stretch each frame back to its original location, as explained in^[@CR54]^. Briefly, the normalized cross correlation was performed between the pre-compressed and motion-compensated post-compressed echoes in the lesion area. This value served as a quality metric to assess the uniaxiality of the induced motions. Given substantial decorrelation that may occur during compression, a minimum normalized cross correlation value of 10% was chosen to declare a successful uniaxial deformation. Using this criterion, cases/acquisitions that did not meet a required threshold value of MCCC metric were excluded from the analysis. ### **Statistical Analysis** {#Sec11} MedCalc Statistical Software version 15.8 (MedCalc Software bvba, Ostend, Belgium; <https://www.medcalc.org>; 2015) was employed for statistical analysis. The receiver operator curve (ROC) was used to find the best diagnostic discrimination threshold for the estimated loss angle contrast in comparison with the pathology outcomes. The confidence intervals for sensitivity and specificity were found using bias-corrected and accelerated bootstrapping of 1000 trials. Resulting sensitivity, specificity and area under the curve were reported. The Wilcoxon analysis was performed with 95% confidence interval to represent a statistically significant difference for all analysis. All multi-parameter analyses were performed using a logistic regression method in MedCalc. Supplementary information ========================= {#Sec12} Supplementary **Publisher's note:** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Alireza Nabavizadeh and Mahdi Bayat contributed equally Supplementary information ========================= **Supplementary information** accompanies this paper at 10.1038/s41598-019-41885-9. The authors would like to express their appreciation to Mr. Duane Meixner for ultrasound scanning of the breast patients, and Mr. Randall Kinnick for his technical support. This work was supported by grant R01CA168575 from the National Cancer Institute (NCI) and the National Institutes of Health (NIH). A.N. phantom experiment, patient data collection, writing computer code, analyzing LAM data, statistical analysis, writing the manuscript. M.B. patient data collection, statistical analysis, writing comuter code and analyzing LAM data. V.K. patient data collection. A.G. patient data collection and statistical analysis. J.W. patient data collection. A.A. funding acquisition, leading human study, study design, team supervision, and manuscript editing. M.F. funding acquisition, leading the project, study design, and editing manuscript. Competing Interests {#FPar1} =================== The authors declare no competing interests.
{ "pile_set_name": "PubMed Central" }
Books and magazines often contain pages containing audacious mixtures of color images and text. The present invention relates to a fast and efficient method of coding partially-masked image information of such documents by wavelet coding without wasting bits on the image data that is masked by foreground text. A simplified block diagram of a wavelet coding system is shown in FIG. 1. The system includes an encoder 100 and a decoder 200. The encoder 100 codes input image information according to wavelet compression techniques and outputs coded image data to a channel 300. The coded image data includes wavelet coefficients representing the image data. The decoder 200 retrieves the coded image data from the channel 300 and decodes it according to wavelet decompression techniques. Multi-resolution wavelet decomposition is one of the most efficient schemes for coding color images. These schemes involve several operations: color space transform, image decomposition, coefficient quantization and coefficient coding. Image information to be coded is represented as a linear combination of locally supported wavelets. An example of wavelet support is shown in FIG. 2(a). Wavelets extend over a predetermined area of image display. For the length of every wavelet such as W0, two other wavelets W1a and W1b extend half of its length. The length of each underlying wavelet W1a, W1b is itself supported by two other wavelets W2a, W2b, W2c and W2d. This support structure may continue until a wavelet represents only a single pixel. Image data may be coded as a linear combination of the wavelets. Consider the image data of FIG. 2(b). As shown in FIG. 2(c), the image data may be considered as a linear combination of the wavelets of FIG. 2(a). To represent the image data, only the coefficients of the wavelets that represent the image data need by coded. The image data of FIG. 2(b) may be coded as: Because most of the wavelet coefficients are zero, the coefficients themselves may be coded using highly efficient coding methods. The linear combination of coefficients can be expressed in matrix notation as: Aw=xxe2x80x83xe2x80x83(1) where w is a vector of wavelet coefficients, x is a vector of pixel values, and A is a square matrix whose columns represent the wavelet basis. Matrix A usually describes an orthogonal or nearly orthogonal transformation. When a decoder 200 is given the wavelet coefficient, then it may generate the image data x using the process of Equation. 1. Efficient multi-scale algorithms perform image decomposition (i.e. computing Axe2x88x921x) and image reconstruction (i.e. computing Aw) in time proportional to the number of pixels in the image. In practice, most image data is smooth. It differs from the exemplary image data of FIG. 2(b) in that the image data generally does not possess abrupt variations in image value. Whereas the image data used in the example of FIG. 2(b) possesses significant energy in the coefficients of shorter wavelets, natural image data does not often possess energy in these coefficients. The image local smoothness ensures that the distribution of the wavelet coefficients is sharply concentrated around zero. High compression efficiency is achieved using quantization and coding schemes that take advantage of this peaked distribution. When a unitary source of information, such as a page of a book or magazine, contains both text and image data, the text may be considered as a xe2x80x9cmaskxe2x80x9d that overlays image data beneath the text. Coding of any part of the image data beneath the masking text becomes unnecessary because the text will mask it from being observed. In the case of wavelet encoding. Masked wavelets need not be coded. When image data is masked, the mask blocks image data thereunder from being observed. Coding errors that are applied to masked image data are unimportant because the masked image data will be replaced with data from the mask. Also, the mask disrupts the smoothness of the image data. It introduces sharp differences in the value of the image data at the boundaries between the image and the foreground text. Coding of the sharp differences would cause significant energy to be placed in the short wavelet coefficients, which would cause coding inefficiencies to arise in coding the image data. Such coding inefficiencies are particularly undesirable because coding errors that occur below the mask will be unnoticed at the decoder where the mask will overlay the erroneous image data. Accordingly, there is a need in the art for a image coder that codes masked image data efficiently. The disadvantage of the prior art are alleviated to a great extent by a successive projections algorithm that codes partially-masked image data with a minimum number of wavelet coefficients. According to the successive projections algorithm unmasked image information is coded by wavelet decomposition. For those wavelets whose energy lies substantially below the mask, the wavelet coefficients are canceled. Image reconstruction is performed based on the remaining coefficients. For the image information that lies outside of the mask, the reconstructed image information is replaced with the original image information. The wavelet coding, coefficient cancellation, and image reconstruction repeats until convergence is reached. The present invention also provides a simple and direct numerical method for coding the image information in a manner that obtains quick convergence. In a first embodiment, quick convergence is obtained by performing masked wavelet encoding in stages, each stage associated with a predetermined wavelet scale. By advancing the stages from finest scale to coarsest scale, coefficients of masked wavelets are identifies early in the coding process. In a second embodiment, quick convergence is obtained by introducing overshoot techniques to the projections of images.
{ "pile_set_name": "USPTO Backgrounds" }
Identification and functional signature of genes regulated by structurally different ABL kinase inhibitors. Dasatinib is an ATP-competitive, multi-targeted SRC and ABL kinase inhibitor that can bind BCR-ABL in both the active and inactive conformations. From a clinical standpoint, dasatinib is particularly attractive because it has been shown to induce hematologic and cytogenetic responses in imatinib-resistant chronic myeloid leukemia patients. The fact because the combination of imatinib and dasatinib shows the additive/synergistic growth inhibition on wild-type p210 BCR-ABL-expressing cells, we reasoned that these ABL kinase inhibitors might induce the different molecular pathways. To address this question, we used DNA microarrays to identify genes whose transcription was altered by imatinib and dasatinib. K562 cells were cultured with imatinib or dasatinib for 16 h, and gene expression data were obtained from three independent microarray hybridizations. Almost all of the imatinib- and dasatinib-responsive genes appeared to be similarly increased or decreased in K562 cells; however, small subsets of genes were identified as selectively altered expression by either imatinib or dasatinib. The distinct genes that are selectively modulated by dasatinib are cyclin-dependent kinase 2 (CDK2) and CDK8, which had a maximal reduction of <5-fold in microarray screen. To assess the functional importance of dasatinib regulated genes, we used RNA interference to determine whether reduction of CDK2 and CDK8 affected the growth inhibition. K562 and TF-1BCR-ABL cells, pretreated with CDK2 or CDK8 small interfering RNA, showed additive growth inhibition with imatinib, but not with dasatinib. These findings demonstrate that the additive/synergistic growth inhibition by imatinib and dasatinib may be mediated in part by CDK2 and CDK8.
{ "pile_set_name": "PubMed Abstracts" }
[Effect of written patient information on knowledge and function of patients with acute uncomplicated back pain (PIK Study)]. If patients return early in the course of acute, uncomplicated back pain to their normal activities, their symptoms improve more quickly. Written detailed patient information can have a positive effect on knowledge and can increase physical activity. In this study the effect of a short evidence-based back pain leaflet on knowledge, function and patients' beliefs was investigated. A randomised controlled trial was carried out in 12 primary care practices. Patients with acute, uncomplicated back pain received either the back-pain specific information (intervention) or a leaflet without content regarding back pain (control). Participants' data were inquired before consultation of the general practitioner, as well as 1 week and 3 months later. Outcome measures were SF-36, FABQ-D, FFbH-R, knowledge concerning back pain, frequency of use of the leaflet, usefulness of the information and change of behaviour. The included patients totaled 174. The response rates were 74.7% (1 week) and 67% (3 months). Patients receiving the intervention leaflet showed better knowledge at 1 week and greater improvement in function scores at 3 months. There was no effect on patients' beliefs. Patients of the intervention group reported more activity in everyday life. Short written information may have small, in total possibly positive effects on knowledge, support of activity and function in patients with acute, uncomplicated back pain.
{ "pile_set_name": "PubMed Abstracts" }
Sheehan got into an argument with the girl, and her 14-year-old sister, because his lotion was missing. While yelling at them, one of the girls began to cry and Sheehan said, "good to see you crying," Burris said. Sheehan then started shoving the 16-year-old girl down the hall and kicked her, the prosecutor said. The girl tried to pull away from Sheehan, and he wouldn't allow her to do so. "He grabbed her by her ponytail and slammed her head into the wall," Burris said. Police arrested Sheehan, of 34 Eaton Road, and charged him with two counts of assault and battery with a dangerous weapon and and one count of assault and battery. Burris asked Judge Robert Greco to hold Sheehan on $7,500 bail, but Sheehan's lawyer, Donna Paruti, argued that her client was not the aggressor. She said Sheehan was left home to watch the two children when the mother took a trip. The girls, Paruti said, were drinking and smoking marijuana all weekend and wouldn't listen to him. At one point, he defended himself when the 16-year-old came at him with a knife, the lawyer said. "This alleged victim has been in trouble before for beating up her younger sister and her mother," Paruti said. Greco set Sheehan's bail at $1,000 and ordered him to stay away from the two girls and the home. Sheehan is due back in court on May 20 for a pretrial conference. Norman Miller can be reached at 508-626-3823 or nmiller@wickedlocal.com. For up-to-date crime news, follow Norman Miller on Twitter @Norman_MillerMW.
{ "pile_set_name": "Pile-CC" }
Grouping of residual solvents present in pharmaceuticals using experimental planning and chemometric methods. The main effects of six experimental factors on the efficiency of HS (headspace) extraction in headspace gas chromatography--flame ionization detector (HS-GC-FID) determination of twenty organic solvents routinely used in production of pharmaceuticals were obtained on the basis of the results of experiments carried out according to the Plackett-Burman factorial design. The effects were used as a basis for grouping the solvents into five groups, the solvents belonging to a group responded similarly to changes of HS conditions. To this end, visualization approaches were used as well as chemometric methods: cluster analysis (CA) and principal component analysis (PCA). Moreover, the most important HS experimental factors were selected for further optimization of the HS-GC determination procedure.
{ "pile_set_name": "PubMed Abstracts" }
Poet Ntsiki Mazwai has again taken to social media to criticise South Africa’s education system that seems to take away the “Africaness” of a black child. During a diatribe against the global dominance of “white culture”, she went as far as to suggest that white people have exerted a very “violent effect” on South Africa, with the entire ethnic group known in South Africa as coloureds being one of the results. In a series of tweets, Mazwai said it was embarrassing when grown black men speak broken English to try to impress when they can just speak their own languages. Though one of her weaknesses was her inability to be fluent in her mother tongue, she was proud of herself because even the best white schools in the country had not won in trying to make her “worship whiteness”. “I think education took the best part of me…..my Africaness [sic].” The main problem with the education system was its failure to teach the black child about their history and heroes, according to the poet. “Teach the black child about her own heroes….because white heroes don’t mean shit to us…even white celebrities mean dololo to u. “Your white heroes are not my heroes….I have my own heroes,” she said. White people have had a very violent effect on black people…….on many levels — NtsikiWethu (@ntsikimazwai) June 1, 2017 Black people don’t worship Madonna and the Pope and want nothing to do with Pippa Middleton’s wedding or Ariana Grande, because “all these whites mean shit to us. We don’t care about them,” she said. Your white heroes killed my people….your white heroes are trash — NtsikiWethu (@ntsikimazwai) June 1, 2017 In fact, blacks “don’t recognise your white gods”. White heroes, who are “trash” killed “my” people, and were further successful in dividing blacks and creating “superior” blacks, said Ntsiki. “Kana white people killed Steve Biko…white people killed Chris Hani.” They did not stop there, according to Mazwai, their “very violent effect” on black people is still evident today through the entire race of coloureds who are apparently a result of rape culture. “We have a group called coloured who come from white men raping black women….so erm…about white people.” She further slammed white people’s “overinflated sense of self-importance”, because the same whites were getting money in former president Nelson Mandela’s name, she alleged. Many coloured people may take issue with the poet’s views, however, as several coloured-advocacy groups choose to trace their ancestry back to the indigenous South African Khoisan people, thus denying that their heritage is only down to a mixing of racial DNA between “Africans” and “Europeans”. She was taken to task by some of her followers, and she hit back at one by saying that anyone saying whites didn’t rape blacks was “pretending”. We gonna pretend that white men didnt rape black women??? Oh ok https://t.co/xFJvFb8K9Q — NtsikiWethu (@ntsikimazwai) June 1, 2017 When Noel Barry-Wilson told her: “You think it’s constructive 2 demean the entire colored race including USA past president & all people left of middle on the grey scale?” she hit back that he was being idiotic and “stirring bullshit”. He had earlier told her: “Why do you assume that the beautiful colored nation did not freely chose their partner & do not have any white mothers in their heritage?” King Sankara told her not to insult “mix race relationships” while another follower mentioned Saartjie Baartman. ayi sisi Ntsiki, let's not insult mix race relationships and let's not puke at the coloured race. — #WeVoteEFF (@vusiking) June 1, 2017 Also read: http://citizen.co.za/your-life/your-life-entertainment-your-life/entertainment-celebrities/1016812/nelson-mandela-is-no-hero-to-me-ntsiki-mazwai/
{ "pile_set_name": "OpenWebText2" }
Thanksgiving Dinner for Military Veterans There will be a Thanksgiving dinner held at Gowen Field on Tuesday evening, November 20th, at 6PM in the Air National Guard Dining Facility/Building 400. This is open to all veterans, military members, and their immediate families. For more information, please call Chaplain Rob Morris at 272-6468. An RSVP would be appreciated.
{ "pile_set_name": "Pile-CC" }
import re def parseDeviceId(id): match = re.search('(#|\\\\)vid_([a-f0-9]{4})&pid_([a-f0-9]{4})(&|#|\\\\)', id, re.IGNORECASE) return [int(match.group(i), 16) if match else None for i in [2, 3]]
{ "pile_set_name": "Github" }
Antonio Cinelli Antonio Cinelli (born 8 December 1989) is an Italian professional football player. He plays for Vicenza Virtus. Club career Lazio Born in Rome, capital of Lazio region (and Italy), Cinelli started his career at S.S. Lazio. He was sold to Sassuolo in a co-ownership deal in 2010 for €200,000, on a three-year contract. In June 2012 Lazio bought back the 50% registration rights of Cinelli for €30,000 fee, on an one-year contract. Vicenza Cinelli was signed by Serie B club Vicenza on 7 January 2013 on a free transfer. On 8 June 2015 Cinelli signed a new one-year contract with Vicenza. However, on 19 January 2016 Cinelli was transferred to Cagliari, for €100,000 transfer fee. Chievo On 19 July 2016 he was signed by Serie A club Chievo, on a three-year contract. His spell with Chievo was short-lived, which on 8 August he was transferred to Cesena on loan, with an obligation to buy; according to Chievo, the loan fee was €180,000. On 31 January 2017 Cinelli left for Novara on a temporary basis. Cesena and Chievo also canceled the obligation to buy. On 24 August 2017, Cinelli left for Serie B newcomers Cremonese on another loan. He was released from his Chievo contract by mutual consent on 6 November 2018. Return to Vicenza On 3 January 2019, he signed with Vicenza Virtus. References External links Category:1989 births Category:Sportspeople from Rome Category:Living people Category:Italian footballers Category:Association football midfielders Category:S.S. Lazio players Category:F.C. Lumezzane V.G.Z. A.S.D. players Category:U.S. Sassuolo Calcio players Category:F.C. Pavia players Category:L.R. Vicenza Virtus players Category:Cagliari Calcio players Category:A.C. Cesena players Category:Novara Calcio players Category:U.S. Cremonese players Category:Serie B players Category:Serie C players
{ "pile_set_name": "Wikipedia (en)" }
# repeating [![Build Status](https://travis-ci.org/sindresorhus/repeating.svg?branch=master)](https://travis-ci.org/sindresorhus/repeating) > Repeat a string - fast ## Install ``` $ npm install --save repeating ``` ## Usage ```js const repeating = require('repeating'); repeating('unicorn ', 100); //=> 'unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn unicorn ' ``` ## Related - [repeating-cli](https://github.com/sindresorhus/repeating-cli) - CLI for this module ## License MIT © [Sindre Sorhus](https://sindresorhus.com)
{ "pile_set_name": "Github" }
Fairfield Warde falls just short in Class L wrestling Staff reports Published 11:16 pm, Saturday, February 16, 2013 BRISTOL -- Freshman Charles Kane won the 126-pound weight class and teammate Amed Hourani captured the 285-pound crown to lead Fairfield Warde to second place at the Class L wrestling championships Saturday at Bristol Central. The Mustangs finished with 189 points, just behind champion New Milford's 192.5. Fairfield Ludlowe was eighth with 102 points. "It's tough to swallow, coming that close and not winning it," he said. "But you have to keep it all in perspective. There were a lot of different things that happened that could have changed the outcome, but of the six wrestlers who made the finals for us, five are underclassmen."
{ "pile_set_name": "Pile-CC" }
New research by a University of Rhode Island professor suggests that the length of human pregnancy is limited primarily by a mother's metabolism, not the size of the birth canal. The research, published in the Proceedings of the National Academy of Sciences the week of August 27, challenges the long-held notion of an evolutionary trade-off between childbirth and a pelvis adapted for walking upright. Two traits that set humans apart from other primates -- big brains and the ability to walk upright -- could be at odds when it comes to childbirth. Big brains and the big heads that encase them are hard to push through the human birth canal, but a wider pelvis might compromise bipedal walking. Scientists have long posited that nature's solution to this problem, which is known as the "obstetric dilemma," was to shorten the duration of gestation so that babies are born before their heads get too big. As a result, human babies are relatively helpless and seemingly underdeveloped in terms of motor and cognitive ability compared to other primates. "All these fascinating phenomena in human evolution -- bipedalism, difficult childbirth, wide female hips, big brains, relatively helpless babies -- have traditionally been tied together with the obstetric dilemma," said Holly Dunsworth, an anthropologist at the University of Rhode Island and lead author of the research. "It's been taught in anthropology courses for decades, but when I looked for hard evidence that it's actually true, I struck out." The first problem with the theory is that there is no evidence that hips wide enough to deliver a more developed baby would be a detriment to walking, Dunsworth said. Anna Warrener, a post-doctoral researcher at Harvard University and one of the paper's co-authors, has studied how hip breadth affects locomotion with women on treadmills. She found that there is no correlation between wider hips and a diminished locomotor economy. "That throws doubt on the assumption that the size of the birth canal is limited by bipedalism," Dunsworth said. "Wide hips don't mean you can't walk efficiently." Then Dunsworth looked for evidence that human pregnancy is shortened compared to other primates and mammals. She found well-established research to the contrary. "Controlling for mother's body size, human gestation is a bit longer than expected compared to other primates, not shorter," she said. "And babies are a bit larger than expected, not smaller. Although babies behave like it, they're not born early." For mammals in general, including humans, gestation length and offspring size are predicted by mother's body size. Because body size is a good proxy for an animal's metabolic rate and function, Dunsworth started to wonder if metabolism might offer a better explanation for the timing of human birth than the pelvis. advertisement To investigate that possibility, she enlisted the help of Peter Ellison of Harvard University and Herman Pontzer of Hunter College in New York, two experts in human physiology and energetics. Building on Ellison's prior work on human pregnancy and childbirth, the researchers developed a new hypothesis for the timing of human birth called the EGG (energetics, gestation, and growth). "Under the EGG, babies are born when they're born because mother cannot put any more energy into gestation and fetal growth," Dunsworth explains. "Mom's energy is the primary evolutionary constraint, not the hips." Using metabolic data on pregnant women, the researchers show that women give birth just as they are about to cross into a metabolic danger zone. "There is a limit to the number of calories our bodies can burn each day," says Pontzer. "During pregnancy, women approach that energetic ceiling and give birth right before they reach it. That suggests there is an energetic limit to human gestation length and fetal growth." Those metabolic constraints help explain why human babies are so helpless compared to our primate kin, like chimpanzees. A chimp baby begins crawling at one month, whereas human babies don't crawl until around seven months. But for a human to give birth to a newborn at the same developmental level as chimp, it would take a 16-month gestation. That would place mothers well past their energetic limits. In fact, even one extra month of gestation would cross into the metabolic danger zone, the researchers found. advertisement "It would be physiologically impossible, regardless of pelvic bone anatomy, to birth a more developed baby," Dunsworth said. "Our helplessness at birth is just a sign of how much more brain growth we have to achieve once we start living outside our mother." The energetics, gestation and growth hypothesis would downplay an implication of the obstetric dilemma that Dunsworth finds odd. "We've been doing anthropology with this warped view of the male pelvis as the ideal form, while the female pelvis is seen as less than ideal because of childbirth," she said. "The female births the babies. So if there's an ideal, it's female and it's no more compromised than anything else out there. Selection maintains its adequacy for locomotion and for childbirth. "If it didn't, we'd have gone extinct," Dunsworth said.
{ "pile_set_name": "OpenWebText2" }
Q: `@Transactional` not working for Spring 2 controller I have an old controller within my app that is defined as a spring bean in xml and makes use of Spring's SimpleFormController. I've tried to make the processes within the onSubmit method of the controller transactional by adding the @Transactional annotation but it doesn't work. According to this guide the invocation of the annotation must happen "outside of the bean", does this mean that the annotation cannot be used in old Spring controllers like mine? Are there any alternatives or workarounds? The reason I know it's not working is because 1) changes to the db are not rolled back on error (this is despite the fact that I have defined rollbackFor = Exception.class, and even in some instances used TransactionAspectSupport.currentTransactionStatus().setRollbackOnly();, in this instances where it tries to use the latter it throws an error stating there is no transaction present. 2) I've added breakpoints to where @Transactional is instantiated within Spring and none of them get hit. EDIT: So people are asking for reproducible examples of code. The problem doesn't lie within the business logic code, I'm looking for clarity on the usage of the annotation within a Spring 2 controller. So what I have for example is this: public class ImportController extends SimpleFormController { @Override @Transactional(rollbackFor = Exception.class) public ModelAndView onSubmit(HttpServletRequest request, HttpServletResponse response, Object command, BindException errors) throws Exception { ... } } A: You are right. @Transactional will not work here because onSubmit is invoked by the same bean. And in this case the call is done directly and the default spring transaction handling does not work. See answers in this question for a detailed explanation of the options you have
{ "pile_set_name": "StackExchange" }
Q: How to inner join two select queries on same table I am stuck... A 'data' table with columns 'value' and 'datatype' is populated with engine load and vehicle speed and each record is stamped with date, time, lat, long. I want to query for engine load over 10% while the vehicle is moving (e.g. speed > 0). I can create a query to select the engine load and I can create a query to select the vehicle speed but how do I create a query to select engine load when > 10% AND the Vehicle is moving where their date, time lat, and long are equal? This Query does not work, but it provides a jist of what I am trying to do. Can anyone help me create a query? tables TName: data PK datakey value fk1 dataeventkey fk2 datatypenamekey TName: datatypename PK datatypenamekey datatypename TName: dataevent PK dataeventkey datetime lat long SELECT d1.datetime FROM (data INNER JOIN datatypename ON data.datatypenamekey = datatypename.datatypenamekey INNER JOIN dataevent ON dataevent.dataeventkey = data.dataeventkey) d1 WHERE ( d1.datatypename = "Engine Load [%]" AND d1.value > 10 ) INNER JOIN SELECT d2.datetime FROM (data INNER JOIN datatypename ON data.datatypenamekey = datatypename.datatypenamekey INNER JOIN dataevent ON dataevent.dataeventkey = data.dataeventkey) d2 WHERE ( d2.datatypename = "Vehicle Speed [mph]" AND d2.value > 0 ) ON d1.datetime = d2.datetime A: I'm not 100% sure I understand, but I think you just need to reference two instances of the same table. Kind of making some assumptions based on your SQL, but giving it a shot here: SELECT engineLoad.dateTime FROM ( SELECT d.datakey, de.datetime FROM data d INNER JOIN datatypename dt ON data.datatypenamekey = dt.datatypenamekey INNER JOIN dataevent de ON de.dataeventkey = d.dataeventkey WHERE d.value > 10 AND dt.datatypename = "Engine Load [%]" ) engineLoad INNER JOIN ( SELECT d.datakey, de.datetime FROM data d INNER JOIN datatypename dt ON data.datatypenamekey = dt.datatypenamekey INNER JOIN dataevent de ON de.dataeventkey = d.dataeventkey WHERE d.value > 0 AND dt.datatypename = "Vehicle Speed [mph]" ) vehicleSpeed ON engineLoad.dataKey = vehicleSpeed.dataKey <==might need to remove this line AND engineLoad.datetime = vehicleSpeed.datetime Edit Looks like you need to reference datatypename twice as well? Edited the above, so try again.
{ "pile_set_name": "StackExchange" }
see all travel extras Visas Tourist Visas Working Holiday Visas Discount Cards ISIC Student Card IYTC Youth Card ITIC Teacher Card ISIC MasterCard®. Subscription managers also do a lot much more like issue passwords, resend shed passwords, and figure out which parts of your website an individual has access to, depending upon their level of subscription. My passion for moving the web FORWARD manifests itself through advocating the use of modern client side web technologies.
{ "pile_set_name": "Pile-CC" }
Volunteering as Meaning-Making in the Transition to Retirement Luc S. Cousineau, Katie Misener Abstract Understanding the volunteer experience of older adults is of critical importance to the nonprofit and voluntary sector, and society. Research suggests that volunteering is a way individuals derive meaning through the complex interactions that make up measures of self-worth, community concept, and identity. This study explores the meaning of volunteering in the lives of adults over the age of 60 as they transition into retirement. Analysis revealed four primary themes: role identity; confronting ageing, health, and dying; fear/anxiety about transitioning to retirement; and making a difference. Further analysis based on whether retirement was planned or not revealed important differences in the ways that meaning was made. The findings reveal suggestions for improvements in the recruitment and retention of the older volunteer segment in nonprofit organizations. Davis, C. G., Nolen-Hoeksema, S., & Larson, J. (1998). Making sense of loss and benefiting from the experience: Two construals of meaning. Journal of Personality and Social Psychology, 75(2), 561-574. doi:10.1037/0022-3514.75.2.561 Krause, N. (2015). Assessing the religious roots of volunteer work in middle and late life. Research on Aging, 37(5), 439-463. doi:10.1177/0164027514541703 Lancee, B., & Radl, J. (2012). Social connectedness and the transition from work to retirement. The Journals of Gerontology. Series B, Psychological Sciences and Social Sciences, 67(4), 481-490. doi:10.1093/geronb/gbs049 McDonald, L. (1995). Editorial: Retirement for the rich and retirement for the poor: From social security to social welfare. Canadian Journal on Aging/La Revue Canadienne Du Vieillissement, 14(03), 447-451. doi:10.1017/S0714980800009028 McMahon, T., & MacQueen, K. (2014, June 3, 2014). Canada’s looming pension wars: Boomers are only now starting to take stock of retirement and many don’t like what they see. Maclean's.
{ "pile_set_name": "Pile-CC" }
21 Federal If you want to see what Nantucket was like before the new glam crowds started pouring in, head to this 1847 former guesthouse. The pink-pants-and-deck-shoes crowd has made 21 Federal its unofficial headquarters since 1985—and sunburned, just-off-the-yacht types can still be found here, downing martinis at the clubby wood-paneled bar, hobnobbing on the back patio, and crowding the tables in the homey, rambling collection of dining rooms. Chef Russell Jaehnig, who’s helmed the kitchen for more than a decade, can be creative at times (adventurous types may want to sample his pan-seared foie gras, served atop a banana tarte Tatin); but he never strays too far from the staples: seared local sea scallops; steamed Prince Edward Island mussels; sautéed halibut with lobster risotto; dry-aged sirloin with haricots verts. The one thing that’s consistently surprising about the menu is the price point—entrées cost upwards of $36—but then, observing an increasingly rare species in its native habitat doesn’t come cheap. 21 Federal If you want to see what Nantucket was like before the new glam crowds started pouring in, head to this 1847 former guesthouse. The pink-pants-and-deck-shoes crowd has made 21 Federal its unofficial headquarters since 1985—and sunburned, just-off-the-yacht types can still be found here, downing martinis at the clubby wood-paneled bar, hobnobbing on the back patio, and crowding the tables in the homey, rambling collection of dining rooms. Chef Russell Jaehnig, who’s helmed the kitchen for more than a decade, can be creative at times (adventurous types may want to sample his pan-seared foie gras, served atop a banana tarte Tatin); but he never strays too far from the staples: seared local sea scallops; steamed Prince Edward Island mussels; sautéed halibut with lobster risotto; dry-aged sirloin with haricots verts. The one thing that’s consistently surprising about the menu is the price point—entrées cost upwards of $36—but then, observing an increasingly rare species in its native habitat doesn’t come cheap.
{ "pile_set_name": "Pile-CC" }
Yo Papajeff, Since (I think this is the case) only members of this forum are able to read anything in the Files, and this article is so in-spiring, in-couraging, and well written, I've copied it below so everyone who wants to can read it. To paraphrase something Mozart once told the king who told him to take some notes out of a musical piece he had composed, "It's not too long or too short - it's exactly as long as it should be." Thanks for sharing this "everywoman/everyman's story". Peace and blessings, Bob PS: "ROI"? Dream A Little Dream With Me. When I was very young I lived in a fantasy world of movie-inspired adventure. The world was my ripe watermelon (I don't like oysters), sweet and juicy and satisfying. As I grew older and submitted to the social coercion of fitting in, and acting normal, I slipped into the quiet desperation that most men suffer. I played the game, but I was never "in" the game. I joined the parade of worker bees, hoping for nothing more than middle-class success. I was bored, constipated and pretty much miserable. Oh, I took the typical excursions of sex, drugs and rock `n' roll. Um, maybe I was a little more indulgent than the average bear, but I stayed mostly in the mainstream and out of any real trouble - criminal and otherwise. Then, as I approached 30, the quiet desperation turned to an existential angst that gnawed at me until the pain became so unbearable that I abandoned everyone and everything in my life. I ripped off the nice, respectable, middle class, dressed-for-success persona. Remember the sex, drugs and rock'n'roll thing? Well, those were first stops along the way to what would become a vision quest, and an enlightenment experience that would change my life even more dramatically than the earlier flee. Now, I didn't know of any such thing as a vision quest, and I only use that term in retrospect. My simple and primary goal was to escape the choking oppression that I felt. However, the guilt of my slip-out-the-back-Jack move overtook me in a few years. It haunted me in my sober moments, but it really overtook me in about 3 years from the time I left. Life became more than bleak. I wanted to die. I asked to die. My mantra became, "let me die", until one day I looked heavenward, and asked, "What did I miss?" The response to that question was to come on July 21, 1975 at about 9:30 in the morning. In the midst of a quiet meditation I experienced what is typically described by NDEs, Near Death Experiencers. I was given a pardon by the governor; I mean THE governor. I was free from guilt, shame, and degradation over my past deeds, and given a new life free from fear and doubt. I happily, make that ecstatically, returned to the mainstream buzz of worker bees. Only this time I found joy in work, joy in relationships, joy , joy, joy. The world was my watermelon (or honeycomb, in this case) once again. And I have stayed in the garden ever since. A little fear and doubt creeps in, but never of the intensity that robs me of my joy or makes me angry for anything more or longer than a ripple in time. But obviously, that's not the end of the story. Given this new found freedom and enthusiasm for life, I was dressed-for-success once again. I played the game better than before, and moved through the corporate ranks at virtually every stop. I earned a bunch of degrees and certifications in this and that; thinking that these would enhance and insure my success. And they did somewhat. But I grew up in a blue-collar world, and my aspirations were limited to what I saw as one step higher on the ladder - a white collar, good-paying job, or a small business of my own. Small was as big as I could think. I would dream, but more like dreams of winning the lottery or being left a inheritance by a rich uncle. I don't have a rich uncle, but this is a dream, remember. Then one day in the not too distance past, I woke up. I didn't want to wait for a rich uncle to die. I wanted to become that rich uncle. But my strategy was flawed. We do not break out of the swarm by becoming better bees, with more degrees. Worker bees never change jobs. Even the snappiest dressers, in corner offices, never become anything more than worker bees. They have grander excursions, bigger honeycombs, a louder buzz, sometimes more vacations (sometimes less) but they're still worker bees. They cannot imagine themselves, other than in some fanciful moment, beeing (intentional) anything else. A light bulb came on. No, I didn't become a moth. But to stay with the small insect metaphor, I became a caterpillar. We must evolve. We must grow wings and gracefully fly over the brick wall of small-minded thinking, over the corporate wall, and off into the wild blue yonder. We must tap into a vision, into inspired acts of courage, and, if necessary, abandon everyone and everything that limits us and keeps us from our dreams. Or we can nestle down into our life of quiet desperation. Or we can deny our quiet desperation. Or we can drown the desperation in sex, drugs and B-movies. Evolution is not for everyone. The side effects can kill you. Of course, if you're happy and you know it, clap your hands. If that didn't startle you and wake you up, then you just may be one of the fortunate ones, and this story can be filed in the non-applicable draw. If you're still reading, you may have a question, like, "How can I evolve?". Well, like the caterpillar, we are destined to evolve. Everything we need to evolve into a life of peace, love, joy and rich success came with us at birth. The problem is what we have learned since then. The solution is to unlearn and return to our natural birthright. We must die to our old way of thinking, give up all of our misguided presumptions, and untie the knots of social coercion. There are (at least) two ways to do this: shrink or expand. The way of the shrink: Tell me what's on your mind. Spill it all out. Keep going. What else? And how do you feel about that? See you next week and next week and next week. At some point you may come to the bitter root of your presumptions about life and relationships that keeps growing weeds in your mind and choking out your joy in life. Potentially, out of this will come insights, and a reframing, rethinking about your life strategy, and a new found freedom. Wings. The way of expansion: One day you feel an inner stirring. Something is missing in your life. You don't know what. And the feeling gnaws at you until you begin to search for the answer. It's a mystery, and you don't have a clue. But you search. You have no choice. Then, one day, in the midst of quiet meditation, or in the midst of a mud-wrestling match, it hits you. Your mind melts. You give up searching completely. Your head knowledge drops into your heart. And from this seat of wisdom, without words, comes THE answer. A sudden rush of wisdom whooshes in, and you realize that you have wings. A whole new identity that you have never dreamed or imagined is yours, and a whole new world opens up before you like magic. Some people make this journey alone. For many, a guide who has made the journey, is of great help. A shrink, a guru, a good book, a gorgeous sunrise, an obnoxious boss; any of these can catapult you over the wall. A walking stick for your journey is best fashioned out of a choice to love. Choose to be a loving, forgiving, grateful person. In the midst of the pain preceding evolution, this ain't easy, but keep coming back to it. Love is the best walking stick on life's journey known to man and woman. All of the masters agree. And now, for the practical side (which may not be obvious to some, but you have read this far) of this cosmic dream. Once this truth that sets you free is known, you are truly capable of inspired living. You can become an artist in all that you do, and a master of all you choose to focus your energies on persistently. Trust, no matter what. Let love guide you to your destiny. Do what you love doing, at all costs. The ROI puts Wall Street to shame, and puts you in the garden of lush watermelons, milk and honey, for the rest of your days. Papajeff Jeff Belyea , known by some as Papajeff, is a meditation teacher and personal coach in St. Petersburg, Florida. He can be reached by email at jeff@... or on his cell phone at 727-542-7117. Your message has been successfully submitted and would be delivered to recipients shortly.
{ "pile_set_name": "Pile-CC" }
/* * All or portions of this file Copyright (c) Amazon.com, Inc. or its affiliates or * its licensors. * * For complete copyright and license terms please see the LICENSE at the root of this * distribution (the "License"). All use of this software is governed by the License, * or, if provided, by the license below or the license accompanying this file. Do not * remove or modify any license notices. This file is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * */ #pragma once #include "SystemComponentFixture.h" #include <Tests/TestAssetCode/AnimGraphFactory.h> namespace EMotionFX { class Actor; class ActorInstance; class AnimGraph; class AnimGraphInstance; class AnimGraphMotionNode; class AnimGraphStateMachine; class AnimGraphStateTransition; class AnimGraphObject; class MotionSet; class AnimGraphTransitionConditionFixture : public SystemComponentFixture { public: void SetUp() override; void TearDown() override; virtual void AddNodesToAnimGraph() { } TwoMotionNodeAnimGraph* GetAnimGraph() const { return m_animGraph.get(); } AnimGraphInstance* GetAnimGraphInstance() const { return m_animGraphInstance; } protected: AnimGraphStateMachine* m_stateMachine = nullptr; AnimGraphInstance* m_animGraphInstance = nullptr; AnimGraphMotionNode* m_motionNodeA = nullptr; AnimGraphMotionNode* m_motionNodeB = nullptr; AnimGraphStateTransition* m_transition = nullptr; AZStd::unique_ptr<Actor> m_actor; AZStd::unique_ptr<TwoMotionNodeAnimGraph> m_animGraph; MotionSet* m_motionSet = nullptr; ActorInstance* m_actorInstance = nullptr; }; }
{ "pile_set_name": "Github" }
A-Level A-Level Computer Science Resources Welcome to the A-Level Computer Science resources section. Unit 1 Unit 2 Unit 3 Share this page! Testimonials We’ve mainly used the CSUK resources to help teach GCSE OCR Computer Science, although Schemes of Work for Key Stage 3,4 & 5 is included in the one price. They comprehensively cover every part of the GCSE specification and each slide shows how it fits into the overall topic context. User-friendly explanations are given and there are lots of examples – especially useful for Component Two: Computational Thinking paper. I highly recommend these resources. I’ve always found the site author easily … Cathryn ArmerHead of ComputingNorthleigh House SchoolEngland I have found the resources very useful. They are well-thought out, cover the topic content and are suitable for the age range. Mrs ChaudhrySubject Leader for ComputingChiltern Hills AcademyEngland Absolutely fantastic resources! It has saved me hours in planning; worth every penny! Without the excellent resources from Computer Science UK I would be lost. The presentations, workbooks and assessments ensure that every element of computer science is fully covered even though I teach CIE. Thank you CSUK, brilliant and appreciated work. Ms MatthewsHead of Computer Science/ICTWingate SchoolTenerife We are extremely pleased with the resources, there is no need for planning. We are with AQA , however there is enough overlap in the course content for us to utilize the resources. Ms. MirzaTeacherSt.John Payne Catholic SchoolEngland Some great resources that have made my schemes of work a lot better, well structured and key elements of the curriculum are included Ms HasanTeacherThe Kingsway SchoolEngland A fantastic set of resources for minimal cost. There are some really great lessons in the Key Stage 3 section. Jamie ChadwickDirector of Technology Enhanced LearningAlderley Edge School for GirlsEngland The ComputerScienceUK website has fantastic computer science resources. Easily accessible and easy for the students to follow. The cost is very affordable. Mr BaconTeacherKirkby Stephen Grammar SchoolEngland Amazing resources that are offered at a more than reasonable price. These resources have saved myself and my colleagues copious amounts of time. Shaun LloydTeacherThorp AcademyEngland The ComputerScienceUK website includes a lot of very useful computer science resources for all year groups, which cover topics relevant to the current curriculum. They have saved me a lot of preparation time.
{ "pile_set_name": "Pile-CC" }
Power Metering Project Lesson Description:There are many devices around campus that use electricity, but it helps to have an understanding of how much power each type of device uses. With this information, you are better able to focus efforts on reducing power consumption. With basic power data collection and analysis, we can begin to answer questions like: how much money does it cost the school to leave all the computers on at night?
{ "pile_set_name": "Pile-CC" }
<?xml version="1.0" encoding="utf-8"?> <packages> <package id="System.Reactive" version="4.0.0-preview00001" targetFramework="net462" /> <package id="System.Reactive.Core" version="4.0.0-preview00001" targetFramework="net462" /> <package id="System.Reactive.Interfaces" version="4.0.0-preview00001" targetFramework="net462" /> <package id="System.Reactive.Linq" version="4.0.0-preview00001" targetFramework="net462" /> <package id="System.Reactive.PlatformServices" version="4.0.0-preview00001" targetFramework="net462" /> <package id="System.Reactive.Windows.Threading" version="4.0.0-preview00001" targetFramework="net462" /> <package id="WhiteTie" version="1.3.16" targetFramework="net461" developmentDependency="true" /> </packages>
{ "pile_set_name": "Github" }
Rfc Rfc RFC Viewer is a powerful RFC browsing utility for networking program and protocol developers. It parses the original RFC file, and generates a section directory tree as well as a page index for content browsing. Users can select to view original RFC document, or to hide each page's header and... Platforms: Windows The Vovida SIP stack is an implementation of the protocol defined in RFC 2543, the Session Initiation Protocol, which can be used to initiate voice connections (phone calls) over IP networks. It offers an object-oriented C++ API as well as sample applications demonstrating its use.. Platforms: *nix Vortex Library is a BEEP Core protocol implementation, following the standard definitions in RFC 3080 and RFC 3081. Vortex Library has a clean and easy-to-use API that allows you to write new protocols or user applications. Vortex Library has been developed within the Af-Arch project, and it... Platforms: *nix OpenCAP is a server for Internet calendaring by following the specifications of the IETF (RFC CAP 4324). Cap4j is the RFC 4234 CAP implementation. OpenCap project is the implementation of Cap4j calendar store. Why another calendaring project ? Ideally, Internet Calendaring should allow... Platforms: *nix Authen::OTP is a One Time Password perl module implementing RFC 2289. It goes beyond computing the nth OTP. It helps admins maintain users OTP passwords, authenticates users, updates their current states, provides the challenges, etc. It can also be used by clients to compute their Nth OTPs... Platforms: *nix nss_ldap is an RFC 2307-compliant set of C library extensions. The resolution of the entities defined in RFC 2307 is generally performed by a set of UNIX C library calls (such as getpwnam() to return the attributes of a user). The nss_ldap module provides the means for Solaris and Linux... Platforms: *nix Stunner is an RFC 3489 STUN server and client for Unix and Unix-line operating systems. Stunner aims to adhere closely to the RFC. The STUN protocol is used to help clients who are located behind network-address translating (NAT) routers determine the sort of NAT being used. It is commonly used... Platforms: *nix Liblogging is an easy-to-use, cross-platform library for RFC 3195-style logging. It has a very simple API which takes out all complexity of the new BEEP-based RFC 3195 syslog standard. It supports RAW and COOKED profiles as well as initiators and listeners. Liblogging takes a different... Platforms: *nix Dhcpclient is an RFC 2131 compatible DHCP client for Linux 2.6. It uses netlink for interface configuration, acts on link state messages, and is highly customizable by calling a script on every state change to allow updating resolv.conf. Dhcpclient is small, and compiles with uclibc in... Platforms: *nix Jasmin software distribution includes an implementation of the Script MIB according to RFC 2592 with a Java runtime engine, a selection of demonstration scripts, a Java package called "scriptmib" supporting the development of manager applications for the Script MIB, Smurf, a graphical user... Platforms: *nix RFC::RFC822::Address is a Perl module for RFC 822 style address validation. SYNOPSIS use RFC::RFC822::Address qw /valid/; print "Validn" if valid abigail@example.com; This module checks strings to see whether they are have the valid syntax, as defined in RFC 822 [1]. One subroutine,... Platforms: *nix RFC (Remote Filesystem Checker) is a set of scripts that aims to help System-Administrators run a filesystem-checker (like tripwire, aide and so on...) from a "master-node" to several "slave-nodes" using ssh, scp, sudo and few other common shell commands.. Platforms: *nix Syslog-sec, provides an open secure syslogd implementation based on (RFC) standards, including rfc3164 ("syslog") and the upcoming "syslog-sign" . Other extensions, will/can be added. More tools will be added, too Platforms: *nix Large RFC required to read? Lots of RFCs required to read? RFC Browser is the tool you need. RFC Browser is a viewer tailored to RFC browsing. It is the most powerful utility to view RFCs that renders RFCs into HyperRFCs: intra-RFC and inter-RFC hyperlinking, Colorful, Visual, Scalable. Hyper:... Platforms: Windows
{ "pile_set_name": "Pile-CC" }
Q: form submission not working? I had this simple form.. where I was taking an input from user like the following <form action="/data" autocomplete="on" method="POST"> <input id="search" name="search" type="text" placeholder="Search for song or artists.."> <input id="search_submit" value="Submit" type="submit"> </form> And everything was working fine.. Now.. I wanted to add slider to it and send the slider value to python. How do i do this? I modified the form to this: <form action="/data" autocomplete="on" method="POST"> <input id="search" name="search" type="text" placeholder="Search for song or artists.."> <input type="range" min="-1" max="1" value="0" step="0.05" onchange="showValue(this.value)" /><input id="search_submit" value="Submit" type="submit"> <span id="range" style="color:#BDBDBD">0</span> </form> But it is not working I get Bad Request The browser (or proxy) sent a request that this server could not understand. EDIT @app.route("/data", methods=['POST']) def entry_post(): query = request.form["search"] print request.form["range"] # I just added this line in the code A: You are missing the "name" attribute on the range input field.
{ "pile_set_name": "StackExchange" }
Q: Command Query Separation violation What do you think about if(!DoSomething()) return; In Clean Code this is viewed as violation of Command Query Separation. But how can we understand if something in command DoSomething() went wrong? What about sql command (ex: void Delete(Table))? How can we know if that table existed? Thanks. A: I agree with the comments from rObiwahn that you should check CanDoSomething before issuing a command of DoSomething. In a pure CQRS environment, DoSomething would not return anything and if anything prevented Something from happening (not due to an exception, but a race condition or something else changing between CanDoSomething and DoSomething), your domain would issue a DoSomethingWasInvalid event (or something like that) which would allow your application to eventually become consistent. It may sound complex, but it really becomes pretty simple once you start breaking down the logic into small chunks and allow your application to embrace eventual consistency. There are a lot of good resources on the DDD/CQRS group in google groups. A question like 'How do you tell the sender that a command failed?' is similar to your question a bit. People like Udi Dahan, Greg Young, Rinat Abdullin and others monitor that group and provide some really great answers. I'd recommend checking that out every now and then, too. Hope this helps!
{ "pile_set_name": "StackExchange" }
Q: Not allowing user exit the app using Home Button In my app i do not want the user be able to exit my app on pressing the Home press key. There's a specific reason for not allowing the user to do this. Can anyone suggest what can be the correct way to achieve this? At present what i am doing is Overriding the onKeyDown()-Method. The Code for it is as follows: @Override public boolean onKeyDown(int keyCode, KeyEvent event) { if (keyCode == KeyEvent.KEYCODE_BACK || keyCode == KeyEvent.KEYCODE_HOME) { Intent intent = new Intent(this, LockScreen.class); intent.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK); startActivity(intent); } return true; } In the Manifest file i am making changes as below: <activity android:name=".LockScreen" android:screenOrientation="portrait" android:theme="@android:style/Theme.NoTitleBar.Fullscreen"> <intent-filter> <category android:name="android.intent.category.HOME"/> </intent-filter> </activity> A: I agree with inazaruk but if you still want to do that then you need to override: @Override public void onAttachedToWindow() { this.getWindow().setType(WindowManager.LayoutParams.TYPE_KEYGUARD); super.onAttachedToWindow(); } A: Android doesn't support this scenario for simple apps, so you can't do this. Read this article by CommonsWare: Please ignore the Home Button. It will explain why handling Home button the way you want is not really a good idea.
{ "pile_set_name": "StackExchange" }
Pakistan: CPJ urges probe into journalist killings Washington, June 21, 2006—The Committee to Protect Journalists met with Pakistan’s new ambassador to the United States today to press for an investigation into the killing of Hayatullah Khan and other journalists. Ambassador Mahmud Ali Durrani said he would convey CPJ’s concerns to his government when he visits Islamabad at the end of the week. During the meeting, the delegation raised the abduction and killing of Khan and the general level of insecurity for journalists working in Pakistan. Khan was the eighth journalist to be killed in Pakistan since 2002. While key figures have been convicted of the January 2002 kidnapping and murder of U.S. reporter Daniel Pearl, the other murders remain unresolved. Khan’s body was found June 16 by villagers in the North Waziristan town of Mir Ali, from where he was abducted on December 5, 2005. Local government officials and family members told journalists that Khan had been shot in the back of the head, probably on June 15, and was in handcuffs. He appeared frail and had grown a long beard since he was last seen, family members told CPJ. Khan disappeared after reporting that an al-Qaeda commander had been killed by a U.S. missile, contradicting official Pakistani accounts of the death. To read more on Khan’s case click here: http://www.cpj.org/news/2006/asia/pak16june06na.html Khan, a photographer for international news agencies and a reporter for the Urdu-language daily Ausaf, had received numerous threats from Pakistani security forces, Taliban members, and local tribesmen because of his reporting. CPJ has documented numerous attacks on journalists in Pakistan who face threats from every quarter, including from the government. “We share the anger and frustration Pakistani journalists have expressed in the days following Hayatullah’s death,” Simon said. “We are glad that the ambassador has promised a vigorous investigation, but given the government’s performance and apparent attitude before Hayatullah’s death, we urge our Pakistani colleagues to continue to press for a full investigation into Hayatullah’s abduction and slaying,” Simon added.
{ "pile_set_name": "Pile-CC" }
It is always essential that you make a choice of a design for the valencia cocktail tables. For those who do not completely need to have a targeted style, this helps you choose what exactly coffee tables to obtain also how sorts of color choices and models to choose. In addition there are suggestions by looking for on webpages, checking furnishing catalogues, coming to various furniture marketplace then taking note of examples that you would like. Select a comfortable place and then arrange the coffee tables in a spot which is harmonious measurements to the valencia cocktail tables, that is related to the it's purpose. For example, in case you want a big coffee tables to be the attraction of a room, then you definitely should keep it in a place which is visible from the interior's access spots also be careful not to overflow the piece with the house's style. Additionally, it would be wise to grouping things consistent with themes and also pattern. Change valencia cocktail tables if needed, up until you think that they are simply nice to the attention feeling that they are just appropriate logically, according to their characteristics. Decide on a room that currently is ideal in size and angle to coffee tables you will need to set. Depending on whether the valencia cocktail tables is an individual item, various pieces, a focal point or emphasizing of the place's other functions, it is important that you put it in a way that gets in step with the room's proportions and also layout. Starting from the valued effect, you really should preserve associated color choices collected with each other, or maybe you may like to scatter patterns in a weird style. Spend valuable focus on the way in which valencia cocktail tables get along with each other. Wide coffee tables, most important things should really be matched with much smaller or even less important things. Also, don’t get worried to use a mixture of color choice and even design. Even when the individual item of improperly vibrant furniture items probably will seem different, you may see ways of tie your furniture mutually to create them easily fit to the valencia cocktail tables perfectly. Even though playing with color and pattern is certainly allowed, please ensure that you do not make an area without impressive color theme, because it can make the room look and feel disjointed also disorganized. Show your current needs with valencia cocktail tables, choose depending on whether you possibly can enjoy your style a long time from now. In case you are on a budget, take into consideration making use of everything you currently have, take a look at all your coffee tables, and find out if you can still re-purpose them to go together your new appearance. Redecorating with coffee tables is an effective way for you to furnish home a special style. Combined with unique designs, it will help to find out some ideas on enhancing with valencia cocktail tables. Always be true to all of your preference when you start to think about new design, furniture, and also accessory alternatives and then enhance to make your home a comfortable and also attractive one. There are many spots you can place the coffee tables, so think with reference to placement areas also set objects on the basis of dimensions, color selection, object and concept. The measurements, design, character and also quantity of objects in your room will possibly determine the way they will be organised and to have appearance of which way they get along with others in dimensions, variation, area, themes and also color. Consider the valencia cocktail tables because it provides a portion of vibrancy to your living area. Your selection of coffee tables always reflects your own behavior, your tastes, your personal motives, little question also that more than just the decision concerning coffee tables, and as well its right installation requires a lot of care and attention. Making use of some tips, there are actually valencia cocktail tables that matches most of your preferences and also purposes. Make sure that you evaluate your available spot, draw inspiration from your home, so identify the products you’d prefer for your suitable coffee tables.
{ "pile_set_name": "Pile-CC" }
Management of the traumatized liver: an appraisal of 63 cases. A review of all patients with liver trauma admitted to the Royal Adelaide Hospital during the period 1983-86 was undertaken. Twelve of the 63 patients died. Liver trauma was responsible in eight (giving a mortality rate of 12.7%). The overall mortality rate was 19.0%. Most of the liver injuries (83%) were due to blunt trauma. All the deaths occurred in this group and were related directly or indirectly to blood loss. A high mortality (83%) was associated with hepatic vein injury. Right hepatectomy was unsuccessful in preventing death in any of these patients. The management of major venous injuries is discussed. A significant number of the liver injuries was minor. Analysis of these suggests that a more conservative approach to the management of haemodynamically stable patients might be appropriate.
{ "pile_set_name": "PubMed Abstracts" }
Comparison of V[Combining Dot Above]O2peak Performance on a Motorized vs. a Nonmotorized Treadmill. Morgan, AL, Laurent, CM, and Fullenkamp, AM. Comparison of V[Combining Dot Above]O2peak performance on a motorized vs. a nonmotorized treadmill. J Strength Cond Res 30(7): 1898-1905, 2016-Despite growing popularity of nonmotorized treadmills (NMTs), little data exist regarding responses during exercise testing using this equipment, which is important when providing an appropriate exercise prescription. The purpose of this study was to evaluate physiological and perceptual responses during peak graded exercise tests (GXTs) on a motorized treadmill (MT) vs. NMT. Volunteers (12 men and 12 women aged 18-35 years) performed 2 peak GXT sessions (1 MT and 1 NMT). Respiratory gases and heart rate (HR) were collected each minute; perceptual response was estimated (Borg's 6-20 rating of perceived exertion [RPE] scale) during the final 10 seconds of each stage. Peak values (i.e., V[Combining Dot Above]O2, HR, speed) were determined during the final 10 seconds of each test; ventilatory threshold (VT) was assessed using the V-slope method. Paired t-tests matching variables measured at each stage of the GXT identified significantly higher values on the NMT for V[Combining Dot Above]O2 83% of the time, HR 67% of the time, and RPE 25% of the time. Interestingly though, neither peak V[Combining Dot Above]O2 (48.6 ± 9.2 ml·kg·min vs. 47.8 ± 8.9 ml·kg·min), peak HR (185 ± 9 b·min vs. 188 ± 10 b·min; p = 0.90), nor VT (72.7 ± 5.7% vs. 73.8 ± 5.4%) were significantly different on the NMT vs. the MT. However, significant differences were identified between NMT and MT tests for time to exhaustion (9:55 ± 1:49 vs. 12:05 ± 2:48; p < 0.01) and peak speed (8.0 ± 0.9 mph vs. 9.2 ± 1.4 mph; p < 0.01). Thus, although peak values obtained were similar between testing sessions on the NMT and MT, the majority of submaximal data were significantly different between trials. These differences are important when designing exercise prescriptions using submaximal values from NMT testing that may be inappropriately high or low at corresponding intensities during training.
{ "pile_set_name": "PubMed Abstracts" }
// // TWTRAPIClient.h // // Copyright (c) 2015 Twitter. All rights reserved. // #import "TWTRDefines.h" NS_ASSUME_NONNULL_BEGIN FOUNDATION_EXPORT NSString * const TWTRTweetsNotLoadedKey; @class TWTRUser; @class TWTRTweet; @class TWTRAuthConfig; @class TWTRGuestSession; @protocol TWTRAuthSession; /** * @name Completion Block Types */ /** * Completion block called when the load user request succeeds or fails. * * @param user The Twitter User. * @param error Error that will be set if the API request failed. */ typedef void (^TWTRLoadUserCompletion)(TWTRUser * __twtr_nullable user, NSError * __twtr_nullable error); /** * Completion block called when the load Tweet request succeeds or fails. * * @param tweet The Twitter Tweet. * @param error Error that will be set if the API request failed. */ typedef void (^TWTRLoadTweetCompletion)(TWTRTweet * __twtr_nullable tweet, NSError * __twtr_nullable error); /** * Completion block called when the load Tweets request succeeds or fails. * * @param tweets Tweets that were successfully retrieved. * @param error Error that will be set if the API request failed. */ typedef void (^TWTRLoadTweetsCompletion)(NSArray * __twtr_nullable tweets, NSError * __twtr_nullable error); /** * Completion block called when the network request succeeds or fails. * * @param response Metadata associated with the response to a URL load request. * @param data Content data of the response. * @param connectionError Error object describing the network error that occurred. */ typedef void (^TWTRNetworkCompletion)(NSURLResponse * __twtr_nullable response, NSData * __twtr_nullable data, NSError * __twtr_nullable connectionError); /** * Completion block called when a JSON request to the Twitter API succeeds or fails. * * @param response Metadata associated with the response to a URL load request. * @param responseObject Content data of the response. * @param error Error object describing the network error that occurred. */ typedef void (^TWTRJSONRequestCompletion)(NSURLResponse * __twtr_nullable response, id __twtr_nullable responseObject, NSError * __twtr_nullable error); /** * Client for consuming the Twitter REST API. Provides methods for common API requests, as well as the ability to create and send custom requests. */ @interface TWTRAPIClient : NSObject /** * @name Initialization */ - (instancetype)init __attribute__((unavailable(("Use one of the other `-init...` methods that allow you to provide signing parameters")))); /** * This method is deprecated since TwitterKit v1.4.0. To get an API client, use the one provided by the `Twitter` class. */ - (instancetype)initWithConsumerKey:(NSString *)consumerKey consumerSecret:(NSString *)consumerSecret __attribute__((deprecated)); /** * @name Making Requests */ /** * Returns a signed URL request. * * @param method Request method, GET, POST, PUT, DELETE, etc. * @param URL Request URL. This is the full Twitter API URL. E.g. https://api.twitter.com/1.1/statuses/user_timeline.json * @param parameters Request parameters. * @param error Error that will be set if there was an error signing the request. */ - (NSURLRequest *)URLRequestWithMethod:(NSString *)method URL:(NSString *)URLString parameters:(NSDictionary *)parameters error:(NSError **)error; /** * Sends a Twitter request. * * @param request The request that will be sent asynchronously. * @param completion Completion block to be called on response. Called on main queue. */ - (void)sendTwitterRequest:(NSURLRequest *)request completion:(TWTRNetworkCompletion)completion; /** * @name Common API Actions */ /** * Loads a Twitter User. * * @param userIDString The Twitter user ID of the desired user. * @param completion Completion block to be called on response. Called on main queue. */ - (void)loadUserWithID:(NSString *)userIDString completion:(TWTRLoadUserCompletion)completion; /** * Loads a single Tweet from the network or cache. * * @param tweetIDString The ID of the desired Tweet. * @param completion Completion bock to be called on response. Called on main queue. */ - (void)loadTweetWithID:(NSString *)tweetIDString completion:(TWTRLoadTweetCompletion)completion; /** * Loads a series of Tweets in a batch. The completion block will be passed an array of zero or more * Tweets that loaded successfully. If some Tweets fail to load the array will contain less Tweets than * number of requested IDs. If any Tweets fail to load, the IDs of the Tweets that did not load will * be provided in the userInfo dictionary property of the error parameter under `TWTRTweetsNotLoadedKey`. * * @param tweetIDStrings An array of Tweet IDs. * @param completion Completion block to be called on response. Called on main queue. */ - (void)loadTweetsWithIDs:(NSArray *)tweetIDStrings completion:(TWTRLoadTweetsCompletion)completion; @end NS_ASSUME_NONNULL_END
{ "pile_set_name": "Github" }
Peptides of aminoxy acids as foldamers. This Feature Article summarizes our efforts in developing a new family of foldamers from alpha-, beta- and gamma-aminoxy acids. From a series of conformational studies, we demonstrate that peptides consisting of aminoxy acids adopt several well-defined secondary structures, such as alpha N-O turns (which feature an eight-membered-ring hydrogen bond), beta N-O turns (a nine-membered-ring hydrogen bond), gamma N-O turns (a ten-membered-ring hydrogen bond), 1.8(8) helices (consecutive homochiral alpha N-O turns), 7/8 helices (alternating alpha N-O turns and gamma-turns), 1.7(9) helices (consecutive beta N-O turns), reverse turns (consecutive heterochiral alpha N-O turns) and sheet-like structures.
{ "pile_set_name": "PubMed Abstracts" }
Facial Performance Transfer via Deformable Models and Parametric Correspondence. The issue of transferring facial performance from one person's face to another's has been an area of interest for the movie industry and the computer graphics community for quite some time. In recent years, deformable face models, such as the Active Appearance Model (AAM), have made it possible to track and synthesize faces in real time. Not surprisingly, deformable face model-based approaches for facial performance transfer have gained tremendous interest in the computer vision and graphics community. In this paper, we focus on the problem of real-time facial performance transfer using the AAM framework. We propose a novel approach of learning the mapping between the parameters of two completely independent AAMs, using them to facilitate the facial performance transfer in a more realistic manner than previous approaches. The main advantage of modeling this parametric correspondence is that it allows a "meaningful" transfer of both the nonrigid shape and texture across faces irrespective of the speakers' gender, shape, and size of the faces, and illumination conditions. We explore linear and nonlinear methods for modeling the parametric correspondence between the AAMs and show that the sparse linear regression method performs the best. Moreover, we show the utility of the proposed framework for a cross-language facial performance transfer that is an area of interest for the movie dubbing industry.
{ "pile_set_name": "PubMed Abstracts" }
A large number of investors are now trading in the securities markets. According to Business Week™, there are currently about 100 million individual investors in the United States alone. These individuals invest in the securities markets either on their own as individual traders or through a variety of brokers. According to The Tower Group™, there are currently about 675,000 registered brokers in the United States alone. These brokers work at about 5,500 different firms which staff almost 90,000 branch offices throughout the United States. An enormous amount of financial information is now available to professional and individual investors, and the volume and availability of this information is growing at an explosive rate. By way of example, note the recent explosion of online financial information. Price quotes for almost any financial instrument (e.g., stocks, bonds, etc.) are now readily available from a wide variety of online sites. Furthermore, Morningstar™ now offers its mutual fund ratings online, and Yahoo™ allows an investor to review SEC filings, look at analysts' stock recommendations, and learn how other markets around the world are performing. At the same time, traditional print publications such as The Wall Street Journal™ and The Financial Times™ are making more and more financial information available to the reader, and traditional broadcast media such as television and cable television are now providing 24-hour business programming. The widespread availability of this enormous volume of often conflicting and confusing information often inhibits the ability of investors to comprehend and utilize the information efficiently. As a result, their confidence in what that information means frequently decreases almost in proportion to the rate at which the quantity of information grows. The sheer quantity of data obscures the correlation and interdependencies inherent in that data. For individual investors, the volume of data can be daunting. Even experienced traders, looking at dynamically changing assortments of numbers, tables, charts and graphs, are sometimes overwhelmed. This often leads to increased stress, eye fatigue and frustration. Under these conditions, even seasoned professionals sometimes fail to make critical decisions well and frequently resort to the oldest—and possibly the most unreliable—criteria of all, the “gut instinct”. Thus there is a significant need for a more effective tool for mining the wealth of financial data currently available, extracting significant information therefrom, and presenting the same to the investor in a visually compelling manner.
{ "pile_set_name": "USPTO Backgrounds" }
The AMI I 200 is the pride and joy of its manufacturers – the Automatic Musical Instrument Company. Sporting over 200 music selections, the AMI has been fully restored by Games Room Company engineers, with all the classic features intact. A spectacular analogue sound system produces a deeper, richer ‘vinyl to valve’ sound. The jukebox shows its ’50s roots with an iconic automobile screen and a lit pierced chrome bumper. Triangular patterned motifs liberally decorate the cabinet, which is finished with sparkling, finely illuminated ‘jewels’ for a bit of fifties chic. The AMI is a souvenir hailing from the Golden Age of Jukeboxes; a highly collectable and truly ageless product, available in finishes of spearmint green, and pink and black. We also provide a record sourcing and title strip service to owners of 100 Selection Vinyl jukeboxes, and this breaks down into 3 separate stages dependent upon how much assistance you need. Stage 1 - Title strip service. Whilst much of the character of your jukebox can be attributed to its unique sound and vintage styling, we have always considered it important to maintain the retro vibe by fitting authentically presented music title strips in the machine’s window. After all, these will be the immediate focus of attention for anyone making their selections. To this end, we offer a title strip service whereby all 200 track names and artists are typed out and trimmed to size. (A jukebox which holds 100 records effectively offers 200 selections, including the A and B sides, and each strip displays both tracks) We use a 'typewriter-style' font appropriate to the period and the strips themselves incorporate retro-styled borders. If the jukebox has been purchased from The Games Room Company the strips will also be inserted in the display panels. Stage 2 - Title strips and music sourcing At this level we undertake the service described above, whilst also sourcing and buying 100 records in the requested genre. Please note that this does not include the sourcing of any specific tracks. Stage 3 - Sourcing records to order If you’re looking for specific music we can generally get hold of most tracks, and these will be the original 45’s. This is charged on a per record basis, and sadly we are not able to guarantee the quality of the B side. The A side, i.e. your requested track, will however be scratch free and of sound quality. The cost of these services in set out in the menus on the right. The Games Room Company is one of the oldest jukebox dealers in the country. Our founder, Reginald Waldersmith, first learned about jukeboxes in the early 1950s when we were servicing jukeboxes on American Air Force bases. We’ve been selling jukeboxes since 1962, so know a thing or two about our products! Our showroom will gladly assist you on any questions you may have before or after you purchase any Games Room Company equipment. COOKIE POLICY: WE USE COOKIES ON THIS WEBSITE. IF YOU CONTINUE TO USE THIS WEBSITE YOU WILL BE AGREEING TO THE WEBSITE GENERAL TERMS AND CONDITIONS OF USE, PRIVACY POLICY AND THE USE OF COOKIES WHILE USING THE WEBSITE. TO FIND OUT MORE ABOUT COOKIES AND HOW TO CHANGE YOUR PREFERENCES PLEASE SEE OUR COOKIE POLICY
{ "pile_set_name": "Pile-CC" }
John Ross (American patriot) John Ross (Tain, Ross, Scotland, 29 January 1726March 1800, Philadelphia, Pennsylvania) was a merchant during the American Revolution. He early relocated to Perth, Scotland, and entered into mercantile pursuits, but in 1763 he came to Philadelphia, where he became a shipping merchant. At the beginning of the conflicts with the mother country, he espoused the cause of the colonies, and was a signer of the non-importation agreement of the citizens of Philadelphia in 1765. He presided at the meeting of the mechanics and tradesmen of the city held on June 9, 1774, to consider a letter from the artificers of New York, and was a member of the committee to reply to the same. On September 16, 1775, he was appointed muster-master of the Pennsylvania navy, which office he resigned, February 23, 1776, to concentrate on his commercial affairs. In May 1776, he was employed by the committee of commerce of Congress to purchase clothes, arms, and powder for the army. This necessitated the establishment of agencies in Nantes and Paris, and Ross made several visits to France during the war. In this duty he advanced or pledged his credit for £20,000 more than was authorized by Congress, much to his later embarrassment and subsequent loss. He was on familiar terms with George Washington, Benjamin Franklin, and Robert Morris, and several entries in General Washington's diary, during the sittings of the convention to frame the United States Constitution, tell of engagements to dine with Mr. Ross at his country place, Grange Farm or the Grange, named after the home of Lafayette. This farm was located on the old Haverford Road near Frankford in Delaware County, Pennsylvania. He bought the property, formerly called Clifton Hall, from his father-in-law, Capt. Charles Cruikshank, in 1783 and renamed it in honor of Lafayette's home in France. Note: Not to be confused with the John Ross (d. 1776) who was Betsy Ross's first husband. External links Ross's letters to William Temple Franklin Letters to Ross from Benjamin Franklin Link to Geo. Wash. diaries Category:1726 births Category:1800 deaths Category:People of Pennsylvania in the American Revolution Category:People from Ross and Cromarty Category:Patriots in the American Revolution Category:Colonial American merchants Category:People of colonial Pennsylvania Category:Kingdom of England emigrants to the Thirteen Colonies
{ "pile_set_name": "Wikipedia (en)" }
Barack Obama’s great strength was always his ability to shape himself into a vessel for the hopes of a wide array of different people. For Nancy Pelosi, it’s been the reverse, as she manages to become a symbol of the varying fears of the opposing factions of the Democratic Party. For the party’s left, she’s too tied to big money and the corporate PAC model of fundraising, and embraces a “paygo” politics of austerity. For the party’s right, she’s a spend-happy, San Francisco liberal whose presence at the top puts the new majority at risk. The legend of Pelosi has it that after raising her five children, this stay-at-home-mom decided to throw herself into politics and thus was born the first woman speaker of the House in U.S. history. The impressive feat of child-rearing is accurate, but the rest leaves a lot out. And onto that blank page, foes have been all too happy to write their own stories of Pelosi. Pelosi’s confounding image is built on her unique political foundation. It’s true that she did not enter elected public office, in 1987, until she had finished raising her five children. But she was by no means new to politics. Democratic Rep. Phil Burton, upon seeing the San Francisco mansion she shared with her husband, investor Paul Pelosi, noted that it would make a tremendous location for political fundraisers. Pelosi, it turned out, had a gift for just that, and her fundraising prowess would eventually turn her into a power center in California politics in her own right. In 1976, more than a decade before entering Congress, she was elected as a member of the Democratic National Committee. Over the next five years, she would become chair of the northern California Democratic Party and then the statewide Democratic Party. In 1985, she lost a bid for DNC chair. Burton, who served in Congress for 19 years, was a transformative political figure both in California and in the education of Pelosi. Labor reporter Harold Meyerson once called him “the single most important member of the House of Representatives in the ’60s and ’70s.” Pelosi is often lauded for her uncanny ability to count votes, something that was also said repeatedly of Burton. He was a role model for Pelosi, someone who was enthusiastic about fundraising and took politics seriously, rather than a purist who stood aloof from what many on the left saw as a corrupt endeavor. “I’m a fighting liberal,” Burton would famously say. His biographer, John Jacobs, agreed: “A ruthless and unabashed progressive, Burton terrified his opponents, ran over his friends, forged improbable coalitions, and from 1964 to 1983 became one of the most influential Representatives in the House. He also acquired more raw power than almost any left-liberal politician ever had.” Fighting meant getting your hands dirty. Burton pioneered gerrymandering in California (“My contribution to modern art,” he called it; he even drew a district so that his brother John could have a House seat, too) and began what is now a common practice of spreading PAC money around to colleagues in tough races in order to build power within the caucus. He helped shape the House floor process so that lobbyists would have more ability to tweak individual pieces of legislation, uncorking contributions from K Street and helping to create the Washington ecosystem we know today. Burton encouraged Pelosi to run in one of the new districts he had drawn, but she demurred. First elected in 1964, he took on the power of the Southern bulls, who had used seniority and one-party rule in the South to lock down control of key committee chairpersonships. The sooner the party could crush its Dixiecrat wing, he argued, the better. Burton organized his liberal colleagues and reformed the process for selecting chairs, replacing it with a secret vote, which was the beginning of the end of Southern dominance of the House Democratic caucus. In 1976, he fell one vote short in a bid for majority leader. In Pelosi, Burton had a ready student. If your knowledge of Pelosi comes from Republican attack ads, you know her as a “San Francisco liberal” or even “radical,” but she was raised in Maryland by her father Thomas D’Alesandro Jr., the boss of the Baltimore political machine, who was by turns a congressman and mayor of Charm City. D’Alesandro’s operation, like most big-city machines of the era, was linked in public to local Mafia figures, according to his FBI file. Burton rightly saw in Pelosi that rarest of breeds, a liberal born to fight. In Burton, Pelosi found someone who knew how to make progressive change actually happen. His list of legislative achievements was long — Supplemental Security Income, a higher minimum wage, compensation for black lung, food stamps for striking workers, the abolition of the House Un-American Affairs Committee — despite or, in part, because of his legendary ruthlessness and rage. John Burton, Phil’s brother and himself a former congressman, said that Phil never quite mentored Pelosi. “I mean, Christ, this is a woman who was brought up in Baltimore politics. He wasn’t working with some neophyte that all of a sudden he had to explain, ‘Well, here’s how it works.’ They got along because even though she was an ‘amateur’ at that time, she was still a pro,’” Burton told the author Vincent Bzdek for the book “Woman of the House.” He acknowledged, though, that Phil helped “hone her skills.” Pelosi said that her Baltimore education made Burton easy to handle. “Actually, my family really prepared me for Phil Burton. One of the reasons I got along with Phil is because I wasn’t afraid of him. I knew a lot of people like him,” she told Bzdek. In April 1983, at the age of 56, he died of a heart attack; his wife Sala Burton won the special election to replace him. But four years later, she lay dying herself and made a parting death bed endorsement: “Nancy.” The nod helped, and Pelosi won the special election in 1987 to represent the Burtons’s San Francisco district. She ran on the prophetic and on-brand slogan “a voice that will be heard,” and brought with her the conviction that effective fundraising was the key to building power and that without power, she couldn’t enact her agenda. By 2002, she’d become the first progressive in a generation elected to leadership, serving as minority whip. When Democratic leader Dick Gephardt stepped down, she became minority leader, using the position to rally her caucus against the war in Iraq. Pelosi, who’d become the first female speaker of the House after the Democrats took the House majority back in 2006, got the opportunity to go big and fulfill a centurylong liberal dream, after Obama’s 2008 election. But it almost all fell apart. On March 23, 2010, President Barack Obama signs the health care bill in the East Room of the White House in Washington, D.C. Photo: J. Scott Applewhite/AP The train wreck that nearly derailed the Affordable Care Act in 2009 and 2010 was visible from miles away. Michael Capuano, a congressman from eastern Massachusetts, saw it coming. When Massachusetts Sen. Ted Kennedy died in August 2009 of brain cancer, his passing created a vacancy that was filled by Paul Kirk, a longtime Kennedy aide appointed as a placeholder while a special election was organized. (Coincidentally, it was Kirk who had beaten Pelosi in the ’85 DNC chair race.) On December 24, 2009, Kirk cast the 60th vote to break a filibuster and pass the Senate version of the Affordable Care Act, a slightly more corporate-friendly plan than the one that had passed the House on November 7. That bill, shepherded through by Pelosi, included a public health insurance option to compete with private plans in the marketplaces that would be created by Obamacare. It was not the more robust version of the public option that the Congressional Progressive Caucus had pushed for, but the bill was broadly considered more aggressive, and the two chambers planned to hash out their differences in a conference committee. Two weeks earlier, Democrats had held a Senate primary contest, pitting Capuano against Attorney General Martha Coakley. Former President Bill Clinton, EMILY’s List, and other party leaders got behind Coakley. The only statewide official in the race, she easily dispatched of Capuano in the December primary. “They said that women don’t have much luck in Massachusetts politics,” she declared at her party that night. “And we believed that it was quite possible that that luck was about to change.” Assured of victory in the coming January general election, she tried that luck and departed for a two-week vacation in the Caribbean. Yet Capuano returned to Washington shaken by what he’d seen on the campaign trail. He was invited to brief a private gathering of House Democrats in the basement of the Capitol. He leaned into a standing microphone, looked around the room at his colleagues, and, according to one of the lawmakers present, delivered a two-word speech: “You’re screwed.” As the gathered House Democrats gradually realized they had heard the extent of his speech, the silence was punctuated only by soft, nervous laughter. Later, Capuano elaborated on the theme: Everywhere he went in Massachusetts, he said, he met people who were absolutely livid at the anemic approach to job creation in the wake of the crisis. That rage, he warned, was going to be turned against Democrats at the polls if they didn’t deliver. Coakley, still on the beach, saw it too late. In January 2010, Scott Brown, the butt of jokes for his nude Cosmo centerfold, delivered a stunning upset, depriving Democrats of their 60-vote supermajority. That meant that any bill that would emerge from conference committee would need at least one Republican to support it, or Democrats would have to nuke the filibuster. Neither possibility appeared likely, and the fate of bill was suddenly in doubt. Democrats, including Pelosi ally Rep. Barney Frank of Massachusetts, began writing its obituary. Offered Frank: I feel strongly that the Democratic majority in congress must respect the process and make no effort to bypass the electoral results. If Martha Coakley had won, I believe we could have worked out a reasonable compromise between the House and Senate health care bills. But since Scott Brown has won and the Republicans now have 41 votes in the senate, that approach is no longer appropriate. I am hopeful that some Republican senators will be willing to discuss a revised version of health care reform. Because I do not think that the country would be well served by the health care status quo. But our respect for democratic procedures must rule out any effort to pass a health care bill as if the Massachusetts election had not happened. Going forward, I hope there will be a serious effort to change the senate rule which means that 59 are not enough to pass major legislation, but those are the rules by which the health care bill was considered, and it would be wrong to change them in the middle of this process. “If [Coakley] loses, it’s over,” said Rep. Carolyn Maloney, D-N.Y., before the votes were tallied. Senate Majority Leader Harry Reid, D-Nev., facing his own re-election, was inclined to back burner the ACA, with New York Sen. Charles Schumer, the No. 3 Democrat in the Senate, urging him to move to a jobs bill. But even on election night, there was at least one politician who wasn’t giving up. “We don’t say a state that already has health care should determine whether the rest of the country should,” Pelosi said. “We will get the job done. I’m very confident. I’ve always been confident.” The reaction from White House chief of staff Rahm Emanuel had been the opposite, and he began pushing to back off the ACA and instead do piecemeal reform focused largely on expanding care for children. The White House, Obama included, began sending mixed signals about whether it wanted to go big or small, with Obama endorsing a plan that included “the core elements” of reform. “I would advise that we try to move quickly to coalesce around those elements of the package that people agree on,” Obama said in one interview. Pelosi, in a conference call later that month with House leadership, dubbed Emanuel an “incrementalist” and mocked the small-ball idea as “kiddie care.” The House would be going big, she said. To do it, the lower chamber would pass the version of the ACA that had already moved through the Senate. And the Senate would use the reconciliation process, which requires just 50 votes but is only available for legislation that impacts the budget, in order to make some changes to the original bill. “I was a mid-level staffer on the Hill during the original ACA fight. I vividly remember the feeling on Capitol Hill the week after Scott Brown won — suddenly the wheels were coming off. People were talking about scuttling a major bill and doing something piecemeal,” recalled Ezra Levin, who would later become a co-founder of Indivisible, a progressive political organization. He said that he and his eventual co-founder Leah Greenberg, also a Hill staffer at the time, drafted an op-ed they never published, since Pelosi’s push made the issue moot. The unpublished piece argued that “abandoning the ACA would turn off millennial idealists like us from the possibilities of politics. Why work in government, policy, and politics if the result of a generational win like 2008 resulted in barely anything at all? But Pelosi saved it. She demonstrated serious leadership at a time of real uncertainty. It was, corny as it sounds, inspirational. And tens of millions of Americans got health insurance as a result of that leadership in that moment.” The Affordable Care Act, even the House-passed version, was a flawed piece of legislation, for a host of reasons, some that can be laid at Pelosi’s feet and some that can’t. But as an act of legislative prowess, her revival of it remains a signature accomplishment. Just ahead of the final vote, Pelosi sat down with progressive reporters and bloggers for a last pre-passage interview. She relished her victory over Emanuel and the incrementalists. “My biggest fight was against those who want to do something incremental versus those who want to do something comprehensive. We have won that,” she said proudly. “In our midst, there’s the small-bill crowd — here,” she said, referring to the Capitol, then added, gesturing out the window behind her, where Pennsylvania Avenue stretched to the White House, “and there.” Was the ACA perfect? Obviously not. But blame Joe Lieberman & the other D Senators who watered it down for that. Pelosi fought for the progressive version of the bill and rallied her caucus to get it across the finish line. Quite simply, it would not have happened without her. — Leah Greenberg (@Leahgreenb) November 19, 2018
{ "pile_set_name": "OpenWebText2" }
"""An observation wrapper that augments observations by pixel values.""" import collections import copy import numpy as np from gym import spaces from gym import ObservationWrapper STATE_KEY = 'state' class PixelObservationWrapper(ObservationWrapper): """Augment observations by pixel values.""" def __init__(self, env, pixels_only=True, render_kwargs=None, pixel_keys=('pixels', )): """Initializes a new pixel Wrapper. Args: env: The environment to wrap. pixels_only: If `True` (default), the original observation returned by the wrapped environment will be discarded, and a dictionary observation will only include pixels. If `False`, the observation dictionary will contain both the original observations and the pixel observations. render_kwargs: Optional `dict` containing keyword arguments passed to the `self.render` method. pixel_keys: Optional custom string specifying the pixel observation's key in the `OrderedDict` of observations. Defaults to 'pixels'. Raises: ValueError: If `env`'s observation spec is not compatible with the wrapper. Supported formats are a single array, or a dict of arrays. ValueError: If `env`'s observation already contains any of the specified `pixel_keys`. """ super(PixelObservationWrapper, self).__init__(env) if render_kwargs is None: render_kwargs = {} for key in pixel_keys: render_kwargs.setdefault(key, {}) render_mode = render_kwargs[key].pop('mode', 'rgb_array') assert render_mode == 'rgb_array', render_mode render_kwargs[key]['mode'] = 'rgb_array' wrapped_observation_space = env.observation_space if isinstance(wrapped_observation_space, spaces.Box): self._observation_is_dict = False invalid_keys = set([STATE_KEY]) elif isinstance(wrapped_observation_space, (spaces.Dict, collections.MutableMapping)): self._observation_is_dict = True invalid_keys = set(wrapped_observation_space.spaces.keys()) else: raise ValueError("Unsupported observation space structure.") if not pixels_only: # Make sure that now keys in the `pixel_keys` overlap with # `observation_keys` overlapping_keys = set(pixel_keys) & set(invalid_keys) if overlapping_keys: raise ValueError("Duplicate or reserved pixel keys {!r}." .format(overlapping_keys)) if pixels_only: self.observation_space = spaces.Dict() elif self._observation_is_dict: self.observation_space = copy.deepcopy(wrapped_observation_space) else: self.observation_space = spaces.Dict() self.observation_space.spaces[STATE_KEY] = wrapped_observation_space # Extend observation space with pixels. pixels_spaces = {} for pixel_key in pixel_keys: pixels = self.env.render(**render_kwargs[pixel_key]) if np.issubdtype(pixels.dtype, np.integer): low, high = (0, 255) elif np.issubdtype(pixels.dtype, np.float): low, high = (-float('inf'), float('inf')) else: raise TypeError(pixels.dtype) pixels_space = spaces.Box( shape=pixels.shape, low=low, high=high, dtype=pixels.dtype) pixels_spaces[pixel_key] = pixels_space self.observation_space.spaces.update(pixels_spaces) self._env = env self._pixels_only = pixels_only self._render_kwargs = render_kwargs self._pixel_keys = pixel_keys def observation(self, observation): pixel_observation = self._add_pixel_observation(observation) return pixel_observation def _add_pixel_observation(self, wrapped_observation): if self._pixels_only: observation = collections.OrderedDict() elif self._observation_is_dict: observation = type(wrapped_observation)(wrapped_observation) else: observation = collections.OrderedDict() observation[STATE_KEY] = wrapped_observation pixel_observations = { pixel_key: self.env.render(**self._render_kwargs[pixel_key]) for pixel_key in self._pixel_keys } observation.update(pixel_observations) return observation
{ "pile_set_name": "Github" }
Solo Is Disaster - Deadpool 2 Down- Infinity Continues Solo - A Star Wars Story is a disaster in India with collections of just 35-40 lakhs nett. The Star Wars brand has little value in India as none of the Star Wars films have ever done well in India and that goes for the original Star Wars film of the 70's which is one of the biggest blockbusters ever in Hollywood but was a washout in India. Deadpool 2 has dropped in the second week with second Friday collections being around 85% down from the first Friday. The english version has some some collections which has helped to collect in the 1.25-1.50 crore nett range. If it was as bad as Hindi and regional then the film would not even had 1 crore nett. The collections of Deadpool 2 till date are as follows. First Week - 41,00,00,000 Friday - 1,35,00,000 TOTAL - 42,35,00,000 Avengers - Infinity War is still continuing to run in its fifth week and will hit 225 crore nett at the end of its fifth weekend. The collections of Avengers - Infinity War till date is as follows Week One - 1,56,52,00,000 Week Two - 46,93,00,000 Week Three - 15,88,00,000 Week Four - 4,75,00,000 apprx Friday - 20,00,000 apprx TOTAL - 2,24,28,00,000 apprx
{ "pile_set_name": "OpenWebText2" }
Chevrolet Engineering Research Vehicle The Chevrolet Engineering Research Vehicle (CERV) is a series of Chevrolet experimental cars. Chevrolet Staff engineer, designer, and race car driver Zora Arkus-Duntov started development of the CERV I in 1959, and began work on the CERV II in 1963. Chevrolet chief engineer Don Runkle and Lotus' Tony Rudd discussed creating a new show car to demonstrate their engineering expertise in 1985; It would become the CERV III. Corvette chief engineer Dave Hill unveiled the CERV IV in 1993, a test vehicle for the 1997 C5 Corvette. CERV I Zora Arkus-Duntov, Chevrolet staff engineer, designer, and race car driver, started development of the "CERV I" (Chevrolet Experimental Racing Vehicle) in 1959, which was unveiled to the public at the Riverside International Raceway November 1960, under the name "CERV I" (Chevrolet Experimental Research Vehicle). Overview CERV-I (Chevrolet Engineering Research Vehicle) was developed as a research tool for that company's continuous efforts to understand automotive ride and handling phenomena under the most realistic conditions. The car was built at the Chevrolet Engineering Center at Warren, Michigan. The primary function of the "CERV-1", was to provide Chevrolet engineers with a test platform from which direct visual studies were made from all types of ride and handling behavior under amplified conditions. The stated function of the "CERV-1" largely determines its concept and final configuration. In order to realistically amplify vehicle responses to handling and road stimuli, the performance capability of the vehicle must be extended far beyond that of regular passenger cars. In other words, a high power-to-weight ratio is mandatory. By such means, suspension phenomena that are extremely subtle, and thus difficult to isolate within the performance capabilities of a regular passenger car, may be studied and treated quantitatively with the "CERV-1". Another fundamental factor in the experimental car's design is the visibility afforded by the body design. The streamlined, abbreviated body encloses the engine, transaxle, engine cooling system, and provide an open cockpit for the driver, from which all four wheels, in contact with the ground, are clearly visible. Some broad features of the "CERV-I" are: extremely light weight to afford a horsepower-to-weight ratio such as that usually associated with high performance aircraft; rear mounted engine in unit with a fully synchronized four-speed transaxle; the only passenger, the driver, sits well forward on the centerline of the car for virtually optimum visibility, and all four wheels are independently suspended to provide a high order of stability and positive handling. The wheelbase is and the car weighs approximately 1600 pounds (726 kg), ready to run. The chassis is an extremely stiff frame of chrome-molybdenum steel tubes welded into a truss-like structure weighing approximately 125 pounds (57 kg). The lightweight body (approximately 80 pounds (36 kg)) is aerodynamically styled and fully encloses the underside of the car. The body is fabricated of a glass fiber reinforced plastic somewhat thinner than that used in the Corvette body. The wheels are completely exposed to permit visual observation of tire-to-road contact during handling studies. Powertrain Power for the "CERV-I" is supplied by a specially developed, lightweight version of the Chevrolet 283-cubic-inch. V-8 that develops and weighs only 350 pounds (159 kg). Such specific output, only one pound per horsepower, is rarely achieved in reciprocating engines, even in the most highly developed aircraft types. The dramatic reduction of weight was gained by using aluminum for the cylinder block, cylinder heads, water pump, starter motor body, flywheel, and clutch pressure plate. In the cylinder block, no bore liners are used and the pistons run directly on specially treated aluminum bores. Magnesium is used for the clutch housing, fuel injection manifold, and manifold adapter plate. Weight savings achieved through the use of lighter metals in the engine and clutch is in excess of 175 pounds (79 kg). A number of special design features help the engine to develop . A special fuel injection unit has ram tubes of larger cross section and 2510 longer than those of the regular production design. Individual exhaust pipes of a tuned length empty into large collector pipes and no mufflers are used. No cooling fan is required or used, and the water pump speed is reduced 30% by the use of a smaller crankshaft pulley. A small, 5-ampere generator is used in conjunction with a lightweight aircraft type battery In addition to the aluminum water pump mentioned previously, the engine cooling system consists of an aluminum radiator mounted forward of the driver, and two oil cooler radiators mounted one on each side of the main radiator. Power from the engine is transmitted in a conventional manner through the lightweight flywheel, clutch, and Corvette type four-speed transmission. Attaching directly to the rear end of the transmission case is the differential and final drive gear mechanism. A feature of the final drive gears is the ability to quickly change ratios so that vehicle performance can be as quickly tailored to a new environment. Power transmission to the wheels is completed through individual axle shafts with universal joints on each end, or a total of four in-all. In 1972, Hot Rod magazine tested a prototype Chevrolet Vega featuring the all-aluminum V8. The fitted engine was the last of several units used in the CERV I Corvette research and development in the late 1950s, bored out to for the Vega application. Hot Rods road test of the prototype with Turbo Hydramatic, stock Vega differential, and street tires yielded quarter mile (~400 m) times under 14 seconds. Suspension, steering, and brakes The interesting rear suspension permits independent action of each wheel. Vertical movements of the wheels are controlled by two links, in which the upper link doubles as the axle shaft; and a rod, rubber bushed on each end as the lower. A third link runs from each rear wheel hub forward to the frame to transmit driving and braking thrust. Variable rate coil springs unitized with direct, double-acting shock absorbers are diagonally mounted at each rear wheel. Adjustment provisions in the rear suspension linkage permit variations in camber and toe-in to facilitate engineering studies. Front suspension is independent with high roll center geometry, and also utilizes unitized variable rate coil springs and shock absorbers as in the rear suspension. An 11/16" stabilizer bar interconnects the front wheels. The independent rear suspension design became the basis of the 1963 Corvette Sting Ray suspension. So that weight distribution during tests shall vary little if any, two fuel cells of rubber construction and total capacity of 20 gallons, are located on either side of the "CERV-I" at approximately the fore and aft location of the center of gravity. Thus, the amount of fuel in the tanks at any given moment will have virtually no effect on weight distribution. Brakes on the "CERV-I" are similar to the HD type available on the Chevrolet Corvette. Sintered iron linings are used with fin cooled drums, and the brake drum webs are lightened by drilled lightening holes which also permit the flow of cooling air. The brake drums are cast aluminum with cast-in iron braking surfaces. The rear brakes are inboard mounted next to the differential so that braking torque is transmitted directly to the frame without influencing any of the rear wheel articulating members. Braking effort distribution is 57% front and 43% rear to take advantage of the superior braking characteristics of the weight distribution afforded by the rear engine type vehicle. The brakes may be actuated by either one of two pedals so that the driver may use either foot depending on the particular driving situation. An unusual brake master cylinder utilizes two pistons operating in series so that it either the front or rear brakes fail the remaining brakes can be actuated. The steering system features a high-efficiency re-circulating ball type steering gear of 12:1 ratio. Steering linkage is forward mounted and is of a balanced relay link type. The overall steering ratio is a very fast 13.5:1 and only 2 1/4 turns of the steering wheel are required from lock-to-lock. Wheels are of cast magnesium alloy with knock-off hubs to facilitate quick changing. Wheels of 15", 16", 17" and 18" diameters with rim width of 5½", 6", and 8" are used. The car is currently on display in Detroit, Michigan at the Renaissance Center on level A within the GM World display space. CERV II Zora Arkus-Duntov began work on the CERV II in 1963, which was completed in 1964. The original plan was to build six cars, three for competition and three spares. The body was styled by Larry Shinoda and Tony Lapine. To achieve superior performance, the car was built on a monocoque chassis, powered by a 377 ci all-aluminum SOHC V8 with Hilborn injection rated at . Some test results indicated it had a top speed of , and 0-60 mph in 2.8 to 3.0 seconds. Transmission is a 2-speed on each of the front and rear axles, with transferable torque between axles. The top speed was reported by Victory By Design to be . In 1970, CERV II was used to test tire with a ZL-1 engine. This vehicle and the CERV I were later donated to the Briggs Cunningham Museum, in Costa Mesa, California. The 1964 CERV II chassis number P-3910 (with engine number T1212E 2-92199-A, previously owned by the Briggs Cunningham Museum, Miles Collier Jr., John Moores) was sold in 2013 RM New York auction for $1,000,000 ($1,100,000 after buyer's premium). CERV III The project would become the CERV III (Corporate Engineering Research Vehicle III) was first unveiled at Detroit Automobile Show in January 1986 as the Corvette Indy prototype car. The vehicle featured 4-wheel drive, 4-wheel steering, and CRT cockpit screens. The vehicle was styled by Chief of Chevy III Studio, Jerry Palmer. In January 1990, CERV III (No. 3) made its debut at the International Auto Show in Detroit. The car's mid-mounted V-8 is a 5.7-liter 32-valve, dual-overhead cam LT5, with twin turbos and internal modifications, giving it , - torque, and a top speed of . The car was made of carbon fiber with a fiberglass-finish coating, with estimated price of $300k-400k. Other standard features include computer-controlled active suspension system, ABS braking and traction control, six-speed automatic transmission, all-wheel-drive and four-wheel steering along with a fully multiplexed electrical architecture. CERV III (No. 3) is a playable car in the PC game Test Drive III, under the name 'Chevrolet Cerv III', where CERV means 'Corporate Experimental Research Vehicle'. 1986 Chevrolet Corvette Indy Concept images from the National Corvette Museum in Bowling Green, Kentucky. CERV-IV On December 1992, General Motors' Corvette group secretly contracted with TDM, Inc. to build a test car of the 1997 Corvette, which was officially called CERV-4 (Corvette Engineering Research Vehicle). The Corvette group directed the project, with the Chevrolet division paying for it. General Motors management was not told about it, for fear of cancellation. It was unveiled by Corvette chief engineer Dave Hill on 1993-5-3 at the General Motors Technical Center in Warren. The build cost was about US$1.2 million. CERV IV-B (1997) It was a test mule vehicle for the upcoming Chevrolet Corvette C5. It includes 5.7L LT-1 V8 engine, 6-speed manual transmission axle, 4-wheel disc brakes, front 255/45ZR17 and rear 285/40ZR17 tires on BBS basket wheels, side curtains, no side window glass, and a modified production interior. The vehicle was sold in 2009 Barrett-Jackson Palm Beach auction for $34000 (before buyer premium). This car is currently on display in Effingham, IL at the MY Garage Museum owned by Michael and Blake Yager. References External links Chronology of Events in the History of Corvettes Chevrolet Corvette CERV specifications: CERV I, CERV II, CERV III CERV CERV
{ "pile_set_name": "Wikipedia (en)" }
862 F.2d 305 U.S.v.Diaz NO. 88-1172 United States Court of Appeals,Second Circuit. SEP 14, 1988 1 Appeal From: S.D.N.Y. 2 AFFIRMED.
{ "pile_set_name": "FreeLaw" }
1 | SOMA (SCT) 25% 35% 0.17x 800k 17k Data provided by CoinRanking.com Recent Developments SOMA recently secured funding from the Finnish Government. 50k in funding was granted but if SOMA can use that $50k in the right way, they could secure up to $20 Million SOMAs Pilot Program is looking good out of the gates. They’ve got “Sipilän Kello”, a Luxury Watch Maker on board already with more clients to come. Recent Developments have seen SOMA hover around the $500k mark in terms of Market Cap. Considering the recent developments over the past few weeks, this is a case of a fundamentally strong project being held back by a bear market. Summary SOMA brings a social trading experience to consumers while providing a robust tracking and authentication protocol for business. The integration of social media functionality allows users to monetize social influence and provide value-added services to one another for just compensation. Simultaneously, SOMA’s enterprise solution protects against forgeries and helps companies streamline processes and access data points never before available to them. From an item’s creation all the way through secondary markets, SOMA covers the entire product lifecycle. Future Events SOMA plans to onboard more brands/clients over the next few quarters. Keep an eye out for SOMA in Q1 and Q2 of 2019 when their Pilot Program is in full swing. Exchange listings are no doubt on the way. Pure speculation on our part but considering SOMA is now making some very noticeable moves in the space, it won’t be long until bigger exchanges take note. We don’t expect a Market Cap of $500k to stick for much longer. Data provided by CoinRanking.com Recent Developments In terms of price action, Endor has been recovering from the initial decline in value the project saw after its ICO. Fundamentals are all there and growing. Endors ICO was held when a lot of ICOs, regardless of fundamental strength, were being listed and immediately falling below ICO price due to market condition. Summary Endor is the world’s first predictions protocol, enabling an ecosystem that provides automated, accurate, affordable predictions, for Individuals and Businesses. Powered by MIT’s novel Social Physics technology, and massive compute power, Endor enables business users to ask predictive questions in plain language, and get automated accurate predictions. No data science expertise required. Future Events Taking a look at Endors Roadmap we can see a lot of cool developments in the works for H2 2018. A nice long Roadmap here but some short term goals coming up. Keep an eye on Endors AMAs as development continues. Long term project which requires patience from investors. 5 Coins, Every Week. Sign Up To Our Newsletter 3 | Arcblock (ABT) 54% -23% 0.47x 23m 15m Data provided by CoinRanking.com Recent Developments Recent Hackathons have exposed Arcblock to a new wave of Blockchain Developers. Practical use-cases are being explored at a rapid pace. Q3 will see Arcblocks Open Chain Access Protocol be developed and utilized Arcblocks Github has been on fire recently. The Engineering Team are flying through the Development Roadmap. Summary ArcBlock is a platform and an ecosystem for building and deploying decentralized blockchain applications. The platform goes beyond providing the necessary foundational components for using blockchain to power complex business rules. It connects your existing system to blockchain networks, enabling you to automate business processes using the data and identities associated with existing systems. Future Events 2019 will see Arcblock release their decentralized marketplace for ArcBlock decentralized applications and their tokens. IOT (Internet of Things) application use-cases are in the works. Great to see Arcblock embracing new and potentially disruptive technology in the long term. Investors should keep an eye on Arcblocks Github over the next 6-12 months. Tech updates have been consistent, plenty for the tech savvy Investor to gush over. Summary PolicyPal Network is a decentralised insurance protocol that uses data to bridge the gap between consumers & insurance providers by providing a new level of accessibility within the insurance ecosystem. Future Events Q4 2018 will see the development of web wallets and dashboards for PolicyPal customers/clients. The PAL Protocol Mainnet Launch is expected in Q4 2018, utilizing the newly described Supernodes/Masternodes. In terms of price action, expect PAL to be one of the faster small cap projects to recover from the recent bear market. Strong fundamentals held back by poor market conditions. 9 5 Coins, Every Week. Sign Up To Our Newsletter 5 | NEO (NEO) 14% -31% 879x 1.3b 60m Data provided by CoinRanking.com Recent Developments NEO has been under fire a bit lately concerning malicious transactions and potential DOS (Denial of Service) Vulnerabilities. The Team has been transparent and understanding of community concern by releasing consistent updates In terms of price action, NEO has become one of the more undervalued projects when you take a look at its ATH (All Time High). Considering the fundamentals haven’t changed, Investors have an opportunity to grab what they couldn’t before NEOs big run up to $160+ in 2017. A safe bet. Summary NEO is a non-profit community-driven blockchain project. It utilizes blockchain technology and digital identity to digitize assets and automate the management of digital assets using smart contracts. Using a distributed network, it aims to create a “Smart Economy”. Future Events NeonExchange (NEX) is holding their long awaited ICO in early September, wouldn’t be odd to see NEO jump up in value as Investors prepare for this mammoth of a project. Several other ICOs are getting ready to utilize the NEO Blockchain for their projects. NEO is somewhat picky with who gets to use their tech, but it’s for good reason. 8 Fundamentals 6 ROI Potential 8 Future Developments 8 Overall Score 5 Coins, Every Week. Sign Up To Our Newsletter Save my name, email, and website in this browser for the next time I comment. About Us We List the Most Popular Cryptocurrency Assets and Provide Information to Assist in Your Investment Decisions. Token Statistics, Project Overviews and an Unbiased Analysis of the Pros and Cons of Each Project Are Available for Each Asset.
{ "pile_set_name": "Pile-CC" }
Über die SPD-Beteiligungsgesellschaft DDVG funkt die SPD in viele Tageszeitungen hinein. Wie der Journalist und Herausgeber des Magazins „Tichys Einblick“, Roland Tichy, mitteilte, hatte er seinen Artikel „Wie SPD in die Zeitungen kommt – Zeitungen, auf die die SPD heimlich und indirekt Einfluss nimmt“ zurückgenommen, weil er sich einem großen Druck von außen ausgesetzt sah. Ironischer Weise drehte es sich bei besagtem Artikel um die immer größer werdende Einflussnahme der SPD auf Medien über die Beteiligungsgesellschaft DDVG der SPD. Der AfD-Bundestagsabgeordnete Thomas Ehrhorn, stellvertretendes Mitglied im Bundestagsausschuss für Kultur und Medien, betrachtet das mit Sorge: „Die zunehmende Beteiligung der SPD an Medienunternehmen und die damit verbundene Einschränkung der Medienfreiheit hat überhandgenommen. Ob als größter Anteilseigner, wie bei der deutschlandweit agierenden Madsack-Gruppe, oder dem Zeitungsverlag Neue Westfälische mit einhundertprozentiger Beteiligung, nimmt die SPD-Beteiligungsgesellschaft Einfluss auf über fünfzig Tageszeitungen.“ Wenn die ehemalige SPD-Bundesschatzmeisterin Wettig-Danielmeier damit zitiert wird, dass selbst dort, wo nur eine Minderheitsbeteiligung vorliegt, in den Verlagen nichts mehr gegen die SPD laufen könne, besteht Handlungsbedarf. Ich werde mich dafür einsetzen, dass Zeitungen künftig auf ihre wirtschaftlichen Verbindungen mit Parteien deutlich hinweisen und derartige Verflechtungen, wenn es um Lokalzeitungen geht, grundsätzlich unterbunden werden müssen. Wo Medien unerkannt zum Parteiensprachrohr werden, ist politische Korruption nicht mehr fern.“
{ "pile_set_name": "OpenWebText2" }
Q: Merge or Combine Two Array Into Single Array I have a case to create or merge two arrray into single array. First array like this : Array // First Array ( [0] => Array ( [hotel] => cempaka [vendor] => mas ) [1] => Array ( [hotel] => permata [vendor] => sip ) ) Second array : Array ( [0] => Array ( [order_type] => 1 [currency] => 26 [net] => 26000 [rate] => 26000 [amount] => 26000 [bank_surcharge] => 26000 [ticket] => 26000 [profit] => 26000 [selling_price] => 26000 [description] => a ) [1] => Array ( [order_type] => 2 [currency] => 27 [net] => 27000 [rate] => 27000 [amount] => 27000 [bank_surcharge] => 27000 [ticket] => 27000 [profit] => 27000 [selling_price] => 27000 [description] => b ) [2] => Array ( [order_type] => 5 [currency] => 28 [net] => 28000 [rate] => 28000 [amount] => 28000 [bank_surcharge] => 28000 [ticket] => 28000 [profit] => 28000 [selling_price] => 28000 [description] => c ) [3] => Array ( [order_type] => 3 [currency] => 29 [net] => 29000 [rate] => 29000 [amount] => 29000 [bank_surcharge] => 29000 [ticket] => 29000 [profit] => 29000 [selling_price] => 29000 [description] => d ) [4] => Array ( [order_type] => 4 [currency] => 30 [net] => 30000 [rate] => 30000 [amount] => 30000 [bank_surcharge] => 30000 [ticket] => 30000 [profit] => 30000 [selling_price] => 30000 [description] => e ) [5] => Array ( [order_type] => 6 [currency] => 31 [net] => 31000 [rate] => 31000 [amount] => 31000 [bank_surcharge] => 31000 [ticket] => 31000 [profit] => 31000 [selling_price] => 31000 [description] => f ) [6] => Array ( [order_type] => 1 [currency] => 32 [net] => 32000 [rate] => 32000 [amount] => 32000 [bank_surcharge] => 32000 [ticket] => 32000 [profit] => 32000 [selling_price] => 32000 [description] => g ) [7] => Array ( [order_type] => 2 [currency] => 33 [net] => 33000 [rate] => 33000 [amount] => 33000 [bank_surcharge] => 33000 [ticket] => 33000 [profit] => 33000 [selling_price] => 33000 [description] => h ) [8] => Array ( [order_type] => 5 [currency] => 34 [net] => 34000 [rate] => 34000 [amount] => 34000 [bank_surcharge] => 34000 [ticket] => 34000 [profit] => 34000 [selling_price] => 34000 [description] => i ) [9] => Array ( [order_type] => 3 [currency] => 35 [net] => 35000 [rate] => 35000 [amount] => 35000 [bank_surcharge] => 35000 [ticket] => 35000 [profit] => 35000 [selling_price] => 35000 [description] => j ) [10] => Array ( [order_type] => 4 [currency] => 36 [net] => 36000 [rate] => 36000 [amount] => 36000 [bank_surcharge] => 36000 [ticket] => 36000 [profit] => 36000 [selling_price] => 36000 [description] => k ) [11] => Array ( [order_type] => 6 [currency] => 37 [net] => 37000 [rate] => 37000 [amount] => 37000 [bank_surcharge] => 37000 [ticket] => 37000 [profit] => 37000 [selling_price] => 37000 [description] => l ) ) and then this the output that i want to get: Array ( [0] => Array ( [hotel] => cempaka [vendor] => mas [order_type] => 1 [currency] => 26 [net] => 26000 [rate] => 26000 [amount] => 26000 [bank_surcharge] => 26000 [ticket] => 26000 [profit] => 26000 [selling_price] => 26000 [description] => a ) [1] => Array ( [hotel] => cempaka [vendor] => mas [order_type] => 2 [currency] => 27 [net] => 27000 [rate] => 27000 [amount] => 27000 [bank_surcharge] => 27000 [ticket] => 27000 [profit] => 27000 [selling_price] => 27000 [description] => b ) [2] => Array ( [hotel] => cempaka [vendor] => mas [order_type] => 5 [currency] => 28 [net] => 28000 [rate] => 28000 [amount] => 28000 [bank_surcharge] => 28000 [ticket] => 28000 [profit] => 28000 [selling_price] => 28000 [description] => c ) [3] => Array ( [hotel] => cempaka [vendor] => mas [order_type] => 3 [currency] => 29 [net] => 29000 [rate] => 29000 [amount] => 29000 [bank_surcharge] => 29000 [ticket] => 29000 [profit] => 29000 [selling_price] => 29000 [description] => d ) [4] => Array ( [hotel] => cempaka [vendor] => mas [order_type] => 4 [currency] => 30 [net] => 30000 [rate] => 30000 [amount] => 30000 [bank_surcharge] => 30000 [ticket] => 30000 [profit] => 30000 [selling_price] => 30000 [description] => e ) [5] => Array ( [hotel] => cempaka [vendor] => mas [order_type] => 6 [currency] => 31 [net] => 31000 [rate] => 31000 [amount] => 31000 [bank_surcharge] => 31000 [ticket] => 31000 [profit] => 31000 [selling_price] => 31000 [description] => f ) [6] => Array ( [hotel] => permata [vendor] => sip [order_type] => 1 [currency] => 32 [net] => 32000 [rate] => 32000 [amount] => 32000 [bank_surcharge] => 32000 [ticket] => 32000 [profit] => 32000 [selling_price] => 32000 [description] => g ) [7] => Array ( [hotel] => permata [vendor] => sip [order_type] => 2 [currency] => 33 [net] => 33000 [rate] => 33000 [amount] => 33000 [bank_surcharge] => 33000 [ticket] => 33000 [profit] => 33000 [selling_price] => 33000 [description] => h ) [8] => Array ( [hotel] => permata [vendor] => sip [order_type] => 5 [currency] => 34 [net] => 34000 [rate] => 34000 [amount] => 34000 [bank_surcharge] => 34000 [ticket] => 34000 [profit] => 34000 [selling_price] => 34000 [description] => i ) [9] => Array ( [hotel] => permata [vendor] => sip [order_type] => 3 [currency] => 35 [net] => 35000 [rate] => 35000 [amount] => 35000 [bank_surcharge] => 35000 [ticket] => 35000 [profit] => 35000 [selling_price] => 35000 [description] => j ) [10] => Array ( [hotel] => permata [vendor] => sip [order_type] => 4 [currency] => 36 [net] => 36000 [rate] => 36000 [amount] => 36000 [bank_surcharge] => 36000 [ticket] => 36000 [profit] => 36000 [selling_price] => 36000 [description] => k ) [11] => Array ( [hotel] => permata [vendor] => sip [order_type] => 6 [currency] => 37 [net] => 37000 [rate] => 37000 [amount] => 37000 [bank_surcharge] => 37000 [ticket] => 37000 [profit] => 37000 [selling_price] => 37000 [description] => l ) ) (This two array i get from dynamic field generated via javascript) Any solution will be appreciated a lot.. Thanks A: Use the following since you are trying to merge arrays based on the key number of the second array: foreach($second_array as $key => $value){ if($key >= 0 && $key <= 5){ $new_array[$key] = array_merge($second_array[$key], $first_array[0]); } if($key >= 6 && $key <= 11){ $new_array[$key] = array_merge($second_array[$key], $first_array[1]); } //etc....... }
{ "pile_set_name": "StackExchange" }
apiVersion: v1 kind: Pod metadata: name: kube-controller-manager namespace: kube-system spec: containers: - command: - /bin/sh - -c - /usr/local/bin/kube-controller-manager --master=127.0.0.1:8080 --cluster-name=${INSTANCE_PREFIX} --cluster-cidr=${CLUSTER_IP_RANGE} --service-cluster-ip-range="${SERVICE_CLUSTER_IP_RANGE}" --allocate-node-cidrs=true --cloud-provider=gce --service-account-private-key-file=/srv/kubernetes/server.key --v=2 --root-ca-file=/srv/kubernetes/ca.crt 1>>/var/log/kube-controller-manager.log 2>&1 image: gcr.io/google_containers/kube-controller-manager:${KUBE_CONTROLLER_MANAGER_DOCKER_TAG} imagePullPolicy: IfNotPresent livenessProbe: httpGet: host: 127.0.0.1 path: /healthz port: 10252 scheme: HTTP initialDelaySeconds: 15 timeoutSeconds: 15 name: kube-controller-manager resources: limits: cpu: 200m requests: cpu: 200m volumeMounts: - mountPath: /srv/kubernetes name: srvkube readOnly: true - mountPath: /var/log/kube-controller-manager.log name: logfile - mountPath: /etc/ssl name: etcssl readOnly: true - mountPath: /usr/share/ca-certificates name: usrsharecacerts readOnly: true dnsPolicy: ClusterFirst hostNetwork: true restartPolicy: Always terminationGracePeriodSeconds: 30 volumes: - hostPath: path: /srv/kubernetes name: srvkube - hostPath: path: /var/log/kube-controller-manager.log name: logfile - hostPath: path: /etc/ssl name: etcssl - hostPath: path: /usr/share/ca-certificates name: usrsharecacerts
{ "pile_set_name": "Github" }
Introduction {#s1} ============ Articular cartilage is a highly specialised connective tissue in joints. Its main function is to provide a smooth, lubricated surface for articulation and to take up and distribute high loads. Its remarkable dimensional stability and mechanical properties are due to the composition of its extracellular matrix. The load-bearing function is based on the high osmotic pressure created by negatively charged glycosaminoglycans, which are predominantly aggrecan molecules. In addition, the fibrillar collagen network, mainly composed of type II collagen, provides the tissue with its tensile resistance. As the only cell type in articular cartilage, chondrocytes are entirely responsible for maintaining the metabolic balance of matrix proteins. Accordingly, it has been shown that mechanical forces affect chondrocyte metabolic activity (for a review, see [@pone.0036964-Grodzinsky1]). More precisely, *ex vivo* and *in vitro* models of chondrocyte mechanobiology have generally shown that static compression inhibits the expression of cartilage matrix proteins whereas dynamic compression regimens enhance them [@pone.0036964-Buschmann1]--[@pone.0036964-Jones1]. In this context, mechanotransduction is the molecular process by which cells convert mechanical force into biochemical signalling. Little is currently known regarding the sequence of biochemical events that are involved in mechanotransduction and that eventually result in the modulation of the chondrocyte phenotype. It is therefore necessary to assess the signalling and regulatory pathways activated during mechanical signal transduction in chondrocytes. In this study, we employed microarray analysis to investigate the overall changes in chondrocyte gene expression in response to dynamic compression. We used a cell model system consisting of isolated mouse chondrocytes embedded within an agarose hydrogel. We have previously used these constructs to develop experimental procedures to analyse the effects of compression at the mRNA level (using reverse transcription-polymerase chain reaction experiments) and to determine the phosphorylation state of signalling molecules (using Western blotting) [@pone.0036964-Bougault1], [@pone.0036964-Bougault2]. Here, our study was designed to identify candidate genes involved in the early response of chondrocytes to compression. ![Chondrocytes embedded in agarose gel maintain a well-differentiated phenotype.\ Expression of extracellular matrix proteins, integrins and the Sox9 transcription factor were analysed on Western blots of chondrocytes cultured in 3D for 3 days (d3) or 6 days (d6). The presence or absence patterns of proteins at day 6 are representative of 3 independent experiments. A: Type II (Col II) and type IX (Col IX) collagens accumulate and become cross-linked by day 6. Procollagen II forms (pro) and mature collagen II chains \[α1(II)\] are present. Beta (β) indicates cross-linked α1(II) dimers. Collagen IX chains \[α1(IX)\] are present. Asterisks (\*) indicate cross-linked collagens. B: Type I collagen (Col I) and α11 integrin (Itgα11) are not or only faintly detected, whereas the chondrocyte-specific α10 integrin (Itgα10) is present at day 6. Passaged chondrocytes cultured in monolayer were used as positive controls (Ctrl) for Col I and α11 integrin immunorevelations. Procollagen I (pro) and mature collagen I chains α1(I) and α2(I) are indicated. C: Sox9 chondrogenic transcription factor increases with the duration of culture.](pone.0036964.g001){#pone-0036964-g001} Taken together, the results presented here indicate that the mitogen-activated protein kinase (MAPK) and the transforming growth factor (TGF)- β pathways are involved in the early response of chondrocytes to dynamic compression. The microarray analysis revealed that only 20 transcripts were modulated more than 2-fold. At a fold modulation threshold of 1.4, an extended list of candidate genes included 325 candidate mechanosensitive genes, of which 85% were down-regulated. This global down-regulation may indicate a general control mechanism for a rapid response to dynamic compression. Many of the observed modulated genes are known to be mechanosensitive in other biological contexts. In addition, modulation of genes or transcripts involved in various aspects of cellular physiology was observed. Our integrated analysis provides new molecular insight into how chondrocytes respond to mechanical forces. ![Experimental design and dynamic compression profile.\ Chondrocytes cultured in agarose for 6 days underwent dynamic compression using the FX-4000C Flexercell Compression Plus System (Flexcell International). Chondrocyte-agarose constructs underwent cyclical compression ranging from 20 kPa to 40 kPa at a frequency of 0.5 Hz for 5, 15 or 30 min. Signalling proteins were analysed by Western blot at each of the three time points. DNA microarray analysis was performed to compare 30 min-compression constructs to uncompressed constructs.](pone.0036964.g002){#pone-0036964-g002} Results {#s2} ======= Maintenance of the chondrocyte phenotype and cartilage-characteristic matrix deposition in an agarose hydrogel {#s2a} -------------------------------------------------------------------------------------------------------------- To investigate the early effects of dynamic compression on gene expression of fully differentiated chondrocytes, we used a previously described cell model system [@pone.0036964-Bougault1], [@pone.0036964-Bougault2]. Briefly, mouse chondrocytes were embedded in agarose just after their isolation from cartilage and these chondrocyte-agarose constructs were cultured for 6 days to allow extracellular matrix deposition. Under these conditions, chondrocytes are viable and their proliferation was confirmed by an increase in DNA content (about 1.5 fold, data not shown). Furthermore, they maintain their round morphology and type II collagen and aggrecan accumulate at the cell periphery [@pone.0036964-Bougault1], [@pone.0036964-Bougault2]. Western blotting was used to obtain more detailed information on the matrix proteins and integrin receptors present in the chondrocyte-agarose constructs just before application of dynamic compression ([Figure 1](#pone-0036964-g001){ref-type="fig"}). ![Smad2, but not Smad1/5/8 or FAK, is activated by compression in chondrocyte-agarose constructs.\ Chondrocytes cultured in agarose for 6 days underwent dynamic compression (+) or were not compressed (−) for the indicated times and the phosphorylation levels of FAK, Smad2 and Smad1/5/8 were analysed on Western blots. (A) Representative blots. (B) For FAK phosphorylation, densitometric analysis was performed on three (5 and 15 min) or two (30 min) independent experiments. For SMAD phosphorylation, densitometric analysis was performed on four (5 and 15 min) or three (30 min) independent experiments. For each protein, the ratio of the phospho-protein to the total protein was calculated and the value obtained for mechanically-induced phosphorylation was normalised to uncompressed controls. Bars represent the compression-induced phosphorylation modulation (mean +/− SD), with up-regulation in red and down-regulation in green (\*\* p\<0.01).](pone.0036964.g003){#pone-0036964-g003} As expected, after 3 days of culture, chondrocytes synthesised type II collagen, but mainly in the procollagen form ([Figure 1](#pone-0036964-g001){ref-type="fig"} Panel A). Fibrillar collagens such as type II collagen are synthesised as precursor forms that must be cleaved to produce the mature triple helical collagens capable of packing into fibrils (for a review, see [@pone.0036964-Canty1]). After 6 days of culture, mature-form type II collagen was the predominant form and showed interchain covalent cross-links ([Figure 1](#pone-0036964-g001){ref-type="fig"} Panel A). All the enzymes necessary for the post-translational maturation of collagen were therefore active in the 3D scaffolds. In addition, we investigated type IX collagen, which is a minor non-fibrillar collagen present in hyaline cartilage. Western blot analysis confirmed the presence of covalent cross-links between collagen molecules in the chondrocyte-agarose constructs after 6 days of culture ([Figure 1](#pone-0036964-g001){ref-type="fig"} Panel A). To demonstrate the absence of critical proteins that could cause the chondrocytes to transduce mechanical signals in a non-characteristic way, we looked for type I collagen, the classical marker of fibroblasts and dedifferentiated chondrocytes. No type I collagen was detected in Western blots on the chondrocyte-agarose constructs, but it was detected in the positive controls, i.e. extracts of mouse chondrocytes cultured in monolayer ([Figure 1](#pone-0036964-g001){ref-type="fig"} Panel B). Therefore, before the compression experiments, chondrocytes synthesise mature and cross-linked extracellular matrix components that are part of the typical collagen network in cartilage. ![Identification of major candidate mechanosensitive genes.\ Gene expression levels of compressed samples were compared to uncompressed controls. (A) DNA microarray analysis was performed on four independent pairs of uncompressed/compressed experiments. Expression level differences were sorted to identify highly responsive genes (fold change \>2), resulting in a list of 20 transcripts. Bars represent the fold change in gene expression upon compression, i.e. up-regulation (red) or down-regulation (green) (p\<0.01). Exact modulation factors and associated p-values are detailed in [Table 1](#pone-0036964-t001){ref-type="table"}. (B) Real-time PCR analysis on three independent experiments confirmed DNA microarray results for eight selected genes. Bars represent the compression-induced gene expression modulation (mean +/− SD), either up-regulation (red) or down-regulation (green) (\* p\<0.05, \*\* p\<0.01).](pone.0036964.g004){#pone-0036964-g004} Integrin transmembrane receptors connect the extracellular matrix to the intracellular cytoskeletal network and are expected to play an important role in cellular responses to mechanical forces. The main collagen-binding integrin on chondrocytes in cartilage is α10β1 integrin, whereas α11β1 integrin is more characteristic of mesenchymal tissues. Thus, α10 and α11 are good markers for evaluating the status of the chondrocyte phenotype [@pone.0036964-Gouttenoire1]. Integrins, probably along with other surface proteins, were removed from the cell surface after enzymatic isolation of chondrocytes from cartilage ([Figure 1](#pone-0036964-g001){ref-type="fig"} Panel B). α10 was re-expressed at the end of the culture period in agarose, whereas α11 could only be faintly detected. We also monitored another differentiation marker: Sox9, a transcription factor required for cartilage formation ([Figure 1](#pone-0036964-g001){ref-type="fig"} Panel C). In mouse chondrocytes, high levels of Sox9 protein correlate with type II collagen synthesis and a well-differentiated phenotype, whereas dedifferentiated as well as hypertrophic chondrocytes lack Sox9 [@pone.0036964-Lefebvre1]. Thus, after a 6 day culture period, robust Sox9 expression together with α10 integrin expression further confirmed that chondrocytes were highly differentiated. 10.1371/journal.pone.0036964.t001 ###### Results from DNA microarray analysis: gene expression levels in compressed samples were compared to uncompressed control samples (fold change \>2 and p-value \>0.01). ![](pone.0036964.t001){#pone-0036964-t001-1} RNA ID PROTEIN ID GENE NAME FOLD CHANGE ADJUSTED P-VALUE ----------- ------------ -------------------------------------------------------------------------------- ------------- ------------------ **UP-REGULATED GENES** NM_010234 Q6PCX9 Proto-oncogene protein c-fos;Fos 9.27 2E-04 NM_007913 Q9WVQ1 Early growth response protein 1;Egr1 3.90 1E-04 NM_010444 Q9DBG7 Nuclear receptor subfamily 4 group A member 1;Nr4a1 2.84 4E-04 NM_010499 P17950 Immediate early response gene 2 protein;Ier2 2.63 2E-05 NM_010118 Q9JLB2 Early growth response protein 2;Egr2 2.60 6E-03 NM_007570 Q04211 Protein BTG2;Btg2 2.28 5E-04 NM_010591 Q6SJQ0 Transcription factor AP-1;Jun 2.27 1E-02 NM_008036 P46935 Protein fosB;Fosb 2.16 4E-03 NM_008416 Q61136 Transcription factor jun-B;Junb 2.00 8E-04 **DOWN-REGULATED GENES** NM_175284 Q149J3 Frizzled homolog 10;Fzd10 0.28 7E-07 NM_030696 Q8BL66 Monocarboxylate transporter 4;Slc16a3 0.31 2E-05 NM_027864 Q61468 Polypeptide N-acetylgalactosaminyltransferase 14;Galnt14 0.36 3E-05 NM_026358 Q8VI64 Ovary-specific acidic protein;Osap 0.38 8E-06 NM_138741 Q9D994 Serum deprivation-response protein;Sdpr 0.40 2E-03 AJ293625 Q9D8T7\* SRA stem-loop-interacting RNA-binding protein (mitochondrial);Slirp 0.41 4E-06 AK020134 Metastasis associated lung adenocarcinoma transcript 1 (non-coding RNA);Malat1 0.41 1E-03 AK032986 Q8BQ86 WD repeat-containing protein 60;Wdr60 0.46 7E-03 NM_023190 Q11011 Apoptotic chromatin condensation inducer in the nucleus;Acin1 0.47 3E-04 NM_018857 Q70KY4 Mesothelin, cleaved form;Msln 0.48 7E-05 NM_146112 Q6Y7W8 PERQ amino acid-rich with GYF domain-containing protein 2;Gigyf2 0.50 3E-03 In conclusion, the chondrocytes in our agarose model system were well-differentiated and did synthesise mature, cross-linked extracellular matrix components as well as integrins, before we applied dynamic compression. ![Analysis of the candidate mechanosensitive gene list.\ Gene expression levels of compressed samples were compared to uncompressed controls. DNA microarray analysis was performed on four independent pairs of compressed/uncompressed experiments. A list of 325 candidate genes was obtained by selecting transcripts with a fold change greater than 1.4 (p\<0.01). (A) Distribution of up- and down-regulated transcripts. (B) Functional annotation highlighting genes involved in gene expression regulation and in signal transduction. Protein classes associated with modulated genes were pooled into three main groups: transcription regulation, phosphorylation cascade and receptor activity and the number of genes belonging to each protein class is shown. Within each group, protein classes are listed from most represented to least represented.](pone.0036964.g005){#pone-0036964-g005} Detection of MAPK pathway and Smad2 activation due to dynamic compression {#s2b} ------------------------------------------------------------------------- The mitogen-activated protein kinase (MAPK) pathways involving ERK1/2 and p38 are implicated in chondrocyte mechanotransduction [@pone.0036964-Fanning1]--[@pone.0036964-Hung1]. We therefore investigated MAPK activation in the chondrocyte-agarose constructs to select the appropriate duration of dynamic compression for the characterisation of mechanotransduction events. Chondrocyte-agarose constructs underwent dynamic compression for 5, 15 or 30 min ([Figure 2](#pone-0036964-g002){ref-type="fig"}) and Western blots were used to examine phosphorylation levels of ERK1/2 and p38. ERK1/2 phosphorylation was observed primarily after 15 min of compression (average 2-fold increase when compared to uncompressed samples) but high variability in the phosphorylation rates impaired the statistical significance of the results ([Data S1](#pone.0036964.s001){ref-type="supplementary-material"}). Following 5 min of compression, p38 phosphorylation stimulation was low but highly reproducible (p\<0.05). After 15 min, this activation seemed stronger (3-fold induction), but again, the response was highly variable ([Data S1](#pone.0036964.s001){ref-type="supplementary-material"}). 10.1371/journal.pone.0036964.t002 ###### Primers used for real-time PCR analysis (reference gene: *Rpl13a*). ![](pone.0036964.t002){#pone-0036964-t002-2} GENE NAME PRIMER SEQUENCE ----------- ----------------- ---------------------------- *Rpl13a* S atccctccaccctatgacaa AS gccccaggtaagcaaactt *Fos* S gggacagcctttcctactacc AS gatctgcgcaaaagtcctgt *Egr1* S ccctatgagcacctgaccac AS tcgtttggctgggataactc *Nr4a1* S ctgtccgctctggtcctc AS aatgcgattctgcagctctt *Ier2* S ttgaatctcagggtcgaactc AS ggtagtgaaacggccttgaa *Btg2* S gcgagcagagactcaaggtt AS ccagtggtgtttgtaatgatcg *Jun* S agggacccatggaagttttt AS tttttctaggagttgtcagattcaaa *Fzd10* S tgctgcctgtgcataaactt AS cccccaggaaagctctttag *Galnt14* S tactatgcagctcggccttt AS caggttcagcctgttctcaa Focal adhesion kinase (FAK) is a non-receptor tyrosine kinase whose phosphorylation is generally detected within minutes after application of mechanical strain in a variety of cell types, including chondrocytes [@pone.0036964-Lee1]. However, in our chondrocyte-agarose model system, we found no compression-induced increase in FAK phosphorylation ([Figure 3](#pone-0036964-g003){ref-type="fig"}). Since TGF-β pathways activation was once reported as part of the cartilage response to mechanical strain [@pone.0036964-Neu1], we analysed Smad phosphorylation with or without compression of the chondrocytes in agarose. Mechanical stimulation promoted Smad2 phosphorylation, mainly after 5 and 15 min of dynamic compression, whereas there were no differences in the phosphorylation levels of Smad1/5/8 between compressed and uncompressed samples ([Figure 3](#pone-0036964-g003){ref-type="fig"}). Results from four independent experiments revealed the relatively high intensity (2.5-fold induction) and the great reproducibility (p\<0.01) of this early event of Smad2 activation ([Figure 3](#pone-0036964-g003){ref-type="fig"}). Finally, the time-dependent activation of the MAPK and canonical TGF-β/Smad pathways demonstrated that the compression regimen we applied to our chondrocyte-agarose model system was sufficient to trigger a cellular response at the molecular level. These pathways, independently or in synergy, may induce changes in the expression of genes that are important in the early responses of chondrocytes to mechanical signals. Confirmation of the mechanosensitive character of members of the AP-1 transcription factor family and *Egr1* {#s2c} ------------------------------------------------------------------------------------------------------------ Next, we undertook a microarray analysis to detect gene expression modulation in response to 30 min of dynamic compression. Observed gene expression regulation was thus putatively downstream the activation of the MAPK and TGF-β/Smad pathways observed after only 15 min of compression. An extensive microarray analysis was performed on four independent pairs of compressed and uncompressed experiments. We focused on highly responsive genes: a 2-fold change threshold for up- and down-regulation was applied (p\<0.01). Of the 20 transcripts with a difference of 2-fold or more, 9 transcripts corresponded to up-regulated genes and 11 to down-regulated genes ([Table 1](#pone-0036964-t001){ref-type="table"} and [Figure 4](#pone-0036964-g004){ref-type="fig"}). Interestingly, 8 of the up-regulated genes were known transcription factors. The most responsive gene was *Fos*, with a compression-induced over-expression of about 9-fold (p\<0.001) and *Egr1* showed a compression-induced up-regulation of about 4-fold (p\<0.001). Furthermore, the concomitant stimulation of *Jun, Junb* and *Fosb*, which are all genes coding for members of the AP-1 transcription factor family, and *Egr1* has also been reported to occur as an early event in diverse models of compression for skeletal cells [@pone.0036964-Fitzgerald1]--[@pone.0036964-Papachristou1]. Identification of new candidate mechanosensitive genes {#s2d} ------------------------------------------------------ In addition to those mentioned above, genes showing a difference of 2-fold or more with a p-value of less than 0.01 are listed in [Table 1](#pone-0036964-t001){ref-type="table"} ([Figure 4](#pone-0036964-g004){ref-type="fig"}, Panel A). Regarding the up-regulated transcription factor-encoding genes, *Egr2* and *Btg2* are members of the early growth response gene family and *Nr4a1* encodes a nuclear receptor. The last up-regulated gene in the list was *Ier2*, another early gene inducible by growth factors. Therefore, all up-regulated genes in this list are already known as "immediate early genes". The list of the down-regulated genes appeared more diversified. *Slc16a3*, *Galnt14*, *Osap* and *Slirp* code for proteins involved in cell metabolism, *Acin1* and *Msln* are genes related to cell death, *Sdpr/Cavin-2* encodes a caveolar protein, *Malat1* corresponds to a non-coding RNA and *Fzd10* and *Gigyf2* encode signalling molecules. No information is available in databanks on the predicted protein encoded by *Wdr60*. To validate the expression profiles obtained by microarray analysis, real-time PCR was used to compare the mRNA expression levels in compressed and control chondrocytes. We examined eight genes and confirmed the same gene expression modulation pattern as the microarray analysis ([Figure 4](#pone-0036964-g004){ref-type="fig"}, panel B). These observations indicated that our experimental procedure reliably identified putative mechanosensitive genes. In addition, the microarray analysis revealed many other candidate mechanosensitive genes when the fold change threshold was lowered from 2 to 1.4 (p\<0.01, [Data S2](#pone.0036964.s002){ref-type="supplementary-material"}). This extended dataset included 325 genes, with 48 up-regulated (i.e. 15%) and 277 down-regulated genes (i.e. 85%). The early response of chondrocytes to compression is thus generally characterised by down-regulation of gene expression ([Figure 5](#pone-0036964-g005){ref-type="fig"} Panel A). The presence of numerous transcription factors on the short list of highly responsive genes suggests that our cell model system was suitable for exploring the early events of mechanotransduction. We sought to further confirm this hypothesis by using the extended dataset of mechanosensitive genes. Hence, we analysed this extended list using PANTHER classification system to cluster candidate genes into relevant categories regarding signal transduction. From the extended dataset, 212 coding transcripts were eligible for functional annotation, of which 41 were up-regulated and 171 were down-regulated proteins ([Data S3](#pone.0036964.s003){ref-type="supplementary-material"}). Transcription factors were the most over-represented class of proteins (36 proteins, p\<0.001) and when pooled with DNA-, RNA- and nucleic acid-binding proteins (63 proteins), they represented 30% of the modulated proteins detected here ([Figure 5](#pone-0036964-g005){ref-type="fig"} Panel B). In addition, 20 proteins belonged to the protein class grouping kinases, phosphatases and kinase regulators, and 25 proteins belonged to the protein class grouping receptors and receptor-binding proteins ([Figure 5](#pone-0036964-g005){ref-type="fig"} Panel B and [Data S4](#pone.0036964.s004){ref-type="supplementary-material"}). Since these data strongly suggest that chondrocytes are involved in signal transduction mechanisms, the dataset of the 212 functionally annotated proteins was further analysed using the PANTHER and Pathway Express systems to identify over-represented signalling pathways. Several signalling pathways, such as Wnt, TGF-β, or MAPK pathways, were prominent, although statistical support was modest (data not shown). Altogether, our results demonstrate the relevance of the extended list of modulated genes for identifying new actors or targets involved in chondrocyte mechanotransduction. Discussion {#s3} ========== Validation of the chondrocyte-agarose construct as a model for identifying the mechanosensitive response typical of chondrocytes {#s3a} -------------------------------------------------------------------------------------------------------------------------------- The aim of this study was to explore the molecular-level response of chondrocytes to dynamic compression using a model system we previously developed [@pone.0036964-Bougault1], [@pone.0036964-Bougault2]. Because sensing and response to external mechanical stimuli by cells is controlled by cell-matrix interactions, we carefully examined --- before performing the compression experiments --- the extracellular matrix proteins and cellular receptors synthesised by chondrocytes in agarose. Western blot analysis extended our previous immunohistochemistry studies [@pone.0036964-Bougault1], [@pone.0036964-Bougault2] and confirmed that chondrocytes produced a cartilage-characteristic matrix during the pre-culture period. Regarding type II and type IX collagen production, the presence of cross-links in the newly formed matrix indicated that these chondrocytes were able to synthesise enzymes necessary for proper maturation and stabilisation of collagen molecules and their packing into collagen fibrils. In addition, in our model system, chondrocytes expressed the collagen-binding integrin α10 [@pone.0036964-Camper1]. Therefore, the chondrocyte-agarose model system used in this study made it possible to examine the molecular events underlying mechanotransduction, which probably occur during typical chondrocyte-cartilage matrix interactions. Since chondrocyte response to mechanical stimulation is affected if chondrocytes dedifferentiate prior to compression [@pone.0036964-Wiseman1], [@pone.0036964-Das1], we also carefully examined the chondrocyte phenotype in our model system. Western blot analysis of type I, II and IX collagens, α10 and α11 integrins and Sox9 extends our previous studies [@pone.0036964-Bougault1], [@pone.0036964-Bougault2] and confirmed that chondrocytes maintain a well-differentiated phenotype in our model system. Agarose hydrogel cultures have already been used to enhance chondrocytes in other models [@pone.0036964-Benya1], [@pone.0036964-Aydelotte1]; the challenge here was to use freshly isolated mouse cells and to obtain a complete differentiated phenotype after one week of culture. Suitability of our model system for studying the early events of mechanotransduction {#s3b} ------------------------------------------------------------------------------------ In the chondrocyte-agarose constructs, the levels of phospho-FAK were not significantly different in compressed compared to uncompressed cells, contradicting numerous published results showing a rapid activation of FAK following various mechanical stimuli. One possible explanation is that, in contrast to our chondrocyte-agarose constructs, cells where not embedded in a 3D environment. It is well known that cells in 3D systems form matrix adhesions that are not the same as their 2D counterparts [@pone.0036964-Wozniak1]. We detected transient activation of ERK1/2 and p38 in response to mechanical stress, as expected from previous studies [@pone.0036964-Fanning1]--[@pone.0036964-Hung1]. We also found that *Fos* and *Jun* family members and *Egr-1* gene expressions were activated after 30 min of compression, shortly after the primary activation of the MAPK pathway. These results are very consistent since *Fos*, *Jun* and *Egr-1* are downstream targets of the MAPK pathway activated by compression in chondrocytes [@pone.0036964-DeCroos2], [@pone.0036964-Papachristou2]. In addition to *Fos*, *Fosb*, *Jun* and *Junb*, the *Atf3* gene was also stimulated 1.47-fold by compression ([Data S2](#pone.0036964.s002){ref-type="supplementary-material"}). This modulation is in good agreement with the modulation observed for AP-1 genes since Atf3, a transcription factor known to be induced in stress responses, forms heteromers with Jun members for its transcriptional activities [@pone.0036964-Hai1]. Overall, the microarray analysis revealed that very few gene expression levels were modulated more than 2-fold, suggesting that dynamic compression triggered modest regulatory events. All the up-regulated genes in this list are already known as "immediate early genes". Examination of the very early events of dynamic compression reduces the risk of interpreting the result of feedback signalling. The presence of numerous transcription factors among the 20 most responsive genes was consistent with a high frequency of genes with a \>1.4-fold change in expression that code for proteins linked to signal transduction and gene expression regulation. These results further demonstrate that our model system is useful for studying mechanotransduction early events. Characteristic TGF-β signalling is activated by dynamic compression {#s3c} ------------------------------------------------------------------- Only a few studies have reported activation of TGF-β/Smad signalling as an early event in cellular mechanotransduction. Osteoblasts and the Saos-2 osteoblastic cell line respond to mechanical stimulation by increasing the activation of bone morphogenetic protein (BMP) receptor substrates, Smad1/5 [@pone.0036964-Mitsui1]--[@pone.0036964-Kido1]. Likewise, Smad2/3 phosphorylation increases when umbilical cord progenitor cells are stretched [@pone.0036964-Turner1]. Regarding chondrocytes, only one immunohistochemistry study has shown Smad2/3 activation in specific regions of bovine articular cartilage subjected to 5 min of shear stress [@pone.0036964-Neu1]. In our study, a Western blot analysis showed that Smad2, but not Smad1/5/8, was activated by dynamic compression, thus confirming that activation of TGF-β/Smad signalling represents an early response of chondrocytes to mechanical loading. Chondrocytes cultured in agarose gel secrete TGF-β [@pone.0036964-Tschan1] and this protein is secreted by various cells --- including chondrocytes --- as part of a latent complex that associates with matrix proteins such as fibrillin, proteoglycans, and fibronectin [@pone.0036964-Chaudhry1]--[@pone.0036964-Hyytiainen1]. One component of the latent complex, the latency-associated protein, interacts directly with integrins, especially αvβ5. Myofibroblasts cultured on stiff matrices can exert tension on the latent complex through integrins, causing conformational changes and the release of sequestered TGF-β in an active form [@pone.0036964-Wells1]. Although we did not measure the release of active TGF-β, it is possible that dynamic compression on chondrocyte-agarose constructs causes the mechanically driven release of soluble TGF-β which then binds to its receptor and subsequently triggers signalling as exemplified by Smad2 phosphorylation. Regardless of the exact mechanism of TGF-β activation in our cell model system, the microarray analysis confirmed the involvement of TGF-β signalling in the chondrocyte response to dynamic compression. For instance, *Htra1*, a gene coding for a serine protease that inhibits TGF-β signalling [@pone.0036964-Oka1] and *Arkadia/Rnf111*, a gene coding for an ubiquitin ligase involved in Smad2/3 regulation [@pone.0036964-Mavrakis1], were down-regulated under dynamic compression (1.47-fold and 1.66-fold, respectively, [Data S2](#pone.0036964.s002){ref-type="supplementary-material"}). Moreover, *Cyr61* was up-regulated by 1.64-fold. *Cyr61* is an important regulator of chondrogenesis and a member of the CCN family that includes connective tissue growth factor (Ctgf) [@pone.0036964-Wong1]. *Cyr61*, like *Ctgf*, is up-regulated in fibroblasts cultured under mechanical stress within a 3D collagen gel [@pone.0036964-Schild1]. Because *Cyr61* expression is activated as an early response to TGF-β [@pone.0036964-Brunner1], it is possible that the observed *Cyr61* up-regulation results, at least in part, from the activation of TGF-β signalling triggered by dynamic compression. Clearly, the interplay between growth factors, growth factor signalling and mechanotransduction is highly complex. Dynamic compression induces a general down-regulation of gene expression in chondrocytes {#s3d} ---------------------------------------------------------------------------------------- The microarray analysis revealed that around 85% of the 325 mechanosensitive identified genes were down-regulated. One possible explanation for the observed trend towards a reduction in RNA levels is an increase in mRNA decay. Interestingly, two genes coding for major proteins involved in RNA degradation, *Btg2* and *Zfp36*, were one of the relatively few genes up-regulated following dynamic compression (2.28-fold and 1.76-fold, respectively, [Data S2](#pone.0036964.s002){ref-type="supplementary-material"}). Btg2, a member of the Btg/Tob family of proteins, is a general activator of mRNA decay [@pone.0036964-Mauxion1], and Zfp36 binds to unstable mRNA and promotes their degradation [@pone.0036964-Clement1]. Zfp36 has been proposed as an inducible attenuator of growth factor signalling, by promoting degradation of rapidly induced genes and thus restricting the cell\'s responsiveness to stimulation [@pone.0036964-Amit1]. Btg/Tob factors are thought to facilitate the rapid switch to a new gene expression program by speeding up the degradation of previously made mRNAs [@pone.0036964-Mauxion1]. For example, Btg2 activates BMP signalling [@pone.0036964-Park1]. Down-regulation of gene expression may therefore represent a general mechanism in the early response of chondrocytes to mechanical stress. Dynamic compression affects various aspects of chondrocyte physiology {#s3e} --------------------------------------------------------------------- Independently of the general down-regulation observed in gene expression, careful examination of the extended list of modulated genes indicates that some of them have already been identified as mechanosensitive genes involved in different aspects of cellular physiology like in cartilage, e.g. *Biglycan (Bgn)*, an extracellular matrix protein [@pone.0036964-Wang1], *Mmp9*, a matrix metalloprotease [@pone.0036964-Kisiday1], *Cyr61*, a regulator of chondrogenesis from the CCN family [@pone.0036964-Schild1], *Cited2*, a transcription co-regulator playing a key role in shear-induced regulation of MMPs in chondrocytes [@pone.0036964-Yokota1], or in other tissues, e.g. *Thrombomodulin (Thbd)*, a gene coding for an anticoagulant factor [@pone.0036964-Rossi1], *Lmo4*, a fluid flow-responsive transcription factor [@pone.0036964-Ni1], *Ptgs1/Cox1*, a cyclooxygenase involved in the production of prostaglandin E2 [@pone.0036964-Wang2], or *Ahnak*, a protein involved in Ca^2+^ signalling pathways and regulated exocytosis [@pone.0036964-Kessler1], [@pone.0036964-Borgonovo1]. The regulation of these genes reflects diverse cellular responses to mechanical stimulation. Interestingly, a subset of modulated genes, including *Pcm1* [@pone.0036964-Keryer1], *Nek1* [@pone.0036964-Shalom1], *Smo* [@pone.0036964-Chen2], *Cdk5rap2* [@pone.0036964-Barrera1], *Spop* [@pone.0036964-Chen3], *Dync2h1* [@pone.0036964-Ocbina1], *Syne1/Nesprin1* [@pone.0036964-Dawe1], *Topors* [@pone.0036964-Chakarova1] and Wnt signalling molecules [@pone.0036964-Lancaster1] such as *Fzd10, Sfrp1, Rspo3/Cristin1*, are linked to ciliary function ([Data S2](#pone.0036964.s002){ref-type="supplementary-material"}). The primary cilium has long been hypothesised to function as an antenna for chondrocytes to sense the biomechanical environment, as in renal cells [@pone.0036964-Nauli1], [@pone.0036964-Praetorius1]. Using the same chondrocyte-agarose constructs as those used here, Wann *et al.* have just provided the first direct experimental evidence that the primary cilium mediates mechanotransduction through control of calcium signalling in compressed chondrocytes [@pone.0036964-Wann1]. Previously, using bovine chondrocyte-agarose constructs and confocal microscopy, McGlashan *et al.* showed that the application of cyclic compression affects cilia length in a time-dependent manner [@pone.0036964-McGlashan1]. In addition, mechanical forces have been reported to play a role in primary cilia assembly/disassembly *in vitro* in other cell types [@pone.0036964-Iomini1], [@pone.0036964-Resnick1]. These observations are correlated with *in vivo* studies, where the presence or absence of cilia is linked to the intensity of shear stress in blood vessels [@pone.0036964-VanderHeiden1]. Therefore, the mechanosensitivity observed here for the subset of cilium-related genes may represent an early signal triggered by chondrocytes to adapt the length and/or function of the primary cilium in response to mechanical loading. Nevertheless, part of the RNA transcriptome corresponds to RNAs that do not code for proteins, referred to as non-coding RNAs (ncRNAs) [@pone.0036964-vanBakel1]. Microarray screening identified two down-regulated long ncRNAs in compressed chondrocytes: *Xist* and *Malat1* (1.57-fold and 1.42-fold, respectively, [Data S2](#pone.0036964.s002){ref-type="supplementary-material"}), which are two of the three large non-coding transcripts present in mammalian nuclei [@pone.0036964-Hutchinson1]. Furthermore, *Dicer1*, a gene coding for an endoribonuclease that processes pre-miRNAs into siRNAs [@pone.0036964-Kim1], was down-regulated by 1.81-fold upon compression. In particular, recent studies have shown that miRNA can control expression of alternative splicing regulators [@pone.0036964-Kalsotra1] and *Malat1* can control the activity of some miRNAs [@pone.0036964-Tripathi1]. This is particularly interesting because alternative splicing events have been recorded in bone following mechanical loading [@pone.0036964-MantilaRoosa1]. These findings suggest that modulation of ncRNA expression is part of the molecular response to mechanical stress. Moreover, it is possible that these ncRNAs participate in the regulation of pre-mRNA splicing in response to compression. Concluding remarks {#s3f} ------------------ The aim of this study was to perform an integrated analysis of mechanotransduction in chondrocytes at the gene and protein level. The originality of our analysis was to investigate early molecular events triggered by dynamic compression. Our study reveals that, in addition to the well-known involvement of the MAPK-signalling pathway in the chondrocyte mechanotransduction response, TGF-β signalling may also play a prominent role. In addition, our microarray analysis results provide new molecular insight into how chondrocytes sense dynamic compression. The candidate mechanosensitive genes identified here can serve as starting points for future investigations of mechanotransduction in chondrocytes. The availability of genetically modified mice offers an opportunity to study the impact of gene modification in chondrocyte mechanotransduction using the cell model system presented here. Ultimately, identifying candidate mechanosensitive genes can provide important information not only for the molecular understanding of mechanotransduction in chondrocytes, but also for cartilage engineering. For example, agarose (or agarose-alginate) hydrogels constitute clinically potential scaffolds for autologous chondrocyte implantation [@pone.0036964-Barlic1] and mechanical conditioning can be used to stimulate *in vitro* chondrocyte biosynthesis in 3D scaffolds before implantation. Therefore, mechanosensitive targets can help optimise mechanical conditioning for cartilage reconstruction. Materials and Methods {#s4} ===================== Ethics statement {#s4a} ---------------- Mouse care and treatment were conducted in accordance with institutional guidelines in compliance with national and international laws and policies. This study was specifically approved by our local ethics committee (Authorization n°69387416 given by the French Prefecture du Department du Rhone). Antibodies {#s4b} ---------- For type I and type II collagens, polyclonal rabbit antibodies against mature collagens were used (Novotec; references 20151 and 20251, respectively; used at 1∶2000 and 1∶5000, respectively). Monoclonal antibody (mAb) against collagen IX (23-5D1; 1∶6000) was a gift from Bjorn Olsen (Boston, MA). Polyclonal antibodies against α10 (1∶2000) and α11 (1∶4000) integrins were from Cartela AB (a gift from Evy Lundgren-Akerlund, Lund, Sweden). Antibodies against Phospho-Smad1/5/8 (\#9511), Phospho-Smad2 (\#3101), Phospho-ERK1/2 (\#9101), Phospho-p38 (\#9251), Smad2/3 (\#3102), ERK1/2 (\#9102), p38 (\#9212) and anti-rabbit IgG horseradish peroxidase (HRP)-linked antibodies were purchased from Cell Signaling Technology (all 1∶1000). Rabbit mAb to Smad1 (1649-1) and Smad5 (1682-1) were from Epitomics and used both 1∶1000 in mixture. Anti-Sox9 polyclonal antibody (AB5535, 1∶2000) and anti-FAK monoclonal antibody (clone 4.47, 1∶5000) were purchased from Millipore. Polyclonal rabbit antibodies against phosphoY397-FAK (1∶1000) were obtained from Biosource-Invitrogen. Anti-actin monoclonal antibodies (A5060, 1∶800) were purchased from Sigma-Aldrich. Anti-mouse (170-6520) or rabbit (170-6518) IgG-alkaline phosphatase conjugates and anti-mouse IgG-HRP conjugates (170-6516) were purchased from Bio-Rad, all used 1∶5000. Chondrocyte isolation and 3D culture {#s4c} ------------------------------------ Embryonic mouse chondrocytes were isolated from the costal cartilage of day 17.5 post-coitum mice. Like articular cartilage, rib cartilage is a hyaline-type cartilage. Immediately after enzymatic isolation, cells were embedded in 2% agarose gels at a density of 2×10^6^ cells/mL as described [@pone.0036964-Bougault2]. Chondrocyte-agarose gels were punched to form cylindrical constructs of 13 mm in diameter and 3 mm in thickness. They were then cultured in the wells of Biopress™ compression plates (Flexcell international) for 6 days in 5% CO~2~ at 37°C. The Dulbecco\'s modified Eagle\'s medium/Ham\'s F-12 culture medium was changed daily as previously detailed [@pone.0036964-Bougault2]. Serum was progressively substituted with insulin-transferrin-selenium and cultures were gradually supplemented with ascorbic acid (up to 20 µg/mL). Used as positive controls of dedifferentiation, other mouse chondrocytes were cultured in monolayer for one week, passaged once and cultured for another week. DNA content {#s4d} ----------- DNA quantification was performed using the Hoechst 33258 (Fluka) DNA stain. The calibration curve was obtained using a DNA standard solution (Invitrogen). Application of dynamic compression {#s4e} ---------------------------------- Chondrocyte-agarose constructs were subjected to compression using a previously characterised model system [@pone.0036964-Bougault2], [@pone.0036964-Bougault1]. The FX-4000C Flexercell Compression Plus System (Flexcell International) was used to apply dynamic compressive strain to agarose gels. Compressed constructs were subjected to cyclical compression ranging from 20 kPa to 40 kPa in a square waveform at a frequency of 0.5 Hz ([Figure 2](#pone-0036964-g002){ref-type="fig"}) for 5, 15 or 30 min. Control constructs were uncompressed. Protein extraction and analysis by Western blotting {#s4f} --------------------------------------------------- Protein extraction from the agarose gels was performed with special care to avoid any modification in the phosphorylation state of proteins [@pone.0036964-Bougault2]. For Western blotting, proteins were separated on 10% or 4--12% polyacrylamide gradient mini-gels and transferred to PVDF membranes (Millipore). The membranes were probed with the appropriate primary antibodies, washed and incubated with HRP- or alkaline phosphatase-conjugated anti-mouse or anti-rabbit IgG. After multiple washes, bound antibodies were detected on x-ray films using a Bio-Rad Immun-star or WesternC chemiluminescent substrate. The membranes probed with antibodies to collagens or integrins were sequentially re-probed after stripping (Re-Blot Plus Strong, Chemicon). A final re-probing with anti-actin antibodies served as a loading control. The membranes probed with antibodies to phospho-proteins were stripped and re-probed with antibodies that recognise all forms of the protein in question. Phosphorylation levels were quantified by densitometry using ImageQuant software (Molecular Dynamics). For each protein, the ratio of phospho-protein band intensity to the total protein band intensity was calculated and mechanically-induced phosphorylation was normalised to uncompressed controls. DNA microarray analysis {#s4g} ----------------------- Total RNA was extracted from chondrocyte-agarose constructs as previously described [@pone.0036964-Bougault2]. To ensure a sufficient quantity of RNA, extractions from six similar constructs were pooled. To ensure quality of RNA in each sample, integrity and purity were assessed using a capillary electrophoresis system (Agilent Bioanalyser, Agilent Technologies). DNA microarray analysis was performed on four independent experiments to compare gene expression levels between compressed (30 min compression) and uncompressed (control) constructs. Hybridisation was carried out following the Two-Colour Microarray-Based Expression Analysis protocol (Agilent Technologies) and 500 ng or 1 µg of purified total RNA were used for linear amplification. The resulting labelled cRNA from a compressed sample was co-hybridised with the labelled cRNA of the corresponding control sample to the Agilent Mouse Genome CGH Microarray 44 K probe set (Agilent Technologies). Each co-hybridization was performed several times starting from different total RNA preparations and using a dye swap. Each microarray contained 44,000 sequences spanning the whole mouse genome and control probes. The microarrays were scanned using an Innoscan 700 Microarray Scanner (Innopsys) at 532 nm (for detection of the Cy3 dye) and 635 nm (Cy5 dye). The resulting image was analysed using Mapix v3.1 software. The signal intensity of each spot was acquired and non-exploitable spots were filtered out. The statistical analysis and normalisation steps were done using the Limma (Linear Models for Microarray Data) package [@pone.0036964-Smyth1] in the statistical language R [@pone.0036964-Ihaka1]. The "global Loess" function was applied to the data to correct for bias. Normalised data were then averaged between direct and swapped comparisons to calculate values of differential expression and expression level. A classification of statistically significant modulations was obtained using a moderated Student\'s *t*-test with a Bayesian false-discovery rate approach [@pone.0036964-Lnnstedt1]. Analysis of genes associated with cell function was carried out using the PANTHER (Protein ANalysis THrough Evolutionary Relationships) classification system (<http://www.pantherdb.org>) and Pathway-Express (<http://vortex.cs.wayne.edu/Projects.html>) profiling system to identify protein categories or biological pathways which may be associated with modulated gene expression (with M\>0.5 and p\<0.01). Confirmation of modulation in gene expression by real-time PCR {#s4h} -------------------------------------------------------------- Real-time PCR analysis was performed on three independent experiments as previously described [@pone.0036964-Bougault2]. Levels of gene expression were determined by using the comparative Ct method with *RPL13a* gene as the endogenous control. Primer pairs used in this study are described in [Table 2](#pone-0036964-t002){ref-type="table"}. Dissociation curves were conducted at the end of each run to verify the absence of DNA contamination. Student\'s *t*-test (paired, two-tailed) was used for statistical analysis. Supporting Information {#s5} ====================== ###### ERK1/2 and p38 transient compression-induced activation in chondrocyte-agarose constructs. [Legend:]{.ul} Chondrocytes cultured in agarose for 6 days underwent dynamic compression (+) or were not compressed (−) for the indicated times and phosphorylation levels of ERK1/2 and p38 were analysed on Western blots. (A) Representative blots. (B) Densitometric analysis was performed on four (5 and 15 min) or three (30 min) independent experiments. The phospho-MAPK to total MAPK ratio was calculated and mechanically induced phosphorylation was normalised to uncompressed controls. Bars represent the compression-induced phosphorylation modulation (mean fold change +/− SD), either up-regulation (red) or down-regulation (green) (\* p\<0.05). (TIF) ###### Click here for additional data file. ###### Results from DNA microarray analysis: gene expression levels in compressed samples were compared to uncompressed control samples (fold change \>1.4 and p-value \>0.01). (XLS) ###### Click here for additional data file. ###### Results from DNA microarray analysis: modulated coding transcripts eligible for functional annotation (PANTHER analysis). (XLS) ###### Click here for additional data file. ###### Results from DNA microarray analysis: modulated coding transcripts sorted by protein class (PANTHER analysis). (XLS) ###### Click here for additional data file. We thank Daniel Hartmann (Novotec, Lyon, France) for providing the polyclonal antibodies against type I and II collagens and Evy Lundgren-Akerlund (Cartela AB, Lund, Sweden) for providing the monoclonal antibody against α10 integrin and polyclonal antibodies against α11 integrin. We also thank the technical facilities of SFR BioSciences Gerland-Lyon Sud (US8/UMS3444) for the quantitative PCR analyses. **Competing Interests:**The authors have declared that no competing interests exist. **Funding:**This work was financially supported by the CNRS, Université de Lyon, and ANR TecSan 2006. CB was supported by the French Ministry of Research. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. [^1]: Conceived and designed the experiments: CB EAF FMG. Performed the experiments: CB EAF AP LH. Analyzed the data: CB EAF DH. Wrote the paper: CB EPG MDC FMG.
{ "pile_set_name": "PubMed Central" }
Q: Checking visibility of layer in KineticJS I am trying to figure out how to check whether or not a layer in KineticJS is visible. I need this in order to appropriately toggle the visibility of any given layer when the user clicks a button. If it's visible, I want to hide it when they click the button. If it isn't visible, then I want to show it. Thoughts? I saw that there is a isVisible function, but nothing at all happens when I try to use it on a layer. The below code doesn't error, but it isn't doing anything. This is written in KineticJS on Angular. In my tests, I found that this event is appropriately getting triggered, so it's not that. I also found that the draw function is appropriately firing. scope.$on('layertoggle', function(event){ var layerShapes = scope.kineticStageObj.get('#layer1'); if(!layerShapes.isVisible()){ layerShapes.hide(); } else{ layerShapes.show(); } scope.kineticStageObj.draw(); }); A: Try this: var layerShapes = scope.kineticStageObj.get('#layer1')[0]; get returns a collection of shapes that match that criteria. Despite id being unique, you still have to access the first position of the array to access the desired shape.
{ "pile_set_name": "StackExchange" }
Q: Remove all just before closing I would like to remove any <br> tag which comes up just before a closing </p> tag. For example this is ok : <p>Bla bla bla <br> bla bla </p> But this is NOT ok : <p>Bla bla bla <br> </p> In other words, every time I have : <br> + white space or tab or new line or whatever providing no content + </p> Then, I want to remove that <br>. How would this be achieved with javascript Regex ? (or any other javascript way) A: Try this one: Iterate through each p, get its html (not text, in order to get the <br> element), replace the <br> with empty string using regex (one that matches <br> just before the </p>), replace the original with the updated html. $('p').each(function(){ var p = $(this); p.html(p.html().replace(/(<br)\s?\/?>\s?$/g,'')); }); REGEX: /(<br)\s?\/?>\s?$/g matches: <br>, <br/>, <br />, <br >
{ "pile_set_name": "StackExchange" }
Category: Computer I’m in the middle of a large upgrade to my primary media NAS running unRAID. I upgrade the OS to version 6. It is much more polished. I also upgraded the Parity drive to a 6TB hard drive. It is a Seagate ST6000VN0001 hard drive. I really like the Western Digital in the 4TB range but in 6TB Seagate benchmarks much better, and they only run 1-2 degrees warmer than the WDC Reds. So the parity calculation took seemingly forever. I must have refresh the status page 500 times and compared my remaining time calculations with the software many times. The unRAID estimate would fluctuate wildly between a few minutes and weeks. The actual time was close to my calculations which were averaged over several days. It didn’t help that I was doing a data load simultaneously as well. Nothing like stress testing your hardware. In the end it finally finished after 3 days, 17 hours and 46 minutes. The main function is to serve video and audio content via Plex to all the TVs and iPads in the house. Plex makes life pretty nice. When I switched from Firefox to Chrome about six years ago it was like a breath of fresh air. It was clean, super lightweight, and most importantly it was fast, really fast. I had never seen Javascript render so fast. Those days are long since gone. Google has fallen victim to its own success. Google keeps adding more and more features and the browser keeps getting heavier and slower. Plugins generally are heavy weight and slow. A few still retain much goodness. After the terrific plugin YouTube Options shot themselves in the head by charging a ridiculous monthly fee a new one emerged called Magic Actions for YouTube. It is a super useful plugin and I like it except for one thing. They decided upon the super-idiotic route that flash control panel took; you change options from a live web site. They do this for several reasons. It allows them to advertise more easily and they can more obnoxiously beg for money. Fortunately I only have to go there a once or twice a month to change things. The other annoyance is they add a toolbar beneath the youtube window which I never ever have had a reason to use and they refuse to let you disable it. Like I can’t remember I am using your plugin? Oh that’s right you put it there for more subscriptions to your YouTube channel. Shameless. These are my must have plugins: Youtube switched from Flash video as default to HTML5 as default. This is one more welcome nail in the Flash coffin. However, we lost video larger than 2k (1080p) and WebM container format via the VP9 codec does not look as good. It looks good but the difference is noticeable. Sorensen Spark is superior. This is coming from a tried and true Flash hater. I can rant about browser plugins forever. But I digress … Chrome consumes gobs of memory. This is a screen shot of the memory usage after running Chrome for five minutes. As you can see Chrome is using a ton of memory. This is absurd. I also see millions of there error messages in my logs: kernel[0]: Google Chrome He (map: 0xffffff80bb8b21e0) triggered DYLD shared region unnest for map: 0xffffff80bb8b21e0, region 0x7fff94e00000->0x7fff95000000. While not abnormal for debuggers, this increases system memory footprint until the target exits. I had to finally resort to disable the error reporting as my logs became useless: $ sudo sysctl -w vm.shared_region_unnest_logging=0 Google, please fix this crap. Your features deployment have overtaken your stability. I really don’t want to have to switch back to Firefox. I really don’t. I’m so sick of it. I’ve stumbled across tons of 404s on their site as well. Page render times are terrible as well. Sometimes 20 to 30 seconds to render a page. Trying to plan your trip using their tools is pretty painful. Their pages are in no way optimized. Look at this one stat: 3578 rules (87%) of CSS not used by the current page There are other horrific examples. I had to call tech support for My Disney Experience to get our accounts to be able to access a single itinerary. The CSR told me that most people just share a login. What is with go.com for all their sites. Seriously how does it help SEO, no one remembers you use go.com for anything, give it up already. It is a horrible idea that should be long retired at this point. In terms of password security, they don’t allow non alpha-numeric characters to be used. They allow four character passwords of all lower case numbers or letters. They allow 1234 as a password. Yikes. The password recovery tool sends email and it comes from a twdc.com domain which is not immediately recognizable although they do a domain forward to thewaltdisneycompany.com if you investigate a little. They really should have an immediately recognizable domain for email. The best part is in the footer they say the following: Copy and paste mydisney@disney.com into your address book to ensure optimal receipt of these communications. Talk about a mess for people who like to have some semblance of email security. The worst security is probably over the phone. The only thing they verify a caller against is the name and address on the account. They then tell you the current email address and ask if you if that email address is correct. They also still have SSLv3 enabled which makes them vulnerable to POODLE attacks. The certificate uses a weak signature, SHA1. Perhaps upgrade to at least SHA2. This server accepts the RC4 cipher, which is also weak. The server does not support Forward Secrecy with the any browsers i tried. Disney … get it together. I finally have Google Fiber installed and it is fast … very fast. The service technician was very clueless about the networking side of the technology but was well versed in the TV and physical plant used by Google. Here is one of the speed test results: The above results are fairly typical. I have run the tests several times. In fact it is so fast that it breaks the normal Ookla speedtest. It actually generates a weird error. You have to use a special site provided by Google. http://provo.speedtest.googlefiber.net/ It runs the Ookla software so I don’t suspect any shenanigans. Here is an index of the various tests. http://www.speedtest.net/isp/google-fiber I suspect that most of the tests were done via a wireless device. The WiFi APs in the house are only capable of 600 Mbps. When I had great signal strength I could only manage about 250 Mbps through wireless. I suspect with TCP overhead and driver overhead the MacBook Pro I with a Thunderbolt to ethernet was using couldn’t drive the connection any faster. Given typical TCP overhead of around 3% that would be 30 Mbps on a 1000 Mbps connection. It’s funny that that the wasted bandwidth of TCP overhead exceeds most peoples internet connections. The best part about Google Fiber is that it replaced Comcast. The Comcast service was terrible. Truly undeniably awful. The customer service was downright bad. Every CSR I ever interacted with was clueless and knew nothing beyond “reboot” your modem. You got completely difference answers depending upon whom you spoke with. You can add my vote to the “worst company in America.” Earlier this year Comcast fearing significant customer loss to Google Fiber came through the neighborhood and upgraded all the STBs in the house to the latest and also upgraded the Internet connection speed from 20/5 to 250/100, all with no cost increase. The true speeds were nowhere near what you were paying for at all. In fact they lowered the price by $75 per month. It was such a joy to send back all that crappy Comcast equipment. When I called to cancel service with Comcast they tried to keep me as a customer. I explained there was no offer that could match the Google offering. The local Comcast office transferred me to a retention CSR. She tried anyway; all in vain. She said she could offer me $99 per month service for TV, phone, and Internet for six months. I told her I needed gigabit speeds and it would have to be free for six months. She thought I was joking, I wasn’t in the slightest. It was obvious she was getting quite a few of these kinds of calls. I have no sympathy for Comcast. It is really quite amazing what happens when a monopoly faces some competition. Even if Google Fiber is not available where you live you have to appreciate that Google has really stirred up a fairly stagnant market. Almost all ISPs had very little incentive to increase the connection speeds. Centurylink is a major ISP in the Utah area and they now are advertising that Gigabit speeds are now available. Of course it is all marketing and I can’t find a single address or person that is eligible for the service. But at least someone has kicked these companies butts into gear. Google may track and record everything you do like a mini-NSA but at least they provide a good service. Good riddance Comcast. There are a few annoyances with the service. First the TV STB’s can act as WIFi Access Points which is great. However you cannot have separate SSIDs for the 2.4GHz and the 5GHz frequencies. It is pretty annoying. You can have separate SSIDs on the network box. Having the STBs act as WAPs is a great feature but is hampered by some lack of functionality. There are basically no advanced options for the TV STBs. They are disabled as APs by default. The Storage Box provides 2 TB of storage space, which allows you to store up to 500 hours of HD programming, and connects to the TV Boxes using MoCA or Ethernet. If MoCA fails it will fall back to ethernet. A complete list of devices is here: https://support.google.com/fiber/topic/6005232?hl=en&ref_topic=6063014 The TV UI is pretty polished and highly responsive. In fact it is so responsive that if you rapidly click buttons on the remote control you can outpace the UI and it will queue up all those commands and execute them all which can lead you somewhere you didn’t intend to go. The Comcast IR remote was so unresponsive and slow to respond to input that you would furiously mash buttons in the hope the UI would react only to be disappointed and frustrated. It would ignore all other commands as well. The Google TV remote connects to the STB via Bluetooth. It also does IR for your TV. The Nexus 7 tablet is also a pretty nice little device. You can fling content like YouTube to your TV from it. The TV control interface on the Nexus is really pretty bad and hard to figure out what to click on. The flat UI does not lend itself to intuitiveness. I found myself often looking around for where to push an Okay button as it would be in random places on a particular page. The lack of contrast in the interface causes lots of issues. The Google Fiber TV app needs a lot of work. The program guide on the TV UI is pretty nice except on thing. The program description is crammed vertically between the channel numbers and the times. It is awkward to read. This really needs to be displayed horizontally instead. Also there is a vertical bar that covers all the program descriptions to indicate a more precise time indication. It should be shortened to display in the row of time blocks instead of covering the whole UI. The remote is connected to the STB via Bluetooth. It performs very well. All companies should stop selling IR remotes immediately. Not having to aim the remote is not only enhancing my already significant laziness it makes me feel even more in control. However, if you have a receiver providing audio out to speakers there is no way to program the remote to change the volume on the receiver. This is a a major oversight. It would be nice to just use the Google TV remote for all functions. In the help section for Google Fiber there is no help about how to program it with a receiver except this annoying line: “If you are familiar with electronics, you can certainly come up with your own creative way to connect!” The page also says, “… supports only controlling the volume on your TV …” They even say it won’t work, “…the Google Fiber remote control is not programmable to control external audio equipment.” Google please fix this. The Google Fiber website integrates nicely with your existing Google account. Unlike every other TV service provider out there, there are no annoying ads for movies and Pay Per views. It is typical Google clean and well designed. Companies like Comcast and DirecTV could learn a thing or two. Instead of hiding useful features behind upgrade links they should make the web site useful. I love this VMware Fusion updater screen. It provides no information. Nothing useful like how fast it is downloading, or maybe where it is connecting to, or even how far along it is. Way to go VMware developers for giving us lots of information.
{ "pile_set_name": "Pile-CC" }
"Dr. Moleski, thanks also for providing a bridge between the school district and B.’s family. Things had devolved to the point that neither side was really listening to the other, and your involvement with this case has significantly changed that dynamic. Through this experience I now appreciate the limitations of our school psychologists, and will not delay in calling you again for our complex cases."
{ "pile_set_name": "Pile-CC" }
CORVALLIS, Ore. -- Deven Hunter was fed up with losing to Stanford. The Oregon State senior forward had lost all her previous career games to the Cardinal. In fact, the Beavers hadn't defeated Stanford in the past 29 tries. Hunter had 19 points with 12 rebounds and No. 12 Oregon State rallied to beat No. 11 Stanford 58-50 on Sunday night. The last time Oregon State beat Stanford was in 2001, an 81-65 victory in Corvallis. Jamie Weisner added 18 points, including a key 3-pointer with just under a minute left, as the Beavers (14-3, 5-1 Pac-12) erased a 15-point third-quarter deficit. Weisner said Hunter made her intentions clear during a late timeout: "We were all trying to calm Deven down, but she's `No, no, I'm not getting blown out by this team four years in a row." Kailee Johnson had 14 points and Erica McCall added 12 for the Cardinal (14-4, 4-2 Pac-12). Hunter's 3-pointer cut Stanford's lead to 46-40 with 6:14 left, before Weisner added a jumper and Katie McWilliams nailed a 3 to get Oregon State within two with 4:46 to go. The Beavers had a chance to tie it but Weisner missed one of a pair of free throws. It didn't matter, because she hit a 3-pointer that gave Oregon State a 48-46 lead with 3:03 left. Weisner sealed it with a 3-pointer that gave the Beavers a 55-48 lead with 57 seconds left. She pumped her fists as the crowd at Gill Coliseum erupted. Oregon State and Stanford are among five ranked teams in the Pac-12. USC, which was ranked No. 25, fell 69-60 at Washington. Arizona State, the league's top-ranked team at No. 10, beat Utah 80-60 to remain undefeated in conference play. "You know you're going to get (Stanford's) absolute `A' game when you play them especially with what's riding on it, like it was tonight. And for 30 minutes it was like a depressing scene out there," Oregon State coach Scott Rueck said. "We're off our game, it's not fun, it's a struggle. When you're off your game it's just miserable," Rueck said. "Then, things changed. The last 12 or 13 minutes were an absolute blur. It's a stretch of basketball we'll never forget." Although there was some speculation she might return for the Cardinal, the Beavers remained without Sydney Wiese because of a right hand injury. Wiese has missed seven games. McCall started for Stanford after missing Friday night's 64-62 victory at Oregon. "I thought we did a really good job for three quarters and the fourth quarter really got away from us," Stanford coach Tara VanDerveer said. "The game is four quarters and it doesn't do any good to win three of them." Hunter had eight points and three rebounds early and Oregon State led 12-11 after the first quarter. But when OSU's shooting went cold in the second quarter, Stanford responded and went up 24-16 after McCall's jumper. Stanford's 11-0 run was broken when Hunter hit a 3-pointer and Weisner added a pullup jumper to narrow the gap to 30-21 at the half. The Cardinal stretched the lead to 38-23 in the third quarter after McCall's layup, but Oregon State pulled within 40-30 heading into the last period. The Beavers were coming off a 70-48 rout of Cal on Friday night. TIP INS Stanford: The Cardinal are 53-7 all-time against Oregon State. ... Stanford's other loss came against Arizona State on Jan. 4. Oregon State: The last time the two teams met was back in February, when the Cardinal defeated the Beavers 69-58 in Corvallis. The loss delayed Oregon State from clinching its first conference regular-season title. ... Oregon State's lone conference loss came at UCLA on Jan. 4. HUNTER'S 3s: Hunter finished with a career-best five 3-pointers. In total, Oregon State had eight compared to just two for Stanford. "To be honest, in warmups I didn't miss one," she said. "So I was like `Don't think about it. Don't think about it. Because then you're going to miss every single one!" UP NEXT Stanford visits USC next Friday night. Oregon State visits Utah on Friday night.
{ "pile_set_name": "OpenWebText2" }
...And a Time to Dance ...And a Time to Dance is a 1983 EP by Los Lobos. It was co-produced by T-Bone Burnett and Steve Berlin (not yet a full-time member of the band) and was the band's first release on Slash Records. The EP brought the band its first wide acclaim. It was voted best EP of the year in the Village Voice'''s influential Pazz & Jop critics poll. Critic Robert Christgau gave the record an "A-" in his Consumer Guide, calling it "good old rock and roll East L.A. style." Trouser Press raved about "a spicy romp (in two languages) back and forth across musical borders few can traverse with such ease," while Rolling Stone'' called it "an infectious dance record that deserves to be heard by rock fans." The track "Anselma" won the first Grammy Award for Best Mexican-American Performance. The album was mixed and recorded entirely digitally. Track listing Personnel David Hidalgo – guitar, accordion, vocals Cesar Rosas – guitar, bajo sexto, vocals Louie Pérez – drums, vocals Conrad Lozano – bass, vocals, guitarrón Additional personnel Steve Berlin – saxophones References Category:Los Lobos EPs Category:1983 EPs Category:Albums produced by T Bone Burnett Category:Rough Trade Records EPs Category:Slash Records EPs
{ "pile_set_name": "Wikipedia (en)" }
// Go support for Protocol Buffers - Google's data interchange format // // Copyright 2010 The Go Authors. All rights reserved. // https://github.com/golang/protobuf // // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions are // met: // // * Redistributions of source code must retain the above copyright // notice, this list of conditions and the following disclaimer. // * Redistributions in binary form must reproduce the above // copyright notice, this list of conditions and the following disclaimer // in the documentation and/or other materials provided with the // distribution. // * Neither the name of Google Inc. nor the names of its // contributors may be used to endorse or promote products derived from // this software without specific prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. package proto /* * Support for message sets. */ import ( "errors" ) // errNoMessageTypeID occurs when a protocol buffer does not have a message type ID. // A message type ID is required for storing a protocol buffer in a message set. var errNoMessageTypeID = errors.New("proto does not have a message type ID") // The first two types (_MessageSet_Item and messageSet) // model what the protocol compiler produces for the following protocol message: // message MessageSet { // repeated group Item = 1 { // required int32 type_id = 2; // required string message = 3; // }; // } // That is the MessageSet wire format. We can't use a proto to generate these // because that would introduce a circular dependency between it and this package. type _MessageSet_Item struct { TypeId *int32 `protobuf:"varint,2,req,name=type_id"` Message []byte `protobuf:"bytes,3,req,name=message"` } type messageSet struct { Item []*_MessageSet_Item `protobuf:"group,1,rep"` XXX_unrecognized []byte // TODO: caching? } // Make sure messageSet is a Message. var _ Message = (*messageSet)(nil) // messageTypeIder is an interface satisfied by a protocol buffer type // that may be stored in a MessageSet. type messageTypeIder interface { MessageTypeId() int32 } func (ms *messageSet) find(pb Message) *_MessageSet_Item { mti, ok := pb.(messageTypeIder) if !ok { return nil } id := mti.MessageTypeId() for _, item := range ms.Item { if *item.TypeId == id { return item } } return nil } func (ms *messageSet) Has(pb Message) bool { return ms.find(pb) != nil } func (ms *messageSet) Unmarshal(pb Message) error { if item := ms.find(pb); item != nil { return Unmarshal(item.Message, pb) } if _, ok := pb.(messageTypeIder); !ok { return errNoMessageTypeID } return nil // TODO: return error instead? } func (ms *messageSet) Marshal(pb Message) error { msg, err := Marshal(pb) if err != nil { return err } if item := ms.find(pb); item != nil { // reuse existing item item.Message = msg return nil } mti, ok := pb.(messageTypeIder) if !ok { return errNoMessageTypeID } mtid := mti.MessageTypeId() ms.Item = append(ms.Item, &_MessageSet_Item{ TypeId: &mtid, Message: msg, }) return nil } func (ms *messageSet) Reset() { *ms = messageSet{} } func (ms *messageSet) String() string { return CompactTextString(ms) } func (*messageSet) ProtoMessage() {} // Support for the message_set_wire_format message option. func skipVarint(buf []byte) []byte { i := 0 for ; buf[i]&0x80 != 0; i++ { } return buf[i+1:] } // unmarshalMessageSet decodes the extension map encoded in buf in the message set wire format. // It is called by Unmarshal methods on protocol buffer messages with the message_set_wire_format option. func unmarshalMessageSet(buf []byte, exts interface{}) error { var m map[int32]Extension switch exts := exts.(type) { case *XXX_InternalExtensions: m = exts.extensionsWrite() case map[int32]Extension: m = exts default: return errors.New("proto: not an extension map") } ms := new(messageSet) if err := Unmarshal(buf, ms); err != nil { return err } for _, item := range ms.Item { id := *item.TypeId msg := item.Message // Restore wire type and field number varint, plus length varint. // Be careful to preserve duplicate items. b := EncodeVarint(uint64(id)<<3 | WireBytes) if ext, ok := m[id]; ok { // Existing data; rip off the tag and length varint // so we join the new data correctly. // We can assume that ext.enc is set because we are unmarshaling. o := ext.enc[len(b):] // skip wire type and field number _, n := DecodeVarint(o) // calculate length of length varint o = o[n:] // skip length varint msg = append(o, msg...) // join old data and new data } b = append(b, EncodeVarint(uint64(len(msg)))...) b = append(b, msg...) m[id] = Extension{enc: b} } return nil }
{ "pile_set_name": "Github" }
March 31, 2008 (Sorry about all the fisheye. I was traveling light, walking over the bridge yesterday, and I had to commit to one lens — to seeing the world this way. Frankly, by now, it looks completely normal. Are you sure your peripheral vision isn't curved? I think it is!) UPDATE: I bought a new lens. Look for a new point of view coming soon. 19 comments: I agree about peripheral vision being curved, though perhaps the fact that the back of the eye is spherical (rather than flat, as a film plane or optical sensor) mitigates the size distortion at the edge of the field. I think if you get close enough to the picture that it fills your entire field of vision, the lines all become normal. What the fisheye does is let you get a full view of your whole vision, which you ordinarily can't really look at, if you know what I mean. You see, but you don't entirely see what you see because you can't look directly at your peripheral vision. Nice picture, only undid by that sign on the upper Left which disrupts the curve of building space and shows the pic is distorted. Otherwise love the composition, the multi-colored hangers, various shapes and especially the shodows making the mannequin heads "heroic, with depth to their features". I'd love to have taken that pic...Most Althouse photos are a treat. rhhardin and Trooper York - I have a Jari sickle-bar field and brush mower. One meter of chattering, gyrating triangular teeth that cuts through anything up to a 3/4 inch sapling like butter - and 2-inch saplings if you just let the machine gnaw away on one a few moments. Kind of scary looking and scary in accident potential to the careless...Would make a great addition to a slasher flick. A lot of fun to use.
{ "pile_set_name": "Pile-CC" }
166 Cal.App.3d 428 (1985) 212 Cal. Rptr. 425 THE PEOPLE, Plaintiff and Respondent, v. JUAN TORRES SOTO, Defendant and Appellant. Docket No. F002935. Court of Appeals of California, Fifth District. March 29, 1985. *430 COUNSEL Kyle Gee, under appointment by the Court of Appeal, for Defendant and Appellant. John K. Van de Kamp, Attorney General, Robert D. Marshall, Eddie T. Keller, Eileen Ceranowski and Jane Lamborn, Deputy Attorneys General, for Plaintiff and Respondent. [Opinion certified for partial publication.[1]] *431 OPINION FRANSON, Acting P.J. — INTRODUCTION The primary issues in this appeal from a conviction of second degree murder and robbery are, first, whether the trial court erred in reimpaneling the jury to correct an ambiguity in the murder verdict after the jury had been discharged and the jurors had left the courtroom; second, if the court did so err, what is the result of the ambiguous verdict as originally returned — does it result in appellant's acquittal of the murder charge, a conviction of second degree murder, or a reversal and remand for a new trial? (1a) In answer to the first question, we hold that the trial court had no power to reimpanel the jury after its discharge and the jurors had left the courtroom; hence, the later verdict of second degree murder and its entry in the record were of no effect. (2a) In answer to the second question, we hold the original verdict returned by the jury may not be construed as a conviction of second degree murder but only as a general verdict of acquittal of murder. As a consequence, the double jeopardy clauses of the federal and state Constitutions forbid a remand for a new trial. Appellant is entitled to the entry of a judgment of acquittal on the murder charge. We do, however, affirm appellant's conviction of robbery, including the special allegation of a prior serious felony conviction under Penal Code section 667, subdivision (a). THE CASE BELOW A first amended information was filed against appellant Juan Torres Soto and Adolpho "Chino" Castaneda on August 31, 1982, charging them in count I with murder (Pen. Code, § 187). It was alleged as a special circumstance that the murder was committed during the commission of a robbery (Pen. Code, § 190.2, subd. (a)(17)(i)). There were also two special allegations that appellant had previously been convicted of a serious felony (Pen. Code, § 667), a special allegation that in the commission of the murder offense the appellant personally used a firearm (Pen. Code, §§ 12022.5, 1203.06, subd. (a)(1)) and a special allegation that a principal in the commission of the murder was armed with a firearm (Pen. Code, § 12022, subd. (a)). In count II, appellant and Castaneda were charged with robbery (Pen. Code, § 211). It was specially alleged that appellant personally used a firearm in the commission of the robbery (Pen. Code, §§ 12022.5, 1203.06, subd. (a)(1)), and that a principal in the commission of the offense was armed with a firearm (Pen. Code, § 12022, subd. (a)). Count III charged *432 appellant and Castaneda with conspiracy to commit robbery (Pen. Code, §§ 182, 211) with three overt acts. Appellant pleaded not guilty to all charges and denied the special circumstance and the enhancement allegations. A motion for separate trials for appellant and Castaneda was granted. On October 22, 1982, appellant's motion to have the identity of confidential informants revealed was denied by the trial court without an in camera hearing. The court found: "There is no indication that the informant was a percipient witness to any fact which would tend to exonerate the defendant." This court subsequently granted a peremptory writ of mandate ordering the trial court to hold an in camera hearing on this matter. Following the in camera hearing on January 5, 1983, the trial court ordered that the identity of informant Robert Renteria be disclosed. (The identity of a second informant, Leonard Ponce, was voluntarily disclosed at the hearing.) On May 27, 1983, appellant filed a motion to dismiss (a Mejia-Hitch[2] motion) based on the prosecutor's earlier failure to disclose the identity of the informants before they became unavailable to testify. This motion was denied as was a motion for sanctions for failure to preserve evidence. After a four-week trial, the jury returned one verdict form finding appellant not guilty of count I, murder, but also fixing the murder to be of the second degree. In another form, the jury found as true that appellant had been armed with a firearm in the commission of the murder. Another verdict form found appellant guilty of count II, robbery; appellant was also found to have been armed with a firearm in the commission of the robbery. Still another verdict form found that murder was committed in the course of the robbery. The jury found not true the allegations that appellant used a firearm during the commission of the murder within the meaning of Penal Code sections 12022.5 and 1203.06, subdivision (a)(1), and not true that appellant personally used a firearm during the commission of the robbery. Appellant admitted one of his prior convictions. (The other prior conviction allegation had been stricken earlier.) After the verdicts were read to the jury, the trial judge asked the jurors if those were their verdicts, and they unanimously affirmed they were. The parties waived a formal polling of the jury. At this point, a colloquy ensued *433 between the court and counsel to the effect that the verdict was of second degree murder,[3] and the jury was then discharged. The following day, the trial judge noticed the ambiguity in the verdict forms noted above. He ordered the jury reimpaneled to clear up the ambiguity; the jury then found appellant guilty of second degree murder. Appellant was sentenced on count I to fifteen years to life for second degree murder with one year for the Penal Code section 12022, subdivision (a) special allegation and five years for the Penal Code section 667 special allegation. Appellant's total determinate sentence was six years to be followed by the indeterminate fifteen-year sentence. Appellant was sentenced on count II, robbery, to the upper term of five years to be served concurrent with the indeterminate fifteen-year term for murder because of Penal Code section 654, the robbery term to be stayed pending completion of the murder sentence. THE FACTS The victim was found shot to death on the front seat of an automobile in the parking lot of a Visalia market on the evening of June 17, 1982. The palm print of appellant's codefendant Castaneda was found on the roof of the car. Earlier that evening at 7:30 p.m., a Mr. and Mrs. Lewis had driven by the parking lot and reported seeing a man sitting in a car with two men standing alongside it. One of the two men was tall and thin, the other, shorter and stockier. Mr. Lewis had about a six-and-a-half second look at the men. He could only say that the taller man had shoulder length hair and a moustache. Mrs. Lewis had a three second look at the men. She described the short man as having short black hair and a cream-colored complexion and the taller man as having long black hair, a moustache, a thin face, dark circles under his eyes, thick eyebrows and sharp features. In a photo lineup on June 21, 1982, Mrs. Lewis tentatively identified one Juan "Big John" Vasquez as the shorter, stockier man. She did not identify *434 Castaneda, however, in this or a second photo lineup even though his picture was present in both. Both Mr. and Mrs. Lewis identified appellant in a photo lineup on June 25, 1982, although Mr. Lewis thought appellant had been the taller, thinner man while Mrs. Lewis apparently thought he had been the shorter, stockier man. Margie Vasquez, sister of Juan Vasquez whom Mrs. Lewis had tentatively identified at one photo lineup, testified at the preliminary hearing[4] that she was a heroin addict and had knowledge of the incident in question. She testified that she, her boyfriend Castaneda and appellant were together on the day of the murder and had discussed buying heroin. Ms. Vasquez claimed she gave Castaneda the name of a heroin dealer and that Castaneda and appellant arranged to meet him in the parking lot in question. Appellant had a gun when he left with Castaneda to meet the dealer, she claimed. Ms. Vasquez testified she saw Castaneda and appellant one and a half hours later; appellant had blood on his hands and stated his hands were bloody because he had to move the man he had killed to get the man's wallet. Castaneda showed Margie $80 and some heroin; the heroin was then divided and used by Castaneda, appellant and Margie. The chief investigating officer testified that he had spoken with two informants after the crime. The first informant told him Castaneda and "Big John" (Juan) Vasquez committed the crime, and the second informant said "Big John" Vasquez did the shooting. One of the informants told the officer he had gotten his information from Catalino Carranza who was reported to be the "connection" who put Castaneda (and appellant) in touch with the victim on the day of the crime. Several witnesses testified appellant was having dinner with them at the approximate time of the shooting. DISCUSSION (1b) I. The trial court had no power to reimpanel the jury after it had been discharged and had left the courtroom; hence, the second degree murder verdict after reimpanelment of the jury is a nullity. The seminal case of People v. Lee Yune Chong (1892) 94 Cal. 379 [29 P. 776] holds that a jury is powerless to reconsider or amend its verdict *435 once it has been formally discharged by the trial judge and the jury has left the courtroom. In Chong, the jury found the defendant guilty of murder and indicated a sentence of life in prison, but neglected to determine the degree of the murder. The verdict was declared and recorded. The jury was discharged and left the courtroom. About 10 minutes later, before the jurors had left the courthouse, the trial court reimpaneled the jury and instructed them to amend the verdict by fixing the degree of the crime. The jury retired and found the defendant guilty of first degree murder and again fixed the penalty as life imprisonment. Finding the trial court's actions improper, the Supreme Court stated: "... but it is clear that during that time [after discharge] they were beyond the control of the court, had thrown off their characters as jurors, and had mingled with their fellow citizens, free from any official obligation." (Id., at p. 384.) "It is quite clear that all the proceedings by which the court reassembled the persons who had constituted the jury, and instructed them to find another verdict, and the so-called second verdict itself, were nullities. `With the assent of the jury to the verdict as recorded, their functions with respect to the case cease, and the trial is closed'; and `after the verdict is received and the jury discharged, .... the control of the jury and of the court over such verdict is at an end. The court cannot alter it, nor can the jury be called to alter or amend it.... The office of a juror is discharged upon the acceptance of his verdict by the court.' [Citations.]" (Id., at pp. 384-385.) "The case stands, therefore, as though there had been no attempt to revive the defunct jury, or to change the real verdict." (Id., at pp. 385-386; see also People v. Grider (1966) 246 Cal. App.2d 149, 154 [54 Cal. Rptr. 497]; People v. Thornton (1984) 155 Cal. App.3d 845, 855-856 [202 Cal. Rptr. 448]).) In the present case, after the inconsistent verdicts were returned by the jury, read by the clerk and affirmed by the jury in open court, the jury was discharged and left the courtroom, the trial judge specifically giving them permission to discuss the case with others. Pursuant to Chong, all actions of the trial court and the jury pertaining to the murder verdict after the discharge and loss of control by the court were nullities. Thus, we must examine the original verdict forms "as though there had been no attempt to revive the defunct jury, or to change the... verdict." (People v. Lee Yune Chong, supra, 94 Cal. at pp. 385-386.) (2b) II. The first verdict rendered by the jury constitutes a general verdict of not guilty of murder; hence, appellant is entitled to a judgment of acquittal on the murder charge. Count I charged appellant specifically with "murder in violation of section 187 ... in that ... [the appellant] did willfully, unlawfully, and with malice aforethought murder ..., a human being." The jury returned a *436 verdict form of "not guilty of murder as charged in count I ... and fix[ed] the degree of the offense as murder in the second degree."[5] Appellant argues that the verdict "not guilty of murder as charged in count I" operates as a general verdict of acquittal of the murder charge as a matter of law. He cites Penal Code section 1151 which provides: "A general verdict upon a plea of not guilty is either `guilty' or `not guilty,' which imports a conviction or acquittal of the offense charged in the accusatory pleading...." Since the jury explicitly found appellant not guilty or murder, he is entitled to the entry of a judgment of acquittal of the offense of murder. Respondent counters by arguing that the clear import of the inconsistent verdict forms is that the jury intended to acquit appellant only of first degree murder and intended to find him guilty of second degree murder. The fact that in other verdict forms the jury found appellant had been armed with a firearm in the commission of the murder and that the murder occurred in the commission of the robbery, respondent argues, demonstrates beyond any question the jury's intent not to acquit appellant of murder. Respondent also points out that the jury had been instructed that the highest degree of homicide was to be considered first before considering lesser included degrees of homicide. (CALJIC No. 8.75 (4th ed. 1984 pocket pt.).) Respondent cites People v. Holmes (1897) 118 Cal. 444 [50 P. 675] for the proposition that we may affirm the conviction by construing the verdict as one of guilty of second degree murder. Looking at the verdicts as originally returned by the jury in open court, there is no room to hold that the verdicts were the result of a mere "clerical" error by the jury. (Cf. People v. Keating (1981) 118 Cal. App.3d 172 [173 Cal. Rptr. 286]; People v. Mestas (1967) 253 Cal. App.2d 780, 784-785 [61 Cal. Rptr. 731]; People v. Crawford (1953) 115 Cal. App.2d 838, 842 [252 P.2d 963].) Here, the jury had heard the verdicts read by the clerk and in answer to a question by the judge, unanimously affirmed them as read. The error, therefore, must be deemed to have been a "deliberative" error which produced a mistaken or erroneous verdict the result of which *437 "has almost invariably been to bar impeachment of the verdict." (People v. Romero (1982) 31 Cal.3d 685, 694 [183 Cal. Rptr. 663, 646 P.2d 824].) We recognize that some cases have held that uncertain verdicts will be liberally construed and their validity sustained if the intention of the jury can be clearly seen. (See Witkin, Cal. Criminal Procedure (1963) § 546, pp. 556-557 and cases cited.) However, none of these cases involve an explicit finding of "not guilty" of the crime charged. For example, in People v. Holmes, supra, 118 Cal. 444, the court was faced with interpreting a verdict in a murder case which found the defendants guilty of "involuntary manslaughter, not a felony." (Italics added.) Since involuntary manslaughter in the case before the jury was a felony, the defendants argued that the verdict was one of acquittal. The high court held the intention to convict of involuntary manslaughter was clear; it explained the jury's finding that it was not a felony by noting that the words "acts not amounting to a felony" as used in the statute defining one type of involuntary manslaughter had been read to the jury. It also noted that the jury had recommended the defendants "to the extreme mercy of the court" in its punishment thereby showing an intent to convict. The court concluded "whatever may have been the intention of the jury, by no possible construction could we reach the conclusion that the jury meant to acquit the defendants." (Id., at p. 448.) In People v. Tilley (1901) 135 Cal. 61, 62-63 [67 P. 42], the Supreme Court, after noting that the form of the verdict is to be regarded as immaterial if "the intention to convict of the crime charged be unmistakably expressed" (italics added), then noted Penal Code section 1162 which states "no judgment of conviction can be given unless the jury expressly finds against the defendant upon the issue, ..." (Italics added.) From this the court concluded "there is no room for inference outside the words of the verdict. These must express the intention unequivocally; otherwise, the verdict must be regarded as insufficient." (Italics added, citing People v. Ah Gow (1879) 53 Cal. 628.) Under these principles, the colloquy which occurred between the court and counsel in the jury's presence concerning second degree murder cannot be used to clarify the words of the verdict. (3) We also note a basic principle that where two findings of fact are in "irreconcilable conflict" the one most favorable to the defendant will be honored. (See People v. Novo (1936) 12 Cal. App.2d 525 [55 P.2d 915]; People v. Bales (1946) 74 Cal. App.2d 732 [169 P.2d 262].) Although other cases hold that a conviction may be upheld even though part of the verdict conflicts with that conviction (People v. Lopez (1982) 131 Cal. App.3d 565 [182 Cal. Rptr. 563]; People v. Federico (1981) 127 Cal. App.3d 20 [179 Cal. Rptr. 315]), these cases involved conflicts between a verdict on the *438 charged offense and an enhancement finding or conflicting verdicts on separate counts which is expressly authorized by Penal Code section 954. (People v. Amick (1942) 20 Cal.2d 247, 251-252 [125 P.2d 25].) (2c) The question thus remains as to how we should treat the jury's finding of not guilty of murder with the finding that it was of the second degree. Unlike the situation in People v. Holmes, supra, 118 Cal. 444 where the court said it could not possibly conclude that the jury meant to acquit the defendant, if we speculate as to the jury's intent in the present case, it is entirely conceivable that it first determined that the crime committed was second degree murder and that it occurred in the course of a robbery but that the prosecution did not prove beyond a reasonable doubt that appellant was the murderer. This would also explain the finding that the murder occurred in the course of the robbery. The fact that the jury found in other verdict forms that appellant was armed during the commission of the robbery and murder does not negate the effect of the not guilty of murder verdict. These findings made pursuant to the enhancement provision of Penal Code section 12022, subdivision (a), must yield to the jury's determination of the defendant's guilt of the crime charged. (People v. Federico, supra, 127 Cal. App.3d at p. 31.) We conclude that because the verdict form expressly found appellant "not guilty" of murder and did not expressly find him "guilty" of second degree murder, we may not construe the verdict to find appellant guilty of second degree murder. To do this would be an impermissible alteration of a verdict contrary to the defendant's right to an unequivocal verdict on the question of his guilt. If we cannot construe the verdict as one of guilt of second degree murder, the question remains as to how we should treat the verdict as rendered. Respondent argues that we may not construe the verdict as an acquittal of the murder charge because the verdict is "irregular" in form and therefore not entitled to recordation.[6] This being so, respondent argues, the only *439 solution is a remand for retrial, citing People v. Lee Yune Chong, supra, 94 Cal. 379. The defendant in Chong had argued that a new trial could not be ordered since he had not asked for a new trial; the Supreme Court, however, responded by citing Penal Code section 1260 which authorizes an appellate court to reverse, affirm, or modify a judgment appealed from and "may ... order a new trial." The court also quoted from People v. Travers (1888) 77 Cal. 176 [19 P. 268] that "`if a defendant in a criminal case is convicted and appeals, and the judgment is reversed, the appellate court may order a new trial, even though the defendant does not move for such new trial, and denies the power of the court to grant it.'" (Chong, supra, 94 Cal. at pp. 386-387.) The court concluded "Appellant's motion to be discharged was properly denied. While the failure of the jury to find the degree of the crime is an error for which the judgment must be reversed, it no more entitles appellant to a discharge than would any other reversible error committed during the progress of the trial." (Id., at p. 386.) The problem with applying the Chong analysis to the present case is that here, unlike the defendant in Chong, appellant was expressly found not guilty of the murder. This is more than simply a failure to fix the degree of the murder. The trial court in the present case could not have declared a mistrial and discharged the jury for purpose of retrial after the verdict was returned. There was no disagreement by the jury; they affirmed the "not guilty of murder" verdict as read. In addition, there was no consent by appellant nor was there any legal necessity which would have prevented the jury from continuing its deliberations. (Pen. Code, §§ 1140, 1141; Curry v. Superior Court (1970) 2 Cal.3d 707, 713-714 [87 Cal. Rptr. 361, 470 P.2d 345].) An "acquittal" for double jeopardy purposes has been defined as "`a resolution, correct or not, of some or all of the factual elements of the offense charged.'" (Lee v. United States (1977) 432 U.S. 23, 30, fn. 8 [53 L.Ed.2d 80, 87, 97 S.Ct. 2141], quoting United States v. Martin Linen Supply Co. (1977) 430 U.S. 564, 571 [51 L.Ed.2d 642, 650, 97 S.Ct. 1349].) In the present case, the jury's finding that appellant was not guilty of murder as charged in count I necessarily implied a finding that he did not "willfully, unlawfully and with malice aforethought murder ..., a human being" as alleged in count I. Taking this at face value, appellant was acquitted of the murder charge; the verdict was "regular" enough to be recorded under Penal Code sections 1161 and 1164. *440 Finally, as explained in Sanabria v. United States (1978) 437 U.S. 54 [57 L.Ed.2d 43, 98 S.Ct. 2170], a verdict of acquittal may not be reexamined without putting the defendant twice in jeopardy. This principle has been described as "`the most fundamental rule in the history of double jeopardy jurisprudence.' [Citation.] The fundamental nature of this rule is manifested by its explicit extension to situations where an acquittal is `based upon an egregiously erroneous foundation.' [Citations.]" (Id., at p. 64 [57 L.Ed.2d at pp. 53-54].) (4a) III. The prosecutor's failure to reveal the identity of a confidential informant until ordered to do so did not deprive appellant of a fair trial. Appellant's basic premise is that the prosecutor's failure to disclose the identity of Robert Renteria, a confidential informant, until ordered to do so by the trial court amounted to suppression of evidence by the prosecutor since Robert Renteria had information from Catalino Carranza — the person appellant's partner Castaneda allegedly contacted to arrange the drug buy — that "Big John" Vasquez, not appellant, was involved in the crimes. Specifically, appellant argues: "... this same individual [Carranza] and his exculpatory evidence were withheld from the defense by reason of the failure of the prosecutor to disclose Robert Renteria's identity, until compelled to do so, and by the failure of the prosecutor even to disclose the fact of Catalina [sic] Carranza's being in possession of the critical exculpatory information." (5) There is no question that the prosecutor has the duty to disclose the identity of an informant who has material information as to a defendant's guilt or innocence. (Theodor v. Superior Court (1972) 8 Cal.3d 77, 88 [104 Cal. Rptr. 226, 501 P.2d 234].) In addition, the court in People v. Goliday (1973) 8 Cal.3d 771 [106 Cal. Rptr. 113, 505 P.2d 537] holds that "`the police and the district attorney [must] undertake reasonable efforts in good faith to locate the informer so that either party or the court itself [citation] could, if it so desired, subpena him as a witness.' [Citation.]" (Id., at p. 778.) The problem with applying these authorities to the present case is that Carranza was not an informant. Further, the information held by Renteria regarding appellant's involvement or noninvolvement in the crimes was merely hearsay of what Carranza had told him. Nevertheless, following the in camera hearing, the court ordered that Renteria's identity be revealed, and the prosecutor complied. Carranza, however, had left the country by this time. Since the trial court had ruled prior to the in camera hearing that Renteria did not have evidence critical to the defense requiring that his identity be revealed, the prosecutor was entitled to rely on this finding at least until the in camera hearing resulted in a finding to the contrary. *441 Appellant cites other authorities in support of his real contention — that the prosecutor improperly withheld critical exculpatory evidence received from Carranza. People v. Ruthford (1975) 14 Cal.3d 399 [121 Cal. Rptr. 261, 534 P.2d 1341] holds that "either intentional or negligent prosecutorial suppression of substantial material evidence favorable to the accused denies to the defendant a fair trial and requires reversal. [Citations.]" (Id., at p. 406.) The court in People v. Shaparnis (1983) 147 Cal. App.3d 190 [195 Cal. Rptr. 39] expounded on this general principle as follows: "In Brady v. Maryland (1963) 373 U.S. 83 ..., the United States Supreme Court held `... the suppression by the prosecution of evidence favorable to an accused upon request violates due process where the evidence is material either to guilt or to punishment, irrespective of the good faith or bad faith of the prosecution.' [Citation.] The California Supreme Court in In re Ferguson (1971) 5 Cal.3d 525 ... imposed a stricter duty upon prosecutors by requiring them to disclose substantial material evidence favorable to the accused without request. [Citation.] When the evidence bears on the credibility of a key prosecution witness, a defendant must show the evidence was substantial, material and favorable to him. A defendant need not show prejudice under People v. Watson. ... Instead, once substantial materiality is shown, the judgment must be reversed unless the People establish the failure to disclose the evidence was harmless beyond a reasonable doubt. [Citation.] In the context of this case substantial material evidence requiring reversal means `evidence of such significance that with reasonable probability it could have affected the outcome of the trial' or `might have caused a different verdict.' [Citation.]" (Id., at pp. 193-194.) (4b) Based on the record before us, we are not persuaded that there was a suppression of evidence. Catalino Carranza was identified in the police reports provided to appellant, and he was subpenaed and present at the preliminary hearing. Investigating Officer Jay Salazar testified that he disclosed all information he received from Carranza in the police reports and that he had unsuccessfully tried to recontact Carranza after the preliminary hearing for a followup interview. At appellant's first motion for disclosure of informants, Officer Salazar testified that one of the informants had gotten his information from a person involved in the drug connection which preceded the murder and robbery — a direct reference to Carranza. Significantly, appellant was able to present evidence to the jury that Carranza had identified "Big John" Vasquez, not appellant, as one of the perpetrators of these crimes. Also, "Big John" Vasquez was identified as a possible suspect in these crimes as early as June 24, 1982. In short, it does not appear that the prosecutor concealed critical evidence from the defense regarding Catalino Carranza and that the defense was as free to explore Carranza's knowledge of these crimes as was the prosecution. *442 The present case is distinguishable from People v. Shaparnis, supra, 147 Cal. App.3d 190 where a police report containing critical information from a previously undisclosed witness was withheld from the defense. Our situation is closer to that in People v. Rance (1980) 106 Cal. App.3d 245 [164 Cal. Rptr. 822] where the court pointed out: "Here, Officer Zerbe was not a confidential informant nor did the People in any way bring about his absence. His identity and (business) address were apparent to the defense from compliance with the original discovery request. From that time until the time of trial the defense was just as capable as the prosecution of keeping track of his whereabouts. Appellant was not entitled to a dismissal because of Zerbe's absence." (Id., at p. 254, fn. omitted.) We conclude there was no prosecutorial suppression of evidence. IV. The prosecutor's remarks to one of appellant's alibi witnesses during trial does not compel a reversal.[*] .... .... .... .... .... .... . V. Disposition The judgment is reversed as to the conviction of second degree murder. The trial court is directed to enter a judgment of acquittal on the murder charge. The judgment is affirmed as to count II, robbery. Since the concurrent sentence of the robbery term with the murder term was a nullity under Penal Code section 654 (People v. Miller (1977) 18 Cal.3d 873 [135 Cal. Rptr. 654, 558 P.2d 552]), the cause is remanded for resentencing on count II. If it so chooses, the trial court may impose a consecutive sentence enhancement pursuant to Penal Code section 667 for appellant's prior serious felony conviction. Martin, J., and Best, J., concurred. Respondent's petition for review by the Supreme Court was denied August 1, 1985. Kaus, J., and Lucas, J., were of the opinion that the petition should be granted. NOTES [1] Part IV is not certified for publication. (See Cal. Rules of Court, rules 976 and 976.1) [2] People v. Hitch (1974) 12 Cal.3d 641 [117 Cal. Rptr. 9, 527 P.2d 361]; People v. Mejia (1976) 57 Cal. App.3d 574 [129 Cal. Rptr. 192]. [3] The following discussion took place between court and counsel: "THE COURT: You understand that the verdict is a verdict of guilty, second degree? "MR. ALEXANDER [defense counsel]: Second degree, yes. ".... .... .... .... .... .... . "MR. WALTON [prosecuting attorney]: Get this correct, the verdict is second degree murder? "THE COURT: Yes. "MR. WALTON: From what I heard, I didn't understand. "THE COURT: Yes, second degree murder." [4] Ms. Vasquez committed suicide in jail prior to trial, apparently for reasons not connected to this matter. [5] In fairness to the jury, the inconsistency may have resulted from the trial court's failure to submit to the jury separate verdict forms for first and second degree murder. The court instructed the jury "If you unanimously agree that defendant is not guilty of murder in the first degree, you will have your foreman date and sign the not guilty verdict of the offense of murder in the first degree and you will determine whether defendant is guilty or not guilty of murder in the second degree. If you unanimously agree that defendant is guilty of the offense of murder in the second degree, you will have your foreman date and sign the guilty verdict of murder in the second degree and nothing further will be required of you as to the offense of murder...." (CALJIC No. 8.75 (4th ed. 1984 pocket pt.) pp. 98-100, in relevant part.) [6] Penal Code section 1161 reads: "In what cases court may direct a reconsideration of the verdict. When there is a verdict of conviction, in which it appears to the Court that the jury have mistaken the law, the Court may explain the reason for that opinion and direct the jury to reconsider their verdict, and if, after the reconsideration, they return the same verdict, it must be entered; but when there is a verdict of acquittal, the Court cannot require the jury to reconsider it. If the jury render a verdict which is neither general nor special, the Court may direct them to reconsider it, and it cannot be recorded until it is rendered in some form from which it can be clearly understood that the intent of the jury is either to render a general verdict or to find the facts specially and to leave the judgment to the Court." (Italics added.) Penal Code section 1164 reads: "When the verdict given is such as the court may receive, the clerk, or if there is no clerk, the judge or justice, must record it in full upon the minutes, and if requested by any party must read it to the jury, and inquire of them whether it is their verdict. If any juror disagrees, the fact must be entered upon the minutes and the jury again sent out; but if no disagreement is expressed, the verdict is complete, and the jury must be discharged from the case." (Italics added.) [*] See footnote 1, ante, page 428.
{ "pile_set_name": "FreeLaw" }
Alpine skiing at the 2014 Winter Olympics – Men's slalom The men's slalom competition of the 2014 Winter Olympics at Sochi was held at Rosa Khutor Alpine Resort near Krasnaya Polyana, Russia, on Saturday, 22 February. Summary The tenth and final alpine event of the Olympics, the two runs were held in spring-like conditions. The temperature at the starting gate for the first run exceeded and for the second run at night. Of the top eight times after the first run, five did not finish the second run (André Myhrer, Jean-Baptiste Grange, Ted Ligety, Felix Neureuther, and Alexis Pinturault), which spawned criticism of the course. The second run was set by Ante Kostelić, known for idiosyncratic gate settings. He is the father of competitor Ivica Kostelić of Croatia, who finished ninth. Less than seven weeks shy of his 35th birthday, Mario Matt of Austria became the oldest gold medalist in Olympic alpine skiing history. The silver went to defending World Cup champion Marcel Hirscher, and Henrik Kristoffersen became the youngest male to medal in an Olympic alpine event at age 19. Results The first run was held at 16:45 and the second run at 20:15. References External links FIS-Ski.com – 2014 Winter Olympics – Men's slalom Slalom
{ "pile_set_name": "Wikipedia (en)" }
113 B.R. 44 (1989) In re Robert Lee JOHNSON, a/k/a Robert L. Johnson, a/k/a R.L. Johnson, a/k/a Bob Johnson, a/k/a Robert Johnson, and Dorothy Marie Johnson, a/k/a Dorothy M. Johnson, a/k/a Dorothy Johnson, Debtors. Nos. CIV 89-1396-R, BK-89-00716-BH. United States District Court, W.D. Oklahoma. December 21, 1989. *45 Jeffrey C. Trent, Yukon, Okl., for debtors. Michael C. Bigheart, D. Benham Kirk, Jr., McKnight & Gasaway, Enid, Okl., for creditors. ORDER DAVID L. RUSSELL, District Judge. Appellant, Beneficial Oklahoma, Inc. ("Beneficial") appeals from the Bankruptcy Court's June 21, 1989 order granting Debtors' April 21, 1989 motion to avoid Beneficial's non-purchase money lien on exempt property, 101 B.R. 280. Beneficial also seeks to certify to the Oklahoma Supreme Court, pursuant to the Oklahoma Uniform Certification of Questions of Law Act, Okla.Stat. title 20, § 1601 et seq., the question of whether a motor vehicle can be exempt as a tool of the trade under Okla. Stat. title 31, § 1(A)(6). The Court has reviewed the parties' briefs and the responses and replies thereto, and is prepared to render its decision resolving these matters. Debtor Robert Lee Johnson is a contract bulk mail carrier for the United States Postal Service. Debtors own a 1972 Ford one (1) ton box truck which Mr. Johnson uses in performing one of his bulk mail delivery routes for the Postal Service. Pursuant to a promissory note and chattel mortgage, Beneficial holds a non-possessory, non-purchase money lien against Debtors' truck. On January 31, 1989, Debtors, Robert Lee Johnson and Dorothy Marie Johnson, filed their Joint Voluntary Petition for Chapter 7 bankruptcy in the Western District of Oklahoma. BK-89-716-BH. The Bankruptcy Court, Richard L. Bohanon, Chief Judge, granted Debtors' motion to avoid Beneficial's lien on their truck, finding that Debtors' truck was exempt as a tool of the trade under Okla.Stat. title 31, § 1(A)(6) to the extent of $5,000, and that Debtors were entitled to avoidance of the lien pursuant to 11 U.S.C. § 522(f)(2)(B). The Court relied principally on In re Siegmann, 757 P.2d 820, 822 (Okla.1988), as support for its holding. Beneficial timely perfected an appeal to this Court from the Bankruptcy Court's order. The District Court's standards of review of the findings of the Bankruptcy Court differ according to whether a finding is of law or of fact. Findings of law are subject to de novo review. In re Robinson Bros. Drilling, Inc., 97 B.R. 77 (W.D.Okla.1988); In re Mullett, 817 F.2d 677 (10th Cir.1987). Findings of fact, on the other hand, are to be upheld unless they are found to be clearly erroneous. In re Mullett, 817 F.2d 677 (10th Cir.1987); In re Reid, 757 F.2d 230 (10th Cir.1985). The Bankruptcy Court's determination that Debtors' truck falls within the scope of property described by Okla.Stat. title 31, § 1(A)(6), Oklahoma's statutory exemption for "tools of the trade," was a finding of law, and we review this finding de novo. The Oklahoma Supreme Court was recently asked the certified question: "Does the term `tools, apparatus . . . used in any trade . . .' as used in Okla. Stat.Ann. tit. 31, § 1(A)(6) include all types of equipment, regardless of size, source of power, mobility, value or mode of operation, needed by a person in pursuit of a trade?" In re Siegmann, supra at 821. This question was broad enough to include, not only the farm tractor at issue in Siegmann, but also the one-ton commercial truck at issue in the present case. The Court answered the question by holding that "the tools of the trade exemption of Okla.Stat.Ann. tit. 31, § 1(A)(6) applies to any property which comes within the scope of the terms tools, apparatus or books, is used in the trade or profession of the debtor, . . . and is reasonably necessary, convenient, or suitable for production of work in that trade or profession, *46 regardless of size, source of power, mobility, or mode of operation." Id. at 824. The Court also stated that, in cases of doubt, statutes exempting property from forced sale for the payment of debts are to be resolved in favor of the debtor. Id. at 822. In view of the broad and inclusive definition given tools of the trade in Siegmann, together with the Court's stated policy of liberally construing exemptions in favor of the debtor, it is the opinion of this Court that the Bankruptcy Court did not err in finding that Debtors' truck could qualify as a tool of Debtors' trade under Okla.Stat. title 31, § 1(A)(6). Furthermore, it is unnecessary to certify Appellant's question to the Oklahoma Supreme Court because the question was adequately answered in Siegmann. Beneficial's primary argument is that a truck should not be considered a tool of the trade because, as a motor vehicle, it falls within a separate statutory exemption for motor vehicles. Okla.Stat. title 31, § 1(A)(13). However, the Court finds no authority for the proposition that property may not qualify for more than one statutory exemption. The Bankruptcy Court also made a factual finding that Debtors' truck was reasonably necessary for the production of Debtors' work or trade, as required by Siegmann, supra. Beneficial's primary argument against this finding is that the truck was not used in Mr. Johnson's principal occupation as a laborer at Temtrol Corporation. Beneficial contends that Mr. Johnson's mail delivery business is a secondary business which merely supplements his primary income from Temtrol. However, Oklahoma does not limit a debtors' exemption for tools of the trade to tools used in his principal occupation only. This argument is therefore unpersuasive. Beneficial has failed to carry its burden of proof that the factual finding of the Bankruptcy Court was clearly erroneous. For the above stated reasons, the June 21, 1989 order of the Bankruptcy Court is hereby AFFIRMED. IT IS SO ORDERED.
{ "pile_set_name": "FreeLaw" }
Q: Obscure error on Symfony on form->handleRequest() and validation I have a Symfony 2.8.9 application where a single form cause a big obscure error on the line $form->handleRequest($request); My form is very simple : just an id and a commentaire field. It seems the error occurs during validation tasks (the full trace below). [ERROR 1824] Element '{http://symfony.com/schema/dic/constraint-mapping}class', attribute 'name': 'Symfony\Component\Form\Form' is not a valid value of the atomic type 'xs:time'. (in file:/D:/Documents/workspace/MyProject/web/ - line 7, column 0) [ERROR 1824] Element '{http://symfony.com/schema/dic/constraint-mapping}constraint', attribute 'name': 'Symfony\Component\Form\Extension\Validator\Constraints\Form' is not a valid value of the atomic type 'xs:time'. (in file:/D:/Documents/workspace/MyProject/web/ - line 8, column 0) [ERROR 1824] Element '{http://symfony.com/schema/dic/constraint-mapping}property', attribute 'name': 'children' is not a valid value of the atomic type 'xs:time'. (in file:/D:/Documents/workspace/MyProject/web/ - line 9, column 0) [ERROR 1824] Element '{http://symfony.com/schema/dic/constraint-mapping}constraint', attribute 'name': 'Valid' is not a valid value of the atomic type 'xs:time'. (in file:/D:/Documents/workspace/MyProject/web/ - line 10, column 0) 500 Internal Server Error - MappingException 1 linked Exception: InvalidArgumentException » [2/2] MappingException: [ERROR 1824] Element '{http://symfony.com/schema/dic/constraint-mapping}class', attribute 'name': 'Symfony\Component\Form\Form' is not a valid value of the atomic type 'xs:time'. (in file:/D:/Documents/workspace/MyProject/web/ - line 7, column 0) [ERROR 1824] Element '{http://symfony.com/schema/dic/constraint-mapping}constraint', attribute 'name': 'Symfony\Component\Form\Extension\Validator\Constraints\Form' is not a valid value of the atomic type 'xs:time'. (in file:/D:/Documents/workspace/MyProject/web/ - line 8, column 0) [ERROR 1824] Element '{http://symfony.com/schema/dic/constraint-mapping}property', attribute 'name': 'children' is not a valid value of the atomic type 'xs:time'. (in file:/D:/Documents/workspace/MyProject/web/ - line 9, column 0) [ERROR 1824] Element '{http://symfony.com/schema/dic/constraint-mapping}constraint', attribute 'name': 'Valid' is not a valid value of the atomic type 'xs:time'. (in file:/D:/Documents/workspace/MyProject/web/ - line 10, column 0) - in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Loader\XmlFileLoader.php at line 179 + at XmlFileLoader ->parseFile ('D:\Documents\workspace\MyProject\vendor\symfony\symfony\src\Symfony\Component\Form/Resources/config/validation.xml') in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Loader\XmlFileLoader.php at line 40 + at XmlFileLoader ->loadClassMetadata (object(ClassMetadata)) in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Loader\LoaderChain.php at line 57 + at LoaderChain ->loadClassMetadata (object(ClassMetadata)) in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Loader\LoaderChain.php at line 57 + at LoaderChain ->loadClassMetadata (object(ClassMetadata)) in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Factory\LazyLoadingMetadataFactory.php at line 128 + at LazyLoadingMetadataFactory ->getMetadataFor ('Traversable') in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Factory\LazyLoadingMetadataFactory.php at line 124 + at LazyLoadingMetadataFactory ->getMetadataFor ('IteratorAggregate') in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Factory\LazyLoadingMetadataFactory.php at line 124 + at LazyLoadingMetadataFactory ->getMetadataFor (object(Form)) in vendor\symfony\symfony\src\Symfony\Component\Validator\Validator\RecursiveContextualValidator.php at line 343 + at RecursiveContextualValidator ->validateObject (object(Form), '', array('Default'), '1', object(ExecutionContext)) in vendor\symfony\symfony\src\Symfony\Component\Validator\Validator\RecursiveContextualValidator.php at line 153 + at RecursiveContextualValidator ->validate (object(Form), null, false) in vendor\symfony\symfony\src\Symfony\Component\Validator\Validator\RecursiveValidator.php at line 132 + at RecursiveValidator ->validate (object(Form)) in vendor\symfony\symfony\src\Symfony\Component\Form\Extension\Validator\EventListener\ValidationListener.php at line 68 + at ValidationListener ->validateForm (object(FormEvent), 'form.post_bind', object(EventDispatcher)) at call_user_func (array(object(ValidationListener), 'validateForm'), object(FormEvent), 'form.post_bind', object(EventDispatcher)) in app\cache\dev\classes.php at line 1858 + at EventDispatcher ->doDispatch (array(array(object(ValidationListener), 'validateForm'), array(object(DataCollectorListener), 'postSubmit')), 'form.post_bind', object(FormEvent)) in app\cache\dev\classes.php at line 1773 + at EventDispatcher ->dispatch ('form.post_bind', object(FormEvent)) in vendor\symfony\symfony\src\Symfony\Component\EventDispatcher\ImmutableEventDispatcher.php at line 43 + at ImmutableEventDispatcher ->dispatch ('form.post_bind', object(FormEvent)) in vendor\symfony\symfony\src\Symfony\Component\Form\Form.php at line 660 + at Form ->submit (array('commentaire' => 'dqsdqs', 'save' => '', '_token' => 'FogMqUyv366NxySj8w1t4PLEI03pIc_V3eoiQ0tHesA'), true) in vendor\symfony\symfony\src\Symfony\Component\Form\Extension\HttpFoundation\HttpFoundationRequestHandler.php at line 116 + at HttpFoundationRequestHandler ->handleRequest (object(Form), object(Request)) in vendor\symfony\symfony\src\Symfony\Component\Form\Form.php at line 489 + at Form ->handleRequest (object(Request)) in src\MyBundle\Controller\CalendrierController.php at line 34 + at CalendrierController ->addAction (object(Request)) at call_user_func_array (array(object(CalendrierController), 'addAction'), array(object(Request))) in vendor\symfony\symfony\src\Symfony\Component\HttpKernel\HttpKernel.php at line 144 + at HttpKernel ->handleRaw (object(Request), '1') in vendor\symfony\symfony\src\Symfony\Component\HttpKernel\HttpKernel.php at line 64 + at HttpKernel ->handle (object(Request), '1', true) in vendor\symfony\symfony\src\Symfony\Component\HttpKernel\DependencyInjection\ContainerAwareHttpKernel.php at line 69 + at ContainerAwareHttpKernel ->handle (object(Request), '1', true) in vendor\symfony\symfony\src\Symfony\Component\HttpKernel\Kernel.php at line 185 + at Kernel ->handle (object(Request)) in web\app_dev.php at line 30 + [1/2] InvalidArgumentException: [ERROR 1824] Element '{http://symfony.com/schema/dic/constraint-mapping}class', attribute 'name': 'Symfony\Component\Form\Form' is not a valid value of the atomic type 'xs:time'. (in file:/D:/Documents/workspace/MyProject/web/ - line 7, column 0) [ERROR 1824] Element '{http://symfony.com/schema/dic/constraint-mapping}constraint', attribute 'name': 'Symfony\Component\Form\Extension\Validator\Constraints\Form' is not a valid value of the atomic type 'xs:time'. (in file:/D:/Documents/workspace/MyProject/web/ - line 8, column 0) [ERROR 1824] Element '{http://symfony.com/schema/dic/constraint-mapping}property', attribute 'name': 'children' is not a valid value of the atomic type 'xs:time'. (in file:/D:/Documents/workspace/MyProject/web/ - line 9, column 0) [ERROR 1824] Element '{http://symfony.com/schema/dic/constraint-mapping}constraint', attribute 'name': 'Valid' is not a valid value of the atomic type 'xs:time'. (in file:/D:/Documents/workspace/MyProject/web/ - line 10, column 0) - in vendor\symfony\symfony\src\Symfony\Component\Config\Util\XmlUtils.php at line 96 + at XmlUtils ::loadFile ('D:\Documents\workspace\MyProject\vendor\symfony\symfony\src\Symfony\Component\Form/Resources/config/validation.xml', 'D:\Documents\workspace\MyProject\vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Loader/schema/dic/constraint-mapping/constraint-mapping-1.0.xsd') in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Loader\XmlFileLoader.php at line 177 + at XmlFileLoader ->parseFile ('D:\Documents\workspace\MyProject\vendor\symfony\symfony\src\Symfony\Component\Form/Resources/config/validation.xml') in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Loader\XmlFileLoader.php at line 40 + at XmlFileLoader ->loadClassMetadata (object(ClassMetadata)) in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Loader\LoaderChain.php at line 57 + at LoaderChain ->loadClassMetadata (object(ClassMetadata)) in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Loader\LoaderChain.php at line 57 + at LoaderChain ->loadClassMetadata (object(ClassMetadata)) in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Factory\LazyLoadingMetadataFactory.php at line 128 + at LazyLoadingMetadataFactory ->getMetadataFor ('Traversable') in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Factory\LazyLoadingMetadataFactory.php at line 124 + at LazyLoadingMetadataFactory ->getMetadataFor ('IteratorAggregate') in vendor\symfony\symfony\src\Symfony\Component\Validator\Mapping\Factory\LazyLoadingMetadataFactory.php at line 124 + at LazyLoadingMetadataFactory ->getMetadataFor (object(Form)) in vendor\symfony\symfony\src\Symfony\Component\Validator\Validator\RecursiveContextualValidator.php at line 343 + at RecursiveContextualValidator ->validateObject (object(Form), '', array('Default'), '1', object(ExecutionContext)) in vendor\symfony\symfony\src\Symfony\Component\Validator\Validator\RecursiveContextualValidator.php at line 153 + at RecursiveContextualValidator ->validate (object(Form), null, false) in vendor\symfony\symfony\src\Symfony\Component\Validator\Validator\RecursiveValidator.php at line 132 + at RecursiveValidator ->validate (object(Form)) in vendor\symfony\symfony\src\Symfony\Component\Form\Extension\Validator\EventListener\ValidationListener.php at line 68 + at ValidationListener ->validateForm (object(FormEvent), 'form.post_bind', object(EventDispatcher)) at call_user_func (array(object(ValidationListener), 'validateForm'), object(FormEvent), 'form.post_bind', object(EventDispatcher)) in app\cache\dev\classes.php at line 1858 + at EventDispatcher ->doDispatch (array(array(object(ValidationListener), 'validateForm'), array(object(DataCollectorListener), 'postSubmit')), 'form.post_bind', object(FormEvent)) in app\cache\dev\classes.php at line 1773 + at EventDispatcher ->dispatch ('form.post_bind', object(FormEvent)) in vendor\symfony\symfony\src\Symfony\Component\EventDispatcher\ImmutableEventDispatcher.php at line 43 + at ImmutableEventDispatcher ->dispatch ('form.post_bind', object(FormEvent)) in vendor\symfony\symfony\src\Symfony\Component\Form\Form.php at line 660 + at Form ->submit (array('commentaire' => 'dqsdqs', 'save' => '', '_token' => 'FogMqUyv366NxySj8w1t4PLEI03pIc_V3eoiQ0tHesA'), true) in vendor\symfony\symfony\src\Symfony\Component\Form\Extension\HttpFoundation\HttpFoundationRequestHandler.php at line 116 + at HttpFoundationRequestHandler ->handleRequest (object(Form), object(Request)) in vendor\symfony\symfony\src\Symfony\Component\Form\Form.php at line 489 + at Form ->handleRequest (object(Request)) in src\MyBundle\Controller\CalendrierController.php at line 34 + at CalendrierController ->addAction (object(Request)) at call_user_func_array (array(object(CalendrierController), 'addAction'), array(object(Request))) in vendor\symfony\symfony\src\Symfony\Component\HttpKernel\HttpKernel.php at line 144 + at HttpKernel ->handleRaw (object(Request), '1') in vendor\symfony\symfony\src\Symfony\Component\HttpKernel\HttpKernel.php at line 64 + at HttpKernel ->handle (object(Request), '1', true) in vendor\symfony\symfony\src\Symfony\Component\HttpKernel\DependencyInjection\ContainerAwareHttpKernel.php at line 69 + at ContainerAwareHttpKernel ->handle (object(Request), '1', true) in vendor\symfony\symfony\src\Symfony\Component\HttpKernel\Kernel.php at line 185 + at Kernel ->handle (object(Request)) in web\app_dev.php at line 30 The controller (only the addAction method): public function addAction(Request $request) { $calendrier = new Calendrier(); $form = $this->createForm(CalendrierType::class, $calendrier); $hasError = false ; if ($request->isMethod('POST')) { // Here the error occurs $form->handleRequest($request); } return $this->render('MyBundle:Calendrier:add.html.twig', array( 'form' => $form->createView() )); } The form (CalendrierType.php) namespace MyBundle\Form ; use Symfony\Component\Form\AbstractType; use Symfony\Component\Form\Extension\Core\Type\SubmitType; use Symfony\Component\Form\Extension\Core\Type\TextareaType; use Symfony\Component\Form\FormBuilderInterface; use Symfony\Component\OptionsResolver\OptionsResolver; class CalendrierType extends AbstractType { public function buildForm(FormBuilderInterface $builder, array $options) { $builder ->add('commentaire', TextareaType::class, array('required' => false)) ->add('save', SubmitType::class); } public function configureOptions(OptionsResolver $resolver) { $resolver->setDefaults(array( 'data_class' => 'MyBundle\Entity\Calendrier' )); } public function getBlockPrefix() { return 'mybundle_calendrier' ; } } And my Calendrier entity (Calendrier.php) : <?php namespace MyBundle\Entity; use Doctrine\ORM\Mapping as ORM; use MyBundle\Entity\AbstractEntity ; use Symfony\Component\Validator\Constraints as Assert; /** * Calendrier * * @ORM\Table(name="calendrier") * @ORM\Entity(repositoryClass="MyBundle\Repository\CalendrierRepository") */ class Calendrier extends AbstractEntity { /** * @var int * * @ORM\Column(name="id", type="integer") * @ORM\Id * @ORM\GeneratedValue(strategy="AUTO") */ private $id; /** * @var string * * @ORM\Column(name="commentaire", type="string", nullable=true) */ private $commentaire; /************ Getters and setters ******/ /** * Get id * * @return integer */ public function getId() { return $this->id; } public function getCommentaire() { return $this->commentaire; } public function setCommentaire($commentaire) { $this->commentaire = $commentaire; return $this; } } All of this is very simple. I have another bigger entity/Form/Controller with the same error, but two days ago, it was working fine, and I didn't changed anything in this other form nor in the config files... The stack trace and Symfony error message are too strange for me, anyone can help me please ? A: I just restart the Apache server, then the error has gone, without changing a single space in the code.
{ "pile_set_name": "StackExchange" }
After showing in public a few times already MorphOS running on PowerBook G4 (video on YouTube) and on PowerMac G5 (AVI video), today one of the core developers has released a few screenshots (1, 2, 3, 4) of MorphOS running on an iMac G5 20" clocked at 2.1GHz and equipped with a Radeon X600 graphic card. As usual, no promises, let alone a release date, have been given. Since Apple is leaving its older PPC based Macs to a slow death by supporting only the X86 based Macs with Snow Leopard (and future versions of OS X), MorphOS may become a viable OS for the sustained life of these systems. This could also bring some active (and exciting) application development from ex-OS X programmers very familiar with their hardware strengths and weaknesses. The move from PPC OSX to PPC MorphOS is orders of magnitude harder than the move from PPC OSX to x86 OSX. Most OSX developers moved over to x86 eons ago, given that for the most part it was just a recompile away ;-) Still, a good thing to have alternative OSs on end of line HW, but "application support" will probably not the be the reason why people may decide to ditch OSX for MorphOS on a G5. I still remember how BeOS was supposed to give "new life" to all those 604 PPC Macs that Apple had orphaned. ;-) Given that OSX and other Free OSs can be had on G5s for a song, it is always going to be a tough proposition for the Morphos team to get people to shell $100 bucks...
{ "pile_set_name": "Pile-CC" }
The Fontana Hilton 28May Tuesday, May 18, 2010 We arrive at Fontana Lake around 11:30 in the morning. We not only have the rest of the day for rest and relaxation, but we also have something that few hikers, whether they are through-hikers or section-hikers, have at their disposal: a car. Spoon stands outside the Fontana Hilton There is a separate restroom building with flush toilets and a single shower stall located a couple hundred steps from the shelter. We avail ourselves of the showers, put all wet clothes out to dry, and get fresh, clean clothes on. There are sights to see here. There is a visitor’s center at the dam, about a quarter mile away, and a second restroom/shower room facility. It is a great deal cleaner than the one by the hiker’s shelter. The Fontana Hilton The shelter has a large sign on the side pronouncing itself the “Fontana Hilton.” And indeed, compared to some shelters, it is a Hilton. But alas, ultimately, it is still a shelter. We get in the car and drive back to the NOC for a sit-down, restaurant lunch. Ahh… it’s something like cheating. Since I’m not a tomato eater and neither is Teen Daughter, we slide the tomato pieces off our salads. Teen Daughter has an idea, let’s ask for a little container and take the tomatoes back with us to give to Spoon. As people gather for the evening at the Fontana Hilton, a party atmosphere arises. Teen daughter tells me that two hikes are up at the picnic area and that they have caught two catfish with their bare hands. The story sounds, uh, fishy. But upon going to the picnic area, sure enough, there are two sizable catfish, waiting to be cleaned and fried. A fire has been started and the work commences. Hikers at the Fontana Hilton Waiting for the fish fry, a bearded man with a trail name self-assigned and way too complicated to remember, strikes up conversation with me. I don’t remember his trail name, but to me he is Conversant. Conversant is a man of many opinions. He also is the one I heard of earlier who is hiking with his eight year old son. While speaking with Conversant, the fish has finished frying and Teen Daughter offers me a piece. I decline. She has some and declares it delicious. Then I hear the rest of the story. It seems while at the marina, the two young men who caught the fish with their bare hands had actually found the fish in a little holding cage. And indeed, they reached in and caught the fish with their bare hands. Now I think of them as Pilfer and Swipe. And finally at the shelter, Teen Daughter presents Spoon with a to-go cup of diced tomatoes. He looks at it and consumes them gladly. And then pronounces that Teen Daughter’s trail name from hence forward shall be Tomato. 2 responses to “The Fontana Hilton” Great Blog – I like the way you piece together the photos. I made it to Damascus, did a 26.7 mile day yesterday and will be taking 2 zero days to rest up for the long haul through Virginia. My family is coming down at the end of the month, Father and Brother will be walking with me for 5 days, while mom has a few “retreat” days. Great meeting you and your family – best of luck with continuing your section hike, I’ll check your blog to keep tabs and offer any insight as I travel North. Tell Tomato I said hello. Regards, Spoon
{ "pile_set_name": "Pile-CC" }
Monero Price Analysis Signalling a Rally Monero (XMR), the 10th largest cryptocurrency by market capitalization (according to CoinMarketCap.com), is now riding the bulls. Trading volume is picking up in light of the recent reversal seen in Monero’s price. Down 70% since its record high (on December 20, 2017), it has finally reversed its course. The crypto has been trading in the green and treading upwards at a steady pace. XMR is up 50% over the past 10 days. One fundamental reason driving the demand for Monero is the shift in investor preference towards privacy coins.This has especially taken prominence in the light of increasingly reported instances of crypto thefts and fraud. (Read, Less Risk, More Return: 4 Privacy Coins That Are Now Outperforming Bitcoin, for our analysis of privacy coins’ performance with regards to other cryptocurrencies.) 1 Fundamental and 4 Technical Indicators Now Support the Monero Price Rally From a technical perspective, we currently see 4 solid reasons for supporting XMR. The crypto has seen 3 prominent swing highs since the beginning of the year. However, none have been strong enough to break the long-term downward sloping trend line (dark green in chart above). However, the mood is entirely different now. XMR seems to be setting the stage for a price rally. Factors supporting this stance, include: The August 31st breakout marks XMR’s entry into the bullish territory, well supported by 3 other technical indicators. Monero price is steadily treading towards its immediate resistance level of $148, with a high probability that this level could be breached anytime soon. The RSI above 70, confirms market bullishness. The relative strength index (or RSI) is a momentum indicator which indicates strength in market movement. Anything beyond the neutral 50 indicates strength in market trading volume that is driving the current trend. A number below 50 signals weakness in market activity driving the current trend. A bullish crossover is about to be formed anytime now. The 14-day simple moving average line (SMA-14) is about to crossover the SMA-50 from below. However, such breakouts are sometimes followed by a downward correction towards the trendline. Subsequently, it bounces back from the trendline support to confirm the bullishness. So, those looking to enter Monero (XMR) could watch for any short-term correction here.
{ "pile_set_name": "OpenWebText2" }
Train To Alor Setar Alor Setar or as it is formerly known as Alor Star is the state capital of Kedah, Malaysia. Alor Setar is known to be the second largest town in the state and home to Alor Setar Tower – a popular one of its own. Travelling to Alor Setar is never an issue as there is a various mode of transportation one can venture on – trains are one of them. We are looking at the best train for this kind of travel – the ETS. ETS Train from KL to Alor Setar The existence of ETS or Electric Train Service has been a lifesaver to most people as it brings the convenience they need to travel between states. Since its launch, it has been one of the trains to Alor Setar. It is comfortable and easy, plus affordable for most. Among the reasons why people opt to hop on this train to Alor Setar because the speed it provides go well above the normal speed of KTM or other old train services. This train trip will take around 4 hours 50 minutes and the availability of each trip is quite frequent, therefore, there will always be a time for booking. Kuala Lumpur to Alor Setar Train Ticket Price Train ticket for Alor Setar can be purchased at the counter itself – KL Sentral or online. Why deal with the hassle of queuing when online booking is easier? There are various online booking platforms for trains, hence, you will have a lot of options to go with. The ticket fare from Kuala Lumpur to Alor Setar starts from MYR 70 for Gold Ticket to MYR 93 for Platinum Ticket. However, the fares may change depending on the season, time of the travel and so on. This depicts the range you will be expected should you choose to hop on the ETS to Alor Setar. ETS Train Facilities ETS is the newest addition to a collection of trains here in Malaysia. It stands out more than others not because it is new, but because of the facilities provided by the service is deemed enticing for passengers. Among the facilities provided by ETS include the availability of two types of tickets; Gold and Platinum. Gold Ticket will provide you with more stops throughout the journey. This in return will make the trip slightly longer. Platinum Ticket is the opposite of it, which are fewer stops that resulted in lesser time journey, plus, they also offer complimentary snacks on board to keep your belly in a good mood. Things To Do in Alor Setar Since you are travelling to Alor Setar, we might as well have a couple of popular landmarks one should not miss whenever they are in town: 1. Alor Setar Tower This tower was built in 1995 and is an iconic signature of Alor Setar. It would be a crime to not have look at this majestic tower up close and personal. The Alor Setar Tower has an observation deck about 289 feet from the base where you can get a complete 360 view of your surroundings. 2. Alor Setar State Museum History is one of the things Kedah is proud of and Alor Setar has a bunch of collections of it. This state museum holds various historical records and properties including Chinese porcelain, the popular gold tree and archaeological artefacts recovered from Bujang Valley. It will be a great knowledge-infested trip for the younger generations to be exposed to. Book Train Tickets To Alor Setar Online Online booking system and platforms have made it easy for everyone from any part of the country to purchase their train tickets. Not only does it makes everything much easier, but customers has the liberty to compare the prices they prefer at the same time. The information is literally at the tip of your finger. The web holds the best seat for you and you should not miss grabbing it.
{ "pile_set_name": "Pile-CC" }
Q: Laravel adding middleware inside a controller function as the title says I want to use a middleware inside a controller function. I have resource controllers, which their functions inside will have different access rights so I can't use a middleware in the web.php file, I have to use or apply it separately in each function to limit access, my googling hasn't been successful in getting a solution to that so far. Any help please and thanks in advance. P.S. I believe no code is necessary here. A: Middleware could also be applied to just one function, just add the method name in your controller constructor public function __construct() { // Middleware only applied to these methods $this->middleware('loggedIn', [ 'only' => [ 'update' // Could add bunch of more methods too ] ]); } OR public function __construct() { // Middleware only applied to these methods $this->middleware('loggedIn')->only([ 'update' // Could add bunch of more methods too ]); } Here's the documentation A: There are 3 ways to use a middleware inside a controller: 1) Protect all functions: public function __construct() { $this->middleware('auth'); } 2) Protect only some functions: public function __construct() { $this->middleware('auth')->only(['functionName1', 'functionName2']); } 3) Protect all functions except some: public function __construct() { $this->middleware('auth')->except(['functionName1', 'functionName2']); } Here you can find all the documentation about this topic: Controllers I hope this can be helpful, regards!
{ "pile_set_name": "StackExchange" }
SHEMFORD Futuristic School, Rewa operated by Vasudhaiv Kutumbakam (B.E.O.H.A.R.I.) society, that follows to the CBSE pattern is a part of SHEMFORD & SHEMROCK Group of Schools, a 25 year old Research Based Organisation having over 425+ Preschools and Senior 10+2 School branches across 27 States and Union Territories in India, with over 3,00,000 alumni. The school premise is spread in an area of approximately 14,000 sq.ft. and plans to have its 9 acre campus with world class infrastructure, at Sirmour Road, Sagra, Rewa.
{ "pile_set_name": "Pile-CC" }
DAPHNA I’m sorry but I still, I mean — you can see the Hudson River! From the bathroom! This apartment ... Really, Jonah? Boxers and black socks? Is that supposed to do it for me? Let me — I would never want you to do it for me, you’re my cousin and, gross. Just, like, if you’re at all interested in people of the opposite sex who are not your cousins? [She gestures at his current get-up.] Don’t. MR. HARMON “My play takes place in real time in one space, so the later I can start the action, the better. Her coming out of the bathroom is the latest possible beginning. I don’t think that first line will ever get a laugh, but it establishes that she doesn’t live there, and it hopefully sends a message about the tone, which is super important in a comedy. Also, when you see a man and a woman dressed like this, you assume they’re romantically involved. So I had to get the cousin reference in there.” The Good Mother By Francine Volpe IN PREVIEWS, opens Nov. 15 at the Acorn Theater at Theater Row. PREMISE Primping for an evening out, a young mother natters on to her baby sitter. LARISSA I’ll never forget what else he said to me he said — and it’s a simple thing he said — he said, he said to me anyway he looks at me and he says, he looks at me and he says he goes: “Remember who you are.” ... What do you mean? Who am I? I don’t know who I am, who am I supposed to be? What am I supposed to remember? I’m a child. MS. VOLPE “This line woke me up in the middle of the night in my freezing loft in Williamsburg. I had a phone conversation with my father that ended with: ‘One more thing: Remember who you are.’ I don’t belabor the first line of my plays. (I mean, I belabor every line I’ve ever written.) But in this play and many others the line presented itself to me. And as a writer you have to assume that something stirring within you is going to stir within others too.”
{ "pile_set_name": "OpenWebText2" }
Last week, former U.S. Attorney General Jeff Sessions made it official by announcing his candidacy for the Republican nomination for the 2020 U.S. Senate election. Since announcing his candidacy, his opponents have charged him to be part of the so-called Washington establishment given his 20-year tenure as a U.S. Senator and his time in the early part of the Trump administration. During an appearance on Birmingham, AL radio Talk 99.5 “Matt & Aunie” program, Sessions addressed those criticisms. He dismissed the Washington establishment moniker and said if reelected to the U.S. Senate, he would represent the people of Alabama. “I feel fresh having been out for a year and resting up, number one,” Sessions said. “But number two, everybody promises to be this new great thing. How many of them deliver? I delivered. I was the only senator that supported Donald Trump. I led the fight for years on immigration. I helped kill the Trans-Pacific Partnership trade agreement, which gave the Sultan of Brunei the same vote as the President of the United States in this [European Union] type of agreement.” “Was I part of the establishment?” he continued. “Nobody that knows Washington would say that. I’ve been the voice for the people. I believe the average American working person is not being respected in Washington. They don’t know our problems. They spend too much time in fundraising groups with these very nice corporate executives and not enough time dealing with a family that wonders where they’re going to get $400 for a set of tires for their car. Are they going to put it on a credit card at 25% interest? This is the world.” “Finally, we begin to see in the Trump agenda an increase in wages,” Sessions added. “I would just say to you the idea that Jeff Sessions is going to be part of the Washington establishment is ludicrous. I deny that. I’m going to represent our people.” Follow Jeff Poor on Twitter @jeff_poor
{ "pile_set_name": "OpenWebText2" }
Arctia brachyptera Arctia brachyptera, the Kluane Tiger Moth, is a moth of the family Erebidae. It was described by Troubridge and Lafontaine in 2000 and is only known from the Yukon in Canada. It occurs in alpine tundra of the St. Elias Mountains. The length of the forewings is about 18 mm. The forewings are mouse brown with off white adbasal, basal, medial, postmedial and subterminal lines. The hindwings are pinkish orange to pinkish brown. Adults have been recorded in late June. Etymology The species name refers to the reduced wing size of the female. References Category:Moths described in 2000 Category:Arctiina Category:Moths of Canada
{ "pile_set_name": "Wikipedia (en)" }
A number of individuals are struggling with the category of low-quality-status medically unexplained symptoms (MUSs)[@b1] and the morbidity rate is 1.6--70%, 2.4--87% and 4.6--18% in young, middle aged and elderly populations dividually from 1966 according to the investigation of MUSs[@b2]. Meanwhile, MUSs has been defined as "suboptimal health" (*Yajiankang* in China) in traditional Chinese medicine explained as a borderline state between health and disease. To our disappointment, suboptimal health is more difficult to be diagnosed with a biological disease because of only vague changes in function but no clear signs of organic disease[@b3], which present as low energy level, loss of vitality, altered sleeping patterns and so on[@b4]. It could be parallel with symptoms of chronic fatigue syndrome (CFS)[@b5][@b6] or "THE THIRD STATE" or "GRAY STATE" raised by the former Soviet scholar prospectively. Also state of suboptimal health included several different subtypes, and as a subtype, psychological suboptimal health has attracted more attentions. Psychological suboptimal health is a prevalent state with a pathophysiological mechanism that is extremely complicated and poorly understood. Although it exhibits objective symptoms without a specific disease and it cannot reach the standards of psychiatric diagnosis such as depression and anxiety neurosis estimated by scores on diagnostic scales, the 10th edition of international Classification of diseases (ICD-10), Classification and Diagnostic Criteria of Mental Disorders in China-Third-Edition (CCMD-3), the 4th edition Diagnostic and Statistical Manual of Mental Disorder (DSM-IV)[@b7], for instance, but we must not ignore potential hazards. As the intermediate state between mental health and psychological disease, the emblematical symptoms indicating someone immersed in the state contain out of humor, panic, negative emotion, easy to get angry, losing interest, insomnia, impaired concentration and so on. What's more, psychological suboptimal health, can result in crippling quality of life and raising costs in medical due to frequent, unnecessary visits to healthcare facilities for checkups and diagnoses. In virtue of potential damage and ambiguity in pathomechanism, psychological suboptimal health has garnered increasing attention and has been described in experimental reports and defined as "subthreshold depression"[@b8][@b9] or "subthreshold obsessive-compulsive disorder"[@b10], the concepts of which are very similar to psychological suboptimal health. In addition, Blackwood has divided chronic fatigue syndrome (CFS) into two states of psychological and physical in the survey[@b11] and the psychological state of CFS is parallel to psychological suboptimal health. These researchers laid particular emphasis on epidemiologic characteristics, and unfortunately, studies on psychological suboptimal health and the pathogenetic mechanisms involved are rare relatively. What's more, a diagnostic criterion that effective and widely accepted has not been established at home and abroad. In China, scholars and doctors prefer to use a variety of scales and questionnaires to diagnose the intermediate state, including the Symptom Checklist 90 (SCL-90), Cornell Medical Index (CMI), mental functions decline index health assessment (MDI), or other self-made evaluations, combining with subjective judgment. To a certain extent, these approaches are authentic for diagnosis but at the same time, rate of missed diagnosis and misdiagnosis is not satisfying, owing to inconformity indigestibility of scales, concealment of patients, doctors relying too much on experiences and subjective judgment. So diagnostic methods that objective, high reliability and easy to operate need to be developed urgently. Through the approach of evaluating the significant differences at the molecular level, novel biomarkers or a biomarker panel then further could be discovered in the plasma samples from patients with psychological suboptimal health and healthy controls. And they would be used in clinical diagnosis after further validation and evaluation. Moreover, metabolomics technologies are the principal approaches for diseases biomarkers discovering. Systems biology[@b12] including genomics, proteomics, and metabolomics can be utilized in research of diseases[@b13][@b14][@b15]. As an important component of systems biology, metabolomics technologies have become a powerful tool and platform for detecting endogenous small compounds[@b16][@b17] as candidate biomarkers closely related to pathological and physiological processes of diseases and carrying rich information concerning metabolism as key pathways[@b18]. It may help to unravel the mechanisms of disease occurrence and progression on the metabolic level[@b19]. Also major metabolomics technologies were based on H-nuclear magnetic resonance (^1^H-NMR)[@b20][@b21][@b22], liquid chromatography−mass spectrometry (LC−MS)[@b23], and gas chromatography−mass spectrometry (GC−MS)[@b24][@b25]. Furthermore, it was noteworthy that ^1^H-NMR is the earliest method used in metabolomics analysis with the advantages of possessing a rapid, non-destructive, high-throughput system[@b26], and still is widely used to detect biomarkers of diseases for clinical diagnosis[@b27]. In common sense, medicine should be applied to improve clinical symptoms, but few chemical drugs was suitable. As a well-known traditional Chinese prescription, Baihe Dihuang Tang (BDT) is described initially in "Synopsis of Golden Chamber" (Jinkui *Yaolue*) consisting of two herbal medications: lily bulb (Bulbus Lilii) and rehmannia root (Radix, Rehmanniae). It is used to treat mental instability, absentmindedness, insomnia, and dysphoria in clinical. These major symptoms are closely associated with early depression disorder[@b28] and also perform in psychological suboptimal health state. Furthermore, BDT has been widely used and significantly improved the symptoms of psychological suboptimal health due to a deficiency of *yin (Yin Xu*), according to the theory of TCM and also BDT was applied as the intervention measure in our experimentation. As far as we know, just several published papers were involved in the research of suboptimal health state with meatabolomics and achieved some results[@b29][@b30][@b31] but the study of the psychological suboptimal health state taking advantage of metabolomics technology is almost a blank. In the present study, plasma metabolomics based on ^1^H-NMR coupled with multivariate statistical analysis are used for investigating metabolites with significant differences at a molecular level and screening potential biomarkers. What the goal is to develop a biomarker panel from the biomarkers through correlation analysis, drug intervention of BDT and evaluation of diagnostic ability that can be used for clinical diagnosis ultimately. A biomarker panel would provide support for objective diagnostic laboratory tests for psychological suboptimal health. Results ======= Clinical information of participators ------------------------------------- According to the scale and clinical diagnosis, 22 patients being in state of psychological suboptimal health and 23 volunteers acting as the healthy control group were screened. From the SCL-90 scores of 143.9 ± 22.6 and 90 as the mean ± SD form and the filter factors mentioned above, a significant difference between two groups was confirmed in clinical. The basic clinical data for the participators are shown in [Table 1](#t1){ref-type="table"}. ^1^H-NMR spectra of plasma -------------------------- To identify the small endogenous molecules in plasma and survey the level varieties in different states, all samples were processed, and typical Carr-Purcell-Meiboom-Gill(CPMG) ^1^H-NMR spectra of plasma from groups of psychological suboptimal health was depicted ([Fig. 1](#f1){ref-type="fig"}). 32 metabolites were identified according to the Human Metabolome Database (HMDB: <http://www.hmdb.ca/>), the Chenomx NMR suite (Chenomx Inc, Edmonton, AB, Canada) and previously published references[@b32][@b33][@b34]. For a better visualization, the vertical scales for the 2D spectra, including 1H-1H correlation spectroscopy (1H--1H COSY) and 1H--13C heteronuclear multiple quantum correlation (1H--13C HMQC) spectra ([Supplementary Figures S1 and S2](#S1){ref-type="supplementary-material"}) were adjusted based on metabolite peaks. Plasma spectra from healthy controls and the BDT group are shown in [Supplementary Figures S3 and S4](#S1){ref-type="supplementary-material"}. The metabolites identified in the spectra were listed in [Table 2](#t2){ref-type="table"}. Several amino acids, glucose, organic acids, lipids, choline were demonstrated in the spectra. Validation and assessment of the differences between groups ----------------------------------------------------------- With the purpose of demonstrating significant differences not only in the clinical scale scores, we analyzed the NMR spectra information using multivariable statistics. Metabolome difference by comparing the numerical integration was observed and partial least squares discrimination analysis (PLS-DA)-based profiling was employed to explore the intrinsic differences between the groups of psychological suboptimal health and mental health. The samples from different groups were separated and classified into two distinct clusters presented in the PLS-DA score plot ([Fig. 2A](#f2){ref-type="fig"}); each point represents an individual sample (to show the group clusters). The model parameters (R^2^X = 0.541, R^2^Y = 0.949, Q^2^ = 0.755) and the validated model (permutation number: 200) indicated no over fitting ([Fig. 2B](#f2){ref-type="fig"}), supporting the result. All of the results indicated the existence of differences between the two groups and the reliability of diagnosis according to the method with scales mentioned previously. Discovery and screening of potential biomarkers ----------------------------------------------- To identify changed metabolites and considering the high information content and complexity of the spectra, orthogonal partial least squares discriminant analysis (OPLS-DA) was used to amplify the subtle differences due to the abnormal state of psychological suboptimal health. The supervised model of OPLS-DA could develop a better separation into two clusters and contribute to the discovery of biomarkers. The group of psychological suboptimal health exhibited a perfect separation from the healthy controls in the OPLS-DA scores plot ([Fig. 2C](#f2){ref-type="fig"}), as well as in permutation tests and CV-ANOVA (*p* \< 0.05). All parameters indicating the model quality were listed in [Supplementary Table S1](#S1){ref-type="supplementary-material"}. The metabolites responsible for a significant contribution to the separation of two groups were indicated in the corresponding S-plot ([Fig. 2D](#f2){ref-type="fig"}) and marked with number containing glutamine, N-acetyl-glycoproteins, TMAO, citrate, phenylalanine, valine, isoleucine, tyrosine and glucose. The specific change trends that higher levels of glutamine, N-acetyl-glycoproteins, TMAO, citrate, tyrosine and phenylalanine and lower levels of valine, isoleucine, and glucose were revealed in [Table 3](#t3){ref-type="table"}. Furthermore, a heatmap plot with different color that green stands for low level and the red is opposite was constructed, from which we could observe the trends more visually ([Fig. 3](#f3){ref-type="fig"}). Screening biomarker panel ------------------------- ### Correlation analysis of potential biomarkers To investigate the relationship among the potential biomarkers, the levels in the plasma samples from patients and healthy controls were correlated using Spearman's correlation ([Fig. 4A](#f4){ref-type="fig"}) with Metaboanalyst 3.0[@b35], an online data tool. A positive correlation indicated the relationship of the metabolites with certain pathways that exerted influence on the state of psychological suboptimal health and was distinguished with a red color, whereas a negative correlation suggested the metabolites may be from different pathways and was indicated with a blue color[@b36]. Analysis of the correlation among these potential biomarkers can be used to identify a biomarker panel. Remarkably, citrate was positively correlated with phenylalanine, glutamine, tyrosine and TMAO between patients of psychological suboptimal health and healthy controls. In additional, phenylalanine levels were positively correlated with N-acetyl-glycoproteins, glutamine, tyrosine, TMAO and citrate. Further analysis using Pattern Hunter with Spearman coefficients was applied to identify the correlation between groups of healthy control and patients. Phenylalanine, glutamine, tyrosine, TMAO, N-acetyl-glycoproteins and citrate have been demonstrated a positive correlation, whereas a negative correlation of isoleucine, valine and glucose was observed between the two groups of different groups ([Fig. 4B](#f4){ref-type="fig"}). Correlation analysis of plasma metabolites displaying significant difference was performed to gain insight into the pathogenic characteristics and pathways involved. With a purpose of selecting biomarkers that were positively correlated with state of psychological suboptimal health and forming a biomarker panel, 6 metabolites containing phenylalanine, glutamine, tyrosine, TMAO, N-acetyl-glycoproteins and citrate were selected and defined as a biomarker panel from the 9 potential biomarkers. ### Drug intervention and validation Based on the significantly decreased frequency of clinical symptoms and scores of SCL-90 after treatment for 4 weeks (*P* \< 0.05), BDT exerted an obvious effect on improvement of symptoms, and 22 patients in state of psychological suboptimal health improved markedly These results are shown in [Table 1](#t1){ref-type="table"}. To obtain an overview of the metabolic responses to the actions of BDT, the PLS-DA (R^2^X = 0.15, R^2^Y = 0.941, Q^2^ = 0.531) trajectories ([Fig. 5A](#f5){ref-type="fig"}) of all of the spectra from plasma samples containing healthy controls, pre- and post-BDT-treated groups were analyzed and separated into three clusters as outstanding differentiation. In the scores plot, the BDT treatment group was close to the healthy control group. The trend of transformation suggested the disturbance of the plasma metabolic profile of patients and stabilization after BDT administration. The validated model indicated no over fitting ([Fig. 5B](#f5){ref-type="fig"}). Using the strategy mentioned previously, as could be observed in the PLS-DA scores plot (R^2^X = 0.403, R^2^Y = 0.894, Q^2^ = 0.687) (Figure S5A) and the validated model that indicated no over fitting (Figure S5B), the psychological suboptimal health group and the BDT-treatment group were clearly seen as separated. The OPLS-DA model ([Fig. 5C](#f5){ref-type="fig"}) and corresponding S-plot ([Fig. 5D](#f5){ref-type="fig"}) indicated that the levels of the potential biomarkers tended to recover to a normal level. The levels of valine, glutamine, TMAO and phenylalanine changed significantly and reversed to normal levels after BDT treatment (*P* \< 0.01, *P* \< 0.05). And the metabolites changed significantly mentioned above were labeled with number ([Fig. 5D](#f5){ref-type="fig"}). The *t*-test results of significant differences in these potential biomarkers and their changes after BDT administration are shown in [Table 3](#t3){ref-type="table"}. Permutation tests and CV-ANOVA (*p* \< 0.05) were also performed. All parameters indicating the model quality are listed in [Supplementary Table S1](#S1){ref-type="supplementary-material"}. As a result, BDT treatment showed the obvious effect on the biomarker panel that levels of glutamine, TMAO, and phenylalanine that changed significantly and also citrate, tyrosine and N-acetyl-glycoproteins exhibited a trend to normal levels. As a TCM for treating mental and emotional diseases, BDT drug intervention could demonstrate the high correlation between the biomarker panel and pathomechanism of psychological suboptimal health to a limited extent. Diagnostic capability evaluation of biomarker panel --------------------------------------------------- Biomarkers with higher sensitivity and specificity are expected to be developed. ROC analysis was applied to evaluate the accuracy of diagnosis based on the identified potential biomarkers or combinations and the area under the curve (AUC) of ROC; 0.5 \< AUC \< 0.7, 0.7 \< AUC \< 0.9, AUC \> 0.9 explain a low, fair, and superior accuracy of diagnosis, respectively. For most of the biomarkers, AUCs were \<0.8 ([Supplementary Figure S6 and Table S2](#S1){ref-type="supplementary-material"}), indicating a poor prediction probably in virtue of the inability of a single metabolite to predict a disease accurately or a small sample size. By selecting the metabolites demonstrating an AUC \> 0.7, some combinations of potential biomarkers, including the biomarker panel mentioned above that could provide higher predictive power than single one, were examined. Finally, the AUC of the biomarker panel reached 0.971. The ROC curves and AUCs of the combinations are shown in [Fig. 6](#f6){ref-type="fig"} and [Table 4](#t4){ref-type="table"}. The AUC of the biomarker panel containing 6 metabolites indicated the highest predictive ability and the highest correlation with psychological suboptimal health. In this study, methods of statistical analysis, correlation analysis, drug intervention and the ROC analysis were united, and a biomarker panel tightly correlated with psychological suboptimal health was identified and demonstrated. Combined with all the analysis, these findings revealed that the biomarker panel is reliable and robust and possess a perfect ability to separate psychological suboptimal health. In future, it would be a better diagnostic approach in clinical. Discussion ========== As we have known, few studies focus on establishing an objective and accurate diagnostic method of psychological suboptimal. Scales and questionnaires in public or self-made are applied in clinic widely, whereas an more credible standard of diagnosis has not been formulated yet. The existing circumstances of lack of objective laboratory diagnosis for early detection and curative effect evaluation index may bring about adverse effects in disease prevention such as depression or. As an exploration, this study applied NMR metabolomics in investigating the state of psychological suboptimal health that meaning "not yet ill" for the first time with the purpose of seeking out potential biomarkers or a biomarker panel highly related with the state and setting it as a laboratory diagnostic method in clinical. In this study, we discovered that a set of altered metabolites including amino acid (isoleucine, valine, phenylalanine, glutamine, and tyrosine), energy metabolism-related molecules (citrate and glucose) and other metabolism molecules (N-acetyl-glycoproteins and TMAO) that would be the potential biomarkers. A deeper insight of the internal relationship among the potential biomarkers and metabolic mechanisms closely related with state of psychological suboptimal should be gained and biological significance of potential biomarkers should be analyzed. We constructed systematic metabolic pathway analysis based on information obtained from the Kyoto Encyclopedia of Genes and Genomes Web site ([www.genome.jp/kegg/](http://www.genome.jp/kegg/)) and would be discussed in further details below. As a mental and emotional disorder, the out of control metabolic pathway highly interrelated with the state of psychological suboptimal health may relate with nervous system. And some perturbed significantly metabolites involved in neurotransmission including phenylalanine, tyrosine, valine and isoleucine were observed indeed. Phenylalanine is an essential amino acid absorbed from food that can be metabolized primarily in the liver into tyrosine, which is then used in dopamine (DA), norepinephrine (NE) and epinephrine synthesis in the nervous system and the adrenal medulla[@b37]. Disorder of phenylalanine metabolism s delays the process of phenylalanine translating into tyrosine and contributes to overbalanced levels of phenylalanine and tyrosine, and the equal phenomenon was also observed in the plasma of subjects in the psychological suboptimal health group in this study. Furthermore, researchers have shown that a higher level of phenylalanine would induce damage in the nervous system, resulting in hypokinesia, depression and psychogeny[@b38]. Previous research also suggested that phenylalanine was a large neutral amino acid that could affect 5-HT synthesis[@b39][@b40]. So we could deduce that a higher level of phenylalanine accompanying physical symptoms would indicate a state of psychological suboptimal health and imply that damages to the nervous system were in progress, and if it was ignored, mental disorder would emerge soon. In generally, valine and isoleucine are called branched-chain amino acids (BCAAs) because of their aliphatic side-chains. The decreased concentration of BCAAs in plasma could be an indication of the abnormal release of brain 5-HT that is highly related to central fatigue[@b41][@b42], which is in conformity with common symptoms of psychological suboptimal health in clinical that easy to get fatigued and memory deterioration. Also some metabolites at abnormality levels may be the precursor of neurotoxicity in nervous system, in this research, the major endogenous molecule we found was glutamine. As reported previously, glutamate is the primary excitatory neurotransmitter in the mammalian brain[@b43]. Through glia cells, glutamate is converted to glutamine and released into the extracellular fluid from which it is reabsorbed into presynaptic terminals and converted back to glutamate via the action of neuronal glutaminase. Glutamine and glutamate are inter-converted between neurons and astrocytes, which is necessary for glutamine homeostasis[@b44]. It induces neurotoxicity and is related to the neurobiology of depression if excessively released[@b45][@b46]. Also the increased level of glutamine in plasma may be a compensatory adaptation to counteract glutamate-induced neurotoxicity. This is in agreement with previous hypotheses[@b47][@b48]. Individuals in state of psychological suboptimal health are struggling with the condition of lack of vitality in clinical, in most instances and the appearance may indicate that metabolic disturbance of energy is highly related the pathomechanism. Citrate, as a potential biomarker which is related to energy metabolism, is a dominant intermediate of the tricarboxylic acid cycle (TCA). The higher level of citrate in the plasma samples of the subjects in the state of psychological suboptimal health is indicative of TCA cycle dysfunction. Also levels of the BCAAs containing valine and isoleucine declined sharply, suggesting their consumption in large quantities for energy supply[@b49], meanwhile isoleucine deficiency is marked by muscle tremors. Moreover an organism would be forced to produce ATP by anoxic respiration to adapt to the supply/demand imbalance because of deficient energy and the decreased level of glucose can be considered an indicator of the severity of the supply/demand imbalance. All the analysis of abnormal metabolic pathways energy related showed close relationship with clinical symptoms. Loss of appetite, a common symptom of psychological suboptimal health, has shown contact with abnormalities in gut microflora. Trimethylamine N-oxide (TMAO) is an oxidation product of trimethylamine (TMA) and a common metabolite in animals and human. In particular, TMAO is biosynthesized endogenously from TMA, which is derived from choline obtained from dietary lecithin or dietary carnitine. Several previous clinical studies have indicated that depressed patients display a disturbance of gut microflora, including concentration changes of metabolites such as TMAO, DMA and dimethylglycine[@b50]. Previous research also demonstrated that plasma choline is derived from phosphorylcholine by phosphotransferase. TMA could be converted by choline via gut microbiota and then detoxified through flavin monooxygenase in the liver, forming TMAO[@b51]. Therefore, it is plausible that the state of psychological suboptimal health caused a disturbance in gut microbiota colonies. Furthermore, we observed a higher level of N-acetyl-glycoproteins in the group of patients with psychological suboptimal health although most of the broad protein was eliminated by the method presented above and the resonances were suppressed by the CPMG pulse sequence[@b52]. Acetyl-glycoproteins are acute-phase proteins that can act as inflammation mediators[@b53] and the levels of these proteins increase immediately in response to external or internal challenges such as infection, inflammation, and stress[@b49] that are believed to be the cause of the state. Alterations in the levels of N-acetyl-glycoproteins may indicate that people have been suffering in an extreme environment and are developing psychological suboptimal health. This analysis would be the proof of close connection between N-acetyl-glycoproteins and extraneous factors leading to disease. All of the analysis above would be the foundation and deep proof of the relationship among the metabolites and pathological mechanisms as well as incentives. These metabolic changes and the associated pathways provide insights into the mechanisms involved in the development and progression of psychological suboptimal health. Furthermore, for the purpose of screening more representative biomarkers, methods of correlation analysis for selecting biomarkers as a biomarker panel and drug intervention for validating the close internal relations between the biomarker panel and the state were united. Then a biomarker panel containing phenylalanine, glutamine, tyrosine, citrate, N-acetyl-glycoproteins and TMAO was identified and high correlation with the state of psychological suboptimal was also demonstrated. As following, the ROC curve analysis for evaluation of clinical diagnosis ability was carried out. Small AUC of single one metabolite showed low diagnostic capability for the reason of small sample size or one metabolite cannot reflect comprehensively. But biomarker panel displayed the highest AUC (0.971) that show perfect diagnostic and recognition capability of psychological suboptimal health and would be used as an innovative diagnosis method. Finally, although a biomarker panel was sought out using ^1^H-NMR metabolomics, but a large number of clinical samples should be collected and technologies of GC-MS and LC-MS should be used to quantify these metabolites of the biomarker panel for the ultimate goal that the biomarkers can be applied in clinical diagnosis. Materials and Methods ===================== Ethical statement ----------------- All control and psychological suboptimal health subjects provided informed consent prior to the collection of any data. This research was approved by the Ethical Committee of the First Hospital of Shanxi Medical University in Taiyuan and was conducted according to the principles expressed in the Declaration of Helsinki. Written informed consents from all recruited participants were acquired. Subjects and assessment ----------------------- In this study, patients being the state of psychological suboptimal health (31--60 years) were filtrated from the traditional Chinese Medical Department of the First Affiliated Hospital of Shanxi Medical University as Baihe Dihuang Tang treatment group. Then age-and sex-matched mental health subjects were recruited to be the healthy controls. Briefly, patients were screened by items as follows:(1) totally scored ≥9 and ≤250 diagnosed by the scale of SCL-90; (2) cardinal symptom on the diagnostic criteria for deficiency of yin referring to the diagnosis curative standard of TCM disease; (3) not on any narcoleptic drugs within one year; (4) no mental disease, pregnancy, organic disease and allergic to TCM. The healthy controls should meet the standards: (1) score of SCL-90 should be at the point of 90; (2) no any previous history of neurological; (3) no systemic medical illness. Sample size calculation ----------------------- In the design of clinical trials, the number of participants was determined by the manipulators and the participators were made up of 30 patients and 30 healthy controls. Through screening outpatients in the hospital and recruiting healthy volunteers for 2 months, 30 patients and 30 healthy controls were included into the trial through the assessment standard mentioned above. Unfortunately, 8 patients were lost during the 4-week intervention with BDT with the potential reasons of the following: (1) medication cycle of 4 weeks was a little bit longer; (2) unable to endure the slow onset of TCM drug action; (3) not follow the doctor's advice and take other drugs not allowed in the trial. Moreover, 7 healthy controls fell off for the possible reasons followed: (1) suffering from a cold, inflammation or other diseases at the point of collecting samples; (2) not want to take part in this trial continuously; (3) not get to the hospital because of some unexpected situation. So at the end of the trial, samples of 22 patients and 23 healthy controls were used for analysis. BDT preparation process and dosage ---------------------------------- The medicinal plants used to prepare BDT decoction were purchased from the Chinese herbal medicine market in the city of An-guo, Hebei Province and authenticated by Professor Xue-mei Qin from Modern Research Center for Traditional Chinese Medicine, Shanxi University. The preparation was done in traditional Chinese Medical Department of the First Affiliated Hospital of Shanxi Medical University, where the standard machine and manipulators were performed according to the guidelines. Each dosage of BDT containing Lily bulb (30 g) and Rehmannia root (20 g) were soaked in water (1:8, w/v) for 30 min at room temperature and boiled for 1 h. The aqueous extract were filtered and concentrated to the volume of 200 mL, and then divided in two parts with the package automatically. The BDT was administrated to the patients with one dosage every day for 4 weeks and drinking or seafood was strictly prohibited in the case of the interference with this protocol. This clinical work was performed strictly and correctly in the First Affiliated Hospital of Shanxi Medical University, which is a first-class hospital with national clinical trials research center of new drugs (GCP center). Also the hospital has ethics committee and this work had been permitted. The manipulators of the research have been engaged in clinical work for many years, specializing in the treatment of mental disorders and participated clinical trials of new drugs on many occasions. Experimental program had been designed by the manipulators and they ensured the standardization of the experimental process according to the Good Clinical Practice. Plasma sample collection ------------------------ After the patients had fasted, 5 mL of venous blood was collected from all subjects in the psychological suboptimal health group into 10 mL heparin sodium tubes before and after 4 weeks of treatment. Blood was also collected from healthy controls before 4 weeks in the morning. Samples were centrifuged at 1250 × g for 15 min at 4 °C, after which each plasma sample was divided into equal aliquots and stored at −80 °C for subsequent analysis. Sample preparation ------------------ Plasma Samples were thawed at 0 °C in an ice-water mixture. First, 450 μl of plasma was mixed with 900 μl of analytical pure methanol, vortexed for 2 min, and then centrifuged at 16172 × g for 20 min at 4 °C to pellet proteins. After that, 1000 μl of supernatant was transferred into an EP tube. Another 900 μl of analytical pure methanol was added again, and the mixture was centrifuged at 16172 × g for 20 min at 4 °C for outright protein removal. Finally, a total of 1800 μl of supernatant was dried under nitrogen gas, and the dried samples were completely dissolved in 600 μl phosphate buffer solution in 100% D2O (0.2 M Na2HPO4/NaH2PO4, pD = 7.4) containing TSP (0.025%) to minimize chemical shift variations. The samples were then centrifuged (16172 × g, 10 min, at 4 °C) to eliminate any precipitates, and 550 μl of supernatant was transferred into 5 mm NMR tubes for NMR analysis[@b47]. Metabolic profiling data acquisition ------------------------------------ A Bruker 600 MHz AVANCE III NMR spectrometer (Bruker Biospin, Rheinstetten, Germany) was used to receive the ^1^H-NMR spectra of plasma samples, operating at a ^1^H frequency of 600.13 MHz and a temperature of 298 K. A one-dimensional (1D) Carr-Purcell-Merboom-Gill (CPMG, RD--90− (τcp−180−τcp) -acquisition) with water suppression and a total spin-spin relaxation delay of 320 ms was set for the plasma analysis. The ^1^H NMR spectrum for each sample consisted of 64 scans requiring 2.7 min of acquisition time with the following parameters: spectral width = 12019.2 Hz, spectral size = 65536 points, pulse width(90) = 14.0 μs, and relaxation delay (RD) = 1.0 s. FIDs were Fourier transformed with LB = 0.3 Hz. For a good signal dispersion and visualization, two-dimensional (2D) NMR spectra for the selected samples were also recorded using a 298 k on Bruker 600 MHz AVANCE III NMR spectrometer, including 1H--1H correlation spectroscopy (COSY) and 1H--13C heteronuclear multiple quantum coherence (HMQC). The 2D 1H-1H COSY experiments were acquired in magnitude mode (Bruker pulse sequence cosygpqf) at 600 MHz with 2k data points in F2 and 256 increments in F1, using spectral widths of 6602.1 and 6601.5 Hz in both dimensions. A total of 25 transients were collected with an acquisition time of 0.155 s. The relaxation delay was 1.5 s, the 90 pulse width was 14.0 μs, and the receiver gain 203. And also the 2D 1H-13C HMQC experiments were acquired in magnitude mode (Bruker pulse sequence hmqcgpqf) at 600 MHz with 1 k data points in F2 and 256 increments in F1, using a spectral width of 6602.1 Hz in ^1^H dimension and 36219.4 Hz in the ^13^C dimension. A total of 110 transients were collected with an acquisition time of 0.078 s. The relaxation delay was 1.5 s, the 90 pulse width was 14.0 μs, and the receiver gain 203. NMR data preprocessing ---------------------- The baseline and phase pretreatment of the acquired 1H NMR files were set manually with MestReNova software (Mestrelab Research, Santiago de Compostella, Spain). All of the spectra were referenced to the chemical shift of TSP located at δ 0.00 ppm. After the regions of δ 4.70--5.20 and δ 3.34--3.37 ppm were removed to eliminate the influence of water and methanol, the spectra were segmented at δ 0.01 intervals across the chemical shift range of 0.5 to 9.00 ppm. To reduce significant concentration differences between the samples, the integral values from each spectrum were normalized to a sum of all of the integrals in a spectrum, and date matrices were constructed for further multivariate analysis[@b54][@b55]. Data analysis ------------- Prior to statistical analysis, all resulting integral data from ^1^H-NMR metabolomics analysis were imported into SIMCA-P13.0 (Umetrics, Sweden) for multivariate analysis. Partial least squares discrimination analysis (PLS-DA) was conducted to distinguish different groups in a supervised manner. Parameters for model fitness (R^2^) and predictive ability (Q^2^) with leave-one-out cross validation and the response of the permutation test (200 cycles) should be used to evaluate whether the model is established or not because of the small number of samples[@b56]. Furthermore, a supervised pattern recognition approach known as an orthogonal projection to latent structures discriminant analysis (OPLS-DA) was used to improve the classification of the different groups while screening biomarkers. With an aim to discover the potential variables contributing to the differentiation, we generated an S-plot for the OPLS-DA model used to define metabolites significantly contributing to the separation of groups. On the basis of the variable importance in the project (VIP) threshold of 1 (VIP ≥ 1.00), a number of metabolites responsible for the difference in metabolic profiles of different groups could be obtained. In parallel, the metabolites identified by the OPLS-DA were validated at a univariate level using *t*-test (SPSS 17.0) with the critical *p* value set to 0.05 in order to detect the main metabolites that were significantly different leading to the class discrimination. A system statistical metabolic correlation analysis was further applied to display the relationships between these certain metabolite integrals[@b57]. Metabolite intensities relative to the sum of the total spectral integral were used as variables, and Spearman's correlation coefficient was calculated among those variables using Java. An absolute value of the correlation coefficient indicates a statistically significant relationship among these potential biomarkers. Positive values masked in the pixel map are shown with red colors, and negative values are indicated with blue colors. A receiver operating characteristic (ROC) curves was carried out to further evaluate the performance of the metabolites selected by *t*-test in clinical diagnosis. The area under the curve (AUC) was used to evaluate diagnostic psychological suboptimal health state values in the clinic. Additional Information ====================== **How to cite this article**: Tian, J.-s. *et al.* Discovery, screening and evaluation of a plasma biomarker panel for subjects with psychological suboptimal health state using ^1^H-NMR-based metabolomics profiles. *Sci. Rep.* **6**, 33820; doi: 10.1038/srep33820 (2016). Supplementary Material {#S1} ====================== ###### Supplementary Information This work was supported by the National Natural Science Foundation of China (No. 81441096), the project of Shanxi provincial health and Family Planning Commission (No. 2014ZY01), and the science and technology project of Shanxi province (201603D321077). Furthermore, we thanks to Prof. Xiang Zhang from the Department of Chemistry of the University of Louisville, US for his friendly revision on this manuscript. **Author Contributions** X.-m.Q. and G.-h.D. design of the study and writing the protocol. Y.-f.W. and L.Z. collection of samples and observation of clinical curative effect. X.-t.X. and H.X. collection and analysis of data and drafting of the manuscript. J.-s.T. conception and design, interpretation of data, writing and revising and final approval of the manuscript submitted. X.Z. friendly revision on the type and gramma. ![Typical ^1^H-NMR spectrum of plasma of psychological suboptimal human subject.\ The key identified metabolites: 1, 2-OH-butyrate; 2, 3-OH-butyrate; 3, Acetate; 4, Acetoacetate; 5, Alanine; 6, Betaine; 7, Carnitine; 8, Choline; 9, Citrate; 10, Creatine; 11, Cysteine; 12, Glutamine; 13, Glutamate; 14, Glycine; 15, Glycerol; 16, Histidine; 17, Isoleucine; 18, Lactate; 19, Leucine; 20, Lipids; 21, Methionine; 22, Methylamine; 23, Methanol; 24, N-acetyl-glycoproteins; 25, Phosphatidylcholine; 26, Phenylalanine; 27, Proline; 28, Pyruvate; 29, Trimethylamine oxide; 30, Tyrosine; 31, Valine; 32, Glucose.](srep33820-f1){#f1} ![Pattern recognition with Simca-P13.0.\ The PLS-DA score plot derived from ^1^H-NMR plasma spectra of psychological suboptimal group compared with healthy controls (**A**). The PLS-DA validation plots (permutation number: 200) pair-wise comparison of plasma from psychological suboptimal group and healthy controls (**B**). The OPLS-DA score plot derived from 1H NMR plasma spectra of psychological suboptimal group compared with healthy controls (**C**) Corresponding S-plot between psychological suboptimal group and healthy controls and the metabolites changed significantly:1, N-acetyl-glycoproteins; 2, Trimethylamine oxide; 3, Glutamine; 4, Glucose; 5, Valine; 6, Phenylalanine; 7, Isoleucine; 8, Citrate; 9, Tyrosine (**D**).](srep33820-f2){#f2} ![The heatmap plot between group of psychological suboptimal health and healthy controls.\ Red color indicates a higher level and green color indicates a lower level.](srep33820-f3){#f3} ![Systems analysis of potential biomarkers of psychological suboptimal and healthy controls with MetaboAnalyst 3.0 data annotation tools.\ The correlation heatmap display the correlation coefficients (Spearman) among biomarkers. The color-coded scale of correlation is at left, where a red color indicates a positive correlation, while a blue color indicates a negative correlation (**A**). The correlation analysis with Pattern Hunter (Spearman) between group of psychological suboptimal health and healthy controls, a red color indicates a positive correlation with the state of psychological suboptimal health, a blue color indicates a negative correlation with the state of psychological suboptimal (**B**).](srep33820-f4){#f4} ![Pattern recognition with Simca-P13.0.\ The PLS-DA scores plot derived from all the ^1^H-NMR plasma spectra including healthy controls, psychological suboptimal group and BDT group (**A**). The PLS-DA validation plots (permutation number: 200) for all samples including healthy controls, psychological suboptimal group and BDT group (**B**). The OPLS-DA scores plot between psychological suboptimal group and BDT group (**C**). Corresponding S-plot between psychological suboptimal group and BDT group and the metabolites changed significantly: 1, Phenylalanine; 2, Trimethylamine oxide; 3, Valine; 4, Glutamine (**D**).](srep33820-f5){#f5} ![The ROC curves of different biomarker combinations for diagnosis between group of psychological suboptimal and healthy controls.\ A, Citrate; B, Glutamine; C, Tyrosine; D, Phenylalanine; E, TMAO; F, N-acetyl-glycoproteins.](srep33820-f6){#f6} ###### General characteristic of the participants at baseline and at the end of the Baihe Dihuang Tang intervention (4 weeks) and the healthy controls.   Psychological suboptimal health Healthy controls ------------- --------------------------------- ------------------ ------------ Sample size 22 22 23 Sex (M/F) 4/18 4/18 5/18 Age (year) 48.7 ± 5.3 48.7 ± 5.3 49.3 ± 4.6 SCL-90 143.9 ± 22.6 112.4 ± 11.5\*\* 90 M: male; F: Female; SCL-90: The Symptom Checklist 90. \*\**P* \< 0.01 before and after 4 weeks. ###### Peak attribution of the main marked metabolites in ^1^H-NMR spectra of plasma samples. Key Metabolites Moieties δ^1^H/ppm and multiplicity/Hz Key Metabolites Moieties δ^1^H/ppm and multiplicity/Hz ----- --------------- ----------------------- ------------------------------- ----- ------------------------ ----------------------- ------------------------------- 1 2-OH-butyrate γCH~3~ 0.90 (t, 7.47) 17 Isoleucine δCH~3~ γ'CH~3~ 0.94 (t, 7.4) 1.02 (d, 7.0) 2 3-OH-butyrate γCH~3~ αCH 1.20 (d, 6.60) 4.15 (m) 18 Lactate βCH~3~ αCH 1.33 (d, 6.9) 4.12 (q, 6.9) 3 Acetate βCH~3~ 1.93 (s) 19 Leucine δCH~3~ αCH~2~ 0.96 (d) 3.73 (m) 4 Acetoacetate CH~3~ CH 2.28 (s) 3.48 (s) 20 Lipids CH~3~ (CH~2~)~n~ 0.84 (t) 1.28 (m) 5 Alanine βCH~3~ CH 1.48 (d, 7.3) 3.77 (m) 21 Methionine γCH~2~ S-CH~3~ 2.62 (t, 7.58) 2.14 (s) 6 Betaine N(CH~3~)~3~ CH~2~ 3.27 (m) 3.89 (s) 22 Methylamine CH~3~ 2.61 (s) 7 Carnitine N(CH~3~)~3~ 3.21 (s) 23 Methanol CH~3~ 3.36 (s) 8 Choline N(CH~3~)~3~ 3.20 (s) 24 N-acetyl-glycoproteins CH~3~ 2.04 (s) 9 Citrate Half CH~2~ Half CH~2~ 2.54 (d, 16.1) 2.65 (d, 16.2) 25 Phosphatidylcholine N(CH~3~)~3~ 3.22 (s) 10 Creatine N-CH~3~ CH~2~ 3.93 (s) 3.04 (s) 26 Phenylalanine 2 and 6-CH 3 and 5-CH 7.33 (m) 7.42 (m) 11 Cysteine CH CH~2~ 3.97 (dd) 3.06 (m) 27 Proline αCH~2~ βCH~2~ 1.99 (m) 2.34 (m) 12 Glutamine αCH βCH~2~ 2.16 (m) 2.45 (m) 28 Pyruvate CH~3~ 2.38 (m) 13 Glutamate βCH~2~ γCH~2~ 2.07 (m) 2.35 (m) 29 Trimethylamine oxide CH~3~ 3.26 (m) 14 Glycine αCH~2~ 3.57 (s) 30 Tyrosine 3 and 5-CH 2 and 6-CH 6.90 (m) 7.19 (m) 15 glycerol CH~2~ CH 3.67 (m) 3.78 (m) 31 Valine γCH~3~ γ'CH~3~ 0.99 (d, 7.1) 1.05 (d, 7.0) 16 Histidine 2-CH 4-CH 7.68 (s) 7.10 (s) 32 Glucose C~1~H 5.22 (d, 3.7) 4.64 (d, 8.0) ^a^s: singlet, d: doublet, t: triplet, q: quartet, m: multiplet, dd: doublet of doublet. ###### Metabolites selected as biomarkers characterized in plasma profile and their change trend after Baihe Dihuang Tang treatment. No. Metabolites Shift chemical[a](#t3-fn1){ref-type="fn"} Patients *vs.* Control[b](#t3-fn2){ref-type="fn"} *P* value Treated *vs.* before Treatment[b](#t3-fn2){ref-type="fn"} *P* value Metabolism Pathway ----- ------------------------ ------------------------------------------- --------------------------------------------------- ------------ ----------------------------------------------------------- ------------ ------------------------ 1 valine 1.00 (d) 1.05 (d) ↓ 2.26E-03\* ↑ 3.02E-05\* Amino acid metabolism 2 Isoleucine 0.94 (t) 1.02 (d) ↓ 3.04E-02\* ↑ 2.09E-01 Amino acid metabolism 3 Glutamine 2.45 (m) 2.16 (m) ↑ 2.64E-04\* ↓ 4.56E-03\* Amino acid metabolism 4 Citrate 2.54 (d) ↑ 1.13E-02\* ↓ 7.59E-02 TCA cycle 5 Glucose 4.66 (d) ↓ 1.99E-03\* ↑ 2.06E-01 Glucose metabolism 6 Trimethylamine oxide 3.26 (s) ↑ 8.76E-03\* ↓ 4.99E-10\* Methylamine metabolism 7 N-acetyl-glycoproteins 2.04 (s) ↑ 1.13E-02\* ↓ 6.88E-01 inflammatory responses 8 Tyrosine 6.90 (m) 7.19 (m) ↑ 9.15E-04\* ↓ 1.63E-01 Amino acid metabolism 9 Phenylalanine 7.36 (m) 7.42 (m) ↑ 1.22E-03\* ↓ 8.60E-03\* Amino acid metabolism ^a^Multiplicity definitions: s, singlet; d, doublet; t, triplet; m, multiplet. ^b^Metabolites with"↑/↓" means increased/decreased, "\*" means dates significant differences. ###### Area under the curves of the biomarker combinations. Biomarkers Area Std. Error Asymptotic Sig. Asymptotic 95% Confidence Interval ----------------------- ------- ------------ ----------------- ------------------------------------ ------- A 0.814 0.068 0.000 0.680 0.948 A + B 0.882 0.053 0.000 0.778 0.987 A + B + C 0.880 0.051 0.000 0.781 0.979 A + B + C + D 0.890 0.048 0.000 0.797 0.984 A + B + C + D + E 0.924 0.040 0.000 0.845 1.002 A + B + C + D + E + F 0.971 0.020 0.000 0.931 1.011 A, Citrate; B, Glutamine; C, Tyrosine; D, Phenylalanine; E, TMAO; F, N-acetyl-glycoproteins.
{ "pile_set_name": "PubMed Central" }
Steve Austin (runner) Stephen John "Steve" Austin (born 14 February 1951) is an Australian athlete. He competed in the 5000m and 10000m at the 1980 Summer Olympics. References Category:1951 births Category:Living people Category:Australian male long-distance runners Category:Athletes (track and field) at the 1980 Summer Olympics Category:Olympic athletes of Australia
{ "pile_set_name": "Wikipedia (en)" }
Renaissance Ballroom & Casino The Renaissance Ballroom & Casino was originally, when built in 1921, a New York City complex that included a casino, ballroom, 900-seat theater, six retail stores, and a basketball arena. It was located in the Harlem neighborhood of Manhattan at 2341–2349 Adam Clayton Powell Jr. Boulevard, on the east-side of the boulevard between 137th and 138th Streets. The 7th Avenue frontage spanned the entire block. History The Renaissance Theatre Building, as it was originally named, opened January 1921. It was built and owned, until 1931, African Americans. It was known as the "Rennie" and was an upscale reception hall. The "Renny" held prize fights, dance marathons, film screenings, concerts, and stage acts. It was also a meeting place for social clubs and political organizations in Harlem. They gathered to dance the popular dances at the time, the Charleston, Lindy Hop, and Black Bottom, to live music performed by well known jazz musicians. Jazz artists such as Fletcher Henderson, Duke Ellington, Count Basie, Cootie Williams, and Ella Fitzgerald performed at the "Renny". In the 1920s the Renaissance Ballroom was known as a "Black Mecca". It hosted Joe Louis fights. The ballroom was on the second floor of the entertainment complex. The "Renny" was a significant entertainment center during the Harlem Renaissance, and the New Negro Movement in Harlem. When African American culture and art flourished. historically important structure helped usher in the decade-long period of African American cultural and artistic flourishing, which at the time was known as the New Negro Movement. William H. Roach from Antigua, Cleophus Charity and Joseph H. Sweeney from Montserrat were the founding builders of the Renaissance Complex. They were members of Marcus Garvey’s Universal Negro Improvement Association (UNIA). Developers, owners, and operators The African-American owned and operated firm, The Sarco Realty & Holding Company, Inc., raised the funds for the project by selling shares to the public, initially, in February 1920, at 10¢ a share. Sarco's executive directors were William H. Roach, president and general manager; Cleo Charity (1889–1964), vice-president and treasurer; Cornelius Charity, second vice-president; and Joseph Henry Sweeney (1889–1932), secretary. The other directors were John Blake, Edmund Osborne, Shervington Lee, and Edward B. Lynch. Sarco Realty and the R. Holding Company, of which Roach was also President, purchased the land. Sarco contracted Isaac A. Hopper's Sons to erect the Renaissance Theatre building, at a cost of $175,000. Sarco Realty owned and managed the building until 1931. And, Sarco Realty owned and operated the Renaissance Casino and Theatre until 1931. Original design The Renaissance was designed by Harry Creighton Ingalls, who also designed the Henry Miller and Little Theatres in the Theater District. The design was Moorish with glazed tile and palladian windows. The complex had a ballroom, a billiard parlor, stores, and a restaurant called China House. There was a basketball team known as Harlem Rens. The theater had 900-seats and featured movies by Oscar Micheaux, the first African American to produce feature-length films. It was used by the N.A.A.C.P for an Anti-lynching movement meeting in 1923. Neighborhood of historic jazz venues The Renaissance Ballroom was one of several legendary Harlem jazz venues in the 1920s. Others included the Uptown Cotton Club, Connie's Inn, and the Savoy Ballroom. The "Rennie" was open to African-Americans, while some of the other well clubs in Harlem did not cater to African Americans. Notable events and mementos In 1953, David Dinkins — who served as the first African American mayor of New York from 1990 to 1993 — had his wedding reception at the Renaissance. In the 1990s, the location was used in Spike Lee's film Jungle Fever as a backdrop for a crack den. Cessation of operations The Renaissance Complex closed in 1979. In 1989, The Renny was purchased by the Abyssinian Development Corporation, an organization established in 1989 as a nonprofit corporation. Abyssinian Development Corporation had planned to restore the "Renny," which it did not do. In 1991 attempts were made for the Renaissance to become a landmark by the Landmarks Preservation Commission. It was agreed on but it did not happen. Recent and current use In May 2014 from Abyssinian Development Corporation sold the Renaissance Complex for $15 million. In 2015 BRP a New York-based developer secured a construction loan from Santander Bank for $53.2 million for the development of a mixed-income residential rental complex. The new building, called "The Renny," has an LEED-Silver certification with ecological structure features such as solar panels, a green roof, an energy-efficient boiler and water-saving plumbing Community criticism of current use Prior to commencing the construction of the new Renny in 2015, Harlem residents expressed concerns that the new structure (i) would not improve the African American community in that area of Harlem and (ii) would destroy an important building related to the history of Harlem and an important to the history of the U.S. Notes and references Notes References External links Save the Renaissance Ballroom - Claude Johnson Black Fives Norma Miller - The Savoy Ballroom Harlem Foxtrot (Swing Walk) at the Savoy Ballroom Sugar Sullivan "Renaissance Theatre" at Cinema Treasures Category:Harlem Category:Nightclubs in Manhattan Category:Defunct drinking establishments in Manhattan Category:Defunct buildings and structures in Manhattan Category:History of Manhattan Category:Cultural history of New York City Category:Former music venues in New York City Category:Music of New York City Category:African-American history in New York City Category:1924 establishments in New York (state) Category:1979 disestablishments in New York (state) Category:Jazz clubs in Harlem Category:Music venues completed in 1924 Category:1920s in the United States Category:Defunct jazz clubs in the United States Category:Defunct nightclubs in the United States Category:Lindy Hop
{ "pile_set_name": "Wikipedia (en)" }
You know this article gives me a good bit of solace. It is about rising conservativism on college campuses as a reaction to an academia utterly steeped in 60s liberalism. I beginning to think that we might be the only ones. Anyway, don't read this whole article because it is really long. Here are two of the highlights that I thought were funny: He cites The Counterweight's satiric twitting of the campus performances of ''The Vagina Monologues.'' The paper has published an annual ''Penis Monologues'' rich in sophomoric humor (''My man-hammer has not clubbed a single baby seal. . . . ''), and each year it sparks anger in the college's various women's support groups. ''Did we print that piece knowing that the feminists would blow a gasket?'' Boland says. ''Yes. But we did it anyway, because it was fun to write and the response allowed us to show how intolerant and intellectually lazy some feminists had become.'' I think that I am going to start using the word "paleo": ''I think the paleos are dying out,'' Mitchell says. He's referring to the conservative movement's Old Guard, whom the author David Frum recently labeled the ''paleoconservatives.'' Mitchell and his friends can't abide them.
{ "pile_set_name": "Pile-CC" }
Annual risk of tuberculous infection in rural areas of Junagadh district. Paucity of epidemiological data on tuberculosis in India prompted the National Tuberculosis Institute, Bangalore to embark upon a nation-wide survey to estimate the Annual Risk of Tuberculosis Infection in different parts of the country. The survey in Junagadh district, one of the 26 districts drafted under the nation-wide survey is reported here. The prevalence of infection from the analysis of 3164 children not displaying scars of the BCG vaccination was 4.16% (CI: 3.17-5.14) and from this data the ARI was computed as 0.73% (CI: 0.55-0.91). The inclusion of vaccinated children into the study group yielded similar results. The estimate of the ARI in Junagadh district is lesser than that in several other parts of India which is probably in consonance with its better socio-economic development.
{ "pile_set_name": "PubMed Abstracts" }
/* * This file is part of the CmBacktrace Library. * * Copyright (c) 2016-2017, Armink, <armink.ztl@gmail.com> * * Permission is hereby granted, free of charge, to any person obtaining * a copy of this software and associated documentation files (the * 'Software'), to deal in the Software without restriction, including * without limitation the rights to use, copy, modify, merge, publish, * distribute, sublicense, and/or sell copies of the Software, and to * permit persons to whom the Software is furnished to do so, subject to * the following conditions: * * The above copyright notice and this permission notice shall be * included in all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND, * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. * IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY * CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, * TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE * SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. * * Function: Initialize function and other general function. * Created on: 2016-12-15 */ #include "utils/debug/CmBacktrace/cm_backtrace.h" #include <stdbool.h> #include <string.h> #include <stdio.h> #if __STDC_VERSION__ < 199901L #error "must be C99 or higher. try to add '-std=c99' to compile parameters" #endif #if defined(__CC_ARM) #define SECTION_START(_name_) _name_##$$Base #define SECTION_END(_name_) _name_##$$Limit #define IMAGE_SECTION_START(_name_) Image$$##_name_##$$Base #define IMAGE_SECTION_END(_name_) Image$$##_name_##$$Limit #define CSTACK_BLOCK_START(_name_) SECTION_START(_name_) #define CSTACK_BLOCK_END(_name_) SECTION_END(_name_) #define CODE_SECTION_START(_name_) IMAGE_SECTION_START(_name_) #define CODE_SECTION_END(_name_) IMAGE_SECTION_END(_name_) extern const int CSTACK_BLOCK_START(CMB_CSTACK_BLOCK_NAME); extern const int CSTACK_BLOCK_END(CMB_CSTACK_BLOCK_NAME); extern const int CODE_SECTION_START(CMB_CODE_SECTION_NAME); extern const int CODE_SECTION_END(CMB_CODE_SECTION_NAME); #elif defined(__ICCARM__) #pragma section=CMB_CSTACK_BLOCK_NAME #pragma section=CMB_CODE_SECTION_NAME #elif defined(__GNUC__) extern const int CMB_CSTACK_BLOCK_START; extern const int CMB_CSTACK_BLOCK_END; extern const int CMB_CODE_SECTION_START; extern const int CMB_CODE_SECTION_END; #else #error "not supported compiler" #endif enum { PRINT_FIRMWARE_INFO, PRINT_ASSERT_ON_THREAD, PRINT_ASSERT_ON_HANDLER, PRINT_THREAD_STACK_INFO, PRINT_MAIN_STACK_INFO, PRINT_THREAD_STACK_OVERFLOW, PRINT_MAIN_STACK_OVERFLOW, PRINT_CALL_STACK_INFO, PRINT_CALL_STACK_ERR, PRINT_FAULT_ON_THREAD, PRINT_FAULT_ON_HANDLER, PRINT_REGS_TITLE, PRINT_HFSR_VECTBL, PRINT_MFSR_IACCVIOL, PRINT_MFSR_DACCVIOL, PRINT_MFSR_MUNSTKERR, PRINT_MFSR_MSTKERR, PRINT_MFSR_MLSPERR, PRINT_BFSR_IBUSERR, PRINT_BFSR_PRECISERR, PRINT_BFSR_IMPREISERR, PRINT_BFSR_UNSTKERR, PRINT_BFSR_STKERR, PRINT_BFSR_LSPERR, PRINT_UFSR_UNDEFINSTR, PRINT_UFSR_INVSTATE, PRINT_UFSR_INVPC, PRINT_UFSR_NOCP, PRINT_UFSR_UNALIGNED, PRINT_UFSR_DIVBYZERO0, PRINT_DFSR_HALTED, PRINT_DFSR_BKPT, PRINT_DFSR_DWTTRAP, PRINT_DFSR_VCATCH, PRINT_DFSR_EXTERNAL, PRINT_MMAR, PRINT_BFAR, }; static const char * const print_info[] = { #if (CMB_PRINT_LANGUAGE == CMB_PRINT_LANGUAGE_ENGLISH) [PRINT_FIRMWARE_INFO] = "Firmware name: %s, hardware version: %s, software version: %s", [PRINT_ASSERT_ON_THREAD] = "Assert on thread %s", [PRINT_ASSERT_ON_HANDLER] = "Assert on interrupt or bare metal(no OS) environment", [PRINT_THREAD_STACK_INFO] = "===== Thread stack information =====", [PRINT_MAIN_STACK_INFO] = "====== Main stack information ======", [PRINT_THREAD_STACK_OVERFLOW] = "Error: Thread stack(%08x) was overflow", [PRINT_MAIN_STACK_OVERFLOW] = "Error: Main stack(%08x) was overflow", [PRINT_CALL_STACK_INFO] = "Show more call stack info by run: addr2line -e %s%s -a -f %.*s", [PRINT_CALL_STACK_ERR] = "Dump call stack has an error", [PRINT_FAULT_ON_THREAD] = "Fault on thread %s", [PRINT_FAULT_ON_HANDLER] = "Fault on interrupt or bare metal(no OS) environment", [PRINT_REGS_TITLE] = "=================== Registers information ====================", [PRINT_HFSR_VECTBL] = "Hard fault is caused by failed vector fetch", [PRINT_MFSR_IACCVIOL] = "Memory management fault is caused by instruction access violation", [PRINT_MFSR_DACCVIOL] = "Memory management fault is caused by data access violation", [PRINT_MFSR_MUNSTKERR] = "Memory management fault is caused by unstacking error", [PRINT_MFSR_MSTKERR] = "Memory management fault is caused by stacking error", [PRINT_MFSR_MLSPERR] = "Memory management fault is caused by floating-point lazy state preservation", [PRINT_BFSR_IBUSERR] = "Bus fault is caused by instruction access violation", [PRINT_BFSR_PRECISERR] = "Bus fault is caused by precise data access violation", [PRINT_BFSR_IMPREISERR] = "Bus fault is caused by imprecise data access violation", [PRINT_BFSR_UNSTKERR] = "Bus fault is caused by unstacking error", [PRINT_BFSR_STKERR] = "Bus fault is caused by stacking error", [PRINT_BFSR_LSPERR] = "Bus fault is caused by floating-point lazy state preservation", [PRINT_UFSR_UNDEFINSTR] = "Usage fault is caused by attempts to execute an undefined instruction", [PRINT_UFSR_INVSTATE] = "Usage fault is caused by attempts to switch to an invalid state (e.g., ARM)", [PRINT_UFSR_INVPC] = "Usage fault is caused by attempts to do an exception with a bad value in the EXC_RETURN number", [PRINT_UFSR_NOCP] = "Usage fault is caused by attempts to execute a coprocessor instruction", [PRINT_UFSR_UNALIGNED] = "Usage fault is caused by indicates that an unaligned access fault has taken place", [PRINT_UFSR_DIVBYZERO0] = "Usage fault is caused by Indicates a divide by zero has taken place (can be set only if DIV_0_TRP is set)", [PRINT_DFSR_HALTED] = "Debug fault is caused by halt requested in NVIC", [PRINT_DFSR_BKPT] = "Debug fault is caused by BKPT instruction executed", [PRINT_DFSR_DWTTRAP] = "Debug fault is caused by DWT match occurred", [PRINT_DFSR_VCATCH] = "Debug fault is caused by Vector fetch occurred", [PRINT_DFSR_EXTERNAL] = "Debug fault is caused by EDBGRQ signal asserted", [PRINT_MMAR] = "The memory management fault occurred address is %08x", [PRINT_BFAR] = "The bus fault occurred address is %08x", #elif (CMB_PRINT_LANGUAGE == CMB_PRINT_LANGUAGE_CHINESE) [PRINT_FIRMWARE_INFO] = "固件名称:%s,硬件版本号:%s,软件版本号:%s", [PRINT_ASSERT_ON_THREAD] = "在线程(%s)中发生断言", [PRINT_ASSERT_ON_HANDLER] = "在中断或裸机环境下发生断言", [PRINT_THREAD_STACK_INFO] = "=========== 线程堆栈信息 ===========", [PRINT_MAIN_STACK_INFO] = "============ 主堆栈信息 ============", [PRINT_THREAD_STACK_OVERFLOW] = "错误:线程栈(%08x)发生溢出", [PRINT_MAIN_STACK_OVERFLOW] = "错误:主栈(%08x)发生溢出", [PRINT_CALL_STACK_INFO] = "查看更多函数调用栈信息,请运行:addr2line -e %s%s -a -f %.*s", [PRINT_CALL_STACK_ERR] = "获取函数调用栈失败", [PRINT_FAULT_ON_THREAD] = "在线程(%s)中发生错误异常", [PRINT_FAULT_ON_HANDLER] = "在中断或裸机环境下发生错误异常", [PRINT_REGS_TITLE] = "========================= 寄存器信息 =========================", [PRINT_HFSR_VECTBL] = "发生硬错误,原因:取中断向量时出错", [PRINT_MFSR_IACCVIOL] = "发生存储器管理错误,原因:企图从不允许访问的区域取指令", [PRINT_MFSR_DACCVIOL] = "发生存储器管理错误,原因:企图从不允许访问的区域读、写数据", [PRINT_MFSR_MUNSTKERR] = "发生存储器管理错误,原因:出栈时企图访问不被允许的区域", [PRINT_MFSR_MSTKERR] = "发生存储器管理错误,原因:入栈时企图访问不被允许的区域", [PRINT_MFSR_MLSPERR] = "发生存储器管理错误,原因:惰性保存浮点状态时发生错误", [PRINT_BFSR_IBUSERR] = "发生总线错误,原因:指令总线错误", [PRINT_BFSR_PRECISERR] = "发生总线错误,原因:精确的数据总线错误", [PRINT_BFSR_IMPREISERR] = "发生总线错误,原因:不精确的数据总线错误", [PRINT_BFSR_UNSTKERR] = "发生总线错误,原因:出栈时发生错误", [PRINT_BFSR_STKERR] = "发生总线错误,原因:入栈时发生错误", [PRINT_BFSR_LSPERR] = "发生总线错误,原因:惰性保存浮点状态时发生错误", [PRINT_UFSR_UNDEFINSTR] = "发生用法错误,原因:企图执行未定义指令", [PRINT_UFSR_INVSTATE] = "发生用法错误,原因:试图切换到 ARM 状态", [PRINT_UFSR_INVPC] = "发生用法错误,原因:无效的异常返回码", [PRINT_UFSR_NOCP] = "发生用法错误,原因:企图执行协处理器指令", [PRINT_UFSR_UNALIGNED] = "发生用法错误,原因:企图执行非对齐访问", [PRINT_UFSR_DIVBYZERO0] = "发生用法错误,原因:企图执行除 0 操作", [PRINT_DFSR_HALTED] = "发生调试错误,原因:NVIC 停机请求", [PRINT_DFSR_BKPT] = "发生调试错误,原因:执行 BKPT 指令", [PRINT_DFSR_DWTTRAP] = "发生调试错误,原因:数据监测点匹配", [PRINT_DFSR_VCATCH] = "发生调试错误,原因:发生向量捕获", [PRINT_DFSR_EXTERNAL] = "发生调试错误,原因:外部调试请求", [PRINT_MMAR] = "发生存储器管理错误的地址:%08x", [PRINT_BFAR] = "发生总线错误的地址:%08x", #else #error "CMB_PRINT_LANGUAGE defined error in 'cmb_cfg.h'" #endif }; static char fw_name[CMB_NAME_MAX] = {0}; static char hw_ver[CMB_NAME_MAX] = {0}; static char sw_ver[CMB_NAME_MAX] = {0}; static uint32_t main_stack_start_addr = 0; static size_t main_stack_size = 0; static uint32_t code_start_addr = 0; static size_t code_size = 0; static bool init_ok = false; static char call_stack_info[CMB_CALL_STACK_MAX_DEPTH * (8 + 1)] = { 0 }; static bool on_fault = false; static bool stack_is_overflow = false; static struct cmb_hard_fault_regs regs; #if (CMB_CPU_PLATFORM_TYPE == CMB_CPU_ARM_CORTEX_M4) || (CMB_CPU_PLATFORM_TYPE == CMB_CPU_ARM_CORTEX_M7) static bool statck_has_fpu_regs = false; #endif static bool on_thread_before_fault = false; /** * library initialize */ void cm_backtrace_init(const char *firmware_name, const char *hardware_ver, const char *software_ver) { strncpy(fw_name, firmware_name, CMB_NAME_MAX); strncpy(hw_ver, hardware_ver, CMB_NAME_MAX); strncpy(sw_ver, software_ver, CMB_NAME_MAX); #if defined(__CC_ARM) main_stack_start_addr = (uint32_t)&CSTACK_BLOCK_START(CMB_CSTACK_BLOCK_NAME); main_stack_size = (uint32_t)&CSTACK_BLOCK_END(CMB_CSTACK_BLOCK_NAME) - main_stack_start_addr; code_start_addr = (uint32_t)&CODE_SECTION_START(CMB_CODE_SECTION_NAME); code_size = (uint32_t)&CODE_SECTION_END(CMB_CODE_SECTION_NAME) - code_start_addr; #elif defined(__ICCARM__) main_stack_start_addr = (uint32_t)__section_begin(CMB_CSTACK_BLOCK_NAME); main_stack_size = (uint32_t)__section_end(CMB_CSTACK_BLOCK_NAME) - main_stack_start_addr; code_start_addr = (uint32_t)__section_begin(CMB_CODE_SECTION_NAME); code_size = (uint32_t)__section_end(CMB_CODE_SECTION_NAME) - code_start_addr; #elif defined(__GNUC__) main_stack_start_addr = (uint32_t)(&CMB_CSTACK_BLOCK_START); main_stack_size = (uint32_t)(&CMB_CSTACK_BLOCK_END) - main_stack_start_addr; code_start_addr = (uint32_t)(&CMB_CODE_SECTION_START); code_size = (uint32_t)(&CMB_CODE_SECTION_END) - code_start_addr; #else #error "not supported compiler" #endif init_ok = true; } /** * print firmware information, such as: firmware name, hardware version, software version */ void cm_backtrace_firmware_info(void) { cmb_println(print_info[PRINT_FIRMWARE_INFO], fw_name, hw_ver, sw_ver); } #ifdef CMB_USING_OS_PLATFORM /** * Get current thread stack information * * @param sp stack current pointer * @param start_addr stack start address * @param size stack size */ static void get_cur_thread_stack_info(uint32_t sp, uint32_t *start_addr, size_t *size) { CMB_ASSERT(start_addr); CMB_ASSERT(size); #if (CMB_OS_PLATFORM_TYPE == CMB_OS_PLATFORM_RTT) *start_addr = (uint32_t) rt_thread_self()->stack_addr; *size = rt_thread_self()->stack_size; #elif (CMB_OS_PLATFORM_TYPE == CMB_OS_PLATFORM_UCOSII) extern OS_TCB *OSTCBCur; *start_addr = (uint32_t) OSTCBCur->OSTCBStkBottom; *size = OSTCBCur->OSTCBStkSize * sizeof(OS_STK); #elif (CMB_OS_PLATFORM_TYPE == CMB_OS_PLATFORM_UCOSIII) extern OS_TCB *OSTCBCurPtr; *start_addr = (uint32_t) OSTCBCurPtr->StkBasePtr; *size = OSTCBCurPtr->StkSize * sizeof(CPU_STK_SIZE); #elif (CMB_OS_PLATFORM_TYPE == CMB_OS_PLATFORM_FREERTOS) *start_addr = (uint32_t)vTaskStackAddr(); *size = vTaskStackSize() * sizeof( StackType_t ); #endif } /** * Get current thread name */ static const char *get_cur_thread_name(void) { #if (CMB_OS_PLATFORM_TYPE == CMB_OS_PLATFORM_RTT) return rt_thread_self()->name; #elif (CMB_OS_PLATFORM_TYPE == CMB_OS_PLATFORM_UCOSII) extern OS_TCB *OSTCBCur; #if OS_TASK_NAME_SIZE > 0 || OS_TASK_NAME_EN > 0 return (const char *)OSTCBCur->OSTCBTaskName; #else return NULL; #endif /* OS_TASK_NAME_SIZE > 0 || OS_TASK_NAME_EN > 0 */ #elif (CMB_OS_PLATFORM_TYPE == CMB_OS_PLATFORM_UCOSIII) extern OS_TCB *OSTCBCurPtr; return (const char *)OSTCBCurPtr->NamePtr; #elif (CMB_OS_PLATFORM_TYPE == CMB_OS_PLATFORM_FREERTOS) return vTaskName(); #endif } #endif /* CMB_USING_OS_PLATFORM */ #ifdef CMB_USING_DUMP_STACK_INFO /** * dump current stack information */ static void dump_stack(uint32_t stack_start_addr, size_t stack_size, uint32_t *stack_pointer) { if (stack_is_overflow) { if (on_thread_before_fault) { cmb_println(print_info[PRINT_THREAD_STACK_OVERFLOW], stack_pointer); } else { cmb_println(print_info[PRINT_MAIN_STACK_OVERFLOW], stack_pointer); } if ((uint32_t) stack_pointer < stack_start_addr) { stack_pointer = (uint32_t *) stack_start_addr; } else if ((uint32_t) stack_pointer > stack_start_addr + stack_size) { stack_pointer = (uint32_t *) (stack_start_addr + stack_size); } } cmb_println(print_info[PRINT_THREAD_STACK_INFO]); for (; (uint32_t) stack_pointer < stack_start_addr + stack_size; stack_pointer++) { cmb_println(" addr: %08x data: %08x", stack_pointer, *stack_pointer); } cmb_println("===================================="); } #endif /* CMB_USING_DUMP_STACK_INFO */ /** * backtrace function call stack * * @param buffer call stack buffer * @param size buffer size * @param sp stack pointer * * @return depth */ size_t cm_backtrace_call_stack(uint32_t *buffer, size_t size, uint32_t sp) { uint32_t stack_start_addr = main_stack_start_addr, pc; size_t depth = 0, stack_size = main_stack_size; bool regs_saved_lr_is_valid = false; if (on_fault) { if (!stack_is_overflow) { /* first depth is PC */ buffer[depth++] = regs.saved.pc; /* second depth is from LR, so need decrease a word to PC */ pc = regs.saved.lr - sizeof(size_t); if ((pc >= code_start_addr) && (pc <= code_start_addr + code_size) && (depth < CMB_CALL_STACK_MAX_DEPTH) && (depth < size)) { buffer[depth++] = pc; regs_saved_lr_is_valid = true; } } #ifdef CMB_USING_OS_PLATFORM /* program is running on thread before fault */ if (on_thread_before_fault) { get_cur_thread_stack_info(sp, &stack_start_addr, &stack_size); } } else { /* OS environment */ if (cmb_get_sp() == cmb_get_psp()) { get_cur_thread_stack_info(sp, &stack_start_addr, &stack_size); } #endif /* CMB_USING_OS_PLATFORM */ } if (stack_is_overflow) { if (sp < stack_start_addr) { sp = stack_start_addr; } else if (sp > stack_start_addr + stack_size) { sp = stack_start_addr + stack_size; } } /* copy called function address */ for (; sp < stack_start_addr + stack_size; sp += sizeof(size_t)) { /* the *sp value may be LR, so need decrease a word to PC */ pc = *((uint32_t *) sp) - sizeof(size_t); /* the Cortex-M using thumb instruction, so the pc must be an odd number */ if (pc % 2 == 0) { continue; } if ((pc >= code_start_addr) && (pc <= code_start_addr + code_size) \ && (depth < CMB_CALL_STACK_MAX_DEPTH) && (depth < size)) { /* the second depth function may be already saved, so need ignore repeat */ if ((depth == 2) && regs_saved_lr_is_valid && (pc == buffer[1])) { continue; } buffer[depth++] = pc; } } return depth; } /** * dump function call stack * * @param sp stack pointer */ static void print_call_stack(uint32_t sp) { size_t i, cur_depth = 0; uint32_t call_stack_buf[CMB_CALL_STACK_MAX_DEPTH] = {0}; cur_depth = cm_backtrace_call_stack(call_stack_buf, CMB_CALL_STACK_MAX_DEPTH, sp); for (i = 0; i < cur_depth; i++) { sprintf(call_stack_info + i * (8 + 1), "%08lx", call_stack_buf[i]); call_stack_info[i * (8 + 1) + 8] = ' '; } if (cur_depth) { cmb_println(print_info[PRINT_CALL_STACK_INFO], fw_name, CMB_ELF_FILE_EXTENSION_NAME, cur_depth * (8 + 1), call_stack_info); } else { cmb_println(print_info[PRINT_CALL_STACK_ERR]); } } /** * backtrace for assert * * @param sp the stack pointer when on assert occurred */ void cm_backtrace_assert(uint32_t sp) { CMB_ASSERT(init_ok); #ifdef CMB_USING_OS_PLATFORM uint32_t cur_stack_pointer = cmb_get_sp(); #endif cmb_println(""); cm_backtrace_firmware_info(); #ifdef CMB_USING_OS_PLATFORM /* OS environment */ if (cur_stack_pointer == cmb_get_msp()) { cmb_println(print_info[PRINT_ASSERT_ON_HANDLER]); #ifdef CMB_USING_DUMP_STACK_INFO dump_stack(main_stack_start_addr, main_stack_size, (uint32_t *) sp); #endif /* CMB_USING_DUMP_STACK_INFO */ } else if (cur_stack_pointer == cmb_get_psp()) { cmb_println(print_info[PRINT_ASSERT_ON_THREAD], get_cur_thread_name()); #ifdef CMB_USING_DUMP_STACK_INFO uint32_t stack_start_addr; size_t stack_size; get_cur_thread_stack_info(sp, &stack_start_addr, &stack_size); dump_stack(stack_start_addr, stack_size, (uint32_t *) sp); #endif /* CMB_USING_DUMP_STACK_INFO */ } #else /* bare metal(no OS) environment */ #ifdef CMB_USING_DUMP_STACK_INFO dump_stack(main_stack_start_addr, main_stack_size, (uint32_t *) sp); #endif /* CMB_USING_DUMP_STACK_INFO */ #endif /* CMB_USING_OS_PLATFORM */ print_call_stack(sp); } #if (CMB_CPU_PLATFORM_TYPE != CMB_CPU_ARM_CORTEX_M0) /** * fault diagnosis then print cause of fault */ static void fault_diagnosis(void) { if (regs.hfsr.bits.VECTBL) { cmb_println(print_info[PRINT_HFSR_VECTBL]); } if (regs.hfsr.bits.FORCED) { /* Memory Management Fault */ if (regs.mfsr.value) { if (regs.mfsr.bits.IACCVIOL) { cmb_println(print_info[PRINT_MFSR_IACCVIOL]); } if (regs.mfsr.bits.DACCVIOL) { cmb_println(print_info[PRINT_MFSR_DACCVIOL]); } if (regs.mfsr.bits.MUNSTKERR) { cmb_println(print_info[PRINT_MFSR_MUNSTKERR]); } if (regs.mfsr.bits.MSTKERR) { cmb_println(print_info[PRINT_MFSR_MSTKERR]); } #if (CMB_CPU_PLATFORM_TYPE == CMB_CPU_ARM_CORTEX_M4) || (CMB_CPU_PLATFORM_TYPE == CMB_CPU_ARM_CORTEX_M7) if (regs.mfsr.bits.MLSPERR) { cmb_println(print_info[PRINT_MFSR_MLSPERR]); } #endif if (regs.mfsr.bits.MMARVALID) { if (regs.mfsr.bits.IACCVIOL || regs.mfsr.bits.DACCVIOL) { cmb_println(print_info[PRINT_MMAR], regs.mmar); } } } /* Bus Fault */ if (regs.bfsr.value) { if (regs.bfsr.bits.IBUSERR) { cmb_println(print_info[PRINT_BFSR_IBUSERR]); } if (regs.bfsr.bits.PRECISERR) { cmb_println(print_info[PRINT_BFSR_PRECISERR]); } if (regs.bfsr.bits.IMPREISERR) { cmb_println(print_info[PRINT_BFSR_IMPREISERR]); } if (regs.bfsr.bits.UNSTKERR) { cmb_println(print_info[PRINT_BFSR_UNSTKERR]); } if (regs.bfsr.bits.STKERR) { cmb_println(print_info[PRINT_BFSR_STKERR]); } #if (CMB_CPU_PLATFORM_TYPE == CMB_CPU_ARM_CORTEX_M4) || (CMB_CPU_PLATFORM_TYPE == CMB_CPU_ARM_CORTEX_M7) if (regs.bfsr.bits.LSPERR) { cmb_println(print_info[PRINT_BFSR_LSPERR]); } #endif if (regs.bfsr.bits.BFARVALID) { if (regs.bfsr.bits.PRECISERR) { cmb_println(print_info[PRINT_BFAR], regs.bfar); } } } /* Usage Fault */ if (regs.ufsr.value) { if (regs.ufsr.bits.UNDEFINSTR) { cmb_println(print_info[PRINT_UFSR_UNDEFINSTR]); } if (regs.ufsr.bits.INVSTATE) { cmb_println(print_info[PRINT_UFSR_INVSTATE]); } if (regs.ufsr.bits.INVPC) { cmb_println(print_info[PRINT_UFSR_INVPC]); } if (regs.ufsr.bits.NOCP) { cmb_println(print_info[PRINT_UFSR_NOCP]); } if (regs.ufsr.bits.UNALIGNED) { cmb_println(print_info[PRINT_UFSR_UNALIGNED]); } if (regs.ufsr.bits.DIVBYZERO0) { cmb_println(print_info[PRINT_UFSR_DIVBYZERO0]); } } } /* Debug Fault */ if (regs.hfsr.bits.DEBUGEVT) { if (regs.dfsr.value) { if (regs.dfsr.bits.HALTED) { cmb_println(print_info[PRINT_DFSR_HALTED]); } if (regs.dfsr.bits.BKPT) { cmb_println(print_info[PRINT_DFSR_BKPT]); } if (regs.dfsr.bits.DWTTRAP) { cmb_println(print_info[PRINT_DFSR_DWTTRAP]); } if (regs.dfsr.bits.VCATCH) { cmb_println(print_info[PRINT_DFSR_VCATCH]); } if (regs.dfsr.bits.EXTERNAL) { cmb_println(print_info[PRINT_DFSR_EXTERNAL]); } } } } #endif /* (CMB_CPU_PLATFORM_TYPE != CMB_CPU_ARM_CORTEX_M0) */ #if (CMB_CPU_PLATFORM_TYPE == CMB_CPU_ARM_CORTEX_M4) || (CMB_CPU_PLATFORM_TYPE == CMB_CPU_ARM_CORTEX_M7) static uint32_t statck_del_fpu_regs(uint32_t fault_handler_lr, uint32_t sp) { statck_has_fpu_regs = (fault_handler_lr & (1UL << 4)) == 0 ? true : false; /* the stack has S0~S15 and FPSCR registers when statck_has_fpu_regs is true, double word align */ return statck_has_fpu_regs == true ? sp + sizeof(size_t) * 18 : sp; } #endif /** * backtrace for fault * @note only call once * * @param fault_handler_lr the LR register value on fault handler * @param fault_handler_sp the stack pointer on fault handler */ void cm_backtrace_fault(uint32_t fault_handler_lr, uint32_t fault_handler_sp) { uint32_t stack_pointer = fault_handler_sp, saved_regs_addr = stack_pointer; const char *regs_name[] = { "R0 ", "R1 ", "R2 ", "R3 ", "R12", "LR ", "PC ", "PSR" }; #ifdef CMB_USING_DUMP_STACK_INFO uint32_t stack_start_addr = main_stack_start_addr; size_t stack_size = main_stack_size; #endif CMB_ASSERT(init_ok); /* only call once */ CMB_ASSERT(!on_fault); on_fault = true; cmb_println(""); cm_backtrace_firmware_info(); #ifdef CMB_USING_OS_PLATFORM on_thread_before_fault = fault_handler_lr & (1UL << 2); /* check which stack was used before (MSP or PSP) */ if (on_thread_before_fault) { cmb_println(print_info[PRINT_FAULT_ON_THREAD], get_cur_thread_name() != NULL ? get_cur_thread_name() : "NO_NAME"); saved_regs_addr = stack_pointer = cmb_get_psp(); #ifdef CMB_USING_DUMP_STACK_INFO get_cur_thread_stack_info(stack_pointer, &stack_start_addr, &stack_size); #endif /* CMB_USING_DUMP_STACK_INFO */ } else { cmb_println(print_info[PRINT_FAULT_ON_HANDLER]); } #else /* bare metal(no OS) environment */ cmb_println(print_info[PRINT_FAULT_ON_HANDLER]); #endif /* CMB_USING_OS_PLATFORM */ /* delete saved R0~R3, R12, LR,PC,xPSR registers space */ stack_pointer += sizeof(size_t) * 8; #if (CMB_CPU_PLATFORM_TYPE == CMB_CPU_ARM_CORTEX_M4) || (CMB_CPU_PLATFORM_TYPE == CMB_CPU_ARM_CORTEX_M7) stack_pointer = statck_del_fpu_regs(fault_handler_lr, stack_pointer); #endif /* (CMB_CPU_PLATFORM_TYPE == CMB_CPU_ARM_CORTEX_M4) || (CMB_CPU_PLATFORM_TYPE == CMB_CPU_ARM_CORTEX_M7) */ #ifdef CMB_USING_DUMP_STACK_INFO /* check stack overflow */ if (stack_pointer < stack_start_addr || stack_pointer > stack_start_addr + stack_size) { stack_is_overflow = true; } /* dump stack information */ dump_stack(stack_start_addr, stack_size, (uint32_t *) stack_pointer); #endif /* CMB_USING_DUMP_STACK_INFO */ /* the stack frame may be get failed when it is overflow */ if (!stack_is_overflow) { /* dump register */ cmb_println(print_info[PRINT_REGS_TITLE]); regs.saved.r0 = ((uint32_t *)saved_regs_addr)[0]; // Register R0 regs.saved.r1 = ((uint32_t *)saved_regs_addr)[1]; // Register R1 regs.saved.r2 = ((uint32_t *)saved_regs_addr)[2]; // Register R2 regs.saved.r3 = ((uint32_t *)saved_regs_addr)[3]; // Register R3 regs.saved.r12 = ((uint32_t *)saved_regs_addr)[4]; // Register R12 regs.saved.lr = ((uint32_t *)saved_regs_addr)[5]; // Link register LR regs.saved.pc = ((uint32_t *)saved_regs_addr)[6]; // Program counter PC regs.saved.psr.value = ((uint32_t *)saved_regs_addr)[7]; // Program status word PSR cmb_println(" %s: %08x %s: %08x %s: %08x %s: %08x", regs_name[0], regs.saved.r0, regs_name[1], regs.saved.r1, regs_name[2], regs.saved.r2, regs_name[3], regs.saved.r3); cmb_println(" %s: %08x %s: %08x %s: %08x %s: %08x", regs_name[4], regs.saved.r12, regs_name[5], regs.saved.lr, regs_name[6], regs.saved.pc, regs_name[7], regs.saved.psr.value); cmb_println("=============================================================="); } /* the Cortex-M0 is not support fault diagnosis */ #if (CMB_CPU_PLATFORM_TYPE != CMB_CPU_ARM_CORTEX_M0) regs.syshndctrl.value = CMB_SYSHND_CTRL; // System Handler Control and State Register regs.mfsr.value = CMB_NVIC_MFSR; // Memory Fault Status Register regs.mmar = CMB_NVIC_MMAR; // Memory Management Fault Address Register regs.bfsr.value = CMB_NVIC_BFSR; // Bus Fault Status Register regs.bfar = CMB_NVIC_BFAR; // Bus Fault Manage Address Register regs.ufsr.value = CMB_NVIC_UFSR; // Usage Fault Status Register regs.hfsr.value = CMB_NVIC_HFSR; // Hard Fault Status Register regs.dfsr.value = CMB_NVIC_DFSR; // Debug Fault Status Register regs.afsr = CMB_NVIC_AFSR; // Auxiliary Fault Status Register fault_diagnosis(); #endif print_call_stack(stack_pointer); }
{ "pile_set_name": "Github" }
.form-component { display: flex; flex-direction: column; margin: var(--spacing-half) 0; & > *:not(:last-child) { margin-bottom: var(--spacing); } hr { width: 100%; border: none; height: 1px; border-bottom: var(--base-border); } }
{ "pile_set_name": "Github" }
Harcourt Pear Cider $24.99 - $77.99 This cider is a blend of Buerre Bosc, William and Packham pears which were milled and gently basket pressed. Fermentation was conducted by a Champagne yeast in stainless steel tanks. Post fermentation the different cider cuvees were blended, filtered and bottled.
{ "pile_set_name": "Pile-CC" }
Q: Python for loop ignoring if statement For some reason python is ignoring my if statement, even if the str(search) is in my list lista it still prints the elif statement regardless. Am I doing something wrong? search = input("what would you like to search for?:") for n in range(len(lista)): if str(search) in lista[n]: print(lista[n]) elif str(search) not in lista[n]: print("search not found in list") break A: Your elif will end the loop (because of the break) if the search wasn't found at the first position (because the if and elif are executed for each item in your list). In your case you could simply use a "trigger" to indicate at least one finding and do the if after the loop: found = False for n in range(len(lista)): if str(search) in lista[n]: print(lista[n]) found = True if not found: print("search not found in list") However better would be to iterate over the list directly instead of a range of the length: found = False for item in lista: if str(search) in item: print(item) found = True if not found: print("search not found in list") If you don't like the trigger you can also use a conditional comprehension to get all the matches and use the number of matches as indirect trigger: findings = [item for item in lista if str(search) in item] if findings: # you got matches: for match in findings: print(match) else: # no matches print("search not found in list")
{ "pile_set_name": "StackExchange" }
No Escape Imagine there’s a video game, where the player must decide which tools to use to dig themselves out a hole without acknowledging that holes exist OR that the player is trapped in one and hence needs the tools. The point of the game (beyond your apparent need to never face 30 contiguous seconds of not looking at your phone) is to let players experience what it feels like to be a member of the House Science Committee: Despite this reputation, the environment and energy subcommittees called four honest-to-God climate scientists to testify about one of the most controversial solutions to climate change: geoengineering. These technofixes, which could reflect sun back into space or draw down carbon dioxide from the atmosphere, all with the intent to cool the planet, were front and center. Committee members were actually eager to hear about it and where the federal government could spend to help prop up research. There was just one tiny problem: None of the Republicans could bring themselves to acknowledge that carbon dioxide is the root cause of climate change. Nor could they bring up that reducing carbon emissions is a way more proven and cost-effective avenue to address climate change. It was at once comical and damn terrifying. Level three is when comical and damn terrifying meld into one confused emotion. Welcome to level three. Post navigation Search Search for: About This Site A collision of double entendre has caught us in the crossfire of capitalism and self-preservation. We need to sort it out. But what does Green actually mean? We look at its use to determine what we mean by green: a color, the signal to ‘go’, money, envy, erogeneity, inexperience, eco-friendliness? Green is all of these things. But today, the word is tied by all its definitions into a package, a marketing vortex urging us to keep what we have and keep it all going. We have to go back to second grade and ask which of these does not belong? The purpose for this site seems self-explanatory, but I tried to sum it up in the very first post.
{ "pile_set_name": "Pile-CC" }
Posted on July 18, 2011 Carney: Obama Never Banned Lobbyists In WH, Just No "Special Access" White House press secretary Jay Carney is asked about President Obama's meeting with Microsoft's top lobbyist: REPORTER: "One of the participants in the President's education roundtable with business leaders was Fred Humphries, whose Microsoft's top lobbyist. Why isn't that a violation of the President's pledge to eliminate access and influence?" Posted By Email Share Carney says there were "numerous participants" in the meeting, including a former Bush cabinet secretary. Carney then clarifies Obama's so-called pledge: "The president's promise was not to eliminate or prohibit lobbyists from entering the property [White House], but to not give them special access."In 2008, then President-elect Obama and his transition team said he would prohibit lobbyists from working in his administration or influencing policy decisions.Earlier this year, NPR reported President Obama's administration started giving "waivers" to certain lobbyists so they could get around his self-imposed ban.Carney did not explain the difference between "special access" and participating in a meeting with the President.
{ "pile_set_name": "OpenWebText2" }
Preparations for the WISTA International AGM & Conference in Limassol 8-10 October 2014 going strong! During our first member's meeting of 2014 the hot topics on the agenda were the preparations for the WISTA International AGM and conference, to be held in Limassol in October. The almost 40 members present came up with many ideas and a great number of them signed up for one or more of the Working Groups initiated to make this an exciting event. The "Entertainment" and the "PR & Social Media" Working Groups will be the first to start their activities. WISTA Cyprus President, Despina Panayiotou Theodossiou, announced that in the last 3 months the Association signed up 13 new members, resulting in a total of almost 70 members in just a little over 2 years. She also looked back on the 2013 WISTA events, such as the presentation by GermanischerLloyd & Department of Merchant Shipping about MLC 2006, the Influence of the Environment in Salvage Operations by Svitzer Salvage, the busy Cocktail Reception during Maritime Cyprus and the motivating "Leadership Seminar" by the Copenhagen Business School. Looking forward to 2014 she mentioned that the main focus of the Association's energy and funds will now be on the organization of the International AGM & Conference, with the theme "Shipping Connects". The conference will take place from 8-10 October at the Four Seasons Hotel inLimassol and information can be found on the conference website: wistacyprus2014.com
{ "pile_set_name": "Pile-CC" }
SeeClickFix: Users Reported 42 Percent More Issues in 2016 The company, which sells a platform where citizens can report problems for government to fix, saw its number of reported issues rise to 931,699 in 2016, according to a year-in-review retrospective it published Dec. 22. That’s an increase of about 42 percent from the 658,000 issues reported in 2015. The number of issues fixed increased too, about 40 percent from 584,000 to 818,563. The percentage of issues fixed remained steady at about 88 percent. RELATED The year saw 65 organizations — cities, property management companies and universities among them — start using the platform. It also hit a few milestones — 1 million citizen users and 300 government partners. According to the year-in-review post, one of the most commonly reported issues in 2016 was graffiti. There were 91,633 graffiti issues reported throughout the year, and governments removed more than 1 million square feet of the stuff. The company also branched out its product offerings, launching a citizen relationship management tool, SeeClickFix Work, in October. The service gives government officials tools to send reported issues to the right people, then manage the fixing of those issues from start to finish.
{ "pile_set_name": "Pile-CC" }
There are a lot of different ESP modules out there. I use about 100-200 ESP-01 modules and a standalone programmer for them was a must have. Like all programmers you buy it once and can program an infinite number of ESP modules. you buy an ESP with a built in programmer and it's only good for that module. Trying to program 2 ESP8266 modules (#1, #7) using the FTDI programmer I drew a fail on both. I also tried using a ASP programmer this wouldn´t even connect to the chip. The FTDI interface would give me connectivity with the AT type chip programmed into the ESP8266 but not allow me to flash the lua firmware. The ESP8266 MOD (7) chip I bought on Aliexpress lights up and appears to be working but does not respond to AT commands and sends no wifi signals. I tried to flash it with lua and at command software but no luck. So, after buying all this stuff I have one ESP that works ok with the AT command set, but would not allow firmware upgrades, another that never worked at all and wouldn´t allow firmware upgrades. The FTDI programmer works but has issues with overheating if left plugged into the computer after a half hour or so powering the one good chip. Well the best I can say using this thing has a lot of frustration but not a complete was of time. all backers received the binary firmware for the ESP. but the campaign was so successful the author released the project into open source sooner than it was planned, so you can compile it for yourself if you missed that kickstarter (get the sources from github and follow the build instructions). all backers received the binary firmware for the ESP. but the campaign was so successful the author released the project into open source sooner than it was planned, so you can compile it for yourself if you missed that kickstarter (get the sources from github and follow the build instructions).
{ "pile_set_name": "Pile-CC" }
<html> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <title>WebGL Shader Common Function Conformance Tests</title> <link rel="stylesheet" href="../../../resources/js-test-style.css"/> <script src="../../../js/js-test-pre.js"></script> <script src="../../../js/webgl-test-utils.js"></script> <script src="../../../closure-library/closure/goog/base.js"></script> <script src="../../deqp-deps.js"></script> <script>goog.require('functional.gles3.es3fShaderCommonFunctionTests');</script> </head> <body> <div id="description"></div> <div id="console"></div> <canvas id="canvas" width="256" height="256"> </canvas> <script> var wtu = WebGLTestUtils; var gl = wtu.create3DContext('canvas', null, 2); functional.gles3.es3fShaderCommonFunctionTests.run(gl); </script> </body> </html>
{ "pile_set_name": "Github" }
Archiwa tagu: ContentArea ContentArea when empty (no blocks dragged) returns null in code. It’s fine when you use EPiServer standard code for handling ContentArea rendering: When it breaks But the problem exists when you try to touch it from code or Extensions as … Czytaj dalej → The default ContentArea rendering will generate something similar to: This is completly fine in most cases, but sometimes you have markup that you need total control of rendering. No wrapping tags I had such a situation. I used it for … Czytaj dalej → Fast example how to make ContentArea rendered as unordered list from blocks in EpiServer 7 MVC. Starting markup: That is very easy to achieve using CustomTag, CssClass, ChildrenCustomTagName, ChildrenCssClass: Block markup: Like you can guess, resulting markup is the same.
{ "pile_set_name": "Pile-CC" }
Sevilla fullback Sébastien Corchia is delighted with his first weeks with the LaLiga club. Corchia left Lille for Sevilla this summer. "Sevilla is a great and very old club with many traditions. It is a real first class club in the best championship in the world," said Corchia. "The players are at a very high level, the coach has the perfect football style for me, and the club has shown this winning mentality so special in international football. I admire that. "To think that this club has won the title in three of the last four seasons of the Europa League - it's amazing. "
{ "pile_set_name": "OpenWebText2" }
A partial-propensity formulation of the stochastic simulation algorithm for chemical reaction networks with delays. Several real-world systems, such as gene expression networks in biological cells, contain coupled chemical reactions with a time delay between reaction initiation and completion. The non-Markovian kinetics of such reaction networks can be exactly simulated using the delay stochastic simulation algorithm (dSSA). The computational cost of dSSA scales with the total number of reactions in the network. We reduce this cost to scale at most with the smaller number of species by using the concept of partial reaction propensities. The resulting delay partial-propensity direct method (dPDM) is an exact dSSA formulation for well-stirred systems of coupled chemical reactions with delays. We detail dPDM and present a theoretical analysis of its computational cost. Furthermore, we demonstrate the implications of the theoretical cost analysis in two prototypical benchmark applications. The dPDM formulation is shown to be particularly efficient for strongly coupled reaction networks, where the number of reactions is much larger than the number of species.
{ "pile_set_name": "PubMed Abstracts" }
%YAML 1.1 %TAG !u! tag:unity3d.com,2011: --- !u!29 &1 OcclusionCullingSettings: m_ObjectHideFlags: 0 serializedVersion: 2 m_OcclusionBakeSettings: smallestOccluder: 5 smallestHole: 0.25 backfaceThreshold: 100 m_SceneGUID: 00000000000000000000000000000000 m_OcclusionCullingData: {fileID: 0} --- !u!104 &2 RenderSettings: m_ObjectHideFlags: 0 serializedVersion: 8 m_Fog: 0 m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} m_FogMode: 3 m_FogDensity: 0.01 m_LinearFogStart: 0 m_LinearFogEnd: 300 m_AmbientSkyColor: {r: 0.212, g: 0.227, b: 0.259, a: 1} m_AmbientEquatorColor: {r: 0.114, g: 0.125, b: 0.133, a: 1} m_AmbientGroundColor: {r: 0.047, g: 0.043, b: 0.035, a: 1} m_AmbientIntensity: 1 m_AmbientMode: 0 m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} m_SkyboxMaterial: {fileID: 10304, guid: 0000000000000000f000000000000000, type: 0} m_HaloStrength: 0.5 m_FlareStrength: 1 m_FlareFadeSpeed: 3 m_HaloTexture: {fileID: 0} m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} m_DefaultReflectionMode: 0 m_DefaultReflectionResolution: 128 m_ReflectionBounces: 1 m_ReflectionIntensity: 1 m_CustomReflection: {fileID: 0} m_Sun: {fileID: 0} m_IndirectSpecularColor: {r: 0, g: 0, b: 0, a: 1} --- !u!157 &3 LightmapSettings: m_ObjectHideFlags: 0 serializedVersion: 11 m_GIWorkflowMode: 1 m_GISettings: serializedVersion: 2 m_BounceScale: 1 m_IndirectOutputScale: 1 m_AlbedoBoost: 1 m_TemporalCoherenceThreshold: 1 m_EnvironmentLightingMode: 0 m_EnableBakedLightmaps: 1 m_EnableRealtimeLightmaps: 1 m_LightmapEditorSettings: serializedVersion: 9 m_Resolution: 2 m_BakeResolution: 40 m_TextureWidth: 1024 m_TextureHeight: 1024 m_AO: 0 m_AOMaxDistance: 1 m_CompAOExponent: 1 m_CompAOExponentDirect: 0 m_Padding: 2 m_LightmapParameters: {fileID: 0} m_LightmapsBakeMode: 1 m_TextureCompression: 1 m_FinalGather: 0 m_FinalGatherFiltering: 1 m_FinalGatherRayCount: 256 m_ReflectionCompression: 2 m_MixedBakeMode: 1 m_BakeBackend: 0 m_PVRSampling: 1 m_PVRDirectSampleCount: 32 m_PVRSampleCount: 500 m_PVRBounces: 2 m_PVRFilterTypeDirect: 0 m_PVRFilterTypeIndirect: 0 m_PVRFilterTypeAO: 0 m_PVRFilteringMode: 0 m_PVRCulling: 1 m_PVRFilteringGaussRadiusDirect: 1 m_PVRFilteringGaussRadiusIndirect: 5 m_PVRFilteringGaussRadiusAO: 2 m_PVRFilteringAtrousPositionSigmaDirect: 0.5 m_PVRFilteringAtrousPositionSigmaIndirect: 2 m_PVRFilteringAtrousPositionSigmaAO: 1 m_LightingDataAsset: {fileID: 0} m_UseShadowmask: 0 --- !u!196 &4 NavMeshSettings: serializedVersion: 2 m_ObjectHideFlags: 0 m_BuildSettings: serializedVersion: 2 agentTypeID: 0 agentRadius: 0.5 agentHeight: 2 agentSlope: 45 agentClimb: 0.4 ledgeDropHeight: 0 maxJumpAcrossDistance: 0 minRegionArea: 2 manualCellSize: 0 cellSize: 0.16666667 manualTileSize: 0 tileSize: 256 accuratePlacement: 0 debug: m_Flags: 0 m_NavMeshData: {fileID: 0} --- !u!1 &137962126 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 137962127} - component: {fileID: 137962129} - component: {fileID: 137962128} m_Layer: 0 m_Name: Default m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!4 &137962127 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 137962126} m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} m_LocalPosition: {x: 0.014, y: 0.361, z: -0.55} m_LocalScale: {x: 0.014285714, y: 0.014285714, z: 0.049999997} m_Children: [] m_Father: {fileID: 1541181469} m_RootOrder: 3 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!102 &137962128 TextMesh: serializedVersion: 3 m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 137962126} m_Text: Tap/Hold m_OffsetZ: 0 m_CharacterSize: 1 m_LineSpacing: 1 m_Anchor: 1 m_Alignment: 1 m_TabSize: 4 m_FontSize: 64 m_FontStyle: 0 m_RichText: 1 m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} m_Color: serializedVersion: 2 rgba: 4286444430 --- !u!23 &137962129 MeshRenderer: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 137962126} m_Enabled: 1 m_CastShadows: 1 m_ReceiveShadows: 1 m_DynamicOccludee: 1 m_MotionVectors: 1 m_LightProbeUsage: 1 m_ReflectionProbeUsage: 1 m_Materials: - {fileID: 10100, guid: 0000000000000000e000000000000000, type: 0} m_StaticBatchInfo: firstSubMesh: 0 subMeshCount: 0 m_StaticBatchRoot: {fileID: 0} m_ProbeAnchor: {fileID: 0} m_LightProbeVolumeOverride: {fileID: 0} m_ScaleInLightmap: 1 m_PreserveUVs: 0 m_IgnoreNormalsForChartDetection: 0 m_ImportantGI: 0 m_StitchLightmapSeams: 0 m_SelectedEditorRenderState: 3 m_MinimumChartSize: 4 m_AutoUVMaxDistance: 0.5 m_AutoUVMaxAngle: 89 m_LightmapParameters: {fileID: 0} m_SortingLayerID: 0 m_SortingLayer: 0 m_SortingOrder: 0 --- !u!1001 &235810537 Prefab: m_ObjectHideFlags: 0 serializedVersion: 2 m_Modification: m_TransformParent: {fileID: 0} m_Modifications: - target: {fileID: 4541142303025740, guid: d29bc40b7f3df26479d6a0aac211c355, type: 2} propertyPath: m_LocalPosition.x value: 0 objectReference: {fileID: 0} - target: {fileID: 4541142303025740, guid: d29bc40b7f3df26479d6a0aac211c355, type: 2} propertyPath: m_LocalPosition.y value: 0 objectReference: {fileID: 0} - target: {fileID: 4541142303025740, guid: d29bc40b7f3df26479d6a0aac211c355, type: 2} propertyPath: m_LocalPosition.z value: 0 objectReference: {fileID: 0} - target: {fileID: 4541142303025740, guid: d29bc40b7f3df26479d6a0aac211c355, type: 2} propertyPath: m_LocalRotation.x value: 0 objectReference: {fileID: 0} - target: {fileID: 4541142303025740, guid: d29bc40b7f3df26479d6a0aac211c355, type: 2} propertyPath: m_LocalRotation.y value: 0 objectReference: {fileID: 0} - target: {fileID: 4541142303025740, guid: d29bc40b7f3df26479d6a0aac211c355, type: 2} propertyPath: m_LocalRotation.z value: 0 objectReference: {fileID: 0} - target: {fileID: 4541142303025740, guid: d29bc40b7f3df26479d6a0aac211c355, type: 2} propertyPath: m_LocalRotation.w value: 1 objectReference: {fileID: 0} - target: {fileID: 4541142303025740, guid: d29bc40b7f3df26479d6a0aac211c355, type: 2} propertyPath: m_RootOrder value: 0 objectReference: {fileID: 0} m_RemovedComponents: [] m_ParentPrefab: {fileID: 100100000, guid: d29bc40b7f3df26479d6a0aac211c355, type: 2} m_IsPrefabParent: 0 --- !u!1001 &279023640 Prefab: m_ObjectHideFlags: 0 serializedVersion: 2 m_Modification: m_TransformParent: {fileID: 0} m_Modifications: - target: {fileID: 4000011792100794, guid: a611e772ef8ddf64d8106a9cbb70f31c, type: 2} propertyPath: m_LocalPosition.x value: 0 objectReference: {fileID: 0} - target: {fileID: 4000011792100794, guid: a611e772ef8ddf64d8106a9cbb70f31c, type: 2} propertyPath: m_LocalPosition.y value: 0 objectReference: {fileID: 0} - target: {fileID: 4000011792100794, guid: a611e772ef8ddf64d8106a9cbb70f31c, type: 2} propertyPath: m_LocalPosition.z value: 0 objectReference: {fileID: 0} - target: {fileID: 4000011792100794, guid: a611e772ef8ddf64d8106a9cbb70f31c, type: 2} propertyPath: m_LocalRotation.x value: 0 objectReference: {fileID: 0} - target: {fileID: 4000011792100794, guid: a611e772ef8ddf64d8106a9cbb70f31c, type: 2} propertyPath: m_LocalRotation.y value: 0 objectReference: {fileID: 0} - target: {fileID: 4000011792100794, guid: a611e772ef8ddf64d8106a9cbb70f31c, type: 2} propertyPath: m_LocalRotation.z value: 0 objectReference: {fileID: 0} - target: {fileID: 4000011792100794, guid: a611e772ef8ddf64d8106a9cbb70f31c, type: 2} propertyPath: m_LocalRotation.w value: 1 objectReference: {fileID: 0} - target: {fileID: 4000011792100794, guid: a611e772ef8ddf64d8106a9cbb70f31c, type: 2} propertyPath: m_RootOrder value: 2 objectReference: {fileID: 0} m_RemovedComponents: [] m_ParentPrefab: {fileID: 100100000, guid: a611e772ef8ddf64d8106a9cbb70f31c, type: 2} m_IsPrefabParent: 0 --- !u!114 &279023641 stripped MonoBehaviour: m_PrefabParentObject: {fileID: 114611684728110934, guid: a611e772ef8ddf64d8106a9cbb70f31c, type: 2} m_PrefabInternal: {fileID: 279023640} m_Script: {fileID: 11500000, guid: 0decd33ba8702954885a62b5bc1a778e, type: 3} --- !u!1001 &322386181 Prefab: m_ObjectHideFlags: 0 serializedVersion: 2 m_Modification: m_TransformParent: {fileID: 0} m_Modifications: - target: {fileID: 4000011656901714, guid: 3eddd1c29199313478dd3f912bfab2ab, type: 2} propertyPath: m_LocalPosition.x value: 0 objectReference: {fileID: 0} - target: {fileID: 4000011656901714, guid: 3eddd1c29199313478dd3f912bfab2ab, type: 2} propertyPath: m_LocalPosition.y value: 0 objectReference: {fileID: 0} - target: {fileID: 4000011656901714, guid: 3eddd1c29199313478dd3f912bfab2ab, type: 2} propertyPath: m_LocalPosition.z value: 0 objectReference: {fileID: 0} - target: {fileID: 4000011656901714, guid: 3eddd1c29199313478dd3f912bfab2ab, type: 2} propertyPath: m_LocalRotation.x value: 0 objectReference: {fileID: 0} - target: {fileID: 4000011656901714, guid: 3eddd1c29199313478dd3f912bfab2ab, type: 2} propertyPath: m_LocalRotation.y value: 0 objectReference: {fileID: 0} - target: {fileID: 4000011656901714, guid: 3eddd1c29199313478dd3f912bfab2ab, type: 2} propertyPath: m_LocalRotation.z value: 0 objectReference: {fileID: 0} - target: {fileID: 4000011656901714, guid: 3eddd1c29199313478dd3f912bfab2ab, type: 2} propertyPath: m_LocalRotation.w value: 1 objectReference: {fileID: 0} - target: {fileID: 4000011656901714, guid: 3eddd1c29199313478dd3f912bfab2ab, type: 2} propertyPath: m_RootOrder value: 1 objectReference: {fileID: 0} - target: {fileID: 114742747811649402, guid: 3eddd1c29199313478dd3f912bfab2ab, type: 2} propertyPath: Cursor value: objectReference: {fileID: 279023641} m_RemovedComponents: [] m_ParentPrefab: {fileID: 100100000, guid: 3eddd1c29199313478dd3f912bfab2ab, type: 2} m_IsPrefabParent: 0 --- !u!1 &481182369 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 481182370} - component: {fileID: 481182373} - component: {fileID: 481182372} - component: {fileID: 481182371} - component: {fileID: 481182374} m_Layer: 0 m_Name: Timer m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!4 &481182370 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 481182369} m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} m_LocalPosition: {x: 0, y: -0.15, z: -0.52} m_LocalScale: {x: 0, y: 0.05, z: 1} m_Children: [] m_Father: {fileID: 1541181469} m_RootOrder: 5 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!23 &481182371 MeshRenderer: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 481182369} m_Enabled: 1 m_CastShadows: 1 m_ReceiveShadows: 1 m_DynamicOccludee: 1 m_MotionVectors: 1 m_LightProbeUsage: 1 m_ReflectionProbeUsage: 1 m_Materials: - {fileID: 2100000, guid: 685f5d363eec7354b8d5dfbddbc86e28, type: 2} m_StaticBatchInfo: firstSubMesh: 0 subMeshCount: 0 m_StaticBatchRoot: {fileID: 0} m_ProbeAnchor: {fileID: 0} m_LightProbeVolumeOverride: {fileID: 0} m_ScaleInLightmap: 1 m_PreserveUVs: 1 m_IgnoreNormalsForChartDetection: 0 m_ImportantGI: 0 m_StitchLightmapSeams: 0 m_SelectedEditorRenderState: 3 m_MinimumChartSize: 4 m_AutoUVMaxDistance: 0.5 m_AutoUVMaxAngle: 89 m_LightmapParameters: {fileID: 0} m_SortingLayerID: 0 m_SortingLayer: 0 m_SortingOrder: 0 --- !u!64 &481182372 MeshCollider: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 481182369} m_Material: {fileID: 0} m_IsTrigger: 0 m_Enabled: 1 serializedVersion: 2 m_Convex: 0 m_InflateMesh: 0 m_SkinWidth: 0.01 m_Mesh: {fileID: 10210, guid: 0000000000000000e000000000000000, type: 0} --- !u!33 &481182373 MeshFilter: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 481182369} m_Mesh: {fileID: 10210, guid: 0000000000000000e000000000000000, type: 0} --- !u!114 &481182374 MonoBehaviour: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 481182369} m_Enabled: 1 m_EditorHideFlags: 0 m_Script: {fileID: 11500000, guid: 5e011ee45226e0c43b09a26d1c475cce, type: 3} m_Name: m_EditorClassIdentifier: Button: {fileID: 1541181465} --- !u!1 &500814168 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 500814169} - component: {fileID: 500814172} - component: {fileID: 500814171} - component: {fileID: 500814170} - component: {fileID: 500814173} m_Layer: 0 m_Name: Effect m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!4 &500814169 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 500814168} m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} m_LocalPosition: {x: 0, y: 0, z: 0.05} m_LocalScale: {x: 1.1, y: 1.1, z: 1} m_Children: [] m_Father: {fileID: 565675569} m_RootOrder: 4 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!23 &500814170 MeshRenderer: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 500814168} m_Enabled: 1 m_CastShadows: 1 m_ReceiveShadows: 1 m_DynamicOccludee: 1 m_MotionVectors: 1 m_LightProbeUsage: 1 m_ReflectionProbeUsage: 1 m_Materials: - {fileID: 2100000, guid: 685f5d363eec7354b8d5dfbddbc86e28, type: 2} m_StaticBatchInfo: firstSubMesh: 0 subMeshCount: 0 m_StaticBatchRoot: {fileID: 0} m_ProbeAnchor: {fileID: 0} m_LightProbeVolumeOverride: {fileID: 0} m_ScaleInLightmap: 1 m_PreserveUVs: 1 m_IgnoreNormalsForChartDetection: 0 m_ImportantGI: 0 m_StitchLightmapSeams: 0 m_SelectedEditorRenderState: 3 m_MinimumChartSize: 4 m_AutoUVMaxDistance: 0.5 m_AutoUVMaxAngle: 89 m_LightmapParameters: {fileID: 0} m_SortingLayerID: 0 m_SortingLayer: 0 m_SortingOrder: 0 --- !u!65 &500814171 BoxCollider: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 500814168} m_Material: {fileID: 0} m_IsTrigger: 0 m_Enabled: 0 serializedVersion: 2 m_Size: {x: 1, y: 1, z: 1} m_Center: {x: 0, y: 0, z: 0} --- !u!33 &500814172 MeshFilter: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 500814168} m_Mesh: {fileID: 10202, guid: 0000000000000000e000000000000000, type: 0} --- !u!114 &500814173 MonoBehaviour: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 500814168} m_Enabled: 1 m_EditorHideFlags: 0 m_Script: {fileID: 11500000, guid: a60b4c2407cc2d848be7c75de1e789e0, type: 3} m_Name: m_EditorClassIdentifier: InteractiveHost: {fileID: 0} EffectColors: - {r: 0.05490196, g: 0.65882355, b: 0.6, a: 1} - {r: 0.9019608, g: 0.9019608, b: 0.9019608, a: 1} EffectScale: - {x: 1.1, y: 1.1, z: 1} - {x: 1.15, y: 1.15, z: 1} EffectPosition: - {x: 0, y: 0, z: 0.05} - {x: 0, y: 0, z: 0.6} --- !u!1 &554237388 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 554237389} - component: {fileID: 554237391} - component: {fileID: 554237390} m_Layer: 0 m_Name: InteractiveToggle m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!4 &554237389 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 554237388} m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} m_LocalPosition: {x: 0.01399998, y: 0.7714286, z: -0.5500001} m_LocalScale: {x: 0.014285712, y: 0.014285712, z: 0.049999997} m_Children: [] m_Father: {fileID: 565675569} m_RootOrder: 0 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!102 &554237390 TextMesh: serializedVersion: 3 m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 554237388} m_Text: InteractiveToggle m_OffsetZ: 0 m_CharacterSize: 1 m_LineSpacing: 1 m_Anchor: 1 m_Alignment: 1 m_TabSize: 4 m_FontSize: 84 m_FontStyle: 0 m_RichText: 1 m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} m_Color: serializedVersion: 2 rgba: 4293322470 --- !u!23 &554237391 MeshRenderer: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 554237388} m_Enabled: 1 m_CastShadows: 1 m_ReceiveShadows: 1 m_DynamicOccludee: 1 m_MotionVectors: 1 m_LightProbeUsage: 1 m_ReflectionProbeUsage: 1 m_Materials: - {fileID: 10100, guid: 0000000000000000e000000000000000, type: 0} m_StaticBatchInfo: firstSubMesh: 0 subMeshCount: 0 m_StaticBatchRoot: {fileID: 0} m_ProbeAnchor: {fileID: 0} m_LightProbeVolumeOverride: {fileID: 0} m_ScaleInLightmap: 1 m_PreserveUVs: 0 m_IgnoreNormalsForChartDetection: 0 m_ImportantGI: 0 m_StitchLightmapSeams: 0 m_SelectedEditorRenderState: 3 m_MinimumChartSize: 4 m_AutoUVMaxDistance: 0.5 m_AutoUVMaxAngle: 89 m_LightmapParameters: {fileID: 0} m_SortingLayerID: 0 m_SortingLayer: 0 m_SortingOrder: 0 --- !u!1 &565675565 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 565675569} - component: {fileID: 565675568} - component: {fileID: 565675567} - component: {fileID: 565675566} - component: {fileID: 565675571} m_Layer: 0 m_Name: InteractableToggle m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!23 &565675566 MeshRenderer: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 565675565} m_Enabled: 1 m_CastShadows: 1 m_ReceiveShadows: 1 m_DynamicOccludee: 1 m_MotionVectors: 1 m_LightProbeUsage: 1 m_ReflectionProbeUsage: 1 m_Materials: - {fileID: 2100000, guid: a01f482e2ab5c894ba4e1e52a3cf351c, type: 2} m_StaticBatchInfo: firstSubMesh: 0 subMeshCount: 0 m_StaticBatchRoot: {fileID: 0} m_ProbeAnchor: {fileID: 0} m_LightProbeVolumeOverride: {fileID: 0} m_ScaleInLightmap: 1 m_PreserveUVs: 1 m_IgnoreNormalsForChartDetection: 0 m_ImportantGI: 0 m_StitchLightmapSeams: 0 m_SelectedEditorRenderState: 3 m_MinimumChartSize: 4 m_AutoUVMaxDistance: 0.5 m_AutoUVMaxAngle: 89 m_LightmapParameters: {fileID: 0} m_SortingLayerID: 0 m_SortingLayer: 0 m_SortingOrder: 0 --- !u!65 &565675567 BoxCollider: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 565675565} m_Material: {fileID: 0} m_IsTrigger: 0 m_Enabled: 1 serializedVersion: 2 m_Size: {x: 1, y: 1, z: 1} m_Center: {x: 0, y: 0, z: 0} --- !u!33 &565675568 MeshFilter: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 565675565} m_Mesh: {fileID: 10202, guid: 0000000000000000e000000000000000, type: 0} --- !u!4 &565675569 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 565675565} m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} m_LocalPosition: {x: 0.22, y: 0, z: 1} m_LocalScale: {x: 0.35, y: 0.35, z: 0.1} m_Children: - {fileID: 554237389} - {fileID: 574450914} - {fileID: 683248269} - {fileID: 1315320361} - {fileID: 500814169} m_Father: {fileID: 1819360065} m_RootOrder: 0 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!114 &565675571 MonoBehaviour: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 565675565} m_Enabled: 1 m_EditorHideFlags: 0 m_Script: {fileID: 11500000, guid: ab5a4b612c7bbb847b8e66c900eaa96e, type: 3} m_Name: m_EditorClassIdentifier: ParentObject: {fileID: 0} IsEnabled: 1 DetectHold: 0 HoldTime: 0.02 RollOffTime: 0.02 Keyword: KeywordRequiresGaze: 1 OnSelectEvents: m_PersistentCalls: m_Calls: [] m_TypeName: UnityEngine.Events.UnityEvent, UnityEngine.CoreModule, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null OnDownEvent: m_PersistentCalls: m_Calls: [] m_TypeName: UnityEngine.Events.UnityEvent, UnityEngine.CoreModule, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null OnHoldEvent: m_PersistentCalls: m_Calls: [] m_TypeName: UnityEngine.Events.UnityEvent, UnityEngine.CoreModule, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null AllowSelection: 1 AllowDeselect: 1 HasSelection: 0 PassiveMode: 0 OnSelection: m_PersistentCalls: m_Calls: - m_Target: {fileID: 574450915} m_MethodName: set_text m_Mode: 5 m_Arguments: m_ObjectArgument: {fileID: 0} m_ObjectArgumentAssemblyTypeName: UnityEngine.Object, UnityEngine m_IntArgument: 0 m_FloatArgument: 0 m_StringArgument: Is Selected m_BoolArgument: 0 m_CallState: 2 m_TypeName: UnityEngine.Events.UnityEvent, UnityEngine.CoreModule, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null OnDeselection: m_PersistentCalls: m_Calls: - m_Target: {fileID: 574450915} m_MethodName: set_text m_Mode: 5 m_Arguments: m_ObjectArgument: {fileID: 0} m_ObjectArgumentAssemblyTypeName: UnityEngine.Object, UnityEngine m_IntArgument: 0 m_FloatArgument: 0 m_StringArgument: Not Selected m_BoolArgument: 0 m_CallState: 2 m_TypeName: UnityEngine.Events.UnityEvent, UnityEngine.CoreModule, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null --- !u!1 &574450913 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 574450914} - component: {fileID: 574450916} - component: {fileID: 574450915} m_Layer: 0 m_Name: Selected m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!4 &574450914 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 574450913} m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} m_LocalPosition: {x: 0.014, y: 0.361, z: -0.55} m_LocalScale: {x: 0.014285714, y: 0.014285714, z: 0.049999997} m_Children: [] m_Father: {fileID: 565675569} m_RootOrder: 1 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!102 &574450915 TextMesh: serializedVersion: 3 m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 574450913} m_Text: Not Selected m_OffsetZ: 0 m_CharacterSize: 1 m_LineSpacing: 1 m_Anchor: 1 m_Alignment: 1 m_TabSize: 4 m_FontSize: 64 m_FontStyle: 0 m_RichText: 1 m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} m_Color: serializedVersion: 2 rgba: 4286444430 --- !u!23 &574450916 MeshRenderer: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 574450913} m_Enabled: 1 m_CastShadows: 1 m_ReceiveShadows: 1 m_DynamicOccludee: 1 m_MotionVectors: 1 m_LightProbeUsage: 1 m_ReflectionProbeUsage: 1 m_Materials: - {fileID: 10100, guid: 0000000000000000e000000000000000, type: 0} m_StaticBatchInfo: firstSubMesh: 0 subMeshCount: 0 m_StaticBatchRoot: {fileID: 0} m_ProbeAnchor: {fileID: 0} m_LightProbeVolumeOverride: {fileID: 0} m_ScaleInLightmap: 1 m_PreserveUVs: 0 m_IgnoreNormalsForChartDetection: 0 m_ImportantGI: 0 m_StitchLightmapSeams: 0 m_SelectedEditorRenderState: 3 m_MinimumChartSize: 4 m_AutoUVMaxDistance: 0.5 m_AutoUVMaxAngle: 89 m_LightmapParameters: {fileID: 0} m_SortingLayerID: 0 m_SortingLayer: 0 m_SortingOrder: 0 --- !u!1 &588563753 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 588563754} - component: {fileID: 588563756} - component: {fileID: 588563755} m_Layer: 0 m_Name: Interactive m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!4 &588563754 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 588563753} m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} m_LocalPosition: {x: 0.013999981, y: 0.7714286, z: -0.5500001} m_LocalScale: {x: 0.014285712, y: 0.014285712, z: 0.049999997} m_Children: [] m_Father: {fileID: 1541181469} m_RootOrder: 0 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!102 &588563755 TextMesh: serializedVersion: 3 m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 588563753} m_Text: Interactive m_OffsetZ: 0 m_CharacterSize: 1 m_LineSpacing: 1 m_Anchor: 1 m_Alignment: 1 m_TabSize: 4 m_FontSize: 84 m_FontStyle: 0 m_RichText: 1 m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} m_Color: serializedVersion: 2 rgba: 4293322470 --- !u!23 &588563756 MeshRenderer: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 588563753} m_Enabled: 1 m_CastShadows: 1 m_ReceiveShadows: 1 m_DynamicOccludee: 1 m_MotionVectors: 1 m_LightProbeUsage: 1 m_ReflectionProbeUsage: 1 m_Materials: - {fileID: 10100, guid: 0000000000000000e000000000000000, type: 0} m_StaticBatchInfo: firstSubMesh: 0 subMeshCount: 0 m_StaticBatchRoot: {fileID: 0} m_ProbeAnchor: {fileID: 0} m_LightProbeVolumeOverride: {fileID: 0} m_ScaleInLightmap: 1 m_PreserveUVs: 0 m_IgnoreNormalsForChartDetection: 0 m_ImportantGI: 0 m_StitchLightmapSeams: 0 m_SelectedEditorRenderState: 3 m_MinimumChartSize: 4 m_AutoUVMaxDistance: 0.5 m_AutoUVMaxAngle: 89 m_LightmapParameters: {fileID: 0} m_SortingLayerID: 0 m_SortingLayer: 0 m_SortingOrder: 0 --- !u!1 &683248268 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 683248269} - component: {fileID: 683248271} - component: {fileID: 683248270} - component: {fileID: 683248272} m_Layer: 0 m_Name: Enabled m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!4 &683248269 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 683248268} m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} m_LocalPosition: {x: 0.014, y: -0.297, z: -0.55} m_LocalScale: {x: 0.014285714, y: 0.014285714, z: 0.049999997} m_Children: [] m_Father: {fileID: 565675569} m_RootOrder: 2 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!102 &683248270 TextMesh: serializedVersion: 3 m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 683248268} m_Text: (Enabled) m_OffsetZ: 0 m_CharacterSize: 1 m_LineSpacing: 1 m_Anchor: 1 m_Alignment: 1 m_TabSize: 4 m_FontSize: 64 m_FontStyle: 0 m_RichText: 1 m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} m_Color: serializedVersion: 2 rgba: 4286444687 --- !u!23 &683248271 MeshRenderer: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 683248268} m_Enabled: 1 m_CastShadows: 1 m_ReceiveShadows: 1 m_DynamicOccludee: 1 m_MotionVectors: 1 m_LightProbeUsage: 1 m_ReflectionProbeUsage: 1 m_Materials: - {fileID: 10100, guid: 0000000000000000e000000000000000, type: 0} m_StaticBatchInfo: firstSubMesh: 0 subMeshCount: 0 m_StaticBatchRoot: {fileID: 0} m_ProbeAnchor: {fileID: 0} m_LightProbeVolumeOverride: {fileID: 0} m_ScaleInLightmap: 1 m_PreserveUVs: 0 m_IgnoreNormalsForChartDetection: 0 m_ImportantGI: 0 m_StitchLightmapSeams: 0 m_SelectedEditorRenderState: 3 m_MinimumChartSize: 4 m_AutoUVMaxDistance: 0.5 m_AutoUVMaxAngle: 89 m_LightmapParameters: {fileID: 0} m_SortingLayerID: 0 m_SortingLayer: 0 m_SortingOrder: 0 --- !u!114 &683248272 MonoBehaviour: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 683248268} m_Enabled: 1 m_EditorHideFlags: 0 m_Script: {fileID: 11500000, guid: 01cf07a5255bd1f4ea26c9d43d714019, type: 3} m_Name: m_EditorClassIdentifier: InteractiveHost: {fileID: 0} TextField: {fileID: 683248270} --- !u!1 &1079276087 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 1079276088} - component: {fileID: 1079276091} - component: {fileID: 1079276090} - component: {fileID: 1079276089} m_Layer: 0 m_Name: State m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!4 &1079276088 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1079276087} m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} m_LocalPosition: {x: 0.013999981, y: 0.067, z: -0.5500001} m_LocalScale: {x: 0.014285713, y: 0.014285713, z: 0.049999997} m_Children: [] m_Father: {fileID: 1541181469} m_RootOrder: 2 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!114 &1079276089 MonoBehaviour: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1079276087} m_Enabled: 1 m_EditorHideFlags: 0 m_Script: {fileID: 11500000, guid: 9f48cf8bb87d0e4499282ba6c784e03a, type: 3} m_Name: m_EditorClassIdentifier: InteractiveHost: {fileID: 0} TextField: {fileID: 1079276090} --- !u!102 &1079276090 TextMesh: serializedVersion: 3 m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1079276087} m_Text: Default m_OffsetZ: 0 m_CharacterSize: 1 m_LineSpacing: 1 m_Anchor: 1 m_Alignment: 1 m_TabSize: 4 m_FontSize: 84 m_FontStyle: 0 m_RichText: 1 m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} m_Color: serializedVersion: 2 rgba: 4293322470 --- !u!23 &1079276091 MeshRenderer: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1079276087} m_Enabled: 1 m_CastShadows: 1 m_ReceiveShadows: 1 m_DynamicOccludee: 1 m_MotionVectors: 1 m_LightProbeUsage: 1 m_ReflectionProbeUsage: 1 m_Materials: - {fileID: 10100, guid: 0000000000000000e000000000000000, type: 0} m_StaticBatchInfo: firstSubMesh: 0 subMeshCount: 0 m_StaticBatchRoot: {fileID: 0} m_ProbeAnchor: {fileID: 0} m_LightProbeVolumeOverride: {fileID: 0} m_ScaleInLightmap: 1 m_PreserveUVs: 0 m_IgnoreNormalsForChartDetection: 0 m_ImportantGI: 0 m_StitchLightmapSeams: 0 m_SelectedEditorRenderState: 3 m_MinimumChartSize: 4 m_AutoUVMaxDistance: 0.5 m_AutoUVMaxAngle: 89 m_LightmapParameters: {fileID: 0} m_SortingLayerID: 0 m_SortingLayer: 0 m_SortingOrder: 0 --- !u!1 &1133174989 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 1133174990} - component: {fileID: 1133174992} - component: {fileID: 1133174991} - component: {fileID: 1133174993} m_Layer: 0 m_Name: Enabled m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!4 &1133174990 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1133174989} m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} m_LocalPosition: {x: 0.014, y: -0.297, z: -0.55} m_LocalScale: {x: 0.014285714, y: 0.014285714, z: 0.049999997} m_Children: [] m_Father: {fileID: 1541181469} m_RootOrder: 1 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!102 &1133174991 TextMesh: serializedVersion: 3 m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1133174989} m_Text: (Enabled) m_OffsetZ: 0 m_CharacterSize: 1 m_LineSpacing: 1 m_Anchor: 1 m_Alignment: 1 m_TabSize: 4 m_FontSize: 64 m_FontStyle: 0 m_RichText: 1 m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} m_Color: serializedVersion: 2 rgba: 4286444687 --- !u!23 &1133174992 MeshRenderer: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1133174989} m_Enabled: 1 m_CastShadows: 1 m_ReceiveShadows: 1 m_DynamicOccludee: 1 m_MotionVectors: 1 m_LightProbeUsage: 1 m_ReflectionProbeUsage: 1 m_Materials: - {fileID: 10100, guid: 0000000000000000e000000000000000, type: 0} m_StaticBatchInfo: firstSubMesh: 0 subMeshCount: 0 m_StaticBatchRoot: {fileID: 0} m_ProbeAnchor: {fileID: 0} m_LightProbeVolumeOverride: {fileID: 0} m_ScaleInLightmap: 1 m_PreserveUVs: 0 m_IgnoreNormalsForChartDetection: 0 m_ImportantGI: 0 m_StitchLightmapSeams: 0 m_SelectedEditorRenderState: 3 m_MinimumChartSize: 4 m_AutoUVMaxDistance: 0.5 m_AutoUVMaxAngle: 89 m_LightmapParameters: {fileID: 0} m_SortingLayerID: 0 m_SortingLayer: 0 m_SortingOrder: 0 --- !u!114 &1133174993 MonoBehaviour: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1133174989} m_Enabled: 1 m_EditorHideFlags: 0 m_Script: {fileID: 11500000, guid: 01cf07a5255bd1f4ea26c9d43d714019, type: 3} m_Name: m_EditorClassIdentifier: InteractiveHost: {fileID: 0} TextField: {fileID: 1133174991} --- !u!1 &1315320360 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 1315320361} - component: {fileID: 1315320363} - component: {fileID: 1315320362} - component: {fileID: 1315320364} m_Layer: 0 m_Name: Default m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!4 &1315320361 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1315320360} m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} m_LocalPosition: {x: 0.014, y: 0.067, z: -0.55} m_LocalScale: {x: 0.014285714, y: 0.014285714, z: 0.049999997} m_Children: [] m_Father: {fileID: 565675569} m_RootOrder: 3 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!102 &1315320362 TextMesh: serializedVersion: 3 m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1315320360} m_Text: Default m_OffsetZ: 0 m_CharacterSize: 1 m_LineSpacing: 1 m_Anchor: 1 m_Alignment: 1 m_TabSize: 4 m_FontSize: 84 m_FontStyle: 0 m_RichText: 1 m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} m_Color: serializedVersion: 2 rgba: 4293322470 --- !u!23 &1315320363 MeshRenderer: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1315320360} m_Enabled: 1 m_CastShadows: 1 m_ReceiveShadows: 1 m_DynamicOccludee: 1 m_MotionVectors: 1 m_LightProbeUsage: 1 m_ReflectionProbeUsage: 1 m_Materials: - {fileID: 10100, guid: 0000000000000000e000000000000000, type: 0} m_StaticBatchInfo: firstSubMesh: 0 subMeshCount: 0 m_StaticBatchRoot: {fileID: 0} m_ProbeAnchor: {fileID: 0} m_LightProbeVolumeOverride: {fileID: 0} m_ScaleInLightmap: 1 m_PreserveUVs: 0 m_IgnoreNormalsForChartDetection: 0 m_ImportantGI: 0 m_StitchLightmapSeams: 0 m_SelectedEditorRenderState: 3 m_MinimumChartSize: 4 m_AutoUVMaxDistance: 0.5 m_AutoUVMaxAngle: 89 m_LightmapParameters: {fileID: 0} m_SortingLayerID: 0 m_SortingLayer: 0 m_SortingOrder: 0 --- !u!114 &1315320364 MonoBehaviour: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1315320360} m_Enabled: 1 m_EditorHideFlags: 0 m_Script: {fileID: 11500000, guid: 9f48cf8bb87d0e4499282ba6c784e03a, type: 3} m_Name: m_EditorClassIdentifier: InteractiveHost: {fileID: 0} TextField: {fileID: 1315320362} --- !u!1 &1541181464 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 1541181469} - component: {fileID: 1541181468} - component: {fileID: 1541181467} - component: {fileID: 1541181466} - component: {fileID: 1541181465} m_Layer: 0 m_Name: Interactable m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!114 &1541181465 MonoBehaviour: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1541181464} m_Enabled: 1 m_EditorHideFlags: 0 m_Script: {fileID: 11500000, guid: 4ffc62be7bfe7064782e89be291ed835, type: 3} m_Name: m_EditorClassIdentifier: ParentObject: {fileID: 0} IsEnabled: 1 DetectHold: 1 HoldTime: 0.8 RollOffTime: 0.02 Keyword: KeywordRequiresGaze: 1 OnSelectEvents: m_PersistentCalls: m_Calls: - m_Target: {fileID: 137962128} m_MethodName: set_text m_Mode: 5 m_Arguments: m_ObjectArgument: {fileID: 0} m_ObjectArgumentAssemblyTypeName: UnityEngine.Object, UnityEngine m_IntArgument: 0 m_FloatArgument: 0 m_StringArgument: Tap m_BoolArgument: 0 m_CallState: 2 m_TypeName: UnityEngine.Events.UnityEvent, UnityEngine.CoreModule, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null OnDownEvent: m_PersistentCalls: m_Calls: [] m_TypeName: UnityEngine.Events.UnityEvent, UnityEngine.CoreModule, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null OnHoldEvent: m_PersistentCalls: m_Calls: - m_Target: {fileID: 137962128} m_MethodName: set_text m_Mode: 5 m_Arguments: m_ObjectArgument: {fileID: 0} m_ObjectArgumentAssemblyTypeName: UnityEngine.Object, UnityEngine m_IntArgument: 0 m_FloatArgument: 0 m_StringArgument: Hold m_BoolArgument: 0 m_CallState: 2 m_TypeName: UnityEngine.Events.UnityEvent, UnityEngine.CoreModule, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null --- !u!23 &1541181466 MeshRenderer: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1541181464} m_Enabled: 1 m_CastShadows: 1 m_ReceiveShadows: 1 m_DynamicOccludee: 1 m_MotionVectors: 1 m_LightProbeUsage: 1 m_ReflectionProbeUsage: 1 m_Materials: - {fileID: 2100000, guid: a01f482e2ab5c894ba4e1e52a3cf351c, type: 2} m_StaticBatchInfo: firstSubMesh: 0 subMeshCount: 0 m_StaticBatchRoot: {fileID: 0} m_ProbeAnchor: {fileID: 0} m_LightProbeVolumeOverride: {fileID: 0} m_ScaleInLightmap: 1 m_PreserveUVs: 1 m_IgnoreNormalsForChartDetection: 0 m_ImportantGI: 0 m_StitchLightmapSeams: 0 m_SelectedEditorRenderState: 3 m_MinimumChartSize: 4 m_AutoUVMaxDistance: 0.5 m_AutoUVMaxAngle: 89 m_LightmapParameters: {fileID: 0} m_SortingLayerID: 0 m_SortingLayer: 0 m_SortingOrder: 0 --- !u!65 &1541181467 BoxCollider: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1541181464} m_Material: {fileID: 0} m_IsTrigger: 0 m_Enabled: 1 serializedVersion: 2 m_Size: {x: 1, y: 1, z: 1} m_Center: {x: 0, y: 0, z: 0} --- !u!33 &1541181468 MeshFilter: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1541181464} m_Mesh: {fileID: 10202, guid: 0000000000000000e000000000000000, type: 0} --- !u!4 &1541181469 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1541181464} m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} m_LocalPosition: {x: -0.22, y: 0, z: 1} m_LocalScale: {x: 0.35, y: 0.35, z: 0.1} m_Children: - {fileID: 588563754} - {fileID: 1133174990} - {fileID: 1079276088} - {fileID: 137962127} - {fileID: 1828910919} - {fileID: 481182370} m_Father: {fileID: 1819360065} m_RootOrder: 1 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!1 &1774033262 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 1774033264} - component: {fileID: 1774033263} m_Layer: 0 m_Name: Directional Light m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!108 &1774033263 Light: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1774033262} m_Enabled: 1 serializedVersion: 8 m_Type: 1 m_Color: {r: 1, g: 0.95686275, b: 0.8392157, a: 1} m_Intensity: 1 m_Range: 10 m_SpotAngle: 30 m_CookieSize: 10 m_Shadows: m_Type: 2 m_Resolution: -1 m_CustomResolution: -1 m_Strength: 1 m_Bias: 0.05 m_NormalBias: 0.4 m_NearPlane: 0.2 m_Cookie: {fileID: 0} m_DrawHalo: 0 m_Flare: {fileID: 0} m_RenderMode: 0 m_CullingMask: serializedVersion: 2 m_Bits: 4294967295 m_Lightmapping: 4 m_AreaSize: {x: 1, y: 1} m_BounceIntensity: 1 m_ColorTemperature: 6570 m_UseColorTemperature: 0 m_ShadowRadius: 0 m_ShadowAngle: 0 --- !u!4 &1774033264 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1774033262} m_LocalRotation: {x: 0.40821788, y: -0.23456968, z: 0.10938163, w: 0.8754261} m_LocalPosition: {x: 0, y: 3, z: 0} m_LocalScale: {x: 1, y: 1, z: 1} m_Children: [] m_Father: {fileID: 0} m_RootOrder: 3 m_LocalEulerAnglesHint: {x: 50, y: -30, z: 0} --- !u!1 &1819360063 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 1819360065} - component: {fileID: 1819360064} m_Layer: 0 m_Name: SceneContent m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!114 &1819360064 MonoBehaviour: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1819360063} m_Enabled: 1 m_EditorHideFlags: 0 m_Script: {fileID: 11500000, guid: 906323c940a3fad4f8f7e9e4fcd747f4, type: 3} m_Name: m_EditorClassIdentifier: --- !u!4 &1819360065 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1819360063} m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} m_LocalPosition: {x: 0, y: 0, z: 0} m_LocalScale: {x: 1, y: 1, z: 1} m_Children: - {fileID: 565675569} - {fileID: 1541181469} m_Father: {fileID: 0} m_RootOrder: 4 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!1 &1828910918 GameObject: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} serializedVersion: 5 m_Component: - component: {fileID: 1828910919} - component: {fileID: 1828910923} - component: {fileID: 1828910922} - component: {fileID: 1828910921} - component: {fileID: 1828910920} m_Layer: 0 m_Name: Effect m_TagString: Untagged m_Icon: {fileID: 0} m_NavMeshLayer: 0 m_StaticEditorFlags: 0 m_IsActive: 1 --- !u!4 &1828910919 Transform: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1828910918} m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} m_LocalPosition: {x: 0, y: 0, z: 0.05} m_LocalScale: {x: 1.1, y: 1.1, z: 1} m_Children: [] m_Father: {fileID: 1541181469} m_RootOrder: 4 m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} --- !u!114 &1828910920 MonoBehaviour: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1828910918} m_Enabled: 1 m_EditorHideFlags: 0 m_Script: {fileID: 11500000, guid: a60b4c2407cc2d848be7c75de1e789e0, type: 3} m_Name: m_EditorClassIdentifier: InteractiveHost: {fileID: 0} EffectColors: - {r: 0.05490196, g: 0.65882355, b: 0.6, a: 1} - {r: 0.9019608, g: 0.9019608, b: 0.9019608, a: 1} EffectScale: - {x: 1.1, y: 1.1, z: 1} - {x: 1.15, y: 1.15, z: 1} EffectPosition: - {x: 0, y: 0, z: 0.05} - {x: 0, y: 0, z: 0.6} --- !u!23 &1828910921 MeshRenderer: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1828910918} m_Enabled: 1 m_CastShadows: 1 m_ReceiveShadows: 1 m_DynamicOccludee: 1 m_MotionVectors: 1 m_LightProbeUsage: 1 m_ReflectionProbeUsage: 1 m_Materials: - {fileID: 2100000, guid: 685f5d363eec7354b8d5dfbddbc86e28, type: 2} m_StaticBatchInfo: firstSubMesh: 0 subMeshCount: 0 m_StaticBatchRoot: {fileID: 0} m_ProbeAnchor: {fileID: 0} m_LightProbeVolumeOverride: {fileID: 0} m_ScaleInLightmap: 1 m_PreserveUVs: 1 m_IgnoreNormalsForChartDetection: 0 m_ImportantGI: 0 m_StitchLightmapSeams: 0 m_SelectedEditorRenderState: 3 m_MinimumChartSize: 4 m_AutoUVMaxDistance: 0.5 m_AutoUVMaxAngle: 89 m_LightmapParameters: {fileID: 0} m_SortingLayerID: 0 m_SortingLayer: 0 m_SortingOrder: 0 --- !u!65 &1828910922 BoxCollider: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1828910918} m_Material: {fileID: 0} m_IsTrigger: 0 m_Enabled: 0 serializedVersion: 2 m_Size: {x: 1, y: 1, z: 1} m_Center: {x: 0, y: 0, z: 0} --- !u!33 &1828910923 MeshFilter: m_ObjectHideFlags: 0 m_PrefabParentObject: {fileID: 0} m_PrefabInternal: {fileID: 0} m_GameObject: {fileID: 1828910918} m_Mesh: {fileID: 10202, guid: 0000000000000000e000000000000000, type: 0}
{ "pile_set_name": "Github" }
![](edinbmedj73948-0063){#sp1 .830} ![](edinbmedj73948-0064){#sp2 .831} ![](edinbmedj73948-0065){#sp3 .832} ![](edinbmedj73948-0066){#sp4 .833} ![](edinbmedj73948-0067){#sp5 .834} ![](edinbmedj73948-0068){#sp6 .835} ![](edinbmedj73948-0069){#sp7 .836} ![](edinbmedj73948-0070){#sp8 .837} ![](edinbmedj73948-0071){#sp9 .838} ![](edinbmedj73948-0072){#sp10 .839} ![](edinbmedj73948-0073){#sp11 .840} ![](edinbmedj73948-0074){#sp12 .841} ![](edinbmedj73948-0075){#sp13 .842} ![](edinbmedj73948-0076){#sp14 .843} ![](edinbmedj73948-0077){#sp15 .844} ![](edinbmedj73948-0078){#sp16 .845} ![](edinbmedj73948-0079){#sp17 .846}
{ "pile_set_name": "PubMed Central" }
Nomadic center Nomadic center (, also Romanized as Maḥal Chādarhāy ʿAshāīry Dū Rāhī Pakht) is a village and nomadic center in Momenabad Rural District, in the Central District of Sarbisheh County, South Khorasan Province, Iran. At the 2006 census, its population was 30, in 9 families. References Category:Populated places in Sarbisheh County
{ "pile_set_name": "Wikipedia (en)" }
An alternative option to setting up the Bluetooth module without an FTDI adapter is the use the **bluetooth-passthru.hex** with an Arduino Nano. This HEX file creates a software serial connection to the Bluetooth module on D6/D7 pins and relays ​AT commands ​from the serial terminal to the Bluetooth module. + An alternative option to setting up the Bluetooth module without an FTDI adapter is the use the **bluetooth-passthru.hex** with an Arduino Nano. This HEX file creates a software serial connection to the Bluetooth module on D6/D7 pins and relays ​input from the serial terminal to the Bluetooth module.
{ "pile_set_name": "Pile-CC" }
What is really going on in politics? Get our daily email briefing straight to your inbox Sign up Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email Angela Merkel confronted Barack Obama today over suggestions that US spooks eavesdropped on her mobile phone calls. The German leader demanded “immediate and comprehensive” clarification from the President. The exchange came after Berlin received information the German Chancellor’s mobile calls may have been monitored. Mrs Merkel told Mr Obama it would be “completely unacceptable” if it had taken place. Her spokesman said: “This would be a serious breach of trust. Such practices should be stopped immediately.” The confrontation between the leaders came just 24 hours after the US was accused of spying on France – with Prime Minister Jean-Marc Ayrault saying he was “deeply shocked” by the claims that American spooks listened to millions of calls. Yesterday, a White House official said the President told Mrs Merkel that the US “is not monitoring and will not monitor communications of the Chancellor”. But in Germany, it was reported the US gave no assurances about what had gone on. Mr Obama had promised a review of American spies’ activities after the whistleblower Edward Snowden revealed in June the alleged extent of the National Security Agency ’s surveillance network. (Image: Getty) German magazine Der Spiegel, which has published stories based on Snowden’s leaks, claimed details about Mrs Merkel’s calls came from its investigations. France’s Le Monde newspaper said on Tuesday the country’s diplomats in Washington and at the UN had been spied on. The NSA internal memos obtained by the paper detailed the use of a surveillance programme, known as Genie. The US ambassador was summoned to the French foreign minister after the reports claimed the NSA spied on 70.3 million phone calls in France in just 30 days from December last year. The information Snowden, a former NSA worker, leaked led to claims of systematic spying by the NSA and CIA globally. The NSA was forced to admit it had captured email and phone data from millions of Americans. Snowden, wanted in the US on criminal charges, is in Russia after getting asylum.
{ "pile_set_name": "OpenWebText2" }
XFL NEEDS SOME OLD-FASHIONED IMPROVEMENTS THE HARTFORD COURANT As of this writing, the NBC-World Wrestling Federation experiment with XFL football is a bit of a flop -- failing, but not yet taken out back and shot in the head. The television ratings stink, but so does the analysis that attempts to explain the problem. To suggest that the XFL is too violent, too sex-obsessed and too tacky is exactly the wrong diagnosis -- a diagnosis produced by big-brained pundits who drink white wine and go to PTA meetings with their wives. The problem with the XFL isn't that it's too over-the-top. It has failed to catch on because it's too tame, it's too normal, it's too much like the grown-up National Football League -- but without the great players. For all the hype about how violent and smash-mouth the XFL was going to be, the honest truth is that the XFL players aren't stupid: a little snarling and hard tackling is OK, but they're not going to maim each other for $45,000 per year and the admiration of the beer-guzzling guys in the stands. The football fields aren't filled with ambulances and body bags. And for all the hype about how sexy/slutty the cheerleaders were going to be, in the end, they sort of look and act like blue-collar versions of suburban soccer-mom joggers who strut their stuff on public streets. Letting us get a peek in the cheerleaders' locker room is cute, but you can flip to a cable channel and watch marathon copulation. A bit of cheerleader breast or butt isn't going to inflame the populace -- at least the segment over 10 years old. Efforts to energize the game, including worthwhile stuff like eliminating the dumb extra-point kick after touchdowns, haven't freed the league from the NFL obsession with robot-like conservatism, leading to few "mistakes," but also to little offense or fun or novelty. First, shake off the new and bring back the old. XFL teams should spring a little single-wing football on us. Back in the good old days, the single-wing was what brought us crashing, crunching, stop-me-if-you-dare football, with reverses and spins and quick kicks for no reason at all and a tailback designed to be a running, passing, kicking, triple-threat hero. The old guys in the audience will swoon with the nostalgia of it all -- and the young drunks will think the "new" offense is really cool. And you don't even need the single wing to offer up such weird stuff as the flea-flicker and the statue-of-liberty and the onside kick -- the kind of fun stuff that shows up in the NFL once every three years. In the successful pro wrestling venue, the crowd is an active part of the show, with a rather sweaty and nearby connection with the gladiators in the ring. The XFL can grab a piece of that action by encouraging fans to call or fax or e-mail suggested offensive plays to the home teams, which the coach would be required to choose from and use once or twice during the games. The University of Nebraska at Kearney has experimented with an approach like that, as has Boise State and, in the NFL pro ranks, the Tampa Bay Buccaneers. Let me call in a game-winning play, give me a little on-air credit, and I'll watch the XFL forever -- or until I pass out drinking whatever brand of beer is being advertised. And the girls. Those cheerleaders will never be as nutty or slutty as what a 5-year-old can call up on the Internet. The football producers have to remember the lessons of pro wrestling: The key to a good time is a plot, a script, a story line. The cheerleaders should be allowed to participate in the huddles, to encourage the boys to win one for Wanda. Let Virginia the Virgin and Terry the Tramp flirt with the players during the game; let them throw garter belts and swoon when some Cohen-like hunk does something particularly heroic. The last thing that the XFL should do is listen to the stuffy critics who think that lowbrow football is too lowbrow. If you want to criticize mediocre, tacky, oversexed junk, take a look at what the National Endowment for the Arts offers up as high culture.
{ "pile_set_name": "Pile-CC" }
Rachel Carson and JFK, an Environmental Tag Team On the 50th anniversary of Silent Spring’s publication, a best-selling historian shows the extent to which John Kennedy and his administration defended Rachel Carson’s controversial work against the chemical industry’s onslaught. Save birds and their habitats with a donation to Audubon today. One of John F. Kennedy’s favorite books was Henry David Thoreau’s Cape Cod, published in 1865. When in Washington, D.C., Kennedy, a yachtsman, always craved the Cape Cod winds and turbulent Atlantic waves. He restored his health sailing the Nantucket Sound waters around sandbars and shoals. The elemental forces of the sea helped Kennedy cope with the pain of Addison’s disease and cleared his mind of the clutter of retail politics. Kennedy understood exactly what Thoreau meant when the naturalist wrote about the Cape that “a man can stand there and put all of America behind him.” On his bookshelf in Hyannis Port, alongside Cape Cod, sat two books by Rachel Carson: The Sea Around Us and The Edge of the Sea. When it came to conservation, only marine-related issues regularly caught Kennedy’s attention. In awe of the millions of shore, sea, and marsh birds that used the Cape as a stopover during their seasonal migrations, Kennedy, a Massachusetts Audubon Society supporter, wanted to make sure that the shoreline remained unsullied by industrialization. In this spirit, on September 3, 1959, Kennedy, then a member of the U.S. Senate, cosponsored the Cape Cod National Seashore bill with his Republican colleague Leverett Saltonstall. As a longtime resident of Hyannis Port, Kennedy had no detailed knowledge of the lower Cape area, but he routinely flew over it in helicopters as the seashore legislation circulated through Congress. Running for president in 1960, Kennedy advocated saving seashores as wildlife refuges and recreational areas. Supreme Court Justice William O. Douglas, a New Dealer and close Kennedy family friend, set the tone and tenor of JFK’s burgeoning environmentalism when he intoned at a Wilderness Conference in San Francisco that the “preservation of values which technology will destroy . . . is indeed the new frontier.” Biologist Rachel Carson, working feverishly on her eco-manifesto Silent Spring throughout 1960, considered July 15—when Kennedy delivered his acceptance speech after winning the Democratic nomination for president and called for a “New Frontier” to reinvigorate the progressive, can-do spirit of America—a gold-starred day. Most political pundits heard only Kennedy’s vigorous lines about outfoxing the Soviet Union in the Cold War. But Kennedy—who had championed the Wilderness Bill that would eventually be signed into law by Lyndon Johnson, supported expanding bird sanctuaries and advocated the creation of new protected national seashores—offered a promise Carson found irresistible. He called for “mastery of the sky and rain, the oceans and the tides.” Carson knew exactly what Kennedy meant by mastery: empowering biologists to help rescue America from environmental degradation. Certainly since 1945, the White House under Harry Truman and Dwight Eisenhower had been, at the most charitable, uninspiring on the conservation front, causing environmental activists to hope that another Theodore or Franklin D. Roosevelt would appear on the political horizon. Between 1945 and 1960 a string of multi-megaton thermonuclear detonations, all in the name of weapons supremacy vis-à-vis the Soviet Union, had released massive amounts of radioactive fallout in the atmosphere. During the Eisenhower era, America wasn’t just the preeminent superpower, it became the world’s leading hyper-industrial giant. This brought Americans a lot of economic lifestyle benefits. But it came at a high cost. The oceans were dying. Rainwater was unsafe to drink. “To dispose first and investigate later is an invitation to disaster,” Carson wrote around the time of Kennedy’s acceptance speech, “for once radioactive elements have been deposited at sea they are irretrievable. The mistakes that are made now are made for all time.” Besides sounding the Paul Revere alarm about the pesticide DDT in Silent Spring, Carson also promoted nuclear non-proliferation, even dedicating the book to Albert Schweitzer, who had won the Nobel Peace Prize in 1952 for his efforts to end the atomic arms race. Carson, one of the best marine biologists alive, feared the oceans would be poisoned beyond redemption in the coming decades, and that a point of no return was fast approaching. The thought of Kennedy in the White House—a new Roosevelt—lifted her hopes that aboveground nuclear testing would be banned. (Her dream came true in August 1963, when Kennedy signed the Limited Nuclear Test Ban Treaty with the United Kingdom and the Soviet Union.) In the spring of 1960 Carson, even while struggling with breast cancer, viral pneumonia, and ulcers, had signed up to be a New Frontier foot soldier in solidarity with the Kennedy family and Justice Douglas. Only her assistant Jeanne Davis understood how debilitating her health problems were. This was Carson’s big secret. As Linda Lear stressed in Witness to Nature, Carson had to conceal her illness, even wearing a wig when her hair started falling out during chemotherapy, for fear of the chemical companies attacking her Silent Spring research by saying, “She’s dying of cancer and wants to blame the pesticides.” Propped up on pillows at her home in Silver Spring, Maryland, trying to heal, working away on her Silent Spring manuscript, Carson managed to find time to volunteer for Kennedy’s campaign. In the weeks leading up to Kennedy’s nomination, Carson served on the Natural Resources Committee of the Democratic Advisory Council. She hoped that in late 1962, when Silent Spring would be published, Kennedy would occupy the White House, leading a mainstream effort to slay the dual dragons of pollution: radioactive and chemical contamination of the environment. The advisory council embraced Carson’s anti-pollution ideas. Her dear friend Pare Lorentz, a film producer, wrote the council’s far-reaching report on pollution control, with input from Carson. They recommended that Kennedy, if elected, create a Bureau of Environmental Health within the U.S. Public Health Service. Carson envisioned this prototype for the Environmental Protection Agency wielding regulatory jurisdiction over “our one imperative resource: the environment in which all of us live.” Kennedy received the Lorentz report—titled “Resources for the People”—that October. In the fall of 1960 most outdoors enthusiasts considered themselves conservationists. But Carson, using the advisory council as a bully pulpit, turned the public debate toward a new environmentalism, one properly informed of the perils of mass chemical usage. The monumentalism of Theodore Roosevelt (who protected such American wonders as the Grand Canyon and Crater Lake) and the conservation ethos of FDR (who planted trees and expanded wildlife refuges) were great accomplishments. But Carson wanted to connect the movement to public health. No longer would conservation be a cult of birdwatchers, fair-chase hunters, and outdoor recreationalists. The new ecological awareness would extend to every mom and dad striving to protect their children’s precious health. Nobody wanted to give their child cow’s milk containing dangerous levels of strontium-90 or serve fish contaminated with toxic mercury. “Ecology” became the new buzzword. That October, while Kennedy read the council’s report, his wife, Jacqueline, invited Carson to join the Women’s Committee for New Frontiers. Not only did Carson accept, but she also met with the future first lady at the Kennedys’ Georgetown home. This wasn’t a garden club Carson was joining; it was the brain trust of the smartest women in the Democratic Party. Word spread among the liberal Washington doyennes—including Evangeline Bruce (wife of the famed diplomat David K.E. Bruce), former First Lady Eleanor Roosevelt, and former Secretary of Labor Frances Perkins—that Carson was writing about how the residue of insecticides and pesticides had been discovered in soil and water all over America. Mrs. Kennedy was pregnant with John, her baby due in December, and the mere thought that pesticides might have a genetic effect on her unborn child would have been harrowing to her. On November 4, Kennedy beat Vice President Richard Nixon and was elected the 35th U.S. president. Carson was overjoyed. It heartened her that Kennedy, shortly before winning, issued a statement saying, “We must restore our own woodlands as a source of strength for the Nation’s future. . . . The Nation should set aside shoreline recreational refuges, and ranges must be protected to serve the purposes to which they are dedicated without interference by commercial exploitation.” Perhaps now the federal government would address her crusade against pesticides and nuclear fallout in a more pronounced, regulatory way. For most of 1961 Carson continued slaving away on Silent Spring. She was ecstatic that Kennedy, the lover of the great Atlantic Ocean, had pushed to create new national seashores at Cape Cod (Massachusetts), Padre Island (Texas), and Point Reyes (California). In June of 1961 Elbert N. Carvel, the Democratic governor of Delaware, tried to hinder the creation of the Prime Hook National Wildlife Refuge—considered one of the preeminent stopover sites for migratory shorebirds in the fall and spring. Kennedy wrote him a threatening letter, demanding that he “retract his objections.” In 1963, under the authority of the Migratory Bird Conservation Act, the president established Prime Hook—located on the west shore of Delaware Bay—as a national wildlife refuge. After Carson completed Silent Spring in early 1962, she once again hitched her wagon to the star of the New Frontier. With The New Yorker slated to run the first excerpt of Silent Spring in its June 16 issue, Carson went on a pre-publication alliance-building charge. She attended a White House conference on conservation convened at President Kennedy’s request. Still receiving cancer radiation treatments, Carson asked two key female allies to accompany her to the conference: Ruth Scott (a Pennsylvania conservationist and friend) and Nicki Wilson (an Interior Department publicist). “This is not an easy book to tell people about,” Carson’s editor at Houghton Mifflin had warned. “We are going to have to work up something of a crusade—on a local level—if we are to reach a really wide audience.” Carson could have brought anybody with her to meet the Kennedys. The fact that she chose a publicist and a tireless Democratic Party networker shows how Carson was gearing up for the inevitable blowback that Silent Spring was bound to receive from the chemical industry, agribusiness behemoths, and other deep-pocketed polluters. Scott made sure that Carson interacted with Secretary of the Interior Stewart Udall and Sierra Club Director David Brower at the White House. Justice Douglas, Kennedy’s number one unofficial adviser on all things conservation, had read an advance galley of Silent Spring just before the White House conference. Carson was getting her high-powered advocacy ducks in a row. On May 27, shortly before The New Yorker excerpt ran, Paul Knight, a close adviser to Interior Secretary Udall, met with Carson to strategize on how the Kennedy administration and Carson could work in tandem to bring maximum publicity to Silent Spring. The new frontier was now fully behind the Carson environmental zeitgeist. President Kennedy himself—after reading The New Yorker excerpt along with the first lady—wanted Carson defended from the onslaught of abuse that Big Chemical would hurl her way. The administration, in fact, was helping to publicize Carson’s work while simultaneously creating a buffer for the president if her research didn’t hold up under peer review. Justice Douglas took the New Frontiersman lead, declaring Silent Spring “the most revolutionary book since Uncle Tom’s Cabin.” Since the 1950s Douglas and Robert F. Kennedy, the president’s brother, had hiked together all over the world, from the Chesapeake & Ohio Canal in Maryland to the outback of Siberia. Justice Douglas was practically an auxiliary member of the Kennedy family. Writing in the Book-of-the-Month Club News about Silent Spring, Douglas threw down a gauntlet impossible to ignore. “This book,” he wrote, “is the most important chronicle of this century for the human race. This book is a call for immediate action and for effective control of all merchants of poison.” What companies like American Cyanamid, Velsicol, and Monsanto would soon learn was that the Kennedy administration was setting up Big Chemical as the culprit of the planet’s worse environmental desecrations. The New York Times published its first pro-Silent Spring editorial—“Rachel Carson’s Warning”—on July 2, 1962. A few weeks later the Times ran a supportive story about Carson called “Silent Spring Is Now Noisy Summer: Pesticide Industry Up in Arms Over a New Book.” The die was cast for a king-daddy fight. At a White House news conference, which coincided with Douglas’s endorsement of Silent Spring in the Book-of-the-Month Club News, President Kennedy offered Carson his imprimatur—to a degree. While too smart a politician to embrace all of Carson’s research, Kennedy made clear that his administration took Silent Spring seriously. Because of “Miss Carson’s book,” Kennedy said in a televised press conference, the Department of Agriculture and the Public Health Service had launched a full-blown investigation into whether pesticides caused illnesses in humans. What a daring thing for Kennedy to do, the equivalent of Theodore Roosevelt embracing muckraking novelist Upton Sinclair’s The Jungle (a searing indictment of unsanitary Chicago meatpacking plants that led to the passage of the 1906 Pure Food and Drug Act). Kennedy was using Silent Spring to help push the Democratic Advisory Council’s 1960 agenda to combat pollution by connecting old-style conservation to the new-style environmentalism that called for the protection of earth, air, and water (and all creatures dwelling therein). The day after the White House press event, Kennedy announced the establishment of a special panel of the President’s Science Advisory Committee (PSAC), headed by the highly respected Dr. Jerome B. Wiesner, to study various health and environmental questions about pesticide use. The hullabaloo over Silent Spring allowed Kennedy to go on the offensive against chemical polluters. Most other presidents would have gone into duck-and-cover mode because of Carson. But Silent Spring served Kennedy’s goal of saving wetland habitats along the Atlantic coast and having the U.S. government regulate the toxic pesticide sprays beloved by huge agricultural concerns. Although Kennedy didn’t want to be an alarmist, he didn’t mind a fellow New Frontier intellectual—like Carson—leading the gallant charge. When Silent Spring was at last published in book form on September 27, 1962, the chemical industry went ballistic. Kennedy instantly became Public Enemy No. 1 for propping up Silent Spring as worthy of serious attention. The National Agricultural Chemicals Association rushed its propaganda booklet “Fact and Fancy” into print. The nub of the counterattack was that Mr. Fancy (a.k.a. Kennedy) was an East Coast elite who yachted frivolously around Cape Cod, his treasured national seashore, while allowing DDT manufacturers to be unjustly vilified. The association warned that factory shutdowns would mean thousands of lost jobs. When Kennedy awarded Dr. Frances Oldham Kelsey—a Food and Drug Administration scientist—a public service gold medal for discovering that thalidomide (a sedative frequently prescribed to pregnant women) caused deformities in babies, the pharmaceutical industry likewise felt blindsided. “It is all of a piece,” Carson told The New York Post, “thalidomide and pesticides—they represent our willingness to rush ahead and use something new without knowing what the results are going to be.” In June 1962, National Audubon Society President Carl Buchheister had read a galley of Silent Spring just as The New Yorker installment was running, and decided to back Carson. Lawyers from Velsicol lobbed veiled threats at John Vosburgh (Audubon’s editor) and Charles Callison (assistant to the NAS president) over lunch, warning them to beware of associating with Carson. Big Chemical was gearing up to blast her out of the water. Bravely, Vosburgh and Callison ignored the Velsicol bullying, though they were fearful of lawsuits. Audubon published an excerpt of Silent Spring and criticized, in an editorial, Velsicol’s pesticide programs (though it didn’t entirely endorse Carson’s argument). Furthermore, Audubon Society branches in different cities and states banded together to serve as refuges for Carson throughout the summer and fall of 1962. Fighting a kind of guerrilla war against Big Chemical, Carson spent time at the Audubon Camp in Maine and attended a book signing at the Audubon Society in Washington, D.C. Roland Clement, vice president of Audubon and a staff biologist, publicly embraced Carson’s Silent Spring research; others at the nonprofit, more timid, expressed varied doubts. In September 1963, Audubon courageously reprinted a Carson lecture about New England wildflowers as “Rachel Carson Answers Her Critics.” But National Audubon never supported a ban on DDT. Instead, the nonprofit simply gave Carson’s defense real estate in its own organ of reform. Not that Audubon was taking much of a risk. The Great Debate over Silent Spring ended in Carson’s favor on May 15, 1963, when President Kennedy’s 46-page President’s Science Advisory Committee report—titled “Use of Pesticides”—was made public. (It might as well have been called “Rachel Carson Wins.”) Although the report wasn’t definitive concerning any human health concerns about pesticides, it did contain a bombshell recommendation to increase public education about the biological hazards of pesticides. It was as if WARNING had been stamped on every page. “Until the publication of Silent Spring by Rachel Carson, people were generally unaware of the toxicity of pesticides,” the PSAC report stated. “The Government should present this information to the public in a way that will make it aware of the dangers while recognizing the value of pesticides.” Carson had three aims in writingSilent Spring: creating an enduring work of literature on par with The Sea Around Us; alerting the public to the health dangers of pesticides; and forcing the U.S. government to regulate the chemical industry more stringently. That May she accomplished all three goals. The wheels of Congress now started turning in her direction. Senator Abraham Ribicoff of Connecticut demanded subcommittee hearings, which started the very day after the PSAC report came out. Secretary Udall heralded Carson as a “far-sighted and alert writer [who] has awakened the Nation.” Having achieved her goals, Carson headed north to rock-ribbed Maine for the summer. With her friend Dorothy Freeman she relaxed, watching the advancing and retreating tides from an oceanfront deck. She enjoyed the diving terns, nesting parula warblers, and scavenging gulls more than ever before, though radiation treatments had ravaged her body and shrunken her frame. When summer ended, Carson headed back to Silver Spring. Awaiting her on her desk was a letter from the National Audubon Society, informing Carson that it was awarding her its highest honor for conservation achievement. More than 500 dinner guests attended the award ceremony at the Hotel Roosevelt in New York on December 3, 1963. “Conservation is a cause that has no end,” she said in her acceptance speech. “There is no point at which we will say ‘our work is finished.’ ” President Kennedy had been killed in Dallas just 11 days earlier. Carson mourned for months. But as solace, the New Frontier regulatory attitude toward the use of pesticides and other chemicals had taken hold of the national psyche. The Kennedy-Carson vision of an America with “mastery of the sky and rain, the oceans and the tides” lived on in Lyndon Johnson’s Great Society, igniting the grassroots modern environmental movement that would bring us such landmark legislation as the Clean Air Act, the National Environmental Policy Act, and the Endangered Species Act—all signed into law by President Richard Nixon. Suffering terribly from myriad illnesses, Carson died on April 14, 1964. In the same way Abraham Lincoln was forever tied by history to Harriet Beecher Stowe and Theodore Roosevelt to Upton Sinclair, so, too, had Carson been linked to Kennedy’s New Frontier conservation. There is no shortage of conflicting opinions about the controversial DDT analysis in Silent Spring. But no one disputes that by 1964 the environmental revolution was on, and Kennedy and Carson were among its John the Baptist figures. Their shared love of the Atlantic seaboard—particularly the migratory shorebird areas from Maine to Virginia—fused together an alliance that uplifted outdoors enthusiasts in all 50 states. “Kennedy loved marine conservation,” Udall recalled. “And Carson was his muse.”
{ "pile_set_name": "Pile-CC" }
<?xml version="1.0" encoding="ascii"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>plaintext</title> <link rel="stylesheet" href="epydoc.css" type="text/css" /> <script type="text/javascript" src="epydoc.js"></script> </head> <body bgcolor="white" text="black" link="blue" vlink="#204080" alink="#204080"> <h1 class="toc">Module plaintext</h1> <hr /> <h2 class="toc">Classes</h2> <a target="mainFrame" href="epydoc.markup.plaintext.ParsedPlaintextDocstring-class.html" >ParsedPlaintextDocstring</a><br /> <h2 class="toc">Functions</h2> <a target="mainFrame" href="epydoc.markup.plaintext-module.html#parse_docstring" >parse_docstring</a><br /><hr /> <span class="options">[<a href="javascript:void(0);" class="privatelink" onclick="toggle_private();">hide&nbsp;private</a>]</span> <script type="text/javascript"> <!-- // Private objects are initially displayed (because if // javascript is turned off then we want them to be // visible); but by default, we want to hide them. So hide // them unless we have a cookie that says to show them. checkCookie(); // --> </script> </body> </html>
{ "pile_set_name": "Github" }
Windows 7 Serial Key for 32bit/64bit 100% Free 2018 Windows 7 is a personal computer operating system that was produced by Microsoft as part of the Windows NT family of operating systems. Windows 7 is a most widely used version of windows. This has many new and advanced features than its processor windows vista. To run your windows you must get an original window from Microsoft, buying that will make sure that you are enjoying all the features at its best without any disturbance. Here in this article, I have shared Windows 7 ultimate key, windows 7 professional serial key, windows 7 home basic product keys, windows 7 starter product keys. Install with me and enjoy the free version of the Windows 7. To operate Windows 7 needs Windows 7 Activation Key as per your computer required as 32-Bit/64-Bit. The Windows 7 Product key is a 25-character code that’s used to stimulate windows on your computer. Windows Firewall: Keep intruders or software that is harmful from getting back in. Windows 7 Serial Keys Windows 7 Home Premium Product Key 2017 6RBBT-F8VPQ-QCPVQ-KHRB8-RMV82 38JTJ-VBPFW-XFQDR-PJ794-8447M 4FG99-BC3HD-73CQT-WMF7J-3Q6C9 4G3GR-J6JDJ-D96PV-T9B9D-M8X2Q 2V36J-4RK8B-GW27Q-4DXPG-RQP78 Windows 7 Home Basic Product Key 2017 22MFQ-HDH7V-RBV79-QMVK9-PTMXQ 239PK-QV6BM-6BX3V-KH2BD-R3VTY 2RDPF-PTCT2-DR237-KD8JY-VH2M7 2Q4QP-8P4MD-47YBP-7TXX9-FKDRM Windows 7 Professional Product Key 2017 237XB-GDJ7B-MV8MH-98QJM-24367 GMJQF-JC7VC-76HMH-M4RKY-V4HX6 MKD6B-HV23H-TMH22-WXG3P-TRVJM 74T2M-DKDBC-788W3-H689G-6P6GT HYF8J-CVRMY-CM74G-RPHKF-PW487 2666Q-HGXKH-DFP6M-7YGBB-BG7Q7 Windows 7 Starter Product Key 2017 2V3W2-JXTTR-28RD8-R228D-KR69C 2K8WH-JVQDM-C9HVC-YR2XC-8M76G 22P26-HD8YH-RD96C-28R8J-DCT28 273P4-GQ8V6-97YYM-9YTHF-DC2VP Windows 7 Ultimate Product Key 2017 MVYTY-QP8R7-6G6WG-87MGT-CRH2P MM7DF-G8XWM-J2VRG-4M3C4-GR27X RGQ3V-MCMTC-6HP8R-98CDK-VP3FM 7YWX9-W3C2V-D46GW-P722P-9CP4D You can copy paste like below: Checkout Below for Windows 10 Product Key video Guideline System Requirement CPU: 1GHz RAM: 1GB HDD: 16GB Graphics card: 128MB I hope you enjoy this article, I have mentioned some Product Key to install the Windows 7 and I wish you get the proper Activation key to install the Windows 7 operating system and that is 100% free for you so grab now this chance! However, if you stuck at any level of installing or generating the product key without hesitation contacts me I’ll be there to solve your query.
{ "pile_set_name": "Pile-CC" }
Dichomeris enoptrias Dichomeris enoptrias is a moth in the family Gelechiidae. It was described by Meyrick in 1911. It is found in India (Assam). The wingspan is 14–16 mm. The forewings are bronzy-fuscous with a very broad leaden-metallic streak along the costa from the base to one-third, and one less broad along the dorsum from the base to near the middle, confluent at the base, and with their posterior extremities connected by an angulated bar. There is also a broad slightly curved leaden-metallic fascia from the middle of costa to two-thirds of the dorsum, as well as an oblique white strigula on the costa at two-thirds. A broad leaden-metallic terminal fascia is narrowed to the tornus, marked with a whitish-ochreous dash from the apex. The hindwings are dark fuscous, more blackish-fuscous posteriorly. References Category:Moths described in 1911 Category:Dichomeris
{ "pile_set_name": "Wikipedia (en)" }