text
stringlengths
1
3.78M
meta
dict
Q: Does digestion require hydrochloric acid? Would our digestion function any differently if we secreted something else, like sulfuric or nitric acid, instead? I'd assume an acidic environment may be required, but not sure if chloride is also required as well! Perhaps we just use it out of convenience—e.g., presumably blood serum $$\left[\ce{SO4^2-}\right] + \left[\ce{NO3-}\right] \ll \left[\ce{Cl-}\right]$$ and channeling polyatomic ions across the membrane may be significantly more difficult than doing the same for chloride as well! *Edit: In fact, Wikipedia states In the stomach, chief cells release pepsinogen. This zymogen is activated by hydrochloric acid (HCl), which is released from parietal cells in the stomach lining. The hormone gastrin and the vagus nerve trigger the release of both pepsinogen and HCl from the stomach lining when food is ingested. Hydrochloric acid creates an acidic environment, which allows pepsinogen to unfold and cleave itself in an autocatalytic fashion, thereby generating pepsin (the active form). Pepsin cleaves the 44 amino acids from pepsinogen to create more pepsin. So, while maybe something like $\ce{H2SO4}$ or $\ce{HNO3}$ could work too, hydrochloric acid is just more convenient to use? A: Parietal cells use ion pumps to expel protons and chlorine ions into the lumen, which create the necessary acidic environment to denature pepsinogen into pepsin. It is the low pH environment that reconfigures or denatures pepsinogen into pepsin. The acid used does not matter. For example, one experiment in classifying properties of pepsinogen used a 3.5 pH solution of 0.5 N sulfuric acid to activate pepsin. We evolved stomachs with parietal cells that use an energetically expensive process to maintain the acidic gradient necessary for digestion and protection from pathogens. It may be that biochemical pathways to generate other acids did not evolve, because it is either energetically cheaper for these cells to make HCl, compared with other pathways that would generate other acids of sufficient strength; or the relevant chemical components involved are more abundant than others in what we eat and drink, and thus easier to make in quantities needed for digestion and defense. Chloride ions also serve a role in maintaining intra- and extracellular fluid pressure and thus play a larger part as electrolytes in the normal function of the body — they are available and cells use them. But to answer your main question, an acidic environment activates pepsin, and it is not chemically necessary for this to be created by hydrochloric acid.
{ "pile_set_name": "StackExchange" }
Search Our Site E-learning 'encouraged by tablet computers in schools' schedule 5 years, 7 months, 1 week, 5 days by Virtual College in Virtual College E-learning has been given a significant push in India and other parts of the world as more and more schools consider the implementation of mobile technologies in their curriculums. The Payal Tiwari Foundation in association with the Pune Municipal Corporation and Sundaram Group this week gave students the first wave of tablet computers in a bid to increase their knowledge of online tools and encourage independent learning, the Indian Express reports. Amrut Shah of the Sundaram Group of companies said: "The tablet computer, consisting of 300 hours learning, is the first in Marathi [language]. We took up this venture so that we could bring Marathi-medium schools on a par with English-medium schools." This incentive in India follows a string of other educational facilities across the globe taking on the idea of the virtual classroom and the benefits it can bring. News provider NBC 29 recently reported that students at Charlottesville High School in Charlottesville, Virginia were awarded with the new tool that is predicted to give them an edge in the future and provide them with extensive IT knowledge as well as that gained through the specified school subjects. The school's principal Dr Thomas Taylor said the tablet computers would prepare students for the real world where the use of technology is paramount to many jobs. "We're invested in our community's youth, we want them to be successful now, and we also want them to be successful productive citizens," he added. Recent data showed the sales of tablet computers rose significantly in the past year and it is predicted that eight million more will be sold in the UK in 2012, new research from Sky has suggested. The poll also found that one in 12 people received a tablet computer for Christmas and that this led to a total of six 'screens' in each household - inclusive of laptops, mobile phones and televisions. Grainne Conole, director of the Beyond Distance Research Alliance at the University of Leicester, recently commented that the advancement of e-learning in the coming years will rely heavily on the uptake of mobile technologies such as tablets.
{ "pile_set_name": "Pile-CC" }
Q: Присвоение элементам class с помощью js, работа с innerHTML и получение данных из адресной строки Если в адресной строке нет ничего после знака "?" - то должен присваиваться определенный class некоторым элементам и вноситься изменения в элемент с class="error", чего не происходит. В каком месте я ошибся? Вроде все правильно сделал. Код: Html: <body> <div class="error"></div> <p class="llogin" id="llogin">Ваш логин: <p></p><p> <p class="mail" id="mail">Ваш Mail: <p></p></p> <p class="phone" id="phone">Ваш телефон: <p></p></p> <form> <input placeholder="Изменить логин" class="login" name="login" id="login"> <input type="password" class="password" placeholder="Сменить пароль" name="password" id="password"> <input type="repass" class="repass" placeholder="Повторите пароль" name="repassword" id="repass"> <input placeholder="Изменить mail или телефон" class="binding" name="binding" id="binding"> </form> <button class="button" id="button">Изменить данные</button> </body> Js: var str = window.location.search.replace( '?', ''); var ver; if(str = ""){ document.querySelector("#llogin").className = "hidden"; document.querySelector("#mail").className = "hidden"; document.querySelector("#phone").className = "hidden"; document.querySelector("#password").className = "hidden"; document.querySelector("#repass").className = "hidden"; document.querySelector("#binding").className = "hidden"; document.querySelector("#button").className = "hidden"; document.querySelector(".error").innerHTML = "Произошла неизвестная ошибка"; }else{ A: var str = location.search.substring(1); https://some.url?then=some&query=string location.search.substring(1) = then=some&query=string if(str = ""){ // str присвоили ""
{ "pile_set_name": "StackExchange" }
Charlotte Best Charlotte Elise Best (born 16 January 1994) is an Australian actress and model. She is best known for her role in the show Home and Away as the young girl in the Campbell Family, Annie Campbell. Biography Best grew up in the suburb of Point Frederick in the township of Gosford. Along with her three brothers, Best attended Central Coast Grammar School where she won a performance award at the age of eight. From there she moved with her family to Beauty Point, attending SCECGS Redlands for six months until enrolling at Brent Street Performing Arts High School where she studied all aspects of performing arts. Best made her television debut in 2007 in Home and Away, starring as Annie Campbell until 2010. She continued her education on-set, eventually completing her HSC in 2011 at Oxford Falls Grammar School where she won the music award. Three months into a full-time Global Studies course at the University of Technology, Sydney, Best accepted the role of Cheryl Haynes in Puberty Blues. From a young age, Best has appeared regularly as a fashion model in such magazines as Barbie, Total Girl, Oyster and Cosmopolitan. She was the face of Miss Metallicus Clothing brand and appeared on Comedy Inc, and has modelled for Supre. She has been an ambassador for the charities Cure Our Kids and World Vision. Career Her most notable role was as Annie Campbell in the long running TV series Home and Away between 2007 and 2010. Her character went on a student exchange to Japan, commencing October 2009, which was originally scheduled to be for 6 months. She returned on screen in March 2010, on a 6-week holiday break from Japan, before leaving again. Best earned a nomination for Most Popular New Female Talent at the Logie Awards of 2008, which was won by Bindi Irwin. In March 2012, it was announced, that Best had been cast as Cheryl Hayes in Network Ten's drama series Puberty Blues, which is based on the 1979 novel of the same name by Gabrielle Carey and Kathy Lette. In 2018 she starred in the Australian web television series Tidelands as Cal McTeer, the lead role. It was released on 14 December 2018 on Netflix. Filmography References External links Category:1994 births Category:Living people Category:Actresses from Sydney Category:Australian child actresses Category:Australian female models Category:Australian television actresses
{ "pile_set_name": "Wikipedia (en)" }
[Experimental study of Qiyeling Decoction inducing apoptosis of transplanted human lung adenocarcinoma cells A549 in nude mice]. To study the function of Qiyeling Decoction in inducing apoptosis of transplanted human lung adenocarcinoma cells A549 in nude mice. Nude mice with transplanted A549 tumor were randomly divided into the untreated control group (group A), chemotherapy treated group (group B), chemotherapy plus Qiyeling Decoction treated group (group C), Qiyeling Decoction treated group (group D) and managed correspondingly. The tumor volume was measured and calculated into tumor weight. The apoptosis of tumor cells were examined using in situ cell apoptosis detection kit. The tumor weight was lower obviously in groups B, C and D than that in group A (P<0.05). The apoptosis of tumor cells was lower obviously in groups B, and C than that in group D (P<0.05). Cells in group A appeared perfect differentiation during the early stage and apoptosis later. Qiyeling Decoction can induce A549 cell apoptosis in nude mice.
{ "pile_set_name": "PubMed Abstracts" }
Q: How to generate square thumbnail of an image? I want to create thumbnails of size 75x75 square from originals. The thumbnail will not look stretched in one dimension as it will not follow the aspect ratio. If have used Flickr, you will see they generate square thumbnails. I need the same thing. Any clue or help is appreciated. EDIT: I am on .NET 4.0 C# I am looking for programmatic way to generate thumbs. Batch capability needed if no dll available. A: This is from Codeproject: static System.Drawing.Image FixedSize(System.Drawing.Image imgPhoto, int Width, int Height) { int sourceWidth = imgPhoto.Width; int sourceHeight = imgPhoto.Height; int sourceX = 0; int sourceY = 0; int destX = 0; int destY = 0; float nPercent = 0; float nPercentW = 0; float nPercentH = 0; nPercentW = ((float)Width / (float)sourceWidth); nPercentH = ((float)Height / (float)sourceHeight); if (nPercentH < nPercentW) { nPercent = nPercentH; destX = System.Convert.ToInt16((Width - (sourceWidth * nPercent)) / 2); } else { nPercent = nPercentW; destY = System.Convert.ToInt16((Height - (sourceHeight * nPercent)) / 2); } int destWidth = (int)(sourceWidth * nPercent); int destHeight = (int)(sourceHeight * nPercent); Bitmap bmPhoto = new Bitmap(Width, Height, PixelFormat.Format24bppRgb); bmPhoto.SetResolution(imgPhoto.HorizontalResolution, imgPhoto.VerticalResolution); Graphics grPhoto = Graphics.FromImage(bmPhoto); grPhoto.Clear(Color.White); grPhoto.InterpolationMode = System.Drawing.Drawing2D.InterpolationMode.HighQualityBicubic; grPhoto.DrawImage(imgPhoto, new Rectangle(destX, destY, destWidth, destHeight), new Rectangle(sourceX, sourceY, sourceWidth, sourceHeight), GraphicsUnit.Pixel); grPhoto.Dispose(); return bmPhoto; }
{ "pile_set_name": "StackExchange" }
Illini finish third at Drake Relays The Illinois men’s track and field team finished third overall in the 2018 HyVee Cup competition at the 109th Drake Relays. The Illini scored six points in three relay events, while senior David Kendziera led the team out of relay competition with a victory in the 400-meter hurdles. Scoring 18 points overall, Illinois tied with Ohio State for third. Iowa won the HyVee Cup with 32 points and Iowa State finished runner-up with 28 points. “I thought they handled the pressure of this meet really well,” said head coach Mike Turk. “One of the things that I was really pleased about was that when things didn’t immediately go our way, we ended up gathering to fight to the end today, and I was really pleased with that.” The Illini also placed third in the sprint medley relay with a time of 3:22.54. Devin Quinn and Jason Shannon ran the 200-meter legs, followed by Kenneth Allen running the 400-meter leg. Konrad Eiring anchored the final 800-meter leg. Outside of the relay competition, Kendziera’s 400-meter hurdle was the fastest intermediate hurdle race ran in ten years. Timing 49.94 seconds, Kendziera took the victory and finished over half a second faster than Chris Douglass of Iowa (50.52). It is the fastest time in the event at the Drake Relays since Justin Gamon timed 49.26 back in 2008, and it’s the third time Kendziera finished the 400-meter hurdle in under 50 seconds this season. Throughout the weekend, the men’s 4×400-meter relay team set two back-to-back season-best times, finishing with a time of 3:09 on Friday and lowering it further to 3:07.64 to finish third in the final event on Saturday. Kendziera anchored for the team, running 46.50. The 4×400 had surprise performances from another pair of seniors, jumper Parker Deloye and Kenneth Allen, who was returning to the lineup after recovering from injury. “Kenneth Allen was a big addition coming back into the lineup,” Turk said. “Even though he’s not 100 percent, he’s a really experienced veteran for us and he’s been through all this stuff. To have him out there, he definitely brings a presence that instills confidence in the rest of the guys. Parker Deloye also stepped in and filled a hole in the 4×400 in the finals, and he amazed me with how well he ran. He just went out there and competed his best. He got an opportunity and made the most of it.” After also qualifying for finals on Saturday, senior Mo Maat was substituted into the anchor leg of the 4×100. The unit of freshman Jason Shannon, senior Cole Henderson, junior Joe Haight and Maat kept up with Purdue and Ohio State into the final straightaway, although Ohio’s Zach Bazille finished just ahead of Purdue’s Waseem Williams and Maat. Their time of 39.89 is their third-best mark this season. “I think that we’ve just got a really good group of sprinters. Of course, Devin is really good and often provides us with an anchor, but today we made a switch with Mo Maat, and given that, we ran extremely well against the top teams in the Big Ten,” Turk said. “Ohio State is one of the top teams in the country in the 4×100, and those teams have run faster than us so far this year, and given our big lineup change, we were right there with them.”
{ "pile_set_name": "Pile-CC" }
(To access the full article, please see PDF)
{ "pile_set_name": "PubMed Central" }
Numata (disambiguation) Numata is a city in Gunma Prefecture, Japan. Numata may also refer to: Places Numata, Hokkaido, a town in Sorachi Subprefecture, Hokkaido, Japan Numata Domain, a former domain of Japan Numata Castle, a castle in Numata, Gunma Numata Station, a railway station in Numata, Gunma Other uses Numata (surname), a Japanese surname Numata (moth), a moth genus
{ "pile_set_name": "Wikipedia (en)" }
/*--------------------------------*- C++ -*----------------------------------*\ ========= | \\ / F ield | OpenFOAM: The Open Source CFD Toolbox \\ / O peration | Website: https://openfoam.org \\ / A nd | Version: dev \\/ M anipulation | \*---------------------------------------------------------------------------*/ FoamFile { version 2.0; format ascii; class dictionary; object blockMeshDict; } // * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * // convertToMeters 0.01; vertices ( (-0.5 -5 -0.5) ( 0.5 -5 -0.5) ( 0.5 5 -0.5) (-0.5 5 -0.5) (-0.5 -5 0.5) ( 0.5 -5 0.5) ( 0.5 5 0.5) (-0.5 5 0.5) ); blocks ( hex (0 1 2 3 4 5 6 7) (5 50 5) simpleGrading (1 1 1) ); edges ( ); boundary ( walls { type wall; faces ( (3 7 6 2) (0 4 7 3) (2 6 5 1) (1 5 4 0) (0 3 2 1) (4 5 6 7) ); } ); // ************************************************************************* //
{ "pile_set_name": "Github" }
// Copyright 2015 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. /* Package trace implements tracing of requests and long-lived objects. It exports HTTP interfaces on /debug/requests and /debug/events. A trace.Trace provides tracing for short-lived objects, usually requests. A request handler might be implemented like this: func fooHandler(w http.ResponseWriter, req *http.Request) { tr := trace.New("mypkg.Foo", req.URL.Path) defer tr.Finish() ... tr.LazyPrintf("some event %q happened", str) ... if err := somethingImportant(); err != nil { tr.LazyPrintf("somethingImportant failed: %v", err) tr.SetError() } } The /debug/requests HTTP endpoint organizes the traces by family, errors, and duration. It also provides histogram of request duration for each family. A trace.EventLog provides tracing for long-lived objects, such as RPC connections. // A Fetcher fetches URL paths for a single domain. type Fetcher struct { domain string events trace.EventLog } func NewFetcher(domain string) *Fetcher { return &Fetcher{ domain, trace.NewEventLog("mypkg.Fetcher", domain), } } func (f *Fetcher) Fetch(path string) (string, error) { resp, err := http.Get("http://" + f.domain + "/" + path) if err != nil { f.events.Errorf("Get(%q) = %v", path, err) return "", err } f.events.Printf("Get(%q) = %s", path, resp.Status) ... } func (f *Fetcher) Close() error { f.events.Finish() return nil } The /debug/events HTTP endpoint organizes the event logs by family and by time since the last error. The expanded view displays recent log entries and the log's call stack. */ package trace // import "golang.org/x/net/trace" import ( "bytes" "context" "fmt" "html/template" "io" "log" "net" "net/http" "net/url" "runtime" "sort" "strconv" "sync" "sync/atomic" "time" "golang.org/x/net/internal/timeseries" ) // DebugUseAfterFinish controls whether to debug uses of Trace values after finishing. // FOR DEBUGGING ONLY. This will slow down the program. var DebugUseAfterFinish = false // HTTP ServeMux paths. const ( debugRequestsPath = "/debug/requests" debugEventsPath = "/debug/events" ) // AuthRequest determines whether a specific request is permitted to load the // /debug/requests or /debug/events pages. // // It returns two bools; the first indicates whether the page may be viewed at all, // and the second indicates whether sensitive events will be shown. // // AuthRequest may be replaced by a program to customize its authorization requirements. // // The default AuthRequest function returns (true, true) if and only if the request // comes from localhost/127.0.0.1/[::1]. var AuthRequest = func(req *http.Request) (any, sensitive bool) { // RemoteAddr is commonly in the form "IP" or "IP:port". // If it is in the form "IP:port", split off the port. host, _, err := net.SplitHostPort(req.RemoteAddr) if err != nil { host = req.RemoteAddr } switch host { case "localhost", "127.0.0.1", "::1": return true, true default: return false, false } } func init() { _, pat := http.DefaultServeMux.Handler(&http.Request{URL: &url.URL{Path: debugRequestsPath}}) if pat == debugRequestsPath { panic("/debug/requests is already registered. You may have two independent copies of " + "golang.org/x/net/trace in your binary, trying to maintain separate state. This may " + "involve a vendored copy of golang.org/x/net/trace.") } // TODO(jbd): Serve Traces from /debug/traces in the future? // There is no requirement for a request to be present to have traces. http.HandleFunc(debugRequestsPath, Traces) http.HandleFunc(debugEventsPath, Events) } // NewContext returns a copy of the parent context // and associates it with a Trace. func NewContext(ctx context.Context, tr Trace) context.Context { return context.WithValue(ctx, contextKey, tr) } // FromContext returns the Trace bound to the context, if any. func FromContext(ctx context.Context) (tr Trace, ok bool) { tr, ok = ctx.Value(contextKey).(Trace) return } // Traces responds with traces from the program. // The package initialization registers it in http.DefaultServeMux // at /debug/requests. // // It performs authorization by running AuthRequest. func Traces(w http.ResponseWriter, req *http.Request) { any, sensitive := AuthRequest(req) if !any { http.Error(w, "not allowed", http.StatusUnauthorized) return } w.Header().Set("Content-Type", "text/html; charset=utf-8") Render(w, req, sensitive) } // Events responds with a page of events collected by EventLogs. // The package initialization registers it in http.DefaultServeMux // at /debug/events. // // It performs authorization by running AuthRequest. func Events(w http.ResponseWriter, req *http.Request) { any, sensitive := AuthRequest(req) if !any { http.Error(w, "not allowed", http.StatusUnauthorized) return } w.Header().Set("Content-Type", "text/html; charset=utf-8") RenderEvents(w, req, sensitive) } // Render renders the HTML page typically served at /debug/requests. // It does not do any auth checking. The request may be nil. // // Most users will use the Traces handler. func Render(w io.Writer, req *http.Request, sensitive bool) { data := &struct { Families []string ActiveTraceCount map[string]int CompletedTraces map[string]*family // Set when a bucket has been selected. Traces traceList Family string Bucket int Expanded bool Traced bool Active bool ShowSensitive bool // whether to show sensitive events Histogram template.HTML HistogramWindow string // e.g. "last minute", "last hour", "all time" // If non-zero, the set of traces is a partial set, // and this is the total number. Total int }{ CompletedTraces: completedTraces, } data.ShowSensitive = sensitive if req != nil { // Allow show_sensitive=0 to force hiding of sensitive data for testing. // This only goes one way; you can't use show_sensitive=1 to see things. if req.FormValue("show_sensitive") == "0" { data.ShowSensitive = false } if exp, err := strconv.ParseBool(req.FormValue("exp")); err == nil { data.Expanded = exp } if exp, err := strconv.ParseBool(req.FormValue("rtraced")); err == nil { data.Traced = exp } } completedMu.RLock() data.Families = make([]string, 0, len(completedTraces)) for fam := range completedTraces { data.Families = append(data.Families, fam) } completedMu.RUnlock() sort.Strings(data.Families) // We are careful here to minimize the time spent locking activeMu, // since that lock is required every time an RPC starts and finishes. data.ActiveTraceCount = make(map[string]int, len(data.Families)) activeMu.RLock() for fam, s := range activeTraces { data.ActiveTraceCount[fam] = s.Len() } activeMu.RUnlock() var ok bool data.Family, data.Bucket, ok = parseArgs(req) switch { case !ok: // No-op case data.Bucket == -1: data.Active = true n := data.ActiveTraceCount[data.Family] data.Traces = getActiveTraces(data.Family) if len(data.Traces) < n { data.Total = n } case data.Bucket < bucketsPerFamily: if b := lookupBucket(data.Family, data.Bucket); b != nil { data.Traces = b.Copy(data.Traced) } default: if f := getFamily(data.Family, false); f != nil { var obs timeseries.Observable f.LatencyMu.RLock() switch o := data.Bucket - bucketsPerFamily; o { case 0: obs = f.Latency.Minute() data.HistogramWindow = "last minute" case 1: obs = f.Latency.Hour() data.HistogramWindow = "last hour" case 2: obs = f.Latency.Total() data.HistogramWindow = "all time" } f.LatencyMu.RUnlock() if obs != nil { data.Histogram = obs.(*histogram).html() } } } if data.Traces != nil { defer data.Traces.Free() sort.Sort(data.Traces) } completedMu.RLock() defer completedMu.RUnlock() if err := pageTmpl().ExecuteTemplate(w, "Page", data); err != nil { log.Printf("net/trace: Failed executing template: %v", err) } } func parseArgs(req *http.Request) (fam string, b int, ok bool) { if req == nil { return "", 0, false } fam, bStr := req.FormValue("fam"), req.FormValue("b") if fam == "" || bStr == "" { return "", 0, false } b, err := strconv.Atoi(bStr) if err != nil || b < -1 { return "", 0, false } return fam, b, true } func lookupBucket(fam string, b int) *traceBucket { f := getFamily(fam, false) if f == nil || b < 0 || b >= len(f.Buckets) { return nil } return f.Buckets[b] } type contextKeyT string var contextKey = contextKeyT("golang.org/x/net/trace.Trace") // Trace represents an active request. type Trace interface { // LazyLog adds x to the event log. It will be evaluated each time the // /debug/requests page is rendered. Any memory referenced by x will be // pinned until the trace is finished and later discarded. LazyLog(x fmt.Stringer, sensitive bool) // LazyPrintf evaluates its arguments with fmt.Sprintf each time the // /debug/requests page is rendered. Any memory referenced by a will be // pinned until the trace is finished and later discarded. LazyPrintf(format string, a ...interface{}) // SetError declares that this trace resulted in an error. SetError() // SetRecycler sets a recycler for the trace. // f will be called for each event passed to LazyLog at a time when // it is no longer required, whether while the trace is still active // and the event is discarded, or when a completed trace is discarded. SetRecycler(f func(interface{})) // SetTraceInfo sets the trace info for the trace. // This is currently unused. SetTraceInfo(traceID, spanID uint64) // SetMaxEvents sets the maximum number of events that will be stored // in the trace. This has no effect if any events have already been // added to the trace. SetMaxEvents(m int) // Finish declares that this trace is complete. // The trace should not be used after calling this method. Finish() } type lazySprintf struct { format string a []interface{} } func (l *lazySprintf) String() string { return fmt.Sprintf(l.format, l.a...) } // New returns a new Trace with the specified family and title. func New(family, title string) Trace { tr := newTrace() tr.ref() tr.Family, tr.Title = family, title tr.Start = time.Now() tr.maxEvents = maxEventsPerTrace tr.events = tr.eventsBuf[:0] activeMu.RLock() s := activeTraces[tr.Family] activeMu.RUnlock() if s == nil { activeMu.Lock() s = activeTraces[tr.Family] // check again if s == nil { s = new(traceSet) activeTraces[tr.Family] = s } activeMu.Unlock() } s.Add(tr) // Trigger allocation of the completed trace structure for this family. // This will cause the family to be present in the request page during // the first trace of this family. We don't care about the return value, // nor is there any need for this to run inline, so we execute it in its // own goroutine, but only if the family isn't allocated yet. completedMu.RLock() if _, ok := completedTraces[tr.Family]; !ok { go allocFamily(tr.Family) } completedMu.RUnlock() return tr } func (tr *trace) Finish() { elapsed := time.Now().Sub(tr.Start) tr.mu.Lock() tr.Elapsed = elapsed tr.mu.Unlock() if DebugUseAfterFinish { buf := make([]byte, 4<<10) // 4 KB should be enough n := runtime.Stack(buf, false) tr.finishStack = buf[:n] } activeMu.RLock() m := activeTraces[tr.Family] activeMu.RUnlock() m.Remove(tr) f := getFamily(tr.Family, true) tr.mu.RLock() // protects tr fields in Cond.match calls for _, b := range f.Buckets { if b.Cond.match(tr) { b.Add(tr) } } tr.mu.RUnlock() // Add a sample of elapsed time as microseconds to the family's timeseries h := new(histogram) h.addMeasurement(elapsed.Nanoseconds() / 1e3) f.LatencyMu.Lock() f.Latency.Add(h) f.LatencyMu.Unlock() tr.unref() // matches ref in New } const ( bucketsPerFamily = 9 tracesPerBucket = 10 maxActiveTraces = 20 // Maximum number of active traces to show. maxEventsPerTrace = 10 numHistogramBuckets = 38 ) var ( // The active traces. activeMu sync.RWMutex activeTraces = make(map[string]*traceSet) // family -> traces // Families of completed traces. completedMu sync.RWMutex completedTraces = make(map[string]*family) // family -> traces ) type traceSet struct { mu sync.RWMutex m map[*trace]bool // We could avoid the entire map scan in FirstN by having a slice of all the traces // ordered by start time, and an index into that from the trace struct, with a periodic // repack of the slice after enough traces finish; we could also use a skip list or similar. // However, that would shift some of the expense from /debug/requests time to RPC time, // which is probably the wrong trade-off. } func (ts *traceSet) Len() int { ts.mu.RLock() defer ts.mu.RUnlock() return len(ts.m) } func (ts *traceSet) Add(tr *trace) { ts.mu.Lock() if ts.m == nil { ts.m = make(map[*trace]bool) } ts.m[tr] = true ts.mu.Unlock() } func (ts *traceSet) Remove(tr *trace) { ts.mu.Lock() delete(ts.m, tr) ts.mu.Unlock() } // FirstN returns the first n traces ordered by time. func (ts *traceSet) FirstN(n int) traceList { ts.mu.RLock() defer ts.mu.RUnlock() if n > len(ts.m) { n = len(ts.m) } trl := make(traceList, 0, n) // Fast path for when no selectivity is needed. if n == len(ts.m) { for tr := range ts.m { tr.ref() trl = append(trl, tr) } sort.Sort(trl) return trl } // Pick the oldest n traces. // This is inefficient. See the comment in the traceSet struct. for tr := range ts.m { // Put the first n traces into trl in the order they occur. // When we have n, sort trl, and thereafter maintain its order. if len(trl) < n { tr.ref() trl = append(trl, tr) if len(trl) == n { // This is guaranteed to happen exactly once during this loop. sort.Sort(trl) } continue } if tr.Start.After(trl[n-1].Start) { continue } // Find where to insert this one. tr.ref() i := sort.Search(n, func(i int) bool { return trl[i].Start.After(tr.Start) }) trl[n-1].unref() copy(trl[i+1:], trl[i:]) trl[i] = tr } return trl } func getActiveTraces(fam string) traceList { activeMu.RLock() s := activeTraces[fam] activeMu.RUnlock() if s == nil { return nil } return s.FirstN(maxActiveTraces) } func getFamily(fam string, allocNew bool) *family { completedMu.RLock() f := completedTraces[fam] completedMu.RUnlock() if f == nil && allocNew { f = allocFamily(fam) } return f } func allocFamily(fam string) *family { completedMu.Lock() defer completedMu.Unlock() f := completedTraces[fam] if f == nil { f = newFamily() completedTraces[fam] = f } return f } // family represents a set of trace buckets and associated latency information. type family struct { // traces may occur in multiple buckets. Buckets [bucketsPerFamily]*traceBucket // latency time series LatencyMu sync.RWMutex Latency *timeseries.MinuteHourSeries } func newFamily() *family { return &family{ Buckets: [bucketsPerFamily]*traceBucket{ {Cond: minCond(0)}, {Cond: minCond(50 * time.Millisecond)}, {Cond: minCond(100 * time.Millisecond)}, {Cond: minCond(200 * time.Millisecond)}, {Cond: minCond(500 * time.Millisecond)}, {Cond: minCond(1 * time.Second)}, {Cond: minCond(10 * time.Second)}, {Cond: minCond(100 * time.Second)}, {Cond: errorCond{}}, }, Latency: timeseries.NewMinuteHourSeries(func() timeseries.Observable { return new(histogram) }), } } // traceBucket represents a size-capped bucket of historic traces, // along with a condition for a trace to belong to the bucket. type traceBucket struct { Cond cond // Ring buffer implementation of a fixed-size FIFO queue. mu sync.RWMutex buf [tracesPerBucket]*trace start int // < tracesPerBucket length int // <= tracesPerBucket } func (b *traceBucket) Add(tr *trace) { b.mu.Lock() defer b.mu.Unlock() i := b.start + b.length if i >= tracesPerBucket { i -= tracesPerBucket } if b.length == tracesPerBucket { // "Remove" an element from the bucket. b.buf[i].unref() b.start++ if b.start == tracesPerBucket { b.start = 0 } } b.buf[i] = tr if b.length < tracesPerBucket { b.length++ } tr.ref() } // Copy returns a copy of the traces in the bucket. // If tracedOnly is true, only the traces with trace information will be returned. // The logs will be ref'd before returning; the caller should call // the Free method when it is done with them. // TODO(dsymonds): keep track of traced requests in separate buckets. func (b *traceBucket) Copy(tracedOnly bool) traceList { b.mu.RLock() defer b.mu.RUnlock() trl := make(traceList, 0, b.length) for i, x := 0, b.start; i < b.length; i++ { tr := b.buf[x] if !tracedOnly || tr.spanID != 0 { tr.ref() trl = append(trl, tr) } x++ if x == b.length { x = 0 } } return trl } func (b *traceBucket) Empty() bool { b.mu.RLock() defer b.mu.RUnlock() return b.length == 0 } // cond represents a condition on a trace. type cond interface { match(t *trace) bool String() string } type minCond time.Duration func (m minCond) match(t *trace) bool { return t.Elapsed >= time.Duration(m) } func (m minCond) String() string { return fmt.Sprintf("≥%gs", time.Duration(m).Seconds()) } type errorCond struct{} func (e errorCond) match(t *trace) bool { return t.IsError } func (e errorCond) String() string { return "errors" } type traceList []*trace // Free calls unref on each element of the list. func (trl traceList) Free() { for _, t := range trl { t.unref() } } // traceList may be sorted in reverse chronological order. func (trl traceList) Len() int { return len(trl) } func (trl traceList) Less(i, j int) bool { return trl[i].Start.After(trl[j].Start) } func (trl traceList) Swap(i, j int) { trl[i], trl[j] = trl[j], trl[i] } // An event is a timestamped log entry in a trace. type event struct { When time.Time Elapsed time.Duration // since previous event in trace NewDay bool // whether this event is on a different day to the previous event Recyclable bool // whether this event was passed via LazyLog Sensitive bool // whether this event contains sensitive information What interface{} // string or fmt.Stringer } // WhenString returns a string representation of the elapsed time of the event. // It will include the date if midnight was crossed. func (e event) WhenString() string { if e.NewDay { return e.When.Format("2006/01/02 15:04:05.000000") } return e.When.Format("15:04:05.000000") } // discarded represents a number of discarded events. // It is stored as *discarded to make it easier to update in-place. type discarded int func (d *discarded) String() string { return fmt.Sprintf("(%d events discarded)", int(*d)) } // trace represents an active or complete request, // either sent or received by this program. type trace struct { // Family is the top-level grouping of traces to which this belongs. Family string // Title is the title of this trace. Title string // Start time of the this trace. Start time.Time mu sync.RWMutex events []event // Append-only sequence of events (modulo discards). maxEvents int recycler func(interface{}) IsError bool // Whether this trace resulted in an error. Elapsed time.Duration // Elapsed time for this trace, zero while active. traceID uint64 // Trace information if non-zero. spanID uint64 refs int32 // how many buckets this is in disc discarded // scratch space to avoid allocation finishStack []byte // where finish was called, if DebugUseAfterFinish is set eventsBuf [4]event // preallocated buffer in case we only log a few events } func (tr *trace) reset() { // Clear all but the mutex. Mutexes may not be copied, even when unlocked. tr.Family = "" tr.Title = "" tr.Start = time.Time{} tr.mu.Lock() tr.Elapsed = 0 tr.traceID = 0 tr.spanID = 0 tr.IsError = false tr.maxEvents = 0 tr.events = nil tr.recycler = nil tr.mu.Unlock() tr.refs = 0 tr.disc = 0 tr.finishStack = nil for i := range tr.eventsBuf { tr.eventsBuf[i] = event{} } } // delta returns the elapsed time since the last event or the trace start, // and whether it spans midnight. // L >= tr.mu func (tr *trace) delta(t time.Time) (time.Duration, bool) { if len(tr.events) == 0 { return t.Sub(tr.Start), false } prev := tr.events[len(tr.events)-1].When return t.Sub(prev), prev.Day() != t.Day() } func (tr *trace) addEvent(x interface{}, recyclable, sensitive bool) { if DebugUseAfterFinish && tr.finishStack != nil { buf := make([]byte, 4<<10) // 4 KB should be enough n := runtime.Stack(buf, false) log.Printf("net/trace: trace used after finish:\nFinished at:\n%s\nUsed at:\n%s", tr.finishStack, buf[:n]) } /* NOTE TO DEBUGGERS If you are here because your program panicked in this code, it is almost definitely the fault of code using this package, and very unlikely to be the fault of this code. The most likely scenario is that some code elsewhere is using a trace.Trace after its Finish method is called. You can temporarily set the DebugUseAfterFinish var to help discover where that is; do not leave that var set, since it makes this package much less efficient. */ e := event{When: time.Now(), What: x, Recyclable: recyclable, Sensitive: sensitive} tr.mu.Lock() e.Elapsed, e.NewDay = tr.delta(e.When) if len(tr.events) < tr.maxEvents { tr.events = append(tr.events, e) } else { // Discard the middle events. di := int((tr.maxEvents - 1) / 2) if d, ok := tr.events[di].What.(*discarded); ok { (*d)++ } else { // disc starts at two to count for the event it is replacing, // plus the next one that we are about to drop. tr.disc = 2 if tr.recycler != nil && tr.events[di].Recyclable { go tr.recycler(tr.events[di].What) } tr.events[di].What = &tr.disc } // The timestamp of the discarded meta-event should be // the time of the last event it is representing. tr.events[di].When = tr.events[di+1].When if tr.recycler != nil && tr.events[di+1].Recyclable { go tr.recycler(tr.events[di+1].What) } copy(tr.events[di+1:], tr.events[di+2:]) tr.events[tr.maxEvents-1] = e } tr.mu.Unlock() } func (tr *trace) LazyLog(x fmt.Stringer, sensitive bool) { tr.addEvent(x, true, sensitive) } func (tr *trace) LazyPrintf(format string, a ...interface{}) { tr.addEvent(&lazySprintf{format, a}, false, false) } func (tr *trace) SetError() { tr.mu.Lock() tr.IsError = true tr.mu.Unlock() } func (tr *trace) SetRecycler(f func(interface{})) { tr.mu.Lock() tr.recycler = f tr.mu.Unlock() } func (tr *trace) SetTraceInfo(traceID, spanID uint64) { tr.mu.Lock() tr.traceID, tr.spanID = traceID, spanID tr.mu.Unlock() } func (tr *trace) SetMaxEvents(m int) { tr.mu.Lock() // Always keep at least three events: first, discarded count, last. if len(tr.events) == 0 && m > 3 { tr.maxEvents = m } tr.mu.Unlock() } func (tr *trace) ref() { atomic.AddInt32(&tr.refs, 1) } func (tr *trace) unref() { if atomic.AddInt32(&tr.refs, -1) == 0 { tr.mu.RLock() if tr.recycler != nil { // freeTrace clears tr, so we hold tr.recycler and tr.events here. go func(f func(interface{}), es []event) { for _, e := range es { if e.Recyclable { f(e.What) } } }(tr.recycler, tr.events) } tr.mu.RUnlock() freeTrace(tr) } } func (tr *trace) When() string { return tr.Start.Format("2006/01/02 15:04:05.000000") } func (tr *trace) ElapsedTime() string { tr.mu.RLock() t := tr.Elapsed tr.mu.RUnlock() if t == 0 { // Active trace. t = time.Since(tr.Start) } return fmt.Sprintf("%.6f", t.Seconds()) } func (tr *trace) Events() []event { tr.mu.RLock() defer tr.mu.RUnlock() return tr.events } var traceFreeList = make(chan *trace, 1000) // TODO(dsymonds): Use sync.Pool? // newTrace returns a trace ready to use. func newTrace() *trace { select { case tr := <-traceFreeList: return tr default: return new(trace) } } // freeTrace adds tr to traceFreeList if there's room. // This is non-blocking. func freeTrace(tr *trace) { if DebugUseAfterFinish { return // never reuse } tr.reset() select { case traceFreeList <- tr: default: } } func elapsed(d time.Duration) string { b := []byte(fmt.Sprintf("%.6f", d.Seconds())) // For subsecond durations, blank all zeros before decimal point, // and all zeros between the decimal point and the first non-zero digit. if d < time.Second { dot := bytes.IndexByte(b, '.') for i := 0; i < dot; i++ { b[i] = ' ' } for i := dot + 1; i < len(b); i++ { if b[i] == '0' { b[i] = ' ' } else { break } } } return string(b) } var pageTmplCache *template.Template var pageTmplOnce sync.Once func pageTmpl() *template.Template { pageTmplOnce.Do(func() { pageTmplCache = template.Must(template.New("Page").Funcs(template.FuncMap{ "elapsed": elapsed, "add": func(a, b int) int { return a + b }, }).Parse(pageHTML)) }) return pageTmplCache } const pageHTML = ` {{template "Prolog" .}} {{template "StatusTable" .}} {{template "Epilog" .}} {{define "Prolog"}} <html> <head> <title>/debug/requests</title> <style type="text/css"> body { font-family: sans-serif; } table#tr-status td.family { padding-right: 2em; } table#tr-status td.active { padding-right: 1em; } table#tr-status td.latency-first { padding-left: 1em; } table#tr-status td.empty { color: #aaa; } table#reqs { margin-top: 1em; } table#reqs tr.first { {{if $.Expanded}}font-weight: bold;{{end}} } table#reqs td { font-family: monospace; } table#reqs td.when { text-align: right; white-space: nowrap; } table#reqs td.elapsed { padding: 0 0.5em; text-align: right; white-space: pre; width: 10em; } address { font-size: smaller; margin-top: 5em; } </style> </head> <body> <h1>/debug/requests</h1> {{end}} {{/* end of Prolog */}} {{define "StatusTable"}} <table id="tr-status"> {{range $fam := .Families}} <tr> <td class="family">{{$fam}}</td> {{$n := index $.ActiveTraceCount $fam}} <td class="active {{if not $n}}empty{{end}}"> {{if $n}}<a href="?fam={{$fam}}&b=-1{{if $.Expanded}}&exp=1{{end}}">{{end}} [{{$n}} active] {{if $n}}</a>{{end}} </td> {{$f := index $.CompletedTraces $fam}} {{range $i, $b := $f.Buckets}} {{$empty := $b.Empty}} <td {{if $empty}}class="empty"{{end}}> {{if not $empty}}<a href="?fam={{$fam}}&b={{$i}}{{if $.Expanded}}&exp=1{{end}}">{{end}} [{{.Cond}}] {{if not $empty}}</a>{{end}} </td> {{end}} {{$nb := len $f.Buckets}} <td class="latency-first"> <a href="?fam={{$fam}}&b={{$nb}}">[minute]</a> </td> <td> <a href="?fam={{$fam}}&b={{add $nb 1}}">[hour]</a> </td> <td> <a href="?fam={{$fam}}&b={{add $nb 2}}">[total]</a> </td> </tr> {{end}} </table> {{end}} {{/* end of StatusTable */}} {{define "Epilog"}} {{if $.Traces}} <hr /> <h3>Family: {{$.Family}}</h3> {{if or $.Expanded $.Traced}} <a href="?fam={{$.Family}}&b={{$.Bucket}}">[Normal/Summary]</a> {{else}} [Normal/Summary] {{end}} {{if or (not $.Expanded) $.Traced}} <a href="?fam={{$.Family}}&b={{$.Bucket}}&exp=1">[Normal/Expanded]</a> {{else}} [Normal/Expanded] {{end}} {{if not $.Active}} {{if or $.Expanded (not $.Traced)}} <a href="?fam={{$.Family}}&b={{$.Bucket}}&rtraced=1">[Traced/Summary]</a> {{else}} [Traced/Summary] {{end}} {{if or (not $.Expanded) (not $.Traced)}} <a href="?fam={{$.Family}}&b={{$.Bucket}}&exp=1&rtraced=1">[Traced/Expanded]</a> {{else}} [Traced/Expanded] {{end}} {{end}} {{if $.Total}} <p><em>Showing <b>{{len $.Traces}}</b> of <b>{{$.Total}}</b> traces.</em></p> {{end}} <table id="reqs"> <caption> {{if $.Active}}Active{{else}}Completed{{end}} Requests </caption> <tr><th>When</th><th>Elapsed&nbsp;(s)</th></tr> {{range $tr := $.Traces}} <tr class="first"> <td class="when">{{$tr.When}}</td> <td class="elapsed">{{$tr.ElapsedTime}}</td> <td>{{$tr.Title}}</td> {{/* TODO: include traceID/spanID */}} </tr> {{if $.Expanded}} {{range $tr.Events}} <tr> <td class="when">{{.WhenString}}</td> <td class="elapsed">{{elapsed .Elapsed}}</td> <td>{{if or $.ShowSensitive (not .Sensitive)}}... {{.What}}{{else}}<em>[redacted]</em>{{end}}</td> </tr> {{end}} {{end}} {{end}} </table> {{end}} {{/* if $.Traces */}} {{if $.Histogram}} <h4>Latency (&micro;s) of {{$.Family}} over {{$.HistogramWindow}}</h4> {{$.Histogram}} {{end}} {{/* if $.Histogram */}} </body> </html> {{end}} {{/* end of Epilog */}} `
{ "pile_set_name": "Github" }
A prospective randomized comparison of 270 degrees fusions to 360 degrees fusions (circumferential fusions). Prospective randomized comparison of anterior lumbar interbody fusion (ALIF) plus transpedicular instrumentation plus posterolateral fusion (PLF) (360 degrees fusion) to ALIF plus transpedicular instrumentation without PLF (270 degrees fusion). To compare the clinical outcomes, costs, and utilization of health resources of 360 degrees versus 270 degrees fusions. The 360 degrees fusion is effective, but its costs and utilization of health resources are high. The PLF often resorbs and may not be necessary. Before and after surgery pain was measured by the Numerical Rating Scale (NRS), and function was measured by the Oswestry Low Back Disability Index (OSI). Costs were calculated by billing records. Operating times, blood loss, and hospital stays were measured at the time of hospital discharge. There were 48 patients: 21 women and 27 men. Mean age was 42 years. Follow-up averaged 35 months (range 24-45 months). In both 360 degrees and 270 degrees fusions, there were significant improvements in NRS and OSI, and the percentage of solid ALIF was high. Only 14% of PLF appeared solid bilaterally and 18% appeared solid on one side only. There were no significant differences in changes in NRS, changes in OSI, or percentage solid ALIF between the 360 degrees and 270 degrees fusions. However, the 270 degrees fusion group had significantly less blood loss, shorter operative times, shorter hospital stays, and lower professional fees, and although hospital charges were lower, this difference was not significant. Both the 360 degrees and 270 degrees fusions significantly reduce pain and improve function, and there are no significant clinical differences between them. However, there were shorter operating times, less blood loss, lower costs, and less utilization of health care resources associated with the 270 degrees fusions.
{ "pile_set_name": "PubMed Abstracts" }
Radon is a Block P, Group 18, Period 6 element. The electronic configuration is [Xe] 4f14 5d10 6s2 6p6. In its elemental form radon's CAS number is 10043-92-2. The radon atom has a radius of 240.pm and it's Van der Waals radius is 200.pm.
{ "pile_set_name": "Pile-CC" }
Q: What exactly does "import *" import? In Python, what exactly does import * import? Does it import __init__.py found in the containing folder? For example, is it necessary to declare from project.model import __init__, or is from project.model import * sufficient? A: The "advantage" of from xyz import * as opposed to other forms of import is that it imports everything (well, almost... [see (a) below] everything) from the designated module under the current module. This allows using the various objects (variables, classes, methods...) from the imported module without prefixing them with the module's name. For example >>> from math import * >>>pi 3.141592653589793 >>>sin(pi/2) >>>1.0 This practice (of importing * into the current namespace) is however discouraged because it provides the opportunity for namespace collisions (say if you had a variable name pi prior to the import) may be inefficient, if the number of objects imported is big doesn't explicitly document the origin of the variable/method/class (it is nice to have this "self documentation" of the program for future visit into the code) Typically we therefore limit this import * practice to ad-hoc tests and the like. As pointed out by @Denilson-Sá-Maia, some libraries such as (e.g. pygame) have a sub-module where all the most commonly used constants and functions are defined and such sub-modules are effectively designed to be imported with import *. Other than with these special sub-modules, it is otherwise preferable to ...: explicitly import a few objects only >>>from math import pi >>>pi >>>3.141592653589793 >>> sin(pi/2) Traceback (most recent call last): File "<stdin>", line 1, in <module> NameError: name 'sin' is not defined or import the module under its own namespace (or an alias thereof, in particular if this is a long name, and the program references its objects many times) >>>import math >>>math.pi >>>3.141592653589793 etc.. >>>import math as m #bad example math being so short and standard... >>>m.pi >>>3.141592653589793 etc.. See the Python documentation on this topic (a) Specifically, what gets imported with from xyz import * ? if xyz module defines an __all__ variable, it will import all the names defined in this sequence, otherwise it will import all names, except these which start with an underscore. Note Many libraries have sub-modules. For example the standard library urllib includes sub-modules like urllib.request, urllib.errors, urllib.response etc. A common point of confusion is that from urllib import * would import all these sub-modules. That is NOT the case: one needs to explicitly imports these separately with, say, from urllib.request import * etc. This incidentally is not specific to import *, plain import will not import sub-modules either (but of course, the * which is often a shorthand for "everything" may mislead people in thinking that all sub-modules and everything else would be imported). A: It import (into the current namespace) whatever names the module (or package) lists in its __all__ attribute -- missing such an attribute, all names that don't start with _. It's mostly intended as a handy shortcut for use only in interactive interpreter sessions: as other answers suggest, don't use it in a program. My recommendation, per Google's Python style guide, is to only ever import modules, not classes or functions (or other names) from within modules. Strictly following this makes for clarity and precision, and avoids subtle traps that may come when you import "stuff from within a module". Importing a package (or anything from inside it) intrinsically loads and executes the package's __init__.py -- that file defines the body of the package. However, it does not bind the name __init__ in your current namespace (so in this sense it doesn't import that name). A: Yes, it does. It imports everything (that is not a private variable, i.e.: variables whose names start with _ or __), and you should try not to use it according to "Properly importing modules in Python" to avoid polluting the local namespace. It is enough, but generally you should either do import project.model, which already imports __init__.py, per "Understanding python imports", but can get too wordy if you use it too much, or import project.model as pm or import project.model as model to save a few keystrokes later on when you use it. Follow Alex's advice in "What exactly does "import *" import?"
{ "pile_set_name": "StackExchange" }
Display systems are incorporated in, or used by, a plurality of devices, including televisions, computer monitors, laptop computers, personal digital assistants (PDAs), mobile phones and watches. Often, there is a need for these devices to incorporate a more or less static component into the image or images that they project. The static image component may take various forms, including those of: a company logo, a battery status indicator, a signal strength indicator, a recording indicator, or an alarm indicator. Static image components may also take the form of text and/or graphic images. To display such an indicator, a new set of control signals must typically be generated for the display system. Sometimes, this can require a great deal of overhead.
{ "pile_set_name": "USPTO Backgrounds" }
On Sunday, Sergey Ignatovsky will vote in Ukraine’s snap general election, and put his faith in pro-western politicians to lead his country to victory in its war with separatist rebels and their Russian backers. But, like a growing number of his countrymen, the Kiev lawyer is also, as he puts it, “preparing for the very worst”. “We are getting ready to fight an underground war if necessary,” he says. “For years we didn’t see Russia as a potential enemy and were not ready for aggression from our neighbour. Our defence officials and generals were drinking vodka, selling equipment and making money.” “At the start of the conflict in the east, our soldiers – even special forces – lacked training and modern gear and experience. They are learning fast, but Russia has been fighting in Chechnya and elsewhere for 20 years. “So civilians must be ready to resist. Everyone involved should know their role and how to act in a guerrilla war – who to contact, where to go, how to hide, where to get weapons. We need to prepare small groups to act against the enemy, if necessary, across the whole country. And we are starting to train for that now.” Russia’s president, Vladimir Putin, insists his country is not involved in a war in the Donetsk and Luhansk regions that has killed more than 3,600 people and displaced hundreds of thousands. But serving Russian soldiers have been killed and captured fighting in Ukraine, the West has produced satellite images that allegedly show Russian forces crossing the border and firing artillery into the country, and Kiev’s soldiers say it was the Russian army they fought in a major “rebel” counterattack in August. That bloody shift in battlefield momentum forced Kiev to agree a ceasefire deal with the separatists, and convinced many Ukrainians that Putin would do whatever was necessary to ensure the failure of post- revolution, pro-EU Ukraine. Volunteer battalion It also prompted Semyon Semyonchenko, leader of the Ukrainian volunteer battalion Donbas that is fighting in the east, to call on his compatriots to prepare to resist a possible Russian invasion of regions further west, or the incitement by Moscow of insurrection in regions such as Odessa and Kharkiv. Training weekends are now taking place in several cities, with instruction from army veterans now serving with Donbas – which is named after the industrial, mostly Russian-speaking area that includes Donetsk and Luhansk. “We don’t just need people who can shoot,” says Ignatovsky. “We need doctors and engineers and communications and information specialists. Lots of different people are involved already – among my friends there are lawyers, businessmen, IT guys and even insurance guys.” Speaking fluent English between sips of cappuccino in a swish bar in Kiev, Ignatovsky (39) does not come across as a military fantasist or macho “weekend warrior”. “I’m not an idiot, I have a wife and daughter and I don’t want to die. But I will fight if I have to. And my wife supports me and is taking a medical training course.” He says the volunteer spirit, which has spawned dozens of fighting battalions and now would-be partisan cells, was kindled by last winter’s revolution, when protesters sustained a huge protest camp on Kiev’s Independence Square for almost three months – until corrupt, Kremlin- backed president Viktor Yanukovich and his allies fled to Russia. Countless people contributed in different ways to help the opposition movement and the main Maidan camp survive, and Ignatovsky and friends delivered food, firewood, clothes, tents and generators to the protesters – as well as petrol for the Molotov cocktails radicals hurled at riot police. “Now we and others are doing something similar in the conflict zone,” he says. “Our soldiers had terrible equipment: old helmets and flak jackets and not enough of them. So people started to raise money through social networks to buy what our forces need. And it’s better and quicker to do it all ourselves, to avoid official bureaucracy and corruption.” “Like on Maidan, it started chaotically and quickly got more organised. Up to now we have taken everything from food to night-vision goggles, flak jackets and even improvised armoured vans to our soldiers in the east.” The guerrilla tradition goes back centuries in Ukraine, however, and on Maidan it was striking to see Cossack leaders invoked in what protesters saw as a struggle to free the country from the grip of corruption, oligarchs and Russian domination. Alongside the nation’s blue-and-yellow flag, the most common colours on Maidan were the red-and-black flown by generations of nationalists, with many banners invoking the Ukrainian Insurgent Army (UPA) loyal to Stepan Bandera. The UPA sought to carve out an independent state in western Ukraine amid the bloody chaos of the second World War, fighting against both the Nazis and Soviets but also forming occasional alliances of convenience with German units. The insurgent army – which at its peak had tens of thousands of members – massacred and expelled thousands of Poles and is accused of committing atrocities against Jews. Bandera’s guerrillas are lionised in western Ukraine, however, as patriots who battled massively superior Nazi and then Soviet forces and resisted the Red Army and KGB in isolated units, hiding in deep caves and forests, until the 1950s. For decades the Kremlin has portrayed Bandera’s movement as a murderous rabble of Russian-hating fascists, in what many Ukrainians see as a crude but successful attempt to discredit their drive for real independence from Moscow and to obscure Soviet crimes against Ukraine – including massacres and deportations and a man-made 1932-1933 famine that killed several million Ukrainians. Symbols of independence There are neo-Nazi groups in Ukraine, and some dominate certain volunteer battalions, but the vast majority of people who now chant UPA slogans and wave its flags see them and Bandera as symbols of independence and resistance to Russia. “The UPA didn’t go to Moscow to kill anyone. They were just protecting their land from people who came here to enslave them, nothing more. They protected their right to be Ukrainians and to live in an independent state,” says Miroslav Boiko, as a sharp wind tugged at his camouflage jacket. He is a guide to vast cave complexes in western Ukraine, where UPA fighters sheltered, recovered from battle and even practised shooting – bullet scars and fighters’ nicknames and nationalist emblems still mark some cave walls. He says the war in the east has only intensified western Ukrainians’ already powerful association with the UPA, and self- defence units are springing up around the area. “People are training to dig trenches, lay ambushes and survive in different wild nature conditions,” he says. “But if you are preparing for partisan war the information should be secret. So the ones who are really ready for underground activity say: ‘Let [the enemy] come to us and we will show them.’” For Ignatovsky, finishing his cappuccino and preparing to return to his law practice, the UPA is an example and model for Ukraine’s new partisans: “We are trying to base our system on the UPA – this is our country’s history and tradition.” And in Sunday’s election he will vote for a new party that he thinks captures the spirit of the times. “The party wants people to go out and do something – to act,” Ignatovsky says, “and I like its name: Self-Reliance.”
{ "pile_set_name": "OpenWebText2" }
Email Marketing Online Does Not Work? Email marketing online is a variety of marketing that uses electronic mail or email as a variety of advertising together with a way of communicating fund raising messages to a selected audience. This could translate into every single email that is certainly directed out to a potential or current client or customer. Email marketing online is a variety of marketing that uses electronic mail or email as a variety of advertising together with a way of communicating fund raising messages to a selected audience. This could translate into every single email that is certainly directed out to a potential or current client or customer. Nonetheless email marketing online can not function in this broad sense.Email marketing online refers towards emails sent out to present clientele and buyers to promote consumer loyalty and repeated business with the business. The term also refers towards the emails sent out to win more than possible clients and also to convince existing buyers to invest in a distinct item immediately. Advertisements which are delivered as emails also fall under the category of email marketing online. You must note that emails in cases like this may be delivered around the Intranet or Internet. Most companies these days prefer email marketing online to traditional, conventional marketing snail mail. That is so mainly because email marketing online has many benefits. Some strengths include accurate tracking of return of investment, a substantial significant numbers of clients or customers could be called through this approach, everybody checks their emails on the daily, typical basis these days and emails are well-liked with digital marketers as well. Also email marketing online is an inexpensive approach which has a proven successful track record. Nonetheless, like all things, email marketing online has its drawbacks too. One in the disadvantages contain that emails are generally filtered and are some are automatically forwarded to the spam folder and some are just rejected if the inbox is full. An additional disadvantage of email marketing online may be the issue of permission. You might want the person’s permission to be sending them commercial emails. If not the email ends up and spam and in some parts from the world this is generally a criminal offence and you will be able to have your business website shut down and email accounts revoked. You can find three types of email marketing online. One is direct email. This entails an email sent using a promotional message to all email addresses in your data base. One can also rent out email databases of other businesses. The second type is retention email. Retention emails are emails sent frequently like newsletters. While such emails do contain promotional messages, they also offer information that adds value towards the organization thereby winning around long expression consumers. The third kind of email marketing online consists of marketing on other people’s emails. Which is you put an advertisement in the email one particular more business sends out to its’ subscribers. Some newsletters exist for the sole purpose of publishing other companies’ advertisements. Email marketing online is a cheap and profitable way of promoting solutions or items and gaining or maintaining active or new clientele and customers, albeit if it’s done correct.
{ "pile_set_name": "Pile-CC" }
Sol Stein Sol Stein (October 13, 1926 – September 19, 2019) was the author of 13 books and was Publisher and Editor-in-Chief of Stein and Day Publishers for 27 years. Early life Born in Chicago on October 13, 1926, Stein was the son of Louis Stein and Zelda Zam Stein. The family moved to New York in 1930. In 1941, while living in the Bronx, Sol Stein wrote his first book, "Magic Maestro Please", followed shortly by "Patriotic Magic". He attended DeWitt Clinton High School, where he served on the Magpie literary magazine with Richard Avedon and James Baldwin. He graduated in 1942 and enrolled at CCNY, which then provided a free education. Between the time of Stein's enlistment in the Army Air Corps in 1944 and being called to active duty on March 1, 1945, Stein had completed nearly three years of infantry ROTC at CCNY. After qualifying for pilot and bombardier training, a backlog of pilots caused Stein to voluntarily transfer to the infantry. Overseas, he served as an Information & Education officer in the Headquarters of the 1st Infantry Division (United States) in Germany as Commandant of Division Schools, located in three cities, Regensburg, Ansbach, and Triesdorf. On 5 November 1946 Stein was cited by Lt. General Geoffrey Keyes for having organized and commanded the best occupational training schools in the Third Army Area in the American Zone of Germany. Upon returning from Europe in 1946, Stein completed work for his degree at CCNY and simultaneously with his graduation in 1948 was employed at the college as a lecturer in social studies. While teaching, he took his master's degree in English and Comparative Literature at Columbia University in 1949 and was accepted for the famed doctoral seminar conducted jointly by Lionel Trilling and Jacques Barzun, both of whose writings Stein was to later to edit. Script writer for the Voice of America From 1951 to 1953 Stein was employed by the Voice of America, eventually as senior editor of the Ideological Advisory Staff of the Voice of America. He wrote daily scripts that were translated into 46 languages and broadcast to two million people risking their lives listening behind the Iron Curtain. It was at the Voice that Stein's association with Bertram Wolfe began; Stein was instrumental in causing the re-publication of Wolfe's masterpiece, Three Who Made a Revolution, which had been allowed to go out of print. The book subsequently sold half a million copies in a few years and was adopted in almost all Soviet Studies programs in the U.S. and elsewhere. In 1953 Stein, a centrist, was appointed Executive Director of the American Committee for Cultural Freedom, an organization of 300 leading American intellectuals of left and right working together in support of civil liberties and battling Senator Joseph McCarthy in the U.S. and Soviet propaganda and influence among intellectuals in Europe, Asia, and Latin America. It was in this period that the eventual publisher supervised the writing and publication of McCarthy and the Communists, which made The New York Times Bestseller List for 13 weeks and was credited with contributing to the unseating of Senator McCarthy. Playwright In 1952 Stein was granted a leave of absence from the Voice of America to accept back-to-back fellowships at Yaddo, an artists’ colony, and the MacDowell Colony. At MacDowell, Stein completed his first play, Napoleon, under the watchful eye of Thornton Wilder, a fellow at the same time. The verse drama was produced the following year by the New Dramatists organization at the ANTA Theater in New York and was chosen by the Dramatists Alliance as “the best full length play of 1953”. Stein completed a second play, A Shadow of My Enemy, originally intended as an adaptation of Whittaker Chambers' best-selling memoir, Witness (1952), but, when denied rights, based on public record and published in 1957. The play, whose synopsis runs "A senior editor of Time magazine accuses his closest friend of being a Communist", was originally commissioned by the Theater Guild and subsequently produced on Broadway by Roger Stevens, Alfred deLiagre Jr., and Hume Cronyn. The cast starred Ed Begley and Gene Raymond. In the early 1950s, Stein and Elia Kazan formed a friendship that was cemented in 1955 when Stein served as the production observer from first reading to opening night of the Tennessee Williams play Cat on a Hot Tin Roof, which won the Pulitzer Prize for drama that year. Stein's play A Shadow of My Enemy was produced in 1957 by Roger Stevens, Alfred deLiagre Jr. and Hume Cronyn at the National Theater in Washington and the ANTA theatre on Broadway in New York starring Ed Begley and Gene Raymond. In 1957 Stein was one of 10 founding members of the Playwrights Group at the Actors Studio in New York with William Inge, Tennessee Williams, Lorraine Hansberry, and others. From 1957–1959 Stein served for two and a half years as Managing Editor of the Executive Membership Division of the Research Institute of America. Editor and publisher In 1953 Stein edited and supervised the publication of McCarthy and the Communists by James Rorty and Moshe Decter for the Beacon Press in Boston. Melvin Arnold, director of the Beacon Press appointed Stein as General Editor of Beacon's Contemporary Affairs Series in the book size trade paperback format developed by Stein. Working as a freelance contractor, Stein's first list for Beacon included Three Who Made a Revolution by Bertram Wolfe, Homage to Catalonia by George Orwell, The Century of Total War by Raymond Aron, An End to Innocence by Leslie Fiedler, The Need for Roots by Simone Weil, The Hero in History by Sidney Hook, Social Darwinism in American Thought by Richard Hofstadter, and The Invisible Writing by Arthur Koestler. Sol Stein edited the classic work Notes of a Native Son by James Baldwin, selected as #19 of the “100 best nonfiction books of the 20th century”; Elia Kazan's America America; and Lionel Trilling’s Freud and the Crisis of Our Culture. He was also responsible for the continued publication of Bertram D. Wolfe’s The Fabulous Life of Diego Rivera and George Orwell’s Homage to Catalonia, selected as #42 of the 100 best nonfiction books of the 20th century. In 1959 Lionel Trilling, Jacques Barzun, W. H. Auden and Sol Stein launched The Mid-Century Book Society, an upscale book club, which was an immediate success. Stein and Day In 1962 Stein founded the New York-based publishing firm Stein and Day with his then-wife, Patricia Day. Stein was both publisher and editor-in-chief of the firm. The publishing house’s first book was Elia Kazan’s America America, which sold three million copies in hardback, paperback, and book club editions. The success of many of Stein and Day’s books was attributable in part to the amount of publicity work that Stein and Day did for each book. Stein worked with Kazan daily for five months on Kazan’s s first novel The Arrangement, which was #1 on The New York Times bestseller list for 37 consecutive weeks. The firm relocated from Manhattan to Briarcliff Manor, New York in 1975, and published about 100 books each year until the company was compelled to close its doors, the background of which was the subject of Stein’s nonfiction book, A Feast for Lawyers. The New York Times said, “He has produced an appalling, Dickensian portrait of the entire system...ought to be read not only by executives facing Chapter 11 but by all entrepreneurs and indeed by anyone who fantasizes about running his own company." Stein's book was honored by The American Bankruptcy Association at its annual convention in Washington, D.C. Columbia University now hosts the Stein and Day Archives, which chronicles the firm's 27 years of existence. Stein and Day was the originating publisher of works by Leslie Fiedler, David Frost, Jack Higgins, GordonThomas, Budd Schulberg, Claude Brown, Bertram Wolfe, Mary Cheever, Harry Lorayne, Barbara Howar, Elaine Morgan, Wanda Landowska, Marilyn Monroe, Oliver Lange, and F. Lee Bailey, among others. Stein and Day was also the American publisher of J. B. Priestley, Eric Partridge, Anthony Sampson, Maxim Gorky, Che Guevara, L. P. Hartley, and George Bernard Shaw. The WritePro Corporation In 1989 Stein founded a software publishing company with his wife Patricia Day Stein and his youngest son, David Day Stein. Together they took their combined knowledge of writing with their son's technical expertise and created software to teach aspiring writers how to write fiction. WritePro® teaches in-depth character creation, how to create plot, suspense and conflict through the interaction of characters and more advanced topics. WritePro® has over 100,000 users in 38 countries and received many accolades in its reviews. After the success of WritePro®, they created two sets of writing tools for professional writers called FictionMaster® and FirstAid for Writers®. Though they were also successful, Stein chose to license the software to another company in 1995. The licenses were taken back in 2010 and the process of updating the programs began in 2011 and The New WritePro was launched in 2012. However, Stein became ill shortly thereafter and work to bring back the professional tools was interrupted. Stein's son David still hopes to bring them back some day with the help of his brother Leland who now co-owns The WritePro Corporation with him. The New WritePro® is still available through writepro.com. Honors Honorary Life Member, International Brotherhood of Magicians, Ring 26, 1947. Honorary Phi Beta Kappa, College of the City of New York, tc Distinguished Instructor Award, University of California at Irvine, 1992 Bibliography Novels The Husband, Coward-McCann, 1969, Pocket Books, 1970. British Commonwealth: Michael Joseph, Mayflower. Translated into German, Spanish, Japanese, Norwegian, Swedish, Finnish, Dutch. The Magician, Delacorte, 1971, Dell, 1972. Selected by the Book-of-the-Month Club. British Commonwealth: Michael Joseph, Mayflower. Translated into French, Spanish, German, Japanese, Russian. Film rights to Twentieth-Century Fox. Screenplay by Sol Stein. Living Room, Arbor House, 1974, Bantam, 1975. The Literary Guild, Doubleday Book Club. British Commonwealth: The Bodley Head, New English Library. Translated into French, German (2 editions), Italian, Japanese. The Childkeeper, Harcourt Brace Jovanovich, 1975, Dell, 1976. British Commonwealth: Collins, Fontana. Translated into German, Spanish. German-language TV motion picture released Other People, Harcourt Brace Jovanovich, 1980, Dell, 1981. British Commonwealth: Collins, Fontana. French, German, Italian (3 editions), Greek. The Resort, Morrow, 1981, Dell, 1982. British Commonwealth: Collins, Fontana. Translated into Russian. Motion picture rights optioned (twice). The Touch of Treason, Marek/St. Martin's Press, 1985, Berkley, 1986. British Commonwealth: Macmillan. Translated into German, Greek, Swedish, Norwegian. A Deniable Man, McGraw-Hill, April, 1989. Translated into German. The Best Revenge, Random House, 1991. Nonfiction books A Feast for Lawyers, hardcover, M. Evans, 1989, paperback 1992. Trade paperback, Beard Books, 1999. Stein on Writing, St. Martin's Press, 1995 hardback, 2000 paperback; British Commonwealth under the title Solutions for Writers, Souvenir Press. German edition, Zweitausendeins. How to Grow a Novel, St. Martin's Press, 1999, British Commonwealth under the title Solutions for Novelists, Souvenir Press, 2000, in German, Zweitausendeins 2000. Native Sons, correspondence and commentary with James Baldwin, 2004) Plays and screenplays Napoleon (previously titled The Illegitimist), produced New York and California, 1953, winner of Dramatists Alliance Prize, “best full-length play of 1953” A Shadow of My Enemy, produced by Roger Stevens, Hume Cronyn, and Alfred DeLiagre, ANTA Theater, 1957, starring Ed Begley and Gene Raymond The Magician, screenplay, 20th Century Fox Software WritePro® and The New WritePro®, Fiction writing lessons, created in 1989 with his wife Patricia Day Stein and his son David Day Stein. FictionMaster®, tools for fiction writers, created with his wife Patricia Day Stein and his son David Day Stein. FirstAid for Writers®, tools for fiction and non-fiction writers, created with his wife Patricia Day Stein and his son David Day Stein. References External links Sol Stein Papers at the Rare Book & Manuscript Library at Columbia University Category:1926 births Category:Writers from New York (state) Category:American publishers (people) Category:City College of New York alumni Category:DeWitt Clinton High School alumni Category:2019 deaths Category:People from Briarcliff Manor, New York
{ "pile_set_name": "Wikipedia (en)" }
Q: Understanding how Git LFS repository works for developers who don't have LFS extension installed As the title already says, I am interested in how would a git repository with LFS files behave for developers who don't have LFS git extension installed (cloning of affected files, committing of affected files, etc). Would it be even possible for them to clone such repository (or at least by LFS affected files)? This article explains LFS for git in a very nice way (for beginners). A: The technical spec is actually pretty understandable too : https://github.com/git-lfs/git-lfs/blob/master/docs/spec.md git lfs replaces the actual files with a text pointer tracked in the git repository : Example of a v1 text pointer: version https://git-lfs.github.com/spec/v1 oid sha256:4d7a214614ab2935c943f9e0ff69d22eadbb8f32b1258daaa5e2ca24d17e2393 size 12345 (ending \n) Someone without the lfs extension would see these files instead of the expected content, but would otherwise be able to interact with the repository.
{ "pile_set_name": "StackExchange" }
Q: link_to action "show" to another controller ruby 1.9.2p290 rails 3.1.1 Basically I have two models: CHEFS and RECIPES. class Chef < ActiveRecord::Base has_many :recipes end class Recipe < ActiveRecord::Base belongs_to :chef end And the following routes: resources :recipes resources :chefs do # list of recipes from chef resources :recipes, :to => 'recipes#index_chef' end With this I have the urls (exactly what I want): /recipes - list of recipes /chefs/username/recipes - list of chef's recipes /chefs/ - list of chefs /chefs/username - chef's profile RecipesController: def index @chef = Chef.find_by_username(params[:chef_id]) @recipes = Recipe.where({ :status_id => 1 }).order("id desc").page(params[:page]).per(9) end def index_chef @chef = Chef.find_by_username(params[:chef_id]) @recipes = @chef.recipes.where(:status_id => 1).order("id desc").page(params[:page]).per(9) end My recipes index view: <%= link_to recipe.chef.username.capitalize, @chef %> In http://3001/chefs/username/recipes I have the correct link to Chef profile. But in http://3001/recipes I have the wrong link. What am I doing wrong? A: In http://3001/recipes (which is a weird url!), you don't have access to params[:chef_id]. So you won't have the @chef variable available to you in the view. It should be nil! To get around this, change your link_to to this <%= link_to recipe.chef.username.capitalize, recipe.chef %> You might want to eager load the chef to your @recipes records by loading that in your controller like this: @recipes = Recipe.where({ :status_id => 1 }).includes(:chef).order("id desc").page(params[:page]).per(9) Hope this helps.
{ "pile_set_name": "StackExchange" }
"Ladies and gentlemen." "Please welcome the man who knows what you're gonna do before you do it." "The amazing, Frank Cadillac!" "Here's to world peace." "Good evening." "Welcome to beautiful downtown Las Vegas." "How many people are here from the orient?" "Raise your hands." "You, sir..." "Where you from?" "No, wait, wait..." "Don't tell me." "I'm sensing, you must have soul." "You're a soul man." "Why don't you share with everyone where you're from?" " Korea." " How about that, folks?" "May I assume that this charming young lady is your daughter?" " She's my wife!" "Well, of course she is!" "and what happens in Vegas stays in Vegas." " What's your name?" " Yhun-Kihong." "Yhun-Kihong." "Would you be kind enough to join me up on the stage please?" "Are you serious about this guy?" "This a joke?" "You want me to round up some mimes and clowns while we're at it?" "Yhun-Kihong." "What if I told you that that pretty necklace your wearing has a broken catch and on my count of three, will fall into your drink." "Wouldn't that be something?" "Wouldn't that just blow your mind?" " Yeah." " Yes." "Wouldn't it blow all your minds!" "Three, two, one now." "Did somebody say "spooky"?" "Wait a minute, look at your glass." "Where did it go?" "Yhun-Kihong, why don't you look inside my pocket?" "Reach in." "Dig deep." "Let's have a big hand for Yhun-Kihong." "Well, that's magic folks." "And that's why I'm here." "You've probably seen a lot of those shows." "Mentalists, magicians, illusionists..." "You'll be shocked to know that sometimes not often, but sometimes, it's the real deal." "Masquerading is an act hiding behind a few 50 dollar tricks hiding in a plain sight." "Because if the magician doesn't do that the alternative is impossible for others to live with." "Anyway." "Wednesday night at The Back Page doesn't pay very well." "So I gamble." "But I don't play against other people, only against the house." "So, no mega jack pots, no wash outs." "The idea is to go unnoticed." "That way I can keep coming back." "I'm not a god." "I can't see everyone's future, only my own." "And only within 2 minutes except for when I saw her." "But we'll come back to that." "There's no pattern to this guy, he is all over the map." "Well he's not counting, not enough to top of a 5 deck shoe." "Wait a minute." "Isn't that, that two bit magic act over at The Back Page?" " What's his name?" " Cadillac." "Yeah, it's Frank Cadillac." "Is he pulling tricks on us?" "Is that legal?" "He can't trick the deck." "I'm telling you." "That little prick knows what's coming." "If he's really knocking a system why's he not betting more." "That's gonna be my second question." "Look at that." "He's looking right at us." "It's like he can hear us." " What table was that?" " 27." "It's Roybal, give me two men to table 27!" "Coming right now!" "Place your bets please." "Here's the thing about the future." "Every time you look at it it changes." "Because you looked at it and that, changes everything else." "Nine thousand and seventy." "Empty the drawer." "Move!" "Drop the gun, now!" "Nine thousand and seventy." "Drop the gun." "Step back." "It's his gun." "He's was gonna shoot 2 people." "Step back, we'll settle this right now." " Hey!" " What's he doing?" "Secure the doors, elevators, escalators." "Every way out of this damn place, now!" "Clayman, seal off the Black Jack tables!" "Sullivan, link up with Roybal!" " We're on the floor, on the floor right now!" " Bring the view of the cameras!" "That way!" "This way!" "He's right next to you." "10 dollar slots." "Aisle 14." "There he is behind you!" "Your left!" "Turn around!" "He's right between you." "He's in the mens room, near the gift shop." "Gift shop!" "Gift shop!" "Davis, where the hell is he?" "Black t-shirt, straw hat." "Heading towards the entrance." "Come on, let's go." "Call Vegas PD." "He just stole a silver Charger, tag 585-G4S." " Drop the gun." "Step back." " It's his gun." "He rose to the top of our gambling fraud wish list about 2 months ago." "And what he does has nothing to do with luck." "It's defilable ability." "Look at him." "He knows exactly what to do and not get caught." "Can you explain that to me?" "No, I can't explain it, Callie." "Nor do I have the time." "The Russian Federation has a 10 kiloton nuclear munition, unaccounted for..." " I understand that." " I'm not sure you do." "We need every agent available beating the street." "That bomb was stolen 5 weeks ago." "We have just been informed of it now." "Which means it could be parked under this truck for all we know." "I need actionable intelligence." "Not paranormals and bullshit magicians." "With all due respect sir, this bullshit magician shown a pattern of advanced awareness, that is statistically impossible." "But you let me bring him in, you'll get what you want." "5 days, Callie." "That's it." "Get me the head of casino security." " You Roybal?" " It's Roybal." " Whatever." " Who are you?" "Cavanaugh, take a walk." "Hey, Roybal." "This isn't a pissing contest." "Come on." "What did you do?" "You got a new car?" " Stole it." " Oh, look at this." "20 minutes to walk 20 steps." "Well, that's what you get from two packs a day." "I got you two sandwiches." "Two sandwiches?" "Oh, that's plenty grand." "Come on, take it." "I love you." "Oh, Jesus." "How can I repay you?" "Must be a bitch to park this thing." "Chief Roybal, Special Agent Ferris." "I'm sure Agent Cavanaugh has explained to you that everything you say in this room, and you know we admit can be used against you." "Do we understand each other?" "Sure." " Tell me about Cris Johnson." " I don't know who that is." "How about Frank Cadillac?" "You chased him out your casino tonight." " Stole a car from valet parking." " Yeah, yeah, yeah I know Cadillac." "I thought he was cheating us at cards, the next thing I know he's tackling some guy and waving a gun." " Well, the gun wasn't his." "The man he tackled was one of the two casino killings in Reno." "He is in custody now." "Come on, I'll show you something." "You remember this?" "Oh yeah, of course I do." "We were saying he's looking right at us." " Hey, how did you get this?" " Now think carefully." "What were you talking about right when he looked up?" "We were saying if he has a system why wasn't he betting more." "You sure you weren't doing or saying anything else?" "Just going down to pick him up, I was urging for my radio..." "And right then?" "That's when he looked up?" "Be very specific." "That's what I said." "He looked up." "Really." "So he doesn't have to be there to do it." "Once you entered his consciousness he can pick it up." "Is that to work a system?" "Thank you." "We're finished." "Done some good here, Mr Roybal." "But none of it is up for the discussion." "As far as your concerned Cris Johnson never existed." "That's going to be difficult, considering a hundred cameras saw him at the casino." "Not to worry." "Those tapes have been destroyed." "Hey!" "Is she single?" "Cris, you can't keep stealing cars and having people chase you that's not a life." "But you gotta forget this girl that you keep seeing in your head." "No, I'm not going anywhere until I meet her." "Well suppose she don't show up?" "She already did." "At the diner." "9 minutes after 8." "Well, you've got a couple of hours." "How about a game of pool?" "Allright, Irv." "We'll shoot some pool." "We timed every hand of Black Jack." "The longest was 89 seconds when Jonhson pulled a 6 cards 21." "So we know he can see at least a minute and a half ahead." "I had our techs run a radio frequency spectrum analysis." "Came up dry." "He is not receiving any form of electronic help." "At one point there was a 2 minute 16 second delay." "He never bet." "Just got up and walked away." "Maybe 2.16 is too long." "He can't see that far." "Narrows our window a little bit any way." "Got him." "Vegas PD got a lo-jack hit on the stolen vehicle." "Listen." "About that girl." "When you looked at the clock, did you happen to see a calendar?" "Because it could be 10 years from now she gets hungry." "It's gotta be soon." "I never seen further ahead than two minutes." "Except for her." "And what do you think the reason is that?" "I don't know." "Maybe she doesn't scare easy." "Maybe she's the one." "Well, when you get like this there's no talking to you." " She's almost here." " What happened to the diner?" "Somebody else." "A cop." "A cop?" "Well, then you gotta go." "No, I wanna see how much she knows, what she wants from me." "Cris Johnson." "Still here huh?" "Where else would I be?" "Special Agent Ferris." "Next time steal a car without lo-jack." "Can we speak privately?" "It's okay, Irv." "Go ahead." "Thanks." "I'm sure you know why I'm here." "Cause you're the man who knows what I'm going to do before I do it." "Right?" "Oh, the show, right." "Right!" "I saw you there." " Wonderful." "You like magic tricks?" " Yeah, yeah I do." "Like your magic tricks, clairvoyance." "Whatever you're calling it." "Let's talk something hard." "A stolen nucleur munition has being smuggled into the United States, or may in fact already be here." "I want you to look ahead and tell me where it's gonna be deployed." "I think you got the wrong guy." "It's a magic act." "You gonna stick with that story." "Cause millions of lives are at risk and you could maybe prevent a major catastrophe." "On a practical note." "We are standing in front of a stolen vehicle and you are wanted for assault involving a weapon at the casino." "Alright, that was an accident." "He had a gun and he was going to shoot two people..." "Yeah?" "How did you know that?" "No good deed goes unpunished, does it?" "I can fix your legal problems buddy but you gotta step up otherwise your next magic show is gonna be in Fulsom State Prison." "It's ironic but people like you who try to help had been torturing me." "In the full sense of the word since I was 3 years old." "What do they call it?" "Oh, yeah." "Observed play therapy." "Featuring the marathon 36 hours "can you guess the next flash card" game." "So, please leave me alone and let me live some semblence of a normal life." "I love to indulge your feelings." "But I am dealing with a slightly larger picture right now." "Now you can exercise your responsibility to help your fellow man or I will exercise that responsibility for you." "You're right, I gotta go." "He's gone, right?" "I missed him by seconds tonight." "Excuse me honey, can you get off my car?" "Yeah." "Thank you." "Jesus." " Mr Roybal?" " It's Roybal." "Can I help you man?" "I have a few questions if this is a good time?" "Gaming Commission?" "It's after hours." "You guys should be in a strip club right?" "Come on." "What can you tell us about Cris Johnson?" "I don't know who you're talking about." "Let me rephrase the question." " Here you go, hon." " Thanks." "Excuse me." "Hello." "I noticed you're alone too." "Do you mind if I join you?" "Actually I do." "Sorry to bother you but I have a question about the coffee the bean they use..." "Isn't that something you should probably ask your waitress?" "Yes, it is." "Excuse me, do you have a light?" "I don't smoke." " Here you go, hon." " Thanks." "Please." "Don't." " Hi, Liz." " Did you follow me here Kendal?" "No, no." "I just thought we could talk." "You know we got really nothing to talk about." "And I told you that 3 weeks ago." "Liz, come on." "I had an off day, just give me another shot." "It's not gonna happen, okay?" "So maybe you should just go." "Do you know how hard it was to find you?" "I was at your apartment I tried the Starbucks on Lexington, I was at the dry cleaner..." "All I'm asking for is a few minutes of your time, so that we can work things out!" "Okay, Jesus!" "You're stalking me now." "Don't!" "Don't say that, please." "That's a terrible thing to say to somebody..." "Let go of me, Kendal." "Look, I just..." "I thought we can talk." "You know, maybe we can take a drive and now your ruining it." "You're hurting me." "Kendal?" "I think you're having another off day." " Who the hell are you?" " I'm her future." "Really?" "Hi, my name's Cris." "You okay, Kendal?" "See, the thing is I feel connected to you and I don't know the reason why." "Now listen." "I think it's only fair that you pay for the lady's breakfast." "What are you having?" "Pecan pies are amazing." "Excuse me." "I can pay for my own breakfast." "You know what?" "You two work things out." "You're hurting me." "Kendal?" "I think you're having another off day." " Who the hell are you?" " I'm her future." "Really?" "Incoming." " God damn it, Kendal!" " What?" "Don't blame me." "This is your fault." "Get out of here!" "Will somebody please call the cops?" "I am so sorry." "Are you okay?" "Let me help you." "Come on, lets get you cleaned up." "Come on." "Okay." " I'm seeing some stars." " Yeah?" "I'm Liz." "Cris." "You must have a death wish getting involved in that." " Here." "Just..." " Okay." "Okay." "Hold it there." " For a bit." " Okay." " It will." " What will?" "Your luck." "It's gonna change." "What are you?" "A leprechaun?" "Do leprachaun's get punched in the face or have their car stolen?" " Your car was stolen?" " Yeah." "I'm hoping they find it today." "Supposed to be in Flagstaff." "Hey, is this tooth loose here?" "I don't know." "I don't think so." "It hurts." "Well listen, maybe I can give you a ride." " I'm kind of going that way." " That would really be helpful, Liz." "Thank you." " I do have to make a stop though." " It's okay." "And it may take a few hours, so cool with that?" "Hey, look." "If you're uncomfortable with this, I'll take a bus." "No, no, no." "Its fine, its fine." "You're not a psycho." "Right?" "Because the first psycho vibe i get, you're out of the car." " Okay." "Yes Ma'am." " OK." "Deal." "Deal." "It's amazing." "Wasn't it?" "I end up in a diner where you are, both heading in the same direction." "I don't know if I would call it amazing, but..." "Destiny." "That's what it really is." "Okay." "I'm starting to get that psycho vibe." "Ah, no..." "You don't believe in destiny?" "Well, even if it does exist, I don't think I want to know." "I mean if every move we make is pre-ordained and what is the point of that?" "In life is supposed to be a surprise." "Isn't it?" "It would be nice." "Yeah." "So he came in twice a day for a week at exactly 9 past 8?" "Yeah, he'd stay a few minutes, have a martini and then he'd go." "Until today when he met that lady." "Didn't find anything strange about that?" "Not strange enough to call the police." "We got a regular that counts the cornflakes in his bowl it has to be an even number." " Got any cameras?" " Inside?" "No." "Outside?" "No." "Did you noticed what kind of car he was driving maybe overhear where they were going?" "I don't know what car but they were heading up to Flagstaff." " Flagstaff?" " That's what they said." "Got another regular." "She's always on a diet." "Brings in a scale and her own salad dressing." " Thank you." " You're welcome." "Guy knows we're after him, but he still risks coming here." "8 or 9." "Twice a day." "He didn't know if it's day or night, just the time." "He was waiting for her." "Alright." "There is a traffic cam over there, bank 7-11 across the street." "Just run all the tapes." "We will get lucky and catch him at the wide." "Hey, your bubby Roybal, the casino chief?" "Had his throat cut last night after getting a knee cap shot off." "You're telling me this now?" "We just talked him about Johnson." " Hey, I just found out." " Alright." " Local weapon?" " Dead end." "The forensics came up empty." "Not a hair not a fibre." "Somebody wants information." "Now, next time anything happens relevant to Johnson, I want to know right away." " I don't care if it's a paper cut." " Okay, boss." "The head of casino security." "What did you learn from him?" "For a macho guy, he screams like a girl." "But he was questioned by federal agents, looking for Cris Jonhson." "Yes?" "He said they hadn't found him yet." "Do you believe this shit?" "He can see things before they happen?" "It makes no difference what I believe." "Look, we spent two years setting this up." "And that man out there is worried all this will be comprimised by Johnson." "We're wasting our time looking for some magician." "We're being paid to secure the operations, Jones not to hunt down some carnival barker." "Really?" "Then why are the same authorities that are looking for us so interested in him?" "Get rid of him." "Do it now." "Hey." "Have a super reservation." "I teach here once a week." "The conditions are pretty lousy." "But it's in the Canyon." "One of the eight wonders of the world." " Hi, Sam." " Hi, Liz." "A couple hundred years ago this tribe was booming." "Plenty of food and thriving culture." "They should be better off but I guess this is just their destiny." "I would like to meet their shaman." "I read once that in the many North American tribes their shamans purpose wasn't only healing." "But they also claim to have power of the atmosphere." "To bring on or stop rain even know future advance." "Do you think that's possible?" "I believe any thing is possible." "Me too." " Whose birthday?" " One of my students." "Hi." "How's it going?" "Hello, how is everybody?" "Good?" "That's good." "That, that was a lot good." "But you messed up on the last part." "On the last part, yeah." "I thought you weren't coming back til next monday." "Well I'm not, but it's Jake's birthday." "How could I miss that?" "Whose that man you're with?" " Is he your boyfriend?" " No, no, he's not my boyfriend." "He's just my friend." "I think he likes you." "Why would you say that?" "Because he looks at you like my brother looks at his girlfriend." "Hey, Jake." "Do you want to see some magic?" "I'll show you something." "Come here." "I found this rock out in the Canyon." "And I want you to hold it because it's a magic rock." "That's right." "Hold it really tight, keep squeezing." "It's magic." "It won't bite." "Happy birthday." "So you're a magician?" "Well." "I have a small magic act back in Vegas." "The Frank Cadillac show." " I thought your name was Cris." " It is." "Frank Cadillac is my stage name." "How did you come up with that?" "I picked two things I really like and I put them together." "Frankenstein and Cadillacs." "You are odd." "Charming." "But odd." "Cease fire!" "Get out of the range!" "Nice." "A little close though." "Okay." "You were right about the traffic cam." "We got a positive ID." "I'm sorry." "Don't be." "It's okay." " Did I drool?" " Drool?" " Yeah." " What?" "Drool, no." " Oh my god, it's coming down so hard." " Yeah." "I like rain." "I like rain too." "You know once, I think was in Denmark it rained fish." "Cause the sun dehydrated the water." "Took it out in the atmosphere." "Rehydrated the fish eggs, and they hatched and rained fish." "Is it true?" "Yeah, in the clouds." "True story." "Happened 50 years ago." "Just felt like sharing that with you." "The road washed out ahead." "You can't cross till morning." "Not even then if this keeps up." "Spin around and go back about 2 miles, take your second left there'll be a motel there called..." " The Cliffhanger." "Thanks." "Right." "Him right?" "That's it." "There's no front plate, where's the other side?" "I don't have it." "What was that at the front window?" "Go back." "Back, back." "Back, there!" "Zoom in." "It's a permit." "Track it and find her." "I'll light a fire." "Cris, one little problem." "Oh, no, no, no..." "I'm gonna sleep in the car." " Here." " Oh, thanks." "Sure." "Hey, did you hear the joke about the zen master who ordered the hot dog?" "No." "He said he'd have one with everything." "Good night." "Good night." "What do we have?" "They're at the Cliffhanger Motel outside Flagstaff." "We found an Arizona foreman who remembered the land cruiser." "Why would he do that?" "The road was floaded." "He was about to suggest a place to stay." " But Johnson already knew, right?" " Exactly." "Callie, it just got worse." "All right people, we got a nuclear alert." "Code red." "In the southern California region." "L.A. to San Diego, 95% certainty." "Nuclear emergency search teams are on the way, but until they get here somebody please tell me what my agency, the FBI is doing about it?" "Well, sir, tier 1 suspects have been interrogated." "Cars and premises have been checked." "Friends and aquintances." "We have opened up surveillance on tier 2 and 3 suspects but nothing actionable yet." "Oh, is that what we're doing?" "Waiting for something actionable?" "There are 8 million lives that are precarious at best so I say we widen the net to slightly suspicious and get some decent Intel before this nuke blows up Los Angeles." "Alright, Callie." "What do you propose we do next?" "I believe that the urgency of the situation..." "We know where he is." "Let my team pick him up." "The FBI are mobilizing." "Continue watching." " Did you have the image?" " Yes." "He said they're mobilizing." "Standard procedure when security is escalated." "Tell him to wrap it up." "They'll lead us straight to Johnson." " Don't lose sight of them." "Understand?" " Okay, certainly." "You hungry?" "There's a coffee shop down the road." "I'd rather eat here, if that's okay." "Sure." "What?" "There's an Italian painter named Carlatti." "And he defined beauty." "He said it was a summation of the parts working together in such a way that that nothing needed to be added." "Taken away or altered." "That's you." "You're beautiful." "That was incredible." "What was?" "This." "Right here." "Gives us a good stand up position and a open view of the front of the motel." "We can multiple pull in area surveillances, from this road here, that turn off." "Get a team with a parabolic set right here." "That's fine, but I also want mobile surveillance and get me 2 or 3 roamers." "If he rabbits on us, I wanna be flexible." "Ferris." "Call the local police in Flagstaff." "Tell them to hold the outside perimeter." "I want that area locked down." "A body turned out in an apartment, with the line of sight to my office..." "Slit throat, like Roybal." "Somebody trying to follow us to Johnson." "Cris?" "Yeah?" "Maybe there is such a thing as destiny." "Give it 40 seconds." "So after two minutes, he just stops seeing what's gonna happen?" "I sure as hell hope so." " Elizabeth Cooper?" " Yeah." "Federal Agent Ferris." " What is this about?" " I'm gonna need a few minutes of your time." "Yeah, okay." "They're putting her in the car." " Drop the gun, step back." " It's his gun." "He was gonna shoot 2 people." "This was 3 days ago?" "He used you to get away from Las Vegas." "You can be pretty sure, the everything he told you is a lie." "He's delusional." "A sociopath." "Oh my God." "My god." "Oh, shit." "Oh, shit!" "Go back to the motel." "Have a drink." "Put one of these in his glass." "It'll take 5 minutes to put him to sleep, then we'll come in and get him." "Nobody's been hurt." "But this is important, you need to do it at least 2 minutes after you get him out of the room." "Why do you need me?" "Why can't you just get him?" "Liz, as I understand that you work for a federal funded program teaching on a various reservations." "Is that true?" "Yes, that's true." "Well, I think you'll be eager to help us." "We're on the same team." "Now they letting her go." " Thanks for the note." " Sure." " Did you have a nice walk?" " I did." "You know, it's really beautiful here." "Oh, erm..." "I have a present for you." "Ah, thanks." "I need that." "Yeah." "Is something wrong?" "Oh, no, no." "I'm fine." "Now, why don't you go wash up I'm gonna make us breakfast." " Okay." " Okay." "45 seconds." "1 minute 30." "And that's 2." " Looks good." " You think so?" "Thank you." "Don't drink that!" "It's drugged." "Oh, god, I don't know what I'm doing!" "I have no idea what I'm doing." "Some federal agent came up to me and said that you are a delusional sociopath." "And they showed me this tape." "So maybe you are but I don't want to believe that." "I don't think I can believe that." "And she also said that if you ran they would shoot you." "So I should drug you instead." "Even if what they said is true, I don't want you to die." "I don't want you to die." "Cris, is it true?" "Oh, shit!" "Give me broadband noise reduction, I don't like hearing this." "Speak quietly and act normally." "How long did they say the drugs would take?" "About 5 minutes." " What is he doing?" " He's drinking." "Give it a minute." "Got a clean shot?" "Not yet." "The man in that casino would have killed 2 people." "It happened, it just hadn't happen yet." "Oh my god, you are delusional." "Fluffy cranberry or a stack of chocolate chip pancakes for the kids." "Fluffy cranberry or a stack of chocolate chop pancakes for the kids in a..." "Safe?" "Who knows what's safe?" "I know a man who dropped dead from looking at his wife." "Safe?" "Who knows what's safe?" "I know a man dropped dead from looking at his wife." "You can't get lost in the woods, if you never go in to the woods." "You can't get lost in the woods, if you never go in to the woods." "Boy, you got an answer for everything." "That's right sir." "You're the only person authorised to do so." "That's right sir." "You're the only person authorised to do so." " How are you doing this?" " I have no idea how but I can." "I was born with it." " This is some kind of a trick?" " You know we don't have time for that." "You said anything was possible." "So, you see things before they happen." " You see the future?" " My future when it affect me and only 2 minutes ahead." "Except you." "For some reason I saw you." "For some reason I saw you." "Far beyond anything I've ever seen before and I don't know why." "What do you mean, you saw me?" "You have been..." "You have been doing that to me?" "That you know what I'm gonna do and what I'm gonna say that you've been just setting me up?" " No, I haven't." "I wanted to find you because I need to know why I was seeing you." "Because I..." "It wasn't a setup." "What do they want from you?" "They think I can help them in matters of a national security." "I don't understand if you can help them why don't you?" "Because I can't." "I can only give them 2 minute head start and that's if my life has personally involved." " But with me you can see further." " Yeah." "But they don't know that." "There is almost 10,000 dollars in this envelope." "They know about you." "You need to get away from here." "What time do you have?" " 9:10." " Set your wacth to 9:17." "Read this when I left, and wait exactly 45 seconds before you do what it says." "I'll take Ferris with me." "It might be a week or a month but if you can wait, I'll find you." "Something's wrong." " Don't do it." " I already have." "Go get him!" "Alive!" "Lets go!" "Son of a bitch!" "Cris." "Oh, shit!" "Run!" "Johnson!" "You know you're not gonna shoot." "You're gonna let me die?" "Hey, I need some help!" "Get him out of here." "Let's get him out of here." "I got you." "You alright?" "You okay?" "Open your eyes." "Look at me." "No good deed goes unpunished, does it?" " She got him." " Now what?" " Did you see her?" "Smoke?" "Thanks for today." "Could of let me die." "I appreciate it." "That was a real show of character." "I know, I seem like the bad guy in all of this but in the interest of preserving our freedom there are larger issues at play." " What about my freedom?" " With freedom comes responsibility." " I have rights." " This isn't about you." "This is about 8 million other people." "If I do what you want, you will keep me in this chair forever." "There is a nuclear bomb somewhere in Los Angeles." "And every television station in the world will broadcast precise details of it's detonation." "So go on, push that two minutes as far as you can and find it." "...broadcast this afternoon for a breaking news out of downtown Los Angeles." "...the largest technology corporations opposed this idea." "And tech lobbying is blamed for stalling the members of the LAPD bombsquad are staging in that area." "We wanna go live now with our reporter Lisa Joiner, at the scene with very latest." " Lisa?" " Jeff, this all began when police received an anonymous phone call stating that explosives would be detonated at this parking garage at Second and Broadway at 6 o'clock tonight." "There is no, um..." "They have no idea on the motive." " The victim however..." " Oh, Liz, I'm sorry." "What?" "What did you say?" "We saw the LAPD surrounded the area." "They've secured a perimeter." "But now the bomb squad is making there way onto the deck of this building." "And there the men are walking up with black suit on the sight." "Oh my god!" "There..." "There's been an explosion." "There's been an explosion." "Oh my god." "The victim has been identified as Elizabeth Cooper of Las Vegas." "And she was strapped to a wheel chair." "Sorry." "...Approximately 10% of U.S. workers receives stock options." "Many technology companies will be..." " Tell me what just happened?" " I can't." "It won't work like this." "Just get me out of this room and I will do what you want." "I beg you." "Please, get me out of this room." "Let him out." " Callie, Callie!" "Wait up." " What?" "Forensic report on Betty Peterson." "The dead girl in the apartment." "Her throat was cut, bled out otherwise nothing to DNA, the place immaculate again." " How did it go with Johnson?" " Well, something happened but he's not sharing." "You know there's traces of potassium iodine." "Some medication Peterson was taking." " They found an empty pill box." " No. the only reason to take it is to prevent radiation poisoning." "Hey, wait, wait." "Can I get a smoke or something?" "I need to relax." "Thanks." "Hey, can I get a light?" "Look at this." "Look." "Bay zero one." "Bay zero one." "I got visual." "Subject is spotted heading south on Fifth street." "Be advised." "Subject is turning east onto Broadway." "Stay here." "Let me deal with this." "Why are you here?" "They killed her." "2 hours from now." "They killed Liz." "Tell me what you saw." "I saw them execute her." "Right there." "On the roof." "It hasn't happened yet and I know who has her." "It's the same people we're after." "There's a reason that they brought you here." "They're using Liz as bait." "10 to 1, you go out on that roof, they're gonna put a bullet in your brain." "I know." "Right now, she's still alive." "She is, you are, we all are." "Let's try to keep it that way." "I help you, you help me, alright?" "I want a 2 mile radius." "Every telephone grid, short waves cell tower, shut it down." " What do you want me to do?" "Let him shoot you." "Your call cannot be completed as dialed." "Check the number and dial again." "Your call cannot be completed as dialed." "FBI." "Down on your knees!" "You okay?" "That looked pretty close." "Slide of hand." " You didn't get him?" " Not alive." "He fired on the chopper." "But doesn't matter, he couldn't call in the hit." "As far as they are concerned, you're not here yet." "Buys us time." "Every way I try, she still ends up dead." "What if you do it earlier?" "I think they'll have to bring her here in a vehicle, right?" " Looking for a license plate." " Right." "Can you see it?" "It helps if you don't speak right now." "California plate number." "50KF272." "California tag." "50 Kilo Foxtrot 272." "Please, where are you taking me?" " Okay." "Not a problem." "What do you want with me?" "Be careful." "Who the hell are you people?" "You set them up Cavanaugh?" "Local SWAT has been deployed and the regional team just showed to back us up." "Alright, listen up." "The van carrying Elizabeth Cooper will exit the warehouse, crossed over here, 18 compounds and approximately 5 minutes." "4 minutes and 27 seconds." "Do you mind?" " Not anymore." "Go ahead." " They've got her wrapped in explosives wired to a cell phone." " Remote trigger." "Another cell phone sets it off, using one button speed dial." "You'll take this route to the entrance gate." "At that point, Alpha and Bravo will swarm the entrance..." "If you can just be quiet and do exactly what I say I'll save your life." "We need to stop the vehicle here before they get through the gates." "Alpha and Bravo will hold and contain here sniper teams will initiate on Johnson's call." "On his call." "Are we clear?" "All elements shoot to kill any hostiles." " What about intel?" " We don't need them." "We have him." "Alright everybody!" "Lets go." "Go!" "Let's go!" "Move!" "Back up!" "Back up!" "Back up!" "Go, go, go!" " Stop the van." " Not yet." "You'll kill her." "Now!" "We gotta go!" "Now!" "Now!" "Pull back!" "Pull back!" "Take out the guy on the crane, northeast corner." "Negative, on a visual." "Give me that." "Aim for the door way, 8 inches above the guard rail." "Alright, lets go!" "The girl escaped." "David, Charlie-One at entry point." "Turn right." "Clear." "Go!" "Go!" "Go!" "Come on." "Let's go, let's go!" "Round up!" "They're coming to round up!" "Stop." "No!" "Go." "This is Charlie-One element." "Moving and clear, over." "Thanks." "There are explosives there, there and there." "Stay close." " Sniper." " Where?" " Behind us." " Sniper 6 o'clock." "Get a visual." "Nobody move." "I'll find him." "Cat walk, second level." "Cat walk, 6 o'clock, second level." "Got him." "We have to clear this deck by deck." "You check this one." "I'll do the rest." "Let's sweep and clear." "She's near the engine room." "Come on, man." "Release the hostage you can still get out of this." " Don't patronize me." " How good are you with that gun?" " Very." " You gonna be okay, Liz." " Back off!" "I've seen every possible ending here none of them are good for you." " I'll take my chances." "One more step fortune-teller and it definitely won't be good for you." "You have one way out of this." "That wasn't it." "Liz, look at me." "It's okay." "Look at me." "It's over." "It's over." "No, it's not." "The nuclear device was moved." "We need to find it's exact location." "Now this registers any significant detonation in the earth's crust." "Take a look." "Tell me what you see." "Something's wrong." " I made a mistake." " What?" "I made a mistake." " It's happening." " When?" "Now!" "Alright, I've got 4 teams in place." "We just waiting on road crew." "Alright." "Ferris." "It's me." "I'll do it but I have conditions." "I want her left out of it." "I'm sure we can work something out." "Liz." "Liz." "Come back to bed." "I gotta go." "Go where?" "Something that I have to do." "I can't put it off any longer." " Are you coming back?" " Yeah." "Maybe a week or a month." "But if you can wait." "I'll find you." "Here's the thing about the future." "Every time you look at it, it changes." "Because you looked at it." "And that, changes everything else." "You ready?" "Yeah."
{ "pile_set_name": "OpenSubtitles" }
The Microsoft Translator webpage widget allows you to bring real-time, in-place translations to your web site. Try the new collaborative translation features that combine automatic translation technology with the power of your community. Language translation is extremely difficult, as the meaning of words and phrases often depends on the context and specialized knowledge of the domain area or culture. Sentence structures and grammatical rules vary significantly between two languages, which adds to the complexity of the translation challenge. Currently, it still requires human skills to translate sentences without errors. The quality of today's most advanced translation software is well below the accuracy and fluency of a professional translator, and many sentences are simply not understandable. Researchers are continuously working on improvements, but it may be many years before high quality translation can be consistently offered by a computer. For this reason, we display both the original text and its translation, anticipating that you will find it easier to understand the translation and to compare it with the original content if needed. Text translation * Select your original and translation language from the "Languages" drop down box. * Type or paste your text in the "Enter text or webpage URL" box. * Click the "Translate" button. Web page translation * Select your original and translation language from the "Languages" drop down box. * Enter the URL of a web page in the "Enter text or webpage URL" box. * Click the "Translate" button. * Once in the Bilingual Viewer, you can change viewing modes, target language, or URL by clicking on the controls in the menu bar.
{ "pile_set_name": "Pile-CC" }
Share this article on LinkedIn Email Lewis Hamilton will receive a five-place grid drop for the Bahrain Grand Prix as the Mercedes team has had to change his gearbox prior to qualifying. Hamilton's car suffered a left-rear tyre failure at the end of final practice, and also incurred suspension damage in the incident. Mercedes has had to change the car's left rear corner as a result, and the team confirmed to AUTOSPORT that the gearbox would also have to be replaced. The outfit would not confirm the cause of the practice issue. Hamilton took pole position for the last race in China, but had not been expected to be a front row contender in Bahrain, where Mercedes has so far struggled to match Ferrari, Red Bull and Lotus. The penalty is the third to be applied for Bahrain qualifying so far, with Mark Webber and Esteban Gutierrez already facing three and five place demotions respectively for causing accidents in China.
{ "pile_set_name": "OpenWebText2" }
Heart disease is the leading cause of morbidity and mortality in the Western World. As this is mostly related to disorders of the blood supply to the heart, it is very important to be able to assess the perfusion of the heart wall. Conventional methods for assessing myocardial perfusion have many limitations, including relatively low resolution and poor ability to provide quantitative data. Magnetic resonance imaging (MRI) of the "first-pass" kinetics of contrast enhancement by a bolus injection of contrast agent is a very promising method for noninvasive assessment of myocardial perfusion, with higher resolution than conventional radionuclide imaging methods. However, current approaches to MRI perfusion studies have only been "semiquantitative", due to several technical difficulties. We have been achieving very encouraging initial results in making absolute measurements of regional myocardial perfusion, using novel MRI methods that we have designed to overcome the limitations of conventional MRI approaches. In the proposed research, we will further develop our MRI methods, and the associated image analysis methods, for quantitatively measuring myocardial perfusion. We will perform a series of studies on normal subjects to establish the expected range of variability of the results. We will also perform a series of studies of patients with coronary artery disease, comparing the results of our MRI methods with those of conventional methods used to assess the blood supply to the heart, including radionuclide imaging, CT angiography and conventional cardiac catheterization (including invasive measures of flow reserve). The significance of the proposed work is its potential to achieve more accurate and higher resolution assessments of blood flow to the heart wall than current conventional methods can provide. This would be very useful for aiding treatment decisions and for following the results of therapy in patients with ischemic heart disease, a common and serious clinical condition. The quantitative MRI methods we propose to develop for the assessment of cardiac vascular disease may also be applicable to assessment of the perfusion of other important organs, such as the brain, which is subject to stroke, and in other important disease processes, such as cancer, where the disease evolution may be related to blood flow.
{ "pile_set_name": "NIH ExPorter" }
Getty Images Apart from the significant gap in the raw dollars between what Seahawks quarterback Russell Wilson currently wants and what the team currently is willing to pay, another major issue looms over the negotiations. Per multiple sources, Wilson is looking for a considerable portion of the contract to be fully guaranteed. While he’s not asking for the entire deal to be fully guaranteed, it’s a larger portion than traditional veteran contracts. It’s become a stumbling block not because of the guarantee itself but because of the league’s funding rule, which requires almost every penny of any future payments guaranteed for skill, injury, and cap to be paid into escrow upon signing. While Seahawks owner Paul Allen, the richest of the very rich men who control NFL franchises, can afford to put the money aside ahead of time, multiple sources tell PFT he doesn’t want to. It’s unclear why he doesn’t want to do it, since he can do it with the stroke of a pen. And it invites further speculation that the funding rule, which was created to protect players from owners who lack the future cash to honor guaranteed payments, has become a tool for collusion among NFL teams. Former NFL player Sean Gilbert made the case while running for the position of NFLPA Executive Director that the funding rule as written and applied results in collusion. The NFLPA apparently has decided not to pursue the issue. But maybe it should. During the NFLPA campaign, Gilbert made a big deal about keeping the specifics of the collusion claim top secret due to concerns regarding the 90-day limit for filing such claims. The truth may be that he wanted to give incumbent DeMaurice Smith and other candidates less time to debunk Gilbert’s theory; if the violations are continuing, a collusion case arguably could be made within the 90 days after any specific instance of it, past, present, or future. For any team owned by someone worth billions, there’s no legitimate reason to refuse to fund fully guaranteed veteran contracts, other than to avoid the widespread adoption of fully guaranteed veteran contracts across the NFL. That may be a legitimate business reason on a team-by-team basis, but it also amounts to collusion if multiple independent NFL franchises agree to do it in order to avoid fully-guaranteed contracts becoming the norm in pro football, like it has become the norm in baseball and basketball.
{ "pile_set_name": "OpenWebText2" }
The invention relates to a mirror projection system for use in a step-and-scan lithographic projection apparatus for imaging a mask pattern, present in a mask, on a substrate by means of a beam of EUV radiation, which beam has a circular segment-shaped cross-section. The invention also relates to a lithographic apparatus for step-and-scan imaging of a mask pattern on a number of areas of a substrate, which apparatus comprises such a mirror projection system. U.S. Pat. No. 5,815,310 describes a mirror projection system for use in a step-and-scan lithographic apparatus with which an IC mask pattern is imaged on a number of areas of a semiconductor substrate, using EUV radiation. EUV, extreme ultraviolet, radiation is understood to mean radiation having a wavelength in the range between several nm and several tens of nm. This radiation is also referred to as soft X-ray radiation. The use of EUV radiation provides the great advantage that extremely small details, of the order of 0.1 .mu.m or less, can be imaged satisfactorily. In other words, an imaging system in which EUV radiation is used has a very high resolving power without the NA of the system having to be extremely large, so that also the depth of focus of the system still has a reasonably large value. Since no suitable material of which lenses can be made is available for EUV radiation, a mirror projection system must be used for imaging the mask pattern on the substrate, instead of a hitherto conventional lens projection system. The lithographic apparatuses currently used in the production of ICs are stepping apparatuses. In these apparatuses, a full field illumination is used, i.e. all areas of the mask pattern are illuminated simultaneously and these areas are simultaneously imaged on an IC area of the substrate. After a first IC area has been illuminated, a step is made to a subsequent IC area, i.e. the substrate holder is moved in such a way that the next IC area will be positioned under the mask pattern, whereafter this area is illuminated, and so forth until all IC areas of the substrate of the mask pattern are illuminated. As is known, it remains desirable to have ICs with an increasing number of components. It is attempted to meet this desire not only by reducing the dimensions of these components but also by enlarging the surface areas of the ICs. This means that the, already relatively high, NA of the projection lens system must be further increased and, for a stepping apparatus, the image field of this system must also be further increased. This is practically impossible. It has therefore been proposed to change from a stepping apparatus to a step-and-scan apparatus. In such an apparatus, an annular segment-shaped sub-area of the mask pattern and hence also such a sub-area of an IC area of the substrate is illuminated, and the mask pattern and the substrate are moved synchronously through the illumination beam, taking the magnification of the projection system into account. A subsequent annular segment-shaped sub-area of the mask pattern is then imaged each time on a corresponding sub-area of the relevant IC area on the substrate. After the entire mask pattern has been imaged on an IC area in this way, the substrate holder performs a stepping movement, i.e. the beginning of a subsequent IC area is introduced into the projection beam and the mask is set to its initial position, whereafter said subsequent IC area is scan-illuminated via the mask pattern. This scan-imaging method may be used to great advantage in a lithographic apparatus in which EUV radiation is used as projection radiation. The embodiment of the projection system described in U.S. Pat. No. 5,815,310, intended for use with EUV radiation having a wavelength of 13 nm, has an NA of 0.25 at the image side. The annular image field has an inner radius of 29 mm and an outer radius of 31 mm and a length of 30 mm. The resolution of the system is 30 nm and the aberrations and distortions are sufficiently small to form a good image of a transmission mask pattern on an IC area of a substrate by way of a scanning process. This projection system comprises six imaging mirrors, and an intermediate image is formed between the third and the fourth mirror. The mask is situated at one geometric end of the projection system, and the substrate is situated at the other geometric end of this system. When such a mirror system is used in a lithographic projection apparatus, the small quantity of radiation incident on the substrate presents a problem. This problem is caused by the fact that the mirrors are considerably less than 100% reflective. Each of these mirrors comprises a multilayer structure whose composition is optimized for the relevant wavelength. Examples of such multilayer structures are described in U.S. Pat. No. 5,153,898. With such multilayer structures, maximum reflections can be achieved which are theoretically of the order of 75% but, in practice are currently not larger than 65%. When six mirrors are used, each with a reflection of 68% in a projection system, only 9.9% of the radiation originating from the mask pattern and entering the system reaches the substrate. For a lithographic apparatus, this means in practice that the illumination time should be relatively long so as to obtain the desired quantity of radiation energy on an IC area of the substrate, and the scanning rate should be relatively small for a scanning apparatus. However, it is essential for these apparatuses that the scanning rate is as high as possible and the illumination time is as low as possible, so that the throughput, i.e. the number of substrates which can be illuminated per unit of time, is as high as possible.
{ "pile_set_name": "USPTO Backgrounds" }
Introduction {#s1} ============ MS can be diagnosed using the McDonald criteria [@pone.0019702-McDonald1]. MRI is the imaging method of choice with inflammatory diseases of the CNS and the most sensible method in the diagnosis of MS [@pone.0019702-Polman1]. MRI serves to depict acute as well as chronic MS lesions and their volume and allows physicians to measure the volume of additional regions in the brain. Olfactory disorders increasingly occur with Parkinson and Alzheimer\'s disease, but with less frequency with other neurodegenerative diseases [@pone.0019702-Ponsen1], [@pone.0019702-Mesholam1]. They often occur as early symptoms of these diseases. There are some scientific studies already that report olfactory disorders in MS patients at a rate of 15% [@pone.0019702-Hawkes1], 22.5% [@pone.0019702-Zorzon1] and 38.5% [@pone.0019702-Doty1]. Our study wants to examine pathological tissue changes and volume changes of the olfactory brain and of the olfactory bulb (OB) of MS patients and correlate them with their olfactory and gustatory function. The aim is to investigate possible causes of the origin of olfactory disorders in MS patients in greater depth. For this purpose, volumetric measurements of the OB as well as the olfactory brain were performed as objective examination method for the first time. The volumes were determined with manual segmentation. The exact number, localisation and volume of the lesions were determined using a standardised MRI protocol specially developed for our study. Olfactory testing was performed using the tripartide Threshold-Discrimination-Identification-Test (TDI). Materials and Methods {#s2} ===================== The study was performed in the time from January 2009 until November 2009. Ethical approval and trial registration was obtained by the medical ethics comittee of Charité, University of Berlin. Written consent was required to participate in the study. 34 prospective patients (24 women, 10 men, 22--65 years, Ø 41 years, mean disease duration 6 years) were examined. 25 patients had relapsing-remitting MS, five patients primary progressive and four patients secondary progressive MS. The patients were included in resp. excluded from the study after an ENT and neurological examination as well as by completing two questionnaires. Patients with the diagnosis MS (McDonald criteria, revised version 2005) were included in the study. Exclusion criteria were: pregnancy, age below 18 or over 65, olfactory disorders with a different genesis (post-infectious, post-traumatic, sinunasal, infections of the upper respiratory tract, tumours treated with radiation or chemotherapy, allergies, patients suffering from depression, Parkinson\'s or Alzheimer\'s disease). Patients taking drugs that could cause olfactory dysfunction as for example methotrexat, amitryptilin, certain antibiotics and D-Penicillamine were excluded by the questionnaires. Furthermore patients receiving corticosteroid treatment up to six weeks before testing were excluded from the study because corticosteroids can have an effect on the OF [@pone.0019702-Heilmann1]. To exclude dementia, the prospective patients were submitted to the Mini Mental State Examination (MMSE) [@pone.0019702-Folstein1]. A total score of at least 24 points was defined as exclusion criterion. Patients with grave physical disabilities were excluded using the Expanded Disability Status Scale (EDSS) [@pone.0019702-Kurtzke1]. A value of below seven was the threshold value for participation in the study. To exclude depression, a Becks Depression Inventory test (BDI) was performed. The BDI is a self-evaluation method for recording the severity of symptoms of depression [@pone.0019702-Beck1]. MS patients show a higher depression level [@pone.0019702-Foley1]. Disease-related symptoms, e.g. increased fatigue, lead to false higher scores in the BDI test. Adapted to the patients in our study, we defined a score of below 15 points as exclusion criterion. Patients with test scores of above 15 were tested once again by a psychologist using the Hamilton Rating Scale for Depression and the Hamilton Anxiety Rating Scale in an external assessment. A complete ENT examination with endoscopy for exact anatomic evaluation of the nasal passage, the sinuses, damage to the nasal mucosa as well as the presence of polyps was performed to exclude olfactory disorders of another origin. Exemption criteria also applied for the participation in the MRI examination. The olfactory capacity was evaluated using the tripartide TDI test recommended by the "Working Group Olfactology and Gustology" of the German ENT Society (standardised, reliability r = 0.72) [@pone.0019702-Kobal1]. The Threshold test consists of 48 sniffing sticks with a 16-stage dilution series of n-butanol for determining the olfactory perception threshold of a patient. The discrimination test consists of 48 sniffing sticks to test the distinction of smells. Everyday smells have to be identified with the identification test. A TDI value of less than 16 means anosmia, up to 30 points hyposmia and above 30.5 points normosmia [@pone.0019702-Hummel1]. Paper taste test strips (TST) by Burghart, Wedel, Germany, were used to determine the sense of taste [@pone.0019702-Mueller1]. The 16-part test checks the four tastes sweet, sour, salty and bitter in four different concentrations each. The test strip is placed in the centre of the front third of the top of the tongue. Prior to each application, the mouth is rinsed with water. A test value of below 9 indicates a reduced sense of taste. The patients were examined on a 1.5 Tesla MRI system (Symphony Vision, Siemens, Erlangen) using a standardised protocol to visualise the OB and the olfactory brain. The protocol contained 3 mm T2 turbo spin echo sequences (TR 3070 msec, TE 107 msec, Matrix 256×192, FOV 250 mm). 3 mm proton density sequences (TR 3070 msec, TE 18 msec, Matrix 256×192, FOV 250 mm) were applied to determine the MS lesion load by using axial sections. 3 mm T1-weighted sequences (TR 600 msec, TE 14 msec, Matrix 256×192, FOV 250 mm) were used for volumetric measurements of the olfactory brain. Isotropic, 0.5 mm thick, high-resolution, strongly T2-weighed CISS sequences (constructive interference in steady state, TR 8.56 msec, TE 4.28 msec, Matrix 256×205, FOV 130 mm) were performed additionally for volumetry of the OB. Gadolinum was applied as contrast agent to allow a detailed assessment of the MS lesions. The olfactory brain was defined as the piriform and entorhinal cortex, front agranular regions of the insular lobe up to the anterior comissure, orbitofrontal cortex. White matter in between these regions was also considered as part of the olfactory brain in order to take into account the fact that connections could have been damaged by MS lesions [@pone.0019702-Hummel2]. The volume of the OB ([Figure 1](#pone-0019702-g001){ref-type="fig"}) and the olfactory brain was determined with MRI by circumnavigating the contours in axial sections with the computer software Amira 3.2. ![CISS sequence of OB, axial view.](pone.0019702.g001){#pone-0019702-g001} We determined the number and volume of the lesions in the olfactory brain as well as in the rest of the brain. The examiners were blinded to the patient\'s olfactory test and EDSS scores. MRI measurements, olfactory and neurological testing have been performed on the same day. Statistical analysis was performed with SPSS (17.0, Chicago, USA). Correlations were determined with a bivariate regression analysis. The results of the MRI evaluation were compared with smell and taste test values using the Pearson and Spearman correlation. The significance level was defined at ≤0.05. The Welch test and the Brown-Forsythe test were used as statistic test method to check the equality of the mean values of different test parameters in patients with different types of progression. The Mann-Whitney U-test for independent samples was used to compare different control samples. The patients were recruited continuously from the MS centre, Charité Campus Mitte. A healthy control group of 30 persons whose gender, age and smoking habits coincided with that of the patients were recruited among the patients\' family members as well as among the hospital staff. All participants of the control group had to complete the same questionnaires and received an ENT examination in order to exclude the same causes for olfactory dysfunction as for the MS patients. Results {#s3} ======= 34 MS patients and 30 healthy control persons were examined. The volume of the OB ([Table 1](#pone-0019702-t001){ref-type="table"}) of the 34 patients correlated with the number of MS lesions in the olfactory brain (r = −0.34, p\<0.05) as well with the volume of the MS lesions in the olfactory brain (r = −0.37, p\<0.05). 10.1371/journal.pone.0019702.t001 ###### Results of the MRI examination. ![](pone.0019702.t001){#pone-0019702-t001-1} Mean value Standard deviation ---------------------------------------------- ---------------- -------------------- Total volume OB 128.0 mm^3^ ±41.54 mm^3^ Volume OB right 62.35 mm^3^ ±21.08 mm^3^ Volume OB left 65.65 mm^3^ ±22.89 mm^3^ Volume Olfactory Brain 38896.79 mm^3^ ±7731.36 mm^3^ Number of lesions in the Olfactory Brain 2.38 ±3.62 Volume lesions in the Olfactory Brain 90.37 mm^3^ ±171.42 mm^3^ Number of lesions in the Non Olfactory Brain 43.35 ±25.40 Volume of lesions in the Non Olfactory Brain 11599.0 mm^3^ ±14333.61 mm^3^ The volume of the olfactory brain correlated with the volume of the lesions in the olfactory brain (r = −0.33, p = 0.05) and the EDSS value (r = −0.37, p\<0.05). A significant difference of p = 0.03 was observed between the average volumes of the patient\'s olfactory brain with different types of progression of MS. The volumes of the patients with primary and secondary progressive form were lesser than those with relapsing-remitting progressive form. Subjective olfactometry using sniffing sticks showed hyposmia in 41% of 34 MS patients ([Table 2](#pone-0019702-t002){ref-type="table"}). In the healthy control group, 8% of the control persons showed hyposmia. 71% of MS patients with a decreased OB volume and 83% with a decreased olfactory brain volume displayed hyposmia. Nine of 34 patients refused the taste strip test. 16% of 25 patients had a gustatory dysfunction. In the control group, 5% of the patients had a taste disorder. 10.1371/journal.pone.0019702.t002 ###### Patient data: Results of olfactometry, gustometry and neurological examinations. ![](pone.0019702.t002){#pone-0019702-t002-2} Mean value Standard deviation ----------------------------- ------------ -------------------- Age (years) 41.4 ±12.4 Duration of disease (years) 6.1 ±7.9 TDI 31.5 ±4.0 T (threshold) 6.3 ±1.8 D (Discrimination) 12.4 ±2.5 I (Identification) 12.8 ±1.7 TST 10.8 ±2.8 EDSS 3.3 ±2.1 BDI 7.3 ±6.4 MMSE 28.9 ±1.1 The TST value correlated with the number of lesions in the olfactory brain (r = −0.49, p\<0.05) as well as their volumes (r = −0.52, p\<0.05). The TDI value correlated with the EDSS score (r = −0.54, p\<0.01). Discussion {#s4} ========== The olfactory sense is of great importance in everyday life. The olfactory organ is a control function of the body and warns us about toxic substances and spoilt food. Some neurological disorders go hand in hand with olfactory disorders [@pone.0019702-Ponsen1], [@pone.0019702-Mesholam1]. Detecting olfactory disorders is becoming increasingly important in the research of neurodegenerative diseases [@pone.0019702-Hawkes1]. There is a substantial need for diagnosis and the significance of imaging the olfactory system is also increasing continuously [@pone.0019702-Abolmaali1]. Special attention is paid to the OB, which seems to be an image of the neuronal afference of smelling due to its high plasticity [@pone.0019702-Abolmaali2]. A significant correlation between the OB volume and the olfactory ability was determined in several studies [@pone.0019702-Rombaux1], [@pone.0019702-Goektas1], [@pone.0019702-Buschhter1]. The olfactory ability is reduced with increasing OB hypoplasia [@pone.0019702-Rombaux1], [@pone.0019702-Goektas1], [@pone.0019702-Buschhter1]. An OB volume of \<100 mm^3^ was determined as the cut-off value for a reduced OB volume [@pone.0019702-Bauknecht1]. In several studies, reduced OB volumes were determined in patients with olfactory disorders of a post-infectious, post-traumatic and sinunasal genesis [@pone.0019702-Mueller2], [@pone.0019702-Rombaux2], [@pone.0019702-Yousem1]. A reduced OB volume was also observed in patients suffering from Alzheimer\'s disease and schizophrenia [@pone.0019702-Turetski1], [@pone.0019702-Thomann1]. The OB volumes were not reduced in patients suffering from Parkinson\'s disease [@pone.0019702-Hummel3]. In our study, we investigated the volume of the OB and the olfactory brain in MS patients and compared this to the number and volume of pathological lesions. The OB volume of the 34 MS patients was diminished with a mean value of 128 mm^3^ compared to the standard values of the normal population with the same age (134 mm^3^) [@pone.0019702-Buschhter1]. The correlation of number and volume of the plaques in the olfactory brain with the OB volume could explain the variability of the OB volumes in MS patients. The OB volume decreases with an increasing number and volume of MS lesions in the olfactory brain. These results may help to explain the occurrence of olfactory disorders in MS patients. The olfactory brain volume correlated with the volume of MS lesions in the olfactory brain as well as the EDSS score. A reduced olfactory brain volume was detected in two studies with patients suffering from Parkinson\'s and schizophrenia [@pone.0019702-Wattendorf1], [@pone.0019702-Turetsky1]. The larger the volume of the MS lesions in the olfactory brain, the more pronounced was the hypoplasia of the olfactory brain. 83% of patients with an olfactory brain volume of below 30000 mm^3^ displayed hyposmia. This correlation may also serve to explain olfactory disorders in MS patients. The olfactory brain volumes in MS patients with primary and secondary progression were significantly smaller than those of MS patients with relapsing-remitting progression. Demyelination with axon destruction results with chronic progredient progression, which might explain this significant difference in volume. The olfactory brain volume as well as the TDI value correlated with the EDSS score, which provides information about the degree of disability of the MS patient. Several MS patients reported about a subjective improvement resp. deterioration of their olfactory sense in case of changed physical symptoms, e.g. during an acute episode. The TDI score seems to uncover changes in the olfactory capacity in MS patients. The TST values correlated with the number and volume of the lesions in the olfactory brain. On a cortical level, the gustatory and olfactory systems intersect, above all in the insular cortex, the amygdala and the orbitofrontal cortex. On downstream paths of the OB\'s mitral cells from the piriform to the orbitofrontal cortex, the olfactory stimuli are linked with gustatory information in the anterior insula (multimodal integration). In our study, we investigated the volume of the OB and olfactory brain in MS patients for the first time and compared this to the number and volume of MS lesions. The correlation of a higher number and volume of MS lesions in the olfactory brain with a decreased OB and olfactory brain volume might explain the occurrence of olfactory dysfunction in MS patients. The results should be verified in a longitudinal study with a higher number of patients. **Competing Interests:**The authors have declared that no competing interests exist. **Funding:**The authors have no support or funding to report. [^1]: Conceived and designed the experiments: OG FF LH. Performed the experiments: OG FAS GB. Analyzed the data: FAS BD KE. Contributed reagents/materials/analysis tools: OG FF GB LH. Wrote the paper: OG FAS.
{ "pile_set_name": "PubMed Central" }
// Copyright 2017 the V8 project authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. // Flags: --allow-natives-syntax --expose-externalize-string (function() { function foo(s) { return "abcdefghijklm" + s; } assertTrue(isOneByteString(foo("0"))); assertTrue(isOneByteString(foo("0"))); %OptimizeFunctionOnNextCall(foo); assertTrue(isOneByteString(foo("0"))); })(); (function() { function foo(s) { return s + "abcdefghijklm"; } assertTrue(isOneByteString(foo("0"))); assertTrue(isOneByteString(foo("0"))); %OptimizeFunctionOnNextCall(foo); assertTrue(isOneByteString(foo("0"))); })(); (function() { function foo(s) { return "abcdefghijklm" + s; } assertFalse(isOneByteString(foo("\u1234"))); assertFalse(isOneByteString(foo("\u1234"))); %OptimizeFunctionOnNextCall(foo); assertFalse(isOneByteString(foo("\u1234"))); })(); (function() { function foo(s) { return s + "abcdefghijklm"; } assertFalse(isOneByteString(foo("\u1234"))); assertFalse(isOneByteString(foo("\u1234"))); %OptimizeFunctionOnNextCall(foo); assertFalse(isOneByteString(foo("\u1234"))); })(); (function() { function foo(s) { return "abcdefghijkl\u1234" + s; } assertFalse(isOneByteString(foo("0"))); assertFalse(isOneByteString(foo("0"))); %OptimizeFunctionOnNextCall(foo); assertFalse(isOneByteString(foo("0"))); })(); (function() { function foo(s) { return s + "abcdefghijkl\u1234"; } assertFalse(isOneByteString(foo("0"))); assertFalse(isOneByteString(foo("0"))); %OptimizeFunctionOnNextCall(foo); assertFalse(isOneByteString(foo("0"))); })();
{ "pile_set_name": "Github" }
BitLocker - The dirty details One of the new security features coming in Windows Vista and Longhorn is the new BitLocker™ Drive Encryption technology. BitLocker™ is designed to help prevent information loss, whether it is by theft or accidental. Information loss is costly to business on several levels, and the U.S. Department of Justice estimates that intellectual property theft cost enterprises $250 billion in 2004. BitLocker™ Drive Encryption gives you improved data protection on your notebooks, desktops, and servers by providing a transparent user experience that requires little to no interaction on a protected system. BitLocker also prevents the use of another operating system or hacking tool to break file and system protections by preventing the offline viewing of user data and OS files through enhanced data protection and boot validation using TPM v1.2. For those of you who may not know, TPM stands for Trusted Platform Module. So what’s that? TPM is a piece of hardware that is part of the motherboard that: Performs cryptographic functions RSA, SHA-1, RNG Meets encryption export requirements Can create, store, and manage keys Provides a unique Endorsement Key (EK) Provides a unique Storage Root Key (SRK) Performs digital signature operations Holds platform measurements (hashes) Anchors a chain of trust for keys and credentials Protects itself against attacks So now that you know what a TPM is, why should you use one? A TPM is a hardware implementation of a Root-of-Trust, which can be certified to be tamper resistant. When combined with software, it can protect root secrets better than software alone. A TPM can ensure that keys and secrets are only available for use when the environment is appropriate. The important thing to know about BitLocker is that it will only encrypt the Windows partition. You also won’t be able to dual-boot another operating system on the same partition, different partitions are fine. Any attempts to modify the protected Windows partition will render it unbootable. To completely protect all of the data on the computer, you will need to use a combination of BitLocker on the Windows partition and Encrypted File System (EFS) on the other partitions. When properly configured, EFS is computationally infeasible to crack. Even with all of the new security that is provided by BitLocker, it can’t stop everything. Some of the areas that BitLocker is helpless to defend against are: Hardware debuggers Online attacks—BitLocker is concerned only with the system’s startup process
{ "pile_set_name": "Pile-CC" }
Суд китайской провинции Гуандун приговорил десятерых человек к смертной казни. Семеро из них были осуждены за преступления, связанные с наркотиками, остальные — за убийства и грабежи, сообщает издание The Guardian. За четыре дня до публичного суда, который прошел перед тысячами зрителей в центре города Люфенг, местные жители получили приглашения на это событие в социальных сетях. Десятерых приговоренных к смертной казни привезли в автозаках под звуки сирен. Каждого преступника сопровождали четверо полицейских в темных очках. Осужденные по очереди поднимались на сцену и выслушивали свой приговор. Затем их увозили для приведения решения суда в исполнение. По словам корреспондента The Guardian, зрители снимали происходящее на мобильные телефоны, курили, общались между собой. Среди присутствующих были также школьники и студенты. Судебная система Китая известна тем, что прокуроры и суды имеют показатель осуждения в 99,9%. Согласно данным правозащитной организации Dui Hua Foundation, в прошлом году в стране привели в исполнение порядка 2 тысяч смертных приговоров. Власти Китая официальную статистику не разглашают. Публичные судебные процессы проходят в стране крайне редко.
{ "pile_set_name": "OpenWebText2" }
The Kennedys: After Camelot The Kennedys: After Camelot (also known as The Kennedys: Decline and Fall) is an American television drama miniseries based on the book After Camelot: A Personal History of the Kennedy Family 1968 to the Present by J. Randy Taraborrelli as a follow-up to the 2011 miniseries The Kennedys. Katie Holmes reprised her role as Jacqueline Kennedy Onassis, while Matthew Perry played Ted Kennedy, Alexander Siddig appeared as Aristotle Onassis and Kristen Hager as Joan Bennett Kennedy, Ted's wife. The two-part miniseries aired on Reelz on April 2, 2017, and April 9, 2017. Cast Katie Holmes as Jacqueline Kennedy Onassis Matthew Perry as Ted Kennedy Diana Hardcastle as Rose Kennedy Kristen Hager as Joan Bennett Kennedy Kristin Booth as Ethel Kennedy Alexander Siddig as Aristotle Onassis Barry Pepper as Robert F. Kennedy Brett Donahue as John F. Kennedy Jr. Tom Wilkinson as Joseph P. Kennedy, Sr. Erica Cox as Carolyn Bessette-Kennedy Episodes References External links Category:2017 American television series debuts Category:2017 American television series endings Category:2010s American drama television miniseries Category:2010s American political television series Category:Films about the Kennedy family Category:Cultural depictions of John F. Kennedy Category:Cultural depictions of Robert F. Kennedy Category:Cultural depictions of Jacqueline Kennedy Onassis Category:Cultural depictions of Aristotle Onassis
{ "pile_set_name": "Wikipedia (en)" }
Tumoral markers in tumors of the pineal region. In cases of pineal tumors, a germ cell tumor should always be suspected. As some of them are secreting tumors, tumoral markers (AFP and/or hGC) are an important part of the diagnostic process. Their positivity either in the serum and/or in the cerebrospinal fluid may lead to an accurate diagnosis, avoiding a potentially dangerous surgical biopsy. Follow-up of tumoral markers is useful during and after treatment in order to monitor response to chemotherapy or a remission status.
{ "pile_set_name": "PubMed Abstracts" }
<?xml version="1.0" encoding="utf-8"?> <html xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:f="http://typo3.org/ns/TYPO3/CMS/Fluid/ViewHelpers" xmlns:n="http://typo3.org/ns/GeorgRinger/News/ViewHelpers" data-namespace-typo3-fluid="true"> <rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title>{settings.list.rss.channel.title}</title> <link>{settings.list.rss.channel.link}</link> <description>{settings.list.rss.channel.description}</description> <language>{settings.list.rss.channel.language}</language> <f:if condition="{settings.list.rss.channel.copyright}"> <copyright>{settings.list.rss.channel.copyright}</copyright> </f:if> <pubDate><f:format.date format="r" date="now" /></pubDate> <lastBuildDate><f:format.date format="r" date="now" /></lastBuildDate> <f:if condition="{settings.list.rss.channel.category}"> <category>{settings.list.rss.channel.category}</category> </f:if> <atom:link href="{f:uri.page(pageType: 9818, absolute: 'true') -> f:format.htmlentities()}" rel="self" type="application/rss+xml" /> <generator>{settings.list.rss.channel.generator}</generator> <f:if condition="{news}"> <f:for each="{news}" as="newsItem"> <item> <guid isPermaLink="false">news-{newsItem.uid}</guid> <pubDate><f:format.date format="r">{newsItem.datetime}</f:format.date></pubDate> <title>{newsItem.title -> f:format.htmlspecialchars()}</title> <link><f:format.htmlentities><n:link newsItem="{newsItem}" settings="{settings}" configuration="{forceAbsoluteUrl: 1}" uriOnly="1" /></f:format.htmlentities></link> <description>{newsItem.teaser -> f:format.stripTags() -> f:format.htmlspecialchars()}</description> <content:encoded><f:format.cdata><f:format.html>{newsItem.bodytext}</f:format.html></f:format.cdata></content:encoded> <f:if condition="{newsItem.categories}"> <f:for each="{newsItem.categories}" as="newsItemCategory"> <category>{newsItemCategory.title -> f:format.htmlspecialchars()}</category> </f:for> </f:if> <f:if condition="{newsItem.firstPreview}"> <enclosure url="{f:uri.image(image:newsItem.firstPreview, absolute:1, maxWidth: '1920', maxHeight: '1920')}" length="{n:imageSize(property:'size')}" type="{newsItem.firstPreview.originalResource.mimeType}"/> </f:if> </item> </f:for> </f:if> </channel> </rss> </html>
{ "pile_set_name": "Github" }
Tallinn Airport is expanding air traffic area Tallin Airport has decided to expand it`s air traffic area. The construction work has begun already and will continue until 2017. Expansion of the air traffic area will improve flight safety and environmental friendliness and boost the capacity of the airport. But during construction work the runway will be closed between 00:30 and 6:00 on Mondays, Tuesdays, Thursdays and Fridays. These restrictions will not affect planned flights unless they are late arriving, in which case they may be diverted to Helsinki or Rīga. However, flight safety and the regular functioning of flights must be ensured at the airport while construction is ongoing. All airlines have been informed of the restrictions and flight schedules have taken them into account. Construction is being co-financed from the EU Cohesion Fund. The deadline for completion of the work is the end of 2017.
{ "pile_set_name": "Pile-CC" }
Administration of Cripto in GRP78 overexpressed human MSCs enhances stem cell viability and angiogenesis during human MSC transplantation therapy. The purpose of this study was to explore the effectiveness of concurrent GRP78 overexpression combined with Cripto on hMSC proliferation and migration both in vitro and in vivo. Specifically, we explored whether the treatment enhances effectiveness of hMSC transplantation in ischaemic tissue. Human MSCs obtained from human adipose tissue were cultured in α-minimum essential medium (Hyclone, Logan, UT, USA) supplemented with 10% (v/v) foetal bovine serum (Hyclone), 100 U mL-1 penicillin and 100 μg mL-1 streptomycin. Murine hindlimb ischaemic model was generated with 8-week-old male nude BALB/c mice (Biogenomics, Seoul, Korea) maintained under a 12-h light/dark cycle following the established protocol with minor modification. Cellular injection was performed no later than 3 hour after surgery. Lipofectamine transfection, single-cell cultivation assay, transwell assay, scratch wound-healing migration assay, immunohistochemistry and western blotting assays were performed. Overexpression of GRP78 along with Cripto enhanced hMSC proliferation, migration and invasion. It increased interaction of surface GRP78 receptor with Cripto via JAK2/STAT3 pathway. We confirmed our proposed mechanism by showing that treatment with GRP78 antibody blocks the enhancement in vitro. In vivo, we observed that Cripto induced by the hypoxic environment in hindlimb ischaemic model interacts with the overexpressed GRP78 and increases hMSC proliferation, migration and invasion potentials as well as angiogenesis around transplanted ischaemic site via cytokine secretions. These results demonstrate supporting evidences that GRP78-Cripto combination technique offers novel strategy to enhance MSC proliferation, migration and invasion potentials as well as angiogenesis around ischaemic site, ultimately facilitating MSC-based transplantation therapy in ischaemic conditions.
{ "pile_set_name": "PubMed Abstracts" }
In the final image Chief and Mickey gather what they can and prepare to move on. The mission is not over yet. I retained the colours in the background in this image as I thought the green plants against the white snow would make the scene look more hopeful. I like how Chief looks in this image not only because of how well his colours work and how in focus he is, but also he’s slightly looking down in remorse of his fallen friends.
{ "pile_set_name": "OpenWebText2" }
Personal: Parents are David Gilreath Sr. and Susie Pressley-Gilreath father played college basketball at Cal State Fullerton cousin, Travis Graham, played college football at Minnesota uncle, Cornelius Pressley, played college basketball at Florida Atlantic ... major is undeclared Notes: Also earned letters in baseball (two) and track (one) as a Minnesota prep. Played in all 13 games as a true freshman in 2007, setting a single-season school record for kickoff-return yards - caught one pass for 10 yards (10-yard average) and zero touchdowns, with seven rushes for 15 yards (2.1) and zero TDs. Also returned 42 kickoffs for 967 yards (23.0) and 26 punts for 364 yards (14.0). Started 9-of-13 games at the "X" receiver in '08, posting 31-520-3 (16.8) receiving, 25-285-2 (11.4) rushing, 19-175 (9.2) on punt returns and 39-767 (19.7) on kickoff returns. Underwent offseason surgery on both feet to repair stress fractures. In '09, tallied 12-177-0 (14.8) receiving and 19-75-2 (3.9) rushing with 21-117 (5.6) in 13 games (one start). Added 21-117 (5.6) on punt returns, including a 70-yard TD against Northwestern, and 26-615 (23.7) on kickoff returns. Played in 11 games (seven starts) in '10, registering 23-370-1 (16.1) receiving, 7-67-0 (9.6) rushing, 27-659-1 (24.4) on kickoff returns and 8-82-0 (10.2) on punt returns. In the Badgers' upset of No. 1 Ohio State, he returned the opening kickoff 97 yards for a score. Suffered a concussion against San Jose State and did not play against Arizona State and Austin Peay. Owns the Big Ten record for career kick-return yards (3,025). Positives: Quick-footed to make tacklers miss in the open field. Good hands. Flashes playmaking ability - makes big plays at key times. Is gutsy to catch in traffic and sacrifice his body. Effective on crossing routes and end-arounds - good run instincts. Outstanding kickoff-return production. Negatives: Undersized and frail - gets beat up like a rag doll and will struggle to stay in one piece. Lacks elite top-end speed. Needs room to operate. Marginal run strength. Underpowered blocker. Summary: Small, feisty perimeter receiver who could compete for a job as a backup "X" receiver if he can make his mark as a return man. That said, he is not built to survive in the slot and does not possess the elite explosion and agility to overlook durability concerns.
{ "pile_set_name": "Pile-CC" }
Q: How to change the name of a variable in a for loop I would like to change the name of a variable within a for loop, using the loop index in the name of the variable. I've tried the following syntax: A= [1,2,3] for i = 1:3 global x{i} x{i}=A[i] end This isn't the right syntax, and googling has not led me to the correct syntax. I've also tried A= [1,2,3] for i = 1:3 global x$i x$i=A[i] end My hope is to create three variables, x1, x2, and x3 each containing the appropriate element of A. Maybe I don't even need to write a loop to do this--I'm open to completely different methods of accomplishing this as well. A: As others have said, it's a bit questionable whether one should do this, but if this is really what you want to do, here's how you can do it: A = [1, 2, 3] for i = 1:3 @eval $(Symbol("x$i")) = $(A[i]) end after which these global variables are assigned: julia> x1, x2, x3 (1, 2, 3) The inner expression is equivalent to writing this: eval(:($(Symbol("x$i")) = $(A[i]))) In other words, you construct and then eval an assignment expression where the left hand side is the symbol x$i and the right hand side is the value of A[i]. Note that you can only define global variables like this, not local ones because eval always operates in global scope. Other languages have "local eval", Julia does not because the very possibility of local eval in a language makes optimization much harder.
{ "pile_set_name": "StackExchange" }
Histone Variants and Disease. In eukaryotes, the genome is organized into a complex nucleoprotein structure called chromatin. Despite the simplicity of its monomer, DNA and two copies of four histones, the existence of histone variants opens possibilities of multiple chromatin landscapes and fine-tune regulation of molecular mechanisms for the regulation of gene expression and maintenance of genome stability. However, any defects in these combinations may contribute to disease development and/or progression. Here, I review human histone variants and their chaperones, and discuss how they contribute to pathological conditions.
{ "pile_set_name": "PubMed Abstracts" }
// default includes #include "Global/Macros.h" CLANG_DIAG_OFF(mismatched-tags) GCC_DIAG_OFF(unused-parameter) GCC_DIAG_OFF(missing-field-initializers) GCC_DIAG_OFF(missing-declarations) GCC_DIAG_OFF(uninitialized) GCC_DIAG_UNUSED_LOCAL_TYPEDEFS_OFF #include <shiboken.h> // produces many warnings #include <pysidesignal.h> #include <pysideproperty.h> #include <pyside.h> #include <typeresolver.h> #include <typeinfo> #include "natronengine_python.h" #include "floatnodecreationproperty_wrapper.h" // Extra includes NATRON_NAMESPACE_USING NATRON_PYTHON_NAMESPACE_USING #include <vector> // Native --------------------------------------------------------- void FloatNodeCreationPropertyWrapper::pysideInitQtMetaTypes() { } FloatNodeCreationPropertyWrapper::FloatNodeCreationPropertyWrapper(const std::vector<double > & values) : FloatNodeCreationProperty(values) { // ... middle } FloatNodeCreationPropertyWrapper::FloatNodeCreationPropertyWrapper(double value) : FloatNodeCreationProperty(value) { // ... middle } FloatNodeCreationPropertyWrapper::~FloatNodeCreationPropertyWrapper() { SbkObject* wrapper = Shiboken::BindingManager::instance().retrieveWrapper(this); Shiboken::Object::destroy(wrapper, this); } // Target --------------------------------------------------------- extern "C" { static int Sbk_FloatNodeCreationProperty_Init(PyObject* self, PyObject* args, PyObject* kwds) { SbkObject* sbkSelf = reinterpret_cast<SbkObject*>(self); if (Shiboken::Object::isUserType(self) && !Shiboken::ObjectType::canCallConstructor(self->ob_type, Shiboken::SbkType< ::FloatNodeCreationProperty >())) return -1; ::FloatNodeCreationPropertyWrapper* cptr = 0; int overloadId = -1; PythonToCppFunc pythonToCpp[] = { 0 }; SBK_UNUSED(pythonToCpp) int numNamedArgs = (kwds ? PyDict_Size(kwds) : 0); int numArgs = PyTuple_GET_SIZE(args); PyObject* pyArgs[] = {0}; // invalid argument lengths if (numArgs + numNamedArgs > 1) { PyErr_SetString(PyExc_TypeError, "NatronEngine.FloatNodeCreationProperty(): too many arguments"); return -1; } if (!PyArg_ParseTuple(args, "|O:FloatNodeCreationProperty", &(pyArgs[0]))) return -1; // Overloaded function decisor // 0: FloatNodeCreationProperty(std::vector<double>) // 1: FloatNodeCreationProperty(double) if (numArgs == 0) { overloadId = 0; // FloatNodeCreationProperty(std::vector<double>) } else if (numArgs == 1 && (pythonToCpp[0] = Shiboken::Conversions::isPythonToCppConvertible(Shiboken::Conversions::PrimitiveTypeConverter<double>(), (pyArgs[0])))) { overloadId = 1; // FloatNodeCreationProperty(double) } else if ((pythonToCpp[0] = Shiboken::Conversions::isPythonToCppConvertible(SbkNatronEngineTypeConverters[SBK_NATRONENGINE_STD_VECTOR_DOUBLE_IDX], (pyArgs[0])))) { overloadId = 0; // FloatNodeCreationProperty(std::vector<double>) } // Function signature not found. if (overloadId == -1) goto Sbk_FloatNodeCreationProperty_Init_TypeError; // Call function/method switch (overloadId) { case 0: // FloatNodeCreationProperty(const std::vector<double > & values) { if (kwds) { PyObject* value = PyDict_GetItemString(kwds, "values"); if (value && pyArgs[0]) { PyErr_SetString(PyExc_TypeError, "NatronEngine.FloatNodeCreationProperty(): got multiple values for keyword argument 'values'."); return -1; } else if (value) { pyArgs[0] = value; if (!(pythonToCpp[0] = Shiboken::Conversions::isPythonToCppConvertible(SbkNatronEngineTypeConverters[SBK_NATRONENGINE_STD_VECTOR_DOUBLE_IDX], (pyArgs[0])))) goto Sbk_FloatNodeCreationProperty_Init_TypeError; } } ::std::vector<double > cppArg0; if (pythonToCpp[0]) pythonToCpp[0](pyArgs[0], &cppArg0); if (!PyErr_Occurred()) { // FloatNodeCreationProperty(std::vector<double>) cptr = new ::FloatNodeCreationPropertyWrapper(cppArg0); } break; } case 1: // FloatNodeCreationProperty(double value) { double cppArg0; pythonToCpp[0](pyArgs[0], &cppArg0); if (!PyErr_Occurred()) { // FloatNodeCreationProperty(double) cptr = new ::FloatNodeCreationPropertyWrapper(cppArg0); } break; } } if (PyErr_Occurred() || !Shiboken::Object::setCppPointer(sbkSelf, Shiboken::SbkType< ::FloatNodeCreationProperty >(), cptr)) { delete cptr; return -1; } if (!cptr) goto Sbk_FloatNodeCreationProperty_Init_TypeError; Shiboken::Object::setValidCpp(sbkSelf, true); Shiboken::Object::setHasCppWrapper(sbkSelf, true); Shiboken::BindingManager::instance().registerWrapper(sbkSelf, cptr); return 1; Sbk_FloatNodeCreationProperty_Init_TypeError: const char* overloads[] = {"list = std.vector< double >()", "float", 0}; Shiboken::setErrorAboutWrongArguments(args, "NatronEngine.FloatNodeCreationProperty", overloads); return -1; } static PyObject* Sbk_FloatNodeCreationPropertyFunc_getValues(PyObject* self) { ::FloatNodeCreationProperty* cppSelf = 0; SBK_UNUSED(cppSelf) if (!Shiboken::Object::isValid(self)) return 0; cppSelf = ((::FloatNodeCreationProperty*)Shiboken::Conversions::cppPointer(SbkNatronEngineTypes[SBK_FLOATNODECREATIONPROPERTY_IDX], (SbkObject*)self)); PyObject* pyResult = 0; // Call function/method { if (!PyErr_Occurred()) { // getValues()const const std::vector<double > & cppResult = const_cast<const ::FloatNodeCreationProperty*>(cppSelf)->getValues(); pyResult = Shiboken::Conversions::copyToPython(SbkNatronEngineTypeConverters[SBK_NATRONENGINE_STD_VECTOR_DOUBLE_IDX], &cppResult); } } if (PyErr_Occurred() || !pyResult) { Py_XDECREF(pyResult); return 0; } return pyResult; } static PyObject* Sbk_FloatNodeCreationPropertyFunc_setValue(PyObject* self, PyObject* args, PyObject* kwds) { ::FloatNodeCreationProperty* cppSelf = 0; SBK_UNUSED(cppSelf) if (!Shiboken::Object::isValid(self)) return 0; cppSelf = ((::FloatNodeCreationProperty*)Shiboken::Conversions::cppPointer(SbkNatronEngineTypes[SBK_FLOATNODECREATIONPROPERTY_IDX], (SbkObject*)self)); int overloadId = -1; PythonToCppFunc pythonToCpp[] = { 0, 0 }; SBK_UNUSED(pythonToCpp) int numNamedArgs = (kwds ? PyDict_Size(kwds) : 0); int numArgs = PyTuple_GET_SIZE(args); PyObject* pyArgs[] = {0, 0}; // invalid argument lengths if (numArgs + numNamedArgs > 2) { PyErr_SetString(PyExc_TypeError, "NatronEngine.FloatNodeCreationProperty.setValue(): too many arguments"); return 0; } else if (numArgs < 1) { PyErr_SetString(PyExc_TypeError, "NatronEngine.FloatNodeCreationProperty.setValue(): not enough arguments"); return 0; } if (!PyArg_ParseTuple(args, "|OO:setValue", &(pyArgs[0]), &(pyArgs[1]))) return 0; // Overloaded function decisor // 0: setValue(double,int) if ((pythonToCpp[0] = Shiboken::Conversions::isPythonToCppConvertible(Shiboken::Conversions::PrimitiveTypeConverter<double>(), (pyArgs[0])))) { if (numArgs == 1) { overloadId = 0; // setValue(double,int) } else if ((pythonToCpp[1] = Shiboken::Conversions::isPythonToCppConvertible(Shiboken::Conversions::PrimitiveTypeConverter<int>(), (pyArgs[1])))) { overloadId = 0; // setValue(double,int) } } // Function signature not found. if (overloadId == -1) goto Sbk_FloatNodeCreationPropertyFunc_setValue_TypeError; // Call function/method { if (kwds) { PyObject* value = PyDict_GetItemString(kwds, "index"); if (value && pyArgs[1]) { PyErr_SetString(PyExc_TypeError, "NatronEngine.FloatNodeCreationProperty.setValue(): got multiple values for keyword argument 'index'."); return 0; } else if (value) { pyArgs[1] = value; if (!(pythonToCpp[1] = Shiboken::Conversions::isPythonToCppConvertible(Shiboken::Conversions::PrimitiveTypeConverter<int>(), (pyArgs[1])))) goto Sbk_FloatNodeCreationPropertyFunc_setValue_TypeError; } } double cppArg0; pythonToCpp[0](pyArgs[0], &cppArg0); int cppArg1 = 0; if (pythonToCpp[1]) pythonToCpp[1](pyArgs[1], &cppArg1); if (!PyErr_Occurred()) { // setValue(double,int) cppSelf->setValue(cppArg0, cppArg1); } } if (PyErr_Occurred()) { return 0; } Py_RETURN_NONE; Sbk_FloatNodeCreationPropertyFunc_setValue_TypeError: const char* overloads[] = {"float, int = 0", 0}; Shiboken::setErrorAboutWrongArguments(args, "NatronEngine.FloatNodeCreationProperty.setValue", overloads); return 0; } static PyMethodDef Sbk_FloatNodeCreationProperty_methods[] = { {"getValues", (PyCFunction)Sbk_FloatNodeCreationPropertyFunc_getValues, METH_NOARGS}, {"setValue", (PyCFunction)Sbk_FloatNodeCreationPropertyFunc_setValue, METH_VARARGS|METH_KEYWORDS}, {0} // Sentinel }; } // extern "C" static int Sbk_FloatNodeCreationProperty_traverse(PyObject* self, visitproc visit, void* arg) { return reinterpret_cast<PyTypeObject*>(&SbkObject_Type)->tp_traverse(self, visit, arg); } static int Sbk_FloatNodeCreationProperty_clear(PyObject* self) { return reinterpret_cast<PyTypeObject*>(&SbkObject_Type)->tp_clear(self); } // Class Definition ----------------------------------------------- extern "C" { static SbkObjectType Sbk_FloatNodeCreationProperty_Type = { { { PyVarObject_HEAD_INIT(&SbkObjectType_Type, 0) /*tp_name*/ "NatronEngine.FloatNodeCreationProperty", /*tp_basicsize*/ sizeof(SbkObject), /*tp_itemsize*/ 0, /*tp_dealloc*/ &SbkDeallocWrapper, /*tp_print*/ 0, /*tp_getattr*/ 0, /*tp_setattr*/ 0, /*tp_compare*/ 0, /*tp_repr*/ 0, /*tp_as_number*/ 0, /*tp_as_sequence*/ 0, /*tp_as_mapping*/ 0, /*tp_hash*/ 0, /*tp_call*/ 0, /*tp_str*/ 0, /*tp_getattro*/ 0, /*tp_setattro*/ 0, /*tp_as_buffer*/ 0, /*tp_flags*/ Py_TPFLAGS_DEFAULT|Py_TPFLAGS_BASETYPE|Py_TPFLAGS_CHECKTYPES|Py_TPFLAGS_HAVE_GC, /*tp_doc*/ 0, /*tp_traverse*/ Sbk_FloatNodeCreationProperty_traverse, /*tp_clear*/ Sbk_FloatNodeCreationProperty_clear, /*tp_richcompare*/ 0, /*tp_weaklistoffset*/ 0, /*tp_iter*/ 0, /*tp_iternext*/ 0, /*tp_methods*/ Sbk_FloatNodeCreationProperty_methods, /*tp_members*/ 0, /*tp_getset*/ 0, /*tp_base*/ 0, /*tp_dict*/ 0, /*tp_descr_get*/ 0, /*tp_descr_set*/ 0, /*tp_dictoffset*/ 0, /*tp_init*/ Sbk_FloatNodeCreationProperty_Init, /*tp_alloc*/ 0, /*tp_new*/ SbkObjectTpNew, /*tp_free*/ 0, /*tp_is_gc*/ 0, /*tp_bases*/ 0, /*tp_mro*/ 0, /*tp_cache*/ 0, /*tp_subclasses*/ 0, /*tp_weaklist*/ 0 }, }, /*priv_data*/ 0 }; } //extern static void* Sbk_FloatNodeCreationProperty_typeDiscovery(void* cptr, SbkObjectType* instanceType) { if (instanceType == reinterpret_cast<SbkObjectType*>(Shiboken::SbkType< ::NodeCreationProperty >())) return dynamic_cast< ::FloatNodeCreationProperty*>(reinterpret_cast< ::NodeCreationProperty*>(cptr)); return 0; } // Type conversion functions. // Python to C++ pointer conversion - returns the C++ object of the Python wrapper (keeps object identity). static void FloatNodeCreationProperty_PythonToCpp_FloatNodeCreationProperty_PTR(PyObject* pyIn, void* cppOut) { Shiboken::Conversions::pythonToCppPointer(&Sbk_FloatNodeCreationProperty_Type, pyIn, cppOut); } static PythonToCppFunc is_FloatNodeCreationProperty_PythonToCpp_FloatNodeCreationProperty_PTR_Convertible(PyObject* pyIn) { if (pyIn == Py_None) return Shiboken::Conversions::nonePythonToCppNullPtr; if (PyObject_TypeCheck(pyIn, (PyTypeObject*)&Sbk_FloatNodeCreationProperty_Type)) return FloatNodeCreationProperty_PythonToCpp_FloatNodeCreationProperty_PTR; return 0; } // C++ to Python pointer conversion - tries to find the Python wrapper for the C++ object (keeps object identity). static PyObject* FloatNodeCreationProperty_PTR_CppToPython_FloatNodeCreationProperty(const void* cppIn) { PyObject* pyOut = (PyObject*)Shiboken::BindingManager::instance().retrieveWrapper(cppIn); if (pyOut) { Py_INCREF(pyOut); return pyOut; } const char* typeName = typeid(*((::FloatNodeCreationProperty*)cppIn)).name(); return Shiboken::Object::newObject(&Sbk_FloatNodeCreationProperty_Type, const_cast<void*>(cppIn), false, false, typeName); } void init_FloatNodeCreationProperty(PyObject* module) { SbkNatronEngineTypes[SBK_FLOATNODECREATIONPROPERTY_IDX] = reinterpret_cast<PyTypeObject*>(&Sbk_FloatNodeCreationProperty_Type); if (!Shiboken::ObjectType::introduceWrapperType(module, "FloatNodeCreationProperty", "FloatNodeCreationProperty*", &Sbk_FloatNodeCreationProperty_Type, &Shiboken::callCppDestructor< ::FloatNodeCreationProperty >, (SbkObjectType*)SbkNatronEngineTypes[SBK_NODECREATIONPROPERTY_IDX])) { return; } // Register Converter SbkConverter* converter = Shiboken::Conversions::createConverter(&Sbk_FloatNodeCreationProperty_Type, FloatNodeCreationProperty_PythonToCpp_FloatNodeCreationProperty_PTR, is_FloatNodeCreationProperty_PythonToCpp_FloatNodeCreationProperty_PTR_Convertible, FloatNodeCreationProperty_PTR_CppToPython_FloatNodeCreationProperty); Shiboken::Conversions::registerConverterName(converter, "FloatNodeCreationProperty"); Shiboken::Conversions::registerConverterName(converter, "FloatNodeCreationProperty*"); Shiboken::Conversions::registerConverterName(converter, "FloatNodeCreationProperty&"); Shiboken::Conversions::registerConverterName(converter, typeid(::FloatNodeCreationProperty).name()); Shiboken::Conversions::registerConverterName(converter, typeid(::FloatNodeCreationPropertyWrapper).name()); Shiboken::ObjectType::setTypeDiscoveryFunctionV2(&Sbk_FloatNodeCreationProperty_Type, &Sbk_FloatNodeCreationProperty_typeDiscovery); FloatNodeCreationPropertyWrapper::pysideInitQtMetaTypes(); }
{ "pile_set_name": "Github" }
Fiat Bravo All Servicing Your Fiat Bravo All is in the safe hands of our team of qualified technicians and mechanics. Using the latest equipment and techniques allow us to provide the highest standards of Fiat servicing to our customers in Blackpool. All Fiat CBS will include parts as listed and any manufacture recommendations or repairs necessary will be advised and reported. Fiat Bravo All Call one of our friendly team 01851 702 326 for more information and to make an appointment. Interim £POA Every 12 months Oil & Filter change Major £POA Every 12 months PRE-ENGINE CHECKS Check vehicle history Check timing belt replacement interval* Check for damage to bodywork, lamps, trims and oil level Fit protective covers Check condition and operation of all seat belts Check operation of interior and exterior lights Check operation of ABS and air bag warning lights* Check air conditioning operation including bad odour* Check windscreen washers and wipers Check horn Check operation of suspension dampers Lubricate all door hinges, locks, and bonnet catches Apply Forté treatments to remove internal contamination Check fuel cap UNDER THE BONNET Check cooling system including fan operation Check and record Anti-Freeze protection Check and record brake fluid condition Check all auxiliary drive belts (not timing belt) Check engine breather system Check vacuum pipes Check power steering operation and fluid condition Check throttle body Clean if required Check battery level and lubricate terminals Check and top up all under bonnet fluid levels Replace air filter* Replace spark plugs* Replace fuel filter* Replace pollen filter* VEHICLE RAISED Change oil, filter and fit new sump plug washer Check fuel lines and brake pipes Check the condition and security of the exhaust Check and top up axle and transfer box oil levels* Check and top up gearbox oil level Check all steering and suspension joints, mountings and gaiters Carry out tyre report Check all wheel bearings for excessive ‘play’ and noise (adjust) Check CV gaiters and joints for wear or splits Check clutch cable/cylinder* Grease all greasing points* Check operation and condition of front brakes Check operation and condition of rear brakes (inc handbrake) Carry out brake report VEHICLE LOWERED Refill engine with specified grade oil Torque wheel nuts/studs TO FINISH Road test vehicle and report any findings Re-check engine oil level Carry out emission report Reset service level indicator* Ensure all upholstery, gear lever, steering wheel, etc are clean Stamp service book(s) *where applicable TYRE REPORT Condition Tread Pressure BRAKE REPORT Pads / Shoes Discs / Drums Brake Fluid Condition check NOTE: Additional service operations may be required for your vehicle make/model and will be charged at extra cost Your Fiat Warranty Through the updated European law " Block Exemption" (2003) and by using genuine parts which are of "Original Equipment" (OE) quality standard, your warranty will remain protected when serviced here. We can also stamp your Fiat service book. CAR SERVICING When you visit or interact with our sites, services, applications, tools or messaging, we or our authorized service providers may use cookies, web beacons, and other similar technologies for storing information to help provide you with a better, faster, and safer experience and for advertising purposes. To find out more about how we use cookies and similar technologies please see our Cookies Policy. We take your privacy seriously. To find out how we collect, store and process personal data on our websites please see our privacy policy.
{ "pile_set_name": "Pile-CC" }
The LG V20 is slated to be shown off early next month, but LG is already starting the hype machine. They have released a new teaser poster for the device that showcases the audio features. The poster includes an image of the phone on top of a microphone stand and the phrase “hear, see and more.” We already know that the LG V20 will have 32-bit HiFi Quad Digital to Analog Converter (DAC), which is a first for a smartphone. Obviously, audio is a big focus for this device. The V10 had a single DAC, which was already a big bump above the competition. The V20 will blow everyone out of the park. Audiophiles will love the device, but will the average person care? Probably not so much. [via ZDNet]
{ "pile_set_name": "OpenWebText2" }
The Dance (1962 film) The Dance (French: La gamberge) is a 1962 French comedy film directed by Norbert Carbonnaux and starring Jean-Pierre Cassel, Françoise Dorléac and Arletty. The film is based on the French comic strip . Cast Jean-Pierre Cassel as Albert Françoise Dorléac as Françoise Arletty as La mère d'Albert Jean Poiret as Vieux Michel Serrault as Pétrarque Micheline Francey as La tante Evelyne Ker as Antoinette Michel Vitold as Antonin Denise Gence as La directrice de l'institut Saint-Marc Christian Marin as Le caméraman Régine as Régine Raoul Saint-Yves Marie-Claude Breton Hélène Dieudonné as La grand-mère de Françoise Pierre Duncan as Le boucher Louis Saintève as Le grand-père de Françoise Sophie Leclair Lydia Rogier Pascal Fardoulis Françoise Deldick François Billetdoux as Le religieux Jean-Jacques Debout as Le soupirant de Françoise Denise Péronne as Une élève danseuse Roger Trapp as Un élève danseur References Bibliography Quinlan, David. Quinlan's Film Stars. Batsford, 2000. External links Category:1960s comedy films Category:French comedy films Category:1962 films Category:French films Category:French-language films Category:Films directed by Norbert Carbonnaux Category:Films based on French comics Category:Live-action films based on comics Category:Films based on comic strips
{ "pile_set_name": "Wikipedia (en)" }
Phase sensitive amplification based on quadratic cascading in a periodically poled lithium niobate waveguide. We propose and demonstrate phase-sensitive amplification based on cascaded second harmonic generation and difference frequency generation within a periodically poled lithium niobate waveguide. Excellent agreement between our numerical simulations and proof-of-principle experiments using a 3-cm waveguide device operating at wavelengths around 1550 nm is obtained. Our experiments confirm the validity and practicality of the approach and illustrate the broad gain bandwidths achievable. Additional simulation results show that the maximum gain/attenuation factor increases quadratically with input pump power, reaching a value of +/- 19.0 dB at input pump powers of 33 dBm for a 3 cm-long waveguide. Increased gains/reduced powers for a fixed gain could be achieved using longer crystals.
{ "pile_set_name": "PubMed Abstracts" }
Would Cyburbia Consulting LLP be interested? Zhengzhou Zhengdongxinqu District Administrative Committee and Zhengzhou Municipal Planning Bureau are calling for international bidding for the Schematic Design of the Public Space Systems and Riparian Engineering for the Longhu Area, Zhengdong New District, Zhengzhou, China. The project covers about 50 sq. km. which includes a 6.08 sq. km. man-made lake and canal. More details on the project and the prequalification form can be found at: http://www.zhengdong.gov.cn/en.htm Anyone want to take a crack at it in their spare time? Too lazy to beat myself up for being to lazy to beat myself up for being too lazy to... well you get the point....
{ "pile_set_name": "Pile-CC" }
The work being carried on is quite varied in method and approach, but has one consistent aspect: the application of conditioning and training theories and methods to the empirical analysis of concepts important to theories of social behavior, motivation, psychopathology, and personality development. The major focus has been aversive control but now the emphasis is shifting to the aversive, motivational after-effects of terminating positively-reinforcing stimuli rather than the aversive, motivational effects of the onset of aversive stimuli. Specific research areas: (1) the interaction of Pavlovian conditioning and instrumental learning; how appetitive and aversive Pavlovian conditioning modify instrumental responses of either appetitive or aversive origin; (2) tests of an opponent-process theory of affect and motivation.
{ "pile_set_name": "NIH ExPorter" }
Robo-adviser Betterment raises $60 million, led by Francisco Partners NEW YORK (Reuters) - Betterment LLC raised $60 million (£39 million) from private equity firm Francisco Partners and other investors, the company said on Tuesday, the latest vote of confidence in the ability of so-called robo-advisers to take on traditional brokers. New York-based Betterment, which uses algorithms to design portfolios of exchange-traded funds based on questionnaires filled out by clients, has raised a total of $105 million in four rounds of funding since its founding in 2009. "We didn't really need more but we are growing so fast and getting such demand from investors that we took advantage of it while we could," Jon Stein, founder and chief executive of Betterment, said in a phone interview. The firm still had about $20 million from its last funding round in April, he said. Robo-advisers such as Betterment, Wealthfront Inc. and Personal Capital raised $290 million in venture capital funding in 2014, according to CB Insights, and the turf is becoming competitive. Charles Schwab Corp will launch a free robo-service next month for people who make about $100,000 annually, while Fidelity Investments, TD Ameritrade and other discount brokers are referring some independent investment advisers who use their services to Betterment or its rivals. About 90 such advisers are exploring whether Betterment's cut-rate services are appropriate for potential clients they usually ignore because they do not meet their minimum net worth requirements, Stein said. Robo-advisers are significantly less expensive than investment advisers and brokerage firms that typically charge 1 percent or more of the assets they manage in advisory accounts. Clients with less than $10,000 at Betterment pay $3 a month (unless they regularly deposit $100 monthly) while those with $100,000 are charged 0.15 percent of the total. Betterment will deploy some of its $80 million of cash to hire 30 more people this year - about half of whom will be engineers and analysts and the rest customer services representatives, Stein said. The firm, which now has about 90 employees, also plans to upgrade its system for moving customer funds from outside brokers and to enhance online planning features to help customers set retirement and other goals. Betterment's typical customer is 36 with a liquid net worth of $200,000, belying the stereotype that robo-advisers appeal to first-time Millennial investors, Stein said. About 25 percent of assets at the firm, he added, are from people over age 50. Stein would not discuss Betterment's valuation, revenue or profitability.
{ "pile_set_name": "Pile-CC" }
using CleanArchitecture.Web; using System.Net.Http; using System.Threading.Tasks; using Xunit; namespace CleanArchitecture.FunctionalTests { public class HomeControllerIndex : IClassFixture<CustomWebApplicationFactory<Startup>> { private readonly HttpClient _client; public HomeControllerIndex(CustomWebApplicationFactory<Startup> factory) { _client = factory.CreateClient(); } [Fact] public async Task ReturnsViewWithCorrectMessage() { HttpResponseMessage response = await _client.GetAsync("/"); response.EnsureSuccessStatusCode(); string stringResponse = await response.Content.ReadAsStringAsync(); Assert.Contains("CleanArchitecture.Web", stringResponse); } } }
{ "pile_set_name": "Github" }
IGF-I is a hormone with a molecular structure similar to insulin. It is a peptide produced by the liver and contains 70 amino acids in a single chain with three intramolecular disulfide bridges. IGF-I has a molecular weight of about 7,649 Da, and is highly protein bound in serum. Production is stimulated by growth hormone and can be retarded by undernutrition, growth hormone insensitivity, lack of growth hormone receptors, or failure of a downstream signaling pathway. IGF-I plays an important role in childhood growth and continues to have anabolic effects in adults. Insulin-like growth factor II (IGF-II) is also a hormone with a molecular structure similar to insulin. It is a single chain peptide that contains 67 amino acids. IGF-II has a molecular weight of about 7,505 Da, and is highly protein bound in serum. IGF-II is used as an adjunct to insulin-like growth factor I (IGF-I) in clinical evaluation of growth hormone-related disorders. IGF-II plays a role primarily in fetal growth and development by interplaying with IGF-I and different cell surface receptors and circulating binding proteins to modulate tissue growth. IGF-II levels are reduced in children and adults as a result of growth hormone deficiency or malnutrition. Increased IGF-II serum levels may be observed in acromegaly or with exogenous administration of IGF-I. Thus, measurement of circulating IGF-II levels (i.e. in plasma/serum) is an important tool in management of several growth hormone-related disorders. In addition, measurement of circulating IGF-II is also a valuable tool in various epidemiological research areas and clinical trials. IGF-I and IGF-II have proven to be particularly challenging to quantitatively analyze with a “bottom up” approach (i.e., enzymatic digestion and quantitation of one or more of the resulting peptides). For example, de Kock, et al. reported that typical trypsin, chymotrypsin, and pepsin digestion methods result in low digestion yield and non-specific enzyme cleavage. de Kock, et al., Rapid Commun. Mass Spectrom., 2001, 15:1191-97. de Kock, et al. suggested that the unsatisfactory digestion results were likely due to steric restriction of the proteolytic enzymes by IGF-I's three disulfide bonds. Id. Efforts have been made to develop methods to analyze IGF-I and IGF-II, including by a variety of mass spectrometric techniques. For example, analysis of IGF-I has been reported using LC-ion trap MS with single ion monitoring (SIM). See, e.g., Id.; Bobin, et al., Analyst, 2001, 126:1996-2001; and Popot, et al., Chromatographia, 2001, 54:737-741 (Popot I). These references disclose LC-ESI-ion trap MS of intact IGF-I at charge states ranging from 4+ to 9+ in SIM mode. More recently, LC-MS/MS techniques using multiple reaction monitoring (MRM) have been disclosed. Popot II reports quantitative analysis of IGF-I at charge states ranging from 4+ to 9+ using LC-ion trap MS with SIM, followed by qualitative confirmation of the analyte with LC-ion trap MS/MS using MRM. Popot, et al., Anal Bioanal Chem, 2008, 390:1843-52 (Popot II). The MRM experiments use selected multicharged IGF-I ions (7+ and 8+) as precursor ions in the fragmentation experiments. Bredehöft, et al. reports using an orbitrap mass spectrometric instrument to qualitatively determine the mass to charge ratios of precursor and product ions of IGF-I and use of the identified ions for subsequent IGF-I quantitation using LC-triple quadrupole MS/MS. Bredehöft, et al., Rapid Commun. Mass Spectrom., 2008, 22:477-485. Similarly, analysis of IGF-II has been reported using enzymatic digestion followed by mass spectrometric analysis of the digestion products. See, e.g., Smith et al., J. Biol. Chem., 1989, 16:9314-9321; and Bayne et al., Peptide Research, 1990, 6:271-273. Other studies have been reported for analysis of mass spectrometric detection of intact IGF-II. See, e.g., Hampton et al., J. Biol. Chem., 1989, 32:19155-19160; Hayne, et al., J. Chromatog. 1991, 52:391-402; Wadensten, et al., Biotech. and App. Biochem., 1991, 13:412-421; Jespersen, et al., J. Mass Spectrom., 1996, 31:893-900; and Nelson, et al., J. Proteome, 2004, 3:851-855. These references report detection of intact IGF-II with plasma desorption and MALDI-TOF mass spectrometric techniques. Hampton et al. detects charge states ranging from 1+ to 3+. All but Hampton et al. detect IGF-II at a 1+ charge state.
{ "pile_set_name": "USPTO Backgrounds" }
Geologic Time: Our Old Earth We know that the Earth is very old – about 4.6 billion years old. This huge amount of time is called geologic time. Our understanding of Earth’s age comes from its rocks. The rocks that are exposed at Earth’s surface are all different ages. Some are quite young, recently made by volcanoes spitting lava or beach sand that was cemented together. Others are quite old, exposed as plate tectonic movements push ancient rocks to the surface or as younger rocks weather away. Scientists who study these rock layers have developed our understanding of geologic time based on their findings. Basically, the 4.6 billion years of geologic time is expressed graphically in a timeline divided into broad sections of time called Eras and smaller sections of time called Periods. Having names for the different time periods helps people communicate about when events happened long ago such as when a dinosaur lived, when a volcano erupted, or when an asteroid hit. You might also be interested in: Diversity among the ancestors of such marine creatures as clams, sand dollars and lobsters showed only a modest rise beginning 144 million years ago with no clear trend afterwards, according to an international...more A team of researchers, led by Stony Brook University paleontologist David Krause, has discovered the remains in Madagascar of what may be the largest frog ever to exist. The 16-inch, 10-pound ancient frog,...more New scientific findings by geologist Robert Gastaldo of Colby College in Waterville, Maine, and colleagues call into question popular theories about the largest mass extinction in Earth's history. A paper...more Scientists have discovered the missing link between whales and their four-footed ancestors. The result is reported in this week's issue of the journal Nature. The research is funded by the National Science...more Measuring sea level, the level of the ocean surface, continually over many years allows scientists to calculate whether sea level is changing. This helps us to understand how much sea level rise is happening...more If you are curious about Earth's periodic mass extinction events such as the sudden demise of the dinosaurs 65 million years ago, you might consider crashing asteroids and sky-darkening super volcanoes...more Canadian bedrock more than 4 billion years old may be the oldest known section of the Earth's early crust. Scientists at the Carnegie Institution of Washington and McGill University in Montreal used geochemical...more
{ "pile_set_name": "Pile-CC" }
Anticonvulsant activity of phenobarbital and valproate against maximal electroshock in mice during chronic treatment with caffeine and caffeine discontinuation. We evaluated the protective activity (expressed as ED50 values in mg/kg of phenobarbital (PB, 120 min before testing) and valproate (30 min) alone or combined with caffeine in male mice with seizures induced by maximal electroshock (MES). Both antiepileptic drugs (AEDs) were administered by intraperitoneal (i.p.) injection in a single dose to mice receiving intraperitoneal caffeine either in a single dose 30 min before the test or as pretreatment every 12 h for 3 and 14 days. In addition, we determined the ED50 values of the AEDs 24 and 72 h after 14-day treatment with caffeine. Finally, we studied the influence of a challenge dose of caffeine, injected in mice 24 and 72 h after 14 days of treatment with caffeine, on the protective activity of PB or VPA. Caffeine in a single dose of 23.1 mg/kg reduced the anticonvulsant effect of PB. Its protective activity was further impaired after 3 and 14 days of caffeine treatment. The ED50 for VPA was significantly increased both by the single dose of caffeine and by chronic treatment. The anticonvulsant activity of PB and VPA measured 24 and 72 h after 14-day treatment with caffeine did not differ from control values, but a challenge dose of caffeine injected 24 or 72 h after daily injections for 14 days resulted in a significant reduction in the protective activity of both AEDs. Measurement of the total plasma levels of caffeine, VPA, and PB did not suggest pharmacokinetic interactions as an explanation for our results. Our results indicate that chronic caffeine exposure may progressively reduce the antiepileptic potency of VPA and PB.
{ "pile_set_name": "PubMed Abstracts" }
Shop Chicken Drumsticks $11.52 All our chickens are raised on pasture and are moved to fresh grass every day. Living outside and grazing naturally keeps our birds healthy, which means we don’t have to treat them with hormones or antibiotics. Their diet is supplemented with a GMO-free, custom-mixed grain full of nutrients.
{ "pile_set_name": "Pile-CC" }
An ancient oak tree marking the border between England and Wales has fallen after being badly damaged in a storm. The 1,000 year-old Buttington oak, one of the oldest trees in Wales, had stood for centuries along Offa's Dyke. It was found in its field, two miles from the town of Welshpool in Powys, after splitting in half by high winds last year. Exactly what caused the tree to topple is unclear, but self-proclaimed 'tree-hunter' Rob McBride, who records ancient trees, believes it was not protected well enough. He told Sky News: "It's very sad what has been allowed to happen to a magnificent tree. It sits on a flood plain, so that might have had some impact on it structurally, but the main damage was caused by storms last year." The tree is thought to have been named after the Battle of Buttington, fought in 893 between a Viking army and an alliance of Anglo-Saxons and Welsh. According to Mr McBride, joint founder and director of TREEspect CIC, who discovered the fallen tree, the oak was of enormous cultural significance as it was a pollard - it had not grown in the field naturally and had been pruned in a certain way. "When I saw it on its side from the road, I can't repeat what I said. It's such a pity as this was the largest tree on Offa's Dyke and the second-largest oak in Wales, and the largest easily accessible to the public. "This would have been a working tree over the years, providing the local community with wood for weapons. "This whole area is full of historical importance. There have been two great battles here and not far away marks the England-Wales border." Mr McBride said the mighty oak had a girth of 11m, which would make it about 1,000 years old. He called for better protection for trees in the UK, telling Sky News: "If this tree was in Europe it would have a blue plaque protecting it and a fence around it. This wouldn't have been allowed to happen. "We need to give these fantastic icons of the British countryside better protection, and give them the same status we give to our famous buildings." The Battle of Buttington saw the invading Vikings defeated by the combined English and Welsh army. Offa, king of the Mercians - a warrior tribe in central England - between 757 and 796, had earlier ordered the Dyke be built to act as a defence against the Welsh. It was constructed at the end of the 8th century and runs for 140 miles from the mouth of the River Dee in the north to that of the Wye in the south.
{ "pile_set_name": "OpenWebText2" }
Dual use of an amplatzer device in the transcatheter embolization of a large high-flow renal arteriovenous fistula. Embolization procedures are now considered the first-line therapy in the treatment of renal arteriovenous fistulas (AVFs). However, a risk posed by the use of these minimally invasive techniques is the migration of occluding agents into the venous and pulmonary circulations. The risk is of particular importance for larger, high-flow fistulas. The authors describe a case in which an Amplatzer Vascular Plug (AVP) was opened upstream of a renal AVF in the dilated feeding artery and used as a filter and a buttress during coil embolization to prevent coil migration during the treatment of the large, high-flow renal AVF. It was then removed and used again as the final embolic device in the renal artery, performing a dual role in the closure of the renal AVF.
{ "pile_set_name": "PubMed Abstracts" }
Q: How to get and set / access and modify a global variable between components I'm new to Angular, currently using Angular 5 Cli with VS Code. I have 2x components (Comp1 & Comp2) that need to access the same variable which is ultimately a string. This variable is rendered in the 3rd Component's (Comp 3) View/HTML template. What's the best way to access this? Example files below: Comp3.html <a routerLink="/{{modeName | lowercase}}" class="mode"><span class="icon {{modeName | lowercase}}"></span><span>{{modeName}}</span></a> Comp3.ts import { Component } from '@angular/core'; import { LowerCasePipe } from '@angular/common'; @Component({ selector: 'pm-nav-button', templateUrl: './comp3.component.html' }) export class Comp3 { constructor() {} modeName: string; } Comp2.ts & Comp1.ts - (these are configured based on Angular Routing whichever view loads it'll set 'Grid' mode or 'List' mode) import { Component, OnInit } from '@angular/core'; import { LowerCasePipe } from '@angular/common'; import { Comp3 } from './comp3-component'; @Component({ selector: 'content-two', templateUrl: './comp3.component.html' }) export class Comp2 implements OnInit { constructor(private _comp3: Comp3) {} ngOnInit(): void { this._Comp3.modeName = 'Grid'; } } However, it all compiles fine with no errors, but I'm not seeing 'Grid' binded to the template's bindings (interpolation). I think I'm setting the the variable after the template has rendered, even though I'm setting it within ngOnInit. I want to be able to access, check and set this variable from other components. How do I do this? Thanks A: When passing data between components that lack a direct connection, such as siblings, grandchildren, etc, you should use a shared service. You can try following code snippet. import { Injectable } from '@angular/core'; import { BehaviorSubject } from 'rxjs/BehaviorSubject'; @Injectable() export class SharedService { private messageSource = new BehaviorSubject<string>("list"); currentMessage = this.messageSource.asObservable(); constructor() { } changeMessage(message: string) { this.messageSource.next(message) } } //Comp1 import { Component, OnInit } from '@angular/core'; import {SharedService} from '../shared.service'; @Component({ selector: 'app-comp1', templateUrl: './comp1.component.html', styleUrls: ['./comp1.component.css'] }) export class Comp1Component implements OnInit { message:string; constructor(private data: SharedService) { } ngOnInit() { this.data.currentMessage.subscribe(message => this.message = message) console.log(this.message); } } //Comp2 import { Component, OnInit } from '@angular/core'; import {SharedService} from '../shared.service'; @Component({ selector: 'app-comp2', templateUrl: './comp2.component.html', styleUrls: ['./comp2.component.css'] }) export class Comp2Component implements OnInit { message:string; constructor(private data: SharedService) { } ngOnInit() { this.data.currentMessage.subscribe(message => this.message = message) console.log(this.message); } }
{ "pile_set_name": "StackExchange" }
Predictive factors for bile leakage after hepatectomy for hepatic tumors: a retrospective multicenter study with 631 cases at Yokohama Clinical Oncology Group (YCOG). International Study Group of Liver Surgery (ISGLS) proposed the standardized definition for bile leakage (BL) after hepatectomy (Hx) at 2011 to precisely perceive incidence and predictive factors of this critical condition. We conducted a multicenter retrospective study using the ISGLS definition of BL after Hx. Perioperative data regarding 631 patients undergoing elective Hx for hepatic tumors without biliary reconstruction performed between January 2009 and December 2011 were analyzed. BL was observed in 30 patients (4.8%). (Grade A, 8 (1.3%); B, 21(3.3%); C, 1 (0.2%)). Five independent predictors (diagnosis of liver metastases, prolonged operation, high risk procedures defined as Hx with broad exposure of the hilar Glissonean sheath, low platelet count and high serum total bilirubin on postoperative day 1) for grade B/C BL were elucidated by the multivariate analysis. When the study cohorts were divided into groups by number of accompanying these predictors, the more the accompanying independent predictors, the higher the incidence of BL. Notably, incidence of BL exceeded 40% in patients with four or more of these predictors. Risk stratification for BL after Hx can be achievable using independent predictors clarified in this study. However, proper management for high risk patients remains to be elucidated.
{ "pile_set_name": "PubMed Abstracts" }
The former Football Association chief executive David Davies believes that Fabio Capello may be in breach of contract after the England manager openly challenged the decision to strip John Terry of the captaincy. Speaking to the BBC's Breakfast Time show on Monday morning, Davies said that Capello, who reportedly earns £6m a year as manager of the national side, may have breached his contract with his comments and could face action from the FA. "It is being taken very seriously by the FA," Davies said. "You have to ask what his motive is. You have to suspect he wants to prevent John Terry retiring as a player before Euro 2012, but there are wider issues. "You could have what some of the media are calling a morality circus while England are trying to win the second major tournament in football. "A contract may have been breached, there is strong leadership now at the FA from David Bernstein. Last week he wasn't slow to take things forward and he may not be slow to do so now." Capello said he "completely disagreed" with Bernstein's decision during an interview with the Italian broadcaster Rai 1 on Sunday. "I spoke to the chairman and I told him that I don't think someone can be punished until it becomes official," the Italian said. "The court will decide. It's going to be civil justice, not sports justice, to decide if John Terry committed the crime he is accused of. I thought it fair that John Terry keeps the captain's armband." The FA opted to remove Terry as captain once it was known the Chelsea defender would not face trial over allegations he used racist language towards Anton Ferdinand until 9 July, eight days after the Euro 2012 final. Terry denies the charge.
{ "pile_set_name": "OpenWebText2" }
Yahoo says some systems breached, not by Shellshock WASHINGTON, October 7- Yahoo said some of its servers were breached briefly by hackers, but that the attack was unrelated to the newly discovered Shellshock vulnerability, and that no user data was compromised. In a posting late Monday on the Hacker News forum, Yahoo’s chief information security officer Alex Stamos said hackers managed to breach three of its sports servers that deliver live game streaming data. “After investigating the situation fully, it turns out that the servers were in fact not affected by Shellshock,” Stamos wrote, referring to the recently discovered flaw which could affect millions of computers and other Internet connected devices. “At this time we have found no evidence that the attackers compromised any other machines or that any user data was affected. This flaw was specific to a small number of machines and has been fixed.” The comments came after security researcher Jonathan Hall reported the breach, and said it was the result of the flaw known as Shellshock or Bash. On Tuesday, Hall maintained that the attack was the result of a Shellshock attack. “The Yahoo! infiltration WAS from the ‘Shellshock’ vulnerability How do I know? Because I sat there watching it happen.” Stamos said the situation led to confusion because attackers had been trying to use the flaw to gain access. “As you can imagine this episode caused some confusion in our team, since the servers in question had been successfully patched (twice!!) immediately after the Bash issue became public,” he said. “Once we ensured that the impacted servers were isolated from the network, we conducted a comprehensive trace of the attack code through our entire stack which revealed the root cause: not Shellshock.” The US government and technology experts warned last month of a vulnerability in some computer-operating systems, including Apple’s Mac OS, which could allow widespread and serious attacks by hackers. Advertisement. Scroll to continue reading. The flaw affects “Unix-based operating systems” powered by Linux and Apple’s Mac OS. Apple recently said it created a patch for its operating systems, and other software firms have done the same.
{ "pile_set_name": "Pile-CC" }
![](edinbmedsurgj73239-0021){#sp1 .285} ![](edinbmedsurgj73239-0022){#sp2 .286} ![](edinbmedsurgj73239-0023){#sp3 .287} ![](edinbmedsurgj73239-0024){#sp4 .288} ![](edinbmedsurgj73239-0025){#sp5 .289} ![](edinbmedsurgj73239-0026){#sp6 .290} ![](edinbmedsurgj73239-0027){#sp7 .291} ![](edinbmedsurgj73239-0028){#sp8 .292} ![](edinbmedsurgj73239-0029){#sp9 .293} ![](edinbmedsurgj73239-0030){#sp10 .294} ![](edinbmedsurgj73239-0031){#sp11 .295} ![](edinbmedsurgj73239-0032){#sp12 .296} ![](edinbmedsurgj73239-0033){#sp13 .297} ![](edinbmedsurgj73239-0034){#sp14 .298} ![](edinbmedsurgj73239-0035){#sp15 .299} ![](edinbmedsurgj73239-0036){#sp16 .300} ![](edinbmedsurgj73239-0037){#sp17 .301} ![](edinbmedsurgj73239-0038){#sp18 .302} ![](edinbmedsurgj73239-0039){#sp19 .303} ![](edinbmedsurgj73239-0040){#sp20 .304} ![](edinbmedsurgj73239-0041){#sp21 .305} ![](edinbmedsurgj73239-0042){#sp22 .306} ![](edinbmedsurgj73239-0043){#sp23 .307} ![](edinbmedsurgj73239-0044){#sp24 .308} ![](edinbmedsurgj73239-0045){#sp25 .309} ![](edinbmedsurgj73239-0046){#sp26 .310} ![](edinbmedsurgj73239-0047){#sp27 .311}
{ "pile_set_name": "PubMed Central" }
Q: Return one result from LINQ Query if you have a select LINQ query that should only return one result, do you have to have a foreach loop to get the result? Or is there a better way? A: // Will return a default value if no object is found in the DB db.Table.SingleOrDefault(x => x.something == someParameter); or // Will throw an exception if records are not found db.Table.Single(x => x.something == someParameter); Thanks to Mehrdad for the comment...both lines have been updated. If it's possible that your query could result in more than one record being returned, then (as mentioned in comments) Single() and SingleOrDefault() are the wrong methods to call. You would keep the same syntax, but call First() and FirstOrDefault() respectively. A: var myLinqObj = db.MyObjects.Take(1).SingleOrDefault(); A: You can use either First or Single. First returns the first row, whether there are multiple rows or just the one. Single expects only one row to be returned, and throws an exception if there are multiple rows. Single is therefore potentially a better choice if you expect to only have one row, so that you'll see the problem immediately and can troubleshoot it.
{ "pile_set_name": "StackExchange" }
Cobbler Notes: The cobbler project is a Linux (and soon to be other OS) installation server with numerous datacenter automation features. Possible ideas for GSOC include web app workflow improvements, or a collection of many numerous RFEs in Fedora Hosted's Trac instance (fedorahosted.org/cobbler). Students should also have their own original ideas and an interest in datacenter automation -- folks doing admin work for their college and interested in using cobbler are ideal. We are interested in folks that (A) can show they understand the goals of the project and understand it's present features (as to not reinvent things it already does or are out of scope), (B) have new ideas of their own and are creative, and (C) are interested in the domain of datacenter automation, systems management, virtualization, or constructing SkyNet. Some knowledge of Python, Perl, Ruby, or a similar dynamic language is required. Cobbler is all Python so if you're a Python hacker, we'd be especially glad to have you. If you'd like to contact me to refine your ideas prior to submitting or just ask questions, that's great, please do so. (mdehaan AT redhat DOT com) InstantMirror Status: Proposed Summary of idea: There exist various existing repository replication methods to mirror repositories, each with their own pros and cons. InstantMirror aims to solve problems of data repository replication in an efficient way. Various modern techniques are utilized and combined like Squid-like reverse proxy cache and cache expiry algorithm, rsync-like local directory trees, Torrent style efficient swarming many-to-many data replication. This project if implemented would dramatically improve the efficiency and timeliness of repository replication. This could be very useful for mirror networks like kernel.org, Fedora, Debian, CPAN, etc. n Contacts: WarrenTogami Packages End User UI Summary of idea: A User Interface to the PackageDB for end users to find and review packages Contacts: Toshio Kuratomi Mentor(s): Toshio Kuratomi Notes: This idea has already been taken up and a more detailed proposal worked on by maploin, Ionuț Arțăriși Many Linux distributions have a website that shows what packages are present in the distribution to users of the distribution. These websites have pages that tell what the software does, how to use it, what version it is, and so on. We'd like to add the same capabilities to the Fedora Package Database so that Fedora Users can come there to see what packages are in Fedora. We also want to add a few features that aren't in other systems. The ability to filter these as applications instead of packages, Letting end users comment on the applications to help other end users Letting end users tag the packages with keywords to make searching easier New Developer UI for the PackageDB Summary of idea: Update the Packager's User Interface to be more efficient. Contacts: Toshio Kuratomi Mentor(s): Toshio Kuratomi Notes: This idea has already been taken up and a more detailed proposal worked on by Ranjith Kannikara The Package Database provides an adequate interface to managing acls on packages but there are some definite warts that cause our packagers to spend too much time on the beaurocracy of maintaining packages rather than coding. This proposal is to address several outstanding feature requests and create some new interfaces that will make managing package acls much easier. Notes: I would like to integrate the robot software that I've developed at university (and that is going to be released to the public real soon now as GPL'ed OSS) into Fedora, then integrate the Gazebo/Stage simulators properly into Fedora and the software and provide a simple development playground that one can use to make the robots move in the simulation and solve tasks. Maybe a simple task-based game (get the robot to pick the can and bring it to the place marked with X) could come out of it. My diploma/master thesis (that I'm finishing atm) is about efficient and simple behavior control employing Lua, so this would be a really good fit. This project would be embedded into the Fedora Robotics SIG. Spacewalk Status: Proposed Summary of idea: PostgreSQL support in Spacewalk Contacts: JesusRodriguez Mentor(s): JesusRodriguez Notes: Spacewalk is an open source Linux systems management solution. It allows you to: Notes: EKG (http://fedorahosted.org/ekg) is a tool that lets us monitor community mailing lists and see where traffic is coming from. What projects are becoming more popular? What is the mix of people posting to various lists? What's the pulse on the community? As a contributor, you will help extend EKG to track additional resources, mine new data, and create new visualizations, metrics, and comparisons. We will measure the contributions by company and organisation and community members. There is a lot of room for work in web visualization, whether this means making new charts and graphs or attempting to find ways to show a lot of information at a glance. You will get to work with the following technologies: Python HTML Javascript SQLAlchemy Python templating languages Students should bring some of their own ideas to table when submitting proposals. This may be a very good project for a student with interests in data mining, statistics, or (2D) data visualization. JBoss.org ideas The JBoss.org crew is proposing as a mentoring organization with the Fedora Project, as has been done in the past. That ideas page is here: Augeas Augeas is a command line tool and library to make editing of configuration files from programs and scripts easier. It does that by parsing existing configuration files into a tree, allowing modifications of the tree through an API, and writing the tree back to the original configuration file with those modifications. There are a wide variety of interesting projects to enhance Augeas itself or build tools on top of it. Depending on the specific project, required skills range from learning the ins and outs of specific config files to python scripting and the ability to solve hard research problems. Better iptables management The iptables config is a scary file, especially when programs need to modify it, since making a change often requires that the program understands what a chain does in its entirety. It would be much better to have a tool that can answer questions like "What does chain X do to packets that look like this ?" and "Modify chain X to ACCEPT/DROP/REJECT packets that look like this" in a way that avoids redundant rules. Solutions to these are described in a few research papers. You should have a basic knowledge of iptables configuration, interest in writing OCaml (preferred) or C code, and be willing to learn about some theoretical concepts like binary decision diagrams (BDD's) Backup system on btrfs btrfs is upcoming filesystem which is already there in rawhide. It include unique feature of create snapshots, one can easily go back to the previous states of the files using that. In the current condition it is better to take snapshots of subvolumes only. Primary task will be to create an independent GUI based app to browse the history. In future one can patch the major file managers for this feature.
{ "pile_set_name": "Pile-CC" }
Q: Plotting More than 2 Factors Suppose I ran a factor analysis & got 5 relevant factors. Now, I want to graphically represent the loading of these factors on the variables. Can anybody please tell me how to do it. I can do using 2 factors. But can't able to do when number of factors are more than 2. The 2 factor plotting is given in "Modern Applied Statistics with S", Fig 11.13. I want to create similar graph but with more than 2 factors. Please find the snap of the Fig mentioned above: X & y axes are the 2 factors. Regards, Ari A: Beware: not the answer you are looking for and might be incorrect also, this is my subjective thought. I think you run into the problem of sketching several dimensions on a two dimension screen/paper. I would say there is no sense in plotting more factors' or PCs' loadings, but if you really insist: display the first two (based on eigenvalues) or create only 2 factors. Or you could reduce dimension by other methods also (e.g. MDS). Displaying 3 factors' loadings in a 3 dimensional graph would be just hardly clear, not to think about more factors. UPDATE: I had a dream about trying to be more ontopic :) You could easily show projections of each pairs of factors as @joran pointed out like (I am not dealing with rotation here): f <- factanal(mtcars, factors=3) pairs(f$loadings) This way you could show even more factors and be able to tweak the plot also, e.g.: f <- factanal(mtcars, factors=5) pairs(f$loadings, col=1:ncol(mtcars), upper.panel=NULL, main="Factor loadings") par(xpd=TRUE) legend('topright', bty='n', pch='o', col=1:ncol(mtcars), attr(f$loadings, 'dimnames')[[1]], title="Variables") Of course you could also add rotation vectors also by customizing the lower triangle, or showing it in the upper one and attaching the legend on the right/below etc. Or just point the variables on a 3D scatterplot if you have no more than 3 factors: library(scatterplot3d) f <- factanal(mtcars, factors=3) scatterplot3d(as.data.frame(unclass(f$loadings)), main="3D factor loadings", color=1:ncol(mtcars), pch=20) Note: variable names should not be put on the plots as labels, but might go to a distinct legend in my humble opinion, specially with 3D plots.
{ "pile_set_name": "StackExchange" }
Thursday on Fox News Channel’s “The Ingraham Angle,” Sen. Rand Paul (R-KY) offered his assessment on the relationship of the United States and Russia on the heels of his visit to Russia. Paul said they were “at their worst ebb” since the height of the Cold War. “I think from both sides that our relations are at the worst ebb that they’ve been since the height of the Cold War,” Paul said. “This is a real tragedy. One of the great things that Ronald Reagan did was sitting down with Gorbachev. One of the highlights for me was I got to sit down for an hour with former President Gorbachev and talk about his recollections with Ronald Reagan, but also talk about both sides — talk about Ronald Reagan and Gorbachev — had to defy the orthodoxy of their country to sit down and come to agreements. And they didn’t call each other names. They didn’t say ‘murderous thug,’ and talk about all the terrible things, some of which did happen throughout a long period of time in the Soviet Union. They sat down and said, ‘Let’s try to make it better.’ And they did.” Follow Jeff Poor on Twitter @jeff_poor
{ "pile_set_name": "OpenWebText2" }
Sean Brodrick: So far, January has been a bullish month for commodities. In fact, if you read my December 29 column, “3 Commodities to Buy for 2012,” you saw that I recommended three commodity funds in that column — the United States Gasoline Fund (NYSE:UGA), the Rogers International Commodity Index Agriculture Total Return ETN (NYSE:RJA) and the Teucrium Corn Fund (NYSE:CORN). Since then all three are up, and one of them — UGA — is up nicely. UGA opened December 29 at $48.24. This Tuesday, it sported a price of $50.62 — a 5% gain in just seven trading days. Have you ever wondered how billionaires continue to get RICHER, while the rest of the world is struggling? "I study billionaires for a living. To be more specific, I study how these investors generate such huge and consistent profits in the stock markets -- year-in and year-out." The other two only have small gains, but I still think all three are good bets for 2012. Today, I’ll give you another bullish commodity bet — right after I tell you about three forces that are lining up to push commodity prices higher. You can see that Alcoa expects worldwide, commercial building and construction demand for aluminum to rise 4% to 5% this year; car manufacturers will use an additional 3% to 8% aluminum; and global aerospace demand for aluminum should rise 10% to 11% this year. My take is that this is pretty bullish for the global economy. 2) Bad News from China Is Seen as Good News. This week, China reported a 13.4% increase in exports and an 11.8% jump in imports in December. That may sound good, but the import growth was a little more than HALF the growth rate registered in November. But markets are taking this as good news. In fact, China’s stock market surged 2.7% on the idea. That’s because investors believe this slower growth will prompt China to announce new measures to ease its monetary policy sooner rather than later. Investors also liked reports that the government will endorse policies aimed at spurring investments in the Chinese stock market. The bottom line is that, when the market rises on bad news, it’s pretty darned bullish. 3) Bullish Parade of News for Oil. Along with an improved outlook for the global economy, crude oil (NYSE:USO) is getting a boost from worsening tensions between the West and Iran, as well as a national strike that could affect oil production in Nigeria. A 6% annual rise in oil imports by China is another bullish factor for crude. China has recently much-reduced its imports from Iran due to disputes over payment. That means China will need to source its demand elsewhere, which could drive prices further upward. To be sure, all of these problems could be resolved. But tensions with Iran could also get worse, and other problems could flare up. While it’s said that the cure for high oil prices is high oil prices, I still believe crude could be making a run to my target of $119 per barrel. Bullish but Cautious There is still plenty that could go wrong with commodity prices. If investors start to panic about the euro again, they’ll pile into the U.S. dollar. Since commodities are priced in dollars, that tends to drive commodity prices lower. Also, Europe is probably still going to slide into recession this year. That would weigh on global demand. So while I’m bullish, I’m cautious. I’m limiting position sizes and setting protective stops to (hopefully) save my butt in case the market heads south in a hurry. However, there’s another trade you can add today to our basket of commodity plays — and this one shines in a sea of precious metals names. One More Way to Play Bullish Commodity Prices Along with the other three picks I gave you on December 29, here is another commodity pick that should do well in 2012 … Looking at the chart, you can see it sure looks like silver hammered out an inverse head-and-shoulders pattern and is now testing the neckline of that pattern. SLV could easily head up to its December high and, once bullish momentum gets rolling, we may even see the October high again. Who’s Right, Who’s Wrong? By now, you know that I and other analysts at Weiss Research don’t always agree on everything. Maybe the more-bearish view will be proven correct. But I have to go with what my signals are telling me. They’re turning more bullish, and they’re too loud to ignore. If you’d care to talk with me about it in person — good news. I’ll be speaking at the Cambridge House 2012 Resource Investment Conference in Vancouver, January 22-23. You can find more information about that here. It’s a conference that’s packed with great speakers and more than 600 companies are presenting and exhibiting. If you’re trading on your own, do your own due diligence and make up your own mind before investing a single cent. And good luck to us all in this market. Money and Markets (MaM) is published by Weiss Research, Inc. and written by Martin D. Weiss along with Nilus Mattive, Claus Vogt, Ron Rowland, Michael Larson and Bryan Rich. To avoid conflicts of interest, Weiss Research and its staff do not hold positions in companies recommended in MaM, nor do we accept any compensation for such recommendations. The comments, graphs, forecasts, and indices published in MaM are based upon data whose accuracy is deemed reliable but not guaranteed. Performance returns cited are derived from our best estimates but must be considered hypothetical in as much as we do not track the actual prices investors pay or receive. Regular contributors and staff include Andrea Baumwald, John Burke, Marci Campbell, Selene Ceballo, Amber Dakar, Maryellen Murphy, Jennifer Newman-Amos, Adam Shafer, Julie Trudeau, Jill Umiker, Leslie Underwood and Michelle Zausnig. This investment news is brought to you by Money and Markets. Money and Markets is a free daily investment newsletter from Martin D. Weiss and Weiss Research analysts offering the latest investing news and financial insights for the stock market, including tips and advice on investing in gold, energy and oil. Dr. Weiss is a leader in the fields of investing, interest rates, financial safety and economic forecasting. To view archives or subscribe, visit http://www.moneyandmarkets.com/.
{ "pile_set_name": "Pile-CC" }
"use strict";var exports=module.exports={};var isObject = require('./isObject.js'); /** * Checks if `value` is suitable for strict equality comparisons, i.e. `===`. * * @private * @param {*} value The value to check. * @returns {boolean} Returns `true` if `value` if suitable for strict * equality comparisons, else `false`. */ function isStrictComparable(value) { return value === value && !isObject(value); } module.exports = isStrictComparable;
{ "pile_set_name": "Github" }
There are various factors that could produce the behavior you are experiencing. For example, it's possible that the Text property is being set correctly, but that your view is not being notified of this change. To notify the view of a property change in the view model you could implement the INofityPropertyChanged interface in the view model and raise the PropertyChanged event in the setter of the Text property. Also, you might find useful to inherit your view model from the NotificationObject class as it provides an implementation of the aforementioned interface. Another possibility is that the Text property is being set correctly, but when you call the RequestNavigate method that view is removed or deactivated from the region and a new instance of the view (the one you exported with the "MainListView" name) is created. This new instance might have different view model with its own Text property. You can find more information about this here:
{ "pile_set_name": "Pile-CC" }
The Bank of Canada will start cutting its key lending rate in October as annual economic growth slows to one per cent in 2020, according to Capital Economics. Stephen Brown, senior Canada economist at the London-based research firm, expects weak demand at home and abroad will prompt two additional cuts after October’s announcement, with little prospect of the central bank raising rates before 2022. “Investors are right to price in lower interest rates from the Bank of Canada, but the single 25 basis point cut priced into futures markets for the next 12 months does not go far enough,” he wrote in a research note on Tuesday. The oil and gas sectors lifted real gross domestic product by a better-than-expected 0.3 per cent in April, according to Statistics Canada. Analysts polled by Reuters called for a 0.1 per cent uptick. The Bank of Canada remains optimistic that recent headwinds posed by weak energy prices, stagnant consumption growth and trade tensions are easing. Brown said capacity constraints lessen the odds that oil and gas will pick up the slack for non-energy exports weakened by softer global demand. “The big picture is that we expect GDP growth to drop below Canada’s potential in the second half of the year, causing the output gap to widen,” Brown wrote. He predicts Canada’s economy will expand by a muted 1.3 per cent in 2019, and one per cent in 2020. The bank’s anticipated trio of rate cuts will then lift GDP growth to 1.7 per cent in 2021, he said. “The outlook for the next few years is challenging, but Canada’s longer-term fundamentals are strong,” Brown wrote. “The adoption of new technologies should drive a pick-up in productivity growth over the next twenty years. As that will more than offset a slowdown in labour force growth, we expect potential GDP growth to edge up to two per cent by the mid-2020s, from about 1.8 per cent currently.” The Bank of Canada is scheduled to make its next rate announcement on July 10. Yahoo Finance Canada More Download the Yahoo Finance app, available for Apple and Android.
{ "pile_set_name": "OpenWebText2" }
That's Not How It Works, That's Not How Any Of This Works it doesn't work like that none of this works like that
{ "pile_set_name": "OpenWebText2" }
Q: Sleeping for an exact duration My understanding of the Sleep function is that it follows "at least semantics" i.e. sleep(5) will guarantee that the thread sleeps for 5 seconds, but it may remain blocked for more than 5 seconds depending on other factors. Is there a way to sleep for exactly a specified time period (without busy waiting). A: As others have said, you really need to use a real-time OS to try and achieve this. Precise software timing is quite tricky. However... although not perfect, you can get a LOT better results than "normal" by simply boosting the priority of the process that needs better timing. In Windows you can achieve this with the SetPriorityClass function. If you set the priority to the highest level (REALTIME_PRIORITY_CLASS: 0x00000100) you'll get much better timing results. Again - this will not be perfect like you are asking for, though. This is also likely possible on other platforms than Windows, but I've never had reason to do it so haven't tested it. EDIT: As per the comment by Andy T, if your app is multi-threaded you also need to watch out for the priority assigned to the threads. For Windows this is documented here. Some background... A while back I used SetPriorityClass to boost the priority on an application where I was doing real-time analysis of high-speed video and I could NOT miss a frame. Frames were arriving to the pc at a very regular (driven by external framegrabber HW) frequency of 300 frames per second (fps), which fired a HW interrupt on every frame which I then serviced. Since timing was very important, I collected a lot of stats on the interrupt timing (using QueryPerformanceCounter stuff) to see how bad the situation really was, and was appalled at the resulting distributions. I don't have the stats handy, but basically Windows was servicing the interrupt whenever it felt like it when run at normal priority. The histograms were very messy, with the stdev being wider than my ~3ms period. Frequently I would have gigantic gaps of 200 ms or greater in the interrupt servicing (recall that the interrupt fired roughly every 3 ms)!! ie: HW interrupts are FAR from exact! You're stuck with what the OS decides to do for you. However - when I discovered the REALTIME_PRIORITY_CLASS setting and benchmarked with that priority, it was significantly better and the service interval distribution was extremely tight. I could run 10 minutes of 300 fps and not miss a single frame. Measured interrupt servicing periods were pretty much exactly 1/300 s with a tight distribution. Also - try and minimize the other things the OS is doing to help improve the odds of your timing working better in the app where it matters. eg: no background video transcoding or disk de-fragging or anything while your trying to get precision timing with other code!! In summary: If you really need this, go with a real time OS If you can't use a real-time OS (impossible or impractical), boosting your process priority will likely improve your timing by a lot, as it did for me HW interrupts won't do it... the OS still needs to decide to service them! Make sure that you don't have a lot of other processes running that are competing for OS attention If timing is really important to you, do some testing. Although getting code to run exactly when you want it to is not very easy, measuring this deviation is quite easy. The high performance counters in PCs (what you get with QueryPerformanceCounter) are extremely good. Since it may be helpful (although a bit off topic), here's a small class I wrote a long time ago for using the high performance counters on a Windows machine. It may be useful for your testing: CHiResTimer.h #pragma once #include "stdafx.h" #include <windows.h> class CHiResTimer { private: LARGE_INTEGER frequency; LARGE_INTEGER startCounts; double ConvertCountsToSeconds(LONGLONG Counts); public: CHiResTimer(); // constructor void ResetTimer(void); double GetElapsedTime_s(void); }; CHiResTimer.cpp #include "stdafx.h" #include "CHiResTimer.h" double CHiResTimer::ConvertCountsToSeconds(LONGLONG Counts) { return ((double)Counts / (double)frequency.QuadPart) ; } CHiResTimer::CHiResTimer() { QueryPerformanceFrequency(&frequency); QueryPerformanceCounter(&startCounts); // starts the timer right away } void CHiResTimer::ResetTimer() { QueryPerformanceCounter(&startCounts); // reset the reference counter } double CHiResTimer::GetElapsedTime_s() { LARGE_INTEGER countsNow; QueryPerformanceCounter(&countsNow); return ConvertCountsToSeconds(countsNow.QuadPart - startCounts.QuadPart); } A: No. The reason it's "at least semantics" is because that after those 5 seconds some other thread may be busy. Every thread gets a time slice from the Operating System. The Operating System controls the order in which the threads are run. When you put a thread to sleep, the OS puts the thread in a waiting list, and when the timer is over the operating system "Wakes" the thread. This means that the thread is added back to the active threads list, but it isn't guaranteed that t will be added in first place. (What if 100 threads need to be awaken in that specific second ? Who will go first ?) A: While standard Linux is not a realtime operating system, the kernel developers pay close attention to how long a high priority process would remain starved while kernel locks are held. Thus, a stock Linux kernel is usually good enough for many soft-realtime applications. You can schedule your process as a realtime task with the sched_setscheduler(2) call, using either SCHED_FIFO or SCHED_RR. The two have slight differences in semantics, but it may be enough to know that a SCHED_RR task will eventually relinquish the processor to another task of the same priority due to time slices, while a SCHED_FIFO task will only relinquish the CPU to another task of the same priority due to blocking I/O or an explicit call to sched_yield(2). Be careful when using realtime scheduled tasks; as they always take priority over standard tasks, you can easily find yourself coding an infinite loop that never relinquishes the CPU and blocks admins from using ssh to kill the process. So it might not hurt to run an sshd at a higher realtime priority, at least until you're sure you've fixed the worst bugs. There are variants of Linux available that have been worked on to provide hard-realtime guarantees. RTLinux has commercial support; Xenomai and RTAI are competing implementations of realtime extensions for Linux, but I know nothing else about them.
{ "pile_set_name": "StackExchange" }
Dot Dot Dash Bag If you're new here, you may want to sign up for my newsletter which includes new pattern releases and fabric sales. Enter your email for a free copy of my Oslo Craft Bag sewing pattern, an exclusive pattern just for my followers. In providing your email address, this will enroll you for my monthly newsletter, which will keep you up-to-date on my new patterns, free tutorials, videos, and other news. I’m really happy to announce the first pattern to go up in my pattern shop, the Dot Dot Dash Bag, available in pdf or paper! This is a bag that features 5 zippers on the front of the bag, and a top closure in the form of a recessed zipper. The strap is adjustable. The pattern is intermediate/advanced sewing level. My pattern instructions call for use of By Annie’s Soft and Stable, which is a thin, foam sew-in interfacing (although I do give alternative interfacing suggestions in my pattern instructions, such as Pellon Thermolam/needled fleece for a great slouchy bag). If you do decide to use the Soft and Stable, your bag will be padded, so it is the perfect carrying accessory for your laptop, Kindle, iPad, etc.! I’d also like to give a big virtual hug to Alison Glass, fabric designer for Andover Fabrics, who designed my pattern cover. She got it just right on the first crack, which shows just how talented she is. Alison has a line out right now called ‘Lucky Penny’ (and my bag is made using the Column print from Lucky Penny), and will have ‘Field Day’ coming in June. My friend Tiffany of This Crafty Fox made this gorgeous version of the bag in Joel Dewberry fabrics. This bag is also featured in the pattern. Tiffany put up with my constant worry-worting about the pattern instructions and was a really good sport about it. 😉 I had quite a lot of pattern testers for this bag. My heart skipped a beat each time a new one appeared in my inbox. It’s kind of something to see someone make something from a pattern that you’ve written. I will probably always feel this way, but it makes me feel like…well, you have so many sewing pattern choices when it comes to bag making. That you’ve chosen to make a bag that I’ve written makes me feel incredibly honored. Thank you to all the testers who spent the time making these bags and providing me with feedback on my instructions. This lovely version of the bag was made by Christy of a.Amelia Handmade. Christy makes beautiful iPad sleeves and other accessories in her shop. Her bag is a total winner in my book…my favorite color is green and Echino is one of my favorite fabric designers, so enough said!! Maryellen made this cosmic bag out of spacey Michael Miller fabrics! I love the brown in the corner accents, it really makes those pockets pop! Allison made this beautiful yellow Dot Dot Dash, and I think her fussy-cutting on the front of the bag through the zippers was seamless…you can’t even tell that that fabric had to be cut and seamed! Great job Allison!! Lindsey of LRstitched made this awesome bag in gingham and suede. I think it turned out fabulous, and I love the zipper pulls that she added herself! Lindsey ran the Zakka Style sew along last year, and she has another slated for April…Patchwork Please! Follow the Flickr group to be notified when it starts! This beautiful version made in Joel Dewberry fabric was made by Lisa of Six Munchkin Stitching. Lisa makes memory quilts, gift bags, and more! I especially adore the green woodgrain fabrics on the corners! Ty Pennington fabric really made this stunning bag from Cindy of Raspberry Sunshine. Cindy was very quick on her toes and used this automotive headliner fabric from Hancock’s in place of the Soft and Stable interfacing (I had to ask my husband what exactly automotive headliner fabric was, lol). She said it gave the bag great body and was easy to sew through! This bag was made by Sharon, who upcycled an old jumper to make her bag; she loved the fabric of the jumper, but no longer wanted to wear it. What a great idea!! Diane made this great bag out of Washi Tape fabrics…so awesome! I also love the different-colored zippers…it really brings out the washi effect! You can find Diane on her Flickr…you should check it out, she’s a phenomenal quilter! Mia of Mia’s Creations made this lovely bag using upholstery fabrics and fleece interfacing instead of the Soft and Stable. I just love this, it looks like something you would find in a boutique shop! Maria also blogged about her bag, so you can read more about what she thinks! Anna from Charmed Liebling made this bag in some really awesome fabric…the fabric has a really European flair. I think the different-colored fabrics for the accent and zippers really make it stand out! It looks just gorgeous!! Carolyn made this black and white version with the neon zippers…how awesome that those zippers stand out like that! Carolyn is using her bag to tote her laptop, with her Kindle in a pocket! Rachel made this beautiful version, and she was very careful to fussy cut her large-scale print across the zippered panels! I also adore her contrasting accents and strap! Shelley of Pure and Simple Creations made this awesome version in pink and orange, and as you can see by the photo, this bag is very functional! She’s got all her knitting supplies packed inside! Sally from Life in Sally’s World made this great version of the bag with Anna Maria Horner fabric and some denim for the corner pockets. She just took a trip to Las Vegas and was happy that the bag fit her Macbook Air inside! Sally sent me her edits while traveling…isn’t she a trooper?! Allegory of {sew} Allegorical made the only patchwork version in the group (the pattern has instructions to make the bag in patchwork if you so choose!). I love the fabrics she chose, they are so bright and happy! Corrina of Another Thing Off the List (love the blog name too!) made this beautiful floral bag. The fabrics are so soft and pretty, this is a real winner! Alli from B. Yazoo made this awesome bag in a smokey corduroy with chartreuse accents and a fun lining fabric. She was very thorough with her tester feedback, and I think this bag looks incredibly well-put-together and sturdy! Mary made this paisley version of the pattern. I love the red fabric used for the accents and the lining, it perfectly coordinates with the paisley! What a great bag! I had the pleasure of meeting Vanessa at Sewing Summit this past October, and she made this gorgeous country girl version of the bag. So pretty! It’s a gift for her mom, and I just think it’s perfect! Annette used denim for her bag, with floral for the lining and front accents. I love the dark colors of the bag, and the black zippers really make those panels stand out! Norma from Norma’s Clay on Etsy made this stunning gray and white bag. Norma makes cool accessories made from beautiful clay in her shop, so check it out if you have a chance! I can’t get over this bag, it is so pretty! Peta from Australia has made this gorgeous bag. Peta has quite a history with crochet, embroidery, and sewing, so I am very honored that she tested my pattern for me! Kelie made this great version with brightly-colored butterfly fabrics. I love that the front curved accent fabrics continue through the side panels, it gives the bag a great finished look! Kelie also reviewed this bag on her blog! Thank you again so much to everyone for all your hard work!!! If you liked what you saw and would like to purchase my sewing pattern, please visit my pattern shop! 31 replies on “Dot Dot Dash Bag” I have been waiting to see what your first pattern will be. I didn’t expect anything less! This looks like a lot of fun. And i LOVE that you have so many examples to show and advertise. Great job. Keep up the good work! Sara congratulations on your pattern – it’s fantastic! I love the ones your testers made – as soon as I saw the taupey/coffee/caramelly upholstery fabric one I knew who made it – Maria is a bloggy buddy of mine, and does amazing work! I quite like your pattern and will order it tomorrow when I get my gift card “registered” so I can start to shop with it 🙂 It is great when other people make stuff from your own patterns, quite scary waiting to see if the instructions work- but so very exciting to see all the versions and how different the same pattern can look. For me, that is the best bit of designing- beats the initial rush of the idea and the fabric stroking stage by a whisker! It is a great design, hope it goes well for you. All these bags look absolutely amazing! You all did a wonderful job. 🙂 Sara, I do have a question for you… Do you think (not just for me ha ha but for others as well) write up a post on how you go about picking out your fabrics for purses. I always have a hard time figuring out what “fabrics” would be good for a purse. I know there isn’t a right or wrong way to picking out fabric, but sometimes using too much print or not enough pop or solids or or… Yeah, lol so I would love it if you could dabble into how you go about picking out fabrics and how you pair it up with other fabrics. I had a similar question to the one Rachel posted above. Has anyone attempted to size this down so that the largest pocket space would hold a kindle? I’m trying desperately to find a pattern I like that would allow me to carry all the regular purse type stuff and my kindle, but I really don’t like to carry such a large bag. Any tips you might have about sizing it down would be amazing. Jan I see that the current Dot Dot Dash Bag pattern contains two sizes. I have the older pattern PDF with only the larger size, but I want to make the smaller size. How do I get the new smaller size instructions without having to buy the whole pattern again?
{ "pile_set_name": "Pile-CC" }
Off-Label Prescribing and Polypharmacy: Minimizing the Risks. Off-label prescribing and polypharmacy are commonplace in today's health care environment. Patients are treated with multiple medications obtained through multiple providers, and all too frequently, there is no collaboration amongst professionals. Nurses can address these issues by educating themselves and their patients regarding medication indications and uses, side effects, risks, and benefits. By exploring a patient's medication reconciliation, including over-the-counter agents, and identifying the U.S. Food and Drug Administration-approved indications, as well as potential off-label uses and overlapping side effects of the medications prescribed, nurses can facilitate collaboration among prescribers to reduce polypharmacy, minimize medication side effects, and alleviate drug-drug interactions, while improving patient outcomes and quality of life. [Journal of Psychosocial Nursing and Mental Health Services, 55(2), 17-22.].
{ "pile_set_name": "PubMed Abstracts" }
Q: Rubymine and running rspec "rspec-core is not part of the bundle" I am trying to run a rails app which was not created using rubymine. Its is a very different sort of app using rails engines loaded...When I try running tests, I get the following error message Testing started at 12:29 ... /Users/userbnamexxxx/.rbenv/versions/1.9.3-p327/lib/ruby/gems/1.9.1/gems/bundler-1.3.5/lib/bundler/rubygems_integration.rb:214:in `block in replace_gem': rspec-core is not part of the bundle. Add it to Gemfile. (Gem::LoadError) from /Users/userbnamexxxx/.rbenv/versions/1.9.3-p327/bin/rspec:22:in `<top (required)>' from -e:1:in `load' from -e:1:in `<main>' I edited the configuration and it does have bundle exec checkbox checked. Tests tuns fine in the console. I tried it another project which is a default bug standard rails app and its fine there... I am using rbenv for managing ruby versions.... Please help as I am really stuck and it would be nice to not use the terminal.... A: Add the gem rspec-core into your .Gemfile
{ "pile_set_name": "StackExchange" }
Margaret Wangari Muriuki Margaret Wangari Muriuki (born 21 March 1986 in Nakuru) is a Kenyan long and middle distance runner. She shared in the team gold medal at the 2010 IAAF World Cross Country Championships. Individually, she won medals at the African Cross Country Championships and the African Championships in Athletics (1500 m) in 2012. She initially started out as a 1500 metres runner and came seventh in that event at the 2007 All-Africa Games. She was the winner of the 2008 Cross de Atapuerca and went on to finish in eighth place at the IAAF World Cross Country Championships that year. She won the 2009 Lotto Cross Cup de Hannut cross country race in 2009. Muriuki placed sixth at the 2010 IAAF World Cross Country Championships, which helped the Kenyan women to the world team title. She was the runner-up at the 2012 African Cross Country Championships behind team mate Joyce Chepkirui, both of whom shared the team title. A week later she took third place at the Lisbon Half Marathon, finishing behind Diana Chepkemoi. Showing her versatility, she went back down to the 1500 m at the 2012 African Championships in Athletics and won the bronze medal for Kenya in a personal best of 4:06.50 min. She ran on the American road circuit in August and won both the Beach to Beacon 10K and the Falmouth Road Race. She was runner-up at that year's Portugal Half Marathon (also held in Lisbon). Muriuki secured the Kenyan national title in cross country at the start of 2013, guaranteeing selection for the 2013 IAAF World Cross Country Championships. Competition record Personal bests 1500 metres - 4:06.50 min (2012) 3000 metres - 8:37.97 min (2010) 5000 metres - 14:40.48 min (2013) 10K (road) - 31:05 min (2010) Half marathon - 69:21 min (2012) References External links Category:1986 births Category:Living people Category:Kenyan female middle-distance runners Category:Kenyan female long-distance runners Category:People from Nakuru County Category:Athletes (track and field) at the 2014 Commonwealth Games Category:Kenyan female cross country runners
{ "pile_set_name": "Wikipedia (en)" }
Share It: When Neha met Jimmy After breaking up with Squach player, Ritwik Bhatacharya, Neha Dhupia didn’t exactly bounce back too quick. But now things seem to be going well for the sexy actress as she’s been seen partying with a new hottie. Neha Dhupia has found herself a new Venezuelan boyfriend! Neha and her new love, Jimmy have been spotted partying all over the city. A close friend of Neha says, “Jimmy is wooing Neha heavily. Everyday he is looking to surprise her. They are very much in love and we expect big news soon.”
{ "pile_set_name": "Pile-CC" }
Ever since we humans gave up the nomadic life and started building homes, architecture had one goal: To make life better for humans. But now, a new architecture is taking shape in remote, frozen corners of the world. And it's not designed for humans. It's for machines. In this case, for the remote machines that keep Facebook churning. In northern Sweden, just below the Arctic Circle, a new form of modular design is being pioneered by architects based more than 5,000 miles away in the heart of Silicon Valley. They're being led by architects like Marco Magarelli, the Datacenter Design Engineering Manager at Facebook, where he's led the company's unusual approach to data centers for the past five years. As tech companies compete to build smarter, faster, and cheaper, they're sparking a renaissance in modular, prefabricated architecture, and Facebook is leading the pack. I got the chance to chat with Magarelli to find out what it's like to be an architect building houses for most the world's online identities. Your Selfies Are Energy-Hogs Most of us think of the internet as something intangible, a floating, invisible, ectoplasmic world. In reality, the internet is tethered to the physical world by data centers—thousands of them—that handle all of the bits and bytes delivered to your computer. Magarelli uses the term "magic box" to describe these spaces: the masses know they exist, but they don't quite know how or where. And his job as the architect is "trying to make that box as elegant and effective as possible," he explains. In my mind, Facebook's magic boxes seemed like they should be pretty straightforward buildings. Slap some servers into a box, throw on some mechanical systems to cool them, make sure it's secure, and you're good to go, right? Not exactly. As Magarelli explained to me, these are far from normal buildings: Some data centers use more than 100 times the power of a typical office building. They need to be ultra-secure and ultra-stable against hackers, natural disasters, and all kinds of environmental ills. These are the buildings that hold the world's data—if they go, so does our internet. So unsurprisingly, they're booming: the market for modular data centers is expected to reach $40 billion over the next four years. Facebook, as the second most-visited site in the world after Google, needs a lot of them. According to Facebook, its users like six billion things per day, and have shared 400 billion photos in total—and all that activity adds up to a whole lot of data. In 2012, Facebook reported that its users took up around 7 petabytes of photo storage from one of its data centers every month. Image: AP Photo/Facebook, Alan Brandt. To handle this exponential increase in demand, two years ago Facebook assigned three engineers to tackle the challenge of "how to scale our computing infrastructure in the most efficient and economical way possible." As it grew, it became known as the Open Compute Project, an initiative to completely overhaul the hardware and network infrastructure of Facebook's data centers. Most importantly, they would put all their work online, making it free for any other company to follow Facebook's lead. The team at OCP completely redesigned every detail: From more efficient server racks to backup batteries that mean the centers don't need an uninterruptible power source. And just as important as all that network architecture? Actual architecture. Making Buildings Like Ikea Furniture Magarelli joined Facebook in 2009, and as part of the Open Computing Project, he staged a charrette (the architectural equivalent of a hackathon) to bring industry experts in lean construction—a theory of construction efficiency borrowed from manufacturing—into the fold at Facebook. Out of the event grew two basic design concepts. You could call them Ford and Ikea. The first strategy would be like "assembling a car on a chassis." You build your structural frame, then attach all of the actual components, from lighting to cables, using an assembly line in a factory. The whole shebang would then be driven to the building site on the back of a flatbed truck. The second scheme—the Ikea concept—was all about flatpack. Rather than assemble the modules in a factory, the pieces of the finished building would be tightly packed into a flat box. Just like your bookcase hardware, the building components were vastly simplified and universalized to avoid mistakes during assembly. By breaking down the building into simple, universal bits, the concept would make building cheaper, faster, and easier—just like Ikea. Out of these two ideas grew the Rapid Deployment Data Center, or RDDC: What Facebook calls the design of its data centers. A series of pre-assembled modules are shipped to the site and snapped into place at incredible speeds, taking the best of what Ford and Ikea had pioneered. Strange Things Done in the Midnight Sun This year, Facebook will get a chance to test the idea of RDDC. And it seems only appropriate that a design inspired by Ikea will go up in that company's home country: Facebook has announced a new construction project in Luleå, Sweden, next door to its most recent data center. Luleå, a city of 46,600 people and several well-known black metal bands, sits far up on the coast of the Baltic, so far it's almost in Finland. Temperatures in Luleå never get very high: The warmest month, July, has an average temperature of 61 degrees Fahrenheit. In February, 6 degrees is the norm. Those subarctic temperatures are a major boon for data center companies, which spend millions of dollars keeping their hard-working servers cool. But it's not just the cold that brings Facebook here: It's also Sweden's energy infrastructure, which is some of most dependable in the world. It also comes from renewable sources, a major plus for Facebook, which has bought up multiple wind farms here in the US to power its stateside data centers. Other companies are getting in on the action here, too, and some local entrepreneurs have even coined a slick term for the region: The Node Pole. Luleå 2 will be the company's first data center built using Magarelli's flat-pack RDDC concept. It'll be an experiment of sorts—a way to test the ideas that OCP and Magarelli's team have been developing since their charrette. And when it's up and running, the team will take stock and apply what they learned to the next project. The Magic Box Believe it or not, the work Magarelli and the team at Facebook are doing has a precedent from over a century ago. "I think back to the Industrial Revolution and how the buildings adapted to nascent industries," he says. "What does a power plant, or a paper mill, look like? All of these archetypes that have evolved to meet industrial needs." At the turn of the last century, as the Industrial Revolution gripped Europe and the US, a new type of building emerged: The factory. It became an archetypical symbol amongst architects looking for a new approach to building. Factories were cheap, strong, fast to build, and sometimes even beautiful. Above all, though, they were built based on function, not form. Some factories even became sensations amongst designers: Berlin's AEG Turbine Factory is still taught to young architects today. Eventually, there was a free flow of ideas between industrial and avant-garde design. Even today's prefab homes can trace their conceptual roots back to the industrial revolution. It's hard not to see the parallels between factories and data centers. Each type of building is designed for very specific commercial activities, and each has to adhere to strict budgets and schedules. They are both perfectly utilitarian. Yet something about the rules and requirements of commercial architecture tends to make invention blossom amongst designers. The data center, just like the factory of the 19th century, is "a whole new type of building," Magarelli adds. To most of us, the internet cleans up the messiness of the physical world and translates it into something intangible, something neat, something with zero real-world footprint. So it's strange to think that as billions of us sat hunched around our computers focused on an entirely invisible world, we were also feeding the flames of something very tangible. All of our clicks, uploads, and likes were was forcing Facebook to invent its own archetypical building: A magic box that few of us will ever see, but nearly all of us use all the time. All images courtesy of Luleå Data Center on Facebook .
{ "pile_set_name": "OpenWebText2" }
Pledge to Protest™ The catch? This site won't tell you why to protest. You should know why. Everyone may have a different reason, which may change over time, and others may have none at all (in which case they should probably leave)! It's hard to quit some social networks, because too many of our friends, family, or professional colleagues/contacts use them.is here to help people find ways to protest specific social networks in a way that respects privacy (https-enabled, no analytics, no ads, no cookies, no login required). FAQ Why does the site focus on social networks? 1. Because it's not obvious how to protest large social networks, and the main intent for this site is to be informational, so it's a good fit. For example, with some internet companies like social networks you are the product, so it's not obvious how to "vote with your wallet." (As opposed to a non-internet company like Samsung: if the phone explodes, you might buy an iPhone.) 2. Social networks impact our lives in huge ways, including: • Privacy (from web browsing to who you hang out with in real life) • How many of us get our news, learn about important figures in society, etc. • Free speech • Whether their services follow non-discriminatory practices, like in ad targeting • Terms of service may be onerous, like if they included forced arbitration or non-disparagement clauses Why is it (perceived to be) hard to protest social networks? First: it isn't. That's a myth. The consumer has so many options to protest. This myth should be dispelled, and that's the main thrust of this site. What is harder than normal is quitting/boycotting (though still a powerful protest choice, it is oftentimes untenable). So why is quitting difficult? 1. Network effects have grown so strong that to quit might mean cutting yourself off from the world. In other words: they're almost utilities. 2. A very long list of additional reasons might compel people to stay on networks. 3. It's actually been shown that some big social networks don't necessarily "delete" your data when you quit, unless you make a really big fuss about it, which makes it a tricky protest option to accomplish. I recommend this documentary , which explores that subject in greater detail. Why doesn't this site focus on the reasons to protest? Primarily because the problem this site tries to address is how to protest. I can't pretend to ever do justice the reasons you may want to protest, and journalists already do a great job cataloging many of those points. And, just like a librarian doesn't tell you what to read, I don't feel it's the site's place to tell you why to protest. How can I save my protest plan? Save the URL of your final plan; you could even bookmark it! What's the protest score mean? The protest score, found when building a protest plan, is a rough approximation of your plan's effectiveness in protesting the social network you selected. Any such attempt to quantify protesting will have shortcomings, but if I know anything, it's that netizens love internet points. Does Pledge to Protest save info on visitors? Short answer: No. Long answer: This is a static site that does not use cookies. It uses Cloudflare to cache the info on edge servers, which means most traffic doesn't hit the original server. It doesn't cache images (which don't respect same-origin policy). It doesn't load javascript from third parties, like share buttons do, for example. That said, just because this site respects your privacy, others may not. Be wary of your ISP, browser vendor, and any sites you may share protest links on, as you can rest assured most online sites remember and care about what you share. Just as a good librarian doesn't care what patrons read, this site tries to respect your protesting privacy. What's with the trademark symbol? Unfortunately, I'm concerned (ever so mildly) that one of the companies I've listed as a subject of protest on this site will try some legal shenanigans to pry the name away from me. I'm selling stuff under this name online and offline, if you're interested in buying some of said stuff, let me know via the feedback link in the footer.
{ "pile_set_name": "OpenWebText2" }
This will be a special part of our opening course on Development Economics. The topics we will cover will include: History of the East India Company The economics of Gandhi’s attack on the salt monopoly Was British rule good for India? Private education in India Economic research on the caste system in India The timing of Indian economic reforms and the boost in Indian economic growth, as discussed by Rodrik, DeLong, and others. The contributions of the most famous and most important Indian economists. Why does Kerala have such a good record when it comes to public health? RCTs in India by Poverty Action Lab. And much more. Today I have a request for you. If you have any connection with India, please spread the word of this material to other people you may know who have a connection to India. The motto of MRU is “Learn, Teach, and Share.” You can register for the course to come here. Background on MRU is here. Background on the development economics class is here.
{ "pile_set_name": "OpenWebText2" }
1. Introduction {#sec1} =============== *Helicobacter pylori* (*H. pylori*) is a spiral shaped microaerophilic gram-negative bacterium that resides in the gastric epithelial mucosa and induces an inflammatory response leading to gastritis and peptic ulcer disease \[[@B1], [@B2]\]. It has been implicated as playing a role in gastrointestinal malignancies, especially gastric adenocarcinoma and MALToma until the latter could be treated with *H. pylori*eradication \[[@B3], [@B4]\]. *H. pylori* has a worldwide prevalence rate of about 50%, with a higher prevalence in developing countries \[[@B5], [@B6]\]. According to population-based studies, it has been shown that the *H. pylori* infection rate is very high in the Iranian population \[[@B7]\]. *H. pylori* detection can be made with diverse diagnostic tests, which are technically divided into invasive and noninvasive based on whether endoscopy is required or not. Invasive tests offer the possibility of obtaining tissue samples, which can be used for a rapid urease test (RUT), culture, polymerase chain reaction (PCR), and histopathologic evaluation. Noninvasive tests include serum *H. pylori* IgG antibody titer, the urea breath test (UBT), and *H. pylori* stool antigen assay. Compared to noninvasive diagnostic modes, however, invasive techniques are inconvenient for patients and also have higher cost \[[@B8]\]. A UBT diagnostic test is based on the fact that swallowed "labeled carbon-containing urea" is broken down to ammonia and carbon dioxide (CO~2~) by the urease-producing microorganism (*H. pylori*) in the gastric mucosa, and, finally, tagged carbon within the liberated CO~2~ is detected in exhaled breath samples \[[@B9], [@B10]\]. Between two carbon isotopes (^13^C and ^14^C), which are used for the UBT, the ^13^C isotope has the difficulty of requiring more complex equipment, such as a mass spectrophotometer and administration of a pretest meal such as citric acid. However, when the ^14^C isotope is utilized, the required equipment is only a portable compact beta-scintillation counter, which offers the convenience of performing the test in the office. Although the ^14^C isotope is radioactive, microdose (1 *μ*Ci) ^14^C has the minimal radiation of one day background exposure \[[@B11]\]. We encountered repeatedly, dyspeptic patients, in our clinical practice, whose UBT results were not consistent with histopathology about *H*. *pylori*infection; based on Helicobacter genetic polymorphisms and differences between *H. pylori* strains in different countries, and since clinical validation of Heliprobe ^14^C-UBT has not yet been investigated in an Iranian population, we conducted a prospective study to compare Heliprobe ^14^C-UBT performance against diagnostic gold standards \[[@B12]--[@B14]\]. 2. Materials and Methods {#sec2} ======================== We studied 125 consecutive patients with dyspepsia that had been referred for upper GI endoscopy. We defined dyspepsia, based on the Rome III criteria, as having one or more of the following conditions: postprandial fullness (termed postprandial distress syndrome), early satiation (inability to finish a normal-sized meal or postprandial fullness), and epigastric pain or burning (termed epigastric pain syndrome) \[[@B15]\]. We considered subjects aged 15 y--75 y. We excluded patients who had been using proton pump inhibitors, H2 blockers, or any antibiotics within four previous weeks of the endoscopic evaluation. Pregnant women, patients who had a history of *H. pylori* eradication, and those with any severe cardiopulmonary disorders or debilitating or life-threatening conditions were excluded as well. Study personnel were blinded as to patient test results. The study protocol was approved by the ethics committee of the Gastrointestinal and Liver Diseases Research Center of Guilan University of Medical Sciences, and written informed consents were obtained from each participant. After an overnight fast, patients underwent gastroscopy with a FUJINON endoscope, and four separate gastric biopsies were taken, three from the antrum and one from the corpus. One of the antral samples was used for a rapid urease test (RUT), and two antral samples plus the corpus biopsy sample were used for histopathologic examination. To perform the RUT, we utilized a home-made liquid rapid urease kit (Gastric Urease, Bahar Afshan Co., Iran). We put tissue samples in a yellow-colored reagent liquid, and results were read after 30 min, 60 min, and finally after 24 hours. Liquid color changes into deep red, purple, or violet indicated a positive result. Negative results were indicated by no color change. Tissue samples were prepared with standard hematoxylin and eosin (H&E) and Giemsa stainings for histopathologic investigation. The histopathology exam result was considered positive when *H*. *pylori* was detected in either of the stains and negative when the organism was not detected in any. One blood sample was obtained from each patient to be examined for anti *H. pylori*IgG titer. We utilized the ELIZA method (LDN, Nordhorn, Germany), and sera with titers that were \>11 international units (IU) were considered positive (test cut-off point: 10 IU, \<9 IU: negative, 9--11 IU: doubtful, \>11 IU: positive); we regarded doubtful results as negative. After gastroscopy, we performed Heliprobe ^14^C-UBT tests. In order to carry out the UBT, after an overnight fast, the patient swallowed a ^14^C-labeled urea-containing capsule (Helicap, Institute of Isotopes, Budapest, Hungary) with water. The overall activity of these capsules is as small as 1 *μ*Ci (37 KBq). After 15 minutes, the patient breathed out into a dry cartridge (Heliprobe breath card, Kibion AB, Uppsala, Sweden) through its mouthpiece until the color of the card indicator changed from orange to yellow, which took about 1 min to 2 min. Thereafter, the breath card was inserted into a small desktop Geiger Müller counter (Heliprobe Analyser, Kibion AB, Uppsala, Sweden), and the radioactivity of the breath samples was read after 250 seconds of an automated process. Finally, the test results were expressed on the LCD of the analyzer in a numeric fashion (0: patient not infected, 1: borderline result, 2: patient infected), which corresponded to radioactivity as count per minute (CPM): \<25 CPM: patient not infected, 25--50 CPM: borderline result, \>50 CPM: patient infected. We considered grades 0 and 1 as negative results in our study, and only samples with activities that were more than 50 CPM (expressed as no. 2 on the counter LCD) were regarded as positive. Descriptive analysis was done for demographic features. Gold standard for *H. pylori*positivity was defined as "positive results for any two of three diagnostic methods (histopathology, RUT, serology)." Sensitivity, specificity, negative and positive predictive values (NPV and PPV), and the accuracy of the UBT were computed against our GS; for categorical variables, 95% confidence interval (95% CI) was calculated. 3. Results {#sec3} ========== We enrolled 125 consecutive patients in our study according to the above mentioned inclusion and exclusion criteria; 65 (52%) were females, and 60 (48%) were males. Patient ages ranged from 18 y to 66 y with a mean of 35.81 ± 12.97 y. As a result of histopathologic evaluation of tissue specimens, 69 (55.2%) patients were found to be infected with *H. pylori,*and 56 (44.8%) were not infected. Serologic examination of patient sera samples for IgG antibody against *H. pylori*showed 87 (69.6%) positive results, while the remaining 38 (30.4%) were seronegative. The RUT results were positive in 63 (50.4%) patients and negative in 62 (49.2%) patients. *H. pylori*infection was found in 67 (53.6%) subjects by the ^14^C urea breath test (^14^C-UBT), and 58 (46.4%) subjects were negative. All four tests were positive or negative in 57 (45.6%) and 34 (27.2%) patients, respectively. Only 2 patients had no histopathologic evidence of *H. pylori* infection, whilst their RUT and serology results were positive. (Incidentally these two patients also had positive UBTs.); We think that this might be the result of errors during sampling or histopathologic examination. 20 patients showed solitary positive serology tests which indicated recent past infection. [Table 1](#tab1){ref-type="table"} shows other discordances between our test results. Compared to our GS, the UBT could correctly detect 67 of 71 *H. pylori* infected subjects with 94% sensitivity (95% CI: 85--98%) and 100% positive predictive value (PPV; 95% CI: 93--100%). The UBT also excluded correctly all 54 uninfected patients with 100% specificity (95% CI: 92--100%) and negative predictive value (NPV) of 93% (95% CI: 82--98%). The UBT showed 97% accuracy ([Table 2](#tab2){ref-type="table"}). 4. Discussion {#sec4} ============= *H. pylori* has a high prevalence rate in developing countries, such as Iran. According to data reported by Derakhshan et al., *H. pylori*must be considered a risk factor for noncardiac gastric adenocarcinoma in Iranian patient \[[@B16]\]. Eradication of *H. pylori*could lower the incidence rate of gastric cancer \[[@B17]\]. A more precise diagnosis of *H. pylori,* allowing an earlier eradicating treatment, may play a crucial role in cancer prevention strategies. Currently, there is an increasing need for an easy-to-perform, accurate, and readily available diagnostic technique in *H. pylori*prevalent populations. Considering economic concerns and the availability of tests in developing countries, as well as testing possibilities in medical clinics, we recommend use of the Heliprobe ^14^C-UBT over other noninvasive and invasive tests. Based on the data that suggest that the combination of tests increases their overall diagnostic power, we combined *H. pylori* serologic assessment and the RUT with histopathology in order to account for the possibility of very few false negative results from microscopic examination (which were seen in two cases in our study) \[[@B18]\]. We discovered that the ^14^C-UBT has 94% sensitivity, 100% specificity, 100% PPV, 93% NPV, and 97% accuracy, compared with GS. These findings are compatible with Jonaitis et al.\'s study results, with their defined *H. pylori* positive gold standard as "at least one positive test of RUT or histopathology". They found that Heliprobe had 92% sensitivity, 100% specificity, 100% PPV, 84% NPV, and 94% accuracy \[[@B19]\]. Our results are also in accordance with Ozdemir et al.\'s results for Heliprobe performance (96.6% sensitivity, 100% specificity, 93.7% PPV, 100% NPV, and 97.7% accuracy), although their *H. pylori*positive gold standard was defined as "positivity of any two of the three following tests (RUT, PCR, and histopathology)" \[[@B20]\]. In Rasool et al.\'s study regarding histopathology alone as GS, Heliprobe sensitivity, specificity, NPV, PPV, and accuracy were 92%, 93%, 84%, 97%, and 93%, respectively, which were consistent with our results although the studies\' gold standards are slightly different \[[@B21]\]. In another study, conducted by Öztürk et al. that is again regarding only histopathology as GS, Heliprobe had higher sensitivity (100%), but its specificity (76%) was lower than that of our study \[[@B22]\]. People who undergo medical diagnostic tests using radioisotopes are often worried about radiation exposure. The half life of the ^14^C isotope is about 5000 years, but, with regards to the short biologic half life of urea, more than two-thirds of the tagged urea will be excreted in the urine within the following three days of the test; moreover, the total dose of the ^14^C used in the test is very low, and activity of this quantity of isotope was evaluated as 1 *μ*Ci. Accordingly, based on the published data, about 800 breath testing episodes must be carried out for one person to receive an effective dose equivalent to the amount that an average person absorbs from natural sources in one year \[[@B23]\]. Considering the few times a person needs to be tested with the ^14^C-UBT, the lifelong cumulative radiation of the test is negligible. Even in conditions of repeated UBT testing, radiation exposure risk is very low. Previously, ^14^C-UBT was not used in children because of the concerns about the radiation hazards; however, diverse studies have established its safety in pediatric patients \[[@B11], [@B24]\]. Although no experimental study has yet been done to assess ^14^C-UBT safety in pregnancy, Bentur et al. have claimed that, in view of the insignificant ^14^C radioactivity, fetal radiation exposure is extremely lower than teratogenic thresholds \[[@B25]\]. One of the advantages of the Heliprobe system is that it can be used in a clinical setting, allowing the preparation of test results on-site in less than one hour. The portable beta-scintillation counter that is used in this test could simply be placed on a desktop; however, the ^13^C-UBT needs a sophisticated mass spectrophotometer to read the results. Of course, ^13^C-UBT has some advantages over ^14^C-UBT such that the former utilizes a nonradioactive isotope that makes it suitable to use in pregnant women and children. Although some studies, as mentioned earlier, have already emphasized on ^14^C-UBT safety in children, ^13^C-UBT is still the preferred method in them. Considering ^13^C safety, it is also a better isotope than ^14^C for epidemiologic studies, as some studies used it to investigate *H. pylori*routes of transmission in preschool age \[[@B26], [@B27]\]. Stool antigen is another sensitive and specific noninvasive diagnostic test for *H. pylori* \[[@B28]\]. Although it is competitive with the ^14^C-UBT in terms of accuracy, but it is not appropriate for office use because it is a time consuming exam regarding sampling limitations and off-site test interpretation. Conclusively, compared to invasive gold standards, the Heliprobe ^14^C-UBT is an accurate, sensitive, and specific test for *H*. *pylori*diagnosis. The main advantages of the Heliprobe ^14^C-UBT are its rapidity and patient convenience. Furthermore, in view of the very low radioactivity of the Heliprobe ^14^C-UBT and its portability, this test seems to be a more suitable option for office use than a nonradioactive, complex and off-site ^13^C-UBT as well as other invasive diagnostic modalities. There are no potential conflict of interests that any of the authors have identified relevant to this paper. The authors thank the Gastrointestinal and Liver Diseases Research Center (GLDRC) of Guilan University of Medical Sciences and Beta Medical Engineering Co., which supported this work in part (<http://www.betamedgroup.com/>), especially Mr. Ali Rafat-Zand for financial support for this work. ###### Distribution of *H. pylori*diagnostic test discordant results. Patients (*n*) Histology RUT Serology UBT ---------------- ----------- ----- ---------- ----- 57 \+ \+ \+ \+ 4 \+ \+ − \+ 4 \+ − \+ \+ 4 \+ − \+ − 2 − \+ \+ \+ 20 − − \+ − 34 − − − − RUT: rapid urease test; UBT: urea breath test; +: positive; −: negative; *n*: number. ###### Diagnostic performance of Heliprobe ^14^C-UBT against gold standard. Heliprope ^14^C-UBT compared to: Sensitivity (95% CI) Specificity (95% CI) PPV (95% CI) NPV (95% CI) Accuracy (95% CI) ---------------------------------- ---------------------- ---------------------- ----------------- --------------- ------------------- Gold standard 94% (85--98%) 100% (92--100%) 100% (93--100%) 93% (82--98%) 97% ^14^C-UBT: urea breath test with labeled carbon-14; RUT: rapid urease test; PPV: positive predictive value; NPV: negative predictive value; CI: confidence interval. For gold standard definitions refer to the text. [^1]: Academic Editor: Y. Yamaoka
{ "pile_set_name": "PubMed Central" }
Why PSV is better off with an offensive 4-3-3 formation Only six games into the season, PSV manager Fred Rutten has seen his side transform from a toothless bunch to a free scoring title contender. This post will first glance over the match tactics involved, in order to identify the positive changes made by Rutten, before taking a dive into some detailed match stats to illustrate the effects of Rutten’s tactical changes. Early season results After a false start that saw them lose 3-1 away at AZ in the first match, PSV continued with a narrow and bleak 1-0 home victory over newly promoted RKC. At that early point in the season, Rutten changed things around a bit. His side came in for quite some stick on the back of two season’s ending in third place finishes under Rutten’s reign, and more so, Rutten’s general conservative approach was openly criticized by the home fans. Early signs of the pre-season games were hopeful of a change to a more progressive midfield and the arrival of left winger Mertens, offensive midfielder Wijnaldum and upcoming all-round midfield man Strootman has injected PSV with the types of players needed in such a system. However, Rutten didn’t extend his pre-season intentions into the first competitive games of the season, but rather returned to a double holding midfielder system, introducing young Funso Ojo beside Strootman, with Wijnaldum in the hole behind lone striker Toivonen. The abovementioned disappointing games against AZ and RKC helped Rutten turn back to his offensive pre-season midfield, shifting Lens from right wing into the striker role to move Toivonen back to his natural offensive midfielder role, supporting Wijnaldum and leaving a single holding role for Strootman. The vacated left wing was filled in by 18-year old talent Zakaria Labyad. From that moment on, PSV’s season took a turn for the better. And as if to destroy any remaining doubts, Rutten changed his team back to the conservative double holding midfielder system for the away game at Ried, for a disappointing 0-0 draw that was erase with the more offensive system with a 5-0 win in the home game. For clarity, let’s refer to PSV’s initial conservative formation as a 4-2-3-1 and to PSV’s subsequent offensive formation as a 4-3-3. The 4-2-3-1 was applied in the games against AZ away, RKC at home and Ried away and the 4-3-3 was applied against ADO away, Ried at home and Excelsior at home. A simple glance at the results under the 4-2-3-1 system (1-3 ; 1-0 ; 0-0) versus the 4-3-3 system (3-0 ; 5-0 ; 6-1) tells quite a story already, but there’s more to it than that. With the help of InStatFootball, a company specifying in detailed football match data, 11tegen11 is able to use specific team and player data to study the differences between both system more in depth. Goal scoring chances The major change in score lines between the three matches played under the 4-2-3-1 versus those three played under the 4-3-3 system is underlined by a spectacular improvement in the amount of goal scoring chances too. The table below illustrates this well, showing that PSV increased their shots on target from 3.7 to 11 per match, while reducing their conceded shots on target from 4 to 1.7. 4-2-3-1 4-3-3 Goals PSV 0.7 4.7 opponent 1 0.3 Shots PSV 11.7 25.7 opponent 10.3 6.3 Shots on target PSV 3.7 11 opponent 4 1.7 Midfield passing PSV’s change from a double to a single holding midfielder is reflected very well in their midfield passing statistics. Kevin Strootman and Funso Ojo started all three 4-2-3-1 matches as the double pivot, holding the midfield in front of PSV’s back four. Both contributed an equal share of passes, averaging 68 and 66 passes per 90 minutes respectively, with completion rates of 83% (Strootman) and 87% (Ojo). However, offensive midfielder Wijnaldum lacked support, resulting in him passing the ball less than half as often as his defensive midfield team mates. Wijnaldum made on average only 29 pass attempts per 90 minutes, completing 86% of those. Under the 4-3-3 system, Strootman increased his passing to an impressive average of 98 pass attempts per 90 minutes, even slightly increasing his completion rate to 85%. With Toivonen’s support, Wijnaldum’s pass attempts increased to 47, with 85% completion and Toivonen added another 43 passes himself, reaching 91% completion of those three games. In conclusion, PSV’s midfield passing improved massively with Strootman operating as a sole holding midfielder. He proved very well capable of increasing his game to cover for the absence of Ojo in that department, while Wijnaldum received the support of Toivonen in the offensive midfield area. PSV’s total amount passes made by central midfield players increased from 163 to 188 (+16%), while the completion rate remained intact (85 and 86%). On top of that, passes were now made in a more offensive and central midfield zone, as is illustrated in Wijnaldum’s passing diagram’s for the Ried away game (4-2-3-1) versus the ADO away game (4-3-3). Offensive efficiency As a whole, PSV operated more efficient in terms of generating attacks from possessions and generating chances from attacks. Under both the 4-3-3 and the 4-2-3-1 system PSV averaged a similar amount of possessions (134 and 136), and the amount of attacks resulting from it were equal too (95 and 100), amounting to a figure of 71% to 74% of possessions turned into attacks. Note that attacks are defined as any spell of possession with passage to the opponent’s half of the field. The difference in offensive efficiency between both systems becomes very clear when looking at the amount of open play attacks turned into shots. For clarity reasons set piece attacks and quick counter breaks have been eliminated. On average 6.8% of open play attacks resulted in a goal scoring attempt under the 4-2-3-1 system, while the 4-3-3 nearly tripled that number to 18.8%, resulting in an increase in the number of attempts from open play from 5 per match to 13. In the end This post clearly illustrates the difference in passing and offensive efficiency between PSV’s three matches played out under last season’s 4-2-3-1 system in comparison with the more offensively intended 4-3-3 system. Particularly, in player terms, the major step up by Kevin Strootman in his role as single holding and passing midfielder has been impressive. This is the first post on 11tegen11 to use extensive in-depth match data, which was courteously provided by InStatFootball, without whom this analysis would not have been possible. The aim is to keep using match data in order to back up (or reject) tactical observations of the naked eye. Please don’t hesitate to provide feedback via the comment boxes below this post, twitter, or email.
{ "pile_set_name": "OpenWebText2" }
Posted 29 May 2014 - 01:00 PM So I haven't found the nifty uncompressed stuff yet, but I have found some really nice images that I assume are from an emulator run through OpenGL filters.
{ "pile_set_name": "OpenWebText2" }
Magnetic materials that concentrate magnetic flux lines have many industrial uses from permanent magnets to magnetic recording heads. In particular, soft magnetic materials that have high permeability and nearly reversible magnetization versus applied field curves find widespread use in electrical power equipment. Commercial Iron-Silicon transformer steels can have relative permeabilities, as high as 100000, saturation inductions around 2.0 T, resistivities up to 70 μΩcm and 50/60 Hz losses of a few watts/kg. Even though these products possess favourable characteristics, the losses of power transmitted in such transformers represent a significant economic loss. Since the 1940's, grain oriented Fe—Si steels have been developed with lower and lower losses [U.S. Pat. No. 1,965,559 (Goss), (1934) and see, for example, the review article: “Soft Magnetic Materials”, G. E. Fish, Proc. IEEE, 78, p. 947 (1990)]. Inspired by the Pry and Bean model [R. H. Pry and C. P. Bean, J. Appl. Phys., 29, p. 532, (1958)] which identifies a mechanism for anomalous losses based on domain wall motion, modern magnetic materials benefit from magnetic domain refinement, for example, by laser scribing [I. Ichijima, M. Nakamura, T. Nozawa and T. Nakata, IEEE Trans Mag, 20, p. 1557, (1984)] or by mechanical scribing. This approach has led to losses around 0.6 W/kg at 60 Hz. By careful control of heat treatment, and mechanical surface etching, very low losses can be obtained in a thin sheet [K. I. Arai, K. Ishiyama and H. Magi, IEEE Trans Mag, 25, p. 3989, (1989)], 0.2 W/kg at 1.7 T and 50 Hz. However, commercially available materials exhibit losses down to 0.68 W/kg at 60 Hz. Over the last 25 years, a refinement of crystal grain size in many ferromagnetic systems has led to a significant decrease in hysteresis losses. According to Herzer's random anisotropy model [Herzer, G. (1989) IEEE Trans Mag 25, 3327-3329, Ibid 26, p. 1397-1402] for grains (less than about 30 nm diameter) that are of diameter less than the magnetic exchange length, the anisotropy is significantly reduced and very soft magnetic behaviour occurs, characterized by very low coercive field values (Hc) below 20 A/m and thus low hysteresis losses. Often, these materials consist of a distribution of nano-crystals embedded in an amorphous matrix, for example: metallic glasses (see U.S. Pat. No. 4,217,135 (Luborsky et al.)). Often, to achieve these desirable properties, a careful stress relief and/or partial recrystallization heat treatment is applied to the material which has been initially produced in a predominantly amorphous state. Metallic glasses are generally fabricated by a rapid quenching and are usually made of 20% of a metalloid such as silicon, phosphorous, boron or carbon and of about 80% of iron. These films are limited in thickness and width. Moreover, edge-to-edge and end-to-end thickness variation occurs along with surface roughness. The interest of such materials is very limited due to the high costs associated with the production of such materials. Amorphous alloy can also be prepared by vacuum deposition, sputtering, plasma spraying, rapidly quenching and electrodeposition. Typical commercial ribbons have a 25 μm thickness and a 210 mm width. Electrodeposition of alloys based on the iron group of metals is one of the most important developments in the last decades in the field of metal alloy deposition. FeP deserves special attention as a cost effective soft magnetic material. FeP alloy films can be produced by electrochemical, electroless, metallurgical, mechanical and sputtering methods. Electrochemical processing is extensively used permitting control of the coating composition, microstructure, internal stress and magnetic properties, by using suitable plating conditions and can be done at low cost. The following provides certain patent examples related to iron-based alloys. U.S. Pat. No. 4,101,389 (Uedaira) discloses the electrodeposition of an amorphous iron-phosphorous or iron-phosphorous-copper film on a copper substrate from an iron (0.3 to 1.7 molar (M) divalent iron) and hypophosphite (0.07-0.42 M hypophosphite) bath using low current densities between 3 and 20 A/dm2, a pH range of 1.0-2.2. and a low temperature of 30 to 50° C. The P content in the deposited films varies between 12 to 30 atomic % with a magnetic flux density Bm of 1.2 to 1.4 T. There is no production of a free-standing foil. U.S. Pat. No. 3,086,927 (Chessin et al.) discloses the addition of minor amounts of phosphorus in the iron electrodeposits to harden iron for hard facing or coating of such parts as shafts and rolls. This patent cites adding between 0.0006 M and 0.06 M of hypophosphite in the iron bath at a temperature between 38 to 76° C. over a current density range of 2 to 10 A/dm2. But for fissure-free deposit, the bath is operated at 70° C., at currents lower than 2.2 A/dm2 and at concentrations of sodium hypophosphite monohydrate of 0.009 M. There is no mention of a free-standing foil production. U.S. Pat. No. 4,079,430 (Fujishima et al.) describes amorphous metal alloys employed in a magnetic head as core materials. Such alloys are generally composed of M and Y, wherein M is at least one of Fe, Ni and Co and Y is at least one of P, B, C and Si. The amorphous metal alloys used are presented as a combination of the desirable properties of conventional permalloys with those of conventional ferrites. The interest of these materials as a constitutive element of a transformer is, however, limited due to their low maximum flux density. U.S. Pat. No. 4,533,441 (Gamblin) describes that iron-phosphorous electroforms may be fabricated electrically from a plating bath which contains at least one compound from which iron can be electrolytically deposited, at least one compound which serves as a source of phosphorus such as hypophosphorous acid, and at least one compound selected from the group consisting of glycin, beta-alanine, DL-alanine, and succinic acid. The alloy thereby obtained, that is always prepared in presence of an amine, is characterised neither for its crystalline structure nor by any mechanical or electromagnetic measures and can only be recovered from the flat support by flexing the support. U.S. Pat. No. 5,225,006 (Sawa et al.) discloses a Fe-based soft magnetic alloy having soft magnetic characteristics with high saturation magnetic flux density, characterized in that it has very small crystal grains. The alloy may be treated to cause segregation of these small crystal grains. The following provides certain patent examples related to cobalt and nickel phosphorous alloys. U.S. Pat. No. 5,435,903 (Oda et al.) discloses a process for the electrodeposition of a peeled foil-shaped or tape-shaped product of CoFeP having good workability and good soft magnetic properties. The amorphous alloy contains at least 69 atomic % of Co and 2 to 30 atomic % of P. There is no mention of a FeP amorphous alloy. U.S. Pat. No. 5,032,464 (Lichtenberger) discloses an electrodeposited amorphous alloy of NiP as a free-standing foil of improved ductility. There is no mention of a FeP amorphous alloy. The following provides certain examples of publications related to FeP alloys. Several papers were concerned with the formation of FeP deposits on a substrate with good soft magnetic properties. T. Osaka et al., in “Preparation of Electrodeposited FeP Films and their Soft Magnetic Properties”, [Journal of the Magnetic Society of Japan Vol. 18, Supplement, No. S1 (1994)], mentions electrodeposited FeP films, and the most suitable FeP alloy film exhibits a minimum coercive field, 0.2 Oe, and a high saturation magnetic flux density, 1.4 T, at the P content of 27 atomic %. In order to improve the magnetic properties, in particular the permeability, a magnetic field heat treatment was adopted, and the permeability was increased to 1400. The most suitable film was found to be a hyper-fine crystalline structure. The thermal stability of the FeP film was also confirmed to be up to 300° C. (annealing without magnetic field in vacuum). K. Kamei and Y. Maehara [J. Appl. Electrochem., 26, p. 529-535 (1996)] found the lowest Hc of about 0.05 Oe obtained with an electrodeposited and annealed FeP amorphous alloy, with phosphorous content of about 20 atomic %. This paper cites adding up to 0.15 M of sodium hypophosphite in the iron bath at a temperature of 50° C. over a current density of 5 A/dm2 and a pH of 2.0. K. Kamei and Y. Maehara [Mat. Sc. And Eng., A181/A182, p. 906-910 (1994)] used a pulsed-plating bath to electrodeposit FeP and FePCu on a substrate and a low Hc value of 0.5 Oe was obtained for the FePCu at a relatively high current density of 20 A/dm2. The microstructure of electrodeposited FeP deserves large attention in the literature. It was established that the crystallographic structure of FeP electrodeposited film gradually changes from crystalline to amorphous with increasing P content in the deposited film until 12-15 atomic %. There was a need for new amorphous material free of at least one of the drawbacks traditionally associated with the available amorphous material. There was also a need for a new amorphous material presenting improved mechanical and/or electromagnetic and/or electrical properties, in particular good soft magnetic properties that are very useful for different applications. There was also a need for a new process allowing the preparation of an amorphous free foil with predetermined mechanical and/or electromagnetic properties, in particular with a low stress and good soft magnetic properties. There was particularly a need for an economic process for producing such materials. There was also a need for a new practical, efficient and economic process for producing amorphous foils with a thickness up to 250 microns and without limitation in the size of the foil. There was, therefore, a need for a new amorphous material as free-standing foil free of at least one of the drawbacks of known amorphous materials and presenting the magnetic properties, namely high saturation induction, low coercive field, high permeability and low power frequency losses, which are required when the material is used to form the ferromagnetic cores of transformers, motors, generators and magnetic shieldings.
{ "pile_set_name": "USPTO Backgrounds" }
I Can Predict the Future Whatever happens in next Tuesday's midterm elections, one thing seems certain: there will be a lot more Republicans in Congress. President Barack Obama has a plan for that: an "appropriate sense of humility about what we can accomplish," and spending "more time building consensus." The thing that continues to blow my mind about the Obama administration is that they understand why they've failed to build bipartisanship, but they keep trying anyway. It's like Lucy and the football. They're doing the same thing over and over and expecting a different result. You know, the definition of crazy. Here's Dan Pfeiffer, Obama's communications director, diagnosing the problem to the New York Times: Dan Pfeiffer, Mr. Obama’s communications director, said the president had "repeatedly extended his hand" to Republicans, who "made a political decision" to oppose him at every turn. "That was their choice," Mr. Pfeiffer said. And here he is, in the very next sentence, kicking at the football again: "Hopefully, they will make a different one after the election." See what I mean? You may not know this, but I can predict the future. Here goes: after November, the Republicans will continue to oppose Obama at every turn and focus their efforts on making him a one-term president. How do I know? I'm listening to them. Here's Rep. Mike Pence (R-Ind.), a member of the House GOP leadership: Look, there will be no compromise on stopping runaway spending, deficits and debt. There will be no compromise on repealing Obamacare. There will be no compromise on stopping Democrats from growing government and raising taxes. And if I haven’t been clear enough yet, let me say again: No compromise. The single most important thing we want to achieve is for President Obama to be a one-term president. As Andrew Sullivan writes, this is what the congressional GOP stands for: defeating Obama and putting more Republicans in power (and, of course, tax cuts for the rich). Democrats, of course, wanted to beat George W. Bush. But many of them—including even the late Ted Kennedy—were willing to make common cause with him occasionally. I don't see any of that from the current GOP caucus. The only mystery, as Kevin Drum argues, is what Obama will do. Will he push for Republican policy goals (as Bill Clinton did with welfare reform) so that he can at least sign some legislation before 2012? Or will he veto them? Of course, there's a chance the whole country will become consumed with another impeachment drama and we won't have to worry about either of those things.
{ "pile_set_name": "Pile-CC" }
(* *********************************************************************) (* *) (* The Compcert verified compiler *) (* *) (* Xavier Leroy, INRIA Paris-Rocquencourt *) (* *) (* Copyright Institut National de Recherche en Informatique et en *) (* Automatique. All rights reserved. This file is distributed *) (* under the terms of the INRIA Non-Commercial License Agreement. *) (* *) (* *********************************************************************) (** Postorder renumbering of RTL control-flow graphs. *) Require Import Coqlib Maps Postorder. Require Import AST Linking. Require Import Values Memory Globalenvs Events Smallstep. Require Import Op Registers RTL Renumber. Definition match_prog (p tp: RTL.program) := match_program (fun ctx f tf => tf = transf_fundef f) eq p tp. Lemma transf_program_match: forall p, match_prog p (transf_program p). Proof. intros. eapply match_transform_program; eauto. Qed. Section PRESERVATION. Variables prog tprog: program. Hypothesis TRANSL: match_prog prog tprog. Let ge := Genv.globalenv prog. Let tge := Genv.globalenv tprog. Lemma functions_translated: forall v f, Genv.find_funct ge v = Some f -> Genv.find_funct tge v = Some (transf_fundef f). Proof (Genv.find_funct_transf TRANSL). Lemma function_ptr_translated: forall v f, Genv.find_funct_ptr ge v = Some f -> Genv.find_funct_ptr tge v = Some (transf_fundef f). Proof (Genv.find_funct_ptr_transf TRANSL). Lemma symbols_preserved: forall id, Genv.find_symbol tge id = Genv.find_symbol ge id. Proof (Genv.find_symbol_transf TRANSL). Lemma senv_preserved: Senv.equiv ge tge. Proof (Genv.senv_transf TRANSL). Lemma sig_preserved: forall f, funsig (transf_fundef f) = funsig f. Proof. destruct f; reflexivity. Qed. Lemma find_function_translated: forall ros rs fd, find_function ge ros rs = Some fd -> find_function tge ros rs = Some (transf_fundef fd). Proof. unfold find_function; intros. destruct ros as [r|id]. eapply functions_translated; eauto. rewrite symbols_preserved. destruct (Genv.find_symbol ge id); try congruence. eapply function_ptr_translated; eauto. Qed. (** Effect of an injective renaming of nodes on a CFG. *) Section RENUMBER. Variable f: PTree.t positive. Hypothesis f_inj: forall x1 x2 y, f!x1 = Some y -> f!x2 = Some y -> x1 = x2. Lemma renum_cfg_nodes: forall c x y i, c!x = Some i -> f!x = Some y -> (renum_cfg f c)!y = Some(renum_instr f i). Proof. set (P := fun (c c': code) => forall x y i, c!x = Some i -> f!x = Some y -> c'!y = Some(renum_instr f i)). intros c0. change (P c0 (renum_cfg f c0)). unfold renum_cfg. apply PTree_Properties.fold_rec; unfold P; intros. (* extensionality *) eapply H0; eauto. rewrite H; auto. (* base *) rewrite PTree.gempty in H; congruence. (* induction *) rewrite PTree.gsspec in H2. unfold renum_node. destruct (peq x k). inv H2. rewrite H3. apply PTree.gss. destruct f!k as [y'|] eqn:?. rewrite PTree.gso. eauto. red; intros; subst y'. elim n. eapply f_inj; eauto. eauto. Qed. End RENUMBER. Definition pnum (f: function) := postorder (successors_map f) f.(fn_entrypoint). Definition reach (f: function) (pc: node) := reachable (successors_map f) f.(fn_entrypoint) pc. Lemma transf_function_at: forall f pc i, f.(fn_code)!pc = Some i -> reach f pc -> (transf_function f).(fn_code)!(renum_pc (pnum f) pc) = Some(renum_instr (pnum f) i). Proof. intros. destruct (postorder_correct (successors_map f) f.(fn_entrypoint)) as [A B]. fold (pnum f) in *. unfold renum_pc. destruct (pnum f)! pc as [pc'|] eqn:?. simpl. eapply renum_cfg_nodes; eauto. elim (B pc); auto. unfold successors_map. rewrite PTree.gmap1. rewrite H. simpl. congruence. Qed. Ltac TR_AT := match goal with | [ A: (fn_code _)!_ = Some _ , B: reach _ _ |- _ ] => generalize (transf_function_at _ _ _ A B); simpl renum_instr; intros end. Lemma reach_succ: forall f pc i s, f.(fn_code)!pc = Some i -> In s (successors_instr i) -> reach f pc -> reach f s. Proof. unfold reach; intros. econstructor; eauto. unfold successors_map. rewrite PTree.gmap1. rewrite H. auto. Qed. Inductive match_frames: RTL.stackframe -> RTL.stackframe -> Prop := | match_frames_intro: forall res f sp pc rs (REACH: reach f pc), match_frames (Stackframe res f sp pc rs) (Stackframe res (transf_function f) sp (renum_pc (pnum f) pc) rs). Inductive match_states: RTL.state -> RTL.state -> Prop := | match_regular_states: forall stk f sp pc rs m stk' (STACKS: list_forall2 match_frames stk stk') (REACH: reach f pc), match_states (State stk f sp pc rs m) (State stk' (transf_function f) sp (renum_pc (pnum f) pc) rs m) | match_callstates: forall stk f args m stk' (STACKS: list_forall2 match_frames stk stk'), match_states (Callstate stk f args m) (Callstate stk' (transf_fundef f) args m) | match_returnstates: forall stk v m stk' (STACKS: list_forall2 match_frames stk stk'), match_states (Returnstate stk v m) (Returnstate stk' v m). Lemma step_simulation: forall S1 t S2, RTL.step ge S1 t S2 -> forall S1', match_states S1 S1' -> exists S2', RTL.step tge S1' t S2' /\ match_states S2 S2'. Proof. induction 1; intros S1' MS; inv MS; try TR_AT. (* nop *) econstructor; split. eapply exec_Inop; eauto. constructor; auto. eapply reach_succ; eauto. simpl; auto. (* op *) econstructor; split. eapply exec_Iop; eauto. instantiate (1 := v). rewrite <- H0. apply eval_operation_preserved. exact symbols_preserved. constructor; auto. eapply reach_succ; eauto. simpl; auto. (* load *) econstructor; split. assert (eval_addressing tge sp addr rs ## args = Some a). rewrite <- H0. apply eval_addressing_preserved. exact symbols_preserved. eapply exec_Iload; eauto. constructor; auto. eapply reach_succ; eauto. simpl; auto. (* store *) econstructor; split. assert (eval_addressing tge sp addr rs ## args = Some a). rewrite <- H0. apply eval_addressing_preserved. exact symbols_preserved. eapply exec_Istore; eauto. constructor; auto. eapply reach_succ; eauto. simpl; auto. (* call *) econstructor; split. eapply exec_Icall with (fd := transf_fundef fd); eauto. eapply find_function_translated; eauto. apply sig_preserved. constructor. constructor; auto. constructor. eapply reach_succ; eauto. simpl; auto. (* tailcall *) econstructor; split. eapply exec_Itailcall with (fd := transf_fundef fd); eauto. eapply find_function_translated; eauto. apply sig_preserved. constructor. auto. (* builtin *) econstructor; split. eapply exec_Ibuiltin; eauto. eapply eval_builtin_args_preserved with (ge1 := ge); eauto. exact symbols_preserved. eapply external_call_symbols_preserved; eauto. apply senv_preserved. constructor; auto. eapply reach_succ; eauto. simpl; auto. (* cond *) econstructor; split. eapply exec_Icond; eauto. replace (if b then renum_pc (pnum f) ifso else renum_pc (pnum f) ifnot) with (renum_pc (pnum f) (if b then ifso else ifnot)). constructor; auto. eapply reach_succ; eauto. simpl. destruct b; auto. destruct b; auto. (* jumptbl *) econstructor; split. eapply exec_Ijumptable; eauto. rewrite list_nth_z_map. rewrite H1. simpl; eauto. constructor; auto. eapply reach_succ; eauto. simpl. eapply list_nth_z_in; eauto. (* return *) econstructor; split. eapply exec_Ireturn; eauto. constructor; auto. (* internal function *) simpl. econstructor; split. eapply exec_function_internal; eauto. constructor; auto. unfold reach. constructor. (* external function *) econstructor; split. eapply exec_function_external; eauto. eapply external_call_symbols_preserved; eauto. apply senv_preserved. constructor; auto. (* return *) inv STACKS. inv H1. econstructor; split. eapply exec_return; eauto. constructor; auto. Qed. Lemma transf_initial_states: forall S1, RTL.initial_state prog S1 -> exists S2, RTL.initial_state tprog S2 /\ match_states S1 S2. Proof. intros. inv H. econstructor; split. econstructor. eapply (Genv.init_mem_transf TRANSL); eauto. rewrite symbols_preserved. rewrite (match_program_main TRANSL). eauto. eapply function_ptr_translated; eauto. rewrite <- H3; apply sig_preserved. constructor. constructor. Qed. Lemma transf_final_states: forall S1 S2 r, match_states S1 S2 -> RTL.final_state S1 r -> RTL.final_state S2 r. Proof. intros. inv H0. inv H. inv STACKS. constructor. Qed. Theorem transf_program_correct: forward_simulation (RTL.semantics prog) (RTL.semantics tprog). Proof. eapply forward_simulation_step. apply senv_preserved. eexact transf_initial_states. eexact transf_final_states. exact step_simulation. Qed. End PRESERVATION.
{ "pile_set_name": "Github" }
1. Introduction {#sec1} =============== Periodontal disease is accompanied by inflammation of the gingiva and destruction of periodontal tissues, leading to alveolar bone loss in severe clinical cases. Prostaglandin E~2~ (PGE~2~), interleukin- (IL-)6, and IL-8 are known to play important roles in inflammatory responses and tissue degradation. PGE~2~ has several functions in vasodilation, the enhancement of vascular permeability and pain, and the induction of osteoclastogenesis and is believed to play important roles in inflammatory responses and alveolar bone resorption in periodontal disease \[[@B1]\]. IL-6 has the ability to induce osteoclastogenesis \[[@B2], [@B3]\]. IL-8 acts as a chemoattractant for neutrophils \[[@B4]\] that produce proteases such as cathepsin, elastase, and matrix metalloproteinase- (MMP-)8, leading to tissue degradation. Recently, we reported that several kampo medicines, shosaikoto \[[@B5]\], hangeshashinto \[[@B6]\], and orento \[[@B7]\], suppress lipopolysaccharide- (LPS-) induced PGE~2~ production by HGFs and suggested that these kampo medicines have anti-inflammatory effects in periodontal disease. Another kampo medicine, kakkonto (TJ-1), has been clinically used for various diseases such as the common cold, coryza, the initial stage of febrile diseases, and inflammatory diseases. There are several reports that kakkonto shows antiallergic effects \[[@B8], [@B9]\] and antiviral effects \[[@B10]--[@B13]\] in animal and *in vitro* experimental models. For anti-inflammatory effects, kakkonto has been reported to decrease PGE~2~ production in cultured rabbit astrocytes \[[@B14]\]. Therefore, we considered the possibility that kakkonto decreases PGE~2~ production by human gingival fibroblasts (HGFs) and has anti-inflammatory effects with respect to periodontal disease. However, the anti-inflammatory effects of kakkonto are not adequately understood. HGFs are the most prominent cells in periodontal tissue. Moreover, LPS-treated HGFs produce inflammatory chemical mediators such as PGE~2~ and inflammatory cytokines such as IL-6 and IL-8 \[[@B2], [@B15], [@B16]\]. Moreover, because HGFs have sustained production of PGE~2~ \[[@B17]\], IL-6, and IL-8 \[[@B18]\] in the presence of LPS, these mediators and cytokines in periodontal tissues are thought to be derived from HGFs. Therefore, we believe that examining the effects of drugs on HGFs, as well as on monocytes and macrophages, is important in the study of periodontal disease. In the present study, we examined the effect of kakkonto on LPS-induced PGE~2~, IL-6, and IL-8 production using this *in vitro* model. 2. Materials and Methods {#sec2} ======================== 2.1. Reagents {#sec2.1} ------------- Kakkonto was purchased from Tsumura & Co. (Tokyo, Japan; lot number: D23122), and its components are listed in [Table 1](#tab1){ref-type="table"}. Kakkonto was suspended in Dulbecco\'s modified Eagle\'s medium (D-MEM, Sigma, St. Louis, MO, USA) containing 10% heat-inactivated fetal calf serum, 100 units/mL penicillin, and 100 mg/mL streptomycin (culture medium) and was rotated at 4°C overnight. Then, the suspension was centrifuged and the supernatant was filtrated through a 0.45 *μ*m-pore membrane. Phorbol 12-myristate 13-acetate (PMA) purchased from Sigma. Other reagents were purchased from Nacalai tesque (Kyoto, Japan). LPS from *Porphyromonas gingivalis* 381 was provided by Professor Nobuhiro Hanada (School of Dental Medicine, Tsurumi University, Japan). 2.2. Cells {#sec2.2} ---------- HGFs were prepared as described previously \[[@B6]\]. In brief, HGFs were prepared from free gingiva during the extraction of an impacted tooth with the informed consent of the subjects who consulted Matsumoto Dental University Hospital. The free gingival tissues were cut into pieces and seeded onto 24-well plates (AGC Techno Glass Co., Chiba, Japan). HGFs were maintained in culture medium at 37°C in a humidified atmosphere of 5% CO. For passage, HGFs were trypsinized, suspended, and plated into new cultures in a 1 : 3 dilution ratio. HGFs were used between the 10th and 15th passages in the assays. This study was approved by the Ethical Committee of Matsumoto Dental University (number 0063). 2.3. Cell Viability {#sec2.3} ------------------- The numbers of cells were measured using WST-8 (Cell Counting Kit-8; Dojindo, Kumamoto, Japan) according to the manufacturer\'s instructions. In brief, HGFs (10,000 cells/well) were seeded in 96-well plates (AGC Techno Glass Co., Chiba, Japan) and incubated in serum-containing medium at 37°C overnight. Then, the cells were treated with various concentrations of kakkonto (0, 0.5, 1, 2, 5, and 10 mg/mL) in the absence or presence of LPS (10 ng/mL) for 24 h (200 *μ*L each well) in quadruplicate for each sample. Then, the media were removed by aspiration and the cells were treated with 100 *μ*L of mixture of WST-8 with culture medium for 2 h at 37°C in CO incubator. Optical density was measured (measured wavelength at 450 nm and reference wavelength at 655 nm) using an iMark microplate reader (Bio-Rad, Hercules, CA, USA), and the mean background value was subtracted from each value. Data is represented as means ± SD (*n* = 4). 2.4. Enzyme-Linked Immunosorbent Assay (ELISA) {#sec2.4} ---------------------------------------------- HGFs (10,000 cells/well) were seeded in 96-well plates and incubated in serum-containing medium at 37°C overnight. Then, the cells were treated with various concentrations of kakkonto (0, 0.01, 0.03, 0.1, 0.3, and 1 mg/mL) in the absence or presence of LPS (10 ng/mL) for 24 h (200 *μ*L each well) in triplicate for each sample. After the culture supernatants were collected, viable cell numbers were measured using WST-8 as described above. The concentrations of PGE~2~, IL-6, and IL-8 in the culture supernatants were measured by ELISA according to the manufacturer\'s instructions (PGE~2~, Cayman Chemical, Ann Arbor, MI, USA; IL-6 and IL-8, Biosource International Inc., Camarillo, CA, USA) and were adjusted by the number of viable cells. Data are represented as ng or pg per 10,000 cells (mean ± SD, *n* = 3). 2.5. Cyclooxygenase Activity {#sec2.5} ---------------------------- The effects of kakkonto on the activities of cyclooxygenase (COX)-1 and COX-2 were analyzed using a COX inhibitor screening assay kit (Cayman Chemical, Ann Arbor, MI, USA) according to the manufacturer\'s instructions. COX activities were evaluated by the measurement of prostaglandin produced from arachidonic acid by COX-1 or COX-2. These values were normalized to a relative value of 100% for cells without LPS or kakkonto treatments, and are represented as means ± SD (*n* = 3). 2.6. Western Blotting {#sec2.6} --------------------- HGFs were cultured in 60 mm dishes and treated with combinations of LPS and kakkonto for the indicated times. Then, cells were washed twice with Tris-buffered saline, transferred into microcentrifuge tubes, and centrifuged at 6,000 ×g for 5 min at 4°C. Supernatants were aspirated and cells were lysed on ice in lysis buffer (50 mM Tris-HCl, pH 7.4, 1% Nonidet P-40, 0.25% sodium deoxycholate, 150 mM NaCl, 1 mM ethyleneglycol bis(2-aminoethylether) tetraacetic acid (EGTA), 1 mM sodium orthovanadate, 10 mM sodium fluoride, 1 mM phenylmethylsulfonyl fluoride, 10 *μ*g/mL aprotinin, 5 *μ*g/mL leupeptin, and 1 *μ*g/mL pepstatin) for 30 min at 4°C. Then, samples were centrifuged at 12,000 ×gfor 15 min at 4°C, and supernatants were collected. The protein concentration was measured using a BCA Protein Assay Reagent Kit (Pierce Chemical Co., Rockford, IL, USA). The samples (10 *μ*g of protein) were fractionated in a polyacrylamide gel under reducing conditions and transferred onto a polyvinylidene difluoride (PVDF) membrane (Hybond-P; GE Healthcare, Uppsala, Sweden). The membranes were blocked with 5% ovalbumin for 1 h at room temperature and incubated with primary antibody for an additional 1 h. The membranes were further incubated with horseradish peroxidase-conjugated secondary antibodies for 1 h at room temperature. Protein bands were visualized with an ECL Kit (GE Healthcare). Antibodies against COX-2 (sc-1745, 1 : 500 dilution), cytoplasmic phospholipase A~2~ (cPLA~2~, sc-438, 1 : 200 dilution), annexin1 (sc-11387, 1 : 1,000 dilution), and actin (sc-1616, 1 : 1,000 dilution), which detects a broad range of actin isoforms, were purchased from Santa Cruz Biotechnology (Santa Cruz, CA, USA). Antibodies against extracellular signal-regulated kinase (ERK; p44/42 MAP kinase antibody, 1 : 1,000 dilution) and phosphorylated ERK (Phospho-p44/42 MAPK (Thr202/Tyr204) (E10) monoclonal antibody, 1 : 2,000 dilution) were from Cell Signaling Technology (Danvers, MA, USA). Horseradish peroxidase-conjugated anti-goat IgG (sc-2020, 1 : 20,000 dilution) was from Santa Cruz, and anti-rabbit IgG (1 : 20,000 dilution) and anti-mouse IgG (1 : 20,000 dilution) were from DakoCytomation (Glostrup, Denmark). 2.7. Statistical Analysis {#sec2.7} ------------------------- Differences between groups were evaluated by the two-tailed pairwise comparison test with a pooled variance, followed by correction with the Holm method (total 16 null hypotheses; 5 null hypotheses without kakkonto versus with kakkonto in the absence of LPS, 5 null hypotheses without kakkonto versus with kakkonto in the presence of LPS, and 6 null hypotheses without LPS versus with LPS) (Figures [1](#fig1){ref-type="fig"} and [2](#fig2){ref-type="fig"}). Differences between the control group and experimental groups were evaluated by a two-tailed Dunnett\'s test ([Figure 3](#fig3){ref-type="fig"}). All computations were performed with the statistical program R (<http://www.r-project.org/>). Dunnett\'s test was performed using the "glht" function in the "multcomp" package. Values with *P* \< 0.05 were considered significantly different. 3. Results {#sec3} ========== 3.1. Effects of Kakkonto on HGFs Viability {#sec3.1} ------------------------------------------ First, we examined the effect of kakkonto on HGFs viability. The viability of HGFs was approximately 90% at up to 1 mg/mL of kakkonto for a 24 h treatment in the absence or presence of LPS ([Figure 1](#fig1){ref-type="fig"}). The viabilities were approximately 70% and 20% at 5 mg/mL and 10 mg/mL of kakkonto, respectively ([Figure 1](#fig1){ref-type="fig"}). Therefore, we used kakkonto at the concentrations of up to 1 mg/mL in further experiments. 3.2. Effects of Kakkonto on PGE~2~, IL-6, and IL-8 Production {#sec3.2} ------------------------------------------------------------- We examined whether kakkonto affects the production of PGE~2~ and inflammatory cytokines (IL-6 and IL-8) by HGFs. Because kakkonto affects cell viability, the concentrations of PGE~2~, IL-6, and IL-8 needed to be adjusted according to viable cell number. When HGFs were treated with 10 ng/mL of LPS, HGFs produced large amounts of PGE~2~, IL-6, and IL-8. Indomethacin decreased LPS-induced PGE~2~ production in a concentration-dependent manner but slightly decreased LPS-induced IL-6 and IL-8 production (data not shown). Kakkonto significantly decreased PGE~2~ production in a concentration-dependent manner ([Figure 2(a)](#fig2){ref-type="fig"}). In the absence of LPS, kakkonto had no effect on PGE~2~ production ([Figure 2(a)](#fig2){ref-type="fig"}). In contrast, kakkonto increased LPS-induced IL-6 and IL-8 production (Figures [2(b)](#fig2){ref-type="fig"} and [2(c)](#fig2){ref-type="fig"}). In the absence of LPS, up to 0.1 mg/mL of kakkonto did not affect IL-6 and IL-8 production, but above 0.3 mg/mL of kakkonto, their concentrations were increased (Figures [2(b)](#fig2){ref-type="fig"} and [2(c)](#fig2){ref-type="fig"}). Similar results were obtained using human skin fibroblast TIG-103 cells (data not shown). 3.3. Effects of Kakkonto on COX Activities {#sec3.3} ------------------------------------------ Because PGE~2~ production is regulated by COX enzymes and suppressed by acid NSAIDs such as aspirin and diclofenac sodium, which inhibit COX activities, we examined whether kakkonto inhibits COX-1 and COX-2 activities. Kakkonto decreased COX-1 activity to approximately 70% at 1 mg/mL but did not affect COX-2 activity ([Figure 3](#fig3){ref-type="fig"}). 3.4. Effects of Kakkonto on Molecular Expression in the Arachidonic Acid Cascade {#sec3.4} -------------------------------------------------------------------------------- We examined whether kakkonto affects the expression of molecules in the arachidonic acid cascade. cPLA~2~ is the most upstream enzyme in the arachidonic acid cascade and releases arachidonic acid from plasma membranes. Kakkonto did not alter cPLA~2~ expression in the absence or presence of LPS ([Figure 4](#fig4){ref-type="fig"}). COX-2 was not detected in the absence of LPS. Treatment with kakkonto alone increased COX-2 expression. However, kakkonto did not alter LPS-induced COX-2 expression ([Figure 4](#fig4){ref-type="fig"}). Annexin1, also named lipocortin1, is an anti-inflammatory mediator produced by glucocorticoids that inhibit cPLA~2~ activity \[[@B19], [@B20]\]. However, neither LPS nor kakkonto showed an effect on annexin1 expression ([Figure 4](#fig4){ref-type="fig"}). 3.5. Effects of Kakkonto on ERK Phosphorylation {#sec3.5} ----------------------------------------------- cPLA~2~ is reported to be directly phosphorylated at Ser505 by ERK, resulting in cPLA~2~ activation \[[@B21], [@B22]\]. Therefore, we examined whether kakkonto suppresses LPS-induced ERK phosphorylation. ERK phosphorylation was enhanced at 0.5 h after LPS treatment and thereafter was attenuated. One mg/mL of kakkonto suppressed LPS-induced ERK phosphorylation at 0.5 h to 2 h ([Figure 5](#fig5){ref-type="fig"}). 4. Discussion {#sec4} ============= In the present study, we examined the effect of kakkonto on LPS-induced PGE~2~, IL-6, and IL-8 production by HGFs. Kakkonto concentration dependently decreased LPS-induced PGE~2~ production but did not affect PGE~2~ production without LPS treatment, similar to shosaikoto, hangeshashinto, and orento \[[@B5]--[@B7]\]. Moreover, kakkonto suppressed LPS-induced ERK phosphorylation. In contrast, kakkonto increased LPS-induced IL-6 and IL-8 production. It is widely known that PGE~2~ leads to inflammatory responses such as vasodilation, enhanced vascular permeability, and pain generation \[[@B1]\]. Acid non-steroidal anti-inflammatory drugs NSAIDs show anti-inflammatory effects by suppression of PGE~2~ production, even though they do not affect IL-6 and IL-8 production. Our findings showing that kakkonto decreases LPS-induced PGE~2~ production suggest that kakkonto also has anti-inflammatory effects in periodontal disease and that its effects are mainly mediated by suppression of PGE~2~ production even though kakkonto increased LPS-induced IL-6 and IL-8 production. Our results showed that kakkonto suppressed LPS-induced ERK phosphorylation in HGFs. Previously, we demonstrated that orento inhibits LPS-induced ERK phosphorylation and cPLA~2~ activation, leading to the suppression of PGE~2~ production in HGFs \[[@B7]\]. Therefore, we consider that kakkonto decreased LPS-induced PGE~2~ production through the suppression of ERK phosphorylation in HGFs. Although kakkonto increased COX-2 expression in the absence of LPS, kakkonto did not alter PGE~2~ production. We consider a likely reason to be the suppression of cPLA~2~ activation through the inhibition of ERK phosphorylation and/or the suppression of COX-1 activity. However, the components that induce COX-2 expression remain unknown. Our results showed that kakkonto increased LPS-induced IL-6 and IL-8 production by HGFs. Previously, we reported that the activation of the protein kinase A (PKA) pathway by adrenaline or aminophylline increases LPS-induced IL-6 and IL-8 production in HGFs \[[@B23]\] and that H-89, a PKA inhibitor, decreases LPS-induced IL-6 and IL-8 production \[[@B23], [@B24]\]. Therefore, kakkonto may activate the PKA pathway. In general, steroidal anti-inflammatory drugs (SAIDs) suppress the expression of cPLA~2~, COX-2, and inflammatory cytokines (such as IL-6 and IL-8) and induce the expression of annexin1. However, kakkonto did not affect cPLA~2~, annexin1, or LPS-induced COX-2 expression, and it increased IL-6 and IL-8 production. This therefore suggests that the mechanism by which kakkonto decreases PGE~2~ production is different from that of SAIDs. Many studies have demonstrated that NSAID administration prevents gingival inflammation \[[@B25]\] and several clinical studies have indicated that the concentration of PGE~2~ in gingival crevicular fluid (GCF) is increased in periodontal disease \[[@B26]\] and is decreased by oral administration or mouthwash with NSAIDs \[[@B27], [@B28]\]. Considering that both NSAIDs and kakkonto suppress PGE~2~ production, it is possible that administration of kakkonto also decreases the PGE~2~ concentration in GCF and results in the improvement of gingival inflammation. Therefore, kakkonto may be useful for the improvement of gingival inflammation in periodontal disease. Importantly, kakkonto did not affect the basal level of PGE~2~, although kakkonto decreased COX-1 activity to approximately 70%. Because PGE~2~ produced by COX-1 protects gastric mucosa, these results suggest that kakkonto may cause minimal gastrointestinal dysfunction. 5. Conclusion {#sec5} ============= We demonstrated that kakkonto suppresses LPS-induced ERK phosphorylation, resulting in the suppression cPLA~2~ activation and further PGE~2~ production by HGFs. These results suggest that kakkonto is clinically useful for the improvement of inflammatory responses in periodontal disease. The authors thank Professor Nobuo Yoshinari (Department of Periodontology) for HGFs preparation. The study was aided by funding from the Nagano Society for the Promotion of Science and a Scientific Research Special Grant from Matsumoto Dental University. Ethical Approval ================ This study was approved by the Ethical Committee of Matsumoto Dental University (no. 0063). Conflict of Interests ===================== The authors have no conflict of interests to disclose. ![Effects of kakkonto on HGFs viability. The effect of kakkonto on the viability of HGFs at 24 h. HGFs were plated in 96-well microplates at 10,000 cells/mL, and media containing LPS and kakkonto were added. Cell numbers were evaluated by WST-8 at 24 h. The optical density (OD) was normalized to a relative value of 100% for cells without LPS or kakkonto treatments and is represented as means ± SD (*n* = 4). Open circles, treatment without LPS; closed circles, treatment with 10 ng/mL of LPS. \*\**P* \< 0.01 and \*\*\**P* \< 0.001 (without kakkonto versus with kakkonto in the absence of LPS). ^\#^ *P* \< 0.01 and ^\#\#^ *P* \< 0.001 (without kakkonto versus with kakkonto in the presence of LPS). *P* values were calculated by pairwise comparisons and corrected with the Holm method (16 null hypotheses).](ISRN.PHARMACOLOGY2014-784019.001){#fig1} ![Effects of kakkonto on the production of PGE~2~, IL-6, and IL-8. HGFs were treated with combinations of LPS (0 and 10 ng/mL) and kakkonto (0, 0.01, 0.3, 0.1, 0.3, and 1 mg/mL) for 24 h. Concentrations of PGE~2~ (a), IL-6 (b), and IL-8 (c) were measured by ELISA, adjusted by cell number, and expressed as per 10,000 cells (mean ± SD, *n* = 3). Open circles, treatment without LPS; closed circles, treatment with 10 ng/mL of LPS. \*\**P* \< 0.01 and \*\*\**P* \< 0.001 (without kakkonto versus with kakkonto). ^\#\#^ *P* \< 0.001 (without LPS versus with LPS). *P* values were calculated by pairwise comparisons and corrected with the Holm method (16 null hypotheses).](ISRN.PHARMACOLOGY2014-784019.002){#fig2} ![Effects of kakkonto on COX activities. COX activities were evaluated by measurement of prostaglandin produced from arachidonic acid by COX-1 or COX-2. These values were normalized to a relative value of 100% for cells without LPS or kakkonto treatments and are represented as means ± SD (*n* = 3). \**P* \< 0.05 (Dunnett\'s test).](ISRN.PHARMACOLOGY2014-784019.003){#fig3} ![Effects of kakkonto on cPLA~2~, COX-2, and annexin1 expressions. HGFs were treated with a combination of LPS (0 or 10 ng/mL) and kakkonto (0, 0.01, or 1 mg/mL) for 8 h, and protein levels were examined by western blotting.](ISRN.PHARMACOLOGY2014-784019.004){#fig4} ![Effects of kakkonto on LPS-induced ERK phosphorylation. HGFs were untreated (0 h), treated with LPS (10 ng/mL), or treated with both LPS and kakkonto (1 mg/mL) for 0.5, 1, and 2 h. As a positive control, HGFs were treated with 1 *μ*M of PMA for 0.5 h. Western blotting was performed using antiphosphorylated ERK or anti-ERK antibodies. pERK: phosphorylated ERK. Upper band indicates ERK1 (p44 MAPK) and lower band indicates ERK2 (p42 MAPK).](ISRN.PHARMACOLOGY2014-784019.005){#fig5} ###### Ingredients of the kakkonto formula. Japanese name Latin name Amount (g) Amount\* (g/g of product) --------------- ---------------------- ------------ --------------------------- Kakkon *Puerariae Radix* 4.0 0.111 Taiso *Zizyphi Fructus* 3.0 0.083 Mao *Ephedrae Herba* 3.0 0.083 Kanzo *Glycyrrhizae Radix* 2.0 0.056 Keihi *Cinnamomi Cortex* 2.0 0.056 Shakuyaku *Paeoniae Radix* 2.0 0.056 Shokyo *Zingiberis Rhizoma* 2.0 0.056 Total   18.0 0.500 \*7.5 g of kakkonto product contains 3.75 g of a dried extract of the mixed crude drugs. [^1]: Academic Editors: A. Pittaluga and E. M. Urbanska
{ "pile_set_name": "PubMed Central" }
547 F.2d 1164 Thomasv.Tribuiani No. 76-1620 United States Court of Appeals, Third Circuit 1/17/77 1 E.D.Pa. VACATED
{ "pile_set_name": "FreeLaw" }
The full stomach test as a novel diagnostic technique for identifying patients at risk of Brugada syndrome. Autonomic modulation, particularly high vagal tone, plays an important role in the occurrence of ventricular tachyarrhythmias in the Brugada syndrome. Food intake modulates vagal activity. We assessed the usefulness of a novel diagnostic technique, the "full stomach test," for identifying a high-risk group in patients with a Brugada-type electrocardiogram (ECG). In 35 patients with a Brugada-type ECG, we assessed 12-lead ECGs before and after a large meal, a pilsicainide pharmacological test, spontaneous ST-segment change, late potentials by signal-averaged ECG, microvolt T-wave alternans, and four other ECG parameters. These patients were divided into two groups (i.e., high-risk group [n = 17] and indeterminate risk group [n = 18]). The full stomach test was defined as positive when augmentation of characteristic ECG abnormalities was observed after meals. Thirteen patients had a prior history of life-threatening events such as aborted sudden death and syncope, with a total of 30 episodes. These episodes had a circadian pattern, at night and after meals. The full stomach test was positive in 17 of the study patients (49%). A positive test outcome was characterized by a higher incidence of a history of life-threatening events than a negative test outcome (P = 0.015, odds ratio = 7.1). In comparison between the two groups, the incidence (82%) of positive outcomes in the high-risk group was significantly higher than that (17%) in the indeterminate risk group (P = 0.0002). Characteristic ECG changes diagnostic of Brugada syndrome are augmented by a large meal. These data are associated with a history of life-threatening events in Brugada syndrome.
{ "pile_set_name": "PubMed Abstracts" }
Index of Korea-related articles (T) This is a partial list of Korea-related topics beginning with T. For Korean words starting with ㄷ, see also under D. T Ta Taean County, a district in westernmost Chungcheongnam-do. Taebaek, a city in southern Gangwon-do. Taebaek Mountains, a range of high peaks in South and North Korea. Taebong, a short-lived state during the Later Three Kingdoms period. Taedong River, a river flowing through Pyongyang to the Yellow Sea. Taegeuk Taegeukgi (flag) Taegu Taehwa River Taejang Ceremony Taejo of Goryeo Taejo of Joseon Taejong of Joseon Taekwondo Taekyon Taepodong-1 Taepodong-2 Taewon-gun Talhae of Silla Tamna Tang Soo Do Te Teojushin, the earth deity Temple name Trot, mid-20th-century form of South Korean popular music. Third Republic, the first regime presided over by Park Chung-hee. Third Tunnel of Aggression Thousand Character Classic (Cheonjamun) Three Gojoseon Three Jewel Temples of Korea Three Kingdoms of Korea Th "There She Is!!", popular flash series created by SamBakZa, originating from South Korea. To Toegye, one of the most famous Joseon Dynasty philosophers. Toham Mountain, sacred peak of Silla in central Gyeongju. Tokto, see under Liancourt Rocks. Tongbulgyo Tongdosa Tongyeong Toyotomi Hideyoshi Tr Traditional Korean medicine Traditional Korean thought Trans Korea Pipeline Transportation in North Korea Transportation in South Korea Treaty of Kanghwa Treaty of Portsmouth Treaty of Shimonoseki Treaty on Basic Relations between Japan and the Republic of Korea Tripitaka Koreana Truth and Reconciliation Commission (South Korea) Ts Tsushima Island, the Japanese island closest to Korea. Tsushima Strait, the southern branch of the Korea Strait. tteok, the traditional Korean rice cake. Tt Ttangkkeut, the southernmost area of the Korean peninsula. Tu Tukong Moosul, a martial art originating in the South Korean special forces. Tuman (Tumen) River, a river flowing between North Korea and Russia. Turtle ship, naval vessel made famous by Yi Sun-sin in the Imjin War(Seven-Year War). Tv TVXQ, a Korean pop group T
{ "pile_set_name": "Wikipedia (en)" }
Mackenzie Covington, Nathan Braun are Homecoming Queen and King Switzerland County High School celebrated its second football Homecoming on Friday night, kicking off a big night that included a parade; the crowning of the Homecoming Queen and King; and an impressive 48-20 victory over Oldenburg Academy that raised the Pacer record to 3-2 overall and 2-0 in conference play. Halftime brought the coronation ceremonies, with six senior girls and six senior boys having been selected by their classmates as candidates; and then those candidates were voted on by members of the student body with the input of faculty. This year’s Homecoming Queen is Mackenzie Covington. Mackenzie is the daughter of Joe Covington and the late Barbara Covington, and she has been a member of the track team for four years and the soccer team for three years. She is active in the Business Professionals of America, where she serves as Vice President; National Honor Society, where she is currently the President; and is a three-year member of student council. She represented her classmates last month in the Swiss Ambassador competition; and is currently the Co-President of the Senior Class. Her career plans are to pursue a degree in Neonatal Nursing, and possibly minor in a foreign language. Nathan Braun was honored as this year’s Homecoming King. Nathan is the son of Helmut and Robin Braun; and he is a four-year member of the soccer, swim, and golf teams. He participated in the Business Professionals of America in the past; and also participated in the Swiss Wine Festival’s 3-on-3 tournament. During his junior year, he earned the Mental Attitude Award for the golf team. His career plans are to attend the University of Kentucky and pursue a career as a physical therapist. The first runners up this year were McKayli Scudder and Luke Compton. McKayli is the daughter of Devin Scudder and Chastity Scudder, and she is a four-year member of the soccer and track teams; as well as having participated on the golf and basketball teams in the past. She is a four-year member of the Fellowship of Christian Athletes and the Pep Club; and has volunteered her time working at the food pantry. She was a member of the Prom Committee. She is a member of Switzerland Baptist Church; and in athletics she earned All Conference honors in track, and was the MVP for three years. She is also a member of the National Honor Society. After graduation she plans on attending Indiana University to pursue a degree in business management. Luke is the son of Doug and Rachel Compton; and he is a three-year member of the football team and the track team; and is a four-year member of the Switzerland County High School Marching Band and Pep Band. He was a two-year member of the Fellowship of Christian Athletes; is a member of the National Honor Society; and participated in the Sophomore Leadership Program. He plans on attending Ivy Tech Community College to complete his general studies, and then transfer to Butler University to earn a degree in music education. Rounding out the court were Kelli Hart and Kollin Hayes, who were honored as the second runners up. Kelli is the daughter of Toby and Chanda Hart, and she is active in the Art Club, SADD, and has participated in cheerleading and the Dance Team in the past. She is a nine-year member of the Pleasant Outlaws 4-H club, where she has served as secretary for two years, and the club also volunteered at the Switzerland County Animal Shelter. She has raised Reserve Grand Champion steers along with Showmanship honors with her horse. Her interests include raising baby cows and riding her horse, along with showing cattle. Her career ambition is to earn a college degree in education. Kollin is the son of Jamie Hayes and Heather Stewart, and he is a four-year member of the basketball team; played baseball for two years and football for one year. He is an active member of the Pep Club; and also served on the Prom Committee. He was a member of the conference champion basketball team in 2014 and the Rivertown Tourney basketball champions in 2014; and was All Conference in baseball last year. He plans on attending Ivy Tech Community College in Bloomington, and is undecided on his major. Other senior girls who were honored with inclusion in the Queen’s court included: Ariana Bright, Taylar Jordan, and Mallory Phagan.
{ "pile_set_name": "Pile-CC" }
[Contraception and Gardnerella vaginalis. First study of the Italian population]. The association between contraception and Gardnerella vaginalis was studied in the population of L'Aquila. This research was conducted in the cytocolposcopic Center of the Obstetrics and Gynaecology Clinic, and the Department of Biotechnology and Biometry at L'Aquila University on 1212 females. Of the examined patients, 178 (14.7%) employed a prophylactic method and of these 104 (58.4%) used barrier-systems, while 74 (41.6%) used estroprogestins. Gardnerella vaginalis was isolated in 63 females (6.1%) that used no contraceptive and 19 (10.7%) that employed one.
{ "pile_set_name": "PubMed Abstracts" }
Gazette RESTAURANT Of The WEEK Cup Diner And Bar Has Retro Cool And Comfort Food by Teresa Barile t here's something for everyone at Cup Diner and Bar. From incredible breakfasts served each day, an impressive brunch on Saturdays and Sundays and lunch sandwiches, wraps and paninis to full-course dinners that epitomize comfort food, Cup is on my list of favorite places. described as American retro diner meets Soho. Chiclet tile floors and white tile walls reminiscent of the 1950s are warmed by wood accents and avocado green booths. Historic photos and news clippings from the Queens Museum have been blown up to create a wonderful tableau on the walls. Adults, children and hipsters alike all will enjoy a meal at Cup Diner and Bar. What's more, the prices are great and the food, prepared in a sparkling clean kitchen that is visible to diners, is fantastic. Enjoy one of their signature Cup cocktails, such as the Cup of punch, which combines fruity liqueurs and vodka, served over ice in 16-ounce coffee mugs. Belgian and domestic beers and wine are also available, as is a large variety of soft drinks, smoothies and classic milk shakes. And what would a diner be without great coffee, served in enormous cups? Start with an ear of Cup's famous grilled corn on the cob topped with cojito cheese and a dusting of chili pepper ($3.95). Cup's old-fashioned macaroni and cheese is made with real Vermont cheddar and is decadently delicious, as are their home-style macaroni salad, potato salad and classic cole slaw. Spicy chicken wings, home-style chicken tenders and guacamole are all great for sharing. Cup is a great place for a hearty, home-style dinner. Try a diner classic of meatloaf with mashed potatoes. Cup's version is juicy, full of chopped vegetables and herbs, and comes with creamy, home style mashed potatoes and grilled seasonal vegetables. Don't tell mom how much you liked it! Southern fried chicken with your choice of potatoes will satisfy your need for comfort, as will a juicy rack of St. Louis style baby back ribs. These ribs are meatier than most, and cooked till the meat falls off the bone. The house made barbecue sauce is delicious, too. Herb roasted chicken with apple stuffing is the perfect autumn dish and Cup does a nice job of it. A number of pasta dishes round out the dinner entrees, ensuring that everyone gets just what they want. The chef is proud of his fish and seafood entrees, with special kudos going to the all-claw crabcakes, full of sweet crabmeat and served with home-style tartar sauce ($13.95). Salmon Dijon gets a nice kick from the spicy mustard, and blackened tuna steak rivals any found in more expensive eateries. All entrees come with a choice of two side dishes, including mashed sweet potatoes, garlic mashed potatoes, steak fries, fresh string beans, steamed broccoli and sautéed fresh spinach. For lunch, the focaccini sandwiches, filled with choice of Cajun chicken, Tuscan turkey or veggies, then pressed on the grill to crisp, golden perfection, are a big hit at $6.95. Wraps, such as the Thai chicken wrap, roast beef wrap or California turkey wrap with avocado and cucumber, all served with pickle and coleslaw, make for a satisfying lunch. Mexican quesadillas, two large, flour tortillas, are stuffed with cheddar and Jack cheeses and your choice of roasted vegetables, grilled chicken, Cajun chicken or grilled shrimp. Cup's famous 9-ounce burgers are not to be missed. Whether you order one for lunch, dinner or to quell an attack of late-night munchies, these burgers require two hands and several napkins, especially when topped with your choice of cheeses, including mozzarella, and bacon, avocado, and marinara sauce and more. Get a side of curly fries and you'll be full for hours. Cup's desserts will bring you back to happier times as you try the deep dish apple crumb pie topped with ice cream, or a slice of New York style cheesecake. Your friendly waitperson will bring over a tray of sophisticated desserts for you to drool over, such as individual chocolate mousse cake, individual pecan or pumpkin mousse tart or carrot cake. Breakfast is served every day from 7 a.m., though you can order breakfast items any time of day or night. Weekend brunch is already an institution at Cup, where eggs are whipped into fluffy omelets filled with any favorite cheese, spinach, peppers, mushrooms or onion. Crisp bacon, ham, sausages and turkey bacon are also offered. Stacks of fluffy griddlecakes are made with fresh berries, bananas or granola. Try the crisp waffles topped with fresh fruit and whipped cream. Freshly baked muffins, Danish pastries, croissants and bagels are always delicious and the coffee, served in a giant cup, is refilled on request by the friendly and efficient wait staff. Order a Cup brunch cocktail too. Cup Diner and Bar is a great place to go for a meal nearly any time of day or night. They're open from 7 a.m. to 11 p.m. during the week, and until midnight on Friday and Saturday. Weekend brunch is served until 4 p.m., and breakfast is served any time of day or night. They will gladly deliver to your home or office for free and can provide on- or off-premises catering for your next important event. Put Cup Diner and Bar on your list of places to visit for breakfast, lunch, dinner, weekend brunch or Happy Hour. The service is efficient and very friendly, and Cup tee shirts make nice gifts. They're located next to the Movie Multiplex and across from the Museum of the Moving Image.
{ "pile_set_name": "Pile-CC" }
Wortmannin inhibition of forskolin-stimulated chloride secretion by T84 cells. The time- and dose-dependent effects of wortmannin on transepithelial electrical resistance (Rte) and forskolin-stimulated chloride secretion in T84 monolayer cultures were studied. In both instances, maximal effects developed over 2 h and were stable thereafter. Inhibition of forskolin-stimulated chloride secretion, as measured by the short-circuit current (Isc) technique, had an IC50 of 200-500 nM, which is 100-fold higher than for inhibition of phosphatidylinositol 3-kinase (PI3K), but similar to the IC50 for inhibition of myosin light chain kinase (MLCK) and mitogen-activated protein kinases (MAPK). Previous work demonstrated that 500 nM wortmannin did not inhibit the cAMP activation of apical membrane chloride channels. We show here that 500 nM wortmannin has no affect on basolateral Na/K/2Cl-cotransporter activity, but inhibits basolateral membrane Na/K-ATPase activity significantly. The MLCK inhibitors ML-7 and KT5926 were without affect on forskolin-stimulated Isc. Similarly, the p38- and MEK-specific MAPK inhibitors SB203580 and PD98059 did not reduce forskolin-stimulated Isc. In contrast, the non-specific MAPK inhibitor apigenin reduced forskolin-stimulated Isc and basolateral membrane Na/K-ATPase activity similar to wortmannin. In isolated membranes from T84 cells, wortmannin did not inhibit Na/K-ATPase enzymatic activity directly. We conclude that one or more MAPK may regulate the functional expression of basolateral membrane Na/K-ATPase by controlling the abundance of enzyme molecules in the plasma membrane.
{ "pile_set_name": "PubMed Abstracts" }
# Copyright 2018 The Chromium Authors. All rights reserved. # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. import("//third_party/closure_compiler/compile_js.gni") js_type_check("closure_compile") { deps = [ ":app_installer", ":cws_webview_client", ":cws_widget_container", ":cws_widget_container_error_dialog", ":cws_widget_container_platform_delegate", ] } js_library("app_installer") { deps = [ ":cws_widget_container_platform_delegate" ] } js_library("cws_widget_container") { deps = [ ":app_installer", ":cws_webview_client", ":cws_widget_container_error_dialog", ] } js_library("cws_widget_container_error_dialog") { deps = [ "//ui/webui/resources/js/cr/ui:dialogs" ] } js_library("cws_widget_container_platform_delegate") { } js_library("cws_webview_client") { deps = [ ":cws_widget_container_platform_delegate", "//ui/webui/resources/js:cr", "//ui/webui/resources/js/cr:event_target", ] externs_list = [ "$externs_path/chrome_extensions.js", "$externs_path/webview_tag.js", ] }
{ "pile_set_name": "Github" }
Optimal white light control of the negative to neutral to positive charge transition (NeNePo) in the electronic manifold of the silver trimer. Control over the electronic state of the Ag(3) cluster is approached via a progression of ultrafast photoinduced transitions within the full electronic manifold of the negative to the neutral and finally the cationic state of the system. High-bandwidth supercontinuum laser pulses ranging from 500 to 950 nm are employed for addressing the wide range of electronic resonance conditions associated with the ladder climbing process of a tandem photoelectron detachment and a resonance enhanced multiphoton ionization (REMPI). With the control of the phase over the full spectral envelope of the supercontinuum in a pulse shaper arrangement, pulse forms are generated with the aim of synchronizing ultrashort subpulse sequences to the characteristic dynamics of the system during charge reversal. Pulse forms ranging over several hundred femtoseconds in total duration and subpulse structures down to 15 fs duration with a variable spectral composition can be obtained for this purpose. A free optimization based on a closed-loop genetic algorithm is employed for ordering the subpulse sequences to match the structural evolution of the system. The effective control attainable in this scenario is evaluated in view of maintaining a defined sequence of electronic transitions within the complex dynamic response of the system during the photoexcitation. Further emphasis is made on analyzing the degree of control attainable in the nonlinear regime of multiphoton excitation at supercontinuum bandwidths.
{ "pile_set_name": "PubMed Abstracts" }
Throwback jerseys are authentic, limited time variations of the original jerseys that players have worn during a specific period in their long standing careers. College throwback jerseys are extremely popular and have numerous takers. If you still don’t have your favorite college throwback jersey, then you have come to the right place looking for one! College level sports are excessively popular and as competitive as other professional sports events. So we have stocked an impressive collection of college throwback jerseys for all those college football fanatics. Authentic and autographed football throwback jerseys, college football jerseys, college basketball jerseys all are retailed right here! Our collection has jerseys of all your favorite college athletes who have mesmerized both the spectators and fellow sportsmen. The OnlineSports.com college throwback jersey inventory includes jerseys of Drew Brees, Archie Griffin, Magic Johnson, Billy Cannon, Joe Montana, Marcus Allen, Troy Smith and who can forget the guaranteed winner of Super Bowl III, Joe Namath. Now you can have a Joe Namath throwback jersey, celebrating that time in New York Jets’ history. And it's not just him but all the legends who have left an indelible mark in our minds with their skills and sportsmanship. As a follower of the sport you may understand the value of a throwback but only a true fan can understand the greatness of owning a throwback jersey. So if you are among the latter, then a college throwback jersey is a must have! Get it before the next adrenalin rushing season gets underway. Something else about College Throwback Jerseys..... The most popular Top 10 Throwback College Jerseys/Uniforms include throwbacks of Michigan, Georgetown, Kansas, Utah, Missouri and others. College level players are as popular as professional and major league players and college throwback jerseys sell as much as jerseys of professional athletes do! Where does the word jersey come from? The interesting thing about the word ‘Jersey’ is that its origin has nothing to do with a fabric or a garment! Jersey is a small island in the Channel Islands (located between England and France). Jersey island was known for its knitting trade in the medieval times. The name persists and is used to refer to various forms of knit fabric.
{ "pile_set_name": "Pile-CC" }
".:" "HOLE:." "Stinks." "Mom, Dane just said stinks." "Don't say stink Dane." "I thought you said that this wasn't that different from the last place?" "It will be!" "Once we get our stuff moved in." "Yeah except for the 2,000 mile walk to go hang out with my friends." "You will make new friends." "Better friends." "Got the biggest room." "Well!" "This was nice of someone." "Oh that's so sweet." "Did Aunt Bee bake us a pie?" "This place sux (sucks)." "Hey, There's a basket in the street." "Let's go play." "Dane." "What the hell's your problem?" "Let's go play!" "Go have fun." "Jerk." "Hi, I'll play with you honey." "You know?" "Forget it." "This is a change for Lucas too okay?" " Are you joking me?" " No, I'm not." "All you have to do is put him in his room and put on cartoons." "And he's fine." "And perhaps spend a little bit more time with him." "What do you say?" "Any more time and I..." "I'll probably strangle him." "What happen to the old Dane, I used to know that would draw rainbows and people with smiley faces on them?" "I grew up." "Did ya?" "But please do not to take this out on Lucas, okay?" "It is not his fault that we had to move." "I had to do it." "I could not take a chance." "I am sorry about your friends." "I'm sorry about having to move again." "but I would really like this to workout." "I would like you to help me make it work." "It means no more fighting no more trouble at school." "I need you to be better then the things you have seen." "What's that supposed to mean?" "It means, I would like us to be happy." "Okay?" "We could all use a little bit more happy in our lives." "See this..." "I'm very happy." "I am." "That's great..." "It's not too bad..." "We're make it work?" "There's another box in the back of the truck." "Honey, if you would get it please?" "This one?" " Yeah." "That's good." "Careful." "Mom!" "Dane why did you bring this?" "To help Lucas build his Bozo phobia." "Shut up God." " Mom, Lucas just said, "Shut up."" "Do the two of you realise that you're embarrassing yourselves in front of our new neighbour?" "Better than Mr. Hide walking in Clark Street in boxers." "Doesn't it?" "Hey, Dane!" "Where do you want me to put your Jonah's record CD's?" "Oooh..." "You're into such trouble." "What new?" "That goes in the basement, sweetie!" "Thanks!" " Okay!" " Why do you baby him so much?" " Why?" "You jealous?" "You okay, kid?" " Yeah..." "Just go talk to him." "He said he was sorry." "I'm so done with him." "You've been saying that since the fifth grade." " I know right." "Okay you guys, call me if there's any problems." "but I don't want any problems." "So please don't call me." "I need this stuff to go well." "Are we cool?" "Promise me the both of you." "Promise." "Scout's honor." "Dane..." "I hate to tell you this but you were never a scout." "My friend." "Actually I thought about once because of the cookies." " Because a girl scouts losing." "I love you." "Don't pester your brother, okay?" " Good luck, Mom." " Thank you." "And guys!" "Do things together." "Two of you." "Please ..." "Dane." "See you guys later!" "Let's go throw." "I'm busy." " Doing what?" "Nothing." "Go away." "C'mon!" "You can stare at her outside." "Okay!" "I said I'm busy." "Now get outta here." "I don't feel like it." "You never feel like it." "No." "No." "I will kill you." "Hello!" "New neighbors." "I'm Lucas." "We just moved here." "Hi, Lucas." "I'm Julie." "Nice to meet you, Julie." "With my brother Dane, and my mom Susan." "He's there up there." "You want to know my brother?" "Dane like it better in Brooklyn." "I gotta go." "Mom?" "Hey, buddy." "You ever bite me again, I'm gonna..." "What's your problem?" "Dickhead!" "Want you to just play with me." "Oh Really?" "You want me to play with you?" "Yes..." " I have no problem!" "Playing with you!" "Mom's gonna be pissed with you." "It's your fault!" "What is that?" "Don't know." "Here help me get this." "That's a lot of locks." "Probably keep you from gas pipes or something." "Or a treasure maybe?" "Go look for the keys." "They're not down here." "If there's treasure, I get half." "This is just a hole." "Cold." "How deep do you think it is?" "I don't know." "Okay, go ahead." "Do you hear anything?" "That's really weird?" "Maybe it's like some kinda tunnel or something?" "To where?" "I don't know I mean." "It's got to have a bottom right?" "Hello!" "Hey." "What?" "How does it do that?" "I don't know." "What you do?" "Nothing." "It's if catch on or something." "So!" "You two didn't kill each other?" "Not yet." "This is Julie." "Hi, Dane!" "The boy who hates it here." "Do you wanna look at our hole?" "I'm sorry?" "Nothing." "We got this hole in the floor." "It's no big deal." "It's that what you do for fun in Brooklyn?" "Play with your holes?" "What is it?" "Our hole." "Well!" "We're not really sure what?" "Hey Charlie!" "What do you think?" "Charlie doesn't like your hole very much." "Can't see the bottom." "Maybe it's just a crawl space or something." "Watch!" "That was weird." "Okay ..." "This is so cool." "Is it working?" " Yeah." "Think so." "So what exactly you think you gonna see?" "I don't know?" "Could be like a..." "like a underground tomb." "Like the catacombs, or something?" "The catacombs of Bensonville?" "Seriously doubt that." "I think its just a... really deep hole, that 'Creepy Carl' dug up." "Who's 'Creepy Carl' ?" "The guy that used to live here." "Now he lives in the old glove factory in the other side of town." "Yeah!" "Let's go see what the inside of a hole looks like." "Is it working?" " Yeah." "I think so." "I told you guys there's nothing down there." "It's just a hole." "A hole with no bottom in the basement of our house." "How does that make any sense?" "Woah!" "Did you see that?" "Right there." "See?" "There's something." "Or anything." "Like a light coming through a crack in the..." "Or a aliens." "Or an egg." "Or an alien egg." "How do you even come out with this..." "It's not in the..." "Hey guys!" " Hi!" "Mom." "Just watching some TV." " Cool." "Yeah!" "What is it?" "Oh!" "Nothing just stupid show really." "Just about to turn it off actually." "This is Julie." "From next door." " Hi, Julie from next door." "Hello!" "I brought plenty of Chinese food in case you're hungry?" "Thanks but I should..." "I should go." "My mom probably thinks I'm already hitting up the new neighbours for gay way drugs." "I'll see you later?" "Nice to meet you." " Nice to meet you." "Bye Lucas." "I'll see you later." "You might have been safer in the city." "My friend." "What have you guys been doing all day?" "We found this cool..." "Nothing." "We just kinda hung out." "How's the new job?" "Good." "Wait a minute..." "Did you just... ask me about my life?" "My Goodness!" "Couple of days in a small town and look how polite you are?" "I heard something." "Whatever..." "Why do I have to do it today?" " Because your school registration is today." "Sweetheart." "And I change my shift at the hospital to do it." "Please stop..." "Hold still baby." "We're late." "Why doesn't Dane have to do it?" "Because I'm not in a school where they make you take naps and drink out of sippy cup." "You can do me!" "Dickhead!" " Hey!" "hey, hey..." "Okay I know he did not learn that on Sponge Bob." "And Dane is not going today because his registration is next week." "What are you planning on doing today besides causing trouble?" "Well, Julie's gonna show me around this ghost town." "So!" "That should take about..." "I don't know?" "10 minutes." "Alright." "Please be back by 4, I have to go to work." "Thank you." "C'mon sweetie let's go." "Ready, tiger?" " Bensonville, here we come." "Not quite Brooklyn, huh?" " Not quite." "So..." "Is that where you lived your whole life?" "No!" "Actually I was born in Queens." "And the... we moved to Philly (Philadelphia), Boston," "DC (Washington) and then back to Brooklyn." "Oh!" "And..." "I'd say..." "I think Jersey is somewhere in there too." "I don't really remember." "Do you even bother to unpack the boxes?" "Yeah everytime." "It's kinda like..." "My mom always assure that the next move is gonna be the last one." "Type of thing... you know?" "She seems nice." " Yeah." "What about your dad?" " I don't have one." "Sorry." ""Rolic Gardens"?" "Seriously." "Can we go there?" "I hate that place." "Besides, it's not open anyway." "Yeah... the weather's a little bipolar, as you can see." "But other than that it's not that bad here." "I mean, school sucks, but I'm sure its sucked in Brooklyn too right?" "Yeah." "Thus..." "You guys are like celebrities." "I mean most people move out of Bensonville, not in it." "Really?" "How bout your genuine Bensonville burger?" "How is that one compared to the..." "Brooklyn, Boston, Philly burgers?" "Pretty good." "Yeah, that's because they mix it up with squirrels out here." "Really?" "Good?" "Just kidding." "Your boyfriend gave you that?" " Why?" "You jealous?" "No..." "Just a friend." "So... what's up with you guys moving around all the time?" "Nothing." "People usually don't move around the country for no reason." "I do not know ..." "My mom just... wants to find a good job." "We want to find places for Lucas like a..." "I do not know." "There is no reason really." "Dane, I say to come home by 4, not start home at 4." "Would you just please come home alright!" "I got to go to work." "Listen, sweetheart, honey." "I've got to go to work." "So, Dane will be home any second I promise." "So..." "Don't go anywhere kay?" "Be a good boy." "I love you." "I love you, soldier." " I love you too." "Okay." "Mission failed ..." "Okay, Let's see how you like it." "Hey!" "You okay?" "Shit!" "Hang on a second!" "Hey!" "This isn't funny!" "Dane!" "Dane!" "Hello?" "Julie!" "what are you doing here in the dark?" "Hiding from your new boyfriend?" "Let's get outta here." "Hello!" "This is Lucas Thompson!" "What's wrong with you?" "He came after me." "What?" "That clown puppet thing." "The one you try to scare me with." "It's trying to get up here." "No!" "He was right there." "He chased me." "The puppet chased you?" "The one you put in my bed." "Lucas I have no idea what you're talking about." "I didn't put any clown puppet inside your room." "Yeah, you did!" "I mean, I might have..." "If I would have thought about it." "But..." "I didn't." "It..." "It was there!" "On the steps ?" " In my bed." "Then I put it in your bed to scare you, and then it was downstairs." "Okay!" "You know what?" "You got all kinds of weird crap going on in there, I don't even want to know about it." "but whatever." "Clown's gone." "So we're cool." "It's still down there somewhere!" "Okay, let's go look." "It was in here." "Hey!" "You know what?" "You're wasting my time." "There's nothing down here." "Who the hell's that?" "One of your little friends?" "I don't have any friends." "Hey!" "Hey, little girl!" "You lost or something?" "I don't want to die." "Dane!" "let's just stay down here." "Did you close that when you came home?" "I don't remember." "Is that him?" "You didn't happen to see a little girl run by here did you?" "Shut up." "Eh..." "little girl?" "She had blood dripping from her eyes." "What?" " She just had a little makeup on." "Don't worry about it." "It's all good!" "Thanks!" "Hi, Dane!" "Okay..." "I'm gonna look upstairs." "Shit!" "Hey!" "Shut up!" "So!" "What's the deal with this little girl?" "You guys know her?" " No!" "I didn't know the clown either." "What clown?" "Nothing!" "He..." "He had a dream last night and got scared because of this stupid thing about clowns." "No, I don't." "But the little girl... she was... she was in this house?" "She said she did not want to die." " You know what, dude ...?" "You don't have to answer every single question." "Seriously!" "I'm not in the mood." "Dane!" "Hello!" "Dane, please..." "Gotta be in there right?" "Dane." "Close it." "Are you crazy?" "I don't know?" "We all... we all saw that right?" "You're talking about the little girl that just crawled into the bottomless pit under your house?" "Yeah!" "I think we all saw that." "Some kinda passage way for dead people." "Why would a little girl be down here?" "I'd rather know, why she followed me into the bathroom at the diner?" " Maybe it's a wormhole?" "A what?" "A Wormhole." "Like a doorway between different universes." "Oh, my gosh!" " What?" "Wow!" "Okay!" "You know what?" "You need to stop reading so much.Trains you little geek." "Pizza guy." "Hey." "Okay." "Anything yet?" "No..." "When's mom gonna come home?" "." " Not til midnight." "Should've called her." " No!" "..." "Bad idea." "Seriously, if you say anything she's just gonna spaz out." "Gets packed up by tonight." "It's fine with me." "If it's okay with you?" "Right?" "Would you?" "Yeah!" "." "I mean... but..." "What do you think?" "We should... you know see what we got before we say anything." "I know what you've got." "You've got a gateway to hell underneath your house." "And that is really cool." "What is wrong with you?" "!" "I know..." "I probably wouldn't understand anyway, right?" "Right." "Great!" "Listen, you guys." "It's getting late, so don't stay down here much longer." "Alright!" "and, and, and you too." "You need to go home." "Right." "And..." "Dane clean that up, please." "Good God ..." "What do we do now?" "Nothing I guess." "And if that little girl comes into my room tonight?" "Guess it's good luck." "Where'd you put the lock?" "I didn't touch them." "Where are they then?" "Life is ridiculous and boring, before you move here." "I'd better go." "Good nite..." "Hey, Mom." " Hey guys." "This is Dr. Newman." "We work at the hospital together." "It's Travis." "Hi." " Hi." "So what are you fellas doing down there?" "Little war game?" "Yeah, something like that." "But it's actually passed our beddy bye time isn't it mommy dear?" "A snack perhaps?" "Before you go to bed?" "Are you hungry?" "Alright you guys?" "Good night!" "I love you!" "Good night, baby!" " Nice to meet you." "I am so sorry about Dane." "It's just that he's not used to the idea of me..." "You don't have to explain." "I get it." "His father is not a very nice person." "We probably got married too young!" "And I stayed probably too long..." "Susan..." "It's... it's okay." "Think she's probably gonna marry him." "Shut up." "Hi!" "Dane!" "Dane...!" " Yeah." "Hang on." "Hi!" " How's up?" "I... just saw your mom." "I thought you guys were gonna wait for me?" "You know what?" "I really don't want to mess with it today." "Why not?" " I don't know." "I just don't." "You forget where you live now?" "What else we have to do around here?" "I think you guys better see this!" "Maybe mom did it?" "Yeah..." "like she could have just shoved this thing." "Or Satan's just pissed off." "We're just blocking his gateway to hell." "I bet he's strong." "Is that yours?" "No." "Let's see how Satan does with nails." "So... what do you do now?" "I want to find out why the hell's there's a hole in my basement." "That weird guy you said that lived here before?" "Creepy Freddy?" " Creepy Carl?" "Yeah!" "Where is this glove factory?" ""Private Land", "No Trespassing"" "It's locked." "Let's go home." "Somebody have done that before." "Yeah!" "That somebody always gets in trouble too." "It's Bensonville?" "What are they gonna do?" "Send a cop?" "So how do you know where'll we're going?" "Bensonville is my playground, my friends." "Okay!" "So this Freaky Freddy dude..." " Creepy Carl." "Yeah!" "Whatever!" "He's like crazy, right?" "I guess..." "Used to be pretty normal." "I don't know ... gone a little nuts!" "We'll hear him screaming from next door." "And then one day he disappeared and moved out here." "You like?" "Creepy Carl sure keeps it cold in here." "That is a lot of wattage." "Is that him?" "Yeah..." "Carl?" "Carl?" "Hi!" "I'm Julie." "Remember me?" "I see your name..." " Ya!" "I remember." "We're really sorry to bother you like this..." "We just have to ask you about your old house." "What about it?" "Let's just leave!" "I'm..." "I'm Dane and the..." "I live in the house now." "We found your hole and we..." "You took the locks off?" " Yeah." "You can't take the locks off." "We're just trying to figure out where it leads or..." "What... what's under there." "The Darkness!" "It saw you!" "Didn't it?" "Didn't it?" " No!" "We... we..." "We saw a little girl okay." "You can relax." "No, no." "It saw you." "You shouldn't have done it." "You shouldn't have opened it!" "God dammit!" "Why did you open it!" "Look, Okay." "We just want to know, if you build the hole..." "And what's it about..." " Nobody build the hole!" "The hole has been there since the world's first scream!" "And now it's gonna come for us!" "The darkness is gonna come for all of us!" "It's coming for you!" "Hey!" "And it's gonna kill you." "Okay." " It's coming for all of us!" "ALL OF US !" "It's coming for me." "The darkness will come?" "What's that about?" "I don't know." "I wish we hadn't talk to him." "What you guys do today?" "Just hung out." "Yeah!" "Did you have fun?" "Well!" "It doesn't seem like I'm the only one who's gonna be doing the talking this evening." "What do you two feel about having the house to yourselves?" "For a day or two?" "Bad..." "Well!" "I've got an offer to go and do some training in hospital thats out of town." "You know." "So that I can get certified so I can make some more money." "You got enough money." "Yeah!" "Not the way you've been eating lately sweetie." "Is a... that doctor going?" "Yes, he will be there I believe." "We'll be fine." "You two can have lots of fun." "There will be other people there from the hospital." "Dane." "Right." " Yes!" "right." " Why can't I come with you?" " Because we're trying answers for the staffs from the hospital." "Besides, I need someone here to keep an eye on the house for me." "Don't want to keep an eye on the home." "Those are..." "Ouch..." "What is wrong?" " Nothing" "We'll be fine." "Have fun." "I can stay if you want me to Dane." "I don't want you to stay." " Yeah, and you don't want me to go either." "So..." "What am I supposed to do?" "I just don't get it." "After everythings that's happen and..." "After what happened to Lucas, it's just..." "Not every man is your father." "How do you know?" "Because you're not." "You're not an animal." "We can't be scared forever." "Okay." "I'm not scared." "I'm not done!" "Not yet!" "I'm not done!" "What are you looking for?" "My sketchbook." "Maybe at Creepy Carl's." "Stay here." "Hello?" "He's really gone?" "Are you sure?" "Yeah." "Maybe we should think of something else for a little while?" "You can go swiming at my place." "C'mon get in Lucas." "Let's forget it for a little while." "This one kinda looks like a hand." "Whose hand?" "C'mon, it's because you can." "Boss." "Try and get your brother." "The biggest splash wins!" "C'mon!" " Okay, okay." "Cute." "Ready?" "Did you see that?" " Nice splash, man!" "C'mon, Dane." "This was supposed to help you separate yourself about the hole." "I'm not worried about it." "I'm just trying to figure it out." "Stop looking at that and play." "Or go home and jump in your hole." "Or you're scared you are going to lose." "Nice splash." "Who's just here?" "Nobody." "They're probably just from my dad." "Yeah." "Charlie." "You're killing me." "Lucas!" "Yeah okay." "You alright?" " The clown's in there." "The puppet." "In the pool." "It grabbed me." "Tried to pull me into the hole." "Kid." "It's just your foot." "Your foot probably got stuck in the drain..." " No!" "It's in there." "It grabbed me." "It pulled me." "Wouldn't let go." " I'll take him home." " I'm so sorry, Lucas." " Hello?" " Hey, how is he?" "He's been asleep since he got here." "Anything I can do?" "No!" "I think I'm just gonna... you know let him sleep." "Hang out here a little bit." "Call me if you need anything." "Okay?" "Alright, thanks." "Bye." "State Prison" " New Jersey" "Hello Boy" "Shhh..." "Someone's in the house." "Stay here." "Dane..." "Dane." "Hey, son." "What's your name?" "Lucas." " You come go down here, Lucas?" "Are you the one that called?" "My brother..." "I think." "He said somebody's in the house." "Did your brother said who it was?" "I'm looking for this person." "Right here." "That one there, on the right." "I don't want her to get hurt." "You think that's who your brother saw?" "Hey!" "I thought I told you to stay here." "He's down there." "What?" " He gave me this!" "Where are you going?" " What do you think?" "You said the nails will keep it closed." "You said no one can come forward." "Julie..." "Myheadgotbroken." "Daddy?" "Don'tlethimhearyou." "He'llmakeus go to bed." "Iwantto stayupandplay." "Julie." "Saveme,Julie." "Julie." "She can't be true, she can't be true, she can't be true." "She..." "She's dead." "She can't be true" "Who?" " Annie ..." "Annie Smith." "We used to be best friends." "We done everything together." "And..." "What happened?" "I let her fall." "Julie!" "I know what I have to do now." "Stay in the house!" " I don't want to stay in the house." "Just stay in the yard then." "Annie!" "Julie!" "Julie!" "Julie, what are you doing?" "Julie!" "Oh, my god..." "Yougotto be careful,Jul (Julie)." "I know." "Sorry." "That'sokay." "Justa ride,justlikebefore." "You let me fall!" "No!" "Hang on!" "Annie, hold on!" "You should have saved me." "I know!" "I wanted to." "But you didn't." "You just sat there crying!" "Even when the policeman heard us, when he fell !" "I tried." "I couldn't" "You let me die!" "I was scared." "Was so scared." "No more scared anymore?" "No." "Not anymore." "That's good." "Julie!" "Bye,Julie." "Lucas." "Dane?" "Where are you?" "In the basement." "C'mon!" "Dane?" "I'm over here." "I was looking for you." "You want a piece of me?" "Stop it!" "Strike one!" "I really don't like clowns." "I think it likes whatever you're afraid of." "What?" "It's like you look in the hole, and it knows you somehow." "It brings your fears to life." "It's like..." "I don't know?" "For Lucas it's the clowns," "And with you is what happened to Annie and the cop." "What about you?" "Oh I..." "I told you guys I'm not afraid of anything." "But, I mean c'mon!" "He dies anyway right?" "Nope!" "But I still don't want to stay here tonight." "You guys can stay at my place." "My parents don't mind." "Yes!" "Let me get my stuff okay?" "Creepy Carl was always talking about the darkness." "Maybe it came and got him?" "Why do you have these drawings all over the floor?" "It's a kind of puzzle." "I thought this would like... show me more!" "But, I can't figure it out." "Cause this..." "I thought right there." "But then..." "I don't know." "What about down here?" "Yeah!" "yeah, that works." "Like..." "like that I think?" "I'll try." "Oh... oh yeah yeah." "Right..." "It looks like a... very large man dragging a boy..." "Lucas!" "Lucas!" "Lucas!" "What's the matter?" "Where's Lucas?" "My father's got him." "What?" "Lucas!" "Dane?" "What's going on?" "It's all my fault." "He took Lucas down there." "I have to go get him." "What?" "There is no down there!" "There's no bottom." "Remember?" "Well!" "There's something." "I thought you said you didn't have a father?" "I don't!" "I've got some jerk locked up in the Jersey Prison." "Because he likes to get drunk every nite." "and beat the crap outta us." "He's been in there since Lucas was little, so ..." "All we know is that everytime we get a letter from prison then... it means we're moving again." "Cos he found us." "I don't understand..." "He's in jail then how can he be here?" "Guess we know now, what I'm afraid of, don't we?" "Dane!" "Dane!" "Dane!" "Lucas!" "Dane!" "He'srightbehindyou!" "He'srightbehindyou !" "somejerklockedupintheJersey Prison ." "Noteverymanislike your father." "I'vegotsomejerklockedup..." "The boy is asking for it." "Iknowit 'sjust...his fatherwasnotaniceguy ." "Wegotmarriedtoo young...he's injailhowcan hebehere..." "BeenintheresinceLucaswassmall, so..." "Hisfatherwasnot agood man..." "Cause he likes to get drunk..." "Lucas..." "Lucas..." "How did you know I was in here?" "That's where I used to hide when I get scared." "Thought you said you weren't scared of anything." "I lied." "In the end..." "You shouldn't have come." "Why?" "Because that's what he wanted." "Said he only took me to get you down here." "Where are you, kids?" "I think Creepy Carl was right." "It is gonna kill us." " Look at me." "There's no way I'm gonna let that happen, okay?" "Okay..." "You been asking for it!" "I'll teach you a lesson you won't forget!" "Leave us alone!" "Dane." "Go!" "Climb!" " What are you doing?" "Go as highest as you can!" "What?" " Go!" "Welcome home, boy." "I knew I'd find you hiding in the same closet." "Just like back when you let your brother take the beating for you." "That's not true." "Remember his arm?" "You can hear it crack from inside there." "I didn't know what you were gonna do?" "I didn't think you would hurt him?" "Sure, you did." "You're just scared!" "I'm not scared of you." "You'd be here if that was true." "You're gonna be afraid your whole life." "Not anymore..." "You can't hurt me." "Tell me boy." "Did that hurt?" "I know that you're not that big." "You just looked like it cause I was little." "That's why you came after us." "it's because you're mean." "You're just scared." "You scared of everyone else." "Weren't you?" "Do I look scared to you?" "Do I?" "Your fears are falling away, boy." "What happens to you when they're gone?" "Let's find out." "There you go." "Like father, like son." "I am nothing like you." "Dane!" "Nice climbing, buddy." "Thanks." "You okay?" "Oh!" "He's gone now." "Don't have to worry about it." "Yeah... cool!" "Oh!" "Who's gone?" "Nobody!" "Just screwing around." "Yeah?" "What is this?" "Oh!" "It's just a hole." "Just a hole?" " No!" "Wait!" "What is this?" "It a..." "Just crawlspace you know." "That ought to... keep the little kids out." "Yeah!" "Just keep that closed." "It's not very safe." "Alright!" "Hey you!" "What are you guys gonna do now?" "Huh?" "Well..." "You know..." "We're playing a little midnight basketball." "but I think Lucas is too scared of the whoopdown I'm gonna give em." "Oh!" "That sounds like a challenge to me!" "Yeah...!" "Zip it!" " Alright!" "Why not make it two on two there huh?" "You, me and boys against girls!" "Definitely!" " Alright!" "C'mon!" "Let's do this thing!" "Mom!" "Do you have any fears?" "Like scariest thing you can think of..." "Like dinosaurs, spiders or an alien egg?" "Well, those are pretty scary but em..." "You know I've got to say when I was a little girl..." "I was pretty scared about monsters that I thought was under my bed." "Oh o..."
{ "pile_set_name": "OpenSubtitles" }
Sunday, October 23, 2016 Trump and the Theological Origins of Modernity On a Sunday afternoon, following a spectacular road trip down the Mississippi to Red Wing and then back up the Wisconsin side, with a slice of cheese on the plate and a Picardy glass of pinot noir beside it, the time has perhaps arrived to consider whether the Trump phenomenon might be properly explained by reference to the nominalist challenge to Scholasticism that arose in the early fourteenth century. That seems to be the thesis advanced by Michael Allen Gillespie in his recent book, The Theological Origins of Modernity. One cannot read more than a few pages of this crisply written work without screeching to a halt repeatedly at the specious generalizations, the most glaring of which concerns the concept of modernity itself. Does such a thing as modernity exist? If so, in what does it consist? The simple answer is that modernity does not exist in any palpable way. We are all cave dwellers, slaves, saints, foragers, mystics, warriors, scientists, artists, lovers, bureaucrats, and heals, and the recent history of our nation reflects that complex and contradictory makeup. The more historically minded among us might sometimes propose that we are creatures of reason and self-assertion who have triumphed over the dogma and superstition of the Middle Ages, and such is, in fact, the case. But only to a degree. The same thing could be said in reverse, of course. Very few people who lived during the Middle Ages knew the slightest thing about the medieval "world view" so amply elaborated by Thomas Aquinas, and they certainly knew nothing at all about the long-running dispute between the "realists" and the "nominalists." They could be very "modern." If you've read a few bawdy stories from the Decameron (1353) or the even more risque French fabliaux upon which Boccaccio's tales are often based, the similarity between the modern era and the Middle Ages becomes more striking still. And consider the troubadours, who, nine hundred years ago, were often filled with "modernist" individuality and self-assertion. In one of his lyrics Bernart de Ventadorn (ca. 1150) writes: Of course it’s no wonder I sing better than any other troubadour: my heart draws me more toward love, and I am better made for his command. Heart body knowledge sense strength and energy—I have set all on love, The rein draws me straight toward love, and I cannot turn toward anything else. A man is really dead when he does not feel some sweet taste of love in his heart; and what is it worth to live without worth, except to irritate everybody? May the Lord God never hate me so that I live another day, or even less than a day, after I am guilty of being such a pest, and I no longer have the will to love. To modern ears verses of this kind may sound naive. In any case, the idea they advance—that preferential amorous love lies at the center of masculine self-worth—is not terribly Christian. Fealty to the local duke or king, certainly; dedication to a life of spiritual exercises and obligations, of course. But on what grounds can personal love be elevated to the highest plane of value? Yet this is what the troubadours espoused repeatedly, and it had the effect of turning life, at least as it appears in the courtly literature of the times, into a series of inspired but also arbitrary, grandiose, and often ridiculous adventures. The German scholar Erich Auerbach once noted: When we moderns speak of adventure, we mean something unstable, peripheral, disordered… a something that stands outside the real meaning of existence. All of this is precisely what the word does not mean in the courtly romance. On the contrary, trial through adventure is the real meaning of the knight’s ideal existence. I look forward to examining Gillespie's analysis of the nominalist challenge to the realist orthodoxy more closely. The arguments bear striking parallels to those we use today to keep the arrogance of scientistic reasoning at bay. But I doubt whether he will hit on the central truth of the matter: the nominalists were right, for the most part. There are many horses in the world, but the thing called "horse" does not actually exist. Another way of putting the same point is that Aristotle's notion of "species," which is still in wide use today, is a fiction—a useful but metaphysically empty fiction. (I have a secret hunch that this is what Gillespie's overriding point will turn out to be. But will I have the patience to ferret it out?) Matters are complicated by the fact that in a few instances, the realists had the upper ground, and these are the most important ones. Every beautiful thing partakes of "beauty." Every accurate judgment partakes of "truth." Every loving act partakes of that quality. (Ask Bernart!) And speaking more broadly (but also more vaguely), every worthy action of any kind partakes of "god." About Me The Macaroni blog is dedicated to the subjects that have enlivened the print edition of Macaroni for more than twenty-five years - travel, films, food, ideas, music ... you name it. My name is John Toren. I write the blog. If you're interested in lengthier forays into the same fields track down a copy of my new book,All the Things You Are or my previous book By the Way. For a closer look at the state of Minnesota, check out my travel book, The Seven States of Minnesota.
{ "pile_set_name": "Pile-CC" }
Receptor-based design of cytokine therapeutics. Cytokines hold huge potential for the treatment of disease due to their often fundamental roles in development and homeostasis. However, it is this same primary biological function that can both cause disease through dysregulation as well as prevent their therapeutic use due to systemic consequences arising from this inherent pleiotropy. Molecularly, this can be explained through an understanding of the receptor system specific to each cytokine and the cells on which they are expressed. This knowledge has been exploited to yield muteins (mutated proteins) that exhibit selective, and sometimes novel, biological properties dependent upon receptor subunit usage. In some cases, these muteins have been evaluated in clinical trials and have been approved for clinical use; in most instances, however, these muteins are not suitable for therapeutic application due to intrinsic characteristics of the muteins themselves or the cellular and receptor system to which they are directed. Ultimately, molecular insight to the biological processes governing disease pathology underlies the successful application of mutein-based therapy. The clinical success enjoyed by a subset of these proteins signals the advent of a new mode of therapeutic protein development.
{ "pile_set_name": "PubMed Abstracts" }
package test type typeForTest map[string]*[4]string
{ "pile_set_name": "Github" }
Thinking Faith Email Address * First Name Last Name You are subscribing to receive regular emails from Thinking Faith, the online journal of the Jesuits in Britain, which will alert you to our new content as well as resources from our archive and other Jesuit works that may be of interest to you. We will keep your details safe and you can unsubscribe at any time. Please read our privacy policy for more details on how and why we collect data. The second stage of our Advent Examen is ‘Prayer for the Light’, in which we ask to be able to see what is truly important in our own lives, says Dushan Croos SJ. That prayer can have a particular feel to it in a season that asks us to look backward and forwards. ‘The light for which we wait in Advent illuminates not only the past of the chosen people with their Saving Lord, but also illuminates the new way by which he is about to offer salvation to all women and men as well as to all of creation.’ As the sun sets on the shortest day of the year, four days before the celebration of the birth of Christ, the Church prays the Canticle of Mary asking for light at the darkest moment of the year: O Rising Sun, you are the splendour of eternal light and the sun of justice.O come and enlighten those who sit in darkness and in the shadow of death. [Divine Office, 21 Dec, Magnificat Antiphon] The words are perhaps more familiar to us in the words of the great Advent hymn, ‘O Come, O Come, Emmanuel’: O come, Thou Day-Spring, Come and cheer Our spirits by Thine advent here Disperse the gloomy clouds of night And death’s dark shadows put to flight Rejoice, rejoice, Emmanuel shall come to thee, o Israel Christ, the Sun Rising over the Earth, is the love that illuminates what it is for us to be human. St Ignatius invites us to seek that experience in the second point of the Examen: ‘to ask grace to know my sins and rid myself of them.’ [Spiritual Exercises, §43]. We need the light of the Holy Spirit to help us know our sins, but even more importantly so that we might notice where Christ is present in our life each day. We look backwards to notice God’s trace in each day, in order to look forward to the future and be more ready to receive him as we meet him. Advent is the season in which we look back at the history of how the chosen people have heard the Lord through his prophets, so that we can prepare to celebrate his coming among us in human flesh, and then to look forward in hope to his second coming at the end of time. Asking for the grace of light on our life is the second point of the Examen; it is similar to asking for the grace we seek, which St Ignatius invites us to do each time we enter into prayer. To notice how the Lord is calling us at each moment of our lives, or how we are resisting or ignoring that call, requires the spotlight of the Holy Spirit, the Rising Sun who brings daylight over the world of our lives. This light is what we need in every delicate or important task: a well-directed light of the right brightness shows us what we are doing, so that we can judge the task at hand. If the light shines in our eyes, or highlights what is a distraction, we are unable to focus the necessary attention on the work we need to do. In examining our own lives, if the Lord does not show us what is truly important, we might easily zoom in on what most bothers us, what obsesses us regularly, or on what we are told is central by those who pretend to be experts, but in reality understand little of how God works in our lives. In the gospels, the Sadducees, Scribes and Pharisees provide us with many examples of that. Each day’s news makes us well aware that neither the loudest nor the most elegant voice necessarily gives us the truth. It might be the uncomfortable voice, telling us that what we seek is unrealistic or impossible, that shows us the truth, as did the Hebrew prophets like Jeremiah; or perhaps the gentlest voice in the room, which says what others have missed, shows the best way forward. Perhaps as we become daily more aware of our lives, the Lord invites us to notice something other than our usual concerns, to look at parts of our lives that we usually ignore. Advent prepares us to celebrate the birth of a child, who in the eyes of the world has undistinguished ancestry, in an obscure village, in a poor corner of the known world; yet the birth that passed unnoticed by the powers of the world is still more significant than that of any emperor before or since. It might help to ask: what is the neglected but important moment of the day that the Holy Spirit illuminates for you? What opportunity does it offer to cleanse or purify your life, as the prophet Malachi invites us to do when he promises that ‘the sun of righteousness will shine out with healing in its rays’? The pathway through the prophets that Advent offers us is also an examen of the history of how God has accompanied his people through their history, though, at the time, they did not always recognise it. Though they resisted his call to holiness in favour of more popular types of god, which turned out to be hollow, he was walking with them through it all. Light shines forward and backward. The light for which we wait in Advent illuminates not only the past of the chosen people with their Saving Lord, but also illuminates the new way by which he is about to offer salvation to all women and men as well as to all of creation. Likewise, the Rising Sun illuminates not only what we have done for good or ill, that we may not have noticed; but also enlightens how we might speak and act in the future in response to his call, or how we can avoid rejecting it, perhaps accidentally or unknowingly. By asking the light of the Holy Spirit on our past, we also ask the Lord to help us change our future to avoid what destroys us or others, and to help us go further and deeper in the good we desire to do. In this way we ask him to illuminate our choices, to breathe through them so that we make music to the glory of his name. Our Advent route shows us the choices of Zechariah, Elizabeth and John, as well as the freely made choice of the young Mary of Nazareth, which transforms her into the one we know as the Blessed Virgin Mary, the first disciple, the Mother of the Church and of all believers. They made these choices because they had already hoped for the light that would dawn as a result of how they chose in hope. The Examen helps us also to choose in hope by the grace of the Rising Sun on our lives. Would you like to read more? Search Type any words in the box below to search Thinking Faith for content containing those words, or tick the ‘author’ box and type in the name of any Thinking Faith author to find all of his or her articles and reviews. You can also narrow your search by selecting a category from the dropdown menu. Latest articles Subscribe to our mailing list Email Address * First Name * Last Name * You are subscribing to receive regular emails from Thinking Faith, the online journal of the Jesuits in Britain, which will alert you to our new content as well as resources from our archive and other Jesuit works that may be of interest to you. We will keep your details safe and you can unsubscribe at any time. Please read our privacy policy for more details on how and why we collect data.
{ "pile_set_name": "Pile-CC" }
Kay de Silva A message from the Author I wrote the first book in the Our Amazing World Series, "Whales" back in 2013. I still remember the exhilaration I felt when it was first launched. And when the books went on to being loved, it was icing on the cake. It thrills me to be able to create something that's enjoyed not just by my own children, but also for those from around the world. I have always been crazy about animals and nature and creating these books transports back to my childhood. Back in the day there were no high resolution screens or the internet (yes, there was such a time). So I'd spend many hours going through the newspapers cutting out images and articles on animals. I'd lovingly squirrel away these delightful treasures in a scrapbook, to enjoy at my leisure. Now all grownup, I'm still on the lookout for great images and interesting facts. The difference is I can now share them with many more people. I know how much I enjoy creating this series and it's my fervent wish that you love every moment you spend with them.
{ "pile_set_name": "Pile-CC" }