text
stringlengths 1
3.78M
| meta
dict |
|---|---|
Pages
Monday, March 13, 2017
Today's Quilt Show
...is delayed. It has rained a drizzly rain all day long. I was lucky enough to get a parking space in the parking garage at the hospital today. My surgeons visit was delayed since we were not in the house yet, and I didn't want to add anything on top of everything else.
Amanda texted me saying my sofa was in her warehouse. Maybe I will see it later this week.
It is not like I don't have anything to sit on..............cause I got these today!!!!!!!
One is a rocker/recliner and one is just a recliner. Frank gets sick if he rocks. The jury is out yet to see if he can just watch me rock. I may be rock restricted to when he is not here.
What is it with the upside down stuff today? I turned the fire on and am watching TV and rocking my little heart out till he gets home, at which time I will only be watching and reclining............
Perfect chairs...bright and clean and comfy-looking. I'd love to have a rocker-recliner. I could rock all day, especially if there's a baby in my arms! Enjoy the rocking...when you're not restricted! lol
Copyright Statement
2017 (c) Copyright to glen Parks. All rights reserved. Images of the work, contents of blog posts and ideas may not be reproduced, manipulated or used or distributed in any way without written permission from the owner. Contact me if you wish to use any of my stuff anywhere else with my permission. Ta-dah!
Do Not Pin Please
Please do not pin my pictures or posts anywhere.
She went out on a limb
Had it break off behind her
And discovered she could fly
Kobi Yamada
Search This Blog
"It came to me that every time I lose a dog; they take a piece of my heart with them. And every new dog that comes into my life gifts me with a piece of their heart. If I live long enough, all the components of my heart will be dog, and maybe I will become as generous and loving as they are."~Unknown
OPAM - One Project A Month Finish
Each time I finish an OPAM I will list it here. Follow along with Kris and Sweet Peg as we dig through that backlog of projects and get them out of our hair!
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Skipping the BufferedReader readLine() method in java
Is there a easy way to skip the readLine() method in java if it takes longer than, say, 2 seconds?
Here's the context in which I'm asking this question:
public void run()
{
boolean looping = true;
while(looping) {
for(int x = 0; x<clientList.size(); x++) {
try {
Comm s = clientList.get(x);
String str = s.recieve();
// code that does something based on the string in the line above
}
// other stuff like catch methods
}
}
}
Comm is a class I wrote, and the receive method, which contains a BufferedReader called "in", is this:
public String recieve()
{
try { if(active) return in.readLine(); }
catch(Exception e) { System.out.println("Comm Error 2: "+e); }
return "";
}
I've noticed that the program stops and waits for the input stream to have something to read before continuing. Which is bad, because I need the program to keep looping (as it loops, it goes to all the other clients and asks for input). Is there a way to skip the readLine() process if there's nothing to read?
I'm also pretty sure that I'm not explaining this well, so please ask me questions if I'm being confusing.
A:
The timeout alone is not a good idea. Use one thread per client (or use asynchronous I/O, but unless you're building some high performance application, that's unnecessarily complicated).
As for the timeout itself, it must be done on the stream that's encapsulated. See for example How can I set a timeout against a BufferedReader based upon a URLConnection in Java?
|
{
"pile_set_name": "StackExchange"
}
|
El endeudamiento externo de México retoma su comportamiento de alza en el arranque del 2019, dentro de un contexto de preocupaciones y dudas por la disponibilidad de recursos para el financiamiento de los programas del gobierno del presidente Andrés Manuel López Obrador, y de sus posibles implicaciones sobre la calificación de la deuda soberana del país, en particular, de la referida a Pemex.
El saldo del endeudamiento externo bruto de México se elevó en 9 mil 519 millones de dólares tan solo en el primer trimestre del 2019, para alcanzar una cifra sin precedente de 456 mil 251 millones, de acuerdo con las últimas cifras publicadas por el Banco de México.
El aumento en endeudamiento externo presenta claroscuros, al mismo tiempo que contribuye a prender algunos focos amarillos.
El principal catalizador del mayor endeudamiento fue la compra de extranjeros de papel de deuda emitido por el gobierno mexicano en el mercado local con un monto de 6 mil 715 millones de dólares, con lo que elevó su saldo a 115 mil 208 millones en el primer trimestre del 2019. El crecimiento de este tipo de recursos fue de 6.19 por ciento con relación a los últimos tres meses del año pasado.
“Alrededor del mundo, tenemos aproximadamente 14 billones de bonos con un rendimiento negativo, mientras que la tasa de interés real de la deuda de México a 10 años (nominal – inflación) ha fluctuado en torno a los 4 por ciento. Aunque el país se enfrenta a numerosos riesgos, su deuda sigue siendo muy atractiva, considerando que los títulos soberanos mantienen un grado de inversión y ofrecen alta rentabilidad en términos relativos” declaró desde Nueva York, en exclusiva para el Financiero, Diego Colman, analista de mercados de DailyFx del grupo financiero IG.
La tenencia de extranjeros, de acuerdo a normas internacionales que sigue el Banco de México, en papeles como los bonos M, Cetes, Udibonos y Bondes D, se debe tomar como deuda externa.
El mayor crecimiento de la deuda externa resultante del apetito de extranjeros por papel de deuda denominado en pesos, es un signo de la confianza en México y resulta más manejable dado que se tienen un mayor control par parte del gobierno mexicano, aunque no deja de preocupar debido a la volatilidad que puede tener este tipo de recursos.
Otro aspecto que también preocupa se refiere al aumento del endeudamiento del Gobierno Federal y de las empresas denominadas paraestatales. Estados dos entidades aumentaron su nivel de deuda en 2 mil 111 y 2 mil 185 millones de dólares en el primer trimestre de este año, lo cuales mostraron una tasa de crecimiento de 2.20 y 2.31 por ciento con respecto al trimestre anterior en cada caso.
Los requerimientos financieros tanto del Gobierno Federal como de Pemex pueden presionan al resultado de las finanzas públicas en lo general, lo cual puede llevar a caer en la tentación de incrementar los recurso vía endeudamiento externo, ante la estrategia de no realizar, por el momento, una reforma fiscal y mantener bajo control a los aumentos de precios en los bienes y servicios públicos.
La política de financiamiento, para ser sustentable, no se debe hacer descansar solamente en el pilar de la austeridad y el combate a la corrupción.
“Lo ideal para todo gobierno es controlar el crecimiento de la deuda y consolidar sus obligaciones. Sin embargo, en un entorno económico menos benigno para México, en el que se han reducido las recaudaciones de Hacienda, la disciplina fiscal se dificulta, en particular si la administración no está dispuesta a reducir sus gastos dramáticamente y/o recortar proyectos que no tienen mucho sentido económico (Dos Bocas, Santa Lucía, etc.), sostiene el especialista Diego Colman.
La perspectiva para las finanzas públicas se nubla por los mayores requerimientos de recursos para financiar los programas de gobierno y sacar a adelante a Pemex, debido al bajo crecimiento económico, lo cual puede contribuir a mantener la presión de baja a los ingresos y conducir a una degradación de la calificación soberana de la deuda externa y de la principal empresa productiva.
La deuda externa bruta de México representó el 36.5 por ciento del total del tamaño de la economía en el primer trimestre del 2019, menor al 37.7 por ciento del cierre del 2018. Sin embargo esto se puede deber, en buena parte, a que el PIB en dólares se vio favorecido por la recuperación del peso, lo que compenso en buena parte la caída de 0.2 por ciento en la actividad productiva en el arranque del año.
Finalmente, habría que destacar que las empresas del sector privado no financiero han mostrado una postura más prudente en materia de endeudamiento externo, al ubicarse este rubro en 119 mil 103 millones de dólares al cierre del primer trimestre del 2019, por debajo de su máximo histórico alcanzado en 125 mil 409 millones en el último trimestre del 2017.
|
{
"pile_set_name": "OpenWebText2"
}
|
After playing 10 games, Texas Tech has earned 10 wins, leads the nation in field-goal defense and scoring defense and comes in at No. 4 in the NCAA NET Rankings, No. 12 in the Associated Press Top-25 Poll, No. 11 in the USA TODAY Coaches Poll and No. 9 in the ESPN Power Rankings.The Red Raiders (10-0) return to action at 6 p.m. on Thursday against No. 2 Duke at Madison Square Garden in their fourth neutral-court game of the season, while the Blue Devils (9-1) will host Princeton on Tuesday before traveling up to New York for the first-ever matchup between the two schools.Texas Tech is unbeaten through 10 games for the second time in program history with the only other time coming with a 12-0 start to the 1929-30 season. The Red Raiders got to 10-0 with an impressive 82-48 win over Abilene Christian last Saturday in the final game ever at the Lubbock Municipal Coliseum. TTU's defense limited the Wildcats to 28.3 percent shooting in the game, whilewent off for a career-high 30 points after going 12-for-13 from the field. The Red Raiders finished the game shooting 55.6 percent from the field with 10 players scoring in the game. Culver would earn Big 12 Player of the Week for his performance, the first in his career and the first conference honor of the season for the Red Raiders.After two strong performances last week, the Red Raiders continue to lead the nation by limiting opponents to 32.2 percent shooting and have now matched Virginia by holding teams to 51.2 points per game for the national lead. TTU is second nationally with a 26.3 scoring margin advantage, fourth in 3-point defense (25.0 %), 11th with a 5.3 turnover margin advantage, 16th with 5.4 blocked shots per game and 25th with a 7.5 rebounding advantage. Offensively, the Red Raiders are scoring 77.5 points per game and are 18th nationally with a 49.9 shooting percentage and second in the Big 12 with only 115 turnovers through 10 games.In the polls, Texas Tech remained at No. 11 in the USA TODAY Coaches Poll but dropped one spot to No. 12 in the AP Top-25. The Red Raiders, who were unranked in the preseason polls, appeared in 14 AP polls last season but would enter this season unranked through three weeks. The Red Raiders finished the 2017-18 season at No. 6 in the USA TODAY Coaches Poll and were in its Top-10 rankings seven times during the season. The No. 6 ranking to finish the season matched a program-best set on Feb. 12, 2018 in the USA TODAY Coaches poll and on Feb. 19, 2018 in the AP Top 25 Poll.Kansas (9-0) is the top-ranked team in the nation for the second straight week, followed by the Blue Devils, Tennessee (8-1), Michigan (11-0) and Virginia (9-0) in the polls. Texas Tech is one of nine teams who are still unbeaten with KU, Michigan, Virginia, No. 6 Nevada (11-0), No. 14 Buffalo (10-0), No. 21 Houston (10-0) and No. 24 Furman (12-0). St. John's (10-0) is the only undefeated team outside the polls in the seventh release of the season.NET: The NCAA developed NET to replace the RPI as the primary sorting tool for evaluating teams during the Division I men's basketball season. The new ranking system was approved in late July after months of consultation with the Division I Men's Basketball Committee, the National Association of Basketball Coaches, top basketball analytics experts and Google Cloud Professional Services. The NCAA Evaluation Tool, which will be known as the NET, relies on game results, strength of schedule, game location, scoring margin, net offensive and defensive efficiency, and the quality of wins and losses. To make sense of team performance data, late-season games (including from the NCAA tournament) were used as test sets to develop a ranking model leveraging machine learning techniques. The model, which used team performance data to predict the outcome of games in test sets, was optimized until it was as accurate as possible. The resulting model is the one that will be used as the NET going forward.
|
{
"pile_set_name": "OpenWebText2"
}
|
Stéphane E. Roy
Stéphane Emmanuel Roy (Montreal, 31 May 1968), is a Canadian actor and comedian. He was a member of the comedy group Les Bizarroïdes 1990-2000 with Ken Scott, Martin Petit, and Guy Lévesque.
References
Category:1968 births
Category:Living people
Category:Canadian television personalities
Category:Canadian male television actors
Category:Male actors from Montreal
Category:Canadian sketch comedians
|
{
"pile_set_name": "Wikipedia (en)"
}
|
As the George W. Bush Presidential Library and Museum opens today, some in the press have been caught up in a swoon over the former president.
Pundits from the center and the avowed left called on critics to re-examine the former president as a “good man with a good heart,” while those on the right declare that “Bush is Back.” Political analysts are compiling lists of “The 7 best moments of George W. Bush's presidency” and highlighting polls indicating that Bush is more popular now than he was in office. And Fox News has pulled out all the stops, lining up their Bush-administration-officials-turned-Fox-employees to sing the former president's praises.
Presidential historians and veteran reporters who covered the Bush White House are speaking out, saying that reporting on the Bush library and legacy should put his failures in their proper context.
The academics point out that while some of Bush's defenders in the press have said that the Bush legacy is a question for history, historians largely pan his tenure. And the veteran reporters who covered Bush's presidency urge that coverage of the presidential library provide a complete accounting of his tenure in office, including its many missteps.
“The press needs to take a really cold-eyed look at the circumstances ... look at the state of the country and world on Jan. 20, 2001 and eight years later,” said Ed Chen, former Los Angeles Times and Bloomberg correspondent who covered the White House from 1999 to 2010. “Were mistakes made? Sure, the whole WMD fiasco ... it sure has a long way to go for anything close to a full rehabilitation.”
Chen later added, “Of the three [presidents] that I covered, we have to put Bush at the bottom.”
Several top presidential historians echoed Chen's low-ranking view, noting a week of positive coverage cannot erase that.
“Right now he's ranked as one of the lower presidents because of the War in Iraq and the economy tanking so he's got a long way to go to get rehabilitated,” said Douglas Brinkley, a top presidential historian and author. “It is a long revisionist road up from the bottom for George W. Bush. He is ranked toward the bottom rung of presidents.”
Indeed, surveys of historians regularly find Bush ranked among the worst of U.S. presidents.
Having toured the new library at Southern Methodist University in Dallas, Brinkley described it as having a “compassionate conservative motif” for Bush, adding, “I was surprised how much wall space was given to AIDS in Africa, marine conservation, No Child Left Behind. I got the feeling that the Bush crowd was trying to paint their president as more of a centrist than many people feel.”
But Brinkley stressed that whatever positive image is being attempted this week cannot rewrite his presidency.
“I don't think it matters two weeks from now, it is a building opening and people tend to be jubilant,” he said. “It's the beginning of revisionism of a presidency.”
Brandon Rottinghaus, associate professor at the University of Houston and presidential historian, offered a similar assessment.
“The Bush legacy is certainly one of increasing partisanship, he certainly presided over a country that became more polarized and didn't do much to try to alleviate that,” Rottinghaus said.
He noted much of the positive press for the library is a tribute to the office, not necessarily the man, but added that that could be a problem for real reporting of Bush's legacy.
“You can't get past the fact that some of these policies were obviously flawed, its hindsight to suggest it, but I think what will happen is that presidents are judged on the big moments of governing,” he said. “The big moments were the aftermath of 9/11 and the war in Iraq. In terms of the war in Iraq, there are some serious oversights and some clear failures.”
Cal Jillson, political science professor and historian at Southern Methodist University, said many in the press are tending to “bend over backwards to accentuate the positive.”
He cited the nearby Dallas Morning News as being “all very positive” in its coverage. Still, he points out Bush's image among historians remains poor, despite any revision attempt. “George W. Bush is ranked with the lowest of the lows in presidential rankings,” Jillson said. “He is always in the bottom 5 or 6 or 7.”
He added of the library coverage: “Most will miss that the most important element of the story is that we do have a presidency here with two wars, inconclusively fought at great expense and an economic collapse, the worst in 70 years, that is a huge legacy burden.”
Those who covered Bush in the White House say that legacy burden should be front and center as the media covers the opening of the presidential library.
“I would be surprised and disappointed if coverage did not include the War in Iraq,” said Steve Thomma, a McClatchy White House correspondent since 1997. "The coverage of a presidential library is the coverage of his entire record. I would hope it would include a big examination of the Iraq war."
He added that at the library opening, “the role of the press is to use it as an occasion to examine the presidency and the totality of the presidency. The number one thing is foreign policy -- from Sept. 11 on it dominated his presidency and the economy for what happened at the end of his term, the economy crashing, you have to ask if his policies were the right ones.”
Carl Cannon covered Bush's first seven years in office for National Journal and co-authored a book comparing him to Ronald Reagan.
He said reviewing Bush's record during a library opening allows for reporters to “humanize” him, but that they should not “whitewash his record.”
“I would simply say that we should evaluate George W. Bush--if that's what we're doing this week--as best we can, with benefit of what we've learned about him and his policies, good or bad, since he left office.”
Jennifer Loven, who covered the White House from 2002 to 2010 for Associated Press, said the descriptions she has seen of the Bush Library sound like it is “overly defensive for Bush to present his big decisions the way he does.”
She added that seeing more positive coverage of this event is not a surprise, but points out she has seen good balanced coverage as well.
“I've actually been interested to see that the coverage of his legacy essentially boils it down to a presidency dominated by very bad things - basically bracketed by 9/11 and Iraq at or near the beginning, Katrina in the middle, and the financial meltdown at the end.”
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Dynamically add href on
I have a logout link
<div id="titleInfo">
<div id="signOut">
<a href="" class="signOutLink" >Log Out</a>
</div>
</div>
I need to add navigation destination dynamically.
$(document).ready(function() {
//Navigation Handling
$('.signOutLink').click(function() {
alert('h');
window.location.href("LogOut.aspx");
//window.location.replace("LogOut.aspx");
});
});
But it is not working. How can we correct it?
A:
$(document).ready(function () {
$('a.signOutLink').click(function () {
window.location = "LogOut.aspx";
});
});
A:
Thanks to all. I used following:
$('.signOutLink').click(function () {
window.location.href("LogOut.aspx?a=b"); //Can use REPLACE also
return false; //FALSE
});
|
{
"pile_set_name": "StackExchange"
}
|
2019 WI 87
SUPREME COURT OF WISCONSIN
CASE NO.: 2019AP1148-D
COMPLETE TITLE: In the Matter of Disciplinary Proceedings
Against Gordon C. Ring, Attorney at Law:
Office of Lawyer Regulation,
Complainant,
v.
Gordon C. Ring,
Respondent.
DISCIPLINARY PROCEEDINGS AGAINST RING
OPINION FILED: August 23, 2019
SUBMITTED ON BRIEFS:
ORAL ARGUMENT:
SOURCE OF APPEAL:
COURT:
COUNTY:
JUDGE:
JUSTICES:
CONCURRED:
DISSENTED:
NOT PARTICIPATING:
ATTORNEYS:
2019 WI 87
NOTICE
This opinion is subject to further
editing and modification. The final
version will appear in the bound
volume of the official reports.
No. 2019AP1148-D
STATE OF WISCONSIN : IN SUPREME COURT
In the Matter of Disciplinary Proceedings
Against Gordon C. Ring, Attorney at Law:
Office of Lawyer Regulation, FILED
Complainant, AUG 23, 2019
v. Sheila T. Reiff
Clerk of Supreme Court
Gordon C. Ring,
Respondent.
ATTORNEY disciplinary proceeding. Attorney's license
suspended.
¶1 PER CURIAM. This is a reciprocal discipline matter.
On June 25, 2019, the Office of Lawyer Regulation (OLR) filed a
two-count complaint against Attorney Gordon C. Ring. Count one
alleged that by virtue of Attorney Ring's recent two-year
license suspension by the Illinois Supreme Court, Attorney Ring
should be subject to reciprocal discipline in Wisconsin pursuant
to SCR 22.22. Count two alleged by failing to notify the OLR of
his disbarment in Illinois within 20 days of the effective date
of the imposition of such discipline, Attorney Ring violated
No. 2019AP1148-D
Supreme Court Rule (SCR) 22.22(1).1 After service of the
complaint, the parties stipulated to the imposition of
reciprocal discipline. We approve the stipulation, and we
therefore order a two-year suspension of Attorney Ring's
Wisconsin law license.
¶2 Attorney Ring's law license history is as follows. He
was admitted to practice law in Wisconsin in May 1984, and in
Illinois in November 1977. His Wisconsin disciplinary history
consists of a six-month suspension in 1992, as discipline
reciprocal to that imposed on him by the Illinois Supreme Court
for professional misconduct. See In re Disciplinary Proceedings
Against Ring, 168 Wis. 2d 817, 484 N.W.2d 336 (1992). Attorney
Ring did not petition for reinstatement of his Wisconsin law
license; it remains suspended. Attorney Ring's Wisconsin law
license was also administratively suspended in 1985 for failure
to comply with continuing legal education requirements, and in
2011 for failure to pay State Bar dues. His license remains
administratively suspended.
¶3 On September 20, 2018, the Illinois Supreme Court
suspended Attorney Ring's Illinois law license for two years,
1 SCR 22.22(1) provides:
An attorney on whom public discipline for
misconduct or a license suspension for medical
incapacity has been imposed by another jurisdiction
shall promptly notify the director of the matter.
Failure to furnish the notice within 20 days of the
effective date of the order or judgment of the other
jurisdiction constitutes misconduct.
2
No. 2019AP1148-D
effective October 11, 2018, for multiple counts of misconduct,
and ordered him to reimburse the Illinois Client Protection
Program Trust Fund for any payments arising from his misconduct
prior to the end of his suspension. According to the
allegations in the OLR's complaint and the Illinois disciplinary
records attached to the complaint, Attorney Ring's misconduct in
Illinois included misappropriation of over $124,000 in two
client matters, and, in a third matter, failing to work on a
case after the filing of the complaint, causing the case to be
dismissed. Attorney Ring did not tell his client that he had
failed to work on the case or that it had been dismissed, and he
later used funds in his client trust account belonging to others
to make a $10,000 payment to his client to resolve the matter.
By his conduct, Attorney Ring violated Rules 1.3, 1.4(a)(3),
1.15(a), 3.2, 8.4(c), and 8.4(d) of the Illinois Rules of
Professional Conduct.
¶4 On July 15, 2019, after the OLR's complaint had been
served on Attorney Ring but before a referee had been appointed,
Attorney Ring entered into a stipulation with the OLR whereby he
agreed that the facts alleged in the OLR's complaint supported a
two-year suspension of his Wisconsin law license as reciprocal
discipline to that imposed by the Illinois Supreme Court.
¶5 Supreme Court Rule 22.22(3) states as follows:
(3) The supreme court shall impose the identical
discipline or license suspension unless one or more of
the following is present:
3
No. 2019AP1148-D
(a) The procedure in the other jurisdiction was so
lacking in notice or opportunity to be heard as to
constitute a deprivation of due process.
(b) There was such an infirmity of proof establishing
the misconduct or medical incapacity that the supreme
court could not accept as final the conclusion in
respect to the misconduct or medical incapacity.
(c) The misconduct justifies substantially different
discipline in this state.
¶6 Attorney Ring does not claim that any of the defenses
found in SCR 22.22(3) apply. Attorney Ring further states that
the stipulation did not result from plea bargaining; that he
understands the allegations against him; that he understands the
ramifications should the court impose the stipulated level of
discipline; that he understands his right to contest this
matter; that he understands his right to consult with counsel,
and represents that he has consulted with counsel; that his
entry into the stipulation is made knowingly and voluntarily;
and that his entry into the stipulation represents his decision
not to contest the misconduct alleged in the complaint or the
level and type of discipline sought by the OLR's director.
¶7 Upon our review of the matter, we accept the
stipulation and impose discipline identical to that imposed by
the Illinois Supreme Court; i.e., a two-year suspension of
Attorney Ring's Wisconsin law license. Because this matter was
resolved by means of a stipulation, the OLR has not sought the
imposition of costs, and we impose none.
4
No. 2019AP1148-D
¶8 IT IS ORDERED that the license of Gordon C. Ring to
practice law in Wisconsin is suspended for two years, effective
the date of this order.
¶9 IT IS FURTHER ORDERED that, to the extent he has not
already done so, Gordon C. Ring shall comply with the provisions
of SCR 22.26 concerning the duties of a person whose license to
practice law in Wisconsin has been suspended.
¶10 IT IS FURTHER ORDERED that compliance with all
conditions of this order is required for reinstatement. See
SCR 22.29(4)(c).
5
1
|
{
"pile_set_name": "FreeLaw"
}
|
On Tuesday, 11/13/2018, I was working my assigned 4PM to 12AM shift in the East-1 cruiser, with my partner, Ofc. Devin Schneider. The following is a summary of the incident:
At approximately 5:20PM, we responded to the area of Columbia Sportswear Outlet for a report of a past shoplifter. The shoplifter was described as a white female wearing a black jacket, a pink backpack, and brown boots. We searched the area of Columbia Sportswear and then continued on to search the Assembly Row MBTA station.
While searching the area, we observed a female matching the description, walking along the train waiting platform. We entered the train station and found the pink backpack on the floor of the train platform. We asked the three gentlemen that were standing near the backpack if it belonged to them and they all said no. We asked if they knew who the backpack belonged to and they said no. I picked up the backpack and Ofc. Schneider and I continued to search the train and the platform, for the female matching the description.
We located the female matching the description, later identified as XXXX, walking with a second female, later identified as Kelli Cavanaugh, on the train platform, towards where the backpack was. We stopped them because it wasn’t immediately apparent to us which one of them was the suspected shoplifter because they were both wearing similar brown boots. I asked XXXX if the pink backpack was hers, she said no. When I asked a second time, she said that it was hers. When I asked XXXX why she left her backpack and walked away, she said because her friend, Cavanaugh needed her Charlie Card to get into the train station, so she went up to let her in. While talking to them, Ofc. Schneider noticed Cavanaugh had a reuseable Jansport bag in her hand that was full of Columbia sweaters. The Columbia sweaters were in plain view because the bag was open. Through the combined training and experience of all the officers involved, we knew that it was common for shoplifters to use reuseable bags to conceal merchandise.
XXXX immediately admitted to shoplifting from Columbia Sportswear. She said that the only thing she stole was the black rain jacket from Columbia (see attached photo). However, while conducting a search of the pink backpack for elements of the crime, I also found a pair of black Adidas sneakers with a security tag on them. When I asked XXXX if she stole those, she initially said that she bought them off someone selling them at North Station. When Ofc. Schneider asked Cavanaugh if she stole anything from Columbia, she said no because she had plenty money to buy things. When asked for her receipt, she could not provide it.
Ofc. Schneider asked both Cavanaugh and XXXX if they stole anything else from Columbia or any other stores in the area. He told them that he was going to go back to Columbia and review the cameras. He then asked them if they had anything else that they wanted to admit to. XXXX said she stole the black Adidas sneakers from Adidas. Cavanaugh said that she did not steal anything. Ofc. Schneider continued to Columbia Sportswear to review the camera footage while Ofc. Shaun Clark and myself remained with XXXX and Cavanaugh on the train platform.
After reviewing camera footage from Columbia Sportswear, Ofc. Schneider determined that Cavanaugh stole 6 sweaters. The footage shows Cavanaugh entering the store with an empty bag, shopping around, going into the dressing room, and exiting the dressing room with a full bag. After exiting the dressing room, Cavanaugh left the store, without making a purchase at the cashier.
I placed Cavanaugh under arrest, handcuffing her with her hands behind her back. I double locked the handcuffs for her safety. I then conducted a search of Cavanaugh for weapons. Cavanaugh was then transported back to the station in the prisoner transport unit 200, operated by Ofc. Thomas Lambert. While Ofc. Lambert was transporting Cavanaugh, he reported that she was reaching into the rear of her pants, appearing to try to grab something from her rear end. Ofc. Schneider, Ofc. Clark, and I met Ofc. Lambert at Mystic Avenue. I removed Cavanaugh from the transport vehicle and asked her if she had anything else on her, to which she said no.
After I searched her again, she said that her left handcuff was too tight. Upon checking the tightness of the handcuff, I could fit two fingers in between the her wrist and the handcuff, which is the way I was trained. However, I removed the handcuff and adjusted it anyway, for her comfort. I had Ofc. Lambert hold her jacket sleeves up so that I could properly adjust the handcuff. I adjusted the handcuff to again have the ability to fit two fingers between her wrist and the handcuff. Cavanaugh stated that was better. Prior to placing her back into the transport vehicle, I asked her once again if she had anything on her or in her and she stated no.
At the station, I searched Cavanaugh again. I removed all three of her sweaters and vests (which I did not do outside). I then pulled her bra out to its farthest extension and continued around the bra. After rigorous shaking, pills began falling out of her breast area. They did not fall out all at once because they appeared to be stuck to her skin. Cavanaugh was booked by Lt. Sheehan.
The two original receipts along with the 7 pills were placed into evidence in the usual manner. The pills found were identified as the following:
– Three – 1 mg, yellow, circle Clonazepam (R 34)
– Two – 800 mg, white, elliptical, oval Gabapentins (D 25)
– One – 300 mg, yellow, capsule Gabapentin (215)
– One – 0.3mg, white, elliptical, oval Clonidine Hydrochloride
Cavanaugh stated that she had a prescription but she was unable to provide it.
Cavanaugh was charged with the following:
– Massachusetts General Law c.266 s.30: Larceny under $1200
– Massachusetts General Law c.94C s.34: Posession of a Class C drug
– Massachusetts General Law c.94C s.34: Posession of a Class E drug
A massachusetts criminal application will be filed against XXXX, for the following charge:
– Massachusetts General Law c.266 s.30: Larceny under $1200
|
{
"pile_set_name": "Pile-CC"
}
|
<!DOCTYPE HTML>
<html>
<!--
https://bugzilla.mozilla.org/show_bug.cgi?id=402380
-->
<head>
<title>Test for Bug 402380</title>
<script src="/tests/SimpleTest/SimpleTest.js"></script>
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
<style type="text/css">
div::first-letter { color: green; }
span:before { content: open-quote "This "; }
span:after { content: close-quote; }
</style>
</head>
<body style="font-family: monospace; width: 7ch; border: 1px solid orange;"
onload="document.getElementById('div').style.direction = 'rtl';">
<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=402380">Mozilla Bug 402380</a>
<div id="div"><span>is text</span></div>
<pre id="test">
<script class="testbody" type="text/javascript">
function test()
{
/** Test for Bug 402380 **/
ok(true, "Should not crash");
SimpleTest.finish();
}
SimpleTest.requestFlakyTimeout("untriaged");
setTimeout(test, 500);
SimpleTest.waitForExplicitFinish();
</script>
</pre>
</body>
</html>
|
{
"pile_set_name": "Github"
}
|
Q:
Best resources to learn origami art immediately?
I saw one of my class fellows creating beautiful origami art work with paper. I was quite amazed, so I would like to learn origami art.
Can you provide resources or recommendations on how to learn origami art immediately?
A:
As with all crafts and arts, you can not expect to make beautiful items when you just start. You will have to start with the simple models and big sheets of paper.
Once you have some experience, you will go up to more difficult patterns and smaller paper.
Depending on how you take to it, it might take days or weeks, but origami can be done beautiful with little experience when you work precise and with good paper.
Using a good book or a good website, cheap paper for your first few tries but nice paper for as soon as you are happy you can do the model. Depending on how you learn best, still pictures with how to fold, as in the books, or videos with fold along instructions will work. If you go for one style, try to get a site or person who has done more than just one or two, as while you are learning, following the same kind of instructions is often helpful. On the other hand, if you do not understand the instructions, other instructions for the same item may well help you.
Some websites, (I have no connection with any, I learned my folding from age 4, well before internet was invented.)
Beginners as well as more advanced.
Not as easy but clear indication which models are not starter ones.
You can say that all sites that make you fold a crane as first item are over ambitious.
I am out of the books, as the last one I purchased was 20 years back or so, but I know that if you go to a good bookshop, they should stock some. Look and read, buy a kid book if you can understand what the pictures instruct. You can go on to adult books after you have learned the basics.
There are also many youtube channels and individual videos dedicated to origami. Again I would suggest to start with instructions aimed at children.
While the boxes or packages with nice paper seem quite expensive, you will find that one pack will last quite a few models.
One way to make bigger results of small and relatively simple origami is to put them together and make scenes, birthday cards or pictures. Or to go modular, where you make the same piece over and over and put them together.
If you dream of big and intricate figures you will need to keep improving on what you have learned, using bigger and more difficult models. But do start with baby steps, and keep improving step by step. If you try to go too difficult before you have the basics, you may give up well before you are good enough.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Should a dialog close before a mutating change is accepted?
I have a simple settings dialog
Some setting: [ ]
[Update] [Cancel]
When the user clicks on "Update", the app will send a request to the server to update the user's settings.
Should the dialog close before or after this request is acknowledged? I can think of three different behaviors here, and I'm not sure what's best:
The dialog stays open until the server responds with success (in which case the dialog closes) or failure (in which case the error is reported). During this time, perhaps the "Update" button turns into a spinner, or some other indication that something's happening.
The dialog immediately closes, and the settings displayed in the main app page are immediately updated client-side. When the server returns, if it returns with a failure, then some notification (popup? error message underneath the settings?) tells the user it failed.
The dialog immediately closes, but the settings on the main app page turn into a spinner, which resolves when the server returns.
A:
I feel that it depends. To be as unobtrusive as possible, if the settings that you are referring to, does not impact the immediate usage/experience for the user, we could just use option 3 - Immediately close the dialog + spinner on the settings
However, if the experience of the user depends on the settings that he has invoked, I would generally prefer to use option 1. If it is taking longer than expected eg after 10 sec, you could also inform the user that he will know the status of that transaction later, and fall-back to option 3.
Option 2 in my personal experience tends to confuse the user and lead to a poorer experience. eg He has assumed that the settings change was successful and is later informed that it was not, despite having seen that it was reflected at the client side.
|
{
"pile_set_name": "StackExchange"
}
|
Самопровозглашенный командующий войсками "Донецкой народной республики" Игорь Гиркин (Стрелков) дал заранее не анонсировавшуюся пресс-конференцию, в ходе которой сообщил о гибели "чернокожих наемников" от рук его подчиненных.
Участвовавший в чеченской кампании россиянин не подкрепил свои слова доказательствами.
Гиркин также отказался комментировать сообщения об уходе командира повстанцев Игоря Безлера, известного под кличкой "Бес", из донбасской Горловки, которой тот руководил как "комендант".
Отвечая на вопрос о гибели рейса MH17, Стрелков подчеркнул: "Под моим контролем не было "БУКов". Я не мог дать приказ сбить самолет".
В понедельник стало известно о поспешном отъезде одного из "лидеров ДНР" Александра Бородая в Москву. Об этом сообщили сами сепаратисты.
В то же время украинская армия перешла в наступление по нескольким направлениям, подступив к Торезу, Снежному, Первомайску и Горловке.
Согласно данным ООН на 28 июля, с середины апреля в ходе конфликта на востоке Украины погибли как минимум 1129 человек, еще 3442 человека получили ранения.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Read .txt file into 2D Array
There are a few of these topics out there, but this problem has a slight twist that makes it different.
I'm focused on only half of a larger problem. I'm sure many of you are aware of the magic square problem.
Prompt:
Assume a file with lines and numbers on each line like the square shown. Write a program that reads info into a two dimensional array of intS. The program should determine if the matrix is a magic square or not.
Working Solution:
public static int[][] create2DIntMatrixFromFile(String filename) throws Exception {
int[][] matrix = {{1}, {2}};
File inFile = new File(filename);
Scanner in = new Scanner(inFile);
int intLength = 0;
String[] length = in.nextLine().trim().split("\\s+");
for (int i = 0; i < length.length; i++) {
intLength++;
}
in.close();
matrix = new int[intLength][intLength];
in = new Scanner(inFile);
int lineCount = 0;
while (in.hasNextLine()) {
String[] currentLine = in.nextLine().trim().split("\\s+");
for (int i = 0; i < currentLine.length; i++) {
matrix[lineCount][i] = Integer.parseInt(currentLine[i]);
}
lineCount++;
}
return matrix;
}
public static boolean isMagicSquare(int[][] square) {
return false;
}
Here is my (old) code for reading info from a text file into a 2D array:
public static int[][] create2DIntMatrixFromFile(String filename) throws Exception {
int[][] matrix = {{1}, {2}};
File inFile = new File(filename);
Scanner in = new Scanner(inFile);
in.useDelimiter("[/n]");
String line = "";
int lineCount = 0;
while (in.hasNextLine()) {
line = in.nextLine().trim();
Scanner lineIn = new Scanner(line);
lineIn.useDelimiter("");
for (int i = 0; lineIn.hasNext(); i++) {
matrix[lineCount][i] = Integer.parseInt(lineIn.next());
lineIn.next();
}
lineCount++;
}
return matrix;
}
public static boolean isMagicSquare(int[][] square) {
return false;
}
And here is the text file I am reading from. It is in the shape of a 9x9 2D array, but the program must accommodate an array of ambiguous size.
37 48 59 70 81 2 13 24 35
36 38 49 60 71 73 3 14 25
26 28 39 50 61 72 74 4 15
16 27 29 40 51 62 64 75 5
6 17 19 30 41 52 63 65 76
77 7 18 20 31 42 53 55 66
67 78 8 10 21 32 43 54 56
57 68 79 9 11 22 33 44 46
47 58 69 80 1 12 23 34 45
There are two spaces proceeding each line on purpose.
Before I state the exact problem, this is a homework template so the method declaration and variable initialization was pre-determined.
I'm not positive that the method even correctly creates a 2D Array from the file because I can't run it yet. The issue is that for some reason "matrix" was initialized with 1 column and 2 rows. For what reason I'm not sure, but in order to fill an array with the numbers from the file I need to create a 2D array with dimensions equal to the number of values in a line.
I previously had written code to create a new 2D array
int[line.length()][line.length()]
but it created a 36x36 array because that's how many individual characters are in one line. I have a feeling it's as simple as looping through the first line and having a counter keep track of each sequence of numbers separated by a zero.
To me, that solution seems too inefficient and time consuming just to find the dimensions of the new array. What's the best way to accomplish this? Without using ArrayLists as I have to rewrite this program after using ArrayLists.
A:
I produced the following 2D array from the file you provided:
37 | 48 | 59 | 70 | 81 | 2 | 13 | 24 | 35
----+----+----+----+----+----+----+----+----
36 | 38 | 49 | 60 | 71 | 73 | 3 | 14 | 25
----+----+----+----+----+----+----+----+----
26 | 28 | 39 | 50 | 61 | 72 | 74 | 4 | 15
----+----+----+----+----+----+----+----+----
16 | 27 | 29 | 40 | 51 | 62 | 64 | 75 | 5
----+----+----+----+----+----+----+----+----
6 | 17 | 19 | 30 | 41 | 52 | 63 | 65 | 76
----+----+----+----+----+----+----+----+----
77 | 7 | 18 | 20 | 31 | 42 | 53 | 55 | 66
----+----+----+----+----+----+----+----+----
67 | 78 | 8 | 10 | 21 | 32 | 43 | 54 | 56
----+----+----+----+----+----+----+----+----
57 | 68 | 79 | 9 | 11 | 22 | 33 | 44 | 46
----+----+----+----+----+----+----+----+----
47 | 58 | 69 | 80 | 1 | 12 | 23 | 34 | 45
The array figures out the size of the square when it reads the first line of the file. This is very dynamic. Its works as long as the input file is a perfect square. I have no further error handling.
Here is a simple approach which should adhere to your guidelines.
import java.io.BufferedReader;
import java.io.InputStream;
import java.io.InputStreamReader;
public class ReadMagicSquare {
public static int[][] create2DIntMatrixFromFile(String filename) throws Exception {
int[][] matrix = null;
// If included in an Eclipse project.
InputStream stream = ClassLoader.getSystemResourceAsStream(filename);
BufferedReader buffer = new BufferedReader(new InputStreamReader(stream));
// If in the same directory - Probably in your case...
// Just comment out the 2 lines above this and uncomment the line
// that follows.
//BufferedReader buffer = new BufferedReader(new FileReader(filename));
String line;
int row = 0;
int size = 0;
while ((line = buffer.readLine()) != null) {
String[] vals = line.trim().split("\\s+");
// Lazy instantiation.
if (matrix == null) {
size = vals.length;
matrix = new int[size][size];
}
for (int col = 0; col < size; col++) {
matrix[row][col] = Integer.parseInt(vals[col]);
}
row++;
}
return matrix;
}
public static void printMatrix(int[][] matrix) {
String str = "";
int size = matrix.length;
if (matrix != null) {
for (int row = 0; row < size; row++) {
str += " ";
for (int col = 0; col < size; col++) {
str += String.format("%2d", matrix[row][col]);
if (col < size - 1) {
str += " | ";
}
}
if (row < size - 1) {
str += "\n";
for (int col = 0; col < size; col++) {
for (int i = 0; i < 4; i++) {
str += "-";
}
if (col < size - 1) {
str += "+";
}
}
str += "\n";
} else {
str += "\n";
}
}
}
System.out.println(str);
}
public static void main(String[] args) {
int[][] matrix = null;
try {
matrix = create2DIntMatrixFromFile("square.txt");
} catch (Exception e) {
e.printStackTrace();
}
printMatrix(matrix);
}
}
This approach is more refined and optimized.
import java.io.BufferedReader;
import java.io.IOException;
import java.io.InputStream;
import java.io.InputStreamReader;
public class ReadMagicSquare {
private int[][] matrix;
private int size = -1;
private int log10 = 0;
private String numberFormat;
public ReadMagicSquare(String filename) {
try {
readFile(filename);
} catch (IOException e) {
e.printStackTrace();
}
}
public void readFile(String filename) throws IOException {
// If included in an Eclipse project.
InputStream stream = ClassLoader.getSystemResourceAsStream(filename);
BufferedReader buffer = new BufferedReader(new InputStreamReader(stream));
// If in the same directory - Probably in your case...
// Just comment out the 2 lines above this and uncomment the line
// that follows.
//BufferedReader buffer = new BufferedReader(new FileReader(filename));
String line;
int row = 0;
while ((line = buffer.readLine()) != null) {
String[] vals = line.trim().split("\\s+");
// Lazy instantiation.
if (matrix == null) {
size = vals.length;
matrix = new int[size][size];
log10 = (int) Math.floor(Math.log10(size * size)) + 1;
numberFormat = String.format("%%%dd", log10);
}
for (int col = 0; col < size; col++) {
matrix[row][col] = Integer.parseInt(vals[col]);
}
row++;
}
}
@Override
public String toString() {
StringBuffer buff = new StringBuffer();
if (matrix != null) {
for (int row = 0; row < size; row++) {
buff.append(" ");
for (int col = 0; col < size; col++) {
buff.append(String.format(numberFormat, matrix[row][col]));
if (col < size - 1) {
buff.append(" | ");
}
}
if (row < size - 1) {
buff.append("\n");
for (int col = 0; col < size; col++) {
for (int i = 0; i <= log10 + 1; i++) {
buff.append("-");
}
if (col < size - 1) {
buff.append("+");
}
}
buff.append("\n");
} else {
buff.append("\n");
}
}
}
return buff.toString();
}
public static void main(String[] args) {
ReadMagicSquare square = new ReadMagicSquare("square.txt");
System.out.println(square.toString());
}
}
|
{
"pile_set_name": "StackExchange"
}
|
Q:
AWS Beanstalk and Apache VirtualHost SSL custom DocumentRoot
I already configured my .ebextensions directory to install SLL files and configure ssl.conf apache file. Everything is working perfect, instead the DocumentRoot of my ssl.conf that is not overwriting my Elastic Beanstalk default DocumentRoot.
Problem: When I access https://dashboard.mydomain.com its also pointing to /home instead /dashboard folder.
Elastic BeanStalk Default DocumentRoot:
Directory Files:
home/ -> Accessed by http://www.mydomain.com/
...
dashboard/ -> Accessed by https://dashboard.mydomain.com (DocumentRoot isn't working, its also pointing to /home)
...
framework/ (Secure)
ssl.conf:
LoadModule ssl_module modules/mod_ssl.so
Listen 443
<VirtualHost *:443>
ServerName dashboard.mydomain.com
DocumentRoot /var/www/html/dashboard -- NOT WORKING
<Proxy *>
Order deny,allow
Allow from all
</Proxy>
SSLEngine on
SSLCertificateChainFile "/etc/httpd/ssl/gd_bundle.crt"
SSLCertificateFile "/etc/httpd/ssl/cert.crt"
SSLCertificateKeyFile "/etc/httpd/ssl/key.key"
ProxyPass / http://localhost:80/ retry=0
ProxyPassReverse / http://localhost:80/
ProxyPreserveHost on
LogFormat "%h (%{X-Forwarded-For}i) %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\""
ErrorLog /var/log/httpd/elasticbeanstalk-error_log
TransferLog /var/log/httpd/elasticbeanstalk-access_log
</VirtualHost>
A:
UPDATE 2014 feb 08
I did some tests and I found out that the ProxyPass directive does not simply redirect every request from port 443 to localhost:80 (as one could easily thought), but basically repeats the request to Apache from scratch, through the port 80 (at least, that's what I understood).
So, if you want to set any environment variable, you need to do it in the matching VirtualHost, adding to your .conf something like this:
Listen 80
<VirtualHost *:80>
DocumentRoot /var/www/html/dashboard
</VirtualHost>
This will be executed with every request (80 or 443).
END UPDATE
I have no idea why, but here two suggestions: the .conf in /etc/httpd/conf.d are processed in alphabetical order.
This doesn't explain why your configuration don't take over, because the environmental variables are set in aws_env.conf
BUT... take a look to aws_env.conf: you'll find some hints (it looks like the name of documentRoot is somewhat changed: for example, in my version is PHP_DOCUMENT_ROOT).
Good luck, let us know if you find out.
|
{
"pile_set_name": "StackExchange"
}
|
Mali Konec
Mali Konec () is a small settlement in the hills north of Polica in the Municipality of Grosuplje in central Slovenia. The area is part of the historical region of Lower Carniola. The municipality is now included in the Central Slovenia Statistical Region.
Evidence of an Iron Age hillfort has been found on Križatec Hill north of the settlement. The fortification had a rectangular layout and its embankments are still partially preserved.
References
External links
Mali Konec at Geopedia
Category:Populated places in the Municipality of Grosuplje
|
{
"pile_set_name": "Wikipedia (en)"
}
|
/*---------------------------------------------------------------------------*\
========= |
\\ / F ield | OpenFOAM: The Open Source CFD Toolbox
\\ / O peration |
\\ / A nd | Copyright (C) 2011-2014 OpenFOAM Foundation
\\/ M anipulation |
-------------------------------------------------------------------------------
License
This file is part of OpenFOAM.
OpenFOAM is free software: you can redistribute it and/or modify it
under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
OpenFOAM is distributed in the hope that it will be useful, but WITHOUT
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
for more details.
You should have received a copy of the GNU General Public License
along with OpenFOAM. If not, see <http://www.gnu.org/licenses/>.
Class
Foam::displacementSBRStressFvMotionSolver
Description
Mesh motion solver for an fvMesh. Based on solving the cell-centre
solid-body rotation stress equations for the motion displacement.
SourceFiles
displacementSBRStressFvMotionSolver.C
\*---------------------------------------------------------------------------*/
#ifndef displacementSBRStressFvMotionSolver_H
#define displacementSBRStressFvMotionSolver_H
#include "displacementMotionSolver.H"
#include "fvMotionSolverCore.H"
// * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * //
namespace Foam
{
// Forward class declarations
class motionDiffusivity;
/*---------------------------------------------------------------------------*\
Class displacementSBRStressFvMotionSolver Declaration
\*---------------------------------------------------------------------------*/
class displacementSBRStressFvMotionSolver
:
public displacementMotionSolver,
public fvMotionSolverCore
{
// Private data
//- Cell-centre motion field
mutable volVectorField cellDisplacement_;
//- Diffusivity used to control the motion
autoPtr<motionDiffusivity> diffusivityPtr_;
// Private Member Functions
//- Disallow default bitwise copy construct
displacementSBRStressFvMotionSolver
(
const displacementSBRStressFvMotionSolver&
);
//- Disallow default bitwise assignment
void operator=(const displacementSBRStressFvMotionSolver&);
public:
//- Runtime type information
TypeName("displacementSBRStress");
// Constructors
//- Construct from polyMesh and IOdictionary
displacementSBRStressFvMotionSolver
(
const polyMesh&,
const IOdictionary&
);
//- Destructor
~displacementSBRStressFvMotionSolver();
// Member Functions
//- Return reference to the cell motion displacement field
volVectorField& cellDisplacement()
{
return cellDisplacement_;
}
//- Return const reference to the cell motion displacement field
const volVectorField& cellDisplacement() const
{
return cellDisplacement_;
}
//- Return diffusivity
motionDiffusivity& diffusivity()
{
return diffusivityPtr_();
}
//- Return point location obtained from the current motion field
virtual tmp<pointField> curPoints() const;
//- Solve for motion
virtual void solve();
//- Update topology
virtual void updateMesh(const mapPolyMesh&);
};
// * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * //
} // End namespace Foam
// * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * //
#endif
// ************************************************************************* //
|
{
"pile_set_name": "Github"
}
|
[Capacity of Caragana microphylla shrub on counteracting snow movement and its influence on snow morphology in the Xilinhot Steppe, China.]
The aim of this study was to examine the impacts of characteristics of the shrub (shrub height, shrub width on the windward side, shrub length on the downwind side) on the snow morphology (snow height, snow width, and snow tail length) in the typical steppe of Xilinhot, China. The relationship between shrub height and parameters of snow morphology showed significant quadratic polynomial regression. The relationship between shrub width on the windward side, length on the downwind side and parameters of snow morphology showed significant power function (exponent was less than 1). The morphology and development characteristics of shrub snow were affected by the shrub characteristic parameters. Shrub height had the greatest influence on snow height. Shrub width at the windward side had the greatest influence on snow width and snow tail length. The snow morphology developed faster when the shrub was small, and then tended to be stable. The two-dimensional snow retention range model of shrub directly reflected the disturbance range of shrub to wind and the potential range of snow, indirectly reflected the capacity of shrub to retard snow movement. The three-dimensional snow blocking volume model of shrub snow directly reflected the snow resistance capacity of shrub under certain snow sources and wind conditions. Both models established here would provide a theoretical basis for estimating snow resources and preventing snow disaster in the wind blown snow area of typical steppe.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
---
abstract: 'We consider the problem of predicting the future trajectory of scene agents from egocentric views obtained from a moving platform. This problem is important in a variety of domains, particularly for autonomous systems making reactive or strategic decisions in navigation. In an attempt to address this problem, we introduce TITAN (Trajectory Inference using Targeted Action priors Network), a new model that incorporates prior positions, actions, and context to forecast future trajectory of agents and future ego-motion. In the absence of an appropriate dataset for this task, we created the TITAN dataset that consists of 700 labeled video-clips (with odometry) captured from a moving vehicle on highly interactive urban traffic scenes in Tokyo. Our dataset includes 50 labels including vehicle states and actions, pedestrian age groups, and targeted pedestrian action attributes that are organized hierarchically corresponding to atomic, simple/complex-contextual, transportive, and communicative actions. To evaluate our model, we conducted extensive experiments on the TITAN dataset, revealing significant performance improvement against baselines and state-of-the-art algorithms. We also report promising results from our Agent Importance Mechanism (AIM), a module which provides insight into assessment of perceived risk by calculating the relative influence of each agent on the future ego-trajectory. The dataset is available at <https://usa.honda-ri.com/titan>'
author:
- |
Srikanth Malla Behzad Dariush Chiho Choi\
Honda Research Institute USA\
[{smalla, bdariush, cchoi}@honda-ri.com ]{}
bibliography:
- 'egbib.bib'
title: 'TITAN: Future Forecast using Action Priors'
---
Introduction
============
The ability to forecast future trajectory of agents (individuals, vehicles, cyclists, etc.) is paramount in developing navigation strategies in a range of applications including motion planning and decision making for autonomous and cooperative (shared autonomy) systems.
![Our goal is to predict the future trajectory of agents from egocentric views obtained from a moving platform. We hypothesize that prior actions (and implicit intentions) play an important role in future trajectory forecast. To this end, we develop a model that incorporates prior positions, actions, and context to forecast future trajectory of agents and future ego-motion. This figure is a conceptual illustration that typifies navigation of ego-vehicle in an urban scene, and how prior actions/intentions and context play an important role in future trajectory forecast. We seek to also identify agents (depicted by the red bounding box) that influence future ego-motion through an Agent Importance Mechanism (AIM) . []{data-label="fig:block_diagram"}](figures1/frontpage.pdf){width="45.00000%"}
We know from observation that the human visual system possesses an uncanny ability to forecast behavior using various cues such as experience, context, relations, and social norms. For example, when immersed in a crowded driving scene, we are able to reasonably estimate the intent, future actions, and future location of the traffic participants in the next few seconds. This is undoubtedly attributed to years of prior experience and observations of interactions among humans and other participants in the scene. To reach such human level ability to forecast behavior is part of the quest for visual intelligence and the holy grail of autonomous navigation, requiring new algorithms, models, and datasets.
In the domain of behavior prediction, this paper considers the problem of future trajectory forecast from egocentric views obtained from a mobile platform such as a vehicle in a road scene. This problem is important for autonomous agents to assess risks or to plan ahead when making reactive or strategic decisions in navigation. Several recently reported models that predict trajectories incorporate social norms, semantics, scene context, etc. The majority of these algorithm are developed from a stationary camera view in surveillance applications, or overhead views from a drone.
The specific objective of this paper is to develop a model that incorporates prior positions, actions, and context to simultaneously forecast future trajectory of agents and future ego-motion. In a related problem, the ability to predict future actions based on current observations has been previously studied in [@lan2014hierarchical; @soomro2016predicting; @singh2017online; @singh2018predicting; @sun2019relational]. However, to the best of our knowledge, action priors have not been used in forecasting future trajectory, partly due to a lack of an appropriate dataset. A solution to this problem can help address the challenging and intricate scenarios that capture the interplay of observable actions and their role in future trajectory forecast. For example, when the egocentric view of a mobile agent in a road scene captures a delivery truck worker closing the tailgate of the truck, it is highly probable that the worker’s future behavior will be to walk toward the driver side door. Our aim is to develop a model that uses such action priors to forecast trajectory.
The algorithmic contributions of this paper are as follows. We introduce TITAN (Trajectory Inference using Targeted Action priors Network), a new model that incorporates prior positions, actions, and context to simultaneously forecast future trajectory of agents and future ego-motion. Our framework introduces a new interaction module to handle dynamic number of objects in the scene. While modeling pair-wise interactive behavior from all agents, the proposed interaction module incorporates actions of individuals in addition to their locations, which helps the system to understand the contextual meaning of motion behavior. In addition, we propose to use multi-task loss with aleatoric homoscedastic uncertainty [@kendall2018multi] to improve the performance of multi-label action recognition. For ego-future, Agent Importance Mechanism (AIM) is presented to identify objects that are more relevant for ego-motion prediction. Apart from algorithmic contributions, we introduce a novel dataset, referred to as TITAN dataset, that consists of 700 video clips captured from a moving vehicle on highly interactive urban traffic scenes in Tokyo. The pedestrians in each clip were labeled with various action attributes that are organized hierarchically corresponding to atomic, simple/complex contextual, transportive, and communicative actions. The action attributes were selected based on commonly observed actions in driving scenes, or those which are important for inferring intent (*e.g.*, waiting to cross). We also labeled other participant categories, including vehicle category (4 wheel, 2 wheel), age-groups, and vehicle state. The dataset contains synchronized ego-motion information from an IMU sensor. To our knowledge, this is the only comprehensive and large scale dataset suitable for studying action priors for forecasting the future trajectory of agents from ego-centric views obtained from a moving platform. Furthermore, we believe our dataset will contribute to advancing research for action recognition in driving scenes.
{width="\textwidth"}
Related Work
============
Future Trajectory Forecast
--------------------------
**Human Trajectory Forecast** Encoding interactions between humans based on their motion history has been widely studied in the literature. Focusing on input-output time sequential processing of data, recurrent neural network (RNN)-based architectures have been applied to the future forecast problem in the last few years [@social_lstm; @lee2017desire; @social_gan; @xu2018encoding; @zhang2019sr]. More recently, RNNs are used to formulate a connection between agents with their interactions using graph structures [@social_attention; @ma2019trafficpredict]. However, these methods suffer from understanding of environmental context with no or minimal considerations of scene information. To incorporate models of human interaction with the environment, [@xue2018ss] takes local to global scale image features into account. More recently, [@choi2019looking] visually extracts relational behavior of humans interacting with other agents as well as environments. **Vehicle Trajectory Forecast** Approaches for vehicle motion prediction have developed following the success of interaction modeling using RNNs. Similar to human trajectory forecast, [@deo2018multi; @park2018sequence; @ma2019trafficpredict; @li2019interaction] only consider the past motion history. These methods perform poorly in complex road environments without the guidance of structured layouts. Although the subsequent approaches [@rhinehart2018r2p2; @li2019conditional; @choi2019drogon] partially overcome these issues by using 3D LiDAR information as inputs to predict future trajectories, their applicability to current production vehicles is limited due to the higher cost. Recent methods [@bhattacharyya2018long; @hevi_dataset; @malla2019nemo] generate trajectories of agents from an egocentric view. However, they do not consider interactions between road agents in the scene and the potential influence to the ego-future. In this work, we explicitly model pair-wise interactive behavior from all agents to identify objects that are more relevant for the target agent.
Action Recognition
------------------
With the success of 2D convolutions in image classification, frame-level action recognition has been presented in [@karpathy2014large]. Subsequently, [@simonyan2014two] separates their framework into two streams: one to encode spatial features from RGB images and the other to encode temporal features from corresponding optical flow. Their work motivated studies that model temporal motion features together with spatial image features from videos. A straightforward extension has been shown in [@tran2015learning; @varol2017long], replacing 2D convolutions by 3D convolutions. To further improve the performance of these models, several research efforts have been provided such as I3D [@i3d] that inflates a 2D convolutional network into 3D to benefit from the use of pre-trained models and 3D ResNet [@r3d] that adds residual connections to build a very deep 3D network. Apart from them, other approaches capture pair-wise relations between actor and contextual features [@acrn_cvpr] or those between pixels in space and in time [@non_local_neuralnets]. More recently, Timeception [@hussein2019timeception] models long range temporal dependencies, particularly focusing on complex actions.
Datasets
--------
**Future Trajectory** \[sec:dataset\_futuretraj\] Several influential RGB-based datasets for pedestrian trajectory prediction have been reported in the literature. These datasets are typically created from a stationary surveillance camera [@ucy_dataset; @eth_dataset; @actEV_dataset], or from aerial views obtained from a static drone-mounted camera [@stanford_drone_dataset]. In driving scenes, the 3D point cloud-based datasets [@kitti_dataset; @h3d_dataset; @lyft_dataset; @nuscenes_dataset; @waymo_open_dataset; @argoverse_dataset] were originally introduced for detection, tracking, etc., but recently used for vehicle trajectory prediction as well. Also, [@hevi_dataset; @chandra2019traphic] provide RGB images captured from an egocentric view of a moving vehicle and applied to future trajectory forecast problem. The JAAD [@jaad_dataset], CMU-UAH [@minguez2018pedestrian], and PIE [@pie_dataset] datasets are most similar to our TITAN dataset in the sense that they are designed to study the intentions and actions of objects from on-board vehicles. However, their labels are limited to simple actions such as walking, standing, looking, and crossing. These datasets, therefore, do not provide an adequate number of actions to use as priors in order to discover contextual meaning of agents’ motion behavior. To address these limitations, our TITAN dataset provides 50 labels including vehicle states and actions, pedestrian age groups, and targeted pedestrian action attributes that are hierarchically organized as illustrated in the supplementary material.
**Action Recognition** \[sec:dataset\_action\] A variety of datasets have been introduced for action recognition with a single action label [@hmdb_dataset; @ucf_dataset; @karpathy2014large; @marszalek2009actions; @kay2017kinetics] and multiple action labels [@charades; @yeung2018every; @caba2015activitynet] in videos. Recently released datasets such as AVA [@ava_dataset], READ [@fontana2018action], and EPIC-KITCHENS [@Damen2018EPICKITCHENS] contain actions with corresponding localization around a person or object. Our TITAN dataset is similar to AVA in the sense that it provides spatio-temporal localization for each agent with multiple action labels. However, the labels of TITAN are organized hierarchically from primitive atomic actions to complicated contextual activities that are typically observed from on-board vehicles in driving scenes.
{width="\textwidth"}
TITAN Dataset
=============
In the absence of an appropriate dataset suitable for our task, we introduce the TITAN dataset for training and evaluation of our models as well as to accelerate research on trajectory forecast. Our dataset is sourced from 10 hours of video recorded at 60 FPS in central Tokyo. All videos are captured using a GoPro Hero 7 Camera with embedded IMU sensor which records synchronized odometry data at 100 HZ for ego-motion estimation. To create the final annotated dataset, we extracted 700 short video clips from the original (raw) recordings. Each clip is between 10-20 seconds in duration, image size width:1920px, height:1200px and annotated at 10 HZ sampling frequency. The characteristics of the selected video clips include scenes that exhibit a variety of participant actions and interactions.
The taxonomy and distribution of all labels in the dataset are depicted in Figure \[fig:titan\_dataset\]. The total number of frames annotated is approximately 75,262 with 395,770 persons, 146,840 4-wheeled vehicles and 102,774 2-wheeled vehicles. This includes 8,592 unique persons and 5,504 unique vehicles. For our experiments, we use 400 clips for training, 200 clips for validation and 100 clips for testing. As mentioned in Section \[sec:dataset\_futuretraj\], there are many publicly available datasets related to mobility and driving, many of which include ego-centric views. However, since those datasets do not provide action labels, a meaningful quantitative comparison of the TITAN dataset with respect to existing mobility datasets is not possible. Furthermore, a quantitative comparison with respect to action localization datasets such as AVA is not warranted since AVA does not include ego-centric views captured from a mobile platform.
In the TITAN dataset, every participant (individuals, vehicles, cyclists, etc.) in each frame is localized using a bounding box. We annotated 3 labels (person, 4-wheeled vehicle, 2-wheeled vehicle), 3 age groups for person (child, adult, senior), 3 motion-status labels for both 2 and 4-wheeled vehicles, and door/trunk status labels for 4-wheeled vehicles. For action labels, we created 5 mutually exclusive person action sets organized hierarchically (Figure \[fig:titan\_dataset\]). In the first action set in the hierarchy, the annotator is instructed to assign exactly one class label among 9 atomic whole body actions/postures that describe primitive action poses such as sitting, standing, standing, bending, etc. The second action set includes 13 actions that involve single atomic actions with simple scene context such as jaywalking, waiting to cross, etc. The third action set includes 7 complex contextual actions that involve a sequence of atomic actions with higher contextual understanding, such as getting in/out of a 4-wheel vehicle, loading/unloading, etc. The fourth action set includes 4 transportive actions that describe the act of manually transporting an object by carrying, pulling or pushing. Finally, the fifth action set includes 4 communicative actions observed in traffic scenes such as talking on the phone, looking at phone, or talking in groups. In each action sets 2-5, the annotators were instructed to assign ‘None’ if there is no label. This hierarchical strategy was designed to produce unique (unambiguous) action labels while reducing the annotators’ cognitive work-load and thereby improving annotation quality. The tracking ID’s of all localized objects are associated within each video clip. Example scenarios are displayed in Figure \[fig:titan\_scenes\].
{width="\textwidth"}
Methodology
===========
Figure \[fig:block\_diagram\] shows the block diagram of the proposed TITAN framework.A sequence of image patches $\mathcal{I}^i_{t=1:T_{obs}}$ is obtained from the bounding box[^1] $x^i=\{c_u,c_v,l_u,l_v\}$ of agent $i$ at each past time step from 1 to $T_{obs}$, where $(c_u,c_v)$ and $(l_u,l_v)$ represent the center and the dimension of the bounding box, respectively. The proposed TITAN framework requires three inputs as follows: $\mathcal{I}^i_{t=1:T_{obs}}$ for the action detector, $x^i_t$ for both the interaction encoder and past object location encoder, and $e_t=\{\alpha_t,{\omega}_t\}$ for the ego-motion encoder where $\alpha_t$ and $\omega_t $ correspond to the acceleration and yaw rate of the ego-vehicle at time $t$, respectively. During inference, the multiple modes of future bounding box locations are sampled from a bi-variate Gaussian generated by the noise parameters, and the future ego-motions $\hat{e_t}$ are accordingly predicted, considering the multi-modal nature of the future prediction problem.
Henceforth, the notation of the feature embedding function using multi-layer perceptron (MLP) is as follows: $\Phi$ is without any activation, and $\Phi_r$, $\Phi_t$, and $\Phi_s$ are associated with ReLU, tanh, and a sigmoid function, respectively.
Action Recognition {#sec:action_rec}
------------------
We use the existing state-of-the-art method as backbone for the action detector. We finetune single-stream I3D [@i3d] and 3D ResNet [@r3d] architecture pre-trained on Kinetics-600 [@carreira2018short]. The original head of the architecture is replaced by a set of new heads (8 action sets of TITAN except age group and type) for multi-label action outputs. The action detector takes $\mathcal{I}^i_{t=1:T_{obs}}$ as input, which is cropped around the agent $i$. Then, each head outputs an action label including a ‘None’ class if no action is shown. From our experiments, we observed that certain action sets converge faster than others. This is due in part because some tasks are relatively easier to learn, given the shared representations. Instead of tuning the weight of each task by hand, we adopt the multi-task loss in [@kendall2018multi] to further boost performance of our action detector. Note that each action set of the TITAN dataset is mutually exclusive, thus we consider the outputs are independent to each other as follows: $$p(y_m,..,y_n|f(\mathcal{I}))=\prod_{i=m}^{n} p(y_i|f(\mathcal{I})),
\label{eq:multi_task_out}$$ where $y_i$ is the output label of $i^{th}$ action set and $f$ is the action detection model. Then, multi-task loss is defined as: $$\mathcal{L}_a=\sum_{i=m}^{n}\frac{ce(\widehat{cls}_i, {cls}_i)}{\sigma_i^2}+log\ \sigma_i,
\label{eq:multi_task_loss}$$ where $ce$ is the cross entropy loss between predicted actions $\widehat{cls}_i$ and ground truth ${cls}_i$ for each label $i=m:n$. Also, $\sigma_i$ is the task dependent uncertainty (aleatoric homoscedastic). In practice, the supervision is done separately for vehicles and pedestrians as they have different action sets. The efficacy of the multi-task loss is detailed in the supplementary material, and the performance of the action detector with different backbone is compared in Table \[tbl:action\_recog\].
Future Object Localization {#sec:fol_methodology}
--------------------------
Unlike existing methods, we model the interactions using the past locations of agents conditioned on their actions, which enables the system to explicitly understand the contextual meaning of motion behavior. At each past time step $t$, the given bounding box $x^i_t=\{c_u,c_v,l_u,l_v\}_t$ is concatenated with the multi-label action vector $a^i_t$. We model the pair-wise interactions between the target agent $i$ and all other agents $j$ through MLP, $v^{ij}_t=\Phi_r(x^{i}_t\boxtimes a^{i}_t\boxtimes x^{j}_t \boxtimes a^{j}_t)$ where $\boxtimes$ is a concatenation operator. The resulting interactions $v_t^{ij}$ are evaluated through the dynamic RNN with GRUs to leave more important information with respect to the target agent, $h^{i(j+1)}_t = GRU(v^{ij}_t, h_t^{ij};W_{\textnormal{INT}})$, where $W_{\textnormal{INT}}$ are the weight parameters. Note that we pass the messages of instant interaction with each agent at time $t$, which enables us to find their potential influence at that moment. Then, we aggregate the hidden states to generate interaction features $\psi_{t}^i=\frac{1}{n}\sum_i h^{ij}_t$ for the target agent $i$, computed from all other agents in the scene at time $t$ as in Figure \[fig:interaction\_encoder\].
![Interaction encoding for agent $i$ against others at time $t$.[]{data-label="fig:interaction_encoder"}](figures1/interaction_encoder.png){width="47.00000%"}
The past ego motion encoder takes $e_t=(\alpha_t,\omega_t$) as input and embeds the motion history of ego-vehicle using the GRU. We use each hidden state output $h_t^e$ to compute future locations of other agents. The past object location encoder uses the GRU to embed the history of past motion into a feature space. The input to this module is a bounding box $x^i$ of the target agent $i$ at each past time step, and we use the embedding $\Phi(x^i_t)$ for the GRU. The output hidden state $h_t^p$ of the encoder is updated by $\hat{h_{t}^p}=\Phi(H_{t}^{xi}\boxtimes h_t^p)$, where $H_{t}^{xi}=\Phi_r(a^i_{t}) \boxtimes \psi_{t}^i \boxtimes \Phi_r(h_t^e)$ is the concatenated information. Then, $\hat{h_{t}^p}$ is used as a hidden state input to the GRU by $h_{t+1}^p=GRU(\hat{h_t^p},\Phi(x_t^i);W_{\textnormal{POL}})$, where $W_{\textnormal{POL}}$ are the weight parameters. We use its final hidden state as an initial hidden state input of the future object location decoder.
The future bounding boxes of the target agent $i$ are decoded using the GRU-based future object location decoder from time step $T_{obs}+1$ to $T_{pred}$. At each time step, we output a 10-dimensional vector where the first 5 values are the center $\mu_c=(c_u, c_v)$, variance $\sigma_c =(\sigma_{cu}, \sigma_{cv})$, and its correlation $\rho_c$ and the rest 5 values are the dimension $\mu_l=(l_u, l_v)$, variance $\sigma_l=(\sigma_{lu}, \sigma_{lv})$, and its correlation $\rho_l$. We use two bi-variate Gaussians for bounding box centers and dimensions, so that they can be independently sampled. We use the negative log-likelihood loss function as: $$\begin{split}
\mathcal{L}_O = -\frac{1}{T}\sum_{t=T_{obs}+1}^{T_{pred}} &log\ p(c| \mu_{c}^t,\sigma_{c}^t, \rho_{c}) p(l| \mu_{l}^t,\sigma_{l}^t,\rho_{l}).
\end{split}$$
Future Ego-motion prediction
----------------------------
We first embed the predicted future bounding box of all agents $\hat{X}=\{\hat{x}^1,...,\hat{x}^N\}$ through MLP at each future time step $T_{obs}+1$ to $T_{pred}$. We further condition it on the previously computed action labels in a feature space through $H_t^{ei} = \Phi(r^i_{T_{obs}}\boxtimes \Phi_r(\hat{x}_t^i))$, where $r^i_{T_{obs}}=\Phi_r(a_{T_{obs}}^i)$. By using the action labels as a prior constraint, we explicitly lead the model to understand about the contextual meaning of locations. The resulting features of each agent $i$ are weighted using the AIM module $\hat{H}_t^{ei} = w_t^i*{H}_t^{ei}$, where the weights $w_t^i = \Phi_t(H_t^{ei})$, similar to self-attention [@selfattention]. Then, we sum all features $H^e_t=\sum_i \hat{H}_t^{ei}$ for each future time step. This procedure is detailed in Figure \[fig:attention\_module\]. Note that our AIM module is simultaneously learned with the future ego-motion prediction, which results in weighting other agents more or less based on their influence/importance to the ego-vehicle. It thus provides insight into assessment of perceived risk while predicting the future motion. We qualitatively evaluate it in Sec. \[experiments\].
![ Agent Importance Mechanism (AIM) module.[]{data-label="fig:attention_module"}](figures1/attention_module.png){width="47.00000%"}
The last hidden state $h_{T}^e$ of the past ego motion encoder is concatenated with $H^e_t$ through $\hat{h}_{T}^e=\Phi(H^{e}_t\boxtimes h_{T}^e)$ and fed into the future ego motion decoder. The intermediate hidden state $h_t^f$ is accordingly updated by $H^e_t$ at each future time step for recurrent update of the GRU. We output the ego-future using each hidden state $h_t^f$ through $\hat{e}_{t}^i=\Phi(h_t^f)$ at each future time $T_{obs}+1$ to $T_{pred}$. For training, we use task dependent uncertainty with L2 loss for regressing both acceleration and angular velocity as shown below: $$\mathcal{L}_E = \frac{{\left\lVert\alpha_t-\hat{\alpha}_t\right\rVert}^2}{\sigma_1^2}+\frac{{\left\lVert\omega_t-\hat{\omega}_t\right\rVert}^2}{\sigma_2^2}+log \sigma_1 \sigma_2.$$
Note that the predicted future ego-motion is deterministic in its process. However, its multi-modality comes from sampling of the predicted future bounding boxes of other agents. In this way, we capture their influence with respect to the ego-vehicle, and AIM outputs the importance weights consistent with the agents’ action and future motion.
{width="98.00000%"}
\[fig:ours\]
{width="\textwidth"}
Experiments
===========
In all experiments performed in this work, we predict up to 2 seconds into the future while observing 1 second of past observations as proposed in [@malla2019nemo]. We use average distance error (ADE), final distance error (FDE), and final intersection over union (FIOU) metrics for evaluation of future object localization. We include FIOU in our evaluation since ADE/FDE only capture the localization error of the final bounding box without considering its dimensions. For action recognition, we use per frame mean average precision (mAP). Finally, for ego-motion prediction, we use root mean square error (RMSE) as an evaluation metric.
Action Recognition {#action-recognition-1}
------------------
We evaluate two state-of-the-art 3D convolution-based architectures, I3D with InceptionV1 and 3D ResNet with ResNet50 as backbone. Both models are pre-trained on Kinetics-600 and finetuned using TITAN with the multi-task loss in Eqn. \[eq:multi\_task\_loss\]. As detailed in Sec. \[sec:action\_rec\], we modify the original structure using new heads that corresponds to the 8 action sets of the TITAN dataset. Their per frame mAP results are compared in Table \[tbl:action\_recog\] for each action set. We refer to the supplementary material for the detailed comparison on individual action categories. Note that we use the I3D-based action detector for the rest of our experiments.
Method I3D [@i3d]
--------- --------------- ------------- ----------
Backbone InceptionV1 ResNet50
atomic 0.9219 0.7552
simple 0.5318 0.3173
person complex 0.9881 0.9880
communicative 0.8649 0.8648
transportive 0.9080 0.9081
overall 0.8429 0.7667
motion 0.9918 0.7132
vehicle trunk 1.00 1.00
doors 1.00 1.00
overall 0.9921 0.9044
0.8946 0.8128
: Action recognition results (mAP) on TITAN.
\[tbl:action\_recog\]
Future Object Localization {#future-object-localization}
--------------------------
The results of future object localization performance is shown in Table \[tbl:fol\]. The constant velocity (Const-Vel [@constvel]) baseline is computed using the last two observations for linearly interpolating future positions. Since the bounding box dimensions error is not captured by ADE or FDE, we evaluate on FIOU using two baselines: 1) without scaling the box dimensions, and 2) with scaling linearly the box dimensions. Titan\_vanilla is an encoder and decoder RNN without any priors or interactions. It shows better performance than linear models. Both Social-GAN [@social_gan] and Social-LSTM [@social_lstm] improve the performance in ADE and FDE compared to the simple recurrent model (Titan\_vanilla) or linear approaches. Note that we do not evaluate FIOU for Social-GAN and Social-LSTM since their original method is not designed to predict dimensions. Titan\_AP adds action priors to the past positions and performs better than Titan\_vanilla, which shows that the model better understands contextual meaning of the past motion. However, its performance is worse than Titan\_EP that includes ego-motion as priors. This is because Titan\_AP does not consider the motion behavior of other agents in egocentric view. Titan\_IP includes interaction priors as shown in Figure \[fig:interaction\_encoder\] without concatenating actions. Interestingly, its performance is better than Titan\_AP (action priors) and Titan\_EP (ego priors) as well as Titan\_EP+AP (both ego and action priors). It validates the efficacy of our interaction encoder that aims to pass the interactions over all agents. This is also demonstrated by comparing Titan\_IP with two state-of-the-art methods. With ego priors as default input, interaction priors (Titin\_EP+IP) finally perform better than Titan\_IP. Interactions with action information (Titan\_EP+IP+AP) significantly outperforms all other baselines, suggesting that interactions are important and can be more meaningful with the information of actions[^2].
Method ADE $\downarrow$ FDE $\downarrow$ FIOU $\uparrow$
------------------------------------- ------------------ ------------------ -----------------
Const-Vel (w/o scaling) [@constvel] 44.39 102.47 0.1567
Const-Vel (w/ scaling) [@constvel] 44.39 102.47 0.1692
Social-LSTM [@social_lstm] 37.01 66.78 -
Social-GAN [@social_gan] 35.41 69.41 -
Titan\_vanilla 38.56 72.42 0.3233
Titan\_AP 33.54 55.80 0.3670
Titan\_EP 29.42 41.21 0.4010
Titan\_IP 22.53 32.80 0.5589
Titan\_EP+AP 26.03 38.78 0.5360
Titan\_EP+IP 17.79 27.69 0.5650
Titan\_EP+IP+AP (ours) **11.32** **19.53** **0.6559**
: Quantitative evaluation for future object localization. ADE are FDE in pixels on the original size 1920x1200.
\[tbl:fol\]
The qualitative results are shown in Figure \[fig:ours\]. The proposed method predicts natural motion for the target with respect to their detected actions (listed below each example). In Figure \[fig:comp\], we compare ours with the baseline models. The performance improvement against Titan\_EP+IP further validates our use of action priors for future prediction. Additional results can be found in the supplementary material.
Method acc RMSE $\downarrow$ yaw rate RMSE $\downarrow$
----------------------- ----------------------- ----------------------------
Const-Vel [@constvel] 1.745 0.1249
Const-Acc 1.569 0.1549
Titan\_vanilla 1.201 0.1416
Titan\_FP 1.236 0.1438
Titan\_FP+AP 1.182 0.1061
Titan\_AIM\_FP 1.134 0.0921
Titan\_AIM (ours) **1.081** **0.0824**
: Comparison of Future ego motion prediction. acceleration error in $m/s^2$ and yaw rate error in $rad/s$.
\[tbl:fe\]
Future Ego-Motion Prediction
----------------------------
The quantitative results for future ego-motion prediction are shown in Table \[tbl:fe\]. Between Const-Vel [@constvel] and Const-Acc (acceleration), the Const-Vel baseline performs better in predicting angular velocity (yaw-rate) and Const-Acc performs better for predicting acceleration. Titan\_vanilla only takes the past ego-motion as input, performing better than Const-Vel and Const-Acc for acceleration prediction. Although incorporating information of other agents’ future predictions (Titan\_FP) does not improve the performance over Titan\_vanilla, the addition of their action priors (Titan\_FP+AP) shows better performance for both acceleration and yaw rate prediction. By adding just future position in the AIM module (Titan\_AIM\_FP), the system can weight the importance of other agents’ behavior with respect to the ego-future, resulting in decreased error rates. Finally, by incorporating future position and action in the AIM module as a prior yields the best performance, Titan\_AIM.
To show the interpretability of which participant is more important for ego-future, we visualize the importance weights in Figure \[fig:attn\]. In particular, the top row illustrates that the importance weight of the pedestrian increases as the future motion direction (in white arrow) is towards the ego-vehicle’s future motion. Although the agent is closer to the ego-vehicle at a later time step, the importance decreases as the future motion changes. This mechanism provides insight into assessment of perceived risk for other agents from the perspective of the ego-vehicle.
Conclusion
==========
We presented a model that can reason about the future trajectory of scene agents from egocentric views obtained from a mobile platform. Our hypothesis was that action priors provide meaningful interactions and also important cues for making future trajectory predictions. To validate this hypothesis, we developed a model that incorporates prior positions, actions, and context to simultaneously forecast future trajectory of agents and future ego-motion. For evaluation, we created a novel dataset with over 700 video clips containing labels of a diverse set of actions in urban traffic scenes from a moving vehicle. Many of those actions implicitly capture the agent’s intentions. Comparative experiments against baselines and state-of-art prediction algorithms showed significant performance improvement when incorporating action and interaction priors. Importantly, our framework introduces an Agent Importance Mechanism (AIM) module to identify agents that are influential in predicting the future ego-motion, providing insight into assessment of perceived risk in navigation. For future work, we plan to incorporate additional scene context to capture participant interactions with the scene or infrastructure.
**Acknowledgement** We thank Akira Kanehara for supporting our data collection and Yuji Yasui, Rei Sakai, and Isht Dwivedi for insightful discussions.
{width="99.00000%"}
Category Set \# Classes \# Instances Description
---------- -------------------- ------------ -------------- --------------------------------------------------------------
Atomic 9 392511 atomic whole body actions/postures that describe primi-
tive action poses (*e.g.*, sitting, standing, walking, etc.)
Simple contextual 13 328337 single atomic actions that include scene context (*e.g.*,
jaywalking, waiting to cross)
Human Complex contextual 7 5084 a sequence of atomic actions with increased complexity
Action and/or higher contextual understanding
Transportive 4 35160 manually transporting an object by carrying, pulling, or
pushing.
Communicative 4 57030 communicative actions (e.g. talking on the phone, look-
ing at phone, or talking in groups.)
Motion status 3 249080 motion status of 2-wheeled and 4-wheeled vehicles
(parked / moving / stationary)
Vehicle Trunk status 2 146839 trunk for 4-wheeled vehicles
State (open / closed)
Door status 2 146839 door status for 4-wheeled vehicles
(open / closed)
Age group 3 395769 subjective categorization of pedestrians into age groups
Other (child / adult / senior)
Labels Object type 3 645384 participant types categorized into
pedestrian / 2-wheeled / 4- wheeled vehicles
Details of the TITAN Dataset
============================
Figure \[fig:main\] illustrates the labels of the TITAN dataset, which are typically observed from on-board vehicles in driving scenes. We define 50 labels including vehicle states and actions, pedestrian age groups, and targeted pedestrian action attributes that are hierarchically organized from primitive atomic actions to complicated contextual activities. Table \[tbl:titan\_dataset\] further details the number of labels, instances, and descriptions for each action set in the TITAN dataset. For pedestrians, we categorize human actions into 5 sub-categories based on their complexities and compositions. Moreover, we annotate vehicle states with 3 sub-categories of motion, and trunk / door status. Note that the trunk and door status is only annotated for 4-wheeled vehicles. Vehicles with 3-wheels without trunk but with doors are annotated as 4-wheeled and trunk open. Also, 3-wheeled vehicles with no trunk and doors are annotated as 2-wheeled vehicles. The list of classes for human actions is shown in Table \[tbl:per\_class\_results\]. The annotators were instructed to only localize pedestrians and vehicles with a minimum bounding box size of $70\times10$ $pixels$ and $50\times10$ $pixels$ in the image, respectively.
Several example scenarios of TITAN are depicted in Figure \[fig:titan\_dataset\]. In each scenario, four frames are displayed with a bounding box around a road agent. We also provide their actions below each frame. Note that only one agent per frame is selected for the purpose of visualization. The same color code is used for each action label, which can be found in Figure 2 of the main manuscript.
Additional Evaluation
=====================
In this section, we provide additional evaluation results of the proposed approach.
Per-Class Quantitative Results
------------------------------
In Table \[tbl:per\_class\_results\], we present per-class quantitative results of the proposed approach, which are evaluated using the test set of TITAN. Note that the number of instances for some actions (*e.g.*, *kneeling*, *jumping*, etc.) are zero, although they are present in the training and validation set. This is because we randomly split 700 clips of TITAN into training, validation, and test set. We will regularly update TITAN to add more clips with such actions.
We observe that the error rate for some classes are either much lower or higher than other classes. For example, scenarios depicting *getting into a 4 wheel vehicle*, *getting out of a 4 wheel vehicle*, and *getting on a 2 wheel vehicle* show very small FDE as compared to others. Also, scenarios depicting *entering a building* has a larger ADE and FDE than other scenarios. The reason for this can be explained by considering interactions of agents. When a person is *getting into a vehicle*, the proposed interaction encoder builds a pair-wise interaction between the person (subject that the action generates) and the vehicle (object that the subject is related to). It further validates the efficacy of our interaction encoding capability. In contrast, no interactive object is given to the agent for *entering a building* class since we assume agents are either pedestrians or vehicles. As mentioned in the main manuscript, we plan to incorporate additional scene context such as topology or semantic information.
Efficacy of Multi-Task Loss
---------------------------
The comparative results of the I3D action recognition module with and without the multi-task (MT) loss is shown in Table \[tbl:mt\_loss\]. The performance improvement for atomic and simple contextual actions for pedestrians and motion status for vehicles with the MT loss validates its efficacy of modeling aleatoric homoscedastic uncertainty of different tasks.
{width="99.00000%"}
Action Set Class ADE$\downarrow$ FDE$\downarrow$ FIOU$\uparrow$ \#Instances
-------------------- ------------------------------------ ----------------- ----------------- ---------------- -------------
standing 10.56 18.63 0.6128 1476
running 12.39 19.95 0.6179 89
bending 12.76 20.85 0.6560 156
kneeling 0.00 0.00 0.00 0
Atomic Action walking 13.31 23.15 0.5712 6354
sitting 11.10 20.74 0.6282 337
squatting 11.90 18.82 0.5598 4
jumping 0.00 0.00 0.00 0
laying down 0.00 0.00 0.00 0
none of the above 9.69 16.43 0.7408 7237
crossing at pedestrian crossing 13.22 21.59 0.5976 881
jaywalking 13.10 21.91 0.6148 340
waiting to cross street 11.49 21.75 0.5783 65
motorcycling 20.00 31.81 0.5494 4
biking 13.22 21.13 0.6283 287
walking along the side of the road 11.33 24.50 0.5516 2668
Simple-Contextual walking on the road 13.41 22.30 0.5794 2486
cleaning (ground, surface, object) 11.67 22.58 0.6502 19
closing 9.84 20.50 0.4947 14
opening 12.99 29.89 0.1995 13
exiting a building 13.56 28.09 0.5264 61
entering a building 28.06 53.02 0.2259 6
none of the above 9.85 16.76 0.7201 8809
unloading 11.07 18.45 0.7082 37
loading 11.59 18.54 0.6652 40
getting in 4 wheel vehicle 8.39 10.80 0.5682 10
Complex-Contextual getting out of 4 wheel vehicle 9.63 9.58 0.7972 3
getting on 2 wheel vehicle 7.73 11.16 0.7619 10
getting off 2 wheel vehicle 0 0 0 0
none of the above 11.32 19.54 0.6557 15553
looking at phone 12.12 21.48 0.6435 392
Communicative talking on phone 11.69 19.39 0.6056 268
talking in group 11.70 20.82 0.6025 461
none of the above 11.28 19.43 0.6588 14532
pushing 12.57 23.07 0.6148 232
Transportive carrying with both hands 11.39 20.23 0.6477 445
pulling 12.01 21.29 0.5198 76
none of the above 11.29 19.44 0.6574 14900
stopped 8.96 23.08 0.6148 232
Motion-Status moving 9.18 20.23 0.6477 445
parked 9.93 21.29 0.5199 76
none of the above 12.72 19.44 0.6574 14900
\[tbl:per\_class\_results\]
{width="99.00000%"}
{width="99.00000%"}
{width="95.00000%"}
Method w/ MT loss$\uparrow$ w/o MT loss$\uparrow$
-- --------------- ---------------------- -----------------------
atomic 0.9219 0.7552
simple 0.5318 0.3173
complex 0.9881 0.9880
communicative 0.8649 0.8647
transportive 0.9080 0.9080
overall 0.8429 0.7667
motion 0.9918 0.7130
trunk 1.00 1.00
doors 1.00 1.00
overall 0.9921 0.9043
0.8946 0.8127
: Action recognition results (mAP) on TITAN.[]{data-label="tbl:mt_loss"}
Additional Qualitative Results
------------------------------
Figure \[fig:ours\] and \[fig:comparison\] show the prediction results of the proposed approach for future object localization. Titan\_EP+IP+AP consistently shows better performance against the baseline model and the state-of-the-art methods. We also observed that t
In Figure \[fig:attn\], the proposed Agent Importance Module (AIM) is evaluated on additional sequences. The ego-vehicle decelerates due to the crossing agent, and our system considers this agent as having a higher influence (or importance)than other agents. Agents with high importance are depicted with a red over-bar. Particularly in scenario 10, when the person walks along the road in the longitudinal direction, its importance is relatively low. However, the importance immediately increases when the motion changes to the lateral direction.
Implementation
==============
TITAN framework is trained on a Tesla V100 GPU using PyTorch Framework. We separately trained action recognition, future object localization, and future ego-motion prediction modules. During training, we used ground-truth data as input to each module. However, during testing, the output results of one module are directly used for later tasks.
Future Object Localization {#future-object-localization-1}
--------------------------
During training, we used a learning rate of 0.0001 with RMSProp optimizer and trained for 80 epochs using a batch size of 16. We used hidden state dimension of 512 for both encoder and decoder. A size of 512 is used for the embedding size of action, interaction, ego-motion and bounding box. The input box dimension is 4, action dimension is 8, and ego-motion dimension is 2. The original image size width is 1920 $pixels$ and height is 1200 $pixels$ and accordingly cropped using the bounding box dimension. It is further resized to $228\times228$ for the I3D-based action detector. The bounding box inputs and outputs are normalized between 0 to 1 using image dimensions.
Layer Kernal shape Output shape
---- ------------------------------------------ --------------- ----------------
0 ego$\_$box$\_$embed.Linear$\_$0 \[4, 512\] \[1, 10, 512\]
1 ego$\_$box$\_$embed.ReLU$\_$1 - \[1, 10, 512\]
2 ego$\_$action$\_$embed.Linear$\_$0 \[8, 512\] \[1, 512\]
3 ego$\_$action$\_$embed.ReLU$\_$1 - \[1, 512\]
4 ego$\_$motion$\_$embed.Linear$\_$0 \[2, 512\] \[1, 10, 512\]
5 ego$\_$motion$\_$embed.ReLU 1 - \[1, 10, 512\]
6 box$\_$encoder.GRUCell$\_$enc - \[1, 512\]
7 motion$\_$encoder.GRUCell$\_$enc - \[1, 512\]
8 int$\_$encoder.embed.Linear$\_$0 \[24, 512\] \[1, 512\]
9 int$\_$encoder.embed.ReLU$\_$1 - \[1, 512\]
10 int$\_$encoder.encode.GRUCell$\_$enc - \[1, 512\]
11 concat$\_$to$\_$hidden.Linear$\_$0 \[2048, 512\] \[1, 512\]
12 concat$\_$to$\_$hidden.ReLU$\_$1 - \[1, 512\]
13
14
15 pred.GRUCell$\_$dec - \[1, 512\]
16 pred.hidden$\_$to$\_$input.Linear$\_$0 \[512, 512\] \[1, 512\]
17 pred.hidden$\_$to$\_$input.ReLU$\_$1 - \[1, 512\]
18 pred.hidden$\_$to$\_$output.Linear$\_$0 \[512, 10\] \[1, 10\]
19 pred.hidden$\_$to$\_$output.Sigmoid$\_$1 - \[1, 10\]
20
: Future Object Localization model summary with an example batch size of 1[]{data-label="tbl:fol_model"}
The model summary for Future Object Localization is shown in Table \[tbl:fol\_model\]. We embed the bounding box (through 0 and 1), action (2-3), ego-motion (4-5) at each time step, and pairwise interaction encoding (8-12). We concatenate the embedded features through (11-12), which are given from the hidden states of the bounding box encoder GRU (6), the hidden states of the ego encoder GRU (7), encoded interaction (10) and action embedding (3). We encode all information for 10 observation time steps from (14). We decode the future locations using decoder GRU for 20 future time steps (20).
Action Recognition {#action-recognition-2}
------------------
We used Kinetics-600 pre-trained weights for both I3D and 3D-ResNet. For I3D, we use layers until Mixed$\_$5c layer of the original structure. We used learning rate of 0.0001 and a batch size of 8. We trained it for 100 epochs. The input size is $3\times10\times244\times244$, where 10 is the number of time steps, 3 is the number of RGB channels. If the agent is occluded and reappears at any time step, we used the last observed crop of image for that the agent. During training we backpropagate the gradients for pedestrians and vehicles with the loss function as shown below: $$\mathcal{L}_{total}=\mathds{1}_p {\mathcal{L}_a}^{i=1:5}+(1-\mathds{1}_p){\mathcal{L}_a}^{i=6:8},
\label{eq:multi_task_loss_sep}$$ where $\mathds{1}_p$ is an indicator function that equals 1 if the agent is a pedestrian and 0 if the agent is a vehicle. We refer to the main manuscript for $\mathcal{L}_a$.
Layer Kernal shape Output shape
----- ---------------------------------------- -------------------- ------------------------
1 i3d.Conv3d$\_$1a$\_$7x7.conv3d \[3, 64, 7, 7, 7\] \[1, 64, 5, 112, 112\]
..
126 i3d.Mixed$\_$5c.b3b.BatchNorm3d \[128\] \[1, 128, 2, 7, 7\]
127 action.hid$\_$to$\_$pred1.Linear$\_$0 \[100352, 10\] \[1, 10\]
128 action.hid$\_$to$\_$pred1.Softmax$\_$1 - \[1, 10\]
129 action.hid$\_$to$\_$pred2.Linear$\_$0 \[100352, 13\] \[1, 13\]
130 action.hid$\_$to$\_$pred2.Softmax$\_$1 - \[1, 13\]
131 action.hid$\_$to$\_$pred3.Linear$\_$0 \[100352, 7\] \[1, 7\]
132 action.hid$\_$to$\_$pred3.Softmax$\_$1 - \[1, 7\]
133 action.hid$\_$to$\_$pred4.Linear$\_$0 \[100352, 4\] \[1, 4\]
134 action.hid$\_$to$\_$pred4.Softmax$\_$1 - \[1, 4\]
135 action.hid$\_$to$\_$pred5.Linear$\_$0 \[100352, 4\] \[1, 4\]
136 action.hid$\_$to$\_$pred5.Softmax$\_$1 - \[1, 4\]
137 action.hid$\_$to$\_$pred6.Linear$\_$0 \[100352, 4\] \[1, 4\]
138 action.hid$\_$to$\_$pred6.Softmax$\_$1 - \[1, 4\]
139 action.hid$\_$to$\_$pred7.Linear$\_$0 \[100352, 3\] \[1, 3\]
140 action.hid$\_$to$\_$pred7.Softmax$\_$1 - \[1, 3\]
141 action.hid$\_$to$\_$pred8.Linear$\_$0 \[100352, 3\] \[1, 3\]
142 action.hid$\_$to$\_$pred8.Softmax$\_$1 - \[1, 3\]
: I3D action recognition model summary with an example batch size of 1[]{data-label="tbl:action_model"}
The model summary for action recognition is shown in Table \[tbl:action\_model\]. Note that, from mixed$\_$5c layer \[b0, b1b, b2b, b3b\] are concatenated to give a shape of \[1,1024,2,7,7\] which is flattened to give a tensor of shape \[1,100352\] before feeding it to each MLP head for individual action sets.
Future Ego-Motion Prediction
----------------------------
Layer Kernal shape Output shape
---- --------------------------------------------- -------------- ------------------
0 ego$\_$embed.Linear$\_$0 \[2, 128\] \[1, 10, 128\]
1 ego$\_$embed.ReLU$\_$1 - \[1, 10, 128\]
2 ego$\_$encoder.GRUCell$\_$enc - \[1, 128\]
3
4 pred.box$\_$embed.Linear$\_$0 \[4, 128\] \[1, 1, m, 128\]
5 pred.box$\_$embed.ReLU$\_$1 - \[1, 1, m, 128\]
6 pred.action$\_$embed.Linear$\_$0 \[8, 128\] \[1, 1, m, 128\]
7 pred.action$\_$embed.ReLU$\_$1 - \[1, 1, m, 128\]
8 pred.concat$\_$to$\_$hid2.Linear$\_$0 \[256, 128\] \[1, 1, m, 128\]
9 pred.AIM$\_$layer.Linear$\_$0 \[128, 1\] \[1, 1, m, 1\]
10 pred.AIM$\_$layer.Tanh$\_$1 - \[1, 1, m, 1\]
11 pred.concat.concat$\_$0 - \[1, 256\]
12 pred.concat$\_$to$\_$hid.Linear$\_$0 \[256, 128\] \[1, 128\]
13 pred.GRUCell$\_$dec - \[1, 128\]
14 pred.hid$\_$to$\_$pred$\_$input.Linear$\_$0 \[128, 128\] \[1, 128\]
15 pred.hid$\_$to$\_$pred$\_$input.ReLU$\_$1 - \[1, 128\]
16 pred.Linear$\_$hid$\_$to$\_$pred \[128, 2\] \[1, 2\]
17
: Future ego motion prediction model summary with an example batch size of 1, m is the number of agents at that future time step[]{data-label="tbl:fe_model"}
We use batch size of 64, learning rate of 0.0001 and trained for 100 epoch with RMSProp optimizer. We use the hidden state dimension of 128 for both encoder and decoder. We use the embedding size of 128. The prediction is done for 20 time steps in future. The input and output dimensions are 2 at each time step.
The model summary of the future ego-motion prediction is shown in Table \[tbl:fe\_model\]. We embed the ego motion at each time step (0-1) and use GRU encoder (2) for 10 observation time steps (3). The encoded information is used for the decoder. The embedded future bounding box (4-5) and embedded current action (6-7) are concatenated (8). The agent importance module (AIM) is used to weight the agents at each time step (9-10). We concatenate (11) the AIM output with the past hidden state and embed it (12). The embedded feature is used as an input hidden state. The current hidden state (13) is passed to the next time-step (14-15) using GRU. The output is decoded (16) from the hidden state at each time step (17). As a result, we get for 20 future predictions.
[^1]: We assume that the bounding box detection using past images is provided by the external module since detection is not the scope of this paper.
[^2]: Using ground-truth actions as a prior, we observed further improvement in overall ADE by 2 *pixels* and overall FDE by 3.5 *pixels*.
|
{
"pile_set_name": "ArXiv"
}
|
It's been a few weeks since we've gotten any concrete news from Orlando City SC's USL PRO affiliate, Louisville City FC, but this week brought the signings of defenders Sean Reynolds and Adam West. Here is the breakdown on Louisville's two newest players.
Sean Reynolds (Highlights)
Bio: Reynolds is a 24-year-old American, originally from Florida. He has experience at multiple levels in the American soccer pyramid, including both in amateur and professional competition. He played three years in the USL Premier Developmental League before turning pro, where he played with the former USL PRO outfit VSI Tampa Bay and the Orlando City U-23 squad. He comes to Louisville after a stint with FH-Ingor of the Icelandic Premier League, where he played in Europa League qualifiers.
(Limited) Analysis: At 6-foot-1, Reynolds is a big enough defender to play as an effective center back, which is where it seems his last club in Iceland employed him most. Head Coach James O'Connor values him for his versatility, saying he can play all four positions along the back line, as well as some defensive midfield. Along with one of Louisville's first signings, Guy Abend, Reynolds figures to be a useful jack-of-all-trades defender that can be used in a variety of positions should the team's depth be tested via injuries or suspensions. He displays strong defensive instincts and he has the ability to use his height in the attacking end on set pieces. His talents and his European experience make him a valuable addition to Louisville's defense.
O'Connor on Reynolds: "Sean gained great experience while playing in the Premier League in Iceland and the Europa League. He can play a number of positions and will be a great asset that gives us flexibility in our first season."
Adam West (Highlights)
Bio: West (not to be confused with the former Batman actor-turned-Family Guy character) is a 28-year-old left back from Washington. He played college soccer at the University of Washington for two years before turning pro and playing for the old USL iteration of the Seattle Sounders, where he was a part of the team that won the 2007 USL First Division title. He has made stops at various levels on the North American soccer scene, including Edmonton, Ft. Lauderdale, Rochester and Tacoma. Besides Seattle, he was a part of two other championship squads, winning the NASL title with Ft. Lauderdale, and the regular season championship with the Rochester Rhinos. He comes to Louisville from the Sounders U-23 squad, where he temporarily played after he was dropped in Edmonton due to injuries. West has played with the US U-20 setup. (His actual highlights are included in the embedded video below.)
(Limited) Analysis: West has played primarily left back in his career, but O'Connor says he has the ability to play on the right as well. At 28, West should be able to bring some veteran leadership to the squad after playing on multiple championship teams, and dealing with personal adversity in his career at the University of Washington. On the field, however, it remains to be seen how significantly West will contribute to the Louisville cause. West has dealt with injuries, specifically a hamstring injury in Edmonton, and has yet to really ingratiate himself with any of the clubs which he has played for. West signed on with Louisville after impressing at the pro combine the club held in November, so perhaps the stars have aligned to give West the opportunity to become a key player as his career enters its later stages.
O'Connor on West: "Adam was without a doubt one of the best players at the professional combine we hosted in November. He will provide a great attacking threat for us from left fullback, and we are extremely pleased to have someone of Adam's ability on board for our inaugural season."
More from O'Connor on Reynolds and West:
The two new defenders join Kadeem Dacres, Juan Guzman, and Guy Abend, bcoming the fourth and fifth players in Louisville City history.
Will the newest Orlando City Lions come to Louisville?
I think @loucityfc have won the @MLS draft so far. — Matthew Doyle (@MLSAnalyst) January 15, 2015
#OCSC has now used all 11 Int'l spots, could likely see @AkeilMaestro loaned to @loucityfc — Logan Oliver (@loganoliverRR) January 15, 2015
Orlando City's draft haul could be big for Louisville, as Orlando may look to unload its talented youngsters on its USL PRO affiliate as they transition to the professional game. Louisville City owner Wayne Estopinal, General Manager Amanda Duffy and O'Connor were in attendance at the MLS SuperDraft on Thursday, and there has been rampant speculation online that OCSC's three draftees could be heading north to the Derby City. The question is...will they? Stay tuned to The Mane Land for all the updates on Orlando City's young future stars.
|
{
"pile_set_name": "OpenWebText2"
}
|
Correlation between lung perfusion blood volume and SPECT images in patients with chronic thromboembolic pulmonary hypertension by balloon pulmonary angioplasty.
We evaluated the reperfusion by balloon pulmonary angioplasty (BPA) in lung PBV and SPECT images. In total, 17 patients and 57 sessions were evaluated. Pre-BPA and post-BPA lung PBV and SPECT/CT images, based on both anatomical segments and physiologic regions (upper/middle/lower) were compared. BPA had a positive effect on most hypoperfused/unperfused segments/regions. There was generally a high rate of agreement between PBV measurements and SPECT/CT. BPA shows promise as a treatment modality for CTEPH patients. SPECT/CT, and, to a lesser extent, PBV, were useful in indicating areas in need of balloon angioplasty.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
1. Field of the Invention
This invention relates to an opaque, biaxially oriented polymer film and a method for its preparation. In particular, it relates to an opaque, biaxially oriented film containing voids and its preparation from a composition comprising a film-forming polymer and void-forming microspheres dispersed therein.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Q:
Efficient and Succinct Vector Transformation of Weekly to Daily hourly Data in R
I've got a working function, but I'm hoping there is a more succinct way of going about this.
I have a dataset of events that are captured with the hour of the week they occurred in. For example, 4 AM on Sunday= 4, 4 AM on Monday = 28 etc. I want to analyze this data on a daily basis. For instance, all of the events that happen between 8 and 10 am on any day.
To do this I have built a function that returns a dichotomous value for the given range for an ordered list. Function two_break accepts an ordered list of integers between 0:168 representing the hours of a week and a range (b1 and b2) for the desired periods of a 24 hour day. b1 and b2 divide the range of the 24 hour day that are desired. i.e. if b1=8 and b2=10 two_break will return all all values of 9, (9+24)=33, (9+48)=57...etc. as 1 and all others 0.
two_break <- function(test_hr,b1,b2){
test_hr<-ifelse(test_hr==1,1.1,test_hr)
for(i in 0:6){
test_hr<-ifelse(test_hr> (b1+24*i) & test_hr< (b2+24*i), 1 ,test_hr)
}
test_hr<-ifelse(test_hr==1,1,0)
return(test_hr)
}
This function works fine, but I'm wondering if anybody out there could do it more efficiently/succinctly.
See full code and data set at my github: anthonyjp87 168 hr transformation file/data.
Cheers!
A:
You can use integer division %/% to capture the day of the week, and modulus, %% to capture the hour in the day:
weekHours <- 1:168
# return the indices of all elements where the hour is between 8AM and 10AM, inclusive
test_hr <- weekHours[weekHours %% 24 %in% 8:10]
Note that midnight is represented by 0. If you want to wrap this into a function, you might use
getTest_hr <- function(weekHours, startTime, stopTime) {
weekHours[weekHours %% 24 %in% seq(startTime, stopTime)]
}
To get the day of the week, you can use integer division:
# get all indices for the third day of the week
dayOfWeek3 <- weekHours[(weekHours %/% 24 + 1) == 3]
To get a binary vector of the selected time periods, simply pull the logical out of the index:
allTimesBinary <- (weekHours %% 24) %in% 8:10
|
{
"pile_set_name": "StackExchange"
}
|
The pleiotropic effects of erythropoietin in the central nervous system.
Erythropoietin (Epo) is a hydrophobic sialoglycoproteic hormone produced by the kidney and responsible for the proliferation, maturation, and differentiation of the precursors of the erythroid cell line. Human recombinant erythropoietin (rHuEpo) is used to treat different types of anemia, not only in uremic patients but also in newborns with anemia of prematurity, in patients with cancer-related anemia or myeloproliferative disease, thalassemias, bone marrow transplants, or those with chronic infectious diseases. The pleiotropic functions of Epo are well known. It has been shown that this hormone can modulate the inflammatory and immune response, has direct hemodynamic and vasoactive effects, could be considered a proangiogenic factor because of its interaction with vascular endothelial growth factor, and its ability to stimulate mitosis and motility of endothelial cells. The multifunctional role of Epo has further been confirmed by the discovery in the central nervous system of a specific Epo/Epo receptor (EpoR) system. Both Epo and EpoR are expressed by astrocytes and neurons and Epo is present in the cerebrospinal fluid (CSF). Therefore, novel functions of Epo, tissue-specific regulation, and the mechanisms of action have been investigated. In this review we have tried to summarize the current data on the role of Epo on brain function. We discuss the different sites of cerebral expression and mechanisms of regulation of Epo and its receptor and its role in the development and maturation of the brain. Second, we discuss the neurotrophic and neuroprotective function of Epo in different conditions of neuronal damage, such as hypoxia, cerebral ischemia, and subarachnoid hemorrhage, and the consequent possibility that rHuEpo therapy could soon be used in clinical practice to limit neuronal damage induced by these diseases.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Repository:
University of California, Santa Barbara. Library. Department of Special Collections
Santa Barbara, California 93106-9010
Physical Location: Del Sur
Language:
English.
Administrative Information
Access Restrictions
None.
Publication Rights
Copyright has not been assigned to the Department of Special Collections, UCSB. All requests for permission to publish or
quote from manuscripts must be submitted in writing to the Head of Special Collections. Permission for publication is given
on behalf of the Department of Special Collections as the owner of the physical items and is not intended to include or imply
permission of the copyright holder, which also must be obtained.
Preferred Citation
Local History Files. SBHC Mss 44. Department of Special Collections, Davidson Library, University of California, Santa Barbara.
Acquisition Information
Donations from various sources, from the 1970s onward. Additions to the collection anticipated.
Scope and Content of Collection
The bulk of the collection was accumulated and maintained by the UCSB University Libraries Reference Department as a vertical
file for researchers, then later transferred to the Department of Special Collections. Related materials have been incorporated
into the collection and continue to be added. The collection is arranged alphabetically by topic and consists primarily of
newsclippings, along with other printed materials such as reports, newsletters, pamphlets, and flyers.
A substantial proportion of the collection relates to events in Isla Vista (the student community adjacent to UCSB) in the
1970s.
Collection Contents
Box 1
African-Americans
Box 1
Agriculture
Box 1
Antiwar Activities
Box 1
Architecture
Box 1
Art/Artists/Galleries
Box 1
Businesses (Santa Barbara County)
Box 1
Cachuma
Box 1
Campus-Community Alliance Group
Box 1
Carpinteria
Box 1
Center for the Study of Democratic Institutions
Box 1
Channel Islands
Box 1
Chemical (Toxic) Waste
Box 1
Chicanos/Chicanas
Box 1
Chinese-Americans
Box 1
Chumash
Box 1
Churches
Box 1
Clark Estate
Box 1
Clearview Project
Box 1
Climate
Box 1
Community Council to End the War
Box 1
Conferences
Box 1
Counseling Center of Santa Barbara
Box 1
County Planning Commission
Box 1
Diablo Canyon Nuclear Power Plant
Box 1
Earthquakes
Box 1
Easton, Robert E.
Box 1
Ecology
Box 1
Economics
Box 1
Education
Box 1
El Capitan
Box 1
Ellwood History
Box 2
Energy
Box 2
Environment
Box 2
Experimental Colleges
Box 2
Family Services and Charities
Box 2
Fiesta
Box 2
Fires/Fire Department
Box 2
Floods
Box 2
Fremont, John C.
Box 2
Get Oil Out (GOO)
Box 2
Goleta
Box 2
Goleta Depot
Box 2
Goleta History
Box 2
Goleta Incorporation
Box 2
Goleta Valley Business Directory
Box 2
Goleta Valley Chamber of Commerce
Box 2
Goleta Valley Citizens' Group
Box 2
Goleta Valley Historical Society
Box 2
Goleta Water District
Box 2
History
Box 2
General
Box 2
'Neighborhood Series' by Walker A. Tompkins
Box 2
'Olden Days' - index of columns by Stella Rouse, 1962-1975
Box 2
Hollister
Box 2
Hollister Ranch
Box 2
Housing
Box 3-9
Isla Vista
Box 3
Aid, 1970
Box 3
Allen, William -- public statements by the administration re: Allen case, 1970
Box 3
Architecture, 1970
Box 3
Bank of America Burning (articles), 1970
Box 3
Bicycles, Bike Routes, 1970
Box 3
Black Panther Publication, 1970
Box 3
Bombings, 1971
Box 3
Bookmobile, 1973
Box 3
Businesses-- newspaper clippings re IV businesses, 1969-1987
Box 3
The Campus By the Sea Where the Bank Burned Down, Disturbances Report, 1968-1970
|
{
"pile_set_name": "Pile-CC"
}
|
//
// Generated by class-dump 3.5 (64 bit).
//
// class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2013 by Steve Nygard.
//
#import <SAObjects/SADomainCommand.h>
@interface SAMPLoadPredefinedQueue : SADomainCommand
{
}
+ (id)loadPredefinedQueueWithDictionary:(id)arg1 context:(id)arg2;
+ (id)loadPredefinedQueue;
- (BOOL)requiresResponse;
@property(nonatomic) BOOL shouldShuffle;
@property(nonatomic) int mediaItemType;
- (id)encodedClassName;
- (id)groupIdentifier;
@end
|
{
"pile_set_name": "Github"
}
|
2015 Swiss Indoors
The 2015 Swiss Indoors was a men's tennis tournament played on indoor hard courts. It was the 46th edition of the event, and part of the 500 series of the 2015 ATP World Tour. It was held at the St. Jakobshalle in Basel, Switzerland, from 26 October through 1 November 2015. First-seeded Roger Federer won the singles title.
Points and prize money
Point distribution
Prize money
Singles main draw entrants
Seeds
Rankings are as of October 19, 2015
Other entrants
The following players received wildcards into the singles main draw:
Marco Chiudinelli
Henri Laaksonen
The following players received entry from the qualifying draw:
Robin Haase
Jerzy Janowicz
Dušan Lajović
Adrian Mannarino
The following player received entry as a lucky loser:
Denis Kudla
Withdrawals
Before the tournament
Marcos Baghdatis (groin injury)→replaced by Denis Kudla
Julien Benneteau →replaced by Borna Ćorić
Kei Nishikori →replaced by Jiří Veselý
Milos Raonic →replaced by Sergiy Stakhovsky
Gilles Simon →replaced by Donald Young
Retirements
Alexandr Dolgopolov (right elbow injury)
Doubles main draw entrants
Seeds
Rankings are as of October 19, 2015
Other entrants
The following pairs received wildcards into the doubles main draw:
Adrien Bossel / Marco Chiudinelli
Henri Laaksonen / Luca Margaroli
The following pair received entry from the qualifying draw:
Treat Huey / Henri Kontinen
The following pair received entry as lucky losers:
Robin Haase / Sergiy Stakhovsky
Withdrawals
Marcelo Melo (left leg injury)
Finals
Singles
Roger Federer defeated Rafael Nadal 6–3, 5–7, 6–3
Doubles
Alexander Peya / Bruno Soares defeated Jamie Murray / John Peers 7–5, 7–5
References
External links
Official website
Category:2015 ATP World Tour
2015
Category:2015 in Swiss sport
*
|
{
"pile_set_name": "Wikipedia (en)"
}
|
In the second edition of the special issue titled "Immunometabolism: Molecular Mechanisms, Diseases, and Therapies," a total of 37 manuscripts were received, and 16 of these were accepted. This issue demonstrated that nonresolving, chronic low-intensity inflammation not only is involved in the development and maintenance of several metabolic diseases such as visceral obesity, type 2 diabetes, dyslipidemias, atherosclerosis, hypertension, and cancer but also acts as an important linking factor between those conditions. Metabolic disease-associated inflammation is characterized by the recruitment of cells from both the innate and adaptive immune system to metabolic tissues followed by their polarization to a proinflammatory profile, resulting in the exacerbated local production of inflammatory mediators. These processes are mainly activated by the canonical Toll-like receptor- (TLR-) NF*κ*B signaling pathway, which can be triggered by several molecules such as the lipopolysaccharide from gut microbiota and saturated fatty acids, among others.
This special issue successfully attracted several interesting original and review articles addressing different aspects of the intricate relationships between metabolism and inflammation in health and disease. E. Nishida et al., for example, exploring the association between cardiovascular diseases and periodontitis, a chronic inflammatory disease that affects the periodontium, demonstrated that the acute-phase protein serum amyloid A, which is elevated in the liver and blood of apolipoprotein E-deficient, atherosclerosis-prone mice, promotes the expression of adhesion molecules in human aortic endothelial cells via TLR2, being therefore a candidate linking factor between periodontal disease and atherosclerosis. Subsequently, in an interesting, mechanistic study, Z.-Z. Guo et al. established a role for the c-Jun N-terminal kinase (JNK), a member of the mitogen-activated protein kinase (MAPK) family which is activated by inflammatory signals and other stress stimuli, as an important mediator involved in the formation of abdominal aortic aneurysm induced by angiotensin II plus nicotine, a major chemical component of cigarettes. These findings indicate that JNK inhibition may hold promise as a pharmacological target to attenuate smoking-induced abdominal aortic aneurysm formation. In an elegant study exploring the mechanisms underlying the immunomodulatory actions of bilirubin, K. F. Corral-Jara et al. found strong evidence indicating that, during hepatitis A virus infection, conjugated bilirubin differentially regulates CD4+ T lymphocytes and Tregs function by modulating intracellular pathways and by inducing changes in the proportion of Tregs expressing hepatitis A virus cellular receptor (HAVCR1/TIM-1). These findings may help in the elucidation of the mechanisms involved in hepatitis virus infection.
This special issue also gathered several studies that investigated the underlying mechanisms by which some nutrients and modulation of tissue oxygen levels may attenuate the chronic low-grade inflammation associated with metabolic diseases. Indeed, S. I. Pærregaard et al. investigated the involvement of membrane-free fatty acid receptor-4 (FFAR4), also known as GPR120, as mediator of the beneficial actions of *ω*3 fatty acids on metabolic health. By feeding *Ffar4* knockouts and heterozygous mice with either a control or an *ω*3-rich diet for 36 weeks, S. I. Pærregaard et al. show that FFAR4 signaling is not required for the anti-inflammatory and insulin-sensitizing effects mediated by *ω*3 fatty acids. G. Guan et al., on the other hand, presented interesting findings indicating that intake of a diet containing chitosan, polysaccharides found in insects, fungi, squid, oysters, krill, clams, and shellfish changes the composition of mice intestinal microflora by suppressing NF-*κ*B, TNF-*α*, and IL-6 and inducing a better control of inflammation and resolution of infection with *C. rodentium*. Moreover, V. Oliveira et al. showed that oligofructose supplementation in pregnancy and lactation induces the proinflammatory markers in dams and 90-day-old offspring and reduction in adiponectin pathway. In addition, F. Elbers et al. reported an impairment in the immunomodulatory and antimicrobial actions of the hepatic enzyme tryptophan 2,3-dioxygenase, which converts tryptophan, the essential amino acid for hosts and pathogens, to N-formylkynurenine, the precursor of the immune-relevant kynurenines, upon hypoxic conditions mimicking those occurring in vivo during infection and cancer, for example. These findings indicate that hypoxia might be detrimental for the appropriate host immune response towards relevant pathogens. In contrast to the deleterious effects of hypoxia, in an interesting study, S. Novak et al. reported that hyperbaric oxygenation treatment, which increases tissue oxygen content, oxidative metabolism, and production of reactive oxygen species (ROS), significantly reduces the severity of dextran sodium sulphate-induced colitis improving the inflammatory microenvironment in the gut mucosa, such an effect that seems to be mediated in part by the transcriptional factor hypoxic inducible factor 1 *α* (HIF-1*α*). Finally, regarding alternative treatments to inflammatory disease, W. Ren et al. reported that supplementation of drinking water of rodents with interferon tau, a type I interferon produced by trophectoderm cells of conceptuses of ruminant species, increased microbial diversity in the jejunum and ileum and decreased the expression of IL-17 in the intestines of normal and pathogen-infected mice, being therefore a candidate therapy strategy to treat the inflammatory intestinal diseases.
Two studies in this special issue were performed in humans aiming to further characterize obesity-associated inflammation. F.-I. Corona-Meraz et al., by evaluating the inflammatory and metabolic phenotype of subjects with obesity and insulin resistance, found that chemerin, an adipokine related to adiposity levels and fat distribution, is associated with obesity, dyslipidemia, and insulin resistance, whereas its receptor chemerin chemokine-like receptor 1 (CMKLR1) is associated only with obesity. C. Wang et al., on the other hand, by evaluating the gene expression profile of the visceral adipose tissue from lean and obese subjects from the Uyghur population, found a correlation between reduced expression of A2b adenosine receptor and the transcriptional factors Kruppel-like factors 4 and 5 with obesity-associated dyslipidemia and inflammation.
This special issue also brings some interesting review articles addressing several aspects of metabolic disease-associated inflammation. D. Ortuño-Sahagún et al., for example, reviewed recent evidence supporting the link between obesity and the pathogenesis of multiple sclerosis, a chronic autoimmune and inflammatory disease. P.-F. Bryan et al., on the other hand, reviewed the mechanisms involved in the regulation of cytokine profile by sphingolipids, the role of gut microbiota in providing signaling molecules that favor the communication between resident bacteria and intestinal cells, and the potential of sphingolipids and gut microbiota as targets or therapeutic agents for inflammatory bowel disease. H. J. Coelho Junior et al. reviewed the possible molecular mechanisms associated with muscle atrophy in stroke patients, as well as the modulatory effect of inflammation in this condition. G. van Niekerk et al. reviewed evidence suggesting that sickness-associated anorexia may be a mechanism by which autophagic flux is upregulated systemically and claim that some patients might benefit from permissive underfeeding. Finally, U. Nydegger et al. reviewed some approaches to sort out from big data the relevant results for patient care in precision medicine.
Therefore, in our opinion, this special issue brings new insights into the intricate mechanisms driving the inflammatory processes associated with metabolic diseases. We hope that these information will help to pave the way for the development of efficient strategies to prevent and treat these diseases.
*Jose C. Rosa Neto* *Jose C. Rosa Neto* *Fabio S. Lira* *Fabio S. Lira* *Soumen Roy* *Soumen Roy* *William Festuccia* *William Festuccia*
|
{
"pile_set_name": "PubMed Central"
}
|
894 F.2d 1015
58 USLW 2523
UNITED STATES of America, Appellee,v.Dennis Allen WERLINGER, Appellant.
No. 89-5269.
United States Court of Appeals,Eighth Circuit.
Submitted Nov. 14, 1989.Decided Feb. 2, 1990.
William Kirschner, Fargo, N.D., for appellant.
Lynn E. Crokks, Fargo, N.D., for appellee.
Before LAY, Chief Judge, ARNOLD, Circuit Judge, and LARSON,* Senior District Judge.
LAY, Chief Judge.
1
Dennis Werlinger pleaded guilty to one count of bank embezzlement in violation of 18 U.S.C. Sec. 656 (1982). The district court sentenced Werlinger to twenty-seven months imprisonment. Under the Sentencing Guidelines, Werlinger received an offense level of ten because the amount he embezzled was between $500,001 and $1 million. See United States Sentencing Guidelines Sec. 2B1.1(b)(1)(K) (1988). In addition, the district court1 applied a two-level upward adjustment because "more than minimal planning" was involved, Sec. 2B1.1(b)(4), and a two-level downward adjustment based on Werlinger's acceptance of responsibility, Sec. 3E1.1. The district court found, however, that Werlinger's attempts to induce his co-workers to help him conceal the embezzlement from internal bank auditors amounted to obstruction of justice within the meaning of section 3C1.1.2 Accordingly, the district court increased the base offense level by two levels. Werlinger argues that in doing so, the district court misapplied section 3C1.1 as a matter of law. We reverse and remand for resentencing.
FACTS
2
Werlinger had been employed as a bank teller at the Norwest Bank in Fargo, North Dakota, for approximately ten years. Over the course of his employment, Werlinger embezzled over $600,000.
3
On the morning of February 9, 1989, Werlinger noticed the bank's internal auditors preparing to conduct a surprise cash audit. Werlinger immediately attempted to conceal his embezzlement from the auditors. He asked a co-worker responsible for counting out his cash drawer to falsely report the amount of cash on hand. He then directed another co-worker to make a false ledger entry. Neither co-worker complied. Later that day the auditors discovered a cash shortfall of approximately $660,000, clearly implicating Werlinger as the embezzler. The bank, however, did not notify law enforcement authorities until it notified the FBI the next day, February 10. Werlinger admitted the theft when confronted by the FBI, and cooperated with the FBI throughout its investigation.
DISCUSSION
Section 3C1.1 reads as follows:
4
Willfully Obstructing or Impeding Proceedings
5
If the defendant willfully impeded or obstructed, or attempted to impede or obstruct the administration of justice during the investigation or prosecution of the instant offense, increase the offense level from Chapter Two by 2 levels.
6
The question whether section 3C1.1 applies to Werlinger's conduct calls for an interpretation of the scope of the guideline. It is therefore a question of law which this court may review de novo. See 18 U.S.C. Sec. 3742(e)(1), (f)(1) (1988); United States v. Reyes, 881 F.2d 155, 156 (5th Cir.1989); United States v. Daughtrey, 874 F.2d 213, 217-18 (4th Cir.1989). Werlinger argues that section 3C1.1 does not reach conduct that is part of the crime itself and that occurs prior to an investigation by law enforcement authorities. The government argues that the guideline is not expressly limited to conduct occurring during formal criminal investigations, but that it also covers actions taken to avoid detection in the first instance.
7
As this court recently observed, the Sentencing Commission intended section 3C1.1 to encompass more than the traditional meaning of obstruction of justice.3 United States v. Patterson, 890 F.2d 69, 71 (8th Cir.1989). Section 3C1.1 and its commentary refer to conduct occurring "during the investigation or prosecution of the offense" that is "calculated to mislead or deceive authorities * * *." Such conduct may include concealing or attempting to conceal material evidence, or procuring or attempting to procure another to do so. Guidelines Sec. 3C1.1 application note 1(a), (b). We have therefore held section 3C1.1 applicable to attempts to deceive authorities and obstruct their investigative efforts before imposition of formal criminal charges. See Patterson, 890 F.2d at 71 (giving false name to arresting officers); United States v. Williams, 879 F.2d 454, 455-56 (8th Cir.1989) (threatening a government informant); see also United States v. Cain, 881 F.2d 980, 981 (11th Cir.1989) (hiding stolen checks upon postal inspectors' approach) (per curiam); United States v. Roberson, 872 F.2d 597, 609 (5th Cir.) (hiding stolen credit card under seat of police car), cert. denied, --- U.S. ----, 110 S.Ct. 175, 107 L.Ed.2d 131 (1989); United States v. Galvan-Garcia, 872 F.2d 638 (5th Cir.) (tossing marijuana bags out car window while being chased by officers), cert. denied, --- U.S. ----, 110 S.Ct. 164, 107 L.Ed.2d 122 (1989). However, none of these cases, nor any others of which we are aware, have applied section 3C1.1 as broadly as the government urges here.
8
The government does not contend that "authorities" as used in the commentary to section 3C1.1 refers to persons other than law enforcement officials. The government argues, however, that even though the FBI remained completely unaware of the bank's suspicions of embezzlement until February 10, Werlinger's actions on February 9 were "calculated to deceive or mislead" the FBI.
9
We find no support for this argument either in the Guidelines or the accompanying commentary. Rather, we are persuaded that the Sentencing Commission fully accounted for Werlinger's conduct in section 2B1.1, which sets the offense levels for embezzlement. The Commission, in our view, did not intend for the obstruction adjustment to apply cumulatively to the same conduct.
10
The offense of bank embezzlement itself encompasses elements of fraud, deceit, and concealment. See, e.g., United States v. Dougherty, 763 F.2d 970, 973 (8th Cir.1985) (approving instruction that 18 U.S.C. Sec. 656 requires "intent to injure or defraud bank or deceive its officers, * * * "); United States v. Steffen, 641 F.2d 591, 597 (8th Cir.) (loans to relatives structured to deceive bank officers), cert. denied, 452 U.S. 943, 101 S.Ct. 3091, 69 L.Ed.2d 959 (1981). It is difficult to imagine an embezzler who does not take some affirmative steps to conceal his wrongdoing. Concealment is crucial to the very success of the crime. Not only does section 2B1.1 provide a base level for embezzlement (with adjustments graduated according to the amount involved), but it also expressly authorizes a two-level upward adjustment when "more than minimal planning" is involved. Guidelines Sec. 2B1.1(b)(4). According to the commentary, "more than minimal planning" occurs when "significant affirmative steps are taken to conceal the offense." Id. Sec. 1B1.1 application note 1(f).4
11
In this case, the district court applied the "more than minimal planning" adjustment, because Werlinger had made false book entries over a period of several years. In our view, Werlinger's actions on February 9 were further attempts to continue this concealment and to once again avoid detection. Therefore, this conduct is accounted for in section 2B1.1.
12
We find support for our decision in Supreme Court cases requiring a clear expression of legislative intent to apply sentence enhancement provisions cumulatively. In Simpson v. United States, 435 U.S. 6, 12-13, 98 S.Ct. 909, 913, 55 L.Ed.2d 70 (1978), the Court held that a statute imposing an enhanced sentence upon a defendant who uses or carries a firearm while committing a federal felony is not applicable where the statute defining the underlying felony provides an enhanced penalty for the very same conduct. The Court reaffirmed this holding in Busic v. United States, 446 U.S. 398, 403-04, 100 S.Ct. 1747, 1751, 64 L.Ed.2d 381 (1980).
13
These decisions comport with the presumption that Congress does not intend to impose multiple punishments for one offense unless it clearly expresses an intent to do so. E.g., Whalen v. United States, 445 U.S. 684, 689, 100 S.Ct. 1432, 1436, 63 L.Ed.2d 715 (1980); Bell v. United States, 349 U.S. 81, 84, 75 S.Ct. 620, 622, 99 L.Ed. 905 (1955). These decisions also follow the principle that "ambiguity concerning the ambit of criminal statutes should be resolved in favor of lenity." Simpson, 435 U.S. at 14, 98 S.Ct. at 914 (quoting United States v. Bass, 404 U.S. 336, 347, 92 S.Ct. 515, 522, 30 L.Ed.2d 488 (1971)). "This policy of lenity means that the Court will not interpret a federal criminal statute so as to increase the penalty that it places on an individual when such an interpretation can be based on no more than a guess as to what Congress intended." Ladner v. United States, 358 U.S. 169, 178, 79 S.Ct. 209, 214, 3 L.Ed.2d 199 (1958).
14
These principles guide our analysis in the present case.5 Nothing in the Guidelines or its commentary clearly indicates the Sentencing Commission intended cumulative punishment. We therefore will not readily construe section 3C1.1 to apply so broadly as to multiply punishment of conduct already punished through the application of other sections of the Guidelines.
15
In fact, we find direct support for the proposition that the Sentencing Commission intended just the opposite. The Sentencing Commission clearly intended the adjustments under Chapter Three of the Guidelines to take into account circumstances that, for sentencing purposes, aggravate or mitigate the seriousness of the offenses categorized in Chapter Two.6 Indeed, both the authorizing legislation and the Commission's policy statements indicate that a major purpose of providing individualized, conduct-related adjustments is to ensure different sentences for criminal conduct of different severity. See 28 U.S.C. Sec. 991(b)(1)(B) (Supp. II 1984) (a purpose of Commission is to ensure "sufficient flexibility to permit individualized sentences when warranted by mitigating or aggravating circumstances not taken into account in the establishment of general sentencing practices"); Guidelines ch. 1, Pt. A policy statement (Congress sought proportionality to ensure different sentences for criminal conduct of different severity). The Commission has recognized that "double-counting" conduct in applying the Guidelines is inconsistent with this goal and has thus sought to avoid it. See id. Sec. 3D1.2 application note 5 (combined offense level for "Groups of Closely Related Counts" prevents "double counting" of offense behavior); id. 3C1.1 application note 4 (obstruction of justice enhancement not applicable to offenses such as contempt, obstruction of justice, perjury, and bribery of witness). This policy of mutual exclusivity indicates that the Sentencing Commission did not intend for multiple Guidelines sections to be construed so as to impose cumulative punishment for the same conduct. The interpretation of section 3C1.1 urged by the government therefore not only stretches that section's text to extreme limits, but also contravenes the intent of the Commission.
16
The government's position also contravenes the policy goal of providing certainty and fairness in sentencing. See Guidelines ch. 1, pt. A policy statement. It offers no discernible boundaries to guide sentencing judges in determining whether the obstruction adjustment is to be applied. Under the government's urged interpretation, any criminal taking affirmative steps to avoid detection (a bank robber wearing a mask, a murderer wearing gloves) would arguably qualify for an adjustment under section 3C1.1. Such a possibility, in our view, promises nothing but inconsistency in the application of section 3C1.1, leaving judges to draw lines based solely on instinct. As the Supreme Court stated in Busic: "Our task here is to locate one of the boundaries, and the inquiry is not advanced by the assertion that Congress wanted no boundaries." 446 U.S. at 408. Our decision that section 3C1.1 may not be cumulatively applied to conduct accounted for in other sections of the Guidelines offers a boundary we think the Sentencing Commission intended.
CONCLUSION
17
We hold that the district court erred in applying section 3C1.1 to Werlinger's attempts to solicit his co-workers to help him conceal his embezzlement from the bank's internal auditors. We therefore reverse and remand this case for resentencing consistent with this opinion.
*
The Honorable EARL R. LARSON, Senior United States District Judge for the District of Minnesota, sitting by designation
1
The Honorable Rodney K. Webb, United States District Judge for the District of North Dakota
2
The Sentencing Commission has acknowledged the inconsistency in finding that a defendant has accepted responsibility and at the same time obstructed justice. The commentary to the 1988 version of the Guidelines (which were applicable at the time of Werlinger's sentencing) stated: "An adjustment under [Sec. 3E1.1] is not warranted where a defendant perjures himself, suborns perjury, or otherwise obstructs the trial or administration of justice (see Sec. 3C.1), regardless of other factors." Guidelines Sec. 3E1.1 application note 4 (1988). In 1989, the Commission amended this commentary to acknowledge that there may be "extraordinary cases in which adjustments under both Secs. 3C1.1 and 3E1.1 may apply." Guidelines Sec. 3E1.1 application note 4 (1989)
The government recognizes this inconsistency, but argues that the error should lie in granting Werlinger a downward adjustment for acceptance of responsibility, not in applying the adjustment for obstruction of justice. Because our decision that the "obstruction" adjustment is not warranted in this case rests on other rationale, we need not examine the effect of the commentary. We do, however, think this inconsistency lends support to our decision.
3
Courts have construed the criminal offense of obstructing justice, 18 U.S.C. Sec. 1503, to apply only to conduct occurring after the commencement of formal judicial proceedings. See, e.g., Pettibone v. United States, 148 U.S. 197, 207, 13 S.Ct. 542, 546, 37 L.Ed. 419 (1893); United States v. Johnson, 605 F.2d 729, 730 (4th Cir.1979), cert. denied, 444 U.S. 1020, 100 S.Ct. 677, 62 L.Ed.2d 652 (1980); United States v. Walasek, 527 F.2d 676, 678 (3d Cir.1975); Ferina v. United States, 302 F.2d 95, 102 (8th Cir.), cert. denied, 371 U.S. 819, 83 S.Ct. 35, 9 L.Ed.2d 59 (1962)
4
The commentary suggests that "more than minimal planning" in the embezzlement context contemplates more than a single taking using a single false book entry. It would apply, however, to "several instances of taking money, each accompanied by false entries." Guidelines Sec. 1B1.1 application note 1(f)
5
We acknowledge that the cases we have cited in support of these principles involve the interpretation of sentence enhancement statutes requiring independent conviction, see Simpson, 435 U.S. at 7-8, 98 S.Ct. at 910; Busic, 446 U.S. at 401, 100 S.Ct. at 1750, or the question whether a single offense authorizes cumulative penalties on separate counts, see Bell, 349 U.S. at 82, 75 S.Ct. at 621, or the question whether cumulative penalties are authorized for lesser included offenses, see Whalen, 445 U.S. at 686, 100 S.Ct. at 1434. Here, of course, we have a conviction on a single count of a single offense, and must determine the extent to which multiple sections of the Sentencing Guidelines apply. Nevertheless, we find these cases sufficiently analogous to allow their principles to guide us in construing the Guidelines
6
For example, Chapter Three authorizes adjustments based on the vulnerability of the victim, Guidelines Sec. 3A1.1, the defendant's relative role in the offense, id. Sec. 3B1.1, and the defendant's acceptance of responsibility for his conduct, id. Sec. 3E1.1
|
{
"pile_set_name": "FreeLaw"
}
|
Q:
How to specify anonymous object as generic parameter?
Let's suppose I have the following task:
var task = _entityManager.UseRepositoryAsync(async (repo) =>
{
IEnumerable<Entity> found = //... Get from repository
return new
{
Data = found.ToList()
};
}
What is the type of task?
Actually, it turns out to be: System.Threading.Tasks.Task<'a>,
where 'a is anonymous type: { List<object> Data }
How can I explicitly state this type without using var?
I have tried Task<a'> task = ... or Task<object> task = ... but can't manage it to compile.
Why do I need to do this?
I have a method (UseApplicationCache<T>), that takes a Func<Task<T>> as a parameter.
I also have a variable cache that the user might set to true or false.
If true, the above said method should be called and my task should be passed as argument, if false, I should execute my task without giving it as an argument to the method.
My end result would be something like this:
Func<Task<?>> fetch = () => _entityManager.UseRepositoryAsync(async (repo) =>
{
IEnumerable<Entity> found = //... Get from repository
return new { Data = found.ToList() };
}
return await (cache ? UseApplicationCache(fetch) : fetch());
A:
How can I explicitly state this type
You cannot. An anonymous type has no name, hence cannot be explicitly mentioned.
The anonymous type can be inferred if you create a generic helper method. In your case, you can do:
static Func<TAnon> InferAnonymousType<TAnon>(Func<TAnon> f)
{
return f;
}
With that you can just do:
var fetch = InferAnonymousType(() => _entityManager.UseRepositoryAsync(async (repo) =>
{
IEnumerable<Entity> found = //... Get from repository
return new { Data = found.ToList() };
}
));
return await (cache ? UseApplicationCache(fetch) : fetch());
The "value" of TAnon will be automatically inferred.
|
{
"pile_set_name": "StackExchange"
}
|
Wild Onion (album)
Wild Onion is the second studio album by American rock band Twin Peaks. It was released on August 5, 2014 in North America by Grand Jury and later in the rest of the world by Communion.
Reception
Wild Onion received positive reviews. The A.V. Club notes that the album "doubles both its length and offerings, while considerably upgrading the songwriting and production values." Rolling Stone praises the album, while comparing the band to some of their biggest influences: The Rolling Stones and The Velvet Underground. "The spunky quartet pull off Exile-era Stones strut and Velvet Underground guitar poesy with sophistication that's beyond their years, and a sense of humor, too." Consequence of Sound says, "Rather than a barrier, the band's youthfulness might be their biggest weapon... listening to Wild Onion just makes you hungry to see what else they have in store."
Track listing
Personnel
Twin Peaks
Connor Brodner – drums
Jack Dolan – vocals, bass guitar
Clay Frankel – vocals, guitar
Cadien Lake James – vocals, guitar
Production
Doug Boehm – mixer
Colin Croom – producer, recording
R. Andrew Humphrey – producer, recording
Pete Lyman – mastering
References
Category:2014 albums
Category:Twin Peaks (band) albums
|
{
"pile_set_name": "Wikipedia (en)"
}
|
<!DOCTYPE HTML>
<!-- NewPage -->
<html lang="en">
<head>
<!-- Generated by javadoc -->
<title>ConstantCallSite (Java SE 12 & JDK 12 )</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta name="keywords" content="java.lang.invoke.ConstantCallSite class">
<meta name="keywords" content="getTarget()">
<meta name="keywords" content="setTarget()">
<meta name="keywords" content="dynamicInvoker()">
<link rel="stylesheet" type="text/css" href="../../../../stylesheet.css" title="Style">
<link rel="stylesheet" type="text/css" href="../../../../jquery/jquery-ui.css" title="Style">
<script type="text/javascript" src="../../../../script.js"></script>
<script type="text/javascript" src="../../../../jquery/jszip/dist/jszip.min.js"></script>
<script type="text/javascript" src="../../../../jquery/jszip-utils/dist/jszip-utils.min.js"></script>
<!--[if IE]>
<script type="text/javascript" src="../../../../jquery/jszip-utils/dist/jszip-utils-ie.min.js"></script>
<![endif]-->
<script type="text/javascript" src="../../../../jquery/jquery-3.3.1.js"></script>
<script type="text/javascript" src="../../../../jquery/jquery-migrate-3.0.1.js"></script>
<script type="text/javascript" src="../../../../jquery/jquery-ui.js"></script>
</head>
<body>
<script type="text/javascript"><!--
try {
if (location.href.indexOf('is-external=true') == -1) {
parent.document.title="ConstantCallSite (Java SE 12 & JDK 12 )";
}
}
catch(err) {
}
//-->
var data = {"i0":10,"i1":10,"i2":10};
var tabs = {65535:["t0","All Methods"],2:["t2","Instance Methods"],8:["t4","Concrete Methods"]};
var altColor = "altColor";
var rowColor = "rowColor";
var tableTab = "tableTab";
var activeTableTab = "activeTableTab";
var pathtoroot = "../../../../";
var useModuleDirectories = true;
loadScripts(document, 'script');</script>
<noscript>
<div>JavaScript is disabled on your browser.</div>
</noscript>
<header role="banner">
<nav role="navigation">
<div class="fixedNav">
<!-- ========= START OF TOP NAVBAR ======= -->
<div class="topNav"><a id="navbar.top">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.top" title="Skip navigation links">Skip navigation links</a></div>
<a id="navbar.top.firstrow">
<!-- -->
</a>
<ul class="navList" title="Navigation">
<li><a href="../../../../index.html">Overview</a></li>
<li><a href="../../../module-summary.html">Module</a></li>
<li><a href="package-summary.html">Package</a></li>
<li class="navBarCell1Rev">Class</li>
<li><a href="class-use/ConstantCallSite.html">Use</a></li>
<li><a href="package-tree.html">Tree</a></li>
<li><a href="../../../../deprecated-list.html">Deprecated</a></li>
<li><a href="../../../../index-files/index-1.html">Index</a></li>
<li><a href="../../../../help-doc.html">Help</a></li>
</ul>
<div class="aboutLanguage"><div style="margin-top: 14px;"><strong>Java SE 12 & JDK 12</strong> </div></div>
</div>
<div class="subNav">
<div>
<ul class="subNavList">
<li>Summary: </li>
<li>Nested | </li>
<li>Field | </li>
<li><a href="#constructor.summary">Constr</a> | </li>
<li><a href="#method.summary">Method</a></li>
</ul>
<ul class="subNavList">
<li>Detail: </li>
<li>Field | </li>
<li><a href="#constructor.detail">Constr</a> | </li>
<li><a href="#method.detail">Method</a></li>
</ul>
</div>
<ul class="navListSearch">
<li><label for="search">SEARCH:</label>
<input type="text" id="search" value="search" disabled="disabled">
<input type="reset" id="reset" value="reset" disabled="disabled">
</li>
</ul>
</div>
<a id="skip.navbar.top">
<!-- -->
</a>
<!-- ========= END OF TOP NAVBAR ========= -->
</div>
<div class="navPadding"> </div>
<script type="text/javascript"><!--
$('.navPadding').css('padding-top', $('.fixedNav').css("height"));
//-->
</script>
</nav>
</header>
<!-- ======== START OF CLASS DATA ======== -->
<main role="main">
<div class="header">
<div class="subTitle"><span class="moduleLabelInType">Module</span> <a href="../../../module-summary.html">java.base</a></div>
<div class="subTitle"><span class="packageLabelInType">Package</span> <a href="package-summary.html">java.lang.invoke</a></div>
<h2 title="Class ConstantCallSite" class="title">Class ConstantCallSite</h2>
</div>
<div class="contentContainer">
<ul class="inheritance">
<li><a href="../Object.html" title="class in java.lang">java.lang.Object</a></li>
<li>
<ul class="inheritance">
<li><a href="CallSite.html" title="class in java.lang.invoke">java.lang.invoke.CallSite</a></li>
<li>
<ul class="inheritance">
<li>java.lang.invoke.ConstantCallSite</li>
</ul>
</li>
</ul>
</li>
</ul>
<div class="description">
<ul class="blockList">
<li class="blockList">
<hr>
<pre>public class <span class="typeNameLabel">ConstantCallSite</span>
extends <a href="CallSite.html" title="class in java.lang.invoke">CallSite</a></pre>
<div class="block">A <code>ConstantCallSite</code> is a <a href="CallSite.html" title="class in java.lang.invoke"><code>CallSite</code></a> whose target is permanent, and can never be changed.
An <code>invokedynamic</code> instruction linked to a <code>ConstantCallSite</code> is permanently
bound to the call site's target.</div>
<dl>
<dt><span class="simpleTagLabel">Since:</span></dt>
<dd>1.7</dd>
</dl>
</li>
</ul>
</div>
<div class="summary">
<ul class="blockList">
<li class="blockList">
<!-- ======== CONSTRUCTOR SUMMARY ======== -->
<section role="region">
<ul class="blockList">
<li class="blockList"><a id="constructor.summary">
<!-- -->
</a>
<h3>Constructor Summary</h3>
<div class="memberSummary">
<table>
<caption><span>Constructors</span><span class="tabEnd"> </span></caption>
<tr>
<th class="colFirst" scope="col">Modifier</th>
<th class="colSecond" scope="col">Constructor</th>
<th class="colLast" scope="col">Description</th>
</tr>
<tbody>
<tr class="altColor">
<td class="colFirst"><code> </code></td>
<th class="colConstructorName" scope="row"><code><span class="memberNameLink"><a href="#%3Cinit%3E(java.lang.invoke.MethodHandle)">ConstantCallSite</a></span>​(<a href="MethodHandle.html" title="class in java.lang.invoke">MethodHandle</a> target)</code></th>
<td class="colLast">
<div class="block">Creates a call site with a permanent target.</div>
</td>
</tr>
<tr class="rowColor">
<td class="colFirst"><code>protected </code></td>
<th class="colConstructorName" scope="row"><code><span class="memberNameLink"><a href="#%3Cinit%3E(java.lang.invoke.MethodType,java.lang.invoke.MethodHandle)">ConstantCallSite</a></span>​(<a href="MethodType.html" title="class in java.lang.invoke">MethodType</a> targetType,
<a href="MethodHandle.html" title="class in java.lang.invoke">MethodHandle</a> createTargetHook)</code></th>
<td class="colLast">
<div class="block">Creates a call site with a permanent target, possibly bound to the call site itself.</div>
</td>
</tr>
</tbody>
</table>
</div>
</li>
</ul>
</section>
<!-- ========== METHOD SUMMARY =========== -->
<section role="region">
<ul class="blockList">
<li class="blockList"><a id="method.summary">
<!-- -->
</a>
<h3>Method Summary</h3>
<div class="memberSummary">
<div role="tablist" aria-orientation="horizontal"><button role="tab" aria-selected="true" aria-controls="memberSummary_tabpanel" tabindex="0" onkeydown="switchTab(event)" id="t0" class="activeTableTab">All Methods</button><button role="tab" aria-selected="false" aria-controls="memberSummary_tabpanel" tabindex="-1" onkeydown="switchTab(event)" id="t2" class="tableTab" onclick="show(2);">Instance Methods</button><button role="tab" aria-selected="false" aria-controls="memberSummary_tabpanel" tabindex="-1" onkeydown="switchTab(event)" id="t4" class="tableTab" onclick="show(8);">Concrete Methods</button></div>
<div id="memberSummary_tabpanel" role="tabpanel">
<table aria-labelledby="t0">
<tr>
<th class="colFirst" scope="col">Modifier and Type</th>
<th class="colSecond" scope="col">Method</th>
<th class="colLast" scope="col">Description</th>
</tr>
<tbody>
<tr class="altColor" id="i0">
<td class="colFirst"><code><a href="MethodHandle.html" title="class in java.lang.invoke">MethodHandle</a></code></td>
<th class="colSecond" scope="row"><code><span class="memberNameLink"><a href="#dynamicInvoker()">dynamicInvoker</a></span>()</code></th>
<td class="colLast">
<div class="block">Returns this call site's permanent target.</div>
</td>
</tr>
<tr class="rowColor" id="i1">
<td class="colFirst"><code><a href="MethodHandle.html" title="class in java.lang.invoke">MethodHandle</a></code></td>
<th class="colSecond" scope="row"><code><span class="memberNameLink"><a href="#getTarget()">getTarget</a></span>()</code></th>
<td class="colLast">
<div class="block">Returns the target method of the call site, which behaves
like a <code>final</code> field of the <code>ConstantCallSite</code>.</div>
</td>
</tr>
<tr class="altColor" id="i2">
<td class="colFirst"><code>void</code></td>
<th class="colSecond" scope="row"><code><span class="memberNameLink"><a href="#setTarget(java.lang.invoke.MethodHandle)">setTarget</a></span>​(<a href="MethodHandle.html" title="class in java.lang.invoke">MethodHandle</a> ignore)</code></th>
<td class="colLast">
<div class="block">Always throws an <a href="../UnsupportedOperationException.html" title="class in java.lang"><code>UnsupportedOperationException</code></a>.</div>
</td>
</tr>
</tbody>
</table>
</div>
</div>
<ul class="blockList">
<li class="blockList"><a id="methods.inherited.from.class.java.lang.invoke.CallSite">
<!-- -->
</a>
<h3>Methods declared in class java.lang.invoke.<a href="CallSite.html" title="class in java.lang.invoke">CallSite</a></h3>
<code><a href="CallSite.html#type()">type</a></code></li>
</ul>
<ul class="blockList">
<li class="blockList"><a id="methods.inherited.from.class.java.lang.Object">
<!-- -->
</a>
<h3>Methods declared in class java.lang.<a href="../Object.html" title="class in java.lang">Object</a></h3>
<code><a href="../Object.html#clone()">clone</a>, <a href="../Object.html#equals(java.lang.Object)">equals</a>, <a href="../Object.html#finalize()">finalize</a>, <a href="../Object.html#getClass()">getClass</a>, <a href="../Object.html#hashCode()">hashCode</a>, <a href="../Object.html#notify()">notify</a>, <a href="../Object.html#notifyAll()">notifyAll</a>, <a href="../Object.html#toString()">toString</a>, <a href="../Object.html#wait()">wait</a>, <a href="../Object.html#wait(long)">wait</a>, <a href="../Object.html#wait(long,int)">wait</a></code></li>
</ul>
</li>
</ul>
</section>
</li>
</ul>
</div>
<div class="details">
<ul class="blockList">
<li class="blockList">
<!-- ========= CONSTRUCTOR DETAIL ======== -->
<section role="region">
<ul class="blockList">
<li class="blockList"><a id="constructor.detail">
<!-- -->
</a>
<h3>Constructor Detail</h3>
<a id="<init>(java.lang.invoke.MethodHandle)">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>ConstantCallSite</h4>
<pre>public ConstantCallSite​(<a href="MethodHandle.html" title="class in java.lang.invoke">MethodHandle</a> target)</pre>
<div class="block">Creates a call site with a permanent target.</div>
<dl>
<dt><span class="paramLabel">Parameters:</span></dt>
<dd><code>target</code> - the target to be permanently associated with this call site</dd>
<dt><span class="throwsLabel">Throws:</span></dt>
<dd><code><a href="../NullPointerException.html" title="class in java.lang">NullPointerException</a></code> - if the proposed target is null</dd>
</dl>
</li>
</ul>
<a id="<init>(java.lang.invoke.MethodType,java.lang.invoke.MethodHandle)">
<!-- -->
</a>
<ul class="blockListLast">
<li class="blockList">
<h4>ConstantCallSite</h4>
<pre>protected ConstantCallSite​(<a href="MethodType.html" title="class in java.lang.invoke">MethodType</a> targetType,
<a href="MethodHandle.html" title="class in java.lang.invoke">MethodHandle</a> createTargetHook)
throws <a href="../Throwable.html" title="class in java.lang">Throwable</a></pre>
<div class="block">Creates a call site with a permanent target, possibly bound to the call site itself.
<p>
During construction of the call site, the <code>createTargetHook</code> is invoked to
produce the actual target, as if by a call of the form
<code>(MethodHandle) createTargetHook.invoke(this)</code>.
<p>
Note that user code cannot perform such an action directly in a subclass constructor,
since the target must be fixed before the <code>ConstantCallSite</code> constructor returns.
<p>
The hook is said to bind the call site to a target method handle,
and a typical action would be <code>someTarget.bindTo(this)</code>.
However, the hook is free to take any action whatever,
including ignoring the call site and returning a constant target.
<p>
The result returned by the hook must be a method handle of exactly
the same type as the call site.
<p>
While the hook is being called, the new <code>ConstantCallSite</code>
object is in a partially constructed state.
In this state,
a call to <code>getTarget</code>, or any other attempt to use the target,
will result in an <code>IllegalStateException</code>.
It is legal at all times to obtain the call site's type using the <code>type</code> method.</div>
<dl>
<dt><span class="paramLabel">Parameters:</span></dt>
<dd><code>targetType</code> - the type of the method handle to be permanently associated with this call site</dd>
<dd><code>createTargetHook</code> - a method handle to invoke (on the call site) to produce the call site's target</dd>
<dt><span class="throwsLabel">Throws:</span></dt>
<dd><code><a href="WrongMethodTypeException.html" title="class in java.lang.invoke">WrongMethodTypeException</a></code> - if the hook cannot be invoked on the required arguments,
or if the target returned by the hook is not of the given <code>targetType</code></dd>
<dd><code><a href="../NullPointerException.html" title="class in java.lang">NullPointerException</a></code> - if the hook returns a null value</dd>
<dd><code><a href="../ClassCastException.html" title="class in java.lang">ClassCastException</a></code> - if the hook returns something other than a <code>MethodHandle</code></dd>
<dd><code><a href="../Throwable.html" title="class in java.lang">Throwable</a></code> - anything else thrown by the hook function</dd>
</dl>
</li>
</ul>
</li>
</ul>
</section>
<!-- ============ METHOD DETAIL ========== -->
<section role="region">
<ul class="blockList">
<li class="blockList"><a id="method.detail">
<!-- -->
</a>
<h3>Method Detail</h3>
<a id="getTarget()">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>getTarget</h4>
<pre class="methodSignature">public final <a href="MethodHandle.html" title="class in java.lang.invoke">MethodHandle</a> getTarget()</pre>
<div class="block">Returns the target method of the call site, which behaves
like a <code>final</code> field of the <code>ConstantCallSite</code>.
That is, the target is always the original value passed
to the constructor call which created this instance.</div>
<dl>
<dt><span class="overrideSpecifyLabel">Specified by:</span></dt>
<dd><code><a href="CallSite.html#getTarget()">getTarget</a></code> in class <code><a href="CallSite.html" title="class in java.lang.invoke">CallSite</a></code></dd>
<dt><span class="returnLabel">Returns:</span></dt>
<dd>the immutable linkage state of this call site, a constant method handle</dd>
<dt><span class="throwsLabel">Throws:</span></dt>
<dd><code><a href="../IllegalStateException.html" title="class in java.lang">IllegalStateException</a></code> - if the <code>ConstantCallSite</code> constructor has not completed</dd>
<dt><span class="seeLabel">See Also:</span></dt>
<dd><a href="ConstantCallSite.html" title="class in java.lang.invoke"><code>ConstantCallSite</code></a>,
<a href="VolatileCallSite.html" title="class in java.lang.invoke"><code>VolatileCallSite</code></a>,
<a href="CallSite.html#setTarget(java.lang.invoke.MethodHandle)"><code>CallSite.setTarget(java.lang.invoke.MethodHandle)</code></a>,
<a href="#getTarget()"><code>getTarget()</code></a>,
<a href="MutableCallSite.html#getTarget()"><code>MutableCallSite.getTarget()</code></a>,
<a href="VolatileCallSite.html#getTarget()"><code>VolatileCallSite.getTarget()</code></a></dd>
</dl>
</li>
</ul>
<a id="setTarget(java.lang.invoke.MethodHandle)">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>setTarget</h4>
<pre class="methodSignature">public final void setTarget​(<a href="MethodHandle.html" title="class in java.lang.invoke">MethodHandle</a> ignore)</pre>
<div class="block">Always throws an <a href="../UnsupportedOperationException.html" title="class in java.lang"><code>UnsupportedOperationException</code></a>.
This kind of call site cannot change its target.</div>
<dl>
<dt><span class="overrideSpecifyLabel">Specified by:</span></dt>
<dd><code><a href="CallSite.html#setTarget(java.lang.invoke.MethodHandle)">setTarget</a></code> in class <code><a href="CallSite.html" title="class in java.lang.invoke">CallSite</a></code></dd>
<dt><span class="paramLabel">Parameters:</span></dt>
<dd><code>ignore</code> - a new target proposed for the call site, which is ignored</dd>
<dt><span class="throwsLabel">Throws:</span></dt>
<dd><code><a href="../UnsupportedOperationException.html" title="class in java.lang">UnsupportedOperationException</a></code> - because this kind of call site cannot change its target</dd>
<dt><span class="seeLabel">See Also:</span></dt>
<dd><a href="CallSite.html#getTarget()"><code>CallSite.getTarget()</code></a>,
<a href="#setTarget(java.lang.invoke.MethodHandle)"><code>setTarget(java.lang.invoke.MethodHandle)</code></a>,
<a href="MutableCallSite.html#setTarget(java.lang.invoke.MethodHandle)"><code>MutableCallSite.setTarget(java.lang.invoke.MethodHandle)</code></a>,
<a href="VolatileCallSite.html#setTarget(java.lang.invoke.MethodHandle)"><code>VolatileCallSite.setTarget(java.lang.invoke.MethodHandle)</code></a></dd>
</dl>
</li>
</ul>
<a id="dynamicInvoker()">
<!-- -->
</a>
<ul class="blockListLast">
<li class="blockList">
<h4>dynamicInvoker</h4>
<pre class="methodSignature">public final <a href="MethodHandle.html" title="class in java.lang.invoke">MethodHandle</a> dynamicInvoker()</pre>
<div class="block">Returns this call site's permanent target.
Since that target will never change, this is a correct implementation
of <a href="CallSite.html#dynamicInvoker()"><code>CallSite.dynamicInvoker</code></a>.</div>
<dl>
<dt><span class="overrideSpecifyLabel">Specified by:</span></dt>
<dd><code><a href="CallSite.html#dynamicInvoker()">dynamicInvoker</a></code> in class <code><a href="CallSite.html" title="class in java.lang.invoke">CallSite</a></code></dd>
<dt><span class="returnLabel">Returns:</span></dt>
<dd>the immutable linkage state of this call site, a constant method handle</dd>
<dt><span class="throwsLabel">Throws:</span></dt>
<dd><code><a href="../IllegalStateException.html" title="class in java.lang">IllegalStateException</a></code> - if the <code>ConstantCallSite</code> constructor has not completed</dd>
</dl>
</li>
</ul>
</li>
</ul>
</section>
</li>
</ul>
</div>
</div>
</main>
<!-- ========= END OF CLASS DATA ========= -->
<footer role="contentinfo">
<nav role="navigation">
<!-- ======= START OF BOTTOM NAVBAR ====== -->
<div class="bottomNav"><a id="navbar.bottom">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.bottom" title="Skip navigation links">Skip navigation links</a></div>
<a id="navbar.bottom.firstrow">
<!-- -->
</a>
<ul class="navList" title="Navigation">
<li><a href="../../../../index.html">Overview</a></li>
<li><a href="../../../module-summary.html">Module</a></li>
<li><a href="package-summary.html">Package</a></li>
<li class="navBarCell1Rev">Class</li>
<li><a href="class-use/ConstantCallSite.html">Use</a></li>
<li><a href="package-tree.html">Tree</a></li>
<li><a href="../../../../deprecated-list.html">Deprecated</a></li>
<li><a href="../../../../index-files/index-1.html">Index</a></li>
<li><a href="../../../../help-doc.html">Help</a></li>
</ul>
<div class="aboutLanguage"><div style="margin-top: 14px;"><strong>Java SE 12 & JDK 12</strong> </div></div>
</div>
<div class="subNav">
<div>
<ul class="subNavList">
<li>Summary: </li>
<li>Nested | </li>
<li>Field | </li>
<li><a href="#constructor.summary">Constr</a> | </li>
<li><a href="#method.summary">Method</a></li>
</ul>
<ul class="subNavList">
<li>Detail: </li>
<li>Field | </li>
<li><a href="#constructor.detail">Constr</a> | </li>
<li><a href="#method.detail">Method</a></li>
</ul>
</div>
</div>
<a id="skip.navbar.bottom">
<!-- -->
</a>
<!-- ======== END OF BOTTOM NAVBAR ======= -->
</nav>
<p class="legalCopy"><small><a href="https://bugreport.java.com/bugreport/">Report a bug or suggest an enhancement</a><br> For further API reference and developer documentation see the <a href="https://docs.oracle.com/pls/topic/lookup?ctx=javase12.0.2&id=homepage" target="_blank">Java SE Documentation</a>, which contains more detailed, developer-targeted descriptions with conceptual overviews, definitions of terms, workarounds, and working code examples.<br> Java is a trademark or registered trademark of Oracle and/or its affiliates in the US and other countries.<br> <a href="../../../../../legal/copyright.html">Copyright</a> © 1993, 2019, Oracle and/or its affiliates, 500 Oracle Parkway, Redwood Shores, CA 94065 USA.<br>All rights reserved. Use is subject to <a href="https://www.oracle.com/technetwork/java/javase/terms/license/java12.0.2speclicense.html">license terms</a> and the <a href="https://www.oracle.com/technetwork/java/redist-137594.html">documentation redistribution policy</a>. <!-- Version 12.0.2+10 --></small></p>
</footer>
</body>
</html>
|
{
"pile_set_name": "Github"
}
|
Microsoft and Starbucks have joined a list of corporations showing their support for same-sex marriage in Washington state, the Seattle Times reported.
Washington is attempting to join Connecticut, Iowa, Massachusetts, New Hampshire, New York, Vermont and the District of Columbia as another state with legal gay marriage. Although the state already has a domestic partnership law in place, its Senate Bill 6239 would extend full marriage equality, MSNBC reported.
Read more at GlobalPost: Washington state lawmakers have the votes to legalize gay marriage
Microsoft, which is headquartered in Redmond, is the biggest corporation to back the bill.
"As other states recognize marriage equality, Washington's employers are at a disadvantage if we cannot offer a similar, inclusive environment to our talented employees, our top recruits, and their families," said Brad Smith, Microsoft’s executive vice president of legal and corporate affairs in a statement, MSNBC reported.
Starbucks, the international coffee giant, which is based in Seattle, also wrote a letter backing the bill. “Starbucks is proud to join other leading Northwest employers in support of Washington State legislation recognizing marriage equality for same-sex couples,” Kalen Holmes, executive vice president, wrote, the Seattle Times reported.
According to the Associated Press, Washington’s Legislature has enough votes to legalize gay marriage as of Monday, when Democratic Sen. Mary Margaret Haugen released a statement saying she’ll support the measure. Haugen became the 25th vote, which was needed to pass the bill out to the Senate.
Read more at GlobalPost: Gregoire pushes to legalize same-sex marriage in Washington
|
{
"pile_set_name": "OpenWebText2"
}
|
Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 New pics In Morning,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 Latest Photos,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 New images,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 New Pictures,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 Photoshoots,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 news,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 sports gallery,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 latest album,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 Exclusive picture collection,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 photo,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 new photo shoot,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 latest interview,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 new tour,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 black shoot,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 new hair style,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 in U.S.A, Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 in U.K,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 in London, Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 in Canada,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 in South America,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 in Australia,Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 All ClicksDakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 celebrityphotosdaily.comDakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 celebrityphotosdailyDakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 celebrity photos daily comDakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 Private ShootDakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 Public ShootDakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 Public TourDakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 InDakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 LOSDakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 NYCDakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 Magazinecelebrity photos daily.com Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019Dakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 Celb PhotosDakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 Celeb PicsDakota Johnson Clicks at The Peanut Butter Falcon Special Screening in Los Angeles 1 Aug-2019 Daily Pics
|
{
"pile_set_name": "OpenWebText2"
}
|
Bayesian econometrics
Bayesian econometrics is a branch of econometrics which applies Bayesian principles to economic modelling. Bayesianism is based on a degree-of-belief interpretation of probability, as opposed to a relative-frequency interpretation.
The Bayesian principle relies on Bayes' theorem which states that the probability of B conditional on A is the ratio of joint probability of A and B divided by probability of B. Bayesian econometricians assume that coefficients in the model have prior distributions.
This approach was first propagated by Arnold Zellner.
Basics
Subjective probabilities have to satisfy the standard axioms of probability theory if one wishes to avoid losing a bet regardless of the outcome. Before the data is observed, the parameter is regarded as an unknown quantity and thus random variable, which is assigned a prior distribution with . Bayesian analysis concentrates on the inference of the posterior distribution , i.e. the distribution of the random variable conditional on the observation of the discrete data . The posterior density function can be computed based on Bayes' Theorem:
where , yielding a normalized probability function. For continuous data , this corresponds to:
where and which is the centerpiece of Bayesian statistics and econometrics. It has the following components:
: the posterior density function of ;
: the likelihood function, i.e. the density function for the observed data when the parameter value is ;
: the prior distribution of ;
: the probability density function of .
The posterior function is given by , i.e., the posterior function is proportional to the product of the likelihood function and the prior distribution, and can be understood as a method of updating information, with the difference between and being the information gain concerning after observing new data. The choice of the prior distribution is used to impose restrictions on , e.g. , with the beta distribution as a common choice due to (i) being defined between 0 and 1, (ii) being able to produce a variety of shapes, and (iii) yielding a posterior distribution of the standard form if combined with the likelihood function . Based on the properties of the beta distribution, an ever-larger sample size implies that the mean of the posterior distribution approximates the maximum likelihood estimator
The assumed form of the likelihood function is part of the prior information and has to be justified. Different distributional assumptions can be compared using posterior odds ratios if a priori grounds fail to provide a clear choice. Commonly assumed forms include the beta distribution, the gamma distribution, and the uniform distribution, among others. If the model contains multiple parameters, the parameter can be redefined as a vector. Applying probability theory to that vector of parameters yields the marginal and conditional distributions of individual parameters or parameter groups. If data generation is sequential, Bayesian principles imply that the posterior distribution for the parameter based on new evidence will be proportional to the product of the likelihood for the new data, given previous data and the parameter, and the posterior distribution for the parameter, given the old data, which provides an intuitive way of allowing new information to influence beliefs about a parameter through Bayesian updating. If the sample size is large, (i) the prior distribution plays a relatively small role in determining the posterior distribution, (ii) the posterior distribution converges to a degenerate distribution at the true value of the parameter, and (iii) the posterior distribution is approximately normally distributed with mean .
History
The ideas underlying Bayesian statistics were developed by Rev. Thomas Bayes during the 18th century and later expanded by Pierre-Simon Laplace. As early as 1950, the potential of the Bayesian inference in econometrics was recognized by Jacob Marschak. The Bayesian approach was first applied to econometrics in the early 1960s by W. D. Fisher, Jacques Drèze, Clifford Hildreth, Thomas J. Rothenberg, George Tiao, and Arnold Zellner. The central motivation behind these early endeavors in Bayesian econometrics was the combination of the parameter estimators with available uncertain information on the model parameters that was not included in a given model formulation. From the mid-1960s to the mid-1970s, the reformulation of econometric techniques along Bayesian principles under the traditional structural approach dominated the research agenda, with Zellner's An Introduction to Bayesian Inference in Econometrics in 1971 as one of its highlights, and thus closely followed the work of frequentist econometrics. Therein, the main technical issues were the difficulty of specifying prior densities without losing either economic interpretation or mathematical tractability and the difficulty of integral calculation in the context of density functions. The result of the Bayesian reformulation program was to highlight the fragility of structural models to uncertain specification. This fragility came to motivate the work of Edward Leamer, who emphatically criticized modelers' tendency to indulge in "post-data model construction" and consequently developed a method of economic modelling based on the selection of regression models according to the types of prior density specification in order to identify the prior structures underlying modelers' working rules in model selection explicitly. Bayesian econometrics also became attractive to Christopher Sims' attempt to move from structural modeling to VAR modeling due to its explicit probability specification of parameter restrictions. Driven by the rapid growth of computing capacities from the mid-1980s on, the application of Markov chain Monte Carlo simulation to statistical and econometric models, first performed in the early 1990s, enabled Bayesian analysis to drastically increase its influence in economics and econometrics.
Current research topics
Since the beginning of the 21st century, research in Bayesian econometrics has concentrated on:
sampling methods suitable for parallelization and GPU calculations;
complex economic models accounting for nonlinear effects and complete predictive densities;
analysis of implied model features and decision analysis;
incorporation of model incompleteness in econometric analysis.
References
Category:Econometric modeling
Econometrics
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Kings Make History. Sharks Become History.
Season Ends- The San Jose Sharks in the end not only did not realize their dream to win the Stanley Cup, they frankly never came close. The Los Angeles Kings once again dominated the Sharks when it mattered the most. The Kings would dominate and control the later part of Game 7 in route to a 5-1 win. The Kings move on to the next round of the Western Conference playoffs against the Anaheim Ducks. The Sharks meanwhile move on to a long and bitter off-season with very heavy handed questions not only about the team but likely about the franchise too. This was a stinging defeat for Team Teal as they become the fourth team in NHL history to blow a 3-0 series lead and fall victim to a “reverse sweep.” The Sharks were outscored 18-5 in the last four games and decided beaten in Games 4 through 7. The Sharks big players were shut down again in Game 7 as the franchise has hit a new low that may take many seasons to overcome as changes may be imminent. In the end, the Sharks only have themselves to blame. In the end, the Los Angeles Kings were simply the better team over a seven game series. The Kings have beaten Team Teal in a seven games for the second straight season.
Game 7 Recap- After a scoreless first period Matt Irwin gave the Sharks the lead with his first career playoff goal 28 seconds into the second stanza. That’s the end of the Sharks highlights as the rest of the game went the Kings’ way. The Kings tied the game at 1-1 after Drew Doughty scored a power play goal following a controversial elbowing penalty to Logan Couture. Team Teal in the second period had four power play chances and failed to score each time as the Jonathan Quick was on his game. Anze Kopitar scored to put the Kings ahead for good as he hammed a puck past Antti Niemi with 1:28 remaining in the middle frame. In the third period it was all Los Angeles again as the Sharks needing their best 20 minutes of hockey just didn’t have it. Tyler Tofolli who was one of many Kings players who were a thorn in the side of the Sharks in this series scored 4:40 into the third period to put LA up 3-1. The Sharks spent most of the period chasing down pucks and fighting for their dying season in vain. Dustin Brown and Tanner Pearson scored empty net goals in the games final moments to complete the Kings historical comeback coinciding with the Sharks historical fall. Quick made 39 saves as the Kings left no doubt.
Game Over- The San Jose Sharks with this series loss are guaranteed a spot in the record books that will stain this franchise for quite some time, and sadly rightfully so. As to where the franchise even goes from here is anybody’s guess. The Los Angeles Kings like it or not in the end were simply the better team. All truth be told, if not for a tipped in goal in overtime of Game 3 the Kings wrap this series in six games. Whatever the Sharks did in the first two games of this series just did not last. Team Teal never got back to what worked. The Kings made the adjustments they needed to make, the Sharks did not. The Sharks were progressively worse with each game from four through seven. Head Coach Todd McLellan in the post game presser took responsibility for the loss and agreed this was the low point in franchise history. It is the lowest point in franchise history without question. There are no questions or answers that will come easy from here on. The Sharks right now are light years from a Stanley Cup Championship. This team as it as it is constructed right now simply is not a championship team or anything close to a Cup Contender. Team Teal as a roster does not have the collective ability to raise their game as a team to the level necessary to maintain any level of success in the playoffs. If anything they played as if they are by far the lesser of the three NHL franchises in the State of California. There were way too many missed opportunities in the last two games alone. To conclude, greatness starts at the top. For the Sharks it may not be wait until next year. It may be wait until next owner and GM.
Comments
Sharks Quietly Look Ahead- The San Jose Sharks have officially moved on from last season as a franchise. Though tough to do considering how the last season ultimately ended, realistically they have no other choice but to move on. The focus seemingly has come off of winning a Stanley Cup...
Latest on FanVsFan
It only seems like a month ago that NASCAR made the trip to the Pocono Mountains, taking to the track with three turns and three straightaways, with the one out front being the longest of any track on the circuit. Wait...they were.Of all the tracks that host two Sprint Cup events on the season, Pocono has historically been the one with the shor...
|
{
"pile_set_name": "Pile-CC"
}
|
package com.lfk.justweengine.utils.logger;
public enum LogLevel {
/**
* Prints all logs
*/
FULL,
/**
* No log will be printed
*/
NONE,
VERBOSE, DEBUG, INFO, WARN, ERROR, FATAL, ASSERT
}
|
{
"pile_set_name": "Github"
}
|
Introduction
============
With introduction of intracytoplasmic sperm injection (ICSI), new era was introduced for treatment of male factor infertility ([@B1]). In this procedure, an immobilized sperm with normal morphology is injected into a mature oocyte. Since inception of ICSI, more attentions have been given to the recognition and selection of high quality spermatozoa to improve the outcome of assisted reproduction technology (ART) treatment. It is well known that sperm quality affects the quality of generated embryo ([@B2]). Sperm morphology has been shown as the best prognostic factor, among sperm parameters, to predict spontaneous pregnancy, intra-uterine insemination (IUI) and conventional in vitro fertilization (IVF) success rates ([@B3]-[@B5]). On the other hand, injection of spermatozoa with abnormal morphology is associated with lower fertilization and implantation rates ([@B6]). In addition, the sperm morphology is a powerful tool that can be used to determine the right ART method for treating infertility ([@B7]), is the best indicator of male fertility ([@B8]) and considered a sensitive prognostic tool in IUI and IVF ([@B9]).
The selection of sperm for ICSI is according to rough morphological characteristics. Meanwhile, the assessment of sperm morphology before ICSI is difficult because of sperm motility and not precise due to observation under low magnification. There may be some sperm morphological abnormalities that are not determined, when examined at routine magnification for ICSI (×200 or ×400) or even after fixation and staining (×1000). Recently several techniques have been introduced for evaluation of sperm morphology, including light microscopy, atomic force microscopy and electron microscopy. While these are not considered as real time techniques, Bartoov et al. (2001) developed a new tool for evaluation of non-fixed sperm morphology. In this technique, using a high power inverted light microscope with magnification of \>×6000 sperm morphology is evaluated in real time more precisely and at the sub-cellular level named motile sperm organelle morphology examination (MSOME) ([@B10]). It has been shown that there is a relationship between normal morphology of spermatozoa determined by MSOME and fertilization rate, embryo quality, as well as implantation, pregnancy rates and chance of having normal child ([@B2], [@B11]-[@B22]). To the best of our knowledge, there have not been any studies regarding the comparison of MSOME criteria between IVF and ICSI cycles. We aimed to compare the sperm morphology at high magnification between cycles with successful and failed pregnancy in IVF as well as ICSI cases.
Materials and methods
=====================
**Patients**
Sixty-six infertile couples were included from October 2013 to August 2014 in this cross sectional prospective study that were treated by IVF (n=31) or ICSI (n=35) at Research and Clinical Center for Infertility, Yazd, Iran. Third party assisted reproduction cycles, patients with less than three oocytes, spermatozoa with only round head or double tail, testicular or epididymal sperm, and maternal age of \>40 years were excluded. The study was approved by the ethics committee of Yazd Reproductive Sciences institute. Signed informed consents were obtained from the patients.
**Semen collection and sperm preparation**
Semen samples were collected in sterile wide-mouth containers by masturbation following 2-5 days of abstinence. Semen analysis and preparation was performed according to standard world health organization (WHO) guidelines ([@B23]). Immediately after liquefaction, the semen samples were prepared by two layer (80/40) density gradient centrifugation method. The final pellet was resuspended in 0.5 ml pre-warmed equilibrated Ham's F10 supplemented with 5 mg/ml human serum albumin and incubated at 37^°^C with 5% CO2 until use. Makler counting chamber was used for evaluation of sperm count and motility and sperm morphology was assessed by Diff-Quick staining method.
**Motile sperm organelle morphology examination (MSOME)**
Several 5µ microdroplets of polivinylpyrrolidone (8% PVP, Vitrolife, Goteborg, Sweden) were placed on a sterile glass bottom dish (WillCo-Dish, Amsterdam, Netherlands) and overlaid withmineraloil (Ovoil 100, Vitrolife, Goteborg, Sweden). Then, 1µ of prepared sperm suspension was added to a forementioned microdroplets. The inverted microscope (TE300; Nikon, Tokyo, Japan) equipped with high power differential interference contrast optics was used for MSOME (6600×). The image's capture and video recording for further analysis was performed with software (OCTAX PolarAIDE; Octax). MSOME classification was defined according to Cassuto-Barak classification (2). Accordingly, the sperm morphology was evaluated based on the head shape, presence of vacuole in the nucleus and the head base. The score of each spermatozoon was determined as: (2×Head) + (3×Vacuole) + (Base). The scoring for each sperm cell ranged between 0 up to 6. Class I was high quality spermatozoa scored 4 to 6, Class II was medium quality spermatozoa scored 1 to 3, Class III was low quality sperm scored 0. We also defined MSOME parameters as follows: vacuoles (none, small: \<4%, medium: 4≥ \<15%, large: ≥15% of sperm head area, mix: having more than two vacuoles) ([Figures I](#F1){ref-type="fig"} and [II](#F2){ref-type="fig"}), head size (anterior-posterior diameter): normal: 5±0.2µm, small: ≤4.7µm, large: ≥5.3µm, head shape: normal: oval, abnormal: non-oval, cytoplasmic droplet: absence or presence ([Figure III](#F3){ref-type="fig"}). At least 200 motile spermatozoa per patient were assessed, and each parameter was reported as percentage. The same researcher in a blind manner performed all sperm analysis, so inter observer variability was not assessed. MSOME parameters were compared between successful and failed pregnancy.
**ICSI and IVF**
The type of ART was selected for each case based of etiology of infertility, sperm parameters, female age, and patient's history. IVF and ICSI techniques were performed as described elsewhere ([@B24]-[@B25]). Standard long protocol was used for controlled ovarian hyperstimulation which previously described ([@B26]). The injected oocytes after microinjection and conventionally inseminated COCs were evaluated 16-18 hrs later for presence of two pronuclei and two polar bodies to determine normal fertilization. Evaluations of embryo quality and embryo transfer were performed on day two. Embryo grading was previously described ([@B27]). Grade A and B embryos were considered as high quality embryos. Clinical pregnancy was confirmed after detection of fetal heart beat seven weeks after embryo transfer.
**Statistical analysis**
The data are presented as mean±SD and median (min-max) for quantitative and percentage for qualitative parameters. Shapiro-Wilk was used for evaluating normal distribution for quantitative data. Mann-Whitney U-test was applied in order to compare the MSOME parameters between IVF and ICSI groups. Chi-square test was used to compare proportions between two groups. Pearson test was performed for evaluation of correlation between different morphological parameters. The significant level was defined at p \< 0.05.
Results
=======
There were no significant differences for patient's age, sperm concentration, progressive motility, normal morphology, metaphase II oocytes, fertilized oocyte, formed embryos between successful and failed pregnancy cycles in IVF and ICSI groups ([Table I](#T1){ref-type="table"} and [II](#T2){ref-type="table"}).
Regarding MSOME parameters in IVF group, the data showed no significant difference for Cassuto-Barak classification, cytoplasmic droplet, and medium vacuole between successful and failed pregnancy cycles ([Table III](#T3){ref-type="table"}). However, the rate of LNV was significantly lower in successful pregnancies compared to the negative cycles in IVF group (7.38±4.4 vs 13.81±9.7, respectively, p=0.045), while this difference was not significant in ICSI group. Sperm shape and size were also the same between two groups. In ICSI group, only the rate of sperm shape normalcy was significantly higher in failed pregnancy compared to successful pregnancy ([Table IV](#T4){ref-type="table"}).
In IVF group, data showed a negative correlation between LNV and sperm shape normalcy (r=-0.48, p=0.006). There was also a positive correlation between the rate of combination of non-vacuole and small vacuole spermatozoa and sperm shape normalcy (r= 0.55, p=0.001). A significant positive correlation was also found between the rate of sperm normal head and normal shape(r=0.36, p=0.04) with progressive motility (r=0.38, p=0.03). In ICSI group, a negative correlation was established between cytoplasmic droplet and sperm shape normalcy (r=-0.34, p=0.04). A positive correlation between sperm shape normalcy and non-vacuolated spermatozoa (r=0.45, p=0.006), positive correlation between LNV and non-progressive motility (r=0.38, p=0.02), negative correlation between large head and normal shape (r=-0.43, p=0.009) were also found.
######
Demographic characteristics and outcomes in IVF cycles with successful and failed pregnancies
-----------------------------------------------------------------------------------------------------
**Variables** **Groups** **p-value**
---------------------------------------------------------------- -------------- --------------- -----
Male age (year) [a](#TFN1){ref-type="table-fn"} 34.2±4.9 32.8±5.9 0.6
Female age (year) [a](#TFN1){ref-type="table-fn"} 29.1±3.6 30.4±5 0.1
Sperm concentration (106 ml-1) [b](#TFN2){ref-type="table-fn"} 98.4±22.7\ 97.7±42.7\ 0.2
105 (60-120) 89.5 (50-210)
Progressive motility (%)[b](#TFN2){ref-type="table-fn"} 54.1±10.4\ 50.7±10\ 0.6
52 (38-68) 52.5 (27-70)
Normal morphology (%)[b](#TFN2){ref-type="table-fn"} 16.2±5.1\ 15.7±6.4\ 0.8
20 (10-20) 15 (8-27)
Metaphase II oocyte[b](#TFN2){ref-type="table-fn"} 13.6±5\ 9.7±4.8\ 0.2
12 (9-25) 11.5 (1-20)
Fertilized oocytes[b](#TFN2){ref-type="table-fn"} 8.6±4.7\ 8±4.4\ 0.9
7.5 (5-19) 7.5 (1-20)
Formed embryos[b](#TFN2){ref-type="table-fn"} 7.9±4.1\ 7.6±4.5\ 0.7
6.5 (5-17) 7 (1-20)
Transferred embryos[b](#TFN2){ref-type="table-fn"} 2.4±0.5\ 2.1±0.5\ 0.4
2 (2-3) 2 (1-3)
Good quality embryos (%)[\*](#TFN3){ref-type="table-fn"} 62.5 46.7 0.6
-----------------------------------------------------------------------------------------------------
: Data are shown as mean±SD (Independent sample t-test).
: Data are shown as mean±SD, median (min-max) (Man-Whitney U test).
Chi-square test
######
Demographic characteristics and outcome in ICSI cycles with successful and failed pregnancies
---------------------------------------------------------------------------------------------------
**Variables** **Groups** **p-value**
---------------------------------------------------------------- ------------- ------------- ------
Male age (year) [a](#TFN4){ref-type="table-fn"} 34.7±4.6 36.1±6 0.4
Female age (year) [a](#TFN4){ref-type="table-fn"} 31±2.8 30.3±4.9 0.7
Sperm concentration (106 ml-1) [b](#TFN5){ref-type="table-fn"} 87.1±59.7\ 67.9±32.9\ 0.4
80 (20-200) 60 (10-150)
Progressive motility (%) [b](#TFN5){ref-type="table-fn"} 23.3±19.7\ 38.8±19.5\ 0.06
21 (0-53) 42 (1-71)
Normal morphology (%) [b](#TFN5){ref-type="table-fn"} 8.1±9.3\ 12.6±8.4\ 0.1
5 (1-28) 12 (0-30)
Metaphase II oocyte[b](#TFN5){ref-type="table-fn"} 10.6±5.1\ 8.52±4.8\ 0.3
9 (4-18) 7 (3-19)
Fertilized oocytes[b](#TFN5){ref-type="table-fn"} 7.4±3.6\ 5.9±3.6\ 0.2
6 (3-12) 5 (2-16)
Formed embryos[b](#TFN5){ref-type="table-fn"} 7.4±3.6\ 5±2.7\ 0.1
6 (3-12) 6 (3-12)
Transferred embryos[b](#TFN5){ref-type="table-fn"} 2.4±0.5\ 2.3±0.4\ 0.8
2 (2-3) 2 (2-3)
Good quality embryos (%)[\*](#TFN6){ref-type="table-fn"} 85.7 43.5 0.08
---------------------------------------------------------------------------------------------------
: Data are shown as mean±SD (Independent sample t-test).
: Data are shown as mean±SD, median (min-max) (Man-Whitney U test).
Chi-square test
######
MSOME criteria and Cassuto-Barak classification in IVF group
------------------------------------------------------------------------------------
**Parameters** **Groups** **p-value**
----------------------------------------------- -------------- -------------- ------
Class I [\*](#TFN7){ref-type="table-fn"} 7.4±3.5\ 8.9±7.3\ 1
7.5 (2-12) 7.5 (0-33)
Class II[\*\*](#TFN8){ref-type="table-fn"} 52.4±14.9\ 45.9±8.3\ 0.1
52 (23-76) 47 (25-56)
Class III[\*\*\*](#TFN9){ref-type="table-fn"} 40.4±16.7\ 45.2±11.7\ 0.1
38 (17-75) 45.5 (15-69)
Class I + Class II 59.7±16.8\ 54.7±11.7\ 0.1
62 (25-83) 54.5 (31-85)
Cytoplasmic droplet 20.5±6.6\ 23.9±10.4\ 0.4
20 (10-28) 21.5 (11-47)
Large vacuole 7.4±4.4\ 13.8±9.7\ 0.04
6 (1-15) 12 (3-42)
Medium vacuole 22.5±9.8\ 26.7±8.8\ 0.3
23.5 (8-39) 25.5 (15-48)
Small vacuole 28.6±5.6\ 20±8.6\ 0.01
28.5 (20-36) 17.5 (4-40)
Non-vacuole 18.6±13.4\ 16.7±10.4\ 0.9
14.5 (6-43) 12.5 (7-45)
Mixed vacuole 22.9±8.2\ 23.7±9.6\ 0.7
20.5 (13-38) 24.5 (9-37)
Normal head 55.9±13.4\ 54.2±8.6\ 0.6
55 (30-78) 56 (39-67)
Large head 3.5±4\ 3.8±3\ 0.4
3 (0-13) 4 (0-10)
Small head 39.4±17.6\ 42±8.6\ 0.7
43 (9-69) 42 (25-57)
Normal shape 28.7±9.8\ 31.1±13.9\ 0.6
26.5 (19-46) 32 (11-56)
------------------------------------------------------------------------------------
Data are shown as mean±SD, median (min-max) (Man-Whitney U test).
Spermatozoa with high quality
Spermatozoa with medium quality
Spermatozoa with low quality
######
MSOME criteria and Cassuto-Barak classification in ICSI group
-----------------------------------------------------------------------------------
**Parameters** **Groups** **p-value**
------------------------------------------------ ------------- ------------- ------
Class I[\*](#TFN10){ref-type="table-fn"} 2.4±2.8\ 4.5±3.2\ 0.08
2 (0-8) 4 (0-14)
Class II[\*\*](#TFN11){ref-type="table-fn"} 28.9±21.5\ 30.5±12.4\ 0.9
38 (3-55) 32 (8-65)
Class III[\*\*\*](#TFN12){ref-type="table-fn"} 68.7±23.8\ 65±14.7\ 0.9
60 (42-97) 62 (21-91)
Class I +Class II 31.3±23.8\ 35±14.7\ 0.9
40 (3-58) 38 (9-79)
Cytoplasmic droplet 32.9±19.2\ 25±10.5\ 0.3
25 (10-60) 22 (12-53)
Large vacuole 11.7±3.3\ 9.7±7\ 0.1
12 (6-16) 8 (2-35)
Medium vacuole 27.3±9.5\ 21.9±7.2\ 0.1
27 (15-42) 21 (9-37)
Small vacuole 19.9±9.4\ 23.3±6\ 0.3
19 (6-30) 24 (11-33)
Non-vacuole 7.7±8.1\ 11.8±5.5\ 0.07
5 (1-24) 11 (0-24)
Mixed vacuole 33.4±8.7\ 32.8±8.9\ 0.9
31 (25-50) 32 (14-50)
Normal head 26±14.9\ 34.6±18.7\ 0.4
28 (0-46) 31 (8-82)
Large head 6.4±9.9\ 8.7±5.3\ 0.1
2 (0-27) 8 (0-18)
Small head 67.6±15.8\ 56.1±18.3\ 0.2
62 (53-100) 60 (16-90)
Normal shape 7.4±6.6\ 15.3±7.5\ 0.01
7 (0-20) 15 (1-30)
-----------------------------------------------------------------------------------
Data are shown as mean±SD, median (min-max) (Man-Whitney U test).
Spermatozoa with high quality
Spermatozoa with medium quality
Spermatozoa with low quality
{#F1}
{#F2}
{#F3}
Discussion
==========
Application of MSOME has not become a routine practice in ART clinics yet. In general, MSOME can evaluate the acrosome, post-acrosomal lamina, neck, tail, mitochondria and nucleus, in which the sperm nucleus is the most important organelle ([@B28]). Chromatin content can also be assessed by MSOME, as it was shown that the homogenous chromatin contains no more than one vacuole that occupies less than four percent of nuclear area ([@B11]). In addition to determination of overall view of sperm structure, MSOME can detect sperm nuclear vacuoles in more details. Previous studies have shown that nuclear vacuoles have detrimental effect on fertilization, embryo development and pregnancy outcome ([@B29]-[@B30]), while we did not find any correlation between MSOME parameters and fertilization and embryo development, the rate of LNVs were significantly higher in patients with successful pregnancies as compared to the patients with failed pregnancies.
One of the proposed indications of MSOME is its predictive value for pregnancy in IUI ([@B31]). Evaluation of sperm morphology at high magnification for IVF cycles is recommended, because sperm morphology is an important factor for IVF success. To our knowledge, this is the first report regarding the MSOME criteria compared between IVF and ICSI cycles. Recently, De Vos et al. (2013) analyzed 330 semen samples from ICSI cycles. They stated that 18.1% of spermatozoa had normal shape with no vacuole as compared to our results of 11.8% in failed pregnancy cycles ([@B32]). Berkovitz et al. (2006) indicated that prevalence of LNV in spermatozoa from patients undergoing ICSI is 30-40%, which is higher compared to our results (11.7%) ([@B29]). One probable cause for this discrepancy would be due to different definitions of LNV that are used in different studies. We defined the LNV as the vacuole occupying\>15% of nuclear area; while, others have defined a vacuole area \>4%, \>13%, \> 25% or\> 50% of head area ([@B29], [@B33]-[@B35]). This needs to be standardized if this technique wants to be integrated in routine practice in infertility diagnosis and treatment. We have also defined medium size vacuole (4≥ and \<15% of head area) in order to standardize definition of vacuole. Our results also showed that the percent of abnormal sperm head size and shape, spermatozoa with cytoplasmic droplet and class III (according to Cassuto-Barak classification) were significantly higher in men who had abnormal semen parameters (ICSI group) compared to normal semen parameters (IVF group) (data not shown). Perdrix et al. (2012) evaluated MSOME criteria and conventional semen analysis in a population of 440 males. They found that the sperm head width and area as well as nuclear vacuoles number and area are significantly higher in men with abnormal semen (n=331) as compared to those with normal semen parameters (n=109) ([@B36]).
Paternal age is considered as one of the main factors that affects sperm morphology. A recent study showed that prevalence of large and small vacuoles will increase with increasing paternal age ([@B37]). In our study, paternal age between successful and failed cycles both in IVF and ICSI were the same. Regarding the association between morphology evaluated with MSOME and conventional semen analysis, it was shown that there was no significant correlation between normal morphology by WHO and the ones defined by MSOME (26.1±7.2 vs 2.9±0.5, respectively) ([@B11]). While other investigators have found that MSOME might be more strict than Tygerberg criteria ([@B8]).
Our data showed that the presence of LNV affects the normalcy of sperm shape whereas there was positive correlation between the rate of small and non-vacuole and sperm shape normalcy. It might be concluded that LNV should be considered as a definite parameter for evaluation of sperm shape. Interestingly, our results showed that there is significant correlation between sperm normal head and progressive motility. Theoretically, based on hydrodynamic rules, shape of sperm head is the most determinant factor for motility and in case of sperm head abnormality, sperm motility could be impaired. The impact of LNV on progressive motility is our another important finding that shows the other detrimental effect of LNV is inhibition of sperm motility.
Conclusion
==========
Although, MSOME is a time consuming method with no cost benefit, and demanding experienced operator, it can provide more details regarding fine sperm morphology in a real time manner. MSOME can be used as a predictive factor, and in case of high LNV rate, the cycle may not be considered for IVF, but substituted with ICSI. Therefore, MSOME should be considered as a non-invasive adjunct technology assisting ART performance.
This study was extracted from PhD thesis of Shahin Ghazali. The authors would like to thank Yazd Reproductive Sciences Institute for providing the grant for performing this study.
Note
====
***This article extracted from Ph.D. thesis. (Shahin Ghazali)***
Conflict of interest
====================
The authors declare that there is no conflict of interest.
|
{
"pile_set_name": "PubMed Central"
}
|
Q:
mix the result of 2 queries in one table?
I am new to SQL, can i mix the result of two queries in one table with different attributes ?
Below 3 tables of my database and the result i want to get. Is this possible ?
client
|id|name|adress|
----------------
|1 |a |x |
|2 |b |y |
order
|id|client.id|product|date |
--------------------------------
|1 |1 |px |2018-01-1|
|2 |1 |py |2018-05-1|
|3 |2 |px |2018-06-1|
pay
|id|client.id|amount|date |
-------------------------------
|1 |1 |1000 |2018-03-1|
|2 |2 |500 |2018-09-1|
Output
|name |order.id |product |pay.id |amount |date |
----------------------------------------------------
|a |1 |px |- |- |2018-01-1|
|a |- |- |1 |1000 |2018-03-1|
|a |2 |py |- |- |2018-05-1|
|b |3 |px |- |- |2018-06-1|
|b |- |- |2 |500 |2018-09-1|
A:
Edited for Access.
Use UNION for 2 subqueries:
SELECT * FROM (
SELECT client.name, order.id AS orderid, order.product AS product,
"-" AS payid, "-" AS amount, order.date AS [date]
FROM client INNER JOIN [order] ON client.id = order.clientid
UNION
SELECT client.name, "-" AS orderid, "-" AS product,
pay.id AS payid, pay.amount AS amount, pay.date AS [date]
FROM client INNER JOIN [pay] ON client.id = pay.clientid
)
ORDER BY name, date
the result is:
name orderid product payid amount date
a 1 px - - 2018-01-1
a - - 1 1000 2018-03-1
a 2 py - - 2018-05-1
b 3 px - - 2018-06-1
b - - 2 500 2018-09-1
|
{
"pile_set_name": "StackExchange"
}
|
The genus Bifidobacterium is one of the most commonly used types of bacteria cultures in the dairy industry for fermenting a variety of dairy products. Ingestion of Bifidobacterium-containing products furthermore has a health-promoting effect. This effect is not only achieved by a lowered pH of the intestinal contents but also by the ability of Bifidobacterium to repopulate the intestinal flora in individuals who have had their intestinal flora disturbed by, for example, intake of antibiotics. Bifidobacterium furthermore has the potential of outcompeting potential harmful intestinal micro-organisms.
Galacto-oligosaccharides are known to enhance the growth of Bifidobacterium. This effect is likely achieved through the unique ability of Bifidobacterium to exploit galacto-oligosaccharides as a carbon source. Dietary supplement of galacto-oligosaccharides is furthermore thought to have a number of long-term disease protecting effects. For example, galacto-oligosaccharide intake has been shown to be highly protective against development of colorectal cancer in rats (Wijnands, et al., 1999). There is therefore a great interest in developing cheap and efficient methods for producing galacto-oligosaccharides for use in the industry for improving dietary supplements and dairy products.
The enzyme β-galactosidase (EC 3.2.1.23) usually hydrolyzes lactose to the monosaccharides D-glucose and D-galactose. In the normal enzyme reaction of β-galactosidases, the enzyme hydrolyzes lactose and transiently binds the galactose monosaccharide in a galactose-enzyme complex that transfers galactose to the hydroxyl group of water, resulting in the liberation of D-galactose and D-glucose. However, at high lactose concentrations some β-galactosidases are able to transfer galactose to the hydroxyl groups of D-galactose or D-glucose in a process called transgalactosylation, whereby galacto-oligosaccharides are produced.
Enzymes capable of transgalactosylation have been isolated from a wide range of micro-organisms, including bacteria and yeasts. The observation that galacto-oligosaccharides enhance the growth of health-promoting Bifidobacterium has stimulated investigations of Bifidobacterium and their β-galactosidase enzymes. Two DNA sequences of B. breve and B. longum β-galactosidase genes have been deposited in GeneBank (accession numbers E5040 and AJ242596, respectively). Dumortier et al. (1994) have reported that B. bifidum DSM 20215 contains three β-galactosidases and one of these enzymes has trans-galactosylating properties. However, no identification of the enzyme possessing this activity or any sequence of the enzyme or the corresponding gene from B. bifidum DSM 20215 has been published.
Production-of galacto-o-ligosaccharides by-the use of β-galactosidases has been reported in several papers. For example, β-galactosidase from E. coli has been shown to produce oligosaccharides at high lactose concentrations (0.5 M or approximately 20% lactose; Huber et al. 1976) Various thermophilic microorganisms have been shown to produce oligosaccharides at high temperatures and high lactose concentrations, e.g. Sterigmatomyces elviae can produce 39% oligosaccharides from 20% lactose at 60° C. (Onishi & Tanaka, 1995), and Saccharopolyspora rectivirgula can synthesize 41% oligosaccharides in 1.75 M lactose at 70° C. (Nako et al., 1994).
However, the enzymes described above all have the drawbacks of requiring either high temperatures or high lactose concentrations or both in order to exhibit significant transgalactosylase activity. There is thus a need for developing cheaper and more efficient methods of producing galacto-oligosaccharides for use in the industry.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
<?xml version="1.0" encoding="UTF-8"?>
<module external.linked.project.id=":app" external.linked.project.path="$MODULE_DIR$" external.root.project.path="$MODULE_DIR$/.." external.system.id="GRADLE" type="JAVA_MODULE" version="4">
<component name="FacetManager">
<facet type="android-gradle" name="Android-Gradle">
<configuration>
<option name="GRADLE_PROJECT_PATH" value=":app" />
</configuration>
</facet>
<facet type="android" name="Android">
<configuration>
<option name="SELECTED_BUILD_VARIANT" value="debug" />
<option name="ASSEMBLE_TASK_NAME" value="assembleDebug" />
<option name="COMPILE_JAVA_TASK_NAME" value="compileDebugSources" />
<afterSyncTasks>
<task>generateDebugSources</task>
</afterSyncTasks>
<option name="ALLOW_USER_CONFIGURATION" value="false" />
<option name="MANIFEST_FILE_RELATIVE_PATH" value="/src/main/AndroidManifest.xml" />
<option name="RES_FOLDER_RELATIVE_PATH" value="/src/main/res" />
<option name="RES_FOLDERS_RELATIVE_PATH" value="file://$MODULE_DIR$/src/main/res" />
<option name="ASSETS_FOLDER_RELATIVE_PATH" value="/src/main/assets" />
</configuration>
</facet>
</component>
<component name="NewModuleRootManager" LANGUAGE_LEVEL="JDK_1_8" inherit-compiler-output="false">
<output url="file://$MODULE_DIR$/build/intermediates/classes/debug" />
<output-test url="file://$MODULE_DIR$/build/intermediates/classes/test/debug" />
<exclude-output />
<content url="file://$MODULE_DIR$">
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/r/debug" isTestSource="false" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/aidl/debug" isTestSource="false" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/buildConfig/debug" isTestSource="false" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/rs/debug" isTestSource="false" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/apt/debug" isTestSource="false" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/res/rs/debug" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/res/resValues/debug" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/r/androidTest/debug" isTestSource="true" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/aidl/androidTest/debug" isTestSource="true" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/buildConfig/androidTest/debug" isTestSource="true" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/rs/androidTest/debug" isTestSource="true" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/apt/androidTest/debug" isTestSource="true" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/res/rs/androidTest/debug" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/res/resValues/androidTest/debug" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/res" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/resources" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/assets" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/aidl" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/java" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/rs" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/shaders" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/testDebug/res" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/testDebug/resources" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/testDebug/assets" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/testDebug/aidl" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/testDebug/java" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/testDebug/rs" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/testDebug/shaders" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/main/res" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/main/resources" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/main/assets" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/main/aidl" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/main/java" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/main/rs" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/main/shaders" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/test/res" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/test/resources" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/test/assets" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/test/aidl" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/test/java" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/test/rs" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/test/shaders" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/res" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/resources" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/assets" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/aidl" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/java" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/rs" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/shaders" isTestSource="true" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/assets" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/blame" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/classes" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/incremental" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/incremental-safeguard" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/jniLibs" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/manifests" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/pre-dexed" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/res" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/rs" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/shaders" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/symbols" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/transforms" />
<excludeFolder url="file://$MODULE_DIR$/build/outputs" />
<excludeFolder url="file://$MODULE_DIR$/build/tmp" />
</content>
<orderEntry type="jdk" jdkName="Android API 26 Platform" jdkType="Android SDK" />
<orderEntry type="sourceFolder" forTests="false" />
<orderEntry type="library" exported="" name="constraint-layout-1.0.0-beta3" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="byte-buddy-1.6.14" level="project" />
<orderEntry type="library" exported="" name="support-core-ui-26.0.0-alpha1" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="runner-0.5" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="espresso-idling-resource-2.2.2" level="project" />
<orderEntry type="library" exported="" name="support-fragment-26.0.0-alpha1" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="byte-buddy-agent-1.6.14" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="hamcrest-library-1.3" level="project" />
<orderEntry type="library" exported="" name="support-v4-26.0.0-alpha1" level="project" />
<orderEntry type="library" exported="" name="support-media-compat-26.0.0-alpha1" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="libcore-dex-2" level="project" />
<orderEntry type="library" exported="" name="relinker-1.2.2" level="project" />
<orderEntry type="library" exported="" name="constraint-layout-solver-1.0.0-beta3" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="byte-buddy-android-1.6.14" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="hamcrest-integration-1.3" level="project" />
<orderEntry type="library" exported="" name="commons-cli-1.2" level="project" />
<orderEntry type="library" exported="" name="stetho-1.5.0" level="project" />
<orderEntry type="library" exported="" name="design-26.0.0-alpha1" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="objenesis-2.5" level="project" />
<orderEntry type="library" exported="" name="rxjava-2.0.5" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="dalvik-dx-1" level="project" />
<orderEntry type="library" exported="" name="jsr305-2.0.1" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="espresso-core-2.2.2" level="project" />
<orderEntry type="library" exported="" name="reactive-streams-1.0.0" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="exposed-instrumentation-api-publish-0.5" level="project" />
<orderEntry type="library" exported="" name="stetho_realm-2.1.0" level="project" />
<orderEntry type="library" exported="" name="support-core-utils-26.0.0-alpha1" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="rules-0.5" level="project" />
<orderEntry type="library" exported="" name="transition-26.0.0-alpha1" level="project" />
<orderEntry type="library" exported="" name="support-vector-drawable-26.0.0-alpha1" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="javax.annotation-api-1.2" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="mockito-android-2.8.47" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="javax.inject-1" level="project" />
<orderEntry type="library" exported="" name="realm-annotations-3.5.0" level="project" />
<orderEntry type="library" exported="" name="appcompat-v7-26.0.0-alpha1" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="mockito-core-2.8.47" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="javawriter-2.1.1" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="hamcrest-core-1.3" level="project" />
<orderEntry type="library" exported="" name="realm-android-library-3.5.0" level="project" />
<orderEntry type="library" exported="" scope="TEST" name="junit-4.12" level="project" />
<orderEntry type="library" exported="" name="recyclerview-v7-26.0.0-alpha1" level="project" />
<orderEntry type="library" exported="" name="support-compat-26.0.0-alpha1" level="project" />
<orderEntry type="library" exported="" name="support-annotations-26.0.0-alpha1" level="project" />
<orderEntry type="library" exported="" name="animated-vector-drawable-26.0.0-alpha1" level="project" />
</component>
</module>
|
{
"pile_set_name": "Github"
}
|
"Quiero invitar a un grupo independiente que ha demostrado amor y valor por México, un grupo que ha trabajado en todo el país con una visión valiente e innovadora". Así ha justificado José Antonio Meade la invitación que ha hecho a Armando Ríos Piter para sumarse a su campaña este viernes. El ex aspirante presidencial ha tomado la mano tendida del candidato del PRI y ha decidido apoyar un proyecto "integrador que tiene las posibilidades de construir un México en unidad", ha asegurado Ríos Pitter a través de Twitter.
"Estamos convencidos de que José Antonio Meade es la mejor opción para la presidencia, porque cuenta con una visión social que nos permitirá hacer una política diferente. Estamos apostando por un México que pueda construir en la unidad", ha señalado.
La decisión del candidato priista ha sorprendido a propios y extraños. Ríos Piter fue descalificado en marzo pasado de la carrera presidencial por presentar al menos 800.000 firmas falsas de las 866.000 que tenía que reunir para registrarse como candidato independiente. La gran incógnita es si el nuevo fichaje ayudará a Meade a remontar en las encuestas, tras aparecer en segundo o en tercer lugar en la mayoría de los sondeos y estar 30 puntos por debajo del puntero Andrés Manuel López Obrador, según el último estudio demoscópico que presentó esta semana el periódico Reforma.
"Quiero invitar a todos a tomar partido por México, quiero invitar a que se sumen a este movimiento", ha dicho Meade en un mensaje ante los medios. La estrategia del abanderado del gobernante Partido Revolucionario Institucional (PRI) es sumar todos los apoyos posibles a poco menos de 10 semanas de que se celebren los comicios del próximo 1 de julio. "En esta elección tenemos que unirnos todos", ha agregado Meade.
Ríos Piter descartó en su momento apelar la decisión del Instituto Nacional Electoral, pero espera acudir a la Comisión Interamericana de Derechos Humanos para defender su postulación, ha escrito este viernes en Twitter. Este mismo viernes, el exsenador por el Partido de la Revolución Democrática se dio tiempo para criticar al sistema de partidos, incluido al PRI. "El panorama electoral nos pinta a Morena convertida en el nuevo-viejo PRI (...) y un PRI que carece de visión social de izquierda", ha señalado El Jaguar, como se le apoda, en un mensaje que se publicó una hora antes de la invitación de Meade.
"Es una decisión rarísima, nadie entiende qué gana uno u otro", comenta Carlos Bravo Regidor, investigador del Centro de Investigación y Docencia Económicas. "Esta es una de esas sumas que restan: traer a El Jaguar resta a la campaña de Meade en términos de credibilidad y honestidad, y le resta credibilidad a Ríos Piter como un candidato independiente que critica el sistema de partidos", sentencia Bravo Regidor. El analista duda que el apoyo de Ríos Piter pueda traducirse en votos o que fortalezca la campaña del candidato priista en el terreno. "El Jaguar nunca rebasó el 1% o el 2% de apoyo y si no consiguió las firmas, quiere decir que tampoco tiene buenos operadores políticos", agrega.
"Es un movimiento desesperado, estratégico y pragmático de Meade", apunta Horacio Vives, politólogo del Instituto Tecnológico Autónomo de México (ITAM). Para Vives, la lógica detrás de la decisión del priista se inscribe en la pelea que sostiene con Ricardo Anaya por el segundo lugar ante la posibilidad de que la elección se convierta en un plebiscito: López Obrador sí o López Obrador no. "Esta es una etapa decisiva en la campaña para tratar de llegar a la final contra López Obrador y es muy probable que veamos más pactos de facto entre los contendientes que no son punteros", señala el investigador.
Pese a no ser militante priista, Meade ha batallado para quitarse el lastre de la corrupción que rodea al partido, con varios exgobernadores acusados de corrupción en los últimos años como Javier Duarte, César Duarte o Tomás Yarrington. "Es de todas maneras el candidato del PRI", señala Bravo Regidor. Ríos Piter, por su parte, barajó varias veces la posibilidad de una candidatura independiente conjunta con los otros dos aspirantes sin partido Margarita Zavala y Jaime Rodríguez Calderón El Bronco, quien también fue acusado de falsificar apoyos, pero fue metido de forma extemporánea en la contienda por una polémica decisión del Tribunal electoral. La alianza de independientes nunca se concretó.
El ITAM, alma máter de ambos políticos, es una de las pocas coincidencias obvias entre Ríos Piter y Meade y pudo haber ayudado a consolidar la alianza, de acuerdo con los académicos consultados. Para Bravo Regidor, sin embargo, la racionalidad de sumar a Ríos Piter no está de cara a conseguir más votos o a justificarse ante el electorado, sino que obedece a una "componenda" entre élites. "Meade quizás está tratando de rescatarlo, pero sumarlo a una candidatura que va en tercer lugar y que ha caído tanto no parece una buena forma de salvarse", afirma el analista y añade: "Es como si dos aviones que van cayendo se juntaran para ver si dejan de desplomarse y a lo mejor al juntarse empiezan caer más rápido".
|
{
"pile_set_name": "OpenWebText2"
}
|
Page:The American Review Volume 02.djvu/568
one-fifth of the value on the face of them, will not fail to mingle in this question.
It is to this day made a party reproach against Alexander Hamilton, that he devised and carried through the funding system, whereby ample and honorable provision was made for the debt contracted in the struggle for independence, and which was strictly the price of freedom; but which, owing to the pressure of war while it lasted, and after its close, of the poverty and almost anarchy of the confederation, had run down so low as hardly to retain any value in exchange. To have opposed or supported Hamilton's funding system is still occasionally used as a distinguishing test between parties, and the name of republican, or, in more modern phraseology, of democratic, is expressly claimed for the party which resisted that honest measure, and resisted it on the double ground—first, that by funding the debt, a favored class of citizens were raised up, interested in sustaining the government, however administered; because upon that government they were dependent for the payment of their stocks—and secondly, that in redeeming at par a debt which had passed at merely nominal rates from its original holders, from those who had rendered the service into the hands of grasping cormorants, not those who, in reality, had made sacrifices for, and shown their confidence in the cause, were benefited, but those who speculated upon the necessities of the well-deserving patriots, and who, or some of whom, by witholding supplies exaggerating difficulties, and propagating doubts and fears, had been enabled eventually to buy up, for the merest trifle, the certificates of debt.
It will now be seen whether those who claim to be the representatives, at this day, of the anti-Federal party of our earlier annals, will maintain the same line of argument in respect to the debt of Texas; a debt recommended by no such sacred associations and patriotic appeals as that of our revolution, and which, not less than that, has passed almost entirely from the hands of its original holders, into those of mere speculators. From past indications there is little reason to doubt that, in this particular, as in so many others, there will be found a very decided contradiction between the practice of the democracy, and the principles it professes; and that we shall see those who, wearying the popular ear with declarations that they are the true disciples of the original Republican party, will now be foremost—not directly, but by circumlocution and expedients meant to deceive—virtually to assume the debts of a foreign State incurred under circumstances similar to, but certainly not more sacred than, that of their own country, which yet, their great prototypes not only refused to provide for, but stigmatized the honest patriots who did so, as a corrupt stock-jobbing aristocracy.
There is, too, a general impression, which we merely refer to, without any intention of analyzing its justness—that, among the speculators in Texas securities, are included many, who in official stations contributed to annexation, and who were moved thereto at least as much by the hope of personal advantage, as by patriotic solicitude. Of this impression, we repeat, it is not our purpose to examine the justness, but its existence is as general and unquestionable, as it will obviously be adverse to the success of any project of a redemption of these securities through the means or credit of the United States.
From these various considerations it will be readily perceived that, whatever the abstract view of many leading men and presses may be, there are strong, practical and well-grounded reasons for resisting any project of making this country responsible for the debt of Texas. Moreover, some of the States of the Confederacy are suffering the dishonor of repudiation; why not, it will be asked, first go to their assistance? Give them the value of their share of the public lands we already possess, before we add to our untold millions of unproductive acres, many millions more to be paid for out of the present resources of the Union. This seems reasonable, and possibly there may result from these conflicting interests and opinions a compromise which shall substantially satisfy all parties.
For the virtual assumption of the debt of Texas, in spite of the positive disclaimer of the resolution of Annexation, will be most warmly pressed by that party, which has most strenuously resisted every proposition at home, to appropriate the proceeds of the sales of the public lands to the respective states. Is this not an occasion then, when the Whigs may say to their opponents. We will meet you half way. Do for the States now composing the Union what you propose in respect of the new State about to be admitted to it and we will co-
|
{
"pile_set_name": "Pile-CC"
}
|
Four things you should know before you deploy Chromeboxes
Before you perform a mass deployment of Chromeboxes in the enterprise there are some important decisions to make.
You can read specs and reviews of the Chromebox elsewhere. Suffice it to say, I'm a fan of both the Chromebook and Chromebox. The Samsung Chromebook Series 5 550 with 3G is my only laptop; the Chromebox has become my primary desktop. As a Google Apps user who moved all of my applications and data online, both work well. I recommend Chrome devices to any Google Apps user whose applications and data are 100% online. People who need locally installed applications or data should consider other options.
Chromeboxes
However, there are at least four things technology managers should consider before a mass deployment of Chromeboxes in the enterprise.
1. Video adapters
I'm sure most users would be happy to have the latest 30" monitor with Displayport connections that support the Chromebox's maximum resolution of 2560 x 1600. HP and Dell monitors fitting those specs cost $1,200 or more.
If you're not lucky enough to have a newer monitor with a Displayport connection, you'll need an adaptor. The Chromebox includes two Displayport connections and one DVI connection, but no HDMI or VGA options. Adapters for Displayport / DVI to HDMI / VGA connections generally cost less than $15. For large deployments, the cost can be significant.
2. Headsets and/or speakers
The Chromebox has a built-in speaker, but no built-in microphone. Fortunately, the audio port works well with smartphone headsets, such as the EtymoticHF3 headset I use. Plug your smartphone headset into the front-facing port on the Chromebox and you're ready to listen to music or participate in a Google Talk voice conference.
One word of caution about speakers, though. I plugged a Dell monitor soundbar speaker into the Chromebox and the audio worked. However, when the Chromebox enters sleep mode the speakers emit a startlingly loud buzzing sound. This can be fixed by adding a ground loop isolator inline, with costs ranging from $10 to $30. If you plan to use external speakers, buy the isolator; it will make external speakers usable. (For my own use, I simply unplug my speakers if I don't need them.) This is an issue that Samsung really should address.
3. Network management and enrollment
If you use a standard retail Chromebox, WiFi security settings are not retained across guest mode sessions, which is a good practice to improve security. However, this also means that guest mode users have to enter wireless authentication passwords every session to access secured wireless networks. (You could permit guest mode users to connect to an unsecured wireless access point. I don't recommend this, though.)
Users who login won't encounter this issue. Wireless authentication settings they have been configured are retained across device sessions when users login with an account.
The simplest way to resolve this is to connect the Chromebox to the network with an Ethernet cable. That way, when people login to a Chromebox in "guest mode", no authentication is necessary. Click "enter" on the screen and you're in Chrome OS.
4. Keyboards
Chrome device keyboards are different than standard Windows or Mac keyboards. Most notably, Chromebook laptops have a dedicated search key, instead of a caps lock key. The search key opens a new browser tab. (Shift + the search key toggles caps lock on and off.) Chrome keyboards also have a row of dedicated keys instead of the traditional function keys.
Share Google's Chromekeyboardfeaturesguidewithusers. While I don't typically recommend printing, you might print out a customized version of this guide for frequently used functions. Make sure users know that [Ctrl]-[Alt]-[?] displays an on-screen display of keyboard shortcuts.
If you've deployed Chromeboxes in your organization, what other tips have you learned?
1) Regarding video connection, you can simply buy a DVI-I to VGA converter dongle, DVI-I to DVD-D cable, DVD-I to DVD-A cable, DisplayPort to DVD-D cable or DisplayPort to HDMI cable, or DisplayPort to DisplayPort cable to plug into any display with a VGA, DVD-D, DVD-A, HDMI, or DisplayPort connector (make sure you get the right gender though). You can pick these up on Amazon or other stores for about $7 to $35.
2) The Chromebox jack is intended for earphones and headphones rather than external speakers, and the jacks impedance is not correct for speaker jacks. I don't use an amplified speaker, but I believe a ground loop filter will solve the problem - http://www.ebay.com/itm/MINI-3-5MM-NOISE-FILTER-GROUND-LOOP-ISOLATOR-CAR-AUDIO-/260741338139#ht_3540wt_1141
3) If you want to allow guest accounts to use, then on a non-enterprise Chromebox, you just log in as the main user or administrative user, select settings and help -> Wifi, and check the "share this network with other users" checkbox, and guest users will use the WiFi without having to supply WiFi security key credentials.
Glad for the heads-up regarding the video and audio issues. Following the link for the Chromebox included in the article, it looks like it includes a DVI connector on the back.
[q]DVI-I single link output (compatible with VGA)[/q]
One difference between Chrome OS and Linux distributions is that the Linux distribution requires more configuration and upkeep than the Chrome-book/box.
Chrome OS is a very plausible option if you go into it knowing what you are getting into. Local apps or don't have an online app/extension that does what you need it to (CAD, 3D modeling, etc.)? Then this isn't for you.
I have been going back-and-forth between my Chromebook (Cr-48), Linux and Windows. While the Chromebook worked very well, my own personal network is slow and thus reduces its responsiveness.
While I largely agree with dcolbert's opinion, my department is considering loading Chrome OS on all our loaner laptops. Currently when a user's PC is going to be down for any length of time we provide a loaner laptop to keep them working. Unfortunately user's often save important files to the device, or the laptop is lost or stolen. By loading Chrome OS on these devices and requiring the user to log into Citrix desktop, the data is kept where it should be -- on the company network.
Will anyone deploy Chromeboxes? After all Chromebooks failed miserably.
Even bigger question: Why did Google waste alkl this R&D money on an OS that is almost like the 100+ Linux distros out there? They'll just get a slice of the techies share. Even then, most techies will build their own system and maybe install Chrome OS on it instead. [Another mistake by Samsung while at it.]
We completely agree on the first two points. You need an adapter to connect a Chromebox to non-DVI/Displayport monitor, and the Chromebox audio port needs a ground loop isolator to make a useable connection to external speakers.
Re: shared WiFi on Chromeboxes / Chromebooks... My experience is that changing or configuring shared WiFi settings is not simple. For example, except for the first time a WiFi connection is configured by a user, I see no user-facing way to enable "share this network with other users". The very FIRST time a connection is made that option displays. I see no user-facing way to change or enable the setting later. For busy IT managers, I recommend using an Ethernet connection, if at all possible. I expect that managing WiFi settings will improve as Chrome OS evolves.
Thanks for reading!
--Andy
The Chromebox does have a DVI-out connector for video-out only. Ideally, you'd hook a Chromebox up to a Displayport monitor with built-in audio, since Displayport supports video & audio.
The issue is that the audio option (e.g., front audio port) and microphone options are limited, aside from using Displayport and/or a smartphone headset.
This is a bit puzzling to me, since I would have thought Samsung and Google would have worked to make the Chromebox provide a fantastic out-of-the-box Google+ Hangouts device. It is. But it takes having the right hardware to make it so.
Andy Wolber
Is it even like 100+ Linux distros out there? It seems to me that unless your org has gone "all-in" with Google Apps, a regular Linux distro offers far more end user flexibility than ChromeOS only based devices? Where is the use-model and justification for a typical organization considering deploying Chromeboxes? I have 250 user desktops. In addition to regular MS Office apps like Word and Excel, and web based apps (some of which interact with local peripherals like scanners), they access RDP and Citrix sessions and windows shares. If I were going to consider migrating, would I need Google mail corporate accounts, Google Apps corporate accounts? What are the hidden costs there being that a Chromebook is like a cloud based thin client, that requires special adaptors for video and audio, and isn't tremendously less expensive than a Dell desktop that is ready to go and includes a monitor? Am I missing something? I must be?
I've used Linux distros (ran it exclusively for two years).
The one major difference between most Linux distros & Chrome OS is simplicity. Chrome OS provides an auto-updating browser that users would have a pretty hard time screwing up.
There are more opportunities for things to go wrong in most Linux distros.
The exception would be if you're running an environment that is mostly thin-client (e.g., Linux Terminal Server Project based), where everything is delivered via network boot.
With Chrome OS, any device can become the "users" device simply by logging in. Setup time reduce to close to zero. In a corporate setting -- where an org is using Google Apps -- all that is needed is a Google Apps account for the user to login.
Hope that helps!
Andy Wolber
|
{
"pile_set_name": "Pile-CC"
}
|
Baháʼí Faith in Central America
The Baháʼí Faith is a diverse and widespread religion founded by Baháʼu'lláh in the 19th century in Iran. Baháʼí sources usually estimate the worldwide Baháʼí population to be above 5 million. Most encyclopedias and similar sources estimate between 5 and 6 million Baháʼís in the world in the early 21st century. The religion is almost entirely contained in a single, organized, hierarchical community, but the Baháʼí population is spread out into almost every country and ethnicity in the world, being recognized as the second-most geographically widespread religion after Christianity. See Baháʼí statistics.
Summary
ʻAbdu'l-Bahá, the son of the founder of the religion, wrote a series of letters, or tablets, to the followers of the religion in the United States in 1916–1917; these letters were compiled together in the book titled Tablets of the Divine Plan. The sixth of the tablets was the first to mention Latin American regions and was written on 8 April 1916, but was delayed in being presented in the United States until 1919—after the end of the First World War and the Spanish flu pandemic. The first actions on the part of Baháʼí community towards Latin America were that of a few individuals who made trips to Mexico and South America near or before this unveiling in 1919, including Mr. and Mrs. Frankland, and individuals who would later be appointed as Hands of the Cause like Roy C. Wilhelm, and Martha Root. The sixth tablet was translated and presented by Mirza Ahmad Sohrab on 4 April 1919, and published in Star of the West magazine on 12 December 1919.
His Holiness Christ says: Travel ye to the East and to the West of the world and summon the people to the Kingdom of God.…(travel to) the Islands of the West Indies, such as Cuba, Haiti, Puerto Rico, Jamaica, the Islands of the Lesser Antilles (which includes Barbados), Bahama Islands, even the small Watling Island, have great importance…
In 1927 Leonora Armstrong was the first Baháʼí to visit many of these countries where she gave lectures about the religion as part of her plan to complement and complete Martha Root's unfulfilled intention of visiting all the Latin American countries for the purpose of presenting the religion to an audience.
Seven Year Plan and succeeding decades
Shoghi Effendi, head of the religion after the death of ʻAbdu'l-Bahá in 1921, wrote a cable on 1 May 1936 to the Baháʼí Annual Convention of the United States and Canada, and asked for the systematic implementation of ʻAbdu'l-Bahá's vision to begin. In his cable he wrote:
Appeal to assembled delegates ponder historic appeal voiced by ʻAbdu'l-Bahá in Tablets of the Divine Plan. Urge earnest deliberation with incoming National Assembly to insure its complete fulfillment. First century of Baháʼí Era drawing to a close. Humanity entering outer fringes most perilous stage its existence. Opportunities of present hour unimaginably precious. Would to God every State within American Republic and every Republic in American continent might ere termination of this glorious century embrace the light of the Faith of Baháʼu'lláh and establish structural basis of His World Order.
Following the 1 May cable, another cable from Shoghi Effendi came on 19 May calling for permanent pioneers to be established in all the countries of Latin America. The Baháʼí National Spiritual Assembly of the United States and Canada appointed the Inter-America Committee to take charge of the preparations. During the 1937 Baháʼí North American Convention, Shoghi Effendi cabled advising the convention to prolong their deliberations to permit the delegates and the National Assembly to consult on a plan that would enable Baháʼís to go to Latin America as well as to include the completion of the outer structure of the Baháʼí House of Worship in Wilmette, Illinois. In 1937 the First Seven Year Plan (1937–44), which was an international plan designed by Shoghi Effendi, gave the American Baháʼís the goal of establishing the Baháʼí Faith in every country in Latin America. With the spread of American Baháʼís in Latin American, Baháʼí communities and Local Spiritual Assemblies began to form in 1938 across the rest of Latin America.
In 1946, a great pioneer movement, the Ten Year Crusade, began with, for example, sixty percent of the British Baháʼí community eventually relocating.
As far back as 1951 the Baháʼís had organized a regional National Assembly for the combination of Mexico, Central America and the Antilles islands. Many counties formed their own National Assembly in 1961. Others continued to be organized in regional areas growing progressively smaller. From 1966 the region was reorganized among the Baháʼís of Leeward, Windward and Virgin Islands with its seat in Charlotte Amalie.
Among the more notable visitors was Hand of the Cause Ruhiyyih Khanum when she toured Caribbean Islands for five weeks in 1970.
Countries
Barbados
The first Baháʼí to visit Barbados was Leonora Armstrong in 1927 while pioneers who moved to the island arrived by 1964. With local converts they elected the first Baháʼí Local Spiritual Assembly in 1965. During October 1966 a trip to ten islands was planned by Lorraine Landau, a pioneer in Barbados. Hand of the Cause ʻAlí-Muhammad Varqá attended the inaugural election of the Barbados Baháʼís National Spiritual Assembly in 1981. Since then Baháʼís have participated in several projects for the benefit of the wider community and in 2001 various sources report up to 1.2% of the island, about 3,500 citizens are Baháʼís though Baháʼí and government census data report far lower numbers. In fact, the 2010 Barbados census recorded 178 Baháʼís out of a total population of 250,010.
Belize
The Association of Religion Data Archives estimates there were 7,776 Baháʼís in Belize in 2005, or 2.5% of the national population. If correct, the Association of Religion Data Archives' estimates suggest this is the highest proportion of Baháʼís in any country. Their data also states that the Baháʼí Faith is the second most common religion in Belize, followed by Hinduism (2.0%) and Judaism (1.1%). However the 2010 Belize Population Census recorded 202 Baháʼís out of a total population of 304,106, yielding a proportion of 0.066%, not 2.5%.
Costa Rica
The first pioneers began to settle in Coast Rica in 1940. followed quickly by the first Baháʼí Local Spiritual Assembly being elected in San José in April 1941. The National Spiritual Assembly was first elected in 1961. Baháʼís sources as of 2009 the national community includes various peoples and tribes of over 4,000 members organized in groups in over 30 locations throughout the country. The Association of Religion Data Archives (relying mostly on the World Christian Encyclopedia) estimated some 13000 Baháʼís in 2005.
Dominica
The island of Dominica was specifically listed as an objective for plans on spreading the religion in 1939 Shoghi Effendi, who succeeded ʻAbdu'l-Baha as head of the religion. In 1983 Bill Nedden is credited with being the first pioneer to Dominica at the festivities associated with the inaugural election of the Dominican Baháʼís National Spiritual Assembly with Hand of the Cause, Dhikru'llah Khadem representing the Universal House of Justice. Since then Baháʼís have participated in several projects for the benefit of the wider community and in 2001 various sources report between less than 1.4% up to 1.7% of the island's about 70,000 citizens are Baháʼís.
Haiti
The first Baháʼí to visit Haiti was Leonora Armstrong in 1927. After that others visited until Louis George Gregory visited in January 1937 and he mentions a small community of Baháʼís operating in Haiti. The first long term pioneers, Ruth and Ellsworth Blackwell, arrived in 1940. Following their arrival the first Baháʼí Local Spiritual Assembly of Haiti was formed in 1942 in Port-au-Prince. From 1951 the Haitian Baháʼís participated in regional organizations of the religion until 1961 when Haitian Baháʼís elected their own National Spiritual Assembly and soon took on goals reaching out into neighboring islands. The Association of Religion Data Archives (relying mostly on the World Christian Encyclopedia) estimated some 23000 Baháʼís in Haiti in 2005.
Jamaica
The community of the Baháʼís begins in 1942 with the arrival of Dr. Malcolm King. The first Baháʼí Local Spiritual Assembly of Jamaica, in Kingston, was elected in 1943. By 1957 the Baháʼís of Jamaica were organized under the regional National Spiritual Assembly of the Greater Antilles, and on the eve of national independence in 1962, the Jamaica Baháʼís elected their own National Spiritual Assembly in 1961. By 1981 hundreds of Baháʼís and hundreds more non-Baháʼís turned out for weekend meetings when Rúhíyyih Khánum spent six days in Jamaica. Public recognition of the religion came in the form of the Governor General of Jamaica, Sir Howard Cooke, proclaiming a National Baha'i Day first on 25 July in 2003 and it has been an annual event since. While there is evidence of several active communities by 2008 in Jamaica, estimates of the Baháʼís population range from the hundreds to the thousands. The Association of Religion Data Archives (relying on World Christian Encyclopedia) estimated some 5137 Baháʼís in 2005.
Panama
The same year as the release of the Tablets of the Divine Plan in 1919 Martha Root's made a trip around South America and included Panama on the return leg of the trip up the west coast. The first pioneers began to settle in Panama in 1940. The first Baháʼí Local Spiritual Assembly of Panama, in Panama City, was elected in 1946, and National Spiritual Assembly was first elected in 1961. The Baháʼís of Panama raised a Baháʼí House of Worship in 1972. In 1983 and again in 1992 some commemorative stamps were produced in Panama while the community turned its interests to the San Miguelito and Chiriqui regions of Panama with schools and a radio station. One recent estimation of the Baháʼí community of Panama was of 2.00% of the national population, or about 60000, in 2006. The Association of Religion Data Archives estimated there were some 41000 Baháʼís in 2005 and the largest religious minority in the country.
Trinidad and Tobago
The Baháʼí Faith in Trinidad and Tobago begins with a mention by ʻAbdu'l-Bahá, then head of the religion, in 1916 as the Caribbean was among the places Baháʼís should take the religion to. The first Baháʼí to visit came in 1927 while pioneers arrived by 1956 and the first Baháʼí Local Spiritual Assembly was elected in 1957 In 1971 the first Baháʼí National Spiritual Assembly was elected. A count of the community then noted 27 assemblies with Baháʼís living in 77 locations. Since then Baháʼís have participated in several projects for the benefit of the wider community and in 2005/10 various sources report near 1.2% of the country, about 10–16,000
See also
:Category:Bahá'í Faith by country
Baháʼí Faith and Native Americans
Baháʼí statistics
Religions by country
Islam by country
Judaism by country
Hinduism by country
Christianity by country
Sikhism by country
No Faith by Country
Notes
References
External links
Baháʼí World Statistics
adherents.com – A website about religious adherents of numerous faiths
adherents.com – Specific compiled stats on Baháʼí communities
Category:Articles with inconsistent citation formats
Central America
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Mitral annular displacement by Doppler tissue imaging may identify coronary occlusion and predict mortality in patients with non-ST-elevation myocardial infarction.
Mitral annular displacement (MAD) is a simple marker of left ventricular (LV) systolic function. The aim of this study was to test the hypothesis that MAD can distinguish patients with non-ST-segment elevation myocardial infarctions (NSTEMIs) from those with significant coronary artery disease without infarctions, identify coronary occlusion, and predict mortality in patients with NSTEMIs. MAD was compared with established indices of LV function. In this retrospective study, 167 patients with confirmed NSTEMIs were included at two Scandinavian centers. Forty patients with significant coronary artery disease but without myocardial infarctions were included as controls. Doppler tissue imaging was performed at the mitral level of the left ventricle in the three apical planes, and velocities were integrated over time to acquire MAD. LV ejection fraction, global longitudinal strain (GLS), and wall motion score index were assessed according to guidelines. MAD and GLS could accurately distinguish patients with NSTEMIs from controls. During 48.6 ± 12.1 months of follow-up, 22 of 167 died (13%). MAD, LV ejection fraction, and GLS were reduced and wall motion score index was increased among those who died compared with those who survived (P < .001, P < .001, P < .001, and P = .02, respectively). Multivariate Cox proportional-hazards analyses revealed that MAD was an independent predictor of death (hazard ratio, 1.36; 95% confidence interval, 1.07-1.73; P = .01). MAD and GLS were reduced and wall motion score index was increased in patients with coronary artery occlusion compared with those without occlusion (P = .006, P = .001, and P = .02), while LV ejection fraction did not differ (P = .20). MAD accurately identified patients with NSTEMIs, predicted mortality, and identified coronary occlusion in patients with NSTEMIs.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Ethnic dependent differences in diagnostic accuracy of glycated hemoglobin (HbA1c) in Canadian adults.
Previous studies have shown varying sensitivity and specificity of hemoglobin A1c (HbA1c) to identify diabetes and prediabetes, compared to 2-h oral glucose tolerance testing (OGTT) and fasting plasma glucose (FPG), in different ethnic groups. Within the Canadian population, the ability of HbA1c to identify prediabetes and diabetes in First Nations, Métis and Inuit, East and South Asian ethnic groups has yet to be determined. We collected demographic, lifestyle information, biochemical results of glycemic status (FPG, OGTT, and HbA1c) from an ethnically diverse Canadian population sample, which included a purposeful sampling of First Nations, Métis, Inuit, South Asian and East Asian participants. Sensitivity and specificity using Canadian Diabetes Association (CDA) recommended cut-points varied between ethnic groups, with greater variability for identification of prediabetes than diabetes. Dysglycemia (prediabetes and diabetes) was identified with a sensitivity and specificity ranging from 47.1% to 87.5%, respectively in Caucasians to 24.1% and 88.8% in Inuit. Optimal HbA1c ethnic-specific cut-points for dysglycemia and diabetes were determined by receiver operating characteristic (ROC) curve analysis. Our sample showed broad differences in the ability of HbA1c to identify dysglycemia or diabetes in different ethnic groups. Optimal cut-points for dysglycemia or diabetes in all ethnic groups were substantially lower than CDA recommendations. Utilization of HbA1c as the sole biochemical diagnostic marker may produce varying degrees of false negative results depending on the ethnicity of screened individuals. Further research is necessary to identify and validate optimal ethnic specific cut-points used for diabetic screening in the Canadian population.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Stephanie McMahon called out Big Show
Big Show is fired by Stephanie McMahon following a heated encounter inside the ring on Raw.
PITTSBURGH, Pa. – And now comes the fallout. One night after he singlehandedly sent the WWE Title Match at WWE Battleground to a No Contest with a swing of his fist, Big Show had no choice but to stand and face the music when Stephanie McMahon called him out for a very public – and ruthless – reprimanding on Raw. As it turned out, “The Authority’s” resident queen bee wasn’t so much interested in an explanation as extended humiliation of The World’s Largest Athlete, yet it was Big Show’s attempt to stand his ground that ultimately cost the giant the most.
Photos: Stephanie ends the Show
Pushed to the brink by Stephanie, Show finally caved and roared that he interfered in the Battleground main event because Stephanie herself – using Brad Maddox as her mouthpiece – had ordered him to do so. The accusation sent the McMahon heiress’ rage into high gear, and she quickly leveled six slaps to the giant’s face before borrowing her famous father’s signature phrase: “YOU’RE FIRED!”
Dolph Ziggler def. Damien Sandow
Dolph Ziggler and Damien Sandow clash inside the Raw ring just 24 hours removed from their encounter at WWE Battleground Kickoff.
The “Uncrowned World Heavyweight Champion’s” throne seemed farther away than ever when, one night after losing to Dolph Ziggler at the WWE Battleground kickoff, Damien Sandow was treated to an encore performance from WWE’s resident Showoff. Reeling from a Ziggler-induced knee injury that prevented him from cashing in his Money in the Bank contract at Battleground, Sandow started off with a feral burst of offense that showed The Showoff no quarter, punctuated by a pad-less Elbow of Disdain to Ziggler’s sternum.
Watch: Ziggler & Sandow's battle before Battleground | Sandow rages in Raw rematch
It only took one maneuver for Dolph to switch the momentum, dodging a charge from Sandow that sent The Enlightened One plowing into the turnbuckle. The Showoff then channeled his challenger by mauling Sandow with a series of punches before transitioning seamlessly into his signature acrobatic style. Sandow attempted to use Ziggler’s momentum against him by reversing a roll-up pin, but Dolph was ready for that, too, pouncing with the Famouser for the three-count.
Natalya, JoJo & Eva Marie def. Alicia Fox, Aksana & Rosa Mendes
Natalya teams with her "Total Divas" co-stars against the trio of WWE veterans Alicia Fox, Aksana & Rosa.
Looks like the Diva “Newbies” are getting the hang of things: Taking the ring alongside their de facto Diva mentor Natalya, “Total Divas” stars Eva Marie & JoJo notched a milestone win in a Six-Diva Tag Team Match on Raw. The unlucky recipients of their wrath were Alicia Fox, Aksana & Rosa Mendes, though the trio of devious Divas took advantage of Eva Marie’s inexperience when the newcomer tagged into the bout. Some quick thinking saved the “Total Divas” when Eva reached Natalya on the apron, and “The Queen of Harts” sealed the deal with a discus clothesline and Sharpshooter to Alicia Fox that earned the reality stars the win.
Los Matadores def. 3MB
Los Matadores step into the Raw ring 3MB on Raw.
Make it dos for Los Matadores, who followed up their debut victory over 3MB with a second win over a new permutation of the rockers’ ranks: Where the toreadors felled Heath Slater & Jinder Mahal last week, this time Mahal & Drew McIntyre met their defeat at the hands of the mysterious newcomers. Moments after “The Maharajah” felt the brunt of the Matadores’ offense, McIntyre tagged in and briefly turned the tables. Yet the synchronized offense of Diego & Fernando ultimately felled the two-bit rock gods when all was said and done.
Photos: Los Matadores roll on | Watch El Torito strike
Even El Torito got his licks in on the rockers, baiting Heath Slater into the ring and shocking the former WWE Tag Team Champion with a hurricanrana off the top rope. Fear the bull.
Ryback called out CM Punk
The only thing Ryback and Paul Heyman like less than “bullies,” as it turns out, is “cheaters.” The mad scientist and his monstrous man-at-arms came to Pittsburgh in a huff over the events of WWE Battleground, where CM Punk took advantage of the referee’s distraction to low-blow Ryback into defeat.
With great indignation, the ECW mastermind ascended his personal pulpit and ran down his onetime champion’s ethics, even going so far as to demean Punk to his face when The Straight Edge Superstar showed up in person. But Punk’s open rematch challenge slightly backfired when Ryback invited the former WWE Champion to back up his famous talk in Pittsburgh. With Punk at a 2-on-1 disadvantage, the situation didn’t look all that great. Happily, though, R-Truth was on hand to offer his hand and even the odds.
CM Punk & R-Truth def. Intercontinental Champion Curtis Axel & Ryback
CM Punk & R-Truth team up against the duo of Ryback & Intercontinental Champion Curtis Axel.
It was a rough night in Pittsburgh for Paul Heyman’s minions when Curtis Axel & Ryback fell to the combined efforts of CM Punk & R-Truth in an impromptu tag match on Raw. With Punk and Ryback circling each other for the majority of the bout, Axel felt the brunt of Punk & Truth's offense at the outset when they isolated him from his monstrous partner. The Intercontinental Champion turned the tide for his team only when he tagged in Ryback, freeing “The Big Guy” to control the pace of the match.
Photos: Heyman's team trounced | Truth hurts against Axel
With Truth now alone in the ring and unable to reach The Straight Edge Superstar, Ryback and Axel alternated offense against the former U.S. Champion while Heyman screamed instruction from the outside. Ryback’s showboating backfired when Truth lashed out with a heel kick and tagged in Punk, who made quick work of a freshly-tagged Axel with the Go to Sleep. Yet Punk allowed Truth to do the final honors and avenge his devastating loss at Battleground with a “perfect” scissor kick to Axel’s head.
Randy Orton def. Kofi Kingston
Kofi Kingston steps inside the ring with The Viper on Raw.
Few WWE Superstars were more upset about the outcome of Battleground than Randy Orton, and The Viper took out his frustrations on an old enemy in Pittsburgh: Kofi Kingston. Hungry for a “W” after his loss to Bray Wyatt at Battleground, The Boom Squad General used the full scope of his bag of tricks in pursuit of victory over The Viper. Despite Kofi’s fast start, though, a backdrop onto the barricade swung the contest firmly in favor of The Apex Predator.
Photos: Orton strikes Kofi | Bryan unleashes his fury
Orton made a systematic show of dismantling his opponent, yet Kingston grinded his way to a second wind, plastering Orton with a sky-high cross body off the top rope. The burst left Kofi winded yet he found the reserves to hang tight, although it was all for naught after The Apex Predator executed a hanging DDT off the barricade and followed with a match-ending RKO. The night might have ended happily for Orton then, if Daniel Bryan hadn’t stormed the ring and laid waste to The Viper, mauling his longtime opponent into retreat while officials gave hot pursuit.
Ricardo Rodriguez def. World Heavyweight Champion Alberto Del Rio
Vickie Guerrero gives sets up a match featuring Ricardo Rodriguez taking on his former boss World Champion Alberto Del Rio.
It's not a typo: One night after his new buddy Rob Van Dam was brutalized into submission by Alberto Del Rio, Ricardo Rodriguez avenged his pal’s (and his own) humiliation when Vickie Guerrero named him the surprise opponent for the World Heavyweight Champion on Raw.
Photos: Ricardo gets the upset | Del Rio loses his cool
Granted, he had some help: A sudden, blockbuster announcement from Vickie left the champion so gobsmacked that Ricardo was able to capitalize, springing a surprise rollup on his former jefe for the 1-2-3. The Essence of Excellence wasn’t about to let his old buddy’s win go unpunished, though, and he quickly cut Ricardo’s celebration short with another hellacious beatdown of his former ring announcer.
Oh, and as for that announcement that left Del Rio so furious? It was Vickie’s announcement of his new No. 1 contender at Hell in a Cell … John Cena.
Fandango def. Zack Ryder
Zack Ryder goes one-on-one with Fandango on Raw.
Fandango danced away with a victory again on Raw, putting his famous feet to good use against a game Zack Ryder in Pittsburgh’s CONSOL Energy Center. After a tight back-and-forth, the furious efforts of The Ultimate Broski brought him within a spiked hair’s breadth of victory when he planted a big boot in the chiseled mug of the dancing fiend, yet Ryder’s euphoria was short-lived. A kick to the head left Ryder face-down on the mat, and Fandango’ soaring leg drop to the back of the broski’s neck put the bout to rest.
The Real Americans def. Santino Marella & The Great Khali
Santino Marella teams with The Great Khali to face Jack Swagger and The Real Americans.
The Real Americans’ win at WWE Battleground was marked by one of the greatest feats of strength the WWE Universe has ever seen when Antonio Cesaro executed the Cesaro Swing on The Great Khali. And, as proof it was no fluke, the mighty “patriots” repeated the feat the next night on Raw. After Jack Swagger battled Santino Marella to a standstill, Cesaro & Khali entered the bout and the former U.S. Champion sent The Punjabi Titan twirling again with the Swing, covering him for the win moments after.
Photos: A real, American victory | Khali swings again
Cesaro’s demonstration didn’t end there, though: Hornswoggle nearly suffered the same fate as Khali, although Santino happily liberated his little buddy from the strongman’s clutches with The Cobra before Cesaro could really get rolling.
The Wyatt Family crashed 'Miz TV'
"Miz TV" almost becomes "Wyatt TV" on Raw.
“The Most Must-See Talk Show in WWE” got a sharp jolt of terror when Bray Wyatt came strolling out of the darkness, interrupting “Miz TV” before it even got going. The Eater of Worlds’ presence (plus the sudden appearance of Luke Harper & Erick Rowan in the ring) sent Miz into flight-or-fight mode and The Awesome One managed to get a few shots in on Bray before making his escape. Yet “The Man of 1,000 Truths” left Miz off with an final warning ringing in his ears: “You can run, but you cannot hide.”
U.S. & WWE Tag Team Champions The Shield def. Daniel Bryan, Cody Rhodes & Goldust
After being fired earlier in the night by Stephanie McMahon, Big Show gets some retribution on The Authority by knocking out WWE COO Triple H.
With Triple H perched at ringside, there was little chance of Daniel Bryan, Cody Rhodes & Goldust scoring another upstart win at the expense of “The Authority,” but it was The King of Kings himself who truly felt the cost of doing business when all was said and done. After strong early work from Goldust, Dean Ambrose created separation in the match by preventing Cody’s moonsault, yet Bryan reversed the momentum back, going ballistic and singlehandedly tore the three titleholders to pieces.
Watch: Triple H gets knocked out | Photos of the Six Man madness
It was a strong showing just three weeks before Bryan enters Hell in a Cell for another play at the vacant WWE Title ( and a very special guest ref), but a steel chair from Ambrose gave Bryan & Co. the Disqualification win, but The Game’s decision to restart the bout with a No-DQ stipulation led to disaster when Randy Orton struck Bryan through the crowd with a surprise RKO and fed him to a waiting Seth Rollins for the pin. As The Game admired his handiwork, though, the freshly fired Big Show made his presence known. With revenge on his mind and nothing to lose, WWE’s newest and biggest alumnus fended off The Shield’s attempted attacks and promptly KO Punched The Game into oblivion, leaving Raw for the first time in a long time with his head held high.
|
{
"pile_set_name": "OpenWebText2"
}
|
Brick & Lace
Brick & Lace are a Jamaican-American dancehall/R&B (or reggae fusion) musical duo consisting of sisters Nyanda and Nailah Thorbourne. According to Billboard, their name reflects the tough and the soft sides of femininity. Signed to the Geffen label, Brick & Lace originally consisted of three performing sisters Tasha, Nailah, and Nyanda. Tasha left the stage to work behind the scenes and co-write songs for the group. Their first Geffen Records' single "Get That Clear" and their first album Love Is Wicked were both released in 2006.
Career
Early Life and Career Beginnings
Brick and Lace were signed by hip hop singer-songwriter Akon to his record label, Kon Live Distribution. They were born to a Jamaican father and an Black American mother. The duo has toured internationally, including Kenya, Malawi, Nigeria, Rwanda, Senegal, Tanzania, Uganda, Zambia and Zimbabwe.
2007–10: Love Is Wicked and Re-release
Their debut album, Love Is Wicked, had a limited release in various countries on 4 September 2007. The album spawned four singles, "Get That Clear (Hold Up)", "Never, Never", "Love Is Wicked" and "Take Me Back". "Love Is Wicked" was listed on six different charts, including the Sverigetopplistan, the Sweden Singles Top 60 and the France'd SNEP Singles Top 100. It reached number 6 on the Finland. Its highest entry was number 9 in the France Singles Top 100. "Never, Never" was a hit in Finland, performing also well in Kenya, where it reached No. 14 in 2008. Brick & Lace performed in Gwen Stefani's The Sweet Escape Tour on 24 May 2007, in Camden, New Jersey, filling in for Lady Sovereign, who failed to attend. In 2008, the after-effects of their first album hit and the sisters went busily on many tours for the year, most notably in Europe and Africa by popular demand, and also produced a few new songs such as "Cry on Me" and "Bad to di Bone".
In the year 2009, Brick and Lace released their single called "Bad to di Bone" which became a well-known track in European and African countries. A French collaboration was even presented hence popularity. This new single was intentionally pinned out to appear on a new upcoming album, but instead was re-based on "Love is Wicked", which was re-released for a second shot at fame and success. In July 2009, the duo penned another hit track called "Room Service", a summer hit released from the new Love is Wicked album.
Starting off the year 2010 with releasing four new songs in March, the Brick and Lace Summer 2010 European Tour was soon announced straight after. An upcoming second single and music video to promote their second album was said to be imminently soon when the girls were interviewed in December 2009. They released "Bang Bang", "Ring The Alarm", and "Shackles" as buzz singles for their upcoming album and withdrew "Club It Up" from internet markets for future plans. Finally settled with the release of their debut album, with two international platinum singles: "Love Is Wicked" and "Bad To Di Bone", the sisters started the last of the Love Is Wicked International Tour era by producing a final tour for the African, European and Asian fans globally. Soon after May 2010, they revealed to African press that Nyanda was pregnant and was expecting a baby soon.
2011–12: Independent Return, New Album Plans and Bloodline
There has been a buzz on the internet stating that the girls will be releasing a second album in 2011–12. Starting off the year 2011, Brick and Lace toured in January and February internationally across Europe, Asia-Pacific and Africa. Soon after Nyanda, the elder of the two, who was already in late pregnancy, has gone on a break for health cares and her soon to be born baby. Brick and Lace's younger sister Candace has currently filled in for her for any tour representation. Latest news is that Brick and Lace will be touring Europe yet again in April, May and June 2011. It has been revealed that Nyanda has already given birth to her baby and is already two months post-pregnancy. She has returned to Brick & Lace representation. Currently, the girls are working with French heavyweight DJs, Golden Crew and Martiniquean artist Lynnsha, in their next hit song called "In Love with the Music". The Video has already been record and as is the song; awaiting release. A snippet of the song was released for one official week and the song transcends more on techno roots, new to Brick & Lace's style. On 19 April 2011, Brick and Lace released their new single alongside Golden Crew, called "In Love with the Music". The song also has a French version featuring Lynnsha. The French version is said to appear on Golden Crews next album, while the International US Version is set to appear off Brick and Lace's second album as a possible Lead Single. There is also a buzz on the internet stating that the girls have broken away from Konlive Records and are working with Atlantic Records, as it shows on their Myspace page. They are currently working with Darkchild and other producers on their second album and have another album called yupa
In September 2011 Brick and Lace released a cover of Jennifer Lopez's hit single "I'm into You", under the request of fans who kept saying that J.Lo's single sounded like the Jamaican duo. The sisters also stated in an interview with Belgium Media 1 TV that they are indeed currently working on their second album and have started a song-writing team with their two other sisters, Candace and Tasha Thorbourne. Their song-writing team is called Bloodline, and they have released an official remix, done by heavyweight Techno DJ Sydney Sampson, for their debut Bloodline single called "This Time". The single features production from Tearce Kizzo, who has worked with artists such as Eva Simmons, and it has been released under massive European label Spinnin Records. The sisters are currently in the studio working on new material.
In November 2011 Brick and Lace released the video for their new single, called "This Time". The song encompasses Techno and House elements, new to Brick and Lace's style, however portraying the diversity of which these two beauties hold in the music industry. The Jamaican sisters are not featured in the video, however the use of European Models and the producer, Tearce Kizzo, shows the scenes of a pool party and sophisticated yet summer feeling of Ibiza. Starting off the year 2012, as their song writing team, Bloodline is currently working with producer team cave (Jonas Saeed & Niclas Kings) for Jennifer Lopez and Wisin y Yandel, where they have received their first single placement, having written Wisin & Yandel ft Jennifer Lopez's new single, called "Follow The Leader".
Brick & Lace have also recently released another "buzz" single called "How I Like It", which features production from DJ Remady, a famous Swiss producer. The track is featured on his album called, "The Original", and it encompasses Dance/Electro beats. The song has apparently gained a lot of recognition via the internet, although it is not a single for Remady's album. The sisters are using it as a buzz single for their upcoming sophomore release.
In 2012, Brick & Lace also released bi-lingual music for their French fans with artists like Rim-K and Vincenzo. The track "Grenade" from Vincenzo's album "La Matrice" and "Take It to the Ring", a demo track by Dj Zack. As their song writing team Bloodline, the sisters co-wrote Christina Aguillera's "Around The World" from her album, Lotus.
2013–Present: Solo Careers, Talk Shows and Break from Brick & Lace
After touring Africa with artists such as US rapper Eve, Brick & Lace started off the year 2013 by going on solo careers. This lead a wildfire rumour all over the internet stating that the sisters had split and that Brick & Lace was no more. However, according to their Twitter and Facebook pages, Nailah and Nyanda both decided to take a break from the Brick & Lace dynamic for at least a year, so that they may explore more of their own creativity as solo artists. However, each sister stated that they would return as Brick & Lace to continue working on their second album.
Nyanda, the elder of the two, released a dance hall remix to Taylor Swift's "I Knew You Were Trouble" single. The remix single gained positive reviews all over the internet and has even been placed on many African charts and on the UK Top 30 club charts for a number of weeks. Nyanda has also been releasing many promotional singles, for her upcoming solo album, with hits such as "Like A Pro" with The Wizard and Chedda, and "Slippery When Wet (In the Middle)" with Black Lion Music Group. Nyanda also did a feature on Nicki Minaj & French Montana's "Freaks" single. Nyanda has also released a new dance hall single which features Black Lion and Mr Vegas, called "Boom and Rave". She recently released a House single in South Africa called "Cool & Deadly" with DJ Euphonik and DJ Fresh, and another English-French single ft Muss called "You Got Me Good".
Nyanda recently released a Music Video, on 26 June 2013, for "Slippery When Wet", which was directed by Muss as well.
The younger half, Nailah, under new stage name "Nyla", has also released her solo project, starting off with a signing under Ky-mani Marley's new record label, Konfrontation Music, and the debut of her solo single called "Stand Up", written by The Cave Production Team in Sweden and Bloodline, and produced by CMC Productions from Miami.
As their song writing team Bloodline, they are currently working with Pharrel's artist, Leah Labelle and Christina Millian, on her upcoming album. One of their Bloodline demo tracks was leaked in April, called "Geisha Girl", where Brick & Lace fans were delighted to the sisters unexpected and unofficial "return". One of Bloodline's singles was also recently released and is sung by artist Leah Labelle and produced by Spanish DJ, Brian Cross called "Shot Gun", which appears on Brian Cross' 2013 album as its lead single. Nyanda also appears on the dance hall remix version of Leah Labelle's single called "Lolita".
During the summer of 2014, Nyanda, Nailah and younger sister I-Candy were each nominated for RLM World Music Video Awards. Nailah won captured the Best R&B Video award with her song "Stand Up." Nyanda won the Best Dance Music Video award with her song "I Love Sax." She also won Best Female Artist and was featured on the Best Reggae Music Video winning song "Like a Pro" which was won by The Wizard.
During that year, Nyla also released her second single called "Body Calling" and a music video for it, directed by Rona Cohen. She also collaborated with Reggae/ Dancehall icon Sean Paul on "Pornstar", a racy dance anthem from his Full Frequency album, and African artist Redsan, on "Touch Me There". Nyanda also worked with Ian Thomas on "Run Away". Nyanda and Nyla later reunited in November, as Brick & Lace once again, and went on to tour Australia.
The Year 2015 saw the start of both Nyanda and Nyla, joining their elder sister Tasha, to create their own Production called 'Chit Chat'; an online talk show, which is featured on YouTube, with a new episode airing every week. Chit Chat combines humor and style, touching on the latest fashions, news and trends.
On March 23, 2015, it was revealed that Nyla was working with Major Lazer on a song entitled "Light It Up", which will be featured on Lazer's 'Peace Is The Mission' album, released June 1; the song peaked at number 50 in Austria. The Light It Up Remix with Fuse ODG was released later on this year and charted as a European Single. Nyanda collaborated with TommoProduction from Romania, and spawned her two Singles, "Put It On Me" and the Chart-topping "All My Love".
Discography
2007: Love Is Wicked
References
External links
Brick & Lace
Geffen Records: Brick & Lace
RudeGal.com: Brick and Lace, August 2006
YardFlex.com: Geffen Records Presents Brick & Lace! – Debut Single 'Get That Clear' Featuring Akon!
Brick & Lace – Love Is Wicked – Charts in France.net
Brick & Lace at acharts.us
MusicRemedy.com: Brick & Lace – Love is Wicked
Category:Reggae fusion groups
Category:Jamaican musical groups
Category:Contemporary R&B duos
Category:Sony/ATV Music Publishing artists
Category:Jamaican girl groups
Category:Reggae duos
Category:Sibling musical duos
Category:Sibling musical trios
Category:Musical groups established in 2004
Category:All-female bands
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Comparison of real waste (MSW and MPW) pyrolysis in batch reactor over different catalysts. Part II: contaminants, char and pyrolysis oil properties.
Pyrolysis of real wastes (MPW and MSW) has been investigated at 500°C, 550°C and 600°C using Y-zeolite, β-zeolite, equilibrium FCC, MoO3, Ni-Mo-catalyst, HZSM-5 and Al(OH)3 as catalysts. The viscosity of pyrolysis oils could be decreased by the using of catalysts, especially by β-zeolite and MoO3. Both carbon frame and double bound isomerization was found in case of thermo-catalytic pyrolysis. Char morphology and texture analysis showed more coke deposits on the catalyst surface using MSW raw material. Pyrolysis oils had K, S, P Cl, Ca, Zn, Fe, Cr, Br and Sb as contaminants; and the concentrations of K, S, P, Cl and Br could be decreased by the using of catalysts.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Recommended Free Desktop Software
Many businesses and individuals needlessly spend a lot of money on desktop software. There are many free software alternatives out there that perform as well, or even better, than their non-free alternatives. It's worthwhile exploring free software options as a way to save cash.
It's possible that you've never heard of the free software alternatives listed below. One reason is that creators of free software usually don't have the marketing budgets of the Microsofts and Adobes of the world. This doesn't mean that free software is not functional or less safe than proprietary alternatives. Free software is often safer, especially when it's open source, because anyone can see the code. More eyeballs on the code means vulnerabilities can be found and fixed more quickly.
Abiword
Abiword is a lightweight, stand-alone word processor that has all the features most folks will ever need.
Scribus
If you need desktop publishing software (DTP), take a look at Scribus. It has a lot of features which means you might not need to pay for a program like Adobe InDesign or Microsoft Publisher.
Graphics & Photo Editing
GIMP
GIMP (GNU Image Manipulation Program) is a graphics editing program to edit and create a wide variety of images, icons, web-page graphics and more. It contains all the features most users need without having to resort to the pricy Adobe Photoshop alternative. While some companies, like professional photography studios, might need the features Photoshop provides, it doesn't hurt to take a look at GIMP.
Inkscape
If you're looking for a vector graphics editor, with capabilities similar to Illustrator, CorelDraw, or Xara X, take a look at Inkscape. It's also free and open source. As described on the Inkscape website: "Inkscape supports many advanced SVG features (markers, clones, alpha blending, etc.) and great care is taken in designing a streamlined interface. It is very easy to edit nodes, perform complex path operations, trace bitmaps and much more."
Email & Calendar
Thunderbird & Lightening
Web Browser
Firefox, Chrome & Opera
While Microsoft Internet Explorer comes bundled with Windows, it really isn't the safest choice for web browsing. In addition, it tends to lag behind in terms of compatibility with web standards and features. We recommend Firefox, Chrome/Chromium and Opera.
Programming/Development
Eclipse
Eclipse is our overall pick for a variety of programming languages. It's a feature rich, integrated development environment. You can use Eclipse to develop Java applications with plugins to code in C, C++, Perl, PHP, Python as well as many other languages.
Kompozer, Bluefish, & Aptana Studio
Operating System
Linux
Microsoft Windows is currently the most common desktop operating system. It is also the most insecure and vulnerable operating system when compared to Mac OS and Linux. A free and safer alternative would be to use one of a variety of Linux desktop distributions. Linux desktops come in a variety of “flavours”, allowing it to target a wide variety of audiences. Many Linux distributions are extremely user-friendly, and often easier to use and install than MS Windows.
It's important to note that there will be a learning curve when switching from Windows to Linux, but the curve is no bigger than if you were to switch from Windows to Mac OS. If the Windows software you rely on has Linux alternatives, you should consider Linux as an alternative operating system for at least some of your desktops. The desktop software alternatives listed above have versions for Linux, Mac OS as well as Windows.
Where to Find More Free Software Alternatives
There are many thousands of free software packages out there. Many can be searched for and downloaded from sourceforge.net. SourceForge boasts over 3 million developers involved in over 300,000 free software projects. On SourceForge you can search for software by keyword or category, and view popularity, user ratings, and recommendations.
Is It Worth Switching?
Adapting to new software does carry costs. The question is, do the long-term financial savings gained from free software justify the short-term switching costs? The answer is sometimes yes, and sometimes no. Let's use an example. If you have a MS Excel power user on hand whose productivity would be stifled by switching to the LibreOffice Calc alternative, then it's best to pay for an Excel license. The added productivity will make up for the cost of the license. If the user is new to spreadsheets or is more or less indifferent, then LibreOffice Calc is a good choice.
|
{
"pile_set_name": "Pile-CC"
}
|
INDIANAPOLIS – Pat McAfee spent his eight seasons with the Colts entertaining fans with funny gestures after good punts, putting some in tears during his offseason standup comedy routines and for his social-media comments in which he had no problem going after the likes of former Indianapolis general manager Ryan Grigson and Skip Bayless. And we can’t forget about his desire to go swimming in an Indianapolis canal while intoxicated back in 2010, or all the charitable things he did around the state.
But there’s the Pat McAfee from on the football field that the Colts now face the reality of having to replace. He surprised everybody by retiring at age 29 during the middle of the night Thursday to join Barstool Sports.
McAfee made the Pro Bowl twice while averaging 46.4 gross yards per punt and 39.8 net yards per punt. He had 33.6 percent of his 575 punt attempts land inside the opponent’s 20-yard line.
That was just part of his job with the Colts.
McAfee was also the holder for Adam Vinatieri on field goals and extra points. He also handled kickoff duties to save the 44-year Vinatieri's leg and he was also the emergency quarterback behind Andrew Luck and Scott Tolzien.
New Colts general manager Chris Ballard not only has to improve his aging defense this offseason; he now also has to find a new punter, holder and somebody to handle kickoff duties.
|
{
"pile_set_name": "OpenWebText2"
}
|
Anaphylaxis in the monkey: hemodynamics and blood flow distribution.
Aggregate anaphylaxis was induced in eight ovalbumin-sensitized monkeys (Macaca irus). Hemodynamics, blood flow distribution and myocardial performance were studied. Following challenge, severe circulatory shock developed. Systemic arterial and left atrial pressures decreased and pulmonary arterial and right atrial pressures increased. There was a tenfold increase in pulmonary vascular resistance, and cardiac output was markedly reduced (-75%). A redistribution of the blood flow to vital organs (brain, heart and liver) occurred, at the expense of flow to other regions (muscles, kidneys, pancreas and spleen). There was also a redistribution of the blood flow within the myocardium, resulting in an unchanged right ventricular blood flow, despite a decrease in total myocardial blood flow. Right ventricular stroke work was reduced in spite of high filling pressures, whereas the decrease in left ventricular stroke work coincided with low filling pressures. It is concluded that the initial main cause of the low outflow state was an increased resistance in the pulmonary circulation followed by acute right heart failure.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
A judge declared a mistrial Monday in the murder case of Michael Slager, the South Carolina officer who killed Walter Scott, an unarmed black man who was shot in the back multiple times following a routine traffic stop. The 2015 incident, caught on video and widely viewed around the country, focused the nation’s attention on police treatment of African-Americans and reignited protests of law enforcement following a series of black men killed by officers.
The jury, composed of 11 white jurors and one black juror, was unable to come to an unanimous decision. On Monday, the judge read a note indicating that a majority of jurors were still undecided. That was in contrast to a note from one jury member on Friday saying, “I cannot in good conscience consider a guilty verdict.”
The trial stemmed from a deadly confrontation on April 4, 2015, when Slager, a North Charleston, S.C., police officer, stopped Scott for a broken taillight. Scott ran from Slager, who shot at Scott eight times as he tried to flee. The incident itself may have gone overlooked if not for video captured by Feidin Santana, an eyewitness who recorded Slager firing at Scott. Slager was later fired from the North Charleston Police Department.
Read more: Man Who Filmed South Carolina Police Shooting Speaks Out
At trial, Slager’s defense attorneys argued that an earlier confrontation not caught on video justified the officer’s use of deadly force. On Tuesday, Slager testified in his own defense, describing feeling “total fear” as he tried to apprehend Scott and saying Scott stole his Taser and tried to shoot him with it.
The video does not show a physical confrontation between the two men but captures Slager picking up the Taser after the shooting and placing it on the ground next to Scott’s body, which prosecutors said showed that Slager was attempting to plant evidence.
Read more: Celebrities Speak Out After Walter Scott Shooting
Few officers go to trial for on-duty shooting deaths, and even fewer are convicted. From 2005 and to 2014, 69 officers have been charged for on-duty shootings while only 26 were found guilty, according to numbers compiled by the The Wall Street Journal. In April, an Oklahoma volunteer sheriff’s deputy was convicted of second-degree manslaughter in the shooting death of 44-year-old Eric Harris. But in other high-profile deaths of black men at the hands of police, including Michael Brown in Ferguson, Mo., and Freddie Gray in Baltimore, juries have not handed down convictions.
Get The Brief. Sign up to receive the top stories you need to know right now. Please enter a valid email address. Sign Up Now Check the box if you do not wish to receive promotional offers via email from TIME. You can unsubscribe at any time. By signing up you are agreeing to our Terms of Use and Privacy Policy . This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Thank you! For your security, we've sent a confirmation email to the address you entered. Click the link to confirm your subscription and begin receiving our newsletters. If you don't get the confirmation within 10 minutes, please check your spam folder.
Contact us at letters@time.com.
|
{
"pile_set_name": "OpenWebText2"
}
|
Secure Shopping
Pad A Cheek® Universal Strap & Neck Pad
Pad A Cheek® Universal Neck Pad Pad A Cheek® Universal Neck Pad
Your Price: $20.00
Pad A Cheek® Universal Neck Pad is one long pad that extends from one side of the mask around the back of
the head to the other side of the mask. Made of the softest Micro Fleece material. Prevents neck chaffing, and gives a soft touch to your mask.
Product Options
Pad A Cheek® Universal Neck Pad
The Pad A Cheek® Universal Neck Pad is one long pad that extends from one side of the mask around the back of
the head to the other side of the mask, and made of very soft micro fleece material.
It prevents neck chaffing and makes wearing your CPAP mask much more comfortable.
The side straps are double stitched so you can trim the length and it will remain
securely stitched.
Important Note: The PAD A CHEEK Neck Pad covers the portion of the straps that are covered by the
Original PAD A CHEEKs so there is no need to buy both.
Pad A Cheek® Mask Liner for Hybrid and Liberty Full Face CPAP Mask, is made of soft micro fiber material which makes the seal more comfortable against your face. It also helps to absorb moisture and oils, and helps prevent leaks.
|
{
"pile_set_name": "Pile-CC"
}
|
Locations | Canberra
Eye Specialists and Laser Eye Surgery Clinic in Canberra
personalEYES offers the widest and most comprehensive range of vision correction techniques in Canberra. We are the leading laser eye surgery clinic, with a team of the most experienced and dedicated eye specialists on hand.
Our team is committed to providing personalised vision correction options, using the techniques and technology that is best suited to your eyes and your lifestyle.
Some of the services that we provide in Canberra include:
Eye Tests
Take our online eye test or visit our experts in Canberra for more information. We can professionally test your vision and provide treatment if necessary.
LASIK Eye Surgery
LASIK can quickly and painlessly correct common vision conditions like myopia, astigmatism and hyperopia. LASIK eye surgery is a life changing procedure that is available in many different options.
Cataract Eye Surgery
Cataracts are the most common forms of vision loss worldwide. Our surgeons at personalEYES in Canberra can perform cataract eye surgery to remove the cloudy film that hinders your vision and replace it with a new intraocular lens.
Macular Degeneration Treatment
We offer Macular Degeneration treatments that can help you to regain your ability to drive and read again, as well as recognise the faces of loved ones.
Diabetic Retinopathy Treatment
Individuals with diabetes are at high risk for developing retinopathy, which can permanently damage the retina. If you are at risk, take action early. Diabetic Retinopathy treatment can slow damage and prevent further vision loss.
Short Sightedness Treatment
Myopia, or short-sightedness, can be corrected with glasses, lenses or refractive surgery, like LASIK.
Keratoconus Treatment
Keratoconus is a progressive eye disease that causes the thinning of the cornea. Talk to us about Keratoconus treatment.
|
{
"pile_set_name": "Pile-CC"
}
|
Sternal resection for metastasis from thyroid carcinoma and reconstruction with the sandwiched Marlex and stainless steel mesh.
A case of 69-year-old woman with a solitary sternal bone metastasis from thyroid carcinoma undergoing surgical therapy was reported here. On admission, most part of the body of the sternum was destroyed by tumor. Subtotal sternectomy was performed and a part of the major pectoral muscles adherent to the sternal tumor was also resected. The chest wall defect was reconstructed with a sandwiched Marlex and stainless steel mesh. Pathological examination of the resected specimen revealed metastatic papillary carcinoma of the thyroid. Her postoperative course was uneventful. The reconstruction with Marlex and stainless steel mesh seemed to be an appropriate procedure to prevent paradoxical movement of the thorax and protect the intrathoracic organs. Stainless steel mesh compensated for limited resiliency of Marlex mesh and remained rigid in all directions.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Insulin induced reversibility of altered responsiveness in femoral arterial bed of diabetic dogs.
The altered reactivities of femoral arterial bed to noradrenaline, phenylephrine, adenosine and prostacyclin were compared in 18, clinically manifest but aketotic, alloxan diabetic mongrel dogs. Alloxan treatment markedly increased the vasoconstrictor responses to noradrenaline and phenylephrine, as well as the adenosine-induced vasodilation in the femoral vasculature. These changes were prevented or normalized, respectively, in the early or late insulin-treated alloxan diabetic animals. In the case of noradrenaline not only a normalization but also an explicit overcompensation could be observed by insulin treatment. The altered reactivity to prostacyclin could not be influenced by insulin therapy. These results indicate a significant difference in the effect of insulin treatment on the altered diabetic vascular responsiveness to catecholamines and adenosine or to prostacyclin.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
class Logstalgia < Formula
desc "Web server access log visualizer with retro style"
homepage "http://logstalgia.io/"
url "https://github.com/acaudwell/Logstalgia/releases/download/logstalgia-1.0.7/logstalgia-1.0.7.tar.gz"
sha256 "5553fd03fb7be564538fe56e871eac6e3caf56f40e8abc4602d2553964f8f0e1"
bottle do
sha256 "248428cb04a28dd6cfac58d860417324e2d3349314d0fcbbf180470e618ca8a0" => :el_capitan
sha256 "ae50b8635b79a567f8076581fe74ec5fdeb191acdc9174a64463a5253dde9866" => :yosemite
sha256 "bf42ae5b89745a8e16450611d0bfabd5c9b157222abbacff2ecf75f68d6e2da8" => :mavericks
end
head do
url "https://github.com/acaudwell/Logstalgia.git"
depends_on "autoconf" => :build
depends_on "automake" => :build
depends_on "libtool" => :build
end
depends_on "pkg-config" => :build
depends_on "boost" => :build
depends_on "glm" => :build
depends_on "sdl2"
depends_on "sdl2_image"
depends_on "freetype"
depends_on "glew"
depends_on "libpng"
depends_on "jpeg"
depends_on "pcre"
needs :cxx11
def install
# clang on Mt. Lion will try to build against libstdc++,
# despite -std=gnu++0x
ENV.libcxx
# For non-/usr/local installs
ENV.append "CXXFLAGS", "-I#{HOMEBREW_PREFIX}/include"
# Handle building head.
system "autoreconf", "-f", "-i" if build.head?
system "./configure", "--disable-dependency-tracking",
"--prefix=#{prefix}",
"--without-x"
system "make"
system "make", "install"
end
test do
assert_match "Logstalgia v1.", shell_output("#{bin}/logstalgia --help")
end
end
|
{
"pile_set_name": "Github"
}
|
Congenital spinal tuberculosis associated with asymptomatic endometrial tuberculosis: A rare case report.
Spinal tuberculosis constitutes 50% of all musculoskeletal tuberculosis. However, literature regarding congenital spinal tuberculosis is very scanty. Congenital spinal tuberculosis was diagnosed in a two-month-old child on the basis of age at presentation (gibbus since three weeks of age), hepatomegaly, raised ESR, radiological destruction of D10-D11 vertebrae, asymptomatic maternal endometrial tuberculosis and tuberculous histopathology from CT guided biopsy specimen from D10 vertebra. Both child and mother were treated by antitubercular treatment. Child improved symptomatically, gibbus became less prominent and ESR became normal at the end of one year of treatment. Patient had no recurrence during last two years of follow-up. This is the first case of congenital tuberculosis of spine with a documented source of infection from asymptomatic maternal endometrial tuberculosis. CT guided core biopsy from vertebra/aspiration from the paravertebral abscess help in early diagnosis and treatment to reduce neurological morbidity and mortality. Endometrial biopsy help in establishing the diagnosis of congenital tuberculosis and adequate antitubercular treatment in such cases may provide protection to fetus in subsequent pregnancy.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Programming a custom redirect in a Drupal Site
I would like to know what is the best option to setup a Drupal redirect process that will look at the current time of day and then redirect the user to a page based on this information?
Since I have not had to do this before in Drupal, I'm looking for one or two suggestions on how to do this with the user starting the action from a menu item.
One thought I had is that I could create a page that is PHP content and determine the redirect there, but I'm unsure of how to code that in that location.
Also, I'm not sure if I've overlooked a module that could help with a conditional redirect or if all the references to form redirects might be applicable to what I'm trying to do.
A:
You could do something along the lines of this:
function MYMODULE_menu() {
$items['MYMODULE/whattodo'] = array(
'title' => 'Where should I go now, George',
'page callback' => 'MYMODULE_whattodo',
'access callback' => TRUE,
'type' => MENU_CALLBACK,
);
return $items;
}
function MYMODULE_whattodo() {
$foo= // code to get the current time of day in whatever form you want that matches the switch cases below
switch($foo) {
case // morning:
drupal_goto(// page for the morning);
break;
case // afternoon:
drupal_goto(// page for the afternoon);
break;
case // evening:
drupal_goto(// page for the evening);
break;
}
}
which means when a user went to www.mysite.com/MYMODULE/whattodo, they would be redirected to whatever page you set up via drupal_goto()
|
{
"pile_set_name": "StackExchange"
}
|
Neonatal presentation of Prader Willi sindrome. Personal records.
Prader Willi Syndrome (PWS) is characterized by typical appearance, obesity, short stature, hypothalamic hypogonadism, cryptorchidism, hypotonia, behavioural abnormalities and mental retardation. It is considered as a continuous genes syndrome with different genotypes: microdeletion of the region 15q11-q13 with paternal imprinting; maternal uniparental disomy (UPD) of chromosome 15; chromosomal rearrangement. Clinical manifestations evolve with age from newborn (hypotonia, poor sucking, hypoplastic external genitalia) to childhood (delay in psychomotor development, hyperphagia, obesity, acromicria and craniofacial dysmorphisms). We present five newborns who received an early diagnosis, based on clinical presentation. The early treatment and follow-up can in fact improve the natural evolution of the syndrome in order to prevent respiratory tract diseases and obesity, and to improve growth.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<title>Web Prolog</title>
<meta name="description" content="">
<meta name="author" content="Torbjörn Lager">
<meta name="viewport" content="width=device-width, initial-scale=1">
<!-- CSS -->
<link rel="stylesheet" href="/vendor/bootstrap/css/bootstrap.min.css">
<link rel="stylesheet" href="/apps/swish/css/swish.css">
<link rel="stylesheet" href="/apps/swish/css/jquery.terminal.css"/>
<link rel="shortcut icon" href="/favicon.ico">
</head>
<body>
<header class="navbar navbar-default navbar-fixed-top">
<div class="container pull-left">
<div class="navbar-header">
<button class="navbar-toggle" type="button" data-toggle="collapse" data-target=".bs-navbar-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a href="/"><img style="position:absolute;top:4px;left:4px;" src="/apps/swish/img/logo.png"></a>
<a href="/" style="margin-left:30px;font-size:24px" class="navbar-brand"><b><span style="color:maroon">Web Prolog</span></b></a>
</div>
<nav class="collapse navbar-collapse bs-navbar-collapse pull-left">
<ul class="nav navbar-nav">
<li class="dropdown">
<a href="#" class="dropdown-toggle" data-toggle="dropdown">File<b class="caret"></b></a>
<ul id="file-menu" class="dropdown-menu">
<li><a id="new">New</a></li>
<li class="divider"></li>
<li><a id="save">Save</a></li>
<li class="divider"></li>
<li><a id="share">Share...</a></li>
<li class="divider"></li>
<li><a id="prefs">Preferences...</a></li>
<li class="divider"></li>
<li><a id="print">Print...</a></li>
</ul>
</li>
<li class="dropdown">
<a href="#" class="dropdown-toggle" data-toggle="dropdown">Edit<b class="caret"></b></a>
<ul id="edit-menu" class="dropdown-menu">
<li><a id="undo">Undo</a></li>
<li><a id="redo">Redo</a></li>
<li class="divider"></li>
<li><a id="indent">Indent</a></li>
<li><a id="outdent">Outdent</a></li>
<li class="divider"></li>
<li><a id="comment">Toggle comment</a></li>
<li class="divider"></li>
<li><a id="find">Find and replace...</a></li>
</ul>
</li>
<li class="dropdown">
<a href="#" class="dropdown-toggle" data-toggle="dropdown">Examples<b class="caret"></b></a>
<ul id="example-menu" class="dropdown-menu">
<li><a id="tut">Tutorial</a></li>
<li class="divider"></li>
<li><a href="/apps/swish/examples/kb.pl">Knowledge bases</a></li>
<li><a href="/apps/swish/examples/lists.pl">List processing</a></li>
<li><a href="/apps/swish/examples/io.pl">Read and write</a></li>
<li><a href="/apps/swish/examples/database.pl">Assert and retract</a></li>
<li><a href="/apps/swish/examples/movies.pl">Movie database</a></li>
<li><a href="/apps/swish/examples/grammar.pl">DCG grammar</a></li>
<!--<li><a href="/apps/swish/examples/eliza.pl">Eliza</a></li>-->
<li><a href="/apps/swish/examples/expert-system.pl">Expert system</a></li>
<!--<li><a href="/apps/swish/examples/queens.pl">Queens</a></li>-->
<li><a href="/apps/swish/examples/clpfd-sudoku.pl">Sudoku (clp(fd))</a></li>
<li><a href="/apps/swish/examples/japanese.pl">Japanese source</a></li>
<li class="divider"></li>
<li><a href="/apps/swish/examples/priority_queue.pl">Priority queue</a></li>
<li><a href="/apps/swish/examples/fridge.pl">Fridge simulation</a></li>
<li><a href="/apps/swish/examples/pingpong.pl">Playing ping-pong</a></li>
<li><a href="/apps/swish/examples/process_ring.pl">Process ring</a></li>
<li><a href="/apps/swish/examples/philosophers.pl">Dining philosophers</a></li>
<li><a href="/apps/swish/examples/hotswapping.pl">Hotswapping code</a></li>
<li><a href="/apps/swish/examples/chat_client.pl">Chat client</a></li>
<li><a href="/apps/swish/examples/simple_pengine.pl">Simple pengine</a></li>
<li><a href="/apps/swish/examples/simple_rpc.pl">Simple RPC</a></li>
</ul>
</li>
<li class="dropdown">
<a href="#" class="dropdown-toggle" data-toggle="dropdown">Help<b class="caret"></b></a>
<ul class="dropdown-menu">
<li><a href="#about" data-toggle="modal">About...</a></li>
</ul>
</li>
</ul>
</nav>
</div>
</header>
<div id="preferences" class="modal fade" tabindex="-1">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal">×</button>
<h4 id="myModalLabel">Preferences</h4>
</div>
<div class="modal-body">
<form class="form-horizontal">
<legend>General</legend>
<div class="form-group">
<label class="col-lg-3 control-label" for="theme-menu">Theme </label>
<select id="theme-menu" class="input-sm preference-menu">
<option value="brain">Brain</option>
</select>
</div>
<legend>Editor</legend>
<div class="form-group">
<label class="col-lg-3 control-label" for="font-family-menu">Font family </label>
<select id="font-family-menu" class="input-sm preference-menu">
<option value="'andale mono',monospace">Andale Mono</option>
<option value="consolas,monospace">Consolas</option>
<option selected value="'courier new',monospace">Courier New</option>
<option value="courier,monospace">Courier</option>
<option value="monaco,monospace">Monaco</option>
<option value="menlo,monospace">Menlo</option>
<option value="'ubuntu mono',monospace">Ubuntu Mono</option>
<option value="'dejavu',monospace">Dejavu</option>
</select>
</div>
<div class="form-group">
<label class="col-lg-3 control-label" for="font-size-menu">Font size </label>
<select id="font-size-menu" class="input-sm preference-menu">
<option value="10">10</option>
<option value="12">12</option>
<option selected value="14">14</option>
<option value="16">16</option>
<option value="18">18</option>
<option value="20">20</option>
</select>
</div>
<div class="form-group">
<label class="col-lg-3 control-label" for="tab-size-menu">Tab size </label>
<select id="tab-size-menu" class="input-sm preference-menu">
<option value="2">2</option>
<option selected value="4">4</option>
<option value="6">6</option>
<option value="8">8</option>
</select>
</div>
<div class="form-group">
<label class="col-lg-3 control-label" for="tab-soft-checkbox">Use soft tabs</label>
<input id="tab-soft-checkbox" class="input-sm" checked type="checkbox">
</div>
<div class="form-group">
<label class="col-lg-3 control-label" for="line-wrap-checkbox">Lines</label>
<label class="checkbox-inline"><input id="line-wrap-checkbox" checked type="checkbox" class=""> Wrap</label>
<label class="checkbox-inline"><input id="line-highlight-checkbox" type="checkbox"> Highlight current</label>
<label class="checkbox-inline"><input id="line-numbering-checkbox" checked type="checkbox"> Show numbers</label>
</div>
</form>
</div>
</div>
</div>
</div>
<div id="share-dialog" class="modal fade" tabindex="-1">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal">×</button>
<h3 id="myModalLabel">Share your program!</h3>
</div>
<div class="modal-body">
<p>Your program is saved to the <span style="color:maroon">Web Prolog</span> node for a period of at least one month. A link to it is given below. Copy the link, send it around, do what you want with it. Anyone in possession of the link will be able to access <span style="color:maroon">Web Prolog</span> with your program loaded and ready to run.</p>
<p>
Link: <input style="width:520px;" class="input-sm" type="text" id="url" onclick="this.select()" value="">
</p>
</div>
</div>
</div>
</div>
<div id="about" class="modal fade" tabindex="-1">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal">×</button>
<h4 id="myModalLabel2">About <span style="color:maroon">Web Prolog</span><span class="pull-right">Version 0.1 </span></h4>
</div>
<div class="modal-body">
<p>This is a proof-of-concept online demonstration and tutorial of <span style="color:maroon">Web Prolog</span>, a proposal for a web logic programming language. Design and implementation by Torbjörn Lager, with a lot of help from Jan Wielemaker.
</p>
</div>
</div>
</div>
</div>
<div class="container">
<pre id="editor"></pre>
<div id="tutorial-container"></div>
<div id="shell"></div>
<div id="controls" onclick="return false">
<div>
<div>
<div>
<button id="ask-btn" class="btn btn-xs btn-primary">Ask</button>
<button id="next-btn" class="btn btn-xs btn-success" disabled>Next</button>
<button id="stop-btn" class="btn btn-xs btn-warning" disabled>Stop</button>
<button id="abort-btn" class="btn btn-xs btn-danger" disabled>Abort</button>
<div class="btn-group dropup">
<button id="examples-btn" class="btn btn-default btn-xs dropdown-toggle" data-toggle="dropdown" disabled>
Examples
<span class="caret"></span>
</button>
<ul id="examples" class="dropdown-menu">
</ul>
</div>
<div class="btn-group dropup">
<button id="history-btn" class="btn btn-default btn-xs dropdown-toggle" data-toggle="dropdown">
History
<span class="caret"></span>
</button>
<ul id="history" class="dropdown-menu"></ul>
</div>
<label class="checkbox-inline"><input id="json-trace-checkbox" type="checkbox"> Trace JSON</label>
<div class="btn-group pull-right">
<button id="clear-btn-query" class="btn btn-default btn-xs">Clear</button>
</div>
</div>
</div>
</div>
<div>
</div>
</div>
</div>
<header class="navbar navbar-default navbar-fixed-bottom bs-docs-nav">
<div class="footer">
<p class="muted credit pull-left">
Inspired by Erlang, powered by
<a target="_blank" href="http://www.swi-prolog.org/">SWI-Prolog</a>.
</p>
<input class="pull-right" id="slider" type='range' step='1' min='30' max='70' />
</div>
</header>
<!-- Placed at the end of the document so the pages load faster -->
<script src="/vendor/jquery/jquery-2.0.3.min.js"></script>
<script src="/vendor/bootstrap/js/bootstrap.min.js"></script>
<script src="/vendor/src-min-noconflict/ace.js" charset="utf-8"></script>
<script src="/apps/swish/js/jquery.mousewheel-min.js"></script>
<script src="/apps/swish/js/jquery.terminal.min.js"></script>
<script src="/apps/swish/js/swish.js" charset="utf-8"></script>
<script>
var pid;
var gterm;
var gmysend;
var state = 1;
var currcommand = "";
var trace = !$("#json-trace-checkbox").is(':checked');
function to_text(data) {
var text = [];
var hasBindings = false;
for (var key in data) {
var value = data[key];
if (Array.isArray(value)) {
value = "[" + value + "]";
}
if (value.charAt(0) != "_") {
text.push(key + " = " + value);
text.push(", \n");
hasBindings = true;
}
}
text.pop(); // get rid of the last comma
text.push(" ");
if (hasBindings) {
return text.join("");
} else {
return "true ";
}
}
function report(data) {
return to_text(data[0]);
}
function speak(string) {
var uu = new SpeechSynthesisUtterance(string);
speechSynthesis.speak(uu);
}
$(document).ready(function($) {
var ws = new WebSocket('ws://localhost:3060/ws', 'pcp-0.2');
function mysend(json) {
var jsonstr = JSON.stringify(json, null, 1);
if (!trace) {
gterm.echo(jsonstr, {
finalize: function(div) {
div.css("color", "blue");
}
});
};
ws.send(jsonstr);
}
gmysend = mysend;
ws.onopen = function(message) {
mysend({
command:"pengine_spawn",
options:"[exit(false), format('json-s')]"
});
};
ws.onerror = function(e) {
console.log(e);
};
ws.onclose = function(e) {
console.log(e);
};
ws.onmessage = function(message) {
var msg = JSON.parse(message.data);
if (msg.type == "spawned") {
pid = msg.pid;
}
$('#tutorial-container').load('/apps/swish/tutorial.html', function() {
recursiveReplaceHost(document.body, window.location.origin);
recursiveReplacePengine(document.body, pid);
});
disableButtons(false, true, true, true);
};
$('#shell').terminal(function(command, term) {
ws.onmessage = function(message) {
term.resume();
var msgstr = message.data;
msg = JSON.parse(msgstr);
if (!trace) {
term.echo(JSON.stringify(msg, null, 1), {
finalize: function(div) {
div.css("color", "green");
}
});
}
var type = msg.type;
if (type == "success") {
if (msg.more) {
state = 4;
term.set_prompt(report(msg.data));
disableButtons(true, false, false, true);
} else {
state = 1;
term.echo(report(msg.data).trim() + ".");
term.set_prompt(myprompt);
disableButtons(false, true, true, true);
}
term.scroll_to_bottom();
} else if (type == "failure") {
state = 1;
term.echo("false.");
term.set_prompt(myprompt);
term.scroll_to_bottom();
disableButtons(false, true, true, true);
} else if (type == "error") {
state = 1;
term.error(msg.data);
term.set_prompt(myprompt);
term.scroll_to_bottom();
disableButtons(false, true, true, true);
} else if (type == "stop") {
state = 1;
if (!trace) {
term.update(-3, term.get_prompt().trim() + ".");
} else {
term.update(-1, term.get_prompt().trim() + ".");
}
term.set_prompt(myprompt);
term.scroll_to_bottom();
disableButtons(false, true, true, true);
} else if (type == "prompt") {
state = 3;
term.set_prompt(msg.data + ": ");
} else if (type == "output") {
term.echo(msg.data);
term.set_prompt("");
} else if (type == "speak") {
speak(msg.data);
term.set_prompt("");
} else if (type == "echo") {
term.echo(msg.data);
term.set_prompt("");
} else if (type == "abort") {
term.echo("Aborted");
term.scroll_to_bottom();
disableButtons(false, true, true, true);
} else if (type == "exit") {
term.echo("Exiting");
term.pop();
term.echo("Exiting");
if (ws) ws.close();
} else {
term.echo(data);
}
};
myprompt = " \n?- ";
if (env.dirty) {
term.echo("Consulting from editor.");
var program = getProgram().replace(/'/g,"\\'");
console.log(program);
mysend({
command:"pengine_ask",
pid:pid,
query:"consult_text('" + program + "')"
});
env.dirty = false;
term.set_prompt("");
}
if (state == 1) {
if (command.trim() == "") {
term.set_prompt(myprompt);
term.scroll_to_bottom();
disableButtons(false, true, true, true);
} else if (command.trim().endsWith('.')) {
currcommand += command.trim().slice(0, -1);
state = 2;
mysend({
command:"pengine_ask",
pid:pid,
query:currcommand
});
updateHistory(currcommand);
currcommand = "";
term.pause();
disableButtons(true, true, true, false);
} else {
term.set_prompt(" ");
currcommand += command;
}
} else if (state == 4) {
if (command == ";") {
state = 2;
mysend({
command:"pengine_next",
pid:pid
});
term.pause();
disableButtons(true, true, true, false);
} else if (command == "") {
mysend({
command:"pengine_stop",
pid:pid
});
term.pause();
disableButtons(true, true, true, false);
}
} else if (state == 3) {
state = 2;
if (command !== "") {
mysend({
command:"pengine_respond",
pid:pid,
term:command
});
}
disableButtons(true, true, true, false);
}
}, {
greetings:'Welcome to SWI Web Prolog!\n',
prompt:'?- ',
onInit: function(term) {
gterm = term;
},
keymap: {
'CTRL+C': function(e, a) {
if (state == 2 || state == 3) {
mysend({
command:"pengine_abort",
pid:pid
});
gterm.pause();
return false;
}
}
},
keypress: function(e) {
if (state == 4 && (e.which == 59 || e.which == 32)) {
gterm.echo(gterm.get_prompt() + ";");
mysend({
command:"pengine_next",
pid:pid
});
gterm.pause();
disableButtons(true, true, true, false);
return false;
}
},
convertLinks: false,
historyFilter: function(command) {
if (command == "" ) return false;
if (command == ";" ) return false;
return true;
}
});
});
</script>
</body>
</html>
|
{
"pile_set_name": "Github"
}
|
Arachnoid cysts in adults: long-term follow-up of patients treated with internal shunts to the subdural compartment.
We have previously presented an alternative method for surgical decompression of intracranial arachnoid cysts. This minimally invasive method, with insertion of an internal shunt from the cyst to the subdural compartment, seemed to be an efficient and simple, and hence promising technique. The aim of the present study was to investigate the long-term results of this procedure. This study is a questionnaire-based retrospective study that includes 31 adult patients (>18 years) who were operated on in our department for an arachnoid cyst in the temporal fossa or overlying the frontal convexity with the internal shunt technique between April 1990 and October 2003. Follow-up ranged from 15 months to 14.8 years (mean = 8.2 years). Of the patients, 83% were asymptomatic or had insignificant complaints at follow-up. A total of 17% reported no reduction of the preoperative complaints. No patient experienced worsening of the symptoms. The cyst was no longer visible on postoperative radiologic examinations in 37% of the patients. In 37%, the postoperative fluid volume was less than 50% of the original volume. In 13%, the cyst volume was reduced but the postoperative volume was greater than 50% of the original cyst volume. Thus, the cyst was unchanged in only 13% of the patients. There was no correlation between volume reduction and clinical improvement. A complication (subdural hygroma or hematoma) occurred in 7 patients, all with temporal cysts, leading to reoperation in 4. None of the complications caused permanent neurologic deficits or invalidity. Seven patients were reoperated on because of suspected or established treatment failure. The internal shunt technique is a relatively simple, safe, and efficient alternative method for treatment of arachnoid cysts. It should be considered a valuable alternative in the treatment of arachnoid cysts.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Héctor Latorre, ex intendente de Villa del Nahueve, Neuquén Captura YouTube
El 10 de diciembre terminó el mandato de Héctor Latorre (Movimiento Popular Neuquino), ex intendente de Villa del Nahueve, Neuquén. Pero él quería seguir trabajando en la administración pública. Entonces se lo ocurrió una idea insólita (y potencialmente ilegal): se pasó a planta permanente. Con la categoría más alta.
Según indica el sitio LMNeuquén, junto con Latorre pasaron a planta otras 25 personas, en el marco de un supuesto plan de regularización de personal, en un anexo que luego fue refrendado por el gobernador Jorge Sapag .
Por la medida, Latorre fue denunciado hoy penalmente por "abuso de autoridad e incumplimiento de los deberes de funcionario público". La denuncia fue radicada en las fiscalías de Neuquén y Chos Malal por el abogado Marcelo Hertzriken Velasco, quien patrocina al actual intendente, Carlos Burgos (Movimiento Popular Neuquino).
La actual gestión también investiga una serie de irregularidades en la intendencia. Según Hertzriken Velasco, falta casi medio millón de pesos de un programa de trabajo de cooperativas financiadas con aportes del gobierno nacional.
Consultado por LMNeuquén por su pase a planta, Latorre respondió: "Porque hace mucho que milito en política".
|
{
"pile_set_name": "OpenWebText2"
}
|
Screen Name
The email address/password you submitted is wrong or could not be found. Please try again. If you are not a member of the FIFA.com Club, please register first.
The email address/password you submitted is wrong or could not be found. Please try again. If you are not a member of the FIFA.com Club, please register first.
This Facebook account is already present
Your Club account has been locked due to a breach of our Terms of Service. Please set up a new account in line with the Club rules. Review the Club Rules. Alternatively, you can email us by completing our contact form.
Please enter a valid email address
The email address/password you submitted is wrong or could not be found. Please try again. If you are not a member of the FIFA.com Club, please register first.
Manchester United confirm USA tour
English football giants Manchester United have announced that they will return to the United States for a pre-season tour ahead of the 2014/15 campaign in Europe.
The English Premier League champions are due to compete in the International Champions Cup alongside fellow English heavyweights Manchester City and Liverpool.
The friendly tournament will also feature European powerhouses Real Madrid, Inter Milan, AC Milan, Roma and Olympiacos, organisers announced on Tuesday.
The eight teams will be split into two groups, with the winners of each pool facing off in the final at Florida's Sun Life Stadium, home of NFL outfit the Miami Dolphins, on 4 August.
It is set to be United's fifth pre-season tour of the United States, long considered one of the great undeveloped markets for football.
Their most recent visit came in 2011, when the club played four American teams and Spanish side Barcelona across three cities.
However, plans for the tour may be altered if United have to take part in the early qualifying stages of the UEFA Champions League or the UEFA Europa League in August.
Now managed by David Moyes following the retirement of serial trophy-winner Alex Ferguson, United are currently seventh in the Premier League table - seven points adrift of the Champions League places.
"Teams required to qualify for 2014/15 European competition based on 2013/14 domestic league finishing position may be subject to change," read a statement on United's official website.
United managing director Richard Arnold welcomed the tour, saying: "I'm delighted to announce that the team will be returning to the USA for our 2014 Tour, presented by Aon.
"Since the club's last visit in 2011, the appeal of football in America has grown rapidly.
"NBC reported that this season's Barclays Premier League opening weekend saw the average viewership rise by 78 percent from the 2012-13 season, with Manchester United's match against Swansea being the most-watched game.
"Manchester United has over eight million followers in the United States and the 2014 Tour presents an exciting opportunity for these fans to get up close to the club they love."
|
{
"pile_set_name": "Pile-CC"
}
|
Bisphosphoglycerate phosphatase
In enzymology, a bisphosphoglycerate phosphatase () is an enzyme that catalyzes the chemical reaction
2,3-bisphospho-D-glycerate + H2O 3-phospho-D-glycerate + phosphate
Thus, the two substrates of this enzyme are 2,3-bisphospho-D-glycerate and H2O, whereas its two products are 3-phospho-D-glycerate and phosphate.
This enzyme belongs to the family of hydrolases, specifically those acting on phosphoric monoester bonds. The systematic name of this enzyme class is 2,3-bisphospho-D-glycerate 2-phosphohydrolase. Other names in common use include 2,3-diphosphoglycerate phosphatase, diphosphoglycerate phosphatase, 2,3-diphosphoglyceric acid phosphatase, 2,3-bisphosphoglycerate phosphatase, and glycerate-2,3-diphosphate phosphatase. This enzyme participates in glycolysis/gluconeogenesis.
Structural studies
As of late 2007, 7 structures have been solved for this class of enzymes, with PDB accession codes , , , , , , and .
References
Category:EC 3.1.3
Category:Enzymes of known structure
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Conventionally, arrangements are known in which a three way catalyst (which will simply be referred to as “catalyst” in this specification, as well) is provided to an exhaust path of the internal-combustion engine for detoxifying exhaust from the internal-combustion engine. The three way catalyst has a function (oxidation function) of oxidizing unburned components (HC, CO) in the exhaust flowing therethrough, as well as a function (reduction function) of reducing nitrogen oxides (NOx) in the exhaust, thereby detoxifying harmful emissions such as HC and CO, which are unburned components, NOx, and so forth.
Furthermore, in general, the three way catalyst has an oxygen adsorption function (O2 storage function) for adsorbing (storing) oxygen. Specifically, in a case that exhaust flows through the three way catalyst at a richer air/fuel ratio than the theoretical air/fuel ratio, the three way catalyst oxidizes the unburned components such as HC, CO, and so forth, contained in the exhaust using oxygen stored therein (i.e., discharge oxygen). On the other hand, in a case that exhaust flows through the three way catalyst at a leaner air/fuel ratio than the theoretical air/fuel ratio, the three way catalyst reduces oxygen and NOx contained in the exhaust and stores the oxygen, captured in the reduction, therein. This oxygen adsorption function enables effective detoxification of HC and CO, which are unburned components, and NOx, over a range of air/fuel ratios around the theoretical air/fuel combustion ratio of the exhaust of the exhaust flowing through the three way catalyst around the theoretical air/fuel combustion ratio.
With such an arrangement, in order to maintain satisfactory oxygen adsorption function over the range of the air/fuel ratio around the theoretical air/fuel ratio from a certain lean air/fuel ratio up to a certain rich air/fuel ratio, the amount of oxygen adsorbed on the catalysis (oxygen adsorption amount) is preferably kept around a predetermined suitable amount, e.g., around half of the maximum oxygen amount which the catalysis can absorb (maximum oxygen adsorption capacity).
Recently, internal-combustion engines are known having a function of performing operation without fuel injection (fuel cut) depending on the operation thereof, e.g., in a case that the driver releases the accelerator pedal during driving of the vehicle, and so forth, thereby improving the fuel efficiency. With such internal-combustion engines, exhaust flowing through the catalysis includes only air during the fuel cut operation. That is to say, in this case, exhaust continuously flows through the catalysis at an extremely lean air/fuel ratio. Note that the fuel cut operation will also be referred to as “F/C” hereafter.
This often increases the oxygen adsorption amount of the catalysis up to the maximum adsorption amount thereof at the point in time after F/C (i.e., the start point of fuel injection (combustion)). In this state, the catalysis cannot exhibit satisfactory oxygen adsorption performance, leading to difficulty in efficient detoxification of NOx in the exhaust.
In order to solve the aforementioned problems, a technique is known in which the flow of the exhaust passing through the catalysis (i.e., the flow of mixture supplied to the engine) is temporarily adjusted to a rich air/fuel ratio after F/C, thereby controlling the oxygen adsorption amount of the catalysis around the aforementioned suitable amount. Such operation will also be referred to as “rich air/fuel ratio control after F/C” hereafter. On the other hand, the air/fuel ratio supplied to the engine will also be referred to as “air/fuel ratio of the engine” hereafter.
For example, with a fuel-injection control device (fuel supply control device) which has a function of the rich air/fuel ratio control after F/C, and which has been disclosed in Japanese Unexamined Patent Application Publication No. 2003-172176, the operation of the engine is performed while gradually reducing the air/fuel ratio from a richer air/fuel ratio than the theoretical air/fuel ratio by a predetermined amount after F/C up to the theoretical air/fuel ratio over time after the end of F/C.
FIG. 17 shows an example of change in the air/fuel ratio of the engine over the period of time including the rich air/fuel ratio control after F/C, performed by the fuel-injection control device disclosed in the above-described Document. Specifically, the drawing shows an example in which the air/fuel ratio of the engine is controlled to the theoretical air/fuel ratio (stoichiometric ratio) before the point in time t1 at which F/C begins. Subsequently, in this example, F/C is executed from the point in time t1 up to the point in time t2.
In this case, the rich air/fuel ratio control after F/C is executed over the time from the point in time t2 which is the end point of F/C up to the point in time t3. This adjusts the air/fuel ratio of the engine to a level richer than the stoichiometric ratio by a predetermined amount after the point in time t2. Subsequently, the air/fuel ratio is gradually reduced so as to approach the stoichiometric ratio over the following time. Eventually, the air/fuel ratio of the engine is adjusted to the stoichiometric ratio after the point in time t3.
On the other hand, the air/fuel ratio of the engine somewhat greater than the theoretical air/fuel ratio provides the maximum output of the engine. Furthermore, a relation is known according to which, as the air/fuel ratio of the engine is richer than the theoretical air/fuel ratio of the engine, the output of the engine becomes gradually smaller. Accordingly, control of the air/fuel ratio to a considerable rich air/fuel ratio as compared with the theoretical air/fuel ratio for a considerably long duration leads to the user experiencing sensation that a desired output cannot be obtained (which will also be referred to as “lag sensation” hereafter). Here, an excessively rich air/fuel ratio that causes apparently reduced output of the engine which leads to the driver experiencing lag sensation will also be referred to as “over-rich air/fuel ratio” hereafter.
Accordingly, in order to perform operation without driver experiencing such a lag sensation due to the rich air/fuel ratio control after F/C, control of the air/fuel ratio of the engine to such an over-rich air/fuel ratio for a relatively long period of time should be prevented.
On the other hand, it has come to be known that in a case of maintaining the operation of the engine at a shallow rich air/fuel ratio leaner than the over-rich air/fuel ratio (i.e., at a rich air/fuel ratio at which the operation of the engine for a relatively long duration does not leads to the driver experiencing lag sensation) during the rich air/fuel ratio control after F/C, the catalysis cannot provide sufficient detoxification of NOx in the exhaust flowing therethrough over an extremely short period of time immediately after the end of F/C, leading to a problem that a relatively large amount of NOx passing through the catalysis without detoxification. It is thought that such a phenomenon occurs due to insufficient region of the catalysis which can exhibit the aforementioned reduction function (which will be referred to as “reducing region” hereafter) during an extremely short period of time immediately after F/C.
Furthermore, it has come to be known that such a phenomenon can be avoided by operating the engine at an over-rich air/fuel ratio immediately after the end of F/C. It is thought that the reason is that the operation of the engine at an over-rich air/fuel ratio provides a sufficient area of the reducing region in an extremely short period of time immediately after F/C (detailed description will be made later).
Now, let us consider an arrangement in which the fuel-injection control device disclosed in the aforementioned document controls rich air/fuel ratio control after F/C at an over-rich air/fuel ratio immediately after the end of F/C. Here, let us say that an air/fuel ratio which is richer than the value AFrich is an over-rich air/fuel ratio as shown in FIG. 17. In this case, the operation of the engine is controlled at an over-rich air/fuel ratio over a relatively long period of time from the point in time t2 up to the point in time tA (see the hatched region in FIG. 17).
Accordingly, the fuel-injection control device disclosed in the aforementioned document has a problem that the rich air/fuel ratio control after F/C sufficient for preventing NOx from being discharged even over an extremely short period of time immediately after the end of F/C leads to the aforementioned phenomenon involving the user's lag sensation.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
The Manitoba Moose have struggled in their inaugural season. Big time.
It’s been tough for Winnipeg Jets’ fans, who have hoped to see their prospects begin to succeed. The Jets have been highly lauded for their scouting and development programs. One would hope this success would eventually spill into their AHL team.
It’s even tougher for Moose fans, who do not get a lottery ticket for being the worst team in the league.
What about the infusion of youth to the team? The Moose added a tonne of young players with little to no pro-level experience. Could the Moose just be too young?
Advertisement - Continue Reading Below
The team currently sits second to last in the Western Conference in both points and point percentage. They are have the same amount of wins as the last place team, despite playing three more games.
A deeper look into other metrics. They are the most out scored team, allowing 46 more than they have scored and controlling only 38 per cent of goals. They are also the most out shot team, allowing 304 more shots than they have generated and controlled only 43.7 per cent of shots. At an estimated 43 per cent, the Moose are the only team outside of the 45-55 range in estimated Fenwick-close.
But are they too young?
I took a look at the Manitoba Moose’s roster and looked at what proportion of the roster each age group covered.
Advertisement - Continue Reading Below
Note: For these and all subsequent visuals, 30 actually represents 30 or older
We see that the Moose are indeed young. Most of the population rests at 22 or younger for forwards, and 23 or under for defenders. In addition, most of the team’s production has been carried out by those individuals.
Numbers require context, however. Is this population the norm or an exception?
Advertisement - Continue Reading Below
To compare, I grabbed three other rosters: the Toronto Marlies, the Utica Comets, and the Bakersfield Condors. I chose these three due to being three teams covered by the Nation Network, are well respected for their prospect pools, and vary greatly in their AHL performance.
Advertisement - Continue Reading Below
All four teams, with maybe the exception of the Comets, are fairly similar in team composition being composed of players at the “rookie” ages of 19-22. We do see some differences in the 23-25 range, and then the older teams catch up.
While the Moose do indeed seem to be a slightly younger team, especially on the back-end, they are not all that exceptionally different than some teams doing better than them.
We start to see a pattern here. While it’s not overwhelming, the Moose have the largest bulk of their offense coming from their youngest. This is especially apparent at 22 and under for forwards and 23 and under for defenders.
There’s another way we can look at this (last graph, I promise). I looked at the differences between the two proportion graphs for forwards.
In theory, a balanced team will stay around centre. A team driven by youth will sit above the line, while a team driven by an older core will fall under.
The Moose are indeed a young team, but not exceptionally so. It appears that the failures for the Jets’ farm team is more about the aggregate quality rather than the distribution of age and experience. It likely falls down to a combination of poor veteran performance and the youth not being good enough to carry the anchoring older player.
|
{
"pile_set_name": "OpenWebText2"
}
|
Couldn't think of an original blog post, so decided to share an awkward moment I've had in my life for you to relate or make fun of! See, even authors (especially authors) have cringe-worthy points in their life.
>So when I was in high school I developed a crush on a gymnast girl that went to my same school. We rode the same bus together in the mornings and had one or two classes together (can't remember, high school seemed like a life-time ago). Anyways, prom was coming around and everyone went into this frenzy of trying to figure out who to ask and how to do so in either the most creative, cute, romantic, or funny way. Because I was an idiot (oh yeah, still am) and neither allowed myself to be associated with the words "romantic" or especially "cute" I decided funny would be my only hope of getting that mythical "yes". You ever seen an ant-hill kicked over by an unruly kid? Well that was what my school looked like in those final few weeks before prom. While the girls shrieked and giggled like flocks of deranged birds, making themselves as elusive and hard-to-get as possible, it was the boys that suffered the worse change. Something about the age, the floods of testosterone running through our systems, and our naive sense of what's cool-all of that, combined together: well, it was a mess. It was like every male in the school dropped 85 I.Q. points, which is really bad as I believe that more than half the guys didn't have 85 I.Q. points to spare."Hey man, I'm gonna stand on this lunch table and tap-dance while screaming out swearwords in Spanish. That'll make the girls laugh.""Dude, check it out-I just drank a gallon-and-a-half of warm chocolate milk. I'm gonna go run outside on the track for an hour. That'll impress the girls.""Hey, Cindy's looking fine today. I think I'll go slap her butt."Yeah... sophistication was not the forte amongst the guys in my school. Being a tier above that level of stupidity, I decided that to impress the gymnast, I should do something creative, funny, yet not so painful that it would ruin any chance of me ever having a member of the opposite gender even look at me. So I created a brilliant idea. I would dress up in the school mascot outfit, a fat, jolly, swashbuckling pirate, roam the school looking for her during my lunch-break and give her a paper with the question asking her to prom. My plan continued to develop and I realized that instead of handing her any old note, I could give her a treasure map with clues, leading her to the question. So home I went, taking an old piece of paper, staining it yellow, drawing elaborate monsters and treasures on it and creating a riddle which when solved asked the question "will you go to prom with me?" I burned the edges of the paper to make it look old and found an old bottle to put it in.The next day, I asked a few of the school cheerleaders (who thankfully were kind enough to help) to let me into their practice room where the suit was stored. With the help of a couple of my buddies, I stuffed myself into the suit (which had the strange smell of potato-salad sandwiches lingering inside it). I then roamed the school halls during lunch, and since I was hidden away in the suit and no one knew who I was, all the cool kids and popular jocks high-fived me, pretty girls took pictures with me, and I silently danced with a large Polynesian guy who I had never seen before in my life (I think he was in his mid-thirties, so I have no idea why he was in our school or how he danced so well). I felt good, but also as if I was on an acid-trip, faces blurring across my vision and strange lights filtering through the mask into my eyes and brain. It didn't help that the inside of the suit was hot, very hot and the smell of potato-salad sandwiches was growing stronger and stronger, fusing into my clothes and skin.Eventually I found her, and with a swaggering confidence only brought on by the fact that no one knew who I was under the suit, I walked up to her with my treasure-map bottle in hand. She was sitting in the hall, back against the wall, laughing and talking to about twenty of her friends. That made my steps slow a little, but no big deal, I was still under my suit.When she saw me approach, her face froze, and soon all her friends were staring at me as well, the conversations they had been having now frozen on their lips. I crouched down in front of her and handed her the bottle, still not having said a single word since putting on the suit (a mascot never talks, and I was taking my role seriously). She cautiously took the bottle and with hesitation, pulled out the map and read over it. All was quiet and I remember I had a goofy smile on my face. It was sucha ridiculous, stupid situation-and oh gosh, was that potato-salad sandwich smell leaking out of the suit? Ugh, it was intermixing with the B.O. I'd accrued in the stifling heat of my entrapment. Combined, I was starting to smell like an onion field overtaken by the backed-up sewage of a nearby canal. Yeah, not pleasant. After a few seconds, she looked up with a stone-faced look I'll never forget. Without blinking and with all her friends waiting with bated breath, she said, "No Raf, no I won't go with you." That's it, no "sorry, I have someone else", or "that's an incredible effort you put for me, but I'm not interested. Thanks Raf". I remember all of her friends started to snicker under their breaths, but everything else was a blur and I stood up as fast as lighting, turned, and wobbled back the way I came.I put the suit back in the cheerleader's closet, receiving disgusted looks by them as the ripened smells within permeated their practice room. I didn't know who was the actual mascot, but unfortunately I'm sure the smell was blamed on me instead of whoever had eaten their lunch inside the pirate outfit.My friends teased me for the rest of the school year over what had happened and I never stared that girl in the eyes again.
So that's an awkward moment I can think of. If you'd like to contribute, please comment an awkward story below!
Boys and girls, I finally got my first painful negative review. *slow clap* It's honestly a little exciting as it no longer looks like I'm just a baby author with no feedback. Although it feels like I just got stabbed in the head by a gang of internet trolls, I chalk it up as an achievement badge. Yet in the first 10 minutes of reading the review I was practically hacking the FBI headquaters to try and figure out who was the person who would dare hurt my precious fragile feelings. How dare they have an opinion against my perfect God-Given creation? Sigh... honestly, anonymous Amazon User, I thank you. I thank you for two reasons actually. I'm glad that you spoke truthfully and honestly. Your opinion does matter and it's just as valid as everyone else. Its real, it has grit to it, and yes, it does sting. But that sting gives me the second reason I'm thanking you. You motivate me. You make me want to do better, to write stronger plots. More powerful characters, to become a better me. And in the end, your review will have been the most cherished review I could have received in these early days of self-publishing because your review is what will dive me to push for success. So all of us self-published and traditionally published authors, lets raise out glasses and wipe our tear-stained faces as we acknowledge those hard-to-swallow reviews.
So taking a break from my writing for one day, I was invited to attend a work party. Being a good little employee and genuinely enjoying the people I work with, I decided to go.I was dismayed though, when to my horror I heard we were to go golfing. (I'm about as skilled at golfing as a blind man is at navigating through the Amazon).
Well, we get there and at first I assumed we were going to be in a large green field, all wearing little hats that looked like deflated bread loaves and doing tiny golf claps while a British man provided enlightening commentary, instead we came to a building both tall and skinny with multiple levels. (For those of you who know, the place was Top Golf). People would go right up to the edge of the building (depending on what story you were on) and putt off the side, watching as their balls launched out across an enclosed grass field where large netted holes in the ground were made targets. Each ball was retrofitted with a GPS signal to tell you exactly where your ball landed. I admit, I was very impressed with the tech, but still shaking my head, knowing the ungodly disaster to come when I finally was to pick up a club.
So we get up on the third floor and reach the balcony overlook where we can hit off from. The view is spectacular and exciting and I watch others (even old women and younger teens) hit incredible shots out toward those large distant holes.
My turn comes and I pick a club. I have no idea what the numbers on the club mean or how to even hold one properly. So I attempt to mimic what other people are doing. I feel confident that I've duplicated the technique correctly- put ball on little tee thing, check for wind by licking finger and sticking it up, angle legs and spread them out slightly, and take a few practice swings. (Later on I was told I looked like a man with elbows permanently fused in one position, chicken-walking to the edge of the balcony, Apparently the way I adjusted my body for the swing looked like an epileptic man with a horribly malformed spine trying to twerk-which is all made worse as my boss' boss was standing directly behind me. I guess I'll never see a promotion.
Knowing I was holding everyone up, I take a deep breath, steady myself, and swish! Whack! I smack the club into the ground, two feet short of where the ball is. I'm a lumberjack trying to crush a bug, a rock-and-roll star tripping over himself as he's slamming his guitar on the stage after a concert. "That was a practice swing." I yell over my shoulder with a fake swaggering confidence. The only reply I get is my boss laughing.
Alright, no big deal. I'm a beginner. Steady, jiggle my butt like I saw the old lady do in the booth next to me (holy crap, she just hit the ball 240 yards! The twerk-technique must work!) Okay, this one is going to go far. I'm a big guy, I got some muscle on me. I've played sports all my life. I've been in a college volleyball team, I understand pressure. This is nothing. Swing! Where's the ball? I look up, holding my hand over my eyes to cover the sun. I gaze across the field. Could I have knocked it over the netted walls? But the walls are 300 meters tall... Did i swing so hard I evaporated the ball? I feel a gentle bounce off my toe. I look down and staring back up at me is my elusive enemy, the immortal god who cannot be stopped by my pathetic attempts at hitting it, the stupid golf ball. I'd swung too high and the wind from the club brushed the ball off the tee.
Now I've got women from the company giggling and nudging each other, pointing to me. Some are more than twice my age and two feet shorter than me. They've knocked their balls out into the grass, some even into holes. I feel a heat come over my face and I squint down at the ball with such fury, Satan himself quaked in Hell, hiding under his bed. I put the ball back on the tee, half pleading with it, half swearing at it. K, here we go. Let's do this!
I'm familiar with the process now: swing butt and point it at my boss' boss, arch my back so far my chest sticks out like the bow of a ship, bend knees and point them in every direction but straight, swing!
Gravity gets confused. Physics break. Ten-thousand light-years away, a supernova farts. I'm aiming out toward the grass, yet as I strike the ball (Finally! Praise Tiger Woods and Happy Gilmore!), the ball goes backwards and up, curving in an arch that would make mathematicians purple-faced with excitement to calculate. It strikes the ceiling above my head with a resounding crack so loud that everyone jumps. The ball drops next to my foot, then gently rolls off the side of the balcony. My boss nearly falls off his seat laughing. My coworkers burst out like a chorus of hyenas, the old lady in the other booth chuckles out as she continues to shake her butt (I'm becoming more and more concerned that the twerk technique doesn't work) and I give an exasperated sigh.
Thank goodness I have my writing I can return to. I'm at least decent with that... or perhaps I'm failing miserably. I don't know, I've been shaking my butt desperately the entire time I've been in front of the computer. The technique has to work for something!
|
{
"pile_set_name": "Pile-CC"
}
|
Ex-Bulldog Harris English coasts in British Open qualifier
Former Georgia star Harris English blistered the Gleneagles Country Club in Dallas on Monday to earn a spot in July’s British Open at Royal Lytham & St. Annes.
English shot 60-63 to win the International Final Qualifying by four over Greg Owen. Stephen Ames, Andres Romero, Justin Hicks, Bob Estes, James Driscoll, Russell Knox and Daniel Chopra also qualified Monday by finishing among the top eight and ties.
Former Augusta State star Patrick Reed shot 68-64 and missed qualifying by one.
The 141st British Open will be played July 19-22.
GETTING CLOSER:Tiger Woods insists he is close to contending on a weekly basis, even if recent results suggest otherwise.
“I think I’m headed in the right direction,” Woods said at Congressional Country Club, where he was promoting the AT&T National, which takes place June 28 to July 1.
Woods has one PGA Tour victory this year, but his game has hit a slump recently with a missed cut in Charlotte, N.C., and 40th-place finishes at The Masters Tournament and Players Championship.
Rory McIlroy is not among the early commitments for the AT&T National, but in addition to Woods, past tournament champions Nick Watney, Justin Rose and K.J. Choi will play.
KIM OUT FOR YEAR:Anthony Kim will miss the rest of the FedEx Cup season to treat chronic tendinitis in his left arm.
Kim has made only two cuts this year and has withdrawn from his past three tournaments. Along with nagging pain in his left forearm, Kim hurt his right elbow when his club struck a rock while he was trying to hit out of a bush at the Texas Open.
He decided to take time off after seeing the same Cleveland doctor who operated on his left thumb two years ago.
Treatment is expected to last four to five months. That gives Kim hope of returning after the Ryder Cup for the Fall Series.
|
{
"pile_set_name": "Pile-CC"
}
|
37 Cal.App.3d 1038 (1974)
113 Cal. Rptr. 54
THE PEOPLE, Plaintiff and Respondent,
v.
MICHAEL SHAPIRO, Defendant and Appellant.
Docket No. 23755.
Court of Appeals of California, Second District, Division Four.
March 18, 1974.
*1039 COUNSEL
Allen King for Defendant and Appellant.
Evelle J. Younger, Attorney General, Jack R. Winkler, Chief Assistant Attorney General, S. Clark Moore, Assistant Attorney General, Frederick R. Millar, Jr., and Shunji Asari, Deputy Attorneys General, for Plaintiff and Respondent.
OPINION
JEFFERSON, Acting P.J.
By information, defendant was charged in count I with transportation of marijuana in violation of then Health and *1040 Safety Code section 11531 and in count II with possession of marijuana for sale in violation of then Health and Safety Code section 11530.5. Defendant's motions pursuant to Penal Code sections 995 and 1538.5 were denied.
The cause was submitted to the court after a jury waiver and pursuant to a stipulation by defendant, with each side reserving the right to put on additional evidence.
The court found defendant guilty on count I, transportation of marijuana in violation of section 11531 of the Health and Safety Code. Proceedings were suspended and defendant was granted probation for a period of two years on the condition among other things, that he spend the first 90 days in the county jail. Count II was dismissed on motion of the People. Defendant appeals from the judgment (order granting probation).
On November 3, 1971, John Donovan, special agent, United States Customs, Treasury Department, received from a fellow customs officer a newspaper addressed to a Dr. Stoner, in care of Mr. Shapiro and addressed to 1911 North Beverly Glen Drive, Los Angeles County. The newspaper bore a return address in London indicating the return addressee as Michael Shapiro. Inside the newspaper was a package which Mr. Donovan had tested for narcotic content. A Narcoban test indicated that the package contained a quantity of marijuana in the form of hashish. After the package had been tested and it was revealed that a quantity of narcotics was contained therein, it was returned to the United States postal authorities for delivery.
On November 19, 1971, Mark Kroeker, a Los Angeles Police Department officer, went to 1911 North Beverly Glen Drive with a search warrant. He was admitted to the residence of Michael Boyt. The officer arrested Boyt and the two other individuals who were present in the front room of the location. He then showed a copy of the warrant to Boyt and read it aloud, after which he conducted a search of the premises.
After the premises were searched, the following items were found and recovered for evidence: 13 1/2 kilo bricks of marijuana, a cube of hashish weighing approximately 27 1/2 grams, 2 foil-wrapped cubes of hashish weighing approximately 30 grams; a brown paper bag containing 3 bags of marijuana and 1 cigarette, a white plastic bag containing 4 smaller bags of marijuana, a purse containing 2 bags of marijuana, a bag of hashish weighing approximately 5 grams, a plastic bag containing marijuana, a glass jar containing marijuana seeds, an aspirin bottle containing 33 white pills and 34 red pills, a pink and clear container containing numerous *1041 capsules and pills, a green suitcase, a newspaper addressed to 1911 North Beverly Glen Drive, inside of which hashish had been found, numerous items of personal effects with the names of Michael Shapiro and Michael Boyt and the address of 1911 North Beverly Glen Drive, keys to the residence at 1911 North Beverly Glen Drive, a coin envelope containing $944 and a coin envelope containing $13.
Other items recovered in the search were rent receipts, utilities bills, letters addressed to Michael Boyt and Michael Shapiro at 1911 North Beverly Glen Drive and photographs of defendant seated with his feet propped up by approximately 12 packages wrapped in paper having dimensions of 8-10 inches by 3-4 inches by 6 inches.
Joseph V. Amore, a Los Angeles Police Department officer, qualified as an expert regarding the manner in which marijuana and dangerous restricted drugs and narcotics are possessed and packaged for sale in Los Angeles County. He testified it was his opinion that the 13 1/2 kilos of marijuana were possessed for sale and the hashish was not possessed for sale.
Defendant testified in his own behalf: he resided at 1911 North Beverly Glen Drive; he left for Europe on October 12, returning on December 26; he was aware the police officers discovered several kilos of marijuana and other narcotics at his address on November 19, but he did not know how the narcotics arrived at his residence. The narcotics had not been at his residence on October 12, 1971, when he left for Europe.
He admitted that he was aware a mailing wrapper containing a newspaper and some hashish was recovered from his residence during a police search on November 19th. He also admitted that he had mailed the package to the location but denied that he ever possessed the package in the United States.
It was stipulated that the handwriting on the mailing wrapper that enclosed the newspaper which in turn contained the hashish was compared with handwriting exemplars furnished by the defendant and that the comparison indicated they belonged to one and the same person.
(1) Defendant contends that the search warrant, pursuant to which the contraband in question was discovered, was issued without probable cause. Defendant argues that the search warrant issued upon the affidavit of Sergeant Kroeker was premature. We find no merit in defendant's contention nor his argument.
Sergeant Kroeker's affidavit of November 19, 1971, in support of the *1042 search warrant indicated that a package, addressed to defendant's residence, had been intercepted by officials of the United States Customs office, and it was discovered to contain hashish. The affidavit further alleged that the package would be delivered through the U.S. mails later that day.
Defendant is in error when he argues that, since the affidavit in support of the warrant did not establish probable cause to conduct an immediate search at the time the warrant was sought, the warrant was improperly issued. The warrant was not invalid because it was based upon an affidavit which established a future, rather than a present, probable cause to search.
This exact and identical issue was raised and resolved against a defendant in Alvidres v. Superior Court, 12 Cal. App.3d 575, 580-581 [90 Cal. Rptr. 682]. In the Alvidres case, the affidavit recited, as in the instant case, that the officer had received information from a special agent of the federal Bureau of Customs that a parcel addressed to the defendant Gabriel Alvidres had been opened at the federal Bureau of Customs and the parcel contained marijuana. The parcel was placed back in the mails for delivery to defendant and a search warrant was issued to be served at a later date when the package would arrive. The court held that the affidavit asserting a future mail delivery of narcotics, sufficiently established probable cause to support the issuance of a search warrant. In so holding, the court said, at page 581: "We must ask ourselves whether the objective of the rule is better served by permitting officers under circumstances similar to the case at bar to obtain a warrant in advance of the delivery of the narcotic or by forcing them to go to the scene without a warrant and there make a decision at the risk of being second-guessed by the judiciary if they are successful in recovering evidence or contraband. We believe that achievement of the goals which our high court had in mind in adopting the exclusionary evidence rule is best attained by permitting officers to seek warrants in advance when they can clearly demonstrate that their right to search will exist within a reasonable time in the future. Nowhere in either the federal or state Constitutions, nor in the statutes of California, is there any language which would appear to prohibit the issuance of a warrant to search at a future time. This period, of course, would be subject to the 10-day limitation which is set out in Penal Code section 1534."
It was also held in People v. Sloss, 34 Cal. App.3d 74, 82 [109 Cal. Rptr. 583], that a warrant to search for a piece of mail after its delivery to a designated address may issue before such delivery, where the affidavit gave probable cause to believe that the piece will be at that address at the time specified in the affidavit.
(2) Defendant contends the search warrant was issued out of an illegal *1043 planting of evidence and is, therefore, invalid. Defendant argues that, once customs officials had intercepted defendant's package and determined it to contain hashish, their delivery of the package to defendant constituted quasi-entrapment. The contention is without merit and the argument is fallacious. A very similar, if not identical, contention was raised by defendant Kosoff, in People v. Kosoff, 34 Cal. App.3d 920, 932 [110 Cal. Rptr. 391], and decided against defendant. The court said, at pages 932, 933: "It is argued that the procedure used herein was a form of `entrapment' or at least of questionable public policy in that, had defendant been given an opportunity to refuse permission for a search of the package the contraband would never have been delivered into the country. But it has consistently been held that it is proper for the authorities to allow a package of known contraband to be delivered to its intended recipient, for the purpose of apprehending or investigating the importers of narcotics. (Chapman v. United States (10th Cir.1971) 443 F.2d 917, 920; [citations].) In Chapman the court said: `Appellants next contend that the customs agents should have seized the contraband in New York when it was first discovered and that failure to do so constituted illegal entrapment. It is permissible to allow contraband to reach its destination. In United States v. Davis, 272 F.2d 149, 153 (7th Cir.1959) the court said: "To require immediate seizure of the contraband upon discovery would deprive federal officers of a most effective method of obtaining evidence against ultimate consignees, clearly a result contrary to Congressional intent." ... If contraband were simply seized by customs agents and disposed of, then the intended receivers of the illicit goods would go unpunished. The government, in cases such as this, does not initiate the crime. It simply monitors the crime until it can identify the participants. We see no merit in appellant's contention that the commission of the offense would have been impossible without the actions of the agents. The offense would still have been committed. Without the actions of government officials the crime would have gone undetected.'"
We conclude that the controlled delivery of the narcotics in this case was proper and necessary and in no way constituted unlawful entrapment.
(3) Defendant contends the search warrant was issued upon the illegal delivery of contraband, arguing that the package of hashish discovered at the post office was "unmailable matter" pursuant to definitions in 18 United States Code Annotated section 1716, and 39 United States Code Annotated section 4001. Defendant continues, "Once the Post Office Department discovered that the matter was contraband and could not be legally delivered, they were obliged to either destroy it or confiscate the package." Defendant finally reaches the conclusion that "the delivery of the package was an illegal delivery and the Search Warrant resting thereon was invalid."
*1044 Defendant's contention is without merit and his arguments in support thereof are fallacious and unsound.
"Moreover it has been squarely held by the federal courts that violation of the regulations does not render the search illegal or in violation of the Fourth Amendment or require the fruits of such search to be excluded from evidence in court." (People v. Kosoff, supra, at p. 929.)
The Kosoff case relies on United States v. Beckley, 335 F.2d 86, and states, "[A] sealed package was mailed air parcel post from the Canal Zone to Detroit. The package was searched by customs authorities in Miami, rewrapped and sent on to Detroit, where it was delivered to Beckley's home, and a search warrant was obtained authorizing the seizure of the package and contents from the home. It was argued that the delay of the package between Miami and Detroit for customs inspection and the failure to place a stamp on the package indicating that it had been opened was in violation of federal statutes and regulations. The court held that the alleged violation of federal statutes in delaying the package and failing to confiscate it immediately was not a basis for suppressing evidence. The court also declined to suppress evidence based on the alleged violation of an administrative regulation relating to failure to place a seal on the package indicating that it had been opened."
We hold that the court properly denied defendant's motion made pursuant to Penal Code section 1538.5, to suppress the hashish.
In United States v. Sohnen, 298 F. Supp. 51, the court held that evidence should not be suppressed merely because the search of defendant's mail was contrary to postal regulation although otherwise reasonable. Said the court, at page 53: "... Exclusion of highly reliable and probative evidence is a sanction to be used by the courts only when there is a grave danger to clearly defined national policy. [Citations.] It is not clear whether these postal regulations were designed merely to control internal procedures or whether they were also intended to protect addressees. Even if they were intended to protect recipients of mail from abroad, in light of the historical basis for customs searches discussed above, we cannot say that they rise to the level of national policy so as to require a per se rule of exclusion."
"If the federal courts do not consider that the violation of these regulations by federal officers renders the search illegal or the evidence inadmissible, the evidence should not be inadmissible in California courts. The purpose of the exclusionary rule is to deter unlawful conduct and unreasonable searches and seizures by law enforcement officers. Since the federal courts do not enforce the exclusionary rule against federal customs *1045 officials who have violated the regulations, the adoption of a contrary rule by the California state courts would have minimal if any effect as to encouraging customs officials to observe their own regulations. Since the purposes of the exclusionary rule would not be served by applying it in the instant case, we should not do so. The federal courts have uniformly held that the violation of the regulations in question does not render the search illegal. We are bound by that determination because the legality of a customs search is governed by federal, rather than state law. [Citations.]" (People v. Kosoff, supra, 34 Cal. App.3d at p. 930.)
The judgment (order granting probation) is affirmed.
Kingsley, J., and Dunn, J., concurred.
Appellant's petition for a hearing by the Supreme Court was denied May 16, 1974.
|
{
"pile_set_name": "FreeLaw"
}
|
Q:
Gulp write file if none exist
How can I make gulp write a file only if there is no existing file.
The bellow solution works for gulp 4.0 which is in alpha.
// for when gulp 4.0 releases
.pipe(gulp.dest(conf.plugScss.dist, {overwrite: false}))
A:
There is no exact equivalent in gulp 3.x, but you can use gulp-changed to achieve the same thing.
gulp-changed is usually used to write only those files that have changed since the last time they were written to the destination folder. However you can provide a custom hasChanged function. In your case you can write a function does nothing but check if the file already exists using fs.stat():
var gulp = require('gulp');
var changed = require('gulp-changed');
var fs = require('fs');
function compareExistence(stream, cb, sourceFile, targetPath) {
fs.stat(targetPath, function(err, stats) {
if (err) {
stream.push(sourceFile);
}
cb();
});
}
gulp.task('default', function() {
return gulp.src(/*...*/)
.pipe(changed(conf.plugScss.dist, {hasChanged: compareExistence}))
.pipe(gulp.dest(conf.plugScss.dist));
});
|
{
"pile_set_name": "StackExchange"
}
|
Toxic effects of unresolved complex mixtures of aromatic hydrocarbons accumulated by mussels, Mytilus edulis, from contaminated field sites.
Exposure of marine mussels (Mytilus edulis) to an unresolved complex mixture (UCM) of aromatic hydrocarbons isolated from a crude oil has been shown to reduce their feeding rate by 40%. The present study was undertaken to determine whether UCMs bioaccumulated by mussels in the field are also toxic. The feeding rate of mussels derived from polluted sites increased when they were placed in clean water, pointing to a loss of toxic agents from the tissues. At the end of the depuration period, water in which mussels from an oil-polluted site had been held contained a UCM. Steam-distillation extracts of the tissues of mussels taken from several polluted sites were shown to be highly toxic to the feeding activity of juvenile mussels. The tissues of mussels from these sites contained UCMs. Nontoxic steam distillates from clean mussels did not. Steam-distillation extracts of mussels from an oil-polluted site were fractionated by normal-phase high-performance liquid chromatography. A fraction, largely comprising a "monoaromatic" UCM, reduced the feeding rate of juvenile mussels by 70%. Two later-eluting fractions containing aromatic UCMs also produced smaller depressions in feeding rate. These results support our contention that some aromatic UCM hydrocarbons constitute a forgotten pollutant burden in the marine environment.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
INVANDRARVÅLD. Användandet av handgranater bland kriminella i Sverige saknar motstycke i världen bland länder som inte är i krig. Det skriver polisen till regeringen i en delrapport som SvD tagit del av. Samtidigt har granatattackerna spridits inom Sverige.
-Pettersson tycker det är en felaktig rapport. Henrik Schyffert säger ju att vi ska inte vara rädda och Trump har fel. Punkt. Dessutom drabbar våldet sällan oskyldiga…
|
{
"pile_set_name": "OpenWebText2"
}
|
Haren snaps out of funk: ‘I didn’t want to be just the weak link’
ANAHEIM, Calif. — It was just five days ago when Dan Haren stood glassy eyed in front of his locker, nestled in the bowels of Dodger Stadium.
Nearly on the brink of tears, Haren was trying to come to terms with what he called the roughest stretch of his career.
He’d just lost his fifth straight start and had an ERA of over 10 during that span.
On Wednesday, Haren stood in front of his locker with a wide smile. And for good reason. The streak was snapped, as he tossed 7.1 innings, gave up three hits, one earned run, and struck out four in the Dodgers’ 2-1 Freeway Series win over the Angels. He did something against the Angels neither Zack Greinke or Clayton Kershaw could do at the start of the series — quieted the Halos’ bats.
Haren took a no-hitter into the sixth inning, but tossing a perfect game wasn’t on his mind.
"I’ve just been trying to have a perfect inning," Haren quipped. "That’s been hard. I told someone in the outfield yesterday I was just going to do a George Costanza — whatever my instincts are just do the opposite. Maybe that would work."
The night Haren lost his fifth straight was no laughing matter. That night was "really hard," and so was the day after. From that point on, Haren has been at work.
With the counsel of pitching coach Rick Honeycutt, Haren began to iron out some mechanical issues. He took those adjustments to the mound with him Wednesday night, going up against what he deemed the "best" lineup he’s faced all season; he sharpened his focus.
Instead of falling into the trap of making the same mistakes, he instead executed the things he had been doing well.
"My curveball has been better," Haren said. "My cutter has been worst. Today I threw a lot of splits, a lot more curveballs than I usually throw, mixing up grips on my fastball — throwing more four-seam fastballs. I’ve been getting burned on two-seam fastballs running towards the middle of the plate so it just goes back to me trying to minimize the mistakes."
Inside the Dodgers clubhouse, his teammates overwhelmingly were "happy" for him.
Haren was happy, too. But he’s not content.
"I just wanted to do good for the team," he said. "I didn’t want to be just the weak link. I was happy to go out there against a really good offense and do a good job and hopefully we (gain) some momentum here."
|
{
"pile_set_name": "Pile-CC"
}
|
The field of the present invention is the area of cellulolytic enzymes, nucleotide sequences encoding them and recombinant host cells and methods for producing them.
Cellulose, the most abundant structure of plant cell walls, exists mostly as insoluble microfibril which are formed by hydrogen bonds between individual cellulose chains. Conversion of cellulose to glucose provides readily available carbon sources for fuel and chemical production. Such conversion requires several types of enzymes including endoglucanases (E.C. 3.2.1.4), cellobiohydrolases (also called exoglucanase, E.C. 3.2.1.91), .beta.-glucosidase (also called cellobiase, E.C. 3.2.1.21). Endoglucanases hydrolyze .beta.-glycoside bonds internally and randomly along the cellulose chains whereas cellobiohydrolases remove cellobiose molecules from the reducing and non-reducing ends of the chains (Barr et al., 1996). .beta.-Glucosidases hydrolyze the cellobiose to two molecules of glucose, and therefore eliminate the inhibition of cellobiose on cellobiohydrolases and endoglucanases.
Microorganisms have evolved diverse strategies for efficient break down of plant cell wall constitutes, particularly cellulose. Aerobic organisms tend to secrete individual enzymes whereas some anaerobic bacteria produce high molecular weight enzyme complexes on the cell surface. Examples of such enzyme producers are the fungus Trichoderma reesei and bacteria Cellulomonas fimi and Thermomonospora fusca. Cellulases of these organisms consist of cellulose binding domains (CBD) and catalytic domains joined by linker sequences. Anaerobic bacteria whose cellulolytic systems received extensive investigations include Clostridium thermocellum (Felix and Ljungdahl. 1993. Ann. Rev. Microbiol. 47:791-819; Aubert et al. 1993. In: M. Sebald (ed.) Genetics and Molecular Biology of Anaerobic Bacteria. p. 412-422. Springer-Verlag, NY) and C cellulovorans (Doi et al. 1994. Crit. Rev. Microbiol. 20:87-93). The high molecular weight cellulase complex, more often called the cellulosome, of C. thermocellum contains about 26 polypeptides with a mass in a range of 2.times.10.sup.6 to 6.5.times.10.sup.6 Da (Lamed et al., 1983). These polypeptides include at least one scaffolding protein termed cellulosome integrating protein A (CipA) and a number of catalytically active proteins. The protein and protein interactions forming the cellulosome are effected by conserved duplicated regions (CDR) of the catalytically active proteins and nine internal repeated elements (IRE) of CipA.
Highly efficient cellulases of anaerobic fungi have been demonstrated (Wood et al. 1986. FEMS Microbiol Lett. 34:37-40; Lowe et al. 1987. Appl. Environ. Microbiol. 53:1216-1223; Bomeman et al. 1989. Appl. Environ. Microbiol. 55:1066-1073). A high molecular weight cellulase/hemicellulase complex has been isolated from Neocallimastix frontalis (Wilson and Wood. 1992. Enzyme Microb. Technol. 14:258-264). No individual native cellulases have been purified from anaerobic fungi. On the basis of morphology of sporangia, mycelia and zoospores, anaerobic fungi have been classified into two groups, monocentric and polycentric (Bomeman et al., 1989, supra; Bomeman and Akin. 1994. Mycoscience 35:199-211). Monocentric fungi have only one sporangium developed from one zoosporium, whereas polycentric isolates have multiple sporangia originating from one zoosporium. Most investigations on anaerobic fungi have focused on monocentric isolates, particularly isolates of the genera Neocallimastix and Piromyces. Gene cloning and sequencing of polysaccharidases from the monocentric anaerobic fungi have shown that multiple cellulases and hemicellulases of these fungi may form high molecular weight complexes (HMWC) similar to the cellulosomes of Clostridia (Gilbert et al. 1992. Mol. Microbiol. 6:2065-2072; Zhou et al. 1994. Biochem. J. 297:359-364, Fanutti et al. 1995. J. Biol. Chem. 270:29314-29322). Evidence provided by these studies is three fold: 1) Most of the hydrolases lack cellulose binding domains; 2) They have repeated peptide (RP) domains at the carboxyl termini or between two catalytic domains although they lack sequence homology with the CDRs of cellulosomal catalytic proteins. These regions are not required for catalysis; and 3) The RP domain of a Piromyces xylanase binds to other proteins in the Neocallimastix and Piromyces HMWCs. More recently, however, a cellulase (CelA) of Neocallimastix, which lacks the RP domain but contains a typical fungal CBD and a cellobiohydrase catalytic domain, has been reported (Denman et al., 1996).
By contrast, the polysaccharide hydrolyzing enzymes of aerobic fungi are generally secreted as individual enzymes, including endoglucanases, cellobiohydrolases and .beta.-glucosidase which act synergistically on the substrate.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Cytoskeletal actin: the influence of major burns on neutrophil structure and function.
It has been noted that major trauma and burns patients who survive beyond 48 h most frequently succumb to sepsis and multiple organ failure. Furthermore, such patients are usually markedly hypermetabolic and in negative nitrogen balance at the time of their demise. Along with many other systemic and immune dysfunctions, the polymorphonuclear white blood cells in this setting become functionally impaired. Given that the motile white blood cells contain significant proportions of the contractile protein, actin, we speculated that the leucocyte dysfunction might in part be related to the overall systemic catabolism of actin stores. Accordingly, this hypothesis was explored by comparing the functions and cytoskeletal structure of neutrophilic leucocytes from normal control adults and victims of fresh, major thermal injuries. On days 1 and 7 after a burn of > 25 per cent of total body surface area, peripheral blood was drawn from 10 patients (mean age 33 years, mean burn area 44.2 per cent), and seven unburned controls (mean age 35.2 years). Neutrophils isolated from these specimens were tested for stimulated chemotactic rate, efficacy of intracellular killing as determined by superoxide production rate, and the levels of soluble and insoluble intracellular actin. In addition, both light microscopy and scanning electron microscopy were used to visualize the actin cytoskeleton. The results indicated that both chemotactic rate (12 mu/min vs. 38 mu/min--P < 0.05) and superoxide production rate (9 vs 43 mumol/ml10E6 cells--P < 0.05), were significantly reduced in the burn patients by day 7.(ABSTRACT TRUNCATED AT 250 WORDS)
|
{
"pile_set_name": "PubMed Abstracts"
}
|
S Normae
S Normae (S Nor) is a yellow supergiant variable star in the constellation Norma. It is the brightest member of the open cluster NGC 6087.
S Normae is a Classical Cepheid variable with a visual magnitude range of 6.12 to 6.77 and a period of 9.75411 days. The spectral type varies during the pulsation cycle from F8 to G0. Its mass has been measured at with reference to a close orbital companion, and it is over 3,000 times as luminous as the sun.
Companions
S Normae is a spectroscopic binary, although the companion has now been resolved using the Hubble Space Telescope Wide Field Camera 3. The separation was 0.90" in April 2011, corresponding to 817 AU. This gives the rare opportunity for a direct determination of the mass of a Cepheid variable star and confirmation of other properties. It is a supergiant that is 6.3 times as massive as the Sun and 2,800 times as luminous. The companion a blue-white main sequence star of spectral type B9.5.
There is a more distant 10th magnitude companion at 30", unsurprising in the centre of an open cluster. It is TYC 8719-794-1, a chemically peculiar A or B class star. Three fainter companions have also been found: a 14th magnitude star at 14"; and two 16th magnitude stars at 20".
References
External links
Light curves in UBVRI colours
Category:Norma (constellation)
Normae, S
Category:F-type supergiants
146323
6062
Category:Classical Cepheid variables
Category:B-type main-sequence stars
Category:Durchmusterung objects
079932
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Q:
In Gradle, how do I declare common dependencies in a single place?
In Maven there is a very useful feature when you can define a dependency in the <dependencyManagement> section of the parent POM, and reference that dependency from child modules without specifying the version or scope or whatever.
What are the alternatives in Gradle?
A:
You can declare common dependencies in a parent script:
ext.libraries = [ // Groovy map literal
spring_core: "org.springframework:spring-core:3.1",
junit: "junit:junit:4.10"
]
From a child script, you can then use the dependency declarations like so:
dependencies {
compile libraries.spring_core
testCompile libraries.junit
}
To share dependency declarations with advanced configuration options, you can use DependencyHandler.create:
libraries = [
spring_core: dependencies.create("org.springframework:spring-core:3.1") {
exclude module: "commons-logging"
force = true
}
]
Multiple dependencies can be shared under the same name:
libraries = [
spring: [ // Groovy list literal
"org.springframework:spring-core:3.1",
"org.springframework:spring-jdbc:3.1"
]
]
dependencies { compile libraries.spring } will then add both dependencies at once.
The one piece of information that you cannot share in this fashion is what configuration (scope in Maven terms) a dependency should be assigned to. However, from my experience it is better to be explicit about this anyway.
A:
It's a late reply, yet you might also want to have a look at: http://plugins.gradle.org/plugin/io.spring.dependency-management
It provides possibility to import a maven 'bom', and reuse the definitions defined in the 'bom'.
It's certainly a nice help when gradually migrating from maven to gradle ! Enjoying it right now.
A:
As of Gradle 4.6, dependency constraints are suggested in the documentation as the way to achieve this. From https://docs.gradle.org/current/userguide/declaring_dependencies.html#declaring_a_dependency_without_version:
A recommended practice for larger projects is to declare dependencies without versions and use dependency constraints for version declaration. The advantage is that dependency constraints allow you to manage versions of all dependencies, including transitive ones, in one place.
In your parent build.gradle file:
allprojects {
plugins.withType(JavaPlugin).whenPluginAdded {
dependencies {
constraints {
implementation("com.google.guava:guava:27.0.1-jre")
}
}
}
}
Wrapping the dependencies block with a check for the Java plugin (... whenPluginAdded {) isn't strictly necessary, but it will then handle adding a non-Java project to the same build.
Then in a child gradle project you can simply omit the verison:
apply plugin: "java"
dependencies {
implementation("com.google.guava:guava")
}
Child builds can still choose to specify a higher version. If a lower version is specified it is automatically upgraded to the version in the constraint.
|
{
"pile_set_name": "StackExchange"
}
|
Share via
There could hardly be a greater contrast than an indoor wind tunnel and the
spectacular setting of Mont Saint-Michel, which forms the backdrop for the
first individual time-trial at the Tour de France today.
But Chris Froome is hopeful that his time spent improving his riding position
in that tunnel in recent months will prove decisive in strengthening his
hold on the yellow jersey.
Froome has an advantage of 1min 25sec over Alejandro Valverde, of Movistar,
with Alberto Contador another 26 seconds behind in sixth position. The Team
Sky leader will hope to have added at least a minute to
|
{
"pile_set_name": "Pile-CC"
}
|
# GeoFirestore for iOS — Realtime location queries with Firestore
GeoFirestore is an open-source library for Swift that allows you to store and query a set of documents based on their geographic location.
At its heart, GeoFirestore simply stores locations with string keys. Its main benefit however, is the possibility of querying documents within a given geographic area - all in realtime.
GeoFirestore uses the Firestore database for data storage, allowing query results to be updated in realtime as they change. GeoFirestore selectively loads only the data near certain locations, keeping your applications light and responsive, even with extremely large datasets.
A compatible GeoFirestore client is also available for [Android](https://github.com/imperiumlabs/GeoFirestore-Android).
### Integrating GeoFirestore with your data
GeoFirestore is designed as a lightweight add-on to Firestore. However, to keep things simple, GeoFirestore stores data in its own format and its own location within your Firestore database. This allows your existing data format and security rules to remain unchanged and for you to add GeoFirestore as an easy solution for geo queries without modifying your existing data.
### Example usage
Assume you are building an app to rate bars, and you store all information for a bar (e.g. name, business hours and price range) at `collection(bars).document(bar-id)`. Later, you want to add the possibility for users to search for bars in their vicinity. This is where GeoFirestore comes in. You can store the location for each bar document using GeoFirestore. GeoFirestore then allows you to easily query which bar are nearby.
## Example
To run the example project, clone the repo, and run `pod repo update` and `pod install` from the Example directory first.
## Downloading GeoFirestore for iOS
If you're using [CocoaPods](https://cocoapods.org/) add the following to your Podfile:
```
pod 'Geofirestore'
```
Then run the following in terminal:
```
pod repo update
pod install
```
## Getting Started with Firestore
GeoFirestore requires the Firestore database in order to store location data. You can [learn more about Firestore here](https://firebase.google.com/docs/firestore/).
## Using GeoFirestore
### GeoFirestore
A `GeoFirestore` object is used to read and write geo location data to your Firestore database and to create queries. To create a new `GeoFirestore` instance you need to attach it to a Firestore collection reference:
````swift
import Firebase
import Geofirestore
let geoFirestoreRef = Firestore.firestore().collection("my-collection")
let geoFirestore = GeoFirestore(collectionRef: geoFirestoreRef)
````
#### Setting location data
To set the location of a document simply call the `setLocation` method:
````swift
geoFirestore.setLocation(location: CLLocation(latitude: 37.7853889, longitude: -122.4056973), forDocumentWithID: "que8B9fxxjcvbC81h32VRjeBSUW2") { (error) in
if let error = error {
print("An error occured: \(error)")
} else {
print("Saved location successfully!")
}
}
````
Alternatively set the location using a `GeoPoint` :
````swift
geoFirestore.setLocation(geopoint: GeoPoint(latitude: 37.7853889, longitude: -122.4056973), forDocumentWithID: "que8B9fxxjcvbC81h32VRjeBSUW2") { (error) in
if let error = error {
print("An error occured: \(error)")
} else {
print("Saved location successfully!")
}
}
````
To remove a location and delete the location from your database simply call:
````swift
geoFirestore.removeLocation(forDocumentWithID: "que8B9fxxjcvbC81h32VRjeBSUW2")
````
#### Retrieving a location
Retrieving locations happens with callbacks. If the document is not present in GeoFirestore, the callback will be called with `nil`. If an error occurred, the callback is passed the error and the location will be `nil`.
````swift
geoFirestore.getLocation(forDocumentWithID: "que8B9fxxjcvbC81h32VRjeBSUW2") { (location: CLLocation?, error) in
if let error = error {
print("An error occurred: \(error)")
} else if let location = location {
print("Location: [\(location.coordinate.latitude), \(location.coordinate.longitude)]")
} else {
print("GeoFirestore does not contain a location for this document")
}
}
````
Alternatively get the location as a `GeoPoint` :
````swift
geoFirestore.getLocation(forDocumentWithID: "que8B9fxxjcvbC81h32VRjeBSUW2") { (location: GeoPoint?, error) in
if let error = error {
print("An error occurred: \(error)")
} else if let location = location {
print("Location: [\(location.latitude), \(location.longitude)]")
} else {
print("GeoFirestore does not contain a location for this document")
}
}
````
### GeoFirestore Queries
GeoFirestore allows you to query all documents within a geographic area using `GFSQuery`
objects. As the locations for documents change, the query is updated in realtime and fires events
letting you know if any relevant documents have moved. `GFSQuery` parameters can be updated
later to change the size and center of the queried area.
````swift
// Query using CLLocation
let center = CLLocation(latitude: 37.7832889, longitude: -122.4056973)
// Query locations at [37.7832889, -122.4056973] with a radius of 600 meters
var circleQuery = geoFirestore.query(withCenter: center, radius: 0.6)
// Query using GeoPoint
let center2 = GeoPoint(latitude: 37.7832889, longitude: -122.4056973)
// Query locations at [37.7832889, -122.4056973] with a radius of 600 meters
var circleQuery2 = geoFirestore.query(withCenter: center2, radius: 0.6)
// Query location by region
let span = MKCoordinateSpanMake(0.001, 0.001)
let region = MKCoordinateRegionMake(center.coordinate, span)
var regionQuery = geoFirestore.query(inRegion: region)
````
#### Receiving events for geo queries
There are three kinds of events that can occur with a geo query:
1. **Document Entered**: The location of a document now matches the query criteria.
2. **Document Exited**: The location of a document no longer matches the query criteria.
3. **Document Moved**: The location of a document changed but the location still matches the query criteria.
Document entered events will be fired for all documents initially matching the query as well as any time
afterwards that a document enters the query. Document moved and document exited events are guaranteed to be preceded by a document entered event.
To observe events for a geo query you can register a callback with `observe:with:`:
````swift
let queryHandle = query.observe(.documentEntered, with: { (key, location) in
print("The document with documentID '\(key)' entered the search area and is at location '\(location)'")
})
````
To cancel one or all callbacks for a geo query, call
`removeObserver:withHandle:` or `removeAllObservers:`, respectively.
#### Waiting for queries to be "ready"
Sometimes you want to know when the data for all the initial documents has been
loaded from the server and the corresponding events for those documents have been
fired. For example, you may want to hide a loading animation after your data has
fully loaded. `GFSQuery` offers a method to listen for these ready events:
````swift
query.observeReady {
print("All initial data has been loaded and events have been fired!")
}
````
Note that locations might change while initially loading the data and document moved and document
exited events might therefore still occur before the ready event was fired.
When the query criteria is updated, the existing locations are re-queried and the
ready event is fired again once all events for the updated query have been
fired. This includes document exited events for documents that no longer match the query.
#### Updating the query criteria
To update the query criteria you can use the `center` and `radius` properties on
the `GFSQuery` object. Document exited and document entered events will be fired for
documents moving in and out of the old and new search area, respectively. No document moved
events will be fired as a result of the query criteria changing; however, document moved
events might occur independently.
#### Convenient extensions
To make it easier to convert between a `GeoPoint` and a `CLLocation` we have provided some useful extensions:
````swift
let cllocation = CLLocation(latitude: 37.7832889, longitude: -122.4056973)
let geopoint = GeoPoint(latitude: 37.7832889, longitude: -122.4056973)
// Converting from CLLocation to Geopoint
let loc1: GeoPoint = cllocation.geopointValue()
let loc2: GeoPoint = GeoPoint.geopointWithLocation(location: cllocation)
// Converting from Geopoint to CLLocation
let loc3: CLLocation = geopoint.locationValue()
let loc4: CLLocation = CLLocation.locationWithGeopoint(geopoint: geopoint)
````
## API Reference & Documentation
Full API reference and documentation is available [here](http://imperiumlabs.org/GeoFirestore-iOS/)
## License
GeoFirestore is available under the MIT license. See the LICENSE file for more info.
Copyright (c) 2018 Imperium Labs
|
{
"pile_set_name": "Github"
}
|
Q:
CSS sub-menu overlay issue
I'm trying to set up this 2 column menu that is side by side with each of the columns submenus opening to a different side. The left menu is working correctly, and the submenu buttons are clickable, but the right menu submenu items are located under the left menu elements. I tried using z-index, which worked, but made the left-menu items not clickable (hover did not work as well). Please see http://kink.cz/najforever/index_copy.html for reference.
Could you please suggest how I can have the right menu submenu items shown correctly?
Your help is much appreciated.
HTML:
<div class='people'>
<div id='cssmenu'>
<ul>
<li class='active has-sub' id='fake'><a href='#'><span>A fake artist</span></a>
<ul>
<li class='has-sub'><a href='#'><span>Blog</span></a></li>
<li class='has-sub'><a href='#'><span>Facebook</span></a></li>
<li class='has-sub'><a href='#'><span>Instagram</span></a></li>
</ul>
</li>
<li class='active has-sub' id='danny'><a href='#'><span>Danny Rose Fashion</span></a>
<ul>
<li class='has-sub'><a href='#'><span>Blog</span></a></li>
<li class='has-sub'><a href='#'><span>Facebook</span></a></li>
<li class='has-sub'><a href='#'><span>Instagram</span></a></li>
</ul>
</li>
<li class='active has-sub' id='heels'><a href='#'><span>Heels in Prague</span></a>
<ul>
<li class='has-sub'><a href='#'><span>Blog</span></a></li>
<li class='has-sub'><a href='#'><span>Facebook</span></a></li>
<li class='has-sub'><a href='#'><span>Instagram</span></a></li>
</ul>
</li>
<li class='active has-sub' id='hodanajan'><a href='#'><span>Hodanajan</span></a>
<ul>
<li class='has-sub'><a href='#'><span>Blog</span></a></li>
<li class='has-sub'><a href='#'><span>Facebook</span></a></li>
<li class='has-sub'><a href='#'><span>Instagram</span></a></li>
</ul>
</li>
<li class='active has-sub' id='jakub'><a href='#'><span>Jakub Mařík</span></a>
<ul>
<li class='has-sub'><a href='#'><span>Web</span></a></li>
<li class='has-sub'><a href='#'><span>Facebook</span></a></li>
<li class='has-sub'><a href='#'><span>Instagram</span></a></li>
</ul>
</li>
</ul>
</div>
<div id='cssmenu2'>
<ul>
<li class='active has-sub' id='kaa'><a href='#'><span>Kaa Glo</span></a>
<ul>
<li class='has-sub'><a href='#'><span>Blog</span></a></li>
<li class='has-sub'><a href='#'><span>Facebook</span></a></li>
<li class='has-sub'><a href='#'><span>Instagram</span></a></li>
</ul>
</li>
<li class='active has-sub' id='pau'><a href='#'><span>Paulinemma</span></a>
<ul>
<li class='has-sub'><a href='#'><span>Blog</span></a></li>
<li class='has-sub'><a href='#'><span>Facebook</span></a></li>
<li class='has-sub'><a href='#'><span>Instagram</span></a></li>
</ul>
</li>
<li class='active has-sub' id='red'><a href='#'><span>Red Poppy Stories</span></a>
<ul>
<li class='has-sub'><a href='#'><span>Blog</span></a></li>
<li class='has-sub'><a href='#'><span>Facebook</span></a></li>
<li class='has-sub'><a href='#'><span>Instagram</span></a></li>
</ul>
</li>
<li class='active has-sub' id='kisic'><a href='#'>Sandra Kisic</a>
<ul>
<li class='has-sub'><a href='#'><span>Blog</span></a></li>
<li class='has-sub'><a href='#'><span>Facebook</span></a></li>
<li class='has-sub'><a href='#'><span>Instagram</span></a></li>
</ul>
</li>
<li class='active has-sub' id='aesthet'><a href='#'><span>The Aesthet</span></a>
<ul>
<li class='has-sub'><a href='#'><span>Blog</span></a></li>
<li class='has-sub'><a href='#'><span>Facebook</span></a></li>
<li class='has-sub'><a href='#'><span>Instagram</span></a></li>
</ul>
</li>
</ul>
</div>
CSS:
/* ===========================
====== Name Menu Right ======
=========================== */
#cssmenu {
padding: 0;
margin: 0;
border: 0;
line-height: 1;
text-align:left
}
#cssmenu ul,
#cssmenu ul li,
#cssmenu ul ul {
list-style: none;
margin: 0;
padding: 0;
}
#cssmenu ul {
position: relative;
z-index: 597;
float: left;
}
#cssmenu ul li {
float: left;
min-height: 1px;
line-height: 1em;
vertical-align: middle;
position: relative;
}
#cssmenu ul li.hover,
#cssmenu ul li:hover {
position: relative;
z-index: 599;
cursor: default;
}
#cssmenu ul ul {
visibility: hidden;
position: absolute;
top: 100%;
left: 200px;
z-index: 598;
}
#cssmenu ul ul li {
float: none;
right:250px;
}
#cssmenu ul ul ul {
top: -2px;
right: 0;
}
#cssmenu ul li:hover > ul {
visibility: visible;
}
#cssmenu ul ul {
top: 1px;
left: 99%;
}
#cssmenu ul li {
float: none;
}
#cssmenu ul ul {
margin-top: 1px;
}
#cssmenu ul ul li {
font-weight: normal;
}
/* Custom CSS Styles Menu Right*/
#cssmenu {
width: 130px;
background: white;
font-family: 'Oxygen Mono', Tahoma, Arial, sans-serif;
zoom: 1;
font-size: 12px;
float:right;
margin-left:5px;
}
#cssmenu:before {
content: '';
display: block;
}
#cssmenu:after {
content: '';
display: table;
clear: both;
}
#cssmenu a {
display: block;
padding: 6px 0px;
color: black;
text-decoration: none;
padding-right:5px;
}
#cssmenu > ul {
width: 130px;
}
#cssmenu ul ul {
width: 130px;
}
#cssmenu > ul > li > a {
color: black;
}
#cssmenu > ul > li > a:hover {
color: black;
}
#cssmenu > ul > li.active a {
background: white;
}
#cssmenu > ul > li a:hover,
#cssmenu > ul > li:hover a {
background: white;
}
#cssmenu li {
position: relative;
}
#cssmenu ul ul li.first {
-webkit-border-radius: 0 3px 0 0;
-moz-border-radius: 0 3px 0 0;
border-radius: 0 3px 0 0;
}
#cssmenu ul ul li.last {
-webkit-border-radius: 0 0 3px 0;
-moz-border-radius: 0 0 3px 0;
border-radius: 0 0 3px 0;
border-bottom: 0;
}
#cssmenu ul ul {
-webkit-border-radius: 0 3px 3px 0;
-moz-border-radius: 0 3px 3px 0;
border-radius: 0 3px 3px 0;
}
#cssmenu ul ul {
margin-left:2px;
text-align:right;
}
#cssmenu ul ul a {
font-size: 12px;
color: black;
}
#cssmenu ul ul a:hover {
color: black;
}
#cssmenu ul ul li {
}
#cssmenu ul ul li:hover > a {
background: black;
color: #ffffff;
}
#cssmenu.align-right > ul > li > a {
border-left: 4px solid black;
border-right: none;
}
#cssmenu.align-right {
float: right;
}
#cssmenu.align-right li {
text-align: right;
}
#cssmenu.align-right ul li.has-sub > a:after {
content: none;
}
#cssmenu.align-right ul ul {
visibility: hidden;
position: absolute;
top: 0;
left: -100%;
z-index: 598;
width: 100%;
}
#cssmenu.align-right ul ul li.first {
-webkit-border-radius: 3px 0 0 0;
-moz-border-radius: 3px 0 0 0;
border-radius: 3px 0 0 0;
}
#cssmenu.align-right ul ul li.last {
-webkit-border-radius: 0 0 0 3px;
-moz-border-radius: 0 0 0 3px;
border-radius: 0 0 0 3px;
}
#cssmenu.align-right ul ul {
-webkit-border-radius: 3px 0 0 3px;
-moz-border-radius: 3px 0 0 3px;
border-radius: 3px 0 0 3px;
}
/* ===========================
====== Name Menu Left ======
=========================== */
#cssmenu2 {
padding: 0;
margin: 0;
border: 0;
line-height: 1;
text-align:right;
}
#cssmenu2 ul,
#cssmenu2 ul li,
#cssmenu2 ul ul {
list-style: none;
margin: 0;
padding: 0;
}
#cssmenu2 ul {
position: relative;
z-index: 597;
float: left;
}
#cssmenu2 ul li {
float: left;
min-height: 1px;
line-height: 1em;
vertical-align: middle;
position: relative;
}
#cssmenu2 ul li.hover,
#cssmenu2 ul li:hover {
position: relative;
z-index: 599;
cursor: default;
}
#cssmenu2 ul ul {
visibility: hidden;
position: absolute;
top: 100%;
left: 0px;
z-index: 598;
width: 100%;
text-align:left;
}
#cssmenu2 ul ul li {
float: none;
margin-left:4px;
}
#cssmenu2 ul ul ul {
top: -2px;
right: 0;
}
#cssmenu2 ul li:hover > ul {
visibility: visible;
}
#cssmenu2 ul ul {
top: 1px;
left: 99%;
}
#cssmenu2 ul li {
float: none;
}
#cssmenu2 ul ul {
margin-top: 1px;
}
#cssmenu2 ul ul li {
font-weight: normal;
}
/* Custom CSS Styles Menu Left*/
#cssmenu2 {
width: 130px;
background: white;
font-family: 'Oxygen Mono', Tahoma, Arial, sans-serif;
zoom: 1;
font-size: 12px;
float:right;
margin-left:5px;
}
#cssmenu2:before {
content: '';
display: block;
}
#cssmenu2:after {
content: '';
display: table;
clear: both;
}
#cssmenu2 a {
display: block;
padding: 6px 0px;
color: black;
text-decoration: none;
padding-right:5px;
}
#cssmenu2 > ul {
width: 130px;
}
#cssmenu2 ul ul {
width: 130px;
}
#cssmenu2 > ul > li > a {
border-right: 4px solid black;
color: black;
}
#cssmenu2 > ul > li > a:hover {
color: black;
}
#cssmenu2 > ul > li.active a {
background: white;
}
#cssmenu2 > ul > li a:hover,
#cssmenu2 > ul > li:hover a {
background: white;
}
#cssmenu2 li {
position: relative;
}
#cssmenu2 ul ul li.first {
-webkit-border-radius: 0 3px 0 0;
-moz-border-radius: 0 3px 0 0;
border-radius: 0 3px 0 0;
}
#cssmenu2 ul ul li.last {
-webkit-border-radius: 0 0 3px 0;
-moz-border-radius: 0 0 3px 0;
border-radius: 0 0 3px 0;
border-bottom: 0;
}
#cssmenu2 ul ul {
border-right: 2px solid black;
background:white;
margin-top:-2px;
}
#cssmenu2 ul ul {
margin-left:2px;
}
#cssmenu2 ul ul a {
font-size: 12px;
color: black;
}
#cssmenu2 ul ul a:hover {
color: black;
}
#cssmenu2 ul ul li {
}
#cssmenu2 ul ul li:hover > a {
background: black;
color: #ffffff;
}
#cssmenu2.align-right > ul > li > a {
border-left: 4px solid black;
border-right: none;
}
#cssmenu2.align-right {
float: right;
}
#cssmenu2.align-right li {
text-align: right;
}
#cssmenu2.align-right ul li.has-sub > a:after {
content: none;
}
#cssmenu2.align-right ul ul {
visibility: hidden;
position: absolute;
top: 0;
left: -100%;
z-index: 598;
width: 100%;
}
#cssmenu2.align-right ul ul li.first {
-webkit-border-radius: 3px 0 0 0;
-moz-border-radius: 3px 0 0 0;
border-radius: 3px 0 0 0;
}
#cssmenu2.align-right ul ul li.last {
-webkit-border-radius: 0 0 0 3px;
-moz-border-radius: 0 0 0 3px;
border-radius: 0 0 0 3px;
}
#cssmenu2.align-right ul ul {
-webkit-border-radius: 3px 0 0 3px;
-moz-border-radius: 3px 0 0 3px;
border-radius: 3px 0 0 3px;
}
/* ===========================
====== Contact Form ======
=========================== */
input, textarea {
padding: 10px;
border: 1px solid #E5E5E5;
width: 400px;
color: #999999;
box-shadow: rgba(0, 0, 0, 0.1) 0px 0px 8px;
-moz-box-shadow: rgba(0, 0, 0, 0.1) 0px 0px 8px;
-webkit-box-shadow: rgba(0, 0, 0, 0.1) 0px 0px 8px;
}
textarea {
width: 400px;
height: 150px;
max-width: 400px;
line-height: 18px;
}
input:hover, textarea:hover,
input:focus, textarea:focus {
border-color: 1px solid #C9C9C9;
box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 8px;
-moz-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 8px;
-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 8px;
}
.form label {
color: #999999;
}
/* Submit Button */
.submit input {
width: 100px;
height: 40px;
background-color: #474E69;
color: #FFF;
border-radius: 3px;
-moz-border-radius: 3px;
-webkit-border-radius: 3px;
}
A:
Hopefully It will work, I have checked @MarianRehak..
just remove z-index from
#cssmenu2 ul{}
and add this class
#cssmenu2 ul li:hover ul {
z-index: 999999 !important;
}
Rest you can play with the position.. the basic issue will be resolved now..
|
{
"pile_set_name": "StackExchange"
}
|
A common question when planning and designing your Neo4j Graph Database is how to handle “flagged” entities. This could include users that are active, blog posts that are published, news articles that have been read, etc.
Introduction
In the SQL world, you would typically create a a boolean|tinyint column; in Neo4j, the same can be achieved in the following two ways:
A flagged indexed property
A dedicated label
Having faced this design dilemma a number of times, we would like to share our experience with the two presented possibilities and some Cypher query optimizations that will help you take a full advantage of a the graph database.
Throughout the blog post, we’ll use the following example scenario:
We have User nodes
nodes User FOLLOWS other users
other users Each user writes multiple blog posts stored as BlogPost nodes
nodes Some of the blog posts are drafted , others are published ( active )
Setting up
If we want to get a running test database for this use case, we can generate a small graph using Graphgen and import it into our local database. We use the following pattern:
(user:#User *10) (post:#BlogPost *200) (post2:#BlogPost:ActivePost {active:{randomElement:["true"]}} *200) (user)-[:WRITTEN *1..n]->(post) (user)-[:WRITTEN *1..n]->(post2) (user)-[:FOLLOWS *n..n]->(user)
Naturally, we will create a unique constraint on the User _id property :
CREATE CONSTRAINT ON (user:User) ASSERT user._id IS UNIQUE;
Retrieving active blog posts
We now want to retrieve all the BlogPost nodes that are active.
Using labels
PROFILE MATCH (post:ActivePost) RETURN count(post);
will result in the following execution plan :
neo4j-sh (?)$ PROFILE MATCH (post:ActivePost) RETURN count(post); +-------------+ | count(post) | +-------------+ | 200 | +-------------+ 1 row ColumnFilter | +EagerAggregation | +NodeByLabel +------------------+------+--------+-------------+--------------------------+ | Operator | Rows | DbHits | Identifiers | Other | +------------------+------+--------+-------------+--------------------------+ | ColumnFilter | 1 | 0 | | keep columns count(post) | | EagerAggregation | 1 | 0 | | | | NodeByLabel | 200 | 201 | post, post | :ActivePost | +------------------+------+--------+-------------+--------------------------+ Total database accesses: 201
As we can see there are no more database accesses than the number of ActivePost nodes in the database, thanks to the label indexing.
Now, let’s compare it with the use of an indexed active property on the nodes.
Using an indexed flagged property
CREATE INDEX ON :BlogPost(active);
PROFILE MATCH (post:BlogPost) WHERE post.active = true RETURN count(post);
neo4j-sh (?)$ PROFILE MATCH (post:BlogPost) WHERE post.active = 'true' RETURN count(post); +-------------+ | count(post) | +-------------+ | 200 | +-------------+ 1 row ColumnFilter | +EagerAggregation | +SchemaIndex +------------------+------+--------+-------------+------------------------------------+ | Operator | Rows | DbHits | Identifiers | Other | +------------------+------+--------+-------------+------------------------------------+ | ColumnFilter | 1 | 0 | | keep columns count(post) | | EagerAggregation | 1 | 0 | | | | SchemaIndex | 200 | 201 | post, post | { AUTOSTRING0}; :BlogPost(active) | +------------------+------+--------+-------------+------------------------------------+ Total database accesses: 201
As we can see, there is no difference between matching on a dedicated label and using indexed properties.
But why this blog post then?
The difference will be apparent when the queried nodes are not in the beginning of the pattern.
Retrieving active blog posts written by a user
Let’s say we want to retrieve all active posts for a specific user :
Using labels
PROFILE MATCH (user:User {_id:'c922ea0d-45d6-375b-b91a-470933592c2a'}) WITH user MATCH (user)-[:WRITTEN]->(p:ActivePost) RETURN count(p);
neo4j-sh (?)$ PROFILE MATCH (user:User {_id:'c922ea0d-45d6-375b-b91a-470933592c2a'}) > WITH user > MATCH (user)-[:WRITTEN]->(p:ActivePost) > RETURN count(p); +----------+ | count(p) | +----------+ | 21 | +----------+ 1 row ColumnFilter | +EagerAggregation | +Filter | +SimplePatternMatcher | +SchemaIndex +----------------------+------+--------+----------------------+-----------------------------+ | Operator | Rows | DbHits | Identifiers | Other | +----------------------+------+--------+----------------------+-----------------------------+ | ColumnFilter | 1 | 0 | | keep columns count(p) | | EagerAggregation | 1 | 0 | | | | Filter | 21 | 21 | | hasLabel(p:ActivePost(2)) | | SimplePatternMatcher | 21 | 35 | user, p, UNNAMED85 | | | SchemaIndex | 1 | 2 | user, user | { AUTOSTRING0}; :User(_id) | +----------------------+------+--------+----------------------+-----------------------------+ Total database accesses: 58
Using an indexed property
PROFILE MATCH (user:User {_id:'c922ea0d-45d6-375b-b91a-470933592c2a'}) WITH user MATCH (user)-[:WRITTEN]->(p:BlogPost) WHERE p.active = 'true' RETURN count(p);
neo4j-sh (?)$ PROFILE MATCH (user:User {_id:'c922ea0d-45d6-375b-b91a-470933592c2a'}) > WITH user > MATCH (user)-[:WRITTEN]->(p:BlogPost) > WHERE p.active = 'true' > RETURN count(p); +----------+ | count(p) | +----------+ | 21 | +----------+ 1 row ColumnFilter | +EagerAggregation | +Filter | +SimplePatternMatcher | +SchemaIndex +----------------------+------+--------+----------------------+------------------------------------------------------------------------+ | Operator | Rows | DbHits | Identifiers | Other | +----------------------+------+--------+----------------------+------------------------------------------------------------------------+ | ColumnFilter | 1 | 0 | | keep columns count(p) | | EagerAggregation | 1 | 0 | | | | Filter | 21 | 63 | | (hasLabel(p:BlogPost(1)) AND Property(p,active(8)) == { AUTOSTRING1}) | | SimplePatternMatcher | 21 | 105 | user, p, UNNAMED85 | | | SchemaIndex | 1 | 2 | user, user | { AUTOSTRING0}; :User(_id) | +----------------------+------+--------+----------------------+------------------------------------------------------------------------+ Total database accesses: 170
As we can see, the indexed property is not used by Cypher and it needs to filter on all blog posts. Using a dedicated label is thus more performant.
Going further with some tips and tricks
We will not stop here! We would like to share some tips that will help you optimize your Cypher queries.
Always use dedicated labels for positives
You may want to ask: why not adding a Draft label on the BlogPost nodes for non-active blog posts?
The reason is that this would force an additional negation filter when retrieving active blog posts, and negation in Cypher is costly :
PROFILE MATCH (user:User {_id:'c922ea0d-45d6-375b-b91a-470933592c2a'}) WITH user MATCH (user)-[:WRITTEN]->(p:BlogPost) WHERE NOT p :Draft RETURN count(p);
neo4j-sh (?)$ PROFILE MATCH (user:User {_id:'c922ea0d-45d6-375b-b91a-470933592c2a'}) > WITH user > MATCH (user)-[:WRITTEN]->(p:BlogPost) > WHERE NOT p :Draft > RETURN count(p); +----------+ | count(p) | +----------+ | 21 | +----------+ 1 row ColumnFilter | +EagerAggregation | +Filter | +SimplePatternMatcher | +SchemaIndex +----------------------+------+--------+----------------------+---------------------------------------------------------+ | Operator | Rows | DbHits | Identifiers | Other | +----------------------+------+--------+----------------------+---------------------------------------------------------+ | ColumnFilter | 1 | 0 | | keep columns count(p) | | EagerAggregation | 1 | 0 | | | | Filter | 21 | 42 | | (hasLabel(p:BlogPost(1)) AND NOT(hasLabel(p:Draft(3)))) | | SimplePatternMatcher | 21 | 70 | user, p, UNNAMED85 | | | SchemaIndex | 1 | 2 | user, user | { AUTOSTRING0}; :User(_id) | +----------------------+------+--------+----------------------+---------------------------------------------------------+ Total database accesses: 114
Avoid the need to match on multiple labels
Some designs we have encountered were making too much use of dedicated labels, forcing queries to match on multiple labels to fetch the desired set of nodes.
Matching on more than one label will make Cypher apply an additional hasLabel filter :
PROFILE MATCH (post:BlogPost:ActivePost) RETURN count(post);
neo4j-sh (?)$ PROFILE MATCH (post:BlogPost:ActivePost) RETURN count(post); +-------------+ | count(post) | +-------------+ | 200 | +-------------+ 1 row ColumnFilter | +EagerAggregation | +Filter | +NodeByLabel +------------------+------+--------+-------------+------------------------------+ | Operator | Rows | DbHits | Identifiers | Other | +------------------+------+--------+-------------+------------------------------+ | ColumnFilter | 1 | 0 | | keep columns count(post) | | EagerAggregation | 1 | 0 | | | | Filter | 200 | 400 | | hasLabel(post:ActivePost(2)) | | NodeByLabel | 400 | 401 | post, post | :BlogPost | +------------------+------+--------+-------------+------------------------------+ Total database accesses: 801
We can see here that the number of database accesses is growing and you can imagine that it will be costly when we have millions of blog posts or entities in the database.
Use well named relationship types to avoid some use of labels
When looking up patterns, specifying the label of the end node will force Cypher to filter on labels.
Dedicated and clear relationship types will help you traverse the graph easily and make full use of the powerful graph model, gaining performance by not having to match on labels.
Let’s refactor our little model by adding a PUBLISHED relationship from User to ActivePost nodes and a DRAFTED relationship to the others.
MATCH (n:ActivePost) WITH n MATCH (n)<-[:WRITTEN]-(u) MERGE (u)-[:PUBLISHED]->(n);
MATCH (n:BlogPost) WHERE NOT n :ActivePost WITH n MATCH (n)<-[:WRITTEN]-(u) MERGE (u)-[:DRAFTED]->(n);
The very advantage of Neo4j is that nodes contain references to the relationships they connected to them. This means that once we have a starting point in the graph, following relationships from nodes to nodes costs almost nothing :
PROFILE MATCH (user:User {_id:'c922ea0d-45d6-375b-b91a-470933592c2a'}) WITH user MATCH (user)-[:PUBLISHED]->(p) RETURN count(p);
neo4j-sh (?)$ PROFILE MATCH (user:User {_id:'c922ea0d-45d6-375b-b91a-470933592c2a'}) > WITH user > MATCH (user)-[:PUBLISHED]->(p) > RETURN count(p); +----------+ | count(p) | +----------+ | 21 | +----------+ 1 row ColumnFilter | +EagerAggregation | +SimplePatternMatcher | +SchemaIndex +----------------------+------+--------+----------------------+-----------------------------+ | Operator | Rows | DbHits | Identifiers | Other | +----------------------+------+--------+----------------------+-----------------------------+ | ColumnFilter | 1 | 0 | | keep columns count(p) | | EagerAggregation | 1 | 0 | | | | SimplePatternMatcher | 21 | 0 | user, p, UNNAMED85 | | | SchemaIndex | 1 | 2 | user, user | { AUTOSTRING0}; :User(_id) | +----------------------+------+--------+----------------------+-----------------------------+ Total database accesses: 2
As we can see, we did not define any labels because we know that the :PUBLISHED relationship will point to blog posts that are active and retrieving thousands of blog posts will just cost us nothing more than using the schema index for our user and a few traversals from the user to blog post nodes by following their relationships.
Conclusion
A good design of your graph database model will help you perform very fast queries and provide a good user experience. Testing your queries and the usage of the query profiler can help you discover bottlenecks in your schema and should be done regularly during the development process, before going to production with a large data set.
Note: This blog post is a follow up of my StackOverflow answer on the subject
|
{
"pile_set_name": "OpenWebText2"
}
|
"use strict";
// Use the fastest means possible to execute a task in its own turn, with
// priority over other events including IO, animation, reflow, and redraw
// events in browsers.
//
// An exception thrown by a task will permanently interrupt the processing of
// subsequent tasks. The higher level `asap` function ensures that if an
// exception is thrown by a task, that the task queue will continue flushing as
// soon as possible, but if you use `rawAsap` directly, you are responsible to
// either ensure that no exceptions are thrown from your task, or to manually
// call `rawAsap.requestFlush` if an exception is thrown.
module.exports = rawAsap;
function rawAsap(task) {
if (!queue.length) {
requestFlush();
flushing = true;
}
// Equivalent to push, but avoids a function call.
queue[queue.length] = task;
}
var queue = [];
// Once a flush has been requested, no further calls to `requestFlush` are
// necessary until the next `flush` completes.
var flushing = false;
// `requestFlush` is an implementation-specific method that attempts to kick
// off a `flush` event as quickly as possible. `flush` will attempt to exhaust
// the event queue before yielding to the browser's own event loop.
var requestFlush;
// The position of the next task to execute in the task queue. This is
// preserved between calls to `flush` so that it can be resumed if
// a task throws an exception.
var index = 0;
// If a task schedules additional tasks recursively, the task queue can grow
// unbounded. To prevent memory exhaustion, the task queue will periodically
// truncate already-completed tasks.
var capacity = 1024;
// The flush function processes all tasks that have been scheduled with
// `rawAsap` unless and until one of those tasks throws an exception.
// If a task throws an exception, `flush` ensures that its state will remain
// consistent and will resume where it left off when called again.
// However, `flush` does not make any arrangements to be called again if an
// exception is thrown.
function flush() {
while (index < queue.length) {
var currentIndex = index;
// Advance the index before calling the task. This ensures that we will
// begin flushing on the next task the task throws an error.
index = index + 1;
queue[currentIndex].call();
// Prevent leaking memory for long chains of recursive calls to `asap`.
// If we call `asap` within tasks scheduled by `asap`, the queue will
// grow, but to avoid an O(n) walk for every task we execute, we don't
// shift tasks off the queue after they have been executed.
// Instead, we periodically shift 1024 tasks off the queue.
if (index > capacity) {
// Manually shift all values starting at the index back to the
// beginning of the queue.
for (var scan = 0, newLength = queue.length - index; scan < newLength; scan++) {
queue[scan] = queue[scan + index];
}
queue.length -= index;
index = 0;
}
}
queue.length = 0;
index = 0;
flushing = false;
}
// `requestFlush` is implemented using a strategy based on data collected from
// every available SauceLabs Selenium web driver worker at time of writing.
// https://docs.google.com/spreadsheets/d/1mG-5UYGup5qxGdEMWkhP6BWCz053NUb2E1QoUTU16uA/edit#gid=783724593
// Safari 6 and 6.1 for desktop, iPad, and iPhone are the only browsers that
// have WebKitMutationObserver but not un-prefixed MutationObserver.
// Must use `global` instead of `window` to work in both frames and web
// workers. `global` is a provision of Browserify, Mr, Mrs, or Mop.
var BrowserMutationObserver = global.MutationObserver || global.WebKitMutationObserver;
// MutationObservers are desirable because they have high priority and work
// reliably everywhere they are implemented.
// They are implemented in all modern browsers.
//
// - Android 4-4.3
// - Chrome 26-34
// - Firefox 14-29
// - Internet Explorer 11
// - iPad Safari 6-7.1
// - iPhone Safari 7-7.1
// - Safari 6-7
if (typeof BrowserMutationObserver === "function") {
requestFlush = makeRequestCallFromMutationObserver(flush);
// MessageChannels are desirable because they give direct access to the HTML
// task queue, are implemented in Internet Explorer 10, Safari 5.0-1, and Opera
// 11-12, and in web workers in many engines.
// Although message channels yield to any queued rendering and IO tasks, they
// would be better than imposing the 4ms delay of timers.
// However, they do not work reliably in Internet Explorer or Safari.
// Internet Explorer 10 is the only browser that has setImmediate but does
// not have MutationObservers.
// Although setImmediate yields to the browser's renderer, it would be
// preferrable to falling back to setTimeout since it does not have
// the minimum 4ms penalty.
// Unfortunately there appears to be a bug in Internet Explorer 10 Mobile (and
// Desktop to a lesser extent) that renders both setImmediate and
// MessageChannel useless for the purposes of ASAP.
// https://github.com/kriskowal/q/issues/396
// Timers are implemented universally.
// We fall back to timers in workers in most engines, and in foreground
// contexts in the following browsers.
// However, note that even this simple case requires nuances to operate in a
// broad spectrum of browsers.
//
// - Firefox 3-13
// - Internet Explorer 6-9
// - iPad Safari 4.3
// - Lynx 2.8.7
} else {
requestFlush = makeRequestCallFromTimer(flush);
}
// `requestFlush` requests that the high priority event queue be flushed as
// soon as possible.
// This is useful to prevent an error thrown in a task from stalling the event
// queue if the exception handled by Node.js’s
// `process.on("uncaughtException")` or by a domain.
rawAsap.requestFlush = requestFlush;
// To request a high priority event, we induce a mutation observer by toggling
// the text of a text node between "1" and "-1".
function makeRequestCallFromMutationObserver(callback) {
var toggle = 1;
var observer = new BrowserMutationObserver(callback);
var node = document.createTextNode("");
observer.observe(node, {characterData: true});
return function requestCall() {
toggle = -toggle;
node.data = toggle;
};
}
// The message channel technique was discovered by Malte Ubl and was the
// original foundation for this library.
// http://www.nonblocking.io/2011/06/windownexttick.html
// Safari 6.0.5 (at least) intermittently fails to create message ports on a
// page's first load. Thankfully, this version of Safari supports
// MutationObservers, so we don't need to fall back in that case.
// function makeRequestCallFromMessageChannel(callback) {
// var channel = new MessageChannel();
// channel.port1.onmessage = callback;
// return function requestCall() {
// channel.port2.postMessage(0);
// };
// }
// For reasons explained above, we are also unable to use `setImmediate`
// under any circumstances.
// Even if we were, there is another bug in Internet Explorer 10.
// It is not sufficient to assign `setImmediate` to `requestFlush` because
// `setImmediate` must be called *by name* and therefore must be wrapped in a
// closure.
// Never forget.
// function makeRequestCallFromSetImmediate(callback) {
// return function requestCall() {
// setImmediate(callback);
// };
// }
// Safari 6.0 has a problem where timers will get lost while the user is
// scrolling. This problem does not impact ASAP because Safari 6.0 supports
// mutation observers, so that implementation is used instead.
// However, if we ever elect to use timers in Safari, the prevalent work-around
// is to add a scroll event listener that calls for a flush.
// `setTimeout` does not call the passed callback if the delay is less than
// approximately 7 in web workers in Firefox 8 through 18, and sometimes not
// even then.
function makeRequestCallFromTimer(callback) {
return function requestCall() {
// We dispatch a timeout with a specified delay of 0 for engines that
// can reliably accommodate that request. This will usually be snapped
// to a 4 milisecond delay, but once we're flushing, there's no delay
// between events.
var timeoutHandle = setTimeout(handleTimer, 0);
// However, since this timer gets frequently dropped in Firefox
// workers, we enlist an interval handle that will try to fire
// an event 20 times per second until it succeeds.
var intervalHandle = setInterval(handleTimer, 50);
function handleTimer() {
// Whichever timer succeeds will cancel both timers and
// execute the callback.
clearTimeout(timeoutHandle);
clearInterval(intervalHandle);
callback();
}
};
}
// This is for `asap.js` only.
// Its name will be periodically randomized to break any code that depends on
// its existence.
rawAsap.makeRequestCallFromTimer = makeRequestCallFromTimer;
// ASAP was originally a nextTick shim included in Q. This was factored out
// into this ASAP package. It was later adapted to RSVP which made further
// amendments. These decisions, particularly to marginalize MessageChannel and
// to capture the MutationObserver implementation in a closure, were integrated
// back into ASAP proper.
// https://github.com/tildeio/rsvp.js/blob/cddf7232546a9cf858524b75cde6f9edf72620a7/lib/rsvp/asap.js
|
{
"pile_set_name": "Github"
}
|
/*
* jQuery Simple Templates plugin 1.1.1
*
* http://andrew.hedges.name/tmpl/
* http://docs.jquery.com/Plugins/Tmpl
*
* Copyright (c) 2008 Andrew Hedges, andrew@hedges.name
*
* Usage: $.tmpl('<div class="#{classname}">#{content}</div>', { 'classname' : 'my-class', 'content' : 'My content.' });
*
* The changes for version 1.1 were inspired by the discussion at this thread:
* http://groups.google.com/group/jquery-ui/browse_thread/thread/45d0f5873dad0178/0f3c684499d89ff4
*
* Dual licensed under the MIT and GPL licenses:
* http://www.opensource.org/licenses/mit-license.php
* http://www.gnu.org/licenses/gpl.html
*/
(function($) {
$.extend({
// public interface: $.tmpl
tmpl : function(tmpl, vals) {
var rgxp, repr;
// default to doing no harm
tmpl = tmpl || '';
vals = vals || {};
// regular expression for matching our placeholders; e.g., #{my-cLaSs_name77}
rgxp = /#\{([^{}]*)}/g;
// function to making replacements
repr = function (str, match) {
return typeof vals[match] === 'string' || typeof vals[match] === 'number' ? vals[match] : str;
};
return tmpl.replace(rgxp, repr);
}
});
})(jQuery);
|
{
"pile_set_name": "Github"
}
|
module.exports = preferredCharsets;
preferredCharsets.preferredCharsets = preferredCharsets;
function parseAcceptCharset(accept) {
var accepts = accept.split(',');
for (var i = 0, j = 0; i < accepts.length; i++) {
var charset = parseCharset(accepts[i].trim(), i);
if (charset) {
accepts[j++] = charset;
}
}
// trim accepts
accepts.length = j;
return accepts;
}
function parseCharset(s, i) {
var match = s.match(/^\s*(\S+?)\s*(?:;(.*))?$/);
if (!match) return null;
var charset = match[1];
var q = 1;
if (match[2]) {
var params = match[2].split(';')
for (var i = 0; i < params.length; i ++) {
var p = params[i].trim().split('=');
if (p[0] === 'q') {
q = parseFloat(p[1]);
break;
}
}
}
return {
charset: charset,
q: q,
i: i
};
}
function getCharsetPriority(charset, accepted, index) {
var priority = {o: -1, q: 0, s: 0};
for (var i = 0; i < accepted.length; i++) {
var spec = specify(charset, accepted[i], index);
if (spec && (priority.s - spec.s || priority.q - spec.q || priority.o - spec.o) < 0) {
priority = spec;
}
}
return priority;
}
function specify(charset, spec, index) {
var s = 0;
if(spec.charset.toLowerCase() === charset.toLowerCase()){
s |= 1;
} else if (spec.charset !== '*' ) {
return null
}
return {
i: index,
o: spec.i,
q: spec.q,
s: s
}
}
function preferredCharsets(accept, provided) {
// RFC 2616 sec 14.2: no header = *
var accepts = parseAcceptCharset(accept === undefined ? '*' : accept || '');
if (!provided) {
// sorted list of all charsets
return accepts.filter(isQuality).sort(compareSpecs).map(function getCharset(spec) {
return spec.charset;
});
}
var priorities = provided.map(function getPriority(type, index) {
return getCharsetPriority(type, accepts, index);
});
// sorted list of accepted charsets
return priorities.filter(isQuality).sort(compareSpecs).map(function getCharset(priority) {
return provided[priorities.indexOf(priority)];
});
}
function compareSpecs(a, b) {
return (b.q - a.q) || (b.s - a.s) || (a.o - b.o) || (a.i - b.i) || 0;
}
function isQuality(spec) {
return spec.q > 0;
}
|
{
"pile_set_name": "Github"
}
|
Optimizing independent finger flexion with zone V flexor repairs using the Massachusetts General Hospital flexor tenorrhaphy and early protected active motion.
Independent FDS action has been cited to be problematic with repair of multiple tendons in zone V owing to adhesion formation between the flexor digitorum superficialis (FDS) and the flexor digitorum profundus (FDP) tendons. Of the several described flexor repair techniques the ideal tendon repair should be strong enough to allow for early active motion to minimize adhesion formation and maximize tendon healing. Biomechanical studies have proven the Massachusetts General Hospital (MGH) repair to be strong enough to allow for early active motion. The purpose of this study was to examine the use of the MGH technique for zone V flexor tendon injuries to allow for early protected active motion to achieve independent finger flexion through better differential gliding of the tendons. We performed a retrospective review 168 zone V finger flexor tendon repairs for 29 patients performed consecutively over 4 years when early active motion was not contraindicated. The same early protected active motion protocol was used for all of these patients. We reviewed total active motion, independent flexion, rupture, and need for tenolysis. These injuries involved 103 FDS and 65 FDP tendons to 103 fingers. The median follow-up period was 24 weeks. Of these 29 patients 19 were men and 10 were women. The average patient age was 28 years. The total active motion for these zone V repairs was 236 degrees +/- 5 degrees Overall 97 of 103 digits attained good to excellent function and 88 of 103 developed some differential glide. One of these patients required a tenolysis. Three repairs ruptured in 1 patient owing to suture breakage that was associated with noncompliance with the dorsal extension block splint. Our retrospective review of 168 consecutive flexor tendon repairs showed that the MGH technique allowed for early protected active motion, which provided good to excellent functional outcomes with 88 of 103 developing independent finger flexion at an acceptably low complication risk.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
In haec verba
In haec verba (meaning "in these words") is a phrase in Latin legal usage, which refers to incorporating verbatim text into a complaint, pleading or other legal document as was mentioned in a deed or agreement which is in question or cause of dispute, or in another legal instrument (such as a legal description, statute, etc.). This is done by reciting the words verbatim in the pleading rather than by attaching a copy to the pleading or other legal instrument.
For example, Delaware Code, tit. 8, § 102(b)(2) permits a corporation to enter into a compromise with its creditors if the corporation has included the specific language of the statute in haec verba in its certification of incorporation; thus, the exact language of the statute must be recited verbatim in the certificate of incorporation in order to take advantage of this statutory provision.
References
Category:Latin legal terminology
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Paduvarahalli Paddegalu
Paduvarahalli Paddegalu was a Kannada language serial that aired on Suvarna TV. It was directed by Master Anand. It was a rural backdrop serial which portrayed the everyday glamour lives of unemployed youths.
References
Category:Kannada-language television programs
|
{
"pile_set_name": "Wikipedia (en)"
}
|
What is Whole30®? Why Do People Love Doing it in September?
Whole30® is an innovative 30-day “nutritional reset” program. Co-founded in 2009 by Melissa Hartwig and Dallas Hartwig. Whole30® has proven to be an insightful and eye-opening experience. The program has delivered incredible and life-changing results for millions of people.
What results are we talking about? People who participate in Whole30® tend to report increased energy, significant fat loss, improved athletic performance, improved skin quality, better sleep, and enhanced food taste. Perhaps most importantly a healthier relationship with food and a deeper understanding of how different foods affect them individually.
How Whole30® Works
The basic premise of Whole30® is as follows:
For 30 days, you completely eliminate a number of food groups that are known to be problematic for health. Including sugar, grains, alcohol, dairy, legumes, and additives like MSG, carrageenan, and sulfites. Even baked goods made with Whole30® “approved” ingredients are not permitted. Stated on their website, “a pancake is still a pancake, even if it’s made with coconut flour.”
What you DO eat is real food: veggies, meat, fish, eggs, produce, herbs, spices, and quality fats. The goal is to fuel yourself with whole, nutrient-dense, unprocessed foods for 30 days straight. NO “cheating!” This gives your body a chance to detox and feel what it’s like to function on food you evolved to eat.
At the end of the 30 day program, you gradually and strategically re-introduce the eliminated food groups so you can learn which types of food affect you and how. This helps you move forward from the program so you can maintain a sustainable way of eating that’s a “best fit” for you. “Food freedom,” as Melissa Hartwig calls it.
It’s fairly “strict” as far as nutrition plans go. Salad dressings and deli meats are no-go if they contain any non-compliant ingredients or additives. For most participants, the so-called “radical” experiment is overwhelmingly worth it.
5 Reasons Why September is the Perfect Time to do a Whole30® Challenge
Whole30® challenges can be done any time of the year. The company has a few annual Whole30® challenges for people interested in doing one with the support of an online community. The September Whole30® is one of their more popular challenges.
A few reasons why:
September is the unofficial “fresh start” of the year—a perfect time to “reset” out of vacation mode.
Whole30® inspires creativity. In the kitchen and while out to eat with loved ones. Streamline your mealtime!
A Whole30® in September allows you to regain a sense of control in a season that is often stressful and jam-packed.
A September Whole30® prepares you (physically and mentally) for the busy holiday season. It gives you a solid baseline of healthy habits to fall back on.
This challenge is a fun way to do something with friends, family, and entire online community of like-minded people!
We love serving health-conscious guests with quality, affordable, and delicious food! We’re also the 4th restaurant in the United States and the only restaurant in Indy to earn the official “Whole30 Approved®” seal. If you live in the Indianapolis area and are currently doing the Whole30® challenge, come to Nook, A Paleo Influenced Diner for a Whole30® approved dining experience!
|
{
"pile_set_name": "Pile-CC"
}
|
Striker on its belly crossword clue
Are you an avid crossword solver but get a little stumped every now and then? Well you've reached the right place! Here we will help you find the answer to the clue Striker on its belly from Universal crossword. Once we've looked for any additional hints from inside the Universal crossword puzzle and gathered any other information that can help us find the answer to the clue Striker on its belly, we can finally conclude that the possible answers for the clue Striker on its belly are:
sponsored ad
The answer has 3 letters: ASP
Search
About Us:
http://crosswordssolver.net/ offers a variety of crosswords solvers tools. Our staff solve crossword every day, and upload the answers on this site. So if you stuck, and dont know the answer, just enter our site, and use the search box. good luck!
|
{
"pile_set_name": "Pile-CC"
}
|
[Resistance to tumor specific therapy with imatinib by clonal selection of mutated cells].
A 60-year-old woman presented with night-sweats and increasing weakness. Physical examination revealed no abnormalities. For 27 years she had been treated for Philadelphia-positive chronic myeloid leukemia (CML). Because of progressive disease treatment with the tyrosine kinase inhibitor imatinib (STI571, Glivec (R)) had been started 9 months before. She had achieved complete hematological remission within 8 weeks, but not a cytogenetic response. Elevated WBC count (26.7/nl) with a differential displaying typical features of acceleration in bone marrow aspirate confirmed CML in accelerated phase. Sequencing of the ATP binding site of the BCR-ABL gene, which - at protein level - is the target for imatinib, revealed the clonal selection of cells harboring a point mutation leading to the exchange of amino acid 253 from tyrosine to histidine. This was considered to be the cause of resistance to imatinib. Dose increase of imatinib up to 600 mg daily and administration of cytarabine did not overcome resistance. Imatinib therapy was discontinued; hematologic remission was induced by oral therapy with hydroxyurea and mercaptopurine. In the course of the following 6 months a gradual decrease of the resistant clone from 100 % down to lower than the detection limit of the method was demonstrated. Clonal mutations are often the cause of resistance to imatinib therapy. They can be detected by sequencing of the ATP binding site of BCR-ABL in specialized laboratories. This case shows that discontinuation of imatinib therapy can significantly reduce the mutated (resistant) clone and thereby restore sensitivity to imatinib.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
PR (complexity)
PR is the complexity class of all primitive recursive functions—or, equivalently, the set of all formal languages that can be decided by such a function. This includes addition, multiplication, exponentiation, tetration, etc.
The Ackermann function is an example of a function that is not primitive recursive, showing that PR is strictly contained in R (Cooper 2004:88).
On the other hand, we can "enumerate" any recursively enumerable set (see also its complexity class RE) by a primitive-recursive function in the following sense: given an input (M, k), where M is a Turing machine and k is an integer, if M halts within k steps then output M; otherwise output nothing. Then the union of the outputs, over all possible inputs (M, k), is exactly the set of M that halt.
PR strictly contains ELEMENTARY.
PR does not contain "PR-complete" problems (assuming, e.g., reductions that belong to ELEMENTARY). In practice, many problems that are not in PR but just beyond are -complete (Schmitz 2016).
References
S. Barry Cooper (2004), Computability Theory, Chapman & Hall.
Herbert Enderton (2011), Computability Theory, Academic Press.
Sylvain Schmitz (2016), "Complexity Hierarchies Beyond Elementary", ACM Transactions on Computation Theory 8.
External links
.
Category:Complexity classes
|
{
"pile_set_name": "Wikipedia (en)"
}
|
In this article I interview clinical Psychologist Dr. George Simon the internationally-recognized expert on manipulation and character disturbance, and the bestselling author of In Sheep’s Clothing, Character Disturbance, and The Judas Syndrome
In this article we talk all things manipulation:
Let’s begin:
How did you come to study manipulative people?
Michael Frank: How did you get onto this path of studying manipulative people?
Dr. George Simon: I was dealing with an awful lot of folks in my practice as a clinical psychologist, who were coming to me with what we now know to be the gaslighting syndrome. But we didn’t have a name for it then. And these folks were depressed for the most part. They were perplexed. They were showing signs of having survived some kind of trauma. They felt crazy. But they couldn’t pinpoint why. However there was always someone in their life who they just knew at some gut level there was something wrong with, but that person in their life had them thinking that they were the crazy ones for even suspecting that. And that made them confused, angry, depressed and feeling pretty crazy.
And as I got to know these folks and their stories, it became quite clear that they were dealing with some archetypal manipulators. The folks who are the proverbial wolves in sheep’s clothing. These are the folks who are out to win, to dominate and control, and who also know how to look good doing it, and how to veil their aggression using subtle tactics to make you feel like the bad guy for having an issue with them. And so after dealing with so many of these individuals, and hearing so many stories, and doing years and years of clinical case research, I decided to write the book In Sheep’s Clothing about it, and I’m proud to say that very few books twenty-two years later are still bestsellers. That’s an indication of not only how widespread the problem is, but also how well the book seems to nail it.
What is “manipulative behavior”?
Michael Frank: Let’s start with defining what manipulation is. How do you define “manipulation” and how do you define “manipulative behavior”?
Dr. George Simon: The most common type of manipulation is covert aggression. Notice I didn’t say passive aggression, that’s a term that’s bandied about these days very loosely and erroneously, even by clinicians and mental health professionals. There’s nothing passive at all about covert or veiled aggression. It takes many forms, but it’s basically when a person is out to dominate and control you, and have their way with you, to make sure that you submit yourself to their will, and they do so in a way that’s hard to see. In other words if they were overt about it, if they were to just say: “It’s my way or the highway!” then maybe you would give some resistance. But some folks are sneaky. They’re clever. They’re calculating. They can even be charming. They know how to use your emotions and especially your conscientiousness to get you to come to their way of thinking. And that subtle approach, that way of fighting with you in a way that’s hard to see, can be very effective. And that’s the heart and soul of manipulative behavior. It’s playing on your emotions, your sympathies, and especially on your conscientiousness to have their way with you. It’s a covertly aggressive strategy and it works for the most part in relationships, but it’s very destructive.
Covert vs overt aggression
Michael Frank: So if someone is not covertly aggressive, but overtly aggressive, for example, if they were to just physically threaten someone, we would generally not put that in the category of manipulation? That wouldn’t fit a category of physical manipulation?
Dr. George Simon: You know you can be manipulative in that way. In other words, you can control people through terror. It’s not the most common form of manipulation, but there are many ways to control people. You can control them through fear. We have a lot of studies on this. And the famous one of course is the Stockholm Syndrome (“feelings of trust or affection felt in many cases of kidnapping or hostage-taking by a victim towards a captor” – Oxford Dictionary) where after an experience of extreme terror, the victim begins to identify with their abuser. So there are many ways to control people, you can do it overtly, but the most common way, the slickest way, the most effective way, is to keep your aggression somewhat undercover and to basically beat people up with the weapons of guilting, shaming, playing the victim, and making the other person out to be the victimizer. These are all clever little tactics to get the other person to come around to your way of thinking and to do your bidding, and good manipulators know how to use those tactics very well.
But aren’t we all manipulative to some degree?
Michael Frank: I know someone is going to say something to the effect of:
“But aren’t we all manipulative to some degree?”
What are your thoughts on that?
Dr. George Simon: Absolutely. We are all manipulative to some degree. You know we are inherently, unfortunately, kind of aggressive creatures. This is a not so friendly world we are living in where we have to do our best to survive and prosper, and we’re in competition with each other, and we’re all trying to get our own way, and we’re not always very nice to each other. But it’s about how we go about the fight. I always like to say in workshops that all the major theories in our traditional psychologies are all about people’s insecurities and fears and the things they run and hide from. But we barely have a psychology that addresses the number one thing that people do in their lives: FIGHT. We fight more than we do anything else. It’s in our politics. It’s in our business affairs. It’s in our social affairs. It’s in almost everything we do. But how we conduct that fight is what defines our character.
When we fight fairly for something just, when it’s not really about us but about some valid principle, when we fight with consideration for the feelings and the welfare of the other person, and when we respect certain rights and boundaries, then that by definition is assertive behavior, and we all need to be assertive because there are some things in this life we’re fighting for.
But when it’s all about us, when we’ll take no prisoners, when we’ll do everything we have to do to get our way, when we make no bones about hurting people in the process, and there’s very little stake except getting what we want, then we’re being aggressive instead of assertive, and when we do so covertly and slickly, it’s manipulative and it’s always destructive in a relationship.
Manipulative personality types
Michael Frank: Are their certain personality types that are more likely to be manipulative than others? And are there certain personality types that are more likely to be manipulated than others?
Dr. George Simon: Yes, absolutely. You’ve got to have a pretty big fat conscience and a sense of guilt and shame to have these tactics work on you. Let’s take guilting for example. Just try for example, with someone who’s grandiosely narcissistic and has very little conscience, just try guilting them into doing something. You’ll find out in very short order that it doesn’t work because they don’t have the capacity for guilt. They don’t have the conscientiousness necessary. So yes there are certain personalities and they’re on what we call the character disturbed or character disordered spectrum.
These are the folks with tremendous narcissistic and aggressive features in their personality, that don’t mind basically beating people up and doing harm to them in various ways. These are the folks that don’t care about anyone or anything other than their own self serving needs and they’re willing to do whatever it takes to have their way. These are the most manipulative personalities and their victims are genuinely the conscientious types who want to do right, who want to be seen as good, and who are vulnerable to these tactics that these other folks use to manipulate and control them.
Who is more manipulative men or women?
Michael Frank: Let me ask you a non-PC question. Generally speaking, who have you found in all of your years of clinical practice to be more manipulative? Men or women?
Dr. George Simon: You know when I first started doing clinical research, based on my life experiences as a clinician, I really thought that I was going to find more men of the more overtly aggressive type, and more women of the covertly aggressive type. But what I ended up finding is there doesn’t seem to be much gender difference. Maybe the manifestation is just a little bit different whether you’re male or female, but I haven’t found any differences along gender lines. And that was a surprise to me because I did expect to find some differences.
How men and women manipulate differently
Michael Frank: In terms of the way those manipulations manifest themselves, what are some of the key differences in the way that men and women manipulate?
Dr. George Simon: I think that many times, men will play on emotions, whereas women will use emotion. In other words, women will sometimes use displays of woundedness to try and gain some kind of control over their environment and to try to control the behavior of their relationship partner to some degree.
Whereas men play on and prey on emotions to get their way. So they’ll see that sensitivity to shame that the woman has, that sensitivity that she has to being seen as not a nice person, or maybe to not being a faithful partner, and they’ll use that as a weapon of control. Whereas the woman might use her hurt, and displays of that hurt, to try and soften up or a sway her relationship partner. So I would say that the big difference in the expression is that men seem to be more willing to play on and prey on a woman’s emotions, and women seem more prone to use emotions to manipulate. That’s the only difference that I can see.
Playing the victim
Michael Frank: I’d say one thing that sticks out to me though, is that I think women are a lot more likely to play the victim as a manipulative tactic, whereas guys are more likely to try to physically bully or dominate. Has that been your experience?
Dr. George Simon: Actually, no. I was surprised at that. I thought that I would find such differences. But when it comes to the tactics, it just seems like they’re equal opportunity along gender lines. In fact, I can’t tell you the number of times that I’ve had to confront men in joint sessions about that playing the victim role. It’s just incredible. I never thought that I would see it as frequently as I do. But I see it a lot. I would have to say that it’s an equal opportunity tactic playing the victim, and it’s one of the more popular ones by the way. And then when you combine taking the victim role yourself, with casting the other person as the victimizer, that’s kind of a double whammy right there. That’s twice the punch.
Manipulative children
Michael Frank: Let’s look at manipulation within children. When do you find that manipulative behavior tends to start? Is it inherent in the personality of human beings? Or is it a learned behavior that starts very early in childhood?
Dr. George Simon: Boy this is something that I talk about in workshops all the time. You know, we don’t have to teach our kids to fight for the things they want. Now we can reinforce it, and we can provide them with a lot of messages in their formative years that really reinforce the notion. But we are kind of natural brutes. The fact is that socialization is a process. None of us is born civilized. We have an animal nature. We can rise above it – yes. But we have an animal nature, we are born brutes, and it is natural for us to fight for the things that we want. If children have strong, resourceful, principled parents at a very early age they will learn very early on that the direct fighting approach is probably not going to get them anywhere.
Children are in a vulnerable position. The adults are stronger than they are in many ways, and I’m not just talking physically, they’re also dependent on them. So the feisty approach is not going to work. So they very early on learn that the way to fight is covertly, by using subtle little tricks to play on mommy or daddy’s conscientiousness to manipulate them. They learn this very early on. And when it works, and God knows it does work from time to time, that sends them the message that this is a good strategy to use. And so they develop a habit of it over time, unless parents are wise enough to intervene and help correct that habit.
How children manipulate
Michael Frank: What are some of the most common ways children try to manipulate their parents?
Dr. George Simon: Oh playing on sympathies for sure. I give an example of a really tyrannical child in my book In Sheep’s Clothing who had a mother that was so conscientious, she never wanted to do the wrong thing. She never wanted to put her daughter in any kind of vulnerable positions that she herself experienced as a young girl. So when her daughter would say things like: “You just hate me, you don’t really care for me, you’re never on my side, you’re always taking other people’s sides” and she played that victim role and vilified the parent, you know, conscientious parents, this touches a button in them. Who wants to be seen as the bad guy? So parents with a conscience who want to be seen as loving and caring can really respond to these tactics in a way that’s not really healthy, because then the child learns that they can have their way with mommy or daddy, and they end up usurping too much power within the family system, and you know kids are not meant to handle a whole lot of power because they haven’t yet had the life experience or the wisdom to know how to use it.
I had an example just the other day that I dealt with that was just incredible. Where the youngest children, two young women in this family system, had usurped all the power and control. Their parents were quite dysfunctional, and these children had learned to use every single tactic in the book to maintain power and control. They knew the parents were dysfunctional. They knew they basically had a leg up. So whenever the parents tried to assert anything, they would easily point to some of the failures and errors of the parents and basically challenge their right to exert any authority, and they would play the victim, and cast their parents as villains. And they would basically state that they didn’t have any reason whatsoever to subordinate themselves to any kind of higher authority in the home. The children had taken over the ship, so to speak.
And that’s always a very dangerous situation because when young people at the ages of eleven or twelve take the reins of power, when they take the wheel of the ship, they don’t yet have the life experience or the wisdom to be able to chart a course and to direct things. They think they do, they may have the arrogance to think they do, but they don’t have the wisdom or the capability to do so. And so it just turns things on end. It’s the archetypal definition of a dysfunctional family where the inmates basically are running the asylum.
Why doesn’t the manipulators conscience bother them?
Michael Frank: You say in your book In Sheep’s Clothing that a lot of manipulators don’t have a conscience, and a lack of conscience, is like a lack of internal brakes. Why is it that some people’s conscience just doesn’t seem to bother them? Do you think that they drown out or ignore their conscience? Or do you think they just don’t seem to have a conscience in the first place?
Dr. George Simon: Oh boy, you ask a great question there Michael, because you know our traditional paradigms have always been that everybody has some degree of conscience, and they just drown it out with one kind of tactic or unconscious defense mechanism or another, either denial or rationalization. That’s been the traditional thinking.
But we now know that there are also people who unfortunately never develop a conscience in the first place. And we also used to think, and this is another really important thing, that everyone would develop in a healthy normal fashion if it weren’t for trauma arresting their development. There’s an axiom that they teach people in schools of social work and psychology: “Only hurt people, hurt people”. In other words, only people who have been damaged by trauma revisit that trauma on others because they haven’t healed yet.
There’s a certain amount of truth in that sometimes, but the greater tragedy of our narcissistic age is that there are too many people among us who have not had proper socialization from the get go. They didn’t get what they needed to get in the way of positive guidance, direction, instilling of values etc. in the first place. So they grew up with an ill formed conscience, or maybe no conscience at all.
And by the way, I should say that old axiom of “only hurt people, hurt people” does a great deal of disservice and is so horrendously disrespectful to the hundreds of deeply hurt people that I’ve met in my professional lifetime. People who have endured more hardship, more pain, more unfortunate circumstance than most of us will experience in a lifetime. And who still turned out to be really decent people who would never hurt a fly.
You have to be able to explain that, and you can’t explain that if you buy into this notion that “only hurt people, hurt people”. Socialization is a process, we are born brutes, some people never grow past that, and in our narcissistic culture, in our self-indulgent culture, in our culture of entitlement of taking everything for granted, some folks just never develop a healthy conscience. That’s the real tragedy. It’s just not there.
Why shouldn’t I manipulate others?
Michael Frank: We’re living in an age of ego and narcissism where bad behavior is not only tolerated, but it’s celebrated and rewarded. So let’s go down this path a little bit. If someone was to confront you Dr. Simon and say: “Look, I’ll be honest, I manipulate people but why shouldn’t I? It works! I get what I want, and it makes me very successful!” What would you say to that person?
Dr. George Simon: Well Michael, you know at some point, most of us come to the realization that we’re going to die, that we could gain the entire world, but as a famous person once said, we might end up losing our very soul in the process.
At some point, most folks come to the realization that even though it’s been all about them, it can’t be all about them. Whether we like it or not, whether we appreciate it or not, whether we recognize it or not, we’re all part of something bigger, and everything we do has an impact and affects something or someone else. And when we finally get that, when we finally care enough to make that matter, our lives change for the better and we have a more positive impact on the lives of those we touch. That’s a deeply spiritual matter. It’s not a religious matter. It’s a spiritual matter. And so what’s really ailing us in this age of more rampant character disturbance, is a spiritual disease.
We’re bankrupt spiritually. We have so much, and we take it for granted, and we don’t pay attention to the bigger picture because we’ve been so successful at just paying attention to ourselves and our petty little wants and desires. It’s been the ME ME ME age now for several decades, and it’s taking its toll, even the planet itself is crying out from the abuse that we’ve heaped upon it. And it’s saying, hey, wait a minute. You can’t keep getting away with this. We can’t keep going down the same path. Nature as a funny way of correcting things, in the end we will survive and prosper as a species when we embrace the bigger picture and when we put an end to that narcissistic, self-focused and self-indulgence and realize that whether we like it or not, whether we embrace it or not, we’re part of something bigger and we have a responsibility to manage ourselves in a more responsible way.
Do manipulative people ever grow out of it?
Michael Frank: For those people that are not religious or spiritual and don’t believe in karma, and just seem to have a particularly selfish and manipulative type of personality, has it been your experience that they generally grow out of it at some stage of their lives? Or has it been your experience that from cradle to the grave manipulators just stay manipulators?
Dr. George Simon: Well I only know from the folks that come to me, so my experience is biased. I don’t known of any objective research that’s looked into this. But I can tell you that many folks who I’ve had to close the door to, or who walked out, because they heard what I had to say and they were polite enough about it: “Well you know doc, you’ve got some kind of lofty ideals there to preach, but you know what, I’m not in the mood to hear it. Things are working for me pretty well right now. I think what you got to say sounds pretty good, but it’s not practical. So I’ll see you later. I’m going to continue to run my life just the way I always have”.
I can’t count the number of folks that twenty, thirty, forty years later, will knock on my door and say: “You know what? Life has taught me a few lessons. I’ve had three failed marriages. I’ve had a couple of broken careers. I’ve left some bodies in the wake. I feel kind of empty inside. I don’t know what the hell I want anymore. Maybe, just maybe, I didn’t have it all figured out after all. And maybe, just maybe, you may have some ideas about a better path”. And then they’re open. I can’t count the number of times that has happened. So I’m biased. I know that that does happen. I can’t tell you objectively what percentage of the time that happens.
Are most manipulators narcissists? Michael Frank: Are all manipulators, or most manipulators, necessarily narcissistic? Dr. George Simon: Well you know we have had this notion for a long time that we could nice nicely and neatly categorized people into these little diagnostic categories that we call the various personality disorders. And I don’t know if you know this or not, but the committee that formulates our categories and our distinctions and our diagnoses on these matters, the people that produce the official manual that mental health professionals use, they thought very seriously this last time around in this last revision, of getting rid of the category of narcissistic personality disorder. And it’s not because narcissism doesn’t exist, but it’s because narcissism is a feature and a dimension of many personality disturbances. And so, yes, narcissism has to be there, but is it the only thing? No. The other thing that we’re going to be revisiting is the very definition of a disorder. We have long thought that a personality style becomes a disorder when it’s so intense in it’s manifestation, so deviant from the norm, so inflexible, that it causes distress for either the person or others, then you could rightfully consider it a disorder. Well, unfortunately these days, certain personality styles that are pretty horrendous to look at are not that dysfunctional. They work. And they’re not that abnormal. They’re not that deviant from the norm. Narcissism these days is not deviant from the norm. It’s close to becoming the new norm. So the very definition that we’ve had for what constitutes a disorder is changing.
If everyone’s a narcissist, then no one is
Michael Frank: I don’t know if I’m oversimplifying this Dr. Simon, but it seems that if almost everyone is a narcissist, we just stop calling it narcissism…
Dr. George Simon: (Laughs) It’s really interesting what happens when something becomes the new norm. But I’m also a firm believer that we’re on the cusp of a new age. You know the pendulum always swings. We’ve been in this phase of our entitled kind of ME focused existence for a long time. Relationships don’t hold together anymore.
Families don’t hold together. People are spiritually bankrupt. They don’t see themselves as a part of a bigger picture. They don’t really respect a greater power at work in the universe. And when you do that you become expendable. We human beings, we were not always here, and we might not always be here. If we’re going to make it as a species, we will have to get with the program. People are going to have to reclaim the essential values that make us decent folks.
Michael Frank: Well let’s hope so, for everybody’s sake
Manipulation is conscious – not unconscious
Michael Frank: You say in your book In Sheep’s Clothing that manipulators are conscious of their actions. That it’s not an unconscious or an accidental thing. Can you expand upon that a little bit?
Dr. George Simon: Yeah. You know many folks on the receiving end always wonder: “Doesn’t this other person see what they’re doing? Maybe if I can just illuminate them, maybe if I can make them see…” Well the problem is that they already do see. They know exactly what they’re doing. Otherwise they wouldn’t be doing it. That kind of notion comes from old and pretty well worn out psychological paradigms that assume that most people’s behavior is unconscious, and it’s not that that perspective isn’t valid. It is a valid perspective for a lot of folks, especially those folks that I describe in my book as neurotic because they have some degree of conscience, and they’re kind of in conflict with their animal nature.
But there are folks among us increasingly these days, who don’t have a conscience, who don’t care. They’re aware, but they don’t care. They see, but they’re disagreeing. They know what the right principles are, but they’re at odds with those principles. They are spoiled little brats who just want to have their way and will do whatever it takes to get it. They know exactly what they’re doing. And as soon as the person on the other end of that realizes that, the sooner they’ll start standing up for themselves and not taking it anymore.
This is part one of a two part series – Part two will focus on the actual tactics of Manipulation: Gaslighting, Triangulation, Frame Control etc. and how to counter it
This interview has been edited and condensed for clarity.
Dr. George Simon is an internationally-recognized expert on manipulators and other problem characters and the author of 3 bestselling books: In Sheep’s Clothing (which has been translated into 12 foreign languages), Character Disturbance, and The Judas Syndrome. He’s made appearances on several major television (Fox News Network, CNN, CBS 48 Hours) and radio programs and is also the host of a weekly internet program on UCY.TV called Character Matters.
Dr. George Simon being interviewed by Bill O’Reilly
Until recently, Dr. Simon maintained an active private practice dedicated to assisting individuals develop character and helping empower victims in relationships with disturbed characters. In addition to providing psychotherapy services, he specialized in anxiety and anger management, comprehensive personality assessments, mental health professional training, and consultation to businesses and organizations on how to deal with problem characters. Dr. Simon also recently retired as a supervising psychologist for the Arkansas Dept. of Correction. For 6 years he provided clinical oversight to the community risk assessment program for registered sex offenders, and more recently provided similar oversight for the newly expanded and re-vamped prison-based sex offender treatment program. He has given numerous workshops on the various sex offender typologies and offender treatment and management strategies. He helped secure a DOJ grant through Center for Sex Offender Management, and is a member of the grant’s standing committee.
Dr. Simon served for several years on the Arkansas Governor’s Commission on Domestic Abuse, Rape and Violence, is a past President of the Arkansas Psychological Association, and is a Board Certified Diplomate in Forensic and Clinical Psychology (ACFEI).
|
{
"pile_set_name": "OpenWebText2"
}
|
Pretension spiral window balances have advantages over non-pretension balances. Pretension balances have a spiral rod that is pre-wound and set with a certain amount of tension. This saves the window manufacturer having to manually turn or wind the lift force onto the spiral rod of the balance prior to attaching the end of the spiral rod to a window sash. Pretension balances also eliminate the possibility of the window manufacturer applying an incorrect number of windings (lift force) to the balance, which could result in the improper operation or outright failure of the window balance.
When a non-pretension balance is installed into the jamb channel of a window frame, the rod is free to drop below the window sash and the rod end can be accessed for winding the lift force into the balance and then attaching it to the window sash. However, this requires specific tooling and which may be prone to human error. In a pretension balance, the lifting force is machine wound. Then the pre-wound rod is locked in position by the balance manufacturer, by means of the balance spring torque, inside a special pretension balance anchor.
After a pretension balance is mounted within the jamb channel of a window frame, the rod end may not be accessible from below the window sash because it is not free to drop below the bottom end of the sash. This makes it difficult for the window manufacturer to install the balance in the jamb channel and attach the end of the spiral rod to a ledge on the window sash.
There is a need, therefore, for a device to extend the end of the spiral rod so that the spiral rod can be pulled below the sash and secure a clip which is located at the end of the spiral rod onto a ledge on the sash. A conventional window industry balance installation tool can now be attached to the extension device and used to attach the spiral rod end to a ledge on the window sash.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Q:
Run a simple shell command
What is the best WinAPI function to use when you only want to run a simple shell command like hg > test.txt?
A:
To simply run a file, then ShellExecute() and CreateProcess() are the best options.
As you want to redirect output to a file/run a shell command, it complicates things...
Output redirection is a feature of the command prompt, and as such, the command you want to run needs to be passed to cmd.exe (on NT/XP+) passing /c and your command as the parameters (either ShellExecute or CreateProcess will do).
cmd /c "ipconfig >c:\debug\blah.txt"
The best way however is to use CreateProcess() and create your own pipes to talk to the stdin and stdout of the program (This is all cmd does internally)
|
{
"pile_set_name": "StackExchange"
}
|
John Parker (businessman)
Sir Thomas John Parker, (born 8 April 1942) is a British businessman. He was Chairman of Anglo American plc until 2017 and was also previously Chairman of Ombu Group and a Director of Airbus. He is currently a Director of Carnival Corporation & plc. He is also past President of the Royal Academy of Engineering, patron at the Centre for Process Innovation and a Visiting Fellow of the University of Oxford. Parker has chaired five FTSE 100 companies, including National Grid plc, from which he stood down in December 2011.
Early life
Parker was born into a farming family in County Down, Northern Ireland. He attended Belfast College of Technology (since 1991 called Belfast Metropolitan College). In 1958, at age 17, he joined Harland and Wolff as an apprentice naval architect (engineer). At Queen's University Belfast he was awarded an Honorary DSc degree in Mechanical Engineering and Naval Architecture.
Career
1958–1963 Apprenticeship at Harland & Wolff
1963–1974 Member of ship design team at Harland & Wolff
1974–1978 Managing Director of Austin & Pickersgill
1978–1983 Deputy Chief Executive of Board of the British Shipbuilders Corporation
1983–1993 Chairman and Chief Executive of Harland and Wolff
1983–1986 Non-Executive Director of Industrial Development Board of Northern Ireland
1983–1986 Non-Executive Director of British Coal Corporation
1993–2002 Non-Executive Director of The Royal Navy and Royal Marines Charity
1993–2000 Chief Executive of Babcock International Group
1994–2000 Chairman and Chief Executive of Babcock International
1997–2000 Non-Executive Director of British Gas
26 August 1999-3 February 2003 Chairman of Firth Rixson Limited
2000–2003 Non-executive Director and subsequently Deputy Chairman of P&O Princess Cruises plc
2000–2002 Chairman of Lattice Group
2000–present Director of Carnival plc
2001–2003 Non-Executive Director of Brambles Industries plc
2002–2005 Chairman of RMC Group
21 October 2002–31 December 2011 Chairman of National Grid plc
2003–present Non-Executive Director of Carnival Corporation
2005–2006 Chairman of P&O
2006–2011 Chancellor of the University of Southampton
May 2007–2015 Director and Vice-Chairman of DP World
2007–2018 Non-Executive Director of Airbus Group
July 2008 Non-executive Chairman of BVT Surface Fleet.
July 2009–2017 Chairman of Anglo American plc.
April 2011–2018 Non-executive Chairman of Ombu Group
2011–2014 President of the Royal Academy of Engineering
2011–2014 Member of the Prime Ministers Committee of Science & Technology
August 2015–present Chairman of Pennon Group.
Recognition
He was knighted for services to defence and shipbuilding in 2001. He was also the Chancellor of the University of Southampton, from 2006 to 2011, as well as being a governor of the Royal National Lifeboat Institution. Other appointments have included membership of the Prime Minister's Business Council for Britain and non-executive director at the Bank of England. He was President of the Royal Institution of Naval Architects from 1996–9. In 2012, he was made a Knight Grand Cross of the Order of the British Empire (GBE), for services to Industry and to the Voluntary Sector. He was conferred with Honorary Fellowship of the Institution of Engineers and Shipbuilders in Scotland (HonFIES) in 2012. He was elected a Fellow of the Royal Academy of Engineering (FREng) in 1983. He was elected as an Honorary Fellow of the Institution of Engineering and Technology (HonFIET) in 2014.
Personal life
Parker married Emma, a former Latin teacher and pianist in 1967; they have two children. Parker is a Member of the Royal Yacht Squadron.
References
Further reading
Autobiography: Parker, Sir John: The View from the Bridge, Endeavour Quill (2018);
External links
Board Profiles:
Anglo American Chairman Profile
Ombu Group Chairman Profile
DP World Vice Chairman Profile
EADS Director Profile
Carnival Corporation & plc Director Profile
Royal Academy of Engineering President Profile
University of Oxford Visiting Fellow Profile
Defence Academy
Articles:
Sir John Parker: how to engineer Britain's industrial revival, The Guardian, 4 June 2012
Sir John Parker: tough man from the farm, FT.com, 21 April 2011
Interview: Super chairman Sir John Parker, This is Money, March 2011
Sir John Parker: 'A man you want on your side, and not one to cross', The Independent, 10 January 2010
Sir John Parker holds the key to tackling Anglo American's weakness, The Guardian, 15 October 2009
Profile: Sir John Parker, National Grid chairman, The Telegraph, 18 February 2008
Category:1942 births
Category:Living people
Category:British businesspeople
Category:Presidents of the Royal Academy of Engineering
Category:Fellows of the Royal Academy of Engineering
Category:Presidents of the Smeatonian Society of Civil Engineers
Category:Alumni of Queen's University Belfast
Category:People from County Down
Category:Businesspeople from Northern Ireland
Category:Chancellors of the University of Southampton
Category:Naval architects
Category:Knights Bachelor
Category:Knights Grand Cross of the Order of the British Empire
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Algak Island
Algak Island is a member of the Barry Islands within the Canadian Arctic Archipelago in the Kitikmeot Region, Nunavut. It is located in Bathurst Inlet. Other islands in the vicinity include Iglorua Island, Ekalulia Island, Kanuyak Island, Shoe Island, and Rideout Island.
References
Category:Islands of Bathurst Inlet
Category:Uninhabited islands of Kitikmeot Region
Category:Islands of the Canadian Arctic Archipelago
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Case 1:16-cv-01230-P
3ln tbe Wniteb ~tates QCourt of jfeberal QCiaiuts
No. 16-01230C
(Filed: November 8, 2016)
)
KEITH RUSSELL JUDD, ) FILED
)
Plaintiff, ) NOV -8 2016
) U.S. COURT OF
v. ) FEDERAL CLAIMS
)
THE UNITED STATES, )
)
Defendant. )
~~~~~~~~~)
OPINION AND ORDER
CAMPBELL-SMITH, Chief Judge
On November 2, 2016, plaintiff Keith Russell Judd (plaintiff) filed a motion for
reconsideration (motion), ECF No. 9, of the court's October 14, 2016 Unreported
Opinion and Order, ECF No. 7, dismissing plaintiffs complaint for lack of subject matter
jurisdiction. See Rules of the United States Court of Federal Claims (RCFC) 12(b)(l), 59.
Thereby, plaintiff "move[d] this court to alter or amend the October 14, 2016, Order and
Judgment, and to enjoin the collection of the Affordable Care Act, penalty under 26
U.S.C. § 5000A(g)(l)." Motion at 1.
To prevail on a motion for reconsideration under RCFC 59, the movant must
identify a manifest error oflaw, or mistake of fact. See Shapiro v . Sec'y of Health &
Human Servs .. 105 Fed. Cl. 353, 361 (2012), affd, 503 Fed. Appx. 952 (Fed. Cir. 2013).
Specifically, the movant must show: (1) an intervening change in controlling law; (2) the
availability of previously unavailable evidence; or (3) the necessity of granting the
motion to prevent manifest injustice. Id. The court has considerable discretion in ruling
on a motion for reconsideration. See Yuba Natural Res., Inc. v . United States, 904 F.2d
1577, 1583 (Fed. Cir. 1990). But, granting such relief requires " a showing of
extraordinary circumstances." Caldwell v. United States, 391 F.3d 1226, 1235 (Fed. Cir.
2004) cert. denied, 546 U.S . 826 (2005) (citation omitted). "A court, therefore, will not
Case 1:16-cv-01230-PEC Document 11 Filed 11/08/16 Page 2 of 2
grant a motion for reconsideration if the movant merely reasserts ... arguments previously
made ... all of which were carefully considered by the court." Ammex, Inc. v. United
States, 52 Fed. Cl. 555, 557 (2002), aff'd, 384 F.3d 1368 (Fed. Cir. 2004) (internal
quotation marks omitted).
Plaintiff's motion for reconsideration is a recitation of arguments previously
asserted in his complaint and fully considered by this court in its October 14, 2016
Opinion. Plaintiff does not identify an intervening change in the controlling law, bring
forth new evidence that was previously unavailable, or argue that reconsideration is
necessary to prevent manifest injustice. Thus, he has failed to identify any error of law or
mistake of fact that would warrant reconsideration. See Shapiro, 105 Fed. Cl. at 361 . The
court addressed its lack of jurisdiction over plaintiff's complaint in its October 14, 2016
Opinion, and plaintiff's present motion provides no legally cognizable basis for
reconsideration of that decision.
Accordingly, plaintiff's motion for reconsideration is DENIED. Furthermore,
plaintiff's request to enjoin collection of the Affordable Care Act penalty is DENIED as
moot.
The Clerk of the Court is directed to not accept any further pleadings in this case.
IT IS SO ORDERED.
|
{
"pile_set_name": "FreeLaw"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.