text
stringlengths
1
3.78M
meta
dict
#include <stdio.h> #include <stdlib.h> #include <assert.h> #include "ptr_hdr.h" #define PTR_SIZE 100 #define PTR2_SIZE 10 #define PTR3_SIZE 10 #define OUT_OF_BOUNDS_EXCESS 1 int main() { struct IntStruct ptr((int*)malloc(PTR_SIZE*sizeof(int))); struct IntStruct ptr2((int*)malloc(PTR2_SIZE*sizeof(int))); struct IntStruct start_ptr(ptr); struct IntStruct start_ptr2(ptr2); struct IntStruct start_ptr3((int*)malloc(PTR_SIZE*sizeof(int))), start_ptr4(start_ptr2); #if 0 *start_ptr = 1; *start_ptr2 = 1; *ptr = 3; *ptr2 = 9; #endif return 1; }
{ "pile_set_name": "Github" }
Go Seul-ki Go Seul-Ki (; born 21 April 1986) is a South Korean footballer, who plays for Port in the Thai League 1. His previous clubs were Buriram United, El Jaish, Ulsan Hyundai, Gwangju Sangmu and Pohang Steelers. Career statistics Honours Pohang Steelers Korean League Cup (1): 2009 Ulsan Hyundai AFC Champions League (1): 2012 Korean League Cup (1): 2011 El Jaish SC Qatar Crown Prince Cup (1): 2014 Qatari Stars Cup (1): 2012-13 Buriram United Thai Premier League (2): 2015, 2017 Thai FA Cup (1): 2015 Thai League Cup (2): 2015, 2016 Kor Royal Cup (1): 2015 Mekong Club Championship (2): 2015, 2016 Port Thai FA Cup (1): 2019 References External links https://us.soccerway.com/players/sul-ki-go/26970/ Category:1986 births Category:Living people Category:Association football forwards Category:South Korean footballers Category:South Korean expatriate footballers Category:Pohang Steelers players Category:Ulsan Hyundai FC players Category:Gwangju Sangmu FC players Category:El Jaish SC players Category:Buriram United F.C. players Category:K League 1 players Category:Thai League 1 players Category:Qatar Stars League players Category:Expatriate footballers in Qatar Category:South Korean expatriate sportspeople in Qatar Category:Expatriate footballers in Thailand Category:South Korean expatriate sportspeople in Thailand
{ "pile_set_name": "Wikipedia (en)" }
Q: Qt5, set text size in lineEdit Is it possible to change text size (and font too) in Qt5 QLineEdit class? I looked in the official documentation but found no solution. //the font I want to use to display a message QFont littleFont("Courier New", 10); //my message QString strS = "hi all" // setting the message in my lineEdit object ui.lineEdit->setText(strS); A: As the others said in the comments: You can set the font to the line edit using this line: ui.lineEdit->setFont(littleFont); This member function can be found in the Documentation by clicking on > List of all members, including inherited members If you do not set all attributes of the Font be aware that the documentation states: When you assign a new font to a widget, the properties from this font are combined with the widget's default font to form the widget's final font. You can call fontInfo() to get a copy of the widget's final font. The final font is also used to initialize QPainter's font.
{ "pile_set_name": "StackExchange" }
#FIG 3.2 Produced by xfig version 3.2.5c Landscape Center Metric A4 100.00 Single -2 1200 2 6 7425 450 9000 5175 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 675 7875 675 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 900 7875 900 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 1125 7875 1125 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 1350 7875 1350 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 1575 7875 1575 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 1800 7875 1800 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 2025 7875 2025 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 2250 7875 2250 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 2475 7875 2475 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 2700 7875 2700 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 2925 7875 2925 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 3150 7875 3150 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 3375 7875 3375 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 3600 7875 3600 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 3825 7875 3825 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 4050 7875 4050 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 4275 7875 4275 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 4500 7875 4500 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 4725 7875 4725 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 4950 7875 4950 2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5 7875 450 9000 450 9000 5175 7875 5175 7875 450 4 0 0 50 -1 0 12 0.0000 4 135 105 7650 630 1\001 4 0 0 50 -1 0 12 0.0000 4 135 105 7650 855 2\001 4 0 0 50 -1 0 12 0.0000 4 135 105 7650 1080 3\001 4 0 0 50 -1 0 12 0.0000 4 135 105 7650 1305 4\001 4 0 0 50 -1 0 12 0.0000 4 135 105 7650 1530 5\001 4 0 0 50 -1 0 12 0.0000 4 135 105 7650 1755 6\001 4 0 0 50 -1 0 12 0.0000 4 135 105 7650 1980 7\001 4 0 0 50 -1 0 12 0.0000 4 135 105 7650 2205 8\001 4 0 0 50 -1 0 12 0.0000 4 135 105 7650 2430 9\001 4 0 0 50 -1 0 14 0.0000 4 165 450 7965 720 VSS\001 4 0 0 50 -1 0 14 0.0000 4 165 465 7965 2970 DB4\001 4 0 0 50 -1 0 14 0.0000 4 165 465 7965 3195 DB5\001 4 0 0 50 -1 0 14 0.0000 4 165 465 7965 3645 DB7\001 4 0 0 50 -1 0 14 0.0000 4 165 465 7965 3420 DB6\001 4 0 0 50 -1 0 14 0.0000 4 165 465 7965 2070 DB0\001 4 0 0 50 -1 0 14 0.0000 4 165 465 7965 2295 DB1\001 4 0 0 50 -1 0 14 0.0000 4 165 450 7965 2520 BB2\001 4 0 0 50 -1 0 14 0.0000 4 165 465 7965 2745 DB3\001 4 0 0 50 -1 0 14 0.0000 4 165 540 7965 945 VDD\001 4 0 0 50 -1 0 14 0.0000 4 165 360 7965 1170 VO\001 4 0 0 50 -1 0 14 0.0000 4 165 300 7965 1395 RS\001 4 0 0 50 -1 0 14 0.0000 4 165 450 7965 1620 R/W\001 4 0 0 50 -1 0 14 0.0000 4 165 150 7965 1845 E\001 4 0 0 50 -1 0 12 0.0000 4 135 210 7650 2655 10\001 4 0 0 50 -1 0 12 0.0000 4 135 210 7650 2880 11\001 4 0 0 50 -1 0 12 0.0000 4 135 210 7650 3105 12\001 4 0 0 50 -1 0 12 0.0000 4 135 210 7650 3330 13\001 4 0 0 50 -1 0 12 0.0000 4 135 210 7650 3555 14\001 4 0 0 50 -1 0 12 0.0000 4 135 210 7650 3780 15\001 4 0 0 50 -1 0 12 0.0000 4 135 210 7650 4005 16\001 4 0 0 50 -1 0 12 0.0000 4 135 210 7650 4230 17\001 4 0 0 50 -1 0 12 0.0000 4 135 210 7650 4455 18\001 4 0 0 50 -1 0 12 0.0000 4 135 210 7650 4680 19\001 4 0 0 50 -1 0 12 0.0000 4 135 210 7650 4905 20\001 4 0 0 50 -1 0 12 0.0000 4 135 270 7965 4095 NC\001 4 0 0 50 -1 0 14 0.0000 4 165 435 7965 3870 PSB\001 4 0 0 50 -1 0 14 0.0000 4 165 450 7965 4320 RST\001 4 0 0 50 -1 0 14 0.0000 4 165 690 7965 4545 VOUT\001 4 0 0 50 -1 0 14 0.0000 4 165 495 7965 4995 BLK\001 4 0 0 50 -1 0 14 0.0000 4 165 495 7965 4770 BLA\001 4 1 0 50 -1 0 18 1.5708 4 255 2835 8865 2475 ST7920 Graphic Display\001 -6 6 2655 630 2745 720 1 3 0 1 0 -1 0 0 20 0.000 1 0.0000 2700 675 20 20 2700 675 2720 675 -6 6 2205 855 2295 945 1 3 0 1 0 -1 0 0 20 0.000 1 0.0000 2250 900 20 20 2250 900 2270 900 -6 6 2925 450 4500 5175 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 675 3375 675 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 900 3375 900 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 1125 3375 1125 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 1350 3375 1350 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 1575 3375 1575 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 1800 3375 1800 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 2025 3375 2025 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 2250 3375 2250 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 2475 3375 2475 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 2700 3375 2700 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 2925 3375 2925 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 3150 3375 3150 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 3375 3375 3375 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 3600 3375 3600 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 3825 3375 3825 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 4050 3375 4050 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 4275 3375 4275 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 4500 3375 4500 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 4725 3375 4725 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 4950 3375 4950 2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5 3375 450 4500 450 4500 5175 3375 5175 3375 450 4 0 0 50 -1 0 12 0.0000 4 135 105 3150 630 1\001 4 0 0 50 -1 0 12 0.0000 4 135 105 3150 855 2\001 4 0 0 50 -1 0 12 0.0000 4 135 105 3150 1080 3\001 4 0 0 50 -1 0 12 0.0000 4 135 105 3150 1305 4\001 4 0 0 50 -1 0 12 0.0000 4 135 105 3150 1530 5\001 4 0 0 50 -1 0 12 0.0000 4 135 105 3150 1755 6\001 4 0 0 50 -1 0 12 0.0000 4 135 105 3150 1980 7\001 4 0 0 50 -1 0 12 0.0000 4 135 105 3150 2205 8\001 4 0 0 50 -1 0 12 0.0000 4 135 105 3150 2430 9\001 4 0 0 50 -1 0 14 0.0000 4 165 450 3465 720 VSS\001 4 0 0 50 -1 0 14 0.0000 4 165 465 3465 2970 DB4\001 4 0 0 50 -1 0 14 0.0000 4 165 465 3465 3195 DB5\001 4 0 0 50 -1 0 14 0.0000 4 165 465 3465 3645 DB7\001 4 0 0 50 -1 0 14 0.0000 4 165 465 3465 3420 DB6\001 4 0 0 50 -1 0 14 0.0000 4 165 465 3465 2070 DB0\001 4 0 0 50 -1 0 14 0.0000 4 165 465 3465 2295 DB1\001 4 0 0 50 -1 0 14 0.0000 4 165 450 3465 2520 BB2\001 4 0 0 50 -1 0 14 0.0000 4 165 465 3465 2745 DB3\001 4 0 0 50 -1 0 14 0.0000 4 165 540 3465 945 VDD\001 4 0 0 50 -1 0 14 0.0000 4 165 360 3465 1170 VO\001 4 0 0 50 -1 0 14 0.0000 4 165 300 3465 1395 RS\001 4 0 0 50 -1 0 14 0.0000 4 165 450 3465 1620 R/W\001 4 0 0 50 -1 0 14 0.0000 4 165 150 3465 1845 E\001 4 0 0 50 -1 0 12 0.0000 4 135 210 3150 2655 10\001 4 0 0 50 -1 0 12 0.0000 4 135 210 3150 2880 11\001 4 0 0 50 -1 0 12 0.0000 4 135 210 3150 3105 12\001 4 0 0 50 -1 0 12 0.0000 4 135 210 3150 3330 13\001 4 0 0 50 -1 0 12 0.0000 4 135 210 3150 3555 14\001 4 0 0 50 -1 0 12 0.0000 4 135 210 3150 3780 15\001 4 0 0 50 -1 0 12 0.0000 4 135 210 3150 4005 16\001 4 0 0 50 -1 0 12 0.0000 4 135 210 3150 4230 17\001 4 0 0 50 -1 0 12 0.0000 4 135 210 3150 4455 18\001 4 0 0 50 -1 0 12 0.0000 4 135 210 3150 4680 19\001 4 0 0 50 -1 0 12 0.0000 4 135 210 3150 4905 20\001 4 0 0 50 -1 0 12 0.0000 4 135 270 3465 4095 NC\001 4 0 0 50 -1 0 14 0.0000 4 165 435 3465 3870 PSB\001 4 0 0 50 -1 0 14 0.0000 4 165 450 3465 4320 RST\001 4 0 0 50 -1 0 14 0.0000 4 165 690 3465 4545 VOUT\001 4 0 0 50 -1 0 14 0.0000 4 165 495 3465 4995 BLK\001 4 0 0 50 -1 0 14 0.0000 4 165 495 3465 4770 BLA\001 4 1 0 50 -1 0 18 1.5708 4 255 2835 4365 2475 ST7920 Graphic Display\001 -6 6 1080 4680 1530 4770 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 1440 4725 1530 4725 2 2 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 5 1170 4770 1170 4680 1440 4680 1440 4770 1170 4770 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 1080 4725 1170 4725 -6 6 1575 630 1890 720 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 1575 630 1620 675 1575 720 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 1620 675 1890 675 -6 6 1575 855 1890 945 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 1575 855 1620 900 1575 945 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 1620 900 1890 900 -6 6 1575 1080 1890 1170 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 1575 1080 1620 1125 1575 1170 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 1620 1125 1890 1125 -6 6 1575 1530 1890 1620 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 1575 1530 1620 1575 1575 1620 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 1620 1575 1890 1575 -6 6 1575 1755 1890 1845 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 1575 1755 1620 1800 1575 1845 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 1620 1800 1890 1800 -6 6 1575 4680 1890 4770 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 1575 4680 1620 4725 1575 4770 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 1620 4725 1890 4725 -6 6 1170 5175 1440 5490 2 1 0 3 0 -1 0 0 -1 0.000 0 1 -1 0 0 2 1215 5445 1395 5445 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 1305 5175 1305 5445 -6 6 1575 4905 1890 4995 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 1575 4905 1620 4950 1575 4995 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 1620 4950 1890 4950 -6 6 2205 1305 2295 1395 1 3 0 1 0 -1 0 0 20 0.000 1 0.0000 2250 1350 20 20 2250 1350 2270 1350 -6 6 6075 1080 6390 1170 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 6075 1080 6120 1125 6075 1170 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 6120 1125 6390 1125 -6 6 6075 855 6390 945 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 6075 855 6120 900 6075 945 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 6120 900 6390 900 -6 6 6075 630 6390 720 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 6075 630 6120 675 6075 720 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 6120 675 6390 675 -6 6 6075 4680 6390 4770 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 6075 4680 6120 4725 6075 4770 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 6120 4725 6390 4725 -6 6 6075 4905 6390 4995 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 6075 4905 6120 4950 6075 4995 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 6120 4950 6390 4950 -6 6 6705 855 6795 945 1 3 0 1 0 -1 0 0 20 0.000 1 0.0000 6750 900 20 20 6750 900 6770 900 -6 6 6705 3780 6795 3870 1 3 0 1 0 -1 0 0 20 0.000 1 0.0000 6750 3825 20 20 6750 3825 6770 3825 -6 6 6075 2880 6390 2970 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 6075 2880 6120 2925 6075 2970 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 6120 2925 6390 2925 -6 6 6075 3105 6390 3195 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 6075 3105 6120 3150 6075 3195 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 6120 3150 6390 3150 -6 6 6075 3330 6390 3420 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 6075 3330 6120 3375 6075 3420 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 6120 3375 6390 3375 -6 6 6075 3555 6390 3645 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 6075 3555 6120 3600 6075 3645 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 6120 3600 6390 3600 -6 6 6075 1305 6390 1395 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 6075 1305 6120 1350 6075 1395 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 6120 1350 6390 1350 -6 6 6075 1755 6390 1845 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 6075 1755 6120 1800 6075 1845 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 6120 1800 6390 1800 -6 6 6075 1530 6390 1620 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 3 6075 1530 6120 1575 6075 1620 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 6120 1575 6390 1575 -6 6 5580 4680 6030 4770 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 5940 4725 6030 4725 2 2 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 5 5670 4770 5670 4680 5940 4680 5940 4770 5670 4770 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 5580 4725 5670 4725 -6 6 5715 5175 5985 5490 2 1 0 3 0 -1 0 0 -1 0.000 0 1 -1 0 0 2 5760 5445 5940 5445 2 1 0 1 0 -1 0 0 -1 0.000 0 0 -1 0 0 2 5850 5175 5850 5445 -6 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 1800 1890 1800 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 1575 1890 1575 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 4 2925 1350 2250 1350 2250 900 2925 900 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 3825 2700 3825 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 1890 675 2700 675 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 675 2700 675 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2700 675 2700 3825 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2250 900 1890 900 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 4725 1890 4725 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 1125 1890 1125 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 3 1305 5175 1305 4950 1530 4950 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 2925 4950 1890 4950 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 3 2250 1350 2250 4275 2925 4275 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 1125 6390 1125 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 900 6390 900 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 675 6390 675 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 4950 6390 4950 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 4725 6390 4725 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 6750 3825 7425 3825 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 3 6750 900 6750 4275 7425 4275 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 1350 6390 1350 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 1800 6390 1800 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 2925 6390 2925 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 3150 6390 3150 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 3375 6390 3375 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 3600 6390 3600 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2 7425 1575 6390 1575 2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 3 5850 5175 5850 4950 6075 4950 2 1 1 1 0 7 50 -1 -1 4.000 0 0 -1 0 0 2 4815 315 4815 6075 4 2 0 50 -1 0 14 0.0000 4 165 435 1530 1665 PD2\001 4 2 0 50 -1 0 14 0.0000 4 165 435 1530 1950 PD5\001 4 2 0 50 -1 0 14 0.0000 4 165 540 1530 765 GND\001 4 2 0 50 -1 0 14 0.0000 4 165 510 1530 990 VCC\001 4 2 0 50 -1 0 14 0.0000 4 165 510 990 4815 VCC\001 4 2 0 50 -1 0 12 0.0000 4 135 375 1530 1215 VEE\001 4 2 0 50 -1 0 12 0.0000 4 135 375 6030 1215 VEE\001 4 2 0 50 -1 0 14 0.0000 4 165 540 6030 765 GND\001 4 2 0 50 -1 0 14 0.0000 4 165 510 5985 990 VCC\001 4 2 0 50 -1 0 14 0.0000 4 165 435 6030 3015 PD0\001 4 2 0 50 -1 0 14 0.0000 4 165 435 6030 3465 PD2\001 4 2 0 50 -1 0 14 0.0000 4 165 435 6030 3690 PD3\001 4 2 0 50 -1 0 14 0.0000 4 165 435 6030 3240 PD1\001 4 2 0 50 -1 0 14 0.0000 4 165 540 6030 1665 GND\001 4 2 0 50 -1 0 14 0.0000 4 165 435 6030 1440 PD4\001 4 2 0 50 -1 0 14 0.0000 4 165 435 6030 1890 PD5\001 4 2 0 50 -1 0 14 0.0000 4 165 510 5535 4815 VCC\001 4 1 0 50 -1 0 14 0.0000 4 165 1095 2205 6120 serial mode\001 4 1 0 50 -1 0 14 0.0000 4 210 1785 7335 6030 4-bit parallel mode\001
{ "pile_set_name": "Github" }
% Test file for @chebtech/sample.m function pass = test_sample(pref) % Get preferences. if ( nargin < 1 ) pref = chebtech.techPref(); end for n = 1:2 if ( n == 1 ) testclass = chebtech1(); else testclass = chebtech2(); end f = testclass.make(@(x) sin(x - 0.1)); % Test on a grid equal to length(f). [v, p] = sample(f); p_ex = testclass.chebpts(length(f)); v_ex = feval(f, p_ex); pass(n, 1) = (norm(p - p_ex) < 100*eps) && (norm(v - v_ex) < 100*eps); % Test on a grid shorter than length(f). m = round(length(f)/2); [v, p] = sample(f, m); p_ex = testclass.chebpts(m); v_ex = feval(f, p_ex); pass(n, 2) = (norm(p - p_ex) < 100*eps) && (norm(v - v_ex) < 100*eps); % Test on a grid longer than length(f). m = round(2*length(f)); [v, p] = sample(f, m); p_ex = testclass.chebpts(m); v_ex = feval(f, p_ex); pass(n, 3) = (norm(p - p_ex) < 100*eps) && (norm(v - v_ex) < 100*eps); end end
{ "pile_set_name": "Github" }
Priory Church of St Mary, Chepstow The Parish and Priory Church of St. Mary is located in Chepstow, Monmouthshire, south east Wales. Parts of the building, including its ornate west doorway, date from the late 11th century and are contemporary with the nearby Norman castle. The church is a Grade I listed building as of 6 December 1950. Foundation and history of the priory It was founded around 1072 as a Benedictine priory by William FitzOsbern and his son Roger de Breteuil, 2nd Earl of Hereford. FitzOsbern had been granted the Lordship of Striguil by his second cousin King William in gratitude for his support in the Norman conquest of England, and was responsible for starting the building of a new castle overlooking the River Wye on the border with the kingdoms of Wales. At the same time he established a nearby monastic cell, so as to collect rent from the lands within Gwent which he had granted to his home Priory of Cormeilles in Normandy. By the early 12th century, the monastic establishment, on a ridge overlooking the river about 300 metres from the castle, had the status of an alien priory in its own right, though it probably never held more than about 12 monks. It superseded an earlier Augustinian priory located about 2 km away, which was dedicated to the Welsh saint Cynfarch (or St. Kingsmark), a disciple of St. Dyfrig. As Chepstow developed as a market town and port around the castle and priory during the mediaeval period, the nave became used as the parish church. Accommodation was built on the south side of the church, in the 13th century, and the first vicar appointed by authority of the king, John de Hemmyngburg, is recorded in 1348. The priory had extensive grounds, probably including most of the land south of the church enclosed by Chepstow's 13th-century town wall or Port Wall. During the Hundred Years' War between England and France in the 14th century, the priory became detached from its association with Cormeilles, and instead became attached at different times both to Llantarnam Abbey near Caerleon and, from 1414, to Bermondsey Abbey in Southwark. The priory was eventually suppressed during the Dissolution of the Monasteries in 1536 during the English Reformation, at which time there were still three monks in residence. Most of the priory buildings, including the choir part of the church, the cloister, chapter house, lodgings and kitchens, were demolished at that time, and the foundations are buried beneath a car park beside the current church. Remains of a large barn and well were also found during excavations in the 1970s. The present building Part of the Norman church remains, but it has been greatly modified over later centuries. The original Priory Church was built in local yellow Triassic sandstone, with a long vaulted nave, massive piers, and a notably ornamented west entrance doorway with zigzag and lozenge patterns, dating from the early 12th century. These parts remain. However, later extensions and modifications have used other varieties of stone in other architectural styles, with the result that the whole church has been described as "an extraordinarily disjointed building." The main central tower of the original church collapsed in a storm in 1701, destroying the transepts. A new wall was then built at the eastern end of the nave, and its western end built up to form a new tower, designed "in an amusingly rustic classical idiom". This was completed in 1706 under the ministry of Thomas Chest, who was vicar from 1701 to 1740. In 1841, through the influence of Edward Copleston, Bishop of Llandaff, who lived locally, the aisles were removed, and the eastern end, crossing and transepts were rebuilt. Further work partly to restore the Norman character of the nave was begun in 1890, but was abandoned unfinished in 1913. The church contains two fonts, one of Norman origin and the other from the 15th century. There are several notable tombs and memorials, including that of Henry Somerset, 2nd Earl of Worcester, and the Jacobean tomb of local benefactor Margaret Cleyton with her two husbands and 12 children. It also contains the tomb of Henry Marten, signatory to King Charles I's death warrant, who was imprisoned in Chepstow Castle until his death in 1680. His memorial includes an acrostic epitaph. The organ, one of the few in the country with pipework dating from the early 17th century, was originally made for Gloucester Cathedral (possibly by the Dallam family). It was moved to Bristol Cathedral in 1663 and then to Chepstow possibly as early as 1685, and certainly by the 18th century. It was rebuilt and expanded in 1906, and has undergone a variety of maintenance and repair work since. Eight of the ten bells in the tower date from 1735 and were made in Chepstow by William Evans; the two lightest bells were added in 1959 and were cast by John Taylor & Co.. The original clock mechanism was also made locally in the 18th century, and kept time until replaced by an electric clock in 1965. Notable clergy John Davies, Bishop of Swansea and Brecon, served his curacy here References External links Churches together in Chepstow, includes contact details for St Mary's Chepstow Town Council site – St. Mary's Church Artworks at St Mary's Church, Chepstow Chepstow Chepstow Chepstow, Saint Mary Chepstow, Saint Mary Category:Chepstow
{ "pile_set_name": "Wikipedia (en)" }
If your adolescent is sexting, they may be already sexually active and engaging in risky behavior, a new study suggests. Researchers are trying to better understand if young people are at greater risk for HIV or other sexually transmitted diseases because they are sending sexually explicit photos or text messages via cell phones. "Sexting" is not an alternative to "real world" sexual behavior among adolescents, according to a new study published Monday in the journal Pediatrics. "The same teens who are engaging in digital sex risk taking through sexting are also the same teens that are engaging in sex risk with their bodies in terms of being sexually active and not using condoms," said lead study author Eric Rice, an assistant professor at the University of Southern California's School of Social Work in Los Angeles. A 2009 report from the Pew Research Center found that some teens "view sexting as a safer alternative to real life sexual activity." While the term "sexting" may also include messages also sent over the Internet, this particular study looked solely at cell phone text messages and images. It was conducted via questionnaire in the Los Angeles Unified School District. Researchers surveyed 1,839 students ages 12 to 18 at random. Most were Latino or African-American. Three-quarters of those surveyed had cell phones. "Even though a minority of teens sext - we only found 15% - but that 15% are much riskier with their physical sexual behaviors as well as their digital sexual behaviors," says Rice. He add that teens who reported sexting were seven times more likely to be sexually active than their peers who did not sext. The data suggests there are norms about sexting, according to Rice, meaning teens are starting to think that sexting is a normal part of their behaviors. More than half of the teens surveyed reported that they had a friend who sexted. "A lot of young people think that their friends are sexting, and if you think that your friends are sexting, you're much more likely to sext yourself," he said - 17 times more likely, according to study. "I think that the implications are that teens who are sexting may be at greater risk for sexually transmitted diseases because the teens who sext are about 1.5 times more likely to not use condoms when they're having sex," in addition to increasing the risk of teen pregnancy, Rice says. This study was conducted in only one urban area; the authors realize that some of the results may not accurately represent rural areas. In addition, recent nationwide research found much lower rates of sexting. However, Rice said this information can be valuable for parents. "We [parents, clinicians, educators] should be talking about sexting and the fact that it's part of the risky sex behaviors and it's not just something that exists in a virtual space, so to speak," he said. "Talking about sexting might be easier for [parents] than talking about sex and it could lead into a larger conversation about sex."
{ "pile_set_name": "OpenWebText2" }
Integrating local environmental management and federal/state interests through governance: the case of the Garden Island Environmental Advisory Committee. The apparently unresolvable differences between managing national defense and local conservation, public recreation, and scientific research can be overcome through an advisory committee, with a strong and dedicated entity to drive the processes of governance and change. The case of the Garden Island Environmental Advisory Committee shows how the organizational and political difficulties of integrating state interests and federal concerns were met. Garden Island, off the coast of Perth, the capital of the State of Western Australia, is a base for the Royal Australian Navy which is administered by the federal Department of Defence. Examples are given of the committee's approach to integrated environmental management and the implementation of the Navy's environmental policy.
{ "pile_set_name": "PubMed Abstracts" }
One of the many conveniences of electronic commerce, in particular on-line shopping, is immediate confirmation that a desired item is, or is not, immediately available from stock. To provide this information, an on-line merchant uses data processing equipment to keep inventory records. Each time a unit of a particular item is sold, the number of that item remaining in inventory is reduced in the inventory record. When an on-line shopper requests or orders an item from the on-line merchant, for example by including the item in an electronic shopping cart, the merchant's data processing system checks the inventory record concerning that item. If the inventory record shows that the item is not in stock, the on-line shopper is informed, and the order is rejected, or accepted with the stipulation that shipping of the item will be delayed; if the inventory record shows that the item is in stock, the order is accepted unconditionally. On occasion, an on-line merchant may accept an order that cannot be filled because the stock of the item is depleted, despite an incorrect inventory record showing otherwise. When this happens, the on-line shopper may be dissatisfied by the shopping experience. So, not only is the merchant unable to profit from selling the particular item ordered by the on-line shopper, the merchant also risks offending a customer. Consequently, it is important that an item in fact be in stock when the merchant accepts an on-line order. Tracking stock and providing accurate reports of item availability become significantly more difficult when a merchant provides both on-line and traditional in-person shopping. Enterprises of this kind have recently become known as “click and mortar,” where “click” suggests on-line shopping where a shopper uses a computer mouse to put an item into an electronic shopping cart, and “mortar” suggests traditional in-person shopping where a shopper puts an item into a physical shopping cart or otherwise takes physical charge of the item before checkout. A problem arises when an in-person shopper engages in a prolonged shopping session. The in-person shopper may remove an item from stock, put the item in his or her shopping cart, and then continue shopping for quite some time. When the in-person shopper finally checks out, the inventory record concerning the selected item is brought up to date. In the meantime, however, the inventory record is incorrect, and may sometimes show that an item is available when in fact the last unit of the item has been taken from stock and put into a physical shopping cart by an in-person shopper. For the duration of the in-person shopping session, which in practice may easily reach thirty minutes, an on-line shopper may place an order for the same item held by an in-person shopper, and be assured by the merchant that the item is available from stock. Only too late the merchant finds that the item ordered by the on-line shopper is in fact not available, and must inform the on-line shopper that the order cannot be filled after all. When this happens, the on-line shopper may become dissatisfied with the merchant and with on-line shopping in general. Consequently, there is a need for a way of determining whether an item offered for sale to both on-line and in-person shoppers is in stock, rather than in the physical shopping cart of an in-person shopper, when a merchant accepts an on-line order for that item, so that a merchant may correctly advise the on-line shopper regarding the availability of the item from stock.
{ "pile_set_name": "USPTO Backgrounds" }
St Alban's Church, Sneinton St Albans's Church, Sneinton, properly called Our Lady of Perpetual Succour and St Alban, is a Ukrainian Greek Catholic Church in Bond Street, Sneinton, Nottingham, England. It was built in 1888–87 as the Church of England parish church of Saint Alban. In 2003 the Diocese of Southwell and Nottingham declared it redundant and sold it to the Ukrainian Catholic Eparchy of the Holy Family of London, who added the dedication of Our Lady of Perpetual Succour. History The Church of England parish was formed from the parishes of St. Stephen's Church, Sneinton, and St. Matthias' Church, Nottingham. The church was designed by George Frederick Bodley and built at a cost of £10,447 (equivalent to £ in ),. It is built in brick and stone with a wagon roof, and has a chancel, nave, aisles, south porch, north west turret with 1 bell. There were seats for 565 people. The foundation stone was laid on Tuesday 9 March 1886 by Rev Canon Vernon Wollaston Hutton. The church was consecrated on Saturday 23 July 1887 by Bishop George Ridding, A Lady chapel was added in 1898. The south aisle was lengthened and vestries were added in 1912 at a cost of £1,811. The chancel has an east window commemorating Canon Vernon Wollaston Hutton, who was vicar of St Stephen's parish church, Sneinton 1868–84. The east window cost £200. The screen was the gift of the sons of Thomas and Alice Tew. The Lady Chapel has a reredos that provided by Mrs Bowman-Hart, and an altar in St Michael's chapel is to commemorate Charles Matthews and his son. There is a richly decorated baptismal font. The three windows in the side chapel were installed in 1913, 1915 and 1916. Incumbents F Boag, circa 1894–97 Francis Charles Finch, 1898–1900 Kenneth Martin, 1920–31 Cyril Ernest Hardy 1931–51 References Sources External links See St. Alban's Church on Google Street View Category:19th-century Church of England church buildings Category:Church of England church buildings in Nottinghamshire Category:Churches completed in 1887 Category:Churches in Nottingham Category:Former Church of England church buildings Category:Church buildings converted to a different denomination Category:Gothic Revival church buildings in England Category:Grade II listed churches in Nottinghamshire Category:Ukrainian diaspora in the United Kingdom Category:Ukrainian Catholic churches in the United Kingdom Category:George Frederick Bodley church buildings
{ "pile_set_name": "Wikipedia (en)" }
package gw.util.science uses gw.util.Rational uses java.math.RoundingMode uses java.math.MathContext final class Volume extends AbstractMeasure<VolumeUnit, Volume> { construct( value : Rational, unit: VolumeUnit, displayUnit: VolumeUnit ) { super( value, unit, displayUnit, VolumeUnit.BASE ) } construct( value : Rational, unit: VolumeUnit ) { this( value, unit, unit ) } function divide( t: Length ) : Area { return new Area( toBaseNumber() / t.toBaseNumber(), AreaUnit.BASE, AreaUnit.get( t.Unit ) ) } function divide( area: Area ) : Length { return new Length( toBaseNumber() / area.toBaseNumber(), LengthUnit.BASE, area.Unit.WidthUnit ) } function multiply( density: Density ) : Mass { return new Mass( toBaseNumber() * density.toBaseNumber(), MassUnit.BASE, density.Unit.MassUnit ) } }
{ "pile_set_name": "Github" }
Q: Query for distinct instance of model + one other field I have a model called Evaluation. When an evaluation is created, an eval_number is created with it. There are many evaluations with the same eval_number. Here's an example: - !ruby/object:Evaluation attributes: id: 2023 score: 3 created_at: 2013-09-08 13:10:53.000000000 Z updated_at: 2013-09-08 13:10:53.000000000 Z student_id: 26 goal_id: 50 eval_number: 33 - !ruby/object:Evaluation attributes: id: 2099 score: 4 created_at: 2013-09-08 13:19:12.000000000 Z updated_at: 2013-09-08 13:19:12.000000000 Z student_id: 26 goal_id: 36 eval_number: 34 - !ruby/object:Evaluation attributes: id: 2100 score: 3 created_at: 2013-09-08 13:19:12.000000000 Z updated_at: 2013-09-08 13:19:12.000000000 Z student_id: 26 goal_id: 37 eval_number: 34 - !ruby/object:Evaluation attributes: id: 2101 score: 4 created_at: 2013-09-08 13:19:12.000000000 Z updated_at: 2013-09-08 13:19:12.000000000 Z student_id: 26 goal_id: 38 eval_number: 34 In a view, I want to show the date that a given evaluation was created in a table header. It should look like this: date_1 | date_2 | date_3 | date_4 | etc.. To do this, I need to get distinct evaluation_numbers + the created_at dates that go with them. I thought that this would help, but it's returning more than one record per eval_number with this code: def eval_date(i) evals = self.goals.first.evaluations eval = evals.select("distinct(eval_number), created_at").all[i] eval.created_at.to_date end It seems like distinct eval_numbers are being selected, but also distinct created_at columns (which of course are all different). This makes the .all[i] basically useless as it's finding the [0], [1], [2], etc element correctly - but there are far more than whatever the given number of i is in the returned array. I want to find a distinct eval_number and load only the created_date that goes with it. I think I could load the whole record with all attributes, but I don't need them, so I'd rather not. A: Try this: def eval_date(i) evals = self.goals.first.evaluations eval = evals.order("eval_number").group(:eval_number).all[i] eval.created_at.to_date end PS: if you are calling eval_date repeatedly then cache the evaluations like so def eval_date(i) @evals ||= self.goals.first.evaluations.order("eval_number").group("eval_number").all eval = @evals[i] eval.created_at.to_date end
{ "pile_set_name": "StackExchange" }
Hero lyrics Collins demo version released as b-side of 'we wait and we wonder' single,1994) Well it was one of those great storiesThat you can't put down at nightThe hero knew what he had to doAnd he wasn't afraid to fightThe villain goes to jail, while the hero goes freeI wish it were that simple for me. And the reason that she loved himWas the reason I loved him tooAnd he never wondered what was right or wrongHe just knew - he just knew. Shadows and shape mixed together at dawnBut by time you catch them simplicity's goneAnd so we sort through the piecesMy friends and iSearching through the darkness to findThe breaks in the sky. And the reason that she loved himWas the reason I loved him tooAnd he never wondered what was right or wrongHe just knew - he just knew. And we wonder, yes we wonderHow do you make sense of thisWhen the hero kills the maidenWith his kiss - with his kiss. Well it was one of those great storiesThat you can't put down at nightThe hero knew what he had to doAnd he wasn't afraid to fightThe villain goes to jail, while the hero goes freeI wish it were that simple for me- if it were that simple for me.
{ "pile_set_name": "Pile-CC" }
A 5-ms Error, 22-μA Photoplethysmography Sensor using Current Integration Circuit and Correlated Double Sampling. This paper presents a low-power Photoplethysmography (PPG) sensing method. The PPG is commonly used in recent wearable devices to detect cardiovascular information including heartbeat. The heartbeat is useful for physical activity and stress monitoring. However, the PPG circuit consumes large power because it consists of LED and photodiode. To reduce its power consumption without accuracy degradation, a cooperative design of circuits and algorithms is proposed in this work. A straightforward way to reduce the power is intermittent driving of LED, but there is a disadvantage that the signal is contaminated by a noise while circuit switching. To overcome this problem, we introduce correlated double sampling (CDS) method, which samples an integration circuit output twice with short intervals after the LED turns on and uses the difference of these voltage. Furthermore, an up-conversion method using linear interpolation, and an error correction using autocorrelation are introduced. The proposed PPG sensor, which consists of the LED, the photodiode, the current integration circuit, a CMOS switch, an A/D converter, and an MCU, is prototyped. It is evaluated by actual measurement with 22-year-old subject. The measurement results show that 22-μA total current consumption is achieved with 5-ms mean absolute error.
{ "pile_set_name": "PubMed Abstracts" }
Immune system has evolved to prevent autoimmune disease 09/12/05 Study suggests chronic infections may create autoimmune response HOUSTON, Sept. 12, 2005 -- New research finds the human immune system has foregone evolutionary changes that would allow it to produce better antibodies in less time because the improved antibodies would be far more likely to attack the body's own tissues. The Rice University study finds the immune system has evolved a near-perfect balance for producing antibodies that are both effective against pathogens and unlikely to cause autoimmune disease. The findings will be published in the journal Physical Review Letters. They are based on a new model of the immune system that is the first to simulate the hierarchical nature of the body's immune response. The model predicts that chronic infections may lead to autoimmune diseases, a scenario that has been proposed as a cause of some rheumatic diseases like arthritis. "There are as many as a 100 million unique antibodies circulating through our bodies at any given time, but just three or four of these might be effective against any particular disease," said Michael Deem, the John W. Cox Professor in Biochemical and Genetic Engineering and professor of physics and astronomy. "When we get sick, the immune system identifies the particular antibodies that are effective, as it rapidly creates and mass produces mutant white blood cells called B cells that make only these antibodies." Deem said prior research has identified a number of alternate strategies the immune system could use to reduce the time needed to create an effective B cell. In addition, these methods also could produce antibodies that are more apt to bind with disease cells. The upshot would be an immune system that responds faster and more effectively against disease. "This should help us get well faster, so the question becomes, 'Why didn't we evolve that kind of adaptive response?'" Deem said. Deem's analysis falls within a branch of physics called statistical mechanics, which uses a system's physical behavior at the molecular or atomic scale to build up a picture of the behavior at a larger level. In this case, Deem and postdoctoral researchers Jun Sun and David J. Earl studied the physical properties of fragments of DNA to determine the origins, behavior, and generation of antibodies. Generating antibodies is one of the primary functions of the immune system. Antibodies are protein molecules that are made by B cells. Each antibody has a chemical signature that allows it to bind only with a particular sequence of amino acids. "In our study, we first sought to understand the evolutionary rules that govern the way the immune system responds to an infection," Deem said. "With that framework in place, we identified a biologically-plausible strategy that would allow the immune system to react more quickly and with more effective antibodies. Our analysis revealed that such a system would be about 1,000 times more likely to produce antibodies that attack healthy tissues." Antibodies that bind with something other than the antigen they evolved to attack are called cross-reactive, and some researchers believe cross-reactivity causes some autoimmune diseases. For example, some scientists have found a correlation between chronic infection and an increased probability of autoimmune disease, but the strength and significance of the correlation is controversial. Rice's model suggests that a correlation does exist, but that the length of the infection prior to onset of autoimmune disease is highly variable. "People have been looking for a clear, significant correlation in time, but a long distribution of onset times would lead to weaker statistical correlations, particularly in those cases where the infection persisted the longest," said Deem. "Searching for this distribution in health and medical statistics could shed light on this immunological puzzle and settle the scientific controversy." The Rice analysis finds the human immune system evolved to minimize the risk of cross-reactivity. For example, each cell in our bodies contains about 100,000 proteins with an average of 500 amino acids apiece. Consequently, there are about one trillion potential docking sites, or epitopes, where antibodies could mistakenly attach themselves to proteins in a healthy cell. The mutation response method employed by our adaptive immune system seems keyed to this number, producing antibodies that are statistically likely to mistakenly bond with healthy proteins slightly less than one in a trillion times, meaning that on average, they recognize only invading pathogens. Source: Eurekalert & others Last reviewed: By John M. Grohol, Psy.D. on 21 Feb 2009 Published on PsychCentral.com. All rights reserved.
{ "pile_set_name": "Pile-CC" }
Repair fix asf wmv wma files can not be played or dragged. Repair fix asf wmv wma files uncompletely downloaded. Repair fix partly damaged or corrupted asf wmv wma files. Being fixed, these asf wmv wma files can be played fluently and dragged at your will. The fixed asf wmv wma files can skip the damaged data block, and continue to play and can be opened by multimedia edit software such as VirtualDub. The rate of success reached 80% to 90%.
{ "pile_set_name": "Pile-CC" }
This invention relates to a dental post, and more particularly to a helically fluted post which can be securely inserted within a tooth stub to extend upwardly therefrom for retention of a dental restoration placed on top of the tooth stub. One dental procedure for restoring broken teeth involves the utilization of a dental post to function as the retainer for a dental prosthetic structure which is built onto the broken tooth. The damaged or broken tooth is generally required to be cut down to provide a proper tooth stub. A bore is formed into the stub in which is inserted a holding device, such as a dental post. The dental post is retained in the bore by means of suitable dental cement well known in the dental art. A portion of the dental post extends upwardly above the surface of the tooth stub. The dental prosthetic structure, such as a false tooth, crown, or the like, is then formed or mounted onto the tooth stub, being retained thereon by means of the post. Numerous dental posts have been suggested in the prior art. On some posts, there is provided an external thread to provide additional surface area in which the cement is received so as to improve the retention of the post within the tooth stub. A vent is also provided on the post to permit escape of the air during insertion of the post into the cement prepared bore of the tooth stub. While prior art dental posts have generally been quite useful, they frequently are pushed out during the initial insertion into the bore as a result of the hydrostatic pressure caused by the cement. The posts, therefore may not be fully seated in the bore. Additionally, though the threads formed on the prior art posts aid in the retention, at the same, the threads reduce the diameter which increases the risk of fracture, both during insertion and actual utilization of the post.
{ "pile_set_name": "USPTO Backgrounds" }
@dewyulsc Many years from now, when Teddy Bridgewater is a Super Bowl Champion and NFL MVP the narrative will change and the naysayers will beg for revisionist history. Teddy Two Gloves will be a national icon and inspiration, and children everywhere will beg their parents for skinny knees and small hands. In a time where the NFL needs a new class of role model and our society begs for a symbol of unification, the NFL and national media should be, and should have been, all aboard the Bridgewater bandwagon. I am not claiming Teddy is already on the level of Brady, Manning, or Rodgers, but an argument could be made that those first ballot hall of fame quarterbacks would struggle mightily to get this Vikings team into the playoffs. The special teams are borderline incompetent and have cost Minnesota back to back victories. The offensive line has been one of the worst in the league, giving up 48 sacks and allowing the quarterback to be hit 92 times. The best running back in the league hasn't played a down all season, and their number two running back is on injured reserve. The receiving core is average at best, and it appears the goal will be upgrading that department during the offseason. The deck has been stacked against Teddy all season, and against all odds Bridgewater has continued his very impressive improvement. Teddy has now completed at least 70% of his passes in four straight games, the first rookie to ever do so, and a stat unmatched by Rivers, Romo, Rodgers, Brees, Wilson, Brady, Roethlisberger, Luck, and Manning. His outing against the Dolphins was perhaps his best of the year, and the one interception was 100% due to his running back not handling a ball that hit him between the numbers. The touch on his over the shoulder fades was miraculous and he even delivered a few flawless bullets over the middle. Teddy also showed great poise by leading his team on a 15-0 run to retake the lead late in the fourth quarter. Bridgewater continues to showcase why he was undoubtedly the best quarterback in his draft class, and will be a franchise play caller throughout the next decade. A few of the national pundits are beginning to take notice, but many of them are still too busy trying remove both of their feet from their mouths while simultaneously getting their heads out of their asses. The Teddy smear campaign that was force fed down our throats for months was a travesty, but a perfect example of why Teddy is the new face of Vikings and should be the future face of the NFL. While the Manziel apologists scramble to make every excuse for their media hero, Teddy goes about his business while carrying a franchise. Teddy doesn't draw attention to himself, he doesn't ask for apologies, he simply smiles and exudes a level of humility unseen in professional sports. Teddy is a great player and even greater role model. He takes care of his family, he worships his mom, he sticks up for his teammates and shoulders responsibility, Teddy doesn't showboat or showoff, he doesn't blame anyone but himself for his mistakes, and best of all, Teddy is just a good person. In period where the NFL is struggling to redefine its image, they seem to think that creating awkward "No More" commercials will make viewers and sponsors feel better about Adrian Peterson, Ray Rice, and Roger Goodell. Their answer is a purple clad kid from Miami that deserves all the attention while asking for none. Teddy is the answer for the NFL, and will be for years to come, but our country as a whole could benefit from his leadership as well. Race division seems to be widening and a culture of hate and blame is threatening to engulf the United States. People of all colors and backgrounds could learn a lesson from Bridgewater. Take care of your family, work tirelessly to meet your goals, treat people with respect, thank people who afford you opportunities, remain humble, and smile. It is easy to be a Bridgewater fan, and the old phrase "kill em with kindness" has never been exemplified better than the way Teddy does it. Teddy Bridgewater's play is beginning to catch up with his character, and when Minnesota assembles the necessary parts around their franchise quarterback the NFL could witness a new Vikings dynasty. Louisville was ready for Teddy from the moment he visited campus as a heralded recruit, and after three quick years he became one of the most beloved athletes in the school's history. The media and NFL tried to downplay his ability and ignore his accomplishments, but as we generally witness, good things happen to good people. The era of Bridgewater is beginning and America is finally ready for Teddy.
{ "pile_set_name": "OpenWebText2" }
Former Respect MP announces he has begun legal proceedings to have result of Bradford West election set aside George Galloway has said that he has begun legal proceedings to overturn the election result in Bradford West, after he lost by more than 11,000 votes to the Labour candidate, Naz Shah. Labour called the former Respect MP “pathetic” after he said he was hoping to get Shah debarred as an MP. Galloway accused her of lying about him on Urdu television and of falsely claiming to have been forced into marriage at 15. Galloway also claims to have uncovered “widespread malpractice” in the battle for Bradford West, including postal voting fraud. The Bradford West contest was dogged by claims and counter-claims between Labour and Respect over a number of issues, especially relating to Shah’s family background. Shah – who won the seat on a 29.7% swing from Respect, polling 19,977 votes to Galloway’s 8,557 – has vowed to sue Galloway for calling the circumstances of her marriage into question. George Galloway loses Bradford West seat to Labour's Naz Shah Read more Announcing his legal bid to overturn the election result, Galloway said: “It has come to my notice that there has been widespread malpractice in this election, particularly over postal voting. We are in the process of compiling the information which will form part of our petition to have the result set aside.” Galloway has also added to a previous complaint he had made under section 106 of the Representation of the People Act 1983, which concerns false statements made with the intention of affecting the result of an election. “An allegation made by Naz Shah in Urdu on a well-watched Asian TV show is both untrue and extremely serious,” he said. According to the Respect party, Shah alleged on the TV programme that Galloway had travelled to Pakistan and posed as her dead father to obtain her nikah, an Islamic wedding certificate. Before polling day, Galloway made a complaint to the director of public prosecutions about the authenticity of a nikah that Shah produced during the campaign to prove she was forced to marry her cousin in Pakistan when she was just 15. In a dramatic moment during hustings last month, Galloway produced a nikah which he claimed showed she actually married the cousin when she was 16. He later admitted he had sent an intermediary in Pakistan to obtain it. George Galloway may have lost his seat – but this isn’t the last we’ll see of him Read more In a personal piece widely shared on social media following her last-minute selection as Labour’s prospective parliamentary candidate in March, Shah referred to her “own forced marriage through emotional blackmail when I was just 15 years old whilst in Pakistan”. The Guardian understands the Respect party has spoken to one of Shah’s paternal uncles who said he was not at the Islamic wedding ceremony Shah claims to have had in Pakistan on 25 December 1988, when she was 15. He is said to be the only surviving witness listed on the 1988 nikah. Respect claims there are are “other discrepancies” on the 1988 document and says the Labour party was informed of this prior to the election. A Labour spokesman said of Galloway’s legal action: “This is pathetic and without any foundation. George Galloway should accept he was booted out by the people of Bradford West. They saw through his divisive politics and made a positive choice, by a majority of well over 11,000, to elect a brilliant new MP, Naz Shah.” Galloway was reported to police on Thursday after he sent a tweet about exit polls before voting closed, which is banned under election law. Conceding defeat in the early hours of Friday morning, Galloway said: “I don’t begrudge the Labour members here their moment of celebration, of course. “But there will be others who are already celebrating: the venal, the vile, the racists and the Zionists will all be celebrating. The hyena can bounce on the lion’s grave but it can never be a lion and in any case, I’m not in my grave. As a matter of fact, I’m going off now to plan the next campaign.” Galloway claimed last week that he was going to sue a number of media organisations for defamation, along with his former parliamentary assistant, Aisha Ali-Khan, who was jailed for contempt last year.
{ "pile_set_name": "OpenWebText2" }
01 Feb The importance of having (a good) AC unit for electrospinning process One question we are frequently asked is “how critical is it to have an air conditioned electrospinning/electrospraying machine for obtaining good results and controlling the process?” Well, we always give the same response: it depends on what your goals are! It is clear that temperature and relative humidity are important parameters in the electrospinning process, as they affect the evaporation of solvent from the spinning jet and therefore the morphology of the resulting materials. Depending on where your machine will be, the ambient temperature and relative humidity can vary wildly, so, controlling these parameters by using an air conditioning unit will provide much tighter control of the electrospinning process. If your goals are only to carry out proof-of-concept and feasibility studies at a basic lab-scale, an air conditioning unit may not be strictly necessary for you. You will be able to investigate the electrospinning or electrospraying of various materials, develop your own solution recipes and generate micro/nano fibers and particles for membranes, coatings, powders, encapsulation etc. However, you will not be able to ensure reproducibility of your experiments from one day/month to the next, and might struggle to obtain optimum results e.g. uniform morphology, from certain materials that are more sensitive to ambient conditions, such as high humidity. If your goals are more focused towards industry, to carry out R&D with a view to developing and commercialising real products, then I strongly recommend that you consider controlling the temperature and relative humidity within the experimental chamber of your electrospinning machine, to ensure that you will be able to replicate your findings throughout the development and scale-up of the product. Furthermore, if your machine is a pilot-production plant for increased-throughput requirements (such as our Fluidnatek® LE-500 machine), which suggests that you intend to scale-up and manufacture small batches of material up to pre-industrial scale, an air conditioning unit becomes even more essential. I titled this post “the importance of having (a good) AC unit”… This is critical! On the basis of our experience at Bioinicia, designing an accurate and robust air conditioning unit, which will work with the demands of the electrospinning process, such as continuous extraction of solvent vapour, is not an easy task! You will find several examples of systems that do not effectively meet these basic demands! It took many hours of design and engineering, working with experts in the field of air conditioning, and several iterations to achieve the excellent performance of the AC unit that we offer today. Reaching the desired temperature and relative humidity within a reasonable time, and keeping these conditions stable throughout extended processing runs, whilst at the same time extracting solvent vapours continuously, are key performance features necessary for achieving good control of the process. Bioinicia’s Fluidnatek® AC units deliver these features as well as many others, including cleanroom compatibility, to ensure they meet the requirements of your process. Should you have any question in this regard or anything about the electrospinning process, at Bioinicia we will be delighted of speaking to you.
{ "pile_set_name": "Pile-CC" }
* Dani: '''VM Requirements''' - Help no longer works on Java 5, this surprised some people... but Project Plan talks about a Java 6 req now * Dani: '''VM Requirements''' - Help no longer works on Java 5, this surprised some people... but Project Plan talks about a Java 6 req now ** Martin suggestion: on the "Required JVM" table in the Project Plan, add a 2nd column with closure of BREE including all pre-reqs (continue having 1st column the BREE of the bundle itself auto-generated) ** Martin suggestion: on the "Required JVM" table in the Project Plan, add a 2nd column with closure of BREE including all pre-reqs (continue having 1st column the BREE of the bundle itself auto-generated) Documents Meeting Schedule Meeting Minutes April 4, 2012: - McQ, Dani, Martin, Andrew Dani: VM Requirements - Help no longer works on Java 5, this surprised some people... but Project Plan talks about a Java 6 req now Martin suggestion: on the "Required JVM" table in the Project Plan, add a 2nd column with closure of BREE including all pre-reqs (continue having 1st column the BREE of the bundle itself auto-generated) McQ concern: Lots of duplicate bugs would take focus away from the team Martin: Could encourage triage as part of the contest, and only count good/new bugs John: Some low-hanging fruit bugs in Platform UI but not necessarily in 4.x ("helpwanted") John: Re-introduce the "greatbug" keyword ? A greatbug is relevant, new, good description that helps understanding/finding the issue; ideally with a patch. Resolution: AI John send note to Mike John: PDE API Moved Some internal, provisional API was migrated to full API in this release Someone from SAP (Dimitar Giormov) Asked adding back the provisional API such that they could support 2 versions of Eclipse with one codebase McQ: Would have helped them 4 years ago .. but at the moment don't have enough people McQ: Question how pervasive their use of the old API is ... how much Reflection would they need to put int One resolution could be OK but only if they provide all the patches This kind of duplication is error prone and adds a maintenance burden on the project February 22, 2012: - Dani, McQ, John, Andrew Repeat of PDE build discussion from last week. We decided to nominate John Arthorne as a committer so we at least have someone to accept community patches. We will revisit after Juno and perhaps do a larger restructuring Communication with eGit: We have written some patches for eGit that have been growing stale. Dani will review the patches, and then send an email to eGit lead asking if there is a particular reason for not accepting them. If there is no problem with the patches we will track down an eGit committer to release them. Andrew asked about process for approving CQs: Any PMC member can feel free to approve CQs New versions of existing third party libraries are a no-brainer, typically just +1 right away For new third party libraries we may need a PMC discussion about why the library is needed, what feature it will live in, etc For code contributions just make sure the legal process has been followed and then +1. We generally trust the judgement of the committer who will process the contribution. February 15, 2012: - Dani, McQ, John Some discussion of what to do with PDE Build, which lacks committers. PDE as a whole has barely enough committers to be a functioning project, so maybe we should be looking at a larger restructuring after Juno rather than one piece at a time. We lacked quorum to make a decision so we will defer discussion to another week.
{ "pile_set_name": "Pile-CC" }
●admin● June 26, 2018 ●News●Comments Off on 3 Current CC Students Still Need Host Family for this Coming School Year Cloria (grade 12), Linda (grade 12) and Jerry (grade 10) are all still in need of a host family for this coming school year. Serving as a host family is a wonderful experience. It is a great way to expose your family to the other cultures around the world. And many, many host families continue to remain in touch with their host students years after they leave. If you are interested in serving as a host family, even for one semester, or have questions about being a host family, contact Angie Schrader in the LCSS Admissions office schrader@lcss.org or 765.474.7500.
{ "pile_set_name": "Pile-CC" }
Senator Larry Smith has been elected the new Leader of the Opposition and the Conservative caucus in the Senate. Smith defeated Ontario Senator Linda Frum and Nova Scotia Senator Stephen Greene in the Tuesday vote. Senator David Wells was elected Conservative Senate Caucus Chair. Smith is the former commissioner of the Canadian Football League and president of the Montreal Allouettes. He was appointed in December 2010 by prime minister Stephen Harper to fill a Senate vacancy in Quebec. Conservative senator Larry Smith talks about his new job as Leader of the Opposition in the Senate. 7:01 In the federal election later that year, Smith ran for a seat in the House of Commons in a Montreal riding and lost. He sparked some controversy when he lamented the cut in pay he experienced moving from the CFL to the Red Chamber. Smith takes over the Conservative caucus as it navigates Prime Minister Justin Trudeau's reforms to the Senate. Independent Senators became the plurality in the Red Chamber after the Trudeau government's round of Senate appointments in November 2016. Conservatives still have the second-largest bloc of representatives in the upper chamber. Smith introduced an amendment to the Liberal budget bill last November that would have changed the government's middle class tax plan. The move was ruled out of order; it's rare for the unelected Senate to try to modify a spending bill. Brad Smith, the senator's son and a television personality who has appeared on the Canadian versions of The Bachelor and Chopped, tweeted a congratulatory message for his dad. Couldn't be prouder of my Dad, a great man with amazing character..just what the Canadian Senate needs!! <a href="https://t.co/2b1unYPXZC">https://t.co/2b1unYPXZC</a> —@bradcsmith Smith replaces Senator Claude Carignan, who left the post at the end of February. Carignan led the Conservative caucus as government leader in the Senate from 2013 to 2015 and shepherded the caucus through the first two years of Liberal government on the opposition benches. He was critical of Trudeau's plan to reform the Senate, though he did co-operate with Senate Liberals to allow non-aligned senators to take seats on committees.
{ "pile_set_name": "OpenWebText2" }
Tag Archives: David Allen Green The Daily Express, for example, is outside of the Press Complaints Commission’s remit. So what do you do if they publish an inaccurate story, like the one about the costs of treating two trans prisoners approaching £100,000? Well, you phone them up, like Jane Fae says she did. The paper wasn’t interested in correcting things. […] The Prime Minister today surprisingly pulled out of cross-party talks over implementation of the Leveson Report. His resistance to statutory underpinning, unknown until Leveson actually reported, seems to have become core to his being. Stapling himself to cries of “freedom of the press” (which, as David Allen Green pointed out in his evidence to the […]
{ "pile_set_name": "Pile-CC" }
Alginate-polymer-caged, C(18)-functionalized magnetic titanate nanotubes for fast and efficient extraction of phthalate esters from water samples with complex matrix. The magnetic titanate nanotube (Fe(3)O(4)-TN composite) was prepared and functionalized with C(18) groups and then coated by a hydrophilic alginate polymer cage. This material (ALG@C(18)-Fe(3)O(4)-TN) exhibited the properties of large surface area, superparamagnetism, high adsorption ability, and good dispersibility in water. ALG@C(18)-Fe(3)O(4)-TNs possessed high extraction efficiency to phthalate esters di-n-propyl-phthalate (DPP), di-n-butyl-phthalate (DBP), dicyclohexyl-phthalate (DCP), and di-n-octyl-phthalate (DOP). The dispersed adsorbents in solution could be collected with an external magnetic field within 10 min. The extraction could be conducted under some extreme conditions such as high salinity, acid or alkali solution or humic acid-rich samples without the decrease in extraction efficiency. In the presence of 100 mg L(-1) humic acid (HAs), the recoveries of analytes were not affected at pH >6, and decreased recoveries of DPP and DCP were observed only in acid solution. Potential analysis and comparison study with the biphthalate acid or n-decanoic acid-rich matrix indicated that the anti-interference ability of adsorbents to HAs mainly resulted from the repulsion interaction and size exclusion provided by alginate cage to HAs. Under the optimized conditions, ALG@C(18)-Fe(3)O(4)-TNs were used to analyze several environmental water samples, a concentration factor of 1000 and detection limits of phthalate esters ranging in 11-46 ng L(-1) were achieved, and the recoveries of analytes were in the range of 84-109% for all samples.
{ "pile_set_name": "PubMed Abstracts" }
The objectives of this protocol are to compare the combination of 10-Ethyl-10- Deaza-Aminopterin (10-EdAM), mitomycin and vinblastin (EMV) with the combination of mitomycin and vinblastine (MV) in the treatment of patients with advanced Non-Small Cell Lung Cancer and to demonstrate that the two regimens are acceptable in terms of toxicity and to compare their relative toxicity. This is an open-label, multicenter, randomized trial.
{ "pile_set_name": "NIH ExPorter" }
There was no curbing the enthusiasm of audience members during the Q-and-A session portion of Sunday’s Citi Presents Larry David and David Steinberg in Conversation. Some of the more cringe-worthy moments: three women begging for hugs from Mr. David after propositioning him for dates (he obliged the hugs), one guy asking him to autograph a DVD copy of season 2 of “Curb your Enthusiasm” and then bum rushing the stage, and an aspiring female comedian desperately pleading for David to have a conversation with her “in real life,” a request that drew equal parts awkward laughter and boos. Of course, the gruff Emmy-winning “Seinfeld” co-creator handled it all with signature bone-dry wit, at one point telling a fan, “Thank you for that idiotic question.” Produced by Carolines on Broadway’s live entertainment division and held at The Theatre at Ace Hotel in downtown L.A., it was the unexpected bursts of poignancy that made the hour-and-a-half-long conversation between these two comedians (to filch a David phrase) “prettay prettay prettay” engaging. First on the menu of topics was David’s upbringing in Sheepshead Bay, Brooklyn, and how it influenced his comic style. “It was a bunch of old Jews living on top of each other,” said David. “I had an aunt next door and my grandmother on the next floor and it was rife with comedy. I walked to school (and) the Irish kids would beat me up on the way. That’s where the bad self-image is born.” Steinberg, who directed scores of “Seinfeld” and “Curb” episodes, then asked David, “What was your mother’s expectation of you?” David’s answer: “Zero. Less than zero. She wanted me to be a mailman.” “I had no plan,” he confessed of the period following college (where he majored in history). ”I had no idea what to do with my life.” From his stint as the private driver for an elderly blind women (“I can’t say enough good things about a blind employer”), to an underwhelming year as a staff writer on “Saturday Night Live” (“In one season (Dick Ebersol) only put one sketch of mine on the air and it was at 12:55”), to how he and Jerry Seinfeld wrestled for creative control on “Seinfeld” (“Just say no and you get your way”), David sketched a spirited portrait of his life as a fledging stand-up comic trawling grocery store aisles for comedic material who found fame and fortune as the author of his own TV universe. When it came to the future of HBO’s “Curb,” which quietly trailed off after season 8 with no confirmation as to whether or not it would continue for a ninth, David said, “After eight seasons on ‘Curb,’ I’m just not sure my ideas are gonna be good enough for a whole season.” When a heckler called out, “Yes, they will!” David replied, “I’ve been heckled a lot, but that was the nicest one.” David also made sure to remind attending fans that the “Larry David” on “Curb” is not the same Larry David in real life. “In a way I wish I was that character because he’s so honest,” said David, citing “Palestinian Chicken,” “Ski Lift” and “The Doll” among his top favorite episodes. “As Larry David on ‘Curb’ I get to say everything I want to say which I can’t in real life. It’s freeing. This was a great vehicle for me to have all of these thoughts that go unexpressed.” Currently gearing up for his Broadway play about shiva (Jewish mourning ritual) that opens in February 2015, he’s not kicking “Curb” to the bucket just yet. “I feel bad that I don’t have shows for them,” he told Steinberg of obsessed series fans, “and I haven’t given up the hope.”
{ "pile_set_name": "OpenWebText2" }
Did the pleistocene glaciations promote divergence? Tests of explicit refugial models in montane grasshopprers. There is a long-standing debate over whether or not the Pleistocene glaciations promoted speciation. While some models predict that extensive mixing of populations during interglacial expansion would have inhibited divergence, others postulate that divergence among allopatric glacial refuges or founder events during recolonization of previously glaciated areas would have promoted differentiation. Using a combination of traditional and coalescent based population genetic approaches, this study finds that the glaciations did not inhibit divergence among populations of the grasshopper Melanoplus oregonensis. Instead, drift associated with recolonization of previously glaciated areas, as well as divergence among multiple allopatric glacial refugia, have both contributed to differentiation in this montane grasshopper from the 'sky islands' of the northern Rocky Mountains. Significant population structure was detected by phylogenetic and FST analyses, including significant FST values among individual pairs of sky-island populations. In addition to clustering of haplotypes within populations, there is some evidence of regional phylogeographic structure, although none of the 'regional groups' form a monophyletic clade and there is a lack of concordance between the genealogical and geographical positions of some haplotypes. However, coalescent simulations confirm there is significant regional phylogeographic structure that most likely reflects divergence among multiple ancestral refugial populations, and indicate that it is very unlikely that the observed gene tree could have been produced by the fragmentation of a single widespread ancestral population. Thus, rather than inhibiting differentiation, the glaciations appear to have promoted population divergence in M. oregonensis, suggesting that they may have contributed to the radiation of Melanoplus species during the Pleistocene.
{ "pile_set_name": "PubMed Abstracts" }
Electron and phonon cooling in a superconductor-normal-metal-superconductor tunnel junction. We present evidence for the cooling of normal-metal phonons, in addition to the well-known electron cooling, by electron tunneling in a superconductor-normal-metal-superconductor tunnel junction. The normal-metal electron temperature is extracted by comparing the device current-voltage characteristics to the theoretical prediction. We use a quantitative model for the heat transfer that includes the electron-phonon coupling in the normal metal and the Kapitza resistance between the substrate and the metal. It gives a very good fit to the data and enables us to extract an effective phonon temperature in the normal metal.
{ "pile_set_name": "PubMed Abstracts" }
Rąbity Rąbity (German Rombitten) is a village in the administrative district of Gmina Zalewo, within Iława County, Warmian-Masurian Voivodeship, in northern Poland. References Category:Villages in Iława County
{ "pile_set_name": "Wikipedia (en)" }
/* * Copyright (c) 2019 m2049r@monerujo.io * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ // https://developer.android.com/training/basics/network-ops/xml package com.m2049r.xmrwallet.service.exchange.krakenEcb; import android.support.annotation.NonNull; import com.m2049r.xmrwallet.service.exchange.api.ExchangeApi; import com.m2049r.xmrwallet.service.exchange.api.ExchangeCallback; import com.m2049r.xmrwallet.service.exchange.api.ExchangeRate; import com.m2049r.xmrwallet.util.Helper; import okhttp3.OkHttpClient; import timber.log.Timber; /* Gets the XMR/EUR rate from kraken and then gets the EUR/fiat rate from the ECB */ public class ExchangeApiImpl implements ExchangeApi { static public final String BASE_FIAT = "EUR"; @NonNull private final OkHttpClient okHttpClient; public ExchangeApiImpl(@NonNull final OkHttpClient okHttpClient) { this.okHttpClient = okHttpClient; } @Override public void queryExchangeRate(@NonNull final String baseCurrency, @NonNull final String quoteCurrency, @NonNull final ExchangeCallback callback) { Timber.d("B=%s Q=%s", baseCurrency, quoteCurrency); if (baseCurrency.equals(quoteCurrency)) { Timber.d("BASE=QUOTE=1"); callback.onSuccess(new ExchangeRateImpl(baseCurrency, quoteCurrency, 1.0)); return; } if (!Helper.BASE_CRYPTO.equals(baseCurrency) && !Helper.BASE_CRYPTO.equals(quoteCurrency)) { callback.onError(new IllegalArgumentException("no " + Helper.BASE_CRYPTO + " specified")); return; } final String quote = Helper.BASE_CRYPTO.equals(baseCurrency) ? quoteCurrency : baseCurrency; final ExchangeApi krakenApi = new com.m2049r.xmrwallet.service.exchange.kraken.ExchangeApiImpl(okHttpClient); krakenApi.queryExchangeRate(Helper.BASE_CRYPTO, BASE_FIAT, new ExchangeCallback() { @Override public void onSuccess(final ExchangeRate krakenRate) { Timber.d("kraken = %f", krakenRate.getRate()); final ExchangeApi ecbApi = new com.m2049r.xmrwallet.service.exchange.ecb.ExchangeApiImpl(okHttpClient); ecbApi.queryExchangeRate(BASE_FIAT, quote, new ExchangeCallback() { @Override public void onSuccess(final ExchangeRate ecbRate) { Timber.d("ECB = %f", ecbRate.getRate()); double rate = ecbRate.getRate() * krakenRate.getRate(); Timber.d("Q=%s QC=%s", quote, quoteCurrency); if (!quote.equals(quoteCurrency)) rate = 1.0d / rate; Timber.d("rate = %f", rate); final ExchangeRate exchangeRate = new ExchangeRateImpl(baseCurrency, quoteCurrency, rate); callback.onSuccess(exchangeRate); } @Override public void onError(Exception ex) { Timber.d(ex); callback.onError(ex); } }); } @Override public void onError(Exception ex) { Timber.d(ex); callback.onError(ex); } }); } }
{ "pile_set_name": "Github" }
Millennium development goals and oral health in cities in Southern Brazil. To investigate social determinants of oral health, analysing the occurrence of associations between millennium development goals (MDG) indicators and oral health (OH) indicators. An ecological study was performed in two distinct phases. In Phase 1, MDG indicators and related covariates were obtained from the demographic census of the Brazilian Institute of Geography and Statistics, the Ministry of Health database and the 2000 Human Development Atlas, making up the whole set of independent variables. Principal component analysis was carried out for the independent variables showing the correlations among the variables comprising the main components, and generating a synthetic index allowing the performance of the cities to be known with regard to the MDG (MDG index). In Phase 2, the DMFT index (mean number of decay, missing or filled permanent teeth) and the CF index (prevalence of caries-free individuals), in 12 years old were obtained from the epidemiological survey undertaken in 2002-2003, in 49 cities in southern Brazil, and were analysed in relation to the MDG index using Spearman's correlation. A statistically significant correlation was found for the DMFT and CF indices, respectively, with: the MDG index (R(2)=0.49 and 0.48; P = 0.00); the socioeconomic status of the population (R(2)= 0.12 and 0.12; P = 0.02); the socioenvironmental characteristics (R(2)=0.41 and 0.46; P= 0.00). The MDG synthetic index of the cities analysed and the respective components relating to their socioeconomic and socioenvironmental status demonstrated a positive correlation with OH indicators. As such, intersectoral public policies based on population strategies that act on social determinants of general and oral health need to be integrated so as to impact on the MDG and OH outcomes.
{ "pile_set_name": "PubMed Abstracts" }
Q: Flutter: multiple firebase projects in one app but showing incorrect data The last few days I spend a lot of time to read through several SO-questions and tutorials. What I'm trying to achieve is, that a user of my flutter app can choose a firebase project and log in with email/password. After the login, obviously, the correct data of the corresponding database should be shown. And that is where I fail. After a while of reading some sites and questions from SO, I went with the following site to get the first part of the login. https://firebase.googleblog.com/2016/12/working-with-multiple-firebase-projects-in-an-android-app.html After working through this article, I was able to successfully log in to my defined firebase projects. How did I know that the login was successful? I compared the user-uids from the projects with the print statement from my app in the console. That was the prove my configuration for the non-default project is correct. But now the main problem which I can't solve. After the login, the data is always of the default firebase project from the google-service.json. For state management, I choose the provider package, as they mentioned in the I/O '19. So inside my main.dart, I wrap the whole application with MultipleProvider: Widget build(BuildContext context) { return MultiProvider( providers: [ ChangeNotifierProvider<LoginModel>( builder: (_) => LoginModel(), ), ChangeNotifierProvider<Auth>( builder: (_) => Auth(), ), ], child: MaterialApp( title: 'Breaking News Tool', theme: ThemeData( primarySwatch: Colors.blue, ), home: RootPage(), ), ); } The provided Auth class is a service that connects to firebase sdk and also configure non-default apps to create the needed firebase auth abstract class BaseAuth { getDefaultAuth(); getAbnAuth(); ... } class Auth with ChangeNotifier implements BaseAuth { ... Auth() { _configureAbnApp(); _configureProdApp(); } getDefaultAuth() { _firebaseAuth = FirebaseAuth.instance; } getAbnAuth() { _firebaseAuth = FirebaseAuth.fromApp(_abnApp); } _configureAbnApp() { FirebaseOptions abnOptions = FirebaseOptions( databaseURL: 'https://[project-id].firebaseio.com', apiKey: 'AIzaSxxxxxxxxxxxxxxxx, googleAppID: '1:10591xxxxxxxxxxxxxxxxxxx'); FirebaseApp.configure(name: 'abn_database', options: abnOptions) .then((result) { _abnApp = result; }); } ... } After a log in the app redirects the user to the home_page (StatefulWidget). Here I use a snapshot of the database to show data. _stream = Firestore.instance.collection(collection).snapshots(); ... Center( child: Container( padding: const EdgeInsets.all(10.0), child: StreamBuilder<QuerySnapshot>( stream: _stream, builder: (BuildContext context, AsyncSnapshot<QuerySnapshot> snapshot) { if (snapshot.hasError) return Text('Error: ${snapshot.error}'); switch (snapshot.connectionState) { case ConnectionState.waiting: return Text('Loading...'); default: return ListView( children: snapshot.data.documents .map((DocumentSnapshot document) { return CustomCard( docID: document.documentID, title: document[title], message: document[message], fromDate: document[fromDate], endDate: document[endDate], disableApp: document[disableApp], ); }).toList(), ); } }, ), ), ), In the beginning, I only had one project to connect to and the data was correct. But now I successfully connect to another project with the correct user-uid, but the data is always from the default project which is defined by the google-service.json. And at this point, I have no clue why this happens. Did anyone have an advice or idea? A: You create your _stream based on Firestore.instance, which will give you the default firebase app, as documented in the docs: /// Gets the instance of Firestore for the default Firebase app. static Firestore get instance => Firestore(); Therefore you always get the data from the default project. To fix this you need to create your firestore using the app created by FirebaseApp.configure(). So replace: _stream = Firestore.instance.collection(collection).snapshots(); with _stream = Firestore(app: _abnApp).collection(collection).snapshots();
{ "pile_set_name": "StackExchange" }
Omar Samuel Orozco does tile work on a home in the 2500 block of N. 46th St., part of Common Ground’s house rehabilitation program. Credit: Michael Sears SHARE By of the Theresa Utschig remembers the house at 2528 N. 48th St. as a bit of a nightmare. It was a foreclosure and was vacant. The roof leaked, badly. You could see the water running into the kitchen. Scavengers had busted out the back door and punched holes in the walls to strip out copper, pipes, electrical fixtures and anything else that might have scrap value. Some rooms were heaped with garbage. "It was dangerous to walk in," Utschig said. Not anymore. It's a bright, lovely bungalow, with its built-in cabinets, coved ceilings, leaded glass windows and a black granite countertop in the once-leaky kitchen. It's also one of the first houses to be offered for sale under what community group Southeastern Wisconsin Common Ground hopes will be a self-sustaining program to help address the foreclosure crisis — about 2,600 houses are in either city- or bank-owned foreclosures — that has plagued some Milwaukee neighborhoods. A few years ago, Common Ground, where Utschig is a volunteer, got more than $2 million in federal money to acquire foreclosed houses in the Sherman Park neighborhood, rehab and sell them. So far, the group has sold 30 homes and is working on more than 20 more. But when the government money ran out more than a year ago, Common Ground acted to keep the effort going. It formed an entity called Milwaukee Rising, which has received more than $800,000 from private organizations, most of it from Bank of America, Wells Fargo and Deutsche Bank. The group is using the money in a revolving loan pool to continue the rehabbing. On Saturday, the group held an open house to show an early result of that work, the bungalow on N. 48th. "This house is beautiful," Ald. Russell Stamper II, who lives just a few blocks away, said to a gathering of about 30 people before the home — asking price, $112,900 — was opened for inspection. "It's going to make me go home and paint my porch. I'm the alderman. I've got to make sure I can keep up with Common Ground." Common Ground representatives have traveled to Germany and California to press deed-holding banks to address the foreclosure crisis, and the efforts seem to have paid off. Banks have given foreclosed homes to the group. That lets Common Ground concentrate its limited money on rehab. Randy Jones vouches for the quality of the work. Athletic director at a Milwaukee Boys & Girls Clubs, Jones, 47, bought a Common Ground-restored house more than two years ago. "Love it," he said of his home, near N. 51st and W. Chambers streets. "I didn't have to do anything to it." It's Jones' first house, and he was a welcome addition to the neighborhood; before his purchase, the building had been abandoned for two years. "When they take houses like this and make them livable, make you have pride in them, they get people together," Jones said. "It changes people's whole dynamic of just being a human being. It helps values. When you live low, you act low." House by house, Common Ground wants to work on that — an effort that drew praise Saturday from both Stamper and Common Council President Michael Murphy. "Too many problems in our city occur when people are so apathetic they walk away and don't choose to take action because they think it's too big a problem they can't make a difference," Murphy said. "Every long journey begins with a first step, and that's what Common Ground is all about."
{ "pile_set_name": "OpenWebText2" }
A 19-year-old man who authorities believe fatally shot a teenage boy Friday told deputies he thought the gun was empty when he pulled the trigger inside a home on the northwest side, according to court documents. The man said he was in his upstairs bedroom clearing ammunition out of an AK-47 rifle in the home in the 8000 block of North Country Home Lane, north of Cortaro Farms Road, when the incident happened, according to a search warrant filed by the Sheriff’s Department in Pima County Superior Court. He took out the rifle’s magazine and believed the gun was empty when he pulled the trigger, firing a single shot that struck Luis Angel Lopez Jr., 17, who was in the adjacent den area, the warrant said. The man went to check on Lopez and tried to render aid, grabbing a towel to cover his wound, according to the warrant. Deputies say they found Lopez on the couch with the towel behind his head. He was pronounced dead at the scene. Deputies reported there were suspected explosive devices inside the home and called in the Pima Regional Bomb Squad and Bureau of Alcohol, Tobacco, Firearms and Explosives to remove them.
{ "pile_set_name": "OpenWebText2" }
'use strict'; var Type = require('./Type'); // https://www.ecma-international.org/ecma-262/5.1/#sec-11.9.6 module.exports = function StrictEqualityComparison(x, y) { var xType = Type(x); var yType = Type(y); if (xType !== yType) { return false; } if (xType === 'Undefined' || xType === 'Null') { return true; } return x === y; // shortcut for steps 4-7 };
{ "pile_set_name": "Github" }
Q: Chaining multiple ajax requests with promises I'm looking to chain multiple ajax requests, something along the lines of: get first JSON, if successful move on and get second JSON, if successful make a new object consisting of both JSON data. // get first json $.getJSON('http://www.json1.com').then(function(json1){ return json1 }).then(function(json1){ // get second json $.getJSON('http://www.json2.com').then(function(json2){ var both = {} both.one = json1 both.two = json2 return both }) }) Should I be nesting .then statements in each other? I'm not completely sure how to get the both variable. A: .then(function(json1){ return json1 }) That's an unnecessary, (nearly) identity call. .then(function(json1){ …; You should always return from a then callback, so that the new promise gets a value. You can even return promises, which will be "unwrapped"! Should I be nesting .then statements in each other? It doesn't really matter whether you nest them or chain them, that's the great thing about promises. Chaining them reduces the height of your "pyramid", so it is considered cleaner, however you cannot access the variables from higher scopes. In your case, you need to access json1, so you have to nest them. I'm not completely sure how to get the both variable. When you do return from the callbacks, you can get it as the resolution value of the promise that you get back from the then call. $.getJSON('http://www.json1.com').then(function(json1){ return $.getJSON('http://www.json2.com').then(function(json2){ return {one: json1, two: json2}; }) }).then(function(both) { // do something with both! });
{ "pile_set_name": "StackExchange" }
Royton Ring Mill, Royton Royton Ring Mill was a cotton mill in Royton, Greater Manchester. It was built in 1908 and extended in 1912. It was taken over by the Lancashire Cotton Corporation in the 1930s and passed to Courtaulds in 1964. Production finished in 1966. It was extended again in 1969 and used for other purposes. It has now been demolished, the street has been renamed and houses replace it. Location Royton is a town within the Metropolitan Borough of Oldham, in Greater Manchester, England. It lies by the source of the River Irk, on undulating land at the foothills of the Pennines, north-northwest of Oldham, south-southeast of Rochdale and northeast of the city of Manchester. Royton is not situated on any canal, but the Manchester, Oldham, and Royton railway(which left the Oldham Loop Line at Royton Junction railway station) and a goods yard was constructed in the 1860s, allowing improved transportation of textile goods and raw materials to and from the township. History Historically a part of Lancashire, Royton during the Middle Ages, formed a small township centred on Royton Hall. A settlement expanded outwards from the hall which, by as late as 1780, "contained only a few straggling and mean-built cottages". Farming was the main industry of this rural area, with locals supplementing their incomes by hand-loom woollen weaving in the domestic system. Royton has the distinction of being the first town in Lancashire where a water powered cotton mill was built. Thorp Mill, Royton was built by Ralph Taylor at Thorp Clough in 1764. The construction of more mills followed, which initiated a process of urbanisation and socioeconomic transformation in the region; the population moved away from farming, adopting employment in the factory system. The introduction of which led to a tenfold increase of Royton's population in less than a century; from 260 in 1714 to 2,719 in 1810. Thus, the introduction of textile manufacture during the Industrial Revolution facilitated a process of unplanned urbanisation in the area, and by the mid-19th century Royton had emerged as a mill town. Royton's damp climate provided the ideal conditions for cotton spinning to be carried out without the cotton drying and breaking. By 1832, there were 12 steam powered mills in Royton, of which its former hamlets had begun to agglomerate as a town around the cotton factories, a number of small coalpits and new turnpike road from Oldham to Rochdale, which passed through the town centre. The Manchester, Oldham, and Royton railway and a goods yard was constructed in the 1860s, allowing improved transportation of textile goods and raw materials to and from the township. Neighbouring Oldham (which by the 1870s had emerged of the largest and most productive mill town in the world) had begun to encroach upon Royton's southern boundary, forming a continuous urban cotton-spinning district. The demand for cheap cotton goods from this area prompted the flotation of cotton spinning companies; the investment was followed by the construction of 22 new cotton mills in Royton. Together with Oldham, at its peak the area was responsible for 13% of the world's cotton production. The industry peaked in 1912 when it produced 8 billion yards of cloth. The Great War of 1914–18 halted the supply of raw cotton, and the British government encouraged its colonies to build mills to spin and weave cotton. The war over, Lancashire never regained its markets. The independent mills were struggling. The Bank of England set up the Lancashire Cotton Corporation in 1929 to attempt to rationalise and save the industry. Royton Ring Mill, Royton was one of 104 mills bought by the LCC, and one of the 53 mills that survived through to 1950. As imports of cheaper foreign yarns increased during the mid-20th century, Royton's textile sector declined gradually to a halt; cotton spinning reduced in the 1960s and 1970s, and by the early 1980s only four mills were operational. In spite of efforts to increase the efficiency and competitiveness of its production, the last cotton was spun in the town in 1998. Today, fewer than a dozen mills are still standing in Royton, the majority of which are used for light engineering or as distribution centres. Despite an economic depression brought about by the demise of cotton spinning, Royton's population has continued to grow as a result of intensive housing redevelopment which has modernised its former Edwardian districts. Architecture This was a P.S.Stott mill constructed in 1908. Power Driven by a 1700 hp cross compound engine by Urmson & Thompson, 1908 similar to the one in Mars Mill, Castleton. It was steamed at 160psi. The cylinders, 29"HP, 59"LP, had a 5-foot stroke. There were Corliss valves on both cylinders. The air pump was driven from LP tail rod with support guides on LP only. The 24-foot flywheel ran at 67 rpm and supported 36 ropes. Equipment In 1915 it had 64,176 ring and 6400 doubling spindles. Later extensions 1912 1937 Usage Owners Lancashire Cotton Corporation (1930s–1964) Courtaulds (1964–1966) Thomas Hope Ltd Tenants See also Textile manufacturing Cotton Mill References Bibliography External links Cottontown.org website Spinningtheweb.org website Category:Textile mills in the Metropolitan Borough of Oldham Category:Textile mills owned by the Lancashire Cotton Corporation Category:Demolished buildings and structures in Greater Manchester
{ "pile_set_name": "Wikipedia (en)" }
Tennis at the 2007 Pan American Games – Women's singles The women's singles tournament in tennis at the 2007 Pan American Games was held at Marapendi Club in Rio de Janeiro from July 18 to July 22. Medalists Draw Finals Top half Bottom half Women's singles
{ "pile_set_name": "Wikipedia (en)" }
Tennis at the 2017 Southeast Asian Games – Women's Doubles Noppawan Lertcheewakarn and Varatchaya Wongteanchai were the defending champions having won the event in 2015, but Wongteanchai chose to participate at the 2017 Summer Universiade instead. Nicha Lertpitaksinchai and Peangtarn Plipuech won the gold medals, defeating Luksika Kumkhum and Lertcheewakarn in an all-Thai final, 1–6, 6–3, [10–8]. Jawairiah Noordin and Theiviya Selvarajoo of Malaysia, and Denise Dy and Katharina Lehnert of the Philippines won the bronze medals. Medalists Seeds Draw External links Draw Women's Doubles South South
{ "pile_set_name": "Wikipedia (en)" }
This is an archived article and the information in the article may be outdated. Please look at the time stamp on the story to see when it was last updated. Please enable Javascript to watch this video DES MOINES, Iowa -- Mental health in Iowa is becoming more than a concern. Experts are calling it a miserable situation and the state doesn't stack up well across the nation. Four percent of Iowans suffer from a severe mental illness, but many believe those numbers are being ignored. Iowa is now on a list that's not worth being proud of. “Iowa consistently ranks in the bottom five of all states in every single category of mental health programs and services,” said Peggy Huppert, NAMI Iowa Executive Director. Gov. Terry Branstad vetoed a bill last July aiming to restore services at hospitals in Clarinda and Mount Pleasant. According to a new study by the Treatment Advocacy Center, Iowa now ranks 49th in the country with just 64 state mental hospital beds. “Compare that to the 1950s at the height of people being treated when there were 7,000 beds,” Huppert said. Utah, Mississippi, Arkansas and Kansas are all similar to Iowa in population but have nearly 4 times and in some cases, nearly 8 times the amount of state beds. “We think private beds can certainly meet the needs if they are there and if the money is there,” Huppert said. There is a total of 731 beds public and private in Iowa, but statistics show nearly 123,000 Iowans have a serious mental illness. That number is slightly less than the total population of Iowa’s second largest city: Cedar Rapids. “It’s been an issue for some time, and getting worse,” said Jeff Jarding, of Broadlawns Medical Center. Broadlawns Medical Center in Des Moines supports mental health in a private setting but rarely has room. “We run at capacity almost all the time,” Jarding said. So they send patients to cities like Sioux City and Dubuque, which are hours away. "We send them everywhere, and we need to on a regular basis,” Jarding said. To make sure these doors stay open to those in need, Broadlawns plans to increase their already 30 inpatient mental health beds nearly 50 percent by July 2017. “It’s huge. Not only for the city, but 14 beds is huge for the state,” Jarding said. But will remain in a critical state until lawmakers bring the growing problem into the spotlight. "Governor Branstad talks about how he wants Iowa to be the healthiest state, but part of being the healthiest state is having a healthy mental state as well,” Huppert said. Help could be on the way in the form of psychiatrists. In March, Branstad announced $4 million in funds to increase the state's psychiatric residency program, which was previously only at the University of Iowa. It now includes Broadlawns, Mercy and UnityPoint. Click here to read the full report.
{ "pile_set_name": "OpenWebText2" }
This Is My Song (Patti Page album) This Is My Song was a Patti Page LP album, issued by Mercury Records as catalog number MG-20102 in 1957. Track listing References Category:Patti Page albums Category:1956 compilation albums Category:Mercury Records compilation albums
{ "pile_set_name": "Wikipedia (en)" }
Coated fabrics, which typically include polyvinyl chloride (PVC) or vinyl, on such fabrics as cotton, nylon, rayon, polyester and combinations thereof are found in a variety of finished products including automotive upholstery, furniture, wallpaper and luggage. In the bonding of the sheet vinyl to the fabric scrim, the fabricator trims the edges before the coated fabric is shipped to the end user. Today, it has been estimated that among the major manufacturers of vinyl coated fabrics, tens of millions of pounds of PVC are lost because there is no economical way to separate the vinyl from its fabric backing. Chemical methods for achieving this separation, i.e., processes described and claimed in U.S. Pat. Nos. 3,624,009; 3,836,486; and 3,873,411, have to date not been considered to be economical processes for the recovery of PVC. There have been an increasing number of prior art recovery processes employing cryogenic embrittlement; see U.S. Pat. Nos. 2,879,005; 3,614,001; 3,666,185; 3,718,284; 3,768,739; 3,885,744; 3,749,322; 4,020,992, 4,025,990 and 4,251,034 as well as the relevant references cited therein. The prior art cryogenic processes have been effective to embrittle the thermoplastic coating and to liberate the thermoplastic from the material on which the plastic is bonded. However, all of the prior art processes, whether taken alone or in combination, have neither disclosed nor suggested a viable means for separating thermoplastic from the fabric after such liberation. Specifically, it has been found that a very poor recovery of PVC is obtained by a combination of the cryogenic grinding, impacting and screening steps disclosed in U.S. Pat. No. 2,879,005 or U.S. Pat. No. 4,020,992 with the air separating means disclosed in U.S. Pat. No. 3,885,744.
{ "pile_set_name": "USPTO Backgrounds" }
Diagnosis of Nonischemic Stage B Heart Failure in Type 2 Diabetes Mellitus: Optimal Parameters for Prediction of Heart Failure. This study sought to identify whether impaired global longitudinal strain (GLS), diastolic dysfunction (DD), or left atrial enlargement (LAE) should be added to stage B heart failure (SBHF) criteria in asymptomatic patients with type 2 diabetes mellitus. SBHF is a precursor to clinical heart failure (HF), and its recognition justifies initiation of cardioprotective therapy. However, original definitions of SBHF were based on LV hypertrophy and impaired ejection fraction. Patients with asymptomatic type 2 diabetes mellitus ≥65 years of age (age 71 ± 4 years; 55% men) with preserved ejection fraction and no ischemic heart disease were recruited from a community-based population. All underwent a standard clinical evaluation, and a comprehensive echocardiogram, including assessment of left ventricular hypertrophy (LVH), LAE, DD (abnormal E/e'), and GLS (<16%). Over a median follow-up of 1.5 years (range 0.5 to 3), 20 patients were lost to follow-up, and 290 individuals were entered into the final analyses. In this asymptomatic group, LV dysfunction was identified in 30 (10%) by DD, 68 (23%) by LVH, 102 (35%) by LAE, and 68 (23%) by impaired GLS. New-onset HF developed in 45 patients and 4 died, giving an event rate of 112/1,000 person-years. Survival free of the composite endpoint (HF and death) was about 1.5-fold higher in patients without a normal, compared with an abnormal echocardiogram. LVH, LAE, and GLS <16% were associated with increased risk of the composite endpoint, independent of ARIC risk score and glycosylated hemoglobin, but abnormal E/e' was not. The addition of left atrial volume and GLS provided incremental value to the current standard of clinical risk (ARIC score) and LVH. In a competing-risks regression analysis, LVH (hazard ratio: 2.90; p < 0.001) and GLS <16% (hazard ratio: 2.26; p = 0.008), but not DD and LAE were associated with incident HF. Subclinical left ventricular systolic dysfunction is prevalent in asymptomatic elderly patients with type 2 diabetes mellitus, and impaired GLS is independent and incremental to LVH in the prediction of incident HF.
{ "pile_set_name": "PubMed Abstracts" }
Stara Oleszna Stara Oleszna () is a village in the administrative district of Gmina Bolesławiec, within Bolesławiec County, Lower Silesian Voivodeship, in south-western Poland. Prior to 1945 it was in Germany. It lies approximately north of Bolesławiec, and west of the regional capital Wrocław. References Stara Oleszna
{ "pile_set_name": "Wikipedia (en)" }
The meiotic pairing behaviour in human spermatocytes carrier of chromosome anomalies and their repercussions on reproductive fitness. I: Inversions and insertions. A European collaborative study. The synaptic behavior of pachytene chromosomes was studied in men heterozygous for inversions and one inversion-insertion by analysis of synaptonemal complexes at the electron microscopy level. The human meiotic data were collected from European laboratories in order to test the current theories and to link the arrest of spermatogenesis and the risk of chromosome imbalance to the mode of pairing and their consequences. The breakpoint location would allow to predict the synaptic and recombinational behavior of chromosome aberrations and particularly the risk of aneusomie de recombinaison in the progeny of inversion carriers.
{ "pile_set_name": "PubMed Abstracts" }
tag:blogger.com,1999:blog-4756997539735492455.post1045270432500901454..comments2016-11-28T06:32:46.560-06:00Comments on North Dakota Twins Fan: A Minnesota Twins Blog: I Miss Wilson Ramos...NoDak Twins Fanhttp://www.blogger.com/profile/05523830726859734298noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-4756997539735492455.post-40241966204872897102011-06-15T09:30:05.138-05:002011-06-15T09:30:05.138-05:00Good post. Boy, hindsight being 20/20, this is a t...Good post. Boy, hindsight being 20/20, this is a tough pill to swallow. I understand that we more or less needed a closer last season, since we were going &quot;all in,&quot; but Capps didn&#39;t even have a save opportunity in the playoffs. Oh well, good luck Wilson.Andrewhttp://www.blogger.com/profile/01193037924987429075noreply@blogger.com
{ "pile_set_name": "Pile-CC" }
Microchromatographic quantitation of fetal hemoglobin in patients with sickle cell disease. A microchromatographic procedure (Isolab Fast Hb Test System) which was developed for the quantitation of Hb AI (10) has been found useful for the quantitation of Hb F in samples that contain Hb S and/or Hb C but no Hb A (% Fmicro). This method has been evaluated through analyses of known mixtures of Hb F and Hb S. The Hb Fmicro levels in patients with sickle cell anemia and related conditions were compared with results obtained by alkali denaturation (% FAD) and conventional DEAE-cellulose chromatography (% FDE). This microchromatographic technique is a fast, simple, and sensitive method for Hb F quantitation in patients with Sickle cell disease.
{ "pile_set_name": "PubMed Abstracts" }
Q: Email Works fine but got two emails at same time? I try to send email, below code works fine but email sends twice at a time. I tried a lot but I don't know where I made a mistake. RTElapsedTime.cs: public void Elapsed() { T1.Elapsed += new ElapsedEventHandler(T1_Elapsed); T1.Interval = 60000; T1.Enabled = true; } public void T1_Elapsed(object source, ElapsedEventArgs e) { try { MatchingTime = DateTime.Now.ToString("HH:mm"); EmailMgr = new MachineBL(RTSqlConnection.Provider, RTSqlConnection.ConnectionString); DataTable dt = EmailMgr.EmailServiceScheduleTimeIntervalRunTime(MatchingTime.ToString()); TraceImplogs.TraceLTService(DateTime.Now.ToString("dd/MM/yyyy hh:mm:ss tt") + " " + "report schedule count : " + dt.Rows.Count); foreach (DataRow r in dt.Rows) { T1.Enabled = false; RTEmailManagement(r); T1.Enabled = true; } TraceImplogs.TraceLTService(DateTime.Now.ToString("dd/MM/yyyy hh:mm:ss tt") + " " + "Tasks are completed."); } catch (Exception ex) { TraceImplogs.TraceLTService(ex.Message); } } DataTable dataRPT1 = new DataTable(); public DataTable ReportGeneration2(EmailDTO EETO) { EmailMgr = new MachineBL(RTSqlConnection.Provider, RTSqlConnection.ConnectionString); dataRPT1 = EmailMgr.EmailLatearrivalReport(EETO.Departments, "0", EETO.ReportType); return dataRPT1; } public void RTEmailManagement(DataRow dr) { EDTO = null; EDTO = new EmailDTO(); MatchingTime = DateTime.Now.ToString("HH:mm"); EDTO.SecondTime = MatchingTime; EDTO.ScheduleTime = dr["rshtime"].ToString(); EDTO.ToEmails = dr["rsh_altrntmail"].ToString(); EDTO.CcEmails = dr["rsh_ccmail"].ToString().Split(';'); EDTO.Subject = dr["rsh_subjct"].ToString(); EDTO.ReportID = dr["reportid"].ToString(); EDTO.Departments = dr["rsh_dept"].ToString(); EDTO.ReportType = Convert.ToInt32(dr["rsh_typly"].ToString()); EDTO.weekly = dr["rsh_day"].ToString(); EDTO.Monthly = dr["rsh_dayofmnth"].ToString(); EDTO.Day = dr["xday"].ToString(); EDTO.Body = dr["rsh_body"].ToString(); EDTO.langcode = Convert.ToInt32(dr["langcode"].ToString()); CompanyID = Int32.Parse(dr["Company_id"].ToString()); dataRPT1 = ReportGeneration2(EDTO); TraceImplogs.TraceLTService(DateTime.Now.ToString("dd/MM/yyyy hh:mm:ss tt") + " " + "report schedule count---- : " + dataRPT1.Rows.Count); foreach (DataRow r in dataRPT1.Rows) { EDTO.CcEmails = new List<string>(EDTO.CcEmails) { r["Manager"].ToString() }.ToArray(); EDTO.CcEmails = EDTO.CcEmails.Distinct().ToArray(); //EDTO.CcEmails[EDTO.CcEmails.Length-1] = dataRPT1.Rows[k]["Manager"].ToString(); EDTO.ToEmails1 = r["email_addr"].ToString(); EDTO.LateArrival = r["LateArrivals"].ToString(); if (EDTO.ScheduleTime == EDTO.SecondTime) { TraceImplogs.TraceLTService(DateTime.Now.ToString("dd/MM/yyyy hh:mm:ss tt") + " " + "time matched"); switch (Convert.ToInt32(EDTO.ReportType)) { case 0: case 1: EmailConfiguration(CompanyID, EDTO); break; case 2: //TraceImplogs.TraceLTService("tyoe 2 new"); EmailConfiguration(CompanyID, EDTO); break; case 3: // TraceImplogs.TraceLTService("tyoe 3 new"); EmailConfiguration(CompanyID, EDTO); break; default: break; } } } // else TraceImplogs.TraceLTService(DateTime.Now.ToString("dd/MM/yyyy hh:mm:ss tt") + " " + "not matching"); } public void EmailConfiguration(int compid, EmailDTO EDTO) { try { ConfigDTO mlDTO = new ConfigDTO(); EmailMgr = new MachineBL(RTSqlConnection.Provider, RTSqlConnection.ConnectionString); DataTable EmailConfigDT = EmailMgr.SelectAllCompanyEmailConfiguration(compid); RTMailProcessing Mprocess = new RTMailProcessing(); mlDTO.ConfigMail = EmailConfigDT.Rows[0]["comp_email"].ToString(); mlDTO.ConfigPwd = EmailConfigDT.Rows[0]["comp_pwd"].ToString(); mlDTO.ConfigHost = EmailConfigDT.Rows[0]["host_name"].ToString(); mlDTO.ConfigPort = Convert.ToInt32(EmailConfigDT.Rows[0]["host_port"].ToString()); Mprocess.EmailProcessing(mlDTO, EDTO); } catch (Exception ex) { TraceImplogs.TraceLTService(ex.Message + " Email Error"); } } Email processing cs code. RtMailprocessing.cs: public void EmailProcessing(ConfigDTO conDTO, EmailDTO EDTO) { RTMsg.language(EDTO.langcode); conDTO.ConfigPwd = utility.Decrypt_Secure_Keylock(conDTO.ConfigPwd); // TraceImplogs.TraceLTService("Entered Config file" + conDTO.ConfigPwd); SmtpClient smtp = new SmtpClient { Host = conDTO.ConfigHost, Port = conDTO.ConfigPort, EnableSsl = true, DeliveryMethod = SmtpDeliveryMethod.Network, UseDefaultCredentials = false, Credentials = new System.Net.NetworkCredential(conDTO.ConfigMail, conDTO.ConfigPwd) // Timeout = 30000, }; ServicePointManager.ServerCertificateValidationCallback = new RemoteCertificateValidationCallback(ValidateServerCertificate); // TraceImplogs.TraceLTService("Entered inside"); if (EDTO.ToEmails != "") { using (System.Net.Mail.MailMessage message = new System.Net.Mail.MailMessage(conDTO.ConfigMail, EDTO.ToEmails1, EDTO.Subject, EDTO.Body)) { for (int k = 0; k < EDTO.CcEmails.Length; k++) { if (EDTO.CcEmails[k] != "") { message.CC.Add(EDTO.CcEmails[k].TrimEnd(';')); } else { TraceImplogs.TraceLTService(DateTime.Now.ToString("dd/MM/yyyy hh:mm:ss tt") + " " + "Ccmails are empty"); } } message.CC.Add(EDTO.ToEmails); message.Subject = ""; message.Body = ""; message.Subject = EDTO.Subject; message.SubjectEncoding = System.Text.Encoding.UTF8; // ReportGeneration(EDTO); string EmailBody = ""; if (attach != null) { message.Attachments.Add(attach); string[] RepBody = EDTO.Body.Split(new string[] { "\r\n", "\n" }, StringSplitOptions.None); /*****with attachment***/ foreach (string lines in RepBody) { EmailBody += "<p style='font-family: Arial, Helvetica, sans-serif; font-size: 12px; color: #333333; margin-left: 10px'>" + lines + "</p>"; } message.Body = "Email Testing"; message.BodyEncoding = System.Text.Encoding.UTF8; //message.Attachments.Dispose(); //message.Dispose(); } if (dataRPT.Rows.Count < 1) { message.Body ="Test Email"; message.BodyEncoding = System.Text.Encoding.UTF8; message.Attachments.Clear(); } message.IsBodyHtml = true; //Send this as plain-text smtp.Send(message); TraceImplogs.TraceLTService(DateTime.Now.ToString("dd/MM/yyyy hh:mm:ss tt") + " " + NameRPT + " sent successfully."); message.CC.Clear(); //((IDisposable)smtp).Dispose(); //message.Attachments.Dispose(); //message.Dispose(); } } } When I debug with breakpoint loop run single time only but I got two email. I don't know where I made exactly mistake. Thanks in advance. A: I'm going to take a guess, you're not unsubscribing the event: T1.Elapsed += new ElapsedEventHandler(T1_Elapsed); You need to unsubscribe it: T1.Elapsed -= new ElapsedEventHandler(T1_Elapsed); The email server processed both messages and delivered them at the same time.
{ "pile_set_name": "StackExchange" }
Exampleswakan's examples Wakan-Hubbard Lodge and it predecessors have been active in Penfield and the surrounding community since 1849. Currently, Wakan-Hubbard Lodge has more than 175 members, approximately half of whom reside in Monroe County and one in Thailand. — “Wakan Hubbard Lodge No. 154”, Wakan is a non-profit, spiritual organization that offers products and Wakan - News and Events. Wakan is a non-profit, spiritual organization that offers products and services for healing and creative expression based on indigenous wisdom. — “Wakan”, Wakan Motorcycles has produced the Wakan 1640, a single seat, V-Twin powered sport bike built around the AC Cobra idea of dropping a big American powerplant into a sporty European frame. The Wakan 1640 starts with a single spine oil carrying frame, a 54 inch wheelbase, with inverted Ceriani. — “Wakan 1640 – New French V-Twin Motorcycle”, The 2009 Wakan Track Racer and all other motorcycles made since 1970. Specifications. Show any 2009 Wakan Track Racer for sale on our Bikez.biz Motorcycle Classifieds. — “2009 Wakan Track Racer specifications and pictures”, When anything is hard to understand, it is wakan because mankind does not know what it is. that is used in the ceremony and songs to the Wakanpi is wakan, because it should not be used for anything else. — “Lakota Symbolism - Concepts”, The official Wakan Motorcycles website. — “WAKAN Motorcycles”, Wakan Foundation President and Producer Khashyar Darvich (left) with His Holiness the Dalai Lama during filming for a Wakan Foundation documentary about peace. "Yes, I like your questions-- very good The Wakan Foundation for the Arts provides and creates programs that fill a basic human. — “Wakan Foundation for the Arts: serving humanity and the world”, Wakan Track Racer Special S&S 50th Anniversary. Not only the hottest Wakan, but also one of the hottest cafe-racers anywhere, ever! Wakan have unveiled their latest special-edition motorcycle – the Track Racer Special S&S 50th Anniversary. — “Faster and Faster: Wakan Track Racer Special S&S 50th Anniversary”, Wakanyeja has much deeper meaning; "Wakan" is sacred and "yeja" is translated to mean "a gift" Pawicayapi: to put them first. Wakanyeja kin wakan pi kin he un witaya naunjipi kte (Coming together because the children are sacred. — “Wakanyeja Pawicayapi (The Children First)”, Wakan rōeishū 和漢朗詠集: A Collection of Chinese and Japanese Poems. This disambiguation page lists articles associated with the same title. If an internal link led you here, you may wish to change the link to point directly to the intended article. — “Wakan - Wikipedia, the free encyclopedia”, The restoration of the Mini-Wakan State Park is a joint venture by the Iowa Department of Natural Resources and the Spirit Lake Protective Association. During a public input meeting in the fall of 2007 the DNR reaffirmed the restoration of Mini-Wakan as a priority. — “SLPA :: Mini-Wakan State Park”, Naomi Wakan is a writer/artist best known for her haiku which have appeared in many magazines. — “Naomi Wakan - writer and artist”, (wakan) is a versatile tool for students of Japanese or Chinese. It features a character dictionary, a word dictionary, a text editor, a vocabulary management utility, many printing options (character flashcards, vocabulary lists, text including furigana), and a text translation tool. — “WaKan Project Website - About”, wakan.manga.cz Peta Wakan Tipi (Lakota for Sacred Fire Lodge) is one of Minnesota's oldest (20 years) American Indian-established and run nonprofit organizations, having provided culturally appropriate housing and support services for recovering American Indian people in the Twin Cities since 1986. — “PWT Web”, Read about this Wakan 100 Roadster. The motorcycle itself is a faithful rendition of Shelby's 425-horsepower icon, and the engine is still the star of the show. Domergue figures to sell 75 percent of the (very) limited-production Roadster in the. — “Wakan 100 Roadster - Motorcyclist Magazine”, found is a software called Wakan It s basically an offline dictionary but with neat little features For instance it can translate vocabulary you have in your clipboard like seen here It can even translate everything on your desktop but well it s horribly slow and loves to crash Decide for yourself Wakan Roadster 16 jpg Joel Domergue has started up a new French firm by the name of Wakan which will produce this machine powered by a 1640cc V Twin Another new motorcycle manufacturer enters the world in the Videosrelated videos for wakan Wakan Tanka - Mikael Hemmingsson Music video for the song "Wakan Tanka" by Mikael Hemmingsson Wakan Tanka Vision about a dream........ Music is from the first Cheyenne Album and called also Wakan Tanka Vision Wakan Tanka: The Great Mystery Photo essay about the Great Spirit of the Native Americans and the seven sacred rites of the Lakota Sioux that help them to be one with everything. Robby Romero "Makoce Wakan" - Trailer "Makoce Wakan" - Rockunemtary Trailer : "Feedback has been more than positive: Congratulations on a very successful show that has generated more viewer calls than any other show to date." - VH1 / MTV Networks "Makoce Wakan" explores Native Peoples connection to the land; their beliefs, traditions, and philosophies. This VH1 World Alert special focuses on Native Peoples Sacred Sites, The Black Hills and Bear Butte in South Dakota and Mount Graham in Arizona. These Sacred Sites have been used and protected by American Indians for religious and medicinal purposes from time immemorial, and are currently threatened by recreational, commercial, and industrial development. To Indigenous Peoples, Sacred Sites symbolize a productive and positive spiritual unity between human beings and "Mother Earth", a relationship Native Peoples have long understood. Written, directed and hosted by Robby Romero and co-written by Suzan Shown Harjo, "Makoce Wakan" offers insights about the personal, spiritual, and political importance of protecting Sacred Sites with appearances by: Senator Ben Nighthorse Campbell (R-Colorado), Richard Moves Camp (Oglala Lakota Spiritual Leader), Audrey Shenandoah and Betty Jacobs (Onondaga Clan Mothers), Franklin Stanley (Apache Spiritual Leader), Ola Cassadore (Apache Survival Coalition), and Chief Leon Shenandoah (Six Nations Iroquois Confederacy). The special is scored by Robby Romero and features the music of Red Thunder and Buddy Redbow along with traditional ... WAKAN - INDIAN DANCE RMX John Two-Hawks - 'Peta Wakan - Sacred Fire' from 'Earth ~ Fire ~ Water ~ Wind' A John Two-Hawks music video which honors the sacred life giving power of fire. Get this song on iTunes! CLICK HERE: Wakan Tanka - InCerimonia Wakan Tanka is a song dedicated to the Native Americans. The journey of an young man. Enjoy it. Creazione video:Filippo Biagianti DJ Yano - Four Circles of Life (Wakan Tanka) DJ Yano - Four Circles of Life (Wakan Tanka) (1999) Subscribe/rate/comment when you like my taste of Afro/Cosmic, so i know that you really listened to the track instead of just downloaded it :) . Visit www.cosmic- for upcomming Events! |Native Americans| Wakan Tanka Vision This is a clip with Native Americans pictures and the song Wakan Tanka Vision subscribe comment and rate ;) thank you ;;):) Shuunka Wakan ~ Spirit of the Horse Montage by LadyHawk Music by Arvel Bird Song: Shuunka Wakan (Horse) I made this video montage as a personal project simply because I loved this song so much, and the horse is one of my major animal totems. I've just recently discovered Arvel Bird's amazing work, and I'm totally hooked! I've already bought three of his albums, and highly recommend them to anyone who loves working with their sacred animal totems, indigenous Shamanism, Celtic and Native American spirituality. Video clips taken from several well-known movies are included in this video presentation, including from The Black Stallion, Flicka, Hildalgo, plus bits (and bytes) from the documentary films "Cloud ~ Wild Stallion of the Rockies" and "Shy Boy ~ The Horse Who Came in from the Wild" with Monty Roberts. To hear more of Arvel Bird's awesome music, you can visit his website at: Or, you can also do a YouTube search for Arvel Bird, and LOTS of his live performances will come right up! I hope you'll enjoy exploring his music as much as I do! ~ Best blessings, Terri Sound Of Wakan The Sound Of A Wakan Motorycle The first video of the WAKAN motorcycle , powered by a S&S 100 cubic inches ( 1640 cm3 ) Enjoy it Nonprofits to Know: Peta Wakan Tipi's Dream of Wild Health Minnesota Community Foundation and The Saint Paul Foundation proudly present the new web video series "Nonprofits to Know". This is the fourth video in the series and features the Peta Wakan Tipi's Dream of Wild Health Program. Peta Wakan is a non-profit that promotes the social, economic, physical and cultural health of American Indian people through programs like Dream of Wild Health. Learn more about their work at . Wakan Tanka- Native American.wmv pictures and film to a bonnie tune. Wakan Tanka to the Dakota nations means The Great Mystery, Wakan Tanka (the Great Mystery)Often designated by non-Native Americans as "the Great Spirit". In a certain sense, the supreme power of the Lakota universe. Every object in the world whether it be of the earth, the air, the fire or the water has a spirit and that spirit is Wakan. Thus the spirit of the tree or beings of that kind, while not like the spirit of man, are also Wakan. "Wakan Not a divinity, or even a spirit, as such, the concept of wakan is a very central one and should be commented upon. Wakan means "mystery", "something marvellous", "a sacred essence". It is an impersonal force within all things, animate and inanimate alike. Some things have more of it than others, though - language is wakan, food is wakan, medicine (magick) is wakan, birth and death are wakan. To be a Wicasa Wakan (a shaman or "medicine man") is to develop a great deal of wakan within oneself, and to utilize it " "The term has a double meaning - technically it refers to all the spiritual powers of the universe, as if assembled together around a council fire. As imagined though, the "council" of the spirits becomes a single entity, and this is the second meaning of the term - the collective power of all the Gods, considered as a specific entity. This entity informs all space and time, and is present in all things animate and inanimate. The spirit underlying Wakan Tanka itself is Inyan, who caused ... Wakan The word "Wakan" means "sacred" in the Lakotah language and "heart of the sky" in the Mayan language. For some Native American Indian groups, it means a great spiritual power of supernatural origin belonging to some natural objects. John Two-Hawks - 'Mni Wakan - Sacred Water' from 'Earth ~ Fire ~ Water ~ Wind' This John Two-Hawks music video speaks of the sacred life giving power of water. Mni Wakan, Sacred Water, we cannot live without you.... Get this song at iTunes. CLICK HERE: www.egilfylling.no - Wakan Tanka Music for meditation. Water and nature with Instrumental, calm music from the CD "Anahata" www.egilfylling.no John Two-Hawks - 'Maka Wakan - Sacred Earth' from 'Earth ~ Mother Earth.. We have lost our way.. Help us to find our way back to you.... Get this song now at iTunes! CLICK HERE: Volkstanzgruppe Wakan Donau polka Wakan Tanka (Pt. 1) Original Native American Flute music by Brent Blount with photos from New Mexico around the Continental Divide and Pikes Peak area in Colorado. Available at On Twittertwitter about wakan Blogs & Forumblogs and forums about wakan “Open the home page, then try to open another page. Click the Back button to The forum technical staff have been notified of the error, though you may”— Database Error, “Your auto encyclopedia”— WAKAN Forum - autoevolution, “I've posted a question on the Wakan forum, but does anyone here happen to know of a quick topics in this forum - You cannot reply to topics in this forum - You cannot delete your”— The best mouse-over dict for Japanese (Specific Languages, how-to-learn-any- “[Archive] Wakan Main Forum I agree that Buell could bring back the S1 and do it cheaper than Wakan, but it would look cheaper and not necessarily be any better”— Wakan [Archive] - SacBORG Forum, “Art-ful Reading. by Naomi Wakan on October 1st, 2010. October. My first Naomi Beth Wakan is an essayist and poet. She has written over thirty books including her”— Art-ful Reading | Naomi Wakan Blog, “Project: replacement for Wakan (Page 1) - Other Japanese-Related Stuff - Tae Kim's Guide to Japanese Forum - To address questions and improvements for the Japanese Grammar Guide as well as topics concerning Japanese in general”— Project: replacement for Wakan (Page 1) - Other Japanese,
{ "pile_set_name": "Pile-CC" }
Man accused of child sex abuse Sunday Feb 24, 2013 at 12:01 AM TRACY - The San Joaquin County Sheriff's Office was called to the 30000 block of South Highway 33 in an unincorporated area of Tracy about 2:30 p.m. Friday to investigate the alleged sexual abuse of a child, authorities said. The Record TRACY - The San Joaquin County Sheriff's Office was called to the 30000 block of South Highway 33 in an unincorporated area of Tracy about 2:30 p.m. Friday to investigate the alleged sexual abuse of a child, authorities said. Deputies detained 68-year-old Robert Burke, who was accused of sexually abusing a child on multiple occasions, officials said. Burke was later arrested on suspicion of lewd acts upon a child, continued sexual abuse of a child, rape by foreign object and molestation, authorities said. Burke is a relative of his victim, officials said, though they did not disclose the nature of their relationship. The investigation is ongoing, authorities said. Never miss a story Choose the plan that's right for you. Digital access or digital and print delivery.
{ "pile_set_name": "Pile-CC" }
Lazy Loading in Java - twotriangles http://mlapadula.com/blog/2011/08/28/lazy-initialization-in-java.html ====== sidcool Getting 404 ~~~ chromejs10 same
{ "pile_set_name": "HackerNews" }
Acupuncture What is Acupuncture? Acupuncture is based on the premise that all of our bodily functions are regulated by energy called qi which flows through the body. Disease is caused by disruptions to this flow. Acupuncture corrects imbalances in the flow of qi by stimulating specific anatomical locations on or under the skin. The most common mechanism of stimulation of acupuncture points is penetration of the skin by thin disposable needles. About our Acupuncturist Andrew Crapo is a nationally certified and state registered acupuncturist as well as a member of the Michigan Association of Acupuncture and Oriental Medicine. He graduated Summa Cum Laude and valedictorian from Pacific College of Oriental Medicine with a Master of Science in Traditional Oriental Medicine (MSTOM). In addition to traditional acupuncture, Andrew has extensive training in herbal medicine and offers cosmetic acupuncture to his patients. Andrew also holds a Bachelor of Science in Biomedical Science from Western Michigan University where he graduated with honors. Andrew’s passion for Traditional Chinese Medicine (TCM) stems from having been treated with TCM his entire life by his father, Dr. Mark Crapo, one of the first certified acupuncturists in the state of Michigan; thus knowing the amazing healing properties it holds. His wish is to teach as many people as possible about TCM as well as share the experience of attaining wellness with all of his clients. Frequently Asked Questions: Does Acupuncture Hurt? Most people are surprised to find out that acupuncture is not painful. Acupuncture needles are very fine and are inserted gently into the skin with the use of a guide tube. Once the needles are inserted it is common to feel deeply relaxed. Acupuncture feels really good! What is Chinese Herbal Medicine? Herbal medicine consists of blending individual Chinese herbs into formulas. The formula usually consists of two to twelve different herbs. Herbal formulas have demonstrated excellent results for thousands of years and have fewer side effects than conventional pharmaceutical medications. Herbal formulas come in many forms: pills, capsules, granules and tinctures, which are much more convenient and less time consuming than the brewing of tea. How does Acupuncture work? Chinese medical theory maintains that the human body is a complex bio-energetic system. The pathways through which our life energy flows, qi as it is called in Chinese medicine, are known as channels or meridians. If the flow or balance of qi is disrupted or damaged, pain; abnormal body functions; or disease will ensue. Acupuncture works by stimulating the flow of energy at points along the meridians as prescribed for a specific treatment. By balancing and regulating the flow of qi, the body can then heal itself. Although a great deal of research has been done, the exact mechanism by which acupuncture works has not been pinned down by western science. One example of acupuncture’s effectiveness is pain relief, believed to be due to the triggering of the release of endorphins, a natural pain reducing substance within the body itself. Acupuncture has been proposed to also effect the release of specific hormones and neurotransmitters as well as other body regulating substances. Although unexplained, the benefits and results are well documented, from ancient times to present day. Acupuncture works! Are there any side effects of Acupuncture? The main side effect of acupuncture is a deep state of calm and relaxation. You may feel a warm or tingling sensation throughout your body. Though it is rare, a hematoma (also known as a bruise) may appear at the needled site. Oriental Medicine The philosophy of Oriental Medicine dictates that every individual must be treated based upon his or her own condition, symptoms and physical constitution. Every patient is evaluated as a whole, with treatment based upon a thorough examination of symptoms, medical history, blood pulse and physical examination, as well as concerns of emotional and mental origin. Acupuncture and herbal medicine are a natural medicine that encourages the body to heal itself.
{ "pile_set_name": "Pile-CC" }
Agreement between fragility fracture risk assessment algorithms as applied to adults with chronic spinal cord injury. Cross-sectional. The objective of the study was to determine and report agreement in fracture risk stratification of adults with spinal cord injury (SCI) using (1) Canadian Association of Radiologists and Osteoporosis Canada (CAROC) and Canadian Fracture Risk Assessment (FRAX) tools with and without areal bone mineral density (aBMD) and (2) SCI-specific fracture thresholds. Tertiary rehabilitation center, Ontario, Canada. Community-dwelling adults with chronic SCI (n=90, C2-T12, AIS A-D) consented to participation. Femoral neck aBMD values determined 10-year fracture risk (CAROC and FRAX). Knee-region aBMD and distal tibia volumetric BMD values were compared to SCI-specific fracture thresholds. Agreements between CAROC and FRAX risk stratifications, and between fracture threshold risk stratification, were assessed using prevalence- and bias-adjusted Kappa statistics (PABAK). CAROC and FRAX assessment tools showed moderate agreement for post-menopausal women (PABAK=0.56, 95% confidence interval (CI): 0.27, 0.84) and men aged ⩾50 years (PABAK=0.51, 95% CI: 0.34, 0.67), with poor agreement for young men and pre-menopausal women (PABAK⩽0). Excellent agreement was evident between FRAX with and without aBMD in young adults and in those with motor incomplete injury (PABAK=0.86-0.92). In other subgroups, agreement ranged from moderate to substantial (PABAK=0.41-0.73). SCI-specific fracture thresholds (Eser versus Garland) showed poor agreement (PABAK⩽0). Fracture risk estimates among individuals with SCI vary substantially with the risk assessment tool. Use of SCI-specific risk factors to identify patients with high fracture risk is recommended until a validated SCI-specific tool for predicting fracture risk is developed.
{ "pile_set_name": "PubMed Abstracts" }
enum color { red, white, blue }; record R { var c: color; } var c: [0..1] R; c[0].c = color.red; c[1].c = color.blue; proc foo(x: int(64), y: int(64)) { writeln("In 64-bit foo!"); return false; } proc foo(x: color, y: color) { writeln("In enum foo!"); return true; } if (foo(c[0].c, color.white)) { writeln("Got correct version!"); }
{ "pile_set_name": "Github" }
Everything that's gold does not glitter sociology Post navigation Sunday afternoon. Sitting in our car in front of a Wal-Mart on the drive back from my parents’ house down south. My wife ran in for a minute to get a couple of things, so I get to people watch in my air conditioned cocoon, buffered from the 104°F heat just outside my door. I feel sorry for the cart guy as he leans into his conga line of shopping trolleys in the searing sun. Here comes a young woman in an orange T-shirt (logo illegible from this distance) and bright purple hair. We once had a Chevy that color, but I never associated it with a part of the human body. Out comes a middle aged woman pushing an empty cart. You have to wonder what’s up with that. Wouldn’t you leave the cart in the store if you couldn’t find what you’re looking for? Maybe she needed the cart to lean on. The woman’s deeply wrinkled face makes her look old, perhaps a legacy of years of nicotine. Indeed, she has a cigarette hanging from her lips; the second she crosses the store’s threshold into the dreadful heat, she lights it. My thoughts drift away to our Fathers’ Day visit to my dad. We went out to dinner to a local Italian place on Friday night (I need the gluten-free pizza crust, please, and here’s a little Baggie of vegan cheese to use in place of the mozzarella, okay?) and to a steak house on Saturday (an order of broccoli, please, steamed with no butter, and a baked potato with just chives; also a salad with no cheese, croutons or dressing). Family occasions can be a challenge for gluten-free vegans. It seems that I seldom come away from a visit to my parents without at least a few stories that I hadn’t heard before. I need to hear these while I still can. This time, I learned that my uncle, age 90, is one of the youngest veterans of World War II. He was sent overseas with the Army Air Corps at the very end of the war; when the war ended, he was still eighteen years old. Then there’s my dad’s take on history. During the Great Depression, he tells me, the life expectancy of an American male was 62 years. A guy who had a job would remain employed until he was too old and sick to work. Then he’d spend a year sitting on a park bench. Then he died. There was no Social Security. No one took care of you, my father went on; people took care of themselves. Before FDR’s New Deal, he told me, our guarantees extended to life, liberty and property. How you ate and paid your rent was up to you. My father seems to long for those days. His ideas put me in mind of Archie and Edith Bunker, opening each episode of “All in the Family” by singing “didn’t need no welfare state/everybody pulled his weight.” I have some questions. Was it really like that? Or is it more like wearing rose-colored glasses regarding the Good Old Days? How did the old, sick guy on the park bench support himself for that year? And what about his wife? I suspect that part of the answer lies in extended families supporting each other. I’ve been rereading Steinbeck’s Grapes of Wrath lately, and it is not lost on me that the Joads dragged the elders of the clan along with them as they headed west, even though Grandpa had to be drugged to prevent him from stubbornly remaining behind. Just as my octogenarian father waxes wistful over a time long gone, I wish we still lived in an age when people stuck together. The breakdown of the American family over many decades results in people in need having no support (of either the financial or the emotional kind). We have elderly folks living by themselves in little apartments, spouses dead or divorced, children moved to distant cities and states to pursue their own lives and dreams. Perhaps striking out on their own and leaving family behind is reflective of the pursuit of happiness. After all, family members often don’t get along. And yet, in the days before public assistance, it seems that families had to get along just to survive. It makes me sad that we seem to cherish the freedom to worship the self and ignore others and, ultimately, the freedom to end up old and alone. A blog comment I ran across last week suggested that “hypocrite” is just about the worst epithet that can be applied to a person. I do not agree. Not at all. It seems to me that hypocrisy has a useful and respectable place in our society and that it has been unfairly maligned over the centuries. Let’s start by taking a moment to examine the meaning and etymology of the word “hypocrite.” Much as I esteem the opinion of the Oxford English Dictionary, I am unable to tell you how they weigh in on the issue, as the online version is behind a paywall and my unemployed ass cannot afford the $995 cost of the 20-volume print edition or even the $400 cost of the compact CD. Making use of the tools that I do have available, dictionary.com cites the origin of the English word “hypocrite” as the ancient Greek hypokrites, meaning “a stage actor, hence one who pretends to be what he is not.” The original Greek appears to indicate that, at some level, hypocrisy was a socially acceptable construct. Ancient Greek audiences understood perfectly well that the onstage histrionics they were witnessing were the products of talented actors who were not actually being murdered and dismembered before their very eyes. This is often referred to as “willing suspension of disbelief.” Once we leave the stage, however, society has always had a much more difficult time accepting one who “pretends to be what he is not.” Merriam-webster.com defines a hypocrite as “a person who acts in contradiction to his or her stated beliefs or feelings.” In modern times, the epithet “two-faced” has been applied to such an individual, but the revulsion visited upon hypocrites goes back centuries. Arguably, the epitome of the public dissing of hypocrites was meted out by Jesus. Among the best known statements about hypocrisy is in Matthew 23:14 (KJV), “Woe unto you, scribes and Pharisees, hypocrites! For ye devour widows’ houses, and for a pretense make long prayer: therefore ye shall receive the greater damnation.” Despite the bad name given to hypocrisy in the New Testament, I submit to you that being a hypocrite was likely quite practical 2,000 years ago and is certainly so in our modern world of the 21st century. 1. We grew up with hypocrisy. Most of us were introduced to the concept of hypocrisy at an early age, long before the word entered our nascent vocabularies. Either by inference or (as in the case of my own parents) literally, our folks would tell us “Do as I say, not as I do!” If you think about it, this makes sense. All parents have hopes and dreams that their children will do better than they themselves did. As parents, we have bad habits that we do not wish our children to emulate. Of course, children are strongly influenced by the actions of their parents, which is why many fathers quit smoking or drinking or swearing when they learn that a little one is on the way. When we are unable, for whatever reason, to forsake our evil ways, the backup plan has always been to tell the kids to “pay no attention to the man in the mask.” Hypocrisy: It’s how we seek to improve the next generation. 2. Hypocrisy as a coping mechanism. A famous quote from novelist F. Scott Fitzgerald posits that “the test of a first rate intelligence is the ability to hold two opposed ideas in the mind at the same time, and still retain the ability to function.” We may, for example, simultaneously entertain the ideas that “drinking alcohol impairs my ability to function” and “I need a drink to get through the day.” (In my own case, I suppose I should substitute ice cream and potato chips.) One may dispute the accuracy of Fitzgerald’s assertion about intelligence, but acting against what we know to be our own best interest is a form of hypocrisy that is a valid coping strategy used to allow us to keep going (and to keep from going crazy) in the face of life’s daily contradictions. 3. Hypocrisy is a reasonable response to society’s persistence in judging us. Back in the years when I worked in the court system, I would regularly hear criminal defendants bemoaning the law’s condemnation of conduct that they found perfectly acceptable. Some of this is decidedly solipsistic in nature, but to a great extent, this sentiment is the product of conflicting cultural norms. As the social workers and probation officers know all too well, the guy in the orange jumpsuit will likely think nothing of committing assault and battery if such conduct is a daily occurrence in his neighborhood, and particularly if he witnessed and/or participated in it as a child and adolescent. “I’m being judged unfairly!” is the prisoner’s mournful moan. How does this relate to hypocrisy? Most of us attempt to stay on the right side of the law in order to stay out of jail, but things change considerably when it comes to matters of morality. This may seem only marginally relevant today, but in times of restrictive social norms, we may seek to avoid the judgment of society by publicly spouting the party line while merrily pursuing our own agendas in private. An example I mentioned in a post earlier this week is that many of us kept our criticisms of the government to ourselves in the 1950s to avoid social approbation that could include becoming unemployed and being run out of town. Similarly, for years most gays remained “in the closet,” some even going as far as entering hetero marriages, in order to avoid being judged harshly by those around them. So you can see that saying one thing and doing another is a reasonable response (“I have to live in this town!”) to persistent judgment by a society cherishing norms that directly contradict one’s own. Those who hang out in the third standard deviation pretty much have the choice of being hypocrites or adjusting their behavior to conform with cultural norms. Those who are unable to embrace either approach often find themselves in those orange jumpsuits, or arguably worse, in padded cells. I have often pondered that much hypocrisy, as well as outright law-breaking, could be avoided if people would relocate to parts of the world in which social norms are better aligned with their predilections. We may be horrified at, and quick to condemn, practices such as the use of hard drugs, allowing minors to consume alcohol or eating the meat of cats and dogs, but there are many areas of the world in which these are not the cultural taboos as they represent in North America. Those who reside here but find it inconvenient to pick up stakes for an intercontinental move to a more compatible social environment often engage in culturally prohibited practices in private while, in public, pretending the horror that our society expects of them. And let us not forget that many throughout history have found becoming hypocrites essential in order to practice their religions while avoiding death at the hands of an intolerant majority. Rather than reviling the hypocrite, perhaps we should consider that none of us is perfect and that every one of us is hypocritical in some fashion at some point in time. For example, we may be staunch advocates of truth-telling, yet accede to telling a “white lie” in order to spare someone’s feelings. Among the problems that we have with hypocrites is the fear that they will “fool us” and the rage we experience when we feel that we have been duped. This is symptomatic of a simplistic and childlike mindset that paints every situation in black and white. We want to be able to distinguish the “good guys” from the “bad guys.” Not only does this sentiment fail to acknowledge the complex nature of modern society, but it also errs in equating the good with current social norms. Aside from the fact that such norms change rapidly, it behooves us to recognize the value of diversity and multiculturalism in that individuals with widely divergent traditions, mores and folkways can all make positive contributions to our heterogeneous society. Some believe that once a hypocrite has been “outed,” nothing he or she says may be trusted ever again. We think of politicians who are elected on a “law and order” platform and then are discovered to be crooks themselves. A few years ago, a Scientific American article pointed out that our unwarranted emotional responses to hypocrisy (i.e., our unwillingness to put ourselves in the shoes of the hypocrite or, dare I say, to examine our own hypocrisy) “tend to short-circuit rational examination” of a person’s statements. Just because one acts hypocritically to avoid harsh social judgment in a particular area does not mean that every statement uttered by that individual should be discounted out of hand. Compassion, particularly among those of us who profess efforts to live a godly life, seems in order. Yet compassion appears conspicuously lacking by many, particularly by those on the religious right, who chastise hypocrites as “liars” and “haters of the truth.” It may be more accurate to say that an intolerant, judgmental society is the real hater of truth, the truths that there will always be dissenters in our midst, that there is a place in life for personal choice, and that peaceful coexistence is possible without achieving universal consensus in regard to every belief and practice.
{ "pile_set_name": "Pile-CC" }
Q: Android AES issue I need to implement AES algorithm with my Android application, and I created this code below and it works prefectly as Java application, but it seems that Android doesnt recognize JAXB. Because as you can see i use import javax.xml.bind.DatatypeConverter, because I use Datatype converter to convert from byte[] to string... I tried to import jaxb jar, but it fails again with this error: Conversion to Dalvik format failed with error 1. How I can fix this? Here is the code: public class AESCrypt { private final Cipher cipher; private final SecretKeySpec key; private AlgorithmParameterSpec spec; private String encryptedText, decryptedText; ByteArrayOutputStream baos; public AESCrypt(String password) throws Exception { // hash password with SHA-256 and crop the output to 128-bit for key MessageDigest digest = MessageDigest.getInstance("SHA-256"); digest.update(password.getBytes("UTF-8")); byte[] keyBytes = new byte[16]; System.arraycopy(digest.digest(), 0, keyBytes, 0, keyBytes.length); cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); key = new SecretKeySpec(keyBytes, "AES"); spec = getIV(); } public AlgorithmParameterSpec getIV() { AlgorithmParameterSpec ivspec; byte[] iv = new byte[cipher.getBlockSize()]; new SecureRandom().nextBytes(iv); ivspec = new IvParameterSpec(iv); return ivspec; } public String encrypt(String plainText) throws Exception { cipher.init(Cipher.ENCRYPT_MODE, key, spec); byte[] encrypted = cipher.doFinal(plainText.getBytes()); encryptedText = DatatypeConverter.printBase64Binary(encrypted); return encryptedText; } public String decrypt(String cryptedText) throws Exception { cipher.init(Cipher.DECRYPT_MODE, key, spec); byte[] bytes = DatatypeConverter.parseBase64Binary(cryptedText); byte[] decrypted = cipher.doFinal(bytes); decryptedText = new String(decrypted, "UTF-8"); return decryptedText; } } A: The Android library has the class Base64 (android.util.Base64) that is very convenient to convert base64 string to data.
{ "pile_set_name": "StackExchange" }
Some European countries are expected to break with Washington and start supplying the Syrian rebels with weapons in the next few months, the representative of the Syrian opposition in Britain has told the Guardian. The National Coalition's London representative, Walid Saffour, predicted that by the next meeting of the western and Arab Friends of Syria group in Turkey, due in late spring or early summer, "there will be a breakthrough that will end the restrictions of the European countries". "This would be for the ammunition we require, the quality weapons we need to deter the Syrian regime from using aeroplanes and Scud missiles to bomb villages and bakeries," Saffour said. "We on the ground are advancing steadily but we are suffering from a lack of ammunition. We expect that to change at the next Friends of Syria meeting in Istanbul." Another opposition figure involved in supplying the rebels said there had been a noticeable relaxation in recent days of the strict restrictions the US and Turkey had put on arms flows over the Turkish border. He claimed a Syrian army helicopter and a Mig warplane had been shot down in the past two days, for the first time by imported missiles. "These were not weapons that had been captured from Syrian army bases as before. These were released from the Turkish warehouses. These are weapons the opposition had purchased previously but had not been allowed to take across the border," the opposition source said. "Before, 23mm was the maximum calibre for anti-aircraft guns permitted and we were allowed to bring in RPGs [rocket-propelled grenades] but not armour-piercing shells. But there is a major shift on the ground now. The policy is changing. "I think the shift in American attitudes goes far beyond the official reports. I think that Washington knows it can no longer allow to let the problem fester." The EU formally changed its arms embargo on Syria on Thursday to allow the supply of armoured vehicles, non-lethal military equipment and technical aid to the opposition. The move came as the US secretary of state, John Kerry, made his first trip to a Muslim nation since taking office, visiting Ankara, where he met Turkish leaders to discuss Syria. While Saffour did not name the countries he expected to supply arms, the British government, which took the lead in pushing for the relaxation of the sanctions, is expected to act swiftly in reaction to the new EU rules. Foreign secretary, William Hague, is due to make a statement to parliament next week detailing the new equipment and training the UK will give the rebels. The aid is expected to include civilian vehicles – reinforced to provide protection against shelling – of a kind the British government is already supplying to UN aid workers operating in Syria. On British insistence, the EU embargo will come up for review in June and the UK is expected to push for a further relaxation in what can be provided to the opposition if there is no let-up in the two-year-old conflict, in which more than 70,000 people are estimated to have died. Speaking at the Friends of Syria meeting in Rome on Thursday, Hague stressed military aid was possible in the future. "That will be an important decision, of course, and has its own risks, and that is why we haven't done that so far. But I don't rule that out," he said. A British official said: "We are going to keep on raising the pressure on the Assad regime. The Friends of Syria meeting in Rome was not the end of a process. It is the beginning of a process." Saffour, the National Coalition's representative, said: "If the EU embargo doesn't change, then some of the EU countries will change their policy – if not openly, then quietly." He said US officials had also told the coalition that the White House policy of providing non-lethal aid only would come under review in the next few months, as new members of Barack Obama's administration, such as Kerry and the defence secretary, Chuck Hagel, enter the internal debate. There have been reports over the past few weeks that the flow of arms to rebel fighters has increased markedly, including some anti-tank weapons made in the former Yugoslavia. The Croatian government has denied reports that its arms industry supplied some of the weapons. Ivica Nekic, the managing director of the Croatian arms export agency, said: "We would be aware of any sale from Croatia, and no Croatian weapons have been sold to anyone in Syria." Asked about reports that Croatian arms were supplied through Saudi Arabia, Nekic said Croatia had only sold the Saudi military helmets and was in the process of negotiating a sale of pistols. Asked about other customers in the Middle East, Nekic said: "We sell to more than 50 countries around the world. I can't speculate on every country, and every sale we make. It would not be correct." Muhannad Hadi, the World Food Programme's regional emergency co-ordinator for Syria and neighbouring countries, said the British donation of armoured cars had already saved the lives of WFP staff delivering food aid on both sides of the lines. "They turned out to be a life-saving tool. Our weapons were attacked four times in the past several months, by mortar. And the thing is nobody was injured." The WFP currently supplies food to 1.5 million people in Syria in all 14 of the country's governorates, and in many parts of the country there are pockets with unknown populations which are beyond the agency's reach because of fighting. Hadi said the WFP hoped to increase the number of recipients to 2 million this month and 2.5 million next month, but was facing a critical shortage of funding. "If we don't have funds in May for Syria, there will be serious problems. There will be breaks in the pipeline. Food needs a lead time to bring it in, with shipping and logistics, so we need the funds very, very soon."
{ "pile_set_name": "OpenWebText2" }
Clinically significant skeletal variations of the shoulder and the wrist: role of MR imaging. Several skeletal variations of the upper extremity may cause painful conditions or precipitate early degenerative changes, either spontaneously or in response to overuse and trauma. Magnetic resonance imaging has proved particularly useful for accurate interpretation of many of these clinically significant skeletal variations; however, the widespread use of MR imaging may have contributed to over-emphasizing their clinical importance, which is still controversial in many cases. We review, illustrate, and discuss clinically significant skeletal variations of the upper extremity as seen on MR images, particularly those involving the shoulder and the wrist. In the shoulder region, we evaluate variations of acromial and coracoid processes as well as variations and minor dysplastic deformities of the glenoid fossa. We also review different skeletal variations of the carpal region, including ulnar variance, ulnar styloid, lunate morphology, carpal coalition, and carpal accessory ossicles. The role of MR imaging in assessing the clinical importance of such conditions, whether potential, controversial, or well established, is emphasized in this review.
{ "pile_set_name": "PubMed Abstracts" }
package networkapi // Copyright (c) Microsoft and contributors. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // // See the License for the specific language governing permissions and // limitations under the License. // // Code generated by Microsoft (R) AutoRest Code Generator. // Changes may cause incorrect behavior and will be lost if the code is regenerated. import ( "context" "github.com/Azure/azure-sdk-for-go/services/network/mgmt/2017-09-01/network" ) // BaseClientAPI contains the set of methods on the BaseClient type. type BaseClientAPI interface { CheckDNSNameAvailability(ctx context.Context, location string, domainNameLabel string) (result network.DNSNameAvailabilityResult, err error) } var _ BaseClientAPI = (*network.BaseClient)(nil) // ApplicationGatewaysClientAPI contains the set of methods on the ApplicationGatewaysClient type. type ApplicationGatewaysClientAPI interface { BackendHealth(ctx context.Context, resourceGroupName string, applicationGatewayName string, expand string) (result network.ApplicationGatewaysBackendHealthFuture, err error) CreateOrUpdate(ctx context.Context, resourceGroupName string, applicationGatewayName string, parameters network.ApplicationGateway) (result network.ApplicationGatewaysCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, applicationGatewayName string) (result network.ApplicationGatewaysDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, applicationGatewayName string) (result network.ApplicationGateway, err error) GetSslPredefinedPolicy(ctx context.Context, predefinedPolicyName string) (result network.ApplicationGatewaySslPredefinedPolicy, err error) List(ctx context.Context, resourceGroupName string) (result network.ApplicationGatewayListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string) (result network.ApplicationGatewayListResultIterator, err error) ListAll(ctx context.Context) (result network.ApplicationGatewayListResultPage, err error) ListAllComplete(ctx context.Context) (result network.ApplicationGatewayListResultIterator, err error) ListAvailableSslOptions(ctx context.Context) (result network.ApplicationGatewayAvailableSslOptions, err error) ListAvailableSslPredefinedPolicies(ctx context.Context) (result network.ApplicationGatewayAvailableSslPredefinedPoliciesPage, err error) ListAvailableSslPredefinedPoliciesComplete(ctx context.Context) (result network.ApplicationGatewayAvailableSslPredefinedPoliciesIterator, err error) ListAvailableWafRuleSets(ctx context.Context) (result network.ApplicationGatewayAvailableWafRuleSetsResult, err error) Start(ctx context.Context, resourceGroupName string, applicationGatewayName string) (result network.ApplicationGatewaysStartFuture, err error) Stop(ctx context.Context, resourceGroupName string, applicationGatewayName string) (result network.ApplicationGatewaysStopFuture, err error) UpdateTags(ctx context.Context, resourceGroupName string, applicationGatewayName string, parameters network.TagsObject) (result network.ApplicationGatewaysUpdateTagsFuture, err error) } var _ ApplicationGatewaysClientAPI = (*network.ApplicationGatewaysClient)(nil) // ApplicationSecurityGroupsClientAPI contains the set of methods on the ApplicationSecurityGroupsClient type. type ApplicationSecurityGroupsClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, applicationSecurityGroupName string, parameters network.ApplicationSecurityGroup) (result network.ApplicationSecurityGroupsCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, applicationSecurityGroupName string) (result network.ApplicationSecurityGroupsDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, applicationSecurityGroupName string) (result network.ApplicationSecurityGroup, err error) List(ctx context.Context, resourceGroupName string) (result network.ApplicationSecurityGroupListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string) (result network.ApplicationSecurityGroupListResultIterator, err error) ListAll(ctx context.Context) (result network.ApplicationSecurityGroupListResultPage, err error) ListAllComplete(ctx context.Context) (result network.ApplicationSecurityGroupListResultIterator, err error) } var _ ApplicationSecurityGroupsClientAPI = (*network.ApplicationSecurityGroupsClient)(nil) // AvailableEndpointServicesClientAPI contains the set of methods on the AvailableEndpointServicesClient type. type AvailableEndpointServicesClientAPI interface { List(ctx context.Context, location string) (result network.EndpointServicesListResultPage, err error) ListComplete(ctx context.Context, location string) (result network.EndpointServicesListResultIterator, err error) } var _ AvailableEndpointServicesClientAPI = (*network.AvailableEndpointServicesClient)(nil) // ExpressRouteCircuitAuthorizationsClientAPI contains the set of methods on the ExpressRouteCircuitAuthorizationsClient type. type ExpressRouteCircuitAuthorizationsClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, circuitName string, authorizationName string, authorizationParameters network.ExpressRouteCircuitAuthorization) (result network.ExpressRouteCircuitAuthorizationsCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, circuitName string, authorizationName string) (result network.ExpressRouteCircuitAuthorizationsDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, circuitName string, authorizationName string) (result network.ExpressRouteCircuitAuthorization, err error) List(ctx context.Context, resourceGroupName string, circuitName string) (result network.AuthorizationListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, circuitName string) (result network.AuthorizationListResultIterator, err error) } var _ ExpressRouteCircuitAuthorizationsClientAPI = (*network.ExpressRouteCircuitAuthorizationsClient)(nil) // ExpressRouteCircuitPeeringsClientAPI contains the set of methods on the ExpressRouteCircuitPeeringsClient type. type ExpressRouteCircuitPeeringsClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, circuitName string, peeringName string, peeringParameters network.ExpressRouteCircuitPeering) (result network.ExpressRouteCircuitPeeringsCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, circuitName string, peeringName string) (result network.ExpressRouteCircuitPeeringsDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, circuitName string, peeringName string) (result network.ExpressRouteCircuitPeering, err error) List(ctx context.Context, resourceGroupName string, circuitName string) (result network.ExpressRouteCircuitPeeringListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, circuitName string) (result network.ExpressRouteCircuitPeeringListResultIterator, err error) } var _ ExpressRouteCircuitPeeringsClientAPI = (*network.ExpressRouteCircuitPeeringsClient)(nil) // ExpressRouteCircuitsClientAPI contains the set of methods on the ExpressRouteCircuitsClient type. type ExpressRouteCircuitsClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, circuitName string, parameters network.ExpressRouteCircuit) (result network.ExpressRouteCircuitsCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, circuitName string) (result network.ExpressRouteCircuitsDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, circuitName string) (result network.ExpressRouteCircuit, err error) GetPeeringStats(ctx context.Context, resourceGroupName string, circuitName string, peeringName string) (result network.ExpressRouteCircuitStats, err error) GetStats(ctx context.Context, resourceGroupName string, circuitName string) (result network.ExpressRouteCircuitStats, err error) List(ctx context.Context, resourceGroupName string) (result network.ExpressRouteCircuitListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string) (result network.ExpressRouteCircuitListResultIterator, err error) ListAll(ctx context.Context) (result network.ExpressRouteCircuitListResultPage, err error) ListAllComplete(ctx context.Context) (result network.ExpressRouteCircuitListResultIterator, err error) ListArpTable(ctx context.Context, resourceGroupName string, circuitName string, peeringName string, devicePath string) (result network.ExpressRouteCircuitsListArpTableFuture, err error) ListRoutesTable(ctx context.Context, resourceGroupName string, circuitName string, peeringName string, devicePath string) (result network.ExpressRouteCircuitsListRoutesTableFuture, err error) ListRoutesTableSummary(ctx context.Context, resourceGroupName string, circuitName string, peeringName string, devicePath string) (result network.ExpressRouteCircuitsListRoutesTableSummaryFuture, err error) UpdateTags(ctx context.Context, resourceGroupName string, circuitName string, parameters network.TagsObject) (result network.ExpressRouteCircuitsUpdateTagsFuture, err error) } var _ ExpressRouteCircuitsClientAPI = (*network.ExpressRouteCircuitsClient)(nil) // ExpressRouteServiceProvidersClientAPI contains the set of methods on the ExpressRouteServiceProvidersClient type. type ExpressRouteServiceProvidersClientAPI interface { List(ctx context.Context) (result network.ExpressRouteServiceProviderListResultPage, err error) ListComplete(ctx context.Context) (result network.ExpressRouteServiceProviderListResultIterator, err error) } var _ ExpressRouteServiceProvidersClientAPI = (*network.ExpressRouteServiceProvidersClient)(nil) // LoadBalancersClientAPI contains the set of methods on the LoadBalancersClient type. type LoadBalancersClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, loadBalancerName string, parameters network.LoadBalancer) (result network.LoadBalancersCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, loadBalancerName string) (result network.LoadBalancersDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, loadBalancerName string, expand string) (result network.LoadBalancer, err error) List(ctx context.Context, resourceGroupName string) (result network.LoadBalancerListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string) (result network.LoadBalancerListResultIterator, err error) ListAll(ctx context.Context) (result network.LoadBalancerListResultPage, err error) ListAllComplete(ctx context.Context) (result network.LoadBalancerListResultIterator, err error) UpdateTags(ctx context.Context, resourceGroupName string, loadBalancerName string, parameters network.TagsObject) (result network.LoadBalancersUpdateTagsFuture, err error) } var _ LoadBalancersClientAPI = (*network.LoadBalancersClient)(nil) // LoadBalancerBackendAddressPoolsClientAPI contains the set of methods on the LoadBalancerBackendAddressPoolsClient type. type LoadBalancerBackendAddressPoolsClientAPI interface { Get(ctx context.Context, resourceGroupName string, loadBalancerName string, backendAddressPoolName string) (result network.BackendAddressPool, err error) List(ctx context.Context, resourceGroupName string, loadBalancerName string) (result network.LoadBalancerBackendAddressPoolListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, loadBalancerName string) (result network.LoadBalancerBackendAddressPoolListResultIterator, err error) } var _ LoadBalancerBackendAddressPoolsClientAPI = (*network.LoadBalancerBackendAddressPoolsClient)(nil) // LoadBalancerFrontendIPConfigurationsClientAPI contains the set of methods on the LoadBalancerFrontendIPConfigurationsClient type. type LoadBalancerFrontendIPConfigurationsClientAPI interface { Get(ctx context.Context, resourceGroupName string, loadBalancerName string, frontendIPConfigurationName string) (result network.FrontendIPConfiguration, err error) List(ctx context.Context, resourceGroupName string, loadBalancerName string) (result network.LoadBalancerFrontendIPConfigurationListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, loadBalancerName string) (result network.LoadBalancerFrontendIPConfigurationListResultIterator, err error) } var _ LoadBalancerFrontendIPConfigurationsClientAPI = (*network.LoadBalancerFrontendIPConfigurationsClient)(nil) // InboundNatRulesClientAPI contains the set of methods on the InboundNatRulesClient type. type InboundNatRulesClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, loadBalancerName string, inboundNatRuleName string, inboundNatRuleParameters network.InboundNatRule) (result network.InboundNatRulesCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, loadBalancerName string, inboundNatRuleName string) (result network.InboundNatRulesDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, loadBalancerName string, inboundNatRuleName string, expand string) (result network.InboundNatRule, err error) List(ctx context.Context, resourceGroupName string, loadBalancerName string) (result network.InboundNatRuleListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, loadBalancerName string) (result network.InboundNatRuleListResultIterator, err error) } var _ InboundNatRulesClientAPI = (*network.InboundNatRulesClient)(nil) // LoadBalancerLoadBalancingRulesClientAPI contains the set of methods on the LoadBalancerLoadBalancingRulesClient type. type LoadBalancerLoadBalancingRulesClientAPI interface { Get(ctx context.Context, resourceGroupName string, loadBalancerName string, loadBalancingRuleName string) (result network.LoadBalancingRule, err error) List(ctx context.Context, resourceGroupName string, loadBalancerName string) (result network.LoadBalancerLoadBalancingRuleListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, loadBalancerName string) (result network.LoadBalancerLoadBalancingRuleListResultIterator, err error) } var _ LoadBalancerLoadBalancingRulesClientAPI = (*network.LoadBalancerLoadBalancingRulesClient)(nil) // LoadBalancerNetworkInterfacesClientAPI contains the set of methods on the LoadBalancerNetworkInterfacesClient type. type LoadBalancerNetworkInterfacesClientAPI interface { List(ctx context.Context, resourceGroupName string, loadBalancerName string) (result network.InterfaceListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, loadBalancerName string) (result network.InterfaceListResultIterator, err error) } var _ LoadBalancerNetworkInterfacesClientAPI = (*network.LoadBalancerNetworkInterfacesClient)(nil) // LoadBalancerProbesClientAPI contains the set of methods on the LoadBalancerProbesClient type. type LoadBalancerProbesClientAPI interface { Get(ctx context.Context, resourceGroupName string, loadBalancerName string, probeName string) (result network.Probe, err error) List(ctx context.Context, resourceGroupName string, loadBalancerName string) (result network.LoadBalancerProbeListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, loadBalancerName string) (result network.LoadBalancerProbeListResultIterator, err error) } var _ LoadBalancerProbesClientAPI = (*network.LoadBalancerProbesClient)(nil) // InterfacesClientAPI contains the set of methods on the InterfacesClient type. type InterfacesClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, networkInterfaceName string, parameters network.Interface) (result network.InterfacesCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, networkInterfaceName string) (result network.InterfacesDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, networkInterfaceName string, expand string) (result network.Interface, err error) GetEffectiveRouteTable(ctx context.Context, resourceGroupName string, networkInterfaceName string) (result network.InterfacesGetEffectiveRouteTableFuture, err error) GetVirtualMachineScaleSetIPConfiguration(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, virtualmachineIndex string, networkInterfaceName string, IPConfigurationName string, expand string) (result network.InterfaceIPConfiguration, err error) GetVirtualMachineScaleSetNetworkInterface(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, virtualmachineIndex string, networkInterfaceName string, expand string) (result network.Interface, err error) List(ctx context.Context, resourceGroupName string) (result network.InterfaceListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string) (result network.InterfaceListResultIterator, err error) ListAll(ctx context.Context) (result network.InterfaceListResultPage, err error) ListAllComplete(ctx context.Context) (result network.InterfaceListResultIterator, err error) ListEffectiveNetworkSecurityGroups(ctx context.Context, resourceGroupName string, networkInterfaceName string) (result network.InterfacesListEffectiveNetworkSecurityGroupsFuture, err error) ListVirtualMachineScaleSetIPConfigurations(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, virtualmachineIndex string, networkInterfaceName string, expand string) (result network.InterfaceIPConfigurationListResultPage, err error) ListVirtualMachineScaleSetIPConfigurationsComplete(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, virtualmachineIndex string, networkInterfaceName string, expand string) (result network.InterfaceIPConfigurationListResultIterator, err error) ListVirtualMachineScaleSetNetworkInterfaces(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string) (result network.InterfaceListResultPage, err error) ListVirtualMachineScaleSetNetworkInterfacesComplete(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string) (result network.InterfaceListResultIterator, err error) ListVirtualMachineScaleSetVMNetworkInterfaces(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, virtualmachineIndex string) (result network.InterfaceListResultPage, err error) ListVirtualMachineScaleSetVMNetworkInterfacesComplete(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, virtualmachineIndex string) (result network.InterfaceListResultIterator, err error) UpdateTags(ctx context.Context, resourceGroupName string, networkInterfaceName string, parameters network.TagsObject) (result network.InterfacesUpdateTagsFuture, err error) } var _ InterfacesClientAPI = (*network.InterfacesClient)(nil) // InterfaceIPConfigurationsClientAPI contains the set of methods on the InterfaceIPConfigurationsClient type. type InterfaceIPConfigurationsClientAPI interface { Get(ctx context.Context, resourceGroupName string, networkInterfaceName string, IPConfigurationName string) (result network.InterfaceIPConfiguration, err error) List(ctx context.Context, resourceGroupName string, networkInterfaceName string) (result network.InterfaceIPConfigurationListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, networkInterfaceName string) (result network.InterfaceIPConfigurationListResultIterator, err error) } var _ InterfaceIPConfigurationsClientAPI = (*network.InterfaceIPConfigurationsClient)(nil) // InterfaceLoadBalancersClientAPI contains the set of methods on the InterfaceLoadBalancersClient type. type InterfaceLoadBalancersClientAPI interface { List(ctx context.Context, resourceGroupName string, networkInterfaceName string) (result network.InterfaceLoadBalancerListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, networkInterfaceName string) (result network.InterfaceLoadBalancerListResultIterator, err error) } var _ InterfaceLoadBalancersClientAPI = (*network.InterfaceLoadBalancersClient)(nil) // SecurityGroupsClientAPI contains the set of methods on the SecurityGroupsClient type. type SecurityGroupsClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, networkSecurityGroupName string, parameters network.SecurityGroup) (result network.SecurityGroupsCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, networkSecurityGroupName string) (result network.SecurityGroupsDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, networkSecurityGroupName string, expand string) (result network.SecurityGroup, err error) List(ctx context.Context, resourceGroupName string) (result network.SecurityGroupListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string) (result network.SecurityGroupListResultIterator, err error) ListAll(ctx context.Context) (result network.SecurityGroupListResultPage, err error) ListAllComplete(ctx context.Context) (result network.SecurityGroupListResultIterator, err error) UpdateTags(ctx context.Context, resourceGroupName string, networkSecurityGroupName string, parameters network.TagsObject) (result network.SecurityGroupsUpdateTagsFuture, err error) } var _ SecurityGroupsClientAPI = (*network.SecurityGroupsClient)(nil) // SecurityRulesClientAPI contains the set of methods on the SecurityRulesClient type. type SecurityRulesClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, networkSecurityGroupName string, securityRuleName string, securityRuleParameters network.SecurityRule) (result network.SecurityRulesCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, networkSecurityGroupName string, securityRuleName string) (result network.SecurityRulesDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, networkSecurityGroupName string, securityRuleName string) (result network.SecurityRule, err error) List(ctx context.Context, resourceGroupName string, networkSecurityGroupName string) (result network.SecurityRuleListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, networkSecurityGroupName string) (result network.SecurityRuleListResultIterator, err error) } var _ SecurityRulesClientAPI = (*network.SecurityRulesClient)(nil) // DefaultSecurityRulesClientAPI contains the set of methods on the DefaultSecurityRulesClient type. type DefaultSecurityRulesClientAPI interface { Get(ctx context.Context, resourceGroupName string, networkSecurityGroupName string, defaultSecurityRuleName string) (result network.SecurityRule, err error) List(ctx context.Context, resourceGroupName string, networkSecurityGroupName string) (result network.SecurityRuleListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, networkSecurityGroupName string) (result network.SecurityRuleListResultIterator, err error) } var _ DefaultSecurityRulesClientAPI = (*network.DefaultSecurityRulesClient)(nil) // WatchersClientAPI contains the set of methods on the WatchersClient type. type WatchersClientAPI interface { CheckConnectivity(ctx context.Context, resourceGroupName string, networkWatcherName string, parameters network.ConnectivityParameters) (result network.WatchersCheckConnectivityFuture, err error) CreateOrUpdate(ctx context.Context, resourceGroupName string, networkWatcherName string, parameters network.Watcher) (result network.Watcher, err error) Delete(ctx context.Context, resourceGroupName string, networkWatcherName string) (result network.WatchersDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, networkWatcherName string) (result network.Watcher, err error) GetAzureReachabilityReport(ctx context.Context, resourceGroupName string, networkWatcherName string, parameters network.AzureReachabilityReportParameters) (result network.WatchersGetAzureReachabilityReportFuture, err error) GetFlowLogStatus(ctx context.Context, resourceGroupName string, networkWatcherName string, parameters network.FlowLogStatusParameters) (result network.WatchersGetFlowLogStatusFuture, err error) GetNextHop(ctx context.Context, resourceGroupName string, networkWatcherName string, parameters network.NextHopParameters) (result network.WatchersGetNextHopFuture, err error) GetTopology(ctx context.Context, resourceGroupName string, networkWatcherName string, parameters network.TopologyParameters) (result network.Topology, err error) GetTroubleshooting(ctx context.Context, resourceGroupName string, networkWatcherName string, parameters network.TroubleshootingParameters) (result network.WatchersGetTroubleshootingFuture, err error) GetTroubleshootingResult(ctx context.Context, resourceGroupName string, networkWatcherName string, parameters network.QueryTroubleshootingParameters) (result network.WatchersGetTroubleshootingResultFuture, err error) GetVMSecurityRules(ctx context.Context, resourceGroupName string, networkWatcherName string, parameters network.SecurityGroupViewParameters) (result network.WatchersGetVMSecurityRulesFuture, err error) List(ctx context.Context, resourceGroupName string) (result network.WatcherListResult, err error) ListAll(ctx context.Context) (result network.WatcherListResult, err error) ListAvailableProviders(ctx context.Context, resourceGroupName string, networkWatcherName string, parameters network.AvailableProvidersListParameters) (result network.WatchersListAvailableProvidersFuture, err error) SetFlowLogConfiguration(ctx context.Context, resourceGroupName string, networkWatcherName string, parameters network.FlowLogInformation) (result network.WatchersSetFlowLogConfigurationFuture, err error) UpdateTags(ctx context.Context, resourceGroupName string, networkWatcherName string, parameters network.TagsObject) (result network.Watcher, err error) VerifyIPFlow(ctx context.Context, resourceGroupName string, networkWatcherName string, parameters network.VerificationIPFlowParameters) (result network.WatchersVerifyIPFlowFuture, err error) } var _ WatchersClientAPI = (*network.WatchersClient)(nil) // PacketCapturesClientAPI contains the set of methods on the PacketCapturesClient type. type PacketCapturesClientAPI interface { Create(ctx context.Context, resourceGroupName string, networkWatcherName string, packetCaptureName string, parameters network.PacketCapture) (result network.PacketCapturesCreateFuture, err error) Delete(ctx context.Context, resourceGroupName string, networkWatcherName string, packetCaptureName string) (result network.PacketCapturesDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, networkWatcherName string, packetCaptureName string) (result network.PacketCaptureResult, err error) GetStatus(ctx context.Context, resourceGroupName string, networkWatcherName string, packetCaptureName string) (result network.PacketCapturesGetStatusFuture, err error) List(ctx context.Context, resourceGroupName string, networkWatcherName string) (result network.PacketCaptureListResult, err error) Stop(ctx context.Context, resourceGroupName string, networkWatcherName string, packetCaptureName string) (result network.PacketCapturesStopFuture, err error) } var _ PacketCapturesClientAPI = (*network.PacketCapturesClient)(nil) // OperationsClientAPI contains the set of methods on the OperationsClient type. type OperationsClientAPI interface { List(ctx context.Context) (result network.OperationListResultPage, err error) ListComplete(ctx context.Context) (result network.OperationListResultIterator, err error) } var _ OperationsClientAPI = (*network.OperationsClient)(nil) // PublicIPAddressesClientAPI contains the set of methods on the PublicIPAddressesClient type. type PublicIPAddressesClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, publicIPAddressName string, parameters network.PublicIPAddress) (result network.PublicIPAddressesCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, publicIPAddressName string) (result network.PublicIPAddressesDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, publicIPAddressName string, expand string) (result network.PublicIPAddress, err error) GetVirtualMachineScaleSetPublicIPAddress(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, virtualmachineIndex string, networkInterfaceName string, IPConfigurationName string, publicIPAddressName string, expand string) (result network.PublicIPAddress, err error) List(ctx context.Context, resourceGroupName string) (result network.PublicIPAddressListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string) (result network.PublicIPAddressListResultIterator, err error) ListAll(ctx context.Context) (result network.PublicIPAddressListResultPage, err error) ListAllComplete(ctx context.Context) (result network.PublicIPAddressListResultIterator, err error) ListVirtualMachineScaleSetPublicIPAddresses(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string) (result network.PublicIPAddressListResultPage, err error) ListVirtualMachineScaleSetPublicIPAddressesComplete(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string) (result network.PublicIPAddressListResultIterator, err error) ListVirtualMachineScaleSetVMPublicIPAddresses(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, virtualmachineIndex string, networkInterfaceName string, IPConfigurationName string) (result network.PublicIPAddressListResultPage, err error) ListVirtualMachineScaleSetVMPublicIPAddressesComplete(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, virtualmachineIndex string, networkInterfaceName string, IPConfigurationName string) (result network.PublicIPAddressListResultIterator, err error) UpdateTags(ctx context.Context, resourceGroupName string, publicIPAddressName string, parameters network.TagsObject) (result network.PublicIPAddressesUpdateTagsFuture, err error) } var _ PublicIPAddressesClientAPI = (*network.PublicIPAddressesClient)(nil) // RouteFiltersClientAPI contains the set of methods on the RouteFiltersClient type. type RouteFiltersClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, routeFilterName string, routeFilterParameters network.RouteFilter) (result network.RouteFiltersCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, routeFilterName string) (result network.RouteFiltersDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, routeFilterName string, expand string) (result network.RouteFilter, err error) List(ctx context.Context) (result network.RouteFilterListResultPage, err error) ListComplete(ctx context.Context) (result network.RouteFilterListResultIterator, err error) ListByResourceGroup(ctx context.Context, resourceGroupName string) (result network.RouteFilterListResultPage, err error) ListByResourceGroupComplete(ctx context.Context, resourceGroupName string) (result network.RouteFilterListResultIterator, err error) Update(ctx context.Context, resourceGroupName string, routeFilterName string, routeFilterParameters network.PatchRouteFilter) (result network.RouteFiltersUpdateFuture, err error) } var _ RouteFiltersClientAPI = (*network.RouteFiltersClient)(nil) // RouteFilterRulesClientAPI contains the set of methods on the RouteFilterRulesClient type. type RouteFilterRulesClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, routeFilterName string, ruleName string, routeFilterRuleParameters network.RouteFilterRule) (result network.RouteFilterRulesCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, routeFilterName string, ruleName string) (result network.RouteFilterRulesDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, routeFilterName string, ruleName string) (result network.RouteFilterRule, err error) ListByRouteFilter(ctx context.Context, resourceGroupName string, routeFilterName string) (result network.RouteFilterRuleListResultPage, err error) ListByRouteFilterComplete(ctx context.Context, resourceGroupName string, routeFilterName string) (result network.RouteFilterRuleListResultIterator, err error) Update(ctx context.Context, resourceGroupName string, routeFilterName string, ruleName string, routeFilterRuleParameters network.PatchRouteFilterRule) (result network.RouteFilterRulesUpdateFuture, err error) } var _ RouteFilterRulesClientAPI = (*network.RouteFilterRulesClient)(nil) // RouteTablesClientAPI contains the set of methods on the RouteTablesClient type. type RouteTablesClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, routeTableName string, parameters network.RouteTable) (result network.RouteTablesCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, routeTableName string) (result network.RouteTablesDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, routeTableName string, expand string) (result network.RouteTable, err error) List(ctx context.Context, resourceGroupName string) (result network.RouteTableListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string) (result network.RouteTableListResultIterator, err error) ListAll(ctx context.Context) (result network.RouteTableListResultPage, err error) ListAllComplete(ctx context.Context) (result network.RouteTableListResultIterator, err error) UpdateTags(ctx context.Context, resourceGroupName string, routeTableName string, parameters network.TagsObject) (result network.RouteTablesUpdateTagsFuture, err error) } var _ RouteTablesClientAPI = (*network.RouteTablesClient)(nil) // RoutesClientAPI contains the set of methods on the RoutesClient type. type RoutesClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, routeTableName string, routeName string, routeParameters network.Route) (result network.RoutesCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, routeTableName string, routeName string) (result network.RoutesDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, routeTableName string, routeName string) (result network.Route, err error) List(ctx context.Context, resourceGroupName string, routeTableName string) (result network.RouteListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, routeTableName string) (result network.RouteListResultIterator, err error) } var _ RoutesClientAPI = (*network.RoutesClient)(nil) // BgpServiceCommunitiesClientAPI contains the set of methods on the BgpServiceCommunitiesClient type. type BgpServiceCommunitiesClientAPI interface { List(ctx context.Context) (result network.BgpServiceCommunityListResultPage, err error) ListComplete(ctx context.Context) (result network.BgpServiceCommunityListResultIterator, err error) } var _ BgpServiceCommunitiesClientAPI = (*network.BgpServiceCommunitiesClient)(nil) // UsagesClientAPI contains the set of methods on the UsagesClient type. type UsagesClientAPI interface { List(ctx context.Context, location string) (result network.UsagesListResultPage, err error) ListComplete(ctx context.Context, location string) (result network.UsagesListResultIterator, err error) } var _ UsagesClientAPI = (*network.UsagesClient)(nil) // VirtualNetworksClientAPI contains the set of methods on the VirtualNetworksClient type. type VirtualNetworksClientAPI interface { CheckIPAddressAvailability(ctx context.Context, resourceGroupName string, virtualNetworkName string, IPAddress string) (result network.IPAddressAvailabilityResult, err error) CreateOrUpdate(ctx context.Context, resourceGroupName string, virtualNetworkName string, parameters network.VirtualNetwork) (result network.VirtualNetworksCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, virtualNetworkName string) (result network.VirtualNetworksDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, virtualNetworkName string, expand string) (result network.VirtualNetwork, err error) List(ctx context.Context, resourceGroupName string) (result network.VirtualNetworkListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string) (result network.VirtualNetworkListResultIterator, err error) ListAll(ctx context.Context) (result network.VirtualNetworkListResultPage, err error) ListAllComplete(ctx context.Context) (result network.VirtualNetworkListResultIterator, err error) ListUsage(ctx context.Context, resourceGroupName string, virtualNetworkName string) (result network.VirtualNetworkListUsageResultPage, err error) ListUsageComplete(ctx context.Context, resourceGroupName string, virtualNetworkName string) (result network.VirtualNetworkListUsageResultIterator, err error) UpdateTags(ctx context.Context, resourceGroupName string, virtualNetworkName string, parameters network.TagsObject) (result network.VirtualNetworksUpdateTagsFuture, err error) } var _ VirtualNetworksClientAPI = (*network.VirtualNetworksClient)(nil) // SubnetsClientAPI contains the set of methods on the SubnetsClient type. type SubnetsClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, virtualNetworkName string, subnetName string, subnetParameters network.Subnet) (result network.SubnetsCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, virtualNetworkName string, subnetName string) (result network.SubnetsDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, virtualNetworkName string, subnetName string, expand string) (result network.Subnet, err error) List(ctx context.Context, resourceGroupName string, virtualNetworkName string) (result network.SubnetListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, virtualNetworkName string) (result network.SubnetListResultIterator, err error) } var _ SubnetsClientAPI = (*network.SubnetsClient)(nil) // VirtualNetworkPeeringsClientAPI contains the set of methods on the VirtualNetworkPeeringsClient type. type VirtualNetworkPeeringsClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, virtualNetworkName string, virtualNetworkPeeringName string, virtualNetworkPeeringParameters network.VirtualNetworkPeering) (result network.VirtualNetworkPeeringsCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, virtualNetworkName string, virtualNetworkPeeringName string) (result network.VirtualNetworkPeeringsDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, virtualNetworkName string, virtualNetworkPeeringName string) (result network.VirtualNetworkPeering, err error) List(ctx context.Context, resourceGroupName string, virtualNetworkName string) (result network.VirtualNetworkPeeringListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string, virtualNetworkName string) (result network.VirtualNetworkPeeringListResultIterator, err error) } var _ VirtualNetworkPeeringsClientAPI = (*network.VirtualNetworkPeeringsClient)(nil) // VirtualNetworkGatewaysClientAPI contains the set of methods on the VirtualNetworkGatewaysClient type. type VirtualNetworkGatewaysClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string, parameters network.VirtualNetworkGateway) (result network.VirtualNetworkGatewaysCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string) (result network.VirtualNetworkGatewaysDeleteFuture, err error) Generatevpnclientpackage(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string, parameters network.VpnClientParameters) (result network.VirtualNetworkGatewaysGeneratevpnclientpackageFuture, err error) GenerateVpnProfile(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string, parameters network.VpnClientParameters) (result network.VirtualNetworkGatewaysGenerateVpnProfileFuture, err error) Get(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string) (result network.VirtualNetworkGateway, err error) GetAdvertisedRoutes(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string, peer string) (result network.VirtualNetworkGatewaysGetAdvertisedRoutesFuture, err error) GetBgpPeerStatus(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string, peer string) (result network.VirtualNetworkGatewaysGetBgpPeerStatusFuture, err error) GetLearnedRoutes(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string) (result network.VirtualNetworkGatewaysGetLearnedRoutesFuture, err error) GetVpnProfilePackageURL(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string) (result network.VirtualNetworkGatewaysGetVpnProfilePackageURLFuture, err error) List(ctx context.Context, resourceGroupName string) (result network.VirtualNetworkGatewayListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string) (result network.VirtualNetworkGatewayListResultIterator, err error) ListConnections(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string) (result network.VirtualNetworkGatewayListConnectionsResultPage, err error) ListConnectionsComplete(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string) (result network.VirtualNetworkGatewayListConnectionsResultIterator, err error) Reset(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string, gatewayVip string) (result network.VirtualNetworkGatewaysResetFuture, err error) SupportedVpnDevices(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string) (result network.String, err error) UpdateTags(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string, parameters network.TagsObject) (result network.VirtualNetworkGatewaysUpdateTagsFuture, err error) VpnDeviceConfigurationScript(ctx context.Context, resourceGroupName string, virtualNetworkGatewayConnectionName string, parameters network.VpnDeviceScriptParameters) (result network.String, err error) } var _ VirtualNetworkGatewaysClientAPI = (*network.VirtualNetworkGatewaysClient)(nil) // VirtualNetworkGatewayConnectionsClientAPI contains the set of methods on the VirtualNetworkGatewayConnectionsClient type. type VirtualNetworkGatewayConnectionsClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, virtualNetworkGatewayConnectionName string, parameters network.VirtualNetworkGatewayConnection) (result network.VirtualNetworkGatewayConnectionsCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, virtualNetworkGatewayConnectionName string) (result network.VirtualNetworkGatewayConnectionsDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, virtualNetworkGatewayConnectionName string) (result network.VirtualNetworkGatewayConnection, err error) GetSharedKey(ctx context.Context, resourceGroupName string, virtualNetworkGatewayConnectionName string) (result network.ConnectionSharedKey, err error) List(ctx context.Context, resourceGroupName string) (result network.VirtualNetworkGatewayConnectionListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string) (result network.VirtualNetworkGatewayConnectionListResultIterator, err error) ResetSharedKey(ctx context.Context, resourceGroupName string, virtualNetworkGatewayConnectionName string, parameters network.ConnectionResetSharedKey) (result network.VirtualNetworkGatewayConnectionsResetSharedKeyFuture, err error) SetSharedKey(ctx context.Context, resourceGroupName string, virtualNetworkGatewayConnectionName string, parameters network.ConnectionSharedKey) (result network.VirtualNetworkGatewayConnectionsSetSharedKeyFuture, err error) UpdateTags(ctx context.Context, resourceGroupName string, virtualNetworkGatewayConnectionName string, parameters network.TagsObject) (result network.VirtualNetworkGatewayConnectionsUpdateTagsFuture, err error) } var _ VirtualNetworkGatewayConnectionsClientAPI = (*network.VirtualNetworkGatewayConnectionsClient)(nil) // LocalNetworkGatewaysClientAPI contains the set of methods on the LocalNetworkGatewaysClient type. type LocalNetworkGatewaysClientAPI interface { CreateOrUpdate(ctx context.Context, resourceGroupName string, localNetworkGatewayName string, parameters network.LocalNetworkGateway) (result network.LocalNetworkGatewaysCreateOrUpdateFuture, err error) Delete(ctx context.Context, resourceGroupName string, localNetworkGatewayName string) (result network.LocalNetworkGatewaysDeleteFuture, err error) Get(ctx context.Context, resourceGroupName string, localNetworkGatewayName string) (result network.LocalNetworkGateway, err error) List(ctx context.Context, resourceGroupName string) (result network.LocalNetworkGatewayListResultPage, err error) ListComplete(ctx context.Context, resourceGroupName string) (result network.LocalNetworkGatewayListResultIterator, err error) UpdateTags(ctx context.Context, resourceGroupName string, localNetworkGatewayName string, parameters network.TagsObject) (result network.LocalNetworkGatewaysUpdateTagsFuture, err error) } var _ LocalNetworkGatewaysClientAPI = (*network.LocalNetworkGatewaysClient)(nil)
{ "pile_set_name": "Github" }
This IEEE Classic Reissue provides at an advanced level, a uniquely fundamental exposition of the applications of Statistical Communication Theory to a vast spectrum of important physical problems. Included are general analysis of signal detection, estimation, measurement, and related topics involving information transfer. Using the statistical Bayesian viewpoint, renowned author David Middleton employs statistical decision theory specifically tailored for the general tasks of signal processing. Dr. Middleton also provides a special focus on physical modeling of the canonical channel with real-world examples relating to radar, sonar, and general telecommunications. This book offers a detailed treatment and an array of problems and results spanning an exceptionally broad range of technical subjects in the communications field. Complete with special functions, integrals, solutions of integral equations, and an extensive, updated bibliography by chapter, An Introduction to Statistical Communication Theory is a seminal reference, particularly for anyone working in the field of communications, as well as in other areas of statistical physics. (Originally published in 1960.) The prelims comprise: Half Title Copyright Title IEEE Press Board Page Dedication Foreword to the IEEE Press Reissue Preface to the Second Reprint Edition (1996) Preface to the First Reprint Edition (1987-1995) Preface to the First Edition (1960) Contents View full abstract» This IEEE Classic Reissue provides at an advanced level, a uniquely fundamental exposition of the applications of Statistical Communication Theory to a vast spectrum of important physical problems. Included are general analysis of signal detection, estimation, measurement, and related topics involving information transfer. Using the statistical Bayesian viewpoint, renowned author David Middleton employs statistical decision theory specifically tailored for the general tasks of signal processing. Dr. Middleton also provides a special focus on physical modeling of the canonical channel with real-world examples relating to radar, sonar, and general telecommunications. This book offers a detailed treatment and an array of problems and results spanning an exceptionally broad range of technical subjects in the communications field. Complete with special functions, integrals, solutions of integral equations, and an extensive, updated bibliography by chapter, An Introduction to Statistical Communication Theory is a seminal reference, particularly for anyone working in the field of communications, as well as in other areas of statistical physics. (Originally published in 1960.) View full abstract» This IEEE Classic Reissue provides at an advanced level, a uniquely fundamental exposition of the applications of Statistical Communication Theory to a vast spectrum of important physical problems. Included are general analysis of signal detection, estimation, measurement, and related topics involving information transfer. Using the statistical Bayesian viewpoint, renowned author David Middleton employs statistical decision theory specifically tailored for the general tasks of signal processing. Dr. Middleton also provides a special focus on physical modeling of the canonical channel with real-world examples relating to radar, sonar, and general telecommunications. This book offers a detailed treatment and an array of problems and results spanning an exceptionally broad range of technical subjects in the communications field. Complete with special functions, integrals, solutions of integral equations, and an extensive, updated bibliography by chapter, An Introduction to Statistical Communication Theory is a seminal reference, particularly for anyone working in the field of communications, as well as in other areas of statistical physics. (Originally published in 1960.) View full abstract» This chapter contains sections titled: Formulation in Terms of a Stochastic Differential Equation: The Langevin Equation Some Examples Leading to a Diffusion Equation The Equation of Fokker-Planck and its Relation to the Langevin Equation The Gaussian Random Process This chapter contains sections titled: References View full abstract» This IEEE Classic Reissue provides at an advanced level, a uniquely fundamental exposition of the applications of Statistical Communication Theory to a vast spectrum of important physical problems. Included are general analysis of signal detection, estimation, measurement, and related topics involving information transfer. Using the statistical Bayesian viewpoint, renowned author David Middleton employs statistical decision theory specifically tailored for the general tasks of signal processing. Dr. Middleton also provides a special focus on physical modeling of the canonical channel with real-world examples relating to radar, sonar, and general telecommunications. This book offers a detailed treatment and an array of problems and results spanning an exceptionally broad range of technical subjects in the communications field. Complete with special functions, integrals, solutions of integral equations, and an extensive, updated bibliography by chapter, An Introduction to Statistical Communication Theory is a seminal reference, particularly for anyone working in the field of communications, as well as in other areas of statistical physics. (Originally published in 1960.) View full abstract» This chapter contains sections titled: The FM Receiver The Mean and Mean-square Output of an FM Receiver The Reception of Narrowband Frequency Modulation Covariance Function and Spectrum of the Output of the FM Receiver (General Theory) Special Cases for Broadband Frequency Modulation This chapter contains sections titled: References View full abstract» This IEEE Classic Reissue provides at an advanced level, a uniquely fundamental exposition of the applications of Statistical Communication Theory to a vast spectrum of important physical problems. Included are general analysis of signal detection, estimation, measurement, and related topics involving information transfer. Using the statistical Bayesian viewpoint, renowned author David Middleton employs statistical decision theory specifically tailored for the general tasks of signal processing. Dr. Middleton also provides a special focus on physical modeling of the canonical channel with real-world examples relating to radar, sonar, and general telecommunications. This book offers a detailed treatment and an array of problems and results spanning an exceptionally broad range of technical subjects in the communications field. Complete with special functions, integrals, solutions of integral equations, and an extensive, updated bibliography by chapter, An Introduction to Statistical Communication Theory is a seminal reference, particularly for anyone working in the field of communications, as well as in other areas of statistical physics. (Originally published in 1960.) View full abstract» This IEEE Classic Reissue provides at an advanced level, a uniquely fundamental exposition of the applications of Statistical Communication Theory to a vast spectrum of important physical problems. Included are general analysis of signal detection, estimation, measurement, and related topics involving information transfer. Using the statistical Bayesian viewpoint, renowned author David Middleton employs statistical decision theory specifically tailored for the general tasks of signal processing. Dr. Middleton also provides a special focus on physical modeling of the canonical channel with real-world examples relating to radar, sonar, and general telecommunications. This book offers a detailed treatment and an array of problems and results spanning an exceptionally broad range of technical subjects in the communications field. Complete with special functions, integrals, solutions of integral equations, and an extensive, updated bibliography by chapter, An Introduction to Statistical Communication Theory is a seminal reference, particularly for anyone working in the field of communications, as well as in other areas of statistical physics. (Originally published in 1960.) View full abstract» This IEEE Classic Reissue provides at an advanced level, a uniquely fundamental exposition of the applications of Statistical Communication Theory to a vast spectrum of important physical problems. Included are general analysis of signal detection, estimation, measurement, and related topics involving information transfer. Using the statistical Bayesian viewpoint, renowned author David Middleton employs statistical decision theory specifically tailored for the general tasks of signal processing. Dr. Middleton also provides a special focus on physical modeling of the canonical channel with real-world examples relating to radar, sonar, and general telecommunications. This book offers a detailed treatment and an array of problems and results spanning an exceptionally broad range of technical subjects in the communications field. Complete with special functions, integrals, solutions of integral equations, and an extensive, updated bibliography by chapter, An Introduction to Statistical Communication Theory is a seminal reference, particularly for anyone working in the field of communications, as well as in other areas of statistical physics. (Originally published in 1960.) View full abstract» This IEEE Classic Reissue provides at an advanced level, a uniquely fundamental exposition of the applications of Statistical Communication Theory to a vast spectrum of important physical problems. Included are general analysis of signal detection, estimation, measurement, and related topics involving information transfer. Using the statistical Bayesian viewpoint, renowned author David Middleton employs statistical decision theory specifically tailored for the general tasks of signal processing. Dr. Middleton also provides a special focus on physical modeling of the canonical channel with real-world examples relating to radar, sonar, and general telecommunications. This book offers a detailed treatment and an array of problems and results spanning an exceptionally broad range of technical subjects in the communications field. Complete with special functions, integrals, solutions of integral equations, and an extensive, updated bibliography by chapter, An Introduction to Statistical Communication Theory is a seminal reference, particularly for anyone working in the field of communications, as well as in other areas of statistical physics. (Originally published in 1960.) View full abstract» This IEEE Classic Reissue provides at an advanced level, a uniquely fundamental exposition of the applications of Statistical Communication Theory to a vast spectrum of important physical problems. Included are general analysis of signal detection, estimation, measurement, and related topics involving information transfer. Using the statistical Bayesian viewpoint, renowned author David Middleton employs statistical decision theory specifically tailored for the general tasks of signal processing. Dr. Middleton also provides a special focus on physical modeling of the canonical channel with real-world examples relating to radar, sonar, and general telecommunications. This book offers a detailed treatment and an array of problems and results spanning an exceptionally broad range of technical subjects in the communications field. Complete with special functions, integrals, solutions of integral equations, and an extensive, updated bibliography by chapter, An Introduction to Statistical Communication Theory is a seminal reference, particularly for anyone working in the field of communications, as well as in other areas of statistical physics. (Originally published in 1960.) View full abstract»
{ "pile_set_name": "Pile-CC" }
Nero Multimedia Suite Nero Multimedia Suite is a software suite for Microsoft Windows that is developed and marketed by Nero AG. Version 2017 of this product was released in October 2016. Version differences Since its Version 10, Nero provides two variants of the suite – the Classic and the Platinum. The Platinum version includes the following additional functions: Music recorder - to record MP3s from worldwide radios stations (since Nero 2016) Video editing in Ultra-HD (since version 2014) and in HEVC (Since Nero 2017 but only available in Nero Video and not available in Nero Recode) Additional video, transition and picture-in-picture effects SecurDisc 4.0 Technology with 256 bit-encryption (since Nero 2017) Additional film templates and disc menu templates Blu-ray disc ripping and conversion Blu-ray playback (not possible with Nero 2016, only with previous versions) Included products The following applications are included in Nero 2016: Disc authoring and copying Nero Burning ROM: an optical disc authoring program for CDs, DVDs, and Blu-rays by Nero AG and one of its first products. The product is also available separately. It includes several functions for audio format conversion, the creation of audio CDs, etc.. As of version 2015, Nero AirBurn App and Nero Burning ROM enable users to burn media via their mobile devices. Nero Express: a simplified version of Nero Burning ROM targeted at novices. The Nero AirBurn app does not work with Nero Express. Video editing and creating of video discs Nero Video: is a software tool for creating and editing videos. It combines editing tools (including the addition of effects, music and themes) and video export as well as DVD and Blu-ray authoring. The product provides simple editing functions for novices (in Express mode) as well as advanced video editing (Advanced mode). It is available separately as a download. Data conversion Nero Recode: converts video and audio files as well as non-copyright-protected video DVDs and Blu-Rays into multiple video formats. Nero Disc to Device is an easy-to-use application for converting video discs and audio CDs for playback on mobile devices or in the cloud. Nero MediaHome enables users to manage and play their images, videos and music files. Alongside ripping and the creation of playlists and slideshows, MediaHome includes features that let users sort their media, including tagging, face recognition system in photos, geo location support and manual geotagging for photos and videos. Streaming to TVs and home media players is also included. Starting with Version 2015, users can stream media directly to their mobile devices (iOS, Android, Amazon) with the Nero MediaHome Receiver App. Nero MediaHome is also available with limited functionality as a free download from nero.com. Nero Media Browser: simple tools for retrieving media content. It makes the Nero MediaHome media library also available to non-Nero programs using simple drag and drop. Nero Blu-ray Player (not in Nero 2016 Platinum, only in the previous Platinum version.): media player for Blu-ray discs Data rescue Nero RescueAgent: helps users to recover files from damaged or partially unreadable media (discs, hard disks, USB thumb drives and flash drives) and to restore files that were accidentally deleted. Nero BackItUp: a system backup utility. It was integral part of Nero 6, 7, 8, 10 and 11 suites. With the introduction of Nero 9 Nero BackItUp 4 became a standalone backup product, while its successor, Nero BackItUp 5, was the main application of Nero BackItUp & Burn Later, the product was re-integrated into Nero Multimedia Suite 10 and is now included in Nero 11. The product can also be purchased separately. Free Tools The following components were part of the suite until Version 11. They are now available for download separately and are free of charge. Nero CoverDesigner: enables users to design and print disc covers and labels Nero BurnRights: enables administrators to provide other users with access to drives Nero DiscSpeed: a disc speed measurement and performance diagnostics tool Nero WaveEditor: an audio editing tool capable of recording, editing, filtering, and exporting music files. Nero SoundTrax: a tool for recording, mixing and digitizing music tracks. Nero InCD Reader 5: this tools enables users to read CDs created with InCD Nero SecurDisc Viewer: this tool enables users to read discs created with SecurDisc. Notes and references External links Official Website Category:Optical disc authoring software Category:Shareware Category:Windows CD/DVD writing software Category:Linux CD/DVD writing software
{ "pile_set_name": "Wikipedia (en)" }
F I L E D United States Court of Appeals Tenth Circuit UNITED STATES COURT OF APPEALS APR 26 2000 TENTH CIRCUIT PATRICK FISHER Clerk BRENT B. GOLDEN, Plaintiff - Appellant, vs. No. 99-7124 (D.C. No. 98-CV-298-S) DON WATERS, Sheriff of Carter (E.D. Okla.) County Detention a/k/a Don Water, Defendant - Appellee. ORDER AND JUDGMENT * Before BRORBY, KELLY, and MURPHY, Circuit Judges. ** Plaintiff-Appellant Brent Golden, an inmate appearing pro se, appeals from the dismissal of his prisoner civil rights claim, 42 U.S.C. § 1983. Mr. Golden was stabbed in the neck with a pencil by another inmate, James Thompson, during a prison fight. He brought the instant case against the prison warden claiming a violation of the Eighth Amendment. The district court dismissed the claim as * This order and judgment is not binding precedent, except under the doctrines of law of the case, res judicata, and collateral estoppel. This court generally disfavors the citation of orders and judgments; nevertheless, an order and judgment may be cited under the terms and conditions of 10th Cir. R. 36.3. ** After examining the briefs and the appellate record, this three-judge panel has determined unanimously that oral argument would not be of material assistance in the determination of this appeal. See Fed. R. App. P. 34(a); 10th Cir. R. 34.1 (G). The cause is therefore ordered submitted without oral argument. without merit under 28 U.S.C. § 1915(e)(2), although the judge considered summary judgment affidavit evidence. Our jurisdiction arises under 28 U.S.C. § 1291 and we affirm, treating the case as an appeal from the grant of summary judgment. In order to prevail on an Eighth Amendment claim against the warden for injuries caused by another inmate, Mr. Golden must show that prison officials acted with “deliberate indifference” for his health and safety. See Lopez v. LeMaster, 172 F.3d 756, 760 (10th Cir. 1999); see also Barrie v. Grand County, Utah, 119 F.3d 862, 868-69 (10th Cir. 1997) (applying this standard to pre-trial detainees). This test requires proof that the prison official subjectively knew of and disregarded “an excessive risk to inmate health or safety.” Farmer v. Brennan, 511 U.S. 825, 837 (1994); see also Berry v. Muskogee, 900 F.2d 1489, 1496 (10th Cir. 1990) (official must disregard a known or obvious risk). As stated in an affidavit by Defendant Waters, it was the practice of the prison to segregate inmates who posed a threat to other prisoners. Prior to plaintiff’s injury, Mr. Thompson had not threatened or assaulted any of the other prisoners. Therefore, Defendant Waters, who was not present at the time of the fight, did not consider him to be a threat to other prisoners. After the fight, both Mr. Golden and Mr. Thompson were placed in lockdown. Because Mr. Golden failed to demonstrate any deliberate indifference on the part of Defendant Waters, -2- the district court correctly dismissed his claim. AFFIRMED. Entered for the Court Paul J. Kelly, Jr. Circuit Judge -3-
{ "pile_set_name": "FreeLaw" }
Hard times in the Kremlin: Putin, whose plans were disrupted, and the Russian regions in the conditions of coronavirus (T24, Turkey) part 2 The mood of the Russian President Putin seems to have got corrupted. Every day I look at him on the TV screen at meetings with members of government and heads of regions to combat coronavirus and clearly see the sad expression on his face. Sometimes he listens to the speakers with intense facial expressions and seemed barely restrained, and at times, interrupting the speaker, gives guidance on measures for combating coronavirus. I think that the mood of the Russian leader not only spoil the coronavirus. The collapsed political plans also influenced his emotional state. Let me explain. Putin has been in power for 20 years. The Russian leader, who has previously repeatedly said that “he will not remain in the presidency until death” and “will not change the Constitution”, in the first months of this year, made statements that the country will reform the political system. All that was said, created the impression that Putin, rebuilding the highest public office, is trying to take measures in order to protect the country and policies, as well as after expiry of the term of office and he’ll leave the presidency in 2024 (and maybe earlier). But suddenly something unexpected happened (it was either part of a pre-prepared plan, or a result of pressure of some official and economic circles of Putin, they say, “you don’t have to leave his post”). Putin did not rule out the possibility that “if the necessary amendments to the Constitution,” it can continue its work for another two terms starting in 2024, namely, to 2036, or in other words, to his 84 years. The first step of this “political reform” was supposed to be a referendum, scheduled for 22 April 2020. But the coronavirus, damn it, broke the plans. According to some Russian commentators, including this plan in Russia, there was a delay in the adoption of measures to prevent the spread of coronavirus. According to one version, the masters of the Kremlin wanted to hold a referendum on April 22 and April 23 to declare a quarantine, but when the danger of coronavirus outweighed, refuse it. When this reason failed to carry out properly the celebration of may 9 Victory Day (the 75th anniversary of the victory in world war II), which are of great importance from the point of view of the international prestige of the Russian leadership, the mood has become worse. It was a very unfortunate event for the Russian leader. After all, the political fate of Putin, accustomed to the end to put launch plans in life, now depended not only on the effects of the economic crisis and the HIV epidemic, about which nothing is known. From this point of view, the Kremlin, based on the principle “the sooner, the better”, is currently discussing the possibility of holding the referendum and the Victory Parade on 24 June, and if not, then both events can be rescheduled for September. Undoubtedly, the socio-economic problems that arise under the influence of coronavirus and the resulting reduction in oil revenues, may complicate the life of the Russian leadership. (In yesterday’s article I tried to Express voiced assumptions about the coup in Russia, many of which are related with this.) Coronavirus: an unknown enemy is shaken of a mighty leader Although at first the news of the coronavirus that came from Russia, creating the impression that things are going well, soon the situation changed. For a long time Russia takes the second place after USA in the number of cases of infection. When the situation worsened, Putin at first were almost not visible. (As you know, major leaders, not wanting to be associated with negative events, tend to pass bad news on to others.) However, over time, on the one hand, Russian society began to grow discontent, on the other — such persons as Moscow mayor Sobyanin and Prime Minister Mishustin, started off in political ratings. The intervention of an experienced Kremlin adviser had not long to wait. The Prime Minister, who was preparing to declare comprehensive measures to combat coronavirus in mid-April, said, “It will make the President”. As for Sobyanin, who gradually began to attract attention for its efforts in the area of Russian media were running the campaign. Some Federal channels have repeatedly shown the queue formed at the entrance to the Moscow metro while checking electronic passes. One of the architects of the new draft Constitution, prepared with the aim of extending the terms of office of Putin, Senator Andrey Klishas openly challenged the mayor, saying that “the mayor is not entitled to restrict the freedom of movement of citizens.” While those who took the lead, align, a decision was made that Putin will hold frequent meetings that are broadcast on television, and from time to time make encouraging people speeches. However, not escaped the attention of the following fact. A leader who has unlimited powers and “single-handedly responsible for everything in the country,” largely left such a new and complex problem, coronavirus, at the discretion of the members of the government and especially the local leaders. (Russian Federation consists of 85 regions, namely the republics, regions and cities of different status). Of course, that in the context of the expanding crisis leader requires a report from someone, if necessary, arranges reprimanded and even dismissed, could create an “appropriate picture”. (Perhaps the leaders of Komi, Kamchatka and Arkhangelsk, said goodbye to their seats at the beginning of the coronavirus crisis, swelled before.) But what if the crisis will inflict even greater wounds? Moreover, these conditions raised some questions. And how centralized federalism, presidential system? Isn’t it possible that this course of events would entail a risk of redistribution of powers in the Russian Federation? Besides, don’t the Russian people do not expose their kings and national leaders account both for victory and for the disaster? Besides, as local leaders and high-ranking officials, whose fate depends entirely on the President, can really put health in priority, how much accurate information they can provide? Especially when the economic downturn felt in the regions at least no less than in the center, and from Moscow is not receiving major financial support to the regions, with the exception of some areas. The latter situation for the coronavirus and the population to distrust official statements Despite the fact that in Russia the danger of the spread of coronavirus remains a serious, note that in recent years the situation began to change for the better. On 17 may we held a meeting on the coronavirus in Moscow, and on may 18 in Russia. Voiced forecast that the situation will improve until the beginning of July. Most cases of infection in Russia occurred in Moscow. Followed by Moscow region and St. Petersburg. It should be added that the situation in the regions, which are located in these densely populated areas, is also critical: Nizhny Novgorod, Dagestan, Sverdlovsk, Krasnodar, Rostov-on-don, Kaluga, Tula. As of yesterday this “top 10” areas where coronavirus is raging the most. Also, pay attention to the reaction. First, there was “virtual meetings”, organized on the Internet some of the opposition. Then it became known about the real rallies against the measures to combat coronavirus in North Ossetia. An outbreak of coronavirus in Dagestan, where, as it turned out, there is a great shortage of equipment and facilities, has complicated the situation. In addition, according to the website “Turkrus.com” conducted a survey showed that the level of support of quarantine measures in Russia from the population record has fallen and amounted to 23%. While the percentage of those who believe it is necessary to relax the restrictions, is 64, those in favour of more tightening measures, only 6%. And the credibility of official statements over the past month fell from 28% to 19%. Distrust of people, of course, is not surprising. After the head of the Federal service for supervision of consumer rights protection and human welfare Anna Popova, known as “the chief physician of Russia”, that “10-12% of the conducted tests give a positive result”, chief editor of radio “Echo of Moscow” Alexei Venediktov critically remarked: “That is, per 100 million that is 10 million cases.” (According to yesterday’s official data, the total number of infected cases in the country has 317554 thousand.) Russian opposition “Novaya Gazeta” and some Western publications (especially “financial times” (Financial Times) and “new York times” (New York Times)) wrote that the real number of deaths from the coronavirus in Russia can be 70% more than stated in the official statements. Oil poured into the fire and “Bloomberg” (Bloomberg). Full of enthusiasm for the opportunity to pounce on Moscow, the publication placed the strange headline: “Experts want to know why the coronavirus in Russia has killed more people?”. The Ministry of foreign Affairs of Russia on this occasion made a further condemnation in the West. Along with assumptions about the concealment of the facts, there is another very important problem on the agenda: with the coronavirus again manifested major weaknesses of the Russian health system. Number of hospitals and potential patient care were insufficient. (2000-2015 during the “health care reform” the number of hospitals in the country, according to official data, has decreased by half — from 10.7 to 5.4 thousand thousand.) In recent months, has repeatedly raised the question of what doctors and other health workers working at low wages and insufficient provision of means of protection. The Website “Zona.media” wrote that the Russian doctors in much greater numbers of sick and dying from covid-19 in comparison with other countries. While in the US doctors make of 0.48% of deaths in Russia this indicator is equal to 7%. At least 186 of Russian doctors has died of the coronavirus. (Total number of deaths from the coronavirus in Russia, announced yesterday, may 20, numbers 3099.) Despite the fact that President Putin announced the provision of financial assistance to health care workers, many of them have not received any additional payments, and scandal. How Russia and the whole world will overcome coronavirus crisis is unknown. That will be for the Kremlin because of this uncertainty, only time will tell.
{ "pile_set_name": "Pile-CC" }
Search Results for: jedi training academy Please take note: The Jedi Training Academy has changed and this is no longer the process for getting to participate in the show. We have a new post coming soon. Check back at this link for more details very soon. Thanks! – Lisa, March 9, 2016 The Jedi Training Academy, held at the Tomorrowland Terrace stage, is the ultimate Star Wars fantasy come true for little boys who are yearning to become one with the force. Selected children get to learn the ways of the Jedi Knights and then test those skills against Darth Maul or Darth Vader. (Disneyland supplies the robes and lightsabers.) Sorry dads. Jedi Training Academy is only for kiddos ages 4 to 12. If you have a potential Padawan who really wants to train to be a Jedi Knight, it’s important to know that there’s a few tricks and tips you can use to get selected for the Jedi Training Academy. Here’s the Babes in Disneyland “How to get selected for the Jedi Training Academy” Guide. Wear a Star Wars-themed shirt Kids in Star Wars shirts stand out to the Jedi selecting the participants. If your child doesn’t have a Star Wars-themed shirt, wear a Disney one. Make a sign Now, I’m not positive, but I don’t think Disneyland really wants you to bring in big obnoxious signs. In fact, I saw them confiscate a poster board sign that said, “I love Tiffany” at the security check point this last weekend. With that in mind, I would recommend making a sign on a huge sheet of paper so that you can discretely bring it in in your bag, backpack, etc. Put something on your sign like, “Please pick Alex!” or “Jake is the ultimate Jedi!”. Folks with signs often get picked. Encourage your child to be enthusiastic! I know this goes without saying, but for some shy kids, this isn’t always easy. When the Jedi are looking for children to select, they are keeping an eye out for kids who are jumping up and down and excited to participate in the academy. My son was really enthusiastic to participate but isn’t a natural born cheerleader. It would have been helpful if I had coached him a bit beforehand. Encourage everyone else in the family to be enthusiastic! When our youngest son became old enough to go through Jedi training, we brought lightsabers from home and my other two sons stood next to him, pointing at him with their lightsabers as our little guy jumped out and down. It worked. Get to the show early. Families start waiting for the show at least 30 minutes before show time. On really busy days, you may need to get there 45 minutes to an hour before show time. Encourage your child to sit close to the front of the selection area. (The sections are marked by tape on the ground.) Prepare your child for what to expect. If you have never taken your child to see the show, it’s a good idea that they see the show ahead of time so they know what to expect. Guests can watch the show from the Tomorrowland Terrace dining area. We love eating lunch and watching the show; it’s really great family time. If you want your child to see the show before your visit, you can check out my son below. If your kiddos hit it really lucky, they may even get selected to Force Push the Storm Troopers. As luck would have it, TWO of my three kids have gotten to Force Push. What luck! Watch Darth Vader in the video below very carefully. If you are a Star Wars fan, you will definitely laugh.Kids who participate in the Jedi Training Academy feel a huge sense of accomplishment afterward. It is truly an amazing opportunity. One thing I would like to point out that I neglected to mention when this article was first published, was the fact that it is really important for families (kids and parents) to be courteous when vying for their child’s place among the Padawans. Not all children (and their parents) are as aggressive and a reader recently reported her son was practically trampled by another family. Some kids are shy and some kids may have sensory or socialization limitations that may make it tougher for them to show the enthusiasm others. It is important to be careful to respect those kids’ and their right to try and get a spot too.Do you have an additional tip for getting selected at the Jedi Training Academy? Share it below or on our Facebook page! Several weeks ago, my family and I spent the day at Disneyland. My four-year-old is a huge Star Wars fan, and he made the decision before we left the house that he had enough courage to finally try for a spot in the Jedi Training Academy. Up until this point, he refused to even sit at a table close to the training academy, yet now he felt like he was ready. If you aren’t in the Jedi Training Academy-know, the academy is an opportunity for children–boys and girls–to train with real Jedis and learn how to battle against well-known foes from the dark side, Darth Vader and Darth Maul. These characters are as real as they get. There’s nothing more menacing as the image of Darth Vader coming up from under ground on the Tomorrowland Terrace stage amidst a cloud of eerie smoke with John Williams’ famous Star Wars theme enveloping the eager crowd. Paying close attention to the Jedis. My four year old is not the most bravest child. In fact, he is very shy and very nervous when it comes to new experiences. He refuses to sit on Santa’s lap and had a really hard time even telling Mrs. Claus what he wanted for Christmas as she helped him decorate cookies at the Disneyland blogger holiday party. He is one of those overly cautious children who doesn’t like to take risks. He doesn’t jump off of jungle gyms or make a scene when he is playing with his friends at the park. With a bit of fear on his face, he sat patiently waiting for the Jedi Training Academy to begin –not up at a table in the Tomorrowland Terrace dining area but the “bull pen” from which they select the children who will particpate and fight the dark side. After being chosen, my brave boy mustered up all of his courage and donned his Jedi robe, he was handed his light saber. The lesson was on and the “battles” against the dark side were underway. Fighting Darth Maul. I’m guessing that Darth Maul’s face was a bit scary for A to handle, but he stood strong against the dark side and prevailed. Here is a video of my son’s experience. I’m not sure if A’s smile is that of happiness, relief, or a little bit of both. I couldn’t be more proud of how my little man stepped out of his comfort zone. I know he was scared to death, but he did it. I have a lot to learn from him. I really need to step out of my comfort zone every once in a while, no matter how nervous I might be. The Jedi Training: Trials of the Temple, held at the Tomorrowland Terrace stage, is the ultimate Star Wars fantasy come true for little boys who are yearning to become one with the Force. (The show is formerly known as the “Jedi Training Academy.”) Selected children get to learn the ways of the Jedi Knights and then test those skills against Darth Vader and the Seventh Sister. (Disneyland supplies the robes and lightsabers.) Sorry dads. Jedi Training is only for kiddos ages 4 to 12. If you have visited Disneyland in previous years, you may be accustomed to the old way Padawans are selected to participate in the experience. Guests used to wait at the stage area and Jedi would select those they felt were strong with the Force. While this built up great excitement and crowds for the shows, Disney now uses a sign-up system for training participation. Here’s what you need to do: As soon as you arrive in Disneyland Park the morning of your visit, go straight over to the Tomorrowland Expo (formerly known as the “Innoventions” building). Do NOT go inside of the building. Instead go all the way around to the far left side of the building (near Autopia). There you will see a line of anxious parents and children waiting to get on the list for one of the day’s shows. Jedi signing children up for the shows will likely try to fill shows in order, but you can request a later show. Cast Members will man the sign-up area until the shows are full and will be at the area prior to each show time to corral all of the Padawans before the shows and fill any no-show with those on the waiting list. If it is raining or looks like rain… or has been raining and looks like it is going to clear up, still run over to the sign-ups. We attended the park on a day in which it had rained all night. We showed up just as they decided to resume having shows that day and got in to the first show of the day, which was less than 15 minutes away! The child who will be participating must be present at the time of the sign up. We all love the idea of running into the park while the kids may be still nestled in their beds back at the hotel, but that’s a n0-go. The kids must be present. If you don’t get into a show, ask to be put on a wait list. Or in simpler terms: If you are able to get a spot in one of the shows (and they fill up quickly), here are a few tips for making it a time your family won’t forget: Prepare your child for what to expect: If you have never taken your child to see the show, it’s a good idea that they see the show ahead of time so they know what to expect–especially if your child is shy, a little scared of Star Wars characters, doesn’t like costumed characters… you get what I mean. Guests can watch the show from the Tomorrowland Terrace dining area. We love eating lunch and watching the show; it’s really great family time. If you want your child to see the show before your visit, you can check out highlights from the training show two of my boys participated in. Keep it safe: Be sure that your child is wearing “safe” shoes – no shoes with wheels, etc. Shoes with wheels are not permitted. Keep that camera rolling: I would recommend families stay close by their kiddos, sitting on the ground by the participants. (There is a clearly marked area on the floor.) The show is long and we took a ton of video and photos. PhotoPass Cast Members also take pictures of all participants during the show. Because they photograph the show so often, they know how to get the very best shots. Definitely get a PhotoPass card before or after the show from one of the photographers. You will be amazed at some of the shots they get. Kids who participate in the Jedi Training: Trials of the Temple feel a huge sense of accomplishment afterward, plus the get a special button! It is truly an amazing opportunity. Are you ready to “Hero-up” at the Disneyland Resort this summer? Disney California Adventure Park is offering kids and families amazing ways to experience super hero life this summer. Here are six things you can do the summer to live your super hero dreams, plus what you MUST know so that your kiddo can train with the hero. Dance like a hero at the “Guardians of the Galaxy: Awesome Dance Off!” Star-Lord fires up his old-school boom box to get a party started in “Guardians of the Galaxy: Awesome Dance Off!” Held in Hollywood Land, guests can show off their moves at this awesome rock ‘n’ roll bash and “dance off” and join teams with names that include “Team Pop,” “Team Lock,” “Team Rock” and “Team Roll.” This fun experience is hosted by none other than the Star-Lord himself. In addition, Gamora and Groot join Star-Lord and Dance Off. Seek adventure like a hero at Guardians of the Galaxy – Mission: BREAKOUT! The Hollywood Tower of Terror has been reimagined to become the ultimate Guardians of the Galaxy experience featuring more than 2,200 props from and inspired by the Super Hero universe. There are six different ride profiles, each paired with a pop song inspired by the “Guardians of the Galaxy” films’ soundtracks. At Guardians of the Galaxy – Mission: BREAKOUT!, Rocket enlists the aid of guests to help free his fellow Guardians of the Galaxy, who have been captured by The Collector. Guests on Terra (Earth) will find hundreds of artifacts decorating the private office of The Collector, Tivan Tanaleer, featuring objects gathered from around the galaxy. What do you hope to see inside Guardians of the Galaxy – Mission: BREAKOUT? Pose like a hero! Inside Hollywood Land, guests can meet three of their favorite superheroes: Spider-Man, Captain America, and even Black Widow with Avengers Armored Transport. Train like a hero at the Avengers Training Initiative Throughout the day, guests ages 6-12 can participate in a daring adventure on the Hollywood Backlot, to see if they have what it takes to become one of the “Earth’s Mightiest Heroes.” Black Widow is the commander of the training with Hawkeye, Special Agent Cabe and Tech Specialist Agent Crosby serving as her trusted assistants. Once young Avengers have completed their combat training, they face off with the HYDRA villain Arnim Zola. In order to participate, you will need to sign up early! Avengers Training Initiative is open to children ages 6 to 12, but you MUST register your child the morning of your visit AND your child MUST be present at the time of the registration. Sign ups are at the kiosk in the Hollywood Backlot near Stage 17 and Sunset Showcase Theater (right by Monsters Inc.: Mike and Sully to the Rescue!). Ask a Cast Member if you are unable to locate the kiosk. Registration for each day’s shows begins when Disney California Adventure Park first opens, including Extra Magic Hours. (Not sure what Extra Magic Hours are? Be sure to read all about Extra Magic Hours by clicking here.) Registration for the trianing is on a first-come basis and availability is limited. Eat and drink like a hero The Disney food wizards have done it again and created fun, yummy dishes and drinks so that you can fuel up like a here. Dishes and drinks are in lively colors of green, purple, red, blue and orange reflect the bold personalities of some favorite super heroes. They can be purchased at a variety of restaurants, including Award Wieners, Schmoozies, Studio Catering Co. and Fairfax Market. Learn more about our six favorite Summer of Heroes foods by clicking here. Shop like a hero If you are anything like me, shopping is a must and Disney has released four new product lines this summer, each with a unique theme to celebrate Super Heroes at Disney California Adventure. New merchandise includes: Ten popular toys and games inspired by the ‘70s and ‘80s are sure to be a hit with the young at heart, including mini arcade games and light-up toys. Groot, Cosmo, Rocket and Howard the Duck plush, packaged in a vitrine case and available from The Collector’s personal collection. For the latest on Star Wars land coming to Disneyland in California, click here. The rumors are now over and today at the D23 Expo Walt Disney Company Chairman and CEO Bob Iger announced that Star Wars-themed lands will be coming to Disneyland park in Anaheim and Disney’s Hollywood Studios at Walt Disney World Resort in Florida. Although completion dates for the two new parks have not been released, each new land marks Disney’s largest single themed land expansions ever at 14 acres each. The last will transport guests to a never-before-seen planet, a remote trading port and one of the last stops before wild space where Star Wars characters and their stories come to life. At Disneyland park, the land will be located in the Big Thunder Ranch area, inclusive of some backstage locations. For those of us who adore the Disneyland goats and the delicious food at Big Thunder BBQ, this is indeed theh little, gray rain cloud in this announcement. “I am thrilled to announce the next chapter in the long and exciting history between Disney Parks and Star Wars,” said Iger. “We are creating a jaw-dropping new world that represents our largest single themed land expansion ever. These new lands at Disneyland and Walt Disney World will transport guests to a whole new Star Wars planet, including an epic Star Wars adventure that puts you in the middle of a climactic battle between the First Order and the Resistance.” Concept art of the new Star Wars land coming to DisneylandConcept art of the new Star Wars land coming to DisneylandConcept art for the new Star Wars Land coming to Disneyland.Concept art for the new Star Wars Land coming to Disneyland. The Star Wars lands will have two signature attractions: one with a thrilling battle experience and another that puts guests behind the controls of one of the most recognizable ships in the galaxy, the Millennium Falcon, as they take on a customized secret mission. Images courtesy of Disney Parks and Resorts. It will likely take years to develop and build these exciting new lands. In the meantime, Star Wars fans will be able to experience several new enhancements and experiences at Disneyland (and Walt Disney World). For the sake of this post, we are focusing on what will be happening at Disneyland. Star Tours – The Adventures Continue – Later this year, Star Tours will include a new adventure featuring locations and characters from the upcoming film, Star Wars: The Force Awakens, giving guests a new adventure in the Star Wars galaxy. Jedi Training Academy — Although I am not sure how you can possibly improve on something so incredibly perfect, Jedi Training Academy will be reimagined with a new experience that includes new characters and a new villain to battle from the popular Disney XD series “Star Wars Rebels.” Star Wars Launch Bay – This interactive experience will take guests into the upcoming film, Star Wars: The Force Awakens, with special exhibits and peeks behind-the-scenes, including opportunities to visit with new and favorite Star Wars characters, special merchandise and food offerings. Star Wars Launch Bay will share the space with the reimagined Super Hero HQ, featuring opportunities to meet and take photos with super heroes like Captain America and Thor, as well as experience the returning Iron Man Tech Presented by Stark Industries. This is expected to open later this year in the old Innoventions building. Season of the Force – This, my friends, is HUGE. I don’t know about you, but my family (and by “family,” I mean “husband) has been complaining for years that there is no Star Wars Weekend for us west coasters. Finally, we are getting something better than a Star Wars Weekend–we are getting a whole season!!! In early 2016, Disneyland park guests will get to explore the Star Wars galaxy with special entertainment throughout Tomorrowland the land, themed food locations and more. They will also get to experience a rethemed Space Mountain that will become “Hyperspace Mountain,” in which guests will join an X-wing Starfighter battle. Season of the Force Coming to Disney Parks. Images courtesy of Disney Parks and Resorts. We are so excited for the new Star Wars enhancements and ultimately the new land! We will keep you updated with all of the Star Wars news as it becomes available. What are you looking forward to most? Let's Connect About Babes In Disneyland Babes In Disneyland combines the best of everything the Disneyland Resort and Walt Disney Company has to offer families with young children and Disney fans alike, in addition to providing reviews and information on the latest travel products, Southern California destinations and lodging options and much more for families.
{ "pile_set_name": "Pile-CC" }
Monthly Horoscope By Tarot.com Staff Scorpio Horoscope: November 2013 A force of nature You're the center of attention this month with the radiant Sun shining in your sign until Nov. 21. Nevertheless, being in the spotlight may feel like a burden because stern Saturn's long-term visit to loyal Scorpio insists that you take your responsibilities seriously, especially if others are observing and even judging you. The fourth of seven powerful squares between unstable Uranus and relentless Pluto on Nov. 1 indicates a quickening of the changes that began to unfold last summer and continue to transform the daily rhythms of your life throughout the month. You're in a contemplative period with thoughtful Mercury retrograding in ruminating Scorpio and your 1st House of Personality until Nov. 10, then remaining in your sign throughout the month. Everyone is watching you as the Scorpio Solar Eclipse on Nov. 3 intensifies your feelings and tempts you to withdraw because it's difficult to maintain your composure. Although retreating might sound like a sensible strategy, there's no reason to step back from your power just to avoid making others uncomfortable. You may judge yourself harshly or doubt your worthiness to act with authority, but the Sun-Saturn conjunction on Nov. 6 and the Mercury-Saturn conjunction on Nov. 25 give you more impact on others than you realize. The steady Taurus Full Moon on Nov. 17 brightens your 7th House of Partnerships, yet its challenging alignments with vulnerable Venus and the unstable Uranus-Pluto square increase your desire for relationship security without necessarily bringing satisfaction. The Sun's shift into inspirational Sagittarius on Nov. 21 offers the hope of easier days ahead, and its trine to futuristic Uranus on Nov. 30 reaffirms your optimism. Keep in Mind this Month Trust your intuition, even if the answers you receive are not what you expect. There's more going on than meets the eye. Key Dates for Scorpio SUPER NOVA DAYS Nov. 1-3: Stranger Than Fiction Change crashes into your life with unexpected fits and starts as the Sun and Mercury Retrograde create annoying quincunxes with quirky Uranus on Nov. 1, fueled by the volcanic Uranus-Pluto square that continues its disruptive ways. Fortunately, friends and co-workers offer you support when Mars in your 11th House of Social Networking picks up on harmonizing aspects from the Sun, Mercury and Pluto, enabling you to integrate newly acquired information and flow with the shifting tides. The intensity of your willpower is like a high-powered laser on Nov. 3, when the concentrated Scorpio New Moon Eclipse cuts through the noise, unveiling a fresh perspective and resetting the rules of the game. Act on your truth knowing that what you do now will have an enduring impact over the weeks ahead. Nov. 27-30: Into the Wild Blue Yonder On Nov. 27-28, fleet-footed Mercury comes to your rescue with a plan to have fun as it harmonizes with the happy-go-lucky Venus-Jupiter opposition. Thankfully, the excitement continues as a risk-taking Sun-Uranus trine on Nov. 30 encourages you to stretch your wings and fly confidently into the future.
{ "pile_set_name": "Pile-CC" }
Il y a aujourd'hui en France trois gynécologues médicaux pour 100 000 femmes en âge de consulter et leur nombre a chuté de 42% en dix ans. Cette situation, qui va perdurer quelques années encore, n'est pas sans conséquence pour la santé des femmes. "J'ai reçu ce matin en consultation une jeune fille de 20 ans, sous pilule depuis cinq ans et suivie par son médecin généraliste." Anne Noblot, gynécologue médicale à Dunkerque (Nord), a posté ce texte sur Facebook, jeudi 10 janvier. Depuis, il a été partagé plus de 24 000 fois. "Cette jeune fille n'a JAMAIS été examinée (je parle d'examen gynéco bien entendu). Elle est porteuse d'un nodule mammaire de 3 cm de diamètre facilement palpable, et d'un herpès génital qui a été catalogué 'mycose' sans contrôle clinique." En décrivant ce cas alarmant et loin d'être unique, cette professionnelle de la santé des femmes a voulu, comme elle l'explique à franceinfo, "dénoncer la situation préoccupante que vivent les femmes face à la pénurie grandissante des gynécologues médicaux". Une disparition programmée "Impossible de trouver une gynéco. J'obtiens toujours la même réponse : 'Nous ne prenons plus de nouvelles patientes'. Résultat : personne n'a suivi ma ménopause et cela fait bientôt cinq ans que je n'ai pas eu de frottis". Ce témoignage est l'un des 3 500 reçus, en 2017, par le Comité de défense de la gynécologie médicale (CDGM). Ce comité, créé par un collectif de gynécologues et de femmes, se bat depuis 1997 pour que les femmes soient correctement suivies. Contrairement aux gynécologues obstétriciens, qui pratiquent les actes de chirurgie et les accouchements, les gynécologues médicaux assurent, eux, le suivi gynécologique des femmes tout au long de leur vie. Installés dans des cabinets en ville, ils sont de moins en moins nombreux à exercer. Marie Stagliano, coprésidente du CDGM, tire la sonnette d'alarme. Aujourd'hui, il y a en moyenne trois professionnels pour 100 000 femmes en âge de procréer et donc de consulter, c'est très inquiétant.Marie Stagliano, coprésidente du Comité de défense de la gynécologie médicaleà franceinfo Entre 2007 et 2017, le nombre de gynécologues médicaux a chuté de 42%. En 2017, le Conseil national de l'Ordre des médecins (CNOM) a recensé six départements totalement dépourvus de gynécologues. Et cette désertification touche aussi bien les campagnes que les villes. Paris a perdu, en huit ans, 43% de ses gynécologues médicaux. En banlieue parisienne, certaines villes comme Aulnay-sous-Bois (Seine-Saint-Denis) ou Ivry-sur-Seine (Val-de-Marne) sont totalement dépourvues de gynécologues libéraux. Le Dr Jean-Marcel Mourgues, en charge de la section Santé publique et démographie médicale au sein du Conseil national de l'ordre de médecins, confirme à franceinfo, chiffres à l'appui, ce déficit lié au renouvellement générationnel : "Malgré la récente augmentation des places en internat, une très forte baisse va prochainement s'opérer avec la vague de départs à la retraite." Sur les 1 054 médecins en activité en 2018, plus de la moitié ont 60 ans et plus. Et seuls 82 postes en internat ont été ouverts pour la rentrée de 2017. "Nous sommes loin du 'un pour un'", déclare le médecin. Comment expliquer une telle situation ? "En 1987, le ministère a supprimé la spécialité gynécologie médicale, dans le silence le plus total", explique Marie Stagliano, la coprésidente du CDGM. En cause, un coût financier qui avait poussé les pouvoirs publics à la réduction d'un certain nombre de spécialités. La motivation de cette suppression était également liée à l'harmonisation européenne des diplômes, la France étant le seul pays à enseigner la gynécologie médicale.Marie Stagliano, coprésidente du CDGMà franceinfo Ce n'est qu'en 2003 que le gouvernement rétablit cette discipline, rappelle Marie Stagliano, "grâce à la volonté des femmes dans la rue, qui ont fait plier Kouchner et Mattei", ministres de la Santé au début des années 2000. Mais le chemin est encore long. Des 130 places annuelles en internat ouvertes par le gouvernement avant 1987, on est passé à seulement une vingtaine de 2003 à 2011. Depuis, si le nombre de places ne cesse d'augmenter, il est étudié chaque année et reste insuffisant pour assurer le simple remplacement des départs à la retraite. Le Comité de défense de la gynécologie médicale estime qu'il faudrait l'ouverture de 120 places par an. Face à cette pénurie, certaines femmes se tournent vers leur généraliste, à l'instar du cas décrit par la gynécologue Anne Noblot dans son post Facebook. Cet exemple démontre que tous les médecins ne semblent pas être en capacité d'assurer le suivi gynécologique de leurs patientes. En témoigne le récit d'une femme médecin, qui a répondu au texte d'Anne Noblet et qui effectue des remplacements dans le Nord de la France. Je remplace essentiellement des hommes. Très peu d'entre eux font de la gynécologie, seulement un quart d'entre eux possèdent du matériel pour réaliser un frottis par exemple. Il y a donc un manque certain de formation et/ou d'intérêt de certains médecins.Claire van Marie, médecin généralistesur Facebook Une régression pour la santé des femmes "Les progrès de la médecine ont beau être importants, la suppression ou diminution des gynécologues médicaux est un énorme recul, il faut y remédier au plus vite", déclare, parmi d'autres, l'une des 3 500 femmes interrogées par le Comité de défense de la gynécologie médicale. Et ce recul n'est pas sans conséquence pour la santé des femmes. On va se retrouver avec des dépistages tardifs, des frottis anormaux, une augmentation des cancers du col de l'utérus, des problèmes d'infections, des IST difficiles à détecter, des pathologies du sein. Quant à la ménopause, il n'y a que les gynécologues médicaux qui s'en occupent.Pia De Reilhac, gynécologueà franceinfo Cette pénurie de spécialistes peut également "handicaper les femmes dans leur contraception". Un droit chèrement acquis selon Marie Stagliano, pour qui "la pilule a été un énorme progrès car elle a permis un suivi plus régulier des femmes. Et ce suivi a permis une diminution spectaculaire du nombre de cancers du col de l'utérus, divisé par trois en vingt ans." Autre conséquence de cette insuffisance : l'accès à l'information sur la sexualité et le suivi gynécologique se compliquent pour les plus jeunes. Les équipes du Comité ont réalisé, en 2017, une enquête auprès des étudiantes de la faculté de Cergy : 40% des jeunes filles ne connaissaient pas l'existence des gynécologues médicaux. Les jeunes femmes ne viennent plus discuter avec les gynécologues devenus difficiles d'accès, et l'éducation à la sexualité, quand elle est faite par YouPorn, ce n'est pas terrible.Pia De Reilhac, gynécologueà franceinfo Pour Pia De Reilhac, présidente de la Fédération nationale des collèges de gynécologie médicale, c'est un "véritable retour en arrière" qui s'opère. "En France, les femmes étaient, et sont encore pour un temps, bien suivies. Les femmes soignées pour un cancer du sein ont une espérance de vie bien meilleure en France qu'ailleurs en Europe. Nous avons l'un des taux les plus faibles d'hystérectomie (l'ablation de l'utérus) : 6,7% à 50 ans, contre 40% aux Etats-Unis et 20 à 30% dans le reste de l'Europe." Un avenir encore compliqué pour la profession "Pendant les dix, quinze prochaines années, la pénurie va aller en s'aggravant", constate le docteur Pia De Reilhac, qui s'attelle à trouver des solutions avec les unions professionnelles des médecins généralistes et des sages-femmes. "Le gouvernement ne nous aide pas forcément. Il nous écoute mais c'est à nous de trouver des solutions", déplore la gynécologue. L'un des axes de travail de ces professionnels réunis est d'assurer, malgré la pénurie, le suivi gynécologique des femmes pour qu'elles ne subissent pas de retard dans leur prise en charge. Nous en sommes au début. La question est de savoir où s'arrête la surveillance des médecins généralistes et des sages-femmes et où débute celle des gynécologues médicaux.Pia De Reilhac, gynécologueà franceinfo Mais cette solution ne semble pas plaire à tout le monde. "Nous sommes plus inquiètes que rassurées, car cette tentative de pallier la pénurie met en danger la vie des femmes. Les sages-femmes ne sont pas formées pour, ce n'est pas un mois de formation qui va combler 11 ans d'études", dénonce la coprésidente du Comité de défense de la gynécologie médicale. Des propos dénoncés par plusieurs associations de sages-femmes qui ont publié, lundi 4 février, un communiqué remettant en cause "les conséquences délétères sur la santé des femmes" décrites dans notre article*. Ces collectifs mettent en avant "le rôle essentiel des sages-femmes dans le suivi gynécologique" et rappellent "que les sages-femmes sont compétent(e)s dans la réalisation de consultations de contraception et de suivi gynécologique (...), œuvrant ainsi au maintien de la bonne santé génésique et sexuelle des femmes". Une situation déjà décrite à franceinfo en décembre 2017 par Marie-Anne Poumaer, présidente de l'Union nationale et syndicale des sages-femmes : "Nous sommes (...) parfaitement capables d'assurer le suivi gynécologique des femmes en bonne santé, même quand elles ne sont pas enceintes". La dirigeante de l'UNSSF constatait au passage avec regret que "le public [ne soit] pas informé de nos compétences". Les associations de sages-femmes affirment par ailleurs dans leur communiqué que "plusieurs professionnel(le)s de santé sont compétent(e)s pour assurer le suivi gynécologique : médecins généralistes, gynécologues-obstétriciens et sages-femmes." Côté patientes, toutes ne sont pas disposées à parler d'intimité avec leur médecin de famille. En attestent les nombreux témoignages recueillis par le Comité de défense de la gynécologie médicale : "Je ne fais pas confiance au médecin traitant, qui n'est pas spécialisé, et je serais même un peu gênée." Ou encore : "Je n'aurais jamais aimé parler de ma vie intime avec un généraliste. Seule une spécialiste dans le domaine peut répondre à toutes nos questions." Une lente prise de conscience Pour beaucoup, la solution à moyen terme semble résider du côté des étudiants en médecine. Cela n'empêchera pas de faire face à un creux générationnel chez les gynécologues médicaux mais Albane Vandecandelaere, présidente de l'Association nationale des internes en gynécologie médicale, confirme l'implication de ses camarades. C'est une spécialité qu'on ne peut pas choisir par défaut, elle a une histoire particulière, bien à elle, beaucoup de personnes se sont battues pour la faire réapparaître et, en tant qu'interne de gynécologie médicale, on se doit de continuer à la faire vivre et de prouver, encore et toujours, notre utilité.Albane Vandecandelaere, présidente de l'Association des internes en gynécologie médicaleà franceinfo Les étudiants, plus nombreux en internat à chaque rentrée, "hyper motivés" selon le Docteur Pia De Reilhac, "ont bien conscience de cette situation critique." Cette prise de conscience semble plus lente du côté des pouvoirs politiques. Marie Stagliano, via le Comité de défense de la gynécologie médicale, interpelle chaque année, et sans relâche, le ministère des Solidarités et de la Santé à ce sujet. Elle demande notamment la réalisation d'une campagne médiatique auprès des jeunes femmes et un plus grand nombre de places en internat. "Mais nous avons aucune réponse du gouvernement, alors qu'il faudrait qu'il prenne la question à bras le corps" regrette la coprésidente du CDGM. Contacté, le ministère n'a pas donné suite aux sollicitations de franceinfo. * Notre article a fait l'objet d'une mise à jour et d'une nouvelle publication mardi 5 février.
{ "pile_set_name": "OpenWebText2" }
"Previously on "Lost"..." "How did you know my father?" "He came to see his daughter." "My daughter was on your plane." "Her name was Claire." "We're here to get a blood sample from you... and one from your son Aaron." "Why?" "To determine your relationship to the child." "Where are you going, mommy?" "We're going on vacation, baby." "Wait, you're in L.A.?" "Of course we can meet, yeah." "Hello, Kate." "You okay?" "Get me to the car." " Sayid, you've been attacked." " Where's Hurley?" "The only way to save the island, John, is to get your people back here." "How?" "How am I supposed to do that?" "What?" "You've..." "Do you know what's happening to me?" "Charlotte?" "Charlotte?" "Hey." "Oh, you don't have to whisper." " When he's out, he's out." " Yeah." "At least one of us can sleep." "It's gonna take more than two nights... for me to get used to sleeping in a normal bed." "What are we gonna do about him?" "About Aaron." "I don't know." "I've been thinking a lot about him." "Did you know that Claire was flying to L.A. to give him up for adoption?" "No." "No, I didn't." "I think we should say he's mine." "What?" "We could say that I was six months pregnant when I was arrested and that I gave birth to him on the island." " No one would ever know." " Kate." "No." "You don't have to..." "There's other ways to do this." "After everyone we've lost..." "Michael, Jin, Sawyer..." "I can't lose him, too." "Sawyer's not dead." "I know." "But he's gone." "Good night, Jack." "Kate." "If we're gonna be safe, if we're gonna protect the people that we left behind, tomorrow morning, I'm gonna have to convince everyone to lie." "If it's just me, they're never gonna go for it." "So I'm gonna turn to you first." "Are you with me?" "I have always been with you." "How does it fit?" "It's perfect." "Thank you for the loaner." "Looks great on you." "Are you sure you want to do this?" "It was your idea." "Mommy!" "Aaron, honey, mommy's gonna run out and do an errand." "I'll be right back." "Okay?" "And then we can go home." "Don't worry about us, Kate." "There's candy in the minibar and a hundred channels on tv." "We're going to be just fine here." "Sun..." "I don't know what I would've done if you weren't here." "Thank you." "It's what any friend would do." "Okay, well, I will be back soon." "Okay, you be good for Sun." "Okay, honey?" "Good luck." "Delivery for you, Ms. Kwon." " Thank you." " Thanks." "I'll be right back, honey." "Lost SO5EO4 "The Little Prince"" "subtitle by ydy. com edited and synced by rogard" "Charlotte?" "Charlotte." "What the hell is wrong with her?" "She's been out for ten minutes." "Stop shouting, James." "Hey, man." "Thank you." "If there's something that you want to tell me, Daniel, now would be a good time." "I'm not sure what you mean exactly." "She's asking if you know why your girlfriend had a seizure." "Give us some space, would you?" "She's like this 'cause the sky keeps lighting up." "He knew this would happen and he didn't say squat about it." "James." "Go away." "Did you know that this would happen?" "I thought..." "I thought it might." "I think it's neurological." "Our brains have an internal clock, a sense of time." "The flashes... throw the clock off." "It's like really bad jet lag." "Really bad jet lag doesn't make you hemorrhage, Daniel." "You wanna tell me why it isn't happening to the rest of us?" "I don't know." "But thank God it's not." "Thank you for waiting." "Did my assistant offer you something to drink?" "Um, yes." "I'm fine, thank you." "Good." "Please, Ms. Austen, sit." "So..." "How can I help you?" "Mr. Norton, when you came to my house looking for blood samples from me and my son, I asked you who your client was." " And I said I couldn't tell you." " Yeah." "I'm here to offer you a deal." "I'll give you the blood samples, but first, I wanna talk to your client." "Considering what you're asking for, that's more than reasonable." "Well, I am, uh, seeing my client later today, and I will be sure to pass along your offer." "But I am pretty sure of what the answer's gonna be:" "No." "And the reason, of course, is that you're in no position to be making any kind of deals, and we both know it." "I have a signed court order compelling you to let us confirm that you're the child's mother." "I could send the sheriff over there today and make you do it, but my client insists that we... handle the exchange of custody quietly." "What do you mean "exchange of custody"?" "You know exactly what I mean." "No, I..." "Mr. Norton," "I just wanna know who is doing this to me." "You did this to yourself." "Now it is time you prepare yourself, Ms. Austen." "You are going to lose the boy." "We have to go back to The Orchid." "Excuse me?" "The Orchid." "That's where all this started." "Maybe it's where it'll all stop." "That greenhouse is a long ways away." "You said you had a zodiac raft back at the beach." "We could take that, cut around the horn of the island, be at The Orchid in half the time." "And let me guess." "You know exactly what to do when we get there." "No, not exactly at all, but I know that Ben used it to leave the island." "And if I can do the same thing, I believe I can save us." "And how you gonna do that?" "This is all happening because they left." "I think it'll stop if I can bring them back." " Bring who back?" " Jack, Sun, Sayid, Hugo, Kate." "The boat blew up, and that chopper was probably on it." "They're not dead, James." " Says who?" " That doesn't matter." "All that matters is they've gotta come back." "I have to make them come back... even if it kills me." "Don't you want 'em to come back, James?" "Don't you want her to come back?" "It doesn't matter what I want." "Hey!" "She's waking up!" "Are you okay?" "Who are you?" "It's me." "It's Daniel." "Daniel." "Oww.." "Oh, my head." "What happened?" "There was another flash." "You passed out." "How do you feel?" "A bit dizzy, but..." "I'm fine." "Good." "Hooray." "Everything's back to normal." "Now what?" "I'll tell you "now what. "" "We're going to The Orchid." "Oncologist on call to the I.C.U." "Dilation's almost back to normal." "Good." "Now take this I.V. out of my arm, and let's go." "Sayid, you were unconscious for over 42 hours." "You had the equivalent of three doses of horse tranquilizer in your system." "If you sent that man to Hurley's house, we have to leave..." " You need to relax." " ... now." "Ben is not gonna hurt Hurley." "Ben is on our side." "The only side he's on is his own." "Dr. Shephard?" "I'm Dr. Ariza, director of clinical services." "A word with you, please?" "I'll be right back." "What do you think you are doing here?" "I was treating a patient." "I apologize." "It was an emergency." "I know that" "You were suspended on charges of substance abuse." "Emergency or not, Dr. Shephard, you have no business being here." "I understand, and I take full responsibility for my actions." "No, doctor." "The hospital takes full responsibility for your actions, and that makes us liable for them." "Excuse me." " Hello?" " Jack?" "It's me." " Hurley." " Hey, did Sayid get to you?" "Did my dad drop him off?" " Yes, he did." "Hurley, where are-?" " Is he okay?" " He's fine." " Awesome." "Hurley, where are you?" "Dude, I'm totally cool." "I'm in L.A. County lockup." "Oh, and tell Sayid I did exactly what he said." "I'm totally safe." "Ben's never gonna get me now." "Thank you." "What are you talking about, Hurley?" "Wait!" "Wait" "Good." "You're here." "How's Sayid?" "How are you doing today, sir?" "Got your meds for you." "Sorry, I think you have the wrong room." "Nope." "Room 133, right?" "Got the orders right here." "Don't worry." "I won't have to give you an injection." "Put this right in your I.V. line." "Who are you?" "Who are you working for?" "Okay, talk, talk." "Address... it's in my pocket." "Hello, Sayid." "What happened?" "Do we know anyone who lives at 42 Panorama Crest?" "That's Kate's address." "Hello?" "Kate?" "It's Jack." "Are you okay?" "Yeah." "I'm fine." "Where are you right now?" "Are you at home?" "Uh..." "What?" "Listen, I'll explain everything once you're out," " but you've gotta get Aaron" " Look, I'm not at home, okay?" "I'm..." "Aaron is at a hotel with Sun." "Sun?" "Sun's in L.A.?" "Yeah, she's here on business." "Listen, Jack, this is really not a good time." "I'm so sorry that I even picked up the phone." "I'm not" "Kate, do not hang up on me." "Please listen." "Listen, uh..." "Will you tell me where you are?" "I need to see you." "Kate, please." "I'm downtown." "Wilshire and Olive." "Okay." "All right." "I'm on my way." "She's not at home, but I'm gonna go to her right now." " Good." "I'll go deal with Hugo." " Sorry, Ben." "I'm not letting you get anywhere near him." "You have friends in trouble." "Let's get them to safety and save the dirty linen for later." "I'll drive." "After you get Kate, meet us at the Long Beach Marina, slip 23." "And, Jack..." "Hurry." "We're running out of time." "Hey, Locke." "What are you gonna say to her?" "Sorry?" "Kate." "What are you gonna say to her to get her to come back?" "I haven't figured that out yet." "Well, let me tell you something." "She was pretty excited to hop on that chopper and get the hell out of here." "What the hell is that?" "Whatever it is, we better stay clear of it." "Beach is this way." "Now you wanna take the scenic route?" "John..." "Do you know when we are?" "We need to keep moving." "Hey." "How's your headache?" "Better." "Nothing like sore feet to take your mind off your head, eh?" "Well, don't worry." "Once we get to the beach, we're gonna take the zodiac around the other side of the island and rest." "You're sweet, but you don't need to baby me." "I'm fine." "You okay?" "I'm peachy." "Now what?" "Nobody move." "James!" "I got this." "... you con't stop now." "It knows I don't want it, and I was gonna give it away." "Babies know that stuff." "Okay, no, no, hang on." "Listen, listen." "Do you want this baby?" "Do you want it to be safe and healthy?" "You're not alone in this." "We are all here for you." "This baby is all of ours." "But I need you to push." "Okay?" "One, two, three..." "Push!" "Push!" "Come on, Claire!" "Push!" "Okay!" "He's coming!" "Push!" "Push!" "Push!" "Push!" "Push!" "Push!" "Push!" "Push!" "James?" "What happened?" "Did you see something out here, James?" "It don't matter." "It's gone now." "You shaved your beard." "Yeah." "I just needed a change." "Look, Jack, uh..." "I don't know why you called, but I can't be dealing with this right now." "What's going on?" "Nothing." "Just..." " Can you just go?" " Why don't you just tell me?" "Jack, please, just go." "Kate, please, tell me." "Somebody wants Aaron." "What?" "There's a lawyer in there." "His clients... they know we're lying." "They know I'm not his mom, and they're gonna take him away." "Who's gonna take him away?" "What- what are you doing?" "Look, I gotta go, all right?" "Get in or don't." "Hey." "You ready to tell me who you saw back there?" "Already told you." "It was nothin'." "You and I both know when we were before the flash, James." "So who was it you saw?" "Charlie?" "Shannon?" "Yourself?" "And how is it that you knew when we were, Johnny boy?" "That light in the sky..." "it was from the hatch, wasn't it?" "The night that Boone died..." "I went out there and started pounding on it as hard as I could." "I was... confused." "Scared." "Babbling like an idiot, asking, why was all this happening to me?" "Did you get an answer?" "Light came on, shot up into the sky." "At the time, I thought it meant something." "Did it?" "No." "It was just a light." "So why'd you turn us around then?" "Don't you wanna go back there?" "Why would I wanna do that?" "So you could tell yourself to do things different, save yourself a world of pain." "No, I needed that pain to get to where I am now." "Hey." "I just got a nosebleed." "What?" "When?" "Let's just not freak out the others, okay?" "Just tell me..." "Why-why her?" "Why me?" "I don't know." "Uh, I think it might have something to do with duration of exposure." "You know, the amount of time you've spent on the island." "Doesn't make any sense." "Those yahoos have been here for months." "I've never been here before two weeks ago." "Are you sure about that?" "Hello?" "!" "The camp's back." "Finally." "Anybody for a Dharma beer?" "Hello?" "Anybody here?" "Rose?" "Bernard?" "I wonder how long ago this happened." "Son of a bitch!" "What is it?" "It's Vincent's." "Yeah?" "Well, where's the rest of the dog?" "Where's the rest of our people?" "The zodiac's gone, too." "Maybe your people took the boat." "Why the hell would they do that?" "To get away from whoever came in those." "Where did these come from?" "That's a good question." "They're pretty old." "Not that old." "Let me see that." ""adg-uh-ruh"?" "Ajira." "It's an airline." "It's based out of India, but they fly everywhere." "Great." "Maybe they got a flight out of here to Vegas tonight." "Who came in these?" "Other Others?" "Don't look at me." "My question is, when are they coming back?" "Let's not wait to find out." "This plan sounded a hell of a lot better when we were going by motorboat." "How far is this place?" "It's around that point." "Not more than a couple hours." "Oh, joy." "You all right?" "I saw Kate." "What?" "Last night, in the jungle." "Before the last flash." "She was delivering Claire's baby." "But that was two months ago." "Time travel's a bitch." "Get down!" "Paddle!" "I think they want their boat back!" "Move!" "Are these your people?" "!" "No!" "Are they yours?" "!" "Shut up and keeping paddling!" "Little help!" "Little help!" "Paddle harder!" "They're getting closer!" "Thank you, lord!" "I take that back!" "Everybody, paddle!" "Head for the shore!" "Kate, just because the guy told you that he was meeting his client doesn't mean that they're here in L.A." "He could've just told you that to-to throw you off." "Or they're in that hotel right now." "Okay." "And what if they are?" "What if the person who wants to take Aaron is sitting in that hotel room right now?" "Then what?" "Come on." "Come with me." "We'll- we'll go get Aaron, we'll put our heads together, and we'll figure something out." "All right." "Oh, my God." "It's Claire's mother." "Wait." " What am I waiting for, Jack?" " Wait." "I just..." "Let's just think about this for a minute." " She knows." " Maybe she doesn't know." "No, but she knows about Aaron, and that's all that matters." "Let me go talk to her." "What?" "If I can just explain to her why we did it, maybe if I can get her to understand why..." "She'll listen to me." "I can fix this, Kate." "I can fix it." "Aaron is my family, too." "Dr. Shephard?" "Hello, Ms. Littleton." "Um..." "May I come in?" "Of course." "You look drenched." "No, no." "No, I'm fine." "God, I haven't seen you since your father's funeral." "How did you even know I was here?" "I knew you were here, Ms. Littleton, because I followed your lawyer." "Why would you do that?" "I'm" " I did it because, um..." "I understand that you feel the need to do this." "But I need you to know that everything that Kate and I have done... it was for Aaron." "Who's..." "Aaron?" "I" " I'm afraid I'm not following you." "Ms. Littleton, um..." "What are you doing here in Los Angeles?" "Let's go." "Drive." "Then call Sun and tell her to bring Aaron to the Long Beach Marina." " We'll meet her there." " What-wh-what are you talking about?" " What happened?" " Kate, we have to go now." "I'm not going anywhere until you tell me what just happened." "She doesn't know anything." "What?" "She doesn't know." "She still thinks that Claire is dead." "She doesn't even know that Aaron exists." "But the lawyer...?" "She sued Oceanic, and she's in town to pick up her settlement." "What, and it's just a coincidence that her lawyer happens to be the same one that's trying to take my son?" "I don't know." "But whoever's trying to take Aaron..." "It's not her." "Then who is it?" "Can I ask you something?" "Why'd you take it upon yourself to rescue Hugo?" "I had to make sure Hurley was safe." "You can pull in over here." "Mr. Linus." "Mr. Norton." "I looked into it, and they don't have any kind of solid case against Reyes." "The M.E. said that the man found outside" "Santa Rosa was killed before Reyes escaped." "That's very good news." "We have a prelim hearing in the morning." "The judge will never let it get past that, and Reyes will be a free man." "Thank you, Dan." "Anytime." "Who was that?" "That's my lawyer." "Okay." "Remind me never to do that again." "Where are we?" "It's hard to say till it gets light." "We didn't get a chance to finish our conversation." "What conversation was that?" "The one before they started shooting at us, where you were about to tell me how it felt to see Kate again." "I wasn't about to tell you anything." "Why don't you tell me now?" "I was close enough to touch her." "If I'd wanted to, I could've... stood right up and talked to her." "Why didn't you?" "What's done is done." "Juliet?" "What's wrong?" "Come and look at this!" "It's wreckage." "Looks like it just happened." "Anybody speak French?" "Jack, why did you call me today?" "I told you." "I was..." "I was worried." "But why?" "Why were you worried?" "Why today?" "I don't..." "Right before I called you, Sayid was attacked." "And the guy that did it..." "your address was in his pocket." "Sayid?" "What's he doing here?" "That's not important right now." "What matters is that we get you and Aaron someplace safe." "Safe from who?" "Hello, Kate." "It's okay." "He's with me." "He's with you?" "I know this is gonna be hard to understand, but he's here to help us." "To help everyone that we left behind." "We all need to be together again." "It's him." "What?" "It's him." "He's the one who's trying to take Aaron." " No." "No." "You- you don't understand." " No, Jack." "She's right." "It was me." "Sorry." "Who the hell do you think you are?" "Why don't you just stay away?" "!" "Why don't you leave me and my son alone?" "!" "Because he's not your son, Kate." "You all right?" "No understand." "You speak English?" "A little." "Are you okay?" "Yes." "How did you get here?" "Boat." "Who is he?" "What does he say" "He said he came on a boat." "What boat?" "It's gone." "Sink." "It must've been caught in the same storm as ours." "Who are you?" "How long you in the water?" "I don't know." "How do you not know how you wound up in the middle of the ocean, huh?" "Leave him alone." "He's in shock." "Can you get me him some water?" "Merci, Robert." "Thank you." "What is your name?" "Kwon Jin." "Jin." "Hello, Jin." "I'm Danielle." "Danielle Rousseau." "subtitle by team ydy. com edited and synced by rogard"
{ "pile_set_name": "OpenSubtitles" }
If you've been following the tech press at all, you've no doubt heard the term "Windows Blue," referring to the internal code name for the next version of Microsoft's desktop-and-or-tablet operating system. I'm not much on rumors and leaks, preferring to get solid info from the horse's mouth. My Microsoft contacts not only won't comment on this matter, but studiously avoid using the term "Blue" in email. Recent evidence, however, makes a pretty compelling case that Windows Blue is real. Most convincing of all is a leaked installer for a build of the operating system called Windows Blue Build 9364. Ostensibly coming from a Microsoft partner, the build started appearing on file-sharing services like BitTorrent on March 24, and was first mentioned on a post by a site called Windows 9 Beta. [Update: Microsoft has now officially acknowledged that it's working on projects codenamed "Blue," without providing any product details. The info came in a post on the Official Windows Blog by Frank X. Shaw, Corporate Vice President of Corporate Communications at Microsoft. Shaw does note that it's unlikely that the released new version of Windows will actually use the word "Blue" in its name.] So what is Windows Blue? The first thing to know—assuming that what we've seen so far isn't an elaborate hoax—is that it's not going to be the kind of complete re-think of the operating system that Windows 8 was. By all indications, Windows Blue will be an enhancements and refinement release. This makes sense, when you consider that that was the strategy for Windows from Windows 95 all the way to Windows 7. This strategy also jibes well with another release strategy the rumor mill has turned up: That Microsoft will be releasing versions of Windows every year, rather than every three years. This more Apple-like approach lends itself to more incremental, less-drastic overhauls with each new release. Microsoft executives have hinted at this more frequent upgrade schedule, and word on the street is that Windows Blue will launch as early as this summer or fall. As with a lot of the inside dope on Blue, this tidbit comes from Microsoft-watcher-extraordinaire Mary Jo Foley, who put the pieces of evidence together in a piece on Redmondmag.com called Can Microsoft Speed the Pace of Windows? An analysis of the leaked code by MSFTKitchen suggests that Blue will come in flavors for all existing Windows editions, including RT and Server as well as desktop personal and professional. One question that remains is whether we'll see months of public preview versions like we got with Windows 7 and 8. Another involves naming: There's no way to know at this point whether the product will be named Windows Blue, Windows 9, or something else. Microsoft may not even have nailed this down definitely itself yet. What's in Windows Blue? So there's some release framework, but what changes can we expect in the software itself? Based not only on the leaked pre-release code, but also on videos from internal company meetings, most notably one leaked by MSFT Kitchen, we can conjecture on what we can expect to see in Windows Blue/Windows 9. More Touch. The above-referenced video emphasizes new touch capabilities in the OS, showing detailed drawing that becomes possible with the improvements. According to the Verge's Tom Warren, a new swipe up gesture will access app lists in both new and desktop interfaces. More Snapping Options. "Snapping" is Microsoft's term for displaying more than one running app at a time on the screen—something not even possible with the leading tablet, the iPad. With Windows 8, you can display a secondary app in a reduced view that takes up a quarter of the screen alongside your main app. But with Blue, you'll get more options, such as displaying each in an exact half of the screen, or even four apps in vertical quarters. New Included Apps. Leaked screenshots of the alleged Windows Blue build show a few new default new-style apps to complement Mail, People, Calendar, and the rest. An Alarm and Sound recorder show up, as does a tile with numbers, presumably a calculator. Smaller Start Screen Tiles. Windows 8 only offers two tile sizes for its Start screen, a large square, and a rectangle twice that size. With Blue, it looks like you'll be able to use smaller tiles a quarter the size of Windows 8's squares. This should help if you have lots of tiles that lend themselves to organization in groups. New Charm Bar Capabilities. Windows Blue's Charm bar will offer more direct customization than Windows 8's, in which you often have to go to the desktop Control Panel to make the change you want. Users will be able to further customize the Start Screen from a "Personalize" choice, which will let you swap out the background, edit background colors, and edit accent colors directly from the operating system's sidebar. Another new Charm option seems to be improved search capability. Internet Explorer 11. Window 7 users only recently got an update to IE10, the browser that ships with Windows 8, which vastly increases support for HTML5 and speeds up browsing. The leaked build of Blue shows yet another update for Microsoft's browser, which will no doubt make further advances in these areas. PCWorld's Brad Chacos has uncovered one more new capability in IE11—tab syncing. This only makes sense, since it's a feature IE's competitors have had for over a year. Touch Improvements. Windows 8 is already replete with touch input capabilities suited to tablet computing. But Blue looks to go beyond this, as the video linked above shows. SkyDrive syncing. The new-style Windows 8 SkyDrive app doesn't offer syncing the way the desktop and Windows 7 versions do. The Blue code suggests that this lack of ability will be remedied in the new version. Blue Skies for Windows? It's certain that more features and tweaks will show up in the coming months, so this list is far from exhaustive. And as you can see, these new features aren't drastic re-thinkings of basic OS elements, but rather enhancements and improvements to Windows 8. As with any future release, especially one that's not even acknowledged by its maker, many questions remain about Windows Blue, not the least of which is pricing. Will those who just bought Windows 8 or a machine running it have to pay for an update already this summer? If so, we can hope it's at least priced more like a $20 Mac OS X upgrade rather than a $200 Windows OS upgrade. If you're not familiar with Windows 8, a laundry list of Windows Blue improvements won't mean much to you, so be sure to read our review of Windows 8 to get up to speed. Further Reading Operating System Reviews
{ "pile_set_name": "OpenWebText2" }
Q: How to display several values filtered from two columns I have homework where I have to select data from two tables (book and author). Books has two authors and i need to display result with book title and authors separated by comma. I tried by myself but I got errors. Schema SQL: CREATE TABLE IF NOT EXISTS `author` ( `id` INT NOT NULL AUTO_INCREMENT, `name` VARCHAR(128), `surname` VARCHAR(128), PRIMARY KEY (`id`) ) DEFAULT CHARSET=utf8mb4 ENGINE=InnoDB; CREATE TABLE IF NOT EXISTS `book` ( `id` INT NOT NULL AUTO_INCREMENT, `title` VARCHAR(128), `author_id` INT NOT NULL, `author_id_2` INT NOT NULL, PRIMARY KEY (`id`) ) DEFAULT CHARSET=utf8mb4 ENGINE=InnoDB; Query SQL: INSERT INTO `author` (`name`, `surname`) VALUES ("William", "Shakespeare"); INSERT INTO `author` (`name`, `surname`) VALUES ("Agatha", "Christie"); INSERT INTO `author` (`name`, `surname`) VALUES ("J. K", "Rowling"); INSERT INTO `author` (`name`, `surname`) VALUES ("George", "Orwell"); INSERT INTO `book` (`title`, `author_id`, `author_id_2`) VALUES ("Hamlet", 1, 2); INSERT INTO `book` (`title`, `author_id`, `author_id_2`) VALUES ("Macbeth", 1, 3); INSERT INTO `book` (`title`, `author_id`, `author_id_2`) VALUES ("Murder on the Orient Express", 2, 3); INSERT INTO `book` (`title`, `author_id`, `author_id_2`) VALUES ("The Secret of Chimneys", 2, 1); INSERT INTO `book` (`title`, `author_id`, `author_id_2`) VALUES ("1984", 3, 1); INSERT INTO `book` (`title`, `author_id`, `author_id_2`) VALUES ("Animal Farm", 3, 2); Query: SELECT b.title Pavadinimas, concat(concat(a1.name, ' ', a1.surname), ', ', concat(a2.name, ' ', a2.surname) Autoriai FROM book b INNER JOIN author a1 WHERE book.author_id=a1.id INNER JOIN author a2 WHERE book.author_id_2=a2.id; The result should be: Hamlet | William Shakespeare, Agatha Christie A: You would need to join twice the book table with the author table, like: SELECT b.title, CONCAT(a1.name, ' ', a1.surname, ', ', a2.name, ' ', a2.surname) authors FROM book b INNER JOIN author a1 ON b.author_id = a1.id INNER JOIN author a2 ON b.author_id_2 = a2.id This demo on DB Fiddle with your sample data returns: | title | authors | | ---------------------------- | ------------------------------------ | | Hamlet | William Shakespeare, Agatha Christie | | Macbeth | William Shakespeare, J. K Rowling | | Murder on the Orient Express | Agatha Christie, J. K Rowling | | The Secret of Chimneys | Agatha Christie, William Shakespeare | | 1984 | J. K Rowling, William Shakespeare | | Animal Farm | J. K Rowling, Agatha Christie | NB: if you have books with just one author, you can use LEFT JOIN instead of INNER JOIN.
{ "pile_set_name": "StackExchange" }
In the early 1990s I was visiting the White House Science Advisor, Sir Prof. Dr. Robert Watson, who was pontificating on how we had successfully regulated Freon to solve the ozone depletion problem, and now the next goal was to regulate carbon dioxide, which at that time was believed to be the sole cause of global warming. I was a little amazed at this cart-before-the-horse approach. It really seemed to me that the policy goal was being set in stone, and now the newly-formed United Nations Intergovernmental Panel on Climate Change (IPCC) had the rather shady task of generating the science that would support the policy. Now, 25 years later, public concern over global warming (aka climate change) is at an all-time low remains at the bottom of the list of environmental concerns. Why is that? Maybe because people don’t see its effects in their daily lives. 1) By all objective measures, severe weather hasn’t gotten worse. 2) Warming has been occurring at only half the rate that climate models and the IPCC say it should be. 3) CO2 is necessary for life on Earth. It has taken humanity 100 years of fossil fuel use to increase the atmospheric CO2 content from 3 parts to 4 parts per 10,000. (Please don’t compare our CO2 problem to Venus, which has 230,000 times as much CO2 as our atmosphere). 4) The extra CO2 is now being credited with causing global greening. 5) Despite handwringing over the agricultural impacts of climate change, current yields of corn, soybeans, and wheat are at record highs. As an example of the disconnect between reality and the climate models which are being relied upon to guide energy policy, here are the yearly growing season average temperatures in the U.S 12-state corn belt (official NOAA data), compared to the average of the climate model projections used by the IPCC: Yes, there has been some recent warming. But so what? What is its cause? Is it unusual compared to previous centuries? Is it necessarily a bad thing? And, most important from a policy perspective, What can we do about it anyway? The Policy Hoax of Global Warming Rush Limbaugh and I have had a good-natured mini-disagreement over his characterization of global warming as a “hoax”. President-elect Trump has also used the “hoax” term. I would like to offer my perspective on the ways in which global warming is indeed a “hoax”, but also a legitimate subject of scientific study. While it might sound cynical, global warming has been used politically in order for governments to gain control over the private sector. Bob Watson’s view was just one indication of this. As a former government employee, I can attest to the continuing angst civil servants have over remaining relevant to the taxpayers who pay their salaries, so there is a continuing desire to increase the role of government in our daily lives. In 1970, the Environmental Protection Agency (EPA) was given a legitimate mandate to clean up our air and water. I remember the pollution crises we were experiencing in the 1960s. But as those problems were solved, the EPA found itself in the precarious position of possibly outliving its usefulness. So, the EPA embarked on a mission of ever-increasing levels of regulation. Any manmade substance that had any evidence of being harmful in large concentrations was a target for regulation. I was at a Carolina Air Pollution Control Association (CAPCA) meeting years ago where an EPA employee stated to the group that “we must never stop making the environment cleaner” (or something to that effect). There were gasps from the audience. You see, there is a legitimate role of the EPA to regulate clearly dangerous or harmful levels of manmade pollutants. But it is not physically possible to make our environment 100% clean. As we try to make the environment ever cleaner, the cost goes up dramatically. You can make your house 90% cleaner relatively easily, but making it 99% cleaner will take much more effort. As any economist will tell you, money you spend on one thing is not available for other things, like health care. So, the risk of over-regulating pollution is that you end up killing more people than you save, because if there is one thing we know kills millions of people every year, it is poverty. Global warming has become a reason for government to institute policies, whether they be a carbon tax or whatever, using a regulatory mechanism which the public would never agree to if they knew (1) how much it will cost them in reduced prosperity, and (2) how little effect it will have on the climate system. So, the policy prescription does indeed become a hoax, because the public is being misled into believing that their actions are going to somehow make the climate “better”. Even using the IPCC’s (and thus the EPA’s) numbers, there is nothing we can do energy policy-wise that will have any measurable effect on global temperatures. In this regard, politicians using global warming as a policy tool to solve a perceived problem is indeed a hoax. The energy needs of humanity are so large that Bjorn Lomborg has estimated that in the coming decades it is unlikely that more than about 20% of those needs can be met with renewable energy sources. Whether you like it or not, we are stuck with fossil fuels as our primary energy source for decades to come. Deal with it. And to the extent that we eventually need more renewables, let the private sector figure it out. Energy companies are in the business of providing energy, and they really do not care where that energy comes from. The Dodgy Science of Global Warming The director of NASA/GISS, Gavin Schmidt, has just laid down the gauntlet with President-elect Trump to not mess with their global warming research. Folks, it’s time to get out the popcorn. Gavin is playing the same card that the former GISS director, James Hansen, played years ago when the Bush administration tried to “rein in” Hansen from talking unimpeded to the press and Congress. At the time, I was the Senior Scientist for Climate Studies at NASA/MSFC, and NASA had strict regulations regarding talking to the press and Congress. I abided by those regulations; Hansen did not. When I grew tired of them restricting my “freedoms” I exercised my freedom — to resign from NASA, and go to work at a university. Hansen instead decided to play the ‘persecuted scientist’ card. After all, he (and his supporters in the environmental community) were out to Save The Earth ™ , and Gavin is now going down that path as well. I can somewhat sympathize with Gavin that “climate change” is indeed a legitimate area of study. But he needs to realize that the EPA-like zeal that the funding agencies (NASA, NOAA, DOE, NSF) have used to characterize ALL climate change as human-caused AND as dangerous would eventually cause a backlash among those who pay the bills. We The People aren’t that stupid. So now climate research is finding itself at a crossroads. Scientists need to stop mischaracterizing global warming as settled science. I like to say that global warming research isn’t rocket science — it is actually much more difficult. At best it is dodgy science, because there are so many uncertainties that you can get just about any answer you want out of climate models just by using those uncertianties as a tuning knob. The only part that is relatively settled is that adding CO2 to the atmosphere has probably contributed to recent warming. That doesn’t necessarily mean it is dangerous. And it surely does not mean we can do anything about it… even if we wanted to.
{ "pile_set_name": "OpenWebText2" }
Why Queen Mary? Why Queen Mary? 92%of graduates are in work or further study within six months of graduating *based on a survey of UK students only (DHLE 2016/17) Queen Mary is one of the UK’s leading universities We are part of the University of London Be recognised With students from over 160 nationalities, Queen Mary is one of the most diverse institutions in the world, located in one of the most diverse cities in the world. By the time you leave, you will have friends and contacts all over the globe. Many of our undergraduate degrees allow you to extend the study of your chosen subject with an additional year abroad. Queen Mary also has sites in China, Malta and Paris. My internship allowed me to get practical experience in the corporate world of the City... It was hard work but it helped me to challenge myself. — Sabrina Alam, Theoretical Physics BSc (2017), now studying her masters at the International Space University Employability Our students have gone on to make a difference in recognised organisations around the world. Our degrees prepare you for the future Find your course - we offer degrees across the full teaching spectrum including subjects that you may not have studied before Explore new subjects - many courses provide you with the opportunity to study other subjects and learn new skills in addition to your core subject Discover the world - many of our undergraduate degrees allow you to extend the study of your chosen subject with an additional year abroad. Many subjects also have international fieldwork opportunities and a chance to take part in overseas internships and summer programmes. Connect with industry and business - get experience with leading organisations in the commercial, charity and public sectors Make a difference - become part of Queen Mary’s story of social justice, by giving your time and expertise to local community projects Graduates from Russell Group universities earn 10% more than graduates from other universities over a lifetime Career support Our Careers and Enterprise team support you for two years after you graduate, and will help you get the edge you need in today’s job market. We provide: workshops and guidance to help you apply effectively for work experience and graduate jobs events where you can meet employers from across the city award-winning work experience programmes to help you gain invaluable skills financial and other support to help you start or grow your own business or social enterprise.
{ "pile_set_name": "Pile-CC" }
[ truenos ] ♪ Díganle... ♪ ♪ Que su partida me ha dejado un mal sabor ♪ ♪ Y yo traté de llenar la ausencia que dejó ♪ ♪ Aun puedo presentir su voz ♪ ♪ Aun pienso en su respiración ♪ ♪ Y no lo he vuelto a ver no sé adónde fue ♪ ♪ Díganle que jamás yo lo volví a llorar ♪ ♪ Alguien por favor le cuente la verdad ♪ ♪ Que ya tomé un remedio pa' mi corazón ♪ ♪ Yo no lo he vuelto a ver no sé adónde fue ♪ ♪ Díganle que jamás me volví a lamentar ♪ ♪ Alguien por favor le cuente la verdad ♪ ♪ Que ya tomé un remedio pa' mi corazón ♪ ♪ Díganle ahora que su amor está en coma ♪ ♪ Y si esta con alguien ya no hay vuelta atrás ♪ ♪ Mejor estar sola ♪ ♪ Ya habrá otra persona que me erice la piel ♪ ♪ Y se lo va a perder ♪ ♪ Y no lo he vuelto a ver No sé adónde fue ♪ ♪ Díganle que jamás yo lo volví a llorar ♪ ♪ Alguien por favor le cuente la verdad ♪ ♪ Que ya tomé un remedio pa' mi corazón ♪ ♪ Yo no lo he vuelto a ver no sé adónde fue ♪ ♪ Díganle que jamás Me volví a lamentar ♪ ♪ Alguien por favor le cuente la verdad ♪ ♪ Que ya tomé un remedio pa' mi corazón ♪ ♪ Se pasan las horas, la cosa empeora ♪ ♪ Adiós bye bye aquí no hay vuelta atrás ♪ ♪ Mejor estar sola ♪ ♪ Ya habrá otra persona que me erice la piel ♪ ♪ Y se lo va perder y se lo va a perder ♪ ♪ El que se fue sin que lo boten no hace falta ♪ ♪ Ya del hospital de su amor me dieron de alta ♪ ♪ Tengo otra vida de su plano soy partícipe ♪ ♪ Besé un sapo pensando que era un príncipe ♪ ♪ Para mala compañía prefiero estar sola ♪ ♪ Soy una reina y su destino controla ♪ ♪ Quise que funcione tengo a Dios como testigo ♪ ♪ Mejor que siga su camino que yo tengo el mío ♪ ♪ Otra mejor que lo haga feliz ♪ ♪ Otra que se siente a esperarlo, otra ♪ ♪ Que ya en mi corazón no hay nada para darle ♪ ♪ Y no lo he vuelto a ver no sé adónde fue ♪ ♪ Díganle que jamás yo lo volví a llorar ♪ ♪ Alguien por favor le cuente la verdad ♪ ♪ Que ya tomé un remedio pa' mi corazón ♪ ♪ Y no lo he vuelto a ver no sé adónde fue ♪ ♪ Díganle que jamás me volví a lamentar ♪ ♪ Alguien por favor le cuente la verdad ♪ ♪ Que ya tomé un remedio pa' mi corazón ♪ ♪ Otra mejor que lo haga feliz ♪ ♪ Otra que se siente a esperarlo, otra ♪ ♪ Que ya en mi corazón ♪ ♪ No hay nada para darle ♪ ♪ No no ♪ ♪ Díganle ahora que su amor está en coma ♪ ♪ Y si esta con alguien ya no hay vuelta atrás ♪ ♪ Mejor estar sola ♪ ♪ Ya habrá otra persona que me erice la piel ♪ ♪ Y se lo va a perder ♪ ♪ Y se lo va a perder. ♪
{ "pile_set_name": "YoutubeSubtitles" }
Phagocyte priming as a prognostic indicator in the intensive care unit. The purpose of this study was to study the temporal changes in circulating phagocyte respiratory burst activity and its relationship to mortality in intensive care unit (ICU) patients. Thirty-seven consecutive patients over a 3-week period were studied on their first, third, and seventh day of admission to the regional ICU in Northern Ireland. Blood samples were assayed for respiratory burst activity using luminol-enhanced whole blood chemiluminescence. Compared with survivors, nonsurvivors exhibited significantly higher Acute Physiology and Chronic Health Evaluation II scores, a base deficit, and reduced phagocyte activity (median [interquartile range]) (24.00% [18.00%, 56.00%] vs. 38.00% [30.00%, 63.50%], p = 0.047, Mann-Whitney U test) on day 3 of admission to the ICU. Temporal changes in phagocyte activation dependent on the underlying insult were seen in ICU patients. Furthermore, the degree of phagocyte activation was able to distinguish between survivors and nonsurvivors on day 3 of admission to the ICU. Nonsurvivors exhibited reduced phagocyte activation, suggesting patients at risk of mortality exhibit systemic anergy.
{ "pile_set_name": "PubMed Abstracts" }
Here's a silly little invention that is wonderful because it'll either make you more drunk or more human, preferably both. It's a beer glass. Huh? Yeah, the base of this beer glass is shaved down so that it needs to be rested on top of your cell phone to stand up straight. If you're too busy using your phone? The beer will spill over. If you want to be a human and talk to people? You can sit your beer down perfectly fine. The beer glass, designed by ad agency Fischer & Friends, was put to use in a bar in Sao Paolo, Brazil called Salve Jorge. The shaved off base creates an indentation that either makes you hold the beer glass and drink it or rest it on your phone and ignore Facebook, Instagram, Twitter, text messages and so forth. It's a hilarious way to combat people who just stare at their phones all the time, even when they're around other people. [Mauricio Perussi via Telegraph UK]
{ "pile_set_name": "OpenWebText2" }
George Commey Mills-Odoi George Commey Mills-Odoi (29 June 1916 – 4 August 1988) was the first Ghanaian Attorney General of the Republic of Ghana. He was a supreme court judge and the first Ghanaian to hold the dual offices of Solicitor-General and Director of Public Prosecutions. Early years and education He was born at James Town British Accra (now Jamestown, Ghana) on June 29, 1916 to Mr. William Hudson Odoi and Madam Sarah Naa Oyoe Mills. He was the last of nine children, all male. He attended Accra Royal School from 1923 to 1933, where he passed the seventh standard examination with distinction. He was admitted into the Accra Academy in 1934 where he passed the Cambridge School Certificate with complete exemption from the London Matriculation in 1937, an achievement not very common in his days. He was the head boy and completed the secondary course in four years as against the normal six years. So impressive was his record at the Academy that in advance of the publication of the school certificate exam results, he was enrolled as a teacher, and joined the staff of the school. Career His career begun as a teacher at his alma mater; the Accra Academy in 1937, in 1938 he resigned as a teacher from the Accra Academy and joined the Civil Service as a second Division clerk in the Law courts. It was during this period that he laid the foundation for his future professional career as a lawyer and later a Judge. In 1947, he resigned from the civil service and proceeded to the United Kingdom where he enrolled as a student at the Middle Temple and was called to the Bar on the 26th of January, 1951. He returned to Ghana after his studies and was enrolled as Barrister and Solicitor of the Supreme Court of Justice in March, 1951. He begun his practice in Dantu Lodge, the chamber of his cousin, Mr. G. A. Heward-Mills in Kumasi together with Mr. Samuel Azu Crabbe (who later became the 5th Chief Justice of Ghana) for a period of six months. Mr. Azu-Crabbe later left the chambers and George headed the chambers for nine months until the return of his cousin from Britain, thereafter, he established his own chambers- Tron Chambers. He soon built up a large and lucrative practice in Kumasi and throughout the Ashanti Region. He came into instant notice of the Government and he was appointed as Chairman of the Shai Paramount Chieftaincy Dispute in 1958. From 1958 to 1959 he served roles as Director of The Ghana Commercial Bank and Director of The Ghana Life Assurance Company. He was Junior Counsel to the Attorney General Geoffrey Bing Q.C. at the Granville Sharp Commission of Enquiry held in Accra from 1959 to 1960 and in January 1960 he was appointed Justice of The High Court of Ghana. That same year he became the first ever Ghanaian to be appointed to hold the dual offices of Solicitor-General and Director of Public Prosecutions. In 1961 he became the first Ghanaian to be appointed Attorney General of the Republic of Ghana. He served in that capacity until 1962. He was a member of the Committee appointed by the state to enquire into the assets of Ministers of State of the First Republic in 1961. He also served as member of the Council for Legal Education from 1961 to 1966. In 1962 he was a Government nominee for the drafting of the master Agreement for The Volta River Project. He was appointed Justice of the Supreme Court of Ghana and served in that capacity from 1963 until Kwame Nkrumah was overthrown in 1966. He was a member of the Ghana Legal council from 1964 to 1966 and was appointed Acting Chief Justice of Ghana in July 1965. He was appointed Judge Advocate General of Ghana Armed Forces from 1966 to 1982. In 1967 he was Chairman of the Committee of Enquiry into the structure and remuneration of the Public Services of Ghana; popularly known as the MILLS-ODOI committee and also served as Chairman of The Incomes Commission from 1967 to 1968. He also served as Chancellor of the Accra Anglican Diocese from 1972 to 1988. In 1979 he served as Chairman of The Boards of Directors at the Ghana Italy Petroleum company (GHAIP) now Tema Oil Refinery. International assignments He served as Junior Counsel to Sir Dingle Foot Q.C., who held brief for Dr. Hastings Banda (Head of State, Malawi) at The Devlin Commission of Enquiry in Southern Rhodesia (now Zimbabwe) from 1958 to 1959. He was a member of a three Man Committee appointed in 1963 by The Government of Ceylon (now Sri-Lanka) to enquire into matters connected with the assassination of Prime Minister S. W. R. D. Bandaranaike. In 1970 he was the first ever Ghanaian to be appointed by the Government of Trinidad and Tobago to officiate as Judge Advocate in three separate courts martial for the trial of mutineers in the Trinidad and Tobago Defence Force. Sports He was an accomplished footballer during his youthful days. He played for the Energetics Football Team in 1934 and for Accra Standfast from 1935 to 1947. In 1935 and 1937 he played for the nation against Nigeria. He was later appointed Football coach to the Asante Kotoko Football club from 1951 to 1952. He also took keen interest in horse racing he became the Legal Advisor to the Horse Racing Board of Control from 1961 to 1963. From 1963 to 1965 he was Chairman of the Disciplinary Committee of The Ghana Football Association and from 1966 to 1968 he was Chairman of the sports council of Ghana. In 1972 he was a member of The Ghana Olympic Committee that same year he became Chairman of The Olympic and Overseas Fund Raising Committee. Tribute Mr. Eric Williams, the then Prime Minister of Trinidad and Tobago, paid Tribute to him in five books which he presented to Justice Mills-Odoi at the end of The Trinidad Enquiry with the following inscriptions: TO JUSTICE MILLS-ODOI OF GHANA IN APPRECIATION OF THE ARDUOUS AND VALUABLE SERVICE TO THE PEOPLE OF TRINIDAD IN THEIR HOUR OF NEED. (Sgd. Eric Williams) PRIME MINISTER September 10Th, 1971. Death His state of health deteriorated during his last few years, he died at the 37 Military Hospital in the morning of Thursday 4 August 1988 at the age of 72. Honours He was awarded The Companion of The Order of the Volta (Civil Division) in 1978. See also Attorney General Assassination of S. W. R. D. Bandaranaike References Category:1916 births Category:1988 deaths Category:Alumni of the Accra Academy Category:Attorneys General of Ghana Category:Justices of the Supreme Court of Ghana Category:Asante Kotoko S.C. managers Category:Ghanaian footballers Category:Ghanaian football managers Category:Ghana international footballers Category:Association footballers not categorized by position
{ "pile_set_name": "Wikipedia (en)" }
499 S.E.2d 56 (1998) 269 Ga. 370 The STATE v. JOHNSON. No. S97G1681. Supreme Court of Georgia. April 13, 1998. *58 Stacey K. Hydrick, Asst. Atty. Gen., Department of Law, Atlanta, for the State. J. Converse Bright, Valdosta, for Carolene Johnson. *57 HUNSTEIN, Justice. We granted certiorari in this case to consider the construction the Court of Appeals gave to OCGA § 16-10-20 in State v. Johnson, 226 Ga.App. 836, 487 S.E.2d 677 (1997). For the following reasons we reverse that court. Carolene Johnson was indicted in Fulton County and charged, in 44 counts, with the offense of false statement in a matter within the jurisdiction of a department of the State. OCGA § 16-10-20. That statute sets forth three ways to commit the crime of false statement: (1) when a person knowingly and willfully falsifies a material fact; (2) when a person makes a false, fictitious, or fraudulent statement or representation; or (3) when a person "makes or uses any false writing or document, knowing the same to contain any false, fictitious, or fraudulent statement or entry." Id. This appeal involves the third way of violating OCGA § 16-10-20. It was alleged that Johnson, while operating a school in Lanier County that provided education and intervention programs for people convicted of driving under the influence, falsified the certificates of completion and the class rosters for 22 persons so as to indicate they attended and completed required programs when they had not done so. However, Johnson was not indicted for making the false documents; rather, the 44 counts of the indictment specifically charged Johnson with "knowingly and willfully us[ing ] a false document, knowing the same to contain a false statement, by causing the document to be submitted" either to the Department of Public Safety (as to the 22 counts regarding the certificates of completion[1]) or to the Department of Human Resources (as to the 22 counts regarding the class rosters[2]). 1. We agree with the State that the Court of Appeals erred when it held that a charge of "using" a false document under OCGA § 16-10-20 applies only to a person who uses a false document that was prepared by another. State v. Johnson, supra at 837, 487 S.E.2d 677. While the Court of Appeals correctly noted that the person who makes a false document containing the false statement has already violated the statute, id., nothing in the plain language of OCGA § 16-10-20 restricts the State to prosecuting the maker solely for the falsification itself, when the maker also violates the statute by using the falsified document.[3] [S]tatutes should be read according to the natural and most obvious import of the *59 language, without resorting to subtle and forced constructions, for the purpose of either limiting or extending their operation, [cit.], and this principle is particularly compelling when interpreting criminal statutes. [Cit.] State v. Luster, 204 Ga.App. 156, 158(1)(a)(ii), 419 S.E.2d 32 (1992). Even construing OCGA § 16-10-20 strictly against the State, see generally Jowers v. State, 225 Ga.App. 809(2), 484 S.E.2d 803 (1997), the language therein unambiguously prohibits an individual from making or using any false writing or document, without regard to the identity of the individual who initially made or subsequently used the false document. Because there is no limitation placed on the prohibited conduct of "making or using" false documents in OCGA § 16-10-20, the statutory language does not support the Court of Appeals' holding that prosecution for use of a false document is limited to those situations in which an accused uses false documents prepared by another. State v. Johnson, supra at 837, 487 S.E.2d 677. Where statutory language is plain and unequivocal and leads to no absurd or impracticable consequence, the court has no authority to place a different construction upon it. See generally Holden v. State, 187 Ga.App. 597(2), 370 S.E.2d 847 (1988). It thus follows that under OCGA § 16-10-20, all individuals who use a false writing or document, knowing it to contain any false, fictitious or fraudulent statement or entry, in any matter within the jurisdiction of the State or its political subdivisions, may be charged with violating the statute. 2. We hold that venue for the prosecution of OCGA § 16-10-20 for the use of a false document is proper in the county in which the document was submitted for use, even if the person charged with using the false document made the document in another county. As was noted in State v. Barber, 193 Ga.App. 397, 398, 388 S.E.2d 350 (1989), "(studying) the key verbs which define the criminal offense in the statute is helpful in determining venue in doubtful cases." (Punctuation and citations omitted.) In OCGA § 16-10-20, the key distinction is whether an indictee has been charged with "making" or with "using" the document. Where the criminal act involves the making of a false document, the essence of the crime is the act of falsification itself, which is an act separate and distinct from submitting, sending or using the falsified document. Hence, in State v. Barber, supra, venue for the falsification of medical assistance documents under OCGA § 49-4-146.1(b)(2) was properly found to be in the county where the falsification occurred. See also Spray v. State, 223 Ga.App. 154(2), 476 S.E.2d 878 (1996) (venue for charge of making a false writing properly in county where false document was made; "[s]ending the [falsified] form to [another county] did not make appellant's false attestations any more false or add in any way to the offense as described in the statute." Id. at 157(2).), 476 S.E.2d 878. Where the criminal act involves the use of a false document, the essence of the crime is the act of submitting, presenting or otherwise employing the false document in any matter within the jurisdiction of the State or political subdivision, an act which is separate and distinct from the act of falsification. Accord State v. Barber, 260 Ga. 269, 394 S.E.2d 353 (1990), where, in contrast to venue for the falsification of medical assistance benefits under OCGA § 49-4-146.1(b)(2), it was recognized that venue for the obtaining of medical assistance benefits under (b)(1) of that statute would be "the county where a false report was submitted and processed in an attempt to obtain medical assistance." Id., Weltner, J., concurring. 3. Contrary to the Court of Appeals' holding, the State here could not be deemed to be "manufacturing" venue in an improper county when it indicted Johnson on a charge of false statement by means of the use of a false writing or document since the State charged Johnson in the very county where the certificates and class rosters were required by statute to be used. Finally, in light of the provisions of OCGA §§ 16-2-20 (party to a crime) and 16-2-21 (prosecution of party who did not directly commit the crime), we find no merit in Johnson's argument that dismissal of the indictment as to the 22 counts involving her alleged use of the false certificates should be upheld on the basis that she herself did not submit the certificates but only provided them to the truant individuals who then physically submitted *60 them to the DPS. "Any party to a crime who did not directly commit the crime may be indicted, tried, convicted, and punished for commission of the crime upon proof that the crime was committed and that he was a party thereto." Id. It is not necessary that the State allege §§ 16-2-20 and 16-2-21 in the indictment. State v. Military Circle Pet Center, 257 Ga. 388, 360 S.E.2d 248 (1987); see also Jenkins v. State, 172 Ga.App. 715(4), 324 S.E.2d 491 (1984). Accordingly, we reverse the Court of Appeals' affirmance of the trial court's grant of Johnson's plea to the jurisdiction and dismissal of the indictment. Judgment reversed. All the Justices concur. NOTES [1] The certificates of completion must be submitted to DPS in order for individuals convicted of DUI to obtain reinstatement of their driver's licenses. OCGA § 40-5-63(a)(1). [2] Class rosters are among the documents which schools providing DUI education/intervention programs are required to submit to DHR. See OCGA § 40-5-83(e); Rules and Regulations of the State of Georgia, Vol. V, Rules of Department of Human Resources, Rule 290-4-10-.14(4)(a). [3] We are not here faced with, and intimate no opinion on, whether an individual can be convicted under OCGA § 16-10-20 for both making and using the same false document. In this case, Johnson is charged only with using the false documents she made.
{ "pile_set_name": "FreeLaw" }
Ars nails it: "The answer is that Google did announce what amounts to a fairly substantial Android update yesterday. They simply did it without adding to the update fragmentation problems that continue to plague the platform. By focusing on these changes and not the apparently-waiting-in-the-wings update to the core software, Google is showing us one of the ways in which it's trying to fix the update problem." This so called solution will still leave many devices with known vulnerabilities and other security issues... The only real motivation to do this is regain some control on Android by making AOSP a "demo" version of Android with all real new improvements hidden away in the closed-source, Google sauce components. Unavoidable I'm afraid. Google has finally realized that while open source is excellent for academia and research projects, once you want to actually make money from it you're in hot water as any person or company can take your code, modify it, and benefit from it without giving a damn thing back to you. And don't go on about the GPL, there are plenty of ways around that one too if you're motivated, and cash is one hell of a motivator. Like it or not, Google is a business. They need to profit from projects eventually, and so far Google themselves haven't made much from Android. Can't really blame them for wanting to turn that around. No money, no more Android. > ... once you want to actually make money from it you're in hot water as any person or company can take your code, modify it, and benefit from it without giving a damn thing back to you. I suspect Red Hat would disagree with you on this one. There's several free clones (why I don't know - you only need one surely?) of RHEL such as CentOS, Scientific Linux, Oracle Linux etc. and yet Red Hat makes a very healthy profit. > And don't go on about the GPL, there are plenty of ways around that one too if you're motivated, and cash is one hell of a motivator. Nice to you see you don't care about any legal aspects and it should be noted that GPL is actually enforced legally (and extremely successfully - I don't know of any case where it lost, but I couldn't be wrong there). I think if you quoted Canonical as struggling for money, you might have had a better case - Ubunutu's download page now comes with a donation beg and the Amazon lens tie-up just smells of sellout/desperation. Unavoidable I'm afraid. Google has finally realized that while open source is excellent for academia and research projects, once you want to actually make money from it you're in hot water as any person or company can take your code, modify it, and benefit from it without giving a damn thing back to you. And don't go on about the GPL, there are plenty of ways around that one too if you're motivated, and cash is one hell of a motivator. Like it or not, Google is a business. They need to profit from projects eventually, and so far Google themselves haven't made much from Android. Can't really blame them for wanting to turn that around. No money, no more Android. Yeah completely open projects like Firefox apparently don't exit in your head. Also the money Google has made with Android don't exit in your head. I wonder what Firefox OS will do. It is completely open like Firefox and smartphone makers can work on it at the same time as Mozilla. Fragmentation is also very hard to get when your platform is web+Firefox.
{ "pile_set_name": "Pile-CC" }
The present invention relates generally to semiconductor integrated circuit devices and manufacturing architectures of the same. More particularly but not exclusively, the invention relates to those technologies adaptable for use with semiconductor integrated circuit devices having dynamic random access memory (xe2x80x9cDRAMxe2x80x9d) modules. Currently available DRAMs are typically designed to include an array of rows and columns of memory cells as disposed in a matrix form on a principal surface of a semiconductive substrate at those cross points or xe2x80x9cintersectionsxe2x80x9d between a plurality of word lines and a plurality of bit lines, wherein each of the memory cells consists essentially of a capacitive element for accumulation of information and a metal insulator semiconductor field effect transistor (MISFET) for use in selecting a single memory cell, which is serially connected to the capacitive element. The memory cell selecting MISFET is formed in an active region of the semiconductor substrate which is surrounded at its periphery by an element separation or isolation region. The MISFET is generally designed to consist of a gate oxide film and a gate electrode integral with a corresponding one of the word lines plus a pair of semiconductor active regions for use as a source and drain of the transistor. A bit line is disposed to overlie the memory cell selecting MISFET in a manner such that it is electrically connected to one of the source and drain which is commonly shared by two memory cell selection MISFETs. The information accumulation capacitive element is laid out at a location overlying the memory cell select MISFET and is electrically coupled to the remaining one of the source and drain. A DRAM device with the memory cell structure of this type has been disclosed in Published Unexamined Japanese Patent Laid-Open No. 5-291532 and other publications. The memory cells of the DRAM as disclosed therein are designed so that word lines are increased in width or made xe2x80x9cfatxe2x80x9d in active regions (the regions in each of which a word line serves as the gate electrode of a memory cell select MISFET) and reduced in width or xe2x80x9cthinnedxe2x80x9d in the remaining regions in order to retain the required gate length when miniaturizing or xe2x80x9cdownsizingxe2x80x9d the memory cell select MISFETs while at the same time minimizing the pitch of word lines. In addition, the DRAM memory cells as taught by the Japanese Application above is arranged so that the bit lines are partly fattened to extend up to those portions overlying the active regions and that a planar pattern of such active regions is designed into a gull-wing shape with part of it being bent toward the bit line side in order to achieve successful electrical conduction of more than one contact hole for use in connecting between one of the source and drain of a memory cell select MISFET and its corresponding bit line operatively associated therewith. Regrettably the DRAM memory cells taught by the above Japanese Application is faced with a problem as to an inability to provide any excellent size/dimension accuracy when partly increasing the widths of word lines and bit lines or when employing the gullwing-shaped planar pattern of the active regions due to the fact that present available photolithography techniques suffer from difficulties in accurately achieving ultra-fine resolution of curved-line patterns and/or folded-line patterns in cases where the minimal fabricatable size becomes at or near a limit of resolution in photolithography processes as a result of further progressing in microfabrication or miniaturization of such memory cells. Another problem faced with the prior art DRAM device is that as a through-going hole for use in connecting between the lower-side electrode of an information accumulation capacitive element and the remaining one of the source and drain of its associated memory cell select MISFET is inherently disposed between a bit line and a bit line, partly fattening the bit lines makes it difficult to attain the intended through-hole opening margin, which leads to incapability of assuring elimination of unwanted electrical short-circuiting between the lower-side electrode within a though-hole and its associative one of the bit lines. It is therefore an object of the present invention to provide a specific technique for enabling achievement of further miniaturized memory cells of a DRAM. The foregoing and other objects and inventive features of this invention will become more apparent in the following description and accompanying drawings. Some representative ones of the inventions as disclosed herein will be explained in brief below. (1) A semiconductor integrated circuit device incorporating the principles of the invention is arranged to a semiconductor integrated circuit device comprising a plurality of word lines extending in a first direction on a principal surface of a semiconductive substrate, a plurality of bits lines extending in a second direction at right angles to the first direction, and an array of memory cells of a DRAM as disposed at cross points of said word lines and said bit lines, each said memory cell including a serial combination of a memory cell selecting MISFET with a gate electrode as integrally formed with a corresponding one of said word lines and a capacitive element for information accumulation, wherein said plurality of word lines are arranged to linearly extend in the first direction on the principal surface of said semiconductive substrate with an identical width, and wherein a distance between adjacent ones of said word lines is less than said width. (2) The semiconductor integrated circuit device of the invention is such that the distance between the adjacent ones of said gate electrodes is set at a minimal size as determinable by a resolution limit of photolithography. (3) The semiconductor integrated circuit device of the invention is such that said word lines and the gate electrode of said memory cell selecting MISFET as integrally formed with a corresponding one of said word lines are comprised of a conductive film at least partially including a metallic film therein. (4) The semiconductor integrated circuit device of the invention is such that said semiconductive substrate has an active region with said memory cell selecting MISFET formed therein and being arranged to have an island-like pattern extending in the second direction on the principal surface of said semiconductive substrate while having its periphery as surrounded by an element isolation region. (5) The semiconductor integrated circuit device of the invention is such that the element isolation region surrounding said active region is formed of an element separation groove having a dielectric film embedded therein as defined in the principal surface of said semiconductive substrate. (6) The semiconductor integrated circuit device of the invention is such that said bit lines are formed overlying said memory cell selecting MISFET with an insulative film laid there between, wherein a contact hole for electrical connection between one of a source and drain of said memory cell selecting MISFET and a corresponding one of said bit lines is formed in self-alignment with the gate electrode of said memory cell selecting MISFET. (7) The semiconductor integrated circuit device of the invention is such that said information accumulation capacitive element is formed to overlie said memory cell selecting MISFET with an insulative film laid therebetween, wherein a contact hole for electrical connection between the other of the source and drain of said memory cell selecting MISFET and one electrode of said information accumulation capacitive element is formed in self-alignment with the gate electrode of said memory cell selecting MISFET. (8) The present invention also provides a semiconductor integrated circuit device comprising a plurality of word lines extending in a first direction on a principal surface of a semiconductive substrate, a plurality of bit lines extending in a second direction at right angles to the first direction, and an array of DRAM memory cells as disposed at intersections of said word lines and said bit lines, each said memory cell including a serial combination of a memory cell selecting MISFET with a gate electrode as integrally formed with a corresponding one of said word lines and a capacitive element for information accumulation, wherein said bit lines straightly extend in the second direction on the principal surface of said semiconductive substrate with an identical width and wherein a distance between adjacent ones of said bit lines is greater than said width. (9) The semiconductor integrated circuit device of the invention is such that the width of each said bit lines is equal to or less than a minimal size determinable by a resolution limit of photolithography. (10) The semiconductor integrated circuit device of the invention is such that said bit lines are comprised of a conductive film at least partially containing a metallic film. (11) The invention further provides a semiconductor integrated circuit device comprising a plurality of word lines extending in a first direction on a principal surface of a semiconductor substrate, a plurality of bit lines extending in a second direction at right angles to the first direction, and an array of DRAM memory cells as disposed at intersections of said word lines and said bit lines, each said memory cell including a serial combination of a memory cell selecting MISFET with a gate electrode as integrally formed with a corresponding one of said word lines and a capacitive element for information accumulation, wherein an active region with said memory cell selecting MISFET formed therein is arranged to have an island-like pattern extending in the second direction on the principal surface of said semiconductive substrate while having its periphery as surrounded by an element isolation region, wherein said plurality of word lines extend along the first direction on the principal surface of said semiconductive substrate with an identical width at a distance between adjacent ones thereof, wherein certain one of said bit lines as formed overlying said element isolation region with a first insulative film laid therebetween extends in the second direction on the principal surface of said semiconductive substrate with an identical width at a regular distance, and wherein a first contact hole for electrical connection between one of a source and drain of said memory cell selecting MISFET as formed in said active region and its associative one of said bit lines as formed overlying said element isolation region has a diameter in the first direction greater than in the second direction with part thereof arranged to extend to overlie said element isolation region. (12) The semiconductor integrated circuit device of the invention is such that said first contact hole includes a polycrystalline silicon film as formed therein, wherein said polycrystalline silicon film is doped with a chosen impurity equal in conductivity type to the source and drain of said memory cell selecting MISFET. (13) The semiconductor integrated circuit device of the invention is such that the corresponding one of said bit lines and said one of the source and drain of said memory cell selecting MISFET are electrically connected together via a first through-hole as formed in a second insulative film sandwiched between said bit lines and said first insulative film. (14) The semiconductor integrated circuit device of the invention is such that the width of said bit lines is less than a diameter of said first through-hole. (15) The semiconductor integrated circuit device of the invention is such that said first contact hole has a diameter in the first direction greater than in the second direction, where a portion of the contact hole consists essentially of a first region extending to overlie said element isolation region and a second region as formed beneath said first region to have a diameter in the first direction and diameter in the second direction being substantially equal thereto, wherein said first region is formed overlying said memory cell selecting MISFET. (16) The semiconductor integrated circuit device of the invention is such that said information accumulation capacitive element is formed over said bit lines with a third insulative film laid therebetween and is electrically connected to a remaining one of the source and drain of said memory cell selecting MISFET via a second through-hole formed in said third insulative film and a second contact hole as formed in said first insulative film at a location underlying said second through-hole. (17) The semiconductor integrated circuit device of the invention is such that said second contact hole includes a polycrystalline silicon film being embedded therein and doped with an impurity equal in conductivity type to the source and drain of said memory cell selecting MISFET. (18) The semiconductor integrated circuit device of the invention is such that said second through-hole is disposed between neighboring ones of said bit lines and is formed in self-alignment therewith. (19) A semiconductor integrated circuit device of the present invention comprises: an array of memory cells each including a serial combination of a MISFET for memory cell selection having a source and drain plus insulated gate electrode and a capacitive element for data storage having first and second electrodes with a dielectric film laid therebetween; word lines including first, second and third ones extending in a first direction on a principal surface of a semiconductive substrate and each having part used as the gate electrode of its associated memory cell selecting MISFET; and, bit lines including first and second ones as disposed adjacent to each other to extend in a second direction at right angles to the first direction on the principal surface of the semiconductive substrate, wherein the first to third word lines are substantially identical in width to one another, a distance between the first word line and the second word line neighboring thereto is substantially equal to a distance between the second word line and the third word line next thereto, the distance is less than the width, the first and second bit lines are substantially the same as each other in width, which is greater than the width of these bit lines. (20) The semiconductor integrated circuit device of this invention further comprises a first conductive layer provided between the first and second word lines for connecting the first bit line to either one of the source and drain of the memory-cell selecting MISFET and a second conductive layer laid between the second and third word lines for connecting the remaining one of the source and drain of the memory-cell selecting MISFET to the first electrode of the data storage capacitive element, wherein the aforesaid one of the source and drain of the memory-cell selecting MISFET and the first conductive layer are in self-alignment with the first word line and the second word line whereas the remaining one of the source and drain of the memory-cell selecting MISFET and the second conductive layer are self-aligned with the second word line and the third word line. (2) The invention further provides a method for manufacturing a semiconductor integrated circuit device comprising a plurality of word lines extending in a first direction on a principal surface of a semiconductive substrate, a plurality of bit lines extending in a second direction at right angles to the first direction, and an array of DRAM memory cells as disposed at intersections of said word lines and said bit lines, each said memory cell including a serial combination of a memory cell selecting MISFET with a gate electrode as integrally formed with a corresponding one of said word lines and a capacitive element for information accumulation, said method comprising the steps of: (a) forming on the principal surface of said semiconductive substrate of a first conductivity type an element isolation region and an active region of island-like pattern having its periphery surrounded by said element isolation region and extending along the second direction on the principal surface of said semiconductive substrate; (b) patterning a first conductive film formed over the principal surface of said semiconductive substrate to form word lines extending in the first direction the principal surface of said semiconductive substrate to have a distance between adjacent ones thereof being less than a width of each said word line; and (c) forming a source and a drain of said memory cell selecting MISFET by introducing an impurity of a second conductivity type into the principal surface of said semiconductive substrate. (22) In the semiconductor integrated circuit device manufacturing method of the present invention, the gate electrodes are fabricated so that the distance of adjacent ones thereof is set at a minimal size determinable by a resolution limit in photolithography. (23) The semiconductor integrated circuit device manufacturing method is arranged to include, after said step (c), further process steps of: (d) forming a first insulative film overlying said memory cell selecting MISFET and then forming a second insulative film overlying said first insulative film and being different in etching rate from said first insulative film; (e) etching those portions of said second insulative film overlying the source and drain of said memory cell selecting MISFET under a condition that the etching rate of said second insulative film with respect to said first insulative film becomes greater and then etching said first insulative film overlying the source and drain of said memory cell selecting MISFET to thereby form a first contact hole overlying one of said source and drain in self-alignment with said gate electrode to have a diameter in the first direction greater than a diameter in the second direction with part of said first contact hole extending toward said element isolation region while forming a second contact hole overlying a remaining one of the source and drain in self-alignment with said gate electrode and having a diameter in the first direction substantially the same as its diameter in the second direction; (f) after having embedded a conductive film in said first contact hole and said second contact hole, forming a third insulative film overlying said second insulative film and then forming a first through-hole in said third insulative film at a portion overlying a specified region extending to said element isolation region of said first contact hole; and (g) patterning a second conductive film as formed overlying said third insulative film to thereby form bit lines extending along the second direction on the principal surface of said semiconductive substrate with an identical width at a distance between adjacent ones of said bit lines being greater than said width, and then electrically connecting together said first contact hole and a corresponding one of said bit lines via said first through-hole as formed in said third insulative film. (24) The semiconductor integrated circuit device manufacturing method is such that the width of said bit lines is formed to be equal in dimension to or less than a minimal size determinable by a photolithography resolution limit. (25) The semiconductor integrated circuit device manufacturing method is arranged to include, after said step (g), further steps of: (h) forming a fourth insulative film overlying said bit lines and then forming a fifth insulative film overlying said fourth insulative film at an etching rate different from that of said fourth insulative film; (i) after having etch said fifth insulative film at a portion overlying said second contact hole under a condition that the etching rate of said fifth insulative film relative to said fourth insulative film is greater, etching said fourth insulative film at a portion overlying said second contact hole to thereby form a second through-hole overlying said second contact hole in self-alignment with a corresponding one of said bit lines; and (j) patterning a third conductive film as formed overlying said fifth insulative film to form a lower-side electrode of an information accumulation capacitive element as electrically connected to said second contact hole via said second through-hole.
{ "pile_set_name": "USPTO Backgrounds" }
sparkles in its deft portrait of tinseltown's seasoned veterans of gossip , wealth , paranoia , and celebrityhood .
{ "pile_set_name": "Github" }
1. Field of the Invention The present invention relates to image processing devices, image processing methods and image processing programs. More particularly, the present invention relates to image processing devices, image processing methods and image processing programs capable of detecting and correcting the inclinations of images. 2. Description of the Related Art In the field of image creating devices as typified by MFPs (Multi Function Peripherals) and laser beam printers, there have been developed “document electronic watermarking” techniques for embedding data as tint-block patterns on the backgrounds of document images. In order to scan a printed-out object having data embedded therein as tint-block patterns and detect the data, there has been a need for addressing the inclination of the document during the scanning. Japanese Laid-Open Patent Publication No. 2004-128845 discloses a method of detecting the inclinations of documents on the basis of the relationship among three types of dots embedded therein as electronic watermarks, as a technique relating to countermeasure to the inclinations of documents. Further, Japanese Laid-Open Patent Publication No. 03-144863 discloses a document-image inclination detecting and correcting method which calculates integral values of a document image in a plurality of directions and detects a peak value of the integral values as the direction of inclination, wherein during the detection the testing angle is changed in two steps (the testing angle is smaller at first and then widened) to enable rapid detection of the inclination.
{ "pile_set_name": "USPTO Backgrounds" }
Saint and the Fiction Makers The Saint is hired to protect Amos Klein, a secretive author who writes a popular and lucrative series of spy novels. Soon the Saint and Amos Klein are kidnapped by members of SWORD, the evil organisation from Klein's novels. It seems the world created by the famous author has truly come to life.... Leslie Charteris was born in Singapore and moved to England in 1919. He left Cambridge University early when his first novel was accepted for publication. He wrote novels about the Saint throughout his life, becoming one of the 20th century's most prolific and popular authors.
{ "pile_set_name": "Pile-CC" }
Mechanisms and rehabilitation of discoordination following stroke using a cortical imaging method. Mechanisms underlying discoordination, expressed in the form of obligatory coupling between the shoulder and the elbow muscles following stroke, are probed by simultaneously recording 163-channel EEG together with elbow/shoulder torques and EMGs from the upper arm. With this unique experimental protocol, we were able to have strict post hoc control of a subject's motor performance. Using this novel approach, this paper provides the first evidence of a linear relationship between an overlap in the cortical activities and obligatory shoulder/elbow torque coupling. Furthermore, results obtained from an 8 weeks multi-degree of freedom isometric training protocol showed that a well-designed treatment intervention could reduce obligatory torque coupling following stroke. Preliminary data indicates that this change in torque coupling appears to be associated with brain reorganization. Other potential rehabilitation methods based on an increased understanding of the mechanisms underlying discoordination following stroke are discussed.
{ "pile_set_name": "PubMed Abstracts" }
//----------------------------------------------------------------------- // <copyright file="BluetoothDevice.Android.cs" company="In The Hand Ltd"> // Copyright (c) 2017 In The Hand Ltd, All rights reserved. // This source code is licensed under the MIT License - see License.txt // </copyright> //----------------------------------------------------------------------- using Android.Bluetooth; using Android.Content; using Android.OS; using InTheHand.Devices.Bluetooth.Rfcomm; using InTheHand.Devices.Enumeration; using System; using System.Collections.Generic; using System.Globalization; using System.Threading.Tasks; namespace InTheHand.Devices.Bluetooth { partial class BluetoothDevice { internal Android.Bluetooth.BluetoothDevice _device; private BluetoothDevice(Android.Bluetooth.BluetoothDevice device) { _device = device; } public static implicit operator Android.Bluetooth.BluetoothDevice(BluetoothDevice device) { return device._device; } public static implicit operator BluetoothDevice(Android.Bluetooth.BluetoothDevice device) { return new BluetoothDevice(device); } private static async Task<BluetoothDevice> FromBluetoothAddressAsyncImpl(ulong bluetoothAddress) { byte[] buffer = new byte[6]; var addressBytes = BitConverter.GetBytes(bluetoothAddress); for (int i = 0; i < 6; i++) { buffer[i] = addressBytes[i]; } var device = DeviceInformation.Manager.Adapter.GetRemoteDevice(buffer); if (device.Type.HasFlag(BluetoothDeviceType.Classic)) { return device; } return null; } private static async Task<BluetoothDevice> FromIdAsyncImpl(string deviceId) { var device = Android.Bluetooth.BluetoothAdapter.DefaultAdapter.GetRemoteDevice(deviceId); if (device.Type.HasFlag(BluetoothDeviceType.Classic)) { return device; } return null; } private static async Task<BluetoothDevice> FromDeviceInformationAsyncImpl(DeviceInformation deviceInformation) { return deviceInformation._device; } private static string GetDeviceSelectorImpl() { return string.Empty; } private static string GetDeviceSelectorFromClassOfDeviceImpl(BluetoothClassOfDevice classOfDevice) { return "bluetoothClassOfDevice:" + classOfDevice.RawValue.ToString("X12"); } private static string GetDeviceSelectorFromPairingStateImpl(bool pairingState) { return "bluetoothPairingState:" + pairingState.ToString(); } private ulong GetBluetoothAddress() { return ulong.Parse(_device.Address.Replace(":", ""), NumberStyles.HexNumber); } private BluetoothClassOfDevice GetClassOfDevice() { return new BluetoothClassOfDevice((uint)_device.BluetoothClass.DeviceClass); } private BluetoothConnectionStatus _connectionStatus = BluetoothConnectionStatus.Disconnected; private BluetoothConnectionStatus GetConnectionStatus() { return _connectionStatus; } private string GetDeviceId() { return _device.Address; } private string GetName() { return _device.Name; } private async Task<RfcommDeviceServicesResult> GetRfcommServicesAsyncImpl(BluetoothCacheMode cacheMode) { BluetoothError error = BluetoothError.Success; List<RfcommDeviceService> services = new List<RfcommDeviceService>(); if (cacheMode == BluetoothCacheMode.Uncached) { error = _device.FetchUuidsWithSdp() ? BluetoothError.Success : BluetoothError.DeviceNotConnected; } ParcelUuid[] uuids = _device.GetUuids(); if (uuids != null) { foreach (ParcelUuid g in uuids) { services.Add(new RfcommDeviceService(this, RfcommServiceId.FromUuid(new Guid(g.Uuid.ToString())))); } } return new RfcommDeviceServicesResult(error, services.AsReadOnly()); } private void ConnectionStatusChangedAdd() { BluetoothAdapter.Default.DeviceConnected += Default_DeviceConnected; BluetoothAdapter.Default.DeviceDisconnected += Default_DeviceDisconnected; } private void Default_DeviceDisconnected(object sender, ulong e) { if(e == BluetoothAddress) { _connectionStatus = BluetoothConnectionStatus.Disconnected; RaiseConnectionStatusChanged(); } } private void Default_DeviceConnected(object sender, ulong e) { if (e == BluetoothAddress) { _connectionStatus = BluetoothConnectionStatus.Connected; RaiseConnectionStatusChanged(); } } private void ConnectionStatusChangedRemove() { BluetoothAdapter.Default.DeviceConnected -= Default_DeviceConnected; BluetoothAdapter.Default.DeviceDisconnected -= Default_DeviceDisconnected; } private void NameChangedAdd() { BluetoothAdapter.Default.NameChanged += Default_NameChanged; } private void NameChangedRemove() { BluetoothAdapter.Default.NameChanged -= Default_NameChanged; } private void Default_NameChanged(object sender, ulong e) { if (e == BluetoothAddress) { RaiseNameChanged(); } } } }
{ "pile_set_name": "Github" }
The marijuana stock market has had a great deal of news which has helped to bring in a whole new series of investors and those interested into the marijuana space. The current state of acceptance in the marijuana stock market has created an ecosystem ripe with opportunity. Unlike other industries at the beginning of their lifespan, many of the small to mid-cap companies have seen a large amount of opportunity not otherwise afforded to these businesses. Because of this, investing in the cannabis space has been a very broad and interesting space to watch and participate in. Next Green Wave (NGW) has been one of the primary growers of vertical cannabis for some time now. Next Green Wave recently released the news that they would be entering into a letter of intent with Loud Seeds, LLC. The agreement shows that the former will take over 100% of Loud Seeds including the brand as well as all of its assets. The deal shows that around $2 million worth of common shares will be distributed which shows the amount of devotion that NGW has to bring new innovation into the marijuana stock market. Leigh Hughes, the executive chairman of NGW stated his excitement recently, sharing that “Being able to bring one of the best seed banks in the world into our nursery continues to differentiate Next Green Wave from other cultivators. We are excited to join an award-winning genetics portfolio with world-class breeding skills as the construction of our first facility nears completion and begins cultivation.” The type of cannabis that businesses have been able to produce is a very important variable to how well the business is perceived by the consumer. Aphria (OTC:APHQF) has been one of the primary players in the marijuana stock space for several years now. The company in recent times has been working create a massive presence around the world to help secure future growth for marijuana abroad as well as in the domestic space. Aphria has worked to build partnerships in over ten countries across five continents which shows the dedication that they have to success in the future. The recent news of Canadian sales of recreational cannabis going live was a major exposure boost for the Canadian business. CEO of Aphria, Vic Neufield stated in regard to this happening that “Today we celebrate the end of nearly a century of prohibition and the beginning of an exciting new chapter for the cannabis industry. The Cannabis Act, which comes into effect today, cements Canada’s global leadership in this rapidly expanding industry. This is a historic moment as we march into the future of cannabis.” Marijuana stocks have proven to be resilient to many of the more popular market fluctuations that have occurred in the past few months broadly. As we move forward to a legal cannabis system around the world, there are various steps that have to take place first. Companies like these have become the forefront fighters for broadening the marijuana stock space and continue to represent the future of how smoothly the market can run when operating at a full capacity. Pursuant to an agreement between an affiliate of MAPH Enterprises, LLC (owners of MarijuanaStocks.com), Midam Ventures LLC and Next Green Wave (NGW), Midam has been paid $150,000 from Next Green Wave (NGW) for a period from October 1, 2018 to November 8, 2018. Midam has been compensated an additional $100,000 and has extended its period of coverage to December 8, 2018. We may buy or sell additional shares of (NGW) in the open market at any time, including before, during or after the Website and Information, to provide public dissemination of favorable Information about Next Green Wave. Click Here For Full, Updated Disclaimer MAPH Enterprises, LLC | (305) 414-0128 | 1501 Venera Ave, Coral Gables, FL 33146 | new@marijuanastocks.com
{ "pile_set_name": "OpenWebText2" }
Free Nurse Porn from the hot nurse capitol of the world! Where’s that? NursePorn.com of course. This online doctor’s office is full of naughty nurses who want nothing more than to pull their nurse pants down and tend to your aches and pains.
{ "pile_set_name": "Pile-CC" }
Bus driver fined K50,000 for causing death on January 10 last 2013 THE Kabwe High Court has slapped a K50,000 fine on a 49-year-old bus driver for causing the death of 10 people in a road traffic accident.Wekson Sikazwe pleaded guilty to 10 counts of causing death by dangerous driving on January 10 last 2013 on Great North Road in Kapiri Mposhi while driving a Marcopolo Scania bus registration number ABG 7403. Judge Elita Mwikisa last Monday slapped a K50,000 fine on Sikazwe. Ms Justice Mwikisa warned Sikazwe that if he defaults before October 7 this year, he will be jailed for nine months. Delivering judgment, Ms Justice Mwikisa told Sikazwe that the offence he committed is very serious. “Many people lost their lives,” Ms Justice Mwikisa said. Facts before the court are that on January 10 last year, Sikazwe caused the death of Amos Chisanga, Theresa Chimfwembe, Patrick Mutale, Belina Mulumbwa and Efraha Chiti when he was trying to overtake another vehicle but ended up hitting into an oncoming bus. Others are Chanda Nachivula, Pelon Nachilima, Israel Chishimba, Emmanuel Kangwa and Philip Mulenga. In mitigation, legal aid counsel Kamo Simfukwe said Sikazwe is a first offender and a father of five. Ms Simfukwe said Sikazwe is remorseful for his actions, which led to the death of 10 people. Ms Justice Mwikisa said she had considered Sikazwe’s mitigation. “You should familiarise yourself with the road traffic rules when you are carrying people, you only cared about reaching where you were going,” Ms Justice Mwikisa said. She also suspended Sikazwe’s drivers licence for one year.
{ "pile_set_name": "Pile-CC" }
DROP TABLE IF EXISTS t5; CREATE TEMPORARY TABLE t5(c1 BIT(10) NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` bit(10) DEFAULT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 TINYINT(10) NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` tinyint(10) DEFAULT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 SMALLINT(10) NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` smallint(10) DEFAULT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 MEDIUMINT(10) NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` mediumint(10) DEFAULT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 INT(10) NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` int(10) DEFAULT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 INTEGER(10) NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` int(10) DEFAULT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 BIGINT(10) NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` bigint(10) DEFAULT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 CHAR(10) NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` char(10) DEFAULT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 VARCHAR(10) NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` varchar(10) DEFAULT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 BINARY(10) NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` binary(10) DEFAULT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 VARBINARY(10) NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` varbinary(10) DEFAULT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 BIT(10) NOT NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` bit(10) NOT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 TINYINT(10) NOT NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` tinyint(10) NOT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 SMALLINT(10) NOT NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` smallint(10) NOT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 MEDIUMINT(10) NOT NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` mediumint(10) NOT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 INT(10) NOT NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` int(10) NOT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 INTEGER(10) NOT NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` int(10) NOT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 BIGINT(10) NOT NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` bigint(10) NOT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 CHAR(10) NOT NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` char(10) NOT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 VARCHAR(10) NOT NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` varchar(10) NOT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 BINARY(10) NOT NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` binary(10) NOT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test CREATE TEMPORARY TABLE t5(c1 VARBINARY(10) NOT NULL); SHOW TABLES; Tables_in_test SHOW CREATE TABLE t5; Table Create Table t5 CREATE TEMPORARY TABLE `t5` ( `c1` varbinary(10) NOT NULL ) ENGINE=ENGINE DEFAULT CHARSET=latin1 DROP TABLE t5; SHOW TABLES; Tables_in_test
{ "pile_set_name": "Github" }
There's no denying the fact that the pollution in the oceans is not only threatening the lives of marine creatures, but also creating problems in human lives. The latest research speculated that there would be more plastic in the ocean than fishes by the end of 2050. While a guy from Arizona has started Trashtag Challenge to make the environment clean, two students have discovered a method to convert plastic into useful compounds and water. How They Developed Bacterium That Transforms Plastic into Useful Compounds Miranda Wang and Jeanny Yao who have been working on their project for years said they developed a bacterium that could chemically breakdown plastic polymers. Finally, their product is reaping benefits. They have a way of recycling plastic pollution into useful compounds. Do you want to know how they did this? They used genetically engineered bacteria to break polymers such as polyethylene film to turn plastic into more valuable products. What’s amazing is the duo has received all the rights for the product and even secured funding of four hundred thousand dollars to create a product at the age of twenty years. They’re the Youngest Ever to Win Perlman Science Prize Source = Wonderfulengineering The duo has won five prizes for their innovation and became the youngest ever to win the Perlman science prize. They became famous overnight because of this bacterium that can convert plastic into the water. Moreover, this technology can also be used for creating raw materials for clothing and cleaning the beaches. What do you think- is it possible to stop people from using plastic? The same question came in their mind. Miranda said – “It is practically impossible to make people stop using plastic, we need technology to break the material, and everything becomes biodegradable.” The bacterium is developed into two parts where the plastics are dissolved, and enzymes are catalyzed. These elements are then covered in a biodigester station, where they function as if they are the leftovers of any food. You will be surprised to know that this process runs only for 24 hours and converts plastic into the water. The modified bacteria dissolve plastic into water and CO2. They believe that they can turn the plastic crisis into a great opportunity and disrupt the textile industry. You can check more details about their project BioCellection here. (15.1) The Story Behind this BioCellection Project Source = Cnn Unlike most of the people who have concerns about global warming but does not take any action to stop it, these girls took the matter seriously and developed the solution. Each year, we produce over 400 MM tons of plastic, and approximately 80-90% ends up in landfills. The conversion of plastic into usable material is challenging because currently, it is not feasible and economical. Today, we do not have great conversion technologies to enhance product value. Ultimately, global warming and plastic pollution is threatening the safety of wildlife and food exchange of over 4 billion people. According to a study, plastic accumulation is harmful to marine life. The plastic leftovers have been found in the stomachs of whales and turtles. The type of plastic used in bottles is lightweight and durable, but it is resistant to biodegradation. This is not the first time scientists worked on the conversion of plastics into usable materials. In 2016, the Japanese team from Keio University and Kyoto Institute of Technology run by Shosuke Yoshida collected over 200 PET contaminated samples, which include wastewater from plastic bottle recycling site. Then they tested the microbes to see if they were eating the PET (polyethylene terephthalate). It was discovered that there are bacteria responsible for degrading PET. The species was named as Ideonella Sakaiensis. The test proved that the species uses two enzymes to break the PET. Even after doing research, and finding that particular bacteria is responsible for eating plastics, it was not clear how and whether it will stop the plastic accumulation in the region. Now, Miranda Wang and Jeanny Yao have developed a bacterium to stop plastic use. I think it is a great innovation! Let us know more about their vision and how can you buy this product. Their Vision and Idea Behind the Project Source = Theconversation The project tackles plastic pollution one step at a time. They started this with polyethylene and polystyrene films, which are the major cause of pollution. The goal is, to recycle the mixed & contaminated plastics that at present cannot be recycled into usable products. By coupling synthetic biology and chemistry, the plastic would break down into building blocks, and then converted into other materials. How Can You Buy This Product? No doubt, their innovation is amazing, and people would love to buy this product. Sadly, their product is not available in the market currently, but it would be commercially available in the coming two years. Watch How Jeanny & Miranda are Helping Restore our Oceans with Biotechnology: Final Words What do you think of this innovation? Isn’t it a great step by these students to protect our environment? Do you have any other idea about how you can stop the use of plastics? If so, share your views below.
{ "pile_set_name": "OpenWebText2" }
Thursday, April 26, 2012 Kat just moved to Virginia just before she started her senior year. It was the worst thing that she could have imagined. No more friends, new school, new town and a neighbor she can't stand. No matter how much she wants to stay away from Daemon her friendship with his sister Dee just draws her closer to him. But something is different with Dee and Daemon and Kat is stuck in the middle of it. An exciting and different read for me. Every page is full of action and excitement. There was no dull moment for this book. It was like everything was moving fast. I love the banter between Daemon and Kat. It was hilarious and sometimes nerve racking. Especially because you read this book from Kat's point of view so you get a fair share of her frustration and irritation with Daemon. The attraction between the two of them is undeniable. I love the fact that Kat isn't a push over. She is a strong a character. This first book is an introduction to Daemon's world. Where everything is otherworldly. There are still more mysteries to be uncovered. Including a past that still haunts Daemon and Dee. I can't wait for the next book.
{ "pile_set_name": "Pile-CC" }
Dracaena Vand. Ex. L. fragrans (group Compacta) xe2x80x980101WSxe2x80x99 The present invention comprises a new and distinct cultivar of Dracaena plant botanically known as Dracaena Vand. Ex. L. fragrans (group Compacta) and hereinafter referred to the cultivar name xe2x80x980101WS xe2x80x99. The new cultivar was selected by the inventor, Ruud A. M. Scheffers, in Honselersdijk, in 1998. The new cultivar was obtained as a natural mutation of Dracaena Vand. Ex. L. fragrans (group Compacta) named xe2x80x98Surprisexe2x80x99 (unpatented). The new cultivar was first asexually propagated by the inventor in Honselersdijk, The Netherlands, in 1998. Subsequent asexual reproduction of the new cultivar by division has demonstrated that the combination of characteristics as herein disclosed for the new cultivar are firmly fixed and retained through successive generations of asexual reproduction. The new cultivar reproduces true to type. The following traits have been repeatedly observed and in combination distinguish xe2x80x980101WSxe2x80x99 as a new and distinct cultivar: 1. three main colors in the length of the leaves: dark green (RHS 139 A), and grayish green center colors (RHS 188A and RHS 189D), secondary colors include: small green center stripes (RHS 144 A), and green varieties (between 139A and 188A), followed by a first rim of white (RHS 155B) and an outer rim of lemon color (RHS 144A); 2. strong, leathery, lightly ribbed leaves; and 3. leaf length 25 cm, leaf width 5-5.5 cm. xe2x80x980101WSxe2x80x99 has not been observed under all possible environmental conditions. The phenotype on the new cultivar may vary significantly with variations in environment such as temperature, light intensity, and day length without any change in genotype. The following observations, measurements and values describe plants grown in Honselersdijk, The Netherlands under greenhouse conditions which closely approximate those generally used in horticultural practice. In comparison with the well-known Dracaena Vand. Ex. L. fragrans (group Compacta) named xe2x80x98Surprisexe2x80x99, xe2x80x980101WSxe2x80x99 has three main colors in the length of the leaves: dark green center color, followed by a first, broad rim of white and an outer rim of lemon color. xe2x80x98Surprisexe2x80x99 does not have the broad white rim.
{ "pile_set_name": "USPTO Backgrounds" }
Peripheral vascular smooth muscle responsiveness to tumour-promoting phorbol esters in pacing-induced heart failure. Contractions of the dorsal pedal artery and saphenous vein to phorbol 12,13-dibutyrate (PDBu), 12-O-tetradecanoylphorbol 13-acetate (TPA), and 4 alpha-phorbol 12,13-didecanoate (4 alpha-phorbol) were measured from dogs with and without pacing-induced heart failure. The effects of polymyxin B (a relatively selective protein kinase C inhibitor), nifedipine (calcium channel blocker), and prazosin (alpha 1-adrenoceptor antagonist) were examined on the contractions developed to PDBu before heart failure, after 1 week of pacing, and at end-stage heart failure. PDBu and TPA, but not 4 alpha-phorbol, produced concentration-dependent increases in contractile force in both the artery and the vein. In the dorsal pedal artery, efficacy of and sensitivity to PDBu and TPA were enhanced after 1 week of pacing, but returned to control level at end-stage heart failure. In the saphenous vein, the concentration-effect curve to PDBu was displaced to the left after 1 week of pacing; EC50 values for PDBu were 3.2 x 10(-9) and 3.2 x 10(-8) M for 1 week paced and control, respectively. Polymyxin B significantly decreased the efficacy of PDBu in the dorsal pedal artery at all time points, but was less effective with advancing heart failure. In contrast, in the vein, there was a significant increase in inhibitory potential at end-stage heart failure. In all cases, nifedipine inhibited PDBu in a concentration-dependent manner. With the progression of heart failure, the contractions of the saphenous vein, developed to PDBu, became more sensitive to inhibition by nifedipine. Prazosin failed to inhibit vascular effects of PDBu. These results are discussed in terms of protein kinase C involvement in vascular contractions and its role in the pathogenesis of heart failure.
{ "pile_set_name": "PubMed Abstracts" }
[Combination chemotherapy concurrent with small-dose radiation therapy of small cell carcinoma of the lung]. Forty consecutive patients with small cell carcinoma of the lung were treated with chemotherapy, radiotherapy or both. Of 34 patients treated with chemotherapy, 24 were treated with combination chemotherapy, containing cyclophosphamide vincristine methotrexate and procarbazine, concurrent with small dose radiation therapy (500cGy/5 fraction) as a chemosensitizer (COMPrt). The response rate to this regimen was 81% (29% complete) and the 2 year survival rate was 28.6%. These results have been superior to other regimens and the toxicity was not see to be any higher. After completion of COMPrt regimen, 10 patients were treated with intrathoracic radiation therapy (average dose 3000cGy) and 3 received surgical treatment. Radiation therapy improved the 2-year survival rate (42.2%) when compared with those patients who received no radiation therapy (18.2%). Three patients received surgical treatment were considered to be disease-free for 23, 17, and 9 months respectively, after induction of chemotherapy.
{ "pile_set_name": "PubMed Abstracts" }
A British tourist and his French companion have been arrested in Peru after posing naked for photos at the ancient site of Machu Picchu. The police stopped 23-year-old Adam Burton and French national Eric Xavier Mariec, 28, while they were still naked at the ancient site, which re-opened this week after maintenance work. They were arrested on the spot and police later released the images from a mobile phone, showing the two men posing in body-builder stances with no clothes on. The police stopped 23-year-old Adam Burton and French national Eric Xavier Mariec, 28, while they were still naked at the ancient site, which re-opened this week after maintenance work They were arrested on the spot and police later released the images from a mobile phone, showing the two men posing in body-builder stances with no clothes on The men were prosecuted for offences against morality, according to state news agency Andina, and the photos were released to warn other tourists against lewd behaviour at the ancient site. The photos showed the Incan citadel in the background, which is a proud part of Peruvian heritage and one of the Seven Wonders Of The World. Millions of tourists from all over the world visit the site every year, which is set in the Andes mountains. It had been closed throughout February but the Inca trail route was open again on Tuesday, according to the Department of Culture of Cuzco. The incident is almost exactly two years after police in Peru announced a crackdown on tourists taking naked photos at the site after a number of online photos and videos emerged. Foreigners stripping off and streaking across the Incan ruins, prompting a response from the Ministry of Culture. In 2013, two Antipodeans - an 18-year-old Australian and 30-year-old New Zealander - were detained by guards for baring their backsides at the citadel. They were briefly held in custody and forced to delete naked photographs from their digital camera - but not before it had gone viral on Peruvian social media after it was 'irresponsibly published to the Internet,' a police statement said. 'They were made aware that it is totally forbidden to take photographs of this magnitude,' the report, obtained by local travel agency Fertur Peru Travel, added. In February 2014, a video was posted to YouTube showing a naked couple streaking across Machu Picchu, considered to be a sacred holy site, as a park guard gave chase. The couple could be seen running through the grass, holding their clothes in their hands, jumping over the ancient stone walls, and the incident was filmed by another tourist. The incident is also reminiscent of Eleanor Hawkins, a 24-year-old student who jailed last year for stripping off on a sacred mountain in Malaysia. Miss Hawkins, along with Canadian siblings Lindsey and Danielle Petersen and Dutch national Dylan Snel, pleaded guilty to a public nuisance offence after going topless while on Mt Kinabalu. A recent graduate with a masters degree from Southampton University, Miss Hawkins was in the middle of a gap year travelling around south-east Asia. A spokesman for Fertur Peru Travel, which organises tours to Machu Picchu, said: 'Stripping naked at Machu Picchu probably isn't a great idea, unless you want to be removed from the citadel and possibly face criminal charges. Prudish perhaps, but those are the rules.' An FCO spokesman said: 'We are in contact with local authorities in Peru following an incident involving a British national in Machu Pichu.' However, it is not believed that the FCO have been asked for any assistance in this case.
{ "pile_set_name": "OpenWebText2" }
Play Xbox online for free this weekend Microsoft has offered its Free Multiplayer Weekends before, but at the end of this week, the promotion will be available to both Xbox One and Xbox 360 together for the first time. In fact, it's the first time the free trial has been available on Microsoft's current-gen console. This means that from Thursday to Sunday (June 9-12), you'll be able to play with your pals online free of charge if you don't have an active Xbox Live Gold subscription. During that same period, Rocket League for Xbox One will also be free to play, so we hope you didn't already have plans. Starting Sunday, all Xbox Live Gold members will be able to play games from the EA Access library for free until June 22nd. That's usually a $5 monthly or $30 annual fee for titles like Battlefield, Titanfall, Madden NFL 16, FIFA 16, Dead Space and more. If you decide to splurge for a subscription after the trial period is up, you'll be able to pick up any saved progress from where you left off.
{ "pile_set_name": "Pile-CC" }
Our Princess Boys: Breaking Gender Norms With Toys and Tiaras Our Princess Boys: Breaking Gender Norms With Toys and Tiaras Seattle author Cheryl Kilodavis was taken aback when her son Dyson, age 2 at the time, began gravitating toward dolls, "dress up” and jewelry. Initially, she tried redirecting him to the trucks and balls that her older son liked to play with, without much success. "The way that I explain it is that he has always had an eye for pretty things,” she says. In her children’s book, My Princess Boy, Kilodavis writes about a 4-year-old boy who loves tiaras, dresses and the color pink. It is based on Dyson’s story and her own journey to acceptance. "What we didn’t anticipate was that the book would appeal to every child who feels different,” says Kilodavis. The book has resonated with men, too. Kilodavis has received letters and e-mails from around the globe thanking her for challenging the traditional male image. Boys often like girls’ gear Christia Brown, Ph.D., a professor of developmental psychology at the University of Kentucky, says it’s common for boys in this age group to want to wear frilly dress-up clothes or have their nails painted. "There doesn’t seem to be anything biological that drives boys to be interested in cars and trucks, and girls to be interested in dolls,” says Brown. Redmond dad Dan Fernandez remembers his sisters trying to put makeup on him when he was a child. His mom stopped them, worrying it might "make him gay,” he says. He and his wife, Angie, don’t fixate on whether the toys and books that their 3-year-old son, Gavin, plays with are geared toward boys. "Gavin will just pick whatever looks cooler,” says Fernandez. "He has no concept that one is right or wrong.” When Gavin tried to play with Angie’s makeup, they let him. "We didn’t want to say, ‘No, this is something you can’t touch.’ It was more like, ‘Don’t knock over that container, because that makeup is expensive,’” says Fernandez. While it’s not unusual for parents to be concerned that allowing a boy to play with dolls or makeup will in some way affect his sexual orientation, the research doesn’t support this idea, says Brown. "Instead, there seem to be genetic, hormonal, neurological and social factors that contribute to sexual orientation. In other words, we are either gay or not, just like we have either brown hair or not. It can’t be encouraged or discouraged, simply accepted,” she says. Rhinestones stay at home Most boys start developing more gender-typical interests by age 4 or 5, as they start paying attention to what other boys are playing with. For boys who continue to enjoy girl-oriented play as they get older, Brown suggests parents allow them to engage in these activities at home. She also recommends that parents keep a supply of gender-typical toys available so that when friends come over, "it’s easy to find a shared interest,” she says. If a boy decides to carry a rhinestone-embellished backpack to school, parents should prepare him for negative feedback. "You have to walk that fine line between helping your child be an individual, but at the same time, recognizing the world in which we live,” says Brown. Kilodavis says the way they approach these issues with Dyson has changed over the years. They can be more direct with him, because Dyson, now 7, has learned that his clothing choices can elicit negative responses. "I might say to him, ‘You can wear that dress to the party, but people may say some not-so-nice things,’” she says. Sometimes Dyson will decide that what he’s wearing is fine; other times he will opt for something more boyish. When her son, Eric, went through a pink phase, Bellevue mom Beth Golde says, she was often dismayed by the reactions of other people. "We would go to the party store, and he would pick the pink balloon every single time,” she says. Golde and her husband, Peter, decided to throw Eric a pink-themed party for his second birthday. "My parents came to the party and were so angry at us for allowing this.” When their daughter, Ava, decided she wanted a pickup-truck-themed birthday party, the reaction was completely different. "Everyone thought it was so cute.” When Eric was almost 3, the Goldes painted their house — and let Eric select the color for his room. "The one that he wanted was called ‘Cotton Candy,’” says Golde. The painter refused to paint a boy’s room pink. "He painted one wall in Cotton Candy, and convinced Eric to go with a blue-purple for the rest.” Eric, now 11, is a budding engineer who can dismantle and reassemble anything electric. His love of pink has faded over the years. "He doesn’t mind pink now. He’s learned that he shouldn’t like it. Now he’d choose orange or red,” says Golde. Despite all the criticism she and her husband have faced, Golde feels they’ve handled things well. "We want Eric’s life choices to be authentic and not prescribed by what we want. We don’t really care what color his room is. What we care about is that he feels loved, nurtured, cared for and honored.” Laura Mackenzie is a freelance writer. She lives in Redmond with her husband and two children, ages 8 and 12. Worried About Your Child's Interests? Be Flexible We tend to be rigid in our thinking about gender behavior in boys. We don’t worry when girls wear boyish clothes or play with a train set. It’s important that we allow boys more flexibility when it comes to gender-based play. If some of your child’s interests don’t fit very well with gender norms, try to focus more on whether the activity represents a positive trait in your child. If a boy is nurturing or sensitive, foster those strengths and help your child feel good about who he is. If you are concerned about a gender identity disorder, remember that boys in this age group are still learning about gender, and it’s normal for them to participate in both boy and girl activities. There is more reason for concern if a child expresses an ongoing unhappiness with being a boy.
{ "pile_set_name": "Pile-CC" }
Exceedingly odd comment, but I do not think she'd enjoy that idea of "Frozen Fever Forever" because it *might* mean she'd have a fever Forever. I'm not making fun of you, this is a beautiful picture, but the idea is a lot of fun. I love her too- it's just a little crazy thinking of having a fever forever- that's all!
{ "pile_set_name": "OpenWebText2" }
Characteristics of mesenteric lymph node cells homing to gut-associated lymphoid tissue in syngeneic mice. A subpopulation of cells in murine mesenteric lymph nodes, about 15% of those synthesizing DNA at any given time, homes specifically to the gut and mesenteric nodes of syngeneic recipients within 1 day of i.v. transfer. In contrast, cells from Oeyer's patches or peripheral lymph nodes do not. A large proportion of the B blasts which home to the small intestine has surface Ig, but lacks complement receptors. Thy-1-positive T blasts home to the gut to a lesser extent than B blasts. However, it is probable that equal fractions of B and T blasts home to mesenteric nodes. Homing is not affected by measures calculated to interfere with the combination of cell surface IgA and secretory component.
{ "pile_set_name": "PubMed Abstracts" }
Tips On Hosting A Summer Pie Party We’re sharing how we put together this super easy Summer Pie Party idea, as well as the best, frozen dessert. Thank you Edwards® Desserts for sponsoring this post. Head to the frozen desserts aisle of your grocery store to pick up your favorite Edwards pie! Tips On Hosting A Summer Pie Party The summer months are slipping by, but we can’t end summer without throwing a pie party. A pie party is a party where the main focus is all about pie, and since it’s summer the most coveted pies are frozen ice cream pies. Who doesn’t like cool, refreshing, sweet, and delicious frozen pies? For our latest pie party, we got a little help from our friends over at Edwards® Desserts. Here are a few things you want to keep in mind when hosting your own pie party. When putting together the menu for your party, whether formal, semi-casual or totally dressed down, you have to plan, plan, and plan. And to keep things on track we suggest creating a pre-party checklist. Here, we are sharing our Essential Summer Pie Party Top Four Party Tips. We’re laying it all out for you and if you follow along step-by-step you’ll be throwing your very own summer pie party. Now, let’s get to it. Are you ready to have some delicious fun? The Right Vibe Determining the vibe of your party will go a long way to ensuring your party meets your expectations. As the host, you get to create the kind of vibe you want. Think chill, upbeat, welcoming, and fun. And it doesn’t matter if you’re pulling off a party that’s theme related, classy, formal, semi-formal, or come as you are. You set the mood by paying attention to things like lighting, décor, tableware, beverages, food, and right down to the music playlist. Décor It is often said, “We eat with our eyes!” Well, the same goes for creating the perfect party look. Add splashes of color; color can affect mood and since this is a summer party choosing brilliant colors like yellows, aqua blues, or even pastel colors make a big difference. For our summertime pie party, we chose a space that was well-lit with lots of white surfaces and natural light. Our space is bright and airy and adding pops of color went a long way in regards to setting a buoyant party vibe. We also chose items that were modern, sleek, elegant but not overstated. We selected glassware for the snacks and ceramic geometric bowls for the fresh strawberries + dark chocolate balsamic glaze. We also served our custom made party mocktail from a slender glass pitcher with gold graphics. And, by using lots of plants we created an inviting space which carried on the overall summer vibe. Choosing The Right Pie Now, let’s talk pie because the pie is why we’re all here. Since we’re throwing a summertime pie party, a hot pie fresh out of the oven isn’t going to do. Enter Edwards® Desserts. We highly recommend Edwards frozen dessert pies over ice cream or any other frozen dessert treat because your guests deserve the crème de la crème. Plus, ice cream can be so blasé, your guests deserve better. Your guests are going to be absolutely thrilled and delighted when you serve up these delicious frozen desserts. Every Edwards dessert pie is made with a cookie crumb crust with an assortment of flavors. You will also enjoy the toppings like cookie crumbles, shards of rich dark chocolate, creamy caramel, and cloud-like dollops of airy whipped cream. And the flavors don’t end there, visit Edwards Desserts and check out all of their deliciously wonderful frozen pies. Pro-tip: With the hot summer heat, it may be a challenge to keep your frozen pie cold. Keep your frozen desserts into the freezer until you are ready to serve them. A few hours prior to the party, place empty pie pans into the freezer. Using this method will allow you to transfer the frozen pies into cold pie pans, allowing the pies to stay cold. What Foods To Serve At A Pie Party Our advice on serving food at your summer pie party is to keep it light, simple, and accessible. For this party idea, I laid out an assortment of light snacks like mixed nuts. blueberries, fresh veggies with a homemade dipping sauce. I also served up a cold Tuna + Olive Tamanade Salad and paired it with crackers. I also set out fresh strawberries to be tipped in a dark chocolate balsamic sauce using long wooden skewers. The goal is to provide enough nibbles for a wide variety of taste, doing so will keep your guest happy, munching, and mingling. Cocktails + Mocktails Providing refreshments is a big part of getting the party started. For our soirée, we mixed up our Lavender Lemonade mocktail. Also, as a good host, we provided additional drink options like chilled rosé wine and variety of spirits like vodka, bourbon, gin, and mineral water to suit guests not wanting to indulge in alcoholic drinks. You can also take this mocktail and add a little bourbon to create a cocktail. Be sure to drink responsibly. Elevate your pie game by hosting your own pie party, and it doesn’t when because no matter the season Edwards Desserts has the perfect frozen pie just for you. Look at those sweet, chilled, and heavenly delicious layers of frozen goodness. If this doesn’t make you want to lick the screen you may not be human. What goes better with summertime fun? I’m thinking Edwards Dessert pies is the only right answer. Sink your fork in a lil’ slice of heaven on earth. This is one you have to try, the Edwards Cookies and Crème Pie. With fluffy vanilla crème and chocolate cookie chunks on a fresh-from-the-oven dark chocolate cookie crumb crust, it’s hard to stop just at one bite. Also, it’s a showstopper, with no need to DIY a pie or add some fussy toppings. And you can’t go wrong with a key lime pie. Edwards Key Lime Pie is made with real Key West lime juice, topped with whipped crème rosettes on a fresh-from-the-oven vanilla cookie crumb crust. Head out to your nearest grocery store and grab your favorite flavor or discover a new favorite of Edwards Desserts pies, and I’m thinking your summer party will never be the same. You can also enter the giveaway down below to win a free coupon for Edwards Desserts pies. Winners will be randomly selected and notified by CLEVER on Fri., August 30, 2019
{ "pile_set_name": "Pile-CC" }
Värttinä (album) Värttinä is the first album by the band of the same name, Värttinä. On it, the 21-member band performs traditional Karelian folk songs. It was originally self-released in 1987 on vinyl and cassette. In 1992, it was re-released in Finland by Mipu Music. In 1997 it was reissued in Japan by Warner Japan. In the same year, it was reissued in the United States by Finlandia Innovators, under the title Värttinä - The First Album. Track listing "Ruskie neitsyt" ("Brown-haired Maiden") – 2:19 "Mainitus" ("Mainitus Dance") – 1:35 "Lehmän tanssi" ("Cow's Dance") – 4:03 "Miss' on miun armahin" ("Where Is My Beloved") – 3:57 "Mie tahon tasaista miestä" ("I Want A Steady Man") – 1:18 "Juhon kontra" ("Juho's Contradance") – 1:34 "Tutskovin polska" ("Tutskov's Polska") – 1:53 "Suojärven katrilli" ("Suojärvi Quadrille") – 2:25 "Karjalainen kehtolaulu" ("Lullaby from Karelia") – 4:05 "Varrii ompi zaijuvesj" ("The Tea-water is Hot") – 2:08 "Koiviston polska" ("Koivisto Polska") – 1:35 "Duetto" ("Duet") – 1:35 "Melkutus" ("Melkutus Dance") – 1:43 "Sade" ("Rain") – 3:25 "Tsiiputus" ("Tsiiputus Dance") – 1:25 "Sekatyylipolkka" ("Polka in Mixed Style") – 2:19 "Ompa tietty tietyssäni" ("I Am Thinking of A Particular One") – 3:31 In the Japanese release, "Ruskie neitsyt" was moved from track 1 to track 15, after "Tsiiputus". External links The band's page on album, with samples Fan site with lyrics and English translations for 7 tracks Category:1987 debut albums Category:Värttinä albums Category:Self-released albums
{ "pile_set_name": "Wikipedia (en)" }