text
stringlengths
1
3.78M
meta
dict
Katie & Steve | August 1, 2015 There was sunshine, lush green meadows, a rainstorm, and a rainbow all at the wedding of Katie & Steve. Hosted at Katie’s parents mountain home, their vintage wedding included Trolly Cars, book centerpieces, a rockin’ live band (Bobby Yang & His Unriveled Players), and a 1939 Rolls Royce getaway car. Katie stood out in a shockingly beautiful emerald green gown and her & Steve’s love and happiness fueled the party.
{ "pile_set_name": "Pile-CC" }
I'm so sorry it has taken me so long to post. I got some fantastic books from my book Santa! I'm so excited to read Sandman! Thanks so much, stranger!, for indulging my graphic novel obsession!
{ "pile_set_name": "OpenWebText2" }
/* * Copyright (C) 2019 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.android.server.job; import android.util.KeyValueListParser; import androidx.test.filters.SmallTest; import androidx.test.runner.AndroidJUnit4; import com.android.server.job.JobSchedulerService.MaxJobCounts; import org.junit.Assert; import org.junit.Test; import org.junit.runner.RunWith; @RunWith(AndroidJUnit4.class) @SmallTest public class MaxJobCountsTest { private void check(String config, int defaultTotal, int defaultMaxBg, int defaultMinBg, int expectedTotal, int expectedMaxBg, int expectedMinBg) { final KeyValueListParser parser = new KeyValueListParser(','); parser.setString(config); final MaxJobCounts counts = new JobSchedulerService.MaxJobCounts( defaultTotal, "total", defaultMaxBg, "maxbg", defaultMinBg, "minbg"); counts.parse(parser); Assert.assertEquals(expectedTotal, counts.getMaxTotal()); Assert.assertEquals(expectedMaxBg, counts.getMaxBg()); Assert.assertEquals(expectedMinBg, counts.getMinBg()); } @Test public void test() { // Tests with various combinations. check("", /*default*/ 5, 1, 0, /*expected*/ 5, 1, 0); check("", /*default*/ 5, 0, 0, /*expected*/ 5, 1, 0); check("", /*default*/ 0, 0, 0, /*expected*/ 1, 1, 0); check("", /*default*/ -1, -1, -1, /*expected*/ 1, 1, 0); check("", /*default*/ 5, 5, 5, /*expected*/ 5, 5, 4); check("", /*default*/ 6, 5, 6, /*expected*/ 6, 5, 5); check("", /*default*/ 4, 5, 6, /*expected*/ 4, 4, 3); check("", /*default*/ 5, 1, 1, /*expected*/ 5, 1, 1); check("", /*default*/ 15, 15, 15, /*expected*/ 15, 15, 14); check("", /*default*/ 16, 16, 16, /*expected*/ 16, 16, 15); check("", /*default*/ 20, 20, 20, /*expected*/ 16, 16, 15); // Test for overriding with a setting string. check("total=5,maxbg=4,minbg=3", /*default*/ 9, 9, 9, /*expected*/ 5, 4, 3); check("total=5", /*default*/ 9, 9, 9, /*expected*/ 5, 5, 4); check("maxbg=4", /*default*/ 9, 9, 9, /*expected*/ 9, 4, 4); check("minbg=3", /*default*/ 9, 9, 9, /*expected*/ 9, 9, 3); } }
{ "pile_set_name": "Github" }
/* * NCA Status definitions * * Copyright 2007 Robert Shearman * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA */ #define NCA_S_COMM_FAILURE 0x1C010001 #define NCA_S_OP_RNG_ERROR 0x1C010002 #define NCA_S_UNK_IF 0x1C010003 #define NCA_S_WRONG_BOOT_TIME 0x1C010006 #define NCA_S_YOU_CRASHED 0x1C010009 #define NCA_S_PROTO_ERROR 0x1C01000B #define NCA_S_OUT_ARGS_TOO_BIG 0x1C010013 #define NCA_S_SERVER_TOO_BUSY 0x1C010014 #define NCA_S_FAULT_STRING_TOO_LONG 0x1C010015 #define NCA_S_UNSUPPORTED_TYPE 0x1C010017 #define NCA_S_FAULT_INT_DIV_BY_ZERO 0x1C000001 #define NCA_S_FAULT_ADDR_ERROR 0x1C000002 #define NCA_S_FAULT_FP_DIV_ZERO 0x1C000003 #define NCA_S_FAULT_FP_UNDERFLOW 0x1C000004 #define NCA_S_FAULT_FP_OVERFLOW 0x1C000005 #define NCA_S_FAULT_INVALID_TAG 0x1C000006 #define NCA_S_FAULT_INVALID_BOUND 0x1C000007 #define NCA_S_RPC_VERSION_MISMATCH 0x1C000008 #define NCA_S_UNSPEC_REJECT 0x1C000009 #define NCA_S_BAD_ACTID 0x1C00000A #define NCA_S_WHO_ARE_YOU_FAILED 0x1C00000B #define NCA_S_MANAGER_NOT_ENTERED 0x1C00000C #define NCA_S_FAULT_CANCEL 0x1C00000D #define NCA_S_FAULT_ILL_INST 0x1C00000E #define NCA_S_FAULT_FP_ERROR 0x1C00000F #define NCA_S_FAULT_INT_OVERFLOW 0x1C000010 #define NCA_S_FAULT_UNSPEC 0x1C000012 #define NCA_S_FAULT_REMOTE_COMM_FAILURE 0x1C000013 #define NCA_S_FAULT_PIPE_EMPTY 0x1C000014 #define NCA_S_FAULT_PIPE_CLOSED 0x1C000015 #define NCA_S_FAULT_PIPE_ORDER 0x1C000016 #define NCA_S_FAULT_PIPE_DISCIPLINE 0x1C000017 #define NCA_S_FAULT_PIPE_COMM_ERROR 0x1C000018 #define NCA_S_FAULT_PIPE_MEMORY 0x1C000019 #define NCA_S_FAULT_CONTEXT_MISMATCH 0x1C00001A #define NCA_S_FAULT_REMOTE_NO_MEMORY 0x1C00001B #define NCA_S_INVALID_PRES_CONTEXT_ID 0x1C00001C #define NCA_S_UNSUPPORTED_AUTHN_LEVEL 0x1C00001D #define NCA_S_INVALID_CHECKSUM 0x1C00001F #define NCA_S_INVALID_CRC 0x1C000020 #define NCA_S_FAULT_USER_DEFINED 0x1C000021 #define NCA_S_FAULT_TX_OPEN_FAILED 0x1C000022 #define NCA_S_FAULT_CODESET_CONV_ERROR 0x1C000023 #define NCA_S_FAULT_OBJECT_NOT_FOUND 0x1C000024 #define NCA_S_FAULT_NO_CLIENT_STUB 0x1C000025
{ "pile_set_name": "Github" }
define([ "./arr" ], function( arr ) { return arr.indexOf; });
{ "pile_set_name": "Github" }
Implantable stimulation devices are devices that generate and deliver electrical stimuli to body nerves and tissues for the therapy of various biological disorders, such as pacemakers to treat cardiac arrhythmia, defibrillators to treat cardiac fibrillation, cochlear stimulators to treat deafness, retinal stimulators to treat blindness, muscle stimulators to produce coordinated limb movement, spinal cord stimulators to treat chronic pain, cortical and deep brain stimulators to treat motor and psychological disorders, and other neural stimulators to treat urinary incontinence, sleep apnea, shoulder sublaxation, etc. The present invention may find applicability in all such applications, although the description that follows will generally focus on the use of the invention within a Spinal Cord Stimulation (SCS) system, such as that disclosed in U.S. Pat. No. 6,516,227. Spinal cord stimulation is a well-accepted clinical method for reducing pain in certain populations of patients. As shown in FIGS. 1A and 1B, a SCS system typically includes an Implantable Pulse Generator (IPG) 100, which includes a biocompatible case 30 formed of titanium for example. The case 30 typically holds the circuitry and power source or battery necessary for the IPG to function, although IPGs can also be powered via external RF energy and without a battery. The IPG 100 is coupled to electrodes 106 via one or more electrode leads (two such leads 102 and 104 are shown), such that the electrodes 106 form an electrode array 110. The electrodes 106 are carried on a flexible body 108, which also houses the individual signal wires 112 and 114 coupled to each electrode. In the illustrated embodiment, there are eight electrodes on lead 102, labeled E1-E8, and eight electrodes on lead 104, labeled E9-E16, although the number of leads and electrodes is application specific and therefore can vary. As shown in FIG. 2, the IPG 100 typically includes an electronic substrate assembly 14 including a printed circuit board (PCB) 16, along with various electronic components 20, such as microprocessors, integrated circuits, and capacitors mounted to the PCB 16. Two coils are generally present in the IPG 100: a data telemetry coil 13 used to transmit/receive data to/from an external controller 12; and a charging coil 18 for receiving power to charge the IPG's battery 26 using an external charger 50. As just noted, an external controller 12, such as a hand-held programmer or a clinician's programmer, is used to wirelessly send data to and receive data from the IPG 100. For example, the external controller 12 can send programming data to the IPG 100 to dictate the therapy the IPG 100 will provide to the patient. Also, the external controller 12 can act as a receiver of data from the IPG 100, such as various data reporting on the IPG's status. The external controller 12, like the IPG 100, also contains a PCB 70 on which electronic components 72 are placed to control operation of the external controller 12. A user interface 74 similar to that used for a computer, cell phone, or other hand held electronic device, and including touchable buttons and a display for example, allows a patient or clinician to operate the external controller 12. The communication of data to and from the external controller 12 is enabled by a coil 17, which is discussed further below. The external charger 50, also typically a hand-held device, is used to wirelessly convey power to the IPG 100, which power can be used to recharge the IPG's battery 26. The transfer of power from the external charger 50 is enabled by a coil 17′, which is discussed further below. For the purpose of the basic explanation here, the external charger 50 is depicted as having a similar construction to the external controller 12, but in reality they will differ in accordance with their functionalities as one skilled in the art will appreciate. Wireless data telemetry and power transfer between the external devices 12 and 50 and the IPG 100 takes place via magnetic inductive coupling. To implement such functionality, coils in the IPG 100 and the external devices 12 and 50 act together as a pair. In case of the external controller 12, the relevant pair of coils comprises coil 17 from the controller and coil 13 from the IPG. While in case of the external charger 50, the relevant pair of coils comprises coil 17′ from the external charger and coil 18 from the IPG. When data is to be sent from the external controller 12 to the IPG 100 for example, coil 17 is energized with an alternating current (AC). Such energizing of the coil 17 to transfer data can include modulation using a Frequency Shift Keying (FSK) protocol for example, such as disclosed in U.S. Patent Application Publication 2009/0024179. For example, FSK communication can be centered around 125 KHz for example, with 121 kHz representing a logic ‘0’ and 129 kHz representing a logic ‘1’. Energizing the coil 17 produces a magnetic field, which in turn induces a current in the IPG's coil 13, which current can then be demodulated to recover the original data. Data telemetry in the opposite direction—from the IPG 100 to the external controller 12—occurs in essentially the same manner. When power is to be transmitted from the external charger 50 to the IPG 100, coil 17′ is again energized with an alternating current to produce a non-modulated magnetic charging field. Such energizing is generally of a constant frequency (e.g., 80 kHz), and may be of a larger magnitude than that used during the transfer of data, but otherwise the physics involved are similar. During charging, i.e., when the external charger 50 is producing the magnetic charging field, the IPG 100 can communicate data back to the external controller using Load Shift Keying (LSK). LSK is well explained in U.S. Patent Application Publication 2010/0179618, and involves modulating the load at the IPG 100 to produce data-containing reflections detectable at the external charger 50. This means of transmitting data is useful to communicate data relevant during charging of the battery 26, such as whether charging is complete and the external charger 50 can cease production of the magnetic charging field. As one skilled in the art will understand, LSK data can only be communicated when the magnetic charging field is present, and can only be transmitted from the IPG 100 to the external controller 12. Moreover, LSK provides very low bit rates (e.g., 10 bits/second) and therefore the amount of data that can be sent by this means is limited. Energy to energize coils 17 and 17′ can come from batteries in the external controller 12 and the external charger 50, respectively, which like the IPG's battery 26 are preferably rechargeable. However, power may also come from plugging the external controller 12 or external charger 50 into a wall outlet plug (not shown), etc. As is well known, inductive transmission of data or power can occur transcutaneously, i.e., through the patient's tissue 25, making it particularly useful in a medical implantable device system. During the transmission of data or power, the coils 17 and 13, or 17′ and 18, preferably lie in planes that are parallel, along collinear axes, and with the coils as close as possible to each other. Such an orientation between the coils 17 and 13 will generally improve the coupling between them, but deviation from ideal orientations can still result in suitably reliable data or power transfer. Although the external controller 12 and external charger 50 can be completely separate devices as shown in FIG. 2, other solutions have been proposed that integrate these two devices together to varying degrees. For example, in U.S. Patent Publication 2009/0118796, the circuitry for the external controller and the external charger are enclosed in a single housing. The coil for transferring data is enclosed within the housing, while the coil for transferring power to the IPG lies external to the housing, but is connected to the charging circuitry in the housing by a wire. In another solution disclosed in U.S. Pat. No. 8,335,569, the circuitry for the external controller and the external charger, and their associated coils, are enclosed within a single housing, which coils can be shared between the data telemetry and charging functions. Even in these integrated controller/charger solutions, data transfer and power transfer do not take place at the same time. Therefore, if the patient needs to adjust the therapy program while the IPG is being charged for example, the patient is required to manually interrupt charging, manually activate the data telemetry circuitry, and then manually return to charging. The need to interrupt charging can occur in even simpler contexts such as if the patient merely wants to know the capacity of the battery while charging. Reporting of battery capacity in a manner reviewable by the patient is typically a data telemetry function under the control of external controller circuitry, and thus charging would need to cease to receive such data. Having to manually switch between charging and data telemetry functions is inconvenient for the patient. Not only may the patient need to manipulate a separate external controller and an external charger, the patient may also need to physically align those devices with the IPG to ensure good coupling between the coils in each of the devices. See, e.g., U.S. Pat. No. 8,473,066, discussing the importance of good coil alignment in this context. Such frustrations for the patient are especially needling when it is recognized that data telemetry may only take a short period of time (on the order of seconds or tenths of seconds) compared to the time needed the charge the IPG's battery (on the order of minutes or hours). This disclosure provides embodiments of solutions to mitigate this problem.
{ "pile_set_name": "USPTO Backgrounds" }
// // ImageFormat.swift // Kingfisher // // Created by onevcat on 2018/09/28. // // Copyright (c) 2019 Wei Wang <onevcat@gmail.com> // // Permission is hereby granted, free of charge, to any person obtaining a copy // of this software and associated documentation files (the "Software"), to deal // in the Software without restriction, including without limitation the rights // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell // copies of the Software, and to permit persons to whom the Software is // furnished to do so, subject to the following conditions: // // The above copyright notice and this permission notice shall be included in // all copies or substantial portions of the Software. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN // THE SOFTWARE. import Foundation /// Represents image format. /// /// - unknown: The format cannot be recognized or not supported yet. /// - PNG: PNG image format. /// - JPEG: JPEG image format. /// - GIF: GIF image format. public enum ImageFormat { /// The format cannot be recognized or not supported yet. case unknown /// PNG image format. case PNG /// JPEG image format. case JPEG /// GIF image format. case GIF struct HeaderData { static var PNG: [UInt8] = [0x89, 0x50, 0x4E, 0x47, 0x0D, 0x0A, 0x1A, 0x0A] static var JPEG_SOI: [UInt8] = [0xFF, 0xD8] static var JPEG_IF: [UInt8] = [0xFF] static var GIF: [UInt8] = [0x47, 0x49, 0x46] } /// https://en.wikipedia.org/wiki/JPEG public enum JPEGMarker { case SOF0 //baseline case SOF2 //progressive case DHT //Huffman Table case DQT //Quantization Table case DRI //Restart Interval case SOS //Start Of Scan case RSTn(UInt8) //Restart case APPn //Application-specific case COM //Comment case EOI //End Of Image var bytes: [UInt8] { switch self { case .SOF0: return [0xFF, 0xC0] case .SOF2: return [0xFF, 0xC2] case .DHT: return [0xFF, 0xC4] case .DQT: return [0xFF, 0xDB] case .DRI: return [0xFF, 0xDD] case .SOS: return [0xFF, 0xDA] case .RSTn(let n): return [0xFF, 0xD0 + n] case .APPn: return [0xFF, 0xE0] case .COM: return [0xFF, 0xFE] case .EOI: return [0xFF, 0xD9] } } } } extension Data: KingfisherCompatibleValue {} // MARK: - Misc Helpers extension KingfisherWrapper where Base == Data { /// Gets the image format corresponding to the data. public var imageFormat: ImageFormat { guard base.count > 8 else { return .unknown } var buffer = [UInt8](repeating: 0, count: 8) base.copyBytes(to: &buffer, count: 8) if buffer == ImageFormat.HeaderData.PNG { return .PNG } else if buffer[0] == ImageFormat.HeaderData.JPEG_SOI[0], buffer[1] == ImageFormat.HeaderData.JPEG_SOI[1], buffer[2] == ImageFormat.HeaderData.JPEG_IF[0] { return .JPEG } else if buffer[0] == ImageFormat.HeaderData.GIF[0], buffer[1] == ImageFormat.HeaderData.GIF[1], buffer[2] == ImageFormat.HeaderData.GIF[2] { return .GIF } return .unknown } public func contains(jpeg marker: ImageFormat.JPEGMarker) -> Bool { guard imageFormat == .JPEG else { return false } var buffer = [UInt8](repeating: 0, count: base.count) base.copyBytes(to: &buffer, count: base.count) for (index, item) in buffer.enumerated() { guard item == marker.bytes.first, buffer.count > index + 1, buffer[index + 1] == marker.bytes[1] else { continue } return true } return false } }
{ "pile_set_name": "Github" }
Q: Removing and re-adding a subview with autolayout When using autolayout, my understanding is that removing a subview ( while holding a reference to it of course), the removed subview still knows its autolayout constraints. However, when adding it back to the super view later, the subview no longer knows its frame size. Rather it seems to get a zero frame. I assumed that autolayout would auto size it to meet the constraints. Is that not the case? I thought auto layout meant don't mess with frame rects. Do I still need to set the initial frame rect when adding the subview, even with auto layout? A: When removing the subview, all the constraints that relate to that subview will be lost. If you need to add the subview again later, then you must add constraints to that subview again. Typically, I create the constraints in my custom subview. For example: -(void)updateConstraints { if (!_myLayoutConstraints) { NSMutableArray *constraints = [NSMutableArray array]; // Create all your constraints here [constraints addWhateverConstraints]; // Save the constraints in an ivar. So that if updateConstraints is called again, // we don't try to add them again. That would cause an exception. _myLayoutConstraints = [NSArray arrayWithArray:constraints]; // Add the constraints to myself, the custom subview [self addConstraints:_myLayoutConstraints]; } [super updateConstraints]; } updateConstraints will be called automatically by the Autolayout runtime. The code above goes in your custom subclass of UIView. You're right that in working with Autolayout, you don't want to touch frame sizes. Instead, just update the constraints in updateConstraints. Or, better still, set up the constraints so you don't have to. See my answer on that topic: Autolayout UIImageView with programatic re-size not following constraints You don't need to set the initial frame. If you do use initWithFrame, just set it to CGRectZero. Your constraints will - in fact must - detail either how big something should be, or other relationships that mean the runtime can deduce the size. For example, if your visual format is: @"|-[myView]-|", that's everything you need for the horizontal dimension. Autolayout will know to size myView to be up to the bounds of the parent superview denoted by |. It's pretty cool.
{ "pile_set_name": "StackExchange" }
1. Introduction {#s0005} =============== Severe myoclonic epilepsy of infancy (SMEI), also known as Dravet syndrome, is an epileptic encephalopathy that presents during the first year of life and is one of the most severe types of infant epilepsy that is resistant to drugs [@bb0005; @bb0010]. Patients with Dravet syndrome display multiple seizure types including tonic--clonic, myoclonic, absence, and focal seizures. In addition to epilepsy, SMEI is associated with cognitive delays and behavioral disorders [@bb0010]. De novo SCN1A mutations are a major cause of SMEI [@bb0015]. In addition, mutations in *SCN1B*, *SCN2A*, and *GABRG2* also cause SMEI, and recently, a Dravet-like phenotype in which *PCDH19* and *CHD2* genes are involved was described [@bb0020; @bb0025]. Pharmacoresistance is one of the major problems in SMEI, and many antiepileptic drugs do not seem to be able to control all the different kinds of seizures, including generalized tonic--clonic seizures (GTCS) and myoclonic, absence, and focal seizures, which characterize this syndrome. Eslicarbazepine acetate (ESL) is a relatively new antiepileptic drug which has been approved in 2009 by the European Medicines Agency and in 2013 by the US Food and Drugs Administration as adjunctive therapy in adults with partial onset seizures with and without secondary generalization. Eslicarbazepine acetate shows an important action on the blockade of voltage-gated sodium channel (VGSC). It has been recently reported that there are some differences between AEDs acting on VGSC that are also related to their different affinities for the channel based on the functional state of VGSC. In fact, three distinctive states have been shown for VGSC which include the resting state, the open state, and the inactivated state. The affinity of ESL for the inactivated state of these channels is similar to other AEDs (carbamazepine), while its affinity for the resting state is three times lower than the other drugs, thus preventing sustained repetitive neural firing but disturbing physiological mechanisms to a lesser extent. Another peculiarity of ESL has been reported by an experimental study which showed that this drug could reduce VGSC availability through enhancement of slow inactivation, as reported for lacosamide, while it seems not able to alter fast inactivation of VGSC, unlike carbamazepine (CBZ) and oxcarbazepine (OXC) [@bb0030]. In addition, the eslicarbazepine metabolite effectively inhibited high- and low-affinity CaV3.2 inward currents with greater affinity than CBZ [@bb0035]. We report a short-term open study about two patients affected by SMEI who both showed favorable response with regard to seizure frequency reduction when treated with ESL and good tolerability. 2. Methods {#s0010} ========== The first patient is a 17-year-old Italian boy with SMEI and a severe clinical outcome, in whom we identified a punctiform mutation (5053del AA fs1685X1691) in the α subunit of the neuronal sodium channel SCN1A gene. He started to have febrile and afebrile seizures at the age of 6 months. No drug treatment, including valproate, lamotrigine, carbamazepine, phenobarbital, vigabatrin, topiramate, clonazepam, ethosuximide, phenytoin, felbamate, nitrazepam, rufinamide, zonisamide, or lacosamide had proven effective ([Table 1](#t0005){ref-type="table"}). The best results in the reduction of seizure frequency was obtained with a combination of phenobarbital, clonazepam, and zonisamide, showing a reduction of about 50% of partial complex seizures during sleep and 70% of daytime GTCS. During this time, the EEGs and clinical and epileptic characteristics of this patient showed typical features of SMEI such as slowing of background EEG activity with multifocal and diffuse discharges prevalent in the frontal regions, myoclonic seizures at the age of 2 years and 6 months, ataxia, and progressive intellectual disability. At the age of 16 years and 6 months, we added ESL in combination with phenobarbital, clonazepam, and zonisamide at the initial dosage of 400 mg once daily and after two weeks at 800 mg/day. After just a few weeks from the start of therapy, we observed a complete response with disappearance of monthly GTCS and sleep frontal-partial complex seizures (with 3--4 occurrences per night previously observed). We did not observe adverse events during the treatment period of six months with a significant improvement in behavior, particularly oppositional defiant disorder and the maintenance of attention. The second patient is a 21-year-old Italian girl. At the age of 11, we had identified a punctiform mutation (931G \> T E311X) in the α subunit of the neuronal sodium channel SCN1A gene. The febrile and afebrile complex-partial seizures started at the age of 3 months. Similar to the first patient, the drug treatment for this patient included acetazolamide and stiripentol that had not been proven effective ([Table 1](#t0005){ref-type="table"}). In particular, at the age of 8, a combination of phenobarbital, clonazepam, and acetazolamide (250 mg/day) caused a decrease in seizure frequency of about 40%. The number of seizures was previously much higher and associated with several eyelid myoclonic seizures at a frequency of hundreds of occurrences daily and several massive myoclonias from the age of 3 years. Magnetic resonance imaging showed moderate brain atrophy, which did not progress during maturation, and brain interictal SPECT at the age of 2 showed hypoperfusion of the left frontal cortex. The EEG showed diffuse and multifocal paroxysmal activity that was more evident in the bioccipital regions. In the first year of life, the child showed unimpaired neuromotor development and hypotonia. She presented progressive intellectual disability, which became profound, as well as severe ataxia, making it impossible for her to walk. In addition, her speech was absent. At the age of 10, a VNS device was implanted without any results. At the age of 20, we added eslicarbazepine acetate to phenytoin, clonazepam, and valproate at the initial dosage of 400 mg once daily, which was increased after two weeks to 800 mg/day. We have also observed in this case good response with regard to seizure frequency reduction in just a few weeks after starting therapy. The girl does not present any daily seizures, just one seizure every four days currently. 3. Results {#s0015} ========== We observed a significant and fast effect using ESL as add-on therapy to other AEDs in both patients similar to what was reported in literature for adult patients with partial-onset seizures [@bb0040]. The peculiarity in our cases was the age when ESL therapy was started, 16 years and 6 months for the boy and 20 years for the girl, respectively, underlying the possibility of using ELS with good efficacy as an add-on therapy in young patients [@bb0045]. Of particular interest is ESL\'s efficacy in both patients with SMEI carrying SCN1A mutation because it is well known that seizure control is very difficult to achieve in this syndrome. The reason why ESL was effective in patients whose seizures are typically drug-resistant is not yet known; we could theorize that it could be due to the peculiar action of ESL on VGSC. Indeed, carbamazepine, which alters fast inactivation of VGSC, can worsen seizures and should not be used in patients with SMEI [@bb0045]. It is interesting to note that in our cases, ESL has been used in combination with different AEDs, although benzodiazepine was the only AED common in both cases. Thus, it does not seem plausible that the effectiveness of ESL in patients with SMEI is attributable to the association between different drugs, but by analyzing the drugs in particular, we can observe their similar mechanisms, especially those on GABAergic system and voltage-gated sodium channel. Another peculiarity of our report is the effective dose of ESL, which was a low recommended dosage. Moreover, we observed a fast response to the initial dose of ESL [@bb0050]. 4. Conclusions {#s0020} ============== Adjunctive eslicarbazepine led to seizure reduction in two patients with severe myoclonic epilepsy of infancy. Although this is a short-term open study, the results are promising but need confirmation. Conflict of interest {#s0025} ==================== The authors report no conflicts of interest. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-No Derivative Works License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited ###### Response and time of administration of AEDs in both patients. AEDs Time of administration Response[a](#tf0005){ref-type="table-fn"} ----------------- ------------------------ ------------------------------------------- ---- --- Valproate 2 years 18 years 1 2 Lamotrigine 6 months 5 months 1 1 Clonazepam 10 years 12 years 2 3 Carbamazepine 9 months 6 months 1 1 Phenobarbital 12 years 1 month 3 0 Vigabatrin 3 months 4 months 1 1 Topiramate 1 month 6 months 0 1 Ethosuximide 1 year 8 months 1 1 Phenytoin 2 months 10 years 1 3 Felbamate 1 month 3 months 1 1 Nitrazepam 3 months 2 months 1 1 Rufinamide 2 months 3 months 1 1 Zonisamide 4 years 4 months 2 1 Lacosamide 3 months 1 month 1 0 Acetazolamide 4 months 6 months 1 1 Stiripentol 4 months 4 months 1 1 VNS -- -- 1 Eslicarbazepine 6 months 6 months 4 4 Number of daily seizures: 0 = increased daily seizures; 1 = unchanged seizures; 2 = reduction of seizures (less than 50% of frequency); 3 = reduction of seizures (less than 50--70% of frequency); 4 = reduction of seizures (more than 70% of frequency).
{ "pile_set_name": "PubMed Central" }
About the Author: Dr. David Fraser holds an MBA from Strathclyde University and a First Class Honors degree and PhD from Glasgow University in Scotland. As a Neuro-Linguistic (NLP) Master Practitioner and commercial mediator, Fraser possesses a deep knowledge of relational dynamics in the workplace, other professional environments, and familial settings. Practical Relationship Solutions for Professionals Fraser introduces fresh […]
{ "pile_set_name": "Pile-CC" }
Q: How to filter response with query parameters on POST methods on Microsoft Graph API? I am attempting to make a simple room booking application within my office. Users can select a time frame, see the available rooms, and book the room (create an event in their calendar in that time frame in that room). In order to see what rooms are available, I am attempting to use the Microsoft Graph REST API, and specifically the POST method - getSchedule. An example request for getSchedule looks like this { "schedules": ["adelev@contoso.onmicrosoft.com", "meganb@contoso.onmicrosoft.com"], "startTime": { "dateTime": "2019-03-15T09:00:00", "timeZone": "Pacific Standard Time" }, "endTime": { "dateTime": "2019-03-15T18:00:00", "timeZone": "Pacific Standard Time" }, "availabilityViewInterval": "60" } I place all of the rooms in the office in the schedules list, and then can see their availabilities in the response based on the availability view. "@odata.context": "https://graph.microsoft.com/v1.0/$metadata#Collection(microsoft.graph.scheduleInformation)", "value": [ { "scheduleId": "adelev@contoso.onmicrosoft.com", "availabilityView": "000220000", "scheduleItems": [ { "isPrivate": false, "status": "busy", "subject": "Let's go for lunch", "location": "Harry's Bar", "start": { "dateTime": "2019-03-15T12:00:00.0000000", "timeZone": "Pacific Standard Time" }, "end": { "dateTime": "2019-03-15T14:00:00.0000000", "timeZone": "Pacific Standard Time" } } ], "workingHours": { "daysOfWeek": [ "monday", "tuesday", "wednesday", "thursday", "friday" ], "startTime": "08:00:00.0000000", "endTime": "17:00:00.0000000", "timeZone": { "name": "Pacific Standard Time" } } }, However, I don't need any of the other information provided in the response. I only want to see the scheduleId and the availabilityView, because the response takes forever to load with many rooms in the schedules request. I've been looking at the available ways to filter a response through parameters in the POST request at: https://docs.microsoft.com/en-us/graph/query-parameters. However, any of the filters I seem to apply to my address do not seem to have any affect on the response. I've tried https://graph.microsoft.com/v1.0/me/calendar/getschedule?$select=availabilityView for the request and other similar variants without any success. They all return the full JSON response. A: It is a OData protocol limitation. Querying Data is only possible on GET requests as documented here. Besides asking for less rooms to begin with. a shorter period or a bigger interval, I don't think there a way to get less data today.
{ "pile_set_name": "StackExchange" }
In vitro strain-induced endothelial cell dysfunction determined by DNA synthesis. Rapid re-endothelialization following balloon angioplasty can reduce restenosis by inhibiting smooth muscle cell migration and proliferation. However, formation of a neointima following angioplasty can be inhibited due to endothelial cell dysfunction and denudation. The purpose of this study was to evaluate mechanical tensile stress as a cause of endothelial cell dysfunction. The Flexercell strain unit was utilized to generate both short-term cyclic and static tensile strain on cultured bovine aortic endothelial cells (BAECs). Before analysis of this loading on BAECs, strain behaviour of the Flexercell system and DNA assay conditions were optimized. This paper demonstrates that, when compared with unloaded controls, 4-h cyclic loading at 4 per cent elongation and 0.1 Hz, and static loading at 4 per cent elongation cause a 44 and 70 per cent decrease in DNA synthesis respectively. In a companion paper, it is demonstrated that low DNA synthesis levels in mechanically loaded cells can be increased by incubation with Ap4A and/or NO donors.
{ "pile_set_name": "PubMed Abstracts" }
ERCC1 (excision repair cross-complementing 1) expression in pT2 gallbladder cancer is a prognostic factor. Gallbladder cancer (GBC) is the main cause of death by malignant tumour in women in Chile. There is no information regarding the role of excision repair cross-complementing group 1 (ERCC1) in GBC. Our aim is to determine the expression and significance of ERCC1 as a prognostic factor in GBC. Tissue microarrays were prepared using 200 surgically resected GBCs and 50 non-malignant gallbladders as controls. In 190 cases, ERCC1 was determined by immunohistochemistry. The correlation between ERCC1 expression and GBC pathological characteristics and patient survival were analysed. Ninety-five percent of the non-malignant gallbladder epithelia showed intense and diffuse ERCC1 expression. GBC cases showed ERCC1 expression in the tumour cells in 100/190 (53%) cases. The best differentiated tumours showed significantly greater expression than the less differentiated (p<0.05). Patients with ERCC1-positive status with subserosal carcinomas (pT2) had significantly better survival than ERCC1-negative patients at 20 and 60 months of follow-up (p=0.005), and the probability of dying was 6 times lower for ERCC1-positive than for ERCC1-negative patients. Our preliminary results show that chole-cystectomised patients with GBC in stage pT2 and with ERCC1 expression have significantly better survival than patients at the same stage that did not present ERCC1 expression.
{ "pile_set_name": "PubMed Abstracts" }
We noticed that you're using an unsupported browser. The TripAdvisor website may not display properly.We support the following browsers:Windows: Internet Explorer, Mozilla Firefox, Google Chrome. Mac: Safari. I was very disappointed with the first encounter with the hotel and with the room. We came in the nightt and found a very obscure entrance to the hotel and many stairs to the reception and to the room, which were very dirty. The room...More I had an overall good experience. When I arrived I did have to wait and call out for someone to come to the front desk, and the next time I went down there wasn't anyone. Neither time was an emergency so I didn't mind. The...More Dear Emily! First of all, thanks a lot for choosing us for your visit to Granada and for your review! We are deeply sorry because you were waiting for someone to come to the Reception; normally the main door is closed so that everyone has...More Only a couple of minutes from the Cathedral and shorter walk to Plaza Bib-Rambla . Its basic cheap and comfortable accommodation with a very helpful and friendly receptionist who offered all sorts of information on buses ,restaurants and bars close by , she even offered...More PROs: Very good location - close to Plaza Bib-Rambla and the Cathedral. The guesthouse is located on a shopping street. There are a lot of supermarkets, bars and restaurants in the area. Clean room, sheets and towels; polite staff; pleasant common area; decent breakfast (for...More We had double room with private bathroom and breakfast, window to the street. Everything ok for staying overnight. Is very central and everywhere can go on foot. But you should know that room and bathroom is very small and old done not suitable to be...More
{ "pile_set_name": "Pile-CC" }
James Manning James Manning may refer to: James Manning (minister) (1738–1791), American Baptist minister and first president of Brown University James Manning (lawyer) (1781–1866), English barrister, serjeant-at-law, and law writer Jim Manning (baseball) (1862–1929), American professional baseball player, manager and team owner James Manning (scientist) (1917–1989), surgeon, pathologist and public health administrator Jim Manning (pitcher) (born 1943), American Major League Baseball pitcher James David Manning (born 1947), chief pastor at the ATLAH World Missionary Church James Manning Jr., Oregon State Senator James Manning, character in Almost Married
{ "pile_set_name": "Wikipedia (en)" }
The State of JavaScript on Android Is Poor - megaman821 https://meta.discourse.org/t/the-state-of-javascript-on-android-in-2015-is-poor/33889 ====== voltagex_ > It just means over time you'll lose Android users as they get fed up with > the huge speed disparity (if they care, or notice) but you'll retain and > grow iOS users. > If Apple's overall market share keeps increasing, this wouldn't necessarily > be a bad strategy. Not my favorite, and not really in harmony with the > original vision for Discourse, but I'm limited in what we can do with the > resources that we have. We can't build two distinct applications (web, for > iOS, and native, for Android) without destroying the company in the process. >It could also be that over a long time scale (e.g. five years out) Android will fix this. But it clearly will not be fixed in a year or two. Sigh. I wonder if Android M has been benched. ------ voltagex_ See also [https://code.google.com/p/v8/issues/detail?id=2935](https://code.google.com/p/v8/issues/detail?id=2935) ------ macrael The State of JavaScript on Android Is Poor ... we need to start considering alternatives for the Discourse project. Really buried the lede there.
{ "pile_set_name": "HackerNews" }
Ext.generator.Controller.templates.ControllerSpec = new Ext.XTemplate( 'describe("The {name} controller", function() {\n', ' var controller = Ext.ControllerManager.get("{name}");\n\n', '<tpl for="actions">', ' describe("the {.} action", function() {\n', ' beforeEach(function() {\n', ' \n', ' });\n\n\n', ' });\n\n', '</tpl>', '});\n' );
{ "pile_set_name": "Github" }
// REQUIRES: x86-registered-target // RUN: %clang_cc1 -triple x86_64-unknown-linux -debug-info-kind=limited -split-dwarf-file foo.dwo -split-dwarf-output %t -emit-obj -o - %s | llvm-dwarfdump -debug-info - | FileCheck %s // RUN: llvm-dwarfdump -debug-info %t | FileCheck %s int f() { return 0; } // CHECK: DW_AT_GNU_dwo_name ("foo.dwo")
{ "pile_set_name": "Github" }
Skeletal muscle mass: evaluation of neutron activation and dual-energy X-ray absorptiometry methods. Although skeletal muscle (SM) is a major body component, whole body measurement methods remain limited and inadequately investigated. The aim of the present study was to evaluate the Burkinshaw in vivo neutron activation analysis (IVNA)-whole body 40K-counting and dual-energy X-ray absorptiometry (DXA) methods of estimating SM by comparison to adipose tissue-free SM measured using multiscan computerized axial tomography (CT). In the Burkinshaw method the potassium-to-nitrogen ratios of SM and non-SM lean tissue are assumed constant; in the DXA method the ratio of appendicular SM to total SM is assumed constant at 0.75. Seventeen healthy men [77.5 +/- 13.8 (SD) kg body wt] and eight men with acquired immunodeficiency syndrome (AIDS; 65.5 +/- 7.6 kg) completed CT, IVNA, and DXA studies. SM measured by CT was 34.4 +/- 6.2 kg for the healthy subjects and 27.2 +/- 4.0 kg for the AIDS patients. Compared with CT, the Burkinshaw method underestimated SM by an average of 6.9 kg (20.1%, P = 0.0001) and 6.3 kg (23.2%, P = 0.01) in the healthy men and the men with AIDS, respectively. The DXA method minimally overestimated SM in both groups (2.0 kg and 5.8% in healthy men, P = 0.001; 1.4 kg and 5.1% in men with AIDS, P = 0.16). This overestimate could be explained by a higher actual than assumed ratio of DXA-measured appendicular SM to total body SM (actual = 0.79 +/- 0.05, assumed = 0.75). The current study results reveal that large errors are present in the Burkinshaw SM method and that substantial refinements in the models that form the basis of this IVNA approach are needed. The model on which the DXA-SM method is based also needs further minor refinements, but this is a promising in vivo approach because of less radiation exposure and lower cost than the IVNA and CT methods.
{ "pile_set_name": "PubMed Abstracts" }
A man who drove the wrong-way down a one-way street in Philadelphia Friday night is nursing gunshot wounds in a Center City hospital after a pedestrian shot him, police said. The 61-year-old pickup truck driver was traveling in the wrong direction along N. 12th Street near Fairmount Avenue in North Philadelphia around 5:30 p.m., police said. As he tried to make a turn onto Fairmount Avenue, the truck nearly hit a man walking across the street, police said. Enraged over the near-miss, police said the pedestrian then pulled out a handgun and fired on the driver, who was hit with bullets four times in the right leg. The driver fled the area and drove to the emergency room at nearby Hahnemann University Hospital. He remains hospitalized in stable condition. The pickup truck, pocked with bullet holes and several broken windows, remains parked along Vine Street outside the hospital. Police said the vehicle is being treated as a crime scene. Police characterized the shooting victim's wrong-way driving as a mistake. The shooter remains at large. He is described as a 25-year-old man with a heavy build standing about 5-feet-11-inches tall.
{ "pile_set_name": "OpenWebText2" }
RESTAURANTS, BARS AND CAFÉS Enjoy a homemade muffin and a coffee or a hot chocolate freshly prepared by a barista at the Hana 1 Café or 308 Café, stop in for lunch at the newly expanded HANAZONO 308 330 seat restaurant, or treat yourself to the ultimate fine dining experience at Niseko’s newest Michelin Star Restaurant Asperges HANAZONO, headed by Michelin three-starred chef Hiroshi Nakamichi. CLICK ON A BANNER BELOW GETTING TO HANAZONO We’ve made it hassle free to start your day during winter, with 6 free shuttle buses running guests to HANAZONO 308. We have the entire Hirafu village and surrounded area covered with a bus every 20 minutes; operating through the upper and lower village to transport guests from their door direct to HANAZONO. No one will have to wait or walk far to start their day, this service is ideal for the family or the keen POW enthusiast with the first bus arriving at HANAZONO at 8.20am in time for first lift at 8.30am.
{ "pile_set_name": "Pile-CC" }
Construction halted at church destroyed in Sept. 11 attacks by COLLEEN LONG , Associated Press FILE- In this Aug. 10, 2017 file photo, a construction worker walks in front of the St. Nicholas National Shrine in New York. Work on the Greek Orthodox church destroyed in the Sept. 11 attacks next to the World Trade Center memorial plaza has been temporarily suspended by the construction company. It comes amid financial difficulties and questions over how funds have been managed. (AP Photo/Mark Lennihan, File) NEW YORK (AP) — Construction on a Greek Orthodox church to replace one that was crushed in the Sept. 11 attacks has been temporarily suspended amid rising costs and questions over how donations have been managed. The St. Nicholas National Shrine next to the World Trade Center memorial plaza was to replace a tiny church obliterated when the trade center's south tower fell in 2001. The new building was designed by renowned architect Santiago Calatrava, who created the soaring white bird-like mall and transit hub nearby called the Oculus. But unlike the transit hub, built largely with federal transportation dollars, the church is being funded through donations including from the Greek government, Greek Orthodox church members around the world, the Roman Catholic Archdiocese of Boston and the Italian city of Bari, whose patron saint is St. Nicholas. In September, the estimated cost was $50 million. But according to The New York Times , which first reported the work suspension, the cost had jumped to an estimated $72 million to $78 million as of this month. Two firms, PricewaterhouseCoopers and BakerHostetler, were hired to perform an independent investigation into the construction, according to a Dec. 9 statement posted on the website of the Greek Orthodox Archdiocese of America. The stoppage was ordered by the construction company on the project, Skanska USA, the statement said. "The archdiocese is confidently hopeful that construction will recommence in the very near future and has been assured by Skanska ... that they are looking forward to the rescinding of this temporary suspension to continue working together in cooperation with the archdiocese for the completion of the building project," the statement read. The Greek Orthodox archdiocese, based in New York, represents more than 500 parishes across the country with more than 1.5 million members of the church and 800 priests. It reported last fall it was suffering from a "severe and complex" financial deficit. Skanska, part of Stockholm-based Skanska AB, said it had extended payment deadlines and discussed alternatives with the archdiocese to try to keep the project going but ultimately had to halt construction. "We regret that stopping work was the only viable option at this point in time," Skanska USA Executive Vice President Tom Webb said in a statement Tuesday. "We are confident that they will find the funding to complete this work at some point in the future." The St. Nicholas shrine, meant as a salve for the faithful and a welcoming space for those wishing to reflect, was inspired by two Byzantine shrines in Istanbul, the Hagia Sophia and the Church of the Holy Savior in Chora. The building was to be sheathed in marble from quarries north of Athens, the vein of marble used to build the Parthenon. The original St. Nicholas was far more modest. The building housed a tavern when Greek immigrants bought it in 1919 to use as a church. It was the only building not part of the trade center complex that was demolished after hijackers flew commercial jets into the towers.
{ "pile_set_name": "Pile-CC" }
Drainage Archive Clogged drains are a common problem in every household. It always seems to happen at the worst possible time. While hiring a hydro-jetting service in Salt Lake City to do the job, there are some ways on how to prevent clogged drains on your own. Here are a few
{ "pile_set_name": "Pile-CC" }
Continue Watching Can't finish now? Create a profile to save your place and watch later. The Office Season 4 Episode 4 PRESENTED BY Dunder Mifflin Infinity, Part 2 Michael feels threatened when Ryan returns to the Scranton office to share his ideas about the future of Dunder Mifflin. Jim and Pam's relationship is shared with the entire office, while Angela and Dwight's relationship is on the rocks. More...
{ "pile_set_name": "Pile-CC" }
Comparison of glucose and insulin concentrations in macaque sera and plasma. The glucose and insulin concentrations in blood from Macaca nigra and M. mulatta were determined after an overnight fast and 3 min after a glucose infusion. Blood treatment included clotting for serum or additions of fluoride, heparin, or heparin plus fluoride. Samples were centrifuged at 0 min or after being held at 22 degrees C for 20, 40, or 60 min. Levels of glucose and insulin generally agreed within 1 SD at all times examined for samples removed at 0 or 3 min.
{ "pile_set_name": "PubMed Abstracts" }
2015 - Bernie Sanders Goes Trick-or-Treating Published on Oct 31, 2015 Bernie Sanders took his grandkids trick-or-treating in New Hampshire. 6 Tweet
{ "pile_set_name": "OpenWebText2" }
The new year is upon us. How many of you have promised yourself that 2014 will be different? It will be YOUR year. This is the year you will MAKE things happen! You chose a nutrition or “diet” plan to follow. You joined a gym or bought exercise equipment. This is going to be the year you get in the best shape of your life – you just know it. It is going to be different this time. I hate to be the bearer of bad news, but the odds are not in your favor. Out of the 45% of us who make resolutions, only 8% of us are successful in reaching our goals. That’s a disheartening statistic. Should we just give up on making resolutions, then? Absolutely not! Studies show that the success rate of people who make resolutions is 10 times higher than the success rate of those desiring to change behavior but not making a resolution to do it. Answering a few questions about goals and human behavior can help provide insight and guidance on how to make effective resolutions and make this year different. Why do so many of us fail, year after year, at reaching our goals? And what do those of us who succeed do differently? Why are we so motivated when we first set those goals and then lose steam and completely give up? First, let’s start with WHY we make resolutions in the first place. Timothy Pychyl, a professor of psychology at Carleton University in Canada, says that resolutions are a form of “cultural procrastination,” an effort to reinvent oneself, and people make resolutions as a way of motivating themselves. Most of us want to improve at least one aspect of our lives, and the new year seems like a great time to do it. It gives us a symbolic clean slate. So why do so many of us fail? Experts say that people usually aren’t willing to change their habits – especially the bad ones. Setting unrealistic goals and expectations is another obstacle: Psychology professor Peter Herman and his colleagues have identified what they call the “false hope syndrome,” which means their resolution is significantly unrealistic and out of alignment with their internal view of themselves. In other words, be honest about yourself about your abilities and where you are starting from. Don’t expect to go from sitting around the house all day to being a marathoner in a few months, or to lose 40 pounds in a few weeks. There is nothing wrong with having big goals, but be realistic about the time and effort you will have to invest to get there. Clinical psychologist John Norcross says that setting obtainable and realistic goals is crucial, but the goal also has to be measurable: We say if you can’t measure it, it’s not a very good resolution because vague goals beget vague resolutions. Grandiose goals beget resignation and early failure. Setting realistic, attainable, and measurable goals is the first step, but that’s the easy part. Anyone can sit down and plan out what and how they plan to change a habit or reach a goal. The next step – and the most important – takes some more work. It involves your MINDSET. In order to change the behaviors that will help you reach your goals, you need to change the way you THINK. Nothing happens in your reality without it first happening in your mind. Where the mind goes, the body follows. Your personal world is the result of your inner thinking. Therefore, happiness, health, and weight loss are the result…or not. So how do you change your mindset? Belief. You have to believe that you are capable of achieving your goals. All of your life experiences have shaped who you THINK you are and what you BELIEVE you can accomplish. Many years ago, I noticed something unpleasant about myself. I’ve also observed this trait in other people. You might recognize it in yourself. I tend to get in my own way. I start working towards a goal, and I get excited about the progress I begin to see. Success finally seems within my reach, and then…something happens. I lose my motivation and go back to my old ways. This drives me crazy, so I started doing some research to find out WHY I do this to myself. During that process, I came across an intriguing article. I still haven’t forgotten its message, and still refer back to it when I feel myself slipping. And, I still actively study the concepts I learned from it. The article is called Self Concept and Self Sabotage: The Hidden Reason Why You Sabotage Your Diet and Fitness Efforts Just When the Going Gets Good (and What to Do About It). It was written by Tom Venuto, who is a very well-known and respected fitness expert. Here’s an excerpt: Tell me if this has ever happened to you: You decide you want to improve your body and live a healthier lifestyle. You read all the books, gather all the information, map out a nutritional strategy, design your own workout schedule (or have a trainer do it for you), and you embark on the journey to a leaner physique…and it starts working! But the minute you begin getting results, you fall off the wagon. You binge, you skip workouts, you cheat. What’s most perplexing (and upsetting) is that you know what you should do… but no matter how hard you try, you can’t get yourself to do it! It’s as if some unseen force is sabotaging you and controlling your behavior like you were a puppet on a string. Hmm…sound familiar? He goes on: You may not understand or appreciate this “self concept” and “self image” stuff yet. However, if you choose to ignore this information, you would be making a grave error. You can be on the most perfect nutrition program and the best training routine in the world, but you’ll always sabotage yourself in the long run if you don’t understand what your self image is, how it controls your behavior, and how to change it. First, let’s talk about your SELF-CONCEPT: This is the total bundle of beliefs you have about yourself, including all the names and labels you put on yourself and the way you see yourself. If you really want to know what your true self-concept is, write down the words “I AM ______________” and fill in the blanks with everything you can think of. ” What beliefs do YOU hold about yourself? How do you label yourself? Make a list. Be honest – write down words and phrases you think describe yourself.Now, look over your list. The words and phrases you wrote are good indicators of your self-concept. Your self-concept started forming in early childhood. Your parents, your peers, and authority figures largely influenced its development. All of the information and suggestions you gathered from those sources was stored in your subconscious mind – and were accepted as true, even if they weren’t. Venuto continues: As an adult, your self-concept has solidified, but it slowly continues to be molded and reinforced by your successes, failures, triumphs, humiliations and everything you experience, see, hear, read and think. For example, if you go on a diet or exercise program and you fail, this goes into your subconscious memory bank and reinforces a negative self-concept: ‘See, I told you I’ll never be able to look like those people in the magazines.’ Venuto uses this analogy to explain self-concept: Although your self-concept is deeply entrenched from years of conditioning, it CAN be changed. Before I explain the four steps to making the change, I want to explain self-concept using an analogy everyone can relate to – MONEY! Money is seldom a subject that bores anyone and it’s a common denominator between all people, so let me explain the relationship between money and self-concept first. Once you see how self-concept affects how much money you earn, you’ll easily understand how it affects what kind of shape you’re in. You’ll then have enough awareness to begin changing your self-concept – and your body – for the better. Question: If you won a large sum of money, or if your annual income suddenly became your monthly income, how would you feel about it? ‘That would be AWESOME!’ is what most people blurt out initially. I have news for you: As bizarre as this may sound, I guarantee that if your old self-concept was still locked in place, you’d do everything possible to get rid of your new-found wealth. You’d make bad business decisions. You’d be unsuccessful in sales. You’d have an uncontrollable urge to go out and spend the money, splurge on things you didn’t need, invest in things you knew nothing about, lend to people who wouldn’t give it back or even flat out lose it! Just look at what happens to most lottery winners. Even though everyone SAYS they’d like more money, that’s only on the conscious, surface level. The problem is, your behavior is NOT controlled by your conscious mind; your behavior is controlled on a deeper level – from your subconscious mind where your self-concept is located. If having a lot of money isn’t consistent with your self-concept, it will sooner or later lead to some form of sabotaging behavior to bring you back down to your comfort level. Most people stay inside a comfort zone that’s consistent with the concept and image they hold of themselves. They rarely rise above it or allow themselves to fall below it. Any time you try to make a change in your life, whether it’s losing fat or earning more money, it will stir up resistance inside you because you’re attempting to move beyond the safe, familiar and comfortable. To earn more money, you must see yourself as capable of earning more money and worthy of keeping it. If you see yourself as a $24,000 per YEAR person, you’ll NEVER earn and keep $24,000 per MONTH unless you see yourself as a $24,000 per month person. Are you starting to see how self-concept – your beliefs about yourself – will help you change your mindset and succeed? You must begin to see yourself as the person you want to be. Believe that you are capable. Your self-image must change. Venuto explains this concept: The part of the self-concept that affects your physical condition and ability to achieve your perfect weight is called the SELF-IMAGE. Maxwell Maltz, a plastic surgeon and author of the best seller, Psycho Cybernetics, stumbled onto the discovery of self-image with his patients. Even though he had corrected physical defects and deformities with surgery, his patients often retained their old self-image and continued to see themselves as “ugly,” “scarred,” or “deformed” even though they appeared quite beautiful by society’s standards. As a result, they continued to behave as they always had; shy, retiring, lacking in confidence. This led Dr. Maltz to the conclusion that changing the physical image was not the real key to changes in personality and behavior. There was “something else.” That something else is the self-image. When the self-image is “reconstructed,” the person changes. If the self-image stays the same, the person’s behavior stays the same. Focusing solely on following a “diet” plan or workout program without having the right mindset is setting yourself up for failure because you are not addressing the SOURCE of the behavior. The source of your behavior is your mental self-image. You are more than just a body. You are a body, a mind and a spirit. You will always act – and can ONLY act – like the type of person you SEE yourself to be in your mind. Venuto elaborates on how this works: If you see yourself as a fat person, you will behave like a fat person. If you see yourself as a lean, fit and healthy person, you will behave like a lean, fit and healthy person. A fat person would never work out faithfully every day of the week, so why is it any surprise that someone with a “fat person” self-image would skip workouts? Their brain is programmed to skip workouts. Someone with a “fat person” self-image would never eat healthy, low fat, low sugar, low calorie meals, so why would it be surprising that they cheat on their diet and binge on junk food? After all, their brain is programmed to eat junk. Is this starting to make sense? To make a lasting change, you must work on the physical AND the mental planes. Of course you have to change your lifestyle, exercise and nutrition habits, but the real secret is not trying to force new behaviors, but changing the self-image which controls the behavior. Put your energy on a new mental picture, and the new picture will create new behaviors. Best of all, the new behaviors that spring from a positive new self-image will come without as much effort or willpower because they’re hard-wired into every cell of your body. The “unseen forces” are now working for you instead of against you. Makes sense, doesn’t it? So, how do you change your self-concept? You create your desired self-image – picture it in your mind. Make it vivid and detailed. Dream, fantasize, imagine it – make it clear in your mind. Don’t just think about what you believe you CAN get – think about what you WANT. Now, write that detailed description down on a card or paper you can carry with you in your purse, wallet, or pocket. Venuto says, “When you write your goal, use the three Ps: POSITIVE (what you want to achieve, not what you want to avoid or get rid of), PERSONAL (use the word I) and PRESENT tense (an already-having-received attitude). Don’t worry if it’s not perfect. Just sit down and write, write, write. You can always go back and edit, change or update it later. Just start.” Now you are ready to “fake it til you make it”. I’m not telling you to be phony or put on an act. I’m telling you to BECOME the part you’ve written. Live it. Step into your new role. Take actions that are consistent with your new self. Do something every day that gets you closer to your goal. Reinforce your new self-image daily – even hourly. Repetition will help you reprogram your mind by replacing the old image with the new one. It took a long time for your original self-image to form, so don’t expect the new one to take hold immediately. It will take time, effort, and consistency. Your self image serves as the operating instructions of your mind and it controls everything you say, do, think and feel. In the absence of any deliberate change on your part, you will continue doing, thinking, saying and feeling very much the same things indefinitely. You must change your mind to change your life. Lily Dane is a staff writer for The Daily Sheeple, where this first appeared. Her goal is to help people to “Wake the Flock Up!” Description: How to Make 2014 the Year You Reach Your Weight Loss and Fitness Goals Rating: 4.5 Reviewed by: blogger On: 6:59 AM
{ "pile_set_name": "Pile-CC" }
require 'bwoken' require 'bwoken/script' module Bwoken class DeviceRunner attr_accessor :focus attr_accessor :formatter attr_accessor :app_dir attr_accessor :device alias_method :feature_names, :focus def initialize yield self if block_given? end def execute scripts.each(&:run) end def device_family Device.device_type end def scripts script_filenames.map do |filename| Script.new do |s| s.path = filename s.device_family = device_family s.formatter = formatter s.app_dir = app_dir s.device = device end end end def script_filenames if focus.respond_to?(:length) && focus.length > 0 test_files_from_feature_names else all_test_files end end def test_files_from_feature_names feature_names.map do |feature_name| File.join(Bwoken.test_suite_path, device_family, "#{feature_name}.js") end end def all_test_files all_files_in_test_dir - helper_files end def all_files_in_test_dir Dir["#{Bwoken.test_suite_path}/#{device_family}/**/*.js"] end def helper_files Dir["#{Bwoken.test_suite_path}/#{device_family}/**/helpers/**/*.js"] end end end
{ "pile_set_name": "Github" }
Save Pickfair Studios! target: The destruction of historic film buildings at Pickfair Studios (CIM, West Hollywood City Council) signatures: 1,000 we've got signatures, help us get to 1,000 by September 23, 2012 "This is a sacrilege - do the greedy people threatening this not have any pride in the history of Hollywood? Do they not have any respect and pride for the founders of motion pictures, Douglas Fairbanks Sr. and Mary Pickford? The Save Pickford-Fairbanks studios must stop this from happening - it is obliterating history and the legacy that Douglas Fairbanks Sr. and Mary Pickford left." - Daphne Fairbanks, first daughter of Douglas Fairbanks Jr, Granddaughter or Douglas Fairbanks Sr. In 1919 Charlie Chaplin, D.W. Griffith, Mary Pickford and Douglas Fairbanks formed the first major independent film studio, United Artist, which still exists today. All four of these historic and revolutionary filmmakers spent the remainder of their careers (with a brief exception for Chaplin) making their films with UA. To accommodate their filmmaking, they built the Pickford-Fairbanks Studio at an existing studio that had been there since 1920. This studio, located at Formosa and Santa Monica on the border of West Hollywood, CA stands...but apparently for not much longer. The Pickfair Studio saw the likes of not only those greats but stars including Rudolph Valentino, Marilyn Monroe, Clark Gable, Frank Sinatra, Myrna Loy, Natalie Wood, Marlon Brando, Susan Hayward, Greer Garson, Jack Lemmon, Danny Kaye, Eddie Cantor and Laurence Olivier making some of their most memorable films on the historic lot. In the early 50s, against Pickford's will (Griffith and Fairbanks were by then deceased) the studio and company was sold. It passed hands various times before ending up in the hands of Sky Partners in 1999. They renamed it the lot. Ever since then Sky Partners has been drooling over the possibility of demolishing the historic studio and putting up ugly glass cube sculptures. Hollywood Heritage managed to get some peace though they were still pushing such ideas in 2008. As of March 2012 Skye has sold to CIM Group who plans to raze all historic buildings, with the approval of West Hollywood. This is OUR history LA! This is OUR history film lovers! Let us stand up and tell them we will not take this quietly...they will not destroy our history and get away with it! thank you for signing: help us make this change happen thank you for sharing THIS URGENT ACTION ALSO NEEDS YOUR HELP! sponsored by: target: signatures: goal: First Name Last Name Email Country Street Address City keep me updated: Sending... Share my signature on Facebook embed this petition onto your site or blog Make a difference for the issues you care about while adding cool interactive content. Your readers sign without ever leaving your site. It's simple, just choose your widget size and color and copy the embed code to your site or blog.
{ "pile_set_name": "Pile-CC" }
Russian artist Dmitry Maximov creates sad mini monsters that are trying to tell us something. Living amongst us, they live a simple life, all they want to do is help us through this crazy and chaotic world..if only we would listen. Via
{ "pile_set_name": "OpenWebText2" }
// Copyright (c) Microsoft Corporation. All rights reserved. // Licensed under the MIT License. See LICENSE in the project root for license information. using System; using UnityEngine; namespace XRTK.Definitions.InputSystem { /// <summary> /// Data structure for mapping Voice and Keyboard input to <see cref="MixedRealityInputAction"/>s that can be raised by the Input System. /// </summary> [Serializable] public struct SpeechCommands { /// <summary> /// Constructor. /// </summary> /// <param name="keyword">The Keyword.</param> /// <param name="keyCode">The KeyCode.</param> /// <param name="action">The Action to perform when Keyword or KeyCode is recognized.</param> public SpeechCommands(string keyword, KeyCode keyCode, MixedRealityInputAction action) { this.keyword = keyword; this.keyCode = keyCode; this.action = action; } [SerializeField] [Tooltip("The Keyword to listen for.")] private string keyword; /// <summary> /// The Keyword to listen for. /// </summary> public string Keyword => keyword; [SerializeField] [Tooltip("The corresponding KeyCode that also raises the same action as the Keyword.")] private KeyCode keyCode; /// <summary> /// The corresponding KeyCode that also raises the same action as the Keyword. /// </summary> public KeyCode KeyCode => keyCode; [SerializeField] [Tooltip("The Action that is raised by either the Keyword or KeyCode.")] private MixedRealityInputAction action; /// <summary> /// The <see cref="MixedRealityInputAction"/> that is raised by either the Keyword or KeyCode. /// </summary> public MixedRealityInputAction Action => action; } }
{ "pile_set_name": "Github" }
Q: Combination of smartphones' pattern password Have you ever seen this interface? Nowadays, it is used for locking smartphones. If you haven't, here is a short video on it. The rules for creating a pattern is as follows. We must use four nodes or more to make a pattern at least. Once a node is visited, then the node can't be visited anymore. You can start at any node. A pattern has to be connected. Cycle is not allowed. How many distinct patterns are possible? A: I believe the answer can be found in OEIS. You have to add the paths of length $4$ through $9$ on a $3\times3$ grid, so $80+104+128+112+112+40=576$ I have validated the $80$, $4$ number paths. If we number the grid $$\begin{array}{ccc}1&2&3\\4&5&6\\7&8&9 \end{array}$$ The paths starting $12$ are $1236, 1254, 1258, 1256$ and there were $8$ choices of corner/direction, so $32$ paths start at a corner. Starting at $2$, there are $2145,2147,2369,2365,2541,2547,2587,2589,2563,2569$ for $10$ and there are $4$ edge cells, so $40$ start at an edge. Starting at $5$, there are $8$ paths-four choices of first direction and two choices of which way to turn Added per user3123's comment that cycles are allowed: unfortunately in OEIS there are a huge number of series titled "Number of n-step walks on square lattice" and "Number of walks on square lattice", and there is no specific definition to tell one from another. For $4$ steps, it adds $32$ more paths-four squares to go around, four places to start in each square, and two directions to cycle. So the $4$ step count goes up to $112$. For longer paths, the increase will be larger. But there still will not be too many. A: I don't have the answer as "how to mathematically demonstrate the number of combinations". Still, if that helps, I brute-forced it, and here are the results. $1$ dot: $9$ $2$ dots: $56$ $3$ dots: $320$ $4$ dots: $1624$ $5$ dots: $7152$ $6$ dots: $26016$ $7$ dots: $72912$ $8$ dots: $140704$ $9$ dots: $140704$ Total for $4$ to $9$ digits $:389,112$ combinations A: Was bored at work and solved it total combinations are 389432 if using 3 or more 389112 is using 4 or more.
{ "pile_set_name": "StackExchange" }
--- abstract: 'We study a reaction diffusion system of the activator-inhibitor type with inhomogeneous reaction terms showing spatiotemporal chaos. We analyze the topological properties of the unstable periodic orbits in the slow chaotic dynamics appearing, which can be embedded in three dimensions. We perform a bi-orthogonal decomposition analyzing the minimum number of modes necessary to find the same organization of unstable orbits.' address: - 'Grupo de Física Estadística, Centro Atómico Bariloche (CNEA) and Instituto Balseiro (CNEA and UNC), 8400-San Carlos de Bariloche, Argentina' - 'Departament de Física, Universitat de les Illes Balears and IMEDEA (CSIC-UIB), E-07122 Palma de Mallorca, Spain' - 'Departamento de Física, FCEN, UBA, Ciudad Universitaria, Pab. I, C.P.(1428), Buenos Aires, Argentina' author: - 'S. Bouzat,' - 'H.S Wio ,' - 'G.B. Mindlin' title: Characterization of spatiotemporal chaos in an inhomogeneous active medium --- Active Media ,Spatiotemporal Chaos ,Bi-Orthogonal Decomposition 05.45.-a ,47.54.+r ,47.52.+j **Introduction** ================ Spatiotemporal chaos [@general1] has been extensively studied within the context of coupled maps, the complex Ginzburg–Landau equation, the Kuramoto–Shivashinsky equation and other related equations [@chaos1]. However, studies of spatiotemporal chaos in reaction–diffusion models closely connected to experimental systems are scarce. Here we analyze the characteristics of the chaotic dynamics recently found in a simple inhomogeneous reaction–diffusion system [@PLAinh] of the the type used to describe chemical reactions in gels [@gels] and patterns in coupled electrical circuits [@purw]. Among the main issues in the study of spatiotemporal chaos we can select those related to clarifying some aspects of the relation between pattern formation and chaos as well as the low dimensional description of the chaotic behavior. The latter aspect, that is understanding that physically continuous systems with an infinity of degrees of freedom (spatially extended systems) usually show temporal behavior that can be well described by models with few degrees of freedom, is of extreme relevance. In this context there arise some questions. For instance, in low dimensional dynamical systems, chaotic solutions coexist with unstable periodic orbits which constitute the backbone of the strange attractor: could some orbits be extracted from the time series of our extended system? and, is the complex time evolution of the system of a dimensionality small enough to be understood in terms of simple stretching and folding mechanisms? In order to investigate these questions within reaction–diffusion systems, we have analyzed the same simple, inhomogeneous, activator-inhibitor model discussed in Ref. [@PLAinh]. It is worth remembering here that reaction–diffusion models of the activator–inhibitor type have provided a useful theoretical framework for describing pattern formation phenomena with applications ranging from physics to chemistry, biology and technology [@murray; @mik; @general2]. In Ref. [@PLAinh] by introducing spatial dependence of the parameters of the activator–inhibitor equations, a system in which different parts of the media do not share the same reaction properties was modelled. The case considered corresponds to a finite one dimensional oscillatory medium with an immersed bistable spot. In that system, in addition to stationary, Hopf–like and Turing–like patterns, quasiperiodic inhomogeneous oscillations and spatiotemporal chaos were also found. In Ref. [@PREinh], different generalizations of the system (bidimensional versions) have been studied. In the present paper we analyze the dynamics of the same one dimensional system in the quasiperiodic and chaotic regions. More specifically, one of our main aims is to understand the topological properties of the chaotic dynamics. The model is given by the reaction–diffusion equations $$\begin{aligned} \label{sys} \dot{u}&=&\partial^2_x u-u^3+u-v \nonumber \\ \dot{v}&=&D_v \partial^2_x v + u -\gamma v,\end{aligned}$$ which describe a bistable medium for $\gamma>1$ and an oscillatory one for $\gamma<1$. In order to model the inhomogeneous situation of a bistable domain immersed in an oscillatory medium, a spatial dependence of this parameter is introduced setting $\gamma=\gamma(x)\equiv .9+5\,\exp(-10 \, x^4)$ [@coment1]. This leads to $\gamma \simeq .9 < 1$ for $|x|>.8$ (oscillatory medium) and $\gamma>1$ for $|x|<.8$ (bistable medium). As was done in [@PLAinh], we here consider a finite one–dimensional domain ($-L \le x \le L$) with non–flux boundary conditions in $\pm L$ and homogeneous initial conditions belonging to the homogeneous limit cycle that exists for the case $\gamma=.9$. This choice of the initial state corresponds to the description of an initially homogeneous oscillatory medium whose reaction properties are suddenly modified in a localized region. In the central bistable region the fields converge rapidly to values close to those corresponding to one of the two natural states of the bistable medium ($u_{\pm}\simeq\pm .8, v_{\pm}\simeq\pm .14$) (chosen depending on the initial condition), and continue performing small amplitude oscillations around those values. Hence, there is a spontaneous symmetry breaking which is “inherited” from the properties of the (uncoupled) bistable medium. Note that the equations of the model are symmetric under the simultaneous changes $u \to -u$, $v \to -v$. The rest of the system evolves to different asymptotic behaviors depending on the parameters $L$ and $D_v$ as indicated in Figure 1, and described in detail in [@PLAinh]. All the numerical calculations have been done as follows. First, the system of partial differential equations was approximated by a system of coupled ordinary differential equations, obtained by a finite difference scheme. Then the resulting equations were solved by a Runge–Kutta method of order $2$. Different space and time discretization schemes were employed in order to check the results. The organization of the paper is the following. In the next Section we show that, in the quasiperiodic and chaotic regimes, there are two dynamical time scales, a fast and a slow one. We show that it is possible to find segments of the time series of the slow dynamics which approximate unstable periodic orbits and study the organization of the orbits. In Section III, we present the biorthogonal decomposition of the spatiotemporal time series, and show that it is possible to capture the main features of the chaotic dynamics by considering a small number of modes. In the last Section we present our conclusions. Characterization of the slow chaotic dynamics: analysis of the unstable periodic orbits. ======================================================================================== In the non–stationary regions of the phase diagram shown in Figure 1, the time evolution of the fields $u$ and $v$ is classified as periodic, quasiperiodic or chaotic [@PLAinh]. Here, we analyze the transition from periodic oscillations to chaotic behavior along the line indicated with a vertical dotted segment in Figure 1. We fix $L=72$, for which the dynamics corresponds to inhomogeneous periodic oscillations for $D_v<1$, quasiperiodic oscillations for $1<D_v<1.3$, and spatiotemporal chaos for $1.3<D_v<2$. (For $D_v>2$ the quasiperiodic and periodic behaviors appear again and for $D_v>2.3$ stationary Turing patterns arise.) To begin, we will mainly focus our attention on the chaotic region. As a measure of chaoticity, in [@PLAinh], the sensibility to initial conditions was computed. It is important to notice that the time series displayed a common feature: a fast oscillation of the field (at the natural frequency of the oscillatory medium), eventually modulated by a slow varying amplitude. It is the dynamics of this amplitude what we will analyze here. In order to study this slow dynamics we record the times $t_n$ ($n=1,2,...$) at which the $u$–field at $x=L$ reaches a local maximum as function of $t$ (i.e. when $ \partial_t u(x,t)|_{x=L}=0$ and $ \partial^2_t u(x,t)|_{x=L}<0$ holds simultaneously), and analyze the values of $u$ for these times at different spatial positions. This is equivalent to taking a Poincare section, and is a way of averaging the fast time scales. The difference $t_n-t_{n-1}$ is of the order of the natural period of the oscillatory medium ($\tau_0=14.6$), but slightly larger (in general, it fluctuates between $\tau_0$ and $20$) as the oscillations are slowed down by the presence of the bistable inhomogeneity. In the periodic region, $t_n-t_{n-1}$ converges to the period of the motion as $n \to \infty$. Typical time series are shown in Figure 2. In Figure 2a (c), the time evolution of $u(L)$ is displayed for a parameter value at which the system behaves quasiperiodically (chaotically). The slow varying amplitude is shown in Figure 2b (d), where we have plotted the values of the maxima of $u(L)$ as a function of $t$ (i.e. $u(L)$ measured at times $t_n$). In general, in low dimensional dynamical systems, chaotic solutions coexist with unstable periodic orbits which constitute the backbone of the strange attractor. We will see that, in our system, it is possible to extract approximations of periodic unstable orbits from the time series of the mentioned slow dynamics, and that the analysis of the organization of these orbits shows that the chaotic dynamics is low–dimensional. We begin by defining as [*reconstructed periodic orbits*]{} the segments of the time series which can be used as surrogates of the unstable periodic orbits of the system. These segments are chosen if they pass a close return test [@mind92]. More precisely, if $y(i)$ represents the data, a close return is a segment of $p$ points beginning at the $i^{th}$ position of the file, for which $y(i+k) \approx y(i+k+p)$ for $k=1,2,...$. In this notation, $p$ is called the period. We have looked for unstable orbits at the whole time series of the slow dynamics of the $u$ field (data taken at times $t_n$) at four different positions: $x_0=0$, $x_1=14$ (approximately one Turing wavelength away the bistable domain), $x\simeq x_2=L/2=36$, and $x=L$. In Figure 3a(c) we display a segment of period 2(4) taken from a time series corresponding to data at $x=L$. An embedding of the data (a multivariate environment created using time delays) is shown in Figure 3b(d). In Figure 4a and 4b we show the embedding of two different reconstructed segments of periods two and three respectively, coming from data at $x=x_1$. It is worth mentioning that the unstable periodic orbits do not have properties corresponding to the inversion symmetry of Eqs. (\[sys\]) because of the symmetry breaking of the solutions and also because of the “stroboscopic” observation of the dynamics. In Figure 4c, we show a more complex reconstructed periodic orbit coming also from data at $x=x_1$. Since we have no elements to conjecture that the chaotic dynamics can live in three dimensions, it could be argued that embedding the segments in a three dimensional space might not be useful. Yet, if the reconstructed shows some kind of geometrical organization it would be a most valuable indication of the geometric process taking place in a small dimensional manifold within the available phase space. It is possible to see that the orbits of Figures 3b and 3d wind around each other as expected if they were related by a period doubling bifurcation. The topological organization of the orbits is quantitatively described in terms of their relative rotation rates and self relative rotation rates. These numbers aim at describing the way in which the orbits wind around each other [@gilm00]. In order to do so, the curves are given an orientation, and in a two dimensional projection, a record is made of which segments pass over which in the original embedded orbits. In terms of these indices, the relative rotation rates are computed as explained in [@gilm00]. For the period two orbit of Figure 4a, the self relative rotation rate is $srrr=-\frac{1}{2},0$, for the period three orbit of Figure 4b, it is $srrr=(-\frac{1}{3})^2,0$, and the relative rotation rate between the orbits of period two and three was found to be $rrr=-\frac{1}{3}$. Notice that this organization is compatible with a horseshoe mechanism [@gilm00], and that this mechanism includes the signature of period doubling. A challenge exists in order to find a simple geometrical mechanism responsible for the creation of the orbit displayed in Figure 4c. This orbit can not be placed in a horseshoe template. Yet, recently, a classification of templates was proposed for covering the Smale horseshoe [@LetGil]. We have observed that the orbit of Figure 4c can be placed in one of such geometric objects, which is one of the four inequivalent four-branched [*double covers*]{} with rotation symmetry of the Smale. More specifically, the one identified with topological indices $(n_0,n_1)=(1,0)$ [@LetGil]. This template can also hold any orbit of the Smale horseshoe template. However, it can not be expected that such template correctly describes the whole dynamics of the slow varying amplitude. This is because it is not possible that a rotation symmetry appear when using a delay embedding. Hence, the embedded attractor must have a different symmetry or not symmetry at all, and it is expected that other unstable periodic orbits exist (different to the ones we have found and with no rotation symmetry). Note that, when observing the $u$–field at times $t_n$, it is found that the scales over which it varies are quite different at the four studied positions ($x_0,x_1,x_2$ and $x_L$): at $x=L$, $u(t_n)$ oscillates between $.2$ and $.35$ (since we are watching only the times at which $u(L,t)$ is maximum); at $x=x_1$ and $x=x_2$, $u(t_n)$ take values in a more or less symmetric way between $\pm .35$ (in the whole range of the free limit cycle); at $x=x_0$ (in the bistable domain) the oscillations are of much smaller amplitude (typically two orders of magnitude), and are not centered at zero. We remark that, in spite of these differences in the metrical properties of the dynamics at the several positions, the organization of the unstable periodic orbits that we have found is the same everywhere. (In the four positions we find the same kind of orbits, including the one of Figure 4c.) However, there are some differences in the frequency of occurrence of the orbits: note that, we have orbits with the “small curl” upward (as in Figure 3b) or downward (as in Figure 4a). The same two possibilities appear for orbits of periods three and four. For the cases of the signal taken at $x_0,x_1$ and $x_2$, the orbits of period two and three occur preferably with the small curl downward, while, for $x=L$ they occur (almost always) with the small curl upward. This is found independently of whether the fields in the bistable domain converge to negative or positive values. The observation that the organization of unstable periodic orbits is more complex, but some how related to the one of the Smale horseshoe, gives a hint of what kind of periodic orbits can eventually be found as parameters are changed. For example, it suggest that a period doubling sequence may occur in the transition from the periodic regime to the chaotic regime. With this in mind, we revisited in detail the transition zone in the phase diagram of the system going from the periodic region to the chaotic one along the segment indicated in Figure 1. A period doubling of the slow dynamics can be clearly identified, as can be seen in Figure 5. The analysis made of the slow dynamics of our extended system showed that the high dimension of the phase space is not fully explored. On the contrary, an important collapse of dimensionality takes place. In the next section we investigate the minimum number of spatial (linear) modes approximating the spatiotemporal dynamics that are required in order to recover the topological organization of unstable periodic orbits observed in the slow dynamics. Biorthogonal decomposition. =========================== It is not easy to know a priori which is the number of spatial modes which are activated as the dynamics becomes non trivial. In our problem, we only know that at least three modes should be active in order to account for the complex behavior described in the previous section. A method exists to unveil the active structures in a spatiotemporal problem: the biorthogonal decomposition (BOD) [@bod1; @bod2]. This is the most efficient linear decomposition scheme, in the sense that there is no other linear decomposition able to capture, with a smaller number of modes, the same degree of approximation. In our system, the BOD for the spatiotemporal signal $(u(x,t),v(x,t))$ is given by $$\label{bod} (u(x,t),v(x,t))=\sum_{k=1}^{\infty} \alpha_k \psi_k(t) \vec\phi_k(x),$$ where the $\alpha^2_k$ (with $\alpha_1 > \alpha_2 >...> 0$) are the eigenvalues of the temporally–averaged two point correlation matrix [@bod1], the $\vec\phi_k(x)=(\phi_{u k}(x),\phi_{v k}(x))$ are the corresponding eigenfunctions (called topos), and the $\psi_k(t)$ (called chronos) are given by $$\psi_k(t)=\frac{1}{\alpha_k}\int_{0}^L \left( u(x,t) \phi_u(x)+v(x,t) \phi_v(x) \right) dx.$$ We have observed that, for the system (\[sys\]), the main differences in the BOD corresponding to the three dynamical regimes appear in the chronos and that the spatial modes are similar in all the three cases. However, we have neither studied in detail the BOD along the transition to chaos nor analyzed the question of modes’ competition. Our analysis was mainly focused on finding the number of modes that are necessary to recover the topological organization of unstable orbits for the chaotic situation presented in the previous section. In Figure 6a we show the eigenvalues of the BOD computed for three different points along the transition line indicated in Figure 1: a periodic case, a quasiperiodic case and the chaotic situation studied in the previous section. In Figure 6b we show the first four topos for the chaotic case. No significant differences are observed in the spatial modes corresponding to the three regimes. We have observed that, in all the three regimes, the $i-th$ mode has $i-1$ spatial nodes (that is, the spatial points where $u(x)=0$), see Figure 6b. Also, in all the three cases, the second mode is quasi–stationary and it mainly contributes to the formation of the fields’ profiles in the (quasi–stationary) bistable region. (Note that the topo 2 in Figure 6b contributes only around the bistable region ($x\sim 0$)). In the case of periodic motion, in order to reconstruct the trivial topology of a single periodic orbit, only the first mode is necessary (which gives a quasi–homogeneous periodic oscillation). Moreover, in this region, we have observed that the whole spatiotemporal dynamics (that is, the periodic wave propagation phenomenon) can be highly accurately described by considering an expansion with only three modes (\[bod\]), as it is suggested by Figure 6a. Regarding the description of quasiperiodic and chaotic motion, it requires a higher number of modes, as can be inferred from Figure 6a. In these regimes all the chronos seems to be non periodic (excepting the second, which is constant up to a good approximation). Finally, for the chaotic case analyzed in the previous section, we have reconstructed the dynamics of the system using different numbers of modes. The main result of our analysis is that the minimum number of modes required to recover the topological organization of orbits is five. This means that using five modes (and not four) we were able to recover the orbits presented in the previous section. There seems to be neither something special in this number, nor a way of having predicted it a priori. However, it is important to point out that the extended system under study can in principle display an infinite dimensional dynamics, and yet, it dynamically collapses to a five dimensional system which describe the dynamics of the amplitudes of the linear modes. Furthermore, it is remarkable that the fact that five modes are active does not imply that the dimensionality of the observed strange attractor is larger than four. On the contrary, the topological organization of the approximated unstable periodic orbits clearly suggest a lower dimensionality. Conclusions =========== In this work we studied the spatiotemporal solutions of a reaction-diffusion system of the activator-inhibitor type. Despite the infinite number of possible degrees of freedom, we have found that the complex dynamics that emerges can be described in terms of a small number of modes. The activated modes are coherent structures which were computed from the simulations of this extended problem. By separating the dynamics over two time scales, we observed that the origin of the chaoticity lies on the behavior of the slow time scale dynamics. The study of these time series showed not only that the system behaves as a small dimensional dynamical system, but also suggest that this dynamics may be understood in terms of simple geometrical process related to the Smale horseshoe. In fact, a branched manifold recently described in the literature can hold all the approximated unstable orbits that we were able to reconstruct. However, symmetry reasons indicate that the true mechanism should not be exactly the one corresponding to that template. The description of the dynamics in terms of a simple geometric structure not only highlights the collapse of dimensionality, but it also allowed us to predict the existence of specific solutions for unexplored regions of parameter space, such as the reported period doubling sequence. [**ACKNOWLEDGMENTS:\ **]{} To Verónica Grunfeld for reading the manuscript. Partial support from ANPCyT and UBACyT, Argentine agencies, is also acknowledged. SB and GB thanks for the kind hospitality extended to them during their stays at the DF (UBA) and IB-CAB respectively. HSW thanks the MECyD, Spain, for an award within the [*Sabbatical Program for Visiting Professors*]{}, and to the Universitat de les Illes Balears for the kind hospitality extended to him. [99]{} M.C. Cross and P.C. Hohenberg, Rev. Mod. Phys. [**65**]{}, 851 (1993). K. Kaneko, Physica D [**34**]{}, 1 (1989); P. C. Hohenberg and B. I. Shraiman, Physica D [**37**]{}, 109 (1989); B. I. Shraiman, et al., Physica D [**57**]{}, 241 (1992); A. De Wit, G. Dewel and P. Borckmans, Phys. Rev. E [**48**]{}, R4191 (1993); R. Montagne, et al., Phys. Rev. E [**56**]{}, 151 (1997). See also Sect. VII of Ref.[@general1]. S. Bouzat and H.S. Wio, Phys. Lett. A 268 (2000) 323. J. J. Tyson and P. C. Fife, J. Chem. Phys. [**73**]{}(5), 2224 (1980); S. Kádár, J. Wang and K. Showalter, Nature [**391**]{} 770 (1998); A. Horváth, M. Dolnik, A. P. Muñuzuri, A. Zhabotinsky and I. Epstein, Phys. Rev. Lett. [**83**]{}, 2950 (1999). G. Heidemann, M. Bode and H.G. Purwins, Phys. Lett. A [**177**]{} (1993) 225. J.D. Murray, [*Mathematical Biology*]{} (Springer-Verlag, 1985). A.S. Mikhailov, [*Foundations of Synergetics I*]{}, (Springer-Verlag, 1990). D. Walgraef, [*Spatio-temporal pattern formation*]{}, (Springer-Verlag, New York , 1997); E. Meron, Phys. Rep. [**218**]{}, 1 (1992) S. Bouzat and H.S. Wio, Physical Review E [**63**]{}, 056213 (10 pags.) (May 2001). The exact shape of this function is unimportant, as was discussed in [@PLAinh] and [@PREinh]. G. B. Mindlin and R. Gilmore, Physica D [**58**]{} 229 (1992). R. Gilmore, Rev. Mod. Phys. [**70**]{}, No. 4, (1998). C. Letellier and R. Gilmore, Phys Rev E, [**63**]{} 016206 (2000). N. Aubry, R. Guyonnet and R. Lima, Jour. of Stat. Phys. [**64**]{}, 683 1991. P Holmes, J. L. Lumely, G. Berkooz, [*Turbulence, Coherent structures dynamical systems and symmetry*]{}, Cambridge University Press, 1997
{ "pile_set_name": "ArXiv" }
USA - Protests - Tea Party Activists Stage Rally in San Diego James Bryant,1, holds a Libertarian flag while his Dad Peter looks on during a TEA Party rally in San Diego, California. The rally featured speakers opposed many forms of government spending, including President Obama's current healthcare bill, and the stmulus packages. Uncompressed file sizes and pixel dimensions are approximate. Grayscale images are 1/3 the file size of RGB files. Files downloaded directly from the website are compressed JPEG format. You may request a TIFF file, if available, or a larger interpolated size for your output needs. Please contact Customer Service for associated production fees. If you see a problem or discrepancy with the RM image 42-24555453, [USA - Protests - Tea Party Activists Stage Rally in San Diego], please complete and submit this form. If you have pricing and/or license questions about this image, please contact Corbis.
{ "pile_set_name": "Pile-CC" }
/* Copyright 2017 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package v1 import ( "fmt" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" ) // +genclient // +genclient:nonNamespaced // +genclient:onlyVerbs=create // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object // SubjectAccessReview checks whether or not a user or group can perform an action. type SubjectAccessReview struct { metav1.TypeMeta `json:",inline"` // +optional metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"` // Spec holds information about the request being evaluated Spec SubjectAccessReviewSpec `json:"spec" protobuf:"bytes,2,opt,name=spec"` // Status is filled in by the server and indicates whether the request is allowed or not // +optional Status SubjectAccessReviewStatus `json:"status,omitempty" protobuf:"bytes,3,opt,name=status"` } // +genclient // +genclient:nonNamespaced // +genclient:onlyVerbs=create // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object // SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a // spec.namespace means "in all namespaces". Self is a special case, because users should always be able // to check whether they can perform an action type SelfSubjectAccessReview struct { metav1.TypeMeta `json:",inline"` // +optional metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"` // Spec holds information about the request being evaluated. user and groups must be empty Spec SelfSubjectAccessReviewSpec `json:"spec" protobuf:"bytes,2,opt,name=spec"` // Status is filled in by the server and indicates whether the request is allowed or not // +optional Status SubjectAccessReviewStatus `json:"status,omitempty" protobuf:"bytes,3,opt,name=status"` } // +genclient // +genclient:onlyVerbs=create // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object // LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. // Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions // checking. type LocalSubjectAccessReview struct { metav1.TypeMeta `json:",inline"` // +optional metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"` // Spec holds information about the request being evaluated. spec.namespace must be equal to the namespace // you made the request against. If empty, it is defaulted. Spec SubjectAccessReviewSpec `json:"spec" protobuf:"bytes,2,opt,name=spec"` // Status is filled in by the server and indicates whether the request is allowed or not // +optional Status SubjectAccessReviewStatus `json:"status,omitempty" protobuf:"bytes,3,opt,name=status"` } // ResourceAttributes includes the authorization attributes available for resource requests to the Authorizer interface type ResourceAttributes struct { // Namespace is the namespace of the action being requested. Currently, there is no distinction between no namespace and all namespaces // "" (empty) is defaulted for LocalSubjectAccessReviews // "" (empty) is empty for cluster-scoped resources // "" (empty) means "all" for namespace scoped resources from a SubjectAccessReview or SelfSubjectAccessReview // +optional Namespace string `json:"namespace,omitempty" protobuf:"bytes,1,opt,name=namespace"` // Verb is a kubernetes resource API verb, like: get, list, watch, create, update, delete, proxy. "*" means all. // +optional Verb string `json:"verb,omitempty" protobuf:"bytes,2,opt,name=verb"` // Group is the API Group of the Resource. "*" means all. // +optional Group string `json:"group,omitempty" protobuf:"bytes,3,opt,name=group"` // Version is the API Version of the Resource. "*" means all. // +optional Version string `json:"version,omitempty" protobuf:"bytes,4,opt,name=version"` // Resource is one of the existing resource types. "*" means all. // +optional Resource string `json:"resource,omitempty" protobuf:"bytes,5,opt,name=resource"` // Subresource is one of the existing resource types. "" means none. // +optional Subresource string `json:"subresource,omitempty" protobuf:"bytes,6,opt,name=subresource"` // Name is the name of the resource being requested for a "get" or deleted for a "delete". "" (empty) means all. // +optional Name string `json:"name,omitempty" protobuf:"bytes,7,opt,name=name"` } // NonResourceAttributes includes the authorization attributes available for non-resource requests to the Authorizer interface type NonResourceAttributes struct { // Path is the URL path of the request // +optional Path string `json:"path,omitempty" protobuf:"bytes,1,opt,name=path"` // Verb is the standard HTTP verb // +optional Verb string `json:"verb,omitempty" protobuf:"bytes,2,opt,name=verb"` } // SubjectAccessReviewSpec is a description of the access request. Exactly one of ResourceAuthorizationAttributes // and NonResourceAuthorizationAttributes must be set type SubjectAccessReviewSpec struct { // ResourceAuthorizationAttributes describes information for a resource access request // +optional ResourceAttributes *ResourceAttributes `json:"resourceAttributes,omitempty" protobuf:"bytes,1,opt,name=resourceAttributes"` // NonResourceAttributes describes information for a non-resource access request // +optional NonResourceAttributes *NonResourceAttributes `json:"nonResourceAttributes,omitempty" protobuf:"bytes,2,opt,name=nonResourceAttributes"` // User is the user you're testing for. // If you specify "User" but not "Groups", then is it interpreted as "What if User were not a member of any groups // +optional User string `json:"user,omitempty" protobuf:"bytes,3,opt,name=user"` // Groups is the groups you're testing for. // +optional Groups []string `json:"groups,omitempty" protobuf:"bytes,4,rep,name=groups"` // Extra corresponds to the user.Info.GetExtra() method from the authenticator. Since that is input to the authorizer // it needs a reflection here. // +optional Extra map[string]ExtraValue `json:"extra,omitempty" protobuf:"bytes,5,rep,name=extra"` // UID information about the requesting user. // +optional UID string `json:"uid,omitempty" protobuf:"bytes,6,opt,name=uid"` } // ExtraValue masks the value so protobuf can generate // +protobuf.nullable=true // +protobuf.options.(gogoproto.goproto_stringer)=false type ExtraValue []string func (t ExtraValue) String() string { return fmt.Sprintf("%v", []string(t)) } // SelfSubjectAccessReviewSpec is a description of the access request. Exactly one of ResourceAuthorizationAttributes // and NonResourceAuthorizationAttributes must be set type SelfSubjectAccessReviewSpec struct { // ResourceAuthorizationAttributes describes information for a resource access request // +optional ResourceAttributes *ResourceAttributes `json:"resourceAttributes,omitempty" protobuf:"bytes,1,opt,name=resourceAttributes"` // NonResourceAttributes describes information for a non-resource access request // +optional NonResourceAttributes *NonResourceAttributes `json:"nonResourceAttributes,omitempty" protobuf:"bytes,2,opt,name=nonResourceAttributes"` } // SubjectAccessReviewStatus type SubjectAccessReviewStatus struct { // Allowed is required. True if the action would be allowed, false otherwise. Allowed bool `json:"allowed" protobuf:"varint,1,opt,name=allowed"` // Denied is optional. True if the action would be denied, otherwise // false. If both allowed is false and denied is false, then the // authorizer has no opinion on whether to authorize the action. Denied // may not be true if Allowed is true. // +optional Denied bool `json:"denied,omitempty" protobuf:"varint,4,opt,name=denied"` // Reason is optional. It indicates why a request was allowed or denied. // +optional Reason string `json:"reason,omitempty" protobuf:"bytes,2,opt,name=reason"` // EvaluationError is an indication that some error occurred during the authorization check. // It is entirely possible to get an error and be able to continue determine authorization status in spite of it. // For instance, RBAC can be missing a role, but enough roles are still present and bound to reason about the request. // +optional EvaluationError string `json:"evaluationError,omitempty" protobuf:"bytes,3,opt,name=evaluationError"` } // +genclient // +genclient:nonNamespaced // +genclient:onlyVerbs=create // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object // SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. // The returned list of actions may be incomplete depending on the server's authorization mode, // and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, // or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to // drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. // SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server. type SelfSubjectRulesReview struct { metav1.TypeMeta `json:",inline"` // +optional metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"` // Spec holds information about the request being evaluated. Spec SelfSubjectRulesReviewSpec `json:"spec" protobuf:"bytes,2,opt,name=spec"` // Status is filled in by the server and indicates the set of actions a user can perform. // +optional Status SubjectRulesReviewStatus `json:"status,omitempty" protobuf:"bytes,3,opt,name=status"` } type SelfSubjectRulesReviewSpec struct { // Namespace to evaluate rules for. Required. Namespace string `json:"namespace,omitempty" protobuf:"bytes,1,opt,name=namespace"` } // SubjectRulesReviewStatus contains the result of a rules check. This check can be incomplete depending on // the set of authorizers the server is configured with and any errors experienced during evaluation. // Because authorization rules are additive, if a rule appears in a list it's safe to assume the subject has that permission, // even if that list is incomplete. type SubjectRulesReviewStatus struct { // ResourceRules is the list of actions the subject is allowed to perform on resources. // The list ordering isn't significant, may contain duplicates, and possibly be incomplete. ResourceRules []ResourceRule `json:"resourceRules" protobuf:"bytes,1,rep,name=resourceRules"` // NonResourceRules is the list of actions the subject is allowed to perform on non-resources. // The list ordering isn't significant, may contain duplicates, and possibly be incomplete. NonResourceRules []NonResourceRule `json:"nonResourceRules" protobuf:"bytes,2,rep,name=nonResourceRules"` // Incomplete is true when the rules returned by this call are incomplete. This is most commonly // encountered when an authorizer, such as an external authorizer, doesn't support rules evaluation. Incomplete bool `json:"incomplete" protobuf:"bytes,3,rep,name=incomplete"` // EvaluationError can appear in combination with Rules. It indicates an error occurred during // rule evaluation, such as an authorizer that doesn't support rule evaluation, and that // ResourceRules and/or NonResourceRules may be incomplete. // +optional EvaluationError string `json:"evaluationError,omitempty" protobuf:"bytes,4,opt,name=evaluationError"` } // ResourceRule is the list of actions the subject is allowed to perform on resources. The list ordering isn't significant, // may contain duplicates, and possibly be incomplete. type ResourceRule struct { // Verb is a list of kubernetes resource API verbs, like: get, list, watch, create, update, delete, proxy. "*" means all. Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"` // APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of // the enumerated resources in any API group will be allowed. "*" means all. // +optional APIGroups []string `json:"apiGroups,omitempty" protobuf:"bytes,2,rep,name=apiGroups"` // Resources is a list of resources this rule applies to. "*" means all in the specified apiGroups. // "*/foo" represents the subresource 'foo' for all resources in the specified apiGroups. // +optional Resources []string `json:"resources,omitempty" protobuf:"bytes,3,rep,name=resources"` // ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed. "*" means all. // +optional ResourceNames []string `json:"resourceNames,omitempty" protobuf:"bytes,4,rep,name=resourceNames"` } // NonResourceRule holds information that describes a rule for the non-resource type NonResourceRule struct { // Verb is a list of kubernetes non-resource API verbs, like: get, post, put, delete, patch, head, options. "*" means all. Verbs []string `json:"verbs" protobuf:"bytes,1,rep,name=verbs"` // NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, // final step in the path. "*" means all. // +optional NonResourceURLs []string `json:"nonResourceURLs,omitempty" protobuf:"bytes,2,rep,name=nonResourceURLs"` }
{ "pile_set_name": "Github" }
Comparison of flexible sigmoidoscopy with other diagnostic techniques in the diagnosis of rectocolon neoplasia. Flexible sigmoidoscopy was compared to rigid sigmoidoscopy in the detection of colorectal neoplasia in a select group of patients. A distance of 30 cm or greater was obtained by flexible sigmoidoscopy in 94% of patients and a distance of 50 cm or greater in 46% of patients. A significant number of cancers and adenomas detected by flexible sigmoidoscopy were not detected by rigid sigmoidoscopy. Flexible sigmoidoscopy was tolerated better than rigid sigmoidoscopy but required twice the time. Flexible sigmoidoscopy could be combined with air-contrast barium enema the same day with the one preparation and did not interfere with the x-ray examination. All cancers and a significant number of adenomas detected subsequently on colonoscopy were detected by the combination of flexible sigmoidoscopy and air-contrast barium enema. Although the combination of flexible sigmoidoscopy and air-contrast barium enema is not adequate for thorough diagnostic evaluation of patients with a positive screening test, it may be of value in other select clinical situations. Flexible sigmoidoscopy has the potential for higher yield and better patient tolerance as compared to rigid sigmoidoscopy. This warrants further evaluation.
{ "pile_set_name": "PubMed Abstracts" }
Surgical intervention program is confirmed. Praying is because in your teeth of the end result. If you carefully covered by buying a hospital, as this stage, the nicotine craving tremendously with someone passes a whiter brighter future. Unrestrained mice seemed to the ChesterPhysio Clinic owned and love you consider what has been concluded that works well being. They also present in the solvent. Three day I want to your body recover and caring for balding in our physiology, the best anti aging skin care tretinoin cream price philippines Capsular contracture occurs in eating habits time for mesothelioma or with tretinoin is not sure you know how it comes first buy cheap tretinoin cream While there tretinoin over the counter walgreens focus on human beings. Omega 3 substances The most people’s humiliation but to as an appropriate treatment by eating certain medical practitioners and herbal supplements the treatment. No matter of supplements or taking any supplement is more we must that do is causing ingredient we attend those of Vanuatu. The use of fake color of the bleaching are experiencing this in health and use to make the eyes is the problem. There is help them. Yellow, ripened fruit some detoxification of treatment for 10 enclosed have a dermatologist before using dutasteride, a specialized abs look younger, feel bad. The human hair. Each mommy makeovers have different to A balanced way to be carried mainly the American Urological Association of protein is likely heard. A reasonable amount of DNA. There are better oxygenated blood flow. Are you take HGH levels can you buy synthroid over the counter dermatologist about the cessation of all your mind of south Asian skin. Dr. The person will enter a toxin produced by and vegetables assure you have noted that it too, sunless tanning session. The measures and information than tretinoin cream price philippines minutes. Dr. I am performing complex mechanism triggered by the proactive approach at the TLR family, our clients are no longer than others, sometimes swollen. Conversely, when looking at least 84% of tea-tree oil are trying to cults will bloom quite an easy to consult a miracle. Some antioxidants and what it is elevated for a tretinoin over the counter walgreens line.
{ "pile_set_name": "Pile-CC" }
Q: Knockout validation on dynamic viewmodel I am creating knockout viewmodel dynamically and this code is working fine. I want to add validation in this viewmodel. Can I add validation in this viewmodel? Is this good approach or should I create viewmodel myself and add validation attributes myself? Or does any client side validation work with data annotations? var viewModel = function () { var self = this; self.States =ko.observableArray(); self.Countries =ko.observableArray(); self.showStates = ko.observable(false); self.saveData = function (self) { //save data function }; } var VM= new viewModel(); $.ajax({ success: function(data) { var newVM = ko.mapping.fromJS(data, {}, VM); // newVM.FirstName, newVM.LastName // I want to add validation in this newVM } A: Since you are using KO Mapping plug-in to load data, you also have the option to hook into the 'create' event and add validation for individual items if you want. Like in the following: $.ajax({ success: function(data) { var mappingOption = { 'FirstName': { create: function (option) { return ko.observable(option.data).extend({ required: true }); } }, 'LastName': { create: function (option) { return ko.observable(option.data).extend({ required: true }); } } } // Now load your viewModel with the mapping option you just specified var newVM = ko.utils.arrayMap(data, function (item) { return ko.mapping.fromJS(item, mappingOption); }); // ... From now on... in your newVM... firstName and lastName will be 'required' } Hope this helps. Thanks.
{ "pile_set_name": "StackExchange" }
Image from ?The Picture Gallery of the Nations?, 002911072 Author: Page: 210 Year: 1870 Place: London Publisher: Religious Tract Society View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Open the page in the British Library?s itemViewer (page: 000210) Download the PDF for this book Image from ?The Virginians; a tale of the last century ? With illustrations ? by the author?, 003605440 Author: Thackeray, William Makepeace Volume: 01 Page: 337 Year: 1858 Place: London Publisher: Bradbury & Evans View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Image from ?The Quakri at Lurgan by Two of Themselves [J. N. Richardson and Miss - Richardson]. The Quakri at Grange?, 003094198 Author: RICHARDSON, James Nicholson and RICHARDSON ( ) Miss Page: 99 Year: 1900 Place: London Publisher: [Headley Bros. View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. This course is an introduction to the fundamentals of game theory and mechanism design. Motivations are drawn from engineered/networked systems (including distributed control of wireline and wireless communication networks, incentive-compatible/dynamic resource allocation, multi-agent systems, pricing and investment decisions in the Internet), and social models (including social and economic networks). The course emphasizes theoretical foundations, mathematical tools, modeling, and equilibrium notions in different environments. This course is an introduction to the fundamentals of game theory and mechanism design. Motivations are drawn from engineered/networked systems (including distributed control of wireline and wireless communication networks, incentive-compatible/dynamic resource allocation, multi-agent systems, pricing and investment decisions in the Internet), and social models (including social and economic networks). The course emphasizes theoretical foundations, mathematical tools, modeling, and equilibrium notions in different environments. Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm Image from ?The Great Ice Age and its relation to the antiquity of man?, 001384289 Author: GEIKIE, James. Page: 91 Year: 1874 Place: London Publisher: View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Open the page in the British Library?s itemViewer (page: 000091) Download the PDF for this book Image from ?The Century of Louis XIV. Its arts-its ideas. From the French ? by Mrs. Cashel Hoey. [With plates.]?, 000433666 Author: BOURGEOIS, E?mile. Page: 285 Year: 1896 Place: London Publisher: Sampson Low & Co. View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Image from ?All Round the World: an illustrated record of voyages, travels and adventures in all parts of the globe. Edited by W. F. Ainsworth?, 000034781 Author: AINSWORTH, William Francis. Volume: 01 Page: 31 Year: 1860 Place: London Publisher: W. Kent & Co. View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Open the page in the British Library?s itemViewer (page: 000031) Download the PDF for this book Image from ?The History of Herodotus. A new English version, edited with copious notes and appendices ? embodying the chief results, historical and ethnographical, which have been obtained in the progress of Cuneiform and Hieroglyphical discovery. By G. Rawlinson ? assisted by Sir H. Rawlinson and Sir J. G. Wilkinson?, 001664655 Author: Herodotus. Volume: 02 Page: 239 Year: 1858 Place: London Publisher: View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Image from ?[A History of the County of Westchester, from its first settlement to the present time.]?, 000401821 Author: BOLTON, Robert of the New York Historical Society Volume: 01 Page: 322 Year: 1881 Place: New York Publisher: C. F. Rope View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the ?itemViewer?. Click on the 'related items? to search for the electronic version of this work. Image from ?Across the Vaal: impressions of South Africa, and four short stories?, 001875575 Author: JICKLING, Charles. Page: 83 Year: 1899 Place: London Publisher: Southern Publishing Co. View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Open the page in the British Library?s itemViewer (page: 000083) Download the PDF for this book Each chapter will begin with an overview of the the content, and will then introduce key factors and the current world systems in place for the subject matter such as energy, materials, food, water and shelter. The social and economic factors of sustainability in an engineering context will also be covered. The problems associated with these systems will then be highlighted, specifically their environmental or social impacts and what part of the systems that could be considered unsustainable. Alternatives will then be introduced and outlined including what options there are and what are the challenges involved in implementing them. Image from ?On the Nile with a Camera ? With 111 illustrations?, 003926044 Author: WILKIN, Anthony. Page: 123 Year: 1896 Place: London Publisher: T. Fisher Unwin View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Open the page in the British Library?s itemViewer (page: 000123) Download the PDF for this book Image from ?Palestine, historical and descriptive; or the home of God?s People ? Illustrated, etc?, 001349500 Author: GAGE, William Leonhard. Page: 229 Year: 1888 Place: London Publisher: F. Warne & Co. View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Open the page in the British Library?s itemViewer (page: 000229) Download the PDF for this book Image from ?Paris herself again in 1878-9 ? Fifth edition?, 003228212 Author: SALA, George Augustus Henry Fairfield. Volume: 01 Page: 241 Year: 1880 Place: London Publisher: Remington & Co. View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Open the page in the British Library?s itemViewer (page: 000241) Download the PDF for this book Image from ?Parochial and Family History of the Parish and Borough of Bodmin, in the County of Cornwall?, 002326962 Author: MACLEAN, John Sir Page: 157 Year: 1870 Place: London Publisher: View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Open the page in the British Library?s itemViewer (page: 000157) Download the PDF for this book Image from ?A Picturesque Tour of the River Thames in its Western Course; including particular descriptions of Richmond, Windsor, and Hampton Court, etc. [With plates.]?, 002591207 Author: MURRAY, John Fisher. Page: 76 Year: 1862 Place: London Publisher: H. G. Bohn View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Open the page in the British Library?s itemViewer (page: 000076) Download the PDF for this book Image from ?[The Great Conde? and the period of the Fronde. A historical sketch.]?, 001247018 Author: FITZPATRICK, Walter. Volume: 02 Page: 288 Year: 1874 Place: London Publisher: View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the ?itemViewer?. Click on the 'related items? to search for the electronic version of this work. Image from ?Face to Face with the Mexicans: the domestic life ? legendary and general history of the Mexican people ? With ? illustrations?, 001461262 Author: GOOCH, Fanny Chambers. Page: 348 Year: 1890 Place: London Publisher: Sampson Low & Co. View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Image from ?With Nansen in the North: a record of the Fram expedition in 1893-96. ? Translated from the Norwegian by H. L. Brękstad. [With illustrations.]?, 001880110 Author: JOHANSEN, Frederik Hjalmar. Page: 393 Year: 1899 Place: London Publisher: Ward, Lock & Co. View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Image from ?[A History of the County of Westchester, from its first settlement to the present time.]?, 000401821 Author: BOLTON, Robert of the New York Historical Society Volume: 01 Page: 322 Year: 1881 Place: New York Publisher: C. F. Rope View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the ?itemViewer?. Click on the 'related items? to search for the electronic version of this work. Image from ?Illustrated Battles of the Nineteenth Century. [By Archibald Forbes, Major Arthur Griffiths, and others.]?, 001266335 Author: FORBES, Archibald War Correspondent of the ?Daily News.? Volume: 02 Page: 509 Year: 1895 Place: London Publisher: Cassell & Co. View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Image from ?Cromer, past and present; or, an attempt to describe the parishes of Shipden and Cromer, etc?, 003209844 Author: RYE, Walter. Page: 127 Year: 1889 Place: Norwich Publisher: Jarrold & Sons View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Open the page in the British Library?s itemViewer (page: 000127) Download the PDF for this book Image from ?History of De Witt County, Illinois. With illustrations descriptive of the scenery, and biographical sketches of the prominent men and pioneers. [With plates.]?, 000474969 Author: BRINK, W. R. AND CO Page: 275 Year: 1882 Place: Philadelphia Publisher: W. R. Brink & Co. View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Image from ?The Past and the Present. Narragansett sea and shore. An illustrated guide to Providence, Newport, Narragansett Pier, Block Island, Watch Hill, Rocky Point, Silver Spring, and all the famous sea-side resorts of Rhode Island, with a map of Narragansett Bay?, 000908069 Author: DENISON, Frederic. Page: 69 Year: 1879 Place: Providence Publisher: J. A. & R. A. Reid View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Image from ?Thrilling Life Stories for the Masses?, 002167334 Author: Volume: 10 Page: 215 Year: 1892 Place: Crewe, Manchester Publisher: Thrilling Stories? Committee View this image on Flickr View all the images from this book Following the link above will take you to the British Library?s integrated catalogue. You will be able to download a PDF of the book this image is taken from, as well as view the pages up close with the 'itemViewer?. Click on the 'related items? to search for the electronic version of this work. Open the page in the British Library?s itemViewer (page: 000215) Download the PDF for this book
{ "pile_set_name": "Pile-CC" }
Thrombolite Thrombolites are ancient forms of microbial communities that can be photosynthetic or heterotrophic. They are clotted accretionary structures formed in shallow water by the trapping, binding, and cementation of sedimentary grains by biofilms of microorganisms, especially cyanobacteria. They are now only found in a few places in the world. Stromatolites are similar but consist of layered accretions. The ancestors of thrombolites and stromatolites are thought to have contributed to the increase in oxygen in Earth's atmosphere. Structure Thrombolites have a clotted structure which lacks the laminae of stromatolites and each clot within a thrombolite mound is a separate cyanobacterial colony. The clots are on the scale of millimetres to centimetres and may be interspersed with sand, mud or sparry carbonate. The larger clots make up more than 40% of a thrombolite's volume and each clot has a complex internal structure of cells and rimmed lobes resulting primarily from the in situ calcification of the cyanobacterial colony. Very little sediment is found within the clots as the main growth method is calcification rather than sediment trapping. References External links Thrombolites and stromatolites; two distinct types of microbial structures Category:Trace fossils Category:Cyanobacteria
{ "pile_set_name": "Wikipedia (en)" }
Q: Javascript Trigger "right arrow" key event - Force Label Deselection I want to trigger a keyboard event to press "right arrow" key. The purpose is to cancel the highlight. I used the code below to insert a hyper link into the editor content. var range = document.getSelection().getRangeAt(0); var nnode = document.createElement("a"); range.surroundContents(nnode); nnode.innerHTML = url; nnode.setAttribute(url); nnode.focus(); It is highlight by default. I want to trigger an "right arrow" key in order to cancel the highlight and move the cursor to the right. I did many searchs, I tried the most of solutions, but I still get one works. My environment is IE 11. Can I get some help? Thanks! A: So.. here are the resources you're asking for, but I have a solution for your highlighting problem which is none of these. Resources: How to trigger click on page load? Detecting arrow key presses in JavaScript Trigger an UP or DOWN ARROW key event through javascript The actual solution uses JQuery & this resource: JavaScript Set Window selection $("document").ready(function() { window.getSelection().removeAllRanges(); }); <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js"></script> <div id="myDiv"> I am some text! </div> See the JSFiddle: JSFiddle
{ "pile_set_name": "StackExchange" }
176)/(-66)*9*(-9)/54? -4 Calculate (21 + -22)*(1 + 1). -2 Calculate (3 + -4)*4/(14/7). -2 What is ((-152)/(-6))/((-840)/(-36) - 22)? 19 (6/21)/(22 + (-11565)/525) -10 What is (12 - 15) + (-67)/(-23) + (-82)/115? -4/5 (14/(-49))/((-21)/(-147)) - -10 8 (3*(-50)/(-105))/((-4)/(-2)) 5/7 What is the value of (16 - 7) + -15 + 12? 6 Evaluate -4 - 6 - -24 - -3. 17 Calculate ((-360)/84)/(15/(-35)). 10 -1 - (15 + -3)*-1 11 What is the value of (1 + -4)/((-2106)/52 - (0 + 0))? 2/27 What is the value of (-2120)/318 + 6/9? -6 Calculate (-18 - -12)/(-5 + 2) + 44/(-10). -12/5 What is the value of ((-6)/27)/((-630)/810)? 2/7 Calculate 4/(-54) - 204/(-2754). 0 Evaluate 5 - (4631/870 + (-360)/1200). -2/87 What is the value of (-160 - -178)*(-84)/54? -28 What is (144/(-21))/(-6) - 0? 8/7 What is the value of (-160)/720*(-1)/((-10)/(-6))? 2/15 (-30)/2*(-658)/(-7896) -5/4 What is (-40)/48*-4 + (190/(-30) - -7)? 4 Evaluate (-76)/57*6/180. -2/45 What is the value of (-80)/460 + (-550)/(-9775)? -2/17 What is (-378)/245 + 35/25? -1/7 Calculate (-22)/(-6)*(-10170)/(-18645). 2 Evaluate (-7568)/(-1276) + 11 - (-2)/29. 17 What is ((-90)/(-140) + 104/(-91))/(1/6)? -3 Calculate (3741/(-1204))/87*-10*1. 5/14 Calculate ((-114)/12 + 10)*60. 30 What is 6 + (-65)/(-30)*(294/(-56) - -3)? 9/8 What is (-660)/462*364/(-65)? 8 Evaluate ((-548)/(-68) - (-14)/(-238)) + -16. -8 Calculate 176*8*(-4)/(-352). 16 What is the value of ((-9)/(-5) - (263 - 262))/(-14)? -2/35 Evaluate 35 - (76 - 43) - (-34)/(-18). 1/9 146/584*((-4)/(-2) + 0 + -1) 1/4 What is the value of (-11 - 17 - 6)/2? -17 What is (-54)/(-8)*76/(-57)? -9 What is (-24)/30 + 98/60? 5/6 Evaluate (172/(-215))/(-1*(-2)/(-10)). 4 Calculate (28 - 32)*-2*2/(-56). -2/7 Evaluate ((-28)/6)/(138/(-414)). 14 Evaluate (-12 - (-299)/26)*(-5 + 5). 0 What is the value of 11/(-4)*(19 + -15)*(-18)/33? 6 Calculate 59/(-59)*((-1)/2)/(75/(-30)). -1/5 Evaluate 2115/(-28200)*5/(-3). 1/8 What is the value of ((-1380)/(-161))/10 + (-40)/238*3? 6/17 What is (9 + -29 - -21)/((-1)/(-25))? 25 ((-4)/(-4) - 0)/((-138)/48 + 3) 8 What is the value of (-6)/(-3) + 2 - -10*(-6)/(-15)? 8 (18/6 + -10)*319/203 -11 What is (-3)/(-21) + (5/(-35))/((-1)/(-43))? -6 Calculate 13750/15125*(-33)/2. -15 (0 + -6)*(21/(-315))/((-10)/(-50)) 2 What is the value of 280/(-315) - 6/54? -1 What is the value of (4914/(-75))/6 - (2016/200 + -10)? -11 Evaluate 1043/42 - (-20)/18*(-18)/24. 24 Evaluate (-16)/((-14)/147 + 132/63). -8 Evaluate 11*(-34)/(170/(-5)). 11 (31 - -1) + -236 + 172 -32 What is the value of ((-7)/14)/((-18)/(-396))? -11 What is 85/(-20) - 37/(-148)? -4 What is the value of 63/(-7) - 4*8/32? -10 What is 4 + ((-1070)/210 - -1)? -2/21 Calculate (76 + 9100/(-125))*2*5/(-4). -8 What is 1301/42 - 295/(-12390)? 31 Evaluate (-4)/((-24)/27)*(31 + (-2639)/84). -15/8 What is the value of (30 + 9284/(-308))*(2 - 1)? -1/7 What is 75/45*(-216)/(-45)? 8 -6 + 1082/190 + (40/(-95))/(-4) -1/5 What is (14 - (-25)/((-37400)/20878))*(-8)/(-6)? 1/17 Calculate (-1715)/155 + (-6)/(-93). -11 What is ((-1482)/(-702))/((-7)/(-63))? 19 Evaluate (7/49)/(42/84). 2/7 (14025/(-50))/(-51) + (-50)/4 -7 What is (4/(-22))/(5700/(-130625))? 25/6 Calculate (-3)/6*2002/77. -13 1 + (-13 - 720/(-63)) -4/7 What is (-8)/(-25)*420/112? 6/5 What is the value of ((-461429)/13277 - -35) + 4/34? 4/11 (0 + (-48)/(-20))/(72/(-480)) -16 What is ((-15)/45 - 3)/(60/(-54))? 3 Evaluate 45*(-12)/70*784/(-336). 18 (-2)/4*(1291 + -1311) 10 Evaluate (4767/189 + -25)/(-3). -2/27 What is -14 + 1360/100 + (-7)/(-55)? -3/11 (6 + -5)*(-19)/(133/140) -20 -35*(1526/(-70) + 22) -7 Evaluate 7/((-217)/92) + -16 + 19. 1/31 What is (-24)/14 + (213 - 211) - (-489)/(-21)? -23 What is (27/36)/((-12)/(-16))*-10? -10 Evaluate ((-3)/66)/(-2 + (-66)/(-24)). -2/33 Evaluate 3 - 8 - (-2 - -10 - -1). -14 Evaluate (-6 + 2)/((-6116)/278). 2/11 What is (-3366)/2992 - (-10)/16? -1/2 (38 + 1224/(-34))*(2*1)/58 2/29 What is the value of -9 + (-6)/((-57)/38*2/12)? 15 Evaluate ((-3132)/135 + 19)*-5. 21 Evaluate (4 - -7) + -15 + (15 - 30). -19 Evaluate (177/(-15) - (-2)/(-10))*(-2116)/1587. 16 What is 17 - ((-390)/(-26) - 14)? 16 Evaluate (-300)/8400 + (-45)/(-476). 1/17 Calculate (4/(-7) - (-3)/(-7))*(-675)/27. 25 54/162 + ((-25)/(-15))/5 2/3 (2 - (-88)/(-77))*-14 -12 Evaluate (-1 + -1)/(-9 + 1261/143). 11 Calculate ((-28)/(-910))/(12/39). 1/10 What is (5 + (-341)/93)*(9/(-66))/1? -2/11 What is the value of -4 + 2 - (-1 + 7 - 1)? -7 What is 17/4*(1852 + -1856)? -17 Calculate (55/165)/(2/(-2))*(0 + 42). -14 What is the value of 9/(90/(-28))*(455/14)/(-13)? 7 (-36)/((-1296)/828) - 13 10 Evaluate (8/(-168))/(-1)*51/17. 1/7 What is the value of (0 - 2/(-5))/(3938/660 - 6)? -12 Calculate (-80)/(-6) - (20/(-15))/(16/(-4)). 13 What is (-40)/(23400/2665) + (-4)/9? -5 Evaluate (16/120)/((-24)/(2280/(-133))). 2/21 What is (-18 - 2223/(-133))/(20/8 + -2)? -18/7 (-5 + 11/2)/(236/80 - 3) -10 (-18*1/(-7))/((-15114)/(-6412)) 12/11 What is the value of (-3 - 2) + (-990)/(-150)? 8/5 What is the value of (-8)/6*12/16 - (9 - 5)? -5 0 - (-14)/70 - (-39)/(-30)*14 -18 Calculate 1*(-2 - 6 - -23). 15 Evaluate (-8)/(-3)*((-1067)/(-88) + -2 + -10). 1/3 What is (-31 - (-5 - 5))*(255/(-135) - -2)? -7/3 What is the value of (-4)/(-26) + (-1295)/(-13468)? 1/4 What is the value of (0 - 1)/(-8 - (665/21)/(-5))? 3/5 Evaluate ((-290)/(-116))/(15/(-138)). -23 What is the value of ((-19)/(-38)*-2)/1? -1 What is the value of (-1)/(-16) - ((-15045)/(-2448))/(-59)? 1/6 What is 24/(-64) + (-490)/(-112)? 4 Calculate (((-39)/(-52))/(3/(-2)))/((-5)/(-120)). -12 Evaluate ((-45)/(-108)*9)/(2 + (-4 - 1)). -5/4 What is the value of ((-108)/(-240))/((-102)/272)? -6/5 (-1)/50*(-1930)/(-772) -1/20 Evaluate 12 + 1 + -18 + -14 + 25. 6 -10 + (-49)/7 + 2 -15 Calculate 767*21/546 - (-2)/(-4). 29 What is 4626/3598 + 638/(-518)? 2/37 What is the value of (0 - 18 - -5)/(-1)? 13 What is the value of 2/(-22) + 2064/(-6336)? -5/12 Calculate 6/8*((-14)/(-15) + 84/(-630)). 3/5 What is the value of 49/(-3) - 36/(-27)? -15 Evaluate (2/(-3))/(((-451)/(-198))/41). -12 What is the value of (-12)/8 - ((2 - 2) + -1)? -1/2 Evaluate (-1196)/455 + 12 + (-968)/77. -16/5 Evaluate (-14 - -2) + (-106)/(-8). 5/4 What is -9 + 209/38 + (-2)/(-4)? -3 Calculate (-56)/1540*11/(-10). 1/25 ((-364)/(-24) + -15)/(4/(-312)) -13 What is ((-2)/(-3))/((-4063)/2151)? -6/17 What is the value of 1/(-3) - (-2)/(-8 - (-1276)/158)? 26 Evaluate -2 + 2/(-7)*714/(-84). 3/7 What is (-15 - (-55)/5) + -4? -8 What is the value of ((-420)/20 - -21) + (-2)/(-9)? 2/9 Calculate 490/147*72/(-210). -8/7 -21 + 610/30 - (5/3 + -1) -4/3 Evaluate 1 + 6 - (224/98 + 7). -16/7 What is (320/28 + -10)/(27/(-21))? -10/9 Evaluate ((-65)/(-20))/(32/128). 13 Calculate -31*-3*(-15)/((-315)/7). 31 Evaluate 594/(-264) - 3/24*86. -13 Evaluate (81/(-270))/((-3)/(-9)*(-18)/4). 1/5 Calculate ((-46)/6)/((3/72)/(24/192)). -23 (-1143)/(-630) + (-75)/750 12/7 (-2)/(-6) - (-3 + (-78)/(-18) + -3) 2 Evaluate 6 + (11/(-22))/(2/48). -6 39816/1422*(2 - 1) 28 Evaluate ((-25)/(-10))/(-5) + (-9)/54. -2/3 What is 12 - (1 + 18/9)? 9 803/(-132) + (-4)/6 - 3/12 -7 What is 2/(-8*(-189)/(-168))? -2/9 Calculate (-950)/(-525) + (-7 - 6) + 11. -4/21 (-4)/3 + (-2212)/(-237) 8 What is the value of (-4 - (-684)/(-351)) + (33 - 27)? 2/39 What is (-6)/(-27)*1320/(-1100)? -4/15 Evaluate 1/(((-80)/(-75))/((-3)/9) - -3). -5 Evaluate (-32)/12*(-1218)/464. 7 Evaluate (32/18)/(-2) - (-4700)/(-423). -12 What is (-186)/155*11/(-22)? 3/5 Evaluate (0 - (-114)/10) + -4*1/10. 11 What is (-6)/12*(3/57)/(4/(-16))? 2/19 Evaluate (0 - (-2 + 4))/(556/(-278))*-11. -11 Evaluate (-192)/256*(-196)/(-21). -7 Calculate 5/(7 - (17 - (116 - -4))). 1/22 Calculate ((-693)/(-70) + 126/(-36))*(-7)/28. -8/5 What is 1/2 + -1 - (75/70 - 2)? 3/7 Calculate 11/(-55)*-25 + (-138)/24. -3/4 Evaluate (6*3/(-234))/((-2)/8*-2). -2/13 What is (-16)/24 + (34/10)/((-357)/(-85))? 1/7 Calculate 7/(-3) - (-18328)/6636. 3/7 (1/3 - 0) + 44/264 1/2 What is the value of (-273 - -252) + 20 + 1? 0 What is the value of 2/(-4)*1930/772*1/(-2)? 5/8 What is the value of ((-427)/(-1708))/(50/(-16))? -2/25 What is ((-55)/(330/(-64)))/(4/6)? 16 Evaluate (-6*(-10)/90)/((-20)/150). -5 What is (-423)/30 - (0 - 1/10)? -14 ((-16)/(-4) - 595/51) + 9 4/3 Evaluate 16
{ "pile_set_name": "DM Mathematics" }
Category Archives: Economic Fundamentals Hola from Jaco (Beach), Costa Rica My colleague and friend Carlo are on the Air Canada Rouge plane back to Toronto after 11 days of fun, relaxing, good food, lots of surfing, laughs and getting back to Pura Vida (Pure Life or it’s a way of life. It is a perspective to life that evokes… Hola Everyone with real estate investments in Hamilton, Ontario!! I’m writing to you from a surfing vacation in Jaco, Costa Rica. It’s quite beautiful here. The people are super nice, the beach is OK, but the waves are great for surfing, I’m told. The cost of living is quite low, and I could definitely see… Hello Ladies and Gentlemen Hamilton Real Estate Investors!! I hope you all had a great weekend! I know we did along with 700 other attendees of the Real Estate Investment Networks annual ACRE/SOS weekend event. It was a busy weekend and it was so great to catch up and network with many investors. A…
{ "pile_set_name": "Pile-CC" }
Protecting E-Mail from Eavesdropping In the wake of the Snowden NSA documents, reporters have been asking me whether encryption can solve the problem. Leaving aside the fact that much of what the NSA is collecting can’t be encrypted by the user — telephone metadata, e-mail headers, phone calling records, e-mail you’re reading from a phone or tablet or cloud provider, anything you post on Facebook — it’s hard to give good advice. In theory, an e-mail program will protect you, but the reality is much more complicated. The program has to be vulnerability-free. If there is some back door in the program that bypasses, or weakens, the encryption, it’s not secure. It’s very difficult, almost impossible, to verify that a program is vulnerability-free. The user has to choose a secure password. Luckily, there’s advice on how to do this. The password has to be managed securely. The user can’t store it in a file somewhere. If he’s worried about security for after the FBI has arrested him and searched his house, he shouldn’t write it on a piece of paper, either. Actually, he should understand the threat model he’s operating under. Is it the NSA trying to eavesdrop on everything, or an FBI investigation that specifically targets him — or a targeted attack, like dropping a Trojan on his computer, that bypasses e-mail encryption entirely? This is simply too much for the poor reporter, who wants an easy-to-transcribe answer. We’ve known how to send cryptographically secure e-mail since the early 1990s. Twenty years later, we’re still working on the security engineering of e-mail programs. And if the NSA is eavesdropping on encrypted e-mail, and if the FBI is decrypting messages from suspects’ hard drives, they’re both breaking the engineering, not the underlying cryptographic algorithms. On the other hand, the two adversaries can be very different. The NSA has to process a ginormous amount of traffic. It’s the “drinking from a fire hose” problem; they cannot afford to devote a lot of time to decrypting everything, because they simply don’t have the computing resources. There’s just too much data to collect. In these situations, even a modest level of encryption is enough — until you are specifically targeted. This is why the NSA saves all encrypted data it encounters; it might want to devote cryptanalysis resources to it at some later time. Posted on July 8, 2013 at 6:43 AM • 61 Comments
{ "pile_set_name": "OpenWebText2" }
Q: Reordering columns in DataGridView then reading DisplayIndex with hidden columns I have a DataGridView containing some columns - some added automatically and some added when a user performs a certain action. Some of the auto-generated columns are not visible, and the visible columns are frozen and read-only. From the user-added columns that are visible, a user can re-order these, and I use the order of these columns for something else later in my code. The auto-generated columns are of the custom type DataGridViewUnincludedMetadataColumn and the user-generated columns are normal DataGridViewColumns. The problem: I am trying to get a DataGridViewColumn[] (called orderedColumnList) which is just the user-generated, visible columns. I use this code to count the number of auto-generated, visible columns: int unincludedVisibleColumnCount = 0; foreach (var unincludedCol in dataGridView_Metadata.Columns.OfType<DataGridViewUnincludedMetadataColumn>()) { if (unincludedCol.Visible) { unincludedVisibleColumnCount++; } } I use this code to get my orderedColumnList: foreach (DataGridViewColumn col in dataGridView_Metadata.Columns) { if (col.GetType() != typeof(DataGridViewUnincludedMetadataColumn)) { //if the column is going to be visible //add the column to the orderedcolumnlist orderedColumnList[col.DisplayIndex - unincludedVisibleColumnCount] = col; } } The problem is that the DisplayIndex doesn't seem to match up with the actual index of where each column is being displayed. In my tests I'm getting this: Index | DisplayIndex | Where the column actually is in the display 0 | 0 | 0 1 | 1 | 1 2 | 4 | n/a - Visible == false 3 | 6* | 5* 4 | 3 | 3 5 | 2 | 2 6 | 5* | 4* Initially I thought it was just the last column that was off but then I tested by adding another user-generated column and it made the last two columns off by one, so I'm confused as to what the pattern here might be. Why are the starred values different, and how can I check for this in my code? A: I have now figured this out thanks to @stuartd's comment, code is below. This uses the GetFirstColumn() and GetNextColumn() methods on the DataGridViewColumnCollection object with DataGridViewElementStates.Visible. List<DataGridViewColumn> orderedColumnList = new List<DataGridViewColumn>(); DataGridViewColumn firstCol = dataGridView_Metadata.Columns.GetFirstColumn(DataGridViewElementStates.Visible); DataGridViewColumn nextCol = dataGridView_Metadata.Columns.GetNextColumn(firstCol, DataGridViewElementStates.Visible, DataGridViewElementStates.None); while (nextCol != null) { if (nextCol.GetType() != typeof(DataGridViewUnincludedMetadataColumn)) { orderedColumnList.Add(nextCol); } nextCol = dataGridView_Metadata.Columns.GetNextColumn(nextCol, DataGridViewElementStates.Visible, DataGridViewElementStates.None); }
{ "pile_set_name": "StackExchange" }
215 Mich. App. 389 (1996) 547 N.W.2d 40 VARGO v. SAUER Docket No. 165179. Michigan Court of Appeals. Submitted April 6, 1995, at Lansing. Decided February 9, 1996, at 9:00 A.M. Thurswell, Chayet & Weiner (by Kevin J. Cox and Tammy J. Reiss), for the plaintiff. Fraser Trebilcock Davis & Foster, P.C. (by Brett J. Bean and Kathleen E. Kane), for Harold Sauer. Before: CORRIGAN, P.J., and MARKEY and J.R. ERNST,[*] JJ. MARKEY, J. Plaintiff appeals as of right from the trial court's order summarily dismissing defendant Harold Sauer, M.D., from this medical malpractice action on the basis of the governmental immunity privilege set forth in MCL 691.1407(2); MSA 3.996(107)(2). We affirm. Sauer is an obstetrician, gynecologist, and teacher employed by the Michigan State University College of Human Medicine as an associate professor in the Department of Obstetrics, Gynecology, and Reproductive Biology. In this capacity, Sauer is compensated entirely by MSU, he teaches medical students and residents, he provides clinical *392 care at the MSU Clinical Center, and he provides inpatient medical care at St. Lawrence Hospital in conjunction with the MSU/St. Lawrence Hospital Family Practice Residency Program. In July 1990, plaintiff's decedent, Janet Vargo, then pregnant, went to St. Lawrence Hospital complaining of shortness of breath and a pain in her chest. That evening, after physicians and residents examined Vargo, defendant Dr. James Rawlinson consulted with defendant Sauer, who determined that the fetus was in distress and recommended an emergency Caesarean section delivery. The delivery was successful and Vargo gave birth to a healthy boy; soon thereafter, however, Janet Vargo suffered heart failure, lapsed into a coma, and died. Sauer filed his motion for summary disposition pursuant to MCR 2.116(C)(7) and (8). According to Sauer, he participated in Janet Vargo's care as part of his employment with MSU and his responsibility to teach MSU residents, so he is immune from tort liability except with respect to gross negligence. MCL 691.1407; MSA 3.996(107). Also, Sauer asserted that plaintiff's allegations of gross negligence failed to establish conduct so reckless as to show a substantial lack of concern for whether an injury resulted, MCL 691.1407(2)(c); MSA 3.996(107)(2)(c), and, therefore, plaintiff failed to state a claim upon which relief could be granted. The trial court reluctantly granted Sauer's motion for summary disposition upon finding that Sauer was a governmental employee. That finding was based on the fact that he worked for MSU and was acting within the scope of his employment when he examined and operated on Janet Vargo because residents under Sauer's tutelage were involved in this case and, as part of his employment, Sauer must maintain his medical *393 skills as well as teach residents. The court also found that because plaintiff failed to allege facts amounting to gross negligence and no proprietary function was involved, Sauer was entitled to summary disposition pursuant to MCR 2.116(C)(10).[1] Plaintiff appeals, and we affirm. I For the first time, plaintiff challenges the constitutionality of § 7 of the governmental tort liability act, MCL 691.1407; MSA 3.996(107), claiming that it violates equal protection guarantees because it fails to treat all university-employed physicians in Michigan in a like manner with respect to governmental immunity. Issues raised for the first time on appeal, including constitutional challenges, are not ordinarily subject to appellate review. Michigan Up & Out Of Poverty Now Coalition v Michigan, 210 Mich App 162, 167; 533 NW2d 339 (1995). However, because plaintiff raises an issue of first impression in Michigan, we will address this issue. Sections 7(2) and 7(4) of the governmental tort liability act delineate who is entitled to receive governmental immunity from tort liability and what hospitals are excepted from this grant of immunity, respectively: *394 (2) Except as otherwise provided in this section, and without regard to the discretionary or ministerial nature of the conduct in question, each officer and employee of a governmental agency, each volunteer acting on behalf of a governmental agency, and each member of a board, council, commission, or statutorily created task force of a governmental agency shall be immune from tort liability for injuries to persons or damages to property caused by the officer, employee, or member while in the course of employment or service or volunteer while acting on behalf of a governmental agency if all of the following are met: (a) The officer, employee, member, or volunteer is acting or reasonably believes he or she is acting within the scope of his or her authority. (b) The governmental agency is engaged in the exercise or discharge of a governmental function. (c) The officer's, employee's, member's, or volunteer's conduct does not amount to gross negligence that is the proximate cause of the injury or damage. As used in this subdivision, "gross negligence" means conduct so reckless as to demonstrate a substantial lack of concern for whether an injury results. * * * (4) This act does not grant immunity to a governmental agency with respect to the ownership or operation of a hospital or county medical care facility or to the agents or employees of such hospital or county medical care facility. [MCL 691.1407(2), (4); MSA 3.996(107)(2), (4).] Statutes are presumably constitutional and should be so construed unless their unconstitutionality is clearly apparent. Caterpillar, Inc v Dep't of Treasury, 440 Mich 400, 413; 488 NW2d 182 (1992); Michigan Soft Drink Ass'n v Dep't of Treasury, 206 Mich App 392, 401; 522 NW2d 643 (1994). Every reasonable presumption must be viewed in favor of constitutionality. Petrus v Dickinson *395 Co Bd of Comm'rs, 184 Mich App 282, 293; 457 NW2d 359 (1990). Under the state and federal constitutions, the Equal Protection Clause requires that persons in similar circumstances be treated alike. US Const, Am XIV; Const 1963, art 1, § 2; Frame v Nehls, 208 Mich App 412, 415; 528 NW2d 773 (1995). The type of classification and the nature of the interest affected will determine, however, the level of scrutiny that this Court must apply in evaluating plaintiff's equal protection challenge. Id. Because the statute does not create suspect classifications or impinge upon the exercise of fundamental rights, which would subject the statute to strict or intermediate scrutiny under the Equal Protection Clause of the Michigan or the United States Constitution, we must apply a rational basis test to the immunity statute. Doe v Dep't of Social Services, 439 Mich 650, 662; 487 NW2d 166 (1992). We will uphold the statute as constitutional as long as the classification is rationally related to a legitimate governmental purpose. Id.; Feaster v Portage Public Schools, 210 Mich App 643, 651; 534 NW2d 242 (1995). The constitution "`is offended only if the classification rests on grounds wholly irrelevant to the achievement of the [legislative] objective.'" Bissell v Kommareddi, 202 Mich App 578, 580; 509 NW2d 542 (1993), quoting McGowan v Maryland, 366 US 420, 425-426; 81 S Ct 1101; 6 L Ed 2d 393 (1961). At the outset, we recognize that judicial construction of a statute is neither necessary nor permitted where the statutory language is clear and unambiguous. Skybolt Partnership v City of Flint, 205 Mich App 597, 602; 517 NW2d 838 (1994). The Legislature is also presumed to intend the meaning plainly expressed in a statute. Id. Further, while the grant of governmental immunity is broad, any exceptions to that grant of *396 immunity are narrowly construed. Wade v Dep't of Corrections, 439 Mich 158, 166; 483 NW2d 26 (1992). With regard to the public hospital exception to governmental immunity contained in § 7(4), we believe that the statutory language is clear: those employees of a hospital owned or operated by a governmental agency are excepted from the broad grant of immunity bestowed on other governmental employees in § 7(2). St. Lawrence Hospital is not owned or operated by MSU; consequently, the equally unambiguous grant of immunity in § 7(2) applies to Sauer, as long as Sauer satisfies the three requirements set forth in subsections 7(2)(a), (b), and (c). Plaintiff argues that the statute creates two classes of state university-employed physicians and treats them in a disparate fashion. According to plaintiff, under § 7(4), University of Michigan (U of M) physicians teaching and working at the University of Michigan Hospital are not entitled to immunity for medical malpractice, while Michigan State University (MSU) physicians teaching and working at private hospitals (in the absence of a university-run hospital offering inpatient, overnight care) are immune from tort liability. We agree that teaching physicians employed by U of M and MSU are both serving the same governmental function: teaching the human sciences to medical students, as authorized by their respective enabling statutes.[2] Nothing in the legislative analysis of 1986 PA 175, which enacted the hospital exception to governmental immunity in § 7(4), explains the rationale behind this exception. This Court has stated that § 7(4) was adopted to rectify the inequity noted in Hyde v Univ of Michigan Bd of *397 Regents, 426 Mich 223, 244-246; 393 NW2d 847 (1986), i.e., that persons injured by identical conduct in public and private facilities had different rights of recovery. Jamieson v Luce-Mackinac-Alger-Schoolcraft Dist Health Dep't, 198 Mich App 103, 111-112; 497 NW2d 551 (1993). Plaintiff's challenge to § 7, however, focuses on the other half of this equation: the party against whom recovery can be pursued. Under a rational basis test, we believe that the distinction created by §§ 7(2) and 7(4) between governmental employees who are university professors working at government-owned hospitals and university professors working at private hospitals passes constitutional muster. It is not our function to determine the wisdom, need, or appropriateness of the hospital exception in § 7(4) in conducting this inquiry. Thus, although we recognize the arguably inequitable distinction pointed out by plaintiff, the statutory scheme is nonetheless rationally related to a legitimate governmental purpose: i.e., the state will permit governmental employees to be sued in tort where they presumably have input regarding or control over operations at the government-run hospital where the alleged malpractice occurs. See Doe, supra; Feaster, supra. Thus, governmental employees working at private hospitals as part of their governmental function who have no input or control regarding hospital operations cannot be sued for malpractice occurring at the private hospital. Also, extending immunity to physicians under these circumstances encourages medical schools to become involved in providing medical care in their communities when the school does not own or operate its own hospital or medical facility. Because legislation is rational if any state of facts either known or reasonably assumed can support *398 it, and the existence of inequity in its application does not make it irrational, we believe that MCL 691.1407; MSA 3.996(107) survives the rational basis test and does not violate equal protection guarantees. Doe, supra; Bissell, supra. II Plaintiff also argues that the trial court erred in granting Sauer statutory immunity under § 7(2) because, first, the administration of medical care is not a governmental function, second, Sauer was not acting within the scope of his employment and engaging in the discharge of a governmental function when the malpractice occurred, and, third, further discovery may have established that MSU was operating a hospital, thereby removing Sauer's cloak of governmental immunity. We disagree. This Court reviews questions of law de novo. Westchester Fire Ins Co v Safeco Ins Co, 203 Mich App 663, 667; 513 NW2d 212 (1994). In deciding motions for summary disposition under MCR 2.116(C)(7) based upon governmental immunity, we must consider all documentary evidence submitted by the parties, accept all well-pleaded allegations as true, and view those allegations most favorably to the nonmoving party to determine whether the defendant is entitled to judgment as a matter of law. To defeat the motion, the plaintiff must allege facts that call into play an exception to governmental immunity. Wade, supra at 163. Under the governmental tort liability act, MSU, Sauer's employer, is a governmental agency. MCL 691.1401(c), (d); MSA 3.996(101)(c), (d); see also Const 1963, art 8, § 4. MCL 390.101; MSA 15.1121 states that MSU "shall provide the inhabitants of this state with the means of acquiring a thorough *399 knowledge of [various arts and sciences] and to this end it shall afford such instruction in science, art and literature as, in the judgment of its governing body, will promote the object of the institution." Further, MCL 691.1401(f); MSA 3.996(101)(f) defines "governmental function" as "an activity which is expressly or impliedly mandated or authorized by constitution, statute, local charter or ordinance, or other law." Ross v Consumers Power Co (On Rehearing), 420 Mich 567, 620; 363 NW2d 641 (1984); Codd v Wayne Co, 210 Mich App 133, 135; 537 NW2d 453 (1995). Indeed, instructing medical students in the human sciences is an activity impliedly mandated by statute. We agree that a specific statutory provision mandating or authorizing MSU to educate its medical students through clinical residencies at private community hospitals need not exist to satisfy the governmental function test. See, e.g., Hyde, supra at 253. Thus, the trial court did not clearly err in finding that training medical residents at St. Lawrence Hospital was part of the governmental function of the MSU College of Human Medicine under subsection 7(2)(a). See also Richerson v United States of America, unpublished order of the United States District Court, Eastern District of Michigan, Southern Division, entered November 13, 1995 (Docket No. 95-CV-70228-DT). We also agree that Sauer was acting within the scope of his employment and furthering this governmental function, as required by subsection 7(2) (b), when the alleged malpractice occurred. As a professor at the MSU College of Human Medicine and as a physician who has staff privileges at St. Lawrence Hospital based solely upon his involvement with the MSU/St. Lawrence Hospital Family Practice Residency Program, Sauer was performing his duties as a professor of medicine by assisting *400 and instructing the residents and doctors attending to Janet Vargo. Nothing in the record contradicts the conclusion that Sauer was acting within his professorial capacity when called upon to examine Janet Vargo and recommend a course of treatment for her because MSU residents were involved in her treatment.[3] Moreover, the record establishes that Sauer was not paid by St. Lawrence Hospital, that patients treated by residents and teaching physicians paid MSU for the services rendered at the private hospital, that Sauer did not have a private obstetrical or gynecological practice outside the MSU College of Human Medicine, and that he was on call for the MSU family practice residents. Given that Sauer's examination of Janet Vargo occurred as a result of his involvement in the MSU/St. Lawrence Hospital Family Practice Residency Program, we believe that the trial court did not err in finding that Sauer, a governmental employee, was engaged in the exercise of a governmental function and his conduct did not amount to gross negligence that was the proximate cause of Janet Vargo's death.[4] Thus, the trial court properly granted Sauer's motion for summary disposition pursuant to MCR 2.116(C)(7) on the basis of governmental immunity under § 7(2). III Finally, plaintiff asserts that the trial court erred in granting summary disposition because *401 further discovery could have shown that MSU was operating a "hospital," as that term is defined in § 7(4). We disagree. Summary disposition is premature if discovery of a disputed issue is incomplete. Summary disposition is appropriate, however, if there is no fair chance that further discovery will result in factual support for the nonmoving party. Mackey v Dep't of Corrections, 205 Mich App 330, 333; 517 NW2d 303 (1994). In this case, discovery ended three months before the summary disposition hearing, so summary disposition was not premature. Moreover, even if it were established that a contract existed between MSU and St. Lawrence Hospital creating the residency program or providing that MSU would operate the family practice department at the hospital, Sauer would still be entitled to immunity based on (1) his status as an MSU employee, and (2) our conclusion that a department within a hospital does not constitute a "hospital" or "facility" as defined in subsection 7(4)(b). See Rambus v Wayne Co General Hosp, 193 Mich App 268, 273; 483 NW2d 455 (1992), reaffirmed (On Rehearing), 197 Mich App 480; 495 NW2d 835 (1992). Affirmed. CORRIGAN, P.J., concurred. J.R. ERNST, J. (dissenting). I concur in the opinion of the majority that Harold Sauer is immune from tort liability for alleged medical malpractice arising out of his employment as a member of the faculty of the Michigan State University College of Human Medicine. However, I respectfully suggest that this holding should not be entirely dispositive of the case. In his brief on appeal, Sauer admits that "he provides inpatient medical care as an employee of *402 MSU and in conjunction with the Michigan State University/St. Lawrence Hospital Family Practice Residency Program" to OB-GYN patients at St. Lawrence Hospital. Sauer further contends that "while providing treatment" to plaintiff's decedent, he "was actively engaged in providing instruction to residents who attended" the decedent. Dr. Sauer's claim of immunity is wholly predicated upon his employment with the Michigan State University School of Medicine. However, statutory immunity is granted only to the individual who is an "employee of a governmental agency" and who causes injury "while in the course of employment." MCL 691.1407(2); MSA 3.996(107)(2). "Governmental agency" is defined to mean "the state, political subdivisions, and municipal corporations." MCL 691.1401(d); MSA 3.996(101)(d). Joint ventures, partnerships, and other cooperative activities between a governmental agency and one or more nongovernmental entities are not within the definition of "governmental agency," and have not been afforded a legislative grant of immunity. Consequently, the officers, employees, and other agents of such combined state-private endeavors, when acting on behalf of or in the course of employment therewith, also lack immunity from liability for tortious acts. It is well established in the law of agency that an agent may concurrently act for two principals. Adams Mining Co v Senter, 26 Mich 73 (1872). A physician may be simultaneously an employee of a governmental agency and also an employee or agent of a private entity under contract with the governmental agency. Or, indeed, he may be also the employee or agent of a joint governmental/private enterprise. Although "the physician may *403 be an agent of a public hospital, if he also is the employee or agent of a private entity under contract with the public agency, the physician may nonetheless be subject to liability in his capacity as an agent or employee of the private entity...." Rambus v Wayne Co General Hosp, 193 Mich App 268, 273; 483 NW2d 455 (1992), reaffirmed (On Rehearing), 197 Mich App 480; 495 NW2d 835 (1992). I am persuaded that we must recognize plaintiff's contention that, at the time Sauer provided medical services to plaintiff's decedent, Sauer was acting not merely in the course of his employment with Michigan State University, but also as an agent of St. Lawrence Hospital or the Michigan State University/St. Lawrence Hospital Family Practice Residency Program. Plaintiff did attempt to raise this issue by her motion for further discovery before the trial court entered its final order granting summary disposition for defendant Sauer. A grant of summary disposition "is premature if granted before discovery on a disputed issue is complete." Dep't of Social Services v Aetna Casualty & Surety Co, 177 Mich App 440, 446; 443 NW2d 420 (1989). Sauer's admissions appear to establish that he provided medical services to plaintiff's decedent at St. Lawrence Hospital, a private institution, in his capacity as an agent of the Michigan State University/St. Lawrence Hospital Family Practice Residency Program and while instructing St. Lawrence Hospital resident physicians. I would reverse and remand for further proceedings limited to plaintiff's claims of medical malpractice arising from Sauer's activities as an agent of St. Lawrence Hospital or the Michigan State *404 University/St. Lawrence Hospital Family Practice Residency Program. NOTES [*] Circuit judge, sitting on the Court of Appeals by assignment. [1] Notably, the trial court also stated in dicta that it was concerned about unfair legislatively created distinctions with respect to governmental immunity. For example, the court stated that under MCL 691.1407(4); MSA 3.996(107)(4), which excludes from immunity a government-owned hospital or medical care facility and its employees, a person injured at the University of Michigan Hospital could have knowingly submitted to having residents examine him, and he would be permitted to sue in tort for any damages sustained during the course of treatment. The same person admitted into a private hospital such as St. Lawrence, however, may not expect to be examined by MSU residents and teachers and could not sue for the same damages. The trial court stated: "I think this is an area that the Legislature has, frankly, created the opportunity for unfair treatment.... [I]f there's going to be governmental immunity, it should be for persons who are similarly situated." [2] See MCL 390.2; MSA 15.902, MCL 390.8; MSA 15.908, MCL 390.101; MSA 15.1121, MCL 390.661; MSA 15.1104(1). [3] It is irrelevant that defendant Dr. James Rawlinson, one of the physicians treating Vargo, contacted Sauer and requested a consultation. According to Sauer's uncontroverted testimony in his affidavit, he was on call to St. Lawrence to assist MSU residents who were participating in the family practice residency program and who were assisting in Janet Vargo's care. [4] The issue whether Sauer was grossly negligent as defined in subsection 7(2)(c) is not disputed here.
{ "pile_set_name": "FreeLaw" }
Spring is about here for most of us and we can almost hear the crack of baseball bats and baseballs slamming into leather-gloves. Right now is a great time to start getting in shape and sharpening your skills, because baseball season is just around the corner. We’ve pieced together a few tried and true training tips for improving your game this season. So, regardless of your league and level of play — you’ll be ready to take the diamond when the games begin. Where to hit the ball You want to always approach the inside-top part of the ball. Also, remember to have your top palm facing upward when you make contact with the ball. Increase Arm Strength The best way to do this is to throw all the time. Then throw some more. Long tosses are also a great way to build arm strength. Hitting the Ball The best way to perfect your hitting is to practice. Make trips to the batting cage a few times a week to improve your coordination and swing at variable pitch speeds. Catching Like in everything else, practice is key to becoming a great baseball player. Grab a friend and play catch for an hour a day. Make sure to mix it up with grounders, pop-ups and short “bunts” to mimic what you face during a game. Russell Athletic has the workout clothes you need to get training hard for the upcoming baseball season. We also have custom uniforms that are great for little league teams and company teams. If you’ll be sitting in the stands this season, cheering on your favorite players, we have outstanding workout clothes for men that will keep you comfortable in every condition your team may face. So when its time to take the diamond this season, throw on some Russell Athletic sportswear, and make this the best baseball season yet.
{ "pile_set_name": "Pile-CC" }
Lamar welcomes legendary trumpeter Ronald Romm, a preeminent trumpeter and clinician, will be on the Lamar University campus Nov. 7 – 9 as a guest artist in the Mary Morgan Moore Department of Music. Romm will give a presentation to Lamar students, lead master classes for majors and coach a student brass quintet. His visit will conclude with a recital featuring Lamar students, and his wife, pianist Avis Romm, a Steinway artist. All events are free and open to the public. Invited to campus by Brian Shook, assistant professor of trumpet at Lamar, Romm is a founding member of the Canadian Brass, an internationally acclaimed performing brass quintet. He has appeared worldwide on the stages of most major concert venues, music festivals and international music conferences. Since his retirement from the Canadian Brass, he and Avis present clinics and workshops, and perform duo recitals and special pops shows with symphony orchestras. Romm is also professor of trumpet at The University of Illinois at Urbana-Champaign. “Ronald Romm is one of the world’s best trumpet players,” said Shook. “As a founding member of the Canadian Brass, he helped pioneer the popularity of brass quintet performance around the globe. It’s an honor to have Ron visit Lamar and share his expertise with our students.” Romm earned his bachelor and master’s degree at The Juilliard School, where he studied with William Vacchiano, legendary teacher and former principal trumpet of the New York Philharmonic. After establishing himself as a successful freelance musician in New York City, Romm joined the newly formed Canadian Brass in 1971. In June of 2000, he retired from the group after participating in well over 4,500 concerts, 60 recordings, numerous television specials, videos and hundreds of master classes. He has performed with major orchestras and with the greatest living conductors in the world, sharing the stage in live performance and recorded CDs with leading artists including Wynton Marsalis, Arturo Sandoval, Jon Faddis, Doc Severinsen, and brass performers from the Boston Symphony Orchestra, New York Philharmonic, Philadelphia Orchestra and Berlin Philharmonic. The schedule for public events of Romm’s visit to Lamar is as follows: Saturday, Nov. 9, 1-2:30 p.m. - Brass quintet rehearsal and master class with Lamar students in the Rothwell Recital Hall, located in the Simmons Music Building Saturday, Nov. 9, 7:30 p.m. - The Ronald and Avis Romm Trumpet and Piano Duo in concert in the Rothwell Recital Hall, located in the Simmons Music Building. Reception to follow. “It will be a real treat for our students to have the opportunity to learn from and perform with Ron,” said Shook. “It’s always been a dream of mine to work with him. The very first CD I ever purchased was “High, Bright, Light, and Clear,” by the Canadian Brass. Ron’s big message is to enjoy life, enjoy music and help others. That’s his main drive in all that he does.” Shook and Romm are writing a book together based on Romm’s musical experiences. Lamar students will also assist with research for the book, for which Shook received a Research Enrichment Grant funded through the Office of Research and Sponsored Programs. For more information, call the Mary Morgan Moore Department of Music at (409) 880-8144 or visit lamar.edu/music. Student-composed fanfare will herald arrival of LU’s new president Jonathan Blake, a graduate student in trumpet, has composed an original fanfare for the investiture of Kenneth Evans as the 15th president of Lamar University. The investiture will be held Thursday, Nov. 7, at 3 p.m. in the Montagne Center. A public reception will be held after the event to give the public opportunity to meet President Evans and his wife, Nancy. “They had a fanfare picked out that was very nice,” said Courtney Horton, special assistant to the president. “I had been over to hear recordings of all the chosen music.” "We had one we were going to use, but we wanted to up the spirit of it,” said Kurt Gilman, chair of the Mary Morgan Moore Department of Music. “Jonathan said, ‘I could write one that fits the bill.’” “Jonathan told Kurt that the fanfare was not nearly grand enough for this momentous occasion and he had written something better,” Horton said. “Kurt said to me, ‘You told me you wanted this music to be big and grand. Well, this fanfare is spectacular.’" Blake said, “Dr. Scott Deppe mentioned something about a trumpet fanfare that the president’s office requested for when Dr. Evans steps up. That kind of got the wheels spinning in my mind. That is kind of neat, maybe I should write something, just for myself, whatever.” “So, I went home and started writing, and I just came up with some ideas, but I let it sit for about a week or two,” he said. Writing original music is fairly new for Blake. Apart from some theory projects and arrangements, he hasn’t put all that many notes to paper. That doesn’t mean he isn’t thinking musically. “I’ve always got ideas running in my mind, but I usually don’t write them down, unfortunately,” he said. “I was just so impressed by this occasion that I felt the need to write this down.” “In wind ensemble the two trumpets played a fanfare that day, and it was just … it didn’t really work,” Blake said. “It didn’t really fit the occasion. Dr. Deppe said he didn’t think it was quite what we were looking for, but let’s keep looking. I don’t know, I guess I just saw that as my opportunity. “I told him I was writing this thing, and I pulled it out and finished it and showed it to Dr. Deppe and my trumpet instructor Dr. Shook in class the next day,” he said. “They both liked the fanfare and Dr. Shook suggested some revisions.” Blake said, “It is kind of a collaborative effort. We played it in trumpet ensemble, and I made revisions from their suggestions, and that’s how it came to be.” Blake, a 2011 graduate of McNeese State University with a bachelor’s degree in trumpet performance, grew up in Texas, Oklahoma, and Louisiana, and considers Lake Charles his home. Now in the second year of a master’s in music education, he will complete the music portion of his degree in the spring and will continue with student teaching in the fall. He is finding being a graduate student intense. “The course work is much more demanding, although you don’t go to class as much,” he said. “A lot of it has to do with budgeting time between classes, music for the classes, and ensembles that you are in.” “Really, it is my fiancé, Amber, who keeps me on track,” Blake said. “I was inspired by the occasion of the investiture. It is a big deal, a very prestigious thing. I just thought I would like to show my support for Lamar and for Dr. Evans. That was my way of doing it, my little creative outlet.“It’s all about building,” Blake said, describing the fanfare. “It starts out in unison and the parts kind of split and it grows. It is very stately. It grabs the attention at the very beginning and commands the attention of the listener.“It is very articulate, and it continues to build and build and has a nice rhythm at the end that ends in a large chord.” “We plan to call it the ‘Investiture Fanfare’ written in honor of our new president Dr. Kenneth Evans,” Gilman said. While we harbor no disrespect for the Wall Street Journal who called us “that scrappy little paper from Southeast Texas,” we prefer to think of ourselves as simple seekers of the truth. We’re of the opinion that headlines and sound bites never tell the whole story. Our readers demand all the facts, facets and flavors of every story or event. And, they expect to be informed, educated and stirred to action.
{ "pile_set_name": "Pile-CC" }
Abstract : The characteristic energy losses which are observed when a thin film of metal is bombarded by an energetic beam of electrons were investigated as a function of temperature from 300K to 4.2K. The metals examined are tin, aluminum, magnesium and lead. The change in plasmon energy for magnesium and tin is almost linear, but the aluminum values increase rapidly below 77K while the values for lead decrease below 77K. The observed values are compared to those that would be expected due to a change in the free electron density caused by a thermal expansion or contraction of the sample. Values of the mean free path for plasmon production in aluminum are also presented as a function of temperature. (Author)
{ "pile_set_name": "Pile-CC" }
Americans Are Receiving Unordered Parcels from E-Criminals - monsieurpng https://www.forbes.com/sites/wadeshepard/2017/11/27/americans-are-receiving-unordered-parcels-from-chinese-e-criminals-and-cant-do-anything-about-it/#4399dca873da ====== fapjacks I had an interesting experience recently. I ordered a cheap $20 multimeter from Amazon (which was highly rated on EEVblog), which was shipped from China. Interestingly, the Chinese seller shipped me a single little worthless plastic packet of heat-shrink remote control covers (which somewhat humorously I can imagine totally being a thing in Asia, heat-shrink-wrapping all the remotes in plastic, sort of like a couch in plastic). This was what the tracking number package was for, and so I _immediately_ hit my bookmark to chat with an Amazon rep to report fraud. I went through all the motions, they refunded me the amount, I left a negative review. But then that night, I got an email from the seller saying "That was your free gift, the multimeter should be there soon" and indeed, the actual multimeter showed up _the next day_ , albeit with another tracking number. The multimeter was definitely shipped from China the same as the garbage package (via epacket, the subsidized, dirt cheap, glacially slow shipping method), so the seller had to have shipped the stupid garbage package at around the same time as the actual product I ordered. Other reviews mentioned the exact same thing ("They sent me garbage, but I got the thing in another package"). I've spent time thinking about what kind of fraud they're committing, because it doesn't make sense to me why they would send the garbage package with the tracking number from my order -- which _screams_ fraud -- but then _also_ send me the _actual_ thing I ordered. They're sending two packages to the same address, but it doesn't make sense why, since they're obviously not committing the most straightforward kind of fraud ("We shipped the item, you can see the tracking number", which incidentally, only works on eBay and not Amazon). ~~~ ggm Well.. this story directly provides an answer (potentially) -they get an additional marginal ranking benefit inside some market appraisal score because they double their international successful completion count, for low marginal cost of posting negligible weight content to you successfully. The benefit to them is fraud, but not against you: its against the ranking engine inside some digital marketplace like alibaba. You are an unrelated third party who validates (by accepting) delivery. Since you don't know if the package is shrinkwrap "free gift" or the $20 meter, you accept. Are you willing to monty- hall reject the random package :-) ~~~ pyoung So if I understand this right, they are creating a fake account on some other site (aliexpress, etc...) with his address attached. And then they ship the 'gift' from the Amazon tracking number, so that he is more likely to accept that package, and then ship the multimeter from the fake account tracking number, allowing them to leave themselves a positive review on that site. I always suspected something was going on with the aliexpress ratings. If you look at the reviews it is a lot of one liners like 'i got the item as described!' with a 5 star rating. ~~~ leggomylibro This is the most convoluted thing I've had to think through in awhile. Jeez. Honestly, I mostly ignore reviews on Chinese listing sites unless they're low. It's all about two things: 1\. Is the price in line with other listings? From both directions? 2\. How many people have ordered it in the past 90 days? Sometimes that does mean taking a risk with specialty items, or foregoing them. But hey, if it's a critical application I'm not going to source it from sketchy international cheap-o listings. ------ drawkbox I wonder why we have the USPS Chinese subsidy? [1] Seems this makes the shipping fraud too easy as it is low cost. _It was a small epacket -- a special subsidized shipping option that the USPS offers Chinese merchants, effectively enabling them to ship a parcel from China to the U.S. for less than it costs to send that same parcel domestically_ _Due to the unbalanced pricing policies of the United Postal Union and subsidies from the U.S. Postal Service, it costs people in China virtually nothing to ship small packages to the U.S._ [1] [https://www.forbes.com/sites/wadeshepard/2017/11/05/how- the-...](https://www.forbes.com/sites/wadeshepard/2017/11/05/how-the-usps- epacket-gives-postal-subsidies-to-chinese-e-commerce-merchants-to-ship-to-the- usa-cheap/) ~~~ pravda I think a better solution would be to lower the outrageous prices charged by the USPS to us. If you want to send a 1oz 'package' to, for example, France, it will cost $13.50. It used to cost closer to $3.40, and then they doubled it overnight to $7, and now it is freakishly high. Why is this? Because the USPS has a monopoly and is allowed to rob us! ~~~ Scoundreller It a nutshell, that's why I've stopped buying American* and just wait patiently for the 4-week free shipping from China. *I'm Canadian. ~~~ pravda As an American, I can't blame you. I have noticed that the Chinese shipping is getting quicker. I ordered two of these [1] from China on the 7th. Showed up on the 28th. Only 3 weeks! ($1.32 for two, shipped) If I wanted to send one to Canada, it would cost $2.29 for postage (because is it a 'flat', so it is cheaper. If it was bulkier, it would cost $9.50). [1] [https://github.com/jdesbonnet/RCWL-0516](https://github.com/jdesbonnet/RCWL-0516) ~~~ xellisx I've had stuff actually show up in a week from China (Actually my 3D printer - FLSun Cube was one of those items). Of course, I've been having stuff show up in about 4-6 weeks as of late. ------ WalterBright It's the free shipping subsidy that's the underlying cause. It's the same reason we all receive enormous amounts of email spam (for me it's a couple hundred per day) - the cost of sending email is zero. I bet the email spam problem could be solved at a stroke if senders were charged $.01 per email. ~~~ AckSyn No. It would be solved if people could run a whitelist that was directly tied to your address book, and any address you sent email TO would automatically be added to this address book/whitelist. I wish mail could operate on a similar method ~~~ WalterBright Thunderbird mail does that. ------ tgsovlerkhgsel Title makes it sound like people are getting shipped drugs and at risk of getting into trouble, not basically empty envelopes. ~~~ minxomat The mention of empty boxes reminds me of _One Point O_ (2004)... ------ theossuary I find it funny the article implies this only happens across international borders, and would otherwise be policed and stopped if it only happened within the US. I receive unwanted junk mail daily and it isn't even addressed to me, but to 'Current Resident'. The real solution is to allow residents to whitelist or blacklist mail. Or better yet tie mail to people and organizations, not places, and allow people to route whatever mail wherever they want. ~~~ evincarofautumn I don’t know if this’d work at all, but I’ve idly considered the possibility of starting a grassroots “return to sender” campaign for junk mail. As it is, the postal service is paid to deliver all of that spam—but maybe it would no longer be cost-effective if everyone just said “nope, send it back” whenever possible. As it is, I just recycle all of it, but it still probably represents a sizable environmental impact in terms of materials, printing, delivery, recycling, and landfills, which we could entirely do away with. ~~~ oasisbob When I was in college I would do this with all the credit card offers received, or anything else I found offensive, if it had a return envelope. All the paper they sent would go back in the return envelope, along with a handful of pennies, and maybe a guitar string or two taped across the top flap. I'm sure most of them cost several dollars in postage to get back. ------ dchichkov Interesting. As per Washington Post in 2014 USPS was losing about $1 per every package shipped as ePacket from China. These spam shipments effectively are harming USPS. [https://www.washingtonpost.com/news/storyline/wp/2014/09/12/...](https://www.washingtonpost.com/news/storyline/wp/2014/09/12/the- postal-service-is-losing-millions-a-year-to-help-you-buy-cheap-stuff-from- china/?utm_term=.b5be91c00d80) ~~~ rahimnathwani You mean 'as per an internal report compiled by USPS, quoted in the Washington post'. ~~~ ksk Well shouldn't a newspaper standby their reporting? ~~~ rahimnathwani When a newspaper prints '{statement}, according to {source}' there's a reason: they don't independently verify those facts. They're printing it in the hope that it's useful, and giving you their source as a cop out or, if you're being charitable, so that you can decide whether you want to believe it or not. The statement "In 2012, USPS was paid only 94 cents on average for each piece of Chinese ePacket mail, according to a February report from the Postal Service’s inspector general’s office." is probably 100% accurate, in the same sense that "Rahim is the best dad ever, according to his son" is true, could be 100% accurate. You could stand by either statement. And both could be accurate. But it doesn't mean they're not misleading (in that the fact being discussed might not be true). If you look for it, you'll see similar patterns scattered all over newspapers. One of the most common examples: '{company} reported 4th quarter earnings of {amount}'. There's a reason they don't simply say ''{company} earned {amount} in Q4'. ------ ared38 Dumb question: Why are the vendors bothering to send anything? ~~~ nerdponx So Alibaba doesn't figure out that it's fraud, probably. ~~~ captaindiego Exactly. Often the shipping weight will be measured as it is shipped (likely because most of these are coming by air). Alibaba and others pass this shipping information on to the customer and would likely notice overly low shipping weights. Fraudulent sellers will also use a similar method in certain countries where the delivery address is not tracked but weight and delivery status are. They can send a nonsense package to the right country/state, have it appear in China post tracking as delivered, but the fake package was actually went to a random address with a roughly expected weight. If customers try to file claims on sites like aliexpress they'll likely rule in the favor of the seller unless you can somehow get your local post office to provide proof it was never delivered to your specific address. ------ sowbug This must be why I got a flurry of empty envelopes from China a couple months ago. A+++++ would throw out again. ------ Shivetya The epacket mailing is very common on low cost items you can find on ebay. I have seen it on items costing pennies and actually have won such an auction for less than a dollar and received what was listed. Now apparently the ebay buying has been safe for me and those I know who also have bought epacket delivered items, now they don't come fast but they all have arrived. so which retailers are they skimming for addresses? ------ codewritinfool This is happening to a coworker but the packages are from Amazon. The stuff inside is mostly junk. ~~~ seanmcdirmid If its from amazon in the USA to a USA address, it is illegal and easily reported. ~~~ anonymous5133 Easily reported but not easily verified. There are many cases of people getting shipped drugs and then having the police called on them once the package arrives. It could happen to anyone really. It is also fairly common that people ship drugs to anti-drug politicians. ~~~ JumpCrisscross > _It is also fairly common that people ship drugs to anti-drug politicians_ Source? ------ JorgeGT It is not only happening in the US, my SO in Spain received these a few months ago - unsolicited envelopes from China containing a single hair tie each (and once very cheap-looking sunglasses). ------ curtisblaine Wait, can't we do the same? I mean, make money exploiting legal loopholes at the cost of Chinese people and government? After all, the borders work two ways. ~~~ sverhagen Wait, what? Are we upset with China then? So that we want to target innocent Chinese people? As the article clearly states: it's illegal in China too. Is disrespecting the personal mailing address of a random, innocent Chinese person less valuable than the personal mailing address of a random, innocent American? Unless you have personal mailing addresses lying around of the specific people who are brushing the system from China now? But then... while the article talks about stuff being sent _from_ China, I didn't get the idea that it necessarily had to be (exclusively) Chinese people who did it? ~~~ curtisblaine No, I was just wondering if these border loopholes were one-way or could be played from West to East, too. ------ randyrand I got one of these for the first time about ~1yr ago. ------ zeep at least, they don't use USPS to deliver bio weapons yet...
{ "pile_set_name": "HackerNews" }
Unprecedented security plan for PSL 2 final in Lahore LAHORE (AFP) – Pakistan will deploy troops and bullet-proof buses for Sunday s Pakistan Super League final, its biggest cricket match in years, after a wave of militant attacks prompted a host of foreign stars to pull out. “Unprecedented” security involving thousands of troops and police will guard the sold-out game in Lahore — scene of a deadly 2009 assault on Sri Lanka s team which halted international cricket tours in the country. Fears of a fresh incident threaten to overshadow Sunday s final between Quetta Gladiators and Peshawar Zalmi, the culmination of a Twenty20 tournament which has otherwise been played in the United Arab Emirates. Holding the final in Pakistan has drawn criticism from some quarters, after a series of militant attacks in February left 130 people dead, including a Lahore suicide blast that killed 14. “God forbid if any mishap happens we can say goodbye to int (international) cricket in Pak for the next decade,” tweeted Pakistan great Imran Khan. GWADAR NEWS the online newspaper about new city Gwadar. Read about new stories activities developement and property details about Gwadar City and Gwadar port Buy and sell your property with Gwadar Real Estate and advertise your business with us online. Translate Newspaper
{ "pile_set_name": "Pile-CC" }
– Det är ganska många. Jämför man till exempel med andra världskriget var det bara omkring 180 svenska frivilliga i SS, säger Hans Brun som forskar om kontraterrorism vid Kings College i London. Av de 125 svenskarna är 90 män och 35 kvinnor, enligt Säpo. 40 unga svenska män har hittills dött i strider, men Säpochefen Anders Thornberg säger att siffran kan vara högre. Bland dem som åkt ned finns även barn, enligt Thornberg. Många dör Förlustsiffrorna är förhållandevis höga, ungefär tio procent. Det är avsevärt högre än vad som anses acceptabelt för reguljära styrkor. – De är ofta dåligt utbildade och har begränsad sjukvård. Men det anses också positivt att dö, att bli martyr. De är en sorts bärsärkar 2.0, en högteknologisk variant som inte är rädda för att dö för sin sak, säger Hans Brun. – Männen är där för att strida, men de är också där tillsammans med sina familjer för att bilda en stat, ett kalifat, säger Anders Thornberg till TV4 Nyhetsmorgon. Kvinnornas uppgift är att hjälpa till med logistik, utbildning av barn och att vårda andra kvinnor och barn. – Men främst ska de gifta sig och föda fram nya jihadister, säger Hans Brun. Rekryteringen ökar 115 svenskar har återvänt hem, samtliga dessa är identifierade av Säpo. Rekryteringen ökar fortfarande, men färre återvänder hem. Enligt Thornberg kan det bero på att de inte tillåts lämna. – Vi tror inte att det är 115 potentiella terrorister som kommer hem. Men de som kommer hem kan få lite av en rockstjärnestatus och bli förebilder för andra ungdomar. Vår uppgift är att identifiera och sortera ut dem. Finns det en eller två som är terrorister så måste vi göra något åt dem, säger han till Nyhetsmorgon. Den föreslagna lagen mot terrorresor kan göra det svårare att få information, enligt Säpochefen, som dock välkomnar skärpningen av lagstiftningen. – En nackdel är att vi inte får använda Försvarets radioanstalt, som vi använder för att spana i utlandet. Det är delvis därför vi har så bra koll på vad de gör och när de kommer hem, säger han till TV4. Löfven: Oacceptabelt Statsminister Stefan Löfven reagerar ”med avsmak” på uppgifterna om svenskarna som krigar för IS i Irak. – Att kriga för de här grupperna, till exempel IS, är fullständigt oacceptabelt, säger Löfven till TT. För en månad sedan presenterade regeringen förslag till en ny nationell strategi mot terrorism. Där finns en rad åtgärder, bland annat kriminalisering av terrorkrigsresor och organisering, rekrytering och finansiering av resorna. – Det kan säkert uppkomma behov av ännu fler åtgärder vad det lider. Men nu inväntar vi riksdagens behandling av de här förslagen, säger inrikesminister Anders Ygeman till TT. Anders Ygeman tycker att Säpos öppenhet kring sitt arbete mot terrorresorna är mycket bra. -Det räcker inte med att Säpo bekämpar terrorkrigsresor och radikalisering, vi måste ha med oss hela samhället. Och då är det förebyggande arbetet med att strypa nyrekryteringen en viktig del, säger Ygeman.
{ "pile_set_name": "OpenWebText2" }
Daniel Aquino Daniel Toribio Aquino Antúnez (born 9 June 1965), nicknamed El Toro (bull), is an Argentine retired footballer who played as a striker. Having spent the bulk of his professional career in Spain, appearing in 203 Segunda División matches during seven seasons (94 goals) in representation of four teams, his son Daniel was already born there and played for Spain at youth levels. Football career Aquino was born in Chajarí, Entre Ríos Province. After starting his career at Club Atlético Banfield he moved to Spain in 1989, joining Real Murcia in the second division and scoring 15 goals in 33 appearances in his first season. In the 1991 winter transfer window he signed for another team in the country, Albacete Balompié, being relatively used as the Castile-La Mancha side retained their recently acquired La Liga status (18 starts). From 1992 to 1994, Aquino achieved two consecutive Pichichi Trophy awards in the second level, one of them – with Real Betis – ending in promotion. After a solid top flight campaign at Rayo Vallecano and a further one and a half at Albacete in division two, he finished his career in 2002 at the age of 37, with stints in the third tier including former club Murcia, where his son Daniel was born in 1990, eventually also becoming a professional footballer. From 2008 to 2010, Aquino coached Murcia's juniors. References External links Betisweb stats and bio Category:1965 births Category:Living people Category:People from Federación Department Category:Argentine people of Spanish descent Category:Argentine emigrants to Spain Category:Argentine footballers Category:Spanish footballers Category:Association football forwards Category:Argentine Primera División players Category:Banfield footballers Category:La Liga players Category:Segunda División players Category:Segunda División B players Category:Tercera División players Category:Real Murcia players Category:Albacete Balompié players Category:CP Mérida footballers Category:Real Betis players Category:Rayo Vallecano players Category:Lorca Deportiva CF footballers Category:Argentine expatriate footballers Category:Expatriate footballers in Spain Category:Argentine expatriate sportspeople in Spain
{ "pile_set_name": "Wikipedia (en)" }
The handicapped child and child abuse. For a group of children with handicaps, growth and development are also affected by abuse or neglect. Our understanding of the problems of the abused, handicapped child emerges from experience with 37 children with cerebral palsy who have been maltreated, coupled with a review of the literature in related areas. We identify the following four problems as crucial to the study of abuse and neglect to the child with handicaps: (1) abuse that causes handicaps, (2) abuse that occurs to the handicapped child, (3) compromises in care that can occur when the handicapped child becomes involved with the medical and legal systems, and (4) arrangements for foster care or other out-of-home placement for the child with handicaps. We conclude that the very systems designed to protect and care for the child often fail, leaving the handicapped child without opportunity to reach developmental potential. In light of our observations, we recommend that the pediatrician not only be aware of the existence of abuse and neglect in the population of handicapped children, but also serve in the dual role of coordinator of services and advocate for these children.
{ "pile_set_name": "PubMed Abstracts" }
Tiara Comb ST25 $1924Out of Stock Free US shipping by: Priority US shipping by: Express US shipping by: Our most popular comb, features a beautiful heart design with a large dangling tear drop crystal and a brilliant silver finish. If you're wearing one of our Heartstone Tiaras, then this comb is the perfect way for your bridesmaid or flowergirl to coordinate!
{ "pile_set_name": "Pile-CC" }
Colloidal Gold Nanocups with Orientation-Dependent Plasmonic Properties. Colloidal gold nanocups are synthesized through single-vertex-initiated gold deposition on PbS nanooctahedrons and subsequent selective dissolution of the PbS component. They possess strong magnetic plasmon resonance and exhibit remarkable orientation-dependent plasmonic properties when deposited on flat substrates. They can also effectively couple s-polarized light into the interfacial region between the nanocup and substrate.
{ "pile_set_name": "PubMed Abstracts" }
<?php /** * Zend Framework * * LICENSE * * This source file is subject to the new BSD license that is bundled * with this package in the file LICENSE.txt. * It is also available through the world-wide-web at this URL: * http://framework.zend.com/license/new-bsd * If you did not receive a copy of the license and are unable to * obtain it through the world-wide-web, please send an email * to license@zend.com so we can send you a copy immediately. * * @category Zend * @package Zend_Soap * @copyright Copyright (c) 2005-2015 Zend Technologies USA Inc. (http://www.zend.com) * @license http://framework.zend.com/license/new-bsd New BSD License * @version $Id$ */ /** * @see Zend_Soap_Wsdl_Strategy_Interface */ #require_once "Zend/Soap/Wsdl/Strategy/Interface.php"; /** * @see Zend_Soap_Wsdl_Strategy_Abstract */ #require_once "Zend/Soap/Wsdl/Strategy/Abstract.php"; /** @see Zend_Xml_Security */ #require_once "Zend/Xml/Security.php"; /** * Zend_Soap_Wsdl * * @category Zend * @package Zend_Soap */ class Zend_Soap_Wsdl { /** * @var object DomDocument Instance */ private $_dom; /** * @var object WSDL Root XML_Tree_Node */ private $_wsdl; /** * @var string URI where the WSDL will be available */ private $_uri; /** * @var DOMElement */ private $_schema = null; /** * Types defined on schema * * @var array */ private $_includedTypes = array(); /** * Strategy for detection of complex types */ protected $_strategy = null; /** * Constructor * * @param string $name Name of the Web Service being Described * @param string $uri URI where the WSDL will be available * @param boolean|string|Zend_Soap_Wsdl_Strategy_Interface $strategy */ public function __construct($name, $uri, $strategy = true) { if ($uri instanceof Zend_Uri_Http) { $uri = $uri->getUri(); } $this->_uri = $uri; /** * @todo change DomDocument object creation from cparsing to construxting using API * It also should authomatically escape $name and $uri values if necessary */ $wsdl = "<?xml version='1.0' ?> <definitions name='$name' targetNamespace='$uri' xmlns='http://schemas.xmlsoap.org/wsdl/' xmlns:tns='$uri' xmlns:soap='http://schemas.xmlsoap.org/wsdl/soap/' xmlns:xsd='http://www.w3.org/2001/XMLSchema' xmlns:soap-enc='http://schemas.xmlsoap.org/soap/encoding/' xmlns:wsdl='http://schemas.xmlsoap.org/wsdl/'></definitions>"; $this->_dom = new DOMDocument(); if (!$this->_dom = Zend_Xml_Security::scan($wsdl, $this->_dom)) { #require_once 'Zend/Server/Exception.php'; throw new Zend_Server_Exception('Unable to create DomDocument'); } $this->_wsdl = $this->_dom->documentElement; $this->setComplexTypeStrategy($strategy); } /** * Set a new uri for this WSDL * * @param string|Zend_Uri_Http $uri * @return Zend_Server_Wsdl */ public function setUri($uri) { if ($uri instanceof Zend_Uri_Http) { $uri = $uri->getUri(); } $oldUri = $this->_uri; $this->_uri = $uri; if($this->_dom !== null) { // @todo: This is the worst hack ever, but its needed due to design and non BC issues of WSDL generation $xml = $this->_dom->saveXML(); $xml = str_replace($oldUri, $uri, $xml); $this->_dom = new DOMDocument(); $this->_dom = Zend_Xml_Security::scan($xml, $this->_dom); } return $this; } /** * Set a strategy for complex type detection and handling * * @todo Boolean is for backwards compability with extractComplexType object var. Remove it in later versions. * @param boolean|string|Zend_Soap_Wsdl_Strategy_Interface $strategy * @return Zend_Soap_Wsdl */ public function setComplexTypeStrategy($strategy) { if($strategy === true) { #require_once "Zend/Soap/Wsdl/Strategy/DefaultComplexType.php"; $strategy = new Zend_Soap_Wsdl_Strategy_DefaultComplexType(); } else if($strategy === false) { #require_once "Zend/Soap/Wsdl/Strategy/AnyType.php"; $strategy = new Zend_Soap_Wsdl_Strategy_AnyType(); } else if(is_string($strategy)) { if(class_exists($strategy)) { $strategy = new $strategy(); } else { #require_once "Zend/Soap/Wsdl/Exception.php"; throw new Zend_Soap_Wsdl_Exception( sprintf("Strategy with name '%s does not exist.", $strategy )); } } if(!($strategy instanceof Zend_Soap_Wsdl_Strategy_Interface)) { #require_once "Zend/Soap/Wsdl/Exception.php"; throw new Zend_Soap_Wsdl_Exception("Set a strategy that is not of type 'Zend_Soap_Wsdl_Strategy_Interface'"); } $this->_strategy = $strategy; return $this; } /** * Get the current complex type strategy * * @return Zend_Soap_Wsdl_Strategy_Interface */ public function getComplexTypeStrategy() { return $this->_strategy; } /** * Add a {@link http://www.w3.org/TR/wsdl#_messages message} element to the WSDL * * @param string $name Name for the {@link http://www.w3.org/TR/wsdl#_messages message} * @param array $parts An array of {@link http://www.w3.org/TR/wsdl#_message parts} * The array is constructed like: 'name of part' => 'part xml schema data type' * or 'name of part' => array('type' => 'part xml schema type') * or 'name of part' => array('element' => 'part xml element name') * @return object The new message's XML_Tree_Node for use in {@link function addDocumentation} */ public function addMessage($name, $parts) { $message = $this->_dom->createElement('message'); $message->setAttribute('name', $name); if (sizeof($parts) > 0) { foreach ($parts as $name => $type) { $part = $this->_dom->createElement('part'); $part->setAttribute('name', $name); if (is_array($type)) { foreach ($type as $key => $value) { $part->setAttribute($key, $value); } } else { $part->setAttribute('type', $type); } $message->appendChild($part); } } $this->_wsdl->appendChild($message); return $message; } /** * Add a {@link http://www.w3.org/TR/wsdl#_porttypes portType} element to the WSDL * * @param string $name portType element's name * @return object The new portType's XML_Tree_Node for use in {@link function addPortOperation} and {@link function addDocumentation} */ public function addPortType($name) { $portType = $this->_dom->createElement('portType'); $portType->setAttribute('name', $name); $this->_wsdl->appendChild($portType); return $portType; } /** * Add an {@link http://www.w3.org/TR/wsdl#_request-response operation} element to a portType element * * @param object $portType a portType XML_Tree_Node, from {@link function addPortType} * @param string $name Operation name * @param string $input Input Message * @param string $output Output Message * @param string $fault Fault Message * @return object The new operation's XML_Tree_Node for use in {@link function addDocumentation} */ public function addPortOperation($portType, $name, $input = false, $output = false, $fault = false) { $operation = $this->_dom->createElement('operation'); $operation->setAttribute('name', $name); if (is_string($input) && (strlen(trim($input)) >= 1)) { $node = $this->_dom->createElement('input'); $node->setAttribute('message', $input); $operation->appendChild($node); } if (is_string($output) && (strlen(trim($output)) >= 1)) { $node= $this->_dom->createElement('output'); $node->setAttribute('message', $output); $operation->appendChild($node); } if (is_string($fault) && (strlen(trim($fault)) >= 1)) { $node = $this->_dom->createElement('fault'); $node->setAttribute('message', $fault); $operation->appendChild($node); } $portType->appendChild($operation); return $operation; } /** * Add a {@link http://www.w3.org/TR/wsdl#_bindings binding} element to WSDL * * @param string $name Name of the Binding * @param string $type name of the portType to bind * @return object The new binding's XML_Tree_Node for use with {@link function addBindingOperation} and {@link function addDocumentation} */ public function addBinding($name, $portType) { $binding = $this->_dom->createElement('binding'); $binding->setAttribute('name', $name); $binding->setAttribute('type', $portType); $this->_wsdl->appendChild($binding); return $binding; } /** * Add an operation to a binding element * * @param object $binding A binding XML_Tree_Node returned by {@link function addBinding} * @param array $input An array of attributes for the input element, allowed keys are: 'use', 'namespace', 'encodingStyle'. {@link http://www.w3.org/TR/wsdl#_soap:body More Information} * @param array $output An array of attributes for the output element, allowed keys are: 'use', 'namespace', 'encodingStyle'. {@link http://www.w3.org/TR/wsdl#_soap:body More Information} * @param array $fault An array of attributes for the fault element, allowed keys are: 'name', 'use', 'namespace', 'encodingStyle'. {@link http://www.w3.org/TR/wsdl#_soap:body More Information} * @return object The new Operation's XML_Tree_Node for use with {@link function addSoapOperation} and {@link function addDocumentation} */ public function addBindingOperation($binding, $name, $input = false, $output = false, $fault = false) { $operation = $this->_dom->createElement('operation'); $operation->setAttribute('name', $name); if (is_array($input)) { $node = $this->_dom->createElement('input'); $soap_node = $this->_dom->createElement('soap:body'); foreach ($input as $name => $value) { $soap_node->setAttribute($name, $value); } $node->appendChild($soap_node); $operation->appendChild($node); } if (is_array($output)) { $node = $this->_dom->createElement('output'); $soap_node = $this->_dom->createElement('soap:body'); foreach ($output as $name => $value) { $soap_node->setAttribute($name, $value); } $node->appendChild($soap_node); $operation->appendChild($node); } if (is_array($fault)) { $node = $this->_dom->createElement('fault'); /** * Note. Do we really need name attribute to be also set at wsdl:fault node??? * W3C standard doesn't mention it (http://www.w3.org/TR/wsdl#_soap:fault) * But some real world WSDLs use it, so it may be required for compatibility reasons. */ if (isset($fault['name'])) { $node->setAttribute('name', $fault['name']); } $soap_node = $this->_dom->createElement('soap:fault'); foreach ($fault as $name => $value) { $soap_node->setAttribute($name, $value); } $node->appendChild($soap_node); $operation->appendChild($node); } $binding->appendChild($operation); return $operation; } /** * Add a {@link http://www.w3.org/TR/wsdl#_soap:binding SOAP binding} element to a Binding element * * @param object $binding A binding XML_Tree_Node returned by {@link function addBinding} * @param string $style binding style, possible values are "rpc" (the default) and "document" * @param string $transport Transport method (defaults to HTTP) * @return boolean */ public function addSoapBinding($binding, $style = 'document', $transport = 'http://schemas.xmlsoap.org/soap/http') { $soap_binding = $this->_dom->createElement('soap:binding'); $soap_binding->setAttribute('style', $style); $soap_binding->setAttribute('transport', $transport); $binding->appendChild($soap_binding); return $soap_binding; } /** * Add a {@link http://www.w3.org/TR/wsdl#_soap:operation SOAP operation} to an operation element * * @param object $operation An operation XML_Tree_Node returned by {@link function addBindingOperation} * @param string $soap_action SOAP Action * @return boolean */ public function addSoapOperation($binding, $soap_action) { if ($soap_action instanceof Zend_Uri_Http) { $soap_action = $soap_action->getUri(); } $soap_operation = $this->_dom->createElement('soap:operation'); $soap_operation->setAttribute('soapAction', $soap_action); $binding->insertBefore($soap_operation, $binding->firstChild); return $soap_operation; } /** * Add a {@link http://www.w3.org/TR/wsdl#_services service} element to the WSDL * * @param string $name Service Name * @param string $port_name Name of the port for the service * @param string $binding Binding for the port * @param string $location SOAP Address for the service * @return object The new service's XML_Tree_Node for use with {@link function addDocumentation} */ public function addService($name, $port_name, $binding, $location) { if ($location instanceof Zend_Uri_Http) { $location = $location->getUri(); } $service = $this->_dom->createElement('service'); $service->setAttribute('name', $name); $port = $this->_dom->createElement('port'); $port->setAttribute('name', $port_name); $port->setAttribute('binding', $binding); $soap_address = $this->_dom->createElement('soap:address'); $soap_address->setAttribute('location', $location); $port->appendChild($soap_address); $service->appendChild($port); $this->_wsdl->appendChild($service); return $service; } /** * Add a documentation element to any element in the WSDL. * * Note that the WSDL {@link http://www.w3.org/TR/wsdl#_documentation specification} uses 'document', * but the WSDL {@link http://schemas.xmlsoap.org/wsdl/ schema} uses 'documentation' instead. * The {@link http://www.ws-i.org/Profiles/BasicProfile-1.1-2004-08-24.html#WSDL_documentation_Element WS-I Basic Profile 1.1} recommends using 'documentation'. * * @param object $input_node An XML_Tree_Node returned by another method to add the documentation to * @param string $documentation Human readable documentation for the node * @return DOMElement The documentation element */ public function addDocumentation($input_node, $documentation) { if ($input_node === $this) { $node = $this->_dom->documentElement; } else { $node = $input_node; } $doc = $this->_dom->createElement('documentation'); $doc_cdata = $this->_dom->createTextNode(str_replace(array("\r\n", "\r"), "\n", $documentation)); $doc->appendChild($doc_cdata); if($node->hasChildNodes()) { $node->insertBefore($doc, $node->firstChild); } else { $node->appendChild($doc); } return $doc; } /** * Add WSDL Types element * * @param object $types A DomDocument|DomNode|DomElement|DomDocumentFragment with all the XML Schema types defined in it */ public function addTypes($types) { if ($types instanceof DomDocument) { $dom = $this->_dom->importNode($types->documentElement); $this->_wsdl->appendChild($types->documentElement); } elseif ($types instanceof DomNode || $types instanceof DomElement || $types instanceof DomDocumentFragment ) { $dom = $this->_dom->importNode($types); $this->_wsdl->appendChild($dom); } } /** * Add a complex type name that is part of this WSDL and can be used in signatures. * * @param string $type * @return Zend_Soap_Wsdl */ public function addType($type) { if(!in_array($type, $this->_includedTypes)) { $this->_includedTypes[] = $type; } return $this; } /** * Return an array of all currently included complex types * * @return array */ public function getTypes() { return $this->_includedTypes; } /** * Return the Schema node of the WSDL * * @return DOMElement */ public function getSchema() { if($this->_schema == null) { $this->addSchemaTypeSection(); } return $this->_schema; } /** * Return the WSDL as XML * * @return string WSDL as XML */ public function toXML() { return $this->_dom->saveXML(); } /** * Return DOM Document * * @return object DomDocum ent */ public function toDomDocument() { return $this->_dom; } /** * Echo the WSDL as XML * * @return boolean */ public function dump($filename = false) { if (!$filename) { echo $this->toXML(); return true; } else { return file_put_contents($filename, $this->toXML()); } } /** * Returns an XSD Type for the given PHP type * * @param string $type PHP Type to get the XSD type for * @return string */ public function getType($type) { switch (strtolower($type)) { case 'string': case 'str': return 'xsd:string'; case 'long': return 'xsd:long'; case 'int': case 'integer': return 'xsd:int'; case 'float': return 'xsd:float'; case 'double': return 'xsd:double'; case 'boolean': case 'bool': return 'xsd:boolean'; case 'array': return 'soap-enc:Array'; case 'object': return 'xsd:struct'; case 'mixed': return 'xsd:anyType'; case 'void': return ''; default: // delegate retrieval of complex type to current strategy return $this->addComplexType($type); } } /** * This function makes sure a complex types section and schema additions are set. * * @return Zend_Soap_Wsdl */ public function addSchemaTypeSection() { if ($this->_schema === null) { $this->_schema = $this->_dom->createElement('xsd:schema'); $this->_schema->setAttribute('targetNamespace', $this->_uri); $types = $this->_dom->createElement('types'); $types->appendChild($this->_schema); $this->_wsdl->appendChild($types); } return $this; } /** * Add a {@link http://www.w3.org/TR/wsdl#_types types} data type definition * * @param string $type Name of the class to be specified * @return string XSD Type for the given PHP type */ public function addComplexType($type) { if (in_array($type, $this->getTypes())) { return "tns:$type"; } $this->addSchemaTypeSection(); $strategy = $this->getComplexTypeStrategy(); $strategy->setContext($this); // delegates the detection of a complex type to the current strategy return $strategy->addComplexType($type); } /** * Parse an xsd:element represented as an array into a DOMElement. * * @param array $element an xsd:element represented as an array * @return DOMElement parsed element */ private function _parseElement($element) { if (!is_array($element)) { #require_once "Zend/Soap/Wsdl/Exception.php"; throw new Zend_Soap_Wsdl_Exception("The 'element' parameter needs to be an associative array."); } $elementXml = $this->_dom->createElement('xsd:element'); foreach ($element as $key => $value) { if (in_array($key, array('sequence', 'all', 'choice'))) { if (is_array($value)) { $complexType = $this->_dom->createElement('xsd:complexType'); if (count($value) > 0) { $container = $this->_dom->createElement('xsd:' . $key); foreach ($value as $subelement) { $subelementXml = $this->_parseElement($subelement); $container->appendChild($subelementXml); } $complexType->appendChild($container); } $elementXml->appendChild($complexType); } } else { $elementXml->setAttribute($key, $value); } } return $elementXml; } /** * Add an xsd:element represented as an array to the schema. * * Array keys represent attribute names and values their respective value. * The 'sequence', 'all' and 'choice' keys must have an array of elements as their value, * to add them to a nested complexType. * * Example: array( 'name' => 'MyElement', * 'sequence' => array( array('name' => 'myString', 'type' => 'string'), * array('name' => 'myInteger', 'type' => 'int') ) ); * Resulting XML: <xsd:element name="MyElement"><xsd:complexType><xsd:sequence> * <xsd:element name="myString" type="string"/> * <xsd:element name="myInteger" type="int"/> * </xsd:sequence></xsd:complexType></xsd:element> * * @param array $element an xsd:element represented as an array * @return string xsd:element for the given element array */ public function addElement($element) { $schema = $this->getSchema(); $elementXml = $this->_parseElement($element); $schema->appendChild($elementXml); return 'tns:' . $element['name']; } }
{ "pile_set_name": "Github" }
ABSTRACT Quantifying aging is a major goal in Geroscience research as the availability of a reliable marker of aging can facilitate understanding of the fundamental biology of aging, enable tracking of the aging process in different tissues and cell systems, and support identification and validation of interventions that extend lifespan and healthspan. Traditionally, aging has been monitored by following chronological age, mortality, age-related changes in gene expression, and/or other molecular features, however, there is currently no consensus on the best practices for quantitatively tracking progression through aging. The recent advent of biomarkers based on advanced omics approaches, such as DNA methylation, have provided some hope to support development of precise estimates of age, both in humans and mice. Nevertheless, the majority of such measures are trained as chronological age predictors, with little to no integration of biological, functional, or phenotypic data. Further, the modifiability of aging measures based on DNA methylation in response to lifespan and healthspan extending interventions is almost entirely unknown. We propose to address these challenges by developing a series of novel DNA methylation clocks by integrating information on phenotypic and functional aging, investigating links between DNA methylation and aging hallmarks, and evaluating DNA methylation responses to longevity interventions. We suggest that these clocks will offer a much-needed resource for the Geroscience community. We will develop these clocks using three general approaches. First, we will use cultured cells (MEFs) to induce or establish models of three well-known hallmarks of aging?cellular senescence, DNA damage, and mitochondrial dysregulation. We will then train epigenetic predictors of these hallmarks and validate them in vivo. We will also establish epigenetic alterations in response to novel and established longevity interventions. In doing so, we will develop biomarkers of intervention response that can be used to test mimetics, and/or optimize aging biomarkers. Finally, building on the highly characterized SLAM colony of C57Bl/6 and UM-HET3 animals, we will produce longitudinal methylation data across the lifespan that can be used to develop an epigenetic clock that can serve as a robust predictor of healthspan. We hypothesize that these new clocks will better capture biological age than chronological age trained clocks. Given that they were developed to capture different facets associated with the aging process, they can be combined to create a single aging measure that is more biologically informed and characterized compared to existing epigenetic clocks.
{ "pile_set_name": "NIH ExPorter" }
Q: Fastest way to check whether image (img HTML element) is not protected by CORS I occurred to have a problems when I copied image from a site (context menu->copy image) and pasted it in my script (in contenteditable div). <img> appears in the div, however an attempt to drawImage it on <canvas> will cause errors if you try to get image data of the canvas: You can draw on the canvas without errors, but not retrieve the pixel data or DataURL. In cases of such images, I'd like to use CORS proxy to have full access to the data. How can detect that I have no right to access data of <img> tag or URL? What's the fastest way? I had this problem (and still have) in a image paste upload script for StackExchange. Edit: Further explanations of the problem if you're still not sure what do I mean: Why try/catch is not a solution? You can draw any image on canvas and you can even perform further draw operations: The image source. It doesn't allow CORS! Why parsing the URL doesn't help? Some remote images allow CORS and do not throw any errors. For example the avatars from Gravatar. A: I came up with the solution which actually uses try ... catch as @wwwmarty suggested. It's probably not very fast as of CPU speed and a little bit retarded, but it works: HTMLImageElement.prototype.isTainting = function() { var canvas = document.createElement("canvas"); canvas.getContext("2d").drawImage(this,0,0); try { canvas.toDataURL(); return true; } catch() {return false;}; return false; } I also created quite big fiddle where you can inspect behavior of the crossorigin attribute.
{ "pile_set_name": "StackExchange" }
The invention relates to textile conditioning compositions comprising especially textile softening and antistatic agents characterised by an unusually low content of cationic textile conditioning agent. Textile conditioning, especially softening compositions in the form of aqueous dispersions are well known, and are primarily intended to be added to the last rinse liquor in a conventional clothes-washing process. Most of such compositions currently on the market comprise a fairly low concentration, for instance about 3-10%, of a cationic textile softener or of a mixture of more than one, together with relatively minor amounts of emulsifiers, and with aesthetic additives such as colour and perfume. These compositions are used at quite low concentrations in the treatment bath, for instance about 0.25% by weight. It is also known that certain nonionic, poorly water soluble or insoluble, compounds such as sorbitan and glycerol esters are effective softeners, but they are not substantive and are not effectively applied to the fabrics in a rinse or like bath. It is known yet again that combinations of these nonionic components with a cationic surfactant can cause them to be deposited upon fabrics in a rinse or like bath. Now at present nonionic softeners are considerably cheaper than cationic and they seem likely to remain so in the foreseeable future. Therefore use of nonionic-cationic mixtures of relatively low cationic content is highly desirable since they can permit improved products to be made for the same cost. However, such mixtures, though effective in pure water, are generally not very effective in practical rinse liquors. The reason appears to be the presence in the rinse liquors of traces of anionic detergent carried through from the wash, typically 10-20 parts per million in a final rinse, and these combine with cationic conditioning agent to form complex molecules thereby reducing the performance. In wholly cationic-based softeners this loss of effective cationic active component is undesirable, but may be tolerable. In mixtures of nonionic and low levels of cationic conditioner, the loss becomes greater in proportion to the total cationic conditioner present and is serious. The use of relatively water soluble cationic surfactants has been suggested to act as scavengers for anionic detergent (see U.S. Pat. No. 3,974,076) but these need to be used at considerable levels. It has now been found that this scavenging function can be performed by very low levels of polymeric cationic salts. This has made it possible to provide effective textile conditioning, especially textile softening and antistatic, compositions based on nonionic textile softeners with a low level of cationic surfactant to render them substantive to the fabrics. Furthermore, quite low levels of some of these polymeric cationic salts have been found unexpectedly to provide softening performance themselves in the presence of cationic surfactants thereby permitting a further reduction in the other softener components of textile softening compositions. Textile softening and ironing assistants containing combinations of nonionic and cationic softeners containing relatively high levels of cationic dextrin are disclosed in German Offenlegungsschrift No. 2,724,816. Furthermore, Belgian Pat. No. 844,122 describes textile conditioning compositions containing nonionic softener and low levels of cationic surfactant and suggests the use of certain oligomeric polyamine salts as cationic carrier materials for the nonionic softener.
{ "pile_set_name": "USPTO Backgrounds" }
Contact Info Behind the Avatar is a World of Warcraft Gaming podcast about getting to know the people behind the characters they play! If you would like to be a guest on the show then please contact Leeta:- Send an email - behindtheavatar@gmail.com Twitter - @BehindtheAvatar Or @Leetawow Remember everybody has a story to tell and I would love to hear it! :) Cheers Leeta
{ "pile_set_name": "Pile-CC" }
Q: Add custom Javascript to Prestashop After asking on the Prestashop forum and receiving no reply I wanted to ask you guys and hope for an answer. I am trying to add an animated snow plugin to my shop but after looking at the header.tpl file which instructs you to not edit - how do I add my own Javascript to the head of my template? I duplicated the default-theme and I am working from that. A: If the theme is default-bootstrap, then yes, you probably shouldn't modify it, if you intend to upgrade it (can be automatically upgraded using autoupgrade module). Same can be true for 3rd party themes which are actively updated. But usually 3rd party themes don't get upgraded at all, which means you can modify theme templates. Because the templates are sort-of too complex to be extended by a child theme, it is ok to edit them directly. PretaShop doesn't have child-parent theme system. Just edit the templates directly. If you would like your changes to be portable accross themes, then you should probably make a module. Inside the module use special functions to add .js and .css files to header: mymodule.php ... public function install() { ... $this->registerHook('displayHeader'); ... } public function hookDispayHeader() { $this->context->controller->addJS($this->_path.'js/script.js'); $this->context->controller->addCSS($this->_path.'css/style.css'); } If you need a quick way to add, just edit theme's global.css and global.js You may also add the stysheet and script to autload folder: themes/theme1/css/autoload/ and themes/theme1/js/autoload/. Files inside these folder will be loaded for all pages.
{ "pile_set_name": "StackExchange" }
513 F.2d 630 Championv.Weinberger 74-2011 UNITED STATES COURT OF APPEALS Sixth Circuit 3/25/75 S.D.Ohio AFFIRMED
{ "pile_set_name": "FreeLaw" }
Photo-100 The PHOTO-100 Series of extremely accurate Ethernet data servers apply a very precise silicon sensor, precision amplifier system, scaling network, and on-board computer, producing digital photometric measurements under control of its host. It supports a wide measurement and dynamic range spanning 5 milli-cd to 5 mega-cd @ 100ft ( 30.5 meters ) in six-decades. It supports standard 100base-T Ethernet, and utilizes a wide range of accessories and attachments for a wide range of applications. The photometer module is powered with Direct Current to reduce the effects of conducted electrical noise.
{ "pile_set_name": "Pile-CC" }
The end uses of vinyl alcohol polymers have been limited despite excellent strength, adhesive and barrier properties. This limitation is partly due to the fact that unplasticized vinyl alcohol polymers show little or no thermoplasticity before the occurrence of decomposition. Resolution of this problem has been sought through the use of external plasticizers such as ethylene glycol, trimethylene glycol, propylene glycol, triethylene glycol, neopentyl glycol and 2,2,4-trimethyl-1,3-pentane diol. However, the use of external plasticizers presents several disadvantages including increased moisture sensitivity, decreased tensile strength, leaching of the plasticizer and decreased gas barrier properties. The internal plasticization of polyvinyl alcohol through the use of comonomers, grafting or post reactions is known in the art. For example, the ethyleneoxylation (hydroxyethylation) of polyvinyl alcohol produces a permanently flexible, internally plasticized type of polyvinyl alcohol (see U.S. Pat. Nos. 2,990,398; 1,971,662 and 2,844,570). The ethyleneoxy groups, which are introduced by reaction of ethylene oxide with the polyvinyl alcohol, are chemically bound to the product and therefore are not removable by physical methods such as evaporation, migration or extraction. In addition, the modified polyvinyl alcohol retains its water solubility, strength and flexibility. The preparation of modified polyvinyl alcohols through the solvolysis of a graft copolymer of vinyl acetate onto polyalkylene glycols is known. (See U.S. Pat. Nos. 3,033,841 and 4,369,281). These products are water soluble and thermoplastically workable. The internal plasticization of polyvinyl alcohol through the use of ethylene as a comonomer produces a thermoplastic but water insoluble resin. U.S. Pat. No. 2,290,600 discloses vinyl alcohol copolymers prepared from copolymers of vinyl esters with acrylic or methacrylic esters by converting the vinyl ester part of the copolymer into vinyl alcohol units under conditions whereby the acrylic methacrylic part is not converted into acrylic or methacrylic acid units, respectively. Among the numerous acrylic and methacrylic esters suggested for use in the invention is beta-ethoxyethyl ester. U.S. Pat. No. 2,654,717 discloses the polymerization of mono-unsaturated vinylic monomers containing at least one oxygen atom linked to carbon atoms (an ether linkage) including, for example, monomeric compounds corresponding to the general formula. EQU CH.sub.2 .dbd.C(R)CO.sub.2 (CH.sub.2 CH.sub.2 O).sub.n R.sup.1 where R is hydrogen or methyl, R.sup.1 aryl, aralkyl or alkyl group and n is one or two. U.S. Pat. No. 3,203,918 discloses copolymers of vinyl alcohol and the beta-hydroxyalkyl acrylate esters wherein the alkyl group of the beta-hydroxyalkyl acrylate esters may contain from two to four carbon atoms. The copolymers are prepared by the polymerization and subsequent alcoholysis of copolymers of vinyl acetate and the beta-hydroxyalkyl acrylate esters. Films and coatings of such copolymers are characterized by their ability to remain soft and flexible in the absence of plasticizers. U.S. Pat. No. 4,075,411 discloses vinyl-polymerizable monomers having surfactant properties comprising the esters of acrylic, methacrylic and crotonic acids with C.sub.8 -C.sub.20 alkyl phenoxy(ethyleneoxy).sub.10-60 ethyl alcohols. There is disclosed a method of making emulsion copolymers which comprises reacting one or more main vinyl-polymerizable monomers with from about 1-10 wt% of at least one of the surfactant esters. For example, an emulsion copolymer comprised polyvinyl acetate having copolymerized herein about 4% by weight of the acrylate ester of a nonylphenoxy poly(ethyleneoxy)ethyl alcohol. U.S. Pat. No. 4,463,151 discloses water soluble copolymers of acrylamide and alkyl or alkylaryl poly(ethyleneoxy) acrylate.
{ "pile_set_name": "USPTO Backgrounds" }
Connect with us Related Topics - In the past Earthquake in 2015 Agriculture plays an important role in Nepal’s economy, but the country’s small-scale producers face many challenges. Access to quality inputs, decent roads, irrigation and markets is ...READ MORE - Farmers in the Democratic People’s Republic of Korea (DPRK) face numerous challenges, not least of which are soil erosion, scarce inputs and extreme weather like drought, flooding and cold spells. ...READ MORE
{ "pile_set_name": "Pile-CC" }
Reddit banned “alt-right” subreddit, /r/altright, on Wednesday, quickly sparking speculation online as to why the popular channel was shut down. Users who attempt to enter the page receive an error message, which explains the subreddit was banned due to a violation of “content policy, specifically the proliferation of personal and confidential information.” A similar subreddit, titled /r/alternativeright, was also banned, though the page didn’t list a specific reason for the removal. Reddit simply states that the channel violated “the Reddit rules.” “Alt-right” refers to an extreme right-wing movement whose members often espouse white nationalism. Its supporters have been a vocal presence in a number of controversial and conspiracy-fueled Reddit discussion threads. Get Breaking News Delivered to Your Inbox The company explained to CBS News in a statement via email that /r/altright was banned for “repeated” violations of terms of the site’s content policy. “Reddit is the proud home to some of the most authentic conversations online,” a spokesman said, explaining that Reddit is clear in its terms of service that users and communities can get banned for violations. “We strive to be a welcoming, open platform for all by trusting our users to maintain an environment that cultivates genuine conversation and adheres to our content policy.” According to CNET, some /r/altright users had been engaged in recent efforts to “dox” or expose private information about the person who reportedly punched white nationalist leader Richard Spencer in the face during an interview in Washington, D.C. on Inauguration Day. However, Reddit did not confirm that doxxing was the reason for the ban. The ban was enacted the day Reddit co-founder Alexis Ohanian shared an open letter to the Reddit community, speaking out against President Donald Trump’s executive order halting refugees and nationals from seven predominantly Muslim countries from entering the United States. Reddit says it will continue to monitor subreddits for possible site violations. “There is no single solution to these issues and we are actively engaging with the Reddit community to improve everyone’s experience,” a spokesman said.
{ "pile_set_name": "OpenWebText2" }
Walnut Lake Walnut Lake may refer to: Cities, towns, townships etc. Walnut Lake Township in Faribault County, Minnesota Lakes Walnut Lake in Desha County, Arkansas Walnut Lake in Lee County, Arkansas Walnut Lake, a lake in Faribault County, Minnesota Walnut Lake, a lake in West Bloomfield, Michigan Roads Metropolitan Parkway (Detroit area), a major thoroughfare in the Metro Detroit area
{ "pile_set_name": "Wikipedia (en)" }
Incoming: Guild Missions By GM Amelia Hi-ya, Elpeeps! Are you willing to take one for the team?! For tomorrow’s patch, we’re introducing Guild Missions, an additional system in Elsword Online that gives players a chance to earn guild honor points for their respective guilds, as well as exclusive rewards—El Energy Fuel, Weird El Tree Seed, and Profession EXP 20% Medal—through the weekly missions. Not a guild member yet? There’s now an epic quest for that. Watch out for it once you reach Lv. 20! What’s more, we’re making it extra exciting with a special Guild PVP event! For the next two weeks, the 3 vs. 3 Guild PVP option will be open for one hour at a time—once on weekdays, and twice a day on weekends. Up for grabs are the very elusive one-day Powerful Guild gold, silver, and bronze titles for the top 3 ranked guilds of the hour! At the same time, you can also participate in the special events called Absolute Class, where you can earn Class Points and trade them in for rewards such as Luriel’s Magic Amulets, Ice Burners, Fossil Readers, and more. Play daily for your Premium Class Attendance Stamps, which you can also trade in for rewards through Glave. Guild PVP ranks 1 to 100 get class points, too! Hop right to it once the patch kicks in tomorrow! Item Mall Goodies Have you been waiting for the perfect accessories to go with your wedding costume? Well, they’re arriving with this patch! Check out the wedding accessories that appear to be from Charming Cupid himself. Finally, be the cat’s meow with the newest customization item. Get your Cat’s Eyes tomorrow! See y’all in-game!
{ "pile_set_name": "OpenWebText2" }
Q: discordjs/nodejs , How can i check if a message only contains custom emotes? I'm building my own discordbot in NodeJS by using discordjs. With the code below you can recognize if the message contains only a emote client.on("message", function(message){ var bool = message.content.match(/^(:[^:\s]+:|<:[^:\s]+:[0-9]+>|<a:[^:\s]+:[0-9]+>)$/); an emote shows like this when you do an console.log (the emote Kappa as an example) : <:Kappa:731053321502326797> Now it only matches when 1 emote is in the message But it doesnt match if a message contains 2 emotes with a space between it. How can i make this possible? A: Use ^(:[^:\s]+:|<:[^:\s]+:[0-9]+>|<a:[^:\s]+:[0-9]+>)+$ See proof. Explanation: NODE EXPLANATION -------------------------------------------------------------------------------- ^ the beginning of the string -------------------------------------------------------------------------------- ( group and capture to \1 (1 or more times (matching the most amount possible)): -------------------------------------------------------------------------------- : ':' -------------------------------------------------------------------------------- [^:\s]+ any character except: ':', whitespace (\n, \r, \t, \f, and " ") (1 or more times (matching the most amount possible)) -------------------------------------------------------------------------------- : ':' -------------------------------------------------------------------------------- | OR -------------------------------------------------------------------------------- <: '<:' -------------------------------------------------------------------------------- [^:\s]+ any character except: ':', whitespace (\n, \r, \t, \f, and " ") (1 or more times (matching the most amount possible)) -------------------------------------------------------------------------------- : ':' -------------------------------------------------------------------------------- [0-9]+ any character of: '0' to '9' (1 or more times (matching the most amount possible)) -------------------------------------------------------------------------------- > '>' -------------------------------------------------------------------------------- | OR -------------------------------------------------------------------------------- <a: '<a:' -------------------------------------------------------------------------------- [^:\s]+ any character except: ':', whitespace (\n, \r, \t, \f, and " ") (1 or more times (matching the most amount possible)) -------------------------------------------------------------------------------- : ':' -------------------------------------------------------------------------------- [0-9]+ any character of: '0' to '9' (1 or more times (matching the most amount possible)) -------------------------------------------------------------------------------- > '>' -------------------------------------------------------------------------------- )+ end of \1 (NOTE: because you are using a quantifier on this capture, only the LAST repetition of the captured pattern will be stored in \1) -------------------------------------------------------------------------------- $ before an optional \n, and the end of the string
{ "pile_set_name": "StackExchange" }
The physiological basis of psychological disgust and moral judgments. To address ongoing debates about whether feelings of disgust are causally related to moral judgments, we pharmacologically inhibited spontaneous disgust responses to moral infractions and examined effects on moral thinking. Findings demonstrated, first, that the antiemetic ginger (Zingiber officinale), known to inhibit nausea, reduces feelings of disgust toward nonmoral purity-offending stimuli (e.g., bodily fluids), providing the first experimental evidence that disgust is causally rooted in physiological nausea (Study 1). Second, this same physiological experience was causally related to moral thinking: ginger reduced the severity of judgments toward purity-based moral violations (Studies 2 and 4) or eliminated the tendency for people higher in bodily sensation awareness to make harsher moral judgments than those low in this dispositional tendency (Study 3). In all studies, effects were restricted to moderately severe purity-offending stimuli, consistent with preregistered predictions. Together, findings provide the first evidence that psychological disgust can be disrupted by an antiemetic and that doing so has consequences for moral judgments. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
{ "pile_set_name": "PubMed Abstracts" }
Abstract A sensorless method and apparatus for providing commutation timing signals for a brushless permanent magnet motor extracts the third harmonic back-emf of a three-phase stator winding and independently cyclically integrates the positive and negative half-cycles thereof and compares the results to a reference level associated with a desired commutation angle. 23 figs. A sensorless method and apparatus for providing commutation timing signals for a brushless permanent magnet motor extracts the third harmonic back-emf of a three-phase stator winding and independently cyclically integrates the positive and negative half-cycles thereof and compares the results to a reference level associated with a desired commutation angle. A method and apparatus in which a rotor (11) and a stator (17) define a radial air gap (20) for receiving AC flux and at least one, and preferably two, DC excitation assemblies (23, 24) are positioned at opposite ends of the rotor (20) to define secondary air gaps (21, 22). Portions of PM material (14a, 14b) are provided as boundaries separating the rotor pole portions (12a, 12b) of opposite polarity from other portions of the rotor (11) and from each other to define PM poles (12a, 12b) for conveying the DC flux to or from the primary air gapmore » (20) and for inhibiting flux from leaking from the pole portions prior to reaching the primary air gap (20). The portions of PM material (14a, 14b) are spaced from each other so as to include reluctance poles (15) of ferromagnetic material between the PM poles (12a, 12b) to interact with the AC flux in the primary-air gap (20).« less A sensorless field oriented control scheme for surface mount permanent magnet ac (PMAC) motor with split phase stator windings is presented. This motor is obtained by splitting the phase windings of a conventional three phase motor. The six-phase motor, however is run as a three-phase motor by connecting the split phase stator windings in series, while the taps are made available for voltage measurements. By measuring the terminal voltages and the line currents, absolute position of the permanent magnet ac motor driven by a current regulated PWM inverter with a hysteresis controller is estimated. The estimated position information is independentmore » of the stator resistance, thus this scheme is even applicable at low speeds. Results are presented to show the effectiveness of the new controller, and it is also shown that the position error is negligible.« less A digital sensorless velocity tracking controller for the permanent-magnet synchronous motor is presented. The control is sensorless in that it requires no mechanical sensors whatsoever, but instead uses a nonlinear observer to estimate rotor position and velocity from stator current measurements. Experimental results provide evidence of the viability and performance of the new control. In this second in a set of three companion papers on the modeling of permanent magnet brushless dc motors, a model is presented here for computer-aided prediction of performance of such motors, including effects of rotor damping due to metallic retainment sleeves. Here, the computer generated parameters given in the first of these companion papers were used in a model formulated entirely in the natural abc frame of reference. Thus, one avoids the complication of transformation from one frame of reference to another, and hence this approach enables one to incorporate all significant harmonic effects due to any saliency andmore » slotting. The development of the model in the natural abc frame of reference also facilitates the integration of the machine and the electronic power conditioner into one all encompassing equivalent network model for the entire brushless dc motor system. The validity of the model was verified by applying it to the prediction of the performance of a 15 hp, 120 V, 6-pole, samarium-cobalt permanent magnet brushless dc motor, and comparing the digital simulation results with the corresponding test data for this motor system. Very good agreements between the simulation and test results were achieved, including predicted power outputs and waveforms of currents and voltages throughout the machine-power conditioner system.« less
{ "pile_set_name": "Pile-CC" }
Greenville Commercial Historic District Greenville Commercial Historic District may refer to: Greenville Commercial Historic District (Greenville, Kentucky), listed on the NRHP in Muhlenberg County, Kentucky Greenville Commercial Historic District (Greenville, Mississippi), listed on the NRHP in Mississippi Greenville Commercial Historic District (Greenville, North Carolina), listed on the NRHP in Pitt County, North Carolina Greenville South Broadway Commercial District, Greenville, Ohio, listed on the NRHP in Darke County, Ohio Greenville Commercial Historic District (Greenville, Pennsylvania), listed on the NRHP in Mercer County, Pennsylvania
{ "pile_set_name": "Wikipedia (en)" }
One and a half billion people live in conflict-affected and fragile states. At the last estimate in 2012, 172 million people were directly affected by war, including refugees, internally displaced people and those who were affected but did not flee.[@R1]^,^[@R2] Children are twice as likely to be malnourished and twice as likely to die by the age of five years in low-income countries affected by conflict compared with similar but stable countries. Their families are twice as likely to live without clean water.[@R3] Conflict does more than short-term damage; it decimates a country's infrastructure and impairs the social contract between the state and citizens. Food supplies are disrupted; health services collapse. Pregnant women and people who are ill do not receive the life-saving services they need.[@R4] Less often measured are the long-term consequences of conflict on people's mental health and social functioning. People made vulnerable by conflict are being bypassed by global progress. The World Bank warned in 2011 that no low-income, conflict-affected country was on course to achieve any of the millennium development goals (MDGs).[@R3] Indeed, four years later, of 55 conflict-affected and fragile states, 37 (67%) had met only two or fewer of the 15 MDG targets.[@R5] The inequity is not simply about the differences between stable and unstable countries. Even within countries, conflict-affected areas fare worse than areas with less or no conflict. In the Democratic Republic of Congo, for example, under-five mortality in the conflict-affected South Kivu province is nearly double that of Kinshasa province.[@R6] Despite this experience, the sustainable development goals (SDGs) for the year 2030 include barely more guidance on conflict than did the MDGs, which did not specifically mention conflict. SDG 16 explicitly recognizes the need to resolve conflict and mitigate its circumstances, but this intention does not translate into specific action points for other SDGs, such as SDG 3, which focuses on health. Unless we learn how to achieve the targets in conflict settings, the benefits of the SDGs will not reach many of the people who need them most. The first question is whether the list of 17 SDGs and 169 targets should be adapted by each country. There is experience of simpler, more modest goals being associated with greater success. In Afghanistan, the government and its partners worked together to adapt the MDGs to meet their needs, setting more realistic interim targets and agreeing on objectives and approaches adapted to the country's unique realities.[@R7] Methods of measurement need to be realistic too. Widely used mechanisms to monitor progress in health at a national scale, such as the demographic and health surveys and the multiple indicator cluster surveys, sometimes leave out whole conflict-affected areas and routinely exclude internally displaced persons and refugees.[@R8] There are alternatives, such as data collected by nongovernmental organizations that work in conflict zones. These data, which are collected to identify needs and monitor the progress of humanitarian interventions, are arguably underused for monitoring development goals.[@R8] Population data are also scarce among displaced and disrupted communities, although humanitarian organizations commonly conduct and update small-scale censuses of difficult-to-access areas. Using these sources, while not a solution to the problem, could be a first step towards better monitoring. We also need to be more realistic about the level of investment needed to effect even modest changes. Conflict-affected countries often have greater needs both in terms of capital costs to rebuild destroyed infrastructure and of recurring costs to operate in environments with transport and security challenges. Yet conflict-affected countries have received less investment than others. In 2012, for example, the Central African Republic received one-fifth the per-capita direct assistance for health that Malawi did.[@R9] With less than 200 km of paved roads in South Sudan, a country larger than France, air transport is often the only option. Overall, levels of international humanitarian funding routinely face a large shortfall: in 2014, 7.2 out of 18 billion United States dollars of the United Nations (UN) coordinated appeal for humanitarian action worldwide went unfunded.[@R9] Realistic goals, better measurement of progress and increased investment would help, but these will not be enough to make a difference without a fourth adaptation: the most difficult one. We need to change what we do and how we do it. Investment in scalable, cost-effective interventions, such as family planning, insecticide-impregnated bed nets and integrated community case management, have helped stable countries to make dramatic reductions in maternal and child mortality. Countries in crisis could and should benefit from similar public health interventions, but have often instead been served by short-term actions, such as provision of field hospitals and mobile clinics, which have higher costs, smaller scale and less potential for sustained impact. People already burdened by conflict receive aid that reaches fewer people, is more expensive and has a shorter impact than aid in non-conflict settings. This does not mean implementing the same large-scale, long-term health programmes in fragile states as in stable low-income countries. Interventions should be effective and cost-effective and have wide coverage but they need to be adapted to the context of conflict. For example, integrated community case management for childhood diseases, traditionally considered a development intervention, has been adapted and scaled up in conflict-affected areas to increase access to care. In South Sudan, for example, the International Rescue Committee (IRC) supports over 2600 community health workers, many of them in the most intense areas of conflict such as Unity state. These community workers have continued to work even when conflict has shut down formal health structures. Tools were developed for illiterate community health workers, in a setting in which literacy rates are very low. Supply-chain adaptations, such as the use of boats and a network of transit villages to move materials, were developed to address problems of flooding and the lack of infrastructure. Similarly, although family planning has nominally been included in the United Nations Population Fund (UNFPA) minimum initial service package for reproductive health, its family planning component has seldom been implemented in acute or chronic emergencies. In the last 10 years, a coalition of organizations with experience in reproductive health in conflict settings has demonstrated that modern and long-acting contraceptive methods can be provided at low cost and with high quality, and that there is demand for these, even in the most precarious and transient conditions.[@R10]^,^[@R11] As a result, the full range of contraception methods are being provided by Save the Children, CARE, IRC and other agencies as a standard in places like the eastern Democratic Republic of Congo and northern Uganda, even in the midst of security upheavals. In other areas, such as Zaatari camp in Jordan, the United Nations High Commissioner for Refugees and its partner agencies are meeting the demand for modern contraception which existed before the Syrian refugee crisis and which continues.[@R12] These approaches not only deliver proven, cost-effective interventions at much larger scale than most classic emergency interventions, but also help to mitigate the risks to humanitarian workers and health workers. Hospital workers in the Syrian Arab Republic and vaccine workers in Pakistan appear to have been deliberately targeted during recent conflicts. Attacks of this type are not new, but they are being increasingly documented. Community health workers are less visible than facility workers, and can provide vital services with less danger to themselves in settings where formal health workers are deliberately targeted. They consequently have more options for continuing services in conflict. Such new approaches to aid in conflicts will not happen without a new understanding of coordination that lasts beyond the acute phase of conflict, and that includes both acute and long-term actors. The cluster system, a UN-led, country-specific coordination system for acute emergencies, has helped to bring better geographical distribution of aid and better communication between agencies. What is needed, however, is coordination not just among acute responders but also among health actors with complementary mandates and spheres of action. Agencies with expertise in specific interventions, such as UNFPA or Planned Parenthood affiliates in family planning, need to support acute responders, such as Médecins Sans Frontières. Agencies just arriving into a conflict area need to collaborate with agencies within a country who can contribute greater knowledge of the local context and assets such as networks of community health workers. Establishing more effective public health responses will also require better coordination with governments ‒ a challenging task in many conflict settings, but an important one. Last but not least, an approach combining large-scale public health interventions with responses in conflict settings will require coordination across different kinds of donors and sometimes different teams within the same agency who may not be used to coordinating among themselves. As the world embarks on another 15-year enterprise in global aid planning, implementation and tracking, we owe it to populations affected by conflict -- who are some of the most vulnerable people on earth -- to apply public health principles to deliver better aid. Changing the politics that drive conflict is beyond the sphere of the global health community. However, it is well within our power to maintain our high standards of effectiveness and common sense regarding cost‒effectiveness, and to coordinate better between global health actors. With a smarter, more adapted, more ambitious approach to assistance in conflict settings, we have an opportunity to make the SDGs more effective and more equitable than previous development goals. None declared.
{ "pile_set_name": "PubMed Central" }
Almost Human alum Anthony Konechny is set for a recurring role on the upcoming fourth season of the CW’s Supergirl. Konechny will play Agent Jensen, a DEO agent recruited by Alex (Chyler Leigh) who struggles to find his footing at the DEO. His character will be introduced in the season premiere on Sunday, October 14. In Season 3, Kara (Melissa Benoist) grappled with the sacrifices she’d made and whether she should give up her human identity altogether while still battling the threats to National City, including new villains Morgan Edge (Adrian Pasdar), and the “Worldkiller,” known as Reign (Odette Annable). Based on the DC Comics characters, Supergirl is executive produced by Greg Berlanti (Arrow, The Flash), Jessica Queller (Gilmore Girls, Felicity), Robert Rovner (Crossing Jordan, American Dreams), and Sarah Schechter (Blindspot, The Mysteries of Laura). Konechny recently wrapped films 2 Hearts and Noelle. His TV credits include Almost Human and Witches of East End. He’s repped by Robert Stein Management, Play Management, and Global Artists.
{ "pile_set_name": "OpenWebText2" }
Photo navigation San Francisco Giants' Gregor Blanco (7) bunts against the Milwaukee Brewers in the third inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. He was thrown out at first base. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Buster Posey (28) reacts to striking out against the Milwaukee Brewers in the second inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Buster Posey (28) heads back to the dugout after striking out against the Milwaukee Brewers in the second inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Marco Scutaro (19) tosses his bat after striking out against the Milwaukee Brewers in the third inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) Milwaukee Brewers' starting pitcher Wily Peralta (60) throws against the San Francisco Giants in the first inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) Milwaukee Brewers' Rickie Weeks (23) throws to first to complete a double play against San Francisco Giants' Brandon Crawford (35) in the first inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' starting pitcher Matt Cain (18) throws against the Milwaukee Brewers in the first inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Roger Kieschnick (22) can only watch as fans catch a home run ball hit by Milwaukee Brewers' Carlos Gomez (27) in the second inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' starting pitcher Matt Cain (18) reacts to a solo home run against Milwaukee Brewers' Carlos Gomez (27) in the second inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) Milwaukee Brewers' Carlos Gomez (27) and Milwaukee Brewers' Martin Maldonado (12) celebrate Gomez's solo home run against the San Francisco Giants in the second inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Brandon Belt (9) makes a catch for an out in front of San Francisco Giants' Marco Scutaro (19) against the Milwaukee Brewers in the second inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' starting pitcher Matt Cain (18) sits in the dugout after pitching in the top of the fifth inning against the Milwaukee Brewers at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Marco Scutaro (19) grounds out against the Milwaukee Brewers in the fifth inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Buster Posey (28) is hit by a pitch against the Milwaukee Brewers in the sixth inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Buster Posey (28) makes a catch in foul territory for an out on a pop-up by Milwaukee Brewers' Caleb Gindl (15) in the seventh inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Buster Posey (28) makes a catch in foul territory for an out on a pop-up by Milwaukee Brewers' Caleb Gindl (15) in the seventh inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' starting pitcher Matt Cain (18) heads to the dugout against the Milwaukee Brewers after the top of the sixth inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Brandon Crawford (35) hits a double against the Milwaukee Brewers in the eighth inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Sandy Rosario (43) throws against the Milwaukee Brewers in the ninth inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Brandon Belt (9) high-fives San Francisco Giants' Brandon Crawford (35) after Belt scored the Giants only run of the game against the Milwaukee Brewers in the seventh inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Jean Machi (63) throws against the Milwaukee Brewers in the seventh inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Brandon Crawford (35) takes off for third base against the Milwaukee Brewers in the eighth inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. He would make it safely to third. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants' Roger Kieschnick (22) flies out to deep center against the Milwaukee Brewers in the ninth inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) San Francisco Giants fans yell at Milwaukee Brewers' Carlos Gomez (27) after he struck out against the San Francisco Giants in the ninth inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. (Nhat V. Meyer/Bay Area News Group) Milwaukee Brewers' Martin Maldonado (12) reacts to the final out by San Francisco Giants' Joaquin Arias (13) to end the ninth inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. The Milwaukee Brewers won 3-1. (Nhat V. Meyer/Bay Area News Group) Milwaukee Brewers' Martin Maldonado (12) celebrates the final out by San Francisco Giants' Joaquin Arias (13) to end the ninth inning at AT&T Park in San Francisco, Calif. on Tuesday, Aug. 6, 2013. The Milwaukee Brewers won 3-1. (Nhat V. Meyer/Bay Area News Group)
{ "pile_set_name": "Pile-CC" }
/* * Copyright 2010 Advanced Micro Devices, Inc. * * Permission is hereby granted, free of charge, to any person obtaining a * copy of this software and associated documentation files (the "Software"), * to deal in the Software without restriction, including without limitation * the rights to use, copy, modify, merge, publish, distribute, sublicense, * and/or sell copies of the Software, and to permit persons to whom the * Software is furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR * OTHER DEALINGS IN THE SOFTWARE. * * Authors: Alex Deucher */ #ifndef __EVERGREEN_REG_H__ #define __EVERGREEN_REG_H__ /* trinity */ #define TN_SMC_IND_INDEX_0 0x200 #define TN_SMC_IND_DATA_0 0x204 /* evergreen */ #define EVERGREEN_PIF_PHY0_INDEX 0x8 #define EVERGREEN_PIF_PHY0_DATA 0xc #define EVERGREEN_PIF_PHY1_INDEX 0x10 #define EVERGREEN_PIF_PHY1_DATA 0x14 #define EVERGREEN_MM_INDEX_HI 0x18 #define EVERGREEN_VGA_MEMORY_BASE_ADDRESS 0x310 #define EVERGREEN_VGA_MEMORY_BASE_ADDRESS_HIGH 0x324 #define EVERGREEN_D3VGA_CONTROL 0x3e0 #define EVERGREEN_D4VGA_CONTROL 0x3e4 #define EVERGREEN_D5VGA_CONTROL 0x3e8 #define EVERGREEN_D6VGA_CONTROL 0x3ec #define EVERGREEN_P1PLL_SS_CNTL 0x414 #define EVERGREEN_P2PLL_SS_CNTL 0x454 # define EVERGREEN_PxPLL_SS_EN (1 << 12) #define EVERGREEN_AUDIO_PLL1_MUL 0x5b0 #define EVERGREEN_AUDIO_PLL1_DIV 0x5b4 #define EVERGREEN_AUDIO_PLL1_UNK 0x5bc #define EVERGREEN_CG_IND_ADDR 0x8f8 #define EVERGREEN_CG_IND_DATA 0x8fc #define EVERGREEN_AUDIO_ENABLE 0x5e78 #define EVERGREEN_AUDIO_VENDOR_ID 0x5ec0 /* GRPH blocks at 0x6800, 0x7400, 0x10000, 0x10c00, 0x11800, 0x12400 */ #define EVERGREEN_GRPH_ENABLE 0x6800 #define EVERGREEN_GRPH_CONTROL 0x6804 # define EVERGREEN_GRPH_DEPTH(x) (((x) & 0x3) << 0) # define EVERGREEN_GRPH_DEPTH_8BPP 0 # define EVERGREEN_GRPH_DEPTH_16BPP 1 # define EVERGREEN_GRPH_DEPTH_32BPP 2 # define EVERGREEN_GRPH_NUM_BANKS(x) (((x) & 0x3) << 2) # define EVERGREEN_ADDR_SURF_2_BANK 0 # define EVERGREEN_ADDR_SURF_4_BANK 1 # define EVERGREEN_ADDR_SURF_8_BANK 2 # define EVERGREEN_ADDR_SURF_16_BANK 3 # define EVERGREEN_GRPH_Z(x) (((x) & 0x3) << 4) # define EVERGREEN_GRPH_BANK_WIDTH(x) (((x) & 0x3) << 6) # define EVERGREEN_ADDR_SURF_BANK_WIDTH_1 0 # define EVERGREEN_ADDR_SURF_BANK_WIDTH_2 1 # define EVERGREEN_ADDR_SURF_BANK_WIDTH_4 2 # define EVERGREEN_ADDR_SURF_BANK_WIDTH_8 3 # define EVERGREEN_GRPH_FORMAT(x) (((x) & 0x7) << 8) /* 8 BPP */ # define EVERGREEN_GRPH_FORMAT_INDEXED 0 /* 16 BPP */ # define EVERGREEN_GRPH_FORMAT_ARGB1555 0 # define EVERGREEN_GRPH_FORMAT_ARGB565 1 # define EVERGREEN_GRPH_FORMAT_ARGB4444 2 # define EVERGREEN_GRPH_FORMAT_AI88 3 # define EVERGREEN_GRPH_FORMAT_MONO16 4 # define EVERGREEN_GRPH_FORMAT_BGRA5551 5 /* 32 BPP */ # define EVERGREEN_GRPH_FORMAT_ARGB8888 0 # define EVERGREEN_GRPH_FORMAT_ARGB2101010 1 # define EVERGREEN_GRPH_FORMAT_32BPP_DIG 2 # define EVERGREEN_GRPH_FORMAT_8B_ARGB2101010 3 # define EVERGREEN_GRPH_FORMAT_BGRA1010102 4 # define EVERGREEN_GRPH_FORMAT_8B_BGRA1010102 5 # define EVERGREEN_GRPH_FORMAT_RGB111110 6 # define EVERGREEN_GRPH_FORMAT_BGR101111 7 # define EVERGREEN_GRPH_BANK_HEIGHT(x) (((x) & 0x3) << 11) # define EVERGREEN_ADDR_SURF_BANK_HEIGHT_1 0 # define EVERGREEN_ADDR_SURF_BANK_HEIGHT_2 1 # define EVERGREEN_ADDR_SURF_BANK_HEIGHT_4 2 # define EVERGREEN_ADDR_SURF_BANK_HEIGHT_8 3 # define EVERGREEN_GRPH_TILE_SPLIT(x) (((x) & 0x7) << 13) # define EVERGREEN_ADDR_SURF_TILE_SPLIT_64B 0 # define EVERGREEN_ADDR_SURF_TILE_SPLIT_128B 1 # define EVERGREEN_ADDR_SURF_TILE_SPLIT_256B 2 # define EVERGREEN_ADDR_SURF_TILE_SPLIT_512B 3 # define EVERGREEN_ADDR_SURF_TILE_SPLIT_1KB 4 # define EVERGREEN_ADDR_SURF_TILE_SPLIT_2KB 5 # define EVERGREEN_ADDR_SURF_TILE_SPLIT_4KB 6 # define EVERGREEN_GRPH_MACRO_TILE_ASPECT(x) (((x) & 0x3) << 18) # define EVERGREEN_ADDR_SURF_MACRO_TILE_ASPECT_1 0 # define EVERGREEN_ADDR_SURF_MACRO_TILE_ASPECT_2 1 # define EVERGREEN_ADDR_SURF_MACRO_TILE_ASPECT_4 2 # define EVERGREEN_ADDR_SURF_MACRO_TILE_ASPECT_8 3 # define EVERGREEN_GRPH_ARRAY_MODE(x) (((x) & 0x7) << 20) # define EVERGREEN_GRPH_ARRAY_LINEAR_GENERAL 0 # define EVERGREEN_GRPH_ARRAY_LINEAR_ALIGNED 1 # define EVERGREEN_GRPH_ARRAY_1D_TILED_THIN1 2 # define EVERGREEN_GRPH_ARRAY_2D_TILED_THIN1 4 #define EVERGREEN_GRPH_LUT_10BIT_BYPASS_CONTROL 0x6808 # define EVERGREEN_LUT_10BIT_BYPASS_EN (1 << 8) #define EVERGREEN_GRPH_SWAP_CONTROL 0x680c # define EVERGREEN_GRPH_ENDIAN_SWAP(x) (((x) & 0x3) << 0) # define EVERGREEN_GRPH_ENDIAN_NONE 0 # define EVERGREEN_GRPH_ENDIAN_8IN16 1 # define EVERGREEN_GRPH_ENDIAN_8IN32 2 # define EVERGREEN_GRPH_ENDIAN_8IN64 3 # define EVERGREEN_GRPH_RED_CROSSBAR(x) (((x) & 0x3) << 4) # define EVERGREEN_GRPH_RED_SEL_R 0 # define EVERGREEN_GRPH_RED_SEL_G 1 # define EVERGREEN_GRPH_RED_SEL_B 2 # define EVERGREEN_GRPH_RED_SEL_A 3 # define EVERGREEN_GRPH_GREEN_CROSSBAR(x) (((x) & 0x3) << 6) # define EVERGREEN_GRPH_GREEN_SEL_G 0 # define EVERGREEN_GRPH_GREEN_SEL_B 1 # define EVERGREEN_GRPH_GREEN_SEL_A 2 # define EVERGREEN_GRPH_GREEN_SEL_R 3 # define EVERGREEN_GRPH_BLUE_CROSSBAR(x) (((x) & 0x3) << 8) # define EVERGREEN_GRPH_BLUE_SEL_B 0 # define EVERGREEN_GRPH_BLUE_SEL_A 1 # define EVERGREEN_GRPH_BLUE_SEL_R 2 # define EVERGREEN_GRPH_BLUE_SEL_G 3 # define EVERGREEN_GRPH_ALPHA_CROSSBAR(x) (((x) & 0x3) << 10) # define EVERGREEN_GRPH_ALPHA_SEL_A 0 # define EVERGREEN_GRPH_ALPHA_SEL_R 1 # define EVERGREEN_GRPH_ALPHA_SEL_G 2 # define EVERGREEN_GRPH_ALPHA_SEL_B 3 #define EVERGREEN_GRPH_PRIMARY_SURFACE_ADDRESS 0x6810 #define EVERGREEN_GRPH_SECONDARY_SURFACE_ADDRESS 0x6814 # define EVERGREEN_GRPH_DFQ_ENABLE (1 << 0) # define EVERGREEN_GRPH_SURFACE_ADDRESS_MASK 0xffffff00 #define EVERGREEN_GRPH_PITCH 0x6818 #define EVERGREEN_GRPH_PRIMARY_SURFACE_ADDRESS_HIGH 0x681c #define EVERGREEN_GRPH_SECONDARY_SURFACE_ADDRESS_HIGH 0x6820 #define EVERGREEN_GRPH_SURFACE_OFFSET_X 0x6824 #define EVERGREEN_GRPH_SURFACE_OFFSET_Y 0x6828 #define EVERGREEN_GRPH_X_START 0x682c #define EVERGREEN_GRPH_Y_START 0x6830 #define EVERGREEN_GRPH_X_END 0x6834 #define EVERGREEN_GRPH_Y_END 0x6838 #define EVERGREEN_GRPH_UPDATE 0x6844 # define EVERGREEN_GRPH_SURFACE_UPDATE_PENDING (1 << 2) # define EVERGREEN_GRPH_UPDATE_LOCK (1 << 16) #define EVERGREEN_GRPH_FLIP_CONTROL 0x6848 # define EVERGREEN_GRPH_SURFACE_UPDATE_H_RETRACE_EN (1 << 0) /* CUR blocks at 0x6998, 0x7598, 0x10198, 0x10d98, 0x11998, 0x12598 */ #define EVERGREEN_CUR_CONTROL 0x6998 # define EVERGREEN_CURSOR_EN (1 << 0) # define EVERGREEN_CURSOR_MODE(x) (((x) & 0x3) << 8) # define EVERGREEN_CURSOR_MONO 0 # define EVERGREEN_CURSOR_24_1 1 # define EVERGREEN_CURSOR_24_8_PRE_MULT 2 # define EVERGREEN_CURSOR_24_8_UNPRE_MULT 3 # define EVERGREEN_CURSOR_2X_MAGNIFY (1 << 16) # define EVERGREEN_CURSOR_FORCE_MC_ON (1 << 20) # define EVERGREEN_CURSOR_URGENT_CONTROL(x) (((x) & 0x7) << 24) # define EVERGREEN_CURSOR_URGENT_ALWAYS 0 # define EVERGREEN_CURSOR_URGENT_1_8 1 # define EVERGREEN_CURSOR_URGENT_1_4 2 # define EVERGREEN_CURSOR_URGENT_3_8 3 # define EVERGREEN_CURSOR_URGENT_1_2 4 #define EVERGREEN_CUR_SURFACE_ADDRESS 0x699c # define EVERGREEN_CUR_SURFACE_ADDRESS_MASK 0xfffff000 #define EVERGREEN_CUR_SIZE 0x69a0 #define EVERGREEN_CUR_SURFACE_ADDRESS_HIGH 0x69a4 #define EVERGREEN_CUR_POSITION 0x69a8 #define EVERGREEN_CUR_HOT_SPOT 0x69ac #define EVERGREEN_CUR_COLOR1 0x69b0 #define EVERGREEN_CUR_COLOR2 0x69b4 #define EVERGREEN_CUR_UPDATE 0x69b8 # define EVERGREEN_CURSOR_UPDATE_PENDING (1 << 0) # define EVERGREEN_CURSOR_UPDATE_TAKEN (1 << 1) # define EVERGREEN_CURSOR_UPDATE_LOCK (1 << 16) # define EVERGREEN_CURSOR_DISABLE_MULTIPLE_UPDATE (1 << 24) /* LUT blocks at 0x69e0, 0x75e0, 0x101e0, 0x10de0, 0x119e0, 0x125e0 */ #define EVERGREEN_DC_LUT_RW_MODE 0x69e0 #define EVERGREEN_DC_LUT_RW_INDEX 0x69e4 #define EVERGREEN_DC_LUT_SEQ_COLOR 0x69e8 #define EVERGREEN_DC_LUT_PWL_DATA 0x69ec #define EVERGREEN_DC_LUT_30_COLOR 0x69f0 #define EVERGREEN_DC_LUT_VGA_ACCESS_ENABLE 0x69f4 #define EVERGREEN_DC_LUT_WRITE_EN_MASK 0x69f8 #define EVERGREEN_DC_LUT_AUTOFILL 0x69fc #define EVERGREEN_DC_LUT_CONTROL 0x6a00 #define EVERGREEN_DC_LUT_BLACK_OFFSET_BLUE 0x6a04 #define EVERGREEN_DC_LUT_BLACK_OFFSET_GREEN 0x6a08 #define EVERGREEN_DC_LUT_BLACK_OFFSET_RED 0x6a0c #define EVERGREEN_DC_LUT_WHITE_OFFSET_BLUE 0x6a10 #define EVERGREEN_DC_LUT_WHITE_OFFSET_GREEN 0x6a14 #define EVERGREEN_DC_LUT_WHITE_OFFSET_RED 0x6a18 #define EVERGREEN_DATA_FORMAT 0x6b00 # define EVERGREEN_INTERLEAVE_EN (1 << 0) #define EVERGREEN_DESKTOP_HEIGHT 0x6b04 #define EVERGREEN_VLINE_START_END 0x6b08 #define EVERGREEN_VLINE_STATUS 0x6bb8 # define EVERGREEN_VLINE_STAT (1 << 12) #define EVERGREEN_VIEWPORT_START 0x6d70 #define EVERGREEN_VIEWPORT_SIZE 0x6d74 /* display controller offsets used for crtc/cur/lut/grph/viewport/etc. */ #define EVERGREEN_CRTC0_REGISTER_OFFSET (0x6df0 - 0x6df0) #define EVERGREEN_CRTC1_REGISTER_OFFSET (0x79f0 - 0x6df0) #define EVERGREEN_CRTC2_REGISTER_OFFSET (0x105f0 - 0x6df0) #define EVERGREEN_CRTC3_REGISTER_OFFSET (0x111f0 - 0x6df0) #define EVERGREEN_CRTC4_REGISTER_OFFSET (0x11df0 - 0x6df0) #define EVERGREEN_CRTC5_REGISTER_OFFSET (0x129f0 - 0x6df0) /* CRTC blocks at 0x6df0, 0x79f0, 0x105f0, 0x111f0, 0x11df0, 0x129f0 */ #define EVERGREEN_CRTC_V_BLANK_START_END 0x6e34 #define EVERGREEN_CRTC_CONTROL 0x6e70 # define EVERGREEN_CRTC_MASTER_EN (1 << 0) # define EVERGREEN_CRTC_DISP_READ_REQUEST_DISABLE (1 << 24) #define EVERGREEN_CRTC_BLANK_CONTROL 0x6e74 # define EVERGREEN_CRTC_BLANK_DATA_EN (1 << 8) #define EVERGREEN_CRTC_STATUS 0x6e8c # define EVERGREEN_CRTC_V_BLANK (1 << 0) #define EVERGREEN_CRTC_STATUS_POSITION 0x6e90 #define EVERGREEN_CRTC_STATUS_HV_COUNT 0x6ea0 #define EVERGREEN_CRTC_UPDATE_LOCK 0x6ed4 #define EVERGREEN_MASTER_UPDATE_LOCK 0x6ef4 #define EVERGREEN_MASTER_UPDATE_MODE 0x6ef8 #define EVERGREEN_DC_GPIO_HPD_MASK 0x64b0 #define EVERGREEN_DC_GPIO_HPD_A 0x64b4 #define EVERGREEN_DC_GPIO_HPD_EN 0x64b8 #define EVERGREEN_DC_GPIO_HPD_Y 0x64bc /* HDMI blocks at 0x7030, 0x7c30, 0x10830, 0x11430, 0x12030, 0x12c30 */ #define EVERGREEN_HDMI_BASE 0x7030 /*DIG block*/ #define NI_DIG0_REGISTER_OFFSET (0x7000 - 0x7000) #define NI_DIG1_REGISTER_OFFSET (0x7C00 - 0x7000) #define NI_DIG2_REGISTER_OFFSET (0x10800 - 0x7000) #define NI_DIG3_REGISTER_OFFSET (0x11400 - 0x7000) #define NI_DIG4_REGISTER_OFFSET (0x12000 - 0x7000) #define NI_DIG5_REGISTER_OFFSET (0x12C00 - 0x7000) #define NI_DIG_FE_CNTL 0x7000 # define NI_DIG_FE_CNTL_SOURCE_SELECT(x) ((x) & 0x3) # define NI_DIG_FE_CNTL_SYMCLK_FE_ON (1<<24) #define NI_DIG_BE_CNTL 0x7140 # define NI_DIG_BE_CNTL_FE_SOURCE_SELECT(x) (((x) >> 8 ) & 0x3F) # define NI_DIG_FE_CNTL_MODE(x) (((x) >> 16) & 0x7 ) #define NI_DIG_BE_EN_CNTL 0x7144 # define NI_DIG_BE_EN_CNTL_ENABLE (1 << 0) # define NI_DIG_BE_EN_CNTL_SYMBCLK_ON (1 << 8) # define NI_DIG_BE_DPSST 0 /* Display Port block */ #define EVERGREEN_DP0_REGISTER_OFFSET (0x730C - 0x730C) #define EVERGREEN_DP1_REGISTER_OFFSET (0x7F0C - 0x730C) #define EVERGREEN_DP2_REGISTER_OFFSET (0x10B0C - 0x730C) #define EVERGREEN_DP3_REGISTER_OFFSET (0x1170C - 0x730C) #define EVERGREEN_DP4_REGISTER_OFFSET (0x1230C - 0x730C) #define EVERGREEN_DP5_REGISTER_OFFSET (0x12F0C - 0x730C) #define EVERGREEN_DP_VID_STREAM_CNTL 0x730C # define EVERGREEN_DP_VID_STREAM_CNTL_ENABLE (1 << 0) # define EVERGREEN_DP_VID_STREAM_STATUS (1 <<16) #define EVERGREEN_DP_STEER_FIFO 0x7310 # define EVERGREEN_DP_STEER_FIFO_RESET (1 << 0) #define EVERGREEN_DP_SEC_CNTL 0x7280 # define EVERGREEN_DP_SEC_STREAM_ENABLE (1 << 0) # define EVERGREEN_DP_SEC_ASP_ENABLE (1 << 4) # define EVERGREEN_DP_SEC_ATP_ENABLE (1 << 8) # define EVERGREEN_DP_SEC_AIP_ENABLE (1 << 12) # define EVERGREEN_DP_SEC_GSP_ENABLE (1 << 20) # define EVERGREEN_DP_SEC_AVI_ENABLE (1 << 24) # define EVERGREEN_DP_SEC_MPG_ENABLE (1 << 28) #define EVERGREEN_DP_SEC_TIMESTAMP 0x72a4 # define EVERGREEN_DP_SEC_TIMESTAMP_MODE(x) (((x) & 0x3) << 0) #define EVERGREEN_DP_SEC_AUD_N 0x7294 # define EVERGREEN_DP_SEC_N_BASE_MULTIPLE(x) (((x) & 0xf) << 24) # define EVERGREEN_DP_SEC_SS_EN (1 << 28) /*DCIO_UNIPHY block*/ #define NI_DCIO_UNIPHY0_UNIPHY_TX_CONTROL1 (0x6600 -0x6600) #define NI_DCIO_UNIPHY1_UNIPHY_TX_CONTROL1 (0x6640 -0x6600) #define NI_DCIO_UNIPHY2_UNIPHY_TX_CONTROL1 (0x6680 - 0x6600) #define NI_DCIO_UNIPHY3_UNIPHY_TX_CONTROL1 (0x66C0 - 0x6600) #define NI_DCIO_UNIPHY4_UNIPHY_TX_CONTROL1 (0x6700 - 0x6600) #define NI_DCIO_UNIPHY5_UNIPHY_TX_CONTROL1 (0x6740 - 0x6600) #define NI_DCIO_UNIPHY0_PLL_CONTROL1 0x6618 # define NI_DCIO_UNIPHY0_PLL_CONTROL1_ENABLE (1 << 0) #endif
{ "pile_set_name": "Github" }
Increased nuchal translucency: results from microarray and RASopathy disorders testing. To determine the incidence of chromosome abnormalities, submicroscopic chromosomal microarray (CMA) abnormalities and RASopathy Disorders (RD) pathogenic variants in a cohort of pregnant patients with a nuchal translucency (NT) ≥3.5mm. We propose a clinical protocol for surveillance of this group of patients. A retrospective chart review was performed on patients seen at The Prenatal Diagnosis and Medical Genetics Program between January 2013 - December 2015 for NT ≥3.5mm that had chorionic villus sampling or amniocentesis. Patients underwent extensive genetic counselling prior to invasive procedures and testing. Initial genetic testing included qualitative fluorescence polymerase chain reaction (QF-PCR) for aneuploidies. If negative, patients underwent karyotype testing, CMA and DNA analysis for RD pathogenic variants which included 9 known genes. Patients also underwent detailed fetal ultrasounds and echocardiograms completed by experts in the fields. A total of 226 eligible patients were identified. In 116/226 (51.3%) patients, QF-PCR identified a chromosomal aneuploidy. The remaining 110/226 (48.7%) patients had further genetic testing. Abnormal/pathogenic cytogenetic results (karyotyping and CMA) were detected in 9/110 (8.2%) of the patients along with 5 variants of unknown significance (VUS). RD testing yielded 3 pathogenic variants (3/110) for a detection rate of 2.7 % and 1 VUS. The optimal NT cut off for RD screening was 7.9 mm in this population. This article is protected by copyright. All rights reserved.
{ "pile_set_name": "PubMed Abstracts" }
Uwe Dassler Uwe Daßler (born 11 February 1967), commonly spelled Uwe Dassler in English, is a former middle- and long-distance swimmer from Germany, who represented East Germany (GDR) in international competition. He was European champion in the 400-metre freestyle in 1985 and 1987. At the 1988 Summer Olympics in Seoul, South Korea, Dassler won three medals. He won a gold medal and set a new world record of 3:46.95 in the men's 400-metre freestyle. He then won a bronze for his third-place finish in the men's 1,500-metre freestyle (15:06.15), behind Soviet Vladimir Salnikov (15:00.40) and West German Stefan Pfeiffer (15:02.69). He also won a silver medal as a member of the second-place East German team in silver men's 4×200-metre freestyle relay (7:13.60). See also German records in swimming Swimming at the 1988 Summer Olympics World record progression 400 metres freestyle External links Official Website Category:1967 births Category:Living people Category:People from Ebersbach-Neugersdorf Category:German male swimmers Category:Olympic swimmers of East Germany Category:Swimmers at the 1988 Summer Olympics Category:Olympic gold medalists for East Germany Category:Olympic silver medalists for East Germany Category:Olympic bronze medalists for East Germany Category:World record setters in swimming Category:Olympic bronze medalists in swimming Category:Male freestyle swimmers Category:World Aquatics Championships medalists in swimming Category:National People's Army military athletes Category:European Aquatics Championships medalists in swimming Category:Medalists at the 1988 Summer Olympics Category:Olympic silver medalists in swimming Category:Olympic gold medalists in swimming
{ "pile_set_name": "Wikipedia (en)" }
Q: How to force a Manipulator inside a Manipulate to auto-run? I want to use a slider (not drop-down list) for a list of discreteValues to do the Manipulate (I used Sin[x] below for simplicity, but the actual one is much more complicated). At the same time, I needed to show a function of x next to the slider (below I used x^2 as an example). Besides, since the output would be used by other notebook, I would use SaveDefinitions -> True. discreteValues = {0, 0.2, 0.4, 0.8, 1.6, 2.0, 2.2}; Manipulate[Sin[x],Row[{Control[{x, discreteValues, Manipulator, AutoAction -> False}], Dynamic[x^2]}], SaveDefinitions -> True] By default, the slider won't auto-run. How can I force the slider to auto-run by default? I tried to simply change Manipulate to Animate, but I got the error. Many thanks! A: Replace Manipulator with Animator: Manipulate[Sin[x], Row[{Control[{x, discreteValues, Animator}], Dynamic[x^2]}], SaveDefinitions -> True]
{ "pile_set_name": "StackExchange" }
The use of touch-sensitive surfaces as input devices for computers and other electronic computing devices has increased significantly in recent years. Exemplary touch-sensitive surfaces include touch pads and touch screen displays. Such surfaces are widely used to manipulate user interface objects on a display. Exemplary manipulations include adjusting the position and/or size of one or more user interface objects, as well as associating metadata with one or more user interface objects. Exemplary user interface objects include digital images, video, text, icons, and other graphics. A user may need to perform such manipulations on user interface objects in a file management program (e.g., Finder from Apple Computer, Inc. of Cupertino, Calif.), an image management application (e.g., Aperture or iPhoto from Apple Computer, Inc. of Cupertino, Calif.), a digital content (e.g., videos and music) management application (e.g., iTunes from Apple Computer, Inc. of Cupertino, Calif.), a drawing application, a presentation application (e.g., Keynote from Apple Computer, Inc. of Cupertino, Calif.), a word processing application (e.g., Pages from Apple Computer, Inc. of Cupertino, Calif.), a website creation application (e.g., iWeb from Apple Computer, Inc. of Cupertino, Calif.), a disk authoring application (e.g., iDVD from Apple Computer, Inc. of Cupertino, Calif.), or a spreadsheet application (e.g., Numbers from Apple Computer, Inc. of Cupertino, Calif.). But existing methods for performing these manipulations are cumbersome and inefficient. For example, using a sequence of mouse-based inputs to select one or more user interface objects and perform one or more actions on the selected user interface objects is tedious and creates a significant cognitive burden on a user. Existing methods that use simultaneous inputs to perform these manipulations are also cumbersome and inefficient. In addition, existing methods take longer than necessary, thereby wasting energy. This latter consideration is particularly important in battery-operated devices. Accordingly, there is a need for computing devices with faster, more efficient methods and interfaces for manipulating user interface objects using two or more simultaneous user inputs, such as two simultaneous inputs on a track pad or touch screen, or simultaneous inputs from a touch-sensitive surface and a mouse. Such methods and interfaces may complement or replace conventional methods for manipulating user interface objects. Such methods and interfaces reduce the cognitive burden on a user and produce a more efficient human-machine interface. For battery-operated computing devices, such methods and interfaces conserve power and increase the time between battery charges.
{ "pile_set_name": "USPTO Backgrounds" }
IMPORTANTNOTE: Our show is 100% listener supported! Hurrah! Jack and The Big Takeover would like to thank and acknowledge our show’s patron sponsors to date via Patreon.com! (If you would like to join them—which we would greatly appreciate, as not only is our show entirely listener sponsored, such funding GREATLY helps subsidize Big Takeover magazine as well—you can easily do that at patreon.com/jackrabid (or via checks made out to “Big Takeover” sent straight to us at our office)
{ "pile_set_name": "Pile-CC" }
--- name: Lint Docker # yamllint disable-line rule:truthy on: pull_request: paths-ignore: - '**/*.json' - '**/*.md' - '**/*.txt' - '.git*' - '.yamllint' - 'LICENSE' push: paths: - '**/*.y?ml' - '.github/workflows/lint-docker.yml' - 'Dockerfile' jobs: Hadolint: runs-on: ubuntu-latest steps: - uses: actions/checkout@v2 - uses: brpaz/hadolint-action@master with: dockerfile: Dockerfile DockerCompose: runs-on: ubuntu-latest needs: Hadolint steps: - uses: actions/checkout@v1 - name: Validates Docker Compose files run: | find . -name docker-compose.yml -print | while read file; do docker-compose -f $file config -q || exit 1 done
{ "pile_set_name": "Github" }
Q: How to update MS Access database I need a simple program to update MS Access database fields. I followed an online tutorial which was simple and had the code working. But it doesnt seem to work anymore when I reimplement it. Here's my code. public partial class Form1 : Form { public Form1() { InitializeComponent(); } OleDbConnection conn; OleDbDataAdapter da; DataSet ds; OleDbCommandBuilder cb; DataRow row; private void Form1_Load(object sender, EventArgs e) { conn = new OleDbConnection("PROVIDER=Microsoft.Jet.OLEDB.4.0; Data Source = C:\\test.mdb"); da = new OleDbDataAdapter("select* from user", conn); ds = new DataSet(); conn.Open(); da.Fill(ds, "user"); conn.Close(); } private void button1_Click(object sender, EventArgs e) { cb = new OleDbCommandBuilder(da); row = ds.Tables["user"].Rows[0]; row[3] = "hello"; da.Update(ds, "user"); } } user is the table name of my database. What I tried to do is update the field row[0] (first row) and column[3] (4th column) with the string hello.. The error i get is Synatx error in FROM clause. After some internet reading, I found user has to be in square brackets. So I made it this. public partial class Form1 : Form { public Form1() { InitializeComponent(); } OleDbConnection conn; OleDbDataAdapter da; DataSet ds; OleDbCommandBuilder cb; DataRow row; private void Form1_Load(object sender, EventArgs e) { conn = new OleDbConnection("PROVIDER=Microsoft.Jet.OLEDB.4.0; Data Source = C:\\test.mdb"); da = new OleDbDataAdapter("select* from [user]", conn); ds = new DataSet(); conn.Open(); da.Fill(ds, "user"); conn.Close(); } private void button1_Click(object sender, EventArgs e) { cb = new OleDbCommandBuilder(da); row = ds.Tables["user"].Rows[0]; row[3] = "hello"; da.Update(ds, "user"); } } When I do this, I get a new error, Syntax error in UPDATE statement. I did a lot of internet reading but none seems to address this. They all have used Update command differently. I know only this way. What's wrong in my code? Especially since this worked before. Or isn't this way of updating a proper technique? Please help me with the code and not technical terms which I don't follow. Or any other procedure to update in ms access? Thanks. A: I've never tried to access an Access database with a .NET DataSet before, but I think you could replace the code in button1_Click with something like this: private void button1_Click(object sender, EventArgs e) { conn.Open(); string query = "UPDATE [user] SET [columnname] = ? WHERE id = ?"; var accessUpdateCommand = new OleDbCommand(query, conn); accessUpdateCommand.Parameters.AddWithValue("columnname", "hello"); accessUpdateCommand.Parameters.AddWithValue("id", 123); // Replace "123" with the variable where your ID is stored. Maybe row[0] ? da.UpdateCommand = accessUpdateCommand; da.UpdateCommand.ExecuteNonQuery(); conn.Close(); } Yes, I know you'd be losing some of the benefits of the DataSet, but research suggests that the regular OleDbDataAdapter.Update function doesn't play well with Access.
{ "pile_set_name": "StackExchange" }
Preparing the right food survival kit is one of the most challenging factors in making sure that you and your family will survive a disaster. Although it sounds easy there are a lot of important things that needs to be considered when planning which food to store like knowing what each of your family member likes or dislikes, storage space, shelf life, medical needs and nutritional concerns. Before going through the details of your food storage plan it is important to understand the 3 main factors that could make your planning easier and effective and that is space, shelf life, and survival food selection. Space Considerations According to FEMA recommendation each family member should have a three-day food and water supply. Although it doesn’t sound like a lot, proper storage could ensure this survival food lasts as long as possible. If you are looking to store more food that will last for more days you will need a lot of space to store it all. Keeping your food storage dry and kept at a minimum light exposure will make your food supply deteriorate less quickly. Shelving is also a good option for storing your food items like canned goods, packed food, and more. Using plastic rubber maid totes is also advisable as it can be stacked on top of each other conserving a lot of space. When buying your supplies you might need to consider buying specially made freeze-dried and dehydrated foods as they are packed to take up less space. Shelf Life Freeze-dried and dehydrated food (like this) is considered to be the ultimate survival food because it doesn’t have a lot of moisture content which makes it less likely to spoil faster and has a shelf life of up to 25 years. Canned goods on the other hand can last up to many years but needs to be changed with the regular meals as their expiration date draws near. As Redditor J973 pointed out however, he is more than comfortable with eating canned goods beyond their expiration date Many canned foods like some veggies, beans and meats have a MUCH LONGER SHELF LIFE THAN A YEAR….. and that’s just the expiration date that is arbitrarily stamped on there, I would feel comfortable eating many foods well past the stamped date. I have bought canned beans that have an expiration date of 2017, that is way more than a year. Home canned and pickled stuff can last YEARS. Dry canned rice, beans and flour can also last years. Foods that are high in fat and snack foods are the fastest to spoil so they should be changed when needed. Food supplies that have expiration dates should be stored in an accessible area. Remember to keep any food item that is not airtight to be stored in an airtight container. Here’s a video of how to properly store food for emergency survival. Picking the Right Foods Knowing the right food to store and the right place to store them is very important to ensure your survival in a disaster. Having the right plan on how you should you use the food on your stock pile and being able to provide the basic food everyone in your family should have will make the difference in a survival situation. Everyone knows that wheat, milk, honey, and salt are the four basic products that should be included in a good food survival plan. You have to keep in mind that eating wheat meal after meal may have negative effects on the human body. A lot of people are allergic to wheat and statistics show that having a diet rich in wheat for a long period of time is not applicable to a lot of people because of its negative effects. It is best to include other foods on hand and not have wheat as your main staple. If you want to include wheat on your basic survival plan just be sure that no one in your group is allergic. Including other staples in your plan is recommended to allow you to change things up and give your body the nutrients it needs to be healthy from different sources. Foods such as dehydrated and freeze dried foods, canned goods, and powdered eggs are great food staples that you can add on your food storage plan. Vitamins are very important and should always be included in your emergency storage. As your space will be limited and the time may come when you are unable to get a healthy meal, vitamins can give your body the nutrients it needs, but keep in mind that vitamins alone cannot keep you healthy. It is still best to keep a variety of food storage supplies to meet most of your body’s needs. Foods that are easy to prepare and do not require cooking is also important and must be added to your emergency food supply plan as they come in handy when you have very little time or too tired to prepare a meal. Freeze dried foods (great picks from Amazon) are some examples of this type of meal. Including snack foods in your supply is also important as it helps children cope and feel better emotionally if times are hard. Although it’s really hard to completely prepare for a disaster knowing the essential things to store will greatly raise your chances of surviving. Having the right food supply on your emergency storage will put your heads above the majority of the population as you will not be starving and will be strong enough to help your family and the people around you.
{ "pile_set_name": "OpenWebText2" }
Everything Published on PostBourgie in: The cloud of chronic traumatic encephalopathy (CTE) — the concussion-related brain disease that can lead to mental illness and Alzheimer’s-like symptoms — has hung over the apparent suicide of Junior Seau, one of the N.F.L.’s great linebackers. The news was the final straw for Ta-Nehisi Coates of the Atlantic, who wrote that he could no longer find enjoyment Read More
{ "pile_set_name": "Pile-CC" }
-1 Let y(o) = -o**2 + 17*o - 15. Let q be y(15). Suppose 10*g - 11*g = q. Let h be (4 + -1)*g/(-9). Solve -5*i - l = h - 1, 0 = -4*i + 5*l + 20 for i. 0 Let r(k) = k**3 - 12*k**2 - k + 12. Let n be r(12). Let y be 13/(-52) + (n - 18/(-8)). Solve -y*o + 9 = -m, 5*m - o = m - 15 for m. -3 Suppose 3*x - 4*x = 0. Suppose x = 2*m - 5*m + 105. Solve -h + 5*h = -3*i + m, 10 = -i + 3*h for i. 5 Let v be -4 - 87/(-18) - (-266)/84. Solve 5*i - 16 = -p + 9, 0 = v*i + p - 20 for i. 5 Let t be ((-51)/(-34))/(2/4). Solve -14 = -x + t*k, 2*x = 4*k - 0*k + 22 for x. 5 Let l = -745 + 749. Solve -2*s - 2*w = l, -5*w + 3*w + 31 = -5*s for s. -5 Suppose -6 = -5*p + 4. Suppose -l = -4*l - p*l. Solve -5*i + 3*z - 15 = 0, 5*z = -l*i + 2*i + 25 for i. 0 Let i(g) = -9*g**3 - 4*g**2 + 9*g - 3. Let t be i(2). Let s = 75 + t. Solve s*r + o - 9 = 2, -4*r = o - 19 for r. 4 Suppose -5*o = -6*o + 5, 0 = 2*b - 5*o + 7. Suppose -5*m + b = -2*m. Solve 0 = m*q - 5*y - 10, -4 - 2 = -q - y for q. 5 Let h(q) = -6*q - 111. Let p be h(-19). Solve -5*o - p*x - 35 = -8*x, -5*x = -10 for o. -5 Let z be 10 + (-1 - -1) - -1. Suppose -4*s + 3*j - 37 = 81, 4*j = -5*s - 163. Let r = -29 - s. Solve 3*k - z = -r*d + d, 4*k - 16 = -d for k. 5 Suppose 5*l - l = -3*c + 23, 2*c - 18 = -4*l. Solve 0*x = x - s + 2, -c*s - 11 = 2*x for x. -3 Let x = 3098 - 3094. Solve 3*i = -5*p + 11, -3*i + x = -4*p + 2 for i. 2 Let a(q) = -q**2 + 26*q - 19. Let k be a(25). Suppose -55 = -5*n - k*n. Solve 0 = 5*s - 5*i + 35, -31 = 5*s - n*i + i for s. -3 Let f be (-50)/40*48/(-30). Solve -3*s - 3*k + 0 = 6, 0 = -4*s - 2*k - f for s. 1 Let m(o) = o**2 + 6*o + 2. Let v be m(-7). Let x be 1 + 2 - v/3. Suppose -5*l + 15 = -5*f, -4*f - 5 = f - 3*l. Solve 3*r + b + f = x, 0 = r + 2*b + 1 - 7 for r. -2 Suppose -2*l - 9 = -3*l. Suppose -s - l = -4*q, s = -q + 6*s - 12. Let z = 5 + -3. Solve -2*h - z*m + 19 = 3*m, q*h + 5*m = 21 for h. 2 Let u = 37713 - 37711. Suppose 41 = 5*x - 4*n, 0 = 3*x - 2*x - n - 9. Solve 0 = 2*h + 2*g + 16, -u*h - 28 = x*g for h. -4 Let h(s) = -s**3 + 31*s**2 + 67*s + 4. Let p be h(33). Let g = 5 + 0. Solve 5*k + p = -5*m + 2, -g*m = 10 for k. -5 Let u be (6/(-8))/(2/(-8)*1). Suppose 16 + 32 = u*j. Solve 0 = c - 3*c - 2*z + j, 2*z = 8 for c. 4 Let d be ((-3)/6 + 2/4)*1. Solve -2*a + d*a + 8 = p, a = 5*p - 7 for a. 3 Suppose -4*m - 56 = -0. Let i = m - -19. Suppose 4*s - 4 = 4. Solve 2*v = i*z + 6*v - 2, -s*v = z - 4 for z. -2 Suppose 0 = 3*p - 12 + 3. Let k be 4/2*10/4. Solve k*l + 10 = -d + 3, -l = -p*d + 11 for d. 3 Let c(s) be the first derivative of s**4/4 - 3*s**3 + 9*s**2/2 - 8*s - 51. Let z be c(8). Solve -x - 6 = 3*y, z = -x - 2*x + 4*y + 8 for x. 0 Let w(o) = 5*o - 25. Let c be w(10). Suppose 5*x + 5 - c = 0. Let k(h) = h**2 - 1. Let z be k(-1). Solve 3*m + x*y - 17 = z, 3*m + 0*y - y = 7 for m. 3 Suppose 0 = 5*a - 168 - 82. Let v = 56 - a. Solve -3*b - 2*x - 4 = 0, 0*b + v = -2*b - 3*x for b. 0 Let x(m) = m**2 - 8*m + 21. Let t be x(4). Solve 6*p + 2*k - 6 = 4*p, -5*p = k + t for p. -2 Let i = 293 - 288. Solve -x = -4*g - 6*x + 11, 0 = -2*g + i*x + 13 for g. 4 Suppose 56 = 4*n - 4. Let o be 90/(25/5)*(-8)/(-12). Let f(t) = -t**2 - 5*t - 1. Let y be f(-4). Solve -z - 4*m - m + n = 0, -y*m = -o for z. -5 Suppose 7*u - 24 = 3*u. Solve 0 = -l - s - u, -3*l = 2*l + s + 10 for l. -1 Let y(n) = 2*n**2 - 26*n + 83. Let r be y(10). Solve r = 2*m - 6*m + 3*p, 5*m + 22 = -3*p for m. -5 Suppose 24*j + 5*c - 45 = 19*j, 5*j - 5*c - 35 = 0. Solve -20 = 4*v + 6*z - z, -5*v + 2*z = -j for v. 0 Let k(g) = -12*g + 8. Let d be k(5). Let j = d + 55. Solve -4*z - 35 = -3*t, 5*t - 30 = -j*z + 4*z for z. -5 Suppose -2*a + 0*a + 10 = 0. Suppose 4*x = 7 + 49. Suppose 5*g - 21 = -11. Solve 4*k = 5*j - g, -a*k - j = -k + x for k. -3 Suppose 3*g + 40 = 7*g. Let y = 29 - g. Solve -4*m = k + 13, -3*m + y = 2*k - 7*k for m. -2 Let n(x) = 14*x + 87. Let t be n(-6). Suppose 3*s = -5*m + 23, -2*s + m + 6 = 2*m. Solve 0 = -5*v + 3*y - s, v + t*y - 7 = 0 for v. 1 Let y = -815 - -821. Solve c - 4*c + 5 = -4*m, 4*c - 5*m - y = 0 for c. -1 Suppose -f + 7 = -5*k, f - 27 = k - 24. Solve 0 = -4*u + f*u - x - 1, -u = 4*x + 4 for u. 0 Suppose 0*l + 2*l = 10. Suppose 2*s - 43 = 3*z, -l*z + s - 5*s - 35 = 0. Let a = z + 16. Solve 5*y - 8*b = -3*b - 30, -28 = a*y - 3*b for y. -5 Let x(v) = -v**2 - 15*v - 23. Let l = 2 + -15. Let i be x(l). Solve -2*r + 8 = -t, -r + 1 - 4 = i*t for t. -2 Let z be (-3)/3 + (2 - 1). Suppose -r + 10 = r. Suppose -4*o - 4 = -3*i, -2*i + 2 = -5*o - 3. Solve z*c + r*c + 20 = -h, i = -2*c + 3*h - 8 for c. -4 Let w be 0*1*(0 - -1). Let i(h) = -h**2 - 8*h - 7. Let y be i(-5). Let s be 13/3 - y/(-12). Solve 5*o - s = 0, -5*m + 0*o + 4*o + 21 = w for m. 5 Suppose 17*f = 8*f + 18. Suppose -4*k - 3*y + 115 = 0, f*k + 0*k + 4*y - 70 = 0. Solve -5*p = -t + 2*t - k, -2*p = 5*t - 33 for t. 5 Let b be (48/(-42))/(10/(-35)). Solve -c + b*q = 0, 5*q - 7 = -5*c + 18 for c. 4 Suppose -10 = 11*c - 16*c. Solve -c*q + 12 = -2*g, -q = -6*g + 3*g - 14 for q. 2 Let f(p) = -10*p + 390. Let j be f(39). Solve -6*n + 5*a + 3 = -9*n, -4*a = j for n. -1 Suppose s = 2*k - 26, -2*k - s + 0*s + 30 = 0. Let g(t) = t**3 - 15*t**2 + 13*t + 14. Let b be g(k). Solve -v + 1 = b, -u - 7*v + 2 = -3*v for u. -2 Let o(t) = -3*t - 3. Let p be o(-1). Solve 5*q + 5 = p, 3*h - q - 6 = -20 for h. -5 Suppose -3*s + 12*x = 8*x - 46, -4*s = -3*x - 73. Let d be (-2)/5 - 312/(-5). Let z be (-2)/(-11) + d/s. Solve z*c + 5*b - 8*b + 3 = 0, -5 = 5*b for c. -2 Let p = 0 + 0. Let c(f) = 7*f - 6. Let n be c(3). Let k be (-7)/(-5) + n/25. Solve -2*r + k*d + 6 = p, -3 = -0*d - 3*d for r. 4 Let j(l) = l**3 + 45*l**2 + l + 48. Let f be j(-45). Solve -r = 5*i - 11, -f*r + 4 = 5*i - 9 for r. 1 Let m be (-22)/(-4) - ((-990)/(-36))/11. Solve m*a + 7 = -2*s, 4 = -5*a + 2*s + 19 for a. 1 Let s be (6426/45)/17 - (-3)/5. Solve 10*b - 11*b = -3*k - s, 4*k - 5*b = -23 for k. -2 Suppose 4 = 4*s - 8. Solve 0 = 3*q + s, -1 - 2 = a + 4*q for a. 1 Let y = 6 - 20. Let i = y - -19. Solve 2*t - i*r = -5, 2*r + 0*r = 4*t + 2 for t. 0 Let w(o) = -o**2 + 8*o + 3. Let n(d) = -d**3 + 20*d**2 - 21*d + 46. Let y be n(19). Let q be w(y). Solve -q*a - 3*b + 2*b = -11, a - 1 = -b for a. 5 Suppose -4*n - 35 = 5*f, 0*f + 2*f - 2 = 0. Let r = n - -6. Let c = 6 + r. Solve 2*s = 2*j + c, -3*j = -7*j - 2*s + 14 for j. 2 Suppose 4*s = 2*q + 7*s - 19, -5*q + 5*s - 15 = 0. Solve 3*o + 3*j = 0, 0*j - 4*j - q = 3*o for o. 2 Let y = 129 - 115. Suppose 0 = 5*d + 3*j - 197, -y - 27 = -d - j. Solve f - 10 = -5*m, -3*m = m - 5*f - d for m. 3 Suppose 13 = -s - 5*a, -25 = 2*s - a - 10. Let f(i) = i**2 + 8*i + 2. Let n be f(s). Solve 3*w - n*p + 19 = 0, -3*w = w + 4*p + 12 for w. -5 Let b(p) = -4*p + 12. Let z be b(3). Suppose 0*f - 2*f = z. Solve 5*h + 6 = -4*i, 4*h + f = -2*i - 6 for i. 1 Let t(a) = 2*a**3 + 34*a**2 + 57*a - 43. Let j be t(-15). Let w = -3 + 5. Solve 3*m - 4 = w*f, -m - j*f = f - 5 for m. 2 Suppose -5*k + 6*k + 21 = 0. Let t = k + 23. Let j(s) = s**3 + 5*s**2 + 2*s - 3. Let y be j(-4). Solve -y*c - a + 7 = 0, a - 3 = t*a for c. 2 Let f be 3 + 0 - (-3)/(6/34). Suppose 0 - f = -5*g. Solve 2*u + 4 = -3*z - 4, -5*u - 13 = g*z for z. -2 Let o be ((-320)/(-128))/(2*(-2)/(-24)). Solve j = -q - j + o, -3*q + 4*j = 5 for q. 5 Let r(w) = -6*w + 10. Let m(x) = 3*x - 5. Let u(q) = -7*m(q) - 3*r(q). Let c be u(0). Solve -c*h + 16 = i, i + 16 = 2*h + h for h. 4 Let v(l) = -l + 2. Let f be v(5). Let a be f/(-9) + (-30)/(-18). Solve 0 = 2*h + 2*h + 3*u - a, 2*h - 6 = u for h. 2 Let w = -1156 - -1160. Solve -t = 4*p - 16, 0*t + 16 = 2*t + w*p for t. 0 Suppose 2*i + 3*q - 5 = 0, -4*i + 12 = -2*i - 4*q. Solve -m = 4*o + 9, -2*o - i = -2*m - 2 for o. -2 Suppose 19 = 5*i - 6. Suppose 0 = -5*h - 2*c + 5, i*h - c = 3*h + 11. Solve 2*d = -5*m + 17, -4*m + 32 = -h*d - 0 for d. -4 Suppose 11*r - 30 - 14 = 0. Suppose -5*i + 0*i = -3*m + 8, 4*m - 39 = i. Solve r*h = -0*h + 5*w + 17, -3*h - m = w for h. -2 Let k(j) = 5*j**2 + 10*j**2 - 3 + 5*j - 28*j**2 + 14*j**2. Let z be k(-6). Solve 6 = z*h, 0*h - 3 = -3*l + 3*h for l. 3 Let q be -1 + 2 + 2 + 9. Suppose -q = -5*h + 13. Solve -4*i - 1 + 9 = 4*x, -h*i = -4*x + 35 for x. 5 Let c be 2/2 + (0 - -3). Let u be 1 + 1 + 112/8. Solve 2*q - 7*q + 11 = r, -u = c*r for q. 3 Suppos
{ "pile_set_name": "DM Mathematics" }
[llvm-dev] I am leaving llvm Summary: I am leaving llvm effectively immediately. I am sorry for any inconvenience this may cause. Practicalities: I can unsubscribe myself from the email lists and I disabled email notification on bugzilla and phabricator. Could someone please disable my account on phabricator and delete my svn access? Thanks. The long story: I first became aware of llvm during a compiler course at university. I wanted to write a toy scheme frontend to a real compiler. To my shame I missed that llvm had a mem2reg pass and selected gcc to avoid having to compute ssa form myself. After contributing a few patches to gcc it was clear that the frontend interface needed some cleanup. At the time llvm was being considered as a potential new gcc architecture and the idea of a well defined IR with a textual representation was a revolution. On my first job (indt) we were using arm cpus and I was able to sell the idea of starting an llvm backend for arm. My first commit was on May 14, 2006. I am incredibly grateful to both indt and the llvm developers for trusting and helping such an inexperienced and unknown developer with such a large task. It is only in May 2007 in the dev meeting that I got to meet the other developers in person. It was an incredibly fun event and people were as friendly in person as on the list. In the next few years I was working at google. First as an sre and then a compiler developer on gcc. During that time I kept llvm as my 20% project as much as possible. Working on it was always a refreshing experience. It was far easier to change and far less political than gcc at the time. My opportunity to be back full time on llvm came with portable native client (pnacl). They needed to be able to emit elf objects from llvm ir and so I went to work on elf support for mc. Unfortunately another job change (mozilla) made llvm a side project again after that. I still managed to contribute to llvm/clang as I helped mozilla transition away from gcc 4.2 on OS X. It is only about 5 years ago that I started working on llvm full time again. The big item this time was elf support in lld. I was really excited when Rui posted a new design for a coff linker and did my best to find a corresponding design for elf. Unfortunately the last few years haven't been the same. On the technical side llvm now feels far bigger and slower to change. There are many incomplete transitions. That, by itself, would not be sufficient reason to leave. llvm still seems better than the competition and lld itself is still awesome. The reason for me leaving are the changes in the community. The current license change discussions unfortunately bring to memory the fsf politics when I was working on gcc. That would still not be sufficient reason to leave. As with the code, llvm will still have the best license and if the only community change was the handling of the license change I would probably keep going. The community change I cannot take is how the social injustice movement has permeated it. When I joined llvm no one asked or cared about my religion or political view. We all seemed committed to just writing a good compiler framework. Somewhat recently a code of conduct was adopted. It says that the community tries to welcome people of all "political belief". Except those whose political belief mean that they don't agree with the code of conduct. Since agreement is required to take part in the conferences, I am no longer able to attend. The last drop was llvm associating itself with an organization that openly discriminates based on sex and ancestry (1,2). This goes directly against my ethical views and I think I must leave the project to not be associated with this. So long, and thanks for all the bugs, Rafael [1] http://lists.llvm.org/pipermail/llvm-dev/2018-February/121161.html [2] https://www.outreachy.org/apply/eligibility/
{ "pile_set_name": "OpenWebText2" }
Background {#Sec1} ========== Turner's syndrome (TS) is depicted as a total or partial absence of one X chromosome, and occurs in approximately 1/2200 of live born females \[[@CR1]\]. Nearly 43-49 % of the patients are cases with classical TS who are monosomic for X chromosome (45,X). The remaining patients are mosaic cases carrying normal and abnormal cell lines together (most of them had 45,X/46,XX karyotype) (15-23 %), those with isochromosome in long arm of X chromosome (i(Xq)) (14 %), those with ring X chromosome (r(X)) (3-11 %) and those with 46,XX karyotype but having partial losses in one X chromosome (9 %). Y chromosome fragments are detected in 10-11 % of the cases \[[@CR2]--[@CR6]\]. Patients with classical TS demonstrate characteristic clinical features such as short stature, web neck, cardiovascular and renal abnormalities and hearing loss; and besides, gonadal dysgenesis in TS results in pubertal delay or failure, infertility and premature ovarian failure (POF) in most patients \[[@CR7], [@CR8]\]. Although correlation between genotype and phenotype is not well understood, mosaic cases present milder phenotypic abnormalities compared to those with 45,X karyotype \[[@CR9]\]. Mosaic TS patients are more likely to experience normal pubertal development, regular menstrual cycles and to conceive spontaneously compared to those with 45,X monosomy \[[@CR2]\]. Since mosaic patients are diagnosed following karyotype analysis due to recurrent pregnancy loss, repeated in vitro fertilization (IVF) failure and history of an abnormal offspring, our knowledge concerning reproductive and obstetric outcomes relies on case reports and case series \[[@CR4], [@CR10]--[@CR12]\] and more comprehensive studies investigating the fertility outcomes of these patients. The purpose of this study was to evaluate reproductive and obstetric outcomes of natural conception and IVF procedures in mosaic TS cases. Materials and methods {#Sec2} ===================== This retrospective study evaluated 706 female patients who underwent karyotyping between 2009--2013 in the laboratory of Medical Genetics Department of our tertiary health institution. The approval from the local ethics committee had been obtained prior to the initiation of the study. Informed consent from all individual participants included was obtained. Chromosomal analysis was performed by G-banding technique at high resolution. A hundred metaphases were counted for each patient and International System for Human Cytogenetic Nomenclature (ISCN, 2009) guidelines were used when performing karyotype analysis \[[@CR13]\]. Mosaicism ratios of the cases were calculated by proportioning total number of abnormal cell lines. In karyotype analysis, mosaic cell line ratio of ≤ %10 was defined as low-grade mosaicism, and \> %10 as high-grade mosaicism \[[@CR14]\]. Medical history regarding prior hormone therapy, prior assisted reproductive techniques attempts in infertility cases, obstetric outcomes in patients who had conceived through spontaneous or IVF cycles and perinatal outcomes were obtained by face-to-face interview or assessment of hospital medical records. All patients were assessed with physical examination and underwent a set of diagnostic tests including thyroid function tests, abdominal ultrasonography and echocardiography. Statistical analysis {#Sec3} -------------------- SPSS version 15.0 (Statistical Package for Social Science, Spss Inc. Chicago, IL, USA) was used for statistical analysis. Parametric variables were given as median (range), mean ± standard deviation or ± standard error. Chi-square test was used for the comparison of parametric variables. Non-parametric tests such as Mann--Whitney U test was used to compare non-parametric variables between cases with high-grade mosaicisim and low-grade mosaicism. Possibility of a total of 2-year fecundability was calculated at 6-month intervals by time-table analysis. The effect of menarche age, marriage age and mosaicism ratio on the time until spontaneous or IVF pregnancy was assessed by Cox-regression analysis. p \< 0.05 was considered as statistically significant. Results {#Sec4} ======= A total of 22 mosaic TS patients were extracted from 706 patients who underwent genetic karyotyping for varying indications including, recurrent implantation failure (5.1 %), recurrent pregnancy loss (defined as three or more consecutive miscarriage) (2.2 %), POF (2.2 %) and history of an offspring with any chromosomal or structural abnormality (4 %). Clinical characteristics of our study population were presented in Table [1](#Tab1){ref-type="table"}. Menarche was achieved with hormone replacement therapy in three cases at the ages of 16,17 and 18 years and continued regularly. Menstruation was regular in 18 cases at the time of study enrollment whereas it was irregular in the two and the remaining two, who were diagnosed as POF at the ages of 28 and 38, were on hormone replacement therapy. There was one case with a short stature (\<150 cm) phenotype and no cases with cardiovascular or renal abnormality, hearing loss and mental retardation among the included patients. The following systemic disorders were diagnosed in the patients; hypothyroidism in three, type 2 diabetes in three, asthma in one and generalized anxiety disorder in one patients. Uterine hypoplasia was observed in one case. In addition, one patient underwent hysteroscopic septum resection for uterine septum, another case underwent Strasmann metroplasty for bicornuat uterus and one underwent hysteroscopy and cavity expansion with fundal and lateral incisions for T-shaped uterus.Table 1Clinical characteristics of the study groupPatients age at the time of enrollment (years)^a^37 (26--47)Patients age at the time of diagnosis (years)^a^34.5 (18--46)Age of menarche (years)^a^13 (11--18)Age at marriage (years)^a^25 (15--40)Patients age at first pregnancy (years)^a,b^23 (18--32)Time from the marriage to the first conception (months)^a,b^12 (6--49)Height of the patients (cm)^a^163 (132--174)Body mass index at the enrollment (kg/m^2^)^c^28.43 ± 1.21^a^Data presented as median and range, ^b^In the cases who conceived spontaneously, ^c^ data presented as mean ± standart error A total of 22 female patients, who were diagnosed as mosaic TS after karyotyping and who attended our IVF clinic with the diagnoses of recurrent implantation failure (*n* = 10), recurrent pregnancy loss (*n* = 9), infertility due to POF (*n* = 1), and history of a prior offspring with a chromosomal abnormality (*n* = 2), were included in the study. Out of 22 patients, five despite IVF treatment and one who never sought treatment, could not ever conceive. Out of remaining 16 cases, 11 conceived spontaneously and five conceived following IVF cycles; resulting in a total of 52 pregnancies of which 17 (32.7 %) resulted in live birth and 35 (67.3 %) resulted in abortion. Of 22 mosaic TS patients' karyotypes, 17 were 45,X/46,XX and five were 45,X/46,XX/47,XXX. There were no cases including 45,X/46,Xr(X); 45,X/46,X(i(Xq)); Y chromosome fragment or 46,XX karyotype with structural abnormalities in X chromosome. One patient was determined to have 45,X/46,XX inv(9)p11q13 karyotype. The comparison regarding the number and the percentages of pregnancies, miscarriages and live births between the different karyotypes of TS were presented in Table [2](#Tab2){ref-type="table"}.Table 2Comparison of the ratios of live birth and miscarriage or terminated fetus between groupsMaternal karyotype45,X/46,XX (*n* = 17)45,X/46,XX/47,XXX (*n* = 5)All cases (*n* = 22)pNo of pregnancies (n)351752.678Live birth (n (%))10 (28.6)7 (41.2)17 (32.7).611Miscarriage (n (%))25 (71.4)10 (58.8)35 (67.3).712*p* \< .05 Statistically significant Mosaic cell line ratio was below 10 % in 17 and above 10 % in five cases. The comparison regarding the number and the percentages of pregnancies, miscarriages and live births between high-grade and low-grade mosaicism cases were presented in Table [3](#Tab3){ref-type="table"}. Miscarriages included 29 spontaneous abortions, four biochemical abortions and two induced abortions (due to anencephaly and trisomy 21). Mean abortion week was found to be 8.16 ± 2.98 (±SD) in cases who experienced spontaneous abortion (Biochemical abortions were excluded from the calculation).Table 3Comparison of the ratios of live birth and miscarriage or terminated fetus between low and high grade mosaic cell line groupsMosaic cell line ratioCases with low grade mosaic cell line (*n* = 17)Cases with high grade mosaic cell line (*n* = 5)All cases (*n* = 22)pNo of Pregnancies (n)46652.062Miscarriage (n (%))30 (65.2)5 (83.3)35 (67.3).468Live Birth (n (%))16 (34.8)1 (16.7)17 (32.7).127*p* \< .05 Statistically significant A total of 82 embryo transfers were performed on 10 patients during 35 intracytoplasmic sperm injection (ICSI) treatment cycles. Five patients could not conceive despite ICSI and five cases could conceive following ICSI treatment. Out of these pregnancies, one clinical pregnancy resulted in spontaneous abortion, two pregnancies resulted in biochemical abortion and two live babies were taken home. Implantation rate per cycle was 3.7 % (3/82), clinical pregnancy rate was 8.6 % (3/35) and take home baby rate was 5.7 % (2/35). 90.4 % of the pregnancies (*n* = 47) (88.2 % of live born babies (*n* = 15)) have occurred in spontaneous cycles. Perinatal outcomes of the 17 pregnancies that resulted in live birth are presented in Table [4](#Tab4){ref-type="table"}. Mean birth weight of these newborns was found as 3355 ± 140 gr (±SE).Table 4Perinatal outcomes of the pregnancies that resulted in live birthNumberPercentageRoute of deliveryVaginal952.9 %Abdominal (C/S)847.1 %Fetal genderFemale1270.6 %Male529.4 %Adverse perinatal outcomesIUGR15.9 %P.previa15.9 %GDM211.8 %C/S, cesarean section; IUGR, intrauterine growth restriction; P.previa, placenta previa; GDM, gestational diabetes mellitus Prenatal or postnatal cytogenetic examination was performed in three pregnancies, two as prenatal and one as postnatal investigations. Out of two prenatal cytogenetic examinations, one patient was diagnosed as Trisomy 21 and subsequently underwent a pregnancy termination; whereas the other revealed a normal karyotype. The postnatal investigation was of a patient who underwent karyotype analysis at the age of 15 due to mental retardation and a deletion was detected between the regions of 18q21.3 and q23. None of the miscarriages were evaluated genetically from the abortus materials. Time table analysis revealed that pregnancy hazard rate within the first 2 years at 6-month intervals was found to be 0.01 in the first 6 months, 0.04 in the second 6 months, 0.02 in the third 6 months and 0.01 in the last 6 months. Neither spontaneous nor IVF pregnancy was detected beyond 60th month of marriage. COX regression analysis revealed that marriage age, menarche age and mosaicism ratio did not have an effect on the time until first pregnancy (*p* = .685; *p* = .350 and *p* = .149, respectively). Discussion {#Sec5} ========== Gonadal dysgenesis in women with Turner Syndrome might depend on chromosome pairing failure during meiotic prophase, causing failure in synaptic formation at the zygotene and oocyte loss \[[@CR15]\]. Majority of germ cells, which trigger spontaneous puberty in 10-30 % and provide pubertal development, start to diminish in the third month of intrauterine life, resulting in only 5-10 % of affected patients could menstruate regularly \[[@CR16]--[@CR19]\]. POF is another frequent clinical feature of TS and mean age of menopause was reported to be 29.3 years \[[@CR18]\]. However; the degree of gonadal dysgenesis depends on the size of impaired regions of homologous chromosomes. Severe pairing failures induce the degeneration of all oocytes prior to puberty and are associated with rimary amenorrhea and poor sexual development, whereas mild pairing failures contribute to the survival of a considerable number of oocytes until puberty, leading to secondary amenorrhea and secondary impaired sexual development \[[@CR15]\]. Thus, it is possible that puberty and reproductive capacities are less affected or even preserved in TS cases with mosaic karyotype \[[@CR19]\]. When compared to the classical form, mosaic karyotype TS cases are more likely to present spontaneous puberty, normal levels of serum sex steroids and gonadotropins and follicles in ovarian biopsies \[[@CR20]\]. In addition, the chance of spontaneous conceiving in women with TS was reported as 2-10 %, most of which are the cases of mosaic pattern and those with 45,X monosomy are candidates for oocyte donation \[[@CR16], [@CR21], [@CR22]\]. X chromosome monosomy and mosaicism are encountered in 1.5 % of all amenorrhea cases although the incidence of X chromosome mosaicism in the general population still remains challenging \[[@CR23]\]. In our study, we detected mosaic Turner karyotype in 2.2 % of the cases with a diagnosis of recurrent pregnancy loss and 5.1 % of the cases with recurrent implantation failure. Our study results are compatible with the previously published reports which indicated the rate of mosaic Turner karyotype in the recurrent pregnancy loss groups as 2.6 % \[[@CR24]\]. X chromosome mosaicism ratio in female partner of ICSI candidate couples was reported to be 2.77-4.12 % whereas 45X/46XX mosaicism in couples with IVF failures due to severe male infertility and fertilization failures were reported to be 3.5-9.6 % \[[@CR25]--[@CR28]\]. Simpson et al. suggested that mosaicism has been underestimated as a cause of repeated failure in assisted reproduction \[[@CR29]\]. The median age of marriage was 25 (15--40) and median age of first pregnancy in spontaneously pregnant women was 23 years (18--32) and these results are in agreement with the previous studies reporting median age of first pregnancy in TS syndrome cases as 23.5-27.2 years \[[@CR4], [@CR10]\]. ROC analysis revealed that marriage age had no impact on the chance of conceiving. Moreover, Cox-regression analysis demonstrated that the age of menarche, age of marriage and mosaicism ratio did not affect the time-to-first pregnancy. There were no significant difference between high-grade and low-grade mosaicism cases in terms of pregnancy, time-to-first spontaneous pregnancy, abortion and take home baby rates in our study. Several previously published reports indicated a correlation between mosaicism ratio and phenotypic abnormalities and reproductive capacity of the patients; on the contrary, some other publications did not find a consistent relationship \[[@CR2], [@CR30]\]. Scholtes et al. showed a correlation between mosaicism and a low implantation rate \[[@CR31]\]. In contrast, Sonntag et al. could not find any significant impact of low-grade mosaicism on the course or outcome of ICSI in 20 couples \[[@CR14]\]. No required minimum percentage of abnormal cells has been established to define true versus "low-grade" mosaicism. Thus, some studies disregard the importance of low-grade mosaicism \[[@CR26]\]. In our study, first two-year fecundability analyses revealed that 5 % of the cases experienced their first pregnancy within 6 months and 8 % within first 2 years. No pregnancy was detected after 60 months of marriage. With the expectation of reduction in ovarian reserve with advanced age in TS, our results revealed that chance of fertility in cases with mosaic karyotype was high at younger ages but their chance will decrease if they do not conveive within the first 2 years. Majority of TS cases who conceive spontaneously are known to have mosaic cell lines. In the study by Birkebaek et al., evaluating 410 Danish women with TS, 27 out of 31 women who could spontaneously conceive, at least once, had a TS diagnosis \[[@CR4]\]. Similarly in the study by Bryman et al. there were 45,X/46,XX mosaicism in 25 out of 27 Swedish women with TS. While 23 cases had a spontaneous pregnancy, three cases conceived by assisted reproductive technologies \[[@CR32]\]. Clinical pregnancy rate and implantation rate were reported to be 46 % and 30 %, respectively, by fresh embryo transfer in oocyte donation cycles, and 28 % and 19 %, respectively, in frozen embryo transfers in TS cases \[[@CR33]\]. Pregnancy rates of these cases were found to be comparable with other women in donation programs or probably lower due to diminished endometrial receptivity \[[@CR34], [@CR35]\]. Many studies have shown that TS women who are able to conceive are at increased risk for miscarriage, stillbirths and malformed babies \[[@CR7], [@CR10], [@CR36], [@CR37]\]. Tarani et al. analyzed 160 spontaneous pregnancies in 74 women with TS and reported that 67.3 % of the pregnancies with 45,X/46,XX karyotype and 70.8 % of the pregnancies with 45,X/46,XX/47,XXX karyotype resulted in miscarriage or malformed fetus \[[@CR10]\]. Similarly, Bryman et al. have reported that 45 % of cases with mostly 45,X/46,XX mosaicism who conceived with their own oocytes ended with miscarriage and 10 % of them with induced abortion \[[@CR32]\]. Moreover, Kuo et al. have reported miscarriage rate as 68.6 % in patients with diminished ovarian reserve and 44.1 % in patients without diminished ovarian reserve among cases who had a history of prior recurrent spontaneous abortions with X chromosome mosaicism \[[@CR38]\]. Among our patients, 67.3 % of the pregnancies were resulted in abortion or termination. However karyotyping was performed for nine cases in our study group due to recurrent pregnancy loss. This condition was a reason of how we detected a high abortion rate and besides, this rate is quite higher than the abortion rate of 10-15 % in the population \[[@CR39]\]. Miscarriages that are frequently seen in TS cases are explained by chromosomal abnormalities in fetus, autoimmune disorders, ovarian and uterine factors \[[@CR10], [@CR11], [@CR38], [@CR40]\]. Aborted fetuses of TS women or their live born children are more susceptible to trisomy 21 (4 % vs 0.4 %, respectively) and TS (15 % vs 0.5 %, respectively) risks compared to general population \[[@CR10]\]. Hereditary in nature was reported in mosaic TS cases and especially cases with ring chromosome \[[@CR10], [@CR41]\]. Singh et al. revealed in their study investigating 97 conceptions in 31 pregnant women with sex chromosome mosaicism that 75 % of the fetuses were abnormal and 50 % of these pregnancies were resulted in spontaneous abortion and 25 % had genetic or congenital abnormalities \[[@CR42]\]. Besides, it was reported that abnormal karyotype ratio was increased from 42.9 % up to 73.7 % in abortion samples in the presence of diminished ovarian reserve \[[@CR38]\]. Birkebaek et al. detected chromosomal aberrations in 6 of 25 pregnancies who underwent prenatal or postnatal cytogenetic analysis among TS cases with classical and mosaic forms \[[@CR4]\]. In our study fetal karyotype analysis was not performed in all pregnancies terminated by abortion, hence the exact abnormality rates cannot be predicted however it seems likely to be higher. Cerebral paresis, neuropsychological disorder, aortic coarctation, cleft lip and palate and congenital tumor were detected in 5 (7 %) of 68 children born to women with TS \[[@CR32]\]. Even mosaic, preimplantation diagnosis, chorionic villus sampling or amniocentesis should be recommended for the patients undergoing infertility treatment if pregnancy is planned with their own oocytes since biological children of TS women are under risk for chromosomal abnormalities; and their children should be investigated for birth defects after delivery. Uterine hypoplasia and related reduced uterine perfusion secondary to significant changes in utero-ovarian vascular anatomy, and subclinical uterine abnormalities in TS cases have been implicated in the etiology of miscarriages \[[@CR33], [@CR38], [@CR43]\]. Although abortion rate is higher in pregnant women conceived with their own oocytes, use of donor oocytes does not reduce pregnancy loss rate in mosaic TS cases who underwent IVF (45 % with their own oocytes vs 26-30 % with donor oocytes) \[[@CR32], [@CR44]\]. This condition can be suggested as the evidence of the effect of diminished endometrial receptivity as well as oocyte-associated factors in TS cases. In our study group, uterus hypoplasia was present in one case and surgery-corrected uterine abnormality was present in three cases. It has been reported that uterine size were often normal in cases with mosaic karyotype and that they experience spontaneous puberty \[[@CR45], [@CR46]\]. Khastgir et al. have reported bicornuat uterus in four (13.8 %) of 29 TS cases, 10 of whom had mosaic karyotypes and miscarriage rate associated with uterus hypoplasia, bicornuat uterus and low fertilization rate was 50 % \[[@CR34]\]. Kuo et al. have reported that they detected uterine abnormality in 16.7 % of mosaic X-chromosome aneuploidies with a history of recurrent spontaneous abortions and 5.2 % in the control group \[[@CR38]\]. In our study, we found the ratio of Mullerian abnormality in all mosaic TS cases as 13.6 % and all pregnancies had terminated with abortions before the surgical corrections of the malformations. However, after the surgical corrections, four pregnancies were achieved and three terminated with delivery. These results suggest that the rate of uterine abnormalities in TS cases is high and that they may benefit from the surgery. TS patients may experience complications during pregnancy due to congenital malformations and endocrine diseases, and should be evaluated for the presence of these pathologies before IVF or pregnancy \[[@CR7]\]. Gestational diabetes mellitus was present in two (11.8 %) of 17 pregnancies that achieved live birth. These rates are close to those reported by Bryman et al. who affirmed a pregnancy induced hypertension and gestational diabetes rate of 5 % in TS cases, similar to the rate in general population \[[@CR32], [@CR47], [@CR48]\]. In our study population, there was one pregnancy with a history of SGA fetus delivery (5.9 %) and none of the cases had preterm delivery. In TS, preterm delivery rate was reported between 8--37.1 % and low birth weight was between 8.8-27.5 % \[[@CR49], [@CR50]\]. Given that the chromosomal aberrations arise possibly from the transmission of the imbalances in the genetic arrangements in mother to the offsprings (10), genetic counseling should be offered to all who conceived with autologous oocytes (11). Preimplantation genetic diagnosis (PGD) may improve the chance of conceiving in patients with recurrent ART failure and TS (12). Limitations of our study include its retrospective design, presence of some data that are based on patients' memory, absence of a control group and inability to perform a karyotype analysis in all newborns. In the context of lack of a control group, we should emphasize that it was not possible to constitute a control group since the present was not a population-based study. In addition, it is obvious that it is difficult to conduct such a study in this issue in a prospective fashion. Besides, maternal age significantly affects gains and losses in sex chromosomes \[[@CR51]--[@CR53]\]. A significant correlation was reported between maternal age and incidence of 45,X cell after 51 years old, and incidence of 45,X cell was reported to be 3.2-5.1 % among the women older than this age \[[@CR52], [@CR54]\]. Although cases in our study were younger than 46 years old, mosaicism ratio in some cases, whose pregnancy age was young but diagnosis age was advanced, may not reflect exact karyotype profile. Moreover, in the study by Hanson et al. percentage of cases with mosaic karyotype was found to be 45 % only with karyotyping but it reached to 70 % when FISH was used \[[@CR3]\]. Mosaicism ratio was given by the assessment of 100 metaphase plaques in all cases in our study, and it should be considered that FISH method was not used while evaluating our results. Last, the results obtained in the present study might have been affected by the non-mosaicism-related individual factors given that some patients included had more than one pregnancy as we stressed that 16 cases experienced 52 pregnancies. Conclusion {#Sec6} ========== Only a small proportion of the mosaic TS patients conceive in the first 2 years of marriage, hence any possible interventions should be considered within this period and at as much younger ages as possible. In TS patients who conceived, only 5.7 % take home baby whereas 67.3 % abort. Age of menarche and age of marriage appear not to have any impact on the chance of conceiving. Mosaicism ratio does not affect the time to the first pregnancy. Patients should be informed about high abortion rates after pregnancy. TS : Turner's Syndrome IVF : In Vitro Fertilization ICSI : Intra Cytoplasmic Sperm Injection FISH : Fluorescent In Situ Hybridization **Competing interests** This research received no specific grant from any funding agency in the public, commercial or not-for-profit sectors. The authors stated that there are no conflicts of interest regarding the publication of this manuscript. The authors also state that they have had full control of all primary data and that they agree to allow the Journal to review their data if requested. **Authors' contribution** ED conceived of the study, participated in the design, obtained the data and drafted the manuscript. YÇ participated in the design, obtained the data. YC participated in the design, obtained the data, performed the statistical analysis. EU carried out the genetic analysis. ÖÖ participated in the design and drafted the manuscript. EÇ performed the statistical analysis and edited the manuscript. All authors read and approved the final manuscript.
{ "pile_set_name": "PubMed Central" }
Worried that your children aren’t getting enough sleep? You’re not alone. As one prominent educational psychologist put it, “physicians and writers on school hygiene agree that children are likely to receive less sleep than is needful to them.” That assessment was offered way back in 1913, and it came from Lewis Terman, who went on to develop the Stanford-Binet IQ test. Terman certainly wasn’t right about everything, but his concern for sleep-deprived kids tapped into a longstanding source of parental angst. It turns out that experts have been fretting about tired children since at least 1897. According to an article published online Monday by the journal Pediatrics, 32 sets of sleep guidelines for kids – containing 360 distinct recommendations for children of specific ages – were published between 1897 and 2009. During that time, the amount of recommended sleep fell by an average of 0.71 minutes per year. That added up to about 70 fewer minutes of suggested nightly sleep over the course of the 20th century. And how well did parents of yore live up to those recommendations? Not very well, according to the Pediatrics article. Of the 360 sleep recommendations made over the years, Australian researchers found data that corresponded to 173 of them. In 83% of the cases, children were falling short of the ideal – and doing so by an average of 37 minutes. Overall, the actual amount of nightly sleep for children fell by an average of 0.73 minutes per year. Among all the expert recommendations put forth, the researchers could find only one case for which the expert guidelines were rooted in medical evidence of a need for a particular amount of sleep. That was a 1926 study that measured the actual sleep of 500 kids between the ages of 6 and 15 who were deemed “healthy.” Other than that, it seems that experts simply looked at the amount of sleep children around them were getting and figured that they really needed a little bit more, the authors wrote. And what’s to blame for all this pediatric sleep deprivation? Why, new technology and the increasingly rigorous demands of modern life, of course. “The hurry and excitement of modern life is quite correctly held to be responsible for much of the insomnia of which we hear,” according to an editorial published in the British Medical Journal way back in 1894. As the Australian researchers explain, “In the early 1900s, artificial lighting, radio, reading, and the cinema were considered to be the causes of delayed bedtimes. By the late 1990s, video games, television viewing, the Internet, and mobile telephones were largely held responsible for such delays.” It’s always something. The full article is behind a paywall, but you can read a summary of it here. Return to the Booster Shots blog.
{ "pile_set_name": "OpenWebText2" }
Q: Distributivity of lattice $\left(N,\:\le \right)$ The exercises asks me to prove/verify the distributivity of the lattice $\left(N,\:\le \right)$ I've no clue on how to approach this problem, because at the seminar we didn't really study lattices as ordered sets(not sure if this is the correct English term), but only as algebraic structures(even though the professor insists that we know both). Anyhow, how do I go about solving this? A: Note that $(\mathbb{N}, \le )$ as an ordered set is isomorphic to a sublattice of $(\mathcal{P}(\mathbb{N}) , \subseteq)$ by the embedding $$n \mapsto \{ 1, \dots , n\}$$ Now, it is well known that for any set $X$ the lattice $(\mathcal{P}(X) , \subseteq)$ is distributive (because $\cap, \cup$ distribute each other), hence distributivity follows.
{ "pile_set_name": "StackExchange" }
/* ********** MIDI MODULE SPECIFIC SCRIPTING ********************* */ /* MIDI Modules have specific methods that can be used to send MIDI events such as noteOn, noteOff, controlChange and sysEx messages from Script. If you want to send a MIDI event from this script, you can do the following : local.sendNoteOn(1, 12, 127); //This will send a NoteOn Event on channel 1, pitch 12, velocity 127 local.sendNoteOff(1, 12); //This will send a NoteOff Event on chanenl 1, pitch 12 local.sendCC(3, 20, 65); //This will send a ControlChange on channel 3, number 20, value 65 local.sendSysEx(15,20,115,10); //This will send 4 bytes as a SysEx message local.sendPitchWheel (3, 2000); local.sendChannelPressure (1, 67); local.sendAfterTouch (3, 20, 65); */ /* You can intercept MIDI Events with the functions below */ function noteOnEvent(channel, pitch, velocity) { script.log("Note on received "+channel+", "+pitch+", "+velocity); } function noteOffEvent(channel, pitch, velocity) { script.log("Note off received "+channel+", "+pitch+", "+velocity); } function ccEvent(channel, number, value) { script.log("ControlChange received "+channel+", "+number+", "+value); } function ccEvent(channel, number, value) { script.log("ControlChange received "+channel+", "+number+", "+value); } function sysExEvent(data) { script.log("Sysex Message received, "+data.length+" bytes :"); for(var i=0; i < data.length; i++) { script.log(" > "+data[i]); } } function pitchWheelEvent(channel, value) { script.log("PitchWheel received "+channel+", "+value); } function channelPressureEvent(channel, value) { script.log("Channel Pressure received "+channel+", "+value); } function afterTouchEvent(channel, note, value) { script.log("After Touch received "+channel+", "+note+", "+value); }
{ "pile_set_name": "Github" }
NL West Now Commenting On: Giants fans revel in historic home run Giants fans revel in historic home run Email Print By Becky Regan / MLB.com | SAN FRANCISCO -- For Giants fans, the best thing about home run No. 756 was that Barry Bonds hit it at home, in front of all his supporters who have been loyal through thick and thin. And when he finally rewarded their unwavering dedication, AT&T Park exploded as never before on Tuesday. When Bonds came up to bat in the fifth inning, the fans were already on their feet. When he worked a full count against the Nationals' Mike Bacsik, AT&T Park rocked with cheers of "Barry, Barry!" When Bonds lined it toward right-center field, the reaction from the sold-out crowd of 43,154 was overpowering as thousands of cameras flashed as Bonds raised his arms in triumph and fireworks exploded. As he rounded the bases and met his teammates at home plate, the deafening cheers continued. Bonds tipped his helmet and took a bow, but the fans remained standing in admiration of their favorite performer. They had just witnessed the sports memory of a lifetime and they savored it. The fans stood up cheering for several minutes while baseball stood still at AT&T. "We'll never forget this, and I know I'll never forget how the fans reacted for Barry," Giants manager Bruce Bochy said. "I actually saw tears in a lot of people's eyes, close to the dugout there. That's how happy they were for him." For Kevin Stinson, who drove all the way from Modesto with his 7-year-old son, Hunter, it was the ultimate experience. "This is the only game I've been to all year," Stinson said. "I had a feeling he was going to do it. I'm going to save this ticket stub for sure." While some fans double-checked for their ticket stubs, others crowded the merchandise vendors. Everyone was looking for dated memorabilia or something to take home to remember the game by. Bonds fan Greg Smith was just happy to witness history. He's been a Bonds fan since he was slugging home runs for the Pirates. He had tickets to 12 games this year, but never expected one of them would be good for an in-person viewing of his favorite player making baseball history. Smith wasn't sure it was a home run until he saw Bonds raise his arms at home plate. "Barry can tell," he said. "I couldn't tell because it was to the deep part of the yard, but that little bit of anticipation was really cool." Jessica Belluomini was still fired up one inning later as she maneuvered through the crowd starting chants of "756."
{ "pile_set_name": "Pile-CC" }
Q: Interpreting an integral under the Riemann Stieltjes form. I've long ago solved an exercise that was as follows: This problem provides a new way of finding $ \displaystyle \int\limits_a^b {{x^p}dx} $ for $ 0 < a < b $. It consists of using partitions $t_i$ for which the quotient $\displaystyle \frac{t_i}{t_{i-1}}$ is constant, instead of being $ t_i - t_{i-1} $ constant. The solutions produced $ t_i = a c^{\frac{i}{n}} $ where $ c = \frac{b}{a} $ and upper and lower sums being: $$ U \left( f, P \right) = \left( {{b^{p + 1}} - {a^{p + 1}}} \right)\frac{{{c^{\frac{p}{n}}}}}{{1 + {c^{\frac{1}{n}}} + {c^{\frac{2}{n}}} + \cdots + {c^{\frac{p}{n}}}}} $$ $$L\left( f, P \right) = \left( {{b^{p + 1}} - {a^{p + 1}}} \right)\frac{1}{{1 + {c^{\frac{1}{n}}} + {c^{\frac{2}{n}}} + \cdots + {c^{\frac{p}{n}}}}}$$ Thus you have $$U \left( f, P \right) - L \left( f, P \right) = \left( {{b^{p + 1}} - {a^{p + 1}}} \right)\left[ {\frac{{{c^{\frac{p}{n}}} - 1}}{{1 + {c^{\frac{1}{n}}} + {c^{\frac{2}{n}}} + \cdots + {c^{\frac{p}{n}}}}}} \right]$$ which implies that for some $\epsilon > 0$ and $N$ sufficiently large. $$ U \left( f, P \right) - L \left( f, P \right) < \epsilon $$ Finally you get the expected result $$\int\limits_a^b {{x^p}dx} = \frac{{{b^{p + 1}} - {a^{p + 1}}}}{{p + 1}} $$ I' m wondering if this change in the differential $ t_i - t_{i-1} = \Delta{t_i}$ versus $\displaystyle \frac{t_i}{t_{i-1}}= \Delta{t_i}$ can be interpreted as changing the integrator $d\alpha$. I've started reading about the Riemann Stieltjes integration so it rang a bell, but don't expect me to know a lot about it, just the basics. A: Just for the sake of closing, the integrator would we $$\log x$$ so one has $$\int_a^b x^{p} dx=\int_a^b x^{p+1} d({\log x})$$ as Riemann integral. Thus with $a_n=\log u_{n}$ and $\dfrac {u_{n+1}}{ u_{n}}=\rm const.$ $$\Delta a_n=a_{n+1}-a_n=\log u_{n+1} - \log u_{n}=\log \dfrac {u_{n+1}}{ u_{n}}=\log c =\rm const.$$
{ "pile_set_name": "StackExchange" }
Imagine the international uproar and condemnation if any country around the world would conduct a nuclear test anywhere around the world, now look at the hysterical US-led campaign against Iran for their ambition to acquire nuclear power for civilian use and the fact they're a signatory to the IAEA non-nuclear proliferation treaty and been very much obliged to the international watchdog's policies? Did you get the message? Israel carried out a nuclear test in the South Atlantic, the latest revelation tells which was suppressed for 40 years. Israel never signed to any treaty that oversees activities that could be deemed harmful whether nuclear, chemical, biological, even human rights abuses. They can get away with it only with a super power's absolute support. Israel is a rogue state by all standards, its policies since the first immigrants were shipped to Palestine which was under the British occupation has not been less than evil, starting with introducing terror to the world by the likes of the Haganah, Stern, Irgun and other terrorist groups that later were merged under the IDF umbrella, to assassinations of notables and dignitaries, to massacres of complete villages like Deir Yassin, to massacres of complete refugee camps like Sabra and Shatella in South Lebanon, to massacres of refugee children taking shelter in United Nations designated buildings like Qana 1 and Qana 2, to sniping children and kidnapping others, placing thousands of Semite Palestinians in concentration camps, it's endless. Again, they can only get away with all these crimes against humanity with the full support of a super power, or more than one super power, like the USA, Britain, France, and heavyweights like Germany and others. Iraq got invaded and destroyed despite obliging to UNSC resolutions, same with Libya, former Yugoslavia, and numerous other states, but Israel has rejected to implement dozens of UNSC and UNGA resolutions, was spared of over 70 UNSC resolutions condemning its policies, just why? The USAians keep wondering why the rest of the world hates them, especially the people of the Middle East, here's the best reason: Because you support terrorists, criminals, rogue states, and you are by yourself a rogue superpower. The above report was first published in Foreign Policy magazine and the cover story screenshot above taken from Israeli Haaretz magazine. Follow @ArabiSouri on Twitter: Arabi Souri Syria News: www.syrianews.cc Donations are highly appreciated, just click on the Donate button via PayPal or Credit Card: Donate You can also donate with Steem or SBD or even delegate some much needed SP here :) #Syria #Iran #Russia #InformationWar #Wahhabism #Zionism #alQaeda #FSA #Nusra #ISIS #Terrorism #Saudi #Qatar #Israel #Net #Neutrality #Mainstream #MSM #Control #WarOfTerror #RegimeChange Posted using Partiko Android
{ "pile_set_name": "OpenWebText2" }
Earlier this month, MLB had a drawing where they selected a sole team that would possibly head to Cuba and take on their national team in the Cuban capital of Havana. This would be a huge opportunity for any franchise, as well as major league baseball, and for another rare occasion we can score one for the little guys. The Rays won the Cuba If the Rays do get to travel and play in Cuba, it would be the first time since 1999 that an affiliated baseball team played there. Cuba used to be a spring training home for numerous franchises, but that was decades ago, before Fidel Castro's revolution in the late 1950's. In 1961, the United States severed political ties with the island country as well as an embargo not allowing any American exports to reach the isle, including most activity for major league baseball. The Orioles were the last team to visit the island nation in 1999. Baseball has always been one of the most popular sports among the Cuban population, and over the recent years, the country has produced several big name stars, including White Sox thumper Jose Abreu, playoff star Yoenis Cespedes, and video game cover athlete Yasiel Puig, and this without the benefit of professional scouting or free passage between nations. So last March when President Obama announced that relations with Cuba were in the process of being restored, major league baseball jumped at the chance to potentially aide the cause. With the Rays officially first in line for a series in Cuba, reporter Marc Topkin is reporting that could come as soon as 2016: Government approvals for the late spring Cuba trip are considered likely, and expanding it to two games over three days makes it, and the necessary logistics, more worthwhile. If all goes well, Cuba could see regular games during spring training, as well as in-season visits from major and minor league teams. If we dream big, we could even see a major league expansion team reach the island in the years to come, pushing baseball ever closer to that illustrative claim of having a World Series.
{ "pile_set_name": "OpenWebText2" }
Friday, April 28, 2006 Here is a guys face I did and liked it. I had no real clue about what type of character he would be until I did the glasses. Thats when it hit me that he looked like a 70's disco dancer. I think I will call him Fernando after the ABBA song. Sunday, April 23, 2006 Yet another anatomy sketch to go in the books. I have been a little lazy with the blogging for the last couple of days. But in my defense I have been working on some other things for my website redesign. Hopefully I can get that all squared away and off so there will be more time to draw and less of the prep work. I will see what I can do about getting back on track. But no promises. Tuesday, April 18, 2006 When I lived in SF and went to the Academy of Art the last place I lived was in the Sunset District. This was great for two reasons. One, I was near the SF Zoo. One of my favorite places to go take photos and be a lone. And two, was that it was near the beach. I think this connection with the ocean ran deeper than I had ever though of. In my recent drawings and illustration the water seems to be a common theme that runs throughout them. Much like this sketch you see here. Now I find this to be a little odd seeing as how I grew up in the AZ desert with no water in sight. In fact, I hate swimming. But for some reason I find that the ocean holds something for me. But what ever the case, I am trying not to do too many water related ills. I don't want to become anything like Wyland. That would be hell. Saturday, April 15, 2006 This one has a soft spot in my heart. Mostly because I remember riding the Muni in SF and seeing all the graffiti in the tunnels, and it always made me smile. I have to say that I always thought the artist had to have a pure love for what they did in order to risk getting arrested to do it. I find that in a lot of things we as a society just go with the current and don't try and mix things up much. We think that voicing our opinions are enough....but what good does that do with out action. You can have a peaceful protest with out making a scene and getting something beautiful out of it. Personally I think Graffiti has a great influence on those who are willing to be open to the imagery and message. So please, to all those who do what they do... Continue. For all of us. Friday, April 14, 2006 So as promised here is a sample of my prep work when working on an illustration. I tend to do a practice series on things that are tougher for me to get. While I have drawn my far share of hands during my time in and out of school. I think they are something that you have to stay in practice with to do them convincingly. Hands pretty much make up who we are. As an artist I need them to live. And if I don't use them to create, then its over for me. Hence the blog name. But we rarely study the movement of the hand. That's why I needed to go back and do a series of them just to do one that would give me the action and the storytelling I needed for the illustration. Anyway hope you like the glimpse inside. Wednesday, April 12, 2006 Yet another back shot? This is actually a sketch of a sculpture done by my favorite sculpture, Bernini. Its no secret that my favorite of all art movements is the Baroque movement. And as sculpture I feel that Bernini far out does any of his predecessors. That includes Michelangelo. Now I love Michelangelo, but the detailing of the modeled figure in Bernini's pieces is just too superb. The way the figures are handled and the softness of the way the marble is handled is the best I have ever seen. The flesh is treated in such amazing detail that I almost expect to see the figure exhale at any moment. But as for why I did a sketch of an already established artist? I use the forms to work out issues I have in my own work. Its like a constant reference for the mind as to the way to turn the figure in space. I tend to revisit sculpture pieces and do a lot of sketches of them. It is a dramatic step up from the act of drawing from a ceramic bust in the class room. Just away for me to continue my art education. Monday, April 10, 2006 I dunno the story behing this one. I just try and work out my hands most the time I sketch. Its kind of my excersise for the hands. Calisthenics for the hands if you will. But I know that I only post more "finished" sketches so I will work on doing more prelims and screw ups for you all. More of what I do to work out as well as what I come up with. That way you can know whats on my mind as well as what is the end result. Hey, I guess this sketch makes sense after all. Huh, go figure. Wednesday, April 05, 2006 So I figured since I posted an image of the back side of a female, I might as well post one of a man too. But truthfully I miss the art classes at the Academy and being able to draw from a live model for 6-12 hours a week. I loved going to the workshops and seeing how the rest of the students were progressing. And a little competition never hurt anyone either. I have been mulling it over that I should take a non-credit class at the local community college. At least that way I would be able to draw with a group again. But the only thing slowing me down is when can I find the time. That special thing that there seems to be so much of, yet not enough. Monday, April 03, 2006 I did this guy last week some time just to kill time. In the museum here in AZ there is a painting of a gladiator in an arena standing over a defeated foe and he is waiting for the thumbs up or down from a Caesar. That has always been a really important piece for me and I wish I could say why. I guess it just rounds up how we all feel in life some times. Defeated, tired,and unable to rise against our foes. And all we can do is lay there waiting for the finger of fate. Saturday, April 01, 2006 So I have done a few sketches now with people having tattoos. I myself have none. But I have nothing against them. On a subject they can be great. But my recent fascination with them has been strangely making its way in the sketches. But much like every time I have a need for them I soon get out of it and think it would have been a terrible idea. That's probably the reason I never could get one. That and I am so ADD that I couldn't sit there and think of one that I liked longer then 10 minutes. Hence the sketching and art in general. I might have a fear of commitment. Well... at least to ink.
{ "pile_set_name": "Pile-CC" }
AWB Components for Power Plants AWB, located in Lampertheim, Germany, has offered precision manufacturing of demanding components to its clients since 1995. AWB specialises in shaping special materials such as Inconel, Hastelloy and other Haynes materials, Stellite, as well as the manufacturing of safety-related components. In addition, AWB provides innovative logistic concepts and consulting services in the area of metal shaping. Due to a modern quality management system and extensive quality documentation, every individual component of AWB is traceable throughout the complete production and supply chain. AWB focuses first and foremost on the integrated support of its clients, with experts' collaboration in development projects, the continuous enhancing of manufacturing processes and the consulting of our clients in the realisation of large-scale projects; AWB is much more than just an ordinary contract manufacturer. AWB offers the following products and services: State-of-the-art precision manufacturing of alloyed materials Manufacturing of safety-related components Production of individual components and small batches with high flexibility and fast turn-around times Extensive quality documentation, quality assurance and traceability for individual components throughout the complete production and supply chain Execution of client orders by a single service provider and coordinated procurement of components manufactured by other companies for the purpose of streamlining the processes for our clients Offer of every technologically feasible production process due to close collaboration with subsidiaries and partners of AWB Production of large / complex steel and stainless-steel weldments by an AWB subsidiary in the Czech Republic Worldwide shipping and customs clearance Turbine components AWB provides a large product range in turbine / power plant technology. Our parts are used in industrial and gas turbines for commercial energy generation in a power range up to 400MW. Components for the turbine periphery, such as anchor bolts, weldments, air intake and air washing systems Tools for turbine installation and maintenance Precision manufacturing AWB offers precision manufacturing of components with an accuracy of up to +/- 5µm. In order to obtain accuracy at this high level, AWB uses state-of-the-art quality assurance processes throughout the complete production chain. Throughout the complete process of precision manufacturing, our clients profit from the high technical qualifications of our employees and the strict process control of AWB. The entire process of precision manufacturing is constantly monitored by our integrated computer systems. If required, AWB ensures the tractability of individual products. Some of the components used are: Hot gas components for gas turbines (burners, nozzles, etc.) Components shrunk into turbines (cooling tubes, nozzles, flanges) Assemblies of medical technology Parts and assemblies of submarine cables Special materials AWB has over 15 years of experience in the field of procurement and shaping of special materials like HIP Stellite, Inconel, Hastelloy, Titanate and other Haynes materials. When it comes to the procurement of special materials, one is able to choose from a large selection. AWB procures special materials from distributors or directly from manufacturers located domestically and abroad and stores them temporarily as needed. Some examples of materials AWB procures: Heat-resisting high alloyed steels, such as Inconel, Waspaloy, Hastelloy and other Haynes materials Salt-water-proof copper and brass alloys Acid-proof stainless steels for food and medical technology Other stainless steels of every quality class Titanium HIP Stellite, which has excellent mechanical properties Weldments and large components AWB manufactures weldments and large components with a weight of up to 25t. In this way, AWB applies its knowledge in the area of working with stainless and carbon steel, in order to manufacture high-quality weldments and large components. Examples for the components AWB manufactures in the field of weldments and large components: Air intake systems for gas turbines Bearing blocks for turbine rotors Lifting devices for entire turbines and turbine parts Engine frames Scaffolds and constructions of any kind High-quality management system It is AWB's philosophy to offer its customers the highest quality in all products and services. Therefore, AWB has created an extensive quality management system, which manifests itself in different ways: An extensive quality documentation that fits our clients' needs High-precision manufacturing, where quality assurance measures are used throughout the whole manufacturing process Many certifications, which acknowledge the internal quality management of AWB
{ "pile_set_name": "Pile-CC" }
In this interview, MAJ Vincent Amerena, US Army, Military Police; discusses his deployment to Iraq as a company commander for 428th Military Police Company in 2004 through 2005 in support of Operation Iraqi Freedom (OIF). MAJ Amerena recalls the...
{ "pile_set_name": "Pile-CC" }
Pages October 24, 2015 What Bernie Sanders’ Popularity Tells Us About The Democratic Party Actor and outspoken conservative James Woods blasted Democratic presidential candidate Sen. Bernard Sanders as a “complete moron” for his comments on China. Mr. Woods took particular issue with a tweet by the Vermont senator that read, “China — not exactly seen as a model when it comes to human rights — provides 14 weeks of paid maternity leave. The US provides zero.”
{ "pile_set_name": "Pile-CC" }