text
stringlengths
1
3.78M
meta
dict
Pattern production through a chiral chasing mechanism. Recent experiments on zebrafish pigmentation suggests that their typical black and white striped skin pattern is made up of a number of interacting chromatophore families. Specifically, two of these cell families have been shown to interact through a nonlocal chasing mechanism, which has previously been modeled using integro-differential equations. We extend this framework to include the experimentally observed fact that the cells often exhibit chiral movement, in that the cells chase, and run away, at angles different to the line connecting their centers. This framework is simplified through the use of multiple small limits leading to a coupled set of partial differential equations which are amenable to Fourier analysis. This analysis results in the production of dispersion relations and necessary conditions for a patterning instability to occur. Beyond the theoretical development and the production of new pattern planiforms we are able to corroborate the experimental hypothesis that the global pigmentation patterns can be dependent on the chirality of the chromatophores.
{ "pile_set_name": "PubMed Abstracts" }
The company I used to use stopped doing the f cup size and no where seems to do bigger sizes I found amoena online and was really pleased the bra I choose is comfortable & feminine thank you I will be buying more from amoena S M big bra I already have this bra in a smaller size and am very pleased with it, however, when remeasuring found that I needed a larger size. This proved TOO big and I had to return it. I F not quite right for me strong fabric.good vintage shape.not the right shape for me.have found softer gentler fabric.has transparent section it's a nice extra as often this is filled in especially in larger cup or back sizes. don't think my breast form showed through FH Perfect fit After following the sizing guide carefully, I discovered I'm a 40A not 38B! This is my favourite replacement out of 4, it lifts and shapes without feeling too firm or frumpy. Thoroughly recommended. F D Perfect fit Fits exactly as you'd expect Looks very natural with prosthesis Even though there's some pretty Netting/lace E M CSH I have three of these bras and I love the look, the fit and the comfort, however, soon after washing them the lining of the pockets started shredding from top to bottom. Rita non wire soft bra by Coral AllwrightI'm pleased to have discovered this particular bra on the Amoena website. Following a single mastectomy I have at last found a bra that is comfortable fit and to wear because it sits well in position- no uncomfortable sliding up. Supportive even in larger sizes! by CLare GummettI usually buy the bras with the widest straps etc - which then "creep" into view when wearing the slightest deeper neckline - this bra is light enough not to do that, but supportive enough for my needs - I will be buying more of these! Rita Non-wired soft Bra by JRExcellent and fitted perfect. Great everyday bra by PGI have worn the Rita bra for several years. It's very comfortable, with adjustable straps. It gives good support (I am a 34B). It has a smooth finish so can be worn under t-shirts or tight-fitting tops. And it's very comfortable. Rita bra by FTLovely product. However, just slightly tight for me, even though my usual size, so returned. Excellent returns process with pre paid address label included with product. Many thanks Rita bra by MDNice fabric, well fitting, comfortable and smooth under my clothes. rita by J Ospoilt for choice bought two white and a black one great to find nice bras in large sizes A practical everyday bra by L HThis is a very comfortable bra which is great for wearing under tee shirts as it offers a good shape and support. There are no frills but it is pretty nevertheless. Rita non-wired bra. by J LA very comfortable well fitting garment with comfortable straps and giving a nice shape. Thjs is my third purchase of this design, albeit in increasing sizes! Hope it is never discontinued. Rita Non-wired soft bra by V SLovely to look at and lovely to wear. So comfortable and a great fit. I'm very pleased with my purchase. Fantastic delivery as well. rita non wired bra by BVI have found this bra to be one of the most comfortable bras from the whole range. I have bought many of these bras. it would be nice if they were in more colour choices New Model - Same Comfort by JWI have used the Annabelle bra model (no longer available except in the USA) for several years. When I asked Amoena UK customer service what was a comparable model they recommended the Rita. Spot on. Comfortable from the first wearing. Another successful Amoena purchase by Joan WastnidgeJasmine is my third Amoena bra and I was pleased with the first two but I love this one even more; it is so pretty, lovely fabric and a very good fit. My pre mastectomy bras were never as good as these. Thank you Amoena. Jasmine Bra by Elaine WilsonExtremely comfortable considering I only had my surgery 2 weeks ago, although I do find it a little prices. Looks good by Christine StevensonA very pretty bra and a good fit, the only downside for me is the shoulder straps could be a little longer for extra adjustment, other than that very pleased with my purchase and would recommend it. Great Bra by Pamela BowmanThe Jasmin Bra is very pretty and fits me perfectly. The centre front is a little higher than other styles and covers my operation site well. I would really like it if more styles could be cut like this one because then I would have more choice. Lovely lacy style by Sandra WallerLovely lacy style and soft fabric. Very pleased with this bra. Jasmin non-wired bra by Jill BembridgeThe Jasmin looks really pretty and fresh. It felt comfortable straight away and was a good fit. it is also comfortable if you are just wearing a "softie". I am really pleased with my purchase. Excellent buy by Margarett ClarkThis is a really soft bra that does not cut in like many others do. It is an excellent fit. Jasmin non-wired soft bra by HSI love this bra which is available in an 36AA size and a perfect fit for me. It is very comfortable and nice and feminine. I really wish it was also available in other colours - a navy or black and a nice bright pink would be great! Jasmin bra by EAI have bought this bra for the last few years,so comfortable,apart from the label on the back,it is such a pretty bra and fits perfectly , hope it is one that is still continues to be stocked. repeat purchase by FCthis have been one of my favourite Bras for several years. Recently I have found the shoulder straps could be a little longer & the back fastening a little longer too to accommodate my Dowergers spine. Still a favourite though Comfy by JPI have bought the this bra many times. Comfortable and very pretty. It wears and washes well. It is however a little pricey. Satisfaite by npTrès bon produit envoyé rapidement satisfaction 100% Jasmin bra by pmI have had several Amoena bras over the years but this is my favourite by far! It is so pretty and very comfortable to wear. Would recommend it without hesitation! PM Good bra by CCMy favourite bra for 11 years! However, I'm disappointed that the previously all-cotton pockets are now part nylon. Please, Amoena, revert to the all-cotton pockets which were so much better for people like me who have a tendency to eczema. Jasmin by RZThe most comfortable bra in the range and pretty too. I do try other styles but Jasmin is always in my collection. Thank you Amoena. A real favourite by L MThis is my third Jasmine bra. It looks great, is stylish and comfortable. It certainly wont be my last. Pretty comfortable by D OThe bra is so light you'll hardly know you're wearing it but it's supportive too and, oh joy, it comes in AA fitting. One mark off for the label which I had to remove because my skin is ultra sensitive. Very comfortable by J SThis is a very snug fitting comfortably bra and looks lovely too. Jasmin by J T The lightest Amoena bra I have tried so far which is great especially in the hot weather. It doesn't give quite as smooth a line under T Shirts as some other bras but fine under less close fitting tops. Jasmin Bra by J H I have had several of these bras over the years and it is my bra of choice. One slight problem is that the label inside the back can sometimes tickle! Lovely and comfortable by M LJust bought this bra for the third time, very comfortable and pretty for every day use Favourite by E.BHave bought this bra for the last 12 years, but on finding I needed a larger size due to weight gain, have to put an extender on a 40A. Please make bigger sizes with A and AA cup for the smaller cup size ladies . Pretty and comfortable by MBVery happy with this pretty, well fitting bra. I wish it was in nude or cream too. This is the best of all the Amoema bras I have purchased so far, and I would like it in several colours. Excellent by KCWonderful but only available in black and white more colours please.... Mrs. by Julie VeenemanI bought my first Isabel 16 years ago while I was recovering from a double mastectomy. I have never even tried on another bra since. It has changed only slightly over the years. It is feminine and very well made. Because it washes perfectly it is very easy care. I wear double prostheses and the camisole hugs my frame allowing me to feel secure knowing there is no gapping. The camisole portion is very well made and the lace looks as though it were made to peek from a V tshirt or a button front blouse. It has never stretched out or shown wear before the other sections of the bra. I recommend trying it on, because even if you find another comfortable bra this lacy camisole is a very basic wardrobe piece. I have even recommended it to friends who wouldn't use the pockets!! Mrs. by Julie VeenemanI bought my first Isabel 16 years ago while I was recovering from a double mastectomy. I have never even tried on another bra since. It has changed only slightly over the years. It is feminine and very well made. Because it washes perfectly it is very easy care. I wear double prostheses and the camisole hugs my frame allowing me to feel secure knowing there is no gapping. The camisole portion is very well made and the lace looks as though it were made to peek from a V tshirt or a button front blouse. It has never stretched out or shown wear before the other sections of the bra. I recommend trying it on, because even if you find another comfortable bra this lacy camisole is a very basic wardrobe piece. I have even recommended it to friends who wouldn't use the pockets!! lovely bra with lace by Caroline HayneVery nice bra and perfect with a low cut t-shirt or dress. Very comfortable and feminine Comfort by JMThe Isabel non wired camisole is extreamly well designed for comfort and care. I have tried one other type,being in the Isle of Man I have to order on line.This is not a problem.I will continue to use this camisole bra. Many thanks for the choice Good fit by JCA very comfortable bra and fits well. Could do with a little more support.
{ "pile_set_name": "Pile-CC" }
Trench Warfare in Ww1 Trench Warfare in Ww1 World War 1 is perhaps best known for being a war fought in trenches (Grolier 94), ditches dug out of the ground to give troops protection from enemy artillery and machine-gun fire. In Erich Remarque's novel, All Quite on the Western Front, that is exactly how he described trench warfare. Remarque showed World War 1 as a war fought in trenches, which he depicted well leaving out only a few minor details. The trenches spread from the East to the West. By the end of 1914, trenches stretched all along the 475 miles front (Grolier 94) between the Swiss border and the Channel coast. In some places, enemy trenches were less than thirty yards apart (Stewart 40). Although trenches spread for many miles, their appearance varied. Upon looking more closely, one could see that each army's trench line was actually a series of three trenches. These three lines connected at various points by small, twisted trenches (Stewart 40). These three lines were called front, support, and reserve trenches. The front line trenches usually measured six feet and had a zigzag pattern to prevent enemy fire from sweeping the entire length of the trench. Between the two opposing front lines laid, an area called "No Man's Land" that measured from 7 yards to 250 yards in width. This area was littered with barbed wire, tin scrapes, and mines to reduce the chance of enemy crossing. The other two trenches (support, and reserve) were constructed to easily move supplies and troops to the front trenches. Trenches varied from six to eight feet in height (Simkin). After wet rainy days trenches would get filled with water. Soldiers called these "Waterlogged tr! enches." In these trenches, there was a need for extra support, wood boards, and sandbags were placed on the side and on the floor for extra support and a safe area for walking (Simkin). In spite of the fact that the trenches protected the soldiers, they stood no chance against the diseases. Body...
{ "pile_set_name": "Pile-CC" }
Q: MySQL: Add stoplist How could I add a own stoplist to MySQL 5? A: Guessing you're asking about how to set the stopwords list for MySQL FULLTEXT search, this portion of the manual page 11.8.6. Fine-Tuning MySQL Full-Text Search could interest you (quoting) : To override the default stopword list, set the ft_stopword_file system variable. (See Section 5.1.3, “Server System Variables”.) The variable value should be the path name of the file containing the stopword list, or the empty string to disable stopword filtering. The server looks for the file in the data directory unless an absolute path name is given to specify a different directory. After changing the value of this variable or the contents of the stopword file, restart the server and rebuild your FULLTEXT indexes. The stopword list is free-form. That is, you may use any nonalphanumeric character such as newline, space, or comma to separate stopwords. Exceptions are the underscore character (“_”) and a single apostrophe (“'”) which are treated as part of a word. The character set of the stopword list is the server's default character set; see Section 9.1.3.1, “Server Character Set and Collation”.
{ "pile_set_name": "StackExchange" }
Q: Show that a graph with with exactly 1 vertex of degree 1, contains a cycle I realize this question has been asked before, but I'm still confused about the answers, so bare with me. I was asked this question on an Exam recently, and tried to prove it by constructing the graph: "Start with a vertex $v_0$ which is the only vertex with degree 1, then it's neighbour $v_1$ must have degree at least 2, such that it must be connected to a vertex $v_2$ and $v_2$ $\ne$ $v_0$, and now $v_2$ having degree 2, either has an edge back to $v_1$, forming a cycle or is connected to another vertex $v_3$, and giving that the number of vertices is n, vertex $v_n$ must be connected to a vertex belonging to the set S, such that S={$v_1$, $v_2$, ........, $v_{n-1}$}, thus, the graph must have a cycle". My proof was dismissed as it didn't cover all possibilities, and i was told to never construct graphs in problems, always destruct them, which didn't make any sense, and still doesn't. What irritated me even more was that the proof that got the highest points, started with, and i quote: "Suppose that g is a connected acyclic graph, which has exactly 1 vertex of degree 1, so by definition of a tree, g must be a tree". Completely wrong, since a tree must have 2 vertices of degree 1. Which brings me to my second point. I saw other proofs that start with "Let G be a graph with exactly 1 vertex of degree 1, and let's assume it's acyclic" and then they go on to show that it contradicts with a tree having the longest path containing 2 vertices of degree 1. Now if we assume it's acyclic, doesn't that straight away contradict the theorem that says "A graph with 1 vertex of degree 1 must have a cycle" and we're done, nothing more to proof. One more proof i managed to come up with is as follows: "Since every vertex in this graph G has degree at least 2, then there must be 2 distinct paths between any 2 vertices in G, except for $v_0$ ($v_0$ being the only vertex with degree 1), and thus the graph must contain a cycle. I'm really confused about this question, it looks straight forward, but clearly not, apologies for ranting a bit, it's just frustrating. I hope somebody can clear the confusion. A: The idea of your proof is fine and can be adapted into a working proof. However it's character is that of a "constructive proof" so it's very important that all the steps in the conctruction be motivated and phrased well. Whatever issues there may have been probably lie embedded in your specific formulations and we don't have that. For example it feels a bit weird to talk about constructing a graph when what you really should be doing is investigate the object you've been given. Rather than saying you're constructing the graph you should phrase it as if the graph already exists and you're talking about that object. You're instead describing how one constructs the cycle given the graph. This sort of argument basically mirrors the proof of the existence (and uniqueness) of the greatest common denominator where you get a sequence of remainders where you eventually stop when you've reached your result so it's entirely legitimate. Regarding the other proof: What irritated me even more was that the proof that got the highest points, started with, and i quote: "Suppose that g is a connected acyclic graph, which has exactly 1 vertex of degree 1, so by definition of a tree, g must be a tree". Completely wrong, since a tree must have 2 vertices of degree 1. As stated its a bit of a clumsy formulation but the idea is still clear that its an "(indirect) proof by contradiction" and in terms of complexity it's probably the easiest way to prove this result. You assume there is a graph with only one vertex of degree 1 and no cycles and prove that such an object cannot exist (by contradiction), and then conclude all graphs with a single vertex of degree 1 have cycles (are not trees) The contradiction is the proof. One more proof i managed to come up with is as follows: "Since every vertex in this graph G has degree at least 2, then there must be 2 distinct paths between any 2 vertices in G, except for $v_0$($v_0$ being the only vertex with degree 1), and thus the graph must contain a cycle. Unless you refer to theorems which support the "Since"-claim this is just a statement without any justification and thus doesn't work as a proof. Also I'm not entirely sure that its true either at least not unless we say how distinct the paths are to be.
{ "pile_set_name": "StackExchange" }
Q: Why can not I use "TermDocumentMatrix"? Why can not I use "TermDocumentMatrix"? I used the following command to unify plural words in singular form, but I get an error. crudeCorp <- tm_map(crudeCorp, gsub, pattern = "smells", replacement = "smell") crudeCorp <- tm_map(crudeCorp, gsub, pattern = "feels", replacement = "feel") crudeDtm <- TermDocumentMatrix(crudeCorp, control=list(removePunctuation=T)) Error in UseMethod("meta", x) : no applicable method for 'meta' applied to an object of class "character" How should I solve it? 1. Is there a command to change from singular to cleaning? 2. Is this command I used wrong? I will attach the following code to the sentence processing and matrix. library(tm) library(XML) crudeCorp<-VCorpus(VectorSource(readLines(file.choose()))) #(Eliminating Extra Whitespace) crudeCorp <- tm_map(crudeCorp, stripWhitespace) #(Convert to Lower Case) crudeCorp<-tm_map(crudeCorp, content_transformer(tolower)) # remove stopwords from corpus crudeCorp<-tm_map(crudeCorp, removeWords, stopwords("english")) myStopwords <- c(stopwords("english"), "can", "will","got","also","goes","get","much","since","way","even") myStopwords <- setdiff(myStopwords, c("will","can")) crudeCorp <- tm_map(crudeCorp, removeWords, myStopwords) crudeCorp<-tm_map(crudeCorp,removeNumbers) crudeCorp <- tm_map(crudeCorp, gsub, pattern = "smells", replacement = "smell") crudeCorp <- tm_map(crudeCorp, gsub, pattern = "feels", replacement = "feel") #-(Creating Term-Document Matrices) crudeDtm <- TermDocumentMatrix(crudeCorp, control=list(removePunctuation=T)) example : my data 1. I'M HAPPY 2. how are you? 3. This apple is good (skip) A: Whyn't use below code for stemming & Punctuation removal? crudeCorp <- tm_map(crudeCorp, removePunctuation) crudeCorp <- tm_map(crudeCorp, stemDocument, language = "english") crudeDtm <- DocumentTermMatrix(crudeCorp) Hope this helps!
{ "pile_set_name": "StackExchange" }
Greengo papers are the most pure papers available. The papers are made of 100% Totally Chlorine Free paper pulp. The packages are made of 100% recycled material. On top of that, Greengo papers are made of FSC certified wood pulp. Greengo grinders are being made from recycled plastic. The most unique feature of this product is that the plastic once was used for packaging cannabis. These packages are returned by means of a deposit system and the base material is used to make grinders. This is not only very cool, it is also better for the environment! We call this upcycling! Take a look at the whole range of Greengo products.
{ "pile_set_name": "OpenWebText2" }
【びっくりサイエンス】 太陽系の外から来たことが人類史上初めて確認された天体が、実は宇宙人が送り込んだ探査機かもしれないとの説を、米国の科学者らが論文で提唱した。もし本当なら有史以来最大のニュースだろう。その可能性をめぐり議論が白熱している。 ■米ハーバード大「魅惑的なシナリオ」と発表 この論文は米ハーバード大の研究者2人が昨年11月に発表した。太陽系外から飛来したと確認された小天体「オウムアムア」が太陽に接近後、謎の加速をした原因について考察したものだ。太陽光の圧力を受けて加速した可能性を説明したのに続き、「より魅惑的なシナリオとしては、オウムアムアが宇宙人文明によって意図して地球付近に送られた、完全に操縦可能な探査機かもしれない」と驚きの見解を示した。 名門の同大で天文学科長を務める有力な研究者が著者の1人だったことや、権威ある学術誌に掲載されたこともあり、一気に注目を集めた。 ネット上では「本当なら人類史上最大の発見」「太陽系の外には、こんなのがたくさん行き交っているのでは」などの肯定的な反応から、「この天体から微弱な電波すら確認できていないので、宇宙人のものということはまずない」「仮に自然の天体だとしても、この説は宇宙人に対する関心を維持するのに効果的だ」といった冷めた意見まで、一般人や科学者の間で議論百出の状況が続いている。 ■細長い形状、謎の加速 オウムアムアは2017年10月、米ハワイ大などのチームが望遠鏡で発見。太陽系の天体では考えられない猛スピードで移動していることから、軌道などを詳しく調べたところ、太陽系の外から旅してきた「恒星間天体」と結論づけられた。 この発見を科学者らは「太陽系以外の星を理解する手がかりになる」と大歓迎した。オウムアムアの命名はハワイの言葉の「最初の偵察者」に由来する。
{ "pile_set_name": "OpenWebText2" }
Meg: A Novel of Deep Terror Meg: A Novel of Deep Terror is a science-fiction horror novel by Steve Alten, and was first published in July 1997. The novel, along with its sequels, follows the underwater adventures of a Navy deep-sea diver named Jonas Taylor. In 2018, a film adaptation titled The Meg, was released. A revised and expanded version of the novel (also containing the prequel Meg: Origins) was also released to coincide with the film's debut. A graphic novel adaptation was also released in 2019 by Steve Alten, J.S. Earls, and Mike Miller. Plot summary (Revised and Expanded Edition) In the novel's prologue, taking place during the Late Cretaceous Period, a Tyrannosaurus rex stumbles into the ocean while pursuing a herd of Shantungosaurus, and is promptly attacked and devoured by a Megalodon. This is later shown to be part of a slideshow by Jonas Taylor, a paleontologist and marine biologist for his presentation on Megalodon. In 1997, Jonas is working deep in the Mariana Trench with the United States Navy. His mission is top secret and involves confirming the existence of an extinct species of shark known as the Megalodon, a predator that could grow up to 20 meters in length. While on the dive, Jonas watches in horror as a Megalodon rises from the depths, Jonas surfaces as fast as is safe and escapes, but causes death of a few of his crewmates as a result; unfortunately, the Navy does not believe his claims, labeling him a madman and ruining his career while simultaneously covering up the discovery. Years later, Jonas continues to try to prove that what he saw was real. This has also led Jonas to push away his estranged and separated wife, Maggie, and leads to her having an affair with his billionaire friend. He is later approached by a friend, marine biologist Masao Tanaka, who lost a remote submarine in the Mariana Trench and hopes to retrieve it. Seeing this as an opportunity to prove that the Megalodon still exists, Jonas agrees to help Tanaka, over the objection of Tanaka's daughter, Terry. When they arrive at the Trench, Jonas and Tanaka's son, DJ, dive in small submersibles. A male Megalodon rises from the depths and, despite Jonas' attempts to distract the creature, kills DJ. Jonas watches in horror as the Megalodon is trapped in the steel cables connecting DJ's sub to the ship. As the Megalodon is pulled to the surface, Jonas watches a second Megalodon, a much larger female, rise out of the Trench. She attacks the male and feeds on him as he is pulled to the surface, his heated blood protecting her from the cold water layer that has previously kept them from entering the wider ocean. Jonas and Tanaka are worried about the imbalance in the ocean's ecosystem that might result from the re-introduction of a Megalodon after an absence of millions of years. As Jonas and Tanaka try to track down the Megalodon, the female surfaces off the coast of Maui and kills several surfers. She also attacks a helicopter that Jonas uses to try and track her at night after discovering that thousands of years of living in the depths of the Trench has led the sharks to develop bioluminescent white hides and destroys a military submarine led by Taylor's commanding officer from his time in the Navy. Jonas and Tanaka come to the realization that the female Megalodon is pregnant, and are determined to capture her before she gives birth. Maggie seizes this opportunity to advance her career and decides to film the shark from within a shark cage as she swims to California to give birth. During her sojourn north, the shark gives birth to three pups. At the Farallon Islands, Maggie uses a dead whale to attract the shark, succeeding in filming it, but inadvertently causes it to attack her cage. Despite his best efforts, Jonas is unable to stop the shark and rescue Maggie, leading to the creature devouring her as she tries to escape. Jonas and Tanaka track down the female after she attacks a whale-watching boat shortly after. After tranquilizing the shark and capturing her, Taylor's vengeful superiors and Maggie's lover try to kill the shark with a homemade depth charge, causing the shark to awaken and rampage, killing dozens of witnesses and bystanders including Taylor's superiors themselves. While the Megalodon is rampaging, Jonas pilots a submersible down her throat and into her stomach, where he uses the hydrogen supply from his sub to ignite the whale blubber inside the shark's stomach, burning it from the inside out. The survivors in Jonas and Tanaka's crew capture the last surviving Megalodon pup as Jonas is taken away to be treated for decompression sickness from his fight with the adult shark, and are excited about the opportunity to study this believed-extinct creature in the flesh. Sequels The novel spawned a series with these sequels: The Trench MEG: Primal Waters MEG: Hell's Aquarium MEG: Origins MEG: Night Stalkers MEG: Generations MEG: Purgatory (announced at the end of MEG: Generations) Film A film based on the novel had been mired in development hell since 1997. At one point, reports surfaced that the film was slated for a 2008 release date and was to be made by New Line Cinema, which had recently bought the rights from Alten. Names that were attached to the project included Jan de Bont and Guillermo Del Toro. However, in July 2007, New Line cancelled the production. Steve Alten had said that once his relationship with New Line was finally over, he would be taking the property elsewhere. The rights eventually reverted to Alten, but the film remained in development hell. In 2011, Alten made a comment on his sparsely updated website. Along with the announcement that he would be releasing a prequel novella called MEG: Origins, Alten indicated that he was holding back the release of his next entry in the series MEG: Night Stalkers to time with the release of the film. On January 2, 2015, Alten appeared on Coast to Coast AM radio with George Noory and said that a film based on MEG was back on track. On June 16, 2015, Eli Roth was announced to direct the film adaptation. He left the project due to creative differences. On March 3, 2016, ComingSoon.net reported that director Jon Turteltaub (National Treasure) has since been in talks to helm the movie adaptation of Steve Alten's MEG. On April 14, 2016, various media outlets reported that action star Jason Statham would be taking the lead role of Jonas Taylor in the upcoming film. In July 2016, Jessica McNamee and Ruby Rose also joined the cast of the film. The film was initially due to be released on March 2, 2018, but the film was ultimately released on August 10, 2018. References External links MEG novel homepage Belle Avery Talks the Long-delayed 'Meg'! Category:1997 American novels Category:Fictional sharks Category:Meg series Category:Novels by Steve Alten Category:American science fiction novels Category:Novels set in Oceania Category:American novels adapted into films
{ "pile_set_name": "Wikipedia (en)" }
Hermelin Hermelin may refer to: Beate Hermelin (1919-2007), German-born experimental psychologist Paul Hermelin, French businessman and CEO of Capgemini Hermelín, cheese made in Sedlčany, the Czech Republic S73 Hermelin, Gepard-class fast attack craft of the German Navy
{ "pile_set_name": "Wikipedia (en)" }
The blog will offer purely objective and candid analyses for a better understanding of the events that keep happening and that provide dynamism and direction to the flow of the history and development of the human societies. Being a forum, the comments and opinions from readers whether for or against the views expressed in it, are gratefully welcome. Suggestions for improving the blog are welcome. Sunday, April 24, 2016 General Raheel Sharif is a true Patriot April 22, 2016 By Saeed Qureshi In the aftermath of Panama Leaks, General Raheel Sharif the incumbent Pakistan’s Chief of Army Staff has made one very important announcement as well as took a landmark decision. In his momentous address delivered on April 19 at the military’s Signal Regimental Center in Kohat, Khyber Pakhtunkhwa he pleaded that “the on-going war against extremism and terrorism cannot bring enduring peace and stability in the country unless the menace of corruption is uprooted”. General Sharif who will retire in November 2016 has declined his extension of service. There cannot be a more truthful and poignant analysis of the malaise of deep-rooted corruption and its ominous impact on the war on terrorism and uprooting of crime violence in Pakistan. General Raheel further emphasized the “need for across the board accountability to secure a better future for generations to come and also for the integrity, solidarity and prosperity of Pakistan”. His unprecedented and most applauded decision is to send 12 army officers on forced retirement against charges of corruption and misuse of power. Among these 12 officers are six high-ranking military officers, including a lieutenant general and a major general. The forcibly retired army officers have been asked to return all earnings accumulated through corruption and unfair means. This action is being admired by the civil society, politicians, business circles, media and the people at large. The army thus far has been considered as a holy cow not to be touched for probe or for any legal action whatsoever. But this taboo has been broken by the current COAS who has brought both the civilians and the army at one plank which sets a watershed and splendid tradition of the “across the board accountability” of the corrupt individuals whether in Khaki or the civilian attires. In 2012,Transparency International(TI) calculated that Pakistan had lost more than Rs 8.5 trillion (US$94 billion) in corruption, tax evasion and bad governance in the PPP-led coalition government from 2008 to 2013 (Wikipedia). There has never been an effective and unassailable accountability mechanism that could make headway in rooting out this diabolic curse of corruption keeping Pakistan governed badly, economically poor and socially backward. Now the ball is in the court of our civilian leadership. The government should follow the shining example set up by inimitable General Sharif to unfurl a comprehensive plan and strategy for catching and punishing the corrupt elements in all spheres of society who robbed the national exchequer, got the huge loans written off , who opened offshore accounts to conceal their assets and income and amassed wealth through foul and dishonest means. The prime minister’s announcement to constitute an accountability commission under the chief justice of Pakistan for probing corruption is the first step in the right direction. But catching of the bull of corruption by horn is not that much simple. There are countless powerful lobbies and influential individuals involved in persistent corruption for decades. There has to be a nationwide gigantic effort and unrelenting drive to uncover and punish the delinquents of all shades involved in the wholesale and uninhibited corruption, bribery and misuse of power. In this regard the judicial system has to be strengthened because judiciary is infested with black sheep that sell their honor and professional integrity and dish out verdicts for the highest bidders on the basis of their relations and friendship or under the political pressure. In a 2011 survey, TI Pakistan identified judiciary as “the most corrupt institution in Pakistan alongside police where the highest amounts of bribery were spent on people affiliated with the judiciary and police”. In the domain of education the ghost schools and absentee teachers have robbed the provincial and federal governments of billions of rupees. The bureaucracy in Pakistan has been in the forefront in misusing their authority and administrative clout and power for kickbacks and huge grafts. The people and the public should be encouraged and protected to come forward and reveal the scams, cases of corruption and bribery and illicit deals and show of favoritism by officials and departments at the cost of the national or public interests. Similarly the cadres of police have to be strengthened, retrained and mobilized to catch the culprits with professionalism, courage and without any fear of being sacked or harmed in any way. In fact it is a colossal and gigantic national mission and crusade to be launched for cleaning the society of gross malpractices, highhandedness of bureaucracy, of politicians, and members of parliament, influential feudals, senators and bigwigs in Pakistan. This is a lifetime chance for cleansing the stables and dens of corruption, the violation of law and rules and endemic despicable culture of favoritism and vested interests. If no cue is taken from General Raheel’s milestone and historical initiative, there cannot be another chance to cure the diseased society of Pakistan assailed by opportunists, bounty hunters, bribe takers and agents of sleazy character. The national accountability Bureau or to be newly established judicial commission or both jointly should, first of all, probe the following mega cases of financial fraud, misconduct and robbing the national exchequer of billions and trillions of rupees. The financial losses due to corruption in PIA alone have been around $ 500 million. Massive financial losses due to mismanagement and embezzlement of funds have also been reported in Pakistan Railways. Also the usurpation of millions of acres of official land including that of Railways, illegal and out of turn allotments of plots, sale of water by PPP ministers in Karachi, the patronage by politicians of extortionists, target killers, criminal gangs and mafias need probe and punishment. Those found guilty of fraud, and corruption should be punished with confiscation of their assets, properties, and lands and long jail terms. The guidelines, reforms and road-map should be handed out by commissions manned by experts for good governance, to ensure accountability and to ward off re-occurrence of misuse of power, sway of crime and financial scams. About Me Columnist/Analyst/ Former Diplomat. After obtaining my master’s degrees in Urdu and English literature from Punjab University, I started my career by teaching in a college. Thereafter, I had a stint in the diplomatic service of Pakistan. Finally I landed in journalism, an occupation that I am wedded to for over 20 years now. I am a strong believer in a civil society and staunch opponent of exploitation in all forms.
{ "pile_set_name": "Pile-CC" }
Q: Updateable Data Grid using Linq to SQL in WinForms I'm populating a datagrid using Linq--standard kind of stuff (code below). For some reason however my ultraDataGrid is stuck in some kind of read-only mode. I've checked all the grid properties I can think of. Is that a result of binding to a Linq data source? Anyone have example code of an updatable grid that uses Linq? db = New DataContext myData = New dataClass dataUltraGrid.DataSource = From table _ In db.profiles _ Select table.field1, table.field2... A: Found the solution: use lambda expressions to filter the entity and bind directly to the entity.
{ "pile_set_name": "StackExchange" }
Detection and quantized conductance of neutral atoms near a charged carbon nanotube. We describe a novel single atom detector that uses the high electric field surrounding a charged single-walled carbon nanotube to attract and subsequently field-ionize neutral atoms. A theoretical study of the field-ionization tunneling rates for atomic trajectories in the attractive potential near a nanowire shows that a broadly applicable, high spatial resolution, low-power, neutral-atom detector with nearly 100% efficiency is realizable with present-day technology. Calculations also show that the system can provide the first opportunity to study quantized conductance phenomena when detecting cold neutral atoms with mean velocities less than 15 m/s.
{ "pile_set_name": "PubMed Abstracts" }
In the year of its 50th anniversary, the 25th Amendment is suddenly seeing a surge in relevance — so much so that there are even reports of the White House itself taking notice. This has been precipitated, of course, by a recent bill sponsored by Democratic Rep. Jamie Raskin of Maryland, one that would create a congressional “oversight” commission which could declare President Donald Trump to be incapacitated under the 25th amendment and consequently remove him from office. As Raskin explained to Yahoo News, “In case of emergency, break glass. If you look at the record of things that have happened since January, it is truly a bizarre litany of events and outbursts.” The 25th Amendment was ratified in the immediate aftermath of President John F. Kennedy’s assassination, with the goal of providing a thorough outline for what should happen in the event that the president or vice president should be killed, incapacitated or resigns from their office. It was officially ratified on February 10, 1967. The section of the amendment that pertains to Raskin’s bill states that “whenever the Vice President and a majority of either the principal of the executive departments, or of such other body as Congress may by law provide, transmit to the president pro tempore of the Senate and the speaker of the House of Representatives their written declaration that the President is unable to discharge the powers and duties of his office, the Vice President shall immediately assume the powers and duties of the office as acting President.” Although no sitting president has been deemed incapable of running the country in this fashion, there have been recent presidents about whom scholars argue such a declaration could have been made. These include Woodrow Wilson, who suffered a debilitating stroke in 1919 (before the 25th amendment had been ratified), and Richard Nixon, who succumbed to severe alcoholism in 1973.
{ "pile_set_name": "Pile-CC" }
This application claims the benefit under 35 U.S.C. §119(e) of provisional application Ser. No. 60/758,509, filed Jan. 11, 2006, which application is hereby incorporated herein in its entirety. 1. Field of the Invention The present inventions relate generally to the field of regulated pay computer-controlled games, either games of skills or games of chance. 2. Description of the Prior Art and Related Information Existing models for betting within electronic games of chance such as video poker or multi-line slot machines are limited, as players are conventionally only offered high-level bets that apply across a number of potential onscreen events in each game. This betting model applies to multi-line slot machines, in that players are conventionally able to manipulate their bet sizes globally, across a number of pay lines, but are unable to assign specific bet sizes to each payline or to selected individual pay lines. This conventional betting model also applies to most video poker machines, in that players are able to manipulate their bet sizes across a number of potential reward-generating hands, but are not able to assign specific bets to specific hands.
{ "pile_set_name": "USPTO Backgrounds" }
The present invention relates to a power supply connector particularly suitable for electric motors. As is known, in order to supply power to electric motors, and particularly to submersed motors, hermetic connectors are commonly used which are composed of two portions that can be mated mechanically, one shaped like a plug and the other one shaped like a socket, which connect in a protected manner the electrical contacts of the motor to the power supply line derived from the mains. Generally, this type of connector offers only an electrical insulation between the outside environment and the conductors that are live, without applying any action to the power supply line. However, in order to avoid radio interference and overvoltages, filters constituted by simple electronic circuits arranged at the windings and provided in practice by means of varistors, gas-filled diodes or other electronic components, are usually inserted in the power supply circuit of electric motors. The fitting and wiring of these filters is generally performed by specialized personnel, which must install them by repeating a series of operations which, in addition to considerably affecting production times, may lead to errors in the connections, with consequent malfunction of the motors.
{ "pile_set_name": "USPTO Backgrounds" }
Earlier this season, ESPN writer Zach Lowe revealed a mostly innocuous bit of inside basketball chatter when he published an exchange he had with a Spurs official regarding the team’s move for Pau Gasol. I was underwhelmed [with the Gasol signing]. He was astonished anyone could feel that way about even the creaky, aging version of Gasol. "He knows how to play," the official said. He kept repeating that. He seemed confused that I didn't find "knowing how to play" a super-compelling reason to sign someone. Lowe’s skepticism with such a basic explanation for an expensive and somewhat lengthy investment in a player in the twilight of his career isn’t all that disagreeable. But as he later noted, seeing five players who know how to play operate on the court together looks a lot more impressive than it sounds. The Spurs released another exclusive deal for PtR readers who want to watch the Celtics play in San Antonio. When searching for reasons why the Spurs find themselves third in the tough, if slightly diluted, Western Conference after a quarter of the season despite Tony Parker’s lengthy absence and Kawhi Leonard’s ongoing recovery, the most obvious answers are the tremendous individual play from LaMarcus Aldridge and their savvy and collective defensive approach. The easiest answer, however, might just be that the Spurs still have a bunch of guys who know how to play. Because when you have a bunch of guys who know what they are doing, brilliant, beautiful and, perhaps most importantly, simple basketball materializes naturally, almost out of thin air. This is the essence of patient basketball. All five guys touch it. Everyone on the perimeter holds it longer to make the defense react until the best shooter is open in the best spot. pic.twitter.com/SB3TwWzSmy — J.R. Wilco (@jollyrogerwilco) November 30, 2017 Two minutes into San Antonio’s game against Memphis on Wednesday night, Tony Parker pushed the ball up the floor after Pau Gasol secured a defensive rebound. Within 10 seconds, the ball had rotated from one side to the other, every Spur on the floor had touched the ball and San Antonio had acquired one of the most efficient shots in basketball without calling a play or setting a single screen. Parker's initial pass ahead to Danny Green helps set the tone for the Spurs on this possession, and even though it seems completely harmless, it is critical because it sets Memphis back a split second as the Grizzlies attempt to get organized defensively. It might be easy to overlook, but with the Spurs, tiny cuts so often prove to be fatal.. As Danny receives Parker’s pass on the left wing, JaMychal Green gets his arms high so Danny has no space for his favored transition three. Crucially, though, Green-on-Green is not the defensive matchup Memphis is looking. JaMychal is supposed to be guarding LaMarcus Aldridge, whose rim run off the rebound has forced a cross match with Tyreke Evans. In the time it takes for Danny Green to pass the ball up to Pau Gasol, who was the last Spur to arrive in the front court after securing the rebound, at the top of the key, JaMychal Green and Evans will recognize the need to switch and start moving toward their correct man. Knowing how deadly a passer Pau Gasol can be, Evans hangs around on the backside of Aldridge for an extra beat to ensure JaMychal Green can get into position to deny an entry pass to Aldridge. Unfortunately for Memphis, once they started switching, Gasol wasn’t looking to find Aldridge down low, because the Grizzlies’ desperate swap had just opened an even more profitable set of possibilities. Instead of looking inside, Gasol tossed the ball back to Green, who was open again on the left wing. As Green catches the ball and brings it into his shooting pocket, you can tell he has already spotted Evans sprinting at him to close out, exposing his vulnerability to the baseline drive. When Green puts the ball on the floor, showcasing his improved handle with a confident lefty drive, JaMychal Green lurks off of Aldridge on the baseline, Marc Gasol cheats off of his brother around the free throw line and an overeager Dillon Brooks darts from the opposite wing toward the paint. Danny Green has made incredible strides as a finisher this season, but he’s not LeBron James, and now that the Grizzlies have all five defenders in or around the paint, he makes the simple pass to Pau Gasol at the top of the key. From here, the Grizzlies are in scramble mode, and though you might have expected the peak Grit-n-Grind Grizzlies to scrap their way into the right spots to at least contest the Spurs on this possession, without the insane lateral quickness and impressive defensive instincts of Mike Conley and Tony Allen on the perimeter, Memphis was left chasing shadows as the Spurs unleashed a trademark string of hot potato passes. Kyle Anderson’s role here is small, but significant. He never lifts the ball to shoot, instead pausing until the very second JaMychal Green took a single step in his direction. As soon as that commitment was made, it meant Aldridge would be free in the corner, and given Anderson’s recent playmaking form, you’d bet your house on him making the that final dish. Aldridge's intellect on this play is commendable as well. Having started the possession with somewhat of a faux post-up on the smaller Evans, which forced that crucial switch early on, watch him as he drifts toward that corner spot as soon as JaMychal Green's attention is stolen away on Danny Green's drive. It's a basic but vital spacing concept, and his awareness of the situation is impressive; he recognizes how the dominoes are going to fall as soon as Green kicks the ball to Gasol and positions himself properly for the best possible shot. The benefit of his time with the Spurs is that he has become accustomed to taking a couple of extra steps back for the corner three, whereas that baseline mid-ranger used to be his bread and butter in Portland. In the end, these were just three points of a season-high 41 that Aldridge poured in against Memphis, but even though Aldridge hit a number of more difficult (and more important) shots in this game, I wouldn't argue with you if you said this bucket was his most enjoyable. So much of San Antonio’s success during the Gregg Popovich era has been derived from a group of individuals mastering the simplicities of the game, which leads to a collective effort that is often too complex for the opposition. In other words, the Spurs just know how to play the game.
{ "pile_set_name": "OpenWebText2" }
Cyber Warfare Publisher's Summary In poll after poll, one of the threats facing our nation is the use of a cyber attack to cause a grid-down scenario. There are many bad actors on the international stage capable of cyber terror on a massive scale. The list is long, including Russia, China, North Korea, Iran, Syria, and now even terrorist groups like ISIS. Each is capable of wreaking havoc in the US by shutting down our power grid and enjoying the resulting chaos. No bombs. No bullets. No swordfights. Just a few keystrokes on a computer. And we're done. Cyber Warfare is a primer on the threats we face as a nation from the bad actors mentioned above. It explores the history of cyber attacks and discusses the nuances of the terminology. The policies of the United States and its allies have evolved over the past decade. The problem of attribution is explored, as cyber space allows hackers a convenient place to hide. The all-important issue is raised: When does a cyber attack become an act of war? After a thorough review of the threat a cyber war poses for America, in particular on the nation's critical infrastructure, Cyber Warfare will provide preparedness solutions. Sorry for the Short Delay Unfortunately, that depends on our systems, and they're keeping it to themselves. It could take a few minutes, but there's a chance it will be longer. We recommend that you check back with us in a few hours, when your title should be available for download in My Library. We appreciate your patience, and we apologise for the inconvenience. See More Like This Customer Reviews Most Helpful Stop advertising your site every few chapters! A few valid point about cyber threats and prepping but I didn't buy the book for general tips on prepping and did not pay for the author to try and subliminally get me to buy from their prepping website!
{ "pile_set_name": "Pile-CC" }
Q: Moving a 2D numpy subarray efficiently I have a numpy array that represents a greyscale image, such as image = numpy.array([ [.0, .0, .0, .0, .1, .3, .5, .0], [.0, .0, .0, .0, .4, .4, .6, .0], [.0, .0, .0, .0, .3, .3, .7, .0], [.0, .0, .0, .0, .0, .0, .0, .0], [.0, .0, .0, .0, .0, .0, .0, .0], [.0, .0, .0, .0, .0, .0, .0, .0], ]) I would like to move a sub-array to a new location, filling the values left behind with some constant (say 0.0). For example, moving the 3x3 sub-array from center position of (1, 5) to center position (3, 3) would result in: numpy.array([ [.0, .0, .0, .0, .0, .0, .0, .0], [.0, .0, .0, .0, .0, .0, .0, .0], [.0, .0, .1, .3, .5, .0, .0, .0], [.0, .0, .4, .4, .6, .0, .0, .0], [.0, .0, .3, .3, .7, .0, .0, .0], [.0, .0, .0, .0, .0, .0, .0, .0], ]) Is there an efficient way to perform such a move? A: Since you know the starting index of where you want to move from and move to, we can use np.zeros_like and numpy indexing: h = w = 3 sub = image[0:0+w,4:4+h] out = np.zeros_like(image) Then assign: out[2:2+w, 2:2+h] = sub Output: array([[0. , 0. , 0. , 0. , 0. , 0. , 0. , 0. ], [0. , 0. , 0. , 0. , 0. , 0. , 0. , 0. ], [0. , 0. , 0.1, 0.3, 0.5, 0. , 0. , 0. ], [0. , 0. , 0.4, 0.4, 0.6, 0. , 0. , 0. ], [0. , 0. , 0.3, 0.3, 0.7, 0. , 0. , 0. ], [0. , 0. , 0. , 0. , 0. , 0. , 0. , 0. ]])
{ "pile_set_name": "StackExchange" }
281 F.Supp. 191 (1968) Harold EIDINOFF, M. D., Petitioner, v. Archie M. CONNOLLY, M. D., Superintendent of Rusk State Hospital, Respondent. Civ. A. No. 5-383. United States District Court N. D. Texas, Lubbock Division. January 25, 1968. *192 Willis Jarrel, Tyler, Tex., for petitioner. R. L. (Bob) Lattimore, Asst. Atty. Gen., Austin, Tex., Wallace B. Boling, Dist. Atty., El Paso, Tex., for respondent. OPINION WILLIAM M. TAYLOR, Jr., District Judge. On June 11, 1959, Harold Eidinoff was indicted by a grand jury in El Paso County, Texas, for the offense of murder with malice in the shooting death of one Theodore Andress. On Eidinoff's motion for a change of venue the district court in El Paso transferred the case to Lubbock, Texas. Eidinoff filed a motion requesting a pre-trial hearing on the issue of his sanity at the time he committed the shooting.[1] A district court in Lubbock, Texas, impaneled a jury which, after hearing the evidence, returned a verdict of insanity at the time of the act and insanity at the time of the hearing.[2] The jury's verdict of insanity at the time of the act operated as an acquittal of the charge of murder; the verdict of insanity at the time of the hearing required that Eidinoff be committed to a state mental hospital until he became sane.[3] The district court in Lubbock committed Eidinoff to the Rusk State Hospital on November 19, 1959. At all times since that date Eidinoff has been confined in the maximum security unit of Rusk Hospital. On August 28, 1961, Eidinoff filed in the county court of Cherokee County, Texas, a petition for reexamination and for a hearing to determine whether he required continued hospitalization as a mentally ill person. A six-man jury in the county court was unable to reach a verdict and a mistrial was declared.[4] In August 1962, another hearing was held on the 1961 petition. After hearing more than 4 days of testimony, which produced a record of some 560 pages, the jury found that Eidinoff was mentally ill and that he required further hospitalization for his own protection and for the protection of others. Judgment was entered on the jury's verdict on October 18, 1962, and no appeal was taken therefrom. On October 29, 1962, Eidinoff filed an application for a writ of habeas corpus in the United States District Court for the Eastern District of Texas, alleging that he was sane and not mentally ill and was being illegally confined in the Rusk Hospital. The district court dismissed the application because state remedies had not been exhausted. On April 24, 1963, Eidinoff filed another writ application in the Eastern District of Texas, restating the allegations of his former petition and further alleging that the state remedies available to him were inadequate to protect his constitutional rights. On June 20, 1963, the district court dismissed the application, finding from the transcript of the Cherokee County proceedings that ample *193 evidence existed to support the jury's verdict. The district court also concluded that the Texas procedures available to Eidinoff were an effective means for resolving his mental status. Upon receiving the order of the district court dismissing his application, Eidinoff sought to file another petition for reexamination and hearing in the county court of Cherokee County. The county judge exercised the discretion accorded him by the Texas Mental Health Code to deny such a petition if filed within two years of judgment entered on a previous petition,[5] and refused to accept the petition for filing. This action of the county judge was made the basis of another federal writ application filed by Eidinoff in the Eastern District on September 24, 1963. The district court dismissed the application on October 16, 1964, stating that Eidinoff had available in the state courts the writ of mandamus to correct any wrongful action by the county judge. On July 10, 1964, prior to the entry of the district court's order, Eidinoff filed another petition for reexamination and for a hearing in the county court of Cherokee County. On Eidinoff's application for change of venue, the proceeding was transferred to the county court of Smith County, Texas. In the petition filed in this cause Eidinoff alleged that he was "sane" under the M'Naghten test and therefore entitled to his release. The state's attorney excepted to the allegation of sanity on the ground that "mental illness" was the relevant standard in a reexamination hearing.[6] The county court sustained the objection, whereupon Eidinoff voluntarily dismissed the cause and took a non-suit.[7] On that same day, and while in custody of the sheriff of Smith County, Eidinoff filed an application for a writ of habeas corpus in the district court of Smith County. For some reason the writ was made returnable by the district court for November 8, 1965, more than a year later. The application was not heard on that day. On December 23, 1965, the state filed a motion to dismiss the application. After a hearing on the motion to dismiss, the district court, on December 30, 1965, entered an order dismissing the writ application. The dismissal was appealed by Eidinoff to the Texas Court of Civil Appeals, Tyler Division, wherein he prayed that the order of dismissal be reversed and the cause remanded to the district court "to hear the case on the merits and determine whether he is now sane and entitled to release." While awaiting the appeals court to render its decision, Eidinoff filed, on September 17, 1966, another writ of habeas corpus in the Eastern District of Texas. On September 26, the district court dismissed the application because Eidinoff was in the process of pursuing an appeal in the state courts, the determination of which was necessary to satisfy the doctrine of exhaustion of state remedies. On October 20, 1966, the Court of Civil Appeals dismissed the appeal for want of jurisdiction, stating that the dismissal order was not a final order and was not *194 appealable. Ex parte Eidinoff, Tex.Civ. App.1966, 408 S.W.2d 540, 542. Eidinoff then applied for a writ of error to the the Texas Supreme Court. The high court denied the application "No Reversible Error."[8] Certiorari was denied by the Supreme Court of the United States, Eidinoff v. Kreimeyer, 1967, 386 U.S. 905, 87 S.Ct. 898, 17 L.Ed.2d 801. The proceeding which led to an application for writ of habeas corpus being filed in the Northern District of Texas was commenced by Eidinoff on August 8, 1966, in the state district court in Lubbock, Texas, from which he had been originally committed. Apparently pursuant to a 1966 revision of the Texas Code of Criminal Procedure, Eidinoff filed in the Lubbock court an application for a sanity hearing. This procedural revision, Article 46.02, provided that persons committed to a state hospital on a finding of insanity in a criminal proceeding could be released from the hospital on a jury finding of sanity in the committing court, but only after the superintendent of the hospital certified to the trial court that the patient was sane. Eidinoff's application for a hearing was not accompanied by a certification of sanity by the superintendent of Rusk Hospital and, on August 15, 1966, the district court in Lubbock denied his application for that reason. It was following this action by the district court in Lubbock that Eidinoff filed the writ application in the Eastern District of Texas on September 17, 1966, which was dismissed while the Smith County habeas corpus case was on appeal, discussed, supra. Following the denial of certiorari in the Smith County case by the Supreme Court of the United States on February 13, 1967, Eidinoff filed the present habeas corpus application in the United States District Court for the Northern District of Texas. The essence of petitioner's claimed constitutional encroachments relates ultimately to the proposition that he is presently sane and his confinement in the state hospital is violative of the Fourteenth Amendment. The many issues which necessarily precede the substantive determination of Eidinoff's sanity are relative to the procedures to which persons adjudged criminally insane have been given recourse by the State of Texas to secure their release from state mental hospitals. Of these procedures some are challenged as infringing on liberties guaranteed by the Fourteenth Amendment to the Constitution of the United States. Eidinoff contends that Article 46.02 of the 1966 Code of Criminal Procedure is the exclusive procedure by which he may obtain a jury trial to assess the validity of his continued confinement. He claims that this statute is unconstitutional for the reasons that (1) there is no standard set by which the head of the hospital is to make his determination that a patient is presently sane; (2) there is no procedure provided for hearings to be held by the head of the mental hospital to which he is committed to determine his present sanity; (3) there is no assurance accorded the petitioner that the opinion of the head of the hospital is correct in its conclusion; (4) there is no provision for an inmate to furnish witnesses at a hearing before the head of the hospital; (5) there is no provision for a jury trial to determine the present sanity of petitioner; and (6) there is no provision for an appeal from the decision of the head of the hospital. Petitioner asserts that the superintendents of Rusk Hospital have acted arbitrarily and capriciously in refusing to certify his sanity to the committing court and that due process of law has been denied him by the State of Texas in requiring him to establish that he is not mentally ill and is not a danger to himself and others in order for him to *195 secure his release when he was committed to the hospital under the "right-wrong" sanity test; he asserts that he must bear a much greater burden under the mental illness standard than he formerly did under the right-wrong standard. The respondent moved to dismiss Eidinoff's application on the grounds that he has failed to exhaust his state remedies and that this court is without jurisdiction to entertain the matters complained of in the application. The motion to dismiss was overruled and an evidentiary hearing was held. The course of this lawsuit is determined by the resolution of the issue of whether Article 932b of the 1925 Code or Article 46.02 of the 1966 Code controls the procedure by which petitioner is required to seek his release in the state courts. Eidinoff was committed to Rusk Hospital in 1959 under the provisions of Article 932b. In 1966, this law was superseded by the enactment of Article 46.02. The two statutes differ in prescribing the manner by which a patient adjudged criminally insane is to be released. Article 932b, Section 2, recited that, "A person committed to a State mental hospital under this Act upon a jury finding of insanity at the time of trial who has been acquitted of the alleged offense is not by reason of that offense a person charged with a criminal offense, and therefore the head of the mental hospital to which he is committed may transfer, furlough and discharge him and shall treat him as any other patient committed for an indefinite period." Article 46.02, Section 3, sets forth that, "A person committed to a State mental hospital under this Article upon a jury finding of insanity at the time of trial who has been acquitted of the alleged offense is not by reason of that offense a person charged with a criminal offense. In the event the head of the mental hospital to which he is committed is of the opinion that the person is sane, he shall so notify the court which committed the person to the State mental hospital. Upon receiving such notice, the judge of the committing court shall impanel a jury to determine whether the person is sane or insane. If the jury finds the person is sane, he shall be released. If the jury finds the person is insane, the court shall order his return to the State mental hospital until he is so adjudged to be sane at a subsequent jury trial in such committing county." The essence of the difference between the 2 statutes is that under 932b the hospital superintendent was vested with the authority to release the criminally insane patient, while under 46.02 the committing court alone is delegated the power to release. Pursuant to Article 932b a criminally insane patient could, apparently, obtain a jury trial in a county court to ascertain whether he required continued hospitalization by initiating a proceeding under Article 5547-82 of the Texas Mental Health Code.[9] The issue *196 is whether Eidinoff, committed under the provisions of Article 932b, has a continuing right, pursuant to that statute, to seek his release through civil proceedings in lieu of the amendment of that statute by 46.02. Eidinoff contends that since January 1, 1966, the date of enactment of Article 46.02, that statute is the only means by which he can obtain a jury trial to restore his sanity.[10] He takes the position that 46.02 is an unconstitutional infringement on the right to trial by jury for the reason that a jury trial is conditioned solely on the superintendent's certification that he is sane. Respondent takes the position that 46.02 is directed only at prescribing the conduct required of the hospital superintendent and does not attempt to delineate the procedure to be initiated by the patient to obtain his release. Respondent contends that 46.02 left undisturbed the right of the criminally insane patient to institute a proceeding pursuant to Article 5547-82 of the Mental Health Code. Alternatively, he expresses that habeas corpus is an adequate remedy for such patient to test the legality of his continued confinement. While this court is necessarily hesitant to undertake an interpretation of Texas statutes in an area of state law in which little has been written, the question of what remedy, if any, is open to recourse by petitioner is the paramount issue herein upon which constitutional questions of serious concern are contingent. Article 46.02, insofar as it deleted from or contradicted Article 932b, repealed the latter. Article 54.02, Sec. 1, Code of Criminal Procedure (1965). However, 46.02 carried forward that provision of 932b, section 2, which stated that "a person committed to a State mental hospital under this Act upon a jury finding of insanity at the time of the trial who has been acquitted of the alleged offense is not by reason of that offense a person charged with a criminal offense * * *." No repeal of 932b was affected by 46.02 with regard to this provision. Concomitantly, respondent argues that the only change 46.02 made in section 2 of 932b was the obligation on the superintendent when he was of the opinion that the patient adjudged criminally insane had regained his sanity. Respondent concedes that under 932b a patient adjudged criminally insane had recourse to Article 5547-82 of the Mental Health Code to petition for his discharge and to obtain a hearing on such petition. Although no reported cases address themselves to the propriety of this implied statutory authority in 932b, Eidinoff did pursue this course in the county court of *197 Cherokee County to a judgment on the merits of his petition. The county court entertained the lawsuit and no effort was made by the state to oppose the petition on jurisdictional grounds. This court accordingly accepts the proposition that under 932b a patient adjudged criminally insane had recourse to the Mental Health Code to obtain a restoration of sanity hearing.[11] The derivation of statutory authority which granted to the criminally insane patient the recourse of Article 5547-82 necessarily ensued from that portion of 932b, Section 2, which provided that such patients were not persons charged with a criminal offense.[12] The remainder of section 2, permitting the superintendent to furlough or discharge the patient, defines the duties of the superintendent and is not susceptible to an interpretation that it implies the existence of a remedy available to patients. Article 5547-82 is designed to protect state hospital patients from unjustifiable detention. Cf. Swinford v. Logue, Tex.Civ.App.1958, 313 S.W.2d 547. By not classifying the criminally insane patient as a person charged with a criminal offense the Texas legislature has accorded to such an individual this protective remedy.[13] As section 3 of Article 46.02 changed only the duty of the hospital superintendent with regard to his actions when he determined the criminally insane patient had regained his sanity and specifically carried forward from 932b that portion of section 2 characterizing the criminally insane as persons not charged with a criminal offense, recourse to Article 5547-82, which exists by virtue of this latter provision, has not been denied the criminally insane patient by the enactment of Article 46.02. Hence, Eidinoff has available at this time an adequate remedy whereby he may seek the restoration of his sanity and his release. Because of this holding it will be unnecessary to decide Eidinoff's contention that Article 46.02 is an unconstitutional deprivation of his right to trial by *198 jury[14] on the ground that this right is not absolute under that statute but is wholly contingent upon the opinion of the superintendent that he is sane. Petitioner contends that because he was committed to the state hospital upon a finding of insanity he is constitutionally entitled to his release when he regains his sanity and cannot be further detained because he is mentally ill and dangerous to himself and others. Without reaching the question of whether petitioner is sane it is expressed by this court that such a contention lacks merit. In Ragsdale v. Overholser, 1960, 108 U.S. App.D.C. 308, 281 F.2d 943, the court set forth the rationale underlying mandatory commitments upon a finding of criminal insanity: [The mandatory commitment statute] has two purposes: (1) to protect the public and the subject; (2) to afford a place and a procedure to rehabilitate and restore the subject as to whom the standards of our society and the rules of law do not permit punishment or accountability. To these ends the State of Texas may lawfully condition the release of its criminally insane patient upon a showing of mental fitness which does not pose a danger to either the patient himself or to the members of the public. The last of petitioner's contentions which it is necessary to consider is whether he has been receiving treatment which is adequate in the light of present medical knowledge. Rouse v. Cameron, 1967, 125 U.S.App.D.C. 366, 373 F.2d 451. At Eidinoff's sanity hearing in 1959 in the Lubbock district court, which lasted some 8 days, the jury returned a verdict of insanity at the time of the commission of the act and insanity at the time of the hearing. The psychiatric evidence upon which the jury rendered its verdict was almost unanimous in its diagnosis that Eidinoff suffered from true paranoia. True paranoia is a relatively, but not extremely, rare mental disorder.[15] It is a psychotic condition[16] in which the patient wrongfully or erroneously interprets an act or occurrence thereby creating a delusion as to such event. This delusion is most commonly manifested in feelings of persecution. The delusion is systemitized so that a logical but erroneous conclusion is arrived at, based on the original false premise. The true paranoia suffers from feelings of inadequacy and in an effort to overcome such inadequacy he develops grandiose ideas or feelings of superiority to others. The paranoia has a need for others to assume his responsibilities. He may be litigious, or prone to engage in lawsuits to assert the validity of the conclusion reached within his structural delusional thinking. The delusion does not impart itself to areas of the patient's thinking other than that encompassed by the original false premise. The patient is therefore perfectly normal in the other areas of his thinking. However, the structured nature of the delusion is such that anything which is identified with the delusion itself is dealt with by the patient as a part of the delusion. In relation to the M'Naghten insanity test the patient knows right from wrong and the nature and consequences of his acts in all areas of his thinking with the exception of his structural delusion. As to acts which fall within or relate to the delusion he is unable to distinguish right from wrong and is unable to comprehend the nature and consequences of such acts. Eidinoff is presently diagnosed by Dr. Connolly and members of his staff *199 as suffering from true paranoia.[17] In arriving at this conclusion Dr. Connolly opinionates that petitioner has the paranoia symptoms of grandiose ideas, litigiousness, the need to have others accept his responsibilities, and he has a structured delusional thinking system. In Dr. Connolly's medical evaluation, petitioner now suffers from the delusions that he is not mentally ill or insane and that a conspiracy exists, fostered by various state officials and influential people, to keep him confined in the state hospital for the remainder of his life as punishment for the crime of which he was acquitted. Eidinoff believes, according to Dr. Connolly, that this conspiracy has exerted such pressure on the hospital superintendent and his predecessors that he will not give his true opinion of Eidinoff's present mental condition, namely, that he is sane, not mentally ill, and entitled to be discharged. In the light of medical knowledge, as revealed by the psychiatric testimony adduced at the evidentiary hearing, the prognosis for the true paranoia is "poor". As there is no adequate treatment for this disorder, recovery, if achieved in any meaningful degree, is dependent upon the patient's ability, as limited by the severity of the paranoia disorder, to respond to the treatment which is available. One doctor testified that psychoanalysis was the most effective known treatment for paranoia, but that the cost to state institutions of engaging psychoanalysts was prohibitive.[18] The consensus of the staff at Rusk Hospital is that psychotherapy is the most appropriate treatment for paranoia which is available. Elemental in the rehabilitative concept of psychotherapy relative to true paranoia is that the success of this therapeutic method is dependent upon the degree to which the patient will accept and understand the fact that he suffers from a mental disorder and upon his desire to overcome it. Psychotherapy attempts to impart this understanding to the patient and instill in him the desire to overcome the disorder through psychological rather than medical means. Two doctors at Rusk Hospital have at different times attempted to engage Eidinoff in psychotherapy. Both were forced to discontinue the program because Eidinoff was unable to accept the fact that he was suffering from a mental disorder. For a short period of time following discontinuation of the psychotherapy treatments Eidinoff was given group psychotherapy. For 1½ hours a week petitioner was placed in a group of 8 or 9 other patients during which times the patients conversed with one another. Similar to psychotherapy, group-therapy has as its purpose the patient's self-realization of his problems through psychological means and is predicated on the theory that the group members in conversing with one another will act as catalysts or stimuli to the individual member's insight into his respective problem. While Eidinoff's participation in group-therapy endured for a longer period of time than did his psychotherapy treatments, these were also discontinued because of Eidinoff's inability to accept the fact that he suffered from a mental disorder and also, apparently, because of his feelings of superiority over the other patients. *200 Group therapy treatments were terminated in the fall of 1965 and Eidinoff went without treatment until June, 1966, when Dr. Connolly, with the assistance of funds from the federal government, established a program of occupational and physical therapy for all patients. Since the inception of this program Eidinoff has been an active participant therein. He authored the physical fitness program adopted by the hospital, participates in the occupational therapy program by engaging in handcrafts, and organized and taught in the hospital's elementary education program for retarded children. He has been commended by the hospital officials for his participation in all phases of this rehabilitative program. The occupational and physical therapy programs are calculated to instill within the patient self-pride and responsibility. However ill-adapted such programs may be to cope with the problems of a paranoia disorder, and in particular, Eidinoff's dilemna as diagnosed by Dr. Connolly and his staff, the proposition that petitioner is not receiving adequate treatment cannot be sustained. Eidinoff's inability to meaningfully engage in psycho- and group-therapy cannot be held against him if his refusal to accept the fact of his mental disorder is in fact a product of that disorder. In view of the nature of petitioner's inability to respond to psycho- and group-therapy treatments, present medical knowledge affords little more in the method of treatment of true paranoia that Eidinoff is presently receiving. While great medical advances are being made in the field of treatment of the mentally ill, present day efforts cannot be adjudged inadequate by techniques of which only our future generations will be fortunate enough to take advantage. One other consideration merits discussion. As observed supra, Eidinoff believes that a conspiracy exists against him which has been successful in influencing the present and past superintendents of Rusk Hospital to the prejudice of his rights. At least part of this belief has some basis in fact. It appears that some individuals in El Paso and Lubbock, Texas, have undertaken to influence the successive superintendents of Rusk Hospital to the end that Eidinoff shall remain confined for the rest of his life, but this court is satisfied, on the basis of all the evidence presented on this hearing, that such beseechings have fallen deaf on the ears of physicians dedicated to the integrity of their profession. Having found that petitioner has available to him an adequate state remedy to test the validity of his continued confinement and further that no rights guaranteed by the Constitution of the United States have been or are being denied petitioner, the application for writ of habeas corpus is in all things Denied. NOTES [1] Article 932b, Texas Code of Criminal Procedure (1925), pertinent portions of which are hereafter set forth. [2] The jury assessed Eidinoff's sanity in terms of the M'Naghten, "right-wrong" test as required by Texas statute, Article 34, Vernon's Ann.Texas Penal Code (1925). [3] Article 932b, Texas Code of Criminal Procedure (1925). [4] As enacted in 1957, Article 5547-82(e) provided that the re-examination hearing was to be tried to the county court without a jury. In 1958, the Waco Division of the Texas Court of Civil Appeals held Section (e) unconstitutional in violation of the right to trial by jury. Swinford v. Logue, 313 S.W.2d 547. [5] Article 5547-82(g), Vernon's Annotated Civ.Stat., also hereinafter set forth. [6] Article 5547-82 is explicit in its expression that "mental illness" is the standard applicable to proceedings by a mental patient to secure his release. [7] Eidinoff's dismissal of this cause was predicated on a ground which he asserts in this court is of constitutional dimension, namely, that having been committed to a mental hospital as a result of his not knowing the difference between right and wrong, a purely legal test, his release should be conditioned on the same test, and not upon the mental illness test which is wholly a medical standard and which casts upon him a greater burden of proof than the former test. This question will be fully discussed, infra. However, to avoid a confusion of terms in this respect, this court will use "sane", "insane", "sanity" and "insanity" with respect to the M'Naghten or right-wrong legal test and will use "mental illness" with respect to a medically diagnosed thinking disorder. [8] In Texas practice the denial of a writ of error "No Reversible Error" or "n.r.e." indicates the Texas Supreme Court agrees with the result reached by the lower appeals court, but does not necessarily agree with the reasoning behind the result. [9] "Art. 5547-82. Re-examination — hearing — discharge (a) Any patient, or his next friend on his behalf and with his consent, may petition the county judge of the county in which the patient is hospitalized for re-examination and hearing to determine whether the patient requires continued hospitalization as a mentally ill person. (b) Upon the filing of the Petition the county judge shall immediately notify the head of the mental hospital in which the patient is hospitalized. (c) Upon receipt of notice, the head of the hospital shall cause the patient to be examined. If he determines that the patient no longer requires hospitalization as a mentally ill person, the head of the hospital shall immediately discharge the patient. If he determines that the patient requires hospitalization as a mentally ill person, he shall file a Certificate of Medical Examination for Mental Illness with the county court within ten (10) days after the filing of the Petition for Re-examination and Hearing. (d) At the expiration of the ten-day period, if the head of the hospital has filed a Certificate of Medical Examination for Mental Illness stating that the patient requires hospitalization as a mentally ill person, or if the head of the hospital has failed to file a Certificate of Medical Examination for Mental Illness and has not discharged the patient, the county judge shall set a date and place for hearing on the petition and give notice thereof to the patient and the head of the hospital, and shall appoint a physician not on the staff of a mental hospital to examine the patient and file a Certificate of Medical Examination for Mental Illness with the court. The court shall enter the necessary orders to insure that the patient may, if he desires, be examined by a physician of his own choosing at his own expense. (e) The hearing shall be before the court without a jury. [See Footnote 4, supra.] (f) If the court finds that the patient does not require continued hospitalization as a mentally ill person, the court shall order the head of the hospital to discharge the patient. Otherwise, he shall dismiss the Petition. (g) When the Petition for Re-examination and Hearing is filed before the expiration of one (1) year after the Order of Indefinite Commitment or before the expiration of two (2) years after the filing of a similar Petition, the county judge is not required to order such re-examination and hearing. Acts 1957, 55th Leg., p. 505, ch. 243, § 82." [10] Although Eidinoff may review the legality of his confinement in the state courts by writ of habeas corpus, Ex parte Boehme, 1952, 158 Tex.Cr.R. 278, 255 S.W.2d 206, he is not accorded a jury trial in such a proceeding. Article 11.01 et seq., Texas Code of Criminal Procedure (1965). [11] In so concluding this court has given consideration to the opinion in Ex parte Frailey, 1944, 146 Tex.Cr.R. 557, 177 S.W.2d 72. Frailey was indicted for 2 murders. She was found insane at the time of the acts and insane at the time of the trial. Under the provisions of Article 932a, C.C.P., then in effect, she was committed to the Terrell State Hospital in Kaufman County. Under the provision of Article 5561a of the civil statutes, the predecessor of 5547-82 of the present Mental Health Code, she instituted sanity restoration proceedings in the county court of Kaufman County. A jury returned a verdict of "sane" and she was discharged. Immediately upon her discharge she was arrested and held under the original murder indictments. She filed a writ of habeas corpus in the state district court. That court denied her relief and she appealed. On review, the Court of Criminal Appeals observed that under the statute then in effect, 932a a finding of insanity at the time of the act was not an acquittal of the offense charged and that Article 5561a specifically applied to only those patients who were not charged with a criminal offense. The court held that only the district court which committed the patient had jurisdiction to order her discharge, she being a person charged with a criminal offense, and that the county court proceedings were void. With the enactment in 1958 of 932b and 5547-82, the Texas legislature significantly changed 932a and 5561a. In 932b it provided that a finding of insanity at the time of commission of the act was an acquittal of the offense charged and that a person so acquitted was not charged with a criminal offense. In 5547-82 it deleted the requirement that the patient be a person not charged with a criminal offense and in 5547-69, the provision governing the application of 5547-82, prescribed that the latter was not applicable to persons adjudged criminally insane and committed under 932a, which persons were, as pointed out in Ex parte Frailey, persons charged with a criminal offense. [12] See footnote 11, supra. [13] See discussion of Ex parte Frailey, 1944, 146 Tex.Cr.R. 557, 177 S.W.2d 72, footnote 11, supra. [14] See, Swinford v. Logue, Tex.Civ.App. 1958, 313 S.W.2d 547, footnote 5, supra. [15] Six psychiatrists testified at the evidentiary hearing before this court. Each of them defined the term "true paranoia". Although some of the doctors differed in their evaluation of the most predominant of the symptoms of true paranoia, they were basically in accord as to the identifiable symptoms of the disorder. [16] A psychotic condition is a mental disorder wherein one's thinking process is out of touch with reality. [17] This court does not undertake to decide the question of whether Eidinoff is presently mentally ill and in need of further hospitalization. As petitioner has an adequate state remedy to resolve that issue, such is the province of the state courts. For purposes of determining whether Eidinoff is receiving adequate treatment in the light of present medical knowledge, this court will confine its consideration to the type of treatment he is and has been receiving as it relates to the diagnosis of his mental disorder made by the staff of Rusk State Hospital. [18] Psychoanalysis, in its most general definition, is a therapy whereby a patient suffering from abnormal mental reactions comes to recognize his subconscious repression of desires which are the causes of his abnormal reactions.
{ "pile_set_name": "FreeLaw" }
<!DOCTYPE html> <html class="no-js"> <head> <title>jQuery Presentation Plugin</title> <meta http-equiv="Content-type" content="text/html; charset=utf-8" /> <script type="text/javascript">(function(H){H.className=H.className.replace(/\bno-js\b/,'js')})(document.documentElement)</script> <link href="stylesheets/screen.css" type="text/css" rel="stylesheet" media="Screen,projection" /> </head> <body> <div id="header"> <div class="container"> <h1>jQuery Presentation Plugin</h1> </div> </div> <div id="content"> <div id="slides"> <div class="slide"> <h2>Slide 1</h2> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> <ul> <li>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation</li> <li>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</li> <li>Here is a short list item</li> </ul> </div> <div class="slide"> <h2>Slide 2</h2> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> </div> <div class="slide"> <h2>Slide 3</h2> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> </div> <div class="slide"> <h2>Slide 4</h2> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> </div> <div class="slide"> <h2>Slide 5</h2> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> </div> </div> </div> <div id="footer"> <div class="container"> &copy; 2010 Trevor Davis Viget Labs </div> </div> <script type="text/javascript" src="scripts/jquery.js"></script> <script type="text/javascript" src="scripts/jquery.presentation.js"></script> <script type="text/javascript" src="scripts/global.js"></script> </body> </html>
{ "pile_set_name": "Github" }
/*! * Jade - filters * Copyright(c) 2010 TJ Holowaychuk <tj@vision-media.ca> * MIT Licensed */ module.exports = { /** * Wrap text with CDATA block. */ cdata: function(str){ return '<![CDATA[\\n' + str + '\\n]]>'; }, /** * Transform sass to css, wrapped in style tags. */ sass: function(str){ str = str.replace(/\\n/g, '\n'); var sass = require('sass').render(str).replace(/\n/g, '\\n'); return '<style type="text/css">' + sass + '</style>'; }, /** * Transform stylus to css, wrapped in style tags. */ stylus: function(str, options){ var ret; str = str.replace(/\\n/g, '\n'); var stylus = require('stylus'); stylus(str, options).render(function(err, css){ if (err) throw err; ret = css.replace(/\n/g, '\\n'); }); return '<style type="text/css">' + ret + '</style>'; }, /** * Transform less to css, wrapped in style tags. */ less: function(str){ var ret; str = str.replace(/\\n/g, '\n'); require('less').render(str, function(err, css){ if (err) throw err; ret = '<style type="text/css">' + css.replace(/\n/g, '\\n') + '</style>'; }); return ret; }, /** * Transform markdown to html. */ markdown: function(str){ var md; // support markdown / discount try { md = require('markdown'); } catch (err){ try { md = require('discount'); } catch (err) { try { md = require('markdown-js'); } catch (err) { try { md = require('marked'); } catch (err) { throw new Error('Cannot find markdown library, install markdown, discount, or marked.'); } } } } str = str.replace(/\\n/g, '\n'); return md.parse(str).replace(/\n/g, '\\n').replace(/'/g,'&#39;'); }, /** * Transform coffeescript to javascript. */ coffeescript: function(str){ str = str.replace(/\\n/g, '\n'); var js = require('coffee-script').compile(str).replace(/\\/g, '\\\\').replace(/\n/g, '\\n'); return '<script type="text/javascript">\\n' + js + '</script>'; } };
{ "pile_set_name": "Github" }
Managing MySQL with MySQL Sandbox? Normally I like to use the OS’s package manager to manage the software on my system. This ensures that things are done consistently. When managing MySQL I’d also like to manage all my instances the same way. That makes life easier for me but also for my fellow DBAs and sysadmin colleagues. I use CentOS and the rpm packages it provides and these work quite well. However, the MySQL rpms do not allow me to manage single and multiple instances alike and while mysqld runs as the mysql user the instance management needs to be done as root (stopping, starting instances, or default access). If you want to run multiple instances you can also use mysqld_multi, but that’s not the default setup. So this is not ideal. While this may not be much of an issue if you manage a single server, if you manage tens or hundreds things changes somewhat and you REALLY want to manage all instances consistently. So I’ve been thinking about finding an alternative which would suit me better. What do I need? Automatic start up on server boot, and shutdown of “SELECTED” instances. Ability to support different versions of MySQL running at the same time. Straight forward mechanism to upgrade a server or switch the version of MySQL that is used to manage a specific instance. I was thinking of writing my own scripts but one solution which looks potentially close enough to my ideal solution would be to use Giuseppe Maxia’s MySQL Sandbox. I think this project was born with a completely different goal (enable you to quickly get a different MySQL version up and running for testing), but it actually seems to solve most of the things I want for managing production instances. If you’ve not used it yet take a look. It works pretty well and is easy to setup. The ability to indicate which instances should start / stop and a way to trigger this from init during startup / shutdown. The way to access the instances is quite different from a normal mysql installation. That has confused me quite a bit and as I use the Sandbox infrequently I have to go back and workout how to “get in” and also how to start or stop any instance, or check if it’s running. I’m not entirely sure if it’s easy to adjust the paths for the different mysql “areas” to fit in with my usage of MySQL or something similar to OFA. These things are probably pretty easy to fix. The name MySQL Sandbox sounds rather inappropriate if you really use it to manage mysql instances. That’s easy to change. Ideal MySQL Layout So how would I like the layout to look like? Tarball binaries should probably be located somewhere like /path/to/some_binary_name, which allows us to distinguish between different architectures (i686, x86_64), and versions (5.0.89, 5.1.42, 5.5.0-m2). That’s already solved by the current tarballs which have a prefix such as mysql-5.5.0-m2-osx10.5-x86. Each instance’s data should probably be located along the lines of: /path/to/instance_name/data (for MySQL data files and my.cnf) /path/to/instance_name/tmp (for MySQL tmpdir) /path/to/instance_name/log (for MySQL logfiles (binlog and relaylog) This allows the locations under /path/to/ to be mounted on different file systems for performance (if needed). In my case /path/to is simply /mysql, but that does not need to be that rigid. OFA is slightly different but the idea is the same. Accessing the Instances How do I access the instances? Currently I access the instances using the following mechanism. Each instance has a name so that name is used to access the instance as a suffix of the normal mysql command. The final thing to want to do is to upgrade an instance. Normally this involves: Downloading the new version. Stopping the instance to be upgraded. Adjusting links/directories. Perform various “admin tasks” to upgrade the instance. Starting it normally again. All that MySQL sandbox would need to do would be to perform 3. So these are some of my ideas. I need to look at the MySQL Sandbox code in more detail to see if it will fit my needs but I expect it should not be too difficult to adjust it if needed. Perhaps if you use other operating systems or package managers and manage one or more MySQL instances on multiple servers these issues are less of a problem. I have not seen comments by others worrying about some of the limitations of the current MySQL rpms and the problem is not really with rpm itself but with the expected usage of a single instance on a single server. So is there a better way to do this or might MySQL Sandbox be the right solution to achieve my goal? Published by Simon J Mudd Born in England, I now live in Spain, but spent a few years living in the Netherlands. I previously worked in banking (financial markets) both in IT and as a broker, but IT has always had a stronger influence. Now working at booking.com as a Senior Database Administrator. Other interests include photography, and travel. Simon is married, with two children and lives in Madrid. View all posts by Simon J Mudd 4 thoughts on “Managing MySQL with MySQL Sandbox?” About the things that you say seem to be missing, please look at the reference manual, especially the sbtool and the scripts created by the sandbox installer. Some of what you need is already available.http://search.cpan.org/~gmax/MySQL-Sandbox-3.0.05/lib/MySQL/Sandbox.pm The ability of starting/stopping a sandbox at startup/shutdown has never been in the design. MySQL::Sandbox does already provide a common directory ($HOME/sandboxes) The single sandbox installer has more than 20 options that you can fiddle with to achieve optimal installations. The group sandbox installers can do the same fine tuning by means of environment variables that invoke the above mentioned options. Regarding the name, it is appropriate for the usage for which it was created. Regarding the init scripts both Oracle and Sybase have root owned scripts which su to the non-root script which does the real task of start/stopping the instances. This should not be to hard to replicate for MySQL. The thing that is important to me is some way to be able to select which instances will be started on boot. On some development servers I have over 10 mysql instances running and some of those may not be fully operational or I may want to keep them down. Having a way to able to say: start all “selected” instances would be nice. I’m not sure how that fits in with your current scheme. In any case the MySQL Sandbox does seem to have the most generic and flexible way to manage MySQL servers and is easy to use.
{ "pile_set_name": "Pile-CC" }
If the price of political freedom is division and polarization, it comes at a steep opportunity cost. While the West — including a Europe riven by populist and separatist movements — stalls in internal acrimony, China is boldly striding ahead. It has proactively set its sights on conquering the latest artificial intelligence technology, reviving the ancient Silk Road as “the next phase of globalization,” taking the lead on climate change and shaping the next world order in its image. If the West does not hear this wake-up call loud and clear, it is destined to somnambulate into second-class status on the world stage. Waiting for China to stumble is a foolish fallback. AD AD That is not to suggest, of course, that open societies ought to turn toward authoritarianism to unify the body politic. But it is to say that unless democracies look beyond the short-term horizon of the next election cycle and find a way to reach a governing consensus, they will be left in the dust by the oncoming future. If democracy has come to mean sanctifying the splintering of society into a plethora of special interests, partisan tribes and endless acronymic identities instead of seeking common ground, there is little hope of successfully competing with a unified juggernaut like China. The WorldPost this week plumbs the meaning — for China and the world — of the 19th National Congress of the Communist Party of China that met in Beijing to affirm the consolidation of power by President Xi Jinping and chart the path ahead for the Middle Kingdom. In conversations I’ve had over the years with the late sage of Singapore, Lee Kuan Yew, he always returned to a theme dissonant to the tin ear of Westerners. China will never become a democracy or an honorary member of the West, he lectured, but will move forward and succeed on its own terms. And so it has. Writing from Shanghai, Eric Li follows up this theme. Despite nearly unanimous predictions in the Western media and political class during the last three decades that China was on the wrong side of history, he chides, it has not failed but has grown stronger and more powerful. Standing “tall and firm in the East” is how Xi put it at the party congress. AD AD “The prevailing theories that have guided the world’s thinking about the rise and fall of nations no longer make sense,” Li argues. “If elections and privatization are the prerequisites to development, why has China succeeded without them, while so many others have failed after taking these prescriptions? In the past 30 years, China has effectively combined socialism and the market economy.” Despite critiques in the West that the idea of a socialist market economy is an “oxymoron,” Li sees Xi’s project of “sinicizing” Marxism as akin to China’s ancient capacity to absorb the foreign ideas of Buddhism into Confucian civilization. This ideological innovation, writes Li, “may be China’s most significant contribution to the 21st century. Not since the European Enlightenment has the world been so hungry for new approaches.” As one of China’s more prominent venture capitalists, Li has no doubt where to place his confidence. “My bet is that Xi will indeed ‘change China, and the world, for the better,’” he concludes. Veteran China watcher Steve Tsang also sees this week’s party congress as marking a departure from the Deng Xiaoping era of “reform and opening” to a new era in which “the Chinese Communist Party is confident of its own socialist developmental model. It no longer looks outside its borders for inspiration, and it emphatically rejects any democratic or Western model.” AD AD But, most worrying to Tsang is that Xi has signaled that “he will not relinquish power at the next congress in 2022. He has left open the possibility for him to stay in charge, altering the party’s practice since the Deng era of institutionalizing leadership succession ahead of time.” With that kind of unrivaled authority that can’t be contested even by his colleagues, Tsang fears what others have called the “bad emperor problem.” “If Xi’s advisers do not dare to contradict him, the risk that Chinese policies will be grounded in inappropriate assumptions or calculations will increase, carrying a danger that misguided policies will be introduced and forcefully backed by the full might of the party and military,” he concludes. Yu Jie acknowledges China’s accomplishments but also sees big hurdles in the times ahead. “Unlike the Soviets,” she writes, “Chinese leaders have repeatedly demonstrated an impressive capability to surmount existential challenges. But rarely have those challenges looked greater than they do for the coming decade.” On the domestic front, says Yu, “continuous economic growth has produced vested interest groups that refuse to give up their power and authority which — together with extreme wealth inequality and severe environmental damage — could challenge the very survival of the party leadership. If the party defends a status quo that is manifestly unfair in its distribution of wealth and opportunity, trust from ordinary people will collapse.” AD AD Yu, who heads the China Foresight project at the London School of Economics, also worries about the nationalist tone the country has taken under Xi’s leadership. “A dangerous mixture of China’s historical humiliation and its staggering economic success,” she warns, “has unfortunately bred a strong sense of complacency on one level and an equally powerful current of hubris on another. This could turn out to be lethal inside China as well as detrimental to its neighbors and distant great powers.” Spanish-Catalan crisis comes to a head This week, the confrontation between Spanish authorities and the Catalan independence movement met its denouement as Prime Minister Mariano Rajoy, backed by the opposition Socialist party, imposed Article 155 of the Spanish constitution, which annuls Catalonia’s elected government and turns over power to Madrid. He did so just after Catalonia’s parliament declared the region’s independence Friday. AD AD One of Catalonia’s most well-known intellectuals, the sociologist Manuel Castells, passionately writes that “the intervention in Catalan institutions by the Spanish government is an assault on democracy without precedent in the European Union.” For Castells, the issue is not independence but the right of Catalan citizens to express their will through a referendum not unlike those we’ve seen in Scotland and Quebec in recent years. “The key issue at stake is whether constitutional legality has to follow the evolution of people’s minds. The law must adapt to reality through political mediation,” says Castells. “Ultimately, only a political dialogue can solve the current crisis. In the meantime, one of the most democratic and tolerant areas of Europe is being deprived of its basic civil rights.” This was produced by The WorldPost, a partnership of the Berggruen Institute and The Washington Post. ABOUT US: The WorldPost is an award-winning global media platform that aims to be a place where the world meets. We seek to make sense of an interdependent yet fragmenting world by commissioning voices that cross cultural and political boundaries. Publishing op-eds and features from around the globe, we work from a worldwide perspective looking around rather than a national perspective looking out. AD AD EDITORIAL BOARD: Nicolas Berggruen, Nathan Gardels, Eric Schmidt, Pierre Omidyar, Arianna Huffington, Juan Luis Cebrian, Walter Isaacson, John Elkann, Wadah Khanfar, Yoichi Funabashi CONTRIBUTING EDITORS: Moises Naim, Nayan Chanda, Katherine Keating, Sergio Munoz Bata, Parag Khanna, Seung-yoon Lee, Jared Cohen, Bruce Mau, Patrick Soon-Shiong AD AD
{ "pile_set_name": "OpenWebText2" }
Q: Putting an array into a table with SimpleXMLobject using php Array ( [0] => Array ( [Title] => SimpleXMLElement Object ( [0] => aa ) [Pubdate] => SimpleXMLElement Object ( [0] => aa ) [Link] => SimpleXMLElement Object ( [0] => aa ) ) [1] => Array ( [Title] => SimpleXMLElement Object ( [0] => bb ) [Pubdate] => SimpleXMLElement Object ( [0] => bb ) [Link] => SimpleXMLElement Object ( [0] => bb ) ) I want to put this into a table which has (Title, Pubdate, Link) as its columns. I am really confused to how to put it into mysql table when there is SimpleXMLElement Object and [0] in the way. If those were not in the way, I would easily be able to put it into the table, but because those are there and I have never seen them before, I am terribly confused. This is what I have tried: foreach($string as $item){ INSERT into table (Title, Pubdate, Link)VALUES($item->title, $item->pubDate, $item->link) } FYI this is how I made the array: $string = $con->channel->item; $table = array(); foreach ($string as $item) { $table[] = array( 'Title' => $item->title, 'Pubdate' => $item->pubDate, 'Link' => $item->link ); } A: You can't just insert that in the database. Implode first the array. Try this: $string = $con->channel->item; $table = array(); foreach ($string as $item) { $sql = mysqli_query("INSERT INTO table (Title, Pubdate, Link)VALUES('$item->title', '$item->pubDate', '$item->link')"; ); }
{ "pile_set_name": "StackExchange" }
Q: Using SQL Statement in TO_DATE Function? I have to use SQL statement in TO_DATE function. Like: TO_DATE((select MAX(VERSION) from TABLE_B),'MM/DD/YYYY') When I use TO_DATE like that, I encounter an error. Like: [Error] Execution (9: 32): ORA-01858: a non-numeric character was found where a numeric was expected Is there a way for using TO_DATE function like that? A: select to_date(max(version), 'mm/dd/yyyy') from table_b might be a better choice. Note, though, that if VERSION column (it is ... what? A string?) contains something that doesn't match that date format, TO_DATE will fail, exactly with an error you got. Therefore, make sure that data is correct.
{ "pile_set_name": "StackExchange" }
Q: Phone number duplication detector I am doing the POJ 1002 question. My code works fine but the website says the compilation time is more than 2000ms, which is not accepted. How can I improve my time-wise performance? Problem Statement Input — The input will consist of one case. The first line of the input specifies the number of telephone numbers in the directory (up to 100,000) as a positive integer alone on the line. The remaining lines list the telephone numbers in the directory, with each number alone on a line. Each telephone number consists of a string composed of decimal digits, uppercase letters (excluding Q and Z) and hyphens. Exactly seven of the characters in the string will be digits or letters. Output — Generate a line of output for each telephone number that appears more than once in any form. The line should give the telephone number in standard form, followed by a space, followed by the number of times the telephone number appears in the directory. Arrange the output lines by telephone number in ascending lexicographical order. If there are no duplicates in the input print the line: No duplicates. import java.util.Map; import java.util.Scanner; import java.util.TreeMap; public class Main{ public static void main(String[] args) { Scanner scan = new Scanner(System.in); int total = scan.nextInt(); scan.nextLine(); // But why? String[] numbers = new String[total]; Map<String, Integer> dict = new TreeMap<String, Integer>(); for(int i = 0; i < total; i++) { numbers[i] = scan.nextLine(); numbers[i] = convert(numbers[i]); if(!dict.containsKey(numbers[i])) { dict.put(numbers[i], 1); } else { dict.put(numbers[i], dict.get(numbers[i]) + 1); } } scan.close(); boolean hasDuplication = true; for(String number: dict.keySet()) { if(dict.get(number) > 1) { hasDuplication = false; System.out.println(number + " " + dict.get(number)); } } if(hasDuplication) { System.out.println("No duplicates."); } } public static String convert(String raw) { raw = raw.replaceAll("-", ""); raw = raw.toLowerCase(); String number = ""; for(int i = 0; i < raw.length(); i++) { number += parse(raw.charAt(i)); } number = number.substring(0, 3) + "-" + number.substring(3); return number; } public static char parse(char digit) { if(digit >= 'a' && digit < 'q') { digit = (char) ((digit-'a') / 3 + '2'); } else if(digit > 'q' && digit < 'z') { digit = (char) ((digit-'q') / 3 + '7'); } return digit; } } A: Chomp the new line scan.nextLine(); // But why? Nothing to do with performance, but Scanner is skipping nextLine() after using next(), nextInt() or other nextFoo()? explains this. Remove unnecessary data structure String[] numbers = new String[total]; You never use numbers as an array. You could get rid of it entirely. numbers[i] = scan.nextLine(); numbers[i] = convert(numbers[i]); if(!dict.containsKey(numbers[i])) { dict.put(numbers[i], 1); } else { dict.put(numbers[i], dict.get(numbers[i]) + 1); } Replace numbers[i] with a single String. String number = convert(scan.nextLine()); Integer count = dict.get(number); if (count == null) { count = 0; } count++; dict.put(number, count); Now we don't keep an array around for nothing. I also changed the get/put pattern. This saves having to do both the containsKey check and the get. Consider other data structures Map<String, Integer> dict = new TreeMap<String, Integer>(); I would expect a TreeMap to be slower than a HashMap for most applications that depend on insert and read efficiency. This is especially so since it sorts on keys and what you want is to find all with at least value 2. You'd need to override the comparison to get that behavior. You don't use the read behavior that would be helpful. And you accept the slower writes. Map<String, Integer> dict = new HashMap<>(); This should perform faster for larger inputs. Pick the right method for(String number: dict.keySet()) { if(dict.get(number) > 1) { hasDuplication = false; System.out.println(number + " " + dict.get(number)); } } This is the use case for an entrySet. for (Map.Entry<String, Integer> entry : dict.entrySet()) { if (entry.getValue() > 1) { hasDuplication = true; System.out.println(entry.getKey() + " " + entry.getValue()); } } Now we don't have to do an expensive get lookup operation on each iteration. I'd also switch the meaning of hasDuplication to match the name. Don't forget to switch it the other two places as well. boolean hasDuplication = true; to boolean hasDuplication = false; and if(hasDuplication) { to if (!hasDuplication) { Other possibilities If this doesn't help, consider splitting reading the input from processing it. So something like for (int i = 0; i < numbers.length; i++) { numbers[i] = scan.nextLine(); } scan.close(); for (String number : numbers) { number = convert(number); Integer count = dict.get(number); if (count == null) { count = 0; } count++; dict.put(number, count); } I didn't test this, so you may have to declare a new variable rather than reusing number. A: Use a profiler to measure where the time is spent! That said, your convert method is very inefficient. It uses multiple string operations. You can make it one-pass using the characters as they come by. We need some extra cases to be able to prevent upper/lowercasing. public static String toBaseForm(String raw) { StringBuilder sb = new StringBuilder(); for (char ch : raw.toCharArray()) { if (ch >= 'A' && ch < 'Q') { sb.append((char) ((ch - 'A') / 3 + '2')); } else if (ch >= 'Q' && ch < 'Z') { sb.append((char) ((ch - 'Q') / 3 + '7')); } else if (ch >= 'a' && ch < 'q') { sb.append((char) ((ch - 'a') / 3 + '2')); } else if (ch >= 'q' && ch < 'z') { sb.append((char) ((ch - 'q') / 3 + '7')); } else if (ch >= '0' && ch <= '9') { sb.append(ch); } if (sb.length() == 3) { sb.append('-'); } } return sb.toString(); } A: String allocations You make a number of allocations that may not be obvious: public static String convert(String raw) { raw = raw.replaceAll("-", ""); // possibly new string, if contains hyphen raw = raw.toLowerCase(); // possibly new string, if contains uppercase String number = ""; for(int i = 0; i < raw.length(); i++) { number += parse(raw.charAt(i)); // definitely new string, raw.length() times! } number = number.substring(0, 3) + "-" + number.substring(3); // three new strings: sub + sub + result return number; } String is immutable in Java, meaning any operations that result in different char data will result in a different string. String.substring also (usually) creates a new string. The input "888-GLOP" ends up creating eleven new strings before returning its final, twelfth string! Map.get + Map.put = Map.merge if(!dict.containsKey(numbers[i])) { // Θ(log n) dict.put(numbers[i], 1); // Θ(log n) } else { dict.put(numbers[i], dict.get(numbers[i]) + 1); // Θ(log n) + Θ(log n) } // --> dict.merge(numbers[i], 1, Integer::sum); Still, you are sorting/comparing strings each time you want to update your map. You could split into two parts: one part that checks whether you have already seen the input before (doesn't need to be sorted), and another that keeps track of your actual duplicates: HashSet<String> seen; TreeMap<String, Integer> duplicates; // Set.add returns false if already contained if ( !seen.add(number) ) { // Θ(1) duplicates.merge(number, 1, Integer::sum); // Θ(log n) } // printing later -- don't forget to add 1 to dupe count! duplicates.forEach( (k,v) -> System.out.println( ... (v + 1) ... ); ) Alternatively, you can turn the data around: HashMap<String, Integer> frequency; TreeSet<String> duplicates; if ( frequency.merge(number, 1, Integer::sum) > 1 ) { // Θ(1) duplicates.add(number); // Θ(log n) } duplicates.forEach( k -> System.out.println( ... frequency.get(k) ... ); ) Alternative implementation Consider that: Phone numbers have a normal form, which is NNN-NNNN, with N being a digit. This makes phone numbers contain 7 digits worth of information. That fits in an int. → Less memory usage, better cache usage. You don't need to retain the original form. → We can use destructive methods. Your incoming alphabet is limited: uppercase letters, decimal digits, and the hyphen. → switch-case and/or table parsing are viable. You need to output only the duplicates. → We don't need to store everything, but we might end up having to. You need to output the duplicates in lexicographical order. → We don't need to keep everything sorted; only the duplicates. Leading to: import java.util.*; public class Main { public static void main(String[] args) { final Scanner in = new Scanner(System.in); int count = in.nextInt(); /* We split duplicate detection in an unsorted part that just saves whether * we've seen it before, and a sorted part that stores actual duplicates in * lexicographical order. */ final Set<Integer> seen = new HashSet<>(); final NavigableMap<Integer, Integer> duplicates = new TreeMap<>(); while ( count-- > 0 ) { String strnum = in.next(); final Integer number = parse(strnum); if ( !seen.add(number) ) { // number of dupes is number of encounters minus one duplicates.merge(number, 1, Integer::sum); } } if ( duplicates.isEmpty() ) { System.out.println("No duplicates."); } else { for ( Map.Entry<Integer, Integer> duplicate : duplicates.entrySet() ) { // don't forget to add one to the dupe count to get total count System.out.println(format(duplicate.getKey()) + " " + (duplicate.getValue() + 1)); } } } /** Formats a parsed phone number to its normal form (NNN-NNNN). */ static String format(int phoneNumber) { final int prefix = phoneNumber / 10000; final int suffix = phoneNumber % 10000; return String.format("%03d-%04d", prefix, suffix); } /** Parses an unformatted phone number string, considering only the alphanumerics. * Does not guard for overflow. */ static int parse(String number) { int retval = 0; for ( int i = 0; i < number.length(); i++ ) { int digit; final char c = number.charAt(i); switch ( c ) { case '0': digit = 0; break; case '1': digit = 1; break; case '2': case 'A': case 'B': case 'C': digit = 2; break; case '3': case 'D': case 'E': case 'F': digit = 3; break; case '4': case 'G': case 'H': case 'I': digit = 4; break; case '5': case 'J': case 'K': case 'L': digit = 5; break; case '6': case 'M': case 'N': case 'O': digit = 6; break; case '7': case 'P': case 'R': case 'S': digit = 7; break; case '8': case 'T': case 'U': case 'V': digit = 8; break; case '9': case 'W': case 'X': case 'Y': digit = 9; break; default: continue; } retval = 10 * retval + digit; } return retval; } }
{ "pile_set_name": "StackExchange" }
Resources Euro Sentiment at Records as EURUSD Surges - What’s Next? EURUSD – Wow. According to FXCM Execution Desk data, retail traders have literally never been this short the Euro against the US Dollar. What now? Trade Implications – EURUSD: We usually use our Speculative Sentiment Index data as a contrarian indicator to price action—if everyone’s buying we look to sell and vice versa. The fact that there are nearly 4 traders short EURUSD for everyone long would normally leave us in favor of further Euro strength. Yet retail crowds are likewise frequently on the correct side of the trade at major turns. Sentiment extremes are only clear in hindsight, but a Euro failure at June’s high of $1.34 leaves distinct risk of reversal. Our sentiment-based Momentum2 trading system is currently long EURUSD, but a flip to a short order would be the first sign of a potential turnaround. --- Written by David Rodriguez, Quantitative Strategist for DailyFX.com Please note the information on this website is intended for retail customers only, and not for any Eligible Contract Participants (i.e., institutional clients) as defined in the Commodity Exchange Act §1(a)(18).
{ "pile_set_name": "Pile-CC" }
Q: ADx analytics android integration issue I try to integrate ADx mobile analytics into my android application. Maby something wrong with my AndroidManifest file. Can anyone provide me with rigth manifest integration. Thanks. I have such error log: 02-09 13:33:38.328: E/AdXAppTracker(13547): Add APP_ID to AndroidManifest.xml file. For more detail integration document. 02-09 13:33:38.328: I/AdXAppTracker(13547): URL parameters: udid=&androidID=447b5493f5e9c26f&device_name=&device_type=&os_version=&country_code=&language=&app_id=&clientid=&app_version=&tag_version=2.0a& 02-09 13:33:38.339: I/AdXAppTracker(13547): baseURL: http://ad-x.co.uk/atrk/android? 02-09 13:33:38.339: I/AdXAppTracker(13547): requestURL: http://ad-x.co.uk/atrk/android?udid=&androidID=447b5493f5e9c26f&device_name=&device_type=&os_version=&country_code=&language=&app_id=&clientid=&app_version=&tag_version=2.0a& 02-09 13:33:38.910: I/AdXAppTracker(13547): -------------------- 02-09 13:33:38.921: I/AdXAppTracker(13547): response status: 200 02-09 13:33:38.929: I/AdXAppTracker(13547): response size: 62 02-09 13:33:38.933: I/AdXAppTracker(13547): response: 02-09 13:33:38.933: I/AdXAppTracker(13547): <?xml version="1.0" encoding="UTF-8"?><Success>false</Success> 02-09 13:33:38.937: I/AdXAppTracker(13547): -------------------- 02-09 13:33:38.953: E/AdXAppTracker(13547): AdX Connect call failed. A: Maby my solution will be helpfull to anyone. So I was integrating this into the project on flash for Android. I have to write an native extention to include Ad-x analytics into my project. This error I got, because I have added xml properties to AndroidManifest.xml file, not in MyProj-app.xml file. When I added it into proper place - all works great.
{ "pile_set_name": "StackExchange" }
5 Urban Farms Reshaping the Food World in New Orleans When a city is as food-obsessed as New Orleans, it's natural that urban farming would go high-profile, too. And just as the city has more in its culinary repertoire than red beans and rice, its efforts to grow food boast a richer history than is apparent at first glance. Community gardens first took root here in the 1980s, spurred by economic decline that saw oil companies moving operations to Houston. Those gardens numbered more than 150 at their peak—and nearly all of them were used to grow food, says Jean Fahr, executive director of Parkway Partners, the nonprofit that coordinated those efforts. As in most cities, development pressures in the 1990s gobbled up much of that land; but here, the devastation of Hurricane Katrina more than tripled the number of vacant lots, which now number 66,000. The devastation of Hurricane Katrina more than tripled the number of vacant lots, which now number 66,000. Enter the next generation of urban farmers, most of whom operate through the New Orleans Food and Farm Network (NOFFN). NOFFN had launched prior to Katrina, planting its first food gardens in NOLA's Hollygrove neighborhood days before the storm. Post-Katrina, the dire lack of food in the city compelled NOFFN to switch gears; the group made national headlines with its DIY food maps of the city in the weeks after the storm. More recently, the group has gotten its hands dirty in the Big Easy's soil: planting farms, launching markets, and even training new farmers in the business of urban gardening. There are so many folks growing food in the city, in fact, that NOFFN is hard at work on a comprehensive guide to the city's food gardens, profiling more than 100 city growers. "The history of urban agriculture in New Orleans is very far-reaching," explains Ariel Wallick Dorfman, an urban agriculturalist at NOFFN. "But I would say the last five years is really when urban agriculture went beyond community gardens." Here are five examples of how New Orleans is taking city-grown food from farm stand to standing resource: 1. Hollygrove Market and Farm: Bringing the Next Generation of Urban Farmers to Market If there's one New Orleans farm that stands as a flagship for up-and-coming urban farmers, it would be Hollygrove Market and Farm. NOFFN first planted crops in the neighborhood in late August 2005—not long before Katrina made landfall. Two years ago, the local community development corporation laid claim to an acre of land off Carollton Avenue, a major thoroughfare. Half the land is dedicated to master gardener and community plots, with an outdoor oven and chicken coop along the periphery. In the center sits a shaded stage designed by local architecture students that does double duty as water catchment and presentation space, alongside a market structure where neighborhood residents can buy regionally and city-grown produce. But the crown jewel may end up being what sits on the other half: two sprawling plots handed over to experienced urban farmers who will be teaching New Orleanians how to farm city soil as a business enterprise. Macon Fry, dubbed the "Greens Guy," already has a solid business in microgreens, while Ronald Terry, a retired social services worker, is cultivating muscadine grapes, blackberries, kumquats and satsumas to bring to market later this year. Training classes have yet to start, though, so Fry keeps busy by working his land. A recent weekday morning had him on his hands and knees clearing out a row of arugula that had already been harvested. Business is so strong, he said, that he plows through three or four beds a week. "It's a really right rotation," he said, shaking the dirt from an arugula root. "I have to replant right away." Marilyn Yank wasn't looking to start an urban farm, but when the Ruby Slipper restaurant opened up shop in her Midcity neighborhood, the opportunity was too good to resist. The restaurant brokered an arrangement for Yank to begin farming a vacant lot across the street, and soon Yank was supplying the kitchen with what's become a common urban crop: microgreens. But the more Yank grew greens, the more she felt tugged in the opposite direction. "It felt like my household suffered," says Yank, who found herself growing more for market than her own kitchen. "I wanted to go back to diversity." So this fall—the beginning of NOLA's growing season, since summer is too hot for much to grow—Yank launched a city-based CSA, recruiting four families to buy shares of the bounty from her single city lot. As a founding member of the New Orleans Food and Farm Network, Yank—who'll be carefully measuring the amount of food she produces—is hoping the endeavor will help build the case for urban food production. Right now, she says, "there's no real data about how much food gets produced on a city lot in New Orleans." By the end of the growing season, she adds, "I can say, 'Look, four or five households can eat off this.'" NEXT: Bringing Rust Belt genius to the South 3. Our School at Blair Grocery: Bringing Rust Belt Genius to the South Some proponents of urban agriculture aim to capitalize on the newest tech solutions to the challenge of growing in limited space. And then there are growers like Nat Turner. Turner first came to New Orleans in the wake of Katrina as a volunteer, bringing down busloads of students—he was a teacher—from New York City. Before long, he decided to relocate and, after being handed a scholarship to learn commercial urban agriculture from Will Allen, the Milwaukee-based Macarthur "genius," he started looking for land. Turner settled in the Lower Ninth Ward, leasing a ruined former grocery store, still surrounded by weeds that reached the roofline, to use as a schoolhouse. By 2008, Turner had founded a miniscule, five-student charter school, Our School at Blair Grocery, focused on the urban farm he'd launched. It features several of Allen's trademarks: It is low-cost, low-tech, and turns waste into bounty, à la worm composting. Students earn a stipend for their contributions to the farm's business of selling its sprouts and greens to the city's restaurants. Today, the school's three greenhouses sit amid banana trees and compost piles—and generate sprouts and greens that average around $2,000 in sales each week, says Turner; he's aiming for $3,000. Staff are experimenting with another Allen favorite—aquaponics—and hope to eventually raise catfish on site. Students recently built a microgreen garden out of plastic hanging baskets. Indeed, Our School is set to get big, fast. This fall the USDA awarded the group a three-year, $300,000 grant under its Community Food Projects program, which will augment the stipends paid to students and help the school acquire additional land and open a community kitchen. In the meantime, Turner and his staff are expanding their work while navigating their place in the neighborhood fabric, an endeavor that can sometimes be "a mess," Turner says. And with a grin that suggests he's used to such things, he adds, "It's all going to work out just fine." NEXT: Making urban ag work 4. Covenant Farms: Making Urban Ag Work Founded: 2009 Size: Five sites, varying from one to five lots in size Managed by: Covenant House Location: Treme and Midcity There's one thing about farming that is indisputable: It's hard work. That alone made urban farming a good candidate to add to Covenant House's existing jobs and social enterprise programs for homeless youth. But there's a stealth objective too, says Michael Kantor, who oversees the group's urban agriculture program: Getting the young adults, most of whom are parents, to develop a taste for healthy food. "We want to get these kids to be able to go to the grocery store and pick out herbs and vegetables and know what to do with them," Kantor says. That's not to say they don't focus on business when it comes to farming. Youth in the program learn the life cycles of different crops, how to deal with composting and soil fertility, how to plan a garden and how to manage it; some go on to earn horticulture licenses, freeing them up to work in the landscaping industry. Much of what they grow ends up on high-end restaurant tables, of course, but it also trickles down into students' meals. In September, when the season's first vegetables came in, everyone sat down to grilled pizza featuring herbs, fruits, and vegetables from the gardens. It may well be working. "I ain't never had pizza with fresh herbs and fresh vegetables, not like that," said James Williams, 20, about the cookout. Though he's worked in restaurant kitchens, Harris said the meal taught him something new about creative ingredient pairings. "We even had a pear pizza, too, a sweet pizza with some goat cheese. It was good." Contaminated soil is always a concern for urban farmers—and in post-Katrina New Orleans, where floodwaters spread toxins far and wide, the worry has been particularly intense. But with work done at Sun Harvest Kitchen Garden, in the city's Central City neighborhood, growers are starting to relax thanks to one simple thing: sunflowers. In 2008, segments of the plot now housing Sun Harvest Kitchen Garden posted a range of lead levels that topped out at 1200 parts per million—triple the level allowed by law. After successive plantings of sunflowers, the levels dropped as low as 136 ppm. (Dr. Lovell Agwaramgbo, the Dillard University chemist who tested the site, cautions that the reduced levels could in part reflect that the soil had been tilled, and thus distributing toxins more evenly; he's currently conducting further research.) The garden is now overseen by Pam Broom, one of the city's top advocates for urban agriculture and an experienced urban farmer in her own right. She's gearing up to begin real food production—she needs a fence first, to keep out animals—with the goal of selling herbs and vegetables to a nearby nonprofit restaurant, Café Reconcile. For now, though, she's not too concerned about the site's financial prospects. "Somebody came in and helped themselves to the leeks, and I thought, 'That's so sweet.' I figured somebody needed it," she says. For now, she added, "I'm using this as a demonstration of what's possible." Tracie McMillan is a freelance journalist whose work focuses on the issue of access to good food, particularly within middle- and lower-income communities. Her first book, The American Way of Eating, examines food and class in America.
{ "pile_set_name": "Pile-CC" }
Q: Need Listbox to capture first selecteditem property as SelectedItem, rather than the PropertyChanged *TO* I have a listbox that, when an item is selected, invokes a method that executes a Stored Procedure. The problem is that when the first item is selected, my PropertyChanged event doesn't fire unless the selection is changed from one item to another. Thus the second item SelectedItem PropertyChanged notification is fired, but it looks like selecting the first item is just seen as entering the listbox, instead of entering the listbox AND selecting the item the click occurs on. Also, I can't just click twice on the same item to get the notification to fire, I have to actually select a different property for the event to occur. What is the best way to get the item I first click on upon entering the listbox to be the SelectedItem, having the PropertySelected/Property Changed event firing on this item? I hope this is clear. Below is my code, thanks in advance! In my viewmodel: public ObjectClass SelectedObject { get { return _SelectedObject; } set { _SelectedObject = value; base.OnPropertyChanged("SelectedObject"); } } void OnPropertyChanged(object sender, System.ComponentModel.PropertyChangedEventArgs e) { switch (e.PropertyName) { case "SelectedObject" : UpdateSelectedStuffList.StoredProcedureMethod(this); } } In my view: <ListBox ItemsSource="{Binding Path=ObjectCollection, Mode=OneWay, UpdateSourceTrigger=PropertyChanged}" DisplayMemberPath="objectName" SelectedItem="{Binding Path=SelectedObject, Mode=TwoWay, UpdateSourceTrigger=PropertyChanged}"/> I was thinking that instead of using PropertyChangedEventArgs, there would be something like "PropertySelectedEventArgs." OR, maybe I need to implement INotifyPropertyChanging? A: If you want this to fire even if you select the same item twice in a row, I would look at OnClick. Otherwise, consider setting the selected index to -1 so that when the first item is selected by the user, it will have a changed value.
{ "pile_set_name": "StackExchange" }
2008 Breeders' Cup The 2008 Breeders' Cup World Championships was the 25th edition of the premier event of the North American Thoroughbred horse racing year. It took place on October 24 and 25 during the Oak Tree meeting at Santa Anita Park in Arcadia, California. The Breeders' Cup is generally regarded as the end of the North America racing season, although a few Grade I events take place in later November and December. The 2008 Breeders' Cup results were influential in the Eclipse Award divisional championship voting. The Friday racecard featured five Breeders' Cup races for fillies and mares, culminating in Zenyatta's win in the Ladies Classic. On Saturday, the European contingent won five races, capped by an upset by English-based Raven's Pass over heavy favorite Curlin in the Classic. Lead-up Santa Anita racetrack hosted the Breeders' Cup for the fourth time in 2008. It was the first time that the event had been held on a synthetic dirt surface instead of natural dirt, as Santa Anita had changed to a Pro Ride surface in 2007 in response to a state mandate aimed at increasing the safety of the sport for both horses and jockeys. The change was of concern to both horsemen and bettors as it was difficult to predict which horses would respond well to the new surface and which would struggle. However, the change was expected to increase interest from European trainers, many of whom had access to similar all weather tracks. For the second year in a row, three races were added to the Breeders' Cup roster, bringing the total up to 14. In 2007, the Dirt Mile, Juvenile Turf and Filly & Mare Sprint had been added while in 2008, the Marathon, Juvenile Fillies Turf and Turf Sprint were added. The new races were intended to help fill out the Friday card and increase the range of options available to horsemen, particularly those from overseas. By rule, the new races could not be graded until their third renewal. Breeders' Cup officials decided to rearrange the racecards so that all five races for fillies and mares were held on Friday. "By shifting some of our traditional Saturday races to Friday, we ensure that Friday stands on its own as an international competition of the highest level", said Breeders Cup President and CEO Greg Avioli. "This new format provides a great stage to showcase the talents of the best female Thoroughbreds in the world." They also renamed the Distaff as the Ladies' Classic and instituted a ban on steroids. Because of the synthetic dirt surface, some horsemen from the East Coast hesitated to attend the event. In particular, Curlin, the defending Horse of the Year and winner of the 2007 Classic, did not commit to entering until after a strong workout at Santa Anita on October 14. In part because of the three new races, a record 180 horses were pre-entered, including a record 35 from Europe. The Friday races were broadcast on ESPN2. The Saturday card was broadcast on ESPN and ABC. Attendance was up slightly compared to 2007, with the excellent weather being credited. The two-day handle also increased by 5.5% to $155.5 million. However, attendance on Saturday was lower than on previous renewals held at Santa Anita, with high ticket prices cited as the major cause. The Saturday on-track handle was also the lowest since 1999, which was not unexpected given the 2008 economic downturn. Results The highlight of the Friday card was Zenyatta's dominant win in the Ladies Classic. The four-year-old filly came into the race undefeated but was facing the best field of her career, with four Grade I winning fillies shipping in from New York alone. Zenyatta broke last and continued to trail the field for the first of a mile before beginning her drive on the far turn. She quickly made up ground while circling wide and swept to the lead down the stretch, winning comfortably by lengths. She received a standing ovation from the crowd on returning to the winner's circle. Ventura was also a stand-out winner in the Filly & Mare Sprint, winning by the largest margin of the day while finishing just 0.01 second behind the track record. Stardom Bound won the Juvenile Fillies impressively while Maram just held off Heart Shaped by a nose in the Juvenile Fillies Turf. In the Classic, the favorite was Curlin, who raced near the back of the field then made his move on the turn, striking the lead at the top of the stretch. Raven's Pass and Henrythenavigator, outstanding milers from Europe, accelerated past Curlin and finished first and second respectively. Tiago closed late to finish third. In the Turf, Conduit was the second favorite because of his earlier win in the St Leger. Jockey Ryan Moore placed Conduit in the middle of the pack, then released him in the stretch where he out-kicked the others. It was Moore's first win at the Breeders' Cup but he was not available for comment after the race. "He's rushing off to the airport as he has to ride in France tomorrow," explained Conduit's trainer Sir Michael Stoute. "He's a big talent with a great racing brain and you'll be hearing a lot more of him." Other highlights included the French filly Goldikova taking on male horses and winning in the Mile. Her trainer Freddie Head compared her favorably to champion Miesque, who he had ridden to victory in the Mile in 1987 and 1988. Midnight Lute won the Sprint for the second year in a row, which also gave Garrett Gomez his third win of the day and fourth over the two days – a record. Midshipman won the Juvenile to establish himself as the early favorite for the Kentucky Derby. All told, European-based horses won a record five races at the Breeders' Cup: Raven's Pass in the Classic, Goldikova in the Mile, Donativum in the Juvenile Turf, Muhannak in the Marathon and Conduit in the Turf. Although this was partially credited to the artificial dirt surface, because of the increase in the number of races, it was proportional to their previous highs of three wins out of seven races in 1993 at Santa Anita and three wins in eight races in 2001 at Belmont, where they also finished second in the Classic. In the 2008 Eclipse Award voting, five of the eleven flat racing categories were awarded to horses who won at the Breeders' Cup: Stardom Bound (Champion Two-Year-Old Female), Midshipman (Champion Two-Year-Old Male), Zenyatta (Champion Older Female), Conduit (Champion Male Turf Horse) and Forever Together (Champion Female Turf Horse). In addition, Curlin was voted Horse of the Year and Champion Older Male despite his fourth-place finish in the Classic. Female Championship Friday The attendance was 31,257 Source: Equibase Saturday: Day 2 Source: Equibase References Breeders' Cup Category:Breeders' Cup Breeders' Cup Category:Santa Anita Park
{ "pile_set_name": "Wikipedia (en)" }
for people who care about the West The fading Arizona town of Gila Bend bets big on solar One afternoon last April, I took a walk down Pima Street, the main drag that runs through Gila Bend, Ariz., linking the state highway from Phoenix with Interstate 8 to Yuma and beyond. It had been an unusual spring in the Southwestern deserts; abundant late-season rains spread carpets of green across rocky hillsides in the Mojave Desert, which spans much of southern California and Nevada as well as nibbles of Utah and Arizona. And valleys in the Colorado Desert -- the California portion of the Sonoran -- turned gold with the blooms of long-dormant plants. Here in the Arizona Sonoran, it was a spectacular day: Clear and crisp, with a warm wind stripping clouds from the sky. And still the town itself looked dismal and sad. On the two-mile stretch between Love's gaudy gas station and the weird flying saucer hovering over the Best Western Space Age Lodge, I counted 11 battered and boarded-up buildings, including a laundromat, a convenience store and a motel, renovated in 2003 in anticipation of a housing boom that never happened -- another wave of renewal that dissipated a few miles short of Gila Bend. A dark-haired teenage girl and her Brylcreemed boyfriend sprawled in a languorous make-out session on the patch of lawn outside the Best Western, secure in their privacy. I was the only one on the street to observe them. Almost since the Hohokam people all but disappeared from here some 600 years ago, Gila Bend has been a sacrifice zone, a place where any activity, no matter how destructive, toxic or fleeting, has been welcome. Hazardous waste incinerators have come and gone and left behind their poisons; smoky gas-fired power plants chug pollutants into the air. Indeed, Gila Bend's last true revival happened in 1942, when the Gila Bend Auxiliary Air Field became a training hub for troops headed to desert battlefields, and the town's population grew 300 percent -- to nearly 2,000. (England's Prince Harry trained on the field last year, and was warned by Mayor Ron Henry to refrain from "fornicating" with local girls.) In the 1950s, the pink bollworm arrived in the region's cotton fields, and federal authorities fought it with clouds of DDT. The bollworm mutated and stayed; the DDT left the Gila River so poisoned that the U.S. Army Corps of Engineers declared the reservoir behind Painted Rock Dam just west of town a health hazard and banned humans from its waters. Cotton remains a mainstay of the local economy, but a faltering one, vulnerable to price fluctuations and competition with other countries' exports. Plus, southwestern Arizona is running out of groundwater; cones of depression have formed where agriculture has pumped too much for too long. But in all of human existence, it will never, ever run out of sun: Parts of southwestern Arizona rival the high Mojave in what engineers call "insolation" (short for INcoming SOlar radiATION). I had come to this outpost in eastern Maricopa County, 70 miles southwest of Phoenix, because so many people had told me it was a rational place to put utility-scale solar projects. I had spent years covering California's Mojave, where gigantic solar farms on public lands have biologists worried about lost habitat, depleted groundwater, even the desert's precious crust, a soil so packed with mysteries that scientists call it "cryptobiotic" -- the soil of hidden life. Conservationist locals have gone to battle against national environmental leaders pushing Big Solar; Native American leaders have sued green entrepreneurs for disturbing sacred sites and relics. Every single solar plant slated for the California Mojave since 2008 has been hit with some kind of lawsuit. But in the Sonoran Desert around and about Gila Bend, none of that seems to matter; there's no risk here of killing tortoises, destroying viewsheds or drying up critical seeps. The spring I first visited the town, the Spanish developer Abengoa had cleared five square miles along the interstate where farmers once grew alfalfa. Workers had already started to build the Solana Generating Station, a concentrating solar thermal plant that will one day power 70,000 Arizona homes. Solana, once finished, will produce electricity using a gantlet of long mirrored troughs that focus the sun's energy on a fluid; the fluid then flashes to gas and spins a turbine. It needs water to condense that gas back to liquid again, but only a tenth of what the alfalfa field did. It is, as a result, one of those rare desert places where 3,000 acres of mirrored tubes actually looks quite beautiful. And, to some people fighting for the future of this neglected town, they also look like hope -- provided politics and the economy don't get in the way. Building big solar plants on southwestern Arizona's old farmland appeals to more than conservationists. As Abengoa was staking out its solar parcel, Frederick Buss was winding up his work as city manager of Maricopa, Ariz., where the real estate market was collapsing, and heading to Gila Bend as the new town manager. His friends were incredulous. "People said, ‘Why are you applying out there? There's nothing there,' " Buss remembers. "But I'd started to study the area, and I thought ‘You know what? There's a real opportunity here, an opportunity to do something sustainable.' " Buss works out of the town hall on Pima Street, a flat ochre structure marginally more durable than a Quonset hut. Just inside the door to the left is an earnest hodgepodge of artifacts one might generously call a museum, where disorderly exhibits commemorate Gila Bend's place in history's footnotes: In 1846, the Mormon Battalion marched along the Gila River on its way to defend California against Mexico, 500 well-armed men who in the end fought only one battle -- against a herd of wild Arizona bulls. Two years later, the Oatman family took an ill-advised shortcut along the river, where they met up with Yavapai Indians, who killed most of the family but kept two daughters, one of whom went on to live quite contentedly among the Mohave Indians. When the first locomotive came through in 1877, Gila Bend's destiny was set: This is the kind of place you pass through, not one where you settle down. Knowing that, and knowing that town managers come and go in rural towns, I had pictured Buss as a man of prominent girth, a whiff of cigar smoke, maybe even suspenders. On the phone he sounded rough-edged and brusque, a manner I interpreted as the weariness of a bureaucrat trapped in a dead-end job in a nearly uninhabitable desert. Instead, Rick Buss turned out to be bright-eyed and fit at 43, with a full head of light-brown hair. In person the gravel in his voice turned to barely restrained enthusiasm, a sort of co-conspiratorial whisper. His office, a spare room abuzz with fluorescent lights, overflowed with plans and ideas, scrawled in block letters on every available surface. I asked him about "solar bees," a phrase jotted on a wallboard. "Solar bees are cool!" he exclaimed –– they're small pumps that help circulate water and make aerators much more efficient in water treatment plants that oxygenate as part of their cleansing process. Sustainability nerds obsess religiously about pumps, which by some estimates consume as much as 30 percent of the world's energy -- much of it wasted. "We put two solar bees out in our wastewater treatment facility," Buss said, suddenly animated. "It's reduced our energy consumption out there 50 percent." Buss didn't come straight out of college fixated on the power consumption of small machines. His ideals have evolved over the course of his career and concurrent education. In 2005, while working for the city of Maricopa, he earned a master's degree in public administration from Arizona State University, a mecca of forward-looking policy thought. At the same time, he was observing in real life a dizzying example of unsustainable growth. "When I got to Maricopa in 2003, it was a town of 5,000," Buss said. "A year later it was 15,000, and two years after that there were 40,000. At one point we were moving in three people an hour." By 2008, everything was spinning in reverse, like a tightly wound coil that now had no choice but to snap back. Foreclosures were happening almost at the pace that growth had before, and Maricopa was featured in an ABC News show called "Poster Child for the Housing Crisis." Gila Bend, meanwhile, had actually shrunk since the '80s. The economic plan an earlier town council had designed, based on a housing rush that never materialized, left the place a blank slate for another vision. And there was plenty of land: Just beyond Pima Street's little strip sprawl the remnants of a historic agricultural operation called the Paloma Ranch, 100,000 acres with access to water from the Gila River on its northern boundary, and rights to pump from the ground. Much of the land had already been flattened, making it easier for developers to construct level rows of mirrors and panels. Any local wildlife had long since adapted to human disturbance. No one would object to developing it. Buss thought Gila Bend had all the raw material to become a green-industry hub. "We have an airport here and we have a railroad here," he told me. "We have great connectivity on the vehicular side," meaning there's an east-west interstate freeway and a major north-south highway. "We're even on the Canamex corridor," a truck-and-tourist traffic route that runs from Montana to Arizona, established under the North American Free Trade Agreement as a "high-priority" system. A regenerative revolution in southwestern Arizona could boost the entire U.S. domestic economy, he argued, extending west to California electricity consumers and east to photovoltaic manufacturers in Ohio. During his first year in Gila Bend, Buss returned to ASU and got a graduate certificate in sustainable technology and management, along with an arsenal of freshly hatched theories about how societies work. From Gary Dirks, a former oil executive who now heads "Light Works," the school's solar business program, he took the concept of marketing "green electrons." The school's president, Michael Crow, talked about creating a "photon society," in which sunlight serves as the foundation of an entire economy, the way oil does in some countries. Sunlight produces electricity from photovoltaic cells and solar thermal collectors; it's also essential to growing algae, from which it's possible to create a near-zero-impact biofuel -- the only biofuel where "the inputs and outputs really make sense." Algae "consumes two-and-a-half times its weight in carbon-dioxide, and you don't even have to treat the water" you grow it in, Buss told me. "We're actively seeking out folks that can take biofuels from thousands of gallons to millions of gallons. That translates from 20 dollars a gallon in your gas tank to about three dollars." But it's still industrial solar -- both concentrating solar plants like Solana and massive fields of photovoltaic panels -- that holds the key to Buss' dream of economic renewal. He insisted that solar development could eventually generate thousands of local jobs in engineering, construction and management, attracting a new population that can then bolster restaurants, retail and hotel industries. Yes, he admitted, many solar-construction jobs are fleeting (see sidebar, this page), but "the idea is to stack the construction jobs and create almost a decade-long construction cycle." He could see ramping up to 10,000 megawatts of power within the 71-square-mile incorporated limits of Gila Bend. Construction workers will augment ongoing personnel who stay here to operate the plants, and by that time the economic engine will have enough momentum to stay in motion. When I talked to Buss on a 110-degree late September afternoon, three solar plants were under way in or near Gila Bend: the 17-megawatt Paloma plant, a field of 275,000 photovoltaic panels that Tempe, Ariz.-based First Solar was developing for the utility Arizona Public Service (APS); Cotton Center, an 18-megawatt project built by Tucson-based Solon, also for APS; and Abengoa's Solana, which will sell all of its 280-megawatt capacity to APS as well. All have been built on degraded, once-farmed land. And all had happened, by industry standards, with impressive speed. "First Solar's vice president, Jim Woodruff, said to me that he can't get a plant built faster anywhere else in the world," Buss says. "And that includes dictatorships." That efficiency has been enhanced by a process Gila Bend's economic planning director, Eric Fitzer, helped develop for Gary Smith, a Phoenix-based developer and contractor who grew up in nearby Stanfield. In 1998, Smith and his brother, Mike, teamed with other investors to buy the Paloma property, and then began selling it off piece by piece. Several parcels went to dairy farms, another to a tree nursery. But the largest chunk went to future housing ventures, including one 10,000-acre parcel upon which the Merrill-Paloma Ranch Corp. planned to build a high-density mixed-use development replete with schools, parks and grocery stores. That project never broke ground: After the housing crisis, Merrill-Paloma went bankrupt. And Smith started hearing from renewable energy developers who wanted to develop the land instead. Residential-to-energy was not an easy shift. On paper at least, Arizona has laws that require cities, towns and counties to submit zoning plans to voters for approval, and file them with the state. They can't be easily rewritten just because one industry fails and another rises in its place. Smith needed a way around the restrictions, a zoning plan specifically tailored to the needs of a fledging industry that might not stick. "I wanted the right to develop the land for solar," Smith says. "But I also wanted to know that one year later I could revert back to my original zoning." So Smith went to Fitzer and Buss. "We looked at this situation and said, ‘Why are they making solar development so difficult?' " Buss says. " ‘It's not like they're building a chemical plant or anything like that.' And then Eric came in and said, ‘I got an idea. A Solar Field Overlay Zone.' " Fitzer is 31 years old, with close-cut black hair and a thin shadow of beard. He is tall and lanky, like a teenager who hasn't quite filled out. Like Buss, he graduated from ASU, where he majored in urban planning and interned at a law firm specializing in real estate. "My job was to research every single municipal zoning ordinance and tear it apart," he says. "To find all the loopholes for our lawyers to make it through the process." After he graduated, he went to work for Maricopa at the height of the boom. "I was right out of college," Fitzer remembers, "and I walked into an enormous backlog of work. It was like, ‘Here's 10 master-planned communities with 2,000 homes each. We need ordinances, so have at it!' So I started writing ordinances. Lots and lots of ordinances. I got really good at writing ordinances." A year after Buss left Maricopa for Gila Bend, he lured Fitzer away as well. Fitzer was happy to leave. "I liked the idea of coming into a brand-new community, or a community that's been very small for years, and trying, on different terms, to give it a jumpstart," he says, snapping his fingers. "When I started looking at it -- the transportation infrastructure, the airport, the solar industry starting up -- I thought, you know what? We can do something better. With my affinity for writing ordinances, I came up with an ordinance." The Solar Field Overlay Zone, or SFOZ, marks an area that has been deemed appropriate for solar development, but is not reserved for it. "(The SFOZ) just sits on top of the zoning that was already there," Fitzer says. "If the land was previously zoned residential and the solar development doesn't work out, another developer can still build houses on that land." "Everyone who's developed here since Rick and Eric came in loves them," Smith says. And other communities have started to mimic their model. Last summer, Fitzer met with government officials in Boulder City, Nev., where a similar renewable energy hub is in progress. He's been helping the town manager of nearby Buckeye, Ariz., Stephen Cleveland, develop a renewable energy plan. "Stephen has some solar ambitions as well," Fitzer says. "He's looking at ways to streamline permitting." "We're not competitive with other cities," Buss says. "When you stop trying to hoard your own food, you realize that if everyone puts their food together, you all have a lot more food. That's part of sustainability for us." "The SFOZ has worked out so well for us," Fitzer says. "So now we're looking at what else we can streamline. How can we renew and regenerate this community –– create a boom? How can we make Gila Bend the place you go to build your green business?" One way, he imagines, is to spread the word that if you come to Gila Bend, your business can be solar-powered. "We're starting to market our green electrons to companies that are very concerned about their ‘triple bottom line,' " Fitzer tells me, invoking a calculus that sustainability expert John Elkington developed in the early 1990s to rank human satisfaction and planetary ethics on the same scale as profit. Companies including FedEx and New Belgium Brewing have adopted Elkington's "three Ps" -- people, planet and profit -- and Buss and Fitzer include those principles in proposals to regional economic development partnerships. They also tout the 315 megawatts of solar power they hope to have on the grid by 2014. ASU's Dirks himself acknowledges that this approach is brand-new -- and untested. But with Gila Bend's solar assets, he says, "Rick and Eric are well positioned to try it." And he likes how they've gone about it so far. "On one hand, they're thinking about how to make their community an attractive place for investors to come. But they're aware they're committing large pieces of land, and that has consequences." Triple-bottom-line company executives have to be sure the town management has addressed those land-use concerns responsibly. The Solar Field Overlay Zone has been key to that. "They've made (solar development) a straightforward process," Dirks says, "and they're doing a very professional job." In order for Buss and Fitzer's dreams to come true, one important thing has to happen: The demand for green electrons produced here has to go up. That means that either the Arizona Corporation Commission, an elected body of five officials, needs to raise the state's renewable energy portfolio standard, mandating that a higher percentage of renewable energy figures into each state utility's mix. Or else California has to start buying up a whole lot more power from its neighbor (see sidebar, page 18). Preferably both. Arizona's renewable energy portfolio standard was set in 2008 at 15 percent by 2025 under a decidedly pro-solar commissioner, Kristin Mayes. That's low compared with other states -- California requires 33 percent by 2020, Colorado, 30 percent by 2020 -- but barring a sharp detour from Arizona's march to become the most regressive state in the nation, no one will raise it. Republicans in the state Legislature have even tried to roll back the standard in imaginative ways. In 2010, State Rep. Debbie Lesko from the Phoenix suburb of Glendale proposed folding nuclear into the renewable energy mix; that would mean that, with its three-gigawatt Palo Verde Nuclear Plant, the state was already far past meeting its goals. Gov. Jan Brewer diplomatically strong-armed her into dropping the initiative, fearing that it would scare away foreign investors. (Abengoa, for example, will pay Arizona close to $400 million in taxes over Solana's 30-year life.) But Lesko hasn't given up. More recently, she pushed a bill through the House to strip the Corporation Commission of its authority to set a renewable energy standard at all, arguing that the costs of wind and solar put a strain on the ratepayers whom legislators are sworn to protect. Some critics believe that Lesko's bill goes against the state Constitution; tellingly, the current head of the commission, Greg Gary Pierce, does not. Which means Arizona won't be clamoring for more clean energy anytime soon. "It appears that the volume of renewable energy that the utilities are buying in Arizona is starting to drop," says John King, executive vice president of LS Power, an energy company that recently secured $550 million in private investment and bank loans for a 125-megawatt photovoltaic plant in Arlington Valley, 40 miles north of Gila Bend. "I think they've procured a lot of what they need to." Ted Geisler, manager of the solar program at APS, confirms that the utility is "the majority of the way" to getting enough renewable power to meet upcoming targets, including voluntary consumer demand (APS offers a "green choice" rate on electricity bills). When Solana comes online in 2013, the utility will have little use for more large-scale solar. Nor will Arizona's other large utility, the Salt River Project, which as a nonprofit cooperative isn't subject to the state law at all. That leaves the California option, for which there is hope, not least because the planned build-out of solar in the California Mojave has not gone as well as some predicted back in 2005, when the Energy Policy Act first called for 10,000 megawatts of renewable energy on public lands by 2015. That's in part because the desert that energy experts and developers once viewed as a wasteland waiting for the redemption of renewable energy turned out to be inhabited, not just by wildlife but by living human beings. And some of them had strong feelings about looking out onto acres of mirrored tubes and photovoltaic fields, as well as the depleting of their aquifers to cool plants and wash panels. Public land comes relatively cheap: The Bureau of Land Management charges an annual rental fee of somewhere around $100 to $300 per acre, depending on the exact location, plus a few thousand dollars per megawatt, depending on the size of the plant and the technology involved. But developing on public land has increasingly involved contentious public meetings and protracted legal battles. The Oakland, Calif.-based company BrightSource Energy, sued twice by wildlife conservation groups over its 370-megawatt tortoise-trampling Ivanpah solar plant, has had to scale back plans and twice halt construction due to environmental conflicts. The endangered Mohave ground squirrel took down a concentrating solar project German developer Solar Millennium had proposed near the Mojave city of Ridgecrest, Calif. Solar Millennium also had to broker a tough deal with the BLM over water use at its Amargosa Farm Road project, a proposed concentrating solar thermal plant in Nevada near the Ash Meadows Wildlife Refuge, where the mysterious desert pupfish struggles to hang on as its water supply warms and dwindles. In the end, the BLM insisted that the plant use air instead of water for cooling -- that it condense steam to liquid using desert air -- which makes solar plants far less efficient. Federal land managers have insisted upon dry cooling, however, in the California and Nevada deserts. Southwestern Arizona, with its vast acres of contiguous, privately owned and already trashed old farmland with water rights attached, offers an alternative to all that (see sidebar, page 20). Building on private land, even in Gila Bend, is far more expensive than leasing public land, at least in terms of the initial capital outlay. But Kate Maracas, Abengoa's vice president of operations in Arizona, attests that Solana, despite the high initial price tag -- the land alone cost upwards of $45 million -- has suffered no construction delays, no surprise wildlife appearances, and only one procedural holdup, when Abengoa's construction engineers needed access to a berm on federal land just outside the plant's property line. Maracas had to get the BLM to check a box and sign it. That took a year. The trick now is to find a way to connect southwestern Arizona's ideal solar land with green-electron-hungry California. LS Power's John King says his company's Arlington Valley project, which has a deal to sell power to Southern California-based Sempra Energy, was lucky enough to snatch some of the last space on transmission lines that will carry electrons to the Hacienda substation in western Arizona, which connects up with the California grid. "But those lines are pretty full now," he says. "I'm not sure how much more (they) can carry." Asked what they consider the stiffest obstacle in their plans for Gila Bend, Buss and Fitzer answer in unison: "Transmission." Electricity travels from generation source to consumer along lines strung across 150-foot towers that buzz day and night with their 500-kilovolt load; building them provokes thorny political and environmental conflicts, as well as questions about who benefits and who pays. Southern California Edison, for example, once planned to add a second line to existing transmission that connects a substation in western Arizona to one near Palm Springs, Calif. But in 2007, the Arizona Corporation Commission dismissed the plan as a "230-mile extension cord into Arizona" that would come at great expense to Arizona's economy and quality of life. (A 24-mile segment of the line would have crossed through a long-established refuge for bighorn sheep.) In 2011, the California utility began constructing a truncated segment of the line that ends near the Arizona border. It's also possible that the solar boom, such as it is, has peaked, and that any project that hasn't already attracted outside investors has little hope of getting off the ground in the next few years. LS Power's John King admits that his company is struggling to find customers to plug into a second Arlington Valley plant he'd hoped to have in construction by now. Solar Millennium, once a major player in the solar industry, returned a $2.1 billion loan guarantee to the Energy Department last September, and in February filed for bankruptcy in German court. Most of the firm's projects-in-process have been sold to other developers. Industrial solar firms are also suffering from cuts to federal support programs. Four of Arizona's large solar fields, including Solana, have been backed by a special Energy Department guaranteed loan program called Section 1705, after its location in the 2005 Energy Act. The 1705 program used stimulus funds to pay the million-plus dollar administrative costs associated with billion-dollar loans, a perk that mattered greatly to smallish developers taking risks on big solar farms. The Obama administration wanted to continue the program past its Sept. 30, 2011, end date with a $200 million boost. But then came Solyndra -- the high-tech photovoltaic company that declared bankruptcy last August, with a $500 million Section 1705 loan on the line. It was a failure so ill-timed that a conspiracy theorist might venture that it was a setup. Another program that turned tax credits into up-front grants, crucial to startup companies that may not turn an immediate profit, expired in early February. There is little hope of renewing it in the current Congress. None of this makes Rick Buss happy, especially not his own state's reluctance to expand the domestic renewable energy market. "It is what it is," he tells me. But he also believes there's a way around it. "What we're telling people to do is to look beyond the standard," he says. "If you're a fossil fuel energy company, are you an oil company, a gas company or an energy company? Do you blend renewable energy into your portfolio or do you rely on oil and gas, which you know is not going to last forever? "Energy is energy," Buss says. "And in Arizona we have the ability to provide energy. It's that simple." Two solar plants, Paloma and Cotton Center, came online in Gila Bend in December and January. "We're providing about 34 megs of power to the grid, and have for three or four of months," Buss says. So far, all of it goes to APS, but on Feb. 7, Buss met with several utilities, Energy Department officials and energy companies to launch the Gila Bend Transmission Initiative, a consortium he hopes will expedite the power lines southwestern Arizona so desperately needs to market its energy. "We have four conceptual lines that we've come up with. We're doing a corridor study to determine which routes have the least environmental impact." Buss and his allies would like to reduce the time it takes to build new transmission. "We're trying to get it down to three to five years," he says. "Right now, it takes 10." And five years is not that long if you believe, like Buss does, that the photon society is inevitable. "Eric and I are not sitting here saying that Arizona should be entirely solar powered," he says. "We realize that we're a society powered by coal and gas and nuclear. And solar is not like this magic pill that will solve all of our problems. "But we also think there's an optimal blend of solar into our energy mix," he says. "When we figure out what it is, it will revive this region."
{ "pile_set_name": "Pile-CC" }
Following several successful permanent placements within our primary schools Academics are now looking to recruit qualified level 3 teaching assistants to meet the demand for the new academic year. Academics have a strong record of placing many of our TA's into permanent work following a successful period of long term supply within our primary schools. What do we look for? You will be able to provide excellent support across the age range assisting the children with their daily tasks set by the teacher. You will be able to help pupils develop either working on a 1:1 basis or working within small groups. You will be able to help promote a safe and stimulating learning environment. You will be qualified to Level 3 or above or working towards the qualification, be adaptable and be able to work on your own initiative and have proven experience of working in a similar school environment. So if you have previous experience as a Teaching Assistant and possess the minimum level 3 qualification or working towards the qualification please submit an up to date CV to be considered. This is a great time to join Academics as we continue to grow from strength to strength making us first choice for many of the local primary schools. We are also only a handful of agencies across the UK to obtain both ASPCO compliance + and REC Audited Education Gold Standard Accreditations highlighting our commitment to safeguarding. So if you are a qualified Teaching Assistant looking to work in Crewe and surrounding areas please get in touch by sending an updated CV or calling 01782 444058 for more details.
{ "pile_set_name": "Pile-CC" }
In base 16, what is b + 2d4f? 2d5a In base 13, what is -7 - -698? 691 In base 11, what is -4 + 122817? 122813 In base 8, what is 46 - -352? 420 In base 13, what is -b7 + a32? 948 In base 9, what is 116 + 11223? 11340 In base 10, what is 49944 + 4? 49948 In base 6, what is 5341051 - 0? 5341051 In base 13, what is -2b75 - 100? -2c75 In base 2, what is -10100101 + 1111110010110? 1111011110001 In base 7, what is 1 + 114306? 114310 In base 14, what is 2 + -5514? -5512 In base 5, what is 34 + 204020? 204104 In base 14, what is 321b - 2? 3219 In base 6, what is 25 + -413211? -413142 In base 13, what is 1 + -7185? -7184 In base 15, what is 4c984 - -1? 4c985 In base 4, what is 210301113 + -2? 210301111 In base 16, what is -513 + 5? -50e In base 16, what is -3 - 4d2a? -4d2d In base 15, what is 2b2c - -7? 2b34 In base 13, what is 66b0 + 23? 6703 In base 16, what is -39201 - 2? -39203 In base 3, what is -12 + 21110202202? 21110202120 In base 14, what is 5 - cb73b? -cb736 In base 4, what is 113103031 - -1022? 113110113 In base 9, what is -41467 + 21? -41446 In base 10, what is -9 + -8883? -8892 In base 4, what is -2321 + 32102? 23121 In base 12, what is -5 - -5a57? 5a52 In base 15, what is 5 + -15e402? -15e3ec In base 7, what is -4 - -116622? 116615 In base 11, what is 57 + 302? 359 In base 7, what is -2 + -233205? -233210 In base 9, what is -103 + 30841? 30737 In base 3, what is -1022202 + 1200? -1021002 In base 11, what is -141386 + -5? -141390 In base 12, what is -767 - -82? -6a5 In base 8, what is -1236 - 6? -1244 In base 2, what is -1001001010100000111 - -10? -1001001010100000101 In base 13, what is -158ab5 + -b? -158ac3 In base 16, what is 107a9b - 0? 107a9b In base 9, what is -21224 - -1? -21223 In base 13, what is 3 + 362372? 362375 In base 4, what is -103 + -2230131? -2230300 In base 2, what is 11101 + -10110111001010? -10110110101101 In base 6, what is 25 + -20203? -20134 In base 7, what is 1634453 - 3? 1634450 In base 15, what is -60e5 - 15? -610a In base 4, what is 20213 - 2311? 11302 In base 8, what is 4 - -364172? 364176 In base 7, what is 21 + -4032? -4011 In base 9, what is -327685 + 4? -327681 In base 4, what is 22100132 + 1? 22100133 In base 3, what is -1 - 22120220? -22120221 In base 10, what is -22 + 12326? 12304 In base 12, what is -15 + -20110? -20125 In base 10, what is 9 - -119777? 119786 In base 8, what is 4 + -632553? -632547 In base 16, what is 1052 - 27? 102b In base 13, what is 22b889 - 1? 22b888 In base 8, what is 0 - -33746? 33746 In base 10, what is 597 - 150? 447 In base 3, what is 222112201 - 1211? 222110220 In base 10, what is 5 + 17014? 17019 In base 15, what is -32eb55 + 5? -32eb50 In base 14, what is 4 + db77? db7b In base 3, what is 0 - -20210112102? 20210112102 In base 9, what is 1503 - 27? 1465 In base 7, what is 11310 - -5? 11315 In base 4, what is 11013020 + 13? 11013033 In base 16, what is 3284 + -78? 320c In base 14, what is 9815 - -5? 981a In base 11, what is 1 + -55973? -55972 In base 14, what is -1725cc - 0? -1725cc In base 7, what is -160 - -1261? 1101 In base 3, what is -12 - -2111112102222? 2111112102210 In base 6, what is 5205022 - 11? 5205011 In base 13, what is -49 - -5443? 53c7 In base 7, what is -5 - -22205? 22200 In base 16, what is -24be + -5? -24c3 In base 16, what is 19c + -143? 59 In base 5, what is -230430213 - -1? -230430212 In base 12, what is -7 - -5a044? 5a039 In base 14, what is -202 + -654? -856 In base 5, what is 414 - -22010? 22424 In base 2, what is 100101 + 111101101001? 111110001110 In base 10, what is -5677 + -7? -5684 In base 7, what is 13420 - 24? 13363 In base 16, what is -e313 + -2? -e315 In base 12, what is 0 + -23a792? -23a792 In base 16, what is 1f5 - 2f0c? -2d17 In base 6, what is 20 + 42212? 42232 In base 16, what is 0 + 4159e? 4159e In base 10, what is -2 + -1948? -1950 In base 11, what is 2737 + -8? 272a In base 2, what is 11 + 1010011000110111001? 1010011000110111100 In base 16, what is f37 + -1? f36 In base 15, what is -4 + -208ab? -208b0 In base 3, what is 11 - -101022001? 101022012 In base 8, what is -741 + -46? -1007 In base 8, what is -7 - 51? -60 In base 10, what is 12542 - -5? 12547 In base 7, what is -14421 + -1? -14422 In base 15, what is -19b - a45? -be1 In base 14, what is a - -1772? 177c In base 11, what is 10 + 510a? 511a In base 4, what is 200 + -22113? -21313 In base 11, what is -62481 - 2? -62483 In base 11, what is -5414 + 46? -5379 In base 14, what is -2 + -3b35d? -3b361 In base 8, what is -10 - 13710? -13720 In base 3, what is 10 + -1222121110? -1222121100 In base 4, what is 2321133 + 101? 2321300 In base 7, what is -3061330 - 0? -3061330 In base 13, what is 5 - 3206a? -32065 In base 5, what is -1 - -12202430? 12202424 In base 14, what is 24d + 1a08? 1c57 In base 5, what is -14300430 + -1? -14300431 In base 12, what is -5a04 - 19? -5a21 In base 4, what is -1102 - -31? -1011 In base 2, what is 10101110010 + 101010? 10110011100 In base 3, what is -21120000 - 0? -21120000 In base 13, what is 5578b + -3? 55788 In base 6, what is 0 + -11232104? -11232104 In base 16, what is 2f + -998? -969 In base 6, what is -1225 - 551? -2220 In base 15, what is 581 + c6? 657 In base 9, what is 1 - -10614? 10615 In base 3, what is -202 - -120102? 112200 In base 11, what is 12 - 2135? -2123 In base 16, what is -78 + 7a? 2 In base 12, what is -24574b - -4? -245747 In base 11, what is -351 + -4136? -4487 In base 7, what is 340664 + -12? 340652 In base 12, what is 26 - -1871? 1897 In base 5, what is -20 - -21110220? 21110200 In base 9, what is -5 - -6001? 5885 In base 12, what is 1b4a0 + -a? 1b492 In base 11, what is 3 - -384? 387 In base 4, what is 1223213 - -31? 1223310 In base 15, what is -11 + -7394? -73a5 In base 2, what is 10010101 + -111010000011? -110111101110 In base 5, what is -1010013 + 1? -1010012 In base 7, what is 2 + 236630? 236632 In base 13, what is -9101 + 3a? -9094 In base 7, what is 155240 + -14? 155223 In base 5, what is 0 + -23310341? -23310341 In base 13, what is cbc + 5? cc4 In base 3, what is 102020200220 - -2? 102020200222 In base 11, what is -575423 - -2? -575421 In base 8, what is -2411 + -1303? -3714 In base 3, what is -2 + -20110221010? -20110221012 In base 14, what is b338 - 0? b338 In base 6, what is -10211314 + 2? -10211312 In base 10, what is -613 + -280? -893 In base 7, what is 2 + 161435? 161440 In base 16, what is -26ce + -2? -26d0 In base 15, what is 5 + 18? 1d In base 5, what is 2 + -1143411? -1143404 In base 9, what is -85 - -10227? 10132 In base 13, what is -130 - -3150? 3020 In base 13, what is -8566 - 0? -8566 In base 9, what is 2274756 - 3? 2274753 In base 14, what is -87d1a - -4? -87d16 In base 2, what is 0 + -1011010001000000? -1011010001000000 In base 15, what is 8c + -59? 33 In base 16, what is -da92 + -29? -dabb In base 2, what is -10101101 - 100101? -11010010 In base 7, what is -12631 - -56? -12542 In base 11, what is 3 + -14754? -14751 In base 8, what is -2340176 + 3? -2340173 In base 11, what is 1283 - -1? 1284 In base 6, what is -340 - 103? -443 In base 11, what is 20942 - 147? 207a6 In base 9, what is -14738 + 7? -14731 In base 11, what is 668a - 5? 6685 In base 16, what is -42e8 - 6? -42ee In base 3, what is -1021100100 + -11? -1021100111 In base 6, what is -2442551 + -31? -2443022 In base 12, what is 394774 + 4? 394778 In base 10, what is -29058 + 4? -29054 In base 2, what is -101100 + -11100001101? -11100111001 In base 16, what is 39 - 1b5? -17c In base 7, what is 6 - 3105436? -3105430 In base 5, what is -2003334304 - -3? -2003334301 In base 13, what is -4 - 61a8? -61ac In base 14, what is c276 + 28? c2a0 In base 7, what is 103 + 6033? 6136 In base 12, what is -1144 + 6? -113a In base 16, what is 2 + 1fbd? 1fbf In base 9, what is -61 - 3258? -3330 In base 3, what is -2 + -22220201110? -22220201112 In base 9, what is 14601 + 4? 14605 In base 13, what is 4 + -131c? -1318 In base 11, what is -1043528 - 4? -1043531 In base 5, what is -22431 + 1104? -21322 In base 9, what is -57676 - 2? -57678 In base 6, what is 50 + 3422453? 3422543 In base 6, what is -331154 + -5? -331203 In base 4, what is 2220213 - -20? 2220233 In base 9, what is -1135384 - -4? -1135380 In base 3, what is 22210210 + -22? 22210111 In base 4, what is -
{ "pile_set_name": "DM Mathematics" }
Media advisor Tzachi Lieber, who is currently being investigated as a suspect in the submarine affair , admitted he acted as a middleman to transfer money from state witness Miki Ganor, to Prime Minister Benjamin Netanyahu’s former cabinet chief David Sharan Follow Ynetnews on Facebook and Twitter In the latest development on the affair, also known as Case 3000 involving the scandal-ridden purchasing of Israeli vessels from the German submarine company ThyssenKrupp, Lieber said he was willing confront Sharan directly on the claim that such a transfer was made on two occasions which he currently denies. Tzachi Lieber (L) and Miki Ganor (Photo: Orel Cohen) When his interrogators pressed him on why Ganor paid the money to Lieber's media consultancy firm and to his business partner and strategic advisor Nati Mor, Lieber admitted that no strategic advice was given to Ganor in return. “We didn’t provide a service for Ganor, I transferred the money to Sharan,” Lieber told his investigators, raising further suspicion that the money had been funneled as a front in its use for other purposes. David Sharan (Photo: Motti Kimchi) Despite his willingness to talk to Sharan on the issue, Lieber also pointed out that the two had been good friends, implying the transfer, from his viewpoint, was simply an innocuous favor. “The bottom line is that I did a good thing for a friend,” Lieber said as he explained to investigators the lump sums were transferred in cash. Miki Ganor (Photo: Ra'anan Ben Tzur) Asked to account for Sharan’s denial that any such transfers were made, Lieber doubled down, telling his interrogators: “I am telling the truth. I am prepared to confront David Sharan on this.” Lieber’s testimony also corroborated that provided by Ganor positing that Sharan did indeed take the money. 'Tzachi, I told them everything' After giving his testimony, Lieber ceased cooperating with the investigators. At this point, for the first time since he became a state witness, Miki Ganor was brought by the police to confront a suspect—Tzachi Lieber, who used to be a good friend of Ganor before the affair. "Tzachi, I told them everything. Now tell them yourself," Ganor pleaded with Lieber, but he refused to cooperate any further. According to the details, Ganor transferred the cash to Lieber and Mor’s business in the amount of NIS 28,000 plus VAT. On another occasion, NIS 50,000 were transferred plus VAT. Excluding the VAT Lieber claimed all the money ended up in Sharan’s pockets. A breakthrough was made in the investigation when on Thursday Lieber’s defense attorneys admitted on his behalf during court discussions regarding the extension of his remand that he transferred money to Sharan from Ganor.
{ "pile_set_name": "OpenWebText2" }
Tracking the latest news on the food, chains, industry and trends of Fast Food. brought to you by Fast Food Facts - the fast food nutrition database. Monday, September 01, 2008 Wendy's 'Never Frozen' Claims Justified Wendy's "Always Fresh, Never Frozen" claims have been upheld by the BBB. Burger King took issues, last year, with a claim Wendy's made in some of their advertising. Two of the claims made in television advertising by Wendy's that were challenged were these lines: "If hamburgers were meant to be frozen, wouldn’t cows come from Antarctica? Wendy’s hamburgers are made with fresh never frozen beef. Who else can say that? It’s better than fast food. It’s Wendy’s." "So, Dad, you know Wendy’s is dedicated to using fresh beef that’s never been frozen do you realize what kind of commitment that takes? I mean, to vow to something and then to continue to deliver on that promise ... a promise is only good if it is kept. Wendy’s hot and juicy hamburgers are made with fresh, never frozen beef, that’s a promise. Its way better than fast food, it’s Wendy’s." Wendy's supplied NAD with "a thorough explanation of how the process was specifically designed to process only fresh beef and why there is no danger of the beef temperature falling below the freezing temperature." The NAD stated: "Following its review of the evidence in the record, including the affidavit, NAD found that the advertiser provided a reasonable basis to support the claim, "Wendy’s, Always Fresh, Never Frozen," with respect to its hamburger patties."
{ "pile_set_name": "Pile-CC" }
Is there a smallest distance? My friend and I stayed up one night when we were in junior high school, and we were discussing science, and he asked me if I knew if there was a smallest amount of distance that an object could move. I was really into computer graphics (1980s-90s), so I said space might be continuous, or there might be increments (like pixels or quanta) that objects use to move in little jumps, if you will. Later I pointed out that most small constituents are vibrating anway, and only slow to a stop at a temperature of Absolute 0. However, this is sort of an aside answer, not a real answer to the stated question. Anyone know or care to offer their thoughts? I hope this is not another overly used thread topic... In response to the uncertainty principle response: what if the moving object is macroscopic and not a single particle? Would there still be uncertainty in its position and momentum when trying to determine the continuity of its motion? However, this alone does not clear up for me enough whether or not motion is continuous and whether we live on a grid, like graph paper, of space. Planck's length 1 ------------- ..------------- (dots are simply placeholders) Planck's length 2 Above, we can see that there is still locations in between two points a Planck's length apart. Just do the calculation yourself it's straightforward highschool algebra! As for the second part of your question I think the question is insufficiently precise to have a well defined answer. For example: Basic quantummechanics says a particle can have spin up or down, but it can "move" between these states continuously in some sense (the expectation value can). Now in a theory of QG spacetime intervals required for operationally defining velocities should be QM measurements. How to correctly interpret these is a subtle and open question in general. I talked to my friend again over the phone just now. He said his question had to do with something he read in Discover magazine back in the 1980s or early 1990s about the smallest amount of volume that space can be. He read something about loops and some sort of loop theory of space, and he wasn't sure what was outside the individual loop (inbetween loops, I suppose) -- as it would not be space, one would infer. He also mentioned Xeno's paradoxes, on which I had posted in the Philosophy forum already. If you start talking about strings and branes, it is perhaps difficult to visualise what is going on in 10 dimensions, let alone "distance" they propagate. I don't really know how to properly answer your original question. But I can make these remarks: Physics as we know it is only good up to a certain point; in terms of length/energy scale, Planck length is the limit, and that's why we need a new theory... string theory is one of them. Strings and branes propagate and move on the Worldsheet and how would that correspond to physical movement in 3+1 dimensions.... can be a bit tricky to visualise. I am sure a string expert can answer that much better than I can. msjd et al.: Thanks for a valiant effort. I had read 10 chapters from The Elegant Universe and I didn't know how the Planck's length applied to the smallest increment of motion of a meter-or-so sized body. I guess it would be difficult to verify anyway. Keep in mind the HUP limits our ability to measure, it does not forbid the universe from acting on scales beyond the reach of our instruments. From a scientific viewpoint, actions beyond observational limits complicate our efforts to do 'science'. That does not mean they are impossible, or necessarily irrelevant. We have taken some leaps of faith in cosmology that incorporate unobserved aspects of the universe into theory - e.g., dark matter. If DM resides in hidden dimensions, as suggested by ST, we may never be able to detect it by means other than gravitational effects. -The question is, if there is a minimum amount of space then why can't we have Quantum Gravity??, since the Feynmann Path-integrals would become just ordinary multi-dimensional integrals that could be evaluated by Numerical methods to calculate propagators without recalling to (divergent) perturbation theory. -Another Question is how do you define 'Geommetry' in a discrete space-time?, since Riemann only worked with continous surfaces so [tex] g_{ab}dx^{a}dx^{b} [/tex] were just the line element, although they have mentioned uncertainty principle to show that there's a minimum distance (could anyone provide the demonstration please??) i think this fact should come up from the theory when 'Quantizying' the surface. -It really surprises me (not in bad sense) how this question arose to 'eehiram' and his friend using computers ,since there's hardly a connection between informatics (in classical sense) and Gravity, ain't this amazing?? Doesn't HUP and QM intrigue you >.< Apparently stars that we can't see are in a superposition of states where it is in nuclear fusion and where it isnt >.< When Observed HUP applies and thats why the Sun can do it...
{ "pile_set_name": "Pile-CC" }
Sudha Pennathur Sudha Pennathur (born in Chennai, India) is an Indian jewelry, scarf, holiday ornaments, & art objects designer and entrepreneur. Pennathur designs and brings Indian inspired jewellery and crafts to the American Market. Daughter of Dr. Krish Pennathur, noted Indian author of productivity and business management books. Education Pennathur studied commerce at Mumbai's Sydenham College, Business Administration at Columbia University, and Computer Science at University of Washington Business approach Pennathur has sought to keep the art of Indian Craftsmanship alive by employing local artisans to create jewellery, clothing and decorator items. Pennathur wanted to match American consumers' tastes with the skills of India's deep reserves of artisan labour. (This is in contrast to factory produced goods.) Career Pennathur started her own business, Sudha Pennathur LP, in 1985. Pennathur was formerly employed by Levi Strauss and Carter Hawley Hale Stores. She also has worked at Carson Pirie and Scott. Achievements Worked with Indian Government to reduce red tape involved in exportation from India. Awards 2014 – Girls Inc. – Strong, Smart & Bold Leader of Distinction 2013 – Bread & Roses Labor of Love Award (In recognition of 12 years of extraordinary generosity and devotion to the Bread & Roses mission of Hope & Healing Through Live Music) 2 October 1992 – Pennathur was presented the Entrepreneur Award from the Asian Pacific Women's Network at their 11th Anniversary Woman Warriors Awards Dinner, Which was recognized by a Certificate of Commendation by the City of Los Angeles Charity Work Berkeley Rep - Member, Board of Trustees (2016–Present) Aquarium of the Bay - Advisor/Ambassador (2018) Board Member & supporter (2009–2013) of Angel Island Conservancy whose focus is to facilitate the preservation, restoration and interpretation of historical and natural resources on Angel Island. Sudha is a long time supporter and former Board President of The Redwoods in Mill Valley. The Redwoods is a non-profit active home for seniors in Mill Valley, CA. Pennathur has served on the board of Bread and Roses for 6 years, two of those as co-chair. (Bread & Roses is dedicated to uplifting the human spirit by providing free, live, quality shows to people who live in institutions or are otherwise isolated from society.) Donor to the Sarvodaya International Trust The Sarvodaya International Trust aims identify and support those Gandhian institutions and voluntary organizations which are of importance in the context of the objects and doing' laudable and commendable work in the moral, non-violence, peace, communal and racial harmony fields and in the Social, Cultural and Environmental spheres, on Gandhian lines. SUDHA'S TREASURES ANNUAL BENEFIT SALE Since 2004, Sudha has opened a once-a-year holiday store (Sudha's Treasures) that benefits local charities. 100% of the profits are donated to various charities that she supports. Past beneficiaries include: Bread & Roses The Redwoods Angel Island Conservancy Gateway Public Schools The Friendship Club In 2017, Sudha's Treasures benefited: Equal Rights Advocates Whistlestop North Bay Children's Center In 2018, Sudha's Treasures benefited: Berkeley Rep Whistlestop North Bay Children's Center Marin Villages In 2019, Sudha's Treasures benefited : Whistlestop Marin Villages Marin Symphony She is a founding member of the Kilpennathur School building in Pennathur, India. References External links Pennathur.com – Sudha Pennathur LP. website Tulsa World - Speaker at women's business leadership conference stresses giving back to community, 5 March 2015 Twin Cities Times - Sudha Sale Sustains, 14 November 2012 The New York Sun - Sudha Pennathur's 'Sari' State, 29 August 2005 Book Excerpt – The four phases of society: where are we going in the 21st century?, Peter Peeters, Greenwood Publishing Group, 1998 Women entrepreneurs:moving beyond the glass ceiling Dorothy Perrin Moore, E. Holly Buttner, Sage Publications, 1997 India Today – Volume 20, Issues 19–24, Thomson Living Media India Ltd., 1995 Our wildest dreams:women entrepreneurs making money, having fun, doing good- Joline Godfrey, HarperBusiness, 1992 Womanpower:managing in times of demographic turbulence Uma Sekaran, Frederick T. L. Leong, Sage, 1992 Book Excerpt – India, the Challenge of Change Pranay Gupte, Methuen/Mandarin, 1989 The Spirit of India in Jewelry – The Boston Globe (Boston, MA), Julie Hatfield, 4 June 1987 Forbes, Volume 140, Issues 5–9 – Forbes Inc., 1987 Jewel architects are here – The Times of India, Bombay, 4 December 1986 Business India Harvard Business Review, Issues 198–204, A.H. Advani, 1985 Computer decisions, Volume 16 Hayden Pub. Co., 1984 Category:Living people Category:Businesspeople from Chennai Category:Businesswomen from Tamil Nadu Category:Indian jewellery designers Category:Columbia Business School alumni Category:University of Washington alumni Category:Indian women designers Category:20th-century Indian designers Category:Artists from Chennai Category:Women artists from Tamil Nadu Category:Year of birth missing (living people)
{ "pile_set_name": "Wikipedia (en)" }
Golden Pacific Airlines (1969–1973) Golden Pacific Airlines was a regional airline headquartered in San Francisco, California that operated flights to cities in the Redwood Empire and Central Valley between 1969 and 1973. It was founded by Floyd Braeseke, a former air force pilot. Golden Pacific began service in March 1969 with flights from Ukiah and Santa Rosa to San Francisco International Airport. The airline served 15 cities by 1970, but was found by the California Public Utilities Commission to have operated at a loss for its first 16 months. In 1972, Golden Pacific was reported to have sold four of its Beech 99 aircraft it had used on its scheduled Northern California service, and was leasing two Twin Otters from Golden West Airlines pending approval from the Civil Aeronautics Board of an application to operate the Corvair 600. This application was denied later the same year. See also List of defunct airlines of the United States References Category:Defunct airlines of the United States Category:Airlines established in 1969 Category:Airlines disestablished in 1973
{ "pile_set_name": "Wikipedia (en)" }
Q: Swift changing different labels labelData in every loop So i would like to simplify this chunk of code to a simple for loop. But UITextFields and UILabels are giving me some hard time. @IBOutlet var thingsIUse: UITextField! @IBOutlet var orThis: UILabel! saveProgress(year: year, season: season, day: "1", value: "\(Int(day1new.text!)! + Int(day1newExtra.text!)!)") saveProgress(year: year, season: season, day: "2", value: "\(Int(day2new.text!)! + Int(day2newExtra.text!)!)") saveProgress(year: year, season: season, day: "3", value: "\(Int(day3new.text!)! + Int(day3newExtra.text!)!)") saveProgress(year: year, season: season, day: "4", value: "\(Int(day4new.text!)! + Int(day4newExtra.text!)!)") saveProgress(year: year, season: season, day: "5", value: "\(Int(day5new.text!)! + Int(day5newExtra.text!)!)") saveProgress(year: year, season: season, day: "6", value: "\(Int(day6new.text!)! + Int(day6newExtra.text!)!)") saveProgress(year: year, season: season, day: "1Taki", value: day1new.text!) saveProgress(year: year, season: season, day: "2Taki", value: day2new.text!) saveProgress(year: year, season: season, day: "3Taki", value: day3new.text!) saveProgress(year: year, season: season, day: "4Taki", value: day4new.text!) saveProgress(year: year, season: season, day: "5Taki", value: day5new.text!) saveProgress(year: year, season: season, day: "6Taki", value: day6new.text!) To something like this... for k in 1...10{ saveProgress(year: year, season: season, day: "\(k)", value: "\(Int(day\(k)new.text!)! + Int(day\(k)newExtra.text!)!)") saveProgress(year: year, season: season, day: "\(k)Taki", value: day\(k)new.text!) } Any suggestions? A: You can solve this a few ways. One is to use IBOutlet collections. In swift, you define them as such: @IBOutlet var dayLabels: [UILabel]! Then make sure you go in your Xib/Storyboard and add references to your labels by clicking the little "+" beside the collecting name and dragging it to the various labels. Since this is a collection, you can drag like this to many labels just make sure you add them in the order you want them updated. Another way to solve this, is to create the array of the labels you want updated dynamically at runtime, like this: let labelsToUpdate: [UILabel] = [day1new,day2new,day3new,day4new,day5new,day6new] for k in 0...5 { let day = "\(k+1)" let label = labelsToUpdate[k] ... } There are several other optimizations you could do to keep your code clean, but this will be a good start to achieve what you want. Good luck!
{ "pile_set_name": "StackExchange" }
News..Exclusives..Relationships..Everything You Need To Know & YES The Word of God Thursday, September 30, 2010 Ghanaian Actor Van Vicker counts blessings The Ghanaian actor who got more popular with Nigerian movies, Van Vicker has been asking people to help him thank his creator. In his words, he said ‘I'm from a humble background, never imagined that one day I would be able to pay bride price, raise (support) three kids, own a house, buy cars, have a bank account, own finer things, touch lives and even help others. It’s not my might, it’s His Grace. I'm blessed. Now, I see an even brighter future’. Wow, it is sometimes good to be grateful to God and never forget Him as the source. It does nothing to you than to make you humble, and even get more blessings. Yelz o
{ "pile_set_name": "Pile-CC" }
Q: apt - checking if a similar package has been installed This question explains how to find out if a given Debian package has been installed, but it does not take into account "synonyms" when installing via apt-get. For instance, if I try apt-get install libncurses-dev, apt-get replies: Note, selecting 'libncurses5-dev' instead of 'libncurses-dev' And then it installs that package (libncurses5-dev), which is fine by me. But what if I want to make a script to detect if the package has already been installed? dpkg -s libncurses-dev replies that the package is not installed, which is indeed correct, since it's libncurses5-dev that was installed. But I'd like my script to detect that, in this case, it no longer needs to install libncurses-dev. I could not find an option in apt-get to check if the given package or one of its providers has already been installed, such that my script would work when checking for libncurses-dev as well as for libncurses5-dev. A: If you want to write a script to check to see if package libncurses-dev or its alias has been installed, consider the following program flow: Check if the package has been installed with dpkg using the exact name, libncurses-dev in this case. If the above does not evaluate to true, then search apt for the package you are looking for using the non-aliased name: $ apt-cache search libncurses-dev libncurses5-dev - developer's libraries for ncurses It appears that apt-cache search will return the 'alias' if the package has one. If #1 evaluates false and #2 returns an alias, just grab the package's alias and try #1 again. Check dpkg again with the alias name of the package, in this case it would be libncurses5-dev. If dpkg does not find the package by an alias (actually a superseded package) then it must not be installed.
{ "pile_set_name": "StackExchange" }
Measurement of cerebral blood flow (CBF) is of interest, both in the clinical setting and for research. Absolute quantification of global CBF is of key importance when investigating factors affecting the entire brain, eg, altered physiological states or aging.[1](#jmri25442-bib-0001){ref-type="ref"}, [2](#jmri25442-bib-0002){ref-type="ref"}, [3](#jmri25442-bib-0003){ref-type="ref"} Different invasive and noninvasive methods have been used to measure global CBF.[4](#jmri25442-bib-0004){ref-type="ref"}, [5](#jmri25442-bib-0005){ref-type="ref"} Phase‐contrast mapping (PCM) magnetic resonance imaging (MRI) allows measurement of total flow in the cerebral arteries, and calculation of global CBF by subsequently normalizing to brain volume.[6](#jmri25442-bib-0006){ref-type="ref"} Measurement of global CBF by PCM MRI has a number of advantages compared to other techniques. It is completely noninvasive, fast, and can be combined with other noninvasive MRI techniques for absolute quantification of global cerebral metabolic rate of oxygen[7](#jmri25442-bib-0007){ref-type="ref"}, [8](#jmri25442-bib-0008){ref-type="ref"} or be used for scaling of regional CBF measured by arterial spin labeling.[9](#jmri25442-bib-0009){ref-type="ref"}, [10](#jmri25442-bib-0010){ref-type="ref"} The technique has been used in a number of studies on variation in CBF in healthy individuals[11](#jmri25442-bib-0011){ref-type="ref"}, [12](#jmri25442-bib-0012){ref-type="ref"} and in larger population‐based studies of aging showing that global CBF decreases with age and that decreased global CBF is associated with accelerated signs of brain aging and increased all‐cause mortality.[2](#jmri25442-bib-0002){ref-type="ref"}, [3](#jmri25442-bib-0003){ref-type="ref"}, [6](#jmri25442-bib-0006){ref-type="ref"}, [13](#jmri25442-bib-0013){ref-type="ref"}, [14](#jmri25442-bib-0014){ref-type="ref"}, [15](#jmri25442-bib-0015){ref-type="ref"} Values of global CBF obtained by PCM MRI in healthy subjects[6](#jmri25442-bib-0006){ref-type="ref"}, [16](#jmri25442-bib-0016){ref-type="ref"} are generally in good agreement with accepted textbook CBF values of ∼50 mL/100 g/min.[17](#jmri25442-bib-0017){ref-type="ref"}, [18](#jmri25442-bib-0018){ref-type="ref"} Previous studies have also shown excellent reproducibility for CBF measurements in vivo[12](#jmri25442-bib-0012){ref-type="ref"}, [16](#jmri25442-bib-0016){ref-type="ref"}, and shown PCM MRI to be accurate for measuring flow in phantoms[19](#jmri25442-bib-0019){ref-type="ref"} and in large vessels.[20](#jmri25442-bib-0020){ref-type="ref"} In order to confidently interpret the physiological significance of these measurements, in vivo validation of the accuracy of PCM MRI for CBF measurements is required. However, comparative studies with accepted reference methods are generally lacking. For human studies, ^15^O‐H~2~O positron emission tomography (PET) is generally considered the best available method for absolute CBF measurements.[9](#jmri25442-bib-0009){ref-type="ref"}, [21](#jmri25442-bib-0021){ref-type="ref"}, [22](#jmri25442-bib-0022){ref-type="ref"}, [23](#jmri25442-bib-0023){ref-type="ref"}, [24](#jmri25442-bib-0024){ref-type="ref"} One previous study failed to show a correlation of CBF measured by PCM MRI and ^15^O‐H~2~O PET, but these measurements were obtained months apart and did not account for a number of important physiological covariates.[16](#jmri25442-bib-0016){ref-type="ref"} The aim of the present study was to validate PCM MRI for measurement of global CBF by same‐day measurements of global CBF by PCM MRI and ^15^O‐H~2~O PET. Materials and Methods {#jmri25442-sec-0006} ===================== Twenty‐two healthy males (mean age: 27.4 years, range: 18--40 years) participated in the study. The measurements were obtained as a part of a placebo‐controlled, crossover study investigating the effect of erythropoietin on cerebral metabolism. Measurements from PCM MRI have previously been published.[8](#jmri25442-bib-0008){ref-type="ref"} In the present analysis only data during placebo treatment are included. The study was approved by the Danish National Committee on Health Research Ethics (H‐4‐2012‐167) and was conducted according to the Declaration of Helsinki. Written informed consent was obtained from all participants. General Experimental Setup {#jmri25442-sec-0007} -------------------------- All experimental measurements in each subject were performed on the same day. Height and weight were measured at the time of inclusion in the study. After an overnight fast, a short catheter was inserted in the radial artery of the nondominant hand for blood sampling. After the ^15^O‐H~2~O PET scans, the subjects had a small meal before being transported to the MRI facility. The PET and MRI scans were performed 2--6 hours apart. Before the PET scans a venous blood sample was obtained and analyzed for hemoglobin. Arterial blood samples were obtained between the two PET scans and again after the MRI CBF measurement, and analyzed for oxygen saturation (SaO~2~), and partial pressures of O~2~ (PaO~2~) and of CO~2~ (PaCO~2~) using a Radiometer ABL800 Flex system (Radiometer, Copenhagen, Denmark). The arterial blood sample obtained at the MRI session was also analyzed for hemoglobin. PET {#jmri25442-sec-0008} --- PET scans were performed on a Siemens High Resolution Research Tomograph (HRRT) brain PET scanner (Siemens, Knoxville, TN).[25](#jmri25442-bib-0025){ref-type="ref"}, [26](#jmri25442-bib-0026){ref-type="ref"} The scanner had an axial field of view of 25 cm and a near isotropic resolution of 2 mm. During PET scanning the subject\'s head rested in a foam‐cushioned headrest, and a head strap was used to minimize head movement. Initially, a 6‐minute transmission scan with a rotating ^137^Cs single‐photon point source was performed for attenuation correction. Approximately 800 MBq of ^15^O radiolabeled water (half‐life: 123 sec) produced online was injected as a bolus using an Automatic Water Injection System (Scansys Laboratorieteknik, Værløse, Denmark). Arterial blood sampling was initiated 15 seconds before isotope injection. Emission scans were acquired after injection of intravenous bolus of tracer for 7 minutes in dynamic frames of 1 × 30 seconds, 18 × 5 seconds, 9 × 10 seconds, 10 × 15 seconds, and 2 × 30 seconds. Radioactivity concentration in the arterial blood was continuously measured by an automatic blood sampling system and drawn at 8 mL/min (Allogg ABSS, Mariefred, Sweden). The detectors in the system were cross‐calibrated against the PET scanner and the sampling frequency was 2 Hz. The inner diameter of the tube connected to the arterial catheter was 1.2 mm. The clocks of the scanner and sampling system were synchronized. Two consecutive scans were acquired for each subject with an interval of at least 10 minutes between the two injections to allow for washout and isotope decay. Scans were reconstructed using 3D‐ordered subset expectation maximum and point spread function (3D OSEM‐PSF).[27](#jmri25442-bib-0027){ref-type="ref"} Each map consisted of 207 image planes in a 256 × 256 matrix with an isotropic voxel size of 1.22 × 1.22 × 1.22 mm^3^. All images were corrected for randoms, scatter, attenuation (TXTV method),[28](#jmri25442-bib-0028){ref-type="ref"} decay and dead time, and filtered with a 3D Gaussian 5 mm filter. Postprocessing {#jmri25442-sec-0009} -------------- Quantitative regional CBF‐maps were calculated using a 1‐tissue 2‐compartment model: $$\frac{dC_{t}\left( t \right)}{dt} = K_{1}C_{a}\left( t \right) - k_{2}C_{t}\left( t \right)$$where *C* ~*t*~ is the tissue compartment concentration, *C* ~*a*~ is the arterial concentration, *K* ~*1*~ is the influx rate constant, which describes the unidirectional clearance of water from the blood to the tissue in mL/100 g/min, scaled to perfusion by a factor of one when assuming full extraction of water, and *k* ~*2*~ is the efflux rate constant (in min^−1^). The model also accounts for the contribution to the measured voxel concentration *C* ~*tot*~ from the vascular volume component *vB*: $$C_{tot}\left( t \right) = \left( {1 - vB} \right)C_{t}\left( t \right) + vBC_{a}\left( t \right)$$where *C* ~*tot*~ is the measured tissue time activity and *vB* is the blood volume fraction. The parametric maps were calculated using linear ridge regression with a spatial constraint parameter to increase signal‐to‐noise ratio (SNR), as described by Zhou et al.[29](#jmri25442-bib-0029){ref-type="ref"} The arterial input curves used in modeling were corrected for dead‐time, decay, delay, and dispersion. The calculation was done using the software PMOD 3.0 (PMOD Technologies, Zürich, Switzerland). Using the software PVElab,[30](#jmri25442-bib-0030){ref-type="ref"} each regional CBF‐map was coregistered to the volume segmented brain tissue mask from the 3D *T* ~1~‐weighted anatomical MR‐scan (Fig. [1](#jmri25442-fig-0001){ref-type="fig"}), and global CBF was calculated as the mean of all brain voxels. ![Fusion and segmentation of structural MRI and CBF PET maps. The brain extracted 3D *T* ~1~‐weighted structural MRI scan **(a)** was segmented into gray and white matter using FSL FAST **(b)** and coregistered to the CBF PET map **(c)** of the subject using PVElab software **(d)**. Mean global CBF was calculated as the average of all brain voxels. Note spill‐out of PET signal not covered by the brain mask on the fused image.](JMRI-45-692-g001){#jmri25442-fig-0001} MRI {#jmri25442-sec-0010} --- ### Flow Measurement {#jmri25442-sec-0011} MR scans were performed on a 3T Philips Achieva MRI scanner (Philips Medical Systems, Best, The Netherlands) using a 32‐channel phase array head coil. The blood velocity in the carotid and vertebral arteries were measured using a through‐plane phase‐encoding technique. The sequence acquires a reference phase image and a velocity sensitive phase image by using a bipolar gradient in the slice‐selection direction. By subtracting the velocity sensitive phase image with the reference phase image, a phase‐contrast map is calculated. The phase‐contrast maps can be scaled to velocity according to the velocity‐encoding factor (V~enc~). Based on an initial 2D inflow angiogram, the measurement slice was positioned orthogonal to the carotid and vertebral arteries (Fig. [2](#jmri25442-fig-0002){ref-type="fig"}a). The imaging parameters for the sequence were: field of view (FOV) = 240 × 240 mm^2^, voxel size = 0.75 × 0.75 × 8 mm^3^, 1 slice, TE = 7.33 msec, TR = 27.63 msec, flip angle = 10°, 10 repeated measures, and total scan time = 1 minute 42 seconds. In order to reduce scan time, cardiac triggering was not applied. When acquiring PCM MRI without cardiac triggering, the *k*‐space is random‐sampled in an interval including multiple cardiac cycles causing time averaging of the velocity.[19](#jmri25442-bib-0019){ref-type="ref"}, [31](#jmri25442-bib-0031){ref-type="ref"} A V~enc~ of 100 cm/s was applied in order to avoid underestimation of flow velocities due to aliasing of the phase at high velocities. When performing measurements without cardiac triggering, potential aliasing from high velocities is not clearly visible because the average velocity is measured. The V~enc~ was therefore chosen around the upper normal peak velocity values in the internal carotid and vertebral arteries in young subjects while maintaining a reasonable dynamic range.[32](#jmri25442-bib-0032){ref-type="ref"} ![Phase‐contrast measurements. **(a)** Example of lateral and anteroposterior maximal intensity projections of the carotid and vertebral arteries with the imaging plane visualized. **(b)** Example of velocity map measurement perpendicular to the carotids and vertebral arteries. The four arteries are clearly visible. In the lower panel examples of regions of interest (white contours) of the left **(c)** and right **(d)** carotid and vertebral arteries are demonstrated.](JMRI-45-692-g002){#jmri25442-fig-0002} ### Postprocessing {#jmri25442-sec-0012} The total flow was calculated by measuring the mean velocity and the cross‐sectional area of the cerebral arteries by drawing regions of interests (ROI) corresponding to each cerebral artery (Fig. [2](#jmri25442-fig-0002){ref-type="fig"}b). The ROIs were initially drawn manually on the magnitude image of the first measurement and then copied to the corresponding velocity map. Only voxels with a positive mean velocity were included. ROIs were subsequently copied to the following measurements and inspected for misalignment from possible motion and corrected by moving the ROI if necessary. Cross‐sectional area and diameter of the cerebral arteries were calculated from the ROIs. Flow was calculated for each measurement by multiplying mean velocity with the cross‐sectional area and integrating over time. The total flow of the four arteries was normalized to whole‐brain tissue weight to attain quantitative physiological global CBF values in mL/100 g/min. For comparison with PET, the average of all 10 measurements was used. ### Anatomical Scan {#jmri25442-sec-0013} An anatomical scan for segmenting brain tissue was obtained with a 3D *T* ~1~‐weighted turbo field echo sequence (FOV = 241 × 180 × 165 mm^3^, voxel size = 1.09 × 0.81 × 1.1 mm^3^, TE = 2.78 msec, TR = 6.9 msec, flip angle = 9°). The FSL BET and FAST tools (FMRIB Software Library, Oxford University, Oxford, UK)[33](#jmri25442-bib-0033){ref-type="ref"} were used to produce a whole‐brain tissue mask including cerebral hemispheres (excluding the ventricles), cerebellum, and the brainstem. The mask was inspected (by coauthor M.B.V.) and manually edited if necessary. The same brain volume mask was used for segmentation of the PET scan and for calculation of brain weight assuming a brain tissue density of 1.05 g/mL.[34](#jmri25442-bib-0034){ref-type="ref"} Statistics {#jmri25442-sec-0014} ---------- For comparison of CBF values, the mean of the 10 repeated PCM MRI measurements and of the two PET scans were used. A paired *t*‐test was used to compare mean values of measurements from PET and MRI. Agreement was assessed by linear regression and calculation of Pearson\'s correlation coefficient (R^2^), and by Bland--Altman analysis. Both absolute (CBF~PCM~ -- CBF~PET~) and relative (\[CBF~PCM~ -- CBF~PET~\]/ CBF~PET~) differences were calculated. As spontaneous fluctuations in PaCO~2~ have been shown to introduce within‐subject variability of CBF measurements,[35](#jmri25442-bib-0035){ref-type="ref"}, [36](#jmri25442-bib-0036){ref-type="ref"} the possible influence of PaCO~2~ fluctuations were investigated by including the difference in PaCO~2~ (PaCO2~PCM~ -- PaCO2~PET~) as a covariate in a multiple regression model with CBF~PCM~ as the dependent variable and CBF~PET~ as the independent variable. Method precision was assessed as the intrasubject variability derived from a mixed linear model including all repeated measurements of global CBF by each method. Subject was entered as random effect and measurement number as fixed effect in the model. From the mixed linear model within‐subject and between‐subject variance can be separated. The corresponding within‐subject and between‐subject coefficients of variation were calculated as the respective standard deviations divided by the mean value of the measurements. Except where indicated otherwise, all results are reported as mean ± standard deviation. Results {#jmri25442-sec-0015} ======= Results of mean velocity, vessel cross‐sectional area, and diameter from PCM measurements are presented in Table [1](#jmri25442-tbl-0001){ref-type="table-wrap"}. Physiological measurements at the two sessions, and brain and body size of participants, are shown in Table [2](#jmri25442-tbl-0002){ref-type="table-wrap"}. ###### Results of Phase‐Contrast Mapping Measurements Flow \[mL/min\] Flow fraction \[%\][a](#jmri25442-note-0001){ref-type="fn"} Velocity \[cm/s\] Area \[mm^2^\] Diameter \[voxels\][^b^](#jmri25442-note-0001){ref-type="fn"} ----------- ----------------- ------------------------------------------------------------- ------------------- ---------------- --------------------------------------------------------------- Right ICA 293.1 ± 53.7 35.4 ± 2.4 21.0 ± 3.1 23.6 ± 4.3 7.3 ± 0.8 Left ICA 292.2 ± 42.0 35.5 ± 2.1 21.0 ± 2.5 23.4 ± 4.0 7.1 ± 0.9 Right VA 102.5 ± 45.9 12.4 ± 4.8 12.4 ± 2.2 13.5 ± 4.7 5.3 ± 1.0 Left VA 135.5 ± 40.5 16.7 ± 4.8 13.8 ± 2.4 16.5 ± 5.0 5.9 ± 0.8 Total 823.3 ± 112.4 Percentage of total flow, ^b^narrowest diameter. ICA, internal carotid artery; VA, vertebral artery. ###### Physiological Measurements and Brain and Body Size ^15^O‐H~2~O PET PCM MRI *P*‐value for difference ------------------------------------------------------ -------------------------------------- ------------ -------------------------- SaO~2~ \[%\] 98.3 ± 0.3 98.1 ± 0.5 0.04 PaO~2~ \[kPa\] 15.6 ± 1.0 14.2 ± 1.3 \<0.01 PaCO~2~ \[kPa\] 5.6 ± 0.3 5.5 ± 0.5 0.17 Hemoglobin \[mmol/L\] 8.7 ± 0.6 8.8 ± 0.6 0.71 Brain weight \[kg\] Body weight \[kg\] Height \[cm\] 1.439 ± 0.114 81.2 ± 8.9 187.5 ± 7.0 Mean global CBF was on average 34.9 ± 3.4 mL/100 g/min using ^15^O‐H~2~O PET and 57.0 ± 6.8 mL/100 g/min using PCM MRI. Absolute and relative differences between ^15^O‐H~2~O PET and PCM MRI were 22.0 ± 5.2 mL/100 g/min and 63.4 ± 14.8%, respectively (*P* \< 0.0001 for difference). Linear regression (Fig. [3](#jmri25442-fig-0003){ref-type="fig"}a) showed a highly significant positive correlation of PCM MRI and ^15^O‐H~2~O PET (*P* = 0.0008, R^2^ = 0.44). The slope of the regression was higher than one, indicating that the difference between the methods was perfusion‐dependent and increased with higher perfusion values. The positive slope of the regression line in the Bland--Altman plot (Fig. [3](#jmri25442-fig-0003){ref-type="fig"}b) was significantly different from zero (*P* = 0.0014), confirming a systematic perfusion‐dependent difference between CBF values obtained by the two methods. ![Agreement of CBF measurements. **(a)** Correlation between global cerebral blood flow (CBF) measured by ^15^O‐H~2~O PET and phase‐contrast mapping (PCM) MRI. **(b)** Bland--Altman plot showing difference against mean of the methods. Measurement by PCM MRI resulted in higher values compared to ^15^O‐H~2~O PET. The positive slope of the regression line of the Bland--Altman plot was significantly different from zero (*P* = 0.0014), indicating a perfusion‐dependent relative difference between CBF values obtained by the two methods.](JMRI-45-692-g003){#jmri25442-fig-0003} When including PaCO~2~ difference in the linear model, the effect of PaCO~2~ difference was near‐significantly correlated with PCM CBF (95% confidence interval = \[--0.58;10.4\], *P* = 0.077) and R^2^ increased to 0.53. When comparing the models with and without CO~2~‐difference by F‐test the improvement in fit was shown to be nonsignificant (*P* = 0.091). Intrasubject variability of global CBF was 6.5% using PCM MRI and 5.7% using PET. The corresponding values of intersubject variability were 11.6% and 8.6%, respectively. Discussion {#jmri25442-sec-0016} ========== The present study compared global CBF values obtained by MRI using PCM and by PET using ^15^O‐H~2~O in healthy volunteers. The main finding is that global CBF obtained by PCM MRI is highly correlated with values obtained by ^15^O‐ $H_{2}^{15}O$ PET, thereby confirming the ability of PCM MRI to obtain quantitative measures of global CBF. However, the analysis also demonstrated a systematic relative perfusion‐dependent difference between CBF values obtained by the two methods. The average mean CBF values obtained by the two methods differed in opposite directions from the generally accepted textbook normal global CBF values of 46--50 mL/100 g/min.[17](#jmri25442-bib-0017){ref-type="ref"}, [18](#jmri25442-bib-0018){ref-type="ref"} Nevertheless, the values obtained by each method were very similar to those previously reported in healthy subjects,[12](#jmri25442-bib-0012){ref-type="ref"}, [16](#jmri25442-bib-0016){ref-type="ref"}, [37](#jmri25442-bib-0037){ref-type="ref"} indicating that the differences more likely reflect general methodological biases rather than the current implementation of the methods or data processing. The PCM MRI technique has some well‐known errors and limitations, primarily related to the limited resolution and the suboptimal measurement geometry of the PCM MRI measurements. First of all, voxels in the periphery of the vessel will contain signal from moving and stationary tissue, causing an underestimation of velocity and overestimation of the cross‐sectional area of the vessel. The result of these two opposite effects on flow quantitation has in simulation studies been found to be very small if the artery diameter is larger than 5--6 voxels, but will cause overestimation of the flow at smaller relative diameters.[38](#jmri25442-bib-0038){ref-type="ref"} In the present study the average diameter of the internal carotid arteries assessed from PCM MRI measurements was 7.2 voxels and of the vertebral arteries 5.6 voxels, corresponding to actual diameters of 5.4 mm and 4.2 mm, respectively. These values are somewhat higher than the corresponding values of 4.8 and 3.3 mm previously reported in young subjects using ultrasound,[39](#jmri25442-bib-0039){ref-type="ref"} indicating a possible overestimation of the luminal diameter due to partial volume effect (PVE). Improving in‐plane resolution may reduce the partial volume error. Indeed, a recent in vivo study investigating the effects of varying resolution found that PCM flow values acquired at a resolution of 0.7 mm were 13% higher in the vertebral arteries and 6% higher in internal carotid arteries compared to high‐resolution imaging at 0.4 mm.[40](#jmri25442-bib-0040){ref-type="ref"} However, higher‐resolution imaging is associated with prolonged acquisition time and poorer SNR, and the authors of the study concluded that a resolution of 0.5 mm might offer a reasonable trade‐off.[40](#jmri25442-bib-0040){ref-type="ref"} Second, a single imaging slice was used to measure velocity in all of the feeding arteries. If the slice is not perpendicular to the vessels, linear velocities will be underestimated and the cross‐sectional area will be overestimated. Again, the two effects will tend to balance out, and both simulation and in vivo studies have shown that the effect on flow is negligible if the imaging planes deviate less than 10°, but will cause overestimation at higher degrees of deviation.[38](#jmri25442-bib-0038){ref-type="ref"}, [40](#jmri25442-bib-0040){ref-type="ref"} The angle of misalignment on each artery was measured from the angiography images and found to be on average less than 5° on the carotid arteries and less than 6° on the vertebral arteries. The errors related to misalignment are therefore probably very small. PCM MRI measurements were performed without cardiac triggering in order to reduce scan time. A similar approach has been used in several other studies.[6](#jmri25442-bib-0006){ref-type="ref"}, [15](#jmri25442-bib-0015){ref-type="ref"}, [41](#jmri25442-bib-0041){ref-type="ref"} One previous study has shown that nontriggered measurements produced 6% higher flow compared to triggered measurements and was also associated with slightly poorer reproducibility.[12](#jmri25442-bib-0012){ref-type="ref"} Other studies, however, have not demonstrated any systematic differences.[19](#jmri25442-bib-0019){ref-type="ref"}, [20](#jmri25442-bib-0020){ref-type="ref"}, [42](#jmri25442-bib-0042){ref-type="ref"}, [43](#jmri25442-bib-0043){ref-type="ref"} Nontriggered measurements are less susceptible to irregular or varying heart rate and applying cardiac triggering may prolong acquisition time and potentially cause underestimation of flow, as the entire cardiac cycle is not sampled. Although often considered a reference standard, the absolute quantification of CBF using ^15^O‐H~2~O PET is restricted at high CBF values by the limited water diffusion across the blood--brain barrier. The correct extraction fraction of water depends on the exact tissue measured, the perfusion itself, and interindividual variation, and has been suggested to be in the range of 0.84--0.90 for average global extraction.[44](#jmri25442-bib-0044){ref-type="ref"}, [45](#jmri25442-bib-0045){ref-type="ref"} Consequently, when reporting global CBF as the *K* ~*1*~ of the one‐tissue model, CBF is underestimated on average by 10--16%. A further cause of global CBF PET underestimation may be related to a partial volume effect when the low‐resolution CBF maps are masked with a high‐resolution brain mask, which leads to loss of signal in high‐CBF cortical voxels. White matter and cerebrospinal fluid may further contribute to dilution of the cortical signal. A previous ^15^O‐H~2~O PET study has shown that a kinetic model incorporating a physiological correction for the segments of the ROI that are not perfused (the nonperfusable tissue fraction) will increase the global CBF value ∼17%.[46](#jmri25442-bib-0046){ref-type="ref"} The underestimations of CBF using ^15^O‐H~2~O PET due to limited water diffusion and partial volume effects are both perfusion‐dependent, causing larger underestimation at high perfusion values. We do not expect the overestimation of flow by PCM MRI to be flow‐dependent within the normal perfusion range. The slope of the regression line being larger than one demonstrates this perfusion‐dependent underestimation of ^15^O‐H~2~O PET. Method precision of PCM MRI as assessed by the intrasubject coefficient was similar to a previous study that found a corresponding value of 7.4% using a cardiac triggered PCM MRI with similar resolution, also at 3T MRI.[16](#jmri25442-bib-0016){ref-type="ref"} This finding thus confirms the very high short‐term reproducibility of PCM MRI for measurement of CBF, and does not support the previous report of poorer reproducibility of nontriggered measurements.[12](#jmri25442-bib-0012){ref-type="ref"} The intrasubject variability of ^15^O‐H~2~O PET CBF measurements was very similar to that of PCM MRI, whereas the intersubject variability was slightly higher using PCM MRI compared to PET. The latter observation may be a consequence of the also slightly higher variability of PaCO~2~ at the MRI session. A limitation to the present study is that ^15^O‐H~2~O PET and PCM MRI CBF measurements were not performed simultaneously, but separated by a 2--6 hours interval. Spontaneous random variation in CBF could thus contribute to method disagreement. Studies on within‐subject variability in CBF are limited and do not separate true physiological fluctuations from methodological imprecision. Including also day‐to‐day variability, such studies have reported overall within‐subject coefficients of variation of between 8.3% and 12.9%, but do not indicate large low‐frequency variation in CBF.[18](#jmri25442-bib-0018){ref-type="ref"}, [35](#jmri25442-bib-0035){ref-type="ref"}, [47](#jmri25442-bib-0047){ref-type="ref"} As documented by the arterial blood gas and hemoglobin values, the participants were studied in stable, resting conditions at both sessions. We did observe slightly higher PaO~2~ and oxygen saturation values during the PET study compared to MRI, but these subtle differences are not likely to influence the CBF measurements and most likely reflect differences in blood sample handling at the two sessions and in calibration of the two blood gas analyzers used. Previous studies have shown that spontaneous fluctuations in PaCO~2~ is a major source of within‐subject variability[35](#jmri25442-bib-0035){ref-type="ref"}, [36](#jmri25442-bib-0036){ref-type="ref"} and in the present study residual variability tended to decrease when accounting also for changes in PaCO~2~. Finally, changes in CBF and cerebral metabolism from circadian cycle variation may also have contributed to method disagreement and residual variation.[41](#jmri25442-bib-0041){ref-type="ref"}, [48](#jmri25442-bib-0048){ref-type="ref"} Such effects cannot be assessed from the present study, but the awake‐state circadian changes are relatively small and cannot account for the large offset between ^15^O‐H~2~O PET and PCM MRI CBF measurements. The overall highly significant positive correlation of PCM MRI with ^15^O‐H~2~O PET confirms the use of PCM MRI for absolute quantification of global CBF, and thus lends further support for the use of PCM MRI in quantitative studies of cerebral physiology and in population‐based studies of cerebrovascular function and brain aging.[6](#jmri25442-bib-0006){ref-type="ref"}, [15](#jmri25442-bib-0015){ref-type="ref"}, [40](#jmri25442-bib-0040){ref-type="ref"} In particular, it allows us to more confidently interpret other quantitative physiological MRI techniques relying on accurate measures of global CBF obtained by PCM MRI.[7](#jmri25442-bib-0007){ref-type="ref"}, [10](#jmri25442-bib-0010){ref-type="ref"}, [43](#jmri25442-bib-0043){ref-type="ref"} However, it should be stressed that PET and PCM MRI measurements cannot be used interchangeably, as the very large difference will influence all CBF‐derived physiological measures directly. In conclusion, the present study demonstrates that measurement of mean global CBF with PCM MRI and ^15^O‐H~2~O PET are highly correlated, thereby validating the use of PCM MRI for quantification of global CBF. The study also showed considerable differences between the two methods, most likely resulting from methodological biases prohibiting interchangeable use of the methods. The authors thank laboratory technician Helle Juhl Simonsen for assistance with blood sampling analysis. The authors also thank nuclear medicine technologist Bente Dall at the Department of Clinical Physiology, Nuclear Medicine and PET for assistance in the ^15^O‐H~2~O PET studies, the Cyclotron Unit at the Department of Clinical Physiology, Nuclear Medicine and PET for reliable delivery of ^15^O‐H~2~O, and The John and Birthe Meyer Foundation, who donated the HRRT PET scanner to Copenhagen University Hospital Rigshospitalet.
{ "pile_set_name": "PubMed Central" }
We’ve heard that you loved our end-of-year email, which included a tally of the photos, reviews, and info you shared on Google Maps in 2017. So we’re really excited to announce a new way to see your contribution totals any time. Just visit Local Guides home while you’re signed in on any desktop or mobile device. There, you’ll find a fun infographic that shows what you’ve shared on Google Maps over the last six months. You’ll see your contribution totals, along with a breakdown of all the different things you’ve shared, added, and edited. Click the bars to see your contribution totals for each month. A snapshot of a 6 month contribution windowTake a look, and let us know what you think! Frequently Asked Questions My contribution totals are different on the graph than in the Google Maps app. Why? It might take up to 24 hours for your points to sync between Google Maps and the graph. Can I see other Local Guides’ graphs? You can share your screenshots here on Connect or on social media with #LocalGuides. Feel free to share and compare at anytime! How did my photos and reviews get so many views? When you add a photo or review to a place on Google Maps, it becomes viewable by anyone in the world across Google. The more popular a place is, the more likely it is that someone will see your photo or review. I am not available to respond on the weekend
{ "pile_set_name": "OpenWebText2" }
Orongoy (ulus) Orongoy () is a rural locality (an ulus) in Ivolginsky District, Republic of Buryatia, Russia. The population was 1,760 as of 2010. There are 5 streets. References Category:Rural localities in Buryatia
{ "pile_set_name": "Wikipedia (en)" }
Slideshow ( 3 images ) ROME (Reuters) - The newly installed Italian government will not raise sales taxes, Italy’s deputy prime minister and head of the 5-Star Movement, Luigi Di Maio, said on Thursday. Italy must find an estimated 12.5 billion euros ($14.77 billion) of savings to stave off the threat of an automatic increase in sales taxes because of previously missed deficit targets. Speaking to a conference organized by the Italian retailers’ lobby, Di Maio said the coalition would find a way of avoiding this hike and also pledged to be careful with public accounts. “Sales taxes will not increase and the safeguard trigger will be defused,” Di Maio said. “We are committed to keeping our accounts under control, (but) we also know that ... we have to renegotiate some conditions at the EU level which Italy can no longer sustain. We will do this by discussing with the other countries but also sometimes by saying ‘no’”.
{ "pile_set_name": "OpenWebText2" }
Q: using groovyxmlslurper from EL in JSP I've been tasked with creating a JSP tag that will allow developers to pass a URI to an xml document, and have an object returned that can be navigated using EL. I have been using groovy and grails quite a bit so I thought of trying something like rval = new XmlSlurper().parseText(myXml); and throwing that into the request so that back in the JSP they might do something like: <mytag var="var"/> ${var.rss[0].title} but that approach doesn't work. Does anyone have any suggestions? A: Gizmo is correct that the problem is that JSPs assume everything is Java, but I doubt that switching to GSP is a practical answer. To work around this, you need to know how Groovy code gets translated to Java. The Groovy code: var.rss[0].title Is roughly equivalent to this Java: var.getProperty("rss").getAt(0).getProperty("title") It may also be necessary to cast each result to a GPathResult, e.g., ((GPathResult)((GPathResult)var.getProperty("rss")).getAt(0)).getProperty("title") Java sucks, huh?
{ "pile_set_name": "StackExchange" }
Large and Uniform Optical Emission Shifts in Quantum Dots Strained along Their Growth Axis. We introduce a calibration method to quantify the impact of external mechanical stress on the emission wavelength of distinct quantum dots (QDs). Specifically, these emitters are integrated in a cross-section of a semiconductor core wire and experience a longitudinal strain that is induced by an amorphous capping shell. Detailed numerical simulations show that, thanks to the shell mechanical isotropy, the strain in the core is uniform, which enables a direct comparison of the QD responses. Moreover, the core strain is determined in situ by an optical measurement, yielding reliable values for the QD emission tuning slope. This calibration technique is applied to self-assembled InAs QDs submitted to incremental elongation along their growth axis. In contrast to recent studies conducted on similar QDs submitted to a uniaxial stress perpendicular to the growth direction, optical spectroscopy reveals up to ten times larger tuning slopes, with a moderate dispersion. These results highlight the importance of the stress direction to optimize the QD optical shift, with general implications, both in static and dynamic regimes. As such, they are in particular relevant for the development of wavelength-tunable single-photon sources or hybrid QD opto-mechanical systems.
{ "pile_set_name": "PubMed Abstracts" }
The benefits of estrogen or selective estrogen receptor modulator on kidney and its related disease-chronic kidney disease-mineral and bone disorder: osteoporosis. An umbrella concept addressing the relationship between chronic kidney disease (CKD) and mineral and bone disorders has been developed in recent years. Given the high prevalence of osteoporosis-related fractures in postmenopausal women with CKD, especially those undergoing chronic hemodialysis, the strategy used in the prevention and management of CKD and its associated osteoporosis in these postmenopausal women has become a topic of substantial debate. This controversy has ongoing relevance because osteoporosis results in a significant economic burden secondary to increased morbidity and mortality. The perfect goal of treatment and prevention includes both bone protection and renal protection, or at least protection of one disease without compromising the other disease. Both CKD and osteoporosis are frequently observed in the same patients, and often have parallel progression in postmenopausal women. Estrogen, the main female hormone during reproductive age, has been reported to have a protective effect on kidney fibrosis in several animal models, and is also considered one of the most effective drugs in the management of postmenopausal women with osteoporosis and prevention of osteoporosis. However, due to the many adverse events associated with the use of estrogen with and without progestin, some of which have contributed to significant morbidity and mortality, drug modification, which has had fewer reported incidences of adverse events without compromising the protective effect on both the kidney and bone, may have an easier road to acceptance. Therapeutic alternatives, such as the selective estrogen receptor modulators (SERMs), have shown the benefits of estrogen on bone, serum lipid levels, and renal protection, without any adverse effects on the breast and endometrium. The Multiple Outcomes of Raloxifene Evaluation trial (MORE) and its extension-Continuing Outcomes Relevant to Evista (CORE), a double-blind, randomized clinical trial encompassing postmenopausal women with osteoporosis, showed promising results in both bone and renal studies. Raloxifene increased bone mineral density (BMD) in the spine and femoral neck and reduced the risk of vertebral fracture. In addition, raloxifene slowed the increase in the rate of serum creatinine and also significantly slowed the decrease in the estimated glomerular filtration rate; of most importance, raloxifene use was associated with significantly fewer kidney-related adverse events. Hemodialyzed women on raloxifene treatment demonstrated increased trabecular BMD, a decrease in bone resorption markers, and a decrease in the low-density lipoprotein-cholesterol value. Thus, raloxifene and, most likely, other SERMs could be better in place of estrogen in the management of postmenopausal women with CKD and its associated osteoporosis, although much evidence should be provided in the advanced-stage CKD, especially in the Stage 5 CKD patients on dialysis.
{ "pile_set_name": "PubMed Abstracts" }
Q: android basic auth okhttpclient I am connecting to my rest api using retrofit and okHttp client. When I disable Basic authentication on Tomcat everything works flawlessly. When Basic Auth is enabled on Tomcat I get 404 Page not found. Here is my authentication and error output. okHttpClient.setAuthenticator(new Authenticator() { @Override public Request authenticate(Proxy proxy, Response response) throws IOException { String credential = Credentials.basic(rest_user, rest_pw); return response.request().newBuilder().header("Authorization", credential).build(); } @Override public Request authenticateProxy(Proxy proxy, Response response) throws IOException { return null; } }); Error log D/YOUR_LOG_TAG: <--- HTTP 404 https://myserver:8443/RestWS/objects/barcodes (4462ms) D/YOUR_LOG_TAG: Server: Apache-Coyote/1.1 D/YOUR_LOG_TAG: Cache-Control: private D/YOUR_LOG_TAG: Expires: Thu, 01 Jan 1970 01:00:00 CET D/YOUR_LOG_TAG: Set-Cookie: JSESSIONID=*********************; Path=/; Secure; HttpOnly D/YOUR_LOG_TAG: Content-Type: text/html;charset=ISO-8859-1 D/YOUR_LOG_TAG: Content-Length: 127 D/YOUR_LOG_TAG: Date: Tue, 26 Apr 2016 09:31:22 GMT D/YOUR_LOG_TAG: OkHttp-Selected-Protocol: http/1.1 D/YOUR_LOG_TAG: OkHttp-Sent-Millis: 1461663081883 D/YOUR_LOG_TAG: OkHttp-Received-Millis: 1461663081973 D/YOUR_LOG_TAG: <html> D/YOUR_LOG_TAG: <head> D/YOUR_LOG_TAG: <title>404-Page Not Found</title> D/YOUR_LOG_TAG: </head> D/YOUR_LOG_TAG: <body> The requested URL was not found on this server. </body> D/YOUR_LOG_TAG: </html> D/YOUR_LOG_TAG: <--- END HTTP (127-byte body) A: Problem solved using RequestInterceptor. restAdapter = new RestAdapter.Builder() .setConverter(new GsonConverter(gson)) .setRequestInterceptor(new RequestInterceptor() { @Override public void intercept(RequestFacade request) { String credentials = DownloadService.rest_user + ":" + DownloadService.rest_pw; String base64EncodedCredentials = Base64.encodeToString(credentials.getBytes(), Base64.NO_WRAP); request.addHeader("Authorization", "Basic " + base64EncodedCredentials); } }) .setEndpoint(DownloadService.URL) .setClient(new OkClient(okHttpClient)) .build();
{ "pile_set_name": "StackExchange" }
Let’s start with two photographs. The first was shot by me in China’s Hunan Province. It shows a warehouse that contains roughly 5,000 old locally-collected televisions awaiting recycling. This photo only captures a portion of what is a big inventory, and a big operation. Every day more arrive. Most people outside of China have never heard of this place, mostly because it is indoors, and difficult for journos and activists to gain access to. Next, a photo tagged “e-Waste – field of computers” that I came across while looking at a Google map of Agbogbloshie, a suburb of Accra, Ghana that everyone from the Guardian to Motherboard has called the world’s “biggest” or “largest” e-waste dump. There’s nothing good or right in the Agbogbloshie photo. The pollution it depicts is nasty. But if you can get past the shock and evaluate the volume of e-waste in the image, it’s not much – especially compared to what we see in the China photo. Indeed, despite the parade of Agbogbloshie slideshows posted by media outlets over the years, there’s a curious dearth of images showing large volumes of e-waste at the site. Rather, the genre is almost exclusively devoted to pictures of laborers, oftentimes not even processing waste – see this useless and exploitative New York Times slideshow, or this more recent one from Motherboard. My long-standing suspicion has been that there aren’t any great volumes of e-waste at Agbogbloshie, and that most of the journalists and photographers who go there – having had no experience with developing world recycling – document their shock, but not what’s actually happening, frankly because they don’t know better. This matters. Agbogbloshie has become a global symbol for what’s alleged to be a vast and growing environmental problem: the export of e-waste from the developed world to West Africa. Yet in recent years, academic and UN-sponsored research has shown that the problem is far more complex – and, in all respects, smaller – than what’s being depicted. In other words – we’re not talking about the world’s largest e-waste dump. So what I’m going to do is show how somebody with actual experience reporting in and around the global recycling industry – especially in the developing world – looks at Agbogbloshie. My background is that of a journalist who has been writing about and photographing the industry for 15 years, and has visited hundreds of recycling facilities, especially in the developing world. In March and April, I visited Accra. There are two possible meanings for “biggest.” Let’s start out with scale. In April, Jakob Schiller at Wired described the areas as follows: “A former wetland turned slum, the kilometer-long stretch of land is a toxic graveyard of computers, refrigerators and other trash.” This description, and the many, many others that like to describe Abgobloshie as “vast“, is false (I’ve reached out to Schiller for his source – did he visit? – but he hasn’t responded). Agbogbloshie is, in fact, small. Its street frontage is roughly 200 meters, and it extends back roughly 450 meters. But I’d estimate that only about half of it is actually utilized; overall land use is extremely inefficient, especially for a scrap zone home to perhaps 200 small businesses. Below, I’ve pasted a Google map showing the outlines (click to enlarge). If you want to know more about what’s actually going on in there, here’s a geo-tagged map showing various activities by the fantastic folks at the Agbogbloshie Makerspace Project. Note that the geo-tagged map shows activity to the left of what I show below – that’s because the geo-tagged version hasn’t been updated since the local government shut down those businesses in late March (mostly plastic recyclers). That’s right, Agbogbloshie is shrinking. In human terms, that means you can walk from one end of Agbogbloshie to the other end in a couple of minutes (which I did, several times). If, like me, you spend time in the world of globalized recycling, that’s nothing special size-wise, equivalent to a large – but not unusually so – scrap yard in the U.S. or EU, and much smaller than most landfills. Elsewhere in Africa, there are far larger recycling and dump sites (Dandora outside of Nairobi comes to mind), and in Asia they’re even bigger (Guiyu is an actual town). That’s why, five minutes after taking my first step in Agbogbloshie, I found myself utterly bewildered, and turning to my companion and guide to ask: “This is IT?” It was. So what, then, are we to make of images, such as the one below (taken by me), that seem to suggest a much bigger space, extending out into the horizon? If you look at the above satellite view of Agbogbloshie, you’ll note quite a bit of empty space abutting the site – much of that is open fields and a city dump. It is not, however, related to the recycling of electronics. For a photographer, though, it’s a great backdrop (I’ll get to the question of what’s being burnt, shortly). Since we’re on scale, I’d like to touch on a related point. Is Agbogbloshie a slum? Yes and no. Yes, in that the tens of thousands of people who live in the area do not live well. No, in the sense that it’s primarily a traffic-choked industrial zone home to – among other businesses) a Pepsi bottling plant directly across the street from the scrap zone (the Pepsi plant’s manager, according to this source, doesn’t appear to want anything to do with its recycling neighbors), car dealerships, a brewery, a vegetable market (specializing in yams and onions) and hundreds if not thousands of small workshops devoted to making everything from cooking pots to electrical transformers. Here, for example, is the traffic heading into Agbobloshie. Note the load of yams definitely not bound for the recycling zone. And here’s what the actual frontage directly outside of the scrapping zone looks like. “Agbogbloshie,” the scrap zone, is entered via one of two entrances abutted by the onions. Here’s one of them. This image brings me to the question of volume. Specifically, how much e-waste can be jammed into a 200 x 450 meter space in the middle of one of Africa’s busiest, most traffic-choked cities? Let’s take a look at that photo, above, again.You don’t need to be an expert in international shipping and logistics to know that this driveway, and the mud/dirt road that connects to it, is unlikely to support a lot of traffic, much less the frequent loading and unloading of shipping containers and other means of transporting e-waste. And, in fact, during my time at the site, there weren’t any shipping containers flowing into the site. Rather, the primary means of delivering scrap – not just e-waste – was this one: At any given time, there are perhaps 10 to 20 men (always men) pulling these four wheelers. The scrap they carry mostly comes from within Accra itself, sold or given to them because the devices no longer function. The closest port – Tema – is roughly 21 miles away, and though these men are incredibly fit, it’s unlikely that they’d find it worthwhile to traipse a near Marathon distance for the meager profits from three microwaves, four televisions, and a transmission case. To be fair, I also saw scrap delivered in taxis, and pickup trucks, and one rickety flatbed. But shipping containers? Never. So how much scrap ends up in Agbogbloshie every day? The only study that’s ever tackled the question systematically was published in 2011 (funded by the European Commission, Norway, the United Kingdom, and the Dutch Recyclers Association, and coordinated by the Secretariat of the Basel Convention), and it found that – in 2009 – Ghana (not just Accra) imported 215,000 tons of used electronics. That sounds bad until you read the kicker: of that imported electronics, 70% was still functioning and usable, and the other 20% could be repaired. And it was repaired. Indeed, Ghana, like much of West Africa, is a major hub for the re-use, repair, and refurbishment of used goods from around the world – everything from furniture to mobile phones. Drive around any city in Ghana, and you’ll see entrepreneurs who’ve imported and refurbished used goods (increasingly from China), and now offer them for sale to the large swath of the population that can’t afford new (the wonderful Yepoka Yeebo recently produced an excellent photo essay on this industry for Roads and Kingdoms). There are, without exaggeration, thousands of stalls like this around the country: And, for that matter, like this (yes, there are markets in everything, including used chairs, coffee makers, and waffle irons): So let’s do some math. The UN’s Solving the E-Waste Problem [StEP] initiative estimates that global e-waste generation in 2014 was 46.8 million short tons [41.8 million metric tons]. Let’s assume, for the sake of argument, that the amount of e-waste imported into Ghana tripled since 2009 (probably not, but I can feel the gaze of my critics), to 645,000 tons. If 90% of that is re-usable and/or repairable, that means 64,500 metric tons – or 72240 short tons – is not usable a.k.a. it’s e-waste needing to be recycled. In other words: .15% of global e-waste flows into Ghana (not just Accra and Agbogbloshie) under this calculation, making a rather thin case for “the world’s largest digital dump.” And that figure is undoubtedly too high. How much too high? And what do the scrappers say? Around Agbogbloshie, I was told that the scrappers recycled between 30 and 50 televisions and computer monitors per day (monitors are the heaviest component of the e-waste stream). I checked with some folks I know in the monitor recycling business, and they told me that 50 lbs per monitor is a good average. So, as a safe conservative estimate, let’s say that Agbogbloshie recycles one short ton of monitors per day, and 365 tons per year. Now, it’s not hard to do this calculation (thanks to Robin Ingenthron at the Good Point Recycling blog for doing a version of it first). But, for some reason, the media organizations that insist on sending photographers to document Agbogbloshie never bother to look up the 2011 study, or do the calculation. Rather, they just say whatever sounds most shocking. For example, as far back as 2008 (to be fair, pre-study), PBS Frontline claimed that “hundreds of million of tons” of e-waste arrive at Agbogbloshie annually (which would make e-waste one of the world’s most shipped manufactured goods)! Most news organizations, however, are a bit more responsible, and either hedge their bets by sticking to “biggest” and “largest” or – as in the case of Gizmodo – show a bit more courage (though not more sourcing) and say “millions of tons.” None of this is even remotely true. So let’s go back to the beginning of this post. Here’s what roughly 5000 monitors look like (there’s more both to the right and left that didn’t fit my frame). And here are a few images of what Agbogbloshie – dimensions of 200 x 450 meters – looks like on a weekday. Of course, there is one unanswered question. If not e-waste, what on Earth is being recycled under these deplorable conditions? First, there is e-waste processed at Agbogbloshie – I saw it – but not much. Instead, as the above photo hints, on a volume basis Abgobloshie is a vehicle recycling facility, where whole vehicles are dismantled by hand, primarily, and the various components are then sorted and sold for recycling or further processing. It starts like this: And like this – note the young man pushing the cart piled with car doors and other parts. And one of the product streams it produces is stuff like this (note the engine block, transmission case, and other auto scrap), that can be sold as metal. Unfortunately, if you don’t have the proper equipment, automobiles are just as difficult, if not polluting, to recycle as old electronics. Ghana doesn’t have the equipment. This creates problems with two waste streams. First, the wires and cables that are part of our ever-increasingly computerized automobiles. And second, the tires. This brings me back to the question of what to make of all those photos of fires and burning scrap at Agbogbloshie. Here’s a photo of a typical, just-completed burn scene at Agbogbloshie. It caused a lot of smoke, a lot of fire, and a lot of coughing (mine included). And here’s a close-up of what was burnt. That’s right, tires. Now, I can’t tell you that I know what percent of what’s burnt at the site is tires, and what’s everything else (getting to that). But I can tell you that the tire burn area takes up 80% of the space devoted to burning. And it’s nasty. But because Ghana’s automobile recycling sector is very undeveloped, there isn’t much alternative (tires are notorious breeding grounds for mosquitoes, which in Ghana – where malaria and yellow fever are endemic – is unacceptable). Meanwhile, further down the burn area, workers torch 10 lb bundles of wire and cable that are outsourced for burning (to get rid of the insulation) to them by businesses within Agbogbloshie. Anyone who knows scrap metal – or the inside of a computer or television – should be able to tell right away that these bundles contain far more than wires from an old ThinkPad or VCR. They contain, rather, wiring from a broad range of electrical goods, including – and primarily – automobile harnesses (the wiring hub within and beneath your car). I want to be clear. Just because it’s automobile cabling – rather than ribbon cables from inside a PC – being burnt, doesn’t mean it’s ok. Pretty much nothing at Agbogbloshie qualifies as a best or even adequate practice when it comes to human health and the environment. They are, instead, the practices available to a small-scale recycling industry that functions on very little capital. That could and probably will change as some of the scrap dealers start making more money, and the government decides that it wants to improve Accra’s air quality. But other groups – NGOs in particular – have other ideas about how to help Agbogbloshie, including bans on the export of repairable electronics from the developed world, and the installation of totally inappropriate equipment at the recycling site. But here’s the thing. If you want to fix Agbogbloshie, you need to understand what’s happening there. Calling it the world’s biggest digital dump and erecting trade and even criminal barriers to prevent used electronics will only serve to deprive Ghanaians of access to affordable information technology, while doing nothing to prevent them from selling those cheap electronics to Agbogbloshie when they’re done with them. And that won’t be any time soon – Ghana’s culture of use, repair, re-use, and further repair and re-use ensures that Ghanaians will utilize used electronics much longer than their original owners would ever have believed possible (ten-year-old functioning Windows 95 PCs are common throughout Ghana). Understanding Agbogbloshie as an electronics dump only serves to ensure that far bigger problems – such as what to do with Ghana’s dead cars – won’t get attention. What I fear is that my friends in the media, always looking for an interesting angle on “the tech story” won’t find Agbogbloshie as worthy of their attention if the problem turns out to be Toyotas and Fords, rather than Apples and Dells. If that’s the case, they’ve not only mis-served themselves, but also the good people of Agbogbloshie who are – ostensibly – the reason their workplace is worth photographing in the first place. [The May/June issue of Scrap Magazine includes a long feature – by me – touching on e-waste in Ghana and Kenya. Thanks to Christine for very smart edits of this very long post.]
{ "pile_set_name": "OpenWebText2" }
Christopher Crandall faces retrial in fatal bludgeoning of former lover Tools Christopher Crandall, 37, is accused of bludgeoning his former lover and roommate to death in 2006. (Examiner file photo) Christopher Crandall, 37, is accused of bludgeoning his former lover and roommate to death in 2006. (Examiner file photo) Attorneys in the case of a man accused of bludgeoning his former lover and roommate to death in 2006 sparred in court Tuesday over whether he was guilty of murder or manslaughter. The trial of Christopher Crandall, 37, is before a San Francisco Superior Court jury for a second time, after an appeals court last year tossed Crandall’s 2007 conviction for second-degree murder because of jury misconduct. The body of Guy West, 68, was found inside West’s second-floor studio at 640 Polk St., buried under a heap of blankets in his bed, on July 27, 2006. Crandall, who West had allowed to stay in the apartment for years, was arrested Aug. 3, 2006. After initially denying involvement, prosecutors say he later admitted to police that he struck West repeatedly in the head with a heavy glass pitcher during a late-night argument on July 17. He then allegedly stayed inside the apartment for four days as the body decomposed. Prosecutor Linda Allen told jurors Tuesday in her opening argument that Crandall struck West so hard that he fractured his skull and neck, leaving a bloody crime scene. Crandall and West’s relationship had initially been sexual but later became platonic, and was characterized by repeated emotional abuse and death threats, defense attorney Sandy Feinland of the Public Defender’s Office told jurors. “He abused Chris Crandall, treated him like a dog, for over eight years,” Feinland said. Feinland plans to bring an expert on long-term effects of domestic violence to testify at the trial. He said Crandall suffered terrible verbal and physical abuse from his parents, was rejected by his family and kicked out of the Army when he revealed he was gay. He met West, 30 years his senior, when he was 24 years old and homeless. “He was the perfect target for an older predator, a father figure,” Feinland said. He said Crandall finally “snapped” and killed West in the heat of passion. Feinland asked the jury to convict his client of manslaughter. In 2010, a state appeals court ruled that jurors at Crandall’s first trial had ignored instructions not to discuss Crandall not testifying at the trial, and that some jurors pressured others for a quick verdict because two jurors were planning trips to Greece and New York.
{ "pile_set_name": "Pile-CC" }
Scott Wood UFOs Over London — We Investigate Latest Reports The collective noun for a spate of UFO sightings is a ‘flap’ — which is exactly what some UFO sightees get themselves into. London’s skies have been flapping like crazy in the days around Christmas and New Year. As we previously reported, ghosts and out-of-place animals have dominated the strange news stories in recent years, but right now, it's unearthly airborne objects that are causing a stir. On 23 December, a video was posted on YouTube by a group called UFO Watch UK. The footage is called Group of White Orb UFO's Over West London and the filmmaker, Mark Bennis, describes himself as a “a UFO watcher and researcher, and an avid enthusiast to this fascinating phenomenon”. It’s a strange video and we weren't sure what we were watching — perhaps distant birds or drones buzzing around. There is clearly a flight path in the area, and maybe some photographers were taking close-up shots of landing planes, with their drones. We showed the video to Sheffield Hallam University's Dr David Clarke, author of The UFO Files: The Inside Story of Real-life Sightings, who also thought these were drones — pointing out that one had got within 20ft of a plane at Heathrow in July 2014. Mark Pilkington, writer of the book and film Mirage Men, was more cautious: “They could be balloons, or perhaps drones of some kind. For the time being anyway, I'll have to agree that these are genuine UFOs — Unidentified Flying Objects.” This does not necessarily mean spaceships or inter-dimensional orbs — just something unidentifiable in the sky. Meanwhile in Bexleyheath on 30 December, contractor Tony Histed was leaving his work site beneath gathering clouds. He looked up and saw “a bright light in the sky to the east” so he “stopped and watched it as it came across the sky towards the storm. Another light appeared in front of the first, and they both flew silently on into the oncoming storm.” Tony went back to the site and saw two more of these ‘orbs’ rise from the ground, level off and fly in a north-easterly direction. He was able to get one photograph which appeared in an 8 January 2015 news report, along with photos of Tony recreating the moment he saw the UFOs. He doesn’t look pleased to see them. Bexleyheath is a veritable UFO hotspot, having previously experienced close encounters of the first kind in 1952, 1955 and 2004. The first UFO sighting of 2015 took place while the New Year fireworks were still exploding about the London Eye. One viewer not too distracted by trying to remember the second verse of Auld Lang Syne saw a circular light arcing around the wheel amongst the pyrotechnics. One YouTube comment advised that “It’s not uncommon for UFOs to be curious about our lights and electricity.” The UFO also got a very fine live view of the New Year fireworks without paying the Mayor of London's office a penny. The final part of the video below has a green object descend into the top right hand corner of the screen and gaze out as if it were scanning the viewer’s very soul. The original footage has been picked up and shared among a number of UFO enthusiasts, and received a warmer and more credulous welcome than the original YouTube post. It looks like it has been filmed from a television screen by someone using a camera and the first UFO is clearly a camera drone filming the fireworks. That's made even more evident when the footage cuts to an aerial shot of the London Eye, almost certainly taken from the drone itself. The green light is a little trickier to work out. Some have suggested it was the drone again, some that it was a decoration on the South Bank caught by an in situ camera. Others, noting that this is a screen being filmed, insist that someone has plopped an LED light or decoration between the camera and screen; hence the object's jerky motion. The day after, another UFO was spotted on some BBC footage. According to the poster’s Twitter feed this was an interview with someone from Clapham Rovers, during which time a UFO coasted into view from the right-hand side of the screen. We can’t actually make anything out on the video except for sunlight breaking through the clouds and as there is no sound, and the video jumps from scene to scene, it's hard to work out whether the video is linear or arranged in a way to make sunbeams look extra-terrestrial. Which they are, of course, but not in the way we’re talking about here. Just to prove our point, seminal 1990s UFO show The X-Files is hovering back in to view and, just this very morning, Camilla Noble, of Caroline Road, Wimbledon shared her footage of ‘flashing spaceships’ filmed from her bedroom window with the Wimbledon Guardian. Camilla has been seeing UFOs regularly down in SE19: "Sometimes they will appear as fire-flies dots and sometimes as really really bright stars” she says, “then they stop and pretend to be a star and then they go in another direction and turn back into UFOs with flashing lights." London, of course, is full of wonders, and we shall continue to bring them to you from above, below, and all the stuff in-between.
{ "pile_set_name": "OpenWebText2" }
Reducing the risk of fires at home... Please note: In some homes the use of candles and smoking is strictly prohibited and fines may be enforced. We advise residents, such as those living in student or keyworker accommodation, to refer to their tenancy or licence agreements and follow the guidance within the building regarding these rules. Alarms: Having a smoke alarm in your home could save your life. Consider having one on every floor of your home and in rooms that have a higher risk of a fire (e.g. kitchen). Make sure you test your smoke alarms regularly (at least once a month). Clutter: Most people have lots of items in their home, and that's fine, but it can become a problem if clutter starts to build up and have a negative impact on your day-to-day life, safety and your health.Keeping your home tidy from clutter can help to reduce fires. Decluttering your home can be stressful, but there are lots of simple steps you can take to get you started. Find out more here. Keep access in communal areas free of obstacles and talk to your neighbours if there are obstructions that make it difficult to move through walkways. Smoking: If you smoke, try to avoid doing so inside. If you do smoke inside, Make sure the cigarette is extinguished Don't smoke in bed or anywhere you may fall asleep Never leave anything with a flame unattended Use proper ashtrays and never put ash or hot cigarettes in the bin Store matches and lighters away safely when not in use and keep out of the reach of children. Candles: Make sure candles are placed securely on a flat surface and away from anything that may set alight (e.g. away from curtains, sofas, clothes) Never leave candles unattended and make sure you put the flame out before going to bed or leaving the house. Kitchen: Never leave pans or the grill unattended in the kitchen Don't cook if you're too tired or if you're feeling drowsy due to medication or after drinking alcohol. Heating: Make sure heaters are kept a distance from anything that may set alight. Don't plug too many appliances into electrical sockets. What to do in the event of a fire? We hope you never need to deal with a fire, but if you do, it's best to be prepared. Purpose-built maisonettes or blocks of flats Fire outside your flat but within your block or building? The London Fire Brigade say purpose-built maisonettes or blocks of flats are built to give you some protection from fire. This means that walls, floors and doors can hold back flames and smoke for 30 to 60 minutes. They advise you’re usually safer staying put and calling 999. And you should tell the fire brigade where you are and the best way to reach you. Further information can be found on the London Fire Brigade's website. Do I stay put in the event of a fire? The advice on whether to evacuate or not will depend on the building you live in. If you live in a purpose built block of flats, there will be a fire safety notice in the communal areas with the recommended approach for your building. Further information about bungalows, houses and converted flats can be found here. Our approach to fire safety We’ve comprehensive controls in place regarding fire safety and we review and test these on a regular basis. Read more about our approach to fire safety here. More information? For more information about our approach fire safety you can read our Fire Safety Management Plan, this sets out how we manage the fire risk in our properties where we have a maintenance responsibility.
{ "pile_set_name": "Pile-CC" }
If Your Landing Page Could Talk, What Would It Say? My job is to greet you when you click on ads, email links and social media posts. You will find me by scanning a QR code. You come to me because you want something. You have requested my presence on your screen by taking a very specific action, and you expect a very specific result. I try not to let you down. I want you to know you are in the right place; that I have an answer for you. Your search has not been in vain. I want you to trust me. I want you to know that others have been here and prospered because of it. I do not fool myself. I may be the first emissary of this website that you have seen, brought here by a promise and expecting that promise be kept. It is a weighty responsibility I have. I have seen you through the screen, wide-eyed and eager, but with the telltale signs of skepticism. I am the butler, the maître d’. It is my job to bring you into the establishment and help you find your place. No, the home page is not equipped to perform this task any more than a pack mule is equipped to drive a race car. Visitors to your landing page are different from those visiting your home page. These are not the eyes of a home page visitor, with lids half closed and darting back and forth. Have you seen a home page? The Schizophrenia Of The Home Page This poor page is both mumbling and screaming at the same time. She changes her hat every few seconds… just before you’ve finished reading the last. It’s like those disconnected homeless people pushing a cart full of stuff but talking to no one in particular; or maybe they’re talking to a light post. And she’s always talking about herself, even more so that that About Us page. Is your shopping cart all business? The Shopping Cart Have you seen the shopping cart? He’s all business, and little in the way of social skills. “What’s your name?” “Where do you live?” “What is on your credit card?” “Can you choose the right shipping method?” “When was the last time you had sex?” “Do you suffer from any rashes?” I shudder to think that I must send my trusting visitors off to such a sterile and brash group of pages, but what choice to I have? Splitting My Personality I am not the same as I have always been. I have had many forms. I have had different headings, longer and shorter copy, a form, a button and different images. I am regularly cloned and changed. Split test landing pages to learn more about your visitors. You might not even notice the difference between me an my cloned “twin.” It’s usually one thing, often sometimes small, but sometimes major. Then my creators pit us against each other, sending one visitor to me and one to the other. Our visitors tell them which they prefer. They vote with their dollars and with their contact information. They vote with downloads, listens and views. They also vote by leaving, perhaps for a competitor. My creators use terms like “Conversion Rate” and “Revenue per Visit” and “Bounce Rate” to measure us. And when I win they call me “The Control,” a badge I wear with honor. It means that I’m a better friend to my visitors and to my creators. A Gift To My Visitors I have had many forms over my lifetime. Sometimes I’ve been a disappointment to visitors, and a godsend at other times. I am often most successful when my creators find me ugly. Sometimes they choose the loser because he is prettier. This makes me sad. Yet, here I remain, a faithful servant to my visitors. Anticipating their needs, delivering what they want, and making the Web a better place for surfers and my creators alike. A Note From The Author There is a segment of almost any search audience for whom relationships are an important part of their decisions. If you have read this far, you may very well be one of them. The Eisenberg brothers call these people Humanists, and they are particularly difficult to serve online because websites tend to be informational in nature. It’s difficult to build relationships with Web pages. Anthropomorphism is a writing technique that gives animals and inanimate objects human-like characteristics. This approach may be a more effective way of encouraging the use of landing pages than some of the others I’ve written. I think the technique appeals to these Humanist searchers. You probably are a Competitive in certain situations, but maybe Humanist when learning. I’m talking about “flipping” copy from Humanist to Competitive to Spontaneous to Methodical in my Conversion Conference presentation in April. http://www.submitshop.co.uk/blog Submitshop UK Good job. I would like to add some points .Some landing pages are too annoying.Basically, when I see a landing page, I want to find the information I’m looking for in the first 5-10 seconds. Otherwise, I’m going to look somewhere else. Landing page generate profits effectively so keep them short and to the point. If you add video in your landing pages then it will work like icing on the cake because they are more engaging & increase conversions. http://twitter.com/sj2go Sean Jordan Our landing pages literally talk. We use live chat 24-7/36 on all landing pages. This puts the perception of control in the users hand so they can feel free to ask a question anytime and get an immediate answer. Live chat means LIVE, ALWAYS ON, never ever ..’We’re offline, leave a message’ ..that’s just lame. http://twitter.com/MktgbyNathan Nathan Johnson I like your approach. Landing page talk can get boring. This is a nice way to change it up. http://conversionscientist.com Brian Massey Landing pages must support visitors who make decisions quickly and emotionally. Some visitors will be put off by a page that doesn’t have enough information. However, every page must communicate one thing to every visitor within a few seconds: “You are in the right place.” http://conversionscientist.com Brian Massey We see live chat as a conversion “accelerators” — those things that have the potential to provide a step function increase in results (and often require a significant commitment of resources). Here are some other accelerators: http://conversci.com/z7jm Attend Our Conferences Attend Marketing Land's SocialPro conference and learn fresh new strategies and tactics from some of the savviest brands and digital marketing agencies managing earned, owned and paid social media marketing campaigns across multiple platforms. Visit the SocialPro site to learn more..
{ "pile_set_name": "Pile-CC" }
Bad Day on the Midway Bad Day on the Midway is a CD-ROM game designed and scored by The Residents and a number of other graphic artists, including Jim Ludtke. The game was optioned by Ron Howard at Imagine Television for a proposed series to be directed by David Lynch. After two years of meetings with Lynch, the project was dropped because a script was never agreed upon. Had the project moved forward, The Residents would have not been creatively involved as their contract only gave them consulting roles in the pilot. The character Timmy was later brought back in a series of short videos by the Residents. Additionally, in 2012 a novel was published based on the game's story. Gameplay The player can switch between the various game characters in order to solve a number of puzzles. The game features gameplay elements from point-and-click adventures and has alternative narrative lines, with definite fixed story elements. The gameplay is centered around discovery via the different characters and to understand the storyline as a whole, it is necessary to complete the game multiple times. The game is time-limited and decisions made by the player influence the game's timer. Soundtrack There was also a soundtrack album (Have a Bad Day, East Side Digital EDS 81202) and some of the game's visuals were brought together in full resolution on The Residents' Icky Flix DVD. Reception The game won the 1995 'Macrovision International User Conference Award' in two categories – Best Entertainment Title and Most Innovative Use of Multimedia. References External links Bad Day on the Midway at The Underdogs Bad Day on the Midway at MobyGames Infosite on "Bad Day on the Midway" with character descriptions, tech help and game hints Category:1995 video games Category:Adventure games Category:Full motion video based games Category:Horror video games Category:Mac OS games Category:Musician video games Category:Video games developed in the United States Category:Windows games
{ "pile_set_name": "Wikipedia (en)" }
Follow Us Subscribe Listen to the Podcast Tag Archives: Seneca SC The Dust Bowl crisis of the early 1930s for the first time brought national attention to the acute dangers of soil erosion. Southern Appalachian farms, for their part, suffered from poor soil conditions and erosion as a result of practices that maximized the short-term potential of corn, tobacco and cotton cash crops at the expense […] The McPhail Angus Farm, in the vicinity of Seneca, SC, has been a locally significant farm for more than one hundred years. The farm illustrates twentieth century developments in agriculture in the South Carolina upcountry, most notably the transition from a traditional dependence on growing cotton as a cash crop to raising cattle as a […] In the decade after the Civil War the new Air Line Railroad connecting Charlotte and Atlanta was laid through upcountry South Carolina. Two Confederate veterans saw an opportunity to create a new town at the junction of the older Blue Ridge Railroad and the new line, a town which because of this location would serve […]
{ "pile_set_name": "Pile-CC" }
Rapid Down-Regulation of Glucocorticoid Receptor Gene Expression in the Dentate Gyrus after Acute Stress in vivo: Role of DNA Methylation and MicroRNA Activity. Although glucocorticoid receptors (GRs) in the hippocampus play a vital role in the regulation of physiological and behavioural responses to stress, the regulation of receptor expression remains unclear. This work investigates the molecular mechanisms underpinning stress-induced changes in hippocampal GR mRNA levels in vivo. Male Wistar rats were killed either under baseline conditions or after forced swim stress (FSS; 15 min in 25°C water). Rat hippocampi were micro-dissected (for mRNA, microRNA, and DNA methylation analysis) or frozen whole (for chromatin immunoprecipitation). In an additional experiment, rats were pre-treated with RU486 (a GR antagonist) or vehicle. FSS evoked a dentate gyrus-specific reduction in GR mRNA levels. This was related to an increased DNMT3a protein association with a discreet region of the Nr3c1 (GR gene) promoter, shown here to undergo increased DNA methylation after FSS. FSS also caused a time-dependent increase in the expression of miR-124a, a microRNA known to reduce GR mRNA expression, which was inversely correlated with a reduction in GR mRNA levels 30 min after FSS. FSS did not affect GR binding to a putative negative glucocorticoid response element within the Nr3c1 gene. Acute stress results in decreased GR mRNA expression specifically in the dentate gyrus. Our results indicate that a complex interplay of multiple molecular mechanisms - including increased DNA methylation of discrete CpG residues within the Nr3c1 gene, most likely facilitated by DNMT3a, and increased expression of miR-124a - could be responsible for these changes.
{ "pile_set_name": "PubMed Abstracts" }
At the end of the 19th century, American economist and sociologist Thorstein Veblen said that people take their cues about what to consume from the social class immediately above their own. They want things just beyond their reach. A new paper in the journal Communication, Culture and Critique shows how this theory explains some dynamics of the influencer economy and the rules that govern Instagram. In it, researchers Emily Hund and Lee McGuigan at the University of Pennsylvania investigate the mechanics of “a shoppable life.” The term describes the contemporary phenomenon of influencers marketing their lifestyles, then selling aspects of it, like the beauty products they use or elements of their home’s decor, through nearly seamless technological infrastructure, and the finding that more and more commercial opportunities rise with the way people present themselves and interact with each other. One influencer told the researchers that a favorite part of her job is getting freebies, like a new set of furniture, from brands that want to be promoted in her channels. “They’re things that I love and never could have afforded on my own, and it’s going to bring a lot of value to the blog, so I’m excited about those just for that reason.” Veblen wrote in his 1899 book Theory of the Leisure Class that the “ideal of consumption” for most people is what they can’t acquire, or which, at best, could be acquired only through considerate effort. “The motive is emulation—the stimulus of an invidious comparison which prompts us to outdo those with whom we are in the habit of classing ourselves,” he writes. The researchers write in their paper that the influencer’s perspective on the furniture she gets for free can be understood through “a sort of social media age update” to Veblen’s theory. “These products give influencers, who are themselves models of aspirational lifestyles” —whether for luxury, fashionability, eco-consciousness or ethical spending— “for their followers, access to a lifestyle that is aspirational for them.” A key to Veblen’s theories is the notion of “conspicuousness” in consumption or leisure. The point of buying or doing certain things is to communicate a certain lifestyle or class aspirations. The researchers put it another way, quoting the 2014 St. Vincent song Digital Witness: “If I can’t show it, if you can’t see me/What’s the point of doing anything?” This, of course, describes a lot of how Instagram works, from the Rich Kids of Instagram and the daily displays of wealth by the Kardashian sisters to many of the pictures mere mortals post while on vacation to show their friends that they too can drink craft cocktails under a palm tree. And Instagram’s marketing and technology infrastructure brings the life that is just “out of reach,” as Veblen says, just a little bit closer. The “shoppable life” phenomenon is about more than just display. “To be made to matter, consumption choices and aspirational lifestyles must not only be displayed visibly, but audiences, or witnesses, should be able to acquire the elements defining the lifestyle and the self-identity,” the paper argues. “The shoppable life is not only branded; its constitutive elements can be bought.” Influencers make their posts a seamless way to acquire their highly-curated lifestyles. Affiliate link platforms like LikeToKnowIt, which allows users to buy items straight from the influencer’s photo, eliminate barriers to buying their lifestyle—and make heaps of money in the process. Users who sign up with LikeToKnowIt accounts only need to “like” an influencer’s photo on Instagram to get an email from the company where they can purchase the product the influencer is promoting. The “shoppable life” is an effort to “separate people from their money with less and less friction,” says Hund. There is one major difference between Instagram today and American society more than a century ago: In the past, people were after an unattainable lifestyle they saw in the class above them, which was created mostly by inherited wealth; Today, on Instagram, they are after the lifestyle of the “class” above them that is largely an illusion crafted by technology and marketing. It’s hard to say which is worse.
{ "pile_set_name": "OpenWebText2" }
Personal support If you are new to foreign exchange (FX or Forex) trading, we have trading courses that are customised according to your personal needs. We offer a dedicated support team that will be ready to assist and guide you on your financial trading journey on a personal basis. We aim to provide you support via Skype, telephone, online mentoring and Platinum Trading Television, which is just like watching CNBC or Bloomberg but with a TV channel dedicated to forex trading. For forex traders that have been trading in the financial markets for some time, but lack the consistency they desire, our dedicated Forex Mentors will give you straightforward forex trading strategies that you can implement by simply placing pending orders in the market. These trading strategies are also known as “Set & Forget” strategies. The benefit of these strategies is that they will allow you to spend more time on profitability, and less time on watching forex news, searching for the holy grail in financial market trading. We want you to trade forex successfully and with confidence, which is why we provide you with dedicated one-to-one mentoring from experts in the field of forex. Platinum has a 24-hour forex trading support desk so that you can reach us from anywhere in the world at any time of the day. Please check our Forex strategies page on the website so you can see our in-depth trading analysis that we provide, along with our trading results. Please ensure when you start trading your Forex broker is authorised and regulated by the financial conduct authority if you are trading Forex from the UK.
{ "pile_set_name": "OpenWebText2" }
Pattern matching in event processing generally refers to detecting a presence of predetermined patterns within a stream of arriving events. Such event streams may exist within a wide variety of settings, and may contain desired or otherwise-unknown information, which may be difficult to detect without the aid of suitable event stream processing techniques. Examples of such event streams exist, for example, in the realms of business, industry, healthcare, government, and the military, as well as many other fields of endeavor in which sources generate events. As a specific example from the financial realm, the stock market continually generates current stock prices and other information about individual stocks throughout a trading day. In the airline industry, reservation systems and flight tracking systems generate events about ticket purchases and flight schedules. In the e-commerce realm, online stores are associated with events related to the viewing of store websites, and purchasing activities that may be associated therewith. Many other examples of such event streams are known to exist, some of which are referenced in more detail below. One way to utilize such event streams is to extract information therefrom by detecting the presence of a pattern of events within the event stream. For example, using the examples just given, a first pattern may be used to detect certain price movements or other relevant information about a desired stock or group of stocks within the stock market. A second pattern may be applied to the airline setting, in order to determine, for example, particular increases or declines in airline reservations. In a third example, a pattern of returned items or customer complaints may be detected within an event stream of an online store. In practice, then, query patterns may be defined which express a desired pattern to be detected within a specified event stream. Then, the defined query pattern and specified event stream may be compared to one another, in order to output detection of the query pattern when found within the event stream. In many settings, it may occur that a large number of events may be contained with an event stream, and may be arriving relatively quickly. Meanwhile, there may be a relatively large number of query patterns specified for comparison against the event stream in question. For example, a stream of events reflecting price updates and other information about the stock market may be arriving at a rapid pace, perhaps with respect to a large number of individual stocks. Meanwhile, the query pattern specifying a particular pattern of stock price movement or other stock activity may be specified for one or all of the relevant stocks. Consequently, a large number of events and a large number of query patterns may need to be evaluated, so that, as a result, there may be a delay in determining a corresponding evaluation for a particular stock. In this regard, in many settings, a speed with which a match occurs between an event stream and a particular query pattern may be an important or critical factor. For example, in the example of the stock market just given, a stock trader may wish to detect a certain price pattern, and may specify multiple such patterns with respect to multiple stocks. In this example, the stock trader may wish to base a stock purchase or sale based on recognition of one or more of the specified patterns. However, depending on a number and/or rate of arrival of the events of the event stream, and/or on a number, size, or complexity of query patterns to be matched against the event streams, non-trivial delays may be experienced in outputting a determination of a match between a particular event and a corresponding query pattern. For example, a stock may reach a price which completes a match of a predefined query pattern. However, if the event associated with the stock price movement is preceded in time by a large number of other, previous events, and/or if a large number of query patterns have yet to be compared with any such preceding events, then the match between the particular event and its associated query pattern may not be detected and reported until some amount of delay has occurred. In the meantime, the purchase or sale opportunity associated with the query pattern may be mitigated or lost. Similar examples exist within the other settings and examples referenced above, and in other known applications of complex event stream processing. Thus, as these and other examples illustrate, a response time associated with matching an event and a query pattern may be an important metric in characterizing a usefulness of the matching.
{ "pile_set_name": "USPTO Backgrounds" }
This article is part of the thematic issue \"Frontiers in pharmaceutical nanotechnology\". Introduction ============ Nanocrystals for pharmaceutical use were invented in the early 1990s \[[@R1]--[@R4]\]. They are composed of 100% substance, are stabilized with only small amounts of surfactants, and possess particle sizes below 1 µm. According to the Ostwald--Freundlich equation nanocrystals possess a higher curvature leading to an enhanced dissolution pressure and thus to an enhanced kinetic saturation solubility \[[@R5]\]. Due to their small size they possess an increased surface area, resulting in an increased dissolution rate expressed by the Noyes--Whitney equation. In addition, they also possess an increased adhesiveness and thus, represent a universal, powerful and well-known formulation principle to overcome poor aqueous solubility and poor bioavailability of class-II and class-VI active ingredients of the biopharmaceutics classification system (BCS) \[[@R6]--[@R7]\]. Nanocrystals are already used in various pharmaceutical drug products for oral use. Examples are Rapamune^®^ (Sirolimus, Wyeth), Emend^®^ (Aprepitant, Merck), Tricor^®^ (Fenofibrate, Abbott), Megace ES^®^ (Megestrol, Par Pharm) or Triglide^®^ (First Horizon Pharmaceuticals). In 2009 the first parenteral drug product, Invega Sustenna^®^ (Paliperidone palmitate, Johnson & Johnson), was approved by the FDA. However, besides oral or parenteral administration, nanocrystals can also be used to improve the bioactivity of poorly soluble active ingredients via other routes of administration. Examples include pulmonal, ocular or dermal application \[[@R8]--[@R12]\]. Nanocrystals can be produced by different methods. Examples are precipitation, wet milling, high-pressure homogenization or combinations of these methods \[[@R1]--[@R4]\]. Regardless of the process used, all these methods will yield nanosuspensions, i.e., nanocrystals dispersed in a liquid. As liquid formulations are not always a convenient dosage form for the final drug product, in most cases nanosuspensions need to be formulated into other, more convenient, dosage forms. Depending on the route of administration this could be tablets, pellets, powders, gels or creams. However, prior to the formulation into final drug products, the aqueous nanosuspensions need to be stored, which certainly requires a sufficient stability of the nanosuspension. For this, besides chemical and physical stability, also the microbial stability needs to be considered. One method to avoid microbial contamination of aqueous formulations during storage is the use of preservatives. In previous studies it was already found that preservatives can strongly impair the physical stability of the nanosuspensions. Reasons for this are changes of pH value or of the conductivity of the dispersion medium, or the adsorption of the preservatives onto the surface of the particles, which changes the charge of the particles (zeta potential) and forces agglomeration of the nanocrystals. To avoid instabilities of nanosuspensions only very hydrophilic and non-charged preservatives, which will not interact with the nanocrystals, should be used. Due to the above-mentioned reasons, only a few preservatives are available for the preservation of nanocrystals. Suitable preservatives for the preservation of nanocrystals include different alcohols, i.e., pentylene glycol or mixtures of phenoxyethanol and ethyl hexyl glycerol \[[@R13]--[@R15]\]. The limited number of preservatives and sometimes the incompatibility of these preservatives with other excipients in the final formulation are inconvenient for a successful formulation of nanosuspensions. Therefore, to enable a more convenient formulation of nanocrystals in the future, this work aimed at investigating an alternative method to maintain the microbial stability of nanosuspensions during storage. Considering that bacterial growth strongly depends on the temperature, it was hypothesized that freezing of non-preserved nanosuspensions might prevent bacterial growth of the nanosuspensions during storage. However, the harsh conditions during freezing and thawing might also impair the physical stability of the nanocrystals and might cause agglomeration of the particles, which would then lead to a loss of the "nano properties". Hence, in this case the method could not be exploited to preserve nanosuspensions without preservative. To investigate whether the freeze--thaw method is suitable for the production of long-term stable non-preserved nanosuspensions with high microbial quality, previously developed nanosuspensions containing the flavonoid rutin as model substance and either Plantacare 2000 or Poloxamer 188 (PLX 188) as stabilizers were produced by high-pressure homogenization as described previously \[[@R16]--[@R19]\]. Each of the nanosuspensions obtained was allocated into two parts. One part was preserved, and the other part remained non-preserved. All formulations were stored at different temperatures for a period of three months and size, zeta potential, antioxidant capacity and the microbial quality were determined and monitored over this period of time ([Fig. 1](#F1){ref-type="fig"}). ![Scheme of the study. Rutin nanosuspensions with two different stabilizers were produced. The formulations were allocated, one aliquot was preserved, and the other part remained non-preserved. All formulations obtained were stored at different temperatures for three months. During this time changes in size, zeta potential, antioxidant capacity and microbial quality were monitored.](Beilstein_J_Nanotechnol-10-1902-g002){#F1} Results and Discussion ====================== Production and characterization of nanosuspensions -------------------------------------------------- High-pressure homogenization yielded rutin nanosuspensions with a relatively broad size distribution, i.e., polydispersity indices (PdI values) above 0.3 and some larger particles with sizes above 4 µm ([Table 1](#T1){ref-type="table"}). Because of this, the nanosuspensions were expected to be prone to Ostwald ripening, i.e., particle growth during storage was expected. Limited physical stability of suspensions is advantageous if a study aims at investigating different stabilizing and destabilizing effects, because in comparison to highly physically stable formulations, destabilizing effects can be detected earlier during storage, making a discrimination between stabilizing and destabilizing effects clearer. ###### Overview of results obtained from the characterization of the nanocrystals at the day of production. ------------------- ----------------- ------------- ----------------------- ------------------- -------------- ------------- ------------- stabilizer preservative DLS data zeta potential \[mV\] LD data \[µm\]^a^ z-ave \[nm\] PdI in water in medium *d*(*v*)0.50 *d*(*v*)0.95 PLX 188 no preservative 408 ± 45 0.31 ± 0.08 −29.4 ± 2.9 −24.8 ± 2.6 1.3 ± 0.17 4.09 ± 0.15 with preservative 412 ± 29 0.30 ± 0.05 −27.0 ± 7.8 −24.6 ± 3.0 1.3 ± 0.12 4.13 ± 0.15 Plantacare 2000 no preservative 436 ± 30 0.32 ± 0.06 −30.6 ± 4.0 −39.5 ± 2.7 1.2 ± 0.11 4.02 ± 0.11 with preservative 447 ± 15 0.33 ± 0.06 −29.3 ± 2.7 −37.6 ± 3.3 1.2 ± 0.12 3.99 ± 0.11 ------------------- ----------------- ------------- ----------------------- ------------------- -------------- ------------- ------------- ^a^ *d*(*v*): volumetric median diameter. The suspension stabilized with PLX 188 yielded sizes of about 410 nm. Slightly larger nanocrystals with a slight agglomeration were obtained when Plantacare was used as stabilizer ([Table 1](#T1){ref-type="table"} and [Table 2](#T2){ref-type="table"}). From this it was expected that non-preserved nanosuspensions stabilized with PLX 188 might possess a slightly better physical stability than the Plantacare-stabilized formulations. Upon the addition of the preservatives only very minor changes in size were observed for both formulations ([Table 1](#T1){ref-type="table"}) and for the Plantacare-stabilized formulation even a slight deagglomeration was determined ([Table 2](#T2){ref-type="table"}). Also the zeta potential values did not change significantly in both water and original dispersion medium ([Table 1](#T1){ref-type="table"}), again indicating no, or only a very limited, impairment of the stabilization mechanisms of the nanocrystals by the hydrophilic preservative \[[@R20]\]. ###### Microscopic images of the nanosuspensions stabilized with Poloxamer 188 (left) and Plantacare 2000 (right) at the day of production. Magnification: 400-fold. --------------- ----------------------------------------------- ----------------------------------------------- stabilized with Poloxamer 188 stabilized with Plantacare 2000 non-preserved ![](Beilstein_J_Nanotechnol-10-1902-i001.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i002.jpg) preserved ![](Beilstein_J_Nanotechnol-10-1902-i003.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i004.jpg) --------------- ----------------------------------------------- ----------------------------------------------- Physical stability ------------------ The physical stability was assessed by size measurements over a period of three months of samples under all storage conditions. Increases in *d*(*v*) values, *z*-average, and polydispersity index (PdI) over time indicated instability. The laser diffractometry (LD) data and the dynamic light scattering (DLS) data obtained from this part of the study are shown in Figures 2--7. ![Physical stability during three months of storage at different storage temperatures for the non-preserved nanosuspensions stabilized with Poloxamer 188 (LD data).](Beilstein_J_Nanotechnol-10-1902-g003){#F2} ![Physical stability during three months of storage at different storage temperatures for the non-preserved nanosuspensions stabilized with Plantacare 2000 (LD data).](Beilstein_J_Nanotechnol-10-1902-g004){#F3} ![Physical stability during three months of storage at different storage temperatures for the preserved nanosuspensions stabilized with Poloxamer 188 (LD data).](Beilstein_J_Nanotechnol-10-1902-g005){#F4} ![Physical stability during three months of storage at different storage temperatures for the preserved nanosuspensions stabilized with Plantacare 2000 (LD data).](Beilstein_J_Nanotechnol-10-1902-g006){#F5} ![Physical stability during three months of storage at different storage temperatures for the nanosuspensions stabilized with Poloxamer 188 (DLS data).](Beilstein_J_Nanotechnol-10-1902-g007){#F6} ![Physical stability during three months of storage at different storage temperatures for the nanosuspensions stabilized with Plantacare 2000 (DLS data).](Beilstein_J_Nanotechnol-10-1902-g008){#F7} For the non-preserved nanosuspensions, increasing storage temperatures reduced the physical stability of the non-preserved suspensions ([Fig. 2](#F2){ref-type="fig"}, [Fig. 3](#F3){ref-type="fig"}, [Fig. 6](#F6){ref-type="fig"}, [Fig. 7](#F7){ref-type="fig"}). Consequently, the least stable formulations were obtained when the formulations were stored at 30 °C. Reasons for this are the more pronounced particle growth due to Ostwald ripening at elevated temperatures and/or destabilization due to accelerated bacterial growth, which might excrete compounds that contribute to changes in pH value or conductivity in the medium or interact with the particles. Such changes should become visible in the zeta potential values. However, this was not the case in this study ([Fig. 8](#F8){ref-type="fig"}). Therefore, the observed destabilization at elevated temperatures of the non-preserved nanosuspensions might be more related to Ostwald ripening. The assumption is also underlined by the fact that the Poloxamer-stabilized formulations, which possessed a narrower size distribution, i.e., no agglomerates at the day of production (c.f. [Table 2](#T2){ref-type="table"}), were found to be more stable than the Plantacare-stabilized formulations with a broader size distribution due to a slight agglomeration of the nanocrystals at the day of production. ![Determination of zeta potentials of the non-preserved and preserved rutin nanosuspensions during three months of storage at different storage temperatures.](Beilstein_J_Nanotechnol-10-1902-g009){#F8} The trend for physical stability was different for the preserved nanosuspensions. The most stable formulations were obtained when the samples were stored at room temperature. Lower (except freezing) and higher temperatures reduced the stability (Figures 4--7). Reasons for this cannot be explained completely but might be due to the presence of the preservatives that were added to the samples at room temperature. Changes in temperature might change the interaction between preservative and particles and thus the stability. More research is needed to understand these phenomena in detail. Most interesting results were obtained for the samples that were stored in frozen state. Physically stable formulations, i.e., without pronounced changes in *z*-average, PdI and LD values, were obtained for the non-preserved suspensions when stored at −20 °C. These results were not expected, because in general it is assumed that freezing of colloidal formulations leads to changes in the stabilizing layer and the particle interactions, being the cause for agglomeration of the nanoparticles. Especially freezing of nanosuspensions that contain dissolved active ingredients in "supersaturation" is hazardous, because due to the reduction in temperature, re-crystallization of dissolved active ingredients can easily occur. Nevertheless, the data obtained from this study indicate that it is possible to freeze--thaw nanosuspensions with good steric and/or electrostatic stabilization, without impairing their physical stability. The later fact seems to be highly important, especially when looking at the data obtained for the frozen and preserved nanosuspensions. Here, it was found that preserved nanosuspensions that were stabilized with PLX 188 became unstable during the freeze--thaw process, whereas Plantacare-stabilized formulations remained stable. Reasons for the differences might be the different stabilizers that interact differently with the preservative. Poloxamer 188 is a non-ionic surfactant, providing steric stabilization for the nanocrystals. In general, a thick surfactant layer that is indicated by a zeta potential (ZP) near zero should be obtained for good steric stabilization \[[@R21]\]. However, in our study ZP analysis revealed that the thickness of the layer is relatively low (ZP \> 20 mV, cf. [Table 1](#T1){ref-type="table"}). Hence, steric stabilization of the formulation stabilized with PLX 188 is relatively poor. Upon the addition of the preservative to the formulations stabilized with PLX 188 a very limited decrease in ZP was detected when the suspensions were analysed in original dispersion medium (c.f. [Table 1](#T1){ref-type="table"}). This might indicate that small amounts of the non-charged preservative are adsorbed onto the surface of the nanocrystals where it might interact with the polymer layer. This interaction might cause a re-arrangement of the already thin stabilizing layer around the nanocrystals and might therefore explain the decreased stabilization efficacy of the poloxamer in the preserved formulations. The destabilizing effect of PLX 188 in combination with other excipients in nanocrystal formulations was also shown by a study of Beirowski and co-workers, who showed that some combinations of poloxamer and cryoprotectant were unsuitable for stabilizing nanocrystals during a freezing process \[[@R22]\]. In contrast to PLX 188, Plantacare, which is an alkyl polyglucoside, is mostly providing electrostatic stabilization. This can be seen by the differences in ZP analysed in water and original dispersion medium, respectively. The zeta potential is about −40 mV in original dispersion medium and is reduced to about −30 mV when analysed in water, because upon dilution with water surfactant is "washed off" from the particle surface, which results in less electrostatic stabilization of the particles. However, due to its chemical structure, Plantacare is also able to provide steric stabilization. This leads to an excellent stabilization capacity combining steric and electrostatic stabilization \[[@R23]--[@R24]\]. Upon addition of the preservative only very small differences in ZP values were detected for both, water and original dispersion medium (c.f. [Table 1](#T1){ref-type="table"}), indicating only very minor impairment of the preservative. In fact, Plantacare provides a very efficient stabilization mechanism, which is not significantly impaired by the addition of the preservative. This explains the slightly better physical stability than that of the preserved PLX-stabilized nanosuspensions. Antioxidant capacity -------------------- The antioxidant capacity (AOC) was measured with the DPPH assay in which the IC~50~ value is determined. The IC~50~ value determines the amount of antioxidant needed to scavenge 50% of the free radical. Consequently, the smaller the IC~50~ value the higher is the antioxidant capacity. In this study, the IC~50~ values for the different formulations did not change during storage, independent on preservative, storage time and storage temperature ([Fig. 9](#F9){ref-type="fig"}). Hence, all these parameters did not affect the AOC of the formulations. As the AOC is an indirect measure for the chemical stability, data indicate excellent chemical stability of all aliquots during storage. The data are in good agreement with a recent study by Müller et al. in which the authors could prove chemical stability of a rutin nanosuspension for more than nine years \[[@R25]\]. ![Antioxidant capacity, determined as IC~50~ value, of the rutin nanosuspensions during storage. No changes in IC~50~ values were determined during three months of storage, thus indicating good chemical stability of all rutin nanosuspensions.](Beilstein_J_Nanotechnol-10-1902-g010){#F9} Microbial quality ----------------- The growth of bacteria and fungi was determined for all formulations after one, two and three months of storage. All preserved formulations showed excellent microbial quality. No fungi or bacteria were detected during the three months of storage ([Fig. 10](#F10){ref-type="fig"}). For the non-preserved nanosuspensions, data indicated that for all formulations the number of bacteria was fairly low upon the production with high-pressure homogenization, which is a well-described technique to reduce the number of bacteria in liquids \[[@R26]\]. The growth of microorganisms during storage was temperature-dependent and was also found to be slightly influenced by the type of stabilizer, i.e., a slightly lower and slower increase in microbial growth was found for the Plantacare-stabilized formulations ([Fig. 10](#F10){ref-type="fig"} and [Table 3](#T3){ref-type="table"}). A possible reason for this observation could be the antimicrobial activity of the stabilizer Plantacare, which was already described in previous works by Jurado and co-workers \[[@R27]--[@R28]\]. ![Determination of microbial activity (CFU) during three months of storage.](Beilstein_J_Nanotechnol-10-1902-g011){#F10} ###### Determination of microbial quality during three months of storage. P188: rutin nanosuspension stabilized with Poloxamer 188, PLC: rutin nanosuspension stabilized with Plantacare 2000, (+) = preserved with Euxyl 9010, (−) non-preserved. -------------- ----------------------------------------------- ----------------------------------------------- ----------------------------------------------- ----------------------------------------------- storage temperature −20 °C 5 °C 21 °C 30 °C d28 bacteria ![](Beilstein_J_Nanotechnol-10-1902-i005.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i006.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i007.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i008.jpg) d28 fungi ![](Beilstein_J_Nanotechnol-10-1902-i009.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i010.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i011.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i012.jpg) d60 bacteria ![](Beilstein_J_Nanotechnol-10-1902-i013.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i014.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i015.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i016.jpg) d60 fungi ![](Beilstein_J_Nanotechnol-10-1902-i017.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i018.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i019.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i020.jpg) d90 bacteria ![](Beilstein_J_Nanotechnol-10-1902-i021.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i022.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i023.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i024.jpg) d90 fungi ![](Beilstein_J_Nanotechnol-10-1902-i025.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i026.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i027.jpg) ![](Beilstein_J_Nanotechnol-10-1902-i028.jpg) -------------- ----------------------------------------------- ----------------------------------------------- ----------------------------------------------- ----------------------------------------------- Finally, it was found that for all formulations that were stored in frozen state at −20 °C no bacterial growth occurred. Hence, the hypothesis, that storing nanosuspensions after production in frozen state might prevent bacterial growth during storage without the use of preservatives, could be confirmed by this set of data. The same trend was also observed for the growth of fungi. However, there was one exception, which was observed for the Plantacare-stabilized formulation at day 60 of storage. At this time point a slight contamination with fungi was observed for one aliquot ([Fig. 10](#F10){ref-type="fig"} and [Table 3](#T3){ref-type="table"}). However, no contamination with fungi was observed at the next time point, i.e., after 90 days of storage. In fact, after three months of storage at −20 °C and upon thawing all non-preserved nanosuspensions were found to possess an excellent microbial quality, as no fungal and no bacterial growth was detected. These findings so far are very promising and could enable a new concept to produce preservative-free nanosuspensions that can be stored over a longer period until further use or processing into final dosage forms. Preservative-free aqueous nanosuspensions would be a convenient formulation principle, because there will be no need to take possible interactions with preservatives and/or other excipients into consideration. Allergies of consumers and/or regulatory hurdles can also be circumvented with this concept. The freeze--thaw concept is simple and can be exploited not only in industry but also in early drug development, where nanosuspensions are often used for early formulation of poorly soluble drug candidates. In this environment, the freeze--thaw concept could improve the predictability of screenings. At present, due to the lack of microbial stability, nanosuspensions need to be prepared shortly before the experiments, i.e., assays, cell culture or in vivo studies, are performed. Any repeating of the tests or continued tests will require the production of new suspensions, which might possess slightly different properties, which in turn might then cause differences in the (in vivo) data. By using thawed nanosuspensions from only one batch, these variations could be circumvented. In conclusion, the freeze--thaw concept was shown to be a simple method to prevent microbial contamination during storage of aqueous rutin nanosuspensions. The new method is believed to enable new possibilities for the use of nanosuspensions and thus can be seen as a highly promising concept, not only in pharma, but also in food and cosmetics. Next steps should now investigate if the concept can also be exploited for other active ingredients and other stabilizers. Conclusion ========== Preserved and non-preserved rutin nanosuspensions stabilized with different stabilizers were produced in this study and were stored for three months at different storage temperatures. During this time physical stability and microbial quality were monitored. In addition, the antioxidant capacity, as an indicator for the chemical stability, was assessed. All formulations were chemically stable over the whole time of observation. Physical stability was influenced by the type of surfactant, the preservative and the storage temperature. Preserved samples were only stable when stored at room temperature. Storage at higher or lower temperatures strongly impaired their physical stability. However, the microbial quality was excellent for all preserved nanosuspensions. Non-preserved samples possessed a better physical stability than the preserved nanosuspension. Proving again that preservatives impair the physical stability of nanosuspensions. Most interestingly, it was found that freezing did not alter the physical stability of the non-preserved suspensions. Hence, nanosuspensions could be frozen, stored up to three months at −20 °C and possessed unchanged particle sizes upon thawing. Storage at −20 °C also prevented bacterial growth of the non-preserved nanosuspensions, whereas storage at higher temperatures caused microbial contamination of the suspensions. The freeze--thaw concept was therefore found to be a suitable method to produce not only physically and chemically but also microbially stable rutin nanosuspensions. More research is now needed to investigate if the method can also be transferred to other nanosuspensions or nanosized formulations. All in all, the method seems to be a promising method to enable long time storage of aqueous nanosuspensions with excellent stability and without the use of preservatives. It can be used for improved formulation development of poorly soluble active ingredients in both lab scale and industrial scale. Experimental ============ Materials --------- Rutin was purchased from Denk Ingredients GmbH (Germany). The stabilizers Poloxamer 188 (PLX 188, Kolliphor^®^ P 188) and alkyl polyglucoside C8-C16 (Plantacare^®^ 2000 UP) were kindly provided from BASF AG (Germany). The preservative was composed of 90% (w/w) 2-phenoxyethanol and 10% (w/w) of 1,2-propanediol as ready to use mixture (Euxyl^®^ 9010) and was obtained from Schülke & Mayr GmbH (Germany). Purified water was obtained from a PURELAB Flex 2 (ELGA LabWater & Veolia, Germany). All other analytical chemicals were of analytical grade and used as received. Methods ------- ### Production of nanosuspensions Rutin nanosuspensions \[[@R16]--[@R19]\] were produced by high-pressure homogenization (HPH) using an EmulsiFlex-C50 (Avestin, Germany). For this, bulk suspensions containing 5% (w/w) rutin and 1% (w/w) surfactant were prepared. The pre-dispersions were homogenized with a high-speed stirrer (D-27, Miccra GmbH, Germany) at 24,000 rpm for 5 min in continuous mode and were subsequently subjected to HPH (20 cycles at 1500 bar). During homogenization and between each cycle the suspensions were cooled to below 10 °C by using a cooling bath to avoid heating of the suspensions and subsequent agglomeration of the crystals \[[@R29]\]. ### Characterization of nanosuspensions **Determination of particle size and physical stability:** Nanosuspensions were characterized regarding size by three different and independent methods. The hydrodynamic diameter and the polydispersity (*z*-average (*z*-ave) and PdI) were analysed by dynamic light scattering (DLS) with a Zetasizer Nano ZS (Malvern Panalytical GmbH, Germany). As DLS measurements, when used as stand-alone method for the characterization of submicron-sized particles, can be misleading because larger sized particles are not detected \[[@R30]--[@R33]\], light microscopy (Olympus BX53, equipped with an Olympus SC50 CMOS color camera, Japan) and laser diffraction (LD) were used as additional techniques to securely detect possible larger particles and agglomerates within the suspensions. By LD analysis the volumetric median diameters *d*(*v*)0.1, *d*(*v*)0.5, *d*(*v*)0.9, *d*(*v*)0.95 and *d*(*v*)0.99 were analysed with a Mastersizer 3000 (Malvern Panalytical GmbH, Germany). Particle diameters were calculated with Mie-theory by using 1.57 as real refractive index and 0.01 as imaginary refractive index. The zeta potential (ZP) of the nanocrystals was determined in water (adjusted to a constant conductivity of 50 µS/cm) and in original dispersion media, i.e., surfactant solution, containing either 1% (w/w) PLX 188 or Plantacare 2000, respectively. Measurements were performed via laser-Doppler-anemometry (LDA) by using a Zetasizer Nano ZS (Malvern Panalytical GmbH, Germany), which determines the electrophoretic mobility (EM), which was then converted into the ZP by using the Helmholtz--Smoluchowski equation \[[@R21]\]. **Determination of antioxidant capacity:** The antioxidant capacity was assessed by calculating the IC~50~ value, which was determined by using the DPPH assay \[[@R34]\]. DPPH (1,1-diphenyl-2-picryl-hydrazyl, Sigma-Aldrich, Germany) is a free radical that can be reduced by antioxidants. Upon reduction the colour of the free radical changes and thus the amount of reduced DPPH can be accessed via UV--vis spectroscopy. For the determination of the IC~50~ values, 100 µL of the samples containing different concentrations of the nanocrystals (200, 100, 50, 25, 12.5, 6.25, 3.125 µg/mL) were added to 100 µL of a 0.3 mM methanolic solution of DPPH. After 30 min incubation time in the dark, the absorbance was measured by a UV--vis plate reader (Multiskan GO, Thermo scientific, Germany) at 517 nm. The inhibition activity (inhibition \[%\]) was calculated as ![](Beilstein_J_Nanotechnol-10-1902-i029.jpg) where *A* ~sample~ is the absorbance of the sample and *A* ~0~ is the absorbance of the control (DPPH solution). The resulting linear function of inhibition against concentration was used to calculate the IC~50~ value (µg/mL). The IC~50~ value represents the concentration needed to scavenge 50% of the free radical. Rutin, which was used in this study as model drug, is a well-known antioxidant. Hence, if chemical degradation of the active ingredient occurs, changes in the IC~50~ value during storage can be observed \[[@R35]\]. As methanol is a good solvent for rutin, the addition of the nanocrystals to the methanolic DPPH solution led to a complete dissolution of the rutin nanocrystals. Hence, all rutin remaining in the formulations was dissolved during the test and thus the DPPH assay was used as a surrogate for the determination of the chemical stability. **Determination of microbial quality:** To verify the biological stability, a simple agar plate test after Ph. Eur. 8 was used. The agar (Müller--Hinton agar, Sigma) was dispersed in water, autoclaved and directly poured into sterile petri dishes (60 mm in diameter) at 28, 60 and 90 days after preparation of the nanosuspensions and used immediately after cooling. Subsequently, 10 μL of the nanosuspension or a 1:100 dilution in water were distributed evenly over the entire surface by means of a cell spreader. For detection of existing bacteria, the agar plate containing the suspension or dilution was incubated for 24 h at 36 °C and 90% humidity. Fungal contamination was detected after 7 days at 25 °C storage by using undiluted nanosuspensions. For evaluation, the visible bacterial colonies were counted, or the presence of fungal growth was noted. With dense colonization, the number of colony forming units (CFU) was set to 10000 CFU/μL. [^1]: Phone: +49(0)6421 2825885
{ "pile_set_name": "PubMed Central" }
Graduation Day: Introverts Step Out Into the Real World Congratulations graduates. You've crossed the finish line of one phase of life and are setting up at the starting blocks of the next. In some ways, life after college may be easier for young introverts than college was. The party imperative begins fading as you and your peers start focusing on your next steps. Not that life after college is necessarily less fun (well, maybe sometimes...), but it might be easier to indulge in your own style of fun when you are not mired in an all-peers environment. . (Caveat: I didn't attend college until I was in my 40s, so I might not know what I'm talking about. In which case, never mind...) Once you leave college behind, you will never again have to pretend you think a party isn't a party without a beer bong, that the library is for losers, or that a hookup is better than an evening of compelling conversation. Life is different outside college, and so I would like to provide some words of advice and encouragement to all you introverts clutching diplomas and stepping bravely out into tomorrow. While it may be true that some careers are better suited to an introverted personality than others, introversion is not a barrier to anything you truly want to do. Granted, I'd be pretty miserable as, say, a cruise director or tour-group leader. But if that kind of thing is your dream job, there's no reason why you can't do it, as long as you understand your own personal strengths and weaknesses and learn how to work with them or around them. No particular jobs are ideal for introverts, either. A laboratory can get lonely for an introvert with a tendency to isolate; writing is great, but still you have to sell yourself and promote your product; libraries aren't hushed anymore and require lots of interaction with the public. I don't suggest these jobs aren't good for introverts, just that there is no "perfect" job for an introvert-only a perfect job for you, as an individual. Not only that, but over time, you might find the perfect job is imperfect and decide to try something else. That's OK. Life is a journey. Being introverted is not a handicap in the job market but being shy can be. Knowing how to turn on your charm, how to look people in the eye and speak confidently, and how to toot your own horn with class are crucial to landing a job and to succeeding. If you didn't develop those skills in school, make that your summer assignment. One thing you can learn from extroverts, though: Knowing people helps. A healthy network, however you maintain it (online or off), can grease the wheels of success. Figure out who among your college friends you want to stay in touch with and make the effort-even if it means picking up the phone sometimes. At the same time, stay open to new people. And don't always let your friends choose you. Don't ever let anyone tell you that you have to be extroverted to succeed. All that's really necessary for success is a vision, a plan, confidence, and focus. And a lot of hard work. And sometimes some luck. Thank you for this post! In the past year, I graduated from law school and have also realized that I am an introvert. I love how you mention that there is no perfect job for an introvert. People often ask me how I can be introverted and practice law. Some aspects of the field can be difficult for an introvert, yet the bulk of the job involves analytical writing and prepared-for public speaking, which can actually suit an introvert. I find the interview chit-chat difficult. Being an introvert can be advantageous in the working world, and it is all about learning how to play up your strengths. I started a blog on accepting my introversion and one of my first posts was about finding a job after graduating: I'm a member of a Polish introvert forum, and every year after graduations there are some new members asking always the same question: "which job/study is the best for an introvert?". I always answer "the one, which you find enjoyable and interesting". It does not matter if you're intro or extra as long as you like what you do. And with the Internet keeping a net of contacts was never so easy. Wow you clearly just said all these things about how introverted people need certain qualities of an extrovert to succeed then at that last part try and make it seem like one can still succeed even though you didnt really name any qualities of an introvert that could actually help on the road to success. This may be slightly off topic, but I've found that being open about my shortcomings has really helped me in job interviews. Not that I think being introverted is a shortcoming, but I've been told people were pleasantly surprised by how calmly I speak about for instance having a hard time during meetings, because I need time to think about things before I speak. Anyway, my point is that sometimes you turn your 'weak' points into strong points. Also, it can surprise you to find out what you're good at, when you start working. I've always considered myself a shy person, but I've come to find that I'm actually really good at welcoming groups and hostmanship in general! I have a job that has traditionally belonged to extroverts and involved lots of facetime and telephone conversation. But I was able to adapt and use email most of the time and am as effective as anyone else. It also helps to have supervisors who are willing to let you try and do things differntly.
{ "pile_set_name": "Pile-CC" }
Rights group charges Syrian rebels with war crimes AP BEIRUT (AP) — Syrian villagers described watching rebels advance on their homes, as mortars thudded around them. By the end of the August attack, 190 civilians had been killed, including children, the elderly and the handicapped, a human rights group said Friday in its most detailed account of alleged war crimes committed by those fighting the Damascus regime. Human Rights Watch said the offensive against 14 pro-regime villages in the province of Latakia was planned and led by five Islamic extremist groups, including two linked to al-Qaeda. Other rebel groups, including those belonging to the Free Syrian Army, a Western-backed alliance, participated in the campaign, but there is no evidence linking them to war crimes, the 105-page report said. The new allegations are bound to heighten Western unease about those trying to topple Syrian President Bashar Assad and about who would take over if they were to succeed. "It creates justifiable alarm that the opposition has been infiltrated and undermined by radicals," said David L. Phillips, a former U.S. State Department adviser on the Middle East. The Free Syrian Army distanced itself from the five groups identified by HRW as the main perpetrators, saying it is not cooperating with extremists. "Anyone who commits such crimes will not belong to the revolution anymore," said spokesman Louay Mikdad. Human rights groups have said both sides in the civil war, now in its third year, have violated the rules of war, but U.N. investigators have said the scale and intensity of rebel abuses hasn't reached that of the regime. The new allegations come at a time when the regime appears to be regaining some international legitimacy because of its seeming cooperation with a program to destroy Syria's chemical weapons stockpile by mid-2014. Human Rights Watch researcher Lama Fakih said rebel abuses in the Aug. 4-18 Latakia offensive are the "most egregious and widespread" violations by opposition fighters her group has documented in Syria. "They certainly amount to war crimes" and may even rise to the level of crimes against humanity, said Fakih, who visited the area a month after the attack, with regime permission. The offensive targeted villages that are home to Alawites, or followers of an offshoot of Shiite Islam who form the backbone of Assad's regime. Alawites are considered heretics by Sunni Muslim extremists among the rebels. The rebels launched their attacks Aug. 4 at dawn, quickly seizing three regime military posts, Human Rights Watch said. Once those posts fell, no pro-government troops were left in the area and the rebels overran the villages, according to the report. "Witnesses described waking up to the sound of fighters coming into their villages, the sound of mortar and gunfire, and they frantically tried to leave," said Fakih, who interviewed more than three dozen villagers, medical staff and officials from both sides. Some couldn't run fast enough, witnesses said. One man from a hamlet near the village of Blouta told Human Rights Watch he escaped with his mother, while black-clad rebels were shooting at them from two directions. The man said he left his elderly father and 80-year-old blind aunt behind because of their disabilities. After regime forces retook the area, he said he returned home and found his father had been killed in his bed, and his aunt, Nassiba, in her room. Another man, Hassan Shebli from the village of Barouda, said he fled without his wife, who was unable to walk without crutches, and without their paralyzed 23-year-old son. When Shebli returned days later, he found his wife and son buried near the house and bullet holes and blood splattered in the bedroom, the New York-based group said. Human Rights Watch said it compiled a list of 190 civilians killed in the offensive, and that at least 67 of them were killed at close range or while trying to flee. There are signs that most of the others were also killed intentionally or indiscriminately, but more investigation is needed, the group said. The rebels also seized more than 200 civilians from the villages, most of them women and children, and demanded to trade the hostages for prisoners held by the regime, the group said. A rebel from Latakia, who goes by the name Mohammed Haffawi, denied rebels killed civilians in the area but said one of the rebel groups was holding about 100 women and children. The rebel groups that led the offensive were identified in the report as Jabhat al-Nusra and the Islamic State in Iraq and the Levant, both linked to al-Qaida; Ahrar al-Sham; Jaish al-Muhajireen wal-Ansar; and Suqqor al-Izz, which is believed to have many foreign fighters in its ranks, including from North Africa. Human Rights Watch urged Turkey, a rear base for many rebel groups and transit point for foreign fighters, to increase border patrols and to prosecute Turkey-based rebels linked to war crimes. The report appealed to Gulf states to crack down on private donations to extremist rebel groups, saying the Latakia campaign appeared to have been funded in part this way. The rights group said the Western-backed rebel alliance must cut ties with the five extremist groups. The military commander of that alliance, Gen. Salim Idris, visited Latakia province Aug. 11 and in public statements "indicated that he was coordinating with the other commanders in the operation and that his fighters were participating," Fakih said. Most of the abuses are believed to have taken place Aug. 4, and Fakih said there was no evidence fighters under Idris' command were involved. Still, future cooperation with extremist groups could make the FSA complicit in war crimes, she said. Mikdad, the FSA spokesman, said the al-Qaida-linked groups frequently attack FSA fighters and denied any cooperation between the two. He said Idris went to Latakia to visit the wounded and to assure Christian and Alawite residents of their safety. The spokesman said the rebel alliance condemns any abuses committed by opposition fighters, but that they cannot be compared to regime atrocities, including attacks on civilians with Scud missiles and chemical weapons. More than 100,000 Syrians have been killed in the conflict. Phillips said the regime is seizing on reports about rebel abuses to delegitimize the opposition. "It's very damaging to them," he said, referring to the Western-backed groups. "It opens another front in the public relations campaign." Fakih said that even though she visited the Latakia village with the government's permission, there was no attempt to interfere with her investigation.
{ "pile_set_name": "OpenWebText2" }
WikiLeaks founder Julian Assange welcomed President Obama’s decision to commute the prison sentence of Chelsea Manning on Thursday, but it is not clear whether he will agree to extradition to the US, as WikiLeaks previously said. "Ms. Manning is a hero, whose bravery should be applauded," Assange said in the statement released Tuesday. "Journalists, publishers, and their sources serve the public interest and promote democracy by distributing authentic information on key matters such as human rights abuses and illegal acts by government officials. They should not be prosecuted." In a tweet published last week, WikiLeaks said: “If Obama grants Manning clemency Assange will agree to US extradition despite clear unconstitutionality of DoJ case.” The organization posted a similar tweet in September 2016. If Obama grants Manning clemency Assange will agree to US extradition despite clear unconstitutionality of DoJ case https://t.co/MZU30SlfGK — WikiLeaks (@wikileaks) January 12, 2017 Assange, an Australian national, has been avoiding extradition to Sweden, where investigators have sought to question him in relation to sexual assault accusations. Assange has denied the accusations and believes that Sweden would extradite him to the US, where he could face charges related to WikiLeaks’ publication of classified material. Assange did not directly address WikiLeaks’ promise in the statement released Tuesday, saying only that “the Obama administration's war on whistleblowers and publishers, which has seen more prosecutions than all previous presidents combined, including against myself, my organization and my alleged sources, must come to an end." “Everything that he has said he's standing by." Melinda Taylor, one of Assange’s lawyers, told the Associated Press: “Everything that he has said he's standing by." She added, however, that it was still unclear whether American authorities have actually requested Assange’s extradition to the US. Emails and a phone call to Taylor seeking clarification went unanswered on Wednesday morning. Speaking on a call with reporters yesterday, a White House official said that Assange’s promise did not influence Obama’s decision on Manning, who was convicted in 2013 for leaking troves of classified military material to WikiLeaks. Obama’s decision was met with criticism from Republican leaders, with House Speaker Paul Ryan describing it as “outrageous.” “The president’s decision to offer commutation was not influenced by public comments by Mr Assange or the WikiLeaks organization,” The Guardian quoted the official as saying. “I have no insight into Mr Assange’s travel plans. I can’t speak to any charges or potential charges he may be facing from the justice department.”
{ "pile_set_name": "OpenWebText2" }
Q: Fetching results from a prepared select query I'm trying to create a basic log-in system. Username and password are entered into a form and the results are sent to this page. If I enter the correct details, it works fine, but if I try to log-in with nonsense it never displays the error message. The line seems to be skipped every single time. if(isset($_POST['submit'])) { $sql = "SELECT username,password FROM tbl_users WHERE username = ? AND password = ?"; $stmt = $mysqli->prepare($sql); if(!$stmt) { die("Prepare failed: (" . $mysqli->errno . ") " . $mysqli->error); } $username = $_POST['username']; $password = $_POST['password']; $bind_result = $stmt->bind_param("ss", $username, $password); if(!$bind_result) { echo "Binding failed: (" . $stmt->errno . ") " . $stmt->error; } $execute_result = $stmt->execute(); if(!$execute_result) { echo "Execute failed: (" . $stmt->errno . ") " . $stmt->error; } $stmt->bind_result($returned_username, $returned_password); while($stmt->fetch()) { if($_POST['username'] == $returned_username && $_POST['password'] == $returned_password) { echo "You are now logged in!"; } else { echo "Incorrect username or password"; } } echo $stmt->fetch(); include 'disconnect.php'; } A: this should work... $username = $_POST['username']; $password = $_POST['password']; $sql = "SELECT password FROM tbl_users where username = ?"; $stmt= $conn->prepare($sql); $result->bind_param('s',$username); $result->execute(); $result->bind_result($pass); $stmt->fetch() // echo "<pre>"; print_r($pass); if($pass == $password) { echo "You are now logged in! <br><br>"; } else{ echo 'Incorrect username or password<br>'; } comment if not working...
{ "pile_set_name": "StackExchange" }
/* Copyright 2005-2014 Intel Corporation. All Rights Reserved. This file is part of Threading Building Blocks. Threading Building Blocks is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License version 2 as published by the Free Software Foundation. Threading Building Blocks is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with Threading Building Blocks; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA As a special exception, you may use this file as part of a free software library without restriction. Specifically, if other files instantiate templates or use macros or inline functions from this file, or you compile this file and link it with other files to produce an executable, this file does not by itself cause the resulting executable to be covered by the GNU General Public License. This exception does not however invalidate any other reasons why the executable file might be covered by the GNU General Public License. */ { global: #define __TBB_SYMBOL( sym ) sym; #include "lin64ipf-tbb-export.lst" local: /* TBB symbols */ *3tbb*; *__TBB*; /* ITT symbols */ __itt_*; /* Intel Compiler (libirc) symbols */ __intel_*; _intel_*; ?0_memcopyA; ?0_memcopyDu; ?0_memcpyD; ?1__memcpy; ?1__memmove; ?1__serial_memmove; memcpy; memset; };
{ "pile_set_name": "Github" }
Acute theophylline toxicity and the use of esmolol to reverse cardiovascular instability. Theophylline overdoses are frequent conditions that may require emergency treatment. Clinical features common to severe theophylline toxicity include nausea and vomiting, tachydysrhythmias, metabolic disturbances, seizures, and cardiovascular collapse. Several reports have described these manifestations and their treatments. We report the case of a patient suffering from an acute, intentional theophylline overdose who exhibited the classic features of a toxic ingestion and describe the first reported use of IV esmolol in the treatment of accompanying cardiovascular manifestations.
{ "pile_set_name": "PubMed Abstracts" }
BY EGLE GERULAITYTE Lois Pryce, the legendary British motorcyclist and author of ‘Lois On the Loose’ and ‘Red Tape and White Knuckles’, is currently back in London getting ready for another adventure. She’s about to publish her third book, ‘Revolutionary Ride’, on her travels in
{ "pile_set_name": "Pile-CC" }
861 F.2d 725 Hansellv.McDonald** NO. 88-3290 United States Court of Appeals,Eleventh Circuit. OCT 14, 1988 1 Appeal From: M.D.Fla. 2 AFFIRMED. ** Local Rule: 36 case
{ "pile_set_name": "FreeLaw" }
Q: TDD basics - do I add or replace tests? I'm completely new to TDD and am working my way through this article. It's all very clear except for a basic thing that probably seems too obvious to mention: Having run the first test (module exists), what do I do with my code before running the next one? Do I keep it so the next test includes results from the first one? Do I delete the original code? Or do I comment it out and only leave the current test uncommented? Put another way, does my spec file end up as long list of tests which are run every time, or should it just contain the current test? A: Quoting the same article linked to in the question. Since I don’t have a failing test though, I won’t write any module code. The rule is: No module code until there’s a failing test. So what do I do? I write another test—which means thinking again. Spec will end up with list of tests which are run every time to check for regression errors for every additional feature. If adding a new feature breaks something that was added before then the previous tests will indicate by failing the test.
{ "pile_set_name": "StackExchange" }
Prestonwood Pregnancy Center Pregnant? We can help. Courage. In a moment of crisis it’s what we all seek. So, when the unexpected happens, you can expect to have one thing from Prestonwood Pregnancy Center. And that’s unwavering love and support, as well as the assurance of knowing we’re solutions-centered in everything we do. At Prestonwood Pregnancy Center, we’re committed to seeing you through. Because in everything we do, we’re centered on you. Blog Articles “Thank you for being so caring, helpful and supportive. You were there for me when no one else was.” — Client of PPC “As a first time mother who didn’t have insurance or have anywhere to go to get a sonogram or help, I was scared. I found this place and could not believe the pregnancy test and sonogram were free. They have a very supportive staff and classes to help prepare you mentally for the next months ahead.” — Ashley “This is an amazing place with caring staff who just care about the people who come in with no judgement.”
{ "pile_set_name": "Pile-CC" }
Collocational restriction Collocational restriction is a linguistic term used in morphology. The term refers to the fact that in certain two-word phrases the meaning of an individual word is restricted to that particular phrase (cf. idiom). For instance: the adjective dry can only mean 'not sweet' in combination with the noun wine. A more illustrative example is the one given below: white wine white coffee white noise white man All four instances of white can be said to be idiomatic because in combination with certain nouns the meaning of white changes. In none of the examples does white have its commonest meaning. Instead, in the examples above it means 'yellowish', 'brownish', 'containing many frequencies with about equal amplitude', and 'pinkish' or 'pale brown', respectively. Bibliography Crystal, D. (2003), A Dictionary of Linguistics and Phonetics, Blackwell, Oxford. See also Collocation Category:Linguistic morphology
{ "pile_set_name": "Wikipedia (en)" }
Can you tell me if i can fly southwest to and from dallas? If I can what would this cost me? Brad
{ "pile_set_name": "Enron Emails" }
Q: How to change this.state status during authentication? Firebase + React-Router I use react-router and Firebase for authentication. For this function onButtonClick from file SignIn must change state in App.js for true. How to do this? Maybe there are some other ways except my idea? App.js : import React, { Component } from 'react'; import { BrowserRouter as Router, Route, Switch, Redirect } from 'react-router-dom'; .... import firebase from './firebase/firebase.js'; class App extends Component { state = { signedInStatus : false }; render(){ const PrivateRoute = ({ component: Component, ...rest }) => ( <Route {...rest} render={(props) => ( this.state.signedInStatus ? <Component {...props} /> : <Redirect to='/signIn' /> )} /> ) return( <div> <Header signedInStatus={this.state.signedInStatus} /> <Router> <Switch> <Route exact path="/" component={SignIn}/> <Route path="/signIn" component={SignIn}/> <Route path="/register" component={Register} /> <PrivateRoute path="/home" component={Home} /> </Switch> </Router> </div> ); } } export default App; Second file ensure work with inputing information for getting to user cabinet. SignIn.js : import... class SignIn extends Component { state = { email: '', password: '', }; onButtonClick = (event) =>{ event.preventDefault(); firebase.auth().signInWithEmailAndPassword(this.state.email, this.state.password) .then((user) => { this.props.history.push('/home') console.log("ok") /// here i want add something to change }) /// this.state.signedIn for true in App .catch((error) => { console.log(error); alert(error); }); } onChangeInputEmail = (event) => { this.setState({email: event.target.value}) }; onChangeInputPassword = (event) => { this.setState({password: event.target.value}) }; render(){ return ( ... ) }; export default withRouter(SignIn); A: you need to define a method to update state for App.js then you can pass props to components as following <Route path='/signIn' render={(props) => <SignIn {...props} changeSignedInStatus={this.changeSignedInStatus} />} />
{ "pile_set_name": "StackExchange" }
Obamacare: Still stupid after all these years There's something about Obamacare that really shines a light on the stupid. And by that I mean stupid politicians, stupid "experts," and even regular – but stupid - Americans. And in case you missed it, the last few weeks have presented us, and the presidential candidates, with more solid evidence of ACA-related stupidity than usual. Let's look at the top three contenders on the Obamacare Stupid Bowl '16: First, we now know that Obamacare enrollment has fallen short by 24 million people. The real number of enrolled Americans in ACA plans is 11.1 million. Making matters worse is the fact that a major chunk of the people not signing up are the younger and healthier Americans the ACA's architects were foolishly relying on to help absorb the costs from older and sicker enrollees. This is the continuing development that many call the "Obamacare Death Spiral." Second, so many Insurance companies are curtailing their participation in Obamacare exchanges that 31 percent of U.S. counties are likely to have just one insurance company option for health coverage by next year. That's what we call a monopoly. And in case you don't know how dangerous monopolies can be in health care, Google the words "Mylan" and "EpiPen" when you get a chance. Third, and getting back to the weak enrollment numbers, this summer we learned that one of the biggest reasons people are refusing to sign up for Obamacare is… they want to keep smoking. The higher surcharges and premiums for smokers are discouraging people, especially young people, from enrolling in ACA plans. And, it turns out that these higher costs aren't encouraging them to quit smoking either. Oh, and there's also still evidence that a decent percentage of people who do sign up for Obamacare who say they're not smokers are lying. This last one is a triple dose of stupid all on its own. The stupid response from our two leading presidential candidates has been predictable and constant. Donald Trump keeps promising to repeal Obamacare, but he offers no further specifics. This is stupid, especially for a candidate who's otherwise been pretty good at focusing on one single aspect of a policy he doesn't like and also making clear, (if questionable), promises about what he'd do to change them. Hillary Clinton is barely talking about Obamacare at all. "This summer we learned that one of the biggest reasons people are refusing to sign up for Obamacare is… they want to keep smoking." The ACA's continuing inability to attain even a 50 percent approval rating in the polls is likely the reason, along with an intense Clinton campaign fear of even appearing to criticize President Obama. But it's simply stupid for Clinton not to point out that Obamacare has failed to live up to some of its most crucial promises. Her unwillingness to do so leaves the door wide open for Trump to score major points on this issue if he ever hones his message on the ACA. All of these emerging issues are fruit of the same stupid source tree a lot of people saw from a mile away well before Obamacare went into effect in the first place. As many who worked in the health care industry tried to tell the politicians who wouldn't listen, we know that a lot of people just won't do the right thing for themselves when it comes to their health care. They won't eat right, they won't stop smoking, they won't exercise, they won't visit a doctor regularly, and they sure as heck aren't going to sign up for health insurance coverage unless they need it right away. In short, the ACA was set up to rely the most on the most tragically unreliable people in the country. Some of those people are rich, some of those people are poor. More of them are younger, but a decent number of them are over 30. Do they have a right not to sign up for government-mandated health insurance? Absolutely they do. But let's pretend we all agree that health care is a human right. If that is the case, then why should Americans who want their health care rights be held hostage by those who don't? So, what about all those poor and middle class people who couldn't get health insurance before Obamacare? Was it "stupid" to try to help them too? Of course not. Setting up a system that helps poor or even middle class people who want and need cheaper health insurance coverage wasn't stupid. But setting up a system that relied way too much on people who don't want and will not sign up for health insurance no matter what was epically stupid, and now we're all paying for it. And don't forget that it's not rich people, or even young and healthy people, who will suffer because of this stupidity. With reduced carrier options for coverage, which means a reduced number of doctors who will accept enrollee insurance plans, and rising costs, it's the people who can least afford to pay for their own coverage who are suffering and will suffer more as current trends continue. And before you yell "single payer!" remember that a completely government-administered health system would only exacerbate this problem as we wouldn't even be able to penalize those who don't sign up and won't otherwise take care of themselves. Single payer makes all of them the responsibility of the taxpayers forever. And the answer to a growing number of cases of crony capitalism and virtual monopolies in American health care won't be solved by folding them into the biggest and most powerful monopoly of them all: the U.S. government. A non-stupid alternative would be to keep the best part of Obamacare, which is the idea that you can have the freedom to shop online from a real number of competing choices of health plans. But that would require allowing insurers to cross state lines and that's still not allowed. It would also be great to offer more of those bare-boned major medical plans that used to be much more popular among the young and healthy. But the ACA basically banned them. With real competition and real affordability, at least the less stupid among the uninsured would finally sign up. There was a brief time in American politics when candidates could score points by promising to stand up for those who worked the hardest and were the most responsible with their finances, their families, and their personal health. The ACA and Trump and Clinton tell us that we now have, and are likely will continue to have, a national health insurance policy given to us by a government of the stupid, by the stupid, and for the stupid. Commentary by Jake Novak, a senior columnist for CNBC.com. Follow him on Twitter @jakejakeny. For more insight from CNBC contributors, follow @CNBCopinion on Twitter.
{ "pile_set_name": "Pile-CC" }
Quebec occultist Yacouba Fofana (a.k.a. Professor Alfoseny) did a pretty nifty magic trick for some clients: he made their money disappear. Any services he managed to conjure up in exchange were apparently invisible. Before he himself could perform a vanishing act, though, he was charged under Canada’s Criminal Code, with both fraud and — wait for it — witchcraft. People are shocked. In modern-day Canada, in the year 2014, you can actually be charged under an obscure provision of the Criminal Code with “pretending to practice witchcraft.” The law specifically targets Every one who fraudulently (a) pretends to exercise or to use any kind of witchcraft, sorcery, enchantment or conjuration, (b) undertakes, for a consideration, to tell fortunes, or (c) pretends from his skill in or knowledge of an occult or crafty science to discover where or in what manner anything that is supposed to have been stolen or lost may be found The charge is the equivalent of a misdemeanor with a maximum fine of $500 or a six-month jail term. That the law appears as part of a larger section on “Fraudulent Practices” has not been evident in headlines about the case, which trumpet “Fake medium faces sorcery charge… in Canada” and mislead readers to think that Canada actually has a provision to prosecute witches… just like in the Salem Witch Trials or Monty Python. I play it off like a joke, but in some parts of the world (such as Papua New Guinea, India, and parts of Africa) prosecution of witches is not a far-off piece of history, and it’s not something that targets fraudsters scamming the emotionally vulnerable. Rather, it’s based on genuine beliefs that witchcraft exists and is an offense that society’s deity expects to see punished. Headlines like the ones being posted about Fofana’s case take advantage of such injustices, which typically target vulnerable minority populations in the places where they occur, to muddy the waters in the name of clickbait. Let’s be clear: Canadian law enforcement is not exploiting a ridiculous and outdated law to charge Fofana. Nor are they expressing a sincerely-held belief that sorcery is real and worthy of punishment. Rather, they are charging Fofana with fraud using a section of the Criminal Code that specifically addresses charlatans who knowingly and intentionally defraud people through their supernatural claims. ReligiousTolerance.org notes that The law seems to be unevenly applied. Most newspapers contain advertisements by psychics; 900 lines are promoted on television; psychic fairs are periodically held in most large cities. One source estimates that there are in excess of 10,000 practicing psychics in Canada. Prosecutions are rare. And that’s why this story is really interesting. Have all these psychics demonstrated sufficient belief in their own abilities to avoid prosecution? What does “sufficient belief” look like, anyway? What about money-making schemes wrapped up in socially-sanctioned supernatural beliefs? After all, one reader’s fraudulent practice is another’s sacred cow. Exactly who gets to decide what gets prosecuted and what gets ignored? (via Doubtful News. Image via Shutterstock)
{ "pile_set_name": "OpenWebText2" }
[Transcription factor comr acts as a direct activator in the genetic program controlling spermatogenesis in D. melanogaster]. Cardiff University, Cardiff CF10 3AX, UK). In Drosophila melanogaster differentiation of the male germ cells is accompanied by chromatin rearrangement and activation of the specific genes. These processes are regulated by few transcription factors that belong to two classes, can and aly that form distinct functional complexes. Mechanisms of action of aly and can class transcription factors on gene expression and chromatin state remain unclear. To investigate this question we have built the whole genome binding profile of transcription factor Comr belonging to aly class using the tissue-specific DamID method. Resulting datawere correlated with gene expression in comr (aly class) and can (can class) mutant testes. It was shown that Comr is a direct activator for about 300 testis-specific genes. Furthermore a set of genes revealed decreased expression in comr mutants but did not bind Comr protein, suggesting the existence of secondary regulation. Indeed, among the Comr gene targets we found a gene coding an uncharacterized transcription factor that could be a secondary participant in the genetic pathway in spermatocytes. These date allowed us to advance a model of gene activation needed for male gametes differentiation in D. melanogaster.
{ "pile_set_name": "PubMed Abstracts" }
A positioning of a device is supported by various Global Navigation Satellite Systems (GNSS). These include for example the American Global Positioning System (GPS), the Russian Global Navigation Satellite System (GLONASS), the future European system Galileo, the Space Based Augmentation Systems (SBAS), the Japanese GPS augmentation Quasi-Zenith Satellite System (QZSS), the Locals Area Augmentation Systems (LAAS), and hybrid systems. A GNSS usually comprises a plurality of satellites that orbit the earth. The satellites are also referred to as space vehicles (SV). Each of the satellites transmits at least one carrier signal, which may be the same for all satellites. Each carrier signal may then be modulated by a different pseudo random noise (PRN) code, which spreads the signal in the spectrum. As a result, different channels are obtained for the transmission by different satellites. The code comprises a number of bits, which is repeated in cycles. The bits of the PRN code are referred to as chips and the time of a cycle is referred to as the epoch of the code. The carrier frequency of the signal is further modulated with navigation information at a bit rate that is significantly lower than the chip rate of the PRN code. The navigation information may comprise among other information a satellite identifier (SV ID), orbital parameters and time parameters. The satellite identifier indicates the satellite for which data in the navigation information can be applied. It may be for instance an ordinal number. The orbital parameters may include ephemeris parameters and almanac parameters. Ephemeris parameters describe short sections of the orbit of the respective satellite. They may comprise for example a parameter indicating the semi-major axis and the eccentricity of the ellipse along which the satellite currently travels. Based on the ephemeris parameters, an algorithm can estimate the position of the satellite for any time while the satellite is located in the described section of the orbit. The almanac parameters are similar, but coarser orbit parameters, which are valid for a longer time than the ephemeris parameters. It might be noted that in the case of almanac, all satellites send the almanac parameters for all satellites of the system, including an SV ID indicating to which the respective almanac parameters belong. The time parameters define clock models that relate the satellite time to the system time of the GNSS and the system time to the Coordinated Universal Time (UTC). Further, they include a time-of-ephemeris (TOE) parameter indicating the reference time for ephemeris, and a time-of-clock-model (TOC) parameter indicating the reference time for the clock model. In the case of GLONASS, the terms “immediate information” and “non-immediate information” are used instead of the terms “ephemeris” and “almanac”. It is to be understood that any reference in this document to “ephemeris” and “almanac” is used to denote all possible terms that may be used for the same kind of information, including GLONASS “immediate information” and “non-immediate information”. A GNSS receiver, of which position is to be determined, receives the signals transmitted by the currently available satellites, and it acquires and tracks the channels used by different satellites based on the different comprised PRN codes. Then, the receiver determines the time of transmission of the code transmitted by each satellite, usually based on data in the decoded navigation messages and on counts of epochs and chips of the PRN codes. The time of transmission and the measured time of arrival of a signal at the receiver allow determining the pseudorange between the satellite and the receiver. The term pseudorange denotes the geometric distance between the satellite and the receiver, which distance is biased by unknown satellite and receiver offsets from the GNSS time. In one possible solution scheme, the offset between the satellite and system clocks is assumed to be known and the problem reduces to solving a non-linear set of equations of four unknowns, namely three receiver position coordinates and the offset between the receiver and GNSS system clocks. Therefore, at least four measurements are required in order to be able to solve the set of equations. The outcome of the process is the receiver position. In some environments, a GNSS receiver may be able to acquire and track sufficient satellite signals for a positioning based on the PRN codes, but the quality of the signals may not be sufficiently high for decoding the navigation messages. This may be the case, for instance, in indoor environments. Further, the decoding of navigation messages requires a significant amount of processing power, which may be limited in a mobile GNSS receiver. If the GNSS receiver is included in a cellular terminal or attached as an accessory device to a cellular terminal, a cellular network may therefore be able to provide the cellular terminal via a cellular link with assistance data including parameters extracted from decoded navigation messages. Such a supported GNSS based positioning is referred to as assisted GNSS (AGNSS). The received information enables the GNSS receiver or the associated cellular terminal to obtain a position fix in a shorter time and in more challenging signal conditions. Assistance data is typically provided for each satellite that is visible to the GNSS receiver associated to the cellular terminal. The assistance data may comprise navigation model parameters, which usually include orbit parameters, TOE and TOC parameters and SV ID parameters. Moreover, an external service may provide long-term orbits, which are accurate substantially longer than the orbit models (ephemeris/almanac) in the SV broadcasts.
{ "pile_set_name": "USPTO Backgrounds" }
Alex Jones shows up to confront President Trump during his visit to Austin, Texas and is met by leftist demons who are against free speech. Trump Protesters Can’t Explain Why They Don’t Like The President Trump Protester Equates MAGA Hat To Swastika By the way, overhaul your body’s cellular engine with our fan-favorite DNA Force Plus! The Emergency Election Sale is now live! Get 30% to 60% off our most popular products today!
{ "pile_set_name": "OpenWebText2" }
Bitcoin Cash is meant for people all over EARTH. Most of those people don’t speak english. That’s why today we’re releasing wordLists so you can generate mnemonics in 8 different languages to help spread $BCH to people all over the planet. wordLists BITBOX.Mnemonic now has a wordLists method which returns an object w/ the following keys: { chinese_simplified : [], chinese_traditional : [], english : [], french : [], italian : [], japanese : [], korean : [], spanish : [] } Each of these keys contains an array w/ 2048 words in that language. 4 BITBOX.Mnemonic methods now accept that wordlist as their 2nd argument and will create and validate mnemonics in those languages. The methods which now accepts a wordslist argument are generate fromEntropy toEntropy validate Examples Chinese simplified BITBOX . Mnemonic . generate ( 128 , BITBOX . Mnemonic . wordLists (). chinese_simplified ); // 南 英 钉 油 冷 馏 扶 搬 特 规 波 顺 Chinese traditional BITBOX . Mnemonic . generate ( 128 , BITBOX . Mnemonic . wordLists (). chinese_traditional ); // 蒸 融 陣 默 甲 蓋 躺 靈 原 富 恆 份 French BITBOX . Mnemonic . generate ( 128 , BITBOX . Mnemonic . wordLists (). french ); // annonce ampleur sanglier peser acheter cultiver abroger embellir résoudre dialogue grappin lanterne Italian BITBOX . Mnemonic . generate ( 128 , BITBOX . Mnemonic . wordLists (). italian ); // raschiato comodo petalo lira ipotesi mondina scettro ritmico bacino abrasivo attrito eletto Japanese BITBOX . Mnemonic . generate ( 128 , BITBOX . Mnemonic . wordLists (). japanese ); // かいが こける つねづね けおりもの けむり せんろ しゃくほう けんみん あわせる ひつぎ みてい たいない Korean BITBOX . Mnemonic . generate ( 128 , BITBOX . Mnemonic . wordLists (). korean ); // 회색 제공 적성 만일 당장 확인 사람 화장 숫자 여군 대도시 하순 Spanish BITBOX . Mnemonic . generate ( 128 , BITBOX . Mnemonic . wordLists (). spanish ); // combate hundir trauma edad élite medio grave pie aduana donar pimienta bodega bitbox paper bitbox paper has also been updated to now accept a --language flag which can set the mnemonic to any of the 8 languages listed above. The default is English. BITBOX GUI BITBOX GUI has also been updated to generate mnemonics in all of the above languages. There is now a language selector on the configuration screen. Select the language that you’d like to use and restart your BITBOX. Chinese simplified Chinese traditional French Italian Japanese Korean Spanish Summary With wordLists it’s now easier than ever to generate mnemonics in languages other than english to help spread $BCH all over the EARTH. More info
{ "pile_set_name": "OpenWebText2" }
Q: How to sort json data in groovy in alphabetic order? I want to sort an json data which is like this def json = [] for ( int i=10;i>1;i--){ if (i==10 || i==9 ){ json << [ name:"xyz", id:i ] }else if (i==8 || i==7 ){ json << [ name:"abc", id:i ] } } // def jsondata = [success:true, rows:json] def jsondata = [success:true, rows:json.sort(false) { it.name }] print jsondata​ groovy.lang.MissingMethodException: No signature of method: java.util.ArrayList.sort() is applicable for argument types: (java.lang.Boolean, com.cs.AdminController$_closure15_closure83) values: [false, com.cs.controllers.AdminController$_closure15_closure83@3e020351] Possible solutions: sort(), sort(java.util.Comparator), sort(groovy.lang.Closure), wait(), size(), size() I want that data to be sorted alphabetic order ascending or descending above one is working in a groovy console but not in my program , do i need to add something else like lib ? A: Your output format seems to have no similarity to your code you posted Also, your code you posted cannot just be run by someone trying to answer this question. So this will be an educated guess... Try: def jsondata = [success:true, rows:json.sort(false) { it.name }, total:totalCount] If you're using groovy from way back in the day for some unknown reason, then just drop the false, but beware as this will mutate your json list... def jsondata = [success:true, rows:json.sort { it.name }, total:totalCount]
{ "pile_set_name": "StackExchange" }
No, the AED is used in conjunction with CPR (Cardio Pulmonary Resuscitation) so you will still need to carry out the cest compressions and mouth to mouth breaths. The AED machine will prompt and guide you during this process. Some AED models, such as the ones we use on our training courses, have both adult and paediatric chest pads, so for children between 1 and 8 years old, paediatric pads or a paediatric mode should be used if available; if not available then the standard AED pads should be used as normal.
{ "pile_set_name": "Pile-CC" }
Eula Biss Eula Biss (born circa 1977) is an American non-fiction writer. She won the Carl Sandburg Literary Award, the Rona Jaffe Foundation Writers' Award, the Graywolf Press Nonfiction Prize, the Pushcart Prize, and the National Book Critics Circle Award. She is a Guggenheim Fellow. She is an editor at Essay Press. Biography After earning a bachelor's degree in non-fiction writing from Hampshire College, Biss moved to Iowa City, where she went on to complete her MFA in the University of Iowa's Nonfiction Writing Program. Biss teaches at Northwestern University. An artist in residence at Northwestern, Biss is also the author of two books and the founder of Essay Press. Her second book, Notes from No Man's Land, won the Graywolf Press Nonfiction Prize. In March 2010, Notes from No Man's Land won the National Book Critics Circle Award in the criticism category. Her third book, On Immunity: An Inoculation, was one of the New York Times Book Review'''s 10 Best Books of 2014 and was a finalist for the 2014 National Book Critics Circle Award (Criticism). Biss lives in Evanston, Illinois. She is married to John Bresland, and they have a son, Juneau. Biss and Bresland are also in a band called STET Everything. WorksOn Immunity: An Inoculation, Graywolf Press, 2014, Notes from No Man's Land, Graywolf Press, 2009, The Balloonists, Hanging Loose Press, 2002, Interviews Radio Interview: Eula Biss discusses her book On Immunity, public health and anti-vaccination movements on The 7th Avenue Project radio show. Radio interview: Eula Biss is interviewed about race and "Whiteness" by host Krista Tippett on On Being Reviews References External links Author's website The "F-Word": Fragment and the Futility of Genre Classification: a Roundtable Discussion with Eula Bliss, Sarah Manguso, Maggie Nelson, and Allie Rowbottom in Gulf Coast: A Journal of Literature and Fine Arts'' (25.1) Book TV: Eula Biss "Notes From No Man's Land" Category:American non-fiction writers Category:Living people Category:Guggenheim Fellows Category:Hampshire College alumni Category:University of Iowa alumni Category:Northwestern University faculty Category:Rona Jaffe Foundation Writers' Award winners Category:21st-century American women writers Category:21st-century American essayists Category:Year of birth uncertain Category:American women non-fiction writers Category:Year of birth missing (living people)
{ "pile_set_name": "Wikipedia (en)" }
Aquatic Activities During Pregnancy Prevent Excessive Maternal Weight Gain and Preserve Birth Weight: A Randomized Clinical Trial. The aim of the present study was to examine the influence of a supervised and regular program of aquatic activities throughout gestation on maternal weight gain and birth weight. A randomized clinical trial. Instituto de Obstetricia, Ginecología y Fertilidad Ghisoni (Buenos Aires, Argentina). One hundred eleven pregnant women were analyzed (31.6 ± 3.8 years). All women had uncomplicated and singleton pregnancies; 49 were allocated to the exercise group (EG) and 62 to the control group (CG). The intervention program consisted of 3 weekly sessions of aerobic and resistance aquatic activities from weeks 10 to 12 until weeks 38 to 39 of gestation. Maternal weight gain, birth weight, and other maternal and fetal outcomes were obtained by hospital records. Student unpaired t test and χ2 test were used; P values ≤.05 indicated statistical significance. Cohen's d was used to determinate the effect size. There was a higher percentage of women with excessive maternal weight gain in the CG (45.2%; n = 28) than in the EG (24.5%; n = 12; odds ratio = 0.39; 95% confidence interval: 0.17-0.89; P = .02). Birth weight and other pregnancy outcomes showed no differences between groups. Three weekly sessions of water activities throughout pregnancy prevents excessive maternal weight gain and preserves birth weight. The clinicaltrial.gov identifier: NCT 02602106.
{ "pile_set_name": "PubMed Abstracts" }
Singapore — Midas Protocol, an emerging blockchain solutions company announces that it will offer a token sale to create an intelligent tool for everyone to manage, invest, trade, exchange and spend crypto-assets. As a decentralized platform built on blockchain technology, token sale funds will be used to develop its products and drive the company’s aim to increase wealth through smart crypto investment and portfolio management. Midas Protocol aims to be the smartest universal wallet for all essential crypto needs, from safekeeping, intelligent trading, portfolio management, easy conversion to fiat and spending of cryptocurrencies. Zcoin was the first cryptocurrency to implement the Zerocoin protocol, one of the world’s leading private cryptocurrency protocols and among the most significant academic developments in Bitcoin research. The Zerocoin Protocol uses zero-knowledge proofs with cryptographic accumulators to provide financial privacy. Zcoin also focuses on decentralization technologies and will be the first to implement MTP, a new breed of ASIC resistant mining algorithm to ensure fair distribution of its coins. The partnership between Midas Protocol and Zcoin will encompass: Cross marketing and cross promotion, Collaboration in community building in ASEAN region (Vietnam, Singapore, Thailand, Malaysia, Indonesia), Priority integration into Midas platform and placement, Market outreach, Staking Znodes on Midas platform and any possible future joint-development. “Midas Protocol’s goals to provide an all in one platform from safeguarding your funds, conversion of cryptocurrencies to fiat and portfolio management make it a holistic platform that is traditionally served by separate services. We are hopeful that Midas’s efforts will simplify the previously daunting task of using and investing in cryptocurrencies for the mainstream market. Zcoin is happy to be partnered with Midas and to be one of the first cryptocurrencies to be on their platform once launched and to collaborate in building the cryptocurrency ecosystem in the region.” - Poramin Insom, Founder of Zcoin commented. “Zcoin has one of the most capable privacy and security research teams. The collaboration with Zcoin will help strengthening our research on security, offering Zcoin in our Midas Wallet for clients that require more privacy transaction will give to Midas Ecosystem a competitive advantage. We are so looking forward to strengthening the global adoption for both Zcoin and Midas” - Dr. David Nguyen Vu, Chairman and CFO of Midas Protocol commented. Visit our social channels for latest update and discussion on Midas Ecosystem: Telegram: t.me/midasprotocolglobal Reddit: reddit.com/r/MidasProtocolOfficial Bitcointalk: bitcointalk.org/index.php?topic=3718145.0 Blogs: blog.midasprotocol.io ; medium.com/midasprotocol
{ "pile_set_name": "OpenWebText2" }
Ghada stressed that rumors of her disappearance have no basis and she is currently in Egypt, working on new television drama “Ma Sibiq Al Israr” (With Prior Insistency). She stars alongside actors Majid Al Masri and Abeer Sabri. Ghada told reporters she would never leave her country over such a petty matter as politics.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention The present invention relates to cellular communication systems, and more particularly, to a method and apparatus for the routing of auxiliary communication services, such as voice mail, within such a system. 2. History of the Prior Art Broadly speaking, the present invention involves an interrelationship between two telephone technologies, namely, cellular radio telephony and voice mail systems. The general state of the art of each of these technologies is discussed briefly below. Cellular radio communications is, perhaps, the fastest growing field in the world-wide telecommunications industry. Although cellular radio communication systems comprise only a small fraction of the telecommunications systems presently in operation, it is widely believed that this fraction will steadily increase and will represent a major portion of the entire telecommunications market in the not too distant future. This belief is grounded in the inherent limitations of conventional telephone communications networks which rely primarily on wire technology to connect subscribers within the network. A standard household or office telephone, for example, is connected to a wall outlet, or phone jack, by a telephone cord of a certain maximum length Similarly, wires connect the telephone outlet with a local switching office of the telephone company. A telephone user's movement is thus restricted not only by the length of the telephone cord, but also by the availability of an operative telephone outlet, i.e. an outlet which has been connected with the local switching office. Indeed, the genesis of cellular radio systems can be attributed, in large part, to the desire to overcome these restrictions and to afford the telephone user the freedom to move about or to travel away from his home or office without sacrificing his ability to communicate effectively with others. In a typical cellular radio system, the user, or the user s vehicle, carries a relatively small, wireless device which communicates with a base station and connects the user to a mobile switching center or exchange. The exchange facilitates communications between the user, other mobile stations in the system and landline parties in the public switched telephone network ("PSTN"). The interconnection of mobile telephone users ("mobile subscribers") with the PSTN requires that each mobile subscriber in the system be made available to anyone who has a telephone, whether fixed or mobile. Hence, the problem of locating a mobile subscriber moving from one area to another (a "roaming subscriber") within a wide geographic area has become of primary importance. A known solution to this problem is based on the concept of mobile registration. Mobile registration is the process by which a mobile telephone unit becomes listed as being present in the service area of one of the mobile exchanges in a mobile telephone service network. In accordance with one early solution to the problem of locating roaming mobiles, as each mobile telephone unit enters a new area within the network, it transmits a unique identity signal which is detected by the mobile exchange associated with that area. This exchange records an indication of the presence of the mobile subscriber in its memory and then informs all of the other exchanges of the presence of the mobile within its coverage area at that particular moment. When the mobile subscriber crosses over into another area, the exchange associated with that area, upon receiving an identity signal from the mobile telephone unit, will record an indication of the mobile subscriber's presence there and then transmit the identity to all of the other exchanges together with its own identity signal, for the purpose of updating the mobile subscriber's position. In other known solutions, a mobile subscriber s identity and position messages are sent by each exchange, whose respective areas are crossed by such mobile subscriber, to a specific center. Any exchange in the mobile network which contacts this center may receive all the information necessary for locating and making a connection to the mobile subscriber. This solution eliminates the need to advise one or more of the other mobile exchanges each time a mobile subscriber enters a new area without making or receiving a call there and thereby reduces the amount of mobile subscriber location data that must be processed by each of the mobile exchanges within the network. In some systems, the aforementioned center may be a common national center such as that used in the mobile telephone location system disclosed in U.S. Pat. No. 4,700,374 issued to Bini. In other systems, the center may be the exchange to which a mobile subscriber is assigned ("home exchange") or it may be a home location register ("HLR") which stores the location information of mobile subscribers. In such other systems, the mobile subscriber may preregister in an area other than the normal service and billing area ("home area") for service to be provided in the other area ("visited area") by the exchange associated with the visited area ("visited exchange"). When a roaming subscriber arrives in the visited area, the mobile subscriber is qualified to make telephone calls from there and calls which are received in the mobile subscriber's home area are forwarded to the visited area for transmission to the mobile subscriber. Qualification of a mobile subscriber in a visited area may be automatically performed when the roaming subscriber appears in the visited area and the mobile station is switched on, e.g. when the user initiates a first telephone call. The roaming mobile subscriber automatically transmits its identification number to the visited exchange and requests roamer service. If the roaming subscriber is a visitor from a cooperating exchange, the visited exchange provides service to the roaming subscriber by allocating a temporary roamer number to it. The visited exchange also notifies the roaming subscriber's home exchange of the roaming subscriber s location in the coverage area of the visited exchange. The roaming subscriber s identification number is then entered into a list of roamers so that incoming calls to the home exchange of the roaming subscriber are forwarded to the visited exchange where the roaming subscriber is then located. With this overview of cellular radio technology in mind, the other parent technology of the present invention, i.e., the rendition of auxiliary communication services such as voice mail, fax mail, video mail, teletex or other services will now be briefly discussed. While it should be understood that the invention contemplates the routing of various auxiliary communication services within a cellular network, the most presently common of such services, voice mail, will be used hereinafter as exemplary of the principles of the present invention. Voice mail, as is commonly understood in the art, refers to an automatic answering and message storing and forwarding system which allows a caller to leave a stored message for a specific telephone extension or to forward a message to an intended recipient. The voice mail system in essence, offers two distinct features: call answering and message forwarding. The call answering feature is typically invoked when a caller directly dials a telephone number or requests to be connected to a specific extension which is found to be busy, inoperative, nonanswering, etc. The unavailability of the called party results in the telephone call being redirected to the voice mail system call answering feature. At this juncture the call is routed to a voice mail receiving station and the caller is greeted by a prerecorded announcement message or a live telephone operator and prompted to leave a message which is stored in a "voice mailbox" assigned to the called party. While the call answering feature of a voice mail system is geared to the convenience of the message recipient, the message forwarding feature is geared towards aiding the message originator. The message forwarding feature may be involved, for example, when a message originator calls the voice mail system by dialing an access code using a telephone station set touch-tone pad. The message originator designates one or more message recipients, who are also served by the telephone switching system, by dialing their station or directory numbers, and then dictates a voice message for delivery by the voice mail system to the designated message recipients. The voice mail system records the dialed directory numbers and places the message in the voice mailbox assigned to each of the designated message recipients. Each of the message recipients may then access the voice mail system to listen to the message, save the message for subsequent action, delete it, append comments and route the message to other message recipients, or reply and return a message to the message originator. Several voice mail systems are commercially available. While such systems vary in features and capacity, all share, as a common core of functions, the ability to store messages for later retrieval by system users. Each user is assigned a voice mailbox and may retrieve his messages by accessing the system and then identifying his voice mailbox. In general, anyone having knowledge of the telephone numbers for the system, may leave messages, but only users having a voice mailbox may retrieve messages. To retrieve messages a user of a typical voice mail system accesses the system over the telephone lines and, after identifying himself by mailbox number, and possibly a password, hears a recorded message produced by the system advising him of the status of his mailbox, e.g., number of messages waiting, etc. The user may then listen to brief prerecorded portions of each message, commonly referred to as "headers" which further describe the message, for example, by identifying the originator. The user may then decide whether or not to listen to each message. The desirability of providing voice mail services to mobile radiotelephone system subscribers has not been lost on cellular system operators. The economic incentives for incorporating a voice mail system into a cellular radio network are, at least, twofold. First, the cellular operator can charge each participating mobile subscriber a monthly fee for voice mail services. Second, the ability of a mobile subscriber to retrieve messages left in his absence increases the likelihood that the mobile subscriber will, after listening to a particular message, call the message originator and thereby generate additional revenues for the cellular system operator. The use of voice mail systems in cellular radio networks has developed in line with the growth of cellular radio communications generally. Initially, a single mobile switching center in each of several large metropolitan cities provided communications services to mobile subscribers in the local area. The national cellular radio landscape, at this stage of development, consisted of dispersed pockets or islands of cellular radio networks with little or no roaming therebetween. Where desired, a voice mail system was connected to the mobile switching center which handled all the incoming and outgoing calls to and from the mobile subscribers in the local area. The voice mail equipment could be located in, or within a short distance from, the mobile switching center facilities. As each of the local cellular radio networks expanded, one or more mobile switching centers were, of necessity, added to the local area. Provision of voice mail services to all of the mobile subscribers in the local area required either the connection of a voice mail system to each of the mobile switching centers or, alternatively, the sharing of a common voice mail system among the mobile switching centers. In the former instance, voice mail equipment was located in, or within a short distance from, each of the mobile switching centers while, in the latter instance, the voice mail equipment was centralized and dedicated trunks were used to connect the voice mail system to each of the mobile switching centers. Since the network coverage area rarely extended beyond the limits of a metropolitan area, the use of dedicated trunks did not pose any special problems. However, with the advent of roaming service for mobile subscribers travelling between cities served by cooperating exchanges, the cost inefficiencies inherent in the traditional designs of cellular voice mail systems became pronounced. To illustrate, suppose that a mobile subscriber assigned to a mobile exchange (home exchange) in Los Angeles travels to San Francisco and is qualified to receive calls there, e.g., is registered in an exchange (visited exchange) in San Francisco. Suppose, further, that a call is placed to the mobile subscriber and received at the home exchange in Los Angeles. The home exchange determines from its data records, or from the data records of the HLR of the mobile, that the mobile subscriber has roamed and, therefore, routes the call to San Francisco. The visited exchange receives the call and pages the roaming subscriber who does not return a page response became, for example, he has turned off the mobile telephone. At this point, the call is either terminated or, if the roaming subscriber has voice mail service, the call is transferred back to the roaming subscriber's mailbox in Los Angeles. As may be seen from this illustration, two long distance links or the equivalent of two toll calls, e.g., Los Angeles to San Francisco and San Francisco to Los Angeles, were necessary in order to connect the caller with the voice mail box of the roaming subscriber. This result is known in the art as the "trombone effect." Mobile subscribers are loathe to pay for the double charges incurred because of the trombone effect only to hear a voice mail message, for example, that the caller will call back later. Hence, a mechanism for countering the trombone effect is needed and, as discussed more fully below, is provided by the present invention. One technique for avoiding these disadvantages is the use of roamer port access for a roaming cellular subscriber in which a local number in the visited city is dialed to gain access to the cellular network there and enable the dialing of the mobile subscriber directly. However, the disadvantage of this procedure is that it requires the calling party to know precisely in which city the roaming mobile subscriber is currently roaming. Another shortcoming of existing cellular voice mail systems relates to the interface between the mobile switching centers, on the one hand, and the voice mail equipment on the other. Typically, the voice mailboxes of mobile subscribers are connected to their home exchange, not via the PSTN, but through dedicated trunks, and are accessed by dedicated numbers rather than PSTN-recognized telephone numbers. This is primarily for reasons of economy, including the savings on the lease of telephone numbers from the local phone company. Specifically, instead of leasing two telephone numbers from the phone company, one for the mobile subscriber and another for his voice mailbox, only the mobile subscriber number is leased and a dedicated number is used for his voice mailbox. To illustrate the operation of the typical voice mail interface, assume that a call is placed to a mobile subscriber and received at his home exchange. Assume, further, that the mobile subscriber is unavailable and that the call is directly routed to his voice mailbox which is often in the same building as the home exchange. It is common practice to define a dedicated voice mail number which consists of the mobile subscriber number and a prefix such as "*99." Thus, if the dialed mobile subscriber number is 876-5432, for example, the dedicated voice mail number will be *99/876-5432. The voice mailbox of the mobile subscriber can then be accessed by the home exchange simply by using the designation *99/876-5432. Returning to the case of the mobile subscriber who roams from Los Angeles to San Francisco, and assuming that the mobile subscriber has voice mail service, the call will have to be routed from San Francisco back to Lee Angeles where the voice mailbox of the mobile subscriber is located. However, because, as discussed above, his voice mailbox number is a non-PSTN-recognized number, such as *99/876-5432, PSTN facilities cannot be used to transfer the call. It is possible, of course, to use dedicated trunks between Los Angeles and San Francisco and route the call therethrough, but the cost in this case would be prohibitive. Further, it may also be illegal for a cellular operator which is not duly licensed as a long distance carrier to transfer the call in this manner. Some systems have attempted to solve the problems highlighted in the above illustrative Los Angeles-San Francisco scenario by adopting a protocol whereby calls are always setup through the home exchange and, instead of assigning the task of detecting that the roaming subscriber has not answered to the visited exchange, a timer is activated in the home exchange upon call set up and, if the roaming subscriber does not answer within a predetermined length of time, the home exchange will route the call to the voice mailbox assigned to the roaming subscriber. As explained below, however, this solution may be implemented only in a mobile switching center ("MSC") environment, but not efficiently in a home location register ("HLR") environment. Most cellular radio networks today operate in an MSC environment wherein location and service profile data for each mobile subscriber are stored in his home exchange and updated from time to time as required. By contrast, in an HLR environment, location and service profile data are recorded and updated in the home HLR which is connected, and may serve the mobile subscribers assigned, to several exchanges. Unlike an exchange, however, an HLR has no voice transmission, reception or switching facilities, but is essentially a database from and to which information can be read and written. Possible reasons for a shift from an MSC environment to an HLR environment include limitations in the capacity of an exchange and optimization of administrative procedures for handling calls. For example, while only 64,000 mobile subscribers may be connected to a typical exchange at one time, an HLR may have the capacity to serve over 500,000 mobile subscribers. Implementation of an HLR environment in cellular radio networks, either exclusively or in conjunction with an MSC environment, is expected to become widespread in the future. However, integrating a voice mail system in an HLR environment poses certain difficulties which do not arise in an MSC environment. In particular, because the HLR has no voice facilities, the voice mail equipment cannot be directly connected to the HLR. One solution to these difficulties is to connect the voice mail equipment to one exchange in the cellular network dedicated as a "pseudo-home" exchange and route all calls through the pseudo-home exchange. However, as will be readily understood by person skilled in the art, this solution breeds an inefficient and inflexible network. As discussed more fully below, the present invention provides for efficient delivery of calls to the voice mailboxes of mobile subscribers operating in both an MSC and an HLR environment.
{ "pile_set_name": "USPTO Backgrounds" }
Tarwater Tarwater Spider Smile Tarwater: Spider Smile Spider Smile It's the sound, not the song. At least at the beginning. Bernd Jestram and Ronald Lippok sit in their recording studio located in the heart of their city and turn the knobs, press the buttons, shift the regulators. Until they find a sound, until a sound finds its way to them. A rhythm, a melody, a noise. "Then, we slowly write the song afterwards." For "spider smile" Tarwater have found astonishing decided pop songs - as indicated already by their debut on morr music "the needle is travelling", released in 2005. They, the electro duo, each of them with his roots in East-Berlin's sub culture and avant-garde. Their songs being full of allusions and references shall encourage the listener to link his/her own stories with the ones by Tarwater. For instance, the sun that rises and sets again and again in "arkestra" shines for everyone at another place. The song "arkestra", by the way, originates from a joint bus trip with members of "Sun Ra Arkestra" through the hilly landscape of Scotland. Another one of these stories that one doesn't have to know. But that still reveals much of the record telling a lot of places and spaces. America - or rather a lot of different ideas of what America is like - is its essential motif. It is the song "shirley temple" that marks the beginning, a clouded electro-overture. The recording studio still is Bernd Jestram's and Ronald Lippok's favourite instrument. Nonetheless, for "spider smile" a number of analogue instruments landed up in front of the microphones. A harmonica, for example. And with it the blues. It changes in Tarwater's "witchpark" into a dark dub-landscape. Marchy woods, alligators. Guitars send several songs on their way - like the all pushing "world of things to touch". Violines are plucked distinctly in other songs and moods, an oboe spreads melancholy patina ("roderick usher"). Later, there is the playing with repetition and modification, song- and soundwriting from the spirit of modulation - a central motif within the music of Tarwater ("when love was the law in los angeles"). Or, the album's only cover version: "sweethome under white clouds" of Virgin Prunes" that took its way through an echo-chamber. "Home is where the heart is", a line like an incantation. At the same time this resume sums up the entire album very well.
{ "pile_set_name": "Pile-CC" }
One study showed people who swear have a larger vocabulary than others You might have been told swearing shows a lack of intelligence or a limited vocabulary. But experts have revealed this is not the case, and the use of profanity can in fact be a sign of a smart person. Studies have shown those with foul mouths are more articulate and have a larger vocabulary than their peers. Scroll down for video There is no doubt it can be incredibly offensive to some, but whether swearing is good or bad for us is still up for discussion in the scientific community. Now experts explain the science of profanity, revealing the evidence behind its positive and negative effects. Stock image IS SWEARING A SIGN OF A GOOD VOCABULARY? Research in 2014 revealed people who frequently swear are more likely to have a bigger vocabulary than their clean-tongued peers. A colourful tongue does not mean the talker is lazy or uneducated, the study published in the Language Sciences journal found. Instead, those who are more confident using taboo words are more articulate in other areas. Kristin and Timothy Jay, the US-based psychologists who co-wrote the study, said it proved swearing was positively correlated with verbal fluency. 'We cannot help but judge others on the basis of their speech,' they wrote. 'Unfortunately, when it comes to taboo language, it is a common assumption that people who swear frequently are lazy, do not have an adequate vocabulary, lack education, or simply cannot control themselves.' Advertisement Benjamin Bergen, Professor of cognitive sciences at UC San Diego, says we have many misconceptions about using foul language. Professor Bergen is author of a book called 'What the F: What Swearing Reveals About Our Language, Our Brains, and Ourselves.' 'It turns out that there are amazing things you can find out about how the mind works, how the brain works, people's human sociality just by looking at profanity,' he told CBS. Swearing could be linked to higher intelligence and a bigger vocabulary. Research in 2014 revealed people who frequently swear are more likely to have a bigger vocabulary than their clean-tongued peers. A colourful tongue does not mean the talker is lazy or uneducated, the study published in the Language Sciences journal found. Instead, those who are more confident using taboo words are more articulate in other areas. The experiment asked participants to say as many swear words as they could think of in 60 seconds. They were then asked to do the same with animals. Those who knew the most swear words were more likely to name the most animals as well, the research found. Kristin and Timothy Jay, the US-based psychologists who co-wrote the study, said it proved swearing was positively correlated with verbal fluency. The average profile of a swearer is often sophisticated, like that of the swear-word loving spin doctor Malcolm Tucker (played by Peter Capaldi) in TV political satire The Thick of It TURNING THE NET BLUE: TOP 10 UK SWEAR WORDS ON FACEBOOK 1. F*** 2. S*** 3. Bloody 4. P*** 5. B**** 6. Crap 7. C*** 8. C*** 9. Damn 10. D*** Source: Slate Advertisement They added that those who used taboo words were able to make nuanced distinctions and could use language expressively. 'We cannot help but judge others on the basis of their speech,' they wrote. 'Unfortunately, when it comes to taboo language, it is a common assumption that people who swear frequently are lazy, do not have an adequate vocabulary, lack education, or simply cannot control themselves.' In their conclusion, they added: 'The overall finding of this set of studies, that taboo fluency is positively correlated with other measures of verbal fluency, undermines the [normal] view of swearing. 'Speakers who use taboo words understand their general expressive content as well as nuanced distinctions that must be drawn to use slurs appropriately. 'The ability to make nuanced distinctions indicates the presence of more rather than less linguistic knowledge.' Forty-nine participants aged between 18 and 22 were used in the experiment. 'There's this idea that swearing might be cathartic' Professor Benjamin Bergen, from UC San Diego, told CBS. But according to Professor Bergen, swearing makes people no less aggressive. Another group of researchers has claimed swearing is a harmless emotional release which could make you feel stronger - though only in moderation. In an experiment, participants were made to play aggressive computer games and could recall a wider variety of swear words after their session, as well as turning the air blue much more often. A colourful tongue does not mean the talker is lazy or uneducated, a study published last year in the Language Sciences journal found. Instead, those who are more confident using taboo words are more articulate in other areas Rather than just proving we swear more when we are angry, the psychologists insisted, the study showed profanity can be an emotional coping mechanism which makes us feel more resilient. The group presented the findings of their study to the British Psychological Society's annual conference. In the video game study, they said, participants were asked to recall as many profanities as they could before and after playing. Senior lecturer Dr Richard Stephens said: 'The video games made people feel more aggressive so their language became more emotional and they swore. This explains swearing and makes it more acceptable.
{ "pile_set_name": "OpenWebText2" }
Central nervous system disease in a child with primary Sjögren syndrome. A 9-year-old girl had hemiparesis, and a diagnosis of primary Sjögren syndrome was made. The neurologic dysfunction was multifocal, involving both the brain and spinal cord, and was recurrent; the findings mimicked multiple sclerosis. Corticosteroid treatment during episodes of acute neurologic dysfunction appeared to be beneficial.
{ "pile_set_name": "PubMed Abstracts" }
/* * Copyright 2019, GeoSolutions Sas. * All rights reserved. * * This source code is licensed under the BSD-style license found in the * LICENSE file in the root directory of this source tree. */ import expect from 'expect'; import React from 'react'; import ReactDOM from 'react-dom'; import GeoStoryEditor from '../GeoStoryEditor'; import { getPluginForTest } from './pluginsTestUtils'; import { createStateMocker } from '../../reducers/__tests__/reducersTestUtils'; import geostory from '../../reducers/geostory'; import { setEditing } from '../../actions/geostory'; describe('GeoStoryEditor Plugin', () => { const stateMocker = createStateMocker({geostory}); beforeEach((done) => { document.body.innerHTML = '<div id="container"></div>'; setTimeout(done); }); afterEach((done) => { ReactDOM.unmountComponentAtNode(document.getElementById("container")); document.body.innerHTML = ''; setTimeout(done); }); it('Shows GeoStoryEditor plugin hidden in view mode', () => { const { Plugin } = getPluginForTest(GeoStoryEditor, stateMocker(setEditing(false))); ReactDOM.render(<Plugin />, document.getElementById("container")); expect(document.getElementsByClassName('ms-geostory-editor').length).toBe(0); }); it('Hide GeoStoryEditor plugin visible in edit mode', () => { const { Plugin } = getPluginForTest(GeoStoryEditor, stateMocker(setEditing(true))); ReactDOM.render(<Plugin />, document.getElementById("container")); expect(document.getElementsByClassName('ms-geostory-editor').length).toBe(1); }); });
{ "pile_set_name": "Github" }
1. Field of the Invention The present invention relates to devices and methods for monitoring and measuring tritium levels. More particularly, the present invention relates to monitoring the concentration of tritium in aqueous samples. 2. Discussion of Background Tritium is a radioactive isotope of hydrogen that is produced in nuclear reactors by bombarding lithium with neutrons. Tritium also occurs naturally in small concentrations, and may result from the bombardment of water molecules by a neutron flux or other high-energy radiation. Indiscriminate tritium release to the environment is forbidden by law. Therefore, the presence of tritium in nuclear power generating and production facilities dictates the need for effective tritium monitoring. Furthermore, the sensitivity (or detection limit) of tritium monitors must be appropriate for the particular monitoring application. Devices and methods for detecting the presence of tritium in liquids and gases are known. Hascal et al, in U.S. Pat. No. 4,618,774, disclose an instrument for measuring tritium and tritium oxide levels in air. The instrument uses a scintillation detector and a pair of scintillators, one serving as a reference. The device compares the measured counting rate of airborne tritium and tritium oxide passing over one scintillator with that of the reference scintillator. The air is condensed onto and evaporated from the surface of the non-reference scintillator. Osborne et al, U.S. Pat. No. 3,999,066, disclose a system comprising a method and apparatus for continuously monitoring air for the presence of tritiated water vapor. Tritiated water vapor contained in the sample air is transferred to a liquid which is contacted with the air sample. Radioactive noble gases are stripped from the liquid using a gas stream, and the resulting liquid is analyzed for beta radiation of the energy level indicative of the presence of tritium using a detector such as a scintillation counter. Other methods are also known which monitor tritium levels in liquids and gases. For instance, Corbett et al, U.S. Pat. No. 4,244,783, disclose a method for monitoring tritium levels in the coolant fluid and reactor cover gas of a sodium-cooled nuclear breeder reactor. The tritium is separated by a hydrogen-permeable tube and diffused into a gas discharge device that ionizes the gas. The tritium is monitored by measuring the ionization current produced. McManus et al, in U.S. Pat. No. 4,835,395, disclose a method and apparatus for continuously monitoring the tritium concentration in liquid aqueous solutions. A series of air streams direct water and tritiated water from the liquid sample to a flow-through ionization chamber. The ion chamber response, along with humidity and temperature measurements, are ultimately used to calculate the tritium content.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Gmail AppScript mailMessage.getFrom() to return email not name Similar to: Getting only email address to display when using message.getFrom() in JavaMail but could not apply the solution. Trying to use mailMessage.getFrom() on Google AppScript with Gmail. Default script: function loadAddOn(event) { var accessToken = event.messageMetadata.accessToken; var messageId = event.messageMetadata.messageId; GmailApp.setCurrentMessageAccessToken(accessToken); var mailMessage = GmailApp.getMessageById(messageId); var from = mailMessage.getFrom(); var openDocButton = CardService.newTextButton() .setText("open docs") .setOpenLink( CardService.newOpenLink().setUrl("https://developers.google.com/gmail/add-ons/")); var card = CardService.newCardBuilder() .setHeader(CardService.newCardHeader().setTitle("My First Gmail Addon")) .addSection(CardService.newCardSection() .addWidget(CardService.newTextParagraph().setText("The email is from: " + from)) .addWidget(openDocButton)) .build(); return [card]; } var from = mailMessage.getFrom(); This returns the name of the sender, not the actual email address. Tried getFrom().getAddress() trying my luck with post mentioned above, but obviously it didn't work, with getFrom() returning a string. Any Idea how to access an array of data or dictionary with metadata of sender so I can extract email, name etc. myself? A: This appears to be a bug! It appears that when using the getFrom() method in a card, the name appears but not the email address as you described, which is counter to what is contained in the GmailMessage.getFrom() documentation. I have taken the liberty of reporting this behaviour for you on Google's Issue Tracker: GmailMessage.getFrom() not returning email address within CardService. You can hit the ☆ next to the issue number in the top left of this page which lets Google know more people are encountering this and so it is more likely to be seen to faster. Workaround: In the mean time, as the getFrom() method still works within the Apps Script interface, you can obtain the email address from the return string of getFrom(). If you use Logger.log(mailMessage.getFrom()), you get a return in the log of the form: Firstname Lastname <emailaddress@domain.com> So, all you need to do is replace: var from = mailMessage.getFrom(); with: var from = mailMessage.getFrom().split("<")[1].split(">")[0]; I hope this is helpful to you! References: Google Apps Script - GmailMessage.getFrom() Issue Tracker - GmailMessage.getFrom() not returning email address within CardService.
{ "pile_set_name": "StackExchange" }
Entrapment of the external iliac vein in a both-column acetabular fracture. We present a patient with an associated both-column acetabular fracture with entrapment of the external iliac vein in the fracture. This complication was not recognized until fracture manipulation during open reduction and fixation. This case report demonstrates that an acetabular fracture can have an associated vascular injury without any obvious clinical signs. This can be especially dangerous during percutaneous manipulation and fixation of these fractures as an obstruction or injury to the external iliac vein may occur and remain unrecognized. We feel that any surgeon involved in treating patients with acetabular or pelvic fractures should be aware of this potentially serious complication.
{ "pile_set_name": "PubMed Abstracts" }
Q: Can't login to MySQL as root anymore? It looks like I can not login to MySQL (actually MariaDB) as root user anymore in Ubuntu 15.04 (I upgraded from 14.04 via 14.10) I already tried to reset the password. What is working, is sudo mysql - but I want to login as root from an other user using mysql -uroot -p. When I create a new user with full rights and password, it is working. Was there something changed? A: So you've gone from version 5.5.44-1ubuntu0.14.04.1 to 10.0.20-0ubuntu0.15.04.1. Sounds scarier than it is, that's just what they called 5.6 for some reason. It seems that newer versions of MariaDB have added a plugin to the user table to force authentication through a fixed path. In this case, the root database user is forced through the unix_socket plugin. This also seems to be known as auth_socket in some circles. Anyway this plugin restricts things so only the system root user can log in as the database root, with no password. It's a security choice they've made. You can revert this by blanking the plugin field for the root user: shell$ sudo mysql -u root [mysql] use mysql; [mysql] update user set plugin='' where User='root'; [mysql] flush privileges; A specified password should work after this. I'm not sure how advisable this is though.
{ "pile_set_name": "StackExchange" }
/* SequenceCursor.cpp Copyright (C) 2014 Kushview, LLC. All rights reserved. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #if 0 // Constructor. SequenceCursor::SequenceCursor (Sequencer& seq, int64 frame, DataType sync_type) : owner (seq), mSyncType (sync_type), trackCount (0) { mFrame = frame; rtClipSize = 0; resetClips(); reset(); } // Destructor. SequenceCursor::~SequenceCursor() { //destroyed(); //owner.removeCursor (this); rtClips.reset(); } // Clip sync flag accessor. void SequenceCursor::setSyncType (DataType sync) { mSyncType = sync; } DataType SequenceCursor::syncType() const { return mSyncType; } // General bi-directional locate method. void SequenceCursor::seek (int64 frame, bool sync) { #if 1 if (frame == mFrame) return; const int32 ntracks = owner.tracks().size(); int32 index = 0; while (index < ntracks && index < trackCount.get()) { const SequencerTrack* track (owner.tracks().getUnchecked (index)); ClipSource* clip = nullptr; ClipSource* lastClip = rtClips [index]; // Optimize if seeking forward... if (frame > mFrame) clip = lastClip; // Locate first clip not past the target frame position.. clip = seekClip (track, clip, frame); // Update cursor track clip... rtClips [index] = clip; #if 1 // Now something fulcral for clips around... // FIXME: if (track->sync_type() == m_sync_type) { // Tell whether play-head is after loop-start position... // FIXME: bool is_looping = (frame >= p_seq->loop_start()); // const bool is_looping = frame > 0; // Care for old/previous clip... if (lastClip && lastClip != clip) { // lastClip->reset (is_looping); } // Set final position within target clip... if (clip && sync) { #if 0 // Take care of overlapping clips... const uint64_t clip_end = clip->frame_end(); Clip::iterator c = clip->position(); Clip::iterator e = track->clips_end(); while (c != e) { Clip& clip (*c); uint64_t clip_start = clip.frame_start(); if (clip_start > clip_end) { break; } if (frame >= clip_start && frame < clip_start + clip.duration()) { clip.seek (frame - clip_start); } else { clip.reset (is_looping); } ++c; } #endif } } #endif ++index; } #endif mFrame = frame; } int64 SequenceCursor::frame() const { return mFrame; } void SequenceCursor::setFrameTime (int64 frameTime) { mFrameTime = frameTime; mFrameDelta = mFrame - frameTime; } int64 SequenceCursor::frameTime() const { return mFrameTime; } int64 SequenceCursor::setFrameTimeExpected() const { return mFrameTime + mFrameDelta; } ClipSource* SequenceCursor::clip (int32 track) const { return (track < trackCount.get() ? rtClips [track] : nullptr); } ClipSource* SequenceCursor::seekClip (const SequencerTrack* track, ClipSource* clip, int64 frame) const { if (clip == nullptr) clip = track->firstClip(); while (clip && frame > clip->frameEnd()) clip = clip->next(); if (clip == nullptr) clip = track->lastClip(); return clip; } void SequenceCursor::addTrack() { const int32 newCount = trackCount.get() + 1; if (rtClipSize < newCount) { rtClipSize += newCount; ClipArray newSources (new ClipSource* [rtClipSize]); updateClips (newSources.get(), newCount); rtClips.swap (newSources); } else { updateClips (rtClips.get(), newCount); } while (! trackCount.set (newCount)) { /*spin*/ } } void SequenceCursor::updateTrack (const SequencerTrack* track) { const int32 index = track->index(); if (isPositiveAndBelow (index, trackCount.get())) { ClipSource* clip = seekClip (track, nullptr, mFrame); if (clip && clip->isInRangeOf (mFrame)) clip->seekLocalFrame (mFrame - clip->frameStart()); rtClips [index] = clip; } } void SequenceCursor::removeTrack (const SequencerTrack* track) { const int index = track->index(); if (index >= 0 && uint32_t (index) < numTracks()) removeTrack ((uint32_t) index); } void SequenceCursor::removeTrack (int32 track) { if (trackCount.set (trackCount.get() - 1)) { for ( ; track < numTracks(); ++track) rtClips [track] = rtClips [track + 1]; rtClips [track] = nullptr; } } void SequenceCursor::updateTrackClip (const SequencerTrack* track) { const int index = track->index(); if (index >= 0) { ClipSource* clip = rtClips [index]; #if 1 if (clip) { if (clip->isInRangeOf (mFrame)) clip->seekLocalFrame (mFrame - clip->frameStart()); else { // XXX: clip->reset (); } } #endif } } void SequenceCursor::updateClips (ClipSource** clips, int32 size) { const Array<SequencerTrack*>& tracks (owner.tracks()); const int32 tsize = tracks.size(); int32 index = 0; while (index < size && index < tsize) { ClipSource* clip = seekClip (tracks.getUnchecked (index), nullptr, mFrame); if (clip && clip->isInRangeOf (mFrame)) clip->seekLocalFrame (mFrame - clip->frameStart()); clips [index] = clip; ++index; } } void SequenceCursor::reset() { mFrameTime = 0; mFrameDelta = mFrame; } void SequenceCursor::resetClips() { const uint32_t ntracks = owner.numTracks(); rtClipSize = (ntracks << 1); if (rtClipSize > 0) { ClipArray newClips (new ClipSource* [rtClipSize]); updateClips (newClips.get(), ntracks); rtClips.swap (newClips); } trackCount.set (ntracks); } void SequenceCursor::process (int32 nframes) { mFrameTime += nframes; } #endif
{ "pile_set_name": "Github" }
Proslavljeni portugalski trener Žoze Murinjo poslao je putem snimka poruku zahvalnosti svima u Ubu nakon što je u ovom gradu dobio fudbalski teren sa njegovim imenom, o čemu je Telegraf prvi pisao. Murinjo se preko Telegrafa obratio stanovnicima Uba i poručio da je ovo poseban grad i da zaslužuje poseban fudbalski teren, koji će nositi njegovo ime - gospodina "Posebnog", kako zovu Murinja. - Zdravo, ja sam Žoze. Ub je specijalan grad sa mnogo posebnih ljudi, koji zaslužuju poseban fudbalski teren. Mnogo sam srećan i ponosan što je ovaj poseban teren skoro spreman za sve na Ubu da uživaju u njemu. Ćao i čujemo se uskoro - poručio je Murinjo u video poruci preko Telegrafa. Pogledajte i kako izgleda teren koji je izgrađen na Ubu i nosi ime Žozea Murinja. Foto: Milovan Milovanović i Dragan Belajac Foto: Milovan Milovanović i Dragan Belajac Foto: Milovan Milovanović i Dragan Belajac Foto: Milovan Milovanović i Dragan Belajac (Telegraf.rs)
{ "pile_set_name": "OpenWebText2" }
package org.openstack4j.core.transport; import org.openstack4j.api.exceptions.AuthenticationException; import org.openstack4j.api.exceptions.ClientResponseException; import org.openstack4j.api.exceptions.ResponseException; import org.openstack4j.api.exceptions.ServerResponseException; /** * Exception Handles for common Http messages and status codes * * @author Jeremy Unruh */ public class HttpExceptionHandler { /** * Maps an Exception based on the underlying status code * * @param message the message * @param status the status * @return the response exception */ public static ResponseException mapException(String message, int status) { return mapException(message, status, null); } /** * Maps an Exception based on the underlying status code * * @param message the message * @param status the status * @param cause the cause * @return the response exception */ public static ResponseException mapException(String message, int status, Throwable cause) { if (status == 401) return new AuthenticationException(message, status, cause); if (status >= 400 && status < 499) return new ClientResponseException(message, status, cause); if (status >= 500 && status < 600) return new ServerResponseException(message, status, cause); return new ResponseException(message, status, cause); } }
{ "pile_set_name": "Github" }