text
stringlengths 1
3.78M
| meta
dict |
|---|---|
fileFormatVersion: 2
guid: cf9ebc36d43f657468fecb524763e3bc
ShaderImporter:
defaultTextures: []
userData:
|
{
"pile_set_name": "Github"
}
|
Photojournalism And a Special Guest
CPS is pleased to announce that Bruce Bishop will be our special guest and will talk about Drone Photography. Please bring up to 6 of your digital or print Photojournalistic pictures to share - and join us on March 23rd at 7:30pm! These Photojournalism evenings are designed to celebrate the actual photograph: pictures that tell stories without the aid of accompanying words or Photoshop enhancements. This event is free and open to all.
3/16 Creative Competition Results Posted!
Results from the third and final Creative and Pictorial competition of the year have now been posted and can be viewed in the Competition Results section of this website. Bookmark this page in order to quickly track updated results as the competition year unfolds. A slideshow of the winning images from the 2/2 Black & White competition can also be viewed here. A reminder to members that a database of all competition entries in Excel spreadsheet format is updated shortly after each competition.
Two Popular Field Trips are Back!
We're pleased to announce that two of our most popular field trip destinations are back on the calendar! Registration is NOW OPEN for our annual visit to Mansfield Reformatory on Saturday, June 2nd. This trip is open to EVERYONE, with separate prices for Photographers and Non-Photographers. And we're in the final stages of wrapping up the details for front row box seats at the 2018 Air Show on Labor Day weekend, featuring the US Navy Blue Angels - details coming soon!
The Current Issue of the Darkroom Door is Here
The latest issue of the Award Winning! CPS Newsletter covering the first 6 months of 2017, The Darkroom Door, is now available for viewing and downloading in the Newsletter section of this website. Click here to view this and previous issues.
New Competition Tutorial Available!
To help you get the most out of your images, a new tutorial has been added to the Competitions page of this website! Sometimes using 'standard' mat sizes for print competitions is easier and less expensive but may not showcase your image to best advantage by choosing the right size and ratio for maximum impact. And while you're reading, check out the 'How to Compete' and 'How to Mat' presentations as well - all found on the Competitions page of this website. Good Luck to all competitors!
Exhibition Gallery Pages Have Been Updated!
The exhibition Gallery pages of this website have been updated and now include slideshows of all images displayed in off-site CPS Exhibitions from 2011 through this summer! Click the link to view the UPDATED Exhibition Gallery
Welcome to CPS!
The Cleveland Photographic Society is not your typical 'camera club'. Operating from our own full-time, ADA-friendly clubroom in Broadview Heights, Ohio, we are a 501(c)(3) non-profit organization, offering a variety of activities for members and visitors alike - including our long-running School of Photography, with classes held throughout the year. Feel free to look around our website and learn a little more about us and how to find us on the All About CPS page. Visitors are always welcome to our Friday evening meetings and many other events - we hope YOU'LL plan to visit sometime soon! If you have a question or a comment, please Drop us a line
The mission of the Cleveland Photographic Society is to promote and advance the understanding, passion and joy of photography by providing opportunities for education, skill development, picture-taking, competition, critique and fellowship.
|
{
"pile_set_name": "Pile-CC"
}
|
---
title: "Loading and Exporting Formatting Data | Microsoft Docs"
ms.date: "09/13/2016"
---
# Loading and Exporting Formatting Data
Once you have created your formatting file, you need to update the format data of the session by loading your files into the current session. (The formatting files provided by Windows PowerShell are loaded by snap-ins that are registered when the current session is opened.) Once the format data of the current session is updated, Windows PowerShell uses that data to display the .NET objects associated with the views defined in the loaded formatting files. There is no limit to the number of formatting files that you can load into the current session. In addition to updating the formatting data, you can export the format data in the current session back to a formatting file.
## Loading format data
Formatting files can be loaded into the current session using the following methods:
- You can import the formatting file into the current session from the command line. Use the [Update-FormatData](/powershell/module/Microsoft.PowerShell.Utility/Update-FormatData) cmdlet as described in the following procedure.
- You can create a module manifest that references your formatting file. Modules allow you to package you formatting files for distribution. Use the [New-ModuleManifest](/powershell/module/Microsoft.PowerShell.Core/New-ModuleManifest) cmdlet to create the manifest, and the [Import-Module](/powershell/module/Microsoft.PowerShell.Core/Import-Module) cmdlet to load the module into the current session. For more information about modules, see [Writing a Windows PowerShell Module](../module/writing-a-windows-powershell-module.md).
- You can create a snap-in that references your formatting file. Use the [System.Management.Automation.PSSnapIn.Formats](/dotnet/api/System.Management.Automation.PSSnapIn.Formats) to reference your formatting files. It is strongly encouraged to use modules to package cmdlets, and any associated formatting and types files for distribution. For more information about modules, see [Writing a Windows PowerShell Module](../module/writing-a-windows-powershell-module.md).
- If you are invoking commands programmatically, you can add a formatting file entry to the initial session state of the runspace where the commands are run. For more information about .NET type used to add the formatting file, see the [System.Management.Automation.Runspaces.Sessionstateformatentry?Displayproperty=Fullname](/dotnet/api/System.Management.Automation.Runspaces.SessionStateFormatEntry) class.
When a formatting file is loaded, it is added to an internal list that Windows PowerShell uses to determine which view to use when displaying objects at the command line. You can prepend your formatting file to the beginning of the list, or you can append it to the end of the list. Knowing where your formatting file is added to this list is important if you are loading formatting file that defines a view for an object that has an existing view defined, such as when you want to change how an object that is returned by a Windows PowerShell core cmdlet is displayed. If you are loading a formatting file that defines the only view for an object, you can use any of the methods described previously. If you are loading a formatting file that defines another view for an object, you must use the [Update-FormatData](/powershell/module/Microsoft.PowerShell.Utility/Update-FormatData) cmdlet and prepend your file to the beginning of the list.
## Storing Your Formatting File
There is no requirement for where your formatting files are stored on disk. However, it is strongly suggested that you store them in the following folder: `user\documents\windowspowershell\`
#### Loading a format file using Import-FormatData
1. Store your formatting file to disk.
2. Run the [Update-FormatData](/powershell/module/Microsoft.PowerShell.Utility/Update-FormatData) cmdlet using one of the following commands.
To add your formatting file to the front of the list use this command. Use this command if you are changing how an object is displayed.
```powershell
Update-FormatData -PrependPath PathToFormattingFile
```
To add your formatting file to the end of the list use this command.
```powershell
Update-FormatData -AppendPath PathToFormattingFile
```
Once you have added a file using the [Update-FormatData](/powershell/module/Microsoft.PowerShell.Utility/Update-FormatData) cmdlet, you cannot remove the file from the list while the session is open. You must close the session to remove the formatting file from the list.
## Exporting format data
Insert section body here.
|
{
"pile_set_name": "Github"
}
|
Q:
What is the cataclysm that befalls Earth in Wool?
In the Wool series; specifically, Wool 6: First Shift,
it is said that the world ends with atomic bombs.
The landscape of the world definitely jives with this.
However, whenever someone goes out into the world,
their protective suit is immediately attacked by something in the air and slowly disintegrates. First Shift makes mention of nano-technology or poison, but I don't recall if that was ever confirmed or not.
Does the series reveal what is the villain in the air?
A:
The nanos wipe out humans in a controlled, timed, DNA-based attack. The bombs served three purposes (and there were only three bombs): They ushered the survivors into the silos; they provided the initial (and fuzzy) legends about the destruction of all things; and they were the trauma that allowed the subsequent regimen of medication to divide the forgotten past from their new future.
|
{
"pile_set_name": "StackExchange"
}
|
Pitch is determined by naturally occurring periodic sounds.
Published
Journal Article
The phenomenology of pitch has been difficult to rationalize and remains the subject of much debate. Here we test the hypothesis that audition generates pitch percepts by relating inherently ambiguous sound stimuli to their probable sources in the human auditory environment. A database of speech sounds, the principal source of periodic sound energy for human listeners, was compiled and the dominant periodicity of each speech sound determined. A set of synthetic test stimuli were used to assess whether the major pitch phenomena described in the literature could be explained by the probabilistic relationship between the stimuli and their probable sources (i.e., speech sounds). The phenomena tested included the perception of the missing fundamental, the pitch-shift of the residue, spectral dominance and the perception of pitch strength. In each case, the conditional probability distribution of speech sound periodicities accurately predicted the pitches normally heard in response to the test stimuli. We conclude from these findings that pitch entails an auditory process that relates inevitably ambiguous sound stimuli to their probable natural sources.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Paypal Adaptive Payments Allowing Third Party to Act on Your Behalf
I'm reading the adaptive paypals API ebook and it says on page 21, that :
"if you allow a third party to paypal to execute an application on your behalf the third party becomes the API caller because the third party is now calling the Adaptive Payments API. The third party must also have permission from Paypal to use the advanced service. For example if an application supports chained payments both you anf the third party must have permission to use the service"
Does this mean if I have an application where a user of the site logs in and sends me $100 (as an approved user of chain payments), say only $50 of the money goes to me and another $25 goes to y, and the other $25 goes back to the ORIGINAL sender... can they ONLY accept this if they have an approved chain payment account??
or does only the primary receiver need to have a chain payment approved account?
Thanks
A:
This section is likely referring to third-party API authentication. E.g. if you're setting a USER, PWD and SIGNATURE but also passing a SUBJECT in order to force the API call to actually be called on behalf of another third party.
This wouldn't be strictly something to do with a chained payment scenario, because the SUBJECT can again be different from the primary receiver.
For example:
METHOD=Pay
USER=myapi_api1.test.com
PWD=xxxxxx
SIGNATURE=xxxxxxxx
X-APPLICATION-ID=APP-XXXXXXXXX // The application ID as owned by yourstore@yourdomain.com
SUBJECT=yourstore@yourdomain.com // Call the 'Pay' API on behalf of yourstore@yourdomain.com, but use my API credentials (yourstore@yourdomain.com must have granted myapi_api1.test.com access to do this)
PRIMARYRECEIVER=blah@anotherdomain.com // This receiver only has to be able to receive money
Note: This does not constitute an actual API call you would send. I don't happen to have an Adaptive Payments API call at hand to make a working example at the moment.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
When reviewing, what to do when previous reviewer has already posted a comment?
On a recent review of a first post the previous reviewer, a moderator, had already posted a comment that covered the issue.
The post was asked on the wrong SE site, but their comment covered this.
I decided to flag for moderator intervention because the 'No action necessary' pop-up for this action says "This question seems to be valid", which it isn't on the site it was posted on. But, a moderator was already aware as they commented so is flagging it just making work for others, or is this correct action?
I have done some looking around on the Metas but can't find an answer to this I don't think?
What are the review queues, and how do they work?
How does the new user question review process work?
A:
If you don't want to flag it, you can always upvote the previous reviewer's comment and then click on "I'm done".
|
{
"pile_set_name": "StackExchange"
}
|
Audi Steppenwolf
The Audi Steppenwolf was a concept car produced by Audi and presented at the Paris Motor Show in 2000. The Steppenwolf was a study for a three-door compact crossover SUV based on the Volkswagen Group PQ34 platform used in the contemporary Audi A3 and Audi TT. Powered by a 3.2L V6 engine with four-wheel drive, the Steppenwolf had several novel features, including four-level adjustable air suspension (similar to the Audi allroad quattro), a removable carbon fibre hardtop or optional soft top, and an electro-hydraulic parking brake.
The Steppenwolf didn't result directly in a production model. However, six years later, Audi presented the Audi Cross Coupé quattro, another concept car in the same class, which was the basis of a production version called the Audi Q3 for 2011.
Sources
References
Steppenwolf
Category:All-wheel-drive vehicles
|
{
"pile_set_name": "Wikipedia (en)"
}
|
The spindly yellow crane that has been dangling over the top of Woodbranch Investment’s Market Square Tower is coming down in pieces this afternoon, notes a downtown reader. The shot above shows the scene from the corner of Prairie and Travis streets, with the top edge of the still-standing-by-court-order former Houston Chronicle building sticking in from the left.
The 463-unit tower has been leasing spaces since April, with plans to open this fall. There’s still work to do on the building before then, though the support for the glass-bottom cantilevered rooftop pool that will hang some 500 feet above Preston looks to be in place. Here’s Jackson & Ryan’s rendering of what the space will look like once the water has been added:
***
And here’s the tower and crane photobombing last week’s shot of Hines’s Aris Market Square tower, currently making its way up into the airspace on the other side of Market Square:
Images: tribalidentity (top 2); Jackson & Ryan (rendering); Bob Russell (bottom)
Coming Down Downtown
|
{
"pile_set_name": "OpenWebText2"
}
|
<?php
/*
* This file is part of the Ekino Wordpress package.
*
* (c) 2013 Ekino
*
* For the full copyright and license information, please view the LICENSE
* file that was distributed with this source code.
*/
namespace Ekino\WordpressBundle\Entity;
use Ekino\WordpressBundle\Model\User as UserModel;
/**
* Class User.
*
* This is the User entity
*
* @author Vincent Composieux <composieux@ekino.com>
*/
class User extends UserModel
{
}
|
{
"pile_set_name": "Github"
}
|
Yes, we all know the recurring complaints: it's volatile, it's new and untested, it can be hacked, and it has no central bank backing it; most established pundits hate it - today's comments by Warren Buffett a case in point - and as Goldman writes in a note released today by its economic team, "cryptocurrencies can seem like a solution in search of a problem."
Specifically, Goldman notes that "money derives its value from its usefulness in facilitating transactions and diversifying portfolios. The US Dollar serves both purposes relatively well—or at least better than the main alternatives—so it is in high demand around the world."
Then again, the real reason why Goldman is unable to grasp the utility of Bitcoin, is that the bank - like so many of its peers - is unwilling and unable to admit that there is a problem which bitcoin is addressing, a problem which as Deutsche Bank's Jim Reid and Macquarie's Viktor Shvets explained back in September, is that "Modern Finance, Not Bitcoin, Is The Real Fraud."
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
How do you change a color of an image entirely when hovered in tag element?
I have this example code that hovers an image to change the background color. How do you fill the entire image with color when hovered?
In my code snippet, it only fills the background color of an a tag element but not the image.
Here's an image to further clarify my question.
How do achieve this using the hover effect in tag element.
a img:hover {
background-color: purple;
}
a:hover {
background-color: yellow;
}
<!DOCTYPE html>
<html>
<head>
</head>
<body>
<!-- Hovered with image no text -->
<a href="https://www.w3schools.com"><img src="cart.png"></a>
<!-- Hovered without image just text -->
<a href="http://www.wikipedia.org">Change color text</a>
</p>
</body>
</html>
A:
I have found another method to change the background image. I suppose to have two images so when hovered it will change the image. Thanks for the info @Jaromanda X
#my-img:hover {
content: url('images/pinkcart.png');
}
<!DOCTYPE html>
<html>
<head>
</head>
<body>
<img id="my-img" src="images/redcarticon.png"/>
</p>
</body>
</html>
And thank you also for helping me everyone.
|
{
"pile_set_name": "StackExchange"
}
|
Donate To Us
Donations will be used for the benefit of the Therian Guide community. You can also donate to us using Łitecoins or Bitcoins, please contact us for more information.
Welcome
Welcome to the Therian Guide.
We are a community of people, joined by our common experience of Therianthropy.
On this site you will find information on the various aspects of therianthropy and the community, including otherkin.
There are many theories held in the community as to the origins of a nonhuman identity as well as how it happens, each individual holding their own beliefs. As of now, there is no solid answer, nor right or wrong; we can only provide what is widely accepted by the community.
This website covers both spiritual and psychological theories of nonhuman identification as well as different aspects of therianthropy. Keep in mind that everyone holds different views and other views may differ slightly from the ones shared here but may be the same at their core.
We do not claim anything here as fact, only generally accepted knowledge and speculation in the community. There is no central authority on the subject of therianthropy, everything known on the subject to date, amounts to views and opinions of the people experiencing it. The information provided here attempts to summarize some of that for you.
If you are not a therian yourself, but a parent of a one, please look at our Parents page.
Information from this site can't be used without permission. If you would like to use any information on this site for other sites please email us!
Sorry, you need Javascript on to email us.
If you have questions regarding therianthropy, please do not email us, please refer to our community instead.
Site created on May 23, 2010
|
{
"pile_set_name": "OpenWebText2"
}
|
A novel method for determination of patulin in apple juices by GC-MS.
A reliable gas chromatography-mass spectrometry with a QuEChERS procedure has been developed and validated for detection and determination of patulin in apple juice. This procedure includes initial extraction step with acetonitrile, partitioning step by addition of magnesium sulphate, sodium carbonate and sodium chloride, and clean-up step using dispersive solid-phase extraction by addition of a mixture of magnesium sulphate and primary secondary amine sorbent. In order to increase GC adoptability of patulin, derivatisation step was performed using N,O-bis-trimethylsilyl trifluoroacetamide. Method recoveries of patulin from apple juice samples ranged from 79.9% to 87.9%. Limit of detection (LOD) and quantification (LOQ) were 0.4 and 1.3 μg/L, respectively. Relative standard deviations were lower than 9.5%. The developed method has been successfully applied to the analysis of patulin in apple juice samples.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
English:
Flor
Flor? Jazmin
Well, we already have something in common
You are beautiful flor
You deserve someone who loves you-
Who really loves you
Where is that someone? Oh my God
Is coming
That person is coming, stay calm
When you love something very much
you make sacrifices
When you like something very much
Not always everything is super cute
You're very good at giving advice
I like to see you happy
You do not have to be ashamed to be like yourself because
Because you're beautiful, and you're very special.
You are perfect
I'm afraid to fall in love
Fear is not a good ally of love
Spanish:
Flor
Flor? Jazmin
Bueno, ya tenemos algo en comun
Sos hermosa flor
Vos mereces alguien que te quiera
Que te quiera de verdad
Donde esta ese alguien? por dios
Ya va a llegar
Ya va a llegar, tranquila
Cuando amas mucho algo
Haces sacrificios
Cuando te gusta mucho algo
No siempre todo es super lindo
Sos muy buena dando consejos
Me gusta verte bien
No tenes que tener vergüenza de ser como sos porque
porque sos hermosa y sos muy especial
Vos sos perfecta
Tengo miedo de enamorarme
El miedo no es un buen aliado del amor
English:
I hope I ever find a guy who loves me and understands me
and take care of me as much as you
It's about love
and when you love someone
you want to be for life with that person
You saw that everyone is with someone
less us, we are losers
No, we are accompanied by
Ourselves, you and me
Why are you doing this?
Because I love you, flor
I want you to be happy, Flor, you know?
If you are going to be happy, marry Dani
I want you to marry Dani
Don't mess with my relationship with Jazmin
Because she loves me, you know?
And she wants to see me fine
And when I see you I feel much better
You're beautiful
You always make me feel beautiful
Spanish:
Ojala alguna vez encuentre un tipo que me quiera y me entienda
Y me cuide tanto como vos
Se trata de amor
Y cuando uno ama a alguien
Quiere estar para toda la vida con esa persona
Viste que esta todo el mundo acompañado
Menos nosotras, que loser
No, nosotras estamos acompañadas por
Nosotras mismas, vos y yo
Porque haces esto?
Y porque te quiero flor
Yo quiero que seas feliz Flor, sabes?
Si vos, vas a ser feliz, casandote con dani
Yo quiero que te cases con dani
No te metas viste, en mi relacion con Jazmin
Porque ella a mi me quiere, sabias?
Y me quiere bien
Y cuando te veo a vos me siento mucho mejor
Vos sos hermosa
Vos me haces siempre sentir re linda
Spanish:
Yo me doy cuenta cuando dos personas estan enamoradas
Como flor y jazmin
Me diste vuelta la vida
Necesito que me expliques como es
Como es el amor?
Es amor?
Porque no quiero que nadie nos separe Jaz
Nadie nos va a separar.
English:
I realize when two people are in love
Like Flor and Jazmin
You changed my life
I need you to explain to me how it is
How is love?
Is love?
Because I do not want anyone to separate us Jaz
Nobody will separate us.
♪ You taught me the courage of stars before you left ♪
♪ How light carries on endlessly, even after death ♪
English:
♪ With shortness of breath, you explained the infinite ♪
♪ How rare and beautiful it is to even exist ♪
♪ I couldn’t help but ask ♪
♪ For you to say it all again ♪
♪ I tried to write it down ♪
♪ But I could never find a pen ♪
♪ I’d give anything to hear ♪
♪ You say it one more time ♪
♪ That the universe was made ♪
♪ Just to be seen by my eyes ♪
♪ I couldn’t help but ask ♪
♪ For you to say it all again ♪
♪ I tried to write it down ♪
♪ But I could never find a pen ♪
♪ I’d give anything to hear ♪
Spanish:
Porque me gustas boluda
Ya esta, o sea somos amigas, no creemos falsas expectativas si?
Vos tambien me gustas mucho.
English:
♪ You say it one more time ♪
♪ That the universe was made ♪
Because I like you
♪ Just to be seen by my eyes ♪
♪ With shortness of breath ♪
♪ I’ll explain the infinite ♪
♪ How rare and beautiful ♪
♪ it truly is that we exist ♪
Look, we're friends, let's not give false expectations ok?
I like you a lot, too.
|
{
"pile_set_name": "YoutubeSubtitles"
}
|
Description
The stricter the boss, the quicker she gets wet…
|
{
"pile_set_name": "OpenWebText2"
}
|
Race to the Sun
Best-selling author Rick Riordan welcomes indigenous fantasy writer Rebecca Roanhorse to his imprint with this thrilling adventure about a Navajo girl who discovers she's a monsterslayer.
Lately, seventh grader Nizhoni Begay has been able to detect monsters, like that man in the fancy suit who was in the bleachers at her basketball game. Turns out he's Mr. Charles, her dad's new boss at the oil and gas company, and he's alarmingly interested in Nizhoni and her brother, Mac, their Navajo heritage, and the legend of the Hero Twins. When Dad disappears the next day, leaving behind a message that says "Run!", the siblings and Nizhoni's best friend, Davery, are thrust into a rescue mission, which can only be done with the help of Navajo gods, all disguised as quirky "rez" personalities. After a series of dangerous--and mind-bending--trials, Nizhoni, Mac, and Davery finally reach the sun god, who outfits them with the weapons they need to take down Mr. Charles and the ancient monsters he has unleashed. But it will take more than weapons for Nizhoni to become the hero she was destined to be. . . .
Gift Audiobook Memberships
You pick the duration—1, 3, 6, or 12 months—they pick the audiobooks. Buying gifts from your local bookstore has never been so easy.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
ARM clock speed on raspberry pi
Running bare-metal (no operating system, no Linux)
The specs implies the ARM can/does run 700MHz, the sys clock matches the manual and appears to be running at 250MHz. Simple tests on the ARM imply that it is doing the same, for example with the instruction cache on
test:
subs r0,r0,#1
bne test
And vary the number of subs instructions to dominate over the branch, it is in the ball park of 250MHz but a long way away from 700MHz.
I there a phy setting that I am not seeing in the datasheet for multiplying the ARM clock?
EDIT:
Maybe my assumptions are flawed...
.globl ARMTEST0
ARMTEST0:
subs r0,r0,#1
bne ARMTEST0
bx lr
.globl ARMTEST1
ARMTEST1:
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
bne ARMTEST1
bx lr
.globl ARMTEST2
ARMTEST2:
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
subs r0,r0,#1
bne ARMTEST2
bx lr
.globl ARMTEST3
ARMTEST3:
subs r1,r0,#1
subs r2,r1,#1
subs r3,r2,#1
subs r0,r3,#1
subs r1,r0,#1
subs r2,r1,#1
subs r3,r2,#1
subs r0,r3,#1
subs r1,r0,#1
subs r2,r1,#1
subs r3,r2,#1
subs r0,r3,#1
subs r1,r0,#1
subs r2,r1,#1
subs r3,r2,#1
subs r0,r3,#1
bne ARMTEST3
bx lr
System timer ticks in hex per function (250Mhz system timer verified against stopwatch, etc).
02DB6DF7 ARMTEST0
02DB6E1C ARMTEST0
00AB6E2A ARMTEST1
00836E46 ARMTEST2
00836E2A ARMTEST3
Which gives:
ARMTEST0
0x01000000 subs instructions
0x01000000 bne instructions
0x02000000 instructions
1.43 clocks per instruction. 175Mips.
ARMTEST1
0x01000000 sub instructions
0x00200000 bne instructions
0x01200000 instructions
1.68 instructions per clock. 420Mips
ARMTEST2
0x01000000 sub instructions
0x00100000 bne instructions
0x01100000 instructions
2.07 instructions per clock. 517Mips
ARMTEST3
0x01000000 sub instructions
0x00100000 bne instructions
0x01100000 instructions
2.07 instructions per clock. 517Mips
The ARM11 is super-scalar more than one instruction per clock is not unexpected. I would expect more though. Using only register 0 might mess with the pipe as you have to wait for one result of one instruction before executing the next. I was expecting to see a difference between test 2 and 3, perhaps another bad assumption. Maybe its really 500Mhz not 700? There is one line in the linux sources that mentions a 500000000 clock.
static struct clk osc_clk = {
#ifdef CONFIG_ARCH_BCM2708_CHIPIT
.rate = 27000000,
#else
.rate = 500000000, /* ARM clock is set from the VideoCore booter */
#endif
};
/* warning - the USB needs a clock > 34MHz */
#ifdef CONFIG_MMC_BCM2708
static struct clk sdhost_clk = {
#ifdef CONFIG_ARCH_BCM2708_CHIPIT
.rate = 4000000, /* 4MHz */
#else
.rate = 250000000, /* 250MHz */
#endif
};
#endif
Maybe what I think I have measured as 250Mhz is 270 and the ARM is at 500MHz?
EDIT2...DOH
That wasnt a great pipeline improvement was it, this is better:
.globl ARMTEST3
ARMTEST3:
subs r0,r0,#1
nop
nop
nop
nop
nop
nop
nop
nop
subs r0,r0,#1
nop
nop
nop
nop
nop
nop
nop
nop
subs r0,r0,#1
nop
nop
nop
nop
nop
nop
nop
nop
subs r0,r0,#1
nop
nop
nop
nop
nop
nop
nop
nop
subs r0,r0,#1
nop
nop
nop
nop
nop
nop
nop
nop
subs r0,r0,#1
nop
nop
nop
nop
nop
nop
nop
nop
subs r0,r0,#1
nop
nop
nop
nop
nop
nop
nop
nop
subs r0,r0,#1
nop
nop
nop
nop
nop
nop
nop
nop
bne ARMTEST3
bx lr
ARMTEST3
0x01000000 sub instructions
0x08000000 nop instructions
0x00100000 bne instructions
0x09100000 instructions
037000D7 system clocks
2.64 instructions per clock. 659Mips
I failed to get config.txt to work at first, then re-build a linux sd card, booted it to find that the /boot/ directory is in fact the fat partition that contains the gpu boot files and the kernel.img arm boot file. So NOT in a boot/ dir but in that same dir with the .bin's and .elf and .img file create config.txt and put arm_freq=something, the gpu bootloader then makes the modification to the pll multiplier so that when the arm starts it is at that speed. I still expect more than 700 million instructions per second and am not seeing that, will need to keep trying I guess.
A:
Might be worth looking at the boot loader provided with the Arch Linux reference distribution from the Raspberry Pi organisation's download pages. I have no idea whether it's a working option, but its config.txt includes the line
#arm_freq=800
There are also reports of people having overclocked the Pi - so information about initialising the clock is certainly out there, somewhere.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Adding result values from two different arrays together
Please take a look at my sample Fiddle
I have a running total for credits selected for Transfer. As you select the number of credits, the running total adds up. It's designed to stop at 6 credits per section. This part works fine.
What I'm trying to do is add two different result sets together...
Communications + Humanities = Total Credits
...and have it display in the Total Credits: field. This is where I'm getting lost.
What I can't figure out is how to add two different fields together...
This is what I'm using to get that final result... (the 72 is so that the count will stop at 72 transfer credits maximum)
JavaScript...
$(function($) {
$('#total_Credits select').change(function() {
var sum = 0;
$('#total_Credits select').each(function(idx, elm) {
sum += parseFloat(elm.value, 10);
});
$('#total_Credits').html(Math.min(sum,72).toFixed(2))
});
});
HTML...
Total Credits: <span id="total_Credits" style="color: red; font-weight:bold; font-size: 2em;"></span>
A:
You don't need a different function for each group of selects. Instead, you can just use
$(function($) {
var sum = function($els, prop) {
var s = 0;
$els.each(function(idx, elm) {
s += parseFloat(elm[prop], 10) || 0;
});
return s;
};
$('.select-wrapper select').change(function() {
var $wrap = $(this).closest('.select-wrapper');
$wrap.find('.sum').html(Math.min(sum($wrap.find('select'), 'value'),6).toFixed(2));
$('.total-sum').html(Math.min(sum($('.sum'), 'innerHTML'),72).toFixed(2));
});
});
Demo
Note I have modified a bit the html in order to make it work, and I have fixed problems like duplicate ids and nonsense <br>.
|
{
"pile_set_name": "StackExchange"
}
|
Tag Archives: bra
Japanese lingerie company Ravijour has come up with a revolutionary albeit unusual piece of lingerie dubbed as the “True Love Tester Bra.” As its name implies, the brassiere comes with built-in sensors that monitors its wearer’s heart rate and vital stats. The sensors also keep track of the secretion of a certain hormone called Catecholamine, which apparently is secreted only when a women is truly in love.
Data on these stats are sent via Bluetooth to a smartphone that’s running the bra’s companion app, which measures heart rate elevation, to determine whether it’s the real deal or just a fling. When it’s deemed to be the former, the app will wirelessly unhook the bra.
I don’t think you’ll be catching much of anything with these Pokeball bras unless you’re planning to wear just the bra (and nothing more) out in public. Of course, you’ll be getting a lot of attention and catching the eye of many, but it’ll probably be from the type of people you wouldn’t want it from.
These bras are crafted by Etsy seller Neon Wonderland and are geared for the true-blue Poke-fan. It won’t matter if you’re gifted or not in the chest area, because you can specify the padding level you want the brassiere to have when you place your order. Each Pokeball bra is encrusted in hundreds of rhinestones that will sparkle and shine with every move that you make.
Ladies and gents, feast your eyes on the World’s Largest Bra, which is a mega-sized 1222B! But before we talk about this ginormous piece of lingerie, let’s talk about the events that made it happen.
Bigger isn’t always better except when it has something to do with a certain part of your body–and by that, I mean your heart. (Just in case you were thinking of something else, which I totally had no intention of making you do. Snicker.)
In all seriousness, having a figuratively bigger heart opens your eyes to the plights of others and the realities of the world. Cancer takes away so many precious lives every year, especially breast cancer, and the sad thing is that some of these lives could have been saved by treatment, had they made the discovery sooner. One way to do that is by getting regular check-ups. And one way to remind men and women to do that is through an awareness campaign, like the ones that the Breast Cancer Campaign is doing.
Some people decided to help out the BCA this year and they did so with extremely huge efforts: by making the 97-foot long brassiere you see above (and after the jump!)
The earlier you catch it, the better your chances of treating it and living a longer life. I’m talking about the Big C. Every year, over 50,000 women are diagnosed with breast cancer–and a number of them will end up succumbing to the disease, depending on what stage their cancer is and on their overall health.
This is why I think the Breast Tissue Screening Bra is such a wonderful project! It’s a smart bra that’s equipped with sensors that can measure small temperature changes as they occur. The temperature spikes could mean nothing, but they could be caused by the growth of blood vessels which signal the growth of tumors. The sensors will take note of the chronology of cell cycles and use a pattern recognition system combined with statistical analysis software to pinpoint tumors even before mammograms can detect them.
OhGizmo! is a frequently updated blog that focuses on covering items that will appeal to a very specific and often very passionate audience: the geek. Aside from the fare of innovative consumer electronic products, the reader can expect to find news about geek culture, absurd inventions, awe inspiring technology, and an ever growing assortment of articles that we like to think fit within our view of what we’re calling the Geek Lifestyle.
|
{
"pile_set_name": "Pile-CC"
}
|
Politics is fun isn't it? You never know what's going to happen and you certainly don't know who is going to try to run for political office.
As well as your regular major parties there are plenty of others to chose from. You have your usual contenders in the form of The Monster Raving Loony Party and Cannabis is safer than Alcohol Party but sometimes you get a few unique independent's.
Joining the PM on stage for the count this year was Bobby 'Elmo' Smith - who, as you probably gathered , was dressed up like the fluffy red character from Sesame Street.
Bobby Smith is a father's rights activist and the founder of the Give Me Back Elmo Party - which he set up to campaign for changing the family courts.
Smith, a 34-year-old truck driver, stood in the Witney constituency against then Prime Minister David Cameron in 2015, and this year it was Theresa May's turn in Maidenhead.
Once the votes were cast and counted for, it was revealed Smith had only received 3 total votes against Mrs May's 37, 718.
Smith campaigns for father's rights, and came up with the Elmo platform after combining the first two letters of his daughter's names.
Speaking two years ago at a previous election Mr Smith said:
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
PHP cleanup "&$"
I'm trying to convert HTML to plain text. I get many &\#8217; &\#8220; etc.
I have tried:
html2text command line
html_entity_decode + ENT_QUOTES | ENT_HTML401 UTF-8
html_entity_decode(htmlentities($str))
strip_tags
trim
It did help a lot for cleaning up other things, but those &\#8217; “ don't get fixed. How can I convert them correctly?
A:
Did you tried "htmlspecialchars_decode"
<?php
$str = "<p>this -> "</p>\n";
echo htmlspecialchars_decode($str);
// note that here the quotes aren't converted
echo htmlspecialchars_decode($str, ENT_NOQUOTES);
?>
The above example will output:
<p>this -> "</p>
<p>this -> "</p>
|
{
"pile_set_name": "StackExchange"
}
|
Nitrous oxide and epinephrine-induced arrhythmias.
We asked whether the sympathomimetic effect of nitrous oxide (N2O) predisposed patients receiving N2O to arrhythmias in response to epinephrine administration. We also asked whether aging contributed to the development of arrhythmias, with or without N2O. One hundred patients having transsphenoidal hypophysectomy were randomly assigned to receive anesthesia including (n = 49) or excluding (n = 51) N2O. All patients were given an injection of epinephrine 1:200,000, with 0.5% lidocaine to produce hemostasis. Using intermittent 12-lead and continuous lead II electrocardiography, we determined the incidence of premature ventricular contraction, isorhythmic atrioventricular (AV) dissociation, and changes in T-wave morphology. Patients given N2O had a significantly higher incidence of isorhythmic AV dissociation (61.2% vs 41.2%). A trend toward a higher incidence of multiple premature ventricular contractions (16.3% vs 7.8%) was not statistically significant. Both anesthetic groups had a high incidence of postoperative changes in T-wave morphology (46.9% in the N2O group vs 50.9% in the group not given N2O). Aging alone did not affect the incidence of ventricular ectopic beats, isorhythmic AV dissociation, or changes in electrocardiographic morphology, but correlated with the development of ventricular ectopy during N2O anesthesia. We conclude that the use of N2O correlated with a higher incidence of isorhythmic AV dissociation in response to injection of epinephrine with lidocaine.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Epstein-Barr virus infection and immunity in bone marrow transplant recipients.
Studies on patients for up to one year following allogeneic, HLA-matched bone marrow transplants have shown no increased incidence of salivary Epstein-Barr (EB) virus secretion and no significant rise in EB-virus-specific antibody titers. EB-virus-specific cytotoxic T cells could be detected in the peripheral blood of all patients by six months posttransplant. For up to one year posttransplantation in vitro EB virus infection of peripheral blood B lymphocytes from the majority of patients leads to an abortive infection followed by cell death, and without the establishment of continuously growing cell lines. This abnormality appeared to be due to patients' monocytes, which formed a defective feeder cell layer in culture, and it could be circumvented by culturing the EB-virus-infected B cells from patients on a feeder layer of x-irradiated adherent cells from normal peripheral blood. These findings may explain the relative lack of EB-virus-associated lymphoma seen in bone marrow transplant recipients when compared with other groups of transplant patients.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Changes in phospholipid composition and calcium flux in LLC-PK cells cultured at low magnesium concentrations.
Monolayers of porcine kidney cells (LLC-PK) were grown in a series of Nu-Serum-supplemented media containing different Mg(2+) concentrations (480, 250, 25, 6.3 or 2.6 microM) to study the effect of Mg(2+) depletion on cellular phospholipid changes and the consequent effect on the membrane permeability to Ca(2+). Cells grown on 6.3 or 2.6 microM Mg(2+) showed a decrease in PE, PS, Sph, PI and an increase of PC. These changes were attributed mainly to the decreased rate of Sph synthesis through the transfer of phosphocholine from PC to ceramide, or due to the increase of PE N-methylation as found in Mg(2+)-deficient cells. The (45)Ca uptake was increased in cells grown on 25.0 microM Mg(2+), while it was decreased in cells grown on 6.3 or 2.6 microM Mg(2+). These changes in Ca(2+) uptake were related to changes of cellular phospholipids and fatty acids which affect adenylate cyclase activity in the membrane, as well as the membrane fluidity.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
I finished grouting my new bathroom tiles a weeks ago. I have noticed when I wipe the tile down with a damp cloth the grout darkens as if it has absorbed water. The grout is Bal superflex colour limestone. I have since applied two coats of Fila grout protector. But the grout still discolours when wet. Do I need to apply a waterproofing agent or is this normal. I do not want to start using the shower until I am sure the grout is waterproof.
Many Thanks
John.
Hi, Thanks for the reply.
Preparation:
All plaster removed, walls dry lined with the green plasterboard, plenty of adheshive to prevent any board bounce.
Two coats of sealer applied to the boards.
Tiles, adhesive and grout came from a friend of a friend that has a wholesale outlet. I told him the bathroom layout and he supplied what he termed a good adhesive (can't remember the name. Tiles were not grouted until they had been on for a week. Grout was applied with a grout gun which ensured deep penetration and finished of in the traditional way.
A friend has recommend a penetrating silicone sealer "aquamix for showers and baths" am I better safe then sorry.
John
DIY how to tutorial projects and guides - Did you know we have a DIY Projects section? Well, if no, then we certainly do! Within this area of our site have literally hundreds of how-to guides and tutorials that cover a huge range of home improvement tasks. Each page also comes with pictures and a video to make completing those jobs even easier!
|
{
"pile_set_name": "Pile-CC"
}
|
Sitosterolemia presenting with severe hypercholesterolemia and intertriginous xanthomas in a breastfed infant: case report and brief review.
Sitosterolemia is an autosomal recessive disorder characterized by increased intestinal absorption of plant sterols. It is caused by mutations in genes encoding ATP-binding cassette, subfamily G5 (ABCG5) or G8 (ABCG8), and clinical features include elevated plant sterol levels, xanthomas, and accelerated atherosclerosis. Although it was originally reported in patients with normolipemic xanthomas, patients with sitosterolemia also hyperabsorb cholesterol, and serum cholesterol levels tend to be elevated. We report an infant with sitosterolemia who presented with severe hypercholesterolemia and intertriginous xanthomas. A 15-month-old Korean girl presented with yellow dermal plaques over flexural areas including the wrist, neck, and gluteal folds, which were consistent with intertriginous xanthomas. The lesions were first noticed at 3 months of age when she was being exclusively breastfed. Her total cholesterol and low-density lipoprotein-cholesterol levels were 675 and 540 mg/dL, respectively. A low-fat/low-cholesterol diet and cholestyramine therapy were introduced. Unexpectedly, her serum cholesterol level decreased dramatically and normalized in 2 months. Cholestyramine was tapered off. The xanthomas also regressed and disappeared by 3 years of age. Gas chromatography-mass spectrometric analysis was performed with serum drawn at 3 years of age when her low-density lipoprotein-cholesterol was 118 mg/dL, which revealed striking elevation of her sitosterol level at 19.36 mg/dL. Direct sequencing for ABCG5 revealed compound heterozygous null mutations c.904+1G>A (p.Met302Asnfs*82) and c.1336C>T(p.Arg446*). Our case suggests that sitosterolemia can present with severe hypercholesterolemia and intertriginous xanthomas. Sitosterolemia should be suspected when a patient with hypercholesterolemia shows unexpectedly good response to dietary modification or bile acid sequestrant therapy.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Quantum dot based fluorometric detection of cancer TF-antigen.
Cancer is a major global health challenge that would benefit from advances in screening methods for early detection that are rapid and low cost. TF-antigen is a tumor-associated antigen displayed on cell surface proteins of a high percentage of human carcinomas. Here we present a fluorometric bioassay for TF-antigen (galactose-β-(1→3)-N-acetyl-d-galactosamine) that utilizes quantum dot (QD) technology coupled with magnetic beads for rapid detection of TF-antigen at high sensitivity (10(-7) M range). In the competitive bioassay, 4-aminophenyl β-d-galactopyranoside (4-APG) conjugated to QDs competes with TF-antigen for binding sites on peanut agglutinin (PNA) that is immobilized on magnetic beads. The bioassay is specific and ultrasensitive in the environment of complex protein mixtures, demonstrating its potential applicability for the screening of clinical samples.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
ISO 3166-2:MK
ISO 3166-2:MK is the entry for North Macedonia in ISO 3166-2, part of the ISO 3166 standard published by the International Organization for Standardization (ISO), which defines codes for the names of the principal subdivisions (e.g., provinces or states) of all countries coded in ISO 3166-1.
Currently for North Macedonia, ISO 3166-2 codes are defined for 71 municipalities.
Each code consists of two parts, separated by a hyphen. The first part is , the ISO 3166-1 alpha-2 code of North Macedonia. The second part is two digits (01–85). The codes are assigned in original Cyrillic Macedonian alphabetical order.
Current codes
Subdivision names are listed as in the ISO 3166-2 standard published by the ISO 3166 Maintenance Agency (ISO 3166/MA).
Subdivision names are sorted in Macedonian alphabetical order after romanization (different from the original Cyrillic order used to assign codes): a-c, č, d-s, š, t-z, ž.
Click on the button in the header to sort each column.
Changes
The following changes to the entry have been announced in newsletters by the ISO 3166/MA since the first publication of ISO 3166-2 in 1998. ISO stopped issuing newsletters in 2013.
The following changes to the entry are listed on ISO's online catalogue, the Online Browsing Platform:
Codes changed in Newsletter I-9
Codes deleted on 27 November 2015
See also
Subdivisions of Macedonia
FIPS region codes of Macedonia
NUTS codes of Macedonia
External links
ISO Online Browsing Platform: MK
Municipalities of Macedonia, Statoids.com
2:MK
*ISO 3166-2
Category:North Macedonia-related lists
|
{
"pile_set_name": "Wikipedia (en)"
}
|
The oil and gas industries have used “drilling muds” or drilling fluids for a considerable number of years to tap subterranean deposits of natural resources. These drilling fluids are pumped under pressure, from tanks at the wellhead, through the inside of the drill pipe. At the bottom of the bore hole, the fluid exits through openings in the drill bit. The fluid then returns to the surface through the annular space between the drill string and wall of the bore hole (or wall of the casing, where it has been put in place). Upon reaching the wellhead, the fluid is usually subjected to a number of treatments to remove gases and/or solids (e.g., drill cuttings, sand, and colloidal material), prior to recirculation of some or all of the drilling fluid.
Drilling fluids provide several important functions, including cooling and lubricating the drill bit, establishing a fluid counterpressure to prevent high-pressure oil, gas, and/or water formation fluids from entering the well prematurely, and hindering the collapse of the uncased wellbore. Drilling muds also remove drill cuttings from the drilling area and transport them to the surface where they can be separated.
As the total reserves of oil diminish, it has become necessary to drill in areas which were previously inaccessible due to technological or economic difficulties. This has led to the widespread use of oil based drilling fluids, which offer greater thermal and chemical stability than water based fluids and therefore allow drilling at extended depths and in other demanding services, such as those involving exposure to high electrolyte concentrations and soluble gases. For example, oil based drilling fluids have been used successfully in drilling hot (e.g., greater than about 150° C. (300° F.)) formations as well as those containing hydrogen sulfide. Also, to maximize recovery from each platform in offshore drilling, oil based fluids are favored due to their effectiveness for drilling deviated (i.e., angled) wells. In particular, the high lubricity of oil based fluids is necessary because of the increased torques required in deviated drilling.
The nature of oil based muds (and particularly emulsion muds) and their use to minimize high temperature gellation, contamination (e.g., by gypsum and cement), and other problems have been described, for example, by Simpson, et al. J. PET. TECH., p. 1177 (December 1961). Oil based fluids are also applicable to the drilling of clays and shales (such as those found in Western Canada) for which water-based drilling fluids are unsuitable due to heaving or sloughing caused by water imbibition into these permeable formations. In general, oil based drilling fluids are adaptable to a wide variety of formation types and wellbore conditions. Low maintenance costs as well as the ability to recycle oil-based muds contribute to their economic justification.
In contrast to true oil muds, which contain only a small amount of water, invert emulsion drilling fluids commonly contain at least 5%, up to as much as 50%, by volume of water. The water is dispersed in invert emulsions as aqueous droplets throughout a continuous (i.e., external) oil or synthetic oil phase, which may contain diesel fuel or other liquid hydrocarbon mixtures (e.g., olefinic and/or paraffinic species in the C16-C18 range). The aqueous dispersed (i.e., internal) phase is normally a saline, aqueous solution (e.g., a chloride containing brine solution, such as a 30% calcium chloride brine).
Invert emulsion drilling fluids typically result from the blending of a hydrocarbon oil with water or brine under high shear conditions and in the presence of a suitable emulsifier. Emulsification is complete when there is no distinct layer of water in the fluid. The emulsifier is required not only to form a stable dispersion of water droplets in the oil phase, but also to maintain any solids such as weighting material additives (e.g., barites) or drill cuttings in an oil-wet state. Besides these weighting materials, solid additives that are often incorporated into invert emulsion systems include organoclays and other materials that increase fluid viscosity, reduce fluid loss to the surrounding formation, and/or help suspend drill cuttings. Other additives include those which improve filtration control, hinder wellbore collapse, increase oil-wetting of solids, provide temperature stability, develop gel strength, and/or control rheology.
With respect to emulsifiers and other additives used in invert emulsion drilling fluids, various liquid and solid formulations are described in the art. For example, U.S. Pat. No. 2,946,746 describes water-in-oil type emulsions comprising a polyamide emulsifying agent which may be prepared by reacting a polyethylene polyamine with a monobasic fatty acid in sufficient quantity to react with all of the amino groups of the polyethylene polyamine, thereby converting them to fatty acid amide groups.
U.S. Pat. No. 4,233,162 describes an emulsifier composition comprising a fatty acid amide, oleic acid, dimerized oleic acid, and a surfactant dispersant that may be a mixture of a second type of fatty acid amide and a waste lignin liquor derived from pulping wood.
U.S. Pat. No. 4,374,737 describes a drilling fluid composition that uses a nonpolluting oil (e.g., vegetable or mineral oil) and a concentrate that is added in an amount of about 3% by weight. The concentrate consists essentially of a diethanolamide, a tall oil fatty acid, and an imidazoline/amide mixture. Water may be added to the composition to provide an invert emulsion system.
U.S. Pat. No. 4,508,628 describes an invert oil emulsion drilling fluid containing a non-toxic biodegradable oil, an aqueous phase, and an emulsifier. The drilling fluid has defined characteristics which provide low viscosity at the high shear rates imparted to the fluid during drilling.
WO 89/11516 describes an oil based well working fluid comprising a hydrocarbon drilling oil in combination with a sodium, calcium, or magnesium brine. The emulsifier used comprises the reaction product of an amide-amine or a hydroxyalkyl amide with a dicarboxylic acid or an acid anhydride.
U.S. Pat. Nos. 4,956,104; 5,045,593; and related patents describe the use of organophilic derivatives of water soluble polymers, prepared by reacting the polymer with a phosphatide such as lecithin, as fluid loss additives for oil based well working fluids.
U.S. Pat. No. 5,096,883 describes a non-toxic drilling fluid which can be an emulsion of a base oil, an aqueous phase, and an emulsifying agent. The base oil consists essentially of branched-chain paraffins, which may contain ester functionalities, and has a number of defined properties. The drilling fluid avoids the use of aromatics, which are said to have potential environmental consequences.
U.S. Pat. No. 6,461,999 describes the use of lubricating additives for drilling fluids which avoid the need for certain undesirable emulsifiers, surfactants, solvents, or dispersants. The additives are prepared by steam jet cooking a mixture of starch, water, and a lubricant such as a polyalkylene.
U.S. Pat. No. 6,620,770 and related U.S. Patent Application Publication Nos. 2004/0171498; 2005/0137093; and 2005/0037929 describe emulsion stability and filtration control additives for invert emulsion drilling fluids. The additives are prepared by blending a carboxylic acid terminated polyamide with the Diels-Alder reaction product of dienophiles (e.g., carboxylic acids, polycarboxylic acids, or acid anhydrides) and a mixture of fatty acids and resin acids.
There is an ongoing need in the art for emulsifier compositions having desirable emulsifying properties for invert emulsions used for oil well drilling. With space at some well sites limited, such as on offshore platforms, and with increasing costs of transport of materials to a well site, there is industry wide interest particularly in drilling fluid compositions which can be formulated and maintained (i.e., stored) with minimal or fewer quantities of solvent and other additives, compared to prior art compositions.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Rex Pipe & Supply
About
Rex Pipe & Supply, now a member of Hajoca Corporation, is a diverse family with a unique blend of cultures, histories and traditions. It's our passion that connects us, and sets us apart. We go the extra mile, every time, to deliver unparalleled service, unwavering integrity and unfailing reliability.
Our local team at Rex Pipe & Supply stocks over 8,000 different plumbing and heating items in our warehouse. We are open to the public as well as to contractors, plumbers, builders and architects. Beyond serving your needs with in-stock inventory, we have access to almost everything you may need and can provide direct shipments from vendors to easily fill your special orders.
We serve Ashland, Mansfield, North Columbus and the surrounding areas regularly.
|
{
"pile_set_name": "Pile-CC"
}
|
Characterization of the interleukin 1 receptor-associated kinase 4 (IRAK4)-encoding gene in salmonid fish: the functional copy is rearranged in Oncorhynchus mykiss and that factor can impair TLR signaling in mammalian cells.
The interleukin 1 receptor-associated kinase 4 (IRAK4) is an essential factor for TLR-mediated activation of the host's immune functions subsequent to pathogen contact. We have characterized the respective cDNA and gene sequences from three salmonid species, salmon, rainbow trout and maraena whitefish. The gene from salmon is structured into eleven exons, as is the mammalian homologue, while exons have been fused in the genes from the two other salmonid species. Rainbow trout expresses also a pseudogene at low levels. Its basic structure resembles more closely the primordial gene than the functional copy does. The N-terminal death domain and the C-terminal protein kinase domain of the factors are better conserved throughout evolution than the linker domain. The deduced amino acid sequences of the factors from all three species group together in an evolutionary tree of IRAK4 factors. Scrutinizing expression and function of IRAK4 from rainbow trout, we found its highest expression in head kidney and spleen and lowest expression in muscle tissue. Infecting fish with Aeromonas salmonicida did not modulate its expression during 72 h of observation. Expression of a GFP-tagged trout IRAK4 revealed, expectedly, its cytoplasmic localization in human HEK-293 cells. However, this factor significantly quenched in a dose-dependent fashion not only the pathogen-induced stimulation of NF-κB factors in the HEK-293 reconstitution system of TLR2 signaling, but also the basal NF-κB levels in unstimulated control cells. Our data unexpectedly imply that IRAK4 is involved in establishing threshold levels of active NF-κB in resting cells.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
define(['../function/makeIterator_'], function (makeIterator) {
/**
* Array some
*/
function some(arr, callback, thisObj) {
callback = makeIterator(callback, thisObj);
var result = false;
if (arr == null) {
return result;
}
var i = -1, len = arr.length;
while (++i < len) {
// we iterate over sparse items since there is no way to make it
// work properly on IE 7-8. see #64
if ( callback(arr[i], i, arr) ) {
result = true;
break;
}
}
return result;
}
return some;
});
|
{
"pile_set_name": "Github"
}
|
Lobelia leucotos
Lobelia leucotos is a small herbaceous plant in the family Campanulaceae native to Western Australia.
The perennial herb blooms between January and June producing white flowers.
The species is found in the Kimberley region of Western Australia where it grows in skeletal sandy soils.
References
leucotos
Category:Flora of Western Australia
Category:Plants described in 2000
|
{
"pile_set_name": "Wikipedia (en)"
}
|
//===-- RuntimeDyldCheckerImpl.h -- RuntimeDyld test framework --*- C++ -*-===//
//
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
// See https://llvm.org/LICENSE.txt for license information.
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
//
//===----------------------------------------------------------------------===//
#ifndef LLVM_LIB_EXECUTIONENGINE_RUNTIMEDYLD_RUNTIMEDYLDCHECKERIMPL_H
#define LLVM_LIB_EXECUTIONENGINE_RUNTIMEDYLD_RUNTIMEDYLDCHECKERIMPL_H
#include "RuntimeDyldImpl.h"
namespace llvm {
class RuntimeDyldCheckerImpl {
friend class RuntimeDyldChecker;
friend class RuntimeDyldImpl;
friend class RuntimeDyldCheckerExprEval;
friend class RuntimeDyldELF;
public:
RuntimeDyldCheckerImpl(RuntimeDyld &RTDyld, MCDisassembler *Disassembler,
MCInstPrinter *InstPrinter,
llvm::raw_ostream &ErrStream);
bool check(StringRef CheckExpr) const;
bool checkAllRulesInBuffer(StringRef RulePrefix, MemoryBuffer *MemBuf) const;
private:
// StubMap typedefs.
typedef std::map<std::string, uint64_t> StubOffsetsMap;
struct SectionAddressInfo {
uint64_t SectionID;
StubOffsetsMap StubOffsets;
};
typedef std::map<std::string, SectionAddressInfo> SectionMap;
typedef std::map<std::string, SectionMap> StubMap;
RuntimeDyldImpl &getRTDyld() const { return *RTDyld.Dyld; }
Expected<JITSymbolResolver::LookupResult>
lookup(const JITSymbolResolver::LookupSet &Symbols) const;
bool isSymbolValid(StringRef Symbol) const;
uint64_t getSymbolLocalAddr(StringRef Symbol) const;
uint64_t getSymbolRemoteAddr(StringRef Symbol) const;
uint64_t readMemoryAtAddr(uint64_t Addr, unsigned Size) const;
std::pair<const SectionAddressInfo*, std::string> findSectionAddrInfo(
StringRef FileName,
StringRef SectionName) const;
std::pair<uint64_t, std::string> getSectionAddr(StringRef FileName,
StringRef SectionName,
bool IsInsideLoad) const;
std::pair<uint64_t, std::string> getStubAddrFor(StringRef FileName,
StringRef SectionName,
StringRef Symbol,
bool IsInsideLoad) const;
StringRef getSubsectionStartingAt(StringRef Name) const;
Optional<uint64_t> getSectionLoadAddress(void *LocalAddr) const;
void registerSection(StringRef FilePath, unsigned SectionID);
void registerStubMap(StringRef FilePath, unsigned SectionID,
const RuntimeDyldImpl::StubMap &RTDyldStubs);
RuntimeDyld &RTDyld;
MCDisassembler *Disassembler;
MCInstPrinter *InstPrinter;
llvm::raw_ostream &ErrStream;
StubMap Stubs;
};
}
#endif
|
{
"pile_set_name": "Github"
}
|
Background
==========
Schizophrenia is a severe mental disorder with grave personal and social costs \[[@B1]\]. Approximately 1% of the population develops schizophrenia during their lifetime. Over the years, many genes have been reported to be responsible for the susceptibility to schizophrenia \[[@B2]\]. In general, schizophrenia is considered to be a complex disease with multiple genetic and environment etiological factors. Linkage analysis, association and positional cloning studies and candidate gene approaches \[[@B3]\] have been successful in identifying risk genes. The way in which multiple genes, each possibly having a small individual contribution, leads to vulnerability and then the pathophysiology, remains to be elucidated. In order to figure out the relationship among those genes, we should investigate not only in gene-gene interaction level but also a whole picture at the protein level. Recent works to map the protein-protein interaction (PPI) in human to curate human metabolism and regulatory networks offer the relationships among different disease genes \[[@B4],[@B5]\]. The protein clusters in the network may represent the modules with biological functions \[[@B6]\]. It is also reported that if the disease candidate genes are treated as a phenotype, these genes are likely to be function together in the normal cell \[[@B7]\].
In this study, we provided a novel strategy by taking advantages of PPI to discover the regulatory mechanisms among disease candidate genes. We speculated that disease candidate genes may cluster together in a functional network at a protein level. Protein complexes interact with preferred partners to form a biological module serving a specific collective function \[[@B8]\]. When using a network-clustering method by calculating the pairwise distance in the protein interaction network \[[@B6]\], two major protein clusters were found which were involved in synaptic transmission and signal transduction protein cluster. We proposed a model to explain the interaction between NRG1 and CACNG2 which not only fell into the synaptic transmission cluster at protein interaction level but also associated at the gene-gene interaction level.
Recent molecular studies implicate neuregulin1 (NRG1) as the most promising risk factor for schizophrenia \[[@B9],[@B10]\]. Liu and colleagues also found suggestive linkage evidence of schizophrenia to loci near NRG1 on chromosome 8p21 in an ethnically distinct Taiwanese sample \[[@B11]\]. There is also evidence that this genetic risk is elevated when accompanied by genetic changes in the gene for ErbB4, one of neuregulin\'s binding partners. NRG1-mediated ErbB signalling has important roles in neural development \[[@B12]-[@B14]\], as well as in the regulation of neurotransmitter receptors thought to be involved in the pathophysiology of schizophrenia \[[@B15]\]. Hahn and colleagues suggest that enhanced endogenous NRG1-ERBB4 signalling may be responsible for N-methyl-D-aspartate receptors (NMDARs) hypofunction of the disease state \[[@B16]\]. NMDA receptors are a major subtype of glutamate receptors and mediate slow excitatory postsynaptic potentials (EPSPs). Glutamate is the major excitatory neurotransmitter in the brain, and it has been proposed that disruption in glutamate signalling may underlie many of the symptoms of schizophrenia \[[@B17]\]. NRG1 reduces the tyrosine phosphorylation of NMDA receptors, a modification that is triggered by the binding of NMDA or glutamate. NMDAR hypofunction may contribute to the symptomatic features of schizophrenia \[[@B18]\]. ERBB4 associates with NMDAR via DLG4 (also called PSD95), and the binding to DLG4 is probably involved in the enhanced activation of ERBB4. This association provides a physical link between ERBB4 and the NMDAR. These findings add to our basic understanding of glutamatergic transmission, which has been implicated in the pathogenesis of schizophrenia.
CACNG2, also known as stargazin, was found to interact directly with AMPA receptor and allow interaction of the receptor with the scaffold proteins of the postsynaptic density, such as DLG4 \[[@B19],[@B20]\]. In a previous linkage study of schizophrenia that included Taiwanese samples, CACNG2 was also reported as a vulnerability gene for neuropsychologically defined subgroups of schizophrenic patients \[[@B21]-[@B23]\]. Bats and colleagues found that a mutation in PDZ domain of CACNG2 will increase AMPA receptor diffusion. CACNG2 regulates trafficking of AMPA-type glutamate receptors and stabilizes them at the postsynaptic density when neurotransmitters are received \[[@B20]\].
Results and discussion
======================
Products of candidate disease genes form two major clusters in a schizophrenia-related protein interaction sub-network
----------------------------------------------------------------------------------------------------------------------
There are two major types of reactions which are complex formation and covalent modification in the signalling pathway. Both types of reactions have protein-protein interactions (PPI), which can be detected by high throughput methods. It has been shown that proteins which are involved in the same pathway, are likely to cluster together in the PPI network \[[@B8]\]. If the candidate genes may increase the risk of acquiring a disease synergistically, it implies that these genes are likely to work together in the normal cell \[[@B7]\]. Taking these two observations together, it is likely that the products of candidate genes may cluster together in a protein network. Therefore, we have collected 36 reported candidate genes from the literature and used them as a query set to retrieve the nearest neighbours of the candidate proteins. There were in total 831 human proteins retrieved from 6 major PPI databases (see Materials and Methods section). Interestingly, the retrieved interactions linked the gene products of these candidate genes in a big cluster even though these genes were found by a different approach (Figure [1](#F1){ref-type="fig"}). This result implies that the products of these candidate genes may be important candidates and they will work together in the cell.
{#F1}
In order to cluster proteins that are close to one another, the distances between every pair of these 831 proteins were computed by using a standard algorithm based on shortest-path of network topology \[[@B6]\]. On the basis of these pairwise distances, two major clusters (Figure [2](#F2){ref-type="fig"}) were found by using a visualization tool, called Generalized Association Plot (GAP) \[[@B24]\]. By examining the enriched gene ontology terms for the members of these two protein clusters \[[@B25],[@B26]\], the possible function of these clusters was identified. As shown in figure [1](#F1){ref-type="fig"}, the small cluster (cluster 1), which contains PPP3CC, NOTCH4, RASD2 and BMP6 genes, may be involved in signal transduction. The large cluster (cluster 2), which contains the NRG1 and CACNG2 genes, may be mainly involved in synaptic transmission and sometimes in neural development. NRG1 and CACNG2 were both reported as vulnerability genes from an association study of schizophrenia that included Taiwanese samples \[[@B11],[@B22]\]. These two genes were found to have strong interaction on the basis of linkage and association studies (unpublished data). Thus, it would be interesting to see how these functionally unrelated genes act synergistically in the development of schizophrenia.
{#F2}
Discovering the protein interactions between NRG1 with CACNG2 according to biological interpretationIn order to explore the detailed relation between NRG1 and CACNG2, the cluster 2 sub-network was extracted from the original large network for further study. This cluster contains 7 gene products of candidate genes, which content DPYSL2, CRTC1, DISC1, CACNG2, KCNJ12, PTK2B and NRG1, and 204 interacting proteins; part of this cluster is shown in Figure [3](#F3){ref-type="fig"}. The NRG1 protein is connected to CACNG2 protein via the ERBB and DLG protein families, which are known to be involved in glutamatergic signalling process \[[@B12]\]. Since cluster 2 proteins were retrieved by the nearest neighbor approach, this subset of proteins will definitely lose some interacting proteins excluded from the sub-network in the disease forming process. Hence, the second or even third neighbors may be needed to propose a biologically plausible mechanism. This step was done manually and the goal is to recover the proteins that may affect synaptic transmission. Therefore, membrane receptors that may link the function of NRG1 and CACNG2 were added to this sub-network. Two major protein families were added, which were the NMDA receptor subunits and the AMPA receptor subunits, respectively. Both receptors are calcium channels that are triggered by glutamate \[[@B27]\]. Thus, they have the potential to act synergistically. DLG4 protein is an important intermediate between NRG1 and CACNG2, because DLG4 protein is interacting with ERBB4, which may receive a signal from NRG1. On the other hand, DLG4 is interacting with both the NMDA and AMPA receptors. As a result, both receptors may receive the NRG1 signal from neighboring neuron cells.
{#F3}
Since functionally related genes are usually co-regulated, we went further to check whether these genes were co-regulated in the brain tissue. If disease is considered as a perturbation to the normal state, different brain tumors may perturb a given gene to different extent. The GSE4271 microarray data set deposited in Gene Expression Omnibus at National Center for Biotechnology Information contains 100 samples from 15 assigned subsets \[[@B28]\]. These gene expression data have been used to compute the correlation of the gene expression for each pair of genes and to establish a relevance network \[[@B29]\]. Since disease is treated as a perturbation, this disease sample-derived network actually represents the co-expression in relation to normal cells.
As shown in Figure [4](#F4){ref-type="fig"}, NRG1, DLG4 and NMDA receptor (GRIN complex) genes showed strong correlation (correlation coefficients above or equal to 0.64). The fact that these gene pairs are correlated implies that their expressed proteins should also be functionally coordinated. The DLG4 gene has a reasonable correlation (coefficient = 0.45) with the CACNG2 and AMPA receptor (GRIA complex) genes. The correlation of gene expression between NRG1 and CACNG2 is less strong (coefficient = 0.36), because CACNG2 may not be the rate-limiting component in the downstream pathway.
{#F4}
A working hypothesis for interpreting the interaction between NRG1 and CACNG2 genes
-----------------------------------------------------------------------------------
As described previously, DLG4 appears to be a hub, which receives the NRG1-ERBB4 signal and then relays the signal to the NMDA receptor and the CACNG2.
Hahn and colleagues suggest that schizophrenia is marked by increased NRG1-ERBB4 signalling and may lead to further suppression of NMDA receptor function by reducing NMDAR tyrosine phosphorylation \[[@B16]\]. Yau and his colleagues demonstrated that the NMDAR in the synaptic sites of ErbB4-deficient mice were more abundant than that of wild-type control and releasing NRG to activate ERBB4 signalling will decrease synaptic activation of NMDA receptors \[[@B30],[@B31]\]. They suggested that this activated ERBB4 signalling will stimulate internalization of NMDA receptors in the synaptic sites. As a result, an increase in the NRG1-ERBB4 signal may either reduce the tyrosine phosphorylation of NMDA receptor or enhance the internalization of NMDA receptor in the postsynaptic neuron (Figure [5A](#F5){ref-type="fig"}). It is not clear whether these two mechanisms are exclusive at this point. The hypo-phosphorylation event may decrease the glutamate binding and consequently decrease the calcium influx. Alternatively, the internalization of receptor could be mediated by the enhanced interaction between DLG4 and internalized NMDA receptors. Therefore, less NMDA receptor will be available on the membrane and the capacity for cation influx (mainly calcium influx) will decrease.
![**A glutamatergic synapse focusing on the organization of DLG4 protein**. A) The increased NRG1-ERBB4 signaling may lead to hypophosphorylation of GRIN complex \[[@B16]\] or internalization of GRIN complex \[[@B30]\] in postsynaptic neuron. Less NMDA receptor will be available on the membrane and the capacity for cation influx (mainly calcium influx) will decrease. B) A direct interaction between CACNG2 and DLG4 mediates the synaptic delivery of GRIA complex \[[@B38]\]. The anchored CACNG2 may recruit the GRIA complex to the synaptic region \[[@B20]\] and increase the cation influx. Phosphorylation of DLG4 will release it from the cytoskeleton \[[@B32]\] and fail to recruit the GRIA complex efficiently. C) Taken together, DLG4 links two mechanisms to decrease the cation influx at the synaptic area. The presence of gene variations in both NRG1 and CACNG2 may thus create synergistic effect to affect the influx of Ca^2+^.](1471-2105-9-S12-S23-5){#F5}
On the other hand, the interaction between CACNG2 and DLG4 may anchor CACNG2 on the cytoskeleton. The anchored CACNG2 may recruit the AMPA receptor to the synaptic region \[[@B20]\] and increase the cation influx. Phosphorylation of DLG4 will release it from the cytoskeleton \[[@B32]\] and fail to recruit the AMPA receptors efficiently (Figure [5B](#F5){ref-type="fig"}). Although the calcium-dependent tyrosine kinase PTK2B is interacting with the DLG4 protein (see Figure [3](#F3){ref-type="fig"}), it is not clear whether PTK2B is catalyzing this reaction. This enzyme has been shown to regulate the activation of calcium channels \[[@B33]\]. Because there are less AMPA receptors in the synaptic area, the capacity for cation influx (mainly calcium influx) will also decrease. Taken together, DLG4 links two mechanisms to decrease the cation influx at the synaptic area. The presence of gene variations in both NRG1 and CACNG2 may thus create a synergistic effect to affect the influx of Ca^2+^(Figure [5C](#F5){ref-type="fig"}). It has been shown that the schizophrenia patient has more NRG1-ERBB4 complex in the synaptic area than controls. This model specifically predicts that schizophrenia patients will have less cation influx in the synaptic area. Because both NMDA and AMPA receptors are triggered by glutamate, this model also predicts that glutamate may play an important role in pathogenesis. Many of the evidence for the glutamate hypothesis of schizophrenia implicate the NMDA-type glutamate receptor. But the glutamate role may be more complex because there are hints that AMPA receptors also contribute to schizophrenia symptoms, both independently or via effects on NMDA receptors \[[@B34]\].
Conclusion
==========
DLG4, which receives the NRG1-ERBB4 signal and then relays the signal to the NMDA receptor and the CACNG2, links two mechanisms to decrease the cation influx at the synaptic area. On the basis of the protein interaction network, the NRG1-triggered NMDAR protein internalization and the CACNG2 mediated AMPA receptor recruiting may act together in the glutamatergic signalling process. Since both the NMDA and AMPA receptors are calcium channels, this process may regulate the influx of Ca^2+^. Ca^2+^is necessary for transmission at the neuromuscular junction and other synapses. Reducing the synaptic calcium influx due to variants of NRG1 and CACNG2 might explain the basis of schizophrenia. This PPI network analysis approach combined with the support from co-expression analysis may provide an efficient way to propose disease mechanisms for various highly heritable diseases.
Materials and methods
=====================
Constructing a protein network
------------------------------
Protein-protein interaction data were obtained from Integrated Protein Interaction Resource (IPIR, <http://ymbc.ym.edu.tw/ipir>). IPIR has integrated protein-protein interaction information from BIND, DIP, HPRD, MINT, MIPS and IntAct databases. In this case, we chose brain, cerebellum, cerebrum and nervous as tissue filter. By using 36 candidate proteins as a data set to look for its primary protein neighbours and secondary protein neighbours, there were 831 proteins retrieved from databases. This network is displayed by Cytoscape which provides basic functionality for a visual representation of the graph and integrated data \[[@B35]\].
Pairwise distance matrix by generalized association plots (GAP)
---------------------------------------------------------------
For each biological network investigated, relevant proteins (nodes) and the interaction among them (edges) were assembled as follow. Each edge in the network was assigned a length of one. A pairwise distance matrix contains the length of shortest path between every pair of proteins in the network. Each distance in the matrix was shown as an \"association\", defined as 1/*d*^2^, where *d*is the shortest path distance. Generalized Association Plots (GAP) \[[@B24]\], which is a graphical environment for matrix visualization and information mining, were used to view this results. We have used the Gene Ontology annotations to assign functional category labels to the proteins of the PPI network \[[@B25]\]. GoMiner, a tool for biological interpretation of gene sets, was used to annotate the enriched gene ontology terms of these protein clusters \[[@B26]\]. GoMiner used the Gene Ontology (GO) to identify the biological processes, functions and components represented in gene lists.
Calculating the correlation values among genes
----------------------------------------------
The microarray data was obtained from Gene Expression Omnibus (GEO) \[[@B36]\], and the accession number for the data series is GSE4271 \[[@B28]\]. Robust Multichip Average (RMA) normalization was performed to compute gene expression values for Affymetrix data and to carry out quality assessment using probe-level metrics \[[@B37]\]. After normalizing the microarray data, we used the Pearson\'s correlation, performed by a Perl module called \"Statistics::RankCorrelation\", to represent the correlation coefficient of each pair of probe sets.
Competing interests
===================
The authors declare that they have no competing interests.
Authors\' contributions
=======================
Ueng-Cheng Yang has designed the approaches and made a preliminary analysis. Pei-Chun Hsu has extended the analysis and jointly proposed the working hypothesis with Ueng-Cheng Yang. Kuan-Hui Shih has performed the co-expression analysis for brain tissue by using public microarray data. Hai-Gwo Hwu and his research team have provided the disease candidate genes and the domain knowledge for schizophrenia.
Acknowledgements
================
We thank to Dr. Hsin-Chou Yang in the Institute of Statistical Science, Academia Sinica for helpful discussion and Dr. Chia-Huei Lee in National Health Research Institute for providing array-CGH data. This work was supported by grant NSC-96-3112-B-010-015 from National Research Program for Genomic Medicine, National Science Council (Taiwan).
This article has been published as part of *BMC Bioinformatics*Volume 9 Supplement 12, 2008: Asia Pacific Bioinformatics Network (APBioNet) Seventh International Conference on Bioinformatics (InCoB2008). The full contents of the supplement are available online at <http://www.biomedcentral.com/1471-2105/9?issue=S12>.
|
{
"pile_set_name": "PubMed Central"
}
|
Western Slope terrain a tough go for fiber-optic line
WASHINGTON – Congressional lawmakers questioned broadband industry experts during a hearing on Capitol Hill on Wednesday, at times focusing on a contentious project meant to build an intranet across Colorado.
As part of the project, Eagle-Net Alliance is building a fiber-optic line to Silverton and other rural Colorado towns. But the company’s undertaking – a project that is supposed to build high-speed communications lines to schools and government buildings across the state – has been suspended since early December because of environmental concerns.
The suspension should be lifted in the next four to six weeks, Eagle-Net officials said.
The project is funded by a three-year, nearly $101 million federal grant through the American Recovery and Reinvestment Act, better known as the stimulus bill.
Wednesday’s hearing was the second in two days where Eagle-Net’s practices were questioned. State legislators expressed frustration with the company during a one-hour hearing of the Legislative Audit Committee on Tuesday.
Similar frustrations were echoed in Washington on Wednesday, although no Eagle-Net officials offered testimony during the hearing.
“We weren’t invited, and we weren’t asked to be there,” said Eagle-Net spokeswoman Gretchen Dirks.
Instead, lawmakers, with U.S. Rep. Cory Gardner, R-Yuma, and Diana DeGette, D-Denver, leading the charge, grilled Lawrence Strickling, a U.S. Department of Commerce official, about Eagle-Net’s progress.
Strickling works in the National Telecommunications and Information Administration, which is a part of the Department of Commerce.
Strickling often sidestepped direct questions from Gardner and DeGette, including when Gardner asked him if Eagle-Net had overbuilt the Eastern Plains while leaving the Western Slope without broadband.
That depended on the definition of overbuilding, Strickling said, but later added that the Western part of the state is underserved because of economic reasons.
“In order to be able to economically serve the Western part of the state,“ Strickling said, there needs to be enough people to sustain the project.
“There are huge advantages to a statewide approach to this,” he said.
Later, Gardner asked Strickling to grade Eagle-Net’s progress.
“I wouldn’t speculate on a grade,” Strickling said.
Pete Kirchhof, executive vice president of the Colorado Telecommunications Association, also testified.
Eagle-Net has ignored the Western Slope, Kirchhof said, where broadband facilities are desperately needed.
But Eagle-Net officials defended the project, saying the Western Slope’s mountainous terrain makes it difficult to build quickly.
“For them to say nothing’s happened in the West is completely inaccurate,” Dirks said. “It’s a geographically challenged build that takes longer to complete.”
Eagle-Net still needs to build a line from Pueblo to Durango as part of its plan. Web traffic in southern Colorado currently is routed through Albuquerque. The company also plans to build a spur to Silverton.
Stefanie Dazio is a student at American University in Washington, D.C., and an intern for The Durango Herald. You can reach her at sdazio@durangoherald.com.
|
{
"pile_set_name": "Pile-CC"
}
|
The archived blog of the Project On Government Oversight (POGO).
Sep 21, 2012
This week another major defense contractor used its employees as political pawns in its campaign to halt planned reductions in Pentagon spending.
The Los Angeles Times reported on Monday “Northrop to shed nearly 600 jobs.” The article includes all of the industry’s talking points about “budget uncertainties,” “jobs lost,” and “more cuts,” and even uses the erroneously high $600 billion amount for defense sequestration (the correct amount is $492, as ProPublica’s critique of media using the $600 billion figure illustrated). Unfortunately, the article not only overstates the actual amount of Pentagon sequestration by more than $100 billion, it also fails to put Northrop’s job-shedding into context. For those interested in a little more balance in their sequestration news, here are a few facts to mull over before jumping on the contractor “doomsday” bandwagon.
First, Northrop has reduced its workforce every year since 2008, cutting thousands of workers every year during a time in which its Department of Defense contract dollars remained fairly constant. Employment figures from its SEC filings for 2008, 2009, 2010, and 2011 chronicle this downsizing. Northrop wasn’t the only defense contractor to cut jobs either. In the past five years the top five defense contractors—Lockheed Martin, Boeing, General Dynamics, Northrop Grumman, and Raytheon—collectively cut nearly 20,000 jobs while their contracts from the DoD increased by more than $10 billion. In short, if there is any connection between revenue and employment it has, at least recently, been in the opposite direction that Northrop would have us believe.
Jan 03, 2012
By DANA LIEBELSON
This week, Defense Secretary Leon Panetta is poised to deliver his recommendations on at least $450 billion in defense cuts over the next ten years, according to The New York Times. Although the paper outlines several important potential cuts (in a nifty multimedia chart!)-it fails to include on its list of targets something that should have a huge bull’s eye: Department of Defense (DoD) service contractors.
According to the Pentagon’s own analysis of personnel costs dated January 2011, service contractors are “increasingly unaffordable.” That same analysis goes on to say that “the savings are here” and growth in spending on service contractors “has been unchallenged.” The chart shows that former Defense Secretary Robert Gates’ short-lived insourcing initiative only touched a tiny speck of the hundreds of billions the DoD spends each year on service contracting.
POGO found in its “Spending Less, Spending Smarter” report, that reducing spending on DoD service contractors by 15 percent would save about $300 billion over ten years. In FY2010 alone, DoD service contractors cost taxpayers more than $200 billion—$50 billion more than the cost of all uniformed personnel. Also, POGO’s analysis of 35 comparable job occupations fulfilled by federal employees and by government contractors found that, on average, contractors cost significantly more than federal workers.
Apr 13, 2011
By Nick Schwellenbach
This morning the Associated Press got it wrong on defense spending. Base budget Department of Defense (DoD) appropriations are not being cut as they claim in their article, “Spending Cuts Bill Hits Defense And Foreign Aid.” The lede: “Tea partyers insistent on cutting military spending and foreign aid will find plenty to like in the spending deal struck by President Barack Obama and congressional leaders.”
The AP reporter, Donna Cassata, claims there is a cut because what Congress has appropriated is less than what the White House wanted. The big problem? The White House, House Speaker John Boehner and Senate Leader Harry Reid have agreed on $513 billion for DoD: $5 billion MORE than last year’s amount. It may be the only major department that got a bump up in funding in the discretionary part of the federal budget (some agencies, such as Securities and Exchange Commission, did get an increase). This is hardly a cut.
Mar 31, 2011
By Danielle Brian
Come to find out, Monday's meeting between myself, four other open government advocates, and President Obama wasn't listed on the White House daily schedule. Surprising, considering that the first meeting was listed on that calendar, and the President even noted that we would be listed on the White House visitor logs.
As I told The Washington Post, it was sheer stupidity that the meeting wasn't listed on the calendar. But this was not exactly a "secret meeting," as some reports have implied. It had been on the President's public daily schedule when it was initially slated for March 16. We had expected that the rescheduled meeting would be open to the press—but it is an overreach to say that the integrity of the meeting was compromised when we found out (right before the meeting) that it would not be open to the press. A White House videographer was taping the meeting, and we understood that video footage of the event would be available soon. I also thought that between the five of us—most of whom had planned ahead of time to write about the meeting—we'd have it prettywellcovered.
There are plenty of reasons to criticize Obama and his administration for their shortcomings in the open government arena—issues much bigger than the mistake of not putting this meeting back on the calendar once it was rescheduled. If the hullabaloo over our meeting with the President has focused attention on these bigger issues, even better.
So, while it's upsetting the way the White House bungled an opportunity to practice the transparency that it preaches, I stand by our reason to meet with the President—both to thank him for his commitment and highlight our priorities for what still needs to happen—and reject the notion that our principles have somehow been compromised by the meeting. I'm encouraged that it might produce tangible results in advancing important open government initiatives.
Danielle Brian is POGO's Executive Director. Read her first post about the meeting with the President here.
According to a new analysis by Heritage Action for America *, the lobbying arm of the conservative think tank the Heritage Foundation, freshman Republicans in the House have, on average, voted against defense cuts more than other House Republicans. At about one third of the discretionary federal budget, the more than $600 billion annual defense budget (and up to $1.2 TRILLION for the entire national security budget, depending on how you count it)—which has doubled in size since 9/11—is not currently facing any serious challenges from House GOP freshmen. It’s not for a lack of numerous proposals, such as the bipartisan Deficit Commission’s detailed defense proposals.
However, you might not know it reading some news reports. To be fair, some news outlets note that “most Tea Party candidates spoke little about national security and the military in fall political campaigns focused on cutting spending over all,” as one New York Timesarticle did in January.
But take, for instance, news coverage the last few weeks on an amendment to cut $450 million in funding for a second engine for the Joint Strike Fighter that passed the House (President Barack Obama and Defense Secretary Robert Gates, as well as the Bush Administration have for years opposed the second engine). In the wake of that move—which does not mean funding for the second engine is canceled, at least not yet—several news outlets reported that this shows that GOP freshmen are willing to take on defense. That’s not quite right, at least not yet.
Dec 20, 2010
Where there's smoke, there's fire. POGO's Morning Smoke is a collection of the previous day's investigations, scoops, and opinions related to the world of government oversight. Have a story you'd like to see included? Contact POGO's blog editor.
Aug 20, 2010
According to The Huffington Post, infighting, racism, name-calling, and document tampering are tearing the House Oversight and Government Reform Committee asunder:
The main dispute is between a subcommittee staff director and a subcommittee clerk, with partisans of each dragged into the dispute, according to emails reviewed by HuffPost. The clerk, Jean Gosa, who has been a Hill staffer for more than 35 years, is now the subject of a personnel complaint and could be terminated within the week, according to a memo she wrote to the committee's chairman, Ed Towns (D-N.Y.). "Jaron Bourke filed a personnel complaint against Jean Gosa. The
complaint is currently under investigation. No decisions have been
made," said committee spokeswoman Jenny Rosenberg in a statement to
HuffPost, declining to comment further.
But it doesn't stop there—while he's at it, Ryan Grim at HuffPo takes a leap to fan the flames of a presumed conflict between Committee Chair Ed Towns and Ranking Member Darrell Issa (R-CA), and also calls into question Rep. Towns' performance as Chair.
Maybe it's just a slow news week. All this comes as a surprise to POGO—though we haven't worked specifically with the subcommittee staffers mentioned, we do work closely with the Committee on many issues, and we've found the staff to be highly professional and dedicated. Furthermore, we've observed that the Towns and Issa camps have been working cooperatively in many areas—for example, on enhancing protections for federal whistleblowers. The two have also been like-minded on other issues, such as reforming the Minerals Management Service (MMS) in the wake of the oil spill (here and here) and eliminating secrecy at the Securities and Exchange Commission (exhibit A, exhibit B).
And lastly, though media attention may matter, what really matters is the quality of the work. Mr. Issa has put forward several bills POGO supports. And when it comes to Towns' body of work as Committee Chair, his record as both an investigator and as a legislating Chair has been far from shabby. He and his staff continue to work tirelessly behind the scenes on many issues important to POGO like whistleblower protections and reforms to the Inspector General system.
Jun 18, 2010
Yesterday POGO Executive Director Danielle Brian testified before the House Natural Resource Committee's Subcommittee on Energy and Mineral Resources about the reorganization of the Minerals Management Service (MMS). Just about every reporter and every other person focusing on the Deepwater Horizon disaster was busy covering Energy and Commerce's firing-squad treatment of BP CEO Tony Hayward. The lack of attention on this hearing was disappointing—not just because Hey! POGO was testifying!—but because I think it's indicative of how the MMS became a little agency with a lot of responsibilities that largely escaped the kind of tough oversight that would force it to become effective. To whatever extent reporters think their job is to act as a watchdog for citizens—which means looking out for future and current problems, not just looking back and shaking your head—there should've been more people at the press table.
Though I didn't witness it in person, I will say that Representative Barton's (R-TX) since-rescinded apology to BP (that he doesn't want to "live in a country where anytime a citizen or a corporation does something that is legitimately wrong is subject to some kind of political pressure") is indicative of how many in Congress and the federal government have treated the oil industry: not just as government partners, but as the power players in the relationship that don’t need to be held accountable for their actions.
For those who are genuinely concerned about making sure that development of our natural resources is conducted responsibly, the Subcommittee's hearing was the one that mattered. In what has been a very partisan committee, an important bipartisan consensus has emerged: MMS is broken. But it's important to note that this conventional wisdom isn't new for most people who've bothered to pay attention to MMS. The Government Accountability Office (GAO), Interior's Inspector General (IG), and POGO all provided testimony based on many years of public reports that this is an agency with a broken culture struggling to maintain the technical expertise (and we'd underscore, the political will and intellectual confidence) to ensure that industry is complying with regulations. And in some cases, making sure they're at least calling industry on what's almost complete BS, like the claim that MORE THAN 100 percent of their production should be exempt from royalties because they were using more than they were harvesting for on-site operations. Representative John Sarbanes (D-MD) hit the nail on the head when he said that it seems pretty clear that "MMS gave industry the keys to the kingdom."
POGO's testimony supported the intent of the reorganization to separate out MMS's conflicted missions, but focused primarily on the agency's broken culture due to the revolving door, dependence on industry, and lack of transparency. Some of the reactions to our testimony illuminate how this agency got into the shape that it did. Representative Cynthia Lummis (R-WY) seemed to be very skeptical about implementing tougher revolving door regulations, asking Danielle:
Whether we had a chart prescribing different cooling off periods for each position at MMS (usually about two years, and Danielle said something along the lines of "Frankly, for the Director of MMS, I'd be comfortable with a lifetime ban on going to work for the industries he was overseeing.");
If she was uncomfortable with the fact that former MMS Director Randall Luthi used to be the head of the Fish and Wildlife Service. (Danielle said no, since we're concerned about when people have a financial interest. We had highlighted the fact that he was now the President of the National Oceans Industries Association as an "egregious" example of how bad things are at MMS.); and
If we're concerned that this kind of revolving door prohibition would result in the heads of MMS not knowing anything about the industry they're regulating (Danielle pointed out that the technical expertise is needed at lower levels in the agency and for advisors, that the Director of MMS's skill set must largely be managerial, and that we've seen that those skills aren't so narrowly defined —a former Energy Department Deputy Secretary, for example, went on to a lucrative career heading a Telecommunications group—an industry that he had no part of at DOE).
Rep. Lummis’s questions represent common doubts about—and frankly, strawman arguments against—the feasibility of revolving door restrictions. Overall, the Subcommittee conducted an excellent hearing that should provide them with a lot of useful information as they mark up Chairman Nick Rahall's (D-WV) Consolidated Land, Energy, and Aquatic Resources Act of 2009 (H.R. 3534) to ensure that MMS and the Bureau of Land Management (BLM) have the tools they need to be effective inspectors, regulators, and collectors of royalties. Our fingers are crossed that Representative Bill Cassidy's (R-LA) agreement with POGO that more transparency is needed at MMS means that this will be part of the legislation when it's re-introduced.
Sep 18, 2009
Tsk Tsk, Washington Post, for equating “Tattle-Tale” with “whistleblower,” when describing the new Matt Damon movie “The Informant!” on
its homepage.
The film itself perpetuates an inaccurate and
dangerous myth that those who choose to blow the whistle are unstable,
anti-social, etc., by focusing on the mental health issues of the real-life Mark
Whitacre, who exposed a massive and global price-fixing operation at his
employer, ADM. We agree with the observation of Tom Devine from the Government
Accountability Project, who concluded when the curtain closed at a
special pre-screening of the film for groups who work with whistleblowers, “Thank
God this film was not named ‘The Whistleblower.’”
The film did have some funny moments. It also highlights how
important insiders are in bringing to the surface wrongdoing — without Whitacre
it’s unlikely that ADM would have ever been caught, fined, or had some of the
ringleaders serve time in prison.
But for those who see the film this weekend, it is important
to keep in mind the reality of whistleblowing: federal government whistleblowers
are still not adequately protected! Please read our recent op-ed in Roll Call
that tackles many of the myths surrounding whistleblowers. Stay tuned for details on our Whistleblower Film Festival, which will start in October and highlight the important role whistlblowers play in fighting waste, fraud, and abuse.
We take these allegations very seriously, but after hearing some of the accusations being leveled at the White House, we'd like to clear up a few misconceptions.
This morning, The Wall Street Journal ran an opinion piece subtly entitled "Abolish the Inspector General." In the Journal’s view, the media has given President Obama a free pass on the removal of Walpin and the possible infringement on the SIGTARP’s authority, whereas President Bush was repeatedly slammed with front-page stories about his administration's political meddling. This somehow leads the Journal to conclude that IGs should be eliminated altogether:
Can we suggest an alternative? Abolish the IG position across the government. IGs were chartered by Democrats when Republicans kept winning the executive branch. While some of them sometimes produce valuable work, mostly they answer to Congress by teeing up pseudoscandals and serving as witnesses for the prosecution. Their probes do nothing to curb federal spending, so why waste the money?
Mr. Obama professed to love the Inspectors General as a Senator, and he cosponsored legislation that bolstered their autonomy and required the president to give Congress a month's notice and a reason before firing an IG. Either the administration ought to abide by its own rules or get rid of the office.
Say what?? Even if you accept the argument that the media has failed to hold the administration accountable for the latest IG controversies, it's a pretty big leap to conclude that all IG offices are worthless and should be abolished.
Second, we disagree with the Journal’s claim that the administration failed to abide by its own rules on removing IGs. We’ve said it before, and we’ll say it again: the IG Reform Act of 2008 requires the president to provide an explanation to Congress 30 days before removing or transferring an IG. There’s nothing in the law that says it has to be a good reason. So when President Obama told Congress that he no longer had "the fullest confidence" in Walpin, he did technically follow the letter of the law. We don’t fault those who are demanding a better explanation, but if that’s really what Congress wants, they should amend the IG act to include a provision in the House’s version of the bill stating that the president can only remove an IG for a specified cause.
On another note, we read in Federal Eye this morning that Senator Charles Grassley (R-IA) is also concerned that the stimulus legislation contains a provision that will allow the Recovery Act Transparency and Accountability Board (RAT Board) to meddle with an IG’s investigation. He’s worried this will have a “chilling impact upon the independence” of IGs.
It’s no secret that we’re big fans of Sen. Grassley (a.k.a. the Watchdog’sWatchdog), but we have to respectfully disagree with him on this one. As we noted a few months ago, Phyllis Fong, Chair of the Council of the Inspectors General on Integrity and Efficiency, has already explained to Congress why these concerns are unfounded: 1) the RAT Board is composed entirely of IGs; 2) the Board is chaired by former Interior IG Earl Devaney, who has dedicated his career to investigating tough cases; and 3) another provision in the Recovery Act (Sec. 1527) explicitly recognizes the independence of IGs, and clarifies that they can deny any request made by the Board to initiate or terminate an investigation.
There are still many questions to be answered, especially about the administration's decision to remove Walpin and challenge the authority of the SIGTARP, and we applaud those in Congress and the media who are trying to get the bottom of it. But it’s important to keep the facts straight, and we’re concerned that some of the administration’s critics are starting to stretch the truth in order to make their point.
Feb 27, 2009
As we hear about regionalnewspapersshutting their doors, we take pause to recognize the critical function local beat reporters play in our lives. Case in point: yesterday, Los Alamos National Laboratory (LANL) put out a press release, probably to preempt POGO's release to the press of a February 23 internal Department of Energy (DOE) letter that outlines how LANL has not been able to keep track of its huge stocks of plutonium and highly enriched uranium--enough for hundreds of nuclear weapons--via its Material Control and Accountability (MC&A) program. Unlike the AP's stenography of LANL's press release, Sue Vorenberg of The Sante Fe New Mexicanwrote an article that dug deeper into the press release, exposing the “circular logic” that LANL is using to avoid answering the question of how it can be 100 percent certain that no material has been stolen when it does not know where the material is.
Similarly able to see through the spin, NNSA-beat reporter Todd Jacobson with the Nuclear Weapons & Materials Monitor contacted POGO for a comment as soon as he saw LANL's press release, knowing full well that LANL would not be forthcoming with information about problems unless it was fearful of an impending media storm. POGO has been raising concerns about MC&A at LANL for the last six months.
While the Monitor did mention it, one piece of the story has not yet gotten as much attention as it deserves: the fact that DOE was aware of MC&A problems last year, but still granted LANL the full $1.43 million performance award fee for security, which includes “Material Control and Accountability” as one of the areas of performance evaluated.
In addition to MC&A problems at LANL, this week the DOE IG released a report which found that of “about 37 percent (15 of 40) of the domestic facilities we reviewed [such as those that reprocess waste, universities, and other government agencies], the Department could not accurately account for the quantities and locations of certain nuclear materials” and that DOE “agreed to write-off large quantities without fully understanding the ultimate disposition of these materials.” This is another issue that is best reported by a journalist who understands the DOE bureaucracy.
The Post was particularly opposed to a provision in the amendment that would extend whistleblower protections to federal employees in the intelligence community. But as the Times points out, while these employees are on the front lines protecting Americans from dangerous and corrupt government practices, nobody is there to protect them from “retaliation in the form of harassment, intimidation in the workplace, and firings.” To prove its point, the Times cites the experience of Robert MacLean and other federal air marshals who have paid a serious price for blowing the whistle--an issue that POGO explored in great depth in our recent report.
POGO and other groups have also responded to the Post's exaggerated claim about federal whistleblowers making unilateral security breaches: "In fact, because the law will allow for only lawful disclosures to those with the appropriate security clearances, it actually will prevent leaks and so-called 'breaches.'" We've also argued that it is especially important to pass federal whistleblower protections as part of the stimulus bill:
The stimulus bill authorizes the expenditure of billions of taxpayer dollars; as taxpayers, we need the best oversight possible. Countless studies have verified that whistleblowers are the most effective weapon against fraud....whistleblower protections, unlike every other provision in the stimulus, will save money, not spend it.
|
{
"pile_set_name": "Pile-CC"
}
|
*c(d) + 2*f(d). What is s(9)?
3
Suppose -154*h = -173*h + 57. Let c(d) = d + 7. Let x(s) = 2*s + 16. Let b(t) = h*x(t) - 5*c(t). Suppose -4*i = -2*i + 14. Determine b(i).
6
Suppose 8*z + 63 = 5*z. Let q be (-375)/(-35) - 6/z. Suppose q = -3*a - 10. Let b(r) = r**3 + 7*r**2 + r + 5. Give b(a).
-2
Let c(v) = 2 + 4*v**2 - 3 - 2*v**2 + 0*v**2. Suppose 5*l - 28 = -2*l. Suppose -l*p - 2*z = -6*p + 2, -p = 2*z - 1. Determine c(p).
1
Suppose 2*v = 5*v - 6. Let w(o) = -17*o + 21*o - o**3 + 0 - 3 - 4*o**2. Determine w(v).
-19
Let a(j) be the third derivative of j**6/120 - j**5/10 + 7*j**4/24 - 2*j**3 + 495*j**2 + 3*j. Give a(5).
-2
Let w(f) be the third derivative of f**5/60 - f**4/8 + f**3/6 + 8*f**2 - 46*f. Let m = -4 - -6. Determine w(m).
-1
Let x(w) = w**3 - 2*w**2 + 3*w - 2. Suppose 0 = -4*k - 16, -4*q - 3*k + 36 = 2*k. Suppose 0 = -21*l - 212 - 40. Let d = q + l. Determine x(d).
4
Let h = -62 - -62. Let u be h + (0 - (-7 + -1)). Let r(v) = u*v + 0*v - 9*v + 1. Determine r(-5).
6
Suppose 4*b - 48 = 17*a - 12*a, -24 = -2*b - 8*a. Let j(c) = -c**2 + 18*c - 73. Give j(b).
-1
Suppose s - o - 11 = -0*s, 5*s = 4*o + 51. Suppose 4*a - 47*a + 129 = 0. Suppose -11 = -a*h - 5*m, -2*m = -s*m - 10. Let k(c) = c**2 - 7*c. Give k(h).
0
Suppose 16*l - 10*l = -6. Let o(z) = -z**3 - 6*z**2 - z - 11. Let n(k) = -1. Let q(g) = l*o(g) + 4*n(g). Calculate q(-6).
1
Let w = 274 - 282. Let g(z) = z**3 + 9*z**2 + 8*z + 3. Let q be g(w). Let c(a) = -3*a + 4. Calculate c(q).
-5
Suppose 0 = 26*b - 29*b + 6. Suppose -x = -5*f - 18, -2*x + 2 = -2*f - b. Let y(o) = o**2 + 2. Give y(x).
6
Let c(q) = 2*q**3 + 2*q - 1. Let j be 4/3*6*(-35)/(-14). Suppose 2*w - g = -5, 13 = -4*w - j*g + 25*g. Determine c(w).
-21
Suppose -47*k = -345 - 456 + 331. Let b(a) = -18*a + 185. What is b(k)?
5
Let v(i) = 68*i + 883. Let d be v(-13). Let u(l) = 22*l - 1. What is u(d)?
-23
Let g(p) = p**3 + 5*p**2 - 4*p + 8. Let o be g(-6). Let b(f) = 4 + 2 - 12 - f. Let d be b(o). Let s(w) = -w**3 - 4*w**2 + w - 1. Give s(d).
-11
Let k(d) = -13*d - 2. Let a be 200 - (-5 - (-4 - -5)). Let v = -209 + a. Determine k(v).
37
Let d = -12 - -12. Suppose d*c = 2*c - 8. Let s(v) be the first derivative of v**4/4 - 4*v**3/3 - v**2/2 + 4*v + 1665. What is s(c)?
0
Let a(y) = 5*y - 12. Suppose 5*r + 760*q - 757*q = 31, -4*r - 6 = -2*q. Determine a(r).
-2
Let i(v) = -15*v**3 - 1. Let r be 51*(133/(-21))/1. Let u = r + 324. Determine i(u).
-16
Let y(o) = o**3 + 24*o**2 + 42*o - 45. Let c be y(-22). Let r(u) = -34*u**2 - 2*u - 2. What is r(c)?
-34
Let i(a) be the third derivative of a**7/2520 - a**6/45 + 53*a**5/12 - 45*a**2 + 1. Let j(k) be the third derivative of i(k). Calculate j(10).
4
Let y(q) = -q**3 + 7*q**2 - 7*q + 3. Let f be y(6). Let n(t) be the first derivative of -230 - 4*t + 3/2*t**2 + 5/3*t**3 + 1/4*t**4. Determine n(f).
5
Suppose w = 4*b - 169, 3*b - 2*w - 82 = 46. Suppose -o - 134 = 3*n, 0*n - 2*o = -n - 33. Let y = n + b. Let c(l) = -4*l. What is c(y)?
4
Let u = 7035 - 7030. Let i(b) = -b**3 + 4*b**2 + 7*b - 13. What is i(u)?
-3
Let z(x) = -x**2 + 11*x - 2. Let j(o) = -2*o + 7. Let g be ((-27)/(-4))/(-3) - (-37)/148. Let f be j(g). Determine z(f).
-2
Let j(g) be the first derivative of -48 - 3*g**2 - 1/3*g**3 - g. Suppose -27 = 3*t - 4*h, 12 = -2*t + 2*h - 4. Determine j(t).
4
Let f(v) = -v**3 - 3*v + 3. Let q be 0 + ((-8)/(-10))/((-16)/(-40)). Let c be 0 - (q + -4 + 0). Give f(c).
-11
Suppose -3*w - 2*w - 165 = b, 0 = 2*w + 4*b + 48. Let v = w + 36. Let u(j) = -j + 2*j - 4*j - 3 + j**3 - 4*j**2 + 3*j**v. Determine u(-2).
-9
Suppose -31 = 3*d + 4*b, -d + 5*b + 5 = -10. Let m(n) = 22*n + 115. Calculate m(d).
5
Let y = 7 + -1. Suppose 0 = -2*u - y*u - 56. Let h(n) = -n**3 - 6*n**2 + 4*n + 6. Determine h(u).
27
Let g(s) = -s**2 + 10*s. Let m be g(10). Let v = m + 0. Let x(r) = 0*r**3 - 404 + r**3 + 200 - r**2 + 207. What is x(v)?
3
Let i(y) = y**3 + 8*y**2 + 4*y + 9. Let q(r) = -2*r**3 - 12*r**2 - 8*r - 20. Let a(m) = -7*i(m) - 4*q(m). What is a(8)?
49
Let u = 6138 + -6141. Let r(j) = 8*j**2 + 24*j. Calculate r(u).
0
Let j(u) = 20*u**2 - 19*u - 28. Let c(o) = -4*o**2 + 3*o + 5. Let l(r) = -6*c(r) - j(r). Determine l(0).
-2
Suppose 32*y - 30*y = -41*y. Let q be ((-18)/(-8))/((-2)/8). Let f be y/(7/q - 8/36). Let g(r) = -r**2 - r + 9. Give g(f).
9
Let w(j) = -9*j**2 - 32*j + 16. Let q be w(-4). Let h(l) be the third derivative of 4/3*l**3 + q*l + 6*l**2 + 0 + 1/8*l**4. Determine h(-6).
-10
Let w = 437 - 434. Let u(h) = -30*h**3 + h**2 + h. Let c be u(-1). Suppose -4 - 11 = -5*i, -3*i = -w*y - c. Let x(n) = n + 6. Determine x(y).
-1
Let p(w) = w**2 + 12*w + 16. Let y be 36/48 + (-329)/28. Calculate p(y).
5
Let u(n) be the first derivative of -2*n**2 + 16*n + 9 - 54*n + n**2 + 2*n**2. Let j(b) = -b + 20. Let v(l) = 11*j(l) + 6*u(l). Determine v(-6).
-14
Let m(o) = 3*o**2 - 2*o - 9. Suppose -2*z + 21 = 13. Determine m(z).
31
Let v(b) = -b + 6. Suppose -4*c - p + 47 = 0, 3 = -3*p - 0. Suppose 16*q = c*q + 260. Let t = q + -59. Calculate v(t).
0
Let m(o) = -o**2 + 2*o + 1. Let d(q) = 157*q + 33. Let h be d(-3). Let x = 434 + h. Determine m(x).
-23
Suppose -2*v - p - 3*p + 10 = 0, 2*v - 4*p - 10 = 0. Let w(b) = 2*b - 2*b - 307 + b + 308. Give w(v).
6
Suppose -5*y - 14 = -g, -5*g + 226 = -4*y + 51. Suppose -37*k + g*k = 12. Let p(v) = -v**2 + 5*v + 4. Give p(k).
-2
Let x(j) = -64*j**2 - 2*j + 1. Let a = 2581 + -2580. Calculate x(a).
-65
Let q(k) = 8*k - 18*k + 4*k + k + 4*k - 28. Give q(-15).
-13
Suppose -3*b - b = -3*n + 5, -4*b - 25 = n. Let x(i) be the third derivative of -1/8*i**4 + 3*i**2 - 1/60*i**5 + 1/6*i**3 + 15*i + 0. Give x(b).
-9
Let b(r) = -54*r + 7. Suppose 0 = -123*z - 128*z + 254*z. What is b(z)?
7
Let r(c) be the first derivative of -11*c**5/30 + c**4/24 + 8*c**2 - 4*c - 10. Let g(a) be the second derivative of r(a). What is g(-1)?
-23
Let y(i) be the second derivative of -131*i - 1/12*i**4 + 2*i**2 + 4/3*i**3 + 0. Suppose 2*k - 32 = -2*k. Calculate y(k).
4
Suppose -3*u - 18 = -u. Let f be u/2*(8 - 224/24). Let t(k) = k**3 - 7*k**2 + 3*k - 9. Calculate t(f).
-27
Let q(x) = 2*x**2 + 18*x + 21. Let w(n) = 74*n + 2139. Let d be w(-29). Determine q(d).
-7
Let b be 35 - 31 - (-4)/(4/(-2)). Suppose -b = 4*s - 6. Let y(v) be the third derivative of -v**4/12 - v**3/6 + 15*v**2. Determine y(s).
-3
Let d(n) be the first derivative of 0*n**4 - 11/3*n**3 + 0*n + 0*n**2 + 31 - 1/60*n**5. Let t(l) be the third derivative of d(l). Calculate t(-2).
4
Let q be ((-16)/12)/(-2)*9. Suppose 2*m - q*m = -16. Let s(i) be the second derivative of -i**5/20 + 5*i**4/12 - i**3/2 + i**2 - 34*i + 2. What is s(m)?
6
Let d(r) = r**3 - r**2 - r + 5. Let w be 9/((-18)/80)*126/35. Let o = w - -144. What is d(o)?
5
Let v = -126 + 121. Let m(y) be the first derivative of -y**3/3 - 11*y**2/2 - 3*y - 414. Calculate m(v).
27
Suppose -121*m + 134*m + 78 = 0. Let z(w) = -4*w + 17. Let k(c) = 5*c - 18. Let y(v) = -5*k(v) - 6*z(v). Calculate y(m).
-6
Let q(y) be the second derivative of -y**3/6 + 5*y**2/2 + 6*y - 2. Suppose -4*x - 4*l + 24 = 0, 3*l = x - 1 - 5. What is q(x)?
-1
Let y(q) = -q**2 + 6*q + 9. Let c be 4*(-1 + 18/8). Let a be 11 + ((-12)/2 - -7)*-3. Suppose x = c*d - 37, x + 24 - a = 2*d. Calculate y(d).
2
Let y(f) be the first derivative of f**2/2 + 5*f + 1. Let k(b) = 24*b**3 - 2*b**2 - 4*b + 5. Let j be k(1). Suppose -j*x + 41*x = -72. Calculate y(x).
1
Let o(n) = -n**2 + 4*n + 8. Let m(x) = 10*x + 17. Suppose 9*b - 21 = 3*c + 4*b, 0 = -b + 3. Let h be m(c). Let a(z) = -6*z - 11. Let v be a(h). Calculate o(v).
-13
Suppose 4*r + 0*r - 24 = 0. Suppose -b = -p + r, 3*p - b = -p + 12. Suppose -p = -4*a + 2. Let w(d) = 4*d + 1. What is w(a)?
5
Let i(h) = -3*h + 49. Suppose 9*a = 12*a + 3*r - 39, 0 = -4*a + 3*r + 59. Give i(a).
7
Let j(b) = -2*b + 15*b**3 - 14*b**3 + 15 - 4*b + 8*b - 26 + 6*b**2. Let g(a) = a + 16. Let v be g(-21). Determine j(v).
4
Let o(i) = -11*i - 24. Suppose -69*x - 228 = 7*x. Determine o(x).
9
Let p(r) = 19*r - 9. Let x(w) = -2*w**2 + 125*w + 196. Let i be x(64). Give p(i).
67
Let k(o) = -2*o**2 + 12*o - 6. Let w(r) = 6 - 15 + 6 - 2*r + 9. Let j be w(-1). Determine k(j).
-38
Suppose 0*v - 4*v = 0. Suppose -m + 10 - 7 = v. Let y(c) = c**3 - 3*c**2 + 3. Calculate y(m).
3
Let f be 17/((-289)/221) + 4 - (0 - 5).
|
{
"pile_set_name": "DM Mathematics"
}
|
## @file
# Component information file for Board Init Library
#
# Copyright (c) 2017, Intel Corporation. All rights reserved.<BR>
#
# SPDX-License-Identifier: BSD-2-Clause-Patent
#
##
[Defines]
INF_VERSION = 0x00010005
BASE_NAME = PeiMultiBoardInitSupportLib
FILE_GUID = E0238683-D3FD-4D97-8874-37C6157E2906
MODULE_TYPE = BASE
VERSION_STRING = 1.0
LIBRARY_CLASS = MultiBoardInitSupportLib
LIBRARY_CLASS = BoardInitLib
[LibraryClasses]
BaseLib
PcdLib
DebugLib
[Packages]
MinPlatformPkg/MinPlatformPkg.dec
MdePkg/MdePkg.dec
[Sources]
PeiMultiBoardInitSupportLib.c
PeiBoardInitLib.c
[Guids]
gBoardDetectGuid
gBoardPreMemInitGuid
gBoardPostMemInitGuid
gBoardNotificationInitGuid
[Pcd]
|
{
"pile_set_name": "Github"
}
|
Atypical onset of symptoms in Huntington disease: severe cognitive decline preceding chorea or other motor manifestations.
To describe the onset of Huntington disease (HD) in a patient with atypical progression of symptoms. The authors report the case of a 39-year-old man with severe cognitive impairment and diffuse cortical atrophy before the onset of motor manifestations or symptoms of an extrapyramidal movement disorder. Clinical examinations, neuropsychologic assessments, magnetic resonance imaging, electroencephalogram, and genetic testing were conducted. Although HD was eventually confirmed through genetic testing, chorea was not part of the clinical picture until well after the patient had developed a frank dementia, with a decline in global intellectual functioning, memory deficits, slowed information processing speed, and executive dysfunction. This case indicates HD may present with atypical clinical features in the early course of the disease, and warrants diagnostic consideration in patients with early dementia of unknown etiology.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Spišské Bystré
Spišské Bystré, until 1948 Kubachy () is a large village and municipality in Poprad District in the Prešov Region of northern Slovakia.
History
In historical records the village was first mentioned in 1294.
Geography
The municipality lies at an elevation of 674 metres (2,211 ft) and covers an area of 38.031 km² (14.684 mi²). It has a population of about 2400 people.
Economy and Infrastructure
In a village is a football club. In the nearby locality Kubašok is ski-lift, so the village developed a touristic infrastructure. Cultural sightseeing is Roman Catholic neo-gothic church, rebuilt in 1926.
Notable personalities
Eliáš Mlynarovich, writer
References
External links
http://spisskebystre.e-obce.sk
Category:Villages and municipalities in Poprad District
Category:Spiš
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Related Web Sites
Pocket Plane Group (Pocket Plane Group publishes a number of detailed mods for Baldur's Gate 2 and other Infinity Engine games. Published mods include the Kelsey NPC, the BG1Tutu engine conversion, Virtue, Oversight, Flirt Packs and Ashes of Embers.)
|
{
"pile_set_name": "Pile-CC"
}
|
Fredun Shapur is one of our all time favourite illustrators and designers, working on toys & childrens books throughout the 60s & 70s. To celebrate the arrival of a new book celebrating his work here is a little taster of his archive.
|
{
"pile_set_name": "Pile-CC"
}
|
[Cite as State v. Suloff, 2019-Ohio-4607.]
COURT OF APPEALS
TUSCARAWAS COUNTY, OHIO
FIFTH APPELLATE DISTRICT
STATE OF OHIO JUDGES:
Hon. W. Scott Gwin, P.J.
Plaintiff-Appellee Hon. William B. Hoffman, J.
Hon. Patricia A. Delaney, J.
-vs-
Case No. 2018 AP 10 0032
TIMOTHY J. SULOFF
Defendant-Appellant O P I N IO N
CHARACTER OF PROCEEDINGS: Appeal from the Tuscarawas County
Court of Common Pleas, Case No. 2016
CR 04 0127
JUDGMENT: Affirmed
DATE OF JUDGMENT ENTRY: November 6, 2019
APPEARANCES:
For Plaintiff-Appellee For Defendant-Appellant
MICHAEL J. ERNEST GEORGE URBAN
Assistant Prosecuting Attorney 116 Cleveland Avenue, NW – Ste. #808
Tuscarawas County Canton, Ohio 44702
125 East High Avenue
New Philadelphia, Ohio 44663
Tuscarawas County, Case No. 2018 AP 10 0032 2
Hoffman, J.
{¶1} Appellant Timothy Suloff appeals the judgment entered by the Tuscarawas
County Common Pleas Court convicting him of four counts of burglary (R.C. 2911.12)
and two counts of theft (R.C. 2913.02), and sentencing him to an aggregate term of
incarceration of twelve years. Appellee is the state of Ohio.
STATEMENT OF THE FACTS AND CASE
{¶2} On January 6, 2016, Terry Miller arrived at his home in Stonecreek, Ohio,
at about 4:00 p.m., and discovered the kitchen door had been pried open. The door had
been installed in the last week or two, and had been cleaned by his wife Elizabeth shortly
before the break-in. Terry Miller called the Sheriff’s Office to report the suspected break-
in, and called one of his neighbors. The neighbor reported a loud, tan-colored truck in
the area around 3:45 p.m. When Elizabeth Miller returned home, she discovered her
jewelry box with all of her jewelry was missing, as well as two wooden boxes and a
container of coins. She estimated the value of the jewelry at $3,000.
{¶3} Deputy Troy Beckley of the Tuscarawas County Sheriff’s Department
reported to the scene. He photographed footprints in the snow on the stairs leading to
the broken kitchen door, which he photographed. He noticed four fingerprints in the
middle of the glass window on the broken door. The prints were lifted and sent to the
Ohio Bureau of Criminal Investigation (BCI) for analysis. The fingerprints were
determined to be left by Appellant.
{¶4} Lt. Jeff Moore of the Tuscarawas County Sheriff’s Department questioned
Appellant about the burglary at the Miller home. Appellant denied breaking into the home,
and when shown photographs of the home claimed he had never seen the home. Lt.
Moore presented Appellant with the fingerprint report, which Appellant studied. After
Tuscarawas County, Case No. 2018 AP 10 0032 3
reading the report, Appellant nodded his head up and down. During further conversation
about the burglary, Appellant indicated he was remorseful.
{¶5} Chris and Cindy Goehring left their home in Dover, Ohio, on April 1, 2016,
to go camping. They returned home around 11:15 a.m. on April 2. When they opened
their garage door, they realized the door leading from the garage to the kitchen was open.
When they entered their home, they found broken glass, and it appeared someone broke
the glass on the French doors at the back of the house, reached inside, and unlocked the
dead bolt. The couple called 911.
{¶6} The Goehrings’ closet doors and dresser drawers were open, and Cindy
Goehring’s jewelry box was missing. Along with jewelry items with personal value, a ruby
ring which had a diamond missing, a charm bracelet, and two tennis bracelets were in the
stolen box. Lt. Moore contacted Cindy Goehring later, and she was able to identify two
pieces of jewelry taken with the jewelry box: the ruby ring with a diamond missing, and a
chain from which she had previously removed a pendant.
{¶7} Between 3:30-4:00 p.m. on April 4, 2016, Neil Parrot returned home to his
Strasburg residence after work to find glass on his garage floor. The window at the back
door to the garage had been broken, and someone had broken the door leading into the
house and left it open. Parrot found glass scattered throughout the kitchen, closet doors
left open, and a jewelry armoire belonging to his wife, Elaine, had been ransacked in the
bedroom. Jewelry, gift cards, and cash were missing from the armoire, and three iPads,
including one belonging to Parrot’s employer Tuslaw Schools, were missing. Some of his
pants were also missing, along with a pillowcase from the bed.
Tuscarawas County, Case No. 2018 AP 10 0032 4
{¶8} While investigating at the Parrot residence, Deputy Lincoln Troyer noticed
two sets of foot impressions in the mulch outside the window. A path of footprints led
from the Canton Water Department to the back side of the Parrot residence. While there
were several homeless people living in tents by the river near the house, the footprint trail
did not lead directly from the tents.
{¶9} In the morning of April 11, 2016, Cathy Sprang exited her bathroom at her
home outside Strasburg to find a man standing in her living room. She yelled, “Who the
hell are you and what are you doing in my home?” Tr. (II) 192. The man ran out the back
door. She described the man as about 5’5” tall, skinny, with dark skin. Tr. (II) 193.
Because he was wearing a hoodie, she could only see part of his face. She saw the man
drive away in a white car. Deputy Rick Morrison responded to Cathy’s 911 call, and lifted
footprints from a Fila tennis shoe from Sprang’s kitchen floor. Cathy Sprang was unable
to identify Appellant later from a photo lineup or later in court.
{¶10} Theresa Stith resides outside of Bolivar. At 9:00 a.m. on April 11, 2016, she
was sitting in her living room. She saw a man, who she later identified as Appellant,
approach her front door and look in the window with his hands cupped over his eyes.
When he saw her, his eyes got big and he smiled and waved at her. Stith opened her
front inner door, leaving the storm door closed, and asked Appellant if she could help him.
He stated he was looking for McDugal Battery and stopped for directions. She asked why
he would come to her home asking for directions, because her home sits on a hill about
a quarter of a mile from the road, and is not visible from the road. He replied he was lost,
and did not know what to do. Stith told Appellant the only battery place in Bolivar is Harris
Tuscarawas County, Case No. 2018 AP 10 0032 5
Battery, and gave him directions. Stith identified Appellant in court as the man she
encountered at her home on April 11.
{¶11} Stith was unable to obtain Appellant’s license plate number, so she got in
her truck to follow him. She did not see him at Harris Battery, but saw the white car
Appellant traveled in driving down the road. She was able to get a license plate number,
which she gave to police.
{¶12} After running the license plate provided by Stith, deputies discovered the
car belonged to Appellant. A search warrant was executed for Appellant’s home.
Appellant was wearing Fila tennis shoes at the time police went to the home. During the
search, police found the iPad belonging to Tuslaw Schools taken from the Parrot home.
They also found jewelry in Appellant’s home.
{¶13} Lt. Moore interviewed Appellant about the Goehring and Parrot burglaries,
and he denied any knowledge or involvement in the burglaries.
{¶14} Appellant was indicted by the Tuscarawas County Grand Jury as follows:
Count 1 – burglary of the Miller residence
Count 2 – theft from the Miller residence
Count 3 - burglary
Count 4 - theft
Count 5 - theft
Count 6 - burglary of the Goehring residence
Count 7 – petty theft of the Goehring residence
Count 8 – burglary of the Parrot residence
Tuscarawas County, Case No. 2018 AP 10 0032 6
Count 9 – theft at the Parrot residence
Count 10 – attempted burglary of the Stith residence
Count 11 – burglary of the Spring residence
{¶15} Counts one and two were severed from the remaining counts for jury trial.
Following jury trial in November of 2017, Appellant was convicted of counts one and two.
Sentencing was deferred pending resolution of the remaining counts.
{¶16} The State dismissed counts three through five without prejudice, and the
case proceeded to jury trial on counts six through eleven. The jury found Appellant guilty
of counts six, seven, eight, and eleven, but not guilty of counts nine and ten. The trial
court sentenced Appellant to three years incarceration on each count of burglary, to be
served consecutively to each other. The court ordered the sentences imposed on Counts
one and six to be served consecutively to Appellant’s unrelated felony terms of
imprisonment imposed by Holmes County and Marion County, and ordered the sentences
imposed on counts eight and eleven to be served concurrently with the terms imposed by
Holmes and Marion Counties. The court imposed no sentence on the theft counts. The
court ordered Appellant pay restitution in the amount of $16,025 to the Parrots and $500
in restitution to the Goehrings.
{¶17} It is from the September 12, 2018 judgment of conviction and sentence
Appellant prosecutes his appeal, assigning as error:
I. APPELLANT’S CONVICTIONS WERE AGAINST THE
SUFFICIENCY AND/OR MANIFEST WEIGHT OF THE EVIDENCE.
Tuscarawas County, Case No. 2018 AP 10 0032 7
II. THE TRIAL COURT ERRED IN ITS ORDER OF RESTITUTION
TO THE PARROTS.
I.
{¶18} In his first assignment of error, Appellant agues his convictions of burglary
and theft were against the manifest weight and sufficiency of the evidence. We disagree.
{¶19} In determining whether a verdict is against the manifest weight of the
evidence, the appellate court acts as a thirteenth juror and “in reviewing the entire record,
weighs the evidence and all reasonable inferences, considers the credibility of witnesses,
and determines whether in resolving conflicts in evidence the jury ‘clearly lost its way and
created such a manifest miscarriage of justice that the conviction must be reversed and
a new trial ordered.’” State v. Thompkins, 78 Ohio St. 3d 380, 387, 1997-Ohio-52, 678
N.E.2d 541, quoting State v. Martin, 20 Ohio App. 3d 172, 175, 485 N.E.2d 717 (1983).
{¶20} An appellate court's function when reviewing the sufficiency of the evidence
is to determine whether, after viewing the evidence in a light most favorable to the
prosecution, any rational trier of fact could have found the essential elements of the crime
proven beyond a reasonable doubt. State v. Jenks, 61 Ohio St. 3d 259, 574 N.E.2d 492,
paragraph two of the syllabus (1991).
{¶21} Appellant was convicted of one count of burglary in violation of R.C.
2911.12(A)(1), and three counts of burglary in violation of R.C. 2911.12(A)(2):
(A) No person, by force, stealth, or deception, shall do any of the
following:
Tuscarawas County, Case No. 2018 AP 10 0032 8
(1) Trespass in an occupied structure or in a separately secured or
separately occupied portion of an occupied structure, when another person
other than an accomplice of the offender is present, with purpose to commit
in the structure or in the separately secured or separately occupied portion
of the structure any criminal offense;
(2) Trespass in an occupied structure or in a separately secured or
separately occupied portion of an occupied structure that is a permanent or
temporary habitation of any person when any person other than an
accomplice of the offender is present or likely to be present, with purpose
to commit in the habitation any criminal offense[.]
{¶22} Appellant was also convicted of two counts of theft in violation of R.C.
2913.02:
(A) No person, with purpose to deprive the owner of property or
services, shall knowingly obtain or exert control over either the property or
services in any of the following ways:
(1) Without the consent of the owner or person authorized to give
consent[.]
{¶23} Miller Residence: Appellant first argues there is insufficient evidence to
identify him as the person who broke into the Miller residence, as there is no evidence to
corroborate the fingerprint evidence found at the scene. He argues none of the items
Tuscarawas County, Case No. 2018 AP 10 0032 9
taken from the Miller residence were connected to him, and he made no admissions. He
further argues the Millers provided no supporting evidence the value of the items taken
was $3,000.00.
{¶24} The burglary and theft counts related to the Miller residence were tried on
November 7 and 8, 2017. The State presented evidence Appellant’s fingerprints were
lifted from the door at which the home was entered. The door had been installed only a
week or two prior to the break in, and Mrs. Miller had cleaned the door shortly before the
burglary. Footprints in the snow led to the door where Appellant’s fingerprints were found.
{¶25} In State v. Miller, 49 Ohio St. 2d 198, 361 N.E.2d 419, sentence vacated on
other grounds, 438 U.S. 911, the Ohio Supreme Court recognized the use of fingerprints
for identification purposes in criminal cases, stating, “fingerprints corresponding to those
of the accused are sufficient proof of his identity to sustain his conviction, where the
circumstances show that such prints, found at the scene of the crime, could only have
been impressed at the time of the commission of the crime.” Id. at syllabus. See also,
State v. Jenkins, 5th Dist. Stark No. 2014CA00180, 2015-Ohio-3360, ¶22 (palm print
alone is enough to establish the element of identity where print was left behind counter,
near footprints left by robber, and store had been cleaned the night before); State v.
Walker, 5th Dist. Stark No. 2000CA00077, 2000 WL 1745146, *1 (November 20, 2000)
(defendant’s fingerprints on the broken window glass gaining illegal entry into residence
sufficient to support burglary conviction); State v. Boone, 6th Dist. Lucas No. L-08-1409,
2010-Ohio-1481, ¶15 (trier of fact was justified in concluding the owner of the fingerprint
on underside of window used to enter home was the culprit).
Tuscarawas County, Case No. 2018 AP 10 0032 10
{¶26} We find the fingerprint evidence presented in this case was sufficient
evidence, if believed by the jury, to prove Appellant’s identity as the person who
burglarized the Miller residence. Further, while Appellant he did not make a direct
admission of guilt, Lt. Jeff Moore testified when presented with the fingerprint report
Appellant first studied the report, then nodded his head up and down. During further
conversation about the burglary, Appellant indicated he was remorseful. From all of the
evidence presented, we find the jury did not lose its way in finding Appellant was the
person who committed the burglary and theft of the Miller residence.
{¶27} Appellant also argues the Millers did not present supporting evidence
concerning the value of the items taken.
{¶28} Terrence Miller testified as to how he and his wife arrived at an estimated
value for the jewelry taken from their home:
She has a very good memory. She drew different pictures and
descriptions of her jewelry. We worked with the jeweler that she bought it
from as well as the insurance company.
{¶29} Tr. (1) 148.
{¶30} Elizabeth Miller testified in arriving at an estimated value of the jewelry, she
had kept a lot of the receipts and added them up. Tr. (1) 151.
{¶31} We find the testimony of the Millers was sufficient evidence, if believed by
the jury, to support the estimated value of $3,000. Further, we find the jury did not lose
its way in believing the testimony of the Millers regarding the value of the jewelry taken.
Tuscarawas County, Case No. 2018 AP 10 0032 11
{¶32} Goehring Residence: Appellant argues there is no evidence linking him
to the Goehring burglary and theft. He argues while there is evidence several items of
jewelry were recovered and identified by Mrs. Goehring, there is no evidence these items
were recovered in the search of Appellant’s home.
{¶33} The burglary and theft charges connected to the Goehring residence were
tried during the trial held on April 17, 18, and 19, of 2018. Lt. Moore testified as follows
regarding the items found in the search of Appellant’s home:
There was some other jewelry that we also located in the home.
Those items were taken at that time and later provided to victims who was
able to identify some of that jewelry.
{¶34} Tr. (2) 278.
{¶35} Cindy Goehring testified a few weeks after the break-in at their home, Lt.
Moore contacted her and her husband to show them pictures of items recovered in the
case. From the pictures, she identified a ring and a chain which had been taken from the
home. The only other person testifying at the April, 2019 trial regarding missing jewelry
was Neil Parrot, who testified the only item returned by police was a Movado watch
belonging to his wife.
{¶36} Although Lt. Moore did not specifically state items missing from the
Goehring home were recovered in the search of Appellant’s home, from his testimony
multiple items of jewelry were taken from Appellant’s residence and provided to victims
who identified some of the jewelry, coupled with Cindy Goehring’s testimony Lt. Moore
Tuscarawas County, Case No. 2018 AP 10 0032 12
showed her pictures of jewelry she could identify as taken from her home and Neil Parrot’s
testimony only a single item was recovered from the theft of their jewelry, the jury could
infer the ring and chain identified by Cindy Gohring were recovered from the search of
Appellant’s home. We find the judgment of convictions of burglary and theft of the
Goehring residence are not against the manifest weight of the evidence, and are
supported by sufficient evidence.
{¶37} Parrot Residence: Appellant argues police failed to investigate the people
living by the river near the Parrot home, despite the documentation they found in the tents
identifying the people living there. He also argues although the iPad belonging to Tuslaw
schools and the Movado watch taken from the Parrot residence were found in Appellant’s
home, his wife and another man also lived in the home.
{¶38} Appellant was convicted of burglary of the Parrot home at the trial
conducted in April of 2019.
{¶39} Although there were homeless people living in tents near the Parrot home,
there was evidence the footprints leading to the door through which the person entered
the home did not lead directly to the tents. Further, the iPad taken from Appellant’s
bedroom matched the serial number of the iPad missing from the Parrot home, and the
Parrots identified a watch taken from the search of Appellant’s home as one taken in the
burglary.
{¶40} “It has long been the law of this state that, where a burglary has been
committed and property stolen as a part of the criminal act, the fact of the subsequent
possession is some indication that the possessor was the taker, and therefore the doer
Tuscarawas County, Case No. 2018 AP 10 0032 13
of the whole crime.” State v. Simon, 6th Dist. Lucas No. H-04-026, 2005-Ohio-3208, ¶14,
citing State v. Brennan, 85 Ohio App. 175, 88 N.E.2d 281 (1949).
{¶41} In the instant case, the Parrot home was burglarized on April 4, 2016. The
search warrant of Appellant’s home was executed on April 12, 2016. Property stolen from
the Parrot home was recovered during the search of Appellant’s home. Although there
was testimony two other people were living at the residence, the jury could conclude
Appellant was the person who broke into the Parrot home, and not his wife or Matthew
Graves. We find the conviction of burglary was not against the manifest weight or
sufficiency of the evidence.
{¶42} Sprang Residence: Appellant argues Cathy Sprang was unable to identify
Appellant at trial or from a photo lineup as the person who entered her home, and
therefore his conviction of burglary of the Sprang residence was against the manifest
weight and sufficiency of the evidence.
{¶43} Sprang was unable to identify Appellant as the person who entered her
home, but also testified the man was wearing a hoodie which partially hid his face. She
gave a general description of the man, which matched Appellant. A Fila tennis shoe print
was lifted from her kitchen floor, and Appellant was wearing Fila tennis shoes when police
executed the search warrant on his home. Sprang further testified after Appellant ran
away she went to retrieve her gun, and when she returned to the window she saw a white
car leaving her driveway.
{¶44} Theresa Stith was able to identify Appellant as the man who came to her
door on the same morning as the Sprang burglary. She followed the white car Appellant
drove, and retrieved a license plate number from the vehicle which ultimately led the
Tuscarawas County, Case No. 2018 AP 10 0032 14
police to Appellant. Stith lived relatively close to Sprang, and the incidents occurred on
the same morning.
{¶45} While Stith described Appellant as wearing a striped shirt and jeans and
Sprang testified the man who entered her home was wearing a hoodie and pants, a
hoodie is an easy item of clothing to put on or remove. Based on the proximity of the
incidents in time and place, and the fact both Sprang and Stith connected a white car to
the man who came to their home, we find the jury could conclude Appellant was
responsible for the Sprang burglary. We find the conviction of burglary is not against the
manifest weight or sufficiency of the evidence.
{¶46} The first assignment of error is overruled.
II.
{¶47} Appellant argues the court erred in ordering him to pay restitution to the
Parrots in the amount of $16,025, which reflected their total economic loss after the
application of insurance payments. He argues he was acquitted of the charge of theft
from the Parrots’ home, and further the State did not present credible evidence as to the
amount of the loss.
{¶48} R.C. 2929.18(A)(1) governs restitution orders:
(A) Except as otherwise provided in this division and in addition to
imposing court costs pursuant to section 2947.23 of the Revised Code, the
court imposing a sentence upon an offender for a felony may sentence the
offender to any financial sanction or combination of financial sanctions
authorized under this section or, in the circumstances specified in section
Tuscarawas County, Case No. 2018 AP 10 0032 15
2929.32 of the Revised Code, may impose upon the offender a fine in
accordance with that section. Financial sanctions that may be imposed
pursuant to this section include, but are not limited to, the following:
(1) Restitution by the offender to the victim of the offender's crime or
any survivor of the victim, in an amount based on the victim's economic loss.
If the court imposes restitution, the court shall order that the restitution be
made to the victim in open court, to the adult probation department that
serves the county on behalf of the victim, to the clerk of courts, or to another
agency designated by the court. If the court imposes restitution, at
sentencing, the court shall determine the amount of restitution to be made
by the offender. If the court imposes restitution, the court may base the
amount of restitution it orders on an amount recommended by the victim,
the offender, a presentence investigation report, estimates or receipts
indicating the cost of repairing or replacing property, and other information,
provided that the amount the court orders as restitution shall not exceed the
amount of the economic loss suffered by the victim as a direct and
proximate result of the commission of the offense. If the court decides to
impose restitution, the court shall hold a hearing on restitution if the
offender, victim, or survivor disputes the amount. All restitution payments
shall be credited against any recovery of economic loss in a civil action
brought by the victim or any survivor of the victim against the offender.
Tuscarawas County, Case No. 2018 AP 10 0032 16
{¶49} We review restitution orders under an abuse of discretion standard. See,
e.g., State v. Sheets, 5th Dist. Licking No. 17 CA 44, 2018-Ohio-996, ¶ 15; State v. Cook,
5th Dist. Fairfield No. 16–CA–28, 2017–Ohio–1503, ¶ 8; State v. Andrews, 5th Dist.
Delaware No. 15 CAA 12 0099, 2016–Ohio–7389, ¶ 40. An order of restitution must be
supported by competent and credible evidence from which the trial court can discern the
amount of restitution to a reasonable degree of certainty. State v. Spencer, 5th Dist.
Delaware No. 16 CAA 04 0019, 2017–Ohio–59, ¶ 44 (citations omitted). Furthermore, a
trial court abuses its discretion if it orders restitution in an amount that does not bear a
reasonable relationship to the actual loss suffered. Id. (citations omitted).
{¶50} Appellant was convicted of burglary of the Parrot home, but acquitted of the
grand theft charge connected to the items stolen from the Parrot home. At sentencing,
Appellant argued regarding restitution as follows:
MR. PERLAKY: Yes, in even ordering it I think the Court must
consider the ability to pay if I remember 2929.18 correctly, and maybe I am
remembering it incorrectly. Mr. Suloff has little to no ability to pay. I don’t
believe we have any disagreement with the claims by any of the individuals.
I would note the only thing that concerns me is that I think the jury on the
grand theft count was concerned about the testimony from the Parrots in
terms of how they calculated their loss. Again, I’m guessing. Of course I
don’t know but they were somewhat concerned about that so we’d ask the
Court to take that into consideration as well.
Tuscarawas County, Case No. 2018 AP 10 0032 17
{¶51} Sent. Tr. 42.
{¶52} Despite the fact Appellant was acquitted of the theft charge, we find the trial
court did not err in including items taken from the home were economic loss caused by
the burglary. The evidence presented at trial demonstrated the items were taken from
the home as a result of the burglary, which Appellant was convicted of committing.
{¶53} Further, we find the trial court’s determination of $16,025 in restitution is
supported by competent, credible evidence in the record. The State submitted a
restitution request on behalf of the Parrots in the amount of $16,025. Appellant did not
specifically dispute the Parrots’ calculation of damages, but rather argued the jury might
have rejected their calculation of damages, thus acquitting Appellant of theft.
{¶54} R.C. 2929.18(A)(1), quoted above, allows the court to award restitution in
an amount recommended by the victim. At trial, the State presented evidence the value
of the property taken from the Parrotts was around $20,000, and they received $4,000
from the insurance company. Neil Parrot testified he had taken photographs of the jewelry
taken from the home as part of a household inventory, and was further able to provide
serial numbers for the iPads taken in the burglary. We decline to speculate on the reason
the jury found Appellant not guilty of theft related to the Parrot burglary, and find the trial
court’s restitution award is supported by the evidence in the record.
Tuscarawas County, Case No. 2018 AP 10 0032 18
{¶55} The second assignment of error is overruled.
{¶56} The judgment of the Tuscarawas County Common Pleas Court is affirmed.
By: Hoffman, J.
Gwin, P.J. and
Delaney, J. concur
|
{
"pile_set_name": "FreeLaw"
}
|
Last month, G.Rev announced Under Defeat HD for PlayStation 3 and Xbox 360. Today, it (officially) announced Kokuga for 3DS.
So the question is, which "camp," if any, is G.Rev in? The answer is: they're in all camps! CEO Hiro Maruyama Tweeted today that G.Rev will pursue a multiplatform strategy from here on out. Multiplatform will be difficult for such a small company, he said, but he hopes that this will help make the company bigger.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Bash set +x without it being printed
Does anyone know if we can say set +x in bash without it being printed:
set -x
command
set +x
traces
+ command
+ set +x
but it should just print
+ command
Bash is Version 4.1.10(4). This is bugging me for some time now - output is cluttered with useless set +x lines, making the trace facility not as useful as it could be.
A:
I had the same problem, and I was able to find a solution that doesn't use a subshell:
set -x
command
{ set +x; } 2>/dev/null
A:
You can use a subshell. Upon exiting the subshell, the setting to x will be lost:
( set -x ; command )
A:
I hacked up a solution to this just recently when I became annoyed with it:
shopt -s expand_aliases
_xtrace() {
case $1 in
on) set -x ;;
off) set +x ;;
esac
}
alias xtrace='{ _xtrace $(cat); } 2>/dev/null <<<'
This allows you to enable and disable xtrace as in the following, where I'm logging how the arguments are assigned to variables:
xtrace on
ARG1=$1
ARG2=$2
xtrace off
And you get output that looks like:
$ ./script.sh one two
+ ARG1=one
+ ARG2=two
|
{
"pile_set_name": "StackExchange"
}
|
In September 1963, seven months after Singaporeans watched their first television show, the nation's first mainframe computer arrived at the Central Provident Fund (CPF) headquarters (HQ) in Anson Road.
That computer, an IBM 1401, which enabled thousands of people to carry out and store data at once, was so big that it had to be first dismantled and its parts packed in several crates before it could be transported anywhere.
None of those crates was small enough to push past the entrance of the CPF HQ, so its staff hacked off part of a wall on the third storey of the building and hoisted all the crates up and through the hole.
P. Ramakrishna and Grace Chng curated and wrote parts of Intelligent Island (above).
The person who triggered all this work was the late Robert Iau, a far-sighted man of many talents who was then the CPF's general manager; he even wrote the software to run this huge computer.
Does Singapore have the 'IT' factor?
To what extent can Singapore harness rapidly changing infocommunications technology?
Get the answer to that question from information technology industry veterans Grace Chng and P. Ramakrishna at The Big Read Meet on Aug 30.
Chng and Ramakrishna, curators of the new book Intelligent Island, have worked in the industry since its inception almost 40 years ago, so are more than well-placed to give you glimpses of what Singapore, the Smart Nation, will be like.
At that time, even the IBM Singapore office did not have an IBM 1401, which had 4,000 bytes of memory. Today, a smartphone such as the iPhone 7 has a memory of 32GB, yet is only about as big as a bar of soap.
In a nutshell
THE GOOD
The book's curators, Grace Chng and P. Ramakrishna, have used their long views and good eye for detail to recall and review a rather dry chapter in Singapore's achievements in short, sharp and engaging ways.
These include a nifty infographic on the state of Singapore's ecosystem, as at 2015, for nurturing start-ups and information technology (IT) innovations.
THE BAD
This book is more tell than show, and repetitive in its telling to boot. This is because most of its nine writers keep going over the same milestones along the trodden path of Singapore's IT history in their respective chapters, leaving the big picture in fragments.
The reader would also have benefited if the writers had probed their interviewees. As it is, the latters' views rarely rise above the bland or twee.
An exception to that is their chat with the Infocomm Development Authority of Singapore's first chief executive, Ms Yong Ying-I, who divulged that, 10 years ago, a decision- maker here said: "Who would want to watch a movie on a mobile phone?"
Last but not least, while the book is a look back on the whys and hows of Singapore's IT journey, its curators might have given the reader deeper and wider perspectives of Singapore's IT achievements by soliciting views from industry veterans beyond Singapore.
The careful planning, training and innovating that have gone into making Singaporeans one of the most technologically adept people globally is the focus of a new book, Intelligent Island. It was hatched by old friends Grace Chng and P. Ramakrishna during Chinese New Year in 2015, although they started work on it only in January last year.
Five questions this book answers
1 What were the main twists and turns in computerising Singapore?
2 What sort of thinking drove, and still drives, information technology pioneers here?
3 Who enabled Singapore to work towards becoming a smart nation today?
4 Why is Singapore not already a digital force to be reckoned with globally?
5 Why is it crucial for pupils to learn coding?
Industry pioneer Ramakrishna, who retired in 2015 as the Infocomm Development Authority of Singapore's (IDA) director of industry development and is now deputy chief executive officer of technology leaders' training body CIO Academy Asia, recalls: "I have known Grace for a long time and every time we met, we said, 'Look, we've been fortunate to see all this unfolding right in front of us, we must do something about it.'"
With the backing of the Singapore Infocomm Technology Federation, the leading infocommunications industry association here, Chng and Ramakrishna roped in seven former colleagues and friends to give their takes on the information technology (IT) revolution here as well as interview 50 people who shaped it.
The two of them co-curated as well as wrote a fair bit of the book. The other writers are former regional editor of Computerworld Abdul Rahman Mohd Said; former Straits Times journalist Alfred Siew; former National Internet Advisory Committee chairman Bernard Tan; Singapore's first chief information officer Alex Siow; serial entrepreneur Bill Liu; and former IDA communications director Ng Sook Fun. There is also a tribute to Mr Iau by Mr Lim Swee Cheang, vice-dean of the School of Continuing and Lifelong Education at the National University of Singapore.
Chng and Ramakrishna also scored a rare interview with President Tony Tan Keng Yam, who got the ball rolling on computerising Singapore in 1980, after he successfully did so with the Oversea-Chinese Banking Corporation.
Chng says: "He's one of the unsung heroes. Few know that he is responsible for Singapore's two bursts of IT policies, first as the chairman of the National Computerisation Committee in overdrive, when he set the direction for Singapore's IT strategy, and then as the chairman of the National Research Foundation, when he gave (the IT revolution) a second kick with a $500million fund that laid the groundwork for where we are today."
Chng, a former Straits Times technology editor and senior correspondent, wanted to be a computer programmer after graduating with a degree in geography, but was spurned by the IT industry, which took in only engineering and science graduates then.
The big picture that emerges from this book is how Government- led the whole endeavour has been, perhaps at the expense of honing a sharper individual initiative and a greater number of world-beating enterprises.
The curators say that remains unchanged: small and medium-sized enterprises (SMEs) are still not making the most of IT to grow their businesses.
Chng says she recently sat in on a meeting of SMEs to find out what they thought about applying technology developed by research institutions. "The stories they told shocked me because they were the same ones I heard 25 years ago... For example, they said, 'I take on this technology, but I have to do this and that to make it work.' They don't understand they need to commercialise it."
Ramakrishna adds: "A lot of our companies are just building a solution for a particular client, so for their next client, they have to rebuild the solution. But if you build a product from technology, you can replicate it much faster, with fewer man hours, and reap the benefits.
"Look at Bill Gates. From Day 1, when he developed the Microsoft operating system, he was already thinking about a product, which we now know as Windows."
While the curators' effort to give readers such insights in this book is evident, their storyline is less so. There are lots of fascinating gems, including an excellent perspective from Permanent Secretary for Defence Chan Yeng Kit, but the reader has to work hard to mine them as they are buried in quotes, sidebars and hived-off interviews.
Still, this well-written, or at least scrupulously edited, sourcebook is yet another inspiring instance of how Singaporeans have realised their outsized ambitions admirably.
A version of this article appeared in the print edition of The Straits Times on August 01, 2017, with the headline 'From hacking walls to hacking life'. Print Edition | Subscribe
The Straits Times
We have been experiencing some problems with subscriber log-ins and apologise for the inconvenience caused. Until we resolve the issues, subscribers need not log in to access ST Digital articles. But a log-in is still required for our PDFs.
|
{
"pile_set_name": "Pile-CC"
}
|
Precursor RNAs harboring nonsense codons accumulate near the site of transcription.
Messenger RNAs containing premature termination codons (PTCs) are selectively eliminated by nonsense-mediated mRNA decay (NMD). Paradoxically, although cytoplasmic ribosomes are the only known species capable of PTC recognition, in mammals many PTC-containing mRNAs are apparently eliminated prior to release from the nucleus. To determine whether PTCs can influence events within the nucleus proper, we studied the immunoglobulin (Ig)-mu and T cell receptor (TCR)-beta genes using fluorescent in situ hybridization (FISH). Alleles containing PTCs, but not those containing a missense mutation or a frameshift followed by frame-correcting mutations, exhibited elevated levels of pre-mRNA, which accumulated at or near the site of transcription. Our data indicate that mRNA reading frame can influence events at or near the site of gene transcription.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Fontsize for text vs. math
Disclaimer: I am new to Latex, I apologize for the lack of specific and correct vocabulary to describe my question.
I am building an equation sheet and have a question about font sizes.
I would like to specify the font size for the text to be smaller than the font size for the equations.
I know I can do this by brute force (1st table), but that seems cumbersome and inelegant.
When I set the font size for the whole table the size of the equations also change (2nd table).
Is there any way to achieve the effects of the 1st table without defining the size of every text string?
Thank you!
\documentclass[table,9pt]{extarticle}
\usepackage[a4paper, landscape]{geometry}
\everymath{\displaystyle}
\begin{document}
\begin{tabular}{lll}
$\frac{N(x)}{(ax+b)(cx+d)}$ & \small{Linear Factors} & $\frac{A}{ax+b}+\frac{B}{cx+d}$\\ [3.5ex]
$\frac{N(x)}{(ax+b)^2}$ & \small{Repeated} & $\frac{A}{ax+b}+\frac{B}{(ax+b)^2}$\\[10ex]
\end{tabular}
\small{
\begin{tabular}{lll}
$\frac{N(x)}{(ax+b)(cx+d)}$ & Linear Factors & $\frac{A}{ax+b}+\frac{B}{cx+d}$ \\ [3.5ex]
$\frac{N(x)}{(ax+b)^2}$ & Repeated & $\frac{A}{ax+b}+\frac{B}{(ax+b)^2}$\\
\end{tabular}
}
\end{document}
A:
Just one approach: Make the column use smaller text (\tiny here for the sake of showing a clear difference).
And please note: Use font size commands within the group they should resize.
\documentclass[table,9pt]{extarticle}
\usepackage[a4paper, landscape]{geometry}
\everymath{\displaystyle}
\usepackage{array}
\begin{document}
\begin{tabular}{lll}
$\frac{N(x)}{(ax+b)(cx+d)}$ & {\small Linear Factors} & $\frac{A}{ax+b}+\frac{B}{cx+d}$\\ [3.5ex]
$\frac{N(x)}{(ax+b)^2}$ & {\small Repeated} & $\frac{A}{ax+b}+\frac{B}{(ax+b)^2}$\\[10ex]
\end{tabular}
\begin{tabular}{l>{\tiny}ll}
$\frac{N(x)}{(ax+b)(cx+d)}$ & Linear Factors & $\frac{A}{ax+b}+\frac{B}{cx+d}$ \\ [3.5ex]
$\frac{N(x)}{(ax+b)^2}$ & Repeated & $\frac{A}{ax+b}+\frac{B}{(ax+b)^2}$\\
\end{tabular}
\end{document}
|
{
"pile_set_name": "StackExchange"
}
|
Timer subsystems for use with microcomputers are well known in the art, both as integrated and as stand-along units. In every case, prior art timer subsystems reflect a manufacturer's attempt to manage the trade-offs between increased size of an integrated circuit and the maximum possible functionality.
An illustrative example is the MC68HC11A8 microcomputer available from Motorola, Inc. of Austin, Tex. This sophisticated 8-bit microcomputer has an integrated programmable timer subsystem which can perform up to three independent input (capture) function and five independent output (match) functions, all of which are referenced to a single timer reference signal derived from a free-running counter. However, if a customer needs four captures and only one match, or a match and capture referenced to different references, this device will not be adequate.
Another example is the 8096 microcomputer available from Intel Corp. of Santa Clara, Calif. This is a very sophisticated 16-bit microcomputer which includes a timer subsystem. The timer has two separate counters to which events may be referenced, one of which is clocked internally and one of which may be externally clocked. Four input lines are available and may be used to perform as many as eight capture functions, but all capture functions must be related to the first of the two counters. Similarly, six output lines are available and each may perform an independent match function referenced to either of the counters. However, two of the six output pins are shared with the input functions, making them available only for one or the other function, but not for both.
Another common feature of prior art integrated circuit timers is their dependence on a host CPU for initialization, configuration and response to timer-related interrupts. For example, in the MC68HC11A8 mentioned above, the CPU of the microcomputer is solely responsible for servicing the needs of the timer subsystem. For instance, if a capture event occurs from upon the results of which a subsequent match function is to be based, the host CPU must read the captured timer value, perform any necessary calculations, and set up the match event. At some point, the demands of the timer subsystem overwhelm the capacity of the CPU and exclude the performance of any other functions.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Collaboration applications allow participants who are at different locations to establish and participate in a collaborative conference. Participants often present and exchange information during the conference. Typically, a presenting participant in the conference uses a video or slide projector or software to present information on a screen for viewing by the other participants at the same location as the presenting participant. But, the participants who are at the other locations are typically provided paper copies of the presentation.
The advent of computer networking has made it possible for the participants at the various locations to communicate with each other during the conference. For example, the participants of the conference at the different locations can establish network connections using their computing devices, such as laptop computers or handheld devices, and use their computing devices to share information during the conference using their computing devices.
Even though the participants are able to connect to each other, the process of sharing information is not very easy. Typically, a participant wanting to share an item of information uses a file transfer application to transmit the information to another participant. If the sharing participant wants to share the information with more than one participant, the sharing participant typically attaches the information to an email message addressed to the participants who are to receive the information and sends the email message to the addressed participants. While the information can be sent to the participants prior to the conference, often times, there will arise a need to send information during the conference, in which case the addressed participants will receive the transmitted information or email message and the attached information sometime during the conference, and will need to retrieve the shared information also during the conference. Consequently, sharing information during a conference is a source of distraction to the participants. Furthermore, sharing information amongst the conference participants during a conference is difficult and cumbersome.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
NOTICE FROM THE RECORDS AND INFORMATION SECURITY ADMINISTRATION You are currently viewing an out of date version of this file that has been preserved for posterity. Please note that information presented herein may be misleading or incorrect.
Item #: SCP-3449
Object Class: Safe
Special Containment Procedures: SCP-3449 is to be housed in a staNdaRd Safe-level object storage locker in Site-19. Due to the nature of the anomaly, further containment measures are currently not necessary. Testing is curteny underway to determine the long term containment requirements of SCP-3449.
A request to reclassify SCP-3449 as an anomalous item is p3nd!Ng approval from Site Director Panthe.
Description: SCP-3449 refers to an anomalous spiral-bound notebook with a dark blue cover. Due to the formatting of the writing, six pages of the notbok appear to contain normal diary entries, however the words used are incoherent and often ispemlls. Other pages of the diary are either torn, or left blank.
SCP-3449's anomalous property manifests in documentation about SCP-3449. All writing about SCP-3449 will contain arbitrary capitalization, misspellings; and other SYntactIcal errors. Attempts to revise or correct the writing will either fail to remove the errors, or create new errors.
SCP-3449 has shown no further anomalous properties. Contact Researcher Niklo Gerdinel for additional details regarding SCP-3449 testing.
SCP-3449 was recovered by MTF Epsilon-6 (:Vil3yge !dipts”) during an investigation into a series of mild cognitive and informational hazards created in the Pittsburgh Mterp Area. It was found inside a storage unit along with a number of other anomalous objects (see Field Report Delta-546 for a full list of recovered objects). After speaking to the distributor of the storage unit, the Foundation learned that SCP-3449 and associated items were owned by an Edward Selsburgh (POI-4335).
|
{
"pile_set_name": "OpenWebText2"
}
|
From tsunamis to budget battles to revolutions, 2011 has been a tumultuous, news-packed year. Who influenced the news most, for better or worse? Tradition dictates that TIME's editors choose the Person of the Year. Now that voting has closed, view the final ratings.
Fukushima 50
By Bryan WalshFriday, Nov. 11, 2011
Tokyo Electric Power Co. / Newscom / Kyodo
In truth, there were far more than 50. The name derives from the original 50 Tokyo Electric Power Co. workers who stayed behind in the Fukushima nuclear plant after it was crippled by an earthquake and tsunami. Those workers were soon joined by hundreds of firefighters, engineers and even soldiers from around Japan all of whom, as then Japanese Prime Minister Naoto Kan put it, were "prepared for death" as they fought for weeks to prevent the plant from melting down uncontrollably. The Fukushima disaster exposed some of the worst aspects of Japanese politics: secretiveness, buck passing and a willingness to sacrifice safety for the convenience of the powerful. But the Fukushima 50 represented Japanese society at its best: stoic heroism, self-sacrifice and a communal spirit.
|
{
"pile_set_name": "Pile-CC"
}
|
The surgical correction of varicocele: multidisciplinary study on semen evaluation and prognostic factors for fertility.
The seminal pattern was studied in a group of 52 patients before and six months after sclerotherapy of varicocele. In this series, we studied the differences in clinical and seminal characteristics between the group that succeeded in obtaining a pregnancy and the group that remained infertile after 1 year follow-up. The difference in pregnancy rate is discussed between the operated group and a control group of pz, who refused any form of surgery, after 1 year follow-up.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Mumsnet was launched in 2000 and has since grown to become Britain’s largest network for parents, with active members all over the UK.
We’re proud to partner with Mumsnet, supporting them in sparking engaging discussions and providing families across the country with great recipes, ideas and tips –from parents, for parents.
With Mother's Day coming up, we've teamed up with Mumsnet to help some vloggers learn how to make their mums' famous family recipes.
Mother's Day challenge, Mum vs Mum: Apple Crumble
Mother's Day challenge, Mum vs Mum: Apple Crumble
Mumsnet vlogger Mamalina has always admired her mum's classic apple crumble. Watch her learn how to make this favourite family recipe.
Mother's Day challenge, Mum vs Mum: Chicken Stir-Fry
Mother's Day challenge, Mum vs Mum: Chicken Stir-Fry
Watch Mumsnet vlogger Bridie by the Sea learn how to cook her mum's famous chicken stir-fry.
|
{
"pile_set_name": "Pile-CC"
}
|
---
abstract: 'In this article we characterize the complex hyperbolic groups that leave invariant a copy of the Veronese curve in $\Bbb{P}^2_{\Bbb{C}}$. As a corollary we get that every discrete compact surface group in $\PO^+(2,1)$ admits a deformation in $\PSL(3,\Bbb{C})$ with a non-empty region of discontinuity which is not conjugate to a complex hyperbolic subgroup. This provides a way to construct new examples of Kleinian groups acting on $\Bbb{P}^2_\Bbb{C}$, see [@CNS; @CS1; @SV3; @SV1; @SV2].'
address:
- ' UCIM UNAM, Unidad Cuernavaca, Av. Universidad s/n. Col. Lomas de Chamilpa, C.P. 62210, Cuernavaca, Morelos, México.'
- 'IIT UACJ, Av. del Charro 610 Norte, Partido Romero, C.P. 32310, Ciudad Juárez, Chihuahua, México'
author:
- Angel Cano
- Luis Loeza
title: Two dimensional Veronese groups with an invariant ball
---
[^1]
Introduction {#introduction .unnumbered}
============
Back in the 1990s, Seade and Verjovsky began the study of discrete groups acting on projective spaces, see [@SV3; @SV1; @SV2]. Over the years, new results have been discovered, see [@CNS]. However, it has been hard to construct groups acting on $\Bbb{P}^2_\Bbb{C}$ which are neither virtually affine nor complex hyperbolic. In this article we use the irreducible representation $\iota$ of $\PSL(2,\Bbb{C})$ into $\PSL(3,\Bbb{C})$ to produce such groups, more precisely, we show:
Let $\Gamma\subset \PSL(2,\Bbb{C})$ be a discrete group of the first kind with non-empty discontinuity region in the Riemann sphere. Then the following claims are equivalent:
1. The group $\Gamma$ is Fuchsian.
2. The group $\iota\Gamma$ is complex hyperbolic.
3. The group $\iota\Gamma$ is $\Bbb{R}$-Fuchsian.
Before we present our next result we should recall the following definition, see [@lab] page 30. A group $G$ is called a [*compact surface group*]{}, if it is isomorphic to the fundamental group of a compact orientable topological surface $\Sigma_g$ of genus $g \geq 2$.
\[t:main2\] Let $\Sigma_g$ a compact orientable topological surface $\Sigma_g$ of genus $g \geq 2$ and $\rho_0: \Pi_{1}(\Sigma_g)\rightarrow \PO^+(2,1)$ be a faithful discrete representation, where $\PO^+(2,1)$ denotes the projectivization of identity component of $\O(2,1)$. Then we can find a sequence of discrete faithful representations $\rho_n: \Pi_{1}(\Sigma_g)\rightarrow \PSL(3,\Bbb{C})$ such that:
1. For each $n\in \Bbb{N}$ the group $\rho_n(\Pi_1(\Sigma_g))=\Gamma_n$ is a complex Kleinian group whose action on $\Bbb{P}^2_{\Bbb{C}}$ is irreducible.
2. For each $n\in \Bbb{N}$ the group $\Gamma_n$ is not conjugate to a subgroup of $\PU(2,1)$ or $\PSL(3,\Bbb{R})$.
3. The sequence of representations $(\rho_n)$ converge algebraically to $\Gamma_0$, [*i. e.*]{} $lim_n \rho_n(\gamma)=h$ exists as a projective transformation for all $\gamma\in \Pi_1(\Sigma_g)$ and $\Gamma_0=\{h:lim_n\rho_n(\gamma)=h, \gamma\in \Pi_1(\Sigma_g) \}$ compare with the corresponding definition in [@JM].
4. The sequence $(\Gamma_n)$ of compact surface groups converge geometrically to $\Gamma_0$, [*i. e.*]{} if for every subsequence $(j_n)$ of $(n)$ we get $$\Gamma_0=\{g\in \PSL(3,\Bbb{C}):g=lim_{j_n}\rho_{j_n}(\gamma_n), \gamma_n\in \Pi_1(\Sigma_g)\},$$ compare with the corresponding definition in [@JM].
There are complex Kleinian groups acting on $\Bbb{P}^2_{\Bbb{C}}$ which are neither conjugate to complex hyperbolic groups nor virtually affine groups.
This paper is organized as follows: in Section \[s:recall\] we review some general facts and introduce the notation used throughout the text. In Section \[s:gever\] we describe some properties of the Veronese curve which are useful for our purposes. In Section \[s:chvh\] we characterize the complex hyperbolic subgroups that leave invariant a Veronese curve. In Section \[s:riv\] we depict those real hyperbolic subgroups leaving invariant a Veronese curve. Finally, in Section \[s:rep\] we show that every discrete compact surface group in $\PO(2,1)^+$ admits a deformation in $\PSL(3,\Bbb{C})$ which is not conjugate to a complex hyperbolic subgroup and has non-empty Kulkarni region of discontinuity.
Preliminaries {#s:recall}
=============
Projective geometry
-------------------
The complex projective space $\mathbb{P}^2_{\mathbb {C}}$ is defined as $$\mathbb{P}^{2}_{\mathbb {C}}=(\mathbb {C}^{3}\setminus \{0\})/\Bbb{C}^*,$$ where $\Bbb{C}^*$ acts by the usual scalar multiplication. This is a compact connected complex $2$-dimensional manifold. If $[\mbox{}]:\mathbb{C}^{3}\setminus\{0\}\rightarrow\mathbb{P}^{2}_{\mathbb{C}}$ is the quotient map, then a non-empty set $H\subset\mathbb{P}^2_{\mathbb{C}}$ is said to be a line if there is a $\mathbb{C}$-linear subspace $\widetilde{H}$ in $\mathbb{C}^{3}$ of dimension $2$ such that $[\widetilde{H}\setminus \{0\}]=H$. If $p,q$ are distinct points then $\overleftrightarrow{p,q}$ is the unique complex line passing through them. In this article, $e_1,e_2,e_{3}$ will denote the standard basis for $\Bbb{C}^{3}$.
Projective transformations
----------------------------
The group of projective automorphisms of $\mathbb{P}^{2}_{\mathbb{C}}$ is defined as $$\PSL(3, \mathbb {C}) \,:=\, \GL({3}, \Bbb{C})/\Bbb{C}^*,$$ where $\Bbb{C}^*$ acts by the usual scalar multiplication. Then $\PSL(3, \mathbb{C})$ is a Lie group acting by biholomorphisms on $\Bbb{P}^2_{\Bbb{C}}$; its elements are called projective transformations. We denote by $[[\mbox{ }]]: \GL(3,\mathbb{C})\rightarrow \PSL(3,\mathbb{C})$ the quotient map. Given $ \gamma\in\PSL(3, \mathbb{C})$, we say that $\widetilde\gamma\in\GL(3,\mathbb {C})$ is a [*lift*]{} of $ \gamma$ if $[[\widetilde\gamma]]=\gamma$.\
Complex hyperbolic groups
-------------------------
In the rest of this paper, we will be interested in studying those subgroups of $\PSL(3,\Bbb{C})$ that preserve the unitary complex ball. We start by considering the following Hermitian matrix: $$H=
\left (
\begin{array}{lll}
&&1\\
&1&\\
1&&
\end{array}
\right ).$$ We will set $$\U(2,1)=\{g\in \GL(3,\Bbb{C}):g^*Hg^*=H\}$$ $$\O(2,1)=\{g\in \GL(3,\Bbb{R}):g^t Hg=H\}$$
and $\langle,\rangle:\Bbb{C}^{3}\rightarrow \Bbb{C}$ the Hermitian form induced by $H$. Clearly, $\langle,\rangle$ has signature $(2,1)$ and $\U(2,1)$ is the group that preserves $\langle,\rangle$, see [@goldman]. The projectivization $\PU(2,1)$ preserves the unitary complex ball: $$\Bbb{H}^2_\Bbb{C}=\{[w]\in \Bbb{P}^2_{\Bbb{C}}\mid \langle w,w\rangle <0\}.$$ Given a subgroup $\Gamma\subset\PU(2,1)$, we define the following notion of limit set, as in [@CG].
Let $\Gamma\subset \PU(2,1)$, then its Chen–Greenberg limit set is $\Lambda_{\CG}(\Gamma):= \bigcup \overline{\Gamma x}\cap \partial \Bbb{H}^2_\Bbb{C}$ where the union on the right runs over all points $x\in \Bbb{H}^2_\Bbb{C}$.
As in the Fuchsian groups case, $\Lambda_{\CG}(\Gamma)$ has either 1, 2 or infinitely many points. A group is said to be non-elementary if $\Lambda_{\CG}(\Gamma)$ has infinitely many points, and in that case it does not depend on the choice of orbit, [*i.e.*]{} $\Lambda_{\CG}(\Gamma):= \overline{\Gamma x}\cap \partial \Bbb{H}^2_\Bbb{C}$ where $x\in \Bbb{H}^2_\Bbb{C}$ is any point.\
Pseudo-projective transformations
----------------------------------
The space of linear transformations from $\Bbb{C}^{3}$ to $\Bbb{C}^{3}$, denoted by $M(3,\Bbb{C})$, is a complex linear space of dimension $9$, where $\GL(3,\Bbb{C})$ is an open dense set in $ M(3,\Bbb{C})$. Then $\PSL(3,\Bbb{C})$ is an open dense set in $QP(3,\Bbb{C})=(M(3,\Bbb{C})\setminus\{0 \})/\Bbb{C}^*$ called in [@CS] the space of pseudo-projective maps. Let $\widetilde{M}:\mathbb{C}^{3}\rightarrow\mathbb{C}^{3}$ be a non-zero linear transformation. Let $Ker(\widetilde M)$ be its kernel and $Ker([[\widetilde M]])$ denote its projectivization. Then $\widetilde{M}$ induces a well defined map $[[\widetilde M]]:\mathbb {P}^{2}_\mathbb {C}\setminus Ker([[\widetilde M]]) \rightarrow\mathbb {P}^{2}_\mathbb {C}$ by $$[[\widetilde M]]([v])=[\widetilde M(v)].$$ The following result provides a relation between convergence in $QP(3,\Bbb{C})$ viewed as points in a projective space and the convergence viewed as functions.
\[See [@CS]\] \[p:completes\] Let $(\gamma_m)_{m\in \mathbb {N}}\subset \PSL(3,\mathbb {C})$ be a sequence of distinct elements. Then:
1. There is a subsequence $(\tau_m)_{m\in \mathbb {N}}\subset(\gamma_m)_{m\in\mathbb{N}}$ and a $\tau_0\in M(3,\Bbb{C})\setminus\{0\}$ such that $\tau_m\xymatrix{\ar[r]_{m\rightarrow\infty}&}\tau_0$ as points in $QP(3,\Bbb{C})$.
2. If $(\tau_m)_{m\in \mathbb {N}}$ is the sequence given by the previous part of this lemma, then $\tau_m\xymatrix{\ar[r]_{m\rightarrow\infty}&}\tau_0$, as functions, uniformly on compact sets of $\mathbb{P}^n_\mathbb{C}\setminus Ker(\tau_0)$. Moreover, the equicontinuity set of $\{\tau_m\vert m\in \Bbb{N} \}$ is $\Bbb{P}^n\setminus Ker(\tau_0)$.
Kulkarni’s limit set
--------------------
When we look at the action of a group acting on a general topological space, in general there is no natural notion of limit set. A nice starting point is Kulkarni’s limit set.
\[d:lim\] Let $\Gamma\subset\PSL(n+1,\mathbb{C})$ be a subgroup. We define
1. the set $\Lambda(\Gamma)$ to be the closure of the set of cluster points of $\Gamma z$ as $z$ runs over $\mathbb{P}^n_{\mathbb{C}}$,
2. the set $L_2(\Gamma)$ to be the closure of cluster points of $\Gamma K$ as $K$ runs over all the compact sets in $\mathbb{P}^n_{\mathbb{C}}\setminus \Lambda(\Gamma)$,
3. and *Kulkarni’s limit set* of $\Gamma$ to be $$\Lambda_{\Kul}(\Gamma)=\Lambda(\Gamma)\cup L_2(\Gamma),$$
4. *Kulkarni’s discontinuity region* of $\Gamma$ to be $$\Omega_{\Kul}(\Gamma)=\mathbb{P}^n_{\mathbb{C}}\setminus\Lambda_{\Kul}(\Gamma).$$
Kulkarni’s limit set has the following properties. For a more detailed discussion of this in the two-dimensional setting, see [@CNS].
\[p:pkg\] Let $\Gamma\subset \PSL(3,\Bbb{C})$ be a complex Kleinian group. Then:
1. The sets\[i:pk2\] $\Lambda_{\Kul}(\Gamma),\,\Lambda(\Gamma),\,L_2(\Gamma)$ are $\Gamma$-invariant closed sets.
2. \[i:pk3\] The group $\Gamma$ acts properly discontinuously on $\Omega_{\Kul}(\Gamma)$.
3. \[i:pk4\] If $\Gamma$ does not have any projective invariant subspaces, then $$\Omega_{\Kul}(\Gamma)=Eq(\Gamma).$$ Moreover, $\Omega_{\Kul}(\Gamma)$ is complete Kobayashi hyperbolic and is the largest open set on which the group acts properly discontinuously.
The Geometry of the Veronese Curve {#s:gever}
===================================
Now let us define the Veronese embedding. Set $$\begin{array}{l}
\psi:\Bbb{P}^1_\Bbb{C}\rightarrow \Bbb{P}^2_\Bbb{C}\\
\psi([z,w])=[z^2,2zw, w^2].
\end{array}$$
Let us consider $\iota: \PSL(2,\Bbb{C})\rightarrow \PSL(3,\Bbb{C})$ given by $$\iota\left(\frac{az+b}{cz+d}\right )=\left [\left [
\begin{array}{lll}
a^2&ab&b^2\\
2ac&ad+bc&2bd\\
c^2&dc&d^2\\
\end{array}
\right ]\right ].$$ Trivially, $\iota$ is well defined. Note that this map is induced by the canonical action of $\SL(2,\Bbb{C})$ on the space of homogeneous polynomials of degree two in two complex variables.
\[l:mor\] The map $\iota$ is an injective group morphism.
Let $$A=\left [\left [
\begin{array}{ll}
a&b\\
c&d\\
\end{array}
\right ]\right ],\,B=\left [\left [
\begin{array}{ll}
e&f\\
g&h\\
\end{array}
\right ]\right ]\in\PSL(2,\Bbb{C}).$$ Then
$$\begin{array}{ll}
\iota (AB)
&=\iota\left [\left [
\begin{array}{ll}
ae+bg&af+bh\\
ce+dg&cf+dh\\
\end{array}
\right ]\right ]\\
&=\left [\left [
\begin{array}{lll}
(ae+bg)^2&(ae+bg)(af+bh)&( af+bh)^2\\
2(ae+bg)(ce+dg)&(cf+dh)(ae+bg)+(af+bh)(ce+dg)&2(af+bh)(cf+dh)\\
(ce+dg)^2&2(ce+dg)(cf+dh)&(cf+dh)^2\\
\end{array}
\right ]\right ]\\
&=\left [\left [
\begin{array}{lll}
a^2&ab&b^2\\
2bc&ad+bc&2bd\\
c^2&cd&d^2\\
\end{array}
\right ]\right ]\left [\left [
\begin{array}{lll}
e^2&ef&f^2\\
2eg&eh+fg&2fh\\
g^2&gh&h^2\\
\end{array}
\right ]\right ]\\
&=\iota(A)\iota(B).
\end{array}$$
Therefore $\iota$ is a group morphism. Now suppose $A=[[a_{ij}]]\in \PSL(2,\Bbb{C})$ is such that $\iota(A)=Id$. Then $$\left [\left [
\begin{array}{lll}
a^2_{11}&a_{11}a_{12}&a^2_{12}\\
2a_{12}a_{21}&a_{11}a_{22}+a_{12}a_{21} &2a_{12}a_{21}\\
a_{21}^2&a_{21}a_{22}&a_{22}^2\\
\end{array}
\right ]\right ]
=\left [\left [
\begin{array}{lll}
1&0&0\\
0&1&0\\
0&0&1\\
\end{array}
\right ]\right ]$$ and so we conclude $a_{12}=a_{21}=0$. Since $a_{11}a_{22}-a_{12}a_{21}=1$, we deduce $a_{11}^2=a_{22}^2=1$, [*i.e.*]{} $A=Id$, which concludes the proof.
The morphism $\iota$ is type preserving. In particular, if $\Gamma\subset\PSL(2,\Bbb{C})$ is a discrete subgroup, we must have $\iota(\Gamma)$ is a discrete group such that each element is strongly loxodromic.
Here, by type preserving, we mean that $\iota$ carries elliptic elements into elliptic elements, and similarly for loxodromic and parabolic elements.
Consider $$A=
\left [\left [
\begin{array}{ll}
a&0\\
0&a^{-1}
\end{array}
\right ]\right ],\,B=
\left [ \left [
\begin{array}{ll}
1&1\\
0&1
\end{array}
\right ]\right ]\in\PSL(2,\Bbb{C}).$$ A straightforward calculation shows $$\iota(A)=
\left [\left [
\begin{array}{lll}
a^2&0&0\\
0&1&0\\
0&0&a^{-2}
\end{array}
\right ]\right ],\,\iota(B)=
\left [ \left [
\begin{array}{lll}
1&1&1\\
0&1&0\\
0&0&1\\
\end{array}
\right ]\right ].$$ This shows that $\iota$ is type preserving. Now let $$A_n=
\left [\left [
\begin{array}{ll}
a_n&b_n\\
c_n&d_n\\
\end{array}
\right ]\right ]\in\PSL(2,\Bbb{C})$$ be a sequence such that $\iota(A_n)\xymatrix{\ar[r]_{n\rightarrow\infty}&}Id$. Then
$$\left [\left [
\begin{array}{lll}
a^2_n&a_nb_n&b^2_n\\
2a_nc_n& a_nd_n+b_nc_n&2b_nd_n\\
c_n^2&d_nc_n&d^2_n\\
\end{array}
\right ] \right ]
\xymatrix{\ar[r]_{n\rightarrow\infty}&}Id.$$ Therefore the $(a^2_n),(d^2_n)$ are bounded and bounded away from $0$, $b_n^2\xymatrix{\ar[r]_{n\rightarrow\infty}&}0$, and $c_n^2\xymatrix{\ar[r]_{n\rightarrow\infty}&}0$, which is a contradiction.
Let $g\in\PSL(3,\Bbb{C}) $ be such that $g$ fixes four points in general position. Then $g=Id$.
We can assume that the four points in general position fixed by $g$ are $\{e_1,e_2,e_3,p\}$. Then $$g=
\left [\left [
\begin{array}{lll}
a_1&0&0\\
0&a_2&0\\
0&0& a_3
\end{array}
\right ]\right ].$$
Since $p,e_1,e_2,e_3$ are in general position, we conclude $p=[b_1,b_2,b_3]$ where $b_1b_2b_3\neq 0$. On the other hand, since $p$ is fixed we deduce $$[b_1,b_2,b_3]=[a_1b_1,a_2b_2,a_3b_3],$$ therefore there is an $r\in\Bbb{C}^*$ such that $b_i=ra_ib_i$. In consequence $a_1=a_2=a_3$, which concludes the proof.
The Veronese curve has four points in general position.
A straightforward calculation shows that $[1,0,0], [0,0,1],[1,2,1],[1,2i,-1]$ are points on the Veronese curve. In order to conclude the proof, it is enough to observe $$\left \vert
\begin{array}{lll}
1&1&1 \\
0&2&2i\\
0&1& -1
\end{array}\right\vert=-2-2i,\,\hbox{and}\,\left\vert
\begin{array}{lll}
0&1&1\\
0&2&2i\\
1&1&-1
\end{array}\right\vert=-2+2i.$$
The subgroup of $\PSL(3,\Bbb{C})$ leaving $\psi(\Bbb{P}_\Bbb{C}^1)$ invariant is $\iota(\PSL(2,\Bbb{C}))$.
First, let us prove that $Ver=\psi(\Bbb{P}_\Bbb{C}^1)$ is invariant under $\iota(\PSL(2,\Bbb{C}))$. Let $A=[[a_{ij}]]\in \PSL(2,\Bbb{C})$. Then $$\iota
\left [\left [
\begin{array}{ll}
a_{11}&a_{12}\\
a_{21}&a_{22}\\
\end{array}
\right ]\right ]
\left [
\begin{array}{l}
x\\
2xy\\
y^2\\
\end{array}
\right ]=
\left [
\begin{array}{l}
(a_{11}x+a_{12}y)^2 \\
2(a_{21}x+a_{22}y)(a_{11}x+a_{12}y)\\
(a_{21}x+a_{22}y)^2\\
\end{array}
\right ],$$ and so $Ver$ is invariant under $\iota \PSL(2,\Bbb{C})$ and the following diagram commutes. $$\label{e:aut}
\xymatrix{
\Bbb{P}_\Bbb{C}^1 \ar[r]^\gamma \ar[d]^\psi & \Bbb{P}_\Bbb{C}^1 \ar[d]^\psi \\
Ver \ar[r]^{\iota \gamma} & Ver
}$$ Now let $\tau\in\PSL(3,\Bbb{C})$ be an element which leaves $Ver$ invariant. Define $$\begin{array}{l}
\widetilde{\tau}:\Bbb{P}_\Bbb{C}^1\rightarrow \Bbb{P}_\Bbb{C}^1 \quad.\\
\widetilde{\tau}(z)=\psi^{-1}(\tau(\psi(z))).
\end{array}$$ Clearly $\widetilde{\tau}$ is well defined and biholomorphic, thus $\widetilde{\tau}\in \PSL(2,\Bbb{C})$ and the following diagram commutes. $$\xymatrix{
\Bbb{P}_\Bbb{C}^1 \ar[r]^{\widetilde \tau}\ar[d]^\psi & \Bbb{P}_\Bbb{C}^1 \ar[d]^\psi \\
Ver \ar[r]^{\tau} & Ver
}$$ From diagram \[e:aut\], we conclude that $\tau\mid_{Ver}=\iota\widetilde\tau\mid_{Ver}$. Since the Veronese curve has four points in general position, we conclude $\tau=\iota\widetilde \tau$ in $\Bbb{P}_\Bbb{C}^2$, which concludes the proof.
\[l:ltanver\] Given $[1,k]\in \Bbb{P}^1_\Bbb{C}$, the tangent line to $Ver$ at $\psi[1,k]$, denoted $T_{\psi[1,k]}Ver$, is given by $$T_{\psi[x,y]}Ver=\{[x,y,z]\in \Bbb{P}^2_\Bbb{C}\vert z=ky-k^2x\}.$$
Let us consider the chart $(W_1=\{[x,y,z]\in\Bbb{P}^2_\Bbb{C}\vert x\neq 0\},\phi_1:W_1\rightarrow\Bbb{C}^2) $ of $\Bbb{P}^2_\Bbb{C}$ where $\phi_1[x,y,z]=(yx^{-1},zx^{-1})$ and $(W_2=\{[x,y]\in\Bbb{P}^1_\Bbb{C}\vert x\neq 0\},\phi_2:W_2\rightarrow\Bbb{C}^1)$ of $\Bbb{P}^1_\Bbb{C}$ where $\phi_1[x,y]=yx^{-1}$. Let us define $$\begin{array}{l}
\phi:\Bbb{C}\rightarrow \Bbb{C}^2\\
\phi(z)=\phi_1(\psi(\phi_2^{-1}( z)))
\end{array}.$$
A straightforward calculation shows that $\phi(z)=(2z,z^2)$, thus the tangent space to the curve $\phi$ at $\phi(k)$ is $\Bbb{C}(1, k)+(2k,k^2)$. Therefore the tangent line to $Ver$ at $[1,2k,k^2]$ is $\overleftrightarrow{[1,2k,k^2], [1,2k+1,k+k^2]}$. A simple verification shows
$$T_{\psi[x,y]}Ver=\{[x,y,z]\in \Bbb{P}^1_\Bbb{C} \vert z=ky-k^2x\}.$$
\[l:3gen\] Let $\Gamma\subset\PSL(2,\Bbb{C})$ be a non-elementary subgroup and $x,y,z\in \Lambda(\Gamma)$ be distinct points, then the lines $T_{\psi(x)}Ver,T_{\psi(y)}Ver,T_{\psi(z)}Ver$ are in general position.
Let us assume that $[1,0],[0,1]\notin \Lambda(\Gamma)$. Then there are $k,r,s\in \Bbb{C}$ such that
$$\begin{array}{l}
\psi(x)=[1,2k,k^2] \\
\psi(y)=[1,2r,r^2] \\
\psi(z)=[1,2s,s^2].
\end{array}$$ From Lemma \[l:ltanver\] we know $$\begin{array}{l}
T_{\psi(x)} Ver=\{
[x,y,z]
\in \Bbb{P}^1_\Bbb{C} \vert z=ky-k^2x\} \\
T_{\psi(y)} Ver=\{
[x,y,z]
\in \Bbb{P}^1_\Bbb{C} \vert z=ry-r^2x\} \\
T_{\psi(z)} Ver =\{
[x,y,z]
\in \Bbb{P}^1_\Bbb{C} \vert z=sy-s^2x\}.
\end{array}$$ Since $$\left \vert
\begin{array}{lll}
k^2&-k&1\\
r^2&-r&1\\
s^2&-s&1\\
\end{array}\right\vert=(s-r)(k-s)(k-r)\neq 0$$ we conclude the proof.
\[l:pseudo\] Let $(\gamma_n)\subset \PSL(2,\Bbb{C})$ be a sequence of distinct elements such that $\gamma_n\xymatrix{\ar[r]_{\rightarrow\infty}&}x$ uniformly on compact sets of $\Bbb{P}^1_\Bbb{C}\setminus\{y\}$. Then $\iota\gamma_n\xymatrix{\ar[r]_{\rightarrow\infty}&}\psi(x)$ uniformly on compact sets of $\Bbb{P}^2_\Bbb{C}\setminus T_{\psi(y)}Ver$.
Let us assume that $\gamma_n=\left [\left [a_{ij}^{(n)}\right ]\right ]$. Note that we can assume $a_{ij}^{(n)}\xymatrix{\ar[r]_{n\rightarrow\infty}&}a_{ij}$ and $\sum_{i,j=1}^2\mid a_{ij} \mid\neq 0$. Then $\gamma_n\xymatrix{\ar[r]_{n\rightarrow\infty}&}\gamma=\left [\left [a_{ij}\right ]\right ]$ uniformly on compact sets of $\Bbb{P}^1_{\Bbb{C}}\setminus Ker(\gamma)$, thus $Ker(\gamma)=\{y\}$ and $Im(\gamma)=\{x\}$. Therefore there is a $k\in \Bbb{C}^*$ such that $x= [1,k]$, thus $a_{11}=-ka_{12}$ and $a_{21}=-ka_{22}$. In consequence $$\iota\gamma_n
\xymatrix{ \ar[r]_{n \rightarrow\infty}&}
B=
\left [ \left [
\begin{array}{lll}
k^2a_{12}^2&-ka_{12}^2& a_{12}^2\\
2k^2a_{12}a_{22}&-2ka_{12}a_{22}&2a_{12}a_{22}\\
k^2a_{22}^{2}&-ka_{22}^2&a_{22}^2\\
\end{array}
\right ]\right ].$$
A simple calculation shows that $Ker(B)$ is the line $\ell=\overleftrightarrow{ [e_1-k^2e_3],[e_2+ke_3]}$. Also it is not hard to check that $$\ell=\{[x,y,z]\vert k^2x-ky+z=0 \},$$ which concludes the proof.
Let $\Gamma\subset\PSL(2,\Bbb{C})$ be a non-elementary group. Then $\iota(\Gamma)$ does not have invariant subspaces in $\Bbb{P}^2_\Bbb{C}$.
Let us assume that there is a complex line $\ell$ invariant under $\iota(\Gamma)$. By Bézout’s theorem $Ver\cap \ell$ has either one or two points. From the following commutative diagram $$\xymatrix{
\Bbb{P}_\Bbb{C}^1 \ar[r]^{ \tau}\ar[d]^\psi & \Bbb{P}_\Bbb{C}^1 \ar[d]^\psi \\
Ver \ar[r]^{\iota\tau} & Ver
}$$ where $\tau\in\Gamma$, we deduce that $\Gamma$ leaves $\psi^{-1}(Ver\cap\ell)$ invariant. Therefore $\Gamma$ is an elementary group, which is a contradiction, thus $\iota\Gamma$ does not have invariant lines in $\Bbb{P}^2_\Bbb{C}$. Finally, if there is a point $p\in\Bbb{P}_\Bbb{C}^2$ fixed by $\iota\Gamma$, then by Lemmas \[l:3gen\], \[l:eq\] and \[l:pseudo\], there is a sequence of distinct elements $(\gamma_m)_{m\in\Bbb{N}}\subset\Gamma$ and a pseudo-projective transformation $\gamma\in QP(3,\Bbb{C})$ such that $\iota\gamma_m\xymatrix{\ar[r]_{m\rightarrow\infty}&}\gamma $ and $Ker(\gamma)$ is a complex line not containing $p$. Since $p$ is invariant and outside $Ker(\gamma)$ we conclude $\{p\}=Im(\gamma)$. On the other hand, by Lemma \[l:pseudo\] we deduce $p\in Ver$. Therefore $\Gamma$ is elementary, which is a contradiction.
The following theorem follows easily from the previous discussion.
\[l:eq\] Let $\Gamma$ be a discrete subgroup of $\PSL(2,\Bbb{C})$. Then $$\Bbb{P}_\Bbb{C}^2\setminus Eq(\iota(\Gamma))=\bigcup_{z\in\Lambda(\Gamma)}T_{\psi(z)}(\psi(\Bbb{P}_\Bbb{C}^)).$$ Moreover $\Omega_{\Kul}(\iota\Gamma)=Eq(\iota(\Gamma))$ is Kobayashi hyperbolic, pseudo-convex, and is the largest open set on which $\Gamma$ acts properly discontinuously.
Complex Hyperbolic Groups Leaving $Ver$ Invariant {#s:chvh}
=================================================
In this section we characterize the subgroups of $\PU(2,1)$ that leave invariant a projective translation of the Veronese curve $Ver$. We need some preliminary lemmas.
\[l:semialg\] Let $B$ be a complex ball. Then $$Aut(BV)=\{g\in\PSL(3,\Bbb{C})\vert g\in \iota\PSL(2,\Bbb{C}),gB=B\}$$ is a semi-algebraic group.
Since $\iota(\PSL(2,\Bbb{C}))$ and $\PU(2,1)$ are simple Lie groups with trivial centers, we deduce that they are semi-algebraic groups (see [@semi]). Thus the sets $$\begin{array}{l}
\{(g,h,gh): g,h\in Aut(BV)\}\\
\{(g,g^{-1}): g\in Aut(BV)\}
\end{array}$$ are semi-algebraic sets. Therefore $Aut(BV)$ is a semi-algebraic group.
\[c:liedim\] Let $\Gamma\subset\PSL(2,\Bbb{C})$ be a discrete non-elementary group such that $\iota\Gamma$ leaves invariant a complex ball $B$. Then:
1. \[l:1\] The group $Aut(BV)$ is a Lie group of positive dimension.
2. \[l:2\] We have $\psi\Lambda(\Gamma)\subset Ver\cap\partial B$.
3. \[l:3\] Set $C=\partial B\cap Ver$. Then the set $\psi^{-1}(C)$ is an algebraic curve of degree at most four.
4. \[l:4\] The group $\iota^{-1}Aut(BV)$ can be conjugated to a subgroup of $Mob(\hat{\Bbb{R}})$, where $Mob(\hat{\Bbb{R}})=\{\gamma\in\PSL(2,\Bbb{C}):\gamma(\Bbb{R}\cup\{\infty\})=\Bbb{R}\cup\{\infty\}\}$.
5. \[l:5\] The set $\psi^{-1}(C)$ is a circle in the Riemann sphere.
6. \[l:6\] The set $C$ is an $\Bbb{R}$-circle, [*i.e.*]{} $C=\gamma(\partial\Bbb{H}^2_{\Bbb{C}}\cap\Bbb{P}^2_{\Bbb{R}})$, where $\gamma\in\PSL(3,\Bbb{C})$ is some element satisfying $\gamma(\Bbb{H}^2_{\Bbb{C}})=B$.
7. \[l:7\] The set $Ver\cap (\Bbb{P}^2_{\Bbb{C}}\setminus\overline{B})$ is non-empty.
8. \[l:8\] The set $Ver\cap B$ is non-empty.
Let us start by showing (\[l:1\]). Since $Aut(BV)$ is semi-algebraic, we deduce that it is a Lie group with a finite number of connected components (see [@semi]). On the other hand, since $Aut(BV)$ contains a discrete subgroup, we conclude $Aut(BV)$ has positive dimension.\
Now let us prove part (\[l:2\]). Let $x\in \Lambda(\Gamma)$. Then there is a sequence $(\gamma_n)\subset \Gamma$ of distinct elements such that $\gamma_n\xymatrix{\ar[r]_{m\rightarrow\infty}&}x$ uniformly on compact sets of $\widehat{\Bbb{C}}\setminus \{x\}$. From Lemma \[l:pseudo\] we know that $\iota\gamma_n\xymatrix{\ar[r]_{m\rightarrow\infty}&}\psi(x)$ uniformly on compact sets of $\Bbb{P}_\Bbb{C}^2\setminus T_{\psi(x)}Ver$, thus $\psi x\in \partial B$ and $T_{\psi(x)}Ver$ is tangent to $\partial(B)$ at $x$. This concludes the proof.\
Now let us prove part (\[l:3\]). Since $\Gamma$ preserves the ball $B$, there is a Hermitian matrix $A=(a_{ij})$ with signature $(2,1)$ such that $B=\{[x]\in\Bbb{P}^2_{\Bbb{C}}:\overline{x}^t Ax<0\}$. Without loss of generality, we may assume that $[0,0,1]\notin C=\partial(B)\cap Ver$. Thus for each $x\in C$, there is a unique $z\in \Bbb{C}$ such that $x=[1,2z,z^2]=\psi [1,z]$ and $(1,2\bar z,\bar{z}^2)^tA(1, 2z,z^2)=0$. A straightforward calculation shows that $(1,2\bar z,\bar{z}^2)^tA(1, 2z,z^2)=0$ is equivalent to $$\label{e:cuadrica}
a_{11}+4Re(a_{12}z)+2Re(a_{13}z^2)+a_{33}\vert z\vert^4+4\vert z\vert^2 Re(a_{23}z)+4\vert z \vert^2a_{22}=0.$$ Taking $z=x+iy$ and $a_{ij}=b_{ij}+ic_{ij}$, Equation (\[e:cuadrica\]) can be written as $$\begin{array}{l}
a_{11}+4(b_{12}x-c_{12}y)+2(b_{13}(x^2-y^2)-2c_{13}xy)+a_{33}(x^2+y^2)^2+\\
+4(x^2+y^2)( b_{23}x-c_{23}y)+4(x^2+y^2)a_{22}=0,
\end{array}$$ which proves the assertion.\
Let us prove part (\[l:4\]). Since $\iota^{-1}Aut(BV)$ is a Lie group with positive dimension containing a non-elementary discrete subgroup, we deduce that (see [@CS1]) $\iota^{-1}Aut(BV)$ can be conjugated either to $\PSL(2,\Bbb{C})$ or a subgroup of $Mob(\hat{\Bbb{R}})$. On the other hand, we know that $\PSL(2,\Bbb{C})$ acts transitively on the Riemann sphere, but $\iota^{-1}Aut(BV)$ leaves an algebraic curve invariant, plus a point, therefore $\iota^{-1}Aut(BV)$ is conjugate to a subgroup of $Mob(\hat{\Bbb{R}})$, which concludes the proof.\
Let us prove part (\[l:5\]). We know that $C$ is $Aut(BV)$-invariant and by part (\[l:3\]) of the present lemma $\psi^{-1}C$ is an algebraic curve. Thus by Montel’s Lemma we conclude that $\Lambda_{Gr}\iota^{-1}Aut(BV)\subset \psi^{-1}C$, where $\Lambda_{Gr}\iota^{-1}Aut(BV)$ is the Greenberg limit set of $\iota^{-1}Aut(BV)$, see [@CS1]. Finally by part (\[l:3\]), we know that $ \iota^{-1}Aut(BV)$ is conjugate to a subgroup of $Mob(\hat{\Bbb{R}})$, therefore $ \Lambda_{Gr}\iota^{-1}Aut(BV)$ is a circle in the Riemann sphere and $\Lambda_{Gr}\iota^{-1}Aut(BV) = \psi^{-1}C$.\
In order to prove part (\[l:6\]), observe that after a projective change of coordinates we can assume that $\psi^{-1}C=\hat{\Bbb{R}}$. Thus $C=\psi \hat{\Bbb{R}}=\{[z^2,2zw,w^2]:z,w\in \Bbb{R}, \vert a\vert +\vert b\vert \neq 0\}$. The following claim concludes the proof.\
Claim. The sets $C$ and $\partial \Bbb{H}^1_{\Bbb{R}}=\{[x,y,z]\in\Bbb{P}^2_{\Bbb{R}}:x^2+y^2=z^2\}$ are projectively equivalent. Let $\gamma\in PSL(3,\Bbb{R})$, be the projective transformation induced by: $$\widetilde \gamma=
\begin{pmatrix}
1 & 0 & -1\\
0 & 1 &0\\
1 & 0 &1
\end{pmatrix}.$$ Given $[p]=[x^2,2xy, y^2]\in C$, we get $\gamma(p)=(x^2 - y^2, 2 xy, x^2 + y^2)$ and $$(x^2 - y^2)^2+ (2 xy)^2=( x^2 + y^2)^2.$$ Thus $\gamma C\subset \partial \Bbb{H}^1_{\Bbb{R}}$. Since $C$ is a compact, connected and contains more than two points we conclude that $\gamma$ is a projective equivalence between $C$ and $\partial \Bbb{H}^1_{\Bbb{R}}$.\
Now we prove part (\[l:7\]). Let $x\in B$. Then $x^{\bot}$ is a complex line in $\Bbb{P}_\Bbb{C}^2\setminus \bar{B}$; by Bézout’s theorem we know $Ver\cap x^\bot$ is non-empty, thus $Ver\cap(\Bbb{P}^2_\Bbb{C}\setminus\bar{B})\neq\emptyset$.\
Finally, let us prove part (\[l:8\]). After conjugating by an element in $\iota\PSL(3,\Bbb{C})$ we can assume that $[0,0,1]\notin\partial B$. Let $A=(a_{ij})$ be the Hermitian matrix introduced in part (\[l:3\]) of the present lemma. Clearly $a_{33}\neq 0$. Now let $F:\Bbb{R}^2\rightarrow \Bbb{R}$ be given by
$$F(x,y)=a_{11}+4(b_{12}x-c_{12}y)+2(b_{13}(x^2-y^2)-2c_{13}xy)+a_{33}(x^2+y^2)^2
+4(x^2+y^2) ( b_{23}x-c_{23}y+a_{22}).$$
Thus by part (\[l:5\]) of this lemma we know $\psi^{-1}C=F^{-1}0$ is a circle. Moreover $$\begin{array}{l}
\iota F^{-1}\Bbb{R}^+=Ver\cap\Bbb{P}_\Bbb{C}^2\setminus \bar{B}.\\
\iota F^{-1}\Bbb{R}^-=Ver\cap B.\\
\iota F^{-1}0=Ver\cap\partial B.\\
\end{array}$$ If $Ver\cap B=\emptyset$, then $F(x,y)\geq 0$. A straightforward calculation shows $$\bigtriangleup F(x,y)=16(a_{33}(x^2+y^2)+a_{22}+2b_{23}x-2c_{23}y).$$ Thus $E=\{(x,y)\in \Bbb{R}^2:\bigtriangleup F(x,y)=0\}$ is an ellipse.\
Claim: We have $ \psi^{-1}C\cap Int(E)=\emptyset$. On the contrary let us assume that there is an $x\in C\cap Int(E)\neq\emptyset$. Then there is an open neighbourhood $U$ of $x$ contained in $Int(E)$. Thus $\bigtriangleup F(x,y) $ is negative on $U$, [*i.e.*]{} $F$ is super-harmonic on $U$. However, $F$ attains its minimum in $U$, which is a contradiction.\
From the previous claim we conclude $C$ is contained in the closure of $Ext(E)$, therefore $\bigtriangleup F(x,y)\leq 0$ in $Int(\psi^{-1}C)$. As a consequence, $F$ is subharmonic in $Int(\psi^{-1}C)$. Let $c$ be the centre of $\psi^{-1}C$ and $r$ its radius. Let $(r_n)$ be a strictly increasing sequence of positive numbers such that $r_n\xymatrix{\ar[r]_{n\rightarrow\infty}&}r$. Let $x_n\in\overline{B_{r_n}(c)}$ be such that $$F(x_n)=max\{F(x):x\in\overline{B_{r_n}(c)}\}.$$
Since $F$ is subharmonic in $B_{r_n}(c)$ we conclude $x_n\in \partial B_{r_n}(c)$ and $(F(x_{n}))$ is a strictly increasing sequence of positive numbers. Since $Int(\psi^{-1}C)\cup \psi^{-1}C$ is a compact set, we can assume $x_n\xymatrix{\ar[r]_{n\rightarrow\infty}&}x$, and clearly $x\in \psi^{-1}C$. On the other hand, since $F$ is continuous we conclude $F(x_n)\rightarrow F(x)=0$, which is a contradiction.
\[l:conpo\] There is a $\gamma_0\in \PSL(3,\Bbb{R})$ such that
1. \[l:con1\] $\gamma_0\iota \PSL(2,\Bbb{R})\gamma^{-1}_0=\PO^+(2,1)$, where $\PO^+(2,1)$ is the principal connected component of $\PO(2,1)$,
2. \[l:con2\] $\gamma_0 Ver \cap \Bbb{H}^2_\Bbb{C} $ is non-empty and $\PO(2,1)^+$-invariant.
Let us prove (\[l:con1\]). By Lemma \[c:liedim\] we have that $\iota\PSL(2,\Bbb{R})$ is a Lie group of dimension three and preserves the quadric in $\Bbb{P}^2_{\Bbb{R}}$ given by $$\{[w^2,2wz,z^2]: z,w\in \Bbb{R}\}.$$ Thus there is a $\gamma_0$ in $\PSL(3,\Bbb{R})$ such that $\gamma_0\iota M\ddot{o}b(\hat{\Bbb{R}})\gamma^{-1}_0$ preserves $$\{[x,w,z]\in\Bbb{P}^2_{\Bbb{R}}:\vert y\vert^2+\vert w\vert^2<\vert x\vert^2\}.$$ Hence $\gamma_0\iota\PSL(2,\hat{\Bbb{R}})\gamma^{-1}_0=\PO^+(2,1)$. Part (\[l:con2\]) is now trivial.
\[t:liedim\] Let $\Gamma\subset\PSL(2,\Bbb{C})$ be a discrete non-elementary group. The group $\iota\Gamma$ is complex hyperbolic if and only if $ \Gamma$ is Fuchsian, [ i.e.]{} a subgroup of $\PSL(2,\Bbb{R})$.
Assume that $\iota\Gamma$ preserves a complex ball $B$. Then by Lemma \[c:liedim\] we deduce that $\Gamma$ preserves a circle $C$ in the Riemann sphere. Let $B^+$ and $B^-$ be the connected components of $\Bbb{P}_\Bbb{C}^1\setminus C$ and assume that there is a $\tau\in\Gamma$ such that $\tau(B)^+=B^-$. Let $x\in Ver\cap B$ and denote by $Aut^+(BV)$ the principal connected component of $Aut(BV)$ which contains the identity. Then by Lemma \[c:liedim\] we deduce $$\begin{array}{l}
Aut^+(BV)x= \psi\iota^{-1}Aut(BV)\psi^{-1}x=
\psi (B^{+}) \;\;\hbox {and}
\\
Aut^+(BV) \iota\tau(x)= \psi\iota^{-1}Aut(BV)\tau\psi^{-1}x=\psi(B^{-}).\\
\end{array}$$ Therefore $$Ver=Aut^+(BV)x\cup Aut^+(BV)\iota\tau(x)\cup C\subset\overline{\Bbb{H}}^2,$$ which is a contradiction. Clearly, this concludes the proof.
We arrive at the following theorem:
Let $\Gamma\subset\PSL(2,\Bbb{C})$. Then the following claims are equivalent:
1. The group $\Gamma$ is Fuchsian.
2. The group $\iota\Gamma$ is complex hyperbolic.
3. The group $\iota\Gamma$ is $\Bbb{R}$-Fuchsian
Subgroups of $\PSL(3,\Bbb{R})$ that Leave Invariant a Veronese Curve {#s:riv}
====================================================================
In this section we characterize those subgroups of $\PSL(3,\Bbb{R})$ which leave invariant a projective copy of $Ver$.
Let $\Gamma\subset \PSL(2,\Bbb{C})$ be a discrete subgroup. Then the following facts are equivalent
1. The group $\Gamma $ is conjugate to a subgroup of $Mob(\hat{\Bbb{R}})$.
2. The group $\iota\Gamma$ is conjugate to a subgroup of $\PSL(3,\Bbb{R})$.
Let $\Gamma$ be a subgroup of $Mob(\hat{\Bbb{R}})$ and $\gamma\in \Gamma$. Then $$\gamma=\left [\left [
\begin{array}{ll}
i & 0\\
0 & -i\\
\end{array}
\right ]\right ]
\left [\left [
\begin{array}{ll}
a & b\\
c & d\\
\end{array}
\right ]\right ]$$ where $a,b,c,d\in \Bbb{R}$ and $ad-bc=1$. A straightforward calculation shows that $$\iota\gamma=
\left [\left [
\begin{array}{lll}
-1 & 0 &0\\
0 & 1&\\
0 &0 &-1
\end{array}
\right ]\right ]
\left [
\left [
\begin{array}{lll}
a^2 & ab & b^2\\
2ac & ad+bc &2bd\\
c^2 & cd& d^2\\
\end{array}
\right ]\right ],$$ therefore $\iota\Gamma\subset\PSL(3,\Bbb{R})$.\
Let us assume that there is a real projective space $\Bbb{P}$ which is $\iota\Gamma$-invariant. Thus, as in Lemma \[l:semialg\], we conclude that $$Aut(PV)=\iota\PSL(2,\Bbb{C})\cap\{g\in \PSL(3,\Bbb{C})\vert g\Bbb{P}=\Bbb{P}\}$$ is a semi-algebraic group. Since $\Gamma\subset\iota^{-1}Aut(PV)$, we conclude that $\iota^{-1}Aut(PV)$ is a Lie group with positive dimension. From the classification of Lie subgroups of $\PSL(2,\Bbb{C})$ (see [@CS1]), we deduce that $\iota^{-1}Aut(PV)$ is either conjugate to $Mob(\hat{\Bbb{C}})$ or a subgroup of $Mob(\hat{\Bbb{R}})$. In order to conclude the proof, observe that the group $\iota^{-1}Aut(PV)$ can not be conjugated to $Mob(\hat{\Bbb{C}})$. In fact, assume on the contrary that $\iota^{-1}Aut(PV)=Mob(\hat{ \Bbb{C}})$. Since $Mob(\hat{ \Bbb{C}})$ acts transitively on $\hat{\Bbb{C}}$ we deduce that $Aut(PV)$ acts transitively on $Ver$. Finally, since $\psi(\Lambda(\Gamma))\subset Ver\cap\Bbb{P}$, we deduce $Ver\subset\Bbb{P}$, which is a contradiction.
Examples of Kleinian Groups with Infinite Lines in General Position {#s:rep}
===================================================================
Let us introduce the following projection, see [@goldman]. For each $z\in\Bbb{C}^3$ let $\eta$ be the function satisfying $\eta(z)^2=-<z,z>$ and consider the projection $\Pi:\Bbb{H}^2_{\Bbb{C}}\rightarrow\Bbb{H}^2_{\Bbb{R}}$ given by $$\Pi([z_1,z_2,z_3])=[\overline{\eta(z_1,z_2,z_3)}(z_1,z_2,z_3)+\eta(z_1,z_2,z_3)(\overline{z_1},\overline{z_2},\overline{z_3})].$$
The projection $\Pi$ is $\PO(2,1)$-equivariant.
Let $A\in O(2,1)$ and $[z]\in \Bbb{H}_{\Bbb{C}}^2$. Then $$\begin{array}{ll}
\Pi [Az] &=[\overline{ \eta(Az)}Az+\eta(Az)\overline{Az}]\\
&=[\overline{\sqrt{-<A z, Az>}}Az+\sqrt {-<Az,Az>}A\bar{z}]\\
&= [\overline{\sqrt{-<z,z>}}Az+\sqrt{-<z,z>}A\bar{z}]\\
&= [A][\overline{\eta(z)}z+\eta(z)\overline{z}]\\
&=[A]\Pi[z].
\end{array}$$
For simplicity in the notation, in the rest of this article we will write $Ver$ instead of $\gamma_0(Ver)$, $\psi$ instead of $\gamma_0\circ \psi$, and $\gamma_0\iota(\cdot)\gamma_0^{-1}$ instead of $\iota(\cdot)$, where $\gamma_0$ is the element given in Corollary \[l:conpo\].
\[l:prv\] The map $\Pi:Ver \cap \Bbb{H}^2_{\Bbb{C}}\rightarrow \Bbb{H}^2_{\Bbb{R}}$ is a homeomorphism.
Let us prove that the map is onto. Let $x\in\Bbb{H}^+\cup\Bbb{H}^-$ be such that $\psi(x)\in Ver\cap\Bbb{H}^2_{\Bbb{C}}$. Then $$\begin{array}{ll}
\Bbb{H}^2_{\Bbb{R}}&=\PSO^+(2,1)\Pi(\psi x)\\
&=\Pi(\PSO^+(2,1)\psi x)\\
&=\Pi(\iota\PSL(2,\Bbb{R}))(\psi(x))\\
&=\Pi(Ver\cap\Bbb{H}^2_{\Bbb{C}})
\end{array}.$$ Finally, let us prove that our map is injective. On the contrary, let us assume that there are $x,y\in Ver\cap\Bbb{H}^2_\Bbb{C}$ such that $\Pi(x)=\Pi(y)$. Now define $$\begin{array}{ll}
H_x=Isot(\PSL(2,\Bbb{R}),\psi^{-1}x),\\
H_y=Isot(\PSL(2,\Bbb{R}),\psi^{-1}y).
\end{array}$$ Clearly $H_y$ and $H_x$ are groups where each element is elliptic. On the other hand, observe that $$\begin{array}{l}
\iota H_x\Pi(x)=\Pi\iota H_x(x)=\Pi(x) \;\; \hbox{and}\\
\iota H_y\Pi(y)=\Pi\iota H_y(y)=\Pi(y).
\end{array}$$ Therefore $$\iota H_x\cup\iota H_y\subset Isot(\PO^+(2,1),\Pi x).$$ Since $\Pi(x)\in \Bbb{H}^2_{\Bbb{R}}$, we deduce that $Isot (\PO^+(2,1),\Pi x)$ is a Lie group where each element is elliptic. Therefore $H=\iota^{-1}Isot (\PO^+(2,1),\Pi x)\gamma_0$ is a Lie subgroup of $\PSL(2,\Bbb{R})$ where each element is elliptic and $H_y\cup H_x\subset H$. From the classification of Lie subgroups of $\PSL(2,\Bbb{C})$, we deduce that $H$ is conjugate to a subgroup of $Rot_\infty$. Hence $H_y=H_x$ and so $x=y$.
\[t:rf\] Let $\Gamma\subset \PSL(2,\Bbb{C})$ be a discrete group. Then $\Gamma$ is conjugate to a subgroup $\Sigma$ of $\PSL(2,\Bbb{R})$ such that $ \Bbb{H}/\Sigma$ is a compact Riemann surface if and only if $\iota\Gamma$ is conjugate to a discrete compact surface group of $\PO^+(2,1)$.
Let $\Gamma\subset \PSL(2,\Bbb{R})$ be a subgroup acting properly, discontinuously, freely, and with compact quotient on $\Bbb{H}^+$. Let $R$ be a fundamental region for the action of $\Gamma$ on $\Bbb{H}^+$. We may assume without loss of generality that $\psi(R)\subset\Bbb{H}^2_{\Bbb{C}}$. Thus $\Pi\psi\overline{R} $ is a compact subset of $\Bbb{H}^2_\Bbb{R}$ satisfying $\iota\Gamma\Pi\psi\overline{R}=\Bbb{H}^2_{\Bbb{R}}$ which shows that $\iota\Gamma$ is a discrete compact surface group of $\PO^+(2,1)$.\
Now let us assume that $\iota\Gamma$ is a discrete compact surface group of $\PO^+(2,1)$. Then $\Gamma\subset\PSL(2,\Bbb{R})$. Thus $\iota\Gamma\subset\PO^+(2,1)$ and $\Bbb{H}^2_{\Bbb{R}}/\iota\Gamma$ is a compact surface, see [@tengren]. Now, consider the following commutative diagram
$$\xymatrix{
\Bbb{H}_\Bbb{R}^2 \ar[r]^{\Pi^{-1}} \ar
[d]^{q_1} & Ver\cap \Bbb{H}^2_\Bbb{C} \ar[d]^{q_2} \ar[r]^{\psi^{-1}} & \Bbb{H}^+\ar[d]^{q_3}\\
\Bbb{H}^2_{\Bbb{R}}/\iota
\Gamma
\ar[r]^{\widetilde {\Pi}} &
(Ver\cap \Bbb{H}^2_\Bbb{C})/ \iota\Gamma\ar[r]^{\widetilde \psi} &
\Bbb{H}^+/\Gamma
}$$
where $q_1,q_2,q_3$ are the quotient maps, $\widetilde {\Pi}(x)=q_2\Pi^{-1}q_1^{-1}x$, and $\widetilde\psi(x)=q_3\psi^{-1}q_2^{-1}(x)$. By Lemma \[l:prv\], we conclude that $\Bbb{H}^2_{\Bbb{R}}/\iota\Gamma,(Ver\cap \Bbb{H}^2_\Bbb{C})/\iota\Gamma,\Bbb{H}^+/\Gamma$ are homeomorphic compact surfaces, which concludes the proof.
Proof of theorem \[t:main2\] {#proof-of-theorem-tmain2 .unnumbered}
============================
If $\Gamma\subset\PO^+(2,1)$ is a discrete compact surface group, then by Lemma \[l:conpo\] we can assume that there is a $\Sigma\subset\PSL(2,\Bbb{R})$ such that $\iota\Sigma=\Gamma$. By Theorem \[t:rf\] we know that $\Bbb{H}/\Sigma$ is a compact Riemann surface. From the classic theory of quasi-conformal maps, see [@lipa1; @lipa2], it is known that there is a sequence of quasi-conformal maps $(q_n:\widehat{\Bbb{C}}\rightarrow\widehat{\Bbb{C}})$ such that $q_n\xymatrix{\ar[r]_{n\rightarrow\infty}&}Id$ and $\Sigma_n=q_n\Sigma q_n^{-1}$ is a quasi-Fuchsian group, which can not be conjugated to a Fuchsian one. In consequence $\Gamma_n=\gamma_0\iota\Sigma_n\gamma_0^{-1}$ is complex Kleinian and neither conjugate to a subgroup of $\PU(2,1)$ nor $\PSL(3,\Bbb{R})$, which concludes the proof.
Now the following result is trivial.
There are complex Kleinian groups acting on $\Bbb{P}^2_{\Bbb{C}}$ which are not conjugate to either a complex hyperbolic group or a virtually affine group.
The authors would like to thank J. Seade for fruitful conversations. Also we would like to thank the staff of UCIM at UNAM for their kindness and help.
[10]{}
W. Barrera, A. Cano, and J. P. Navarrete, The limit set of discrete subgroups of PSL(3,C), Math. Proc. Cambridge Philos. Soc. [**150**]{} (2011), no. 1, pp. 129-146.
L. Bers, Several Complex Variables I (Maryland 1970), Lecture Notes in Mathematics, ch. Spaces of Kleinian groups, pp. 9–34, Springer-Verlag, Berlin, 1970.
L. Bers, On moduli of Kleinian groups, Russian Mathematical Surveys [**29**]{} (1974), no. 2, pp. 88-102.
A. Cano, J. P. Navarrete, and J. Seade, Complex Kleinian Groups, Progress in Mathematics, no. 303, Birkhäuser/Springer, Basel, 2013.
A. Cano and J. Seade, On the equicontinuity region of discrete subgroups of PU(1,n), J. Geom. Anal. [**20**]{} (2010), no. 2, pp. 291-305.
A. Cano and J. Seade, On discrete groups of automorphism of PSL(3,C), Geometriae Dedicata [**168**]{} (2014), no. 1, pp. 9-60.
S. S. Chen and L. Greenberg, Hyperbolic spaces, Contributions to Analysis (A Collection of Papers Dedicated to to Lipman Bers), Academic Press, New York, 1974, pp. 49-87.
Myung-Jun Choi and Dong Youp Suh, Comparison of semialgebraic groups with Lie groups and algebraic groups, RIMS Kôkyûroku [**1449**]{} (2005), pp. 12-20.
W. M. Goldman, Complex Hyperbolic Geometry, Oxford University Press, New York, 1999.
T. Jorgensen, A. Marden, Algebraic and geometric convergence of Kleinian groups, Math. Scand. [**66**]{} (1990), pp. 47-72.
R. S. Kulkarni, Groups with domains of discontinuity, Math. Ann. [**237**]{} (1978), no. 3, pp. 253-272.
F. Labourie, Lectures on Representations of Surface Groups, Zurich lectures in advanced mathematics, European Mathematical Society, 2013.
J. Seade and A. Verjovsky, Actions of discrete groups on complex projective spaces, in M. Lyubich, J. W. Milnor, and Y. N. Minsky, (eds.), Laminations and Foliations in Dynamics, Geometry and Topology, Contemporary Mathematics, vol. 269, AMS, Providence, RI, 2001, pp. 155-178.
J. Seade and A. Verjovsky, Higher dimensional complex Kleinian groups, Math. Ann. [**322**]{} (2002), no. 2, pp. 279-300.
J. Seade and A. Verjovsky, Complex Schottky Groups, Asterisque, vol. 287, SMF, Paris, 2003, pp. 251-272.
T. Zhang, Geometry of the Hitchin component (2015), Ph. D. Thesis, University of Michigan, https://deepblue.lib.umich.edu/handle/2027.42/113605
[^1]: Partially supported by grants of the PAPPIT’s project IA100112
|
{
"pile_set_name": "ArXiv"
}
|
Q:
Unity Network No sound on other clients
I'm trying to play sound on other clients, so they could hear gunfire in the distance, but sound only works for the shooter. Here's my code:
void Update()
{
***
if (Input.GetButton("Fire1"))
{
CmdFireWeapon(this.gameObject);
}
***
}
[Command]
void CmdFireWeapon(GameObject plr)
{
***
if (!plr.GetComponent<AudioSource>().isPlaying)
RpcPlayWeapon(plr);
***
}
[ClientRpc]
void RpcPlayWeapon(GameObject plr)
{
plr.GetComponent<AudioSource>().Play();
}
I'm using 3D Spatial Blend, but there's no sound even with volume == 1 across all distance. Also tried with and without if(isPlaying) - no progress. What am I doing wrong?
A:
I think I figured it out. Player Prefab on other clients spawned without clip (it is loaded in its script). So I needed to load it first then play it. And I need to keep loading, because clip changes with different weapon.
[ClientRpc]
void RpcPlayWeapon(GameObject plr)
{
plr.GetComponent<AudioSource>().clip =
plr.GetComponent<PlrController>().curWeapon.shotAudio;
plr.GetComponent<AudioSource>().Play();
}
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Bootstrap Tapdrop jQuery in angular.js controller
I saw Bootstrap Tapdrop library and it is perfect for dropdown in my responsive tabs. My app works with angular.js, but add the bootstrap-tapdrop.js in my index.html .
I want to call:
$('.nav-tabs').tabdrop({align:'left'});
into my angularjs app but nothing works. However, when I call this from chrome console works ok.
How can I add this sentence jQuery angular.js my driver? is there anyway? or..how can I use this library from angular.js? I have sought similar things in angular but can not find.
Thanks
A:
You have to create a directive in order to use jQuery plugins or whenever you want to attach client side behavior to elements using jQuery or any third party plugins.
Try something like this.
angular.module('main')
.directive('my-tabs-directive', [ function ($timeout, $sce) {
return {
restrict: 'E',
link: function (scope, element, attrs) {
//Write any plugin logic here
element.tabdrop({align: 'left'});
},
templateUrl: 'passYourTemplateUrl'//You can also use inline template
};
}
]);
You can understand more about angularJs directive here https://docs.angularjs.org/guide/directive
|
{
"pile_set_name": "StackExchange"
}
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
<meta http-equiv="X-UA-Compatible" content="IE=9"/>
<meta name="generator" content="Doxygen 1.8.13"/>
<meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>OpenMesh: OpenMesh/Core/IO/importer Directory Reference</title>
<link href="tabs.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="jquery.js"></script>
<script type="text/javascript" src="dynsections.js"></script>
<link href="navtree.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="resize.js"></script>
<script type="text/javascript" src="navtreedata.js"></script>
<script type="text/javascript" src="navtree.js"></script>
<script type="text/javascript">
$(document).ready(initResizable);
</script>
<link href="search/search.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="search/searchdata.js"></script>
<script type="text/javascript" src="search/search.js"></script>
<link href="doxygen.css" rel="stylesheet" type="text/css" />
<link href="logo_align.css" rel="stylesheet" type="text/css"/>
</head>
<body>
<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
<div id="titlearea">
<table cellspacing="0" cellpadding="0">
<tbody>
<tr style="height: 56px;">
<td id="projectlogo"><img alt="Logo" src="rwth_vci_rgb.jpg"/></td>
<td id="projectalign" style="padding-left: 0.5em;">
<div id="projectname">OpenMesh
</div>
</td>
</tr>
</tbody>
</table>
</div>
<!-- end header part -->
<!-- Generated by Doxygen 1.8.13 -->
<script type="text/javascript">
var searchBox = new SearchBox("searchBox", "search",false,'Search');
</script>
<script type="text/javascript" src="menudata.js"></script>
<script type="text/javascript" src="menu.js"></script>
<script type="text/javascript">
$(function() {
initMenu('',true,false,'search.php','Search');
$(document).ready(function() { init_search(); });
});
</script>
<div id="main-nav"></div>
</div><!-- top -->
<div id="side-nav" class="ui-resizable side-nav-resizable">
<div id="nav-tree">
<div id="nav-tree-contents">
<div id="nav-sync" class="sync"></div>
</div>
</div>
<div id="splitbar" style="-moz-user-select:none;"
class="ui-resizable-handle">
</div>
</div>
<script type="text/javascript">
$(document).ready(function(){initNavTree('dir_597714d32dfa686908dce7b4776ad969.html','');});
</script>
<div id="doc-content">
<!-- window showing the filter options -->
<div id="MSearchSelectWindow"
onmouseover="return searchBox.OnSearchSelectShow()"
onmouseout="return searchBox.OnSearchSelectHide()"
onkeydown="return searchBox.OnSearchSelectKey(event)">
</div>
<!-- iframe showing the search results (closed by default) -->
<div id="MSearchResultsWindow">
<iframe src="javascript:void(0)" frameborder="0"
name="MSearchResults" id="MSearchResults">
</iframe>
</div>
<div class="header">
<div class="headertitle">
<div class="title">importer Directory Reference</div> </div>
</div><!--header-->
<div class="contents">
<div class="dynheader">
Directory dependency graph for importer:</div>
<div class="dyncontent">
<div class="center"><img src="dir_597714d32dfa686908dce7b4776ad969_dep.png" border="0" usemap="#dir__597714d32dfa686908dce7b4776ad969__dep" alt="OpenMesh/Core/IO/importer"/></div>
<map name="dir__597714d32dfa686908dce7b4776ad969__dep" id="dir__597714d32dfa686908dce7b4776ad969__dep">
<area shape="rect" id="node1" href="dir_597714d32dfa686908dce7b4776ad969.html" title="importer" alt="" coords="41,52,113,100"/>
<area shape="rect" id="node2" href="dir_7477301876e1ee42543ae0d668800e48.html" title="Mesh" alt="" coords="5,148,77,196"/>
<area shape="rect" id="edge2-headlabel" href="dir_000043_000046.html" title="1" alt="" coords="61,127,69,141"/>
<area shape="rect" id="node3" href="dir_e752be804545bd6e4da017eb8c880246.html" title="System" alt="" coords="41,244,113,292"/>
<area shape="rect" id="edge3-headlabel" href="dir_000043_000052.html" title="1" alt="" coords="90,220,98,235"/>
<area shape="rect" id="edge1-headlabel" href="dir_000046_000052.html" title="2" alt="" coords="66,217,74,231"/>
<area shape="rect" id="clust1" href="dir_d2053a9e19fa213bdf1df30eeeafc6b7.html" title="IO" alt="" coords="31,16,124,111"/>
</map>
</div>
</div><!-- contents -->
</div><!-- doc-content -->
<hr>
<address>
<small>
<a href="http://www.rwth-graphics.de" style="text-decoration:none;">
</a>
Project <b>OpenMesh</b>,
© Computer Graphics Group, RWTH Aachen.
Documentation generated using
<a class="el" href="http://www.doxygen.org/index.html">
<b>doxygen</b>
</a>.
</small>
</address>
</body>
</html>
|
{
"pile_set_name": "Github"
}
|
Oakland’s brutal eviction for profit system must endBy Lynda Carson - April 4, 2016Oakland - Recently I announced that 1,200 eviction notices were filed in Oakland from January 2015, through March 2016, which was incorrect. My mistake. I doubted those numbers since I read an article that mentioned there were 10,910 evictions filed in 2013 in Oakland, and around 13,000 or more evictions filed in 2014.After seeking a clarification from the City of Oakland, today I was advised that there are about 11,050 eviction termination notices on file with the Rent Stabilization Board from January 1, 2015 through February 29, 2016 and about 100 additional notices were filed for March 2016. My apologies for any misunderstanding.In Oakland, there are many reasons that people are being threatened with eviction, and often the tenants are being threatened with unlawful evictions, even from so-called nonprofit housing developers commonly referred to as the “Housing Mafia”, by the attorneys who defend tenants in court against an eviction.As an example, despite being protected by Measure EE in Oakland, last week the East Bay Asian Local Development Corporation (EBALDC) threatened tenants with eviction (30 Day Notice) at one of their so-called affordable housing projects in East Oakland. The tenants in the 21 unit residential building were being threatened if they failed to sign a new lease that was materially different from their old lease.Among other things, the new lease states that EBALDC will no longer take payments from a third party except section 8 payments. It also mentions that there are minimum income requirements that exclude poor people from the housing project, and under section #5) the lease states that the tenants will be responsible to cover all the debts of the building by allowing EBALDC to charge higher rents.When tenants objected, and one tenant even consulted an attorney who advised him not to sign the new lease, and the tenant gave EBALDC a statement saying that he would not sign the new lease, the tenant was immediately threatened with eviction. In a state of panic, on the following day the tenant signed the new lease under duress. Under Measure EE , Oakland’s rent law that went into effect in 2002, the tenants in this building were legally allowed to decline to sign the new contract/lease, because of the material changes in the terms of the new contract, compared to the old contracts. But EBALDC did not want to hear about the tenant’s rights, and pressured the tenants to sign the new lease with threats of eviction.Additionally on April 4, notices were slipped under the door of the tenants in the 21 unit residential building by Danny Chen, the property manager, advising tenants that if they did not come by the building office by 2:00pm, Tuesday April 5, that all non-responses will be considered declining to sign.The boss of property manager Danny Chen is Tammy Cotton . Tammy Cotton is also listed as a property manager with EBALDC, and she works for Cindy Norton who is head of property management for EBALDC. In California according to the Bureau of Real Estate (Department of Real Estate), property managers should have a real estate license to operate in the state of California. A search of the Department of Real Estate in California reveals that Danny Chen, Tammy Cotton and Cindy Norton are not listed as having a real estate license The Eviction System In California Is BrutalThe eviction system is brutal and a terrifying experience for many low-income tenants in Oakland and Berkeley . Once a tenant receives an Unlawful Detainer / 5 Day Summons, commonly referred to as a UD, the tenant has only 5 days to file a response with the court (clerk of the court), or they may lose the eviction case automatically by default.It is a landlord friendly court system that favors the landlords who are evicting their tenants by using lawyers and big money, even if it is an unlawful eviction. Eviction cases are one of the quickest types of court cases there are in the court system in Alameda County, and many tenants cannot afford an attorney to represent them in court to fight against an eviction. Often before the tenant even receives an eviction notice (UD), the landlords are legally allowed to harass the tenants by serving as many 60 Day Notices as they want, before the tenant is eventually served a UD eviction notice. The 60 Day Notice is an advanced notice stating that the landlord wants to evict a tenant.As tenants are fighting back and trying to get some tenant protections all across the Bay Area, they have been targeted and stalked by the California Apartment Association which is opposed to any and all reasonable tenant protections, that tenants are seeking Under attack by the landlords and the California Apartment Association again, word has spread around by the Richmond Progressive Alliance telling people not to sign the petition for the “Richmond Homeowners & Private Property Rights Act”, which if passed into law would make it illegal to implement rent control and eviction protections in Richmond forever.Eviction stories are all over the news wires lately, revealing that the majority of people being evicted from their housing all across the nation are women with children . According to the National Low-Income Housing Coalition, there is a shortage of 7.2 million affordable housing units across the nation. With sequestration budget cuts devastating the nation’s subsidized housing programs while executives in the so-called affordable housing sector continue to receive hefty pay increases , the homeless shelters remain filled with the poor because millions of dollars are being diverted from the section 8 program, to pay the exorbitant salaries of the executives in the so-called affordable housing industry.In Oakland, the feud between tenants and landlords are never ending, and according to a report the cases in the Rent Arbitration Board have been increasing in recent years, as tenants have recently been objecting to unreasonable plans to increase the yearly fees to cover the costs of the rent board. A planned increase in fees that is excessive according to tenant activists, because the planned fee increase is not needed while a huge amount of money being collected has not been spent on the program in recent years.As the struggle for renter protections in Oakland is on the rise, the “Protect Oakland Renters Act” & initiative campaign starts this Saturday at the Causa Justa/Just Cause office located at 3268 San Pablo Avenue, in Oakland. Everyone is invited on April 2nd from 9:30am to 2pm, to take part in the Campaign Launch & Kick Off to protect Oakland renters.This is the official launch of the November 2016 ballot to protect renters being displaced in droves by never ending skyrocketing rents , unjust evictions, and unlawful practices.Oakland’s renter protection initiative was filed on March 3 at Oakland City Hall, and the Oakland renter’s movement is part of the growing renter’s movement seeking stronger renter protections in other cities of Northern California, including the City of Richmond , and Alameda , where renter protection initiatives were also filed recently.Additionally, the public is invited to be a speaker to help pass the “Housing State of Emergency” and Moratorium on Evictions and Rent Increases” on Tuesday April 5, at 5:pm at the Oakland City Council Chambers, 1 Frank Ogawa Plaza. You can fill out a speaker card in advance for Agenda Item #12.There Are Three Renter Protection Bay Area Ballot Measures People Can Support(Contact info on how people can support the renter protection ballot measures)There are presently three Bay Area ballot initiatives for rent control and just cause eviction protections that have been filed so far recently in Richmond, Alameda, and Oakland. You can support the tenant’s movement for renters rights and help make sure these initiatives gather enough signatures to make it to the ballot!RichmondContact: 510-621-7566, Fair & Affordable Richmond CoalitionSaturdays 10am-2pmSundays 12pm-4pm1021 MacDonald Ave., RichmondAlamedaContact: Brad Hirn brad.hirn [at] gmail.com , Alameda Renters CoalitionSaturdays, 9a-5pSouth Shore shopping center in Alameda all day, typically near the Safeway and Trader Joe's.Sundays, 9a-1pSouth Shore shopping center, AlamedaSunday, 1p-5pWalgreens and Starbucks on Webster St. AlamedaOaklandContact: Becki becki [at] cjjc.org , Causa Justa Just CauseEviction Case System Being Transferred From Oakland To HaywardRecently it became public that the eviction case is being transferred from Oakland to Hayward , making it much harder for the low-income, elderly and disabled renters of Oakland and Berkeley to make their court dates if they face eviction, and have to use public transportation.As a way to sell the plan to consolidate the eviction case system in Hayward to the public, in a scheme to transfer the eviction case system from Oakland to Hayward, Judge Morris Jacobson publicly repeated stated on numerous occasions that there would be a shuttle bus to meet people at the Hayward Bart Station, that would take them to the Hayward courthouse. It turns out that there is not going to be shuttle bus to take the public from the Hayward BART Station to the Hayward courthouse In a statement sent out last week from Oakland City Attorney Barbara Parker, she said: “The Alameda County Superior Court recently announced that all unlawful detainer actions (evictions) and the Court's Self-Help Center (offering help to residents who represent themselves) will be located at the Hayward Hall of Justice. This means low-income residents in Oakland and other northern Alameda County cities will no longer be able to access these services in Oakland's courthouses.”“Unfortunately, the Hayward Courthouse is not close to public transportation. Renters and low-income persons will be most adversely affected by placing all unlawful detainers and self-help services in Hayward; they are most likely to have public transportation as their only viable option to reach the Hayward Courthouse, which the Court acknowledges is not readily available by BART (unlike Oakland's downtown courthouses).”“The difficulties in reaching the Hayward Courthouse will increase the likelihood that many low-income residents and tenants will not be able to adequately defend actions against them and will incur wage losses by having to take more time off from work to attend case management conferences, hearings and trials.”“Oakland's courthouses are located within minutes of public transportation. In fact it takes more travel time to reach the Hayward Courthouse than the Oakland courthouses from nearly all Alameda County city centers.”“The Court's decision was not widely publicized and I don't believe the public had adequate opportunity to comment. However I believe it is important for the Alameda County Superior Court to hear from Oakland and other County residents on this issue. If you would like to weigh in, the Court's contact information is as follows:”The public is free to contact Judge Jacobson and Chad Finke to tell them that they want the unlawful detainer actions (evictions) and the Court's Self-Help Center (offering help to residents who represent themselves) to be located in Oakland, instead of Hayward.Honorable Morris Jacobson, Presiding JudgeSuperior Court of CaliforniaCounty of AlamedaHayward Hall of Justice, Department 511, 2"d Floor24405 Amador StreetHayward, California 94544Chad Finke, Court Executive OfficerExecutive OfficeSuperior Court of CaliforniaCounty of AlamedaRene C. Davidson Courthouse1225 Fall on StreetOakland, California 94612Lynda Carson may be reached at tenantsrule [at] yahoo.com >>>>>>>
|
{
"pile_set_name": "OpenWebText2"
}
|
Work-related musculoskeletal conditions: evidence from the THOR reporting system 2002-2005.
Musculoskeletal disorders (MSDs) are commonly encountered in current occupational health practice and comprise up to 45% of the workload for occupational physicians (OPs). To compare the reported incidence of work-related (WR) MSDs by specialist OPs and specialist rheumatologists and to relate it to self-reported and general practitioners-reported WR MSDs. Analysis of data reported to surveillance schemes within The Health and Occupation Reporting network and comparison to denominator data derived from the Labour Force Survey and occupational/work activity classifications. There are significant differences between the patterns of WR MSDs seen by the different specialist groups. Thus OPs report three times as many back and lower limb conditions. However, both specialist groups report similar numbers of cases of hand-arm vibration syndrome (12/9%) and 'vague and ill-defined' upper limb conditions (16/14%). The absolute risk of physician reported that WR MSDs increases 5-fold between ages 15-24 and 45-64. The specialist reporting schemes give an indication of current practice and are useful both to update and to strategically inform planning. The data are amenable, with appropriate statistical analysis, for comparison with self-reporting and to the characterization of risk in broad categories of occupation and work activity.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Excel Worksheet_SelectionChange event not firing at all? (on both Office 2013 & 2016)
I've been having a heck of a time accomplishing what I thought would be an incredibly simple test. All I am trying to achieve is to pop up a MsgBox when a user selects a new cell or changes the contents of a cell.
I've been at this for about 6 hours and so far have zero success! I have identical behavior with Office 2016 (Windows 10) and with Office 2013 (Windows 7).
Here are my method(s):
Create a new macro-enabled workbook.
Record a new macro in the workbook. Stop the recording. Open VBA.
Open the code for "Module 1" and replace the undesired code with the code below. Save the file.
File -> Options -> Trust Center -> Trust Center Settings -> Macro Settings -> "Trust access to the VBA project object model" is selected. Save the file.
I also have ensured Application.EnableEvents = True
I am expecting to be able to click on various cells, or edit cells, and received a MsgBox whenever the event occurs.
Here is my code:
Option Explicit
Private Sub Workbook_SheetChange(ByVal Sh As Object, ByVal Target As Range)
MsgBox "changed!"
End
Private Sub Worksheet_SelectionChange(ByVal Target As Range)
MsgBox "selected!"
End Sub
Public Sub Just_In_Case()
Application.EnableEvents = True
End Sub
What am I missing? Is there a security setting preventing this action event? I have the same behavior online at work as I do offline at home.
Thank you in advance for your help! :)
PS Here is the screenshot of my VBA environment, if relevant: https://i.stack.imgur.com/yXkMK.png
A:
That Workbook_SheetChange code needs to be in the ThisWorkbook code module, not in a regular module.
EDIT: and the Worksheet_SelectionChange goes in the Worksheet code module
http://www.cpearson.com/excel/events.aspx
|
{
"pile_set_name": "StackExchange"
}
|
EXODUS 40:34-38
« Exodus 39 | Exodus 40 | Leviticus 1 »
The Glory of the Lord
34 Then the cloud covered the tent of meeting, and the glory of the Lord filled the tabernacle.
35 And Moses was not able to enter the tent of meeting because the cloud settled on it, and the glory of the Lord filled the tabernacle.
36 Throughout all their journeys, whenever the cloud was taken up from over the tabernacle, the people of Israel would set out.
37 But if the cloud was not taken up, then they did not set out till the day that it was taken up.
|
{
"pile_set_name": "OpenWebText2"
}
|
[Updated 2019-11-17]
On September 10, 2019 while I was in London, UK at the Python core dev sprints, I got a message from a user named "spacedrop" on Keybase. The message said I was being given 356.2904939 XLM as a surprise gift of "free Lumens worth $20.98 USD" from the Stellar Development Foundation. All of that screamed "cryptocurrency" which isn't my thing, so my initial reaction was this was some scam by someone who randomly messaged me on Keybase trying to get me to buy into some new cryptocurrency. But then I realized that Keybase wouldn't let a random person message me like that. Curious, I read the rest of the message and found a link to Keybase's "airdrop" announcement which explained that Keybase was actually facilitating the message. Trusting that Keybase wasn't getting into anything nefarious, that enticed me enough to dig a little deeper into Stellar and find their overview page which has the following summary:
Stellar is a multi-currency payment backend that tens of thousands of people use every day. It’s decentralized, open-source, and developer-friendly, so anyone can issue assets, settle payments, and trade.
Stellar is a blockchain, but it works more like cash—Stellar is much faster and cheaper than bitcoin, for example. And it uses far less electricity.
Okay, that sounds nice. But when I was poking around the web site and I found a code of conduct and a roadmap that both seemed reasonable, that's when I decided to dive into Stellar and I came out thinking that's it's actually a rather cool piece of technology for people to track "what they own ... and and what they want to do with what they own".
So this blog post is basically me writing down what I learned about Stellar and why I found it interesting from the perspective of trying to find a cheap, secure way to send remittance to the United States from Canada (which, spoiler alert, Stellar can't do for me yet, but the technology is there if someone would let me get CAD on to the Stellar network).
What is Stellar for?
I will go into more detail later, but to help motivate reading the rest of the blog post, I want to quickly outline what Stellar is. Basically it's a public ledger that tracks ownership of assets. Those assets do not need to be inherent to Stellar, and in fact a key part of Stellar is that 3rd-parties can provide their own assets to have managed on the network. Or put another way, Stellar is trying to become a global payments network.
On Stellar you can trade assets. Stellar lets you put out buy and sell orders on assets and the network will figure out the necessary orders for you to get the best price for your assets. This is just like a stock market with buy and sell orders, but instead of stock certificates it's assets on the Stellar network. But one extra twist is that since Stellar lets anyone put assets on to the network, the network will do up to 6 different exchanges to try to get you the best value for your assets. For instance, if you're trying to buy spam with bacon, but people are only selling bacon for eggs and buying spam for eggs, the network will do the bacon → eggs → spam trade for you to get you the best result.
Now substitute "bacon" for "CAD" and "USD" for "spam" and you start to see how Stellar might be really handy for global payments.
Lumens (yes, there's a digital currency)
To start discussing Stellar you need to know about lumens (or XLM for short). There's 50,000,000,000 lumens in existence with no mining new ones like with Bitcoin. The smallest unit of lumens is called a stroop and it's 0.0000001 of a lumen which is 1/10,000,000 (and they are named after stroopwafels which my wife and I like, and stroopwafels are Dutch which just makes the Pythonista in me smile 😊).
Now when I read that Stellar had lumens, I 🙄 like this was yet another cryptocurrency that people are just speculating with (which some people are), but when I began to read about what lumens are used for I realized it's actually an anti-spam mechanism and baseline asset more than a play to make money from lumens themselves (although they are how the Stellar Development Foundation is funding itself).
Accounts
Accounts on Stellar are a public key and a private seed. Nothing crazy, but also nothing terribly difficult to calculate either. So how does Stellar prevent people from creating a ton of accounts to spam the network?
By having a minimum account balance required to even create an account. Since lumens are the original asset on Stellar they are what you need to open an account (and keep it open). As of today it's 1 XLM which is about $0.07275 USD as I write this. In other words it shouldn't be a financial hardship for nearly anyone in the world to have a single lumen to open an account, but it also won't lead to everyone creating 1 billion accounts on their own either.
Trading
So now you have your account, how do you do something as simple as send or receive an asset? Once again, lumens are used as an anti-spam mechanism for trading.
Every change you want to make to the Stellar network is an operation. All the operations you want to do as a single unit is a transaction (just like with databases). All the transactions that get resolved end up in a new version of the ledger which tracks the state of the network at that point in time.
Each transaction costs at least the base fee of 100 stroops per operation (0.00001 XLM or 1/100,000) contained in that transaction. That way you can't flood the network with operations without having to at least pay a little bit for it.
And what exactly are you paying for? Well, there's a limit to how many new operations can occur on the Stellar network per ledger update. Protocol 11 made it so the network votes on what the maximum number of operations per ledger should be, and as of right now it's sitting at 1000 operations/ledger (if you look at any ledger like ledger 25923589 you will see max_tx_set_size and that shows the network's current operations/ledger rate). Even with ledgers resolving every 5 seconds, that still means there's limited capacity if the network gets backed up (i.e. it's about 200 operations/second). In those instances where there's not enough capacity there's surge pricing.
You specify the maximum base fee you're willing to pay when you create a transaction. An auction is held where your maximum base fee is offered to fund resolving your transaction. In the end, though, you end up paying only what was required for you to get your transaction resolved (e.g. you might offer to pay a total of 1000 stroops as a maximum base fee for your one operation, but if all it took was 150 stroops for your transaction to get resolved during surge pricing then that's all you end up paying).
So you're paying to prevent spam, and you're paying to potentially prioritize your transaction in case the network is backed up. Now currently the network is not at capacity so worrying about surge pricing isn't a big deal, but even if it did increase we're talking about minuscule amounts of XLM. With the price for 1 XLM that I quoted above, 100 stroop is $0.0000007275 USD, so even if you had to go up by several orders of magnitude to get your operation resolved it wouldn't exactly be expensive.
Anchors (or what makes Stellar interesting)
So up to this point you're probably wondering how to heck remittance from Canada to the United States might work if everything is being done in lumens and I said they are not meant to act as investment vehicles. And the answer to that is assets and anchors.
Basically anchors join the network and offer tokens which represent assets that the anchor holds. The anchor can then send those assets as tokens to other accounts on the Stellar network, expressing the fact that an account owns those tokens representing that asset. While lumens is the asset we have talked about up until now, anything can be an asset on the network.
Let's say I run a bank and it acts as an anchor on the Stellar network that will generate tokens representing CAD. What that would mean is customers could withdraw CAD cash from their bank accounts and exchange them for CAD tokens on Stellar. My bank would hold the physical CAD in escrow to back the tokens in circulation. This allows people to then exchange their CAD tokens for real/fiat currency at my bank by sending the tokens to their account, whereby my bank would destroy the token so there isn't double-counting of the money in the world.
To take this bank analogy a little farther, think of physical cash as tokens, your wallet as your Stellar account, and the world of Canadian money as the Stellar network. When you withdraw money from the ATM, you are exchanging money in your bank account for a different format; in this case it's physical cash. You can then transact with it at stores, etc. And then eventually that physical cash comes back out of circulation when you deposit money into your bank account and becomes bits in some bank database.
And this is how anchors that back fiat currency work. For instance, AnchorUSD takes money in USD from you and then converts it 1:1 into a token on Stellar for you to send to whomever. It also lets you receive those USD tokens and then convert them back into USD money by destroying the token. Basically it's a gateway between the USD money and Stellar.
In order to prevent people from trusting any random anchor, Stellar has the concept of trustlines. Basically it's a way to say on the network, "we both agree that this token represents what the anchor says it does". That way you enter into an agreement with the anchor to avoid getting ripped off. You also must pay into your trustline, once again acting as an anti-spam mechanism so people can't fake trust of an anchor by opening a ton of accounts that all trust a single anchor.
An example of sending money
Pretending for a moment that I live in the eurozone, what would it take to send €50 to someone in the United States?
I create a Stellar account with 1 XLM I open a trustline to an anchor that will take € and give me tokens on Stellar as an equivalent asset (e.g. EURT) for 0.5 XLM I convert €50 to 50 EURT on the Stellar network via the anchor I trust My friend in the US also opens a Stellar account for 1 XLM My friend opens a trustline to an anchor that will let them receive their tokens as an asset and exchange it for real USD (e.g. USD) for 0.5 XLM I put in a payment of 50 EURT to USD on Stellar to my friend Assuming the liquidity is high enough for both token types, the transaction completes in at worst 10 seconds (assuming I just missed the last ledger and have to wait for the next one) My friend exchanges the resulting USD tokens for actual USD via the anchor they trust and has them deposited into their bank account
So for the cost of 3.00001 XLM between me and my friend, I just sent money across the world in less than 10 seconds at the best exchange rate available to me on Stellar for less than $0.22 USD. Now there's no guarantee that the exchange rate will be better than what my bank will give me nor that the fees the anchors on either end charge won't eat into how much this whole transaction costs, but you can see the potential here.
Why this interests me
When I realized that the Stellar network was set up so that it would be feasible for a CAD-equivalent of AnchorUSD to exist such that I could send family in the United States actual USD that they could deposit into their bank accounts from CAD money in my bank account, that got me excited. Typically I use TransferWise (which I have a referral link for that gets me and the first couple of people who use it some money), but it takes a few days for the money to arrive and I have to go through some hoops to get the cheapest fee with the fastest result by letting them log into my bank account to check I actually have the funds which has always bugged me from a security perspective.
Add on to that the fact that PayPal is about the only solution I know of for sending small amounts of money internationally – which happens regularly to me when I'm at a conference outside of Canada and the restaurant won't split the cheque – and you start to wonder why there aren't more potential solutions out there for sending money internationally in a fast, cheap manner.
And apparently I'm not the only one who thinks this: IBM has a service called World Wire built on the Stellar network specifically for moving money quickly and cheaply between banks. So now I'm just waiting for someone to set up a CAD-based anchor which acts as an Interac e-Transfer bridge between my Stellar account and my Canadian chequing account so I can send money to the United States cheaply and easily.
The Stellar Development Foundation (SDF) has laid out a 10 year plan to get Stellar to a good spot where it is self-sustaining. They have their funding set aside for this and have discussed how they plan to go about trying to make Stellar attractive enough to get appropriate anchors on side to support various currencies around the world. They are also trying to make sure that Stellar can survive on its own without the SDF needing to prop it up in any way (i.e. the network is fully decentralized and self-sustaining).
Keybase Stellar Space Drop, 2 Billion Lumens for the World Keybase is for keeping everyone’s chats and files safe, from families to communities to companies. MacOS, Windows, Linux, iPhone, and Android. If you were a Keybase user before September 9, 2019 you might as well go and collect your lumens and sign up to get the monthly disbursement they are going to be doing for the next 20 months. You may also qualify if you live in a qualifying country and are willing to validate your phone number with Keybase.
https://www.coinbase.com/earn/stellar/
(If you want to watch some videos from Coinbase and get some free lumens if you have a Coinbase account. If you don't have a Coinbase account and you want to sign up for one, you can use this referral link which will give me some extra lumens.)
|
{
"pile_set_name": "OpenWebText2"
}
|
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>com.apple.security.app-sandbox</key>
<true/>
<key>com.apple.security.network.client</key>
<true/>
</dict>
</plist>
|
{
"pile_set_name": "Github"
}
|
"Atypical" posteroseptal accessory pathway in Wolff-Parkinson-White syndrome.
The posteroseptal accessory pathway in the Wolff-Parkinson-White syndrome is associated with a delta wave that is negative in the inferior electrocardiographic (ECG) leads and the occurrence of the earliest retrograde atrial activation near the orifice of the coronary sinus during atrioventricular (AV) reentrant tachycardia. Seventy-two patients with a posteroseptal accessory pathway underwent epicardial mapping before operative ablation. The earliest epicardial activation occurred at the posterosuperior process of the left ventricle in all patients. Dissection of the posteroseptal region (right atrial-left ventricular sulcus) resulted in permanent loss of preexcitation in 69 patients and failure to abolish preexcitation permanently in 3. At reoperation in two patients, preexcitation was abolished by discrete cryoablation of the left side of the interatrial septum near the AV node approached through the atrial septum in the normothermic beating heart. At reoperation, one patient had extensive AV node dissection. All patients have had permanent loss of preexcitation. The vast majority of posteroseptal accessory pathways ("typical") are epicardial and ablated by dissection of the posteroseptal region. Rarely, posteroseptal accessory pathways are "atypical" in that they are intraseptally located near the AV node on the left atrial endocardial surface.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
How to undo a Time Machine restore?
I just attempted to restore a folder from TimeMachine. I was expecting that TM would ask me where to put the restored folder (as it has done in the past, IIRC), but this time it didn't, and instead overwrote the folder1.
This is definitely not what I wanted.
Is it possible to undo the TM restore?
1Bizarrely enough, TM noticed that one subfolder already existed, and asked whether it should overwrite it, keep the latest version, or keep both. What's bizarre about this is that only one subfolder was selected for such special treatment, out of dozens of subfolders for which it would have been equally applicable.
A:
Two things might work in your case:
Power off the Mac and hope an unerase utility can recover the files before they get overwritten (assuming the restore didn't write over the existing files on disk).
Delete the folder and try again from a different Time Machine snapshot.
|
{
"pile_set_name": "StackExchange"
}
|
Sixteen-year-old Katy Martinez lives in Las Vegas, where she’s finishing her junior year of high school and planning for college. She's from a union family, and her parents both migrated from El Salvador nearly 20 years ago; she’s a U.S. citizen who has spent her entire life in the States. The administration wants to end TPS for an estimated 260,000 Salvadorans on September 9. Katy says that fact is always on her mind.
“It’s something that looms over my head, even at school,” she tells Teen Vogue. Her parents are both protected under TPS, and she says the prospect of it being ended for El Salvador means she doesn’t know “if I’ll ever have the chance to go through with going to a dance, or going to my competitions for dance, or even help out at my church.”
She says that if TPS were ended for El Salvadorans, she isn’t sure if she would leave with her parents or try to stay.
“I’m still 16, my brother is 13, and we rely on our parents for things,” she says. “If on the chance we do leave with them, we’re losing everything we have, from all of our scholarship opportunities, our school opportunities, all of our friends — we’re leaving everything behind.”
Alternately, if she and her brother stay when her parents are forced to leave, Katy says she’d suddenly have new responsibilities. It’s also complicated planning the next few years of her life — crucially, where to apply to college.
“It has impacted my [college] search because if there’s a possibility of me having to leave, I feel scared to apply for the colleges I want to go to,” Katy explains.
Like Katy, Hnaida Cenemat is also 16. Her mother, Wilna Destin, is a labor organizer with UNITE HERE Local 737 and a TPS recipient from Haiti who came to the U.S. 19 years ago.
Hnaida says she always feared that her mom’s status was at risk. “Once when I was little, we were in our apartment and heard immigration was knocking on people’s doors. Me and my mom really got scared. So if they came to the door, we wouldn’t answer and pretend no one was home,” she says.
According to The Hill, Democrats believe the Dream Act and the American Promise Act could pass the House this June, though their prospects in the Republican-controlled Senate (or with the current occupant of the White House, who could veto the bill) are less bright in the near future.
|
{
"pile_set_name": "OpenWebText2"
}
|
package org.gradle.example.simple;
import org.gradle.example.simple.Person;
import org.junit.Test;
import static org.junit.Assert.*;
public class TestPerson417 {
@Test
public void testPerson() {
Person p = new Person();
p.setAge(20);
p.setName("Fird Birfle");
p.setSalary(195750.22);
assertEquals(215325.242, p.calculateBonus(), 0.01);
assertEquals("The Honorable Fird Birfle", p.becomeJudge());
assertEquals(30, p.timeWarp());
p.wasteTime();
}
}
|
{
"pile_set_name": "Github"
}
|
/*
* Maxim MAX77620 MFD Driver
*
* Copyright (C) 2016 NVIDIA CORPORATION. All rights reserved.
*
* Author:
* Laxman Dewangan <ldewangan@nvidia.com>
* Chaitanya Bandi <bandik@nvidia.com>
* Mallikarjun Kasoju <mkasoju@nvidia.com>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*/
/****************** Teminology used in driver ********************
* Here are some terminology used from datasheet for quick reference:
* Flexible Power Sequence (FPS):
* The Flexible Power Sequencer (FPS) allows each regulator to power up under
* hardware or software control. Additionally, each regulator can power on
* independently or among a group of other regulators with an adjustable
* power-up and power-down delays (sequencing). GPIO1, GPIO2, and GPIO3 can
* be programmed to be part of a sequence allowing external regulators to be
* sequenced along with internal regulators. 32KHz clock can be programmed to
* be part of a sequence.
* There is 3 FPS confguration registers and all resources are configured to
* any of these FPS or no FPS.
*/
#include <linux/i2c.h>
#include <linux/interrupt.h>
#include <linux/mfd/core.h>
#include <linux/mfd/max77620.h>
#include <linux/module.h>
#include <linux/of.h>
#include <linux/of_device.h>
#include <linux/regmap.h>
#include <linux/slab.h>
static struct resource gpio_resources[] = {
DEFINE_RES_IRQ(MAX77620_IRQ_TOP_GPIO),
};
static struct resource power_resources[] = {
DEFINE_RES_IRQ(MAX77620_IRQ_LBT_MBATLOW),
};
static struct resource rtc_resources[] = {
DEFINE_RES_IRQ(MAX77620_IRQ_TOP_RTC),
};
static struct resource thermal_resources[] = {
DEFINE_RES_IRQ(MAX77620_IRQ_LBT_TJALRM1),
DEFINE_RES_IRQ(MAX77620_IRQ_LBT_TJALRM2),
};
static const struct regmap_irq max77620_top_irqs[] = {
REGMAP_IRQ_REG(MAX77620_IRQ_TOP_GLBL, 0, MAX77620_IRQ_TOP_GLBL_MASK),
REGMAP_IRQ_REG(MAX77620_IRQ_TOP_SD, 0, MAX77620_IRQ_TOP_SD_MASK),
REGMAP_IRQ_REG(MAX77620_IRQ_TOP_LDO, 0, MAX77620_IRQ_TOP_LDO_MASK),
REGMAP_IRQ_REG(MAX77620_IRQ_TOP_GPIO, 0, MAX77620_IRQ_TOP_GPIO_MASK),
REGMAP_IRQ_REG(MAX77620_IRQ_TOP_RTC, 0, MAX77620_IRQ_TOP_RTC_MASK),
REGMAP_IRQ_REG(MAX77620_IRQ_TOP_32K, 0, MAX77620_IRQ_TOP_32K_MASK),
REGMAP_IRQ_REG(MAX77620_IRQ_TOP_ONOFF, 0, MAX77620_IRQ_TOP_ONOFF_MASK),
REGMAP_IRQ_REG(MAX77620_IRQ_LBT_MBATLOW, 1, MAX77620_IRQ_LBM_MASK),
REGMAP_IRQ_REG(MAX77620_IRQ_LBT_TJALRM1, 1, MAX77620_IRQ_TJALRM1_MASK),
REGMAP_IRQ_REG(MAX77620_IRQ_LBT_TJALRM2, 1, MAX77620_IRQ_TJALRM2_MASK),
};
static const struct mfd_cell max77620_children[] = {
{ .name = "max77620-pinctrl", },
{ .name = "max77620-clock", },
{ .name = "max77620-pmic", },
{ .name = "max77620-watchdog", },
{
.name = "max77620-gpio",
.resources = gpio_resources,
.num_resources = ARRAY_SIZE(gpio_resources),
}, {
.name = "max77620-rtc",
.resources = rtc_resources,
.num_resources = ARRAY_SIZE(rtc_resources),
}, {
.name = "max77620-power",
.resources = power_resources,
.num_resources = ARRAY_SIZE(power_resources),
}, {
.name = "max77620-thermal",
.resources = thermal_resources,
.num_resources = ARRAY_SIZE(thermal_resources),
},
};
static const struct mfd_cell max20024_children[] = {
{ .name = "max20024-pinctrl", },
{ .name = "max77620-clock", },
{ .name = "max20024-pmic", },
{ .name = "max77620-watchdog", },
{
.name = "max77620-gpio",
.resources = gpio_resources,
.num_resources = ARRAY_SIZE(gpio_resources),
}, {
.name = "max77620-rtc",
.resources = rtc_resources,
.num_resources = ARRAY_SIZE(rtc_resources),
}, {
.name = "max20024-power",
.resources = power_resources,
.num_resources = ARRAY_SIZE(power_resources),
},
};
static struct regmap_irq_chip max77620_top_irq_chip = {
.name = "max77620-top",
.irqs = max77620_top_irqs,
.num_irqs = ARRAY_SIZE(max77620_top_irqs),
.num_regs = 2,
.status_base = MAX77620_REG_IRQTOP,
.mask_base = MAX77620_REG_IRQTOPM,
};
static const struct regmap_range max77620_readable_ranges[] = {
regmap_reg_range(MAX77620_REG_CNFGGLBL1, MAX77620_REG_DVSSD4),
};
static const struct regmap_access_table max77620_readable_table = {
.yes_ranges = max77620_readable_ranges,
.n_yes_ranges = ARRAY_SIZE(max77620_readable_ranges),
};
static const struct regmap_range max20024_readable_ranges[] = {
regmap_reg_range(MAX77620_REG_CNFGGLBL1, MAX77620_REG_DVSSD4),
regmap_reg_range(MAX20024_REG_MAX_ADD, MAX20024_REG_MAX_ADD),
};
static const struct regmap_access_table max20024_readable_table = {
.yes_ranges = max20024_readable_ranges,
.n_yes_ranges = ARRAY_SIZE(max20024_readable_ranges),
};
static const struct regmap_range max77620_writable_ranges[] = {
regmap_reg_range(MAX77620_REG_CNFGGLBL1, MAX77620_REG_DVSSD4),
};
static const struct regmap_access_table max77620_writable_table = {
.yes_ranges = max77620_writable_ranges,
.n_yes_ranges = ARRAY_SIZE(max77620_writable_ranges),
};
static const struct regmap_range max77620_cacheable_ranges[] = {
regmap_reg_range(MAX77620_REG_SD0_CFG, MAX77620_REG_LDO_CFG3),
regmap_reg_range(MAX77620_REG_FPS_CFG0, MAX77620_REG_FPS_SD3),
};
static const struct regmap_access_table max77620_volatile_table = {
.no_ranges = max77620_cacheable_ranges,
.n_no_ranges = ARRAY_SIZE(max77620_cacheable_ranges),
};
static const struct regmap_config max77620_regmap_config = {
.name = "power-slave",
.reg_bits = 8,
.val_bits = 8,
.max_register = MAX77620_REG_DVSSD4 + 1,
.cache_type = REGCACHE_RBTREE,
.rd_table = &max77620_readable_table,
.wr_table = &max77620_writable_table,
.volatile_table = &max77620_volatile_table,
};
static const struct regmap_config max20024_regmap_config = {
.name = "power-slave",
.reg_bits = 8,
.val_bits = 8,
.max_register = MAX20024_REG_MAX_ADD + 1,
.cache_type = REGCACHE_RBTREE,
.rd_table = &max20024_readable_table,
.wr_table = &max77620_writable_table,
.volatile_table = &max77620_volatile_table,
};
/* max77620_get_fps_period_reg_value: Get FPS bit field value from
* requested periods.
* MAX77620 supports the FPS period of 40, 80, 160, 320, 540, 1280, 2560
* and 5120 microseconds. MAX20024 supports the FPS period of 20, 40, 80,
* 160, 320, 540, 1280 and 2560 microseconds.
* The FPS register has 3 bits field to set the FPS period as
* bits max77620 max20024
* 000 40 20
* 001 80 40
* :::
*/
static int max77620_get_fps_period_reg_value(struct max77620_chip *chip,
int tperiod)
{
int fps_min_period;
int i;
switch (chip->chip_id) {
case MAX20024:
fps_min_period = MAX20024_FPS_PERIOD_MIN_US;
break;
case MAX77620:
fps_min_period = MAX77620_FPS_PERIOD_MIN_US;
default:
return -EINVAL;
}
for (i = 0; i < 7; i++) {
if (fps_min_period >= tperiod)
return i;
fps_min_period *= 2;
}
return i;
}
/* max77620_config_fps: Configure FPS configuration registers
* based on platform specific information.
*/
static int max77620_config_fps(struct max77620_chip *chip,
struct device_node *fps_np)
{
struct device *dev = chip->dev;
unsigned int mask = 0, config = 0;
u32 fps_max_period;
u32 param_val;
int tperiod, fps_id;
int ret;
char fps_name[10];
switch (chip->chip_id) {
case MAX20024:
fps_max_period = MAX20024_FPS_PERIOD_MAX_US;
break;
case MAX77620:
fps_max_period = MAX77620_FPS_PERIOD_MAX_US;
default:
return -EINVAL;
}
for (fps_id = 0; fps_id < MAX77620_FPS_COUNT; fps_id++) {
sprintf(fps_name, "fps%d", fps_id);
if (!strcmp(fps_np->name, fps_name))
break;
}
if (fps_id == MAX77620_FPS_COUNT) {
dev_err(dev, "FPS node name %s is not valid\n", fps_np->name);
return -EINVAL;
}
ret = of_property_read_u32(fps_np, "maxim,shutdown-fps-time-period-us",
¶m_val);
if (!ret) {
mask |= MAX77620_FPS_TIME_PERIOD_MASK;
chip->shutdown_fps_period[fps_id] = min(param_val,
fps_max_period);
tperiod = max77620_get_fps_period_reg_value(chip,
chip->shutdown_fps_period[fps_id]);
config |= tperiod << MAX77620_FPS_TIME_PERIOD_SHIFT;
}
ret = of_property_read_u32(fps_np, "maxim,suspend-fps-time-period-us",
¶m_val);
if (!ret)
chip->suspend_fps_period[fps_id] = min(param_val,
fps_max_period);
ret = of_property_read_u32(fps_np, "maxim,fps-event-source",
¶m_val);
if (!ret) {
if (param_val > 2) {
dev_err(dev, "FPS%d event-source invalid\n", fps_id);
return -EINVAL;
}
mask |= MAX77620_FPS_EN_SRC_MASK;
config |= param_val << MAX77620_FPS_EN_SRC_SHIFT;
if (param_val == 2) {
mask |= MAX77620_FPS_ENFPS_SW_MASK;
config |= MAX77620_FPS_ENFPS_SW;
}
}
if (!chip->sleep_enable && !chip->enable_global_lpm) {
ret = of_property_read_u32(fps_np,
"maxim,device-state-on-disabled-event",
¶m_val);
if (!ret) {
if (param_val == 0)
chip->sleep_enable = true;
else if (param_val == 1)
chip->enable_global_lpm = true;
}
}
ret = regmap_update_bits(chip->rmap, MAX77620_REG_FPS_CFG0 + fps_id,
mask, config);
if (ret < 0) {
dev_err(dev, "Failed to update FPS CFG: %d\n", ret);
return ret;
}
return 0;
}
static int max77620_initialise_fps(struct max77620_chip *chip)
{
struct device *dev = chip->dev;
struct device_node *fps_np, *fps_child;
u8 config;
int fps_id;
int ret;
for (fps_id = 0; fps_id < MAX77620_FPS_COUNT; fps_id++) {
chip->shutdown_fps_period[fps_id] = -1;
chip->suspend_fps_period[fps_id] = -1;
}
fps_np = of_get_child_by_name(dev->of_node, "fps");
if (!fps_np)
goto skip_fps;
for_each_child_of_node(fps_np, fps_child) {
ret = max77620_config_fps(chip, fps_child);
if (ret < 0)
return ret;
}
config = chip->enable_global_lpm ? MAX77620_ONOFFCNFG2_SLP_LPM_MSK : 0;
ret = regmap_update_bits(chip->rmap, MAX77620_REG_ONOFFCNFG2,
MAX77620_ONOFFCNFG2_SLP_LPM_MSK, config);
if (ret < 0) {
dev_err(dev, "Failed to update SLP_LPM: %d\n", ret);
return ret;
}
skip_fps:
/* Enable wake on EN0 pin */
ret = regmap_update_bits(chip->rmap, MAX77620_REG_ONOFFCNFG2,
MAX77620_ONOFFCNFG2_WK_EN0,
MAX77620_ONOFFCNFG2_WK_EN0);
if (ret < 0) {
dev_err(dev, "Failed to update WK_EN0: %d\n", ret);
return ret;
}
/* For MAX20024, SLPEN will be POR reset if CLRSE is b11 */
if ((chip->chip_id == MAX20024) && chip->sleep_enable) {
config = MAX77620_ONOFFCNFG1_SLPEN | MAX20024_ONOFFCNFG1_CLRSE;
ret = regmap_update_bits(chip->rmap, MAX77620_REG_ONOFFCNFG1,
config, config);
if (ret < 0) {
dev_err(dev, "Failed to update SLPEN: %d\n", ret);
return ret;
}
}
return 0;
}
static int max77620_read_es_version(struct max77620_chip *chip)
{
unsigned int val;
u8 cid_val[6];
int i;
int ret;
for (i = MAX77620_REG_CID0; i <= MAX77620_REG_CID5; i++) {
ret = regmap_read(chip->rmap, i, &val);
if (ret < 0) {
dev_err(chip->dev, "Failed to read CID: %d\n", ret);
return ret;
}
dev_dbg(chip->dev, "CID%d: 0x%02x\n",
i - MAX77620_REG_CID0, val);
cid_val[i - MAX77620_REG_CID0] = val;
}
/* CID4 is OTP Version and CID5 is ES version */
dev_info(chip->dev, "PMIC Version OTP:0x%02X and ES:0x%X\n",
cid_val[4], MAX77620_CID5_DIDM(cid_val[5]));
return ret;
}
static int max77620_probe(struct i2c_client *client,
const struct i2c_device_id *id)
{
const struct regmap_config *rmap_config;
struct max77620_chip *chip;
const struct mfd_cell *mfd_cells;
int n_mfd_cells;
int ret;
chip = devm_kzalloc(&client->dev, sizeof(*chip), GFP_KERNEL);
if (!chip)
return -ENOMEM;
i2c_set_clientdata(client, chip);
chip->dev = &client->dev;
chip->irq_base = -1;
chip->chip_irq = client->irq;
chip->chip_id = (enum max77620_chip_id)id->driver_data;
switch (chip->chip_id) {
case MAX77620:
mfd_cells = max77620_children;
n_mfd_cells = ARRAY_SIZE(max77620_children);
rmap_config = &max77620_regmap_config;
break;
case MAX20024:
mfd_cells = max20024_children;
n_mfd_cells = ARRAY_SIZE(max20024_children);
rmap_config = &max20024_regmap_config;
break;
default:
dev_err(chip->dev, "ChipID is invalid %d\n", chip->chip_id);
return -EINVAL;
}
chip->rmap = devm_regmap_init_i2c(client, rmap_config);
if (IS_ERR(chip->rmap)) {
ret = PTR_ERR(chip->rmap);
dev_err(chip->dev, "Failed to intialise regmap: %d\n", ret);
return ret;
}
ret = max77620_read_es_version(chip);
if (ret < 0)
return ret;
ret = devm_regmap_add_irq_chip(chip->dev, chip->rmap, client->irq,
IRQF_ONESHOT | IRQF_SHARED,
chip->irq_base, &max77620_top_irq_chip,
&chip->top_irq_data);
if (ret < 0) {
dev_err(chip->dev, "Failed to add regmap irq: %d\n", ret);
return ret;
}
ret = max77620_initialise_fps(chip);
if (ret < 0)
return ret;
ret = devm_mfd_add_devices(chip->dev, PLATFORM_DEVID_NONE,
mfd_cells, n_mfd_cells, NULL, 0,
regmap_irq_get_domain(chip->top_irq_data));
if (ret < 0) {
dev_err(chip->dev, "Failed to add MFD children: %d\n", ret);
return ret;
}
return 0;
}
#ifdef CONFIG_PM_SLEEP
static int max77620_set_fps_period(struct max77620_chip *chip,
int fps_id, int time_period)
{
int period = max77620_get_fps_period_reg_value(chip, time_period);
int ret;
ret = regmap_update_bits(chip->rmap, MAX77620_REG_FPS_CFG0 + fps_id,
MAX77620_FPS_TIME_PERIOD_MASK,
period << MAX77620_FPS_TIME_PERIOD_SHIFT);
if (ret < 0) {
dev_err(chip->dev, "Failed to update FPS period: %d\n", ret);
return ret;
}
return 0;
}
static int max77620_i2c_suspend(struct device *dev)
{
struct max77620_chip *chip = dev_get_drvdata(dev);
struct i2c_client *client = to_i2c_client(dev);
unsigned int config;
int fps;
int ret;
for (fps = 0; fps < MAX77620_FPS_COUNT; fps++) {
if (chip->suspend_fps_period[fps] < 0)
continue;
ret = max77620_set_fps_period(chip, fps,
chip->suspend_fps_period[fps]);
if (ret < 0)
return ret;
}
/*
* For MAX20024: No need to configure SLPEN on suspend as
* it will be configured on Init.
*/
if (chip->chip_id == MAX20024)
goto out;
config = (chip->sleep_enable) ? MAX77620_ONOFFCNFG1_SLPEN : 0;
ret = regmap_update_bits(chip->rmap, MAX77620_REG_ONOFFCNFG1,
MAX77620_ONOFFCNFG1_SLPEN,
config);
if (ret < 0) {
dev_err(dev, "Failed to configure sleep in suspend: %d\n", ret);
return ret;
}
/* Disable WK_EN0 */
ret = regmap_update_bits(chip->rmap, MAX77620_REG_ONOFFCNFG2,
MAX77620_ONOFFCNFG2_WK_EN0, 0);
if (ret < 0) {
dev_err(dev, "Failed to configure WK_EN in suspend: %d\n", ret);
return ret;
}
out:
disable_irq(client->irq);
return 0;
}
static int max77620_i2c_resume(struct device *dev)
{
struct max77620_chip *chip = dev_get_drvdata(dev);
struct i2c_client *client = to_i2c_client(dev);
int ret;
int fps;
for (fps = 0; fps < MAX77620_FPS_COUNT; fps++) {
if (chip->shutdown_fps_period[fps] < 0)
continue;
ret = max77620_set_fps_period(chip, fps,
chip->shutdown_fps_period[fps]);
if (ret < 0)
return ret;
}
/*
* For MAX20024: No need to configure WKEN0 on resume as
* it is configured on Init.
*/
if (chip->chip_id == MAX20024)
goto out;
/* Enable WK_EN0 */
ret = regmap_update_bits(chip->rmap, MAX77620_REG_ONOFFCNFG2,
MAX77620_ONOFFCNFG2_WK_EN0,
MAX77620_ONOFFCNFG2_WK_EN0);
if (ret < 0) {
dev_err(dev, "Failed to configure WK_EN0 n resume: %d\n", ret);
return ret;
}
out:
enable_irq(client->irq);
return 0;
}
#endif
static const struct i2c_device_id max77620_id[] = {
{"max77620", MAX77620},
{"max20024", MAX20024},
{},
};
MODULE_DEVICE_TABLE(i2c, max77620_id);
static const struct dev_pm_ops max77620_pm_ops = {
SET_SYSTEM_SLEEP_PM_OPS(max77620_i2c_suspend, max77620_i2c_resume)
};
static struct i2c_driver max77620_driver = {
.driver = {
.name = "max77620",
.pm = &max77620_pm_ops,
},
.probe = max77620_probe,
.id_table = max77620_id,
};
module_i2c_driver(max77620_driver);
MODULE_DESCRIPTION("MAX77620/MAX20024 Multi Function Device Core Driver");
MODULE_AUTHOR("Laxman Dewangan <ldewangan@nvidia.com>");
MODULE_AUTHOR("Chaitanya Bandi <bandik@nvidia.com>");
MODULE_AUTHOR("Mallikarjun Kasoju <mkasoju@nvidia.com>");
MODULE_LICENSE("GPL v2");
|
{
"pile_set_name": "Github"
}
|
Omnifinity, a start-up based out of Sweden, announced today the release of their Omnideck 6 virtual reality treadmill. Initially showcased as part of The Gadget Show’s ‘Ultimate Battlefield 3 Simulator’ and touted as the first 360 degree treadmill in gaming, the Omnideck 6 aims to be the link between virtual gaming and reality: finally giving us a way to interact with environments in a real way other than mouse and keyboard or stationary treadmill.
Although Omnifinity was formed by MSE Engineer, a firm known mostly for combat simulation products, the Omnideck 6 seems to be heavily geared toward immersive gaming, specifically with the virtual reality headset the Oculus Rift.
Arguably the biggest complaint for users of the Oculus Rift has been the lack of real movement other than a mouse of keyboard, something Omnifinity feels they have solved. By tracking your movement and how far you travel on one of the omni-directional treadmills, the Omnideck 6 can determine how fast your character on screen is moving. The system utilizes a series of 16 motorized triangular sections of rollers with an underlying belt that moves along with the user. This guarantees that the player will not just walk right off the treadmill into a wall, and that the system can accurately track your movements up to 4.5mph.
The Omnidirect 6 comes with two options for visually representing your movement that gets registered on the treadmill system. One option, which was the original plan for the device, projects the image in front of you as you turn and walk around the virtual battlefield or game. As you can see in the ARMA 2 demo below from September, the image follows around wherever the user is looking, giving near total immersion into the environment.
The other new, more sophisticated solution is an Oculus Rift. Not only does using an Oculus greatly reduce the cost of the system, but it arguably provides a better layer of immersion as your entire field of view is nothing but the virtual world. The downside to this, of course, is that it requires a connection to either a desktop gaming PC nearby, or even a laptop mounted on the user’s back.
One big mantra of the device seems to be killing off mouse and keyboard for gaming as much possible. To achieve this, the Omnideck 6 has the capability to use several alternative input devices. The most obvious is a replica gun, being that the system is aimed for combat simulation as well as gaming. There is also the option for standard controller, such as an Xbox 360 controller, just like you can when using the Oculus Rift on its own.
All of these fancy treadmills and giant screens don’t serve any purpose without some specialized software to analyze and display it all. The Omnideck 6 software computes your walking speed by determining where you are on the treadmill from the center point, and calculates that into a workable speed that equates to how hard you’d push a joystick forward. Being that the treadmill moves with you (up to the aforementioned 4.5mph limit), it is unlikely that you’d just walk right off the platform but instead would be some distance from the center at all times. There is also the option for an optical tracking system that uses full body tracking and data tracking gloves for even more accurate movements.
One of the more interesting aspects of the system is how it can introduce environmental effects into its 19′ x 13′ environment. Heat, humidity, smoke, smell, time of day, temperature, and other factors can be simulated based on application needs.
Right now the current state of the system appears to be working on getting more developers on board to create some cool environments and uses for it, and I can’t wait. A lot of lower-end solutions for moving around in a video game have been around for years, but this appears to be highest quality one to date. While it obviously won’t be plopped down in your living room any time soon, the ability to play with it at an arcade, laser tag, or other similar venue is enough to be an exciting step into out virtual reality futures.
Your first chance to get a hands-on demo of the final product will be December 1st to the 5th when the product will be showed off at I/TSEC 2014 (Booth 1249) in Orlando, Florida.
|
{
"pile_set_name": "OpenWebText2"
}
|
‘Great news, we passed another hurdle today, successfully getting SB1381 voted out of the Judiciary Committee!!!! 5 of the 6 senators voted yes, a very strong showing of support! Jackson, Lara, Monning, Leno and Corbett all voted yes, not sure if Vidak* was a no vote, abstained or wasn’t present. I am certain our phone calls were a big part in this.
It sounds like we will be going to the Senate Agriculture Committee next (probably 4/29), so we will need to make more phone calls. All of our efforts with Senator Lieu take even greater importance as he is one of the 5 members on this committee. I suspect this will be a more difficult committee to get out of.
The good news is that Wolk is on this committee and she already voted yes when it came before her on the Health Committee. I think Lieu is pretty certain to vote yes, especially if we keep requesting it. The last 3 I do not know much about, look for an update here on the next steps as to when to call.’
(*- Meanwhile, we will be looking into that absentee/no-vote)
And now our second correspondent,
‘WooT!! We made it out of Judiciary with a few miracles!
We went into the hearing thinking Lara would vote no or not at all…and he voted YES! Miracle #2- We had a very vocal supporter in Hannahbeth Jackson who assured opposition that their fears were unfounded, that this was clearly about right to know, not lawsuits, that she wanted to know what was in the food her daughter is feeding her granddaughter. Rock ON!!
Next Steps-
Although we are making one more plea to the AG committee to not be heard there, at this point it looks like we will have to be heard at the Ag Committee next. And that hearing would probably be April 29 or 31…that’s right… NEXT week! Our biggest hurdle and not much time to influence.
|
{
"pile_set_name": "Pile-CC"
}
|
Stefan Spremo
Stefan Spremo (; born 18 May 1997) is a Serbian football midfielder who plays for Bačka 1901.
Career
Spartak Subotica
Spremo signed his first professional three-year contract with Spartak Subotica in July 2015. He made his Serbian SuperLiga in 4th fixture of 2015–16 season, against Partizan.
Career statistics
References
Category:1997 births
Category:Living people
Category:Sportspeople from Subotica
Category:Association football midfielders
Category:Serbian footballers
Category:FK Spartak Subotica players
Category:FK Bačka 1901 players
Category:Serbian SuperLiga players
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Tuesday, January 04, 2011
UNTO THE HILLS by Billy Graham
UNTO THE HILLS
A Daily Devotional
by
Billy Graham
Published by Thomas Nelson Publishers
This is an updated version of the book reissued on the 25th anniversary of the original. There is a devotional
devoted to each day of the year, with a Bible verse at the top and a short prayer at the end of each. I think this is the best way to understand some of the Bible, for those of us who need to delve more deeply into the word of God, but don't take the time to read daily. I am really enjoying the devotionals, and his Preface, he says he never picks up the book without thinking of his late wife, Ruth, and knows that soon, they will be reunited, but until then, he is dedicating the book to her memory.
I have a very hefty respect for Dr. Graham, so when I got a chance to review this book, I jumped at it. I seldom reread a book, but this one will stay by my chair, as it seems to touch on many subjects, I can read it and understand his explainations in just a few minutes time. And with the verse at the top of the page, if you want to go more in depth, you have a location to start reading.
I received a copy of this book from BookSneeze to read and review. I recieved no other compensation for my review. All opinions expressed here are my own.
No comments:
Follow by Email
Feedjit
Pages
Disclaimer
In accordance with the new FTC Guidelines for blogging and endorsements, you should assume that every book reviewed here at Jettie's Ramblings was provided to the reviewer, by the publisher, media group or the author for free. no financial compensation was received, unless specified on the review..All opinions expressed are my own.
Now about me..I'm a wife, mom, grandmom, and I'm a 'crafty person'. The girls used to refer to my 'crafts' as my hobby of the month. I finally found soapmaking and floral design, and those I've stuck with for more than a month, florals for about 8 yrs, soapmaking for 6 yr. I also like writing, I've self published 1 book with a co author, A Man Called Brown, abt my gggrandfather, and written several short stories for the entertainment of myelf and a few friends.
|
{
"pile_set_name": "Pile-CC"
}
|
Korean Antitrusters Put US Tech Heavies Under the Microscope
Today in international tech news: HP is among those targeted in a Korean investigation, Nokia is stuck in the mud in Europe, an Indian man uses Google Earth to track down his family -- 25 years later -- and more.
They took computer records and documents and questioned employees over their suspicions.
"It's true that FTC officials visited our office last Friday," said HP spokeswoman Baek Min-jung. But she refused to elaborate, calling the ongoing probe "routine," pointing out the FTC vowed earlier this year to tighten its monitoring over multinational IT firms.
The Korean Fair Trade Commission released a "working roadmap" last December which, according to The Korea Times, is designed to prevent multinational IT firms from leveraging their positions of power.
The Times also reported that HP is already under investigation following a March complaint from IT startup Webcash.
Nokia Floundering in Europe
Nokia has failed to garner momentum in its attempt to challenge the iPhone and Android platforms in the European phone market, according to a Reuters article.
Reuters reports:
Four major telecom operators in Europe, where the phones have been on sale since before Christmas, told Reuters the new Nokia Lumia smartphones were not good enough to compete with Apple's iPhone or Samsung's Galaxy phones ...
"No one comes into the store and asks for a Windows phone," said an executive in charge of mobile devices at a European operator, which has sold the Lumia 800 and 710 since December ...
"Nokia have given themselves a double challenge: to restore their credibility in terms of making hardware smartphones and succeed with the Microsoft Windows operating system, which lags in the market," the executive said.
Moody's cut Nokia's credit rating to "one notch above junk" Monday, according to Reuters, after Nokia reported that it would have first- and second-quarter losses. S&P has a similar downgrade last month.
On the heels of a horrid week for the company, Nokia's shares are at a 15-year low.
European operators, according to the reprt, are itching for a viable alternative -- and the bargaining power that comes with it -- to Apple and Android phones.
The boy, Saroo Brierley, later moved to Australia, apparently destined to never see his family again.
But as the Herald tells it,
He turned to Google Earth. "For four years I searched, looking up and down, [then] I started looking from [Calcutta] train station and following the railroad back. But there were so many rail tracks it was sending me absolutely crazy."
Finally, he found it, 1,484 kilometers from Calcutta: Khandwa. He looked closer. He saw the dam he used to swim in as a child, a bridge he remembered, too. "That's where I was born."
Internet Battle Rages On
Featured Tuesday was Chinese artist and social activist Ai Weiwei. Ai began his article with a quote from Chinese dictator Mao Zedong:
Chairman Mao used to say: "As communists we gain control with the power of the gun and maintain control with the power of the pen." You can see propaganda and the control of ideology as an authoritarian society's most important task. Before the Internet, all people could do was watch TV or read The People's Daily. They would carefully read between the lines to see what had happened. Now it is very different. The papers try to talk about things, but even before they appear, everyone has talked about it on the Internet.
The Guardian series also included a piece about the U.S. and China engaging in "war games" that focus on the specter of cyberattacks.
Tech Trek is a blog that looks at tech news from around the world. David Vranicar is a freelance journalist currently living in the Netherlands. His ECT News Network archive, with links to articles and podcasts, is
available here.
|
{
"pile_set_name": "Pile-CC"
}
|
4
Let k(d) be the first derivative of d**2 - 28. Let m(a) = 2*a**2 + 16. Determine m(k(s)).
8*s**2 + 16
Let j(s) = s**2 - s**2 + s**2. Let x(f) be the third derivative of f**8/20160 - f**5/20 + 3*f**2. Let n(o) be the third derivative of x(o). Determine n(j(l)).
l**4
Let v(f) be the first derivative of f**4/12 - 3*f - 2. Let b(s) be the first derivative of v(s). Let p(n) = -3*n. Determine p(b(q)).
-3*q**2
Let z(a) = 27*a**2 - 15*a**2 - 7*a**2. Let i(c) = 2*c. Calculate z(i(t)).
20*t**2
Let j(k) = -10*k. Let v(s) = -2*s. Let u(c) = -3*j(c) + 14*v(c). Let w(q) = q - 1. Let g(a) = -3*a + 5. Let y(h) = -g(h) - 5*w(h). Calculate y(u(n)).
-4*n
Let r(q) = -3*q**2 + 10*q. Let n(z) = 16*z. What is n(r(d))?
-48*d**2 + 160*d
Let v(l) be the third derivative of l**5/20 - 2*l**2. Let y(m) = -2*m. What is y(v(j))?
-6*j**2
Let x(u) be the third derivative of -u**4/8 - 5*u**2. Let k(y) = -y + 35. Let d(h) = 5. Let j(z) = -35*d(z) + 5*k(z). Calculate x(j(r)).
15*r
Let l(u) = 43*u + 1. Let p(w) be the third derivative of w**5/60 - 20*w**2. What is p(l(h))?
1849*h**2 + 86*h + 1
Let s(m) = 3*m + 4. Let a(g) = -1. Let d(c) = -4*a(c) - s(c). Let x(l) = l. Let w(u) = -u. Let o(t) = w(t) - x(t). Calculate d(o(q)).
6*q
Let k(r) = 2*r + 8. Let i(b) = b + 5. Let c(y) = 8*i(y) - 5*k(y). Let h(n) = 20*n. What is c(h(w))?
-40*w
Let z(t) = 2*t + 2. Let a(v) = 10*v + 11. Let c(q) = 2*a(q) - 11*z(q). Let o(g) = 30 - 30 + 3*g**2. What is c(o(u))?
-6*u**2
Let c(i) = -2. Let l(j) = -2*j - 5. Let s(b) = -6*c(b) + 2*l(b). Let p(t) = t**2. Give p(s(z)).
16*z**2 - 16*z + 4
Let t(j) = 3*j**2. Let h(z) = -z**3 - 2*z**2 - 3*z - 3. Let a be h(-2). Suppose -a*r + 8 = r. Let f(k) = -2*k**r + 6 - 6. Calculate t(f(p)).
12*p**4
Let b(d) be the first derivative of -7*d**3/3 + 2. Let s(i) = -256*i + 128*i + 129*i. Determine b(s(v)).
-7*v**2
Let y(g) = -7*g**2 + 37*g**2 - 5*g**2 - 16*g**2. Let m(l) = -l**2. What is y(m(q))?
9*q**4
Let q(w) = 17*w. Let g(a) be the third derivative of -a**5/12 - 19*a**2 + 1. Give g(q(h)).
-1445*h**2
Let k(m) = -2*m**2 - 64*m. Let j(a) = a. What is j(k(y))?
-2*y**2 - 64*y
Let n(r) = -2148*r**2 - 2. Let u(g) = -4*g. Give u(n(v)).
8592*v**2 + 8
Let c(j) = -12*j - 10. Let h(i) = -i - 1. Let n(m) = -c(m) + 10*h(m). Let r(p) = p. Let b(l) = -8*l. Let u(d) = b(d) + 6*r(d). Calculate n(u(f)).
-4*f
Let q(m) = -2*m**2. Let g(k) = 3 + 2*k**2 - 3 + 0*k**2. Determine q(g(x)).
-8*x**4
Let q(s) = 7*s + 4*s - s - 15*s. Let k(z) = -8*z**2. Give k(q(l)).
-200*l**2
Let c be 8/(-6)*(-3)/2. Let f(i) = 3*i**2 + 4*i**2 - 4*i**2 - c*i**2. Let z(t) = 3*t**2. Give f(z(j)).
9*j**4
Let s(k) = -k. Suppose 0*t - 5 = 5*t, -3*t - 3 = -5*c. Let w be 1*(3 + 0) - c. Let o(f) = -3 - f + w. What is o(s(n))?
n
Let t(h) = -14*h - 24*h + 35*h. Let n(a) = 2*a. Let r(j) = -j. Let p(b) = 4*n(b) + 7*r(b). What is p(t(u))?
-3*u
Let q(x) = 3*x**2 + 2*x. Let o(u) = 23*u**2 - 14*u**2 + 26*u**2 + 25*u. Let f(r) = -2*o(r) + 25*q(r). Let y(t) = t. Give y(f(a)).
5*a**2
Let s(w) = 3*w. Let c(t) = -7*t. Let q(a) = -4*c(a) - 9*s(a). Let b(p) = -3*p**2. Determine b(q(z)).
-3*z**2
Let i(u) be the first derivative of u**2 + 2. Let h(x) = 4*x**2 + 2*x**2 - 2*x**2 + 2*x**2. Calculate h(i(l)).
24*l**2
Let x(k) = 2*k**2 + 3*k. Let a(v) = -5*v**2 - 8*v. Let p(q) = 3*a(q) + 8*x(q). Let j(w) = -22*w. Calculate j(p(c)).
-22*c**2
Let j(y) = -y. Suppose -3*n = b - 30, -3*n + 18 = 4*b - 12. Let z(q) = q - 10 + n. What is z(j(v))?
-v
Let n(h) = 1 - 3*h - 1. Let l(p) be the third derivative of -p**5/60 + p**2. Determine l(n(f)).
-9*f**2
Let m(j) = 4*j + 9. Let w(d) = d + 4. Let k(c) = 4*m(c) - 9*w(c). Let y(l) = 4*l. What is y(k(f))?
28*f
Let h(x) = -2*x**2 + 5*x - 443. Let k(d) = -d. Calculate h(k(c)).
-2*c**2 - 5*c - 443
Let j(o) = -o**2. Let x(l) be the second derivative of l**4/3 + 4*l. Calculate j(x(s)).
-16*s**4
Let x(c) = -8*c**2. Let j(d) = -16*d. Let v(k) = -11*k. Let q(p) = 5*j(p) - 7*v(p). Determine q(x(s)).
24*s**2
Let t(p) be the second derivative of p**3/2 + 7*p. Let l(f) = -2*f**2. Calculate t(l(h)).
-6*h**2
Let o(v) = 2*v. Let w = 0 - -2. Let h(y) = 3*y**2 - 2*y**w - 4*y**2 + 2*y**2. Give o(h(b)).
-2*b**2
Let t(v) = 135*v**2. Let g(c) = -54*c. Give t(g(f)).
393660*f**2
Let a(n) = 2*n. Let f(d) = -3*d. Let y(u) = -2*u**3 + u + 1. Let h be y(-1). Let i = -1 - h. Let v(c) = 3*c. Let q(m) = i*f(m) - 4*v(m). Determine a(q(b)).
-6*b
Let h(y) = -2*y**2. Let o(r) = 9828*r**2. Give o(h(d)).
39312*d**4
Let c(t) = -3*t. Let w(g) = -5*g + 3. Let i(n) = n**2 + 9*n - 8. Let a be i(-9). Let f(k) = 14*k - 8. Let s(u) = a*w(u) - 3*f(u). Give c(s(v)).
6*v
Let a(j) = -3*j**2. Let t(x) = -7*x. Let l(v) be the second derivative of v**3/6 - v. Let i(p) = -6*l(p) - t(p). Determine i(a(u)).
-3*u**2
Suppose o - 6 = 5*f - 21, -2*o - 6 = -4*f. Let q(i) = 6*i - f*i - 3*i. Let l(v) = -2*v**2. Give l(q(j)).
-2*j**2
Let o(u) be the second derivative of -4*u - 1/12*u**4 + 0*u**2 + 0 + 0*u**3. Let p(w) = w**2. Determine o(p(m)).
-m**4
Let a(u) = -2*u + 4. Let p(v) = 1. Let i(k) = a(k) - 4*p(k). Let d(r) = -35*r + 2. Give d(i(x)).
70*x + 2
Let y(w) = 2*w**2. Let c(b) = -b + 6. Let u be c(7). Let x = u + 2. Let r(f) = -3*f + 2 - 1 - x. Calculate r(y(t)).
-6*t**2
Let x(c) = 18*c**2. Let q(k) = 2*k - 14. Give q(x(w)).
36*w**2 - 14
Let g(h) = h**2. Let v(a) = 34*a. Give g(v(u)).
1156*u**2
Let o(k) = k**2. Let w(q) = -q + 1. Let g(b) = 6*b - 12. Let j(s) = 11*s - 25. Let v(y) = -5*g(y) + 2*j(y). Let r(a) = -v(a) + 10*w(a). What is r(o(x))?
-2*x**2
Let x(c) = 0*c**2 + 2*c**2 + 2*c**2 - c**2. Let q(v) = -5*v. What is q(x(y))?
-15*y**2
Suppose -4*v = 16, 2*p + 0*p + 4*v + 12 = 0. Let h(u) = 3*u**2 + 2*u**2 - 3*u**p. Let m(z) = 3*z. What is m(h(s))?
6*s**2
Let f(y) = -2*y. Let b(k) be the second derivative of k**6/360 - k**4/3 + 4*k. Let d(c) be the third derivative of b(c). Calculate f(d(n)).
-4*n
Let g(t) be the first derivative of -5*t**2/2 + 1. Let i(p) = -2*p + 15985 - 15985. Calculate i(g(x)).
10*x
Let p(y) = -79*y + 79*y + y**2. Let c(u) = 0*u**2 + 5*u**2 + 0*u**2 - 4*u**2. Calculate p(c(z)).
z**4
Let i(o) = -5*o + o + 0*o + 6*o. Let t(u) = 13*u. What is t(i(w))?
26*w
Let r(j) = -2*j**2. Let x(i) = 4*i**2 + 3*i + 1. Let t = -8 + 6. Let k be x(t). Let w(f) = 6*f + k*f - 11*f. Determine w(r(g)).
-12*g**2
Let r(n) = -8*n**2. Let v(w) = 4*w**2 - 14*w - 14. Let z(g) = -g**2 + 3*g + 3. Let h(j) = -6*v(j) - 28*z(j). Determine h(r(l)).
256*l**4
Let t(r) = 6*r. Let a(c) = 9*c. Determine t(a(k)).
54*k
Let a(i) = 29*i. Let y(d) = -d. What is a(y(f))?
-29*f
Let z = -63 - -66. Let i(c) be the first derivative of -1/3*c**z - 2 + 0*c**2 + 0*c. Let p(u) = -2*u**2. Calculate p(i(x)).
-2*x**4
Let n(m) = -m. Let i(r) = -2*r**2 + 98. Give n(i(a)).
2*a**2 - 98
Let l(c) be the third derivative of -c**6/360 - c**4/24 - c**2. Let m(s) be the second derivative of l(s). Let j(v) = -v**2. What is m(j(x))?
2*x**2
Let o(v) = 49*v**2. Let u(c) = 6*c - 16. Let b(f) = -2*f + 5. Let g(m) = -16*b(m) - 5*u(m). Determine o(g(i)).
196*i**2
Let g(a) be the first derivative of -a**4/12 - 3*a**2/2 - 3. Let q(x) be the second derivative of g(x). Let o(r) = -3*r. Determine q(o(p)).
6*p
Let f(l) = -3*l. Let u = 3 + 1. Let h(k) = 4*k + 3. Let o(w) = -4 + w + 0*w - 6*w. Let t(p) = u*h(p) + 3*o(p). Calculate t(f(c)).
-3*c
Let a(k) = 6*k. Let o(d) = 2358*d + 2. Give o(a(v)).
14148*v + 2
Let r(o) = 5*o**2. Let n = -1 - -1. Let z(m) = m**2 + n + 0 - 2*m**2. Give r(z(k)).
5*k**4
Let o(y) = -y. Let p(s) = -2*s**2 + 0*s**2 + s**2 + 2*s. Let z(b) = 6*o(b) + 3*p(b). Let l(i) be the second derivative of i**4/6 + i. Determine z(l(r)).
-12*r**4
Let d(q) = q**2 - 13804. Let o(r) = -2*r. Give o(d(t)).
-2*t**2 + 27608
Let u(h) be the second derivative of h**6/360 - h**3/2 - 4*h. Let w(c) be the second derivative of u(c). Let i(o) = -2*o + 3*o - 2*o. Calculate i(w(d)).
-d**2
Let y(x) = -2*x**2 + 5*x - 5. Let f(l) = 2*l**2 - 6*l + 6. Let c(v) = 5*f(v) + 6*y(v). Let z(t) = 13*t**2. Determine z(c(w)).
52*w**4
Let t(w) = 963*w**2. Let o(a) = -5*a. Give o(t(s)).
-4815*s**2
Let u(p) = -3*p**2. Let h(x) = -2*x**2 + 3*x. Let l(r) = -3*r**2 + 5*r. Let z(k) = k**2 + 8*k + 7. Let s be z(-6). Let g(w) = s*h(w) + 3*l(w). What is u(g(n))?
-3*n**4
Let b(l) be the second derivative of -l**4/12 + 10*l. Let q(x) = x. Determi
|
{
"pile_set_name": "DM Mathematics"
}
|
Penedes is a beautiful wine region in Catalunyalocated just an hour away from the incredible city of Barcelona. It is very easy to visit this wine region while touring this iconic city, to learn some new cultural aspects of Spain through its wines. A wine tour in Penedes is a must for wine-lovers thanks to the innumerable varieties of wines produced in this region. From sparkling white and rose wines, locally called Cava to dry reds and whites and even sweet dessert wines, Penedes is a treasure-trove for the wine drinker.
Undoubtedly the most famous wine from this region is the sparkling wine, Cava. The wine is made using local grape varieties, but the Traditional Method or Champagne Method is employed while producing it. You can explore the wineries of the local Cava and wine producers on your next wine tour in Penedes. These wine tours can take you backstage, where all the preparations for producing this delicious wine are made. On a wine tour in Penedes, you can see yourself walk around the sun-kissed vineyards of the region while taking in the cool winds from France as you pick and taste the fresh grapes off the vines. You may even wander around the centuries old wine cellars and get a sneak-peak into the production process of your favourite Spanish wines. And a wine tour in Penedes would be incomplete without an exclusive guided tasting of some of the wineries finest reserves. Try pairing their wines with some delicious local jamon and cheese and discover the meaning of true harmony! If you crave some adventure in your wine tours, we can arrange for helicopter rides over vineyards and cycling tours across the wine region to help you have that perfect wine tour.
To experience the best of Spanish tourism and hospitality you can contact our local travel expert and book yourself an exclusive wine tour in this beautiful Catalonian region!
|
{
"pile_set_name": "Pile-CC"
}
|
1. Technical Field
The present disclosure relates to computer security and more specifically to wireless low energy double authentication (such as Bluetooth low energy) between a mobile device and a server node.
2. Introduction
Bluetooth is a wireless technology standard for exchanging data over short distances, designed for low-power consumption. Applications of the Bluetooth technology include wireless communication between a mobile phone and a hands-free headset or a compatible car stereo system, wireless networking between PCs and wireless communication between PCs and I/O devices such as a mouse, keyboard and printer. Bluetooth low energy is a subset of classic Bluetooth and runs low energy applications off a coin (button) cell, allowing for the lowest possible cost.
Bluetooth low energy uses AES encryption to protect data packets in transit after device authentication. Traditional device authentication is performed by scanning for a Bluetooth low energy device and reading a Bluetooth low energy device unique identifier. When the unique identifier is not considered trusted, a valid password is required to establish a connection. When the unique identifier is considered trusted, a connection is established between devices. Because Bluetooth low energy is a form of wireless communication, security throughout the authentication process is a major concern.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Q:
Is there an alternative to Runtime.getRuntime().exec()
Just wondering, if there is something better, newer, safer, faster, etc than Runtime.getRuntime().exec().
I want to run another process from my application on linux, and this is the only way i know how. Would be nice to have an alternative.
A:
How about ProcessBuilder?
A bit more:
Introduced in Java 1.5, allows you to gain more control on the process environment - set the working directory, let you redirect the error stream to the input stream (from java POV) and a few more things.
From Oracle's site:
ProcessBuilder - The new ProcessBuilder class provides a more
convenient way to invoke subprocesses than does Runtime.exec. In
particular, ProcessBuilder makes it easy to start a subprocess with a
modified process environment (that is, one based on the parent's
process environment, but with a few changes).
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Macro to add formulas where the are multiple rows above
I've been doing the company financial summaries, I've been doing a lot of the leg work manually (sorting by product, company, etc.). The problem is I've been using the below macro to add in two rows, so I can work out spends per customer.
Now what I want to do is add in those breaks, but in the first blank row, I want to copy and paste the values from the cells above for columns A, B and C. In column D and E I would like to sum the contiguous cells above, while column F should work out the difference between the calculated values in D & E (so =D-E), while column G should work out the % (=(Fx/Dx)*100). If there is a way to do this only if there is more than one row above all the better.
The code that I've been using so far is below, which gives me the line breaks I've been using. But with my RSI, copying the requisite cells and doing all the formulas manually isn't helping.
Sub AddBlankRows()
'
Dim iRow As Integer, iCol As Integer
Dim oRng As Range
Set oRng = Range("b1")
iRow = oRng.Row
iCol = oRng.Column
Do
'
If Cells(iRow + 1, iCol) <> Cells(iRow, iCol) Then
Cells(iRow + 1, iCol).EntireRow.Insert Shift:=x1Down
Cells(iRow + 1, iCol).EntireRow.Insert Shift:=x1Down
iRow = iRow + 3
Else
iRow = iRow + 1
End If
'
Loop While Not Cells(iRow, iCol).Text = ""
'
End Sub
Example data
What I'm aiming for
I'm a complete novice in this, so any help would be appreciated.
A:
An alternative solution you might want to consider is to keep the data in its original format and add a total row. If the data is a table, you can do this by selecting Total Row from the Design tab; otherwise, you can use the SUBTOTAL() formula and auto-filtering to achieve the same result. I've used tables for my example.
Without filtering, you get the results for the whole data set:
When you filter on a particular value of Account or Customer, it instead summarises the values for those rows only:
|
{
"pile_set_name": "StackExchange"
}
|
Q:
compilation error in c statements
I am trying to run this code.this code runs successfully.But when i change variables to constant numbers i get compilation error.
My code that works fine:
int a =5,b=6,c=7;
int d;
d = a,b,c;
printf("%d",d);
as i run the code its output is 5.
but when i run this segment of code:
d = 2,6,7;
printf("%d",d);
i get compilation error.I tried i on other compiler also. But the error still exists. What i am doing wrong.
A:
Your first code use the variables and assignment d = a and b and c just as expression there, so run the code:
int main(int argc, char const *argv[])
{
int a =5,b=5,c=7;
int d;
d = a,b,c+1;
printf("%d",d);
return 0;
}
You get 5, b and c+1 just valued and put them there useless.But if you run this code which includes comma expression:
int main(int argc, char const *argv[])
{
int a =5,b=5,c=7;
int d;
d = (a,b,c+1);
printf("%d",d);
return 0;
}
You get 8 as the last one valued expression.
You can use the number play as an expression with ():
int main(int argc, char const *argv[])
{
int a =5,b=5,c=7;
int d;
d = (0,3,1);
printf("%d",d);
return 0;
}
get the last number or valued data.
It works for me the code below:
int main(int argc, char const *argv[])
{
int a =5,b=5,c=7;
int d;
d = 0,3+1,1-1;
printf("%d",d);
return 0;
}
it output is 0, but if you don't with (), it meaningless by this way, why not just use d = 0;
|
{
"pile_set_name": "StackExchange"
}
|
Morphology of subcortical brain nuclei is associated with autonomic function in healthy humans.
The autonomic nervous system (ANS) is a brain body interface which serves to maintain homeostasis by influencing a plethora of physiological processes, including metabolism, cardiorespiratory regulation and nociception. Accumulating evidence suggests that ANS function is disturbed in numerous prevalent clinical disorders, including irritable bowel syndrome and fibromyalgia. While the brain is a central hub for regulating autonomic function, the association between resting autonomic activity and subcortical morphology has not been comprehensively studied and thus was our aim. In 27 healthy subjects [14 male and 13 female; mean age 30 years (range 22-53 years)], we quantified resting ANS function using validated indices of cardiac sympathetic index (CSI) and parasympathetic cardiac vagal tone (CVT). High resolution structural magnetic resonance imaging scans were acquired, and differences in subcortical nuclei shape, that is, 'deformation', contingent on resting ANS activity were investigated. CSI positively correlated with outward deformation of the brainstem, right nucleus accumbens, right amygdala and bilateral pallidum (all thresholded to corrected P < 0.05). In contrast, parasympathetic CVT negatively correlated with inward deformation of the right amygdala and pallidum (all thresholded to corrected P < 0.05). Left and right putamen volume positively correlated with CVT (r = 0.62, P = 0.0047 and r = 0.59, P = 0.008, respectively), as did the brainstem (r = 0.46, P = 0.049). These data provide novel evidence that resting autonomic state is associated with differences in the shape and volume of subcortical nuclei. Thus, subcortical morphological brain differences in various disorders may partly be attributable to perturbation in autonomic function. Further work is warranted to investigate these findings in clinical populations. Hum Brain Mapp 39:381-392, 2018. © 2017 Wiley Periodicals, Inc.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Chalk Room Diffuser Oil
£25.00
Essential oil blend of sea lavender & cliff grasses – 100ml
The Haeckels Chalk Room Diffuser.
A unique way to infuse your home using chalk.
Chalk is a naturally porous sedimentary rock which forms from the slow build up of cal- cite plates (coccoliths) which are shed from tiny organisms called coccolithophores. These tiny coccolithophores have been producing coccoliths for millennia and are still present today, creating a sediment base that will one day be compressed into becoming more chalk. Chalk cliffs, reefs and formations are found all around the Kent coast line, local to the Haeckels lab, and are commonly found in the form of cliffs due to having greater resistance to weathering and erosion than surrounding clay deposits; therefore chalk can be commonly found as cliffs or rising hills known as downlands.
Quantity
— OR —
HOW TO USE
Place your chalk diffuser in the centre of the brass plate and carefully
dispense 50ml of the natural essential oil into the bowl.
The porous chalk will begin to absorb the oil and slowly, over time release the scent into the surrounding room.
|
{
"pile_set_name": "Pile-CC"
}
|
On the back of AMD’s Tech Day at CES 2014, all of which was under NDA until the launch of Kaveri, AMD have supplied us with some information that we can talk about today. For those not following the AMD roadmap, Kaveri is the natural progression of the AMD A-Series APU line, from Llano, Trinity to Richland and now Kaveri. At the heart of the AMD APU design is the combination of CPU cores (‘Bulldozer’, ‘Steamroller’) and a large dollop of GPU cores for on-chip graphics prowess.
Kaveri is that next iteration in line which uses an updated FM2+ socket from Richland and the architecture is updated for Q1 2014. AMD are attacking with Kaveri on four fronts:
Redesigned Compute Cores* (Compute = CPU + GPU)
Kaveri uses an enhanced version of the Richland CPU core, codename Steamroller. As with every new CPU generation or architecture update, the main goal is better performance and lower power – preferably both. AMD is quoting a 20% better x86 IPC with Kaveri compared to Richland when put clock to clock. For the purposes of this information release, we were provided with several AMD benchmarking results to share:
These results border pretty much on the synthetic – AMD did not give any real world examples today but numbers will come through in time. AMD is set to release two CPUs on January 14th (date provided in our pre-release slide deck), namely the A10-7700K and the A10-7850K. Some of the specifications were also provided:
AMD APUs
Richland
A8-6600K
Richland
A10-6800K
Kaveri
A10-7700K
Kaveri
A10-7850K
Release
June 4 '13
June 4 '13
Jan 14th '14
Jan 14th '14
Frequency
3900 MHz
4100 MHz
?
3700 MHz
Turbo
4200 MHz
4400 MHz
?
?
DRAM
DDR3-1866
DDR3-2133
DDR3-2133
DDR3-2133
Microarhitecture
Piledriver
Piledriver
Steamroller
Steamroller
Manufacturing Process
32nm
32nm
?
?
Modules
2
2
?
2
Threads
4
4
?
4
Socket
FM2
FM2
FM2+
FM2+
L1 Cache
2 x 64 KB I$
4 x 16 KB D$
2 x 64 KB I$
4 x 16 KB D$
?
?
L2 Cache
2 x 2 MB
2 x 2 MB
?
?
Integrated GPU
HD 8570D
HD 8670D
R7
R7
IGP Cores
256
384
?
512
IGP Architecture
Cayman
Cayman
GCN
GCN
IGP Frequency
844
844
?
720
Power
100W
100W
?
95W
All the values marked ‘?’ have not been confirmed at this point, although it is interesting to see that the CPU MHz has decreased from Richland. A lot of the APU die goes to that integrated GPU, which as we can see above becomes fully GCN, rather than the Cayman derived Richland APUs. This comes with a core bump as well, seeing 512 GPU cores on the high end module – this equates to 8 CUs on die and what AMD calls ’12 Compute Cores’ overall. These GCN cores are primed and AMD Mantle ready, suggesting that performance gains could be had directly from Mantle enabled titles.
Described in AMD’s own words: ‘A compute core is an HSA-enabled hardware block that is programmable (CPU, GPU or other processing element), capable of running at least one process in its own context and virtual memory space, independently from other cores. A GPU Core is a GCN-based hardware block containing a dedicated scheduler that feeds four 16-wide SIMD vector processors, a scalar processor, local data registers and data share memory, a branch & message processor, 16 texture fetch or load/store units, four texture filter units, and a texture cache. A GPU Core can independently execute work-groups consisting of 64 work items in parallel.’ This suggests that if we were to run asynchronous kernels on the AMD APU, we could technically run twelve on the high end APU, given that each Compute Core is capable of running at least one process in its own context and virtual memory space independent of the others.
The reason why AMD calls them Compute Cores is based on their second of their four pronged attack: hUMA.
HSA, hUMA, and all that jazz
AMD went for the heterogeneous system architecture early on to exploit the fact that many compute intensive tasks can be offloaded to parts of the CPU that are designed to run them faster or at low power. By combining CPU and GPU on a single die, the system should be able to shift work around to complete the process quicker. When this was first envisaged, AMD had two issues: lack of software out in the public domain to take advantage (as is any new computing paradigm) and restrictive OS support. Now that Windows 8 is built to allow HSA to take advantage of this, all that leaves is the programming. However AMD have gone one step further with hUMA, and giving the system access to all the memory, all of the time, from any location:
Now that Kaveri offers a proper HSA stack, and can call upon 12 compute cores to do work, applications that are designed (or have code paths) to take advantage of this should emerge. One such example that AMD are willing to share today is stock calculation using LibreOffice's Calc application – calculating the BETA (return) of 21 fake stocks and plotting 100 points on a graph of each stock. With HSA acceleration on, the system performed the task in 0.12 seconds, compared to 0.99 seconds when turned off.
Prong 3: Gaming Technologies
In a year where new gaming technologies are at the forefront of design, along with gaming power, AMD are tackling the issue on one front with Kaveri. By giving it a GCN graphics backbone, features from the main GPU line can fully integrate (with HSA) into the APU. As we have seen in previous AMD releases and talks, this means several things:
Mantle
AMD TrueAudio
PCIe Gen 3
AMD is wanting to revolutionize the way that games are played and shown with Mantle – it is a small shame that the Mantle release was delayed and that AMD did not provide any numbers to share with us today. The results should find their way online after release however.
Prong 4: Power Optimisations
With Richland we had CPUs in the range of 65W to 100W, and using the architecture in the FX range produced CPUs up to 220W. Techincally we had 45W Richland APUs launch, but to date I have not seen one for sale. However this time around, AMD are focusing a slightly lower power segment – 45W to 95W. Chances are the top end APUs (A10-7850K) will be 95W, suggesting that we have a combination of a 20% IPC improvement, 400 MHz decrease but a 5% TDP decrease for the high end chip. Bundle in some HSA and let’s get this thing on the road.
Release Date
AMD have given us the release date for the APUs: January 14th will see the launch of the A10-7850K and the A10-7700K. Certain system builders should be offering pre-built systems based on these APUs from today as well.
The beta calculation speed seems way off - its just a simple OLS regression, which is basically instant on modern hardware. My guess is all of the speedup is in the graphing, rather than the beta calculation. Reply
Keep in mind that this is LibreOffice Calc, which is horrifically slow. So slow the developers will pretty much be the first people to tell you that it's too slow. As such I can totally believe that Calc really that slow right now.
The AMD/LibreOffice deal was announced back in July. It's basically a package deal that has AMD funding development of Calc so that they can finally refactor the code to improve its performance, while at the same time they'd also add OpenCL support for AMD. Consequently I'm far more interested in how the final, refactored version of Calc will stand up. If this is comparing old/slow Calc to OpenCL calc, then it's not a very useful comparison.Reply
I don't understand how AMD thinks this will work. The amount of dev time it would take to make your application offload to the iGPU is too large. Plus any workload that is performance starved realizes much larger benifit from a beefy CPU and/or beefy GPU, not gimped on both.Reply
I've been buying intel since the C2D hit the market, but I can still see where this processor would be handy. A emulation cab or a htpc come to mind. Or cases where price is the utmost concern. I don't see myself replacing intel in my two high end game rigs but there are use cases for these.Reply
Why? Intel still has the better single threaded performance and an i3 wins on multihreaded vs all the APUs and the iGPU is good enough for emulation. All your really doing by going APU on HTPC is wasting power.Reply
I have an old laptop that I use as a ghetto media center with xbmcbuntu, its got intel ironlake graphics. with a recent kernel (3.10 or newer I believe) I was able to get limited RGB over HDMI working :)Reply
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Mysql - 'Select max' from multiple joined tables doesn't return correct values
I have two tables - one is a list of addresses, and the other of attendance dates and EmployeeIDNumbers to identfy the engineer who attended. An engineer may have attended an address multiple times. I am trying to select the address name, and the most recent attendance date and corresponding engineerID
select s.sitename, max(sd.scheduleddate), sd.EngineerID
from sites as s
left join scheduled_dates as sd on sd.idsites = s.idsites
group by s.idsites
This code correctly pulls each address and the most recent 'Scheduled Date' but does not pull the correct corresponding engineer id. How do I get the engineerID from the same row as the max(scheduleddate)? Think this is something to do with the 'greatest-n-per-group' discussion, but I can't see how to implement that code with a query that already has a join
A:
You can use a NOT EXISTS condition with a correlated subquery:
select s.sitename, sd.EngineerID, sd.scheduleddate
from sites as s
inner join scheduled_dates as sd on sd.idsites = s.idsites
where not exists (
select 1
from scheduled_dates sd1
where sd1.idsites = s.idsites
and sd1.scheduleddate > sd.scheduleddate
)
The condition ensures that there no other record exists in scheduled_dates for the current site with a date greater than the one on the record being selected.
Notes: I turned you LEFT JOIN to an INNER JOIN, since I believe that it better fit your use cases, feel free to revert this if needed.
|
{
"pile_set_name": "StackExchange"
}
|
Activities Guide
Online Registration
Now you can register online for Basalt Recreation programs. You will be taken to a secure site to register using your credit card.
2019 Spring and Summer Activities
Spring After School Activities
Youth Flag Football
This class is for kids who love football and want some non-competitive practice and fun. Each practice will include physical fitness and stretching, skills practice in throwing, catching, punting and field goal kicking, and a 30-minute flag football scrimmage. If any Monday session is cancelled due to rain, it will be rescheduled for the Friday of that week. Register by 4/11
This class is designed for the young new soccer players or seasoned expert. We teach players how to properly dribble, pass, and SCORE with fun drills. There will be plenty of game time allowed as well. Please register by 5/13.
This course provides the new babysitter with the right tools to become a great babysitter who is asked back again and again. In this American Red Cross class will learn about leadership, basic care, safety, and first aid. Successful babysitters will receive a handbook, first aid kit, and a CD with great information, tools you can use for babysitting, and games. Classes are for babysitters 11-16 years old.
Golf
Jr. Golf at the Roaring Fork Club
The Roaring Fork Club would like to introduce the game of golf to children ages 8 to 13 years old. Bring your golf clubs and learn from the best! Class will be fully engaging and interactive using the latest techniques in coaching.
The Roaring Fork Club continues to offer their award winning Student Caddie Program for students of the Roaring Fork Valley. Caddies will have limited playing privileges, work in safe environment outdoors, and learn life skills in a professional atmosphere. Training dates begin in early May and are offered throughout the season. Mandatory caddie training meeting is on May 1 at 5pm at Roaring Fork Club. Please call the Caddie Master at 319-2807 for more information.
Roaring Fork Club Residency Card
If you are a resident of the town of Basalt and a registered voter in Basalt you can purchase a ten punch pass to play golf at the Roaring Fork Club. For more information on days & times to pick up your card please email golf@rfclub.com.
Summer Activities
Beading with D.D. Gerdin
D.D. shares her beading talent with these two classes. Bead a slinky snake or make a beaded wind chime to make beautiful music in the summer breeze. Children can be escorted over from Camp Chip a Tooth. Register you and your child for these fun, unique beading classes.
June 24, Monday - Beaded Snakes 9:30-10:30 Ages 5+
June 27, Thursday - Summer Wind Chimes-9:30-11 Ages 7+
Cost: $25 or register 2 or more for $22! Parents are welcome!
Where: BMS 6th grade pod
Fly Fishing with Taylor Creek Fly Shop
Taylor Creek Fly Shop invites your child to attend a 2-day fly fishing class to learn more about our Gold Medal waters here in the Roaring Fork Valley. Students will meet at Taylor Creek Fly Shop each day. Day one will consist of basic equipment setup, knots, and casting. Day two will be an on-the-water fishing day. Taylor Creek will provide all equipment, waders and rod and reels. Class size will be limited so sign up early. Bring a lunch and get ready to learn this exciting sport! Please register by 6/7
We will be working on serve, forehand/backhand and volley. We are getting away from just being baseline hard hitters. Sign up is limited to the first 12 players. Get ready for the summer junior tennis tournament season. Lots and lots of drill work.
Beginner Tennis Players after school ages 10-13
June 3-6 Monday-Thursday 3:30 pm-5:00 pm
We will be learning how to serve, hit our forehand/backhand and rules of tennis. Sign up is limited to the first 10 players. Lots of drill work followed by games. Cost: $55.00
We will be working on serve, forehand/backhand and volley. We are getting away from just being baseline hard hitters. Sign up is limited to the first 12 players. Lots and lots of drill work followed by chalk talk. Cost: $85.00
Open to all high school tennis players who want to play on their high school team. We will be covering strategy, speciality shots and net play. We are getting away from just being baseline hard hitters. Sign up is limited to the first 12 players. Get ready for the high school tennis season. Cost: $85.00
Sunday Family Tennis Evenings-Free (ages 12 and up)
Come and play tennis in the cool evening at the Basalt Courts. Bring a snack or drink to share. Tennis balls and racquets provided. No instruction, just competitive fun tennis.
June 16, 23
Private lessons: Adults $60.00 per hr, Juniors: $30.00 per hour
Tiny Tot and Youth Tennis
We will engage your child with fun games and drills in these fast paced tennis classes. Your child will learn proper stance, swing and control with hitting the ball. Take one session or take them all! We are all about making sure your child has fun while learning or perfecting their tennis skills.
(one team each week) May 20-24 or June 10-14 evening time 2.5 hours 5:30-7:00 $60 per player or $600 per team (11-12 players) This camp is designed for teams looking to take their game to the next level of tournament play. This camp focuses on directional control and positioning on court. This is for teams who are consistent when hitting medium paced shots, but want to learn when to hit these positional shots.
Learn strategies, shot making and formations. Teams will focus on doubles court position, taking control of the net with confidence, poaching and performing specialty shots. Singles will focus on ball placement and covering and recovering on the entire court.
USPTA PRO Diana CordovaElliott 927-4693
Basalt Longhorn Basketball Camp
This is a great opportunity for your child to get into the courts this summer to work on skills, learn new drills and compete against other basketball players. This camp is for both boys and girls and provides an opportunity for young basketball players to take new skills to their next season of basketball. Join Coach Katie Fitzgerald to step up your game to the next level.
Summer FUN Camps
All Summer FUN camps drop off and pick up is at Arbaney Park. Times are 9:00 AM - 3:00 PM Mon-Thur and 9:00 AM - 1:00 PM on Friday. Cost for all camps is $265 each student per weekly session. Maximum enrollment: 25 per session. Please provide lunch, snack, water, hat, sunglasses, sunscreen, rain jacket, bike, and helmet for your child. All classes are for children 6-11.
Dangerous Book For Boys and Girls - June 10-14
Get ready for a broad spectrum in this week-long adventure as we explore "all of the activities that every child should experience in their youth." Based on the popular books Dangerous Book for Boys, and Daring Book for Girls, new activities this year include Zorb soccer, pogo sticks, RC Cars, unicycling, juggling, and graffiti art, along with traditional activities including fire making, fort building, snapping fingers, blowing bubbles, setting up a tent, spontaneous dramas, Black Jack, yo-yos, story-telling, archery, slingshots, nature explorations, bug hunts, soccer, baseball, paper airplanes, rockets, Lego construction projects, and more. Similar to previous years' Dangerous Book programs, but with enough new additions to keep it lively for returning participants. Bring a bike and helmet each day, or lock them up at the park, for daily field trips around Basalt.
Games, Games, Games!! - June 17-21
For those kids who love to play, this is the week for you! New activities in this year's "Games" program include Zorb soccer and other Zorb games, pogo stick relays, blow-dart contests, popsicle stick bombs" (don't worry, they're harmless!) along with traditional sporting games, tag-games, card games, relay events, and slower paced strategy games. Two days of the week will include bicycling events including the BMX track near Basalt High School, a bike-tour scavenger hunt along the Rio Grande Trail, and other bicycling games. Each day will include a variety of strategic thinking, some very active, others slower and more thoughtful. Kids will sleep well each night of this week, guaranteed!
Youth Sports Camp - June 24-28
Participants will engage in traditional sports each morning including lacrosse, tennis, whiffle ball golf, soccer, flag football, basketball, baseball, and bicycling on the Basalt High School BMX track. All sports will be facilitated in an age-appropriate atmosphere focusing on fun, team work, sportsmanship, and healthy play. The Basalt Middle School and High School fields provide an excellent venue for football, tennis, basketball, track events, baseball, volleyball, and open fields for pure fun, while the Rio Grande Trail is perfect for bike touring and exploration! Afternoons will run at a slower pace with slower style games.
July 15-19; Games, Games, Games II
A similar theme as the first week, but with a host of new activities. This week will include scavenger hunts, garden exploration, and art-based games, while we bring back some of the best of week #1, as well. For those kids who love to play, this is the program for you! Learn and practice the basics of popular team sports including street hockey, flag football, baseball and soccer; enjoy some down time with card games, board games, word games and other brain teasers; run like mad with tag-games, dodge ball, and relay events; and build social skills through a variety of team building initiatives. We'll explore our river habitat through scavenger hunts, and check our speed and agility on the BMX track above Basalt High School. Each day will include a variety of strategic thinking, some very active, others slower and more thoughtful. Kids will sleep well each night of this week, guaranteed!
July 22-26: Dangerous Book for Boys and Girls II
A similar theme as the first week of the Dangerous camp, but the different venue lends towards a varied set of activity. Activities that every child should experience in their childhood this week include popsicle stick bombs, a bridge-building project, parachute design contests, rocket launches, paper airplanes, garden projects, stilt walking, blow-guns (with nerf bullets), human-sized bubbles,archery, fort-building, RC cars, bicycling the BMX track, building gnome homes, music making, Zorb soccer, and other traditional activities including fire making, Black Jack, yo-yos, slingshots,soccer, baseball, and more. Two days of the week will include bike tours and activities along the Rio Grande Trail.
I will invite kids to bring in mits, yo-yos, and show-and-tell items throughout the week, but none are mandatory.
Baseball & Softball
Register now for summer baseball and fastpitch softball. Registration deadline is April 26. Registration may close prior due to full teams.
Practices begin June 10. Teams are made up of 9-10, 11-12. Practices and games for 9-10 & 11-12 boys are at Crown Mountain Park and softball girls are at Crown Mountain Park. Practices are twice per week. Games are through the week and some Saturdays. No games on Sunday.
Who: Boys (9-10, 11-12) and Girls (8-10, 11-12); age as of 8/1/2019When: June 10 - mid July with tournaments in mid July (TBA)Cost: $85 includes hat & shirt ($100 after deadline date of April 26).
Registration deadline for all ball players is April 26. Registration may close prior due to full teams.Please register early to assure your place on a team!
Coach Pitch
Who: Boys and Girls 7 - 8 yrs old (age as of 8/1/2019)When: June 10 - mid July (Valley tournament TBA)Practice times to be determined bycoaches. Practice will take place in the late afternoons. Games are through the week and some Saturdays. Practices and Games will be held at BMS Field.
Cost: $75.00 includes hat and t-shirt ($100 after deadline date of 5/3). Late registrations are on a first come, first serve basis.
Registration deadline is May 6 for Coach Pitch.
Rockies Skill Challenge - FREE!
Demonstrate your base running, throwing, and batting skills. The top boy and girl in each age group (6-7, 8-9, 10-11, 12-13) willadvance to the regional competition. Ages 6 - 13 (determined as of Dec. 31, 2019). Please go to our website and download a registration to bring to the Skills Challenge.
Early registration for Summer Rec League Baseball and Softball isimportant to this program. We have a lot of work to do to assure asuccessful season for each team. It is important that each player gets ample playing time to gain maximum benefit from their season on the field. If we have to put too many players on a team it diminishes those benefits. Save money and register your child early. If you have any questions feel free to call the Rec. Dept. at 970-927-8214 x400. If you would like to coach a team you will get free registration. Call us!
Hiking Adventures with Basalt Recreation
Hiking adventures are about encouraging children to explore some of the beauty that makes us appreciate the amazing valley we live in. We join our local Wild Naturalist Instructor, Lara Getz, and guide, Austin Zedak, to learn about flora and fauna and how we can take care of our beautiful natural resources. The beautiful wildflowers will keep us entertained for the whole trip up. These hikes are relatively easy and beautiful!
Meet at Arbaney Park at 8 AM and we will return by 4:30Cost: $55Ages 8-15
Min/Max: 6/10
Be sure to pack a comfortable backpack preferable one with ahydration bladder. Be sure to pack a lunch and snacks for your child. Also lightweight rain jacket. Good sturdy shoes and hiking poles or one pole are beneficial . A change of socks is alsoencouraged. Make sure your child is properly covered in sunscreen.
Rock Climbing Adventures! NEW Itinerary-Check it out!
Take your summer fun to new heights and come climbing with us. Whether learning the basics or more advanced skills, you will enjoy the opportunity to climb in an indoor and outdoor setting. Class instruction will include climbing techniques, belay technique, knots, anchor placements, safety, and injury prevention. Class includes bouldering at the Monkey House in Carbondale and learning belaying and ropes at the climbing wall at BHS day one and outdoor climbing day with the experts at Aspen Expeditions on day two. Equipment is provided.
|
{
"pile_set_name": "Pile-CC"
}
|
A computerized national Blood Donor Deferral Register.
With blood given exclusively by volunteer donors, the American National Red Cross (ANRC) Blood Program aims to supply patients needing transfusion with blood products of the highest quality. The use of blood from volunteers, with its established greater safety, combined with laboratory testing to detect carriers of hepatitis B surface antigen (HB-SAg) and modern computer technology, creates an effective system to reduce the risk of post-transfusion hepatitis. The ANRC has devised a national Donor Deferral System, which is designed to minimize the transmission of hepatitis by blood and blood products.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Innovative approaches to the use of polyamines for DNA nanoparticle preparation for gene therapy.
Advances in genomic technologies, such as next generation sequencing and disease specific gene targeting through anti-sense, anti-gene, siRNA and microRNA approaches require the transport of nucleic acid drugs through the cell membrane. Membrane transport of DNA/RNA drugs is an inefficient process, and the mechanism(s) by which this process occurs is not clear. A pre-requisite for effective transport of DNA and RNA in cells is their condensation to nanoparticles of ~100 nm size. Although viral vectors are effective in gene therapy, the immune response elicited by viral proteins poses a major challenge. Multivalent cations, such as natural polyamines are excellent promoters of DNA/RNA condensation to nanoparticles. During the past 20 years, our laboratory has synthesized and tested several analogs of the natural polyamine, spermine, for their efficacy to provoke DNA condensation to nanoparticles. We determined the thermodynamics of polyamine-mediated DNA condensation, measured the structural specificity effects of polyamine analogs in facilitating the cellular uptake of oligonucleotides, and evaluated the gene silencing activity of DNA nanoparticles in breast cancer cells. Polyamine-complexed oligonucleotides showed a synergistic effect on target gene inhibition at the mRNA level compared to the use of polyamines and oligonucleotides as single agents. Ionic and structural specificity effects were evident in DNA condensation and cellular transportation effects of polyamines. In condensed DNA structures, correlation exists between the attractive and repulsive forces with structurally different polyamines and cobalt hexamine, indicating the existence of a common force in stabilizing the condensed structures. Future studies aimed at defining the mechanism(s) of DNA compaction and structural features of DNA nanoparticles might aid in the development of novel gene delivery vehicles.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Latest Stories
IRS Issues Final Regs on Disclosing Return Information to Whistleblowers
On
Monday, the IRS released final regulations regarding disclosure of
return information by the Treasury Department in connection with
written contracts among the IRS, whistleblowers and, if applicable,
their legal representatives (TD
9516).
The
new IRS Whistleblower Office may determine during the course of an
investigation that it needs the assistance of a whistleblower or the
whistleblower’s legal representative and may determine that it has
to disclose returns or return information in order for the
whistleblower to be able to render assistance. Such disclosures are
authorized for tax administration purposes by IRC § 6103(n).
The
final regulations issued in TD 9516 describe the circumstances under
which officers and employees of the Treasury Department may disclose
return information to whistleblowers and, if applicable, their legal
representatives, in connection with written contracts for services
relating to the detection of violations of the internal revenue laws
or related statutes.
The
regulations specify that disclosures “shall be made only to the
extent the IRS deems it necessary in connection with the reasonable
or proper performance of the contract.” However, the regulations
also say that “[d]isclosures may include, but are not limited to,
disclosures to accomplish properly any purpose or activity of the
nature described in section 6103(k)(6) and the regulations
thereunder.” Section 6103(k)(6) authorizes disclosures for
investigative purposes.
The
regulations forbid the whistleblower from further disclosing or
otherwise using the disclosed return information and subject them to
civil and criminal penalties. The regulations also require
whistleblowers to comply with any other safeguards the IRS may prescribe.
The
final regulations are effective upon their publication in the Federal Register.
The results of the 2016 presidential election are likely to have a big impact on federal tax policy in the coming years. Eddie Adkins, CPA, a partner in the Washington National Tax Office at Grant Thornton, discusses what parts of the ACA might survive the repeal of most of the law.
Even as the IRS reported on success in reducing tax return identity theft in the 2016 season, the Service also warned tax professionals about yet another email phishing scam. See how much you know about recent news with this short quiz.
|
{
"pile_set_name": "Pile-CC"
}
|
Isolation and biological activity of frankiamide.
An antibiotic produced by the symbiotic actinomycete Frankia strain AiPs1 was isolated from culture broth using optimized thin-layer chromatography and high-performance liquid chromatography (HPLC) methods. The novel compound that was isolated, dubbed frankiamide, displayed antimicrobial activity against all 14 Gram-positive bacterial strains and six pathogenic fungal strains tested. The pathogenic actinomycete Clavibacter michiganensis and the oomycete Phytophthora were especially susceptible. In addition to displaying antimicrobial activity, frankiamide also strongly inhibited 45Ca(2+) fluxes in clonal rat pituitary GH4C1 tumor cells and was comparable to a frequently used calcium antagonist, verapamil hydrochloride. The results of HPLC analysis, supported by both nuclear magnetic resonance and mass spectroscopy studies, showed that frankiamide has a high affinity for Na(+) ions.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Image caption Illegal logging has been blamed for a number of flooding incidents, notably in the Philippines
Illegal logging generates $10-15bn (£7.5-11bn) around the world, according to new analysis from the World Bank.
Its report, Justice for Forests, says that most illegal logging operations are run by organised crime, and much of the profit goes to corrupt officials.
Countries affected include Indonesia, Madagascar and several in West Africa.
The bank says that pursuing loggers through the criminal justice system has made a major impact in some nations, and urges others to do the same.
It also recommends that aid donors should fund programmes that strengthen the capacity of law enforcement and legal authorities to tackle the illegal timber trade.
"We need to fight organised crime in illegal logging the way we go after gangsters selling drugs or racketeering," said Jean Pesme, manager of the World Bank Financial Market Integrity team.
The analysts calculate that an area of forest the size of a soccer pitch is illegally logged every second.
Chainsaws of supply
The report picks out a number of ways in which illegal timber is managed in a similar way to other prohibited commodities such as drugs.
Image caption Brazil's deforestation rate has risen and fallen in recent years, as enforcement has changed
But currently, it says, "most forest crimes go undetected, unreported, or are ignored.
"All too often, investigations - in the rare event that they do take place - are amateurish and inconclusive, and the few cases taken to court tend to be of trivial significance, prosecuting people whose involvement in crime is due to poverty and exploitation."
This last comment highlights the very differing scales of illegal logging, which encompasses everything from mechanised teams to individual villagers taking wood for fuel.
However, it says, a number of countries including Indonesia and Papua New Guinea are getting tougher, and starting to bring prosecutions higher up the criminal food chain.
Western countries, consumers and businesses can also play a significant role in cleaning up forestry, the report says.
Three years ago the US amended the Lacey Act, and now companies operating in the US are obliged to prove that their wood comes from legal sources.
A number of businesses are being investigated under the amendment, notably the iconic Gibson guitar company.
The EU has introduced similar legislation, and a growing number of companies will only buy wood that is demonstrably legal and sustainably harvested.
In 2010, a report from the London-based Chatham House think-tank concluded that these and other measures had reduced illegal logging by about a quarter over the preceding eight years.
It urged Japan, as a major timber consumer, to introduce its own legislation; and as Chinese consumption grows, campaigners are increasingly turning their attention there.
Two years ago the Environmental Investigation Agency (EIA) discovered that beds made of illegally obtained Madagascan wood were selling for up to $1m in Beijing.
Follow Richardon Twitter
|
{
"pile_set_name": "OpenWebText2"
}
|
Portuguese:
Sentido da vida
A resposta não é 42, e você não precisa de sandálias ou uma barba para entender
Existem 4 coisas que tornam a vida significativa
Primeiramente
Ajudar os outros
A vida com menos sentido
Seria ter que ser rolar uma pedra por uma montanha repetidamente
Porque o que torna a vida significativa
É fazer algo útil para os outros
Nós frequentemente pensamos que a melhor coisa é ser servido
Mas isso não é nada perto da alegria de servir os outros
Consertando seus corações, ensinando-os a trigonometria, os botando para gofar
O sentido da vida.. É servir
É também fazer algo melhor do que normalmente somos
Somos todos um pouco bagunçados
Ansiosos, furiosos, esquecidos
Então existe sentido em criar algo superior
O conjunto de trens que é mais organizado que nós mesmos
O jardim que é mais bonito de um jeito que não somos sempre
O livro que diz o que normalmente não conseguimos
Descobrir como as coisas funcionam também é significativo
Gravidade, uma língua estrangeira, código de computador
E o melhor de tudo.. Quem somos nós, o que nos guia e onde devemos mirar
O último significado vem das conexões que fazemos com os outros
O oposto de conversa superficial
É quando você mostra as assustadoras partes vulneráveis partes de si mesmo
O melhor jeito de começar uma conversa significativa
Apenas pergunte.. Do que você realmente tem medo?
Vietnamese:
Không phải là 42 và bạn không cần dép và râu để hiểu được rằng có 4 điều làm cuộc trở nên ý nghĩa
Đầu tiên, giúp đỡ mọi người
Điều vô nghĩa nhất của cuộc sống là phải lăn một hòn đá lên núi nhiều lần
Bởi vì điều làm cuộc sống có ý nghĩa là làm những điều có ích cho người khác
Chúng ta thường nghĩ rằng điều tốt nhất là được phục vụ
Nhưng điều đó trở nên vô nghĩa khi ở cạnh niềm vui của việc được phục vụ người khác
Sửa chữa trái tim họ
Dạy họ toán lượng giác
Giúp họ ợ được
Ý nghĩa cuộc sống là phục vụ
Cũng thật ý nghĩa khi tạo ra điều gì đó tốt đẹp hơn bản thân chúng ta
Chúng ta đều một chút bừa bãi, lo âu, giận dữ, hay quên
vậy nên có sự ý nghĩa ở việc tạo ra điều gì đó vượt trội
Hệ thống tàu trật tự hơn chúng ta
Khu vườn luôn đẹp theo cách mà chúng ta không có được
Quyển sách nói lên những điều chúng ta không thể nói
Hiểu ra mọi thứ hoạt động cũng rất có ý nghĩa
Trọng lực, một ngoại ngữ, mã máy tính
và hơn tất cả, con người chúng ta
điều gì khiến chúng ta hành động
và điều gì chúng ta nên hướng đến
Cuối cùng, ý nghĩa cuộc sống đến từ sự kết nối với mọi người
Điều trái ngược với cuộc nói chuyện hời hợt là khi bạn nói ra những điều làm bạn tổn thương hay sợ cho người khác
Cách tốt nhất để bắt đầu một cuộc nói chuyện đầy ý nghĩa chỉ cần hỏi, "Điều gì làm bạn thật sự sợ hãi?"
German:
Es ist nicht 42 und du brauchst keine Sandalen und Bart um zu verstehen, dass es vier Dinge gibt, die das Leben bedeutungsvoll machen.
Erstens: anderen zu helfen.
Das bedeutungsloseste Leben wäre, immer wieder einen Felsbrocken den Berg hochrollen zu müssen.
Denn was das Leben bedeutsam macht, ist es, Dinge für andere zu tun.
Wir denken oft, dass es das Schönste ist, versorgt zu werden.
Aber das ist nichts gegen die Freude, andere zu versorgen.
Ihr Herz zu heilen.
Ihnen Trigonometrie beizubringen.
Ihnen beim Aufstoßen zu helfen.
Der Sinn des Lebens ist es, zu dienen.
Der Sinn liegt auch darin, etwas zu erschaffen, das besser ist als wir es normalerweise sind.
Wir sind alle etwas chaotisch, ängstlich, wütend, vergesslich;
daher ist es erfüllend, etwas besseres zu erschaffen.
Die Modelleisenbahn, die weniger chaotisch ist als wir selbst.
Der Garten, der auf eine Art schöner ist, als wir.
Das Buch, das sagt, was wir normalerweise nicht sagen können.
Herauszufinden, wie Dinge funktionieren ist auch bedeutungsvoll.
Schwerkraft, eine Fremdsprache, Computer Code
und am allerbesten, wer wir sind.
Was uns antreibt,
welche Ziele wir uns setzen sollten.
Zuletzt entsteht Bedeutung aus der Beziehung zu Anderen.
Das Gegenteil von oberflächlichem Geplauder ist, wenn du jemandem deine verletzliche, ängstliche Seite zeigst.
Die beste Art ein bedeutungsvolles Gespräch zu starten ist zu fragen, "Wovor hast du wirklich Angst?"
Italian:
Il senso della vita
Non è 42, e non hai bisogno di barba e sandali per capire che
quattro cose danno senso alla vita.
Primo: aiutare il prossimo.
Non c'è vita più insensata che far rotolare un masso tra le montagne all'infinito, senza uno scopo.
Perché ciò che dà senso alla vita è l'essere utili...per gli altri.
Spesso pensiamo che essere serviti e riveriti sia fantastico
in realtà non è niente in confronto alla gioia che si prova nel "servire" il prossimo:
curargli il cuore, insegnargli la trigonometria,
aiutarli a fare il ruttino.
Il senso della vita è "servire".
È anche creare qualcosa di meglio rispetto a ciò che siamo normalmente.
Siamo tutti un po' incasinati: ansiosi, furiosi, rammaricati.
Perciò ha senso creare qualcosa di "superiore",
come i treni - meglio organizzati di noi stessi,
un giardino - che è bello come noi (a volte) non siamo,
un libro - che dice ciò che noi normalmente non possiamo dire.
Anche scoprire come funzionano le cose dà senso alla vita:
la legge di gravità, una lingua straniera, programmare al PC
o ancora meglio: chi siamo, cosa ci rende motivati e a cosa dovremmo aspirare.
Infine il senso della vita viene dai rapporti con le altre persone:
l'opposto di far due chiacchere superficiali, è mostrare ad un'altra persona le tue parti più vulnerabili.
Il miglior modo per avere una conversazione profonda con qualcuno è chiedergli quali sono le sue peggiori paure.
Chinese:
現在不是西元42年的羅馬帝國,不需要穿著行軍靴或留著長鬍子,才能了解關於人生的四個意義
首先,幫助別人
最有意義的人生,是重複滾動山上的巨大石頭
因為幫助他人做些有用的事情,會帶來有意義的人生
我們經常認為接受幫助是最愉快的經驗
但其實提供幫助才是
治療心臟
教三角函数
幫助孩子打嗝
從軍也有意義
或是讓某些事物比平常的狀況更好
我們都有一點點混亂、焦慮、憤怒、健忘
讓事情改善是有意義的
火車比過去更有規律
花園比以往都更漂亮
書本上常常描述我們無法做到的事情
能找到合適自己的工作也很有意義
萬有引力、外語、電腦程式
當然最棒的是知道我是誰
動機是什麼
我們該有什麼目標
最後,意義也來自與他人的連結
相對於膚淺的對話,當你能對他人展現脆弱或疤痕
開啟一個有意義的對話,最好的方式是問:
「你真正害怕什麼?」
English:
It isn't 42 and you don't need sandals and beard to understand that there are 4 things that make life meaningful
Firstly, helping others
The most meaningless life would be to have to roll a boulder up a mountain repeatedly
Because what makes life meaningful is doing something useful for other people
We often think that the nicest thing is to be served
But that is nothing next to the joy of serving others
Fixing their heart
Teaching them trigonometry
Helping them to burp
The meaning of life is service
It's also to make something that's better than we normally are
We're all a bit of a mess, anxious, furious, forgetful
so there's meaning in creating something superior
The train set that's more organized than we are
The garden that's pretty in a way we aren't always
The book that says what we normally can't
Finding out our stuffs work is also meaningful
Gravity, a foreign language, computer code
and best of all, who we are
what drives us,
and what we should aim for
Lastly, meaning comes from connections with others
The opposite of superficial chat is when you show the vulnerable, scared parts of you to another person
The best way to kick-start a meaningful conversation just ask, "What are you really afraid of?"
Korean:
삶을 의미있게 하는 네가지를 이해하기 위해 42세가 되거나, 샌들과 턱수염이 필요하지는 않다.
첫째, 다른 사람들을 돕는다.
가장 무의미한 인생은 반복적으로 산에서 바위를 굴려야 할 것이다.
왜냐하면 인생을 의미하는 것은 다른 사람들에게 유용한 무언가를 하는 것이기 때문이다.
우리는 종종 가장 좋은 것이 제공되어야 한다고 생각한다.
그러나 그것은 다른 사람들을 섬기는 기쁨 옆에 있는 것이 아니다.
마음을 움직이는 것
그들에게 삼각 측량을 가르치다.
그들이 트림하는 것을 돕는다
인생의 의미는 봉사이다.
우리가 평소보다 더 잘하는 것을 만들어 내는 것이기도 합니다.
우리 모두는 약간 혼란스럽고, 짜증 나고, 분노하고, 잊어 버린다.
그래서 뭔가 우월한 걸 창조하려는 의미가 있어요
기차가 우리보다 훨씬 더 조직적이다.
우리가 항상 그렇지 않지만 정원은 어느정도 아름답다.
우리가 평소에 할 수 없는 것을 말하는 그 책
우리의 물건을 찾는 것 또한 의미 있는 일이다.
중력, 외국어, 컴퓨터 코드
그리고 무엇보다도 우리가 누군인지
무엇이 우리를 움직이게 하는가?
그리고 우리가 목표로 삼아야 할 것은
마지막으로, 의미는 다른 사람과의 관계에서 비롯된다.
피상적인 잡담의 반대는 당신이 연약하고 두려운 부분을 다른 사람에게 보여 줄 때이다.
의미 있는 대화를 시작할 수 있는 가장 좋은 방법은 "무엇을 두려워하는가?"라고 묻는 것입니다.
Spanish:
El significado de la vida
La respuesta no es 42, y no necesitas ser filósofo para saberlo.
Hay cuatro cosas que le dan sentido a la vida.
En primer lugar: Ayudar a los demás.
Una vida sin sentido sería tener que rodar una roca en una montaña repetidamente,
porque lo que le da sentido a la vida es hacer algo útil para los demás.
A menudo pensamos que lo mejor es ser servido,
pero eso no es nada comparado con la alegría de servir a otros:
curar enfermedades, enseñar trigonometría, ayudarlos a eructar.
El sentido de la vida es servir.
También es hacer algo mejor de lo que normalmente somos.
Todos somos un poco desordenados, inquietos, coléricos, olvidadizos,
por lo tanto tiene sentido crear algo superior:
el juego de trenes que es más organizado que nosotros,
el jardín que es bonito de formas que nosotros no,
el libro que dice lo que nosotros no podemos.
Conocer cómo funcionan las cosas también es significativo:
la gravedad, un nuevo idioma, programar computadoras.
Y lo mejor de todo: quiénes somos, qué nos alienta, y cuál es nuestra meta.
Finalmente, el sentido nace de nuestra conexión con los demás:
lo opuesto de una conversación superficial es cuando te muestras vulnerable ante otra persona.
La mejor manera de empezar una conversación significativa es preguntar: "¿Cuáles son tus temores?"
Arabic:
"معنى الحيَاة"
إنها ليست ٤٢ ولا تحتاج إلى صنادل ولحية لتفهم أن هناك أربعة أشياء تجعل الحياة ذات معنى.
أولها: مساعدة الآخرين.
إن أكثر شيء يجعل الحياة بلا معنى هو حمل صخرة إلى قمة جبل مرارًا وتكرارًا
لأن ما يجعل الحياة ذات معنى، هو فعلُ شيء مفيد للآخرين.
فنحن غالبًا ما نعتقد أن ألطف شيءِِ هو أن نكون مخدومين.
لكن لا يوجد شيءٌ يُقارن بمتعة وجمال خدمة الآخرين
كمعالجة قلوبهم.
وتعليمهم حساب المثلثات.
ومساعدتهم على التَجَشُّؤ.
إنّ المعنى الحقيقي للحياة هو الخدمة.
بالإضافة إلى ذلك فعل شيء أفضل مما نفعله عادةً.
فجميعنا خليطٌ من الفوضى والقلق والغضب والنسيان
لذا فهنالك معنى لصنع شيء أسمى.
إن لعبة القطار أكثر تنظيمًا منا.
ونحن لسنا دائمًا جميلين كجمال الحديقة.
وتقول الكتب ما لا نستطيع قوله.
واكتشاف كيفية سيرالأمور له معنىً كذلك:
الجاذبية ولغة أجنبية وشفرات الحاسوب
وأفضل من هذا كله، معرفة من نحن؟
وما الذي يدفعنا
وما الذي نطمح إليه؟
وأخيرًا يأتي معنى الحياة من التواصل مع الآخرين.
إن خلاف المحادثة السطحية هو حينما تظهر ضعفك وخوفك لشخص آخر.
والطريقة المثلى لبدء محاثة قيمة فقط طرح هذا السؤال
"ما الذي تخشاه حقًا؟"
Turkish:
Hayatın anlamı 42 değil ve hayatı anlamlı kılan 4 şeyi anlamak için sakala ve sandaletlere ihtiyacınız yok.
Birincisi, başkalarına yardım etmek
En anlamsız hayat bir dağın üzerinden koca bir kayayı tekrar tekrar yuvarlamaya çalışmak olurdu.
Çünkü hayatı asıl anlamlı yapan şey başkaları için yararlı bir şeyler yapmaktır
Genelde biz en iyi şeyin bize hizmet edilmesi olduğunu düşünürüz
Fakat bu başkalarına yardım etmenin verdiği zevkin yanında neredeyse hiç bir şey sayılmaz
Kalplerini iyileştirmek
Trigonometri öğretmek
Geğirmelerinde yardım etmek
Hayatın anlamı yardım etmek
Bu ayrıca normalde olduğumuzdan daha iyi bir şey yaratmamızı sağlar
Hepimiz dağınık bir haldeyiz, tedirginiz, sinirliyiz, unutkanız
bu yüzden kendimizden üstün bir şey yaratmakta farklı bir anlam var.
Kendimizden daha organize bir tren setini kurmak
Her zaman olamadığımız kadar hoş bir bahçeyi yapmak.
Normalde konuşamadıklarımızı konuşan bir kitabı yazmak
Birşeylerin nasıl çalıştığını bulmakta anlamlıdır.
Yerçekimi, yabancı bir dil, bilgisayar kodu
ve hepsinden önemli kim olduğumuz
bizi harekete geçiren şey
amaçlamamız gereken şey
Son olarak anlam başkaları ile kurduğumuz bağlardan gelir.
Yüzeysel bir sohbetin zıddı, başka bir insana kırılgan ve korkmuş yanlarımızı göstermektir.
Anlamlı bir sohbeti başlatmanın en iyi yolu sadece "Gerçekten en çok neden korkarsın?" diye sormaktır.
French:
Ce n'est pas 42 et vous n'avez pas besoin, de sandales et de barbe, pour comprendre qu'il y a 4 choses qui rend la vie significative
Tout d'abord, aider les autres
La vie, la plus vide de sens serait, de faire rouler un rocher en haut d'une montagne à plusieurs reprises
parce que ce qui rend la vie significative, c'est lorsque l'on fait quelque chose d'utile pour les autres
Nous pensons souvent que la chose la plus agréable c'est d'être servie,
mais ce n'est rien à côté de la joie de servir les autres
Réparer leur cœur
Leur enseigner la trigonométrie
Les aider pour roter
Le but de la vie, est le service
C'est aussi de faire quelque chose de mieux qu'à notre habitude.
Nous sommes tous un peu anxieux, furieux, distraits
alors, il a dans la création quelque chose de supérieur
Le train électrique est plus organisé que nous le sommes
Le jardin c'est joli, d'une façon que nous ne sommes pas toujours
Le livre qui dit ce que nous ne pouvons pas normalement faire
La découverte de notre travail est aussi significative
La gravité, une langue étrangère, code d'ordinateur
et le meilleur de tout, qui nous sommes
ce qui nous conduit
et ce que nous devrions viser
Finalement, la signification vient des connections avec les autres
le contraire de la conversation superficiel c'est quand vous montrez des parties vulnérable, qui vous font peur à une autre personne
La meilleur façon de commencer une conversation qui a du sens et juste de demander, "De quoi avez vous vraiment peur?"
Slovak:
Nie je nim číslo 42 a nepotrebujete sandále a bradu na to, aby ste pochopili, že životu dávajú zmysel 4 veci.
Po prvé pomoc druhým.
Najnezmyselnejší život by bol ten, v ktorom by ste museli opakovane tlačiť balvan hore kopcom.
Životu totiž dáva zmysel užitočná práca pre iných.
Často si myslíme, že najlepšie je, keď nás obsluhujú,
ale nič sa nevyrovná potešeniu z toho, keď obsluhujete iných,
liečite ich srdcia,
učíte ich trigonometriu,
pomáhate im grgnúť si.
Zmyslom života je služba.
Zmyslom je aj urobiť niečo, čo nás prevýši takých, akí bežne sme.
Všetci sme trochu popletení, bojazliví, zúriví, zábudliví,
preto má zmysel vytvoriť niečo dokonalejšie:
vlakovú súpravu, ktorá je usporiadanejšia než my,
záhradu, ktorej kráse sa nie vždy vyrovnáme,
knihu, ktorá vyjadrí to, čo my nedokážeme
Objaviť zákonitosti vecí má tiež zmysel,
gravitácia, cudzí jazyk, počítačový kód
a najmä, kto sme,
čo nás poháňa
a na čo by sme sa mali zamerať.
Napokon, zmysel dáva kontakt s ostatnými.
Opakom povrchného pokecu je to, keď inej osobe odhalíme zraniteľnú, ustráchanú časť seba.
Najlepší spôsob, ako odštartovať zmysluplnú konverzáciu je spýtať sa: "Čoho sa v skutočnosti bojíš?"
Italian:
Ed è questo, il senso della vita.
Turkish:
Evet, hayatın anlamı bu
French:
Alors c'est, la signification de la vie
Slovak:
To je teda zmysel života.
Korean:
그게 바로 삶의 의미입니다.
Chinese:
這就是人生的意義
Vietnamese:
Và đó là ý nghĩa của cuộc sống
English:
So that's the meaning of life
Portuguese:
Então esses são os sentidos da vida
German:
Das ist also der Sinn des Lebens.
Spanish:
Ese es el sentido de la vida.
SUSCRÍBETE
Arabic:
هذا هو معنى الحياة.
ترجمة فريق أُترجم autrjim@
|
{
"pile_set_name": "YoutubeSubtitles"
}
|
Journal of the American Musicological Society
The Journal of the American Musicological Society is a peer-reviewed academic journal and an official journal of the American Musicological Society. It is published by University of California Press and covers all aspects of musicology.
The Journal of the American Musicological Society has been published three times a year since 1948. It was preceded by the annual Bulletin of the American Musicological Society (1936–1947) and the annual Papers of the American Musicological Society (1936–1941). Online versions of the journal and its predecessors are available at JSTOR and the University of California Press.
External links
Category:Publications established in 1948
Category:Triannual journals
Category:English-language journals
Category:Music journals
Category:University of California Press academic journals
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Q:
replace List.foreach to LINQ
I'm new to LINQ and doing some experiments with it.
Sorry if it is a duplicate but I cant seem to find proper guide (for me) to it
I want to replace this code :
DataTable table
List<string> header = new List<string>();
table.Columns.Cast<DataColumn>().ToList().ForEach(col => header.Add(col.ColumnName));
with something LINQ like:
var LINQheader = from mycol in table.Columns select mycol.ColumnName;
LINQheader.tolist();
but it doesn't even compile.
what I want Is not a one line solution but would like some logic to understand how construct it with more complicated environments (Like choosing many node in XML with some logic)
A:
You can use Enumerable.Aggregate() for this:
var header = table.Columns.Cast<DataColumn>().Aggregate(new List<string>(), (list, col) => { list.Add(col.ColumnName); return list; });
In general, Linq allows for retrieval and transformation of sequences of data from data sources. What you want to do in this question is to iterate over a sequence and return an immediate result. That isn't the primary focus of Linq, but there are methods that perform tasks like this, including Aggregate(), Average(), Count(), Max() and so on.
A:
here is the original code
table.Columns.Cast<DataColumn>().ToList().ForEach(col => header.Add(col.ColumnName));
Why Cast used?
because it allows you to treat DataColumnCollection items as a DataColumn not an object.
Why ToList used?
becuase it converts your IEnumerable to List and allows you to call ForEach because this function is special method that exists in List class.
Why ForEach used?
because it allows you to do what you want for each element on the list (in your case it adds column name of each column to another list(header)).
Simplified version:
now assume you want to add column names to header where they starts with "Student"
you can write something like this
DataTable table = new DataTable();
List<string> header = new List<string>();
foreach (DataColumn col in table.Columns)
{
if (col.ColumnName.StartsWith("Id")) // you can remove this line if you want to add all of them
header.Add(col.ColumnName);
}
you can also use this
table.Columns.Cast<DataColumn>()
.ToList()
.ForEach(col =>
{
if (col.ColumnName.StartsWith("Id"))
header.Add(col.ColumnName)
});
or
var headers = table.Columns.Cast<DataColumn>()
.Where(col => col.ColumnName.StartsWith("Id"))
.Select(col => col.ColumnName);
header.AddRange(headers);
|
{
"pile_set_name": "StackExchange"
}
|
Bracted Bugleweed is a low herb covered with soft
hairs, with erect, ascending stems which arise from the rootstock,
branching usually diffusely from the base and measuring 10-20 cm in
length. Leaves are inverted-lanceshaped or spoon-shaped, 2.5-10 cm
long, and 1-3.5 cm wide. The lower ones are stalked, the upper ones
stalkless and sinuate-toothed or nearly entire. Sepal cup is hairy,
with ovate-lanceolate teeth. Flowers are pale blue or white and hairy;
the tube is rarely twice as long as the sepal cup, the upper lip is
erect and 2-fed; the side lobes or lower lobes are oblong, and the
midlobe is dilated and variable in length. Stamens protrude from the
upper lip. Nutlets are ellipsoid and very small. Bracted Bugleweed is
found in E. Afghanistan, Pakistan, Kashmir, Himalayas to Bhutan, Burma,
China, Malaysia. Flowering: March-December.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Looping stops after the first item in the list
places = []
persons = []
unknown = []
newlist = []
filename = 'file.html'
tree = etree.parse(filename)
input_file = open(filename, 'rU')
def extract(tree):
<some code>
return places
return persons
return unknown
def change_class():
extract(tree)
for line in input_file:
for x in places:
for z in unknown:
if x+'</dfn>' in line:
newline = line.replace('"person"', '"place"')
newlist.append(newline)
elif z+'</dfn>' in line:
newline = line.replace('"person"','"undefined"')
newlist.append(newline)
else:
newlist.append(line)
break
break
for x in newlist:
print x
I have an html-file of this kind with erroneous class values:
<html>
<head></head>
<body>
<p class ='person'><dfn>New-York</dfn>
<p class = 'place'><dfn>John Doe</dfn>
<p class ='person'><dfn>Paris</dfn>
<p class = 'place'><dfn>Jane Doe</dfn>
</body>
</html>
My script allows me to reprint the same file, but it replaces the class value only for the first item of both lists (places and unknown):
<html>
<head></head>
<body>
<p class ='place'><dfn>New-York</dfn>
<p class = 'unknown'><dfn>John Doe</dfn>
<p class ='person'><dfn>Paris</dfn>
<p class = 'place'><dfn>Jane Doe</dfn>
</body>
</html>
Then it kinda stops iterating over both lists and goes directly to the else-step and adds all the rest to the newlist without replacements. Python yelds no errors, list are successfully extracted with the extract() function as well, I checked...
A:
known_places = #list of known places
unkowns = #list of unknown places and persons
newlist = []
for line in input_file:
if any(place in line for place in Known_places):
line = line.replace("person", "place")
elif any(unkown in line for unkown in unkowns):
line = line.replace("person","undefined")
newlist.append(line)
Something like this might work.
|
{
"pile_set_name": "StackExchange"
}
|
---
abstract: 'Nowadays we are often faced with huge databases resulting from the rapid growth of data storage technologies. This is particularly true when dealing with music databases. In this context, it is essential to have techniques and tools able to discriminate properties from these massive sets. In this work, we report on a statistical analysis of more than ten thousand songs aiming to obtain a complexity hierarchy. Our approach is based on the estimation of the permutation entropy combined with an intensive complexity measure, building up the complexity-entropy causality plane. The results obtained indicate that this representation space is very promising to discriminate songs as well as to allow a relative quantitative comparison among songs. Additionally, we believe that the here-reported method may be applied in practical situations since it is simple, robust and has a fast numerical implementation.'
address:
- 'Departamento de Física and National Institute of Science and Technology for Complex Systems, Universidade Estadual de Maringá, Av. Colombo 5790, 87020-900, Maringá, PR, Brazil'
- 'Department of Chemical and Biological Engineering, Northwestern University, Evanston, IL 60208, USA'
- 'Centro de Investigaciones Ópticas (CONICET La Plata - CIC), C.C. 3, 1897 Gonnet, Argentina'
- 'Departamento de Ciencias Básicas, Facultad de Ingeniería, Universidad Nacional de La Plata (UNLP), 1900 La Plata, Argentina'
author:
- 'Haroldo V. Ribeiro'
- Luciano Zunino
- 'Renio S. Mendes'
- 'Ervin K. Lenzi'
title: 'Complexity-entropy causality plane: a useful approach for distinguishing songs'
---
permutation entropy ,music ,complexity measure ,time series analysis
Introduction
============
Nowadays we are experimenting a rapid development of technologies related to data storage. As an immediate consequence, we are often faced with huge databases hindering the access to information. Thus, it is necessary to have techniques and tools able to discriminate elements from these massive databases. Text categorization [@Sebastiani], scene classification [@Radke] and protein classification [@Enright] are just a few examples where this problem emerges. In a parallel direction, statistical physicists are increasingly interested in studying the so-called complex systems [@Auyang; @Jensen; @Barabasi; @Sornette; @Boccara]. These investigations employ established methods of statistical mechanics as well as recent developments of this field aiming to extract hidden patterns that are governing the system’s dynamics. In a similar way, this framework may help to advance in distinguishing elements within these databases, with the benefit of the simplicity often attributed to statistical physics methods.
A very interesting case corresponds to the music databases, not only because of the incredible amount of data (for instance, the iTunes Store has more than 14 million songs), but also due to the ubiquity of music in our society as well as its deeply connection with cognitive habits and historical developments [@DeNora]. In this direction, there are investigations focused on collective listening habits [@Lambiotte; @Lambiotte2; @Buldu], collaboration networks among artists [@Teitelbaum], music sales [@Lambiotte3], success of musicians [@Davies; @Borges; @Hu], among others. On the other hand, the sounds that compose the songs present several complex structures and emergent features which, in some cases, resemble very closely the patterns of out-of-equilibrium physics, such as scale-free statistics and universality. For instance, the seminal work of Voss and Clarke [@Voss] showed that the power spectrum associated to the loudness variations and pitch fluctuations of radio stations (including songs and human voice) is characterized by $1/f$ noise-like pattern in the low frequency domain ($f \leq 10 Hz$). Klimontovich and Boon [@Klimontovich] argue that this behavior for low-frequency follows from a natural flicker noise theory. However, this finding has been questioned by Nettheim [@Nettheim] and according to him the power spectrum may be better described by $1/f^2$. Fractal structures were also reported by Hsü and Hsü [@Hsu2; @Hsu] when studying classical pieces concerning frequency intervals. It was also found that the distribution of sound amplitudes may be adjusted by a one-parameter stretched Gaussian and that this non-Gaussian feature is related to correlation aspects present in the songs [@Mendes].
These features and others have attracted the attention of statistical physicists, who have attempted to obtain some quantifiers able to distinguish songs and genres. One of these efforts was made by Jennings et al. [@Jennings] who found that the Hurst exponent estimated from the volatility of the sound intensity depends on the music genre. Correa et al. [@Correa] investigated four music genres employing a complex network representation for rhythmic features of the songs. There are still other investigations [@Boon; @Bigerelle; @Diodati; @Gunduz; @Su2; @Scaringella; @Jafari; @Dagdug; @Su; @Rio; @Ro; @Serra; @Mostafa; @Boon2], most of which are based on fractal dimensions, entropies, power spectrum analysis or correlation analysis. It is worth noting that there are several methods of automatic genre classification emerging from engineering disciplines (see, for instance, Ref. [@Tzanetakis]). [In particular, there exists a very active community working on music classification problems and several important results are published at the ISMIR [@ISMIR] conferences (just to mention a few please see Refs. [@ISMIR1; @ISMIR2; @ISMIR3; @ISMIR4; @ISMIR5; @ISMIR6; @ISMIR7; @ISMIR8; @ISMIR9; @ISMIR10; @ISMIR11; @ISMIR12; @ISMIR13].)]{}
However, the music genre it not a well defined concept [@Scaringella], and, specially, the boundaries between genres still remain fuzzy. Thus, any taxonomy may be controversial, representing a challenging and open problem of pattern recognition. In addition, some of the proposed quantifiers require specific algorithms or recipes for processing the sound of the songs, which may depend on tuning parameters.
Here, we follow an Information Theory approach trying to quantify aspects of songs. More specifically, the Bandt and Pompe approach [@Bandt] is applied in order to obtain a complexity hierarchy for songs. This method defines a “natural” complexity measure for time series based on ordinal patterns. Although this concept has not been explored yet within the context of music, it has been successfully applied in other areas, such as medical [@Li; @Nicolaou], financial [@Zunino; @Zunino3] and climatological time series [@Saco; @Barreiro]. In this direction, our main goal is to fill this hiatus employing the Bandt and Pompe approach together with a non-trivial entropic measure [@LopezRuiz; @Martin; @Lamberti], constructing the so-called complexity-entropy causality plane [@Zunino; @Zunino3; @Rosso; @Zunino2]. As it will be discussed in detail below, we have found that this representation space is very promising to distinguish songs from huge databases. Moreover, thanks to the simple and fast implementation it is possible to conjecture its use in practical situations. In the following, we review some aspects related to the Bandt and Pompe approach as well as the complexity-entropy causality plane (Section 2). Next, we describe our database and the results (Section 3). Finally, we end this work with some concluding comments (Section 4).
Methods
=======
The essence of the permutation entropy proposed by Bandt and Pompe [@Bandt] is to associate a symbolic sequence to the time series under analysis. This is done by employing a suitable partition based on ordinal patterns obtained by comparing neighboring values of the original series. To be more specific, consider a given time series $\{x_t\}_{t=1,\dots,N}$ and the following partitions represented by a $d$-dimensional vector ($d>1, D \in \mathbb{N}$) $$(s)\mapsto (x_{s-(d-1)},x_{s-(d-2)},\dots,x_{s-1},x_{s})\;,$$ with $s=d,d+1,\dots,N$. For each one of these $(N-d+1)$ vectors, we investigate the permutations of $(0,1,\dots,d-1)$ defined by $x_{s-r_{d-1}}\leq x_{s-r_{d-2}}\leq \dots \leq x_{s-r_{1}} \leq x_{s-r_{0}}$, and, for all $d\, !$ possible permutations of $\pi$, we evaluate the probability distribution $P=\{p(\pi)\}$ given by $$p(\pi) = \frac{\#\{s|s\leq N-d+1;~ (s) ~\text{has type}~ \pi \}}{N-d+1}\;,$$ where the symbol $\#$ stands for the number (frequency) of occurrences of the permutation $\pi$. Thus, we define the normalized permutation entropy of order by $$H_s[P]=\frac{S[P]}{\log d\,!}\;,$$ with $S[P]$ being the standard Shannon’s entropy [@Shannon]. Naturally, $0 \leq H_s[P] \leq 1$, where the upper bound occurs for a completely random system, i.e., a system for which all $d\,!$ possible permutations are equiprobable. If the time series exhibits some kind of ordering dynamics $H_s[P]$ will be smaller than one. As pointed out by Bandt and Pompe [@Bandt], the advantages in using this method lie on its simplicity, robustness and very fast computational evaluation. Clearly, the parameter $d$ (known as embedding dimension) plays an important role in the estimation of the permutation probability distribution $P$, since it determines the number of accessible states. In fact, the choice of $d$ depends on the length $N$ of the time series in such a way that the condition $d\,!\ll N$ must be satisfied in order to obtain a reliable statistics. For practical purposes, Bandt and Pompe recommend $d=3,\dots,7$. Here, we have fixed $d=5$ because the time series under analysis are large enough (they have more than one million of data values). [We have verified that the results are robust concerning the choice of the embedding dimension $d$.]{}
Advancing with this brief revision, we now introduce another statistical complexity measure able to quantify the degree of physical structure present in a time series [@LopezRuiz; @Martin; @Lamberti]. Given a probability distribution $P$, this quantifier is defined by the product of the normalized entropy $H_s$, and a suitable metric distance between $P$ and the uniform distribution $P_e=\{1/d\,!\}$. Mathematically, we may write $$C_{js}[P]=Q_j[P,P_e]\,H_s[P]\,,$$ where $$Q_j[P,P_e] = \frac{S[(P+P_e)/2] - S[P]/2 - S[P_e]/2}{Q_{\text{max}}}\,$$ and $Q_{\text{max}}$ is the maximum possible value of $Q_j[P,P_e]$, obtained when one of the components of $P$ is equal to one and all the others vanish, i.e., $$Q_{\text{max}}=-\frac{1}{2}\left[ \frac{d\,!+1}{d\,!} \log(d\,!+1) - 2 \log(2 d\,!) + \log(d\,!) \right]\,.$$ The quantity $Q_j$, usually known as disequilibrium, will be different from zero if there are more likely states among the accessible ones. It is worth noting that the complexity measure $C_{js}$ is not a trivial function of the entropy [@LopezRuiz] because it depends on two different probability distributions, the one associated to the system under analysis, $P$, and the uniform distribution, $P_e$. It quantifies the existence of correlational structures, providing important additional information that may not be carried only by the permutation entropy. Furthermore, it was shown that for a given $H_s$ value, there exists a range of possible $C_{js}$ values [@Martin2]. Motivated by the previous discussion, Rosso et al. [@Rosso] proposed to employ a diagram of $C_{js}$ versus $H_s$ for distinguishing between stochasticity and chaoticity. This representation space, called complexity-entropy causality plane [@Rosso; @Zunino; @Zunino3], herein will be our approach for distinguishing songs.
[The concept of ordinal patterns can be straightforward generalized for non-consecutive samples, introducing a lag of $\tau$ (usually known as embedding delay) sampling times. With $\tau=1$ the consecutive case is recovered, and the analysis focuses on the highest frequency contained within the time series. It is clear that different time scales are taken into account by changing the embedding delays of the symbolic reconstruction. The importance of selecting an appropriate embedding delay in the estimation of the permutation quantifiers has been recently confirmed for different purposes, like identifying intrinsic time scales of delayed systems [@zunino2010; @soriano2011], quantifying the degree of unpredictability of the high-dimensional chaotic fluctuations of a semiconductor laser subject to optical feedback [@zunino2011], and classifying cardiac biosignals [@parlitz2011]. We have found that an embedding delay $\tau=1$ is the optimal one for our music categorization goal since when this parameter is increased the permutation entropy increases and the permutation statistical complexity decreases. Thus, the range of variation of both quantifiers is smaller and, consequently, it is more difficult to distinguish songs and genres.]{}
Data Presentation and Results
=============================
It is clear that a music piece can be naturally considered as the time evolution of an acoustic signal and time irreversibility is inherent to musical expression [@Boon; @Boon2]. From the physical point of view, the songs may be considered as pressure fluctuations traveling through the air. These waves are perceived by the auditory system leading the sense of hearing. In the case of recordings, these fluctuations are converted into a voltage signal by a record system and then stored, for instance, in a compact disc (CD). The perception of sound is usually limited to a certain range of frequencies - for human beings the full audible range is approximately between 20 Hz and 20 kHz. Because of this limitation the record systems often employ a sampling rate of 44.1 kHz encompassing all the previous spectrum. All the songs analyzed here have this sampling rate.
Our database consists of 10124 songs distributed into ten different music genres, they are: blues (1020), classical (997), flamenco (679), hiphop (1000), jazz (700), metal (1638), Brazilian popular music - mpb (580), pop (1000), tango (1016) and techno (1494). The songs were chosen aiming to cover a large number of composers and singers. To achieve this [and also to determine the music genre via an external judgment]{}, we tried to select CDs that are compilations of a given genre or from representative musical groups [of a given genre]{}.
![A graphical representation of 4 songs from 4 different genres. In the left panel we show the amplitude series and in the right panel the intensity series. The music genres are blues, classic, metal and techno, respectively.[]{data-label="fig:sample"}](fig1.pdf)
By using the previous database, we focus our analysis on two times series directly obtained from the digitized files that represent each song - the sound amplitude series and the sound intensity series, i.e., the square of the amplitude. Figure \[fig:sample\] shows these two time series for several songs. We evaluate the normalized entropy $H_s$ and the statistical complexity measure $C_{js}$ for the amplitude and intensity series associated to each song as shown in Figs. \[fig:plane\]a and \[fig:plane\]b. Notice that both series, amplitude and intensity, lead to similar behavior, contrarily to what happens with other quantifiers. For instance, when dealing with Hurst exponent is preferable to work with the intensities [@Mendes] or volatilities [@Jennings], since the amplitudes are intrinsically anti-correlated due the oscillatory nature of the sound. Moreover, we have found that there is a large range of $H_s$ and $C_{js}$ possible values. This wide variation allows a relative comparison among songs and someone may ask to listen songs that are limited within some interval of $H_s$ and/or $C_{js}$ values. We also evaluate the mean values of $C_{js}$ and $H_s$ over all songs grouped by genre as shown by Figs. \[fig:plane\]c and \[fig:plane\]d. These mean values enable us to quantify the complexity of each music genre. In particular, we can observe that high art music genres (e.g. classic, jazz and tango) are located in the central part of the complexity plane, being equally distant from the fully aleatory limit ($H_s\to1$ and $C_{js}\to0$) and also from the completely regular case ($H_s\to0$ and $C_{js}\to0$). On the other hand, light/dance music genres (e.g. pop and techno) are located closer to the fully aleatory limit (white noise). In this context, our approach agrees with other works [@Mendes; @Jennings; @Diodati].
![(color online) Complexity-entropy causality plane, i.e., $C_{js}$ versus $H_s$ for all the songs when considering the (a) amplitude series and (b) the intensity series. In (c) and (d), we show the mean value of $C_{js}$ and $H_s$ for each genre. The upper (bottom) dashed line represents the maximum (minimum) value of $C_{js}$ as a function of $H_s$ for $d=5$ and the different symbols refer to the 10 different genres. For a better visualization of the different genres see also Figs. \[fig:ampgenre\] and \[fig:intgenre\].[]{data-label="fig:plane"}](fig2.pdf)
![Complexity-entropy causality plane for the amplitude series by music genres when considering the original and shuffled series. The upper (bottom) dashed line represents the maximum (minimum) value of $C_{js}$ as a function of $H_s$ for $d=5$ [and the arrows are indicating the shuffled analysis]{}.[]{data-label="fig:ampgenre"}](fig3.pdf)
![Complexity-entropy causality plane for the intensity series by music genres when considering the original and shuffled series. The upper (bottom) dashed line represents the maximum (minimum) value of $C_{js}$ as a function of $H_s$ for $d=5$ [and the arrows are indicating the shuffled analysis]{}.[]{data-label="fig:intgenre"}](fig4.pdf)
Therefore, we have verified that the ordinal pattern distribution that exists among the sound amplitudes values and also among the sound intensity is capable to spread out our database songs though the complexity-entropy causality plane. It is interesting to remark that the embedding dimension employed here ($d=5$) corresponds to approximately $10^{-4}$ seconds. Thus, it is surprising how this very short time dynamics retains so much information about the songs. We also investigated shuffled version of each song series aiming to verify if the localization of the songs in the complexity-entropy causality plane is directly related to the presence of correlations in the music time series. This analysis is shown in Figs. \[fig:ampgenre\] and \[fig:intgenre\] for each song and for all genres. We have obtained $H_s\approx 1$ and $C_{js}\approx 0$ for all shuffled series, confirming that correlations inherently present in the original songs are the main source for the different locations in this plane.
Although our approach is not focused on determining which music genre is related to a particular given song, this novel physical method may help to understand the complex situation that emerges in the problem of automatic genre classification. For instance, we can take a glance on the fuzzy boundaries existent in the music genre definitions, by evaluating the distribution of $H_s$ and $C_{js}$ values. Figure \[fig:pdfs\] shows these distributions for both time series employed here. There are several overlapping regions among the distributions of $H_s$ and $C_{js}$ for the different genres. This overlapping is an illustration on how fuzzy the boundaries between genres and, consequently, the own concept of music genre can be. It is also interesting to observe that some genres have more localized PDFs, for instance, the techno genre is practically bounded to the interval $(0.85,0.95)$ of $H_s$ values for the intensity series while the flamenco or mpb genres have a wider distribution. [To go beyond the previous analysis, we try to quantify the efficiency of permutation indexes $H_s$ and $C_{js}$ in a practical scenery of automatic genre classification. In order to do this, we use an implementation [@SVM1] of a support vector machine (SVM) [@SVM2] where we have considered the values of $H_s$ and $C_{js}$ for the amplitudes and intensity series as features of the SVM. We run the analysis for each genre training the SVM with 90$\%$ of dataset and performing an automatic detection over the remaining 10$\%$. It is a simplified version of the SVM, where the system have to make a binary choice, i.e., to choose between a given genre and all the others. The accuracy rates of automatic detection are shown in Table \[tab:SVM\]. Note that the accuracy values are around 90$\%$ within this simplified implementation, however we have to remark that in a multiple choice system these values should be much smaller. On the other hand, this analysis indicates that the entropic indexes employed here may be used in practical situations. ]{}
[lrclr]{} Genre & Accuracy & & Genre & Accuracy\
Blues & 87.87$\%$ & & Metal & 89.89$\%$\
Classic & 92.03$\%$ & & MPB & 97.15$\%$\
Flamenco & 95.12$\%$ & & Pop & 88.11$\%$\
Hiphop & 88.11$\%$ & & Tango & 87.87$\%$\
Jazz & 91.68$\%$ & & Techno & 87.14$\%$\
![(color online) Probability distribution functions (PDF) for the values of (a) $H_s$ and (b) $C_{js}$ when considering the amplitude series grouped by music genre. Figs. (c) and (d) show the same PDFs for the intensity series.[]{data-label="fig:pdfs"}](fig5.pdf)
Summary and Conclusions
=======================
Summing up, in this work we applied the permutation entropy [@Bandt], $H_s$, and an intensive statistical complexity measure [@LopezRuiz; @Martin; @Lamberti], $C_{js}$, to differentiate songs. Specifically, we analyzed the location of the songs in the complexity-entropy causality plane. This permutation information theory approach enabled us to quantitatively classify songs in a kind of complexity hierarchy.
We believe that the findings presented here may be applied in practical situations as well as in technological applications related to the distinction of songs in massive databases. In this aspect, the Bandt and Pompe approach has some advantageous technical features, such as its simplicity, robustness, and principally a very fast numerical evaluation.
Acknowledgements {#acknowledgements .unnumbered}
================
[The authors would like to thank an anonymous reviewer for his very helpful comments. Dr. Osvaldo A. Rosso is also acknowledged for useful discussions and valuable comments.]{} HVR, RSM and EKL are grateful to CNPq and CAPES (Brazilian agencies) for the financial support. HVR also thanks Angel A. Tateishi for the help with the music database and CAPES for financial support under the process No 5678-11-0. LZ was supported by Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET), Argentina.
[99]{} F. Sebastiani, Acm. Comput. Surv. **34** (2002) 1. R. J. Radke, S. Andra, O. Al-Kofahi, B. Roysam, IEEE T. Image Process **14** (2005) 294. A. J. Enright, S. Van Dongen, C. A. Ouzounis, Nucleic. Acids Res. **30** (2002) 1575. S. Y. Auyang, *Foundations of complex-systems* (Cambridge University Press, Cambridge, 1998). H. J. Jensen, *Self-organized criticality* (Cambridge University Press, Cambridge, 1998). R. Albert, A.-L. Barabási, Rev. Mod. Phys. **74** (2002) 47. D. Sornette, *Critical phenomena in natural sciences* (Springer-Verlag, Berlin, 2006). N. Boccara, *Modeling complex systems* (Springer-Verlag, Berlin, 2010). T. DeNora, *The music of everyday life* (Cambridge University Press, Cambridge, 2000). R. Lambiotte, M. Ausloos, Phys. Rev. E **72** (2005) 066107. R. Lambiotte, M. Ausloos, Eur. Phys. J. B **50** (2006) 183. J. M. Buldú, P. Cano, M. Koppenberger, J. A. Almendral, S. Boccaletti, New J. Phys. **9** (2007) 172. T. Teitelbaum, P. Balenzuela, P. Cano, J. M. Buldú, Chaos **18** (2008) 043105. R. Lambiotte, M. Ausloos, Physica A **362** (2006) 485. J. A. Davies, Eur. Phys. J. B **27** (2002) 445. E. P. Borges, Eur. Phys. J. B **30** (2002) 593. H.-B. Hu, D.-Y. Han, Physica A **387** (2008) 5916. R. F. Voss, J. Clarke, Nature **258** (1975) 317. Y. Klimontovich, J. P. Boon, Europhys. Lett. **3** (1987) 395. N. Nettheim, Journal of New Music Research **21** (1992) 135. K. J. Hsü, A. Hsü, Proc. Natl. Acad. Sci. USA **87** (1990) 938. K. J. Hsü, A. Hsü, Proc. Natl. Acad. Sci. USA **88** (1991) 3507. R. S. Mendes, H. V. Ribeiro, F. C. M. Freire, A. A. Tateishi, E. K. Lenzi, Phys. Rev. E **83** (2011) 017101. H. D. Jennings, P. Ch. Ivanov, A. M. Martins, P. C. da Silva, G. M. Viswanathan, Physica A **336** (2004) 585. D. C. Correa, J. H. Saito, L. F. Costa, New J. Phys. **12** (2010) 053030. J. P. Boon, O. Decroly, Chaos **5** (1995) 501. M. Bigerelle, A. Iost, Chaos Solitons Fractals **11** (2000) 2179. P. Diodati, S. Piazza, Eur. Phys. J. B **17** (2000) 143. G. Gündüz, U. Gündüs, Physica A **357** (2005) 565. Z.-Y. Su, T Wu, Physica D **221** (2006) 188. N. Scaringella, G. Zoia, D. Mlynek, IEEE Signal Process. Mag. **23** (2006) 133. G. R. Jafari, P. Pedram, L. Hedayatifar, J. Stat. Mech. (2007) P04012. L. Dagdug, J. Alvarez-Ramirez, C. Lopez, R. Moreno, E. Hernandez-Lemus, Physica A **383** (2007) 570. Z.-Y. Su, T Wu, Physica A **380** (2007) 418. M. Beltrán del Río, G. Cocho, G. G. Naumis, Physica A **387** (2008) 5552. W. Ro, Y. Kwon, Chaos Solitons Fractals **42** (2009) 2305. J. Serrà, X. Serra, R. G. Andrzejak, New J. Phys. **11** (2009) 093017. M. M. Mostafa, N. Billor, Expert Syst. Appl. **36** (2009) 11378. J. P. Boon, Adv. Complex. Syst. **13** (2010) 155. G. Tzanetakis, P. Cook, IEEE Trans. Speech Audio Process. **20** (2002) 293. ISMIR - The International Society for Music Information Retrieval (http://www.ismir.net). T. Lidy, A. Rauber, In Proc. ISMIR, 2005. A. S. Lampropoulos, P. S. Lampropoulou, G. A. Tsihrintzis, In Proc. ISMIR, 2005. A. Meng, J. Shawe-Taylor, In Proc. ISMIR, 2005. E. Pampalk, A. Flexer, G. Widmer, In Proc. ISMIR, 2005. J. Reed, C.-H. Lee, In Proc. ISMIR, 2006. C. McKay, I. Fujinaga, In Proc. ISMIR, 2006. M. Dehghani, A. M. Lovett, In Proc. ISMIR, 2006. T. Lidy, A. Rauber, A. Pertusa, J. M. Iñesta, In Proc. ISMIR, 2007. A. J. D. Craft, G. A. Wiggins, T. Crawford, In Proc. ISMIR, 2007. I. Panagakis, E. Benetos, C. Kotropoulos, In Proc. ISMIR, 2008. R. Mayer, R. Neumayer, A. Rauber, In Proc. ISMIR, 2008. R. Mayer, R. Neumayer, A. Rauber, In Proc. ISMIR, 2008. S. Doraisamy, S. Golzari, N. M. Norowi, Md. N. B. Sulaiman, N. I. Udzir, In Proc. ISMIR, 2008. C. Bandt, B. Pompe, Phys. Rev. Lett. **88** (2002) 174102. X. Li, G. Ouyang, D. A. Richards, Epilepsy Research **77** (2007) 70. N. Nicolaou, J. Georgiou, Clin. EEG Neurosci. **42** (2011) 24. L. Zunino, M. Zanin, B. M. Tabak, D. G. Pérez, O. A. Rosso, Physica A **389** (2010) 1891. L. Zunino, B. M. Tabak, F. Serinaldi, M. Zanin, D. G. Pérez, O. A. Rosso, Physica A **390** (2011) 876. P. M. Saco, L. C. Carpi, A. Figliola, E. Serrano, O. A. Rosso, Physica A **389** (2010) 5022. M. Barreiro, A. C. Marti, C. Masoller, Chaos **21** (2011) 013101. R. López-Ruiz, H. L. Mancini, X. Calbet, Phys. Lett. A **209** (1995) 321. M. T. Martin, A. Plastino, O. A. Rosso, Phys. Lett. A **311** (2003) 126. P. W. Lamberti, M. T. Martin, A. Plastino, O. A. Rosso, Physica A **334** (2004) 119. O. A. Rosso, H. A. Larrondo, M. T. Martin, A. Plastino, M. A. Fuentes, Phys. Rev. Lett. **99** (2007) 154102. O. A. Rosso, L. Zunino, D. G. Pérez, A. Figliola, H. A. Larrondo, M. Garavaglia, M. T. Martín, A. Plastino Phys. Rev. E **76** (2007) 061114. C. E. Shannon, Bell. Syst. Tech. J. **27** (1948) 623. M. T. Martin, A. Plastino, O. A. Rosso, Physica A **369** (2006) 439. L. Zunino, M. C. Soriano, I. Fischer, O. A. Rosso, C. R. Mirasso, Phys. Rev. E **82** (2010) 046212. M. C. Soriano, L. Zunino, O. A. Rosso, I. Fischer, C. R. Mirasso, IEEE J. Quantum Electron. **47** (2011) 252. L. Zunino, O. A. Rosso, M. C. Soriano, IEEE J. Sel. Top. Quantum Electron. **17** (2011) 1250. U. Parlitz, S. Berg, S. Luther, A. Schirdewan, J. Kurths, N. Wessel, Comput. Biol. Med. (2011), doi:10.1016/j.compbiomed.2011.03.017 (in press). T. Joachims, http://svmlight.joachims.org (accessed in November 2011). V. N. Vapnik, *The Nature of Statistical Learning Theory*. (Springer, New York, 1995).
|
{
"pile_set_name": "ArXiv"
}
|
131 F.3d 144
NOTICE: Eighth Circuit Rule 28A(k) governs citation of unpublished opinions and provides that they are not precedent and generally should not be cited unless relevant to establishing the doctrines of res judicata, collateral estoppel, the law of the case, or if the opinion has persuasive value on a material issue and no published opinion would serve as well.UNITED STATES of America, Appellee,v.Bakari Lu ADISA, Appellant.UNITED STATES of America, Appellee,v.Izih LENARD, Jr., Appellant.
Nos. 97-2580EA, 97-2649EA.
United States Court of Appeals, Eighth Circuit.
Submitted: Nov. 18, 1997Filed: Nov. 26, 1997
Before FAGG, WOLLMAN, and HANSEN, Circuit Judges.
PER CURIAM.
1
Bakari Liu Adisa and Izih Lenard, Jr. appeal their convictions and sentences for bank robbery and related weapons charges. Having reviewed the record and the parties' briefs, we conclude that an extensive discussion is not warranted. First, the district court properly classified Adisa's conviction for a racketeering conspiracy predicated on an underlying series of four armed robberies and a hired shooting as a serious violent felony for sentencing purposes under 18 U.S.C. § 3559(c) (1994). Second, the district court did not abuse its discretion in denying Adisa's request for a court-appointed psychiatric expert. Third, Lenard's assertions that a felony conviction expunged under Arkansas state law could not be used as the predicate for Lenard's conviction as a felon in possession of a weapon, that the government failed to produce sufficient evidence to support the jury's verdicts, and the district court improperly enhanced his sentence for reckless endangerment and for obstruction of justice either are unsupported by the record, otherwise without legal merit, or both. Having rejected Adisa's and Lenard's contentions, we affirm their convictions and sentences. See 8th Cir. R. 47B.
2
A true copy.
Attest:
3
CLERK, U.S. COURT OF APPEALS, EIGHTH CIRCUIT.
|
{
"pile_set_name": "FreeLaw"
}
|
#!/usr/bin/env python
# vim:ts=4:sts=4:sw=4:et
#
# Author: Hari Sekhon
# Date: 2016-01-15 00:07:09 +0000 (Fri, 15 Jan 2016)
#
# https://github.com/harisekhon/devops-python-tools
#
# License: see accompanying Hari Sekhon LICENSE file
#
# If you're using my code you're welcome to connect with me on LinkedIn and optionally send me feedback
# to help improve or steer this or other code I publish
#
# http://www.linkedin.com/in/harisekhon
#
"""
Tool to convert XML to JSON
Reads any given files as XML and prints the equivalent JSON to stdout for piping or redirecting to a file.
Directories if given are detected and recursed, processing all files in the directory tree ending in a .xml suffix.
Works like a standard unix filter program - if no files are passed as arguments or '-' is passed then reads from
standard input.
"""
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
#from __future__ import unicode_literals
import json
import os
import re
import sys
import xml
import xmltodict
libdir = os.path.abspath(os.path.join(os.path.dirname(__file__), 'pylib'))
sys.path.append(libdir)
try:
# pylint: disable=wrong-import-position
from harisekhon.utils import die, ERRORS, log, log_option
from harisekhon import CLI
except ImportError as _:
print('module import failed: %s' % _, file=sys.stderr)
print("Did you remember to build the project by running 'make'?", file=sys.stderr)
print("Alternatively perhaps you tried to copy this program out without it's adjacent libraries?", file=sys.stderr)
sys.exit(4)
__author__ = 'Hari Sekhon'
__version__ = '0.2.0'
class XmlToJson(CLI):
def __init__(self):
# Python 2.x
super(XmlToJson, self).__init__()
# Python 3.x
# super().__init__()
self.indent = None
self.re_xml_suffix = re.compile(r'.*\.xml$', re.I)
def add_options(self):
self.add_opt('-p', '--pretty', action='store_true', help='Pretty Print the resulting JSON')
def xml_to_json(self, content, filepath=None):
try:
_ = xmltodict.parse(content)
except xml.parsers.expat.ExpatError as _:
file_detail = ''
if filepath is not None:
file_detail = ' in file \'{0}\''.format(filepath)
die("Failed to parse XML{0}: {1}".format(file_detail, _))
json_string = json.dumps(_, sort_keys=True, indent=self.indent) #, separators=(',', ': '))
return json_string
def run(self):
if self.get_opt('pretty'):
log_option('pretty', True)
self.indent = 4
if not self.args:
self.args.append('-')
for arg in self.args:
if arg == '-':
continue
if not os.path.exists(arg):
print("'%s' not found" % arg)
sys.exit(ERRORS['WARNING'])
if os.path.isfile(arg):
log_option('file', arg)
elif os.path.isdir(arg):
log_option('directory', arg)
else:
die("path '%s' could not be determined as either a file or directory" % arg)
for arg in self.args:
self.process_path(arg)
def process_path(self, path):
if path == '-' or os.path.isfile(path):
self.process_file(path)
elif os.path.isdir(path):
for root, _, files in os.walk(path):
for filename in files:
filepath = os.path.join(root, filename)
if self.re_xml_suffix.match(filepath):
self.process_file(filepath)
else:
die("failed to determine if path '%s' is a file or directory" % path)
def process_file(self, filepath):
log.debug('processing filepath \'%s\'', filepath)
if filepath == '-':
filepath = '<STDIN>'
if filepath == '<STDIN>':
print(self.xml_to_json(sys.stdin.read()))
else:
with open(filepath) as _:
content = _.read()
print(self.xml_to_json(content, filepath=filepath))
if __name__ == '__main__':
XmlToJson().main()
|
{
"pile_set_name": "Github"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.