Dataset Viewer
Auto-converted to Parquet Duplicate
text
stringlengths
1
3.78M
meta
dict
FILE PHOTO: Britain Soccer Football - Chelsea v Crystal Palace - Premier League - Stamford Bridge - 1/4/17 General view of Chelsea club badge outside the stadium before the match Reuters / Hannah McKay Livepic (Reuters) - Chelsea have asked their fans in a tweet who the club should sign in the close season less than a week after FIFA imposed a transfer ban on the Premier League outfit. World soccer’s governing body on Friday announced that Chelsea would be banned from signing players in the next two transfer windows after they were found guilty of breaching rules regarding overseas players under the age of 18. Chelsea said they “categorically refute” the findings of FIFA’s Disciplinary Committee and would appeal. “Who would you want to sign in the summer,” Chelsea asked their Twitter followers, providing a link to a ‘Media Watch’ section on their website which said the club was looking at AC Milan centre back Alessio Romagnoli as a potential target. The tweet, which has been removed, outraged many fans, with one asking the club to sign a new social media team instead. Others jokingly suggested Spanish keeper Kepa Arrizabalaga would have the final say following his refusal to be substituted by Chelsea coach Maurizio Sarri during extra time in Sunday’s League Cup final defeat by Manchester City. Chelsea were not immediately available to comment. If Chelsea contest the ban they could operate in the close season transfer window while an appeal is heard by FIFA.
{ "pile_set_name": "OpenWebText2" }
<?php /** * Copyright © Magento, Inc. All rights reserved. * See COPYING.txt for license details. */ declare(strict_types=1); namespace Magento\Security\Model; /** * Tests for \Magento\Security\Model\UserExpirationManager * @magentoAppArea adminhtml * @SuppressWarnings(PHPMD.CouplingBetweenObjects) */ class UserExpirationManagerTest extends \PHPUnit\Framework\TestCase { /** * @var \Magento\Framework\ObjectManagerInterface */ private $objectManager; /** * @var \Magento\Backend\Model\Auth */ private $auth; /** * @var \Magento\Backend\Model\Auth\Session */ private $authSession; /** * @var \Magento\Security\Model\AdminSessionInfo */ private $adminSessionInfo; /** * @var \Magento\Security\Model\UserExpirationManager */ private $userExpirationManager; protected function setUp(): void { $this->objectManager = \Magento\TestFramework\Helper\Bootstrap::getObjectManager(); $this->auth = $this->objectManager->create(\Magento\Backend\Model\Auth::class); $this->authSession = $this->objectManager->create(\Magento\Backend\Model\Auth\Session::class); $this->adminSessionInfo = $this->objectManager->create(\Magento\Security\Model\AdminSessionInfo::class); $this->auth->setAuthStorage($this->authSession); $this->userExpirationManager = $this->objectManager->create(\Magento\Security\Model\UserExpirationManager::class); } /** * @magentoDataFixture Magento/Security/_files/expired_users.php */ public function testUserIsExpired() { $adminUserNameFromFixture = 'adminUserExpired'; $user = $this->loadUserByUsername($adminUserNameFromFixture); static::assertTrue($this->userExpirationManager->isUserExpired($user->getId())); } /** * @magentoDataFixture Magento/Security/_files/expired_users.php * @magentoAppIsolation enabled */ public function testDeactivateExpiredUsersWithExpiredUser() { $adminUsernameFromFixture = 'adminUserNotExpired'; $this->loginUser($adminUsernameFromFixture); $user = $this->loadUserByUsername($adminUsernameFromFixture); $sessionId = $this->authSession->getSessionId(); $this->expireUser($user); $this->userExpirationManager->deactivateExpiredUsersById([$user->getId()]); $this->adminSessionInfo->load($sessionId, 'session_id'); $user->reload(); $userExpirationModel = $this->loadExpiredUserModelByUser($user); static::assertEquals(0, $user->getIsActive()); static::assertNull($userExpirationModel->getId()); static::assertEquals(AdminSessionInfo::LOGGED_OUT, (int)$this->adminSessionInfo->getStatus()); } /** * @magentoDataFixture Magento/Security/_files/expired_users.php * @magentoAppIsolation enabled */ public function testDeactivateExpiredUsersWithNonExpiredUser() { $adminUsernameFromFixture = 'adminUserNotExpired'; $this->loginUser($adminUsernameFromFixture); $user = $this->loadUserByUsername($adminUsernameFromFixture); $sessionId = $this->authSession->getSessionId(); $this->userExpirationManager->deactivateExpiredUsersById([$user->getId()]); $user->reload(); $userExpirationModel = $this->loadExpiredUserModelByUser($user); $this->adminSessionInfo->load($sessionId, 'session_id'); static::assertEquals(1, $user->getIsActive()); static::assertEquals($user->getId(), $userExpirationModel->getId()); static::assertEquals(AdminSessionInfo::LOGGED_IN, (int)$this->adminSessionInfo->getStatus()); } /** * Test deactivating without inputting a user. * * @magentoDataFixture Magento/Security/_files/expired_users.php */ public function testDeactivateExpiredUsers() { $notExpiredUser = $this->loadUserByUsername('adminUserNotExpired'); $expiredUser = $this->loadUserByUsername('adminUserExpired'); $this->userExpirationManager->deactivateExpiredUsers(); $notExpiredUserExpirationModel = $this->loadExpiredUserModelByUser($notExpiredUser); $expiredUserExpirationModel = $this->loadExpiredUserModelByUser($expiredUser); static::assertNotNull($notExpiredUserExpirationModel->getId()); static::assertNull($expiredUserExpirationModel->getId()); $notExpiredUser->reload(); $expiredUser->reload(); static::assertEquals($notExpiredUser->getIsActive(), 1); static::assertEquals($expiredUser->getIsActive(), 0); } /** * Login the given user and return a user model. * * @param string $username * @throws \Magento\Framework\Exception\AuthenticationException */ private function loginUser(string $username) { $this->auth->login( $username, \Magento\TestFramework\Bootstrap::ADMIN_PASSWORD ); } /** * @param $username * @return \Magento\User\Model\User */ private function loadUserByUsername(string $username): \Magento\User\Model\User { /** @var \Magento\User\Model\User $user */ $user = $this->objectManager->create(\Magento\User\Model\User::class); $user->loadByUsername($username); return $user; } /** * Expire the given user and return the UserExpiration model. * * @param \Magento\User\Model\User $user * @throws \Exception */ private function expireUser(\Magento\User\Model\User $user) { $expireDate = new \DateTime(); $expireDate->modify('-10 days'); /** @var \Magento\Security\Api\Data\UserExpirationInterface $userExpiration */ $userExpiration = $this->objectManager->create(\Magento\Security\Api\Data\UserExpirationInterface::class); $userExpiration->setId($user->getId()) ->setExpiresAt($expireDate->format('Y-m-d H:i:s')) ->save(); } /** * @param \Magento\User\Model\User $user * @return \Magento\Security\Model\UserExpiration */ private function loadExpiredUserModelByUser(\Magento\User\Model\User $user): \Magento\Security\Model\UserExpiration { /** @var \Magento\Security\Model\UserExpiration $expiredUserModel */ $expiredUserModel = $this->objectManager->create(\Magento\Security\Model\UserExpiration::class); $expiredUserModel->load($user->getId()); return $expiredUserModel; } }
{ "pile_set_name": "Github" }
What You May Not Know About the Dakota Access Pipeline teleSUR spoke with the lawyer coordinating legal advice and representation for protesters at the North Dakota camps. The Dakota Access Pipeline has been drawing national attention for threatening Native American ways of life and land. As protesters hailed a victory on Friday handed down by three federal departments, a slew of legal issues remain at hand. Between what the tribes have already dealt with and what they have yet to face, attorney Robin Martinez—who is coordinating legal advice and representation for protesters at the North Dakota camps—had answers. The Sacred Stone Camp, the main traditional protest site created by the Standing Rock Sioux Tribe in April, is on land that used to belong to the tribe but was “in effect stolen” through eminent domain by the Army Corps of Engineers for flood control, said Martinez. The Army Corps of Engineers began building the Oahe Dam in 1948, flooding over 160,000 acres to create the Oahe Lake, where protests are clustered. A quarter of tribe members had to relocate. Martinez said that a tribe member once told him that, “What flood control really means is that the whites control the water and the Indians get flooded.” Another camp, the Red Warrior Camp, is on private land in order to be closer to the construction sites, where nonviolent direct actions is organized. Work on private land was not affected by Friday’s joint announcement to halt building on federal land. Is the state of North Dakota acting illegally? The state of emergency to access resources from the Department of Homeland Security was made on the basis that organizers are violent and fighting with pipe bombs and hatchets, which they deny. The protesters can’t challenge the governor’s move, but they are highlighting the unjust use of roadblocks to reroute supporters trying to enter the camps, an issue which the Standing Rock Sioux Tribe brought to the United Nations. Reports have also come out of law enforcement taking pictures of passersby and using facial recognition which, Martinez said, will likely be used for an upcoming mass arrest. The Morton County Sheriff justified the roadblocks as a safety precaution. Some have suspected that officials have also cut off telecommunications, but Martinez said that poor reception is likely because there is one phone tower in the area serving thousands of cell phones. He added, though, that he would not be surprised if authorities did try to cut power and “would be shocked” if they weren’t already intercepting all communications from the tower, which is owned by Verizon. Why did the Standing Rock Sioux Tribe lose its case to stop construction? First, they found the Army Corps of Engineers in violation of the National Historic Preservation Act, which requires the Corps to solicit and gain the consent of the tribe. The Standing Rock Sioux Tribe argued that just contacting a few individuals did not constitute meaningful consent. Judge James Boasberg found it was sufficient according to current law, which the Departments of Justice, the Army and the Interior said they would consider revising after discussions with tribes. Second, the tribe was unsatisfied with the cursory environmental assessment the Corps conducted before granting the permit. After a brief study, the Corps filed a finding of “no significant impact,” precluding further study because of the procedure dictated in the Nationwide Permit 12, which allows for minimal review—a permit originally intended for public projects like power lines and sewage, said Martinez. The tribe argued that the finding was understated and should have instead initiated a procedure to conduct a full environmental impact study. Boasberg did not challenge the Corp’s review. The tribe had to prove that “irreparable injury” would be caused by construction as they await a decision on a lawsuit against the permit altogether. Boasberg wrote that they did not make the claim on land and water, but rather on sites of cultural and archaeological significance, which was not a strong enough case. Are any other tribes involved in the lawsuit and what are they adding to the case? The Standing Rock Sioux Tribe is appealing the judge’s rejection of their preliminary injunction, and the Cheyenne River Sioux Tribe is intervening in the appeal. They filed an amended complaint on Friday, referencing a treaty that obligates the U.S. government to ensure tribal land is permanent and livable, including protecting the right to clean water. The Yankton Sioux Tribe filed a separate lawsuit against both the Corps and the U.S. Fish and Wildlife Service the day before the Standing Rock ruling. The claims are similar but also reference wider international obligations for “free, prior and informed consent” guaranteed under the U.N. Declaration on the Rights of Indigenous Peoples and the responsibility to "ensure the civilization" of the Lakota people under the Fort Laramie Treaty. The suit also makes an argument based on environmental justice, which every federal agency has the duty to respect. Martinez said that the pipeline was originally planned to run upstream of Bismarck, the “almost all white” state capital, but following complaints they rerouted upstream of the Standing Rock reservation. The “very astounding” racism would make a strong environmental justice case, he said. If the Standing Rock Sioux Tribe wins its suit against the Army Corps of Engineers, is the project called off? If the tribe manages to strike down the Corps permit for construction under federal waterways, Dakota Access can reroute the pipeline and, if it can’t win the powers of eminent domain, it can negotiate with individual landowners for the right to cross their property. Many have already signed easements with the company, which effectively coerced landowners, who thought they had no choice, said Martinez. If they did not voluntarily agree to an easement and accept the money for the Dakota Access’s use of their land, he said, the company could threaten to use eminent domain and pay them nothing. Now that the pipeline is gaining international attention, though, it may have a similar fate as the Keystone XL Pipeline, which was rejected by President Barack Obama because it would “not serve the national interest.” Should a similar scenario happen, or should Dakota Access decide to call off the project, it would have to take the pipes out of the ground and dismantle the construction that has already taken place. Martinez, who represented South Dakota farmers and ranchers against the Keystone 1 Pipeline, said that while the company is required to restore their property to how it was before construction, they rarely fulfill their promise. Oil leaks aside, the pipeline often damages the land and prevents crops from growing again: oil from tar sands, for instance, must be heated up to flow through the pipeline, burning the land around it. What about the rest of the pipeline on non-federal land? The announcement to halt construction on federal land affected a small percentage of the total pipeline. The vast majority goes through the land of farmers and ranchers. North Dakota isn’t alone in challenging construction. In Iowa, farmers and ranchers have banded together with environmental groups to overturn Dakota Access’s power of eminent domain. They have a case pending in court and organized several actions against the Iowa Utilities Board as part of a “growing backlash on the part of farmers and landowners to that concept” which, Martinez said, was originally meant for public projects. Dakota Access will argue that its pipeline serves a public purpose, but Iowa echo Keystone XL resisters in arguing that the oil, meant for export, is only extracted for private gain. While the tribes in North Dakota have already laid their cards on the table, the Iowa case may be a real “stumbling block down the line,” said Martinez. Correction: An earlier version of this article stated: "...the Cheyenne River Sioux Tribe is interfering in the appeal." It should have read intervening.
{ "pile_set_name": "Pile-CC" }
Am i the only one around here Who doesn't see all the hate people say is in r/atheism? 1,388 shares
{ "pile_set_name": "OpenWebText2" }
Postoperative physical therapy for podiatric surgery. The authors discuss several rehabilitation protocols for different surgical procedures on the foot. These are designed to be used as a reference for the podiatrist and therapist. In addition, various modalities are highlighted to familiarize the practitioner with their uses. Physical therapy can aid in decreasing the recovery period from foot surgery, which is particularly advantageous for the athlete.
{ "pile_set_name": "PubMed Abstracts" }
A Primer on Mexican Mixology That Goes Beyond Margaritas — and Where to Drink in NYC May 5, 2015 Even if you’re hitting sophisticated Mexican restaurants around town, you certainly encounter many a margarita and Corona in passing. It’s unavoidable. But beyond these mainstays, Mexico offers so much more to drinking culture. By now, even casual drinkers have at least heard murmurs of mezcal, tequila’s smokier sibling. Far fewer are aware of the existence of raicilla, bacanora, and sotol — three distinct agave-based Mexican spirits. And that’s to say nothing of the myriad liqueurs and cordials artfully produced south of the border. To pay proper homage to the culture, bypass the migraine-inducing sweet and sour mixes and spice things up with a few of these adventurous alternatives. The game-changing mixology program at Death and Co. (433 East 6th Street, 212-388-0882) devotes an entire menu section to offbeat agave concoctions. The Pale Horse, for example, blends a snap-pea-infused tequila with vermouth and an herbal alpine liqueur, landing curiously on something between a wheatgrass shot and a gin-infused Last Word. The Sound & Fury delivers broader appeal, with raspberry and muddled red bell pepper added to Calle 23’s delicate blanco tequila. An initial sweetness is combated by the tingling heat of Ancho Reyes — a Mexican liqueur derived of spiced chiles. Also utilizing Ancho Reyes to expert effect is the program at Añejo (668 Tenth Avenue, 212-920-4770) in Hell’s Kitchen. The restaurant’s Ancho Negroni balances the peppery complexity of the liqueur against the earthy smoke of Montelobos mezcal and citrusy bitterness of Campari. Offering significantly more depth than any gin-based drink, it’s that rare example of a sequel outperforming the original. By the way, for the DIY set, 80-proof Ancho Reyes, with its superior mixing capabilities, is a worthy addition to the home bar. Bottles retail for $35 throughout town. In Manhattan, Phillipe Wine & Liquor will even deliver it to your door. But if you feel like stepping outside your comfort zone, delve deeper down the rabbit hole with a shot of raicilla, which is traditionally regarded as Mexican moonshine. Similar to mezcal, the once-illicit spirit utilizes agave hearts that are fire-roasted in primitive clay ovens, imparting a punchy smoke guaranteed to mess with the margarita-minded. Head over to Empellón Cocina (105 First Avenue, 212-780-0999), where the well-versed staff can either pour you a shot or steer you toward sensible mixing applications.
{ "pile_set_name": "Pile-CC" }
Q: Is GMAT still available? Where? How? (NASA's General Mission Analysis Tool) In this comment below the question Visualization of non-Keplerian orbits for solar sails, NASA's open source General Mission Analysis Tool is suggested. Sounds great! My google search found this blog from 2012 and this big PDF Users Guide also dated 2012, both on SourceForge. But the links I was aiming for didn't help much. The link https://gmat.gsfc.nasa.gov/ only gives me a "your connection is not private" error (shown below) even when I delete the s and change it back to http:// , and http://opensource.gsfc.nasa.gov/projects/GMAT/index.php seems to be a dead end. Where can I find this software? Is it something I have to compile on my computer, or is it hosted somewhere? A: If you go beyond the expired certificate, you get a page telling you it is now supported on an off-NASA site:
{ "pile_set_name": "StackExchange" }
Q: Taskbar Icon for New Mail I'm running Mac OS X 10.9.1 using the Mail app (v7.1) to interact with my exchange email account. Is there any way to configure the Mail app to show an icon in the task bar whenever I have new mail? I have the pop up notifications and the red number in my hidden dock and alt-tab screens, however, I would really like to just have a non-intrusive little black mail icon on the task bar when I have unread mail. This is default on Windows with Outlook, I just haven't found any Mac apps that will replicate it yet. Any ideas, suggestions, tips? A: This is currently not possible solely with OS X and Mail. However, third-party apps such as Mail Unread Menu can add an icon to the menu bar.
{ "pile_set_name": "StackExchange" }
Q: "This list cannot be deleted because one or more lists are related to it." - Which? A user and myself can't delete a library due to something still using it. How can i find out what that something is? Can the library be deleted while keeping whatever the something is using? A: Open the library in Internet Explorer. Click a checkbox in its list. Click the Library tab in the Library Tools tab at the top. Edit Library (this will open the library in Sharepoint Designer). Uncheck "Display this list on the Quick Launch" if you only need it gone there. Save. Edit list columns and delete all lookup columns. Save and ignore value range warning. Delete the library. I guess nothing depended on it but itself.
{ "pile_set_name": "StackExchange" }
Terrestrial gross primary production: Using NIRV to scale from site to globe. Terrestrial photosynthesis is the largest and one of the most uncertain fluxes in the global carbon cycle. We find that near-infrared reflectance of vegetation (NIRV ), a remotely sensed measure of canopy structure, accurately predicts photosynthesis at FLUXNET validation sites at monthly to annual timescales (R2 = 0.68), without the need for difficult to acquire information about environmental factors that constrain photosynthesis at short timescales. Scaling the relationship between gross primary production (GPP) and NIRV from FLUXNET eddy covariance sites, we estimate global annual terrestrial photosynthesis to be 147 Pg C/year (95% credible interval 131-163 Pg C/year), which falls between bottom-up GPP estimates and the top-down global constraint on GPP from oxygen isotopes. NIRV -derived estimates of GPP are systematically higher than existing bottom-up estimates, especially throughout the midlatitudes. Progress in improving estimated GPP from NIRV can come from improved cloud screening in satellite data and increased resolution of vegetation characteristics, especially details about plant photosynthetic pathway.
{ "pile_set_name": "PubMed Abstracts" }
Q: Режим компиляции SNMP приложения При попытке собрать на Linux простейшее приложения с библиотекой Net-SNMP (открыть сессию и закрыть сессию - всё) выдается такая ошибка /usr/include/net-snmp/library/snmp_api.h:706:8: error: unknown type name ‘netsnmp_transport’ Я предполагаю, что либо какой-то флаг компиляции не указал, либо како-то инклюдник не подключил. По сути, программа из пяти строк: #include <stdio.h> #include <stdlib.h> #include <net-snmp/net-snmp-config.h> #include <net-snmp/session_api.h> int main(int argc, char **argv) { struct snmp_session s; void * session; // Выполняем инициализацию переменных snmp_sess_init(&s); session = snmp_sess_open(&s); // Закрываем сессию rc = snmp_sess_close(&s); if (rc == 0) { printf("Неудачное завершение сессии\n"); } else { printf("Программа завершилась нормально\n"); } return 0; } Может кто-то объяснить - в чём причина ситуации ? A: описание типа netsnmp_transport в файле snmp_transport.h: typedef struct netsnmp_transport_s { ... } netsnmp_transport; $ apt-file search snmp_transport.h libsnmp-dev: /usr/include/net-snmp/library/snmp_transport.h подключение: #include <net-snmp/library/snmp_transport.h>
{ "pile_set_name": "StackExchange" }
Q: Add text string to photo when saving to camera roll Is it possible to add a text string to an image when saving to camera roll? for example photo is taken and saved to camera roll: - (void)imagePickerController:(UIImagePickerController *)picker didFinishPickingMediaWithInfo:(NSDictionary *)info { UIImage *image = [info objectForKey:UIImagePickerControllerOriginalImage]; UIImageWriteToSavedPhotosAlbum(image, nil,@selector(image:didFinishSavingWithError:contextInfo:), nil); //something here to add @"my pre defined text"; to saved image } I want to automatically add pre defined text to this saved image without any user input if possible? Nothing comes up on the usual searches on SO and Google regarding what I am trying to do A: This question appears to address your needs: Add Text to UIImage Perhaps ignore the camera action, and the camera roll, what you really just want to do is add a string to a UIImage.
{ "pile_set_name": "StackExchange" }
Browsing: App Reviews Take a look at this new app Deanna Bartalini is using for daily prayer. It’s a great tool that brings together the Examen and technology, perfect blend of the tried and true of St. Igantius with the tech toys of today! As we enter into Holy Week, Allison Gingras reminds us that our good habits of prayer and reflection should continue. She suggestions utilizing some of the wonderful Lenten resources that we may not have had time to use during this Lent. As St. Paul teaches, we should not tire or grow weary of doing good, including what is spiritually good for us. The Dominican Friars of the Province of St. Joseph recently released a new app for mobile devices: Blackfriars Media. Allison Gingras outlines the features of the new portal to the Dominican’s great media.
{ "pile_set_name": "Pile-CC" }
Marilyn Newton / AP Photo Republican presidential hopeful Ron Paul captured the majority of Nevada’s national delegates early Sunday, overwhelming likely nominee Mitt Romney with an organized contingent who easily took control of the state convention. Paul’s supporters won 22 of the 25 national delegate slots up for election at the state convention in Sparks on Saturday. Romney won three. Another three automatic delegates are expected to support Romney, meaning Romney will have six supporters in the delegation and Paul will have 22. But while Paul loyalists will make up the majority of the Nevada delegation, Republican rules require the first vote at the national convention to reflect the results of the Feb. 4 caucus, which Romney easily won. That means 20 of Nevada’s national delegates must vote for Romney, while eight will be free to vote for Paul in the first balloting. While some Paul supporters voiced an intention to challenge the binding requirement, the campaign opted not to further antagonize the Republican National Committee, who has threatened not to seat the delegates if they ignore the caucus results and vote for Paul. “We are sending a strong delegation to Tampa in August,” Paul’s Nevada chairman Carl Bunce said. “There are rumors that (the Paul campaign) will actively work to not follow rules and unbind our delegates. That is false; we are not doing that. Congressman Paul is an individual who wants to follow the rules, follow the Constitution and we follow that lead.” Jim DeGraffenried, the secretary of the state party, stressed party officials will not allow the national delegation to deviate from the binding caucus results. “We will not allow anyone to break that,” DeGraffenreid said. “If they do, the will revoke their delegate status and they will be replaced by alternates.” The alternates are largely Romney supporters. Paul’s campaign has been determined to use the party’s own rules to keep his long-shot candidacy alive. His backers have spent the last four years immersing themselves in the arcane procedures governing the presidential nominating contest. They’re embarked on a state-by-state strategy to capture enough national delegates to influence the convention in Tampa and to be well positioned should an opportunity for a brokered convention arise. Although Paul has failed to win the popular vote in any state primary or caucus, many of his backers are still convinced he can win the nomination. According to estimates based on initial primary and caucus results, Romney has won 847 delegates compared to Paul’s 80 delegates. Bunce portrayed Paul’s victory at the state convention as the growing power of his message “of liberty” within the party’s ranks. “There’s going to be growing pains in this party,” Bunce said. “Those of you who aren’t part of the liberty movement yet, I hope you can at least ask questions, see where we’re coming from. I do not want this party to fall apart.” But Bunce clearly reveled in the campaign’s ability to control the convention, even while promising to follow the rules. “Just because you have the power doesn’t mean you have to wield it,” he said in announcing the contingent would not challenge the binding requirement. “Just because you have the sword doesn’t mean you have to strike.” The Romney campaign has done its best to distance itself from the state convention chaos, sending lawyers to watch over the count and doing its best to organize supporters. In the end, they failed to get enough of their backers to Sparks to elect delegates. But campaign officials say they are focused instead on the fact he won 16,486 of the 32,894 votes cast in the February caucuses. “We are pleased to have won the support of so many Nevadans on Election Day,” a Romney campaign spokesperson said. “With his overwhelming win, delegates to the national convention will be backing Gov. Romney in Tampa in support of his positive vision for our country.” National Republican officials characterized the Nevada convention as a “Ron Paul super bowl,” noting that his supporters spent the last four years working to take over the state party structure. They’ve captured seats on state and county central committees, elected a state chairman and elected their own to represent Nevada at the Republican National Committee. A RNC source said the party won’t challenge the results of the delegate election as long as they honor the binding rule.
{ "pile_set_name": "OpenWebText2" }
Brain death (BD) and ischemia reperfusion injury (IRI) are unavoidable consequences of heart transplantation. Brain death produces profound physiologic derangements and the systemic effects of this central injury, although little studied, are known to contribute to peripheral organ ischemia, the upregulation of adhesion molecules, cytokine expression and leukocyte accumulation within the donor heart. Brain death induced inflammation in the donor also renders the heart more susceptible to IRI in the recipient, and there is evidence to indicate that both of these injurious events have negative long-term consequences with regard to allograft survival. Our working hypothesis is that complement plays a central role in causing myocardial BD- induced inflammation and injury, and enhances IRI in the recipient. We propose that a complement inhibitory strategy applied to the donor (in addition to the recipient) will provide protection from inflammation and injury, and as a consequence, will improve long-term graft survival due to decreased graft immunogenicity and host alloresponsiveness. We propose to utilize relevant mouse models to determine the role of complement in myocardial brain death induced injury (BDI) and in IRI following heart transplantation. Our investigations will focus on complement effector mechanisms and in vivo interactions between complement and P-selectin, an adhesion molecule that is strongly implicated in myocardial IRI and that is expressed in the heart following BD. We further propose to develop novel therapeutic strategies based on targeted complement inhibition and P-selectin antagonism, and to characterize the inhibitors in our newly developed mouse model of heart transplantation incorporating donor BD. We specifically propose to: 1. Determine complement effector mechanism(s) involved in myocardial injury following brain death 2. Develop and characterize novel therapeutic strategies based on P-selectin targeted complement inhibition and P-selectin antagonism and, 3. Determine the effect of anti-complement therapy in the BD donor, the recipient, or both, on the severity of myocardial IRI after heart transplantation and on the development of an alloimmune response and acute rejection of the graft.
{ "pile_set_name": "NIH ExPorter" }
Pilot Academy Pilot Academy is a flight simulator video game released for the PlayStation Portable in 2006. Gameplay The game allows the player to operate aircraft from different eras, from World War I to the present day. The game has two major classes, Civilian and Military, and each has different missions. For the first few major civilian lessons (taking off, turning, etc.), the player controls a Cessna light aircraft, but after completion of the first lessons, moves on to control a Global Express business jet and a Boeing 747. The military lessons do not involve the basic skills of flying, instead they focus on weapon control. Graphics The game is rendered in 3D, but with insignificant buildings in 2D. All of the aircraft are detailed with logos and artwork, with real movements such as a visible rudder movement when the rudder is activated, and the full movement of the landing gear while extending and retracting. There is no visible damage, however. The game uses only three different maps, but with each mission decorating each map differently and using a different part of the 64 square km map. The three maps are a pacific island area map where most of it is water; a grassland map with extensive snow-covered mountains; and a desert map. Only the map with the islands is playable in Free flight mode. The aircraft in the game are all renditions of actual aircraft. All have different acceleration, climb capability and response to control inputs. External links Rising Star Games info site Category:2006 video games Category:Flight simulation video games Category:General flight simulators Category:Marvelous Entertainment Category:PlayStation Portable games Category:PlayStation Portable-only games Category:Video games developed in the United Kingdom
{ "pile_set_name": "Wikipedia (en)" }
Dunswell Dunswell is a village in the East Riding of Yorkshire, England, and in the civil parish of Woodmansey. Historically also known as Beer-Houses due to the presence of two Inns in close proximity, the village is located on the main Kingston upon Hull to Beverley road. A significant drinking water extraction works was opened in 1931 west of the village, helping to supplying Hull and the surrounding area. Geography Dunswell is situated at the junction of Dunswell Lane and A1174 road Hull to Beverley road approximately from the centres of Kingston upon Hull and Beverley respectively. It is approximately west of the River Hull; the Beverley and Barmston Drain also runs north-south, adjacent to the west of the village. The village has a hall, Dunswell Village Institute; and a primary school Dunswell Primary, since 2014 Dunswell Academy. The Ship Inn is located at the junction of the main road and Ings Lane leading to Skidby Landing on the River Hull. Governance The village was in the Beverley and Holderness parliamentary constituency until the 2010 general election when it was transferred to the constituency of Haltemprice and Howden. History According to Charles Overton, Dunswell was once known as Douceville, a reference to its many springs and wells. At one time it was also known as Beer-Houses due to the two public houses in close vicinity. The two pubs in the village, The Coach and Horses (aka The Plough) and The Wagon and Horses, are thought to originate from the 17th century. The Hull to Beverley road was turn-piked in 1741. An act allowing the construction of the Beverley and Skidby Drain was passed in 1785, and the Beverley and Barmston Drain allowed by an act of 1798. In 1880 improvements to the lower reaches of the drainage system enabled further extraction, and a steam engine for drainage was installed at Dunswell for the Skidby Drain. The drainage of the land reduced flooding, but caused some local wells to become dry. In around 1814 a non-conformist chapel ("Bethel") was built in the village for the Methodist New Connexion branch. In the 1850s the village consisted of two Inns on the Hull and Beverley road, with the village west along Dunswell Lane, with fewer than twenty houses. The village school opened in 1881. In 1893 the Newington Water Company gained authorisation to open a water supply works at Dunswell to replace a source at Swanland that had become contaminated by salt. The company was taken over by the Hull Corporation shortly after. In 1911 permission was given for additional water works at Dunswell, and after being halted by the First World War, they were restarted in 1923 on a larger scale – the water pumping station was opened in 1931. The works included a diameter well, with of adits. The works was one of the three main water supplies for the area, along with Springhead Pumping Station and Mill Dam in Cottingham. The adit system was expanded in the early 1950s to meet demand from the borough of Beverley but the works did not yield an increase in supply. St Faiths Church of England church opened in 1951; the non-conformist chapel held its last service in 1968. Low level housing development took place in the second half of the 20th century, with houses on Ings Lane, and houses and new cul-de-sac streets south of the Dunwell Lane/Beverley Road junction (The Meadows, Dene Close). In 1985 the village became part of the civil parish of Woodmansey. In 2013 Dunswell primary school was listed for closure by East Riding of Yorkshire Council; the closure, which was opposed by many nearby residents was averted by transferring to academy status, as a subsidiary of the primary school in Swanland. Gallery Notes References Sources External links , entrance detail Category:Villages in the East Riding of Yorkshire Category:Holderness
{ "pile_set_name": "Wikipedia (en)" }
Numerous fungi and bacteria are serious pests of common agricultural crops. One method of controlling diseases has been to apply antimicrobial organic or semiorganic chemicals to crops. This method has numerous, art-recognized problems. A more recent method of control of microorganism pests has been the use of biological control organisms which are typically natural competitors or inhibitors of the troublesome microorganisms. However, it is difficult to apply biological control organisms to large areas, and even more difficult to cause those living organisms to remain in the treated area for an extended period. Still more recently, techniques in recombinant DNA have provided the opportunity to insert into plant cells cloned genes which express antimicrobial compounds. This technology has given rise to additional concerns about eventual microbial resistance to well-known, naturally occurring antimicrobials, particularly in the face of heavy selection pressure, which may occur in some areas. Thus, a continuing need exists to identify naturally occurring antimicrobial compounds which can be formed by plant cells directly by translation of a single structural gene. European Patent Application 204,590, based upon U.S. patent application Ser. No. 725,368, describes a method of genetically modifying a plant cell to control expression of heterologous foreign structure genes. In the method, the plant cell is transformed to contain a pRi T-DNA promoter and a heterologous foreign structural gene, the promoter and the structural gene being in such position and orientation with respect to one another that the structural gene is expressible in a plant cell under control of the promoter. Likewise, European Patent Application 186,425, based upon U.S. patent application Ser. No. 685,824, describes a recombinant DNA expression vector which comprises (a) a transcription unit, flanked by T-DNA border sequences, which comprises a promoter and associated amino terminal region encoding sequences and a terminator signal sequence in which the sequences are derived from one or more genes which are naturally expressed in a plant cell, and (b) an antibiotic resistance gene-encoding sequence located between the promoter and associated amino-terminal region-encoding sequence and the terminator sequence and (c) a DNA fragment containing a replicon that is functional in Agrobacterium. PCT application 8807087, based upon U.S. patent application Ser. No. 168,109, discloses a recombinant virus expression system comprising a Heliothis polyhedrin promoter and a nucleotide sequence encoding a heterologous peptide or protein, which may have antimicrobial activity. Akaji, K. et al., Chem. Pharm. Bull. (Tokyo) 37(10):2661-2664 (1989), reports the syntheses of three peptides from horseshoe crab, including tachyplesin I and II. Kawano, K. et al., J. Biol. Chem. 265(26):15365-15367 (1990), reports the isolation of tachyplesin I from hemocytes of the horseshow crab, and determination of its betasheet structure. Miyata, T. et al., J. Biochem (Tokyo) 106(4):663-669 (1989), discloses isolation of tachyplesin II from horseshoe crab and elucidation of its structure and biological activity. Muta, T. et al., J. Biochem (Tokyo) 108(2):261-266 (1990), discloses isolation of tachyplesin III and a processing intermedate of its precursor. Nakamura, T. et al., J. Biol. Chem. 263(32):16709-16713 (1988), discusses isolation and chemical structure of tachyplesin. Niwa, M. et al., First Scientific Meeting of the Japanese Association for Developmental and Comparative Immunology (Jadci), Tokyo., Japan, November (14(2):2-3 (1990) deals with the antimicrobial activities of tachyplesin isopeptides. Shieh, T. C. et al., FEBS (Fed. Eur. Biochem. Soc.) Lett. 252(1-2):121-124 (1989) discloses synthesis and properties of tachyplesin I. Shigenaga, T. et al., J. Biol. Chem. 265(34):21350-21354 (1990) describes cloning of cDNA for the peptide precursor of tachyplesin and the cellular localization of the peptide in the horseshoe crab. Japanese laid-open patent application 02207098, assigned to Taiyo Fishery KK, disloses a composition having high specificity to beta-glucan. The composition includes an amoebocyte lysate from Lumulina and blood cell membrane proteins including tachyplesins I and II. Japanese laid-open patent application 02204500, also assigned to Taiyo Fishery KK, discloses an article insoluble carrier for removing pyrogens from fluids. The article is made by bonding crab peptides identified as tachyplesins I and II to a water insoluble carrier. The disclosures of the foregoing references are hereby incorporated herein in their entirety by reference to show the state of the art.
{ "pile_set_name": "USPTO Backgrounds" }
Johnson's Creamery Johnson's Creamery is a historic creamery building located at Bloomington, Monroe County, Indiana. The original section was built about 1914, and is a two-story, rectangular, red brick building. Additions were made to the original building until 1951, and are all constructed of red brick with parapets. The iconic smokestack dates to 1949. Johnson's Creamery vacated the building in 1987. It was listed on the National Register of Historic Places in 1996. It is located in the Bloomington West Side Historic District. References Category:Industrial buildings and structures on the National Register of Historic Places in Indiana Category:Industrial buildings completed in 1914 Category:Buildings and structures in Bloomington, Indiana Category:National Register of Historic Places in Monroe County, Indiana Category:Historic district contributing properties in Indiana
{ "pile_set_name": "Wikipedia (en)" }
GOFILES := $(shell find . -name '*.go' ! -path './.go*') POSTGRES := postgres:12.4-alpine SHELL := /bin/bash export COMPOSE_FILE = docker/core.yml:docker/ports.yml define STUB package routes import "net/http" const holeJsPath = "" const twemojiWoff2Path = "" func Asset(w http.ResponseWriter, r *http.Request) {} endef bump: @go get -u @go mod tidy cert: @mkcert -install localhost @chmod +r localhost-key.pem .PHONY: db db: @ssh -t rancher@code.golf docker run -it --rm \ --env-file /etc/code-golf.env $(POSTGRES) psql db-admin: @ssh -t rancher@code.golf docker run -it --rm \ --env-file /etc/code-golf.env $(POSTGRES) psql -WU doadmin db-dev: @docker-compose exec db psql -U postgres code-golf db-diff: @diff --color --label beta --label dev --strip-trailing-cr -su \ <(ssh rancher@code.golf "docker run --rm \ --env-file /etc/code-golf.env $(POSTGRES) pg_dump -Os code-golf-beta") \ <(docker-compose exec db pg_dump -OsU postgres code-golf) || true @diff --color --label live --label dev --strip-trailing-cr -su \ <(ssh rancher@code.golf "docker run --rm \ --env-file /etc/code-golf.env $(POSTGRES) pg_dump -Os") \ <(docker-compose exec db pg_dump -OsU postgres code-golf) db-dump: @rm -f db/*.gz @ssh rancher@code.golf "docker run --env-file /etc/code-golf.env \ --rm $(POSTGRES) sh -c 'pg_dump -a | gzip -9'" \ > db/code-golf-`date +%Y-%m-%d`.sql.gz @cp db/*.gz ~/Dropbox/code-golf/ deps: @yay -S mkcert python-brotli python-fonttools dev: @touch docker/.env @docker-compose rm -f @docker-compose up --build e2e: export COMPOSE_FILE = docker/core.yml:docker/e2e.yml e2e: export COMPOSE_PROJECT_NAME = code-golf-e2e e2e: # TODO Pass arguments to run specific tests. # TODO Return correct exit code. @touch docker/.env @docker-compose rm -fs @docker-compose pull @docker-compose build -q @docker-compose run e2e || docker-compose logs @docker-compose rm -fs fmt: @gofmt -s -w $(GOFILES) @goimports -w $(GOFILES) font: @docker build -t code-golf-font -f Dockerfile.font . @id=`docker create code-golf-font`; \ docker cp "$$id:twemoji-colr/build/Twemoji Mozilla.woff2" assets/twemoji.woff2; \ docker rm $$id lint: # FIXME Stub out assets if it doesn't yet exist. ifeq ($(wildcard routes/assets.go),) $(file > routes/assets.go, $(STUB)) endif @docker run --rm -v $(CURDIR):/app -w /app golangci/golangci-lint:v1.30.0 golangci-lint run live: @./build-assets @docker build --pull -t codegolf/code-golf . @docker push codegolf/code-golf @ssh rancher@code.golf " \ docker pull codegolf/code-golf && \ docker stop code-golf; \ docker rm code-golf; \ docker run \ --cap-add CAP_KILL \ --cap-add CAP_SETGID \ --cap-add CAP_SETUID \ --cap-add CAP_SYS_ADMIN \ --cap-drop ALL \ --detach \ --env-file /etc/code-golf.env \ --init \ --name code-golf \ --publish 80:1080 \ --publish 443:1443 \ --read-only \ --restart always \ --security-opt seccomp:unconfined \ --volume certs:/certs \ codegolf/code-golf && \ docker system prune -f" logs: @ssh rancher@code.golf docker logs --tail 5 -f code-golf test: # FIXME Stub out assets if it doesn't yet exist. ifeq ($(wildcard routes/assets.go),) $(file > routes/assets.go, $(STUB)) endif @go test ./...
{ "pile_set_name": "Github" }
HOUSTON, Texas (KTRK) -- Sugar Land police were involved in a standoff at a Buc-ee's parking lot in Richmond.Police say the standoff started at 12:15 p.m. in the 1200 block of Crabb River Road as a road rage incident when an Eagle Lake off-duty cop followed a man who he claims pulled out a gun on him.The standoff began when the man refused to leave his car.A woman and children in the car were not being held hostage, but they were trying to convince the man to listen to police. When he refused, authorities say the woman and children exited the car safely.Officers say around 2:45 p.m., the man exited the vehicle and complied with officers. The Eagle Lake officer allegedly did not want to press charges.The man was not taken into custody, but will be charged with evading arrest by Sugar Land PD.
{ "pile_set_name": "OpenWebText2" }
Sierra Vista’s basketball team silently exits its locker room, shuffling into a hallway to the side of the bleachers, where the players calmly wait. As the first beat descends from the speakers, the Mountain Lions soar onto the court, leaving their relaxed demeanors behind. It’s a scene you might find at thousands of gyms across the country any night of the week, apart from the song playing overhead. That’s Sierra Vista’s own, a rap titled “Blue & Yellow,” written by 16-year-old student Jaylen “Space” Washington. “Every time we come out to that, it lets us know who we are,” says Sierra Vista senior guard Viko Noma’aea. “Listening to it gets us more hyped and gets us into the game.” That was Washington’s mission when he decided to write and record the song a few weeks before the season began. He felt confident his friends had a chance to put together the best season in school history. They just needed a modern-day fight song to help spur them on. “I had to do it because the school shows me love,” Washington says. “Everybody knew I rapped and listens to my music, so I had to do ‘Blue & Yellow’ for them.” Washington wants to be on the floor alongside Noma’aea and the other Lions. The junior with a point-guard frame calls basketball his first love and played on the freshman and junior varsity teams the past two years before an injury interrupted his hoops career. During a pregame shootaround last season, Washington went up for a dunk but never got off the ground, severely breaking his ankle in the process. The fracture produced egg-sized swelling and required a surgery to insert screws. Washington was told he couldn’t play basketball for a year. “I couldn’t even believe it. A year?” he says, twisting in his seat as if he’s still made uncomfortable by the thought. “It was January, so my whole year of 2010 I couldn’t play basketball. I was like, what am I going to do?” Washington underwent surgery in early February, missing almost a month of school while he recovered. That’s when he realized he had a real talent for rapping, something he’d previously considered only a hobby. “I was just so bored,” he says. “I was sitting at home all day and had nothing else to do.” Washington began recording songs and posting them on the Internet. When he added videos on YouTube, they registered thousands of views and caught the attention of local rap label Hard Tyme Records. “Blue & Yellow,” which samples the instrumental track from Wiz Khalifa’s “Black & Yellow,” exploded for some 4,000 hits within the first month. Students from at least four other area high schools even made songs mimicking Washington’s version. “I haven’t heard one yet that comes even close to Space’s,” Sierra Vista basketball coach Kent Johnson says. “Space’s sounds professional. Everyone else sounds like they did it on their laptop.” Washington wants to play basketball as a senior when his ankle is fully recovered. In the meantime, he’s enjoying the Mountain Lions his song helped create. “No one really cared about this school, but now there’s school spirit,” Washington says. “Everyone talks about wearing blue at this game, yellow at this game, white at this game. It upped the ante on that.”
{ "pile_set_name": "Pile-CC" }
/*************************************************** This is an example sketch for our optical Fingerprint sensor Designed specifically to work with the Adafruit Fingerprint sensor ----> http://www.adafruit.com/products/751 These displays use TTL Serial to communicate, 2 pins are required to interface Adafruit invests time and resources providing this open source code, please support Adafruit and open-source hardware by purchasing products from Adafruit! Written by Limor Fried/Ladyada for Adafruit Industries. BSD license, all text above must be included in any redistribution ****************************************************/ #include <Adafruit_Fingerprint.h> #if (defined(__AVR__) || defined(ESP8266)) && !defined(__AVR_ATmega2560__) // For UNO and others without hardware serial, we must use software serial... // pin #2 is IN from sensor (GREEN wire) // pin #3 is OUT from arduino (WHITE wire) // Set up the serial port to use softwareserial.. SoftwareSerial mySerial(2, 3); #else // On Leonardo/M0/etc, others with hardware serial, use hardware serial! // #0 is green wire, #1 is white #define mySerial Serial1 #endif Adafruit_Fingerprint finger = Adafruit_Fingerprint(&mySerial); void setup() { Serial.begin(9600); while (!Serial); // For Yun/Leo/Micro/Zero/... delay(100); Serial.println("\n\nDelete Finger"); // set the data rate for the sensor serial port finger.begin(57600); if (finger.verifyPassword()) { Serial.println("Found fingerprint sensor!"); } else { Serial.println("Did not find fingerprint sensor :("); while (1); } } uint8_t readnumber(void) { uint8_t num = 0; while (num == 0) { while (! Serial.available()); num = Serial.parseInt(); } return num; } void loop() // run over and over again { Serial.println("Please type in the ID # (from 1 to 127) you want to delete..."); uint8_t id = readnumber(); if (id == 0) {// ID #0 not allowed, try again! return; } Serial.print("Deleting ID #"); Serial.println(id); deleteFingerprint(id); } uint8_t deleteFingerprint(uint8_t id) { uint8_t p = -1; p = finger.deleteModel(id); if (p == FINGERPRINT_OK) { Serial.println("Deleted!"); } else if (p == FINGERPRINT_PACKETRECIEVEERR) { Serial.println("Communication error"); return p; } else if (p == FINGERPRINT_BADLOCATION) { Serial.println("Could not delete in that location"); return p; } else if (p == FINGERPRINT_FLASHERR) { Serial.println("Error writing to flash"); return p; } else { Serial.print("Unknown error: 0x"); Serial.println(p, HEX); return p; } }
{ "pile_set_name": "Github" }
##EMBED## Click Here for Sources and to Learn More Twinkie Facts Being a vegan and raw-foodist, Woody Harrelson did not actually eat any real Twinkies in the movie Zombieland. Rather, the “Twinkies” he was shown eating were made from cornmeal and were vegan-safe.
{ "pile_set_name": "OpenWebText2" }
Q: How can I specify a list of comma delimited integers and have batch script loop for each integer? I currently have a batch script where I use "set /p =". Once the variable is entered, the script performs 3 robocopy commands, using the above. After the 3 robocopy commands finish, I use another "set /p again=" to ask if the user needs to run this again. Sometimes this script needs to run against 10-15 integers. Is there a way to give a list of integers, comma delimited or otherwise, and have the script loop back for each subsequent integer? @echo off :again echo This script will download incident data in 2 steps. echo Step 1 will attempt to download any previously archived data from your home drive. echo Step 2 will attempt to download any files from the Live Incident folder. set /p incident=Please enter the Incident Number: robocopy "\\server1\share\%incident%" "C:\local-path\%incident%" *.* /ETA /MOV /E /R:1 /W:1 /MT:3 robocopy "\\server2\share\%incident%" "C:\local-path\%incident%" *.* /ETA /E /R:1 /W:1 /MT:2 robocopy "\\server3\share\%incident%" "C:\local-path\%incident%" *.* /ETA /E /R:1 /W:1 /MT:2 set /p again=Do you have another Incident you would like to try? if /i "%again:~,1%" EQU "Y" goto again if /i "%again:~,1%" EQU "N" exit /b A: @echo off :again echo This script will download incident data in 2 steps. echo Step 1 will attempt to download any previously archived data from your home drive. echo Step 2 will attempt to download any files from the Live Incident folder. set /p "incidents=Please enter the Incident Numbers separated by a comma:" For %%I in (%Incidents%) Do Call :Process %%I CHOICE /C YN /M "Do you have another Incident you would like to try?" If %ErrorLevel% Equ 1 Goto :again Goto :Eof :Process %1 :: you might do a range check on the Incident no. %1 Echo Processing Incedent # %1 :: while testing goto :Eof robocopy "\\server1\share\%1" "C:\local-path\%casenum%" *.* /ETA /MOV /E /R:1 /W:1 /MT:3 robocopy "\\server2\share\%1" "C:\local-path\%casenum%" *.* /ETA /E /R:1 /W:1 /MT:2 robocopy "\\server3\share\%1" "C:\local-path\%casenum%" *.* /ETA /E /R:1 /W:1 /MT:2 Goto :Eof If the output seems ok remove the goto :eof following :: while testing
{ "pile_set_name": "StackExchange" }
/* eslint-disable functional/no-expression-statement, @typescript-eslint/naming-convention */ import test from 'ava'; import { AuthenticationProgramStateBCH, BytecodeGenerationResult, hexToBin, } from '../../lib'; import { expectCompilationResult, privkey, } from './compiler-bch.e2e.spec.helper'; test( '[BCH compiler] Key – ECDSA: use a private key', expectCompilationResult, '<owner.signature.all_outputs>', { keys: { privateKeys: { owner: privkey } } }, { bytecode: hexToBin( '473044022059e9ad8fabd511fa2ef6935dae6395d5d3ce93b929436c835c9c8372b353bd3d0220527c17e2e4ec12f7b8969a9bb80e58ab1a24e44c2e5512916d1bcb3fc4dc2f2241' ), success: true, }, { owner: { type: 'Key' }, } ); test( '[BCH compiler] Key – schnorr: use a private key', expectCompilationResult, '<owner.schnorr_signature.all_outputs>', { keys: { privateKeys: { owner: privkey } } }, { bytecode: hexToBin( '41313d8a853bd82f5fe251d6b04581333800001ee7680c5e4775db3afabf4873360b3481802d8d656cc608e4625d6568bf1a8801bb1efff19a8306267681177aed41' ), success: true, }, { owner: { type: 'Key' }, } ); test( '[BCH compiler] Key – derive a public key from a private key', expectCompilationResult, '<owner.public_key>', { keys: { privateKeys: { owner: privkey } } }, { bytecode: hexToBin( '210376ea9e36a75d2ecf9c93a0be76885e36f822529db22acfdc761c9b5b4544f5c5' ), success: true, }, { owner: { type: 'Key' }, } ); test( '[BCH compiler] Key – derive a public key: no secp256k1', expectCompilationResult, '<owner.public_key>', { keys: { privateKeys: { owner: privkey } } }, { errorType: 'resolve', errors: [ { error: 'Cannot resolve "owner.public_key" – the "secp256k1" property was not provided in the compilation environment.', range: { endColumn: 18, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, }, { secp256k1: undefined } ); test( '[BCH compiler] Key – use a provided public key (without secp256k1)', expectCompilationResult, '<owner.public_key>', { bytecode: { 'owner.public_key': hexToBin( '0376ea9e36a75d2ecf9c93a0be76885e36f822529db22acfdc761c9b5b4544f5c5' ), }, }, { bytecode: hexToBin( '210376ea9e36a75d2ecf9c93a0be76885e36f822529db22acfdc761c9b5b4544f5c5' ), success: true, }, { owner: { type: 'Key' }, }, { secp256k1: undefined } ); test( '[BCH compiler] Key – public_key: no matching public or private keys', expectCompilationResult, '<owner.public_key>', { bytecode: {}, keys: { privateKeys: {}, }, }, { errorType: 'resolve', errors: [ { error: 'Identifier "owner.public_key" refers to a public key, but no public or private keys for "owner" were provided in the compilation data.', missingIdentifier: 'owner.public_key', owningEntity: 'ownerEntityId', range: { endColumn: 18, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, } ); test( '[BCH compiler] Key – ECDSA: use a provided signature (without secp256k1)', expectCompilationResult, '<owner.signature.all_outputs>', { bytecode: { 'owner.signature.all_outputs': hexToBin( '3044022059e9ad8fabd511fa2ef6935dae6395d5d3ce93b929436c835c9c8372b353bd3d0220527c17e2e4ec12f7b8969a9bb80e58ab1a24e44c2e5512916d1bcb3fc4dc2f2241' ), }, keys: {}, }, { bytecode: hexToBin( '473044022059e9ad8fabd511fa2ef6935dae6395d5d3ce93b929436c835c9c8372b353bd3d0220527c17e2e4ec12f7b8969a9bb80e58ab1a24e44c2e5512916d1bcb3fc4dc2f2241' ), success: true, }, { owner: { type: 'Key' }, }, { secp256k1: undefined } ); test( '[BCH compiler] Key – schnorr: use a provided signature', expectCompilationResult, '<owner.schnorr_signature.all_outputs>', { bytecode: { 'owner.schnorr_signature.all_outputs': hexToBin( '313d8a853bd82f5fe251d6b04581333800001ee7680c5e4775db3afabf4873360b3481802d8d656cc608e4625d6568bf1a8801bb1efff19a8306267681177aed41' ), }, }, { bytecode: hexToBin( '41313d8a853bd82f5fe251d6b04581333800001ee7680c5e4775db3afabf4873360b3481802d8d656cc608e4625d6568bf1a8801bb1efff19a8306267681177aed41' ), success: true, }, { owner: { type: 'Key' }, } ); test( '[BCH compiler] Key – malformed identifier', expectCompilationResult, '<owner.signature>', { keys: { privateKeys: { owner: privkey } } }, { errorType: 'resolve', errors: [ { error: 'Invalid signature identifier. Signatures must be of the form: "[variable_id].signature.[signing_serialization_type]".', range: { endColumn: 17, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, } ); test( '[BCH compiler] Key – ECDSA: wrong private key', expectCompilationResult, '<owner.signature.all_outputs>', { keys: { privateKeys: { wrong: privkey } } }, { errorType: 'resolve', errors: [ { error: 'Identifier "owner.signature.all_outputs" refers to a Key, but a private key for "owner" (or an existing signature) was not provided in the compilation data.', missingIdentifier: 'owner.signature.all_outputs', owningEntity: 'ownerEntityId', range: { endColumn: 29, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, } ); test( '[BCH compiler] Key – schnorr: wrong private key', expectCompilationResult, '<owner.schnorr_signature.all_outputs>', { keys: { privateKeys: { wrong: privkey } } }, { errorType: 'resolve', errors: [ { error: 'Identifier "owner.schnorr_signature.all_outputs" refers to a Key, but a private key for "owner" (or an existing signature) was not provided in the compilation data.', missingIdentifier: 'owner.schnorr_signature.all_outputs', owningEntity: 'ownerEntityId', range: { endColumn: 37, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, } ); test( '[BCH compiler] Key – signature with no "privateKeys"', expectCompilationResult, '<owner.schnorr_signature.all_outputs>', { keys: {} }, { errorType: 'resolve', errors: [ { error: 'Identifier "owner.schnorr_signature.all_outputs" refers to a Key, but a private key for "owner" (or an existing signature) was not provided in the compilation data.', missingIdentifier: 'owner.schnorr_signature.all_outputs', owningEntity: 'ownerEntityId', range: { endColumn: 37, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, } ); test( '[BCH compiler] Key – ECDSA: unknown signing serialization algorithm', expectCompilationResult, '<owner.signature.another>', { keys: { privateKeys: { owner: privkey } } }, { errorType: 'resolve', errors: [ { error: 'Unknown signing serialization algorithm, "another".', range: { endColumn: 25, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, } ); test( '[BCH compiler] Key – schnorr: unknown signing serialization algorithm', expectCompilationResult, '<owner.schnorr_signature.another>', { keys: { privateKeys: { owner: privkey } } }, { errorType: 'resolve', errors: [ { error: 'Unknown signing serialization algorithm, "another".', range: { endColumn: 33, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, } ); test( '[BCH compiler] Key – unrecognized identifier fragment', expectCompilationResult, '<owner.signature.some.future_operation.with_more_levels>', { keys: { privateKeys: { owner: privkey } } }, { errorType: 'resolve', errors: [ { error: 'Unknown component in "owner.signature.some.future_operation.with_more_levels" – the fragment "future_operation" is not recognized.', range: { endColumn: 56, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, } ); test( '[BCH compiler] Key – ECDSA: no secp256k1', expectCompilationResult, '<owner.signature.all_outputs>', { keys: { privateKeys: { owner: privkey } } }, { errorType: 'resolve', errors: [ { error: 'Cannot resolve "owner.signature.all_outputs" – the "secp256k1" property was not provided in the compilation environment.', range: { endColumn: 29, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, }, { secp256k1: undefined } ); test( '[BCH compiler] Key – schnorr: no secp256k1', expectCompilationResult, '<owner.schnorr_signature.all_outputs>', { keys: { privateKeys: { owner: privkey } } }, { errorType: 'resolve', errors: [ { error: 'Cannot resolve "owner.schnorr_signature.all_outputs" – the "secp256k1" property was not provided in the compilation environment.', range: { endColumn: 37, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, }, { secp256k1: undefined } ); test( '[BCH compiler] Key – ECDSA: no sha256', expectCompilationResult, '<owner.signature.all_outputs>', { keys: { privateKeys: { owner: privkey } } }, { errorType: 'resolve', errors: [ { error: 'Cannot resolve "owner.signature.all_outputs" – the "sha256" property was not provided in the compilation environment.', range: { endColumn: 29, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, }, { sha256: undefined } ); test( '[BCH compiler] Key – schnorr: no sha256', expectCompilationResult, '<owner.schnorr_signature.all_outputs>', { keys: { privateKeys: { owner: privkey } } }, { errorType: 'resolve', errors: [ { error: 'Cannot resolve "owner.schnorr_signature.all_outputs" – the "sha256" property was not provided in the compilation environment.', range: { endColumn: 37, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, }, { sha256: undefined } ); test( '[BCH compiler] Key – error in coveredBytecode compilation', expectCompilationResult, '', { keys: { privateKeys: { owner: privkey } } }, { errorType: 'resolve', errors: [ { error: 'Compilation error in resolved script "lock": [1, 1] Unknown identifier "invalid".', range: { endColumn: 29, endLineNumber: 1, startColumn: 2, startLineNumber: 1, }, }, ], success: false, } as BytecodeGenerationResult<AuthenticationProgramStateBCH>, { owner: { type: 'Key' }, }, { scripts: { lock: 'invalid', test: '<owner.signature.all_outputs>', }, } );
{ "pile_set_name": "Github" }
Summertime is tubing time Bob Stewart CHARLES BARKSDALE/EN 165of206 FILE-Drinking beer and a rented tube just for the ice chest friends from Southwest Texas State University cool off in the Comal River May 8 2000 in New Braunfels Texas. Celebrating the end of the semester the group is on a two hour tube ride down the cool waters. Photo by Charles Barksdale FILE-Drinking beer and a rented tube just for the ice chest friends from Southwest Texas State University cool off in the Comal River May 8 2000 in New Braunfels Texas. Celebrating the end of the semester the group is on a two hour tube ride down the cool waters. Photo by Charles Barksdale
{ "pile_set_name": "Pile-CC" }
First, let me start with a big thanks to Nemesis and piroxilin for providing Teradrive disk images and firmware images respectively. Having easy access to software/firmware to reverse was a big help. Now for the info I've figured out: AE0001: XXXXRRXX bit 0: Value set here will be returned in AF1163 bit 4 bit 1: Value set here will be returned in AF1163 bit 5 bit 2: Returns state of AF1163 bit 6 bit 3: Returns state of AF1163 bit 7 bit 4: Appears to be used by the M68K to track whether it's the first time the 68K has been booted. Starts out 0 and is set to 1 during boot by M68K bit 5: Appears to be used by the M68K to track whether a cart was found during initial boot. Will refuse to unlock MD side when set bit 6: Set by M68K side if the cart passes the TMSS check and PC/MD mode switch is set to PC bit 7: Maps the PC address space at $0 when set when 1164 bit 0 is clear AE0003: XXXXXXXX bits 0-3: Selects the 1MB bank visible at $B00000 AE0003 (alt): XX10XXXX A14000: XXXXXXXX XXXXXXXX Unlocks 286 access to MD hardware when 'SEGA' is written to this address, Locks it when other values are read. Byte access seems to lock the M68K. Note that writing to this reg is not required for M68K access to the VDP like normal TMSS and the version field of the version reg is 0 on the Teradrive. Unsure if this is readable (definitely not byte-readable) M68K Firmware info: The M68K boot ROM is located inside the additional mask ROM (called the ROMDISK by prioxilin, though only part of it appears to contain a disk-like structure) at offset $43000. Unclear how this ROM is accessed from the PC side or if other portions are accessible on the MD side. The M68K firmware is responsible for displaying the SEGA logo at boot time, doing a basic TMSS check on cartridges (is 'SEGA' present at $100 or $101) and authenticating requests to unlock the hardware for the PC side. It recognizes two special header strings at $100 and has different boot behavior if they are found. 'SEGA TERA286': Mostly normal, but allows the PC to unlock the MD side even if this is present (normally a cart being present prevents PC access) 'SEGA TERA68K': Unlike a normal cart, this is booted directly after the Sega logo (normally M68K returns control the PC side after Sega logo and requires the 286 to reset it again to boot the cartridge) I'm guessing the prototype Mega CD unit used SEGA TERA286. The initial M68K boot code also checks for a special ISA option ROM in the $C0000 region of PC memory. This ROM must contain the text 'PRODUCED BY OR UNDER LICENSE FROM SEGA ENTERPRISES Ltd.', 0 (that zero is there to indicate a literal null byte) at an even address. If found, the 68K will jump to the offset stored at offset 4 of the 1KB chunk that the text was found in. Unlock process: To unlock the MD hardware from the PC side, write $21 to 1160 (probably 0 at the start of the process), $1 to 1163 (probably already set to that, but best to be safe), 0 to $1166 and $1167 (unless you have located your PRODUCED BY... text in a funny location) and then write $81 to 1164. You must have the PRODUCED BY... text at an even address in RAM before doing so or you will not gain access. As long as that text is in "conventional" memory (i.e. in the low 640KB of the PC address space), using 0 in 1166/1167 is fine. Otherwise, you must specify the upper 11 bits of the physical address that contains the text in 1166/1167. You may also do that to speed things up slightly when the text is located in conventional memory, but the speedup is negligible given the delay involved in displaying the TMSS license screen. If you are successful, bit 5 of 1165 will now read 1 and you will be able to use 1162,1163,1166 and 1167 to access the MD hardware via the memory window mechanism, but the 68K will not be running. Puzzle Construction seems to operate in this way with game logic running on the 286, but the YM3438, MD IO and MD VDP used for the game mode and launcher (standard VGA is used for the editor screens) and the cdram utility (can backup BRAM carts to disk). If you instead want to run code on the 68K, first unlock the MD hardware as above. Then write your initial M68K code to MD work RAM via the window mechanism. Then go through the unlock procedure again, but this time put a value from $A0-$FF inclusive in 1166/1167. This will cause the M68K Teradrive firmware to jump to $FF0100. Unknowns: If there is a way to let both CPUs run simultaneously (normally they are mutually exclusive) If there is a mechanism to allow the 286 to receive MD interrupts of the M68K to receive PC interrupts What the remaining bits in the above registers do How the hardware knows to use offset 0x43000 for the M68K firmware (seems like a weird address for it to be hard coded) How the rest of that additional firmware ROM is accessed Wow, good job with this! I always wanted to investigate this hardware more, but never found the time. It's interesting to read about how the PC and Mega Drive hardware interacts. One tip I can give, from memory if you hold one of the function keys when you power the system on (F2 I think), both the Mega Drive and PC hardware boots and runs concurrently. I think this is the key to being able to run both CPUs simultaneously. Of course, the fact this is accomplished by holding a key at boot time suggests it's managed by the bios, and therefore there's probably some kind of memory location you can poke a value into to accomplish the same thing after boot. I always wanted to investigate this hardware more, but never found the time. Still quite a few unknowns if you suddenly find yourself with a bunch of free time Happy to share test code and/or IDA disassembly projects if that happens (though I know how hard free time can be to come by).
{ "pile_set_name": "Pile-CC" }
Watch these guys build a multi-purpose, carpeted and sturdy igloo outside their house. Something we've all contemplated doing post-snowpocalypse. The best feature? The beer holders fashioned out of ice.
{ "pile_set_name": "Pile-CC" }
# Generated by Django 2.2.10 on 2020-05-07 09:37 from django.db import migrations, models import uuid class Migration(migrations.Migration): initial = True dependencies = [ ] operations = [ migrations.CreateModel( name='TaskInfo', fields=[ ('task_id', models.UUIDField(default=uuid.uuid4, editable=False, primary_key=True, serialize=False)), ('user_id', models.IntegerField(verbose_name='任务创建用户 ID')), ('task_name', models.CharField(max_length=255, verbose_name='任务名称')), ('task_status', models.IntegerField(default=1)), ('task_start_date', models.DateTimeField(auto_now_add=True, verbose_name='任务创建时间')), ('task_end_date', models.DateTimeField(null=True, verbose_name='任务结束时间')), ('operation_type', models.CharField(max_length=255, verbose_name='执行操作名称')), ('operation_args', models.TextField(default='', verbose_name='执行操作参数')), ('task_msg', models.TextField(default='', verbose_name='任务执行消息')), ('is_show', models.BooleanField(default=False, verbose_name='任务是否被查看')), ('create_date', models.DateTimeField(auto_now_add=True, verbose_name='创建时间')), ('update_date', models.DateTimeField(auto_now=True, verbose_name='更新时间')), ], options={ 'db_table': 'task_info', }, ), ]
{ "pile_set_name": "Github" }
About The Mindbenders The Mindbenders (originally the backing group for Wayne Fontana) was a 1960s beat group from Manchester, England. They were part of the mid 1960s British Invasion with their chart-toppers "Game of Love" and "A Groovy Kind of Love". Read more...
{ "pile_set_name": "Pile-CC" }
Quirky observations about Life in Japan, Canada and the world at large. 2007-03-02 I know it's their year but... Herds of wild boars have been terrorizing the populace of Tsuruga, a peninsula that juts into the Sea of Japan. The peninsula in Fukui prefecture has been dubbed "the Nuclear Power Plant Peninsula" for it hosts 7 plants. They caught 360 boars last year, some weighing at more than 100 kg. I think they should count their blessings, there are worse things that could happen in an area with so much radiation. What if one of those little piggies should mutate? Princess Mononoke came across this beastie in her adventures. About Me I was born a young white child. After almost 20 years of depressing social work, dealing with all manners of society's dregs, I decided to chuck it all and move to Japan and teach English. Now I'm a happy camper teaching Elementary School kids in Watari, Miyagi.
{ "pile_set_name": "Pile-CC" }
A novel preconcentration strategy for extraction methods based on common cationic surfactants: an alternative to classical coacervative extraction. A novel and simple preconcentration step for aqueous micellar solutions of the common cationic surfactant cetyltrimethylammonium bromide (CTAB) has been developed. The procedure is based on the formation of another phase (a micro-droplet), not soluble in water, in which analytes (originally present in the aqueous solution) experience preconcentration. The method resembles to that of classical coacervation, but it does not require high ionic strengths neither acidic pH values. The optimum method implies mixing aqueous micellar solutions of CTAB with lithium bis[(trifluoromethane)sulfonyl]imide (Li-NTf₂) in a 1:1 molar ratio with a 16.5% (v/v) of acetonitrile content, followed by vortex, heating at 65 °C during 2 min, and centrifugation. The obtained microdroplet containing analytes is then subjected to high-performance liquid chromatography (HPLC) with diode-array detection (DAD). The method has been applied to the determination of a group of organic contaminants including alkylphenols, polycyclic aromatic hydrocarbons and parabens, present in aqueous samples (including seawater) or solid samples (such as sediment samples, which are subjected to a previous microwave-assisted extraction). Average preconcentration factors of roughly 14 and 12 are obtained for aqueous and sediment samples, respectively; being the limits of quantification down to 0.5 μg L⁻¹ and 0.02 mg kg⁻¹, respectively.
{ "pile_set_name": "PubMed Abstracts" }
Researchers at the University of Twente in the Netherlands recently announced a startling global statistic. About two-thirds of the world’s population experience a severe water scarcity for at least one month during the year. About half of these 4 billion people live in India and China. And the country that comes in third for periodic water shortages? The United States, with California as drought central. Yet something just as startling should be noted about California and how its 39 million people have responded to a long and historic dry spell. Since April of 2015, state residents have mostly complied with a mandate by Gov. Jerry Brown to reduce water usage by 25 percent over their 2013 usage. They have ripped up lawns for drought-tolerant landscaping, turned sewage into drinkable water, grown crops and livestock with less water, and moved to build desalination plants. Restaurants now wait for customers to request water rather than simply serve it. Last year, a poll found Californians consider water and drought the most important issue facing the state. Their water savings was enough to supply 6 million people. If this new culture of resilience and innovation persists, California might be a model for other parts of the world in how to transform conventional thinking about water. The state does not so much lack water as it does a fuller understanding of its own capacity to better use the water it has. Get the Monitor Stories you care about delivered to your inbox. By signing up, you agree to our Privacy Policy Note this, however: Governor Brown had to threaten to fine local water districts to achieve the remarkable compliance. His earlier pleas for voluntary conservation did not work so well. Still, the state has now started habits that might lead to a climate-resilient future – if sustained. In coming days, state water regulators will decide how much to change the mandate in light of better snowfall in the mountains this past winter. The state is not alone in forsaking old water practices. Last December, after a global accord on climate change was reached in Paris, President Obama pushed federal agencies to improve the nation’s water usage. The administration hopes for as much as a 33 percent reduction. It has a good example to follow in California.
{ "pile_set_name": "OpenWebText2" }
Pliny Merrick Pliny T. Merrick (August 2, 1794 – January 31, 1867) was an American attorney and politician from Massachusetts. He served as an Associate Justice of the Massachusetts Supreme Judicial Court. Early life Merrick was born in Brookfield, Massachusetts, the son of Honorable Pliny Merrick and Ruth (Cutler) Merrick. He graduated from Harvard Law School in 1814, and was admitted to the Worcester bar in 1817. He began the practice of law in Worcester, before moving to Charlton, Swansea and Taunton to practice law. In June, 1824, he returned to Worcester and served as Worcester County's district attorney from 1824-1843. In 1826, Merrick was elected a member of the American Antiquarian Society. Judicial career In 1844 he was Judge of the Municipal Court, and in 1843 he was named a judge of the Massachusetts Courts of Common Pleas. He resigned this appointment in 1848, and was reappointed in 1851. From 1849-1850, he was senior defense counsel (co-counsel with Edward Dexter Sohier) in the trial of Harvard University Professor John White Webster, accused of murdering Harvard patron Dr. George Parkman. The prosecutors for the trial were John H. Clifford, then Massachusetts Attorney-General and the prosecutor of all capital murder cases, and George Bemis, Esq, and independent attorney. In 1853, Merrick was promoted to the bench of the Supreme Judicial Court by the same John H. Clifford, now Governor of Massachusetts. Merrick received the degree of LL.D. from Harvard in 1853. He served on the bench of the Massachusetts Supreme Judicial Court until 1864. He was a representative of Worcester County in both branches of the state legislature. He was an Overseer of Harvard University from 1852-1856. He also served for two years as president of the Worcester and Nashua Railroad. In 1855 Merrick moved to Boston and lived there until his death in 1867. John White Webster Trial From 1849-1850 Merrick was senior defense counsel in the Parkman-Webster murder case. The gruesome murder drew national attention and although Merrick lost the case, he received much notoriety for the case. The Boston Globe reported Merrick's response, that upon the verdict, "In a moment or two, his senior counsel, Judge Merrick, to the dock, and addressed a few words to the prisoner, to which, so far as we could judge, he replied.— Judge Merrick was deeply affected, and so agitated that he could hardly stand." Anti-Masonic Movement Merrick was an active promoter of the Anti-Masonic Party. The party developed in the early nineteenth century, opposing political leaders who were members of secretive Masonic brotherhoods. Masonic members held political views on the role of the government and how the country should expand. The Anti-Masonic Party opposed those views as moving away from the original founding fathers intent. Merrick renounced Free Masonry in 1832. The party was the precursor to the Whig Party. Death Merrick died of paralysis in Boston on January 31, 1867, in his 73rd year. His obituary in the New York Times (2/4/1867) stated: "In 1864 an attack of paralysis obliged him to resign his seat on the Bench. His mind, however, had remained unclouded until a second and fatal attack..." He bequeathed a fund for the establishment of schools of high grade in Worcester. Family life On May 23, 1827, Merrick married Rebecca Thomas, daughter of Isaiah Thomas, Jr. of Worcester; she died June 17, 1859. They had no children. References Further reading "A Dictionary of Freemasonry" by Robert Macoy, published by Mercy Books, NY. 2000. "The Disappearance of Dr. Parkman" by Judge Pliny T. Merrick, published by Robert Sullivan, Little, Brown and Company, Boston 1971. External links [www.biblebelievers.org.au/masons.htm History and Purpose of the Freemasons and other Secret Societies] title=Associate Justice of the Massachusetts Supreme Judicial Court|after=Theron Metcalf|years=1853-1864}} Category:1794 births Category:1867 deaths Category:People from Brookfield, Massachusetts Category:Harvard Law School alumni Category:Massachusetts lawyers Category:Anti-Masonic Party politicians from Massachusetts Category:Politicians from Worcester, Massachusetts Category:District attorneys in Worcester County, Massachusetts Category:Massachusetts Whigs Category:19th-century American politicians Category:Massachusetts state senators Category:Members of the Massachusetts House of Representatives Category:Massachusetts Supreme Judicial Court justices Category:Massachusetts state court judges Category:Members of the American Antiquarian Society
{ "pile_set_name": "Wikipedia (en)" }
package net.anotheria.moskito.core.tracer; import net.anotheria.moskito.core.config.MoskitoConfigurationHolder; import net.anotheria.moskito.core.config.tracing.TracingConfiguration; import net.anotheria.moskito.core.journey.JourneyManager; import net.anotheria.moskito.core.journey.JourneyManagerFactory; import net.anotheria.util.sorter.StaticQuickSorter; import java.util.List; import java.util.concurrent.CopyOnWriteArrayList; import java.util.concurrent.locks.ReadWriteLock; import java.util.concurrent.locks.ReentrantReadWriteLock; /** * TODO comment this class * * @author lrosenberg * @since 04.05.15 17:40 */ public class Tracer { /** * Associated producer for this tracer. */ private String producerId; /** * If true the tracer is currently enabled. Disabled tracer doesn't collect any futher traces. */ private boolean enabled; /** * Journey manager is used to add remove journey-steps. */ private static JourneyManager journeyManager = JourneyManagerFactory.getJourneyManager(); /** * Sorttype for keep longest strategy. */ private TraceSortType sortTypeForKeepLongest = new TraceSortType(TraceSortType.SORT_BY_DURATION, TraceSortType.DESC); /** * Lock for deletion of traces in case we gather too many traces. */ private ReadWriteLock resizeLock = new ReentrantReadWriteLock(); private List<Trace> traces; private int totalEntryCount; public Tracer(String aProducerId){ producerId = aProducerId; enabled = true; traces = new CopyOnWriteArrayList<Trace>(); } public String getProducerId(){ return producerId; } public boolean isEnabled() { return enabled; } public void setEnabled(boolean enabled) { this.enabled = enabled; } public int getEntryCount(){ return traces == null ? 0 : traces.size(); } public void addTrace(Trace aTrace, int toleratedAmount, int maxAmount){ totalEntryCount++; try { resizeLock.writeLock().lock(); traces.add(aTrace); if (traces.size() <= toleratedAmount) return; TracingConfiguration config = MoskitoConfigurationHolder.getConfiguration().getTracingConfig(); List<Trace> oldTraces; switch (config.getShrinkingStrategy()) { case KEEPLONGEST: oldTraces = StaticQuickSorter.sort(traces, sortTypeForKeepLongest); traces = new CopyOnWriteArrayList<Trace>(); for (int i = 0; i < oldTraces.size(); i++) { if (i < maxAmount) { traces.add(oldTraces.get(i)); } else { journeyManager.getOrCreateJourney(Tracers.getJourneyNameForTracers(producerId)).removeStepByName(Tracers.getCallName(oldTraces.get(i))); } } break; case FIFO: oldTraces = traces; traces = new CopyOnWriteArrayList<Trace>(); int offset = toleratedAmount - maxAmount; for (int i=0; i<oldTraces.size(); i++){ if (i>=(1+offset) && i<=(maxAmount+offset)){ traces.add(oldTraces.get(i)); }else{ journeyManager.getOrCreateJourney(Tracers.getJourneyNameForTracers(producerId)).removeStepByName(Tracers.getCallName(oldTraces.get(i))); } } break; default: throw new IllegalArgumentException("Shrinking strategy " + config.getShrinkingStrategy() + " is not supported"); } }finally{ resizeLock.writeLock().unlock(); } } public List<Trace> getTraces(){ try{ resizeLock.readLock().lock(); return traces; }finally { resizeLock.readLock().unlock(); } } public int getTotalEntryCount() { return totalEntryCount; } public void setTotalEntryCount(int totalEntryCount) { this.totalEntryCount = totalEntryCount; } }
{ "pile_set_name": "Github" }
-0.02? 0.25285166 What is -28516.097 times 0.4? -11406.4388 2.1 * -62810 -131901 Work out -36867 * 2. -73734 What is -0.432 times -166649? 71992.368 41972471*-1 -41972471 Multiply -16 and 16231.42. -259702.72 Multiply 0 and 217.11774. 0 -13 * 295233 -3838029 Product of -0.3 and 7273823. -2182146.9 -0.5 times 176041369 -88020684.5 Product of 0.7848 and -0.1197. -0.09394056 Calculate 30*15547269. 466418070 Multiply -593.3 and -1479. 877490.7 Work out -0.046 * -52527.2. 2416.2512 Calculate 913.3*0.0348. 31.78284 19 * 80.4177 1527.9363 0.35 * 9.7288 3.40508 Multiply -16.2 and 63155. -1023111 What is the product of 249 and -790? -196710 Multiply 0.09 and -2223234. -200091.06 Calculate -30067.7*2211. -66479684.7 Work out 0.0221487 * -20. -0.442974 Product of -0.041 and -192602. 7896.682 Product of -0.3 and 0.3523672. -0.10571016 -0.09*-51310.379 4617.93411 38548*0.43 16575.64 4.9 times -0.94126 -4.612174 Work out 3.3 * 129144.9. 426178.17 What is -11576 times -15827? 183213352 42980*-69 -2965620 152 * -64505.4 -9804820.8 -132 times 713902 -94235064 Calculate -3*-142557414. 427672242 1.884 * -5463 -10292.292 What is -407.4 times -2.0953? 853.62522 Work out 26483645 * -1. -26483645 0.5 times 1936.146 968.073 What is the product of 4 and -41704? -166816 Work out 121426177 * -0.2. -24285235.4 Work out 0.5 * 16765877. 8382938.5 Calculate -1.2*2739.642. -3287.5704 What is 0 times 0.1742045? 0 -0.3 * 0.0366 -0.01098 4 * -4614311 -18457244 388 times 969.5 376166 Product of -135965.674 and -1. 135965.674 102178043 * 2 204356086 What is -2414 times -0.5? 1207 -4.193*-335 1404.655 Multiply -0.05943 and 9058. -538.31694 -46289805 times -0.01 462898.05 Product of 4298 and -455. -1955590 Work out -0.235246388 * 0.4. -0.0940985552 Multiply -0.22858 and 0.6359. -0.145354022 Product of 729940 and -0.315. -229931.1 What is the product of 6335361 and -13? -82359693 Calculate 4.88*0.179421. 0.87557448 What is the product of -0.5 and -30551667? 15275833.5 -8958 * 25124 -225060792 Product of -315649.3 and 4. -1262597.2 Work out -919365 * -0.77. 707911.05 What is the product of -75755972 and 5? -378779860 Multiply -4511536 and 67. -302272912 Multiply 23.75 and 0.0688. 1.634 What is the product of 253031.9 and 0.29? 73379.251 What is the product of 8 and 189606.66? 1516853.28 What is -0.20339 times 137? -27.86443 What is -0.06554 times 51.1? -3.349094 773 times -149.56 -115609.88 Product of 370.28 and 33.65. 12459.922 What is the product of -58693 and 27.51? -1614644.43 654973795 * -0.5 -327486897.5 -27.8 * -177.8 4942.84 Product of -61564746 and 0.2. -12312949.2 Work out -28 * -1229.5. 34426 Product of -0.3 and 908204.83. -272461.449 17555982*0.05 877799.1 What is the product of -4 and -8115437? 32461748 Calculate 32273780*2. 64547560 What is 0.459698 times 0.4? 0.1838792 What is 3.11 times -6.47274? -20.1302214 Product of -655.71817 and -0.4. 262.287268 1.592 times 13586 21628.912 -0.3*-45446520 13633956 5*3.404498 17.02249 Calculate -4*353.286608. -1413.146432 Multiply 0.1 and 11596348. 1159634.8 Product of 2038 and -0.06866. -139.92908 Work out -0.4 * 179357665. -71743066 Product of 1.613 and 8.766. 14.139558 Work out -51147.1 * 0. 0 What is the product of -115752385 and 0.4? -46300954 Product of 462 and -0.082058. -37.910796 What is -0.2 times 27254169? -5450833.8 Calculate 4*43654019. 174616076 Work out -1004.6 * 1.773. -1781.1558 Multiply 0.4 and -1378058. -551223.2 Multiply 5.1 and 1613871. 8230742.1 What is 119853.9 times -1? -119853.9 Multiply 97.812923 and -0.5. -48.9064615 Multiply 0.1343341 and -0.107. -0.0143737487 0.1934*-10372 -2005.9448 -920105*0.035 -32203.675 -0.24767*-206 51.02002 What is -70757 times -1.11? 78540.27 Product of 307657 and -0.2. -61531.4 What is -7.497 times 0.01256? -0.09416232 What is -303834.724 times -0.1? 30383.4724 What is the product of -0.1 and -4346661? 434666.1 Product of 108690 and -304. -33041760 -435057 times -204 88751628 What is the product of 69408 and 434? 30123072 Calculate 487109662*0.4. 194843864.8 What is the product of -102.247 and -5? 511.235 Work out 128.073 * 0.16. 20.49168 Multiply -18255.6 and -24. 438134.4 Multiply -1.0296 and 114.2. -117.58032 What is the product of -16.9 and -1647.64? 27845.116 Work out 17.4 * 15282. 265906.8 What is 0 times 1396963.1? 0 -24.395 * -4065 99165.675 90.521 times 2227 201590.267 Work out -6413 * -16173. 103717449 Product of 2.22 and 0.18441. 0.4093902 What is the product of -0.141 and 0.014604? -0.002059164 -30.706 times 32.5 -997.945 What is the product of 7.05889 and -0.213? -1.50354357 What is -4208 times -35844? 150831552 -685774 * 0.0838 -57467.8612 -33*0.72687 -23.98671 Multiply 434 and 0.1297. 56.2898 72912 times 458 33393696 -30 * 252320.3 -7569609 198.313 * -0.109 -21.616117 Work out -2242570 * 35. -78489950 Calculate -0.8*-16571601. 13257280.8 Product of -0.03 and -0.19610511. 0.0058831533 Work out 137164 * -18. -2468952 7.1385 * -0.3094 -2.2086519 What is the product of 3 and 5758436? 17275308 What is -4 times 5841.5757? -23366.3028 Product of -95 and -62.156. 5904.82 What is -7.20249 times 194? -1397.28306 -1.646*22481 -37003.726 -5.731*-221 1266.551 Calculate -148.974*-0.49. 72.99726 Multiply -903 and -0.307. 277.221 -10879 * -1.8475 20098.9525 1586585 * -9 -14279265 -433047*0.63 -272819.61 Work out -0.2312 * 217007. -50172.0184 What is the product of 1.246 and 144973? 180636.358 -14748.08 times 10.2 -150430.416 Product of 11.8 and 0.0439793. 0.51895574 Multiply -35 and -96400.5. 3374017.5 Work out 33856.68 * 2. 67713.36 -5126.8*-8 41014.4 -310*326.73 -101286.3 What is the product of -2.2 and -188.87949? 415.534878 What is -0.14 times 1.192979? -0.16701706 Product of -100246 and -0.5. 50123 What is the product of 0.1 and -0.073990377? -0.0073990377 Product of -14 and -57552.17. 805730.38 0.13189762 * 0.07 0.0092328334 -6815123*-1.1 7496635.3 6.3 * 7793724 49100461.2 Product of -15298 and -12762. 195233076 Work out -656988.26 * 5. -3284941.3 Multiply -2 and 0.58429125. -1.1685825 -0.2*7544193.9 -1508838.78 -0.37*-13861.8 5128.866 What is 1.592478 times 4? 6.369912 Product of 41437 and -3029. -125512673 Calculate 0.1*1709.8789. 170.98789 Work out -0.3 * 3.850547. -1.1551641 Product of 4.6 and 1674905. 7704563 29*-9336705 -270764445 Calculate 0.02*-2734861. -54697.22 Multiply -1.2765 and -164. 209.346 Calculate -2008602.8*-0.4. 803441.12 352635442 * -0.5 -176317721 71461943*-6 -428771658 -2 * -0.030297259 0.060594518 What is the product of -1752 and -243.06? 425841.12 Calculate -137263*-0.37. 50787.31 Calculate 3*-11120088. -33360264 -41.5*-66704 2768216 0.5 * 9983466 4991733 What is -3.5 times -750599? 2627096.5 What is 133107 times -5.9? -785331.3 Multiply -16025.6 and 0.049. -785.2544 Calculate -1465*15.22. -22297.3 -1101 times -18.845 20748.345 Work out -1 * -1899115. 1899115 Product of 39893.1 and -24. -957434.4 Multiply -0.84 and -30.392. 25.52928 What is -4007 times -998.8? 4002191.6 Work out -2.8 * 65897.58. -184513.224 1638947*-13.6 -22289679.2 Multiply -4 and 57640735. -230562940 What is the product of 0.139 and 3741? 519.999 What is 669.125 times 0.4? 267.65 Product of -0.05 and 5271213. -263560.65 Multiply 1.3 and -0.482745. -0.6275685 Calculate -2502*-4358. 10903716 What is the product of 0.38 and 40911? 15546.18 What is the product of -11848 and 3503? -41503544 Multiply 3 and -7368019.2. -22104057.6 What is the product of -38748 and 1394? -54014712 0.2 times -11151668 -2230333.6 What is the product of -104492 and -0.64? 66874.88 Work out -113.04 * 712. -80484.48 Work out 1485155 * 51. 75742905 0.43 * -493.288 -212.11384 Product of 91 and 4647. 422877 Product of 0.2 and 1331663. 266332.6 What is 237936 times 0.1? 23793.6 Work out 1.14643 * -2675. -3066.70025 -842.09*154 -129681.86 Calculate 972203*20. 19444060 44719233 * 0.01 447192.33 Work out -613 * 14702. -9012326 Calculate -7882*-12. 94584 Product of 0.032 and 3140.68. 100.50176 3 times 8416146 25248438 -0.0393 times 0.51371 -0.020188803 -272 times -41133.5 11188312 Work out 8592 * -20.7. -177854.4 Calculate 0.517*2.1208. 1.0964536 What is 766 times 222383? 170345378 What is the product of -5157173 and 3? -15471519 Multiply 13 and -18498. -240474 -1421 * -2996 4257316 Work out -2.2 * -6834115. 15
{ "pile_set_name": "DM Mathematics" }
--- abstract: 'dc and ac magnetic properties of two thin-walled superconducting Nb cylinders with a rectangular cross-section are reported. Magnetization curves and the ac response were studied on as-prepared and patterned samples in magnetic fields parallel to the cylinder axis. A row of micron-sized antidots (holes) was made in the film along the cylinder axis. Avalanche-like jumps of the magnetization are observed for both samples at low temperatures for magnetic fields not only above $H_{c1}$, but in fields lower than $H_{c1}$ in the vortex-free region. The positions of the jumps are not reproducible and they change from one experiment to another, resembling vortex lattice instabilities usually observed for magnetic fields larger than $H_{c1}$. At temperatures above $0.66T_c$ and $0.78T_c$ the magnetization curves become smooth for the patterned and the as-prepared samples, respectively. The magnetization curve of a reference planar Nb film in the parallel field geometry does not exhibit jumps in the entire range of accessible temperatures. The ac response was measured in constant and swept dc magnetic field modes. Experiment shows that ac losses at low magnetic fields in a swept field mode are smaller for the patterned sample. For both samples the shapes of the field dependences of losses and the amplitude of the third harmonic are the same in constant and swept field near $H_{c3}$. This similarity does not exist at low fields in a swept mode.' author: - 'M.I. Tsindlekht$^1$, V.M. Genkin$^1$, I. Felner$^1$, F. Zeides$^1$, N. Katz$^1$, $\check{\text{S}}$. Gazi$^2$, $\check{\text{S}}$. Chromik$^2$, O.V. Dobrovolskiy$^{3,4}$, R. Sachser$^3$, and M. Huth$^3$' title: 'dc and ac magnetic properties of thin-walled Nb cylinders with and without a row of antidots' --- Introduction ============ Penetration of magnetic flux into hollow superconducting cylinders is a long standing field of interest. The Little-Parks effect and the quantization of trapped flux were intensively studied during the last fifty years [@LITTLE; @DOU; @VEKHT]. Recent advances in nanotechnology have made it possible for studying experimentally superconducting properties of thin films with different arrays of antidots, see for example, [@Motta1] and references therein. In particular, for the observation of the aforementioned effects, cylinders or antidots of small diameter are required. At the same time, the study of hollow thin-walled cylinders with macroscopic sizes in magnetic fields parallel to its axis has been much less well studied. It was expected that quantum phenomena cannot be observed in such samples because of the fact that one flux quanta for cylinders with a cross section area of $\approx 1$ cm$^2$ corresponds to a magnetic field about $10^{-7}$ Oe. In this case magnetization will be a smooth function of the magnetic field. However, experimental results obtained recently for thin-walled macroscopic cylinders do not agree with this expectation. Namely, in such Nb cylinders we succeeded in monitoring the magnetic moment of the current circulating in the walls and observed dc magnetic moment jumps even in fields much lower than $H_{c1}$ of the film itself [@Katz1]. So far it is not clear what mechanism is responsible for such flux jumps. Under an axial magnetic field the cylinder walls screen weak external fields, provided that $L\equiv Rd/\lambda^{2} \gg 1$, where $R$ is the cylinder radius, $d$ is the wall thickness, and $\lambda$ is the London penetration depth  [@DOU; @PG; @KITTEL]. Therefore, it is expected, that a dc magnetic field, $H_0$, will penetrate into the cylinder as soon as the current in the wall exceeds the critical current and no field penetration should be observed at lower fields. Only above $H_{c1}$, vortices created at the outer cylinder surface can move into the cylinder. For a magnetic field oriented perpendicular to the Nb film surface such vortex motion leads to flux jumps [@NOWAK; @STAM]. These flux jumps were interpreted as a thermomagnetic instability of the critical state. It was demonstrated that in a sample with an array of antidots flux jump propagates along the antidots row [@MOTTA2]. Nucleation of the superconducting phase in a thin surface sheath in decreasing magnetic fields parallel to the sample surface was predicted by Saint-James and de Gennes [@DSJ]. They showed that nucleation occurs in a magnetic field $H_0\leq H_{c3}\approx 1.695 H_{c2}$. Experimental confirmations of this prediction were obtained soon after their work appeared. The experimental methods for this confirmation were dc resistivity and ac susceptibility measurements [@ROLL]. It was found that low frequency losses in superconductors in surface superconducting states (SSS) can exceed losses in the normal state [@BURGER; @ROLL]. A swept dc magnetic field qualitatively changes the character of the ac response. Specifically, the penetration of the ac magnetic field into the sample takes place not only for $H_{c2}<H_0<H_{c3}$ but also for $H_{c1}<H_0<H_{c2}$, in sharp contrast to the case of constant dc fields [@STR2; @MAX; @GENKIN22]. The effect of a swept dc field can more suitably be investigated by using hollow thin-walled superconducting cylinders, rather than by bulk samples, because one can control the field transmission through their walls. Previously, we have shown [@Genkin1] that in a thin-walled cylinder in the mixed state, the effect of sweeping a dc field on the ac response is due to an enhancement of the vortex motion through the wall. Above $H_{c2}$, however, this picture is no longer appropriate and the experimental data were explained within the framework of a simple relaxation model [@Katz1]. The goal of this paper is to study how antidots affect the penetration of dc and ac magnetic fields into thin-walled superconducting Nb cylinders of macroscopic sizes, with a rectangular cross section. We show that at low enough temperatures for both, a flat and a patterned samples, even in the *vortex-free regime* at $H< H_{c1}$, the dc magnetic field penetrates through the cylinder walls in an “*avalanche*”-like fashion. Jumps of the dc magnetic moment also become apparent at fields above $H_{c1}$ at low temperatures. For both samples, the field values at which jumps occur vary from one measurement to another, indicating that one deals with transitions between metastable states. At temperatures above $0.66T_c$ and $0.78T_c$ the magnetization curves become smooth for the patterned and the as-prepared sample, respectively. The ac response of both cylinders was studied in the point-by-point and swept field modes. In these, the signals of the first, second and third harmonics were measured concurrently. The ac response of as-prepared and patterned samples is qualitatively different in a swept field mode. Experimental ============ The cylindrical samples were prepared by dc magnetron sputtering at room temperature on a rotated sapphire substrate. The sizes of the substrate with rounded corners (radius 0.2 mm) are $1.5\times3\times7.5$ mm$^3$. We fabricated, therefore, a thin-walled hollow superconducting cylinder with a rectangular cross section. The nominal film thickness of both samples was $d=100$ nm. A sketch of the sample geometry is presented in Fig. \[f1\]. The reference sample $A$ was kept as-grown, while the second one, sample $B$, was patterned with a row of antidots at the mid of the larger surface over the entire length of the sample. The row of antidots was milled by focused ion beam (FIB) in a scanning electron microscope (FEI, Nova Nanolab 600). The beam parameters were 30kV/0.5nA, while the defocus and blur were 560$\mu$m and 3$\mu$m, respectively. The pitch was equal to the antidot center-to-center distance of 1.8$\mu$m and the number of beam passes needed to mill 150nm-deep antidots was 2000. The antidots row with a length of $7.5$mm was milled by iteratively stitching the processing window with a long size of $400\,\mu$m. SEM images of the patterned surface of sample $B$ are shown in Fig. \[f2\]. The antidots have an average diameter of 1.5$\mu$m and an average edge-to-edge distance of 300nm. The dc magnetic properties were measured using a commercial superconducting quantum interference device (SQUID), Quantum Desing MPMS5, magnetometer. The ac response was measured by the pick-up coil method. The sample was inserted into one coil of a balanced pair of coils, and the unbalanced signal was measured by means of lock-in amplifier. The ac magnetic susceptibilities were measured in absolute units, see [@LEV2]. A “home-made” measurement cell of the experimental setup was adapted to the SQUID magnetometer. A block diagram of the experimental setup can be found elsewhere [@LEV2]. The ac response as a function of the dc field were carried out by two methods: (i) - point-by-point (PBP) mode, where the dc field was kept constant during the measurement, and (ii) - swept field (SF) mode, where the dc field was ramped with a rate of 20 Oe/s. Both external ac and dc fields were directed parallel to cylinder axis and hence, to the film surface. ![Sketch of the $B$ sample. Here $\text{L}_s = 7.5$ mm, $\text{W}_s=3$ mm, and $2\text{D}=1.4$ mm are the substrate length, width and thickness, respectively. Both dc and ac fields were parallel to $Z$-axis. Dimensions are not to scale.[]{data-label="f1"}](Fig1){width="0.6\linewidth"} ![SEM images of the surface of sample $B$. The antidots have an average diameter of 1.5 $\mu$m and an average edge-to-edge distance of 300 nm. An overview SEM image is presented in the bottom panel where the row of FIB-milled antidots is clearly seen. []{data-label="f2"}](Fig2a.eps "fig:"){width="0.94\linewidth"} ![SEM images of the surface of sample $B$. The antidots have an average diameter of 1.5 $\mu$m and an average edge-to-edge distance of 300 nm. An overview SEM image is presented in the bottom panel where the row of FIB-milled antidots is clearly seen. []{data-label="f2"}](Fig2b.eps "fig:"){width="0.94\linewidth"} Results ======= dc magnetization ---------------- The upper and lower panels of Fig. \[f3\] show the temperature dependences of the magnetic moments, $M_0$, in magnetic field $20\pm 2$ Oe, of samples $A$ and $B$, respectively. The critical temperatures, $T_c$, of both samples are almost the same, 8.3 K, the transition width for sample $A$ is 1.3 K but 2.7 K for sample $B$. Sample $B$ demonstrates a two-stage transition, see the inset to the lower panel of Fig. \[f3\]. At low temperatures, the magnetic moment of sample $A$ is a factor of two larger than that of sample $B$. Temperature and field dependences of the magnetic moment were measured after cooling the sample down to the desired temperatures in zero field (ZFC). ![(Color online). Temperature dependences of the magnetic moment of samples $A$ and $B$, upper and lower panels, respectively. Inset to lower panel shows temperature dependence of $M_0$ of $B$ sample near $T_c$. []{data-label="f3"}](Fig3a.eps "fig:"){width="0.98\linewidth"} ![(Color online). Temperature dependences of the magnetic moment of samples $A$ and $B$, upper and lower panels, respectively. Inset to lower panel shows temperature dependence of $M_0$ of $B$ sample near $T_c$. []{data-label="f3"}](Fig3b.eps "fig:"){width="0.98\linewidth"} ![(Color online). $M_0(H_0)$ of samples $A$ and $B$ after ZFC, upper panel. Expanded view of the magnetization curves in low magnetic fields for samples $A$ and $B$, lower panel. []{data-label="f5"}](Fig4a.eps "fig:"){width="0.98\linewidth"} ![(Color online). $M_0(H_0)$ of samples $A$ and $B$ after ZFC, upper panel. Expanded view of the magnetization curves in low magnetic fields for samples $A$ and $B$, lower panel. []{data-label="f5"}](Fig4b.eps "fig:"){width="0.98\linewidth"} The $M_0(H_0)$ dependences for samples $A$ and $B$ at 4.5 K are shown in the upper panel of Fig. \[f5\]. The magnetization curves in the ascending branch were measured in the hysteresis mode with 5 Oe step at low fields. Fig. \[f5\] shows that the $H_{c2}$ values are different. Determination of $H_{c2}$ for sample $B$ is less accurate than that of sample $A$, due to the magnetic moment relaxation, which at high fields is larger for sample $B$ [@MIT]. An expanded view of the magnetization curves at low fields is shown in the lower panel of Fig. \[f5\]. The fields of the first jumps, $H^*$, are around 20 Oe and 10 Oe, while the number of jumps in magnetic fields up to 100 Oe are 5 and 7 for samples $A$ and $B$, respectively. Jumps of the magnetic moment were observed in a wide range of magnetic fields, including fields below $H_{c1}$ for both samples. This behavior is reminiscent of magnetic flux jumps in Nb thin films for $H_0$ perpendicular to the film surface [@NOWAK; @STAM]. The jumps observed in these papers were interpreted as a thermomagnetic instability of the Abrikosov vortex lattice [@NOWAK; @STAM]. However, existence of jumps in fields below than $H_{c1}$ and parallel to the surface have been reported in our recent work only [@Katz1]. $H_{c1}$ is $\approx 350$ Oe at 4.5 K in our samples. Direct determination of $H_{c1}$ for thin-walled cylindrical samples is impossible due to magnetic moment jumps at low fields. However, the estimation of $H_{c1}$ can be done using magnetization curves of the planar film as it shown in inset to Fig.\[f13\]. ac response ----------- The effective ac magnetic susceptibility of the sample in the external field $H(t)=H_0(t)+h_{ac}\sin (\omega t)$ is given by $$\label{Eq2} M(t)=Vh_{ac}\sum_n\{\chi_n^{'} \sin (n\omega t)-\chi_n^{''}\cos (n\omega t)\},$$ and it exhibits the appearance of the ac field penetration into the sample, i.e. $\chi_1^{'}\neq -1/4\pi$, ac losses $\chi_1^{''}>0$ and harmonics of the fundamental frequency, $\chi_n$. Here, $M(t)$ is the magnetic moment of the sample and $V$ is its volume. In what follows we consider the results of the ac measurements in both PBP and SF modes. ![(Color online). Field dependences of $\chi_1(H_0)$ of samples $A$ and $B$ in the PBP mode at 1465 and 293 Hz, upper and lower panels, respectively. Measurements were done at 4.5 K. Arrows on the lower panel show $H_{c3}$ for both samples.[]{data-label="f5aa"}](Fig5a.eps "fig:"){width="0.98\linewidth"} ![(Color online). Field dependences of $\chi_1(H_0)$ of samples $A$ and $B$ in the PBP mode at 1465 and 293 Hz, upper and lower panels, respectively. Measurements were done at 4.5 K. Arrows on the lower panel show $H_{c3}$ for both samples.[]{data-label="f5aa"}](Fig5b.eps "fig:"){width="0.98\linewidth"} The real and imaginary components of the ac susceptibility at 4.5 K for both samples measured in the PBP mode as a function of $H_0$ at two frequencies are shown in Fig. \[f5aa\]. Almost complete screening up to 12.5 kOe of the ac field by the superconducting walls is observed for both samples. This value is higher than $H_{c2} =11\pm 0.5$ kOe of sample $A$ (Fig. \[f5\], upper panel). Complete screening of ac fields by a type II superconductor at low frequencies ($\omega \ll \omega_p$, here $\omega_p$ is a depinning frequency) and amplitudes of excitation (ac current much lower than depinning current) in dc fields lower than $H_{c2}$ was observed years ago [@STR2]. The frequency dispersion of $\chi_1$ is weak for both samples. Third critical magnetic field was determined using ac data as follows. At low amplitude of excitation a loss peak located between $H_{c2}$ and $H_{c3}$. Losses disappear at $H_0>H_{c3}$ because in a normal state $\delta>>d$. Here $\delta$ is a skin depth in a normal state. Such determination of $H_{c3}$ was proposed years ago by Rollins and Silcox [@ROLL]. The lower panel of Fig.\[f5aa\] shows an example of determination of the third critical magnetic field. It was found that $H_{c3}\approx 17.5\pm 0.5$ and $16\pm 0.5$ kOe at 4.5 K for $A$ and $B$ samples, respectively. $H_{c3}/H_{c2} \approx 1.6$ for sample $A$. An accurate determination of $H_{c2}$ for sample $B$ is difficult, due to magnetic relaxation, as discussed above. The absorption line, $\chi_1^{''}(H_0)$, near $H_{c3}$ is different for samples $A$ and $B$. Thus, this line is nonuniform for sample $A$ and it is uniform but broadened for sample $B$. The ac response of superconductors even at very low amplitude of excitation, e.g., less than 1 Oe, is strongly nonlinear in the SSS [@ROLL; @Genkin1]. The second harmonic signal is absent in the PBP mode in the entire range of magnetic fields. At the same time, the third-harmonic signal exists in the vicinity of $H_{c3}$ only. The absence of the second harmonic in PBP mode is a common feature for the bulk samples as well [@CAMP]. Fig. \[f6a\] shows the field dependences of $\chi_3$, $\chi_{2,3}\equiv \sqrt{(\chi_{2,3}^{'})^{2}+(\chi_{2,3}^{''})^{2}}$, in PBP mode for samples $A$ and $B$, in the upper and lower panels, respectively. Perturbation theory with respect to the amplitude of excitation is not applicable for interpreting these experimental data. For example, according to perturbation theory, $\chi_3$ should be proportional $h_{ac}^{2}$ and this is not the case in our findings, Fig. \[f6a\]. It is known that perturbation theory cannot explain experimental data for bulk samples too [@ROLL; @GENKIN22]. We also note that there is a difference for the third harmonic signal between samples $A$ and $B$ in the PBP mode. ![(Color online). Field dependences of $\chi_3$ of samples $A$ and $B$ (upper and lower panels, respectively) in the PBP mode at 4.5 K.[]{data-label="f6a"}](Fig6a.eps "fig:"){width="0.9\linewidth"} ![(Color online). Field dependences of $\chi_3$ of samples $A$ and $B$ (upper and lower panels, respectively) in the PBP mode at 4.5 K.[]{data-label="f6a"}](Fig6b.eps "fig:"){width="0.9\linewidth"} A swept field affects the ac response more strongly at low frequencies or/and low excitation amplitudes for a given sweep rate. This was confirmed in experiments with bulk and thin-walled cylinders samples [@MAX; @GENKIN22] and [@Genkin1; @Katz1], respectively. Fig. \[f7c\] shows the field dependences $\chi_1$ for both samples $A$ and $B$ in the PBP and SF modes at 293 Hz and amplitude 0.04 Oe. The difference between the PBP and SF modes can easily be seen for both samples. The ac response at low magnetic fields in the SF mode are fluctuating due to magnetic flux jumps, Fig. \[f5\]. Near $H_{c3}$ the curves of $\chi_1$ coincide well in PBP and SF modes for both samples, Fig. \[f7c\]. The difference between the two samples in the SF mode is very pronounced in fields above 5 kOe. In particular, $\chi_1^{''}$ is a smooth function of the dc field for sample $A$, but for sample $B$ it shows step-like features in fields near 7 and 10 kOe. ![(Color online). Field dependences of $\chi_1$ for samples $A$ and $B$ (upper and lower panels, respectively) in the PBP and SF modes at 293 Hz and an excitation amplitude of 0.04 Oe. Measurements were done at 4.5 K.[]{data-label="f7c"}](Fig7a.eps "fig:"){width="0.98\linewidth"} ![(Color online). Field dependences of $\chi_1$ for samples $A$ and $B$ (upper and lower panels, respectively) in the PBP and SF modes at 293 Hz and an excitation amplitude of 0.04 Oe. Measurements were done at 4.5 K.[]{data-label="f7c"}](Fig7b.eps "fig:"){width="0.98\linewidth"} A nonlinearity can clearly be seen not only in the second and third harmonics, but in the first harmonic too. Fig. \[f11a\] shows the field dependences of $\chi_1$ of samples $A$ and $B$ at $h_{ac}=0.04$ and 0.2 Oe and T = 4.5 and 5.5 K in the SF mode. Panels $a$ and $b$ demonstrate: (i) that at low magnetic fields, losses in sample $A$ are significantly larger than losses in sample $B$ and: (ii) an increase of the excitation amplitude leads to a decrease of $\chi_1{''}$ for both samples. At $h_{ac}= 0.2$ Oe for $H_0> 5$ kOe there is a plateau and $\chi_1^{''}$ for both samples coincides with high precision. The plateau in the SF mode at high excitation amplitudes was observed at T = 4.5 K, Fig. \[f11a\]$c$ and also at 5.5 K for, Fig. \[f11a\]$b$. It appears that in this range of magnetic fields and at high enough amplitude, the first harmonic signal of the two samples is almost identical. However, a qualitative difference remains for the signals of the second and third harmonics, see Figs. \[f9a\] and \[f10a\]. ![(Color online). Field dependences of $\chi_1$ for samples $A$ and $B$ in the SF mode at 5.5 K (panels $a$ and $b$, respectively) and 4.5 K (panel $c$).[]{data-label="f11a"}](Fig8a.eps "fig:"){width="0.9\linewidth"} ![(Color online). Field dependences of $\chi_1$ for samples $A$ and $B$ in the SF mode at 5.5 K (panels $a$ and $b$, respectively) and 4.5 K (panel $c$).[]{data-label="f11a"}](Fig8b.eps "fig:"){width="0.9\linewidth"} ![(Color online). Field dependences of $\chi_1$ for samples $A$ and $B$ in the SF mode at 5.5 K (panels $a$ and $b$, respectively) and 4.5 K (panel $c$).[]{data-label="f11a"}](Fig8c.eps "fig:"){width="0.9\linewidth"} As for the second harmonic signal it is absent for both samples in the whole range of magnetic fields in the PBP mode, but becomes visible in the SF mode. Fig. \[f10a\] shows the field dependences of $\chi_2$ in the SF mode. Perturbation theory cannot explain the data for $\chi_2$ in the SF mode and $\chi_3$ in both modes. In accordance to this theory one could expect that $\chi_3\propto h_{ac}^2$ and $\chi_2\propto h_{ac}$. However, this is not the case in our experiment at any magnetic field. In our experiment, an increase of the excitation amplitude leads to a suppression of $\chi_2$. In the SF mode $\chi_2$ is larger than $\chi_3$ under the conditions of the experiment, see Figs. \[f9a\] and \[f10a\]. We note that the data for $\chi_1$, $\chi_2$ and $\chi_3$ fluctuate strongly at fields lower than 4 kOe at 4.5 K for sample $A$ due to magnetic flux jumps. ![(Color online). Field dependences of $\chi_3$ of $A$ and $B$ samples (upper and lower panels, respectively) in the SF mode at 4.5 K.[]{data-label="f9a"}](Fig9a.eps "fig:"){width="0.9\linewidth"} ![(Color online). Field dependences of $\chi_3$ of $A$ and $B$ samples (upper and lower panels, respectively) in the SF mode at 4.5 K.[]{data-label="f9a"}](Fig9b.eps "fig:"){width="0.9\linewidth"} ![(Color online). Field dependences of $\chi_2$ of $A$ and $B$ samples, upper and lower panels, respectively, in the SF mode at 4.5 K.[]{data-label="f10a"}](Fig10a.eps "fig:"){width="0.9\linewidth"} ![(Color online). Field dependences of $\chi_2$ of $A$ and $B$ samples, upper and lower panels, respectively, in the SF mode at 4.5 K.[]{data-label="f10a"}](Fig10b.eps "fig:"){width="0.9\linewidth"} It is interesting to note the following concerning the relation between field dependences of $\chi_1^{''}$ and $\chi_3$. Figs. \[f8c\] and \[f8b\] show field dependences of normalized $\chi_1^{''}$ and $\chi_3$ for samples $A$ and $B$. Upper panels in both figures correspond to the PBP mode and lower panels to SF mode. At low magnetic fields $\chi_1^{''}$ and $\chi_3$ are very small in the PBP mode for both samples. Both signals become measurable near $H_{c3}$ and the shape of these signals is identical with high precision. In the SF mode the shapes of $\chi_1^{''}$ and $\chi_3$ are again the same in the vicinity of $H_{c3}$. However, at low magnetic fields this similarity vanishes in the SF mode. Such similarity in the PBP mode can be proved in the frame of perturbation theory [@PAV], but it has not yet proven in the general case which we face in our experiment. ![(Color online). Field dependences of normalized $\chi_1^{''}$ and $\chi_3$ of sample $A$ in point-by-point and swept field modes (upper and lower panels, respectively). The shapes of $\chi_1^{"}$ and $\chi_3$ are with high accuracy identical in PBP and SF modes near $H_{c3}$. This similarity breaks in a SF mode at low magnetic fields.[]{data-label="f8c"}](Fig11a.eps "fig:"){width="0.9\linewidth"} ![(Color online). Field dependences of normalized $\chi_1^{''}$ and $\chi_3$ of sample $A$ in point-by-point and swept field modes (upper and lower panels, respectively). The shapes of $\chi_1^{"}$ and $\chi_3$ are with high accuracy identical in PBP and SF modes near $H_{c3}$. This similarity breaks in a SF mode at low magnetic fields.[]{data-label="f8c"}](Fig11b.eps "fig:"){width="0.9\linewidth"} ![(Color online). Field dependences of normalized of $\chi_1^{"}$ and $\chi_3$ of sample $B$ in point-by-point and swept field modes (upper and lower panels, respectively). The shapes of $\chi_1^{"}$ and $\chi_3$ are with high accuracy identical in PBP mode and in large fields in SF mode.[]{data-label="f8b"}](Fig12a.eps "fig:"){width="0.9\linewidth"} ![(Color online). Field dependences of normalized of $\chi_1^{"}$ and $\chi_3$ of sample $B$ in point-by-point and swept field modes (upper and lower panels, respectively). The shapes of $\chi_1^{"}$ and $\chi_3$ are with high accuracy identical in PBP mode and in large fields in SF mode.[]{data-label="f8b"}](Fig12b.eps "fig:"){width="0.9\linewidth"} Discussion ========== dc magnetization curves ----------------------- The physical reasons for the observed flux jumps at small magnetic fields are not clear. One can suggest that the alignment of the magnetic field with respect to the sample surface is not perfect. Indeed, the latter cannot be ruled out completely, and a small field component perpendicular to the surface, $H_{\bot}$, should create vortices which might be responsible for the flux jumps at small magnetic fields. Hence, one may expect that flux jumps could be present at small magnetic fields in a reference planar film as well. This assumption has been examined in an additional control experiment with a reference planar film. Figure \[f13\] displays ascending branches of the magnetization curves of the planar Nb film of 240nm thickness sputtered onto a silicon substrate, for the magnetic field inclination angles $\varphi =0^{\circ}$, $10^{\circ}$, and $45^{\circ}$. For $\varphi = 10^{\circ}$ and $45^{\circ}$ the component $H_{\bot}\approx0.17H_0$ and $H_{\bot}\approx0.71H_0$, respectively. Vortices created by this field component exist at small magnetic fields. This experiment demonstrates that in small fields the magnetic moment is a linear function of the magnetic field value and vortices created by $H_{\bot}$ *do not induce any flux jumps* at small fields. The magnetic moment at small fields remains a linear function of the magnetic field for planar films of different thicknesses. Magnetic moment jumps first appear in the magnetization curve at inclination angles larger than $10^\circ$. Such a field inclination angle is at least a factor of 3 larger than the orientational misalignment of the sample orientation with respect to the field direction in our experiment. Therefore, the results obtained for planar films suggest that the vortices created by the small field component perpendicular to the surface are not the cause for magnetic moment jumps at small magnetic fields in the cylindrical samples. ![Ascending branches of magnetization curves of planar film in parallel and tilted magnetic fields. Inset shows determination of $H_{c1}$ of the planar film.[]{data-label="f13"}](Fig13.eps){width="0.9\linewidth"} The experimental data demonstrate the existence of magnetic instabilities in fields lower than $H_{c1}$. At 4.5 K, the flux starts to penetrate into the cylinders $A$ and $B$ at $H_0 = 20$ and 10 Oe, respectively, Fig. \[f5\] (lower panel). The field of the first jump, $H^*$, is defined by the some critical current (not to be confused with a depairing current). If we assume that the critical current density in the isthmus between two antidots is the same as in the film, then the ratio $H_B^*/ H_A^*$ should be $\approx 0.16$. However, the experiment shows that this ratio is about 0.5, see Fig. \[f5\]. This means that the critical current density in the isthmuses is higher than in the as-prepared film. We note that the ratio of the magnetic moments in ZFC in field 20 Oe for samples $B$ and $A$ is 0.5, see Fig. \[f3\]. In accordance to the thermodynamic criterion [@Katz1] $H^* \propto\sqrt{d}$. Comparison $H^*$ for $A$ sample and samples from [@Katz1] shows that the thermodynamics cannot describe these magnetization jumps in samples without antidots. It was demonstrated that at low temperature and at magnetic fields higher than some critical value, $H_{th}$, the magnetization curve becomes smooth and $H_{th}$ is sufficiently larger in the sample with an array of antidots [@Motta1]. The latter experiments were carried out with the field perpendicular to the film surface. In our case we deal with the row of antidots and the magnetic field parallel to the surface. We believe that this is the main reason why $H_{th}$ is lower for the sample with antidots, see upper panel of Fig. \[f5\]. We have to mention that the difference between perpendicular and parallel geometries is crucial. For example vortex velocity in the perpendicular geometry is a few orders magnitude larger than for the parallel one, see Ref. [@Genkin1]. ac response ----------- The field dependences of $\chi_1(H_0)$ in the PBP mode are different for $A$ and $B$ samples, Fig. \[f5aa\]. Losses appear and screening decreases in magnetic fields above $H_{c2}$. Near $H_{c3}$ there is a loss peak and the shape of this peak is different for samples $A$ and $B$. The shape of the loss peak for sample $A$ is nonuniform and for sample $B$ it is broadened. The third critical field of sample $A$ is larger than for sample $B$, Fig. \[f5aa\] lower panel. However, the determination of $H_{c3}$ for sample $B$ is questionable. The difference in the ac response of samples $A$ and $B$ becomes qualitative in the SF mode, Figs. \[f7c\], \[f9a\] and \[f10a\]. Whereas the field dependences of $\chi_1$, $\chi_2$ and $\chi_3$ are smooth for sample $A$, they have peculiarities in 7 and 10 kOe for sample $B$. As we have mentioned above, the data for $\chi_1$, $\chi_2$ and $\chi_3$ are noisy and fluctuating at fields lower than 4 kOe at 4.5 K and 2 kOe at 5.5 K due to magnetic flux jumps. The behavior of the ac response in the SF mode has some similar features for both samples. Thus, an increase of the excitation amplitude and frequency leads to a decrease of $\chi_1^{''}$ in fields down to $H_{c2}$ and $\chi_2$ in the whole field range. The reason for this behavior is the following. The main physical parameter defining the difference between the PBP and SF modes is $Q=\frac{\dot{H}_0}{\omega h_{ac}}$ [@MAX; @FINK2]. The PBP mode corresponds to $Q=0$. Parameter $Q$ decreases with the excitation amplitude and/or frequency tending to zero. This is why $\chi_1^{''}$ and $\chi_2$ decrease with $h_0$ and $\omega$ and in consequence of this in the SF mode perturbation theory is not applicable. In the limiting case of high frequencies, for example, in the GHz range, a swept field with sweep rate of few tens or hundred oersted per second does not affect the ac response [@VAT]. The ac response of sample $A$ in the SF mode is similar to that reported in our previous papers [@Genkin1; @Katz1]. In this sample we observe a smooth field dependence of $\chi_1^{''}$, $\chi_2$ and $\chi_3$. The models proposed in [@Genkin1; @Katz1] can explain the experimental data for sample $A$ in magnetic fields lower and higher than $H_{c2}$. The case with the sample $B$ is more complicated. It turned out that $\chi_1^{''}$ at magnetic fields of 4 kOe ($H_0< H_{c2}$) is lower for sample $B$ than for sample $A$, see Fig. \[f11a\]$c$. The following may be the reason for this. Vortex pinning and the current induced by ac and swept fields play an important role in ac response in a swept magnetic field [@Genkin1]. The area under the row of antidots is much smaller than the total film area. This is why vortex pinning by this row antidots cannot explain loss reduction. At the same time the total induced current is lower in sample $B$ than in sample $A$, Fig. \[f3\]. This reduces the forces dragging vortices into the substrate and leads to loss reduction [@Genkin1]. The jump at $H_0\approx 5$ kOe takes place only for sample $B$, see Figs. \[f9a\] and \[f10a\]. At fields higher than the jump field the losses for both samples at $h_{ac} =0.2$ Oe are equal, panels $b$ and $c$ of Fig. \[f11a\]. The weakening of pinning in high magnetic fields could be a cause for such behavior. The nature of the jump of $\chi_{3,2}$ in magnetic fields of 10 kOe (see panels *b* of Figs.\[f9a\] and \[f10a\]) for sample $B$ in SF mode is not clear. ac amplitude is not smeared this jump completely in contrast with $\chi_1^{''}$, see panels *a* and *c* of Fig.\[f11a\]. This jump takes place in magnetic fields near $H_{c2}$ of sample $B$. Decreasing of ac losses and harmonics jump near $H_{c2}$ in a swept field was observed in single crystal Nb [@GENKIN22; @MT]. However, single crystal Nb has a well defined vortex structure and $H_{c2}$ but it is not the case with our sample. conclusion ========== We have studied the dc and ac magnetic properties of thin-walled cylinders of superconducting Nb with and without a row of antidots. Experiment showed that the critical current density is higher in the isthmus between antidots than in the film itself. The dc magnetization curves demonstrate an "avalanche”-like penetration of the magnetic flux into the cylinder for both samples. The effect was observed at a temperature of 4.5 K and completely disappeared at 7 and 5.5 K for samples $A$ and $B$, respectively. Such a behavior resembles a thermomagnetic instability of vortices but it was observed in fields below $H_{c1}$ of the films, i.e. in a vortex-free state. The effect of end faces, consisting in that the magnetic force lines is bending near the sample ends, could be another reason for flux jumps. The influence of the sample end faces on the flux jumps in such samples has to be studied using a local probe technique. The ac response of thin-walled cylinders with and without antidots is strongly nonlinear and perturbation theory cannot explain the experimental data. The ac response of $A$ and $B$ samples is similar in the point-by-point mode. However, in the swept field mode there is a qualitative difference between losses for samples $A$ and $B$. Thus, at low magnetic fields, losses in sample $B$ are lower than in sample $A$. There are jumps in $\chi_1$, $\chi_2$ and $\chi_3$ in high magnetic fields for sample $B$, but these quantities are smooth functions of the magnetic field in sample $A$. We demonstrate that field dependences of $\chi_1^{''}$ and $\chi_3$ have the same shapes in the point-by-point mode with high accuracy. In the swept field mode the shapes of $\chi_1^{''}$ and $\chi_3$ are the same in the vicinity of $H_{c3}$. This similarity has yet not been proved in the case of strong nonlinear response that we encounter in our experiment. The models developed in [@Genkin1; @Katz1] could describe the ac response of the as-prepared sample. However, these models are not applicable to the sample with a row of antidots. New models for samples with antidots have to be elaborated. As well as further experimental studies of samples with different lengths, wall thicknesses, sizes and geometry of antidots row or array have to be carried out. acknowledgments =============== We thank J. Kolacek, P. Lipavsky and V.A. Tulin for fruitful discussions. This work was done within the framework of the NanoSC-COST Action MP1201. Financial support of the grant agency VEGA in projects nos. 2/0173/13 and 2/0120/14 are kindly appreciated. Little W A and Parks R D 1962 Phys. Rev. Lett. [**9**]{} 9 Douglass D H, Jr.1963 Phys. Rev. [**132**]{}, 513 Aoyama K, Beaird R, Sheehy D E and Vekhter I 2013 Phys. Rev. Lett. [**110**]{}, 177004 Motta M, Colauto F, Otiz W A, Fritzsche J, Cuppens J, Gillijns J, Moshchalkov V V, Johansen T H, Sanchez A and Silhanek A V 2013 Appl. Phys. Lett., [**102**]{}, 212601 Tsindlekht M I, Genkin V M, Felner I, Zeides F, Katz N, Gazi S and Chromik S 2014 Phys. Rev. B [**90**]{} 014514 de Gennes P G 1966 [*Superconductivity of metals and alloys*]{} (W A Benjamin: INC New York) p 197 Kittel C, Fahy S, and Louie S G 1988 Phys. Rev. B [**37**]{} 642 Nowak E R, Taylor O W, Liu Li, Jager H M, and Selinder T I 1997 Phys. Rev. B [**55**]{} 11702 Esquinazi P, Setzer A, Fuchs D, Kopelevich Y, Zeldov E and Assmann C 1999 Phys. Rev. B [**60**]{} 12454; Stamopoulos D, Speliotis A and Niarchos D 2004 Supercond. Sci. Technol., [**17**]{}, 1261 Motta M, Colauto F, Zadorosny R, Johansen T H, Dinner R B, Blamire M G, Ataklti G W, Moshchalkov V V, Silhanek A V and Ortiz W A Phys. Rev. B 2011 [**84**]{} 214529 Saint-James D and Gennes P G 1963 Phys. Lett. [**7**]{} 306 Rollins R W and Silcox J 1967 Phys. Rev. [**155**]{} 404 Burger P, Deutscher G, Gueon E and Martinet A 1965 Phys. Rev., [**137A**]{} 853 Strongin M, Schweitzer D G, Paskin A, and Craig P P 1964 Phys. Rev. [**136**]{} A926 Maxwell E, Robbins W P 1966 Phys. Lett. [**19**]{} 629 Tsindlekht M I, Genkin V M, Leviev G I, Schlussel Y, Tulin V A, Berezin V A 2012 Physica C [**473**]{} 6 Tsindlekht M I, Genkin V M, Gazi S and Chromik S 2013 J. Phys.: Condens. Matter [**25**]{} 085701 Leviev G I, Genkin V M, Tsindlekht M I, Felner I, Paderno Yu B, Filippov V B 2005 Phys. Rev. B [**71**]{} 064506 Yeshurun Y, Malozemoff A P, Shaulov A 1966 Rev. Mod. Phys. [**68**]{} 911 Campbell S A, Ketterson J B, Crabtree G W 1983 Rev. Sci. Instrum. [**54**]{} 1191 Fink H 1967 Phys. Rev. [**161**]{} 417 Lipavsky P 2014 private communication Tulin V A 2015 private communication Tsindlekht M I, *et al.* 2016 unpublished
{ "pile_set_name": "ArXiv" }
Switching synchronization in one-dimensional memristive networks: An exact solution. We study a switching synchronization phenomenon taking place in one-dimensional memristive networks when the memristors switch from the high- to low-resistance state. It is assumed that the distributions of threshold voltages and switching rates of memristors are arbitrary. Using the Laplace transform, a set of nonlinear equations describing the memristors dynamics is solved exactly, without any approximations. The time dependencies of memristances are found, and it is shown that the voltage falls across memristors are proportional to their threshold voltages. A compact expression for the network switching time is derived.
{ "pile_set_name": "PubMed Abstracts" }
Categories Archives When developing SharePoint Framework components (web parts and extensions) you may release a single one to an environment and be done with it. Or more likely you’ll be creating multiple web parts and extensions and will need to decide how to approach SPFx packaging. Things to consider when packaging SPFx components How do I share my code between components? How do I share library code between components? How do ensure that components use the same version of the SharePoint Framework? How do I version dependencies of the components? How do I upgrade components? What is the development/test environment like? All these questions really boil down to a single question: Do you a create a multi-component SPFx project or have a project for each component? * SPOILER * I have concluded that the default approach to SPFx packaging should be to include all components into a single multi-component project. Avoid creating multiple packages where possible. Depending on the scale of the development team there may be some scenarios where this is not appropriate, in which case create as few multi-component projects as are necessary. Furthermore, I recommend creating a single multi-component JS bundle file for all web parts in package (a multi-component bundle), rather than the default approach of having a JS file for each component. SPFx config.json, multiple web parts will be packaged as a single bundle as part of a single package Terminology Multi-component project/package: SPFx packaging such that a single sppkg file is produced which deploys multiple SPFx web parts or extensions.Multi-component bundle: Only available within the context of a multi-component project, a multi-component bundle includes the JS required for all components as a single file rather than a file for each component. Or perhaps you’d like me to explain my rationale, the benefits, and where this approach may not meet your needs. In which case, please read on.. What you sacrifice by having a single project Firstly, let’s discuss what is sacrificed by packaging SPFx components into a single sppkg package? You can no longer install or upgrade components individually. (However, the new site collection scoped app catalog may assist with this.) Depending on your development environment, it may be easier to govern source code and DevOps processes during development and test. For example if you have different teams working different web parts. During development you can build and deploy individual components which may lead to time savings if/when the volume of components becomes large. (In these cases the gulp tool chain could be modified to meet requirements.) What you gain by having a single project If the above list of sacrifices aren’t deal breakers then there are many benefits to be had by taking this approach. Deployment and upgrade is trivial especially with tenant-scoped deployment – just deploy a single package to the app catalogue and you are done. The risk of having multiple web parts using different versions of the SharePoint Framework is avoided. The risk of having multiple versions of third partly libraries loaded is greatly reduced. Total payload of components will be much smaller due to reduced duplication of shared code, library code (especially Office UI Fabric), and the framework itself due to multi-component bundling. Sub-optimal usage of external references, static vs dynamic import statements, and the bloat that some recommended frameworks currently inflict (Office UI Fabric React…) can lead to very substantial page weight increases. By using a multi-component bundle the worst case scenarios are avoided as in most cases these issues will impact a solution once for each bundle. Versioning of shared code is trivial because you don’t have to it. Internal dependencies are including the bundle and external dependencies are referenced to only once. The framework itself handles the component versioning for you. And finally… I’d be particularly interested to hear from people who have found strong reasons to package components individually because currently I believe that the benefits of multi-component SPFx packaging outweighs the benefits in nearly all scenarios. I recently joined Jeremy Thake of Hyperfish and my colleague David Bowman to host a webinar focussed mainly on some our favourite announcements that came out of Ignite 2017. I have a list of my recommended viewing from the conference at the end of this post. The webinar was to have primarily a non-technical audience so it doesn’t get deep into many particularly technical topics but it does give a good overview of some of more important announcements of Ignite 2017, in my humble opinion. I recently wrote a post for my employer about the recent history of SharePoint extensibility models. It also touches on how we as company settled on the model with which we are currently delivering our Intranet/Digital-Workplace solution. I discuss the Feature Framework, Farm and Sandboxed Solutions, SharePoint Add-in Model, SharePoint Framework, Remote Provisioning, and more. The Office 365 CDN (Content Delivery Networks) may be activated to host SharePoint Online files in a more globally accessible manner. The general premise behind this is that static assets can be served to users from a location more local to them than the data centre in which the Office 365 tenant is located. I won’t go into the real benefits of this beyond to say that my limited testing at this point leads me to believe that the performance impact of using a CDN will be negligible for the vast majority of users/organisations. This is because the volume of data which can be served via the CDN is not a significant proportion of the data impacting page load speed. Regardless, the documentation around how to get started with the Office 365 CDN is decent. A good place to start is this link. A couple of gotchas I’ve noticed Fetching an image rendition using the width query string parameter does NOT correctly return the image rendition as configured. It simply scales the image to the specified width (i.e. no cropping or positioning is performed). If all users are located in the same region as the Office 365 tenant, turning on the CDN may reduce performance due to CDN priming (replication of files to the CDN) and will complicate updates to files which are replicated (e.g. JavaScript in the Style Library). Office 365 CDN PowerShell Samples I’ve got some sample PowerShell below showing how to activate the Office 365 CDN (there’s private and public, you can use either or both) and associate origins with it (an origin is a document library which will be replicated to the CDN). I’ve also got a simple sample of how to remove all origins as there is not a single cmdlet for this. It is worth noting that although an enabled CDN with no origins is functionally identical to a disabled CDN (i.e. no files are being replicated) they are not the same from a configuration perspective. Please note that these are just sample scripts and have not been parameterised as you may require. Calling the PowerShell functions: $cdnType = "Private" # Private or Public $serverRelSiteCollectionUrl = "/sites/mysite" # site collection URL or * for all site collections Authenticate-PowerShell Set-CdnConfiguration $serverRelSiteCollectionUrl $cdnType #Remove-CdnConfiguration $cdnType # This removes all origins but the CDN is still enabled #Set-SPOTenantCdnEnabled -CdnType $cdnType -Enable $false # This disables the CDN OAuth 2.0 (and hence Azure Active Directory) provides the On-Behalf-Of flow to support obtaining a user access token for a resource with only a user access token for a different resource – and without user interaction. This supports the scenario where a secured Web API acts as an interface to other resources (a.k.a endpoints) secured by the same identity provider and that require user context. As a practical example, a mobile client accesses some resources via a middle tier API which provides services such as data processing, caching, API simplification/optimisation, joining of datasets, etc. The OAuth flow that achieves this is called the On-Behalf-Of flow; this makes sense as we’re facilitating the middle tier to act on behalf of the client when it accesses the resources farther down. Using the on-behalf-of flow to access a resource via a middle tier API Some background Authentication with an OAuth 2.0 identity provider (such as AAD) produces JWT tokens. These tokens include information such as which claims (permissions) the user should be granted and the particular resource at which the token is valid (such as graph.microsoft.com). The OAuth 2.0 framework is specified such that a given token can only ever be valid for a single resource. This means that the token received by an endpoint (such as an Azure App Service Web API) cannot be used to directly authenticate to ‘another resource’. This is because the token’s resource will be that of the Web API and not the ‘other resource’. To see this I recommend checking out jwt.io and cracking open some tokens. For completeness, the ‘other resource’ could be accessed using app-only authentication if it supports it, and if user context is not required (i.e. the return value will be the same regardless of the user) although this may greatly increase complexity in a multi-tenant scenario. Configuring AAD for on-behalf-of Before we get to the code the first hurdle is configuring AAD app registrations correctly. Initially it may be tempting to consider having both the Client and Web API layers utilise a single AAD app registration. After all, they are same holistic ‘app’ and how else can we get a user to consent to the permissions required by the Web API app when there is no interactive interface at that point? The latter point is resolved by explicitly binding the app registrations so that both are consented to as one. I mention how this is done below. By having two app registrations the flexibility of configuration is improved; we can have a Native app registration for the client and a Web API app registration for the Web API, we can have implicit flow configured for one app and not the other, and generally have granular control over configuration. Most vitally, an app registration can’t issue tokens valid for its own resource so two app registrations is a requirement. I’ll avoid stepping though the configuration of the app registrations here as this is available elsewhere including this GitHub project. I will give a high level overview of what needs to happen. If supporting multi-tenant authentication ensure availableToOtherTenants is set to true in the manifest Create app registration for the Client Assign permissions to the app registration created above for the Web API If supporting multi-tenant authentication ensure availableToOtherTenants is set to true in the manifest Associate app registrations In the manifest for Web API app registration, configure knownClientApplications to reference the App ID for the app registration created for the Client. E.g. "knownClientApplications": ["9XXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXc"] This binds the app registrations such that the Web API app registration is consented to as part of a single consent dialog displayed to a user when they authenticate to the Client app registration. Before and after the app registrations are associated. Note how ‘Access Mobile App Backend’ is no longer present and instead is expanded to show the individual permissions required by that app. I was inspired to write this post not because this information isn’t available but because the information is hard to find if you aren’t familiar with the term “On-Behalf-Of”. Hopefully this post will be found by those of you searching for terms like “trade access token for new resource”, “change token resource”, “use access token with multiple resources/endpoints”, “access Microsoft Graph via Web API”, etc. Back in SharePoint 2010 the RSS Viewer web part (a.k.a RSS Aggregator web part, RSSAggregatorWebPart) supported the use of XSL templates which contained script tags. There were a few funny things you had to in order get it working but it did work. Bring on SharePoint Online and it is not possible to add a script tag to your XSL templates (I believe this ‘issue’ exists on SharePoint 2013 as well). More accurately, script tags can be added and will rendered to the page but the script will not be executed. In this day and age the correct answer is very likely: “why are you using this web part?” or “XSL are you mad?”. Both very strong arguments, but regardless, for the record you can code (hack) your way around this issue. Use the onerror handler of an image tag to instantiate your JS. Ensure that the img tag is rendered as the last element in your template if you plan on using the js to modify the DOM. The error However, when doing this you may have encountered the following error: Failing to add the ADAL package Could not install package ‘Microsoft.IdentityModel.Clients.ActiveDirectory 3.13.9’. You are trying to install this package into a project that targets ‘.NETPortable,Version=v4.5,Profile=Profile259’, but the package does not contain any assembly references or content files that are compatible with that framework. For more information, contact the package author. I’m using Visual Studio 2017 (VS2017) with Xamarin for Visual Studio 4.5. The Cross Platform App project template has it’s Target Framework Profile configured to Profile259 as stated in the error. This profile is an alias for the set of supported target frameworks. This profile doesn’t include Windows 10 Universal Windows Platform and does include Windows Phone 8 and 8.1 which are not supported. Profile7 represents a set of target platforms which is supported. The TargetFrameworkProfile can be seen by viewing csproj file in a text editor. Changing the target frameworks In order to change the set of target frameworks, right click the project, click Properties, then click Change... under Targeting. Changing the target frameworks for a PCL Add Windows Universal 10.0. Adding support for UWP implicitly removes support for Windows Phone 8 and 8.1. If you don’t see Windows Universal 10.0 it may because you need to have Windows 10 installed. Click OK. And you’ll see another error: Exisitng nuget packages prevent changing the target framework profile The resolution In order to get around this, go back to the nuget package manager and uninstall all packages installed against the PCL project. In my scenario, this is only the Xamarin.Forms package. If you’ve got others because you are working from another template, uninstall those too, but remember to note them down as you’ll likely want to re-install them once the target framework profile has been changed. Unistall any nuget packages on the PCL You can now go back the project properties and successfully update the target framework profile. Note that after adding Windows Universal 10.0 it may look as though it has not been added. This appears to be a UI bug but as long as there are no errors it will have worked correctly. You can confirm this by checking the TargetFrameworkProfile in the csproj file. Now that the target framework profile has been updated, the nuget packages which were uninstalled should now be re-installed and the ADAL library should successfully install as well. This post provides a lightweight implementation of the OAuth implicit flow grant for obtaining an access token. Implicit flow is appropriate when the current user is authenticated to a common identity provider (e.g. Azure Active Directory a.k.a AAD) and the client (the environment requesting the token) is not secure. A great example of this is making a call to the Microsoft Graph from a page in SharePoint Online using only JavaScript. The ADAL.js library exists as an authentication solution specifically for when working against AAD as the identity provider. Unfortunately, it is currently not well maintained and is over complicated.EDIT: ADAL.js has been updated multiple times since this post was first written and I would recommend using it. From a user experience perspective, the implementation discussed in this post avoids the need to redirect in order to authenticate. It happens seamlessly in the background via a hidden iframe. Azure Active Directory A great article on the OAuth grants, agnostic of implementation, can be found here. Thanks to my colleague Paul Lawrence for writing the first iteration of this code. This code has a dependency on jQuery, mostly just for promises. I know, old school. I expect I’ll write an es6/2016 version of this soon enough but it shouldn’t be a challenge to convert this code yourself. As I know I’ll get comments about it if I don’t mention it, this code doesn’t send and verify a state token as part of the grant flow. This is optional as far as the OAuth specification is concerned but it should be done as an additional security measure. Although I’m Microsoft stack developer and have only tested this with AAD as the identity provider, I believe that it should work for any identify provider that adheres to the OAuth specification for authentication. You would need to play around with the authorisation server URL as login.microsoftonline.com is specifically for authenticating to AAD. I’d love feedback on this. By definition, the OAuth implicit flow grant does not return a refresh token. Furthermore, the access token has a short lifetime, an hour I believe, and credentials must be re-entered before additional access tokens can be obtained via the implicit flow grant. The code provided in this post handles this by returning a URL which can be used to re-authenticate when a request fails. This URL can be used behind a link or redirection could be forced to occur automatically. The following code snippet is an example of using this implicit flow library to call into the Microsoft Graph from within the context of a SharePoint Online page. You will need to provide an appropriate AAD app ID for your AAD app. And don’t forget that you need to enable implicit flow via the app manifest and associate the correct delegate permissions. This code should work not only with the Microsoft Graph but also to SharePoint Online endpoints, other AAD secured resources such as Azure services or your own AAD secured and CORS enabled web API. [See note above about identity providers other than AAD] And here is the definition of the cache functions used above. Nothing special here, this could be swapped out with any cache implementation or removed altogether if caching is truly unnecessary or a security concern. The new SharePoint Framework (SPFx) is currently in developer preview. In order to really get into it and start making great new web parts a developer needs to get a handle on TypeScript. The initial preview iteration of the SPFx shipped with very strict linting rules (tslint) and it forced (in)experienced developers to follow many best practices regarding not just typescript but es6/es2015 conventions as well. This was done by reporting linting errors as build failures as part of the Glup build chain. Later drops of the SharePoint Framework have relaxed these linting rules but it is still less than ideal only being prompted about these issues at transpile/compile-time. The set of linting rules that is used in the build process is defined in a tslint.json file within the root config folder. The tslint file that is provided by the SPFx generator When it comes to developing SPFx web parts I have found Visual Studio Code to be great, as it is lightweight has an integrated terminal and github support and has extensions – noticeably a nice tslint extension. Unfortunately this extension does not support the JSON format nor all of the rules specified in tslint file provided by SPFx generator. The TSLint VS Code extension So here it is, my SPFx tslint file for use in VS Code. Just drop this file in the root of your src directory. Add this tslint file to the root of the src folder The following file is based on a core set of rules from SPFx Drop 2 with the incompatible rules removed and I’ve taken some liberty by adding my own preferred rules. Of course you can change these as you need, a list of the rules which the extension supports can be found here. I have also included an ‘extended’ version of the tslint file that is provided in the config folder further below. Brag: I was invited to the SharePoint Framework Dev Kitchen last month where they held a hackathon amongst Microsoft partners in order to test an early build. I think that the SPFx is going to be excellent and I have already build a number of web parts with it. But this post isn’t really about that. I won the hackathon with a highly configurable ‘My Documents’ style web part and received a top of the line Surface Book. Just wanted to brag about it.
{ "pile_set_name": "Pile-CC" }
One of my friends told me that his co-worker wanted to redesign the company website and use a lot of animated gifs to make it "exciting". (hmmmmmm.... there's a thought...)...(on another note, welcome to "animated gif hell")... the restaurant story another christmas story wild west monkey the mailman story Hey, I'm not crazy about animated gifs, but... I have to admit, for the time that I was initially putting this site together, I did find it kind of amusing. Yeah, it's true, I think animated gifs can be annoying, but... unless they're done in a "tasteful" way, (or... happen to be out of the ordinary), they can be pretty alright. Now... unless you've actually gone to those particular sections where I placed the animated gifs, you'll have no idea what these here are. As for the ones in this section, no matter how silly or lame as they can be, each served their purpose, and... aside from the ones above that were used in the "children's stuff" section, I think that the other ones were more interesting, or... at least worthwhile showing here. alien abduction story For example... this image here to the left, was originally for the header for a children's story I wanted to do about a boy getting abducted by aliens, and I thought it'd be really funny to do a little stick figure abduction thing, but... for what I wanted, the file was too large to have people "waiting" on it, so... modified it about as basic as i could get it. It worked out fine, but... I never was "completely" happy with it. rotating razor blade frog in a tea cup turtle - love broken heart See... what did I tell you... ? how much fun were these animated gifs to see around this site. For those of you who have taken the time, the razor blade (above and below), are from "songs to kill yourself to", the frog trapped in the tea cup is right on the main page, (if you watch him long enough, you'll see him *blink* in a very subtle way. Uhmmmm... as for "turtle-love", (one of my favorites), well, check out the "dark stuff" section and also the limerick that reads next to it. Then there's the beating broken heart from the "great love songs" section, (which by the way, I'm considering working on a volume IV to... am very excited about that)... slicing razor boiling skeleton hydrant punk-ass frog As for the 3 animated gifs just above here, everyone who's been to the "dark stuff" section is sure to see the "boiling skeleton" welcoming you inside with a short disclaimer. The one in the middle was for a "job", which... I'm... kind of believing wasn't used even though I was paid for it. Was for a product called "hydrant", and... well, they wanted a dog urinating on a hydrant. Click on it check it out, it's fun. For all those people who never take the opportunity to say "hello" or send an email my way (and believe me, I do appreciate them), you would all have missed the "email" section where there was a nice tailored form with the "punk-ass" royalty frog on it. Once again, the gif I had in mind was slightly longer, but... too long for anyone to wait to see it unless they were writing a long message. Here, you can find the full length when the frog "peaks out" a first time before actually emerging from the mug to release a fly. (Go ahead, send me email and check it out... !)... Now... as far as this one goes, it's the original "alien abduction" gif that was cut from the site on the file size being too big. (898k). Check it out if you dare, it's pretty hefty but... funny to watch.... (sort of)... Now... would I make any more animated gifs given the chance... ? hmmmmm.... ? I don't know... I... think I'd like to have a little fun with flash... maybe see how silly I can get...
{ "pile_set_name": "Pile-CC" }
11 Designer Classic Bags You Should Have ... Are you considering getting a designer bag and don't know which one to splurge on? I think I might be able to help you with this dilemma! Being a fashionista on a budget myself, I had to come up with a shopping-for-designer- handbags tactic. And after doing a little research, I found out that there are some timeless designer classic bags a gal truly needs since the rest of the bags are just a slight variation on these 11: 1. Louis Vuitton Monogram Speedy Bag (Your reaction)Thank you! Louis Vuitton have never been more popular than they are right now. But believe it or not, Louis Vuitton Mongram Speedy Bags have been the "it" bags for over 50 years now... The size of the bags varies from Speedy 25 to Speedy 40 and so does the price: $675.00 - $750.00, they are available in Louis Vuitton online store, but I am sure you will prefer to buy your LV in a Louis Vuitton boutique near you.
{ "pile_set_name": "Pile-CC" }
**Ethics** **Informed Consent:** All subjects in the study gave written informed consent or the institutional review board waived the need to obtain informed consent. **Peer-review:** Externally peer-reviewed. **Authorship Contributions** Surgical and Medical Practices: W.M., A.C., S.P., Concept: W.M., Design: W.M., Data Collection or Processing: W.M., A.C., S.P., Analysis or Interpretation: W.M., A.C., S.P., Literature Search: W.M., A.C., S.P., Writing: W.M. **Conflict of Interest:** No conflict of interest was declared by the authors. **Financial Disclosure:** The authors declared that this study received no financial support. ![A 65-year-old male had a liver transplant one year prior, for hepatitis B cirrhosis and hepatocellular carcinoma (HCC) with a 3.5 cm lesion in the left lobe and a 4 cm lesion in the right. For several months prior to positron emission tomography/computed tomography (PET/CT), the patient had persistently elevated liver function tests but multiple transjugular biopsies showed no evidence of transplant rejection. Seven endoscopic retrograde cholangiopancreatographies (ERCPs) were performed as the patient developed recurring stenoses and strictures of intrahepatic bile ducts, with failed attempts of cannulation, balloon dilation and stent replacements. The patient tested positive for Epstein-Barr virus and underwent PET/CT to rule out post transplant lymphoproliferative disease (PTLD). Maximum intensity projection images showed multiple foci of intense ^18^F-FDG uptake in the liver in segments 5, 6, 7 and 8, with maximum standardized uptake value of 9.0, concerning for malignancy.](MIRT-27-37-g1){#f1} ![Transaxial and coronal views of the PET/CT fusion images showed multiple foci of intense ^18^F-FDG uptake in the liver, although no obvious mass lesions were seen on the CT. An ERCP done 1 month after PET/CT showed multiple strictures involving the common hepatic duct and its intrahepatic segments associated with stones, debris and a failed right hepatic biliary stent. The liver was explanted and histopathological evaluation showed a cirrhotic liver weighing 1260 g measuring 20x14.5x7.2 cm. The surface of the liver revealed homogeneous macronodular appearance with absence of infarctions. Ducts of the right and left lobe appeared dilated, and sectioning showed large bile duct necrosis, acute cholangitis, bile duct obstruction changes and periportal fibrosis (stage 2/4). There was no evidence of malignancy within the explanted liver. Liver transplantation is a standard treatment for patients with end stage liver disease. Biliary complications of liver transplantation remain a significant problem with bile leak and stricture rates of \~20%, majority of them being related to biliary anastomosis ([@ref1],[@ref2]). Re-transplantation is required following the development of ischemic type biliary strictures or ischemic cholangiopathy which is defined as intra or extra-hepatic biliary stricture in the presence of a patent hepatic artery ([@ref3]). The only ^18^F-FDG positive liver transplant complications reported in the literature are PTLD and recurrent HCC ([@ref4],[@ref5]). ^18^F-FDG PET/CT is widely used to assess for extrahepatic metastases prior to liver transplantation ([@ref6]). PET/CT has also been found to be useful as a predictive parameter for evaluation of early HCC recurrence after liver transplantation ([@ref7]). In light of the increasing use of PET/CT in liver transplant patients, it is important to be aware of lesions that mimick malignancy. In our case, foci of increased ^18^F-FDG uptake in the transplanted liver were concerning for malignancy but were found to be benign inflammatory and ischemic changes including large bile duct necrosis, acute cholangitis, bile duct obstruction changes and periportal fibrosis. In non-transplanted liver, several non-malignant processes have been described to take up ^18^F-FDG including: intrahepatic cholestasis ([@ref8]), acute cholangitis ([@ref9],[@ref10]), sclerosing cholangitis ([@ref11]), liver abscess ([@ref12],[@ref13]), hepatic pseudotumor ([@ref14]), and hepatic sarcoidosis ([@ref15]).](MIRT-27-37-g2){#f2}
{ "pile_set_name": "PubMed Central" }
If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. A black pudding attacks by grabbing and squeezing their prey.Acid (Ex): The creature secretes a digestive acid that dissolves organic material and metal quickly, but does not affect stone. Any melee hit or constrict attack deals acid damage, and the opponent?s armor and clothing dissolve and become useless immediately unless they succeed on DC 21 Reflex saves. A metal or wooden weapon that strikes a black pudding also dissolves immediately unless it succeeds on a DC 21 Reflex save. The save DCs are Consitution-based. The pudding?s acidic touch deals 21 points of damage per round to wooden or metal objects, but the ooze must remain in contact with the object for 1 full round to deal this damage.Constrict (Ex): A black pudding deals automatic slam and acid damage with a successful grapple check. The opponent?s clothing and armor take a ?4 penalty on Reflex saves against the acid.Improved Grab (Ex): To use this ability, a black pudding must hit with its slam attack. It can then attempt to start a grapple as a free action without provoking an attack of opportunity. If it wins the grapple check, it establishes a hold and can constrict.Split (Ex): Slashing and piercing weapons deal no damage to a black pudding. Instead the creature splits into two identical puddings, each with half of the original?s current hit points (round down). A pudding with 10 hit points or less cannot be further split and dies if reduced to 0 hit points.Skills: A black pudding has a +8 racial bonus on Climb checks and can always choose to take 10 on a Climb check, even if rushed or threatened.System Reference Document -> List of Creatures This article is a D20 reference pageThe System Reference Document is a comprehensive toolbox consisting of rules, races, classes, feats, skills, various systems, spells, magic items, and monsters compatible with the d20 System version of Dungeons & Dragons and various other roleplaying games from Wizards of the Coast.
{ "pile_set_name": "Pile-CC" }
Links Tuesday, July 25, 2006 Has anyone had any custom-made religious or symbolic jewelry made to order? I'm interested in finding a jeweler to make a specific symbol as a pendant. But I'm a little leery of just finding someone on the internet and sending them money. Any recommendations?
{ "pile_set_name": "Pile-CC" }
User authentication using techniques such as passwords, one time passwords, hardware or software smart cards, etc., have all proven to be either too weak and susceptible to man in the middle (MITM) or man in the browser (MITB) attacks, or else have proven too cumbersome and expensive. The use of single sign on techniques such as OpenID, FaceBook Connect, etc., only make the problem worse as once the attacker has compromised the master account they can now break into all other accounts that rely on that initial login. Further, the focus of attackers has shifted from trying to break the login process to using sophisticated techniques to come in after the act of login and to attack the transactions being performed. This has made transaction authentication, the act of confirming if the transaction seen at the back end web server is identical to that intended by the user, even more important. Out of band authentication (OOBA), a technique by which a transaction is relayed to the user, and confirmation obtained, using an alternate form of communication, for instance by placing a voice phone call or a text message, is a promising alternative, but is also to inconvenient and costly to be used very often. It might be useful for the highest value transactions, or rare events like password resets, but using it for large number of transactions is too costly and cumbersome. In prior work (see the related applications identified above), we described an innovation that addresses some of these problems. Specifically, we introduced the notion of the establishment of a security server that communicates with an independent pop-up window on the user's desktop that is being used to access the website. We described how this security server can alert the user, via communications to the pop-up as to the legitimacy of the web site the user is browsing via their browser. We also described how this pop-up window can provide a user with a one time password to enable login into the web site (i.e. authentication of the user to the website), based on a secret shared between the web site and the security server. Of particular utility in this invention was that it provided the security of one time passwords, but did not require a per user shared secret which all prior one time password systems have required. The innovations described herein extend our prior work to provide for (i) transaction authentication, (ii) different hardware and software form factors as substitutes for the browser based pop up, and (iii) using accumulated login and transaction data as an input to a risk management engine.
{ "pile_set_name": "USPTO Backgrounds" }
Featured Research from universities, journals, and other organizations New insight into the brain's ability to reorganize itself Date: March 19, 2011 Source: University of Michigan Health System Summary: New research brings scientists one step closer to to isolating the mechanisms by which the brain compensates for disruptions and reroutes neural functioning -- which could ultimately lead to treatments for cognitive impairments in humans caused by disease and aging. Share This New research bring scientists one step closer to isolating the mechanisms by which the brain compensates for disruptions and reroutes neural functioning -- which could ultimately lead to treatments for cognitive impairments in humans caused by disease and aging. When Geoffrey Murphy, Ph.D., talks about plastic structures, he's not talking about the same thing as Mr. McGuire in The Graduate. To Murphy, an associate professor of molecular and integrative physiology at the University of Michigan Medical School, plasticity refers to the brain's ability to change as we learn. Related Articles Murphy's lab, in collaboration with U-M's Neurodevelopment and Regeneration Laboratory run by Jack Parent, M.D., recently showed how the plasticity of the brain allowed mice to restore critical functions related to learning and memory after the scientists suppressed the animals' ability to make certain new brain cells. The findings, published online this week in the Proceedings of the National Academy of Sciences, bring scientists one step closer to isolating the mechanisms by which the brain compensates for disruptions and reroutes neural functioning -- which could ultimately lead to treatments for cognitive impairments in humans caused by disease and aging. "It's amazing how the brain is capable of reorganizing itself in this manner," says Murphy, co-senior author of the study and researcher at U-M's Molecular and Behavioral Neuroscience Institute. "Right now, we're still figuring out exactly how the brain accomplishes all this at the molecular level, but it's sort of comforting to know that our brains are keeping track of all of this for us." In previous research, the scientists had found that restricting cell division in the hippocampuses of mice using radiation or genetic manipulation resulted in reduced functioning in a cellular mechanism important to memory formation known as long-term potentiation. But in this study, the researchers demonstrated that the disruption is only temporary and within six weeks, the mouse brains were able to compensate for the disruption and restore plasticity, says Parent, the study's other senior author, a researcher with the VA Ann Arbor Healthcare System and associate professor of neurology at the U-M Medical School. After halting the ongoing growth of key brain cells in adult mice, the researchers found the brain circuitry compensated for the disruption by enabling existing neurons to be more active. The existing neurons also had longer life spans than when new cells were continuously being made. "The results suggest that the birth of brain cells in the adult, which was experimentally disrupted, must be really important -- important enough for the whole system to reorganize in response to its loss," Parent says. The research was supported by grants from the National Institutes of Health, National Institute on Aging, National Institute of Neurological Disorders and Stroke. Temme is a National Science Foundation Graduate Research Fellow and was also supported by a U-M Rackham Merit Fellowship. University of Michigan Health System. "New insight into the brain's ability to reorganize itself." ScienceDaily. ScienceDaily, 19 March 2011. <www.sciencedaily.com/releases/2011/03/110318091014.htm>. University of Michigan Health System. (2011, March 19). New insight into the brain's ability to reorganize itself. ScienceDaily. Retrieved March 3, 2015 from www.sciencedaily.com/releases/2011/03/110318091014.htm University of Michigan Health System. "New insight into the brain's ability to reorganize itself." ScienceDaily. www.sciencedaily.com/releases/2011/03/110318091014.htm (accessed March 3, 2015). More From ScienceDaily More Mind & Brain News Featured Research Mar. 3, 2015 — The literary great Marcel Proust wore ear-stoppers because he was unable to filter out irrelevant noise -- and lined his bedroom with cork to attenuate sound. Now new research suggests why the ... full story Mar. 3, 2015 — Attendance at schools exposed to high levels of traffic-related air pollution is linked to slower cognitive development among 7- to 10-year-old children in Barcelona, according to a new ... full story Mar. 3, 2015 — No significant change in home habits of smokers have been observed in the aftermath of a ban on smoking in public spaces, researchers report. Greater inspiration to kick the habit likely comes from ... full story Mar. 3, 2015 — Heart function has been associated with the development of dementia and Alzheimer's disease through a new study. Participants with decreased heart function, measured by cardiac index, were two to ... full story Mar. 3, 2015 — Children of recently separated or divorced families are likelier to drink sugar-sweetened beverages than children in families where the parents are married, putting them at higher risk for obesity ... full story Mar. 3, 2015 — Although sedatives are often administered before surgery, a randomized trial finds that among patients undergoing elective surgery under general anesthesia, receiving the sedative lorazepam before ... full story Mar. 3, 2015 — Why do people shake hands? A new study suggests one of the reasons for this ancient custom may be to check out each other's odors. Even if we are not consciously aware of this, handshaking may ... full story Mar. 3, 2015 — It appears that stress markers in unemployed people can be found, independent of smoking, alcohol consumption and overweight/obesity. Results from a study suggest that long-term unemployment may be ... full story Mar. 3, 2015 — On the heels of an American nationwide measles outbreak comes a report that campaigns aimed at scaring people about the consequences of non-vaccination might not be as effective as many think. ... full story Mar. 3, 2015 — Doctors write millions of prescriptions a year for drugs to calm the behavior of people with Alzheimer’s disease and other types of dementia. But non-drug approaches actually work better, and carry ... full story Related Stories Nov. 18, 2014 — Scientists have revealed the mechanisms that enable certain brain cells to persuade others to create ‘Mexican waves’ linked with cognitive function. Inhibitory neurons can vibrate and they are ... full story Mar. 20, 2013 — Cognitive problems with memory and behavior experienced by individuals with schizophrenia are linked with changes in brain activity; however, it is difficult to test whether these changes are the ... full story Apr. 27, 2012 — Aging may seem unavoidable, but that's not necessarily so when it comes to the brain. So say researchers based on counterintuitive evidence that it is what you do in old age that matters when it ... full story Feb. 22, 2012 — A pioneering new study finds that a specific type of computerized cognitive training can lead to significant neural and behavioral improvements in individuals with schizophrenia. The research reveals ... full story Dec. 8, 2010 — Medical researchers have found a missing link that explains the interaction between brain state and the neural triggers responsible for learning, potentially opening up new ways of boosting cognitive ... full story ScienceDaily features breaking news and videos about the latest discoveries in health, technology, the environment, and more -- from major news services and leading universities, scientific journals, and research organizations.
{ "pile_set_name": "Pile-CC" }
Localized glenoid hypoplasia. An anatomic variation of possible clinical significance. Examinations were done on 1150 scapular bone specimens from museum collections. A localized hypoplasia of the posteroinferior glenoid was found in significant numbers (20%-35%) depending on the population group studied. Criteria were established for the identification of this variant in computed tomography and magnetic resonance studies. Localized hypoplasia of the posteroinferior glenoid was detected as an incidental finding in 54 (18%) of 300 such studies. Using these same imaging criteria in a prospective manner, 9 of 12 patients seen for voluntary multidirectional instability of the shoulder displayed a localized posteroinferior glenoid hypoplasia. This phenomenon also may add to the picture of extreme posterior glenoid wear that sometimes is seen in association with osteoarthritis of the shoulder.
{ "pile_set_name": "PubMed Abstracts" }
OTTAWA -- A federal program that buys internships for science-and-technology graduates is pricey, with administration costs as high as 44 cents for every dollar spent. That's among the findings of a draft evaluation of the Industrial R&D Internship program, created with fanfare by the Harper government in 2007 and currently spending $13.8 million in tax dollars each year. The evaluation from October last year found that high overhead costs begin at the Natural Sciences and Engineering Research Council, the federal agency that runs the program. The council, through its Networks of Centres of Excellence arm, spends about six cents per dollar on administration, higher than for other similar agency initiatives. But costs also include the overhead of two non-government agencies that actually deliver the program, Mitacs and Connect Canada, both non-profits. The report says combined costs hit 44 cents for every internship dollar spent in 2009-2010, though officials say the level has since fallen, to about 36 cents currently. "Administration costs are very high in comparison to those of other programs," the draft report concludes. "There are mixed opinions among key informants regarding whether the ... program is an efficient and economical mechanism to deliver R&D internships." The draft report was obtained by The Canadian Press under the Access to Information Act. It was commissioned from a Vancouver consultant, Ference Weicker & Co. Ltd., for $158,000, including travel. The internship program for science and technology graduates was announced in the March 2007 federal budget, with the goal of eventually funding 1,000 spots in private firms each year. "Businesses will benefit from the knowledge and skills brought by students," said the announcement, "while interns will acquire hands-on research experience and greater exposure to research challenges and opportunities in the private sector." The program was made permanent in 2009, and paid for 970 internships by 2011-12. Its base budget is $6.9 million annually, though that was topped up by almost $7 million for the current fiscal year. The program pays a minimum of $10,000 for each four- to six-month internship, to a maximum of half the total cost. Universities, provinces and private-sector firms pay the balance, and most of the positions are in computer science and engineering. The evaluation gives the program high marks for relevance and effectiveness, but raises fundamental questions about costs. The report cited the fact that two non-profits deliver the program rather than one, which may increase fees. Restrictive rules on eligibility may also be adding to expenses. "Although there was general agreement ... that the costs of delivery are high, there were differing opinions as to whether those high costs are warranted," the authors found. "Some argued that this is an expensive but effective and needed program, which requires extensive on-the-ground support from business development staff who will work directly with sponsor organizations and others in order to be successful." The federal agency in charge of the program, the Networks of Centres of Excellence, was to review the evaluation results at a March 25 meeting before providing a response, spokesman Andre Isabelle said in an email. A spokeswoman for Vancouver-based Mitacs, Megan Airton-Cindric, said the group had not yet seen the report and could not comment on the findings. But she said Mitacs' contract with the federal government sets a limit on overhead costs -- a level she did not specify -- and the group has stayed below the cap. "We continue our commitment to staying below contractually mandated overhead rates and to finding efficiencies wherever possible," Airton-Cindric said in an email.
{ "pile_set_name": "OpenWebText2" }
Audi E-Tron Gets Lower Than Expected 204-Mile EPA Range Rating - codeulike https://insideevs.com/audi-e-tron-electric-range-epa/ ====== codeulike That's with a 95kwh battery. Turns out building EVs is not so easy. ~~~ clouddrover But only 83 kwh available for use. As mentioned in the article, the battery is over-provisioned to increase its longevity and to enable faster charging. The Audi e-tron SUV can maintain a 150 kilowatt charge rate up to 80% state of charge, which no other current EV can do: [https://support.fastned.nl/hc/en- gb/articles/115015420127-17...](https://support.fastned.nl/hc/en- gb/articles/115015420127-175-kW-fast-chargers) Not even the Tesla Model 3 on the new Tesla V3 chargers: [https://electrek.co/2019/03/07/tesla-v3-supercharger- action-...](https://electrek.co/2019/03/07/tesla-v3-supercharger-action-first- look/) The e-tron's main problem is that it's too heavy for the battery it has. Every version of the Tesla Model X, for example, weighs less than the e-tron. ~~~ codeulike Also that 12 kWh of unused battery will be quite heavy ------ thefounder Pretty disappointing. It will be a niche car like BMW I3/I8
{ "pile_set_name": "HackerNews" }
Q: Docker inside docker : volume is mounted, but empty I am running a docker container with docker mounted inside using : docker run -v /Path/to/service:/src/service -v /var/run/docker.sock:/var/run/docker.sock --net=host image-name python run.py This runs a python script that creates a data folder in /src and fills it. When printing os.listdir('/src/data'), I get a list of files. I then run a container from within this container, mounting the data folder, using docker-py. volumes = {'/src/data': {'bind': '/src', 'mode': 'rw'}} client.containers.run(image, command='ls data', name=container_key, network='host', volumes=volumes) And it prints : Starting with UID: 0 and HOME: /src\n0\n' Which means data is mounted, but empty. What am I doing wrong ? A: So- mounting docker inside the container means that containers started from in there are running on your HOST machine. The end result is you have two containers on host- one with /Path/to/service:/src/service and one with /src/data:/src If you want to share a volume between two containers you should usually use a "named" volume like docker run -v sharedvolume:/src/data and docker run -v sharedvolume:/src
{ "pile_set_name": "StackExchange" }
<?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE ldml SYSTEM "../../common/dtd/ldml.dtd"> <!-- Copyright © 1991-2013 Unicode, Inc. CLDR data files are interpreted according to the LDML specification (http://unicode.org/reports/tr35/) For terms of use, see http://www.unicode.org/copyright.html --> <ldml> <identity> <version number="$Revision: 9061 $"/> <generation date="$Date: 2013-07-20 12:27:45 -0500 (Sat, 20 Jul 2013) $"/> <language type="gd"/> <territory type="GB"/> </identity> </ldml>
{ "pile_set_name": "Github" }
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
10