text
stringlengths
0
7.84M
meta
dict
1912 Mürefte earthquake The 1912 Mürefte earthquake occurred at 03:29 local time on 9 August. It had an estimated magnitude of 7.8 and a maximum intensity of X (Extreme) on the Mercalli intensity scale, causing 216 casualties. See also List of earthquakes in 1912 List of earthquakes in Turkey References External links 1912 Mürefte Category:1912 in the Ottoman Empire 1912
{ "pile_set_name": "Wikipedia (en)" }
Lazy Journal SKU: £28.00 £28.00 Unavailable My Lazy Journal is made from recycled materials including an old hardback book and envelopes. It is for the person who doesn't know what to write in a journal since its pages are already completed for you. There are thirty six pages which are covered with a range of written narratives.Further pictures of this Journal can be seen on the art journals pageof this website.The price includes postage and packing.
{ "pile_set_name": "Pile-CC" }
Creosote gall midge Creosote gall midges are a species of gall-inducing flies in the Asphondylia auripila group (Diptera: Cecidomyiidae). This group consists of 15 closely related species of flies which inhabit creosote bush (Zygophyllaceae: Larrea tridentata) sensu lato. They have partitioned the plant ecologically with different gall midge species inhabiting the leaves, stems, buds, and flowers of creosote bush. Each species induces a uniquely shaped gall but the insects are otherwise morphologically very similar and very difficult to tell apart. Their life cycle begins when the female oviposits into the part of the plant which her species prefers, she inserts her egg along with a fungal spore from a mycangia (a small pocket to store fungal spores). A gall forms and the fungal mycelium grows to line the inside of the gall, when the egg hatches the developing larva feeds upon the fungus. Adult emergence is timed with periods of plant growth associated with winter, spring, or summer rain fall. In contrast to many other groups of plant-feeding insects (which form new species through changes to new host plants) the evolution of new species in the A. auripila group seems to be a result of colonizing new parts of the same plant and/or colonization of new seasons of plant growth. List of species The Asphondylia genus has over 60 described species. Within the genus the creosote gall midge species form a species group, the A. auripila group. Species described this far (by host-plant part) include: Asphondylia clavata – leaf gall Asphondylia pilosa – leaf gall Asphondylia villosa – leaf gall Asphondylia barbata – leaf gall Asphondylia digitata – leaf gall Asphondylia discalis – leaf gall Asphondylia silicula – leaf gall Asphondylia fabalis – leaf gall Asphondylia bullata – stem gall Asphondylia resinosa – stem gall Asphondylia foliosa – stem gall Asphondylia auripila – stem gall Asphondylia rosetta – stem gall Asphondylia florea – flower gall Asphondylia apicata – bud gall References Gagne, R.J, and Waring, G. 1990. The Asphondylia (Cecidomyiidae: Diptera) of creosote bush (Larrea tridentata) in North America. Proc. Entomol. Soc. Wash. 92:649–671. Category:Cecidomyiidae
{ "pile_set_name": "Wikipedia (en)" }
Linotype machine The Linotype machine ( ) was a "line casting" machine used in printing sold by the Mergenthaler Linotype Company and related It was a hot metal typesetting system that cast blocks of metal type for individual uses. Linotype became one of the mainstay methods to set type, especially small-size body text, for newspapers, magazines, and posters from the late 19th century to the 1970s and 1980s, when it was largely replaced by phototypesetting and computer typesetting. The name of the machine comes from the fact that it produces an entire line of metal type at once, hence a line-o'-type, a significant improvement over the previous industry standard, i.e., manual, letter-by-letter typesetting using a composing stick and shallow subdivided trays, called "cases". The linotype machine operator enters text on a 90-character keyboard. The machine assembles matrices, which are molds for the letter forms, in a line. The assembled line is then cast as a single piece, called a slug, from molten type metal in a process known as hot metal typesetting. The matrices are then returned to the type magazine from which they came, to be reused later. This allows much faster typesetting and composition than original hand composition in which operators place down one pre-cast glyph (metal letter, punctuation mark or space) at a time. The machine revolutionized typesetting and with it especially newspaper publishing, making it possible for a relatively small number of operators to set type for many pages on a daily basis. Ottmar Mergenthaler invented the linotype in 1884. History In 1876, a German clock maker, Ottmar Mergenthaler, who had emigrated to the United States in 1872, was approached by James O. Clephane and his associate Charles T. Moore, who sought a quicker way of publishing legal briefs. By 1884 he conceived the idea of assembling metallic letter molds, called matrices, and casting molten metal into them, all within a single machine. His first attempt proved the idea feasible, and a new company was formed. Improving his invention, Mergenthaler further developed his idea of an independent matrix machine. In July, 1886, the first commercially used Linotype was installed in the printing office of the New York Tribune. Here it was immediately used on the daily paper and a large book. The book, the first ever composed with the new Linotype method, was titled, The Tribune Book of Open-Air Sports. Initially, the Mergenthaler Linotype Company was the only company producing linecasting machines, but in time, other companies would begin manufacturing. The Intertype Company produced the Intertype, a machine closely resembling the Linotype, and using the same matrices as the Linotype, started production around 1914. Where Mergenthaler prided themselves on intricately formed cast-iron parts on their machine, Intertype machined many of their similar parts from steel and aluminum. Major newspaper publishers retired Linotype and similar "hot metal" typesetting machines during the 1970s and 1980s, replacing them with phototypesetting equipment and later computerized typesetting and page composition systems. , the last-known newspaper still using linotype in the United States, and possibly the world, is The Saguache Crescent. Overview The linotype machine consists of four major sections: Magazine Keyboard Casting mechanism Distribution mechanism The operator interacts with the machine via the keyboard, composing lines of text. The other sections are automatic; they start as soon as a line is completely composed. Some linotype machines included a paper tape reader. This allowed the text to be typeset to be supplied over a telegraph line (TeleTypeSetter). It also allowed for several tape perforator operators to prepare paper tape to be processed by a single linotype machine, essentially decoupling the typing speed of the operators from the operating speed of the linotype machine. Design Matrices Each matrix contains the letter form for a single character of a font of type; i.e., a particular type design in a particular size. The letter form is engraved into one side of the matrix. For sizes up to 14 points, and in some matrices of size 16 to 24 points, the matrix has two letter forms on it, the normal and auxiliary positions. The normal position has the upright (Roman) form of a given character, and on the auxiliary, the slanted (Italic) form of that character will be used, but this can also be the boldface form or even a different font entirely. The machine operator can select which of the two will be cast by operating the auxiliary rail of the assembler, or, when setting entire lines of italics, by using the flap, which is a piece that can be turned under a portion of the first elevator column. This is the origin of the old typesetting terms upper rail for italic and lower rail for Roman characters. These terms have persisted in phototypesetting technology even though the mechanics of the auxiliary rail do not exist there. The character on a Linotype matrix, when viewed, is not inverted as a letter for conventional movable type would be, and the letter is incised below the surface rather than raised above it. This is because the matrix is not used directly to print onto the paper—rather, it is used as part of a mold from which a metal slug will be cast. The slug has its features reversed: therefore, the matrix does not. Magazine section The magazine section is the part of the machine where the matrices are held when not in use, and released as the operator touches keys on the keyboard. The magazine is a flat box with vertical separators that form "channels", one channel for each character in the font. Most main magazines have 90 channels, but those for larger fonts carried only 72 or even 55 channels. The auxiliary magazines used on some machines typically contained 34 channels or, for a magazine carrying larger fonts, 28 channels. The magazine holds a particular font of type; i.e., a particular type design in a particular size. If a different size or style was needed, the operator would switch to a different magazine. Many models of the Linotype machine could keep several magazines (as many as four) available at a time. In some of these, the operator could shift to a different magazine by raising or lowering the stack of magazines with a crank. Such machines would not allow mixing fonts within a single line. Others, such as the Models 25 and 26 allowed arbitrary mixing of text from two magazines within the same line, and the Model 9 extended this capability to mixing from up to four magazines within a single line. Escapement In a linotype machine, the term escapements refers to the mechanisms at the bottom of the magazine that release matrices one at a time as keys are pressed on the keyboard. There is an escapement for each channel in the magazine. Maintenance and lubrication To keep the matrices circulating smoothly throughout the machine, it is necessary that oil not be allowed anywhere near the matrix path. If oil is found in the matrix's path (due to careless maintenance or over-lubrication of nearby parts), it combines with dust, forming a gummy substance that is eventually deposited in the magazine by the matrices. The most common result is that the matrix will not be released from the magazine at its usual speed, and almost always results in a letter or two arriving out of sequence in the assembler — a "matrix transposition". When these machines were in heavy use, it was not uncommon for an operator to set type at the rate of over 4,000 ems per hour, with the fastest operators being able to exceed 10,000 ems per hour (approximately 10 to 30 words per minute in today's units) so careful lubrication and regular cleaning were essential to keep these machines operating at their full potential. Keyboard and composing section In the composing section, the operator enters the text for a line on the keyboard. Each keystroke releases a matrix from the magazine mounted above the keyboard. The matrix travels through channels to the assembler where the matrices are lined up side by side in the order they were released. When a space is needed, the operator touches the spaceband lever just to the left of the keyboard. This releases a spaceband from the spaceband box. Spacebands are stored separately from the matrices because they are too big to fit in the magazine. Once enough text has been entered for the line, the operator depresses the casting lever mounted on the front right corner of the keyboard. This lifts the completed line in the assembler up between two fingers in the "delivery channel", simultaneously tripping the catch holding it in position. The spring-operated delivery channel then transports the line into the casting section of the machine, and engages the clutch that drives the casting section and the subsequent transfer into the distribution section. The operator is now finished with the line; the remaining processing is automatic. While the line is being cast, the operator can continue entering text for the next line. Keyboard The keyboard has 90 keys. The usual arrangement is that black keys on the left were for small letters, white keys on the right were for capital letters, and blue keys in the center for numbers, punctuation marks, spaces, small caps and other items. There is no shift key of the kind found on typewriters. The arrangement of letters corresponds roughly to letter frequency, with the most frequently used letters on the left. The first two columns of keys are: e, t, a, o, i, n; and s, h, r, d, l, u. A Linotype operator would often deal with a typing error by running the fingers down these two rows, thus filling out the line with the nonsense words etaoin shrdlu. This is known as a "run down". It is often quicker to cast a bad slug than to hand-correct the line within the assembler. The slug with the run down is removed once it has been cast, or by the proofreader. The linotype keyboard has the same alphabet arrangement given twice, once for lower-case letters, the keys in black, on the left side of the keyboard, and once for upper-case letters, the keys in white, located on the right side of the keyboard. The blue keys in the middle are punctuation, digits, small capital letters and fixed-width spaces. In proper keyboard operation, an experienced operator's left hand operates only the spaceband key and the left column of keys. The operator's right hand strokes the remaining keys on the entire keyboard. The keys of the keyboard are connected by vertical pushrods to the escapements. When a key is pressed, the corresponding escapement is actuated, which releases a matrix from the magazine. With one exception, each key corresponds directly to a channel in the standard (90 channel) magazine. The one exception is the lower-case letter e: that letter is used so often that the 90 channel magazine actually has 91 channels, with two channels (the leftmost two) both used for the letter e. Similarly, the 72 channel magazine actually has 73 channels, with the leftmost two being used for lower-case e. Alternate lines release matrices alternately from the two e channels in the magazine. On machines that support multiple magazines, there is a shifting mechanism that controls which magazine is currently connected to the keyboard. In most machines, this is done by raising or lowering the stack of magazines. Spaceband box In justified text, the spaces are not fixed width; they expand to make all lines equal in width. In linotype machines this is done by spacebands. A spaceband consists of two wedges, one similar in size and shape to a type matrix, one with a long tail. The wide part of the wedge is at the bottom of the tail, so pushing the tail up expands the spaceband. Due to their size, spacebands are not held in the magazine, but in a spaceband box and released one at a time by pressing the spaceband lever at the left edge of the keyboard. Assembler Matrices released from the magazine, and spacebands released from the spaceband box, drop down into the assembler. This is a rail that holds the matrices and spacebands, with a jaw on the left end set to the desired line width. When the operator judges that the line is close enough to full, he raises the casting lever on the bottom of the keyboard to send the line to the casting section of the linotype machine. The remaining processing for that line is automatic; as soon as the finished line has been transferred to the casting section, the operator can begin composing the next line of text. Casting section The casting section of the machine operated intermittently, when triggered by the operator at the completion of a line. The full casting cycle time was less than nine seconds. Motive power for the casting section came from a clutch-operated drive running large cams (the keyboard and distributor sections ran all the time, since distribution may take much longer; however, the front part of the distributor completed its job before the next line of matrices was distributed). The construction of the machine was such that both the return of the former line to the magazine and the composition of the next line could occur while the current line was being cast, enabling very high productivity. Older machines typically had a 1/3 hp 850 or 1140 revolution per minute motor geared to the main clutch wheel, the inner shaft engaging this wheel while the casting cycle was in operation. An external leather belt on this wheel ran a second jackshaft, which powered the distributor and keyboard matrix conveyor and escapements through additional belting off this shaft. Gas fired pots, such as in the illustration below, were most common in the earlier years, with the pot being thermostatically controlled (high flame when under temperature and low flame when up to temperature), and then a second smaller burner for the mouth and throat heating, with the more modern installations running on 1500 watt electric pots with an initially rheostat controlled mouth and throat heaters (several hundred watts on the electric models). The temperature was precisely adjusted to keep the lead and tin type metal liquified just prior to being cast. Newer machines, and the larger machines above 36 EM Matrix size typically used the more standardized 1/2 horsepower motor after v-belts came into common use in the 1930s. The large machines also had the so-called 'double pot', with either larger gas burners, or else 2250 watt pot heaters and larger mouth and throat heaters. The most modern Linotypes had the mouth and throat heaters thermostatically controlled, an improvement over the manual rheostat adjustment, or gas flame adjustment. The Linotype company would even supply kerosene heaters and line-shaft operated machines, in locales without electricity. The casting section receives completed lines from the assembler, and uses these to cast the type slugs that are the product of the linotype machine. The casting section is automatic: once it is activated by the operator sending a completed line by raising the casting lever, a series of cams and levers move the matrices through the casting section and control the sequence of steps that produce the slug. The casting material is an alloy of lead (85%), antimony (11%), and tin (4%), and produces a one-piece casting slug capable of 300,000 impressions before the casting begins to develop deformities and imperfections, and the type must be cast again. The continuous heating of the molten alloy causes the tin and antimony in the mixture to rise to the top and oxidize along with other impurities into a substance called "dross" which has to be skimmed off. Excessive dross formation leads to the alloy softening as the proportion of lead increases. The mixture must then be assayed and tin and antimony added back (in the form of a specially proportioned alloy) to restore the original strength and properties of the alloy. Justification From the assembler, the assembled line moves via the first elevator to the justification vise. The vise has two jaws (1 and 2 in the illustration) which are set to the desired line width. The spacebands are now expanded to justify the line. When the line is justified, the matrices fit tightly between the vise jaws, forming a tight seal which will prevent the molten type metal from escaping when the line is cast. Justification is done by a spring-loaded ram (5) which raises the tails of the spacebands, unless the machine was equipped with a Star Parts automatic hydraulic quadding attachment or Linotype hydraquadder. If the operator did not assemble enough characters, the line will not justify correctly: even with the spacebands expanded all the way, the matrices are not tight. A safety mechanism in the justification vise detects this and blocks the casting operation. Without such a mechanism, the result would be a squirt of molten type metal spraying out through the gaps between the matrices, creating a time-consuming mess and a possible hazard to the operator. If a squirt did occur, it was generally up to the operator to grab the hell bucket and catch the flowing lead. It was so called because the bucket would often "go to hell", or melt, while holding the molten lead that was still extremely hot. Also, in conjunction with possible hazards facing an operator, toxic lead fumes were possible, as they were the result of melting the lead ingots for casting. Mold disk and crucible The justification vise holds the assembled line against the face of the mold disk. The mold disk has rectangular openings which correspond to the line length and point thickness of the slugs (cast lines) to be made. Mold liners fit into these openings for specific slug dimensions. The maximum line length of the typical linecaster is 30 picas. A less common variant was fitted with 42 pica molds, though these are now rare to non-existent. Directly behind the mold disk is the crucible, which contains molten type metal at an optimal 535°. At the moment before casting, the mold disk moves forward on its slide. Studs in the mold disc engage with blocks on the vise so that the mold disc seats gently, yet tightly and squarely against the line of matrices held in the first elevator jaws and between the vise jaws. The vise jaws compress the line of matrices so molten metal is prevented from squeezing between the mats on cast. The crucible tilts forward, forcing the mouthpiece tightly against the back of the mold. The plunger in the well of the crucible quickly descends, forcing the molten metal up the crucible throat and injecting it into the mold cavity through the array of orifices in the mouthpiece. The jets of molten metal first contact against the casting face of the matrices, and then fills the mold cavity to provide a solid slug body. These have character shapes punched into them, so the result is a cast slug with the character shapes of the line on its top face. The mold disk is sometimes water-cooled, and often air-cooled with a blower, to carry away the heat of the molten type metal and allow the cast slugs to solidify quickly. When casting is complete, the plunger is drawn upward, pulling the metal back down the throat from the mouthpiece. The pot pulls backward away from the mold. The mold disk retracts from the vise studs which held it in perfect relation to the mold, thus breaking the slug away from the matrices. The mold disc then rotates counter-clockwise. In its travel, the slug base is trimmed by the back knife for height to paper (.918") and then returns to its neutral position in front of the ejector blades and aligned with the knife block assembly a pair of honed knives with a fixed knife, and a knife which is set to the point thickness of the mold liners being cast with. The knives are set to dead parallel. The fixed knife on the left bears against the smooth side of the slug (the mold body face of the slug) as it brushes next to it, and the right knife trims the ribs on the slug (the mold cap face of the slug). The disk stops when the mold is vertical, on the right, directly in front of the ejector. The ejector is a stacked series of narrow blades that push the completed slug from the mold aperture in the mold disk. The blades are narrow enough to pass through a mold set to 6-points in thickness with .004" clearance between the fixed mold face and the left side of the blades. The blades are each 2 picas in width and the number of blades engaged on ejection are set based on the line length being cast. All blades are engaged for a 30 pica slug, fewer are engaged as the measure of the slug body is narrowed by the use of progerssively longer mold liners. This prevents the ejector blades from striking the back of a mold liner on narrow slugs. As the slug is pushed from the mold, the slug passes a set of knife edges in the knife block, which trims off any small irregularities in the casting and produces a slug of exactly the desired point thickness. From there, the slug drops into the galley tray which holds the lines in the order in which they were cast. Distribution mechanism The most significant innovation in the linotype machine was that it automated the distribution step; i.e., returning the matrices and space bands back to the correct place in their respective magazines. This is done by the distributor. After casting is completed, the matrices are pushed to the second elevator which raises them to the distributor at the top of the magazine. The space bands are separated out at this point and are returned to the spaceband box. The matrices have a pattern of teeth at the top, by which they hang from the distributor bar. Some of the teeth are cut away; which pattern of teeth is cut away depends on the character on the matrix; i.e., which channel in the magazine it belongs in. Similarly, teeth are cut away along portions of the distributor bar. The bar on the elevator has all teeth, so it will hold any matrix (but not the space bands, which have no teeth at all). Distributor bar and matrix teeth coding As the matrices are carried along the distributor bar by the distributor screws, they will hang on only so long as there are teeth to hold them. As soon as the matrix reaches the point where each of its teeth corresponds to a cut-away tooth on the distributor bar, it is no longer supported and will drop into the matrix channel below that point. The pattern of teeth is a 7-bit binary code, with the innermost pair of teeth at the bottom of the notch being the most significant bit. The codes count up from the left side of the main magazine. Code 0 (no teeth) is for spacebands, which are not carried up to the distributor. Code 1 is skipped (no reason for this is given in the Linotype manual). Codes 2 through 92 are for the 91-channel main magazine, and the codes above that are for the auxiliary magazine, if one is installed on the machine. The widest auxiliary magazine has 34 channels, so its rightmost channel is code 125. Code 126 is unused while code 127 is used for pi matrices (described below). Pi matrices In typesetting, it is sometimes necessary to use characters that are uncommon or obscure enough that it does not make sense to assign them to a magazine channel. These characters are referred to as pi characters or sorts ("pi" in this case refers to an obscure printer's term relating to loose or spilled type). Footnote marks, rarely used fractions, and mathematical symbols are examples of pi characters. In the linotype machine, a pi matrix has all teeth present (code 127, no teeth cut away) so it will not drop from the distributor bar and will not be released into either the main or the auxiliary magazine. Instead, it travels all the way to the end and into the flexible metal tube called the pi chute and is then lined up in the sorts stacker, available for further use. See also Ottmar Mergenthaler Monotype System Monotype Corporation Lanston Monotype Saguache Crescent Etaoin shrdlu Notes References Basil Kahan: Ottmar Mergenthaler – The Man and his Machine; Oak Knoll Press, New Castle (DE), 2000 – External links Linotype: The Film – In Search of the Eighth Wonder of the World (Doug Wilson, 2012) is a feature-length documentary centered around the Linotype type casting machine. "Farewell, Etaoin Shrdlu". short film about history of Linotype and transition to modern methods. New York Times, 2016-10-14. The Printing (Holmes Burton Films Inc., 1947) documentary about linotype tech. in printing industry Metal Type—"For Those who Remember Hot Metal Typesetting" Intertype Book of Instruction is a complete manual on the operation and maintenance of the Intertype linotype machines Linotype Machine on Woodsidepress.com Linecast typesetting service at linotypesetting.com Typesetting: Linotype vocational instruction film: partand part 2. 1/13/1894;The Linotype a Machine To Supersede Typesetting The 1966 Automatically Controlled Elektron (ACE) Linotype, Teletype, Intertype and more Linotype machine patents Category:Printing Category:Typography Category:American inventions
{ "pile_set_name": "Wikipedia (en)" }
// Copyright 2009 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // +build !gccgo #include "textflag.h" // // System call support for AMD64, OpenBSD // // Just jump to package syscall's implementation for all these functions. // The runtime may know about them. TEXT ·Syscall(SB),NOSPLIT,$0-56 JMP syscall·Syscall(SB) TEXT ·Syscall6(SB),NOSPLIT,$0-80 JMP syscall·Syscall6(SB) TEXT ·Syscall9(SB),NOSPLIT,$0-104 JMP syscall·Syscall9(SB) TEXT ·RawSyscall(SB),NOSPLIT,$0-56 JMP syscall·RawSyscall(SB) TEXT ·RawSyscall6(SB),NOSPLIT,$0-80 JMP syscall·RawSyscall6(SB)
{ "pile_set_name": "Github" }
Israel breaks up Hezbollah terror cells in West Bank Israel’s security services reveal they broke up a number of terror cells in the West Bank and within Israel created by the Hezbollah terrorist organization. Hezbollah operatives from the group’s Unit 133 — its foreign operations unit — recruited the would-be terrorists through social media sites, including Facebook, the Shin Bet security service says. These terror cells had planned to carry out suicide bombings and ambush IDF patrols in the West Bank. They received funding from Hezbollah, and some members had begun preparing explosive devices for use in attacks, the Shin Bet says. “The Hezbollah organization has recently made it a priority to try to spark terror acts, doing so from far away while attempting to not clearly express its involvement,” the Shin Bet says. — Judah Ari Gross
{ "pile_set_name": "OpenWebText2" }
describe('jsdoc/src/astNode', () => { const astBuilder = require('jsdoc/src/astbuilder'); const astNode = require('jsdoc/src/astnode'); const babelParser = require('@babel/parser'); const env = require('jsdoc/env'); const Syntax = require('jsdoc/src/syntax').Syntax; function parse(str) { return babelParser.parse(str, astBuilder.parserOptions).program.body[0]; } // create the AST nodes we'll be testing const arrayExpression = parse('[,]').expression; const arrowFunctionExpression = parse('var foo = () => {};').declarations[0].init; const assignmentExpression = parse('foo = 1;').expression; const binaryExpression = parse('foo & foo;').expression; const experimentalObjectRestSpread = parse('var one = {...two, three: 4};').declarations[0].init; const functionDeclaration1 = parse('function foo() {}'); const functionDeclaration2 = parse('function foo(bar) {}'); const functionDeclaration3 = parse('function foo(bar, baz, qux) {}'); const functionDeclaration4 = parse('function foo(...bar) {}'); const functionExpression1 = parse('var foo = function() {};').declarations[0].init; const functionExpression2 = parse('var foo = function(bar) {};').declarations[0].init; const identifier = parse('foo;').expression; const literal = parse('1;').expression; const memberExpression = parse('foo.bar;').expression; const memberExpressionComputed1 = parse('foo["bar"];').expression; const memberExpressionComputed2 = parse('foo[\'bar\'];').expression; const methodDefinition1 = parse('class Foo { bar() {} }').body.body[0]; const methodDefinition2 = parse('var foo = () => class { bar() {} };').declarations[0].init.body .body[0]; const propertyGet = parse('var foo = { get bar() {} };').declarations[0].init.properties[0]; const propertyInit = parse('var foo = { bar: {} };').declarations[0].init.properties[0]; const propertySet = parse('var foo = { set bar(a) {} };').declarations[0].init.properties[0]; const thisExpression = parse('this;').expression; const unaryExpression1 = parse('+1;').expression; const unaryExpression2 = parse('+foo;').expression; const variableDeclarator1 = parse('var foo = 1;').declarations[0]; const variableDeclarator2 = parse('var foo;').declarations[0]; it('should exist', () => { expect(astNode).toBeObject(); }); it('should export an addNodeProperties method', () => { expect(astNode.addNodeProperties).toBeFunction(); }); it('should export a getInfo method', () => { expect(astNode.getInfo).toBeFunction(); }); it('should export a getParamNames method', () => { expect(astNode.getParamNames).toBeFunction(); }); it('should export an isAccessor method', () => { expect(astNode.isAccessor).toBeFunction(); }); it('should export an isAssignment method', () => { expect(astNode.isAssignment).toBeFunction(); }); it('should export an isFunction method', () => { expect(astNode.isFunction).toBeFunction(); }); it('should export an isScope method', () => { expect(astNode.isScope).toBeFunction(); }); it('should export a nodeToString method', () => { expect(astNode.nodeToString).toBeFunction(); }); it('should export a nodeToValue method', () => { expect(astNode.nodeToValue).toBeFunction(); }); describe('addNodeProperties', () => { let debugEnabled; beforeEach(() => { debugEnabled = Boolean(env.opts.debug); }); afterEach(() => { env.opts.debug = debugEnabled; }); it('should return null for undefined input', () => { expect( astNode.addNodeProperties() ).toBe(null); }); it('should return null if the input is not an object', () => { expect( astNode.addNodeProperties('foo') ).toBe(null); }); it('should preserve existing properties that are not "node properties"', () => { const node = astNode.addNodeProperties({foo: 1}); expect(node).toBeObject(); expect(node.foo).toBe(1); }); it('should add a non-enumerable nodeId if necessary', () => { const node = astNode.addNodeProperties({}); const descriptor = Object.getOwnPropertyDescriptor(node, 'nodeId'); expect(descriptor).toBeObject(); expect(descriptor.value).toBeString(); expect(descriptor.enumerable).toBeFalse(); }); it('should not overwrite an existing nodeId', () => { const nodeId = 'foo'; const node = astNode.addNodeProperties({nodeId: nodeId}); expect(node.nodeId).toBe(nodeId); }); it('should add an enumerable nodeId in debug mode', () => { let descriptor; let node; env.opts.debug = true; node = astNode.addNodeProperties({}); descriptor = Object.getOwnPropertyDescriptor(node, 'nodeId'); expect(descriptor.enumerable).toBeTrue(); }); it('should add a non-enumerable, writable parent if necessary', () => { const node = astNode.addNodeProperties({}); const descriptor = Object.getOwnPropertyDescriptor(node, 'parent'); expect(descriptor).toBeDefined(); expect(descriptor.value).toBeUndefined(); expect(descriptor.enumerable).toBeFalse(); expect(descriptor.writable).toBeTrue(); }); it('should not overwrite an existing parent', () => { const parent = {}; const node = astNode.addNodeProperties({parent: parent}); expect(node.parent).toBe(parent); }); it('should not overwrite a null parent', () => { const node = astNode.addNodeProperties({parent: null}); expect(node.parent).toBeNull(); }); it('should add an enumerable parentId in debug mode', () => { let descriptor; let node; env.opts.debug = true; node = astNode.addNodeProperties({}); descriptor = Object.getOwnPropertyDescriptor(node, 'parentId'); expect(descriptor).toBeObject(); expect(descriptor.enumerable).toBeTrue(); }); it('should provide a null parentId in debug mode for nodes with no parent', () => { let node; env.opts.debug = true; node = astNode.addNodeProperties({}); expect(node.parentId).toBeNull(); }); it('should provide a non-null parentId in debug mode for nodes with a parent', () => { let node; let parent; env.opts.debug = true; node = astNode.addNodeProperties({}); parent = astNode.addNodeProperties({}); node.parent = parent; expect(node.parentId).toBe(parent.nodeId); }); it('should add a non-enumerable, writable enclosingScope if necessary', () => { const node = astNode.addNodeProperties({}); const descriptor = Object.getOwnPropertyDescriptor(node, 'enclosingScope'); expect(descriptor).toBeObject(); expect(descriptor.value).toBeUndefined(); expect(descriptor.enumerable).toBeFalse(); expect(descriptor.writable).toBeTrue(); }); it('should not overwrite an existing enclosingScope', () => { const enclosingScope = {}; const node = astNode.addNodeProperties({enclosingScope: enclosingScope}); expect(node.enclosingScope).toBe(enclosingScope); }); it('should not overwrite a null enclosingScope', () => { const node = astNode.addNodeProperties({enclosingScope: null}); expect(node.enclosingScope).toBeNull(); }); it('should add an enumerable enclosingScopeId in debug mode', () => { let descriptor; let node; env.opts.debug = true; node = astNode.addNodeProperties({}); descriptor = Object.getOwnPropertyDescriptor(node, 'enclosingScopeId'); expect(descriptor).toBeObject(); expect(descriptor.enumerable).toBeTrue(); }); it('should provide a null enclosingScopeId in debug mode for nodes with no enclosing scope', () => { let node; env.opts.debug = true; node = astNode.addNodeProperties({}); expect(node.enclosingScopeId).toBeNull(); }); it('should provide a non-null enclosingScopeId in debug mode for nodes with an enclosing ' + 'scope', () => { let enclosingScope; let node; env.opts.debug = true; node = astNode.addNodeProperties({}); enclosingScope = astNode.addNodeProperties({}); node.enclosingScope = enclosingScope; expect(node.enclosingScopeId).toBe(enclosingScope.nodeId); }); }); describe('getInfo', () => { it('should throw an error for undefined input', () => { function noNode() { astNode.getInfo(); } expect(noNode).toThrow(); }); it('should return the correct info for an AssignmentExpression', () => { const info = astNode.getInfo(assignmentExpression); expect(info).toBeObject(); expect(info.node).toBeObject(); expect(info.node.type).toBe(Syntax.Literal); expect(info.node.value).toBe(1); expect(info.name).toBe('foo'); expect(info.type).toBe(Syntax.Literal); expect(info.value).toBe(1); }); it('should return the correct info for a FunctionDeclaration', () => { const info = astNode.getInfo(functionDeclaration2); expect(info).toBeObject(); expect(info.node).toBeObject(); expect(info.node.type).toBe(Syntax.FunctionDeclaration); expect(info.name).toBe('foo'); expect(info.type).toBe(Syntax.FunctionDeclaration); expect(info.value).toBeUndefined(); expect(info.paramnames).toBeArrayOfSize(1); expect(info.paramnames[0]).toBe('bar'); }); it('should return the correct info for a FunctionExpression', () => { const info = astNode.getInfo(functionExpression2); expect(info).toBeObject(); expect(info.node).toBeObject(); expect(info.node.type).toBe(Syntax.FunctionExpression); expect(info.name).toBe(''); expect(info.type).toBe(Syntax.FunctionExpression); expect(info.value).toBeUndefined(); expect(info.paramnames).toBeArrayOfSize(1); expect(info.paramnames[0]).toBe('bar'); }); it('should return the correct info for a MemberExpression', () => { const info = astNode.getInfo(memberExpression); expect(info).toBeObject(); expect(info.node).toBeObject(); expect(info.node.type).toBe(Syntax.MemberExpression); expect(info.name).toBe('foo.bar'); expect(info.type).toBe(Syntax.MemberExpression); }); it('should return the correct info for a computed MemberExpression', () => { const info = astNode.getInfo(memberExpressionComputed1); expect(info).toBeObject(); expect(info.node).toBeObject(); expect(info.node.type).toBe(Syntax.MemberExpression); expect(info.name).toBe('foo["bar"]'); expect(info.type).toBe(Syntax.MemberExpression); }); it('should return the correct info for a Property initializer', () => { const info = astNode.getInfo(propertyInit); expect(info).toBeObject(); expect(info.node).toBeObject(); expect(info.node.type).toBe(Syntax.ObjectExpression); expect(info.name).toBe('bar'); expect(info.type).toBe(Syntax.ObjectExpression); }); it('should return the correct info for a Property setter', () => { const info = astNode.getInfo(propertySet); expect(info).toBeObject(); expect(info.node).toBeObject(); expect(info.node.type).toBe(Syntax.FunctionExpression); expect(info.name).toBe('bar'); expect(info.type).toBeUndefined(); expect(info.value).toBeUndefined(); expect(info.paramnames).toBeArrayOfSize(1); expect(info.paramnames[0]).toBe('a'); }); it('should return the correct info for a VariableDeclarator with a value', () => { const info = astNode.getInfo(variableDeclarator1); expect(info).toBeObject(); expect(info.node).toBeObject(); expect(info.node.type).toBe(Syntax.Literal); expect(info.name).toBe('foo'); expect(info.type).toBe(Syntax.Literal); expect(info.value).toBe(1); }); it('should return the correct info for a VariableDeclarator with no value', () => { const info = astNode.getInfo(variableDeclarator2); expect(info).toBeObject(); expect(info.node).toBeObject(); expect(info.node.type).toBe(Syntax.Identifier); expect(info.name).toBe('foo'); expect(info.type).toBeUndefined(); expect(info.value).toBeUndefined(); }); it('should return the correct info for other node types', () => { const info = astNode.getInfo(binaryExpression); expect(info).toBeObject(); expect(info.node).toBe(binaryExpression); expect(info.type).toBe(Syntax.BinaryExpression); }); }); describe('getParamNames', () => { it('should return an empty array for undefined input', () => { const params = astNode.getParamNames(); expect(params).toBeEmptyArray(); }); it('should return an empty array if the input has no params property', () => { const params = astNode.getParamNames({}); expect(params).toBeEmptyArray(); }); it('should return an empty array if the input has no params', () => { const params = astNode.getParamNames(functionDeclaration1); expect(params).toBeEmptyArray(); }); it('should return a single-item array if the input has a single param', () => { const params = astNode.getParamNames(functionDeclaration2); expect(params).toEqual(['bar']); }); it('should return a multi-item array if the input has multiple params', () => { const params = astNode.getParamNames(functionDeclaration3); expect(params).toEqual([ 'bar', 'baz', 'qux' ]); }); it('should include rest parameters', () => { const params = astNode.getParamNames(functionDeclaration4); expect(params).toEqual(['bar']); }); }); describe('isAccessor', () => { it('should return false for undefined values', () => { expect( astNode.isAccessor() ).toBeFalse(); }); it('should return false if the parameter is not an object', () => { expect( astNode.isAccessor('foo') ).toBeFalse(); }); it('should return false for non-Property nodes', () => { expect( astNode.isAccessor(binaryExpression) ).toBeFalse(); }); it('should return false for Property nodes whose kind is "init"', () => { expect( astNode.isAccessor(propertyInit) ).toBeFalse(); }); it('should return true for Property nodes whose kind is "get"', () => { expect( astNode.isAccessor(propertyGet) ).toBeTrue(); }); it('should return true for Property nodes whose kind is "set"', () => { expect( astNode.isAccessor(propertySet) ).toBeTrue(); }); }); describe('isAssignment', () => { it('should return false for undefined values', () => { expect( astNode.isAssignment() ).toBeFalse(); }); it('should return false if the parameter is not an object', () => { expect( astNode.isAssignment('foo') ).toBeFalse(); }); it('should return false for nodes that are not assignments', () => { expect( astNode.isAssignment(binaryExpression) ).toBeFalse(); }); it('should return true for AssignmentExpression nodes', () => { expect( astNode.isAssignment(assignmentExpression) ).toBeTrue(); }); it('should return true for VariableDeclarator nodes', () => { expect( astNode.isAssignment(variableDeclarator1) ).toBeTrue(); }); }); describe('isFunction', () => { it('should recognize function declarations as functions', () => { expect( astNode.isFunction(functionDeclaration1) ).toBeTrue(); }); it('should recognize function expressions as functions', () => { expect( astNode.isFunction(functionExpression1) ).toBeTrue(); }); it('should recognize method definitions as functions', () => { expect( astNode.isFunction(methodDefinition1) ).toBeTrue(); }); it('should recognize arrow function expressions as functions', () => { expect( astNode.isFunction(arrowFunctionExpression) ).toBeTrue(); }); it('should recognize non-functions', () => { expect( astNode.isFunction(arrayExpression) ).toBeFalse(); }); }); describe('isScope', () => { it('should return false for undefined values', () => { expect( astNode.isScope() ).toBeFalse(); }); it('should return false if the parameter is not an object', () => { expect( astNode.isScope('foo') ).toBeFalse(); }); it('should return true for CatchClause nodes', () => { expect( astNode.isScope({type: Syntax.CatchClause}) ).toBeTrue(); }); it('should return true for FunctionDeclaration nodes', () => { expect( astNode.isScope({type: Syntax.FunctionDeclaration}) ).toBeTrue(); }); it('should return true for FunctionExpression nodes', () => { expect( astNode.isScope({type: Syntax.FunctionExpression}) ).toBeTrue(); }); it('should return false for other nodes', () => { expect( astNode.isScope({type: Syntax.NameExpression}) ).toBeFalse(); }); }); describe('nodeToString', () => { it('should be an alias to nodeToValue', () => { expect(astNode.nodeToString).toBe(astNode.nodeToValue); }); }); describe('nodeToValue', () => { it('should return `[null]` for the sparse array `[,]`', () => { expect( astNode.nodeToValue(arrayExpression) ).toBe('[null]'); }); it('should return the variable name for assignment expressions', () => { expect( astNode.nodeToValue(assignmentExpression) ).toBe('foo'); }); it('should return the function name for function declarations', () => { expect( astNode.nodeToValue(functionDeclaration1) ).toBe('foo'); }); it('should return undefined for anonymous function expressions', () => { expect( astNode.nodeToValue(functionExpression1) ).toBeUndefined(); }); it('should return the identifier name for identifiers', () => { expect( astNode.nodeToValue(identifier) ).toBe('foo'); }); it('should return the literal value for literals', () => { expect( astNode.nodeToValue(literal) ).toBe(1); }); it('should return the object and property for noncomputed member expressions', () => { expect( astNode.nodeToValue(memberExpression) ).toBe('foo.bar'); }); it('should return the object and property, with a computed property that uses the same ' + 'quote character as the original source, for computed member expressions', () => { expect( astNode.nodeToValue(memberExpressionComputed1) ).toBe('foo["bar"]'); expect( astNode.nodeToValue(memberExpressionComputed2) ).toBe('foo[\'bar\']'); }); // TODO: we can't test this here because JSDoc, not Babylon, adds the `parent` property to // nodes. also, we currently return an empty string instead of `<anonymous>` in this case; // see `module:jsdoc/src/astnode.nodeToValue` and the comment on `Syntax.MethodDefinition` // for details xit('should return `<anonymous>` for method definitions inside classes that were ' + 'returned by an arrow function expression', () => { expect( astNode.nodeToValue(methodDefinition2) ).toBe('<anonymous>'); }); it('should return "this" for this expressions', () => { expect( astNode.nodeToValue(thisExpression) ).toBe('this'); }); it('should return the operator and nodeToValue value for prefix unary expressions', () => { expect( astNode.nodeToValue(unaryExpression1) ).toBe('+1'); expect( astNode.nodeToValue(unaryExpression2) ).toBe('+foo'); }); it('should throw an error for postfix unary expressions', () => { function postfixNodeToValue() { // there's no valid source representation for this one, so we fake it const unaryExpressionPostfix = (() => { const node = parse('+1;').body[0].expression; node.prefix = false; return node; })(); return astNode.nodeToValue(unaryExpressionPostfix); } expect(postfixNodeToValue).toThrow(); }); it('should return the variable name for variable declarators', () => { expect( astNode.nodeToValue(variableDeclarator1) ).toBe('foo'); }); it('should return an empty string for all other nodes', () => { expect( astNode.nodeToValue(binaryExpression) ).toBe(''); }); it('should understand and ignore ExperimentalSpreadProperty', () => { expect( astNode.nodeToValue(experimentalObjectRestSpread) ).toBe('{"three":4}'); }); }); });
{ "pile_set_name": "Github" }
875 F.2d 862 Unpublished DispositionNOTICE: Sixth Circuit Rule 24(c) states that citation of unpublished dispositions is disfavored except for establishing res judicata, estoppel, or the law of the case and requires service of copies of cited unpublished dispositions of the Sixth Circuit.Gloria COOLEY, Plaintiff-Appellant,v.SECRETARY OF HEALTH AND HUMAN SERVICES, Defendant-Appellee. No. 88-1465. United States Court of Appeals, Sixth Circuit. April 10, 1989. Before BOYCE F. MARTIN, Jr. and MILBURN, Circuit Judges, and JOHN D. HOLSCHUH, District Judge*. PER CURIAM. 1 The Secretary of Health and Human Services ("Secretary") found that claimant Gloria Cooley ("Cooley") became disabled on May 23, 1984. Cooley appeals the Secretary's determination of her onset date, arguing she is entitled to an earlier date. For the reasons that follow, we affirm the finding of disability, but reverse the district court's determination of Cooley's onset date. I. 2 Cooley applied for disability insurance benefits on March 25, 1982. Her application was denied initially and upon reconsideration. She requested a hearing before an Administrative Law Judge ("ALJ"), which was held on September 10, 1984. On November 15, 1984, the ALJ issued an opinion finding Cooley not disabled. This became the final decision of the Secretary. Cooley then filed for judicial review in the district court. 3 On November 6, 1985, the district court remanded the case to the Secretary for a new evaluation under the revised mental impairment standards of the Social Security Disability Benefits Reform Act of 1984 (Pub.L. No. 98-460). The ALJ conducted two more hearings, on May 19 and July 22, 1986. On January 8, 1987, the ALJ found Cooley disabled by an anxiety-related disorder pursuant to 20 C.F.R. Pt. 404, Subpt. P, App. 1, Sec. 12.06, with an onset date of May 23, 1984. He characterized Cooley as suffering from post-traumatic stress disorder, aggravated by personality and anxiety problems. He found that she was never capable of returning to her past relevant work after she was injured in April 1981, but she could do unskilled work between April 1981 and May 23, 1984. The Appeals Council adopted the ALJ's recommendations. 4 Cooley continued to object to the 1984 onset date and reinstated her action for judicial review. Both Cooley and the Secretary moved for summary judgment. The matter was referred to the magistrate, who recommended granting Cooley's motion for summary judgment. The magistrate believed the medical evidence established that Cooley's ability to concentrate became substantially impaired in April 1981. Therefore, the hypothetical question relied upon by the ALJ which assumed she could concentrate did not accurately portray her impairment, and the vocational expert's response to the deficient question was not evidence that Cooley could perform unskilled work between April 1981 and May 1984. 5 The district court rejected the magistrate's recommendation and affirmed the Secretary's decision that Cooley became disabled on May 23, 1984. The district court did not address the magistrate's concerns with the ALJ's hypothetical question. Cooley then filed a timely appeal with this court. 6 Cooley was born April 5, 1946, and was thirty-five years old when she was injured on April 6, 1981, while working as a health instructor at M.L. King High School in Detroit. According to the injury report she filed with the Board of Education, Cooley was monitoring a hallway when she heard a commotion in a girls' restroom. She went into the restroom, found several boys and girls, and turned to find another teacher to help her with the situation. The students rushed to leave, and Cooley's head and body were squeezed and smashed several times as she became trapped between a brick wall and a door that was repeatedly thrown open by fleeing students. Cooley reported suffering bruises on her face and body. Later, in August 1981, when she underwent the first of numerous physical and neurological examinations, she reported that she lost consciousness during the restroom incident. Cooley's mental and emotional condition deteriorated significantly between April 1981 and May 1984. 7 Cooley testified that since the restroom incident she has been unable to think clearly, and has become forgetful to the point where she lives according to routines and lists. She experiences speech, reading and vision difficulties; becomes fatigued and overwhelmed frequently and easily; and has remained severely depressed, withdrawn and is frightened by other people and her inability to think and speak clearly and coherently. Cooley's complaints and symptoms are documented in an extensive medical history. 8 Between June 1981 and May 1983, Cooley was examined by several neurologists, ophthalmologists, psychiatrists and psychologists, dentists, an ear, nose and throat physician, and a speech therapist. She was hospitalized from May 23, 1984, through June 20, 1984, because of the increasing severity of her impairments and her withdrawal from normal life activities. At admission, she was anxious, easily overwhelmed, depressed and fearful.1 II. A. 9 Our scope of review is limited to the inquiry of whether the Secretary's findings are supported by "substantial evidence." Richardson v. Perales, 402 U.S. 389, 401 (1971). Substantial evidence is "such relevant evidence as a reasonable mind might accept as adequate to support a conclusion." Consolidated Edison Co. v. NLRB, 305 U.S. 197, 229 (1938). In reviewing for substantial evidence, we must examine the record taken as a whole. Duncan v. Secretary of Health & Human Servs., 801 F.2d 847, 852 (6th Cir.1986). 10 Because the ALJ found that Cooley was never capable of returning to her past relevant work, the burden shifted to the Secretary to show by substantial evidence that she could perform work that existed in the national economy. See Buress v. Secretary of Health & Human Servs., 835 F.2d 139, 142 (6th Cir.1987) (per curiam); Varley v. Secretary of Health & Human Servs., 820 F.2d 777, 779 (6th Cir.1987). The theoretical ability to engage in some type of work is not enough; the Secretary must make "a finding supported by substantial evidence that [the claimant] has the vocational qualifications to perform specific jobs." O'Banner v. Secretary of Health, Educ. & Welfare, 587 F.2d 321, 323 (6th Cir.1978). "Substantial evidence may be produced through reliance on the testimony of a vocational expert in response to a 'hypothetical question,' but only 'if the question accurately portrays [the claimant's] individual physical and mental impairments.' " Varley, 820 F.2d at 779 (quoting Podedworny v. Harris, 745 F.2d 210, 218 (3d Cir.1984)). B. 11 Cooley asserts the Secretary did not show by substantial evidence that she could perform specific jobs. The pertinent part of the ALJ's opinion provides: 12 While the evidence of record does suggest the existence of a mental impairment going back to 1981, the undersigned finds that, given the minimal clinical findings in the record prior to May of 1984, the claimant's mental impairment, while severe, did not preclude her from performing a full range of unskilled work. While the testimony from the vocational expert and the medical findings in the record indicate that the claimant could not have performed her teaching job at that time and that her mental impairment probably precluded her from using or transferring her vocational skills, there is nothing in the record indicating that the claimant's mental impairment would have impacted upon her ability to perform unskilled work prior to May of 1984. The undersigned further finds that prior to May 1984, the claimant could have performed those unskilled ... jobs identified by the vocational expert, and that these jobs existed in significant numbers in the local economy. 13 J.A. at 232-33 (emphasis supplied). 14 Striking in the above passage is the ALJ's declaration that "there is nothing in this record indicating" that Cooley could not perform unskilled work prior to May 1984. This statement reflects a mistaken view of the case. As Buress and Varley make clear, the focus is not on what is absent from the record, but what evidence is in the record to prove that Cooley had the vocational qualifications to perform specific jobs. 15 The Secretary's proof of Cooley's residual functional capacity consisted of the testimony of vocational expert Michael Rosko, to whom the ALJ posed two hypothetical questions. The first question satisfies the Varley standard of accuracy, as the ALJ asked Rosko to consider a hypothetical forty-year-old woman who suffered through Cooley's undisputed physical and mental impairments--severe daily headaches, depression, withdrawal, impatience, irritability, frequent crying, hurling things about the house, insomnia, low self-esteem, nightmares, fear of teenagers, fear of telephone calls, frequent anxiety, seizures, poor memory, indecision, unpredictable moods, easily frustrated and overwhelmed, and severely impaired concentration. Assuming these impairments, the vocational expert testified it would be very difficult for the hypothetical woman to return to her past relevant work and that the impairment of her concentration "would probably preclude all jobs--skilled and unskilled for this hypothetical person." 16 Cooley attacks the second hypothetical question, in which the vocational expert was asked to assume the same impairments as above, except the woman's impairments did not substantially interfere with her concentration. He testified this second hypothetical woman could not return to her past relevant work, but "there would be some unskilled jobs that generally fall within the parameters of this hypothetical question." He testified there were approximately 20,000 strictly sedentary, unskilled jobs in the Detroit metropolitan area which she could perform, but if she tired easily and needed to lie down, she could not perform these jobs. 17 Cooley argues the second question is deficient because there is no evidence in the record that her concentration was intact between April 1981 and May 1984. She criticizes the question as failing to portray her individual physical and mental impairments accurately as required by Varley, and asserts it cannot serve as substantial evidence. We agree. A review of the medical evidence in this case indicates that from the beginning of the record, one of the most frequently discussed and documented of Cooley's impairments is her inability to concentrate, her inability to remember, her inability to focus sufficiently to utter complete sentences without needing to stop and reflect midway through. 18 We find other defects in the second hypothetical question as well. For example, the vocational expert assumed the hypothetical woman's continual and severe headaches were controlled by medication. But there is no evidence that Cooley's headaches have ever been controlled or relieved. Similarly, the vocational expert testified that the hypothetical woman could not perform unskilled jobs if she tired easily and needed to lie down during the day. It is undisputed that Cooley is easily overwhelmed, both mentally and physically, and must lie down often because of fatigue. 19 In our analysis it may appear that we are weighing evidence or resolving conflicts therein, which would be outside our scope of review. But the Varley inquiry of whether the Secretary produced substantial evidence that Cooley had retained the qualifications to perform specific jobs demands evaluation of the second hypothetical question, its failure to accurately portray Cooley's physical and mental impairments, and the resulting deficiency in the Secretary's evidence. The hypothetical questions the Secretary relies upon for substantial evidence must adhere to the claimant's actual mental and physical impairments; in this case, the second hypothetical question did not.2 III. 20 For the foregoing reasons, the judgment of the district court is REVERSED, and this case is REMANDED with the instruction that Cooley's onset date of disability be fixed at April 6, 1981. * Honorable John D. Holschuh, United States District Judge for the Southern District of Ohio, sitting by designation 1 The deterioration of Cooley's mental abilities is also documented. In November 1981, she scored in the normal range of intellectual ability, with a full-scale IQ of 95, a performance IQ of 86, and a verbal IQ of 103. By September 1984, her intellectual abilities had declined to the below average range, with a full-scale IQ of 87, a performance IQ of 80, and a verbal IQ of 95. By February 1986, Cooley's intellectual abilities had deteriorated to the point where she could score only in the borderline range on intelligence tests, with a full-scale IQ of 72, a performance IQ of 67, and a verbal IQ of 78 2 Because we find the Secretary's decision lacked substantial evidence, we need not address Cooley's alternate argument that she was rendered disabled by an organic brain disorder rather than an anxiety-related disability
{ "pile_set_name": "FreeLaw" }
am I the only one around here who doesnt fucking watch csi 165 shares
{ "pile_set_name": "OpenWebText2" }
You are here: Nicholas Mills, MD Profile Asante Service Location Asante Ashland Community Hospital Asante Rogue Regional Medical Center Gender: Male Primary Specialty Obstetrics & Gynecology Specialties Obstetrics & Gynecology Robotic Assisted Surgery Biography Nicholas Mills, MD earned his undergraduate degree in chemistry from University of Colorado. He attended medical school at The Ohio State University College of Medicine and then completed his residency in 2011 at nearby Riverside Methodist Hospital in Columbus, Ohio. Dr. Mills’ training has prepared him to manage all areas of women’s health care. He has special interests in caring for women with a history of preterm birth. Following a preterm delivery, the decision to become pregnant again can be a daunting task for couples. Dr. Mills understands this and is ready to help his patients. He prides himself in listening and sharing the emotional burden with these families while identifying areas to improve their pregnancy outcomes. Dr. Mills also has strong interest in gynecology and excellent training in minimally invasive surgery. He aims to guide patients to the therapy that achieves their treatment goals while limiting the physical impact on their lives. From urinary incontinence procedures to treatment for dysfunctional bleeding, Dr. Mills can help patients improve their quality of life with the latest procedures and surgical techniques. He comes to Medford joined by his wife Lyndsey, and children Emerson and Carter. In his free time, he and his family enjoy time outside, hiking, running, and golf. Office Information Doctor's Contact Information Locations Asante's online provider directory, ("Find A Doctor"), is provided for reference purposes only. Providers are responsible for the accuracy of the information submitted. As such, Asante cannot guarantee that the physician information presented is complete or accurate. Asante recommends that you contact your healthcare provider directly for the most accurate and up-to-date information. Providers who would like to report inaccurate information on their profile may contact Physician@Asante.org, information will be routed to the appropriate Hospital credentialing staff. Asante Moments High-Quality Healthcare for Everyone As the largest healthcare provider in nine counties, Asante provides comprehensive medical care to more than 580,000 people throughout Southern Oregon and Northern California. Our facilities include Asante Ashland Community Hospital in Ashland, Asante Rogue Regional Medical Center in Medford, Asante Three Rivers Medical Center in Grants Pass, Asante Physician Partners and additional healthcare partnerships throughout the region.
{ "pile_set_name": "Pile-CC" }
Dependent source In the theory of electrical networks, a dependent source is a voltage source or a current source whose value depends on a voltage or current elsewhere in the network. Dependent sources are useful, for example, in modelling the behavior of amplifiers. A bipolar junction transistor can be modelled as a dependent current source whose magnitude depends on the magnitude of the current fed into its controlling base terminal. An operational amplifier can be described as a voltage source dependent on the differential input voltage between its input terminals. Practical circuit elements have properties such as finite power capacity, voltage, current, or frequency limits that mean an ideal source is only an approximate model. Accurate modelling of practical devices requires using several idealized elements in combination. Classification Dependent sources can be classified as follows: Voltage-controlled voltage source: The source delivers the voltage as per the voltage of the dependent element. Voltage-controlled current source: The source delivers the current as per the voltage of the dependent element. Current-controlled current source: The source delivers the current as per the current of the dependent element. Current-controlled voltage source: The source delivers the voltage as per the current of the dependent element. Dependent sources are not necessarily linear. For example, MOSFET switches can be modeled as a voltage-controlled current source when and . However, the relationship between the current flowing through it and is approximately: In this case, the current is not linear to , but rather approximately proportional to the square of . As for the case of linear dependent sources, the proportionality constant between dependent and independent variables is dimensionless if they are both currents (or both voltages). A voltage controlled by a current has a proportionality factor expressed in units of resistance (ohms), and this constant is sometimes called "transresistance". A current controlled by a voltage has the units of conductance (siemens), and is called "transconductance". Transconductance is a commonly used specification for measuring the performance of field effect transistors and vacuum tubes. See also Circuit theory Ground (electricity) Mathematical methods in electronics Open-circuit voltage Lumped-element model Distributed-element model Series and parallel circuits Superposition theorem SPICE Topology (electronics) Trancitor Mesh analysis References Category:Power supplies Category:Electrical power control
{ "pile_set_name": "Wikipedia (en)" }
SubDir HAIKU_TOP src tests system network posixnet ; UsePrivateHeaders private shared ; UnitTestLib posixnettest.so : PosixNetTestAddon.cpp GetAddrInfo.cpp SocketTests.cpp : be $(TARGET_NETWORK_LIBS) [ TargetLibstdc++ ] ;
{ "pile_set_name": "Github" }
MiR-125b-5p suppressed the glycolysis of laryngeal squamous cell carcinoma by down-regulating hexokinase-2. Laryngeal squamous cell carcinoma (LSCC) is the most common form of laryngeal carcinoma with poor prognosis. Exploring novel factors involved in the progression of LSCC is quite necessary for understanding the mechanisms and designing therapeutic strategies for LSCC. In this study, we showed that miR-125b-5p was significantly down-regulated in LSCC tissues and cell lines. The decreased expression of miR-125b-5p was associated with the tumor differentiation, metastasis and high clinical stage of the LSCC patients. Overexpression of miR-125b-5p suppressed the proliferation and induced apoptosis of LSCC cells. Bioinformatics analysis predicted hexokinase-2 (HK2), an essential enzyme involved in the glycolysis of cancer cells, as one of the downstream targets of miR-125b-5p. Further molecular studies showed that highly expressed miR-125b-5p bound the 3'-UTR of HK2 and decreased both the mRNA and protein levels of HK2. Consistent with the function of HK2 in glycolytic metabolism, overexpression of miR-125b-5p significantly suppressed the glucose consumption and lactate production of LSCC cells. Notably, restoration the expression of HK2 attenuated the inhibitory effect of miR-125b-5p on the glycolysis of LSCC cells. The inverse correlation between the expression of miR-125b-5p and HK2 in LSCC tissues further supported the involvement of miR-125b-5p-HK2 axis in the progression of LSCC. Collectively, these finding suggested the miR-125b-5p-HK2 pathway as a novel mechanism in regulating the glycolysis and progression of LSCC.
{ "pile_set_name": "PubMed Abstracts" }
[Influence of qualitatively different fats on the level of cholesterol and phospholipids in the blood serum and liver on rats in choline-protein insufficiency]. The effect of lard and sunflower oil making part of a cirrhogenic ration with a high content of fat and deficient protein and choline on the level of total and esterified cholesterol and phospholipids in the blood serum and liver was studied. The experiments lasted for 150 and 210-240 days. Changes in the level of cholesterol and phospholipids in the blood serum and liver of the rats were noted to occur from the first days of developing fat dystrophy (fatty degeneration) of the liver, these changes gaining in intensity with lengthening of the test periods and progressive development of the pathological process. The quality of the fat influenced the extent of the upset cholesterol and phospholipids metabolism, since the saturated fat which accelerated and intensified the development of lipohepatosis and cirrhosis caused a significantly greater accumulation of the cholesterol ethers in the liver and reduction of these ethers, as well as of phospholipids in the serum. An addition of choline to the rations prevented the development of lipohepatosis, but failed to avert upsets of the lipids metabolism.
{ "pile_set_name": "PubMed Abstracts" }
The Mayor walked through the three possible routes and numerous possible future extensions. He broke down how successful systems in cities such as Seattle, Portland, and Tacoma have started with routes similar in length to the proposed for the Milwaukee Streetcar system (2 to 3 miles). The public is invited to attend an open house to review and comment on the proposed routes on October 8th, 2009 from 3 p.m. to 7 p.m. at the Zeidler Municipal Building at 841 N. Broadway. Keep in mind that this is a starter system, limited by the availability of funds. The plan is that once something is in the ground, expansions will be a lot easier. Mayor Barrett himself describes the plan as a “trojan horse” designed to be expanded. We invite you to vote in the below poll for your favorite route (and leave a message in the comments why), here is some quick food for thought from us. You’re also invited to buy a streetcar t-shirt, and wear it to the event on October 8th to show your support. Alignment #1 This route seems positioned for success because it connects likely riders (urban residents) with jobs. The Third Ward and downtown are filled with “creative class” jobs, and downtown and the lower East Side are filled with “creative class” workers. Likewise this streetcar would connect service industry workers with numerous restaurants, bars, and retail locations, saving money for the people who need it most. The jog up to Brady is more valuable than the jog further south in the Third Ward. Adding access for thousands of residents by connecting to Brady is more desirable than getting to the front door of more jobs in the Third Ward. It seems likely that if riders were dropped off by the iconic Milwaukee Public Market they would likely walk to the jobs located south of St. Paul in the Third Ward. Development potential along this route is good, although secondary to the potential for riders. This is key in this author’s viewpoint for making the starter system successful. Connection to the Intermodal Station is essential for regional transit (Amtrak, KRM, Megabus, Greyhound, etc). The 4th Street jaunt at the west end of the route seems likely to be underutilized, with likely only convention attendees and a few hotel guests using the leg. It might be better waiting until funds are available to make the 4th Street leg go further north. Alignment #2 The Water Street leg seems to pass less housing than Alignment #1 would. On the flip side it would likely pass more jobs, and more bars. It seems that a better balance would yield better ridership for the starter system. The potential Brady Street leg is intriguing, but likely a disappointment in terms of development. The Water Street portion could see more accelerated development, because of the line’s construction (The North End’s development would likely be accelerated). The Brady Street portion would draw riders, however, future growth may be difficult because of neighborhood politics including the East Village Neighborhood Conversation Overlay District that limit heights and thereby inhibits density beyond a certain level. Additionally, Brady Street itself is a historic district, which could limit the possibility of new development as well. Long-term development potential from the line on Brady Street is likely fairly limited (compared to other potential routes). Connection to the Intermodal Station is essential for regional transit (Amtrak, KRM, Megabus, Greyhound, etc). The 4th Street jaunt at the west end of the route seems likely to be underutilized, with likely only convention attendees and a few hotel guests using the leg. It might be better waiting until funds are available to make the 4th Street leg go further north. The alignment is less connected with the Third Ward, a large center of jobs, and is even further disconnected with the growing number of apartments at the east and southern areas of the Third Ward. Alignment #3 The alignment misses a large portion of East Town, the most jobs-dense portion of the city. The alignment serves many major entertainment hubs (Bradley Center, US Cellular Arena, Milwaukee Theater, Turner Hall Ballroom, Midwest Airlines Convention Center), which are likely to generate high ridership, but only on a handful of days. The alignment misses the Third Ward completely, a large jobs center, and an increasingly dense population center. The potential Brady Street leg is intriguing, but likely a disappointment in terms of development. The Water Street portion could see more accelerated development because of the line’s construction (The North End’s development would likely be accelerated). The Brady Street portion would draw riders, however, future growth may be difficult because of neighborhood politics including the East Village Neighborhood Conversation Overlay District that limit heights and thereby inhibit density beyond a certain level. Additionally, Brady Street itself is a historic district, which could limit the possibility of new development as well. Long-term development potential from the line on Brady Street is likely fairly limited (compared to other potential routes). The leg from Ogden to Brady would be important to generate ridership on the route, but it’s hard to imagine many people riding it to work daily. The route has the greatest development potential of the three routes, with all of the Park East covered. Unfortunately, that comes with the trade-off of likely the lowest ridership. If the goal is to build a starter system with the greatest number of riders possible, this is the worst option. 33 thoughts on “Milwaukee Streetcar Routes Unveiled by Mayor Barrett” Seems that the first option would have the highest projected ridership? Gotta go with whatever fetches the highest ridership with the starter system, the purpose of transit is for people to ride it, and that should help with extensions when the time comes. I’d say option 2 would be the best since it is most centrally located in the downtown to serve both east town and west town. Though I read that the streetcar may not have it’s own dedicated lane or have street lights turn green automatically for the streetcar? If that is true then don’t even bother with the system, it’s going to be no different than the bus in that it will get caught in traffic, like a bus, travel and a low average speed, and not run on a set schedule. #1 looks best. Connects intermodal station with U.S. Bank Center (this is critical, it’s the largest office building in the state), NW Mutual HQ, Fed courthouse, Cathedral Square, Third Ward, MSOE, Metromarket, Mil. Public Market, close to 411 E. Wisconsin and Pfister, and connects all of that with densely populated east side. I agree with Nathaniel, If people don’t ride and the system is not immediately successful, it will be crucified by the likes of Talk Radio. A streetcar system has been blocked for years, so it needs to hit the ground running if it comes about. The public must get behind it or it will be shelved for another 15 years. I like #1 for the simple fact that it goes through the central business district, while incorporating some entertainment venues. An even better route would start at the intermodal station, go north on 4th to Wisconsin Avenue, then east along Wisconsin Avenue to Jackson/Van Buren, then north to Ogden, then east to Farwell. Why not run this thing on Wisconsin Avenue, which is downtown’s main street? I think option 1 with the extension would be great, and I would actually trade the extension for the small segment that goes from the station to Wisconsin since that segment will be very underutilized. @Andrew, I think there is a lot of consternation with the BRT folks from the county about having both lines on the same street (which to me seems ridiculous, but it is what it is). Might be a congestion/speed of service issue with Wisconsin too (not sure). Hopefully #1 is what is built, with the extension to Brady. This brings together a nice mix of tourist destinations, jobs, housing, and nightlife. Hopefully if KRM and the county’s BRT plans move forward there will be easy transfers(no extra fees/thoughtful placement). Great news. At a glance, I prefer route number 1, though I agree that the 4th street leg seems unnecessary. You’d be quicker walking the 0.30 miles from the intermodal station to the convention center than waiting for a streetcar. Also, this route passes under 794 via Van Buren and Jackson. It seems this routing would severely limit the potential for tidying up the knot of highway ramps at this location or implementing a surface level boulevard. Perhaps a crossing closer the river would be better in this regard? Is the trade-off worth it? I see many of your arguements for route 1, but remember that we also have a proposed COMET system that would, if built, run norh on Prospect and south on Farewell with stops along that corridor. So, do we want duplication? You need to look at the systems together. Or is this proposal replacing the COMET…I thought it was the new route for the downtown circular streetcar OK, after further review route 1 looks the best option considering the current land use, but 2 could lead to new development along the water street corridor and park east. I am torn….to with what will work now or what could create more growth in a under utilized area of the downtown. regardless of where the route is they MUST have a dedicated lane for the vehicle and they must have the street lights turn green for the vehicle so that it’s movement is not stoped for traffic lights. This mode needs to be significantly quicker than the existing buses and in needs to be on time at stops or it won’t be used. I think option 1 hits the greatest number of commuters and would provide walkable access to all the entertainment destinations available downtown. One question that will hopefully be answered at the meeting is how many cars will run on this line? Personally, I would hope there will be no schedule, instead you can expact that a train will be along every 5-10 mins. Unfortunately, given the length of this starter system, if it has a schedule like our current buses it would probably still be easier to make the 30 min walk downtown rather than wait 30 min for a ride. I voted for #1 as the best of the lot but I think that the first route should definitely include going all the way to UWM period. Otherwise I don’t think it will be successful as it could be. I know that it would take more $ but then an unsuccessful route is wasting what we have and puts a pall on further development. For maximum economic development as well as school/job ridership I would include route north of Brady that would include Downer and Oakland shopping centers, that mirrors the “30” and “15” routes that are the most successful of the present bus routes. This would be the “Dream Route” for a successful first run of the street cars in Milwaukee. I think option #1 is the best of the three but it really needs to run at least North Ave. I really can’t imagine that the streetcar is going to blaze though the short route in a way that will far surpass the bus system. I live a few blocks of North and the 30 only takes 20/25 min for me to get to work (4th & Wis) and the 15 about 5 min less. I know people who live along the proposed route that drive and I really don’t forsee then giving up cars for this. Its the people on the fringes of downtown (less economically well off) who really need quick and fast transit versus people who live in 400k condos or pay 2k a month in rent. I know we have to start somewhere, but I think the starting point needs to be a bit larger. If the line could be extended at least to North Ave, that would capture a large number of UWM students, especially since UWM is running those shuttles between the Kenwood campus and North Ave. Yes, it would require a transfer to get downtown where the 15 and 30 wouldn’t, but unlike the 30 or 15, it would allow you to get to the Intermodal station with luggage. Better would be all the way to UWM. I think what hasn’t been made clear here is that there is only enough money for about 2 miles. Of course it would be great to get to North Avenue or UWM. It would also be great to get to Marquette, Bay View, Bronzeville and many other locations but there is only enough money for 2 miles. I lived on the Eastside (Prospect and Brady area) for many years, in the Third Ward for a year, attended UWM for undergrad and grad school, worked downtown for two years and honestly, I don’t think I would have ever ridden the proposed streetcar. I owned a car but often tried to survive without it by using the 15/30 buses. My thought is that “Milwaukee Urbanites” will adapt to this system if it perhaps connects UWM to Marquette and runs through the Third Ward / Downtown / East Town / Brady / North / probably a few other locations… otherwise the bus seems more convenient. Maybe we’re “building a bridge halfway over the river” because that’s all the money we have? (I know not the best analogy) and I could be totally wrong about this… maybe there are enough people who regularly need to go between East Town and Downtown for this too work. I think Urban Milwaukee staff should create a different poll, such as: if you are a “Milwaukee Urbanite” would you use the streetcar? Y / N Also, I’m wondering if any transportation engineering types have weighed in on this. And one more thing… thank you Urban Milwaukee. Someday I plan to move back to Milwaukee but I feel like I’m not missing anything because of your site. Michael, one of the benefits of a streetcar is that it won’t just attract us urbanites, it will attract almost everyone. There are a lot of people who live on the lower east side who now drive to the Third Ward or downtown. I know that sounds crazy, but it’s true. The bus is not appealing to them for a number of reasons (confusing, infrequency of service, misconceptions, etc.). The beauty of enhanced transit options like a streetcar is that they can help increase transit ridership as a whole, because they appeal to a larger group of potential users. From a transportation engineering standpoint: Granted, never underestimate an American’s willingness to shell out $$ to be moved 4 blocks without walking, but still, this leg doesn’t seem to make much sense. From a political/marketing standpoint: There’s zero chance this thing gets build WITHOUT being paraded around in front of the convention center. And there’s the end of discussion for that leg! In addition to the convention center, it might be important for the streetcar to make an appearance on Downtown’s main drag west of the river. Something else I have been wondering about…I’m assuming the streetcar line and the vehicles themselves will need some sort of maintenance shed. Looking at alternative 1, it seems to me that one of the best places for this building to go would be in the 4th and Clybourn Area. I assumed that was another reason why that particular little jaunt. Any other ideas where it could go? I have to go with the consensus on #1. Simply because of projected ridership and the fact that #3 just leads to sports arenas and a empty and unused mall and #2 seems to follow only nightlife not linking any of the East town residences to third ward and downtown Have you guys (Dave and Jeramey) heard anything more about a locally preferred alternative? I know that milwaukeeconnector.com gave a timetable with a “locally preferred alternative approved” in December 2009 to January 2010. Would the City Common Council be in charge of choosing this alternative? The City engineering department?
{ "pile_set_name": "Pile-CC" }
Q: Treat nested std::arrays as a single flat array with chained .data() Let's say I have this little fixed-dimension matrix class: template<size_t M, size_t N> struct MatMN { std::array<std::array<double, N>, M> rows; double* begin() { return rows.data()->data(); } //The scary part double* end() { return begin() + M*N; } //const iterators, etc. }; and instead of using nested loops, I implement scalar multiplication (also equality testing, binary de/serialization, etc.) like so: template<size_t M, size_t N> MatMN<M, N> operator*(double scalar, MatMN<M, N> mat) { for (double& x_ : mat) { x_ *= scalar; } return mat; } Is it actually okay to treat nested std::arrays as a single flat C-style array by using .data()->data()? Am I at risk of some strict-aliasing issue? Or maybe unexpected struct padding at the end of individual std::arrays (i.e. between matrix rows)? So far it's worked fine for me (with GCC), but I know that doesn't mean much in C++. A: Is it actually okay to treat nested std::arrays as a single flat C-style array by using .data()->data()? No. std::array is allowed to have padding at the end. That means that there could be a gap between where one array ends and the other begins in the nested structure. getting a pointer like you do would (if the padding is there) will cause you to access that padding giving you undefined results. Instead of storing the matrix in a 2d std::array you should just use a 1d std::array. That way you can guarantee the elements are all next to each other in memory.
{ "pile_set_name": "StackExchange" }
Preferred Customer, take a look below for specials and discounts just for you! Item #BN631G Item Description When someone special isn't feeling well, cheer them up with our unique arrangement of pink alstroemeria. Arranged in a pink glass vase, wrapped with a pink ribbon, this arrangement also includes an adorable teddy bear to cuddle with to feel better in no time. Arrangement measures approximately 21"H x 11"W x 12"D. You May Also Like: Shipping Information Same Day Flower Delivery is available in the USA from our network of local florist partners. Orders for flower delivery today must be placed by 3pm in the delivery zip code. Next day delivery options or dates in the future are also available. Cut off time for delivery same day varies on weekends and during peak holidays. In order to ensure you receive the freshest product possible, we will make every attempt to deliver the specified product. In some cases our florists may need to substitute a similar container or flowers. I wanted to send something simple and cuddly to my co-worker's daughter who was in the hospital with asthma and pneumonia. I wasn't sure if she'd be there overnight and as it turned out, she wasn't, but she received the flowers and teddy bear just in time. Her mom tells me it really cheered her up and made her feel special. She slept with the teddy bear that night...at home in her own bed. The downside was the cost, but I guess you pay for expedited service, so in that sense it was worth it. Top Holidays Same Day Flower Delivery Celebrate today's special occasion with a flower delivery! From You Flowers offers beautiful flower arrangements for same day delivery by a local florist. Whether you need to send flowers to New York, Texas, or California, FromYouFlowers.com offers USA flower delivery from coast to coast. Want to make it a one-of-a-kind gift? Add a teddy bear, chocolates or a balloon bouquet to your online flower order. We are the same day delivery experts; if you need flowers delivered today there is no better choice than From You Flowers!
{ "pile_set_name": "Pile-CC" }
This invention relates to a hobbing machine of the type in which a hob on a rotatable hob spindle is rotated in precisely timed relation with a gear blank on a rotatable work spindle in order to form gear teeth around the periphery of the gear blank. Under very specialized circumstances, the axis of the hob spindle may extend perpendicular to the axis of the work spindle. In most instances, however, the hob spindle is inclined relative to the work spindle at a predetermined setting angle which is other than a right angle. The setting angle is determined as a function of the thread angle of the particular hob being used and, in cases where a helical gear is being formed, the setting angle is also a function of the helix angle of the gear. In virtually every hobbing machine, it is necessary to be able to adjust the center-to-center distance between the axis of the hob spindle and the axis of the work spindle while maintaining the same setting angle. Adjustment of the center distance is necessary, for example, to enable a gear blank to be loaded onto or unloaded from the work spindle, to enable the depth of cut of the hob into the work to be established and/or to enable the hob to be brought into proper working relationship with the work after the hob has been re-sharpened and reduced in diameter. Most hobbing machines which presently are in commercial use are so-called universal hobbing machines. That is, the hobbing machine is adapted to be used with several different hobs and is adapted to be changed over to enable the formation of many different types and sizes of gears. While a universal hobbing machine is extremely versatile, that very versatility causes the overall construction of the machine to be both complex and expensive. Most universal machines include adjustable hob and work slides, an adjustable hob swivel and other adjustable components and also include a complex drive train with several sets of change gears for driving the hob and work spindles in various timed relationships. The complexity and expense of a universal machine are of little value to a gear manufacturer who wishes to make only a single type of gear or a very narrow range of gears. Moreover, the various adjustment capabilities which are present in a universal machine tend to introduce a lack of stiffness and precision into the drives for the spindles, several disadvantages resulting therefrom.
{ "pile_set_name": "USPTO Backgrounds" }
Exclusive: Peugeot board approves outline Dongfeng deal - source Sophie Sassard 3 Min Read LONDON (Reuters) - PSA Peugeot Citroen’s (PEUP.PA) board has approved a plan for an alliance with Dongfeng (0489.HK) in which the Chinese carmaker and the French state would buy large minority stakes at a 40 percent discount to Peugeot’s current share price, a source familiar with the matter said. Peugeot employees work on the assembly line at the Dongfeng PSA Peugeot Citroen factory in Wuhan, capital of central China's Hubei province, November 17, 2006. CHINA OUT REUTERS/Stringer The board agreed to enter final negotiations on a 3.5 billion euro ($4.8 billion) share issue that would see France and Dongfeng Motor Group take matching 20 percent holdings, the source said on Wednesday, speaking on condition of anonymity. The capital increase would be priced at below 7 euros per share, and perhaps as low as a 6.85 euro indicative offer from Dongfeng, the source said. Peugeot’s shares closed at 11.50 euros on Wednesday. A spokesman for Peugeot declined to comment on the alliance talks. Dongfeng officials could not be reached after hours in Wuhan, China. The French government also declined to comment. Peugeot, one of the carmakers worst hit by the European market slump, is cutting jobs and plant capacity to try to halt losses within two years. Philippe Varin, Peugeot’s outgoing chief executive, has said the French carmaker is exploring a deeper relationship with Dongfeng, its existing partner in a Chinese joint venture. The two companies have been in talks for months to extend cooperation to other Asian countries after a multibillion-euro share issue in which Dongfeng and the French government would acquire significant stakes, sources have said. The Financial Times reported they plan to transfer some Peugeot technologies to Dongfeng while targeting new markets in southeast Asia. The hefty discount on the proposed deal, approved by Peugeot’s board on Tuesday, reflects worsening conditions and currency headwinds since the company pledged to halve its cash burn to 1.5 billion euros this year, the source said. Under its outline terms, Dongfeng and the French state would each hold about 20 percent of Peugeot after a reserved share sale to the French state and Dongfeng and accompanying rights issue for existing shareholders. The founding Peugeot family would lose control as its stake was diluted from 25 percent to 15 percent even after acquiring some new stock in the rights issue, the source said. The effect would be even more dilutive for 7 percent-shareholder General Motors (GM.N) or any other existing investors that turn down the chance to buy new shares. Peugeot hopes to conclude the deal in January or February, according to the source. In a move that may help secure the new funding from Dongfeng, Peugeot last week named former Renault No.2 Carlos Tavares as its next chief executive.
{ "pile_set_name": "Pile-CC" }
In my last post, I was delighted to see the TGISVPAlpha & Beta Portfolios continue to expand their level of out-performance vs. their ISEQ benchmark. Particularly pleasing was the sight of my favourite, the Smart Alpha portfolio, far outpacing the others with a 21.1%YTD absolute return. But we’re still only 9 months into the experiment, so clearly we need a far longer horizon to confirm if this performance edgeis sustainable. It also makes me wonder if there’s a lesson to be learned here..? No, not whether value investingout-performs in the long run – I’m fully convinced of that already! [And if you’re not, please please read some of the numerous papers published on the topic]. But whether a mechanicalapproach is perhaps better? Ha! No, I’m certainly not planning on becoming a stock screening convert..! But I wonder: Even if you’re a v competent & disciplined value analyst, even if you’ve conquered much of the fear & greed involved in investing, perhaps that demon mind still trips you up at that v last hurdle, or two..? When you’ve a nice stack of portfolio candidates lined up, why do you then take a shine to some & not to others? Why does one special stock really get your heart racing, far out of proportion to its obvious prospects? Why do you end up triple invested in one stock vs. another, when they both lined up pretty much even-stevens in terms of risk/reward? Yes, even when you have a v disciplined & analytical framework for your investing, there’s still a lot of mystery attached to the end-result: The actual composition of your portfolio. Does that mystery add, or subtract, value?Perhaps a more mechanical portfolio approach, such as the TGISVP Beta (or even Alpha) portfolios, actually adds more value? Perhaps it may even be the logical & ultimate extension to a value investing approach? I really don’t have the answer. Thoughts..?! Anyway, now we’ve got TGISVP performance up-to-date, I thought it would be interesting (and even useful!) for readers to see the latest snapshot of potentialIrish Winner & Loserstocks. For this, I’m using a slightly different version of my TGISVP performance file: – All share prices are as ofSep-30th – The vast majority of target valuations are unchanged** from Q1 – I haven’t seen fit to change them, even for stocks I hold – All FX rates are updated, so this will affect the actual target prices for a significant percentage of stocks As you can see, this mostly boils down to an exercise in ranking stocks based on comparing current share prices vs. my original target valuations. Therefore, it’s only right to warn you to perform your own research & analytical update if any stock(s) happen to catch your eye. Subsequent news flow & results can, on occasion, radically (& abruptly) change the intrinsic value of a company – which is unlikely to be factored into a valuation that dates back to, for example, February. So…why don’t I just update all valuations once a quarter, or so?!Erm, right – because i) I just don’t have the time, we’re talking 70+stocks here, and ii) I really don’t need to – this is a screening/ranking exercise, after all! Broadly speaking, most intrinsic valuations should & do evolve slowly over time. Therefore, once the heavy lifting of the initial valuation phase is done, we then have a framework to quickly & easily keep track of a large number of companies, and the most likely under/over-valued stocks. Even with no input/updates to intrinsic valuation, I think it’s reasonable to expect this exercise to be still making a valuable contribution up to 12-18 months later. Of course, if you’re actually contemplating a fresh purchase (or sale) of one of these stocks, that would obviously demand a deeper dive first. But maybe you disagree with my assertion that most intrinsic valuations only evolve slowly? In your opinion, or experience, perhaps they change much more frequently & violently..?If so, can I make a suggestion (gained from my own long & bitter experience) – take a long, hard look in the mirror, it might be you: i) Do you regularly change intrinsic valuations, sometimes radically, based on exactly the same facts & figures, or on a v incremental change in results or news flow? ii) Do you own too many stocks that actually experience radical changes in their share price and intrinsic valuation, often overnight? If i) is proving a problem, it’s possible you’re being somewhat inconsistent, and/or less than rigorous, in your valuation analyses. You may also be allowing greed & fear to influence you too much. Developing an overall (reasonably rigid) analytical framework & a related set of metrics, and constantly challenging yourself to value large & varied lists of stocks, is a great path to better analytical rigour, and less emotion. If ii) is hurting, you may be picking too many risky and/or difficult stocks. They’re likely to have poor management/governance, a bad/volatile business model, and/or they’re simply over-leveraged (and/or cash-flow negative). Or maybe they’re just outright gambles (‘oh God, if they hit oil…we’re all rich – if they don’t…ah, just shut the fuck up!’). These are exactly the kind of stocks which love to surprise you in the worst way possible… Yeah, sure, difficult stocks might present an intriguing challenge, and pure gambles are so enticing – but really, why bloody bother? You’ve absolutely nothing to prove, to anybody, in your investing! Big talk, and all those usual coulda/woulda/shouldas, just means sweet f***-all… ‘Cos all that matters, in the end, is your actual (long-term) portfolio return. And that matters to you, and nobody else – they don’t get rich if you do, and they definitely don’t care if you lose it all! And I can assure you there’s always far easier & safer stocks to invest in, offering just as much upside potential. OK, perhaps you might have to look a little harder… And sleep a little easier… ;-) And so, let’s begin with the current Bottom 15 in TGISVP: Good God..! Just look at this lot – pretty much a bunch of tawdry junior resource stocks. I imagine buying these would feel like signing up for a daily kick in the bollocks… Any day your tender gonads were miraculously left unmolested would feel like a winner, eh? I’m not suggesting you short any of these losers (if that’s even possible?), but if you own (or are actively buying) any of them, I’d recommend you think v long & hardabout the risks involved. I certainly wouldn’t want to own them… And you could definitely have your money in something better, anyway – what..? Yeah, sure, maybe even lottery tickets..! But failing that, you might even think about truffle hunting in this patch instead – the TGISVP Top 15: Of course, this isn’t an invitation to dive wholesale into these stocks either! While I think the target prices fairly balance the risks/rewards involved, some of these stocks present corporate governance risks/issues. Or they’re simply over-leveraged, which tends to lead to a v binary outcome ultimately (success, and the stock price doubles/triples, or failure, and you get wiped out). Personally I’m happy to see three out of my four Irish holdings on the list, and pretty content with them also! Write-ups here: FBD/Total Produce, and Petroneft. I’m also happy to see my next(well, potentially!) Irish stock lurking on the list. ;-) But I’d probably want to sell/lighten up an existing Irish holding before buying it. That could prove a blessing, I’ve a feeling it might come a little cheaper first… Finally, my other Irish stock, Trinity Biotech (TRIB:US), actually missed the cut. Not exactly a source of complaint though – it’s due to the continued rally in the TRIB share price. In fact, a recent Barron’s article gave it the oomph this week to blow past my latest intrinsic value target of $13.41, and close up +11% this week at $13.99. However, rather unusually, I also specified a secondary price target of $16.69 which still beckons. This was actually surpassed by an $18.50 price target cited by Barron’s, which may prove tempting to many US investors now that TRIB’s finally back on their radar with a good growth story & stock performance. Good luck! And just email me if you want to discuss/compare notes on any of the above stocks, or the implications of any news flow, or results, since my original valuation target. I’m also attaching the relevant Excel file that supports the above tables, for your reference – feel free, of course, to refresh share prices and to revise/completely alter valuations as you see fit for your own analysis.
{ "pile_set_name": "Pile-CC" }
US biomedical and health services researchers are increasingly asked to adopt a more pronounced patient- centered orientation in their work. Such a shift requires a more active engagement of the public (e.g., community representatives) in the research process. As we know from decades of experience with Community Based Participatory Research, active community participation in healthcare research has the potential to make science more transparent; improve the relevance of interventions to patients' needs; enhance the level of cultural sensitivity of healthcare research; boost public engagement in, and use of, research; and facilitate policy efforts to increase healthcare quality and reduce health disparities. At the same time, active research engagement of new stakeholders calls for revisiting some aspects of the scientific process that may traditionally have been just assumed among academics. The meaning and practice of research integrity (RI) is one such topic that is worth revisiting. In the proposed project, we argue that the increasing prominence and promise of partnered work can inform the development of a more thorough understanding of RI by exploring (1) how academic and community research partners conceptualize and maintain RI and (2) how partnered processes might support or undermine RI in a range of research approaches that aim to be patient-centered. First, we will gather a wide range of academic and community perspectives on RI in partnered research to broaden our understanding of RI, identify threats to RI, and explore strategies used to overcome them. We will do so by conducting semi-structured interviews with community and academic partners, asking them to delineate specific strategies that support the RI in partnered work, such as those used to ensure against bias, maintain trust and transparency, safeguard data security, and guarantee subject autonomy. Second, we will explore the extent to which the lessons learned about RI in partnered research, including dimensions of RI, threats to RI, and strategies to overcome them, are relevant and applicable to a range of scientific models, such as bench, translational, comparative effectiveness, and implementation research. We will use an innovative online iterative panel process called ExpertLens to catalogue the viewpoints of a diverse group of researchers and community research leaders working in these scientific fields. We will use these results to generate a set of preliminary guidelines for maintaining RI in research that strives to engage diverse stakeholders. The findings will have high significance because they will improve our understanding of the features of the internal and external environment that can support or undermine responsible research behavior in community-engaged research, and because they will generate recommendations for conducting patient- centered outcomes research with high degree of RI. Results will also form the basis of an R01 application that will empirically assess the impact of partnering on RI across a broad range of scientific projects.
{ "pile_set_name": "NIH ExPorter" }
grorg.org: a proud member of the useless websites community. The Quest for the Ultimate Milkshake My milkshake brings all the boys to the yard. Kelis 1 Since the dawn of time, humans have fought the laws of physics and pasteurisation in order to create the perfect blend of milk and shaking. To my knowledge, this battle has not yet been won, so I took it upon myself to search the world in the quest for the Ultimate Milkshake. Even though I’ve been on this mission for more than twenty years, I have not found many milkshakes that reach a worthy grade. For this reason, I only list a few milkshakes here - the best of the best. The search has covered about 20 countries and consumed many hundreds (possibly thousands) of shakes. If you have a suggestion for a great milkshake, please send it to me. At this point you might be wondering what it takes to make the perfect milkshake. Well, it is hard to quantify. I like my milkshakes heavy on the ice cream–almost to the point of requiring an industrial strength straw in order to withstand the amount of raw suction required to get the liquid from container to mouth. I also prefer if the flavour comes from the ice-cream rather than a syrup. I can’t remember ever having a great milkshake that used syrup for the flavour (they are usually way too sweet). If it is my first visit to the milkshake vendor, I start with a classic vanilla (preferably with the seeds of the vanilla bean visible). A repeat visit might have me branch out to chocolate or caramel, and then to the full flavour repertoire after that. Ok, that’s enough dairy chit-chat. Let’s get on to the shakes. Aside: New England and their “frappes” Before we start, a quick discussion about one of my favourite milkshake locations. For some reason those wacky New Englanders call their milkshakes “frappes”. I overlook this affront to the art of blended milk because they make amazing drinks. Seriously, Boston could be named the milkshake capital of the world. Generally everything I’ve had around there has been exceptional (including Cambridge and Harvard). One more thing about Boston: there is a damn fine chocolate milk available called Berkeley Farms. I’m not sure how they do it, but they’ve managed to blend together the two ingredients into a perfect mix.2 And while we’re on a chocolate milk digression, I was overjoyed to find Canada makes a customized brand of chocolate milk just for me!! 3 Toscanini’s in Cambridge, MA If you’re lucky enough to spend some time around MIT then make sure you check out Toscanani’s. It’s just up the road towards Central Square. The sign out the front says “World’s best ice cream”, which is a pretty big boast4, but they live up to it. They make fantastic milk shakes with a wide selection of flavours. There is nothing better than walking through a hot, humid Boston summer to get an icy-cold milkshake. In fact, the Toscanini milkshakes are so good there is nothing better than walking through a freezing Boston winter to get an icy-cold milkshake. And if you can enjoy a milkshake when it’s -10C, then you know it is pretty amazing. My recommendation: Vanilla. Hint: get a frequent milkshakers card if you’re going to be visiting a number of times. And you should! Emack and Bolio’s around Boston, MA and elsewhere Emack and Bolio’s motto is “Ice Cream for the Connoiseur”, and they mean it. This is a mini-chain that is now open in nine states across the US. As you can tell by the menu shown here, they put the fun back into ice cream. Now you might say that the fun never left ice cream, but whatever, Emack and Bolio’s make great milkshakes and that is all I care about. I’ve only been to the store in Roslindale, but I’m pretty confident the quality would be consistent everywhere. I’ve tried a few flavours and loved them all. I remember asking the staff what type of monster they used for the Monster Mash flavour and whether the grasshoppers in the pie were local to the area. My recommendation: Chocolate Moose, but try them all Bobtail Soda Fountain, Chicago, IL The Bobtail Ice Cream Company make fantastic ice cream, with some unusual flavours like pumpkin and cinnamon. Honestly, I’ve never tasted such great ice cream. They also have a few outlets where they’ll make you a milkshake. Now any milkshake expert will tell you that a milkshake tastes best in a metal cup. Not only does it taste better, you usually get more to drink (those 50s-style glass containers aren’t enough to fill you up). Bobtail certainly delivered, with a metal cup that instantly started condensing water on the outside and was cold enough to give you a sore hand. I visited the store in Broadway near DePaul University. I remember telling the staff about my quest for milkshake nirvana and how their creation had instantly made the list. When I visited about six months later they remembered me, a pleasant experience which made the milkshakes even tastier!! My recommendation: Vanilla milkshake (as usual). For ice cream, try the Daley Addiction. The rest of the World I’ve had a lot of milkshakes in a lot of places and the ones listed above stand out so much that I’m not bothering to mention the other contenders. Well, except one. I’d feel bad for not plugging a local shop - Rubee’s in Canberra. Their milkshake isn’t fantastic, but their “frozen custard”5 is awesome. Get a concrete. My favourite: chocolate with macadamia nuts. I’m always on the lookout for milkshake recommendations. Please send them in.
{ "pile_set_name": "OpenWebText2" }
476 F.Supp. 974 (1979) Shirley A. ONLEY v. Detective Herman W. SIMMS and City of Lancaster and Penn Supreme and Penn Dairies, Inc. and Caroline Pratt and Phillip A. Kliewer and Marge Breniser c/o National Central Bank and National Central Bank. Civ. A. No. 79-1304. United States District Court, E. D. Pennsylvania. September 20, 1979. Gerald A. Stein, Joel D. Caney, Philadelphia, Pa., for plaintiff. *975 C. W. Mattson, R. P. Nuffort, Lancaster, Pa., J. K. Thomas, II, Harrisburg, Pa., for defendants. MEMORANDUM TROUTMAN, District Judge. Disappearance of cash which plaintiff, an employee of defendants Penn Dairies, Inc. and Penn Supreme (Penn), claimed to have deposited on behalf of her employer with defendant National Central Bank (Bank), July 10, 1978, led to an investigation which culminated in plaintiff's arrest two months later. Plaintiff was taken into custody, processed, fingerprinted, photographed and held for preliminary arraignment. However, the District Attorney of Lancaster County dropped the charges shortly before the Bank discovered the missing deposits stuck in the night depository in January 1979. Plaintiff then commenced this action alleging violations of the Fourth, Fifth, Ninth and Fourteenth Amendments and the Civil Rights Act of 1871, 42 U.S.C. § 1983.[1] Defendants, who now move to dismiss the complaint, include Penn, the Bank, two Penn employees, one Bank employee, and Detective Herman W. Simms, an employee of defendant City of Lancaster. Specifically, plaintiff charges that the Penn and Bank employees acted under color of state law and conspired to deprive her of constitutional rights by maliciously making misleading and false statements to Detective Simms "when they knew or in the exercise of reasonable investigation and care would have known (that the accusations) would result in the arrest and prosecution of the plaintiff" for violation of 18 Pa.Cons.Stat. Ann. § 3927(a)(Purdon).[2] On September 15, 1978, relying in part on statements made by the Penn and Bank employees, Simms executed a complaint before a Lancaster County Justice of the Peace, who determined that probable cause existed to believe that plaintiff committed the theft. With the warrant that issued upon the complaint Simms arrested plaintiff, who now alleges that the criminal proceedings were "instituted and continued against the plaintiff ... wholly without ... probable cause" and thus violative of the Fourth Amendment. The instant situation is therefore unlike Baker v. McCollan, ___ U.S. ___, 99 S.Ct. 2689, 61 L.Ed.2d 433 (1979), in which the respondent did not attack the validity of the warrant under which he was arrested. In fact in Baker the respondent's 1983 claim was based on a sheriff's actions after, not before, arrest.[3]Id. at ___, 99 S.Ct. 2689. In the case at bar plaintiff does attack the validity of the arrest warrant. Arrest without probable cause is a constitutional violation. Patzig v. O'Neil, 577 F.2d 841, 848 (3d Cir. 1978). The issue therefore arises whether an allegation of simple negligence states a claim for relief under § 1983; more specifically, whether Detective Simms is liable under § 1983 if he negligently caused plaintiff to be arrested upon less than probable cause. *976 Although the Supreme Court has expressly reserved deciding the matter, Baker v. McCollan, supra, Procunier v. Navarette, 434 U.S. 555, 98 S.Ct. 855, 55 L.Ed.2d 24 (1978), it has opined that the appropriate answer is "more elusive than it appears at first blush" and "may well not be susceptible of a uniform answer across the entire spectrum of conceivable constitutional violations which might be the subject of a § 1983 action". Baker v. McCollan, ___ U.S. at ___, 99 S.Ct. at 2692. See also Monroe v. Pape, 365 U.S. 167, 187, 81 S.Ct. 473, 5 L.Ed.2d 492 (1961), in which the court held that a specific intent to violate a constitutional right is not required in a § 1983 action but did not reach the question of whether a general intent without regard to whether the acts specifically were intended to violate a person's civil rights was necessary for a § 1983 action to lie. Neither the Fourth nor Fourteenth Amendments guarantees that only the guilty will be arrested. And the Due Process Clause specifically does not mandate that "every conceivable step be taken, at whatever cost, to eliminate the possibility of convicting an innocent person". Baker v. McCollan, ___ U.S. at ___, 99 S.Ct. at 2695, quoting Patterson v. New York, 432 U.S. 197, 208, 97 S.Ct. 2319, 53 L.Ed.2d 281 (1977). A fortiori, due process does not require exhaustion of every conceivable precaution to avert arresting an innocent person. Many courts agree that simple negligence may not form the predicate of a § 1983 claim. Page v. Sharpe, 487 F.2d 567, 569 (1st Cir. 1973) ("mere negligence, in the absence of conduct which shocks the conscious, in giving or failing to supply medical treatment to prisoners will not suffice"); Williams v. Vincent, 508 F.2d 541, 546 (2d Cir. 1974) ("an isolated omission to act by a state prison guard does not support a claim under section 1983 absent circumstances indicating an evil intent, or recklessness, or at least deliberate indifference to the consequence of his conduct"); Corby v. Conboy, 457 F.2d 251, 254 (2d Cir. 1972) (mere negligence by a state prison doctor does not support a claim of denial of federal constitutional rights); Patzig v. O'Neil, 577 F.2d at 848 ("police personnel may have acted negligently, perhaps even callously; but such actions do not amount to the `intentional conduct characterizing a constitutional infringement'"); Hampton v. Holmesburg Prison Officials, 546 F.2d 1077, 1081 (3d Cir. 1976) ("to establish a constitutional violation, the indifference must be deliberate and the actions intentional"); Howell v. Cataldi, 464 F.2d 272, 279 (3d Cir. 1972) (plaintiff must adduce proof of either "wrongful intention or culpable negligence"); Bryan v. Jones, 530 F.2d 1210, 1215 (5th Cir. 1976) (en banc) (a jailer whose errors in a record-keeping system fall outside of his realm of responsibility cannot be found liable if he has acted reasonably and in good faith); Puckett v. Cox, 456 F.2d 233, 235 (6th Cir. 1972) (more than an isolated incident of negligence must be alleged); Jamison v. McCurrie, 565 F.2d 483, 486 (7th Cir. 1977) ("there is no constitutional cause of action for mere negligence on the part of police officers . . .. Plaintiff must show that their misbehavior was either intentional or in reckless disregard of his constitutional rights"); McDonald v. Illinois, 557 F.2d 596, 601 (7th Cir. 1977) ("for plaintiff to state a cognizable claim, he must allege more than mere negligence on the part of . . . defendants"); Brown v. United States, 486 F.2d 284, 287 (8th Cir. 1973) ("we are extremely hesitant to hold that mere simple negligence can be the basis of personal liability under § 1983"). Cf. Procunier v. Navarette, 434 U.S. at 568, 98 S.Ct. at 863 ("one who does not intend to cause and does not exhibit deliberate indifference to the risk of causing the harm that gives rise to a constitutional claim is not liable for damages under § 1983") (Burger, C. J., dissenting). See also Stringer v. Chicago, 464 F.Supp. 887, 890 (N.D. Ill. 1979), Croswell v. O'Hara, 443 F.Supp. 895, 898 (E.D. Pa. 1978), Schweiker v. Gordon, 442 F.Supp. 1134, 1138 (E.D. Pa. 1977), and Jones v. McElroy, 429 F.Supp. 848, 863 (E.D. Pa. 1977).[4] *977 To distill from these disquisitions the appropriate standard by which to evaluate plaintiff's claims is no simple matter. Nonetheless, the appropriate standard seems to include both a subjective and objective element under the circumstances. If Detective Simms, acting in good faith, sincerely believed that probable cause existed that plaintiff committed the theft, and if he did not know, nor reasonably should have known, that his official action would violate plaintiff's rights or if he acted without malicious intent to deprive plaintiff of her constitutional rights, then defendant is not liable. See also Wood v. Strickland, 420 U.S. 308, 321-22, 95 S.Ct. 992, 43 L.Ed.2d 214 (1975), Reese v. Nelson, 598 F.2d 822, 827 (3d Cir. 1979), and Princeton Community Phone Book, Inc. v. Bate, 582 F.2d 706, 711 (3d Cir. 1978) and compare with Scheuer v. Rhodes, 416 U.S. 232, 247-48, 94 S.Ct. 1683, 40 L.Ed.2d 90 (1974) ("It is the existence of reasonable grounds for the belief formed at the time and in light of all the circumstances coupled with good-faith belief that afford a basis for qualified immunity of executive officers for acts performed in the course of official conduct"). Assuming the truth of plaintiff's allegation that Simms was negligent in determining probable cause, Walker Process Equipment, Inc. v. Food Machinery and Chemical Corp., 382 U.S. 172, 86 S.Ct. 347, 15 L.Ed.2d 247 (1965), Cooper v. Pate, 378 U.S. 546, 84 S.Ct. 1733, 12 L.Ed.2d 1030 (1964), United States v. New Wrinkle, Inc., 342 U.S. 371, 72 S.Ct. 350, 96 L.Ed. 417 (1952), under the above described standard Simms' negligence did not rise to a level actionable under § 1983. Plaintiff concedes that Detective Simms relied only in part on his conversations with the Penn and Bank employees, logical and potentially knowledgeable people for Simms to question. Independent investigation may have corroborated their information. Absent knowledge of a history of antipathy between these employees and plaintiff or some other indicia to alert Simms to suspect the employees' credibility and to make detailed inquiry, Simms acted reasonably. Prior to arresting plaintiff Detective Simms submitted his findings to the scrutiny of a neutral judicial officer who agreed that probable cause existed. This is not a situation, therefore, where a police officer made a warrantless arrest upon his own sole evaluation of probable cause. An evil intent, recklessness or deliberate indifference to the consequences of his actions is not discernible. To hold that Simms' failure to ascertain that the Penn and Bank employees' information may have been the product of malice constituting reckless negligence sufficient to give rise to a § 1983 claim would impose herculean obligations on law enforcement officers. Such possibilities inhere in any situation in which private citizens provide information to an investigating officer. Unless the motivation for providing false or misleading information is readily apparent, a law enforcement officer cannot investigate or attempt to pierce the asserted for the actual motive behind every statement provided to him. Otherwise a police officer could never conclude that he had probable cause. Defendant City of Lancaster is also not liable for Congress did not intend municipalities to be held liable unless action pursuant to official municipal policy of some nature caused a constitutional tort. In particular . . . a municipality cannot be held liable solely because it employs a tortfeasor — or, in other words, a municipality cannot be held liable under § 1983 on a respondeat superior theory. (emphasis in the original) Monell v. New York City Department of Social Services, 436 U.S. 658, 691, 98 S.Ct. 2018, 2036, 56 L.Ed.2d 611 (1978). Nor are the other defendants liable; without Simms there is no "color of state law". For private persons to be liable under § 1983 they must be "jointly engaged with state officials in the prohibited action". Adickes v. S. H. Kress & Co., 398 U.S. 144, 152, 90 *978 S.Ct. 1598, 1605-06, 26 L.Ed.2d 142 (1970). Defendants' motions to dismiss will be granted. NOTES [1] Plaintiff invokes jurisdiction of this Court pursuant to 28 U.S.C. § 1343(3). [2] This statute makes (a) person who obtains property upon agreement or subject to a known legal obligation, to make specified payments or other disposition, whether from such property or its proceeds or from his own property to be reserved in equivalent amount ... if he intentionally deals with the property obtained as his own and fails to make the required payment or disposition guilty of theft. Plaintiff also appends state claims for libel, slander, false arrest, false imprisonment, malicious prosecution and negligence at law and seeks attorney's fees under 42 U.S.C. § 1988. [3] Respondent had been taken into custody by Dallas, Texas, police and detained for three days after running a red light. Police records had indicated that he was wanted in Potter County on another charge. Actually, the Potter County offense had been committed by respondent's brother, who had masqueraded as respondent. Claiming that the Potter County sheriff was negligent in failing to investigate and learn of the mistaken identity, respondent brought this action under § 1983. The Supreme Court held that "(w)hatever claims this situation might (give) rise to under state tort law . . . it gives rise to no claim under the United States Constitution" and therefore none under § 1983. Id. at ___, 99 S.Ct. at 2694. Respondent, however, made no claim that the arrest was constitutionally deficient. [4] There is contrary authority within this district, Norton v. McKeon, 444 F.Supp. 384 (E.D. Pa. 1977) and Culp v. Devlin, 437 F.Supp. 20 (E.D. Pa. 1977), but the "naked possibility" of a § 1983 claim based on simple negligence cannot be adduced as "powerful argument for its realization". C. Karnow, Saul Bryer, The Bushnell Lectures, 1976-1977 (unpub. ms.) at 50.
{ "pile_set_name": "FreeLaw" }
Water uptake and release from iodine-containing bone cement. Water uptake and release characteristics of PMMA cement containing the water-soluble contrast media iohexol or iodixanol have been investigated. The water uptake study revealed that iohexol had the highest uptake of water (3.7%) and that iodixanol had an uptake close to that of Palacos R (2.3% and 1.9%). The curves obtained showed the materials to follow classic diffusion theory, with an initial linearity with respect to t(1/2) making it possible to calculate the diffusion coefficients. This showed iohexol to have the lowest diffusion coefficient, Palacos R the highest, and iodixanol close to that of Palacos R. The release study showed that more iohexol than iodixanol was released from the bone cement; the long-term release was above 25 microg/mL for iohexol compared to slightly above 10 microg/mL for iodixanol. A microCT investigation showed that the risk of developing an observable radiolucent zone is negligible.
{ "pile_set_name": "PubMed Abstracts" }
Hunter Oaks is a sprawling neighborhood located in Waxhaw, NC. Several builders: Ryland, Shea, Zaring, Parker/Orleans and Lillian Floyd – comprised this neighborhood starting back in in 1994 building through 2003. Hunter Oaks is a very social neighborhood with a very active HOA and scheduled group activities. Hunter Oaks is in the Marvin Ridge school cluster with a new elementary school Rea View. Hunter Oaks has a club house, 2 pools, tennis courts and walking trails. The homes vary in size from 4 bedrooms to 6 bedrooms. Smaller homes are about 2500 sq ft and they rang up to approximately 5500 htd sq ft. Uptown Charlotte is about 30 minutes away and accessed by 485 at Rea Road. Nearby shopping at Blakeney and Ballantyne give a buyer the best of both worlds.
{ "pile_set_name": "Pile-CC" }
Q: Firefox cli save page It's possible to save page page with Firefox CLI? Something like: firefox -new-tab http://google.com -save-page /path/ A: I'm not aware of any really simple way to do this. You might consider looking into a browser automation tool like Selenium. Alternatively, a more general automation tool like Sikuli might be workable as well (this is actually likely to be easier than using Selenium, depending on exactly what you want to do).
{ "pile_set_name": "StackExchange" }
Dose reduction of hyoscine-N-butylbromide for double-contrast barium meal examinations--a prospective randomized study. A search of the literature suggests that the conventional 20 mg dose of intravenous hyoscine-N-butylbromide (HBB) for smooth muscle relaxation in double-contrast barium meal (DCBM) studies is largely empirical. This study analysed the merits of three different doses (5 mg, 10 mg, 20 mg) in the performance of routine DCBMs. One hundred and twenty DCBM examinations were prospectively and randomly allocated to receive one of three doses. Three parameters were measured for each examination: gastroduodenal distension, delay in gastric emptying and gastric antrum overlapping with barium-filled duodenal loops. Almost half the examinations using 5 mg produced undesirable duodenal-gastric overlay. Unacceptable early flooding of the duodenal bulb with barium was seen mostly with doses of 5 mg and 10 mg. Overall, the best results were obtained with 20 mg. The continued use of 20 mg HBB in routine DCBMs is recommended.
{ "pile_set_name": "PubMed Abstracts" }
Eagles selling Chip Kelly on Michael Vick, Nick Foles It's long been assumed that Michael Vick and the Philadelphia Eagles are set to part ways this offseason, but the potential hiring of Oregon coach Chip Kelly might alter the quarterback's fate. NFL.com's Ian Rapoport reported Sunday the Eagles are selling Kelly on two major factors: First, a roster already stocked with the type of players Kelly recruited at Oregon, including a handful of short, fast wideouts. Second, a pair of in-house signal-callers that loom as a decent fit to operate Kelly's up-tempo, spread attack. Nick Foles and Vick would, indeed, give Kelly a pair of unique quarterbacks to work with. Foles is raw, but promising. Vick's best days have passed, but he's an intriguing fit for Kelly's option scheme and, on paper, a better proposition than Brandon Weeden and Colt McCoy of the Cleveland Browns, the second team competing furiously with the Eagles to hire the innovative coach. Without question, something the Eagles said Saturday clicked with Kelly. Their lunchtime meeting dragged on well into the night and hit the brakes on assumptions the Browns and Kelly are a sure thing. If Philadelphia winds up with the top prize in this coaching derby, Vick's presence -- on a team that seemed ready to wave goodbye just days ago -- might wind up serving as a difference-maker.
{ "pile_set_name": "Pile-CC" }
Kaseya VSA R9.1 AuthAnvil Module - Release Notes With the release of Kaseya VSA R9.1 new capabilities have been added. Please see this article for the rest of the R9.1 release notes. Kaseya introduces a new addon module with this release, integrating AuthAnvils identity and access management (IAM) solution with the Kaseya VSA. Integration with the VSA comprises three different AuthAnvil services. Live Connect sessions, set independently from other types of remote control sessions Alerts and logging are provided for all two factor authentication activity. Active Directory integration is supported. You can optionally enable endpoints with a "queue" of passcodes to support authentication when endpoints cannot connect to a network, for example laptops out in the field. Password Server The same AuthAnvil module includes integration with Password Server. Password Server is used to configure and store all the credentials VSA administrators are required to work with, on behalf of multiple customers. Password Server includes the ability to set policies for credentials, control user access to each credential using personal, private and shared vaults, schedule password updates, and maintain logs of credentials usage. Password Server supports both SAML-enabled logons that allow immediate access and logons that require a business workflow to complete the logon. Password Server can optionally include the two factor authentication credentials youve created using the Two Factor Authentication service. Single Sign On A credential, with or without two factor authentication, can be added as a "menu app" item to the Single Sign On service. Once the Single Sign On menu is configured, the VSA user only needs to authenticate oncetypically using two factor authenticationto gain access to this menu. Clicking any app in the menu provides instant access to any other resource without having to re-authenticate. The three services, integrated with the VSA, handle all authentications entirely behind the scenes, providing immediate, highly- secure access to all the machines you manage. One of the applications you can add to each VSA user's Single Sign On menu is an app to logon to the VSA. This means the Single Single On menu provides immediate, secure access to the VSA as well as all other resources VSA users require to perform their daily tasks. Agent Procedure Approvals using Two Factor Authentication Instead of signing and then approving agent procedures using two different VSA users, you can now sign and approve agent procedures using your 2FA passcode, if Two Factor Authentication has been enabled for your VSA user. VSA Logon Page The style of the VSA logon page has been updated to emphasize the VSA's new identity and password management capabilities. It also adapts when resizing the window. Installation The AuthAnvil integration addon module for VSA is installed by default at no charge when you upgrade to R91. AuthAnvil is purchased separately. All three AuthAnvil services must be installed on a separate system from the KServer. Usually all three services are installed on the same system, along with the database server used by the AuthAnvil services. If you are not an existing AuthAnvil customer please contact sales@scorpionsoft.com for more information about purchasing AuthAnvil.
{ "pile_set_name": "Pile-CC" }
A report of unusually high blood ethanol and acetaldehyde levels in two surviving patients. Two men with unusually high blood acetaldehyde levels of 750 and 2410 micrograms/dl presented only mild symptomatology. Their blood ethanol levels, 730 and 1121 mg/dl, were also extraordinarily high. However, liver function tests demonstrated no abnormalities.
{ "pile_set_name": "PubMed Abstracts" }
Tabata30 A 20:10 (20 seconds of work:10 seconds of recovery) format of training which uses high intensity bursts of exercise with a recovery interval between rounds, within a 4 minute block. Tabata sessions can incorporate body weight, kettlebells, bars, ViPRs, giving you a full body workout. Tabata is also a fantastic metabolism booster!
{ "pile_set_name": "Pile-CC" }
Judge criticised for 'immigrants exploiting benefits' comment A Crown Court judge has been disciplined for saying that hundreds of thousands of immigrants come to Britain to get benefits. Judge Ian Trigger was given an official rebuke over remarks about the UK's 'completely lax immigration policy', which he made when jailing an illegal immigrant drug dealer for two years. It was one of the last decisions by Labour former justice secretary Jack Straw, who until last week policed judicial behaviour with the Lord Chief Justice, Lord Judge. Criticised: Judge Ian Trigger, left, was today 'advised' over comments he made about immigration while sentencing a Jamaican drug dealer last year They said Judge Trigger made 'an inappropriate judicial intervention in the political process'. His criticism of immigration policy was 'wholly unrelated' to the case of the Jamaican drug dealer he was sentencing last July. Lucien McClearley came to Britain as a tourist in 2001 and claimed asylum when his visa ran out. The defendant was arrested in October 2002 when the visa ran out but he claimed asylum and was released while it was being processed. This claim was rejected in 2004, but he stayed in Britain without any interference from the authorities until February 2009, when police stopped a car he was driving and smelt cannabis. McClearley admitted taking a vehicle without consent, possessing cannabis and cocaine, possessing a class B drug with intent and two counts of possessing false identity documents. McClearley, who was 31 at the time, was jailed for two years on July 28, 2009. Sentencing him at the time at Liverpool Crown Court, Judge Trigger said: ‘Your case illustrates all too clearly the completely lax immigration policy that exists and has existed over recent years. ‘People like you, and there are literally hundreds and hundreds of thousands of people like you, come to these shores to avail themselves of the generous welfare benefits that exist here. ‘In the past 10 years the national debt of this country has risen to extraordinary heights, largely because central government has wasted billions of pounds. Much of that has been wasted on welfare payments. ‘For every £1 that the decent citizen, who is hard-working, pays in taxes, nearly 10 per cent goes on servicing that national debt. ‘That is twice the amount it was in 1997 when this Government came to power.’ The controversial comments sparked an investigation which resulted in today's criticism. Judge Trigger has 'received formal advice' from Lord Judge, in effect a slap on the wrist. A spokesman for the judiciary said: ‘His Honour Judge Trigger has received formal advice from the Lord Chief Justice following an investigation into comments he made in open court during the sentencing of Lucien McClearley. ‘The investigation found, and the Lord Chief Justice agreed, that Judge Trigger's comments were wholly unrelated to any of the issues which arose for consideration in his sentencing decision, and represented an inappropriate judicial intervention in the political process.’
{ "pile_set_name": "Pile-CC" }
As a follow-up to our discussion at the June 29 HR PRC meeting, attached is criteria for using the Senior Director level that was established/agreed to by the ETS executive officers in May, 2001. The need for this criteria was discussed at the final year-end 2000 ETS PRC meeting and agreement was reached prior to the mid-year 2001 PRC meetings. The criteria was used in the final mid-year ETS PRC meeting on June 28. There were no new Senior Directors approved at mid-year for ETS. Gary
{ "pile_set_name": "Enron Emails" }
Simultaneous determination of catechols in thalamic slices with liquid chromatography/electrochemistry. A method was developed for the simultaneous determination of dopamine (DA), epinephrine (E), norepinephrine (NE), 3,4-dihydroxyphenylacetic acid (DOPAC) and 3-methoxy-4-hydroxyphenylglycol (MHPG), as well as L-3,4-dihydroxyphenylalanine (L-DOPA) with liquid chromatography (LC) using electrochemical (EC) detection. With a ODS column and a mobile phase consisting of a sodium acetate-citrate with heptasulfonic acid, this method was applied on simultaneous determination of catechols released from thalamic slices of ddY mouse. The pretreatment of the bathing medium required only centrifugation, and the supernatant was injected directly into the LCEC system. The high potassium stimulation of catecholaminergically innervated thalamic slices led to increase in the levels of DA, NE, DOPAC and MHPG, especially of NE, but not that of L-DOPA itself. In the present study, we designed to make simultaneous determination of catechols released from thalamic slices for estimation of the physiological status of catecholaminergic neuronal activity.
{ "pile_set_name": "PubMed Abstracts" }
Maghemite functionalization for antitumor drug vehiculization. In this paper we describe the preparation and characterization of magnetic nanocomposites designed for applications in targeted drug delivery. Combining superparamagnetic behavior with proper surface functionalization in a single entity makes it possible to have altogether controlled location and drug loading, and release capabilities. The colloidal vehicles consist of maghemite (γ-Fe2O3) cores surrounded by a gold shell through an intermediate silica coating. The external Au layer confers the particles a high degree of biocompatibility and reactive sites for the transported drug binding. In addition, it permits to take advantage of the strong optical resonance, making it easy to visualize the particles or even control their payload release through temperature changes. The results of the analysis of relaxivity demonstrate that these nanostructures can be used as T2 contrast agents in magnetic resonance imaging (MRI), but the magnetic cores will be mainly useful in manipulating the particles using external magnetic fields. We describe how optical absorbance and electrokinetic data provide a followup of the progress of the nanostructure formation. Additionally, these techniques, together with confocal microscopy, are employed to demonstrate that the component nanoparticles are capable of loading significant amounts of the antitumor drug doxorubicin, very efficient in the chemotherapy of a wide range of tumors. Colon adenocarcinoma cells were used to test the in vitro release capabilities of the drug-loaded nanocomposites.
{ "pile_set_name": "PubMed Abstracts" }
[Plasma levels of adiponectin and tumor necrosis factor-alpha in children with obesity]. To examine plasma adiponectin (ADPN) and tumor necrosis factor-alpha (TNF-alpha) levels and their correlation in children with obesity in order to investigate the roles of both in the development of childhood obesity. One hundred and forty-seven children with obesity and 118 normal children who were randomly sampled from five primary schools from the Kaifu District in Changsha were enrolled. Physical shape indexes, including height, weight, waist circumference, hip circumference, and waist to hip ratio (WHR) were measured. Body mass index (BMI) was calculated. Blood pressure was measured. Percentage of body fat (%BF) was measured with dual energy X-ray absorptiometry. Plasmal levels of ADPN and TNF-alpha were detected using ABC-ELISA. Blood concentrations of triglycerides (TG), total cholesterol (TC), high density lipoprotein-cholesterol (HDL-C) and low density lipoprotein-cholesterol (LDL-C) were measured by automatic biochemistry analyzer. Fasting blood glucose level was measured by glucose oxidase method. Fasting blood insulin level was assayed by radioimmunity. Homeostasis model assessment for insulin resistance (HOMA-IR) was performed. Plasma ADPN levels in obese children significantly decreased compared with those in normal children (8.12+/-2.54 mg/L vs 12.22+/-4.68 mg/L; p<0.05), and had a negative correlation with plasma TNF-alpha levels, BMI, WHR and HOMA-IR (p<0.01), and with %BF, fasting insulin, systolic blood pressure and TG (p<0.05). Plasma TNF-alpha levels in obese children significantly increased compared to normal children (171.38+/-34.33 ng/L vs 91.07+/-21.60 ng/L; p<0.01) and positively correlated with BMI, WHR, %BF, fasting insulin, HOMA-IR, TG and systolic blood pressure (p<0.01), and negatively with HDL (p<0.05). Multiple stepwise regression analysis showed that ADPN, BMI and TNF-alpha were main influential factors for %BF (R2=0.926, p<0.01). There was a significant interaction between ADPN and TNF-alpha (p<0.05). Plasma ADPN levels decreased and plasma TNF-alpha levels increased in children with obesity and both were main influential factors for %BF in children. There was an interaction between ADPN and TNF-alpha, suggesting that they both participate in the development of childhood obesity.
{ "pile_set_name": "PubMed Abstracts" }
Effects of preoperative flavonoid supplementation on different organ functions in rats. Previously it has been reported that preoperative feeding preserves heart function in rats after intestinal ischemia-reperfusion. To further improve postoperative organ function, bioactive nutrition compounds were selected in vitro against the xanthine oxidase radical cascade, an enzyme suggested to play a key role in the induction of single- or multiple-organ dysfunction. Flavonoids were selected in vitro for their capacity to (1) inhibit xanthine oxidase, (2) scavenge superoxide, and (3) scavenge peroxylradicals. The most bioactive flavonoids were added to the preoperative nutrition to study their effect on postintestinal ischemia-reperfusion organ function. A combination of flavonoids selected on basis of effective flavonoid xanthine oxidase inhibition and superoxide scavenging resulted in increased superoxide scavenging. In vivo, the selected flavonoid mixture significantly lowered postischemic intestinal apoptosis and intestinal oxidative stress indicated by malondialdehyde concentration when compared with ischemia-reperfusion fasted and sham-fasted animals. Moreover, this flavonoid mixture significantly lowered plasma creatinine and urea concentration, both indicating a better postoperative kidney function. Furthermore, oxidative stress measured as this flavonoid mixture when compared with control significantly lowered plasma malondialdehyde concentration in fed rats. Coadministration of bioactive flavonoid mixture to preoperative nutrition, in contrast to fasting, attenuates ischemia-reperfusion injury by preserving kidney function in the rat and decreasing apoptosis in the intestine.
{ "pile_set_name": "PubMed Abstracts" }
Biographical Summary: Living his youth in a place called Nauvoo, Illinois, the saints had built a city which at the time was bigger than the city of Chicago. They had also built a temple which was the largest and most expensive building west of Philadelphia. From here they were driven by their enemies to a resting place called Council Bluffs, Iowa. Here, Henry enlisted in the Mormon Battalion, an army of 500 men called to fight in the war with Mexico and help secure California for the U.S. as part of Manifest Destiny. It was and still is, the longest infantry march in U.S. Military history. There is hardly an event that occurred in the American west between 1846 to 1848 that some of the members of this group did not take part in. Henry was probably the second Packard in California. Henry Packard was born May 6, 1825, in Parkman, Geauga, Ohio, the third child of Noah Packard and Sophia Bundy. His parents were some of the early settlers in that town, and when he was seven his family were converts to the Mormon Church. In 1840 the family moved to Nauvoo, Hancock, Illinois, which one year before was nothing more that a marshy bend in the Mississippi River called Commerce, which contained a few log cabins. Their new home being located across the street from the city's founder, mayor and spiritual leader, Joseph Smith. Passers-by were amazed at what the saints had built in such a short time, which shocked their enemies as well. A year and a half after the murder of Joseph Smith, they were driven from the state as both the federal and state governments stood idly by and watched it happen. Henry's father was too ill and too poor to leave Nauvoo that February of 1846 and cross the frozen Mississippi River with Brigham Young, but he at least sent his three oldest sons to help the saints move to their new home in the West. They traveled as far west as Winter Quarters, Nebraska. At Mt. Pisgah (Grand River), Iowa, the saints were met by Captain James Allen, under the command of Colonel Stephen W. Kearny, commander of the U.S. Army of the West stationed at Fort Leavenworth, Kansas. He brought orders authorizing him to enlist 500 volunteers for a year, in a campaign to secure California in the war with Mexico. On July 20, 1846, the battalion started their march from Council Bluffs, Iowa, to Fort Leavenworth. At this time Captain Allen was promoted to Colonel and Kearny was promoted to General. When the battalion reached Fort Leavenworth August 1st, there were 22 officers and 474 enlisted men for a total of 496. There were also 34 women and a number of children. 20 of the women were assigned as laundresses, four to each company. All of the clothing pay allowance was sent back to the church and the families of the men in Council Bluffs to help them cross the plains to the valley of the Salt Lake. The men were each issued a musket, bayonet, scabbard, cartridge box and leather belt. A white belt was the only clothing which they all had in common. They were also each issued a blanket, canteen & knapsack, and each mess group of six was issued cooking pots and a tent. Each of the five companies was allowed to buy a wagon with a four mule team, in which they could carry their gear. On August 13th they started with orders to go to Bent's Fort, Colorado. Colonel Allen was too sick to lead the men and stayed at the fort. Capt. Hunt would be in command until Col. Allen could rejoin the group. On August 26th at Bluff Creek, Kansas, word reached the battalion of Col. Allens death. On the 29th, Lieutenant Andrew Smith and Dr. George Sanderson arrived from the fort to take command of the battalion, with orders to go directly to Santa Fe now that it had been captured by Kearny's advance party. Most of the men wanted Capt. Hunt to continue the command since he out ranked Lt. Smith, but the officers voted to give the command to Lt. Smith since he was a career soilder and West Point graduate. However, Lt. Smith did not like volunteers, let alone Mormon volunteers. Also, because the battalion's re-supplies had been sent ahead to Bent's Fort and they were now ordered to go to Santa Fe, the men were put on half rations. Just after they left the Arkansas River a sick detachment was sent to Pueblo, Colorado, via Bent's Fort. Many of the men were sick from exposure to the elements and Dr. Sanderson (Dr. Death) prescribed a dose of calomel powder and arsenic, no matter what was wrong with them. The men marched sick, under fed and under clothed, from water hole to water hole all the way to Santa Fe, arriving October 12, 1846. At Santa Fe they were given a new commander, Colonel Philip St. George Cooke, who had been with Kearny's advance party, but was sent back to take command after Kearny learned of Allens death. Col. Cooke told the men that they had orders to make a new wagon road to the Pacific along a southern route, something that had never been done. From here another sick detachment left for Pueblo with all of the remaining women except five and all of the remaining children except one boy. On October 18th, they left Santa Fe with 25 government wagons and 60 days rations, 5 company wagons and 12 private family wagons. Upon learning that Gen. Kearny had abandoned his wagons, Col. Cooke also brought along pack saddles for the mules. He also ordered that the men be organized into messes of ten men each. On the 24th they arrived at Albuquerque and exchanged some mules. From here they traveled south down the western side of the Rio Grande River. Just before they left the river they sent another sick detachment back to Pueblo, leaving 335 men in the battalion. On Nov. 13th they left the Rio Grande and began blazing a new wagon trail. Rations to the men were again reduced. From here the men blazed a new road through the southwestern part of New Mexico into Mexico and up into Arizona along the San Pedro River Valley. On December 11th as they were watering the animals, some wild bulls got in with the cattle and were killed by the sheep drovers. Later that day another group of wild bulls charged the men and a short but wild melee ensued. The rampaging bulls charged on and on as they attacked men, mules and wagons. Three men were wounded, three mules were gored to death and several wagons were tipped over. Corporal Frost was charged by a bull from one hundred yards, took aim and fired when it was ten paces from him and it dropped at his feet. Col. Cooke later said of the man, "One of the bravest men he ever saw." It is not known how many bulls were killed in all, but one person reported nine dead in one spot. Many reported over 20 dead in all and maybe three times that many wounded. Just before they arrived at Tucson, the garrison of Mexican soldiers stationed there had fled to the south on hearing of their coming. After a short stay they marched north to the Gila River and the Pima Indian villages. From here they basically followed the southern edge of the Gila River to the Yuma crossing of the Colorado. From there to Mexicali, then north to Palm Springs, following the San Luis River through the Temecula Valley arriving at San Luis Rey January 27, 1847. Much of this route later became known as the Spanish Trail, San Antonio-San Diego Route and the Butterfield Stage Line. On July 31, 1846, a large group of Mormons arrived at El Paraje de Yerba Buena (The Place of the Good Herb), later called San Francisco, aboard the ship Brooklyn, under the leadership of Samuel Brannan. This was a month after the Bear Revolt had taken place and soon after Commander Montgomery aboard the USS Portsmouth had taken control of the area for the US without a shot being fired. The local Mexican General at the Presidio and many of the local residents of the bay area having fled to the south. Upon reaching California the battalion learned that it had already been secured from Mexico by Fremont and Kearny, but all was not peaceful. John C. Fremont had been installed Governor of the state by Commodore Stockton. Lt. Col. Fremont along with Commodore Stockton were refusing to take orders from Gen. Kearny, who had been given orders by President Polk to be the Governor of California after it was secured. With the arrival of the battalion loyal to Kearny, he then had more than enough men to enforce his authority. From here the battalion was split with one company going to San Diego and four companies, along with Henry, going to Pueblo de Los Angeles, where they built Fort Moore. At some point during the trip Henry was promoted from Private to Corporal. On May 31, 1847, 15 members of the battalion along with Gen. Kearny and other officers left Monterey with Lt. Col. John C. Fremont, taking him back to Fort Leavenworth for court-martial. This group was the first to discover the remains of the Donner Party at Truckee Lake, other than the original rescue parties. It was a gruesome sight of dismembered bones and body parts! When the battalion was discharged July 16, 1847, at Fort Moore, the government tried to get as many men as possible to re-enlist for another six months. Henry was one of 79 who did, and they spent their time stationed at San Diego. There he was promoted to Sergeant. About 118 of the men headed east to Lake Arrowhead and then later northeast to the valley of the Salt Lake. About 105 other men traveled north to the Coloma area and worked for Captain John A. Sutter at his fort and mill, where gold was discovered January 24, 1848. Six of these men became The California Star Express riders, carrying printed word of the gold discovery back to the east, starting the California gold rush. After the volunteers were released in San Diego on March 14, 1848, half went northeast to Utah and the other half, as well as Henry, traveled north to Yerba Buena and the gold fields. Many of these men left in 1848 and headed back east to Utah. It is not known exactly when Henry left, but we know that he was in Salt Lake City when his parents arrived there September 17, 1850. About 26 members of the battalion died during the the trip and never made it back to their families, though not a single shot was fired in battle, except during the battle with the bulls. The battalion proved the worth of this area which was later to become the Gadsden Purchase. They pioneered the southern emigration route, as well as the Carson Pass route through the Sierra Nevada's. While living for a short time in Salt Lake City and building a mill race for Archibald Gardner with his father and brothers, Henry met and married Mary Mariah Chase January 16, 1851. She was the younger sister of one of his fellow battalion soldiers. Henry and his new bride then moved to Hobble Creek with the rest of his family. I do not know what happened to this marriage, or if there were any children from it. On July 24, 1863, Henry married Almira Mehitabel Meacham, who had eight children from two previous marriages. At some time, probably during the late 1860's, he moved back to northern California with his family and lived in Healdsburg, Sonoma, California, where he died November 17, 1896, leaving no known children that I know of, other than his second wife's.”
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention The present invention relates to an electrical connection for an electric motor. 2. Description of the Prior Art In electrical connections, it is generally known to provide so-called single-wire seals (German abbreviation: EADs) to seal cables in plugs. The individual electrical conductors in them are routed through a through opening provided in the sealing element. The sealing element usually has at least one radial sealing lip that rests against a surface of the conductor inside the through opening in order to produce a seal. Additional radial sealing lips provided on the outside of the sealing element then produce a seal in relation to a housing containing the sealing element and electrical conductors. The housing accommodating the sealing element then tapers in a funnel shaped so that only the electrical conductor, sealed in the smaller-diameter funnel-shaped section, is routed further to the plug. The sealing element consequently functions on the one hand radially in relation to the electrical conductor and on the other hand, radially in relation to the housing. This is known as a “radial-radial”-acting seal. The disadvantage to this kind of seal for an electrical connection is the relatively high complexity, both of the housing that accommodates the sealing element and of the funnel embodiment. Usually, the housing and funnel require cost-intensive finishing work.
{ "pile_set_name": "USPTO Backgrounds" }
Q: C# Large JSON to string causes out of memory exception I'm trying to download very large JSON file. However, I keep getting an error message: "An unhandled exception of type 'System.OutOfMemoryException' occurred in mscorlib.dll" {The function evaluation was disabled because of an out of memory exception.} Any tips how I can download this large JSON filet? I have tried to use string and StringBuilder but no luck. Here is my code: public static string DownloadJSON(string url) { try { String json = new WebClient().DownloadString(url); // This part fails! return json; } catch (Exception) { throw; } } I have created console application. I have tried this code with smaller JSON file and it worked. My idea is later to split this larger JSON file and put it to database. However I need to encode it before I can put it to database. I have not write yet database part or anything else, because downloading this big JSON causes problems. I don't need it as a stream, but that was my example way how I made encoding. I need to encode it because data have special characters like å. I tried also this but same problem: var http = (HttpWebRequest)WebRequest.Create(url); var response = http.GetResponse(); var stream = response.GetResponseStream(); var sr = new StreamReader(stream); var content = sr.ReadToEnd(); A: I assume that you have very very large response. It is better to process stream. Now comes to point that cause outofmemoryexcetion. In .net max size of any object 2GB. This is even for 64 bit machine. If your machine is 32 bit then this limit is very low. In your case above rules get break so it will not work but if you have file size less than that then try to build your code against 64 bit and it will give your result.
{ "pile_set_name": "StackExchange" }
Cat Power Playing Culture Room July 13 She of the haunting, breathy voice and unpredictable stage shows is coming to Culture Room on July 13. Cat Power aka Chan Marshall recently announced a new U.S. tour in support of her most recent album Jukebox. If you like this story, consider signing up for our email newsletters. SHOW ME HOW Newsletters SUCCESS! You have successfully signed up for your selected newsletter(s) - please keep an eye on your mailbox, we're movin' in! Just be forewarned if you buy tickets to this show. If she's on, you're in for one of the finest nights of music you'll ever hear. Her voice soars above sparse instrumentation and her crowd interaction is as sweet as it is sincere. It's been said by more than a few fans that this isn't the Cat Power you get at every show: Sometimes she'll end sets very abruptly or mish-mash songs together with little discernible beginnings or endings to them. Still, it's worth the risk as you'll either have a great night's music or a story you can tell for weeks to come. Tickets are on sale now. We use cookies to collect and analyze information on site performance and usage, and to enhance and customize content and advertisements. By clicking 'X' or continuing to use the site, you agree to allow cookies to be placed. To find out more, visit our cookies policy and our privacy policy.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention The present invention relates to a linear motion guide bearing apparatus which is used in an ordinary industrial machine or in a delivery apparatus and, in particular, to a guide rail or a slider which is a composing part of the linear motion guide bearing apparatus. 2. Description of the Related Art Generally, a linear motion guide bearing apparatus, as shown in FIG. 8, as composing parts thereof, comprises a guide rail 1 extending in a given direction and a slider 2 crossingly mounted on the guide rail 1 so as to be movable with respect to the guide rail 1 along the guide rail 1. In the two side surfaces of the guide rail 1, there are formed rolling element rolling grooves 3 which respectively extend in the axial direction of the guide rail 1. Also, in the inner surfaces of the slider 2 as well, there are formed rolling element rolling grooves 4 which are respectively disposed opposed to the rolling element rolling grooves 3. And, within a load rolling passage which is formed between the mutually opposed rolling element rolling grooves 3, 4, there are inserted a plurality of rolling elements (such as rollers or balls). In FIG. 8, reference character 6 designates a return passage and 7 stands for an end cap. FIG. 9 is a section view of a conventional guide rail 1, when it is viewed from the axial direction (extending direction) of the rolling element rolling groove 3. And, FIG. 10 is a section view of a conventional slider 2, when it is viewed from the axial direction (extending direction) of the rolling element rolling groove 4. Each of the rolling element rolling grooves 3, 4 has a substantially circular section shape; and, boundary portions A, B, which are formed between land surfaces existing continuously with the two sides of the rolling element rolling grooves 3, 4, are respectively formed in a shape having an angle formed by the mutual intersection of an arc and a straight line (which is hereinafter sometimes referred to as an edge shape). By the way, in the rolling element rolling grooves 3, 4, in some cases, there can be formed such a relief as shown in FIG. 8. In the case of the guide rail 1 shown in FIG. 9, the upper-side rolling element rolling grooves 3 are formed in the corner portions between the side surfaces and upper surface of the guide rail 1. In the case of the present rolling element rolling grooves 3, the section shape thereof provides a substantially ¼ arc shape; and, the respective boundary portions A between the land surfaces (side surfaces and upper surface) existing continuously with the present rolling element rolling grooves 3 and the present rolling element rolling grooves 3 also provide an edge shape having an angle formed by the intersection between an arc and a straight line. However, when the linear motion guide bearing is in operation, in case where there exists a clearance between a load rolling passage and the half-arc-shaped circulation passage formed in a rolling element circulation part such as an end cap, a rolling element, when passing through the clearance, can shift from its normal passage and interfere with the land portion. At the then time, in case where the rolling element 5 is higher in hardness than the guide rail 1, for example, the guide rail 1 is made of metal and the rolling element 5 is made of ceramic, there arises a problem that the boundary portion A softer than the rolling element 5 is easy to wear. That is, as in the above-mentioned conventional structure, when the boundary portions A, B are respectively formed in an edge shape, in case where there occurs such a load state in which the rolling element 5 is pressed against the boundary portions A, B, since the contact area of the rolling element 5 with the boundary portions A, B is small, the maximum contact pressure increases. As a result of this, the boundary portions A, B are easy to wear. Depending on the progress of such wear, there is a fear that such wear can have an ill effect on the linear motion accuracy of the slider 2. This problem become obvious especially in such a using condition that the slider 2 must be moved at a high speed with respect to the guide rail 1, or the slider 2 must be positioned with high precision. Especially, since the moving speed of the rolling element has been enhanced, when a corner portion exists in the land portion 2b (see FIG. 11), in the case of the guide rail 2 made of steel, there arises a problem that the rolling element 5 and land portion 2b are easy to flake. Also, in case where the guide rail 2 is made of ceramic material, since the guide rail 2 is hard, the surface of the rolling element 5 can be damaged; and, because the ceramic material is fragile material, a crack can be caused in the land portion 2b. On the other hand, when the moving speed of the rolling element 5 is low, in the case of the guide rail 2 made of steel, the surface of the rolling element 5 and the groove surface of the rolling element rolling groove 4 of the guide rail 2 are worn due to the rolling motion of the rolling element 5 and the roughness of these surfaces is thereby reduced (the surfaces are smoothed), which makes it hard for the surfaces to wear any further. However, in case where the guide rail 2 is made of ceramic material, since the guide rail 2 is much harder than the rolling element 5, there hardly arises the possibility that the groove surface of the rolling element rolling groove 4 of the guide rail 2 can be worn due to the rolling motion of the rolling element 5 and the roughness of the groove surface can be thereby reduced (the groove surface can be smoothed). Therefore, as the linear guide apparatus is operated, the rolling element 5 continues to wear. As a result of this, in case where the preload amount of a linear guide apparatus is small, especially, in the case of a small-size linear guide apparatus, the rigidity of the linear guide apparatus is lowered due to shortage of the preload, so that the durability of the linear guide apparatus is reduced.
{ "pile_set_name": "USPTO Backgrounds" }
US / Death penalty: UN experts call for federal moratorium US / Death penalty: UN experts call for federal moratorium as Boston bomber gets death sentence GENEVA (26 June 2015) – The United Nations Special Rapporteurs on summary executions, Christof Heyns, and on torture, Juan E. Méndez, today called on the United States Government to establish a federal moratorium on the imposition of the death penalty with a view of abolishing it. The experts’ call comes after Dzhokhar Tsarnaev was formally sentenced to death this week for his part in the Boston marathon bombings in April 2013, confirming the recommendation made by a federal jury last month. “Despite the fact that the crimes committed by Dzhokhar Tsarnaev fall within the most serious crimes provision of international safeguards, this decision contradicts the trends towards abolishing the death penalty in the country in law and practice,” the human rights experts said. “It would have been preferable to sentence the author of the Boston marathon bombings to life imprisonment instead of keeping him in the spotlight throughout years of the appeal process,” they said. “The death penalty does not show respect for life, in fact it does the opposite. There is no proof that it has a special deterrent effect. Especially if imposed for crimes motivated by ideological or religious considerations, this form of punishment plays into the hands of those who treat life as dispensable and encourage rather than discourage them,” the experts stressed. The Special Rapporteurs recalled that more than three quarters of countries worldwide have abolished the death penalty either in law or in practice, and the US, like the rest of the world, is moving away from the use of capital punishment. The State of Nebraska abolished this punishment on 27 May 2015, and other states such as Colorado, Delaware, Montana and Kansas, are currently debating its abolition. The State of Massachusetts abolished capital punishment for state crimes since 1984 and has not executed anyone in the last 70 years. “The decision of a federal jury to impose the death penalty for a crime committed in Massachusetts, where the death penalty has been abolished for decades, illustrates how out of place this form of punishment is,” they said. The experts also called on the US Government to reconsider whether “the use of the death penalty per se respects the inherent dignity of the human person,” and noted that “such punishment causes severe mental and physical pain or suffering and constitutes a violation of the prohibition of torture and other cruel, inhuman or degrading treatment or punishment.” “Despite all efforts to implement capital punishment in a ‘humane’ fashion, time and again executions have resulted in degrading spectacles. The death penalty as a form of punishment is inherently flawed,” they stressed. “The argument of the federal authorities, that their hands are tied when it comes to the death penalty since it is a matter decided by state law, is unacceptable,” they highlighted. “International law holds the nation as a whole accountable for all its constituent organs or jurisdictions. And there are concrete steps that the Federal Government could take, including a moratorium on the death penalty for federal crimes.” The Special Rapporteurs echoed previous calls by the Human Rights Committee and UN High Commissioner for Human Rights, urging the US Federal Government to consider establishing a federal moratorium on the death penalty. The experts are in contact with the State concerned to clarify the issue in question. ENDS © Scoop Media
{ "pile_set_name": "OpenWebText2" }
Navegador de artículos Why constraining your sustainability strategy is a smart move Is a commitment to sustainability a real strategic advantage? Or are companies voluntarily tying one hand behind their backs? In recent weeks, I’ve been thinking a lot about the incentives, and disincentives, implied by an aggressive sustainability strategy. I participated in a great panel discussion focused on the link between innovation and sustainability, describedhere. The panel was moderated by Phil Metz of Singing Dog and featured Mike Biddle from MBA Polymers, Mikhail David from Interface, Beto Lopez from IDEO and myself. We discussed some very interesting concepts, primarily dealing with how effectively innovation processes can deliver social and environmental wins, and conversely, how sustainability can be framed and employed as an opportunity innovation. In one exchange, Beto described the sustainability director’s role as anticipating a future set of operating conditions for a company and making them relevant and actionable in the present tense. I love this description. It focuses on the importance of understanding a wide body of social, environmental, commercial, economic and other inputs, interpreting them into relevant terms for an organization and creating ways to integrate this information into the decision-making process — be it product design, operational, strategic or otherwise. The central question I arrived at was this: If a sustainability director’s job is to effectively understand and communicate a set of future constraints, be they in terms of resource pricing, material choices or operational context, why would any company voluntarily move to a more constrained and likely more costly mode of operations any earlier than required by legislation, scarcity, or other drivers? I think there are five reasons why taking this step makes sense. To start, there is a multi-faceted first mover advantage for the company that enters and defines a new market. The chance to create the ecosystem in which all future competitors will play isn’t a guarantee of success, but it does mean that competition is on your terms. In effect, being there at the start gives a company a role in the decision to go Beta vs VHS. Mike Biddle cautioned on the risk and cost to the first mover’s investment in creating this landscape — in his company’s case, this meant solving many of the technical and market challenges in recovering plastics from a wide range of waste streams. An additional first mover advantage is the increased time an early player has to build capacity and expertise in a new set of conditions. For example, a company that has been building waste reduction goals into their operations for many years — such as DuPont — can rely on efficiency as a source of competitive advantage relative to competitors who don’t develop these abilities. As another example, Method had over five years of experience developing high efficacy phosphate-free auto dish detergents by the time regulation pushed the big players to remove phosphates from their own formulations. When they struggled with performance issues, Method’s product had addressed the technical challenges and its market share grew 40 percent over the year following the regulatory change. Third, and most importantly from Method’s perspective, is finding ways to turn sustainability constraints from limitations into advantages. We aggressively focus on making resource efficiency, materials selection and responsible manufacturing into drivers of better product experience. Method’s8x concentrated laundry detergent is a great example of how an impressive resource savings from a super-concentrated detergent directly leads to an easier and better user experience. Fourth, establishing a reputation for leadership in sustainability can attract partners, collaborators and suppliers interested in social and environmental co-development. This effectively creates a new funnel for innovation to product development activities, potentially bringing a series of new ideas into the pipeline. Method has benefited from a surge in calls from novel green chemistry or low-carbon materials in recent years, largely driven by our ability to get previous such materials to market. Lastly, green product development can offer market differentiation. Truly excellent environmental design is still a rarity. Despite 70 – 80 percent of surveyed U.S. consumers saying that they prefer to buy greener goods, actual purchase rates are at 5 to 10 percent. A part of this “green gap” can be attributed to green products that just don’t deliver what users expect. Companies that can address the technical challenges involved in creating and producing the first truly excellent green offerings in their categories have an amazing upside on their hands. The discerning reader will notice that I have not listed any public or reputational benefits that could derive from a sustainability strategy. Other writers have correctly pointed to upsides in talent attraction and retention, brand value and social license to operate, among others. However, I would argue that many of these benefits could be experienced by companies that have not committed to materially changing their businesses in order to operate within a realistic set of future conditions, but rather have made some select changes, released well-publicized CSR reports, or issued compelling CEO statements while most of the business proceeds as usual. There are clearly upsides and downsides for those companies that do acknowledge and react to their best understanding of future operating conditions. Where the balance between these two lies likely depends on the company’s culture and competitive context. In Method’s case, there is amazing overlap between the opportunities for value creation and the ethical imperative to address social and environmental problems. This overlap has led to the growth of our company so far and will continue to be the basis of how we think about designing better products, operating more efficiently and running our company more effectively. In effect, social and environmental constraints define our opportunities rather than limit them. Sustainability & Business is a blog published by 100SD, a Costa Rican company dedicated to providing planning and execution services of sustainable development projects for companies and investors engaged in economic activities in hospitality, tourism, property development, and industry. The articles published below are intended to offer students, professionals, investors and entrepreneurs a source of updated information that promotes global progress on sustainability.
{ "pile_set_name": "Pile-CC" }
One of the benefits of our recently released catching defense metrics is they’re essentially ready-to-project, thanks to the regression feature of the model (the "R" in RPM). RPM also gives us two ways to assign value to framing, one using context (the ball-strike count) and one using a flat value (recently adjusted* to ~.155 runs). To date, we haven’t found an aging curve in the PITCHf/x-based framing metric we developed. This makes projecting framing performance a little easier, and for extreme simplicity I have created a set of projections for 2014 based on a 3-2-1 weighting of framing opportunities for the past three seasons. First, though, we wanted to generate a "retrojection" to test RPM’s success in predicting 2013’s framing performances. Since RPM seasons are regressed to careers, and pitcher and umpire adjustments are derived from those actors’ “career” numbers, a retrojection requires recreating the 2008-2012 numbers as if 2013 had never occurred. Since the probabilistic portion of the model (the "P" in RPM) is specific to each season, there's no need to recreate the zone maps (see first footnote below). The WOWY (With or Without You) corrections for pitchers and the umpire corrections were all recreated without including 2013, and new regressed “career” lines were created with 2008-2012 totals for each catcher. Those 2008-2012 seasons were then regressed to these new, abbreviated career lines. Finally, the 3-2-1 weighting was applied for 2010-2012 to arrive at retrojections for 2013. The verdict? The retrojections did very well. Both context-dependent and generic run projections (as rate stats) correlated with actual 2013 performance at better than 0.81. That’s a lot of variance (>65 percent) captured by a simple model. So with a fair amount of confidence in the crystal ball and the playing time assigned to each catcher in our own Depth Charts, we can project player and team framing contributions for 2014. Yasmani Grandal is currently projected to top framing magician Jonathan Lucroy in 2014, based on playing time projections from March 30 (which may be optimistic for Mr. Grandal, as the Padres recently added a third catcher, Adam Moore). It’s a close race, perhaps too close to call. Look down just a few spots, and you'll see some other young backstops, along with the usual suspects (Brian McCann, Russell Martin, Ryan Hanigan, the Molinas). Yan Gomes just got a contract extension that raised some eyebrows; maybe his framing projection will help lower a few of them. Grouping by team, we can see Tampa’s dynamic duo leading the way, with the Rockies' terrible trio bringing up the rear. *Since first publishing RPM, we've reset the run expectancies used in the final calculations to vary by season, to reflect the drop in scoring we’ve seen during the PITCHf/x era. During that process, we realized that we were about .01 runs low on the generic framing factor. It’s a zero-sum** game, so you won’t notice a difference of any substance. **Next, we'll have to ensure that the framing totals zero out by season. The run totals do zero out overall, but in 2008 everyone seems to be getting penalized an extra run, with things moving in the opposite direction in 2013. This is reflected in our 2014 projections, too.
{ "pile_set_name": "OpenWebText2" }
Two confirmed human cases of West Nile Virus in Colorado KUSA — State health officials confirm two people have tested positive for West Nile virus in Colorado. The cases, out of Weld County and Delta County, are the first reported human cases of the virus in 2018. CDPHE says most humans who contract the virus, about 80 percent, will not have any symptoms. About 20 percent of people will show symptoms, which are similar to the flu. State health officials said about 1 percent of people who test positive for West Nile virus will develop a more serious, potentially deadly illness. Last year, Boulder County Sheriff Joe Pelle was one of the lucky ones. “I never had a symptom, I never felt sick,” said the longtime sheriff of Boulder County. “I go to Bonfils [Blood Center] every six weeks and donate blood and did that, and got a call and they said, you’ve got West Nile!” Because Pelle didn’t have any symptoms or sickness, his recovery was pretty simple. He just had to wait for the virus to pass before he could donate blood again. However, he is extra careful this time of year. “We all live in Colorado for a reason, and I like to do all kind of outdoor activities including fishing and hiking and horseback riding and golf and I’m not going to quit doing that,” he said. “But I got a can of OFF in my golf bag, and I take precautions when I need to when the mosquitos are out.” CDPHE said there were 68 human cases of West Nile virus in 2017, and four of those were fatal. CDPHE also shared the following tips to protect yourself and your home: Use insect repellents when you go outdoors. Repellents containing DEET, picaridin, IR3535, and some oil of lemon eucalyptus and para-menthane-diol products provide the best protection. Follow label instructions. Limit outdoor activities at dusk and dawn, when mosquitoes that carry West Nile virus are most active.
{ "pile_set_name": "Pile-CC" }
Apple Releases macOS Mojave 10.14.5 Beta to Developers [Download] Apple has released macOS Mojave 10.14.5 beta 1 to developers for testing. The build number is 18F96h. There are no new features announced yet for 10.14.5 but we'll let you know if we spot any changes! Developers can run the macOS Developer Beta Access Utility to download the latest macOS 10.14 beta. As new macOS betas become available you will receive a notification and can install them from the Software Updates panel in System Preferences. You can download the macOS Developer Beta Access Utility at the link below. Please follow iClarified on Twitter, Facebook, Google+, or RSS for updates.
{ "pile_set_name": "Pile-CC" }
IRS Letter 2645C What is a LTR 2645C - Notice from IRS | Form LTR 2645C What is a LTR 2645C Notice from IRS Posted on March 24, 2010 by steve. This is a notice or letter from the IRS telling the taxpayer that they have received the ...http://freshstarttax.com/what-is-a-ltr-2645c-notice-from-irs/ Section 1. Balance Due - Internal Revenue Service Assisting taxpayers in resolving their balance due account(s) is the responsibility of all contact employees, whether speaking with a taxpayer or ...http://www.irs.gov/irm/part5/irm_05-019-001.html
{ "pile_set_name": "Pile-CC" }
Corrasion (album) Corrasion is third studio album released by the Canadian drone doom band Nadja. Originally released in 2003 and limited to 200 copies, the album was rerecorded and re-released with three bonus tracks on August 13, 2007. Track listing Bonus tracks Line-up Aidan Baker - guitars, vocals, drum machines, production Leah Buckareff - bass guitars Additional notes Track five on the rerelease, I Am as Earth, originally appeared on a split that Nadja did with Moss. Tracks six and seven on the rerelease on Nadja compilation albums. References Category:2003 albums Category:Nadja (band) albums
{ "pile_set_name": "Wikipedia (en)" }
Service-Oriented Architecture (SOA) facilitates the development of enterprise applications as modular business services that can be integrated and reused. Oracle SOA Suite, a component of Oracle Fusion Middleware, provides a set of service infrastructure components for creating, deploying and managing SOA applications. This process describes how to integrate Siebel Business Applications with Oracle SOA Suite using Java Message Service (JMS) messaging and Oracle Advanced Queuing (AQ), the message queuing functionality of the Oracle database.
{ "pile_set_name": "Pile-CC" }
California Assembly Bill 5, in its original language, seemed as though it could end freelance journalism in the state. The bill, which Gov. Gavin Newsom signed into law September 18, codifies and expands on a 2018 California Supreme Court decision that made it harder for companies to classify workers as freelancers rather than employees. As employees, workers are covered by state laws on the minimum wage, worker’s compensation coverage, workplace discrimination and other protections. As freelancers, they are not. The bill grabbed nationwide headlines because it appears to define the workers at Uber, Lyft, and other “gig economy” tech companies as employees, covered by a range of workplace protections. When it became clear the bill would pass, Uber, Lyft, and Doordash pledged $90 million toward qualifying a ballot measure that would let them continue to classify their drivers as independent contractors. The core of the Dynamex decision, and of the new law, is a three-pronged “ABC test,” which is used to determine who is and isn’t a freelancer. The “B” prong, which presents the biggest issue for freelance journalism, states that employers can only contract out work that is “outside the usual course of the hiring entity’s business.” A company in the business of journalism, then, could not hire freelancers to do journalism. As CJR reported in March, some publishers responded to the Dynamex ruling by cutting ties with freelancers based in California. The passage of Assembly Bill 5 offers some relief: freelance writers, editors, photographers and editorial cartoonists were given a partial carve-out, allowing publishers to hire them for up to 35 separate “content submissions” in a given year. (The law exempts more than 20 professions, including doctor, lawyer, manicurist, travel agent and commercial fisherman. Graphic designers have a full exemption, which means California judges could find themselves ruling on how much Photoshop work it takes to distinguish photography from graphic design.) PREVIOUSLY: A California class-action suit imperils freelancers It’s not hard to find freelancers who say they will run into that limit. “I’ve worked for sites such as AOL that are mostly run with senior editors doing longer stories and freelancers doing the daily news hits, and in my experience it’s been really easy to go over 35 bylines in less than a month with those,” Zac Estrada, a writer and editor in Los Angeles who covers automotive and technology news for a variety of publications, says. “Earlier this year, I was working for a site doing daily news contributions, and they wanted at least 50 per month.” Sign up for weekly emails from the United States Project California’s new freelancing rules have prompted one site, for which Estrada works as an editor, to re-examine the way it distributes work. He hasn’t had any work from that site this month. “I’m glad the state of California is looking out for workplace issues and benefit, but I don’t see a way this bill helps me,” he says. “A lot of people I know love freelancing and wouldn’t take a full-time job even if it offered them more money.” Nathan Cambridge, a freelance sportswriter in Los Angeles, covers football games and other high school and community college sporting events for local newspapers in Burbank, Glendale, and La Cañada Flintridge. All three papers are owned by the Los Angeles Times; it’s not clear from the text of the law whether the three will be treated as individual employers, or as one. If they’re considered separate, then Cambridge has exceeded 35 stories for one client twice in the past five years. If they’re considered a single employer, then he exceeds 35 stories every year (with an average of 59 per year, and a high of 103 in 2013). “In an ideal world, the company would recognize the value of my content and think, ‘Rather than not being able to use this person anymore, I’ll give them a job,’ but that’s not the world we’re in with newspapers,” Cambridge says. “What’s going to happen is, I’m going to hit 35 and they’re going to stop giving me assignments.” Community newspapers and local weeklies are going to feel the pinch of the 35-byline limit, Steve Falk, the CEO of Sonoma Media Investments, says. The company owns the daily Press Democrat in Santa Rosa and two community weeklies in Sonoma County, along with a weekly business journal, two magazines, a Spanish language newspaper, and a cannabis news website. At the weeklies, Falk says, it’s common for freelancers to write weekly columns on food, wine, or local events. “They write 52 weeks a year, and that becomes a problem now,” he says. “We will have to pick the 35 most important weeks for them to write.” The number, he adds, “just seems so arbitrary.” Why a limit of 35 stories? The number is the result of negotiations between lawmakers and interest groups, including journalists and journalists’ unions, according to Steve Smith, communications director for the California Labor Federation. The union coalition was one of Assembly Bill 5’s chief supporters, and worked on it with its author, San Diego Democrat Lorena Gonzalez. “We had a lot of discussions with journalists and with unions that represent journalists,” Smith says. “You needed to thread the needle. If you had a blanket exemption, what would prevent any newspaper or magazine or online publication from saying, ‘I’m going to get rid of all my employees and make everyone a freelancer’?” Catherine Fisk, a professor of labor law at the University of California, Berkeley, says the 35-byline rule is an attempt by the legislature “to distinguish between people who are really, effectively, a staff writer and people who are truly freelancers.” She calls the threshold a “bright-line rule” and likens it to a speed limit. “There might be reasons why 65 isn’t the best speed limit for the road you’re on, but don’t try arguing with the cop about it,” she says. Assembly Bill 5 could have been worse for newspapers and other publishers. The first drafts of the bill had no partial exemptions for freelancers who write fewer than 35 times per year. And a separate bill gave the newspaper industry an extra year to classify its freelance delivery carriers as employees. Even under the pre-Dynamex regime, newspapers faced numerous lawsuits from carriers seeking employee status and back wages. Under the bill, Uber and Lyft will be exposed to lawsuits from local and state prosecutors. Publishers aren’t likely to face the same enforcement pressure. But the risk is there, and California prosecutors are sometimes of the activist type. If publishers are sued, freelancers would be the intended beneficiaries. But it doesn’t feel that way to Cambridge, who sees his freelance work covering high school sports as something of a community service. “High school sports are there for the community,” he says. “That’s half the reason I do it, and it’s half the reason I feel threatened by this. It’s not just money and it’s not just a job that’s being threatened, it’s the community feeling threatened by this. It feels like the state of California has a beef with Uber and we’re caught in the crossfire.” ICYMI: The news according to migrants in Italy Has America ever needed a media watchdog more than now? Help us by joining CJR today Tony Biasotti is a freelance writer in Ventura, California. Find him on Twitter @tonybiasotti.
{ "pile_set_name": "OpenWebText2" }
Dressing puzzle - Fancy costumes Puzzle for children from 3 years with characters in fancy dress. Individual parts are made of durable cardboard. Puzzle for small children, it is a game that is fun and always returns to it. Beautiful character with colorful masquerade costumes are divided into several parts, the children then have the task of properly assemble the whole figure. And though it on the first attempt fails, there will be a comic character, just as fun as it should be. Toy stimulates creativity and imagination and provide hours of entertainment, not only the child but the whole family. Individual parts are made ??of durable cardboard jigsaw is placed in a beautiful box with closing elastic band. Give your child the joy of the game! Package includes: 9 characters divided into 27 parts box Size: 15 x 8 cm for each component Toy complies with the Directive of the European Parliament and Council Directive 2009/48 / EC of 18 June 2009 on the safety of toys and all legal standards under Czech legislation. Of course there is a declaration of conformity. Specifications Compare Recommended age from 3 year(s) Report an error Done! Online chat Dear customer, your question you can send us a message via the contact form here, respectively. you can solve your query online using chat. If you want to use the chat log , please.
{ "pile_set_name": "Pile-CC" }
Another US Navy chopper has crashed after a first accident in Norfolk (Picture: PA) A US military helicopter crashed in the Atlantic tonight – the second to come down in as many days. The Navy chopper went down off the coast of Norfolk, Virginia. It came less than a 24 hours after a Pave Hawk crashed in Norfolk on the east coast of England, killing four crew members. Four of those involved in the Virginia crash were rescued but one person later died. Teams were searching for a fifth person. Meanwhile, four crew members killed in the Pave Hawk crash were named tonight. They were Capt Christopher Stover and Capt Sean Ruane, who were the helicopter’s pilots, and special mission aviators Technical Sgt Dale Mathews and SSgt Afton Ponce. Their bodies remained at the scene on a nature reserve in Cley-next-the-Sea this evening and are not expected to be recovered until tomorrow. Capt Ruane’s wife, Rachel, said on a website at the time of their marriage in 2011 she was proud of his job and: ‘There are very few men like him.’ Police and crash investigators have been held up by munitions, thought to be live ammunition, among the debris scattered around an area the size of a football pitch. The helicopter was carrying out a low-level training mission from RAF Lakenheath in Suffolk. Sue McKnespiey, who lives nearby, said it flew overhead ‘very fast and very low’. She added: ‘This sounded very heavy and very unusual.’ Col Kyle Robinson, commander of 48th Fighter Wing stationed at the base, said: ‘I can only imagine the hurt and sorrow felt by the family and friends of these airmen.’
{ "pile_set_name": "OpenWebText2" }
“I felt like it was time to put myself in the place of that young man,” Yoba said in an interview Tuesday. “If I could admit that publicly, other people would have permission to do the same.” Yoba’s profession of his attraction to transgender women comes at a time when discussions about black men’s masculinity, sexuality and shame have garnered more attention following Willoughby’s death. Making the declaration at his own behest and without other sources claiming to have knowledge of his attraction is possibly a first among high-profile black male celebrities. AD AD Yoba’s acknowledgment is an important step toward demarginalizing transgender people, said Tricia Rose, chancellor’s professor of Africana studies at Brown University. “It blurs the presumed bright line between trans and heterosexuality,” she said. Yoba’s public acknowledgment of his attraction to transgender women serves to affirm the womanhood of transgender women, said Marquis Bey, an assistant professor of African American studies at Northwestern University. “For a celebrity to profess an attraction to trans women works to assert the gendered validity of trans women as not only women but women worthy of non-fetishistic desire,” he said. The cheers and derision that met Yoba were followed by an allegation from a transgender woman who said she had engaged in sexual activity with the actor when she was a minor and a sex worker, allegations Yoba has denied. AD AD Earlier this year, Willoughby professed his love for his transgender girlfriend on Facebook, captioning a picture of them that read: “Y’all can say whatever about Faith I really don’t care if she not passable I don’t care if she wasn’t born a woman she is a woman to me & I love her flaws that’s what makes her faith if you heard her story it’s motivating. … I’m happy you should be happy for me.” Attacks on Willoughby followed, both online and in person, including an instance that was caught on camera in which men scornfully question his sexual behavior with transgender women. Willoughby’s girlfriend said on an Instagram live stream last month that he had died. James Garrow, spokesman for the Philadelphia Department of Public Health, said the medical examiner has not issued a final ruling on the cause of death. AD AD Yoba captioned the video and an article about Willoughby’s death to call attention to the unacceptable behavior. He announced he would attend the National Trans Visibility March in Washington later this month and said he finds himself attracted to transgender women. “I too have felt the self-imposed shame that comes with that truth, but it’s time to speak up,” he said in the caption. The post has since been deleted from Yoba’s account. Yoba followed up with another now-deleted Instagram post on Labor Day in which he thanked people who had reached out to him in support of his public acknowledgment, apologized to his three children for the “foul messages” they’ve been receiving since his posting and reiterated his support of transgender men and women. AD The comments on the two posts ranged from expressions of thanks for his honesty to homophobic slurs. AD Shortly after Yoba declared his attraction and support, a transgender woman wrote a Facebook post claiming that she had a sexual relationship with the actor when she was a teenage sex worker in New York decades ago. She alleged that Yoba paid her for sexual favors when she was 13 and 16 years old. In a subsequent video, the woman said she chose to share her story “because he decided to say something,” noting that Yoba wasn’t the only celebrity client who had cruised the street where she worked in search of transgender women. The woman did not immediately respond to requests for comment. The Washington Post generally does not identify victims of alleged sexual offenses without their consent. AD While Yoba’s admission can be seen as revelatory, his declaration that he is being open and authentic could be countered if there is any truth to the allegation against him. AD Bey said that if the allegation against Yoba is true, then it is a testament to the way black sexuality is linked to societal scrutiny and spectacle. “Shame and stigma surrounding black cis male attraction to trans women is symptomatic of the general invalidating criticism black sex and sexuality is accosted by,” he said. Yoba denies the woman’s allegations and says he doesn’t know who she is. The actor said that he expected people to say “crazy” things after his posts but that he didn’t anticipate such allegations. AD The accusation, he said, is a cry for help and an indication of the issues facing transgender youth: homelessness and sex work. About 40 percent of homeless youth identify as LGBT, according to a 2012 Williams Institute report. A December 2015 survey of 694 transgender adults found that nearly 11 percent reported participating in sex work, and an additional 2.3 percent indicated they had traded sex for rent or a place to stay. AD Marissa Miller, lead strategic director for the National Trans Visibility March, said not enough is known about the accusation for march leaders to issue a statement. The main agenda, Miller said, is the march and the 8,000 people who are expected to attend. AD “For me, knowing what my intention is and the work that I’ve done, for someone to play in that space and try to defame, vilify [and] take a moment to do that, is heartbreaking,” Yoba said. If there is an allegation of wrongdoing on Yoba’s part, a report should be filed, according to Sgt. Jessica McRorie, a spokeswoman for the New York Police Department. “The NYPD takes child abuse, sexual assaults and rape cases extremely seriously, and urges anyone who has been a victim to file a report so we can perform a comprehensive investigation, and offer support and services to survivors,” she said in a statement. AD Yoba said he’s not letting the “foolishness” that followed his announcement detract from the purpose of the march or his pursuit to improve the lives of transgender Americans. AD He is co-hosting a workshop during the weekend of the march about what love looks like for transgender people with transgender TV personality and model Carmen Carrera — a friend who inspired him to live his life more authentically after they hung out on a float at a recent Pride Day parade, he said. He is also negotiating a deal in Harlem that would provide housing for LGBT youths of color, he said. Yoba said closeted transgender people and men who “love a little bit more fluidly” have reached out, often using the word “brave.” “That comes from a very deep place for a lot of people,” he said.
{ "pile_set_name": "OpenWebText2" }
// This file was generated by go generate; DO NOT EDIT package currency import "golang.org/x/text/internal/tag" // CLDRVersion is the CLDR version from which the tables in this package are derived. const CLDRVersion = "29" const ( xxx = 282 xts = 280 usd = 249 eur = 92 jpy = 131 gbp = 97 chf = 60 aud = 19 nzd = 190 cad = 57 sek = 217 nok = 188 dkk = 80 xag = 263 xau = 264 xpt = 277 xpd = 275 brl = 46 cny = 66 inr = 123 rub = 208 hkd = 112 idr = 118 krw = 139 mxn = 176 pln = 199 sar = 211 thb = 232 try = 241 twd = 243 zar = 290 ) // currency holds an alphabetically sorted list of canonical 3-letter currency // identifiers. Each identifier is followed by a byte of type currencyInfo, // defined in gen_common.go. var currency tag.Index = "" + // Size: 1196 bytes "\x00\x00\x00\x00ADP\x09AED\x00AFA\x00AFN\x09ALK\x00ALL\x09AMD\x09ANG\x00" + "AOA\x00AOK\x00AON\x00AOR\x00ARA\x00ARL\x00ARM\x00ARP\x00ARS\x00ATS\x00AU" + "D\x00AWG\x00AZM\x00AZN\x00BAD\x00BAM\x00BAN\x00BBD\x00BDT\x00BEC\x00BEF" + "\x00BEL\x00BGL\x00BGM\x00BGN\x00BGO\x00BHD\x1bBIF\x09BMD\x00BND\x00BOB" + "\x00BOL\x00BOP\x00BOV\x00BRB\x00BRC\x00BRE\x00BRL\x00BRN\x00BRR\x00BRZ" + "\x00BSD\x00BTN\x00BUK\x00BWP\x00BYB\x00BYR\x09BZD\x00CAD(CDF\x00CHE\x00C" + "HF(CHW\x00CLE\x00CLF$CLP\x09CNX\x00CNY\x00COP\x09COU\x00CRC\x09CSD\x00CS" + "K\x00CUC\x00CUP\x00CVE\x00CYP\x00CZK\x08DDM\x00DEM\x00DJF\x09DKK\x00DOP" + "\x00DZD\x00ECS\x00ECV\x00EEK\x00EGP\x00ERN\x00ESA\x00ESB\x00ESP\x09ETB" + "\x00EUR\x00FIM\x00FJD\x00FKP\x00FRF\x00GBP\x00GEK\x00GEL\x00GHC\x00GHS" + "\x00GIP\x00GMD\x00GNF\x09GNS\x00GQE\x00GRD\x00GTQ\x00GWE\x00GWP\x00GYD" + "\x09HKD\x00HNL\x00HRD\x00HRK\x00HTG\x00HUF\x08IDR\x09IEP\x00ILP\x00ILR" + "\x00ILS\x00INR\x00IQD\x09IRR\x09ISJ\x00ISK\x09ITL\x09JMD\x00JOD\x1bJPY" + "\x09KES\x00KGS\x00KHR\x00KMF\x09KPW\x09KRH\x00KRO\x00KRW\x09KWD\x1bKYD" + "\x00KZT\x00LAK\x09LBP\x09LKR\x00LRD\x00LSL\x00LTL\x00LTT\x00LUC\x00LUF" + "\x09LUL\x00LVL\x00LVR\x00LYD\x1bMAD\x00MAF\x00MCF\x00MDC\x00MDL\x00MGA" + "\x09MGF\x09MKD\x00MKN\x00MLF\x00MMK\x09MNT\x09MOP\x00MRO\x09MTL\x00MTP" + "\x00MUR\x09MVP\x00MVR\x00MWK\x00MXN\x00MXP\x00MXV\x00MYR\x00MZE\x00MZM" + "\x00MZN\x00NAD\x00NGN\x00NIC\x00NIO\x00NLG\x00NOK\x00NPR\x00NZD\x00OMR" + "\x1bPAB\x00PEI\x00PEN\x00PES\x00PGK\x00PHP\x00PKR\x09PLN\x00PLZ\x00PTE" + "\x00PYG\x09QAR\x00RHD\x00ROL\x00RON\x00RSD\x09RUB\x00RUR\x00RWF\x09SAR" + "\x00SBD\x00SCR\x00SDD\x00SDG\x00SDP\x00SEK\x00SGD\x00SHP\x00SIT\x00SKK" + "\x00SLL\x09SOS\x09SRD\x00SRG\x00SSP\x00STD\x09SUR\x00SVC\x00SYP\x09SZL" + "\x00THB\x00TJR\x00TJS\x00TMM\x09TMT\x00TND\x1bTOP\x00TPE\x00TRL\x09TRY" + "\x00TTD\x00TWD\x08TZS\x09UAH\x00UAK\x00UGS\x00UGX\x09USD\x00USN\x00USS" + "\x00UYI\x09UYP\x00UYU\x00UZS\x09VEB\x00VEF\x00VND\x09VNN\x00VUV\x09WST" + "\x00XAF\x09XAG\x00XAU\x00XBA\x00XBB\x00XBC\x00XBD\x00XCD\x00XDR\x00XEU" + "\x00XFO\x00XFU\x00XOF\x09XPD\x00XPF\x09XPT\x00XRE\x00XSU\x00XTS\x00XUA" + "\x00XXX\x00YDD\x00YER\x09YUD\x00YUM\x00YUN\x00YUR\x00ZAL\x00ZAR\x00ZMK" + "\x09ZMW\x00ZRN\x00ZRZ\x00ZWD\x09ZWL\x00ZWR\x00\xff\xff\xff\xff" const numCurrencies = 297 type toCurrency struct { region uint16 code uint16 } var regionToCurrency = []toCurrency{ // 255 elements 0: {region: 0x4143, code: 0xdb}, 1: {region: 0x4144, code: 0x5c}, 2: {region: 0x4145, code: 0x2}, 3: {region: 0x4146, code: 0x4}, 4: {region: 0x4147, code: 0x10d}, 5: {region: 0x4149, code: 0x10d}, 6: {region: 0x414c, code: 0x6}, 7: {region: 0x414d, code: 0x7}, 8: {region: 0x414f, code: 0x9}, 9: {region: 0x4152, code: 0x11}, 10: {region: 0x4153, code: 0xf9}, 11: {region: 0x4154, code: 0x5c}, 12: {region: 0x4155, code: 0x13}, 13: {region: 0x4157, code: 0x14}, 14: {region: 0x4158, code: 0x5c}, 15: {region: 0x415a, code: 0x16}, 16: {region: 0x4241, code: 0x18}, 17: {region: 0x4242, code: 0x1a}, 18: {region: 0x4244, code: 0x1b}, 19: {region: 0x4245, code: 0x5c}, 20: {region: 0x4246, code: 0x112}, 21: {region: 0x4247, code: 0x21}, 22: {region: 0x4248, code: 0x23}, 23: {region: 0x4249, code: 0x24}, 24: {region: 0x424a, code: 0x112}, 25: {region: 0x424c, code: 0x5c}, 26: {region: 0x424d, code: 0x25}, 27: {region: 0x424e, code: 0x26}, 28: {region: 0x424f, code: 0x27}, 29: {region: 0x4251, code: 0xf9}, 30: {region: 0x4252, code: 0x2e}, 31: {region: 0x4253, code: 0x32}, 32: {region: 0x4254, code: 0x33}, 33: {region: 0x4256, code: 0xbc}, 34: {region: 0x4257, code: 0x35}, 35: {region: 0x4259, code: 0x37}, 36: {region: 0x425a, code: 0x38}, 37: {region: 0x4341, code: 0x39}, 38: {region: 0x4343, code: 0x13}, 39: {region: 0x4344, code: 0x3a}, 40: {region: 0x4346, code: 0x106}, 41: {region: 0x4347, code: 0x106}, 42: {region: 0x4348, code: 0x3c}, 43: {region: 0x4349, code: 0x112}, 44: {region: 0x434b, code: 0xbe}, 45: {region: 0x434c, code: 0x40}, 46: {region: 0x434d, code: 0x106}, 47: {region: 0x434e, code: 0x42}, 48: {region: 0x434f, code: 0x43}, 49: {region: 0x4352, code: 0x45}, 50: {region: 0x4355, code: 0x49}, 51: {region: 0x4356, code: 0x4a}, 52: {region: 0x4357, code: 0x8}, 53: {region: 0x4358, code: 0x13}, 54: {region: 0x4359, code: 0x5c}, 55: {region: 0x435a, code: 0x4c}, 56: {region: 0x4445, code: 0x5c}, 57: {region: 0x4447, code: 0xf9}, 58: {region: 0x444a, code: 0x4f}, 59: {region: 0x444b, code: 0x50}, 60: {region: 0x444d, code: 0x10d}, 61: {region: 0x444f, code: 0x51}, 62: {region: 0x445a, code: 0x52}, 63: {region: 0x4541, code: 0x5c}, 64: {region: 0x4543, code: 0xf9}, 65: {region: 0x4545, code: 0x5c}, 66: {region: 0x4547, code: 0x56}, 67: {region: 0x4548, code: 0x9c}, 68: {region: 0x4552, code: 0x57}, 69: {region: 0x4553, code: 0x5c}, 70: {region: 0x4554, code: 0x5b}, 71: {region: 0x4555, code: 0x5c}, 72: {region: 0x4649, code: 0x5c}, 73: {region: 0x464a, code: 0x5e}, 74: {region: 0x464b, code: 0x5f}, 75: {region: 0x464d, code: 0xf9}, 76: {region: 0x464f, code: 0x50}, 77: {region: 0x4652, code: 0x5c}, 78: {region: 0x4741, code: 0x106}, 79: {region: 0x4742, code: 0x61}, 80: {region: 0x4744, code: 0x10d}, 81: {region: 0x4745, code: 0x63}, 82: {region: 0x4746, code: 0x5c}, 83: {region: 0x4747, code: 0x61}, 84: {region: 0x4748, code: 0x65}, 85: {region: 0x4749, code: 0x66}, 86: {region: 0x474c, code: 0x50}, 87: {region: 0x474d, code: 0x67}, 88: {region: 0x474e, code: 0x68}, 89: {region: 0x4750, code: 0x5c}, 90: {region: 0x4751, code: 0x106}, 91: {region: 0x4752, code: 0x5c}, 92: {region: 0x4753, code: 0x61}, 93: {region: 0x4754, code: 0x6c}, 94: {region: 0x4755, code: 0xf9}, 95: {region: 0x4757, code: 0x112}, 96: {region: 0x4759, code: 0x6f}, 97: {region: 0x484b, code: 0x70}, 98: {region: 0x484d, code: 0x13}, 99: {region: 0x484e, code: 0x71}, 100: {region: 0x4852, code: 0x73}, 101: {region: 0x4854, code: 0x74}, 102: {region: 0x4855, code: 0x75}, 103: {region: 0x4943, code: 0x5c}, 104: {region: 0x4944, code: 0x76}, 105: {region: 0x4945, code: 0x5c}, 106: {region: 0x494c, code: 0x7a}, 107: {region: 0x494d, code: 0x61}, 108: {region: 0x494e, code: 0x7b}, 109: {region: 0x494f, code: 0xf9}, 110: {region: 0x4951, code: 0x7c}, 111: {region: 0x4952, code: 0x7d}, 112: {region: 0x4953, code: 0x7f}, 113: {region: 0x4954, code: 0x5c}, 114: {region: 0x4a45, code: 0x61}, 115: {region: 0x4a4d, code: 0x81}, 116: {region: 0x4a4f, code: 0x82}, 117: {region: 0x4a50, code: 0x83}, 118: {region: 0x4b45, code: 0x84}, 119: {region: 0x4b47, code: 0x85}, 120: {region: 0x4b48, code: 0x86}, 121: {region: 0x4b49, code: 0x13}, 122: {region: 0x4b4d, code: 0x87}, 123: {region: 0x4b4e, code: 0x10d}, 124: {region: 0x4b50, code: 0x88}, 125: {region: 0x4b52, code: 0x8b}, 126: {region: 0x4b57, code: 0x8c}, 127: {region: 0x4b59, code: 0x8d}, 128: {region: 0x4b5a, code: 0x8e}, 129: {region: 0x4c41, code: 0x8f}, 130: {region: 0x4c42, code: 0x90}, 131: {region: 0x4c43, code: 0x10d}, 132: {region: 0x4c49, code: 0x3c}, 133: {region: 0x4c4b, code: 0x91}, 134: {region: 0x4c52, code: 0x92}, 135: {region: 0x4c53, code: 0x122}, 136: {region: 0x4c54, code: 0x5c}, 137: {region: 0x4c55, code: 0x5c}, 138: {region: 0x4c56, code: 0x5c}, 139: {region: 0x4c59, code: 0x9b}, 140: {region: 0x4d41, code: 0x9c}, 141: {region: 0x4d43, code: 0x5c}, 142: {region: 0x4d44, code: 0xa0}, 143: {region: 0x4d45, code: 0x5c}, 144: {region: 0x4d46, code: 0x5c}, 145: {region: 0x4d47, code: 0xa1}, 146: {region: 0x4d48, code: 0xf9}, 147: {region: 0x4d4b, code: 0xa3}, 148: {region: 0x4d4c, code: 0x112}, 149: {region: 0x4d4d, code: 0xa6}, 150: {region: 0x4d4e, code: 0xa7}, 151: {region: 0x4d4f, code: 0xa8}, 152: {region: 0x4d50, code: 0xf9}, 153: {region: 0x4d51, code: 0x5c}, 154: {region: 0x4d52, code: 0xa9}, 155: {region: 0x4d53, code: 0x10d}, 156: {region: 0x4d54, code: 0x5c}, 157: {region: 0x4d55, code: 0xac}, 158: {region: 0x4d56, code: 0xae}, 159: {region: 0x4d57, code: 0xaf}, 160: {region: 0x4d58, code: 0xb0}, 161: {region: 0x4d59, code: 0xb3}, 162: {region: 0x4d5a, code: 0xb6}, 163: {region: 0x4e41, code: 0xb7}, 164: {region: 0x4e43, code: 0x114}, 165: {region: 0x4e45, code: 0x112}, 166: {region: 0x4e46, code: 0x13}, 167: {region: 0x4e47, code: 0xb8}, 168: {region: 0x4e49, code: 0xba}, 169: {region: 0x4e4c, code: 0x5c}, 170: {region: 0x4e4f, code: 0xbc}, 171: {region: 0x4e50, code: 0xbd}, 172: {region: 0x4e52, code: 0x13}, 173: {region: 0x4e55, code: 0xbe}, 174: {region: 0x4e5a, code: 0xbe}, 175: {region: 0x4f4d, code: 0xbf}, 176: {region: 0x5041, code: 0xc0}, 177: {region: 0x5045, code: 0xc2}, 178: {region: 0x5046, code: 0x114}, 179: {region: 0x5047, code: 0xc4}, 180: {region: 0x5048, code: 0xc5}, 181: {region: 0x504b, code: 0xc6}, 182: {region: 0x504c, code: 0xc7}, 183: {region: 0x504d, code: 0x5c}, 184: {region: 0x504e, code: 0xbe}, 185: {region: 0x5052, code: 0xf9}, 186: {region: 0x5053, code: 0x7a}, 187: {region: 0x5054, code: 0x5c}, 188: {region: 0x5057, code: 0xf9}, 189: {region: 0x5059, code: 0xca}, 190: {region: 0x5141, code: 0xcb}, 191: {region: 0x5245, code: 0x5c}, 192: {region: 0x524f, code: 0xce}, 193: {region: 0x5253, code: 0xcf}, 194: {region: 0x5255, code: 0xd0}, 195: {region: 0x5257, code: 0xd2}, 196: {region: 0x5341, code: 0xd3}, 197: {region: 0x5342, code: 0xd4}, 198: {region: 0x5343, code: 0xd5}, 199: {region: 0x5344, code: 0xd7}, 200: {region: 0x5345, code: 0xd9}, 201: {region: 0x5347, code: 0xda}, 202: {region: 0x5348, code: 0xdb}, 203: {region: 0x5349, code: 0x5c}, 204: {region: 0x534a, code: 0xbc}, 205: {region: 0x534b, code: 0x5c}, 206: {region: 0x534c, code: 0xde}, 207: {region: 0x534d, code: 0x5c}, 208: {region: 0x534e, code: 0x112}, 209: {region: 0x534f, code: 0xdf}, 210: {region: 0x5352, code: 0xe0}, 211: {region: 0x5353, code: 0xe2}, 212: {region: 0x5354, code: 0xe3}, 213: {region: 0x5356, code: 0xf9}, 214: {region: 0x5358, code: 0x8}, 215: {region: 0x5359, code: 0xe6}, 216: {region: 0x535a, code: 0xe7}, 217: {region: 0x5441, code: 0x61}, 218: {region: 0x5443, code: 0xf9}, 219: {region: 0x5444, code: 0x106}, 220: {region: 0x5446, code: 0x5c}, 221: {region: 0x5447, code: 0x112}, 222: {region: 0x5448, code: 0xe8}, 223: {region: 0x544a, code: 0xea}, 224: {region: 0x544b, code: 0xbe}, 225: {region: 0x544c, code: 0xf9}, 226: {region: 0x544d, code: 0xec}, 227: {region: 0x544e, code: 0xed}, 228: {region: 0x544f, code: 0xee}, 229: {region: 0x5452, code: 0xf1}, 230: {region: 0x5454, code: 0xf2}, 231: {region: 0x5456, code: 0x13}, 232: {region: 0x5457, code: 0xf3}, 233: {region: 0x545a, code: 0xf4}, 234: {region: 0x5541, code: 0xf5}, 235: {region: 0x5547, code: 0xf8}, 236: {region: 0x554d, code: 0xf9}, 237: {region: 0x5553, code: 0xf9}, 238: {region: 0x5559, code: 0xfe}, 239: {region: 0x555a, code: 0xff}, 240: {region: 0x5641, code: 0x5c}, 241: {region: 0x5643, code: 0x10d}, 242: {region: 0x5645, code: 0x101}, 243: {region: 0x5647, code: 0xf9}, 244: {region: 0x5649, code: 0xf9}, 245: {region: 0x564e, code: 0x102}, 246: {region: 0x5655, code: 0x104}, 247: {region: 0x5746, code: 0x114}, 248: {region: 0x5753, code: 0x105}, 249: {region: 0x584b, code: 0x5c}, 250: {region: 0x5945, code: 0x11c}, 251: {region: 0x5954, code: 0x5c}, 252: {region: 0x5a41, code: 0x122}, 253: {region: 0x5a4d, code: 0x124}, 254: {region: 0x5a57, code: 0xf9}, } // Size: 1044 bytes type regionInfo struct { region uint16 code uint16 from uint32 to uint32 } var regionData = []regionInfo{ // 492 elements 0: {region: 0x4143, code: 0xdb, from: 0xf7021, to: 0x0}, 1: {region: 0x4144, code: 0x5c, from: 0xf9e21, to: 0x0}, 2: {region: 0x4144, code: 0x5a, from: 0xea221, to: 0xfa45c}, 3: {region: 0x4144, code: 0x60, from: 0xf5021, to: 0xfa451}, 4: {region: 0x4144, code: 0x1, from: 0xf2021, to: 0xfa39f}, 5: {region: 0x4145, code: 0x2, from: 0xf6ab3, to: 0x0}, 6: {region: 0x4146, code: 0x4, from: 0xfa547, to: 0x0}, 7: {region: 0x4146, code: 0x3, from: 0xf0e6e, to: 0xfa59f}, 8: {region: 0x4147, code: 0x10d, from: 0xf5b46, to: 0x0}, 9: {region: 0x4149, code: 0x10d, from: 0xf5b46, to: 0x0}, 10: {region: 0x414c, code: 0x6, from: 0xf5b10, to: 0x0}, 11: {region: 0x414c, code: 0x5, from: 0xf3561, to: 0xf5b10}, 12: {region: 0x414d, code: 0x7, from: 0xf9376, to: 0x0}, 13: {region: 0x414d, code: 0xd1, from: 0xf8f99, to: 0xf9376}, 14: {region: 0x414d, code: 0xe4, from: 0xf5221, to: 0xf8f99}, 15: {region: 0x414f, code: 0x9, from: 0xf9f8d, to: 0x0}, 16: {region: 0x414f, code: 0xc, from: 0xf96e1, to: 0xfa041}, 17: {region: 0x414f, code: 0xb, from: 0xf8d39, to: 0xfa041}, 18: {region: 0x414f, code: 0xa, from: 0xf7228, to: 0xf8e61}, 19: {region: 0x4151, code: 0x811a, from: 0x0, to: 0x0}, 20: {region: 0x4152, code: 0x11, from: 0xf9021, to: 0x0}, 21: {region: 0x4152, code: 0xd, from: 0xf82ce, to: 0xf9021}, 22: {region: 0x4152, code: 0x10, from: 0xf7ec1, to: 0xf82ce}, 23: {region: 0x4152, code: 0xe, from: 0xf6421, to: 0xf7ec1}, 24: {region: 0x4152, code: 0xf, from: 0xeb365, to: 0xf6421}, 25: {region: 0x4153, code: 0xf9, from: 0xee0f0, to: 0x0}, 26: {region: 0x4154, code: 0x5c, from: 0xf9e21, to: 0x0}, 27: {region: 0x4154, code: 0x12, from: 0xf3784, to: 0xfa45c}, 28: {region: 0x4155, code: 0x13, from: 0xf5c4e, to: 0x0}, 29: {region: 0x4157, code: 0x14, from: 0xf8421, to: 0x0}, 30: {region: 0x4157, code: 0x8, from: 0xf28aa, to: 0xf8421}, 31: {region: 0x4158, code: 0x5c, from: 0xf9e21, to: 0x0}, 32: {region: 0x415a, code: 0x16, from: 0xfac21, to: 0x0}, 33: {region: 0x415a, code: 0x15, from: 0xf9376, to: 0xfad9f}, 34: {region: 0x415a, code: 0xd1, from: 0xf8f99, to: 0xf9421}, 35: {region: 0x415a, code: 0xe4, from: 0xf5221, to: 0xf8f99}, 36: {region: 0x4241, code: 0x18, from: 0xf9621, to: 0x0}, 37: {region: 0x4241, code: 0x19, from: 0xf950f, to: 0xf9ae1}, 38: {region: 0x4241, code: 0x17, from: 0xf90e1, to: 0xf950f}, 39: {region: 0x4241, code: 0x120, from: 0xf90e1, to: 0xf9341}, 40: {region: 0x4241, code: 0x11f, from: 0xf8c21, to: 0xf90e1}, 41: {region: 0x4241, code: 0x11d, from: 0xf5c21, to: 0xf8c21}, 42: {region: 0x4242, code: 0x1a, from: 0xf6b83, to: 0x0}, 43: {region: 0x4242, code: 0x10d, from: 0xf5b46, to: 0xf6b83}, 44: {region: 0x4244, code: 0x1b, from: 0xf6821, to: 0x0}, 45: {region: 0x4244, code: 0xc6, from: 0xf3881, to: 0xf6821}, 46: {region: 0x4244, code: 0x7b, from: 0xe5711, to: 0xf3881}, 47: {region: 0x4245, code: 0x5c, from: 0xf9e21, to: 0x0}, 48: {region: 0x4245, code: 0x1d, from: 0xe4e47, to: 0xfa45c}, 49: {region: 0x4245, code: 0xbb, from: 0xe318f, to: 0xe4e47}, 50: {region: 0x4245, code: 0x801e, from: 0xf6421, to: 0xf8c65}, 51: {region: 0x4245, code: 0x801c, from: 0xf6421, to: 0xf8c65}, 52: {region: 0x4246, code: 0x112, from: 0xf8104, to: 0x0}, 53: {region: 0x4247, code: 0x21, from: 0xf9ee5, to: 0x0}, 54: {region: 0x4247, code: 0x1f, from: 0xf5421, to: 0xf9ee5}, 55: {region: 0x4247, code: 0x20, from: 0xf40ac, to: 0xf5421}, 56: {region: 0x4247, code: 0x22, from: 0xeaee8, to: 0xf40ac}, 57: {region: 0x4248, code: 0x23, from: 0xf5b50, to: 0x0}, 58: {region: 0x4249, code: 0x24, from: 0xf58b3, to: 0x0}, 59: {region: 0x424a, code: 0x112, from: 0xf6f7e, to: 0x0}, 60: {region: 0x424c, code: 0x5c, from: 0xf9e21, to: 0x0}, 61: {region: 0x424c, code: 0x60, from: 0xf5021, to: 0xfa451}, 62: {region: 0x424d, code: 0x25, from: 0xf6446, to: 0x0}, 63: {region: 0x424e, code: 0x26, from: 0xf5ecc, to: 0x0}, 64: {region: 0x424e, code: 0xb3, from: 0xf5730, to: 0xf5ecc}, 65: {region: 0x424f, code: 0x27, from: 0xf8621, to: 0x0}, 66: {region: 0x424f, code: 0x29, from: 0xf5621, to: 0xf859f}, 67: {region: 0x424f, code: 0x28, from: 0xe8ed7, to: 0xf5621}, 68: {region: 0x424f, code: 0x802a, from: 0x0, to: 0x0}, 69: {region: 0x4251, code: 0xf9, from: 0xfb621, to: 0x0}, 70: {region: 0x4251, code: 0x8, from: 0xfb54a, to: 0xfb621}, 71: {region: 0x4252, code: 0x2e, from: 0xf94e1, to: 0x0}, 72: {region: 0x4252, code: 0x30, from: 0xf9301, to: 0xf94e1}, 73: {region: 0x4252, code: 0x2d, from: 0xf8c70, to: 0xf9301}, 74: {region: 0x4252, code: 0x2f, from: 0xf8a2f, to: 0xf8c70}, 75: {region: 0x4252, code: 0x2c, from: 0xf845c, to: 0xf8a2f}, 76: {region: 0x4252, code: 0x2b, from: 0xf5e4d, to: 0xf845c}, 77: {region: 0x4252, code: 0x31, from: 0xf2d61, to: 0xf5e4d}, 78: {region: 0x4253, code: 0x32, from: 0xf5cb9, to: 0x0}, 79: {region: 0x4254, code: 0x33, from: 0xf6c90, to: 0x0}, 80: {region: 0x4254, code: 0x7b, from: 0xee621, to: 0x0}, 81: {region: 0x4255, code: 0x34, from: 0xf40e1, to: 0xf8ad2}, 82: {region: 0x4256, code: 0xbc, from: 0xee2c7, to: 0x0}, 83: {region: 0x4257, code: 0x35, from: 0xf7117, to: 0x0}, 84: {region: 0x4257, code: 0x122, from: 0xf524e, to: 0xf7117}, 85: {region: 0x4259, code: 0x37, from: 0xfa021, to: 0x0}, 86: {region: 0x4259, code: 0x36, from: 0xf9501, to: 0xfa19f}, 87: {region: 0x4259, code: 0xd1, from: 0xf8f99, to: 0xf9568}, 88: {region: 0x4259, code: 0xe4, from: 0xf5221, to: 0xf8f99}, 89: {region: 0x425a, code: 0x38, from: 0xf6c21, to: 0x0}, 90: {region: 0x4341, code: 0x39, from: 0xe8421, to: 0x0}, 91: {region: 0x4343, code: 0x13, from: 0xf5c4e, to: 0x0}, 92: {region: 0x4344, code: 0x3a, from: 0xf9ce1, to: 0x0}, 93: {region: 0x4344, code: 0x125, from: 0xf9361, to: 0xf9ce1}, 94: {region: 0x4344, code: 0x126, from: 0xf675b, to: 0xf9361}, 95: {region: 0x4346, code: 0x106, from: 0xf9221, to: 0x0}, 96: {region: 0x4347, code: 0x106, from: 0xf9221, to: 0x0}, 97: {region: 0x4348, code: 0x3c, from: 0xe0e71, to: 0x0}, 98: {region: 0x4348, code: 0x803b, from: 0x0, to: 0x0}, 99: {region: 0x4348, code: 0x803d, from: 0x0, to: 0x0}, 100: {region: 0x4349, code: 0x112, from: 0xf4d84, to: 0x0}, 101: {region: 0x434b, code: 0xbe, from: 0xf5eea, to: 0x0}, 102: {region: 0x434c, code: 0x40, from: 0xf6f3d, to: 0x0}, 103: {region: 0x434c, code: 0x3e, from: 0xf5021, to: 0xf6f3d}, 104: {region: 0x434c, code: 0x803f, from: 0x0, to: 0x0}, 105: {region: 0x434d, code: 0x106, from: 0xf6a81, to: 0x0}, 106: {region: 0x434e, code: 0x42, from: 0xf4261, to: 0x0}, 107: {region: 0x434e, code: 0x8041, from: 0xf7621, to: 0xf9d9f}, 108: {region: 0x434f, code: 0x43, from: 0xee221, to: 0x0}, 109: {region: 0x434f, code: 0x8044, from: 0x0, to: 0x0}, 110: {region: 0x4350, code: 0x811a, from: 0x0, to: 0x0}, 111: {region: 0x4352, code: 0x45, from: 0xed15a, to: 0x0}, 112: {region: 0x4353, code: 0x46, from: 0xfa4af, to: 0xfacc3}, 113: {region: 0x4353, code: 0x5c, from: 0xfa644, to: 0xfacc3}, 114: {region: 0x4353, code: 0x11e, from: 0xf9438, to: 0xfa4af}, 115: {region: 0x4355, code: 0x49, from: 0xe8621, to: 0x0}, 116: {region: 0x4355, code: 0x48, from: 0xf9421, to: 0x0}, 117: {region: 0x4355, code: 0xf9, from: 0xed621, to: 0xf4e21}, 118: {region: 0x4356, code: 0x4a, from: 0xef421, to: 0x0}, 119: {region: 0x4356, code: 0xc9, from: 0xeeeb6, to: 0xf6ee5}, 120: {region: 0x4357, code: 0x8, from: 0xfb54a, to: 0x0}, 121: {region: 0x4358, code: 0x13, from: 0xf5c4e, to: 0x0}, 122: {region: 0x4359, code: 0x5c, from: 0xfb021, to: 0x0}, 123: {region: 0x4359, code: 0x4b, from: 0xef52a, to: 0xfb03f}, 124: {region: 0x435a, code: 0x4c, from: 0xf9221, to: 0x0}, 125: {region: 0x435a, code: 0x47, from: 0xf42c1, to: 0xf9261}, 126: {region: 0x4444, code: 0x4d, from: 0xf38f4, to: 0xf8d42}, 127: {region: 0x4445, code: 0x5c, from: 0xf9e21, to: 0x0}, 128: {region: 0x4445, code: 0x4e, from: 0xf38d4, to: 0xfa45c}, 129: {region: 0x4447, code: 0xf9, from: 0xf5b68, to: 0x0}, 130: {region: 0x444a, code: 0x4f, from: 0xf72db, to: 0x0}, 131: {region: 0x444b, code: 0x50, from: 0xea2bb, to: 0x0}, 132: {region: 0x444d, code: 0x10d, from: 0xf5b46, to: 0x0}, 133: {region: 0x444f, code: 0x51, from: 0xf3741, to: 0x0}, 134: {region: 0x444f, code: 0xf9, from: 0xee2d5, to: 0xf3741}, 135: {region: 0x445a, code: 0x52, from: 0xf5881, to: 0x0}, 136: {region: 0x4541, code: 0x5c, from: 0xf9e21, to: 0x0}, 137: {region: 0x4543, code: 0xf9, from: 0xfa142, to: 0x0}, 138: {region: 0x4543, code: 0x53, from: 0xeb881, to: 0xfa142}, 139: {region: 0x4543, code: 0x8054, from: 0xf92b7, to: 0xfa029}, 140: {region: 0x4545, code: 0x5c, from: 0xfb621, to: 0x0}, 141: {region: 0x4545, code: 0x55, from: 0xf90d5, to: 0xfb59f}, 142: {region: 0x4545, code: 0xe4, from: 0xf5221, to: 0xf90d4}, 143: {region: 0x4547, code: 0x56, from: 0xebb6e, to: 0x0}, 144: {region: 0x4548, code: 0x9c, from: 0xf705a, to: 0x0}, 145: {region: 0x4552, code: 0x57, from: 0xf9b68, to: 0x0}, 146: {region: 0x4552, code: 0x5b, from: 0xf92b8, to: 0xf9b68}, 147: {region: 0x4553, code: 0x5c, from: 0xf9e21, to: 0x0}, 148: {region: 0x4553, code: 0x5a, from: 0xe9953, to: 0xfa45c}, 149: {region: 0x4553, code: 0x8058, from: 0xf7421, to: 0xf7b9f}, 150: {region: 0x4553, code: 0x8059, from: 0xf6e21, to: 0xf959f}, 151: {region: 0x4554, code: 0x5b, from: 0xf712f, to: 0x0}, 152: {region: 0x4555, code: 0x5c, from: 0xf9e21, to: 0x0}, 153: {region: 0x4555, code: 0x810f, from: 0xf7621, to: 0xf9d9f}, 154: {region: 0x4649, code: 0x5c, from: 0xf9e21, to: 0x0}, 155: {region: 0x4649, code: 0x5d, from: 0xf5621, to: 0xfa45c}, 156: {region: 0x464a, code: 0x5e, from: 0xf622d, to: 0x0}, 157: {region: 0x464b, code: 0x5f, from: 0xeda21, to: 0x0}, 158: {region: 0x464d, code: 0xf9, from: 0xf3021, to: 0x0}, 159: {region: 0x464d, code: 0x83, from: 0xef543, to: 0xf3021}, 160: {region: 0x464f, code: 0x50, from: 0xf3821, to: 0x0}, 161: {region: 0x4652, code: 0x5c, from: 0xf9e21, to: 0x0}, 162: {region: 0x4652, code: 0x60, from: 0xf5021, to: 0xfa451}, 163: {region: 0x4741, code: 0x106, from: 0xf9221, to: 0x0}, 164: {region: 0x4742, code: 0x61, from: 0xd3cfb, to: 0x0}, 165: {region: 0x4744, code: 0x10d, from: 0xf5e5b, to: 0x0}, 166: {region: 0x4745, code: 0x63, from: 0xf9737, to: 0x0}, 167: {region: 0x4745, code: 0x62, from: 0xf9285, to: 0xf9739}, 168: {region: 0x4745, code: 0xd1, from: 0xf8f99, to: 0xf92cb}, 169: {region: 0x4745, code: 0xe4, from: 0xf5221, to: 0xf8f99}, 170: {region: 0x4746, code: 0x5c, from: 0xf9e21, to: 0x0}, 171: {region: 0x4746, code: 0x60, from: 0xf5021, to: 0xfa451}, 172: {region: 0x4747, code: 0x61, from: 0xe4c21, to: 0x0}, 173: {region: 0x4748, code: 0x65, from: 0xfaee3, to: 0x0}, 174: {region: 0x4748, code: 0x64, from: 0xf7669, to: 0xfaf9f}, 175: {region: 0x4749, code: 0x66, from: 0xd6221, to: 0x0}, 176: {region: 0x474c, code: 0x50, from: 0xea2bb, to: 0x0}, 177: {region: 0x474d, code: 0x67, from: 0xf66e1, to: 0x0}, 178: {region: 0x474e, code: 0x68, from: 0xf8426, to: 0x0}, 179: {region: 0x474e, code: 0x69, from: 0xf6942, to: 0xf8426}, 180: {region: 0x4750, code: 0x5c, from: 0xf9e21, to: 0x0}, 181: {region: 0x4750, code: 0x60, from: 0xf5021, to: 0xfa451}, 182: {region: 0x4751, code: 0x106, from: 0xf9221, to: 0x0}, 183: {region: 0x4751, code: 0x6a, from: 0xf6ee7, to: 0xf84c1}, 184: {region: 0x4752, code: 0x5c, from: 0xfa221, to: 0x0}, 185: {region: 0x4752, code: 0x6b, from: 0xf44a1, to: 0xfa45c}, 186: {region: 0x4753, code: 0x61, from: 0xee821, to: 0x0}, 187: {region: 0x4754, code: 0x6c, from: 0xf0abb, to: 0x0}, 188: {region: 0x4755, code: 0xf9, from: 0xf3115, to: 0x0}, 189: {region: 0x4757, code: 0x112, from: 0xf9a7f, to: 0x0}, 190: {region: 0x4757, code: 0x6e, from: 0xf705c, to: 0xf9a7f}, 191: {region: 0x4757, code: 0x6d, from: 0xef421, to: 0xf705c}, 192: {region: 0x4759, code: 0x6f, from: 0xf5cba, to: 0x0}, 193: {region: 0x484b, code: 0x70, from: 0xece42, to: 0x0}, 194: {region: 0x484d, code: 0x13, from: 0xf5e50, to: 0x0}, 195: {region: 0x484e, code: 0x71, from: 0xf0c83, to: 0x0}, 196: {region: 0x4852, code: 0x73, from: 0xf94be, to: 0x0}, 197: {region: 0x4852, code: 0x72, from: 0xf8f97, to: 0xf9621}, 198: {region: 0x4852, code: 0x11f, from: 0xf8c21, to: 0xf8f97}, 199: {region: 0x4852, code: 0x11d, from: 0xf5c21, to: 0xf8c21}, 200: {region: 0x4854, code: 0x74, from: 0xea11a, to: 0x0}, 201: {region: 0x4854, code: 0xf9, from: 0xef621, to: 0x0}, 202: {region: 0x4855, code: 0x75, from: 0xf34f7, to: 0x0}, 203: {region: 0x4943, code: 0x5c, from: 0xf9e21, to: 0x0}, 204: {region: 0x4944, code: 0x76, from: 0xf5b8d, to: 0x0}, 205: {region: 0x4945, code: 0x5c, from: 0xf9e21, to: 0x0}, 206: {region: 0x4945, code: 0x77, from: 0xf0421, to: 0xfa449}, 207: {region: 0x4945, code: 0x61, from: 0xe1021, to: 0xf0421}, 208: {region: 0x494c, code: 0x7a, from: 0xf8324, to: 0x0}, 209: {region: 0x494c, code: 0x79, from: 0xf7856, to: 0xf8324}, 210: {region: 0x494c, code: 0x78, from: 0xf3910, to: 0xf7856}, 211: {region: 0x494d, code: 0x61, from: 0xe6023, to: 0x0}, 212: {region: 0x494e, code: 0x7b, from: 0xe5711, to: 0x0}, 213: {region: 0x494f, code: 0xf9, from: 0xf5b68, to: 0x0}, 214: {region: 0x4951, code: 0x7c, from: 0xf1693, to: 0x0}, 215: {region: 0x4951, code: 0x56, from: 0xf016b, to: 0xf1693}, 216: {region: 0x4951, code: 0x7b, from: 0xf016b, to: 0xf1693}, 217: {region: 0x4952, code: 0x7d, from: 0xf18ad, to: 0x0}, 218: {region: 0x4953, code: 0x7f, from: 0xf7a21, to: 0x0}, 219: {region: 0x4953, code: 0x7e, from: 0xefd81, to: 0xf7a21}, 220: {region: 0x4953, code: 0x50, from: 0xea2bb, to: 0xefd81}, 221: {region: 0x4954, code: 0x5c, from: 0xf9e21, to: 0x0}, 222: {region: 0x4954, code: 0x80, from: 0xe8d18, to: 0xfa45c}, 223: {region: 0x4a45, code: 0x61, from: 0xe5a21, to: 0x0}, 224: {region: 0x4a4d, code: 0x81, from: 0xf6328, to: 0x0}, 225: {region: 0x4a4f, code: 0x82, from: 0xf3ce1, to: 0x0}, 226: {region: 0x4a50, code: 0x83, from: 0xe9ec1, to: 0x0}, 227: {region: 0x4b45, code: 0x84, from: 0xf5d2e, to: 0x0}, 228: {region: 0x4b47, code: 0x85, from: 0xf92aa, to: 0x0}, 229: {region: 0x4b47, code: 0xd1, from: 0xf8f99, to: 0xf92aa}, 230: {region: 0x4b47, code: 0xe4, from: 0xf5221, to: 0xf8f99}, 231: {region: 0x4b48, code: 0x86, from: 0xf7874, to: 0x0}, 232: {region: 0x4b49, code: 0x13, from: 0xf5c4e, to: 0x0}, 233: {region: 0x4b4d, code: 0x87, from: 0xf6ee6, to: 0x0}, 234: {region: 0x4b4e, code: 0x10d, from: 0xf5b46, to: 0x0}, 235: {region: 0x4b50, code: 0x88, from: 0xf4e91, to: 0x0}, 236: {region: 0x4b52, code: 0x8b, from: 0xf54ca, to: 0x0}, 237: {region: 0x4b52, code: 0x89, from: 0xf424f, to: 0xf54ca}, 238: {region: 0x4b52, code: 0x8a, from: 0xf330f, to: 0xf424f}, 239: {region: 0x4b57, code: 0x8c, from: 0xf5281, to: 0x0}, 240: {region: 0x4b59, code: 0x8d, from: 0xf6621, to: 0x0}, 241: {region: 0x4b59, code: 0x81, from: 0xf6328, to: 0xf6621}, 242: {region: 0x4b5a, code: 0x8e, from: 0xf9365, to: 0x0}, 243: {region: 0x4c41, code: 0x8f, from: 0xf778a, to: 0x0}, 244: {region: 0x4c42, code: 0x90, from: 0xf3842, to: 0x0}, 245: {region: 0x4c43, code: 0x10d, from: 0xf5b46, to: 0x0}, 246: {region: 0x4c49, code: 0x3c, from: 0xf0241, to: 0x0}, 247: {region: 0x4c4b, code: 0x91, from: 0xf74b6, to: 0x0}, 248: {region: 0x4c52, code: 0x92, from: 0xf3021, to: 0x0}, 249: {region: 0x4c53, code: 0x122, from: 0xf524e, to: 0x0}, 250: {region: 0x4c53, code: 0x93, from: 0xf7836, to: 0x0}, 251: {region: 0x4c54, code: 0x5c, from: 0xfbe21, to: 0x0}, 252: {region: 0x4c54, code: 0x94, from: 0xf92d9, to: 0xfbd9f}, 253: {region: 0x4c54, code: 0x95, from: 0xf9141, to: 0xf92d9}, 254: {region: 0x4c54, code: 0xe4, from: 0xf5221, to: 0xf9141}, 255: {region: 0x4c55, code: 0x5c, from: 0xf9e21, to: 0x0}, 256: {region: 0x4c55, code: 0x97, from: 0xf3124, to: 0xfa45c}, 257: {region: 0x4c55, code: 0x8096, from: 0xf6421, to: 0xf8c65}, 258: {region: 0x4c55, code: 0x8098, from: 0xf6421, to: 0xf8c65}, 259: {region: 0x4c56, code: 0x5c, from: 0xfbc21, to: 0x0}, 260: {region: 0x4c56, code: 0x99, from: 0xf92dc, to: 0xfbb9f}, 261: {region: 0x4c56, code: 0x9a, from: 0xf90a7, to: 0xf9351}, 262: {region: 0x4c56, code: 0xe4, from: 0xf5221, to: 0xf90f4}, 263: {region: 0x4c59, code: 0x9b, from: 0xf6721, to: 0x0}, 264: {region: 0x4d41, code: 0x9c, from: 0xf4f51, to: 0x0}, 265: {region: 0x4d41, code: 0x9d, from: 0xeb221, to: 0xf4f51}, 266: {region: 0x4d43, code: 0x5c, from: 0xf9e21, to: 0x0}, 267: {region: 0x4d43, code: 0x60, from: 0xf5021, to: 0xfa451}, 268: {region: 0x4d43, code: 0x9e, from: 0xf5021, to: 0xfa451}, 269: {region: 0x4d44, code: 0xa0, from: 0xf937d, to: 0x0}, 270: {region: 0x4d44, code: 0x9f, from: 0xf90c1, to: 0xf937d}, 271: {region: 0x4d45, code: 0x5c, from: 0xfa421, to: 0x0}, 272: {region: 0x4d45, code: 0x4e, from: 0xf9f42, to: 0xfa4af}, 273: {region: 0x4d45, code: 0x11e, from: 0xf9438, to: 0xfa4af}, 274: {region: 0x4d46, code: 0x5c, from: 0xf9e21, to: 0x0}, 275: {region: 0x4d46, code: 0x60, from: 0xf5021, to: 0xfa451}, 276: {region: 0x4d47, code: 0xa1, from: 0xf7f61, to: 0x0}, 277: {region: 0x4d47, code: 0xa2, from: 0xf56e1, to: 0xfa99f}, 278: {region: 0x4d48, code: 0xf9, from: 0xf3021, to: 0x0}, 279: {region: 0x4d4b, code: 0xa3, from: 0xf92b4, to: 0x0}, 280: {region: 0x4d4b, code: 0xa4, from: 0xf909a, to: 0xf92b4}, 281: {region: 0x4d4c, code: 0x112, from: 0xf80c1, to: 0x0}, 282: {region: 0x4d4c, code: 0xa5, from: 0xf54e2, to: 0xf811f}, 283: {region: 0x4d4c, code: 0x112, from: 0xf4d78, to: 0xf54e2}, 284: {region: 0x4d4d, code: 0xa6, from: 0xf8ad2, to: 0x0}, 285: {region: 0x4d4d, code: 0x34, from: 0xf40e1, to: 0xf8ad2}, 286: {region: 0x4d4e, code: 0xa7, from: 0xef661, to: 0x0}, 287: {region: 0x4d4f, code: 0xa8, from: 0xeda21, to: 0x0}, 288: {region: 0x4d50, code: 0xf9, from: 0xf3021, to: 0x0}, 289: {region: 0x4d51, code: 0x5c, from: 0xf9e21, to: 0x0}, 290: {region: 0x4d51, code: 0x60, from: 0xf5021, to: 0xfa451}, 291: {region: 0x4d52, code: 0xa9, from: 0xf6add, to: 0x0}, 292: {region: 0x4d52, code: 0x112, from: 0xf4d7c, to: 0xf6add}, 293: {region: 0x4d53, code: 0x10d, from: 0xf5e5b, to: 0x0}, 294: {region: 0x4d54, code: 0x5c, from: 0xfb021, to: 0x0}, 295: {region: 0x4d54, code: 0xaa, from: 0xf60c7, to: 0xfb03f}, 296: {region: 0x4d54, code: 0xab, from: 0xef50d, to: 0xf60c7}, 297: {region: 0x4d55, code: 0xac, from: 0xf1c81, to: 0x0}, 298: {region: 0x4d56, code: 0xae, from: 0xf7ae1, to: 0x0}, 299: {region: 0x4d57, code: 0xaf, from: 0xf664f, to: 0x0}, 300: {region: 0x4d58, code: 0xb0, from: 0xf9221, to: 0x0}, 301: {region: 0x4d58, code: 0xb1, from: 0xe3c21, to: 0xf919f}, 302: {region: 0x4d58, code: 0x80b2, from: 0x0, to: 0x0}, 303: {region: 0x4d59, code: 0xb3, from: 0xf5730, to: 0x0}, 304: {region: 0x4d5a, code: 0xb6, from: 0xface1, to: 0x0}, 305: {region: 0x4d5a, code: 0xb5, from: 0xf78d0, to: 0xfad9f}, 306: {region: 0x4d5a, code: 0xb4, from: 0xf6ed9, to: 0xf78d0}, 307: {region: 0x4e41, code: 0xb7, from: 0xf9221, to: 0x0}, 308: {region: 0x4e41, code: 0x122, from: 0xf524e, to: 0x0}, 309: {region: 0x4e43, code: 0x114, from: 0xf8221, to: 0x0}, 310: {region: 0x4e45, code: 0x112, from: 0xf4d93, to: 0x0}, 311: {region: 0x4e46, code: 0x13, from: 0xf5c4e, to: 0x0}, 312: {region: 0x4e47, code: 0xb8, from: 0xf6a21, to: 0x0}, 313: {region: 0x4e49, code: 0xba, from: 0xf8e9e, to: 0x0}, 314: {region: 0x4e49, code: 0xb9, from: 0xf884f, to: 0xf8e9e}, 315: {region: 0x4e4c, code: 0x5c, from: 0xf9e21, to: 0x0}, 316: {region: 0x4e4c, code: 0xbb, from: 0xe2a21, to: 0xfa45c}, 317: {region: 0x4e4f, code: 0xbc, from: 0xee2c7, to: 0x0}, 318: {region: 0x4e4f, code: 0xd9, from: 0xea2bb, to: 0xee2c7}, 319: {region: 0x4e50, code: 0xbd, from: 0xf1a21, to: 0x0}, 320: {region: 0x4e50, code: 0x7b, from: 0xe9c21, to: 0xf5d51}, 321: {region: 0x4e52, code: 0x13, from: 0xf5c4e, to: 0x0}, 322: {region: 0x4e55, code: 0xbe, from: 0xf5eea, to: 0x0}, 323: {region: 0x4e5a, code: 0xbe, from: 0xf5eea, to: 0x0}, 324: {region: 0x4f4d, code: 0xbf, from: 0xf696b, to: 0x0}, 325: {region: 0x5041, code: 0xc0, from: 0xedf64, to: 0x0}, 326: {region: 0x5041, code: 0xf9, from: 0xedf72, to: 0x0}, 327: {region: 0x5045, code: 0xc2, from: 0xf8ee1, to: 0x0}, 328: {region: 0x5045, code: 0xc1, from: 0xf8241, to: 0xf8ee1}, 329: {region: 0x5045, code: 0xc3, from: 0xe8e4e, to: 0xf8241}, 330: {region: 0x5046, code: 0x114, from: 0xf339a, to: 0x0}, 331: {region: 0x5047, code: 0xc4, from: 0xf6f30, to: 0x0}, 332: {region: 0x5047, code: 0x13, from: 0xf5c4e, to: 0xf6f30}, 333: {region: 0x5048, code: 0xc5, from: 0xf34e4, to: 0x0}, 334: {region: 0x504b, code: 0xc6, from: 0xf3881, to: 0x0}, 335: {region: 0x504b, code: 0x7b, from: 0xe5711, to: 0xf370f}, 336: {region: 0x504c, code: 0xc7, from: 0xf9621, to: 0x0}, 337: {region: 0x504c, code: 0xc8, from: 0xf3d5c, to: 0xf959f}, 338: {region: 0x504d, code: 0x5c, from: 0xf9e21, to: 0x0}, 339: {region: 0x504d, code: 0x60, from: 0xf6995, to: 0xfa451}, 340: {region: 0x504e, code: 0xbe, from: 0xf622d, to: 0x0}, 341: {region: 0x5052, code: 0xf9, from: 0xed58a, to: 0x0}, 342: {region: 0x5052, code: 0x5a, from: 0xe1021, to: 0xed58a}, 343: {region: 0x5053, code: 0x7a, from: 0xf8324, to: 0x0}, 344: {region: 0x5053, code: 0x82, from: 0xf984c, to: 0x0}, 345: {region: 0x5053, code: 0x78, from: 0xf5ec1, to: 0xf7856}, 346: {region: 0x5053, code: 0x82, from: 0xf3ce1, to: 0xf5ec1}, 347: {region: 0x5054, code: 0x5c, from: 0xf9e21, to: 0x0}, 348: {region: 0x5054, code: 0xc9, from: 0xeeeb6, to: 0xfa45c}, 349: {region: 0x5057, code: 0xf9, from: 0xf3021, to: 0x0}, 350: {region: 0x5059, code: 0xca, from: 0xf2f61, to: 0x0}, 351: {region: 0x5141, code: 0xcb, from: 0xf6ab3, to: 0x0}, 352: {region: 0x5245, code: 0x5c, from: 0xf9e21, to: 0x0}, 353: {region: 0x5245, code: 0x60, from: 0xf6e21, to: 0xfa451}, 354: {region: 0x524f, code: 0xce, from: 0xfaae1, to: 0x0}, 355: {region: 0x524f, code: 0xcd, from: 0xf403c, to: 0xfad9f}, 356: {region: 0x5253, code: 0xcf, from: 0xfad59, to: 0x0}, 357: {region: 0x5253, code: 0x46, from: 0xfa4af, to: 0xfad59}, 358: {region: 0x5253, code: 0x11e, from: 0xf9438, to: 0xfa4af}, 359: {region: 0x5255, code: 0xd0, from: 0xf9e21, to: 0x0}, 360: {region: 0x5255, code: 0xd1, from: 0xf8f99, to: 0xf9d9f}, 361: {region: 0x5257, code: 0xd2, from: 0xf58b3, to: 0x0}, 362: {region: 0x5341, code: 0xd3, from: 0xf4156, to: 0x0}, 363: {region: 0x5342, code: 0xd4, from: 0xf7358, to: 0x0}, 364: {region: 0x5342, code: 0x13, from: 0xf5c4e, to: 0xf74de}, 365: {region: 0x5343, code: 0xd5, from: 0xedf61, to: 0x0}, 366: {region: 0x5344, code: 0xd7, from: 0xfae2a, to: 0x0}, 367: {region: 0x5344, code: 0xd6, from: 0xf90c8, to: 0xfaede}, 368: {region: 0x5344, code: 0xd8, from: 0xf4a88, to: 0xf9cc1}, 369: {region: 0x5344, code: 0x56, from: 0xec233, to: 0xf4c21}, 370: {region: 0x5344, code: 0x61, from: 0xec233, to: 0xf4c21}, 371: {region: 0x5345, code: 0xd9, from: 0xea2bb, to: 0x0}, 372: {region: 0x5347, code: 0xda, from: 0xf5ecc, to: 0x0}, 373: {region: 0x5347, code: 0xb3, from: 0xf5730, to: 0xf5ecc}, 374: {region: 0x5348, code: 0xdb, from: 0xefa4f, to: 0x0}, 375: {region: 0x5349, code: 0x5c, from: 0xfae21, to: 0x0}, 376: {region: 0x5349, code: 0xdc, from: 0xf9147, to: 0xfae2e}, 377: {region: 0x534a, code: 0xbc, from: 0xee2c7, to: 0x0}, 378: {region: 0x534b, code: 0x5c, from: 0xfb221, to: 0x0}, 379: {region: 0x534b, code: 0xdd, from: 0xf919f, to: 0xfb221}, 380: {region: 0x534b, code: 0x47, from: 0xf42c1, to: 0xf919f}, 381: {region: 0x534c, code: 0xde, from: 0xf5904, to: 0x0}, 382: {region: 0x534c, code: 0x61, from: 0xe217e, to: 0xf5c44}, 383: {region: 0x534d, code: 0x5c, from: 0xf9e21, to: 0x0}, 384: {region: 0x534d, code: 0x80, from: 0xe9397, to: 0xfa25c}, 385: {region: 0x534e, code: 0x112, from: 0xf4e84, to: 0x0}, 386: {region: 0x534f, code: 0xdf, from: 0xf50e1, to: 0x0}, 387: {region: 0x5352, code: 0xe0, from: 0xfa821, to: 0x0}, 388: {region: 0x5352, code: 0xe1, from: 0xf28aa, to: 0xfa79f}, 389: {region: 0x5352, code: 0xbb, from: 0xe2f74, to: 0xf28aa}, 390: {region: 0x5353, code: 0xe2, from: 0xfb6f2, to: 0x0}, 391: {region: 0x5353, code: 0xd7, from: 0xfae2a, to: 0xfb721}, 392: {region: 0x5354, code: 0xe3, from: 0xf7328, to: 0x0}, 393: {region: 0x5355, code: 0xe4, from: 0xf5221, to: 0xf8f99}, 394: {region: 0x5356, code: 0xf9, from: 0xfa221, to: 0x0}, 395: {region: 0x5356, code: 0xe5, from: 0xeff6b, to: 0xfa221}, 396: {region: 0x5358, code: 0x8, from: 0xfb54a, to: 0x0}, 397: {region: 0x5359, code: 0xe6, from: 0xf3821, to: 0x0}, 398: {region: 0x535a, code: 0xe7, from: 0xf6d26, to: 0x0}, 399: {region: 0x5441, code: 0x61, from: 0xf242c, to: 0x0}, 400: {region: 0x5443, code: 0xf9, from: 0xf6328, to: 0x0}, 401: {region: 0x5444, code: 0x106, from: 0xf9221, to: 0x0}, 402: {region: 0x5446, code: 0x5c, from: 0xf9e21, to: 0x0}, 403: {region: 0x5446, code: 0x60, from: 0xf4e21, to: 0xfa451}, 404: {region: 0x5447, code: 0x112, from: 0xf4d7c, to: 0x0}, 405: {region: 0x5448, code: 0xe8, from: 0xf108f, to: 0x0}, 406: {region: 0x544a, code: 0xea, from: 0xfa15a, to: 0x0}, 407: {region: 0x544a, code: 0xe9, from: 0xf96aa, to: 0xfa159}, 408: {region: 0x544a, code: 0xd1, from: 0xf8f99, to: 0xf96aa}, 409: {region: 0x544b, code: 0xbe, from: 0xf5eea, to: 0x0}, 410: {region: 0x544c, code: 0xf9, from: 0xf9f54, to: 0x0}, 411: {region: 0x544c, code: 0xef, from: 0xf4e22, to: 0xfa4b4}, 412: {region: 0x544c, code: 0x76, from: 0xf6f87, to: 0xfa4b4}, 413: {region: 0x544d, code: 0xec, from: 0xfb221, to: 0x0}, 414: {region: 0x544d, code: 0xeb, from: 0xf9361, to: 0xfb221}, 415: {region: 0x544d, code: 0xd1, from: 0xf8f99, to: 0xf9361}, 416: {region: 0x544d, code: 0xe4, from: 0xf5221, to: 0xf8f99}, 417: {region: 0x544e, code: 0xed, from: 0xf4d61, to: 0x0}, 418: {region: 0x544f, code: 0xee, from: 0xf5c4e, to: 0x0}, 419: {region: 0x5450, code: 0xef, from: 0xf4e22, to: 0xfa4b4}, 420: {region: 0x5450, code: 0x76, from: 0xf6f87, to: 0xfa4b4}, 421: {region: 0x5452, code: 0xf1, from: 0xfaa21, to: 0x0}, 422: {region: 0x5452, code: 0xf0, from: 0xf0561, to: 0xfab9f}, 423: {region: 0x5454, code: 0xf2, from: 0xf5821, to: 0x0}, 424: {region: 0x5456, code: 0x13, from: 0xf5c4e, to: 0x0}, 425: {region: 0x5457, code: 0xf3, from: 0xf3acf, to: 0x0}, 426: {region: 0x545a, code: 0xf4, from: 0xf5cce, to: 0x0}, 427: {region: 0x5541, code: 0xf5, from: 0xf9922, to: 0x0}, 428: {region: 0x5541, code: 0xf6, from: 0xf916d, to: 0xf9351}, 429: {region: 0x5541, code: 0xd1, from: 0xf8f99, to: 0xf916d}, 430: {region: 0x5541, code: 0xe4, from: 0xf5221, to: 0xf8f99}, 431: {region: 0x5547, code: 0xf8, from: 0xf86af, to: 0x0}, 432: {region: 0x5547, code: 0xf7, from: 0xf5d0f, to: 0xf86af}, 433: {region: 0x554d, code: 0xf9, from: 0xf3021, to: 0x0}, 434: {region: 0x5553, code: 0xf9, from: 0xe0021, to: 0x0}, 435: {region: 0x5553, code: 0x80fa, from: 0x0, to: 0x0}, 436: {region: 0x5553, code: 0x80fb, from: 0x0, to: 0xfbc61}, 437: {region: 0x5559, code: 0xfe, from: 0xf9261, to: 0x0}, 438: {region: 0x5559, code: 0xfd, from: 0xf6ee1, to: 0xf9261}, 439: {region: 0x5559, code: 0x80fc, from: 0x0, to: 0x0}, 440: {region: 0x555a, code: 0xff, from: 0xf94e1, to: 0x0}, 441: {region: 0x5641, code: 0x5c, from: 0xf9e21, to: 0x0}, 442: {region: 0x5641, code: 0x80, from: 0xe9d53, to: 0xfa45c}, 443: {region: 0x5643, code: 0x10d, from: 0xf5b46, to: 0x0}, 444: {region: 0x5645, code: 0x101, from: 0xfb021, to: 0x0}, 445: {region: 0x5645, code: 0x100, from: 0xe9eab, to: 0xfb0de}, 446: {region: 0x5647, code: 0xf9, from: 0xe5221, to: 0x0}, 447: {region: 0x5647, code: 0x61, from: 0xe5221, to: 0xf4e21}, 448: {region: 0x5649, code: 0xf9, from: 0xe5a21, to: 0x0}, 449: {region: 0x564e, code: 0x102, from: 0xf832e, to: 0x0}, 450: {region: 0x564e, code: 0x103, from: 0xf74a3, to: 0xf832e}, 451: {region: 0x5655, code: 0x104, from: 0xf7a21, to: 0x0}, 452: {region: 0x5746, code: 0x114, from: 0xf52fe, to: 0x0}, 453: {region: 0x5753, code: 0x105, from: 0xf5eea, to: 0x0}, 454: {region: 0x584b, code: 0x5c, from: 0xfa421, to: 0x0}, 455: {region: 0x584b, code: 0x4e, from: 0xf9f21, to: 0xfa469}, 456: {region: 0x584b, code: 0x11e, from: 0xf9438, to: 0xf9f3e}, 457: {region: 0x5944, code: 0x11b, from: 0xf5a81, to: 0xf9821}, 458: {region: 0x5945, code: 0x11c, from: 0xf8cb6, to: 0x0}, 459: {region: 0x5954, code: 0x5c, from: 0xf9e21, to: 0x0}, 460: {region: 0x5954, code: 0x60, from: 0xf7057, to: 0xfa451}, 461: {region: 0x5954, code: 0x87, from: 0xf6e21, to: 0xf7057}, 462: {region: 0x5955, code: 0x11e, from: 0xf9438, to: 0xfa4af}, 463: {region: 0x5955, code: 0x11f, from: 0xf8c21, to: 0xf90f8}, 464: {region: 0x5955, code: 0x11d, from: 0xf5c21, to: 0xf8c21}, 465: {region: 0x5a41, code: 0x122, from: 0xf524e, to: 0x0}, 466: {region: 0x5a41, code: 0x8121, from: 0xf8321, to: 0xf966d}, 467: {region: 0x5a4d, code: 0x124, from: 0xfba21, to: 0x0}, 468: {region: 0x5a4d, code: 0x123, from: 0xf6030, to: 0xfba21}, 469: {region: 0x5a52, code: 0x125, from: 0xf9361, to: 0xf9cff}, 470: {region: 0x5a52, code: 0x126, from: 0xf675b, to: 0xf9361}, 471: {region: 0x5a57, code: 0xf9, from: 0xfb28c, to: 0x0}, 472: {region: 0x5a57, code: 0x128, from: 0xfb242, to: 0xfb28c}, 473: {region: 0x5a57, code: 0x129, from: 0xfb101, to: 0xfb242}, 474: {region: 0x5a57, code: 0x127, from: 0xf7892, to: 0xfb101}, 475: {region: 0x5a57, code: 0xcc, from: 0xf6451, to: 0xf7892}, 476: {region: 0x5a5a, code: 0x8107, from: 0x0, to: 0x0}, 477: {region: 0x5a5a, code: 0x8108, from: 0x0, to: 0x0}, 478: {region: 0x5a5a, code: 0x8109, from: 0x0, to: 0x0}, 479: {region: 0x5a5a, code: 0x810a, from: 0x0, to: 0x0}, 480: {region: 0x5a5a, code: 0x810b, from: 0x0, to: 0x0}, 481: {region: 0x5a5a, code: 0x810c, from: 0x0, to: 0x0}, 482: {region: 0x5a5a, code: 0x810e, from: 0x0, to: 0x0}, 483: {region: 0x5a5a, code: 0x8110, from: 0xf1421, to: 0xfa681}, 484: {region: 0x5a5a, code: 0x8111, from: 0x0, to: 0xfbb7e}, 485: {region: 0x5a5a, code: 0x8113, from: 0x0, to: 0x0}, 486: {region: 0x5a5a, code: 0x8115, from: 0x0, to: 0x0}, 487: {region: 0x5a5a, code: 0x8116, from: 0x0, to: 0xf9f7e}, 488: {region: 0x5a5a, code: 0x8117, from: 0x0, to: 0x0}, 489: {region: 0x5a5a, code: 0x8118, from: 0x0, to: 0x0}, 490: {region: 0x5a5a, code: 0x8119, from: 0x0, to: 0x0}, 491: {region: 0x5a5a, code: 0x811a, from: 0x0, to: 0x0}, } // Size: 5928 bytes // symbols holds symbol data of the form <n> <str>, where n is the length of // the symbol string str. var symbols string = "" + // Size: 1460 bytes "\x00\x02Kz\x01$\x02A$\x02KM\x03৳\x02Bs\x02R$\x01P\x03р.\x03CA$\x04CN¥" + "\x02¥\x03₡\x03Kč\x02kr\x03E£\x03₧\x03€\x02£\x03₾\x02FG\x01Q\x03HK$\x01L" + "\x02kn\x02Ft\x02Rp\x03₪\x03₹\x04JP¥\x03៛\x02CF\x03₩\x03₸\x03₭\x03L£\x02R" + "s\x02Lt\x02Ls\x02Ar\x01K\x03₮\x03MX$\x02RM\x03₦\x02C$\x03NZ$\x03₱\x03zł" + "\x03₲\x03₽\x02RF\x02Db\x03฿\x02T$\x03₺\x03NT$\x03₴\x03US$\x03₫\x04FCFA" + "\x03EC$\x03CFA\x04CFPF\x01R\x02ZK\x05GH₵\x03AU$\x06ብር\x03***\x09د.إ." + "\u200f\x03AR$\x03BB$\x09د.ب.\u200f\x03BM$\x03BN$\x03BS$\x03BZ$\x03CL$" + "\x03CO$\x03CU$\x03DO$\x09د.ج.\u200f\x09ج.م.\u200f\x03FJ$\x04UK£\x03GY$" + "\x08ر.إن.\x09د.ع.\u200f\x06ر.إ.\x03JM$\x09د.أ.\u200f\x0cف.ج.ق.\u200f\x09" + "د.ك.\u200f\x03KY$\x09ل.ل.\u200f\x09د.ل.\u200f\x09د.م.\u200f\x09أ.م." + "\u200f\x09ر.ع.\u200f\x06ر.ب.\x09ر.ق.\u200f\x09ر.س.\u200f\x03SB$\x09د.س." + "\u200f\x06ج.س.\x03SR$\x09ج.ج.س.\x09ل.س.\u200f\x09د.ت.\u200f\x06ل.ت.\x03T" + "T$\x03UY$\x09ر.ي.\u200f\x03Fdj\x03Nfk\x01S\x04GB£\x03TSh\x03₼\x03S£\x04B" + "ds$\x03BD$\x02B$\x04CUC$\x03$MN\x03RD$\x04FK£\x02G$\x04Íkr\x02J$\x03CI$" + "\x02L$\x02N$\x07руб.\x03SI$\x02S$\x02$U\x05лв.\x06щ.д.\x02$A\x03$CA\x04£" + " E\x05£ RU\x04$ HK\x03£L\x04$ ZN\x03$ T\x04$ SU\x04din.\x04КМ\x04Кч\x04з" + "л\x07дин.\x04Тл\x01F\x03USh\x04Kčs\x03ECU\x02TK\x03kr.\x03Ksh\x03öS\x03" + "BGK\x03BGJ\x04Cub$\x02DM\x04Fl£\x04F.G.\x02FC\x04F.Rw\x03Nu.\x05KR₩\x05T" + "H฿\x06Δρχ\x02Tk\x02$b\x02Kr\x02Gs\x03CFP\x03FBu\x01D\x04MOP$\x02MK\x02SR" + "\x02Le\x04NAf.\x01E\x02VT\x03WS$\x03BsF\x02Af\x03Naf\x02$a\x04Afl.\x02Br" + "\x02TL\x03B/.\x03S/.\x03Gs.\x03Bs.\x02؋\x04¥CN\x03$HK\x08ریال\x03$MX\x03" + "$NZ\x03$EC\x02UM\x02mk\x03$AR\x03$AU\x02FB\x03$BM\x03$BN\x03$BS\x03$BZ" + "\x03$CL\x03$CO\x04£CY\x03£E\x03$FJ\x04£FK\x04£GB\x04£GI\x04£IE\x04£IL" + "\x05₤IT\x04£LB\x04£MT\x03$NA\x02$C\x03$RH\x02FR\x03$SB\x03$SG\x03$SR\x03" + "$TT\x03$US\x03$UY\x04FCFP\x02Kw\x05$\u00a0AU\x05$\u00a0HK\x05$\u00a0NZ" + "\x05$\u00a0SG\x05$\u00a0US\x02DA\x01G\x02LS\x02DT\x02$R\x04¥JP\x03$NT" + "\x07રૂ.\x06ל״י\x03₨\x02֏\x03NKr\x03元\x03¥\x03\u200b\x04БД\x05КД$\x02LE" + "\x02Kn\x06сом\x02zl\x02rb\x03MTn\x06ден\x12ဒေါ်လာ\x12စီအာစီ\x0cनेरू\x02ر" + "\x04Esc.\x06\u200bPTE\x04XXXX\x06ТМТ\x03Dkr\x03Skr\x03Nkr\x07රු.\x0fසිෆ්" + "එ\x03NIS\x05Lekë\x03den\x05[BGN]\x05[BYR]\x06руб\x02r.\x03rub\x03BR$" + "\x03Ekr\x04EG£\x03Ikr\x03Rs.\x04AUD$\x04NZD$\x07крб.\x05soʻm\x06сўм\x03₩" + "\x03ILS\x02P.\x03Zł" type curToIndex struct { cur uint16 idx uint16 } var normalLangIndex = []uint16{ // 748 elements // Entry 0 - 3F 0x0000, 0x0014, 0x0014, 0x0014, 0x0017, 0x0018, 0x0018, 0x0018, 0x0018, 0x0019, 0x0019, 0x001c, 0x001c, 0x0038, 0x0038, 0x0038, 0x0038, 0x0039, 0x0039, 0x0039, 0x0039, 0x003a, 0x003a, 0x003a, 0x003a, 0x003a, 0x003a, 0x003b, 0x003b, 0x003b, 0x003b, 0x003b, 0x003b, 0x003b, 0x003b, 0x003b, 0x003c, 0x003e, 0x003e, 0x003e, 0x003e, 0x003e, 0x003e, 0x003e, 0x003f, 0x003f, 0x0042, 0x0042, 0x0044, 0x0045, 0x0045, 0x0045, 0x0045, 0x0045, 0x0045, 0x004c, 0x004c, 0x004d, 0x004d, 0x004e, 0x004e, 0x005f, 0x005f, 0x005f, // Entry 40 - 7F 0x005f, 0x005f, 0x0061, 0x0061, 0x0061, 0x0062, 0x0062, 0x0063, 0x0071, 0x0071, 0x0071, 0x0071, 0x0082, 0x0088, 0x0088, 0x0088, 0x0088, 0x0091, 0x0091, 0x0091, 0x0092, 0x0092, 0x0093, 0x0093, 0x0094, 0x0094, 0x0095, 0x0095, 0x0095, 0x0095, 0x0095, 0x009c, 0x009c, 0x009d, 0x009d, 0x009f, 0x009f, 0x00a3, 0x00a3, 0x00a3, 0x00a4, 0x00a4, 0x00ac, 0x00ac, 0x00ac, 0x00ad, 0x00ad, 0x00ae, 0x00af, 0x00af, 0x00af, 0x00b4, 0x00b4, 0x00b4, 0x00b4, 0x00b4, 0x00b4, 0x00b4, 0x00ba, 0x00ba, 0x00bb, 0x00bb, 0x00be, 0x00be, // Entry 80 - BF 0x00be, 0x00c1, 0x00c1, 0x00c1, 0x00c3, 0x00c5, 0x00c5, 0x00c6, 0x00c7, 0x00c7, 0x00c7, 0x00dc, 0x00dd, 0x00dd, 0x00de, 0x00df, 0x00e0, 0x00e1, 0x00e2, 0x00e3, 0x00e4, 0x00e4, 0x00e5, 0x00e5, 0x00e6, 0x00e6, 0x00e6, 0x00e6, 0x00e7, 0x00e8, 0x00e9, 0x00e9, 0x00ea, 0x00ec, 0x00ec, 0x00ec, 0x00ed, 0x00ed, 0x00ee, 0x00f0, 0x00f1, 0x00f1, 0x00f2, 0x00f2, 0x00f2, 0x00f2, 0x00f2, 0x00f2, 0x00f2, 0x00f2, 0x00f3, 0x00f4, 0x00f5, 0x00f6, 0x00f7, 0x00f8, 0x00f9, 0x00fa, 0x00fb, 0x00fb, 0x00fc, 0x00fc, 0x00fd, 0x00fe, // Entry C0 - FF 0x00ff, 0x0100, 0x0101, 0x0102, 0x0103, 0x0104, 0x0104, 0x0105, 0x0106, 0x0107, 0x0108, 0x0109, 0x010a, 0x010b, 0x010b, 0x010b, 0x010c, 0x010d, 0x010e, 0x010e, 0x010f, 0x0110, 0x0112, 0x0112, 0x0113, 0x0115, 0x0116, 0x0117, 0x0117, 0x0118, 0x0119, 0x011a, 0x011b, 0x011c, 0x011d, 0x011d, 0x011d, 0x011e, 0x011e, 0x011e, 0x011f, 0x0120, 0x0121, 0x0122, 0x0122, 0x0122, 0x0122, 0x0134, 0x0139, 0x013b, 0x013c, 0x013d, 0x013f, 0x0141, 0x0142, 0x0144, 0x0146, 0x0146, 0x0147, 0x0147, 0x0148, 0x0149, 0x014a, 0x014a, // Entry 100 - 13F 0x0153, 0x0154, 0x0155, 0x0156, 0x0157, 0x0158, 0x0159, 0x015a, 0x015c, 0x015e, 0x015f, 0x0164, 0x0164, 0x0166, 0x0166, 0x0166, 0x0166, 0x0171, 0x0171, 0x0171, 0x0171, 0x0171, 0x0172, 0x0173, 0x0173, 0x0184, 0x0184, 0x0188, 0x0188, 0x0189, 0x018a, 0x018a, 0x01b0, 0x01b0, 0x01b0, 0x01b1, 0x01b1, 0x01b1, 0x01d1, 0x01d2, 0x01d2, 0x01d2, 0x01d2, 0x01d2, 0x01d2, 0x01d3, 0x01d4, 0x01d4, 0x01d4, 0x01d4, 0x01d5, 0x01d5, 0x01d5, 0x01d6, 0x01d7, 0x01d9, 0x01d9, 0x01d9, 0x01d9, 0x01da, 0x01da, 0x01da, 0x01db, 0x01dc, // Entry 140 - 17F 0x01dc, 0x01dc, 0x01dc, 0x01dc, 0x01dc, 0x01dd, 0x01de, 0x01de, 0x01df, 0x01df, 0x01df, 0x01e0, 0x01e1, 0x01e1, 0x01e1, 0x01e1, 0x01e1, 0x01e7, 0x01e7, 0x01ea, 0x01ea, 0x01ec, 0x01ec, 0x01f6, 0x01f6, 0x01f9, 0x01f9, 0x01f9, 0x01f9, 0x01fa, 0x01fa, 0x01fa, 0x01fb, 0x01fb, 0x01fb, 0x01fb, 0x01fc, 0x01fd, 0x01fd, 0x01fd, 0x01fe, 0x01fe, 0x0201, 0x0201, 0x0203, 0x0203, 0x0215, 0x0216, 0x0216, 0x021b, 0x021b, 0x022d, 0x022d, 0x0230, 0x0230, 0x0234, 0x0234, 0x0235, 0x0235, 0x0236, 0x0236, 0x0242, 0x0242, 0x0249, // Entry 180 - 1BF 0x0249, 0x0249, 0x0249, 0x0249, 0x024e, 0x024e, 0x024e, 0x024e, 0x024e, 0x024f, 0x024f, 0x024f, 0x0259, 0x0259, 0x025a, 0x025a, 0x025a, 0x025b, 0x025b, 0x025b, 0x025c, 0x025c, 0x025f, 0x025f, 0x025f, 0x025f, 0x0260, 0x0260, 0x0266, 0x0266, 0x0266, 0x0266, 0x0267, 0x0267, 0x0268, 0x0268, 0x026b, 0x026b, 0x026d, 0x026d, 0x026f, 0x026f, 0x026f, 0x026f, 0x026f, 0x026f, 0x026f, 0x0270, 0x0270, 0x0270, 0x0270, 0x0270, 0x0270, 0x0270, 0x0270, 0x0270, 0x027f, 0x027f, 0x0280, 0x0280, 0x0285, 0x0285, 0x0286, 0x0286, // Entry 1C0 - 1FF 0x0287, 0x0287, 0x0288, 0x0289, 0x0289, 0x0289, 0x0289, 0x028b, 0x028b, 0x028b, 0x028b, 0x028b, 0x029e, 0x029e, 0x029f, 0x029f, 0x02a0, 0x02a0, 0x02a1, 0x02a1, 0x02a6, 0x02a6, 0x02a7, 0x02a7, 0x02a8, 0x02a9, 0x02a9, 0x02aa, 0x02aa, 0x02ab, 0x02ab, 0x02ac, 0x02ac, 0x02ac, 0x02ac, 0x02b8, 0x02b8, 0x02bb, 0x02bb, 0x02be, 0x02be, 0x02c0, 0x02c0, 0x02c4, 0x02c5, 0x02c5, 0x02c6, 0x02c6, 0x02c6, 0x02c6, 0x02c6, 0x02c9, 0x02c9, 0x02ca, 0x02ca, 0x02ca, 0x02cb, 0x02cb, 0x02dd, 0x02dd, 0x02dd, 0x02dd, 0x02dd, 0x02df, // Entry 200 - 23F 0x02df, 0x02df, 0x02e5, 0x02e6, 0x02e6, 0x02e7, 0x02e8, 0x02e8, 0x02e9, 0x02ea, 0x02ea, 0x02ea, 0x02eb, 0x02eb, 0x02eb, 0x02eb, 0x02eb, 0x02eb, 0x02eb, 0x02eb, 0x02ed, 0x02ed, 0x02ed, 0x02ee, 0x02ee, 0x02ef, 0x02ef, 0x02f0, 0x02f0, 0x02f0, 0x02f2, 0x02f2, 0x02f4, 0x02f5, 0x02f6, 0x02f6, 0x02f6, 0x02f6, 0x02f6, 0x0305, 0x0305, 0x0305, 0x0305, 0x0306, 0x0306, 0x0309, 0x030a, 0x030a, 0x030a, 0x030c, 0x030c, 0x030c, 0x030d, 0x030e, 0x030f, 0x0310, 0x0311, 0x0311, 0x0312, 0x0314, 0x0316, 0x0316, 0x0316, 0x0316, // Entry 240 - 27F 0x0317, 0x0317, 0x0328, 0x0329, 0x0329, 0x032a, 0x032a, 0x0332, 0x0334, 0x0335, 0x0336, 0x0337, 0x0337, 0x0337, 0x0338, 0x0338, 0x0339, 0x0339, 0x033a, 0x033a, 0x033b, 0x033b, 0x033c, 0x033c, 0x033c, 0x0340, 0x0340, 0x0340, 0x0342, 0x0343, 0x0343, 0x0343, 0x0343, 0x0343, 0x0343, 0x0343, 0x0343, 0x0343, 0x0343, 0x0343, 0x0346, 0x0346, 0x0354, 0x0354, 0x0358, 0x0358, 0x0358, 0x0358, 0x0358, 0x0358, 0x0358, 0x0358, 0x0358, 0x0358, 0x0359, 0x035a, 0x035b, 0x035c, 0x035c, 0x035e, 0x035e, 0x035f, 0x035f, 0x0367, // Entry 280 - 2BF 0x0367, 0x0367, 0x0367, 0x0367, 0x0367, 0x036f, 0x036f, 0x036f, 0x036f, 0x036f, 0x036f, 0x036f, 0x036f, 0x0386, 0x0386, 0x0386, 0x0386, 0x0389, 0x038a, 0x038a, 0x038a, 0x038b, 0x038b, 0x038e, 0x038e, 0x038f, 0x0391, 0x0394, 0x0396, 0x0396, 0x0397, 0x0398, 0x0398, 0x039a, 0x039a, 0x039b, 0x039c, 0x039c, 0x039c, 0x039e, 0x039e, 0x039e, 0x03a1, 0x03a1, 0x03a6, 0x03a6, 0x03a6, 0x03a6, 0x03a6, 0x03a6, 0x03a6, 0x03a6, 0x03a8, 0x03a8, 0x03bb, 0x03bb, 0x03be, 0x03bf, 0x03bf, 0x03c0, 0x03c1, 0x03c1, 0x03c3, 0x03c3, // Entry 2C0 - 2FF 0x03c3, 0x03c3, 0x03c4, 0x03c5, 0x03c5, 0x03c5, 0x03c5, 0x03c5, 0x03c7, 0x03c7, 0x03c7, 0x03c7, 0x03c8, 0x03c8, 0x03c8, 0x03ca, 0x03ca, 0x03ca, 0x03ca, 0x03cb, 0x03cb, 0x03cb, 0x03cb, 0x03cb, 0x03cb, 0x03cc, 0x03cc, 0x03cc, 0x03d0, 0x03d0, 0x03d0, 0x03d0, 0x03d4, 0x03d4, 0x03d4, 0x03d5, 0x03d7, 0x03d9, 0x03dd, 0x03df, 0x03e0, 0x03e0, 0x03e2, 0x03e2, } // Size: 1520 bytes var normalSymIndex = []curToIndex{ // 994 elements 0: {cur: 0x13, idx: 0x6}, 1: {cur: 0x2e, idx: 0x13}, 2: {cur: 0x39, idx: 0x1c}, 3: {cur: 0x42, idx: 0x20}, 4: {cur: 0x5c, idx: 0x3b}, 5: {cur: 0x61, idx: 0x3f}, 6: {cur: 0x70, idx: 0x4b}, 7: {cur: 0x7a, idx: 0x5a}, 8: {cur: 0x7b, idx: 0x5e}, 9: {cur: 0x83, idx: 0x62}, 10: {cur: 0x8b, idx: 0x6e}, 11: {cur: 0xb0, idx: 0x90}, 12: {cur: 0xbe, idx: 0x9e}, 13: {cur: 0xf3, idx: 0xc3}, 14: {cur: 0xf9, idx: 0xcb}, 15: {cur: 0x102, idx: 0xcf}, 16: {cur: 0x106, idx: 0xd3}, 17: {cur: 0x10d, idx: 0xd8}, 18: {cur: 0x112, idx: 0xdc}, 19: {cur: 0x114, idx: 0xe0}, 20: {cur: 0xb0, idx: 0x0}, 21: {cur: 0xe8, idx: 0xb8}, 22: {cur: 0x122, idx: 0xe5}, 23: {cur: 0xb7, idx: 0x4}, 24: {cur: 0x65, idx: 0xea}, 25: {cur: 0x13, idx: 0xf0}, 26: {cur: 0x5b, idx: 0xf4}, 27: {cur: 0xe8, idx: 0xb8}, 28: {cur: 0x0, idx: 0xfb}, 29: {cur: 0x2, idx: 0xff}, 30: {cur: 0x13, idx: 0xf0}, 31: {cur: 0x23, idx: 0x111}, 32: {cur: 0x52, idx: 0x13b}, 33: {cur: 0x56, idx: 0x145}, 34: {cur: 0x76, idx: 0x15c}, 35: {cur: 0x7c, idx: 0x165}, 36: {cur: 0x7d, idx: 0x16f}, 37: {cur: 0x82, idx: 0x17a}, 38: {cur: 0x87, idx: 0x184}, 39: {cur: 0x8c, idx: 0x191}, 40: {cur: 0x90, idx: 0x19f}, 41: {cur: 0x9b, idx: 0x1a9}, 42: {cur: 0x9c, idx: 0x1b3}, 43: {cur: 0xa9, idx: 0x1bd}, 44: {cur: 0xbf, idx: 0x1c7}, 45: {cur: 0xc6, idx: 0x1d1}, 46: {cur: 0xcb, idx: 0x1d8}, 47: {cur: 0xd3, idx: 0x1e2}, 48: {cur: 0xd6, idx: 0x1f0}, 49: {cur: 0xd7, idx: 0x1fa}, 50: {cur: 0xe2, idx: 0x205}, 51: {cur: 0xe6, idx: 0x20f}, 52: {cur: 0xe8, idx: 0xb8}, 53: {cur: 0xed, idx: 0x219}, 54: {cur: 0xf1, idx: 0x223}, 55: {cur: 0x11c, idx: 0x232}, 56: {cur: 0x4f, idx: 0x23c}, 57: {cur: 0x57, idx: 0x240}, 58: {cur: 0xd7, idx: 0x0}, 59: {cur: 0xdf, idx: 0x244}, 60: {cur: 0x61, idx: 0x246}, 61: {cur: 0xe2, idx: 0x3f}, 62: {cur: 0xf4, idx: 0x24b}, 63: {cur: 0x83, idx: 0x25}, 64: {cur: 0xe8, idx: 0xb8}, 65: {cur: 0xf9, idx: 0x4}, 66: {cur: 0x16, idx: 0x24f}, 67: {cur: 0xe8, idx: 0xb8}, 68: {cur: 0x16, idx: 0x24f}, 69: {cur: 0x2e, idx: 0x0}, 70: {cur: 0x37, idx: 0x18}, 71: {cur: 0x39, idx: 0x0}, 72: {cur: 0x83, idx: 0x25}, 73: {cur: 0xbe, idx: 0x0}, 74: {cur: 0xd0, idx: 0xae}, 75: {cur: 0xf9, idx: 0x4}, 76: {cur: 0x124, idx: 0x8a}, 77: {cur: 0xf4, idx: 0x24b}, 78: {cur: 0x13, idx: 0x0}, 79: {cur: 0x21, idx: 0x29c}, 80: {cur: 0x2e, idx: 0x0}, 81: {cur: 0x39, idx: 0x0}, 82: {cur: 0x42, idx: 0x0}, 83: {cur: 0x61, idx: 0x0}, 84: {cur: 0x70, idx: 0x0}, 85: {cur: 0x7a, idx: 0x0}, 86: {cur: 0x7b, idx: 0x0}, 87: {cur: 0x83, idx: 0x0}, 88: {cur: 0x8b, idx: 0x0}, 89: {cur: 0xb0, idx: 0x0}, 90: {cur: 0xbe, idx: 0x0}, 91: {cur: 0xf3, idx: 0x0}, 92: {cur: 0xf9, idx: 0x2a2}, 93: {cur: 0x102, idx: 0x0}, 94: {cur: 0x10d, idx: 0x0}, 95: {cur: 0x1b, idx: 0xc}, 96: {cur: 0xe8, idx: 0xb8}, 97: {cur: 0x42, idx: 0x25}, 98: {cur: 0x42, idx: 0x20}, 99: {cur: 0x13, idx: 0x2a9}, 100: {cur: 0x2e, idx: 0x0}, 101: {cur: 0x39, idx: 0x2ac}, 102: {cur: 0x42, idx: 0x0}, 103: {cur: 0x61, idx: 0x2b5}, 104: {cur: 0x70, idx: 0x2bb}, 105: {cur: 0x7a, idx: 0x0}, 106: {cur: 0x83, idx: 0x0}, 107: {cur: 0x8b, idx: 0x0}, 108: {cur: 0xbe, idx: 0x2c4}, 109: {cur: 0xf3, idx: 0x0}, 110: {cur: 0xf9, idx: 0x2cd}, 111: {cur: 0x102, idx: 0x0}, 112: {cur: 0x10d, idx: 0x0}, 113: {cur: 0x13, idx: 0x0}, 114: {cur: 0x18, idx: 0x9}, 115: {cur: 0x2e, idx: 0x0}, 116: {cur: 0x39, idx: 0x0}, 117: {cur: 0x42, idx: 0x0}, 118: {cur: 0x61, idx: 0x0}, 119: {cur: 0x70, idx: 0x0}, 120: {cur: 0x73, idx: 0x51}, 121: {cur: 0x7a, idx: 0x0}, 122: {cur: 0x83, idx: 0x25}, 123: {cur: 0xb0, idx: 0x0}, 124: {cur: 0xbe, idx: 0x0}, 125: {cur: 0xcf, idx: 0x2d2}, 126: {cur: 0xe8, idx: 0xb8}, 127: {cur: 0xf9, idx: 0x0}, 128: {cur: 0x10d, idx: 0x0}, 129: {cur: 0x114, idx: 0x0}, 130: {cur: 0x18, idx: 0x2d7}, 131: {cur: 0x4c, idx: 0x2dc}, 132: {cur: 0x83, idx: 0x25}, 133: {cur: 0xc7, idx: 0x2e1}, 134: {cur: 0xcf, idx: 0x2e6}, 135: {cur: 0xf1, idx: 0x2ee}, 136: {cur: 0x13, idx: 0xf0}, 137: {cur: 0x2e, idx: 0x0}, 138: {cur: 0x39, idx: 0x0}, 139: {cur: 0x42, idx: 0x25}, 140: {cur: 0x5a, idx: 0x37}, 141: {cur: 0xb0, idx: 0x0}, 142: {cur: 0xe8, idx: 0xb8}, 143: {cur: 0xf9, idx: 0x0}, 144: {cur: 0x10d, idx: 0x0}, 145: {cur: 0x60, idx: 0x2f3}, 146: {cur: 0xd0, idx: 0xae}, 147: {cur: 0xf8, idx: 0x2f5}, 148: {cur: 0xf9, idx: 0x4}, 149: {cur: 0x13, idx: 0xf0}, 150: {cur: 0x47, idx: 0x2f9}, 151: {cur: 0x4c, idx: 0x2c}, 152: {cur: 0x7a, idx: 0x0}, 153: {cur: 0x7b, idx: 0x0}, 154: {cur: 0x102, idx: 0x0}, 155: {cur: 0x10f, idx: 0x2fe}, 156: {cur: 0xd0, idx: 0xae}, 157: {cur: 0x8b, idx: 0x0}, 158: {cur: 0xe8, idx: 0xb8}, 159: {cur: 0x13, idx: 0xf0}, 160: {cur: 0x50, idx: 0x305}, 161: {cur: 0xe8, idx: 0xb8}, 162: {cur: 0xf9, idx: 0x4}, 163: {cur: 0x84, idx: 0x309}, 164: {cur: 0x12, idx: 0x30d}, 165: {cur: 0x13, idx: 0xf0}, 166: {cur: 0x20, idx: 0x311}, 167: {cur: 0x22, idx: 0x315}, 168: {cur: 0x4e, idx: 0x31e}, 169: {cur: 0x83, idx: 0x25}, 170: {cur: 0xe8, idx: 0xb8}, 171: {cur: 0xf9, idx: 0x4}, 172: {cur: 0x5c, idx: 0x0}, 173: {cur: 0x5c, idx: 0x0}, 174: {cur: 0x97, idx: 0x2f3}, 175: {cur: 0x13, idx: 0x0}, 176: {cur: 0x83, idx: 0x25}, 177: {cur: 0xc7, idx: 0xa6}, 178: {cur: 0xe8, idx: 0xb8}, 179: {cur: 0xf9, idx: 0x4}, 180: {cur: 0x13, idx: 0xf0}, 181: {cur: 0x33, idx: 0x333}, 182: {cur: 0x7a, idx: 0x0}, 183: {cur: 0x8b, idx: 0x337}, 184: {cur: 0xe8, idx: 0x33d}, 185: {cur: 0x106, idx: 0x0}, 186: {cur: 0x84, idx: 0x309}, 187: {cur: 0x13, idx: 0xf0}, 188: {cur: 0x65, idx: 0xea}, 189: {cur: 0xe8, idx: 0xb8}, 190: {cur: 0x6b, idx: 0x343}, 191: {cur: 0xe8, idx: 0xb8}, 192: {cur: 0xf9, idx: 0x4}, 193: {cur: 0x83, idx: 0x25}, 194: {cur: 0xf9, idx: 0x4}, 195: {cur: 0x83, idx: 0x62}, 196: {cur: 0xf9, idx: 0xcb}, 197: {cur: 0x10d, idx: 0x4}, 198: {cur: 0x10d, idx: 0x4}, 199: {cur: 0x13, idx: 0x4}, 200: {cur: 0x2e, idx: 0x0}, 201: {cur: 0x39, idx: 0x0}, 202: {cur: 0x42, idx: 0x0}, 203: {cur: 0x5c, idx: 0x0}, 204: {cur: 0x61, idx: 0x0}, 205: {cur: 0x70, idx: 0x0}, 206: {cur: 0x7a, idx: 0x0}, 207: {cur: 0x7b, idx: 0x0}, 208: {cur: 0x83, idx: 0x0}, 209: {cur: 0x8b, idx: 0x0}, 210: {cur: 0xb0, idx: 0x0}, 211: {cur: 0xbe, idx: 0x0}, 212: {cur: 0xd5, idx: 0x7e}, 213: {cur: 0xf3, idx: 0x0}, 214: {cur: 0xf9, idx: 0x0}, 215: {cur: 0x102, idx: 0x0}, 216: {cur: 0x106, idx: 0x0}, 217: {cur: 0x10d, idx: 0x0}, 218: {cur: 0x112, idx: 0x0}, 219: {cur: 0x114, idx: 0x356}, 220: {cur: 0x1a, idx: 0x4}, 221: {cur: 0x24, idx: 0x35a}, 222: {cur: 0x25, idx: 0x4}, 223: {cur: 0x32, idx: 0x4}, 224: {cur: 0x35, idx: 0x16}, 225: {cur: 0x38, idx: 0x4}, 226: {cur: 0x39, idx: 0x4}, 227: {cur: 0x13, idx: 0x4}, 228: {cur: 0xbe, idx: 0x4}, 229: {cur: 0x13, idx: 0x4}, 230: {cur: 0x50, idx: 0x305}, 231: {cur: 0x10d, idx: 0x4}, 232: {cur: 0x57, idx: 0x240}, 233: {cur: 0x5e, idx: 0x4}, 234: {cur: 0x5f, idx: 0x3f}, 235: {cur: 0x61, idx: 0x246}, 236: {cur: 0x10d, idx: 0x4}, 237: {cur: 0x65, idx: 0xea}, 238: {cur: 0x61, idx: 0x246}, 239: {cur: 0x66, idx: 0x3f}, 240: {cur: 0x67, idx: 0x35e}, 241: {cur: 0x6f, idx: 0x4}, 242: {cur: 0x81, idx: 0x4}, 243: {cur: 0x84, idx: 0x309}, 244: {cur: 0x13, idx: 0x4}, 245: {cur: 0x10d, idx: 0x4}, 246: {cur: 0x8d, idx: 0x4}, 247: {cur: 0x10d, idx: 0x4}, 248: {cur: 0x92, idx: 0x4}, 249: {cur: 0x122, idx: 0xe5}, 250: {cur: 0xa1, idx: 0x87}, 251: {cur: 0xa8, idx: 0x360}, 252: {cur: 0x10d, idx: 0x4}, 253: {cur: 0x61, idx: 0x246}, 254: {cur: 0xac, idx: 0x7e}, 255: {cur: 0xaf, idx: 0x365}, 256: {cur: 0xb3, idx: 0x94}, 257: {cur: 0xb7, idx: 0x4}, 258: {cur: 0x13, idx: 0x4}, 259: {cur: 0xb8, idx: 0x97}, 260: {cur: 0x13, idx: 0x4}, 261: {cur: 0xbe, idx: 0x4}, 262: {cur: 0xbe, idx: 0x4}, 263: {cur: 0xc4, idx: 0x8a}, 264: {cur: 0xc5, idx: 0xa2}, 265: {cur: 0xc6, idx: 0x7e}, 266: {cur: 0xbe, idx: 0x4}, 267: {cur: 0xd2, idx: 0xb2}, 268: {cur: 0xd4, idx: 0x4}, 269: {cur: 0xd5, idx: 0x368}, 270: {cur: 0xd9, idx: 0x30}, 271: {cur: 0xda, idx: 0x4}, 272: {cur: 0x61, idx: 0x246}, 273: {cur: 0xdb, idx: 0x3f}, 274: {cur: 0xde, idx: 0x36b}, 275: {cur: 0x61, idx: 0x246}, 276: {cur: 0xe2, idx: 0x3f}, 277: {cur: 0x8, idx: 0x36e}, 278: {cur: 0xe7, idx: 0x373}, 279: {cur: 0xbe, idx: 0x4}, 280: {cur: 0xee, idx: 0xbc}, 281: {cur: 0xf2, idx: 0x4}, 282: {cur: 0x13, idx: 0x4}, 283: {cur: 0xf4, idx: 0x24b}, 284: {cur: 0xf8, idx: 0x2f5}, 285: {cur: 0x10d, idx: 0x4}, 286: {cur: 0x104, idx: 0x375}, 287: {cur: 0x105, idx: 0x378}, 288: {cur: 0x122, idx: 0xe5}, 289: {cur: 0x124, idx: 0x8a}, 290: {cur: 0x13, idx: 0x0}, 291: {cur: 0x2e, idx: 0x0}, 292: {cur: 0x42, idx: 0x0}, 293: {cur: 0x5a, idx: 0x37}, 294: {cur: 0x61, idx: 0x0}, 295: {cur: 0x70, idx: 0x0}, 296: {cur: 0x7a, idx: 0x0}, 297: {cur: 0x7b, idx: 0x0}, 298: {cur: 0x83, idx: 0x0}, 299: {cur: 0x8b, idx: 0x0}, 300: {cur: 0xb0, idx: 0x0}, 301: {cur: 0xbe, idx: 0x0}, 302: {cur: 0xe8, idx: 0xb8}, 303: {cur: 0xf3, idx: 0x0}, 304: {cur: 0xf9, idx: 0x4}, 305: {cur: 0x106, idx: 0x0}, 306: {cur: 0x10d, idx: 0x0}, 307: {cur: 0x112, idx: 0x0}, 308: {cur: 0x39, idx: 0x0}, 309: {cur: 0x5c, idx: 0x0}, 310: {cur: 0xe8, idx: 0x0}, 311: {cur: 0xf9, idx: 0x0}, 312: {cur: 0x102, idx: 0x0}, 313: {cur: 0x11, idx: 0x4}, 314: {cur: 0xf9, idx: 0xcb}, 315: {cur: 0x27, idx: 0x10}, 316: {cur: 0x2e, idx: 0x13}, 317: {cur: 0x40, idx: 0x4}, 318: {cur: 0xf9, idx: 0xcb}, 319: {cur: 0x43, idx: 0x4}, 320: {cur: 0xf9, idx: 0xcb}, 321: {cur: 0x45, idx: 0x28}, 322: {cur: 0x49, idx: 0x4}, 323: {cur: 0xf9, idx: 0xcb}, 324: {cur: 0x51, idx: 0x26c}, 325: {cur: 0xf9, idx: 0xcb}, 326: {cur: 0xf9, idx: 0x4}, 327: {cur: 0x106, idx: 0xd3}, 328: {cur: 0x6c, idx: 0x49}, 329: {cur: 0x71, idx: 0x4f}, 330: {cur: 0x4, idx: 0x380}, 331: {cur: 0x8, idx: 0x383}, 332: {cur: 0x9, idx: 0x1}, 333: {cur: 0x11, idx: 0x387}, 334: {cur: 0x13, idx: 0xf0}, 335: {cur: 0x14, idx: 0x38a}, 336: {cur: 0x42, idx: 0x20}, 337: {cur: 0xb0, idx: 0x4}, 338: {cur: 0x114, idx: 0x0}, 339: {cur: 0xba, idx: 0x9b}, 340: {cur: 0xc0, idx: 0x395}, 341: {cur: 0xc2, idx: 0x399}, 342: {cur: 0xc5, idx: 0xa2}, 343: {cur: 0xf9, idx: 0x4}, 344: {cur: 0xca, idx: 0x39d}, 345: {cur: 0xf9, idx: 0x4}, 346: {cur: 0x83, idx: 0x25}, 347: {cur: 0xf9, idx: 0x4}, 348: {cur: 0xf9, idx: 0xcb}, 349: {cur: 0xfe, idx: 0x4}, 350: {cur: 0x101, idx: 0x3a1}, 351: {cur: 0x13, idx: 0xf0}, 352: {cur: 0x55, idx: 0x30}, 353: {cur: 0x83, idx: 0x25}, 354: {cur: 0xe8, idx: 0xb8}, 355: {cur: 0xf9, idx: 0x4}, 356: {cur: 0x5a, idx: 0x37}, 357: {cur: 0xe8, idx: 0xb8}, 358: {cur: 0x4, idx: 0x3a5}, 359: {cur: 0x39, idx: 0x2ac}, 360: {cur: 0x42, idx: 0x3a8}, 361: {cur: 0x70, idx: 0x3ad}, 362: {cur: 0x7d, idx: 0x3b1}, 363: {cur: 0x83, idx: 0x25}, 364: {cur: 0xb0, idx: 0x3ba}, 365: {cur: 0xbe, idx: 0x3be}, 366: {cur: 0xe8, idx: 0xb8}, 367: {cur: 0xf9, idx: 0x4}, 368: {cur: 0x10d, idx: 0x3c2}, 369: {cur: 0x68, idx: 0x46}, 370: {cur: 0xa9, idx: 0x3c6}, 371: {cur: 0x13, idx: 0x0}, 372: {cur: 0x2e, idx: 0x0}, 373: {cur: 0x39, idx: 0x0}, 374: {cur: 0x42, idx: 0x0}, 375: {cur: 0x5d, idx: 0x3c9}, 376: {cur: 0x70, idx: 0x0}, 377: {cur: 0x7a, idx: 0x0}, 378: {cur: 0x7b, idx: 0x0}, 379: {cur: 0x83, idx: 0x25}, 380: {cur: 0x8b, idx: 0x0}, 381: {cur: 0xb0, idx: 0x0}, 382: {cur: 0xbe, idx: 0x0}, 383: {cur: 0xf3, idx: 0x0}, 384: {cur: 0xf9, idx: 0x4}, 385: {cur: 0x102, idx: 0x0}, 386: {cur: 0x10d, idx: 0x0}, 387: {cur: 0x114, idx: 0x0}, 388: {cur: 0x83, idx: 0x25}, 389: {cur: 0xc5, idx: 0xa2}, 390: {cur: 0xe8, idx: 0xb8}, 391: {cur: 0xf9, idx: 0x4}, 392: {cur: 0x50, idx: 0x30}, 393: {cur: 0x50, idx: 0x305}, 394: {cur: 0x11, idx: 0x3cc}, 395: {cur: 0x13, idx: 0x3d0}, 396: {cur: 0x1d, idx: 0x3d4}, 397: {cur: 0x25, idx: 0x3d7}, 398: {cur: 0x26, idx: 0x3db}, 399: {cur: 0x32, idx: 0x3df}, 400: {cur: 0x38, idx: 0x3e3}, 401: {cur: 0x39, idx: 0x2ac}, 402: {cur: 0x40, idx: 0x3e7}, 403: {cur: 0x42, idx: 0x0}, 404: {cur: 0x43, idx: 0x3eb}, 405: {cur: 0x4b, idx: 0x3ef}, 406: {cur: 0x5e, idx: 0x3f8}, 407: {cur: 0x5f, idx: 0x3fc}, 408: {cur: 0x60, idx: 0x2f3}, 409: {cur: 0x61, idx: 0x401}, 410: {cur: 0x66, idx: 0x406}, 411: {cur: 0x70, idx: 0x0}, 412: {cur: 0x77, idx: 0x40b}, 413: {cur: 0x78, idx: 0x410}, 414: {cur: 0x80, idx: 0x415}, 415: {cur: 0x83, idx: 0x0}, 416: {cur: 0x90, idx: 0x41b}, 417: {cur: 0xab, idx: 0x420}, 418: {cur: 0xb0, idx: 0x3ba}, 419: {cur: 0xb7, idx: 0x425}, 420: {cur: 0xbe, idx: 0x3be}, 421: {cur: 0xcc, idx: 0x42c}, 422: {cur: 0xd4, idx: 0x433}, 423: {cur: 0xda, idx: 0x437}, 424: {cur: 0xe0, idx: 0x43b}, 425: {cur: 0xf2, idx: 0x43f}, 426: {cur: 0xf3, idx: 0x0}, 427: {cur: 0xf9, idx: 0x443}, 428: {cur: 0xfe, idx: 0x447}, 429: {cur: 0x105, idx: 0x378}, 430: {cur: 0x10d, idx: 0x0}, 431: {cur: 0x114, idx: 0x44b}, 432: {cur: 0x24, idx: 0x35a}, 433: {cur: 0x11, idx: 0x0}, 434: {cur: 0x13, idx: 0x453}, 435: {cur: 0x25, idx: 0x0}, 436: {cur: 0x26, idx: 0x0}, 437: {cur: 0x32, idx: 0x0}, 438: {cur: 0x38, idx: 0x0}, 439: {cur: 0x39, idx: 0x4}, 440: {cur: 0x40, idx: 0x0}, 441: {cur: 0x42, idx: 0x20}, 442: {cur: 0x43, idx: 0x0}, 443: {cur: 0x5e, idx: 0x0}, 444: {cur: 0x5f, idx: 0x0}, 445: {cur: 0x61, idx: 0x3f}, 446: {cur: 0x66, idx: 0x0}, 447: {cur: 0x70, idx: 0x459}, 448: {cur: 0x7a, idx: 0x0}, 449: {cur: 0x83, idx: 0x25}, 450: {cur: 0x8b, idx: 0x0}, 451: {cur: 0x90, idx: 0x0}, 452: {cur: 0xb0, idx: 0x0}, 453: {cur: 0xb7, idx: 0x0}, 454: {cur: 0xbe, idx: 0x45f}, 455: {cur: 0xd4, idx: 0x0}, 456: {cur: 0xda, idx: 0x465}, 457: {cur: 0xe0, idx: 0x0}, 458: {cur: 0xf2, idx: 0x0}, 459: {cur: 0xf9, idx: 0x46b}, 460: {cur: 0xfe, idx: 0x0}, 461: {cur: 0x102, idx: 0x0}, 462: {cur: 0x106, idx: 0x0}, 463: {cur: 0x112, idx: 0x0}, 464: {cur: 0x114, idx: 0x0}, 465: {cur: 0x3a, idx: 0x32b}, 466: {cur: 0x4f, idx: 0x23c}, 467: {cur: 0x52, idx: 0x471}, 468: {cur: 0x68, idx: 0x46}, 469: {cur: 0x74, idx: 0x474}, 470: {cur: 0x87, idx: 0x6b}, 471: {cur: 0x60, idx: 0x0}, 472: {cur: 0x97, idx: 0x2f3}, 473: {cur: 0xa1, idx: 0x87}, 474: {cur: 0xa9, idx: 0x3c6}, 475: {cur: 0xac, idx: 0x7e}, 476: {cur: 0xd2, idx: 0xb2}, 477: {cur: 0xd5, idx: 0x368}, 478: {cur: 0xe6, idx: 0x476}, 479: {cur: 0xed, idx: 0x479}, 480: {cur: 0x104, idx: 0x375}, 481: {cur: 0x13, idx: 0xf0}, 482: {cur: 0x39, idx: 0x9b}, 483: {cur: 0x5e, idx: 0x14f}, 484: {cur: 0xd4, idx: 0x292}, 485: {cur: 0xe8, idx: 0xb8}, 486: {cur: 0x114, idx: 0x0}, 487: {cur: 0x83, idx: 0x25}, 488: {cur: 0xe8, idx: 0xb8}, 489: {cur: 0xf9, idx: 0x4}, 490: {cur: 0xe8, idx: 0xb8}, 491: {cur: 0xf9, idx: 0x4}, 492: {cur: 0x13, idx: 0x2a9}, 493: {cur: 0x2e, idx: 0x47c}, 494: {cur: 0x39, idx: 0x2ac}, 495: {cur: 0x5a, idx: 0x37}, 496: {cur: 0x70, idx: 0x3ad}, 497: {cur: 0x83, idx: 0x47f}, 498: {cur: 0xb0, idx: 0x3ba}, 499: {cur: 0xe8, idx: 0xb8}, 500: {cur: 0xf3, idx: 0x484}, 501: {cur: 0xf9, idx: 0x4}, 502: {cur: 0x12, idx: 0x30d}, 503: {cur: 0x83, idx: 0x25}, 504: {cur: 0xf9, idx: 0x4}, 505: {cur: 0xe8, idx: 0xb8}, 506: {cur: 0x84, idx: 0x309}, 507: {cur: 0xb8, idx: 0x97}, 508: {cur: 0x65, idx: 0xea}, 509: {cur: 0xf9, idx: 0x4}, 510: {cur: 0x78, idx: 0x490}, 511: {cur: 0xe8, idx: 0xb8}, 512: {cur: 0xf9, idx: 0x4}, 513: {cur: 0xe8, idx: 0xb8}, 514: {cur: 0xf9, idx: 0x4}, 515: {cur: 0x13, idx: 0x0}, 516: {cur: 0x2e, idx: 0x0}, 517: {cur: 0x39, idx: 0x0}, 518: {cur: 0x42, idx: 0x0}, 519: {cur: 0x5c, idx: 0x0}, 520: {cur: 0x61, idx: 0x0}, 521: {cur: 0x70, idx: 0x0}, 522: {cur: 0x7a, idx: 0x0}, 523: {cur: 0x7b, idx: 0x0}, 524: {cur: 0x83, idx: 0x0}, 525: {cur: 0x8b, idx: 0x0}, 526: {cur: 0xb0, idx: 0x0}, 527: {cur: 0xbe, idx: 0x0}, 528: {cur: 0xf3, idx: 0x0}, 529: {cur: 0xf9, idx: 0x0}, 530: {cur: 0x102, idx: 0x0}, 531: {cur: 0x10d, idx: 0x0}, 532: {cur: 0x114, idx: 0x0}, 533: {cur: 0x18, idx: 0x9}, 534: {cur: 0x13, idx: 0x0}, 535: {cur: 0x83, idx: 0x25}, 536: {cur: 0xc7, idx: 0xa6}, 537: {cur: 0xe8, idx: 0xb8}, 538: {cur: 0xf9, idx: 0x4}, 539: {cur: 0x13, idx: 0x0}, 540: {cur: 0x2e, idx: 0x0}, 541: {cur: 0x39, idx: 0x0}, 542: {cur: 0x42, idx: 0x0}, 543: {cur: 0x5c, idx: 0x0}, 544: {cur: 0x61, idx: 0x0}, 545: {cur: 0x70, idx: 0x0}, 546: {cur: 0x75, idx: 0x54}, 547: {cur: 0x7a, idx: 0x0}, 548: {cur: 0x7b, idx: 0x0}, 549: {cur: 0x83, idx: 0x25}, 550: {cur: 0x8b, idx: 0x0}, 551: {cur: 0xb0, idx: 0x0}, 552: {cur: 0xbe, idx: 0x0}, 553: {cur: 0xf3, idx: 0x0}, 554: {cur: 0xf9, idx: 0x0}, 555: {cur: 0x102, idx: 0x0}, 556: {cur: 0x10d, idx: 0x0}, 557: {cur: 0x7, idx: 0x49b}, 558: {cur: 0xe8, idx: 0xb8}, 559: {cur: 0xf9, idx: 0x4}, 560: {cur: 0x13, idx: 0xf0}, 561: {cur: 0x76, idx: 0x57}, 562: {cur: 0x7b, idx: 0x7e}, 563: {cur: 0xe8, idx: 0xb8}, 564: {cur: 0xb8, idx: 0x97}, 565: {cur: 0x42, idx: 0x25}, 566: {cur: 0x13, idx: 0x0}, 567: {cur: 0x2e, idx: 0x0}, 568: {cur: 0x39, idx: 0x0}, 569: {cur: 0x5c, idx: 0x0}, 570: {cur: 0x61, idx: 0x0}, 571: {cur: 0x7b, idx: 0x0}, 572: {cur: 0x8b, idx: 0x0}, 573: {cur: 0xb0, idx: 0x0}, 574: {cur: 0xbe, idx: 0x0}, 575: {cur: 0xf3, idx: 0x0}, 576: {cur: 0xf9, idx: 0x0}, 577: {cur: 0x102, idx: 0x0}, 578: {cur: 0x2e, idx: 0x0}, 579: {cur: 0x70, idx: 0x0}, 580: {cur: 0x83, idx: 0x0}, 581: {cur: 0x8b, idx: 0x0}, 582: {cur: 0xb0, idx: 0x0}, 583: {cur: 0xe8, idx: 0xb8}, 584: {cur: 0xf3, idx: 0x0}, 585: {cur: 0x13, idx: 0xf0}, 586: {cur: 0x42, idx: 0x4a2}, 587: {cur: 0x83, idx: 0x4a6}, 588: {cur: 0xe8, idx: 0xb8}, 589: {cur: 0xf9, idx: 0x4}, 590: {cur: 0xf4, idx: 0x24b}, 591: {cur: 0x13, idx: 0x0}, 592: {cur: 0x42, idx: 0x0}, 593: {cur: 0x63, idx: 0x42}, 594: {cur: 0x70, idx: 0x0}, 595: {cur: 0x7a, idx: 0x0}, 596: {cur: 0x7b, idx: 0x0}, 597: {cur: 0x83, idx: 0x0}, 598: {cur: 0x8b, idx: 0x0}, 599: {cur: 0xbe, idx: 0x0}, 600: {cur: 0x102, idx: 0x0}, 601: {cur: 0x52, idx: 0x471}, 602: {cur: 0x84, idx: 0x309}, 603: {cur: 0xf4, idx: 0x24b}, 604: {cur: 0x13, idx: 0xf0}, 605: {cur: 0x4a, idx: 0x4aa}, 606: {cur: 0xe8, idx: 0xb8}, 607: {cur: 0x84, idx: 0x309}, 608: {cur: 0x25, idx: 0x4ae}, 609: {cur: 0x39, idx: 0x4b3}, 610: {cur: 0x8e, idx: 0x72}, 611: {cur: 0xd0, idx: 0xae}, 612: {cur: 0xe8, idx: 0xb8}, 613: {cur: 0xf9, idx: 0x4}, 614: {cur: 0x50, idx: 0x305}, 615: {cur: 0x84, idx: 0x309}, 616: {cur: 0x86, idx: 0x67}, 617: {cur: 0xe8, idx: 0xb8}, 618: {cur: 0xf9, idx: 0x4}, 619: {cur: 0xe8, idx: 0xb8}, 620: {cur: 0xf9, idx: 0x4}, 621: {cur: 0x13, idx: 0xf0}, 622: {cur: 0xe8, idx: 0xb8}, 623: {cur: 0xf4, idx: 0x24b}, 624: {cur: 0x13, idx: 0x0}, 625: {cur: 0x2e, idx: 0x0}, 626: {cur: 0x39, idx: 0x0}, 627: {cur: 0x61, idx: 0x0}, 628: {cur: 0x70, idx: 0x0}, 629: {cur: 0x7a, idx: 0x0}, 630: {cur: 0x7b, idx: 0x0}, 631: {cur: 0x85, idx: 0x4bf}, 632: {cur: 0x8b, idx: 0x0}, 633: {cur: 0xb0, idx: 0x0}, 634: {cur: 0xbe, idx: 0x0}, 635: {cur: 0xe8, idx: 0xb8}, 636: {cur: 0xf3, idx: 0x0}, 637: {cur: 0xf9, idx: 0x0}, 638: {cur: 0x10d, idx: 0x0}, 639: {cur: 0xf4, idx: 0x24b}, 640: {cur: 0x12, idx: 0x30d}, 641: {cur: 0x13, idx: 0xf0}, 642: {cur: 0x83, idx: 0x25}, 643: {cur: 0xe8, idx: 0xb8}, 644: {cur: 0xf9, idx: 0x4}, 645: {cur: 0xf8, idx: 0x2f5}, 646: {cur: 0xf9, idx: 0x4}, 647: {cur: 0x3a, idx: 0x32b}, 648: {cur: 0x9, idx: 0x1}, 649: {cur: 0x8f, idx: 0x76}, 650: {cur: 0xe8, idx: 0xb8}, 651: {cur: 0x13, idx: 0x0}, 652: {cur: 0x2e, idx: 0x0}, 653: {cur: 0x39, idx: 0x0}, 654: {cur: 0x42, idx: 0x0}, 655: {cur: 0x61, idx: 0x0}, 656: {cur: 0x70, idx: 0x0}, 657: {cur: 0x7a, idx: 0x0}, 658: {cur: 0x7b, idx: 0x0}, 659: {cur: 0x83, idx: 0x0}, 660: {cur: 0x8b, idx: 0x0}, 661: {cur: 0xb0, idx: 0x0}, 662: {cur: 0xbe, idx: 0x0}, 663: {cur: 0xf3, idx: 0x0}, 664: {cur: 0xf9, idx: 0x0}, 665: {cur: 0x102, idx: 0x0}, 666: {cur: 0x106, idx: 0x0}, 667: {cur: 0x10d, idx: 0x0}, 668: {cur: 0x112, idx: 0x0}, 669: {cur: 0x114, idx: 0x0}, 670: {cur: 0x3a, idx: 0x32b}, 671: {cur: 0x84, idx: 0x309}, 672: {cur: 0x84, idx: 0x309}, 673: {cur: 0x13, idx: 0xf0}, 674: {cur: 0x83, idx: 0x25}, 675: {cur: 0x99, idx: 0x84}, 676: {cur: 0xe8, idx: 0xb8}, 677: {cur: 0xf9, idx: 0x4}, 678: {cur: 0x84, idx: 0x309}, 679: {cur: 0xf4, idx: 0x24b}, 680: {cur: 0x84, idx: 0x309}, 681: {cur: 0xac, idx: 0x7e}, 682: {cur: 0xa1, idx: 0x87}, 683: {cur: 0xb6, idx: 0x4cc}, 684: {cur: 0x13, idx: 0x0}, 685: {cur: 0x42, idx: 0x0}, 686: {cur: 0x61, idx: 0x0}, 687: {cur: 0x70, idx: 0x0}, 688: {cur: 0x7a, idx: 0x0}, 689: {cur: 0x7b, idx: 0x0}, 690: {cur: 0x83, idx: 0x0}, 691: {cur: 0x8b, idx: 0x0}, 692: {cur: 0xa3, idx: 0x4d0}, 693: {cur: 0xbe, idx: 0x0}, 694: {cur: 0xf3, idx: 0x0}, 695: {cur: 0x102, idx: 0x0}, 696: {cur: 0x83, idx: 0x25}, 697: {cur: 0xe8, idx: 0xb8}, 698: {cur: 0xf9, idx: 0x4}, 699: {cur: 0xa7, idx: 0x8c}, 700: {cur: 0xe8, idx: 0xb8}, 701: {cur: 0xf9, idx: 0x4}, 702: {cur: 0xe8, idx: 0xb8}, 703: {cur: 0xf9, idx: 0x4}, 704: {cur: 0x39, idx: 0x0}, 705: {cur: 0xb0, idx: 0x0}, 706: {cur: 0xb3, idx: 0x94}, 707: {cur: 0xf9, idx: 0x0}, 708: {cur: 0x26, idx: 0x4}, 709: {cur: 0xda, idx: 0x4}, 710: {cur: 0x45, idx: 0x4ea}, 711: {cur: 0xa6, idx: 0x8a}, 712: {cur: 0xe8, idx: 0xb8}, 713: {cur: 0xf9, idx: 0x4}, 714: {cur: 0xb7, idx: 0x4}, 715: {cur: 0x13, idx: 0x0}, 716: {cur: 0x2e, idx: 0x0}, 717: {cur: 0x39, idx: 0x0}, 718: {cur: 0x42, idx: 0x0}, 719: {cur: 0x70, idx: 0x0}, 720: {cur: 0x7a, idx: 0x0}, 721: {cur: 0x7b, idx: 0x0}, 722: {cur: 0x83, idx: 0x0}, 723: {cur: 0x8b, idx: 0x0}, 724: {cur: 0xb0, idx: 0x0}, 725: {cur: 0xbc, idx: 0x30}, 726: {cur: 0xbe, idx: 0x0}, 727: {cur: 0xf3, idx: 0x0}, 728: {cur: 0xf9, idx: 0x0}, 729: {cur: 0x102, idx: 0x0}, 730: {cur: 0x106, idx: 0x0}, 731: {cur: 0x10d, idx: 0x0}, 732: {cur: 0x114, idx: 0x0}, 733: {cur: 0xbd, idx: 0x4fd}, 734: {cur: 0xe8, idx: 0xb8}, 735: {cur: 0x13, idx: 0xf0}, 736: {cur: 0x39, idx: 0x9b}, 737: {cur: 0x5e, idx: 0x14f}, 738: {cur: 0xd4, idx: 0x292}, 739: {cur: 0xe8, idx: 0xb8}, 740: {cur: 0x114, idx: 0x0}, 741: {cur: 0x14, idx: 0x38a}, 742: {cur: 0xf9, idx: 0x4}, 743: {cur: 0x8, idx: 0x36e}, 744: {cur: 0xe0, idx: 0x4}, 745: {cur: 0x8, idx: 0x36e}, 746: {cur: 0xbc, idx: 0x30}, 747: {cur: 0x61, idx: 0x246}, 748: {cur: 0xe2, idx: 0x3f}, 749: {cur: 0xf8, idx: 0x2f5}, 750: {cur: 0x5b, idx: 0x38f}, 751: {cur: 0x84, idx: 0x309}, 752: {cur: 0x63, idx: 0x42}, 753: {cur: 0xf9, idx: 0x4}, 754: {cur: 0x63, idx: 0x0}, 755: {cur: 0xd0, idx: 0xae}, 756: {cur: 0xe8, idx: 0xb8}, 757: {cur: 0xc6, idx: 0x50a}, 758: {cur: 0x13, idx: 0x0}, 759: {cur: 0x39, idx: 0x0}, 760: {cur: 0x42, idx: 0x0}, 761: {cur: 0x61, idx: 0x0}, 762: {cur: 0x70, idx: 0x0}, 763: {cur: 0x7a, idx: 0x0}, 764: {cur: 0x7b, idx: 0x0}, 765: {cur: 0x83, idx: 0x0}, 766: {cur: 0x8b, idx: 0x0}, 767: {cur: 0xb0, idx: 0x0}, 768: {cur: 0xbe, idx: 0x0}, 769: {cur: 0xc7, idx: 0xa6}, 770: {cur: 0xf3, idx: 0x0}, 771: {cur: 0xf9, idx: 0x0}, 772: {cur: 0x102, idx: 0x0}, 773: {cur: 0x4, idx: 0x3a5}, 774: {cur: 0x13, idx: 0xf0}, 775: {cur: 0xc9, idx: 0x50d}, 776: {cur: 0xe8, idx: 0xb8}, 777: {cur: 0x9, idx: 0x1}, 778: {cur: 0x4a, idx: 0x4aa}, 779: {cur: 0xc9, idx: 0x512}, 780: {cur: 0x97, idx: 0x2f3}, 781: {cur: 0xa8, idx: 0x360}, 782: {cur: 0xb6, idx: 0x4cc}, 783: {cur: 0xc9, idx: 0x4aa}, 784: {cur: 0xe3, idx: 0xb5}, 785: {cur: 0xc2, idx: 0x399}, 786: {cur: 0x27, idx: 0x10}, 787: {cur: 0xc2, idx: 0x0}, 788: {cur: 0xc2, idx: 0x0}, 789: {cur: 0xf9, idx: 0x4}, 790: {cur: 0x24, idx: 0x35a}, 791: {cur: 0x13, idx: 0x0}, 792: {cur: 0x2e, idx: 0x0}, 793: {cur: 0x39, idx: 0x0}, 794: {cur: 0x42, idx: 0x0}, 795: {cur: 0x5c, idx: 0x0}, 796: {cur: 0x61, idx: 0x0}, 797: {cur: 0x70, idx: 0x0}, 798: {cur: 0x7a, idx: 0x0}, 799: {cur: 0x7b, idx: 0x0}, 800: {cur: 0x83, idx: 0x0}, 801: {cur: 0x8b, idx: 0x0}, 802: {cur: 0xb0, idx: 0x0}, 803: {cur: 0xbe, idx: 0x0}, 804: {cur: 0xf3, idx: 0x0}, 805: {cur: 0xf9, idx: 0x0}, 806: {cur: 0x102, idx: 0x0}, 807: {cur: 0x10d, idx: 0x0}, 808: {cur: 0xa0, idx: 0x4f}, 809: {cur: 0xf4, idx: 0x24b}, 810: {cur: 0x0, idx: 0x519}, 811: {cur: 0x83, idx: 0x25}, 812: {cur: 0xd0, idx: 0xae}, 813: {cur: 0xd1, idx: 0x18}, 814: {cur: 0xe8, idx: 0xb8}, 815: {cur: 0xec, idx: 0x51e}, 816: {cur: 0xf5, idx: 0xc7}, 817: {cur: 0xf9, idx: 0x4}, 818: {cur: 0x37, idx: 0x18}, 819: {cur: 0xd1, idx: 0x0}, 820: {cur: 0x85, idx: 0x4bf}, 821: {cur: 0x8e, idx: 0x72}, 822: {cur: 0xa0, idx: 0x4f}, 823: {cur: 0xd2, idx: 0xb2}, 824: {cur: 0xf4, idx: 0x24b}, 825: {cur: 0xd0, idx: 0xae}, 826: {cur: 0x84, idx: 0x309}, 827: {cur: 0xf4, idx: 0x24b}, 828: {cur: 0x50, idx: 0x525}, 829: {cur: 0xbc, idx: 0x30}, 830: {cur: 0xd9, idx: 0x529}, 831: {cur: 0xe8, idx: 0xb8}, 832: {cur: 0xbc, idx: 0x52d}, 833: {cur: 0xd9, idx: 0x30}, 834: {cur: 0xb6, idx: 0x4cc}, 835: {cur: 0x91, idx: 0x531}, 836: {cur: 0xe8, idx: 0xb8}, 837: {cur: 0x112, idx: 0x539}, 838: {cur: 0x13, idx: 0x0}, 839: {cur: 0x2e, idx: 0x0}, 840: {cur: 0x39, idx: 0x0}, 841: {cur: 0x42, idx: 0x0}, 842: {cur: 0x61, idx: 0x0}, 843: {cur: 0x70, idx: 0x0}, 844: {cur: 0x7a, idx: 0x549}, 845: {cur: 0x7b, idx: 0x0}, 846: {cur: 0x83, idx: 0x0}, 847: {cur: 0x8b, idx: 0x0}, 848: {cur: 0xbe, idx: 0x0}, 849: {cur: 0xf3, idx: 0x0}, 850: {cur: 0xf9, idx: 0x0}, 851: {cur: 0x102, idx: 0x0}, 852: {cur: 0x39, idx: 0x0}, 853: {cur: 0x83, idx: 0x25}, 854: {cur: 0xe8, idx: 0xb8}, 855: {cur: 0xf9, idx: 0x4}, 856: {cur: 0xdf, idx: 0x244}, 857: {cur: 0x4f, idx: 0x23c}, 858: {cur: 0x5b, idx: 0x38f}, 859: {cur: 0x84, idx: 0x309}, 860: {cur: 0x6, idx: 0x54d}, 861: {cur: 0xe8, idx: 0xb8}, 862: {cur: 0xa3, idx: 0x553}, 863: {cur: 0x13, idx: 0x0}, 864: {cur: 0x18, idx: 0x2d7}, 865: {cur: 0x21, idx: 0x557}, 866: {cur: 0x37, idx: 0x55d}, 867: {cur: 0x83, idx: 0x25}, 868: {cur: 0x8b, idx: 0x0}, 869: {cur: 0xbe, idx: 0x0}, 870: {cur: 0x102, idx: 0x0}, 871: {cur: 0x13, idx: 0x0}, 872: {cur: 0x18, idx: 0x9}, 873: {cur: 0x21, idx: 0x557}, 874: {cur: 0x37, idx: 0x55d}, 875: {cur: 0x83, idx: 0x25}, 876: {cur: 0x8b, idx: 0x0}, 877: {cur: 0xbe, idx: 0x0}, 878: {cur: 0x102, idx: 0x0}, 879: {cur: 0x13, idx: 0x0}, 880: {cur: 0x1a, idx: 0x257}, 881: {cur: 0x25, idx: 0x11b}, 882: {cur: 0x2e, idx: 0x571}, 883: {cur: 0x32, idx: 0x123}, 884: {cur: 0x38, idx: 0x127}, 885: {cur: 0x42, idx: 0x0}, 886: {cur: 0x50, idx: 0x525}, 887: {cur: 0x51, idx: 0x26c}, 888: {cur: 0x55, idx: 0x575}, 889: {cur: 0x56, idx: 0x579}, 890: {cur: 0x61, idx: 0x0}, 891: {cur: 0x70, idx: 0x0}, 892: {cur: 0x7b, idx: 0x0}, 893: {cur: 0x7f, idx: 0x57e}, 894: {cur: 0x81, idx: 0x176}, 895: {cur: 0x83, idx: 0x0}, 896: {cur: 0x8b, idx: 0x0}, 897: {cur: 0xbc, idx: 0x52d}, 898: {cur: 0xbe, idx: 0x0}, 899: {cur: 0xd9, idx: 0x30}, 900: {cur: 0xf3, idx: 0x0}, 901: {cur: 0x102, idx: 0x0}, 902: {cur: 0x84, idx: 0x309}, 903: {cur: 0xe8, idx: 0xb8}, 904: {cur: 0xf4, idx: 0x24b}, 905: {cur: 0x3a, idx: 0x32b}, 906: {cur: 0xf8, idx: 0x2f5}, 907: {cur: 0x83, idx: 0x25}, 908: {cur: 0xe8, idx: 0xb8}, 909: {cur: 0xf9, idx: 0x4}, 910: {cur: 0x91, idx: 0x582}, 911: {cur: 0xb3, idx: 0x94}, 912: {cur: 0xda, idx: 0x296}, 913: {cur: 0xb3, idx: 0x94}, 914: {cur: 0xda, idx: 0x4}, 915: {cur: 0xf9, idx: 0xcb}, 916: {cur: 0xe8, idx: 0xb8}, 917: {cur: 0xf9, idx: 0x4}, 918: {cur: 0xf8, idx: 0x2f5}, 919: {cur: 0x84, idx: 0x309}, 920: {cur: 0x13, idx: 0xf0}, 921: {cur: 0x83, idx: 0x25}, 922: {cur: 0x5b, idx: 0x38f}, 923: {cur: 0x57, idx: 0x240}, 924: {cur: 0x5c, idx: 0x0}, 925: {cur: 0x61, idx: 0x0}, 926: {cur: 0x13, idx: 0x586}, 927: {cur: 0xbe, idx: 0x58b}, 928: {cur: 0xee, idx: 0xbc}, 929: {cur: 0x13, idx: 0xf0}, 930: {cur: 0x83, idx: 0x25}, 931: {cur: 0xe8, idx: 0xb8}, 932: {cur: 0xf1, idx: 0xbf}, 933: {cur: 0xf9, idx: 0x4}, 934: {cur: 0x42, idx: 0x4a6}, 935: {cur: 0xf9, idx: 0x4}, 936: {cur: 0x13, idx: 0x0}, 937: {cur: 0x2e, idx: 0x0}, 938: {cur: 0x39, idx: 0x0}, 939: {cur: 0x42, idx: 0x0}, 940: {cur: 0x5c, idx: 0x0}, 941: {cur: 0x61, idx: 0x0}, 942: {cur: 0x70, idx: 0x0}, 943: {cur: 0x7a, idx: 0x0}, 944: {cur: 0x7b, idx: 0x0}, 945: {cur: 0x83, idx: 0x25}, 946: {cur: 0x8b, idx: 0x0}, 947: {cur: 0xb0, idx: 0x0}, 948: {cur: 0xbe, idx: 0x0}, 949: {cur: 0xf3, idx: 0x0}, 950: {cur: 0xf5, idx: 0xc7}, 951: {cur: 0xf6, idx: 0x590}, 952: {cur: 0xf9, idx: 0x0}, 953: {cur: 0x102, idx: 0x0}, 954: {cur: 0x10d, idx: 0x0}, 955: {cur: 0xc6, idx: 0x7e}, 956: {cur: 0xe8, idx: 0xb8}, 957: {cur: 0xf9, idx: 0x4}, 958: {cur: 0xc6, idx: 0x0}, 959: {cur: 0xff, idx: 0x598}, 960: {cur: 0x4, idx: 0x3a5}, 961: {cur: 0xe8, idx: 0xb8}, 962: {cur: 0xff, idx: 0x59e}, 963: {cur: 0x92, idx: 0x4}, 964: {cur: 0x92, idx: 0x4}, 965: {cur: 0x13, idx: 0xf0}, 966: {cur: 0xe8, idx: 0xb8}, 967: {cur: 0xf4, idx: 0x24b}, 968: {cur: 0x83, idx: 0x25}, 969: {cur: 0xf9, idx: 0x4}, 970: {cur: 0xf8, idx: 0x2f5}, 971: {cur: 0xb8, idx: 0x97}, 972: {cur: 0x13, idx: 0xf0}, 973: {cur: 0x83, idx: 0x25}, 974: {cur: 0x8b, idx: 0x5a5}, 975: {cur: 0xf3, idx: 0x4}, 976: {cur: 0x13, idx: 0xf0}, 977: {cur: 0x42, idx: 0x4a6}, 978: {cur: 0x79, idx: 0x5a9}, 979: {cur: 0x8b, idx: 0x5a5}, 980: {cur: 0x42, idx: 0x20}, 981: {cur: 0x42, idx: 0x20}, 982: {cur: 0xa8, idx: 0x360}, 983: {cur: 0x42, idx: 0x20}, 984: {cur: 0xda, idx: 0x4}, 985: {cur: 0x13, idx: 0xf0}, 986: {cur: 0x83, idx: 0x25}, 987: {cur: 0x8b, idx: 0x5a5}, 988: {cur: 0xf3, idx: 0x4}, 989: {cur: 0x8b, idx: 0x6e}, 990: {cur: 0xf3, idx: 0xc3}, 991: {cur: 0xa8, idx: 0x360}, 992: {cur: 0xe8, idx: 0xb8}, 993: {cur: 0x122, idx: 0xe5}, } // Size: 4000 bytes var narrowLangIndex = []uint16{ // 748 elements // Entry 0 - 3F 0x0000, 0x0061, 0x0061, 0x0061, 0x0062, 0x0062, 0x0062, 0x0062, 0x0062, 0x0062, 0x0062, 0x0063, 0x0063, 0x0080, 0x0080, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x0081, 0x008a, 0x008a, 0x008c, 0x008c, 0x008c, 0x008c, 0x008c, 0x008c, 0x008c, 0x00a5, 0x00a5, 0x00a5, 0x00a5, 0x00a5, 0x00a5, 0x00d4, 0x00d4, 0x00d4, // Entry 40 - 7F 0x00d4, 0x00d4, 0x00d5, 0x00d5, 0x00d5, 0x00d5, 0x00d5, 0x00d5, 0x00d8, 0x00d8, 0x00d8, 0x00d8, 0x00d9, 0x00d9, 0x00d9, 0x00d9, 0x00d9, 0x00e3, 0x00e3, 0x00e3, 0x00e3, 0x00e3, 0x00e3, 0x00e3, 0x00e3, 0x00e3, 0x00e3, 0x00e3, 0x00e3, 0x00e3, 0x00e3, 0x00e4, 0x00e4, 0x00e4, 0x00e4, 0x00ea, 0x00ea, 0x00ef, 0x00ef, 0x00ef, 0x00ef, 0x00ef, 0x00f7, 0x00f7, 0x00f7, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, // Entry 80 - BF 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x00f8, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, // Entry C0 - FF 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0100, 0x0102, 0x0104, 0x0104, 0x0104, 0x0104, 0x0104, 0x0104, 0x0104, 0x0104, 0x0104, 0x0104, 0x0104, 0x0104, 0x0104, 0x0104, 0x0104, 0x0104, // Entry 100 - 13F 0x0108, 0x0108, 0x0108, 0x0108, 0x0108, 0x0108, 0x0108, 0x0108, 0x0108, 0x0108, 0x0109, 0x010a, 0x010a, 0x010b, 0x010b, 0x010b, 0x010b, 0x010b, 0x010b, 0x010b, 0x010b, 0x010b, 0x010b, 0x010b, 0x010b, 0x010d, 0x010d, 0x010e, 0x010e, 0x010e, 0x010e, 0x010e, 0x0115, 0x0115, 0x0115, 0x0115, 0x0115, 0x0115, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, // Entry 140 - 17F 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0118, 0x0119, 0x0119, 0x011a, 0x011a, 0x011c, 0x011c, 0x011c, 0x011c, 0x011c, 0x011c, 0x011e, 0x011e, 0x011e, 0x011e, 0x011e, 0x011e, 0x011e, 0x011e, 0x011e, 0x011e, 0x011e, 0x011e, 0x011e, 0x011f, 0x011f, 0x0122, 0x0122, 0x0123, 0x0123, 0x0123, 0x0123, 0x0123, 0x0124, 0x0124, 0x0125, 0x0125, 0x0126, 0x0126, 0x0126, 0x0126, 0x0126, 0x0126, 0x0127, 0x0127, 0x012d, // Entry 180 - 1BF 0x012d, 0x012d, 0x012d, 0x012d, 0x0130, 0x0130, 0x0130, 0x0130, 0x0130, 0x0130, 0x0130, 0x0130, 0x0131, 0x0131, 0x0131, 0x0131, 0x0131, 0x0131, 0x0131, 0x0131, 0x0131, 0x0131, 0x0131, 0x0131, 0x0131, 0x0131, 0x0131, 0x0131, 0x0132, 0x0132, 0x0132, 0x0132, 0x0132, 0x0132, 0x0132, 0x0132, 0x0133, 0x0133, 0x0134, 0x0134, 0x0135, 0x0135, 0x0135, 0x0135, 0x0135, 0x0135, 0x0135, 0x0135, 0x0135, 0x0135, 0x0135, 0x0135, 0x0135, 0x0135, 0x0135, 0x0135, 0x0140, 0x0140, 0x0140, 0x0140, 0x0141, 0x0141, 0x0141, 0x0141, // Entry 1C0 - 1FF 0x0141, 0x0141, 0x0141, 0x0141, 0x0141, 0x0141, 0x0141, 0x0142, 0x0142, 0x0142, 0x0142, 0x0142, 0x014d, 0x014d, 0x014d, 0x014d, 0x014d, 0x014d, 0x014d, 0x014d, 0x014e, 0x014e, 0x014e, 0x014e, 0x014e, 0x014e, 0x014e, 0x014e, 0x014e, 0x014e, 0x014e, 0x014e, 0x014e, 0x014e, 0x014e, 0x014f, 0x014f, 0x0150, 0x0150, 0x0151, 0x0151, 0x0152, 0x0152, 0x0153, 0x0153, 0x0153, 0x0153, 0x0153, 0x0153, 0x0153, 0x0153, 0x0154, 0x0154, 0x0154, 0x0154, 0x0154, 0x0154, 0x0154, 0x0155, 0x0155, 0x0155, 0x0155, 0x0155, 0x0155, // Entry 200 - 23F 0x0155, 0x0155, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0156, 0x0157, 0x0157, 0x0157, 0x0157, 0x0157, 0x0157, 0x0158, 0x0158, 0x0158, 0x0158, 0x0158, 0x0158, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, 0x0159, // Entry 240 - 27F 0x0159, 0x0159, 0x015a, 0x015a, 0x015a, 0x015a, 0x015a, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015b, 0x015d, 0x015d, 0x015e, 0x015e, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x015f, 0x0161, // Entry 280 - 2BF 0x0161, 0x0161, 0x0161, 0x0161, 0x0161, 0x0164, 0x0164, 0x0164, 0x0164, 0x0164, 0x0164, 0x0164, 0x0164, 0x0166, 0x0166, 0x0166, 0x0166, 0x0167, 0x0167, 0x0167, 0x0167, 0x0167, 0x0167, 0x0168, 0x0168, 0x0168, 0x0168, 0x0168, 0x0169, 0x0169, 0x0169, 0x0169, 0x0169, 0x016a, 0x016a, 0x016a, 0x016a, 0x016a, 0x016a, 0x016a, 0x016a, 0x016a, 0x016a, 0x016a, 0x016b, 0x016b, 0x016b, 0x016b, 0x016b, 0x016b, 0x016b, 0x016b, 0x016b, 0x016b, 0x016c, 0x016c, 0x016d, 0x016d, 0x016d, 0x016d, 0x016d, 0x016d, 0x016d, 0x016d, // Entry 2C0 - 2FF 0x016d, 0x016d, 0x016d, 0x016d, 0x016d, 0x016d, 0x016d, 0x016d, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016e, 0x016f, 0x016f, 0x016f, 0x016f, 0x016f, 0x016f, 0x016f, 0x016f, 0x016f, 0x016f, 0x0177, 0x0177, } // Size: 1520 bytes var narrowSymIndex = []curToIndex{ // 375 elements 0: {cur: 0x9, idx: 0x1}, 1: {cur: 0x11, idx: 0x4}, 2: {cur: 0x13, idx: 0x4}, 3: {cur: 0x18, idx: 0x9}, 4: {cur: 0x1a, idx: 0x4}, 5: {cur: 0x1b, idx: 0xc}, 6: {cur: 0x25, idx: 0x4}, 7: {cur: 0x26, idx: 0x4}, 8: {cur: 0x27, idx: 0x10}, 9: {cur: 0x2e, idx: 0x13}, 10: {cur: 0x32, idx: 0x4}, 11: {cur: 0x35, idx: 0x16}, 12: {cur: 0x37, idx: 0x18}, 13: {cur: 0x38, idx: 0x4}, 14: {cur: 0x39, idx: 0x4}, 15: {cur: 0x40, idx: 0x4}, 16: {cur: 0x42, idx: 0x25}, 17: {cur: 0x43, idx: 0x4}, 18: {cur: 0x45, idx: 0x28}, 19: {cur: 0x48, idx: 0x4}, 20: {cur: 0x49, idx: 0x4}, 21: {cur: 0x4c, idx: 0x2c}, 22: {cur: 0x50, idx: 0x30}, 23: {cur: 0x51, idx: 0x4}, 24: {cur: 0x56, idx: 0x33}, 25: {cur: 0x5a, idx: 0x37}, 26: {cur: 0x5c, idx: 0x3b}, 27: {cur: 0x5e, idx: 0x4}, 28: {cur: 0x5f, idx: 0x3f}, 29: {cur: 0x61, idx: 0x3f}, 30: {cur: 0x63, idx: 0x42}, 31: {cur: 0x66, idx: 0x3f}, 32: {cur: 0x68, idx: 0x46}, 33: {cur: 0x6c, idx: 0x49}, 34: {cur: 0x6f, idx: 0x4}, 35: {cur: 0x70, idx: 0x4}, 36: {cur: 0x71, idx: 0x4f}, 37: {cur: 0x73, idx: 0x51}, 38: {cur: 0x75, idx: 0x54}, 39: {cur: 0x76, idx: 0x57}, 40: {cur: 0x7a, idx: 0x5a}, 41: {cur: 0x7b, idx: 0x5e}, 42: {cur: 0x7f, idx: 0x30}, 43: {cur: 0x81, idx: 0x4}, 44: {cur: 0x83, idx: 0x25}, 45: {cur: 0x86, idx: 0x67}, 46: {cur: 0x87, idx: 0x6b}, 47: {cur: 0x88, idx: 0x6e}, 48: {cur: 0x8b, idx: 0x6e}, 49: {cur: 0x8d, idx: 0x4}, 50: {cur: 0x8e, idx: 0x72}, 51: {cur: 0x8f, idx: 0x76}, 52: {cur: 0x90, idx: 0x7a}, 53: {cur: 0x91, idx: 0x7e}, 54: {cur: 0x92, idx: 0x4}, 55: {cur: 0x94, idx: 0x81}, 56: {cur: 0x99, idx: 0x84}, 57: {cur: 0xa1, idx: 0x87}, 58: {cur: 0xa6, idx: 0x8a}, 59: {cur: 0xa7, idx: 0x8c}, 60: {cur: 0xac, idx: 0x7e}, 61: {cur: 0xb0, idx: 0x4}, 62: {cur: 0xb3, idx: 0x94}, 63: {cur: 0xb7, idx: 0x4}, 64: {cur: 0xb8, idx: 0x97}, 65: {cur: 0xba, idx: 0x9b}, 66: {cur: 0xbc, idx: 0x30}, 67: {cur: 0xbd, idx: 0x7e}, 68: {cur: 0xbe, idx: 0x4}, 69: {cur: 0xc5, idx: 0xa2}, 70: {cur: 0xc6, idx: 0x7e}, 71: {cur: 0xc7, idx: 0xa6}, 72: {cur: 0xca, idx: 0xaa}, 73: {cur: 0xd0, idx: 0xae}, 74: {cur: 0xd1, idx: 0x18}, 75: {cur: 0xd2, idx: 0xb2}, 76: {cur: 0xd4, idx: 0x4}, 77: {cur: 0xd9, idx: 0x30}, 78: {cur: 0xda, idx: 0x4}, 79: {cur: 0xdb, idx: 0x3f}, 80: {cur: 0xe0, idx: 0x4}, 81: {cur: 0xe2, idx: 0x3f}, 82: {cur: 0xe3, idx: 0xb5}, 83: {cur: 0xe6, idx: 0x3f}, 84: {cur: 0xe8, idx: 0xb8}, 85: {cur: 0xee, idx: 0xbc}, 86: {cur: 0xf1, idx: 0xbf}, 87: {cur: 0xf2, idx: 0x4}, 88: {cur: 0xf3, idx: 0x4}, 89: {cur: 0xf5, idx: 0xc7}, 90: {cur: 0xf9, idx: 0x4}, 91: {cur: 0xfe, idx: 0x4}, 92: {cur: 0x101, idx: 0x10}, 93: {cur: 0x102, idx: 0xcf}, 94: {cur: 0x10d, idx: 0x4}, 95: {cur: 0x122, idx: 0xe5}, 96: {cur: 0x124, idx: 0xe7}, 97: {cur: 0xf3, idx: 0xc3}, 98: {cur: 0xf3, idx: 0xc3}, 99: {cur: 0x11, idx: 0x109}, 100: {cur: 0x13, idx: 0xf0}, 101: {cur: 0x1a, idx: 0x10d}, 102: {cur: 0x25, idx: 0x11b}, 103: {cur: 0x26, idx: 0x11f}, 104: {cur: 0x32, idx: 0x123}, 105: {cur: 0x38, idx: 0x127}, 106: {cur: 0x39, idx: 0x1c}, 107: {cur: 0x40, idx: 0x12b}, 108: {cur: 0x42, idx: 0x20}, 109: {cur: 0x43, idx: 0x12f}, 110: {cur: 0x49, idx: 0x133}, 111: {cur: 0x51, idx: 0x137}, 112: {cur: 0x5e, idx: 0x14f}, 113: {cur: 0x61, idx: 0x153}, 114: {cur: 0x6f, idx: 0x158}, 115: {cur: 0x70, idx: 0x4b}, 116: {cur: 0x81, idx: 0x176}, 117: {cur: 0x83, idx: 0x62}, 118: {cur: 0x8d, idx: 0x19b}, 119: {cur: 0xb0, idx: 0x90}, 120: {cur: 0xbe, idx: 0x9e}, 121: {cur: 0xd4, idx: 0x1ec}, 122: {cur: 0xe0, idx: 0x201}, 123: {cur: 0xe2, idx: 0x205}, 124: {cur: 0xf2, idx: 0x22a}, 125: {cur: 0xf3, idx: 0xc3}, 126: {cur: 0xf9, idx: 0xcb}, 127: {cur: 0xfe, idx: 0x22e}, 128: {cur: 0x26, idx: 0x4}, 129: {cur: 0x37, idx: 0x0}, 130: {cur: 0x50, idx: 0x0}, 131: {cur: 0x73, idx: 0x0}, 132: {cur: 0x7f, idx: 0x0}, 133: {cur: 0xbc, idx: 0x0}, 134: {cur: 0xc7, idx: 0x0}, 135: {cur: 0xd1, idx: 0x0}, 136: {cur: 0xd9, idx: 0x0}, 137: {cur: 0xf3, idx: 0xc3}, 138: {cur: 0xe6, idx: 0x253}, 139: {cur: 0xf3, idx: 0xc3}, 140: {cur: 0x13, idx: 0x6}, 141: {cur: 0x1a, idx: 0x257}, 142: {cur: 0x25, idx: 0x25c}, 143: {cur: 0x32, idx: 0x260}, 144: {cur: 0x38, idx: 0x127}, 145: {cur: 0x39, idx: 0x1c}, 146: {cur: 0x48, idx: 0x263}, 147: {cur: 0x49, idx: 0x268}, 148: {cur: 0x51, idx: 0x26c}, 149: {cur: 0x5e, idx: 0x14f}, 150: {cur: 0x5f, idx: 0x270}, 151: {cur: 0x6f, idx: 0x275}, 152: {cur: 0x7f, idx: 0x278}, 153: {cur: 0x81, idx: 0x27d}, 154: {cur: 0x8d, idx: 0x280}, 155: {cur: 0x92, idx: 0x284}, 156: {cur: 0xb0, idx: 0x90}, 157: {cur: 0xb7, idx: 0x287}, 158: {cur: 0xbe, idx: 0x9e}, 159: {cur: 0xd0, idx: 0x28a}, 160: {cur: 0xd4, idx: 0x292}, 161: {cur: 0xda, idx: 0x296}, 162: {cur: 0xf2, idx: 0x22a}, 163: {cur: 0xfe, idx: 0x299}, 164: {cur: 0x10d, idx: 0xd8}, 165: {cur: 0x11, idx: 0x0}, 166: {cur: 0x13, idx: 0x0}, 167: {cur: 0x1a, idx: 0x0}, 168: {cur: 0x1b, idx: 0x0}, 169: {cur: 0x25, idx: 0x0}, 170: {cur: 0x26, idx: 0x0}, 171: {cur: 0x2e, idx: 0x0}, 172: {cur: 0x32, idx: 0x0}, 173: {cur: 0x37, idx: 0x0}, 174: {cur: 0x38, idx: 0x0}, 175: {cur: 0x39, idx: 0x0}, 176: {cur: 0x40, idx: 0x0}, 177: {cur: 0x42, idx: 0x0}, 178: {cur: 0x43, idx: 0x0}, 179: {cur: 0x45, idx: 0x0}, 180: {cur: 0x49, idx: 0x0}, 181: {cur: 0x51, idx: 0x0}, 182: {cur: 0x5e, idx: 0x0}, 183: {cur: 0x66, idx: 0x0}, 184: {cur: 0x6f, idx: 0x0}, 185: {cur: 0x70, idx: 0x0}, 186: {cur: 0x7a, idx: 0x0}, 187: {cur: 0x7b, idx: 0x0}, 188: {cur: 0x81, idx: 0x0}, 189: {cur: 0x86, idx: 0x0}, 190: {cur: 0x8b, idx: 0x0}, 191: {cur: 0x8d, idx: 0x0}, 192: {cur: 0x8e, idx: 0x0}, 193: {cur: 0x8f, idx: 0x0}, 194: {cur: 0x92, idx: 0x0}, 195: {cur: 0xa7, idx: 0x0}, 196: {cur: 0xb0, idx: 0x0}, 197: {cur: 0xb7, idx: 0x0}, 198: {cur: 0xb8, idx: 0x0}, 199: {cur: 0xbe, idx: 0x0}, 200: {cur: 0xc5, idx: 0x0}, 201: {cur: 0xca, idx: 0x0}, 202: {cur: 0xd4, idx: 0x0}, 203: {cur: 0xda, idx: 0x0}, 204: {cur: 0xe0, idx: 0x0}, 205: {cur: 0xe2, idx: 0x0}, 206: {cur: 0xf1, idx: 0x0}, 207: {cur: 0xf2, idx: 0x0}, 208: {cur: 0xf3, idx: 0x0}, 209: {cur: 0xf5, idx: 0x0}, 210: {cur: 0xfe, idx: 0x0}, 211: {cur: 0x102, idx: 0x0}, 212: {cur: 0xf3, idx: 0xc3}, 213: {cur: 0x56, idx: 0x2b0}, 214: {cur: 0x90, idx: 0x2c0}, 215: {cur: 0xee, idx: 0x2c9}, 216: {cur: 0xf3, idx: 0xc3}, 217: {cur: 0x9, idx: 0x0}, 218: {cur: 0x27, idx: 0x0}, 219: {cur: 0x50, idx: 0x0}, 220: {cur: 0x6c, idx: 0x0}, 221: {cur: 0x71, idx: 0x0}, 222: {cur: 0x7f, idx: 0x0}, 223: {cur: 0xbc, idx: 0x0}, 224: {cur: 0xd9, idx: 0x0}, 225: {cur: 0xe3, idx: 0x0}, 226: {cur: 0x101, idx: 0x0}, 227: {cur: 0xf3, idx: 0xc3}, 228: {cur: 0x1b, idx: 0x302}, 229: {cur: 0x35, idx: 0x0}, 230: {cur: 0x70, idx: 0x4b}, 231: {cur: 0xf3, idx: 0xc3}, 232: {cur: 0x122, idx: 0x0}, 233: {cur: 0x124, idx: 0x0}, 234: {cur: 0x50, idx: 0x305}, 235: {cur: 0x7f, idx: 0x305}, 236: {cur: 0xbc, idx: 0x305}, 237: {cur: 0xd9, idx: 0x305}, 238: {cur: 0xf3, idx: 0xc3}, 239: {cur: 0x48, idx: 0x319}, 240: {cur: 0x5f, idx: 0x321}, 241: {cur: 0x68, idx: 0x326}, 242: {cur: 0x87, idx: 0x32b}, 243: {cur: 0xd2, idx: 0x32e}, 244: {cur: 0xe6, idx: 0x0}, 245: {cur: 0xf3, idx: 0xc3}, 246: {cur: 0x124, idx: 0x8a}, 247: {cur: 0x5c, idx: 0x0}, 248: {cur: 0x1b, idx: 0x34a}, 249: {cur: 0x27, idx: 0x34d}, 250: {cur: 0x49, idx: 0xa2}, 251: {cur: 0x56, idx: 0x3f}, 252: {cur: 0x7f, idx: 0x350}, 253: {cur: 0xca, idx: 0x353}, 254: {cur: 0xd9, idx: 0x350}, 255: {cur: 0xfe, idx: 0x299}, 256: {cur: 0x56, idx: 0x0}, 257: {cur: 0xf3, idx: 0xc3}, 258: {cur: 0x56, idx: 0x33}, 259: {cur: 0x101, idx: 0x37c}, 260: {cur: 0x11, idx: 0x387}, 261: {cur: 0x37, idx: 0x38f}, 262: {cur: 0x51, idx: 0x26c}, 263: {cur: 0xf1, idx: 0x392}, 264: {cur: 0x101, idx: 0x3a1}, 265: {cur: 0xf3, idx: 0xc3}, 266: {cur: 0xf3, idx: 0xc3}, 267: {cur: 0xf3, idx: 0xc3}, 268: {cur: 0xfe, idx: 0x299}, 269: {cur: 0xf3, idx: 0xc3}, 270: {cur: 0x56, idx: 0x3f4}, 271: {cur: 0x87, idx: 0x32b}, 272: {cur: 0x90, idx: 0x2c0}, 273: {cur: 0xba, idx: 0x429}, 274: {cur: 0xd2, idx: 0x430}, 275: {cur: 0xf3, idx: 0xc3}, 276: {cur: 0x124, idx: 0x450}, 277: {cur: 0x87, idx: 0x6b}, 278: {cur: 0xba, idx: 0x9b}, 279: {cur: 0x124, idx: 0xe7}, 280: {cur: 0xf3, idx: 0xc3}, 281: {cur: 0xf3, idx: 0xc3}, 282: {cur: 0x2e, idx: 0x47c}, 283: {cur: 0xf3, idx: 0xc3}, 284: {cur: 0xac, idx: 0x488}, 285: {cur: 0xf3, idx: 0xc3}, 286: {cur: 0xf3, idx: 0xc3}, 287: {cur: 0xac, idx: 0x497}, 288: {cur: 0xc6, idx: 0x497}, 289: {cur: 0xf3, idx: 0xc3}, 290: {cur: 0xf3, idx: 0xc3}, 291: {cur: 0xf3, idx: 0xc3}, 292: {cur: 0xf3, idx: 0xc3}, 293: {cur: 0xf3, idx: 0xc3}, 294: {cur: 0xf3, idx: 0xc3}, 295: {cur: 0x27, idx: 0x34d}, 296: {cur: 0x37, idx: 0x38f}, 297: {cur: 0x48, idx: 0x263}, 298: {cur: 0x56, idx: 0x3f4}, 299: {cur: 0xbc, idx: 0x49e}, 300: {cur: 0xf3, idx: 0xc3}, 301: {cur: 0x42, idx: 0x4a6}, 302: {cur: 0x83, idx: 0x4a6}, 303: {cur: 0xf3, idx: 0xc3}, 304: {cur: 0xf3, idx: 0xc3}, 305: {cur: 0xf3, idx: 0xc3}, 306: {cur: 0xf3, idx: 0xc3}, 307: {cur: 0xf3, idx: 0xc3}, 308: {cur: 0xf3, idx: 0xc3}, 309: {cur: 0x25, idx: 0x25c}, 310: {cur: 0x32, idx: 0x260}, 311: {cur: 0x38, idx: 0x127}, 312: {cur: 0x39, idx: 0x9b}, 313: {cur: 0x51, idx: 0x26c}, 314: {cur: 0x56, idx: 0x4b9}, 315: {cur: 0x70, idx: 0x4b}, 316: {cur: 0x73, idx: 0x4bc}, 317: {cur: 0x81, idx: 0x27d}, 318: {cur: 0xf2, idx: 0x22a}, 319: {cur: 0xf3, idx: 0xc3}, 320: {cur: 0xf3, idx: 0xc3}, 321: {cur: 0xf3, idx: 0xc3}, 322: {cur: 0x1b, idx: 0x0}, 323: {cur: 0x37, idx: 0x38f}, 324: {cur: 0x7a, idx: 0x0}, 325: {cur: 0x7b, idx: 0x0}, 326: {cur: 0x86, idx: 0x0}, 327: {cur: 0x8f, idx: 0x0}, 328: {cur: 0xa7, idx: 0x0}, 329: {cur: 0xc7, idx: 0x4c6}, 330: {cur: 0xca, idx: 0x353}, 331: {cur: 0xd0, idx: 0x4c9}, 332: {cur: 0x102, idx: 0x0}, 333: {cur: 0xf3, idx: 0xc3}, 334: {cur: 0xf3, idx: 0xc3}, 335: {cur: 0xf3, idx: 0xc3}, 336: {cur: 0xf3, idx: 0xc3}, 337: {cur: 0xf3, idx: 0xc3}, 338: {cur: 0xf3, idx: 0xc3}, 339: {cur: 0x38, idx: 0x4d7}, 340: {cur: 0xf3, idx: 0xc3}, 341: {cur: 0xf3, idx: 0xc3}, 342: {cur: 0xf3, idx: 0xc3}, 343: {cur: 0xf3, idx: 0xc3}, 344: {cur: 0xf3, idx: 0xc3}, 345: {cur: 0xf3, idx: 0xc3}, 346: {cur: 0xf3, idx: 0xc3}, 347: {cur: 0x91, idx: 0x531}, 348: {cur: 0xf3, idx: 0xc3}, 349: {cur: 0xf3, idx: 0xc3}, 350: {cur: 0xf3, idx: 0xc3}, 351: {cur: 0xd0, idx: 0x563}, 352: {cur: 0xf3, idx: 0xc3}, 353: {cur: 0x37, idx: 0x56a}, 354: {cur: 0xd0, idx: 0x56d}, 355: {cur: 0xf3, idx: 0xc3}, 356: {cur: 0x5a, idx: 0x0}, 357: {cur: 0xf3, idx: 0xc3}, 358: {cur: 0xf3, idx: 0xc3}, 359: {cur: 0xf3, idx: 0xc3}, 360: {cur: 0xf3, idx: 0xc3}, 361: {cur: 0xf3, idx: 0xc3}, 362: {cur: 0xf3, idx: 0xc3}, 363: {cur: 0xf3, idx: 0xc3}, 364: {cur: 0xf3, idx: 0xc3}, 365: {cur: 0xf3, idx: 0xc3}, 366: {cur: 0xf3, idx: 0xc3}, 367: {cur: 0x37, idx: 0x5ad}, 368: {cur: 0x50, idx: 0x350}, 369: {cur: 0x73, idx: 0x4bc}, 370: {cur: 0x7f, idx: 0x350}, 371: {cur: 0xbc, idx: 0x350}, 372: {cur: 0xc7, idx: 0x5b0}, 373: {cur: 0xd9, idx: 0x350}, 374: {cur: 0xf3, idx: 0xc3}, } // Size: 1524 bytes // Total table size 18192 bytes (17KiB); checksum: 61A71530
{ "pile_set_name": "Github" }
/* * Copyright 2011, Rene Gollent, rene@gollent.com. * Distributed under the terms of the MIT License. */ #ifndef _LIBROOT_MEMORY_PRIVATE_H #define _LIBROOT_MEMORY_PRIVATE_H #include <OS.h> #include <sys/cdefs.h> __BEGIN_DECLS status_t get_memory_properties(team_id teamID, const void* address, uint32* _protected, uint32* _lock); __END_DECLS #endif // _LIBROOT_MEMORY_PRIVATE_H
{ "pile_set_name": "Github" }
Q: air trapped in sink drain? A modest sized object had fallen into my bathroom sink causing (I assume) the sink to drain slowly. That is, at first (after dropping the item) the sink seemed to drain fine but eventually it slowed to a bare minimum. The sink is a pedestal sink and the drain pipes are pvc with threaded and compression joints, so I took out all the pipes from basin to floor, clean everything (obstruction and all) and put it back together. Everything was hand-tightened only: the only tool used was a toothbrush to scrub the parts clean. Now the water drains better but only slightly. If there is still an obstruction, it would have to be in the floor, but we had no apparent problem before the one item I was able to extract. On the other hand, now, as the water slowly drains, I can hear a trickle in the drain pipes. As far as I can recall, this was not the case before I took it all apart. So I'm guessing that there is air bubble somewhere. Does that sound reasonable? And if so, what can I do to deal with it. Note that this is not a new works project; I simply disassembled, clean and reassembled everything. I didn't add parts or have any parts left over. At worst, I might have changed the order of parts or changed the spans between adjustable, compression joints. But all the fittings and seals were put in place. A: There is probably soap and hair plugging the drain lower down. a small hand auger might be the best bet to clean it out. Chemical drain cleaners partially open the drain then they plug up again much quicker and you end up spending more on chemicals than the cost of the auger.
{ "pile_set_name": "StackExchange" }
A molecular mechanism for combinatorial control in yeast: MCM1 protein sets the spacing and orientation of the homeodomains of an alpha 2 dimer. DNA recognition sequences for dimeric proteins typically contain two types of information. The first is the DNA sequence of each half-site, and the second is the arrangement of these half-sites. We show that dimers of the yeast homeodomain protein alpha 2, although able to read the first type of information, lack the ability to assess the second type. Rather, alpha 2 dimers bind with equal affinity to artificial operators in which the two half-sites are arrayed as inverted repeats, as direct repeats, or as everted (inside-out) repeats. We show that a second protein-MCM1-sets the exact spacing and orientation of the homeodomains in the alpha 2 dimer so that they accommodate only the geometry of the naturally occurring operators. These experiments show directly how the target specificity of a homeodomain protein is raised by an auxiliary protein, allowing it to distinguish the biologically correct operators from closely related sequences in the cell.
{ "pile_set_name": "PubMed Abstracts" }
Javier Velázquez Javier Rubén Velázquez (born February 3, 1984 in Zárate, Argentina) is an Argentine footballer currently playing for Talleres Córdoba of the Torneo Federal A in Argentina. Teams Defensores Unidos 2000-2005 Huracán de Comodoro Rivadavia 2005-2006 Defensores Unidos 2006-2009 Racing Club 2009 Independiente Rivadavia 2010-2011 Palestino 2011–2012 Independiente Rivadavia 2012 Instituto 2012-2015 Talleres Córdoba 2015– References Category:1984 births Category:Living people Category:Argentine footballers Category:Argentine expatriate footballers Category:Independiente Rivadavia footballers Category:Racing Club de Avellaneda footballers Category:Club Deportivo Palestino footballers Category:Talleres de Córdoba footballers Category:Chilean Primera División players Category:Argentine Primera División players Category:Expatriate footballers in Chile Category:Association footballers not categorized by position
{ "pile_set_name": "Wikipedia (en)" }
A motor vehicle comprises at least two axles, wherein each axle is generally assigned two wheels. Furthermore, in each case one axle and the two wheels are assigned a so-called stabilizer which has at least one torsion body and limbs arranged thereon, wherein each limb is directly or indirectly connected to a wheel. The stabilizer can be used to damp and/or compensate fluctuations of the wheels in the vertical direction perpendicularly with respect to a direction of travel of the motor vehicle and perpendicularly with respect to the axle, and therefore to achieve rolling stabilization for the motor vehicle. Document DE 10 2008 000 240 A1, which is incorporated by reference herein, describes a method for operating a motor vehicle which has two axles with wheels mounted in a sprung fashion thereon, wherein each axle is assigned an electromechanical stabilizer. For this purpose, wheel movements of the individual wheels are detected and fed to a control, as a result of which an electric motor of the stabilizer is controlled in such a way that spring compression movements on one side are prevented from being copied on to another side of the axle. DE 10 2010 051 807 A1, which is incorporated by reference herein, describes a rolling stabilization device for a motor vehicle comprising a stabilizer which is assigned two wheels of an axle of the motor vehicle and is divided into two stabilizer halves, an actuator which is capable of rotating the two stabilizer halves with respect to one another, and a control device which is designed to operate the actuator as a function of driving state parameters, at least in a first operating state of the motor vehicle, in such a way that a rolling movement of the vehicle is counteracted by a torque transmission between the two stabilizer halves. A control device for a stabilizer of a motor vehicle is described in document EP 1 577 127 A2, which is incorporated by reference herein. Here, the stabilizer comprises a pair of stabilizer rods which are arranged between two wheels of an axle, and an actuator which is arranged between the stabilizer rods and which comprises an electric motor and a mechanism for reducing the speed. A desired torque for the electric motor is calculated on the basis of behavior of the motor vehicle and of steering operations of a driver. Furthermore, a torque is estimated for each stabilizer rod. The electric motor is controlled as a result of a comparison of the desired torque with the estimated torque. A stabilizer arrangement which is known from document EP 1 925 472 A2, which is incorporated by reference herein, comprises a two-part stabilizer with in each case one radius link which runs in the longitudinal direction of the vehicle and whose stabilizer sections execute a rotational relative movement with respect to one another. The stabilizer sections are operatively connected to an adjustable torque generating device which has such high control dynamics that the stabilizer arrangement applies an adapted opposing torque to a torque acting on the stabilizer arrangement, even when a torsional section inside the stabilizer arrangement is dispensed with. Against this background, a method and a system having the features of the independent patent claims are presented.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Searched / Tried a lot: Unable to add popup display delay [Note: I am not programming expert.] I tried a lot and searched this platform but did not find any solution. I need to add 30sec delay in displaying a popup box. I took script from here. The script has fade-out time and it is working fine. Check script below...i replaced 'close()' with 'delay()'. it is not working. <script type="text/javascript"> $(document).ready(function() { if($.cookie('the_cookie') != 1) { // If the_cookie not set to 1 then initializes and play calling the popup $.cookie('the_cookie', '1', { expires: 1 }); // Value day (s) before expiration of the cookie $.fancybox( $("#popup").html(), { type : 'iframe', href : '/contact.php', // url vers notre page html qui sera charg?e dans la popup en mode iframe maxWidth : 415, maxHeight : 475, fitToView : false, width : '90%', height : '95%', autoSize : false } );setTimeout(function(){ $.fancybox.delay(30000) },10000); } }); A: try below code, $(document).ready(function() { if($.cookie('the_cookie') != 1) { // Si the_cookie n'a pas pour valeur 1 alors on l'initialise et on joue l'appel de la popup $.cookie('the_cookie', '1', { expires: 1 }); // valeur en jour avant expiration du cookie //below 3000 is 3 sec delay then popup appears. setTimeout(fire, 3000); //below 5000 is 5 sec dely after that popup closes. setTimeout("parent.$.fancybox.close()", 5000); } }); function fire() { $.fancybox( $("#popup").html(), { type : 'iframe', href : 'http://www.site-web-creation.net/source/pub.html', // url vers notre page html qui sera chargée dans la popup en mode iframe maxWidth : 800, maxHeight : 300, fitToView : false, width : '70%', height : '70%', autoSize : false } ); } i hope this helps to clear your problem. change according your need for delays. i just set timer to fire an event in this case popup box using function fire.
{ "pile_set_name": "StackExchange" }
Q: MySQL wrong results with GROUP BY and ORDER BY I have a table user_comission_configuration_history and I need to select the last Comissions configuration from a user_id. Tuples: I'm trying with many queries, but, the results are wrong. My last SQL: SELECT * FROM( SELECT * FROM user_comission_configuration_history ORDER BY on_date DESC ) AS ordered_history WHERE user_id = 408002 GROUP BY comission_id The result of above query is: But, the correct result is: id user_id comission_id value type on_date 24 408002 12 0,01 PERCENTUAL 2014-07-23 10:45:42 23 408002 4 0,03 CURRENCY 2014-07-23 10:45:41 21 408002 6 0,015 PERCENTUAL 2014-07-23 10:45:18 What is wrong in my SQL? A: This is your query: SELECT * FROM (SELECT * FROM user_comission_configuration_history ORDER BY on_date DESC ) AS ordered_history WHERE user_id = 408002 GROUP BY comission_id; One major problem with your query is that it uses a MySQL extension to group by that MySQL explicitly warns against. The extension is the use of other columns in the in theselect that are not in the group by or in aggregation functions. The warning (here) is: MySQL extends the use of GROUP BY so that the select list can refer to nonaggregated columns not named in the GROUP BY clause. This means that the preceding query is legal in MySQL. You can use this feature to get better performance by avoiding unnecessary column sorting and grouping. However, this is useful primarily when all values in each nonaggregated column not named in the GROUP BY are the same for each group. The server is free to choose any value from each group, so unless they are the same, the values chosen are indeterminate. So, the values returned in the columns are indeterminate. Here is a pretty efficient way to get what you want (with "comission" spelled correctly in English): SELECT * FROM user_commission_configuration_history cch WHERE NOT EXISTS (select 1 from user_commission_configuration_history cch2 where cch2.user_id = cch.user_id and cch2.commission_id = cch.commission_id and cch2.on_date > cch.on_date ) AND cch.user_id = 408002;
{ "pile_set_name": "StackExchange" }
What is the impact of early rheumatoid arthritis on the individual? Rheumatoid arthritis has a significant impact on patients' physical, emotional and social functioning that often occurs very early in the disease with the onset of symptoms. Patients therefore come to their consultation with the rheumatologist, having often experienced these symptoms over a period of some months, with specific expectations (for reassurance and diagnosis) and their own understanding and beliefs about the aetiology and prognosis of their symptoms. Information and advice given by rheumatologists will be rejected by patients if it cannot be accommodated within these lay beliefs. The diagnosis itself can cause a variety of reactions, including relief, disbelief, anger, fear and devastation. Following diagnosis, patients are faced with the problems of adapting to a new self-concept, managing their symptoms and trying to assimilate the large amount of information that they are given about their disease, its treatment, preferred health behaviours, prognosis and so on. There are a number of ways in which health professionals can reduce this impact in early disease. Eliciting patients' lay beliefs about the cause of their symptoms will ensure that information given in the consultation is relevant to individual patients and is presented in a way that has meaning for them. Determining patients' expectations of the rheumatologist will ensure that patients' needs for information and reassurance are met and that unrealistic or inappropriate expectations can be discussed and re-negotiated. Understanding patients' attitudes towards treatment interventions will inform shared clinical decision-making and promote adherence. Obtaining this information in the context of a time-limited consultation can be assisted by the use of validated clinical tools, presented as self-completed questionnaires. Further research is needed to determine the content, frequency, timing and methodology of educational interventions in early rheumatoid arthritis and to improve the understanding of the complex interaction between lay beliefs and disease outcome.
{ "pile_set_name": "PubMed Abstracts" }
Dextr Focuses Your Email Inbox on the People Who Matter Recently, Gmail announced a new way of displaying email that presumably cleans up your inbox and makes you more organized — you can read more about it in Mark Wilson’s review. After using it on both the desktop and my phone, I’ve got to say they’ve done a good job. However, one thing they have not implemented yet is a priority inbox for close family and friends. While the Primary inbox does a nice job of filtering out automatic emails from social networks, shopping sites, and more, there is no way to differentiate work from personal email. That’s where Dextr comes in. The app bills itself as a new mail experience that brings you closer to the people you love. Dextr’s goal is clear: to make it easier for you to communicate with the people you care about the most. Getting Started When you first start up Dextr, you are taken through a few tutorial screens that show you how to use it, as well as help you connect it to your Gmail account. Right now, since Dextr is still in beta, it only supports Gmail. The team is currently taking suggestions on what other services to support. 2 of the 4 tutorial screens You will then have the option to select which contacts from your address book you want to add to your Friends list, which serves as your inbox filter. Dextr will then look at your Gmail inbox and pull out emails from those contacts. Your inbox and Friends list After the initial setup, if you want to add more friends/family, you can simply swipe from right to left to reveal a full contact list and add more friends. Viewing Email To be honest, there isn’t much to say here about viewing email. Select an email from your inbox and you can read the content. When an email comes with attachments, you can view a list of all of them on a separate screen. Supported files will even show up inline. At this point, only images seem to fit the bill. Still, it’s a nice touch. From the email screen you can reply, move a message to the trash, mark as unread, star, or archive. Much like any other inbox, reading an email will not remove it from your list; only deleting or archiving it (either from the app or from Gmail) will remove it. The “Only” Two Other Features As interesting as this might sound, there are only two other features in the entire app: the ability to send email and Settings/Feedback. Send email and Settings While the email in your inbox is limited to only contacts you add to your Friends list, sending email has no such limitations. Simply start typing a contact’s name or email and it will show up in the address box. Compose the email and press Send! Smartly, if you email someone who is not on your Friends list, he or she will not automatically get added to it. This ensures that people can use Dextr as their primary mobile email app: checking only incoming messages from important Contacts while still being able to compose and send messages to everyone else. As far as Settings go, you can see from the screen above that there isn’t too much going on: you can change accounts, change your name, and add a signature. There is also an About and Feedback area. Simple and Beautiful I actually really like that I was table to tell you everything about Dextr in less than 500 words. Granted, it is still in beta and the feature list could grow considerably between now and the “official” release, but that doesn’t seem to be Dextr’s MO. The whole reason for the app is to get a much cleaner version of your inbox based on the people you actually want to communicate with. The developers give you a great app with the best possible way to de-clutter: you create a much smaller list of contacts and only allow messages from those people to reach you. The User Interface is consistent with the idea of simplicity. There is no clutter and it follows the Holo guidelines, as well as the new Cards UI look, really well. When you have email in your inbox from friends, Dextr displays that; when you don’t Dextr suggests starting a conversation and lists three of your friends. There is one button on the bottom to compose; that’s it. It also includes what are becoming common UI interactions for touch screens: pull from the top down to refresh your inbox, swipe side-to-side to reveal extra screens and menus. This is all very consistent with Dextr’s goal: promote simplicity. Using interactions that are already familiar to you means there’s a much lower learning curve. The Future of Dextr I see a lot of potential with Dextr. Right now, it’s strictly another layer on top of GMail to filter your email. However, moving forward I can see it growing to be more than just a Gmail app. In future releases they have promised push notifications and hinted at added support for other email clients, but we communicate through more than just email. I can see Dextr evolving into a full-blown messaging app that combines email, text messaging, and other services — Facebook Messenger, Google Hangouts maybe? — into a simple interface while still limiting what gets through to you based on your Friends list. I think this would be a pretty amazing app because it allows you to stay connected to the people you care about without being bothered by work, email lists, and favors unless you are in front of a computer or manually checking those services. Dextr has the potential to make the phone more personal again, and that is a smart approach I can get behind. Dextr Reviewed by Joe Casabona on Jul 9. Dextr is a new mail experience that brings you closer to the people you love. Dextr's goal is clear: to make it easier for you to communicate with the people you care about the most. Rating: 8 out of 10
{ "pile_set_name": "Pile-CC" }
Based on the fanfic of the same name ( link ), From the bleachers is an American High school AU. Ryuko Matoi is center snare at her local high school, just starting out her junior year with her best friend Nonon Jakuzure, the drum major. The school year seemed like it was going to be pretty boring - until she started talking to varsity cheerleader Mako Mankanshoku. It is a “ A riveting story full of romantic cliches, except now the cliches are gay “. This is a (not so little) klk fan project I’ve been working on. I post new chapters up on the 30th of every month. Credits and thanks to @ryumako for the original fanfic and for letting me do this. Chp 1 Impressions: here Chp 2: (link) Chp 3: (link) Chp 4.1: link
{ "pile_set_name": "OpenWebText2" }
Export/Download Printable Text (.txt) CSV Multiverse id (.txt) Markdown/Reddit MTGO (.dek) MTG Salvation MTG Arena Copy to clipboard 3 Blood Crypt (RNA) 245 4 Bloodstained Mire (KTK) 230 4 Burning Inquiry (M10) 1 Call to the Netherworld (C19) 108 2 Collective Brutality (EMN) 85 4 Faithless Looting (MYS1) 140 3 Flameblade Adept (AKH) 131 3 Flamewake Phoenix (FRF) 100 3 Gifted Aetherborn (JMP) 239 1 Gurmag Angler (MYS1) 102 4 Hollow One (HOU) 163 1 Island (2XM) 375 2 Lightning Bolt (JMP) 342 1 Mountain (2XM) 379 3 Polluted Delta (KTK) 239 4 Soulflayer (C20) 138 1 Steam Vents (GRN) 257 4 Street Wraith (MMA) 108 4 Striped Riverwinder (HOU) 48 2 Swamp (2XM) 377 1 Tasigur, the Golden Fang (FRF) 87 2 Watery Grave (GRN) 259 3 Zetalpa, Primal Dawn (C20) 107 2 Alpine Moon (M19) 128 2 Bontu's Last Reckoning (HOU) 60 1 Collective Brutality (EMN) 85 2 Fatal Push (2XM) 93 3 Leyline of the Void (M20) 107 3 Stubborn Denial (KTK) 56 2 Thoughtseize (2XM) 109 Copied to clipboard. You can now import it in the MTG Arena client. In TappedOut's comments/forums In TappedOut's comments/forums with pie-chart On your blog This will require TappedOut.js included in your blog.
{ "pile_set_name": "OpenWebText2" }
List of Uchu Sentai Kyuranger characters is a Japanese tokusatsu drama and the 41st in the Super Sentai series. Taking place in the distant future of a parallel universe, the series follows twelve individuals chosen by the constellations to fight Jark Matter, an evil organization that has taken over the galaxy. Kyurangers The Kyurangers are a team of warriors composed of humanoids, androids, and some with animal-like features from different star systems whose powers derive from magical stones known as the Kyutamas. They are part of the , an insurrection army fighting to liberate the universe from the evil Jark Matter syndicate. They travel around space in a spaceship known as the , whose design pays homage to the homonymous character from Greek mythology and is named after an old ally of Tsurugi's. After the Orion is destroyed, they obtain a second, stronger ship known as the Battle Orion Ship. All Kyurangers are based on the Twelve Olympians (Dii Consentes). Each Kyuranger carries a , a gauntlet-like sidearm they use to both transform and access the powers of their Kyutama, such as when they perform the finisher (which also has two variations: with the first 11 Kyurangers and with all 12 Kyurangers), and a , which is composed of three separate parts (handle, lower blade, and upper blade). Each is assembled into one of nine different modes, according to the user's fighting style, as their main weapon and can be used to perform the finisher. They each possess a on their belts for them to access their Skill Kyutamas. Once the Kyurangers have been declared enemies of Jark Matter, the Shogunate establishes a bounty of 10.000.000 for each member. Due to the excess number of team members and to preserve the energy of the Kyutamas, only a limited number of Kyurangers are permitted to be deployed initially for each mission after being randomly chosen using a bingo tumbler-like device called the . The others remain on standby to assist them if needed. Once all nine Kyurangers have been assembled, the team decides to start their counterattack on Jark Matter by liberating Earth which is being tightly guarded by them for a yet unexplained reason. They later add three other members, one being their commander and two others from Earth. After obtaining the Tokei Kyutama, the team splits into two factions; one stays in the present to rescue one of their companions who has turned evil, while the other travels to the past to learn more about Jark Matter's leader, Don Armage. After they reunite again in the present, the Kyurangers depart from Earth to confront Don Armage on Planet Southern Cross in the Crux System. There they stop his Planedium Bomb from destroying the entire universe. They later return to Earth to confront and defeat Don Armage once and for all. Lucky/Shishi Red is a naïve young man with both amazing luck and a strong will from in the . Because of his interpersonal skills and faith in others, he becomes a key member of the Kyurangers, not only helping the entire team to gather, but also helping with their personal troubles on several occasions. Apparently a man who is blissfully unaware of Jark Matter's universal campaign, Lucky later learns that he is actually a refugee prince from in the . This eventually resulted in Lucky becoming his homeworld's king after it is revealed that his father Aslan was supposed to be murdered by Jark Matter's Fuku Shogun Kukulga years ago. He eventually finds out, along with Tsurugi, that Aslan is actually alive, but was turned into one of Don Armage's brainwashed thralls. Thanks to his fellow Kyurangers, Lucky agrees with their advice that their main priority is to save the entire universe first, in order to save his father from Don Armage's control. Lucky is also a descendant of Orion, meaning he and his royal family inherited the blood of the Orion and Leo Systems. After Don Armage is defeated, Lucky resumes his travels through the universe with Garu accompanying him. Despite his amazing luck, Lucky is subjected to constellation fortune and his prowess is badly affected when receiving bad luck. His luck and spirit is actually so much stronger than his ancestors. This makes him immune from having Don Armage project the fragments of his soul for his future resurrection onto Lucky's body. He transforms into . As the Shishi Red, Lucky's main weapon is the . Shishi Red has two finishers: via the Seiza Blaster and via the Kyu Sword. Unlike the others, Lucky's suit has no unique features. He is based on Zeus (Jupiter). Lucky is portrayed by . As a child, Lucky is portrayed by . Stinger/Sasori Orange is a cool, mysterious man with a scorpion-like tail that can conjure a poison in its stinger to poison his targets, organic and robot alike. He is from in the . Following his brother's betrayal of their planet, Stinger spent the rest of his life searching for him until he was scouted by Shou as the first Kyuranger, . Ever since that day, he spied on Jark Matter for the Rebellion until he exposed his cover on Earth to save Kotaro and Jiro. At one point, he was a witness to the death of Dr. Anton's good-half and was accused of murder by Champ before he cleared up the misunderstanding as the two became partners with Stinger's encounter with Mika Reetz reaffirming his goal to kill Scorpio. During his final battle with Scorpio, Stinger injected himself with own venom to use their people's technique to boost his strength while depleting his life. Fortunately, Scorpio extracted the poison from Stinger's body after being defeated by him. When Champ is kidnapped by none other than a still alive Dr. Anton, who is later revealed to be his evil-half in a robotic body, Stinger destroys the mind control chip within Champ's body, freeing him on behalf of Good Dr. Anton's spirit. After Don Armage is defeated, Stinger is promoted as a new commander of the Kyurangers. As the Sasori Orange, Stinger's main weapon is the . Sasori Orange has two finishers in his usual form: via the Seiza Blaster and via the Kyu Spear. When Sasori Orange uses the Ikkakuju Kyutama, he becomes whose finisher is the impalement attack. Stinger's suit differs from the others in that he retains his tail, which he can utilize as a weapon. He is based on Poseidon (Neptune). Stinger is portrayed by . As a child, Stinger is portrayed by . Garu/Ookami Blue is a wolf-like alien from the who lost his pride, homeworld, and entire clan to Jark Matter. He speaks in a Hiroshima accent and often ends his sentences with "~garu" and "~ja ke". He lived on , where refugees live, until Lucky helped him to recover from his trauma and move on to fight for his own life. While not the brightest or most patient, Garu is always reliable in battle and becomes Lucky's most trusted partner. He transforms into . After Don Armage is defeated, Garu now travels with Lucky through space. As the Ookami Blue, Garu's main weapon is the . When exposed to moonlight-like energy from Shishi Red Moon, he gains a power boost where his intelligence is increased to give him a more swift and elegant fighting style. Ookami Blue has two finishers: via the Seiza Blaster and via the Kyu Claw. Garu's suit differs from the others in that it has claws on both the boots and the gloves while the velvety fabric resembles wolf fur rather than spandex. It is complete with a furry collar. He is based on Apollo. Garu is voiced by . Balance/Tenbin Gold is a mechanical life form with the ability to control machines from the . He is the youngest member of his clan despite having lived for about 300 years. He is smooth-talking and dramatic. He met Naga during a robbery on the Ophiucus System and formed the duo. Since then, the two either started stealing goods from Jark Matter or served as bounty hunters for said faction until their encounter with Lucky and the Kyurangers allowed them to unlock their Kyutamas and join the Rebellion. He transforms into . After Don Armage's defeat, Balance and Naga restart their BN Thieves team, dedicating themselves to salvaging treasures pilfered by Jark Matter. As the Tenbin Gold, Balance's main weapon is the . When exposed to sunlight-like energy from Taiyou Shishi Red, he gains a power boost where his speed and agility are increased to give him a more rapid-fire attack fighting style. Tenbin Gold has two finishers: via the Seiza Blaster and via the Kyu Crossbow. Balance's suit differs from the others in that it is more mechanical and resembles armor rather than spandex. He is based on Hermes (Mercury). Balance is voiced by . Champ/Oushi Black is a bull-themed fighting robot from the , happy-go-lucky yet hot-blooded ladies' man while incredibly loyal to his friends. As Champ later found out, he was originally built as a war machine designated as a meant for Jark Matter's use. But the project's overseer, Champ's creator Doctor Anton, later revealed to be his good-half after separating himself from his evil-half, ran off with Champ as he made the robot good-willed, while teaching him to value all life in the universe. He was a professional wrestler for nine years until he became champion the day the good Anton was assassinated by Scorpio. Champ, assuming Stinger was the good Anton's killer, joined the Rebellion. He transforms into . Champ eventually makes amends with Stinger once learning the truth of the good Anton's death as the two join forces to hunt down Scorpio. But Champ is damaged after taking a blow for Stinger and taken to Rebellion Headquarters to be repaired before joining in the Kyurangers' final battle with Scorpio. After placing Shou in suspended animation when they remain in the past to help him set up the Kyurangers' formation in the future, Champ learns the truth of his origins and feels ashamed to the point of disguising himself and going by the alias (although all the other Kyurangers, except for Garu, easily see through the disguise) while hunting his "older brother" Zero. Though he rejoins the Kyurangers, Champ is subjected to a series of berserker rages due to a mind control chip created by a still alive Anton's evil-half. This causes him to be brainwashed into his war machine directive before Stinger saves him through surgical precision. After Don Armage is defeated, Champ returns to the robot wrestling circuit, regaining his championship belt and going on to have a 99-win streak. As the Oushi Black, Champ's main weapon is the . Oushi Black has two finishers: via the Seiza Blaster and via the Kyu Axe. Champ's suit differs from the others in that it is bulkier and more mechanical in appearance, with the sides of his visor extended past his helmet to resemble bull horns. The only difference between Oushi Black's untransformed state and his transformed state is that the latter has a helmet and chest armor. He is based on Hephaestus (Vulcan). Champ is voiced by . Naga Ray/Hebitsukai Silver is a young man with the ability to paralyze his targets for a short time from the , whose people are identical in facial appearance. Although his race had long ago sealed their emotions as a result of a catastrophic war on their planet, his peculiar interest in emotions led to an encounter with Balance and they partnered as bounty hunters. Once he and Balance initially met the first five Kyurangers as their bounties, Naga quickly befriends Lucky instead of tricking them to be handed over to Jark Matter in the hopes of learning more about emotions as well as the difference between good and evil. Because of Naga's decision to risk his life to stand by Lucky's side, this influenced Balance to save them and unlock their respective Kyutamas, allowing Naga to transform into . After the team's mission on Planet Toki, Naga becomes troubled by his lack of emotions which causes him to be manipulated by Akyanba into becoming and swaying him to Jark Matter's side. Lucky and Balance manage to regain him by exorcising the Micro Tsuyoindaver from his brain. After Don Armage's defeat, Naga and Balance reform the BN Thieves, dedicating themselves to retrieve treasures stolen by Jark Matter. As the Hebitsukai Silver, Naga's main weapon is the . Hebitsukai Silver has two finishers: via the Seiza Blaster and via the Kyu Sickle. After Akyanba unlocks his emotions, the brainwashed Dark Naga uses the and Dark Kyutama to transform into . In this form, his suit gains some extra purple and yellow coloring, with the snake emblem on his helmet partially painted red, as well as a snake eye-like ornament on his chest that allows him to fire a powerful laser beam. The edge of his Kyu Sickle, known as the , is also colored purple. Naga retains this power-up, minus the chest ornament and helmet emblem repaint, after being freed from his brainwashing. Hebitsukai Metal has two finishers: via the (Dark) Seiza Blaster in conjunction with the Kyutama and via the (Dark) Kyu Sickle in conjunction with the Dark Kyutama. He is based on Ares (Mars). Naga Ray is portrayed by , who also portrays the residents of Ophiucus System. Hammie/Chameleon Green is a young ninja girl with the ability to become invisible from the who has mastered the powerful ninja arts, passed down through the generations of her family. As a child, she was an introvert who gained courage to speak after alerting her villagers of Jark Matter's invasion. This eventually changed her into an outspoken woman. She is usually envious of Lucky's fortunate streaks, which he is completely oblivious to. She transforms into . After Don Armage is defeated, Hammie attends university to become a school teacher. During the events of Uchu Sentai Kyuranger vs. Space Squad, Hammy is extorted by Space Ninja Demost while he held her mentor Tsurukiku captive to steal the four Neo Kyutama being developed by the Space Federation for his use in taking over Earth. This caused a conflict of interest among the Kyurangers as Hammie gives the Neo Kyutama to Demost for his use as cores to resurrect past Super Sentai villains Basco Ta Jolokia, Escape, Juzo Fuwa and Mele. While regretting her actions before Lucky's group cleared her name while saving Tsurukiku, Hammy bonded with Mele and took her sacrifice to heart as she helps defeat Demost. As the Chameleon Green, Hammie's main weapon is the . Chameleon Green has two finishers: via the Seiza Blaster and via the Kyu Rapier. Hammie's suit differs from the others in that her helmet resembles a chameleon's head facing upward, with the eyes popped out and the mouth acting as a visor. She is based on Athena (Minerva). Hammie is portrayed by . As a child, Hammie is portrayed by . Raptor 283/Washi Pink is an android built on Planet Rebellion in the , based on non-combatant android designs developed by Tsurugi, to serve as both Shou's secretary and the pilot for the Orion. Serious and loyal, she is a daydreamer who is often prone to delusions. Raptor is encouraged by Lucky to make her dream of becoming a Kyuranger a reality, allowing her to acquire the Washi Kyutama and become . As the Washi Pink, Raptor's main weapon is the . Washi Pink has two finishers: via the Seiza Blaster and via the Kyu Shot. Raptor's suit differs from the others in that it has a pair of eagle wings in the back, which allow her to fly. She is based on Aphrodite (Venus). Raptor 283 is voiced by M·A·O, who previously played Luka Millfy/Gokai Yellow in Kaizoku Sentai Gokaiger. Spada/Kajiki Yellow is a man from the who aims to become the best cook in the universe. Often serving as a parent figure to his teammates, he is reliable albeit not always sincere. He likes to make food or cooking-related metaphors which appear to be based on Italian and Greek cuisines, including some with his accented speech deriving from the Italian language. His dream to become a chef stems from his poor background after his planet was invaded by Jark Matter. This resulted in a great shortage of food. He had to take care of his starving siblings by cooking meals for them. He transforms into . After Don Armage is defeated, Spada finally fulfills his dream of opening a restaurant, where all the Kyurangers reunite. As the Kajiki Yellow, Spada's main weapon is the . Kajiki Yellow has two finishers: via the Seiza Blaster and via the Kyu Slasher. Spada's suit differs from the others in that the front of his visor protrudes significantly to resemble a swordfish's nose, which he can use to attack his targets. He is also capable of perfectly swimming underwater. He is based on Demeter (Ceres). Spada is portrayed by . Shou Ronpo/Ryu Commander is a dragon-like alien from the and commander of the Kyurangers. He tries to come off as imposing but just ends up behaving more like a mischievous old man. In reality, he is a guilt-ridden old man due to the loss of his predecessor and friend, Big Bear, constantly discouraging insubordination with the Kyurangers in fear of repeating his mistake. Despite that, he always manages to keep his composure even in the direst situations. Before forming the Kyurangers, Shou journeyed across various constellations to acquire the Skill Kyutamas. Originally, Shou's Change Kyutama, which allowed him to transform into , was incomplete due to the limit of its transformation state as a Skill Kyutama. Encouraged by the other Kyurangers to move on in honor of Big Bear, his Kyutama is upgraded by the combined energy of their Change Kyutamas to help complete its transformation state, allowing him to transform into . His meeting with Big Bear's spirit gives him the confidence to find the Argo and stop Jark Matter. Unlike the main Kyurangers, Shou uses the , a staff that he carries around like a cane, instead of a Seiza Blaster to transform into Ryu Violet/Commander. After Orion's death, Shou stays in the past with Champ to make the necessary preparations for the Kyurangers to assemble in the future, before he is put in a cold sleep inside the Battle Orion Ship, where he is found by the other Kyurangers in the present. After Don Armage is defeated, Shou, now the supreme commander of the Rebellion, promotes Stinger to succeed him as the new commander of the Kyurangers. As the Ryu Violet/Commander, Shou's main weapon is the Ryu Tsueider which has two modes: staff and rifle. Ryu Commander's finisher is the . Shou's suit differs from the others in that it has gold edging on the visor of his helmet, a pair of black shoulder pads and the jewel-like ornament seen on the other Kyurangers' left chest is displayed within the center instead. Once he upgrades into Ryu Commander, his suit is covered in a trenchcoat-like fabric, with gold edging, and he wears a golden version of the Kyu Buckle known as the . He is based on Hera (Juno). Shou Ronpo is voiced by , who also voices the dragon in Space 9. Kotaro Sakuma/Koguma Sky Blue is a young boy from Earth. Soon after his younger brother Jiro was born, they lost their mother to illness. He is first seen with Jiro by Lucky and the others defying Jark Matter's occupation. They are captured by Eriedrone to be used as bait to attract the Kyurangers, but Stinger, pretending to be his ally, rescues the two brothers. Kotaro reveals himself to be a spy sent by Shou and remind Stinger of his bond with his older brother Scorpio prior to the latter's betrayal and siding with Jark Matter. Inspired by Stinger, Kotaro decides to join the Rebellion. Stinger reminds him not to follow his brother's mistake. He later gains his own Change Kyutama from the spirit of Shou's predecessor, Big Bear, allowing him to transform into . Some time after joining, Kotaro leaves the team temporarily for training at the Rebellion HQ to become a full-fledged Kyuranger. He later returns to the team for the final battle against Scorpio and Jark Matter. As the Koguma Sky Blue, Kotaro utilizes hand-to-hand combat instead of a Kyu The Weapon like the main Kyurangers, though he later gains a Kyu Spear as his main weapon. Koguma Sky Blue has two finishers: via the Seiza Blaster and via the Kyu Spear. Kotaro's suit differs from the others in that, aside from being child-sized to reflect his young age, it is decorated with two accessories: a scarf around his neck, which he can remove to wield as a meteor hammer, and a pair of mittens over his gloves, which he can uncover to reveal bear-like claws for scratching enemies. His helmet also has protrusions that resemble bear ears. He is based on Hestia (Vesta). Kotaro Sakuma is portrayed by . Tsurugi Ōtori/Houou Soldier is the former head scientist of the now abandoned Tsurugi Ōtori Science Laboratory from three centuries ago. He became the first human to travel into space where he obtained the Houou Kyutama, thus becoming immortal and uniting the universe as the first president of the Space Federation. When Jark Matter was founded to destroy what he established, Tsurugi founded the Kyurangers which he led alongside Orion. Ultimately, losing allies like his team strategist Cuervo, Tsurugi sacrificed his immortality in an attempt to destroy Don Armage. But the attack failed and Orion placed Tsurugi in suspended animation within the Argo while splitting up its Kyutama into the Ho, Ryukotsu and Tomo Kyutamas. In the present day, Tsurugi is revived by the Kyurangers after they reform the Argo Kyutama. Tsurugi soon realizes that the records of his past achievements and the original Kyurangers have been erased from history by Jark Matter, Armage having targeted Earth for being Tsurugi's home world. Unlike the main Kyurangers, but similar to Shou and his Ryu Tsueider, Tsurugi uses the and combo instead of a Seiza Blaster to transform into the red and navy-colored . During the final battle, Tsurugi ends up being possessed by Armage and forced to absorb Shou Ronpo. However, thanks to Lucky's plan, both Tsurugi and Shou are rescued from inside Don Armage, leaving him hostless and vulnerable. After Jark Matter's, Tsurugi resumes his position as president of the Space Federation. As the Houou Soldier, Tsurugi's main weapons are the Houou Blade and Houou Shield. Houou Soldier's finisher is the . When joined by a Kyuranger using their Kyu The Weapon, they can perform the finisher. Tsurugi's suit differs from the others in that it is made from a leather-like fabric, with a collar that resembles the base piece of the Kyutamas. His helmet is also both adorned with a monaural headset-like piece and covered with a visor in the front. He is based on Artemis (Diana). Tsurugi Ōtori is portrayed by . Kyutamas The are magical stones that give the Kyurangers their powers. Each of them are numbered and contain a power associated with a different constellation. By setting a Kyutama into their Kyu The Weapon, a Kyuranger can perform a variation of its finisher. Change The allow the Kyurangers to transform and pilot their Kyu Voyagers. 01. : Lucky's personal Leo-based Change Kyutama which allows him to transform into Shishi Red and pilot the Shishi Voyager. 02. : Stinger's personal Scorpio-based Change Kyutama which allows him to transform into Sasori Orange and pilot the Sasori Voyager. 03. : Garu's personal Lupus-based Change Kyutama which allows him to transform into Ookami Blue and pilot the Ookami Voyager. 04. : Balance's personal Libra-based Change Kyutama which allows him to transform into Tenbin Gold and pilot the Tenbin Voyager. 05. : Champ's personal Taurus-based Change Kyutama which allows him to transform into Oushi Black and pilot the Oushi Voyager. 06. : Naga's personal Ophiuchus-based Change Kyutama which allows him to transform into Hebitsukai Silver and pilot the Hebitsukai Voyager. In Dark Naga's hands, it becomes the Kyutama which allows him to transform into Hebitsukai Metal. Its digit number is replaced with a small Jark Matter emblem. 07. : Hammie's personal Chamaeleon-based Change Kyutama which allows her to transform into Chameleon Green and pilot the Chameleon Voyager. 08. : Raptor's personal Aquila-based Change Kyutama which allows her to transform into Washi Pink and pilot the Washi Voyager. 09. : Spada's personal Dorado-based Change Kyutama which allows him to transform into Kajiki Yellow and pilot the Kajiki Voyager. 10. : Shou's personal Draco-based Change Kyutama which allows him to transform into Ryu Commander and pilot the Ryu Voyager. It was originally a Skill Kyutama that could only transform him into Ryu Violet until the other Kyurangers upgraded it using the energy of their Change Kyutamas. 11. : Kotaro's personal Ursa Minor-based Change Kyutama which allows him to transform into Koguma Skyblue and pilot the Kuma Voyager. It was created from the Ooguma Kyutama by Big Bear. 12. : Tsurugi's personal Phoenix-based Change Kyutama which allows him to transform into Houou Soldier and pilot the Houou Voyager. It also granted him the power of immortality, which he relinquished in order to defeat Don Armage 300 years ago. Skill The either give extra powers to the Kyurangers or bring unusual effects that reflect a real-life basis. 13. : An Orion-based Skill Kyutama that is used to pilot the Orion Voyager and the Orion Battler. It was originally lost in the past until Shishi Red met Orion's spirit, who transforms his abandoned club into his Kyutama namesake. 14. : A Horologium-based Skill Kyutama with the power to travel briefly to the past. It was detected on in the and retrieved after the Kyurangers twisted all twelve keys within 30 minutes. Because of energy consumption, it can only be used twice before disappearing. 15. : A Boötes-based Skill Kyutama that increases the user's speed. 16. : A Serpens-based Skill Kyutama that creates multiple projections of snakes. 17. : An Antlia-based Skill Kyutama that generates an energy pump. 18. : A Hercules-based Skill Kyutama that enhances the user's strength. 19. : A Pyxis-based Skill Kyutama that projects a holographic map for the user to locate the components of the Argo. However, it takes some time to recharge after being used to find each of them. It was detected on in the and retrieved by the Kyurangers. 20. : A Telescopium-based Skill Kyutama that projects a homing scope for the user to shoot at long distances. 21. : A Cancer-based Skill Kyutama that generates an energy pincer claw on the user's hand. 22. : An Ursa Major-based Skill Kyutama that causes Koguma Skyblue to grow to giant size. 23. : A Pisces-based Skill Kyutama that materializes a large fish. 24. : A Scutum-based Skill Kyutama that generates an energy shield. 25. : A Gemini-based Skill Kyutama that creates duplicates of the user or anyone the user shoots. 26. : An Aries-based Skill Kyutama that puts anyone the user shoots to sleep. 27. : A Monoceros-based Skill Kyutama that allows Sasori Orange to become where he can perform the finisher. It was created when Mika Retsu's energy was absorbed into an empty Kyutama immediately after her death. 28. : An Aquarius-based Skill Kyutama that fires a stream of water. 29. : A Capricorn-based Skill Kyutama that records a video message for later reproduction. 30. : A Corona Borealis-based Skill Kyutama that materializes a crown. 31. : A Centaurus-based Skill Kyutama. 32. : A Pavo-based Skill Kyutama. 33. : A Pegasus-based Skill Kyutama that summons , a horse-themed sentient body armor who speaks in a Kansai accent, which a Kyuranger can combine with to become a , also known as the , where they gains the ability to utilize blinding dash attacks. Shishi Red combines with Pega-san to become . By setting this Kyutama into the Kyu Sword, he can perform the finisher while assisted by four other Kyurangers using their Kyu The Weapons. Kajiki Yellow can also combine with Pega-san to become . Pega-san is voiced by . 34. : A Coma Berenices-based Skill Kyutama that gives people new hairstyles. 35. : A Sagittarius-based Skill Kyutama that fires countless energy arrows. 36. : A Perseus-based Skill Kyutama that is one of the four components necessary to break Jark Matter's powerful barrier protecting the Crux System. It was created when the energy in the treasure box was absorbed into an empty Kyutama after the Kyurangers found the box, hidden in the castle on in the Perseus System. 37. : A Cetus-based Skill Kyutama that fires a stream of water. 38. : A Cassiopeia-based Skill Kyutama that materializes a 12-colored baseball-sized bomb used for a finisher and is one of the four components necessary to break Jark Matter's powerful barrier protecting the Crux System. It was created when the Cassiopeia System's energy was absorbed into an empty Kyutama on in the Cassiopeia System. 39. : A Lacerta-based Skill Kyutama that enables the user to climb on wall structures. 40. : An Andromeda-based Skill Kyutama that materializes chains and is one of the four components necessary to break Jark Matter's powerful barrier protecting the Crux System. 41. : A Microscopium-based Skill Kyutama that gives the user microscopic vision. After modified by Balance, it can also shrink the user to a micro size. 42. : A Canes Venatici-based Skill Kyutama that increases the user's sense of smell. 43. : A Camelopardalis-based Skill Kyutama that elongates the user's neck. 44. : A Volans-based Skill Kyutama that enhances the user's swimming capabilities. 45. : A Corvus-based Skill Kyutama that traps the target in a world of despair created by the Kyutama. 46. : A Norma-based Skill Kyutama that materializes a ruler and a chalk. 47. : A Sculptor-based Skill Kyutama. 48. : A Delphinus-based Skill Kyutama. 49. : A Circinus-based Skill Kyutama that materializes a chalkboard compass. 50. : An Ara-based Skill Kyutama. 51. : A Virgo-based Skill Kyutama that increases the user's feminine qualities. If the user is male, it disguises them as a female. 52. : A Canis Major-based Skill Kyutama that enables the user to use the dog fighting style. 53. : A Triangulum-based Skill Kyutama. 54. : A Cepheus-based Skill Kyutama that is one of the four components necessary to break Jark Matter's powerful barrier protecting the Crux System. It was created when the great monk infused his energy into an empty Kyutama as his sign of gratitude after the Kyurangers saved him at the on in the Cepheus System. 55. : A Lyra-based Skill Kyutama that produces soothing music. 56. : A Cygnus-based Skill Kyutama. 57. : A Musca-based Skill Kyutama. 58. : A Columba-based Skill Kyutama that materializes several doves. 59. : A Pictor-based Skill Kyutama that enhances the user's painting capabilities, allowing them to predict the intermediate future by painting a scene. It was given to Naga by Hoshi Minato. 60. : An Eridanus-based Skill Kyutama that generates a stream of water that reveals the target's true identity. 61. : A Tucana-based Skill Kyutama. 62. : An Auriga-based Skill Kyutama that turns anyone into a motorcycle for the user. 63. : An Equuleus-based Skill Kyutama. 64. : A Crater-based Skill Kyutama that materializes several drinking glasses. 65. : A Hydrus-based Skill Kyutama that enables the user to use the snake fighting style. 66. : A Canis Minor-based Skill Kyutama that enables the user to act like a playful puppy. 67. : A Hydra-based Skill Kyutama. 68. : A Lepus-based Skill Kyutama that enhances the user's jumping capabilities. 69. : A Caelum-based Skill Kyutama that generates an energy chisel. 70. : An Indus-based Skill Kyutama. 71. : A Mensa-based Skill Kyutama. 72. : An Apus-based Skill Kyutama that enables the user to move instantly from one place to another. 73. : A Crux-based Skill Kyutama. 74. : A Piscis Austrinus-based Skill Kyutama. 75. : A Triangulum Australe-based Skill Kyutama. 76. : A Corona Austrina-based Skill Kyutama. 77. : A Leo Minor-based Skill Kyutama that is used to summon the Kojishi Voyager. 78. : A Reticulum-based Skill Kyutama. 79. : A Sextans-based Skill Kyutama that materializes a sextant. 80. : An Octans-based Skill Kyutama that materializes an octant. 81. : A Grus-based Skill Kyutama that enables the user to use the crane fighting style. 82. : A Vulpecula-based Skill Kyutama that enables the user to turn invisible. 83. : A Fornax-based Skill Kyutama that materializes a perfectly lit campfire. 84. : A Sagitta-based Skill Kyutama that materializes baseball clothing and equipment. 85. : A Lynx-based Skill Kyutama that enables the user to use the cat fighting style. 86. : A Vela-based Skill Kyutama that is one of the three components necessary to complete the Argo Kyutama. It was detected on Planet Vela in the Vela System and given to the Kyurangers by the planet's natives as their sign of gratitude. 87. : A Carina-based Skill Kyutama that is one of the three components necessary to complete the Argo Kyutama. It was detected on Planet Keel in the Carina System and stolen by Scorpio. 88. : A Puppis-based Skill Kyutama that is one of the three components necessary to complete the Argo Kyutama. It was detected from within a Death Worm on Earth. Although the Kyutama was ejected from said monster by Ryuteioh, it falls into Ikargen's hands until it is reclaimed by the Kyurangers after defeating him. 89. : An Argo Navis-based Skill Kyutama, obtained by assembling the Ho, Ryukotsu and Tomo Kyutamas. When used, it reveals the Argo where Tsurugi was put in a cryogenic sleep waiting to be called out again to defend the universe. 111. : A Cerberus-based Skill Kyutama that is used to summon the Kerberos Voyager. It was created when the Shishi Kyutama Cockpit combined with the Kerberos Voyager. 315. : A Kyutama that allows Shishi Red to become the white-colored , also known as the , where he gains the ability to open portals for teleportation purposes. He can also summon any of the 12 Kyurangers' weapons. By pressing this Kyutama's top button before spinning its ring-like disc, he can perform the finisher. This Kyutama was created when Lucky fought alongside his ancestor, Orion. Special These unique Kyutama possess exclusive attributes. Unlike other Kyutamas, they are inscribed with letters instead of numbers. KR. : A Kamen Rider-based Kyutama that summons Kamen Rider Ex-Aid. This Kyutama was only used once, as it vanished after Ex-Aid finished his deed. SP. : A Kyutama whose power is unknown, but is placed in the Kyulette along with the Change Kyutamas. When chosen, it indicates that all of the Kyurangers must be deployed for the mission. SP. : A Kyutama that is used to summon all of the Kyurangers' Kyu Voyagers at once. SUN/MOON. : A dual-sided Kyutama with two modes that is used by a Kyuranger, mostly Shishi Red, to upgrade their form depending on which half is loaded into the Seiza Blaster. By pressing the top button of this Kyutama's currently unused mode, they can perform the finisher. : A Sun-based half which allows a Kyuranger to become a , also known as the , where their personalities are more enthusiastic for them to enhance their attacks with solar energy. They can also execute an attack called where they emit a sunlight-like glow that can increase Tenbin Gold's power. Shishi Red uses it to become . Chameleon Green can also use it to become . : A Moon-based half which allows a Kyuranger to become a , also known as the , where their personalities are more sophisticated for them to enhance their attacks with lunar energy. They can also execute an attack called where they emit a moonlight-like glow that can increase Ookami Blue's power. Shishi Red uses it to become . Chameleon Green can also use it to become . Xmas. : A holiday-based Kyutama that materializes Christmas decorations. Kyu Voyagers The are the Kyurangers' mecha, each associated with one of the Kyutamas. The Kyurangers' nine main personal Kyu Voyagers are stored within the Orion. After the Orion's destruction, most of them are launched into battle from the Battle Orion Ship. : Shishi Red's personal Leo-themed Kyu Voyager. : Shishi Red's auxiliary lion-themed Kyu Voyager, which can combine with the Shishi Voyager to form the . It is in a palm-sized form until it is enlarged via the Kojishi Kyutama. It was named by Lucky when he was a child and given to him by his father. Somehow, Garu is able to communicate with it. : Sasori Orange's personal Scorpius-themed Kyu Voyager. : Ookami Blue's personal Lupus-themed Kyu Voyager. : Tenbin Gold's personal Libra Kyu Voyager. Its finisher is the . : Oushi Black's personal Taurus-themed Kyu Voyager. : Hebitsukai Silver's personal Ophiuchus Kyu Voyager. Its finisher is the Happy Splash. : Chameleon Green's personal Chamaeleon-themed Kyu Voyager. : Washi Pink's personal Aquila-themed Kyu Voyager. : Kajiki Yellow's personal Dorado-themed Kyu Voyager. : Ryu Commander's personal Draco-themed Kyu Voyager. Originally, it did not have the golden helmet-like when Ryu Commander was in his incomplete Ryu Violet form. Its finisher is the . : Koguma Skyblue's personal Ursa-themed Kyu Voyager. Unlike other Kyu Voyagers, it is composed of two separate Kyu Voyagers. : A Ursa Minor-themed Kyu Voyager that is much smaller than the rest of the Kyu Voyagers. : An Ursa Major-themed Kyu Voyager that carries the Koguma Voyager on its back. : Houou Soldier's personal phoenix-themed Kyu Voyager. : A satellite-like structure used as part of Gigant Houoh. : The Houou Voyager's self-propelled launch pad where it is stored between missions. : A giant battleship that becomes the Kyurangers' base of operations after the Orion's destruction. It was created by Orion as the ultimate weapon against Jark Matter, with Shou modifying its interior to match the Kyurangers' previous Orion. It is large enough to store the Kyu Voyagers (excluding Houou Voyager) inside. It can also transform into a cannon weapon to be empowered by the Kyurangers' giant robots for them to perform the finisher. : Shishi Red Orion's personal Kyu Voyager, which is part of the Battle Orion Ship. : A Cerberus-themed Kyu Voyager that appears in the film Uchu Sentai Kyuranger the Movie: Geth Indaver Strikes Back. Originally known as the for possessing the power to destroy planets, the needed to summon it was split into three fragments hidden on the Planets , , and in the dangerous . Geth Indaver manages to summon Kerberos before the Kyurangers manage to pacify it into a Voyager Machine which they used to destroy the Geth Star, the Kerberos Stone fragments returning to their respective planets. Kyutama Combinations The Kyu Voyagers can be assembled into larger mecha via . The finisher for all three robots is the . Kyurenoh is the Kyurangers' first giant robot composed of the Shishi Voyager and four other Kyu Voyagers. As each Kyu Voyager possesses a specific ability, its myriad of possible combinations give Kyurenoh much more flexibility in combat along with a variation of its finisher. Kyurenoh (01-03-05-07-09): The primary arrangement composed of the Shishi, Ookami, Oushi, Chameleon, and Kajiki Voyagers. Its finisher is the . Kyurenoh (01-02-04-06-08): The secondary arrangement composed of the Shishi, Sasori, Tenbin, Hebitsukai, and Washi Voyagers. This arrangement appears exclusively in the film Kamen Rider × Super Sentai: Ultra Super Hero Taisen. Kyurenoh (01-03-04-05-06): An alternate arrangement composed of the Shishi, Ookami, Tenbin, Oushi, and Hebitsukai Voyagers. Its finisher is the . Kyurenoh (01-03-06-07-09): An alternate arrangement composed of the Shishi, Ookami, Hebitsukai, Chameleon, and Kajiki Voyagers. Its finisher is the . Kyurenoh (01-03-05-08-09): A alternate arrangement composed of the Shishi, Ookami, Oushi, Washi, and Kajiki Voyagers. Its finisher is the Kyurenoh Meteor Break. Kyurenoh (01-04-06-08-09): An alternate arrangement composed of the Shishi, Tenbin, Hebitsukai, Washi, and Kajiki Voyagers. Its finishers are the Kyurenoh Meteor Break and , which is first performed in the film Kamen Rider × Super Sentai: Ultra Super Hero Taisen. Kyurenoh (01-02-03-05-07): An alternate arrangement composed of the Shishi, Sasori, Ookami, Oushi, and Chameleon Voyagers. Its finisher is the , which is performed with the other four Kyu Voyagers. Kyurenoh (01-03-04-07-09): An alternate arrangement composed of the Shishi, Ookami, Tenbin, Chameleon, and Kajiki Voyagers. Its finisher is the , which is performed via the power of the Pegasus Kyutama. Kyurenoh (01-02-04-06-07): An alternate arrangement composed of the Shishi, Sasori, Tenbin, Hebitsukai, and Chameleon Voyagers. Kyurenoh (01-02-03-07-08): An alternate arrangement composed of the Shishi, Sasori, Ookami, Chameleon, and Washi Voyagers. Its finisher is the Kyurenoh Meteor Break. Kyurenoh (01-02-07-08-09): An alternate arrangement composed of the Shishi, Sasori, Chameleon, Washi, and Kajiki Voyagers. Its finisher is the , which is performed with the Ryu Voyager. Kyurenoh (01-02-03-05-11): An alternate arrangement composed of the Shishi, Sasori, Ookami, Oushi, and Kuma Voyagers. Kyurenoh (01-06-07-08-09): An alternate arrangement composed of the Shishi, Hebitsukai, Chameleon, Washi, and Kajiki Voyagers. Its finisher is the Kyurenoh Meteor Break. Kyurenoh (01-04-06-07-09): An alternate arrangement composed of the Shishi, Tenbin, Hebitsukai, Chameleon, and Kajiki Voyagers. Its finisher is the Kyurenoh Meteor Break. Kyurenoh (01-03-07-08-09): An alternate arrangement composed of the Shishi, Ookami, Chameleon, Washi, and Kajiki Voyagers. Its finisher is the Kyurenoh Meteor Break. Kyurenoh (01-03-06-07-08-09): A special arrangement composed of the Shishi, Ookami, Hebitsukai, Chameleon, Washi, and Kajiki Voyagers. Kyurenoh (01-02-07-09-11): An alternate arrangement composed of the Shishi, Sasori, Chameleon, Kajiki, and Kuma Voyagers. Its finisher is the Triple Meteor Break alongside Ryuteioh and Gigant Houoh. Kyurenoh (01-03-03-07-07): An alternate arrangement composed of the Shishi, Ookami, duplicated Ookami, Chameleon, and duplicated Chameleon Voyagers. Its finisher is the . Kyurenoh (01-02-05-08-09): An alternate arrangement composed of the Shishi, Sasori, Oushi, Washi, and Kajiki Voyagers. Its finisher is the Kyurenoh Meteor Break. Kyurenoh (01-02-05-07-09): An alternate arrangement composed of the Shishi, Sasori, Oushi, Chameleon, and Kajiki Voyagers. Kyurenoh (01-06-07-09-11): An alternate arrangement composed of the Shishi, Hebitsukai, Chameleon, Kajiki, and Kuma Voyagers. Its finisher is the Kyurenoh Meteor Break. Kyurenoh (04-06-09-11-77): An alternate arrangement composed of the Shishi, Tenbin, Hebitsukai, Kajiki, and Kuma Voyagers. Unlike other arrangements, the Kojishi Kyutama Cockpit replaces the Shishi Kyutama Cockpit in this combination. Kyurenoh (01-04-05-07-09): An alternate arrangement composed of the Shishi, Tenbin, Oushi, Chameleon, and Kajiki Voyagers. Its finisher is the Triple Meteor Break alongside Ryuteioh and Gigant Houoh. Kyurenoh (01-02-04-05-06): An alternate arrangement composed of the Shishi, Sasori, Tenbin, Oushi, and Hebitsukai Voyagers. This arrangement is piloted with Koguma Skyblue operating the Shishi Voyager instead of Shishi Red. Super Kyurenoh is an enhanced version of Kyurenoh composed of the Super Shishi Voyager and four other Kyu Voyagers. It is armed with a giant cannon that can activate a to shoot multiple enemies in rapid succession. Super Kyurenoh (03-05-07-09-77): The default arrangement composed of the Ookami, Oushi, Chameleon, Kajiki, and Super Shishi Voyagers. Its finisher is the . Super Kyurenoh (03-04-06-09-77): An alternate arrangement composed of the Ookami, Tenbin, Hebitsukai, Kajiki, and Super Shishi Voyagers. Super Kyurenoh (04-06-09-11-77): An alternate arrangement composed of the Tenbin, Hebitsukai, Kajiki, Kuma, and Super Shishi Voyagers. Its finisher is the Super Kyurenoh Final Break. Super Kyurenoh (02-05-09-11-77): An alternate arrangement composed of the Sasori, Oushi, Kajiki, Kuma, and Super Shishi Voyagers. Its finisher is the Super Kyurenoh Final Break. Super Kyurenoh (02-05-07-09-77): An alternate arrangement composed of the Sasori, Oushi, Chameleon, Kajiki, and Super Shishi Voyagers. Its finisher is the Super Kyurenoh Final Break. Super Kyurenoh (02-06-07-09-77): An alternate arrangement composed of the Sasori, Hebitsukai, Chameleon, Kajiki, and Super Shishi Voyagers. Super Kyurenoh (02-07-09-11-77): An alternate arrangement composed of the Sasori, Chameleon, Kajiki, Kuma, and Super Shishi Voyagers. Its finisher is the , which is performed via the power of the Pegasus Kyutama. Super Kyurenoh (04-05-07-09-77): An alternate arrangement composed of the Tenbin, Oushi, Chameleon, Kajiki, and Super Shishi Voyagers. Its finisher is the Super Kyurenoh Final Break. Ryuteioh is the Kyurangers' second giant robot composed of the Ryu Voyager and two other Kyu Voyagers. Ryuteioh (02-10-11): The default arrangement composed of the Sasori, Ryu, and Kuma Voyagers. Its finishers are the and the Triple Meteor Break alongside Kyurenoh and Gigant Houoh. Ryuteioh (07-09-10): An alternate arrangement composed of the Chameleon, Kajiki, and Ryu Voyagers. Its finisher is the Ryuteioh Meteor Break. Ryuteioh (04-06-10): An alternate arrangement composed of the Tenbin, Hebitsukai, and Ryu Voyagers. Its finisher is the Ryuteioh Meteor Break. Ryuteioh (03-04-10): An alternate arrangement composed of the Ookami, Tenbin, and Ryu Voyagers. Its finisher is the Ryuteioh Meteor Break. Ryuteioh (03-07-10): An alternate arrangement composed of the Ookami, Chameleon, and Ryu Voyagers. Ryuteioh (06-10-11): An alternate arrangement composed of the Hebitsukai, Ryu, and Kuma Voyagers. Its finisher is the Ryuteioh Meteor Break. Ryuteioh (03-05-10): An alternate arrangement composed of the Ookami, Oushi, and Ryu Voyagers. Its finisher is the Triple Meteor Break alongside KyurenOh and Gigant Houoh. Ryuteioh (08-09-10): An alternate arrangement composed of the Washi, Kajiki, and Ryu Voyagers. Its finisher is the Ryuteioh Meteor Break. Ryuteioh (03-06-10): An alternate arrangement composed of the Ookami, Hebitsukai, and Ryu Voyagers. Ryuteioh (07-08-10): An alternate arrangement composed of the Chameleon, Washi, and Ryu Voyagers. Ryuteioh (03-06-07-08-10): A special arrangement composed of the Ryu Voyager, the Ookami, Hebitsukai, Chameleon, and Washi Kyutamas and the rockets of Houou Voyager. Its finisher is the . Ryuteioh (03-08-10): An alternate arrangement composed of the Ookami, Washi, and Ryu Voyagers. Its finisher is the Ryuteioh Meteor Break. Ryutei Kyurenoh is the Kyurangers' first super giant robot composed of the Shishi Voyager, Ryu Voyager, and six other Kyu Voyagers. Ryutei Kyurenoh (01-02-03-05-07-09-10-11): The default arrangement composed of the Shishi, Sasori, Ookami, Oushi, Chameleon, Kajiki, Ryu, and Kuma Voyagers. Its finisher is the . Ryutei Kyurenoh (01-02-04-05-07-09-10-11): An alternate arrangement composed of the Shishi, Sasori, Tenbin, Oushi, Chameleon, Kajiki, Ryu, and Kuma Voyagers. Its finisher is the All-Star Scramble Break. Gigant Houoh is Houou Soldier's giant robot composed of the Houou Voyager and Houou Station, which is armed with the . Its finishers are the , the and the Triple Meteor Break alongside Kyurenoh and Ryuteioh. Kerberios is a special robot composed of the Kerberos, Oushi, Hebitsukai, Chameleon and Kajiki Voyagers, which has the ability to temporarily enlarge itself with the power of the Hikari Kyutama's Tsuki Mode to thousands of kilometers high. Its finisher is the . This combination appears exclusively in the film Uchu Sentai Kyuranger the Movie: Gath Indaver Strikes Back. Kyutamajin is the Kyurangers' second super giant robot composed of the Shishi Voyager, Houou Voyager, Houou Station and Houou Base, which are combined with the of the twelve Kyurangers' Kyu Voyagers. Its finishers are the and . In the finale, Kyutamajin uses a new finished called . Orion Battler is the Kyurangers' third super giant robot composed of the Battle Orion Ship and Orion Voyager. Although usually piloted by Shishi Red Orion, it can move on its own and support the Kyurangers in battle. Its finisher is the . Allies Hoshi Minato is known as the No.1 artist in the universe. He appears occasionally throughout the series but is formally introduced when the Kyurangers investigate his connection with Jark Matter. On that occasion, they discover he is being controlled by one of Don Armage's copies. After the copy is destroyed, Minato is released from his control and rallies his fans to rebel against Jark Matter. He is based on Hades (Dīs Pater). Hoshi Minato is portrayed by , who previously played Tsubasa Ozu/Magi Yellow in Mahou Sentai Magiranger and Masato Jin/Beet Buster in Tokumei Sentai Go-Busters. Jiro Sakuma is Kotaro's younger brother. Jiro Sakuma is portrayed by . Big Bear is a bear-like alien who was the Rebellion's original supreme commander and Shou's superior. After Big Bear sacrifices himself to save Shou by defeating both Ikargen and Mardakko, Shou leads the Kyurangers but is still traumatized by his death. It was later revealed that he is unable to ascend to the afterlife because of his worries over Shou's foolishness in commanding the Rebellion. With his ghost unveiled once Shishi Red used the Ooguma Kyutama. However, after Lucky told him how Shou commanded the team, and seeing Kotaro's bravery despite being a child, Big Bear entrusted the young boy with Koguma Kyutama, giving Big Bear a means to transform. After the battle, he finally gains confidence in Shou's team and returns to inhabit the Koguma Kyutama. Big Bear is voiced by . Eris is the forest spirit of Planet Keel in the Carina System who has the ability to manipulate plants. She has been charged with the protection of the Ryukotsu Kyutama, entrusted by Orion for centuries until Scorpio stole it. She later tells the Kyurangers about Tsurugi's past. Eris later met the Shou from the future, who entrusted her with the location of the Battle Orion Ship. In spite of her role, she has a ditzy personality, and a tendency to fall in love with whoever impresses her. Eris is portrayed by . Echidna is a woman from the Ophiucus System who came to Earth in the wake of Naga's brainwashing into Dark Naga. Although initially wanting to punish her own kin for obtaining emotions (something that is considered a crime in their home world), she decided to have faith in Naga after his purification and left the fate of the universe to the Kyurangers before departing. Echidna's main weapons are a sword and a gun. Like Naga and the rest of her kin, she can paralyze her targets for a short period. As with all members of Ophiucus System residents, she is portrayed by Taiki Yamazaki while being voiced by . Orion is a warrior from and one of the legendary 88 saviors who fought alongside Tsurugi in the past against Jark Matter. After Don Armage's apparent defeat, he placed Tsurugi into a slumber within Argo and entrusted Eris with the Ryukotsu Kyutama. His name would later be used by the Kyurangers' own ship, which he encountered sometime later in the past when they crashed from an attack. On that occasion, he joins forces with the Kyurangers and helps Lucky, who is his distant descendant, to unlock the Saiko Kyutama. However, after Don Armage is destroyed in the past, he dies from his wounds, thus Shou Ronpo and Champ both decide to stay in the past to play the part Orion would in setting up the events for the Kyurangers' assembling in the present. Aside from being regarded as the strongest warrior to exist, he wields a club during combat. It is also revealed that Orion is actually the ancestor of Planet Kaien's royal family, making Lucky his descendant. Orion is portrayed by . Aslan Lucky's father, was originally the king of Planet Kaien in the Leo System prior to Jark Matter's invasion. Though apparently killed by Kukulga, with Jumottsu using a facsimile to rule over Kaien, Aslan is revealed to be alive and possessed by Don Armage into his thrall to face the Kyurangers as one of Armage's lines of defense. Once freed from Don Armage's control by Lucky and his friends, Aslan covers the Kyurangers' escape as he sacrifices himself by using the Black Hole Kyutama to prevent Jark Matter's Planedium Bomb from destroying the universe. He is based on Rhea (Ops) Aslan is portrayed by . Jark Matter The is an organization of aliens that have conquered an untold number of planets, including and the 88 constellations that surround it. They gather , the planets' core energy, for a used to destroy the entire universe. The top members have an inrō-like as proof of authority which can also be used to enlarge them. Their troops are composed of , masked battle pseudo-lifeform combatants who are armed with the saber-like and pilot fighter crafts known as , and , enhanced battle pseudo-lifeform combatants who lead the Indavers, are armed with the club-like that double as a gun, and have the ability to enlarge. The top members' ranks mirror those of the shogunates from Japan's Edo period and those of the tyrants from Greece's ancient era. They are based on the Titans. Their main base of operations is within the , which is protected by an invisible barrier and heavily guarded. After Don Armage's plan to destroy the universe is revealed, most of its remaining members decide to rebel as well. Don Armage is the leader, or , of Jark Matter who was born from the collective despair of all life in the universe. Revealing himself when Tsurugi united the universe 300 years earlier, Armage established Jark Matter to destroy everything Tsurugi had built to thrive on the resulting misery, increase his power, and become a god. Although seemingly killed by Tsurugi, with one of his numerous clones destroyed by a time-displaced Shishi Red Orion, Armage survived by possessing Cuervo and retaliates by conquering Earth along with erasing records of Tsurugi and his comrades' achievements. Leading Jark Matter for the next 333 years, overseeing his campaign through holograms from in the Crux System, later revealed to be a test site for his doomsday device, Armage has his forces drain Planedium from conquered planets to create the universally destructive Planedium Bomb which he intends to use on Earth. After being expelled from Cuervo, Armage takes Tsurugi as his new host to become an immortal able to harness energy, until the other Kyurangers take measures to rescue him. Once forced out of Tsurugi and fully revealed in his natural form, Armage converts every life form in the universe besides himself and the Kyurangers into Planedium energy which he absorbs to assume a new form while calling himself the universe incarnate. But as Armage battles the Kyurangers, they manage to reach the despair-ridden people who help them before Armage is forced to release them all. A fatally wounded Armage makes a final attempt at cheating death by implanting the fragment of himself inside Lucky's body to eventually resurrect, but it backfires and the fragment is forced back into Armage's body as the Kyurangers finish him off. Despite appearing in holograms, Armage is able to transmit his energy for attacks or transform others into monsters by imparting a fragment of his essence into them. But as the Kyurangers learned when they faced his clones in the past, Armage is extremely powerful enough to easily overwhelm his opponents by launching massive blasts of dark energy. A small bullet that he fired was enough to penetrate a Kyuranger suit and would have succeeded in killing Lucky had Tsurugi not interfered. In combat, Armage and his clones wield the and later the . Armage and his clones are also capable of possessing other beings and use their innate abilities as his own, as was the case with Hoshi Minato, Aslan, Cuervo, and Tsurugi. Only Lucky is immune to Armage's possession ability. He is based on Cronus (Saturn). Don Armage is voiced by . Cuervo/Don Cuervo is a former prisoner of Jark Matter's boot camp from of . After his escape route was proven crucial in a plot to free his fellow inmates, Cuervo was hired by Tsurugi as his partner and since then travelled across the universe to hire another 86 warriors to overthrow Jark Matter. In the final battle against Don Armage, Cuervo sacrificed himself to shield Tsurugi so his friend could deal what they thought would be the deathblow on the tyrant. But what Tsurugi did not know was that Cuervo sold his soul to the surviving Armage to live, resulting in his rebirth as Armage's thrall . As Jark Matter begins their final experiment on Dark Planedium, having revealed his survival to Tsurugi on Southern Cross, Cuervo reveals himself to the Kyurangers and that he subverted Armage's will. Cuervo reveals his intent to allow Armage's goal to have the universe destroyed as an act of mercy so it can be recreated as a utopia, only for Armage to be extracted from him before Tsurgi lands the deathblow. As one of the 88 legendary saviors, Cuervo's main weapons are a pair of sai. When under the possession of Don Armage, becoming Tsurugi's equal in combat, Don Cuervo wields a pair of swords. Cuervo is voiced by . Vice Shoguns The are the second-highest-ranking trio of members of the Jark Matter, serving directly under the Shogun answering only to him. Instead of a Kyodainro, each of them carry a golden dragon pad on the right shoulder that allows them to enlarge and to shrink back to normal. They first appeared 300 years ago at the time of Jark Matter's creation, having battled Tsurugi while feigning knowledge of him. They were turned into cyborgs by Doctor Anton to prolong their lives. When Don Armage decides to treat the Kyurangers as an actual threat to himself, with his Fuku Shoguns being killed, he offers open positions of Fuku Shogun to the Karos who can destroy them. Doctor Anton gathers the remains of the Fuku Shoguns and combines them to create three-headed who use the Fuku Shoguns' weapons and use the . An enlarged Akyachuga is sent to defend Planet Southern Cross's core against the Kyurangers before being destroyed by Kyurenoh (01-02-03-05-11), Ryuteioh (07-09-10), and Gigant Houoh using Battle Orion Ship as a cannon. Tecchu is a Vice Shogun from in the . Initially a bare-fisted fighter in the past, his cyborg modifications armed him with the flail-like on his left arm. He is the oldest of the Vice Shoguns and fought Tsurugi in the past, though he feigned not knowing him while given orders to exterminate him with extreme prejudice. He is eventually defeated by the 12 Kyurangers on Planet Toki where he is destroyed by Kyutamajin. His remains are retrieved and used by Anton to create Akyachuga. Tetchu is voiced by . Akyanba is a Vice Shogun from in the . She is armed with the microphone-like , an upgraded version of the she used in the past. Following Tetchu's death, Akyanba is sent to deal with the Kyurangers and to unlock Naga's emotions with the aid of Micro Tsuyoindaver to serve her as Hebitsukai Metal. But Naga is later freed from her control and leads the Kyurangers in destroying Akyanba. Akyanba's remains are retrieved and used by Anton to create Akyachuga. Akyanba is voiced by , who previously played Yoko Usami/Yellow Buster in Tokumei Sentai Go-Busters, while her humanoid form is portrayed by . Kukuruga is a Vice Shogun from in the . He oversaw the conquest of Planet Kaien and secretly killed King Aslan while his son Lucky was spirited away into hiding within the Leo Minor System. In reality, he did not murder Aslan, but was involved with his downfall turning him into one of Don Armage's brainwashed servants and potential hosts. Originally armed with the saber when Jark Matter was founded, Kukulga has his left arm outfitted with cannon during the present. When sent by Don Armage to support Akyanba following Tetchu's death, Kukulga had an interest in Lucky as a result of the youth traveling back in time and defeating his past self. Kukulga later fights Shishi Red Orion on Kaien, where his act of supposedly murdering Aslan and Jumottsu and deceiving the Kaien people is exposed. Upon being defeated by Shishi Red Orion and the Kyurangers, Kukulga enlarges and dies fighting Super Kyurenoh (04-06-09-11-77) and Orion Battler. His remains are retrieved and used by Anton to create Akyachuga. Kukulga is voiced by . Aides is Tetchu's aide from in the . He has the hair-like and is armed with the lance-like . Though defeated by Shishi Red and Houou Soldier, Gyabura is enlarged before being destroyed by Kyutamajin. Voiced by . is Kukulga's aide from in the . He has the and the . Though defeated by Shishi Red Orion, Sasori Orange, Ookami Blue, Hebitsukai Silver, Chameleon Green, Washi Pink, and Houou Soldier, Dogyun is enlarged before creating a and being destroyed by Kyutamajin. Voiced by . Doctor Anton is a scientist who once worked for Jark Matter for many centuries, gradually turning himself into a cyborg to prolong his life. Anton also suffered from a dissociative identity disorder before his evil persona transferred itself into a receptacle called to stop his other self's ethical meddling and life forever. This resulted in Anton being able to act independent of his evil half, allowing him to leave Jark Matter to prevent the newly built Champ from being used for evil, and teaching his creation to value all forms of life. The good Anton is later murdered by Scorpio, while his surviving evil counterpart works for Jark Matter unopposed and transforms a majority of its high-ranked members into cyborgs. Briefly appearing before Champ on Planet Toki, the evil Anton later reveals himself to the Kyurangers during their search for Kyutamas to access the Crux system. With Mecha Mardakko's help, Anton Brain kidnaps Champ and restores his prime directive as a war machine before Stinger destroyed the berserker chip while freeing his ally from Anton Brain's control. Following the destruction of Planet Southern Cross, Anton Brain flees from the Kyurangers while installing himself into a Zero to regain full mobility as . Anton Zero is defeated by Shishi Red, Sasori Orange, Tenbin Gold, Oushi Black, Hebitsukai Silver and Koguma Skyblue's All Star Crash and upon enlarged, is destroyed by Kyurenoh (01-02-04-05-06) and Orion Battler. He is based on Janus. Doctor Anton is portrayed by . Zero The androids are a series created by Doctor Anton, appearing skeletal compared to Champ while outfitted with , the , and the . The first Zero is created by Akyanba and Kukulga using the blueprints left behind by Doctor Anton in a scheme to destroy the Kyurangers. While originally identical to Champ, the android's casing is destroyed by the real Champ to reveal its true appearance. Though defeated by the Kyurangers, Zero is enlarged before being destroyed by Kyurenoh (01-02-03-05-11), Ryuteioh (07-09-10), and Gigant Houoh armed with the Battle Orion Ship as a cannon. Since then, Jark Matter has mass-produced the Zero, employing them on several occasions against the Kyurangers. One such Zero was modified by the evil Doctor Anton to function as his new body, dubbed Anton Zero. Karos The are elite members responsible for controlling the conquered star systems. Each Karo has a customized space battleship known as . Eriedrone is the Karo of the from . He is armed with the that doubles as a spear. Ordered by Don Armage to eliminate the Kyurangers, he pursued them across the galaxy all the way to Earth. He is killed when his Big Morimers is destroyed by Kyurenoh (01-02-03-05-07)'s Super Meteor Break after he learns of Stinger's alignment with the Rebellion. Eriedrone is voiced by . Scorpio is Stinger's older brother who betrayed him and his people to join Jark Matter. He becomes Don Armage's top assassin as he kills countless rebels including Champ's creator, Dr. Anton. Because of his great success, his position is only known to Don Armage and he is eventually promoted to the Karo of the Scorpius System. He was sent to Earth after the Kyurangers become a huge threat to their campaign. Once meeting Stinger again, Scorpio tricks him into believing that he joined Jark Matter with the intention of killing Don Armage and saving the universe. But on learning that the Kyurangers are looking for Argo, Scorpio reveals his true objective is to dispose of Don Armage and assume control of Jark Matter for himself. After being defeated by Stinger, Scorpio reforms, removing the deadly poison in his brother's body, and sacrificing himself to protect the Kyurangers from Don Armage's attack. His main ability is to transform the victims of his tail stinger's venom into his zombie slaves, with the only known cure being Stinger's own poison. Although originally being humanoid like Stinger and their people, Scorpio was mutated into a monstrous being by Don Armage's power with the ability to wrap his tail around his leg to unleash a powerful kick attack. In addition to his tail, he wields the as his weapon. Scorpio is portrayed by . Zandabarudo , the main antagonist of Uchu Sentai Kyuranger: Episode of Stinger, is the Karo of the from in the Aquila System. He is armed with the sword. He was previously a Daikaan on Earth around the time Scorpio was stationed on Earth, earning his current status by manipulating the townsfolk he terrorized into ostracizing Mika and exploiting her revenge for Don Armage's enjoyment. Zandabarudo makes his presence known when the Kyurangers were liberating Planet 3B from Kouchou Indaver, ending up being destroyed by Sasori Orange using the Ikkakuju Arm. Zandabarudo is voiced by . Minor Karos is the Karo of the from . He is armed with the machine gun. Though defeated by Shishi Red, Tenbin Gold, Hebitsukai Silver, Chameleon Green, Kajiki Yellow, and Houou Soldier, Magera is enlarged before being destroyed by Orion Battler. Voiced by . is the Karo of the Leo Minor System from in the Leo Minor System. He pilots the exosuit. Though defeated by Shishi Red Orion, Sasori Orange, Ookami Blue, Oushi Black, Chameleon Green, and Kajiki Yellow, Unjet is enlarged before being destroyed by Super Kyurenoh (03-05-07-09-77). Voiced by . is the Karo of the Leo System from in the Leo System, using his ability to create sand dolls to assume the identity of King Aslan to rule Planet Kaien with an iron fist until his rouse was exposed. Jumottsu is armed with the launchers and the handguns. He is killed when his Big Morimers is destroyed by Gigant Houoh. Voiced by . is the Karo of the Cepheus System from in the Cepheus System. He is armed with a pair of the chakram-like blades. Though defeated by Ookami Blue, Hebitsukai Silver, Chameleon Green, Washi Pink, Ryu Commander, and Houou Soldier, Desugon is enlarged before being destroyed by Ryuteioh (03-06-07-08-10). Voiced by . is the Karo of the Cassiopeia System from in the Cassiopeia System. Though defeated by Shishi Red Orion, Gloven is enlarged before being destroyed by Kyutamajin and Orion Battler. Voiced by . is the Karo of the Crux System from in the Crux System, having ruled his home world before willingly swearing allegiance to Don Armage and Jark Matter's cause to obtain greater power at the cost of his people. He has the head and is armed with the blades. He serves as the first of Armage's line of defense after the Kyurangers bypassed the barrier keeping them from entering the Crux System, facing them on Planet Southern Cross before being destroyed by Shishi Red Orion. Voiced by . Assassins The assassins are members responsible for eliminating rebels, and rank between Karo and Daikaan. Ikargen is an assassin from in the Crux System who destroyed over one thousand planets with Mardakko. He and Mardakko once brought the Rebellion to the brink of destruction. He is armed with the that doubles as a sword. After Eriedrone's death, he is sent to eliminate the Kyurangers. Ikargen is able to dodge multiple attacks with ease thanks to the hundreds of eyes in his body that allow him to perceive every movement around him, until Lucky destroys almost all of his eyes with the power of the Futago Kyutama. Though defeated by the 11 Kyurangers, Ikargen is enlarged and sprays his ink into the air to produce torrential acid rain. However, he ends up being destroyed by Ryutei Kyurenoh (01-02-03-05-07-09-10-11). Ikargen is voiced by . Mardakko is an assassin from in the who can regenerate from her physical remains, though she develops a new personality as a result. Initially a rude and hot-blooded woman, Maradakko is deployed to Earth with her partner Ikargen to eliminate the Kyurangers following the Eriedrone's demise. Following Ikargen's death, developing secretary mannerisms following her first death and then a sensual and flirty persona later, Mardakko becomes Scorpio's right hand following Don Armage's orders to keep an eye on him. Though Mardakko is killed off while in the dimension of Space Squad while attempting to steal the Rashinban Kyutama, she is revived from a fragment on Scorpio's person. The over dramatic Mardakko born from the fragment activates all the Morimers on Earth to siphon its Planesium before Scorpio's Big Morimers were destroyed by Houou Soldier, who killed her in the duel that followed. She is revived again on Planet Toki, by Tetchu, with a groupie-like personality that spends more time idolizing the Kyurangers than actually fighting them. She is destroyed by them as well. The sixth Mardakko, similar to her original self, becomes Karo of the Perseus System and allows herself to be converted into a cyborg for more power at the cost of her regenerative abilities. As , she confronts the Kyuranger during their search for a means to enter the Crux System, helping Anton Brain capture Champ. Though defeated by the 10 Kyurangers (excluding Washi Pink and Ryu Commander) during the battle on Planet Southern Cross, Mecha Mardakko is enlarged and summons a Death Worm before she is destroyed along with the creature by Kyutamajin armed with the Battle Orion Ship as a cannon. She is armed with the , the gatling gun, the sword, the morning star, and the handgun. Her main ability is to regenerate any of her dismembered limbs. She is able to be revived from any remaining body part, though her personality changes with each resurrection. She loses this ability after being refitted into Mecha Mardakko. Mardakko is voiced by . Independent units The independent units are the main antagonists of the film Uchu Sentai Kyuranger the Movie: Geth Indaver Strikes Back. Geth Indaver is the leader of the independent units from in the . He is armed with the pistol and the sword. He was originally a Rebellion member named and was Shou Ronpo's colleague, cooperating to research the Kerberos' legend until Shou was forced to banish him from Rebellion on learning of Hoi's malicious intent. After that, Hoi joined Jark Matter and had his body cybernetically modified with command of the planet-sized superweapon . Geth Indaver's desire for revenge and seeking out Kerberos fueled his intent to smash the Geth Star into Earth. Though he manages to revive Kerberos before it was turned into the Kerberos Voyager, Geth Indaver is destroyed by Ryu Commander as the Geth Star is destroyed by Kerberios. Geth Indaver is portrayed by . Omo Indaver is a member of the independent units. He is armed with the kusari-fundo. Though defeated by Tenbin Gold, Hebitsukai Silver, Washi Pink, and Koguma Skyblue, Omo Indaver is enlarged before being destroyed by Gigant Houoh. Omo Indaver is voiced by . Kaal Indaver is a member of the independent units. He is armed with the sword that doubles as a gun, and possesses a motorcycle. He is destroyed by Oushi Black, Chameleon Green, and Kajiki Yellow. Kaal Indaver is voiced by . Daikaans The are commanders who are sent to conquer and control planets. Each Daikaan has a space battleship known as that drains the planets' Planedium and is capable of changing into a armed with a spear. While other planets are occupied by one Daikaan, Earth is controlled by multiple Daikaans since it is rich in Planedium. Several Daikaans are based on cryptids and the constellation system they hail from, while others are Tsuyoindavers who were promoted and received modification in the Jark Matter Laboratory. is the first Daikaan to appear in the series, and the Daikaan of in the Sagittarius System from in the . He has the and is armed with the . Though defeated by Shishi Red, Tenbin Gold, and Hebitsukai Silver, Gamettsui is enlarged before being destroyed by Kyurenoh (01-03-04-05-06). Voiced by . is the Daikaan of Planet Needle in the Scorpius System who is a promoted Tsuyoindaver. He wears the and is armed with the Bazookon. He is destroyed by Sasori Orange for intervening in his battle with Shishi Red. Voiced by . is one of the Daikaans of Earth from in the . He has the and is armed with the spear-like . Though defeated by Shishi Red, Yumepakkun is enlarged before being destroyed by Kyurenoh (01-04-06-08-09). Voiced by . is one of the Daikaans of Earth from in the . He has the neck-like and is armed with the . He is killed when his Morimers Robo is destroyed by Kyurenoh (01-03-04-07-09). Voiced by . is one of the Daikaans of Earth from in the . He has the breast and is armed with the blades mounted on his forearms. Though defeated by Shishi Red, Sasori Orange, Tenbin Gold, Hebitsukai Silver, and Chameleon Green, Tome is enlarged before being destroyed along with his Morimers by the Tenbin and Hebitsukai Voyagers. Voiced by . is one of the Daikaans of Earth who is a promoted Tsuyoindaver. He wears the and is armed with the Bazookon. An enlarged Mamoritsuyoindaver is destroyed along with his Morimers by the Shishi and Kajiki Voyagers. Voiced by . is one of the Daikaans of Earth who is a promoted Tsuyoindaver. He wears the and is armed with the Bazookon. He is killed when his Morimers Robo is destroyed by Kyurenoh (01-02-03-07-08). Voiced by Yasunao Sakai. is one of the Daikaans of Earth who is a promoted Tsuyoindaver. He wears the helmet and is armed with the Bazookon. He is destroyed by Shishi Red, Chameleon Green, and Kajiki Yellow. Voiced by . is one of the Daikaans of Earth who is a promoted Tsuyoindaver. He wears the and is armed with the Bazookon. Though defeated by Shishi Red, Ookami Blue, and Washi Pink, Metchatsuyoindaver is enlarged before being destroyed by the Ryu Voyager. is one of the Daikaans of Earth who is a promoted Tsuyoindaver. He wears the helmet and is armed with the Bazookon. Though defeated by Sasori Orange, Chameleon Green, and Kajiki Yellow, Mutchatsuyoindaver is enlarged before being destroyed by the Ryu Voyager. is one of the Daikaans of Earth from in the Aquila System. He has scales on his wings. He is destroyed by Shishi Red and Koguma Skyblue. Voiced by . is one of the Daikaans of Earth who is a promoted Tsuyoindaver. He wears the hood. Though defeated by Shishi Red, Sasori Orange, Oushi Black, Ryu Commander, and Koguma Skyblue, Mondomuyoindaver is destroyed along with his Morimers Robo by Ryutei Kyurenoh (01-02-03-05-07-09-10-11). Voiced by . is one of the Daikaans of Earth from in the Taurus System. He is armed with the whip. He is destroyed by Shishi Red, Ookami Blue, and Kajiki Yellow. Voiced by . is the Daikaan of in from in the . He has the head and is armed with the trident. Though defeated by Shishi Red, Hebitsukai Silver, Chameleon Green, Washi Pink, and Kajiki Yellow, Goneshi is enlarged before being destroyed along with his Morimers by Kyurenoh (01-06-07-08-09). Voiced by . is one of the Daikaans of Earth from in the . He has the and the claws. Though defeated by Shishi Red Moon, Shaidos is enlarged before being destroyed by Ryuteioh (03-04-10). Voiced by . is the Daikaan of in the from in the . He has the fists. Though defeated by Tenbin Gold, Hebitsukai Silver, Chameleon Green, and Kajiki Yellow, Omega is enlarged before being destroyed along with his Morimers by Kyurenoh (01-04-06-07-09). Voiced by . is one of the Daikaans of Earth from Planet Jaji in the Monoceros System who is also the president of the Earth Branch of Jark Matter University. He has the and is armed with the pointing stick. Though defeated by Washi Pink, Kajiki Yellow, and Houou Soldier, Manavil is enlarged before being destroyed by Gigant Houoh. Voiced by . is one of the Daikaans of Earth who is a promoted Tsuyoindaver. He wears the protector, is armed with the Bazookon, and is accompanied by an Indaver using the television camera. Though defeated by Shishi Red, Ookami Blue, Chameleon Green, Washi Pink, and Kajiki Yellow, Media Tsuyoindaver is enlarged before being destroyed by Kyurenoh (01-03-07-08-09) and Ryuteioh (06-10-11). Voiced by . is the Daikaan of Naga Ray who is a promoted Tsuyoindaver. He has the . Though defeated by Shishi Red, Micro Tsuyoindaver is enlarged to a human size before being destroyed by Tenbin Gold and Hebitsukai Silver. In his final breath he created a giant replica of Hebitsukai Metal, but the copy is destroyed by Kyutamajin. Voiced by . Other Daikaans is the Daikaan of in the Aries System. Though defeated by Shishi Red, Ookami Blue, Hebitsukai Silver, Chameleon Green, and Kajiki Yellow, Clocku is enlarged before being destroyed by Kyurenoh (01-03-06-07-09). This Daikaan appears exclusively in the special drama sessions of the first original soundtrack of the series. Voiced by . is the Daikaan of in the Norma System, serving as the principal of a Jark Matter school which brainwashes the galaxy's prodigies into becoming Jark Matter members. The Kyurangers infiltrated the school, Kouchou Indaver attacked them after they defeated his wife serving as the vice principal of the school, and their son , serving as the student council president of the school. Kouchou Indaver is killed when his Morimers Robo is destroyed by Kyurenoh (01-06-07-09-11). This Daikaan appears exclusively in the web-exclusive series From Episode of Stinger: Uchu Sentai Kyuranger: High School Wars and the film Uchu Sentai Kyuranger: Episode of Stinger, while Kyoutou and Seitokaichou Indavers appear exclusively in High School Wars. Kouchou and Seitokaichou Indavers are voiced by , who would appear in the series proper reprising his Tokusou Sentai Dekaranger role as Senichi Enari/Deka Green, and Kyoutou Indaver by . is a Daikaan of Earth who was initially a Jark Matter recruit under Zandabarudo who wanted the power to exact revenge on the prejudice she suffered from being a human-alien hybrid by the townsfolk. Possessing the genetic code of a alien, Mika uses the alicorn-like as a weapon. After Don Armage infused some of essence into her once promoted after slaughtering the townsfolk, Mika is transformed into a partial monster with Stinger and Champ attempting to save her. But she was murdered Zandabarudo, who later revealed to have manipulated her life for his own ambitions, using the last of her life to give Stinger the Ikkakuju Kyutama. This Daikaan appears exclusively in the film Uchu Sentai Kyuranger: Episode of Stinger. Portrayed by . is the Daikaan of in the . He is destroyed by Shishi Red, Hebitsukai Silver, Washi Pink, Kajiki Yellow, and Ryu Commander. This Daikaan appears exclusively in the CD audio drama Uchu Sentai Kyuranger: Make Him Cry! The Tamakyu Troupe Hot Match!. Voiced by . Don Arkage is a Jark Matter remnant, Don Armage's body double, and the main villain of Lupinranger VS Patranger VS Kyuranger, seeking , the lost treasure of Jark Matter, to surpass Armage as the greatest evil in their universe. He wields a pair of swords in combat and has the ability to create clones of Indavers and the three Vice Shoguns as his pawns. Though defeated by the three Super Sentai teams, Arkage enlarges before being destroyed by Good Kuru Kaiser VSX. He is based on Atlas. Don Arkage is voiced by Atsuki Tani. Other villains Space Ikadevil is a revived squid monster from Shocker who attracts the attention of Shishi Red and Sasori Orange who mistook him as Ikargen. After Shishi Red summons Kamen Rider Ex-Aid with the Ex-Aid Kyutama to join forces with him, Space Ikadevil ends up destroyed by the two warriors. reprises his role as the voice of Space Ikadevil. Death Worms The are creatures living underground. This species is widely distributed on desert planets. They have and can change their size at will from a human to a giant size. Known Death Worms in the series are shown below: The first Death Worm housed the Tomo Kyutama after fighting against Orion. 333 years later, it was destroyed by Ryuteioh (02-10-11), causing it to release the Tomo Kyutama from its body. But Shishi Red's bad luck streak caused it to fall briefly into Ikargen's hands. The second Death Worm controlled by Scorpio is destroyed by Kyurenoh (01-06-07-08-09). The third Death Worm is summoned by Mardakko, defeated first by Hebitsukai Silver and Space Sheriff Gavan Type-G, then destroyed by Ryu Voyager and Electronic Starbeast Dol after it enlarges. The fourth Death Worm summoned by Mecha Mardakko is destroyed by Kyutamajin armed with the Battle Orion Ship as a cannon A is a Death Worm subspecies with teeth, which Tetchu kept as a pet before it is destroyed by Gigant Houou. A is an improved breed of Death Worm with poison, which Doctor Anton created from 999 Death Worms before it is destroyed by Super Kyurenoh (02-07-09-11-77). References Category:Lists of children's television characters Category:Lists of superheroes Category:Super Sentai characters
{ "pile_set_name": "Wikipedia (en)" }
Q: How to get File Navigator View in MacOS App I have seen in many apps a simple tree navigator view, like this in Xcode: I am creating my own IDE and would like to know if there is there a view for this? A: As @TheNextman said, I need NSOutlineView, which was perfect. I followed this tutorial: https://www.raywenderlich.com/1201-nsoutlineview-on-macos-tutorial
{ "pile_set_name": "StackExchange" }
e-mail this to a friend : Malala Yousafzai awarded the 2013 Sakharov Prize South Asia Pakistan Victim of a Taliban attack in 2012, the young Pakistani activist received the award because she represents "our hope for a better future." : : (*) : : (*) : (*) : (*) See also 10/11/2012 PAKISTAN - GREAT BRITAINMalala Day: a petition to award the Nobel Prize for Peace to Malala YousafzaiTens of thousands of people around the world support the initiative to reward the courage of the child activist who defied Taliban madness. 30 days on from the attack on her life , the UN secretary general announces today a world day dedicated to her. Slight improvement in her health conditions. 01/02/2013 PAKISTAN - NORWAYOslo candidates Malala Yousafzai for the Nobel Peace 2013Members of the ruling party presented in an official request. The young Pakistani activist, victim of Taliban violence, conducted a "courageous battle" for "the right to education of girls." She is still undergoing medical treatment for head injuries caused by a shooting attack. Pakistani blogger: "Allah bless and protect you." The European Parliament confirms that the professor, known for his criticism of Chinese policy in Xinjiang Province, is among the five finalists. In September 2014 he was sentenced to life in prison by Beijing for "terrorism" and "inciting subversion": his supporters believe the allegations are "completely false". 10/10/2014 NORWAY - PAKISTAN For Pakistani Christians and Muslims, Nobel Prize to Malala helps fight for human rights in the countryMalala Yousafzai, 17, from Pakistan, Kailash Satyarthi, a child advocate from India, are this year's recipient of the Nobel Peace Prize. The Committee recognised their "struggle against the suppression of children and young people and for the right of all children to education". For Paul Bhatti, they are a "symbol of hope and an example for everyone in the struggle against fundamentalism." Mgr Giacinto-Boulos Marcuzzo stressed the importance of education to ensure the future of new generations. The Church is a sign of "unity" in a context "marked by divisions" and a bridge in interfaith dialogue. The situation has gone from euphoria for peace to resignation over permanent conflict. He appeals to Western Christians to come as pilgrims to the Holy Land. The 15-day event is the most important religious celebration in Nepal. Animal rights activists have gone to Hindu temples to raise awareness among believers. The stench of rotting dead animals fills the areas near the places of worship. Police have been deployed to prevent confrontation.
{ "pile_set_name": "Pile-CC" }
Q: When did we learn that stars die? As we all know, the stars we see in the night sky might already be dead. I was wondering though, when was this fact or conclusion commonly established? Today, most people (let's assume with an above average education) would probably be aware of this fact. When is the earliest time when the same could be said? I am particularly interested if the same could be said for the time period revolving around the period 1850 - 1900. I know that the speed of light was approximated fairly accurately in the 17th century. Knowing this (finite) speed, it's not hard for me to draw the conclusion that the source of the light I see may not be there anymore. Would this be an easy conclusion to draw a hundred years ago however? Maybe they thought stars don't die? A: Super novae were known a long time ago. But they were not understood as a the death throes of a star. In spite of the apparent immutability of the heavens, Chinese astronomers were aware that new stars could appear. In 185 AD, they were the first to observe and write about a supernova, now known as the SN 185. The brightest stellar event in recorded history was the SN 1006 supernova, which was observed in 1006 and written about by the Egyptian astronomer Ali ibn Ridwan and several Chinese astronomers. The SN 1054 supernova, which gave birth to the Crab Nebula, was also observed by Chinese and Islamic astronomers. But it wasn't until later we understood they had a life-cycle. The Greek philosopher Aristotle even proposed that the stars were made of a special element, not found on Earth, that never changes. The Chinese might have been the first to suggest the idea as they took careful note of "guest stars" which suddenly appeared among the fixed stars. It would seem that another person who suggested the idea was probably Tycho Brahe (14 December 1546 – 24 October 1601) as he coined the term nova meaning new star. And likely with this new mind set births brings deaths. He also is famous for realizing stars are very far away (due to parallax). In 1572 he witnessed a super nova and in 1573 he published a small book, "De nova stella" (The New Star) based on the super nova he saw. (Most super novae were assumed to be new stars, not dieing stars). The event of understanding stars die probably just fell out of understanding what stars are. I'm not sure you can point to one event or person in history that could prove to know stars die prior to understanding stars themselves. A: Conservation of energy dates back to ca. 1840. Once that was established, it was natural to suspect that a star had a finite lifetime, which could be calculated if its energy source was understood. The most popular theory in the 19th century was that stars converted gravitational energy into heat. Lord Kelvin also hypothesized that meteors crashed into the sun and resupplied it with energy. All of these mechanisms gave lifetimes for stars that were relatively short, and, e.g., too short to be consistent with the kinds of terrestrial timescales being proposed by Darwin and the geological gradualists. More info here: http://www.nobelprize.org/nobel_prizes/themes/physics/fusion/sun_1.html
{ "pile_set_name": "StackExchange" }
CPAC: Ron Paul wins CPAC straw poll - ends Romney's CPAC domination ByJimmy OrrFebruary 20, 2010 Texas Congressman Ron Paul won the CPAC straw poll on Saturday with 31 percent of the vote. Mitt Romney came in second with 22 percent and Sarah Palin finished third with a distant seven percent of the vote. The CPAC straw poll comes at the end of the three day conference. Attendees of CPAC, or as Chris Matthewsonce called it a "Star Trek convention," cast their ballots on the third and final day of the conference and Paul was the clear winner with 31 percent of the vote. Mitt Romney was unable to keep a "Vulcan grip" on his three-year reign as CPAC's top vote getter netting 22 percent of the ballots for a solid second place finish. Perhaps rap-loving Republicans were sending a message to Romney that they disapproved of his problem solving skills on that airplane the other night. There may have been some boos, but Paul was by far one of the more popular speakers at CPAC this year," Costa writes. "While Paul mingled with his acolytes, the big guns — Pawlenty, Romney — were often shrouded by aides or mingling backstage," he adds. "Believe me: CPAC folks noticed. And now, thanks to the straw poll, for a moment, Paul’s opening line from his address is true: His 'revolution is alive and well,' at least this weekend." Disclaimer: This doesn't count In case you thought that today's event meant that Paul had actually won the presidency, FOX News offered this helpful reminder: "The straw poll is not binding." And Ben Smith over at Politico notes that the attendees of the conference don't really sync up with the rest of the country.
{ "pile_set_name": "Pile-CC" }
A 15 year old Afghan boy was blown to pieces while tackling a bag that contained a bomb in Athens. His sister is in intensive care, struggling for her sight. The Nuclei of Fire Conspiracy deny any involvement in the deadly event. A powerful explosion which occurred at 22:41 on Sunday night outside the Greek Company for Business Management (EDEE) in Patisia, Athens, has killed a 15 year old boy from Afghanistan, also wounding his sister's eyes and slightly wounding his mother. According to the mother, the two children saw a bag outside the prestigious establishment and the girl opened it revealing a mechanical clock. Deciding it does not work, the boy immediately took the bag back where they found it when the bag exploded blowing the boy into pieces and blinding the girl. Given there was no warning phone call for the bomb, the police initially believed that the bomb could be a response of extreme-right groups to the bombing of the Golden Dawn offices earlier this month. This story has now subsided with the Ministry of Public Order claiming that the wiring of the bomb is similar to the one found outside the Chilean Consulate in Salonica last year, a device which was claimed by the Nucle of Fire Conspiracy. However the NFC published a communique in which they express their grave grief for the deadly incident and their rage at the mass media which are trying to implicate them. The NFC denied categorically any involvement in the incident, stressing that they always call two media to warn about their bombs, giving at least 20 minutes to the police to evacuate the area, while also using two mechanical clocks, so as to avert any accident. To the allegations of the media that the bomb was the one about which a warning call was made the same morning but was never found, the NFC have responded that unlike the warning call reported, their are always clear mentioning the precise road and location of the device. The morning warning call was about a bomb in EBEE an acronym that means nothing. The NFC claim that they would prefer their being arrested than leaving a blind bomb to explode after the authorities have failed to spot it. The urban guerrilla group also stressed that if indeed this bomb is the work of a revolutionary group and not a parastate provocation, then it should be immediately claimed by the group responsible - concluding that if it is a "blind attack" then it is the work of the extreme-right similar to Piazza Fontana. The authorities have refused to comment on the NFC communique claiming it will not "open a dialogue with terrorists". It must be noted that even the police admits that the pipe-bomb device used is similar to the bomb against the Buenoventura antiauthoritarian centre in Salonica earlier this year. The death of the 15 year old is the first civilian death related or allegedly related to domestic armed struggle since the early 1990s, when a rocket of the N17 aimed at the then Minister of Economics killed a bystander, effectively signaling a reversal of the then mass support for the group. It must be also noted that the 22 year old man arrested in Volos with the ecuse of a single fingerprint of his found in the supposed NFC haunt in Chalandri has been released on conditions of not leaving the country. In an unprecedented breach of the law, all media carried the man's picture, creating a climate of "man-hunt".
{ "pile_set_name": "OpenWebText2" }
Flamingo, Finland Flamingo Entertainment Centre is the biggest entertainment centre in the Nordic countries. It is located in Vantaa next to the Jumbo Shopping Centre. Flamingo was opened in 2008 and there is a hotel, variety of entertainment activities (eg. a movie theater, spa, bowling, laser games, virtual experiences) and 40 different stores under its roof. Services Flamingo has entertainment for kids and adults. Flamingo has the biggest indoor water park in Finland. In addition to normal swimming pools there are several water slides, kids pool and Jacuzzi. There is also a spa and wellness section for adults, with different kinds of saunas and relaxing and wellness treatments. Spa and wellness section is for adults only (18 years and above). Flamingo also has a bowling alley, a laser tag arena, a minigolf, an kids escape room, a 6-screen cinema, a gym, a hotel and numerous shops and restaurants. There is a bridge that connects Flamingo with shopping centre Jumbo. Location and transportation Flamingo is located on the side of Ring III, next to the shopping centre Jumbo. Helsinki-Vantaa Airport is also located near Flamingo. Car There are 800 parking spots in Flamingo that are free for 5 hours. The parking lot is guarded by Q-Park. Entrance to the parking lot is from the Tasetie, next to the main entrance of Flamingo. Public transportation Flamingo is well served by the buses of the Helsinki Region Transport (HRT) around the clock. It takes only few minutes from airport to Flamingo by buses 615 and 617. The bus stop for these buses is right next to Flamingo. The other option is to take the train I to Aviapolis railway station and take the bus 561 or 562 from there. Other buses: from Tikkurila railway station the bus 562, from Myyrmäki railway station the buses 571, 572, 574, from Helsinki city centre buses 614, 615, 415. References Category:Shopping centres in Vantaa
{ "pile_set_name": "Wikipedia (en)" }
[Hip revision arthroplasty (long-term results)]. To evaluate the risk factors after total hip replacement arthroplasty for rerevision and to analyze complications after hip revision surgery. We obtained data from 117 hip revisions and 12 hip rerevision arthroplasties performed in 1992-2001 in the Department of Orthopedics of Klaipeda Hospital. Special forms were filled in for every patient who participated in the study. Name, operation date, type of implants, operative technique, revision diagnosis, intraoperative and postoperative complications were recorded. All patients were checked for death until 2003. Hip revisions were performed for 77 (66%) women and 50 (44%) men in 1992-2001. We revised 22 (19%) cups, 6 (5%) stems, 86 (74%) total hip revisions; femoral head was exchanged for 3 patients. Revision diagnoses were: aseptic loosening in 106 (90%) cases, recurrent dislocations in 7 (6%) cases, and periprosthetic fractures in 4 (4%) cases. Patients' age varied from 26-82 years, average 63.5 years. In revision group only 8% of patients were less than 50 years old, compared to 33% in rerevision group. Morselized allografts and bone impaction technique for reconstruction of bone defects were used in 70 (60%) of cases. We rerevised one cup only for which revision morselized allografts were used. Eight (67%) rerevisions were performed after first 28 (24%) hip revisions. Patients, who underwent revision surgery being younger than 50 years old, were at higher risk for rerevision surgery. Revision with morselized bone allografts and bone impaction technique decreases number of rerevisions. Learning curve was steep and had great influence to our results.
{ "pile_set_name": "PubMed Abstracts" }
Introduction ============ Myopia is the main cause of preventive blindness worldwide, especially in adolescents ([@B1], [@B2]). Thus, it is one of the main priorities among the five projects under the 'Vision 2020 Action' launched by WHO ([@B3]). In recent years, the incidence of myopia has increased rapidly worldwide ([@B4]), especially among adolescents in East and Southeast Asia ([@B5], [@B6]). The prevalence of myopia among adolescents is at 96.5% ([@B7]) in South Korea, 81.6% ([@B8]) in Singapore and 95.5% ([@B9]) in Shanghai. Myopia not only affects adolescents' school performance and future career choice ([@B10]) but also causes glaucoma, cataract and other serious complications ([@B11]). Thus, many researchers have devoted themselves to gaining a more in-depth understanding of the prevention and control of adolescent myopia ([@B12], [@B13]). Collaborative research networks can help other researchers expand their field of research or join groups conducting related studies. Bibliometric studies of scientific collaboration have been conducted in various fields ([@B14], [@B15]), providing different levels of cooperation frequency in research practice. One of the methods used to study such collaboration is the co-authorship network analysis, which focuses on finding patterns of contacts or interactions between social actors. Author, country, and institution are the subjects of cooccurrence relationship; thus, analyzing their cooccurrence relationship can better reflect the truth of scientific research and academic communication, because the cooperation of authors, institutions and countries can measure the cooperation at different levels ([@B15]). However, to date, no bibliometric analysis of scientific literature in myopia prevention and control had been carried out and published. As such, this study aimed to describe the diversity of cooperation among authors, institutions, and countries in the study of adolescent myopia prevention and control. Specifically, for adolescent myopia prevention and control research, our main goal is to explore the following content: firstly, analysing the overall status of collaborative research among authors, institutions and countries; secondly, determining the institutions and authors at the core of the cooperative research network; and thirdly, identifying countries that have a strong cooperative relationship. Materials and Methods ===================== The search for papers to be included in the analysis was conducted in one day (Sep 25, 2017) to avoid bias resulting from daily updating in the database. The Web of Science Core Collection annually collects a large number of journals and records each publication, including bibliographic information (i.e., author, institution and country or region), which we used to locate publications. All papers published within the period of 1997--2016 were evaluated. Search terms included combinations of terms, such as 'adolescent', 'children', 'student', 'myopia', 'myopic', 'prevention', 'control' and 'management'. Literature types, such as meeting abstracts, letters, correction, news item, book chapter, retracted publication, editorial material, non-English literature and repeated articles, were excluded. To ensure reliability, profile information of each included article was extracted by two independent reviewers, resulting in a reliability check of 100% of the selected abstracts. A search query that was used for data extraction from Web of Science database looked like this: TS= ((adolescent myopia OR children myopia OR student myopia OR adolescent myopic OR children myopic OR student myopic) AND (prevention OR control OR management)). Social network analysis (SNA) is a method of structural analysis applied in many research fields. It focuses on relationship research and is mainly used to describe and measure relationships and information between individuals ([@B16]). SNA has been proven to be effective in studies on scientific collaboration network ([@B17], [@B18]). The same method is used in the current study. To analyze and identify critical issues, we used SATI (Statistical Analysis Toolkit for Informetrics) (ver. 3.2) to build the co-occurrence matrix ([@B19]) and transformed the data format with Ucinet 6.0 ([@B20]) to finally obtain co-occurrence mapping. VOS viewer (Visualisation of Similarities viewer) software (ver. 1.6.6) was employed to draw the co-country (region) maps by using literature title packets ([@B21]). Excel 2016 (Microsoft, Redmond, DC, USA) and Netdraw (ver. 2.118) were also used in the research. In addition, some measures of our network, including degree centrality, betweenness centrality, closeness centrality, density, and diameter, were evaluated ([@B22]). Degree centrality refers to the number of neighbors to a node in the network ([@B15]). In this case, the greater its connection to other nodes in the network, the more important is the node. Betweenness centrality refers to the number of the shortest paths passing through a given node ([@B23]). The higher the betweenness centrality of the node, the greater the ability to control the information passed between the other nodes. The closeness centrality is used to measure the distance of one node to other nodes in a network. Nodes with high closeness centrality obtain information better than other nodes or tend to have a more direct influence on other nodes ([@B16]). Density is calculated through the actually observed ties divided by all possible ties whose value is between 0 and 1 ([@B24]). Density values tend to reach 0 in sparse networks, and close to one in tightly connected networks ([@B24]). The diameter represents the longest measuring distance in a connected network; it shows the number of steps required from one side of the network to the other ([@B16]). Ethical considerations ---------------------- This study did not require any ethical consideration as it does not include any human or animal to be the object of study. Results ======= A systematic search for publications on adolescent myopia prevention and control retrieved 624 articles in Web of Science Core Collection, excluding one duplicate. After further screening of titles and abstracts, 9 editorial materials, 4 letters and a meeting abstract were removed, leaving 610 eligible papers. The scale and overall trend of collaborative research ----------------------------------------------------- [Figure 1](#F1){ref-type="fig"} shows the number of publications issued annually and the number of papers published through collaboration with authors, institutional cooperation and country (region) cooperation. The number of papers, co-authors, co-institutions and country (region) cooperative papers has increased significantly from 1997 to 2016, particularly after 2011. In general, the total number of published articles since 1997 has increased more than six-fold, from 11 in 1997 to 79 in 2016; the institutional cooperation increased more than five-fold, the author cooperation increased by twelve-fold and the country (region) cooperation increased by fifteen-fold. ![Numbers of papers on adolescent myopia prevention and control by collaboration type between 1997 and 2016](IJPH-48-621-g001){#F1} [Fig. 2](#F2){ref-type="fig"} reveals the average number of authors, institutions and countries per article from 1997 to 2016. The average number shows a gradually increasing trend. ![Average number of different entities per paper](IJPH-48-621-g002){#F2} The increase in number of authors was from 3.91 to 4.34, from 1.36 to 2.51 for institutions and from 0.82 to 1.25 for countries per paper. Overall, the rates of cooperation among authors, institutions and countries were 93%, 57.9% and 21.5%, respectively. In general, the number of SCI journal papers produced by institutional cooperation is the largest (accounting for 56.6%), followed by papers generated through intra-institutional collaboration (accounting for 36.1%) and papers produced without collaboration (accounting for only 7.4%). [Figure 3](#F3){ref-type="fig"} shows the percentage of papers studied in each of the different institution collaboration types and their changes over time. The percentages of single-author papers have decreased by 26.7% from 1997 to 2016, whereas that of institution-collaborated papers increased by 24.4%. The percentage of papers produced through single authorship has always been higher than that of institutional collaboration from 1997 to 2000 but decreased after 2006. ![Percentage of different collaboration types](IJPH-48-621-g003){#F3} Authors' collaborative research ------------------------------- Results of scientific research are published in the form of papers, and the status of co-authorship in papers reflects the collaboration among authors. Researchers who study the growth of co-authorship articles produced by multiple authors regard co-authorship of papers as a significant scientometric indicator of researching on cooperation among authors ([@B25]). More important researchers were expected to have published more articles, thus scholars who published more than four articles were included in the co-authorship networks. Overall, 75 researchers with 371 co-authored experiments meet this condition. Five authors not cooperated with other authors were excluded. The research collaboration network between authors is shown in [Fig. 4](#F4){ref-type="fig"}. ![The structure map of the author collaboration network](IJPH-48-621-g004){#F4} Each node of the figure represents an author, and the connections among the nodes represent the collaboration relationships among authors. The weight of a link indicates the number of publications co-authored by two scholars. In this author's collaboration network, the highest degree centrality of Allen, Peter M. and O\'Leary, Daniel J. was 5.83, indicating that they had 5.83 collaborators and that they played a pivotal role in the co-authorship network. Saw, Seang Mei obtained the highest betweenness centrality manifesting that he had the ability to control collaborative relationship and that he possessed and controlled a large number of research resources. In collaborative network, the closer the distance between one author and the other, the easier it is to exchange information and build cooperative research relationship. Saw, Seang Mei and Mitchell, Paul had the highest closeness centrality, which manifested that they had the most opportunity to exchange information and establish a cooperative relationship with other authors ([Table 1](#T1){ref-type="table"}). Furthermore, we assessed the density and diameter of co-authorship network, which were 0.043 and 5, respectively. ###### Top 10 authors on centrality measures in collaborative network ***Degree*** ***Score*** ***Betweenness*** ***Score*** ***Closeness*** ***Score*** -------------------- ------------- ------------------- ------------- ----------------- ------------- Allen, Peter M 5.83 Saw, Seang Mei 72.00 Saw, Seang Mei 1.85 O\'Leary, Daniel J 5.83 Mitchell, Paul 56.00 Mitchell, Paul 1.85 Guo, Xiangming 5.56 Gao, Yang 48.00 Liu, Luo-Ru 1.84 Wang, Panfeng 5.56 Congdon, Nathan 48.00 Li, Shi-Ming 1.84 Xiao, Xueshan 5.56 Manny, Ruth E 42.00 Li, He 1.84 Li, Shiqiang 5.56 Davitt, Bradley V 40.00 Li, Si-Yuan 1.84 Jia, Xiaoyun 5.56 Qu, Jia 26.00 Kang, Meng-Tian 1.84 Zhang, Qingjiong 5.56 Tan, Donald 14.00 Qu, Jia 1.84 Price, Holly 5.39 He, Mingguang 13.00 Tan, Donald 1.84 Rae, Sheila 5.39 Liu, Luo-Ru 3.60 Pan, Chen-Wei 1.84 Institutions' collaborative research ------------------------------------ It would be helpful for us to study the academic information exchange mode in scientific collaboration by analyzing the institutional relationship network of research collaboration ([@B26]). Among 610 papers, 353 documents were produced by inter-institution cooperation and 45 papers produced by intra-institutional cooperation. These papers covered 480 actual institutions and the total appearing frequency of institutions is 1674. The largest collaboration in the sample of this study involved 22 institutions. We deleted five institutions not cooperated with other institutions and eventually selected the top 69 institutions with appearance frequencies excessing five to form a map visualizing the structure of institution's collaboration network in the field of adolescent myopia prevention and control during 1997 to 2016 ([Fig. 5](#F5){ref-type="fig"}). The size of the node indicated centrality in collaboration network. The network's density is 0.011 and diameter is 6. [Table 2](#T2){ref-type="table"} lists the top ten institutions in the adolescent myopia prevention and control research dataset based on three measures of centrality: degree, betweenness, and closeness centrality. The Smith-Kettlewell Eye Research Institute had the highest degree centrality and that the University of Melbourne had the highest betweenness centrality and the lowest closeness centrality. Furthermore, the Smith-Kettlewell Eye Research Institute is found to be the most critical institution in the cooperation network and enjoys a high level of cooperation with the University of Melbourne. ![The structure map of the institutional collaboration network](IJPH-48-621-g005){#F5} ###### Top 10 institutions on centrality measures in collaborative network ***Degree*** ***Score*** ***Betweenness*** ***Score*** ***Closeness*** ***Score*** ------------------------------------------------------ ------------- ----------------------------------------- ------------- -------------------------------------- ------------- The Smith-Kettlewell Eye Research Institute 3.19 University of Melbourne 397.14 the University of Melbourne 12.67 Saint Louis University 3.19 Sun Yat-sen University 262.38 National University of Singapore 12.50 University of Pennsylvania Health System 3.08 National University of Singapore 255.13 Sun Yat-sen University 12.48 University of Texas Health Science Center at Houston 2.59 Duke University 238.41 Singapore National Eye Centre 12.41 University of Arizona 2.35 University of California, San Francisco 228.00 Duke University 12.27 Children\'s Hospital of Philadelphia 2.09 University of New South Wales 150.88 The Hong Kong Polytechnic University 12.23 Orbis International 1.82 The Hong Kong Polytechnic University 140.97 The Chinese University of Hong Kong 12.21 Stanford University 1.71 The University of Arizona 119.22 Peking University 12.18 Chinese Academy of Sciences 1.58 Aston University 118.00 Capital Medical University 12.18 European University of Madrid 1.56 The Chinese University of Hong Kong 117.56 Anyang Eye Hospital 12.16 Countries' (regions') collaborative research -------------------------------------------- The research articles produced by international cooperation have greater influence ([@B26]). Our dataset involved 53 countries, excluding 15 countries whose paper production had been less than two in the past 20 years. Using the rest of the 38 countries, we constructed a collaboration network through the VOS viewer, which helped depict the relationships between these countries. [Figures 6](#F6){ref-type="fig"} and [7](#F7){ref-type="fig"} are visual presentations of the collaborative networks among different countries (regions). In [Fig. 6](#F6){ref-type="fig"}, the size of the node represents the number of papers produced in that country or region, wherein the thickness of the links is positively correlated with the strength of the collaboration ([@B27]). The colors represent the collaboration clusters and each color represents a separate cluster ([@B27]). Hot spots are colored in red and appear lighter as they go farther away from the center of gravity. The thickness of the links represents the strength of collaborations between the countries (regions) it connects. In [Fig. 7](#F7){ref-type="fig"}, seven major clusters can be distinguished: the largest one gathering around China, the next one around the USA and the other clusters gathering around Australia, England, Singapore, Germany and Ireland. The highest density in the network belonged to China, USA and Australia. ![Collaboration network visualization of countries (regions)](IJPH-48-621-g006){#F6} ![Density view of co-authorship network of countries (regions)](IJPH-48-621-g007){#F7} Discussion ========== The increase of myopia incidence is related to many factors, such as genetic ([@B28]), environmental risk factors ([@B1]) and unhealthy lifestyles ([@B29]). The early onset of myopia is reported to cause faster development and higher possibility of occurrence in adulthood ([@B30]). Therefore, prevention and control of myopia in adolescence are of great significance. We can try to do more intervention research on the risk factors that are controllable or changeable. Research collaboration is an important way to improve the overall strength of research and enables researchers to supplement each other\'s strengths and share information ([@B31]). We found that, in the past 20 years, the total number of papers in the field of prevention and control of myopia in adolescents, as well as the total number of co-authored articles, increased especially since 2011. Previous studies in other research fields showed a similar trend ([@B15], [@B32]). The average number of authors, institutions and countries (regions) per paper has also increased over time. In general, 93.0% of the publications are co-authored by more than one author, whereas 57.9% of the publications have been co-authored by a number of institutions over the past 20 years. On the one hand, researchers not only benefit from knowledge exchange but also save on research costs due to the sharing of information, technology and resources ([@B33]). On the other hand, as research goes deeper, it becomes increasingly difficult to achieve a great breakthrough through a single person or institution, which forces researchers in adolescent myopia prevention and control field to cooperate with others. The above analysis indirectly indicates that scientists and research institutions attach importance to cooperation; thus, researchers will have great propensity to cooperate in the adolescent myopia prevention and control field. As social networks are developed by adding new nodes and links, and the new knots are connected to old high central knots based on the principle of preferential connection ([@B34]), scholars or institutions with high degree centrality can play a vital role in the development of co-authorship networks. From the results of degree centrality analysis, Allen, Peter M. (5.83) and O\'Leary, Daniel J. (5.83) emerged as the top researchers with the most frequent collaborative activities, followed by Guo, Xiangming, Xiao, Xueshan, Li, Shiqiang, Jia, Xiaoyun and Zhang, Qingjiong. The Smith-Kettlewell Eye Research Institute and Saint Louis University are institutions with the most frequent cooperative activities. Hence, Allen, Peter M. and O\'Leary, Daniel J. had the highest number of opportunities to communicate with other members of the network and had the greatest ability to build collaborative teams in the growth and dynamics of network, as well as the Smith-Kettlewell Eye Research Institute and Saint Louis University. Our betweenness results showed that Saw, Seang Mei and the University of Melbourne had the highest scores, indicating that they play a good mediating role in the cooperative network and control in the flow of information. The closeness centrality measures the distance of one member from the other members in a network ([@B16]). In this study, two authors (Saw, Seang Mei and Mitchell, Paul) and one institution (University of Melbourne) had the highest closeness centrality, indicating that they receive information faster than others because of fewer intermediaries among them. Whether author collaboration or institutional collaboration network, network density is very low, which means that the cooperation among the authors and the relationship between the institutions are not tight enough. The low network diameter also implies that the communication between the authors and the information exchange between the institutions is slow. Visualization analysis of cooperation among countries suggests that China, the USA and Australia are the most productive countries and are also the hotspots for the study of adolescent myopia prevention and control. Compared with other studies indicating that collaborative countries are often geographically interrelated ([@B32]), our results present conflicting outcomes considering the distribution of seven major clusters. In the co-authorship network of countries, the developed countries occupy the vast majority. Although our study is one of the first attempts to systematically describe the research collaboration in this field, it also has some limitations. Firstly, in order to guarantee the homogeneity of the research samples, the books, meeting records, reports, letters, editing materials and non-English articles were excluded in the analysis, which may bring about the issue of incomplete information. Secondly, our search terms may not be used in the title of some relevant research and cannot be retrieved by our method. Thirdly, since no database is perfect and some might have bias by over-representing journals using the English language, bibliometric results should always be considered with caution ([@B35]). Conclusion ========== This study provides a systematic description of collaboration at the levels of author, institution and country (region) in the research on adolescent myopia prevention and control. Although the number of publications has been increasing, the information flow is slow and no close collaboration occurs among the authors as well as among institutions in the network. Multiple collaboration types should thus be encouraged in this field, especially among countries. Moreover, middle and low-income countries need to strengthen cooperation with developed countries. Ethical considerations ====================== Ethical issues (Including plagiarism, informed consent, misconduct, data fabrication and/or falsification, double publication and/or submission, redundancy, etc.) have been completely observed by the authors. None declared. **Funding** This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors. **Conflict of interest** The authors report no conflicts of interest regarding this manuscript.
{ "pile_set_name": "PubMed Central" }
Q: Condition expression - how to get REPORT TYPE in condition Expression I would like to write expression like this: {REPORT_TYPE} == "csv" ? "'" + $F{NUMBER_VALUE} : $F{NUMBER_VALUE} where {REPORT_TYPE} should be xls, csv etc. Have you any idea how to get report type? A: You need to send a parameter from your server which will get these type of format like csv,xls. If this parameter has some value then you can use this expression. e.g. you have a parameter named reportType then you can make a syntax like this. $P{reportType} ? "'" + $F{NUMBER_VALUE} : $F{NUMBER_VALUE} if you want report type like csv then you need to give a value to this parameter, otherwise send it as blank string. If you still get problem let me know.
{ "pile_set_name": "StackExchange" }
1996 Australian Open – Mixed Doubles Natasha Zvereva and Rick Leach were the defending champions but only Leach competed that year, with Rennae Stubbs. Stubbs and Leach lost in the first round to Rene Simpson and Daniel Nestor. Larisa Neiland and Mark Woodforde won in the final 4–6, 7–5, 6–0 against Nicole Arendt and Luke Jensen. Seeds Champion seeds are indicated in bold text while text in italics indicates the round in which those seeds were eliminated. Draw Final Top Half Bottom Half References 1996 ITF Australian Open Mixed Doubles Draw Australian Open - Mixed Doubles Mixed Doubles Category:Australian Open (tennis) by year – Mixed Doubles
{ "pile_set_name": "Wikipedia (en)" }
Microradiography of in vivo remineralized lesions in human enamel. II. The purpose of this work was to investigate mineral deposition and redistribution in subsurface human artificial enamel lesions during in vivo remineralization period of 3 months. The enamel lesions were placed in lower prostheses of 30 patients, divided in 3 groups. Group A brushed daily with H2O; group B brushed with H2O and rinsed with a neutral 50 ppm F solution and group C brushed with a neutral 1500 ppm F toothpaste. The technique employed was microradiography. Initially the average vol % of mineral in the lesion body was 47%. After 3 months remineralization in vivo the vol % of mineral in the lesion body was for group A, B and C: 50.7, 48.7 and 53.1 vol %, respectively. The average lesion depth decreased for groups A, B and C 18, 13 and 25 microns respectively over 3 months. The original lesion depth was +/- 100 microns. The microradiographic data show conclusively that mineral is deposited "de novo" inside subsurface lesions. The remineralization percentages are for the control, rinse and brush group 20%, 15% and 31%, respectively.
{ "pile_set_name": "PubMed Abstracts" }
Q: What are bounded-treewidth circuits good for? One can talk of the treewidth of a Boolean circuit, defining it as the treewidth of the "moralized" graph on wires (vertices) obtained as follows: connect wires $a$ and $b$ whenever $b$ is the output of a gate having $a$ as input (or vice-versa); connect wires $a$ and $b$ whenever they are used as inputs to the same gate. Edit: one can equivalently define the treewidth of the circuit as that of the graph representing it; if we use associativity to rewite all AND and OR gates to have fan-in at most two, the treewidth according to either definition is the same up to a factor $3$. There is at least one problem that is known to be untractable in general but tractable on Boolean circuits of bounded treewidth: given a probability for each of the input wires to be set to 0 or 1 (independently from the others), compute the probability that a certain output gate is 0 or 1. This is generally #P-hard by a reduction from e.g. #2SAT, but it can be solved in PTIME on circuits whose treewidth is assumed to be less than a constant, using the junction tree algorithm. My question is to know whether there are other problems, beyond probabilistic computation, that are known to be intractable in general but tractable for bounded-treewidth circuts, or whose complexity can be described as a function of the circuit size and also of its treewidth. My question is not specific to the Boolean case; I am also interested in arithmetic circuits over other semirings. Do you see any such problems? A: We now understand that for any fixed bound $k \in \mathbb{N}$ on the treewidth, we can convert any Boolean circuit of treewidth less than $k$ to a so-called d-SDNNF circuit, in linear time and with the dependency on $k$ being singly exponential. The so-called d-SDNNFs are circuits satisfying conditions on the use of negation (only at the leaves), determinism (the inputs to OR-gates are mutually exclusive), decomposability (the inputs to AND-gates depend on disjoint sets of variables), and stucturedness (the AND-gates split the variables in some fixed way throughout the circuit, as described by a v-tree). This class has been studied in knowledge compilation and is known to enjoy tractable SAT and tractable model counting (recapturing probabilistic evaluation and counting), but other problems have been studied for this class such as enumeration, quantification, etc. So one way to use bounds on the treewidth of a circuit is to convert it to this d-SDNNF class which has more explicit properties in terms of the circuit semantics, and for which there are several known results on the tractability of various tasks.
{ "pile_set_name": "StackExchange" }
1. Field of the Invention This invention relates to a pipelined computer and methods in the same. 2. Description of the Prior Art In a pipelined computer having instruction pipelines of different types, the instruction pipelines sometimes spend different respective times in execution of respective instructions. In such a case, although a slight change in the sequence of actual execution of instructions is allowed, the contents of registers in the computer are required to be updated in the same sequence as the sequence of execution of the instructions. Controlling the sequence of completion of execution of instructions referred to as establishing the synchronization between the pipelines. Prior art methods of synchronization in a pipelined computer will be listed in the following. 1) Asynchronous: Controlled units are not synchronized with each other, and communication between the units is performed via flags and handshakes. 2) Horizontal Control: A composite instruction controls the operation of setting different units at respective clock periods. A long instruction is divided into a large number of fields. Processors are parallelly and independently controlled by the respective fields, and thereby the synchronization between the processors is established. When the degree of the parallel is low, the efficiency of bit use of the instruction is small. It is necessary to prepare a process of judging the possibility of parallel processing during the instruction execution, or a process of extracting the possibility of parallel processing during the instruction compiling. Thus, in the case where the controls of the processors are determined in accordance with the results of the processings by the processors respectively, the instruction is rearranged and then the instruction is required to be decoded, thereby necessitating expenditure of additional time. 3) Lockstep: A set of equal processors is synchronously controlled so that the processors will simultaneously execute equal processings. 4) Issue-When-Ready: As soon as a required unit or register becomes free, an instruction is transmitted to an execution unit. The prior art methods 1)-3) have problems as follows. The prior art method 1) is unsuited to the realization of high-speed synchronization since a handshake spends a considerable time. In the case where an exception occurs in a controlled unit and simultaneously the execution of an instruction in another controlled unit needs to be interrupted, it is difficult for the prior art method 1) to realize a method of disabling the processing of the instruction at a high speed. In the prior art method 2), since all units are controlled by a common horizontal instruction, the units can not operate independently and also processors can not be operated independently. In the prior art method 2), since the execution times of the processors are sometimes different, the process of disabling the processing of the instruction tends to be complicated during the occurrence of an exception in one of the processors. The prior art method 3) requires units to be equal. The prior art method 3) can not be applied to the case where units independently execute different operations although the units are equal.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Django Rest Framework - define API from an existing view I'm writing my django app, and i have a lot of views that already returns a JSONResponse object, for example: def power_on_relay(request): '''View that Power on one of the available relays''' try: relay_id = get_or_raise(request, 'relay_id') GPIO.setmode(GPIO.BOARD) GPIO.setup(relay_id, GPIO.OUT) GPIO.output(relay_id, True) pin_status = GPIO.input(relay_id) return JsonResponse({'success': True, 'message': 'Relay {0} was powered on'.format(relay_id), 'data': None}) except Exception as ex: return JsonResponse({'success': False, 'message': str(ex), 'data': ''}) Now, i need to expose some of these views as "API" and i need to manage the authentication, throttling, etc... So, i was wondering if it's possible using DRF and without writing tons of redundant code. I mean, there is a short way to do that? something like a decorator that doesn't change my web application behaivor? Any suggestions? A: You will need to use api_view decorator from rest_framework.decorators import api_view from rest_framework.response import Response @api_view(['GET']) def power_on_relay(request): '''View that Power on one of the available relays''' try: relay_id = get_or_raise(request, 'relay_id') GPIO.setmode(GPIO.BOARD) GPIO.setup(relay_id, GPIO.OUT) GPIO.output(relay_id, True) pin_status = GPIO.input(relay_id) return Response({'success': True, 'message': 'Relay {0} was powered on'.format(relay_id), 'data': None}) except Exception as ex: return Response({'success': False, 'message': str(ex), 'data': ''})
{ "pile_set_name": "StackExchange" }
Culinary Cannabis Shadi has been a plant based chef for over a decade. She fell in love with hemp in 2014 and hasn't looked back ever since. Shadi has been cooking with hemp for the past four years and has immersed herself in the Anthropology of Hemp. Shadi started growing hemp in 2015 on her micro-farm in Hygiene, Colorado. The entire season was an absolute amazing experience. This hemp farm immersion opened up many possibilities and dreams. Shadi learned a lot about hemp, from seed to harvest, that first year. Spending time in a hemp forest was a life changing experience! In 2015, Shadi begain working with hemp on a daily basis as a food source. She has since created recipes that include various parts of the plant; seed, hearts, leaf, hemp seed oil and full-spectrum hemp extract. “Equitable access to organic and non-GMO foods is a human right.” — Shadi Ramey, M.A Shadi is dedicated to organic and non-GMO farming. She is grateful to be connected to the sacred Ganja plant. She believes that all humans can benefit from the powerful and amazing medicinal properties of hemp and cannabis. Shadi is ecstatic to start a female-owned-and-operated medicinal herb farm. Shakti Herb Farm has long been a dream that is coming to fruition in 2018! She is delighted to launch Shakti Herb Farm with a strong team of powerful women on a mission to change the world. In 2017 Shadi created Satya Kama™, the first ever hemp-based intimacy enhancer, and a line of organic, hemp-based moisturizing creams that are good enough to eat. Shadi is dedicated to using her business as a force for good. Satya Kama is one of the first hemp companies to have earned the rigorous pending B-Corp status. Shadi teaches about plant based nutrition, culinary anthropology and and hemp food. She also runs medicinal herb and hemp farm located just outside of Boulder.
{ "pile_set_name": "Pile-CC" }
List of Canadians in NCAA March Madness Share: It’s that time of the year again – we are about to begin the NCAA Tournament making this the time for March Madness! After a season that had arguably the most Canadian men actively on NCAA rosters it’s time for some of them to start their trip through the tournament season. We have been following these men closely since October and now we have a complete list of our Canuck men playing in all four of the invite only events right here … NCAA Tournament Midwest Region Buffalo – Jarryn Skeete, Rodell Wigginton Kentucky – Trey Lyles New Mexico St – Daniel Mullings, Tanveer Bhullar, Matthew Taylor, Jalyn Pennie, Rashawn Brown Valparaiso – Tevonn Walker, Max Joseph West Region Oregon – Dillon Brooks Harvard – Agunwa Okolie, Chris Egi, Patrick Steeves (likely not participating due injury) Baylor – Kenny Chery East Region Villanova – Dylan Ennis Lafayette – Jake Newman Providence – Junior Lomomba Dayton – Dyshawn Pierre Oklahoma – Dinjiyl Walker Albany – Richard Peters Virginia – Marial Shayok South Region Gonzaga – Kyle Wiltjer, Kevin Pangos, Dustin Triano San Diego St – Kevin Zabo Utah – Dallin Bachynski Iowa St – Naz Long NIT Colorado St – Joe De Ciman Green Bay – Tevin Findlay Illinois St – MiKyle McIntosh Old Dominion – Denzell Taylor Richmond – Kadeem Smithen Stanford – Stefan Nastic Montana – Daniel Nwosu UTEP – Matt Willms (likely not participating due to injury) CBI Seattle – Emerson Murray, Jadon Cohee, Manroop Clair Vermont – Trae Bell-Haynes, Drew Urquhart Rider – Junior Fortunat UC Santa Barbara – Alex Hart CIT James Madison – Yohanny Dalembert Eastern Kentucky – Jaylen Babb-Harrison Maryland-Eastern Shore – Ishaq Pitt Canisius – Jamal Reynolds, Kassius Robertson, Cassidy Ryan Cleveland St – Kaza Keane Grand Canyon – Miroslav Jaksic St Francis – Ben Millaud Bowling Green – Brandon Busuttil Portland – Riley Barker (likely not participating due to injury)
{ "pile_set_name": "OpenWebText2" }
Summary/Abstract (from Parent R01AA025848) A recent review of trajectory research found that there is a great deal of research aimed at better understanding transitions in alcohol and other drug (AOD) use patterns from early to late adolescence and late adolescence to emerging adulthood. However, no studies to date have: a) 13 assessments of AOD use from age 10-24 across all developmental periods (middle school, high school, and emerging adulthood); b) a large sample with substantial racial and ethnic diversity, particularly among Hispanic and Asian youth; c) in-depth coverage of 10 areas of functioning across three key domains; d) subjective and objective neighborhood data; and e) the capacity to examine developmental trajectories for more than one substance. The current proposal continues R01AA016577 and R01AA020883 (PI: D?Amico), which together have assessed AOD use across nine waves of data from age 10 to age 19. The proposed study capitalizes on the longitudinal data on protective and risk factors we have collected since age 10 in a diverse cohort (44% Hispanic, 21% Asian, 21% white; 2% Black, 12% multiethnic/other; 54% female) by continuing to annually assess these youth in order to capture important transitions to emerging adulthood. Our specific aims are to: Aim 1a: Identify trajectories of alcohol, tobacco, marijuana, and other drug use from age 10 into emerging adulthood. Assess differences by race/ethnicity. Aim 1b: Examine individual (e.g., resistance self-efficacy), peer (e.g., peer use) and family (e.g., parent disapproval of use) factors that may impact these trajectories. Test for similarities/differences in these associations across racial/ethnic groups. Aim 2a: Merge the survey data with the largest existing database of neighborhood measures to examine effects of neighborhood characteristics (economic, social, demographic, alcohol and marijuana outlet density) on AOD trajectories. Aim 2b: Test for similarities/differences in these associations across racial/ethnic groups. Aim 3a: Examine how AOD use trajectories during middle and high school predict outcomes through age 24 in three core domains: 1) risk behaviors (e.g., AOD use, risky sexual behavior, delinquency), 2) health related quality of life (e.g., mental, physical, social), and 3) adult role functioning and transitions (e.g., education, relationships, life satisfaction). Aim 3b: Test for similarities/differences in these associations across racial/ethnic groups. Aim 4a: Using new data gathered annually from ages 20-24, examine how adult role functioning and transitions longitudinally predict subsequent changes in AOD use and other risk behaviors, as well as health-related quality of life, in emerging adulthood. Aim 4b: Test for similarities/differences in these associations across racial/ethnic groups. By advancing the epidemiology of alcohol use during adolescence and emerging adulthood, our findings can impact prevention and intervention programming for young people and address public health policy. 1
{ "pile_set_name": "NIH ExPorter" }
John D. Pettineo v. Ge Money Bank IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA March 29, 2011 JOHN D. PETTINEO, PLAINTIFF,v.GE MONEY BANK,DEFENDANT. The opinion of the court was delivered by: Schiller, J. MEMORANDUM Defendant GE Money Bank ("GE") sent Plaintiff John Pettineo a letter denying his application for a credit card. Pettineo alleges that this denial and a disclosure at the bottom of the GE form letter he received violate the Equal Credit Opportunity Act ("ECOA"). GE's motion to dismiss and Pettineo's response are presently before the Court. For the reasons that follow, GE's motion will be granted in part and denied in part. I. BACKGROUND Pettineo tried to use his ShopNBC credit card in October of 2008. (Am. Compl. ¶ 9.) The card was denied. (Id.) Pettineo called ShopNBC and discovered that the card had been canceled for inactivity. (Id.) He could not reopen his account, but had to apply for a new credit card. (Id.) GE underwrote Pettineo's ShopNBC card. (Id.) Pettineo applied over the phone with GE's customer service department for another ShopNBC credit card. (Id. ¶ 10.) He received a written denial from GE on December 23, 2008. (Id. ¶ 11.) In this letter, GE offered three reasons for the denying Pettineo credit: (1) past due bankcards; (2) revolving trades with past due balances; and (3) bank revolving accounts with past due balances. (Am. Compl. Ex. A [GE Letter].) Pettineo alleges he was qualified for credit, but that GE denied his application because he previously sued under various federal statutes, including the Fair Debt Collection Practices Act, the Fair Credit Reporting Act, and the ECOA. (Am. Compl. ¶¶ 25-26.) GE's letter to Pettineo features a disclosure reciting non-discrimination policies the ECOA requires creditors to observe. The text of this disclosure reads: ALL PERSONS TO WHOM THIS LETTER IS ADDRESSED: The federal equal credit opportunity act prohibits creditors from discriminating against credit applicants on the basis of race, color, religion, national origin, sex, marital status, age (provided the applicant has the capacity to enter into a binding contract), because all or part of the applicant's income derives from any public assistance program, or because the applicant has in good faith exercised any right under the Consumer Protection Act. The federal agency that administers compliance with the Equal Credit Opportunity Act for the creditor identified on the front page of this letter is shown below. (GE Letter.) The letter provides contact information for the different government agencies which oversee the ECOA compliance of GE, GE Capital Financial, Inc., and General Electric Capital Corporation. (Id.) A paragraph at the top of the letter states that "[r]equests for a copy of your credit report should be sent to the credit reporting agency listed in the bottom portion of this notice." (Id.) The letter includes contact information for Equifax Credit Information Services, which it identifies as the source of information used by GE in reaching its decision to deny Pettineo credit. (Id.) The disclosure and federal agency contacts are located toward the bottom of the letter, typed in "a type set of eight (8) point or smaller," rendering them "practically illegible" to Pettineo. (Am. Compl. ¶ 18.) Pettineo claims he ultimately had to use "magnification" to read the disclosure. (Id. ¶ 23.) However, at the time he received the letter, he did not read the disclosure because he assumed it was "meaningless print that had no bearing or significance" due to its small size. (Id. ¶ 22.) This section of the letter includes a notice informing Pettineo that he had the right to request a free copy of Equifax's report within sixty days of his receipt of GE's letter. (GE Letter.) Pettineo claims he was unaware of his right to request a free credit report because of the notice's small type. (Am. Compl. ¶ 24.) When he realized he had a right to request a free credit report, the deadline had passed. (Id.) Pettineo also alleges he was "unaware that he was a member of a protected class" under the ECOA because he initially did not read the disclosure. (Id. ¶ 22.) Pettineo seeks over $150,000 to compensate him for "severe anxiety attacks" he suffered due to GE's conduct. (Id. ¶ 45.) He also seeks an injunction barring GE from issuing "any further correspondence which fails to clearly and conspicuously reveal the disclosure language" at issue, punitive damages, and costs. (Id.) Additionally, Pettineo requests "the opportunity to discuss potential class action status, remedy and treatment with competent counsel and [to] amend [his] Complaint accordingly under FRCP 23." (Id.) In addition to the letter Pettineo received from GE in December of 2008, Pettineo attaches a second letter to his Amended Complaint. This letter, dated October 14, 2008, informs Pettineo that GE and Wal-Mart had reduced the available credit on his Wal-Mart account. (Am. Compl. Ex. B. [Wal-Mart Letter].) This letter does not include the disclosures in fine print on its face, but recites them in a uniform font size on its reverse. (Id.) Pettineo asserts that this second letter complies with the ECOA's notice requirement, and speculates that GE's apparent use of compliant and non-compliant form letters simultaneously demonstrates that GE may continue to use letters that do not effectively convey the ECOA disclosure. (Am. Compl. ¶¶ 38, 40-41.) II. STANDARD OF REVIEW The Federal Rules of Civil Procedure mandate dismissal of complaints which fail to state a claim upon which relief can be granted. Fed. R. Civ. P. 12(b)(6). The Court accepts "as true all of the allegations in the complaint and all reasonable inferences that can be drawn therefrom," viewing them in the light most favorable to the non-moving party. See Phillips v. County of Allegheny, 515 F.3d 224, 233 (3d Cir. 2008); Morse v. Lower Merion Sch. Dist., 132 F.3d 902, 906 (3d Cir. 1997). The Court will construe Pettineo's complaint liberally, as he brings this action pro se. See Haines v. Kerner, 404 U.S. 519, 520 (1972); Smith v. Sch. Dist. of Phila., 112 F. Supp. 2d 417, 423 (E.D. Pa. 2000). The Third Circuit applies a two-part analysis to determine whether claims should survive a Rule 12(b)(6) motion to dismiss. Fowler v. UPMC Shadyside, 578 F.3d 203, 210-11 (3d Cir. 2009). The Court must first separate the factual and legal elements of each claim, accepting well-pleaded facts as true but disregarding legal conclusions. See id. Second, the Court must determine whether the facts alleged in the complaint are sufficient to show a plausible claim for relief. See id. at 211 (citing Phillips, 515 F.3d at 234-35). If the well-pleaded facts "do not permit the court to infer more than the mere possibility of misconduct," the Court should dismiss the complaint for failure to state a claim. See Jones v. ABN Amro Mortg. Grp., 606 F.3d 119, 123 (3d Cir. 2010). Pettineo's First Amended Complaint presents two claims under the ECOA: a discrimination claim and a claim arising from GE's allegedly deficient disclosure notice. Pettineo pleads a plausible discrimination claim under the ECOA. However, the Court will dismiss his claim arising from the small font in GE's letter. A. ECOA Discrimination To establish a prima facie case of discrimination under the ECOA, a plaintiff must establish that: (1) he belongs to a protected class; (2) he applied for credit; (3) he was qualified for credit; and (4) credit was nevertheless denied. Anderson v. Wachovia Mortg. Corp., 621 F.3d 261, 268 n.5 (3d Cir 2010). Pettineo alleges membership in a protected class under § 1691(a)(3), which prohibits discrimination against plaintiffs who have in good faith exercised a right under the Consumer Credit Protection Act ("CCPA"). 15 U.S.C. § 1691(a)(3); see also Lewis v. ACB Bus. Servs., Inc., 135 F.3d 389, 406 (6th Cir. 1998). The parties also do not dispute that Pettineo applied for credit. However, GE argues that Pettineo has failed to allege facts supporting his allegations that he was qualified for credit or that he was denied credit because of his litigation history. (Def.'s Mot. to Dismiss 15.) Pettineo alleges that he was qualified for credit. (Am. Compl. ¶ 26.) He also claims that the information GE used to determine his creditworthiness was inaccurate. (Id.) These allegations satisfy the third element of an ECOA claim for the purposes of a motion to dismiss. Pettineo likewise satisfies the fourth element of this claim by alleging that GE denied him credit due to "previous exercise[s] of his rights" under the statute. (Id. ¶ 25.) The Court will therefore deny GE's motion with respect to Pettineo's ECOA discrimination claim. B. CCPA Disclosure Requirements Pettineo does not take issue with the content of the disclosure in GE's letter. (Pl.'s Resp. to Def.'s Mot. to Dismiss Pl.'s First Am. Compl. [Pl.'s Resp.] 3.) Rather, Pettineo contends that the letter did not effectively convey this disclosure information to him and others similarly situated because the font was too small. (Id.) Specifically, Pettineo asserts that the body of the letter "overshadowed" the disclosure because the disclosure was printed in much smaller type than the rest of the letter. (Id. at 6-7.) Pettineo also argues that GE inhibited consumers from contacting oversight agencies by including oversight information for three separate, similar-sounding GE sister-companies: GE Money Bank, GE Capital Financial, Inc., and General Electric Capital Corporation. (Id. at 19.) Each of these companies has a separate oversight agency contact listed on the letter. (GE Letter.) Pettineo was thus unsure whether GE Money Bank "was either just a self-proclaimed pseudonym for General Electric Company . . . to insulate [it] from any and all wrongdoing . . . or possibly a company merely involved in fraud in the inducement." (Id. at 20.) 1. ECOA notice requirements The ECOA authorizes the Federal Reserve Board to issue regulations implementing the statute, including its notice provisions. 15 U.S.C. § 1691b; see also 12 C.F.R. § 202.1. These regulations, known collectively as Regulation B, mandate that creditors must provide required disclosures "in a clear and conspicuous manner . . . in a form the applicant may retain." 12 C.F.R. § 202.4(d). The Federal Reserve's Official Staff Interpretations clarify that the "clear and conspicuous" standard "requires that disclosures be presented in a reasonably understandable format in a way that does not obscure the required information. No minimum type size is mandated, but the disclosures must be legible, whether typewritten, handwritten, or printed by computer." 12 C.F.R. § 202 Supp. I; see also Williams v. MBNA Am. Bank., N.A., 538 F. Supp. 2d 1015, 1021 (E.D. Mich. 2008). In the absence of other authority, GE urges the Court to adopt the Williams court's conclusion that the "clear and conspicuous" standard requires merely that a creditor provide "visible" disclosures. (Def.'s Mot. to Dismiss 9-10.) This reasoning follows interpretations of a "clear and conspicuous" standard found in the Consumer Leasing Act. Williams, 538 F. Supp. 2d at 1021. The Williams analysis focuses solely on the "mode of presentation, not the degree of comprehension. So long as a disclosure is visible, it has satisfied the clear and conspicuous requirement . . . even if it is incomprehensible to the average consumer." Id. at 1022. Pettineo suggests that the Court look instead to cases involving the Fair Debt Collection Practices Act ("FDCPA"), which analyze consumer communications under a "least sophisticated consumer" standard. See Ellis v. Solomon and Solomon, P.C., 591 F.3d 130, 135 (2d Cir. 2010). Pettineo suggests that decisions interpreting the FDCPA offer a better source of authority in ECOA cases than the Consumer Leasing Act does, as the FDCPA and ECOA share a common consumer-protection purpose under the CCPA. (Pl.'s Resp. 5.) Pettineo also contends that the Court may not determine whether GE's notice complies with the ECOA on a motion to dismiss, as this matter is "a question of fact for the jury to determine." (Id. at 4.) GE's notice effectively communicates the required disclosure information. For example, with respect to Pettineo's right to receive a free copy of his credit report, the letter includes directions for obtaining a free copy of his credit report from the credit reporting agency at the top of the page in relatively large font. (See GE Letter.) Pettineo's confusion as to GE's oversight agency likewise does not constitute an actionable ECOA violation. Even a gullible, naive, or unsophisticated consumer could quickly determine which agency administered compliance for which GE company simply by contacting one of the oversight agencies listed. These issues thus do not give rise to a claim for violation of the ECOA's notice provision. Finally, Pettineo's decision that the disclosure information was unimportant because it was printed in relatively small font is inconsistent with the least sophisticated consumer standard's presumption that consumers read such notices with care. See Wilson, 225 F.3d at 354-55. The Court will therefore dismiss Pettineo's claims with respect to the ECOA's disclosure requirements. C. Punitive Damages and Attorneys' Fees Pettineo's Amended Complaint seeks punitive damages under the ECOA. (Am. Comp. ¶ 45.) GE contends that Pettineo's "conclusory allegations of extreme and outrageous conduct" are insufficient to support this punitive damages claim. (Def.'s Mot. to Dismiss 16-17.) The ECOA permits aggrieved applicants to recover punitive damages of $10,000 or less, regardless of proof of actual damages, if the defendant's conduct was wanton, malicious, or oppressive, or if the defendant acted in reckless disregard of the law. 15 U.S.C. § 1691e(b). The Court may fairly infer from Pettineo's Amended Complaint that he alleges GE intentionally denied him credit because he has previously exercised his rights under the CCPA. These allegations are sufficient to sustain Pettineo's punitive damages claim on a motion to dismiss. The Court will grant GE's motion with respect to Pettineo's claims arising from the ECOA's disclosure requirements. Because Pettineo has alleged plausible claims for discrimination and punitive damages, the Court will permit these claims to proceed. An Order consistent with this Memorandum will be docketed separately. Our website includes the main text of the court's opinion but does not include the docket number, case citation or footnotes. Upon purchase, docket numbers and/or citations allow you to research a case further or to use a case in a legal proceeding. Footnotes (if any) include details of the court's decision. Buy This Entire Record For $7.95 Official citation and/or docket number and footnotes (if any) for this case available with purchase.
{ "pile_set_name": "Pile-CC" }
Procedures such as exercise testing, pulmonary compliance, and work of breathing have been found successful for evaluating pulmonary function. By exercising a patient on a treadmill and gradually increasing the workload (i.e., speed and incline), the physician can better assess cardio-pulmonary disease, which in its early stages generally does not manifest itself except under physical exertion. In order to help the physician perform these procedures more effectively, a microcomputer system has been developed to enable automated real-time collection, analysis and display of pulmonary compliance data. Work is in progress to complete an automated exercise procedure as well. Data is stored in a local disk data base for future reference.
{ "pile_set_name": "NIH ExPorter" }
Practical Application of Elastography in the Diagnosis of Thyroid Nodules in Children and Adolescents. Ultrasound elastography is a noninvasive method of imaging based on the estimation of the mechanical properties of tissue. Data in adults indicate that decreased flexibility in comparison to the surrounding healthy tissue is characteristic of malignancy (in most thyroid carcinomas, except for follicular thyroid carcinoma). The purpose of our study was to assess the deformation of thyroid nodules and to evaluate the usefulness of elastography in predicting malignant thyroid nodules in adolescent patients. We examined 47 children with 62 thyroid nodules. All patients underwent elastography and fine needle aspiration cytology (FNAC). Thirty-seven girls (79%) and 10 boys (21%) were included in the study. A strain ratio <2 was observed in 17 nodules (27% of the study group), a strain ratio between 2 and 4.9 in 34 nodules (55%) and a strain ratio >5 in 11 nodules (18%). According to cytological examination, 3 nodules (4.8% of the study group) were malignant. Two of them were hard (strain ratio ≥5), and 1 nodule had a strain ratio of 2. Our results suggest that elastography can be complementary to conventional ultrasonography and useful while making a decision about FNAC. At the same time, it should not replace the cytological assessment of thyroid nodules in children and adolescents.
{ "pile_set_name": "PubMed Abstracts" }
Effect of protein nutrition on the mRNA content of insulin-like growth factor-binding protein-1 in liver and kidney of rats. Effect of quantity and nutritional quality of dietary proteins on the content of mRNA of insulin-like growth factor-binding protein-1 (IGFBP-1) was studied in rat liver and kidney. IGFBP-1 mRNA content per unit RNA increased in liver and kidney of rats fed on a protein-free diet and in those of fasted rats compared with that in the rats fed on a casein diet. When rats were given a gluten diet for 7 d, IGFBP-1 mRNA content in liver did not change significantly but that in kidney increased considerably compared with that in those organs of the rats fed on the casein diet. Because IGFBP-1 mRNA has been demonstrated both in liver parenchymal and non-parenchymal cells (Takenaka et al. 1991), the effect of the protein-free diet on these two types of cells has been studied. An increase in IGFBP-1 mRNA content under protein deprivation was observed in both liver parenchymal and non-parenchymal cells, suggesting that these two types of cells are regulated in a similar mode as far as IGFBP-1 mRNA content is concerned. The physiological and nutritional significance of the previously stated results on protein anabolism are discussed when considered together with our previous observations on the plasma concentrations of IGF-1 (Takahashi et al. 1990) and IGFBP (Umezawa et al. 1991) and insulin-like growth factor-1 mRNA content in liver (Miura et al. 1991).
{ "pile_set_name": "PubMed Abstracts" }
Business partners Martin Wilcocks and Craig Blackwell have bought 122 Old Hall Street, which is well known to motorists for its curved mirrored glass facade on the corner of Old Hall Street and Leeds Street. The three storey-high building was built in the 1980s by the Moores family for its Littlewoods empire. Today Shop Direct, which now owns the Littlewoods and Very.co.uk brands, still has some operations in the 32,000 sq ft complex. Its new owners say they are now considering plans for the building and adjoining land and will announce their redevelopment plans next year. Mr Blackwell, who runs property investment firm Prospect Capital, said: “It gives us great pleasure to announce the purchase of this iconic site on Old Hall Street. “The site is positioned, as we see it, at the gateway to the central business district of Liverpool city centre. “With outlooks across to the city and the River Mersey this sits in a key position on the city landscape.” Martin Wilcocks, left, and Craig Blackwell outside the mirrored glass building they have bought on the corner of Old Hall Street and Leeds Street
{ "pile_set_name": "Pile-CC" }
Q: How to randomly select items in a set For my homework assignment I am supposed to randomly select items in a list. so far I have this code, import random room = range(0, 365) r = random.choice(room) mySet = set(r) However, when I attempt to run the program, it says that " 'int' is no iterable". I was wondering how I can fix this problem? A: set() requires an iterable (a list or tuple are iterables) as its argument, where you’ve supplied an integer. A: If you want to choose random items (with fixed size) from a set: list = random.sample(your_set, size); or if you want to choose random items with random size: size = random.randint(0, your_set_size): list = random.sample(your_set, size):
{ "pile_set_name": "StackExchange" }
Q: NativeScript - Convert HTML string to HTML I use NativeScript to develop a mobile application. I have a ListView with Label and I want convert text with HTML to HTML. I try to use [innerHTML] but it's doesn't works. A: You can try the HTMLView Control. Check the details here in the below documentation. https://docs.nativescript.org/ui/ns-ui-widgets/html-view
{ "pile_set_name": "StackExchange" }
Northwest Indiana’s Premier Law Firm Always Striving For Service And Results At Tanzillo Stassin & Babcock, P.C. We are committed to serving individuals and families throughout Indiana and Illinois. Our attorneys will take the time to understand the unique demands of your case, consider your immediate and future objectives, and develop a tailored legal solution to address your needs. We offer a broad range of services and are prepared to handle any complex claims or legal issues that may arise. Our firm puts our clients interests first. Strategic guidance, trusted counsel, and solid results. Strategic guidance, trusted counsel, and solid results. Contact us to schedule a free consultation with an experienced attorney. Contact us to schedule a free consultation with an experienced attorney.
{ "pile_set_name": "OpenWebText2" }
Elective versus emergency surgery for patients with colorectal cancer. A prospective study of 570 patients presenting with colorectal cancer over a 6-year period was undertaken. Of these, 363 were admitted electively and 207 presented as emergencies. The outcome following elective admission was more favourable than after emergency admission. In the elective group the proportion of resected tumours was greater (77 versus 64 per cent, P less than 0.001), the operative mortality rate lower (9 versus 19 per cent, P less than 0.001) and the 5-year disease-related survival rate higher (37 versus 19 per cent, P less than 0.001). These differences may relate to the greater resection rates in the elective situation. Results of surgical intervention might be improved if emergency colorectal operations were undertaken by surgeons with more experience of this type of surgery.
{ "pile_set_name": "PubMed Abstracts" }
Anterior cruciate ligament (ACL) injury creates considerable disability and predisposes the knee to the early onset of osteoarthritis. This is a concern because the past two decades has seen an increased participation of women in sports and with this has come a concomitant increase in ACL injuries. The incidence rate of ACL tears is 2 to 9 times greater amongst females in comparison to males; however, there is limited information with regard to the demographic, injury history, hormonal history, anatomic, neuromuscular, and environmental variables that individually or collectively contribute to the risk of suffering an ACL injury. Most of what is known has come from risk factor studies that have focused on selected variables in isolation (e.g. femoral intra-condylar notch width, A-P knee laxity, or phase of menstrual cycle) and consequently it is not surprising that a comprehensive ACL injury risk model has not been established. Our prior research has revealed that the risk model for ACL injury is probably different for females compared to males and this serves as the rational for our investigation, the objective of which is to find the unique combination of risk factors that identify females and males at increased risk of suffering an ACL injury. The hypothesis of our study is: A combination of demographic, injury history, hormonal history, anatomic, neuromuscular, and environmental variables can be used to identify females at increased risk of non-contact ACL trauma, and that a separate combination of these variables can be used to identify males at increased risk of ACL trauma. Initially, we will establish that examiners can measure the potential risk factors in a reliable manner. We will assemble a cohort of collegiate and pre-collegiate athletes and follow them to prospectively accrue ACL injury cases. We will then perform a nested case-control study to identify risk factors for ACL injury. Three controls for each injury case will selected at the time of injury from among teammates who have not been injured at or prior to that time. For subjects that suffer an ACL tear, the potential risk factors that are not modified by the injury will be measured from the injured limb while the factors that are modified by the injury will be measured from the contra-lateral, normal, limb and used to represent the pre-injury condition of the ACL-deficient limb. The same measurements will be obtained on the matched controls. This investigation is significant because it will determine the putative risk factors that identify females and males at increased risk for ACL injury and allow future intervention studies that reduce the incidence of this debilitating injury.
{ "pile_set_name": "NIH ExPorter" }
What is "beautiful?" Depends who you ask! Beauty is a very subjective thing, and its definition changes wildly depending on who you ask. What's ugly and hideous to one person is attractive and sexy to the next. There's no better example of this than the Japanese yaeba phenomenon. Some people in Japan think that a yaeba 八重歯 ( やえば ) , or snaggletooth, can be the cutest part of a woman. When those front teeth stick out or overlap, it just drives some Japanese men crazy. But why? Some say that yaeba makes a woman look cute, almost childlike; like when a kid's teeth aren't fully grown in yet. Lots of cultures value signs of youthfulness – yaeba is just looking at youth in an unusual way. Crooked teeth have become so appealing to some people that you can get a procedure called tsuke yaeba 付 ( つ ) け 八重歯 ( やえば ) or "attached snaggletooth" to get your own, fake yaeba. Want to get some fake chompers? Hop on over to Dental Salon Plasir in the Ginza district of Tokyo, one of several places across Japan where you can get tsuke yaeba. Dental Salon Plasir offers a tsuke yaeba procedure that adds custom fitted, removable caps to your teeth for around the low, low price of about US$400. Don't think it's worth the money? Then maybe their commercial will sell you on the procedure. Watch as a woman goes through the whole process of getting tsuke yaeba: And if you're still not entirely sold on the idea of getting some teeth capped, maybe the allure of fame will do it for you. There's even a new idol group comprising solely girls with yaeba called TYB48. They've got all the same looks as idol sensations AKB48 – plaid skirts, giant bows, and a young, innocent demeanor. The only way you that TYB48 looks from pop battalion AKB48 is their not-so-perfect teeth. It should be obvious (but still worth mentioning) that, like any other aspect of beauty, the attraction to yaeba isn't anywhere near universal. In the grand scheme of things, the attraction to yaeba is very niche, but it's undeniable that the attraction to yaeba is pretty unique to Japan. To me, the yaeba phenomenon is interesting because emphasizes that all over the world, people sometimes do weird things for beauty. After all, you don't have to look far to see the strange, sometimes harmful things that people do for beauty, like liposuction, Botox treatment, tattooed eyebrows or lipliner, or harsh, orange tans. If anything, the whole yaeba trend seems pretty innocuous in comparison. Unlike a lot of other beauty procedures, tsuke yaeba is completely temporary and harmless.
{ "pile_set_name": "OpenWebText2" }
[Immunotherapy: also in elderly patients ?] The emergence of immunotherapy has generated great enthusiasm in oncology improving the prognosis of pathologies such as melanoma, lung cancer, kidney cancer, bladder and head and neck cancers. This enthusiasm concerns also older patients in view of the good tolerance of immunotherapy in young people. However, advanced age is linked to changes in the immune system, called immunosenescence, which could have a negative impact on the efficacy and toxicity of immunotherapy treatment. Knowledge in terms of efficacy and tolerance is limited for geriatric patients, few being included in clinical studies. This article summarizes the experience of immunotherapy in large clinical trials. It appears that the immune checkpoint inhibitors are effective and well tolerated in the elderly.
{ "pile_set_name": "PubMed Abstracts" }
Q: Como puedo desahabilitar una llave foranea en una tabla para hacer un truncate en slq server quiero saber si hay una forma de como desahabilitar una llave foranea, para poder eliminar los registros de una tabla, pero cuando hago utilizo este script: alter table dbo.AMBITO NOCHECK constraint ALL --Desactivar, me sigue sin poder eliminar los registros de una tabla, lo necesito hacer sin un procedimiento almacenado A: puedes probar quitando los datos de la tabla a la cual hace referencia la foranea y luego ejecutas el truncate a la tabla que necesitas
{ "pile_set_name": "StackExchange" }
The latest installment in a continuing series in which American events are described using the tropes and tone normally employed by the American media to describe events in other countries. WASHINGTON, United States—On Tuesday, voters in this country of 300 million, the world’s second-largest democracy and most populous Christian nation, will head to the polls for elections that will determine control of the upper house of the legislature and serve as a referendum on the country’s embattled ruling regime. While international monitors expect a mostly free and fair contest, questions have been raised about why the equivalent of the GDP of Montenegro is being spent on a contest to determine the membership of a body expected to accomplish little over the next two years. Human rights observers have also noted a troubling rise in anti-immigrant rhetoric stoked by far-right nationalist candidates. President Barack Obama’s ruling party will almost certainly lose seats, but whether or not the opposition is able to take over the upper house will be determined by closely fought races in the nation’s torrid southeastern swamps, central agricultural region, and even frigid Arctic villages thousands of miles from the capital. There is no shortage of pressing issues, from a sluggish economic recovery to multiple foreign wars, facing this large and diverse society. Still, elections in this vast nation can often be characterized by idiosyncratic local rituals. In this campaign season, feats of strength involving dominating animals have been popular. One opposition candidate for national office has boasted of castrating pigs, another of wrestling alligators. While the country’s citizens have migrated en masse to large cities in search of greater economic opportunity, specialists in American folkways say people here still value these demonstrations of rural aptitude. Not to be outdone, government loyalists have boasted of their marksmanship and snowmobiling skills. Appealing to nationalist sentiment, the opposition has accused the government of allowing too many immigrants to make their way across the country’s southern border, tying this issue to fears of deadly viruses and terrorism. There have also been disturbing unconfirmed reports of a “war on women” being waged by religious extremists in the country’s Western mountains. In this deeply traditional society, where great import is accorded to family ties, powerful clans build patronage networks, and political office is often passed between relatives. Remarkably, one race pits the cousin of a former governor against the daughter of a former senator. With control of the upper house coming down to just a few key races, the election has been bitter, combative, and expensive. In one coastal state, the ruling party and its supporters have spent more than $26 million attacking a single opposition candidate. Not surprisingly, the election has also become a contest for influence among America’s politically powerful oligarchs, who often seek to control elections by employing a complex form of legally sanctioned slush funds. The vast fortunes spent and passions aroused are particularly noteworthy given that few expect the legislature to pass much in the way of meaningful legislation. America is still governed under an unwieldy 18th-century political model employed by few other functioning democracies. With the executive mansion and legislature controlled by two different parties, there’s little hope of large-scale reforms. While 2014 has seen a rash of military coups and America boasts both a staggering level of income inequality and the world’s most heavily armed populace, political forecasters say a violent uprising is still unlikely. While few are satisfied with the political process as it exists, most Americans are either apathetic about the state of affairs or deeply invested in the current system. Most are already gearing up for the all-important presidential election coming in two years. Not surprisingly, many expect it to be another brutal contest between the country’s two top political dynasties.
{ "pile_set_name": "OpenWebText2" }
Michael Brantley also homered and had three hits for Cleveland, which won at Yankee Stadium for the first time in eight games. Ramirez hit a two-run drive in the second inning and had three hits. Derek Jeter had an infield single in the sixth inning to pass Honus Wagner for sixth on the career list with No. 3,431. But New York was 0 for 9 with six strikeouts with runners in scoring position in losing for just the second time in eight games. Kluber (13-6) did not allow a hit until Jacoby Ellsbury doubled with one out in the fourth. He struck out 10 to beat New York for the first time in three tries. The right-hander has allowed only one earned run since the ninth inning of a win against Detroit on July 19. He has won five straight decisions. Before the game, the Yankees honored Paul O'Neill with a plaque to be placed in Monument Park. O'Neill was humbled to know that his plaque will be among the many Yankees greats feted in Monument Park beyond the center field wall at Yankee Stadium. In nine years with the Yankees, the right fielder hit .303 with 185 homers and 858 RBIs. He helped New York win four World Series titles and five AL pennants from 1996-2001. O'Neill won the 1994 AL batting title. Also prior to the game, the Yankees placed catcher Brian McCann on the seven-day concussion list less than a day after he was hit in the facemask by a foul ball and gave second baseman Brian Roberts his unconditional release. Roberts was hitting .237 with five homers and 21 RBIs when he was cut on Aug. 1 to make room for infielder Stephen Drew. Blue Jays 3, Tigers 2: Nolan Reimold hit a game-winning double in the 10th inning as host Toronto spoiled Max Scherzer's bid to become the first 14-game winner in the American League. Danny Valencia singled off Joba Chamberlain to begin the 10th, and Reimold followed with a double to the wall in left-center as Valencia scored without a play. Scherzer allowed one run and four hits in eight innings. He walked none and struck out 11, two shy of his season high. Chamberlain (1-5) came on to start the 10th after Joakim Soria, who finished the ninth, appeared to suffer a back injury while warming up before the inning. Aaron Loup (4-3) worked one inning for the victory. Toronto trailed, 2-1, through eight innings but Jose Reyes singled off Tigers closer Joe Nathan to begin the ninth, then stole second before advancing to third on Melky Cabrera's fly ball to right. Jose Bautista was intentionally walked to bring up Dioner Navarro, who grounded a tying single past a diving Miguel Cabrera at first base. A wild pitch moved the runners to second and third before Colby Rasmus walked to load the bases, bringing Soria out of the bullpen to replace Nathan, who blew his sixth save in 30 chances. Soria sent it to extra innings by getting Juan Francisco to pop up on the first pitch, then retiring Munenori Kawasaki on a ground ball. Soria came back out to start the 10th but appeared to suffer an injury before throwing his first pitch, forcing manager Brad Ausmus to turn to Chamberlain. Orioles 10, Cardinals 3: Caleb Joseph homered in his fifth consecutive game, Nelson Cruz hit his 30th, and Delmon Young also went deep for host Baltimore. All three home runs came with a man on against John Lackey (1-1), making his second start since coming from Boston in a July 31 trade. The right-hander gave up nine runs and 13 hits in five-plus innings to fall to 14-8 lifetime against Baltimore. The Orioles have hit nine homers in winning the first two games of the three-game set by a collective 22-5 score. Baltimore has won seven straight series and leads the AL East by six games, its largest margin since September 1997. Joseph, a rookie, had three homers in first 48 games before his recent power surge. The club record for homers in successive games is six, by Reggie Jackson and Chris Davis. Rays 4, Cubs 0: Jake Odorizzi struck out nine in six scoreless innings and combined with two relievers on a five-hitter for visiting Tampa Bay. Evan Longoria drove in a run and scored two. Yunel Escobar added two hits and three RBIs. Ben Zobrist had two hits and scored twice for the Rays, who improved to a major league-best 15-6 since July 12. They will try to complete the three-game sweep today. Odorizzi (8-9) gave up three hits and didn't walk anyone. The right-hander came within two strikeouts of his career high after getting hit hard in a loss to the Los Angeles Angels on Sunday. Chicago starter Edwin Jackson (6-12) allowed four runs — three earned — and five hits in six innings. He is 1-5 in his past nine starts. Royals 5, Giants 0: James Shields threw a four-hitter and Alex Gordon homered as host Kansas City won its sixth straight. The Royals have won nine of 10 to move with 1½ games of AL Central-leading Detroit. The Royals, who have not made the playoffs since beating St. Louis in the 1985 World Series, are in second place in the AL wild card standings. Shields (11-6) gave up three singles in the first four innings. He allowed only two Giants to reach second base. He walked Joe Panik in the fifth and he moved to second on a wild pitch with two outs, but was stranded. Panik doubled in the eighth. Brewers 4, Dodgers 1: Mike Fiers held the Los Angeles Dodgers to three hits in his first big league start in more than a year, and Khris Davis and Carlos Gomez homered for host Milwaukee. Fiers (1-1) struck out five in eight strong innings, filling in for injured veteran Matt Garza. The Dodgers mustered only a solo homer by Adrian Gonzalez into the second deck in right field. Fiers outdueled former Brewers pitcher Zack Greinke (12-8), who gave up Gomez's homer off the left-field foul pole that made it 3-1 leading off the sixth. Padres 2, Pirates 1: Eric Stults got his first road win of the season, going 6 innings for San Diego. Stults (5-13) gave up one run and seven hits, struck out six and walked none. He entered the game with an 0-9 record away from Petco Park. The Padres scored both runs in the first inning off Francisco Liriano (3-8). Penny back with Marlins: Right-hander Brad Penny was called up Saturday by the Miami Marlins, reuniting him with his former team and former catcher 10 years later. The Marlins picked Penny to start the second game of a series against the Cincinnati Reds. He swapped roster spots with left-hander Edgar Olmos, who was optioned to Triple-A New Orleans. The 36-year-old pitcher has played for the Marlins, Dodgers, Red Sox, Giants, Cardinals and Tigers. He signed a minor league deal in June. Penny went 48-42 with a 4.04 ERA with the Marlins from 2000-04, when Mike Redmond — the Marlins manager — was his catcher. He won 14 games on the Marlins team that won the World Series in 2003. His last start for the Marlins was July 28, 2004. Penny hasn't played in the majors since 2012, when he made 22 relief appearances for the Giants. It was the first time in his career that he didn't make at least one start during a season. His last start in the majors was Sept. 25, 2011 for the Tigers.
{ "pile_set_name": "Pile-CC" }
The Pentagon is raising an alarm about “rapidly” growing Chinese military capabilities, from long-range bombers to a blue-water navy, as mainstream media warn that Chinese pilots are “likely” training for strikes against the US. Long-range bomber training missions “targeting the US” – this is how the US mainstream media reported the findings of the Pentagon’s annual assessment of Chinese military capabilities in 2017, published Thursday. What the 145-page report actually says is that the People’s Liberation Army (PLA) air force has “rapidly expanded its overwater bomber operating areas, gaining experience in critical maritime regions and likely training for strikes against US and allied targets.” China is actively developing its fleet of long-range bombers and "likely" training its pilots for missions targeting the US, according to a new Pentagon report https://t.co/dgP1O2hs1Jpic.twitter.com/VLVVkIoJin — CNN International (@cnni) August 17, 2018 From that passage, it is clear that the Pentagon is concerned about Chinese capabilities against forward US bases in places like South Korea, Japan, the Philippines and maybe even Guam – not the continental US, which China can already reach with nuclear missiles anyway. The US military seems particularly alarmed by the prospect of China developing long-range bombers. A “stealthy, long-range strategic bomber with a nuclear delivery capability” could be operation “within the next 10 years,” the report says, completing the so-called “nuclear triad” of delivery systems. It must be purely a coincidence that this assessment comes as the US is working on developing a next-generation long-range bomber, and has invested heavily in the F-35 fighter program, estimated to cost over $1.5 trillion over its lifetime. Read more The report also contains claims that China is developing weapons to target US satellites in orbit, including “kinetic-kill missiles, ground-based lasers, and orbiting space robots.” This is in no way likely to be used to drum up support for President Donald Trump’s “Space Force” plans, of course. The annual report on Chinese capabilities is mandated by US law. It is also the first such report since the adoption of a new national defense strategy in January, which called “inter-state strategic competition, not terrorism,” the primary concern for the US. A two-page fact sheet accompanying the report offers clues as to China’s actual military priorities: the current goal is mechanization, with partial “informatization” being a goal for 2020 and “basic modernization” by 2035. The Chinese leadership aims to have a world-class military “by the middle of this century,” the fact sheet says. In 2017, Beijing actually cut 300,000 personnel from its ground forces and reorganized them on a brigade structure. The PLA Marine Corps is being expanded, going from 2 brigades and 10,000 personnel to a projected 30,000 marines in seven brigades by 2020, according to Pentagon projections. This expanded marine corps would also be able to engage in “expeditionary operations” - the likes of which the US Marines have conducted since going to the Shores of Tripoli in 1801. Beijing continues to build destroyers and frigates, as well as submarines, for the People’s Liberation Army Navy (PLAN). China’s first aircraft carrier, the Liaoning, conducted its first training deployment in 2017. The report also brings up the expansion of People’s Armed Forces Maritime Militia (PAFMM), based around a fleet of state-owned fishing vessels operated in coastal areas. Clearly, the Pentagon is facing a “fishing boat gap” that needs to be addressed forthwith. MY TAKE: #China’s #MaritimeMilitia is known clearly to the US gov't. By documenting these important facts officially & authoritatively, the Pentagon’s 2018 China report has performed a signal service: Revealing the PAFMM & its true nature is important to deterring its future use. — Andrew Erickson 艾立信 (@AndrewSErickson) August 16, 2018 While Beijing is undeniably expanding its military capabilities, that buildup has to be seen in context. China currently has only one overseas base, in the East African country of Djibouti, and its military budget for 2018 was estimated at $175 billion. Meanwhile, the US has nearly 800 military bases around the globe, and President Trump just signed a bill authorizing the Pentagon to spend $716 billion in 2019 - up from $700 billion this year. Think your friends would be interested? Share this story!
{ "pile_set_name": "OpenWebText2" }