text
stringlengths
173
4.38k
subset
stringclasses
13 values
In general, most direct spray fuel injectors that directly inject a fuel into a combustion chamber of an engine recently operate and are controlled in an electronic manner. A representative example thereof may include an injector having an opening/closing valve structure marked by reference numeral 101 of FIG. 1. The injector 101 includes a bundle of opening/closing valves 110 including a valve needle 105 that directly opens and closes a spray hole 113, an electromagnetic coil 107 that pulls the valve needle 105 when the spray hole 113 is opened, an armature 109 that pulls the valve needle 105 by gravity of the electromagnetic coil 107, and a pressurizing spring 111 that elastically pressurizes the valve needle 105 against the spray hole 113, as illustrated in FIG. 1. Thus, the injector 101 according to the relate art closes the spray hole 113 due to a valve ball 125 when the valve needle 105 is pressurized toward the spray hole 113 together with a stop ring 115 pressurized by an elastic force of the pressurizing spring 111 in normal times when no injection operation is performed, as illustrated in FIGS. 1 and 2. However, when the injector 101 operates so as to inject the fuel under the high pressure, first, the electromagnetic coil 107 of the bundle of opening/closing valves 110 is excited. Thus, the armature 109 is pulled by a magnetic force of the electromagnetic coil 107, compresses a buffer spring 120 against a stop sleeve 117, is lifted upwardly in the drawing and thus contacts the stop ring 115. The armature 109 pulled by the electromagnetic coil 107 even after contacting the stop ring 115 compresses the pressurizing spring 111 through the stop ring 115 and is lifted, as illustrated in FIG. 3. Thus, the valve needle 105 is lifted together with the armature 109 and opens the spray hole 113 such that a high-pressure fuel filled in a housing 103 can be injected into the combustion chamber. Then, when injection of the injector 101 is completed, in contrast, the electromagnetic coil 107 is demagnetized and thus gravity of the electromagnetic coil 107 that pulls the armature 109 disappears. Thus, the valve needle 105 intends to return to a normal state illustrated in FIG. 2 and to close the spray hole 113. However, the valve needle 105 is bounced due to an elastic repulsive force generated when the valve ball 125 and a valve seat around the spray hole 113 contact each other or a high spray pressure in the spray hole 113 and is again lifted upwardly in the drawing, as illustrated
uspto_backgrounds
In 935, Gyeon Hwon chose his fourth son Geumgang over the elder sons as the crown prince of Hubaekje. At this the eldest son, Singeom, conspiring with his brothers, had his father confined to Geumsansa in Gimje. Singeom killed Prince Geumgang and took the throne for himself. However, Gyeon Hwon escaped to Goryeo. Military affairs For much of its existence, Hubaekje was troubled by Wang Geon's naval raids in Naju region. These worked to disrupt trade and diplomatic ties with Southern Chinese kingdoms. Hubaekje possessed considerable military strength, and Lee (1984, p. 99) writes of Gyeon Hwon that "Had Gung Ye and Wang Geon not stood in his way, he surely would have had little difficulty in toppling Silla." Hubaekje showed its greatest strength in 927. In that year its armies attacked and pillaged the Silla capital at Gyeongju, slaying King Gyeongae and establishing King Gyeongsun as the ruler. Before the attack, Silla had sent for aid from Goryeo, and Wang Geon arrived with a large army shortly after Gyeongju was taken. The two armies met near Palgong Mountain in present-day Daegu. Wang Geon's forces in the battle reportedly numbered 10,000 men. Hubaekje triumphed, and Wang Geon himself only escaped through the daring self-sacrifice of his general Shin Sung-gyeom and Kim Nak. However, when the two armies met again at the Battle of Gochang near Andong in 930, Goryeo scored a decisive victory. Hubaekje was pushed back into its heartland, and there suffered a further crippling defeat at Hongseong in 934. Diplomatic ties As Wang Geon sought to maintain legitimacy through diplomatic ties with northern China, Gyeon Hwon strove to do the same by maintaining ties with the rulers of southern China, particularly Wuyue. However, because Hubaekje's existence largely coincided with the turbulent Five Dynasties and Ten Kingdoms period in China, neither side was able to parlay these ties into military support. Fall After he was deposed by his sons in 935 and
wikipedia_en
The method of perturbative matching is somewhat paradoxical. We have assumed that $M$ is large enough that perturbation theory is accurate at the scale $M$. We allow for the scale $Mv$ to be small enough that perturbation theory is not reliable at that scale. If that is the case, perturbative calculations in NRQCD would never give accurate results for physical observables, since NRQCD only reproduces full QCD accurately at scales of order $Mv$ or less. Nevertheless, a comparison of perturbative calculations in NRQCD and full QCD can be used to accurately determine the parameters in the NRQCD lagrangian. The reason for this is that the tuning of the parameters of NRQCD that makes this theory equivalent to QCD at momenta of order $Mv$ or smaller also makes the perturbative approximations to these theories equivalent. Perturbation theory breaks down in precisely the same way for both theories, predicting among other things, the existence of asymptotic states consisting of isolated quarks and gluons. Since the parameters in the NRQCD lagrangian are sensitive only to momenta on the order of $M$ where perturbative QCD is accurate, they can be correctly determined by matching perturbative calculations in QCD and NRQCD. As an illustration of perturbative matching, we consider the simplest perturbative observable. This is the energy-momentum relation for the heavy quark, which is given by the location of the pole in the heavy-quark propagator. At tree level in full QCD, the energy-momentum relation is $$E \;=\; \sqrt {m^2_Q + p^2} \;=\; m_Q \;+\; {p^2 \over 2m_Q} \;-\; {p^4 \over 8 m^3_Q} \;+\; \dots . \label{E-QCD}$$ At tree level in NRQCD, we can read off the energy momentum relation from the lagrangian (\[L-NRQCD\]): $$E \;=\; {p^2 \over 2M} \;-\; c_1 {p^4 \over 8 M^3} \;+\; \dots . \label{E-NRQCD}$$ By matching the expressions (\[E-QCD\]) and (\[E-NRQCD\]) we find $$M \;=\; m_Q, \qquad c_1\;=\; 1. \label{M-cl}$$ If the energy-momentum relations are computed to higher order in perturbation theory, the
arxiv
/** * Calculates the enclosing bounding box of 3 vertices (a triangle). If the * triangle is partly outside the screen, it will be clipped appropriately. * * Todo: If it is fully outside the screen, check what happens, but it works. * * @param[in] v0 First vertex. * @param[in] v1 Second vertex. * @param[in] v2 Third vertex. * @param[in] viewport_width Screen width. * @param[in] viewport_height Screen height. * @return A bounding box rectangle. */ template <typename T, glm::precision P = glm::defaultp> core::Rect<int> calculate_clipped_bounding_box(const glm::tvec2<T, P>& v0, const glm::tvec2<T, P>& v1, const glm::tvec2<T, P>& v2, int viewport_width, int viewport_height) { /* Old, producing artifacts: t.minX = max(min(t.v0.position[0], min(t.v1.position[0], t.v2.position[0])), 0.0f); t.maxX = min(max(t.v0.position[0], max(t.v1.position[0], t.v2.position[0])), (float)(viewportWidth - 1)); t.minY = max(min(t.v0.position[1], min(t.v1.position[1], t.v2.position[1])), 0.0f); t.maxY = min(max(t.v0.position[1], max(t.v1.position[1], t.v2.position[1])), (float)(viewportHeight - 1));*/ using std::ceil; using std::floor; using std::max; using std::min; // Readded this comment after merge: What about rounding, or rather the conversion from double to int? const int minX = max(min(floor(v0[0]), min(floor(
github
On the less severe end of the continuum—still abusive and warranting punishment—are affronts that are strictly verbal. Asking repeatedly for sexual encounters for those who have refused; commenting on another person’s relevant body parts, cat calls, and ogling. Each is troubling and can cause a hostile work or social environment. However, while the use of force leaves the victim no choice—verbal communication allows one to respond appropriately—or counter them with a cold shoulder. One can repeat to oneself, “Sticks and stones will break my bones, but words will not hurt me.” Close to outright coercive behavior is the use of power. Any indication that the offender threatened to deny the victim a promotion, a job, opportunities for stardom or publication—should be treated much more seriously than mere verbal assaults. Some micro-aggression mavens will argue that such a power differential exists in all cross-gender relationships. However, I refer to specific application of power, of the kind listed, not merely that often men have more generalized power than women in our society. Those who cover up, enable or otherwise are directly complicit in deal with sexual violence, should have a much higher level of punishment than they currently face, Church officials for instance. One may say that elected officials should be held to a higher moral standard then the rest of us because they’re supposed to act as role models. Others point out that many of the most revered public servants—Roosevelt, JFK, Bill Clinton—led rather flawed personal lives. It is not obvious that we can expect people to be both successful politicians and—models of moral appropriateness. None of this is to suggest that the unforgivable laws members of Congress passed to protect themselves from charges of sexual harassment are justified. The three-month window for harassment claims and one month of mandatory counseling must be revoked. Nor should lawmakers be shielded from penalties as they currently are as they use tax payer funds to pay for hush settlements. However, for most offenses, those penalties should not entail setting aside the choice of the electorate. They should be made to apologize, reduced in rank, be isolated, and fined—but not forced out of office. This is the job of the voters. After all, they could initiate a recall drive if they did not wish to wait until the next election. To be fair, one must also note that norms change. The fact that “everyone does it” and that men were brought up
pile-cc
Convert 99.17667l to millilitres. 99176.67 How many grams are there in 53/4 of a kilogram? 13250 What is 55/2 of a micrometer in nanometers? 27500 What is 0.0452391 micrometers in meters? 0.0000000452391 How many micrometers are there in 15/4 of a millimeter? 3750 How many months are there in twenty-one halves of a century? 12600 What is seven eighths of a kilometer in meters? 875 What is 19/4 of a week in minutes? 47880 What is 5/8 of a millennium in years? 625 Convert 5774.142 meters to kilometers. 5.774142 How many centimeters are there in 50219.5 micrometers? 5.02195 What is 21/2 of a microgram in nanograms? 10500 Convert 0.2124534t to milligrams. 212453400 What is 6114.13g in nanograms? 6114130000000 What is 0.220338 meters in centimeters? 22.0338 Convert 218919.4g to micrograms. 218919400000 What is seventeen quarters of a litre in millilitres? 4250 What is seven quarters of a microgram in nanograms? 1750 How many millimeters are there in 72807.52km? 72807520000 How many years are there in 2.447421 millennia? 2447.421 Convert 0.330152 minutes to microseconds. 19809120 Convert 4.970203l to millilitres. 4970.203 What is 6.199549 nanograms in grams? 0.000000006199549 What is 2.0727552 months in decades? 0.01727296 How many meters are there in 3555.498 centimeters? 35.55498 What is one tenth of a kilogram in grams? 100 How many millimeters are there in 21/8 of a meter? 2625 What is 11/2 of a gram in milligrams? 5500 How many months are there in eleven halves of a decade? 660 What is 12/25 of a litre in millilitres? 480 Convert 815753.3 millilitres to litres.
dm_mathematics
Subject: Your approval is requested Security Resource Request System Application Approval Please review and act upon this request. You have received this eMail because you are listed as an approver on the original request. Instructions For: Tom Swank Request Original: Application Name: EOL - Other (US) Request Type: Grant Role(s): Comments:
enron_emails
Also, while I do concur with the majority's resolution concerning defendant's extended-term sentence for armed robbery based on the Illinois Supreme Court's decision in People v. Neal (1985), 111 Ill.2d 180, 489 N.E.2d 845, cert. denied (1986), 476 U.S. 1165, 90 L.Ed.2d 733, 106 S.Ct. 2292), I do, however, find the majority's reasoning a bit ironic. The Neal case upheld the extended-term sentence for the burglary conviction there under the extended-term statute even though the court had imposed a death sentence on the murder conviction. Interestingly, the basis for the majority's conclusion here, that the Neal case was controlling, is that the imposition of the life sentence in the present case was analogous to the death sentence in Neal for purposes of considering the extended-term sentence. Nevertheless, the majority found the defendant's life sentence, without possibility of parole, not analogous to the death penalty sentence in Skipper for purposes of considering mitigating evidence regarding the defendant's rehabilitation and potential for rehabilitation. Contrary to the majority's differentiation, I believe that the imposition of the death sentence and the defendant's life sentence without the possibility of parole are analogous in both situations and particularly so for purposes of requiring the sentencing judge to consider proffered relevant mitigating evidence before imposing a life sentence without the possibility for parole. Of course, the weight to be given to the mitigating evidence is for the trial judge to determine. (See Eddings v. Oklahoma (1982), 455 U.S. 104, 114-15, 71 L.Ed.2d 1, 11, 102 S.Ct. 869, 877). However, to not require a trial judge to consider such relevant evidence would allow the judge to disregard the sentencing scheme set forth in the Code of Corrections and required by our constitution. (Cf. Williams v. New York (1949), 337 U.S. 241, 245, 93 L.Ed. 1337, 1341, 69 S.Ct. 1079, 1083.) Mr. Young was entitled to have a sentence imposed that takes into account his potential, if any, to be rehabilitated and to reenter society, if possible, as a productive individual. The failure to consider the evidence proffered by the defendant here did not offer him this opportunity. Accordingly, I would vacate the sentence imposed by the trial court and remand the matter for resentencing of the defendant consistent with the views expressed
freelaw
There’s also a set of “alternate registers” you could swap in with exx, which sometimes enabled faster arithmetic without hitting memory. ~~~ jgrahamc Yep. The trade off is that takes 3 more bytes but it's a great example of the thinking that went into writing 'tight' code for these processors. You're doing a loop unroll for speed and taking up more space, depending on what evil trick you're up to (e.g. hiding code inside a 128 byte unused spot in the BDOS) one might be better than the other. ------ maire This article brought back so many memories! My first job out of college was writing z80 assembly language at Cromemco. Later we ported everything to the 68000. We didn't write anything in a higher level language because it was too slow. In fact the entire CDOS and Cromix OSs were written by a single person. He originally wrote everything in c - but when he ran it was so slow. He then rewrote everything directly in z80 assembly language and kept the c code as comments. Raw c code were the only comments in the code. I wrote the graphics drivers for screen and printer and a wysiwyg word processor. There were no floating point processors. All math was in the registers (as stated in the article. You can still render a lot of graphics by converting your renderer to additions and multiplication by 2 (register shift left and right). I was happy to find years later that code that I derived to render circles and arcs using only 1 bit step and multiplication by 2 was also derived by someone else and published in graphics books. You live within limitations when that is your only option. ------ Steve44 I learned Z80 through the Sinclair stable but did play around with the 6502 and found I much preferred the Z80 way of working. One notable thing here is they are writing a code generator and not actually programming in assembly. As a result their modules need to be more general purpose than if directly programming. ~~~ _Codemonkeyism Same experience here. Came from a C64 (6202) to a CPC (Z80) in the 80s and the Z80 felt much more powerful and expressive with its instruction set and registers -
hackernews
The broad goal of this research is to learn how a single epithelial cell sheet becomes patterned during embryonic development into discrete domains of different cell types. The epidermis of the nematode Caenorhabditis elegans, will be studied as a simple model epithelium. This epithelium becomes subdivided into three major cell subtypes during embryogenesis. Particular emphasis will be placed on the mechanisms by which one of these subtypes, the seam cells, are specified. Because the mutations studied here lead to severe defects in embryonic development
nih_exporter
Comparison of three methods of DNA extraction from cold-smoked salmon and impact of physical treatments. To compare three bacterial DNA extraction procedures on cold-smoked salmon (CSS) and assess the impact on their efficiency of two physical treatments of the food matrix, ionizing irradiation and freezing. As molecular methods for bacterial detection have become an important analytical tool, we compared bacterial DNA extraction procedures on CSS. Working with frozen and irradiated CSS, we obtained negative responses from samples known to be highly contaminated. Thus
pubmed_abstracts
![Signature and mutational profiles of samples enriched for high and low molecular weight fragments. (A) and (C) Mutational profiles of enriched HMW and LMW urine samples and matched plasma ctDNA for cases CRC-UD24 (left) and CRC-UD21 (right). (B) and (D) Signature enrichment of HMW-enriched and LMW-enriched urine samples and matched plasma ctDNA is shown. Dendrogram is shown on the top, with a percentage indicating the similarity of each of the 30 signatures to the samples shown in the centre, while the G parameter (below the arrows) indicates the sum of the squares of differences between each signature observed in plasma ctDNA and the matched signatures in enriched HMW and LMW urine trtDNA samples. CRC, colorectal cancer; ctDNA, circulating free tumour DNA; HMW, high molecular weight; LMW, low molecular weight; trtDNA, trans-renal tumour DNA.](esmoopen-2019-000572f04){#F4} Finally, we calculated the G parameter, defined as the sum of the squares of the differences of each signature between plasma and HMW-enriched (G=0.06475 and G=0.069799, respectively) as well as between plasma and LMW-enriched (G=0.04969 and G=0.052517, respectively). In both CRC-UD24 and CRC-UD21 the genetic similarity between the LMW-enriched urine and the matched plasma was higher than that identified in HMW-enriched DNA fragments ([figure 4](#F4){ref-type="fig"}B,D). Tumour-specific alterations occur more frequently in shorter reads {#s3-4} ------------------------------------------------------------------ In the cases CRC-UD24 and CRC-UD21, in which we were able to analyse the low and high-enriched molecular weight fragments, separately, we sought to differentiate the molecular variations identified in the HMW-enriched and LMW-enriched DNA fragments in urine sample ([figure 5](#F5){ref-type="fig"}A,D) as well as in the matched tumour tissue and plasma. A concordance of 40/89 mutations (45%) and 25/89 mutations (28%) was obtained in LMW-enriched and HMW-enriched DNA fragments, respectively ([figure 5](#F5){ref-type="fig"}B
pubmed_central
Why are there no stars visible in cislunar space? It’s very puzzling that the moon landing had no stars in the background, the ISS clips have no stars in the background. I listened to multiple astronaut interviews speak on what it looks like up in space and about half of them speak of the “darkest black space”. I’m sure there is a very good explanation for this. Is star light only visible through the medium of earth atmosphere? But once in the vacuum of space where there is no medium they disappear? What’s the explanation? Minute 47-49 stars, press conference all three Apollo 11 astronauts BBC interview with Neil Armstrong only A: It is a matter of exposure and dynamic range. A sensor like a camera can only handle inputs in a certain range of intensities, and much of photographic skill (or smart presets) is about mapping the outside light onto this range so the details you care about show up rather than turn into white or black. If you take a picture of a brightly lit scene, in order to make out the details of the bright parts (such as a lunar landscape, the Earth, the ISS etc) you will have to adjust the exposure making faint objects like the stars too dim to see against a dark sky background. You could try to set the exposure to show the stars instead, but now the landscape and Earth would be too bright (and likely also mess up the picture by causing flaring). One can try to work around it by taking several pictures at different exposure levels and later digitally compositing them together. But this requires a lot of extra work. A: Anders's answer is entirely fine, but I'd like to add some extra information. As evidenced by the transcripts, reflected Earth light is quite strong even at this distance: The earthshine coming through the window is so bright you can read a book by it. That is, even with the lights turned off, it would probably be tricky to see the stars unless you turned in a way that didn't allow the earthshine through the windows. However, as the capsule comes into the shadow cast by the Moon (a pure accident - they didn't plan for the approach to go this way), there comes: Houston, it's been a real change for us. Now we are able to see stars again and recognize constellations for the first time on the trip. It's -
stackexchange
Second, unlike the case of a visual user interface, in an audio user interface, the problem of data entry availability can be compounded with the problem of speech recognition. In particular, in the case of a visual user interface, the user can select an available data entry with a mouse-click or by typing the acceptable data entry. In either case, the user-supplied data entry is unmistakable. In contrast, in the case of an audio user interface, in addition to surmounting the data availability process, the user-supplied data must surmount recognition problems associated with the speech recognition process. More specifically, anything that is to be audibly supplied to a field in a form through an audio user interface not only must be considered an available entry from the perspective of the data information system, but also must be considered a speech recognizable entry from the perspective of the speech recognition engine. For example, in a voice response system, each word supplied as a voice response must exist in a speech recognition grammar in order to successfully undergo a speech-to-text conversion process. If a user utters a word not contained in the speech recognition grammar, an Out of Grammar (hereinafter xe2x80x9cOOGxe2x80x9d) condition can arise. Typically, a voice response system can respond to an OOG condition by xe2x80x9cthrowingxe2x80x9d an OOG exception. When an OOG exception is thrown, a voice response system can only inform the user that the voice response provided to the voice response system was not understood (because it was not located in the speech recognition grammar). The circumstance in which a user interacts with a voice response system for providing information regarding particular cities is an example of this problem. When prompted by the voice response system to provide the name of a city for which the voice response system can provide information, a user can utter, xe2x80x9cSunnyxe2x80x9d as in Sunny Ga. Preferably, if the voice response system does not contain information Sunny Ga. the user should be notified, xe2x80x9cThere is no information on Sunny, Ga.xe2x80x9d. However, if Georgia is not included in the speech recognition grammar, when the user utters Sunny Ga., the voice response system will throw an OOG exception and the data information system will respond with, xe2x80x9cI did not understand what you
uspto_backgrounds
Woodlawn Cemetery (West Palm Beach, Florida) Woodlawn Cemetery is located at 1301 South Dixie Highway in West Palm Beach, Florida. It consists of three cemeteries: Woodlawn Cemetery, the Jewish Cemetery, and Woodlawn Cemetery North. Henry Flagler created the cemetery on 17 acres of pineapple fields in 1904. "By 1904, there was 'no more attractive cemetery in Florida' than Woodlawn, most likely inspired in name and design by New York’s Woodlawn Cemetery that had also utilized a spacious Landscape Lawn." "As was his custom, Flagler spared no expense and the cemetery soon became a tourist attraction. The St. Augustine Tatler of January 1905 reported that socialites would spend the afternoon there admiring its rock roads and "rows of oleanders, Australian pines, and crotons." In 1914 the Woodlawn Cemetery Association deeded the cemetery to the City of West Palm Beach. The Cemetery holds 10,085 burials, from January 1905 through December 1994. It originally had an iron gateway, with the words "That Which Is So Universal As Death Must Be A Blessing” in bronze letters. With the widening of Dixie Highway in 1925 an acre was lost and the iron gate had to be removed. A year later it was replaced with the present cement archway, with the same words inscribed. Confederate monument Southern cemeteries of the period were segregated, and Woodlawn Cemetery only accepted white, Christian burials. Just inside the entrance gate there was from 1941 to 2017 a prominent stone monument with the following text, underneath a Confederate flag: Forever now, among the immortal dead, whose dust belongs to glory's dreamland, sleeps the fair Confederacy. Right principles can never die. No cause for which the brave have bled in virtue's name, for which the true have kept the faith, for which the dead have died in holy martyrdom, is ever lost! In memory of our Confederate soldiers, erected by United Daughters of the Confederacy A.D. 1941 Amid the wave of Removal of Confederate monuments and memorials after the Dylann Roof shooting of 2015, the monument was defaced in August, 2017, with the words "Antifa Nazis & KKK", with arrows pointing at the Confederate flag. This was
wikipedia_en
Around 30-50 independent magnitude measures of standard stars were derived per filter using the [apphot]{} task within IRAF, in order to secure the transformation from the instrumental to the SDSS $gr$ standard system. Standard stars were distributed over an area similar to that of the GMOS array, so that we measured magnitudes of standard stars in each of the three chips. The relationships between instrumental and standard magnitudes were obtained by fitting the following equations: $$g = g_1 + g_{std} + g_2\times X_g + g_3\times (g-r)_{std}$$ $$r = r_1 + r_{std} + r_2\times X_r + r_3\times (g-r)_{std}$$ where $g_i$, and $r_i$ (i=1,2,3) are the fitted coefficients, and $X$ represents the effective airmass. We solved the transformation equations for the three chips with the [fitparams]{} task in IRAF, simultaneously; the rms errors from the transformation to the standard system being 0.015 mag for $g$ and 0.023 for $r$, respectively, indicating an excellent match to the standard system. The stellar photometry was performed using the star-finding and point-spread-function (PSF) fitting routines in the [daophot/allstar]{} suite of programs (Stetson et al., 1990). For each frame, a quadratically varying PSF was derived by fitting $\sim$ 60 stars, once the neighbors were eliminated using a preliminary PSF derived from the brightest, least contaminated 20-30 stars. Both groups of PSF stars were interactively selected. We then used the [allstar]{} program to apply the resulting PSF to the identified stellar objects and to create a subtracted image which was used to find and measure magnitudes of additional fainter stars. This procedure was repeated three times for each frame. Finally, we computed aperture corrections from the comparison of PSF and aperture magnitudes by using the neighbor-subtracted PSF star sample. After deriving the photometry for all detected objects in each filter, a cut was made on the basis of the parameters returned by [daophot]{}. Only objects with $\chi$ $<$2, photometric error less than 2$\sigma$ above the mean error at a given magnitude, and $|$SHARP$|$ $<$ 0.5 were kept in each filter (typically discarding about 10
arxiv
; RUN: %lli %s > /dev/null define i32 @main() { %double1 = fadd double 0.000000e+00, 0.000000e+00 ; <double> [#uses=6] %double2 = fadd double 0.000000e+00, 0.000000e+00 ; <double> [#uses=6] %float1 = fadd float 0.000000e+00, 0.000000e+00 ; <float> [#uses=6] %float2 = fadd float 0.000000e+00, 0.000000e+00 ; <float> [#uses=6] %test49 = fcmp oeq float %float1, %float2 ; <i1> [#uses=0] %test50 = fcmp oge float %float1, %float2 ; <i1> [#uses=0] %test51 = fcmp ogt float %float1, %float2 ; <i1> [#uses=0] %test52 = fcmp ole float %float1, %float2 ; <i1> [#uses=0] %test53 = fcmp olt float %float1, %float2 ; <i1> [#uses=0] %test54 = fcmp une float %float1, %float2 ; <i1> [#uses=0] %test55 = fcmp oeq double %double1, %double2 ; <i1> [#uses=0] %test56 = fcmp oge double %double1, %double2 ; <i1> [#uses=0] %test57 = fcmp ogt double %double1, %double2 ; <i1> [#uses=0] %test58 = fcmp ole double %double1, %double2 ; <i1> [#uses=0] %test59 = fcmp olt double %double1, %double2 ; <i1> [#uses=0] %test60 = fcmp une double %double1, %double2 ; <i1> [#uses=0] ret
github
Grandfathers Rights for Pesticide Users - Changes to Current Rules A current exemption in UK law, commonly known as “grandfather rights”, allows anyone born before 31 December 1964, to use plant protection products (PPPs) authorised for professional use on their own or their employer’s land, without having to hold a certificate (of competence) although they should still be suitably trained and competent for their job. The Plant Protection Products (Sustainable Use) Regulations 2012 allowed this exemption to continue until Thursday 26 November 2015. From this date forwards, everyone who uses PPPs authorised for professional use must have a certificate. In addition, after 26 November 2015, it will be an offence for anyone to purchase PPPs authorised for professional use unless they have ensured that the intended end user has a certificate. If you don’t personally already have a certificate, or you have employees without certification, you will need to get them trained before the changes occur, but don’t worry, many training companies are running courses up until the week before the changes come into effect. New Level 2 Certificate in the Safe Use of Pesticides City and Guilds Land Based Services has developed a new Level 2 Award - Safe Use of Pesticides Replacing Grandfather Rights. If you were born before 31 December 1964, and will only use pesticides on your own or your employer’s land, you will need to obtain this new qualification. Alternatively, you can obtain one of the existing Level 2 Safe Use of Pesticide awards appropriate to the work and type of equipment you use. You must take this route if you intend to work as a contractor or apply {PPPs {Plant Protection Products} to land you or your employer do not own. Further information on the new qualifications The new qualification will take account of the fact that people working under “grandfather rights” should already have some form of training and may have many years experience in working with pesticides. In recognition of this, the qualification has been developed so as to take significantly less time, and cost less, than the existing Level 2 qualifications for pesticide users. The training will be based on a workbook, setting out the required knowledge, which can be studied at the candidate’s convenience. This will be followed up with a practical assessment of competence. As with all Level 2 pesticide awards, the training modules will be based on the type of equipment to be used. The assessment should
pile-cc
151 Express -471*q - 3 + 1 + 543*q - 1 - 1 as g + a*q and give g. -4 Express (171 + 376 + 200 - 187)*(-7 + 7 + 5*j) as h + v*j and give v. 2800 Rearrange 59*k**2 + 53*k**2 - 106*k**2 + 17*k to the form m + z*k + d*k**2 and give d. 6 Rearrange (-2*w - 2*w + 2*w)*(-10 - 39 - 5 - 4) to h + n*w and give n. 116 Rearrange (9*a - 9*a + 3*a**2)*(1 - 22*a + 36*a - 22*a + 1) to the form q*a**3 + w*a + k + t*a**2 and give q. -24 Express -1035*w + 203*w + 235*w - 991*w as f + k*w and give f. 0 Rearrange ((0*c - c + 0*c)*(0*c + c + 0*c) - c - 2*c**2 + c)*(4*c - 2*c - 3*c)*(-22 - 24 + 34) to the form s*c**3 + o*c + v*c**2 + i and give s. -36 Express 37*j**3 - 14*j**3 - 43*j**3 + (4*j**2 - 4*j**2 + 2*j**2)*(-2*j + 1 - 1) - 2*j**3 - 3*j**3 + 2*j**3 as t + x*j**3 + p*j**2 + q*j and give p. 0 Express -3*j**2 + 91*j - 40*j - j**2 - 49*j as x + q*j**2 + m*j and give m. 2 Rearrange (193*z + z + 37*z)*(1 + 1 + 1) to the form l + p*z and give p. 693 Express -3*u - 76*u**2 - 74*u**2 + 140*u**2 in the form w*u**2 + z*u
dm_mathematics
Sing along. Oh, the weather outside is frightful........ I currently have 22 pending missions and we will be putting more in tomorrow. I know weather is a factor in some areas this week but if you can fly please call or email the office as soon as possible. 3 for THURSDAY 1. Paducah, KY to Little Rock (leg 2 of 2 leg mission) 1. Houston to Hot Springs, AR (leg 1
enron_emails
1 Defendant Kanchan Bala Sharma appeals from the imposition at sentencing of a fine of $100,000. We vacate the district court's fine assessment and remand for reconsideration of the fine. I. Background 2 On May 13, 1991, FBI agents received information from the Department of Housing and Urban Development (HUD) that more than one million dollars had been skimmed from seven different HUD-insured and/or co-insured multi-family housing projects that were owned and operated by Sharma and several of her family members. 3 Sharma pleaded guilty to a one-count information charging her with program fraud in the amount of $101,467.89 in violation of 18 U.S.C. §§ 666, and 2. Her offense level was calculated to be twelve, with a criminal history category of one, providing for a sentencing range of ten to sixteen months' imprisonment (part of the term of which may be satisfied by supervised release) and a fine of $3,000 to $30,000. See U.S.S.G. §§ 5C1.1(d) and 5E1.2(c)(3). 4 The district court initially sentenced Sharma to five months' imprisonment and three years' supervised release. It ordered her to pay $101,467.89 in restitution and assessed a fine of $100,000. In a motion for correction of sentence, Sharma contested the $100,000 fine as an improper departure from the Guidelines. In response to this motion, the district court vacated the first sentence and gave the required notice that the court was considering an upward departure with respect to the fine. See Burns v. United States, 501 U.S. 129, 138, 111 S.Ct. 2182, 2187, 115 L.Ed.2d 123 (1991) (requiring a district court to give notice of intent to depart from Guidelines). The court then entered an order clarifying that the sentence was not an upward departure under the Guidelines, but again noted that if the fine were construed to be a departure the order was notice that the court was contemplating such a departure. Upon resentencing, in addition to imprisonment, supervised release, and restitution, a $100,000 fine was again imposed. Sharma appeals that fine, arguing that it falls outside the applicable guidelines range; that the court failed to adequately justify its upward departure from
freelaw
Giving away my Startup - philiplindblom Hey everyone.<p>Programmer&#x2F;designer guy here who has due lack of motivation determined to give away an entire future company. (Although I will require a ~10% ownership of any legal entity you setup, but I&#x27;m willing to make that negotiable.)<p>I figure it&#x27;d be a nice thing to try, cause there&#x27;s (in my mind) nothing wrong with the idea or the execution. I&#x27;d really like to see it fly!<p>But after 10 years of constant, excruciating grind – I have decided to make some life changes.<p>The app, called Trotter is for those on the move to &#x27;Feel at home, wherever they are&#x27;.<p>The current state of things: The app was built from May 2017 - December 2017. Launched in iOS App Store December 2017.<p>It&#x27;s currently hidden in App Store and all servers and services are switched off.<p>Here&#x27;s a look at the app and it&#x27;s features. https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=LuIycb4bLRk&amp;feature=youtu.be<p>In terms of revenue model, Users can contact up to 10 new users per day. After that it costs $x for 10 more.<p>I would like to add though that I won&#x27;t give it away to give it away to anyone but to the person or group I deem most suitable in terms of ability to grow and nurture it.<p>I will not be taking an operative role in any future operation. At all. I want to make that perfectly clear.<p>Any questions, Let me know! &#x2F;Philip<p>philiplindblom@gmail.com ====== CyberFonic Have you generated any revenue at all? Perhaps you could ask for royalty instead of equity. It would effectively be the same revenue to you, but with less contractual complications. Good luck! This is a very interesting proposition. Perhaps you could let HNers know how it works out down the track.
hackernews
Behavioral sensitization results from repeated intermittent use of stimulant drugs, and may contribute to addiction. Prior studies investigating the influence of associative pairing of contextual stimuli with psychostimulant administration on the expression of psychomotor sensitization in rodents have shown that under certain circumstances, sensitization can be context-specific. Based on these and other findings, we proposed that three memory mechanisms regulate the context-specificity of stimulant sensitization: (1) Repeated drug administration induces sensitization of
nih_exporter
To help test the hypothesis that transforming growth factor beta (TGF-beta) may serve an autocrine function in the retina, we asked whether human Müller (glial) cells in culture express TGF-beta receptors, contain transcripts for various isoforms of this cytokine, and release TGF-beta s into the medium. Using the reverse transcriptase-polymerase chain reaction (RT-PCR) technique with specific primers for TGF-beta 1, -beta 2 and -beta 3 precursors and for TGF-
pubmed_abstracts
![**Analysis of dihydronaringin chalcone and naringin chalcone by UPLC-Q-IMS-TOFMS. A)** Selected ion UPLC-MS chromatogram of dihydronaringin chalcone ion (\[M-H\]^-^*m/z* = 581.2138; calculated = 581.1870, -46.11 ppm error) with MS/MS spectrum inset. **B)** Ion mobility spectrum of dihydronaringin chalcone ion (\[M-H\]^-^). **C)** Selected ion UPLC-MS chromatogram of naringin chalcone ion (\[M-H\]^-^*m/z* = 579.1907; calculated = 579.1714, -33.32 ppm error) with MS/MS spectrum inset. **D)** Ion mobility spectrum of naringin chalcone ion (\[M-H\]^-^). **E)** 2-D plot of drift time vs. *m/z* for combined mixture of dihydronaringin chalcone and naringin chalcone. Arrows indicate position of the two compounds. Image resolution was set to 1000 bins in the MS dimension to allow for ease of viewing of the ions.](1752-153X-8-38-6){#F6} Experimental ------------ ### *Chemicals* Standards of several phenylpropanoid acids (*t*-cinnamate, dihydrocinnamate, *p*-coumarate, *p*-dihydrocoumarate, caffeate, dihydrocaffeate, ferulate, dihydroferulate), chalcones and dihydrochalcones, as well as acetonitrile, ammonium acetate, formic acid, and HPLC grade water, were purchased from Sigma-Aldrich (St. Louis, MO, USA). The other chalcones used in this investigation were synthesized and purified based on a previously published protocol \[[@B17]\]. All chemicals were dissolved in acetonitrile-water with 0.1% (v/v) formic acid, at a final concentration of 100 μM. ### *Chromatographic separation* Chromatography was carried out in an Acquity UPLC system using an Acquity UPLC BEH C18 column of 1.7 μm particle size (2.1 mm × 100 
pubmed_central
We are using Jetspeed in a project and have a requirement that jetspeed should authenticate against a third party rest service which accepts username and password and returns back the User Object. The most simplest and straightforward way I found of implementing this without effecting jetspeed too much was to write a custom AuthenticationProvider extending the DefaultAuthenticationProvider class and overriding the login method. After I authenticate the user I get back the User details including roles, email, etc. Now if the user already exists in jetspeed database, I sync his roles, else I create the user and assign him the roles returned by the remote service. Now I want a way to set the user.email, user.firstname and user.lastname properties too, so that it is accessible using $jetspeed.getUserAttribute in the psml files. Any idea how can we do this? Here is my code [cut out unnecessary stuff] -- public class CustomAuthenticationProvider extends BaseAuthenticationProvider { .... public AuthenticatedUser authenticate(String userName, String password) throws SecurityException { try { //Login the user UserSessionDTO customSession = Security.login(userName, password); //Fetch the user details UserDTO customUser = customSession.getUser(); //Get the user roles List<UserRoleDTO> roles = customUser.getUserRoleDTOList(); //Verify/create the user in jetspeed user database UserImpl user = null; if (!um.userExists(customUser.getLoginId())) { user = (UserImpl) um.addUser(customUser.getLoginId(), true); //Standard data user.setMapped(true); user.setEnabled(true); } else { user = (UserImpl) um.getUser(customUser.getLoginId()); } //Sync the portal user roles with the CMGI user roles List<Role> portalRoles = rm.getRolesForUser(customUser.getLoginId()); for (Role portalRole : portalRoles) { Boolean found = Boolean.FALSE; for (UserRoleDTO role : roles) { if (role.getRoleName().equalsIgnoreCase(portal
stackexchange
This invention relates to pipeline repair or hot tapping couplings, and more particularly to a coupling which may be applied to an underwater pipeline and which may be pressure-tested while the pipeline is shut off. Split couplings have been used for many years to repair above-ground and subsurface pipelines. It was not until the past 10 years that split couplings having gasket seals have been applied to underwater pipelines to repair or hot-tap those pipeines. There are many problems involved in applying couplings to underwater pipelines due to the massiveness of the coupling, the conditions under which the divers must work, and the fact that such pipelines are normally encased in concrete which is cured under almost ideal conditions. Because of the depths, divers can spend only 60 to 80 minutes on the bottom. For 60 minutes at 130 feet, a diver has to decompress for nine minutes at 30 feet and 23 minutes at 20 feet. An additional 75 minutes must be spent in a decompression chamber. After decompressing for almost 2 hours, the diver should wait 12 hours before making another device. For 80 minutes on the bottom, the decompression time is 2 hours and 44 minutes. Furthermore, turbulent weather conditions may stir up the bottom to reduce the visibility to substantially zero. The massiveness of the coupling also contributes to the difficult working conditions. Because of the foregoing problems, and since good underwater welding is considered only 75 to 85 percent as effective as ordinary welding, bolted-on, self-sealing split couplings have been successfully employed for underwater pipeline repair work. Those couplings include a pair of members each having semicylindrical inner surfaces and a pair of flanges adapted to oppose the flanges of the other member. A gasket continuously extends circumferentially on each semicylindrical surface and along the flanges so that when the coupling is applied to the pipe and the flanges are bolted together, the gasket surrounds the area of the pipe to be repaired or hot-tapped to effectively seal that area. While the seal is adequate and eliminates the necessity for seam welding (although such welding is sometimes done as a precautionary measure), it is generally impossible to test the effectiveness of the seal without pressurizing the line. If the coupling is not properly mated, leaks may occur when the line is pressurized, necessitating inspection and repositioning of the coupling. Furthermore, the coupling cannot be pressure-tested by line pressure which exceeds 80 percent or the like of the average yield strength of the pipe as determined by tensile tests, since such internal pressures
uspto_backgrounds
The Cook Islands Amendment Act contained a clause limiting candidacy for the elections to people who had lived in the Cook Islands for at least three years before the election. This barred Albert Henry from running, as he had only lived in the Cook Island for a year preceding the vote. Campaign A total of 66 candidates contested the 22 seats, 19 from the Cook Islands Party, 16 from the United Political Party (led by Leader of Government business Dick Charles Brown), 12 from the Independent Group, 7 from the Labour Party, and 12 independents. also fielding candidates. Two seats had only one candidate – Tangaroa Tangaroa in Penrhyn and Pupuke Robati in Rakahanga – both of whom were returned unopposed Results Leader of Government business Brown, Agriculture Minister Napa Tauei Napa and Speaker Teariki Tuavera were amongst the nine incumbents that lost their seats. Elected members Aftermath The newly elected Assembly met for the first time on 10 May. With Henry still ineligible for election, Manea Tamarua was elected Leader of Government Business. He subsequently announced appointed Julian Dashwood, Tiakana Numanga, Apenera Short, Marguerite Story and Mana Strickland to the Executive Council. On 11 May Cook Islands Party MPs attempted to amend the Cook Islands Amendment Act to reduce the residency requirement and allow Henry to become an MP. The opposition independents walked out of the legislature, meaning it was not quorate due to the absence of two Cook Islands Party MPs. However, they returned the following day and an amendment to reduce the residency requirement to three months (providing the candidate had previously lived in the Cook Islands for at least a year) was passed. Henry's sister Marguerite Story subsequently resigned from the Assembly to allow him to contest the by-election for Te-au-o-Tonga on 9 July. Henry was challenged by Dick Charles Brown, winning by 1,353 votes to 523. The Legislative Assembly later approved the constitution on 26 July by 20 votes to two. The two 'no' votes came from Pupuke Robati (who claimed that residents of Rakahanga did not wish for the Cook Islands to become self-governing) and Tangaroa Tangaroa (who claimed that Penrhyn wished to become part of New Zealand). The Cook Islands became self-governing on 4 August 1965 when Henry was
wikipedia_en
Let $U$ be an open subgroup of the restricted product $\prod'{\operatorname{H}}^1(k_v,M)$. $U$ is a product of subgroups $U_v \subset {\operatorname{H}}^1(k_v,M)$. If $U$ is a proper subgroup, then all but finitely many of these are equal to the unramified subgroup. If $U_v^\perp$ denotes the exact annihilator of $U_v$ with respect to the Tate pairing, then $U^\perp := \prod U_v^\perp$ is an open subgroup of $\prod'{\operatorname{H}}^1(k,M^\vee)$. Note that when $U = 0$, $U^\perp$ is the entire restricted product and conversely. Let us use $V_U$ and $V_{U^\perp}$ to denote the subgroups of global classes which map into $U$ and $U^\perp$, repsectively (i.e. $$\begin{aligned} V_U &= \{ \xi \in {\operatorname{H}}^1(k,M)\,|\,\forall v,\, {\operatorname{res}}_v(\xi) \in U_v\}, \text{ and}\\ V_{U^\perp} &= \{ \eta \in {\operatorname{H}}^1(k,M^\vee)\,|\,\forall v,\,{\operatorname{res}}_v(\eta) \in U_v^\perp\}\,).\end{aligned}$$ Let $T$ denote any finite set of primes and let $I' = ({\operatorname{res}}_T{{\mbox{{ {\fontencoding{OT2}\fontfamily{cmr}\fontseries{m}\fontshape{n}\selectfont Sh}}}}}(V_U,T))^\perp \subset \prod_{v \in T}{\operatorname{H}}^1(k_v,M^\vee)$ be the orthogonal complement of ${\operatorname{res}}_T{{\mbox{{ {\fontencoding{OT2}\fontfamily{cmr}\fontseries{m}\fontshape{n}\selectfont Sh}}}}}(V_U,T)$ with respect to the pairing $(\,,\,)_T$. Let $I$ denote the image of $I'$ under the quotient map $q:\prod_{v \in T}{\operatorname{H}}^1(k_v,M^\vee) \to \prod_{v \in T}\frac{{\operatorname{
arxiv
#define FEAT_DCEP_WIN 2 static int32 feat_size[1]; static int32 basefeatlen; int32 feat_1s_c_dd_cepsize ( int32 veclen ) { basefeatlen = veclen; feat_size[0] = veclen+veclen; return (veclen); } int32 feat_1s_c_dd_featsize (int32 **size) { *size = feat_size; return N_FEAT; } /* * Feature vectors computed from input mfc vectors using this window (+/- window). */ int32 feat_1s_c_dd_window_size ( void ) { return (FEAT_DCEP_WIN+1); } void feat_1s_c_dd_cep2feat (float32 **mfc, float32 **feat) { float32 *f; float32 *w1, *w_1, *_w1, *_w_1; float32 d1, d2; int32 i, j; /* CEP */ memcpy (feat[0], mfc[0], basefeatlen * sizeof(float32)); /* * D2CEP: (mfc[w+1] - mfc[-w+1]) - (mfc[w-1] - mfc[-w-1]), * where w = FEAT_DCEP_WIN */ f = feat[0] + basefeatlen; w1 = mfc[ FEAT_DCEP_WIN+1]; _w1 = mfc[-FEAT_DCEP_WIN+1]; w_1 = mfc[ FEAT_DCEP_WIN-1]; _w_1 = mfc[-FEAT_DCEP_WIN-1]; for (i = 0; i < basefeatlen; i++) { d1 = w1[i] - _w1[i]; d2 = w_1[i] - _w_
github
At least five people suspected not of aiding bin Laden but of helping the CIA spy on the al Qaida chief's compound were arrested more recently. These include a retired army officer widely reported as neighbor Maj. Amir Aziz, whose house with two watchtowers would be an ideal place from which to observe the bin Laden compound. He, however, told McClatchy that he'd never been detained. Coming reluctantly to the gate of his house to speak to a journalist, Aziz said he'd retired from the army. "It's not me," he said, referring to news reports of an arrested army major, before shutting the gate. A local police officer who'd arrived at the raid scene early, before Pakistani military units responded to it, is still in custody from the initial arrests. The contractors who built the house, brothers Noor Muhammad and Gul Mada Khan, were arrested, then released and now have disappeared; it isn't known whether they were detained once more or they've simply fled Abbottabad. A local man, Atta-ur-Rahman, known as Lala, who'd chopped down trees next to the bin Laden compound in the days before the U.S. raid, was arrested but has since been released. It had been suspected that he'd cut down the trees to clear the area for the American helicopters to land. Wazir Dill, a doctor who'd treated children from the bin Laden house at his Abbottabad clinic, and a health worker, Bakht Jan, who'd visited the house to offer vaccinations for the children (she wasn't let in), were among those arrested and then set free. The police also have released Shamraiz, who lived opposite the compound and worked there as an occasional gardener, but he declined to be interviewed. Fahad Ali and Abbas Ali, Abbottabad residents taken in for their association with a religious organization, have been freed. So has Tahir Javed, who lived close to the compound and went over to help put out the fire that broke out during the raid May 2 by U.S. Navy SEALs. An auto mechanic, Muhammad Babar, who used to repair the two vehicles at compound, was detained but has since been released. A porter at the Ayub Medical Complex hospital in Abbottabad, Samar Shehzad, who was suspected of working as a driver for the bin Laden household,
pile-cc
-48*sqrt(2) + 5 Simplify (sqrt(121) + (sqrt(121) - (sqrt(121)*-2*-6 + sqrt(121) + sqrt(121))))/(sqrt(11) + sqrt(275)*2 - sqrt(11)). -6*sqrt(11)/5 Simplify (sqrt(3) - sqrt(48)*-3) + (sqrt(75))**2*4. 13*sqrt(3) + 300 Simplify (-2*sqrt(90)/sqrt(5))/(1*sqrt(600)). -sqrt(3)/5 Simplify ((sqrt(171) + -1)*-4)**2. -96*sqrt(19) + 2752 Simplify (-2 + 6*sqrt(176)*2)**2. -192*sqrt(11) + 25348 Simplify sqrt(684) + -3 + -2 + -4*sqrt(19). -5 + 2*sqrt(19) Simplify 4*(sqrt(17)*-1 + 2). -4*sqrt(17) + 8 Simplify 4 + (sqrt(637) - (sqrt(637) - -1*sqrt(637))) + sqrt(637) - (5 + sqrt(91)/(2*sqrt(7))). -sqrt(13)/2 - 1 Simplify sqrt(17) + 5*(sqrt(17) + 1) + sqrt(17) + 3 + sqrt(153) + sqrt(17). 8 + 11*sqrt(17) Simplify sqrt(99)/(-4*sqrt(9)) - (sqrt(396) + -4)**2. -412 + 191*sqrt(11)/4 Simplify (-4*(sqrt(44)*6 - sqrt(11)))**2 + -4. 21292 Simplify (sqrt(343)*-1 + sqrt(7) - (sqrt(21)/sqrt(3) + -2))**2. -28*sqrt(7) + 347 Simplify (-4*4*(sqrt(242) + 1 + sqrt(242)))**2. 11264*sqrt(2) + 248064 Simplify (sqrt(7) + -1 + 2 + sqrt(7) + sqrt(14)/sqrt(2)*1)**2. 6*sqrt(7) + 64 Simplify (1 + sqrt(320) + 1)**2. 32*sqrt(5) +
dm_mathematics
"Valery Kholodnyi" <vkholod1@txu.com> on 01/22/2001 05:59:53 PM To: Vince.J.Kaminski@enron.com cc: Subject: The Package Dear Vince, Could you please acknowledge receipt of the package with a copy of my article on spikes in power prices, as well as copies of my books and some of my other relevant articles
enron_emails
BACKGROUND[1] A. The Contracts Penthouse is the successor in interest to General Media, Inc., a reorganized chapter *338 11 debtor, (Amended Complaint, ¶ 2) (ECF Doc. # 45 filed in Adv. Proc. No. 05-03658), and the two are referred to collectively as the Debtor. The Debtor had employed the plaintiff in various capacities for approximately 33 years. (Id., at ¶ 14.) The Debtor induced the plaintiff to continue to work by promising that it would pay the educational expenses of her children, grant her vacation time, and pay severance benefits. In addition, after the Debtor filed for bankruptcy (in August 2003), she was promised continued employment as part of the reorganization plan. (Id., at ¶ 15.) The Debtor confirmed the Fourth Amended Joint Plan of Reorganization (the "Plan") (ECF Doc. # 642)[2] by order dated August 13, 2004 ("Confirmation Order"). (ECF Doc. # 649.) The Plan incorporated a Fourth Amended Plan Supplement, dated Aug. 12, 2004 ("Plan Supplement")(ECF Doc. # 644) that included two unsigned agreements central to the plaintiff's tort claims.[3] Under the first, a Consulting Agreement between the Debtor and General Media International, Inc. ("GMII"), a non-debtor affiliate, the Debtor agreed to engage GMII to provide the consulting services of GMII's principal, Robert C. Guccione, for 10 years. The Consulting Agreement did not mention the plaintiff, and contained a negating clause to the effect that the parties did not intend to create enforceable rights on behalf of any third parties: No party shall assign this Agreement without the prior written consent of the other party. This Agreement shall be binding upon and inure to the benefit of and be enforceable by the parties hereto and their respective heirs, legal representatives, successors and assigns, but no other person shall acquire or have any rights under or by virtue of this Agreement. (Consulting Agreement, at § 8.04)(emphasis added.) The second agreement, a Letter Agreement between Guccione and the Debtor, which was attached as Exhibit A to the Consulting Agreement, is the more important one. Paragraph 4 stated in pertinent part: The Company [the Debtor] shall provide Consultant [Guccione] with one full-time assistant, namely Jane Homlish [the plaintiff] (or such other person
freelaw
Ask HN: Question about MySQL "create if not exists" performance. - NathanKP After searching Google fairly extensively I haven't been able to find any analysis of the performance of "create if not exists" MySQL statements.<p>I want to ensure that a MySQL table is existent before using it. The question is whether or not it will be a major performance hit to do a simple "create if not exists" once each time before using a table which may or may not exist. Alternately I could query the information_schema manually to see if the table exists and if not I can create it.<p>My gut feeling is that it is more efficient to simply run "create if not exists" before using a table which may or may not exist. This way I only have one MySQL statement that can simply be executed before using the table.<p>Does anyone else have any thoughts about the comparative benefits or performance issues associated with doing a "create if not exists" on each execution? ====== duskwuff This really shouldn't be necessary at all. In a well-designed application, the table schema should be completely known to the application at all times -- the existence of a table should never be in doubt. If for some reason this isn't the case, you'll be much better served by catching "table doesn't exist" errors when they occur rather than preemptively trying to create tables which already exist. ~~~ NathanKP I considered this aspect but I'm using these tables for statistics. Basically I am giving each user of my website a table for storing statistics about their site usage. Some users however, never really "complete" the process and don't really use the website, thus they have no need for statistic tables. So I have the idea of saving space by creating statistic tables as they are needed. I'm going to try the "create if not exists" first and if that causes too much MySQL server load I'll just create the statistic tables at user registration and save processor usage at the expense of disk usage. ~~~ duskwuff Don't create tables per user. Seriously, don't. There's a (relatively low) limit to how many tables MySQL will keep in memory, and once you hit that limit it isn't very good at keeping the right tables loaded. Instead, redesign your database schema so that you can put all of your users
hackernews
Treatment for oral cancer can result in devastating swallowing problems. High-dose chemoradiotherapy has been utilized as primary treatment for tumors of the oral cavity and oropharynx to preserve organ function. Quality of life, however, can become significantly reduced after primary treatment with chemoradiotherapy, with significant decrements in ability to eat. Radiotherapy to the oral cavity and oropharynx can cause changes in swallowing, particularly the oral phase of the swallow, resulting in reduced ability to propel foods
nih_exporter
Effect of hydrocortisone on the pituitary response to growth hormone releasing hormone. In depression, the growth hormone (GH) response to clonidine and L-tryptophan (L-TRP) is reduced, suggesting reduced alpha2-adrenergic and serotonin (5-HT)1A receptor function. Pretreatment with hydrocortisone (100 mg, orally 11 h before) also blunts the GH response to L-TRP. This effect may be mediated at
pubmed_abstracts
^1^ The number of Basta-resistant transformants per total cell number. Values are the averaged from three independent experiments. ^2^ The percentage of Basta-resistant transformants that were also FPA-resistant. 20 transformants were tested for each strain. MMS-induced damage and BER intermediates can lead to collapsed replication forks that can be restarted in a RAD51-depdendent manner \[[@pgen.1005790.ref049], [@pgen.1005790.ref060]--[@pgen.1005790.ref065], [@pgen.1005790.ref070]--[@pgen.1005790.ref073]\]. To test if MUS-30 prevents replication fork collapse or facilitates MEI-3-dependent replication fork restart, we tested for genetic interactions between Δ*mus-30* and Δ*mei-3*. We reasoned that a positive genetic interaction would suggest that MUS-30 facilitates MEI-3 dependent replication fork restart, whereas a negative genetic interaction could suggest MUS-30 is required to prevent collapsed forks at MMS-damaged bases and BER intermediates. We observed a striking synthetic growth defect for Δ*mus-30*; Δ*mei-3* double mutants, which was evident even in the absence of exogenous DNA damaging agents. We performed race tube analysis with multiple isolates of each genotype to quantify the linear growth rate. The growth rates of wildtype, *Δmus-30*, and *Δmei-3* were similar, whereas all isolates of *Δmus-30*; *Δmei-3* double mutants displayed markedly slower growth ([Fig 4D and 4E](#pgen.1005790.g004){ref-type="fig"}). We next tested the level of MMS-sensitivity for each genotype **(**[Fig 4F](#pgen.1005790.g004){ref-type="fig"}). *Δmus-30* and *Δmei-3* single mutants were unable to grow in the presence of 0.015% and 0.010% MMS, respectively, while *Δmus-30; Δmei-3* conidia failed to grow on the lowest MMS concentration tested (0.0001%). Thus, MEI-3 is critical for repairing DNA damage that accumulates in the *Δmus-30* mutant strain. Together, these data demonstrate that MUS-30 is not generally required for DSB repair and suggest that MUS-30 is important for
pubmed_central
Get path of the file to execute from received http request I am writing a backend app to receive .jar file from the client and run it. Following is the client code. let formData = new FormData(); let req = new XMLHttpRequest(); let file = document.getElementById("filePath").files[0]; formData.append("jarFile", file); req.open("POST", '/deployArtifact'); req.send(formData); I need to write the backend endpoint(Node Red) to get this file and run it. Following is the sketch of the nodejs post endpoint code. RED.httpAdmin.post("/deployArtifact", RED.auth.needsPermission('MyNode.read'), function (req, res) { console.log(req.files); console.log(req); cmd.get( 'java -jar ' + xxxx, function (err, data, stderr) { if (err) { res.json(err); } else { res.json(data); } }); }); First, I need to get the file object receiving. I tried to access req.files but got undefined for it. I printed whole req. Following is the Incoming message. IncomingMessage { _readableState: ReadableState { objectMode: false, highWaterMark: 16384, buffer: BufferList { head: null, tail: null, length: 0 }, length: 0, pipes: null, pipesCount: 0, flowing: null, ended: false, endEmitted: false, reading: false, sync: true, needReadable: false, emittedReadable: false, readableListening: false, resumeScheduled: false, destroyed: false, defaultEncoding: 'utf8', awaitDrain: 0, readingMore: true, decoder: null, encoding: null }, readable: true, domain: null, _events: {}, _eventsCount: 0, _maxListeners: undefined
stackexchange
The present invention relates to a lens that is capable of correcting chromatic aberration by itself. Also, the present invention relates to a device for correcting the chromatic aberration inherent in optical system. More particularly, the present invention relates to a chromatic aberration correcting device that is intended for use in combination with a single aspheric lens that is corrected for aberrations other than chromatic ones. The use of a single objective lens having an aspheric surface on both sides has expanded these days in the art of optical disks and one of the principal reasons for this use is its contribution to weight reduction. However, the single lens in conventional use has been incapable of effective correction of chromatic aberration. A laser diode which is used as a light source for optical disks has the disadvantage that its emission wavelength is shifted on account of the change either in the output power of the laser or in the temperature. Hence, if the objective lens is not corrected for chromatic aberration, the focusing position of light rays will change in response to the shift in wavelength and this can cause errors when reading or writing information. To solve this problem, the present inventors previously proposed chromatic aberration correcting devices that had two or three glass lens elements cemented together (see Japanese Patent Public Disclosure Nos. Hei 3-155514 and 3-155515). By combining either one of these chromatic correcting devices with a single aspheric lens, one could offer a lens system that was immune to the effect of wavelength variations, requiring less lens elements than the conventional system that is effectively corrected for chromatic aberration. However, the techniques proposed in the two patents cited above suffer from the disadvantage that in order to correct chromatic aberration, it is necessary to provide a device that is not directly concerned with the focusing action inherent in the objective lens. Therefore, optical system that is properly corrected for chromatic aberration weighs more and requires more parts than optical system that is not corrected. The conventional chromatic aberration correcting device has had the problem that its manufacturing cost is so high as to cancel the advantage of lower cost that results from the use of a single aspheric lens, whereby the net benefit is reduced to nil. The present invention has been accomplished under these circumstances and has as an object providing a lens that utilizes diffraction effect so as to correct chromatic aberration effectively without unduly increasing the number of lens elements. The present invention has been accomplished under these circumstances and has as an object providing a chromatic aberration correcting
uspto_backgrounds
The Royal Edinburgh Military Tattoo is an annual series of military tattoos performed by British Armed Forces, Commonwealth and international military bands, and artistic performance teams on the esplanade of Edinburgh Castle in the capital of Scotland. The event is held each August as one of the Edinburgh Festivals. History and etymology Etymology The term "tattoo" derives from a 17th-century Dutch phrase doe den tap toe ("turn off the tap") a signal to tavern owners each night, played by a regiment's Corps of Drums, to turn off the taps of their ale kegs so that the soldiers would retire to their billeted lodgings at a reasonable hour. With the establishment of modern barracks and full military bands later in the 18th century, the term "tattoo" was used to describe the last duty call of the day, as well as a ceremonial form of evening entertainment performed by military musicians. Origins The first public military tattoo in Edinburgh was entitled "Something About a Soldier" and took place in 1949 at the Ross Bandstand in the Princes Street Gardens. The first official Edinburgh Military Tattoo, with eight items in the programme, was held in 1950. It drew some 6,000 spectators seated in simple bench and scaffold structures around the north, south, and east sides of the Edinburgh Castle esplanade. In 2018, the capacity of the stands was able to accommodate a nightly audience of 8,800, allowing 220,000 to watch the multiple live performances. Seating expansion Since the 1970s on average, just over 217,000 people see the Tattoo live on the esplanade of Edinburgh Castle each year, and it has sold out in advance for the last decade. 30% of the audience are from Scotland and 35% from the rest of the United Kingdom. The remaining 35% of the audience consists of 70,000 visitors from overseas. The temporary grandstands on the castle esplanade, used in 2018, had a capacity of 8,800. New £16 million spectator stands and corporate hospitality boxes came into use in 2011. The new temporary stands reduced the time taken to erect and dismantle them from the original two months to one month, allowing the esplanade to host events at other times of the year. Performances The Tattoo performance takes place every weekday evening and twice on Saturdays throughout August and has never been cancelled due to
wikipedia_en
--- abstract: 'Searches for mass-3 component in the electron neutrino flavor state $\sin{\theta}_{13}$ and for sterile neutrinos can be carried out in the same small mixing angle antineutrino oscillation experiment at a reactor. As an example we consider a layout, which involves several movable antineutrino spectrometers, stationed at distances 1700 m $-$ 50 m from a reactor. The experiment can scan neutrino mass parameter interval $\sim$(0.5$-$0.001) eV$^{2}$ and have there typical sensitivity to $\sin^{2}2{\theta}$ at a level of 0.015$-$0.02. The signature for sterile neutrino is disappearance observed at mass parameter ${\Delta}m^{2}_{new}$ different from ${\Delta}m^{2}_{atm} \approx 2\times 10^{-3}$ eV$^{2}$. In any case existing constraints both on $\sin{\theta}_{13}$ and on sterile neutrinos can considerably be improved.' author: - 'V. Kopeikin[^1], L. Mikaelyan[^2], V. Sinev[^3]' date: 'Russian Research Centre “Kurchatov Institute”, Moscow, Russia' title: 'Search for sterile neutrinos as another research objective of ${\theta}_{13}$ experiments at reactors' --- Talk given at II Workshop on Future low energy neutrino experiment, Munich, October 9-11, 2003 Introduction {#introduction .unnumbered} ============ Discovery of sterile neutrinos would have a revolutionary impact on neutrino and particle physics. Sterile neutrinos can hide, mimic or distort reactor antineutrino disappearance pattern in the atmospheric oscillation channel. The notion of sterile neutrinos ${\nu}_s$ was originally introduced by B. Pontecorvo in 1967 y \[1\] and later has been considered by many authors: D. Caldwell and R. Mohapatra \[2\], S. Bilenky, C. Giunti and W. Grimus \[3\], K. Benakli and A. Smirnov \[4\], B. Kayser \[5\]. Information on theory of sterile (and mirror) neutrinos and references can be found in the recent paper by V. Berezinsky, M. Narayan, F. Vissani \[6\]. An experimental hint in favor of sterile neutrinos comes from unconfirmed observations of LSND collaboration \[7\] on ${\nu}_{\mu} \rightarrow
arxiv
device_eclash=Устройство хранения с таким именем уже существует device_emedia=Отсутствует название типа носителя device_edevice=Отсутствует или недействительно архивное устройство или каталог device_echild=Этот клиент не может быть удален, так как он используется $1 storagestatus_title=Состояние демона хранилища storagestatus_err=Не удалось получить состояние из $1 : $2 storagestatus_msg=Статус от $1 : $2 storagestatus_show=Показать статус демона хранилища: storagestatus_ok=Ok label_title=Объем метки label_header=Детали тома для маркировки label_storage=Демон хранения для метки label_pool=Создать в пуле label_label=Новое название лейбла label_ok=Ярлык сейчас label_return=форма этикетки label_run=Маркировка тома с $2 на демоне хранения $1 .. label_estorage=.. демон хранения не найден! label_eexists=.. указанный ярлык уже существует. label_efailed=.. маркировка не удалась! Проверьте сообщение об ошибке выше по причине. label_done=.. маркировка успешна. label_epool=.. не смог найти бассейн! label_err=Сбой ярлыка label_elabel=Метка не в
github
The crime spree began sometime Sunday or Monday, and initially came to the attention of Brewer police officers by a complaint about attempted break-ins at residences on Elm Street on Monday morning. “We had a report Monday of two male individuals operating an orange-red pickup on lower Elm Street,” said Martin. “They had apparently gone to several residences and were knocking on doors, saying they were looking for jumper cables. “They went to one residence and went inside, where they were confronted by the owners. They told the owners they were looking for a lost dog and then left the area in the pickup.” At 5 a.m. Tuesday, Penobscot County Sheriff’s Office responded after a passerby reported two males doing doughnuts in the parking lot of the South Levant Baptist Church on Horseback Road in Levant. “Prior to that, the owners of an orange Nissan pickup called to report their truck had been stolen from their driveway off the Irish Road in Carmel,” said Sgt. Roy Peary of the Penobscot County Sheriff’s Office. “They saw their vehicle being driven out of the driveway.” Deputy James Kennedy and Maine State Trooper Michael Johnson both responded, along with a K-9 unit, and found the abandoned truck in the church parking lot. Deputy Kennedy found two males standing in Horseback Road near a gravel lane and stopped to question them. “The older male admitted to one of the deputies that he was involved in the actual taking of the vehicle, and they were both charged with unauthorized use of property,” said Peary. It was unclear from the police report why neither man was taken into custody. In the meantime, Brewer police were investigating the attempted break-in cases, and found information that led them to the Brewer Armory on Elm Street. “That’s where we determined the pickup was stolen from, and another stolen vehicle from Pittsfield was abandoned there,” Martin said. “We also discovered multiple burglaries to several motor vehicles parked at the armory and owned by military service people on deployment.” Martin said the car theft victims were members of the U.S. Army National Guard training out of state, and were unavailable to talk to police. Martin said at least five, and likely more, vehicles were burglarized. “What we have to do is check what is missing and what’s been stolen once the
pile-cc
d Let l = -2 + 1.7. Let m = -5.4586 + 5.3586. Which is the closest to m? (a) -0.8 (b) -2 (c) l (d) -0.2 d Let d = -12368 + 2597299/210. Let u = d - -1/105. Let w = 2234874/5 + -446975. Which is the nearest to 2/7? (a) -4 (b) u (c) w b Let g = 4 + -3. Let s(p) = p**3 - 5*p**2 + 4*p - 1. Let r be s(4). Let j be (-10)/(-165) - (r + 1). What is the nearest to -0.1 in g, j, -1? j Let z = 112.4 - 119. Let x = -6.8 - z. Let m be 8/(-44) - (1 + -1). What is the nearest to m in 1, -0.01, x? x Let z = -188.61 + 189.61. Let f = 4 + -6. What is the nearest to z in f, -2/7, 5? -2/7 Let r = 15429.09 - 15429. Which is the closest to r? (a) 4 (b) 2/43 (c) -5 b Let p(b) = 60*b**3 + b**2 + b + 2. Let x be p(-1). Let g be 226/(-4) + -1 + 0. Let f = g - x. What is the nearest to -2 in f, 0, 3/4? 0 Let u be (-1 + 0)/((-7)/(-70)). Let d be 9/6*u/30. Which is the nearest to d? (a) 2 (b) 2/17 (c) -2/11 c Let w = -18350.01 - -18350. Let g = 3 - 3. Suppose g = 4*n - 3*r + 7, -2*n - n - 4*r + 1 = 0. Which is the nearest to n? (a) w
dm_mathematics
We welcome your participation. Please do not hesitate to call or e-mail us with your suggestions or concerns by phone 212-522-9444, fax 212-522-1383 or e-mail: suzanne_o'leary@timeinc.com. In the meantime, if we can be of any further assistance, just give a yell. Regards, Suzanne O'Leary
enron_emails
dependency treatment facility; the order expired upon his release in 1992. After Doug failed to pay child support and visited the boys sporadically, his parental rights were terminated in 1996. Phillips testified that she last had face-to-face contact with the boys in November 1996, shortly after the termination, and last spoke with them on the telephone in December 1996. Sailor testified that the last contacts were in 1997. In 1998, Sailor’s current husband adopted the boys, who took his last name. In 2000, Phillips filed her petition for grandparent access to the boys. Sailor stated in her answer that Phillips’s request was not in the children’s best interest. After a non-jury trial, the court found that contact with Phillips was in the children’s best interest. The trial court ordered at least monthly contact on the telephone, one week of possession each summer if Phillips gave written notice to Sailor by May 1 of each year specifying the requested week, and three days at Christmas if Phillips provided thirty days’ notice each year of the requested days. The court ordered that Doug not be present when Phillips had possession of the boys. Sailor contends by her first issue that the visitation order and the statute authorizing it, Family Code section 153.433, violate her due process right to autonomy in child-rearing decisions. Considering a similar argument shortly after Sailor filed her brief, this Court held that neither section 153.433 nor an order requiring grandparent visitation violated the parents’ due-process rights under the Fourteenth Amendment. Lilley v. Lilley, 43 S.W.3d 703, 710-713 (Tex. App.—Austin 2001, no pet.). We find no reason to alter our decision regarding the facial constitutionality of the statute. We 2 will examine the constitutionality of the statute as it was applied to Sailor after a review of the testimony. By her second issue, Sailor contends that the district court abused its discretion by ordering visitation with Phillips. The only element of Family Code section 153.433 in dispute is whether the visitation is in the children’s best interest.1 A trial court has broad discretion in determining the best interest of a child in visitation dec
freelaw
People Over 55 Are Quitting Facebook - ciscoriordan http://www.businessinsider.com/people-over-55-are-quitting-facebook-2009-5 ====== tjic Demographics are appealing based on two things: the direct revenue that advertising to them / selling to them can bring, and the indirect value of how much they serve to propogate the brand. Older adults are worthwhile because they've got a lot of discretionary income once the kids are off at college. Young hip adults are worthwhile because they increase brand cachet. I hate to be morbid, but with the meltdown in IRA and 401ks since January, people over 55 might not be worth nearly as much as a demographic as they once were. Facebook probably doesn't care too much about this. At <http://smartflix.com>, we've done demographic surveys, and our best customers are older adults - speaking in generalities, the women are retired, or working part time, and have enough money to buy canvas and oil paints, and the guys are retired or working part time, and have enough time and money to work on their cars, learn metalworking, or tinker with their guns. Because our price point is relatively low (our a la carte rentals are ~$10, and our subscription plans are << $30/month), we haven't seen much of a decline in revenue from this demographic. ------ cellis News Cycle lately looks like this: Twitter. Iphone. Facebook. Twitter. Iphone. Facebook. Twitter. Iphone. Facebook. Twitter. Iphone. Facebook. Twitter. Iphone. Facebook. Twitter. Iphone. Facebook. ok you get the point. ~~~ vaksel more like Facebook, Twitter, Twitter, Twitter, iPhone, Twitter, Twitter, Twitter, Twitter, Facebook, Twitter, Twitter, Twitter, Twitter, Google, Twitter, Twitter, Facebook, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter, Twitter ~~~ kyro More like Why do we always try to extrapolate made up patterns for
hackernews
Activated Akt signaling is a significant contributor to the pathogenesis of breast cancer. PTEN is a negative regulator of PI3K/Akt signaling and is decreased in breast cancer. Over 20% of breast cancers have mutations in PIK3CA, the p110alpha catalytic subunit of PI3K, with Akt-dependent and independent downstream effects. MK2206 is a selective allosteric inhibitor of Akt. In vitro and in vivo, many of the PIK3CA mutant cell lines and cell
nih_exporter
Based on published research results on the structure of the human retina and the initial assumption of tight hexagonal packing of cones, the mean cone-distance function is derived. Disorder in the cone lattice is explained as the superposition of increasing topological distortion in the hexagonal lattice (providing a possible explanation for observed systematic lattice distortions) and local jitter of neighbor-to-neighbor distances, for which a simple statistical model is provided. These individual results are incorporated into a proposed algorithm for simulating the cone
pubmed_abstracts
For the interactive tool, we used regression analysis and computer simulation to quantify the impact of all included factors on the operating room utilization rate. To demonstrate the use of the interactive tool, we give an illustrative example with a limited number of patient groups, namely, orbital, surgical retina, medical retina, and secondary level of care patients. These are the same subspecialties we used to illustrate the data collection in Table [3](#Tab3){ref-type="table"}. The actual tool incorporates all subspecialties of the AMC ophthalmology department. Before discussing the scenarios, we will first describe the current performance and the preferred performance (see Table [7](#Tab7){ref-type="table"}). For example, in the current situation, at least 80% of the elective medical retina patients experienced a waiting time of less than 9 weeks, while the preferred threshold value for this patient group is 5 weeks, based upon the so-called Treek norm which was set by the Dutch government. Furthermore, the maximum number of cancellations due to overrun of previous surgeries was 7.5 per month on average during the past year, while the preferred performance is a maximum of 4 cancellations per month. Table 7Current and preferred performance for the operating roomPerformanceThreshold values of waiting time targetsMax no of cancellations due to overrun prev surgeriesOrbitalSurgical retinaMedical retinaSecondaryCurrent26 weeks5 weeks9 weeks9 weeks7.5Preferred5 weeks5 weeks5 weeks9 weeks4 For the first scenario, we determined the maximum allowed utilization rate for the current situation with the current performance and calculated the total demand for the OPD, the nursing ward, and the operating room (see Table [8](#Tab8){ref-type="table"}). Table 8Various scenarios of the interactive toolScenarioNumber of patients per patient group per yearTotal demand OPD (in hours)Total demand nursing ward (in days)Max utilization rate operating roomTotal demand operating room (in hours)OrbitalSurgical retinaMedical retinaSecondary1. Current situation4614113463,1682,5061,32277.6%73,3312. Preferred performance4614113463,1682,5061,32272.2%78,7743. Overall reduction4223763172,8992,2931,21071.0%73,3014. Less secondary4614113469001,3581,209
pubmed_central
Table Schema: CREATE TABLE [dbo].[Message]( [id] [int] NOT NULL, [created_on] [datetime] NULL, [message] [nvarchar](max) NULL, CONSTRAINT [PK_Message] PRIMARY KEY CLUSTERED ( [id] ASC ) ) ON [PRIMARY] Values: 1 '2013-01-01 00:00:00.000' 'error occured "BASKET_BALL"' 2 '2014-01-01 00:00:00.000' 'error occured "FOOT_BALL"' 3 '2012-01-01 00:00:00.000' 'I am not involved in like operator' 4 '2014-02-01 00:00:00.000' 'I might be involved' Query return against the table: SELECT ID,CREATED_ON,MESSAGE FROM MESSAGE WHERE MESSAGE NOT LIKE '%"FOOT_BALL"%' OR MESSAGE NOT LIKE '%BASKET_BALL%' AND CREATED_ON >= '2014-01-01' Output: 1 2013-01-01 00:00:00.000 error occured "BASKET_BALL" 2 2014-01-01 00:00:00.000 error occured "FOOT_BALL" 3 2012-01-01 00:00:00.000 I am not involved in like operator 4 2014-02-01 00:00:00.000 I might be involved Question: Could some one explain why the query returns all the table values when explicitly the date condition is mentioned for greater than 2014 ? I understand by keeping the message condition in bracket it yields proper result. However, like to know why the sql excludes date condition mentioned when the not like operator is not in bracket. A: It's because the AND operator has higher precedence than OR. Change to this: SELECT ID,CREATED_ON,MESSAGE FROM MESSAGE WHERE (MESSAGE NOT LIKE '%"FOOT_BALL"%' OR MESSAGE NOT LIKE '%BASKET_BALL%') AND CREATED_ON >=
stackexchange
Furthermore, the pressure differential (and hence the attractive forces) may be varied for certain applications (i.e., maintain separate distances between the impeller end and the surface) by changing the speed of the impellers. The impeller speed can be changed by varying the power input or with a gear transmission system. Additionally, a gear transmission may also relate power from the impeller power source to auxiliary devices. The principles of the vortex flow and reduced pressure are applicable in multiple applications, on scales ranging from microscopic to very large. The vortex attractor may be used alone, in combination with wheel or tracks, on a conveyor belt, etc. Various devices may be attached to the vortex attractor for sensing, measuring, recording, etc. A warning system may be provided for vortex attractors operating on a limited power source, such as a battery, to prevent the attractor from failing while in use. Furthermore, the vortex attractor may be controlled manually, remotely by computer, conventional remote control or via on-board software. The controlled elements of the vortex attractor may include impeller speed, by variations in power input and/or by gear changes, impeller blade distance from the impeller end of the containing ring or outer shield or power source variations. A substantially modified vortex attractor comprises an impeller or vanes and a shell having an inner shield and an outer shield. The vanes may be mounted to a backplate, or an impeller assembly may be separately rotatable relative to the inner shield. The impeller is positioned within one end of the outer shield (the impeller end), and the inner shield is concentric to the outer shield, and generally prevents fluid flow within the center of the portion of the outer shield behind the impeller assembly. Fluid is directed through the center of the impellers and spirals out through the region between the inner shield and the outer shield. Attractive forces are generated toward the impeller end of the outer shield due to the vortex flow extending therefrom. Therefore, according to the present invention,an efficient device is provided that uses the low pressure zone created by a vortex fluid flow to attract objects or attract itself to a surface. This device may be employed for numerous purposes, such as industrial transport, underwater lifting, electromagnet applications, switches, sensors, detectors, toys and other applications where objects or tools are displaced and/or maintained in a suspended or removably adhered position. Lifting Devices In the field of industrial transport, a vortex attractor may be
uspto_backgrounds
Though a few villages exist along Adams Lake, the vast majority of the lake is undeveloped. The lack of development is partially due to the nature of the shoreline, which is mostly sheer rock faces or steep, stony beaches. Few recreationally suitable beaches exist naturally on the lake. Some man-made sandy beaches have been constructed for public use. (see "Adams Lake Provincial Park") History Chief Adam (sometimes spelled Atahm) was a prominent Secwepemc chief in the mid-nineteenth century. By most accounts, the lake is named after him. Adam died in the 1862 smallpox epidemic, which, according to James Teit, killed over half the local Secwepemc population. Adams Lake has been the site of two Secwepemc blockades, one in solidarity with the Kanesatake Mohawk in 1990, and the other in the summer of 1995, to prevent the development of a 60-unit recreational vehicle park on Secwepemc burial ground. The 1995 blockade resulted in the burning of the only bridge crossing the lake, and thus the establishment of a permanent inland ferry service to access the eastern side of the lake. The north end of Adams Lake is called Mumix in the Shuswap language. Forestry Forestry forms the economic base for the region. Unpaved logging roads, which provide the only land access, run the full length of the lake. At the south end of the lake operates a saw mill. The logs for which are harvested further up the lake, deposited into the lake near the Momich River by a large crane. The logs are then floated down the lake to the mill in log booms drawn by tug boats. It is a common sight to see these log booms anchored in wait at lakeside. Recreation Adams Lake is used for recreation year round. Sport anglers commonly fish the lake for Rainbow Trout, Kokanee, Lake trout, and Bull Trout. The lake is also used for swimming, pleasure boating and water skiing. The area around the lake is popular with campers and is home to a large variety of flora and fauna. During autumn and winter people hunt for game birds and big game such as mule deer, black bear, and cougar (mountain lion). Cl
wikipedia_en
Because all FORCAST data were taken in the dichroic mode, one can determine precise relative astrometry of the two wavelength images that were obtained simultaneously. The relative astrometry between filters is known to better than 0.5 pixels ($\sim$0$\farcs$38). All images then had their astrometry absolutely calibrated using *Spitzer* data by matching up the centroids of point sources in common between the *Spitzer* and *SOFIA* data. Absolute astrometry of the final *SOFIA* images is assumed to be better than 1$\farcs$0. In order to perform photometry on MIR point sources, we employed the aperture photometry program *aper.pro*, which is part of the IDL DAOPHOT package available in The IDL Astronomy User’s Library (http://idlastro.gsfc.nasa.gov). Comparing *SOFIA* Images to Previous Imaging Observations {#sec:results1} ========================================================= W51 was first detected as an region by @1958BAN....14..215W through its free-free radio continuum emission. Over a decade later it was identified as a molecular cloud from its CO emission [@1971ApJ...165..229P]. The 430 MHz observations of @1967AnAp...30...59K were the first to resolve W51 into four large ($\sim$10–20$\arcmin$) radio components, which were labeled A through D, with W51A being the brightest among them. @1970ApL.....5...99W, were the first to further resolve W51A into two components labeled G49.5-0.4 and G49.4-0.3. @1972MNRAS.157...31M observed W51A in centimeter continuum emission and further resolved G49.5-0.4 into eight regions named a through h, and G49.4-0.3 into three regions labeled a through c. About two decades later, @1994ApJS...91..713M identified G49.5-0.4i and G49.4-3d, e, and f from Very Large Array (VLA) centimeter observations. G49.5-0.4j was first defined by @2000ApJ...543..799O. Peaks and compact sources within or near these regions are indexed with numbers. Our *SOFIA* imaging data covers the entire
arxiv
--nosetboot do not set target as default boot device when rebooting. --noboot is deprecated --noreboot do not reboot after install .prop .prop should have valid lua syntax for a table of keys and their values: e.g. "{label='OpenOS'}" All fields are optional, as is the .prop file label:string Declares an identifying name of the installation. This is displayed by install during source selection and also can be used on the commandline: e.g. (where {label="tape"} is given) `install tape`. If setlabel is true, this value is used for the target filesystem label. --label overrides this value. Note that install uses a case insensitive search: e.g. install TAPE works the same as install tape. setlabel:boolean Determines whether the install should set the target filesystem's label. If .prop does not define a label and the user does not define a command line --label=LABEL, setlabel has no action. --nosetlabel overrides this value setboot:boolean Determines if the target filesystem should be set as the machine's default boot device. Default is false, overriden by --nosetboot reboot:boolean Determines if the machine should reboot after the install completes. Overriden by --noreboot ignore:boolean If true, the installer will skip the source filesystem and not include it for selection EXAMPLE: {label='OpenOS', setlabel=true, setboot=true, reboot=true} .install ENVIRONMENT A loot disc can optionally provide a custom installation script at the root of the source filesytem selected for installation. The script must be named ".install" When provided, the default install action is replaced by executation of this script. The default action is to copy all source files to the destination A table of configuration options, named `install`, is provided in _ENV These are the keys and their descriptions of that table _ENV.install.from: This is the path of the selected source filesystem to install from. It should be the path to the executing .install example: /mnt/ABC/.install is executing, thus _ENV.install.from is "/m
github
Stella Bowles was a Grade 6 Nova Scotia student when she turned environmental activist to campaign against sewage pipes draining straight into the LaHave River. This is the inspirational first person account of Stella's Grade 6 science fair project which caught the eyes of the media, the public and government leaders propelling her into the limelight. Stella details her two and a half year fight to clean up the river, winning numerous awards for her environmental activism along the way. She succeeds in shaming three levels of government and rallying supporters into funding a $15.7 million cleanup. Today, she continues to campaign for cleaner water and demonstrates to other children how to test water quality in their own backyards, and how to take action if they find their water is polluted too. Stella's story will motivate readers to engage in local environmental activism. She demonstrates that doing what's right has no age barriers. Awards Short-listed - Hackmatack Children's Choice Book Award - 2020 "This is a fantastic story of a young activist who recognized a problem and worked hard to solve it. The title is filled with great photos of Stella working step-by-step to clean up the river ... A relatable tale for most environmental collections." - School Library Journal "While My River does include some of the features of non-fiction ... it is the text of Stella Bowles's story of helping to put a stop to polluting practices on the LaHave River that carries the tale. It's the small steps in learning and discovery that make My River an exemplar of activism by young people with the message that, with perseverance and science, while looking in your own backyard, you can help change the world." - Helen Kubiw CanLit for Little Canadians "My River is told with honesty, humility and the love of discovery. Teachers will want this book in their classrooms for its messages of empowerment, confidence and scientific application." - Mable's Fables "My River: Cleaning up the LaHave River, an impressive example of what can be accomplished, should be recommended to any young people who have identified a science-related issue that calls out for change." - CM: Canadian Review of Materials "Once readers get caught up in reading this book, they'll find it hard to put down. Stella's strong, lively voice and personality will pull readers into the story and will quickly win them
pile-cc
What is prob of sequence ep when two letters picked without replacement from {v: 2, k: 1, s: 1, e: 4, p: 2}? 4/45 Calculate prob of sequence hhg when three letters picked without replacement from wwgwhhwgggwww. 2/429 Two letters picked without replacement from {d: 1, u: 1, a: 1, z: 2, s: 1, v: 1}. What is prob of sequence zu? 1/21 Calculate prob of sequence ttoo when four letters picked without replacement from ztirbttbootb. 1/495 Four letters picked without replacement from {x: 9, e: 9}. What is prob of sequence eeex? 21/340 Calculate prob of sequence vjjn when four letters picked without replacement from {v: 4, c: 2, j: 1, n: 1}. 0 Three letters picked without replacement from kkckh. Give prob of sequence cck. 0 Calculate prob of sequence hevt when four letters picked without replacement from tvmmthevvvvvvvttv. 3/4760 Two letters picked without replacement from qpaajtkttaak. Give prob of sequence at. 1/11 Two letters picked without replacement from {l: 1, t: 2, i: 1}. Give prob of sequence tl. 1/6 What is prob of sequence ds when two letters picked without replacement from {d: 2, s: 1}? 1/3 Calculate prob of sequence gzb when three letters picked without replacement from zmzpzpgszbgsgbzm. 1/112 Calculate prob of sequence vw when two letters picked without replacement from hvwjv. 1/10 Two letters picked without replacement from iiiiiiiiiriiiiiliii. Give prob of sequence li. 17/342 Calculate prob of sequence drrr when four letters picked without replacement from rdrrdrr. 1/7 Two letters picked without replacement from sfxkfakkxssasxs. What is prob of sequence as? 1/21 Three letters picked without replacement from {l: 1, o: 3, j: 1, w: 1, m: 1, q: 5}. What is prob of sequence mqq? 1/66 What is prob of sequence hzh when
dm_mathematics
Kay From: Ben F Jacoby @ ECT 05/16/2001 12:03 PM Sent by: Ben Jacoby@ECT To: Kay Mann/Corp/Enron@Enron cc: Subject: FPL PPA Kay: A while ago, you sent me a copy of an FPL PPA for Homestead. Could you please resend me the document? Thanks,
enron_emails
II. ANALYSIS A. The Limitation of Liability Act Dravo first argues that this court must retain exclusive jurisdiction and maintain a concursus, or a concourse of the parties,[4] to prevent duplicity of litigation. Memorandum in Response to Opposition to Motion to Enjoin State Court Actions at 5-6. The court finds it necessary to address Dravo's arguments in support of its motion to enjoin by examining the purposes for which Congress enacted the Limitation Act in the context of this case. In so doing, the court first addresses the issue of whether Dravo, as manufacturer of the vessel in question, may object to further proceedings in the state court where neither the vessel owner, the owner pro hac vice, nor their insurers have been named as parties and no evidence exists that any such party may be subject to liability exceeding the value of the limitation fund. This court, in commenting on the purposes of the Limitation Act, has noted that: The Limitation Act serves the obvious purpose of limiting the liability of shipowners, and also protecting the shipowner from the risk of inconsistent judgments arising from a multiplicity of actions, and enabling the admiralty court to equitably distribute a limited fund among a number of claimants.... [T]he Act was also designed to foster the growth of the shipping industry. Ray v. Lykes Bros. S.S. Co., 626 F.Supp. 120, 124 (E.D.La.1985) (citations omitted), vacated on other grounds, 805 F.2d 552 (5th Cir.1986). A shipowner invokes the Act's provisions by filing a complaint for exoneration from or limitation of liability. 46 U.S.C.App. § 185 (1988). Upon compliance with the statute's requirements, the Limitation Act provides that "all claims and *131 proceedings against the owner with respect to the matter in question shall cease." Id. (emphasis added). In addition, a bareboat charterer such as Newpark may be deemed an owner pro hac vice and seek protection under the Act. See id. § 186. The Act, therefore, clearly provides the federal court sitting in admiralty with the power necessary to protect shipowners and, in some cases, charterers, who face multiple claims arising from a single marine disaster. Rule F of the Supplemental Admiralty Rules further defines the procedural requirements to invoke the Act's protections. This rule provides that "[o]
freelaw
Monadic parser for CSS in Clojure - kachayev https://gist.github.com/kachayev/b5887f66e2985a21a466 ====== juliangamble _it 's easier to work both with monads and parsers in dynamically typed language_ I'm asking a genuine question. I'm certain other people have had a different experience to this. Could you expand on what makes it easier? (And would you deliberately distinguish between 'easy' and 'simple') ~~~ kachayev Nice question! It "easy". Cause it takes less characters in your code: you don't need "type classes" of any form, you don't care about liftings etc. You can start from 2-3 lines of code and see immediate result. But it's really not that "simple", cause without constant thinking about type of each expr it becomes very hard to trace long chains of monad operations very quickly. Plus types are great for verifying that you didn't break anything inside your "do" block (which is painful in dynamic env). ~~~ jerf "Cause it takes less characters in your code: you don't need "type classes" of any form, you don't care about liftings etc. You can start from 2-3 lines of code and see immediate result." Considering you linked directly to the roughly-equivalent Haskell, which contains neither of those things, that's a strange statement. You will still need to care about liftings if you do monad transformers in a dynamic language, and if you implement your own monadic value in Clojure you may not literally type in an "instance" but you're still going to have to implement it. You may have attained parity with Haskell's ease-of-parsing, but you certainly haven't shown it to be "easier". That _is_ saying something, though... few languages can implement a monadic parser without horrid syntax. (Assuming you actually have... it's a common problem to think one has implemented something monadic without actually having done so. [1] But that's just a general comment, I'm not familiar enough with Clojure to have an opinion.) However... "Plus types are great for verifying
hackernews
Cell polarity is essential for development and differentiation, and it plays vital roles in fundamental processes such as cell migration, nutrient transport across epithelia, and neuronal transmission. Defects in cell polarity are often associated with serious human diseases such as cancer. Our long-term objective is to use the genetically tractable eukaryote Saccharomyces cerevisiae to elucidate the principles of cell polarization. In this proposal, we will address two important questions regarding the central role of Cdc42p, an evolutionarily conserved
nih_exporter
Several studies suggest that the prevalence of allergic diseases have increased worldwide in recent years. However, in Mexico, those diseases have not been assessed throughout time. The aim of this study was to determine whether there has been a change in the prevalence of childhood asthma, eczema, and atopic rhinitis in Mexican schoolchildren. Following the methodology recommended by the International Study of Asthma and Allergy in Childhood, we performed two cross-sectional assessments (1995/2002) using a standardized questionnaire-
pubmed_abstracts
![Gastrografin enema confirmed the fistula was closed.](WJGE-9-95-g004){#F4} In conclusion, although the OTSC system had mostly been used for treating upper gastrointestinal perfusion and fistulas and fistulas on the top of the pouch are rare and often are cured through surgery, we still suggest attempting OTSC to treat a pouch fistula due to the easy manipulation and reduction of immediate operative intervention rates, and length of hospitalization\[[@B7],[@B8]\]. Even if the endoscopic closure failed, the salvage surgery would still be feasible. ACKNOWLEDGMENTS =============== We thank Zhi-Ming Wang and Yan-Qing Diao for helping with the endoscopic closure. COMMENTS ======== Case characteristics -------------------- This was a young man with severe ulcerative colitis who received ileal pouch-anal anastomosis (IPAA) and developed a fistula after surgery. Clinical diagnosis ------------------ Intestinal fistula. Differential diagnosis ---------------------- Leaks from the tip of the J-pouch, Anastomotic fistula, Crohn's disease, abscess. Laboratory diagnosis -------------------- The patient had a high blood white cell count and fever; thus, he was diagnosed with an intra-abdominal infection. Imaging diagnosis ----------------- Leaks from the tip of the J-pouch. Pathological diagnosis ---------------------- He was cured with non-surgical treatment, and there was no pathological diagnosis. Treatment --------- Closed the fistula with the over-the-scope clip (OTSC) system. Related reports --------------- A J-pouch is the most common configuration of IPAA used currently. Risk factors for pouch-related sepsis complications include steroid use, a body mass index greater than 30, a patient older than 50 years, diagnosis of inflammatory bowel disease, and surgeon inexperience. Surgical approaches have always been used for pouch-related sepsis arising from pouch fistula. Term explanation ---------------- Fistula is a pouch-related septic complication. There are 4 main pouch sources of fistula, including the appendage, pouch reservoir, inflow limb, and pouch-rectal anastomosis. Each can fistulize to different areas, including the abdominal wall, vagina, bladder, and other loops of the small bowel. Experience and lessons ---------------------- This was a successful application of
pubmed_central
What does the code $('body').on('hidden.bs.modal', '.modal', function (){....} do and when does it gets called? I've following HTML to show the bootstrap modal dialog: <div class="panel-body" data-toggle="modal" href="ajax_event_detail.php?event_id=512" data-target="#myModal-event" style="cursor: pointer;"></div> Bootstrap modal dialog code is as below : <div id="myModal-event" class="modal fade" role="dialog"> <!-- <div role="document" class="modal-dialog"> --> <div role="document" style="width:600px;position:relative;margin:auto;margin-top:10px;"> <div class="modal-content" style="border:0;"> <!-- <button aria-label="Close" data-dismiss="modal" class="close" type="button"><span aria-hidden="true"> x </span></button> --> <div class="modal-header"> <h4 id="myModalLabel" class="modal-title">Event Details</h4> </div> <div class="modal-body"> Loading... </div> <div class="modal-footer"> <button data-dismiss="modal" class="btn btn-default" type="button">Close</button> </div> </div> <!-- /.modal-content --> </div> </div> and another code as follows : <div class="modal-content"> <!-- <button aria-label="Close" data-dismiss="modal" class="close" type="button"><span aria-hidden="true">×</span></button> --> <div class="modal-header"> <h4 id="myModalLabel" class="modal-title">Event Details</h4> </div> <div class="modal-body"> <div class="row"> <div class="col-sm-6 col-md-6 col-sm-12"> <div class="event-title"> {$eventDetails.event_details.title} <input type="hidden" name="hid_event_
stackexchange
The present invention relates to an apparatus for an a method of positioning and holding a photosensitive material to be used in a reproduction apparatus and particularly to an apparatus for and a method of positioning and holding a photosensitive material or the like having a sheet form to be placed on a photographing portion shaped like a table (referred to hereinafter as a photographing table) of a process camera. 2. Description of the Prior Art It is well known that such a conventional process camera as shown in FIG. 1 has been used in graphic arts. This vertical-type process camera comprises: a photographing table 2 provided in an upper portion of a frame body 1 and having a transparent plate 12; a lens mount 4 with a lens 5, provided under the photographing table 2 and movable vertically by means of bellows 3; an original table 7 having a pair of light sources 6, provided under the lens mount 4 in a vertically movable manner; and a transparent pressure plate 8 placed on the original table 7 for fixedly holding an original between the table 7 and the pressure plate 8. Thus, an image of the original held between the original table 7 and the pressure plate 8 is focused on a transparent plate 12 of the photographing table 2 through the lens 5 with a desired magnification and a photosensitive material 10 placed on the transparent plate 12 with its photosensitive surface directed downward is exposed so that the image is printed on the material 10. The photographing table 2 comprises means 19 for positioning and holding the photosensitive material as shown in FIG. 2, as is well-known in the prior art. More specifically, the positioning and holding means 19 comprises: a positioning mark sheet 21 having corner marks 22 for positioning along an optical axis of the camera the photosensitive material 10 placed on the transparent plate 12 of the photographing table 2; a light intercepting device 23 for spreading a light intercepting overlay sheet 25 over the mark sheet 21 under which the photosensitive material 10 is placed; and evacuation means 16 for evacuating the air between the transparent plate 12 and the overlay sheet 25 placed thereon through an evacuation channel 13 provided in peripheral portions of the transparent plate 12. The photosensitive material 10 is positioned between the transparent plate 12 and the mark sheet 21 by setting the corners of the photosensitive material 10 to the corner marks 22 while inserting the photosensitive material 10 therebetween. A sheet roller 26 of the light intercepting device 23 is rotated toward a front side directed to an operator, so as to spread the overlay sheet 25 on the photographing table 2. Then, the evacuation means
uspto_backgrounds
1981–82 South Pacific cyclone season The 1981–82 South Pacific cyclone season was a slightly-below average South Pacific tropical cyclone season, with 6 tropical cyclones occurring within the South Pacific Ocean basin between 160°E and 120°W during the season. After this season, the names Gyan and Isaac were retired from the lists of names, after they caused significant impacts to South Pacific island nations. During the season, tropical cyclones were monitored by the Tropical Cyclone Warning Centers in Nadi, Fiji, Brisbane, Australia and Wellington, New Zealand. During the season TCWC Nadi issued warnings and assigned names to any tropical cyclones that developed between the Equator and 25°S while TCWC Wellington issued warnings for any that were located to the south of 25°S. The United States Armed Forces through the Joint Typhoon Warning Center (JTWC) and Naval Pacific Meteorology and Oceanography Center (NPMOC), also monitored the basin and issued unofficial warnings for American interests. TCWC Nadi, Brisbane and Wellington measured sustained windspeeds over a 10-minute which are compared to the modern day Australian tropical cyclone intensity scale. The JTWC and the NPMOC measured sustained windspeeds over a 1-minute period which are compared to the Saffir-Simpson Hurricane Scale (SSHS). __TOC__ Systems Severe Tropical Cyclone Gyan Severe Tropical Cyclone Gyan existed from December 18 to December 29. Severe Tropical Cyclone Hettie Severe Tropical Cyclone Hettie existed from January 24 to February 1. Severe Tropical Cyclone Abigail Severe Tropical Cyclone Abigail existed from February 1 to February 7. Severe Tropical Cyclone Isaac The tropical cyclone developed 160 km/100 mi northeast of western Samoa and travelled southwest at 12 knots, moving through the Ha'apai island group and only 50 km/30 mi northwest of Tongatapu. The pressure at Tongatapu fell to . Winds of 92 knots were measured at Nuku'alofa, and rainfall of was measured there. Isaac reached maximum intensity on March 2. The tropical cyclone was the worst storm in Tonga's history, devastating the island group. The island
wikipedia_en
- If $p\in (0,p_c)$, then $G$ contains no infinite cluster. - If $p\in (p_c,1)$, then $G$ contains $\mu_p$ almost surely one unique infinite cluster. - If $p\ne p_c$, then $\chi^f(p)<+\infty$. If $G$ is a subgraph of ${\ensuremath{\mathbb{L}^d}}$ and if $\nu$ is a probability measure on ${\ensuremath{\mathbb{R}}}$, we will define the color-probability $P^{G,\nu}$ as follows: $P^{G,\nu}$ is the only measure on $({\ensuremath{\mathbb{R}}}^{{\ensuremath{\mathbb{Z}^d}}},\mathcal{B}({\ensuremath{\mathbb{R}}}^{{\ensuremath{\mathbb{Z}^d}}}))$ under which the canonical projections $X_i$ – defined, as usually by $X_i(\omega)=\omega_i$ – satisfy - For each $i\in{\ensuremath{\mathbb{Z}^d}}$, the law of $X_i$ is $\nu$. - For each independent set $S\subset{\ensuremath{\mathbb{Z}^d}}$, the variables $(X_i)_{i\in S}$ are independent. - For each connected set $S\subset{\ensuremath{\mathbb{Z}^d}}$, the variables $(X_i)_{i\in S}$ are identical. The randomized color-measure is defined by $$P^{p,\nu}=\int P^{G,\nu}\ d\mu_p(G).$$ We also note $\Lambda_n=\{-n,\dots,n\}^d$. Laws of large numbers ===================== Quenched Law of large numbers ----------------------------- \[quenched\_lln\] Let $\nu$ be a probability measure on ${\ensuremath{\mathbb{R}}}$ with a first moment. We put $m=\int_{{\ensuremath{\mathbb{R}}}} x\ d\nu(x)$. Let $p\in (0,1)\backslash\{p_c\}$ For $\mu_p$ almost $G$, we have the following result : $${\renewcommand{\arraystretch}{0.6} \begin{array}{c} {\scriptstyle }\\ \lim\\ {\scriptstyle n\to
arxiv
are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the Launch4j nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ /* * Created on Jul 19, 2006 */ package net.sf.launch4j.formimpl; import java.io.File; import java.util.prefs.Preferences; import javax.swing.JFileChooser; /** * @author Copyright (C) 2006 Grzegorz Kowal */ public class FileChooser extends JFileChooser { private final Preferences _prefs; private final String _key; public FileChooser(Class clazz) { _prefs = Preferences.userNodeForPackage(clazz); _key = "currentDir-" + clazz.getName().substring(clazz.getName().lastIndexOf('.') + 1); String path = _prefs.get(_key, null); if (path != null) { setCurrentDirectory(new File(path));
github
Erin Bedford is a PhD student in Nanotechnology Engineering at the University of Waterloo and the Pierre and Marie Curie University (Paris VI) in a co-supervised program. You can find her on Twitter at @erinellyse. Love it or hate it, PowerPoint is everywhere. “Preparing a presentation” has become synonymous to “preparing a PowerPoint presentation,” but is this really a good attitude when it comes to communicating research? PowerPoint is a tool, and as with any tool, its true power comes not from the tool itself but from the one who holds it. Like dynamite, handled properly it can blast through the mountain that is communication between presenter and audience, but placed in the wrong hands and the audience may end up buried in the rubble. I recently attended a great talk on the subject, which has got me thinking about presentations. What are the dangers of PowerPoint, how can we avoid them, and how can we make sure to keep focus on the content rather than the medium? Identify your audience Know your audience. Without them, there is no presentation. When presenting to a group of experts in your field, skip over the in-depth intro and focus most of your slides on the knitty-gritty details; when presenting to a group of first-year chemistry students, do the opposite. But it’s not always this easy. What about mixed audiences? For example, I gave a short talk last month to a group of graduate students in materials science, which is so broad a field that many were not at all familiar with my subject. On the one hand, I wanted everyone in the audience to be able to understand my work; on the other hand, one of the goals of the series of talks was to find solutions to research problems we might be having, so it was important to present the details of my research. With only 10 minutes to talk, I couldn’t do both, so I had to identify who in the audience I wanted to present to. In this case, I decided that if I wanted tips from those in my field, I would have to present my results in detail, so I prepared a presentation with a brief introduction and focused more on my results. Many conferences are multidisciplinary, so choosing who in the audience you want to direct your talk to is an important first step in preparing a presentation. A presentation is not a paper Rarely do we read a journal article linearly. We
pile-cc
-24*p**3 Let j = 10 + 1. Suppose j = -a + 5*c, 5*a + 2*c - 14 = 4*c. Differentiate -a*k**4 + 3 + 2*k**4 - 6 wrt k. -8*k**3 Let s(o) be the second derivative of -17*o**6/30 + 19*o**4/12 + 22*o. Find the third derivative of s(y) wrt y. -408*y Let a(z) be the second derivative of -2*z**7/7 + 3*z**5/20 - 3*z**4/2 - 2*z. Find the third derivative of a(x) wrt x. -720*x**2 + 18 What is the second derivative of -29*j**2 + 4*j + 4*j**2 - 16*j wrt j? -50 Let k(v) be the first derivative of 0*v**4 + 5 + v**2 + 0*v - 7/5*v**5 + 0*v**3. What is the second derivative of k(n) wrt n? -84*n**2 Let s(r) = r**2 + 2*r. Let h be s(-2). Suppose k + g - 4 = h, 0 = -3*k - 4*g - 6 + 17. What is the third derivative of 3*f**5 - 2*f**5 + 0*f**k - 2*f**2 wrt f? 60*f**2 Let h(q) = -q + 11. Let o(y) = -y + 23. Let b(k) = 13*h(k) - 6*o(k). Let c(z) = -1. Let n(s) = -b(s) + 3*c(s). Find the first derivative of n(x) wrt x. 7 Let b(x) be the first derivative of -x**6/120 - x**4/6 + x**2 - 5. Let l(r) be the second derivative of b(r). What is the second derivative of l(n) wrt n? -6*n Let r = 65 + -61. Let x(p)
dm_mathematics
Just to give a head's up, In case I'm not here and you have to get something signed for EnronOnline, Louise Kitchen absolutely does not want any other officer signing documents for her group. The only two signatories for EnronOnline are Louise and Andy Zipper, Vice President. FYI, we do have a resolution in place that allows certain individuals to sign password applications (only!) on behalf of EnronOnline.
enron_emails
3845 3848 HESSE v. SPRINT COUNSEL David Elliot Breskin and Daniel Foster Johnson (argued), Breskin Johnson & Townsend PLLC, Seattle, Washington; HESSE v. SPRINT 3849 and Bradley Jerome Moore, Stritmatter Kessler Whelan Coluccio, Seattle, Washington, for the plaintiffs-appellants. Gavin W. Skok and David Brenner, Riddell Williams, PS, Seattle, Washington; Robert Bruce Allensworth, Brian M. Forbes, Ryan M. Tosi, and Andrew Glass (argued), Kirkpat- rick & Lockhart Preston Gates Ellis LLP, Boston, Massachu- setts, for the defendant-appellee. OPINION CLIFTON, Circuit Judge: This case requires us to consider whether a broad release of claims in a nationwide settlement agreement between Sprint and its customers precludes the present class action involving a Washington state tax that Sprint invoiced to its Washington customers. That nationwide settlement arose out of a lawsuit that challenged Sprint’s billing of customers for certain fed- eral regulatory fees. Because we conclude that the Washing- ton Plaintiffs’ interests were not adequately represented in the prior action and that their claims are not “based on the identi- cal factual predicate as that underlying the claims in the set- tled class action,” Williams v. Boeing Co., 517 F.3d 1120, 1133 (9th Cir. 2008), we hold that the prior settlement did not release the claims at issue in this case, and we vacate the dis- trict court’s grant of summary judgment in favor of Sprint. I. Background The State of Washington imposes a business and occupa- tion tax (“B&O tax”) on every person engaged in business activities in the state. Wash. Rev. Code § 82.04.220. Wash- ington law specifies that the B&O tax must be collected from a business as part of its “operating overhead” rather than imposed as a separate “tax[ ] upon the purchasers or custom- 3850 HESSE v. SPRINT ers.” Id. § 82.04.500 (the “B&O Tax Statute”).
freelaw
Am I missing something? ~~~ Encosia The Google CDN serves jQuery with a 365 day max-age as long as you reference a specific version (which you should be doing anyway). It only uses the shorter cache expiration, necessarily, if you want a "latest version" reference. More info here: [http://encosia.com/the-crucial-0-in-google-cdn-references- to...](http://encosia.com/the-crucial-0-in-google-cdn-references-to- jquery-1-x-0/) ------ MatthewPhillips It saddens me that ES6 modules don't have fallbacks built in. You do: import 'http://developer.yahoo.com/modules/yui3.js' as YUI; wish it was: import ['http://developer.yahoo.com/modules/yui3.js', '/libs/yui3'] as YUI; ~~~ SoftwareMaven I think the notion of "fallbacks" (and the sibling comment's "timeouts") are extremely specific to the web. However, there is some prior art on this subject in the python world: try: import simplejson as json except ImportError: import json So it might be worth contacting the committee and expressing that. ------ sleepyhead Fallback to a CDN has been blogged about for a while, don't understand why it is being upvoted now. However, do note the issues presented by Steve Souders though: [http://www.stevesouders.com/blog/2013/03/18/http-archive- jqu...](http://www.stevesouders.com/blog/2013/03/18/http-archive-jquery/) One thing is that only about 1% have the specified version you use on your site. ------ mrharrison If you guys take a look at html5 boilerplate <http://html5boilerplate.com/> . It has redundancy built in, so if the cdn fails, it will load your local copy. ~~~ mrharrison Also,
hackernews
The objectives of the project are to determine if some of the minor histocompatibility antigens expressed on mouse epidermal cells represent unique, tissue-specific determinants. This will be accomplished by using epidermal cells prepared by trypsinization of adult mouse tail skin as stimulators and targets of lymphocyte-mediated cytotoxicity. The genetic control of the cytotoxicity evoked by antigens expressed by epidermal cells will be characterized. In addition, clones of cytotoxic T lymphocytes generated by immunization with allogeneic epidermal cells will be maintained in continuous culture with the
nih_exporter
Febrile neutropenia and hemorrhagic stroke in a thalassemia major patient. A 36-year-old transfusion-dependent thalassemia major patient presented with febrile neutropenia and anemia. Deferiprone (L1) was discontinued as it was suspected to be the offending agent and prompt broad-spectrum antibiotic therapy was initiated after which the patient improved. After 11 days the patient developed hemorrhagic stroke and seizure whereby aspirin was discontinued and supportive therapy was given.
pubmed_abstracts
Indicator (/Possible Score) MRSDAT Mean, SD, Average of 24-h Recalls Mean, SD, Median (IQR) or *n* (%) *t*-Test or Wilcoxon Signed-Rank Test Result Slope of Bias *p*-Value for Slope of Bias --------------------------------- ---------------------- ----------------------------------------------------------- ---------------------------------------------- --------------- ----------------------------- Total DGI-CA score /90 58.37, +/−11.92 54.07, 12.32 4.30 (−0.05, 8.66) ^a^ −0.05 0.83 Total DGI-CA score /100 64.86, +/−13.25 60.08, 13.68 4.78 (−0.06, 9.63) ^a^ −0.05 0.83 Food groups median (IQR) Vegetables (/10) 5.08 (2.8, 9.95) 3.87 (1.57, 7.72) −1.70, *p* = 0.09 ^b^ −0.08 0.68 Fruit (/10) 10.00 (4.2, 10.00) 10.00 (0.13, 10.00) −1.50, *p* = 0.14 ^b^ −0.42 0.16 Breads and Cereals (/5) 3.75 (0.94, 3.75) 2.52 (2.05, 3.79) −0.25, *p* = 0.80 ^b^ 0.52 0.03 ^c^ Meat (/10) 10.00 (10.00, 10.00) 8.27 (4.93, 10.00) −3.92, *p* \< 0.001 ^b,\ c^ −0.79 \<0.001 ^c^ Sugar sweetened beverages (/10) 10.00 (9.47, 10.00) 10.00 (10.00, 10.00) −1.30, *p* = 0.19 ^b^ 0.23 0
pubmed_central
inflater = (LayoutInflater) context .getSystemService(Context.LAYOUT_INFLATER_SERVICE); View view = inflater.inflate(R.layout.viewpager_item, container, false); sugarHelper = new SugarHelper(); tv_balance = (TextView) view.findViewById(R.id.balance_operations); current_period = (TextView) view.findViewById(R.id.current_period); current_period.setText(periods.get(position)); setBalance(balance_list, position); expandableListView = (ExpandableListView) view.findViewById(R.id.expListView); categoryParentArrayList = list.get(position); if (!categoryParentArrayList.isEmpty()) { empty = (TextView) view.findViewById(R.id.if_empty); empty.setVisibility(View.INVISIBLE); operationsAdapter = new OperationsAdapter(context, categoryParentArrayList); expandableListView.setAdapter(operationsAdapter); expandableListView.setOnChildClickListener(new ExpandableListView.OnChildClickListener() { @Override public boolean onChildClick(ExpandableListView parent, View v, int groupPosition, int childPosition, long id) { v.setBackgroundColor(Color.parseColor("#B2EBF2")); Intent intent = new Intent(context, NewOperation.class); MainFragment mainFragment = new MainFragment(); mainFragment.startActivityForResult(intent, MainFragment.REQUEST_CODE); return false; } }); expandableListView.setOnGroupClickListener(new ExpandableListView.OnGroupClickListener() { @Override public boolean onGroupClick(ExpandableListView parent, View v, int groupPosition, long id) { Toast.makeText(context, "group", Toast.LENGTH_LONG).show(); return false; } }); } ((ViewPager) container).addView(view); return view; } @Override public void destroyItem(ViewGroup container, int position, Object object) { // Remove viewpager_item.xml from ViewPager
stackexchange
The actual torque can be measured with the aid of a torque sensor. It is also known in accordance with German Published Patent Application No. 44 45 684 to determine the actual torque as a function of the rotational speed of the internal combustion engine. It is an object of the present invention to create a method for operating an internal combustion engine, which enables a smooth transition to the second operating mode of the internal combustion engine and, thus, to the regeneration of the adsorption catalyst. According to the present invention, in the case of a method of the species cited at the outset, this object is achieved in that an actual torque is determined during the transition to the second operating mode of the internal combustion engine, a torque difference between the setpoint torque and the actual torque is calculated, and in that the setpoint fuel mass and/or the setpoint air mass is/are controlled as a function of the torque difference. As mentioned, determining the setpoint fuel mass and/or setpoint air mass as a function of the setpoint torque can lead to comfort problems during the transition to the regeneration of the adsorption catalyst. In this context, the comfort problems are the result of the actual torque deviating from the desired setpoint torque. Such a deviation is detected by comparing the actual torque and the setpoint torque in accordance with the present invention. According to the present invention, the indicated torque difference is limited to a minimum by subsequently influencing the setpoint fuel mass and/or the setpoint air mass as a function of the determined torque difference. Finally, the present invention makes it possible to immediately detect any deviations in torque and to take appropriate countermeasures. The torque deviations can, thus, be kept to a minimum. At the same time, this represents an increase in comfort during the transition to the rich operating mode of the internal combustion engine and, thus, during the regeneration of the adsorption catalyst. In this context, it is significant that a torque sensor is not required for determining the torque difference in accordance with the present invention. Instead, as already mentioned, it is also possible to derive the actual torque from the rotational speed of the internal combustion engine, as an absolute quantity. Thus, no additional sensor or the like is needed to carry out the present invention. At the same time, this represents a reduction in cost and constructive effort. It is particularly advantageous when the actual torque is determined from the rotational speed of the internal combustion engine, as a relative quantity. If the setpoint torque is also determined as a relative quantity, comparing these
uspto_backgrounds
As the Canucks entered the playoffs as the third seed, Cowan scored the first playoff goal of his NHL career in game one of the second round against the Anaheim Ducks. The following game, he scored the game-winning overtime goal to tie the series 1-1. Vancouver was, however, defeated in five games by Anaheim. Before the start of the 2007–08 season, Cowan was re-signed by the Canucks to a two-year, $1.45-million contract extension. However, Cowan failed to build on the momentum he had drawn the previous campaign. He was injured early in the season, suffering a strained hip flexor on October 13, 2007, following a fight with the Oilers' Zack Stortini. Shortly after he returned, he was re-injured in a December 9 game against the Pittsburgh Penguins, separating his shoulder on a hit from enforcer Georges Laraque. Cowan finished the season with just 1 assist in 46 games. Shortly before the 2008–09 season, he was put on waivers and cleared. Instead of being assigned to the Canucks' AHL affiliate, the Manitoba Moose, he was sent to the Peoria Rivermen as the Moose had already met their five NHL veteran maximum. On April 30, 2009 Cowan was recalled from Peoria for the Canucks' 2009 playoff run. On August 20, 2009, Cowan signed a one-year contract with the Buffalo Sabres. While not featuring with the Sabres, Cowan was assigned and played the 2009–10 season, with the Portland Pirates of the AHL. He appeared in 62 games, recording a professional high of 18 goals. As an unsigned free agent over the summer, on December 17, 2010, Cowan belatedly signed a professional try-out contract with the Toronto Marlies of the AHL, later agreeing to a standard contract for the remainder of the 2010–11 season. On August 12, 2011, Cowan concluded his NHL career by signing his first contract abroad in Europe on a one-year contract to play with the Iserlohn Roosters of the DEL. Career statistics References External links Category:1976 births Category:Atlanta Thrashers players Category:Barrie Colts players Category:Calgary Flames players Category:Canadian ice hockey left wingers
wikipedia_en
Fischer, D. A., & Valenti, J. 2005, The Astrophysical Journal, 622, 1102 Gonz[á]{}lez Hern[á]{}ndez, J. I., Pepe, F., Molaro, P., & Santos, N. 2017, arXiv.org, arXiv:1711.05250 Howard, A. W., Marcy, G. W., Bryson, S. T., [et al.]{} 2012, The Astrophysical Journal Supplement, 201, 15 Jurgenson, C., Fischer, D., McCracken, T., [et al.]{} 2016, in Proceedings of the SPIE, Yale Univ. (United States) (International Society for Optics and Photonics), 99086T Kordopatis, G., Wyse, R. F. G., Gilmore, G., [et al.]{} 2015, Astronomy and Astrophysics, 582, A122 Lissauer, J. J., Ragozzine, D., Fabrycky, D. C., [et al.]{} 2011, Astrophysical Journal, Supplement Series, 197, 8 Morton, T. D., & Winn, J. N. 2014, The Astrophysical Journal, 796, 47 Owen, J. E., & Murray-Clay, R. 2018, Monthly Notices of the Royal Astronomical Society, 480, 2206 Petigura, E. A., Marcy, G. W., Winn, J. N., [et al.]{} 2018, The Astronomical Journal, 155, 89 Piskunov, N., & Valenti, J. A. 2017, Astronomy and Astrophysics, 597, A16 Pollack, J. B., Hubickyj, O., Bodenheimer, P., [et al.]{} 1996, Icarus, 124, 62 Santos, N. C., Israelian, G., & Mayor, M. 2004, Astronomy and Astrophysics, 415, 1153 Scott, D. W. 1979, Biometrika, 66, 605 Souto, D., Cunha, K., Smith, V. V., [et al.]{} 2018,
arxiv
//===----------------------------------------------------------------------===// // // This source file is part of the Swift.org open source project // // Copyright (c) 2014 - 2017 Apple Inc. and the Swift project authors // Licensed under Apache License v2.0 with Runtime Library Exception // // See https://swift.org/LICENSE.txt for license information // See https://swift.org/CONTRIBUTORS.txt for the list of Swift project authors // //===----------------------------------------------------------------------===// %{ stringSubscriptComment = """ /// Subscripting strings with integers is not available. /// /// The concept of "the `i`th character in a string" has /// different interpretations in different libraries and system /// components. The correct interpretation should be selected /// according to the use case and the APIs involved, so `String` /// cannot be subscripted with an integer. /// /// Swift provides several different ways to access the character /// data stored inside strings. /// /// - `String.utf8` is a collection of UTF-8 code units in the /// string. Use this API when converting the string to UTF-8. /// Most POSIX APIs process strings in terms of UTF-8 code units. /// /// - `String.utf16` is a collection of UTF-16 code units in /// string. Most Cocoa and Cocoa touch APIs process strings in /// terms of UTF-16 code units. For example, instances of /// `NSRange` used with `NSAttributedString` and /// `NSRegularExpression` store substring offsets and lengths in /// terms of UTF-16 code units. /// /// - `String.unicodeScalars` is a collection of Unicode scalars. /// Use this API when you are performing low-level manipulation /// of character data. /// /// - `String.characters` is a collection of extended grapheme /// clusters, which are an approximation of user-perceived /// characters. /// /// Note that when processing strings that contain human-readable /// text, character-by-character processing should be avoided to /// the largest extent
github
Depression diagnosed The use of depression medication in the treatment of mental illness is at an all-time high. There is no reason to believe it will decline in the foreseeable future either. Depression diagnosed with increased frequency and antidepressants are the most popular means of treating the disorder. Antidepressants are extremely popularly. There are those, however, who are against using depression medication. Some argue that the research support the effectiveness of the pharmaceuticals is over influenced by the financial interests of large pharmaceutical companies. They maintain that any statement of depression medication effectiveness should be disregarded because of the corrupt nature of the medical industry. Some may temper that perspective, arguing instead that the effectiveness of the pills is heavily overstated and over prescribed. There are strong arguments to be made that the medical-governmental-industrial complex tends to be self-perpetuating and may not always have the greater good at the forefront. However, the wholesale rejection of available evidence based on bias is not particularly compelling to most analysts. Even those who think less conspiratorially may oppose the use of depression medication. One common argument raised by objectors is that the medicines do not get at the root of the disease and instead act merely to mask its symptoms. They may state that it will be more difficult curing the disease and eliminating its triggers by masking the effects. They recommend therapy-based treatment programs to get to “the heart of the problem” instead of treating the issue with medication. Others maintain that depression medication is simply too mysterious to be embraced. They argue that no one truly understands why the medications work and that, thus, there is reason to be concerned about what they may be doing to the mind of the patient. It is true that no one truly understands exactly why all antidepressants tend to produce the results they do. However, scientific research is beginning to reach more solid conclusions, which may render this objection outdated, in the near future. Others opposed to the use of antidepressants base their arguments on religious beliefs or assessments of the severity of potential side effects associated with the use of drugs. Critics of antidepressants offer alternative means of treatment. They often support aggressive therapy-based solutions, the use of improved nutrition and other acts in order to fight off the symptoms of a depressive disorder. Many advocate non-traditional treatment methods or more ancient practices designed to improve mental health. Despite a large chorus of detractors, however, the use of antidepressants continues unabated. The best available
pile-cc
Factor z**2 - 11515513*z - 11515514. (z - 11515514)*(z + 1) Solve -3*g**5 - 5052*g**4 + 3213774*g**3 + 9556609980*g**2 + 4256222010141*g - 34663023780840 = 0. -1019, 8, 1365 Find l, given that 14*l**5 + 96368*l**4 + 24445254*l**3/7 + 10022288*l**2/7 - 11776552*l/7 + 1971936/7 = 0. -6847, -36, -1, 2/7 Factor m**3/4 - 6741*m**2/4 + 1747356*m - 495728545. (m - 5545)*(m - 598)**2/4 Let 3*w**2 - 11308698*w - 33926121 = 0. What is w? -3, 3769569 Factor 2809*k**2/3 + 88244152*k/3 + 693042930064/3. (53*k + 832492)**2/3 Factor -5*r**2 + 3920711*r + 3136572. -(r - 784143)*(5*r + 4) Factor 4*a**3 + 118016*a**2 + 695441300*a - 2701312310312. 4*(a - 2618)*(a + 16061)**2 Factor 5*r**2/6 + 3979055*r/3 + 3166575738605/6. 5*(r + 795811)**2/6 Suppose -a**2/3 - 130655952*a - 12803233344769728 = 0. Calculate a. -195983928 Factor 2*w**2/9 - 78376424*w/9 + 767857979878472/9. 2*(w - 19594106)**2/9 What is j in -j**2 - 98608*j - 1873191 = 0? -98589, -19 Solve 2*g**2/3 + 414394*g/3 - 49341208/3
dm_mathematics
---------------------- Forwarded by Mary Hain/HOU/ECT on 12/11/2000 01:05 PM --------------------------- Mary Hain 12/11/2000 11:19 AM To: Christi Nicolay, James D Steffes/NA/Enron@Enron, Tim Belden/HOU/ECT@ECT, Christopher F Calger/PDX/ECT@ECT, Phillip K Allen/HOU/ECT@ECT, Joe Hartsoe
enron_emails
Meyers, J., delivered the opinion of the Court in which Keller, P.J., and Price, Womack, Johnson, Hervey, and Cochran, JJ., joined. Price, J., filed a concurring opinion in which Hervey and Cochran, JJ., joined. Keasler, J., concurred. O P I N I O N Applicant, Benjamine (1) John Spencer, was convicted of murder and sentenced to 35 years' confinement. He filed a motion for new trial, which was granted. On retrial, he was convicted of aggravated robbery and sentenced to life in prison. The conviction was affirmed on appeal. Spencer v. State, No. 05-88-00397-CR (Tex. App.-Dallas May 3, 1989) (not designated for publication). Applicant filed an application for writ of habeas corpus claiming that he is actually innocent, that trial counsel rendered ineffective assistance, and that the State violated Brady v. Maryland, 373 U.S. 83 (1963), and Mooney v. Holohan, 294 U.S. 103 (1935). The trial court held an evidentiary hearing and recommended that we grant relief. We remanded the case to the trial court for additional findings and conclusions. After receiving the trial court's findings and conclusions, we filed and set this case for submission and ordered the parties to brief whether Applicant properly raised a free-standing actual innocence claim, whether the evidence he relies on is newly discovered or newly available, whether we should consider advances in science and technology when determining whether evidence is newly discovered or newly available, and whether Applicant has shown by clear and convincing evidence that no reasonable juror would have convicted him in light of the new evidence. Relief is denied. BACKGROUND At around 10:45 p.m. on March 22, 1987, police received a call that a man was lying face down in the street. When they arrived, they found the victim, Jeffrey Young, unconscious and bleeding. He was taken to the hospital, where he died. It was later determined that he died from severe skull fractures that were a result
freelaw
Control should only be exerted over things where you have sufficient knowledge. In a rapidly changing environment - be it business or battle - knowledge can only come via communication. Strong centralized control can only work well in environments where communication is strong too. Otherwise decisions must be made with less knowledge than other parts of the organisation closer to the action the decision affects. ~~~ davidw > Thanks. I just made it up.. but I don't think it's anything complicated. It's a nice phrase and concept. If you could fluff it up a few hundred pages, you could get a business book of your own out of it... ------ nradov Military analogies and examples are almost universally terrible when applied to software development (and business in general). That blog post cherry picks a few anecdotes from Napoleon's history and ignores his failure to learn from his mistakes. As his famed opponent Arthur Wellesley (Wellington) said after defeating Napoleon the final time: "They came on in the same old way and we defeated them in the same old way." [https://secure.wikimedia.org/wikipedia/en/wiki/Column_%28for...](https://secure.wikimedia.org/wikipedia/en/wiki/Column_%28formation%29#Napoleonic_Wars) Business is not war. ~~~ anonymo "As his famed opponent Arthur Wellesley (Wellington) said after defeating Napoleon the final time: "They came on in the same old way and we defeated them in the same old way."" Cute, except that Waterloo was Wellington's one and only victory over Bonaparte. It was the only time they met on the battle field, and even then, Michel Ney made most of the tactical decisions (and mistakes) on that day. Remembering Napoleon for Waterloo rather than Austerlitz, Ulm and Jena would be like remembering Hannibal for Zama. The fact that his name has become synonymous with his unremarkable defeat on that day, and that Wellington, a reactionary, anti-democratic, ennobled aristocrat, is somehow looked upon with favor in this country (America), even more so than his adversary who was an ally of America, who doubled the size of our
hackernews
The basic aim of this grant proposal is to define and validate non-invasive techniques which allow the secretion and hepatic extraction of insulin to be accurately quantitated from peripheral C-peptide and insulin concentrations in human subjects. Insulin secretion rates will be derived from peripheral C-peptide concentrations by using a two compartment mathematical model to analyze the peripheral concentrations of C-peptide. Each subject will receive an intravenous bolus injection of biosynthetic human C-peptide and model parameters will be individually derived from the resulting decay curve
nih_exporter
The role of 99mTc-MIBI scintigraphy in the assessment of MDR1 overexpression in patients with musculoskeletal sarcomas: comparison with therapy response. The occurrence of multidrug resistance (MDR), which is in part due to the overexpression of P-glycoprotein (Pgp), is a major problem in neoadjuvant therapy of malignant musculoskeletal tumours. The aim of this study was to investigate the role of technetium-99m hexakis-2-meth
pubmed_abstracts
*ZNF423* *BMP2* *SMAD1* ---------- ---------------------- --------------------- ---------------------- *ZNF423* 1.00000 0.10372; P = 0.1544 0.32793; P \< 0.0001 *BMP2* 0.10372; P = 0.1544 1.00000 0.24840; P = 0.0005 *SMAD1* 0.32793; P \< 0.0001 0.24840; P = 0.0005 1.00000 Spearman correlation between *ZNF423*, *BMP2*, and *SMAD1* expression in *n* = 190 B-ALL. ###### Expression of *ZNF423*, *BMP2*, and *SMAD1* transcripts in dependence on *ETV6-RUNX1* status *ETV6-RUNX1* negative *ETV6-RUNX1* positive All P-value ---------- -------- ----------------------- ----------------------- ------------ --------- *n* 118 49 167 *ZNF423* Mean 9.25 21.28 12.78 0.0000 Median 0.0--36.2 0.1--72.5 0.0--72.5 SD 7.714 18.040 12.893 *BMP2* Mean 53.42 70.38 58.40 0.0017 Median 0.1--299.2 3.0--272.6 0.1--299.2 SD 68.197 57.352 65.491 *SMAD1* Mean 11.71 56.82 24.95 0.0000 Median 0.0--82.0 0.6--402.3 .0.--402.3 SD 12.881 75.978 47.015 Distribution analysis of *ZNF423*, *BMP2,* and *SMAD1* in *ETV6-RUNX1*-positive or -negative samples by *U* test. SD, standard deviation; p, P value. Next, we addressed the
pubmed_central
I thought that maybe I needed the contents of the file, instead of the location so I tried the following but got the same error: profile.CertificateFile = new StreamReader(@"MyTestCertificate.txt").ReadToEnd().ToString(); It seems that whatever you set the CertificateFile property to, you get a fatal exception. A couple of questions: Where can I find documentation on the IAPIProfile class in the Paypal API, in particular documentation for the CertificateFile property If I am not supposed to put the path to my certificate file in this location, what am I supposed to do? Just to confirm, MyTestCertificate.txt is added to my solution and Copy to Output Directory is set to Copy Always. The exception text is as follows: {"Exception of type 'com.paypal.sdk.exceptions.FatalException' was thrown."} The StackTrace looks like this: at com.paypal.sdk.profiles.SignatureAPIProfile.set_CertificateFile(String value) at MyProject_Payment_Processing.Paypal.DoCaptureCode(String authorization_id, String amount) in C:\Users\JMK\documents\visual studio 2010\Projects\MyProject Payment Processing\MyProject Payment Processing\Paypal.cs:line 16 at MyProject_Payment_Processing.Program.Main(String[] args) in C:\Users\JMK\documents\visual studio 2010\Projects\MyProject Payment Processing\MyProject Payment Processing\Program.cs:line 15 at System.AppDomain._nExecuteAssembly(RuntimeAssembly assembly, String[] args) at System.AppDomain.ExecuteAssembly(String assemblyFile, Evidence assemblySecurity, String[] args) at Microsoft.VisualStudio.HostingProcess.HostProc.RunUsersAssembly() at System.Threading.ThreadHelper.ThreadStart_Context(Object state) at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean ignoreSyncCtx) at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state) at System.Threading.ThreadHelper.ThreadStart() The Paypal API uses Log4Net which logs the error as so: 20 Jul 2012 12:39:11 FATAL [FatalException] com.paypal.sdk
stackexchange
In recent years, sports equipment manufacturers have increasingly turned to different kinds of materials to enhance their sporting equipment. In so doing, entire lines of sports equipment have been developed whose stiffness or flexibility characteristics are but a shade different from each other. Such a shade of difference, however, may be enough to give the individual equipment user an edge over the competition or enhance sports performance. The user may choose a particular piece of sports equipment having a desired stiffness or flexibility characteristic and, during play, switch to a different piece of sports equipment that is slightly more flexible or stiffer to suit changing playing conditions or to help compensate for weariness or fatigue. Such switching, of course, is subject to availability of different pieces of sports equipment from which to choose. That is, subtle changes in the stiffness or flexibility characteristics of sports equipment may not be available between different pieces of sports equipment, because the characteristics may be fixed by the manufacturer from the choice of materials, design, etc. Further, the user must have the different pieces of sports equipment nearby during play or they are essentially unavailable to the user. Turning to various types of sports, it can be seen how the lack of adjustability in stiffness and flexibility may adversely affect optimum performance of the player. Hockey Hockey includes, but is not limited to, ice hockey, street hockey, roller hockey, field hockey and floor hockey. Hockey players may require that the flexure of the hockey stick be changed to better assist in the wrist shot or slap shot needed at that particular junction of a game or which the player was better at making. Players may not usually leave the field to switch to a different piece of equipment during play. Younger players may require more flex in the hockey stick due to lack of strength; such flex may mean the difference between the younger player being able to lift the puck or not when making a shot since a stiffer flex in the stick may not allow the player to achieve such lift. In addition, as the younger players ages and increases in strength, the player may desire a stiffer hockey stick, which in accordance with convention means the hockey player would need to purchase additional hockey stick shafts with the desired stiffness and flexibility characteristics. Indeed, to cover a full range of nuances of differing stiffness and flexibility characteristics, hockey players would have available many different types of hockey sticks. Even so, the hockey player may merely want to make a slight adjustment to the stiffness or flexibility of a given hockey stick to improve the nuances of the play. Such
uspto_backgrounds
A–D Alan Bates (1934–2003), British actor Albert Bates (born 1947), U.S. environmentalist Allie Bates (born 1957), U.S. magazine writer Alta Bates (1879–1955), American nurse anesthetist and founder of Alta Bates Hospital Angelique Bates (born 1980), American actress Anna Haining Bates (1846–1888), Canadian woman who stood 7'5½" Arlo Bates (1850–1918), author and professor at Massachusetts Institute of Technology Arthur Laban Bates (1859–1934), U.S. Representative from Massachusetts, 1901–1913 Barbara Bates (1925–1969), U.S. actress and singer Barrie Bates (born 1969), Welsh darts player Benjamin Bates (disambiguation), one of several people including Benjamin Bates IV (1808–1878), philanthropist, founder of Bates College in Lewiston, Maine Bill Bates (born 1961), U.S. player of American football Billy Bates (1855–1900), English cricketer Blanche Bates (1873–1941), American stage actress Blaster Bates (1923–2006), British demolition expert Bob Bates, one of several people including Bob Bates (musician) (1923–1981), first bassist of The Dave Brubeck Quartet, 1951–1958 Bob Bates (born 1953), U.S. game designer Carl S. Bates (1884–1956), American aviation pioneer Cary Bates (born 1948), American comic book writer Cat Bates (born 1986), child model for Jamie Wyeth and younger brother of Orca Bates Charlotte Fiske Bates (1838–1916), American author Clara Doty Bates (1838–1895), American author Clayton Peg Leg Bates (1907–1998), American entertainer Daisy Bates (disambiguation), one of several people including Daisy Bates (civil rights activist) (Daisy Lee Gatson Bates, 1914–1999), U.S. civil rights activist Daisy Bates (Australia) (Daisy May Bates, 1859–1951), Australian journalist David Bates (disambiguation), one of several people including David Bates (historian) (born 1945), historian, writer of books about William I of England and Odo of Bayeux David Bates (physicist) (1916–1994), physicist winner of the 1970 Hughes Medal David Bates (poet
wikipedia_en
For the one-dimensional motion $x(t)$ the Lyapunov exponent $\lambda$ is given by $$\lambda=\lim_{t\to\infty}t^{-1}\ln {dx(t)\over dx(0)}.$$ It presumably follows from the quasiperiodicity of $x(t)$ alone that $dx(t)/dx(0)$ is similarly quasiperiodic. In any case, we have by equivariance that $|\psi(x(t),t)|^2dx(t)=|\psi(x(0),0)|^2dx(0)$, so that $$\label{dx} dx(t)/dx(0)={|\psi(x(0),0)|^2\over |\psi_{y_1,\dots,y_n}(F(y_1,\dots,y_n))|^2}$$ with $y_i=\omega_i t$. Hence $dx(t)/dx(0)$ is quasiperiodic with $n$ frequencies and thus $\lambda=0$. Remarks: (i) In one-dimension we always have that $dx(t)/dx(0)=|\psi(x(0),0)|^2/|\psi(x(t),t)|^2$. Thus the vanishing of the Lyapunov exponent $\lambda$ is more general than described here, and should be valid for any wave function, on the circle as well as the line. After all, for bound states the ratio on the right is not likely to grow or decrease in any systematic way at all, while for states with continuous spectrum the behavior will be at most power law; in no case will there be exponential growth or decay. (ii) Another aspect of chaos, the weak convergence of densities to the “equilibrium” distribution (for Bohmian mechanics given by $|\psi(x(t),t)|^2$) will, as a simple consequence of the order preserving character of such motions, almost always fail for any one-dimensional flow, Bohmian or otherwise. The sole exception can occur only when the asymptotic “equilibrium” distribution is concentrated on a single (perhaps moving) point, something that is impossible for Bohmian mechanics. I am grateful to Michael Kiessling for helpful suggestions. This work was supported in part by NSF Grant No. DMS-9504556. O. F. de Alcantara Bonfim, J. Florencio, and F. C. Sá Barreto
arxiv
<trans-unit id="StringListProperty|Aliases|DisplayName"> <source>Aliases</source> <target state="translated">Aliases</target> <note /> </trans-unit> <trans-unit id="StringProperty|Guid|DisplayName"> <source>CLSID</source> <target state="translated">CLSID</target> <note /> </trans-unit> <trans-unit id="StringProperty|Guid|Description"> <source>The GUID of the COM server.</source> <target state="translated">O GUID do servidor COM.</target> <note /> </trans-unit> <trans-unit id="StringProperty|Identity|Description"> <source>Security identity of the referenced assembly (see System.Reflection.Assembly.Evidence or System.Security.Policy.Evidence).</source> <target state="translated">Identidade de segurança do assembly referenciado (veja System.Reflection.Assembly.Evidence ou System.Security.Policy.Evidence).</target> <note /> </trans-unit> <trans-unit id="StringProperty|Identity|DisplayName"> <source>Identity</source> <target state="translated">Identidade</target> <note /> </trans-unit> <trans-unit id="StringProperty|Lcid|DisplayName"> <source>Locale</source> <target state="translated">Localidade</target> <note /> </trans-unit> <trans-unit id="StringProperty|Lcid|Description"> <source>The LCID of the COM server.</source> <target state="translated">O LCID do servidor COM.</target> <note /> </trans-unit> <trans-unit id="IntProperty|VersionMajor|DisplayName"> <source>Major Version</source> <target state="translated">Versão Principal</target> <note /> </trans-unit> <trans-unit id="IntProperty|VersionMinor|DisplayName"> <source>Minor Version</source> <
github
n -agreement or compact between two or more parties, nations, etc, for mutual advantage UPDATE – 6.30pm Just spoke to a spokesman for the London Labour party who has rejected speculation that the National Executive Committee has to rubber stamp Lutfur’s selection. He said: “I’ve double-checked it and as far as we are concerned it’s all done and dusted. Lutfur is our candidate.” Share this: Facebook & Twitter Like this: Related 15 Responses I really dont like the idea of Respect worming thier way into the Council, when they were so clearly and comprehesively thrashed in the May elections. Abjol Miah needs to respect the view of the people of Tower Hamlets and move on with his life. Respects statement today reinforces the argument that your blogs and indeed Andrew Gilligans blogs do have truth to them. I really hope the Labour party NEC now finally realise just exactly what they have accelerated here in Tower Hamlets. The very Respect party that claims to have campaigned for a directly electd mayor was simply a front for Lutfur Rahmans Labour party which has always consisted of support from Respect activists. This pact between Lutfur Rahmans Labour group and Respect did not just happen today, it has been on-going for months. Labour candidates at several wards were targeted by Respect candidates with support from pro-Lutfur activists in a bid to oust them to ensure that Lutfur Rahman remains leader but that failed due to the unexpected surge of Labour turnout on May 6th. Just take former Labour councillors Fazlul Haque and Salim Ullah as an example? It continued throughout the process to select a mayoral candidate for Labour where hoardes of Respect candidates and activists were helping Lutfur Rahman win his campaign. They were also at Lutfur Rahmans Launch party at the Troxy. We have to now understand that Tower Hamlets council has been infiltrated and taken over by IFE members and sadly in time, the Bangladeshi Muslim community will be branded just like the BNP – only this time, it will not just be the 13 BNP councillors in Barking and Dagenham that get ousted, it wil be the 41 Labour councillors in Tower Hamlets that will fall victim to this very dangerous scenario.
pile-cc
-1 Let n = 0 - -3. Let o = -176 + 177. Suppose -o = -n*p + 23. Solve 8 = p*b - 4*b for b. 2 Suppose -3*h + 1 = 2*o, 2*o - 8*h + 3*h = 9. Solve 3*z - o = 1 for z. 1 Let o = -694 - -697. Solve 3*g = -o*g for g. 0 Let i(d) = d**2 - 15*d + 18. Let o be i(10). Let u be 1 + 15/(-12) + (-104)/o. Solve -4*v - u = -v for v. -1 Let i = -7 - -20. Suppose -2*t = 2*p + 1 + 1, 6 = -4*p - 3*t. Let j be 21/9*p/(-1). Solve -i = -4*u + j for u. 5 Let r be (-1 + -5*1)*(-2464)/264. Solve -47 = -3*i - r for i. -3 Let x(o) = o**3 - 7*o**2 - 31*o + 198. Let i be x(8). Solve -8*a - 54 = -i for a. -5 Suppose -4*o = 16, 5*n - o + 6*o = 120. Let c = n - 19. Solve -s = 2*s + c for s. -3 Let r = 21 - 11. Let u = 86 - 54. Suppose 5*a - 5 = 2*t - 0*t, u = 4*t + 4*a. Solve 0*f = t*f - r for f. 2 Let l(r) = -r**2 + 4*r + 4. Let x be l(4). Let n = 140 - 137. Solve -x*t - n - 17 = 0 for t. -5 Suppose -5*d - 2*d = 42. Let p be (6/9)/2 - (-2)/d. Solve 0 = -p*y - 2*y + 10 for y. 5 Let j(r) = 2*r**2 - 3*
dm_mathematics
> > > > ENTERTAINMENT: Joy, Peace, Truth, Light, Life, > > Love, Real Happiness, Communion with God, > > Forgiveness, Miracles, Healing, Power, Eternity in > > Paradise.......and much more! (All rated "G" so > > bring your family and friends) > > > > RSVP: Very Important
enron_emails
B. While it might be argued that § 346(h) applies for tax purposes only,[11] careful examination of the legislative history confirms that estate property includes a debtor-in-possession's right to carry forward an NOL. The identical reports of both houses of Congress observed with respect to § 541(a)(1): *837 the estate is comprised of all legal or equitable interest of the debtor in property, wherever located, as of the commencement of the case. The scope of this paragraph is broad. It includes all kinds of property, including tangible or intangible property, cause of action (see Bankruptcy Act § 70a(6)), and all other forms of property currently specified in section 70a of the Bankruptcy Act § 70a. The result of Segal v. Rochelle, 382 U.S. 375 [86 S.Ct. 511, 15 L.Ed.2d 428] (1966), is followed, and the right to a refund is property of the estate. H.R.Rep. No. 95-595, 95th Cong. 1st Sess. 367 (1977); S.Rep. No. 95-989, 95th Cong.2d Sess. 82 (1978) (emphasis added), U.S.Code Cong. & Admin.News 1978, pp. 5868, 6323. Segal v. Rochelle, 382 U.S. 375, 86 S.Ct. 511, 15 L.Ed.2d 428 (1966), involved the closely analogous issue of whether a NOL carryback is property of a bankruptcy estate. The debtors, two partners and their partnership, commenced their bankruptcy cases by filing bankruptcy petitions at the end of the third quarter of 1961. After the close of that calendar year, the partners filed for tax refunds for the two years prior to the year of the bankruptcy by applying and carrying back losses incurred by the partnership in 1961 prior to the filing of the bankruptcy petitions. The Court held that the potential claims for loss carryback refunds due to pre-bankruptcy losses are property of the estate. In so holding, the Court ruled that bankruptcy purposes controlled the definition of property under § 70(a)(5) of the Bankruptcy Act, 11 U.S.C. § 110(a)(5) (1970) (repealed), the predecessor to § 541(a)(1), rather the meanings attributed to "property" in other contexts. It added
freelaw
------ CM30 It's a good start, though I think reviewing their content ID system is far more important at this point. I've seen videos claimed or taken down based on everything from outright fraud (companies and individuals claiming to own songs and video footage they don't have the rights/exclusive rights to) to weird coincidences (like songs being 'claimed' because a song they used was a bit similar to a popular pop song, even if it had nothing to do with it). It's nice to see them stand up for their users in at least some sense though. ------ minimaxir Jim Sterling, who has been the victim of malicious copyright claims on videos which are clearly fair use, has a good video on the implications of the policy: [https://youtu.be/w-UgOXP82UI](https://youtu.be/w-UgOXP82UI) ~~~ oxide I remember when Konami tried to silence Super Bunnyhop awhile back via DMCA abuse and Youtube stepped in, I'm glad to see that has in a way evolved into a proper policy, caveats be damned. ------ rdancer The Content ID juggernaut was devised by Google to placate the copyright holders and content creators whose backs YouTube had been built on. As it stands, 90%+ of all music played on YouTube is produced by the oligopoly of the three major music labels, so it is in YouTube's existential interest for the labels to be catered to. That means giving them a portion of the <10% revenue generated by the works of independent creators, and sometimes shutting down videos and channels. YouTube is popular because it is cheap, user-friendly, and popular. And it is that way thanks to rampant copyright infringement, redeemed by Content ID and the associate policies. ------ lfam Why would you use YouTube if you care about these issues? The whole business is based on monetizing your effort without compensating you. Sure, youtube has a big network effect, but that doesn't matter for the use case of using it as a host for videos shared on social networks or embedded in other sites. You could try something like MediaGoblin instead. Taking these steps help ensure that we never have
hackernews