text
stringlengths
173
4.38k
subset
stringclasses
13 values
This revised application is designed to continue and expand the training program in mental retardation and developmental disabilities (MRDD) at Mount Sinai School of Medicine. This program has been developed to provide a combined basic science and clinical background in the etiology, pathophysiology, prevention, and treatment of genetic diseases leading to MRDD. The training is primarily in the fields of genetics and neurobiology as related to MRDD. The specific subdisciplines include molecular and biochemical genetics, developmental neurobiology, neurogenetics,
nih_exporter
[Can donor insemination be optimised?]. To compare the different donor insemination technics. Analysis of the published studies about donor insemination which value the effectiveness of Intra Cervical Insemination (ICID) and Intra Uterine Insemination (IUID), the interest of ovulation induction, the possible complications, and the cost-effectiveness ratio. The meta-analysis of the Cochrane data base (10 comparative studies IUID versus ICID, 2568
pubmed_abstracts
A total of twenty *Q*. *faginea* trees were randomly selected and harvested from two naturally regenerated and unmanaged stands (10 trees per stand) within the natural geographic distribution area of the species: one stand with 34--60 year old trees in the northeast of Portugal (site 1), near Macedo de Cavaleiros (41° 30′ N, 7° 01′ W; 554 m altitude); the other stand with 112--150 year old trees in the centre of Portugal (site 2), near Vimeiro (39° 29′ N, 9° 01′ W; 100 m altitude). The climate is of the Mediterranean type with Atlantic influence with a mean annual temperature of 12°C and 15°C, and annual precipitation of 700 mm and 890 mm at site 1 and site 2, respectively. Soils are classified as leptosols at site 1 and cambisols at site 2 \[[@pone.0179268.ref006]\]. The tree characteristics are summarised in [Table 1](#pone.0179268.t001){ref-type="table"}. 10.1371/journal.pone.0179268.t001 ###### Characteristics of the sampled *Quercus faginea*. ![](pone.0179268.t001){#pone.0179268.t001g} Site 1 Site 2 ---------------------------------------------------- ---------------- --------------- Tree height (m) 10.5 ± 0.7^a^ 14.8 ± 2.3^b^ Diameter (cm)[\*](#t001fn001){ref-type="table-fn"} 20.9 ± 4.2^a^ 26.7 ± 5.9^b^ Tree age[\*](#t001fn001){ref-type="table-fn"} 40 ± 8^a^ 125 ± 11^b^ Sapwood width (mm) 37.9 ± 15.5^a^ 23.1± 5.8^b^ Heartwood (% total area) 37.1 ± 15.9^a^ 73.1 ± 4.6^b^ \*Diameter (Including bark) measured at 1.3m of tree height and age based in ring counts at the stem base. Mean of ten trees and standard deviation. Means with the same letter in one line are not significantly different.
pubmed_central
angular guard-service inject service I need to inject a service in a guard. This guard checks if the user was invited, when yes, he can access the route. To check this condition, I need to call a service which fetches this information from the db. I have a cyclical dependency error, I understand that we shouldn't inject services in Guards, but in this case, I need to do it: providers: [AuthService, HackService, HacksStorageService, AuthGuard, EmailGuard], And the guard: import { ActivatedRouteSnapshot, RouterStateSnapshot, CanActivate } from "../../../node_modules/@angular/router"; import { HacksStorageService } from "../shared/hacks-storage.service"; export class EmailGuard implements CanActivate { constructor( private hacksStorageService: HacksStorageService, ) {} canActivate(route: ActivatedRouteSnapshot, state: RouterStateSnapshot) { this.hacksStorageService.fetchHack(); // check if user was invited. should be in the participants array return true; } } I am pretty confused. Usually I used guards to see if user is logged in or not, so I usually imported stuff from firebase, not from my own services, so not cyclical dependencies. Now I want to check if a condition happens, based on my own data. How can I inject my own data in the EmailGuard, if I am not allowed to inject services because of the cyclical dependency? Thanks. A: You can inject services in guards. If your service returns synchronously, then you can just return immediately, like in your sample code. Otherwise, I did it like this (using firebase auth) import { Injectable } from '@angular/core'; import { CanActivate, ActivatedRouteSnapshot, RouterStateSnapshot, Router } from '@angular/router'; import { Observable, of } from 'rxjs'; import { map, first } from 'rxjs/operators'; import { AngularFireAuth } from '@angular/fire/auth'; import { Paths } from './paths'; @Injectable({ providedIn: 'root' }) export class SignInGuard implements CanActivate {
stackexchange
The present invention relates, generally, to automotive powertrain systems and, more specifically, to a wheel-end disconnect assembly for powertrain systems. 2. Description of the Related Art Conventional automotive vehicles known in the art include a powertrain system in rotational communication with one or more drivelines. Typically, the vehicle includes a pair of drivelines, each defined by a respective pair of opposing wheels. The powertrain system includes a propulsion system adapted to generate and selectively translate rotational torque to one or more of the wheels so as to drive the vehicle. To that end, in conventional automotive powertrain systems, the propulsion system is typically realized as an internal combustion engine in rotational communication with a transmission. The engine generates rotational torque which is selectively translated to the transmission which, in turn, translates rotational torque to one or more of the drivelines. The transmission multiplies the rotational speed and torque generated by the engine through a series of predetermined gear sets, whereby changing between gear sets enables the vehicle to travel at different vehicle speeds for a given engine speed. In so-called “four-wheel-drive” or “all-wheel-drive” powertrain systems, both drivelines are used to drive the vehicle. To that end, all wheel drive powertrain systems typically include a transfer case disposed in rotational communication with the transmission and adapted to split rotational torque between the drivelines. The transfer case may be spaced from the transmission, or may be integrated with the transmission. Where the transfer case is spaced from the transmission, a driveshaft is used to translate rotational torque from the transmission to the transfer case. Driveshafts are also typically used to connect the transfer case to each respective driveline. Conventional drivelines are commonly realized by a differential assembly adapted to receive rotational torque from the transfer case and subsequently split rotational torque between opposing wheels. To that end, each driveline also typically includes a pair of continuously-variable joints disposed in torque translating relationship with the differential and each respective opposing wheel. Depending on the specific configuration of the powertrain system, the percentage of torque split between the drivelines may vary. Moreover, depending on the vehicle application, the transfer case and/or driveline(s) may be configured to interrupt rotational torque to one of the drivelines under certain operating conditions. Specifically, the powertrain system may be configured such that the vehicle can be selectively operated in “two-wheel-drive” or
uspto_backgrounds
Evelin Novak (born 1985 in Čakovec) is a Croatian soprano. Novak was born in Croatia. At the age of 12 she started her singing education, four years later she won two first prizes at international competitions in Croatia. At the age of 17 she became the youngest student at the Music Academy in Graz, Austria. Afterwards she studied at the State University of Music and Performing Arts Stuttgart with Dunja Vejzović, where she received her diploma in spring 2008. Biography From April 2009 until June 2011, Novak was holding a scholarship of the Liz Mohn Kultur- und Musikstiftung at the International Operastudio of the Staatsoper Unter den Linden in Berlin. In the 2009/10 season she sang on the opera stage Servant in Simon Boccanegra, Berta in Il Barbiere di Siviglia and Kate Pinkerton in Madama Butterfly. The season 2010/11 included additionally 1. Dame/Die Zauberflöte, Tebaldo/Don Carlo, Arminda/La finta giardiniera and Die Vertraute/Elektra. She gave her debut as Berta/Il Barbiere di Siviglia at the Bayerische Staatsoper München in March 2010. In the summer of 2011 Novak gave her debut with Saffi in Der Zigeunerbaron (director: Brigitte Fassbaender) at the (recorded for TV and DVD). Since season 2011/12 she is a member of Staatsoper Berlin, where she made her debut as Eurydike/Orphée aux enfers in December 2011, followed in season 2012/13 by her first Pamina/Die Zauberflöte, as well as the new production of Frank Martin's Le vin herbé, followed in 2014 by Jenny/Mahagonny (new production). She also sang her first Violetta/La traviata there. In summer 2012 she made her debut as Micaëla/Carmen at the , Austria, also recorded for DVD. The year after she sang her first Mimì/La bohéme there. Further guest appearances led her to Graz (Gasparone) and Barcelona Liceu (Micaëla/Carmen production Calixto Bieito). Nov
wikipedia_en
- None of the groups $G_{2}(5^n)$ are a $(2,4,5)$-group for any $n$. Neither are the groups $SL_{3}(5^n)$ or $SU_{3}(5^n)$. 1. Each subgroup $\textup{Sym}_{5}$ in part (ii) here contains a subgroup $\textup{Alt}_{5}$ arising from [@Liebeck2011 Theorem 1(ii)]. 2. Keeping track of details in the proof in [@Liebeck2011] shows that $G_{2}(K)$ has a unique class of subgroups $\textup{Alt}_{5}$. These subgroups have centraliser $\textup{Sym}_{3}$, and by Lang’s theorem these split into three classes in $G_{2}(5^r)$, with centraliser orders $6$, $3$ and $2$. Similarly, if $S$ and $S'$ are representatives of the two subgroup classes in part (ii) here, then $C_{G}(S) \cong \textup{Sym}_{3}$, while $C_{G}(S')$ is cyclic of order $2$. It follows that the class of $S$ (resp. $S'$) splits into $3$ (resp. $2$) classes of subgroups in $G_{2}(5^r)$, with centralisers of order $6$, $3$, $2$ (resp. $2$ and $2$). 3. A conjecture of Marion [@Marion2010] states that, for a simple algebraic group $G$ in characteristic $p$, if $\delta_{i}$ denotes the dimension of the variety of elements of $G$ of order $i$ and if $\delta_{a} + \delta_{b} + \delta_{c} = 2\, \textup{dim}(G)$, then at most finitely many of the finite groups $G(p^{r})$ are $(a,b,c)$-groups. For $G$ of type $G_{2}$, this criterion holds precisely when $(a,b,c) = (2,4,5)$ or $(2,5,5)$. Hence part (iii), together with [@Liebeck2011 Theorem 1(iii)], verifies the conjecture for $G = G_{2}$ in characteristic $5$. A non-constructive proof of this fact is given in [@Jambor2017 Proposition 3.7(i)], where it is
arxiv
#include <climits> #include <vector> #include "third_party/googletest/src/googletest/include/gtest/gtest.h" #include "test/codec_factory.h" #include "test/encode_test_driver.h" #include "test/i420_video_source.h" #include "test/util.h" namespace { class ActiveMapTest : public ::libaom_test::CodecTestWith2Params<libaom_test::TestMode, int>, public ::libaom_test::EncoderTest { protected: static const int kWidth = 208; static const int kHeight = 144; ActiveMapTest() : EncoderTest(GET_PARAM(0)) {} virtual ~ActiveMapTest() {} virtual void SetUp() { InitializeConfig(); SetMode(GET_PARAM(1)); cpu_used_ = GET_PARAM(2); } virtual void PreEncodeFrameHook(::libaom_test::VideoSource *video, ::libaom_test::Encoder *encoder) { if (video->frame() == 0) { encoder->Control(AOME_SET_CPUUSED, cpu_used_); } else if (video->frame() == 3) { aom_active_map_t map = aom_active_map_t(); /* clang-format off */ uint8_t active_map[9 * 13] = { 1, 1, 1, 1, 0, 0, 0, 0, 1, 1, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 1, 1, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 1, 1, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 1, 1, 0, 0, 0, 0, 0, 0, 0, 1, 1, 0, 0, 0, 1, 0, 1, 1, 0, 0, 0, 0, 1,
github
TB, yeah, I guess some may say that is misleading, I don't. Arians offense was better than Haley's in the post-season. 8 games with Arians they still, discounting the 4 TD returns, scored 22 TDs and only 12 FGs. 7 games with Haley and those numbers were 15 TDs and 18 FGs, before that offensive explosion against Jax, those numbers were 9 TDs and 18 FGs in 6 games. The Jets game, yeah, we had a TD return by the defense to make it 24-0, but the real point is that we were already up 17-0, we got out to a big lead which is what you want your offense to do and it made the other team press, forced to try and play catch up. Never mind that the great Dick LeBeau defense would surrender 19 points in pretty much the last 15 minutes of the game to make it close. Arians offenses were able to get out to those leads, 10-0 against Arizona in the Super Bowl, 17-0 against the JETS, the SD game was even at 7-7 but then the offense got that big lead scored 3 TDs in short order and we were up 28-10, against Baltimore we got up 13-0. Contrast that with Haley's offenses. Wow, there we were up 3-0 against Baltimore! And against Cincy we were up 3-0, then it was up 6-0, then 9-0, impressive!!! Against Denver our biggest lead was when we went up on them by 4 points 10-6 and then later 13-9, we would lose 23-16. Miami, now that was a game in which Haley's offense played like Arians units, we quickly got up on them by 14 points, 14-0, and not by coincidence we won the game 30-12. KC the FG game, less said about that the better. NE game? No lead. Jax game? No lead. Sorry, but I still contend that Arians offenses were better in the post season. We were even more balanced and were able to run for TDs, having 12 rushing TDs compared to Haley's offenses only accounting for 5 rushing TDs. I am glad that Haley is gone and hopefully Fitchner can be the OC to truly make this offense play to its potential. One thing that we have to get back to however
pile-cc
Let d = -25.168 + 0.168. Let z = d + 24. Let h = 0 + -1. Is h equal to z? True Let z be (-1 - -8)/((-1)/4). Let x be (-1)/2*(-16)/z. Let a = -110 + 134. Is x >= a? False Let t = 801/85 - 48/5. Let c be ((-2)/510)/((-20)/(-1750)). Let r = c - t. Are r and -1/2 equal? False Let r = -24.11 + 20.11. Let z = 9 - 3. Is z greater than or equal to r? True Let y(z) = z**2 + 3*z - 4. Let m be y(-3). Let i be -2*((-6)/(-3))/m. Let r be (-2)/5 + 66/55. Which is bigger: r or i? i Let f be (8*(-7)/42)/((-2)/(-33)). Suppose -3*m = -4*m - 18. Let s = f - m. Which is smaller: -2 or s? s Let i = 41 + -41. Which is bigger: 3 or i? 3 Let g(v) = -5*v - 48. Let f be g(-11). Let a(p) = -p**3 + 5*p**2 - 3*p + 1. Let q be a(4). Are f and q equal? False Suppose 0 = 2*h + 5*c - 4, h + 2 = 5*c - 11. Let o be ((-3)/(-5))/(h/(-45)). Let w = o + -6. Which is bigger: w or 0? w Let q be (-100)/20 - (756/(-50))/3. Let u be 2 + (-4)/(-2)*1. Let p = -4 + u. Which is greater: p or q? q Suppose 546 = -8*f + 5*f. Let i be 4/90*13/f. Let b = i + -607/7245. Is 1 != b? True Let a = -305/693 - -40/77. Is a less than 0? False Let h = 167 + -333/2. Which is bigger:
dm_mathematics
We request all users of TAGG/ERMS to log-off by 8 p.m. (CST) on Friday, September 14. If for some reason, you're unable to log-off by 8 p.m. on Friday, September 14, please contact Francis Lim immediately at pager # (713) 285-7190. We also request all of our users, both domestic and international, to please test your regular TAGG/ERMS
enron_emails
v. No. 96-4011 JULIANNE MALVEAUX, Defendant-Appellant. Appeal from the United States District Court for the Eastern District of Virginia, at Alexandria. Leonie M. Brinkema, District Judge. (CR-95-360) Submitted: December 26, 1996 Decided: January 29, 1997 Before NIEMEYER and WILLIAMS, Circuit Judges, and BUTZNER, Senior Circuit Judge. _________________________________________________________________ Affirmed by unpublished per curiam opinion. _________________________________________________________________ COUNSEL Leonard E. Birdsong, Stephanie Cobb Williams, Despina Tahmin, CHAVERS & BIRDSONG, CHARTERED, Washington, D.C., for Appellant. Helen F. Fahey, United States Attorney, LeDora Knight, Assistant United States Attorney, Alexandria, Virginia, for Appellee. _________________________________________________________________ Unpublished opinions are not binding precedent in this circuit. See Local Rule 36(c). _________________________________________________________________ OPINION PER CURIAM: Julianne Malveaux appeals from the judgment order of the district court finding her guilty of assaulting an airline attendant during a flight, in violation of 49 U.S.C. § 46506 (1994) and 18 U.S.C. § 113(a)(4) (1994). Initially, Malveaux contends that the district court erred by denying her motion for acquittal because the evidence was insufficient to support her conviction. Because Malveaux made this motion at the close of the Government's case, but did not renew it at the close of her case, we need only consider whether Malveaux's con- viction resulted in a manifest miscarriage of justice. See United States v. Vaquero, 997 F.2d 78, 82 (5th Cir. 1993). The evidence in this case, however, firmly supported the district court's finding of guilt. The pertinent statute proscribes assault by striking, beating, or wounding. The statute has been construed by courts to be akin to a common law simple battery, requiring physical contact. See United States v. Guilbert, 692 F.2d 1340, 1344 (11th Cir. 1982);
freelaw
Let them know that because you are a freelancer, you have other contracts too, so that will be a factor in determining how much time it will take to deliver for them. It's reasonable to say that not having any of the project fee will mean you need to have more parallel projects to pay the bills, and you might see if you can get some amount for work delivered so you can scale off other contracts and dedicate more time to them. ------ johnjlocke The advice so far is very sound; I will add this as well. In the future, work with a contract, and never work without one again. This first thing to do in future projects is define the scope and make sure that both you and the client are in agreeance on what will be delivered and when for how much. For this project, the blame is entirely on yourself. That is not meant to be harsh. No contract, you were not clear on what you were doing but took the job and did not set expectations correctly. This is a learning experience - communicate where you are with the project to the client on a regular basis from now on. ------ fsk Another way to look at it is the time spent already is a sunk cost. Figure out how much time it will take you to finish, and your effective hourly rate to get the remaining $10k. If it's a reasonable hourly rate, go ahead and finish. Otherwise, walk away. Also, that's why it's better to work hourly rather than fixed-price. That way you avoid arguments when the client increases the scope. You don't need to always have an airtight contract. What I do is make a limit on how much I'm willing to risk, and once that limit is reached I stop working until I get paid. ------ wikwocket Do you want to walk away from it, or try to complete it? Your post doesn't seem to say, so I'm not sure, but it does sound like a bad situation where it may be in everyone's best interests to move on. Don't obsess about the time you spent on it. It is a sunk cost; try not to let it bias you against the best course moving forward. Instead you might consider: 1) How much deposit did they make? Can you
hackernews
DESCRIPTION: CNS Transporters have crucial roles on neurophysiology and etiology. Inhibition of these critical transporters can have therapeutic benefits or cause serious side effects in the CNS. Development of an assay platform and a comprehensive profile of drugs' inhibitory effects on important CNS transporters can have enormous impact on drug discovery and development, such as elucidating drugs' potential side effects in the CNS, and advancing development of new drugs to treat various CNS diseases, such as Alzheimer's disease, Parkinson's diseases, epilepsy etc.,
nih_exporter
Various factors have been reported to be associated with the duration of regulatory review of new drug applications (NDAs). We investigated potential links between the review times in Japan and the attributes of NDAs, the regulatory agency and pharmaceutical companies. We analysed new drugs approved in 2000-2009 in Japan using a proprietary database collected through annual surveys to pharmaceutical companies. Regression models in which individual firms were treated as either a fixed effect or a random effect were applied to examine factors associated with the overall review time and the
pubmed_abstracts
Analysis of protein expression and phosphorylation by Western blot {#s4_3} ------------------------------------------------------------------ Small pieces (\~2 mg of dry weight) were quickly frozen, pulverized in liquid nitrogen, extracted in lysis buffer (for composition see *Solutions and drugs*) and then sonicated for 5 s. Lysates were centrifuged at 10000 g for 15 min at 4°C to remove nuclei and intact cells and the protein concentration was measured. Protein extracts (30 μg) were heat-denatured at 95°C for 5 min with DTT, electrophoresed on 7.5% and 15% polyacrylamide-SDS gels and then transferred to nitrocellulose membranes. Membranes were blocked for 1 h at room temperature using 10% bovine serum albumin (BSA) and incubated overnight at 4°C with affinity-purified polyclonal antibodies against mTOR, phospho-mTOR (Ser2448), phospho-4E-BP1, phospho-p70 S6 kinase (Ser371 and Thr389) (Cat\#9862, Cell Signaling, Boston, MA, USA) and FKBP12 (\#PA1-026A, Thermo Scientific, MA, USA). A mouse anti-actin antibody (A2066, Sigma-Aldrich) was used to control for protein loading and to normalize expression of proteins of interest. After washing, the membranes were incubated for 1 h at room temperature with anti-mouse (1:10000; Amersham Biosciences, Bucks, UK) or anti-rabbit (1:7000; Santa Cruz Biotechnology) IgG-horseradish peroxidase conjugated secondary antibodies. Bands were visualized using the supersignal west pico chemiluminescent substrate (Pierce, Rockford, IL, USA), quantified using the software gel-pro analyzer (4.0, Media Cybernetics, Bethesda, MD, USA) and normalized to α-tubulin content. For comparison purposes between young and aged samples, all the α-tubulin-corrected values were normalized to the average of young samples of the same assay. In mTOR phosphorylation assay, two similar gels were run and one membrane was incubated with the antibody against the total protein and the other with an antiphospho-protein of interest. Solutions and drugs {#s4_4} ------------------- Na^+^-HEPES solution (in mM): 10 HEPES, 140 NaCl, 4.7 KCl, 2 CaCl~2~, 2 MgCl~2~ and 10
pubmed_central
I'm answering my own question as I found what the issue was. It wasn't even an OpenSSL problem. First, see this GitHub issue: SSL_write() returns SSL_ERROR_SYSCALL when size is 0 My code looks like this, SSL_write(ssl, foo(), var); foo creates a payload and returns a const char * and var is the length of that data. The thing is, they are actually member function and member variable of a C++ class and var is set by foo. According to C++ standard, evaluation order of function arguments are not specified. From 5.2.2, The order of evaluation of arguments is unspecified. All side effects of argument expression evaluations take effect before the function is entered. So, it is possible for the third parameter(var) to be evaluated before the second parameter(foo()). Indeed, it is what was happening according to the assembly output of the program. Below is an example. class myclass { public: int l; const char *foo(){ l = 10; return "mystring"; } }; int main() { SSL *ssl; myclass instance; SSL_write(ssl, instance.foo(), instance.l); } and the assembly, _ZN7myclass3fooEv: .LFB1778: .cfi_startproc pushq %rbp .cfi_def_cfa_offset 16 .cfi_offset 6, -16 movq %rsp, %rbp .cfi_def_cfa_register 6 movq %rdi, -8(%rbp) movq -8(%rbp), %rax movl $10, (%rax) leaq .LC0(%rip), %rax popq %rbp .cfi_def_cfa 7, 8 ret .cfi_endproc .LFE1778: .size _ZN7myclass3fooEv, .-_ZN7myclass3fooEv .text .globl main .type main, @function
stackexchange
In such multi-layered media, the distance between layers is set such that light reflected by a record layer different from the record layer being accessed does not interfere with the light reflected from the record layer being accessed. At a point far away from the focus point, light reflected from the medium disperses without being condensed by a lens, resulting in a level that is ignorable as signal magnitude. Optical limitations are imposed, however, such that all the multi-layers need to be disposed within a focus tolerable range (focus depth) that allows various satisfactory characteristics to be obtained. Because of this, the inter-layer distance cannot be widened as much as desired. As a result, interference with the light reflected from other layers occurs to no small extent. An example of a multi-layered structure that has been put to practical use includes a two-layered version of DVD-ROM. This structure has two layers stamped at the factory and designed for Read-Only, so that a large margin is provided against various fluctuation. For the tracking purpose, the DPD (differential phase detection) method that uses a phase difference derived from the edges of a reproduced signal is employed, which provides a strong tolerance against changes in the light intensity (signal magnitude) caused by the interference with light reflected from other layers. Because of the Read-Only configuration, there is no need to detect a track and/or a wobble resulting from the wobbling of the track (groove). Trouble due to the interference with light reflected from other layers is thus rare. A medium having a plurality of recordable layers is disclosed in Patent Document 1, 2, and so on, for example. These inventions improve the feasibility of multi-layered recording by specifying the record film characteristics such as record film thickness and record film material of the media designed for multi-layered recording. Further, Patent Document 3 discloses providing a wobble on each layer of a multi-layered record medium and inserting address information into the wobble. As the feasibility of multi-layered recording increases based on basic research, essential technologies have been identified and invented. Needless to say, various types of servo signals and wobble signals are inevitably necessary in multi-layered media. It is important to manage the characteristics of these signals or define such characteristics as standards in order to improve compatibility and maintain stable quality. [Patent Document 1] Japanese Patent Application Publication No. 2000-235733 [Patent Document 2] Japanese Patent Application
uspto_backgrounds
The stories assembled in the 1697 edition were "The Sleeping Beauty", "Little Red Riding Hood", "Bluebeard", "The Master Cat, or Puss in Boots", "Diamonds and Toads" (Les Fées), "Cinderella", "Riquet with the Tuft", and "Hop o' My Thumb". Each story ended with a rhymed, well-defined and cynical moral (moralité). The author of the volume was given as "P. Darmancour", hinting at Perrault's 19-year-old son Pierre, who was long time believed to have written the stories. However Zipes claims modern scholarship shows little evidence the son wrote the stories, nor that the volume was the result of a collaboration between father and son. Almost certainly Perrault the elder was the author. It is possible that the son's name, and the dedication to the king's niece Élisabeth Charlotte d'Orléans, was meant as a means to introduce the son to society. The book contains an introductory letter to "Mademoiselle", saying "No one will think it strange that a child should have found pleasure in composing the Tales in this volume, but some will be surprised that he should have presumed to dedicate them to you." The volume achieved considerable success with eight reprints in Perrault's lifetime. With Louis XIV's death at the beginning of the 18th century the lifestyle of the précieuse faded, as did the popularity of the literary salons and the fairy tales at the beginning of the Age of Enlightenment. Perrault's tales, however, continued to be sought after with four editions published in that century. Origins and style Scholars are divided about the origins of the tales; some theorize that they were original whereas others say Perrault took from earlier versions. Children's literature scholar Ruth Bottigheimer discounts as myth the story that Perrault recounted stories he heard from a household nurse. The contemporary view was that the stories originated in popular tradition, but Carpenter points out that none of the stories existed in contemporary chapbooks leading him to think Perrault took and modified them from earlier (probably literary) versions. Although some of Perrault's tales had folkloric origins, he modified them with elaborate detail written in intentionally brilliant language for an audience of sophisticated adults who expected embellishment. Some stories such as "
wikipedia_en
The support of the Namibian authorities and of the University of Namibia in facilitating the construction and operation of [H.E.S.S.]{} is gratefully acknowledged, as is the support by the German Ministry for Education and Research (BMBF), the Max Planck Society, the French Ministry for Research, the CNRS-IN2P3 and the Astroparticle Interdisciplinary Programme of the CNRS, the U.K. Particle Physics and Astronomy Research Council (PPARC), the IPNP of the Charles University, the South African Department of Science and Technology and National Research Foundation, and by the University of Namibia. We appreciate the excellent work of the technical support staff in Berlin, Durham, Hamburg, Heidelberg, Palaiseau, Paris, Saclay, and in Namibia in the construction and operation of the equipment. The authors acknowledge the support of the ROTSE-III collaboration. Special thanks also to R. Quimby from the University of Texas for providing tools for data-reduction. [36]{} natexlab\#1[\#1]{} , F. A. 2000, New Astronomy, 5, 377 Aharonian, F. A. [et al.]{} (HEGRA Collaboration) 2002, å, 393, 89 Aharonian, F. A. [et al.]{} (HEGRA Collaboration) 2003, å, 403, L1 Aharonian, F. A. [et al.]{} [([H.E.S.S.]{} Collaboration) ]{}2004, Astroparticle Physics, 22, 109 Aharonian, F. A. [et al.]{} [([H.E.S.S.]{} Collaboration) ]{}2005, , 430, 865 Aharonian, F. A. [et al.]{} [([H.E.S.S.]{} Collaboration) ]{}2005, , 442, 177 , F. A. [et al.]{} [([H.E.S.S.]{} Collaboration) ]{}2005, , 442, 895 Aharonian, F. A. [et al.]{} [([H.E.S.S.]{} Collaboration) ]{}2005, [in preparation]{} Aharonian, F. A. [et al.]{} [
arxiv
/* * Copyright 1999-2019 Alibaba Group Holding Ltd. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.alibaba.chaosblade.exec.plugin.jvm.script.groovy; import java.io.IOException; import java.io.PrintWriter; import java.io.StringWriter; import java.math.BigDecimal; import java.util.ArrayList; import java.util.HashMap; import java.util.List; import java.util.Map; import com.alibaba.chaosblade.exec.plugin.jvm.script.base.CompiledScript; import com.alibaba.chaosblade.exec.plugin.jvm.script.base.ExecutableScript; import com.alibaba.chaosblade.exec.plugin.jvm.script.base.ScriptEngine; import com.alibaba.chaosblade.exec.plugin.jvm.script.base.ScriptException; import groovy.lang.Binding; import groovy.lang.GroovyClassLoader; import groovy.lang.GroovyCodeSource; import groovy.lang.Script; import org.codehaus.groovy.ast.ClassCodeExpressionTransformer; import org.codehaus.groovy.ast.ClassNode; import org.codehaus.groovy.ast.expr.ConstantExpression; import org.codehaus.groovy.ast.expr.Expression; import org.codehaus.groovy.classgen.GeneratorContext; import org.codehaus.groovy.control.CompilationFailedException; import org.codehaus.groovy.control.CompilePhase; import org.codehaus.gro
github
Your Career Game demonstrates how game theory can help readers to understand and proactively take charge of their career strategy. Authors Nathan Bennett and Stephen A. Miles teach readers to manage the interdependencies and interconnectedness among coworkers, managers, and others in a manner that supports personal career efforts. Then, they show how readers can become better players. The key to learning how to play the career game is "career agility"—in short, nimble individuals are better game players. Thois book includes conversations with a wide range of successful professionals such as Ursula Burns (Xerox), Stephen Elop (Microsoft), Marius Kloppers (BHP Billiton), Ken Frazier (Merck), and Liz McCartney (The St. Bernard Project), and discusses how their career moves demonstrate elements of a game theory approach to career management. This is a must-read strategic guide for anyone who seeks to advance their career and navigate today's job market. About the author Nathan Bennett is the Catherine W. and Edwin A. Wahlen Professor of Management at Georgia Tech's College of Management. He is active as a consultant through his firm, Red Buoy Consulting, LLC. Stephen A. Miles is the Vice Chairman, Leadership Advisory within Heidrick & Struggles' Leadership Consulting Practice. He is also a key member of Heidrick & Struggles' CEO and Board Practice, and is a member of the firm's management committee. "Bennett and Miles present a novel, interesting discussion about how one can achieve higher levels of career success by employing the key concepts of game theory . . . Recommended." —D. C. Martin, CHOICE "Amidst a crowded field of career guides, Bennett and Miles offer a fresh and innovative perspective on how individuals achieve career success, based solidly upon economic research. Your Career Game is written in an accessible and engaging manner and offers readers intelligent career strategies to help them compete successfully in today's dynamic career marketplace." —Monique Valcour, Professor of Management, EDHEC Business School "The game is on—study these lessons and win at your career!" —Marshall Goldsmith, best-selling author of What Got You Here Won't Get You There, Succession: Are You Ready? and the upcoming MOJO "This pragmatic approach to understanding your career is evergreen—no matter the economic conditions there will always be tough competition
pile-cc
What is prob of sequence fl when two letters picked without replacement from {f: 5, l: 3}? 15/56 Calculate prob of sequence kikc when four letters picked without replacement from vikvkkgcii. 1/280 What is prob of sequence piu when three letters picked without replacement from {i: 1, v: 1, p: 2, q: 1, k: 1, u: 1}? 1/105 Calculate prob of sequence ukk when three letters picked without replacement from ccccukkkkicic. 1/143 Calculate prob of sequence uxl when three letters picked without replacement from {l: 1, p: 1, u: 6, x: 4, r: 3}. 4/455 Four letters picked without replacement from {e: 1, j: 11, i: 8}. What is prob of sequence jjjj? 22/323 What is prob of sequence nnd when three letters picked without replacement from {d: 7, n: 2, w: 3, m: 7}? 7/2907 Two letters picked without replacement from {s: 1, x: 7}. What is prob of sequence xx? 3/4 What is prob of sequence ph when two letters picked without replacement from {v: 2, h: 4, p: 1, l: 4}? 2/55 Three letters picked without replacement from {v: 1, k: 1, r: 1, n: 1, f: 1}. What is prob of sequence kvr? 1/60 Four letters picked without replacement from xyvxayyzyvxazyvxyyxv. Give prob of sequence zaav. 2/14535 What is prob of sequence uw when two letters picked without replacement from uwwussuscsuwcugs? 1/16 Two letters picked without replacement from pypy. What is prob of sequence yp? 1/3 Four letters picked without replacement from {w: 1, j: 2, n: 2, u: 1}. Give prob of sequence wnju. 1/90 Calculate prob of sequence nz when two letters picked without replacement from lcnlnlnlnnlllzncnls. 7/342 Three letters picked without replacement from {z: 2, y: 9, l: 4, i: 4}. What is prob of sequence l
dm_mathematics
IN THE NEWS CEO says Texas in good shape for electricity deregulation DALLAS (AP) - Enron Corp.'s chief executive and president said Tuesday he believes that Texas energy markets are in good shape as the state prepares for deregulation. Jeffrey Skilling told an audience of about 400 business people at a downtown hotel that California "has given the term deregulation a terrible name." Electric deregulation in Texas officially
enron_emails
Appellee remarried in June of 1978. On April 2, 1979, appellant received a letter from counsel for appellee seeking appellant's consent to adoption of R.W.G. by appellee's new *313 spouse. Appellant did not respond to the letter, nor did he take any other action manifesting an interest in the child. On October 12, 1979, more than six months after appellant received the letter requesting his consent to adoption, appellee and her spouse commenced the present proceedings by filing a petition for involuntary termination of appellant's parental rights. A hearing on the petition was held in January of 1980. Appellant, represented by counsel, claimed that since his last contact with R.W.G. in August of 1977 he had made frequent trips to Tidioute to visit R.W.G. Appellant maintained that he was unable to locate the child because appellee had "secreted" herself and R.W.G. Appellant, however, failed to show either that his trips to Tidioute continued after receipt of the letter seeking his consent to adoption or that despite the letter appellee had continued to "secret" herself and R.W.G.[2] The orphans' court determined that "[appellee] did not attempt to seclude herself and the child or conceal her identity or whereabouts from [appellant]." Relying primarily upon appellant's failure to respond to the letter seeking appellant's consent to adoption, the court concluded that termination of appellant's parental rights was justified under section 311(1). Well-established is our scope of review: "The findings of the orphans' court, supported by competent evidence, `must be sustained unless the court abused its discretion or committed an error of law.' In re William L., 477 Pa. 322, 340, 383 A.2d 1228, 1237, cert. denied, 439 U.S. 880, 99 S.Ct. 216 [58 L.Ed.2d 192] (1978); accord, e.g., Wertman Estate, 462 Pa. 195, 340 A.2d 429 (1975); Estate of Lanning, 414 Pa. 313, 200 A.2d 392 (1964). We must accept as true all evidence in the record supporting the findings of the court and reasonable inferences therefrom. E.g., In re William L., 477 Pa. at 340 n.12, 383 A.2d at 1237 n.12; see Kay v. Kay, 460 Pa. 680, 334 A.
freelaw
~~~ tehlike Labor is definitely not the main driver. Often quoted construction price is about 300$/sqft around where i live. If you were to build new, you would spend 750k-850k. Now, you cant buy land for less than 1.8 in mountain view that can hold 2500sqft home. And sale price would be close to 3m anyways. ~~~ maccard Maybe one of the issues is the expected sizes of homes in the US - 2500 sq ft is about 250 sq m - which is pretty darn big. The average home in the uk is about 85 sq m... ~~~ jdavis703 No, this doesn't have to do with construction costs (which are about linear with square footage), it's other factors. For example, even if someone wanted to build a tiny home (i.e. less than 500 square feet), it's illegal in many places because of minimum square footage requirements. The problem comes from bad land use planning, not because "dumb" Americans don't understand a larger house costs more money. ~~~ tehlike True that. There's the other side of the coin though. South bay (excepting San Jose) is what you'd call suburbs. People who choose to live low density areas. Part of it is because of the employers. I, for one, do not like a lot of people around me, and I grew up in a city of > 15M. I like the low density. I think it goes both ways. companies in the bay area choose to headquarter in low density areas (so they can grow). ------ taprun No, the #1 reason it's so hard to find an affordable home is that potential buyers can get huge loans at very low rates. Since buyers compete with each other, prices go up. I guarantee that if interest rates were allowed to creep up, and the government stopped guaranteeing loans made by the banks, we'd have cheaper homes almost immediately. ~~~ sytelus Not really... these days 20% downpayments are the norm. I know several people holding off purchases because they simply don't have downpayment. Higher home prices reduces number of potential customers but right now we have so many of them that reduction doesn't matter and margines
hackernews
[unreadable] [unreadable] This application seeks partial funding for the Gordon Research Conference (GRC) on Cardiac Regulatory Mechanisms to be held at Colby Sawyer College (Colby-Sawyer, NH) on July 16-21, 2006. This GRC has a long history of providing a format for discussion of cutting edge science by talented and productive scientists from different disciplines, all with a common interest in the topic of regulation of the normal and diseased heart. A key objective
nih_exporter
Nitrite reduction and detection at a carbon paste electrode containing hemoglobin and colloidal gold. A novel renewable reagentless nitrite biosensor based on the direct electron transfer of hemoglobin (Hb) and a new sensing mechanism was proposed by combining the advantageous features of colloidal gold nanoparticle and carbon paste technology. The direct electrochemistry of immobilized Hb displayed a pair of redox peaks with a formal potential of -42 mV (vs. NHE) in 0.2 mol dm(-3) NaAc
pubmed_abstracts
###### Logistic regression analysis of the influential factors on levels of blood glucose. ![](cm9-133-786-g004) Kaplan-Meier survival analysis for the association of PFS and OS with DM and elevated levels of blood glucose in lung cancer patients ------------------------------------------------------------------------------------------------------------------------------------- Kaplan-Meier survival analysis showed that lung cancer patients with DM had increased PFS and OS compared with those without DM (log-rank, *P* \< 0.05, *P* \< 0.01); the median PFS in lung cancer patients with DM was 12.0 months (95% confidence interval \[CI\], 4.0--16.0) *vs.* 6.0 months in those without DM (95% CI, 5.8--6.3); and the median OS in lung cancer patients with DM was 37.0 months (95% CI, 29.0--46.6) *vs.* 12.0 months in those without DM (95% CI, 10.9--13.1). For the other two groups of patients without DM, there was a trend toward a shorter PFS and OS in patients with elevated blood glucose compared with those without elevated blood glucose \[Figure [1](#F1){ref-type="fig"}\]. ![Kaplan-Meier analysis of PFS (A) and OS (B) in lung cancer patients with DM during the follow-up (in red), without DM but with elevated levels of blood glucose during the follow-up (in green), and without DM as well as without elevated blood glucose during the follow-up (in blue). DM: Diabetes mellitus; OS: Overall survival; PFS: Progression-free survival.](cm9-133-786-g005){#F1} Discussion ========== In the present study, we found a significant survival benefit for lung cancer patients with DM. Kaplan-Meier survival analysis showed that lung cancer patients with DM had increased PFS and OS compared with those without DM, and the median PFS was 12.0 months in lung cancer patients with DM *vs.* 6.0 months in those without DM; the median OS was 37.0 months in lung cancer patients with DM *vs.* 12.0 months in those without DM. Our results were in agreement with those of the previous HUNT and PEG study,^\[[@R13]\]^ but the HUNT and PEG study only demonstrated increased OS in patients with lung cancer with DM compared with those without DM
pubmed_central
Wgetrc: /Users/david/.wgetrc (user) /usr/local/etc/wgetrc (system) Compile: clang -DHAVE_CONFIG_H -DSYSTEM_WGETRC="/usr/local/etc/wgetrc" -DLOCALEDIR="/usr/local/Cellar/wget/1.19.1/share/locale" -I. -I../lib -I../lib -I/usr/local/opt/openssl/include -DNDEBUG Link: clang -DNDEBUG -liconv -L/usr/local/opt/openssl/lib -lssl -lcrypto -ldl -lz ftp-opie.o openssl.o http-ntlm.o ../lib/libgnu.a $ wget --content-disposition -c https://sourceforge.net/projects/freetype/files/freetype2/2.8/freetype-2.8.tar.bz2 --2017-07-25 10:55:27-- https://sourceforge.net/projects/freetype/files/freetype2/2.8/freetype-2.8.tar.bz2 Resolving sourceforge.net... 216.34.181.60 Connecting to sourceforge.net|216.34.181.60|:443... connected. HTTP request sent, awaiting response... HTTP/1.1 302 Found Server: nginx Date: Tue, 25 Jul 2017 08:55:28 GMT Content-Type: text/html; charset=UTF-8 Content-Length: 365 Connection: close Pragma: no-cache Cache-Control: no-cache X-UA-Compatible: IE=edge,chrome=1 X-Frame-Options: SAMEORIGIN Content-Security-Policy: upgrade-insecure-requests Set-Cookie: VISITOR=2b8474db-e3d7-4710-8a3d-974b86ef1b5a; expires="Fri, 23-Jul-2027 08:55:28 GMT"; httponly; Max-Age=315
stackexchange
The production of documents such as checks, bank drafts, traveler's checks, currency and the like has special problems associated therewith not normally associated with the production of ordinary printed matter. For example, such documents are prone to unlawful duplication or counterfeiting. Therefore, in order to eliminate or minimize such unlawful acts, the documents are printed using special paper, special inks, and in highly sophisticated and complex patterns. In addition, security requirements dictate that each of such documents be accounted for by the printing thereon in one or more areas data in the form of serialized numeric and/or alpha-numeric indicia. Such serialization enables the issuer of such documents to maintain a record as to what documents are in circulation. In the case of traveler's checks the issuer has a means of maintaining a record of the precise checks which have been issued to particular customers. Thus, checks that are lost or stolen are easily replaceable and counterfeit or unlawfully duplicated checks are easily identifiable. Also for various reasons, for example, aesthetics, guaranty of authenticity of origin and genuineness of the document, it is desirable that such documents meet certain quality standards. Thus, much effort is expended by the various agencies and businesses issuing such documents to assure the release of only those documents which meet predetermined quality criteria. Thus, governments issuing currency and businesses issuing documents such as traveler's checks expend great effort to prevent the issuance of flawed or imperfect documents. Presently known methods of accomplishing the aforegoing, for example, in currency or traveler's check production require that each document be visually inspected for flaws by a human inspector. In practice, the documents are printed in sheets of, for example 8.times.4 documents with each sheet containing 32 documents. Each document is printed with serialized indicia. If all the documents pass the visual inspection for quality, the sheets are cut into individual documents and stacked sequentially according to their serial number. On the other hand, when visual inspection uncovers one or more flawed documents, the documents are rejected. However, in order that consecutive serialization be maintained, the rejected documents must be replaced with documents previously printed save for the serial numbers. These documents then have the appropriate serial numbers printed thereon and manually placed in correct sequential order. As can be readily appreciated, the foregoing described procedure of inspection and replacement of rejected documents is time consuming, prone to human error, and costly. The present invention relates to an apparatus wherein the foregoing procedure of inspection and printing serial numbers is fully automated.
uspto_backgrounds
Damji was born in Uganda in 1966, and moved with her family to London in 1970. She has two children. Damji has borderline personality disorder. She is the daughter of property tycoon Amir Damji, who lived in South Africa and in London. Consequently, she is the niece of journalist Yasmin Alibhai-Brown (Amir's sister); Alibhai-Brown refers to her niece's childhood in her autobiography No Place Like Home. In the U.S. and South Africa During 1993–1995, Damji ran an art gallery in Manhattan and East Hampton. At that time, she rented an apartment for herself. She gave the landlord a cheque she had received for $20, which she had altered to $20,000; when the cheque bounced, the landlord obtained an eviction order and seized her belongings. Damji then forged the signature of the judge assigned to the case and amended the order so that she could get her belongings back. In October 1995, Damji was sentenced to six months in Rikers Island prison, in New York, for those crimes and other crimes related to her art gallery: five counts of grand larceny, possession of a forged instrument, and altering official records. She was also ordered to pay $72,000 to her major victims and given four years' probation. During the time Damji was on probation, she allegedly committed other crimes; when a warrant for her arrest was subsequently issued, she fled the U.S. Damji then went to South Africa; there, she committed further financial crimes, for which she was deported. In the U.K.: financial crimes Damji then returned to the United Kingdom. There, she founded, and became the publisher and editor of, the lifestyle magazine Another Generation (originally named Indobrit), which folded after nine issues. Dozens of writers, photographers, and other contributors to the magazine were either not paid for their work or given cheques that bounced. During this time, she also wrote articles for mainstream and ethnic media, including a regular column in the Birmingham Post, an article in New Statesman, and an article in The Observer. In October 2002, Damji stole a credit card from her nanny; she then ran up a bill on the card totaling £3,903. She was arrested for that, and then released on bail. While out on bail, she stole another credit card from her business assistant;
wikipedia_en
\ $^a$[*Department of Physics, University of California, Davis, CA 95616, USA*]{}\ $^b$[*Deutsches Elektronen-Synchrotron DESY, Theory Group, D-22603 Hamburg, Germany*]{}\ ABSTRACT The Higgs could couple to a topological 4-form sector which yields a complex vacuum structure. In general such couplings could lead to direct CP violation in the Higgs sector. In many of the Higgs vacua electroweak symmetry is unbroken. In just as many it breaks when the 4-form flux is large enough. For a fixed value of flux, the symmetry breaking vacua have a smaller vacuum energy than the symmetric ones, where the difference is quantized because it is set by the $4$-form flux. This leads to the possibility that there is a value of the 4-form flux for any UV contributions to the Higgs [*vev*]{} that automatically cancels it down to the right value, $\sim$ TeV, if the 4-form charges are quantized in the units of the electroweak scale. This would still leave the cosmological constant which could be selected anthropically. Introduction ============ Why is the Standard Model (SM) so light? In the standard formulation of the SM, the masses of all particles, including the Higgs, are set by the Higgs [*vev*]{} after the electroweak (EW) spontaneous symmetry breaking (SSB). However, if there are any additional heavy degrees of freedom in the universe, which could either play a role in the unification of forces or be dark matter, that have non-ignorable couplings to the Higgs, the Higgs [*vev*]{} would receive significant contributions from their vacuum fluctuations. If string theory is right, this seems inevitable, since all of light QFT should be understood as an EFT with many heavy states integrated out. Without an obvious cancellation mechanism as for example low scale SUSY, it is puzzling to see that such heavy states do not influence the observed low energy physics more significantly. The SM, therefore, appears to be special. Its specialty is tracked down to the special value of a single dimensional number, the Higgs [*vev*]{}. This evokes an obvious analogy to another very special dimensional parameter characterizing the universe, the cosmological constant. A possible way to understand its smallness is to imagine that it is a characteristic of a nontrivial structure of the manifold of vacua in the theory, rather than an unpredictable parameter in a simple vacuum
arxiv
import com.sleepycat.je.Durability; import com.sleepycat.je.EnvironmentConfig; public class BJEConfig { // public static final long DEFAULT_STORE_CACHE = 20*1024*1024; // 20MB public static final long DEFAULT_STORE_CACHE = 100 * 1024 * 1024; // 100MB // Alain // for // tests public static final int DEFAULT_NUMBER_OF_STORAGE_CACHES = 1; private EnvironmentConfig envConfig; private DatabaseConfig dbConfig; private void resetDefaults(boolean readOnly) { envConfig.setReadOnly(readOnly); dbConfig.setReadOnly(readOnly); envConfig.setAllowCreate(!readOnly); dbConfig.setAllowCreate(!readOnly); // envConfig.setCacheSize(DEFAULT_STORE_CACHE); envConfig.setCachePercent(30); envConfig.setConfigParam(EnvironmentConfig.LOG_FILE_MAX, Long.toString(10000000 * 10l)); envConfig.setConfigParam( EnvironmentConfig.CLEANER_LOOK_AHEAD_CACHE_SIZE, Long.toString(1024 * 1024)); envConfig.setConfigParam(EnvironmentConfig.CLEANER_READ_SIZE, Long.toString(1024 * 1024)); } public BJEConfig() { envConfig = new EnvironmentConfig(); dbConfig = new DatabaseConfig(); resetDefaults(false); } public EnvironmentConfig getEnvironmentConfig() { return envConfig; } public DatabaseConfig getDatabaseConfig() { return dbConfig; } public void configureTransactional() { envConfig.setTransactional(true); dbConfig.setTransactional(true); // envConfig.setLockDetectMode(LockDetectMode.RANDOM); Durability defaultDurability = new Durability( Durability.SyncPolicy.WRITE_NO_SYNC, Durability.SyncPolicy.NO_SYNC, // unused by non-HA applications.
github
Wordmarks/numerals: The font is derived from a font you have already seen from Close Encounters of the Third Kind (1977), Pepsi (late 1980s) and Star Trek: Deep Space Nine (1993-99). (That font definitely enhances the future-minded look I wanted to capture). I added some blocky serifs to it to give it a "Texas accent," and it may even remind you of the "HOUSTON" wordmark that the Astros once used on their road jerseys (1965-74). The wordmarks on the home and road jerseys swoop upwards--kind of like the Planet Hollywood logo or the logo the Seattle Sonics used in the 1990s--to match the upwards-shooting star and enhance that "onward and upward" spirit. The proof is in the piping: You knew that the "tip of the cap" to the "tequila sunrise" jerseys had to come in somewhere. I never considered using the 1975 "tequila sunrise" design as a base for my design; still, those orange-and-yellow stripes are a part of Astros' history and I wanted to incorporate them some way. So after much deliberation, I decided to give that tribute in the form of piping--namely, three-striped piping (similar to the blue-red-blue piping you see on the Atlanta Braves' jerseys) made from the Astros' new colors: Navy blue, bronze and gold. But wait, Mark, did you say "bronze and gold"? I didn't want to use orange and yellow; not when their metallic equivalents are available here in the 21st century. Bronze and gold go so well with navy blue and they shine like the stars (OK, maybe that last part sounded corny). Besides, metals are tough and yellow is a color you often find on bruises. The upwards-shooting star is also bronze and gold to add to that aforementioned "tequila sunrise" tribute. So there you have it. I'd love to see these unis become solid reality next year, but as I said, it's not an official contest. For all I know, the Astros may have already shelled out mucho dinero for some sports marketing firm to come out with turkeys like the ones they brought out 12 years ago. I wonder why sports franchises even bother. The Uni-Watch community is so much
pile-cc
-2*c**2 + 520*c + 2 Let x(p) = -p**3. Let u(a) = -a**2 + 5. Let t = 114 - 112. Let c be u(t). Let m(o) = -6*o**3 - 3*o**2. Calculate c*m(b) - 4*x(b). -2*b**3 - 3*b**2 Let x(u) = 175*u**2 - 17*u + 17. Let p(z) be the third derivative of -29*z**5/60 + z**4/8 - z**3/2 + 2*z**2 + 3*z + 74. Calculate 34*p(b) + 6*x(b). 64*b**2 Let g(k) = -k**2 - 1. Let w(l) = -5*l**2 + 2*l + 12. Let m(v) = -290*v**2 + 115*v + 685. Let s(y) = -2*m(y) + 115*w(y). Calculate -18*g(t) - 2*s(t). 8*t**2 - 2 Let x(f) = -7*f**3 + 8*f**2 + 3. Let n(c) = 69*c**3 - 81*c**2 - 29. Let v(s) = -2*n(s) - 21*x(s). Let z(o) = 26*o**3 - 17*o**2 - 15. Give 17*v(d) - 6*z(d). -3*d**3 + 5 Let x(h) = 4*h**2 - 2*h - 97 + 36 + 33 - 5*h**2 + 26. Let c be -2 - ((-12)/2 + 1). Suppose -6*d = -3*d - c. Let y(j) = j - 1. Calculate d*y(b) + x(b). -b**2 - b - 3 Let c = 36 + -63. Let g = 29 + c. Let b(r) = -4*r**2 + 10*r + 1. Let v(j) = -2*
dm_mathematics
Hope your Thanksgiving was safe and happy. Legal and Credit have returned the contracts from final review and the only two edits we would ask are as follows: Page 2 - ARTICLE 4 DEFAULTS AND REMEDIES 4.1 Early Termination: At the top of page 2, second column, please delete the reference to arbitration of the Termination Payment and perhaps use something like "good faith efforts by both parties......".
enron_emails
6 Evidence Code section 210 defines relevant evidence as “evidence, including evidence relevant to the credibility of a witness or hearsay declarant, having any tendency in reason to prove or disprove any disputed fact that is of consequence to the determination of the action.” Evidence Code section 350 provides: “No evidence is admissible except relevant evidence.” 7 Evidence Code section 352 provides, in relevant part: “The court in its discretion may exclude evidence if its probative value is substantially outweighed by the probability that its admission will … create substantial danger of undue prejudice ….” 7 We note first that there was no testimony that appellant committed the July 11 burglary and the prosecutor did not argue that such an inference could be drawn from the evidence presented. However, even assuming that the jury drew the inference that appellant burglarized the house the day prior to the day of the offenses charged in the instant case, any error in admitting evidence of the July 11 burglary was harmless. First, there was no dispute appellant entered the garage attached to the house; Deputy Wells testified appellant stated he went to the house with the intention of stealing “stuff”; and appellant testified to essentially the same thing. Thus, the jury heard compelling evidence, in the form of Deputy Wells’s testimony of appellant’s statements and appellant’s own testimony, that appellant entered the garage attached to the house with the intent to steal property located within, and thus that he committed the instant burglary. (See § 459 [burglary consists of entry into, inter alia, any “house,” “with intent to commit grand or petit larceny”].) Therefore, to the extent the evidence of the July 11 burglary showed appellant had a propensity to commit burglary and other criminal acts, the overwhelming and properly admitted evidence that appellant burglarized the garage the next day showed exactly the same thing. The challenged evidence added virtually nothing to the prosecution case. And because the purported uncharged act evidence and the evidence of the July 12 burglary related to the same kind of act—a burglary—the former evidence was “no stronger and no more inflammatory than the testimony concerning the charged offenses.” (People v. Ewoldt (1994) 7 Cal.4th 380, 405.) “[S]tate law error in admitting evidence is subject to the traditional Watson test: The reviewing court
freelaw
~~~ tomhoward An important question here are whether we're talking about immutable genetic encoding vs genetic expression (sometimes more controversially known as "epigenetics"), which is mutable via environmental stimuli, experiences, beliefs, traumas, cultural influences, etc. The follow-up question to that is the extent to which one's epigenetic state at birth is determined during gestation and influenced by the mother's beliefs and experiences (as well as the father's indirectly via the mother). This would explain why some correlations are found in twin study results, but also why those correlations are never close to 100%. It would also explain the study results that suggest inheritance of patterns like trauma/anxiety e.g., in descendants of holocaust survivors. I'm fully aware this area is nascent and yet to be deeply researched, but hypotheses exist that are plausible and potentially explanatory of phenomena that are otherwise still unexplained. ------ rbanffy I always like to point out that, as IQ, ZIP code is also heritable. I lived for about 49 years in the same city my mom lives. ~~~ henryaj How many genes have we discovered that determine your ZIP code? ~~~ klyrs Har dee har. Non-whites were forbidden from moving into many zip codes by law until, IIRC, around 1958. Real estate agents kept enforcing those laws long after they were struck down, and there are still tons of properties that have "racial covenants" which forbid* the current owner selling to a non-white buyer. And such neighborhoods change their composition very slowly. So no, the causative effect is the reverse of your implication: there are many well documented zip codes that significantly determine your genetics * though enforcement of such clauses wouldn't stand in court today ------ AlexTWithBeard I find it interesting how the post was flagged even before the discussion started. Is it because the question of heritability of zip codes is too sensitive? ~~~ nikolay Low IQ correlates with high flag activity. ------ Schiphol This article is from 1995. ------ wiremine Agreed the title should include the year of the article: 1995. It is reacting to the book "The Bell Curve"
hackernews
We propose to examine responses of human high-level visual cortex to individual images and image features, using new high-resolution functional MRI (fMRI) imaging methods. Our goal is to identify data driven categories of images and image features that optimally activate sub-regions of cortex. This will reveal the functional organization of higher-level cotex on a fine scale, and inform how these regions represent objects. This in turn will provide critical constraints on theories of object recognition, and have relevance to the wider
nih_exporter
Nitric oxide synthase immunoreactivity in the rat hippocampus after status epilepticus induced by perforant pathway stimulation. Nitric oxide has recently been implicated in mediation of neuronal excitotoxicity and damage. This study aimed at elucidating the changes in the expression of neuronal isoform of nitric oxide synthase (nNOS) in the hippocampus after status epilepticus induced by perforant pathway stimulation. nNOS-immunoreactivity (nNOS-ir) and neuronal damage, assessed by silver staining, were evaluated
pubmed_abstracts
Importance of promoter elements in the success of genetic transformation {#Sec7_20} ------------------------------------------------------------------------ Commonly, in genetic transformation procedure, after cloning the gene, general promoters such as 35 S are used. However, regarding the key role of promoter for proper function, a special attention should be paid to cloning and transformation of outstanding promoter as well as gene to obtain satisfactory result we suggest that in new transformation activities a. As example, ( \[[@CR9_20]\]) observed that seed-specific promoter is prerequisite for proper function of fatty acid desaturase genes in altering the unsaturated fatty acid content of oilseeds by genetic manipulation expression ( \[[@CR9_20]\]). Up to now, the majority of researchers just considered individual gene to predict gene function. The approach employed in this research considering coexpressed gene with gene of interest and promoter analysis, as well as illustrating prosite structure can result in reveal valuable findings about protein function in different pathway. In particular, the unique regulatory elements (responding to different sorts of stresses) open a new avenue in genetic engineering trough manipulating of cis-acting regulatory elements on promoter region. Conclusion {#Sec8_20} ========== Here, for the first time, we demonstrated that promoter analysis of TLPs and OLPs can explain multiple roles of TLPs and OLPs in biotic and abiotic stresses. In addition, we showed that analysis of coexpressed genes with gene of interest analysis can provide valuable insight in dtertmination of diverse role of genes. In conclusion, our results revealed that, new computational tools such as coexpressed gene analysis, cis regulatory analysis and *in silico* protein analysis can identify the outstanding TLPs and OLPs homologue involving in response to biotic and abiotic stresses. Discovering the genes with dual resistance functions in biotic and abiotic stresses is a major advance in genetic transformation. Furthermore, the present methods can be efficiently employed in discovering the unknown function of genes. Material and methods {#Sec9_20} ==================== Promoter analysis {#Sec10_20} ----------------- Genome-wide collection of all genes encoding OLPs (acting against salt stress) (AT1G75800, AT2G28790, AT4G36010, ATOSM34 or AT4G11650.1, Os01g0839900) and TLPs (acting against fungal stress) (AT1G73620, AT1G77700, AT4G36010,
pubmed_central
Positioned( top: MediaQuery.of(context).size.height * 0.285, left: MediaQuery.of(context).size.width * 0.359, child: Image.asset('assets/app/center.png', height: MediaQuery.of(context).size.height * 0.16)), ], ), ); } I am using the winwheel dependency for the Spinning wheel. This is what the final output looks like. It isn't properly aligned in all devices even though it looks fine in the image . A: Maybe you can try usign AspectRatio Widget with an aspectRatio of 1.0 to keep the width and height the same (as a circle) and align the stack in the center Scaffold( body: Center( child: Padding( padding: EdgeInsets.all(8), child: AspectRatio( aspectRatio: 1.0, //Give it an aspectRatio of 1 child: MyWidget() ), ) ), ), class MyWidget extends StatelessWidget { @override Widget build(BuildContext context) { return Stack( alignment: Alignment.center, //align the Widgets to the Center of the Stack children: [ //this is for the WHEEL Container( decoration: BoxDecoration( color: Colors.orange[800], shape: BoxShape.circle, ), ), //This is the GOLDEN BORDER Container( decoration: BoxDecoration( border: Border.all(width: 20, color: Colors.yellow), color: Colors.transparent, shape: BoxShape.circle, ), ), //This is the GOLDEN CENTER Container( width: MediaQuery.of(context).size.width / 12, decoration: BoxDecoration( color: Colors.yellow[200], shape: BoxShape.circle, ), ), ] ); } } I don't have the assets so I make some Containers with
stackexchange
Multichannel optical fibers bundles provide very flexible tools for light transmission to and/or light receiving from some object. In general case such a bundles can be designed as a structure of fibers with prescribed positions of their ends in a sensitive probe tip bundled into specific light transmitting and light receiving channels. Such bundles have many important applications. They can be used, for example, in various spectroscopic devices, process-photometers as a sensitive probe and light transmitting tool. Other applications of the bundles include high sensitive sensors of displacement or vibration measuring systems. Moreover, an ordered optical fiber bundle can be used as a light transmitting and reading device of raster type for linear detecting and light emitting components. Many optical fiber bundles of various constructions have been designed and numerous methods of manufacturing of the bundles have been developed. U.S. Pat. No. 3,244,894 describes photoelectric detection device utilizing randomized optical light conducting means which use a randomized single channel bundle. U.S. Pat. No. 3,702,275 describes a fiber optic encoding-decoding apparatus and method for its fabrication. The apparatus employs an image encoding-decoding single channel bundle. The bundle is fabricated by steps of coiling the fiber into a thyroidal bundle of fiber convolutions. A randomization between fibers can be performed only for reproducing the image portion in random. U.S. Pat. No. 3,383,192 describes a method of making fiberscope. It utilizes the fiber bundles that comprise a flexible structure of fibers. U.S. Pat. No. 3,328,143 offers a method of making light-conducting optical multifiber structures which utilize a fiber optical image-transfer device. U.S. Pat. No. 3,586,562 describes a method of making scrambled branched fiber optics. This method utilizes a mixed scrambling of branched fiber optic which is an initial layer of fibers on a drum of drawing machine. The fibers intermediate the tape strips are secured together by cement, and the fibers are then cut in the lacquered sections. U.S. Pat. No. 3,674,452 claims a method of fabricating illuminated fiber optics. This method involves initially fabricating a fiber optic conduit, wherein a plurality of light-conducting fibers are formed in a bundle with a predetermined geometrical configuration at the first end and an identical geometrical configuration at the second end of the bundle. U.S. Pat. No. 3,669,639 describes a method for production of a fused
uspto_backgrounds
Duane Eddy and the Rebels became a frequent act on The Dick Clark Show. Later career During the 1960s, Eddy launched an acting career, appearing in such films as A Thunder of Drums, The Wild Westerners, Kona Coast, and The Savage Seven, and two appearances on the television series Have Gun–Will Travel. He married singer Jessi Colter in 1961, the same year he signed a three-year contract with Paul Anka's production company, Camy, whose recordings were issued by RCA Victor. In the early days of recording in the RCA Victor studios, he renewed contact with Lee Hazlewood, who became involved in a number of his RCA Victor singles and albums. Eddy's 1962 single release, "(Dance With The) Guitar Man", co-written with Hazlewood, earned his third gold disc by selling a million records. In the 1970s, he produced album projects for Phil Everly and Waylon Jennings. In 1972, he worked with Al Gorgoni, rhythm guitar, on BJ Thomas's "Rock and Roll Lullaby". In 1975, a collaboration with hit songwriter Tony Macaulay and former founding member of The Seekers, Keith Potger, led to another UK top-10 record, "Play Me Like You Play Your Guitar". The single, "You Are My Sunshine", featuring Willie Nelson and Waylon Jennings, hit the country charts in 1977. In 1986, Eddy recorded with Art of Noise, remaking his 1960 version of Henry Mancini's "Peter Gunn". The song was a top-10 hit around the world, ranking number one on Rolling Stone'''s dance chart for six weeks that summer. "Peter Gunn" won the Grammy for Best Rock Instrumental of 1986. It also gave Eddy the distinction of being the only instrumentalist to have had top-10 hit singles in four different decades in the UK. (Although his 1975 top-10 hit featured a female vocal group). The following year, Duane Eddy was released on Capitol. Several of the tracks were produced by Paul McCartney, Jeff Lynne, Ry Cooder, and Art of Noise. Guest artists and musicians included John Fogerty, George Harrison, Paul McCartney, Ry Cooder, James Burton, David Lindley, Phil Pickett, Steve Cropper, and original Rebels, Larry Knechtel and Jim
wikipedia_en
$V_{1}=0$ $X^{012}=0$ [**IX**]{} 0 diag$(1,1,1)$ $V_{2}=0$ $X^{013}=0$ 0 6 0 3 6 $V_{3}$=0 $X^{023}=0$ $V_{1}=0$ $X^{012}=e^{2\phi}K_{3}$ [**III**]{} $-\frac{1}{2}\delta^{\alpha}_{3}$ $-\frac{1}{2}{\bf\alpha}$ $V_{2}$ arb $X^{013}=-e^{2\phi}K_{2}$ $-S_{12}$ 5 0 0 8 $V_{3}$ arb $X^{023}=0$ $V_{1}=0$ $X^{012}=e^{2\phi}K_{3}$ [**IV**]{} $-\delta^{\alpha}_{3}$ diag(1,0,0) $V_{2}$=0 $X^{013}=0$ $-2S_{12}$ 5 0 1 7 $V_{3}$ arb $X^{023}=0$ $V_{1}=0$ $X^{012}=e^{2\phi}K_{3}$ [**V**]{} $-\delta^{\alpha}_{3}$ 0 $V_{2}$=0 $X^{013}=0$ $-2S_{12}$ 3 0 1 5 $V_{3}$ arb $X^{023}=0$ $\;\;\; h=0$ $V_{1}=0$ $X^{012}=e^{2\phi}K_{3}$ 5 0 0 8 [**VI$_{h\neq -1}$**]{} $-\frac{1}{2}(h+1)\delta^{\alpha}_{3}$ $ $V_{2
arxiv
/* * Copyright 2000-2009 JetBrains s.r.o. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.intellij.openapi.vcs.changes.actions; import com.intellij.openapi.actionSystem.AnActionEvent; import com.intellij.openapi.vcs.VcsDataKeys; import com.intellij.openapi.vcs.changes.Change; import com.intellij.openapi.vcs.changes.ChangeList; import com.intellij.openapi.vcs.versionBrowser.CommittedChangeList; import org.jetbrains.annotations.NotNull; import org.jetbrains.annotations.Nullable; public abstract class RevertSelectedChangesAction extends RevertCommittedStuffAbstractAction { public static class Revert extends RevertSelectedChangesAction { public Revert() { super(true); } } public static class Apply extends RevertSelectedChangesAction { public Apply() { super(false); } } protected RevertSelectedChangesAction(boolean reverse) { super(reverse); } @Override protected boolean isEnabled(@NotNull AnActionEvent e) { return super.isEnabled(e) && allSelectedChangeListsAreRevertable(e); } private static boolean allSelectedChangeListsAreRevertable(@NotNull AnActionEvent e) { ChangeList[] changeLists = e.getData(VcsDataKeys.CHANGE_LISTS); if (changeLists == null) { return true; } for (ChangeList list :
github
His red RAV4 overhangs a curb near Dewbourne Ave. and Bathurst St., hazards flashing. Construction workers eye him with suspicion. “It’s easier to ask for forgiveness than it is for permission,” the forty-something artist will explain later from his cluttered basement studio in Swansea Village. Molina’s not posting a missing cat flyer or an ad for junk removal, typically seen on these city poles. Instead, it’s a small 6”x6” canvas painting of the nearby sidewalk. This is Molina’s 79th such painting. It’s part of what the artist has dubbed “The 416 Project.” He plans to paint and post 416 canvases to utility poles in 35 neighbourhoods throughout the 416 area code. Article Continued Below “I’m using each neighbourhood — and the whole city — as my gallery,” says the artist-actor-filmmaker. While city bylaws don’t allow for public art on utility poles, Molina has yet to face a fine and he hasn’t been told to stop. His wife, Elaine Mah, usually keeps watch in case parking enforcement “scoots us along,” she says. The couple shares a Swansea home with their two Lhasa Apso-mixed rescue dogs, Farley and Gus, who gnaw at each other and circle around Molina’s paint-smeared Crocs as he works in his small basement studio. He wears clean green Crocs elsewhere in their home, the navy pair are reserved for the studio. Dozens of acrylic paint markers litter his work space and hundreds of unopened canvases sit in boxes against one wall. The paintings — photographs transferred to canvas and brought to life with paint markers — depict mundane details of urban life in vibrant colours. One looks skyward at leafless tree branches and telephone wires. Another shows a bright yellow fire hydrant against a dull brown lawn. Each piece Molina creates starts with an iPhone photo, which is brushed onto the canvas and then detailed by Molina. He says he wants Torontonians to see their city from a new perspective. (Todd Korol) Molina wants Torontonians to see their city from a new perspective. “You see the poles, the garbage cans, the sewer (grates). You see that stuff every day and ignore it. It
pile-cc
Let m(o) = o**3 + 15*o**2 - 3*o - 18. Let k be m(-15). Suppose -14*j - k = 589. Let r = 32 - j. Does 19 divide r? True Let m be (96 - 22)*(-9)/(3/(-1)). Suppose -209 = -2*q - v + m, -5*q + 1077 = 3*v. Does 8 divide q? True Does 6 divide (-213625)/(-100) + 4/(-16) + 0 + 7? False Let p = 1326 + -1323. Let w(q) = -3*q**3 - q**2 + q + 1. Let t be w(-1). Suppose 3*v - 50 = -t*s - p, 9 = -3*v. Is s a multiple of 11? False Suppose s - 5*t - 201 = -3*s, 0 = -2*s + t + 99. Let f = s + -35. Let x(l) = 2*l - 4. Is 6 a factor of x(f)? True Let v = 65 - 63. Suppose -6 = v*b - 12. Is 3 a factor of ((-336)/b)/(-4) - 2/2? True Suppose 0 = -10*b + 5*m + 25025, 20*m - 16*m = -b + 2534. Is b a multiple of 115? False Suppose -21*g + 8556 - 450 = 0. Is g a multiple of 2? True Let q(m) = 27*m**2 - 139*m - 920. Is 120 a factor of q(-8)? True Let m(k) = -50*k**3 - 4*k**2 - 21*k - 126. Is m(-5) a multiple of 74? False Suppose 4*q - 110 = -2*k, 3*k + k - 213 = -q. Suppose 1350 = 10*m + 17*m. Suppose -m*z = -k*z + 291. Is 14 a factor of z? False Let b(x) = -x**3 + 70*x**2 + 15*x + 7. Is 9 a factor of b(8)? True
dm_mathematics
Make a Reservation Hope Takes Flight Help us reach our goal of 2.5 million passengers by 12/31/01 and America West will donate 20 million FlightFund miles to the Miles of Hope program, which provides much needed air transportation to participating charities: the American Red Cross, the Make-A-Wish Foundation, Angel Flight and the National Runaway Switchboard. View Details Fare Sales Mexico Getaway Sale America West announces savings to/from select destinations
enron_emails
midnight with professional security provided. In 2010, the City brought a nuisance abatement action in San Diego County Superior Court against Adler, Charlton Adler, McDini's, and the Adler Howard Trust, entitled People v. Adler, San Diego Superior Court Case No. 37-2010-00092488-CU- MC-CTL (Abatement Action). The Abatement Action was based, in part, on the defendants' failure to comply with CUP 2009-09's live entertainment conditions. On December 17, 2010, the court in the Abatement Action entered a stipulated judgment requiring McDini's to immediately cease all operations. The judgment was conditionally stayed provided, among other things, that McDini's applied for a new CUP within 60 days and in the interim ceased all live entertainment. The stipulated judgment provided that the City could seek enforcement of it by ex parte application for failure to comply with its terms. McDini's applied for and was granted CUP 2010-33 by National City's planning commission, which the City Council approved in February 2012 through City council 2 resolution 2012-49, and live entertainment was again allowed at McDini's subject to a number of specific conditions. McDini's permission to have live entertainment was subject to revocation by the City, if, among other things, the chief of police determined that the reinstatement of live entertainment resulted in or significantly contributed to a 10 percent increase in the demand for police services at McDini's between the hours of 5:00 p.m. and 3:00 a.m. On March 27, 2012, the December 17, 2010 stipulated judgment in the Abatement Action was amended to allow for live entertainment at McDini's provided McDini's operated in compliance with resolution 2012-49's conditions. The March 27, 2012 amended stipulated judgment further allowed the City to proceed by ex parte application to reinstitute the December 17, 2010 stipulated judgment's prohibition of live entertainment for McDini's failure to comply with resolution 2012-49's conditions. In March 2013, the planning commission undertook an annual review of CUP 2010-33. After concluding that McDini's failed to comply with resolution 2012-49's conditions, and
freelaw
(3.days.ago..2.days.ago).to_a Sending "succ" to a TimeWithZone object will print a warning because the method is deprecated. So basically a warning will show for every second in the range. Calling .include? should be equivalent to .to_a.include? in effect. ------ ahawkins One uses a loop and one doesn't? Not sure if there's so much to get out of this post. ~~~ norswap `cover?` uses the comparison operators to check if the value is within the range. `include?`, on the other hand, will behave like `cover?` only if the range values are "numeric". If they aren't, it will iterate through the range to see if it contains the value. This is possible because range values are required to implement the `succ` method which gives the next value. ------ danso Well, I learned about the cover? Method, so that's a big plus for a typical Saturday...but I'm confused as to why include? for ranges doesn't just act as an alias for cover? I can't think of a Range that is _not_ meant to be continuous...I would test out some cases right now if my computer weren't grinding away at a database insertion process... edit: OK, tried it out....as I suspected, Ranges that consists of Strings will have different behavior: [16] pry(main)> ('aa'..'zz').include?('c') => false [17] pry(main)> ('aa'..'zz').cover?('c') => true [18] pry(main)> ('aa'..'zz').include?('cc') => true [19] pry(main)> ('aa'..'zz').cover?('cc') => true [20] pry(main)> ('aa'..'zz').cover?('cccccc') ~~~ norswap Ranges are always continuous, but `cover?` uses the comparison operators, while `include?` iterates over the items in the range in some cases. `include?` is
hackernews
In continuation of previously proposed experiments, The Salk Institute Alcohol Research Center will extend ongoing interdisciplinary investigations on the molecular, cellular and behavioral neurobiological mechanisms underlying the acute and chronic actions of ethanol on the brain. Short-term actions of alcohol will be evaluated in terms of alterations in neuronal discharge responses to activation of selected neural pathways, changes in neuro-endocrine regulation, and changes in subcortical electroencephalographic activity, as well as in human cortical and brain stem sensory evoked responses, and
nih_exporter
The development of the male reproductive ducts and external genitalia in vertebrates is dependent on elevated androgen concentrations during embryonic development and the period of postnatal growth. We have observed that a population of juvenile alligators living on Lake Apopka exhibit significantly smaller penis size (24% average decrease) and lower plasma concentrations of testosterone (70% lower concentrations) when compared to animals of similar size on Lake Woodruff. In addition to smaller phalli, no relationship exists between plasma testosterone concentrations and penile
pubmed_abstracts
We report a case of methylphenidate-induced mania like symptoms and discuss the risk factors associated with development of stimulant associated adverse drug effect. Case Report {#sec1-2} =========== An 11-year-old girl, born of full-term pregnancy which was complicated by prolonged labor, who had delayed speech, impairment in domains of communication, self-care, work, academic, interpersonal and social skills since early childhood presented with a history characterized by difficulties with sustained attention, distraction, poor compliance with instruction, loosing things, jumping and hopping around, not waiting for her turn during play, and interrupting parents when they would be interacting, since the age of 4 years. These symptoms increased over the years and were thought to be more than the appropriate mental age and led to marked dysfunction in social and school functioning. At the age of 6 years, she was diagnosed as having ADHD, combined type (as per DSM-IV), with moderate mental retardation (intelligence quotient of 46) at a tertiary care center and the parents were advised to follow the behavioral measures. There was no family or personal history suggestive of head injury, epilepsy, psychosis, affective disorders or substance abuse. At the index assessment at the age of 11 years, the child fulfilled the diagnosis of ADHD, combined type (as per DSM-IV), with moderate mental retardation. Her body weight was 26 kg and physical examination did not reveal any abnormality. On investigation, her magnetic resonance imaging of brain, electroencephalogram, hemogram, serum electrolytes, renal function and liver function tests were found to be within normal limits. In view of the marked psychosocial dysfunction and failure to respond to behavioral measures in the past, she was prescribed methylphenidate 10 mg/day, which she tolerated well. After 1 week, the dose of methylphenidate was increased to 15 mg/day in divided doses. However, on the 4^th^ day of increase in dose, she was found to be restless (more than the past) with constant fidgeting, started running around, shouting, screaming and would bite family members if any attempt was made to calm her down. She spoke loudly at faster pace, hummed tunes and demanded for various food items and toys. However, she was able to recognize the parents and was aware of place and there was no history of abnormal involuntary movements. Also, she did not sleep throughout the night. Next day she was brought to the psychiatry OPD in a state of extreme agitation, running all
pubmed_central
architecture foo of readfile_tb is signal rst: std_logic := '1'; signal clk: std_logic := '0'; signal eor: std_logic; signal y: std_logic; begin DUT: entity work.readfile port map ( rst => rst, clk => clk, eor => eor, y => y ); CLOCK: process begin wait for 5 ns; clk <= not clk; if now > 830 ns then wait; end if; end process; STIMULUS: process begin wait for 10 ns; rst <= '0'; wait; end process; end architecture; I created input.txt from the 1 and 0 values in your question, one per line. The first thing my simulator told me was there was a null access (pointer), which would have been the line (line_num). It occurred on the rising edge clock edge after rst is released in the READLINE procedure call. On closer look, at the end of process you're obliviously doing a FILE_CLOSE, and the next READLINE will fail. The solution to that is to perform a FILE_OPEN and FILE_CLOSE only once. This also raises the point that we're hanging our hat on rst to hold off readlines, and we could add an enable as an embellishment. So, modifying the process: process (rst, clk) file file_pointer: text; variable line_content: character; variable line_num: line; -- variable j: integer := 0; variable char: character := '0'; variable cnt: integer range 0 to 80 := 0; -- defaults to 0 begin if rst = '1' then eor <= '0'; -- file_open (file_pointer, "c:\input.txt", read_mode); elsif rising_edge(clk) then if cnt < 80 then if cnt = 0 then -- open file once file_open (file_pointer, "input.
stackexchange
This invention relates to a connection method and a connection device for electrical connection of small portions, in particular, various portions in electronic parts, etc. 2. Description of the Related Art In order to electrically connect the inner lead portion of a lead frame and a bonding pad formed on a semiconductor chip, a wire bonding method using a gold wire or aluminum wire is generally used. Recently, method of forming a bump on a bonding pad and electrically connecting the bump to the wiring pattern formed on a film carrier or electrically connecting the bump to the wiring pattern formed on the board as in TAB (tape automated bonding) or flip-chip bonding have been used. With the above methods, the bonding pad and the bonding wire, the bonding wire and the inner lead portion, and the bump and the wiring pattern are electrically connected to each other by metal bonding. Further, soldering is often used for electrical connection at the time of mounting of electronic parts on the printed-circuit board. However, the wire bonding method has defects that the arrangement of elements formed on the semiconductor chip is limited and it is difficult to reduce the pitch between the pads. That is, in order to connect the bonding wire and the bonding pad to each other by metal bonding, it is necessary to apply a physical load such as heat, pressure or ultrasonic vibration to the connection portion. Therefore, when a semiconductor element is formed in an area directly under the bonding pad, the element may be damaged and the characteristic thereof may be deteriorated. Thus, the semiconductor element cannot be formed in an area near or directly under the bonding pad. Further, since the shortest distance between adjacent bonding wires is limited by the outer diameter of a bonding capillary, it is practically difficult to reduce the pitch between the pads to be less than 100 .mu.m. For this reason, the chip size of a semiconductor chip in which a large number of pads are required to be formed must be increased. In a connection method using no bonding wire, unlike TAB or flip-chip bonding, a larger amount of heat and a higher pressure may be often applied to the connection portion than in the wire bonding method. For this reason, the elements formed in the semiconductor chip may be often damaged. Further, the pad pitch may be reduced to less than approximately 80 .mu.m, but since it is not preferable to reduce the size of the bump from the viewpoint of the mechanical strength, reduction in the pad pitch is limited. Further, since a large number of bumps and a large number of wiring patterns are connected at
uspto_backgrounds
Among her academic papers Disclosing an Unknown Source of the Eskimo Entry of Diderot & d’Alembert’s Encyclopédie. Journal of Literature and Art Studies, 9(11), 1139-1148. "Shamanism Influence in Inuit Art-Dorset Period", Journal of Literature and Art Studies, 2015, Vol. 5, N°4, p. 271-281. « Les “Esquimaux des Lumières”: archéologie d’un regard entravé », revue ANUAC,Vol.3, N°1, 2014, pp.1-19. « Des races monstrueuses aux peuples maudits, des préadamites aux Homines religiosi: l’image des Esquimaux dans la littérature de voyage (XVIe siècle-première moitié du XVIIIE siècle) », Internord, Revue Internationale d’Etudes Arctiques, n°21, Editions du Centre National de la Recherche Scientifique (C.N.R.S), 2011, pp. 167–188. « L’œuvre internationale du Centre d’Etudes Arctique », Internord, Revue Internationale d’Etudes Arctiques, n°21, Editions du Centre National de la Recherche Scientifique (C.N.R.S.), 2011, pp. 315–320. «L’immagine dell’Altro... », in Geostorie, Anno 18 - n.1-2 - gennaio -agosto 2010, pp. 193– 204. «Intervista a Jeorge Estevez, Taino. A lui non piace il sapote verde» in Sfumature di rosso. In Territorio Indiano con i Primi Americani a cura di Naila Clerici, Moncalieri, SOCONAS INCOMINDIOS, 2011, pp. 59–64. « Intermondes: jeu d’identités et réappropriation des racines. Un Inuit de la toundra à la guerre de Corée. », XXXII International Americanistic Studies Congress, Perugia, 2011. « Rêver l’Arctique et l’enseigner : les ambigü
wikipedia_en
A. Satrapinski, M. Gotz, E. Pesel, N. Fletcher, P. Gournay, and B. Rolland, “New generation of low-frequency current comparators operated at room temperature,” *IEEE Trans. Instrum. Meas.*, vol. 66, p. 1417, 2017. BIPM, “The bipm key comparison database (kcdb), key and supplementary comparisons (appendix b), comparison bipm.em-k12. https://kcdb.bipm.org.” F. Delahaye, T. Witt, F. Piquemal, and G. Genevès, “Comparison of quantum hall effect resistance standards of the bnm/lcie and the bipm,” *IEEE Trans. Instrum. Meas.*, vol. 44, p. 258, 1995. C. A. Sanchez, B. M. Wood, and A. D. Inglis, “Ccc bridge with digitally controlled current sources,” *IEEE Trans. Instrum. Meas.*, vol. 58, p. 1202, 2009. D. Drung, M. G[ö]{}tz, E. Pesel, J.-H. Storm, C. Assmann, M. Peters, and T. Schurig, “Improving the stability of cryogenic current comparator setups,” *Supercond. Sci. Technol.*, vol. 22, p. 114004, 2009. M. G[ö]{}tz, D. Drung, E. Pesel, H. Barthelmess, C. Hinnrichs, C. Assmann, M. Peters, H. Scherer, B. Schumacher, and T. Schurig, “Improved cryogenic current comparator setup with digital current sources,” *IEEE Trans. Instrum. Meas.*, vol. 58, p. 1176, 2009. J. M. Williams, T. J. B. M. Janssen, G. Rietveld, and E. Houtzager, “An automated cryogenic current comparator resistance ratio bridge for routine resistance measurements,” *Metrologia*, vol. 47
arxiv
This software is covered by US Patent No. 8,185,551. This software is covered by US Patent No. 8,489,638. PATENT RIGHTS GRANT: "THIS IMPLEMENTATION" means the copyrightable works distributed by Tokutek as part of the Fractal Tree project. "PATENT CLAIMS" means the claims of patents that are owned or licensable by Tokutek, both currently or in the future; and that in the absence of this license would be infringed by THIS IMPLEMENTATION or by using or running THIS IMPLEMENTATION. "PATENT CHALLENGE" shall mean a challenge to the validity, patentability, enforceability and/or non-infringement of any of the PATENT CLAIMS or otherwise opposing any of the PATENT CLAIMS. Tokutek hereby grants to you, for the term and geographical scope of the PATENT CLAIMS, a non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, transfer, and otherwise run, modify, and propagate the contents of THIS IMPLEMENTATION, where such license applies only to the PATENT CLAIMS. This grant does not include claims that would be infringed only as a consequence of further modifications of THIS IMPLEMENTATION. If you or your agent or licensee institute or order or agree to the institution of patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that THIS IMPLEMENTATION constitutes direct or contributory patent infringement, or inducement of patent infringement, then any rights granted to you under this License shall terminate as of the date such litigation is filed. If you or your agent or exclusive licensee institute or order or agree to the institution of a PATENT CHALLENGE, then Tokutek may terminate any rights granted to you under this License. */ #ident "Copyright (c) 2007-2013 Tokutek Inc. All rights reserved." #ident "The technology is licensed by the Massachusetts Institute of Technology,
github
It’s a bit on the nose, but that’s the ultimate point. History is important, and we are all the sum of what came before. It’s an admirable thought, but it doesn’t make for gripping fiction without a strong narrative to lead us there. No one was more surprised by my enjoyment of Claire Evans’ The Fourteenth Letter than me. It looked like the kind of book I would enjoy as a fun distraction, but nothing more. And I was sorely in need of a fun distraction. The Fourteenth Letter opens with a grisly murder. What follows is an historical mystery with a classical twist, blending old world British Gothic with new world American ingenuity. It was a book about madness, privilege and eugenics, and while it didn’t keep me guessing through the whole reading experience, it definitely swept me along for the ride. I was impressed with Evans’ characterisation. Her characters were deeply flawed, mysterious, but personable. Their experiences created a sense of real personal growth. The William Lamb of the end of the novel was virtually unrecognisable from the character we’d met at the beginning, but his growth and development were so natural that it really gave his character depth. Savannah Shelton, the American gunslinger as well, was introduced as a rough and hardened criminal. Even she proved to have real depth, while Evans’ masterfully omitted the details of her erstwhile crimes, leaving the reader to judge the character on her personality and deeds through the novel rather than her sordid past. The remaining heroes were appropriately heroic, with the generic good-guy police constable who served to move the plot at an even pace, and the villains were appropriately dark and menacing. The pace, plotting and characterisation, however, were belied by The Fourteenth Letter’s title and branding. The cover is more evocative of a feminine gothic family saga/romance. There was nothing that screamed historical murder mystery. The titular ‘Fourteenth Letter’ as well, was introduced far too late in the plot for it to have any real impact or meaning. This was the book’s biggest letdown. The big reveal was hardly a reveal at all, as I hadn’t even known in was an option up until that point. All in all The Fourteenth Letter was a strong entry into the historical crime genre. It was a fun read that was equal parts cliché and original
pile-cc
11 Let y be 3*4 - 0/(-1). Suppose -c - 9 = -4*c. Suppose -2 = 3*o + c*q - 8, -q = -o + 4. What is the highest common divisor of y and o? 3 Let i be (-2)/(-7) + (-1230)/(-7). Suppose -4*f = 3*k - 118, -3*f - 11 = -2*k + 45. Suppose 3*n - 14 = k. What is the greatest common factor of n and i? 16 Suppose 0 = a - 3*k - 7, 0 = 3*a - 2*a + 2*k - 27. What is the highest common factor of a and 133? 19 Let u be ((-20)/(-5))/2 - -19. Let t = -148 - -316. Calculate the highest common divisor of u and t. 21 Let v(j) = j**3 + 9*j**2 + 11*j + 9. Let w be v(-7). What is the greatest common divisor of w and 15? 15 Suppose 5*y - 98 = 12. Let i = -14 + y. Suppose 0 = -5*r + r + i. Calculate the greatest common factor of r and 1. 1 Let m(v) = v**3 - 17*v**2 - 2*v + 23. Let z be m(17). Let g = 29 - z. What is the greatest common divisor of 60 and g? 20 Suppose 0*s - 150 = -2*s. Suppose r = 4*r - 90. Calculate the highest common factor of s and r. 15 Suppose 28 = 3*d - d. Suppose -3*c + 82 = 4*x, 0 = -2*c - 3*c + 10. Suppose 17*j + 112 = x*j. Calculate the greatest common divisor of j and d. 14 Suppose 6*g - g = 2*y - 75, 0 = -y + 2*g + 39. What is the greatest common divisor of 9 and y? 9 Let b = -35 + 81. Let j = b - 28. Calculate the highest common divisor of j and 18. 18 Suppose -t = 5*u - 3*u - 24, 5*u = -
dm_mathematics
503-464-3708 John M Rose@ENRON_DEVELOPMENT 06/15/2000 06:53 PM To: Bill Gang@EES cc: , Stephen Thome@ECT Subject: Pueblo Bill, Yesterday, we decided to look at two options for Pueblo; a 60 MW case and a 140 MW case. In order to match these outputs as closely as possible with available equipment
enron_emails
agreement was accepted. Dismissal of Count I appears to have proceeded from the assumption of court personnel that the plea agreement had been accepted. Although judgment entered reflects Count I was dismissed “on motion of the -4- United States,” the government did not move for dismissal of Count I. Id. Further, we find no evidence in the record to indicate, as Biggs suggests, that Count I was dismissed pursuant to Fed. R. Crim. P. 48(b) for “unnecessary delay in bringing a defendant to trial.” See Appellee’s Br. at 11. Considered collectively, the statements and conduct of the district court throughout the proceedings are consistent both with acceptance and rejection of the plea agreement. Nowhere in the record did the court explicitly and unambiguously accept or reject the plea agreement as required under Rule 11(e)(3) and (4). We are therefore compelled to remand this case to the district court with directions to vacate Biggs’ sentence and to reinstate Count I. The district court should then explicitly accept or reject the plea agreement. If the court accepts the agreement and so finds on the record in accordance with Rule 11(e)(3), then under Veri , it must sentence Biggs to thirty-six months’ imprisonment as contemplated by the plea agreement. If the court rejects the agreement, it must so advise Biggs in accordance with Rule 11(e)(4) and proceed accordingly. -5- REMANDED to the district court with directions to vacate Biggs’ sentence, reinstate Count I, and either accept or reject the plea agreement. Entered for the Court Mary Beck Briscoe Circuit Judge -6- 97-2377, United States of America v. Biggs LUCERO , Circuit Judge, dissenting. I agree with the majority that “considered collectively, the statements and conduct of the district court throughout the proceedings are consistent both with acceptance and rejection of the plea agreement.” Maj. Op. at 5. However, the government’s argument that the district court erred by imposing a thirty-month sentence can only carry weight if the district court accepted, but did not reject
freelaw
Microsoft joins preemptive patent protection program - grellas http://arstechnica.com/microsoft/news/2011/06/microsoft-joins-pre-emptive-patent-protection-program.ars ====== dodo53 That is such a cool scheme. I'm glad somebody is actively seeking to invalidate bogus patents. I'm not sure how they're getting money - is they idea that people that join up donate to the cash pool they use to reward people who find prior art on existing patents? Also it doesn't go quite as far as I'd like - it reduces the incentive to lodge bogus patents (as hopefully they'll stand for less time), but I'd still like their to some level of penalty to the originator when bogus patents are overturned (but that's a law change - somebody pointed out on a previous thread apparently Texas now has a law penalizing people that bring frivolous suits - not quite the same as filing for frivolous patents, but I still like it). Edit: ah, followed links to [http://arstechnica.com/tech- policy/news/2008/11/startup-crow...](http://arstechnica.com/tech- policy/news/2008/11/startup-crowdsources-patent-vetting-for-profit.ars) Apparently they take research requests from clients, presumably for money. Not quite as cool as I hoped - cost might still be out of realm of startup defence. Also - Article One Partners applied for a patent for their system of crowdsourcing patent invalidation :o) ~~~ rlpb I'm not convinced that a penalty makes sense. It's not really the inventor's fault for filing an obvious patent or one with prior art; it's the patent office's fault for approving it. ------ bad_user So it's OK for them to threaten others, but not OK when others come after them. ~~~ TruthElixirX The way the game is set up now it encourages people to go after one another, even if they don't want to. Maybe Microsoft has decided that the best courses of action rank as follows: Go after no one under a new system. Go after everyone under the current system. Go
hackernews
Heart failure (HF) affects 5-6 million Americans and, despite recent pharmacological and technological advances, is increasing in epidemic proportions as the population ages. Patients with HF suffer from debilitating symptoms and a loss of quality of life. Somatic symptoms such as fatigue and sleep disturbances are common among HF patients, which are ironically associated with physical inactivity and can create a spiraling decline in physical and cardiac function and even worse quality of life. Thus, behavioral/lifestyle interventions that increase physical
nih_exporter
The relationship between structural and hemodynamic heterogeneity of microvascular networks is examined by analyzing the effects of topological and geometric irregularities on network hemodynamics. Microscopic observations of a network in the rat mesentery provided data on length, diameter, and interconnection of all 913 segments. Two idealized network structures were derived from the observed network. In one, the topological structure was made symmetric; in another a further idealization was made by assigning equal lengths and diameters to all segments with topologically equivalent
pubmed_abstracts
Yellow solid 59.03%; mp 115--117 °C; IR (KBr, cm^−1^): 1693 (C=O), 1220 (C--N), 1150 (C--F); ^1^H NMR (500 MHz, CDCl~3~) *δ*: 3.42 (s, 4H, CH~2~NCH~2~), 3.98 (s, 2H,OCH~2~), 7.29 (t, 2H, J=9.0 Hz, ArH), 7.76--7.99 (m, 4H, ArH), 8.25 (d, 2H, ArH), 8.30 (s, 2H, Ar[CH=]{.ul}). ^13^C NMR (125 MHz, DMSO) *δ*: 54.43 (CH~2~NCH~2~), 62.27 (OCH~2~), 115.49, 115.64, 129.54, 130.72, 131.90, 132.11, 133.52, 134.35, 135.98 (PhCH=), 166.52 (CO), 186.72 (CO), 194.99 (COPh). Anal. Calcd. for C~27~H~20~FN~3~O~6~: C, 64.67; H, 4.02; N, 8.38; Found: C, 64.71; H, 4.08; N, 8.40. ### 4.1.6. 1-(2-(4-Methoxyphenyl)-2-oxoethyl)-3,5-bis(2-methylbenzylidene)piperidin-4-one (**4f**) {#s0070} Pale yellow solid 70.00%; mp 118--120 °C; IR (KBr, cm^−1^): 1673 (C=O), 1257 (C--N); ^1^H NMR (500 MHz, CDCl~3~) *δ*: 2.35 (s, 6H, CH~3~), 3.84 (s, 3H, OCH~3~), 3.91 (s, 4H, CH~2~NCH~2~), 3.93 (s, 2H, OCH~2~), 6.86 (d, 2H, *J*=8.5 Hz, ArH), 7.
pubmed_central
Q: Explanations for the complexity values for second preimage attack on GOST? I've been reading the article "A (second) preimage attack on the GOST hash function" by F. Mendel et al (link) and I'm having some difficulty to grasp some of the values of complexities/probabilities in the attack. Specifically: On page 228, how is the probability that two pairs lead to the corresponding values $x_1$, $x_2$, and $x_3$ amount to $2^{-192}$? On page 230, how is $2^{128}$ used in the calculation of the complexity of the compression function? On page 230, why construct $2^{32}$ pseudo-preimages for the last iteration of GOST? On page 231, how was the value for the probability of finding the right $M_{257}$ in the list $L$ obtained? Finally, on another issue, what operation is referred to by the squared $\ominus$ symbol on page 231: $\Sigma^m = \Sigma^t \ominus M_{257}$. [My guess: subtraction modulo $2^{256}$ -- am I right?] Thanks very much. A: Preliminary: Almost the same article is available for free without breaking any law, nor downloading 5GB (formatting is shifted by at most one third of a page). It is also (as well as all other articles of IACR crypto conferences from 2000-2011) in the IACR Online Proceedings, specifically in the FSE 2008 section, but then you need to subtract about 223 from the page numbers quoted in the question to get the page number in the PDF. For this reason it is best to use section (rather than page) numbers to designate a section of an article. I have now answered all the points (and learned along the way), but anyone remains welcome to improve that answer, made community wiki. 1) In section 3, why does the probability that two pairs lead to the corresponding values $x_1$, $x_2$, and $x_3$ amount to $2^{−192}$? By construction, $x_i$, $y_i$, $z_i$, $s_i$ are 64-bit. We assume that the process that uncovered each pair, being independent of the relations $x_i=y_i\oplus z_i\
stackexchange
As field effect transistor channel lengths (i.e., gate widths) became smaller than about 3 microns, so-called short channel effects began to become increasingly significant. As a result, device design and consequently process technology had to be modified to take these effects into account so that optimum device performance could continue to be obtained. For example, as device dimensions are reduced and the supply voltage remains constant, the lateral electric field generated within the substrate increases. If the field becomes strong enough, it can give rise to so-called hot-carrier effects. This becomes a significant problem with channel lengths smaller than 1.5 microns. Hot-carrier effects cause unacceptable performance degradation in n-type transistor devices built with conventional drain structures if their channel lengths are less than 2 microns. A preferred method of overcoming this problem is to provide lightly doped drain (LDD) regions within the substrate relative to the channel region in advance of the source and drain regions. The LDD regions are provided to be lighter conductively doped (i.e., less concentration) than the source and drain regions. This facilitates sharing of the voltage drop by the drain in the channel, as opposed to the stark voltage drop at the channel occurring in non-LDD n-type transistors. The LDD regions absorb some of the voltage drop potential into the drain, thus effectively eliminating hot carrier effects. As a result, the stability of the device is increased. However, further shrinking of the gate width (i.e., shorter channel length) makes the LDD region of a conventional transistor less effective. For example, shorter channel lengths require the LDD length to be reduced to ensure sufficient semiconductive material between the diffusion regions to prevent conductance when the gate voltage is off. One way of attending to such problems is to displace the predominant portion of the source and drain regions outwardly away from the substrate by elevating them. For example, a thin (e.g., 200-nm) epitaxial layer of monocrystalline silicon can be selectively grown from an exposed monocrystalline source and drain substrate areas within an epi reactor, and provided with sufficiently high conductivity doping to effectively provide source and drain regions. The lighter doped LDD regions can be provided within the substrate immediately below the elevated source and drain. Thus, a channel of sufficient length is effectively provided despite the smaller width gate. One preferred prior art method for providing elevated sources and drains is to first provide a contact opening within an insulating dielectric layer immediately adjacent a word line over the desired
uspto_backgrounds
Her music has been performed in Europe and America by ensembles such as the San Francisco Symphony, the Radio Symphony Orchestra of Frankfurt, the Atlantic Brass Quintet, and Ensemble Modern. In 1992 she was invited by the City of Munich to compose her puppet opera, Hero und Leander, for the 1992 Munich Biennale for New Music Theater. Dr Epstein's work for piano,Waterbowls, has been described as "a luminous study in quiet sonorities and the ache of memory". Writing for The Boston Globe, David Weininger writes Epsteins's music "has the feel of suspension in space, fragile and almost static..." The International Trumpet Guild Journal comments on her exploration of color in the Two Canons for Seven Natural Trumpets. Discography Two Canons, Seattle Trumpet Consort: 2008 Doloroso, Apostolos Parskevas: 2006. She Fell Into a Well of Sorrows, Kathleen Supove: 2003 The Five Chairs, Atlantic Brass Quintet: 2003. Summit Records DCD 396 The Parting Glass, Ulf Golnast: 1997. The Five Chairs, Iowa Brass Quintet: 1997. Waterbowls, Kathleen Supové: 1993. Hypnagogia, Ludovico Ensemble: 2015 Selected works Orchestral Twylle [1999]; chamber orchestra; 6' Pring [1998]; orchestra; 11' Concerto Grosso for Cello, Double Bass and String Orchestra [1997]; 9' Celestial Navigation [1988]; orchestra; 14' Choral Weather Patterns [2009]; SSATB chorus and cello The Streets of Laredo [2000]; 3 tenor soloists, SSAAB choir, 7' The Radiant Sisters [1995]; women's choir and chamber orchestra; 14' Flower World; 3 poems from the Yaqui Deer Dance [1992]; chorus and chamber ensemble; 13' Large ensemble Bloom [2009]; English horn and wind ensemble; 17'. Color Wheel [2005]; concert band; 3' Chant [2001]; large ensemble, 13' Victoria's Secret [1997]; 2 cellos, 2 double basses, 2 pianos; 9' Kinderfarben [1988]; chamber ensemble; 12' Brass The View from my
wikipedia_en
Symmetric cryptography and hash functions\[sct::symmetric\] ----------------------------------------------------------- The methodology, sketched in Fig. \[fgr:flowchart\_lite\] and Fig. \[fgr:full\_algorithm\], follows the same lines as the one described in great detail in our earlier paper [@10.1007/978-3-319-69453-5_18], which we refer the interested reader to for more details. ![Analyzing an attack against a symmetric cryptographic function with a fault-tolerant quantum adversary. Our resource estimation methodology takes into account several of the layers between the high level description of an algorithm and the physical hardware required for its execution. Our approach is modular should assumptions about any of these layers change, and hence it allows one to calculate the impact of improvements in any particular layer.[]{data-label="fgr:flowchart_lite"}](figures/flowchart_lite.pdf){width="35.00000%"} ![Grover searching with an oracle for $f : \{0,1\}^k \rightarrow \{0,1\}^k$. The algorithm makes $\lfloor \frac{\pi}{4} 2^{N/2}\rfloor$ calls to $G$, the *Grover iteration*, or, if parallelized on $K$ processors, $\lfloor \frac{\pi}{4} 2^{N/(2K)}\rfloor$ calls to $G$. The Grover iteration has two subroutines. The first, $U_g$, implements the predicate $g : \{0,1\}^k \rightarrow \{0,1\}$ that maps $x$ to $1$ if and only if $f(x) = y$. Each call to $U_g$ involves two calls to a reversible implementation of $f$ and one call to a comparison circuit that checks whether $f(x) = y$.[]{data-label="fgr:full_algorithm"}](figures/grover_vertical.pdf){width="46.00000%"} We assume a surface-code based fault-tolerant architecture [@PhysRevA.86.032324], using Reed-Muller distillation schemes [@Fowler:2013aa]. For each scheme we vary the possible physical error rates per gate from $10^{-4}$ to $10^{-7}$. We believe that this range of physical error rates is wide enough to cover both first generation quantum computers as well as more advanced future machines. In
arxiv
/** @file Rect.h @author Jukka Jylänki This work is released to Public Domain, do whatever you want with it. */ #pragma once #include <vector> struct RectSize { int width; int height; }; struct Rect { int x; int y; int width; int height; }; /// Performs a lexicographic compare on (rect short side, rect long side). /// @return -1 if the smaller side of a is shorter than the smaller side of b, 1 if the other way around. /// If they are equal, the larger side length is used as a tie-breaker. /// If the rectangles are of same size, returns 0. int CompareRectShortSide(const Rect &a, const Rect &b); /// Performs a lexicographic compare on (x, y, width, height). int NodeSortCmp(const Rect &a, const Rect &b); /// Returns true if a is contained in b. inline bool IsContainedIn(const Rect &a, const Rect &b) { return a.x >= b.x && a.y >= b.y && a.x+a.width <= b.x+b.width && a.y+a.height <= b.y+b.height; } class DisjointRectCollection { public: std::vector<Rect> rects; bool Add(const Rect &r) { // Degenerate rectangles are ignored. if (r.width == 0 || r.height == 0) return true; if (!Disjoint(r)) return false; rects.push_back(r); return true; } void Clear() { rects.clear(); } bool Disjoint(const Rect &r) const { // Degenerate rectangles are ignored. if (r.width == 0 || r.height == 0) return true; for(std::size_t i = 0; i < rects.size(); ++i) if
github
This Order, made in accordance with section 58(2) of the Local Government Act 1972, gives effect with modifications to proposals by the Local Government Boundary Commission for Wales. The effect of those proposals is that areas of the community of St.Dogmaels in the County of Ceredigion (shown hatched black and marked A on boundary map A and shown hatched black and marked B on boundary map B referred to in Article 2 of the Order) will be transferred from the County of Ceredigion to the County of Pembrokeshire after this Order comes into force. Prints of the boundary maps are deposited and may be inspected during normal office hours at the offices of Ceredigion County Council at Penmorfa, Aberaeron, Ceredigion, Pembrokeshire County Council at County Hall, Haverfordwest, Pembrokeshire and at the offices of the National Assembly for Wales at Cathays Park, Cardiff (Local Government Modernisation Division). The Local Government Area Changes Regulations 1976 (as amended) referred to in Article 2 of this Order contain incidental, consequential, transitional and supplementary provisions about the effect and implementation of orders such as this. Options/Help Print Options Print The Whole Instrument Legislation is available in different versions: Latest Available (revised):The latest available updated version of the legislation incorporating changes made by subsequent legislation and applied by our editorial team. Changes we have not yet applied to the text, can be found in the ‘Changes to Legislation’ area. The revised version is currently only available in English. Original (As Enacted or Made) - English:The original English language version of the legislation as it stood when it was enacted or made. No changes have been applied to the text. Original (As Enacted or Made) - Welsh:The original Welsh language version of the legislation as it stood when it was enacted or made. No changes have been applied to the text. Opening Options Different options to open legislation in order to view more content on screen at once More Resources Access essential accompanying documents and information for this legislation item from this tab. Dependent on the legislation item being viewed this may include: the original print PDF of the as enacted version that was used for the print copy lists of changes made by and/or affecting this legislation item confers power and blanket amendment details
pile-cc
27909 Rearrange -2*b - 22*b**3 - 2357 - 2*b**4 + b**4 + 21*b**3 + 2355 - 169*b**2 to d*b**3 + l + m*b + v*b**4 + h*b**2 and give h. -169 Rearrange (294*l**3 - 1514*l**3 + 643*l**3)*(-2 - 2 + 2) to c + p*l + u*l**3 + o*l**2 and give u. 1154 Express -21 + 83 - 2598*w - 31 - 31 in the form o + z*w and give z. -2598 Rearrange (25*j**2 - 12*j**2 - 34*j**2)*(-4 + j + 4) - 20*j**3 - 75*j**3 - 175*j**3 to the form y + n*j + d*j**3 + k*j**2 and give d. -291 Rearrange (42 - 295 - 66)*(324 - 324 - 8*l**4) to the form f*l**2 + a*l**3 + i + o*l + x*l**4 and give x. 2552 Rearrange 3544*z - 1669*z + 2012*z to the form a + v*z and give v. 3887 Express (-106 + 58 + 53)*(17*p - 10*p - 11*p - 4*p + 3 - 3 + (5*p - 3*p - 4*p)*(-1 + 0 + 0) + 4 - 4 - 2*p) as j*p + q and give j. -40 Express (7 - 7*r - 7)*(r**2 + 1 - 1) + (8*r**3 + 19 - 19)*(-88 + 29 + 29)*(2 - 1 + 1) as z*r**3 + w*r + v + t*r**2 and give z. -487 Express -x**4 + 2 + 3*x**4 + 56*x**3 + 10*x + 4*x**2 + 10*x**2 - 7*x - 16*x**2 in the form w*x + c*x**2 + z*x
dm_mathematics
Financial (w/ Master) Phone Yes, but can be electronic Yes, unless NY law governs On-line No, unless Master requires No In summary, as a result of the new U.S. federal legislation on e-signatures and contracts, on-line trades between two U.S. counterparties would not legally require the sending of a paper or electronic trade confirmation after the electronic contract is formed on
enron_emails
IN THE COURT OF CRIMINAL APPEALS OF TEXAS NO. WR-78,270-01 EX PARTE RICKEY DON WILLIAMS, Applicant ON APPLICATION FOR A WRIT OF HABEAS CORPUS CAUSE NO. 17440-B IN THE 104TH DISTRICT COURT FROM TAYLOR COUNTY Per curiam. O R D E R Pursuant to the provisions of Article 11.07 of the Texas Code of Criminal Procedure, the clerk of the trial court transmitted to this Court this application for a writ of habeas corpus. Ex parte Young, 418 S.W.2d 824, 826 (Tex. Crim. App. 1967). Applicant pleaded guilty to possession of marijuana in a drug free zone, and originally received ten years, probated. His probation was later revoked, and he was sentenced to ten years' imprisonment. He did not appeal his conviction. Applicant contends, inter alia, that his trial counsel rendered ineffective assistance because counsel failed to investigate, failed to object to a defective indictment, and advised Applicant to plead guilty. Applicant alleges that he would not have pleaded guilty but for counsel's erroneous advice. Applicant has alleged facts that, if true, might entitle him to relief. Strickland v. Washington, 466 U.S. 668 (1984); Ex parte Patterson, 993 S.W.2d 114, 115 (Tex. Crim. App. 1999). In these circumstances, additional facts are needed. As we held in Ex parte Rodriguez, 334 S.W.2d 294, 294 (Tex. Crim. App. 1960), the trial court is the appropriate forum for findings of fact. The trial court shall order trial counsel to respond to Applicant's claims of ineffective assistance of counsel. The trial court may use any means set out in Tex. Code Crim. Proc. art. 11.07, § 3(d). If the trial court elects to hold a hearing, it shall determine whether Applicant is indigent. If Applicant is indigent and wishes to be represented by counsel, the trial court shall appoint an attorney to represent Applicant at the hearing.
freelaw
~~~ lomnakkus My first self-owned computer was an Amiga 500[0], and I played this: [https://www.youtube.com/watch?v=Zgkf6wooDmw](https://www.youtube.com/watch?v=Zgkf6wooDmw) (To be fair, I played Commando on the C64 before, but, goddamn, Another World[1] showed me what was possible.) [0] I'd played with an Amstrad "Something", playing with mates who had a Vic20, and a C64. [1] ... and Shadow of The Beast. Awful game, but what amazing sound and graphics! EDIT: Oh, crap, didn't mention: I, along with a friend, programmed that Amstrad to play a basic Roulette game in some sort of BASIC variant -- Trust me, the ASCII graphics were _amazing_! On the Amiga, I started with a little draw-a-chart-type-thing based on reprogramming the on-screen characters (or was that actually the C64? Hard to remember at this point). Maybe I'm an absolute liar and I actually started out with a C64? I _definitely_ remember programming my first ray-tracer in Turbo Pascal on a xNNN (N=digit) PC with a VGA card + grey-scale monitor. Memories are hard in both senses of the word :(. ~~~ lathiat My favourite Amiga game was Gods followed by Flashback ~~~ ekianjo Gods was awesome but Speedball 2 from the same devs was a brutally fun game especially with 2 players. ------ aidos Man, that brings back some memories. Dialling in to the local BBS on my mates Amiga 1000 (or was it 500?) back in 1991 was a total revolution. We used to cycle to the BBS owners house to give him cash for access credits. ------ nunobrito This was a good article. Never had an Amiga but certainly got more interested on the BBS access that is still possible today. ------ Jaruzel I keep meaning to do something like this with my Amiga 1000. When
hackernews
HIV-1, the predominant cause of AIDS in humans, is unable to replicate in most non-human species. Therefore, the most practical animal model of AIDS consists of infection of rhesus macaques with SIVMAC or chimeras derived from SIVMAC that express the HIV-1 envelopes (SHIV). However, both of these models have specific limitations. In the case of SHIV, most chimeras developed to date use the CXCR4 co-receptor (X4
nih_exporter
Being based on the principle of Latham's appliance, this experiment is designed to detect activity of osteoblasts in the maxillary sutures of Wistar rats with bilateral artificial cleft palate by immunohistochemistry technique, and evaluate the effects of this appliance on the growth and development of the maxilla. The animal models of male infant Wistar rats with bilateral cleft palate were made by removing some palatal bones, splitting a "V" gap of 1.5 cm wide at the line between premaxilla and segments
pubmed_abstracts
Large-particle flow cytometry has also been applied to the screening and sorting of microencapsulated particles, cells, and organisms, such as fungal spores encapsulated in calcium alginate beads^[@CR18]^. A recent investigation that immobilised several species of coral propagules in an agarose gel found that survival of immobilised larvae was high, and that the encapsulation process did not significantly impede larval settlement after immobilisation^[@CR42]^. A work flow could be developed whereby the output from automated encapsulation feeds directly into a large-particle flow cytometer to measure and sort individually-encapsulated particles. Alternatively, the flow cytometer could be used to deposit larvae directly into an encapsulation medium for down-stream applications. With an egg diameter of approximately 500 µm^[@CR43]^ and a larval length of \~ 750 µm, *Montipora capitata* propagules were well suited to the 1,000 µm fluidics and optics core assembly (FOCA) unit tested here. Coral propagules span a considerable size range, however, from \~ 80 µm for the small broadcast spawning *Lobactis scutaria* (syn. *Fungia scutaria*)^[@CR44]^ to the large \~ 1,500--2000 µm planula larvae released by some brooders, such as *Pocillopora* spp.^[@CR45]^ and *Favia* spp.^[@CR46]^. The instruments tested here can comfortably accommodate particles from 20 to 1,500 µm in diameter, across their range of flow-cell sizes (up to 2000 µm), and are thus compatible with the vast majority of broadcast spawning coral species, and many brooding species. Other marine organisms with adult or larval stages within this size range, such as zooplankton tested by Henzler et al.^[@CR17]^, would also be suitable for study with these instruments. In this period of rapid ocean warming, large-scale and high-throughput methodologies are more important than ever, to advance basic and applied research into the early life-history stages of corals quickly and efficiently. We tested one such method, and conclude that gentle, large-particle flow cytometry can rapidly and efficiently sort live coral propagules based on spectral properties and size. Further development of this technique offers rapid characterisation and quantification of both wild-caught and laboratory-cultured coral propagules. Methods {#Sec7} ======= C
pubmed_central
I am trying to set a global variable of 'help' to display a function that I have in my code. The goal is anytime the user types in the word 'help' I can display my table I have created. The function is called table() that I want to display. My code is as follows: def table(): header=(" Operation Command-line Format") underline=("_________ ___________________") meat=("Union set1&set2 \n Intersection set1|set2 \n Difference set1-set2 \n Symmetric difference set1 ^ set2 \n Cartesian product set1 X set2 \n Subset set1<=set2 \n Proper subset set1<set2 \n Super set set1=>set2 \n Proper super set set1>set2 \n Cardinality card set1 \n Membership-in xE set1 where x is single element\n Membership-not-in x!Eset1 where x is single element\n Power set power set1\n Display this table help") print(header, "\n",underline,"\n",meat) def intro(): firstChoice=input("Would you like to get the sets from a file or input your own? \n Press 1 for from file \n Press 2 to input your own") if input is 'help': table() if firstChoice== '1': fileChoice=input("Please enter the fle you would like to open") with open(fileChoice, 'r+') as f: z=f.readlines() length=len(z) try: if z != len(z): fileSet1=z[length-length] if length-length != " ": fileSet1=fileSet1.strip('\n') fileSet1=str(fileSet1) fileSet1.split(',') fileSet1=set([fileSet1]) fileSet2=z[length-length+1] if length-length+1 != " ": fileSet2=fileSet2.strip('\n') fileSet2=str(fileSet
stackexchange
Industrial-rated circuit breakers are available having operating components that are designed for automatic assembly to provide cost improvement as well as improved operating efficiency. The precision alignment performed by the automated assembly equipment allows the operating components within the circuit breaker operation mechanism to be installed within very close operating tolerances. The operating mechanism assembly includes a pair of powerful operating springs that are overcentered for rapidly driving the movable contact arm and the attached movable contact away from the stationary fixed contact to interrupt the circuit current. The operating mechanism includes a cradle operator which engages a latch assembly to prevent the movable contact arm from being driven to its open position under the urgence of the charged operating springs. The compact latch assembly includes a primary and secondary latch operating within a common support structure. With higher ampere-rated industrial circuit breaker designs in the range of 1200 ampere continuous current carrying capacity, the correspondingly larger operating springs provide a substantially increased holding force to the circuit breaker contacts such that a correspondingly larger force is required to manually separate the circuit breaker contacts to reset and close the operating mechanism. The increased current transfer through the compact circuit breaker enclosure during overcurrent conditions produces an arc upon contact separation that is difficult to quench and deionize within the close confines of the correspondingly compact arc chamber. The increased temperature generated within the compact circuit breaker enclosure during circuit interruption heats up several of the current-carrying components such as the movable contact and movable contact arm whereby additional thermal insulating means are required to prevent damage to the lower-temperature materials used within the circuit breaker enclosure. The increased current creates a correspondingly increased arc that requires additional inter-phasal line lug baffles as well as additional electrical isolation between the electrical and electronic components within the circuit breaker enclosure. One purpose of the instant invention accordingly is to provide a compact circuit breaker having sufficient capability to allow manual movement of the operating handle to reset and close the circuit breaker against the bias of the operating mechanism springs. A second purpose of this invention is to provide supplemental arc extinguishing means to the compact circuit breaker enclosure to allow complete and rapid circuit interruption at the higher circuit ratings and to prevent the occurrence of inter-phasal faults exterior to the enclosure. A still further purpose of the invention is to provide a compact circuit breaker having means for externally viewing the condition of the circuit breaker contacts. An additional purpose of the invention is to allow the hot movable contact arm to impact against the bumper attached to the circuit breaker cover
uspto_backgrounds
Peter Dembowski Heinz Peter Dembowski (1 April 1928, Berlin – 28 January 1971, Tübingen) was a German mathematician, specializing in combinatorics. He is known for the and for Dembowski-Ostrom polynomials. Education and career Dembowski studied from 1948 to 1953 at Goethe University Frankfurt. He then spent three years in the USA first at Brown University and then at the University of Illinois at Urbana–Champaign. At Illinois he met Reinhold Baer, with whom he returned to Frankfurt in 1956 and received in 1957 his doctorate with thesis Verallgemeinerungen von Transitivitätsklassen endlicher projektiver Ebenen (Generalizations of Transitive Classes of Finite Projective Planes). In 1964 Dembowski was habilitated in Frankfurt. He was a visiting professor in 1962/3 at Queen Mary College in London, in 1965/66 at the University of Wisconsin–Madison, and in 1966/67 at the University of Illinois at Chicago. He was in the spring of 1965 a visiting professor at the University of Rome. In 1969 he was appointed to a professorial chair at the University of Tübingen, where he remained until his death in 1971. The primary focus of Dembowski's research was finite geometries and their interrelations with group theory, about which he wrote an authoritative textbook. He proved the theorem, famous in finite geometry, that every inversive plane of even order n is isomorphic to the system of points and plane sections of an ovoid in a three-dimensional projective space over GF(n). In 1962 he was an approved speaker (but not an invited speaker) with half-hour talk Partial planes with parallelism at the International Congress of Mathematicians in Stockholm. His doctoral students include William Kantor. Selected publications Kombinatorik. BI Hochschultaschenbücher 1970. Finite Geometries. Springer 1968, Ergebnisse der Mathematik und ihrer Grenzgebiete, reprinted in 1997 in Springer's series Classics of Mathematics, . 1997 reprint Endliche Geometrien. In: Mathematisch-Physikalische Semesterberichte. vol. 13, 1966, p. 32. References Category:1928 births Category:1971 deaths Category:20th-century German mathematicians Category
wikipedia_en
Additional Simulation Studies {#addl_sims} ============================= To further evaluate the performance of our proposed procedures, we interrogate our estimators in three additional sets of simulation studies. In each scenario, we compare five variants of our inverse probability weighted estimators to an alternative unadjusted estimator that considers only $\E Y$ in the treatment group (i.e., $A = 1$). The inverse probability weighted estimators are constructed using varied selectors for the highly adaptive lasso estimator of the propensity score, including 1. global cross-validation to choose the $L_1$-norm; 2. undersmoothing with minimization of the cross-validated mean of $D_{\text{CAR}}$ (as per equation \[main:eq:udcar\]), with and without $\kappa$-truncation; and 3. solving the cross-validated score-based criterion arising (from equation \[main:eq:score\]), with and withou $\kappa$-truncation. Each of the inverse probability weighted estimators was constructed using 5-fold cross-fitting, as discussed in Section \[main:estim\_cv\]. In the sequel, we consider scenarios across which the true treatment assignment mechanism ranges from randomization to a complex function of the covariates $W$. In the first scenario, the treatment assignment mechanism is randomized, such that the baseline covariates have no impact on the probability of receiving treatment. In the second scenario, we consider a treatment assignment mechanism that includes interaction terms between baseline covariates and in which the positivity assumption strongly holds. In the third and final scenario, we consider a treatment mechanism that includes interaction terms between baseline covariates and in which the probability of receiving treatment is extremely low for certain strata of the covariates $W$. In all sets of simulation studies, we consider estimation of $\Psi(P_0) = \E_{P_0}\{Y(1)\}$, the counterfactual mean for having received treatment. In each scenario, $n$ independent and identically distributed observations were drawn from the given data-generating mechanism, for each of the sample sizes $n \in \{100, 400, 900, 1600\}$. Throughout, $\epsilon \sim \text{Normal}(\mu = 0, \sigma = 0.1)$ and $\expit(x) = \{1 + \exp(-x) \}^{-1}$. Each of the estimators is compared in terms of their raw (unscaled) bias, scaled (
arxiv
/* Set the LNB polarity */ if (state->config->lnb_polarity) cx24123_writereg(state, 0x32, cx24123_readreg(state, 0x32) | 0x02); if (state->config->dont_use_pll) cx24123_repeater_mode(state, 1, 0); return 0; } static int cx24123_set_voltage(struct dvb_frontend *fe, enum fe_sec_voltage voltage) { struct cx24123_state *state = fe->demodulator_priv; u8 val; val = cx24123_readreg(state, 0x29) & ~0x40; switch (voltage) { case SEC_VOLTAGE_13: dprintk("setting voltage 13V\n"); return cx24123_writereg(state, 0x29, val & 0x7f); case SEC_VOLTAGE_18: dprintk("setting voltage 18V\n"); return cx24123_writereg(state, 0x29, val | 0x80); case SEC_VOLTAGE_OFF: /* already handled in cx88-dvb */ return 0; default: return -EINVAL; } return 0; } /* wait for diseqc queue to become ready (or timeout) */ static void cx24123_wait_for_diseqc(struct cx24123_state *state) { unsigned long timeout = jiffies + msecs_to_jiffies(200); while (!(cx24123_readreg(state, 0x29) & 0x40)) { if (time_after(jiffies, timeout)) { err("%s: diseqc queue not ready, " \ "command may be lost.\n", __func__); break; } msleep(10); } } static int cx24123_send_diseqc_msg(struct dvb_frontend *fe, struct dvb_diseqc_master_cmd *
github
Husband of Alta Horton Hackney A A 2/11/1846 6/2/1906 Safe in the Arms of Jesus, Safe on His Gentle Breast By His Love O'er Shadowed Beneath My Soul Shall Rest Husband of Mary Hackney Jennie C 6/19/1915 ` ` Wife of Robert Hackney Mary ` 10/9/1840 4/24/1922 Wife of A.A. HackneyAt Rest ` Hackney Robert E 12/14/1915 3/30/1999 ` Husband of Jennie Hall Lester ` 5/7/1898 12/31/1976 Father ` Harward Anne Goodwin 9/29/1857 7/29/1926 Resting in Peace Wife of Curney Harward Brenda ` 2/3/1948 ` ` Wife of John C Harward Curney Genatus 11/19/1855 4/20/1927 Resting in Peace Husband of Anne Harward Hazel ` 7/29/01 6/28/2000 Age 92 ` Harward John C 11/10/1910 9/5/1961 ` ` Harward L H 3/22/1821 4/21/1890 Farewell Wife & Children. I am not dead but sleeping here. My Live was short as you may prepare for death and follow me Called to be God's Handiman, Captain, North Chatham Fire Dept. ( also a picture of a tractor on the tombstone) ` Long Emaline ` 12/16/1849 7/12/18
pile-cc
False Let i = -2783 + 7053. Is i a multiple of 14? True Let o = -1627 - -2834. Does 4 divide o? False Let f be (5 - 2)/(6/4). Suppose -11 = -2*b + 5*k, -4*b + f*k = -0*b - 14. Suppose -3*j + 39 = 6*p - p, -2*j = -b*p + 31. Is 2 a factor of p? False Let s be 2 - (-2 - -2) - 38. Let k be (-8)/s + (-16)/(-9). Suppose -12 = -4*v + k*c + 124, -2*c + 44 = v. Is 9 a factor of v? True Let r = 1857 + -1608. Is r a multiple of 18? False Let k be 4 + 3 + -5 + 2. Suppose k*u = -u + 2*l + 80, 5*l = -5*u + 45. Is 6 a factor of u? False Let i be -3*340/(-12) + (0 - 2). Let f be (-160)/(-1) + 2/1. Let q = f - i. Is 22 a factor of q? False Suppose -4*r + 120 = -14*r. Does 26 divide r/(-12) - 25/(-1)? True Let w(d) = 3*d**3 - 5*d**2 - 5*d - 5. Does 24 divide w(7)? True Let n(o) = -24*o**2 - o - 1. Let m be n(-3). Let y = 340 + m. Is 40 a factor of y? False Let y = 8 + 13. Suppose -6*o = -y + 3. Is (o/9)/((-5)/(-2355)) a multiple of 38? False Let g(t) = -t + 4. Let x be g(6). Let d(u) = -u**2 + u + 2. Let n be d(x). Is 13 a factor of (24 - -2)/((-2)/n)? True Suppose -a - 16 = -4*h, -4*h + 3*a + 2*
dm_mathematics
Tanya/Jay, I am forwarding to you documentation from Westport Resources Corporation regarding the merger with Belco Oil & Gas. As you know, we have existing financial agreements with both companies, as identified below: Belco Oil & Gas - Master Energy Price Swap Agreement dated July 8, 1999, which has unlimited credit Westport Oil & Gas Company, Inc. - ISDA Master Agreement dated March 17, 1998 The Counterparty wants to retain the Bel
enron_emails
Vernon DEWEY, d/b/a Rustic Resort, and Threshermen's Mutual Insurance Company, a Wisconsin Insurance Corporation, Defendants-Respondents-Cross Appellants. No. 86-2086. Supreme Court of Wisconsin. Argued November 1, 1988. Decided January 9, 1989. *330 For the plaintiffs-appellants-cross respondents there were briefs by Michael S. Siddall and Herrling, Clark, Hartzheim & Siddall, Ltd., Appleton, and oral argument by Michael S. Siddall. For the defendants-respondents-cross appellants there wbriefs by Jeffrey J. Gilson, Frederick B. *331 Kaftan, and Kaftan, Kaftan, Van Egeren, Ostrow, Gilson, Geimer & Gammeltoft, S.C., Green Bay, and oral argument by Jeffrey J. Gilson. SHIRLEY S. ABRAHAMSON, J. This appeal comes before the court on certification from the court of appeals. Section 809.61, Stats., 1985-86. The court of appeals certified the following question to this court: "Whether payment of the $150 filing fee under Rule 809.25(2)(a)1. is a prerequisite to filing a notice of appeal." We conclude that a notice of appeal is filed on the day the clerk of the trial court receives the notice of appeal, whether or not the notice of appeal is accompanied by the $150 filing fee. Because the clerk of the circuit court in this case received the notice of appeal within the time period prescribed by statute, we conclude that the court of appeals obtained jurisdiction over this appeal. Accordingly, we deny the defendants' motion to dismiss the appeal for failure to file a notice of appeal in a timely manner. The facts giving rise to the motion are not in dispute.[1] On October 1, 1986, the circuit court for *332 Menominee and Shawano counties, Thomas G. Grover, circuit judge, entered judgment after a jury *333 verdict dismissing the plaintiffs' complaint on its merits. The parties agree that the last day on which *334 the plaintiffs could initiate a timely appeal from this judgment was November 17, 1986. A notice of appeal filed on November 18, 1986, would have been filed too late. According to the findings of fact of the circuit court, the clerk of the circuit court received in its regular mail delivery of
freelaw
Teaching Business People How To Hack - jevgeni I work in a team of financial analysts in a large company. My team came to the conclusion, that adhering to enterprise &quot;solutions&quot; for our results is really unproductive. So a lot of stuff we do is now solved by lightweight home-hacked implementations.<p>Being the designated &quot;tech savvy&quot; person, I now have the task to teach people the tech skills required for this. Most of them handle SQL on a daily basis and know a bit of VBA. My goal is to teach them a programming language (probably Python), some lightweight OOP concepts and most importantly the methods and the habits of a good software developer, i.e. version control, writing code for long-term readability, fast iteration development and just general care for their workflow.<p>Could you guys recommend any good resources (i.e. podcasts, articles, whatever), that you, personally, find extraordinarily good? The kind of succinct explanation of the above concepts, that made you personally fall in love with the thing being explained? ====== mjhea0 Python is the way to go. This is exactly how I got into Python: I worked as a Financial Analyst, automating giant reports with VBA. I quickly found out just how much easier Python was, compared to VBA, and I could then hook directly up to the Quickbooks API to grab data. New Boston [http://thenewboston.org/list.php?cat=36](http://thenewboston.org/list.php?cat=36) is a good place to start. People can get their feet wet. Learn Python the Hard Way [http://learnpythonthehardway.org/](http://learnpythonthehardway.org/) is one of the best beginner tutorials. The problem, though, is that the examples are a bit boring because the focus is not so much on the examples, but on repetition - for learning the syntax. Most have to power through this. I would highly recommend it. I am also the author/co-founder of a Python training series called Real Python [http://www.realpython.com](http://www.realpython.com). We start with the syntax, then move into web development. The first course would be great for your
hackernews
The goal of this application is to design functional biomaterials to carry antisense plasmids and antisense oligonucleotides to islet beta cell based on results from successful preliminary studies. The designed nontoxic and cationic polymeric carriers are conjugated with a targeting moiety of sulfonylurea (SU) or antiglutamic acid decarboxylase (antiGAD) antibody. These functional and biospecific biomaterials will carry the antisense GAD plasmid to islet beta cells, where they will suppress GAD antigen production and prevent
nih_exporter
The emergence of variant CJD (vCJD) in the last decade has heightened awareness of the need for rigorous infection control precautions in all healthcare environments. It has also raised particular problems in relation to the clinical management of patients who are either suffering from prion diseases or who are perceived as being 'at risk'. From the healthcare perspective CJD is of concern because at present it is an incurable, fatal disease and the causative agent, abnormal prion protein, is resistant to conventional inactivation procedures.
pubmed_abstracts
INTRODUCTION {#sec1-1} ============ One of the main consequences of brain injury is coma. Coma is defined as a state of impaired consciousness that the patient is unresponsiveness so that cannot response to the environment stimulations and cannot be aroused.\[[@ref1]\] Today, the amount of brain injury in the world has increased rapidly, so that each year about two million people are suffering from brain damage in the United States.\[[@ref2]\] One of the most common complications resulting from impacts to the head is intracranial hematoma, which is depending on the position divided into epidural, subdural and intracerebral hematomas. In the study of traumatic coma data bank (TCDB), 58% of all of the patients who underwent hematoma discharge and 21% of all of the patients who had severe head trauma suffering subdural hematoma and the most common cause of acute subdural hematoma is accidents.\[[@ref3]\] In this type of hematoma as blood accumulates in the subdural space, however, pressure on the brain increases and subsequently causing acute neurological disorders. Intracranial hematoma, including subdural hematoma, can be associated with life-threatening complications such as coma.\[[@ref4]\] Comatose persons may stay in coma for long periods and when they come out of coma they will face with motor and cognitive impairments.\[[@ref5]\] In addition to these dysfunctions, another threatening complication in comatose patients which is gained less attention is sensory deprivation.\[[@ref6]\] Staying in environments with limited exposure to sensory stimuli, such as intensive care units (ICU), increases the risk of sensory deprivation in patients and have some effects like perceptual, cognitive and emotional impairments on patients.\[[@ref7][@ref8]\] One of the steps that can be done to prevent sensory deprivation in comatose patients is using the sensory stimulation through sensory stimulation programs. Sensory stimulation programs for comatose patients through stimulating the reticular activating system and increasing the level of cognitive functioning stimulate the brain and cause the patients come out of coma as soon as possible and achieve to optimal performance levels.\[[@ref6]\] Onset of sensory stimulation on the first 72 hours after brain injury has a great importance in saving the patient\'s life, improving quality of life, and prognosis of the disease.\[[@ref9]\] In this regard Hyunsoon and Whasook (2003) wrote: To facilitate the healing process and prevent the sensory deprivation in comatose patients with traumatic brain injury using the organized sensory stimulation programs in the early stages after brain injury
pubmed_central
var iframe = document.getElementById('editor'); var iframe_win = iframe.contentWindow || iframe.contentDocument; e = e || fwin.event; if (iframe_win.getSelection) { try { // FF selection = iframe_win.getSelection(); range = selection.getRangeAt(0); node = range.commonAncestorContainer; } catch (e) { return false; } } else { try { // IE selection = iframe_win.document.selection; range = selection.createRange(); node = range.parentElement(); } catch (e) { return false; } } //2. parse DOM Path until HTML. The top of the "HTML" is "Document" i_node = node; do { if (i_node.nodeType != 1) continue; // get all of DOM Note if (tag == null) { tag = i_node.nodeName.toLowerCase(); } else { tag = tag + ">>" + i_node.nodeName.toLowerCase(); } // do_some_thing for each Node : obj.addClass('active'); or obj.removeClass('active'); and so on. } while (i_node = i_node.parentNode) //do_some_thing for all of note fwin.parent.do_some_thing(ret); var keyCode = e.charCode || e.keyCode; $("#result").html( $("#result").html() + "node dom path: " + tag + ' key' + e.type + ': keyCode: ' + keyCode + '<br>' ); }; $body.click(reportDomPath); $(doc).keypress(reportDomPath); // only FF But $(doc).keypress(reportDomPath) only works on FF. A: I did a bit of google .. this might help you: var f = document.getElementById('iframe_id'); var fwin = f.contentWindow
stackexchange
A further disadvantage inherent in prior art multiplexed writing heads, wherein many nibs are connected to a single high voltage driver, is that plotting speed may be limited due to the need for a minimum write time of 20 to 30 microseconds per writing group. Any less writing time would result in severe image degradation. With an average of 50 nib writing groups, the speed at which one scan line may be drawn is determined by the product of the minimum writing time times the number of writing groups, thus approximately 1000 to 1500 microseconds. This translates into two inches per second at 400 lines per inch resolution or less than 1 inch per second at 1000 lines per inch. It will be appreciated that the prior art is severely limiting for high speed printing applications. Another disadvantage of a prior art multiplexed writing heads is the uneven charge distribution at the fringes of each nib group which may result in image striations or "banding" during the writing and toning process. This is a considerable problem in the prior art and many attempts have been made to minimize uneven charge distribution, but to no avail. Prior art writing head structures have the disadvantage of taking up prohibitively large amounts of space with so called mother boards, including large and bulky connectors and so called daughter boards which contain large number of high voltage drivers as well as pull-up and series resistors. These prior art interconnect schemes are unduly space consuming and are in addition prohibitively expensive and unreliable. In addition, in order to achieve reasonably fast RC writing time constants on the order of 100 microseconds, the value of the pull-up resistors needs to be fairly low. This however, has the disadvantage of high power dissipation and low reliability when several thousand nibs are switching simultaneously. In the prior art, other attempts have been made to substantially reduce intercoupling capacitance and flaring by using thin film elements in an electrographic writing head. Thin film elements are disadvantageous because they are very expensive to manufacture and require complex processing techniques as compared to thick film elements which may be implemented on printed circuit boards. Previously, it was thought impractical or impossible to use exclusively thick film elements in an integrated electrographic writing head. The lower limit of writing nib thickness is governed by catastrophic damage of the writing nib end due to disintegration upon application of a high voltage and subsequent discharge. Although it is possible to reduce the energy delivered to the nib, there is a limit as to how far the voltage can be reduced and still obtain a suitable writing discharge. It was further believed however
uspto_backgrounds
Fulvio Cacace (died 1 December 2003) was an Italian chemist. In 1963, while at the Sapienza University of Rome, he devised the decay technique for the study of organic radicals and carbenium cations. The technique is based on the preparation of compounds containing the radioactive isotope tritium in place of common hydrogen. When the tritium undergoes beta decay, it is turned into a helium-3 atom, that detaches from the parent molecule, leaving the desired cation or radical behind. The technique has made it possible to study the chemistry of a vast number of such radicals and ions, in all sorts of environments, including solids, liquids, and gases. In particular, it has provided much of the knowledge of the chemistry of the helium hydride ion, specifically . Some publications (1966) "A Tracer Study of the Reactions of Ionic Intermediates Formed by Nuclear Decay of Tritiated Molecules. I. Methane-t4". (1970) "Gaseous Carbonium Ions from the Decay of Tritiated Molecules". (1973) "Gas-phase reaction of tert-butyl ions with arenes. Remarkable selectivity of a gaseous, charged electrophile". (1976) "Gas-phase alkylation of xylenes by tert-butyl(1+) ions". (1977) "Aromatic substitution in the gas phase. Ambident behavior of phenol toward t-C4H9+ cations". (1977) "Aromatic substitution in the liquid phase by bona fide free methyl cations. Alkylation of benzene and toluene". (1978) "Aromatic substitutions by []methyl decay ions. A comparative study of the gas- and liquid-phase attack on benzene and toluene". (1979) "Gas-phase reaction of free isopropyl ions with phenol and anisole". (1980) "Aromatic substitution in the gas phase. A comparative study of the alkylation of benzene and toluene with C3H7+ ions from the protonation of cyclopropane and propene". (1981) "Aromatic substitution in the gas phase. Alkylation of arenes by gaseous C4H9+ cations". (1982) "On the formation of adduct ions in gas-phase aromatic substitution". (1982) "Alkylation of nitriles with gaseous car
wikipedia_en
$$\nabla \times\mu_r^{-1}(\nabla \times\mathbf{E})-\omega^2\varepsilon_0\mu_0(\varepsilon_r-i\sigma/\omega\varepsilon_0)\mathbf{E}=0 \label{eq1}$$ In the condition of the electric conductivity $\sigma=0$ and non-magnetic materials ($\mu_r=1$), the previous equation reduces to: $$\nabla \times(\nabla \times\mathbf{E})-k_0\textsuperscript{2}\varepsilon_r\mathbf{E}=0 \label{eq2}$$ Here $k_0$ is the incident wavevector in vacuum or air ($k_0 = 2\pi/\lambda$), while $\varepsilon_r$ represents the material dielectric permittivity. By providing as an input the values of real and imaginary parts of the refractive index of any considered material, the software retrieves the corresponding dielectric permittivity ($\varepsilon_r$) and numerically solves Eq. \[eq2\] to obtain the $\mathbf{E}$ field distribution. Scattering parameters (S-parameter) for transmittance ($S_{21}$) and reflectance ($S_{11}$) are computed (See Supporting information). In order to simulate the behavior of TM and TE light in a 3D environment, it is necessary to properly write the components of the electromagnetic fields with respect to the incidence plane ($xz$) and set the polarizations accordingly: $\mathbf{H}= (0,1,0)$ for TM and $\mathbf{E}=(0,1,0)$ for TE.[@lio2019comprehensive] As we can see in Figure \[fig:2\]b, the calculated transmittance for the CMH-HMM turns out to be zero in all the considered vis-NIR regions, while the reflectance spectrum, calculated for a TM and $\theta_i = 50^\circ$, is totally modified respect to the reflectance of the HMM and the Au helix array considered separately (see Figures 1b-1d). In particular, we can distinguish three reflectance minima at 635 nm (mode A), 710 nm (mode B) and 890 nm (mode C). It is important to note that these reflectance dips are closely related to the geometrical and material properties of the designed CMH. In fact, considering an out-of-plane 3D pillars hypergrating characterized by
arxiv
template <class T1, class T2> struct promote_args_2 { // Promote, if necessary, & pick the wider of the two floating-point types. // for both parameter types, if integral promote to double. typedef typename promote_arg<T1>::type T1P; // T1 perhaps promoted. typedef typename promote_arg<T2>::type T2P; // T2 perhaps promoted. typedef typename mpl::if_< typename mpl::and_<is_floating_point<T1P>, is_floating_point<T2P> >::type, // both T1P and T2P are floating-point? typename mpl::if_< typename mpl::or_<is_same<long double, T1P>, is_same<long double, T2P> >::type, // either long double? long double, // then result type is long double. typename mpl::if_< typename mpl::or_<is_same<double, T1P>, is_same<double, T2P> >::type, // either double? double, // result type is double. float // else result type is float. >::type >::type, // else one or the other is a user-defined type: typename mpl::if_< typename mpl::and_<mpl::not_<is_floating_point<T2P> >, ::boost::is_convertible<T1P, T2P> >, T2P, T1P>::type>::type type; }; // promote_arg2 // These full specialisations reduce mpl::if_ usage and speed up // compilation: template <> struct promote_args_2<float, float> { typedef float type; }; template <> struct promote_args_2<double, double>{ typedef double type; }; template <> struct promote_args_2<long double, long double> { typedef long double type; }; template <> struct promote_args_2<int, int> { typedef double type; }; template <> struct promote_args_2<int, float> { typedef double type; }; template <> struct
github
Colorado is home to many 14,000-foot peaks. Part of the excitement of driving off-road in this region is the ability to take your 4x4 over high passes. While at the FJ Summit, we drove over Imogene Pass, the second highest in Colorado. There are six different passes one can drive over at FJ Summit, each one with an exhilarating crawl to the top. Most of the trails at FJ Summit can be done in a stock 4WD. Having better off-road tires will make traction and sidewall protection better on these dirt and rock trails. There is one trail that does require a higher degree of vehicle modification--Poughkeepsie Gulch. Lifted suspension, 33+ inch tires along with a rear locker and sliders are recommended. On wet and slippery days, a winch may also come in handy when going up “the wall.” This trail is popular with the daredevils, as the risk of vehicle damage does exist. FRIENDSThe FJ Summit offered a great opportunity to meet other Toyota 4WD enthusiasts and off-road forum regulars from IH8MUD and our sister site FJCruiserForums.com (http://www.fjcruiserforums.com/). It was nice putting a name to a face. You might show up by yourself at FJ Summit, but by the time you leave you will have made new friends. The environment lends itself to forging new friendships with other people that also enjoy exploring the outdoors in the 4x4s. With a dinner almost every night at FJ Summit HQ, and different parties around town, there’s no reason not to mingle on and off the trail. On “Night in Ouray,” the entire town was buzzing with FJ Summit participants exploring the local eateries and watering holes. We stopped at the Western Hotel where a large group of Summiteers gathered for a “presentation.” Cool frosty beer and soda was served in collector Metal Tech pint glasses. FAMILY We can’t forget the family. The FJ Summit is very family friendly. We met other adventure parents that also brought their little tikes on the trail. The FJ Summit does offer some trail rides that allow for more stops, which are a blessing when you’re trying to juggle kids, bottles, cameras and diapers. We brought our
pile-cc