text
stringlengths 173
4.38k
| subset
stringclasses 13
values |
|---|---|
The following sections are organized as follows: In Sec. \[sec:fw\_methodology\] we discuss the methodology for multipole extraction with the AMIAS and the inclusion of parameters with known uncertainties. In Sec. \[sec:fw\_pseudo\] we detail the creation of pion photoproduction pseudodata of predetermined statistical precision. The multipole content of those pseudodata is derived in Sec. \[sec:fw\_results\] validating the methodology described in Sec. \[sec:fw\_methodology\]. In Sec. \[sec:fw\_bates\] we apply the same methodology for a re-analysis of the Bates/Mainz electroproduction data [@sparveris2005investigation] measured at $Q^2=0.127$ $GeV^2/c^2$ and $W=1232$ $MeV$. Concluding remarks are given in Sec. \[sec:fw\_conclusions\].
Methodology {#sec:fw_methodology}
===========
The methodology employed is the implementation of the Chew, Goldenberg, Low and Nambu (CGLN) theoretical framework [@chew1957relativistic] for single energy multipole analyses in the Athens Model Independent Analysis Scheme (AMIAS) [@stiliaris2007multipole; @papanicolas2012novel]. The AMIAS method is based on statistical concepts and relies heavily on Monte Carlo and simulation techniques, and it thus requires High Performance Computing as it is computationally intensive. The method identifies and determines with maximal precision parameters that are sensitive to the data by yielding their Probability Distribution Functions (PDF). The AMIAS is computationally robust and numerically stable. It has been successfully applied in the analysis of data from nucleon photo-and electroproduction resonance [@markou1; @stiliaris2007multipole; @RevModPhys.84.1231], lattice QCD simulations [@alexandrou2015novel] and medical imaging [@loizospseudo].
AMIAS requires that the parameters to be extracted from the experimental data are explicitly linked via a theory or a model [@stiliaris2007multipole]. In the case of pion photoproduction this requirement is provided by the CGLN theory as in ref. [@markou1] and in the case of electroproduction as in ref. [@stiliaris2007multipole]. The multipoles are connected to the pion photoproduction observables via the CGLN [@chew1957relativistic
|
arxiv
|
<title>CMSIS-DSP: ARMCM3 Directory Reference</title>
<link href="tabs.css" rel="stylesheet" type="text/css"/>
<link href="cmsis.css" rel="stylesheet" type="text/css" />
<script type="text/javascript" src="jquery.js"></script>
<script type="text/javascript" src="dynsections.js"></script>
<link href="navtree.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="resize.js"></script>
<script type="text/javascript" src="navtree.js"></script>
<script type="text/javascript">
$(document).ready(initResizable);
</script>
<link href="search/search.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="search/search.js"></script>
<script type="text/javascript">
$(document).ready(function() { searchBox.OnSelectItem(0); });
</script>
<link href="stylsheetf" rel="stylesheet" type="text/css" />
</head>
<body>
<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
<div id="titlearea">
<table cellspacing="0" cellpadding="0">
<tbody>
<tr style="height: 46px;">
<td id="projectlogo"><img alt="Logo" src="CMSIS_Logo_Final.png"/></td>
<td style="padding-left: 0.5em;">
<div id="projectname">CMSIS-DSP
 <span id="projectnumber">Version 1.4.4</span>
</div>
<div id="projectbrief">CMSIS DSP Software Library</div>
</td>
</tr>
</tbody>
</table>
</div>
<!-- end header part -->
<div id="CMSISnav" class="tabs1">
<ul class="tablist">
<li><a href="../../General/html/index.html"><span>CMSIS</span></a></li>
|
github
|
This makes sense for a computer that is acting as a server. If you are logged in from multiple locations, and you enter the password for sudo in your current location, all the other locations are still “safe” since the person using the other terminals will still have to enter the password to use sudo. But when it comes to desktop use, this behaviour can be an annoyance.
I hate being prompted again and again for the sudo password (and the graphical gksudo password). For me, on my laptop, I want the sudo password to be “shared” between the different terminal windows, and with gksudo. It would be nice if the timestamp on the password was “global” to all terminals, and all the “gksudo” menu entries.
I ensure this by changing the following line in /etc/sudoers:Defaults !lecture,tty_tickets,!fqdn
toDefaults !lecture,!tty_tickets,!fqdn
Here, tty_tickets refers to “terminal tickets”, and I just changed it from using one ticket per terminal, to a common ticket, globally.
Again, this is not recommended for server installs, but may make life a little easier for average Joe Desktop Users.
I’m not sure how secure this is. I’m already not confortable with sudo remembering the password…
Imagine some malware that uses sudo to get root privileges. if sudo remembers the pass, it wont ask for it and the malware will get the permissions right aware. than, you’re pretty much screwed.
Root concept for desktop users should not be in the focus of security discussions. System configuration data is wrecked by automatic updates every two or three weeks in ubuntu, so the occasional user error will only be a drop in the bucket.
Furthermore, user data stored in HOME should be protected a lot better than the rest of the system for user privacy issues. It isn’t the sixties anymore, unix is used as a home computing OS nowadays.
@randomwalker You don’t seem to have understood. If I gain access to ‘the stuff in /’, then I have elevated privileges, very likely root. That gives me access to your files in $HOME, and much worse, it also enables me to install Trojaned executables that log your passwords and send them to a dead-drop in Albania that I monitor via my botnet.
|
pile-cc
|
-2/83
What is 304/80 + 32712/(-8265)?
-3/19
Calculate (54/(-2))/((-19488)/14210 - (-9)/5).
-63
Calculate 280/(-525)*987/(-376).
7/5
What is the value of 9/(-6) - (-370)/12 - ((-12)/18 - -1)?
29
2012452/41678 + (-36)/28 + 1
48
Calculate 62757/(-8667) + 2/9 - 1652/(-236).
-2/107
What is 30 - ((-440016)/(-192))/103?
31/4
Evaluate (3/5*(-10)/8)/(((-1985980)/(-3488))/911).
-6/5
Calculate ((-190)/(-76) - ((-5260)/24)/5) + 2/3.
47
1*(59 - (16 + 44))
-1
What is (-7 - (35 + -61))*1 + 3346/(-176)?
-1/88
Evaluate ((-54)/36*2)/((-108)/(-1692)).
-47
What is 2 - ((-20)/1 + (5 - 74) + 84)?
7
Calculate -18 - 3 - -12 - 10.
-19
311/132 + 63 + (-31320)/495 - 5/6
5/4
Evaluate (8/58)/((-454132)/(-134386)).
2/49
((-2090)/(-570))/((-22)/36)
-6
What is -25 - (-28 + 9 - 36) - 2?
28
(682/33)/((-502)/753)
-31
Evaluate -1*(4 + 2 - 1)*24274/1145.
-106
31 - (27 - -4) - (3 - 26)
23
(277/(-831))/(4 + -11 + 16621/2376)
72
Calculate (((-54)/60)/((-137)/(-15) - 9))/((-1827)/168).
18/29
Evaluate (541025/25194 + 86/(-4))/(3/(18/5)).
-2/65
What is the value of 76/6 + ((46 + 20)/(-726) - (-87)/(-11))?
14/3
What is the value of ((-4)/(-5))/((-4059)/165 + (-20)/(
|
dm_mathematics
|
---------------------- Forwarded by Steven J Kean/NA/Enron on 09/01/2000
07:55 AM ---------------------------
Mona L Petrochko@EES
08/29/2000 04:38 PM
To: Douglas Condon/SFO/EES@EES, Martin Wenzel/SFO/HOU/EES@EES, James M
Wood/HOU/EES@EES, Dennis Benevides/HOU/
|
enron_emails
|
"Loan Fee $ 448.00
Appraisal Fee 80.00
Grand Forks Abstract Company 300.50
Title Examination 60.00
Interest to 8/1/80 3,779.19
Symington Construction 42,300.00
Sherwin Williams 175.03
Ronan Drywall 1,050.00
Wes Rodgers 500.00
Simonson Lumber 1,200.00
Lunski Plumbing 1,521.00
Vaaler Insurance 143.00
Credit to LP # 10, 923-0 1,072.00
P & I P.I. # 1106-2 72.02
Goodmans 1,881.81
Plywood Minnesota 229.30
Woodland Construction 1,860.15
Ireland's Lumber 200.00 $56,872.00"
On August 19, 1980, the Weissers signed loan settlement statements indicating advances (other than appraisal fee, legal fee, service charge, abstracting, and interest) on one duplex of $52,158.87 and on the other duplex of $52,204.31. The loan settlement statements contained the following language immediately above the Weissers' signatures:
"The undersigned acknowledges the receipt of this Loan Settlement Statement, and agrees to the correctness thereof, and authorizes and ratifies the disbursement of the funds as stated therein."
In its conclusions of law, the trial court determined:
"3. The loan settlement statements signed by the plaintiffs did not absolve Grand Forks Federal from liability to the plaintiffs as the statements were signed after the damage was incurred and after there was nothing the plaintiffs could do about it."
The Weissers assert that the ratifications were ineffective because they did not have full knowledge of what had happened; neither the loan settlement statements nor the letters furnished the Weissers explained how the disbursements were made; the damage was already done and appeared irreparable, suggesting an absence of consideration; the loan settlement statements were signed due to an inducementrefinancingoffered by Grand Forks Federal; and Grand Forks Federal had a fiduciary duty to the Weissers.
While we do not agree with Weissers' assertion that there was no consideration for the ratification, as additional funds
|
freelaw
|
I know there are a lot of experiences out there that frustrate people, and that they'd like to see done better (think cloud storage pre Dropbox), but unless you <i>have</i> one of those problems, it's pretty tricky to know that it exists, and even then, it's tricky to know that there's a sizeable market for it. But if people could post their frustrations online, it would be pretty easy for would-be entrepreneurs to find good markets, and the rest of us would get better products...seems like a win-win to me. Thoughts?
======
SABmore
Yes. I had a similar thought last year, registering
ideaserving/ideaservingsize.com, but obviously never did anything with it. My
thought was to have folks post their ideas, and each day you'd see/get a list
of 3-4 new ideas. If you liked one of the ideas you could then connect with
the submitter. All the best.
------
breathesalt
Be lean. Create a stack exchange proposal at
<http://area51.stackexchange.com/>, make a new HN post linking to it, and
we'll see where this goes. But anyone interested should try making the
proposal, since it seems the OP has already lost interest.
------
brittohalloran
YEAH. I always thought this would be a good idea. A place to post good ideas
that I don't want to or have the time or means to do. An "idea exchange". I
half think that something like this already exists, but I've never seen it.
------
ohnivak
Infinitly scalable real-time website analytics and server monitoring.
<http://vanillamonitor.com>
------
bmelton
Not saying it should deter you, but there are a LOT of sites that already do
this. The first that I know of was either "shouldexist.org"[1] or "The
Halfbakery"[2], but there are more. [1] - <http://shouldexist.org/>
[2] = <http://halfbakery.com>
<http://Thinkcycle.org>
<http://ideaexplore.net/>
<http://www.
|
hackernews
|
The mechanism of oncogenic activation of the newly discovered erbB-2 growth factor receptor-like gene is being studied. A wide variety of human tumors contain an amplified and/or overexpressed erbB-2 gene. To study the role of overexpression of this gene in the initiation of oncogene transformation in a controlled in vitro model system, we engineered eukaryotic expression vectors to direct the synthesis of erbB-2 mRNA either under the control of a strong promoter (LTR) or of a
|
nih_exporter
|
To investigate patients' mobility and satisfaction with their lower-limb prosthetic or orthotic device and related service delivery in Sierra Leone; to compare groups of patients regarding type and level of assistive device, gender, area of residence, income; and to identify factors associated with satisfaction with the assistive device and service. A total of 139 patients answered questionnaires, including the Quebec User Evaluation of Satisfaction with Assistive Technology questionnaire (QUEST 2.0). Eighty-six percent of assistive
|
pubmed_abstracts
|
######
Postoperative implant related complications in patients.
**Complications** **No (n)** **Percentage (%**
------------------------------------------ ------------ -------------------
**Coccygodynia** 7 15
**Screw head prominence on convex side** 3 6
**Bed sore** 2 4
**Loosening of implants** 1 2
**Total** 13 27
Total numbers of complications were divided by 48 to find out complication rate (2 patients died perioperatively).
These were mainly implant or fixation related complications. These were 7 patients (15%) had coccygodynia postoperatively, 6 patient had DMD and one had SMA. All patients had significant tenderness clinically over the coccyx with mild subluxation of the coccyx radiologically (Figure [1](#F1){ref-type="fig"}). All patients were treated conservatively with the use of soft cushions having round hole in the weight bearing area. Symptoms in 6 patients were decreased within six months. The remaining patient was a 13-year boy with DMD who ultimately required excision of subluxated coccyx. His symptom was relieved within six months after coccygeal excision. Two patients (4%) developed bedsore postoperatively; one was related with impingement of iliac screw with loosening which was treated with removal of screw; while another had gluteal sore which were treated with dressings and frequent position changes. Gluteal sores were considered to be due to neglected care of patients which was not due to implants or fixation related problems in the series. There were three patients (6%) who had problem due to screw head prominence on convex side; one had pain due to irritation from screw head and two had back sore due to impingement of screw head. All of them were treated with removal of at least three screws including most prominent screws and reconstructing the rod (Figure [2](#F2){ref-type="fig"}). After the revision operation all problems due to screw head resolved completely. There was one case with loosening of the screw from the distal level which was treated with reopening the site and fixing it again. There was no case with rod or screw breakage.
![**shows a) preoperative AP and lateral sitting radiogram of a 13-year old boy with DMD with Cobb angle 50-degree operated by posterior only ped
|
pubmed_central
|
public event EventHandler<BaseExceptionEventArgs> OnEventHandler
{
add { _onEvent += value; }
remove { _onEvent += value; }
}
/// <exception cref="Exception">A delegate callback throws an exception.</exception>
public void PostEvent(string message, BaseExceptionEventArgs.ExceptionLevel exceptionLevel,
Exception exception = null)
{
if (_onEvent == null) return;
if (exception == null)
{
var e = new BaseExceptionEventArgs(message, exceptionLevel);
_onEvent(this, e);
}
else
{
var e = new BaseExceptionEventArgs(message, exceptionLevel, exception);
_onEvent(this, e);
}
}
}
A:
The first thing I would do is change your constructor:
private readonly NetworkCredential credentials;
public ftpHelper(string ftpHostname, string ftpUsername, string ftpPassword)
{
credentials = new NetworkCredential(ftpUsername, ftpPassword);
Hostname = ftpHostname;
}
That eliminates newing up credentials all over your code.
As for the rest of your code, I think a few well named functions will make the code much more readable. For example, getting a list of files:
private IEnumerable<string> ListDirectories(string remoteFtpPath)
{
var url = $"ftp://{Hostname}{remoteFtpPath}"; // Is this right? Not used C#6 yet...
var request = (FtpWebRequest)WebRequest.Create(url);
request.Method = WebRequestMethods.Ftp.ListDirectory;
request.Credentials = credentials;
request.Proxy = null;
var directories = new List<string>();
using (var response = (FtpWebResponse)request.GetResponse())
using (var responseStream = response.GetResponseStream())
using (var reader = new StreamReader(responseStream))
{
while (!reader.EndOfStream)
{
directories.Add(line);
}
}
return directories;
}
You could write the above using yield
|
stackexchange
|
Telecommunications is a rapidly changing field of technology. Consequently, the field of telecommunications is replete with prior art references that show advancements in most every piece of equipment associated with the telecommunications industry. The most noticeable advancements to the field of telecommunications may be those occurring to the simple telephone. In recent years, the telephone has undergone a transformation from a simple way to communicate to a far more sophisticated apparatus that utilizes multimedia technologies. With the advent of cellular telecommunications networks, portable telephones and car telephones have become commonplace. Similarly, with the advent of facsimile transmission technology, "fax" machines have become commonplace, as are telephones integrated with fax machines. However, telephones are no longer being considered just voice or facsimile transmitters and receivers. Rather, telephones are now being integrated into highly sophisticated portable computers, thereby transforming the simple telephone into a more versatile multimedia device. For instance, certain telephones are being manufactured with large display screens and sophisticated microprocessors that store and run complex software. As such, the person may use the device either as a telephone or as a personal computer, running any software currently available. Such software is capable of creating complex graphic images on the display screen of the device, wherein, with a few simple commands, the information on the display screen can be transmitted as a facsimile transmission. Similarly, any such prior art device can receive facsimile transmissions sent to it, via a cellar telecommunication network or a hard-wire telephone line interface. Such portable devices that are part telephone, part facsimile machine and part personal computer are sometimes referred to as personal digital assistants (PADs) an example of which is being sold by A.T.&T. under the mark EO 440 Personal Communicator. A listing and description of most commercially marketed portable handheld computer devices with pen-write screens is made in an article by Christopher Barr et al. entitled Pen Pals, PC Magazine Volume 12, Number 17 pgs. 116 et seq. (October 1993).
Although the innovations in telephone equipment technology result in a far more versatile and useful telecommunications tool, the products currently being produced do contain certain disadvantages. For instance, many prior art multimedia telephones require a special stylus to create graphic images on the electronic display of the device. As a result, there is no hard copy of what is being entered onto the electronic display. Consequently, to obtain a hard copy of what is shown on the display, the device must be either coupled to a printer or the information downloaded to a disk which
|
uspto_backgrounds
|
Description
The head of the snake is clearly differentiated from the neck, and flattened slightly. The nose protrudes beyond the lower jaw. The eyes are vertical ellipses. The body is rounded above, and flat on the belly. A holotype for the species had a snout-to-vent length of 25.2 centimeters, and a tail-length of 6.4 centimeters, giving it a total length of 31.6 centimeters.
The body of the snake is black on the back and tail, with 12 white stripes across the back and six across the tail. The stripes are 3-5 scales wide along the top, widening to 5-9 scales on the sides. The first two bands are completely black, while the rest have black speckles on them. The top of the head is black with lighter markings, while the underside of the head and body is white.
Reproduction
Lycodon cardamomensis is oviparous, or egg-laying.
Phylogeny
Lycodon cardamomensis is a member of the genus Lycodon, a genus of snakes commonly known as wolf snakes. The genus belongs to the snake family Colubridae, the largest snake family, with member species being found on every continent except Antarctica.
Habitat & ecology
L. cardamomensis is a terrestrial nocturnal species, which has been observed in both primary and secondary forest. It has been observed at altitudes of between 500 and 700 meters above sea level.
Distribution
L. cardamomensis has been observed in Pursat Province of Cambodia, as well as in Eastern Thailand. It is thought to be endemic to the Cardamom Hills of that region. Erroneous records exist from the highlands of Vietnam, as well as some records from the same region that have yet to be verified.
Conservation
The range of the species overlaps with the protected area of the Phnom Samkos Wildlife Sanctuary, but no species-specific conservation measures exist. The species might be under threat from logging and forest degradation in its range, as well as from hunting by individuals who mistake it for the venomous Malayan krait; however, the impacts of these potential threats are currently unknown. The International Union for Conservation of Nature lists it as "Data deficient" due to the small number of specimens observed, and the lack of knowledge of its response to logging and hunting.
References
External
|
wikipedia_en
|
*Quantum state estimation*, No. 649 in Lect. Notes Phys., M. Paris and J. Řeháček, eds., (Springer, Heidelberg, 2004).
D. Gross, Y.-K. Liu, S. T. Flammia, S. Becker, and J. Eisert, Phys. Rev. Lett. **105**, 150401 (2010).
A. Shabani, R.L. Kosut, M. Mohseni, H. Rabitz, M.A. Broome, M.P. Almeida, A. Fedrizzi, and A.G. White, Phys. Rev. Lett. **106**, 100401 (2011).
S. T. Flammia and Y.-K. Liu, Phys. Rev. Lett. **106**, 230501 (2011).
M. P. da Silva, O. Landon-Cardinal, and D. Poulin, Phys. Rev. Lett. **107**, 210404 (2011).
L. Steffen, M. P. da Silva, A. Fedorov, M. Baur, and A. Wallraff, Phys. Rev. Lett. **108**, 260506 (2012).
A. Bendersky, F. Pastawski, and J.P. Paz, Phys. Rev. Lett. **100**, 190403 (2008).
J. Emerson, M. Silva, O. Moussa, C. Ryan, M. Laforest, J. Baugh, D.G. Cory, R. Laflamme, Science **317**, 1893 (2007).
D.M. Reich, G. Gualdi, and C.P. Koch, Phys. Rev. A **88**, 042309 (2013); arXiv:1305.5649 (2013).
H.F. Hofmann, Phys. Rev. Lett. **94**, 160504 (2005).
R. Okamoto, H.F. Hofmann, S. Takeuchi, and K. Sasaki, Phys. Rev. Lett. **95**, 210506 (2005).
X.H. Bao, T.Y. Chen, Q. Zhang, J. Yang, H. Zhang, T. Yang, and J.W. Pan, Phys. Rev. Lett. **98**, 170502 (2007).
|
arxiv
|
* the Initial Developer. All Rights Reserved.
*
* Contributor(s):
*
* Alternatively, the contents of this file may be used under the terms of
* either the GNU General Public License Version 2 or later (the "GPL"), or
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
* in which case the provisions of the GPL or the LGPL are applicable instead
* of those above. If you wish to allow use of your version of this file only
* under the terms of either the GPL or the LGPL, and not to allow others to
* use your version of this file under the terms of the MPL, indicate your
* decision by deleting the provisions above and replace them with the notice
* and other provisions required by the GPL or the LGPL. If you do not delete
* the provisions above, a recipient may use your version of this file under
* the terms of any one of the MPL, the GPL or the LGPL.
*
* ***** END LICENSE BLOCK ***** */
#ifndef nsJVMPluginTagInfo_h___
#define nsJVMPluginTagInfo_h___
#include "nsIJVMPluginTagInfo.h"
#include "nsAgg.h"
/*******************************************************************************
* nsJVMPluginTagInfo: The browser makes one of these when it sees an APPLET or
* appropriate OBJECT tag.
******************************************************************************/
class nsIPluginTagInfo2;
class nsJVMPluginTagInfo : public nsIJVMPluginTagInfo {
public:
NS_DECL_AGGREGATED
/* from nsIJVMPluginTagInfo: */
/* ====> These are usually only called by the plugin, not the browser... */
NS_IMETHOD
GetCode(const char* *result);
NS_IMETHOD
GetCodeBase(const char* *result);
NS_IMETHOD
GetArchive(const char* *result);
NS_IMETHOD
GetName(const char* *result);
NS_IMETHOD
GetMayScript(PRBool *result);
/* Methods specific to nsJVMPluginInstancePeer: */
/* ====> From here on are things only called by the browser,
|
github
|
TomWanderer wrote:Gotcha! If that's the case and 24" scale is the ticket, those Squire Mustangs and Duos from a few years back really are great. Not sure why the newer HH ones are SO cheap, but the single coil ones from 2008-11ish are quality.
well, guitar center has the Olympic white ones that are not really available online- plus packages have been disappearing from our front porch lately- So I picked up the HH on the way to practice last night.
Super impressed for the money- I think I need to do a bit of tweaking to the pickup heights, the low E didn't intonate perfectly out of the box, and the high E nut slot 'sitars' a bit...but I've had $2500 gibsons come out of the box much worse.
Plays nice, sounds good. I'm going to wrestle w/ the intonation tonight, make sure it is totally playable, then might do a little fine tuning to the nut, frets, etc.
TomWanderer wrote:Gotcha! If that's the case and 24" scale is the ticket, those Squire Mustangs and Duos from a few years back really are great. Not sure why the newer HH ones are SO cheap, but the single coil ones from 2008-11ish are quality.
well, guitar center has the Olympic white ones that are not really available online- plus packages have been disappearing from our front porch lately- So I picked up the HH on the way to practice last night.
Super impressed for the money- I think I need to do a bit of tweaking to the pickup heights, the low E didn't intonate perfectly out of the box, and the high E nut slot 'sitars' a bit...but I've had $2500 gibsons come out of the box much worse.
Plays nice, sounds good. I'm going to wrestle w/ the intonation tonight, make sure it is totally playable, then might do a little fine tuning to the nut, frets, etc.
I just looked those up, and, holy shit, those are $150 NEW?? Hard to go wrong. Plus, the description on the GC website starts with "Perfect for the raucous sound of indie music, the Bullet Mustang HH is just plain fun to play."
I need to do some work to level the f
|
pile-cc
|
4/17
What is prob of picking 1 a and 2 e when three letters picked without replacement from eeaewaiwieiwiiiiii?
1/68
Calculate prob of picking 1 v, 1 n, and 1 e when three letters picked without replacement from {n: 4, v: 4, e: 11}.
176/969
Three letters picked without replacement from {a: 3, q: 2}. Give prob of picking 2 q and 1 a.
3/10
Four letters picked without replacement from udedidhudreuduu. Give prob of picking 2 e, 1 r, and 1 i.
1/1365
Three letters picked without replacement from {r: 2, o: 1, v: 1, k: 4, b: 5, f: 2}. What is prob of picking 3 k?
4/455
Three letters picked without replacement from {b: 4, g: 3, i: 4, l: 3}. Give prob of picking 1 i and 2 l.
3/91
Calculate prob of picking 2 k and 1 w when three letters picked without replacement from {k: 10, w: 4}.
45/91
Calculate prob of picking 1 r, 1 x, 1 l, and 1 p when four letters picked without replacement from rlxziipxpzrzpz.
12/1001
What is prob of picking 3 n when three letters picked without replacement from nsaannnna?
5/42
Calculate prob of picking 2 x when two letters picked without replacement from {x: 1, r: 1, c: 1, y: 2, t: 2}.
0
Two letters picked without replacement from vsssvvsssvs. What is prob of picking 2 v?
6/55
Two letters picked without replacement from kkeek. Give prob of picking 2 k.
3/10
Two letters picked without replacement from {z: 1, b: 7}. What is prob of picking 1 b and 1 z?
1/4
What is prob of picking 1 v, 1 b, and 2 z when four letters picked without replacement from {b: 1, z: 2, v: 2, s: 1, i: 1}?
2/35
Calculate prob of picking 3 k when three letters picked without replacement from hhkhhhhhkhhkkhhhkhh.
10/969
Calculate prob of picking 1
|
dm_mathematics
|
After speaking with Danny Conner, I have created deal 606396 to cover this
meter for the next year.
D
Michael Olsen@ENRON
02/05/2001 03:06 PM
To: Daren J Farmer/HOU/ECT@ECT
cc:
Subject: meter 986315
For Dec. and Jan. production there are flow volumes without a deal. Deal
502952 was good for November. Do
|
enron_emails
|
petition to revoke, the State introduced a copy of a laboratory report. Appellant objected to
the admission of the report, arguing that, because the analyst who prepared the report was not
present to testify, admission of the report would violate his rights under the Confrontation
Clause of the Sixth Amendment to the United States Constitution. The trial court overruled
the objection, and the report was admitted into evidence.
At the conclusion of the hearing, the trial court found that appellant violated the terms
of his suspended sentence by possessing drugs and drug paraphernalia and revoked his
suspended sentence. Appellant was sentenced to a total of 240 months’ imprisonment.1 This
timely appeal followed.
On appeal of a revocation, our review is directed toward determining whether the trial
court’s findings are clearly against the preponderance of the evidence. Patrick v. State, 2010
Ark. App. 541. In order to revoke the terms of probation, the State must prove by a
preponderance of the evidence that the defendant violated a condition of his probation. Id.
Appellant does not challenge the sufficiency of the evidence to support his revocation.
Instead, he argues that the trial court violated his constitutional right to confront witnesses
1
The sentencing order mistakenly states that appellant was placed on suspension or
probation and that the circuit court retained jurisdiction during the period of suspension
or probation. The order as a whole makes it clear that appellant was sentenced to a term
of imprisonment with no suspension or probation.
2
Cite as 2013 Ark. App. 466
against him when it allowed a copy of a laboratory report into evidence when the analyst who
prepared the report did not testify at the hearing.
In support of his argument, appellant cites Melendez-Diaz v. Massachusetts, 557 U.S. 305
(2009), in which the Supreme Court of the United States held that the admission of a lab
report without the testimony of the person who created the report violated a defendant’s
rights under the Confrontation Clause. The right to confront witnesses does apply to
revocation proceedings. Goforth v. State, 27 Ark. App. 150, 767 S.W.2d 537 (1989).
However, a defendant shall give at least ten days’ notice prior to the proceedings that he or
she requests
|
freelaw
|
Hackers steal card data from Neiman Marcus - panarky
http://krebsonsecurity.com/2014/01/hackers-steal-card-data-from-neiman-marcus/
======
nikcub
Notice the pattern to all of these - the hacks are only discovered _after_ the
cards have already been charged and the card companies piece together where
the possible source could have been by looking at common purchases.
That is the state of security at the moment, not only is it easy to hack into
sites, but it is easy to cover you tracks and not be discovered.
Vendors have resorted to trawling the carding forums and buying up dumps to
figure out who has been hacked.
I can't remember the industry ever being so imbalanced towards the black hats.
~~~
magic_haze
Is there any reason why these stores need to store the full magnetic stipe
details of the card in the first place?
~~~
MartinCron
I would expect the credit card companies would require that they _not_ store
the entire card swipe data (or the PIN for that matter).
~~~
magic_haze
That is what I thought as well, but details on the Target hack suggests they
managed to get hold of the cards' entire track data (I'm on my phone so can't
link to the article directly, but it's on the same website as OP's link) I'm
guessing NM has the same data policy.
~~~
ForHackernews
I thought the theory was that the target hack was targeted at POS card-
readers, not recovering numbers after the fact from a database.
~~~
cynwoody
It was.
But in order to pull it off on the scale they did, the bad guys must have
broken into Target's corporate network. Apparently, the level of access they
achieved allowed them to raid the marketing database as well as to hack large
numbers of POS terminals to leak the card swipe data.
The marketing database, BTW, contained name and contact information, but not
credit card details. The bad guys might find it useful for phishing attacks.
------
interstitial
All these revelations are timed too perfectly. It is obviously a crypto-
currency conspiracy to drive credit card transactions out
|
hackernews
|
This Phase I application offers a novel approach to the development of a recombinant immunotoxin consisting of a tumor antigen (EGP-2)-specific single chain antibody fused to the enzyme glucose-oxidase (GO). The goal of this proposal is to achieve high level expression of this immunotoxin in the yeast, saccharomyces cervisiae, and to determine the feasibility of its use as an anticancer agent. Preliminary evidence indicates that this GO-based immunotoxin exhibits specific binding to the EGP-2
|
nih_exporter
|
Two newborn infants with ichthyosis, one with lamellar ichthyosis and one with nonbullous ichthyosis form erythroderma, who presented at birth with a collodion baby appearance, were treated with acitretin (1 mg/kg/day). Clinical improvement was achieved shortly after treatment. The second case received oral retinoid for 3.5 months and was followed for nine months. The result was excellent. The treatment resulted in a satisfactory improvement in
|
pubmed_abstracts
|
Analysis of the ASE by HPLC {#s0005}
---------------------------
The HPLC analysis was carried out on liquid chromatography system (Waters 2695, Milford, MA) equipped with a degasser, a quaternary pumps and photodiode array detection. A Luna C18 (150 mm × 4.6 mm, 5 μm) column maintained 30 °C, and the wavelength was recorded at 280 nm. The flow was set 0.8 mL/min. The analysis of mobile phase consisted of methanol (A) and 0.1% formic acid (B) was applied to gradient elute: 0 min, 5% A; 20 min, 60% A; 24 min, 60% A.
Animals and induction of RA {#s0006}
---------------------------
The 6--8-week-old Sprague--Dawley rats (weighing 180--200 g) were purchased from the Experimental Animal Centre of Guangdong Province and housed under laboratory temperature of 19--24 °C, relative humidity 40--60%, and 12 h light/dark cycle. The rats were allowed freely access to water and basal diets. The experimental procedures were approved by the Animal Ethics Committee of Xiamen University (Ethics no. SYXK (Min) 2013-0006) and animals studies were performed according to National Institutes of Health Guidelines of United States (National Research Council of United States, 1996). RA was induced in rats through the intradermal administration of CFA (0.1 mL) at the palmar surface of the right hind paw on day 0 of the experiment (Abd El-Ghffar et al. [@CIT0001]). The incomplete Freund\'s adjuvant (IFA) group of rats received intraplantar injection of IFA (0.1 mL). CFA consisted of 1.0 mg heat-killed *Mycobacterium tuberculosis* (strain H37Ra) suspended in 1 mL non-metabolizable oil, IFA contained non-metabolizable oil only. Paw swelling occurring in the right hind paw of rats was measured with vernier calliper every 7 days after RA induction. Body weight of rats were measured once a weekly after RA induction.
Experimental design {#s0007}
-------------------
Rats were randomly divided into seven groups of eight animals each as follows: *Control group*: rats which received the oral vehicle only (0.1% DMSO)
|
pubmed_central
|
I use delphi 2010 and clever internet suite component i upload a file and want to calculate the upload speed..
i tried this code but it gives me "INF" in the label + the wrong speed !
whats wrong in that code?
private
FBytesProceed : Int64;
FTimeStamp : TDateTime;
FSpeed : double;
end;
procedure TForm2.clHttp1SendProgress(Sender: TObject; ABytesProceed,
ATotalBytes: Int64);
var
LTimeStamp : TDateTime;
begin
LTimeStamp := Now;
if FBytesProceed < ABytesProceed then
begin
// calculating bytes per second
FSpeed := ( ABytesProceed - FBytesProceed ) {bytes}
/ ( ( LTimeStamp - FTimeStamp ) {days}
* 24 {hours}
* 60 {minutes}
* 60 {seconds} );
end;
FBytesProceed := ABytesProceed;
FTimeStamp := LTimeStamp;
label1.Caption := Format(' speed %n Kbps',[FSpeed / 1024]);
end;
A:
As you encountered, the resolution of the system timer isnt very good. I seem to recall that it can be as low as 50ms. Here's two ways to get around this, some of it depends on how your program is structured.
One, you can use a regular TTimer set to 2 second or whatever interval you'd like. Each time that fires you get the byte count, compare it to the last time the timing event fired, and set the caption with the upload rate. This would obviously only work if you're dealing with non-blocking uploads. If you dont want to use a TTimer, you can also do this in a separate thread, and have that check the upload every couple of seconds.
Another way is to keep doing what you are doing, but only update the upload rate after a second. What I'd recommend is using GetTickCount() instead of Now() (since you dont actually need the date, just a counter). GetTickCount() brings back an integer representing milliseconds, not a floating point value. Start a byte count at 0.
|
stackexchange
|
Various types of humidity sensors have been developed over the years. A cost-effective miniaturized solution is to employ a solid state sensing film that interacts with water vapor to convert the water vapor concentration into an electrical signal. Techniques for converting the water vapor concentration into electrical signals include capacitive sensing, thermoelectric sensing and magnetoelastic sensing. A typical electrical humidity sensor may sense water vapor concentration, by having a capacitance or impedance between two electrodes. The capacitance of impedance may vary with the relative permittivity of a polymer film. The relative permittivity of the polymer film may be sensitive to an amount of water vapor absorbed by the polymer film. The typical accuracy of this type of sensors may range from ±1.7% to ±5%, which can meet the requirements in some consumer electronics, for example for use in environmental sensing and medical devices for breath testing. Another method for measuring relative humidity may be to use a “chilled-mirror” dew-point hygrometer. A “chilled-mirror” dew-point hygrometer may include a miniature polished mirror that may be cooled by a Peltier thermoelectric heat pump until the mirror reaches the dew-point of the water vapor under test. When the dew point temperature has been reached, condensation will begin to form on the mirror surface. The “chilled-mirror” dew-point hygrometer may include an electro-optical loop to detect a reduction of the light intensity reflected from the mirror surface and thereby, detect that condensation. The typical accuracy of such a dew-point hygrometer may be ±0.1° C. according to relative humidity accuracy of ±0.014% at a relative humidity of 1%. The high accuracy of a “chilled-mirror” dew-point hygrometer may allow it to be applied to a range of high-end applications including metrology laboratories, aerospace, natural gas, petrochemical and meteorology. However, there are many barriers to using the “chilled-mirror” dew-point hygrometer, including its high cost, large size and slow response rate. Other potential disruptive solutions for high accuracy detection of relative humidity include carbon nanotubes and graphene which exhibit very high humidity sensitivity. However, such solutions still require further development in order to be understood and applied to practical applications.
As such, there is a need for a humidity sensor that can achieve high accuracy with a relatively fast response rate
|
uspto_backgrounds
|
John Emerich Henry Lyon-Dalberg-Acton, 3rd Baron Acton (born Dalberg-Acton; 15 December 1907 – 23 January 1989), was a British peer and soldier.
Early life and education
Acton was born in Bordighera, Liguria, Italy, the eldest son and third of nine children born to Richard Dalberg-Acton, 2nd Baron Acton, a diplomat in the foreign service. His mother was Dorothy Lyon, the only child of Thomas Henry Lyon of Appleton Hall, Cheshire. The fourth generation of his family abroad, the 2nd Lord Acton and his children officially became British citizens in 1911 by Act of Parliament.
The family was living in Germany when the war broke out. They were temporarily detained in Baden Baden in 1914. In 1915, Lord Acton became chargé d'affaires in Berne. In 1919, his father added the additional surname and arms of Lyon when Lady Acton inherited from her father. His mother died in 1923, when his youngest sister was just 2.
He was educated at the Royal Military College, Sandhurst and Trinity College, Cambridge. He succeeded to the family titles upon the death of his father in 1924.
His only brother, Richard William Heribert Peter Lyon-Dalberg-Acton (1909–1946), was killed in a plane crash in Gambia in 1946.
Honours
In December 1945, Acton was appointed to the Military Division of the Order of the British Empire as a Member. In February 1947, he was appointed to be a Deputy Lieutenant of the County of Salop but resigned his commission in November the same year because he stopped living in the county. In the 1964 New Year Honours, Acton was appointed to the Order of St Michael and St George as a Companion.
Personal life
Acton was a devout Catholic. He was a founder and president of the multiracial National Club in Salisbury, Rhodesia.
Family
He married Hon. Daphne Strutt (d. 2003), daughter of The 4th Baron Rayleigh, on 25 November 1931. The couple had eleven children:
The Honourable Pelline Margot Lyon-Dalberg-Acton (b. 24 December 1932)
The Honourable Charlotte Lyon-Dalberg-Acton (1934–1935)
The Honourable Catherine Lyon-D
|
wikipedia_en
|
Consider the $\star$, the Moyal star product [@Guralnik:2001pv] $$f(z)\star g(z)=e^{i\theta_{56}\partial_5\partial_{6'}}f(z)g(z')|_{z'\to z},$$ where $z=(y_5,y_6)$ are the extra dimensional coordinates while $z$ and $z'$ are independent variables. This product allows us to find a consistent $\Psi$ from Eq. \[eq:psi56\] with non-commutative phases as $$\begin{split}
\Psi(x,y_5,y_6)&=e^{i\beta_5^bT_by_5/2\pi R_5}\star e^{i\beta_6^bT_by_6/2\pi R_6}\tilde{\Psi}(x,y_5,y_6)\\
&=e^{i\beta_\star^b(y_5,y_6)T_b}\tilde{\Psi}(x,y_5,y_6)
\end{split}$$ where $\tilde{\Psi}$ are normal commutative and periodic functions of the extra dimensions. This is just a phase $\beta_\star$ and can be reabsorbed through a gauge transformation $$\Psi(x,y_5,y_6)\to e^{-i\tilde{\beta}_*^b(y_5,y_6)T_b}\star\Psi(x,y_5,y_6)=\tilde{\Psi}(x,y_5,y_6),$$ where $\tilde{\beta}_*^b$ is chosen to cancel the phase and it need not be equal to $\beta_*^b$ since the phases are mutiplied with the non trivial Moyal product. The gauge fields transform as $$A_{5,6}\to \tilde{A}_{5,6}+(\partial_{5,6} e^{i\beta_\star^bT_b})\star e^{-i\tilde{\beta}_*^b(y_5,y_6)T_b},$$ which after compactification is just a constant and behaves like an effective 4d constant VEV $$\braket{A_{5,6}}=\int dy^2 (\partial_{5,6} e^{i\beta_\star^bT_b})\star e^{-i\tilde{\beta}_*^b(
|
arxiv
|
.navbar-inverse {
background-image: -webkit-linear-gradient(top, #3c3c3c 0%, #222 100%);
background-image: linear-gradient(to bottom, #3c3c3c 0%, #222 100%);
filter: progid:DXImageTransform.Microsoft.gradient(startColorstr='#ff3c3c3c', endColorstr='#ff222222', GradientType=0);
filter: progid:DXImageTransform.Microsoft.gradient(enabled = false);
background-repeat: repeat-x;
}
.navbar-inverse .navbar-nav > .active > a {
background-image: -webkit-linear-gradient(top, #222 0%, #282828 100%);
background-image: linear-gradient(to bottom, #222 0%, #282828 100%);
filter: progid:DXImageTransform.Microsoft.gradient(startColorstr='#ff222222', endColorstr='#ff282828', GradientType=0);
background-repeat: repeat-x;
-webkit-box-shadow: inset 0 3px 9px rgba(0, 0, 0, .25);
box-shadow: inset 0 3px 9px rgba(0, 0, 0, .25);
}
.navbar-inverse .navbar-brand,
.navbar-inverse .navbar-nav > li > a {
text-shadow: 0 -1px 0 rgba(0, 0, 0, .25);
}
.navbar-static-top,
.navbar-fixed-top,
.navbar-fixed-bottom {
border-radius: 0;
}
.alert {
text-shadow: 0 1px 0 rgba(255, 255, 255, .2);
-webkit-box-shadow: inset 0 1px 0 rgba(255, 255, 255, .25), 0 1px 2px rgba(0, 0, 0, .05);
box-shadow: inset 0 1px 0 rgba(255, 255, 255, .25), 0 1px 2px rgba(0, 0, 0, .05);
}
.alert-success {
background-image: -webkit-linear-gradient(top, #dff0
|
github
|
The volatility of the digital currency markets was on display again Wednesday, as bitcoin briefly fell below $10,000 before rebounding back above $11,000 in the U.S. afternoon.
With the drop below $10,000, bitcoin had lost about half its value since hitting a high above $19,000 in mid-December. Other digital currencies bounced around as well.
Bitcoin has slumped 20 percent this week as traders worry that regulators in South Korea will crack down on trading of digital currencies. The price of bitcoin fell as much as 20 percent Wednesday, but later recovered and was nearly flat at $11,392 around 5:10 p.m. Eastern Time, according to Coindesk.
Bitcoin hasn’t caught on as a currency for buying things, as intended. But it has drawn huge interest from traders, and its price has soared over the past year, and has also had several sharp drops.
The price of one bitcoin went from $1,000 at the beginning of last year to nearly $20,000 in mid-December. The latest plunge brings the price back to where it was in early December.
Many financial pros believe bitcoin is in a speculative bubble that could crash any time.
The possibility that South Korea will ban or restrict virtual currency trading has weighed on traders’ minds the last few weeks because the nation is a major market for currencies like bitcoin.
Those worries have also depressed the prices of other digital currencies that gained sharply in recent months.
Ethereum fell 9 percent to $993 Wednesday, according to Coindesk. During the day it tumbled as much as 26 percent. Its current price is still roughly double where it was in November, and down sharply from its recent peak of $1,329 on Jan. 10.
Bitcoin and other digital currencies trade on private exchanges that have little regulation or protection for investors. In December two major financial exchanges, the Cboe and CME, started trading in bitcoin futures, which allow investors to make bets on the future price of bitcoin without actually holding bitcoins.
Bitcoin futures on the Cboe were little changed while CME-traded futures slipped 2 percent. Earlier they hit their lowest levels since trading began last month.
Bitcoin is extremely hard to value because it has no country or central bank backing it and it’s not widely used to make transactions. Its value is tied only to what people believe it is worth
|
pile-cc
|
Calculate prob of picking 1 d, 2 s, and 1 r when four letters picked without replacement from rssssdssrrssssssdd.
33/170
What is prob of picking 1 e and 1 q when two letters picked without replacement from {r: 2, w: 2, e: 2, j: 6, q: 1, u: 4}?
1/68
Two letters picked without replacement from {g: 2, h: 1, a: 1, f: 2, s: 1, n: 2}. What is prob of picking 2 f?
1/36
Two letters picked without replacement from dkooooekdeookec. Give prob of picking 1 e and 1 d.
2/35
Calculate prob of picking 1 d, 1 m, 1 s, and 1 r when four letters picked without replacement from rssdrddmddmmm.
16/143
Three letters picked without replacement from {x: 2, v: 2, p: 1, a: 1}. What is prob of picking 1 v and 2 x?
1/10
Two letters picked without replacement from zkk. Give prob of picking 2 k.
1/3
What is prob of picking 2 c when two letters picked without replacement from {c: 2, i: 1, o: 1, f: 1, e: 2}?
1/21
Calculate prob of picking 1 b and 1 t when two letters picked without replacement from {y: 1, t: 1, b: 3, v: 2}.
1/7
What is prob of picking 2 c and 2 n when four letters picked without replacement from jpppxncjnphhjpncjjp?
1/1292
Two letters picked without replacement from bbnnsgbsbbbnsbnu. What is prob of picking 2 s?
1/40
Two letters picked without replacement from {o: 1, g: 1, i: 3, k: 3, t: 5}. Give prob of picking 2 k.
1/26
Calculate prob of picking 3 j and 1 u when four letters picked without replacement from jujjujjjjujujuuujjj.
385/969
Two letters picked without replacement from uuuu. Give prob of picking 2 u.
1
What is prob of picking 1 j, 1 d, and 1 f when three letters picked without replacement from {u
|
dm_mathematics
|
From: Williams, Robert C.
Sent: Friday, April 27, 2001 2:56 PM
To: Derrick Jr., James; Haedicke, Mark; Sanders, Richard; Delainey, David;
Leff, Dan; Mahoney, Peggy; Sunde, Marty; Whalley, Greg
Cc: Sharp, Vicki
Subject: University of California/California State University
The Ninth Circuit Court of Appeals has scheduled an oral argument
|
enron_emails
|
his pro se lawsuit against former counsel whom he alleges
breached his contract, defrauded him of fees paid, and acted
negligently in failing to represent him in postconviction
proceedings. Both Chapa and Duncan are residents of Texas;
consequently, diversity jurisdiction does not exist. See 28
*
Pursuant to 5TH CIR. R. 47.5, the court has determined
that this opinion should not be published and is not precedent
except under the limited circumstances set forth in 5TH CIR.
R. 47.5.4.
No. 99-10335
-2-
U.S.C. § 1332; Getty Oil Corp. v. Insurance Co. of N. Am., 841
F.2d 1254, 1258-59 (5th Cir. 1988).
Chapa now argues that federal-question jurisdiction exists,
pursuant to 28 U.S.C. § 1331, because his claims against his
attorney are related to a federal criminal conviction. This
argument is specious; he has filed a lawsuit alleging claims of
fraud, breach of contract, and negligence, none of which, on
their face, implicates a federal right sufficiently to invoke
§ 1331, irrespective of the nature of his criminal conviction.
Chapa additionally argues that jurisdiction is somehow
grounded upon Federal Rules of Civil Procedure 55 and 60. These
rules, dealing with judgments and relief therefrom, have nothing
to do with jurisdiction. See Fed. R. Civ. P. 55 and 60.
Chapa renews his argument that jurisdiction existed under
§ 1331 because his attorney’s fraud had the effect of suspending
his habeas relief, in violation of the Suspension Clause, since
the limitations period for pursuing postconviction relief has
expired in his case. Even if it is assumed that Chapa may raise
a Suspension Clause claim in a civil action against his attorney,
his postconviction relief procedure is under 28 U.S.C. § 2255,
the limitations period of which is not constrained by the
Suspension Clause because a § 2255 motion is not a habeas corpus
action. See Turner v. Johnson, 177 F.3
|
freelaw
|
"The company has officially hired the goats following a procedure similar to
the one used when hiring humans: it made identity cards for goats, just as it
did for its human employees."
[1] [http://www.tokyotimes.com/amazon-japan-hires-goats-to-mow-
gr...](http://www.tokyotimes.com/amazon-japan-hires-goats-to-mow-grass/)
------
dalke
It takes 8 years for goat news to cross the Atlantic. ;) The NYT had an
article titled "In Tennessee, Goats Eat the ‘Vine That Ate the South’" in
2007, at
[http://www.nytimes.com/2007/06/05/us/05goats.html?_r=0](http://www.nytimes.com/2007/06/05/us/05goats.html?_r=0)
.
Tallahassee started using sheep in 1999 for kudzu. Unfortunately, people stole
10 of the sheep in 2001 ([http://jacksonville.com/tu-
online/stories/072701/met_6795173...](http://jacksonville.com/tu-
online/stories/072701/met_6795173.html) ) and another 21 in 2003
([http://www.heraldtribune.com/article/20031004/NEWS/310040550](http://www.heraldtribune.com/article/20031004/NEWS/310040550)
).
I can't find mention of Tallahassee still using animals for kudzu control.
------
Eye_of_Mordor
Aren't these goats also an invasive species?
~~~
zwieback
I was wondering about that too, hopefully nothing like the wild pigs that
plague Texas will happen with the goats. We might just have to bring in tigers
or something like that to control the goats later on...
~~~
pixl97
In general hogs breed 3 to 4 times faster based on litter size.
------
soneca
relevant map:
[http://www.washingtonpost.com/blogs/wonkblog/wp/2015/01/12/m...](
|
hackernews
|
CD45 is a transmembrane receptor-type protein tyrosine phosphatase (PTP) that is highly expressed on virtually all cells of the hematopoietic lineage. Expression of CD45 is essential for antigen activation as well as for the differentiation of T and B lymphocytes. A key advantage to the study of CD45 is that the outcome of experiments modifying CD45 can be measured with a relevant functional assay - i.e., antigen activation. The investigator has recently reported the use of novel methods to identify the in vivo, naturally
|
nih_exporter
|
We examined the effect of inhaled histamine on citric acid-induced coughs and clarified the role of ionotropic purinergic receptors in the resulting changes. Although the inhalation of 0.1 M citric acid by itself produced only a few coughs in guinea pigs, exposure to histamine, at concentrations of 0.3 to 1 mM, for 2 min concentration dependently increased the number of citric acid-induced coughs. This histamine-induced increase in the number of citric
|
pubmed_abstracts
|
Application of fluorescent dyes {#s3a}
-------------------------------
### SYTOX Green dye; the effect of staining time and concentration {#s3a1}
The minimal effective staining concentration of SYTOX Green dye for laboratory samples of *Phormidium autumnale* was between 0.2 and 0.3 µM in 3 replicates. At this dye concentration all nucleoids in alcohol and heat-pretreated cells exhibited bright and even fluorescence in the green spectral region, which was distinctly visible with a 510--550 optical cutoff filter set ([Fig. 1a](#pone-0055283-g001){ref-type="fig"}). Further staining with higher concentrations of the dye (up to 5 µM) did not increase fluorescence intensity. This treatment, as long as it passes through the membranes of the dead cells, confirmed the applicability of SYTOX Green dye to *Phormidium* cultures, since it is also the inactive control.
![*In situ* detection of cellular functions in cyanobacterium *Phormidium*\
***autumnale*** **.** **a--l**. Cultures of *Phormidium autumnale* 845 CCALA grown on BG-11 medium. **a.** SYTOX Green staining of formaldehyde-pretreated filaments; **b.** variable staining of live samples after 30 min incubation with 5 µM SYTOX Green; **c--d.** fluorescence and bright field image of CTC-stained filaments in active phase of growth; **e.** partially de-activated cells stained with CTC; **f--g.** INT-treated samples post-stained with SYTOX Green, cells that accumulated INT-formazan (**f**, *arrowheads*) were also SYTOX-positive (**g**, *arrowheads*); **h.** INT-stained filaments in logarithmic phase of growth; **i.** disintegration of filaments after 24-h incubation with CTC; **j.** pattern of CTC-formazan deposition; **k.** DAPI-stained nucleoids in living filaments; **l.** yellow-green metachromatic inclusions in DAPI-stained filaments viewed with a long pass emission filter; **m.** reduced fluorescence intensity of DAPI-stained nucleoids in cells accumulated CTC-formazan (natural samples); **n.** cells from old laboratory cultures simultaneously stained with DAPI, CTC and SYTOX Green under UV-illumination, extensively damaged cells lack SYTOX Green and DAPI staining of nucleoids (*arrowheads*) or have whole-cell DAPI signal
|
pubmed_central
|
Q:
FileInfo.MoveTo generating error in C#.Net script in SSIS package
I have a C#.Net script that moves a file to a directory and adds an increment to the file name if the file already exists. It works perfectly in one of my packages, but I copied it for another package and it fails with the following error message:
DTS SCript Task has encounter an exception in user code:
Project name: ST_<blablabla>
Exception has been thrown by the target of an invocation.
at System.RuntimeMethodHandle.InvokeMethod(Object target,Object[] arguments,Signature si, Boolean constructor)
at System.Reflection.RuntimeMethodInfo.UnsafeInvokeInternal(Object obj, Object[] paramters, Object[] arguments)
at System.Reflection.RuntimeMethodInfo.Invoke(Object obj, BindingFlags invokeAttr, Binder binder, Object[] parameters, CultureInfo culture)
at System.RuntimeType.InvokeMember(String name, BindingsFlags bindingFlags, Binder binder, Object target, Object[] providedArgs, ParameterModifier[] modifiers, CultureInfo culture, String[] namedParams)
at Microsoft.SqlServer.Dts.Tasks.ScriptTask.VSTATaskScriptingEngine ExecuteScript()
Here's the actual code:
public void Main()
{
// TODO: Add your code here
string fileName = Dts.Variables["LoopFiles"].Value.ToString();
System.IO.FileInfo file2 = new System.IO.FileInfo(Dts.Variables["FolderPath"].Value + fileName);
int count = 1;
string fullPath =Dts.Variables["FolderPath"].Value.ToString() + Dts.Variables["LoopFiles"].Value.ToString();
string fileNameOnly = Path.GetFileNameWithoutExtension(fullPath);
string extension = Path.GetExtension(fullPath);
string path = Path.GetDirectoryName(fullPath);
string newFullPath = fullPath;
while (File.Exists(newFullPath))
{
string tempFileName = string.Format("{0}({1})", fileNameOnly, count++);
newFullPath = Path.Combine(path, tempFileName + extension);
}
DialogResult button3 =
|
stackexchange
|
2. Description of the Related Art
A plasma display panel (hereinafter, PDP) is a display device using that visible ray is generated from phosphorus when vacuum ultraviolet ray generated by gas discharge excites the phosphorus.
The PDP has an advantage that it is thinner and lighter than a cathode ray tube CRT, and it can be made into a high definition large-scaled screen. The PDP includes a plurality of discharge cells arranged in a matrix, and each discharge cell becomes a pixel of a screen.
Referring to FIGS. 1 and 2, a discharge cell of a three AC surface discharge PDP in the related art includes a scan-sustain electrode 4Y and a common sustain electrode 4Z formed on an upper substrate 16, an address electrode 2X formed on a lower substrate 14. Herein, each of the sustain electrode pair 4Y and 4Z consist of a transparent electrode 4a and a bus electrode 4b.
There are deposited an upper dielectric layer 12 and a passivation film 10 on the upper substrate 16 where the scan-sustain electrode 4Y and the common sustain electrode 4Z. The upper dielectric layer 12 is formed in a multi-layer structure, e.g., there are formed a first and a second upper dielectric layer 12A and 12B. Wall charges generated upon a plasma discharge are accumulated on the upper dielectric layer 12.
The passivation film 10 prevents the damage of the upper dielectric layer 12 caused by a sputtering that is generated upon plasma discharge and at the same time the discharge efficiency of secondary electron. The passivation film 10 is generally magnesium oxide MgO.
There are formed a lower dielectric layer 18 and barrier ribs 8 on the lower substrate 14 provided with the address electrode 2X, and the surface of the lower dielectric layer 18 and the barrier ribs 8 is coated with a phosphorus layer 6. The address electrode 2X is formed crossing the scan-sustain electrode 4Y and common sustain electrode 4Z.
The barrier ribs 8 are formed parallel to the address electrode 2X to prevent the ultraviolet ray and visible ray generated by the discharge from being leaked to adjacent discharge cells.
The phosphorus layer 6 is formed on the barrier ribs 8 and the lower dielectric layer 18, and gets excited by the ultraviolet ray generated upon the plasma discharge to generate any one of red, green and blue visible rays R, G and B.
There is injected an inert gas for gas discharge into a discharge space provided between the upper substrate 16, the lower substrate 14 and the barrier
|
uspto_backgrounds
|
Zoran Marić
Zoran "Džimi" Marić (Serbian Cyrillic: Зоран – Џими Mapић; born 21 February 1960) is a Serbian retired professional footballer who played as a striker and current manager of First League of RS club FK Krupa.
Club career
Born in Boka, Socialist Federal Republic of Yugoslavia, Marić represented local clubs FK Novi Sad and FK Vojvodina in his country. In January 1988, aged almost 29, he was allowed to leave the Iron Curtain nation and move to Spain, where he would remain until his retirement five years later, with Galician clubs RC Celta de Vigo and SD Compostela.
Marić competed in La Liga with Celta de Vigo and Compostela, amassing totals of 71 matches and 13 goals, before finishing his playing career in 1993.
International career
Marić earned two caps for Yugoslavia, both in 1983. He made his debut on 30 March in a 2–0 friendly win against Romania.
Managerial career
Marić became a manager in 1999, notably working with former sides Compostela and Vojvodina. On 19 May 2010, he won the 2009–10 Bosnian Cup while in charge of Premier League of Bosnia and Herzegovina club FK Borac Banja Luka, who he led from January to August 2010.
After Borac, he worked as the head coach of the Serbia U19 national team from 2011 to 2012, then managed FK Spartak Subotica, FK Proleter Novi Sad, Vojvodina again and FK Novi Pazar.
On 21 June 2019, Marić became the new manager of First League of RS club FK Krupa.
Personal life
Marić's son, Goran, was also a footballer and a striker. He too spent many years working in Spain, mainly with Celta de Vigo B.
Honours
Manager
Borac Banja Luka
Bosnian Cup: 2009–10
References
External links
National team data
Category:1960 births
Category:Living people
Category:People from Sečanj
Category:Yugoslav footballers
Category:Serbian footballers
Category:Association football forwards
Category:Yugoslav First League players
|
wikipedia_en
|
In [@CoxMau15] it was shown that under the mild geometric condition of distinct intersections with infinity that one can show the convergence of the transfinite diameter limit for algebraic varieties in an analogous way to ${\mathbb{C}}^M$. Their main results are summarised in the following two results.
\[coxmaulem\] Suppose that ${\mathcal{V}}$ is a pure $M$-dimensional affine algebraic variety with distinct intersections with infinity. For some $t\in{\mathbb{N}}$ sufficiently large there are polynomials $v_1,...v_d\in{\mathbb{C}}_{=t}[{\mathcal{V}}]$ satisfying the following properties.
- [$v_i*v_i = x_M^{2t} + \sum_{k=1}^{M-1} x_kh_k + h_0$ with $\deg(h_k)\leq 2t-1$ for each $k=0, ..., M-1$.]{}
- [$v_i*v_j = \sum_{k=1}^{M-1} x_kq_k + q_0$ if $i\neq j$ with $\deg(q_k)\leq 2t-1$ for each $k$.]{}
- [${\mathbb{C}}[{\mathcal{V}}]$ is spanned by $$\begin{aligned}
(\star)&\quad x^\beta x_M^l*y^\alpha, &&\beta\in{\mathbb{Z}}^{M-1}_{\geq0}, x^l_My^\alpha\in \mathcal{A}.\\
(\star\star)&\quad x^\beta x_M^l*v_i,&&\beta\in{\mathbb{Z}}^{M-1}_{\geq0}, l\geq 0, i=1,...,d.\end{aligned}$$ where $\mathcal{A} = \{x_M^ly^\alpha \not\in {\langle}{\textsc{lt}}({{\bf I}}({\mathcal{V}})){\rangle}: l+|\alpha|\leq t-1\}$. ]{}
\[remark\] In Lemma \[deglem\] we will prove that consideration of the normal forms in property (iii) of the previous lemma is unnecessary. As a consequence of this we can interpret the previous lemma as giving us a decomposition of ${\mathbb{C}}[{\mathcal{V}}]$ in the following way $$\begin{
|
arxiv
|
<dbk:figure>
<xsl:if test='ancestor::dbk:para/preceding-sibling::*[1][self::dbk:para][@rnd:style = "figure-title"] or
$metadata'>
<dbk:info>
<xsl:if test='ancestor::dbk:para/preceding-sibling::*[1][self::dbk:para][@rnd:style = "figure-title"]'>
<dbk:title>
<xsl:apply-templates select='ancestor::dbk:para/preceding-sibling::*[1]/node()'/>
</dbk:title>
</xsl:if>
<xsl:copy-of select='$metadata'/>
</dbk:info>
</xsl:if>
<dbk:mediaobject>
<xsl:apply-templates mode='rnd:copy'/>
</dbk:mediaobject>
<xsl:choose>
<xsl:when test='not($caption)'/>
<xsl:when test='not($next.captioned)'>
<xsl:apply-templates select='ancestor::dbk:para/following-sibling::*[following-sibling::*[generate-id() = generate-id($caption)]][not(&metadata-content;)]'
mode='rnd:figure'/>
<xsl:apply-templates select='$caption'
mode='rnd:caption'/>
</xsl:when>
<!-- Does caption belong to this image or next.captioned?
- Only if it belongs to this image do we process it here.
-->
<xsl:when test='$next.captioned[preceding-sibling::*[generate-id() = generate-id($caption)]]'>
<xsl:apply-templates select='ancestor::dbk:para/following-sibling::*[following-sibling::*[generate-id() = generate-id($caption)]][not(&metadata-content;)]'
mode='rnd:figure'/>
<xsl:apply-templates select='$caption'
|
github
|
Thank you Quiltermomma - I love these two beautiful blocks that you made for me. I am intrigued by the color combinations and the design - I have looked at this pattern but never been brave enough to try it. These are the first two blocks for my new quilt that I will make from my monthly swaps - I am so blessed with these two beautiful blocks and the gorgeous applique quilt from quiltermomma - I am the luckiest swapper ever!
"Make new friends but keep the old, one is silver and the other gold" - Friends on this Quilting Board are treasures indeed!
I received my block from Roe (Rosalie) yesterday and I love it - love the style of the block. Here's pics of the one she sent me and the ones I sent her. The 'windmill' block was a test, but it turned out a wee bit short - it was too pretty to pitch so sent it anyway. She liked both and said she'd use them in her quilt. I love this swap - hope we keep it up. It's been so quiet last couple months, guess everyone is busy w/outdoor work. Keep in touch everyone..;o)
I received my block from Roe (Rosalie) yesterday and I love it - love the style of the block. Here's pics of the one she sent me and the ones I sent her. The 'windmill' block was a test, but it turned out a wee bit short - it was too pretty to pitch so sent it anyway. She liked both and said she'd use them in her quilt. I love this swap - hope we keep it up. It's been so quiet last couple months, guess everyone is busy w/outdoor work. Keep in touch everyone..;o)
Hugs to all,
Jean
Jean............I just LOVE the blocks you have made for your partner!! They are all so pretty & the color's are wonderful. I haven't participated for the last year, but hopefully I can return in the Fall.
Well now- big bummer. I did up the two blocks for my June swap partner and I love them. But they have a problem. Sigh. Seems I overshot the sentence in the pattern where it instructs the sewer to use '1/4 scant seams'. Agh.
But my partner is amazing - I told her my dilemma and that I
|
pile-cc
|
21*o**2
Expand (1 + 2 - 2)*(4*k - 4*k - 2*k) + 0*k - k + 2*k - 6 - 2*k - 2*k + 6*k.
k - 6
Expand (0 - 2*m + 0)*(0*m + 0*m - 3*m).
6*m**2
Expand 3*z**3 - z**3 - z**3 + 12*z**3 - 2 - 9*z**3 + 4 + (0 + 0 + z)*(2 - z**2 - 2).
3*z**3 + 2
Expand (4*t + t - 3*t)*(2 - 4 + 4)*(-2 + 3 - 3)*(-8 + 3 - 4).
72*t
Expand m - 3*m + 4*m + (3 + 0 - 1)*(-11*m + 4*m - m).
-14*m
Expand (3*g + g**3 - 31 + 33 + 3*g)*(-3*g**2 + 2*g - 2*g).
-3*g**5 - 18*g**3 - 6*g**2
Expand (-2*s - 5 + 5)*(-2*s + 0 + 0 + 1 - 1 + s + (2*s - 2*s + 2*s)*(-2 + 2 - 2)).
10*s**2
Expand (2 - 7 + 2)*(-3*l - l + 3*l) + (3*l + l - 2*l + (-2 - 1 + 1)*(5*l - 2*l + l) - 2 + 2*l + 2)*(5 - 4 - 3).
11*l
Expand (0*j**4 + j**4 + 0*j**4)*(6 - 1 - 2 - 2*j).
-2*j**5 + 3*j**4
Expand (1 + 0 - 3)*(3*a**2 + 4*a - 4*a) + 0*a**2 + a**2 + a**2 + 6*a**2 + 1 - 1.
2*a**2
Expand (-27 + 15*x**3 + 39 - 11*x**3)*(0*x + 4*x - x).
12*x**4 + 36*x
|
dm_mathematics
|
Great Idea Howard.
Can you add dutch_quigley@yahoo.com as my email address.
Look forward to the happy hour.
Dutch
-----Original Message-----
From: "Howard Rushing" <uhsammy@hotmail.com>@ENRON
Sent: Tuesday, December 04, 2001 4:34 PM
To: archila40@hotmail.com; Bankside@aol.com; br
|
enron_emails
|
3
The background facts are set forth in the magistrate judge's report and recommendation and will not be repeated here. Suffice it to say that the Grays filed this action alleging that Home Bank violated the disclosure requirements of TILA and Regulation Z. Additionally, the Grays alleged that Home Bank failed to make new disclosures regarding the refinancing of certain transactions, failed to disclose to the Grays the right to rescission along with a separate notice of the right to rescind, wrongly retained the Grays' credit balances, failed to accurately disclose the financing terms, and engaged in fraudulent concealment. The Grays sought actual damages, statutory damages and costs. They also sought damages as a result of Home Bank allegedly causing them emotional distress, humiliation, harm to their reputation, and for other tort and fraud claims.
4
Home Bank filed a motion pursuant to Fed.R.Civ.P. 12(b), arguing that the Grays' complaint was barred by the applicable statute of limitations. The magistrate judge issued a report recommending that the complaint be dismissed for lack of subject matter jurisdiction. Despite objections filed by the Grays, the district court adopted the report and recommendation and entered an order accordingly.
5
This court renders de novo review of judgments dismissing cases for lack of subject matter jurisdiction. Willis v. Sullivan, 931 F.2d 390, 395 (6th Cir.1991). Upon review, we conclude that the district court correctly dismissed the complaint as time-barred. The governing statute provides: "Any action under this section may be brought in any United States district court, or in any other court of competent jurisdiction, within one year from the date of the occurrence of the violation." 15 U.S.C. Sec. 1640(e). The limitations period in Sec. 1640(e) runs from the date of consummation of the transaction, but the doctrine of equitable tolling may, in the appropriate circumstances, suspend the limitations period until the borrower discovers or has reasonable opportunity to discover the fraud or nondisclosures that form the basis of the TILA action. See Jones v. TransOhio Sav. Ass'n, 747 F.2d 1037, 1041 (6th Cir.1984).
6
The Grays argue that they were not aware of the TILA violations until March 1993 due to continuous concealment of documents, reports, and numerous delaying
|
freelaw
|
A happy ending for Seattle’s Bop Street Records: a nonprofit buys the collection - wallflower
https://www.seattletimes.com/entertainment/music/a-happy-ending-for-seattles-bop-street-records-a-nonprofit-buys-up-the-entire-collection/
======
bergstromm466
> In a phone interview confirming the sale, Kahle said the goal of his
> organization is “to build the Library of Alexandria for the digital age,”
> referring to the library in ancient Egypt that famously burned down.
> Kahle has a particular interest in obscure recordings, he said. “High school
> marching bands, soundtracks for foreign movies you’ve never heard of — those
> are just treasures.”
Love Kahle
------
TedDoesntTalk
If the purchaser, the Internet Archive, digitizes the entire collection, do
they have the legal right to stream the content to the world without paying
royalties?
~~~
SethTro
They've been digitalizing media and only streaming it when it's outside of
copyright. This means many 2050+ for recent music but ~1970s music and earlier
is fair game.
~~~
mgbennet
Copyright for sound recordings is pretty complicated in the US. Recordings
from before 1972 were protected by a variety of state level laws, so even
recordings that should be in the public domain, like ones from before 1924,
weren't guaranteed to be so until the 2018 Music Modernization Act[1], and
even so have a 3 year grace period from when that was enacted. It gets even
more confusing for recordings from 1924-1978, when rights holders had to file
for copyright and then file for extensions, AND the law has changed numerous
times for different dates within that range.[2] So no, it's not really fair to
say that 1970's and earlier music is fair game.
[1] [https://www.eff.org/deeplinks/2018/09/new-music-
modernizatio...](https://www.eff.org/deeplinks/2018/09/new-music-
modernization-act-has-major-fix-older-recordings-will-belong-public)
[2] [http://www.public
|
hackernews
|
Small molecule/nucleic acid interactions play sophisticated regulatory roles in cellular functions. Aberrant interactions have been implicated in diseases, and nucleic acids are targets of small molecule therapeutics. Spermine, a polyamine, binds specifically to RNA tertiary structures to regulate cell growth and protein expression. Polyamines levels are elevated in neoplastic cells and polyamine biosynthesis is a target of chemotherapeutic agents, but how polyamines function is largely unknown. Pentamidine, an FDA approved drug for treating fungal and protozoan
|
nih_exporter
|
The Spatial Morphology of Intraluminal Thrombus Influences Type II Endoleak After Endovascular Repair of Abdominal Aortic Aneurysms.
Type 2 endoleaks (T2E) after endovascular repair (EVAR) of abdominal aortic aneurysm (AAA) can lead to sac expansion or failure of sac regression, and often present as a management dilemma. Intraluminal thrombus (ILT) may influence the likelihood of endoleaks after EV
|
pubmed_abstracts
|
The first trial was conducted by Jacobs et al, [@pone.0103431-Jacobs1] who reported that the BM in PCI and control groups was 5% and 24%, respectively; and there was no statistically significant difference between the two groups (*p* = 0.06). Strauss et al [@pone.0103431-Strauss1] and Albain et al [@pone.0103431-Albain1] also reported no significant difference in BM between the two groups (0% vs. 12%, P = 0.32 and 8% vs. 16% *p* = 0.36). Skain [@pone.0103431-Skarin1] and coworkers treated 34 patients with stage III NSCLC with chemotherapy and radiation followed by surgery. About 14% of patients received treatment with PCI developed BM compared with 26% of patients who did not receive PCI treatment.
In the most notable study by Stuschke trial [@pone.0103431-Stuschke1], 75 patients with stage IIIA/IIIB NSCLC received treatment with induction trimodality (chemotherapy, radiation therapy, and surgery). PCI was introduced after the first half of the study because of a high incidence of brain relapses. Patients treated during the second half of the study were offered PCI (30 Gy in 15 fractions). In an otherwise uniformly-treated, uniformly-staged cohort of patients, they found that there was a significant reduction in the probability of BM from 54% to 13% (*p*\<0.0001).
Analysis on BM {#s3e}
--------------
The meta-analysis on BM included 12 trials involving a total 1,718 patients including 771 patients who received PCI. All the 12 trials reported the impact of PCI on BM, concluding that PCI was associated with a significant reduction in the overall mortality of patients with NSCLC as compared with those who did not receive PCI (OR = 0.30; 95% CI: 0.21--0.43; *p*\<0.00001). There was no heterogeneity across studies (I^2^ = 0%; *p* = 0.51) ([Figure 2](#pone-0103431-g002){ref-type="fig"}), indicating that the results were valid. In addition, no publication bias was detected by Egger's test. The funnel plot is shown in [Figure 3](#pone-0103431-g003){ref-
|
pubmed_central
|
"screens":
[{"screen_id":1,"screen_name":"Screen 1 ","screen_msg":"Hello","screen_status":"Active","cinema_id":1,"created_at":"2016-09-08 04:34:28","updated_at":"2016-09-08 04:34:28"}],
"showtime":
[{"show_id":6,"movie_id":1,"dimensional":"2D","cinema_id":1,"screen_id":1,"show_date":"2016-10-04","show_time":"00:57:00","show_status":"Active","created_at":"2016-09-08 12:21:06","updated_at":"2016-09-08 12:21:06"},
{"show_id":7,"movie_id":1,"dimensional":"2D","cinema_id":1,"screen_id":1,"show_date":"2016-10-04","show_time":"00:57:00","show_status":"Active","created_at":"2016-09-08 12:22:15","updated_at":"2016-09-08 12:22:15"}]
}
my controller function code
public function getscreen($id)
{
$screens=Movies_screen::where('cinema_id',$id)->get();
$showtime=Movies_showtimes::where('cinema_id',$id)->get();
return response()->json(['screens' => $screens, 'showtime' => $showtime]);
}
I am reading those json array in jquery as
$("#cinemahall").on("change click",function(){
var cinema_id=$("#cinemahall option:selected").val();
//ajax
$.get('/askspidy/admin/showtime/getscreen/' + cinema_id, function(data){
$("#screenname").empty();
$("#screenname").append('<option value=0>Select Screen</option>');
$.each(data,function(index,screenobj){
$("#screenname").append('<option value="' +screenobj.screens[0].screen_id + '">' +screenobj.screens[0].screen_name +'</option>');
|
stackexchange
|
an inverter circuit having a complementary MOS transistor structure for receiving an output signal from the NAND circuit and outputting an inverted signal of the received signal from an output terminal, where the complementary MOS transistor structure comprises a third p-channel MOS FET and a second n-channel MOS FET, and
wherein among all the MOS FETs in the AND logic circuit, each FET other than the third p-channel MOS FET has a threshold voltage value lower than the threshold voltage value of the third p-channel MOS FET.
This structure is obtained by applying the concept of the present invention to the AND logic circuit as shown in FIG. 14 (which is a previous invention of the inventors). Among the five transistors (three pMOS FETs and two nMOS FETs), the threshold voltage value Vth of each of the four transistors other than the third pMOS FET can be reduced, thereby sufficiently reducing the occupied area of the whole logic circuit.
The present invention also provides another specific semiconductor integrated circuit having an AND logic circuit which comprises:
a NAND circuit which includes:
a first pMOS FET, where a fixed electric potential is applied to the gate electrode so as to keep the first MOS FET on; and
a first n-channel MOS FET, where a first input signal is input into the gate electrode and a second inverted input signal is input into the source electrode, and
wherein the drain electrode of the first p-channel MOS FET and the drain electrode of the first n-channel MOS FET are connected; and
an inverter circuit having a complementary MOS transistor structure for receiving an output signal from the NAND circuit and outputting an inverted signal of the received signal from an output terminal, where the complementary MOS transistor structure comprises a second p-channel MOS FET and a second n-channel MOS FET, and
wherein among all the MOS FETs in the AND logic circuit, each FET other than the second p-channel MOS FET has a threshold voltage value lower than the threshold voltage value of the second p-channel MOS FET.
In this structure, only two input signals, the first input signal and the second inverted input signal are necessary, and the number of necessary transistors can be reduced by one in comparison with the previous structure. Accordingly, the occupied area of the logic circuit can be further reduced also by reducing the threshold voltage value Vth.
The present invention also provides a semiconductor
|
uspto_backgrounds
|
is a Japanese professional shogi player ranked 6-dan.
Early life
Funae was born on April 27, 1987, in Kakogawa, Hyōgo. He learned how to play shogi from his grandfather when he was about five years old. When he was a second-grade student elementary school student, Funae started to regularly go to the Kakogawa Shogi Center where he met shogi professional Keita Inoue for the first time. Funae finished runner-up to fellow future professional Issei Takazaki in the 23rd in 1998. Later that same year, Funae entered the Japan Shogi Association's apprentice school under Inoue's guidance at the rank of 6-kyū.
Funae steadily advanced through the apprentice school ranks and was promoted to 1-kyū in 2001. His progress, however, slowed at that point and he wasn't promoted to 1-dan until March 2003. Funae was promoted to the rank 3-dan in 2006, and entered the 39th 3-dan League in April 2006. Funae's progress, however, once again slowed and he did not obtain full professional status and the corresponding rank of 4-dan until October 2010 after he finished second in the 47th 3-dan League with a record of 13 wins and 5 losses.
Shogi professional
Funae's first tournament victory as a shogi professional came in 2011 when he defeated Hiroshi Miyamoto (still an apprentice professional 3-dan at the time) 2 games to 1 to win the 1st for young professionals.
In MarchApril 2013, Funae was one of five shogi professionals to play against five computer shogi programs in the 2nd Denō Match. Funae played against the program and lost in 184 moves. Funae played Tsutsukana once again in a "revenge match" in December 2013 and this time Funae won in 85 moves.
Funae's other tournament victory came in 2016 when he defeated Shōta Chida to win the 1st sponsored by Japanese electronics retailer Yamada Denki.
Tsume Shogi Solving Competition
Funae won the 7th Tsume Shogi Solving Competition in 2010 while he was still an apprentice professional 3-dan; he was the only participant to finish with a perfect score of 100.
Promotion history
Funae's promotion history is as follows:
1998, September: 6
|
wikipedia_en
|
When these definitions are applied to the microcanonical ensemble asuming the generalized Boltzmann’s Principle, the Eq.(\[cr\]), the physical temperature coincides with the usual Boltzmann’s relation:
$$\frac{1}{kT_{phys}}=\frac{\partial }{\partial E}S_{B}\text{.}$$
It is easy to show, that this result does not depend on the entropy counting rule of the generalized Boltzmann’s Principle [@vel1], but on separability of a closed system in subsystems weakly correlated among them, and the additivity of the integrals of motion and the macroscopic parameters. It must be recalled that these exigencies are only valid for the extensive systems, but, it is not the case that we are studying here. Our result comes in fashion as consequence of the system scaling laws in the thermodynamic limit.
An important second condition must be satisfied for the validity of the Legendre’s transformation, [*the stability of the maximum*]{}. This condition leads to the q-generalization of the [*Microcanonical Thermostatistics*]{} of D. H. E. Gross [@gro1]. In this approach, the stability of the Legendre’s formalism is supported by the concavity of the entropy, the negative definition of the quadratic forms of the curvature tensor [@gro1; @vel2]. In the Tsallis’ case, the curvature tensor must be modified as:
$$\left( K_{q}\right) _{\mu \nu }=\frac{1}{1-\left( 1-q\right) \widetilde{P}%
_{q}}\left[ \left( 2-q\right) \frac{\partial }{\partial I^{\mu }}\frac{%
\partial }{\partial I^{\nu }}\left( S_{B}\right) _{q}+\right.$$
$$\left. +\left( 1-q\right) \left( \beta _{\mu }\frac{\partial }{\partial
I^{\nu }}\left( S_{B}\right) _{q}+\beta _{\nu }\frac{\partial }{\partial
I^{\mu }}\left( S_{B}\right) _{q}\right) \right] \text{.}$$
Taking into consideration that the scaling behavior of the functions $\left(
S_{B}\right) _{q}$ and $\widetilde{P}_{q}$ are identical, which is derived from the Eq.(\[ltp\]), it is easy to see that the curvature tensor is scaling invariant
|
arxiv
|
/// Protocol for all the navigation-related SideEffect exposed by Tempura
public protocol NavigationSideEffect: AnySideEffect {}
/// Navigation action used to ask the `Navigator` to navigate to a specific `Route`.
public struct Navigate: NavigationSideEffect {
/// The final `Route` after the navigation is completed
public let route: Route
/// Specify if the `Navigation` should be animated
public let animated: Bool
/// The context of this `Navigation`
public let context: Any?
/// Initializes and return a Navigate action.
public init(to route: Route, animated: Bool = false, context: Any? = nil) {
self.route = route
self.animated = animated
self.context = context
}
/// The side effect of the action, look into [Katana](https://github.com/BendingSpoons/katana-swift)
/// to know what a `SideEffect` is.
public func anySideEffect(_ context: AnySideEffectContext) throws -> Any {
guard let dependencies = context.anyDependencies as? NavigationProvider else { fatalError("DependenciesContainer must conform to `NavigationProvider`") }
try await(dependencies.navigator.changeRoute(newRoute: self.route, animated: self.animated, context: self.context))
return ()
}
}
/// Navigation action used to ask the `Navigator` to show a specific screen
/// identified by the `identifierToShow`.
///
/// The `ViewController` that is managing that screen must implement `RoutableWithConfiguration`
/// or `Routable` in order to be identified with a matching `Routable.routeIdentifier`.
public struct Show: NavigationSideEffect {
/// The identifiers of the `Routable` to be shown
public let identifiersToShow: [RouteElementIdentifier]
/// Specify if the `Show` should be animated
public let animated: Bool
/// The context of the `Show`
public let context: Any?
/// Initializes and return a Show action.
public init(_ identifiersToShow: [RouteElementIdentifier], animated: Bool = false, context: Any? = nil) {
self.identifiersToShow = identifiersTo
|
github
|
South Sudan is pleading with Kenya and Uganda for economic support to avert a humanitarian crisis after a fresh conflict brought the country to its knees.
Last week, a delegation of Transitional Government of South Sudan officials led by First Vice-President Taban Deng Gai was in Kenya on a mission seeking a bailout.
Africa Reviewreported that Juba will also be reaching out to Uganda later this month to craft a bailout package that will see Kampala pay its traders the $35.2 million Juba owes them in a bid to have them resume supplies to the country.
“The vice president will go to Kampala to request the Ugandan government to pay traders who supplied cereals to Juba but haven’t been paid. The money will then be converted into a loan, for which Juba and Kampala officials will work out a repayment plan,” a diplomatic source with the knowledge of the matter said.
The delegation to Nairobi, which included four ministers, met with Kenyan President Uhuru Kenyatta, Cabinet Secretary for Foreign Affairs Amina Mohamed and a number of government officials.
A source privy to the discussions said Mr Gai implored President Kenyatta to give his country a soft loan to help it deal with its current problems.
President Kenyatta is reported to have advised the group to send their finance minister, their Central Bank Governor and agriculture minister to Nairobi with a clear proposal, including the amounts needed and the modalities for repayment.
Uganda is South Sudan’s biggest trading partner and exports maize, vegetables, sugar, iron and steel, cement, beer, motor lubricants and detergents. However, following fresh fighting in the country in July, most foreign traders have returned to their countries for security reasons.
In an interview, South Sudan Finance minister Stephen Dhieu Dau declined to provide details on how the proposal would be structured.
“I am yet to get a briefing on the discussions in Nairobi and any other that will take place. However, we are pursuing fiscal, monetary and diplomatic routes in a bid to unlock the economic challenge the country is facing,” Mr Dau said.
The country is also yet to pass a new budget for the 2016/17 financial year.
About
East Africa Daily is the leading East Africa regional digital News and Information provider.
We offer a collective coverage and expert analysis of of Political, Social and Economic issues in each East
|
pile-cc
|
Let m = -3.91 + -0.09. Let f = 11484 + -11490. What is the biggest value in -0.3, m, f?
-0.3
Let g = 0.43 + 0.07. Let q = -50 - -45.66. Let p = -0.34 - q. Which is the third biggest value? (a) p (b) 2 (c) g
c
Let r be ((-2)/8)/(-1)*2. Let p = -91 - -101. Suppose -p = -5*t, 0 = 5*a - 9*t + 13*t - 33. What is the biggest value in a, 0.4, r?
a
Suppose 2*h - 36 = q - 3*q, 0 = q - 4*h - 18. Let y be ((-3)/q)/(7/(-14)). What is the second smallest value in 3, y, 2/13?
y
Let p = -251.2 + 244.2. What is the third smallest value in p, -0.5, 12?
12
Let i be (-58)/140 + 1/5. Let s = i - 5/42. Let t = 127.7 + -128. What is the second smallest value in s, -2/3, t?
s
Let n = -21/10 - -79/40. Let a(g) = -g**3 + 9*g**2 - 9*g + 3. Let k be a(8). Let z be k/10 - (-2)/3. What is the third biggest value in 0.3, n, z?
n
Let g = 0.076 + 1.244. Let t = g + -0.12. Let w = -3.8 - t. Which is the third smallest value? (a) -1 (b) w (c) 4
c
Let u = 13 - 18. Let r(f) = 27*f - 836. Let j be r(31). What is the third smallest value in 5, 2/11, j, u?
j
Let v = 1.2188 + -0.2188. What is the second smallest value in v, 16, -4, 4?
v
Let p = 613
|
dm_mathematics
|
Subject: Re: MidWest Energy Hub LLC - Name Change to Enovate Energy
Matt - Thanks for the explanation. That makes life much simpler, at least
for now. Illinois is currently the only state where we have employees or
inventory. We are merely purchasing and selling natural gas in the other
locations. If that changes in the future, I will let you know.
As always - thanks for your thorough review,
|
enron_emails
|
MEMORANDUM OPINION
WEINER, District Judge.
I
These admiralty actions arise out of a collision which occurred during the early morning hours of January 31, 1975, on the Delaware River at Marcus Hook, Pennsylvania. The vessels involved were the SS Edgar M. Queeny ("Queeny"), an American steamship, and the S.T. Corinthos ("Corinthos"), a Liberian steam tanker. At the time of the collision, the Corinthos was moored, starboard side, to the BP Oil Inc./Sohio Petroleum Company dock at Marcus Hook, Pennsylvania in order to discharge her cargo of crude oil. The collision and the resulting explosions caused extensive damage to the dock, the destruction of the Corinthos, oil pollution of the Delaware River, minor damage to the Queeny, damage to neighboring properties, and tragic loss of 26 lives and other personal injuries.
As a result of this incident, numerous proceedings were instituted. The personal injury and wrongful death actions were settled and dismissed, and therefore shall not be discussed in this opinion. A products liability action was filed by BP Oil Inc. and Sohio Petroleum Company against Bethlehem Steel Corporation, General Electric Company and The William Powell Company (See C.A. 77-2362). These defendants, collectively referred to as the products or third party defendants, participated in one aspect or another in the design and construction of the Queeny, her turbine set and controls, and the astern guardian valve. At the time of trial, the products liability action was severed and stayed pending the resolution of the limitation actions.[1] Also severed at the time of trial was the action of BP Oil, Inc./Sohio Petroleum Company against Villaneuva *339 Compania Naviera, S.A., et al., owner of the Corinthos (See C.A. No. 75-1285).
In the instant limitation actions, the issue of damages was bifurcated from the issue of liability, and the cases then proceeded to trial before the court sitting without a jury. On the second day of trial, James F. Young, Esquire, attorney for the Queeny interests admitted that his client no longer sought exoneration. (N.T. Pgs. 38-39, July 19, 1979). Accordingly, our opinion will address the questions of whether the Queeny interests are entitled to limit their liability and whether the Corinthos and BP Ohio Inc./Sohio Petroleum Company interests can be
|
freelaw
|
------
IkmoIkmo
My thoughts:
\- Nothing unexpected really. When they did force touch on the Macbooks, we
all knew it'd be coming to the phone and wireless trackpad, too.
\- The lack of force touch on the magic mouse means developers are less
inclined to create any essential force touch functionality into their software
as a substantial number of their users this generation of hardware may just
have the non-force touch mouse only. Not a really big deal (tons of old Macs
without force touch around anyway), but if they'd been able to put force touch
into every magic mouse too then you'd be able to create software that relies
on force touch in a few years.
\- Trackpad feels a tiiiiny bit too large now. Not a big deal, a little
redundant area is somehow comfortable and its for a desktop environment
anyway. But just look at the pinch gestures, the hand in the video is shown
pinching to full stretch and there's still area left to stretch even further.
\- Can still see a lot of people complain about the mouse's ergonomics. At
what price, is it really? We've got plenty of great mice to choose from. The
notion there are fewer moving parts is an interesting design choice, but it's
not exactly important in the way it is for say an internal combustion vs
electric engine where you see differences in wear and tear and such. In my
experience the lifetime of all my mice has been ridiculously. It's certainly a
nice looking design, but a higher elevation fits better in my hand and there
are plenty of mice that offer that, offer wireless, offer swiping gestures and
rechargeable batteries.
Anyway, the tl;dr overal takeaway is that these upgrades make a lot of sense
and I'd be more than happy to upgrade as an existing MM/TP user, but I'm not
enticed to switch if I wasn't a MM1 / TP1 user to begin with.
Question to you all btw, have you seen anyone putting force touch into their
software on a mac? I've literally used it 0 times in the past 6 months mostly
because I don't use safari, but I don't see any developers jump in to provide
any functionality, either yet.
------
chiph
> Apple Magic Mouse 2 has a new
|
hackernews
|
Advances in molecular simulation methods and hardware have finally made possible the simulation of biomolecules on physiological timescales. Such simulations provide an important tool to aid the molecular understanding of disease. However, fully integrating these new tools into medical research requires that simulation software becomes easier to use, easier to develop for, and more hardened, reliable and robust. Making these capabilities accessible and reliable in the hands of a broad scientific community will require transformative gains in reliability, interoperability, flexibility, and ease of
|
nih_exporter
|
Identification of adjuvants that enhance the therapeutic antibody response to host IgE.
In the development of a novel vaccine against atopic allergies, we have screened for adjuvants that enhance the therapeutic antibody response against self immunoglobulin E (IgE). The response against self IgE is induced by administration of a vaccine antigen, which contains both self and non-self IgE regions, together with an adjuvant. We evaluated five commonly used adjuvants; Freund's, aluminium hydroxide, ISCOMs
|
pubmed_abstracts
|
Abbreviation, NT, not tested; N, HPV negative
Case 1: Detected ASC-H in June 2009, followed up for 41 months. In August 2009, she was diagnosed LSIL for 3 months then remained NILM after that. HPV (51) infection was detected for 5 month, from June 2009 to November 2009. This shows a correlation between LSIL cellular changes and HPV (51.0) infection. [Figure 1](#F1){ref-type="fig"} shows the ASC-H cells in June 2009. Small atypical cells with high N/C ratio and high chromatin. Note the presence of not only mononuclear cells but also small binucleated squamous cells. HPV (51) was detected by *in situ* PCR in small binucleated squamous cells ([Figure 2](#F2){ref-type="fig"}).
{#F1}
{#F2}
Case 2: Detected ASC-H in April 2010, followed up 31 months and remained HPV positive (16) throughout. Subsequent LSIL diagnosis, then another 4 months of ASC-H, then finally diagnosed as HSIL. [Figure 2](#F2){ref-type="fig"} shows the ASC-H cells of case 2. Basal cell type atypical cells shows thick cytoplasm, which indicates metaplastic cell origin
|
pubmed_central
|
MSSQL2014 & python 3.7.3: Trying to get stored procedure return value results in "No results. Previous SQL was not a query."
I'm running a python script which connects to a MSSQL database, runs a stored procedure and should take a some actions depending on the stored procedure return value. Here's the code:
'''
sql = """\
SET NOCOUNT ON
DECLARE @rv INT
EXEC @rv = [MY_DB].[dbo].[sp_Load_Actuals]
SELECT @rv
"""
...
conn = pyodbc.connect('Driver={ODBC Driver 13 for SQL Server};'
'Server=MY_SERVER;'
'Database=MY_DB;'
'Trusted_Connection=yes;')
conn.autocommit = True
cursor = conn.cursor()
cursor.execute(sql)
retv = cursor.fetchone()
...
On the execution of the last statement I'm catching the pyodbc.DatabaseError exception with the message "No results. Previous SQL was not a query." I have read all related articles here, but apparently I'm still doing something wrong.
What do I miss?
A:
You have to call cursor.nextset() to skip past any info messages that were output by the called stored procedures, as NOCOUNT ON is not enough here.
But unfortunately cursor doesn't have a .hasrows() method, so you have to catch the exception in a loop.
EG:
import pyodbc
sql = """\
SET NOCOUNT ON
DECLARE @rv INT
EXEC @rv = sp_executesql N'print ''informational message'''
SELECT @rv
"""
conn = pyodbc.connect('Driver={ODBC Driver 17 for SQL Server};'
'Server=localhost;'
'Database=tempdb;'
'Trusted_Connection=yes;')
conn.autocommit = True
cursor = conn.cursor()
cursor.execute(sql)
while True:
try:
retv = cursor.fetchone()
break
except pyodbc.ProgrammingError as e:
if "Previous SQL was not a query." in
|
stackexchange
|
In recent years, electric vehicles (EV) are developed so as to avoid environmental contamination due to exhaust gases. Electric vehicles are driven by an electric motor instead of an oil engine. They are also equipped with a steer-assisting hydraulic devices operated by a motor-driven pump.
In either case where an electric motor is used to operate the pump, the problem is the limited accommodation space in the vehicle. To solve this problem, the pump and the electric motor are compactly combined or unified as shown in the Japanese Publication No. 3-15592 referred to above where a conventional mortise-tenon connection is used to couple the motor shaft and the pump shaft as shown in FIG. 13.
Referring to FIG. 13, an input shaft (motor shaft) (m) and an output shaft (pump shaft) (a) are coupled to each other by means of a driving coupler (hereinafter referred to as "coupler") (J). The coupler (J) includes a first mortise J1 and a second mortise J2 on opposite ends. The input shaft (m) includes a tenon m1, and the output shaft 4 includes a tenon al. The tenons m1 and al are inserted in the mortises J1 and J2, respectively, thereby coupling the motor shaft (m) to the pump shaft (a) such that a torque is transmitted through this mortise-tenon connection. As shown in FIG. 13, the rectangular mortises J1 and J2 are formed like a cross such that a torque is effectively transmitted from the motor shaft (m) to the pump shaft (a) through the coupler (J).
The mortise-tenon connection advantageously ensures the coaxial alignment of the input shaft (m) and output shaft (a). An alternative embodiment is disclosed in Japanese Utility Model Laid-Open Specification No. 5-58882, the disclosure of which is herein incorporated by reference; briefly, the tenons ml and al are provided in the coupler J, and the mortises J1 and J2 are provided in the motor shaft (m) and the pump shaft (a).
The known motor-driven pump described above has an oil reservoir defined by a space between the teeth of the driving gears (A) and the follower gears and the inside wall of the pump housing (B). The oil is intermittently delivered every time each oil reservoir is opened to the outlet chamber in the pump housing (B). The problem of
|
uspto_backgrounds
|
The was one of the shinnōke, branches of the Imperial Family of Japan which were, until 1947, eligible to succeed to the Chrysanthemum Throne in the event that the main line should die out.
History
The Arisugawa-no-miya house was founded by Prince Yoshihito, seventh son of Emperor Go-Yōzei (d. 1638), and was originally named Takamatsu-no-miya. The house changed its name to Arisugawa-no-miya after its second head, Prince Nagahito was elevated to the throne as Emperor Go-Sai.
The Arisugawa-no-miya house traditionally served as instructors in calligraphy and waka composition to successive generations of Emperors. After the Meiji Restoration in 1868, when Emperor Meiji was restored, his uncle, Prince Arisugawa Taruhito (1835–1895), became commander-in-chief, and in 1875 Chancellor of the Realm. After his suppression of the Satsuma Rebellion in 1875 he was made a field-marshal, and he was again commander-in-chief in the First Sino-Japanese War. His younger brother, Prince Arisugawa Takehito (1862–1913), was from 1879 to 1882 attached to the British navy, as a military attaché and later as a cadet. He went on to command positions in the Japanese Navy, and represented Japan in formal visits to England.
The Arisugawa line ended early in the twentieth century when no male heirs remained. However, the Imperial Household Agency revived the original title of Takamatsu-no-miya for the third son of Emperor Taishō. The line again became extinct on Prince Takamatsu Nobuhito’s death, as he had no children.
In 2003, an impostor to the Arisugawa line appeared, and stole a great deal of money.
Dynasty
※In Imperial Household Law at that time, the house of an imperial prince was not admitted to be succeeded to by taking away the adopted son. Prince Nobuhito newly founded the Takamatsu-no-miya. Therefore, Prince Nobuhito is not the eleventh generation but the first Takamatsu-no-miya.
References
Keane, Donald. Emperor Of Japan: Me
|
wikipedia_en
|
![Color coded density map of the nuclear region $50$ Myr before the merger (top panels) and just after the merger (bottom panels). The top panels show a box $30$ kpc on a side (left) and a zoom-in within the inner $6$ kpc (right).The bottom panels show the inner 300 pc, with the disk seen face-on (left) and edge-on (right). An adiabatic equation of state with $\gamma=7/5$ was used in this run.[]{data-label="fig:1"}](fig1.eps){height="12cm"}
We have run a suite of simulations with different prescriptions for the gas thermodynamics, and show here the results of two runs in which radiative cooling and heating processes are not included directly, rather an adiabatic equation of state with either $\gamma=7/5$ or $\gamma=5/3$ is adopted (irreversible shock heating, which is important during the merging phase, is included via an artificial viscosity term in the energy equation). According to the radiative transfer calculations of \[10\] the case $\gamma=7/5$ approximates quite well the balance between radiative heating and cooling in a starburst galaxy (in \[7\] a central starburst indeed does occur in the final phase of the merger that we are considering here). A stiffer equation of state such as that with $\gamma=5/3$ might instead be relevant when an additional strong heating source, for example AGN feedback, comes into play (\[11\]). Although one should follow directly the various cooling and heating mechanisms, this simple scheme can provide us with a guide of how gas thermodynamics can affect the results.
Results {#sec:3}
=======
Our simulations allow to assess in a self-consistent way the evolution of the nuclear region of a gas-rich remnant of a major merger as well as the orbital evolution of SMBHs in the nuclei of the two merging galaxies.
Gas Inflows and the Structure of the Nuclear Disks
--------------------------------------------------
About 80% of the gas originally belonging to the two galaxies is funneled to the central kiloparsec during the last stage of the merger and settles into two rotationally supported disks. When the cores of the two galaxies finally merge, the two disks also merge into a single gaseous core which rapidly becomes rotationally supported as radial motions are largely dissipated in shocks. The disk however remains non-axisymmetric, with evident bar-like and spiral patterns (
|
arxiv
|
// serialization for tuples
class ShowT a where
showtup :: a -> [[char]]
instance ShowT () where
showtup _ = []
instance (t=(a*tt), Show a, ShowT tt) => ShowT t where
showtup x = [show(x.0)] ++ showtup(tupleTail(x))
instance (ShowT t) => Show t where
show x = concat(["(", cdelim(showtup(x), ", "), ")"])
// serialization for records
class ShowR a where
showrec :: a -> [[char]]
instance ShowR () where
showrec _ = []
instance (r={a*rr}, Show a, ShowR rr) => ShowR r where
showrec r = [recordHeadLabel(r) ++ "=" ++ show(recordHeadValue(r))] ++ showrec(recordTail(r))
instance (ShowR r) => Show r where
show x = concat(["{", cdelim(showrec(x), ", "), "}"])
// serialization for variants
class ShowVarValue a where
showVarValue :: a -> [char]
instance ShowVarValue () where
showVarValue x = ""
instance (Show a) => ShowVarValue a where
showVarValue x = "=" ++ show(x)
instance Show 0 where
show _ = "impossible"
instance (v=|a+vt|, ShowVarValue a, Show vt) => Show v where
show x = variantSplit(x, \xv."|"++variantHeadLabel(x)++showVarValue(xv)++"|", toClosure(show))
data penum t v = t
class UnpackEnum t v | t -> v where
unpackEnum :: t -> v
instance (Convert t int) => UnpackEnum (penum t v) v where
unpackEnum x = unsafeCast({x=convert(unsafeCast(x)::t)::int})
instance Eq (penum _ _) where
x === y = x.t === y.t
instance (Ord t t) => Ord (pen
|
github
|
Jet mud mixer is a combination of centrifugal pump and mixing
hopper with pipeline. The mud mixer is scientifically designed to
be the optimal solution for mixing of both mud bulk material and
mud additive chemicals into the drilling fluid.
Jet Mud Mixer Description
As its structure we also call it as mixing hopper pump or mud mixing pump. When the drilling fluid need to be mixed or compounded to change
density, viscosity, dehydration we’ll need the bentonite or barite,
also other polymers. When we feed the material directly into tank
there will be big concentration ball or sedimentation. Especially
when there might happen blow out, we need mix large quantity
drilling fluid in short time. However, the mixture or agitation
have to be finished via assistant equipment-jet mud mixer.
So the mud mixing pump is mainly to weight or configure proper
drilling fluid for whole drilling mud solids control system. The
jet mud mixer can be designed as dual hopper with dual pump, please
contact us for more custom built service confirmation
Jet Mud Mixer Technical Parameters
Model
Capacity(m3/h)
Pressure (Mpa)
Motor (Kw)
Inlet (Inch)
Outlet (Inch)
Weight (Kg)
Dimension L×W×H(mm)
APSLH150-50
272(1200GPM)
0.25-0.4
55(75HP)
8
6
1675
2200×1840×1100
APSLH150-40
150(660GPM)
37(50HP)
6
6
1460
2200×1840×1135
APSLH150-35
90(400GPM)
22(30HP)
5
4
1167
1850×1540×1000
What impact mud mixing pump?
Mixing hopper hydraulic consumption should be as little as
possible, otherwise the flow rate may decrease by too much
Distance between Venturi hopper and nozzle should be proper. The
optimal distance should be 32~90mm
Output pressure should be designed properly. If the discharge port
pressure is too high the flow rate of mixing pump will
|
pile-cc
|
Collect the terms in -4*x**2 - 2*x**2 + 3890*x + 5*x**2 - 3890*x.
-x**2
Collect the terms in -1287*u**3 - 424 + 424.
-1287*u**3
Collect the terms in 12*m**2 + 7*m**3 + 9*m**3 + 8*m**3 - 26*m**3.
-2*m**3 + 12*m**2
Collect the terms in -377 + 228*n + 377.
228*n
Collect the terms in 481 + 3*s + 60 + 1124.
3*s + 1665
Collect the terms in -3699*d + 1801*d + 1892*d.
-6*d
Collect the terms in 5*j**2 + 17*j**2 - 17*j**2 - 37*j**2 - j**2.
-33*j**2
Collect the terms in 841*w**3 - 2*w**2 - 6*w**2 - 1991*w**3 + 8*w**2.
-1150*w**3
Collect the terms in 10226*v**3 + 0*v - 10225*v**3 + 0*v - 941 + 941.
v**3
Collect the terms in -925*c - 2385*c + 398*c + 716*c - 2369*c.
-4565*c
Collect the terms in -1056*m - 1075*m + 2141*m.
10*m
Collect the terms in m**3 + 21675989*m - 21675989*m.
m**3
Collect the terms in 2*s**2 - 3*s**2 - 425*s + 501*s.
-s**2 + 76*s
Collect the terms in 19*d**3 + 4823143*d**2 - 4823143*d**2.
19*d**3
Collect the terms in -5*q + 8*q + 21*q - 14*q.
10*q
Collect the terms in 4137*t + 9 - 8269*t + 4137*t.
5*t + 9
Collect the terms in -20*f
|
dm_mathematics
|
Barbara Tyndall, Secretary to Michael Beatty
-----Original Message-----
From:?? DIANNE STEVENSON [SMTP:DStevenson@gablelaw.com]
Sent:?? Monday, January 15, 2001 3:08 PM
To:???? Tyndall, Barbara
Subject:??????? Reply to your e-mail
Attached please find Judge Morris' response to your e-mail.
|
enron_emails
|
Before KING, SHEDD, and AGEE, Circuit Judges.
Affirmed by unpublished per curiam opinion.
Denise M. Clark, Julia Roumm, CLARK LAW GROUP, PLLC, Washington,
D.C., for Appellant. Gina D. Wodarski, EDWARDS WILDMAN PALMER
LLP, Boston, Massachusetts; Fiona W. Ong, SHAWE & ROSENTHAL,
LLP, Baltimore, Maryland, for Appellees.
Unpublished opinions are not binding precedent in this circuit.
PER CURIAM:
Eva Lynn Blair appeals the district court’s orders
granting summary judgment to Defendants in her civil action,
and denying her motion to reconsider under Fed. R. Civ. P.
59(e). Our review of the record reveals that Blair’s outside
work for pay understandably terminated her entitlement to the
long-term disability benefits she had been receiving from her
former employer’s welfare benefit plan, which was covered by the
Employee Retirement Income Security Act (“ERISA”). We have
reviewed the record and find no reversible error. See generally
Firestone Tire & Rubber Co. v. Bruch, 489 U.S. 101, 115 (1989)
(providing de novo review for denial of ERISA benefits, absent a
grant of discretion to administrator in contested benefits
plan); Bogart v. Chappell, 396 F.3d 548, 555 (4th Cir. 2005)
(noting that Rule 59(e) motions are reviewed for an abuse of
discretion). Accordingly, we affirm for the reasons stated by
the district court. Blair v. Nat’l City Mortg. Corp. Welfare
Benefits Plan, No. 8:09-cv-00906-AW (D. Md. June 20, 2011 &
Sept. 2, 2011). We dispense with oral argument because the
facts and legal contentions are adequately presented in the
materials before
|
freelaw
|
There are two steps in both overload resolution and multimethod dispatch:
discovery of the set of applicable methods, and then the sorting of those
methods by how specific they are to the argument types. Every parameter type
in the winning method needs to be as specific, or more specific, for that
argument type, than every other method's parameter type. The single most
specific method, if any, is chosen. (The OO case of inheritance is just a
special case of specificity.)
There may be no applicable methods, in which case it's a simple error. But the
case of ambiguity is fraught with difficulties, because users generally prefer
their code to do what they mean, and inferring that from what they say - the
methods they declare - can be difficult. Suppose your language supports
implicit conversions of values to supertypes, or to supported interfaces.
Overload resolution forces you to specify a priority here - which method to
prefer in the case where the relevant parameter type is alternately one or the
other - or to produce an error - i.e. telling the customer that they're wrong.
Bring other language features, like user-defined conversions, variant types,
untyped parameters, multiple inheritance, etc., and you can can quickly find
yourself in a mess.
~~~
puredanger
Clojure actually does support (multiple, open) type hierarchies (with
preferences) for dispatching on type. This example just doesn't use them. Lots
more info here: <http://clojure.org/multimethods>
Another solution is provided in Clojure 1.2's protocols which are similar but
different: <http://clojure.org/protocols>
~~~
barrkel
Ah, I see. I had thought that a single dispatcher value was required; but I
see that a list of them is acceptable, and Clojure then uses the more regular
means on _that_ , rather the original list of arguments. Then, the point of
the dispatching function - which is what it's called in the Clojure docs - is
rather a classifier function, rather than dispatcher.
------
puredanger
Make sure to check out the followup to this article re Perl 6:
[http://blogs.perl.org/users/tyler_curtis/2010/08/age
|
hackernews
|
This application requests partial support for the 1988 FASEB Summer Research Conference on Retinoids. This conference is scheduled to be held June 19-24, 1988, at Vermont Academy in Saxtons River, VT. The 1988 conference will represent the fourth biennial FASEB conference on this topic. The three previous conferences, held in June 1982, 1984, 1986, were all highly successful, as evidenced by large attendance, active participation by attendees, and a strong sense of scientific stimulation and advance
|
nih_exporter
|
This study was designed to investigate whether EGB protect against ethanol-induced oxidative injury in rat testes. The rats were pretreated with EGB (4.8,9.6 mg/100g bw per day) before 30% ethanol administration (2.37g/kg bw by gastric incubation). Ninety days later, the rats were killed in order to measure the activities of Superoxide Dismutase (SOD), Glutathione Reductase (GST), Glut
|
pubmed_abstracts
|
\- Right pulmonary artery (RPA, N=22)
\- Left pulmonary artery (LPA, N=24)
Flow assessment was performed in each vessel using the three sequences above (parameters shown in Table [1](#T1){ref-type="table"}).
Free-Breathing PCMR Standard Breath-hold PCMR Spiral Breath-hold PCMR
---------------------------- --------------------- --------------------------- -------------------------
TE/TR (ms) \~2.2 / 7.0 \~2.2 / 7.0 2.1 / 8.0
Spiral Readouts \- \- 36
Acceleration factor 2 (GRAPPA) 2 (GRAPPA) 3 (SENSE)
Matrix Size 256 x 192 192 x 113 256 x 256
FOV (mm) 200 - 400 290 - 400 400
Rectangular FOV (%) 75 66 100
Readouts per segment 3 4 2
Pixel bandwidth (Hz/pixel) 543 543 1220
VENC (cm/s) 180 - 400 180 - 400 180 - 400
NSAs 3 1 1
Gating Retrospective Retrospective Prospective
Total Scan Duration (s) 44 - 144 11 - 24 3 - 8
Voxel Size (mm) \~ 0.8 - 1.5 \~ 1.5 - 2.1 1.6
Temporal resolution \~ 30.0 ms \~ 40.0 ms 32.0 ms
Stroke volume and regurgitation fraction were calculated for each patient. Additionally, Qp/Qs (N=38) and RPA/LPA (N=20) ratios were quantified where possible.
Results
=======
Average scan time was 91±17 seconds for the reference free-breathing sequence, 16±3 seconds for the standard breath-hold sequence, and 5±1 seconds for the spiral breath-hold sequence.
Combining all vessels (N=124), there were no statistical differences in mean stroke volume calculated from the reference free-breathing sequence (60.3±27.3 mL), the standard breath-hold sequence (59.8±27.6 mL) and the spiral breath-hold
|
pubmed_central
|
extern "C" {
Test* Test_new(){ return new Test(); }
void Test_example(Test* test){ test->test(); }
}
clang -shared -undefined dynamic_lookup -o test.so test.cc
And our calling script, test.py:
from ctypes import cdll
test_so = cdll.LoadLibrary("test.so")
class PyTest:
def __init__(self):
self.obj = test_so.Test_new()
def output(self):
test_so.Test_example(self.obj)
if __name__ == "__main__":
p = PyTest()
p.output()
Call it:
Ξ /tmp/29_may → python test.py
stackoverflow
[1] 55992 abort python test.py
This crashes Python as expected and generates a nice "report error" detail on OS X:
Crashed Thread: 0 Dispatch queue: com.apple.main-thread
Exception Type: EXC_CRASH (SIGABRT)
Exception Codes: 0x0000000000000000, 0x0000000000000000
Thread 0 Crashed:: Dispatch queue: com.apple.main-thread
0 libsystem_kernel.dylib 0x00007fff95bf48ea __kill + 10
1 test.so 0x0000000110285006 Test::test() + 70
2 test.so 0x0000000110284fb5 Test_example + 21
3 _ctypes.so 0x000000011026d7c7 ffi_call_unix64 + 79
4 _ctypes.so 0x000000011026dfe6 ffi_call + 818
5 _ctypes.so 0x000000011026970b _ctypes_callproc + 867
6 _ctypes.so 0x0000000110263b91 PyCFuncPtr_call + 1100
7 org.python.python 0x000000010fd18ad7 PyObject_Call + 99
8 org.python.python 0x000000010fd94e7f PyEval_EvalFrameEx + 11417
9 org.python.
|
stackexchange
|
Second, when the seatbelt is tightened in a severe crash, the seatbelt load applied to the occupant could go beyond the occupant's injury tolerance and thus hurt the occupant.
Because of the limitations mentioned above, pretensioner seatbelts and load limiter seatbelts are more and more widely applied in recent years. In the early stage of a crash, the pretensioner reduces the slack of the seatbelt and lets the occupant into the constriction state as soon as possible; in the process of the crash, the load limiter controls the force applied to the occupants by the seatbelt to an acceptable level.
For pretensioner seatbelt systems, when a crash accident is detected, the pretensioner device is activated. There are several types of pretensioner devices. A popular explosion type of pretensioner device includes a gas initiator, a gas generator, a piston, a tube, a wire and a drive wheel. The piston is installed in the tube. One end of the wire is connected to the piston and the other end is connected with the drive wheel. When the pretensioner is activated, the gas initiator ignites the gas generator, causing the gas expansion and forcing the piston to pull the wire, which rotates the drive wheel. The webbing wound on the retractor driven by the wheel is retracted. At the end of the pretension process, the retractor locks and the seatbelt system restrains the occupants from hitting on the front panel or the steering wheel, etc.
In the existing seatbelt pretensioner designs, the pretensioning stroke distance is equal to the reduction of slack length of the webbing. Studies have confirmed that in crash accidents, if pretensioners can retract more webbing as soon as possible, the seatbelt system can actuate earlier and provide better protection.
The operation procedure of the load limiter seatbelt systems is as follows: when the load applied by the webbing to the occupants exceeds a certain level, the retractor or buckle will release some webbing under a preset load level to prevent an overly high load on the occupants. The main types of the load limiter are compressed deformation of metals, webbing unfolding, tearing deformation of side plate metals and torque deformation, etc.
While the use of pretensioners and load limiters could enhance the crash performance of a seatbelt system in some crashes, the use of both devices in a seatbelt system has not always been a practical choice due to some issues such
|
uspto_backgrounds
|
Louis Hersent
Louis Hersent (10 March 1777 – 2 October 1860) was a French painter.
Life and career
He was born in Paris. He became a pupil of David, and obtained the Prix de Rome in 1797. In the Salon of 1802, he showed Metamorphosis of Narcissus, and he continued to exhibit with rare interruptions up to 1831. He married Louise-Marie-Jeanne Mauduit in 1821.
His pupils were Louis-Eugène Bertier, Auguste Bigand, Hélène Charlotte Juliette Bourge, Augustin Luc Demoussy, Henri Joseph Constant Dutilleux, Hippolyte Dominique Holfeld, Jean-Francois-Hyacinthe-Jules Laure, Eugène Modeste Edmond Lepoittevin, Emile Aubert Lessore, Auguste Dominique Mennessier, François Alexandre Pernot, Julie Philipault, August Thomas Pierre Philippe, Pierre Poterlet, Joachim Sotta, Henry de Triqueti, and Théophile Auguste Vauchelet.
His most considerable works under the First French Empire were Achilles parting from Briseis, and Atala dying in the arms of Chactas (both engraved in Landon's Annales du Musée); an Incident of the life of Fénelon, painted in 1810, found a place at Malmaison, and Passage of the Bridge at Landshut, which belongs to the same date, is now at Versailles.
Hersent's typical works, however, belong to the period of the Restoration; Louis XVI relieving the Afflicted (Versailles) and Daphnis and Chloë (engraved by Laugier and by Gelée) were both in the Salon of 1817; at that of 1819 the Abdication of Gustavus Vasa brought to Hersent a medal of honour, but the picture, purchased by the Duke of Orléans, was destroyed at the Palais-Royal in 1848, and the engraving by Henriquel-Dupont is now its sole record. Ruth, produced in 1822, became the property of Louis XVIII, who from the moment that Hersent rallied to the Restoration jealously patronized him, made him officer of the Legion of Honour, and pressed his claims at
|
wikipedia_en
|
The competition between magnetocrystalline, exchange and magnetostatic interactions results in a pattern of regularly spaced stripe domains perpendicular to the wire axis. Varying the wire linewidth changes the ratio of these energies and hence the domain size. Fig. \[fig1\] shows magnetic force microscopy (MFM) measurements of a 2 $\mu$m wire in zero field performed at room temperature with a vertically magnetized tip. These images highlight the DWs and magnetic poles at the wire edges. For instance, clearly visible in Fig. \[fig1\]b are light and dark contrast along the DWs indicative of Bloch-like walls with sections of different chirality. The magnetic domain configurations are strongly affected by the magnetic history of the samples. Before imaging the wires were magnetized to saturation with a magnetic field transverse (Fig. \[fig1\]a) or longitudinal (Fig. \[fig1\]b) to the wire axis. In the transverse case the mean stripe domain length is 1.6 $\mu$m and much larger than in the longitudinal case, where it is 0.4 $\mu$m. The observed domain structure at $H=0$ is stable over observation times of at least several hours showing that the DWs are strongly pinned at room temperature.
In Fig. \[fig2\] the average domain wall separation is plotted as a function of wire linewidth and magnetic history. The DW density varies by an order of magnitude for the linewidths investigated. Differences between domain configurations after transverse and longitudinal saturation are observed for wires with linewidths between 1 and 10 $\mu$m. Dotted lines in Fig. \[fig1\]a illustrate the approximate domain structure. Since current is directed along the wire, there are domains with magnetization [**M**]{} oriented both parallel and perpendicular to the current density [**J**]{}. In order to estimate the MR contributions due to resistivity anisotropy the volume fraction of closure domains (with [**M**]{} $\parallel$ [**J**]{}) has been estimated. Fig. \[fig2\] also shows this fraction (labeled $\gamma$) determined from MFM images after magnetic saturation in either the transverse or longitudinal direction.
MR measurements were performed in a variable temperature high field cryostat with in-situ (low temperature) sample rotation capabilities. The applied field was in the plane of the film and oriented either longitudinal ($\parallel$) or transverse ($\perp$) to the wire axis. A 4 probe ac ($\sim$10 Hz) resistance bridge with low bias
|
arxiv
|
import java
import semmle.code.java.dataflow.TaintTracking
import semmle.code.java.security.SecurityTests
import ArithmeticCommon
import DataFlow::PathGraph
class TaintSource extends DataFlow::ExprNode {
TaintSource() {
// Either this is an access to a random number generating method of the right kind, ...
exists(Method def |
def = this.getExpr().(MethodAccess).getMethod() and
(
// Some random-number methods are omitted:
// `nextDouble` and `nextFloat` are between 0 and 1,
// `nextGaussian` is extremely unlikely to hit max values.
def.getName() = "nextInt" or
def.getName() = "nextLong"
) and
def.getNumberOfParameters() = 0 and
def.getDeclaringType().hasQualifiedName("java.util", "Random")
)
or
// ... or this is the array parameter of `nextBytes`, which is filled with random bytes.
exists(MethodAccess m, Method def |
m.getAnArgument() = this.getExpr() and
m.getMethod() = def and
def.getName() = "nextBytes" and
def.getNumberOfParameters() = 1 and
def.getDeclaringType().hasQualifiedName("java.util", "Random")
)
}
}
class ArithmeticUncontrolledOverflowConfig extends TaintTracking::Configuration {
ArithmeticUncontrolledOverflowConfig() { this = "ArithmeticUncontrolledOverflowConfig" }
override predicate isSource(DataFlow::Node source) { source instanceof TaintSource }
override predicate isSink(DataFlow::Node sink) { overflowSink(_, sink.asExpr()) }
override predicate isSanitizer(DataFlow::Node n) { overflowBarrier(n) }
}
class ArithmeticUncontrolledUnderflowConfig extends TaintTracking::Configuration {
ArithmeticUncontrolledUnderflowConfig() { this = "ArithmeticUncontrolledUnderflowConfig" }
override predicate isSource(DataFlow::Node source) { source instanceof TaintSource }
override predicate isSink(Data
|
github
|
PART 1 || PART 2 || PART 3 Bismillah When hosting a party, we want it to be in such a way that people enjoy themselves and we feel satisfied by the outcome at the end of the day. Some key elements that make a party a successful and memorable …
PART 1 || PART 2 || PART 3 Bismillah SPRINKLING HALAL FUN Once you are done with the basic plan that I shared in Part 1 it’s time to sprinkle elements of halal fun to your event. Here’s a list of amazing ideas to help you make your party a fun …
PART 1 || PART 2 || PART 3 Bismillah Under the sparkling sun, amidst the beauty of the green grass and blue sky, light breeze rushing against your soft skin, colourful flowers a pleasure for the eyes. Giggles, calmness, munching on some yummy snacks, a journey down the memory lane and catching …
Bismillah Rabbi Zidnee Ilman ”My Lord! Increase me in knowledge.” 30 days – Maximum. 28 days -Minimum. That’s all the time you have to make use of in the most blessed month of the year, Ramadan. 11 months we’ve been swinging in the ups and downs of productivity, in seeking …
Bismillah Rabbi Zidnee Ilman ”My Lord! Increase me in knowledge.” In my school days, during preparation of final exams, I remember my tuition teacher motivating me to work hard. She would give an example of a rope when she thought I was getting lazy. She would say, “It’s like you …
Bismillah Rabbi Zidnee Ilman ”My Lord! Increase me in knowledge.” I pass by the closet that holds the Quran; I feel a bang of guilt. It has been days since I lifted the Quran. As the month of Ramadan draws closer, I think to myself about ways in which I …
Bismillah Faith- Iman- means to believe in the heart, to confess by the tongue and to act with the parts of the body. Muslims believe in 6 articles of faith – 1. Allah 2. His Angels 3. His revealed Books 4. His Messengers 5. The Day of Resurrection 6. Al-Qadr; …
Bismillah Assalamualaikum wa-rahmatullahi wa-barakatahu, Choices. Every morning you wake up
|
pile-cc
|
70*1/276 - 80/920
1/6
What is the value of ((-11)/22*-1)/((-3)/(-6))?
1
(2124/616)/9 + (-276)/644
-1/22
Evaluate (-6*1)/(-58 - -60).
-3
((-335)/201)/((-4)/(-6)) - 49/(-2)
22
What is (-11)/132 + (-40)/(-48)?
3/4
Calculate ((-105)/(-30) + 425/(-102))*(1 + -6).
10/3
What is -71 - (-35 - -23) - -42?
-17
(-6)/(-10)*(-2)/(52/(-65))*-1
-3/2
What is (-2280)/2970 - ((-12)/(-189) - (-8)/(-28))?
-6/11
What is the value of (-322)/(-190) - (2592/(-76) + 34)?
9/5
Evaluate (21/21)/(35 + -56).
-1/21
(795/(-212))/(-3 - (-201)/72)
18
((-58)/(-377))/(5/39)
6/5
(-534)/54 - (-72)/((-48)/(-6))
-8/9
(-9 + 0 + 9)/3 + -15 + 21
6
What is 36*14/84*(-1)/(-21)?
2/7
What is 60/(-3) - (340/(-34) - -1)?
-11
What is the value of ((-1792)/1176 + (-2)/(-3))*-21?
18
Evaluate (-13)/(1430/(-255)) + (-30)/12.
-2/11
(-10)/(-35)*(-441)/(-18)
7
What is (-1036)/(-364) - (9 + -1)/2 - -1?
-2/13
What is (335/20)/(-67) + (-291)/(-12)?
24
Evaluate 4/(-9) + 13/(3627/155).
1/9
Evaluate 12/76 + 25872/(-2128).
-12
Evaluate -23 + 16 + (-272)/(-40).
-1/5
-5 - (2/(-8)*-10 - 69/138)
-7
Calculate (3 - 66/27)*1112/695.
8
|
dm_mathematics
|
PERRODIN Maud <MPERRODIN@CPR.FR>
04/25/2001 04:03 AM
To: "'Becky.Spencer@enron.com'" <Becky.Spencer@enron.com>
cc:
Subject: RE: Document you sent to Enron
Becky,
As regards the ISDA agreement I sent to Brent Hendry, the name of the trader
in
|
enron_emails
|
1998 ME 54
Arthur L. BAILEY, Jr.,
v.
CITY OF SOUTH PORTLAND and John L. Murphy.
Supreme Judicial Court of Maine.
Submitted on Briefs November 24, 1997.
Decided March 13, 1998.
*392 Michael H. Hill, Monaghan, Leahy, Hochadel & Libby, Portland, for plaintiff.
Mary K. Kahl, Corporation Counsel, South Portland, for defendant.
Thomas F. Jewell, Jewell & Boutin, Portland, for Murphy.
Before WATHEN, C.J., and ROBERTS, CLIFFORD, RUDMAN, and DANA, JJ.
DANA, Justice.
[¶ 1] Arthur L. Bailey appeals from the judgment entered in the Superior Court (Cumberland County, Calkins, J.) affirming the South Portland Zoning Board of Appeals' grant of a variance sought by John L. Murphy. The issue before us is whether Murphy's property should be considered one lot or three lots, two of which cannot yield a reasonable return without a variance. We conclude that Murphy owns three lots and that the Board's decision to grant Murphy a variance based on undue hardship is supported by substantial evidence in the record. We thus affirm the judgment.
[¶ 2] In 1985, Murphy purchased from Alice and Thomas Carmody three "lots of record" in the Willard Beach area of South Portland described in a single deed by its metes and bounds.[1] A single family residence is situated on one of the lots, identified on South Portland's tax map 2 as lot 1 (hereinafter the "house lot"). The remainder of the property (identified on South Portland's tax map 1 as lots 233 and 237A) (hereinafter lots A and B) is otherwise unimproved.
[¶ 3] South Portland's zoning regulations for this area require a minimum lot size of 12,500 square feet and at least 75 feet of road frontage. The house lot meets the road frontage requirement but is only 8,976 square feet in size.[2] Lots A and B have a combined size of about 14,000 square feet but only 26 feet of road frontage. The current *393 zoning requirements existed at the time Murphy acquired these lots.
[¶ 4] The Zoning Board of Appeals for the City of South Portland granted a variance to Murphy from South Portland's street frontage requirement enabling him to construct a single-family
|
freelaw
|
------
D9u
There's always the option to delete your FB account. I went nearly 10 months
without logging into FB last year, and doing so made it quite easy to delete
my FB account at the beginning of this year.
Regular removal of cookies, and LSO cookies, as well as clearing the browser
cache, is also recommended.
Then there's the ubiquitous "Connect" buttons which are spammed all across the
web. Prudence dictates that we avoid connecting our logins across the net in
an indiscriminate manner.
Finally, there are "burner" email addresses which I use only to register with
certain websites. Nearly all of the spam that makes it past my filters is from
so-called "legitimate" websites.
Caveat emptor.
~~~
ordinary
Deleting your account does not stop Facebook from tracking you, unfortunately.
~~~
dmoy
Does Facebook actually delete stuff yet? For a long time they wouldn't delete
accounts, photos, etc.
~~~
D9u
That's a good point, regarding whether, or not, FB actually deletes user data
after we "opt out." Another consideration is how, when Facebook started out,
users were supposed to actually know, IRL, the people on their "Friends List."
I adhered to that rule all the way until my account deletion last January, but
now a great number of users have people on their "Friends Lists" who they have
never even spoken to in real life. This point is illustrated by corporate
entities being on people's "Friend Lists."
As for FB allegedly tracking me subsequent to my account deletion, could
someone explain to me how it could be so? I never posted my actual DOB, nor my
cell phone, the email address I used to register hasn't been logged into for
many months, and I'm using a new ISP - which uses dynamic allocation
addressing.
~~~
kaybe
A possibility could be if your email shows up in your friends' contact list
which FB gets from their email accounts.
FB continuesly harrassing me to give them my email password - of all things to
ask for! - is something I will never get. 'We'll check your contact list for
friends! We won't save your password!' My _email password_! You
|
hackernews
|
In addition to pervasive sadness, specific aspects of behavior and cognition are impaired in mood disorders, including selective attention, set-shifting and memory. In addition, depressed individuals exhibit a mood congruent processing bias whereby they more readily process negatively toned information as compared to positively toned information. This cognitive pattern lends itself to evaluation with functional brain imaging, both in terms of identifying the anatomical correlates of the specific behavioral and cognitive differences as well as characterizing the effects of pharmacological manipulation. Attention and memory
|
nih_exporter
|
Biological Data on Anovia punica Gordon (Coleoptera: Coccinellidae), a Predator of Crypticerya multicicatrices Kondo & Unruh (Hemiptera: Monophlebidae).
The coccinellid beetle Anovia punica Gordon (Coleoptera: Coccinellidae: Noviini) is an important predator of the Colombian fluted scale, Crypticerya multicicatrices Kondo & Un
|
pubmed_abstracts
|
The linkage analysis and association analysis methods have been used to locate a plurality of Quantitative Trait Locus (QTL) about maize carotenoid component traits so far. The following 4 genes related to maize carotenoid component traits have been reported:*lcyE* (GRMZM2G012966),*crtRB1* (GRMZM2G152135),*PSY1* (GRMZM2G300348), and*CRTISO* (GRMZM2G108457) \[[@B27], [@B36], [@B35]--[@B18]\]. In addition, we randomly select 100 genes, and then together with *α*-carotene (AC), *β*-carotene (BC), Lutein (LUT), Zeaxanthin (ZEA), *β*-Cryptoxanthin (Bcry), and above 4 genes composed of 109 nodes, we do the experiment 10 times, and the 10 experiments data can be seen in the supplementary file (Gene100_1.csv\~Gene100_10.csv) in Supplementary Material available online at <https://doi.org/10.1155/2017/1813494>.
As has been described in [Section 3.3](#sec3.3){ref-type="sec"}, we firstly do the discretization processing operation on the expression and phenotype data and further use the Bayesian network learning method to construct the network. We mainly use two kinds of discretization methods:*Interval* and*Quantile*. And we denote multivalue discretization result as *N*-value, like 2-value, 3-value, and so on. We compare the learning efficiency and accuracy of 10 kinds of Bayesian network learning methods (*gs*,*hc*,*iamb*,*mmpc*,*rsmax*,*tabu*,*fastiamb*,*interiamb*,*mmhc,* and TPDA) when using the discretization methods of*Interval* and*Quantile*. The whole experiment results are shown in the supplementary files (9 kinds of methods-Interval.csv, 9 kinds of methods-Quantile.csv, TPDA-Interval.csv, and TPDA-Quantile.csv).
(*1) Learning Effect Comparison of Different Thresholds about TPDA*. In the*Drafting* stage of TPDA, it needs to set the threshold of mutual information. In the stage of*Thickening* and*Thinning*, it also needs to set the threshold
|
pubmed_central
|
Why is the single-rear derailleur that enables <= 12 speeds so popular?
All the high-end MTB, and road racers seem to have somewhere between ... 6 and 12 gears. NO derailleur up-front, only a few to scroll through in back. I get the KISS principle behind it; I like having first gear made extra-extra large to make up for missing lower gear elsewhere. Seriously why is this so popular? All the $5000+ bikes have ONE deralleur and limited gears. Is it really better to design gearsets this way? Why? Is it faster? More durable?
A:
Any less than 21 speeds for that kind of jack seems wasteful to me.
You must understand that what matters is not how much "speeds" drivetrain offers, but the available range and other factors (see below). Let's compare 3x7 13-30 24-32-42 and 1x12 10-50 36: 3x7 has 404% range versus 500% range of 1x12. That's a 96% difference! 1x12 will also be lighter by at least several hundred grams. The quality of parts will also be generally higher, given that there are no modern high end 3x7 complete groups. Even compared to a 2x10 11-36 28-38 444% 1x12 has a wider range.
Seriously why is this so popular?
Why people choose one-by:
Similar or wider range with reduced simplicity.
Weight reduction.
Frees up bar space for remote control levers (suspension lockout, adjustable seatpost).
Availability. SRAM does not offer 2x12 or 3x12.
And why not:
Cost (in some cases).
Maybe a reduced service life. A lot of factors contribute to this, I think it's a complex matter.
Limited availability. Good luck finding a replacement 12 speed chain in third-world nowhere.
Is this a fad? Is it really better to design gearsets this way? Why? Cuz Shimano said? Is it faster? More durable?
It's a legitimate trend that offers benefits for some people at cost that other people might not find acceptable. A general advice would be to use what you find suitable for your application scenarios. Manufacturers might have their own reasons to reduce front gears amount, hype/trends and manufacturing costs being
|
stackexchange
|
When hunters hunt outdoors and when nature watchers observe wildlife and birds in the wild, so-called “treestands” are often used that provide a seat and/or standing platform for the hunter or nature watcher above the ground. Such treestands are typically secured to a tree and have a raised platform that is supported above the ground. Such a treestand raises the hunter or nature watcher so as to provide increased visibility, and also to keep the hunter or nature watcher off of wet ground. Well known such treestands are the Multi-Vision Climbing Stand Series treestands manufactured and sold by OL' MAN Treestands, 311 East Jennings St., Tallahassee, Fla. 32301. There are problems with the use of such exposed stands, namely, that they expose the hunter or nature watcher to the elements, such as wind, rain, and colder temperatures. This can detract from the outdoors experience and limit the time that the hunter or nature watcher can stay outdoors. Additionally, when a hunter or nature watcher is exposed, wildlife are deterred from approaching because they can easily see, smell, and hear the individual.
It is therefore desirable to have a blind for use with treestands by hunters or nature watchers. It is further desirable that such a blind be lightweight and portable, provide shelter for the hunter or nature watcher from the elements, hide the hunter or nature watcher from wildlife, and be easy to set up by a single person. It is further desirable to provide a portable blind that can be adapted for use with a variety of portable climbing deer stands, stationary ladder stands, and tree stands.
A preliminary patentability search produced the following patents and patent application publications, some of which may be relevant to the present invention: O'Hare, U.S. Pat. No. 6,431,192 (issued Aug. 13, 2002); Ransom et al., U.S. Pat. No. 7,137,399 (issued Nov. 21, 2006); Jenkinson, U.S. Pat. No. 7,735,503 (issued Jun. 15, 2010); Stabler, U.S. Pat. No. 7,958,968 (issued Jun. 14, 2011); Valpredo, U.S. Patent Application Publication 2002/0078988A1 (published Jun. 27, 2002); and Hanson, U.S. Patent Application Publication 2006/0249640
|
uspto_backgrounds
|
The North Sea Region of Europe refers to European countries and regions that have access to the North Sea. Cultural and economic co-operation has a strong tradition in the area, dating back to the Vikings and the Hanseatic League.
Although not a formally established entity, in political terms the North Sea Region is consolidated through international organisations like the North Sea Commission and transnational co-operation programmes like the North Sea Region Programme of the European Union.
Geographic area
North Sea Commission
The partnership of the North Sea Commission consists of most Norwegian municipalities, the regions Halland and Västra Götaland in Sweden, the three Danish regions of Nordjylland, Midtjylland and Syddanmark, parts of northern Germany, the Netherlands and north western France as well as counties and authorities from eastern England and Scotland.
North Sea Region Programme – Cooperation Area
The North Sea Region (NSR), as defined in the Operational Programme of the North Sea Region Programme 2007–2013, covers an area of . It consists of the whole of Norway and Denmark, the eastern parts of the UK, parts of the Flemish Region of Belgium, the north western regions of Germany, the northern and western parts of the Netherlands and the south western region of Sweden. Geographically, the region is connected by the large sea basin of the North Sea.
Population
Based on the co-operation area of the North Sea Region Programme, about 60 million inhabitants (2003) live in the North Sea Region. The population density of the region varies widely, ranging from sparsely populated areas like Finnmark () in Norway to densely inhabited urban centres like the German city of Hamburg ().
Economy
The North Sea Region belongs to the most prosperous parts of the European Union. The average level of GDP across the region was €28,516 per capita in 2002 ($ in 2002 conversion rate). The unemployment rate is below the EU average in most areas. However, there are notable differences concerning economic performance and employment between the areas in the North Sea Region.
Currently, the economic structure of the regions bordering the North Sea is undergoing considerable changes, such as shrinking labour markets in the agriculture and fisheries sector and a decline in old industrialised areas.
See also
North Sea Region Programme
North Sea Commission
North Sea
References
External links
North Sea Region Programme 2007–2013
North Sea Region Programme 2000–2006
*Region
|
wikipedia_en
|
It is more important and more difficult to consider the flow of the $\beta$-function itself. Namely, given a character $\varphi$, we can set $L_0 =
\log(\varphi)$ and study the $\beta$-functions of the characters $\varphi(s)
= \exp(L(s)).$ In Theorem \[t:flow\], we give a differential equation for $\beta_{\varphi(s)}.$
To define the beta character, we recall material from [@ck2; @ef-manchon; @man]. Throughout this section, $\mathcal A$ denotes the algebra of Laurent series.
Let $\mathcal H=\bigoplus\limits_{n}\mathcal H_n$ be a connected graded Hopf algebra. Let $Y$ be the biderivation on $\mathcal H$ given on homogeneous elements by $$Y:\mathcal H_n\to \mathcal H_n,\ \ \ \ \ Y(x)=nx\ \ \ \text{for }
x \in\mathcal H_n.$$
\[def:6.1\] [@man] We define the bijection $\tilde R:G_{\mathcal A}\to\mathfrak g_{\mathcal A}$ by $$\tilde R(\varphi)=\varphi^{-1}\star(\varphi\circ Y).$$
Consider the semidirect product Lie algebra $\tilde{\mathfrak g}_{\mathcal A}
=\mathfrak g_{\mathcal A}\rtimes{\mathbb C}\cdot Z_0,$ where $Z_0$ acts via $[Z_0,X]=X\circ Y$ for $X\in\mathfrak g_{\mathcal A}$. Let $\{\theta_t\}_{t\in\mathbb C}$ be the one-parameter group of automorphisms of $\mathcal
H$ given by $$\theta_t(x)=e^{nt}x, \text{ for }x\in\mathcal H_n.$$ Then $\varphi\ \
\mapsto
\varphi\circ\theta_t$ is an automorphism of $G_{\mathcal A}$. Let $\tilde{G}_{\mathcal A}$ be the semidirect product $$\tilde{G}_{\mathcal A}=G_{\mathcal A}\rtimes\mathbb C ,$$ with the action of $\mathbb C $ on $G_{\mathcal A}$ given by $\varphi\cdot t=\varphi\circ\theta_t$. $G_{\mathcal A}$ has Lie algebra $\mathfrak g_{\mathcal A}$.
We now define a second action of
|
arxiv
|
/**
* Deletes an existing row .
*
* @param ListEntry $entry The row to delete
*/
public function deleteRow($entry)
{
$entry->delete();
}
/**
* Returns the content of all rows as an associative array
*
* @param mixed $location A ListQuery or string URI specifying the feed location.
* @return array An array of rows. Each element of the array is an associative array of data
*/
public function getSpreadsheetListFeedContents($location)
{
$listFeed = $this->getListFeed($location);
$listFeed = $this->retrieveAllEntriesForFeed($listFeed);
$spreadsheetContents = array();
foreach ($listFeed as $listEntry) {
$rowContents = array();
$customArray = $listEntry->getCustom();
foreach ($customArray as $custom) {
$rowContents[$custom->getColumnName()] = $custom->getText();
}
$spreadsheetContents[] = $rowContents;
}
return $spreadsheetContents;
}
/**
* Returns the content of all cells as an associative array, indexed
* off the cell location (ie 'A1', 'D4', etc). Each element of
* the array is an associative array with a 'value' and a 'function'.
* Only non-empty cells are returned by default. 'range' is the
* value of the 'range' query parameter specified at:
* http://code.google.com/apis/spreadsheets/reference.html#cells_Parameters
*
* @param mixed $location A CellQuery, WorksheetEntry or a URL (w/o query string) specifying the feed location.
* @param string $range The range of cells to retrieve
* @param boolean $empty Whether to retrieve empty cells
* @return array An associative array of cells
*/
public function getSpreadsheetCellFeedContents($location, $range = null, $empty = false)
{
$cellQuery = null;
if ($location instanceof Zend_Gdata_Spreadsheets_Cell
|
github
|
The rising cost of college is at the forefront of the higher education debate. College costs are rising four times faster than family income, putting a postsecondary education further out of reach for low-income students.
Low-income students are often the first in their family to attend college and are at higher risk of dropping out because of unmet need—the gap between college costs and what students can afford to pay on their own and/or with aid that does not need to be repaid. One option available to address this gap is state need-based aid, which is awarded based on income and other financial factors (as opposed to academic performance). However, a recent report shows that, despite recent modest increases, state funding for such programs is still too low to measurably improve college access and success for low-income students.
Despite the proven success of need-based aid in reducing students’ financial burdens, investments to date have been far too small. In 2012-13, the average full-time community college student still had more than $6,000 in unmet need. According to the most recent report from the National Association of State Student Grant and Aid Programs (NASSGAP), in 2011-12, the 50 states and District of Columbia spent a total of $6.8 billion on need-based grant aid for college students. While this is a 6 percent increase from the previous year, it averages out to only $482 per enrolled undergraduate student—less than one-fifth of what the federal government spent on Pell Grants, the primary federal grant program to help millions of low-income students access postsecondary education. California, New York, and Texas led all states with the amount of need-based undergraduate grant aid awarded to students in 2011-12.
All the available data shows that investing in an individual’s education and training provides states with a more skilled and educated workforce and improves states’ economies in both the short and long term. In a joint study of all 50 states with the Center on Wisconsin Strategy (COWS), CLASP describes just how many workers need better skills and wages to become self-sufficient and promote economic growth in their state. This is consistent with research by the Economic Policy Institute, which finds that by increasing access to higher education, states will “expand economic opportunity and…do more to strengthen the overall state economy than anything else a state government can do.”
Many states are holding off on new investments until they have fully recovered from the recession, but students
|
pile-cc
|
Expand (8*c - 4*c - 17*c)*(1 - 2 - 1)*(0 + 1 - 3)*(2*c - 2*c + 6*c).
-312*c**2
Expand (4 + 3 - 3 + (3 - 1 - 4)*(4 + 1 - 4) - 3 + 9 - 18)*(2*t + 0*t - 3*t).
10*t
Expand (-5*d + 2*d + 0*d)*(-6*d - d - 10*d) + 2*d**2 + 4*d - 2*d - 4*d**2.
49*d**2 + 2*d
Expand (0 - 1 + 0)*(675 - 337 + 12*p - 340).
-12*p + 2
Expand (-2*c**2 + c**2 + 2*c**2)*(2*c**2 + 3*c**2 - 4*c**2) - 22451 - 14*c**4 + 22451 + 2*c**3 - 16*c**2.
-13*c**4 + 2*c**3 - 16*c**2
Expand (3 - 6 + 5)*(2076 + 2277 - 4737)*(-2*j**3 - 2*j + 2*j).
1536*j**3
Expand (2 + 1 - 9)*(j - 3 - 7*j - 2*j).
48*j + 18
Expand (29*v**2 - 29*v**2 + 5*v**4)*(2*v - 1 + 1) - 4*v**4 + 4*v**4 - 2*v**5 + (3*v**2 + v**3 - 3*v**2)*(0 - 3*v**2 + 0).
5*v**5
Expand (85*p**5 - 164*p**5 - 138*p**5)*(-1 + 1 + 2 + (2 + 7 - 4)*(2 + 1 - 4)).
651*p**5
Expand (-8 - 1 + 4)*(-50*l - 289 + 289 - 2*l + 2*l - 2*l + (4 - 5 + 2)*(0*l - l + 0*l)).
265*l
Expand (5 + 2 - 5 - 290*i**2)*(0
|
dm_mathematics
|
FYI
Sara Shackleton
Enron North America Corp.
1400 Smith Street, EB 3801a
Houston, Texas 77002
713-853-5620 (phone)
713-646-3490 (fax)
sara.shackleton@enron.com
----- Forwarded by Sara Shackleton/HOU/ECT on 04/24/2001 01:00 PM -----
Cheryl Nelson@ENRON
Sent by:
|
enron_emails
|
Mrs. Walker testified that after informing Dollie Smith and Addie Lewis of her injury, she then reported it that afternoon to (1) Fred Jordan, manufacturing supervisor for defendant, (2) George Fowler, supervisor of one shift, (3) Terry Copeland, personnel manager, (4) Glenn Poole, plant manager, and (5) Charliea Sandifer, a general worker at the plant. All of those witnesses, except Sandifer, were called by plaintiff.
Jordan, Copeland and Poole testified that plaintiff never reported the accident to them, and that they did not know anything about the alleged accident or injury until this suit was filed. Fowler stated that plaintiff called him over to her table one day and told him that she had hurt her knee, but that she continued to work "the rest of the week." He thought she was joking, but he nevertheless told her to see a doctor if she was hurt. He said that nothing more was said or done about such a complaint after that time. He also stated that plaintiff complained about her knees almost daily while she worked for defendant.
Plaintiff testified that she told another co-worker, Charliea Sandifer, that she had injured her knee immediately after the alleged accident occurred, that she showed the witness her knee and asked her to find George Fowler, that Mrs. Sandifer commented on the swelling of the knee, urged plaintiff to have it attended to, and then left to look for Fowler. Mrs. Sandifer was the only witness called by defendant. She firmly denied that plaintiff ever mentioned to her that she had struck or hurt her knee. She stated that plaintiff had complained about her knee on prior occasions, and particularly in December, 1974, and in January, 1975, and that plaintiff explained at the times of those complaints that "she had fell at the other plant and had hurt her knee and that it gives her trouble from time to time."
The plaintiff in a workmen's compensation suit, as in any other case, must prove his claim by a preponderance of the evidence. Schwab v. Fidelity and Casualty Company of New York, 294 So.2d 888 (La.App. 2 Cir. 1974); Guillory v. New Amsterdam Casualty Company, 244 La. 225, 152 So.2d 1 (1963); Roberts v. M. S. Carroll Co., 68 So.2d 689 (La.App. 2 Cir. 1953); Morrison v. East Baton Rouge Parish School Board, 316 So.2
|
freelaw
|
2013: HK gov used crappy reason to turn down a well-known HK businessman to
obtain free public broadcast license. So that HK has effectively only one
company to run free TV channel. And the news of that channel is highly biased.
2019: HK gov tried to pass extradition law to China. Even after 1 million
people protested, HK gov still continues legislation. After 2 millions people
protested, the CEO of HK gov only said "the bill is dead" in TV but did not
formally withdraw the bill in legislation council.
This is only a tiny list of what gov did in the past 22 years. What gov is
going to do is to pass a construction that cost trillions of HK dollars (app.
120 billion USD). That will basically empty the treasury of HK, and the future
of every HK people. That's why people are so frustrated and protest in that
extend.
~~~
ToniCipriani
Article 23 and the National Security provisions is also a big one.
------
AnimalMuppet
I'm not sure it matters so much what they're hearing now. What matters more is
what they've heard for the last decade or two - that it's all about great
China and uniting to follow the CCP leadership, that anyone disturbing that is
an antisocial troublemaker, and that such people deserve negative
consequences. After having that mindset drummed into you for long enough, it
may not matter what perspective they hear about the Hong Kong protests, at
least if they don't hear it for too long.
~~~
Leary
[https://www.youtube.com/watch?v=J4GXZOss6J4](https://www.youtube.com/watch?v=J4GXZOss6J4)
[https://www.youtube.com/watch?v=YdxXCTpHARQ](https://www.youtube.com/watch?v=YdxXCTpHARQ)
This is the scene that mainland Chinese people are seeing. A reporter of
Global Times was bound by protesters in the airport and attacked until
unconscious.
~~~
yorwba
Those are on YouTube, so law-abiding citizens aren't seeing them. The search
results for Hong Kong on Weibo are a bit different:
[
|
hackernews
|
This is an application for support of a conference entitled Making and breaking the left-right axis: Laterality in development and disease to be held June 15-16, 2013 in Cancun, Mexico, just prior to the joint Society for Developmental Biology 72nd Annual Meeting and the 17th International Congress of Developmental Biology. The objective of this satellite symposium is to bring together researchers working on invertebrate and vertebrate models for an up-to-date presentation of the latest results on the
|
nih_exporter
|
Continuous positive airways pressure for obstructive sleep apnoea.
Obstructive sleep apnoea is the periodic reduction (hypopnoea) or cessation (apnoea) of breathing due to narrowing or occlusion of the upper airway during sleep. The main symptom is daytime sleepiness although there it has been linked to premature death, hypertension, ischaemic heart disease, stroke and road traffic accidents. The main treatment for sleep apnoea is with continuous positive airways pressure (CP
|
pubmed_abstracts
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.