text
stringlengths
173
4.38k
subset
stringclasses
13 values
Factors used for logistic analysis included gender, age, HBsAg status, and anti-HIV status. Of the 513 IDUs seropositive for anti-HCV, 414 (80.7%) had detectable HCV RNA. No anti-HCV-seronegative subjects had detectable HCV RNA, regardless the status of HIV infection. We analyzed the factors related to HCV viremia among IDUs with HCV exposure ([Table 3](#pone-0094791-t003){ref-type="table"}). Age was similar between anti-HCV-seropositive IDUs with and without HCV viremia. HCV viremic subjects tended to have a higher proportion of males and higher AST and ALT ratios (*p* = 0.055, 0.08, and 0.09, respectively). Among IDUs with exposure to HCV infection, HBsAg-seropositive subjects had a significantly lower rate of HCV viremia than HBsAg-seronegative subjects did (45/78, 67.7% vs. 369/465, 79.4%, *p*\<0.001). However, the status of HCV RNA did not differ between IDUs with and without anti-HIV seropositivity. Among IDUs seropositive for both anti-HCV and anti-HIV, HCV viremic subjects tended to have higher levels of HIV RNA than those without HCV viremia (*p* = 0.09). The HCV RNA status did not correlate to the CD4 cell counts. Multivariate analysis showed that among IDUs seropositive for anti-HCV, HBsAg seropositivity was strongly negatively associated with HCV viremia, whereas anti-HIV seropositivity was significantly correlated with HCV viremia ([Table 4](#pone-0094791-t004){ref-type="table"}). HCV RNA viral load was unrelated to CD4 cell counts among IDUs who were seropositive for both of HCV RNA and anti-HIV (5.26±1.25, 5.26±1.25, and 5.26±1.25 log IU/mL for IDUs with CD4 cell count \>500, 350--500, and \<350 cells/µL, respectively, *p* = 0.99). However, there was a significant linear correlation between HCV and HIV RNA viral loads (*R* ^2^ = 0.014, *p*\<
pubmed_central
I have added a category to my NSManagedObject IBCompany, which should retrieve a specific time period, which is one of the IBCompany's relationships, based on a simple date comparison. When I run the following code, the NSArray sortedFinPeriodsDesc contains the faulted periods in the correct sorted order. However, when accessing them in the for each loop, each of the periods returns nil for its attributes, and in particular, nil for its EndDate. For this reason my method lastReportedPeriodforDate always returns nil, which is an error. #import "IBCompany+FinstatAccessors.h" @implementation IBCompany (FinstatAccessors) NSArray *sortedFinPeriodsDesc; - (IBFinPeriod*)lastReportedPeriodforDate:(NSDate*)date; { if ( !sortedFinPeriodsDesc ) { NSSortDescriptor *sortDescriptor = [NSSortDescriptor sortDescriptorWithKey:@"EndDate" ascending:NO]; sortedFinPeriodsDesc = [self.finperiod sortedArrayUsingDescriptors:[NSArray arrayWithObject:sortDescriptor]]; } IBFinPeriod *lastPeriod; for (IBFinPeriod *finPeriod in sortedFinPeriodsDesc) { if ( [finPeriod.EndDate compare:date] == NSOrderedAscending ){ // finPeriod.EndDate < date lastPeriod = finPeriod; break; } } return lastPeriod; } However, when replacing the first lines (lazy instantiation) in the method by removing the if clause and always instantiating and sorting NSArray sortedFinPeriodsDesc, the code works fine. Hence, I have a couple of questions: What is the error in my code? How does affect lazy instantiation faulting? Would you recommend defining the NSArray sortedFinPeriodsDesc as transient attribute and sorting it in awakeFromFetch instead? What would be the best option in your view? Thank you very much for your help! A: The "lazy loading" smacks of a premature optimisation. Particularly the way you've implemented it, you aren't actually using an instance variable, but a global variable (see here for details), meaning that each object isn't holding its own version of
stackexchange
Oplophorus luciferase was isolated from the deep-sea shrimp that is classified in crustaceans and the protein was identified by Shimomura, et al. in 1978 (Non-Patent Document 1). In 2000, Inouye et al. revealed by isolation of the gene that Oplophorus luciferase is a complex composed of 35 kDa protein consisting of 320 amino acid residues and 19 kDa protein consisting of 169 amino acid residues (Patent Document 1, Non-Patent Document 2). It has also been demonstrated by gene expression using Escherichia coli and cultured animal cells that the catalytic domain responsible for the luminescent oxidation of coelenterazine is present in the 19 kDa protein (Patent Document 1, Non-Patent Document 2). When a gene encoding the 19 kDa domain protein is expressed in Escherichia coli, it is expressed as inclusion bodies over 95%. It is reported that the 19 kDa protein is expressed as a soluble form in the Escherichia coli system using the fusion protein with protein A derived ZZ-domain (Non-Patent Document 3). On the other hand, it is shown that cultured animal cells do not secret the 19 kDa protein by their own signal peptide sequence for secretion but the 19 kDa protein have a luminescence activity in the cells (Non-Patent Document 2). In 2012, a method of conventional random mutagenesis was applied to this gene of the 19 kDa domain protein to produce the mutagenized 19 kDa domain gene, which was shown to provide higher activity than that of native 19 kDa protein, named “nanoLuc.” NanoLuc shows the difference of 16 amino acid residues with the native 19 kDa protein, which consists of 169 amino acid residues (KAZ), indicating 90.5% identity (Non-Patent Document 4). However, the essential amino acid residues for luminescence function are not identified and the function of mutated amino acid residues remains unclear. Patent Document 2 discloses the mutated 19 kDa protein including nanoLuc, which shows higher activity than that of native 19 kDa protein. Coelenterazine, a light-emitting substrate, is also known as a light-emitting substrate for Renilla luciferase of Renilla reniformis or as a source of light emission for the photoprotein aequorin isolated from Aequorea victoria and is a compound having an imidazopyrazinone ring as a core structure. The mechanism of light emission is considered as follows. Molecular oxygen attaches to coelenterazine and the resulting peroxide produces the dioxetanone. Subsequently, decarboxylation proceeds to form the coel
uspto_backgrounds
Honours 1875 : Officer in the Order of Leopold. 1881 : Grand Officer in the Order of Leopold. Knight of the Order of the Immaculate Conception of Vila Viçosa. Knight of the Order of Saint Michael. Member of the Royal Academy of Science, Letters and Fine Arts of Belgium. As an artist Geefs' early work has been characterized as "predominately elegiac in mood". By the end of the 1830s, however, he developed a powerful, spare realism in monumental works such as General Belliard and Frédéric de Mérode (erected in Brussels, 1836 and 1837) and Peter Paul Rubens (Antwerp, 1841). He was prolific in producing tombs, pulpits, statues, busts, and sculpture groups. Works The works of Guillaume Geefs include: Epitaphe of Guillaume-Charles de Merode, 4th Prince of Rubempré and Marie-Joseph d'Ognyes; Church of the Minimes, Brussels. Frédéric de Mérode (1833/1837), tomb monument, "noted for its naturalness and lack of idealization." General Belliard (1836), rue Royale, Brussels; more than life-size Victims of the Revolution (1838), an allegorical monument commemorating the Belgian Revolution Leopold I, considered one of the most important works of public art in Belgium in the 19th century; a stamp issued in 1981 commemorates this statue; it may be viewed online Treurende Adonis (1839), white marble of Adonis in mourning; view online A small sculpture of a young sleeping angel, privately held and not authenticated (but signed by the artist), found in 1993 in an abandoned house in Brussels; see Renderosity Digital Art Community or archive Grétry (1842), bronze statue of the composer, in front of the opera house in Liège Le génie du mal, a Lucifer in white marble for the Cathedral of St. Paul, Liège Charlemagne (1843), statue in the Basilica of Saint Servatius in Maastricht The Roman Gladiator, located opposite the M. H. de Young Memorial Museum in San Francisco to mark the ground-breaking for the 1894 Mid-Winter Exposition; see online
wikipedia_en
In the strong coupling regime $b\rightarrow\infty$ the action is useless. However, one can use the following observation. Each pair of fermionic screening charges defines the conformal algebra of the coset CFT $SU(2)_{\kappa}/U(1)$ with $\kappa=-2-b^{2}$. It is well known that this algebra commutes with a third screening charge $$\mathcal{W}=\oint\left(b\partial\Phi_{k}-i\beta\partial\phi_{k}\right)e^{b^{-1}(\Phi_{k}-\Phi_{k+1})}d\xi,$$ known also as Wakimoto screening charge. It means that the theory $$\label{action-dual} \tilde{\mathcal{A}}_{n}=\int\left(\frac{1}{8\pi}\left(\partial_{a}\Phi\cdot\partial_{a}\Phi\right)+\frac{1}{8\pi}\left(\partial_{a}\phi\cdot\partial_{a}\phi\right)+ \tilde{\Lambda}\sum_{k=1}^{n}\left(b\partial\Phi_{k}-i\beta\partial\phi_{k}\right)\left(b\bar{\partial}\Phi_{k}-i\beta\bar{\partial}\phi_{k}\right)e^{b^{-1}(\Phi_{k}-\Phi_{k+1})}\right)\,d^{2}\xi,$$ shares the same integrable structure in the limit $\tilde{\Lambda}\rightarrow0$ as the original one in the limit $\Lambda\rightarrow0$. Actually, the theory makes sense only in the region $b\rightarrow\infty$. In order to regularize its UV behavior one has to add counterterms. Total renormalized action will have a form of a sigma-model $$\label{action-SM} \tilde{\mathcal{A}}_{n}=\frac{1}{8\pi}\int G_{\mu\nu}(\boldsymbol{X}|\tilde{\Lambda},b^{2})\partial_{a}X^{\mu}\partial_{a}X^{\nu}d^{2}\xi,\quad\text{where}\quad \boldsymbol{X}=(\Phi_{1},\dots,\Phi_{n},\phi_{1},\dots,\phi_{n}).$$ The precise form of the metric $G_{\mu\nu}(\boldsymbol{X}|\tilde{\Lambda},b^{2})$ might be very complicated. Moreover, it depends
arxiv
#Official post-EVAL period data files evalpart1_data_dir=/export/babel/data/203-lao/release-current/conversational/eval evalpart1_data_list=./conf/lists/203-lao/evalpart1.list evalpart1_rttm_file=/export/babel/data/scoring/IndusDB/IARPA-babel203b-v3.1a_conv-evalpart1/IARPA-babel203b-v3.1a_conv-evalpart1.mitllfa3.rttm evalpart1_ecf_file=/export/babel/data/scoring/IndusDB/IARPA-babel203b-v3.1a_conv-evalpart1/IARPA-babel203b-v3.1a_conv-evalpart1.scoring.ecf.xml evalpart1_stm_file=/export/babel/data/scoring/IndusDB/IARPA-babel203b-v3.1a_conv-evalpart1/IARPA-babel203b-v3.1a_conv-evalpart1.stm evalpart1_kwlists=( [kwlist]=/export/babel/data/scoring/IndusDB/IARPA-babel203b-v3.1a_conv-evalpart1/IARPA-babel203b-v3.1a_conv-evalpart1.annot.kwlist.xml [kwlist2]=/export/babel/data/scoring/IndusDB/IARPA-babel203b-v3.1a_conv-evalpart1/IARPA-babel203b-v3.1a_conv-evalpart1.annot.kwlist2.xml [kwlist3]=/export/babel/data/scoring/IndusDB/IARPA-babel203b-v3.1a_conv-evalpart1/IARPA-babel203b-v3.1a_conv-evalpart1.annot.kwlist3.xml [kwlist4]=/export/babel/data/scoring/IndusDB/IARPA-babel203b-v3.1a_
github
As always, I pulled myself out of bed and did what I needed to do before coming downstairs and putting on the kettle. Whilst waiting for it to boil, I opened the back doors as I always do and suddenly was hit with nothing. Total silence. I stepped outside and breathed in and listened again – nothing. The air was still. The early morning sun was just beginning to bathe the garden in half-light and the chilly nip was still in the air. Instead of walking back into the house, I stood a moment and just looked at the sky; at the vapour trails that I could clearly see, at the trees behind me in which lurked squirrels, pigeons and all manner of other birds and I breathed deeply again. It was a truly beautiful and serene moment and I found myself thinking actually, this was pretty special. If I had stayed in bed like my body demanded, I would have missed this. I would have got up when the rest of the world was up, when the cars would be trundling along the road in the distance, when the dogs would be barking on their walks out the back and I would never have known that this serenity existed. Serenity…early morning sun in the UK I always remember my grandparents being early risers and I used to think that they were crazy. Why get out of bed when you don’t have to? But now, having enjoyed the moment that I did today, I am wondering if it was me that was missing out after all. With the extra time I have managed to write this blog post and will hopefully be able to spend some time visiting other blogs. In addition, I will probably be able to get some work done. via Stuart Miles @ freedigitalphotos.net Maybe the early bird really does catch the worm? Thoughts anyone? Are you early risers or do you stay in bed til the last minute? I have a habit of always waking up a few minutes before an alarm. Even if it isn’t meant for me, I seem to know when I have 5 minutes to go. Never really understood the sadistic reasoning behind the things anyway. Who ever thought it was a great idea to start the day being jolted awake by a loud noise? The day starts at 5:10 AM. Even on the weekend, my favorite time is early morning on the deck at my cabin, watching
pile-cc
Calculate the greatest common divisor of 50 and 8230. 10 What is the highest common factor of 306135 and 225? 45 Calculate the greatest common divisor of 396 and 21312. 36 What is the greatest common divisor of 10518 and 204? 6 What is the highest common factor of 10155 and 195? 15 What is the highest common factor of 1697443 and 55? 11 What is the highest common factor of 600 and 48150? 150 What is the highest common factor of 144 and 47124? 36 What is the greatest common factor of 151633 and 2968? 53 Calculate the highest common factor of 10 and 788770. 10 What is the highest common divisor of 21650 and 13856? 866 What is the greatest common divisor of 84 and 7294? 14 Calculate the highest common factor of 709993 and 341. 31 What is the highest common divisor of 303176 and 4? 4 Calculate the greatest common divisor of 5 and 2083. 1 Calculate the highest common factor of 7697988 and 12. 12 Calculate the greatest common divisor of 933 and 21770. 311 Calculate the greatest common factor of 6 and 981822. 6 Calculate the highest common factor of 66308 and 726. 242 Calculate the greatest common factor of 67 and 1855967. 67 Calculate the greatest common factor of 1332 and 354. 6 Calculate the highest common divisor of 84703 and 355. 71 What is the greatest common factor of 38808 and 8484? 84 Calculate the highest common divisor of 385165 and 376. 47 Calculate the highest common divisor of 144 and 196488. 72 What is the greatest common factor of 2976 and 64? 32 What is the highest common factor of 117 and 190879? 13 What is the highest common factor of 615924 and 24? 12 What is the greatest common factor of 423 and 1101257? 47 What is the highest common factor of 13 and 72748? 13 What is the greatest common divisor of 179751 and 117? 39 Calculate the highest common factor of 42 and 84406. 14 What is the greatest common divisor of 647560 and 40? 40 Calculate the highest common factor of 220 and 16368. 44 Calculate the
dm_mathematics
DOUGLAS GILBERT-SMITH, ? The PEP system closes on Friday, May 25, 2001. ? Our records indicate that one or more of your direct reports has suggested reviewers that you have not yet approved. Feedback cannot be provided on your employee until you approve the reviewers. ? Please log into PEP at http://pep.enron.com and select Supervisor Services from the
enron_emails
II ¶ 14. The Court of Appeals found that the proof only supported the crime of "heat of passion" manslaughter and remanded for re-sentencing. The Court of Appeals supports its decision for remand for re-sentencing for manslaughter with Harrell v. State, 218 So.2d 883 (Miss.1969). Harrell is a case with facts which are stronger in support of a self-defense or "imperfect self-defense" theory. There, Harrell killed an intruder who was first ejected from her home and later returned evidencing aggressive intent. There was a factual dispute as to whether the intruder had actually entered the house or was in the doorway and whether or not he was wielding a knife. The Court acknowledged that the evidence was sufficient to withstand a motion for a directed verdict of not guilty, but that "the ends of justice will better be served by a remand of the case for a new trial." Harrell does not support a remand with directions to find guilt on manslaughter only. Rather, it simply remands for another trial on guilt and degree. As we have said, the present case is close upon the facts as to the guilt or innocence of the accused. After carefully reviewing the whole record, we have concluded that while the evidence was sufficient to withstand appellant's motion that the jury be instructed peremptorily to return a verdict of not guilty, the conviction should be reversed and the case remanded for a new trial in order that another jury may pass upon appellant's guilt or innocence of unlawful homicide, and upon the grade of her offense, if found guilty. Harrell at 886-87. This language mandates a new trial where the possibility of guilt still exists for both the principal and the lesser-included offense, unlike the present case where the Court of Appeals held, as a matter of law, that Wade was not guilty of murder but rather was guilty of manslaughter. The real importance of the reliance upon Harrell by the Court of Appeals is found in that court's quote as follows: A person may be guilty only of manslaughter or justifiable homicide when slaying another even though the accused is mad and is bearing ill will toward his adversary at the time of the killing, if *776 the act is done while resisting an attempt of the latter "to do any unlawful act, or after such attempt shall have failed," if such anger or ill will is engendered by the particular circumstances of the unlawful act then being attempted, or the commission of which is then thwarted,
freelaw
Ask HN: Single repo vs. repo for each service? - BhavdeepSethi Recently I’ve been working with having the entire codebase in a single repo way and it’s not really been a good experience. Every time someone modifies code in a separate module, I have to recompile&#x2F;generate sources to fix the compilation errors. Not to mention compiling takes a lot of time as well. Some of the points in favor of the single codebase approach I’ve heard is that you don’t have to worry about versioning. Since everyone has to pull in the same changes, everyone has access to the same thrift sources as well.<p>I’m mostly accustomed to having separate repository for each service. Personally, I think it makes it more manageable. It goes hand in hand with the SOA approach. A bad commit in another service doesn’t affect you.<p>Yet, I’ve seen the single codebase method in bunch of orgs. I believe Google does this as well? I&#x27;m curious to know which one is more common. What are the pros&#x2F;cons that have factored into choosing one over another? ====== w4tson Devs should never be checking in code that results in a compilation error. Regardless of whether something needs generating. Also there’s a difference between an entire companies code in one VCS and a product with many modules. I’ve had experience with the latter and can tell you some of the pro’s: 1\. A single version for your product. This helps communications with QA, clients and managers. And communication is the game we are in whether we like it or not 2\. Reduced friction in developing features that cut across modules. Lets say I need to add a column to a database and then expose in the Ui. update the sql, added the field in a webservice, make the necessary adjustments in the UI, write the tests all on the same commit. 3\. Increased collaboration. Quite often invisible lines are drawn on development teams where devs are feel they are unable to modify a module because they didn’t write it, they don’t understand it or they just feel that its not a part of their job. With everything in one repo this reduces the barrier to entry Its not a free lunch
hackernews
This protocol is a phase II trial with primary goals to examine the efficacy and toxicity of DTIC in the treatment of patients with recurrent glioma and to describe the pharmacokinetics of DTIC, MTIC, and hydroxymethyl MTIC in Mayo Clinic patients treated on this study. The protocol has accrued a total of 39 patients (13 from Mayo) and is temporarily closed because it met its original accrual objectives. An abstract describing the complete pharmacokinetic data was presented at the American Association of Cancer Research in 1998
nih_exporter
Serum prolactin response to thyrotropin-releasing hormone during status epilepticus. Determination of serum prolactin can help distinguish between epileptic and pseudo-epileptic attacks since generalized tonic-clonic and complex partial seizures frequently are accompanied by a transient rise in prolactin. In status epilepticus, however, serum prolactin levels are well within the normal range: cellular depletion due to the prolonged seizure activity has been suggested as a mechanism for this finding. The
pubmed_abstracts
Microarray processing and analysis {#Sec10} ---------------------------------- Samples from 12, 18, 24 and 33 h were used for microarrays to evaluate the influence of the changes in extracellular sugar concentration on whole genome gene expression. These time points were chosen as they reflect the stage in which specific sugars were taken up. RNA was extracted using TRIzol reagent (Invitrogen) and purified using TRIzol® Plus RNA Purification Kit (Sigma-Aldrich) according to the instructions of the manufacturer. The RNA concentration was calculated from the absorbance at 260 nm in a spectrophotometer (Biochrom Libra S22). The RNA quality was analyzed with an Agilent 2100 bioanalyzer using a RNA6000 LabChip kit (Agilent Technology). Microarray hybridization was performed at GenomeScan (Leiden, The Netherlands). Microarray data was analyzed using Affymetrix Expression Console software v1.4.1.46 with the normalized values in linear scale. The probe intensities were normalized for background by the robust multiarray average (RMA) method which makes use of only the perfect match probes. Gene expression values were calculated with the medianpolish summary method from the PM probes. Genome scale PCA analysis with gene expression of the four different time points was generated using FactoMineR^[@CR34]^ package from Rcomander v.2.1--7 in R 3.1.2.^[@CR35]^. Discovery of sugar transporters {#Sec11} ------------------------------- A total of 71 known fungal transporter sequences were collected from Transporter classification database^[@CR36]^ (TCDB, <http://www.tcdb.org/>) and by manual literature search. The sugar transporter domain (PF00083) profile extracted from PFAM database (<http://pfam.xfam.org/family/pf00083>) was used to search against the combined sequence files of *A*. *niger* proteome and known transporters with the 'hmmsearch' of the HMMER tool^[@CR37]^. The hmmsearch score ≥238 was chosen as a cutoff to define the sugar transporter candidates since it was the lowest score observed among the search results of all the known transporters. Each transporter candidate was Blast searched against the collected sequences of known fungal transporters. With the threshold of Blast e-value \< 1E-6 and identity percent \>30%, the best Blast hit was used to annotate the candidate transporters. The raw and normalized microarray data generated and analysed during the current
pubmed_central
The following does not completely answer OP's question, rather, this is going to be a clarification of subtleties and difficulties on the issue. Notice that sometimes I am going to use the same notations as OP used, but not necessarily the exact same meanings and I will make them clear in the context. The usage of "wavefunction" It has two possible meanings when people refer to something as wavefunctions : (1). The collection of some functions $g(x)$ furnishes a positive-energy, unitary representation of the underlying symmetry group(in our case just the Poincare group). (2). In addition to (1) being satisfied, we should be able to interpret $|g(x)|^2$ as the probability distribution of finding the particle in $(\mathbf{x},\mathbf{x}+d\mathbf{x})$. It really has to be of the form $|g(x)|^2$ according to the standard axioms of quantum mechanics, provided you interpret $g(x)$ as an inner product $\langle x|g\rangle$ where $\langle x|$ is an eigen bra of the position operator. I will discuss what position operator means later. The 2nd meaning is of course much stronger and OP is searching for a wavefunction in this sense. However, the $\psi(x)$ written by OP is only a wavefunction in the 1st sense, because clearly $\langle 0|\phi(x)$ cannot be eigen bras of any Hermitian position operator, easily seen from the fact that they are not even mutually orthogonal, i.e. $\langle 0|\phi(x)\phi^\dagger(y)|0\rangle\neq0$ even when $x$ and $y$ are spacelike separated. As a consequence, $\int d^3\mathbf{x}|\psi(x)|^2\neq1$ as OP has already noted. Moreover, $|\psi(x)|^2$ is invariant under Lorentz transformation, but a density distribution should transform like the 0th component of a 4-vector in relativistic space-time, as OP has also noticed. The localized states and position operator(Newton-Wigner) In this section I will mostly rephrase(for conceptual clarity in sacrifice of technical clarity) what is written in this paper. What is a sensible definition of position operator of single-particle states? First we need to think about what the most spatially-localized states are, and then it would be natural to call these states
stackexchange
Many conventional filter assemblies include a hollow, cylindrical filter which comprises a cylindrical, pleated filter medium sandwiched between and bonded to impervious end caps. At least one of the end caps has a central aperture through which a fluid line communicates with the interior of the filter. Fluid to be filtered is directed through the filter medium from the outside to the inside and the filtered fluid is then removed from the interior of the filter via the fluid line. As the fluid flows outside-in through the filter, contaminants, such as particulates, accumulate on the outside surface of the filter medium. Once a sufficient accumulation of contaminants has caked onto the outside surface of the filter medium, flow through the filter is significantly impeded. At this point, the filter should be removed from the filter assembly and replaced with a new filter. Unfortunately, with the accumulation of contaminants caked on the outside of the filter medium, removing and replacing the filter can result in the release of some of the accumulated contaminants. These contaminants can then re-enter the system fluid and cause severe wear or other related problems. A filter assembly having a filter with one closed end cap allows the fluid to be filtered to be directed from the inside-out and significantly diminishes this problem. The contaminants accumulate on the inside surface of the filter medium and therefore are contained within the filter by the medium and closed end cap. Consequently, the filter may be removed and replaced conveniently without release of the accumulated contaminants trapped inside the filter. Unfortunately, conventional filter assemblies designed for inside-out have several additional drawbacks. For example, in order to force fluid through the filter, the pressure of the fluid inside the filter must be greater than the pressure of the fluid outside the filter. This difference in pressure forces the end caps away from the filter medium. If the force becomes great enough, the bond between the end caps and the filter medium can rupture, causing contaminated fluid to bypass the filter medium. Because of this force, conventional filter assemblies frequently use two open end caps with compression seals and/or an auxiliary spring force to help keep the filter in compression to prevent rupture of the end cap bonds. However, the open end caps will not contain the accumulated contaminant on the inside of the filter. Inside-out flow is also more likely to stretch and misshape the pleats of the filter medium than outside-in flow. Misshaping the element modifies its porous characteristics, making it useless long before rupture occurs. Further, both of these problems, i.e, rupture of the
uspto_backgrounds
Biography Paul Bomani was born in 1925 in Ikuzi, Mara. He served as the Minister of Finance, Agriculture, Economic Affairs and Planning, and Commerce and Industry. He also served as a member of Parliament. Paul Bomani was a very successful business man and was reported to be one of the richest African in Tanzania by 1970. Paul Bomani is among a handful of Tanganyikans/Tanzanians who made significant contributions to the country. He was active in the independence struggle and after Tanganyika/Tanzania won independence, he was one of the main people responsible for finance and development for the country in the 1960s to early 70s. Paul Bomani attended Nassa Primary School in Mwanza from 1936 to 39. He joined the Teacher Training College in Ikizu, Mara from 1939 to 1944. He worked as the Assistant Secretary of Cash Stores of the Williamson Diamonds Limited in Shinyanga between 1945 and 1947. He became the Managing Secretary of Mwanza African Traders Co-operative Society Limited 1947 to 1952. Mwanza African Traders Co-operative Society was a wholesale cooperative started to assist African traders. Bomani founded the Lake Province Cotton Growers Association in 1950. Bomani left Tanganyika to study in England in 1953. He studied Agricultural Economics and Co-operative Laws at Loughborough Co-operative College in England from 1953 to 1954. Bomani returned to Tanganyika and continued with work as an organizer and one of the leaders of the nascent independence movement. He worked as the General Manager of Victoria Federation of Co-operative Unions Limited from 1955 to 1960. Bomani became very active in Tanganyika politics early on; he was elected as the provincial Chairman of the Tanganyika African Association (TAA) from 1950 to 1953. The colonial government appointed him as the member of the Legislative Council in 1954. The appointment came after Chief Kidaha Makwaia left the territory. Makwaia would later resign under pressure. Paul Bomani became a powerful force in the Lake Province with the establishment of TANU as the main political party fighting for independence starting in 1954. Bomani helped to make TANU a powerful force in the Lake Province. Paul Bomani was appointed as a member of the Post Election Committee in 1959 by the Tanganyika Governmor, Sir Richard Turnbull. Bomani was among a handful of Africans appointed
wikipedia_en
K. S. Novoselov, A. K. Geim, S. V. Morozov, D. Jiang, M. I. Katsnelson, I. V. Grigorieva, S. V. Dubonos, A. A. Firsov, Nature **438**, 197 (2005). A. H. Castro Neto, F. Guinea, N. M. R. Peres, K. S. Novoselov, and A. K. Geim, Rev. Mod. Phys. **81**, 109 (2009). M. I. Katsnelson, K. S. Novoselov, and A. K. Geim, Nature Physics **2**, 620 (2006). V. V. Cheianov, V. Fal’ko, and B. L. Altshuler, Science **315**, 1252 (2007). Z. Z. Zhang, K. Chang, and K. S. Chan, Appl. Phys. Lett. **93**, 062106 (2008). V. H. Nguyen, A. Bournel, V. L. Nguyen, and P. Dollfus, Appl. Phys. Lett. **95**, 232115 (2009). P. Michetti, M. Cheli, and G. Iannacconea, Appl. Phys. Lett. **96**, 133508 (2010). E. Prada, P. San-Jose, and H. Schomerus Phys. Rev. B **80**, 245414 (2009). W.-R. Hannes and M. Titov, Europhysics Letters **89**, 47007 (2010). D. A. Abanin and L. S. Levitov, Science **317**, 641 (2007). D. C. Elias, R. R. Nair, T. M. G. Mohiuddin, S. V. Morozov, P. Blake, M. P. Halsall, A. C. Ferrari, D. W. Boukhvalov, M. I. Katsnelson, A. K. Geim, K. S. Novoselov, Science **323**, 610 (2009). M. V. Fistul and K. B. Efetov, Phys. Rev. Lett. **98**, 256803
arxiv
type joinOptions struct { remote string listenAddr NodeAddrOption // Not a NodeAddrOption because it has no default port. advertiseAddr string dataPathAddr string token string availability string } func newJoinCommand(dockerCli command.Cli) *cobra.Command { opts := joinOptions{ listenAddr: NewListenAddrOption(), } cmd := &cobra.Command{ Use: "join [OPTIONS] HOST:PORT", Short: "Join a swarm as a node and/or manager", Args: cli.ExactArgs(1), RunE: func(cmd *cobra.Command, args []string) error { opts.remote = args[0] return runJoin(dockerCli, cmd.Flags(), opts) }, } flags := cmd.Flags() flags.Var(&opts.listenAddr, flagListenAddr, "Listen address (format: <ip|interface>[:port])") flags.StringVar(&opts.advertiseAddr, flagAdvertiseAddr, "", "Advertised address (format: <ip|interface>[:port])") flags.StringVar(&opts.dataPathAddr, flagDataPathAddr, "", "Address or interface to use for data path traffic (format: <ip|interface>)") flags.SetAnnotation(flagDataPathAddr, "version", []string{"1.31"}) flags.StringVar(&opts.token, flagToken, "", "Token for entry into the swarm") flags.StringVar(&opts.availability, flagAvailability, "active", `Availability of the node ("active"|"pause"|"drain")`) return cmd } func runJoin(dockerCli command.Cli, flags *pflag.FlagSet, opts joinOptions) error { client := dockerCli.Client() ctx := context.Background() req := swarm.JoinRequest{ JoinToken: opts.token, ListenAddr: opts.listenAddr.String(), AdvertiseAddr: opts.advertiseAddr, DataPathAddr: opts.dataPathAddr, RemoteAddrs:
github
It means less amplifier power is needed for more audio output. Meaning better sound and more volume using less power. The bottom line is db Loudspeakers will definitely blow you and your friends away, whether they're driven by aftermarket head units or factory installed electronics. (If you really want to punch your music up, check out our PA amplifiers.) Advanced Component Systems Component models have a vented crossover housing and hidden wire channels for an easier, more professional-looking install. All component models use a 2nd-order Butterworth outboard crossover for component system sound - at a coaxial price. Hey, maybe a full-blown component system and a db sub enclosure in a SmartCar isn't all that practical. Some db Coaxials will fill the bill quite nicely, thank you. There are three new db models not previously offered in the db line: a 3-1/2 inch diameter coaxial, a 4x6 plate-style speaker and a 6-1/2 inch Slim Mount coaxial for easy fit into shallow doors. The 6-1/2 inch sized db651 and db651S models come with 6-3/4 inch adaptor rings for easy fit in VWs, Audis, BWMs and other European cars. Marine Certified means your db loudspeakers will perform reliably on the water as well as they do on land. So we attacked every db speaker with a series of punishing real world and accelerated weathering lab tests to see if they could take what some pretty nasty marine and automotive environments could dish out. We exposed dbs to hundreds of hours of salt fog, intense ultraviolet light and extreme temperatures from -40° to 185° F (-40° to 85° C). They performed as well after the tests as before (they didn't look so good). No wonder Correct Craft® builds Polk Audio speakers into their award-winning Nautiques® ski and wakeboarding boats, and Bullet® uses Polk db speakers in their marine "tower" speaker enclosures. Comments: I have not gotten to use these speakers for an extended period of time so I do not know anything about their durability. I do feel they are a high quality speaker option to upgrade the front speakers. You must purchase or make an adapter bracket to mount the speakers as the stock ones aren't the same size. I would recommend them to anyone. Comments: These Polks along with the stock front speakers and a
pile-cc
80 What is the lowest common multiple of 1898 and 5? 9490 What is the lowest common multiple of 232 and 261? 2088 Find the common denominator of -5/84 and 16/33. 924 What is the common denominator of -30/7 and -1/9? 63 Find the common denominator of -17/209 and 17/114. 1254 Calculate the smallest common multiple of 179 and 7160. 7160 Find the common denominator of 77/45 and -103/270. 270 What is the smallest common multiple of 192 and 54? 1728 Calculate the smallest common multiple of 36 and 1440. 1440 What is the least common multiple of 1887 and 10? 18870 What is the smallest common multiple of 2 and 1? 2 Calculate the least common multiple of 75 and 125. 375 What is the common denominator of -3/20 and 69/80? 80 What is the least common multiple of 10 and 8035? 16070 What is the common denominator of 113/4116 and -87/2744? 8232 What is the least common multiple of 20 and 48? 240 What is the common denominator of 25/56 and 59/56? 56 Calculate the common denominator of 41/2325 and -61/93. 2325 Calculate the common denominator of 151/174 and -53/464. 1392 What is the smallest common multiple of 1596 and 49? 11172 What is the common denominator of -47/16 and -121/1206? 9648 Find the common denominator of -77/370 and 125/666. 3330 Calculate the common denominator of -157/84 and 49/12. 84 What is the smallest common multiple of 20 and 2762? 27620 Calculate the lowest common multiple of 30 and 20. 60 What is the smallest common multiple of 404 and 4? 404 What is the lowest common multiple of 40 and 275? 2200 Find the common denominator of 35/52 and 59/54. 1404 Calculate the common denominator of -19/350 and -17/140. 700 What is the lowest common multiple of 3 and 1? 3 What is the smallest common multiple of 28 and 168? 168 Calculate the lowest common multiple of
dm_mathematics
In his presentation at the conference, Gov. Davis described the state's strategy for solving the currently electric power supply crunch in four words: "Build more power plants." Davis outlined the quick approvals that have been made to get power plants sited and construction started. He told the conference that by the fall of 2003, the state, "will finally have more power than California needs. We are on the glide path toward that goal; but
enron_emails
For Appellant : Geoffrey L. B r a z i e r argued, Helena, Montana. For Respondent: Hughes, Bennett and Alan F. Cain, Helena, Montana. George T. Bennett argued, Helena, Montana. Submitted: September 26, 1972 Decided Qm1 7 1972 Mr. Justice Wesley Castles delivered the Opinion of the Court. This is an appeal from a declaratory judgment entered for plaintiff in the district court of the first judicial district, county of Lewis and Clark. Plaintiff is Jersey Creamery, Inc., a corporation, doing business as a dairy. Defendant is the Board of Milk Control, an administrative agency of the state of Montana. Hereinafter plaintiff will be called "~ersey"and defendant "~oard". Jersey operates what are known as "Quality Chekd" dairies, and is a member of the Quality Chekd Dairy Products Association. Jersey proposed a scholarship contest whereby the fact of the contest would be advertised on its milk cartons and through other advertising media throughout the state. Applicants for the scholarship were not required to purchase anything from Jersey, but merely to complete an application blank. These blanks were found on the cartons, but any applicant could make his own application form, as long as it contained the necessary information. These applications were then to be given to an independent agency to pick the winners by a drawing, All applications except those of non-residents of the state or employees of Jersey were eligible to win the contest. There was no necessity for the purchase of any of Jersey's merchandise to be eligible to win. Winners of the contest received funds to be applied toward a college education, the funds to be paid directly to the college of the winner's choice. Jersey informed the Board of its proposed scholarship contest as part of a national "Quality Chekd" program, The Board informed Jersey this contest would violate the Montana Milk Control Act and that the contest was prohibited. Jersey then appealed to the full Board, thereby exhausting its adminis- trative remedies. The final ruling of the Board was that the scholarship contest violated specific sections of the Milk Control Act and regulations
freelaw
Ask HN: VC funded startup downsides? - mr_puzzled I&#x27;m starting to question the whole thought process behind VC funded startups : take money -&gt; grow fast -&gt; get to a liquidity event so investors can make returns. VC funded startups are all about growth growth growth. I feel like there are serious downsides to this mentality :<p>- encourages failing quickly hence is a wasteful process<p>- almost always companies do desperate things to keep growing and changing, hurting users eg- reddit<p>- a steady state i.e zero growth but profitable existence is not encouraged. Such a state of existence is actively discouraged so it becomes : keep growing or die already. A lot of companies that could exist, make a profit and keep users happy instead just die.<p>- It&#x27;s likely you give up some control over the direction of the company having to balance stakeholders, getting to a liquidity event, growing a business.<p>What are your thoughts? Here&#x27;s a crazy idea : YC but for bootstrappers. Give each startup $120k and ask them to pay back 5X that once they become profitable. The most valuable thing about YC is the people, network and fellow founders. I think removing the VC factor should be considered, at least for a parallel program. ====== Eridrus > Give each startup $120k and ask them to pay back 5X that once they become > profitable. The devil is going to be in the details of what "profitable" means. If the company just keeps hiring people and growing, are they profitable, or not? You also have to remember that this idea would be competing with bank loans, so you would have to be willing to take significantly more risk than a bank does to ask for get 5X returns. Speaking of which, "5X" returns may sound great, but the timeline for those is somewhat important too. 5X in 3 years is very different to 5X in 20 years. Maybe it's just me, but I wouldn't take this deal. I'm not super interested in VC unicorn money, but as someone in tech, it's really not hard to pull 120k together. And if I thought it was just going to be "profitable", I wouldn't want to be in a position where I am being asked to pay back 600
hackernews
The association between Bcl-2 and cancer has been known for 20 years. But the biochemical mechanisms to explain why Bcl-2, found at translocation breakpoints in follicular lymphomas, why elevated Bcl-xL expression in many tumor types, and why herpesviruses that encode Bcl-2 homologues cause cancer, remains unknown. The field has focused considerable effort to understand the complex interactions between anti-death (Bcl-2 and Bcl-xL) and pro-death (Bax and Bak
nih_exporter
Two duplex coatings, Cr(N)/S and Cr(C)/S, were deposited on 316 L stainless steel by magnetron sputtering. The effectiveness of these duplex coatings in improving the tribocorrosion behavior of medical alloys under elastic contact conditions has been demonstrated in a recent publication. The present work focused on the response of these duplex coatings to tribocorrosion under plastic contact conditions. Tribocorrosion tests were conducted in 0.89% NaCl solution at 37°C
pubmed_abstracts
Using a Zn deficiency-promoted rat ESCC model with prominent miR-31 overexpression ([@r11]) and a cancer-associated inflammatory gene signature ([@r8]), we investigated the effects of LNA-mediated antimiR-31 delivery, or constitutive knockout of miR-31, on NMBA-induced ESCC development in ZD rats. We found that in vivo LNA-antimiR-31 delivery moderately suppressed ESCC development, whereas genetic miR-31 knockout completely protected ZD:miR-31^−/−^ rats from ESCC development. In parallel, we examined the molecular consequences of miR-31 silencing in ESCC suppression by analyzing gene expression and metabolomics profiles. Because genome instability is an important "hallmark" of cancer development, we were also interested, during this "omics" study, to include whole-genome sequencing (WGS) of esophageal tissue samples from NMBA-treated rat cohorts: ESCC-bearing Zn-deficient wild-type (WT) rats, Zn-sufficient (ZS) WT rats with undetectable tumors, and tumor-free ZD:miR-31^−/−^ rats. Results {#s1} ======= AntimiR-31 Delivery Inhibits ESCC Development in Zn-Deficient Rats. {#s2} ------------------------------------------------------------------- To determine if in vivo antimiR-31 delivery silences miR-31 and suppresses the development of ESCC, we performed a 20-wk anticancer study in the ZD rat ESCC model with miR-31 up-regulation ([@r11]) and a cancer-associated inflammatory gene signature ([@r8]). We used an LNA-mediated rno-miR-31a-5p inhibitor probe (designated antimiR) to inhibit esophageal miR-31 expression and an LNA-negative-control-A probe (designated CTRL-A) as a control oligo ([@r10]). As depicted in [Fig. 1*A*](#fig01){ref-type="fig"} (see treatment details in [*Materials and Methods*](#s12){ref-type="sec"}), 4-wk-old rats were randomized into four Zn-deficient cohorts (ZD:antimiR/20-wk, ZD:antimiR/5-wk, ZD:CTRL-A, ZD:CTRL) and one Zn-sufficient group (ZS:CTRL). ZD:antimiR/20-wk and ZD:CTRL-A/20-wk rats
pubmed_central
Q: Eliminate duplicate rows from query output I have a large SELECT query with multiple JOINS and WHERE clauses. Despite specifying DISTINCT (also have tried GROUP BY) - there are duplicate rows returned. I am assuming this is because the query selects several IDs from several tables. At any rate, I would like to know if there is a way to remove duplicate rows from a result set, based on a condition. I am looking to remove duplicates from results if x.ID appears more than once. The duplicate rows all appear grouped together with the same IDs. Query: SELECT e.Employee_ID, ce.CC_ID as CCID, e.Manager_ID, e.First_Name, e.Last_Name,,e.Last_Login, e.Date_Created AS Date_Created, e.Employee_Password AS Password,e.EmpLogin ISNULL((SELECT TOP 1 1 FROM Gift g JOIN Type t ON g.TypeID = t.TypeID AND t.Code = 'Reb' WHERE g.Manager_ID = e.Manager_ID),0) RebGift, i.DateCreated as ImportDate FROM @EmployeeTemp ct JOIN dbo.Employee c ON ct.Employee_ID = e.Employee_ID INNER JOIN dbo.Manager p ON e.Manager_ID = m.Manager_ID LEFT JOIN EmployeeImp i ON e.Employee_ID = i.Employee_ID AND i.Active = 1 INNER JOIN CreditCard_Updates cc ON m.Manager_ID = ce.Manager_ID LEFT JOIN Manager m2 ON m2.Manager_ID = ce.Modified_By WHERE ce.CCType ='R' AND m.isT4L = 1 AND CHARINDEX(e.first_name, Selected_Emp) > 0 AND ce.Processed_Flag = @isProcessed A: I don't have enough reputation to add a comment, so I'll just try to help you in an answer proper (even though this is more of a comment). It seems like what you want to do is select distinctly on just one column. Here are some answers which look like that: SELECT DISTINCT on one column How can I SELECT rows with MAX(Column value),
stackexchange
The third generation (3G) mobile telecommunications system has adopted a Wideband Code Division Multiple Access (WCDMA) wireless air interface access method for a cellular network. WCDMA provides high frequency spectrum utilization, universal coverage, and high quality, high-speed multimedia data transmission. The WCDMA method also meets all kinds of QoS requirements simultaneously, providing diverse, flexible, two-way transmission services and better communication quality to reduce transmission interruption rates. Through the 3G mobile telecommunications system, a user can utilize a wireless communications device, such as a mobile phone, to realize real-time video communications, conference calls, real-time games, online music broadcasts, and email sending/receiving. However, these functions rely on fast, instantaneous transmission. Thus, targeting at the third generation mobile telecommunication technology, the 3rd Generation Partnership Project (3GPP) provides High Speed Package Access (HSPA) technology, which includes High Speed Downlink Package Access (HSDPA) and High Speed Uplink Package Access (HSUPA), to increase bandwidth utility rate and package data processing efficiency to improve uplink/downlink transmission rate. On the basis of HSDPA, the 3GPP further introduces HS-DSCH (High Speed Downlink Shared Channel) reception in a CELL_PCH and a URA-PCH state, allowing the UE in the CELL_PCH or the URA-PCH state to monitor an HS-DSCH accompanied with a Shared Control Channel for HS-DSCH (HS-SCCH) for downlink data reception, so as to improve a peak data rate, a signaling delay, a state transition delay, download times and flexible cell capacity. In the HS-DSCH reception in the CELL_PCH and URA_PCH state, the HS-DSCH is a transport channel allowed to map on dedicated-type logic channels including a Dedicated Control Channel (DCCH) and a Dedicated Traffic Channel (DTCH) or common-type logic channels including a Paging Control Channel (PCCH) and a Broadcast Control Channel (BCCH). A UMTS radio access network (UTRAN) enables the HS-DSCH reception in the CELL_PCH and the URA_PCH state by including parameters, related to radio resource control (RRC) configuration of PICH (Paging Indicator Channel), HS-SCCH, HS-DSCH and an H
uspto_backgrounds
Bangladesh Bangladesh Free Trade Union Congress Bangladesh Ganotantrik Sramik Federation Bangladesh Jatio Sramik League Jatiyo Sramik Jote Bangladesh Jatyatabadi Sramik Dal Bangladesh Labour Federation Bangladesh Mukto Sramik Federation Bangladesh Sanjukta Sramik Federation Bangladesh Trade Union Kendra Jatio Sramik Federation Jatyo Sramik League Samajtantrik Sramik Front Barbados Barbados Workers' Union Congress of Trade Unions and Staff Associations of Barbados Leeward Islands Airline Pilots Association National Union of Public Workers Belarus Belarus Free Trade Union Belarusian Congress of Democratic Trade Unions Federation of Trade Unions of Belarus Belgium Confederation of Christian Trade Unions General Confederation of Liberal Trade Unions of Belgium General Federation of Belgian Labour Belize Christian Workers' Union General Workers' Union (Belize) National Trade Union Congress of Belize United General Workers Union Benin Autonomous Trade Unions Centre General Confederation of the Workers of Benin National Union of the Unions of the Workers of Benin Bermuda Bermuda Industrial Union Bermuda Public Services Association Bhutan Federation of Bhutanese Trade Unions Bolivia Bolivian Workers' Center Caboface Confederación Sindical Única de Trabajadores Campesinos de Bolivia Corriente de Renovación Independiente y Solidaridad Laboral Federación Sindical de Trabajadores Mineros de Bolivia Bosnia and Herzegovina Confederation of Independent Trade Unions of Bosnia and Herzegovina Confederation of Trade Unions of the Republika Srpska Botswana Botswana Federation of Trade Unions Air Botswana Employees' Union Botswana Agricultural Marketing Board Workers' Union Botswana Bank Employees' Union Botswana Beverages & Allied Workers' Union Botswana Central Bank Staff Union Botswana Commercial & General Workers' Union Botswana Construction Workers' Union Botswana Diamond Sorters & Valuators' Union Bots
wikipedia_en
2. $\mathcal{F}$ is of the form $\operatorname{forbid}(A)$ for some finite antichain $A$ with respect to the minor relation $\leq$. The Galois closed sets of relational constraints were likewise described by Pippenger [@Pippenger]; this description was extended to arbitrary, possibly infinite, underlying sets in [@CF]. We shall briefly survey Pippenger’s description of the Galois closed sets of constraints. An $m$-ary relational constraint $(R,S)$ is a *simple minor* of an $(m+p)$-ary relational constraint $(R',S')$ if there is $h \colon \{1, \ldots, n\} \to \{1, \ldots, m+p\}$ such that $$\begin{aligned} R \left(\begin{array}{c} x_1\\ \vdots \\ x_m\\ \end{array}\right) & \quad \iff \quad \exists x_{m+1} \ldots \exists x_{m+p} \quad R' \left(\begin{array}{c} x_{h(1)}\\ \vdots \\ x_{h(n)}\\ \end{array}\right) \intertext{and} S \left(\begin{array}{c} x_1\\ \vdots \\ x_m\\ \end{array}\right) & \quad \iff \quad \exists x_{m+1} \ldots \exists x_{m+p} \quad S' \left(\begin{array}{c} x_{h(1)}\\ \vdots \\ x_{h(n)}\\ \end{array}\right). \end{aligned}$$ Note that simple minors subsume the notions of permutation, diagonalization and projection of arguments; for background see [@CF; @Pippenger]. A constraint $(R,S)$ is obtained from a constraint $(R',S)$ by *restricting the antecedent* if $R\subseteq R'$. Likewise, $(R,S)$ is obtained from a constraint $(R,S')$ by *extending the consequent* if $S\supseteq S
arxiv
type Iovec struct { Base *byte Len uint64 } type IPMreq struct { Multiaddr [4]byte /* in_addr */ Interface [4]byte /* in_addr */ } type IPMreqn struct { Multiaddr [4]byte /* in_addr */ Address [4]byte /* in_addr */ Ifindex int32 } type IPv6Mreq struct { Multiaddr [16]byte /* in6_addr */ Interface uint32 } type PacketMreq struct { Ifindex int32 Type uint16 Alen uint16 Address [8]uint8 } type Msghdr struct { Name *byte Namelen uint32 _ [4]byte Iov *Iovec Iovlen uint64 Control *byte Controllen uint64 Flags int32 _ [4]byte } type Cmsghdr struct { Len uint64 Level int32 Type int32 } type Inet4Pktinfo struct { Ifindex int32 Spec_dst [4]byte /* in_addr */ Addr [4]byte /* in_addr */ } type Inet6Pktinfo struct { Addr [16]byte /* in6_addr */ Ifindex uint32 } type IPv6MTUInfo struct { Addr RawSockaddrInet6 Mtu uint32 } type ICMPv6Filter struct { Data [8]uint32 } type Ucred struct { Pid int32 Uid uint32 Gid uint32 } type TCPInfo struct { State uint8 Ca_state uint8 Retransmits uint8 Probes uint8 Backoff uint8 Options uint8 _ [2]byte Rto uint32 Ato uint32 Snd_mss uint32 Rcv_mss
github
Hey Girl Moguls! It’s Poppy here, and with Earth Day coming up this month, I just wanted to share something cool with you about what Michelle Obama and the Obama girls are doing to go Green! Michelle Obama started the first White House “kitchen garden” since Eleanor Roosevelt and planted a bunch of healthy vegetables in it like lettuce, spinach, broccoli, onions, carrots and peas. This garden will grow food for the entire Obama family and everyone—Michelle, Sasha, Malia and even President Obama—will all help to care for it. Starting a garden is such a great thing to do; not only does it save money on food shopping, but it can be really relaxing to work on and is a great encouragement to eat healthy! As most of you know, I grew up on a farm so I know a lot about gardening and taking care of plants. If you’re interested in starting your own garden, you don’t always have to start big—you can find a small plot of land in your backyard to begin or, if it’s too cold outside, start growing your plants indoors in plant pots! Wherever you start growing your plants, make sure it’s in a spot with lots of sunshine. There are two different ways you can start your garden: you can either grow them from seeds or from small plants called seedlings. Figure out what kind of vegetables you want to grow and what grows well in your area. Don’t be discouraged if your vegetables don’t grow right away—it takes time! Gardening and farming both require being really patient, so relax and let your plants enjoy the sun! P.S. Even if you don’t want to grow your own vegetable garden, you can encourage your family to buy locally grown fruits and vegetables. In addition to being fresher and tastier, buying locally grown food helps the environment since food doesn’t have to travel far and waste gas to get to you! GirlMogul Poppy Posted by GirlMogul Poppy GirlMogul Adventures #1 Check out the GirlMogul's latest adventure. City girl Rose is stuck in MON - the Middle of Nowhere - for the whole entire summer. It's shaping up to the be the worst summer - ever! But then she finds an old diary - and before she knows it - discovers a secret that may change a town's entire history! Will she and her friends be able
pile-cc
0 Let r(l) = 2*l - 8. Let o be r(5). Suppose -5*j - 5*a + 30 = 0, o*a + 11 - 3 = 3*j. Suppose 9*n - j*n - 50 = 0. Solve -3*i = -n - 5 for i. 5 Let o = 2611 + -2611. Let j(b) = b**2 - b - 5. Let x be j(-4). Solve -3*i - x = -o*i for i. -5 Let r be (-1 + 11*4/20)*-25. Let g = 46 + r. Solve -2*n + g = -6*n for n. -4 Suppose 165 = 3*p - 3*k, -5*p + k + 221 = -50. Solve 3*h = -p + 39 for h. -5 Suppose -4*o + 4*u = -20, 7*o = 5*o - 3*u + 15. Solve 2*x + o*x - 16 = 0 for x. 2 Suppose -i = -3*w + 12, -3*w + w = 5*i - 8. Suppose -y - 102 = -w*y. Suppose -4*p + y = -2*b, -p - 4*p = -b - 38. Solve -2*l = -p*l - 5 for l. -1 Let c(j) be the first derivative of j**2 + 6*j - 3. Let p be c(0). Solve p = -a - a for a. -3 Let w(x) = 5*x**3 - 3*x**2 + 7*x - 1. Let i(k) = 6*k**3 - 3*k**2 + 8*k - 2. Let o(a) = -6*i(a) + 7*w(a). Let v be o(-3). Solve -6*z + 10 = -v for z. 2 Suppose 3*o = 2*m - 1, -o - o - 6 = 0. Let h(k) = k**2 - k - 5. Let p be h(m). Suppose -2*n + p = 7.
dm_mathematics
a) on Aug 1, we pay the greater of the $1.5MM ($2.5 less $1 paid at exercise) and the Additional Compensation (less the $1 MM) b) a separate agreement whereby Corp guarantees the payment on Aug 1. The intention is to sign the Amendment #3 before 5/9. Thanks everyone for making this happen. Steve Hase - #1283523 v5 - AMENDMENT NO
enron_emails
Argued and Submitted September 22, 1977. Decided November 7, 1977. William G. Carter, Medford, argued the cause for appellant. With him on the brief was Grant, Ferguson & Carter, Medford. Thomas H. Denney, Asst. Atty. Gen., Salem, argued the cause for respondent. With him on the brief were James A. Redden, Atty. Gen., and W. Michael Gillette, Sol. Gen., Salem. Before SCHWAB, C.J., and RICHARDSON and ROBERTS, JJ. ROBERTS, Judge. Defendant appeals from his conviction of furnishing liquor to a minor, a Class A misdemeanor. Two assignments of error are made. First, it is claimed that defendant was deprived of his right to a jury trial. Our disposition of this case makes it unnecessary to discuss the facts or the second assignment of error. After defendant was arrested and charged with the crime, his attorney made a written request for a jury trial as provided by Jackson County District Court Rule 5.6.[1] However, defense counsel did not appear at pretrial conference. Rule 5.13 of Jackson County District Court Rules provides that failure to attend a pretrial conference is a *1022 waiver of a jury trial.[2] On the day set for trial no jury was present. Defendant proceeded to trial before the judge. No mention was made of a jury by either the state or defense. The record is silent on the matter. The right to a jury trial in "criminal prosecutions" is guaranteed by the Oregon Constitution. "In all criminal prosecutions, the accused shall have the right to public trial by an impartial jury in the county in which the offense shall have been committed; * * * provided, however, that any accused person, in other than capital cases, and with the consent of the trial judge, may elect to waive trial by jury and consent to be tried by the judge of the court alone, such election to be in writing; * * *" Or.Const., Art. I, § 11. (Emphasis supplied.) The Oregon statutes also require that a waiver of a jury trial in criminal cases be in writing.[3] The state argues that the failure to execute written waiver of a jury trial is harmless error absent a showing of actual prejudice, citing State v. Naughten, 5 Or. App. 6, 8, 480 P.2d 448, Sup.Ct. review denied (1971). That
freelaw
====== mtmail Simvalley, which is probably just one brand name of many for the same Chinese manufacturer, has a phone which you can also use as walkie-talkie. Quadband, dual SIM, waterresistent, rugged, 2 week standby. Should be ideal for construction work, hiking, festivals or just areas with limited cell coverage. ------ mpoloton I have no idea but here is a good read regarding dumb phones [http://www.bunniestudios.com/blog/?p=3040](http://www.bunniestudios.com/blog/?p=3040) ------ stephancoral Lekki has some awesome phones. [http://lekki.fr/fr/40-- original-](http://lekki.fr/fr/40--original-) Old Ericssons, Siemens, Nokia, and Motorola - including this beautiful rainbow StarTac: [http://lekki.fr/fr/mobile/71-startac- rainbow.html#&panel1-1](http://lekki.fr/fr/mobile/71-startac- rainbow.html#&panel1-1) ------ runjake You can still find new-in-box Nokia Series 40 phones, sometimes in lots, on eBay. That might be your best bet. ------ jqm Samsung AT&T go phone. [http://www.bestbuy.com/site/at-t-gophone- samsung-a157-no-con...](http://www.bestbuy.com/site/at-t-gophone- samsung-a157-no-contract-cell-phone-black/5568676.p?id=1218663132502) $10 to purchase. Throw it away, drop it in the toilet... as long as you can get the sim, no problem. And if, like me, you don't make a lot of cell calls (I have internet phone at home), around $10 a month in prepaid airtime. Make sure you ask to have the mobile browser turned off because you "accidentally" can get a bunch of charges by the conveniently placed button that starts the browser. There
hackernews
Ledge Light Health District serves as the local health department for eight municipalities in southeastern Connecticut and has primary responsibility for regulation of retail food establishments in the jurisdiction. Ledge Light Health District in enrolled in the Voluntary National Retail Food Regulatory Program Standards and completed a self-assessment in 2014. The project proposed in this application - improving conformance with the Retail Program Standards through technology, will enable Ledge Light Health District to achieve greater conformance with the Voluntary National Retail Food Regulatory Program
nih_exporter
Recently, increasing evidence has been found demonstrating direct effects of angiostatin on tumor cells themselves. We have applied the plasminogen derivatives K1-4 and K1-5 to a lung cancer model to analyse indirect angiostatic effects against endothelial and direct effects against tumor cells. In accordance with preceding findings both derivatives inhibited endothelial cell functions in vitro. Additionally K1-4 and K1-5 have also shown substantial anti-proliferative and pro-apoptotic effects in tumor cells and have inhibited
pubmed_abstracts
: cathepsin G CGi : cathepsin G inhibitor CTRL : control CXCL1 : chemokine (C‐X‐C motif) ligand 1 DHPI : dihydropyrimidine FLF‐sBzl : succinyl‐Phe‐Leu‐Phe‐thiobenzyl ester H&E : haematoxylin and eosin HNE : human neutrophil elastase IL : interleukin IL‐36RA : interleukin‐36 receptor antagonist IL‐36R : interleukin‐36 receptor NE : neutrophil elastase NEi : neutrophil elastase inhibitor PMA : phorbol 12‐myristate 13‐acetate PR3 : proteinase‐3 PRB : protease reaction buffer Rec : recombinant RFU : relative fluorescence unit RPMI : Roswell Park Memorial Institute SCID : severe combined immune‐deficient SN : supernatant TNF : tumour necrosis factor UT : untreated VS : virtual screening WEHD‐AMC : Ac‐Trp‐Glu‐His‐Asp‐7‐amino‐4‐trifluoromethylcoumarin z‐VAD‐fmk : carbobenzoxy‐valyl‐alanyl‐aspartyl‐\[O‐methyl\]‐fluoromethylketone IL‐1 family cytokines, which include the recently described IL‐36α, IL‐36β and IL‐36γ proteins, are among the first cytokines produced in response to infection or injury and play key roles in the initiation of inflammation as a consequence [1](#feb412406-bib-0001){ref-type="ref"}, [2](#feb412406-bib-0002){ref-type="ref"}, [3](#feb412406-bib-0003){ref-type="ref"}, [4](#feb412406-bib-0004){ref-type="ref"}. IL‐1 family
pubmed_central
SQLite VFS implementation guide lines with FOpen* I am about to implement a custom VFS (virtual file system) for a Netburner embedded device (non windows) using FOpen, FRead, FWrite, FSeek, and FClose. I was surprised that i could not find a FOpen* version of the VFS available. It would make it a lot more portable to embedded devices. I found some information on creating the VFS for SQLite here http://sqlite.org/c3ref/vfs.html but the information is very detailed and I have lots of other questions about the implementation. I have some example VFS in the SQLite source code for Win, OS2, Linux but they don't have a lot of comments, only source code. I could use the information provided in the link above and the examples to create my custom VFS but i'm sure that I would miss something if I did it that way. My questions are: Is there any more documentation about the SQLite VFS that I am missing? Maybe an implementation guide? Is there an Fopen version of the SQLite VFS that is available? Is there a unit testing code available to test my custom SQLite VFS once I have created it? Suggestions, comments, experiences with implementing SQLite VFS that you would like to share. A: Did you notice that there is an additional source of documentation in the header file sqlite3.h? Also, Google code search is your friend. Don't worry too much about missing things, this is what the test suite is for. Take a guess at the purpose of every method from their name, the documentation and the example implementations; go for a first-draft implementation; run the tests on your target platform; iterate until the bar is green. From a cursory reading of the interface doc that you quoted, here are some educated guesses: int (*xOpen)(sqlite3_vfs*, const char *zName, sqlite3_file*, int flags, int *pOutFlags); int (*xDelete)(sqlite3_vfs*, const char *zName, int syncDir); int (*xAccess)(sqlite3_vfs*, const char *zName, int flags, int *pResOut); int (*xFullPathname
stackexchange
A basic component of a printed circuit board is a dielectric layer having a sheet of copper foil bonded thereto. Through a subtractive process that includes one or more etching steps, portions of the copper foil are etched away to leave a distinct pattern of conductive lines and formed elements on the surface of the dielectric layer. Multi-layer printed circuit boards are formed by stacking and joining two or more of the aforementioned dielectric layers having printed circuits thereon. In recent years, the trend has been to reduce the size of electronic components and provide printed circuit boards having multi-chip modules, etc. This results in a need to increase the number of components, i.e., surface mount components, provided on a printed circuit board. A key to providing a densely populated circuit board is to produce close and fine circuit patterns from the copper. The width and spacing of conductive paths on the printed circuit board are generally dictated by the thickness of the copper on the dielectric layer. For example, if the copper has a thickness of 35 .mu.m (which is a conventional 1-ounce copper used in manufacturing many printed circuits), exposing the printed circuit board to an etching process for a period of time to remove such a copper thickness will also reduce the width of the side areas of the printed circuit path in approximately the same amount. In other words, the width of the spacing between adjacent circuit lines is basically determined by the thickness of the copper foil on the dielectric layer, as well as the narrowness of the line to be formed. In this respect, as the thickness of the foil decreases below 35 .mu.m, the ability to physically handle such foil becomes more difficult. There is a minimum thickness of a copper foil sheet that is determined by the ability of the foil manufacturer to handle and transport such sheets. Hence, there is also a limit on achieving close and fine circuit patterns from copper sheets. In recent years, it has been proposed to use copper-coated polyimides in forming printed circuits. The thickness of the copper on polyimide is generally significantly less than the thickness of traditional copper foil sheet. The thinner copper on the polyimide allows for finer and more closely spaced circuit lines in that the thinness of the copper layer reduces the etching time required to remove unwanted copper. In this respect, it is possible to use copper clad polyimide wherein the copper has a thickness as low as 0.1 .mu.m (1,000 .ANG.). The thinner copper on the polyimide also finds advantageous application in a semi-additive process. In a semi-
uspto_backgrounds
The negative preterite I is formed by the auxiliary э- negative verb with the same personal endings as in present tense. The main verb is the same as in the present tense Preterite II The second preterite is a past tense with an evidentiality distinction. It can be compared to the English perfect in which the speaker did not personally observe the past event. The preterite II is marked with -ӧм-, which is historically related to the third infinitive in Finnish. The negative preterite II is formed by including the auxiliary copular negative verb абу 'is not', e.g. абу уджалӧма (I have evidently not worked), абу уджалӧмыд (you have evidently not worked) etc. Auxiliary past tenses There are four past tenses in Komi which use a preterite form of the main verb and a preterite form of the auxiliary verb 'to be'. Preterite III The Komi preterite III makes use of the main verb in the present tense and the auxiliary вӧлі, 'was' in third person singular, in simple past. The pluperfect I tense expresses a continuation of action that has happened in the (distant) past. The negative preterite III is formed by including the auxiliary copular verb вӧлі ‘was' with the main verb in the present negative. Preterite IV The Komi preterite IV (pluperfect) makes use of the main verb in the preteri II form and the auxiliary вӧлі, 'was' in third person singular, in simple past. The preteri IV tense expresses an evidently completed action that has happened in the (distant) past. The negative preterite IV is formed by including the auxiliary copular negative verb абу 'is not', e.g. вӧлі абу уджалӧма (I have evidently not worked), вӧлі абу уджалӧмыд (you have evidently not worked) etc. Preterite V The Komi preterite V makes use of the main verb in the present form and the auxiliary вӧлӧм, 'apparently was'
wikipedia_en
So a minimal resolution of $M$ looks in general as follows $... \to G \to F \to G \to F_{n-1} \to ... \to F_0 \to M \to 0$. As a consequence all the homological invariants like $Tor_k^R(M,N), Ext_R^k(M,n)$ are 2-priodic, [@BVS], [@EP]. The category of matrix factorizations of $f$ over $R$, namely $MF(R,f)$; is defined to be the differential $\mathbb{Z}/2$-graded category, whose objects are pairs $(X,d)$, where $X=X^0 \oplus X^1$ is a free $\mathbb{Z}/2$-graded $R$-module of finite rank equipped with an $R$-linear map $d$ of odd degree satisfying $d^2=f.\ id_X$. Here the degree is calculated in $\mathbb{Z}/2$. Regarding to the first definition $$d= \left( \begin{array}{cc} 0 & d_0\\ d_1 & 0 \end{array} \right), \qquad d^2=f.\ id.$$ The morphisms $MF(X,X')$ are given by $\mathbb{Z}/2$-graded $R$-module maps from $X$ to $X'$ (or equivalent between the components $X^0$ and $X^1$) provided that the differential is given by $$d(f)=d_{X'} \circ f - (-1)^{\mid f \mid} f \circ d_X.$$ Here $d_{X}$ or $d_X^{\prime}$ may be considered as the matrix given above or to be separately $d_0$ and $d_1$, and also it is evident that $d(f)^2=0$. By choosing bases for $X^0$ and $X^1$ we reach to the former definition, [@EP]. Hochster Theta Function ======================= M. Hochster in his study of direct summand conjecture defined the following invariant for the hypersurface ring $R=P/(f)$, namely $\Theta$-invariant. (Hochster Theta pairing) The theta pairing of two $R$-modules $M$ and $N$ over
arxiv
"1", "2", "3", "4", "5", "6", "7", "8", "9", "10", "11", "12" ], "short": [ "M01", "M02", "M03", "M04", "M05", "M06", "M07", "M08", "M09", "M10", "M11", "M12" ], "long": [ "M01", "M02", "M03", "M04", "M05", "M06", "M07", "M08", "M09", "M10", "M11", "M12" ] }, "days": { "narrow": [ "र", "सो", "मं", "बु", "गु", "शु", "श" ], "short": [ "रवि", "सोम", "मंगल", "बुध", "गुरु", "शुक्र", "शनि" ], "long": [ "रविवार", "सोमवार", "मंगलवार", "बुधवार", "गुरुवार", "शुक्रवार", "शनिवार" ] }, "eras": { "narrow": [ "ERA0", "ERA1" ], "short": [ "ERA0", "ERA1" ], "long": [ "ERA0", "ER
github
I love when people discover their life passions! I love when those passions can be translated into a business that benefits others.When you hear the history and formation of Newton's Attic, you realize that this is precisely the case with this business. Bill Cloyd began as a young boy on a farm gathering useful, undervalued materials and testing the bounds of physics. As a teenager he perfected his free fall by building an 80 foot tower using his neighbors' unwanted TV antennae and a circus net. Soon after he built a human catapult and practiced launching people into a nearby pond. The drive and ambition of Cloyd could not be confined to the small space of a classroom. As a mechanical engineering major, it seemed like a good fit to try teaching, but Cloyd soon discovered that his passion for physics was larger than the space allowed. Cloyd felt compelled to start Newton's Attic, a non-profit educational resource that utilizes fun, excitement, and PLAYING as learning tools.So that is the back story of Newton's Attic, but let me tell you about our experience there. As a mother who is used to saying, "Don't touch that! Stop child, you might break something," it was refreshing to hear that my children could tinker with the physics toys and robots on site. "They can touch everything except the table saw," is what we were told. During the two hours that we were visiting, my children ages 3-10 were able to build and launch small rockets, play with a robotic arm, ride a roller coaster, and use an enormous catapult to shoot a weedeater and toaster across the field. As all you mothers of young sons can imagine, watching an appliance fly through the air and then crash into pieces was sheer joy!The staff and the equipment totally engaged our children and built into their minds and spirits. The Newton's Attic helpers (and family) were kind, informative, and inclusive to all the members of our group. The Newton's Attic experience was summed up for me by a brief phrase I heard after the successful weedeater launch. As the kids ran across the open space to retrieve the busted up parts and pieces, I heard one of the staffers remark candidly to the owner, "Is that weedeater string? I might need that for something." Physics at Newton's attic is limited only by your creativity (and the laws of physics). We can only imagine what project will be next...If you want to learn
pile-cc
Let f(d) = d**3 + d + 132. Calculate f(0). 132 Let l(d) = 10*d - 413. Calculate l(41). -3 Let r(w) = -w + 4. Calculate r(8). -4 Let o(m) = -m**3 + 2*m**2 + 6*m + 2. Give o(-2). 6 Let y(q) = -4*q. Calculate y(2). -8 Let j(w) = -w**2 - 35*w - 10. Give j(-35). -10 Let z(x) = -x**3 + 11*x**2 + 81*x - 6. Calculate z(16). 10 Let w(s) = 3*s**2 + 25*s + 98. Determine w(-6). 56 Let r(y) = -y**3 + 9*y**2 + 26*y - 149. Give r(10). 11 Let u(t) = 2*t + 36. Give u(-17). 2 Let c(z) = 3*z - 6. What is c(2)? 0 Let y(h) = -h**2 + 19*h - 66. Calculate y(13). 12 Let x(l) = 13*l + 84. Determine x(-7). -7 Let n(t) = -t**3 - 32*t**2 + 35*t + 53. Calculate n(-33). -13 Let k(l) = -l**3 + 4*l**2 + 6*l + 6. Calculate k(5). 11 Let w(u) = 5*u - 17. Give w(4). 3 Let q(k) = -k**3 - 7*k**2 + 18*k - 9. Calculate q(-9). -9 Let y(m) = -m**3 + 20*m**2 - m + 4. What is y(20)? -16 Let d(f) = 2*f**2 - 22*f - 1. Calculate d(11). -1 Let a(w) = -w**3 + w**2 - w + 36. Give a(0).
dm_mathematics
I sent this to Greg and forgot to send it to you as well. This is a preliminary file until I have the official NGI settle prices for Chicago City Gate and Socal. Let me know it you have any questions. Susan Beatrice Reyna@ENRON 12/04/2000 04:39 PM To: Susan M Scott/HOU/ECT@ECT cc: Subject: Re: Nat Gas Basis
enron_emails
*259 Hirsch, Van Slyke, Richter & Ollason, Tucson, for petitioner. Twitty, Sievwright & Mills, Phoenix, for respondents. UDALL, Justice. The petitioner, Jose B. Davila, herein referred to as employee, is before this Court on a writ of certiorari to review an award of the Industrial Commission granted as a result of injuries received while in the employ of San Manuel Copper Corporation, herein referred to as employer. This case involves two separate and distinct claim files of the Industrial Commission. The first case involves injury to employee's right arm which occurred on May 15, 1960. The second case involves an injury to employee's fingers on his left hand which occurred on August 3, 1961. On the date of the first injury the employee was taken to San Manuel Hospital for treatment. The medical report reveals there was swelling in employee's right wrist and stiffness of a finger on his right hand. Employee resumed light work the following day. Dr. Findlay, chief surgeon at the hospital, referred the case to Dr. Fonseca for evaluation. Dr. Fonseca found there were no neurological problems but found some indication of hysteria. On July 12, 1960, Dr. Neumann examined employee and concluded that he had no neurological deficit but advised further exercises to strengthen employee's right hand. On August 30, 1960 employee was examined by Dr. Hastings and Dr. Findlay. They were of the opinion there was no evidence of any residual disability from the injury and that employee represented a combination of actual malingering and hysteria. They found that employee could return to regular work. *260 Employee filed his claim with the Commission on September 22, 1960. Dr. Findlay discharged employee from further medical treatment on November 3, 1960, without disability, and on November 15, 1960 the Commission entered its Findings and Award, closing the claim and specifically finding there was no permanent disability. Employee timely filed his protest on December 5, 1960 with the allegation that within twenty days from that date he would make application for a rehearing. The petition for rehearing was filed on December 28, 1960, more than twenty days after the filing of the notice of protest. The Commission treated the late petition for rehearing as a petition for reopening, and by an interim order authorized a medical examination of employee without reopening the case. Employee was examined on April 10, 1961, by Drs. Hastings, Wells, Neumann, Findlay and Fon
freelaw
~~~ fsiefken yes, unfortunately the frequency and language analysis didn't result in anything useful except for some vague hints the encoded language might be asian, perhaps written by a westerner who traveled there. ------ BerislavLopac I'll be calling my rock band "Quiet Bulldozer". ;-) ~~~ ansgri There's a composition I like very much, by GY!BE, "She Dreamt She Was a Bulldozer, She Dreamt She Was Alone in an Empty Field". Maybe you could do similar genre? ------ tsunamifury This introduction feels eerily similar to an opening interview at Google. ~~~ chime How so? ------ BaconJuice Enjoyed reading this. Thank you. ------ k2xl Question (maybe a dumb one) but how does an algorithm account for symbols that might mean a series of letters? Or a symbol that stands for a different letter depending on the symbol before or after it? ~~~ shabble In general, using _n_ -grams[1], probably at the character level. (So, as the article mentions, the bigram "ch" is common in German, and "qu" is much more common than "q _X_ " for any _X_ in English) You can analyse texts you believe to be similar (in language, period, subject, etc) to the coded message you are attempting to crack, and use that to build tables of these n-grams in various semantic units. Of course, these are useful in many more things than code-breaking, and Google have various datasets they make publically available. The Google books ngram viewer[2] is a fun tool to play around with, or for the more serious, you can download a corpus of ~24GB of analysed web data they've crawled (from around 1 trillion source words)[3] One actual example of a code constructed in the manner described is the Playfair cipher[4] which was used for a time in the late 1800s, but is now thoroughly broken. [1] <https://en.wikipedia.org/wiki/N-gram> [2] <http://books.google.com/n
hackernews
The long term objective is to determine the molecular alterations that produce ultrastructural and fertilization related functional changes in egg envelopes. Structural changes in the glycoproteins composing the egg envelope will be correlated with functional changes in sperm binding, induction of the sperm acrosome reaction, and sperm penetration of the envelope. The animal being used is the frog Xenopus laevis. Specific aims include structure-function studies of the coelomic to vitelline envelope conversion which takes place in the pars recta
nih_exporter
Case Study: Supply Chain Transformation in the Mercy Health System. The Mercy case study documents evidence of a clinically integrated supply chain strategy implemented in the peri-operative programs in three of the 46 hospitals in the Mercy system. Mercy became the first US health system to achieve "the perfect order," a supply chain industry standard with end-to-end integration of supply chain best practice in the Mercy system. To date, the Mercy strategy has demonstrated revenue growth of $8
pubmed_abstracts
For the Or and Gr families of roughly similar size in *D. pseudoobscura*., 18 and 8 proteins were precisely correctly annotated in FlyBase, respectively ([Appendices 1](#app01){ref-type="app"} and [2](#app02){ref-type="app"}), as part of the automated annotation effort ([@bibr32]). Existing annotations for 23 Ors and 24 Grs required some modification, commonly minor N- or C-terminal extensions to reach appropriate start and stop codons, but sometimes involving missed exons or unspliced open in-frame introns. In a few cases a single gene was annotated in a region that encodes multiple genes or transcripts, e.g. GA12528 represents the five transcripts that are hypothesized to be produced from the alternatively-spliced Gr28b locus. Eleven genes in each family were represented by GA placeholders in the *D. pseudoobscura* genome browser but no annotation was available for them, while 20 Ors and 16 Grs had no GA identifier associated with them. Some of the latter are pseudogenes and some were truncated by ends of contigs so they could not be annotated, and the remainder are instances of genes without *D. melanogaster* orthologs and hence might more easily have been missed by the orthology-based automated annotation process. The automated annotation rate was nevertheless rather low at just over 50%, perhaps because of the high divergences of some of these orthologous pairs. All of these gene models were communicated to FlyBase in 2005, and the encoded proteins are available in a supplementary file (chemoreceptor_proteins.txt). Comparisons with the *D. pseudoobscura* and *D. yakuba* genes also allowed improvement of several *D. melanogaster* gene models, most of which were incorporated in FlyBase with publication of Robertson et al. ([@bibr35]). Additional subsequent changes included recognition that the N-termini of DmGr21a and 63a are probably shorter than earlier predicted (see also [@bibr33]), while DmOr65b/c each likely have a short N-terminal extension to the existing annotation. These changes have been made in FlyBase. In addition, the version of DmOr98b in the sequenced genome is a pseudogene, see below. The Or family {#sec3b} ------------- Comparisons of the *D. melanogaster* and *D. pseudoobscura*
pubmed_central
or one preg_match? if (preg_match('hello'||'i am'||'dumb', $ohreally)) {return false} else {return true}; I know the preg_match code is wrong, i would really appreciate if someone could offer the correct version of it. Thank You! Answer Please read what cletus said and the test middaparka did bellow. I also did a mirco time test, on various strings, long and short. with these results IF, you know the probability of the string values occurring ORDER them from most probable to least. (I did not notice a presentable different in ordering the regex itself i.e. between /hello|i am|dumb/ or /i am|dumb|hello/. On the other hand in sequential strpos the probability makes all the difference. For example if 'hello' happens 90%, 'i am' 7% and 'dumb' 3 percent of the time. you would like to organize your code to check for 'hello' first and exit the function as soon as possible. my microtime tests show this. for haystacks A, B, and C in which the needle is found respectively on the first, second, and third strpos() execution, the times are as follows, strpos: A: 0.00450 seconds // 1 strpos() B: 0.00911 seconds // 2 strpos() C: 0.00833 seconds // 3 strpos() C: 0.01180 seconds // 4 strpos() added one extra and for preg_match: A: 0.01919 seconds // 1 preg_match() B: 0.02252 seconds // 1 preg_match() C: 0.01060 seconds // 1 preg_match() as the numbers show, strpos is faster up to the 4rth execution, so i will be using it instead since i have only 3, sub-stings to check for : ) A: The correct syntax is: preg_match('/hello|i am|dumb/', $ohreally); I doubt there's much in it either way but it wouldn't surprise me if the strpos() method is faster depending on the number of strings you're searching for. The performance of strpos()
stackexchange
Accordingly, there has been proposed a photovoltaic blind system in which solar battery panels are combined with the slats of a blind system installed in order to block light from the outside to the inside or from the inside to the outside, thereby implementing both of blocking light and generating photovoltaic power. It is expected that a photovoltaic blind system, constructed upon a large building whose outer walls are generally finished with glasses, can produce a considerable amount of renewable energy. A photovoltaic blind system requires solar tracking ability for tracking the incident direction of solar light in order to maximize the amount of photovoltaic power generation. Previous studies suggest that a one-axis solar tracking technique capable of changing the angles of photovoltaic panels only in a horizontal direction or a vertical direction can improve performance by about 12 to 25%, and a two-axis solar tracking technique capable of changing the angles of photovoltaic panels in both horizontal and vertical directions can improve performance by about 30 to 45%, compared to a case without solar tracking ability. Furthermore, although different photovoltaic blind systems could be classified either into one-axis solar tracking technique alike or into two-axis solar tracking technique, the different photovoltaic blind systems may exhibit different improvements in the amount of power generation according to their solar tracking algorithms. Accordingly, there is a need for a more effective solar tracking algorithm. Solar tracking approaches may be classified into three types: optical sensor-based approach for detecting direction of the sun in the sky using optical sensors to face toward the sun; generated power output-based approach for finding direction in which the output of photovoltaic power generation maximizes so as to control the directions of photovoltaic panels; and location and time-based approach using the direction of the sun predicted based on location and time. The optical sensor-based approach operates, for example, to determine direction of the sun based on direction of an optical sensor that measures the strongest solar light among optical sensors oriented toward various directions. Accordingly, the approach requires optical sensors and further a means for determining direction of the sun from the detected signals of the optical sensors, and thus higher costs. However, due to the features of the blind system, orientation toward the sun does not necessarily ensure maximizing output of generated power. For example, if blind slats are adjusted for facing toward the sun when the sun stands at its meridian altitude in midsummer, the blind slats are disposed almost horizontally, only resulting a situation
uspto_backgrounds
On 30 July 2007, he signed for Football League Two side Barnet on a free transfer after a successful trial. On 9 November 2007 he joined St Albans City on a month's loan. In January 2008, Seanla was transfer listed. He struggled when played out of position in midfield, and played only five times for the Bees. In March, he was loaned out to Wivenhoe Town. He failed to make an impression even at this level, however, and shortly after his loan spell was cancelled, he was released by Barnet. On his debut for Ashford Town, he scored two goals in the second half in a 3-2 loss to Chipstead. He scored 5 goals in 8 games, but was unable to add to that tally due to injury, and joined Horsham in January 2009. Seanla's impressive strike rate for Horsham saw him join promotion hopefuls Boreham Wood in March 2010. He scored the only goal of a play-off semi-final against Aveley F.C. and helped contribute to a play-off final win against Kingstonian to seal promotion for the club. On his debut for Tonbridge Angels, Seanla scored two goals against AFC Hornchurch in the Angels' 7-1 victory against the Essex team. He later played for Winslow United. In August 2013, he joined Bedford Town, before joining Leighton Town for the 2014-15 season. He carried on playing the SSML from 2015 onwards, playing for Clean Slate and New Bradwell St Peter. Seanla stated in a June 2018 interview that he had retired from football. References External links Profile on Kettering Town Site Profile on Barnet Site Soccerdata Stéphane Seanla Category:1988 births Category:Living people Category:Watford F.C. players Category:Kettering Town F.C. players Category:Barnet F.C. players Category:St Albans City F.C. players Category:Wivenhoe Town F.C. players Category:Ashford United F.C. players Category:Horsham F.C. players Category:Boreham Wood F.C. players Category:Tonbridge Angels F.C. players Category:Concord Rangers F.C. players Category:Crawley Down Gatwick F.C. players Category:Walton &
wikipedia_en
\left({m_{12}}-{m_{in}}-\frac{GM_1^2+e_1^2+2e_1e_{in}}{2c^2r_*}\right) \left({m_{out}}-{m_{12}}+\frac{GM_2^2-e_2^2-2e_2(e_{in}+e_1)}{2c^2r_*}\right)+\\\\ & -\delta_1\delta_2\sqrt{\left({m_{12}}-{m_{in}}-\frac{GM_1^2+e_1^2+2e_1e_{in}}{2c^2r_*}\right)^2-M_1^2{f_{12}}} \\\\ & \sqrt{\left({m_{out}}-{m_{12}}+\frac{GM_2^2-e_2^2-2e_2(e_{in}+e_1)}{2c^2r_*}\right)^2-M_2^2{f_{12}}} \Bigl\}; \end{array}$$ here and in the following we omit the coordinate dependence of $f_a$, $M_a$ etc., implicitly assuming that they have to be evaluated on $(t_*,r_*)$ where not differently indicated. Determination of Q$'$. {#sec:DeterminationOfQ .unnumbered} ---------------------- It is possible to apply the same procedure to the region $BOD$ (i.e. after the intersection time), finding the quantity $$\label{56} Q'\equiv \{g_{00}^{(BOD)}u^0_{OB}u^0_{OD}+g_{11}^{(BOD)}u^1_{OB}u^1_{OD}\}_{t=t^*,r=r_1=r_2=r_*}\ .$$ Now the unit tangent vectors to trajectories $OB$ and $OD$ are[^1]: $$\begin{aligned} u^i_{OB}&=(u^0_{OB},u^1_{OB},u^2_{OB},u^3_{OB}) \nonumber\\ &=\left({\frac{d\,t}{d\tau_1}},{\frac{d\,r_1}{cd\tau_1}},0,0\right)_{t\geq t_*}, \label
arxiv
# Many RSpec users commonly either run the entire suite or an individual # file, and it's useful to allow more verbose output when running an # individual spec file. if config.files_to_run.one? # Use the documentation formatter for detailed output, # unless a formatter has already been configured # (e.g. via a command-line flag). config.default_formatter = 'doc' end # Print the 10 slowest examples and example groups at the # end of the spec run, to help surface which specs are running # particularly slow. config.profile_examples = 10 # Run specs in random order to surface order dependencies. If you find an # order dependency and want to debug it, you can fix the order by providing # the seed, which is printed after each run. # --seed 1234 config.order = :random # Seed global randomization in this process using the `--seed` CLI option. # Setting this allows you to use `--seed` to deterministically reproduce # test failures related to randomization by passing the same `--seed` value # as the one that triggered the failure. Kernel.srand config.seed =end end # API client (shared between all the test cases) API_CLIENT = Petstore::ApiClient.new(Petstore::Configuration.new) # randomly generate an ID def random_id rand(1000000) + 20000 end # create a random pet, return its id def prepare_pet(pet_api) pet_id = random_id category = Petstore::Category.new('id' => 20002, 'name' => 'category test') tag = Petstore::Tag.new('id' => 30002, 'name' => 'tag test') pet = Petstore::Pet.new('id' => pet_id, 'name' => "RUBY UNIT TESTING", 'photo_urls' => 'photo url', 'category' => category, 'tags' => [tag], 'status' => 'pending') pet_api.add_pet(pet) return pet_id end
github
Celebrate St. Patrick's Day by wearing green, drinking green and going green.Don't panic. You don't have to make your own cleaning products or use cloth diapers. Here are 17 easy ways to be green any day of the year, culled from utility experts to moms everywhere.1. How many times do you forget to bring your bags inside the grocery store? Instead of telling yourself, "OK, next time I'll remember" (you probably won't), just go back to the car and get your bags. 2. Avoid the temptation to use the drive-through lane at pharmacies, banks and fast-food joints. Walk inside, and you'll get a little exercise.3. Wash clothes in cold water. That way you don't turn the whites pink if a red shirt sneaks in with the load. 4. Don't stand there with refrigerator door open while you ponder. There's nothing good in the house to eat anyway.5. Unplug unused cellphone and laptop chargers.6. Pay bills online or by phone. Sign up for electronic statements for bills, banking and credit cards. Stop unwanted mail by going to www.ecocycle.org/junkmail.7. Switch to reusable water bottles and coffee cups.8. Keep tires properly inflated.9. Don't run the water while brushing your teeth.10. Walk the kids to the school bus. Take the bus to outings in Seattle: It saves on parking fees and parking tickets. You can plan a trip at www.soundtransit.org.11. Feeling a tad chilly lounging around the house half-naked in shorts and T-shirt? Put on more clothes rather than cranking up the heat. 12. Use light dimmers and energy-efficient light bulbs. 13. Invest in energy-saving appliances. These really do cut bills. Some qualify for utility and income tax rebates.14. Got lots of grass to mow? Rent a herd of goats. They'll fertilize it while they're at it.15. Get organized. Know where your stuff is. Before you buy an item, look around the house to see whether you already have something that will work just as well. 16. Buy gently used toys at yard sales, thrift stores or online at sites such as www.babyplays.com.17. Relax. Quit expending energy. St. Patrick's Day is a fun holiday. Drink a green beer
pile-cc
Let s = 13688 + -4756. Does 28 divide s? True Let i(s) = 97*s**2 - 41*s + 784. Does 17 divide i(8)? True Suppose -2*h - 1 = -7. Suppose -5*r + 2505 = -u, -5*r = -6*r - h*u + 485. Is 10 a factor of r? True Let g(k) = -1630*k - 1740. Does 50 divide g(-13)? True Suppose -v = 3*d - 16, -34*d = -37*d - 2*v + 20. Suppose 2*q = -0*f - 2*f + 624, 2*q = -d*f + 632. Is q a multiple of 22? True Suppose 47 + 365 = g + 3*i, -i + 4 = 0. Is g a multiple of 20? True Let l(w) = 4*w**3 - 10*w**2 + 15*w - 45. Let r be l(6). Suppose r - 64 = -5*b. Let y = b - -131. Is 2 a factor of y? True Suppose 0 = -5*k - 6*l + 87889, 139*k - 137*k = 4*l + 35130. Is 134 a factor of k? False Does 3 divide (-19 - (-8 - -6))/(7/(-350))? False Suppose 0 = -185*d - 189*d + 6957522. Is d a multiple of 159? True Let n = 366 + -430. Let t = 364 + n. Is 4 a factor of t? True Suppose -4*g - 752 = -4*l, 4*g - 8*g = 4*l - 768. Let p = l - 1. Does 7 divide p? True Suppose 5*t - 85 = -5. Let c(l) = -14*l**2 - t*l - 9 + 8*l**2 + 5*l**2. Is c(-10) a multiple of 11? False Let f = 39710 + -32213. Is f a multiple of 2? False Let w(u) = 89*u**3 +
dm_mathematics
I am going to be the Senior Regulatory Counsel at ISO New England starting on April 9, 2001. My last day in the Portland area will be March 31, 2001. I enjoyed working with you and wish you the best of everything. My new address will be: Mary Hain Senior Regulatory Counsel ISO New England Inc. One Sullivan Road Holyoke, MA 01040-2841 (413
enron_emails
"(A) In his representation of a client, a lawyer shall not: .... "(4) Knowingly use perjured testimony or false evidence. .... "(6) Participate in the creation or preservation of evidence when he knows or it is obvious that the evidence is false. "(7) Counsel or assist his client in conduct that the lawyer knows to be illegal or fraudulent." The Standards Relating to the Defense Function, adopted by the American Bar Association, Approved Draft, 1971, discusses *56 the situation with which trial counsel was faced in this case. The pertinent standard reads: "7.7 Testimony by the defendant. "(a) If the defendant has admitted to his lawyer facts which establish guilt and the lawyer's independent investigation establishes that the admissions are true but the defendant insists on his right to trial, the lawyer must advise his client against taking the witness stand to testify falsely. "(b) If, before trial, the defendant insists that he will take the stand to testify falsely, the lawyer must withdraw from the case, if that is feasible, seeking leave of the court if necessary. "(c) If withdrawal from the case is not feasible or is not permitted by the court, or if the situation arises during the trial and the defendant insists upon testifying falsely in his own behalf, it is unprofessional conduct for the lawyer to lend his aid to the perjury or use the perjured testimony. Before the defendant takes the stand in these circumstances, the lawyer should make a record of the fact that the defendant is taking the stand against the advice of counsel in some appropriate manner without revealing the fact to the court. The lawyer must confine his examination to identifying the witness as the defendant and permitting him to make his statement to the trier or the triers of the facts; the lawyer may not engage in direct examination of the defendant as a witness in the conventional manner and may not later argue the defendant's known false version of facts to the jury as worthy of belief and he may not recite or rely upon the false testimony in his closing argument." For cases where this situation has arisen, see Annotation, Rights and Duties of Attorney in a Criminal Prosecution Where Client Informs Him of Intention to Present Perjured Testimony, 64 A.L.R.3d 385 et seq. This problem has previously been before this court. In State v. Henderson, 205 Kan. 231, 468 P.2d 136 (1970), the accused informed his
freelaw
~~~ a3n > helping some major corporation get a stronghold in some country is not about > "national security". While I agree with your overall message, and even the part I quote, if you think "holistically" then it is in the US interest to dominate trade negotiations through intelligence. For example, it's better for US national security if Brazil had bought a US fighter. It strengthens the financial health of Boeing, makes it easier for the US to keep up a certain level of capability (paid for by foreignors, win-win!), has money coming in to the US for decades as a result of the maintenance contracts, and there's a non-zero chance that the software for flying those planes have backdoors and loggers. I'm not saying it's right, but the security forces and corporations are very much motivated for this to happen, with ready made excuses of national security to justify it. ------ suprgeek Excellent principled stand by Mikko. Minor problem ".... In fact, I'm not expecting other conference speakers to cancel. Most of your speakers are american anyway – why would they care about surveillance that’s not targeted at them but at non-americans." Incorrect - NSA surveillance most definitely HAS targeted Americans in America. That is precisely what the Snowden disclosures show - leaving aside all the contortions of "Only Collecting data is not surveillance - Metadata is not Surveillance, etc, etc" ~~~ jorde I'm 100% Mikko knows this and he is just being sarcastic. ~~~ suprgeek Hmm ...complete Sarcasm fail on my part then. Getting harder and harder to tell. ~~~ azakai Does not look like sarcasm to me either. ------ LionRoar "In fact, I'm not expecting other conference speakers to cancel. Most of your speakers are american anyway – why would they care about surveillance that’s not targeted at them but at non-americans. Surveillance operations from the US intelligence agencies are targeted at foreigners. However I’m a foreigner. And I’m withdrawing my support from your event." I realy like all the double layers he put into this :D Its a joy to read.
hackernews
Pancreatic neuroendocrine tumors (PanNETs) are increasing in incidence, and 40-95% of them are metastatic at the time of initial diagnosis. Despite various complex management strategies for neuroendocrine liver metastases, surgery is the only treatment that offers potential for cure. There is a critical need to develop new therapeutic options to reduce PanNETs progression. We have discovered that PanNETs are deficient in Notch signaling, and reinstitution of this pathway alters the malignant phenotype. Therefore,
nih_exporter
The aim of the present study was to identify stakeholder and program beneficiary needs and wants in relation to a netball communication strategy in Tonga. In addition, the study aimed to more clearly identify audience segments for targeting of communication campaigns and to identify any barriers or benefits to engaging in the physical activity program. A rapid assessment and response (RAR) methodology was used. The elicitation research encompassed qualitative fieldwork approaches, including semistructured interviews with key informants and focus group discussions with
pubmed_abstracts
Chemical synthesis of NPs follows the bottom-up approach. This process mainly involves the use of water-soluble cations as a precursor to trigger their reduction to metal monomers, and the process is called nucleation. The growth of particles where it assembled cluster of reduced metal atom automatically stop the growth controlled by reducing agent/capping. The particles reached a certain size which is stable thermally. Nanomaterials are synthesized by the interaction of atoms and smaller molecules. Various chemical synthesis techniques include the sol--gel process, pyrolysis, CVD, microemulsion, hydrothermal, polyol synthesis, and plasma-enhanced chemical vapor deposition. Chemical preparation involves synthesis of metal NPs in a chemical solution, and various chemical reactions and chemical compositions are used for these purposes. For instance, the chemical reduction of metal ions inside reversed micelles in a nonpolar solvent is the most commonly employed method for the preparation of metal nanoparticles (MNPs) \[[@B36-nanomaterials-09-01719]\]. For instance, first, a metal slat dissolved in water is confined in the reversed micelles and is reduced into MNPs by chemical reduction. Size control of the particles is important and is regulated by volume of reversed micelles and ratio of water. Several points need to be considered for synthesis of PtNPs such as the appropriate shape and size and the appropriate selection of solvent, temperature, and reducing/capping agent. The method should also avoid aggregation. The advantage of chemical methods is cost effective, high versatility in surface chemistry, easy functionalization, high yield, size controlled, thermally stable, and reduced dispersity. Disadvantages of chemical methods include low purity and the use of toxic chemicals and organic solvents, which can be hazardous to human beings and the environment. Chemical methods are important, established methods of NP synthesis. In the early 1920s, Adam et al. \[[@B37-nanomaterials-09-01719]\] prepared bulk type PtO~2~ using a fusion method at 450 °C. Next, numerous methods were used to modify the material into NPs. NP production is efficient and low cost but requires toxic chemicals. Several studies have reported chemical synthesis of PtNPs \[[@B38-nanomaterials-09-01719],[@B39-nanomaterials-09-01719],[@B40-nanomaterials-09-01719],[@B41-nanomaterials-09-01719],[@B42-nanomaterials-09-01719],[@B43-nanomaterials-09-01719],[@B44-nanomaterials-09-01719]\]. There are three imperative components employed
pubmed_central
Analog computing vs Numerical simulation Does the electronic circuit equivalent of a mathematical model have any inherent advantage over numerical simulation of the same model ? For instance, if I numerically simulate the Navier-Stokes equation and obtain a time-series of the velocity field and compare with the time-series of the voltage from an electronic circuit equivalent of the Navier-Stokes equation. A: Does the electronic circuit equivalent of a mathematical model have any inherent advantage over numerical simulation of the same model ? I've bolded the most important word in your question. Yes, there are a few advantages, but as an electrical engineer you always work with trade-offs. Meaning that you gain X but lose Y, you can't have both X and Y, unless you increase $. I will mention some advantages first, and then all the disadvantages. Precision is one advantage that Jonk mentioned a little bit in his comment. Instead of dealing with number of bits in a data type, such as a float (32 bit) or a double (64 bit) or a long double (128 bit). Instead you are dealing with planck units which is the smallest value anything can have, be it mass, length, time, charge and temperature. We are interested in time and charge, because those two relate to the only part we are interested in when it comes to implementing the mathematical equation in an equivalent electronic circuit. To put some numbers to it, the Planck time is about \$5.4\times10^{-44}\text{ s}\$, and the Planck charge is about \$1.9\times10^{-18}\text{ C}\$. These are the values that the universe is using to quantify these units, meaning that if you can represent these values then you can make a perfect prediction of the real world, iff you ignore all the noise. A float can approximate a Planck charge with some error, this is called quantization noise (which is a small error), which will show up as noise, error, whatever you want to call it, unwanted effects. Which will appear if you try to do it with a digital computer. A float doesn't have enough bits to start representing a Planck time. A double can approximate the constant Planck charge and Planck time with some less error. So you can use a long double or use some custom library, sure, go for it. But you will still never be able to represent the constants exactly because we are using base 2 and the constants are
stackexchange
Although cellular phones are used primarily for making and receiving telephone calls, additional functionalities are being included in the cellular phones to allow users, for example, to take digital pictures, to listen to songs, to watch videos and/or to play games. These functionalities place a heavy demand on the cellular phone battery, which reduces the charged life of the battery. In a cellular phone, one of the most power-draining components is the power amplifier that transmits signals to the nearest cellular station. Therefore, the power-added efficiency (PAE) of a power amplifier, which is a measure of how much power is needed to achieve a given amount of amplification, is an important factor for the battery life of a cellular phone. With a higher PAE of the power amplifier, the amount of time that a user can talk on the cellular phone and/or operate other functionalities of the cellular phone can be increased. In a power amplifier of a cellular phone, an impedance transformation network is used to reduce the impedance of the load (often 50 Ohms) to a more optimal output impedance for the amplifier so that the signal from the amplifier can properly be generated for the load. Although there are various impedance transformation networks, a conventional impedance transformation network of interest is an impedance transformation network that utilizes a set of stacked shunt ferroelectric varactors as a variable capacitor. Such an impedance transformation network is used in a power amplifier for cellular technologies that use variable transmission signal strength, such as Code Division Multiple Access (CDMA) technology, to achieve greater PAE for power levels other than the maximum power level. In contrast to semiconductor varactors, ferroelectric varactors have a higher Q factor, which makes these devices attractive for power amplifier applications. However, the stacked shunt ferroelectric varactors of the conventional impedance transformation network are quite non-linear, and thus, the impedance transformation network requires a significant number of stacked shunt ferroelectric varactors to achieve an acceptable linearity. Unfortunately, as the number of stacked shunt ferroelectric varactors is increased, the series resistance is also increased, which degrades the total PAE of the power amplifier. Furthermore, the stacked shunt ferroelectric varactors must provide high capacitance for high power output levels, which means that the varactors must be operated at near zero DC voltage where the varactors are more non-linear. This necessitates additional stacked shunt ferroelectric varactors to achieve the desired linearity, resulting in greater series resistance. In view of these concerns, what is needed is an impedance
uspto_backgrounds
Critical reception "A.D.H.D" received critical acclaim from music critics upon release. In his review, Pitchfork's Jordan Sargent wrote "There's the Based God's paranoia, Drake's singing/rapping fluidity, the soothing synthscapes of Wiz's mixtapes, and, of course, an obsession with drugs." He noted its simplicity, but added that "Lamar's individuality and skill as a rapper shine through" the song. Complex named "A.D.H.D" the 13th best song of 2011. The magazine wrote that "it captures the mood of today's lonely, drugged-out youth who seem more interested in Bay Area Kush and Purple Label tags than anything else." The song was also featured in Grand Theft Auto V soundtrack station in Radio Los Santos. The song was nominated to the 2013 Spike Video Game Awards for Best Song in a Game. In his 2012 review of Lamar's second album, Dan Jackson of cmj.com called "A.D.H.D" Lamar's best song prior to the release of Good Kid, M.A.A.D City. In 2013, San Antonio Current wrote that "A.D.H.D", and the album's lead single "HiiiPoWeR", were hits that put Lamar into the national spotlight in 2011. In 2014, NPR writer Eric Ducker called "A.D.H.D" one of Lamar's three best songs. Music video The music video for the song was released on August 23, 2011. It shows Lamar with his friends "cruising through a bodega and an empty office, and it gets over on pure kids-having-fun atmosphere." He said about the music video: "I wanted the video to illustrate the emotion he paints with words, while avoiding gratuitous shots of any substance. Despite the song's title and content, the focus isn't the drugs, but rather, that basic human experience of apathetic youth. That simple mood of emptiness which we choose to either address or self-medicate." The video was directed by Vashtie Kola (Va$htie), who wrote: Inspired by "A.D.H.D."s dark beat and melancholy lyrics which explore a generation in conflict, we find Kendrick Lamar in a video that illustrates the songs universal and age-old theme of apathetic youth.
wikipedia_en
\[lem:g1\] Let $\xi_2=\pi^2/4$. For $\xi \in (0,\xi_2)$ one has $$\xi^{1/4}(\sin\sqrt{\xi})^{1/2}G_1\left( \sin^2{\frac{\sqrt{\xi}}{2}}\right)=Z_J(\xi),$$ where $Z_J(\xi)$ is given by . This concludes the summary of results of [@BF Section 5.2]. Our final goal is to compute $C_Y=C_Y(u)$ and $C_J=C_J(u)$ such that $$\label{eq:cycj2} \xi^{1/4}(\sin{\sqrt{\xi}})^{1/2}G_2(\sin^2{\sqrt{\xi}/2})=C_YZ_Y(\xi)+C_JZ_J(\xi).$$ Note that there exist $c_1,c_2$ such that $$\begin{gathered} \label{eq:zyxi} Z_Y(\xi)=\left(c_1G_1\left( \sin^2{\frac{\sqrt{\xi}}{2}}\right)+c_2G_2\left( \sin^2{\frac{\sqrt{\xi}}{2}}\right) \right)\times \\ \xi^{1/4}(\sin\sqrt{\xi})^{1/2} = c_1Z_J(\xi)+\xi^{1/4}(\sin\sqrt{\xi})^{1/2}c_2G_2\left( \sin^2{\frac{\sqrt{\xi}}{2}}\right).\end{gathered}$$ The last two equalities imply $$\label{eq:CYCJ} C_Y=\frac{1}{c_2},\quad C_J=-\frac{c_1}{c_2}.$$ \[lem:c1c2\] One has $$\begin{gathered} 2c_1=(-1)^{k+1}\sqrt{2\pi}\frac{\Gamma(k+1/4)}{\Gamma(k-1/4)}\frac{Z_Y(\xi_2)}{\xi_{2}^{1/4}}+(-1)^k\sqrt{2\pi}\times \\\frac{\Gamma(k-1/4)}{\Gamma(k+1/4)} \xi_{2
arxiv
#ifdef BSD_KERNEL_PRIVATE #include <sys/eventhandler.h> #endif #ifdef KERNEL_PRIVATE #include <sys/socket.h> #include <sys/socketvar.h> #include <sys/queue.h> #include <kern/locks.h> /* Forward declare these structures referenced from prototypes below. */ struct mbuf; struct proc; struct sockaddr; struct socket; struct sockopt; struct socket_filter; struct uio; struct ifnet; #ifdef XNU_KERNEL_PRIVATE struct domain_old; #endif /* XNU_KERNEL_PRIVATE */ #pragma pack(4) #ifdef XNU_KERNEL_PRIVATE /* * Legacy protocol switch table. * * NOTE: Do not modify this structure, as there are modules outside of xnu * which rely on the size and layout for binary compatibility. This structure * is simply used by the exported net_{add,del}_proto_old, pffindproto_old * routines, and by the domain_old structure. Internally, protocol switch * tables are stored in the private variant of protosw defined down below. */ struct protosw_old { #else struct protosw { #endif /* !XNU_KERNEL_PRIVATE */ short pr_type; /* socket type used for */ struct domain *pr_domain; /* domain protocol a member of */ short pr_protocol; /* protocol number */ unsigned int pr_flags; /* see below */ /* * protocol-protocol hooks */ void (*pr_input) /* input to protocol (from below) */ (struct mbuf *, int len); int (*pr_output) /* output to protocol (from above) */ (struct mbuf *m, struct socket *so); void (*pr_ctlinput) /* control input (from below) */ (int, struct sockaddr *, void *, struct ifnet *); int (*pr_ctloutput) /* control output (from above) */ (struct socket *, struct sockopt *);
github
In its Citizens United ruling, the court said corporations and unions had a constitutional right to spend as much as they wished on "independent" political efforts. While this is in theory even-handed, in fact corporations have far more money than unions, and they tend to spend it to support Republicans. The case was decided at the start of 2010, and it didn't take long for its effects to be felt. The "super" political action committees unleashed by the ruling spent $83.7 that year on electioneering, according to the Washington Post. This year, the deluge. As of May 8, super PACs have raised more than $204 million and spent more than $98.8 million, the Brennan Center said. "In total, outside groups have already spent roughly $121.2 million on federal campaigns, double the amount spent in the same period in 2008." As disturbing as the total is the fact that so much of this money came from a relatively few wealthy individuals. "More than half of the money collected by super PACs since the beginning of 2011 - almost $110 million - came from donors giving $1 million or more," the Brennan Center said. This means a relative handful of people can exert a massive impact on the 2012 elections. We know here in Western North Carolina how that can work. Last-minute attack ads and mailers from two organizations dominated by one man, Art Pope, were considered by many to be largely responsible for the defeat of state Sen. John Snow, of Murphy, in 2010. The state of Montana has given the Supreme Court a chance to mend its ways. Montana's voters in 1912 enacted a ban on corporate campaign contributions to keep copper companies from controlling state government. It would appear Citizens United has wiped that law off the books. But Montana has stood firm. Its Supreme Court rebuffed a challenge from Western Tradition Partnership, an anti-environmental group which then took its case to the U.S. Supreme Court. The Citizens United decision is simply terrible. The court ignored its own precedents and went far beyond the case at hand to make a constitutional ruling. All the plaintiffs had asked was to be allowed to broadcast an anti-Hillary Clinton documentary. They claimed federal prohibitions covered only commercials, not documentaries. But, as Jeffrey Toobin recounted in The New Yorker, conservative activists on the court saw their chance to gut the McCain-Feingold campaign
pile-cc
-1, -1/2, 1, 2 Factor -g**3 - 707*g**2 + 1417*g - 709. -(g - 1)**2*(g + 709) Factor w**2/4 + 25*w/4 + 21. (w + 4)*(w + 21)/4 Solve t**4 - 6*t**3 = 0 for t. 0, 6 Factor 25*u**2 + 270*u + 729. (5*u + 27)**2 Factor 3*b**4 + 90*b**3 + 756*b**2 + 1176*b. 3*b*(b + 2)*(b + 14)**2 Find f, given that 3*f**4 - 90*f**3 - 501*f**2 - 828*f - 420 = 0. -2, -1, 35 Factor -5*t**4 - 180*t**3 - 1470*t**2 - 2420*t - 1125. -5*(t + 1)**2*(t + 9)*(t + 25) Let -1809025*q**2 - 8070*q - 9 = 0. Calculate q. -3/1345 Factor v**3/4 + 23*v**2 - 1145*v/4 - 309. (v - 12)*(v + 1)*(v + 103)/4 Factor -2*f**3/19 - 192*f**2/19 + 1206*f/19 - 1836/19. -2*(f - 3)**2*(f + 102)/19 Factor 3*z**3/7 - 390*z**2/7 + 1875*z/7. 3*z*(z - 125)*(z - 5)/7 Determine i, given that -i**4/2 - i**3 + 6*i**2 - 7*i + 5/2 = 0. -5, 1 Determine r so that 14*r**5 + 46*r**4 - 30*r**3 - 166*r**2 - 128*r - 24 = 0. -3, -1, -2/7, 2 What is g in 4*g**5/3 + 46*g**4/3 + 30*g**3 -
dm_mathematics
Craig -----Original Message----- From: Bianchi, Rita Sent: Friday, September 28, 2001 3:39 PM To: Doll, Jeanette Cc: Brown, Elizabeth; Buehler, Craig Subject: TW Current rate matrix Here is the file of TW rates that will be posted on the EBB under Informational POstings, Rates on Monday. The only change is the footnotes
enron_emails
O P I N I O N In this trespass to try title suit, Eddie Dyer sued Ronald Cotton, claiming that, in addition to procuring an undivided 1/7th interest to farmland in Grimes County by conveyance, he also had acquired title to the remaining 6/7th interest by adverse possession.  A jury disagreed, finding that Dyer had not adversely possessed the property, and the trial court signed a take-nothing judgment against Dyer.  On appeal, Dyer contends that no legally or factually sufficient evidence supports the jury’s finding that Dyer had failed to acquire title to the farmland by adverse possession.  He further contends that the trial court erred by (1) including a jury instruction requiring Dyer to establish ouster of his other co-tenants to prove adverse possession; (2) allowing evidence of other adverse possession and property dispute lawsuits in which Dyer was involved; and (3) allowing the testimony of a witness whom Cotton did not properly disclose during discovery and whose testimony violated the parol evidence rule.  We conclude that sufficient evidence supports the jury’s verdict and that the trial court did not abuse its discretion in its jury instructions or evidentiary rulings.  We therefore affirm. Background Carrie Venters owned 46.646 acres of farmland in Grimes County.  When she died intestate in 1958, the property passed to her seven children in equal, undivided interests under the laws of succession.  A house stood within a thirty-two-acre wooded area on part of the property.  Another approximately eleven-acre portion was cleared and used for grazing and farming.  The property also had a tank pond, which a nearby church periodically used for baptisms.  An old, three-strand, barbed-wire fence surrounded the property.  During his lifetime, Carrie Venters’ son, Lee “Snap” Venters, used the property for growing hay and grazing cattle.  Snap repaired the old fence when it broke through.  He also harvested timber from the property.  His siblings occasionally visited the property to hunt
freelaw
What kind of bioinformatics software are you plugging into a webapp? ------ arturhoo That's a neat way way to tight together both worlds, and I can see it being useful in cases like testing. Nonetheless, it is important to distinguish the need to communicate between programs and the need to programmatically run a piece of software like ffmpeg and getting its output. For the seconds case, especially in more complex architectures, where you need "interact with software written in another language" it makes sense to explicitly separate this interaction, for example through a broker [0]. In the end, all you need is a way to communicate from Program A that Program B can do some sort of job, and this can be a simple string pointing to a raw video file in a storage like S3, not necessarily the raw file. [0] [http://www.artur- rodrigues.com/tech/2015/06/04/beanstalkd-a-...](http://www.artur- rodrigues.com/tech/2015/06/04/beanstalkd-a-simple-and-reliable-message- queue.html) ------ ThePhysicist So if I understand correctly it basically launches the container and pipes the log output to a generator for consumption through Python? ~~~ noajshu Yes. Not necessarily log output, but stderr and/or stdout. ------ richardwhiuk I'm struggling to see the advantage of this? Surely either running the entire thing in the container and just running the command using subprocess would achieve the same effect.... ~~~ takee Or, if you have docked installed on a system anyway why not just use docker-py (docker's python bindings) directly to run stuff in containers? ~~~ noajshu you can! I found it difficult to work with and decided to make something new after reading this post: [http://blog.bordage.pro/avoid-docker- py/](http://blog.bordage.pro/avoid-docker-py/) It's a few years old but I think docker-py still needs some love for it to really shine. ------ kanzure Hmm, this could
hackernews
Longitudinal cohort study of school-aged children to define the epidemiology of group A streptococcal pharyngitis. Students in grades K - 8 will be enrolled and throat cultures obtained twice monthly and with each respiratory illness for four years. GAS isolates will be typed by FIGE to determine relatedness and to define infection, carriage, and recurrences. Samples of saliva will be collected for antibody assays and for use in GAS adherence inhibition assays. Four aims (1) to define the epidemiology of G
nih_exporter
Controlling the size polydispersity of colloidal particles is important for their phase transitions, resulting structures, and properties. In this study, a fractionation method was established to control the polydispersity of colloidal plates based on the isotropic-nematic (I-N) phase transition. The size ratio of nanoplates between the N phase and the I phase (DN/DI) was relatively large, whereas the size polydispersities in both the N phase and the I
pubmed_abstracts
The authors report an 'audit' of healthcare professionals looking after patients who self-harm^[@bibr1-2059513118767994]^ and report lack of awareness and adherence to NICE guidelines and some negative attitudes from a minority of staff. That is not entirely surprising and probably mirrors attitudes across all areas of healthcare. In their survey the vast majority of staff had very positive, compassionate and supportive attitudes to such patients. This should be highlighted and applauded. The numbers in the 'audit' are relatively small particularly with regards to surgeons, so generalisations from the data should be interpreted with caution. Timing of surgical intervention in burn patients depends on a number of factors that relate to the patient, co-morbidities, wound characteristics and healing potential. In major burns it is time critical; in smaller injuries it is not so critical. Care must be taken to assess and manage any co-morbidity to optimise patients for surgery and successful outcome. Mental health issues are no different in this respect to cardio-respiratory disease, diabetes, hypertension etc. Comprehensive assessment of these problems often leads to delays in surgical treatment. Patients with psychosocial issues leading to self-harm must be offered the same opportunity of assessment prior to surgical intervention as those with other co-morbidities. The NICE guidelines are obviously excellent and give advice in general on best practice. They are not burn specific. They were published fourteen years ago in 2004 and although checked, they have not been revised. This may be a reason that many staff are unaware of them. They do state that patients should be offered the same care as other patients with injury but this should mean careful assessment of all co-morbidities including mental health ones. There is significant emphasis on risk assessment in the guidelines which has not really been explored or emphasised by the study either in terms of attitudes or its impact on treatment. The NICE guidelines are a little contradictory in themselves as they also state that treatment of small wounds can be modified from standard care to suit patient need. The authors do not really distinguish the patient populations involved: for instance Isolated instances versus patients who repeatedly self-harm. The management of patients who repeatedly self-harm is most difficult and complex particularly in terms of risk assessment and reduction. I don't think anyone knows the best way of managing such injuries to minimise risk of recurrence and the evidence for current best practice in burn patients is non-existent. Further research efforts should focus on this area. Amongst many question, it
pubmed_central
Bank function, where new account gets $5, but when the withdraw is larger than balance, it doesnt take away the balance and gives error public class Acc{ private double balance; public Account() { balance = 5; } public Acc(double sBalance) { balance = sBalance; } public void depos(double amount) { balance = balance + amount; } public void withd(double amount) { balance = balance - amount; if (withd>balance){ System.out.println("Error"); } } public double gBalance() { return balance; } } Main: public class Main{ public static void main(String[] args){ Acc newBank = new Acc(50); newBank.withd(20); newBank.depos(5); System.out.println(newBank.gBalance()); } } Basically I wanted to create a function to withdraw and deposit a value from stored in balance, where $5 is added to every new account created. It seems to work, however I wanted to extend and make it so withdrawing more than the balance amount would give an error and not take away from the balance A: First, there are inconsistencies in the code you provided, which makes it impossible to compile: The first constructor is public Account() while the class name is Acc As pointed out by @Andy Turner, you are using the method name withd in the condition. It should rather be amount > balance. If I understand what you are trying to do, the withdraw method should be: public void withd(double amount) { if (amount > balance) { System.out.println("Error"); } else { balance = balance - amount; } } where you check if the balance has enough
stackexchange
Thermal ink jet printers apply ink to a print medium such as paper by ejecting ink drops from one or more printheads through a column or array of nozzles. The printheads are mounted on a carriage assembly that is movable in a lateral direction across the print medium and ink drops are selectively ejected from the nozzles at corresponding ink drop placement locations. Specifically, each nozzle is associated with a heater resistor that generates heat when sufficient current passes through it, with the generated heat causing ink within an associated ink reservoir to be ejected from the nozzle. The printheads are moved in a series of lateral passes or swaths across the print medium, and between printing passes, the print medium is advanced in a longitudinal or advance direction. Since the printhead moves in a direction that is perpendicular to the advance direction of the print medium, in each pass, each nozzle passes in a linear manner over the print medium. The line associated with each nozzle which overlies the print medium is commonly referred to as a raster or raster line. A plurality of raster lines extending across the image area of the print medium are disposed vertically adjacent to each other in the advance direction. A printer controller determines which resistors will be “fired” and the proper firing sequence so that a desired image is printed. However, ink drop placement errors can occur due to a number of factors, including incorrect timing or variable ink drop flight time. Further, if the amount that the print medium is advanced between printing passes is not precisely equal to a theoretical advance amount, either adjacent printed lines can overlap, or be visibly distant from one another. These effects of incorrect line spacing are referred to as line continuation errors. Known methods exist for ameliorating the effects of ink drop placement errors. One such method is known as shingling or interlaced printing. For a two pass shingling mode (i.e., 50% interlace level), approximately 50% of the ink drops are placed on any given printhead pass. The candidate dots in a first pass are selectively addressed according to a checkerboard pattern, with the remaining dots printed on the next pass, after the print medium is advanced. For a printhead with vertically disposed colors, and a raster which contains cyan, magenta and yellow dots, printing at a 50% interlace level requires that the printhead be passed at least six times across each raster line. Employing a shingling method generally improves print quality, while at the same time reducing the printing speed as compared to printing without sh
uspto_backgrounds
Golding Bird (9 December 1814 – 27 October 1854) was a British medical doctor and a Fellow of the Royal College of Physicians. He became a great authority on kidney diseases and published a comprehensive paper on urinary deposits in 1844. He was also notable for his work in related sciences, especially the medical uses of electricity and electrochemistry. From 1836, he lectured at Guy's Hospital, a well-known teaching hospital in London and now part of King's College London, and published a popular textbook on science for medical students called Elements of Natural Philosophy. Having developed an interest in chemistry while still a child, largely through self-study, Bird was far enough advanced to deliver lectures to his fellow pupils at school. He later applied this knowledge to medicine and did much research on the chemistry of urine and of kidney stones. In 1842, he was the first to describe oxaluria, a condition which leads to the formation of a particular kind of stone. Bird, who was a member of the London Electrical Society, was innovative in the field of the medical use of electricity, designing much of his own equipment. In his time, electrical treatment had acquired a bad name in the medical profession through its widespread use by quack practitioners. Bird made efforts to oppose this quackery, and was instrumental in bringing medical electrotherapy into the mainstream. He was quick to adopt new instruments of all kinds; he invented a new variant of the Daniell cell in 1837 and made important discoveries in electrometallurgy with it. He was not only innovative in the electrical field, but he also designed a flexible stethoscope, and in 1840 published the first description of such an instrument. A devout Christian, Bird believed Bible study and prayer were just as important to medical students as their academic studies. He endeavoured to promote Christianity among medical students and encouraged other professionals to do likewise. To this end, Bird was responsible for the founding of the Christian Medical Association, although it did not become active until after his death. Bird had lifelong poor health and died at the age of 39. Life and career Bird was born in Downham, Norfolk, England, on 9 December 1814. His father (also named Golding Bird) had been an officer in the Inland Revenue in Ireland, and his mother, Marrianne, was Irish. He was precocious and ambitious
wikipedia_en
In order to illustrate this, let us permute $\psi \leftrightarrow z$ in the solution given (\[metric for sigma constant without exponential expansion\]) and (\[F generalized\]). Also, to avoid misunderstanding we change $F(t, \psi) \rightarrow H(t, z)$. Using this notation, we find that the metric $$\label{vaccum solutions on the brane} dS^2 = \frac{ H^{q c/(a + b)} \dot{H}^2}{H_{z}^2} dt^2 - A H^{p_{1}}dx^2 - B H^{p_{2}}dy^2 - H^{q c/(a + b)} dz^2 \pm C H^{p_{3}}d\psi^2,$$ where $H_{z} \equiv \partial H/\partial z$ and $H = \left[l(t) + z h(t)\right]^{(a + b)/(a + b - q c)}$, is also a solution of the field equations $R_{AB} = 0$. Although (\[metric for sigma constant without exponential expansion\]) and (\[vaccum solutions on the brane\]) are diffeomorphic in $5D$, their interpretation in $4D$ is quite different. Specifically, unlike (\[metric for sigma constant without exponential expansion\]) in (\[vaccum solutions on the brane\]): (i) the extra dimension can be either spacelike or timelike, (ii) the spacetime slices $\Sigma_{\psi}$ are non-flat, and (iii) the metric of the spacetime is independent of $\psi$. As a consequence of the latter, the extrinsic curvature $K_{\mu \nu}$, defined by (\[extrinsic curvature\]), vanishes identically. Which in turn, by virtue of (\[emt on the brane in terms of K\]), implies $\tau_{\mu\nu} = 0$, i.e., the spacetime (the brane) is devoid of matter $({\cal{T}}_{\mu\nu} = 0)$ and $\Lambda_{(4)} = 0$. Clearly, other $5D$ metrics with properties similar to (\[vaccum solutions on the brane\]) can be constructed from the solutions (\[the metric in Gaussian coordinates\])-(\[F in the synchronous coordinates\]) of section $2$ as well as from (\[F for perfect fluid\]) and (\[F, barotropic case\]) of section $3$. The conclusion here is that the spacetime part of the $5D$ Kasner
arxiv
<link rel="stylesheet" href="{{ mix('css/new.css') }}"> @include('layouts.code.head') </head> <body class="border-t-2 border-brand bg-grey-lightest"> <div class="min-w-full min-h-screen flex items-center justify-center w-full px-2"> <div class="flex min-h-screen flex-col justify-center items-center text-center w-full"> <div class="flex-1 w-full mt-12 "> <svg class="sm:w-104 sm:h-24 mb-4" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 344.5 83.2"> <path fill="#0FAEC9" d="M45.3 1.6c-2-2-5.5-2-7.6 0l-36 36c-2.2 2.2-2.2 5.6 0 7.7l36.2 36.3c2 2 5.4 2 7.5 0l36-36c2.2-2.2 2.2-5.6 0-7.7L45.4 1.5zm22.3 48.7L59 41.6l2-2.2-6.4-6.5-8.7 8.6 6.4 6.5 2.2-2 8.7 8.6-8.7 8.7-8.7-8.7 2-2.2-6.4-6.5-8.7 8.6 6.4 6.5 2.2-2 8.7 8.6-8.7 8.7-8.7-8.7 2-2.2-10.8-10.8 13-13-6.5-6.5-2.2 2.3-8.7-8.7 8.7-8.7 8.7 8.6-2.2 2.2 6.5 6.5 13-13L65.3 35l2.2-2 8.7 8.6-8.6 8.7z"/> <path fill="#404040" d="M110.3
github
However, one of the major benefits of Beard balm, on top of the fact that it will make you smell better and look amazing, is the fact that it conditions your beard and the skin underneath it, softening, moisturising and fighting against the dreaded beardruff. (That's beard dandruff if you didn't know. And yes, it's as gross as it sounds.) See, your skin produces oils to keep you protected and lubricated, this is why your hair gets greasy after a hard day of working and sweating. It's a protective measure. Problem is, once you start growing a magnificent mound of facial hair, that sucks up a good portion of the oils that would normally go to hydrating and protecting your skin, so the skin under and around your facial hair gets dry and flaky. Thankfully, a good Beard balm provides everything that your face needs to get back to tip top order, so a few days or regular use will fix all that. If your face needs serious conditioning, you're going to want to look for an all natural beard balm, like the Honest Amish we recommend above. All natural beard balms are actually safe to leave in all day, so will continue to provide moisture and protection until you next wash your beard. When is the best time to use my beard balm? You're going to want to use your Beard balm once a day, and the absolute best time to use it is after you've dried yourself from your morning shower or wash, when your hair and skin are slightly moist, but not soaking wet. I've been using this for a couple weeks, and I can't help wondering what's in it? You aren't the only one. In general, there are three main components in a beard balm: Carrier oils, essential oils, and a stabilizing agent. What's a carrier oil? Carrier oils are the active ingredients in the balm. The part which actually conditions your skin and softens your beard. They're also exactly the same oils used in beard oils. Because this is the most important part of a Beard balm, it's not unusual to find Beard balms that only have carrier oils, and no essential oils, especially if they're unscented. There are three carrier oils commonly used in beard balms; Grapeseed oil: Ext
pile-cc
-576*k + 6 Let l = -53 - -53. What is the second derivative of 0 + l + 7*o + 40*o**3 wrt o? 240*o Let m(h) be the third derivative of 0 + 0*h**3 + 1/56*h**8 - 17/24*h**4 + 0*h**5 + 0*h**7 + 0*h + 0*h**6 - 18*h**2. What is the second derivative of m(b) wrt b? 120*b**3 Let i(m) = 350*m**3 - 647*m**2 + 5*m - 25. Let r(b) = 175*b**3 - 323*b**2 + 3*b - 15. Let j(o) = 3*i(o) - 5*r(o). What is the third derivative of j(f) wrt f? 1050 Let g(x) be the second derivative of -5*x**9/3024 + x**6/30 - x**3 + 3*x. Let a(p) be the second derivative of g(p). Find the third derivative of a(i) wrt i. -300*i**2 Let d(s) be the second derivative of -265*s**4/12 + 145*s**2 - 58*s - 3. Differentiate d(x) with respect to x. -530*x Differentiate -43 + 17*c**3 - 97 + 140*c**3 - 148 wrt c. 471*c**2 Let o(w) = w**3 - 4*w**2 - 3*w - 1. Let v be o(5). Find the third derivative of -14 - 20*p**5 - v*p**2 + 14 wrt p. -1200*p**2 Let q = 42 - 33. What is the third derivative of -18*m**6 - q*m**2 + 10*m**2 + 5*m**6 wrt m? -1560*m**3 Let u(h) be the first derivative of 7*h**6/30 - h**4/6 - 14*h - 9. Let j(y) be the first derivative of u(y). What is the third derivative
dm_mathematics
If you yelled for 8 years, 7 months and 6 days, you would have produced enough sound energy to heat one cup of coffee. (Hardly seems worth it) If you fart consistently for 6 years and 9 months, enough gas is produced to create the energy of an atomic bomb. (Now that's more like it) A pig's orgasm lasts for 30 minutes. (In my next life I want to be a pig) (How'd they
enron_emails
10 Hines argues that even if Ms. Brummet did consent, her consent was not voluntary. "The voluntariness of a person's consent to search is a question of fact that we review under the clearly erroneous standard." United States v. Carrate, 122 F.3d 666, 670 (8th Cir.1997). The district court's finding that Ms. Brummet's consent was voluntary was not clearly erroneous. The court weighed the hearsay testimony of the defense counsel's investigator (who testified that Ms. Brummet had told him shortly before her death that she felt that she had been coerced into signing the consent form) against the direct testimony of the officers on the scene (that Ms. Brummet had voluntarily signed the consent form, had not been coerced or threatened, and that she never indicated that she did not understand her right to refuse consent), and credited the police officers' recounting of the facts. "[W]hen a trial judge's finding is based on his decision to credit the testimony of one of two or more witnesses, each of whom has told a coherent and facially plausible story that is not contradicted by extrinsic evidence, that finding, if not internally inconsistent, can virtually never be clear error." Welerford, 356 F.3d at 935-36 (internal quotations omitted); see also United States v. Dupree, 202 F.3d 1046, 1049 (8th Cir.2000). 11 Hines also argues that the search exceeded the scope of the consent because the consent form referred to an attached garage, while the residence had only an unattached garage. We disagree. "The standard for measuring the scope of consent under the Fourth Amendment is that of `objective' reasonableness-what would the typical reasonable person have understood by the exchange between the officer and the individual?" United States v. Adams, 346 F.3d 1165, 1171 (8th Cir. 2003). Under this standard, the fact that the garage was not, in fact, attached does not invalidate the consent. The residence had only one garage, and it is thus objectively reasonable to assume that the parties understood the consent form to refer to the only garage on the property. Likewise, we reject Hines's argument that Ms. Brummet did not have the authority to consent to a search of the garage. The district court clearly adopted the magistrate judge's finding that Ms. Brummet had mutual use of and joint access
freelaw
I am sure most of you will understand my reason to remain anonymous in this post, with that said: I have been offered the following post, and am deliberating on its acceptance, your help would be very much appreciated.<p>Firstly, whoami: https:&#x2F;&#x2F;news.ycombinator.com&#x2F;user?id=developer786<p>I am not a born coder, I know that, therefore for the second post, I will be working very very hard. Where I am currently, I am very comfortable.<p>Current Post - Windows&#x2F;Linux Administrator &#x2F; DevOP - Small Private Healthcare company with good financial backing &#x2F; profitable. - Job Security: Medium&#x2F;High - Environment: Working with a team of 30 2nd and 3rd line support - No Stock options - Salary: $63K - The role: Little development, lots of Linux Admin, training in any sysadmin courses provided once every a years, Ruby training course provided soon.<p>New Post - Developer(bash&#x2F;php&#x2F;ruby&#x2F;python) &#x2F; Linux Administrator - Telecommunications company with investor backing &#x2F; breaking even. - Job Security: Low&#x2F;Medium - Environment: Working From Home - No Stock options - Salary: $75K+8K bonus - The role: Developing bespoke applications in the above languages for a range of customer requirements. Developing and extending Linux based applications.<p>Your help, If I don&#x27;t get to thank you later, is very much appreciated. ====== ldargin This is easy: Your salary and skills can use a bump. Take the risk, and save some of your raise in an emergency fund. ------ nickdoesdesign Why coast when you can push? Yes, its a risk, but a lot of the time risk pays off. And, worst case scenario? You come out with more knowledge of yourself and your skillset, and a lot of businesses look at that fairly favorably. Unless you're in Silicon Valley, age shouldn't be a factor. The only thing holding you back is yourself. ------ developer
hackernews
COMMUNITY ENGAGEMENT SUMMARY/ABSTRACT The achievement of health equity is a formidable task which cannot be obtained without the development of a robust enhancing the recruitment and retention of study participants, disseminating research findings to a broader audience, with the ultimate goal of mitigating health disparities in Puerto Rico. To achieve CEC?s main goal, the following key activities will be conducted: (1) Assess current community-academic partnerships involved at various stages of the translational research spectrum, from
nih_exporter
Mapping distributed sources of cortical rhythms in mild Alzheimer's disease. A multicentric EEG study. The study aimed at mapping (i) the distributed electroencephalographic (EEG) sources specific for mild Alzheimer's disease (AD) compared to vascular dementia (VaD) or normal elderly people (Nold) and (ii) the distributed EEG sources sensitive to the mild AD at different stages of severity. Resting EEG (10-20 electrode montage) was recorded from 48 mild AD, 20
pubmed_abstracts
*Enduring memories* is both an autobiography and an evocation, or more correctly a celebration, of a largely vanished world. John Walker-Smith, an accomplished paediatric gastroenterologist, charts his career from his early education in a privileged and Anglophile public school in Sydney, Australia, through his years of medical training, his decision to become a medical scientist, and the long career of research and specialist practice that followed in Sydney and London. This is a candid and sincere portrait of a life devoted to improving the health of children with serious and debilitating conditions in a field that, if already in existence in the 1950s, had yet to be consolidated. Walker-Smith has been intimately involved in the development and advancement of this field and his story is a valuable one for historians of paediatric medicine. Walker-Smith\'s book also sheds rich light on two key episodes in the history of modern British medicine. First, he describes in detail the (ultimately unsuccessful) attempts made by the Conservative government of the early 1990s to close the ancient institution of St Bartholomew\'s Hospital, with regrettable repercussions for the morale of the hospital staff (not least for Walker-Smith himself) and many of their patients. Second, he explores the ongoing controversy concerning the claim that there might be a link between the MMR jab and the putative increase in the incidence of children suffering from autism. Walker-Smith, who was involved in the research and writing of the paper that caused such massive press interest, describes some of the disparities between the media representation of the argument and the claims actually made by Wakefield *et al*. He expresses regret that the press was so rapidly involved in the issue, but defends the integrity of Wakefield and his colleagues as scientists and insists that it remains entirely valid to explore the possibility of a link between the MMR jab and a small number of cases where gastroenterological disorders are associated with autistic-like symptoms. It is an engaging discussion of a too often polarized issue. This book is not just a survey of a life in medicine. Walker-Smith devotes large sections to broader reflections: on the relations between Britain and Australia, the role and significance of the monarchy, on tradition, poetry, literature and art. Walker-Smith is an ardent monarchist and a believer in the desirability of close Anglo-Australian ties. To a growing extent (as the author appreciates), such views put him out of step with the
pubmed_central
Q: Get scroll value on element with position:fixed I have a page with a header section. In it, two blocks that move sideways after scrolling or dragging on the mobile. I am trying to set the scrolling for the header, but I want too that the rest of the page stays in place until the side blocks reach left: -50% and right:-50%. I have an event scroll set to header, with pageYoffset values. I tried to set the rest of the content the page gives to the section with the position:fixed, but then the scroll does not work anymore, and do not count pageYoffset. Do you have any ideas how to get around it, so that the rest of the page would scroll only after the full unveiling of the header? (in short, the pink section should be on top and wait until the header disappears) let current = $(window).scrollTop(); let windowHeight = $(window).height(); let eleLeft = $(".cd-half-left"); let eleRight = $(".cd-half-right"); let currPositionLeft = eleLeft.position().left; let currPositionRight = eleRight.position().right; let headerHeaight = $(".cd-section").height(); let halfBlockWidth = $(".cd-half-block").width(); let windowWidth = $(window).width(); $(window).scroll(function (event) { current = $(window).scrollTop(); console.log({total:total,current:current}); var newPosition = ((current / headerHeaight)*100) / 2; console.log(newPosition); eleLeft.css({left:"-"+newPosition+'%'}); eleRight.css({right:"-"+newPosition+'%'}); }); FIDDLE A: A solution would be not to use window scroll but instead handle scroll gesture (from mousewheel and touchmove) to control left and right panel, and prevent actual scroll when the panels are not fully opened. so instead of $(window].scroll(handler), try with $('.cd-block').bind('mousewheel', handler) and $('.cd-block').bind('mousewheel', handler) The handler being: function updateCurrent(event) { if (
stackexchange
The present invention, in some embodiments thereof, relates to creating a robust persistent memory based distributed-journal file system and, more specifically, but not exclusively, to creating a robust persistent memory based distributed-journal file system by allocating a self-journal record to each of the files in the file system. Data storage is one of the major building blocks of modern technology as everything is about data. One of the challenges every data storage system, product and/or platform is facing is the need to provide a robust crash immune data management environment while maintaining high access rates and data store/retrieval performance. Crash immunity is essential in order to verify the consistency of a data storage system to assure data integrity and/or avoid data loss in the event of an improper unmounting of the data storage system as result of, for example, a system crash, a system hang and/or a power loss which may occur during one or more operations to the data storage system. One of the widely used techniques for implementing a robust data management system is a journal based file system in which every file operation such as, for example, file creation, removal, modification, truncate, merge, split and/or link is logged in a dedicated record—a journal. Following an improper unmount sequence of the file system, the journal may be analyzed to determine which of one or more file operations that took place during the improper unmount sequence have completed successfully and which of the file operation(s) have not completed. Analyzing the journal allows the file system to undo file operation(s) which did not complete during the improper unmount sequence and restore the file system to the initial state in which it was prior to initiation of the failed file operation(s). The data involving the failed file operation(s) may be lost but the integrity of the file system is maintained. Journaling file systems however may present a performance penalty in modern multi-threaded processors, since the journal needs to be kept constantly synchronized, forcing every state-modifying file and/or directory operation to be logged in the journal, in the order it is executed. This scenario may make the journal logging itself a bottleneck in the data storage path. The performance penalty may have been acceptable while working with legacy mass storage devices, for example, magnetic hard drives and/or solid state drives and/or arrays, however the rapidly increasing performance of near-memory speed storage devices may require other solutions to address a robust file system which allows for high data access rates and/
uspto_backgrounds
Post Grad Post Grad is a 2009 American independent romantic comedy film directed by Vicky Jenson and starring Alexis Bledel, about a recent college graduate who moves back in with her family while she figures out what she wants to do next. Originally under the working titles of Ticket to Ride and then The Post-Grad Survival Guide, the film was released on August 21, 2009. Plot Ryden Malby graduates from college in the middle of the late-2000s recession and is forced to move back in with her parents, because her dream job has been given to her arrogant college nemesis Jessica Bard. Ryden and her best friend Adam, who has had a longtime crush on her, must find a job for Ryden before she loses hope for her future dream as an editor of a big publishing company, but her ambitions for getting a job blinded her from noticing that Adam was giving up going to New York in hopes that one day she will feel about him the same way he does for her. After a while, Adam gives up and goes to Columbia and Ryden gets her dream job, but realizes she isn't really happy and quits her job to go and live with Adam. Cast Alexis Bledel as Ryden Malby Zach Gilford as Adam Davies Michael Keaton as Walter Malby Jane Lynch as Carmella Malby Carol Burnett as Maureen Malby Bobby Coleman as Hunter Malby Rodrigo Santoro as David Santiago Catherine Reitman as Jessica Bard Craig Robinson as Funeral director J. K. Simmons as Roy Davies Mary Anne McGarry as Barbara Snaff Vanessa Branch as Receptionist Fred Armisen as Guacanator pitchman Alexandra Holden as Cute funky girl Andrew Daly as Lloyd Hastings Desean Terry as Young Cop Walter Emanuel Jones as Voice Cast Demetri Martin (uncredited) as TV commercial producer Production Amanda Bynes was originally set to star, but dropped and was replaced by Alexis Bledel. Reception Post Grad was panned by film critics. On Rotten Tomatoes the film has an approval rating of 8% based on reviews from 99. The site's consensus states: "A lightweight, unambitious comedy, Post Grad features fine actors that can do little with its middling, uninspiring script." On Metacritic it
wikipedia_en
It is also possible to extend the scheme by coupling to a different hamiltonian, such that the potential energy is given by $U=U_\text{real} + \lambda U_\text{extra}$, and then integrating along $\lambda$; we find that [@Vega2008] $$A(\lambda=1) = A(\lambda=0) + \int_{0}^1 \avg{U_\text{extra}}\,{\ensuremath{\mathrm{d}}}\lambda.$$ This is known as hamiltonian thermodynamic integration [@Vega2008] and is one component of the Einstein crystal Frenkel–Ladd approach [@Frenkel1984]. The free energy of a fluid phase evaluated from the ideal gas by decreasing the pressure at constant temperature is given by [@Vega2008] $$\frac{A}{Nk_\text{B}T}=\ln(\rho \Lambda^3) - 1 + \int_0^\rho \left[ \frac{p}{k_\text{B} T\rho^2} - \frac{1}{\rho} \right] \,{\ensuremath{\mathrm{d}}}\rho,$$ where $\Lambda$ is the de Broglie thermal wavelength. It is usually beneficial to fit the entire integrand to a single polynomial to avoid diverging terms. As the density tends to zero, the integrand tends to the second virial coefficient [@Vega2008]; it is helpful to evaluate this explicitly to benchmark the simulation results. Gibbs–Duhem integration ----------------------- In Gibbs–Duhem integration [@Kofke1993; @*Kofke1993b; @Vega2008], we numerically integrate the Clapeyron equation, $${\ensuremath{\frac{\mathrm{d}p}{\mathrm{d}T}}} = \frac{\upDelta H}{T\upDelta V},$$ or an analogous expression, in order to obtain new coexistence points from already known coexistence points. In our simulations, we used the fourth-order Runge–Kutta algorithm to perform this integration. Frenkel–Ladd Einstein crystal approach -------------------------------------- The Einstein crystal approach [@Frenkel1984; @Vega2008] is a fairly involved way of calculating the free energy of a crystal from the Einstein crystal, for which the free energy is known. We direct the interested reader to Frenkel and Smit’s book (Ref. [@Frenkel2002]) and the review paper by Vega and co-
arxiv
void pcl::lineToLineSegment (const Eigen::VectorXf &line_a, const Eigen::VectorXf &line_b, Eigen::Vector4f &pt1_seg, Eigen::Vector4f &pt2_seg) { // point + direction = 2nd point Eigen::Vector4f p1 = Eigen::Vector4f::Zero (); Eigen::Vector4f p2 = Eigen::Vector4f::Zero (); Eigen::Vector4f dir1 = Eigen::Vector4f::Zero (); p1.head<3> () = line_a.head<3> (); dir1.head<3> () = line_a.segment<3> (3); p2 = p1 + dir1; // point + direction = 2nd point Eigen::Vector4f q1 = Eigen::Vector4f::Zero (); Eigen::Vector4f q2 = Eigen::Vector4f::Zero (); Eigen::Vector4f dir2 = Eigen::Vector4f::Zero (); q1.head<3> () = line_b.head<3> (); dir2.head<3> () = line_b.segment<3> (3); q2 = q1 + dir2; // a = x2 - x1 = line_a[1] - line_a[0] Eigen::Vector4f u = dir1; // b = x4 - x3 = line_b[1] - line_b[0] Eigen::Vector4f v = dir2; // c = x2 - x3 = line_a[1] - line_b[0] Eigen::Vector4f w = p2 - q1; float a = u.dot (u); float b = u.dot (v); float c = v.dot (v); float d = u.dot (w); float e = v.dot (w); float denominator = a*c - b*b; float sc, tc; // Compute the line parameters of the two closest points if (denominator < 1e-
github
You\’re probably going to need to bring cash along for some shops. That\’s why should you call ahead prior to going to inquire about anything they take and what it will surely cost for what you need. There are menus online, but even then that won\’t tell you if there are any restrictions. It might be wise, when you don\’t have enough time to call around, to merely find some good cash over to take with you while you Alhambra pot shop. Certain areas may have an ATM so consider this too when you don\’t have a lot of time. The shops all have different strains. While some may carry the greater number of common ones that have been a hit in the area, there are gong being more obscure ones that you might like to try. Looking around is normally pretty easy, you can easily go to a website that lists the shops and find out what is in the menu. Certain areas get their own websites that they can update, too. In any case, you must learn what you need and enjoy or at a minimum have to test various Alhambra pot shops to obtain a sense of the strains. You\’re going to have to have your ID together with you, as if you\’re not old enough the Alhambra dispensary may not sell to you. Typically, anyone under 21 or regardless of the drinking age is where you are won\’t have the ability to buy any marijuana. Keep in mind that you need to have a driver\’s license or an ID which is current or they won\’t work together with you. Also, they are cautious so don\’t attempt to pass off an imitation ID because which gets you banned. If you wish shops to be around, stay with the rules. Do you know the main difference between sativa, indica, and hybrid plants? People say that the sativa plants get more of a head high while indica is more of any body one. The hybrids are a mixture of both kinds, with one of them sometimes being more prominent compared to other. You can find different smells, too, that mean different things. It\’s vital to start out testing out what you can because many people get anxiety from certain kinds or some make people incapable of get much done as they are too tired. It\’s just like a medication in you need to be familiar with what to prepare for when it comes to unwanted
pile-cc
Suppose -61 + 93 = 16*y. Let u(z) be the second derivative of 7/3*z**3 + 7*z**y - 7*z + 0. What is the derivative of u(k) wrt k? 14 What is the third derivative of -112*h**3 + 2760*h**4 + 231*h**3 + h**2 - 120*h**3 - 632*h**4 + 26 + 29*h + 338*h**4 wrt h? 59184*h - 6 Let d = 45 - 43. Let j be 6*d - (5 + (-5 - 1)). Differentiate -24*i**4 - 10 - 10 + j wrt i. -96*i**3 Let i be (14/(-5))/((-67)/1005). Find the third derivative of -i*f**2 + 173*f**5 - 295*f**5 + 12*f**2 wrt f. -7320*f**2 Let g(b) = 2863*b**3 - 1207*b**2 - 14*b - 7. Let y(j) = 1909*j**3 - 802*j**2 - 10*j - 5. Let s(u) = 5*g(u) - 7*y(u). What is the third derivative of s(l) wrt l? 5712 Suppose 2*r - 536 = 4*d, 5*r = -d + 5*d + 1340. What is the second derivative of -9 + 17 - r*i - 67*i**2 + 182*i**2 - 8 wrt i? 230 Let k(z) be the second derivative of 7*z**6/15 + 2*z**5/5 + 271*z**2/2 + z + 100. Find the first derivative of k(b) wrt b. 56*b**3 + 24*b**2 What is the first derivative of 830 + 9901*s + 2879 + 4065 + 765 + 401 wrt s? 9901 Let k(b) = 3*b - 8. Let n be k(4). Suppose 6*f = f + 4*c + 65, 0 = -n*c - 20. What is the second derivative of -10*z + 11*
dm_mathematics
CLEARING DEPARTMENT OPERATIONAL PROCEDURES The Option Expiration process is a screen based process for which all information is provided on the screens on C21 terminals. No Option Expiration Reports will be provided. The following screens will assist you through the Option Expiration process: MEMBER TRADE INQUIRY Contains real-time top day trade information, trade information for the previous 4 business days and trades adjusted
enron_emails