text
stringlengths 173
4.38k
| subset
stringclasses 13
values |
|---|---|
Ralph JOHNSON, Sheriff, etc.
No. 14564.
Supreme Court of Appeals of West Virginia.
June 30, 1981.
*647 DiTrapano, Jackson & Buffa and E. Joseph Buffa, Jr., Charleston, for appellant.
Ernest V. Morton, Jr., Webster Springs, for appellee.
PER CURIAM:
In this appeal, Ralph Johnson, the Sheriff of Nicholas County, West Virginia, seeks reversal of a judgment of the Circuit Court of Nicholas County reinstating the appellee, Michael Kendrick, to his position as a deputy sheriff. Johnson discharged the appellee from employment by letter effective September 1, 1977. The appellee denied the charges and a hearing was held before the Nicholas County Deputy Sheriff's Civil Service Commission which sustained the discharge, holding that the sheriff met his burden of proving "just cause" for dismissal. W.Va.Code, 7-14-17(a). The deputy appealed to the Circuit Court of Nicholas County which reversed the decision of the civil service commission and ordered reinstatement with back pay. Thereafter, this Court granted the sheriff's petition for review of the circuit court's decision. For the reasons that follow, we reverse and set aside the judgment of the trial court.
The civil service commission in upholding the dismissal found, among other things, that (1) the deputy used offensive language in the presence of three members of the Nicholas County Emergency Ambulance Service wholly without justification; (2) the deputy unnecessarily threatened to impose criminal penalties upon the driver of the ambulance; and (3) the deputy probably used excessive physical force and personal abuse in the arrest of an individual initially stopped for an alleged traffic violation.
The circuit court did not question the Commission's first two findings of misconduct but ruled that the deputy's transgressions were not sufficient to warrant dismissal. The court also expressly affirmed the Commission's finding that the deputy probably used excessive force and personal abuse in making an arrest, but concluded this finding did not warrant dismissal because the deputy's actions were not taken "without justification."
Final orders of civil service commissions are subject to limited judicial review. In reviewing the decisions of police civil service commissions, we have held:
"A final order of a police civil service commission based upon a finding of fact will not be reversed by a circuit court upon appeal unless it is clearly wrong or is based upon a mistake of law." Syl. pt. 1, City of Logan v. Dingess, W.Va., 242 S.E.
|
freelaw
|
======
jacquesm
Interesting, are the Syrians afraid that the Egyptians will find ways to
communicate or are they afraid that the flames of revolution will spread and
spoil their plans for dynasty?
If Mubarak is successfully ousted a lot of people might wake up to the
possibility of throwing out their abusive leaders, I'll bet that plenty of
middle east despots are not sleeping well tonight, if at all and that one or
two of them might check the contents of their 'bug-out-bags'.
~~~
euroclydon
Is conservative let-suicide-bomb-westerners style Islam a populist movement
that might take hold, or is it viewed by he protestors as just as undesirable
as the current regime?
~~~
jacquesm
Would you call the IRA a style of Catholicism? Would you call the abortion
clinic bombers a style of Christianity?
Individuals transgressing the law are no reason to paint a large group of
people with the same brush.
~~~
iujyhgftrgh
What about a country where the head of the church is also the head of the
armed forces? Where nuclear missile submarines are launched with "god bless
her and all who sail in her"?
Where belief in God, the head of state and the superiority over foreigners are
pretty much the same creed
~~~
cryptoz
> Where nuclear missile submarines are launched with "god bless her and all
> who sail in her"?
Are you referring to the United States? Officially speaking, by the word of
the President of the United States, the USA invaded Iraq because God spoke to
George W. Bush and God told him to invade Iraq.
Source:
[http://www.bbc.co.uk/pressoffice/pressreleases/stories/2005/...](http://www.bbc.co.uk/pressoffice/pressreleases/stories/2005/10_october/06/bush.shtml)
~~~
jacquesm
I think the GP is referring to England.
The English head of state (the Queen) is also the head of the church of
England.
see: <http://en.wikipedia.org/wiki/Church_of_England>
------
duke_sam
This doesn
|
hackernews
|
(Adapted from the application) Alzheimer's disease (AD) is defined by the presence in the brain of a fibrous protein aggregate known as amyloid plaque. Evidence from genetic, pathological, and biochemical studies suggests that amyloid fibril formation may cause neurodegeneration. Inhibition of amyloid formation is therefore a viable strategy for the design of potential AD therapeutic molecules; many industrial programs based on the idea are underway. In order to follow such a strategy, it is necessary to understand the structure of amyloid fibrils and
|
nih_exporter
|
The formation of self-assembled monolayers on surfaces is often likely to be accompanied by the formation of byproducts, whose identification holds clues to the reaction mechanism but is difficult due to the minute amounts produced. We now report a successful identification of self-assembly byproducts using gold aerogel with a large specific surface area, a procedure likely to be applicable generally. Like a thin gold layer on a flat substrate, the aerogel surface is alkylated with n-butyl-d9 groups upon treatment with
|
pubmed_abstracts
|
3.1. Pairwise multivariate meta-analysis of multiple outcomes {#s3a}
-------------------------------------------------------------
Suppose we have a total of $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{upgreek}
\usepackage{mathrsfs}
\setlength{\oddsidemargin}{-69pt}
\begin{document}
}{}$N_{{S}}$\end{document}$ studies comparing two treatments (e.g. a new treatment versus a placebo) with respect to two different but correlated outcomes, denoted with $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{upgreek}
\usepackage{mathrsfs}
\setlength{\oddsidemargin}{-69pt}
\begin{document}
}{}$R$\end{document}$ and $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{upgreek}
\usepackage{mathrsfs}
\setlength{\oddsidemargin}{-69pt}
\begin{document}
}{}$D$\end{document}$. We denote the observed treatment effects in study for outcomes $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{upgreek}
\usepackage{mathrsfs}
\setlength{\oddsidemargin}{-69pt}
\begin{document}
}{}$R$\end{document}$ and $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{upgreek}
\usepackage{mathrsfs}
\setlength{\oddsidemargin}{-69pt}
\begin{document}
}{}$D$\end{document}$ with $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{upgreek}
\usepackage{mathrsfs}
\
|
pubmed_central
|
I want a button that shows or hides a div, but when I resize the browser and trigger a media query I want to disable the button, enabling it again when resizing to the previous media query.
I'm using media queries with body:after {content:'tablet'; display:none;}, body:after {content:'laptop'; display:none;} and it works fine.
I'm using jQuery .on(); and .off(); to add/remove an event handler on window resize. The problem I'm having is that the event handler is getting added but it's toggling off straight away when I click it, going back to the 'tablet` viewport size.
How do I make it so that when I resize to the "laptop" size I remove the handler, but when I resize to "tablet" again I add the event handler.
jQuery
function chooseMenu() {
$('#sidebarWrapper').css('position', 'absolute').stop(true, true).toggle('showOrHide');
} // button function
if (size != currentSize) {
if (size == 'tablet') {
$('.menuButton').on('click', chooseMenu);
$('#sidebarWrapper').css('display', 'none');
currentSize = 'tablet';
}
if (size == 'laptop') {
$('.menuButton').off();
$('#sidebarWrapper').css('position', 'static');
$('#sidebarWrapper').css('display', 'block');
currentSize = 'laptop';
}
} //if size
I'm assuming there's something wrong with my on/off or the toggle logic which I must be missing. If this isn't the case and you need to see more just ask or just check out the live site. It's the menu button on the grey strip on the left hand side. http://lartmagazine.co.uk/. (sorry for the link I just don't know how to show this in a fiddle).
Err.. Upon just checking my link I noticed that it works in FireFox but not in Chrome?
A:
The problem was that I needed to throttle my functions when I resized the window, I installed underscore.js and used this:
$(window).resize(_.debounce(function(){
},100));
|
stackexchange
|
Before the modem connection is provided, the calling modem and the answering modem must perform modem training. Modem training includes negotiating communication parameters such as, data transfer rate, data compression, error correction protocol and modulation. Modem training includes a series of training steps, in which the calling modem and the answering modem adjust to each other""s characteristics and to the characteristics of the switched connection. These training steps include V.8/V.8bis, auto-mode, error correction and data compression. The steps and procedures are defined by the ITU V. series of modem specification and other modem specifications including MNP5 compression. ITU V. series modem specifications include V.8, V8bis, V.42, V.42bis, V.34, V.90, V.92, and V.32/V.32bis.
Once modem training is complete, the modem connection is provided by the modem pass-through between the calling modem and the answering modem. However, data can only be transported between the modems while the modem connection is provided by the modem pass-through.
Unlike a telephone network in which there is a dedicated connection between the calling modem and the answering modem, each data packet transmitted from a modem may travel on a different path from a source packet network gateway to a destination packet network gateway connected to the packet network. Some data packets may travel faster than others. Thus, data packets transmitted over the packet network may arrive out of order at the destination packet network gateway.
To compensate for these path differences, each packet network gateway includes ajitter buffer. The jitter buffer temporarily stores PCM data extracted from the payload of data packets received from the packet network. The PCM data is forwarded in-order after a playout delay to the modem. Temporarily storing received PCM data in ajitter buffer allows a smooth ordered playout of the extracted PCM data to the modem.
Each packet network gateway includes a separate clock source. The clock sources are not synchronized. The remote clock source determines the rate at which data packets are received by the local packet network gateway from the remote packet network gateway over the packet network. The local clock source determines the rate at which the packet network gateway reads the extracted PCM data from the jitter buffer. Thus, timing differences accumulate at both the local packet network gateway and the remote packet network gateway because the local clock source and the remote clock source are not synchronized. These timing differences result in a progressive accumulation of PCM data stored in the j
|
uspto_backgrounds
|
FC 08 Villingen is a German association football club based in Villingen-Schwenningen, Baden-Württemberg. The association was founded on 1 October 1908 and over time absorbed other local clubs including Germania, Alemania and Phönix.
__TOC__
History
By the mid-20s the club was playing in the highest level local league, the Bezirksliga Baden, but had descended to lower level play by the early 30s. They recovered themselves to return to high level district league play by the end of the decade and in 1935 sent defender Hermann Gramlich (3 caps) to the national side.
Following World War II all organizations in the country, including football and sports associations, were ordered dissolved by occupying Allied authorities. Most were quickly re-established, including the Villingen side which was re-formed as ASV Villingen before once again assuming its traditional identity in 1949. In 1951 FC Villingen was promoted to the Amateurliga Südbaden (II) where they immediately took the division title. The club continued to play well and repeated as champions in 1955, after which they slipped to become a mid-table side.
After the 1959–60 season the club became part of the newly formed Amateurliga Schwarzwald-Bodensee (III) where they played until elevated to the second division Regionalliga Süd after a title win in 1966. They earned mid-table results there until being relegated in 1972 carrying with them a heavy debt burden that hobbled the club for years. They captured Amateurliga Schwarzwald-Bodensee (III) championships in 1973 and 1974 before moving over to the Amateurliga Südbaden, in what was now fourth-tier football after league re-organization in the country, where they won their third title in four years in 1976. Through the 70s the team enjoyed success in regional cup play taking the Südbadischer Pokal in 1974, 1976, and 1979.
After another shuffle of German football leagues, 08 was placed in the newly formed Amateur Oberliga Baden-Württemberg (III) where they played for a couple of seasons before descending to the Verbandsliga Südbaden (IV) in 1980. They twice clawed their way back up on the strength of Verbandsliga titles in 1983 and 1985 before settling into fourth-tier play until the mid-
|
wikipedia_en
|
\[lem:fullorbit\] Let $m\geq m_\ell$ and $P\in A[\ell^{m}]$ be of exact order $\ell^{m}$. Then $\nicefrac{A[\ell^m]}{\mathbb{Z}[G_{\operatorname{tors}}]\cdot P}$ is cyclic of order dividing $\ell^{m_\ell-1}$. In particular, $A[\ell]$ is a simple $\mathbb{Z}[G_{\operatorname{tors}}]$-module for all but finitely many prime numbers $\ell$.
Let $P$ be of order $\ell^m$ and let $P' \in A[\ell^m]$ be such that $\{P,P'\}$ is a $\nicefrac{\mathbb{Z}}{\ell^m \mathbb{Z}}$-basis of $A[\ell^m]$. We represent the elements of $GL_2(\nicefrac{\mathbb{Z}}{\ell^m \mathbb{Z}})$ in this basis and regard $\operatorname{Gal}(K(A[\ell^m])/K)$ as a subset of $GL_2(\nicefrac{\mathbb{Z}}{\ell^m \mathbb{Z}})$.
Let $N\leq M!$ be the index of the normal core of $\operatorname{Gal}(K(A[\ell^m])/K)$ in $GL_2(\nicefrac{\mathbb{Z}}{\ell^m \mathbb{Z}})$. Then $$\sigma=\begin{pmatrix}
1 & 0 \\ 1 & 1
\end{pmatrix}^N = \begin{pmatrix}
1 & 0 \\ N & 1
\end{pmatrix} \in \operatorname{Gal}(K(A[\ell^m])/K).$$ Now $\sigma(P)-P=N\cdot P' \in \mathbb{Z}[G_{\operatorname{tors}}]\cdot P$. Let $\ell^n$ be the largest $\ell$-power dividing $N$, then $\nicefrac{N}{\ell^n}\in\left(\nicefrac{\mathbb{Z}}{\ell^m\mathbb{Z}}\right)^*$ and hence $\ell^n \cdot P' \in \mathbb{Z}[G_{\operatorname{tors}}]\cdot P$. Therefore, $\nicefrac{A[\ell^m]}{\mathbb{Z}[G_{\operatorname{tors}}]\cdot P}$ is a cyclic group of order dividing $\ell^n \leq \
|
arxiv
|
Prerequisite:
-------------
This utility works only if /dev/ion interface is present.
The following configs needs to be enabled in kernel to include ion driver.
CONFIG_ANDROID=y
CONFIG_STAGING=y
CONFIG_ION=y
CONFIG_ION_SYSTEM_HEAP=y
This utility requires to be run as root user.
Compile and test:
-----------------
This utility is made to be run as part of kselftest framework in kernel.
To compile and run using kselftest you can simply do the following from the
kernel top directory.
linux$ make TARGETS=android kselftest
Or you can also use:
linux$ make -C tools/testing/selftests TARGETS=android run_tests
Using the selftest it can directly execute the ion_test.sh script to test the
buffer sharing using ion system heap.
Currently the heap size is hard coded as just 10 bytes inside this script.
You need to be a root user to run under selftest.
You can also compile and test manually using the following steps:
ion$ make
These will generate 2 executable: ionapp_export, ionapp_import
Now you can run the export and import manually by specifying the heap type
and the heap size.
You can also directly execute the shell script to run the test automatically.
Simply use the following command to run the test.
ion$ sudo ./ion_test.sh
Test Results:
-------------
The utility is verified on Ubuntu-32 bit system with Linux Kernel 4.14.
Here is the snapshot of the test result using kselftest.
linux# make TARGETS=android kselftest
heap_type: 0, heap_size: 10
--------------------------------------
heap type: 0
heap id: 1
heap name: ion_system_heap
--------------------------------------
Fill buffer content:
0xfd 0xfd 0xfd 0xfd 0xfd 0xfd 0xfd 0xfd 0xfd 0xfd
Sharing fd: 6, Client fd: 5
<ion_close_buffer_fd>: buffer release successfully....
Received buffer fd: 4
Read buffer content:
0xfd 0xfd 0xfd 0xfd 0xfd 0xfd 0xfd 0xfd 0
|
github
|
Early Tuesday, with
100 percent of the votes counted
, Eric Garcetti garnered the most votes among the field of eight candidates with 33 percent of the vote. City Controller Wendy Greuel followed close behind with 29 percent. The results mirrored what both poll and fundraising numbers showed for months – the councilman and controller remain neck-and-neck.
Share this:
Grant Slater/KPCC
Voters in dozens of municipalities across the Los Angeles region went to the polls Tuesday to vote for mayors, council members and other city offices.
Outside the big contest in Los Angeles, four mayoral seats were up for election, but only one was competitive, in Redondo Beach where Steve Aspel won the office.
Pasadena voters cast ballots in three council districts, but only the Third District in the central part of the city had multiple candidates. In that race, businessman John J. Kennedy outpolled activist Ishmael Trone by 55% to 38%. Kennedy will replace longtime councilman Chris Holden, who won an Assembly seat in November.
Grant Slater/KPCC
Volunteers man the phones in the final hours of the race for mayor at Emanuel Pleitez's headquarters in Boyle Heights.
Maya Sugarman/KPCC
Los Angeles City Attorney Carmen Trutanich greets the crowd during primary election celebration at Rocco's Tavern in Studio City on Tuesday night. With the first round of votes counted, Trutanich was in second place with more than 30 percent of votes.
Maya Sugarman/KPCC
Field coordinator Jason Maruca, supporter David Shaby, and field coordinator Melissa Jacobs check the first update of primary election results during a primary election celebration at Rocco's Tavern in Studio City on Tuesday night for Los Angeles City Attorney Carmen Trutanich, who is seeking a second term.
Maya Sugarman/KPCC
Sonja and daughter Reagan Conner of Arkansas look at their cell phone as Rocco's Tavern is turned into a celebration location for Los Angeles City Attorney Carmen Trutanich on Tuesday night.
The two mayoral candidates who have been neck-and-neck in the polls continued their fight to be first by both giving their election night speeches just as the 11 p.m. TV newscasts hit the airwaves.
Garcetti and Greuel surely created a headache
|
pile-cc
|
Suppose 72 = -p + 5*p. Let v be (-8)/36 - (-1)/p. Which is bigger: 0 or v?
0
Suppose -z + 4*d - 5 + 0 = 0, 4*z - 2*d + 6 = 0. Which is bigger: -5/8 or z?
-5/8
Let b(c) be the second derivative of c**4/12 - c**3/6 - c. Let p be b(0). Let k = 105/202 + -2/101. Which is bigger: p or k?
k
Let i = -9 + -12. Is -21 <= i?
True
Let r = 2 + -2. Let i = -11 + 8. Which is bigger: i or r?
r
Let n = -0.3 + 0.4. Let c = 2 - 5. Let a = c - -1. Which is bigger: a or n?
n
Suppose -7*y - b - 9 = -3*y, 5*b = -25. Let p = -3 + 5. Let k be (-6)/4 + p/4. Is y < k?
False
Suppose -3*l = 9, 0*w + 2*l + 144 = 3*w. Suppose -4*r + w = -2*r. Let m be -2 - (r/(-7) + 1). Which is smaller: -1/4 or m?
-1/4
Suppose 0 = -2*x + 19 + 49. Let a = x - 18. Is 15 greater than a?
False
Let x(p) = p - 4. Let f be x(-10). Let l be (-4)/f - 8/28. Suppose -2*q + 2*u - 10 + 2 = 0, l = 3*q + u. Is -2 >= q?
False
Suppose -50 = 5*v + 2*x, 5*v - 3*x = -30 - 20. Is -3 != v?
True
Let c be ((-16)/30)/(42/(-175)). Which is bigger: c or 2?
c
Suppose 5*j + 13 = 8. Is -3/5 <= j?
False
Suppose -4*a - 54 = 42. Let k be ((-18
|
dm_mathematics
|
International Hedge
Central Bank regulations authorize that Brazilian companies enter into
transactions abroad, either in exchanges or having a financial institution as
their counterpart, to hedge against the fluctuation of interest rates,
exchange rates or commodity prices in the international markets.
Such hedge transactions must refer to payments in foreign currency scheduled
to be made by or to the Brazilian company in respect of commercial or
financial rights or obligations, or to payments in local currency arising out
|
enron_emails
|
II. DISCUSSION
A. Subject Matter Jurisdiction
As a preliminary matter, a question of subject matter jurisdiction is presented.
Rule 8 of the Federal Rules of Civil Procedure requires that plaintiffs include in their *96 pleadings "a short and plain statement of the grounds upon which the court's jurisdiction depends, unless the court already has jurisdiction and the claim needs no new grounds of jurisdiction to support it." FED. R. CIV. P. 8(a)(1). This rule serves to guarantee that federal courts, which are courts of limited jurisdiction, have notice of the jurisdictional basis upon which plaintiffs rest their case.
In the case at bar, the Complaint rests jurisdiction upon diversity of citizenship. Plaintiffs are citizens of the State of Pennsylvania, and Scanlon is a citizen of the State of New York. The amount in controversy, moreover, exceeds $75,000. See 28 U.S.C.A. § 1332(a)(1). Thus, subject matter jurisdiction is present over the main action under 28 U.S.C. § 1332.
The Third-Party Complaint, by contrast, contains no statement of subject matter jurisdiction. In the third-party defendants' Answer to the Third-Party Complaint, they assert that this Court lacks subject matter jurisdiction over the impleader action. As always, this Court must ensure that subject matter jurisdiction is present over all claims. SeeAmetex Fabrics, Inc. v. Just In Materials, Inc., 140 F.3d 101, 104 (2d Cir.1998); Ash v. Artpack Int'l, Inc., 1998 WL 132932, at *3 (S.D.N.Y. March 23, 1998).
To begin, subject matter jurisdiction is not present over the Third-Party Complaint by virtue of 28 U.S.C. § 1332. Scanlon and the third-party defendants are both citizens of the State of New York, and accordingly, the requirement of complete diversity is not met. See 28 U.S.C.A. § 1332. Furthermore, the Third-Party Complaint does not implicate any federal questions to establish subject matter jurisdiction. See 28 U.S.C.A. § 1331.
The statutory doctrine of supplemental jurisdiction, however, saves the day for the Third-Party Complaint. See 28 U.S.C.A. § 1367. Section 1367(a) provides that "district courts shall have supplemental jurisdiction over all other claims that
|
freelaw
|
------
lowpro
Sunrise is the only calendar app that has ever worked for me. I tried others
like Google and the integrated outlook calendar, this is sad news.
Is it impossible to have apps that don't go either Microsoft or google? I
don't want to be locked in an ecosystem.
------
asdfaccount
Well this sucks. anyone found a good alternative?
~~~
ghostly_s
They're not being dishonest in characterizing this as more than a simple
acqui-hire; most of the functionality of Sunrise is faithfully replicated in
Outlook for iOS now (which, if you're not aware, was actually itself born out
of the acquisition of a multi-protocol email app called Accompli, and still
includes support for a variety of non-Exchange mail services). Unfortunately,
missing features include the long-press natural language "quick-add" input
box, and setting multiple reminders on events.
------
pbowyer
Drat, the best calendar app I've used on Android (except for the 46
notifications it gave for Easter Monday, and 58 for the last English Bank
Holiday).
I will miss it.
------
jakegarelick
Just saw the notification on my app this morning. Very unfortunate - I've been
using it for as long as I remember, it was my favorite calendar app.
Any alternatives?
~~~
sumitgt
Well, Outlook on Android/iOS has most of Sunrise built in.
------
PascalsMugger
I'm sure this has been asked and answered before, but why do companies acquire
startups just to shut their product down within a year so often? Is this just
an acquihire? Or do big tech companies just play whack-a-mole with startups,
buying any out with interesting products just to make sure they don't one day
turn into competition?
~~~
pedalpete
For the $100+ millions Microsoft payed,they got the team, the tech and the
opportunity to move the sunrise users to use their products.
Sunrise best capabilities are likely being built into outlook, they have a
team that they know can execute and a percentage of sunrise users will move to
outlook.
I only installed sunrise last week (when I moved to Android
|
hackernews
|
Between 1.6 and 3.8 million people each year suffer a mild TBI in the US alone. Reliable diagnosis and prompt treatments are vital to managing the often-serious short and long-term sequelae resulting from mild TBI. However, a reliable objective and accurate method for mild TBI diagnosis outside of a hospital setting, and in particular for determining RTP readiness, has eluded the clinical community. Current diagnosis and RTP assessments are based on patient symptoms, neurocognitive evaluations, and /
|
nih_exporter
|
Evaluation of adrenal function in long standing pulmonary tuberculosis: a study of 100 cases.
Tuberculosis is a major public health problem in Pakistan and adrenal involvement in long-standing tuberculosis has been found to be common. A multi-center study was conducted to assess the adrenal function using short Synacthen test in one hundred patients with tuberculosis of more than 6 months duration at three hospitals of Rawalpindi and Islamabad. Forty patients demonstrated impaired response to Synacthen test. In 21 (52
|
pubmed_abstracts
|
Daji Wang and Hongxia Duan designed and performed the experiments, analyzed the data and wrote the manuscript; Jianquan Xiang, Dan Liu, Xuehui Chen, Lin Jing, Zheng Liu and Dexi Zhang assisted with experiments; Liqun Feng and Jing Feng analyzed the data; Hongjun Hao collected samples and designed the research; Xiyun Yan designed the research and wrote the manuscript.
BBB
: blood-brain barrier
sCD146
: soluble CD146
ECs
: endothelial cells
CSF
: cerebrospinal fluid
MS
: multiple sclerosis
NIND
: non-inflammatory neurological diseases
CNS
: central nervous system
IIDD
: idiopathic inflammatory demyelination diseases
CNSI
: central nervous system infection
PNS
: peripheral neuropathies
OCB
: oligoclonal bands
Q~Alb~
: albumin quotient
MBP
: myelin basic protein
MMPs
: matrix metalloproteinases
PPV
: positive predictive value
NPV
: negative predictive value
TEER
: transendothelial electrical resistance
TJPs
: tight junction proteins
ZO-1
: zonula occludens-1
JAM-1
: junctional adhesion molecule-1
BBB-ECs
: blood-brain barrier endothelial cells
NMOSD
: neuromyelitis optica spectrum disorders
{#F1}
 {
//in case of error , we create a log file with the error
//$PDOException_file = 'PDOException_file_' . date('Y_m_d-H-i-s') . '.txt' ;
$PDOException_file = 'PDOException_file' . '.txt' ;
$fh = fopen($PDOException_file, 'w') or die();
fwrite($fh, date('Y_m_d-H-i-s') . ' PDOException Error: ' . $e->getMessage() . "\n\n" );
fclose($fh);
echo 'Error: ' . $e->getMessage();
}
What i expected from the code i wrote would be to create one .txt file "PDOException" file and inside get the logs like this :
2013_05_02-12-40-02 PDOException Error: bla bla bla
2013_05_02-12-43-02 PDOException Error: bla bla bla
2013_05_02-13-45-02 PDOException Error: bla bla bla
That means every time i have an error , open the file , write the error make 2 new lines close the file. Then the next time i get an error , i write to the end of this file the error etc etc.
What happens though is that i rewrite in the beginning of my file on the old data. How can i avoid that?
A:
In your code where you have:
$fh = fopen($PDOException_file, 'w') or die()
You should use:
$fh = fopen($PDOException_file, 'a') or die()
The w open's the file for writing only and places the file pointer at the beginning of the file and truncate the file to zero length (deleting all contents). If the file does not exist,
|
stackexchange
|
Cardiac arrhythmia is a major cause of mortality in cardiovascular pathologies. Aberrancies in cardiac Ca2+ signaling have been associated with development of arrhythmia. For instance, it has been found that leaky ryanodine receptors elevate local Ca2+ concentrations causing membrane depolarizations that trigger arrhythmias. Increases in frequency of Ca2+ sparks that trigger Ca2+ waves are known to activate depolarizing currents responsible for early or late after-depolarizations and arrhythmias. Due to such findings, Ca2+ signaling has been a primary target of antiarrhythmic pharmacotherapy. In fact, inhibition of the spontaneous release of Ca2+ (e.g., via leaky ryanodine receptors) is proposed to be critical in the pharmacotherapy of arrhythmias, as reported recently for clinical use of flecainide.
The regulation of Ca2+ release from the sarcoplasmic reticulum (SR) is mediated not only by binding of Ca2+ to ryanodine receptor 2 (RyR2), but also by a host of regulatory proteins that include calmodulin, protein kinase A, FK506-binding protein (FKBP12.6), Ca2+/calmodulin-dependent protein kinase II, protein phosphatases (calcineurin), and junctional and luminal SR proteins junctin, triadin, and calsequestrin. In addition, mitochondrial-derived reactive oxygen species (ROS) have been reported to modulate RyR2-mediated Ca2+ spark activity, supporting the possibility that local control of SR Ca2+ release is regulated partially by mitochondrial ROS production. In ischemia-reperfusion-induced arrhythmias, experimental evidence also suggests deleterious effects arising from mitochondrial Ca2+ overload, ROS generation, and opening of permeability transition pores that leads to overactive RyR2 activity, causing local membrane depolarizations. It has been suggested that these depolarizations propagate from cell to cell and can be effectively suppressed by free oxygen radical scavengers.
Xanthohumol, a prenylated chalcone, is one of the principal flavonoids present in hop plant cone extracts. Flavonoids have been reported to have therapeutic effects as an antiproliferative in human breast cancer, colon cancer, and ovarian cancer, and in preventing cancerous cell growth through inhibition of cytochrome P450 enzymes. Xanthohumol has also been suggested to counteract low-density lipoprotein-induced oxygen-damaging effects, improve neuronal plasticity, and produce therapeutic effects against arteriosclerosis
|
uspto_backgrounds
|
Several running gags from the first series are reprised in Series 2, such as references to Imhotep (pictured, as in the 1st series, as a moai), bassoons, and the use of portmanteaux, in phrases such as "Thanks, ants. Thants," or as in the Music episode, "Thanks Tchaikovsky. Thaikovsky." In the final episode, this word-play culminates with Packard addressing two security guards, both named Hank, with the phrase "Thanks, Hanks. Thanks." Another running joke centres on characters such as Synthesizer Patel in the "Music" episode and Computer Jones in the "Computers" episode, who like an item to such a degree that they've changed their names.
Whereas the modules in Series 1 were distinct, there is a measure of continuity throughout the episodes of Series 2. Each week, inventors (played by a number of British comic actors) showcase their new products, culminating in the live final programme where a winning invention is chosen, supposedly by "HRH, Sir Prince Charles". To achieve this fake presentation, archive footage of Prince Charles was blended with Look Around You footage, whilst Serafinowicz dubs the Prince's real voice with his own lip-synced impression of it.
DVD extras
DVD extras include a quiz, mock pages from Ceefax, an alternative "Birds of Britain" feature, the Scary Picture, which features a comically large succession of warning screens making sure the viewer actually wants to view it, before suddenly showing it at the same time as hearing a male scream, being shown without the scream in 2 episodes of Series 2, and the Test Card (a music video). Watching this to the end, including the credits, triggers an Easter egg featuring Jack Morgan's more realistic reaction to his plastic surgery, in which the Look Around You team are shocked at the modifications to Jack's face when Dr. Fu reveals him to them. When handed a mirror, Jack turns to Dr. Fu and starts shouting expletives at him (the sole reason for 15 rating on the DVD), but then calms down after stating that it was the initial reaction to the surgery.
Special guests
Each episode featured several additional characters, many of whom were played by well-known British comedians.
Episode 1
Kevin Eldon: "Tony Rudd", school teacher and "Music 2000" contest
|
wikipedia_en
|
**Fitness in liquid culture.** The growth rates in liquid culture were determined by taking standard growth curves of cells pre-grown in exponential phase in CSM for more than 12 hours, using a Coulter counter. The relative fitness in direct competition in liquid culture was determined with a flow-cytometer-based competition assay as described in Ref. [@LangMurray09].
**Growth of *Pseudomonas aeruginosa* colonies.** See Ref. for the strain information and growth conditions.
Neutral competitions of strains with different fluorescence {#SNeutral}
===========================================================
----------------------------- -------------------------- -------------------------
Competing reference strains yellow : non-fluorescent yellow : red
Assay Selective advantage $s$ Selective advantage $s$
Liquid culture competition -0.01 $\pm$ 0.01 (N=3) 0.00 $\pm$ 0.01 (N=3)
Radial expansion sectors 0.00 $\pm$ 0.01 (N=97) 0.00 $\pm$ 0.01 (N=96)
----------------------------- -------------------------- -------------------------
: Expression of a fluorescent protein in our reference strains does not incur a fitness cost: There is no significant selective advantage in competitions of the yellow wild-type yJHK111 with the non-fluorescent wild-type yJHK102, or with the red wild-type yJHK112. Errors are standard deviations, and the number $N$ of replicates is given in parentheses.[]{data-label="tab:neutral"}
Our fitness assay does not rely on any assumptions about the exact origin of the fitness difference between the strains. The assay, however, would be more valuable if we can show that the introduction of fluorescence does not significantly affect the fitness. We therefore measured the relative fitnesses of our three reference strains, that differ only in the expression of a fluorescent protein: the non-fluorescent strain yJHK102, the yellow strain yJHK111 (constitutively expresses mCitrine), and the red strain yJHK112 (constitutively expresses mCherry). We confirmed that these strains are neutral with respect to each other, as measured using the liquid culture fitness assay and the radial plate sector assay, see table \[tab:neutral\]. This means that the expression of our fluorescent proteins does not incur a fitness cost.
Examples of radial expansions of mixes of these strains are shown in figure \[fig:neutral
|
arxiv
|
/**
* Tests the {@link PersonUnvoidHandler} class.
*/
public class PersonUnvoidHandlerTest {
/**
* @see PersonUnvoidHandler#handle(Person,User,Date,String)
*/
@Test
public void handle_shouldUnsetThePersonVoidedBit() {
UnvoidHandler<Person> handler = new PersonUnvoidHandler();
Person person = new Person();
person.setPersonVoided(true); // make sure personVoided is set
handler.handle(person, null, null, null);
assertFalse(person.getPersonVoided());
}
/**
* @see PersonUnvoidHandler#handle(Person,User,Date,String)
*/
@Test
public void handle_shouldUnsetThePersonVoider() {
UnvoidHandler<Person> handler = new PersonUnvoidHandler();
Person person = new Person();
person.setPersonVoided(true);
person.setPersonVoidedBy(new User(1));
handler.handle(person, null, null, null);
assertNull(person.getPersonVoidedBy());
}
/**
* @see PersonUnvoidHandler#handle(Person,User,Date,String)
*/
@Test
public void handle_shouldUnsetThePersonDateVoided() {
UnvoidHandler<Person> handler = new PersonUnvoidHandler();
Person person = new Person();
person.setPersonVoided(true);
person.setPersonDateVoided(new Date());
handler.handle(person, null, null, null);
assertNull(person.getPersonDateVoided());
}
/**
* @see PersonUnvoidHandler#handle(Person,User,Date,String)
*/
@Test
public void handle_shouldUnsetThePersonVoidReason() {
UnvoidHandler<Person> handler = new PersonUnvoidHandler();
Person person = new Person();
person.setPersonVoided(true);
person.setPersonVoidReason("SOME REASON");
handler.handle(person, null, null, null);
assertNull
|
github
|
Quick drying and highly durable, this extra white traffic paint is ideal for line marking on roads, playgrounds and more. Touch dry in only five minutes, the weather resistant paint leaves a bright, highly visible matt finish, but contains no harmfu..
Quick drying and highly durable, this extra yellow traffic paint is ideal for line marking on roads, playgrounds and more. Touch dry in only five minutes, the weather resistant paint leaves a bright, highly visible matt finish, but contains no harmf..
Quick drying and highly durable, this extra yellow traffic paint is ideal for line marking on roads, playgrounds and more. Touch dry in only five minutes, the weather resistant paint leaves a bright, highly visible matt finish, but contains no harmf..
Quick drying and highly durable, this green traffic paint is ideal for line marking on roads, playgrounds and more. Touch dry in only five minutes, the weather resistant paint leaves a bright, highly visible matt finish, but contains no harmful lead..
Quick drying and highly durable, this green traffic paint is ideal for line marking on roads, playgrounds and more. Touch dry in only five minutes, the weather resistant paint leaves a bright, highly visible matt finish, but contains no harmful lead..
Quick drying and highly durable, this grey traffic paint is ideal for line marking on roads, playgrounds and more. Touch dry in only five minutes, the weather resistant paint leaves a bright, highly visible matt finish, but contains no harmful lead,..
Quick drying and highly durable, this grey traffic paint is ideal for line marking on roads, playgrounds and more. Touch dry in only five minutes, the weather resistant paint leaves a bright, highly visible matt finish, but contains no harmful lead,..
Quick drying and highly durable, this red traffic paint is ideal for line marking on roads, playgrounds and more. Touch dry in only five minutes, the weather resistant paint leaves a bright, highly visible matt finish, but contains no harmful lead, ..
Quick drying and highly durable, this red traffic paint is ideal for line marking on roads, playgrounds and more. Touch dry in only five minutes, the weather resistant paint leaves a bright, highly visible matt finish, but contains no harmful lead, ..
Load the Perfekt Striper with up to three spray cans and simply roll the sturdy and stable base across the surface to be painted. You can easily adjust the width and choose between a selection of colours.
The Perfe
|
pile-cc
|
Calculate the remainder when 694628 is divided by 651.
11
What is the remainder when 79296 is divided by 26420?
36
Calculate the remainder when 20991 is divided by 775.
66
What is the remainder when 1775375 is divided by 2?
1
What is the remainder when 2839414 is divided by 45796?
62
Calculate the remainder when 10291232 is divided by 781.
776
Calculate the remainder when 935630135 is divided by 358.
357
Calculate the remainder when 38829448 is divided by 137.
86
Calculate the remainder when 183659769 is divided by 976.
969
Calculate the remainder when 1654026257 is divided by 3577.
3572
What is the remainder when 1843127 is divided by 360?
287
What is the remainder when 446022 is divided by 21237?
45
What is the remainder when 2898061 is divided by 2898058?
3
Calculate the remainder when 1254419 is divided by 418133.
20
Calculate the remainder when 393500 is divided by 469.
9
What is the remainder when 3902792 is divided by 21?
5
What is the remainder when 1461233 is divided by 902?
895
Calculate the remainder when 127772 is divided by 60.
32
What is the remainder when 89870451 is divided by 9?
6
What is the remainder when 235339 is divided by 77555?
2674
Calculate the remainder when 53379 is divided by 12768.
2307
What is the remainder when 75876551 is divided by 4343?
4341
Calculate the remainder when 12360521 is divided by 29.
25
What is the remainder when 369626 is divided by 238?
12
Calculate the remainder when 61941942 is divided by 195.
192
What is the remainder when 14048480 is divided by 7?
5
What is the remainder when 497811 is divided by 380?
11
What is the remainder when 40141 is divided by 5011?
53
Calculate the remainder when 162261 is divided by 415.
411
What is the remainder when 4292006 is divided by 58000?
6
Calculate the remainder when 9824 is divided by 4905.
14
Calculate the remainder when 1593184
|
dm_mathematics
|
Group,
The EES Summary Sheet is in P/Realtime/EES/Month01/Date. A new copy of this
sheet must be made every day. This summary sheet MUST be sent to Neil Bresnan
at EES each morning. Going forward, copy me when you send this to Neil
Bresnan. Maintaining and sending this sheet is the duty of the team member
running EPE.
|
enron_emails
|
v.
PAUL A. GARGANO,
Defendant, Appellee.
APPEAL FROM THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF MASSACHUSETTS
[Hon. Robert E. Keeton, U.S. District Judge]
Before
Boudin, Circuit Judge,
Campbell, Senior Circuit Judge,
and Stahl, Circuit Judge.
Joan Oliveri on brief pro se.
Nancy L. Hall and Gargano & Associates, P.C. on brief for
appellee.
September 27, 1999
Per Curiam. Pro se appellant Joan Oliveri filed a
civil action in the district court, claiming that her
employment had been terminated in violation of the Americans
with Disabilities Act, 42 U.S.C. 12101 et seq. She appeals
from the court's grant of judgment as a matter of law in favor
of appellee Paul A. Gargano. We affirm for the following
reasons.
The district court granted judgment for the defendant
after a bench trial at which Oliveri testified and submitted
documents into evidence. On the basis of her testimony and the
documentary evidence, the court concluded that she had filed
her administrative claim against Gargano & Associates, P.C., a
professional corporation, as her employer. Ruling that the
distinction between Gargano, the individual, and the
professional corporation bearing his name applied even in the
employment discrimination context, the court concluded that
Oliveri could not bring the instant suit against Gargano
because she had not filed her administrative charge against
him. In so doing, the court adhered to the general rule that
plaintiffs asserting employment discrimination claims in a
civil action must previously have pursued an administrative
charge against the defendant named in the lawsuit. See Virgo
v. Riviera Beach Assoc., Ltd., 30 F.3d 1350, 1358-59 (11th Cir.
1994) (stating the general rule).
On appeal, the appellant presents a single, very
narrow claim. She contends that she filed her administrative
charge
|
freelaw
|
"[Tom] saw a new girl in the garden--a lovely little blue-eyed creature with
yellow hair plaited into two long-tails, white summer frock and embroidered
pantalettes." (Tom Sayer, by Mark Twain)
Reading this, we all pictured the girl in our minds. But I believe the exact
image of the girl I have is different from yours. This is our mind working and
filling in the gaps of the information that it believes to be missing. Some
people may see the girl vividly, filling it with details like some freckles
and an embroidered dress while others will simply see a blonde girl with blue
eyes. But our ming WORKED to make that.
In the book Understanding Comics by Scott McCloud, he says that the most
import place in a comic book is the place between the pannel, where our mind
rushes in to fill in the gaps, to connect the action.
Even movies have this. We have the jump cut, that can be considered a jump
from one panel to another (with the implicit "space in between"). We also have
the "places outside the scene". If someone goes away to get a coffee, we can
picture it happening. If the scene is being filmed in a room, and we can only
see 3 of the walls, we KNOW there is a fourth one.
And, besides it all, with every medium we consume, we have the "baggage" we
take with us. Our knowledge of previous stories, movies, songs, books; our own
opinions on the theme and even if we had a good or bad day will influence our
experiencing of the "object" (book, movie, etc.)
It isn't because we're not moving our hands that the medium becomes "passive".
Books are what they are. And they are good at it. The author's fault is that
he is trying to change books while what he should really be doing is creating
a new medium.
------
pedalpete
I think this is really interesting, though in many ways it sounds more like a
game than a book. A book (to me) has a single story line based around a
structure which the author intended you to follow. Even a 'choose your own
adventure' had a basic story the user followed. I admit, technology now allows
|
hackernews
|
Accurate transmission of the genetic information requires complete duplication of the chromosomal DNA each cell division cycle. However, the idea that replication forks would form at origins of DNA replication and proceed without impairment to copy the chromosomes in the cell is too simple. The orderly progression of replication forks is challenged by encounters with template damage, slow moving and arrested RNA polymerases, and frozen DNA-protein complexes that stall the fork. Stalled forks are foci for genomic instability that causes genetic alterations and can give rise
|
nih_exporter
|
Based on the eddy-covariance system monitoring during leaf germination (15th March to 15th April 2015) and leaf forming (15th July to 15th August), the turbulence characteristics, turbulence intensity, normalized standard variance of turbulent wind speed and bulk transfer coefficient over forest plantation canopy in the Xiaolangdi Ecosystem Location Research Station were analyzed, aiming to deepen the understanding of the micro-meteorological characteristics of the forest ecosystem and provide scientific basis for the further studies of energy balance
|
pubmed_abstracts
|
HDAC-1:
: Histone deacetylase 1
GSK3*β*:
: Glycogen synthase kinase 3 beta
FOXO1a:
: Forkhead box O1
MTOR:
: Mechanistic target of rapamycin (serine/threonine kinase)
RAC1:
: Ras-related C3 botulinum toxin substrate 1
p38:
: Mitogen-activated protein kinase 14
AKT1:
: v-akt murine thymoma viral oncogene homolog 1
AKT2:
: v-akt murine thymoma viral oncogene homolog 2
TRAF1:
: TNF receptor-associated factor 1
TRAF2:
: TNF receptor-associated factor 2
TRAF3:
: TNF receptor-associated factor 3
TRAF5:
: TNF receptor-associated factor 5
TNF:
: Tumor necrosis factor
RIPK1:
: Receptor (TNFRSF)-interacting serine-threonine kinase 1
RELA:
: v-rel reticuloendotheliosis viral oncogene homolog A
RELB:
: v-rel reticuloendotheliosis viral oncogene homolog B
CASP3:
: Caspase3
CASP7:
: Caspase 7
CASP8:
: Caspase 8
IKBKB:
: Inhibitor of kappa light polypeptide gene enhancer in B-cells, kinase beta.
{#fig1}
![Illustration of the TWEAK page in NetPath. The image provides an outline of the TWEAK pathway as visualized in the NetPath webpage. The figure shows the statistical details of TWEAK pathway-based reactions (right
|
pubmed_central
|
Q:
Proving an Inequality (terms won't cancel out)
Problem: If $x$ and $y$ are real numbers such that $y \geq 0$ and $y(y+1) \leq (x+1)^2$, prove that $y(y-1) \leq x^2$.
This is what I tried:
\begin{align}
y(y+1) \leq (x+1)^2 &\implies y^2 + y \leq x^2 + 2x + 1 \\
&\implies x^2 \geq y^2 + y - 2x - 1 \\
&\implies x^2 \geq y^2 - y - 2x - 1 \tag{because $y \geq 0$}\\
&\implies x^2 \geq y(y-1) -2x - 1
\end{align}
I think I'm approaching this wrong, because if I start with the inequality $y(y+1) \leq (x+1)^2$, then the $2x + 1$ that results from the expansion of the RHS will never cancel out.
So, I tried this instead:
\begin{align}
y(y+1) \leq (x+1)^2 &\implies y^2 + y \leq x^2 + 2x + 1 \\
&\implies x^2 \geq y^2 + y - 2x - 1 \\
&\implies x^2 \geq y^2 - y - 2x - 1 \tag{same as before}
\end{align}
Then, I supposed that $y(y-1) \leq x^2$ is true. Consequently, because $y^2 - y - 2x - 1 \leq x^2$ (the last line), it is sufficient to show that $y(y-1) \leq y^2 - y - 2x - 1$. Again, this doesn't work because $-2x - 1$ doesn't cancel out.
Now I'm very much stuck and don't know how to proceed. If anyone can give me a hint, it'll be very much appreciated. Thanks!
A:
Consider two cases: $2x+1 \leq 2y$, and $2x+1 > 2y$. Note that we can assume
|
stackexchange
|
This invention relates to a solidifying material for cell or battery (hereinafter collectively called xe2x80x9ccellxe2x80x9d) electrolyte solution and a cell comprising the solidifying material as a constituent element. The term xe2x80x9ccell electrolyte solutionxe2x80x9d may hereinafter be referred to simply as an xe2x80x9celectrolyte solutionxe2x80x9d, and the term xe2x80x9csolidifying material for an electrolyte solutionxe2x80x9d may hereinafter be referred to simply as xe2x80x9csolidifying materialxe2x80x9d.
b) Description of the Related Art
As a cell electrolyte is conventionally in a liquid form, it is sealed in a case from the standpoint of safety. To safely hold the electrolyte solution over a long time, the case is required to be strongly built. As a result, it has heretofore been difficult to form a cell into a thin structure. It has recently been proposed to have an electrolyte solution absorbed in a high molecular substance such that the electrolyte is solidified. This approach is expected not only to avoid leakage of the electrolyte solution from cells and to provide the cells with improved safety but also to achieve higher design tolerances on cell configurations, cell thickness reductions, improvements in durability, and higher outputs owing to increases in area.
The conventional high molecular substances for solidifying electrolyte solutions have crosslinked structures, are insoluble in solvents, and do not melt under heat. Accordingly, they cannot be formed into thin films of uniform thickness. Use of a solid electrolyte in the form of a thin film is indispensable for the construction of a cell of smaller dimensions, especially of a reduced thickness. Because the above-described high molecular substances cannot be formed into thin films, it has heretofore been difficult to obtain a solid electrolyte in the form of a thin film of uniform thickness.
An object of the present invention is, therefore, to provide a solidifying material for a cell electrolyte solution, which can be formed into a thin film or sheet (which may hereinafter be collectively called xe2x80x9cfilmxe2x80x9d) of uniform thickness and can easily absorb and solidify the electrolyte solution.
Another object of the present invention is to provide a cell making use of such a solidifying material.
The above-described objects can be achieved by the present invention as will be described hereinafter.
Described specifically, the
|
uspto_backgrounds
|
In the early years following its establishment, the Dutch Society for the Protection of Animals was an aristocratic movement seeking animal protection, similar to organisations elsewhere. Early objectives included abolishing draft dogs, improving living and working conditions for horses, banning the docking of dog and horse ears and tails, and better slaughter regulations (including mandatory anaesthesia). The group tried to prevent animal abuse by influencing public opinion through brochures and lectures and by drafting national laws. Early legislative accomplishments included an 1875 law on rabies prevention, including punishments for intentional abuse of a dog or cat; and an 1880 law protecting species useful for agriculture and timber production, offering official protection to certain birds and mammals. A milestone was reached in 1886 when an article was included in the penal code that made abuse of all animals punishable. As enforcement of these statutes proved lax, in 1920 the Society set up a rural inspectorate, active until its replacement by the National Animal Inspection Foundation in 1975. Additionally, the Society backed a 1961 law on animal protection, which among other provisions banned using dogs as pack animals.
In the 1980s the Society actively campaigned against ritual slaughter. In 1984 the State Secretary of Agriculture and Fisheries, relying on the DSPA Ritual Slaughter Commission report, decided to gradually eliminate the production of ritually slaughtered meat for export. The Ministry of Agriculture argued that this ruling didn't affect the production of ritually slaughtered meat for the consumption within the Netherlands and therefore did not infringe upon religious freedoms. However, the Ministry of Interior ruled it a violation of the principle of religious freedom, and the decision was eventually cancelled
In 1984 DSPA started a national campaign promoting the sale of free range eggs (, literally: scratching eggs). New distribution channels were created and special stickers were produced by DSPA, marking the bakeries and the restaurants that use scratching eggs.
In 1985 a new draft of the Dutch Animal Health Act was issued. It contained a new chapter on animal welfare, so its name was amended accordingly, to Animal Health and Welfare Act. Because the new Welfare Act resulted in few concrete measures, DSPA took the initiative for revising it. According to DSPA, the Welfare Act should implement the "no-unless" principle - no practices that injure animal welfare are allowed, unless specific regulations permitting it exist. As a result of DSPA efforts, the Dutch parliament requested the Ministry of Agriculture to revise the Welfare Act in accordance with the "no-unless
|
wikipedia_en
|
Most of the measurements reported here were performed by the FM NMOR technique [@Bud2002FM]. Recent reviews of nonlinear magneto-optics of resonant vapors are given in Refs. [@Bud2002RMP; @Ale2005]. The vapor cell at room temperature was mounted within a cylindrical double-layered magnetic shield. We used a distributed-feedback (DFB) laser producing up to 10$\ $mW of cw light, tuned to the Cs D1 line (with wavelength in vacuum of $\lambda=894.6\ $nm). The laser beam was attenuated, passed through a Glan polarizer, and directed through holes in the magnetic shield through the vapor cell. The light beam was apertured to about 2$\
$mm in diameter before entering the cell. The curvature of the cell caused the transmitted light beam to diverge. This divergence was compensated by installing a 2.5$\ $cm-diameter anti-reflection coated lens with a focal length of 2.5$\ $cm at a distance of 0.15$\
$cm after the cell. The light after the lens exited the magnetic shield and was analyzed with a Wollaston polarizer and a balanced photoreceiver whose output was connected to a digital-signal-processing lock-in amplifier. The laser frequency was sinusoidally modulated by dithering the junction current, and the synchronous signal due to optical rotation was detected.
From auxiliary absorption measurements, we estimated the Cs-vapor density in the cell to be approximately $3\cdot 10^9\ $cm$^{-3}$. This density is an order of magnitude lower than the saturated density of Cs at room temperature, in our experience, a not-too-uncommon occurrence in paraffin-coated cells (the density can usually be brought closer to the saturated density by reheating the stem; however, this was not needed here, as the signals were sufficiently strong even with this low alkali-vapor density). A solenoid was installed within the innermost magnetic shield and was used to set or scan the magnetic field applied to the cell directed collinearly with the light-propagation direction (the Faraday-rotation geometry). In a typical measurement, we would tune the central frequency of the laser to a particular value near the resonance, set the modulation frequency and amplitude, and record the output of the lock-in amplifier as a function of the magnetic field.
An example of such an FM NMOR scan is shown in Fig.\[Fig\_LowPowerFMS
|
arxiv
|
// Check packet is in the correct window
diff := nextSeq.Difference(Sequence(tcp.Seq))
if diff == -1 && (length == 1 || length == 0) {
// This is probably a Keep-alive
// TODO: check byte is ok
} else if diff < 0 {
return fmt.Errorf("Re-emitted packet (diff:%d,seq:%d,rev-ack:%d)", diff,
tcp.Seq, nextSeq)
} else if revOptions.mss > 0 && length > revOptions.mss {
return fmt.Errorf("%d > mss (%d)", length, revOptions.mss)
} else if revOptions.receiveWindow != 0 && revOptions.scale < 0 && diff > int(revOptions.receiveWindow) {
return fmt.Errorf("%d > receiveWindow(%d)", diff, revOptions.receiveWindow)
}
}
}
// Compute receiveWindow
options.receiveWindow = uint(tcp.Window)
if options.scale > 0 {
options.receiveWindow = options.receiveWindow << (uint(options.scale))
}
return nil
}
// TCPSimpleFSM implements a very simple TCP state machine
//
// Usage:
// When implementing a Stream interface and to avoid to consider packets that
// would be rejected due to client/server's TCP stack, the Accept() can call
// TCPSimpleFSM.CheckState().
//
// Limitations:
// - packet should be received in-order.
// - no check on sequence number is performed
// - no RST
type TCPSimpleFSM struct {
dir TCPFlowDirection
state int
options TCPSimpleFSMOptions
}
// TCPSimpleFSMOptions holds options for TCPSimpleFSM
type TCPSimpleFSMOptions struct {
SupportMissingEstablishment bool // Allow missing SYN, SYN+ACK, ACK
}
// Internal values of state machine
const (
TCPStateClosed = 0
TCPStateSynSent = 1
TCPStateEstablished = 2
TCPStateCloseWait = 3
TCPStateLastAck = 4
|
github
|
I'm wondering if anybody has noticed any wear on the firebox? Fire eats away mild steel. That's why most combustion chambers in stoves etc are lined with firebricks.
The reason I ask is that firebox of the mini or any GF for that matter is not very repairable. The whole firebox is welded to the frame, inner and outer sheeting.
A lot of outdoor furnaces are made of CorTen. They seem to hold up pretty well. In the grand scheme of things switching from mild steel to CorTen might be worthwhile if it prolonges the life smoker. Not that I don't like a DIY project but a long lasting heirloom is always nicer.
Perhaps I'm overthinking this but the question about the durability of the firebox in the GF has never asked.
Keep the ash cleaned out and store it indoors (away from moisture, saltwater and humidity) and it will last a really long time. I’ve been here a number of years and don’t recall anyone having a firebox burn thru on a gravity feed.
@Dirtytires, I've reading along also for some years and have the plans already for two years when more urgent stuff came up. Now I'm trying to start this build again. While discussing the build some buddies suggested using CorTen. But is the CorTen(A) really more resistant to fire than regular fire? And if so could you make the entire firebox out 1/4"? 1/2" CorTen does exist but is rare and expensive. Cutting everything out of a single (gauge) sheet is way more cost effective. But I'm unsure if the reduction in thickness works.
Sorry if I misled you. I have absolutely no experience with CorTen. My point was that we have built hundreds of smokers on this site and burn thru on fireboxes does not appear to be a big issue as long as it’s maintained properly. With that said, I’m not sure ANY further enhancements need to be made.
Keep in mind, a furnace can run 24/7/365. They also use different fuels like natural gas which has more moisture in it. It will take me a lifetime to put a Year’s worth of furnace abuse on a smoker.
I have some experience at a local oil fired power plant. They are more concerned with the number of heat cycles than the heat itself.
@Diggerg, free is
|
pile-cc
|
What is the second smallest value in 5, -0.3, -0.5, -4?
-0.5
Which is the second biggest value? (a) 1.3 (b) 5 (c) 0 (d) -0.4
a
What is the second smallest value in 2, -0.1, 50?
2
Which is the second smallest value? (a) 0.8 (b) 2/3 (c) -11 (d) 2
b
Which is the second smallest value? (a) -7 (b) 1 (c) 1/4 (d) 114 (e) -1/3
e
What is the fourth biggest value in -0.2, 2/9, 1, 0.02, -3?
-0.2
What is the third smallest value in 3/2, 0.3, -2/7, -12?
0.3
Which is the biggest value? (a) 1/7 (b) 0.5 (c) -1 (d) 2/11
b
Which is the third biggest value? (a) -0.4 (b) -1 (c) 29/4 (d) 0.4
a
What is the third biggest value in -1, 3, -7, 0.4, -66?
-1
Which is the third smallest value? (a) 1/6 (b) -4 (c) -1/363
a
What is the third biggest value in -5, 2/7, -2/21, 0.015?
-2/21
What is the fourth smallest value in -7, 1, -4, -1/2?
1
What is the third smallest value in -4/9, 3/2, 0, -0.2?
0
Which is the second biggest value? (a) 309 (b) 1/7 (c) -2/11
b
What is the biggest value in 4, 0.04, -2, -3?
4
What is the third biggest value in 33, -4, 0, 4?
0
What is the smallest value in -5, 6, 0.53?
|
dm_mathematics
|
sounds good. Meet at the Briar Club?
-----Original Message-----
From: Andrew Slocum <AndrewS@calpine.com>@ENRON
Sent: Friday, February 22, 2002 8:44 AM
To: Rogers, Benjamin
Subject: Tennis at 4:30?
My toe is feeling better. How about tennis later this afternoon? The we
can have beers and watch the USA beat the
|
enron_emails
|
v.
MEMORANDUM*
ELDON VAIL, Secretary DOC; et al.,
Defendants - Appellees.
Appeal from the United States District Court
for the Western District of Washington
Benjamin H. Settle, District Judge, Presiding
Submitted December 17, 2013**
Before: GOODWIN, WALLACE, and GRABER, Circuit Judges.
Washington state prisoner Michael Holmberg appeals pro se from the
district court’s summary judgment in his 42 U.S.C. § 1983 action alleging that
defendant Sullivan unlawfully restricted his outgoing mail. We have jurisdiction
under 28 U.S.C. § 1291. We review for an abuse of discretion discovery issues.
*
This disposition is not appropriate for publication and is not precedent
except as provided by 9th Cir. R. 36-3.
**
The panel unanimously concludes this case is suitable for decision
without oral argument. See Fed. R. App. P. 34(a)(2).
United States v. Kitsap Physicians Serv., 314 F.3d 995, 1000 (9th Cir. 2002). We
affirm.
The district court did not abuse its discretion by denying Holmberg’s motion
to compel additional discovery or his request to continue defendants’ summary
judgment motion until he received additional discovery because Holmberg failed to
show how the additional discovery was necessary to defeat summary judgment.
See Blough v. Holland Realty, Inc., 574 F.3d 1084, 1091 (9th Cir. 2009) (denial of
continuance to conduct further discovery appropriate when the district court
considers the merits of the motion and concludes that there is no point to pursuing
the requested discovery); Tatum v. City & County of San Francisco, 441 F.3d
1090, 1100-01 (9th Cir. 2006) (requirements for obtaining additional discovery
under former Fed. R. Civ. P. 56(f)); Hallett v. Morgan, 296 F.3d 732, 751 (9th Cir.
2002) (describing trial court’s broad discretion to deny a motion to compel).
We reject Holmberg’s contentions regarding the applicability of Garrett v.
City & County of
|
freelaw
|
Swift 5 Release Notes for Xcode 10.2 beta - Austin_Conlon
https://developer.apple.com/documentation/xcode_release_notes/xcode_10_2_beta_release_notes/swift_5_release_notes_for_xcode_10_2_beta
======
favorited
Though it is underplayed in the release notes, the biggest initiative with
Swift 5 is the stable ABI.
Now that the binary interface is locked down, the Swift runtime and standard
library can ship as part of an OS. That means that Swift can be used in system
frameworks, the runtime support libraries won't need to be vendored in each
app, and it opens the door to shipping (non-OS) binary frameworks.
~~~
ksec
How many MBs are the Standard Library for Swift? If it is 10MB then many user
could expect anywhere form 100MB+ savings on their iPhone.
I think I will just wait for 5.1 before taking another look. Not really
trusting Apple on how they describe Stable in their recent release.
~~~
favorited
Someone had an app go from 2.4 MB (compressed) all the way down to 24 KB.
[https://twitter.com/BalestraPatrick/status/10885653106916474...](https://twitter.com/BalestraPatrick/status/1088565310691647489)
------
zapzupnz
For those of us who struggled with Swift 1 and 2, something else to remember:
the pure Swift reimplementation of Foundation was pretty basic (or non-
existent), so what we used in the early days was basically the ObjC-based NS*
frameworks but in a different language - for the most part.
Nowadays, it's possible to avoid using Foundation for a lot of basic tasks.
This is great news for Linux developers (and eventually Windows developers
when Foundation is mature enough) because a lot of basic tasks that once
relied on ObjC no longer do.
------
jonplackett
I've been using Swift a few years now and at the start it was a massive pain
moving to the new versions (1-2 was awful, 2-3 was bad but at least 3 was so
much better it was worth it).
It seems to
|
hackernews
|
The goal of this proposal is to investigate the mechanisms of very long chain fatty acid (VLCFA; >C22:0) induced neuroinflammatory demyelinating disease and to evaluate the efficacy of interventions of these signaling pathways as possible therapeutics for X-Adrenoleukodystrophy (X-ALD). X-ALD, the most common inherited peroxisomal disorder, is caused by pathognomonic accumulation of VLCFA as a result of peroxisomal dysfunction leading to
|
nih_exporter
|
Fiducial-based translational localization accuracy of electromagnetic tracking system and on-board kilovoltage imaging system.
The Calypso medical four-dimensional localization system uses AC electromagnetics, which do not require ionizing radiation, for accurate, real-time tumor tracking. This investigation compared the static and dynamic tracking accuracy of this system to that of an on-board imaging kilovoltage X-ray system for concurrent use of the two systems. The localization accuracies of a
|
pubmed_abstracts
|
Cardiac arrest is the third leading cause of coma, second only to trauma and drug overdose. Over the past two decades several publications have reported the outcome of cardiopulmonary resuscitation (CPR) for inhospital cardiac arrest. Only a sparse amount of data is available concerning the initial CPR success rates and long-term survival in adult ICUs from Germany. Initial CPR success rates range from 16.8% to 44% and long-term survival to discharge from hospital ranges from 3.1% to 16.5%. Although the initial successful resuscitation rate in ICU patients may be high, long-term and hospital discharge rates have been reported to be unsatisfactory.
Objective
=========
To evaluate the demographic characteristics of patients who suffered cardiac arrest in our ICUs as well as to identify those factors influencing outcome after resuscitation following cardiac arrest.
Methods
=======
We reviewed the records of all patients who underwent CPR in our ICUs at the Georg-August University Hospital Göettingen, Germany from January 1999 to December 2003. The GISI database was used to search for all admissions to these ICUs, and records of patients who had CPR during their stay in the ICUs were retrieved and studied.
Results
=======
During the study period, 169 patients underwent CPR. Eighty of the 169 patients with confirmed inhospital arrest survived to hospital discharge, giving a survival to hospital discharge rate of 47.3%. The initial monitored rhythm recorded at the time of arrest was asystole in 99 (58.6%) patients. Ventricular tachycardia/ fibrillation was recorded in 59 (34.9%) and pulseless electrical activity in seven (4.1%) patients. Forty-six (54.8% of the survivors), 31 (36.9%) and five (6.0%) patients with initial recorded asystole, VT/VF and PEA rhythms, respectively, survived to hospital discharge. Of the 80 patients that survived to hospital discharge 75 (93.8%) achieved good cerebral recovery (CPC 1 or CPC 2) and were alert and fully oriented on discharge; four patients (5.0%) were severely disabled (CPC 3), while one (1.2%) remained unconscious and was reported dead 5 days after discharge to another local hospital. Illness severity as assessed by the SAPS II score on admission was 38.8 ± 16.0. None of our patients with SAPS II score \>40 24 hours after CPR survived to be discharged from the ICU
|
pubmed_central
|
I was playing around with arrays and I wanted to create a program in which you enter the value of money and then check how many coins or bank notes you need to fill that value.
In case you enter 650 you should get one for: 500 one for 100 and one for 50.
That's the program I got so far, but somehow it only prints out all of the values stored in bankovci array.
public static void main(String[] args) {
int[]bills = {500,200,100,50,20,10,5,2,1};
int amount=Integer.parseInt(JOptionPane.showInputDialog("Vnesi znesek: "));
int sum=0;
System.out.print("We will need bills for: ");
while(sum<=amount)
{
for(int i=0; i < bills.length; i++)
{
if(amount-bills[i]>=0)
{
sum+=bills[i];
}
else if(amount-sum>bills[i])
{
i+=1;
}System.out.print(bills[i]+", ");
}
}}}
Edit
In case I enter 650 or any other number I get the following output:
We will need bills for: 500, 200, 100, 50, 20, 10, 5, 2, 1,
A:
There are cleaner ways of solving this problem (without using the break keyword), as I am sure other people will post. But to help you understand where you had trouble, here is a modified version of the code that you supplied. Notice that I changed the if statement, and removed the else block. I also had to add a break to exit the for loop early, which is what I think you were trying to use the i+1 for.
public static void main(String[] args) {
int[]bills = {500,200,100,50,20,10,5,2,1};
int amount=250;
int sum=0;
System.out.print("We will need bills for: ");
while(sum<amount)
{
for(int i=0; i < bills.length;
|
stackexchange
|
One typical method for identifying a 360° turn is commonly referred to as bin tracking. Bin tracking includes estimating a tracking angle from a magnetic field data point without first correcting the magnetic field data point for changed surrounding magnetic conditions using the reference correction factor (e.g., an ellipse). The tracking angle may not be useful for determining an accurate vehicle direction, however, it is useful to determine when the vehicle completes a 360° turn.
The microprocessor separates the 360° turn into “bins.” Typically, each bin represents a 12° increment of the 360°. Bin #1 might include the increment 1–12°, bin #2 13–24° and so on up to 360°. The microprocessor catalogues the tracking angles in the bins. When all of the bins (or a selected number of the bins) have a cataloged angle, the microprocessor knows that the vehicle has completed a 360° turn (or selected percentage of the 360° turn).
One typical method of estimating a series of tracking angles without first correcting the magnetic field data points includes plotting an uncorrected magnetic field data point on a reference coordinate system (e.g., a coordinate system of the magnetic sensors). For an initial uncorrected magnetic field data point, an offset point lying on a line between the uncorrected magnetic field data point and the center of the reference coordinate system and at a given distance from the uncorrected magnetic field data point is also plotted. The angle between the line and a north reference line that extends from the offset point parallel to the Y-axis is used as the tracking angle for the uncorrected magnetic field data point.
A subsequent tracking angle is determined the same way by plotting a subsequent uncorrected magnetic field data point on the reference coordinate system. If the magnetic field data point lies within a threshold (the given distance plus or minus a percent of the given distance) of the initial offset point, the initial offset point is still used to compute the tracking angle corresponding to the subsequent uncorrected magnetic field data point. If the subsequent uncorrected magnetic field data point lies outside the threshold of the initial offset point, a second offset point is determined. The second offset point lies on a line between the subsequent uncorrected magnetic field data point and the previous offset point. The angle between the line and a north reference line that extends from the second offset point parallel to the Y-axis is the subsequent tracking angle. Thus, for each new incoming uncorrected magnetic field data point, a new corresponding tracking angle is computed, based on the formerly determined offset
|
uspto_backgrounds
|
Finance
According to the 1906 Jewish Encyclopedia, Gideon began business in 1720 with a capital of £1,500 (worth £176,100 in 2019) inherited from his family, which increased so rapidly that in 1729 he was admitted a sworn broker with a capital of £25,000 (worth £3,670,000 in 2019). Gideon was involved in financial activities as a broker, a middle-man in the metal trade with the British East India Company. He was one of a number of contemporary Sephardic financiers in British public life who specialised in metal brokering, along with Abraham Mocatta. The Swedish Hats-government (controlled by pro-Jacobite freemasons) had invited Sephardic Jews in England to join the Swedish East India Company, which also included a number of Scottish diaspora who were members of the Masonic Lodges. The British government thus encouraged pro-Hanoverian freemason Joseph Salvador and Sampson Gideon to entice influential Scots to join the British East India Company to undermine the Swedish-based Jacobite masonry.
Sampson Gideon was able to successfully navigate the South Sea Company bubble, which bankrupted so many prominent people in Britain (indeed, James Picciotto in his Sketches of Anglo-Jewish History states that no "Hebrew" name is to be found on the list of insolvencies). Gideon offered his services, both private and political, to Robert Walpole and his ruling Whiggish government under the new Hanoverian monarchy. The first major conflict that he helped to financed was the War of Jenkins' Ear, which pitted the British Empire against the Spanish Empire in the Caribbean and New Granada. The Spanish Inquisition was still active and many of the Sephardi traders in the West Indies consequently viewed the Spanish cause in the conflict as potentially threatening to their trade interests.
Gideon's most significant historical act came during the Jacobite rising of 1745 during the War of the Austrian Succession when he provided assistance to the sitting Whig-Hanoverian regime against Charles Edward Stuart (the Young Pretender) and the Jacobites who were attempting to restore the Stuart monarchy, with the help of their Bourbon French allies. When the Young Pretender landed on the west-coast of Scotland in July 1745, there was panic in London as most of the British Army was engaged on the European Continent at the time. Consequently, there was
|
wikipedia_en
|
Acknowledgements {#acknowledgements .unnumbered}
================
The authors are grateful to Roberto Garra for putting them in touch, and to an anonymous reviewer for valuable comments. The second author was supported by project PEst-OE/MAT/UI4106/2014 through CIDMA and FCT.
[xx]{}
A. A. Kilbas, H. M. Srivastava and J. J. Trujillo, Theory and applications of fractional differential equations, Elsevier, Amsterdam, 2006.
R. Metzler and J. Klafter, The random walk’s guide to anomalous diffusion: a fractional dynamics approach, Phys. Rep. [**339**]{} (2000), no. 1, 77 pp. DOI: 10.1016/S0370-1573(00)00070-3
A. B. Malinowska and D. F. M. Torres, Introduction to the fractional calculus of variations, Imp. Coll. Press, London, 2012.
R. A. El-Nabulsi and D. F. M. Torres, Necessary optimality conditions for fractional action-like integrals of variational calculus with Riemann-Liouville derivatives of order $\left(\alpha,\beta\right)$, Math. Meth. Appl. Sci. [**30**]{} (2007), no. 15, 1931–1939. DOI: 10.1002/mma.879 [arXiv:math-ph/0702099]{}
R. A. El-Nabulsi and D. F. M. Torres, Fractional actionlike variational problems, J. Math. Phys. [**49**]{} (2008), no. 5, 053521, 7 pp. DOI: 10.1063/1.2929662 [arXiv:0804.4500]{}
T. Odzijewicz, A. B. Malinowska and D. F. M. Torres, Generalized fractional calculus with applications to the calculus of variations, Comput. Math. Appl. [**64**]{} (2012), no. 10, 3351–3366. DOI: 10.1016/j.camwa.2012.01.073 [arXiv:1201.5747]{}
T. Odzijewicz, A. B. Malinowska and D. F. M. Torres, Fractional calculus of variations in terms of a generalized fractional integral with applications
|
arxiv
|
<S sid="50" ssid="3">), we estimate a. joint, probability distribution p of the token and its surrounding context, both of which are denoted by c, occurring as an actual sentence boundary.</S>
<S sid="51" ssid="4">The distribution is given by: p(b, c) = Ir „,,,.f-(b„c), where b e no, yes}, where the cri's are the unknown parameters of the model, and where each aj corresponds to a fi, or a feature.</S>
<S sid="52" ssid="5">Thus the probability of seeing an actual sentence boundary in the context c is given by p(yes, c).</S>
<S sid="53" ssid="6">The contextual information deemed useful for sentence-boundary detection, which. we described earlier, must be encoded using features.</S>
<S sid="54" ssid="7">For example, a useful feature might be: This feature will allow the model to discover that the period at the end of the word Mr. seldom occurs as a sentence boundary.</S>
<S sid="55" ssid="8">Therefore the parameter corresponding to this feature will hopefully boost the probability p(no, c) if the Prefix is Mr.</S>
<S sid="56" ssid="9">The parameters are chosen to maximize the likelihood of the training data, using the Generalized Iterative Scaling (Darroch and Ratcliff, 1972) algorithm.</S>
<S sid="57" ssid="10">The model also can be viewed under the Maximum Entropy framework, in which we choose a distribution p that maximizes the entropy H (p) where /:5(b, c) is the observed distribution of sentenceboundaries and contexts in the training data.</S>
<S sid="58" ssid="11">As a result, the model in practice tends not to commit towards a particular outcome (yes or no) unless it has seen sufficient evidence for that outcome; it is maximally uncertain beyond meeting the evidence.</S>
<S sid="59" ssid="12">All experiments use a simple decision rule to classify each potential sentence boundary: a potential sentence boundary is an actual sentence boundary if and only if p(yesic) > .5
|
github
|
McKenzie Fine Art Presents Laura Sharp Wilson 3/24-4/30
McKenzie Fine Art is pleased to announce an exhibition of new paintings by Laura Sharp Wilson, Utah, her third solo exhibition at the gallery. The show opens Thursday, March 24th with a reception for the artist from 6 to 8 p.m.; it runs through Saturday, April 30, 2011.
Working on a small scale, Laura Sharp Wilson's brightly colored acrylic and graphite paintings are her least figurative and most complex to date. They continue her interest in conveying clarity amidst confusion through the use of dense, overlapping patterning and obsessively precise rendering. Abstracted forms, which reflect the artist's interest in ornamentation and excessive decoration, are layered on grounds of colored, back-painted, or masked fields of fibrous or printed paper mounted on wood, imparting both visual and surface texture to the work. Throughout, Wilson has retained the coils, ropes, and vines that encircle, bind, interconnect, dangle from, and at times, nearly strangle her forms.
Writing about the motivations inspiring her new work, Wilson has noted:
Two years ago my family relocated to the state of Utah. This collection of abstract paintings is a response to the weight and density of that move. For someone who loves rain and green vegetation, Utah is a strange, unlikable place. There is a certain stigma to living here when you are an artist, especially if you're a faithless, left-leaning east coaster. But then you get tired of hating the place you live in. The beauty of the snow-covered mountains on a clear day starts to seep in. You become fascinated by the curious overlap of Anasazi, Ute, and Navajo, cowboys, Mormons, U.S. military personnel, and the many souls who journeyed here with the expansion of the west. Roseanne Barr grew up here, Joe Hill died here, Utah Phillips is named for here, and Wallace Stegner learned to write here. The red rock country of southern Utah gets visitors from all over the world, because it looks like another planet. Current-day Utah is an environmental battleground, with the largest open-pit copper mine in the world, wolves and bison, a nuclear testing legacy, oil and gas drilling, and some of the worst air quality in the country. Utah, being a red state, struggles over rights for same-sex couples, and some of
|
pile-cc
|
Calculate the remainder when 2935 is divided by 406.
93
Calculate the remainder when 7297 is divided by 571.
445
What is the remainder when 110668 is divided by 27645?
88
Calculate the remainder when 5842 is divided by 487.
485
What is the remainder when 3475 is divided by 928?
691
What is the remainder when 44667 is divided by 26?
25
What is the remainder when 22073 is divided by 118?
7
What is the remainder when 106843 is divided by 56?
51
Calculate the remainder when 5432 is divided by 151.
147
Calculate the remainder when 23762 is divided by 928.
562
What is the remainder when 402 is divided by 43?
15
Calculate the remainder when 3727 is divided by 1846.
35
Calculate the remainder when 2676 is divided by 2430.
246
Calculate the remainder when 355802 is divided by 66.
62
What is the remainder when 16201 is divided by 201?
121
Calculate the remainder when 628 is divided by 216.
196
Calculate the remainder when 14177 is divided by 78.
59
Calculate the remainder when 919901 is divided by 608.
605
Calculate the remainder when 10761 is divided by 2689.
5
What is the remainder when 3779 is divided by 635?
604
What is the remainder when 37233 is divided by 21?
0
What is the remainder when 9802 is divided by 9759?
43
What is the remainder when 16040 is divided by 117?
11
What is the remainder when 13418 is divided by 5?
3
Calculate the remainder when 85101 is divided by 12.
9
Calculate the remainder when 5472832 is divided by 31.
30
What is the remainder when 45046 is divided by 22456?
134
What is the remainder when 826243 is divided by 43?
41
What is the remainder when 186795 is divided by 65?
50
What is the remainder when 316 is divided by 39?
4
What is the remainder when 3428 is divided by 377?
35
What is the remainder when 44585 is divided by 22257?
71
What is the remainder when 1700482 is divided by 37?
36
What is the remainder when 414789 is divided by 128?
69
|
dm_mathematics
|
Other ideas:
CD's by the group "Bewitched" I think there may be 2 or 3 (according to
Katie). Her first choice is "Bewitched", the first CD.
A "blow pen" set. It would be in the artwork area of toy stores--they are
pens that you blow the ink out of onto stencils to make pictures.
Picked the names yet? Missed you at Nancy's.
|
enron_emails
|
NOT FOR PUBLICATION FILED
UNITED STATES COURT OF APPEALS JAN 22 2019
MOLLY C. DWYER, CLERK
U.S. COURT OF APPEALS
FOR THE NINTH CIRCUIT
RODNEY JEROME WOMACK, No. 18-15075
Plaintiff-Appellant, D.C. No. 2:17-cv-00829-JAM-AC
v.
MEMORANDUM*
D. SWINGLE, M.D./Chief Medical Officer,
High Desert State Prison; et al.,
Defendants-Appellees.
Appeal from the United States District Court
for the Eastern District of California
John A. Mendez, District Judge, Presiding
Submitted January 15, 2019**
Before: TROTT, TALLMAN, and CALLAHAN, Circuit Judges.
California state prisoner Rodney Jerome Womack appeals pro se from the
district court’s order denying him leave to proceed in forma pauperis (“IFP”) in his
42 U.S.C. § 1983 action alleging deliberate indifference to his serious medical
needs. We have jurisdiction under 28 U.S.C. § 1291. We review de novo.
*
This disposition is not appropriate for publication and is not precedent
except as provided by Ninth Circuit Rule 36-3.
**
The panel unanimously concludes this case is suitable for decision
without oral argument. See Fed. R. App. P. 34(a)(2).
Washington v. L.A. Cty. Sheriff’s Dep’t, 833 F.3d 1048, 1054 (9th Cir. 2016). We
affirm.
The district court properly denied Womack’s motion to proceed IFP because
at the time Womack filed the complaint, he had filed three actions that qualified as
strikes, and he did not plausibly allege that he was “under imminent danger of
serious physical injury” at the time he lodged the complaint. 28 U.S.C. § 1915(g);
Andrews v. Cervantes, 493 F.3d 1047, 1053, 1055-56 (9th Cir. 2007) (discussing
the imminent danger exception
|
freelaw
|
our competition: mostly they have all user based pricing
my view: i think value of the product will be more visible if no. of users in
the network are increased & no. of links shared are also increased.
my concern: if we price per user & end up restricting free flow of users then
do you think we may end up turning off many of the acquired teams?
------
ASquare
Some good posts on this topic:
[https://www.linkedin.com/today/post/article/20140512065424-7...](https://www.linkedin.com/today/post/article/20140512065424-7018284-both-
pay-as-you-go-and-subscription-pricing-for-saas)
[http://www.tomtunguz.com/pricing-
experimentation](http://www.tomtunguz.com/pricing-experimentation)
~~~
kinj28
thanks for sharing :)
------
adrianhoward
Depends on your customers and your product. Could be neither. Could be both
depending on how you segment your customers.
------
cardeo
In this case I think number of users makes the most sense
------
adventured
All of this said without knowing what your actual business does.
Ideally whichever is easiest to calculate use for by the customer (assuming
you can keep your pricing structure similar in terms of what you earn as
well).
If users might be sharing anywhere from 5 to 500 or 5,000 links, that's a
pricing nightmare in which the customer doesn't know their costs and it might
be very hard to estimate ahead of time. That's a non-starter for most
businesses.
When something has such low per unit costs and value as an individual link,
I'd tend to argue in favor of a layer above that which simplifies the pricing:
in this case, the per user pricing model. If you can provide unlimited links
per user in that model, all the better.
~~~
kinj28
good point. but dont you think if their link shares are increasing then they
will be happy to pay more?
Agreed that estimating the links will be difficult for customers. looks like
identifying the optimum team size (for viral adoption) for
|
hackernews
|
DESCRIPTION (Applicant's Description): This program is designed to establish the applicant as an independent investigator of biomarker research in bronchial carcinogenesis, and in early detection and chemoprevention of cancers of the upper aerodigestive tract. The applicant has previous research experience in molecular and cellular pharmacology and has recently become an established medical oncologist specializing in the treatment of lung cancer. The sponsor is an accomplished pulmonary physiologist and molecular biologist in the field of development and differentiation of bronchial
|
nih_exporter
|
Protein stabilization by RSUME accounts for PTTG pituitary tumor abundance and oncogenicity.
Increased levels of the proto-oncogene pituitary tumor-transforming gene 1 (PTTG) have been repeatedly reported in several human solid tumors, especially in endocrine-related tumors such as pituitary adenomas. Securin PTTG has a critical role in pituitary tumorigenesis. However, the cause of upregulation has not been found yet, despite analyses made at the gene, promoter and mRNA level that
|
pubmed_abstracts
|
Ref, author Age (range Presenting features
----------------------------- --------- ------------------ ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------
\[[@R1]\], Jeanette (1985) 15 (8) 17.8 (14--27) Proteinuria (9) and proteinuria with haematuria (6) MCD (2), mesangial hypercellularity (3), FPGN (5), DPGN (3) and inadequate specimens for full light microscopic diagnosis (2) No treatment (6) and steroids (9) No definite resolution in proteinuria in all patients (1--19 months of follow-up)
\[[@R2]\], Iskandar (1991) 15 (5) 9.1 (2--16) NS (9), glomerulonephritis (3) and nephritic/NS (3) No histological glomerular alterations (8) and FSGS ± mesangial proliferation (7) No treatment (6) and steroids (9) Remission (3), SDNS (2), FRNS (2) and ESRD (2) (4 months--5 years of follow-up in 13/15 patients)
\[[@R3]\], Davenport (1992) 4 (1) 47.8 (23--72) NS (4) MCGN (1), membranous nephropathy (1), FSGS and FPGN (1) and DPGN (1) No treatment (3) and steroids and ciclosporin (1) Resolution in all 4 patients (1.7--19 years of follow-up)
\[[@R4]\], Markowitz (2003) 19 (5) 24.2 (3--42) NP (15) and haematuria (3) FSGS (17) and MCD (2) Steroids (7), steroids and ciclosporin (4), steroids, ciclosporin and cyclophosphamide (
|
pubmed_central
|
I'm using the Bootstrap Toggle plugin to change my checkboxes into toggle switches. I'm also using AngularJS. When I set the checked value, it toggles fine. But when I don't, it does not toggle. You can see in the link to my results, that checkboxes are checked, but they are not toggling. Does anyone know why it's not binding using Angular?
HTML:
<div class="form-group">
<label class="col-sm-7 control-label">
<span>Working Toggle </span>
</label>
<div class="col-sm-5">
<input id="toggle-one" checked type="checkbox">
</div>
</div>
<div class="form-group">
<label class="col-sm-7 control-label">
<span>Color Review Check</span>
</label>
<div class="col-sm-5">
<input type="checkbox" class="pull-right" ng-model="colorReview" >
</div>
</div>
<div class="form-group">
<label class="col-sm-7 control-label">
<span>Type Review Check</span>
</label>
<div class="col-sm-5">
<input type="checkbox" class="pull-right" ng-model="typeReview">
</div>
</div>
<div class="form-group">
<label for=color-review" class="col-sm-7 control-label">
<span>Color Review </span>
</label>
<div class="col-sm-5">
<input type="checkbox" id="color-review" class="pull-right" ng-model="colorReview" >
</div>
</div>
<div class="form-group">
<label for="type-review" class="col-sm-7 control-label">
<span>Type Review </span>
</label>
<div class="col-sm-5">
<input type="checkbox" id="type-review" class="pull-right" ng-model="typeReview
|
stackexchange
|
For a long time, purely manual methods have been used in which the specimen to be assessed is put into a culture bottle containing a culture medium, and the growth of the culture is inspected only visually at given time intervals, and the type or presence of a microorganism is inferred from this observation.
In addition, some technical procedures and devices are known, with which the biological activities in a sample caused by microorganisms may be determined, and where the CO.sub.2 produced by the metabolism of the microorganism, or rather, the change in CO.sub.2 content, is employed as a measurement for determining the biological activity.
It is a known procedure, for instance, to bottle the sample to be assessed together with a radioactively labelled liquid culture medium and to test the atmosphere over the culture medium for radioactive gases, following which the presence of microorganisms in the simple may be determined.
Measuring systems of this kind are described in U.S. Pat. Nos. 3,676,679 and 3,935,073, for example. Although such systems are quick and reliable, they have certain disadvantages, i.e., radioactive substances must be handled and samples must repeatedly be taken from the gas space above the culture medium for continuous monitoring. When the samples are removed from the gas space, the remaining samples to be monitored may easily be contaminated by the sample-taking element and measuring errors may occur.
In European application 0 158 497 a system is disclosed in which the biological activity of a specimen is determined by means of infrared absorption. In this method a specimen is introduced into a sealable vessel containing a liquid culture medium, and is tested for the presence of microorganisms. The vessel is subjected to specific conditions, i.e., certain temperatures are maintained over given periods of time, thus enhancing the metabolism of the microorganisms, during which process CO.sub.2 is produced in the gas space above the culture medium by conversion of the carbon source. A sample is taken from the gas space and introduced into a measuring cell, and the CO.sub.2 content is measured by infrared absorption. Again, the subsequent samples may be contaminated, and another drawback is that infrared absorption is a less sensitive manner of measuring than radioactive labelling.
In order to avoid the problem of cross-contamination, the European application 0 104 463 proposes a method as well as a device of the kind mentioned in the introduction, which also are based on the detection of CO.sub.2 --produced by metabolic processes--by way of infrared absorption
|
uspto_backgrounds
|
Villains
Mnemoth
Mnemoth is a hunger spirit, which originates from an unknown plane of Hell. It patterns its physical form after insects and it can appear as a swarm of locusts or as a single oversized insectoid monster. Mnemoth derives its strength from humanity's compulsive desire to consume. Consumption can come in many forms, and a person's need for food is not the only facet of human frailty that draws Mnemoth's attention. Fear and desire likewise add to the creature's power, and the more of each that is available to him, the stronger he becomes.
First appearance in Hellblazer #1
The First of the Fallen
A demon, and ruler of Hell. Known in the mortal world as Satan (not the same as Lucifer), tried to claim the soul of a friend of Constantine's that had been sold to him. He was tricked (and assaulted) by Constantine, resulting in him missing his agreed-upon deadline to claim the soul. Later in the same storyline, the First was shown as being one of a triumvirate of rulers in Hell - with the other two devils (the Second and Third of the Fallen) only having the power to defeat him if they acted together. This later led him to have a grudge on Constantine.
First appearance in Hellblazer #42
Nergal
A demon who gives John Constantine his demon blood in an attempt to trap him. Nergal is the demon originally summoned in Newcastle at the failed exorcism which set John's magical career in motion. John originally escaped him by luring him to the edge of Heaven, where he was punished accordingly.
He has since returned several times, after clawing his way back up through the ranks of Hell. His daughter, Rosacarnis, has also taken up her father's vendetta against John Constantine.
First appearance in Hellblazer #8
Rosacarnis
A high-ranking demoness and the daughter of Nergal. John Constantine met her while she was in the guise of a little girl. Before he left for Earth, Nergal took Rosacarnis down to a cellar, where he was keeping Eryme, a servant. He had heard Eryme singing to Rosa while she brushed her hair, in order to comfort the young demon after the loss of her mother.
|
wikipedia_en
|
=9.0 cm
=9.0 cm
Substrate $1/\nu_{J}$ $d_{\rm f}^*$ $d_{\rm f}$
------------- ------------- --------------- ----------------------------
SC (a) $1.051(4)$ $1.898(8)$ $ln(8)/ln(3) \simeq 1.893$
SC (b) $1.052(4)$ $1.896(8)$ $ln(8)/ln(3) \simeq 1.893$
SC (c) $1.115(2)$ $1.770(4)$ $ln(7)/ln(3) \simeq 1.771$
SC (d) $1.110(7)$ $1.780(15)$ $ln(7)/ln(3) \simeq 1.771$
SC (e) $1.16(2)$ $1.68(4)$ $ln(6)/ln(3) \simeq 1.631$
DF $1.30(2)$ $1.40(4)$ $10/7 \simeq 1.429$
HS2 (D = 2) $1$ - 2
: Examples of the application of Eq.(\[g14\]) to different fractals as listed in the first column: SC $\equiv$ Sierpinski Carpet, DF $\equiv$ Diffusion front, HS2 Homogeneous Substrate in $D = 2$ dimensions. The 2nd column shows the exponents obtained fitting Eq.(\[g14\]) to the simulation results while the 3rd one shows the estimations of $d_{\rm f}$ obtained using $\frac{1}{\nu_{J}}= {\frac{2D-d_{\rm f}}{2}}$. The 4th column is a list of the exact values of $d_{\rm f}$. Notice that for SC the labels a)-e) allows to identify the generating patterns, as shown in figure \[sierpi\].
Summing up, it is shown that the exponent $\nu_{J}$ can be obtained as a function of the dimensionality $D$ of the space and the fractal dimension $d_{\rm f}$ of the subset site where the RSA process actually takes place. Our main result $\nu_{J}= {\frac{
|
arxiv
|
import java.awt.image.BufferedImage;
import java.io.IOException;
import java.io.OutputStream;
/**
* Facade class for writing images without having to know what writer to use
* or whether it's available.
*/
public final class ImageWriterFacade {
private static final Logger LOGGER =
LoggerFactory.getLogger(ImageWriterFacade.class);
/**
* Writes the given already-processed image to the given stream. {@link
* edu.illinois.library.cantaloupe.processor.codec.jpeg.TurboJPEGImageWriter}
* is used if TurboJPEG is available and if writing to a JPEG; otherwise an
* {@link edu.illinois.library.cantaloupe.processor.codec.ImageWriter} is
* used.
*/
public static void write(BufferedImage image,
Encode encode,
OutputStream outputStream) throws IOException {
if (Format.get("jpg").equals(encode.getFormat()) &&
TurboJPEGImageWriter.isTurboJPEGAvailable()) {
LOGGER.debug("Writing with {}",
TurboJPEGImageWriter.class.getName());
TurboJPEGImageWriter writer = new TurboJPEGImageWriter();
writer.setProgressive(encode.isInterlacing());
writer.setQuality(encode.getQuality());
Metadata metadata = encode.getMetadata();
if (metadata != null) {
metadata.getXMP().ifPresent(writer::setXMP);
}
writer.write(image, outputStream);
} else {
ImageWriter writer = new ImageWriterFactory().newImageWriter(encode);
LOGGER.debug("Writing with {}", writer.getClass().getName());
writer.write(image, outputStream);
}
}
/**
* Writes the given already-processed image sequence to the given stream
* using an {@link
* edu.illinois.library.cantaloupe.processor.codec.ImageWriter}.
*/
public static void write(BufferedImageSequence sequence,
Encode encode,
|
github
|
And so, today, RIM announced its Hail Mary - a brand new mobile operating system (well, sort-of new), as well as two new devices. In addition, the Canadian company also officially changed its name from Research In Motion to Blackberry. The firstfewreviews of Blackberry 10 are already out, and it's not bad. The problem, however, is that in the case of Blackberry, 'not bad' could easily mean 'not good enough'.
BlackBerry did something interesting today, they showed a great deal of finesse in their execution with BB10. Let's remember, this is a product which is late to market, in a crowded environment, from a vendor which has had a pretty dramatic fall from grace and suffered from chronic mismanagement for quite some time.
The fact that BlackBerry is seemingly firing on all pistons is encouraging from a management point of view, and speaks volumes to their ability as a company to deliver in the future.
Is BB10 perfect? Will it achieve a meaningful uptake the first time around? No and probably not. But it doesn't have to be.
It has to be good enough to buy BlackBerry time to iterate on their product. I think they have a few unique selling points and I'm more optimistic after today than I was before.
The app number count is impressive, at the least. The real question is how they can over time turn these "port-a-thons" into organic interest in the platform. Is BlackBerry in the conversation when it comes to developers writing new apps? Do they differentiate on BlackBerry by integrating with the platform?
Microsoft has found that its very easy to strong arm yourself 100,000 apps, but its not so easy to change minds and hearts of developers when it comes to considering Windows Phone along with iOS and Android during initial product planning.
I'm bullish because BlackBerry has strong loyalty and strong carrier relations so they can get a decent retail push.
Areas where I'm negative are the actual devices themselves, they don't really have a unique selling point. That, and the Android app compatibility is (as I predicted it would be) a fucking mess. Reviews say that its slow, foreign, and undesirable. Sure it help inflate app numbers and it brings apps to the platform much quicker, but the cost is user experience.
I'm not sure that users will penalize BlackBerry less because they have a slow, gl
|
pile-cc
|
What is 128386801.2 rounded to the nearest one hundred thousand?
128400000
What is 0.00003158350966 rounded to seven dps?
0.0000316
Round 615423.48 to the nearest 1000000.
1000000
Round 266.7301 to 1 decimal place.
266.7
What is -6369.94157 rounded to the nearest one thousand?
-6000
What is -0.76755082 rounded to 3 decimal places?
-0.768
Round -4707058.2 to the nearest ten thousand.
-4710000
Round -129.86315161 to one dp.
-129.9
Round 360308531 to the nearest 10000.
360310000
Round -0.00136723526 to five dps.
-0.00137
What is 0.0000678520454 rounded to six dps?
0.000068
Round 0.04926738043 to 6 decimal places.
0.049267
What is -0.8161102969 rounded to 3 dps?
-0.816
What is 0.00197918893 rounded to four decimal places?
0.002
Round -0.000746809416 to 6 dps.
-0.000747
What is -3.705127007 rounded to 1 decimal place?
-3.7
What is 104128972 rounded to the nearest 1000000?
104000000
Round -18334769.3 to the nearest 1000.
-18335000
What is -0.0124307912 rounded to three decimal places?
-0.012
Round -1068.82769 to the nearest 100.
-1100
What is -95.418996 rounded to one decimal place?
-95.4
Round -126.11052 to the nearest 10.
-130
What is -0.1019466369 rounded to 5 decimal places?
-0.10195
What is 0.00020662026 rounded to five decimal places?
0.00021
Round 1751.2929 to the nearest 100.
1800
What is -1.7485705 rounded to three dps?
-1.749
What is 0.0023483913 rounded to 5 decimal places?
0.00235
Round -0.003601275785
|
dm_mathematics
|
-----
MORE SPORTS NEWS:
http://www.nytimes.com/pages/sports/index.html?todaysheadline
ARTS
=========================
Harvard's Prize Catch, a Delphic Postcolonialist
Do any of Homi K. Bhabha's devoted disciples know what he's
talking about?
http://www.nytimes.com/2001/11/17/arts/17
|
enron_emails
|
ORDER
PRATT, District Judge
Plaintiff, Larry J. Downes, filed a Complaint in this Court on February 20, 2003, seeking review of the Commissioner's decision to deny his claim for Social Security benefits under Title II of the Social Security Act, 42 U.S.C. §§ 401 et seq. This Court may review a final decision by the Commissioner. 42 U.S.C. § 405(g). For the reasons set out herein, the decision of the Commissioner is reversed and remanded for further administrative proceedings.
Plaintiff filed an application for Social Security Disability Benefits on March 13, 1997, claiming to be disabled since February 18, 1996. Tr. at 92. Plaintiff was last insured to receive disability benefits at the end of December, 2001. Tr. at 95. After the applications were denied, initially and on reconsideration, Plaintiff requested a hearing before an Administrative Law Judge. A hearing was held before Administrative Law Judge Thomas M. Donahue (ALJ) on April 9, 1998. Tr. at 19-76. The ALJ issued a Notice Of Decision Unfavorable on August 10, 1998. Tr. at 9-15. After the decision was affirmed by the Appeals Council on December 27, 2002 (Tr. at 5-7), Plaintiff filed a Complaint in this Court on February 20, 2003.
*1073 In this case, the ALJ stopped the sequential evaluation after finding that Plaintiff is engaged in substantial gainful activity. The ALJ found that Plaintiff was still engaging in his work as a farmer, and thus the other steps of the sequential evaluation were not relevant to determining the merits of Plaintiff's application.
At the hearing, Plaintiff testified that when he gets up in the morning about 6:30 he walks about 200 feet to check on 19 cows. "If they need hay, I've got to get on the tractor and take them a big bale of hay..." Tr. at 24. Plaintiff said that he also oversees an isolation unit where pigs are raised. "... it's about a half mile from home. I'll get in the pickup, I drive over there ... I walk through to make sure that they got water and feed. That there's no sick ones, you know, just analyze them and just take your time and just walk along, and the feed system's all automatic." Tr. 25. To feed the animals, Plaintiff said he turns on an electrical switch and an auger brings feed to each pen. He said that he walks through the building which
|
freelaw
|
I believe that Twitter has cracked down on this recently, or is at least
beginning to ask Twitter data customers to restrict some of their customer's
usage (or remove access entirely). But all of this after the fact.
Also, if you deleted something off Twitter and you think it's gone from every
downstream data warehouses that captured it seconds after you tweeted, and
also the people with access to those warehouses that copied it to their own
storage... well, then I have a bridge to sell you.
~~~
falcolas
Last I heard, there were less than 10 companies with access to the full
firehouse (which has every tweet). Most only get a partial feed, if that.
Disclaimer: Used to work for Dataminr; was laid off.
~~~
ashtonkem
That’s true, but doesn’t mean quite what you’re implying.
The full firehose was originally given to a small number of companies,
including Gnip (eventually purchased by Twitter). What Gnip did was provide
filtering for the firehose as well as some historical searches; this in theory
would allow companies to receive in soft real time every tweet that was
relevant to their search query.
The result is that there are tons of people who don’t have access to the full
firehose, but effectively have the ability to receive every single tweet
that’s relevant to their search query. It wouldn’t be very hard to find every
tweet relevant to a protest, as this is superficially quite similar to finding
tweets relevant to a brand or marketed event.
That being said, this isn’t a product that you can just sign up for and use.
You had (my contacts no longer work at twitter) to negotiate a contract with
Twitter directly to get access to this, pay large sums of money, and go
through a fairly high touch sales and support process.
------
dgarrett
Dataminr Access and Deletion Requests: [https://www.dataminr.com/access-and-
deletion-requests](https://www.dataminr.com/access-and-deletion-requests)
~~~
jb775
> _We will use the information you provide to process and to maintain a record
> of your request._
What a paradox...In
|
hackernews
|
The growth and proliferation of normal murine peritoneal exudate macrophages (PEM) in vitro is strictly dependent on a macrophage-specific growth factor known as colony-stimulating factor (CSF-1). By contrast, transformed macrophage tumor cell lines do not require exogenous CSF-1 for growth in culture. Recent studies show that tyrosine phosphorylation of certain membrane-bound proteins may be involved in the control of cell proliferation induced by specific growth factors. In addition, several oncogene products have been shown to be structurally
|
nih_exporter
|
Fluctuation theorems and the generalized Gibbs ensemble in integrable systems.
We derive fluctuation relations for a many-body quantum system prepared in a generalized Gibbs ensemble subject to a general nonequilibrium protocol. By considering isolated integrable systems, we find generalizations to the Tasaki-Crooks and Jarzynski relations. Our approach is illustrated by studying the one-dimensional quantum Ising model subject to a sudden change in the transverse field, where we find that the statistics of the work done and irreversible entropy
|
pubmed_abstracts
|
: Progress-free survival
CR
: Complete release
PR
: Partial release
SD
: Stable disease
PD
: Progressive disease
CNS
: Central nervous system
iPFS
: intracranial progression-free survival.
{#F1}
{#F2}
######
Patient characteristics
Characteristics Number of cases \%
---------------------------------- ----------------- -------
**Median age (range)** 60 (34-81)
**Gender**
Male 27 58.7%
Female 19 41.3%
**Kanofsky performance status**
90 8 17.4%
80 25 54.3%
70 9 19.6%
60 4 8.7%
**No. of brain metastasis**
1 15 32.6%
2-3 16 34.8%
≥4 15 32.6%
**Location of brain metastasis**
Supratentorial 33 71.7%
Infratentorial 7 15.2%
Both supra and infratentorial 6 13.1%
**Histopathological subtype**
Squamous cell carcinoma 7 15.2%
Adenocarcinoma 37 80.4%
Mixed cell carcinoma 2 4.4%
######
The DVH-based parameters of the OARs in radiotherapy
Organs mean ± SD (cGy)
---------------- ------- -----------------
Brain stem Dmax 4281 ± 699
Spinal cord Dmax 3257 ± 752
L. optic nerve Dmax 3700 ± 708
R. optic nerve Dmax 3770 ±688
L. lens Dmax 507 ± 166
Dmean 455 ±167
R. lens Dmax
|
pubmed_central
|
Deatomizing a map
I have atoms in maps, which may or may not be a good idea, but the point is I needed to deref the atoms so I could json-str the maps, and json-str can't handle atoms, so I wrote this:
(defn deatomize- [m]
(cond
(instance? clojure.lang.Atom m) #(deatomize- @m)
(map? m) (zipmap (keys m) (map #(trampoline deatomize- %) (vals m)))
:else m
)
)
(defn deatomize [m] (trampoline deatomize- m))
which seems to work, but a) is it good, b) is there a better way ?
A:
I think your code will work fine.
Some general feedback:
atoms in maps are a bit of an anti-pattern - usually you try to put maps in atoms. The idea is to keep your data structures immutable as much as possible, and have your references hold entire data structures at a fairly granular level. I'd strongly suggest rethinking this design - it will probably hurt you in the long run (for example, most Clojure library functions will assume immutable maps)
you are not deatomising the keys. maybe you never use atoms in keys in which case this is fine, but thought it was worth pointing out.
normally in Clojure closing parentheses don't get their own line and go at the end of the preceding line. this might feel odd at first, but it is good Lisp style that you should probably adopt.
performance of this function might not be that great because it is rebuilding the entire map structure piece by piece, even if nothing changes. reduce can be used to improve this, by only altering the map when you need to.
I think it is better to test for clojure.lang.IDeref rather than clojure.lang.Atom. By doing this, your code will also handle other reference types if needed.
trampoline is going to add overhead and is only needed in the (presumably rare?) case where you have really deep nesting in your data structure that is likely to cause stack overflows. If you need both safe stack handling and good performance then you might consider a recursive implementation and falling back to a trampoline version in
|
stackexchange
|
This invention relates to engine cooling systems and more particularly to a novel and improved cooling system in a turbo charged internal combustion engine.
The development of internal combustion engines for reduced exhaust emissions has resulted in significant increases in the amount of heat dissipation into engine cooling systems. Traditionally, increases in the required amount of heat dissipation has been accomplished by improving the radiator cooling capacity through increasing the core size of the radiator. In addition, increased coolant and cooling air flow has been used to deal with the increase in required heat dissipation.
Packaging space for larger radiator cores and high energy consumption due to increased coolant and cooling air flow limit the amount of heat dissipation capacity increase that can be accomplished with these traditional approaches.
It is possible to improve cooling capacity by elevating the maximum permissible coolant temperature above traditional levels. The adoption of pressurized cooling systems which permitted operation with coolants at 100xc2x0 C./212xc2x0 F. was a step in this direction. The addition of expansion tanks assisted in maintaining such temperature levels. However, it has become desirable to elevate coolant temperatures to even higher levels.
Utilization of elevated coolant temperatures requires proper pressurization under all operating, stand-still and ambient conditions in order to control cooling characteristics, secure coolant flow, prevent cavitation and cavitation erosion and to prevent unwanted boiling and overflow.
Temperature and pressure increase becomes more critical as the heat dissipation from the engine approaches the cooling capacity of the cooling system. A now traditional approach for pressurizing cooling systems is to rely on closed expansion or pressure tanks which depend on temperature increases of coolant and air to create and maintain desired pressures. Such a system communicates with ambient air by opening two way pressure valves to thereby communicating the system with ambient air to entrain new air into the pressure tank when entrapped air and the coolant cool to create a vacuum in the system. Such systems are passive and vulnerable to leaks. Moreover, if such a system is depressurized for any reason, such as maintenance or top-off, pressure is reduced to ambient and operating time and cycles are needed to increase the pressure in the system.
According to the present invention, an internal combustion engine cooling system is pressurized by introducing air under pressure from an external pressurized source. More specifically, in the preferred and disclosed embodiment, air under pressure from an engine intake manifold is communicated into the cooling system thereby to pressurize the system and elevate the maximum available coolant temperature. In its simplest form,
|
uspto_backgrounds
|
Germaine Rouillard (4 August 1888 – 1 September 1946) was a 20th-century French byzantinist specializing in philology.
Biography
The daughter of a wealthy and educated pharmacist of Argenton-sur-Creuse where she spent her childhood, she was well educated in Indre and Paris then was a librarian at the Sorbonne. In 1923 she obtained her State doctorate in literature at the Faculté of Paris. She was never elected a female professor at the Sorbonne but became the first woman to hold a chair, that of Byzantine philology at the École pratique des hautes études where she would make all her academic career. She was specialized in papyrology and Byzantine philology.
Selected works
1923: L'administration civile de l’Égypte byzantine, preface by Charles Diehl, 268 p., P. Gauthier, Paris, doctorate thesis
1923: Les papyrus grecs de Vienne, inventaire des documents publiés, H. Champion, Paris, complementary thesis
1937: Actes de Lavru, édition diplomatique et critique by Germaine Rouillard and Paul Collomp, in Archives de l'Athos, vol. I, (p. 897–1178), L. Lethielleux, Paris.
1932: Les taxes maritimes et commerciales d'après les actes de Patnos et de Lavru, in Mélanges Charles Diehl, tome I, (p. 277–289)
1953: La vie rurale dans l'Empire byzantin, 207 p., Adrien Maisonneuve, Paris, (posthumous).
Bibliography
1929: R. Draguet, "Compte-rendu de L'administration civile de l'Egypte byzantine", in Revue belge de philosophie et d'histoire, volume VIII, (p. 246–248).
1932: R. Guillaud, "Compte-rendu de Les taxes maritimes et commerciales d'après les actes de Patnos et de Lavru", in Annales d'histoire économique et sociale, (p. 429–430), volume IV, n° 6.
1947: Claire Préaux, "Germaine Rouillard
|
wikipedia_en
|
, Extension theorems, Non-vanishing and the existence of good minimal models, [preprint (2012).]{}
, [*Lectures on Vanishing Theorems*]{}, [Birkhäuser, Basel, 1992.]{}
, Fundamental theorems for the log minimal model program, [ Publ. Res. Inst. Math. Sci. 47 (2011), no. 3, 727–789.]{}
, Log pluricanonical representations and abundance conjecture, [preprint (2011). ]{}
, Vanishing theorems for semipositive line bundles, [Algebraic geometry (Tokyo/Kyoto, 1982), 519–528, Lecture Notes in Math., [**1016**]{}, Springer, Berlin, 1983]{}.
, Semipositive line bundles, [J. Fac. Sci. Univ. Tokyo Sect. IA Math. [**30**]{} (1984), no 3 353–378]{}.
, Fractionally logarithmic canonical rings of algebraic surfaces, [J. Fac. Sci. Univ. Tokyo Sect. IA Math. [**30**]{} (1984), no 3 685–696]{}.
, [Extension theorem and the existence of flips]{}, [in [*Flips for $3$-folds and $4$-folds*]{}, Oxford University Press, 2007, 79–100]{}.
, [On the three dimensional minimal model program in positive characteristic, preprint (2013)]{}.
, [A characterization of rational singularities in terms of injectivity of Frobenius maps]{}, [Amer. J. Math., [**120**]{}, (1998), 981–996]{}.
, [*Algebraic Geometry.*]{}, [Grad. Texts in Math., no [**52**]{}, Springer-Verlag, NewYork, 1977]{}.
, Semistable minimal models of threefolds in positive or mixed characteristic, [J. Alg. Geom. [**3**]{} (1994), 463–491]{}.
, Introduction to the Minimal Model Program, [volume [**10**]{} of adv. Stud. Pure Math., 283–360. Kinokuniya–North–Holland, 1987]{}.
, Basepoint freeness for nef and big linebundles in positive characteristic, [Ann. Math, [**149**]{} (1999), 253–286]{}.
, Extremal rays on smooth threefolds, [Ann. Sci. Ec. Norm. Sup., [**24**]{} (1991), 339–361]{}.
, Birational geometry of log
|
arxiv
|
<?php
/**
* Translation file
* @copyright Copyright (c) 2014-2019 Benjamin BALET
* @license http://opensource.org/licenses/AGPL-3.0 AGPL-3.0
* @link https://github.com/bbalet/jorani
* @since 0.1.0
* @author dario brignone <brignone@unitec.it>
*/
$lang['hr_employees_title'] = 'Elenco dipendenti';
$lang['hr_employees_thead_tip_edit'] = 'modifica utente';
$lang['hr_employees_thead_tip_entitlment'] = 'giorni spettanti';
$lang['hr_employees_thead_link_leaves'] = 'Ferie';
$lang['hr_employees_thead_link_extra'] = 'Extra';
$lang['hr_employees_thead_link_balance'] = 'Saldo ferie';
$lang['hr_employees_thead_link_create_leave'] = 'Inserisci una richiesta di ferie';
$lang['hr_employees_thead_link_calendar'] = 'Yearly calendar';
$lang['hr_employees_thead_link_presence'] = 'Report presenze';
$lang['hr_employees_thead_link_delegation'] = 'Deleghe';
$lang['hr_employees_thead_id'] = 'ID';
$lang['hr_employees_thead_firstname'] = 'Nome';
$lang['hr_employees_thead_lastname'] = 'Cognome';
$lang['hr_employees_thead_email'] = 'E-mail';
$lang['hr_employees_thead_entity'] = 'Entità';
$lang['hr_employees_thead_contract'] = 'Contratto';
$lang['hr_employees_thead_manager'] = 'Gestore';
$lang['hr_employees_thead_identifier'] = 'identificatore';
$lang['hr_employees_thead_datehired'] = 'Data assunzione';
$lang['hr_employees_thead_
|
github
|
Studios read 100 a week and make 12 a year. A lot more scripts get bought but get lost. Hollywood buys a lot of books. So you can write a screenplay or a book—and there’s a lot to be said for this. If you write your own book you’re your own boss. No rules in books. Lots of rules in screenplays. Majority of movies are based on preexisting material. Writing screenplays are important because they’re closer to production and also about voice—screenplays are all about your voice as a writer. You can write really bizarre indie scripts and get plucked to do blockbuster films—Rian Johnson, who’s doing the next two Star Wars movies—did Looper and Brick. They just want to know that you can write—they’re not genre specific. What’s important is that you write in a good voice and have good structure.
Producing:
Producer Skill Sets:
Creative—good notes on scripts etc; came up the ranks at studios
Packaging—get directors and actors and attach them to a project; former agents
Finance/Money (who knows where they got their money)
Nuts and Bolts/Line Producer/UPM—physically know how to actually produce a movie-know what a C Stand is.
Power—actors and directors (whoever becomes famous)
YOU DO NOT NEED TO HAVE ALL OF THESE THINGS.
Ideally you have two or three.
Who’s the least important?
Nuts and Bolts.
Why?
You can hire people to make a movie, but all the other things you can’t hire.
Far more important that you have access to a good script or book or a good relationship with an actor.
The Industry: High School with Money
Be nice to all assistants because they’re the next VP of Paramount.
Hollywood’s the last vocational town. No one cares about your degree in these companies. Having an MFA tells people that you care and are passionate about what you’re doing. An MFA degree isn’t gonna get you a job but it’s building the personal relationships that counts.
Speaking of personal relationships here’s Sebastian’s spiel:
Some of you will be successful and some of you will be less successful—it
|
pile-cc
|
Four letters picked without replacement from xyybmbyymyyllxxyx. What is prob of picking 1 b, 2 x, and 1 l?
6/595
Calculate prob of picking 1 h and 2 b when three letters picked without replacement from hhbbhhob.
3/14
What is prob of picking 4 j when four letters picked without replacement from {j: 2, t: 3}?
0
Calculate prob of picking 2 z when two letters picked without replacement from ztsatzz.
1/7
Two letters picked without replacement from bjjokoojqjjooojob. Give prob of picking 2 b.
1/136
Calculate prob of picking 4 m when four letters picked without replacement from {o: 1, p: 1, g: 1, m: 6}.
5/42
Four letters picked without replacement from {o: 3, x: 6, q: 3, z: 1}. What is prob of picking 4 x?
3/143
Two letters picked without replacement from qkkqtkqtkuqttnuk. What is prob of picking 1 t and 1 n?
1/30
Two letters picked without replacement from zofocfnz. What is prob of picking 1 o and 1 c?
1/14
What is prob of picking 4 t when four letters picked without replacement from ntjtjtnjttnttntt?
9/130
Three letters picked without replacement from tltztqttzoozp. Give prob of picking 1 t, 1 z, and 1 l.
15/286
Three letters picked without replacement from {d: 1, b: 2, x: 2, v: 1, z: 2}. Give prob of picking 2 b and 1 z.
1/28
Four letters picked without replacement from {w: 3, p: 3, f: 2, l: 4, g: 1, m: 3}. What is prob of picking 1 p, 2 f, and 1 w?
9/1820
Four letters picked without replacement from {i: 2, e: 7, r: 4, l: 1, d: 5, n: 1}. What is prob of picking 1 r, 2 i, and 1 d?
4/969
What is prob of picking 1 b and 1 s when two letters picked without replacement from sxbbsxpp?
1/7
Three
|
dm_mathematics
|
I'd prefer not to put big #s on the hotlist until you guys are semi-comfortable with the deal.
Chris, thanks for the reply regarding Andersen and S.A. trading. Let me know when you hear back from them.
Thanks,
Jody
-----Original Message-----
From: Kishkill, Joe
Sent: Wednesday, August 08, 2001 7:38 AM
To: Free, Darryl S
|
enron_emails
|
7
To prevail on an ineffective assistance of counsel claim, the petitioner must show that his attorney's performance was deficient, and that he was prejudiced by the deficient representation. See Lockhart v. Fretwell, 506 U.S. 364, 369 (1993); Strickland v. Washington, 466 U.S. 668, 688 (1984); Mason v. Hanks, 97 F.3d 887, 892-93 (7th Cir.1996). Kester has not shown a reasonable likelihood that he would have prevailed had he appealed the district court's upward departure. See McCleese, 75 F.3d at 1180. Accordingly, he cannot demonstrate that he was prejudiced by counsel's failure to object to the upward departure or to appeal the issue.
8
The presentence report recommended an upward departure pursuant to U.S.S.G. § 5K2.0. Section 5K2.0 permits an upward departure where the reason for the departure is taken into consideration by the Guidelines, but the sentencing range is inadequate. Because the relevant conduct provisions of the Guidelines take dismissed counts into consideration, the district court's departure was not based on unusual circumstances and was therefore an incorrect application of § 5K2.0. Nevertheless, Kester did not suffer any prejudice because the court could have imposed the same sentence by applying the relevant conduct provisions.
9
Section 1B1.2(c) of the Guidelines provides that "a plea agreement (written or made orally on the record) containing a stipulation that specifically establishes the commission of additional offense(s) shall be treated as if the defendant had been convicted of additional count(s) charging those offense(s)." The Commentary to that section states:
10
in the case of a stipulation to the commission of additional offense[s], the guidelines are to be applied as if the defendant had been convicted of an additional count for each of the offenses stipulated. For example, if the defendant is convicted of one count of robbery but, as part of a plea agreement, admits to having committed two additional robberies, the guidelines are to be applied as if the defendant had been convicted of three counts of robbery.
11
U.S.S.G. § 1131.2, Application Note 4.
12
As part of the plea agreement, Kester "stipulate[d] to and admit[ted]"
|
freelaw
|
The code is already written, I just think they are still too scared to ship an
extension that works against their primary sponsor.
~~~
zzzcpan
That's the problem with Mozilla's privacy propaganda, their funding depends on
violating privacy, so they can only talk and pretend, but not actually do
anything about it. Which makes them look bad, dishonest and fake, when they
are talking about privacy.
~~~
wayneftw
You’re not allowed to say anything bad about Firefox or Mozilla around these
parts without being heavily censored in case you hadn’t noticed :)
~~~
JohnFen
Sure you are. I often criticize both. But what you have to say needs to be
based in something resembling actual fact, and it helps a lot if you avoid
stating opinion as fact.
It also helps to be even-handed and call out when Mozilla and/or Firefox does
something right as well as when they do something wrong.
~~~
wayneftw
No, this is incorrect. I was down-towned for simply pointing out that Firefox
nags you to sign in. I detailed each UI measure they took. Nothing but pure
facts that are easily verifiable.
~~~
JohnFen
My comment was tailored toward blowski's remark at the top of this thread, not
anything you said. I'm not sure what comment you're talking about, so I can't
speak to that.
------
RabbiPires
All this talk about openness and freedom, and Mozilla's builds still ship with
the proprietary Pocket extension by default. I really hope they don't have to
rely on the revenue from Pocket at some point.
Not only that, but it also connects to Google's SafeBrowsing servers. Is that
required by their search engine contract with Google? Shouldn't be turned on
by default.
~~~
thawaway1837
You know they own Pocket right?
Pocket is basically their version of Read Later, etc...And it’s completely
optional whether you want to use it or not. So I’m not sure I understand this
complaint.
Mozilla’s first integration of Pocket was poorly done, and rightfully raised
complaints. But since they have purchased it, a lot of those complaints have
been resolved.
~~~
|
hackernews
|
cGI PDEs are important in the regulation of myocardial contractility, vascular tonus, platelet aggregation and antilipolytic action of insulin. Four cGI PDEs have been recently cloned from human adipose tissue (HcGIP1), human heart (HcGIP2) and rat adipose tissue (RcGIP1 and P2). At the present time little is known concerning the types of cGI PDEs in tumor cells. In three human hepatoma cell lines (Hep
|
nih_exporter
|
The methotrexate (MTX) and folate transport properties of five MTX-resistant lines of Leishmania major have been examined. These resistant lines all show a decreased Vmax for MTX influx, with no change in apparent affinity (Kt). The Vmax of folate influx is also proportionately decreased without alteration in Kt, supporting our proposal that there is a single carrier mediating influx of both ligands. Amplifications of two regions of DNA, the R region (encoding
|
pubmed_abstracts
|
Further complications of bipolar hemiarthroplasty include intra-operative metaphyseal fractures reported in 10% of cases in a series of 273 patients with displaced femoral neck fractures, depending on extension of fracture dislocation \[[@B51]\]. The dislocation rate was reported to be 1.5% in a large series of 1934 hips \[[@B52]\], half of which redislocate after reduction. Other authors reported 4% dislocation rate \[[@B53],[@B54]\]. Additional problems associated with bipolar hemiarthroplasty are migration of the bipolar head, as well as stem migration \[[@B55]\], failure of the polyethylene inlay \[[@B56]\], and component disassembly \[[@B57]-[@B61]\]. Heterotopic ossification is more frequent in cemented than in uncemented bipolar hemiarthroplasty \[[@B62]\]. However, pain relief and function are better in patients with bipolar hemiarthroplasty -regardless of cemented or uncemented- compared to unipolar arthroplasty \[[@B63]\]. In order not to miss anterior narrowing of the joint line, axial views must be done as cross-table.
Both, unipolar and bipolar hemiarthroplasty increase biomechanical stresses on the acetabular bone and that way cause migration of the head with consecutive destruction of the acetabulum, as demonstrated in a finite element model \[[@B64]\]. Although some reports describe little acetabular erosion \[[@B65]-[@B67]\], several studies demonstrated significant acetabular wear in up to 67% of cases, resulting in an average time to failure of 38 months \[[@B8],[@B68],[@B69]\]. This wear was quantified with an average rate of 0.7 mm per year \[[@B68]\]. These prostheses are therefore only recommended in old patients with limited life expectancy. A recent review of the current evidence for internal fixation versus hemiarthroplasty versus primary total hip arthroplasty for displaced femoral neck fractures showed no difference in mortality, postoperative pain, function, or quality of life for either of the devices. For hemiarthroplasty, the data suggest minimal differences in outcome between the prosthesis types \[[@B70]\]. Summing up the findings from the literature, hemiarthroplasty are preferentially performed in older patients with limited life expectancy and low functional demands.
Total Hip Arthroplasty
----------------------
In most western European countries and in the U.S., arthroplasty is the mainstay of surgical treatment of intracapsular femoral neck fractures in patients older than 60 to 65 years \[[@B71]-[@
|
pubmed_central
|
Q:
Retrieving Phone Numbers that are not deleted from the Android Contact List
I am trying to retrieve phone numbers from the ContactsContract that are not marked to be deleted.
@Override
public Loader onCreateLoader(int id, Bundle args) {
return new CursorLoader(
this,
ContactsContract.CommonDataKinds.Phone.CONTENT_URI,
new String[]{
ContactsContract.CommonDataKinds.Phone.NUMBER
},
ContactsContract.CommonDataKinds.Phone.DELETED + "==0",
null,
null);
}
However, I am getting below error:
java.lang.RuntimeException: An error occured while executing doInBackground()
at android.os.AsyncTask$3.done(AsyncTask.java:304)
at java.util.concurrent.FutureTask.finishCompletion(FutureTask.java:355)
at java.util.concurrent.FutureTask.setException(FutureTask.java:222)
at java.util.concurrent.FutureTask.run(FutureTask.java:242)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1112)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:587)
at java.lang.Thread.run(Thread.java:818)
Caused by: android.database.sqlite.SQLiteException: no such column: deleted (code 1): , while compiling: SELECT DISTINCT data1 FROM view_data data LEFT OUTER JOIN (SELECT data_usage_stat.data_id as STAT_DATA_ID, SUM(data_usage_stat.times_used) as times_used, MAX(data_usage_stat.last_time_used) as last_time_used FROM data_usage_stat GROUP BY data_usage_stat.data_id) as data_usage_stat ON (STAT_DATA_ID=data._id) WHERE (1 AND mimetype_id=5) AND ((deleted==0))
at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:181)
at android.database.DatabaseUtils.readExceptionFromP
|
stackexchange
|
Electrophotographic imaging members, e.g., photoreceptors, typically include a photoconductive layer formed on an electrically conductive substrate. The photoconductive layer is an insulator in the substantial absence of light so that electric charges are retained on its surface. Upon exposure to light, charge is generated by the photoactive pigment, and under applied field charge moves through the photoreceptor and the charge is dissipated.
In electrophotography, also known as xerography, electrophotographic imaging or electrostatographic imaging, the surface of an electrophotographic plate, drum, belt or the like (imaging member or photoreceptor) containing a photoconductive insulating layer on a conductive layer is first uniformly electrostatically charged. The imaging member is then exposed to a pattern of activating electromagnetic radiation, such as light. Charge generated by the photoactive pigment move under the force of the applied field. The movement of the charge through the photoreceptor selectively. dissipates the charge on the illuminated areas of the photoconductive insulating layer while leaving behind an electrostatic latent image. This electrostatic latent image may then be developed to form a visible image by depositing oppositely charged particles on the surface of the photoconductive insulating layer. The resulting visible image may then be transferred from the imaging member directly or indirectly (such as by a transfer or other member) to a print substrate, such as transparency or paper. The imaging process may be repeated many times with reusable imaging members.
An electrophotographic imaging member may be provided in a number of forms. For example, the imaging member may be a homogeneous layer of a single material such as vitreous selenium or it may be a composite layer containing a photoconductor and another material. In addition, the imaging member may be layered. These layers can be in any order, and sometimes can be combined in a single or mixed layer.
Typical multilayered photoreceptors have at least two layers, and may include a substrate, a conductive layer, an optional charge blocking layer, an optional adhesive layer, a photogenerating layer (sometimes referred to as a “charge generation layer,” “charge generating layer,” or “charge generator layer”), at least one charge transport layer, an optional overcoating layer and, in some belt embodiments, an anticurl backing layer. In the multilayer configuration, the active layers of the photoreceptor are the charge generation layer (CGL) and the charge transport layer (CTL). Enhancement of charge transport across these layers provides better photoreceptor performance.
|
uspto_backgrounds
|
History
Opened in 1904, the Franklin Square Theatre was designed in 1902 by the local architectural firm of Cutting, Carleton & Cutting. It was commissioned by Ramson C. Taylor, a prominent Worcester real estate developer.
Upon its sale, Poli remodeled the theatre, renamed it The Grand, and continued to show silent movies. In 1926 he hired renowned theatre designer Thomas W. Lamb, doubled the theatre's seating capacity to 3,500 and transformed the building into a palatial showcase, including a two-story lobby with mirrored walls, marbleized columns, an ornate grand staircase, and an immense chandelier in the main auditorium, just in time for the beginning of sound film, or the talkies in 1927.
In 1928, Poli sold his theatre holdings to William Fox who then renamed it the Loew's Poli. After another change of ownership, Sumner Redstone and Redstone Theaters purchased the building in 1967 opening it as Showcase Cinemas and continued operations as a multiscreen movie house until 1998 when Redstone's National Amusements closed the theatre. In 2002, National Amusements transferred ownership to the non-profit Worcester Center for the Performing Arts, established by Ed Madaus and Paul Demoga.
After extensive fundraising efforts and building community support, the theatre opened in March 2008 and was named The Hanover Theatre for the Performing Arts, after one of the theatre's corporate sponsors (Hanover Insurance) donated much of the seed money to make the opening become a reality.
Today, the theatre has seating capacity for 2300 patrons, and hosts nationally prominent entertainers, Broadway national touring companies, family touring companies, as well as providing a local outlet for community based artists and organizations. The Franklin Square Salon Gallery, located on the second floor, features art exhibits organized by ArtsWorcester.
The theatre, under the name Poli's Palace Theater, was added the National Register of Historic Places in January 2011.
The Hanover Theatre Conservatory for the Performing Arts was added in 2016. The conservatory provides space for education and outreach and provides classrooms for acting and vocal training, and various aspects of theatre production including lighting, costume design, and scenic and prop design. It also provides barres for ballet and movement training.
Gallery
See also
National Register of Historic Places listings in northwestern Worcester, Massachusetts
National Register of Historic Places listings in
|
wikipedia_en
|
and
$$B_n(f,s)=\max\{ f(j)j^{-s}/s_n(f,s), \ 1\leq j \leq k(n)\}.$$
We simply notice that the classical Hill’s estimator is $H_n(I_d,1)$ where $I_d$ is the identity function on $\mathbb{N}\setminus \{0\}$. Let us give asymptotic normality for Double-indexed function Hill estimator.\
**(a) Extreme Limit Theorem**.\
We begin with the simple Hill’s estimator.\
\[theoHill\] For $]0, \ n] \ni k(n)\rightarrow +\infty$ such that
$$k(n)^{3/4}/\log n \rightarrow 0. \tag{K1}$$
we have, as $n\rightarrow +\infty$,
$$\sqrt{k(n)} \left(H_n-\gamma\right) \rightsquigarrow \mathcal{N}(0,\gamma^2). \label{hillSN}$$
We want to establish the random rate of convergence associated with the convergence \[hillSN\] in the part (a) of the following corollary. In the part (b), we want to share that we need any other condition on top of $k(n)/n \rightarrow 0$ to have the central limit theorem if $F^{-1}$ is reduced to
$$F_{\ast}^{-1}(1-u)=\gamma \log u - C(\gamma) \log \log(1/u), \ u \in ]0,1[, \ C(\gamma)\geq 1. \label{Freduced}$$
\[theoHillCoro\] We have the following results.\
(a) Here again $F$ is the *cdf* of the Pseudo-Lindley distribution with parameters $\theta>0$ and $\beta>0$ and the notation above. Let $k(n)/\log n\rightarrow 0$.
Let $W(1)$ is a standard Gaussian random variable. Then we have
$$\frac{\log n}{\gamma \sqrt{k(n)}} \biggr(\sqrt{k(n)}(H_n-\gamma)-\gamma W(1)\biggr) \rightarrow_{\mathbb{P}} 1,$$
\(b) If $F^{-1}$ were reduced as in Formula , we have the asymptotic normality
|
arxiv
|
Incompatible platforms:
- .NET Framework < 4.0
- Silverlight
- UWP (will build, but is known not to work at runtime)
- Xamarin
More documentation on the API is available at:
https://developers.google.com/api-client-library/dotnet/apis/servicemanagement/v1
The package source code is available at:
https://github.com/google/google-api-dotnet-client/tree/master/Src/Generated
</Description>
</PropertyGroup>
<ItemGroup>
<None Include="../../../LICENSE" Pack="true" PackagePath="" />
</ItemGroup>
<!-- build properties -->
<PropertyGroup>
<TargetFrameworks>netstandard2.0;netstandard1.3;netstandard1.0;net45;net40</TargetFrameworks>
<SignAssembly>true</SignAssembly>
<AssemblyOriginatorKeyFile>..\..\..\google.apis.snk</AssemblyOriginatorKeyFile>
<DebugType>portable</DebugType>
<GenerateDocumentationFile>true</GenerateDocumentationFile>
<NoWarn>1570,1587,1591</NoWarn>
</PropertyGroup>
<!-- common dependencies -->
<ItemGroup>
<PackageReference Include="ConfigureAwaitChecker.Analyzer" Version="1.0.1" PrivateAssets="All" />
<PackageReference Include="SourceLink.Create.CommandLine" Version="2.8.0" PrivateAssets="All" />
</ItemGroup>
<!-- per-target dependencies -->
<ItemGroup Condition="'$(TargetFramework)'=='netstandard2.0'">
<PackageReference Include="Google.Apis" Version="1.49.0" />
<PackageReference Include="Google.Apis.Auth" Version="1.49.0" />
</ItemGroup>
<ItemGroup Condition="'$(TargetFramework)'=='netstandard1.3'">
<PackageReference Include="Google.Apis" Version="1.49.0" />
<PackageReference Include="Google.Apis.Auth" Version="1.49.0" />
</ItemGroup>
|
github
|
Promiscuous species are those in which pair bonds do not form and males and females are likely to copulate with more than one individual of the opposite sex. It is a unique system because subordinate males have the opportunity to access females and male reproductive success is a function of post-copulatory strategies such as sperm competition and cryptic female choice. For example, when brown headed cowbirds live in areas with abundant resources, territorial lines are not well defined and promiscuity is often reported. The brown headed cowbird is a nest parasite that lays its eggs in other birds’ nests and provides no parental care for its young. Promiscuity may be the obvious choice given the birds’ behaviors and their lack of parental care.
Tuesday, July 14, 2009
A violent but evolutionarily effective mating strategy has been spotted in spiders from Israel. Males of the aptly-named Harpactea sadistica species pierce the abdomen of females, fertilising their eggs directly in the ovaries. This has been described as a "traumatic insemination strategy," in which insemination wounds are created by male genitalia in areas outside the genital orifice of females. It is practiced because it gives the first male a reproductive advantage by bypassing structures in the females' genitalia.
These tactics have been observed in insects such as mites, bedbugs, and flies, but this study was the first time that it was documented in spiders. Typically, spider males deliver their genetic package via sperm that manually inserted using a pair of appendages called pedipalps.
The sperm are then held in a receptacle between the ovipore and ovary known as a spermatheca until an egg is released. However, the spermatheca is a "last in, first out" structure, so that if any further males inseminate a female, the last mate's sperm is the first in line to fertilize an egg.
Milan Rezic, an entomologist at the Crop Research Institute in Prague, has spotted a spider circumventing this problem by delivering sperm directly to the ovaries via holes that the males bore directly in the females' abdomens. The male possesses a pair of emboli, appendages modified for piercing females.
The way in which the male H. sadistica inseminates the female is choreographed and complex. The male taps the female, subdues her, and wraps himself around her to properly position the sex organs. He then alternates
|
pile-cc
|
-5*x + 13*c = 12*c - 82, 4*x - 5*c = 74. Suppose -x*b + 73 - 9 = 0. Let f(g) = -g**2 + 4*g + 5. Give f(b).
5
Let y(r) = -5441*r**3 - r - 5473*r**3 + 11038*r**3. Determine y(-1).
-123
Let s(h) = 4*h**3 + 55*h**2 + 158*h + 71. Let g(a) = a**3 + 14*a**2 + 41*a + 18. Let z(d) = 23*g(d) - 6*s(d). Give z(-8).
28
Let i(w) = 5*w + 1. Let c be (3 - -3)*(-3)/9*-1. Suppose -c = -2*h - 2*k + 2, 9 = 3*k. Let y(a) = -1. Let x(d) = h*i(d) - 4*y(d). Determine x(4).
-17
Let m(p) = 3*p - 2. Let h be 1648/104 - (-4)/26. Suppose -5*q - h + 6 = 4*n, -2*q - 2*n - 6 = 0. Suppose -b + q*b = -2. What is m(b)?
-8
Let t(v) = v**2 - 2*v - 21. Suppose 5 - 29 = 4*n, -5*n - 42 = 4*p. Determine t(p).
-6
Suppose -30 = -4*l + 3*n, -l + 2*n - 28 + 38 = 0. Let x(w) = -w**3 + 7*w**2 - 7*w + 13. Calculate x(l).
7
Let u(a) = -a - 7. Suppose 0 = -21*w + 5*w + 1152. Let l be (w/60)/((-6)/(-15)). Let k = l + -8. Give u(k).
-2
Suppose -4*x = -0*x. Suppose 7*b = 2*d + 4*b
|
dm_mathematics
|
Mollie Gustafson
12/15/2000 03:41 PM
To: Portland West Desk
cc:
Subject: Farewell Gathering
There will be a farewell gathering on Thursday, December 21, 2000, 5:30 PM at
Kells Irish Pub, 112 SW 2nd Ave. This is a phantom farewell, to find out who
the departed one is you must come to the party!
Shhhh.....it
|
enron_emails
|
514 F.Supp.2d 168 (2007)
Christopher BOWLER, et. al., Plaintiffs,
v.
TOWN OF HUDSON, et. al., Defendants.
Civil Action No. 05-11007-PBS.
United States District Court, D. Massachusetts.
October 4, 2007.
*169 *170 *171 Gregory A. Hession, Law Offices of Gregory A. Hession, Springfield, MA, for Plaintiffs.
John J. Davis, Mia Baron Pierce, Pierce, Davis & Perritano, John M. Simon, Stoneman, Chandler & Miller, LLP, Boston, MA, for Defendants.
MEMORANDUM AND ORDER
SARIS, District Judge.
I. Introduction
Plaintiffs,[1] who are present or former students of Hudson High School ("HHS"), allege that defendants unlawfully censored their speech by taking down posters advertising the HHS Conservative Club in violation of their First Amendment rights.[2] The posters listed the website address for a national organization of high school conservative clubs, which in turn contained a link to another website hosting graphic video footage of hostage beheadings in Iraq and Afghanistan. The link to the videos was accompanied by a warning. Defendants assert that the posters were taken down because of the graphic content of the videos, while plaintiffs contend that *172 the true reason was to censor the expression of their political views.
Defendants are John Stapelfeld, the principal; David Champigny, the assistant principal; and Dr. Sheldon Berman, superintendent of the Hudson Public School District; all are sued in their individual and official capacities. The Town of Hudson and HHS have also been sued.
Defendants move for summary judgment, arguing that plaintiffs' rights were not violated because the beheading videos were offensive, capable of causing substantial disruption, and had the potential to cause psychological harm to young students. Therefore, they argue, the school's censorship was within the bounds permitted by the Supreme Court's student speech jurisprudence. The individual defendants also contend that they are entitled to qualified immunity, and the Town argues that municipal liability should not attach to either the Town or HHS. After careful consideration of the difficult issues involved, the Court DENIES-IN-PART and ALLOWS-IN-PART defendants' motion for summary judgment.
II. Factual Background
With all reasonable inferences drawn in favor of the plaintiffs, the record supports the following facts, some of
|
freelaw
|
~~~
DJN
Il,
thanks for the kind words. We are a small team trying out best to create a
great product. your comment is much appreciated.
Regarding the multiple site search feature, we are working on it. As you know,
we'll need to scale the platform among publishers before it makes sense to
release that feature to advertisers.
Its interesting that you had the same idea. We are actively looking for
partners (active and advisory). If you are interested, send me your email at
"niyi-at-trafficspaces-dot-com.
Cheers
------
siong1987
Is there any example that I can see the "self-service user interfaces"?
And, I don't think that your service is comparable to Facebook Ads System
where you can target the demographic you want which your service doesn't not
provide.
Anyway, I don't think you are going to read the feedbacks I leave since you
just created a dummy account to promote your website.
~~~
DJN
Here is one - <http://modeltxt.trafficspaces.com/advertise/>
You can see some more examples at <http://demo.trafficspaces.com/setup/> There
is a preinstalled account there.
The Facebook Ads analogy was just to illustrate that publishers can create a
branded self-service ad system just like Facebook does for its advertisers. We
didn't mean it functions exactly like Facebook. :)
Anyway, thanks for the feedback siong1987. Much appreciated.
------
adityakothadiya
the logo still points to <http://www.aductions.com>. pls fix it.
~~~
DJN
We'll fix it now..
Thanks for pointing it out.
------
paraschopra
OpenX has a plugin that enables this
~~~
DJN
Paraschopra,
You are right. Our main competitors are OpenX and Google Ad Manager. However,
there are some things our system does uniquely. For example, a) customising
the system to match your site through a web interface. b) online payments and
c) we do everything out of the box in a hosted environment
OpenX is still the big 800 pound gorilla in the room and we
|
hackernews
|
Information processing by the skin senses (tactile systems) may be utilized when the effectiveness of a conventional channel is limited, as in high noise environments, or when existing channels are overtaxed, as in jet and space control systems. A humane and also practical aspect of the research is its applicability in compensating for sensory losses of the blind and deaf. Before these needs may be satisfied, sizeable gaps must be filled in our knowledge of the basic functioning of the cutaneous sensory systems. The
|
nih_exporter
|
Duplication of the thumb. A 20-year retrospective review.
Thumb duplication is a common congenital abnormality accounting for 6.6% of all hand deformities. The object of the primary surgery is to achieve a thumb with aligned joint surfaces and epiphyses perpendicular to the long axis, central flexor and extensor tendons, and adequate collateral ligaments. Experienced surgeons with an understanding of the abnormal anatomy and knowledge of the numerous refinements in technique cannot guarantee a flawless result.
|
pubmed_abstracts
|
Gardens
-------
The two garden locations in China were the Sun Yat Sen Arboretum and the Jiangsu Forestry Institute ([Table 2](#plw087-T2){ref-type="table"}). The former had been a grassy area mowed multiple times per year before the garden was set up. The latter was a 1-year fallow rice field. The two garden locations in Hawaii were the Hawaii Agricultural Research Corporation in Maunawili (on Oahu) and the Malamaki Agricultural Experiment Station (on Hawaii). The former was a 1-year fallow sugar cane field and the latter was an exotic grass dominated fallow field previously used for growing tropical fruit (more than 5 years before). The three gardens in Texas were at the University of Houston Coastal Center (La Marque, TX), Katy Prairie Conservancy (Katy, TX) and Armand Bayou Nature Center (Pasadena, TX). Each was native dominated grassland that had been mowed annually. The background vegetation was not managed in any garden during the experiment so *T. sebifera* plants competed with the background vegetation. Table 2.Research garden sites.SiteLocationLat/LongAnnual precip.\# of seedlings*China*Jiangsu Forestry Inst.Molingguan, JiangsuN31.8526 E118.7733100 cm200Sun Yat Sen GardenNanjing, JiangsuN32.0603 E118.8272106 cm120*Hawaii*HARCMaunawili, HawaiiN21.3728 W157.7706190 cm120Hawaii Ag Expt StationMalamaki, HIN19.4697 W154.8843203cm120*Texas*Katy Prairie ConservancyKaty, TXN29.9267 W95.9239125 cm120Armand Bayou Nature CenterPasadena, TXN29.5936 W95.0526137 cm120University of Houston Coastal CenterLa Marque, TXN29.3773 W95.0401111 cm200
Experiment design
-----------------
The experiment was a factorial design with three geographic venues (Hawaii, Texas, China), seven gardens nested within venue, two population origins (continental US vs. China), 14 populations nested in origin and an insect suppression treatment. In each of the seven gardens we planted seedlings from every
|
pubmed_central
|
So I have a web app written in PHP that will run on different Ubuntu servers around the world.
Some of the servers will be configured to run on local time, some will run on UTC, it depends on the customer.
While I can edit the php.ini-file and set date.timezone, manually enter such data is bound to get wrong one day.
How can I get PHP to use the time zone already defined in the system (tzdata)?
Or, in other words: How can I extract (the long) time zone name from the system in PHP to use in date_default_timezone_set()?
A:
With the help that Andrey Knupp gave in his answer, I was able to solve this one.
echo "Time: " . date("Y-m-d H:i:s") . "<br>\n";
$shortName = exec('date +%Z');
echo "Short timezone:" . $shortName . "<br>";
$longName = timezone_name_from_abbr($shortName);
echo "Long timezone:" . $longName . "<br>";
date_default_timezone_set($longName);
echo "Time: " . date("Y-m-d H:i:s") . "<br>\n";
Gives output:
Time: 2011-12-23 23:29:45
Short timezone:MYT
Long timezone:Asia/Kuala_Lumpur
Time: 2011-12-24 06:29:45
Update: The short name for the time zones are not unique. For instance, in both America and Australia there is an "EST", leading timezone_name_from_abbr to sometimes pick the one I don't want to... You can ask date how big the offset is, and that can be used to further match the correct time zone:
$offset = exec('date +%::z');
$off = explode (":", $offset);
$offsetSeconds = $off[0][0] . abs($off[0])*3600 + $off[1]*60 + $off[2];
$longName = @timezone_name_from_abbr($shortName, $offsetSeconds);
A:
If you have timezone set you could use:
|
stackexchange
|
That is, as shown in, for example, FIGS. 1A and 1B, the slab optical waveguide substrate unit 100 has integrally formed, input channel optical waveguides (input channel optical waveguide array) 103 to which a light signal is input, collimator lenses (input-side lens array) 104 that convert the input light signal into parallel light (collimated light), a slab optical waveguide 105 that allows the light signal converted into the parallel light to propagate therethrough, light-converging lenses (output-side lens array) 106 that converge the light signal (propagating parallel light), and output channel optical waveguides (output channel optical waveguide array) 107 to which the light signal is output. A first light-deflecting element mounting opening 112, to which the light deflecting elements 101 are mounted, and a second light-deflecting element mounting opening 113, to which the light deflecting elements 102 are mounted, are formed in the slab optical waveguide array substrate unit 100. In FIG. 1B, reference numeral 111 denotes a core layer, reference numeral 114 denotes a lower clad layer, and reference numeral 115 denotes an upper clad layer.
The input-side light deflecting elements (first light-deflecting element array) 101 and the output-side light deflecting elements (second light-deflecting element array) 102 are formed by forming thin-film slab optical waveguides 109, formed of electro-optical materials (for example, electro-optical crystals, such as PZT or PLZT), onto respective conductive substrate units 108; by forming prism electrodes 110 on a surface of each slab optical waveguide 109; and by polishing end surfaces.
In the optical switch module, the input-side light deflecting elements 101 are mounted to the first light-deflecting element mounting opening 112 disposed between the collimator lenses 104 and the slab optical waveguide 105 at the slab optical waveguide substrate unit 100. The output-side light deflecting elements 102 are mounted to the second light-deflecting element mounting opening 113 disposed between the slab optical waveguide 105 and the light-converging lenses 106.
In the optical switch module having such a structure, application of a predetermined voltage to the prism electrodes 110 (formed at the input-side light deflecting elements 101 and the output-side light deflecting elements 102) results in the following. For example, as shown in FIG. 1A, light signals, input from the input channel optical wave
|
uspto_backgrounds
|
Late Iron Age and Roman artefacts found at the site include ceramic loom weights and parts of pots and plates; Roman coins from the 1st to the 4th centuries AD, but particularly the late 3rd to late 4th centuries; copper items including brooches, a pin and a bracelet, iron items, particularly nails; lead items including weights, pot rivets and lead shot; and stone items including several quern-stones and a whetstone.
Bone fragments found at the site came mostly from cattle (16.4%), sheep and goats (10.7%) and horses (10.7%). Farming at the site seems to have been mostly pastoral; there was little evidence of arable cultivation.
History
The settlement arose by a ford across the Thames, from which it derived its toponym ("sheep ford"). It was mentioned in a charter of 1005, when the estate was granted to Eynsham Abbey.
A 17th century tradition that Alfred the Great held a council at Shifford arose from a reference to Sifford in the 12th or 13th century poem The Proverbs of Alfred, now thought not to refer to this place.
In the 17th century Shifford had between 15 and 23 houses. By 1881 the population had risen to 70 but by 1951, the last year for which separate figures are available, it had fallen to 27. It is now a largely deserted village.
Until the 19th century Shifford was a township in the parish of Bampton. It became a separate civil parish in 1866. In 1954 the parish was united with Aston Bampton to form the parish of Aston Bampton and Shifford, later renamed Aston, Cote, Shifford and Chimney.
Chapel
Shifford was never an ecclesiastical parish but in medieval times it was a dependent chapelry of Bampton. The chapel was later described as "Georgian" and became derelict by the 19th century. In 1863 it was replaced with a Gothic Revival one designed by the architect Joseph Clarke. It is a Grade II listed building.
Shifford Lock
A lock on the River Thames was built in 1898 half a mile upstream from Shifford. It is accessible on foot from Chimney, but not directly from Shifford.
References
Sources
External links
Category:Villages in
|
wikipedia_en
|
2. $\operatorname{Ker}{G_{}{^{\scriptscriptstyleL,{\mathcal{V}_{}}}}}=\{0\}$,
3. ${\@ifstar{\@proldf}{\@prolpf}}[E]{{\mathcal{M}}} \cap F=\{0\}$,
4. ${\@ifstar{\@proldf}{\@prolpf}}[{\mathcal V}]{{\mathcal{M}}} \cap({\@ifstar{\@proldf}{\@prolpf}}[{\mathcal
V}]{{\mathcal{M}}})^\perp=\{0\}$.
It is clear that the matrix $({\mathcal C}^{AB})$ in is regular if and only if ${\@ifstar{\@proldf}{\@prolpf}}[E]{{\mathcal{M}}}\cap
F=\{0\}$. Thus, the properties (1) and (3) are equivalent. Moreover, proceeding as in the proof of Theorem \[regularity\], we deduce that the properties (2) and (3) (respectively, (2) and (4)) also are equivalent.
\[mechty\] [If $L$ is a Lagrangian function of mechanical type, then, using Theorem \[regular-nonl\], we deduce (as in the case of linear constraints) that the constrained system $(L, {\mathcal{M}})$ is always regular.]{}
Lagrange-d’Alembert solutions and nonholonomic bracket
------------------------------------------------------
Assume that the constrained Lagrangian system $(L, {\mathcal{M}})$ is regular. Then (3) in Theorem \[regular-nonl\] is equivalent to $({\@ifstar{\@proldf}{\@prolpf}}[E]{E})|_{\mathcal{M}}\ = {\@ifstar{\@proldf}{\@prolpf}}[E]{{\mathcal{M}}} \oplus F$. Denote by $P$ and $Q$ the complementary projectors defined by this decomposition $$P_{a}: {\@ifstar{\@proldf}{\@prolpf}}[E]{E}[a] \to {\@ifstar{\@proldf}{\@prolpf}}[E]{{\mathcal{M}}}[a], \makebox[.3cm]{} Q_{a}:
{\@ifstar{\@proldf}{\@prolpf}}[E]{E}[a] \to F_a, \; \; \mbox{ for all } a \in {\mathcal{M
|
arxiv
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.