text
stringlengths
173
4.38k
subset
stringclasses
13 values
/* * ProGuard -- shrinking, optimization, obfuscation, and preverification * of Java bytecode. * * Copyright (c) 2002-2020 Guardsquare NV * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the Free * Software Foundation; either version 2 of the License, or (at your option) * any later version. * * This program is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for * more details. * * You should have received a copy of the GNU General Public License along * with this program; if not, write to the Free Software Foundation, Inc., * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ package proguard.optimize.info; import proguard.classfile.*; import proguard.classfile.visitor.MemberVisitor; /** * This MemberVisitor marks all methods that it visits as not having any side * effects. It will make the SideEffectMethodMarker consider them as such * without further analysis. * * @see SideEffectMethodMarker * @author Eric Lafortune */ public class NoSideEffectMethodMarker implements MemberVisitor { // Implementations for MemberVisitor. public void visitAnyMember(Clazz Clazz, Member member) { // Ignore any attempts to mark fields. } public void visitProgramMethod(ProgramClass programClass, ProgramMethod programMethod) { markNoSideEffects(programMethod); } public void visitLibraryMethod(LibraryClass libraryClass, LibraryMethod libraryMethod) { markNoSideEffects(libraryMethod); } // Small utility methods. private static void markNoSideEffects(Method method) { MethodOptimizationInfo.getMethodOptimizationInfo(method).setNoSideEffects(); } public static boolean hasNoSideEffects(Method method) { return MethodOptimizationInfo.getMethodOptimizationInfo(method).hasNoSideEffects();
github
Today, for instance, ICANN is shaking up the web with a plan that's been a decade in the making: adding thousands of new top level domains beyond the original ones (.xxx, .google, .museum, and so on now join domains like .com, .edu, .gov), driving a new Internet land grab. This led to widespread criticism, including from the U.S. government, which has warned ICANN about the group's apparent conflicts of interest. Still, when the UN tried to take control over some of ICANN's jurisdiction earlier this year, the U.S. made sure that it didn't happen. With that in mind, it's pretty understandable, then, that some countries want more of a say. It's as if they're trying to get a fair chance in a soccer game, when the U.S. both owns the stadium, pays the referees' paychecks and also wrote the rulebook. This is also precisely why organizations like the UN exist. Sure, the U.S. is a big stakeholder on the web with one of the biggest Internet-connected populations in the world. But Asia still makes up over half of the world's population of Internet users, and they've never really gotten a say in how it's run. Many countries argue that the shifted balance of interest in the Internet is a strong argument for UN intervention. Another reason: some countries see incidents like the Stuxnet virus, thought to have been developed at least partially in the U.S., as evidence of the risks that come with uniltateral Internet oversight in the age of cyberwar. Meanwhile, the International Telecommunications Union (ITU), which organized WCIT-12, has been trying hard not to take sides. After the world's nations failed to ratify the treaty, ITU secretary general Hamadoun Toure said that the treaty would bring the signatories "increased transparency in international mobile roaming charges and competition," even if there's still no way to enforce the treaty. Even U.S. Ambassador Terry Kramer, the head of the U.S. delegation, noted that countries can already enact Internet regulations within their own borders, and they do. “If someone wants to, that’s their prerogative, but we’re hoping that’s not an easy task,” he said on a conference call. "History will show that the conference has achieved something extremely important," continued Toure, ever the optimist. "It has
pile-cc
Factor 4*d**3 + 70*d**2 + 352*d + 456. 2*(d + 2)*(d + 6)*(2*d + 19) Factor 2*h**5 - 14*h**4 + 16*h**3 + 32*h**2. 2*h**2*(h - 4)**2*(h + 1) Factor -5*g**3 - 7430*g**2 - 29660*g - 29640. -5*(g + 2)**2*(g + 1482) Factor 5*o**3 - 650*o**2 - 5*o + 650. 5*(o - 130)*(o - 1)*(o + 1) Find u, given that u**3 + 5*u**2 - 13*u + 7 = 0. -7, 1 Determine g so that g**2/2 + 1225*g/2 = 0. -1225, 0 Factor s**2/3 - 34*s + 867. (s - 51)**2/3 Let f**2/3 + 11*f - 3034/3 = 0. What is f? -74, 41 Let 4*c**5 - 12*c**4 - 4*c**3 + 12*c**2 = 0. Calculate c. -1, 0, 1, 3 Find z, given that -16*z**5 + 36*z**4 + 200*z**3 + 108*z**2 - 40*z = 0. -2, -1, 0, 1/4, 5 Solve -3*a**2/4 + 339*a/4 + 351 = 0 for a. -4, 117 Determine f, given that -4*f**3 + 5644*f**2 - 5632*f - 11280 = 0. -1, 2, 1410 Factor -4*t**2 + 32*t - 28. -4*(t - 7)*(t - 1) Let 3*s**3 + 86*s**2/3 = 0. What is s? -86/9, 0 Factor 4*k**5/5 + 48*k**4/5 + 188*k**3/5 + 208*k**2/5 - 192*k/5
dm_mathematics
Further to our conversation we are pleased to attach an E Mail copy of the Terms of Business in the name of the new entity. Copies together with a covering letter will be forwarded to you shortly Regards Jacqui Tokley <<201543.doc>> <<201544.doc>> ************************************************************************* The information in this internet E-mail is confidential and is intended solely for the addressee. Access, copying or re-use of information in
enron_emails
Plaintiff-Appellant, ON APPEAL FROM THE v. UNITED STATES DISTRICT COURT FOR THE EASTERN CROSSMARK, INC., DISTRICT OF MICHIGAN Defendant-Appellee. ___________________________________/ BEFORE: SUHRHEINRICH, COLE and GILMAN; Circuit Judges. SUHRHEINRICH, Circuit Judge. Plaintiff Mary Sue Gjokaj (Gjokaj) appeals the district court’s grant of summary judgment in favor of defendant CROSSMARK, Inc. (CROSSMARK). We Affirm. Gjokaj, an at-will employee, worked as an Office Manager/Human Resources Coordinator in CROSSMARK’s Detroit, Michigan office. She was terminated after attending a court hearing where a CROSSMARK employee having an affair with a co-worker sought a personal protection order against the co-worker’s wife for sending her threatening letters. Gjokaj did not inform CROSSMARK about the hearing until after it occurred. CROSSMARK terminated Gjokaj due to a loss of confidence in her ability to perform her duties as Human Resources Coordinator. Specifically, CROSSMARK maintains that it lost confidence in Gjokaj for three reasons: (1) the failure to report an affair between two employees, (2) the failure to report letters that potentially posed a safety threat to another employee and the office, and (3) attending a court hearing involving two CROSSMARK employees without informing CROSSMARK, where her attendance was perceived to be on behalf of the company. Gjokaj contends that the reasons given were pretextual and that the true reason CROSSMARK fired her was because she went to court. Gjokaj claims that (1) her termination violated a Michigan public policy protecting an employee’s right to go to court and (2) her attendance at the hearing was a protected activity under the Michigan Elliott-Larsen Civil Rights Act. M.C.L. §§ 37.2101-37.2804. We agree with the district court that neither claim provides Gjokaj with a viable cause of
freelaw
So vi is a visual on-screen version for a monitor terminal. Duh! Took me years and years to grok this simple concept. ~~~ cbm-vic-20 If teletypes seem clunky and primitive, remember this is still miles ahead of the previous computer programming interface: punch cards. TTYs allowed real- time interactive use of the computer. Even if only one line at a time. ------ jakecopp > When the Big Snow of 1978 hit, it came with plenty of warning. So I took two > cases of my favorite beer and a full box of terminal paper home, and > reminded the MIT operators to set the Multics machine for unattended reboot. > The blizzard paralyzed the Boston area for a week, but I was able to work. > The MIT Multics had only a few users logged in, and response was great. This made me smile! ------ n4r9 > The first people to have home terminals were those system programmers who > might be called at any hour to investigate or repair a problem with the > time-sharing system. These folks took home a machine that might cost as much > as half a year's salary, and had a leased phone line connected to the MIT > data PBX installed at home. They discovered that having a machine at home > was useful not only for fixing the operating system, but also for > programming and writing documents from home, and for sending electronic mail > to other users on the MIT system. Imagine being one of the first people in the world to discover that you could sit at home and tap out messages to other people sitting at home, who'd pick them up instantly (or at their leisure). ~~~ jakecopp I wonder what things are just happening now that are the equivalent; the first people to experience something that will be so commonplace and useful. ------ jakedata I fished a DEC printing terminal and 300 baud modem out of a dumpster and got it all working again in the mid 80s. Obsoletely fabulous for dialing up the Northern Lights BBS and it prepared me for other exciting developments in IT. ------ kristianp I can see the motivation for APL in these slow terminals. It's surprising how long it took for screen-based
hackernews
The major objective of my laboratory is to identify host factors that contribute to infectious and other complex diseases. The tremendous impact of infectious diseases on global health, and the association of many human pathogens with common cancers, call for multiple research strategies to elucidate the mechanisms of infection and pathogenesis. Our strategy is to search for genetic variants that differentially affect rates of infection, or the course of pathogenesis, and which thereby identify the gene containing the variant as participating in the process of infection or pathogenesis, increasing knowledge of the mechanisms
nih_exporter
[Lymph node metastases of unknown primary tumors. Sense and nonsense of a complicated search]. Malignant neoplasms are quite frequently (5% in our material) first diagnosed from their metastases. Detecting the site of the primary usually involves a time-consuming and costly work-up unpleasant for the patient. In a retrospective analysis of 60 cases of supraclavicular, cervical and axillary lymph node metastases, an attempt is made to establish guidelines for more economical and rational investigation. The most important
pubmed_abstracts
She was loaded with aspirin and ticagrelol and she underwent diagnostic angiogram on day 4 post hospital admission. At the beginning of the procedure, the left main stem was engaged, however dampened pressure was noted and a test shot showed left main stem occlusion with dissection (Fig. [1](#rjy121F1){ref-type="fig"}). ![Test shot showing left-main-stem occlusion with dissection (National-Heart-Lung and Blood-Institute class F).](rjy121f01){#rjy121F1} The patient acutely became hemodynamically unstable and suffered a cardiac arrest. Cardiopulmonary resuscitation was started and the patient was intubated. Return of spontaneous circulation (ROSC) was achieved with inotropes, vasopressors and intra-aortic balloon counterpulsation. Following ROSC, angiographic wires were passed into the coronaries. However, the operator was unable to wire the true lumen of the circumflex artery (Fig. [2](#rjy121F2){ref-type="fig"}). ![Wires left into the coronaries during transfer. LAD and intermediate: true lumen successfully wired. Cx: unable to wire true lumen.](rjy121f02){#rjy121F2} At this point, decision was made to transfer the patient to our cardiothoracic unit for emergency coronary artery bypass graft. The patient was transferred to our unit with the angiographic wires left on purpose into the coronaries. After arrival to our cardiothoracic unit, the patient was immediately taken to the operating room. Transoesaphageal echocardiography demonstrated a poor-left-ventricular-function (ejection fraction 29%) with anterior, antero-septal and antero-lateral regional wall motion abnormalities. Sternotomy was performed and cardiopulmonary bypass established with mild hypothermia (34 C°). Antegrade cardioplegia was administered and asystole was achieved. On visual inspection, the coronaries appeared extensively dissected therefore the arteriotomies were elongated proximally and distally until the true lumen could be identified. Subsequently two saphenous vein grafts were grafted onto the LAD and OM1, respectively. In order to identify the true lumen, the arteriotomy was extended past the dissection point in case of the OM1 and guided by the wire in case of the LAD. Proximal anastom
pubmed_central
import java.awt.image.BufferedImage; import java.io.File; import java.util.concurrent.TimeUnit; import javax.imageio.ImageIO; public class ImageProcessor1 implements Runnable { BufferedImage tempImg; public static int blackPixel = 0; public ImageProcessor1(final String path) throws Exception { final long start = System.nanoTime(); tempImg = ImageIO.read(new File(path)); // Use tracing, profiling and sampling to proof performance issues and fixes System.out.println("ImageIO took " + TimeUnit.NANOSECONDS.toMillis(System.nanoTime() - start) + " ms."); } @Override public void run() { long start = System.nanoTime(); final int height = tempImg.getHeight(); System.out.println("Getting height '" + height + "' took " + TimeUnit.NANOSECONDS.toMillis(System.nanoTime() - start) + " ms."); start = System.nanoTime(); final int width = tempImg.getWidth(); System.out.println("Getting width '" + width + "' took " + TimeUnit.NANOSECONDS.toMillis(System.nanoTime() - start) + " ms."); start = System.nanoTime(); // reuse variables int argb; int red; int green; int blue; for (int i = 0; i < width; i++) { for (int j = 0; j < height; j++) { // HOT LOOP. Do as little as possible. No println calls! argb = tempImg.getRGB(i, j); // inline all method calls red = argb >> 16 & 0xff; // red green = argb >> 8 & 0xff; // green blue = argb & 0xff; // blue if (red < 125 && red > 105 && green < 125 && green > 105 && blue < 125 && blue > 105) { blackPixel += 1; } } }
stackexchange
U.S. Pat. No. 3,691,584 (Drew et al.) also discloses an oscillating showerhead, but utilizes a nozzle mounted on a stem that rotates and pivots under forces places on it by water entering through radially disposed slots into a chamber around a stem. Although this showerhead is simpler than those of Brewer and Heitzman, it still includes a large number of piece requiring precise dimensions and numerous connections between pieces. Furthermore, the Drew showerhead relies upon small openings for water passageways and is subject to mineral buildup and plugging with particles. U.S. Pat. No. 5,467,927 (Lee) discloses a showerhead with an apparatus having a plurality of blades designed to produce vibration and pulsation. One blade is provided with an eccentric weight which causes vibration and an opposite blade is provided with a front flange which causes pulsation by momentarily blocking the water jets. Again, the construction of this showerhead is rather complex and its narrow passageways are subject to mineral buildup and plugging with particulates. U.S. Pat. No. 5,704,547 (Golan et al.) discloses a shower head including a housing, a turbine and a fluid exit body, such that fluid flowing through the turbine causes rotation of the turbine. The rotating (spinning) turbine can be used to cause rotation of the fluid exit body and/or a side-to-side rocking motion in a pendulum like manner. U.S. Pat. No. 4,073,438 (Meyer) discloses a sprinkler head having a housing with an inlet, a water distributing structure having a nozzle on one end and a cup shaped element at the opposite end which is operative in response to the tangential flow of water into the housing for effecting the orbital movement of the nozzle. There is also disclosed a disk that rotates in rolling contact with a surface within the housing for effecting the fractional rotation of the nozzle. The cup shaped element rotates about the longitudinal axis in response to the flow of water from the inlet. A particularly useful action for a showerhead is referred to as "wobbling." The term "wobbling" may be defined as the motion of a circular member rolling on its edge along a surface following a circular path. A common example of wobbling is what occurs when a coin is spun on its edge over a smooth surface. The coin begins spinning or rotating in a vertically upright position, but as the coin
uspto_backgrounds
On 21 February 2020, it was confirmed by the couple that they would not use the "Sussex Royal" brand name "in any territory" following their withdrawal from public life in spring 2020 and all the applications filed for trademarking the name were removed. Meanwhile, a spokesperson for the couple added that they would continue to work with their existing patronages in addition to establishing a non-profit organisation. On 27 February 2020, Bill Blair, the Canadian Minister of Public Safety and Emergency Preparedness announced that it would cease providing security for the couple on 31 March, "in keeping with their change in status." In the same announcement, it was confirmed that the Royal Canadian Mounted Police provided security for the couple on an as needed basis, since their arrival to Canada in November 2019. Reactions In Britain The initial British reactions to the 8 January announcement was of surprise, and concern whether the decision was properly thought through; the story dominated the British news cycle. The Washington Post noted several British polls that showed general support for the couple's desire to move, but with concern over the future exposure of the British exchequer to the couple (and issues of the renovation costs of Frogmore Cottage), and with unhappiness that the Queen's approval had not been sought for their announcement. British prime minister Boris Johnson distanced himself from the news, stating: "The royal family is one of the great, great assets of this country. I’m sure they are going to sort it out and I don’t think it’s necessarily helped by commentary from me." NBC News reported on analysis implying that the impact to the British economy from the loss of the couple could be material. Madame Tussauds immediately moved its waxwork figures of Harry and Meghan away from the display including the other members of the British royal family to a separate area. On 19 January, The Daily Telegraph described the final agreement between the couple and the Royal Family as "the hardest possible Megxit", a view shared by many other British news sources; and that "Royal history was made". The Guardian reported that the "outcome is, perhaps, not the half-in, half-out role the couple appear to have anticipated". On 20 January 2020, royal biographer Penny Junor also told The New York Times that "The family is trying to prevent a half-in, half-out arrangement, which doesn’t work". On 22 January, The Guardian published a cartoon
wikipedia_en
Hence, we shall prove two different statements. One is that the main body of [$\kappa$-]{}indeed reduces ${\mathcal{R}}$ to the sequence ${\mathcal{S}}$ with an optimal merge cost, up to some error that we shall evaluate. The other one is that the sequence ${\mathcal{S}}$, although it might not be a border of any merge tree induced by ${\mathcal{R}}$ for an optimal stable merge policy, is still good enough that the cost penalty incurred by using ${\mathcal{S}}$ as an intermediate state is not too high. For the sake of readability, and given a sequence of runs ${\mathcal{R}}= (R_1,\ldots,R_\rho)$, we identify below every sub-interval $X$ of $\{1,\ldots,\rho\}$ with the run obtained by merging those runs $R_k$ such that $k \in X$. Accordingly, we have $R_{\{k\}} = R_k$, and we also set $r_X = \sum_{k \in X} r_k$, and so on. Furthermore, if $X = \{x_1,\ldots,x_k\}$, we denote by ${\mathsf{mc}}_X$ the minimal merge cost of a stable merge policy that would sort the sequence $(R_{x_1},\ldots,R_{x_k})$ and merge these runs into the run $R_X$. \[def:diff:partition\] Let $\mathbf{I} = (I_1,\ldots,I_n)$ and $\mathbf{J} = (J_1,\ldots,J_m)$ be two partitions of the set $\{1,\ldots,\rho\}$ into intervals, and such that $\mathbf{J}$ refines $\mathbf{I}$, i.e., that every interval $J_j$ is contained in some interval $I_i$. For all $i \leqslant n$, we set $\mathsf{d}_i = \#\{j \colon J_j \subseteq I_i\}$, i.e., $\mathsf{d}_i$ is the number of intervals $I_i$ in which $J_j$ is subdivided. We say that $\mathbf{J}$ is a *$\mathsf{d}$-refinement* of $\mathbf{I}$ if $\mathsf{d}_i \leqslant \mathsf{d}$ for all $i \leqslant n$. Finally, we call *distortion* between $\
arxiv
; RUN: opt < %s -newgvn | llvm-dis target datalayout = "e-p:32:32:32-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:32:64-f32:32:32-f64:32:64-v64:64:64-v128:128:128-a0:0:64-f80:128:128" target triple = "i386-apple-darwin7" define i32 @main(i32 %argc, i8** %argv) nounwind { entry: br label %bb84 bb41: ; preds = %bb82 %tmp = load i8, i8* %opt.0, align 1 ; <i8> [#uses=0] %tmp1 = getelementptr i8, i8* %opt.0, i32 1 ; <i8*> [#uses=2] switch i32 0, label %bb81 [ i32 102, label %bb82 i32 110, label %bb79 i32 118, label %bb80 ] bb79: ; preds = %bb41 br label %bb82 bb80: ; preds = %bb41 ret i32 0 bb81: ; preds = %bb41 ret i32 1 bb82: ; preds = %bb84, %bb79, %bb41 %opt.0 = phi i8* [ %tmp3, %bb84 ], [ %tmp1, %bb79 ], [ %tmp1, %bb41 ] ; <i8*> [#uses=3] %tmp2 = load i8, i8* %opt.0, align 1 ; <i8> [#uses=0] br i1 false, label %bb84, label %bb41 bb84: ; preds = %bb82, %entry %tmp3 = getelementptr i8, i8* null, i32 1 ; <i8*> [#uses=1
github
She added: "These concessions do not respect the will of the people... we must not let them down". Although she is not a minister, Mrs Trevelyan is a staunch Brexiteer who said she could not support the draft deal because the negotiations have been built on "the UK trying to appease the EU". Mrs Trevelyan, who protested for fishermen with Nigel Farage on a boat in the Thames, said the deal would prevent the UK "from independently negotiating access and quota shares" for fishing. 15 November 10am Esther McVey, work and pensions secretary Image:Esther McVey reportedly had a contretemps with Mrs May The Tatton MP was the second cabinet minister to resign on Thursday - and described the draft Brexit agreement as "a risk I cannot be party to". One of the most vocal opponents of the deal, Ms McVey reportedly had a massive "bust-up" with Mrs May during the five-hour meeting in which the cabinet agreed to the draft text. 15 November 8:50am Dominic Raab, Brexit secretary Image:Dominic Raab resigned hours after cabinet agreed on the proposal Mr Raab, Theresa May's second Brexit secretary, was the first cabinet minister to resign on Thursday morning after the draft was agreed on by cabinet - saying he cannot support it in "good conscience". 15 November 7:20am Shailesh Vara, Northern Ireland minister Image:Shailesh Vara was the first Tory to resign after the agreement was passed by cabinet Mr Vara was the first member of the government to resign after the cabinet approved the draft Brexit agreement. The morning after it was rubber-stamped he said he could not support the agreement, adding: "This leaves the UK in a halfway house with no time limit on when we will finally be a sovereign nation." 10 November Jo Johnson, transport minister Image:Jo Johnson backed another referendum Proving that Brexit can divide families just as much as the rest of politics, Jo Johnson, brother of Brexit campaigner Boris Johnson, quit as a transport minister last Friday. He warned the UK was "barrelling towards an incoherent" divorce and called for another referendum on the final terms of Brexit. A Remain-supporting minister in Orpington, where a majority
pile-cc
-3 Let s be 7 - (-8)/((-2)/1). Suppose 0 = -3*c - s - 0. Let v = 1 + c. Solve 6*k - k = v for k. 0 Let x = -10 + 8. Let g be (x - (-3)/3) + 4. Solve -3*a = -2*a + g for a. -3 Let k(x) be the third derivative of -x**6/24 - x**5/60 - x**4/24 - 20*x**2. Let t be k(-1). Solve t*i = -5 - 0 for i. -1 Let u(r) = -3*r - 16. Let g be u(-8). Suppose z - 2*s = 3 + 1, 2*s = -3*z - 12. Let q be z*1 - g/(-2). Solve q*m + 12 = -m for m. -4 Suppose 0 = 2*u + u - 24. Suppose 41 = 5*w - 59. Solve u*x = 3*x - w for x. -4 Suppose 2*d = 3*n + 25 + 5, -3*d - 4*n = -11. Let x(o) = -3*o - 7*o + 2*o**2 - 2 + 0*o**2 - 3*o**2. Let i be x(-9). Solve d = 4*y - i*y for y. -3 Let f(i) = i**3 + 8*i**2 + 9*i + 16. Let u be f(-7). Solve -8 = -u*l - 4 for l. 2 Suppose 0*b = -3*r + 5*b + 18, 0 = 2*r + 3*b - 12. Let s be 1/(-3) + 14/r. Suppose s*a = f - 2, -3*f = -4*a + 2 - 12. Solve -y - 2*y = f for y. -2 Let g(n) = n**3 + 16*n**2 + 21*n + 11. Let u be g(-15). Let m = -79 - u. Solve 3*x + 0*x = m for x.
dm_mathematics
USA: Houston economy seen weathering major layoffs. By Ellen Chang 11/23/2001 Reuters English News Service (C) Reuters Limited 2001. HOUSTON, Nov 23 (Reuters) - Houston's economy, buffered by a broad and diverse tax base, should be able to weather thousands of layoffs from some of the city's major corporations, including energy powerhouse Enron Corp., economists and analysts said. Financially ailing Enron Corp.
enron_emails
Merit Systems Protection Board—Litigating Authority (5 U.S.C. § 1205) This responds to Assistant Attorney General Babcock’s May 10, 1979, request for our views concerning the scope o f litigating authority given the Merit Systems Protection Board under the Civil Service Reform Act, § 202(a), 92 Stat. 1111, 5 U .S.C . § 1205(h) (Supp. II, 1978). The relevant portion o f that subsection o f the Act provides: Except as provided in section 518 o f title 28, relating to litigation before the Supreme C ourt, attorneys designated by the Chair­ man o f the Board may appear for the Board, and represent the Board, in any civil action brought in connection with any func­ tion carried out by the Board pursuant to this title or as otherwise authorized by law. We are asked whether that subsection, despite its broad language, might properly be interpreted to allow the Board to represent itself only where the Board takes a legal position in litigation adverse to that o f another Federal agency. We have reviewed the statute and its legislative history and conclude that the provision granting litigating authority to the Board must be read more expansively, in accordance with its plain meaning. The congressional grant o f litigating authority to the Board had its origins in § 202(a) o f the Senate bill, S. 2640. The House bill, H. 11280, contained no comparable provision. The only discussion o f the litigating authority provision that we have found in the reports and floor debates on the Reform Act appears in the report o f the Senate Governmental Affairs Committee, S. Rept. No. 969, 95th Cong., 2d sess. (1978). That report states that: [t]he Board is to be represented by its own attorneys whenever the Board is a party to any proceeding in court, except that the Board is to be represented by the Solicitor General o f the United 357 States in any proceeding before the Supreme C ourt. This will in­ clude instances where the Board is involved in court proceedings under any provision o f this title, including defending disciplinary actions * * * intervening in appellate proceedings * * * or
freelaw
4\. Consider that if you don't have a free tier you won't need to subsidise your free users, so you might be able to lower prices. But also consider that the price you start with will be the highest you ever charge. Users don't like increases in prices. But you can always grandfather old price points in. 5\. Ultimately, until you launch, it's all speculation really. Just get it out there and get data to make proper decisions with. I have no tips about money collection because I'm in the UK. Actually I do: "Don't use Paypal." ~~~ jmbmxer First, thank you for the thoughtful feedback. Second, pitcher.io looks great, it inspired me to think about some potential features. I have spent the last two days doing some research and visiting lots of "paid" web applications and I came to the conclusion that maybe having a way for customers to try out the application without even having to sign up is a great way to gain traction. I am still considering a very limited "free" version but will for sure be focusing on the paid tiers even if they are relatively inexpensive upon release. Oh yea, Stripe seems to be the way to go for my application. Best of luck to you and pitcher.io! ------ lifeisstillgood 1\. Yes form a limited liability company (I think a C-corp in Delaware. You should probably pay no more than 150-250 bucks but never done this outside UK) 2\. Be tax efficient / aware. In the UK certainly you are best off drawing the majority of income as dividend. Of salary. If you have a wife strongly consider having her own half the business and draw salary too - this however more applicable of you are a contractor 3\. Sensibly estimate a portion of your revenue as chafgebacks and related support costs - start at 10% and work down as you get enough real customers. 4\. If this is B2C ask is it a good idea? It's a tough market 5\. If it is B2B I strongly suggest not doing a free plan - in fact start at something like 49.99/ mth and discount at rly and yearly. Basically you want people who have both money a d are serious enough that they
hackernews
The general hypothesis of this grant proposal is that intestinal subepithelial myofibroblasts (ISEMF) are the source of soluble factors that modulate epithelial growth, differentiation, and repair and play a pivotal role in mucosal immunophysiology and cancer. Located at the interface between the epithelium and lamina propria, ISEMF modulate information transfer between these tissue compartments. Through elaboration of basement membrane components, prostaglandins (PGs). and growth factors, ISEMF modulate processes of epithelial cell
nih_exporter
Biochemically purified and F(ab')2 immunoglobulin fractions were prepared from several antisera, including a human serum, which contained anti-zona pellucida activity. Anti-zona activity was monitored either by the formation of the antibody produced precipitation layer on the zona following antiserum treatment and/or by the indirect fluorescent antibody method. No changes in anti-zona activity were observed when the purified and the digested immunoglobulin preparations from each antiserum were compared to their whole serum counterparts.
pubmed_abstracts
Simple reaction simulation -------------------------- It is difficult to distinguish the SR strategy from true entrainment because the SR simulated birds maintained a consistent phase relationship with the stimuli over the course of the trials ([Fig. 3](#f3){ref-type="fig"}). However, the phase-matching rates of the real and simulated birds differed under the 450--1,200-ms-IOI conditions, although the pecks could phase-match with the stimulus onset under the 1,500-ms- and 1,800-ms-IOI conditions ([Table 1](#t1){ref-type="table"}). As the IOI elongated, the hit period became longer and both stimulus onset and ERT were located in a relatively narrow range. Therefore, the circular distribution logically concentrated on the period including both ERT and stimulus onset. Nevertheless, the responses of one real bird remained phase-matched with stimulus onset but not with ERT under the 1,500-ms-IOI condition, showing that the rate at which real and simulated birds phase-matched with ERT differed. Moreover, NMA was extremely rare in the simulated birds, and the simulated subjects had far fewer failures than did the real birds (*P* \< 0.0125). Taken together, none of the four possible models provided a sufficient explanation for the real birds\' behaviour. The budgerigars\' pecks maintained a consistent phase relationship with the stimuli based on anticipation, and this pecking pattern was not the outcome of simple reactions. Consequently, the original idea, that the budgerigars anticipated the stimuli and entrained to the metronome, survived. Tapping to auditory stimuli --------------------------- In the main part of our study, we presented the budgerigars with auditory and visual cues simultaneously to facilitate the association between the LED key and the reward as per the operant conditioning protocol[@b10][@b11][@b12]. However, it is important to test entrainment to auditory stimuli alone because this is the modality of interest in the vocal learning and rhythmic synchronization hypothesis[@b5]. To this end, isochronous tapping to auditory stimuli alone was tested in three female budgerigars. Tapping was measured as they were alternately exposed to IOIs of 600 ms and 1,500 ms. The experiment was repeated twice (see Methods section). The birds quickly learned to perform the task without special training. Their pecks were phase matched with
pubmed_central
Q: FFMPEG: Extracting 20 images from a video of variable length I've browsed the internet for this very intensively, but I didn't find what I needed, only variations of it which are not quite the thing I want to use. I've got several videos in different lengths and I want to extract 20 images out of every video from start to the end, to show the broadest impression of the video. So one video is 16m 47s long => 1007s in total => I have to make one snapshot of the video every 50 seconds. So I figured using the -r switch of ffmpeg with the value of 0.019860973 (eq 20/1007) but ffmpeg tells me that the framerate is too small for it... The only way I figured out to do it would be to write a script which calls ffmpeg with a manipulated -ss switch and using -vframes 1 but this is quite slow and a little bit off for me since ffmpegs numerates the images itself... Any suggestions or directions? Thanks, Vapire A: I know I'm a bit late to the party, but I figured this might help: For everyone having the issue where ffmpeg is generating an image for every single frame, here's how I solved it (using blahdiblah's answer): First, I grabbed the total number of frames in the video: ffprobe -show_streams <input_file> | grep "^nb_frames" | cut -d '=' -f 2 Then I tried using select to grab the frames: ffmpeg -i <input_file> -vf "select='not(mod(n,100))'" <output_file> But, no matter what the mod(n,100) was set to, ffmpeg was spitting out way too many frames. I had to add -vsync 0 to correct it, so my final command looked like this: ffmpeg -i <input_file> -vsync 0 -vf "select='not(mod(n,100))'" <output_file> (where 100 is the frame-frequency you'd like to use, for example, every 100th frame) Hope that saves someone a little trouble! A: I was trying to find the answer to this
stackexchange
2. Description of the Related Art A conventional printing apparatus such as a digital copying machine, a laser beam printer (LBP), a facsimile apparatus is connected to a network and printout is executed by sending documents or images from a personal computer connected to the network to the printing apparatus. The printing apparatus can be set so that when it is not manipulated and operated within a predetermined time, for example, on the operation panel, power supply is stopped to a fixing device or the like which has high power supply, and the printing apparatus transits to a sleep state (power saving mode) which is configured to suppress power consumption for the overall apparatus. In a conventional print output system, since the conditions for shifting to power saving mode vary depending on each apparatus, comprehensive power saving management of a printing apparatus connected to a specified network has been difficult. For example, it is assumed that there are two printers connected to a plurality of personal computers, one printer is operating and the other printer is in power saving mode. When a print output signal is output from another personal computer, normally, the printer in power saving mode is operated. The image processing apparatus proposed in Japanese Patent Application Laid-Open No. 2001-197297 determines a sleep condition for a printer, and when print output is not urgent, waits for completion of the current print job (JOB) performed by the currently operating printer. Thereafter the plurality of printing apparatuses connected to the network is controlled to execute new printing jobs. Although the conventional technique takes the state of the printing apparatus into account, the characteristics of the printing apparatus are not considered. Thus when a plurality of printing apparatuses with mutually different characteristics are present on a network, there is the situation that overall power consumption actually increases. For example, currently, a fixing device constituting a digital copying machine employs the fixing method illustrated in FIG. 3A or the fixing method illustrated in FIG. 3B as described hereafter. The fixing method in FIG. 3A is of a roller type and the fixing method in FIG. 3B is of an on-demand type. FIG. 13 illustrates the characteristics of the fixing device and the relationship between temperature and printing for each fixing method. FIG. 13A illustrates the characteristics of an on-demand type and a roller type. Generally, a roller type has high power consumption and a high printing speed. An on-demand type has low power consumption and a low printing speed. FIG. 13B conceptually illustrates the relationship between printing and the temperature of a fixing device in a digital copying
uspto_backgrounds
Early life Stanislav Messing was born into a Jewish family, the child of a musician and a midwife (accoucheuse). Due to financial difficulties, he only finished four classes in grammar school, after which he studied to become a locksmith. He eventually began working in a printing house. Career In 1908, he joined the Social Democratic Party of Poland, where he met Felix Dzerzhinsky and Józef Unszlicht, who had given him patronage after the Great Revolution of 1917. He was arrested several times and imprisoned in the Warsaw Fortress. In the same year, he was sentenced to administrative deportation to Belgium, where he earned his livelihood as an unskilled laborer. In 1911, Messing returned to his homeland and continued to participate in the activities of the Social Democratic Party of Poland. He was arrested again and then released. In 1913, he was drafted into the army and served in Turkestan as a common soldier of the 17th Turkestan Regiment, which had been based at the Caucasian Front since 1914. In 1917, he was elected a member of the regimental soldiers' committee. Petrograd and Moscow In the spring of 1917, during the Russian revolution, Messing was in Moscow and participated in street unrest. Immediately after the revolution he was appointed secretary of the Sokolniki Executive Committee and chairman of the Sokolniki District Cheka. Beginning in December 1918, Messing was the head of the secret operations department of the Moscow Cheek. In July 1920, he was approved a member of the VChK Council. On January 3, 1921, he was appointed chairman of the Moscow Cheka. and in November of that year become chairman of Leningrad, then still called Petrograd Petrograd In November 1921, Felix Dzerzhinsky, who directed the Red Terror during post-revolution Russia, appointed Messing as chairman of the Petrograd Cheka. He held this rank from November 3, 1921, to February 6, 1922. Petrograd was a capital of Russia until 1922; in 1922, Moscow became the capital again. Moscow In 1929, implicated in Bukharin-Kamenev affair and the poor health conditions of Mezhinsky, Trilisser lost out against Messing and Messing was appointed as second deputy chairman of OGPU. References Category:1890 births Category:1937
wikipedia_en
Let $\{E_i\}$ be a MIC on $d$-dimensional Hilbert space, and assume that this MIC is equal-weight, that is, $E_i = (1/d) \rho_i$ for some rank-1 projection operators $\{\rho_i\}$. Consider the quantity $$F := \sum_{ij} \left(\delta_{ij} - \tr E_i E_j\right)^2,$$ which is the squared Frobenius distance between the MIC’s Gram matrix and the identity. If the MIC could be an orthonormal basis of the operator space, then the distance $F$ would vanish. We can split $F$ into two sums, as follows: $$F = \sum_i \left(1 - \tr E_i^2\right)^2 + \sum_{i \neq j} \left(\tr E_i E_j\right)^2.$$ The equal-weight and rank-1 conditions let us simplify the first sum, yielding $$F = d^2 \left(1 - \frac{1}{d^2}\right)^2 + \sum_{i \neq j} \left(\tr E_i E_j\right)^2.$$ Applying the Cauchy–Schwarz inequality to the remaining sum, we get that $$F \geq d^2 \left(1 - \frac{1}{d^2}\right)^2 + \frac{1}{d^4 - d^2} \left(\sum_{i \neq j} \tr E_i E_j\right)^2,$$ with equality iff all the terms in the sum are equal, i.e., $\tr E_i E_j$ is constant for all $i \neq j$. Because the $\{E_i\}$ must sum to the identity, $$\sum_{i \neq j} \tr E_i E_j = \sum_i \tr E_i (I - E_i) = d - 1.$$ Consequently, $$F \geq \left(d-\frac{1}{d}\right)^2 + \frac{d-1}{d^4 - d^2},$$ with equality iff the MIC is symmetric, i.e., $\tr E_i E_j$ is constant for all $i \neq j$. The value of this constant is fixed by dividing its sum evenly across all contributions: $$\tr E
arxiv
// We need to expose() any then()ed promises recursively var qThen = promise.then; promise.then = function () { return expose(qThen.apply(this, arguments)); }; } return promise; } // Wrap functions that return a promise angular.forEach([ 'when', 'all', 'reject'], function (name) { var qFunc = $delegate[name]; $delegate[name] = function () { return expose(qFunc.apply(this, arguments)); }; }); // Wrap defer() var qDefer = $delegate.defer; $delegate.defer = function () { var deferred = qDefer(); expose(deferred.promise); return deferred; } return $delegate; }); }); function testablePromise(promise) { if (!promise || !promise.then) throw new Error('Expected a promise, but got ' + jasmine.pp(promise) + '.'); if (!isDefined(promise.$$resolved)) throw new Error('Promise has not been augmented by ngMock'); return promise; } function resolvedPromise(promise) { var result = testablePromise(promise).$$resolved; if (!result) throw new Error('Promise is not resolved yet'); return result; } function resolvedValue(promise) { var result = resolvedPromise(promise); if (!result.success) throw result.error; return result.value; } function resolvedError(promise) { var result = resolvedPromise(promise); if (result.success) throw new Error('Promise was expected to fail but returned ' + jasmin.pp(res.value) + '.'); return result.error; } beforeEach(function () { this.addMatchers({ toBeResolved: function() { return !!testablePromise(this.actual).$$resolved; } }); }); // Misc test utils function caught(fn) { try { fn();
github
FakeGifts A store selling replica Chanel, Gucci, Louis Vuitton and Tiffany once appeared on this domain. The site owners were ordered to transfer the domain name as a result of a civil contempt order to stop the sale of replicas. THE UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA CASE NO.: 09-20810-CIV-HUCK/O'SULLIVAN IT IS HEREBY ORDERED that Plaintiffs’ Motion for Final Default Judgment is GRANTED, and judgment is entered in favor of Plaintiffs, Chanel, Inc., a New York corporation, with its principal place of business in the United States located at Nine West 57th Street, New York, New York 10019; Gucci America, Inc., with its principal place of business in the United States located at 685 Fifth Avenue, New York, New York 10022; Louis Vuitton, S.A., a foreign business entity with its principal place of business at 22, Avenue Montaigne 75008 PARIS; and Tiffany (NJ) LLC, with its principal place of business in the United States located at 15 Sylvan Way, Parsippany, New Jersey 07054; and against Defendant Jennifer XXXXXX; IT IS FURTHER ORDERED AND ADJUDGED: 1. In order to give practical effect to the Permanent Injunction, the domain names www.GlobalReplica.com, www.FancyFakes.com, www.BlueFakes.com, www.JennyBags.com, www.AllFakes.com, www.FakeGifts.net are hereby ordered to be immediately transferred by the Defendant, her assignees and/or successors in interest or title, and the Registrar to Plaintiffs’ control. To the extent the current Registrar does not facilitate the transfer of the domain name to Plaintiffs’ control within ten (10) days of receipt of this judgment, the United States based Registry shall, within thirty (30) days of receipt of this judgment, transfer the domain names to a United States based Registrar of Plaintiffs’ choosing, and that Registrar shall transfer the domain name to Plaintiffs; and 2. Upon Plaintiffs’ request, the top level domain (TLD) Registry for the Subject Domain Names, Verisign, Inc., within thirty (30) days of receipt of this Order shall place the Subject Domain Names on
pile-cc
Solve 15*j = 1890 - 1800 for j. 6 Solve 104 = 30*b + 22*b for b. 2 Solve 0 = -34*o + 103*o + 207 for o. -3 Solve 15 - 3 = 4*k for k. 3 Solve 336*b - 340*b - 40 = 0 for b. -10 Solve 23*b - 56 = 36 for b. 4 Solve 2*f + 2*f + 8 = 0 for f. -2 Solve 261*f = 256*f - 15 for f. -3 Solve 0*s = -15*s - 45 for s. -3 Solve 60*b - 57*b = 0 for b. 0 Solve 81*v - 283 - 122 = 0 for v. 5 Solve 108*q + 35 = 113*q for q. 7 Solve 86 - 53 = -3*n for n. -11 Solve 127*k = 120*k - 7 for k. -1 Solve 196 = 44*r - 244 for r. 10 Solve 69*t + 66 = 58*t for t. -6 Solve 15*n - 64 = -17*n for n. 2 Solve 0 = 3*p - 8 + 20 for p. -4 Solve -710*s + 692*s = -108 for s. 6 Solve 139*x - 131*x = -40 for x. -5 Solve 114*q - 112*q - 2 = 0 for q. 1 Solve 221*c - 228*c = -28 for c. 4 Solve 150 - 155 = 5*g for g. -1 Solve 0 = 14*o - 8 - 20 for o. 2 Solve -73*l + 75*l = -4 for l. -2 Solve 16*y = 44 - 12 for y. 2 Solve 145*l = 151*l - 18 for l. 3 Solve 6*m - 50 = -14 for m. 6 Solve -347 - 129 = 68*i for i. -7 Solve 59 = -28*c + 171 for c. 4 Solve w = -45 + 42 for w. -3 Solve 118 =
dm_mathematics
------------------------------ Auction Information ------------------------------ Auction Site: eBay Item URL: http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1013259638&ed=1002300969 Auction Title: item# 1013259638 Item Number: 1013259638 Close Date: October 05, 2001 ------------------------------ Jason Wolfe's CONFIRMED Address ------------------------------
enron_emails
Giving the utmost consideration to all of the state's evidence, including the evidence which the state contends corroborates the story of the prosecuting witness, we feel the evidence of the rape was weak. When we speak of corroboration here we do not mean the statutory corroboration which will be dealt with in the next division. We think it important to point to the weaknesses in the evidence of the rape for here, as in most all rape cases, the central question is the sufficiency of other testimony that tends to connect defendant with the crime. With clear and convincing evidence that the crime of rape was perpetrated by someone at a certain fixed time, an accused's connection with the crime can be more easily established. Here there is doubt as to the day the rape occurred. The indictment names June 8th, or Friday, and Betty's *451 testimony leaves it as occurring that day or the next day. Mrs. Lee says she asked Betty if defendant had tried to "make her" before Saturday and she said "that he hadn't." I. So the state is left with the burden of introducing evidence tending to establish defendant's connection with a rape that occurred on Friday or Saturday. Section 782.4, Code, 1954, I.C.A., provides, stating it affirmatively, that the story of the prosecuting witness must be "corroborated by other evidence tending to connect the defendant with the commission of the offense." The other evidence introduced by the state was the testimony of persons who saw Betty and defendant go in or come out of the trailer. Thirteen year old Marla Wilson who lived next door to the Keeler home said she saw Betty and Mr. Seales come out of the trailer. She "believed" the date was Saturday, June 9th in the morning. She did not see them go in and she did not remember who came out first. Marla's eighteen year old brother, Ronald Wilson, testified he remembered seeing Betty Lee and defendant come out of the trailer. He did not remember who came out first and he could not recall whether it was morning or afternoon, the day of the week or month, but he remembered it was during the summer vacation. Seventeen year old Bob Keeler couldn't remember whether Rose Simmons worked for Mr. Seales before Betty Lee but he remembered both of them and he recalled seeing Betty Lee and defendant go into the trailer house along about noon sometime on a day the previous summer. He said there were curtains over the windows and
freelaw
~~~ blueprint Well, it's not strictly a bad idea to name it by some unique name if it turns out to be the case that another, better, more rigorous theory or set of observations is developed about the cause and range/extent of morphologies associated with the torque that makes the concept of Yakolevian Torque obsolete. ~~~ knolax If the concept of Yakolevian Torque becomes obselete we'll just stop referring to it regardless of how it's named. If it only needs to be updated in a way that obseletes the older descriptional name we can just give it a newer more apt descriptional name. ~~~ blueprint Kind of like Newtonian mechanics? ~~~ knolax You mean Classical Mechanics? Plus your example doesn't make sense because the term "Newtonian Mechanics" was likely coined only after Relativistic Mechanics were discovered[0][1], Newton himself referred to it as "Natural Philosophy". In addition "Newtonian Mechanics" isn't even the preferred name, Wikipedia refers to it as "Classical Mechanics"[2] while the Webster's definition of "Newtonian Mechanics"[3] is just the words "Classical Mechanics", which themselves have a much longer entry[4]. The fact that we do not in fact refer to "Classical Mechanics" as "Philosophiae Naturalis" actually supports my point: as our understanding of Physics improved we renamed the field, with older concepts/terms falling out of use and being renamed when they are reused. [0] [https://books.google.com/ngrams/graph?content=Newtonian+Mech...](https://books.google.com/ngrams/graph?content=Newtonian+Mechanics&year_start=1800&year_end=2000&corpus=15&smoothing=3&share=&direct_url=t1%3B%2CNewtonian%20Mechanics%3B%2Cc0#t1%3B%2CNewtonian%20Mechanics%3B%2Cc0) [1] [https://books.google.com/ngrams/graph?content=Natural+Philos...](https://books.google.com/
hackernews
Activation of the innate immune system upon pathogen recognition results in a rapid and definitive microbicidal response to invading microorganisms that is fine-tuned to prevent deleterious deficiencies or excesses in the response. Increasing evidence indicates that immune responses are rapidly coordinated by neural circuits that operate reflexively. However, given the complexity of the nervous and immune systems of mammals, the precise mechanisms by which the two systems influence each other remain understudied. This proposal describes experiments designed to elucidate the mechanism by which the nervous
nih_exporter
Twitch contraction properties of plantar flexor muscles in pre- and post-pubertal boys and men. This study compared electrically evoked twitch contraction characteristics of the plantar flexor muscles in pre-pubertal (11-year-old) and post-pubertal (16-year old) boys, and young (19- to 23-year-old) men. The posterior tibial nerve was stimulated by supramaximal square-wave pulses of 1 ms duration
pubmed_abstracts
We designed a screen to identify genes involved in phospholipid anabolism and catabolism that might have an impact on ageing. For this purpose, we performed chronological ageing experiments with a subset of yeast strains deleted for non-essential genes known to be involved in phospholipid metabolism. At day 3 of the chronological ageing experiment, we measured the levels of reactive oxygen species (ROS) by assessing the ROS-driven oxidation of non-fluorescent dihydroethidium (DHE) to fluorescent ethidium by cytofluorometry. This screening procedure led to the identification of three genes whose deletion caused an ageing-dependent raise in ROS generation ([Figure 1a](#fig1){ref-type="fig"}): *isc1*Δ, *psd1*Δ and *psd2*Δ. *ISC1* encodes an inositol phosphosphingolipid phospholipase, which produces ceramide. Interestingly, deletion of *ISC1* has been previously reported to decrease chronological lifespan,^[@bib30]^ thus validating our screen results. *PSD1* and *PSD2* encode phosphatidylserine decarboxylases, which similarly convert PS to PE, and are located in distinct cellular organelles (see Introduction). As these two enzymes have not been associated with yeast aging, we decided to focus our study on these enzymes and their products. We confirmed the premature ageing phenotype of the *PSD1* and *PSD2* knock outs by clonogenic survival plating ([Figure 1b](#fig1){ref-type="fig"}) and assessed the PE- and PC-abundance at day 3 of ageing by HPLC-assisted analyses of lipid extracts ([Figure 1c](#fig1){ref-type="fig"}). *PSD1* deletion had a more pronounced inhibitor effect on both PE synthesis and yeast ageing. This is consistent with a previous report underscoring that, at least in standard culture conditions, Psd1 is the predominant phosphatidylserine decarboxylase, the abrogation of which disturbs homeostasis of PE and a number of phospholipid species including PS and PI which can be overcome by the administration of ethanolamine.^[@bib31]^ As previous works have also shown that *PSD1* deletion has a strong impact on mitochondrial function,^[@bib32],\ [@bib33]^ we examined to which extent the reduction in survival upon chronological ageing might be a consequence of general mitochondrial dysfunction or specific to the deletion of PSD activity. We thus generated *psd1
pubmed_central
I'm running with VS-2013 Ultimate. While executing my code, I'm getting this error message box: An exception has been encountered. This may be caused by an extension When entering the log file (the path is mentioned on the message), I'm get this exception: <entry> <record>905</record> <time>2014/08/22 15:46:25.494</time> <type>Error</type> <source>Editor or Editor Extension</source> <description> System.NullReferenceException: Object reference not set to an instance of an object.&#x000D;&#x000A; at Microsoft.VisualStudio.Debugger.Parallel.UI.ThreadMarkerGenerator.LocationMatchesTagger(DocumentContext location, MarkerTagger tagger)&#x000D;&#x000A; at Microsoft.VisualStudio.Debugger.Parallel.UI.ThreadMarkerGenerator.&lt;&gt;c__DisplayClass1.&lt;GetMarkersForTagger&gt;b__0(ThreadMarker marker)&#x000D;&#x000A; at System.Linq.Enumerable.WhereListIterator`1.MoveNext()&#x000D;&#x000A; at Microsoft.VisualStudio.Debugger.Parallel.Extension.MarkerTagger.&lt;GenerateTagList&gt;d__a.MoveNext()&#x000D;&#x000A; at System.Linq.Buffer`1..ctor(IEnumerable`1 source)&#x000D;&#x000A; at System.Linq.Enumerable.ToArray[TSource](IEnumerable`1 source)&#x000D;&#x000A; at Microsoft.VisualStudio.Debugger.Parallel.Extension.MarkerTagger..ctor(ITextBuffer buffer, ITextDocument document)&#x000D;&#x000A; at Microsoft.VisualStudio.Debugger.Parallel.Extension.MarkerTaggerProvider.CreateTagger[T](ITextBuffer buffer)&#x000D;&#x000A; at Microsoft.VisualStudio.Text.Tagging.Implementation.TagAggregator`1.GatherTaggers(ITextBuffer textBuffer) </description> </entry> I
stackexchange
PG in the figure is a pressure gauge to measure a pressure in the filtering vessel 8. When the filtering apparatus is in normal liquid filtering operation, only the valves V1 and V2 are opened with all the other open/close valves closed out of a plural number of open/close valves. Under the condition, the pump P is put in operation. The nonfiltered liquid L to be filtered is sucked into the pump P through the valve V1 and is discharged from the pump P to flow into the nonfiltered liquid chamber 83 through the check valve V7. The nonfiltered liquid L in the nonfiltered liquid chamber 83 flows into the filtered liquid chamber 84 under a discharging pressure of the pump through the precoat filtering layer 82 formed beforehand with the filter aid. At this time, the nonfiltered liquid is filtered. The filtered liquid Lxe2x80x2 flows to a predetermined location (not shown) out of the filtered liquid outlet port 841 of the filtered liquid chamber 84 and through the open/close valve V2. The liquid in the filtering vessel 8 starts to flow back to the pump P when filtering operation is ended with stoppage of the pump P or when the pump is stopped due to an electric power outage. The flow, however, is stopped by the check valve V7, so that the liquid in the filtering vessel 8 stays in the vessel. The precoat filtering layer 82 is formed, for example, in such a manner as follows: The open/close valve V2 of the filtered liquid outlet line 2, the open/close valve V3 of the bypass line 3 for precoating and the sixth open/close valve V6 of the line 5 are closed, when the filtering vessel 8 is free from any liquid inside as immediately after installation of the filtering apparatus, or is cleaned and free from any liquid. On the other hand, the open/close valve V1 of the nonfiltered liquid introduction line 1 and the fifth open/close valve V5 of the line 5 are opened. Under this condition, the pump P is started, when prime water W is introduced into the filter aid addition tank t and the valve V6 is opened. The pump P, while sucking the prime water W, begins to suck the nonfiltered liquid L. The nonfiltered liquid is thus introduced into the filtering vessel 8 this way, letting out air in the filtering vessel 8 through the precoating liquid outlet port 85 and also from the pipe 51. The filtering vessel is filled with the liquid in
uspto_backgrounds
Pro Evolution Soccer 2016 Pro Evolution Soccer 2016 (abbreviated as PES 2016, marketed as Winning Eleven 2016 in Japan) is a football simulation game developed by PES Productions and published by Konami for Microsoft Windows, PlayStation 3, PlayStation 4, Xbox 360, and Xbox One. It is the fifteenth edition of the Pro Evolution Soccer series and marks PES Productions' 20th year of producing football games. The cover of the game features Neymar Jr (seen wearing his Brazil national team kit). The name of the game has been changed from "World Soccer: Winning Eleven" to "Pro Evolution Soccer" in Asia, except Japan where it is titled "Winning Eleven". PES 2016 was succeeded by Pro Evolution Soccer 2017. Leagues and cups At E3 2015, it was announced that Konami had extended their license for the UEFA Champions League, the UEFA Europa League and the UEFA Super Cup until 2018. At Gamescom 2015, it was announced that Konami had acquired the exclusive license for the upcoming UEFA Euro 2016; however, it was not going to be a part of the game from the beginning, and was eventually released in an update on 24 March 2016. Pro Evolution Soccer 2016 includes Ligue 1, La Liga, AFC Champions League, UEFA Champions League, UEFA Europa League, UEFA Super Cup, Copa Libertadores, Copa Sudamericana (2014 and 2015 seasons), Recopa Sudamericana, an unlicensed Serie A with 19 licensed teams, an unlicensed Premier League, with only Manchester United licensed, 3 teams from Bundesliga (Bayern Munich, Wolfsburg and Borussia Mönchengladbach) but still not a stand-in for the league, an unlicensed Football League Championship, an unlicensed Serie B, an unlicensed Portuguese League (only Benfica, Sporting CP and Porto were licensed), Ligue 2, Liga Adelante, an unlicensed Brazilian League, an unlicensed Chilean League (with only the teams competing in Copa Libertadores and Copa Sudamericana licensed), Eredivisie, an unlicensed Argentine League (with only the teams competing in Copa Libertadores and Copa Sudamericana licensed) and 4 teams from Brazilian Second Division (Vitória, Bahia, Botafogo and Criciúma). Demo Teams The PES 2016 Dem
wikipedia_en
To select weak CSS sources from the FIRST catalogue we made the following steps: 1. From the source list based on Green Bank (GB) surveys at 21 and 6 cm @wb92 we selected those sources lying within the then current limits of the FIRST survey when FIRST covered the area of declination $28\degr$ — $42\degr$, having steep spectra ($\alpha >0.5$) and being stronger than 150 mJy at 6 cm. (This flux density limit was chosen in order to produce a sample of manageable size.) The above declination limits indicate that the overlap between our sample and the B3-VLA survey based sample of F2001 (their limits are $37\degr 15\arcmin$ — $47\degr 37\arcmin$) is not large. 2. We identified FIRST sources with those GB survey sources. We found, quite expectedly, that thanks to a dramatic difference in the resolution, the majority of sources appearing as single in the GB survey turn out to be double (or multiple) on FIRST maps and so they are represented either as compact pairs or clusters of pointlike sources in the FIRST catalogue. 3. We rejected all such cases i.e. we selected only those sources that are single entities in the FIRST catalogue i.e. more compact than the FIRST beam (54) and surrounded by an empty field. We adopted 1 arcmin as a radius of that field. Such a procedure allows us to make sure that we deal with isolated objects and not parts of larger objects. 4. We, again, checked whether our targets fulfill the spectrum steepness criterion: instead of GB-survey flux densities at 21 cm we used more accurate values from FIRST. We rejected candidates with flat spectra ($\alpha \leq 0.5$). 5. We found that all already known CSS sources lying within our R.A. and declination limits have been correctly selected so far. Obviously we rejected them. 6. We rejected the Gigahertz Peaked Spectrum (GPS) sources because — in our opinion — they constitute a separate class. The main reason for this is that GPSs are an order of magnitude more compact than CSSs and their spectra have a different shape. Our research was focused on “true” CSSs and not GPSs[^2] To this end we identified our preliminary candidates with objects listed in 365 MHz Texas catalogue [@doug
arxiv
Comment=Configure window movement options Comment[az]=Pəncərə yerdəyişdirilməsinin tənzimlənməsi Comment[ca]=Configura les opcions de moviment de les finestres Comment[cs]=Nastavit volby pohybu oken Comment[da]=Indstil flytning af vinduer Comment[en_GB]=Configure window movement options Comment[es]=Configurar las opciones del movimiento de las ventanas Comment[et]=Akende liigutamise seadistamine Comment[eu]=Konfiguratu leiho mugimenduaren aukerak Comment[fi]=Ikkunoiden siirtämisen asetukset Comment[fr]=Configurer les options de déplacement des fenêtres Comment[gl]=Configurar o movemento das xanelas Comment[ia]=Configura optiones de movimento de fenestra Comment[id]=Konfigurasikan opsi pemindahan window Comment[it]=Configura opzioni di spostamento delle finestre Comment[ko]=창 이동 옵션 설정 Comment[lt]=Konfigūruoti langų perkėlimo parinktis Comment[nl]=Opties voor vensterverplaatsing configureren Comment[nn]=Set opp vindaugsflytting Comment[pl]=Ustawienia opcji przesuwania okien Comment[pt]=Configurar as opções de movimentação das janelas Comment[pt_BR]=Configure as opções de movimento da janela Comment[ru]=Настройка поведения при перемещении окон Comment[sk]=Nastavenie spôsobu presunu okien Comment[sl]=Nastavi možnosti premikanja okna Comment[sv]=Anpassa alternativ för fönsterförflyttning Comment[uk]=Налаштовування параметрів пересування вікон Comment[x-test]=xxConfigure window movement optionsxx Comment[zh_CN
github
In her absence, he also fears for his own sanity. He decides to fix their bedroom fan—it only worked on the highest setting and was missing the face of its cage—after hearing a story about a man sticking his penis into a fan and letting the blade chop it up. The reader is led to wonder, Was Bud really worried about sticking his own penis into a fan? Doesn’t matter—he fixed the fan so it’s a non-issue, but these are the darker moments that bring a nice depth to the writing and make the reader wonder more about the inner workings of Smith’s brain based on the surface-level actions we’re presented with. The book is filled with drawings from Rae Buleri, Bud Smith’s wife, and presumably the focus of his writing in Dust Bunny City. This partnership again reinforces the bond they have as a couple. The drawings reminded me of Shel Silverstein which added a level of whimsy to the poems I don’t think would have been apparent without them. The drawings levity also connect the poems to the relationship enough to avoid a self-deprecating tone that could have potentially made the writing collapse upon itself. In the end, this is a book about optimizing life with your perfect partner. Though it’s not a codependent relationship, because when his wife gets the job opportunity, he tells her to go without hesitation, and when he gets called into work, she doesn’t try to stop him. They are both individuals that know what the other person needs and will step aside if they aren’t able to provide that for them—companionship at its finest. Smith knows himself and is comfortable enough laying out his relationship for us all to see. One of the last poems, “Reunion Featuring Tulip Tree,” he and his wife look across the street and remark about how a man “is looking up at the sky / and singing himself a song at that sky / he seems to be doing fine / he is out of his mind, all of his problems / are invisible in the daylight.” Bud Smith has shown us his own daylight problems in Dust Bunny City and, by extension, made me want to show mine too. Joseph Edwin Haeger is the author of Learn to Swim (University of Hell Press, 2015). His writing has appeared in The Pacific NW Inlander, RiverLit, Hippocampus Magazine, and others. He lives in Spokane, Washington
pile-cc
True Let i(h) = 2*h**2 - 4. Is i(-9) composite? True Let m(c) = 253*c - 7. Is m(6) composite? False Let b be (-1 - 5)/(54/(-6228)). Let a = b + -475. Is a composite? True Let k = 1028 + -357. Is k composite? True Let w = 3 + -1. Suppose 0 = -w*m + 3*b + 583, -m + 4*b = -289 - 0. Is m a composite number? False Let c(q) = q - 3. Let l be c(-3). Let v = l - -8. Suppose -v*n - 110 = -4*n. Is n a composite number? True Let i(v) = v**2 - 6*v + 4. Let o be i(5). Let t be -1 - 1/o - -2. Suppose -3*x = -t*l - 11, -4*x = -5*x + 5. Is l composite? False Let u(z) = 214*z**2 - 4*z - 3. Let r be u(-3). Suppose -2*g - g = -r. Suppose -2*j + g = 5*s, -2*s + 0*s + 244 = -2*j. Is s prime? True Let w(v) = 8*v**3 + v**2 - v + 1. Let u be w(2). Let g be (0 + 2)/1 + 32. Let h = u - g. Is h a composite number? True Let s = 6 - 1. Let t(k) = 24*k + 3. Let r be t(s). Suppose 2*x - 4*w = 42, -4*x - 29 = 2*w - r. Is x a prime number? True Suppose -17396 + 5558 = -6*o. Is o composite? False Let z(r) = r**3 + r - 2. Let m be z(2). Let y be 39/12 - 2/m. Suppose 0 = o + y*l - 4*l - 56, 5*l = -5. Is o
dm_mathematics
I am in need of several more contract copies. Could you please forward me contract: 96037261 96049419 96001003 96045391 Also, you had mentioned earlier that GISB contracts should not have been used on some of the contracts I earlier received. Are the appropriate contracts going to be sent out, or are we stuck with the ones in place. Call with questions.
enron_emails
STATE OF OHIO, : Plaintiff-Appellee, : CASE NOS. CA2015-09-018 CA2015-09-019 : CA2015-09-020 - vs - : DECISION 3/14/2016 JAMES E. GRUBB, JR., : Defendant-Appellant. : CRIMINAL APPEAL FROM PREBLE COUNTY COURT OF COMMON PLEAS Case No. 14CR011569 Martin P. Votel, Preble County Prosecuting Attorney, Preble County Courthouse, 101 East Main Street, Eaton, Ohio 45320, for plaintiff-appellee Matthew J. Barbato, 2625 Commons Boulevard, Suite A, Beavercreek, Ohio 45431, for defendant-appellant Per Curiam. {¶ 1} This cause came on to be considered upon a notice of appeal, the transcript of the docket and journal entries, the transcript of proceedings and original papers from the Preble County Court of Common Pleas, and upon the brief filed by appellant's counsel. {¶ 2} Counsel for defendant-appellant, James E. Grubb, has filed a brief with this court pursuant to Anders v. California, 386 U.S. 738, 87 S.Ct. 1396 (1967), which (1) indicates that a careful review of the record from the proceedings below fails to disclose any Preble CA2015-09-018 CA2015-09-019 CA2015-09-020 errors by the trial court prejudicial to the rights of appellant upon which an assignment of error may be predicated; (2) lists two potential errors "that might arguably support the appeal," Anders, at 744, 87 S.Ct. at 1400; (3) requests that this court review the record independently to determine whether the proceedings are free from prejudicial error and without infringement of appellant's constitutional rights; (4) requests permission to withdraw as counsel for appellant on the basis that the appeal is wholly frivolous; and (5) certifies that a copy of both the brief and motion to withdraw have been served upon appellant. {
freelaw
------ cableshaft Took a graphic arts class in high school, was deep in the flash animation/game scene for a long time, then made my own UI's for my own games, tackled multiple different designs for websites over the years, did some mobile app design, now I've gone more analog and designing physical card games with Illustrator. So yeah, I've been using design skills pretty much my whole life. That being said, I'm not great at creating art, just putting together existing art assets or assets provided to me. I'm kind of glad the current trend is flat simple colors for everything. It makes design so much easier for me. I do still struggle with overall composition and brainstorming different visuals for how something can look, though. ------ siquick Most definitely, this book has been a god-send for me. [http://www.amazon.com/Design-Hackers-Reverse-Engineering- Bea...](http://www.amazon.com/Design-Hackers-Reverse-Engineering- Beauty/dp/1119998956) ------ Cypher Yes its quite fascinating, I focus more on the physical engineering side of design such as a car dash board or what design makes an awesome umbrella instead of colour and UI placement. ------ wprapido i'm a designer who gone developer way and being able to understand both helps me a lot, even when i don't do them both developers, learn some design designers, learn some development ~~~ kleer001 Same here. Nearly 20 years in the vfx industry. Finally getting some time to catch up with the latest advancements (and some old friends, oh hello python 2.7) in computer vision, machine learning, and automation. It's funny. I used to think IFTT was pretty great. But once I spent a little time with cron and launchd (thanks zerowidth.com!) I was like, what? that's all it can do? I'm sure there's a lot of overhead with a bunch of users and such and so many services. But still, really limited against a dinky XML file and 20 lines of python. ------ artur_makly IMHO..It
hackernews
The goal of the proposed research is to understand how adhesion regulates cell proliferation. The focus will be on the Abl tyrosine kinase as a transducer of the growth regulatory signal. The ubiquitous c-Abl is localized in the cytoplasm and the nucleus. The nuclear c-abl binds DNA and regulates transcription. The cytoplasmic c-abl interacts with both G and F-actin. Recently, a collaboration between two units of this program has demonstrated that the kinase activity and the subcellular localization of c-Abl is
nih_exporter
Beclin 1-mediated autophagy in hepatocellular carcinoma cells: implication in anticancer efficiency of oroxylin A via inhibition of mTOR signaling. Autophagy is a tightly-regulated catabolic process that involves the degradation of intracellular components via lysosomes. Although the pivotal role of autophagy in cell growth, development, and homeostasis has been well understood, its function in cancer prevention and intervention remains to be delineated. The aim of this study was to investigate the function and mechanism of autophagy induced by oroxyl
pubmed_abstracts
Swine were randomly allocated to either of two groups: Standard resuscitation or standard resuscitation (Shock group) and inhaled CO (CO group). Randomization was done in blocks of 10 animals. Of the 10 animals, one was allocated blindly to receiving sham surgery, which consisted of cannulation as previously described, without hemorrhage. Given that blinding was not possible, allocation to either group was disclosed to the investigators performing the study only after 55 minutes into the hypotensive period in order to avoid any bias during the surgical or hemorrhage phases. Animals allocated to CO received a pre-mixed gas containing 250 parts per million (ppm) in 40% oxygen after 60 minutes into the shock period delivered through the anesthesia circuit. ### Myeloperoxidase (MPO) activity {#sec013} MPO activity in the lungs in the murine moderate shock model was determined four hours after resuscitation as described by Anderson et al\[[@pone.0135032.ref015]\]. Lungs were excised, washed in saline, and frozen in liquid nitrogen. Samples were thawed and homogenized in 20 mM/L potassium phosphate (pH 7.4). Samples were centrifuged at 15,000*g* for 30 min at 4°C. The pellet was then resuspended in 50 mM/L potassium phosphate (pH 6.0) containing 0.5% hesadecyltrimethylammonium bromide. Samples were sonicated and then centrifuged 15,000*g* for 10 min at 4°C. Supernatant (5 mircoliters) was then added to 196 microliters of reaction buffer containing 530 nM/L *O*-dianisidine and 150 nM/L H~2~O~2~ in 50 mM/L potassium phosphate (pH 6.0). Light absorbance at 490 and 620 nm was read and compared with standards. Protein content in the samples was determined by bicinchoninic acid assay. Results were corrected per microgram of protein. ### Murine serum cytokine, ALT measurements, and arterial blood gas measurements {#sec014} Serum levels of the cytokines IL-6 and TNF-alpha were measured in the murine moderate shock model four hours after resuscitation using enzyme-linked immunoabsorbant assay (ELISA; R&D Systems, Minneapolis, MN) according to the manufacturer's instructions. Alanine aminotransferase (ALT) was determined using an iSTAT Analyzer (Abbott, Princeton, NJ). Arterial blood gases were obtained from the femoral
pubmed_central
Q: Error while XOR ing C++ I have problem, when i compile this code #include <iostream> using namespace std; int main(){ const unsigned long box[256]= { 0xD1310BA6, 0x98DFB5AC, 0x2FFD72DB, 0xD01ADFB7, 0xB8E1AFED, 0x6A267E96, 0xBA7C9045, 0xF12C7F99, 0x24A19947, 0xB3916CF7, 0x0801F2E2, 0x858EFC16, 0x636920D8, 0x71574E69, 0xA458FEA3, 0xF4933D7E, 0x0D95748F, 0x728EB658, 0x718BCD58, 0x82154AEE, 0x7B54A41D, 0xC25A59B5, 0x9C30D539, 0x2AF26013, 0xC5D1B023, 0x286085F0, 0xCA417918, 0xB8DB38EF, 0x8E79DCB0, 0x603A180E, 0x6C9E0E8B, 0xB01E8A3E, 0xD71577C1, 0xBD314B27, 0x78AF2FDA, 0x55605C60, 0xE65525F3, 0xAA55AB94, 0x57489862, 0x63E81440, 0x55CA396A, 0x2AAB10B6, 0xB4CC5C34, 0x1141E8CE, 0xA15486AF, 0x7C72E993, 0xB3EE1411, 0x636FBC2A, 0x2BA9C55D, 0x741831F6, 0xCE5C3E16, 0x9B87931E, 0xAFD6BA33, 0x6C24CF5C, 0x7A325381, 0x28958677, 0x3B8
stackexchange
Sampled metric data can be used to build performance models for analysis and capacity planning. However, less frequent sampling can result in inaccurate models and data uncertainty, especially regarding the duration of events or processes and the number of events or processes. The present invention is directed to reducing said uncertainty. Uncertainty arises from two primary sources: the unsampled segment of a seen process or event, and the unseen process or event. A seen process is a process that is sampled at least once; therefore, its existence and starting time are known. However, the residual time or utilization between the last sampling of the process or event and the death of the process or the termination of the event is unsampled and unknown. An unseen process is shorter than the sample interval and is not sampled at all, and therefore its entire utilization is unknown. Nevertheless, the total unsampled (i.e., residual) utilization and the total unseen utilization can be estimated with the system and method of the present invention. In determining the total unsampled utilization, a quantity of process service time distributions are determined, and each of the seen processes are assigned respective process service time distributions. For each distribution, a mean residual time is calculated using equations provided by the system and method. The total unsampled utilization is the sum of the mean residual time multiplied by the number of seen processes for each distribution, all divided by the measurement interval. In determining the total unseen utilization, first the total captured utilization is determined to be the sum of the sampled utilizations of all seen processes over the measurement interval. Next the total measured utilization, or the xe2x80x9cactualxe2x80x9d utilization over the measurement interval, is obtained from the system software or monitoring software. The difference between the total measured utilization and the total captured utilization is the uncertainty. Because the uncertainty is due to either unsampled segments or unseen events, the total unseen utilization is calculated to be the uncertainty (the total measured utilization minus the total captured utilization) minus the total unsampled utilization. When the total measured utilization is not available, the total unseen utilization is estimated with an iterative bucket method. A matrix of buckets are created, wherein each row corresponds to the sample interval and each bucket to a gradation of the sample interval. Each process is placed into the appropriate bucket according to how many times it was sampled and when in the sample interval it began. Starting with the bucket with the longest process(es) and working iteratively back through the other buckets,
uspto_backgrounds
After the arrest of Mafia boss Totò Riina in January 1993, the remaining bosses, among them La Barbera, Giuseppe Graviano, Matteo Messina Denaro, Giovanni Brusca, Leoluca Bagarella, and Antonino Gioè, came together a few times (often in the Santa Flavia area in Bagheria, on an estate owned by the mafioso Leonardo Greco). They decided on a strategy to force the Italian state to retreat. That resulted in a series of bomb attacks in 1993 in the Via dei Georgofili in Florence, in Via Palestro in Milan and in the Piazza San Giovanni in Laterano, and Via San Teodoro in Rome, which left 10 people dead and 93 injured as well as damage to centres of cultural heritage such as the Uffizi Gallery. On March 23, 1993, La Barbera, Antonino Gioè and Salvatore Bentivegna were arrested in Milan. The police taped them while they were planning bomb attacks. La Barbera started to collaborate with the authorities in November 1993. La Barbera confessed his participation in the slaying of Antimafia judge Giovanni Falcone. He followed Falcone's car as it sped toward Palermo, keeping in constant touch with Leoluca Bagarella, Antonino Gioè and Giovanni Brusca on the hillside near Capaci. Brusca set off the explosion. He also admitted to have been involved in the killing of Salvo Lima, the former mayor of Palermo. His father Girolamo La Barbera (born in 1925) was murdered on June 10, 1994, because he defended the choice of his son to become a pentito. The killing was staged as a suicide. Among the killers were Michele Traina and Domenico Raccuglia. The order came from Giovanni Brusca. Traina and Raccuglia received life sentences for the killing in June 2005, while Brusca was sentenced to 13 years. In October 1997, the pentito La Barbera was rearrested. Although a key witness in several important trials under way, he had returned home and recommenced his criminal activities and avenge atrocities carried out on family members. References Jamieson, Alison (2000), The Antimafia. Italy’s Fight Against Organized Crime, London: MacMillan Press Category:
wikipedia_en
Josephson junctions are building elements of many electronic and electromagnetic devices as well as a candidate for quantum computers[@BaroneBook]. In practical applications, one usually integrates large arrays of junctions on a chip to enhance the performance, thus coherent operations in these junctions are crucial. The synchronization between junctions can be realized by coupling them to a common resonator, most frequently through electromagnetic coupling. The common resonator establishes long-range interaction between junctions, which then synchronizes them under appropriate condition. The junctions arrays have become an extremely important playground to understand the synchronization mechanism for large population of nonlinear oscillators, partially because of the relatively easy experimental realization.[@Hadley88; @Jain84; @Wiesenfeld96; @Durala99; @Filatrella00; @Grib02; @Grib06; @Filatrella07; @Madsen08]. The successful observations of coherent emission from cuprate superconductors renew the interests in understanding the synchronization of arrays of Josephson junctions [@Bae07; @Ozyuzer07; @kadowaki08; @Wang09; @Wang10; @Tsujimoto10; @Krasnov10]. Cuprate superconductors, such as $\rm{Bi_2Sr_2CaCu_2O_{8+\delta}}$ (BSCCO), are a natural realization of a stack of Josephson junctions of atomic thickness [@Kleiner92; @Kleiner94], known as intrinsic Josephson junctions (IJJs). Because of the large supercoducting energy gap, these build-in Josephson junctions can be operated at frequencies in the terahertz region, where the electromagnetic waves have wide applications [@Ferguson02; @Tonouchi07]. Radiation from IJJs occurs in the resistive state. Such a state is reached by increasing the bias current above the Josephson critical current and then diminishing it down to the voltage $V$ corresponding to the target frequency according to the Josephson relation $\omega=2eV/\hbar $. The resistive state is preserved down to the retrapping current below which the system undergoes transition into the zero-voltage state. Such a procedure is possible because the resistivity of IJJs is very large, i.e. junctions are strongly underdamped. Thus the hysteretic behavior allows us, in principle, to reach a quite low voltage of the order of that corresponding to the Josephson frequency ($\sim 0.1\rm{THz}$ for BSCCO
arxiv
insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id) values (LOOKUP_CHANNEL_ARCH('channel-s390'), LOOKUP_CHANNEL_ARCH('channel-s390')); insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id) values (LOOKUP_CHANNEL_ARCH('channel-s390-deb'), LOOKUP_CHANNEL_ARCH('channel-s390-deb')); insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id) values (LOOKUP_CHANNEL_ARCH('channel-s390x'), LOOKUP_CHANNEL_ARCH('channel-s390')); insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id) values (LOOKUP_CHANNEL_ARCH('channel-s390x'), LOOKUP_CHANNEL_ARCH('channel-s390x')); insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id) values (LOOKUP_CHANNEL_ARCH('channel-iSeries'), LOOKUP_CHANNEL_ARCH('channel-iSeries')); insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id) values (LOOKUP_CHANNEL_ARCH('channel-pSeries'), LOOKUP_CHANNEL_ARCH('channel-pSeries')); insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id) values (LOOKUP_CHANNEL_ARCH('channel-x86_64'), LOOKUP_CHANNEL_ARCH('channel-ia32')); insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id) values (LOOKUP_CHANNEL_ARCH('channel-x86_64'), LOOKUP_CHANNEL_ARCH('channel-x86_64')); insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id) values (LOOKUP_CHANNEL_ARCH('channel-amd64-deb'), LOOKUP_CHANNEL_ARCH('channel-ia32-deb')); insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id) values (LOOKUP
github
2017 MPI for Intelligent Systems and University of Tübingen, 2017 (phdthesis) Abstract Computer vision can be understood as the ability to perform 'inference' on image data. Breakthroughs in computer vision technology are often marked by advances in inference techniques, as even the model design is often dictated by the complexity of inference in them. This thesis proposes learning based inference schemes and demonstrates applications in computer vision. We propose techniques for inference in both generative and discriminative computer vision models. Despite their intuitive appeal, the use of generative models in vision is hampered by the difficulty of posterior inference, which is often too complex or too slow to be practical. We propose techniques for improving inference in two widely used techniques: Markov Chain Monte Carlo (MCMC) sampling and message-passing inference. Our inference strategy is to learn separate discriminative models that assist Bayesian inference in a generative model. Experiments on a range of generative vision models show that the proposed techniques accelerate the inference process and/or converge to better solutions. A main complication in the design of discriminative models is the inclusion of prior knowledge in a principled way. For better inference in discriminative models, we propose techniques that modify the original model itself, as inference is simple evaluation of the model. We concentrate on convolutional neural network (CNN) models and propose a generalization of standard spatial convolutions, which are the basic building blocks of CNN architectures, to bilateral convolutions. First, we generalize the existing use of bilateral filters and then propose new neural network architectures with learnable bilateral filters, which we call `Bilateral Neural Networks'. We show how the bilateral filtering modules can be used for modifying existing CNN architectures for better image segmentation and propose a neural network approach for temporal information propagation in videos. Experiments demonstrate the potential of the proposed bilateral networks on a wide range of vision tasks and datasets. In summary, we propose learning based techniques for better inference in several computer vision models ranging from inverse graphics to freely parameterized neural networks. In generative vision models, our inference techniques alleviate some of the crucial hurdles in Bayesian posterior inference, paving new ways for the use of model based machine learning in vision. In discriminative CNN models, the proposed filter generalizations aid in the design of new neural network architectures that can handle sparse high-dimensional data as well as provide a way for incorporating prior knowledge into CNNs. Hand motion capture with an RGB-D sensor gained recently a lot of
pile-cc
What is the thousands digit of 4247? 4 What is the hundreds digit of 1421? 4 What is the units digit of 1541? 1 What is the ten thousands digit of 68599? 6 What is the units digit of 78? 8 What is the units digit of 18584? 4 What is the units digit of 325? 5 What is the units digit of 1355? 5 What is the ten thousands digit of 14135? 1 What is the hundreds digit of 1919? 9 What is the units digit of 2483? 3 What is the units digit of 431? 1 What is the units digit of 1760? 0 What is the thousands digit of 3773? 3 What is the hundreds digit of 164563? 5 What is the thousands digit of 4138? 4 What is the tens digit of 604? 0 What is the tens digit of 1449? 4 What is the units digit of 142331? 1 What is the thousands digit of 27324? 7 What is the tens digit of 675? 7 What is the units digit of 1089? 9 What is the units digit of 7834? 4 What is the units digit of 1717? 7 What is the hundreds digit of 1119? 1 What is the tens digit of 675? 7 What is the thousands digit of 12128? 2 What is the tens digit of 531? 3 What is the ten thousands digit of 50517? 5 What is the hundreds digit of 2294? 2 What is the units digit of 715? 5 What is the hundreds digit of 4967? 9 What is the tens digit of 301? 0 What is the hundreds digit of 1915? 9 What is the units digit of 805? 5 What is the hundreds digit of 2651? 6 What is the tens digit of 1277? 7 What is the units digit of 9721? 1 What is the thousands digit of 2368? 2 What is the units digit of 2757? 7 What is the tens digit of 5141? 4 What is the ten thousands digit of 23826? 2 What is the tens digit of 29199? 9
dm_mathematics
Hello Vince, I stopped by to see you today 03/28/01. However, Mrs. Shirley notified me that you were out of the country. Look, I need another favor. My wife, whom you met last summer, and I have been living in The Woodlands about a month now. We have tried, to no avail, to get her in the local school district as a speech pathologist or a K-
enron_emails
3 On November 2, 1984, the United States District Court for the Western District of Wisconsin ordered the state election officials to preserve any ballots received from overseas citizens between the time the polls closed on election day and November 16, 1984. Election officials eventually received 329 ballots which had been timely applied for during this period. On November 14, 1984, the State of Wisconsin moved to dismiss the complaint for failure to state a claim, arguing that it was in full compliance with both federal voting acts. The state agreed that if this motion was denied, it would count all absentee ballots received before November 16, 1984, in the federal elections. 4 On November 30, 1984, the district court denied the motion to dismiss the complaint, finding that it stated a cause of action under the federal voting statutes. The district court reasoned that although neither statute specifically stated how long before an election absentee ballots must be mailed to voters, a state could defeat the express purposes of the statutes by mailing the ballots without sufficient time for their valid return. The court therefore entered the agreed order to count the ballots in the elections for federal offices. On February 26, 1985, the Wisconsin Board of State Canvassers issued a supplemental certification of the election results for federal offices which included the late ballots, thereby complying with the district court's order. The late ballots did not affect the outcome of any race. The State of Wisconsin then filed this appeal. 5 Article III, Section 2 of the Constitution limits federal jurisdiction to actual cases and controversies. See Nebraska Press Ass'n v. Stuart, 427 U.S. 539, 546, 96 S.Ct. 2791, 2796, 49 L.Ed.2d 683 (1976). It is clear, as the United States admits, that there is no longer a controversy between the parties. Appellee's br. at 2. The State of Wisconsin counted the disputed ballots, thereby complying in full with the district court's order. These ballots made no difference in any race. No other relief was ordered. The United States argues, however, that this court has jurisdiction because the dispute between the parties is "capable of repetition, yet evading review." Southern Pacific Terminal Co. v. ICC, 219 U.S. 498, 515, 31 S.Ct. 279, 283, 55 L.Ed.2d 310 (1911). We disagree. There is no indication that
freelaw
[1] [https://github.com/GN-OS/Bloard](https://github.com/GN-OS/Bloard) ------ aloknnikhil This includes the iPhone Xs and 11 (and presumably all A12 and A13 devices). Was there a new exploit found on these chips? Last I checked only devices with chips older than the A12 were vulnerable to the checkra1n exploit. ~~~ judge2020 new exploit: > using a 0day kernel vulnerability from @Pwn20wnd [https://twitter.com/unc0verteam/status/1263260302713524225?s...](https://twitter.com/unc0verteam/status/1263260302713524225?s=21) ------ dang The baity title and the coming-soonness are two strikes against this submission. Does anyone want to argue in its favor? and if so, what should we change the title to? ~~~ mike_d The actual news here is that an iOS 13.5 kernel 0day is going to be released publicly. The exploit was paid for by a phone case manufacturer. It isn't a great source, but the original tweet actually has more detail than the website: [https://twitter.com/unc0verTeam/status/1263260302713524225?s...](https://twitter.com/unc0verTeam/status/1263260302713524225?s=20) Edit: I'd suggest pointing here for context - [https://9to5mac.com/2020/05/20/jailbreak-for-all- ios-13-5-de...](https://9to5mac.com/2020/05/20/jailbreak-for-all- ios-13-5-devices-expected-soon-due-to-new-kernel-exploit/) ~~~ dang Doesn't it make sense to wait until it's released? ------ RyanShook Are iOS exploits becoming more common? Feels like a few years ago they were rare but now they’re being released more often. ~~~ praseodym Apparently they are, Zerodium has even stopped accepting new iOS privilege
hackernews
Worldwide, cancer is a leading cause of death and the most common killer of adult Americans. For the individual, the diagnosis is accompanied by extreme stress. Multiple randomized clinical trials (RCTs) of psychological interventions have shown efficacy in reducing stress for the "typical" patient-newly diagnosed with local or regional disease. Unfortunately, only two (N=2) RCTs have focused upon the patient with recurrent disease, leaving this patient group adrift in the sea of previous and present day
nih_exporter
Investigation of cosmic rays and their secondaries at aircraft altitudes. A very extensive study of the radiation field at aircraft altitudes has been carried out over the last few years. These investigations formed part of a European wide collaboration involving several laboratories with extensive experience in cosmic ray research and/or dosimetry. Among the main topics investigated were the charge spectra, LET spectra, anisotropy and dose values. The measurements were performed on subsonic and supersonic flights covering a wide range of altitudes
pubmed_abstracts
Kunnen we dat laatste nog wel voldoende ondersteunen, nu we gedwongen worden om de \'fysieke contacten\' zoveel mogelijk te beperken? Hoe gaan de mensen bewegen als sportscholen en sportverenigingen hun deuren gesloten moeten houden uit angst voor verspreiding van het virus? \'Dit vergt veel van iedereen en vraagt om creativiteit en saamhorigheid\' Samenwerken {#Sec1} =========== Maar een nog groter probleem is of we voldoende \'gezonde\' zorgprofessionals hebben om de kwetsbaren te helpen. Ook zonder de dreiging van het coronavirus is het al een hele klus om die grote groep mensen die kwetsbaar is van de juiste zorg te voorzien. Zo is in Apeldoorn het Zorgpad ondervoeding bij kwetsbare ouderen ontwikkeld door professionals uit het sociale en het medische domein om ondervoeding sneller te herkennen en te behandelen. Juist de samenwerking is belangrijk: gebruikmaken van elkaars kwaliteiten en elkaar aanvullen. Initiatief tot samenwerking zien we ook als het om *TPO De Praktijk* gaat. De beroepsverenigingen V&VN pvk/poh en de Nederlandse vereniging voor praktijk- ondersteuners (NVvPO) zijn de laatste jaren steeds hechter gaan samenwerken. Hierover vertellen voorzitters Gertrud van Vulpen en Petra Portengen in het interview op pagina 26. V&VN pvk/poh, NVvPO en NHG gaan samen één tijdschrift voor praktijkondersteuning uitgeven. Dit nummer van *TPO de Praktijk* zal het laatste zijn in deze vorm. Zelf heb ik besloten te stoppen met mijn werk als redactielid. Ik blijf werkzaam als praktijkverpleegk
pubmed_central
I have uploaded my blog to pythonanywhere. On my localhost everything is working fine, but on pythonanywhere it is not working. I configured pythonanywhere like i did on my localhost, installed everything (Tinymce is also installed), but im getting this Error: 2019-05-16 12:24:14,263: Error running WSGI application 2019-05-16 12:24:14,264: ImportError: No module named 'tinymce' 2019-05-16 12:24:14,264: File "/var/www/urosdobricic_pythonanywhere_com_wsgi.py", line 15, in <module> 2019-05-16 12:24:14,264: application = get_wsgi_application() 2019-05-16 12:24:14,264: 2019-05-16 12:24:14,265: File "/home/UrosDobricic/.virtualenvs/urosdobricic.pythonanywhere.com/lib/python3.5/site-packages/django/core/wsgi.py", line 12, in get_wsgi_application 2019-05-16 12:24:14,265: django.setup(set_prefix=False) 2019-05-16 12:24:14,265: 2019-05-16 12:24:14,265: File "/home/UrosDobricic/.virtualenvs/urosdobricic.pythonanywhere.com/lib/python3.5/site-packages/django/__init__.py", line 24, in setup 2019-05-16 12:24:14,265: apps.populate(settings.INSTALLED_APPS) 2019-05-16 12:24:14,266: 2019-05-16 12:24:14,266: File "/home/UrosDobricic/.virtualenvs/urosdobricic.pythonanywhere.com/lib/python3.5/site-packages/django/apps/registry.py", line 91, in populate 2019-05-16 12:24:14,266: app_config = AppConfig.create(entry) 2019-05-16 12:24:14,266
stackexchange
Regulatory sequences may also be useful in controlling temporal and/or spatial expression of endogenous DNA. For example, specialized tissues are involved in fertilization and seed development. Identification of promoters which are active in these seed tissues is of interest. In grain crops of agronomic importance, seed formation is the ultimate goal of plant development. Seeds are harvested for use in food, feed, and industrial products. The quantities and proportions of protein, oil, and starch components in those seeds determine their utility and value. The timing of seed development is critical. Environmental conditions at any point prior to fertilization through seed maturation may affect the quality and quantity of seed produced. In particular, the first 10 to 12 days after pollination (the lag phase) are critical in maize seed development. Several developmental events during the lag phase are important determinants of the fate of subsequent seed growth and development. (Cheikh, N. et al., Plant Physiology 106:45-51 (1994)) Therefore, a means to influence plant development, particularly in response to stress during this phase of growth, is of interest. Identification of a promoter sequence active in tissues of developing seeds exposed to abiotic stresses would be useful. Specialized plant tissues are central to seed development. Following fertilization, developing seeds become sinks for carbon translocated via the phloem from sites of photosynthesis. However, developing cereal seeds have no direct vascular connections with the plant; instead, a short-distance transport mechanism operates to move the assimilates from the vascular tissues to the endosperm and embryo. For example, in maize, photosynthate enters the seed via the pedicel; in wheat, via the nucellar projection and the aleurone layer. It is possible that this short-distance assimilate pathway between the phloem and the endosperm can operate to regulate the rate of sucrose transport into the grain. (Bewley, J. D., and M. Black. Seeds: Physiology of Development and Germination. N.Y., Plenum Press, 1985. pp. 38-39) Therefore, a promoter active in gene expression within these specialized tissues, such as the pedicel, may have significant effects on grain development. During rapid seed growth, sucrose is unloaded passively from the phloem into the apoplast of the pedicel parenchyma and inverted to hexose sugars by a cell-wall-bound acid invertase. The hydrolysis of sucrose in the apoplast maintains a favorable gradient for continued un
uspto_backgrounds
The line "deserts of vast eternity" is used in the novel Orlando: A Biography, by Virginia Woolf, which was published in 1928. Archibald MacLeish's poem "", alludes to the passage of time and to the growth and decline of empires. In his poem, the speaker, lying on the ground at sunset, feels "the rising of the night". He visualizes sunset, moving from east to west geographically, overtaking the great civilizations of the past, and feels "how swift how secretly / The shadow of the night comes on." B. F. Skinner quotes "But at my back I always hear / Time's wingèd chariot hurrying near", through his character Professor Burris in Walden Two, who is in a confused mood of desperation, lack of orientation, irresolution and indecision. (Prentice Hall 1976, Chapter 31, p. 266). This line is also quoted in Ernest Hemingway's novel A Farewell to Arms, as in Arthur C. Clarke's short story, The Ultimate Melody. The same line appears in full in the opening minutes of Michael Powell and Emeric Pressburger's A Matter of Life and Death (1946), spoken by the protagonist, pilot and poet Peter Carter: 'But at my back I always hear / Time's wingèd chariot hurrying near; And yonder all before us lie / Deserts of vast eternity. Andy Marvell, What a Marvel'. The line "A fine and private place, but none, I think, do there embrace" appears in Stephen King's novel Pet Sematary. The line "My vegetable love should grow / Vaster than empires, and more slow" is quoted by William S. Burroughs in the last entry of his diary (July 29, 1997). The line "I would Love you ten years before the Flood, And you should, if you please, refuse Till the conversion of the Jews. My vegetable love should grow Vaster than empires, and more slow." Is used as the preamble to part three of Greg Bear's Nebula award winning novel "Moving Mars". References External links To His Coy Mistress: A Study Guide With an Annotated Copy of the Poem Discworld & Terry Pratchett Wiki Category:1650s poems Category:1681 poems Category:Po
wikipedia_en
Since we have a finite number of particles, the jet volume is only partially patched by the volume occupied by such Lagrangian particles, [i.e., the volume filling factor is smaller than one]{}. [ Increasing]{} the number of particles [brings it closer]{} to one. To test the volume filling method, we produce an “image” of the jet at an observer time $t_{\rm obs}=0$ with a $90^\circ$ viewing angle, accumulating in each pixel the contributions corresponding to a laboratory frame time interval $\Delta T=2 R_{\rm b}/c$. However, instead of summing up the emissivity, we add up the length of the intersection of each particle’s volume with each pixel in the $(x_{\rm obs}, y_{\rm obs})$ plane (as described above). The idea behind the substitution of the emissivity by the intersection length is that, at $90^\circ$ the intersection length and the intersection volume of the particles are proportional and, thus, measuring lengths or volumes is equivalent. Since we accumulate in every pixel all contributions in the range $[-\Delta T/2, \Delta T/2]$, the intersection length with each particle equals the size of the particle perpendicular to the LoS ($2\Delta r$). [Hence,]{} the value accumulated in a pixel ${\cal P}:=(x_{\rm obs}, y_{\rm obs})$, namely $L_{\rm px}$, [is]{} $$L_{\rm px} = \sum_i \frac{A_i}{A_{\rm px}} 2\Delta r\, , \label{eq:Lpx}$$ where $A_i$ and $A_{\rm px}$ are the area of intersection of a particle with a pixel and the pixel area, respectively. The sum in Eq. (\[eq:Lpx\]) extends over all particles that are intersected by the line of sight that departs from ${\cal P}$. In the limit $\Delta r \rightarrow 0$ (equivalently, $N_{\rm p} \rightarrow \infty$) $A_i \rightarrow 4(\Delta r)^2$. On the other hand, the number of particles intersected by the LoS departing from ${\cal P}$ and having a cross sectional area $A_{\rm px}$ is $N_{\rm px}= A_{\rm px}/(2\Delta r)^2$. Therefore, we have $$\lim
arxiv
<Type>5</Type> <Period>6</Period> <MonthItem>8</MonthItem> <MonthPosition>4</MonthPosition> <DayWorking>0</DayWorking> </Exception> <Exception> <EnteredByOccurrences>1</EnteredByOccurrences> <TimePeriod> <FromDate>2002-01-01T00:00:00</FromDate> <ToDate>2006-02-04T23:59:00</ToDate> </TimePeriod> <Occurrences>8</Occurrences> <Name>Monthly Relative 6</Name> <Type>5</Type> <Period>7</Period> <MonthItem>9</MonthItem> <MonthPosition>0</MonthPosition> <DayWorking>0</DayWorking> </Exception> <Exception> <EnteredByOccurrences>1</EnteredByOccurrences> <TimePeriod> <FromDate>2002-01-01T00:00:00</FromDate> <ToDate>2007-05-13T23:59:00</ToDate> </TimePeriod> <Occurrences>9</Occurrences> <Name>Monthly Relative 7</Name> <Type>5</Type> <Period>8</Period> <MonthItem>3</MonthItem> <MonthPosition>1</MonthPosition> <DayWorking>0</DayWorking> </Exception> <Exception> <EnteredByOccurrences>1</EnteredByOccurrences> <TimePeriod> <FromDate>2003-01-01T00:00:00</FromDate> <ToDate>2003-05-01T23:59:00</ToDate> </TimePeriod> <Occurrences>3</Occurrences> <Name>Monthly Absolute 1</Name> <Type>4</Type> <Period>2</Period> <MonthDay>1</MonthDay> <DayWorking>
github
grep is a handy tool and I use it every day. But sometimes I wish it had some more features. For instance full featured Perl compatible regular expressions (PCRE) since the current implementation is not complete and I think it will never be, automatic recursive search, exclusion of non-text files etc. Here a tool called ack comes into play. It's a search tool and grep replacement written in Perl, which is able to do all these things. Guess what! Adobe Flash has ever been a great source of anger due to many bugs (see here for example) and security vulnerabilities. Anyhow, it has evolved into a widely used technology and many, many websites need it to function correctly (yeah, HTML5 is coming, let's hope it will replace Flash in many places in the near future). Adobe's bug fixing behavior has never been great and we all know, that Flash for Linux has been permanent beta (or alpha) since we can remember, but enough is enough. There is a severe bug that has now existed for three years, reported by hundreds of users. Adobe closed this report without taking action. Now it has been reported again and I want you to vote for it. Please! When you freshly set up a Linux distribution by hand, you get a lot of verbose output when booting into your system, but also install'n'go distributions like Ubuntu oder SUSE output some text when loading the kernel. This is not always desired and many people want to suppress these insistent system messages, but it's not as easy as you might think. The UNIX philosophy is based on the DRY principle which declares: “Don't repeat yourself”. Therefore, a program just does what it's made for and uses libraries or even other programs on your system to do a more advanced job. Some of these auxiliary programs are user definable and probably you already know the EDITOR environment variable, which specifies your default editor for the console. This is used, e.g., for the command visudo, which opens your /etc/sudoers file safely, or by svn to input a commit comment. But another important component is your console pager, which is used to display textual content on the console. Gnome and KDE come more and more together but there are still some differences which sometimes might lead to incompatibilities between these two large desktop environments. Whereas you have relatively few problems with KDE applications on Gnome there are
pile-cc
2110 In base 15, what is -559 + -50? -5a9 In base 16, what is -1 + 1027? 1026 In base 10, what is 1 - -22913? 22914 In base 2, what is 1 - 10111011010100? -10111011010011 In base 4, what is -1100 - 11313? -13013 In base 2, what is 11 - 100011011000100? -100011011000001 In base 8, what is -75 + 120646? 120551 In base 16, what is 437 + -13a? 2fd In base 2, what is -10001010110100001111 - -11? -10001010110100001100 In base 2, what is 11001000 - 101111101010? -101100100010 In base 9, what is 171740 - 3? 171736 In base 12, what is 13b566 - -1? 13b567 In base 8, what is -27746 - -3? -27743 In base 9, what is -1 - -238238? 238237 In base 8, what is -32 + -12757? -13011 In base 10, what is 3528 - 9? 3519 In base 7, what is 16 - 20451? -20432 In base 7, what is 22 + -6324? -6302 In base 13, what is -312a - -3a? -30c0 In base 6, what is -50 - -2335? 2245 In base 6, what is 40041 - -3? 40044 In base 4, what is 2203023 - 3231? 2133132 In base 6, what is -25234 + 32? -25202 In base 4, what is -32 - -133123? 133031 In base 15, what is -6 + -7956? -795c In base 13, what is 7 - 10a54? -10a4a In base 8, what is 2 - 113062? -113060 In base 13, what is -1046b3 - -6? -1046aa In
dm_mathematics
---------------------- Forwarded by Marianne Castano/HOU/EES on 08/02/2001 01:01 PM --------------------------- From: Stacey Bolton/ENRON@enronXgate on 08/02/2001 12:00 PM To: Marianne Castano/HOU/EES@EES cc: Subject: RE: CA BIZMIX Issues You're welcome. Hope I see you on Monday. My understanding is that surprisingly
enron_emails
I. Factual Background Plaintiffs entered into a contract with defendant to reconstruct their home and restore the personal property from the home, both of which were heavily damaged in an April 2003 fire caused by a leaking propane valve. Defendant specializes in the cleaning and restoration of structures and personal property damaged by catastrophic events. Defendant first performed emergency repairs to the structure of the home so that work crews could enter the home, evaluate the damage, and begin making repairs. Following emergency repairs, plaintiffs elected to demolish the existing structure and build a new home, using a different contractor. As a result, defendant's work thereafter was confined to inventorying, cleaning, and restoring plaintiffs' damaged personal property. It is undisputed that plaintiffs' homeowners' insurance policy provided $358,000 in coverage for the contents of the home, as well as $25,000 in additional coverage for business personal property contained within the home. The insurance policy provided (1) full replacement value for items deemed "unsalvageable"; and (2) payment for the costs of inventorying, cleaning, and restoring personal property deemed "salvageable." All payments were subject to the total limits of the policy noted above. It is also undisputed that plaintiffs exhausted the limits of the policy in the insurance company's payments for defendant's restorative work and for replacement of unsalvageable property. The insurance company made two payments related to defendant's work. In August 2003, the insurer issued a third-party check to plaintiffs in the amount of $17,353.22 for emergency repairs. Plaintiffs promptly deposited the check and paid the full amount to defendant. In March 2004, the insurer issued a second third-party check to plaintiffs in the amount of $66,355.02 for the inventorying, cleaning, and restoring of plaintiffs' personal property. This check was also deposited and paid to defendant. In September 2004, defendant delivered the personal property to plaintiffs that had been cleaned and restored. Defendant had inventoried and sorted the property as either salvageable or unsalvageable. Plaintiffs contend that defendant's work was negligently performed because it had either erred in assessing whether property could be salvaged, improperly restored property, or failed to return property that was salvageable. Plaintiffs also complain that defendant damaged their home's heating system when the emergency repairs were made. *1257 Evidence adduced at trial indicated that defendant failed to return many of the items that defendant had collected for cleaning and restoration. Many of the items that were returned to
freelaw
I was tired of games like Mafia Wars and wanted a phone-based MMO Strategy game where hundreds of players could actually engage each other on a 2D map, so I made one.<p>I track the state of the game each night so we can display a visual timeline of territory controlled by each alliance. (example: http://bit.ly/q5CFhU) I use jQuery mobile for the front end so it runs on most phones (via Phonegap) as well as modern web browsers. The server side is handled by Java Servlets and MySQL.<p>This started as a hobby - I'm not a developer by training - so I am very interested in feedback, suggestions, and ideas for improvements. ====== crazyj48s This caught my eye because I'm a lurker here on Hacker News who actually plays this game! I'm super excited you are posting here because I really want to learn more about your server architecture. Can you provide more info on your java stack as well as the kind of hardware is running the site? Previous games had 300+ users, so scalability shouldn't be an issue yet, but have you planned for that? Once criticism: For the time I've been playing, the game has been evolving rather quickly, and new features seem to have taken precedence over client stability. ~~~ wizzo We've actually taken a pretty homebrew approach and aren't using any external frameworks - just Tomcat and MySQL. On the hardware side we're using Linode shared servers so that we can quickly and easily scale up or down as needed. The game code is pretty efficient - we've run tests with thousands of players and had no problems, on modest hardware, so we're looking forward to growing quickly! It's true that we've had some stability issues at times, but we're trying to cover a lot of platforms (Android, iOS, webOS, web) and add a lot of new features to improve the game. Now that we've officially launched (on 10/1) stability will definitely our #1 priority, though. ~~~ crazyj48s Interesting - since this started as a hobby, any thoughts on open sourcing the client or server code or documenting the client/server communication so the community could build clients? I figure folks would be able to pretty easily
hackernews
The anthrax lethal factor (LF) is known to be pathogenically important, since anthrax bacilli lacking the LF gene show diminished virulence. Only a single cellular target for LF is known: the host macrophage, which undergoes apoptosis as a result of LF internalization. The killing of macrophages is also believed to be pathogenically important, because macrophage depletion paradoxically protects animals against B. anthracis infection. But the mechanism by which LF kills host macrophages has remained unclear. The events set in motion
nih_exporter
A sperm antigen corresponding to baboon sperm monoclonal antibody 1A9 was localized in the testis and ejaculated sperm in this animal, using the immunofluorescence technique and immunogold labelling. Immunohistochemical studies of the baboon testis showed that the antigenic determinant was localized in the late spermatid cells and spermatozoa close to the seminiferous tubules. Immunofluorescence studies indicate that the protein was localized on the acrosome region of ejaculated baboon sperm. At the electron-
pubmed_abstracts
HE : hematoxylin and eosin IHC : immunohistochemistry MTC : medullary thyroid carcinoma P‐gp : P‐glycoprotein TCC : transitional cell carcinoma TKI : tyrosine kinase inhibitor VEGF : vascular endothelial growth factor VEGFR‐2 : vascular endothelial growth factor receptor‐2 Thyroid cancer represents 10--15% of all head and neck neoplasms in the dog, and 90% of thyroid tumors detected clinically are carcinomas.[1](#jvim12330-bib-0001){ref-type="ref"}, [2](#jvim12330-bib-0002){ref-type="ref"} Thyroid carcinomas can be classified as follicular cell thyroid carcinomas (FTCs), which arise from follicular thyroid cells, and medullary thyroid carcinomas (MTCs), which arise from the parafollicular C cells and have a neuroendocrine origin. Although thyroidectomy is the preferred treatment modality, invasive nonresectable thyroid tumors are common in dogs, and in up to 38% of dogs, the tumor has already metastasized by the time of diagnosis.[3](#jvim12330-bib-0003){ref-type="ref"}, [4](#jvim12330-bib-0004){ref-type="ref"} Furthermore, almost 50% of dogs undergoing thyroidectomy experience recurrence or metastatic disease within 2 years of surgery.[4](#jvim12330-bib-0004){ref-type="ref"} Therefore, it is important to investigate new treatment modalities for the large number of dogs with inoperable tumors or metastatic disease. Vascular endothelial growth factor (VEGF) is the main stimulator of angiogenesis in the thyroid gland, and VEGF overexpression has been found in human thyroid cancer.[5](#jvim12330-bib-0005){ref-type="ref"} VEGF is secreted by cancer cells and binds to VEGF tyrosine kinase receptors on the surface of endothelial cells and thyrocytes. In people, vascular endothelial growth factor receptor‐2 (VEGFR‐2) inhibition with tyrosine kinase inhibitors (TKIs) is the most effective new therapeutic strategy developed to date in the treatment of advanced thyroid cancer.[6](#jvim12330-bib-0006){ref-type="ref"} VEGF, angiogenesis, and VEGF‐induced pathway activation may play important roles in the progression of
pubmed_central
LabWindows: implementing thread safe queues that can handle string elements How to use a thread safe queue to store strings I create a pointer to char in the main thread and allocate storage using malloc(). I copy some data into the storage, and assign the pointer to an array element (CmtWriteTSQData expects an array). This array gets passed to a thread safe queue. In a secondary thread, the thread safe queue is read. The data is assigned to a new array. How do I free the memory allocated within the secondary thread, as the pointer variable is no longer in scope? Can I just call free() on the array element? Or do I need to create another pointer to char in the secondary thread, copy the array element to it, and then call free() on the pointer? There doesn't appear to be a return value with free(), so I can't figure out how to ensure the call succeeds. // Main thread char *ptr = NULL; char *array1[1] = {0}; ptr = (char *) malloc (3 * sizeof (char)); strcpy (ptr, "hi"); array1[0] = ptr; CmtWriteTSQData (queue, array1, 1, 0 NULL);   // Secondary thread char *array2[1] = {0}; CmtReadTSQData (queue, array2, 1, 0, 0); printf ("%s", array2[0]); // Prints "hi" free (array2[0]); // Does this work? A: The short answer is yes. When you call malloc(), you are asking the operating system to give you a chunk of usable memory of some minimum size, and the operating system responds by passing you a pointer, which is just an integer representing the virtual address of that chunk of memory. When a program has multiple threads, this means that several lightweight processes are sharing the same virtual address space, which means if there are several copies of some valid pointer among several threads of the same process, then they must all point to the same memory location. The operating system does not care which thread asked for the memory, and it does not care which thread gives it back. When malloc() returns a pointer in a process, all of the threads in that process may use it, and
stackexchange
GLP-1 is secreted from specific cells in the colon following a meal and is a key regulator of glucose homeostasis, linking the gut, brain and pancreas. GLP-1 potentiates insulin secretion, reduces glucagon secretion and preserves 3-cell function whilst also improving satiety. Levels of post-prandial GLP-1 are reduced in Type 2 diabetics and dramatically elevated following gastric by-pass surgery, contributing to the amelioration of Type 2 diabetes in these patients. Approaches that prolong the half-life of GLP-1 (JANUVIA (Merck), GALVUS (Novartis)) or activate the GLP-1 receptor (BYETTA (Amylin)) have been recently approved for use in Type 2 diabetes. Hyperinsulinemia in patients with Type 2 diabetes mellitus results from peripheral insulin resistance, coupled with inadequate pancreatic insulin secretion and elevated glucagon levels. There is a strong correlation between obesity and peripheral insulin resistance and hyperinsulinemia. Accumulation of free fatty acids in insulin responsive tissues other than fat (i.e. muscle and liver) results in tissue insulin resistance. Additionally, free fatty acids have a direct effect on the pancreas and in the colon and further stimulate glucose-dependent insulin secretion and GLP-1 release with acute exposure whereas chronic exposure of free fatty acids impairs insulin secretion and becomes toxic to the 3-cell. In the liver, hyperinsulinemia per se has been linked to exacerbating insulin resistance by increasing liver fatty acid accumulation and hepatic glucose output creating a vicious cycle of disease progression. Current therapeutic strategies only partially address the complex pathology of free fatty acids in the exacerbation of diabetes. Agents that target both liver and pancreas function, directly or indirectly via GLP-1 release, either individually or in combination with current treatment, could significantly improve blood glucose control while maintaining β-cell function. Agents that potentiate GLP-1 release also have the ability to reduce weight, providing additional benefits. GPR120 is a seven transmembrane g-protein coupled receptor (GPCR) that is predominantly expressed in the intestine and adipose. GPR120 functions as a receptor for long chain free fatty acids (FFAs). Acute FFA stimulation of GPR120 in GLP-1 expressing cell-lines amplifies GLP-1 release. Administration of α-linolenic acid into the colon of mice increases GLP-1 and potentiates insulin release following a glucose challenge. In contrast to agonists of GPR40, the existing literature suggests
uspto_backgrounds
John Beckett, Lord Beckett John Beckett, Lord Beckett, is a Scottish lawyer who was appointed in 2016 as a Senator of the College of Justice, a judge of the Court of Session. Beckett was Solicitor General for Scotland, the country's junior Law Officer from October 2006 to May 2007. He was appointed by Labour First Minister Jack McConnell on the appointment of former Solicitor General Elish Angiolini to the senior role of Lord Advocate. After the 2007 Scottish election, newly elected Scottish National Party First Minister Alex Salmond replaced Labour Party member Beckett with Frank Mulholland, who later became Lord Advocate. Beckett then became floating sheriff sitting mainly at Glasgow Sheriff Court. Early life Beckett was born in Crawley, a town in West Sussex about 28 miles (45 km) south of London. His family moved to Edinburgh in 1968 and he was educated at Edinburgh Academy and Broughton High School before studying at the School of Law of the University of Edinburgh. Career Beckett worked initially as a defence solicitor in Edinburgh, and was elected to the Faculty of Advocates in 1993. He was junior defence counsel for Abdelbaset al-Megrahi under William Taylor QC during the Lockerbie trial at the Scottish Court in the Netherlands in 2000. He became an Advocate Depute and Senior Advocate Depute in 2003, and Queen's Counsel (QC) in 2005, and prosecuted the infamous murder case of baby Caleb Ness. He was appointed Principal Advocate Depute from 1 January 2006. On his appointment as Solicitor General that October, he was succeeded by Brian McConnachie. Solicitor General Following the resignation of Colin Boyd as Lord Advocate, Solicitor General Elish Angiolini was nominated for the post by First Minister Jack McConnell. Beckett was in turn nominated to succeed Angiolini as Solicitor General. The nomination was met with some criticism due to Beckett's membership of the Labour Party, but was ultimately approved by the Scottish Parliament on 5 October 2006. Beckett, along with Angiolini, was sworn in at the Court of Session in Edinburgh on 12 October 2006 and appointed by the Queen under the royal warrant. Beckett's appointment lasted only eight months however; the 2007 Scottish Parliament election resulted in the Scottish National Party forming a minority government, and new First Minister Alex Salmond replaced Beckett with politically neutral Frank Mulholland QC
wikipedia_en
Stylized facts of evaluation distributions ------------------------------------------ Figure \[fig:04-ccdfFitsLNLD\] shows the probability density functions of the distributions of the amount of likes and dislikes for items in each of the four datasets. To understand the process that generates these distributions, we fit a set of parametric distributions that provide insights into how likes and dislikes are given to items. Following the categorization of [@Mitzenmacher2004], generative mechanisms produce stylized size distributions that can be traced back to the properties of growth processes. If the appearance of likes and dislikes follows an uncorrelated process and new evaluations are independent of previous ones, likes and dislikes should follow *exponential* distributions. On the other hand, the presence of likes and dislikes can motivate further evaluations through social effects, creating multiplicative growth (also known as preferential attachment in the context of networks). In the presence of multiplicative growth, if items have similar lifespans, likes and dislikes follow *log-normal* distributions. On the other hand if multiplicative growth is combined with heterogeneous lifespans, likes and dislikes follow a *power law* distribution. This power law can be corrected by adding an exponential cutoff if finite size effects limit the growth of likes and dislikes, a case in which the distributions would be better fitted by a *truncated power law*. ![**Probability density function of collective evaluations**. Probability density function of the number of likes (top) and the number of dislikes (bottom) with exponential binning and fits to log-normal distribution $ln\mathcal{N}(\mu,\sigma)$ (red dashed lines). For all datasets, the results of the log-likelihood pairwise comparisons of the four distributions (see text) identified the log-normal distribution as the best fit.[]{data-label="fig:04-ccdfFitsLNLD"}](PDFs.pdf){width="95.00000%"} For all datasets, the results of pairwise comparisons of the four proposed distributions identified the *log-normal* distribution as the best fit, with significant and positive log-likelihood ratios as shown in Table \[tab:03-ln-ks\] along with the best fitting parameter estimates. The dashed lines in Figure \[fig:04-ccdfFitsLNLD\] show the fitted distributions, revealing the quality of the fit. The cases of [`YouTube`]{} and [`Urban Dictionary`]{} provide very good fits
arxiv
/* * Copyright [2017] Wikimedia Foundation * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.o19s.es.ltr.utils; import com.o19s.es.ltr.ranker.LtrRanker; import org.elasticsearch.Assertions; import java.util.Objects; import java.util.function.Supplier; public final class Suppliers { /** * Utility class */ private Suppliers() {} /** * @param supplier the original supplier to store * @param <E> the supplied type * @return a supplier storing and returning the same instance */ public static <E> Supplier<E> memoize(Supplier<E> supplier) { return new MemoizeSupplier<>(supplier); } private static class MemoizeSupplier<E> implements Supplier<E> { private volatile boolean initialized = false; private final Supplier<E> supplier; private E value; MemoizeSupplier(Supplier<E> supplier) { this.supplier = Objects.requireNonNull(supplier); } @Override public E get() { if (!initialized) { synchronized (this) { if (!initialized) { E t = supplier.get(); value = t; initialized = true; return t; } } } return value; } } /** * A mutable supplier */ public static class MutableSupplier<T> implements Supplier<T
github
Image Via Thetakeout.com Or Not. Imagine being an unsuspecting delinquent, opening Slaughterhouse-Five or The Children’s Crusade: A Duty-Dance with Death for the first time: I was blown away by how psychedelic it was. Vonnegut’s prose was irreverent, ridiculous, and, above all, courageous. Vonnegut plunged blindly into the abyss of existential uncertainty and danced in the darkness. One of the most imaginative novels ever written with a minimalist style—Slaughterhouse-Five felt like Vonnegut knew a hell of a lot more about the world and grammar than me and was choosing words that I could understand. Maybe there was nothing to understand? It was pretty damn cool. Vonnegut made literature cool—especially for a kid in detention. Image Via wrbh.org In the introduction to Slaughterhouse-Five, Vonnegut explains how he had been trying to write about the firebombing of Dresden during World War II ever since his imprisonment there. This is the reason that Slaughterhouse’s protagonist, Billy Pilgrim, was also in Dresden during the bombing. Billy’s story is an interesting one—the narrative of his life involves just as much love, humor, and tragedy as anything you could probably imagine. What makes it uber unique is that Billy acquires a certain amount of objectivity similar to the reader’s own. Billy is “unstuck” in time as he has no control over where and when in his life he might be at any given moment. One moment, Billy could be at his daughter’s wedding—the next, fornicating with a movie star. It’s all very non-linear. This ability is supposedly a side-effect of his Tralfamadorian kidnapping; extraterrestrial beings teach Billy to see time in a very Matthew McConaughey-like (Interstellar) way. All moments are permanent, always happening, forever. Billy is most definitely an unreliable narrator throughout, and Slaughterhouse-Five‘s chaos can undoubtedly be interpreted in a variety of ways. All I knew at that time was that I needed more Vonnegut. Image Via Quickmeme.com Vonnegut is famous for incorporating reoccurring elements into his novels, such as characters, names, and themes. (He also likes to write himself into
pile-cc
2 Let x(a) be the third derivative of a**6/120 + a**5/4 + 13*a**4/24 - 13*a**3/6 + 9*a**2. Calculate the lowest common multiple of (1 - -11)*(-3)/(-6) and x(-14). 6 Let m = 0 - -9. Suppose 4*t - m = -1. Suppose -4*s = -5*r - 23, -4 = -s + 5*r - t*r. What is the lowest common multiple of 3 and s? 21 Let y = -1722/19 + 12313/152. Calculate the common denominator of ((-50)/18)/((-4)/6) and y. 24 Let q = -4859 + 22972/5. Let u = q - -266. What is the common denominator of 93/2 and u? 10 Let u = -8 - -14. What is the common denominator of ((-1)/u)/(1/25) and 101/4? 12 Find the common denominator of 0 and 11*2/18 + 1. 9 Let d(y) = -y**3 - 4*y + 2. Let r = 1 + -6. Let j be d(r). What is the common denominator of -34/9 and 2/(-3*(-12)/j)? 18 Suppose 0 = 2*d - 21 + 1. What is the lowest common multiple of 54 and d? 270 Suppose -3*i + 6 = -0. Suppose i*s + 12 = 3*s. Suppose 0*v = 2*v - s. What is the smallest common multiple of 4 and v? 12 Suppose -5*d + 20 = 3*r, 2*d = 4*r - 3*r - 3. Suppose 0*t = -r*j + t, 2*j = -4*t. Find the common denominator of (j - (-7)/(-4))/(-2) and 103/20. 40 Let y = 30285277/1160 - 26108. Let g = y + 9399/1160. Find the common denominator of g and -10. 10 Let k = -76 + 40. Let g be k/13*3/(-78). Let j = -2557/3380 + g.
dm_mathematics
I learned that the proposed draft was up for signature by members of the association shortly. The vicechairman of ADA indicated that he thought that it was late to make suggestions for this round but Enron's participation would be welcome for future developments. He confirmed that the model agreement is aimed at transactions between residents of Argentina where one of the parties is a local financial entity, and basically at financial derivatives. While commodities are mentioned in the draft they are not
enron_emails
On March 8, 2016, Petitioner filed a petition in the National Vaccine Injury Compensation Program.2 Petitioner alleged that as a result of receiving an influenza (“flu”) vaccine on October 18, 2013, she suffered a right shoulder injury related to vaccine administration (“SIRVA”). See Petition (ECF No. 1). An entitlement hearing was held on May 2-3, 2019 in San Francisco, California, and on July 12, 2019, I issued my Ruling on Entitlement, finding that Petitioner was 1 I intend to post this Ruling on the United States Court of Federal Claims' website. This means the Ruling will be available to anyone with access to the Internet. In accordance with Vaccine Rule 18(b), petitioner has 14 days to identify and move to redact medical or other information, the disclosure of which would constitute an unwarranted invasion of privacy. If, upon review, I agree that the identified material fits within this definition, I will redact such material from public access. Because this unpublished ruling contains a reasoned explanation for the action in this case, I am required to post it on the United States Court of Federal Claims' website in accordance with the E- Government Act of 2002. 44 U.S.C. § 3501 note (2012) (Federal Management and Promotion of Electronic Government Services). 2 The National Vaccine Injury Compensation Program is set forth in Part 2 of the National Childhood Vaccine Injury Act of 1986, Pub L. No. 99-660, 100 Stat. 3755, codified as amended, 42 U.S.C. §§ 300aa-1 to -34 (2012) (“Vaccine Act” or “the Act”). All citations in this decision to individual sections of the Vaccine Act are to 42 U.S.C.A. § 300aa. entitled to compensation. On September 27, 2019, the parties filed a Proffer, which I adopted as my decision awarding compensation on September 30, 2019. (ECF No. 93). On January 30, 2020, Petitioner filed a motion for final attorneys’ fees and costs. Petitioner requests compensation in the total amount of $100,071.50, representing $69,122.84 in attorneys’ fees and $30,948.61 in costs. Fees App. at 1. Pursuant to General Order No. 9
freelaw
Who wants cheaper books? (Help the Domino Project) - cgshaw I've noticed many HN readers mentioning books of all sorts of varieties.<p>I'm a member of the Domino Project Street Team. Seth Godin along with Amazon is trying to disrupt the publication and book distribution process in a big way.<p>One of the things we're experimenting with now is how to build a list and market to folks in a meaningful way. To get people interested in the project and spreading ideas, Seth is offering to lower the price of his first book, "Poke the Box." For every 5,000 people that sign up for the mailing list, he'll drop the price of the Kindle copy by 1.00. Right now the price is 7.99. He'll go all the way to .99. The Kindle version can be read on nearly any device / computer, but if you want a hardcopy, the book is still at a reasonable 9.99.<p>Just for clarification--I'm not here to sell books. I'm here to spread ideas and come up with ways to get better books in our hands faster and cheaper. If you have no desire to read Seth's book, but want to help us validate (or invalidate) ideas on how to better reach people to keep book prices down, please let us know.<p>This is but one experiment. We've got other ideas and eventually other books will be published through the Domino Project. Please comment in here and ask about the project or contact me, my info is in my profile.<p>You can subscribe to the newsletter at http://bit.ly/h3C0vv .<p>More info on the Domino Project at http://thedominoproject.com ====== Raphael Who wants free books? I'm a member of the Internet. Web pages have disrupted publishing and text distribution in a big way. One of the things we're experimenting with now is how to build links and get relevant search results. It'll drop the price of all text to $0.00. The text version can be read on nearly any device, but if you want a hard copy, you can use a printer. This is but one experiment. We've got other ideas and eventually text will lead to images and audio. Please comment anywhere. More info on the project at <http://w3.org/> ------
hackernews
Social stress can lead to drug craving and relapse in cocaine-dependent (CD) individuals. In addition, CD individuals often favor drug use over social interactions. Moreover, social avoidance and lack of trust are significant obstacles to effective treatment. Currently, there are no FDA approved medications for the treatment of cocaine dependence and behavioral interventions have had limited success in sustaining abstinence. Data from human neuroimaging studies using blood oxygen level dependent (BOLD) functional magnetic resonance imaging (fMRI) suggest that top-down
nih_exporter
The chemistry and photochemistry of the compound 4'-iodo-8-methoxyflavylium tetrafluoroborate was studied in solvent mixtures of water and ethanol. The trans-chalcone form (Ct) is always the most stable species at equilibrium. In particular, for the first time, Ct and not the flavylium cation is reported as the most stable species in mixtures containing water at pH 1.0. The rate of Ct formation as a function of the water content exhibits a bell
pubmed_abstracts
**PURPOSE:** To compare operative times for specific portions of deep inferior epigastric perforator (DIEP) flap harvest as well as perforator selection in cases where preoperative CTA imaging had been reviewed by the harvesting surgeon preoperatively vs. not reviewed. **METHODS:** This is a prospective pilot study of two patient groups undergoing breast reconstruction using DIEP flaps. We utilize a two-surgeon approach for all DIEP flaps and for the experimental group the harvesting surgeon was blinded to the results of the preoperative CTA, whereas in the control group the harvesting surgeon had assessed the CTA preoperatively. Patients were randomized to the blinded vs. non-blinded group based on surgical day. Operative times were recorded for initial perforator identification, perforator selection, and total flap harvest time and were compared between groups. The choices of perforators (medial, intermediate, or lateral) were also compared between groups. Within the blinded group, perforator selection by the blinded harvesting surgeon was compared to the pre-operative perforator selection by the non-blinded, non-harvesting surgeon based on CTA imaging. **RESULTS:** From June-November, 2018, 13 DIEP flaps were performed where the surgeon was blinded to the preoperative CTA results, and 49 flaps were not blinded. The mean time to first perforator identification was longer in the blinded vs. the non-blinded group \[29.2 minutes (SD=8.2) blinded group, 15.1 minutes (SD=6.7) non-blinded, p\<0.0001\]. Time to perforator decision-making was also longer in the blinded vs. the non-blinded group \[25.3 minutes (SD=9.11) blinded, 5.75 minutes (SD=11.2) non-blinded, p\<0.0001\]. Mean total harvest time was significantly longer in the blinded vs. the non-blinded group \[114.6 min (SD=32.5) blinded, 72.6 min (SD=23.7) non-blinded, p\<0.0001\]. Medial row perforators were used in 53.4% (7/13) of flaps in the blinded group, and 42.8% (21/49) of flaps in the non-blinded group, p=.479. Intermediate row perforators were used in 15.4% (2/13) of flaps in the
pubmed_central
Q: How to create a versioning/history/revision system for contents published by users? After reading a lot of SO questions about Keeping page changes history or How to version control a record in a database (for example), I can't find a real elegant solution to do the work. Now, let's try to explain as clear as possible what we need, for this simple revision system, that allows registered users to post some articles, and other users to submit a revision of those articles, and then some moderators users to check those revisions. MySQL database The database contains an articles table with the following simplified fields: ARTICLE(id, id_user, title, content, date); To implement the revision/history versions, I guess that we'll have the following table: REVISION(id, id_article, revision_id_user, id_moderator, revision_date, revision_title, revision_content, revision_description, revision_check); With the relation : ARTICLE 0,n <---> 1,1 REVISION Workflow A user create an ARTICLE, which is inserted in the ARTICLE table (terrific !) Another user makes an update of this ARTICLE, this update is recorded in the REVISION table, and is queued for the moderator users. (revision_check=0). A moderator user validate the REVISION(revision_check=1), then the ARTICLE(content) gets the REVISION(revision_content) value. My questions Is this workflow seems to be a good way to do it? Because, I see a mistake: if there are several REVISIONs for an ARTICLE: Should we take the content of the last submitted REVISION or the original ARTICLE? Or, should we need to block the revisions as no other REVISION could be submitted while the last isn't checked. Is there a way to record light versioning? By the way, is it possible to insert in the REVISION table, only the updated content through a SQL, PHP or js compare function? And how to display it like SO do it? Because I'm afraid that the REVISION table will be very heavy. Bonus : how does SO? Any idea
stackexchange
The present invention generally relates to a signal processing circuit for slicing binary signals in a receiver. More particularly, the present invention relates to a signal processing circuit that generates an adaptive slicer threshold by using either average amplitude data of both binary ones and binary zeros, or minimum amplitude data of a binary one and maximum amplitude data of a binary zero. 2. Discussion of the Related Art Data communication using binary signals takes place at high rates in various applications. For example, in optical data systems, data transmission rates of 10 gigabits/second (Gb/s) and higher are utilized. In such binary data communication systems, a receiver is used for receiving the binary signals from a transmitter. In many cases, the signals received are of a low level and are accompanied by noise and/or jitter (see FIG. 2). The true binary nature of a distinct rectangular pulse, usually designating a binary one, sometimes can be partly obscured by noise, and result in data errors that adversely affect signal processing equipment to which the output of the receiver is applied. To improve the ability to accurately recapture the binary signals passing through the receiver before being supplied to other equipment, a slicing technique is employed. This technique involves slicing the received binary signal at a level about the midpoint of its amplitude, that is, between its maximum and minimum values. The portion of the received binary signal appearing above the slicing level corresponds to a binary one and the portion below the slicing level corresponds to a binary zero (see FIG. 1 and FIG. 2). In one type of prior art slicer circuit, the slicer threshold is fixed at a certain voltage level. A variable offset voltage is combined with the voltage level of the received binary signal to maintain the midpoint of the binary signal that is applied to the slicer at the fixed slicer threshold. However, adjusting the received binary signal to maintain the midpoint of the binary signal at a fixed level adds complexity to a system. In another type of prior art slicer circuit, the slicer threshold is varied so as to be at the midpoint of the amplitude of the binary signal, wherein the midpoint is calculated to be the average of the maximum and minimum values of the received binary signal. However, the midpoint that is calculated using the maximum and minimum values of the received binary signal is the midpoint between the outer edges of the data eye 100, 200 (see FIG. 1 and FIG. 2). The data eye 100, 200 is a plot of
uspto_backgrounds
The advantage of mesocosm studies is that environmental gradients of interest (e.g., warming temperatures) can be controlled or combined to separate and understand the underlying mechanism(s) affecting the growth or survival of species, populations or communities of interest. By manipulating gradients (e.g., climate variables) mesocosm studies can extend beyond available data helping to build better models of the effects of different scenarios. Mesocosm experiments also tend to include replication of different treatment levels. Manipulating something can give us an idea as to what to expect if something were to occur in that ecosystem or environment. For indoor mesocosms, growth chambers allow us to control the experiment. You can place plants in a growth chamber and manipulate the air, temperature, heat and light distribution and observe the effects when exposed to different amounts of each factor. Greenhouses also contribute to mesocosm studies although sometimes, it may induce climate change, interfering with the experiment and resulting in inefficient data. Disadvantages Using growth chambers for a laboratory experiment is sometimes a disadvantage due to the limited amount of space. Another disadvantage to using mesocosms is not adequately imitating the environment, causing the organism to avoid giving off a certain reaction versus its natural behavior in its original environment. Examples [A] Mazzeo and colleagues examined the eating habits of Hoplias malabaricus fish when exposed to different amounts of phytoplankton, zooplankton, and competition. Three months prior to conducting the experiment, they maintained an average precipitation, air temperature, and overall subtropical environment. Using 12 units, they filled them with aquifer water, sand and plants and kept them in isolation until the environment became suitable for phytoplankton to emerge. After careful preparation, Mazzeo et al. began the experiment dividing those units into categories of a control (zooplankton and phytoplankton) and 3 experiments: (Jenynsia multidentata with zooplankton and phytoplankton), (juvenile Hoplias malabaricus with zooplankton and phytoplankton), and (Large Hoplias malabaricus, Jenynsia multidentata, zooplankton, and phytoplankton) and observed biomass differences within different conditions. [B] Flanagan and McCauley tested the effects of climate warming on carbon dioxide concentration on shallow ponds by creating an eight-cylinder shaped in situ mesoc
wikipedia_en
![**Histograms of azimuthal velocities in dense bacterial suspension.** (a and b) individual bacteria swimming near (a) the top oil/water interface and (b) the bottom PDMS interface, (c and d) fluid flow with tracer particles near (c) the top oil/water interface and (d) the middle of PDMS microwell, and (e) PIV velocity field of collective bacterial motion observed under bright field. The blue bars correspond to the probability of CCW rotation while the red bars to CW rotation. We also analyzed collective motion in two different sizes of microwells: $R = \SI{35}{\micro\meter}$ (small blue circle) and $R=\SI{50}{\micro\meter}$. In the larger microwells, we considered two regions: the boundary layer within from the lateral boundary (larger blue diamond), and the bulk that is more than away from the lateral wall (green filled square).[]{data-label="fig.s5"}](figureS5_5.jpg) solid interface (Fig.\[fig.s4\](a)) Top fluidic interface (Fig.\[fig.s4\](b)) Bottom solid interface (Fig.\[fig.s4\](c)) -------------------------- ------------------------------------- ------------------------------------------- -------------------------------------------- spatial constraint Boundary-free Circular microwell Circular microwell sample size, N N = 264 N = 1469 N = 876 average angular velocity : Sample sizes and average velocities of histograms presented in Fig. \[fig.s4\] (PTV (bacteria)). \[table.s1\] [|c|c|c|c|ll]{} & **$R$= , boundary** & **$R$= , boundary** & **$R$ = , bulk** &\ PTV (bacteria) TOP & $N = 491$, $\langle v_{\theta}\rangle = \SI{4.24}{\micro\meter}$/s & $N = 784$, $\langle v_{\theta}\rangle = \SI{3.44}{\micro\meter}$/s & $N = 1129$, $\langle v_{\theta}\rangle = \SI{0.369}{\micro\meter}$/s &\ PTV (bacteria) BOTTOM & $N = 619$, $\langle v_{\theta}\rangle =
arxiv
tc_check_packets "dev $h2 ingress" 102 1 check_err $? "Did not match on correct filter (0x18)" $MZ $h1 -c 1 -p 64 -a $h1mac -b $h2mac -A 192.0.2.1 -B 192.0.2.2 \ -t ip tos=20 -q tc_check_packets "dev $h2 ingress" 102 2 check_fail $? "Matched on a wrong filter (0x20)" tc_check_packets "dev $h2 ingress" 101 1 check_err $? "Did not match on correct filter (0x20)" tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower log_test "ip_tos match ($tcflags)" } match_indev_test() { RET=0 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ $tcflags indev $h1 dst_mac $h2mac action drop tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ $tcflags indev $h2 dst_mac $h2mac action drop $MZ $h1 -c 1 -p 64 -a $h1mac -b $h2mac -A 192.0.2.1 -B 192.0.2.2 \ -t ip -q tc_check_packets "dev $h2 ingress" 101 1 check_fail $? "Matched on a wrong filter" tc_check_packets "dev $h2 ingress" 102 1 check_err $? "Did not match on correct filter" tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower log_test "indev match ($tcflags)" } setup_prepare() { h1=${NETIFS[p1]} h2=${NET
github
Beautiful original cover art that is reminiscent of subject matter. Book cover by B-Ro for Tom Maloney. Striking cover design that uses a single bold color, black silhouette, and typography to make an impression. Book cover by Pulp ART for Alia Tero. Dramatic cover design that uses a black and white photo, bold typeface, and shadows to suggest a mystery. Book cover by Llywellyn for LIterary Fiction. Typography The font for this sci-fi novel is instantly setting the mood, but still totally legible. Book cover by B&J for Red Planet. The fonts you select communicate more than the words they spell out, so choose based on the content and tone you’re aiming for. Don’t get so creative with fonts that your title and other information is tricky to read. Set the right mood with your font; choose a more flowing font to suggest romance, a whimsical font for humor, and a bold, strong font to create a sense of drama or adventure. Title Think like a reader, not as the author. Aim for clarity, not cleverness. Your title is the first (and sometimes the only) thing people read. Does it communicate what the book is about visually? Your goal is to use visual elements and design to show potential readers what the book is about and create a feeling in them that gives them a sense of what reading the book will be like. This book cover for The Girl on the Train immediately conjures up a sense of mystery and lets you know you’re in for a thrilling page-turner. The blurriness of the typeface may just be the motion of the train—or it could be something more enigmatic about the girl and the story itself. Consider how you can use typography, color, and graphics to create this kind of communicative imagery for your book cover. Subtitle Use a subtitle only if it is needed to clarify or elaborate on your book’s topic. Ideally your subtitle compliments the title and adds additional descriptive detail. If it makes sense—and especially if you’re going to be epublishing—include any searchable keywords that are not in your title. Back cover – Your front cover did its job if the shopper made it to the back cover; it got them interested enough to give the book a second look
pile-cc
Let v(z) be the third derivative of 155*z**8/112 + 103*z**5/30 + z**2 - 99*z. What is the third derivative of v(l) wrt l? 27900*l**2 Let t(v) = 28*v**2 + 19*v. Let j(o) = 0*o + 3*o + 19*o**2 + 10*o. Let w = 46 - 53. Let i(a) = w*j(a) + 5*t(a). Find the second derivative of i(u) wrt u. 14 What is the derivative of 166 + 77*y + 129*y - 63*y + 25*y wrt y? 168 Let n = 16 - -19. Find the second derivative of 10*i - n*i**4 - 2*i**2 + 2*i**2 - 8*i wrt i. -420*i**2 What is the derivative of 64*s**4 + 2101*s - 2101*s + 479 wrt s? 256*s**3 Let p(t) = 52*t**3 + 32*t**2 + 3. Let d(l) = 103*l**3 + 64*l**2 + 5. Let g(j) = 6*d(j) - 10*p(j). Find the third derivative of g(q) wrt q. 588 Let j(p) be the first derivative of 2*p**6/15 + p**4/2 + 10*p - 9. Let m(f) be the first derivative of j(f). What is the third derivative of m(w) wrt w? 96*w What is the third derivative of -2*s**2 - 21 + 27 + 4*s**3 + 6*s**2 - 26*s**3 - 7 wrt s? -132 Let r(f) = -80*f - 66. Let p(z) = -2. Let k(m) = 3*p(m) - r(m). What is the derivative of k(o) wrt o? 80 What is the second derivative of -24*o + 108*o + 20*o + 41*o**5 - 2*o**4 + 23*o
dm_mathematics
The information provides further details about: -- the $1.2 billion charge to shareholders' equity announced in the third quarter and the transactions related to that charge; -- a restatement of prior years' financial statements to reflect this reduction in shareholders' equity, the consolidation of three entities and prior year proposed audit adjustments and reclassifications; -- the Special Committee appointed by the Enron Board of Directors to review transactions between Enron and related parties; -- the LJM
enron_emails
FACTS The facts most favorable to the judgment reveal that on August 12, 1987, Officer Patrick Tompkins (Officer Tompkins) of the Marion County Sheriff's Department stopped Parker for driving through a red light. Upon observing that Parker appeared intoxicated, Officer Tompkins offered Parker the opportunity to submit to a chemical sobriety test (Breathalyzer). Parker refused. Officer Tompkins then informed Parker of the consequences of his refusal under the Implied Consent Law. Again Parker refused to submit to a chemical sobriety test. Later, at the lock-up, Parker changed his mind and requested to take the alcohol breath test.[2] Officer Tompkins refused to give Parker the test. ISSUES The issues presented by Parker are restated as: 1. Was the evidence sufficient to sustain Parker's conviction of operating a vehicle while intoxicated? 2. Were Parker's statutory and constitutional rights violated when the arresting officer refused Parker's request for a chemical sobriety test when Parker had twice refused an offer by the arresting officer? DECISION ISSUE ONE — Was the evidence sufficient to support Parker's conviction of operating a vehicle while intoxicated? PARTIES' CONTENTIONS — Parker claims the evidence is insufficient to sustain the conviction because his testimony *130 contradicted the testimony of the arresting officer. The State responds that the evidence is sufficient. CONCLUSION — The evidence is sufficient to sustain the conviction. If there is substantial evidence of probative value to support the judgment, we will not reverse. Clark v. State (1987), Ind. App., 512 N.E.2d 223. Officer Tompkins testified that Parker had bloodshot eyes, slurred speech, the odor of alcohol on his breath, and difficulty in removing papers from his glove compartment. Parker also failed the field sobriety finger-to-nose test and was unable to recite the alphabet in proper sequence. Parker's failure of these tests supported Officer Tompkins' belief that Parker was intoxicated. Deputy Larry Harding, who was also on the scene, corroborated Officer Tompkins' testimony and additionally noted that Parker was staggering. The fact that Parker drove through a red light was further evidence that the influence of alcohol impaired his thought and action to such an extent as to endanger others. See id. The evidence was sufficient to sustain the conviction for operating a vehicle while intoxicated. See Jennings v. State (1987), Ind. App., 503 N.E.
freelaw
The truth stops there, the rest is "science" fiction. It would be true if the lethality was over 5%, which is just not possible (lethality is not yet known exactly, but will probably be between 0.6% and 3%, probably around 1%. There is no need to be afraid, however this is still a really dangerous virus and thousands of peoples will die in each countries. ------ empiricallytrue Starts speculative, gets fantastical, ends up deeply paranoid. ~~~ DyslexicAtheist which part did you feel was _fantastical_ or _deeply paranoid_? I'm actually terrified by doing the math with the most conservative, best case outcome: under that I will a) be dead, b) know somebody who has died, c) many in my surrounding will struggle because of the socio-economic effects and lack the reserves to deal with the primary effects (emotional) and secondary effects (emotional and financial) ... also a/b/c are in no way mutually exclusive ~~~ kaazhan \- If you have no breathe/heart chronic problems, and you are under 40 y/o, your death chance, IN CASE YOU DO HAVE the coronavirus, is below 1%. \- There will not be a strong economic impact that will stop globalisation. Maybe there will be economics short term changes. Maybe there will be important. But what is said here is apocaliptic. You should read about the SRAS (15 times more deadly, less infectious), or about ebola (40-80 times more deadly, less infectious). ebola, SRASS, H1N1, H1Z1, mad cow, all of thoses deases have killed a lot of peoples. Not in EU nor US. only poor non-white people have died. Everybody is really afraid by this one only because rich countries will have to do something, not just watch poor black people die on TV. ebola killed 11k peoples during 2014-2016. The only really special thing is that you've between 2 and 14 days, if you caught coronavirus, during which you are infectious. the dease have strong contagious capabilities because of that. But that's clearly not the most dangerous
hackernews
The prevalence, morbidity and mortality of asthma have increased dramatically over the last two decades despite concomitant advances in the understanding of the physiology of asthma and improved treatment modalities. These increases come at great cost in terms of health care dollars spent, school absences, psychosocial adjustment problems and limitations on activities. Experts agree on the importance of asthma education, and asthma education programs are available. However, the lack of trained personnel, time, and funds for such programs remain obstacles to widespread dissemination of asthma education. In
nih_exporter
One hundred and twenty 30-day-old specific-pathogen-free chickens were inoculated with the liposomal inactivated avian pathogenic Escherichia coli (APEC) vaccine by eye drop or coarse spraying. All of the chickens produced anti-lipopolysaccharide antibodies of the IgG subclass in their sera as well as IgA antibodies in their oral mucus. The results demonstrated a rise in antibodies in the serum of chickens administered the APEC vaccine through nonparenteral mucosal routes. Bacterial counts in the blood decreased,
pubmed_abstracts
DISCUSSION {#s3} ========== Since the discovery of Brd4 as an epigenetic regulator, a number of studies have characterized target genes and molecular pathways that are regulated by it \[[@R11]--[@R16], [@R19]\]. Recent studies have suggested a model in which Brd4 acts as a scaffold to recruit multiple regulatory proteins such as the hematopoietic transcription factor CEBPβ through direct protein-protein interactions \[[@R16], [@R19], [@R21]--[@R23]\]. The recent finding that NPMc+ and MLL-fusion AML cell lines and primary leukemic cells have sustained activation of autophagy and that autophagy is reduced with Brd4 inhibition \[[@R10]\] suggested that Brd4 is a regulator of autophagy. The present study provides more direct evidence that Brd4 in conjunction with CEBPβ plays an important role in the transcriptional regulation of autophagy genes in certain AML cells. Inhibition of Brd4 function with both well-validated inhibitors and inducible Brd4 shRNAs reduced the expression of Atg3, Atg7, and CEBPβ, each of which plays an important role in the induction of autophagy. Genome-wide occupancy studies of Brd4 using Brd4-ChIP-seq demonstrated that Brd4 is located at the promoter and enhancer regions of CEBPβ and is present in conjunction with CEBPβ at several other autophagy-associated genes, suggesting an integral role for CEBPβ in autophagy. This result is further supported by the marked reduction of Atg3 and Atg7 expression that follows depletion of CEBPβ. These data, together with those obtained by Roe et al \[[@R19]\], indicate that Brd4 acts as an upstream regulator responsible for the recruitment of CEBPβ to core genes enabling autophagy in select cell types. Somatic mutations in KEAP1 and NRF2 occur in a variety of cancer types and are important mediators of aberrant anti-oxidant responses \[[@R39], [@R40]\]; however, no such mutations have been reported to date in human leukemia cells (The Cancer Genome Atlas, TCGA, database) \[[@R41]--[@R43]\]. Our study supports a model in which Brd4 increases the expression of Keap1, resulting in down-regulation of the Nrf2-antioxidant pathway and increases in both ROS levels and autophagy in NPMc+ AML cells \[[@R36], [@R37]\]. Conversely, a reduction in Keap1 expression by Brd4 inhibition or CRISPR-cas 9 excision
pubmed_central