text
stringlengths 173
4.38k
| subset
stringclasses 13
values |
|---|---|
/*
* ProGuard -- shrinking, optimization, obfuscation, and preverification
* of Java bytecode.
*
* Copyright (c) 2002-2020 Guardsquare NV
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the Free
* Software Foundation; either version 2 of the License, or (at your option)
* any later version.
*
* This program is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
* more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
package proguard.optimize.info;
import proguard.classfile.*;
import proguard.classfile.visitor.MemberVisitor;
/**
* This MemberVisitor marks all methods that it visits as not having any side
* effects. It will make the SideEffectMethodMarker consider them as such
* without further analysis.
*
* @see SideEffectMethodMarker
* @author Eric Lafortune
*/
public class NoSideEffectMethodMarker
implements MemberVisitor
{
// Implementations for MemberVisitor.
public void visitAnyMember(Clazz Clazz, Member member)
{
// Ignore any attempts to mark fields.
}
public void visitProgramMethod(ProgramClass programClass, ProgramMethod programMethod)
{
markNoSideEffects(programMethod);
}
public void visitLibraryMethod(LibraryClass libraryClass, LibraryMethod libraryMethod)
{
markNoSideEffects(libraryMethod);
}
// Small utility methods.
private static void markNoSideEffects(Method method)
{
MethodOptimizationInfo.getMethodOptimizationInfo(method).setNoSideEffects();
}
public static boolean hasNoSideEffects(Method method)
{
return MethodOptimizationInfo.getMethodOptimizationInfo(method).hasNoSideEffects();
|
github
|
Today, for instance, ICANN is shaking up the web with a plan that's been a decade in the making: adding thousands of new top level domains beyond the original ones (.xxx, .google, .museum, and so on now join domains like .com, .edu, .gov), driving a new Internet land grab. This led to widespread criticism, including from the U.S. government, which has warned ICANN about the group's apparent conflicts of interest. Still, when the UN tried to take control over some of ICANN's jurisdiction earlier this year, the U.S. made sure that it didn't happen.
With that in mind, it's pretty understandable, then, that some countries want more of a say. It's as if they're trying to get a fair chance in a soccer game, when the U.S. both owns the stadium, pays the referees' paychecks and also wrote the rulebook. This is also precisely why organizations like the UN exist. Sure, the U.S. is a big stakeholder on the web with one of the biggest Internet-connected populations in the world. But Asia still makes up over half of the world's population of Internet users, and they've never really gotten a say in how it's run. Many countries argue that the shifted balance of interest in the Internet is a strong argument for UN intervention. Another reason: some countries see incidents like the Stuxnet virus, thought to have been developed at least partially in the U.S., as evidence of the risks that come with uniltateral Internet oversight in the age of cyberwar.
Meanwhile, the International Telecommunications Union (ITU), which organized WCIT-12, has been trying hard not to take sides. After the world's nations failed to ratify the treaty, ITU secretary general Hamadoun Toure said that the treaty would bring the signatories "increased transparency in international mobile roaming charges and competition," even if there's still no way to enforce the treaty. Even U.S. Ambassador Terry Kramer, the head of the U.S. delegation, noted that countries can already enact Internet regulations within their own borders, and they do. “If someone wants to, that’s their prerogative, but we’re hoping that’s not an easy task,” he said on a conference call. "History will show that the conference has achieved something extremely important," continued Toure, ever the optimist. "It has
|
pile-cc
|
Factor 4*d**3 + 70*d**2 + 352*d + 456.
2*(d + 2)*(d + 6)*(2*d + 19)
Factor 2*h**5 - 14*h**4 + 16*h**3 + 32*h**2.
2*h**2*(h - 4)**2*(h + 1)
Factor -5*g**3 - 7430*g**2 - 29660*g - 29640.
-5*(g + 2)**2*(g + 1482)
Factor 5*o**3 - 650*o**2 - 5*o + 650.
5*(o - 130)*(o - 1)*(o + 1)
Find u, given that u**3 + 5*u**2 - 13*u + 7 = 0.
-7, 1
Determine g so that g**2/2 + 1225*g/2 = 0.
-1225, 0
Factor s**2/3 - 34*s + 867.
(s - 51)**2/3
Let f**2/3 + 11*f - 3034/3 = 0. What is f?
-74, 41
Let 4*c**5 - 12*c**4 - 4*c**3 + 12*c**2 = 0. Calculate c.
-1, 0, 1, 3
Find z, given that -16*z**5 + 36*z**4 + 200*z**3 + 108*z**2 - 40*z = 0.
-2, -1, 0, 1/4, 5
Solve -3*a**2/4 + 339*a/4 + 351 = 0 for a.
-4, 117
Determine f, given that -4*f**3 + 5644*f**2 - 5632*f - 11280 = 0.
-1, 2, 1410
Factor -4*t**2 + 32*t - 28.
-4*(t - 7)*(t - 1)
Let 3*s**3 + 86*s**2/3 = 0. What is s?
-86/9, 0
Factor 4*k**5/5 + 48*k**4/5 + 188*k**3/5 + 208*k**2/5 - 192*k/5
|
dm_mathematics
|
Further to our conversation we are pleased to attach an E Mail copy of the
Terms of Business in the name of the new entity.
Copies together with a covering letter will be forwarded to you shortly
Regards
Jacqui Tokley <<201543.doc>> <<201544.doc>>
*************************************************************************
The information in this internet E-mail is confidential and is intended
solely for the addressee. Access, copying or re-use of information in
|
enron_emails
|
Plaintiff-Appellant,
ON APPEAL FROM THE
v. UNITED STATES DISTRICT
COURT FOR THE EASTERN
CROSSMARK, INC., DISTRICT OF MICHIGAN
Defendant-Appellee.
___________________________________/
BEFORE: SUHRHEINRICH, COLE and GILMAN; Circuit Judges.
SUHRHEINRICH, Circuit Judge. Plaintiff Mary Sue Gjokaj (Gjokaj) appeals the district
court’s grant of summary judgment in favor of defendant CROSSMARK, Inc. (CROSSMARK).
We Affirm.
Gjokaj, an at-will employee, worked as an Office Manager/Human Resources Coordinator
in CROSSMARK’s Detroit, Michigan office. She was terminated after attending a court hearing
where a CROSSMARK employee having an affair with a co-worker sought a personal protection
order against the co-worker’s wife for sending her threatening letters. Gjokaj did not inform
CROSSMARK about the hearing until after it occurred.
CROSSMARK terminated Gjokaj due to a loss of confidence in her ability to perform her
duties as Human Resources Coordinator. Specifically, CROSSMARK maintains that it lost
confidence in Gjokaj for three reasons: (1) the failure to report an affair between two employees, (2)
the failure to report letters that potentially posed a safety threat to another employee and the office,
and (3) attending a court hearing involving two CROSSMARK employees without informing
CROSSMARK, where her attendance was perceived to be on behalf of the company.
Gjokaj contends that the reasons given were pretextual and that the true reason
CROSSMARK fired her was because she went to court. Gjokaj claims that (1) her termination
violated a Michigan public policy protecting an employee’s right to go to court and (2) her
attendance at the hearing was a protected activity under the Michigan Elliott-Larsen Civil Rights Act.
M.C.L. §§ 37.2101-37.2804.
We agree with the district court that neither claim provides Gjokaj with a viable cause of
|
freelaw
|
So vi is a visual on-screen version for a monitor terminal. Duh! Took me years
and years to grok this simple concept.
~~~
cbm-vic-20
If teletypes seem clunky and primitive, remember this is still miles ahead of
the previous computer programming interface: punch cards. TTYs allowed real-
time interactive use of the computer. Even if only one line at a time.
------
jakecopp
> When the Big Snow of 1978 hit, it came with plenty of warning. So I took two
> cases of my favorite beer and a full box of terminal paper home, and
> reminded the MIT operators to set the Multics machine for unattended reboot.
> The blizzard paralyzed the Boston area for a week, but I was able to work.
> The MIT Multics had only a few users logged in, and response was great.
This made me smile!
------
n4r9
> The first people to have home terminals were those system programmers who
> might be called at any hour to investigate or repair a problem with the
> time-sharing system. These folks took home a machine that might cost as much
> as half a year's salary, and had a leased phone line connected to the MIT
> data PBX installed at home. They discovered that having a machine at home
> was useful not only for fixing the operating system, but also for
> programming and writing documents from home, and for sending electronic mail
> to other users on the MIT system.
Imagine being one of the first people in the world to discover that you could
sit at home and tap out messages to other people sitting at home, who'd pick
them up instantly (or at their leisure).
~~~
jakecopp
I wonder what things are just happening now that are the equivalent; the first
people to experience something that will be so commonplace and useful.
------
jakedata
I fished a DEC printing terminal and 300 baud modem out of a dumpster and got
it all working again in the mid 80s. Obsoletely fabulous for dialing up the
Northern Lights BBS and it prepared me for other exciting developments in IT.
------
kristianp
I can see the motivation for APL in these slow terminals. It's surprising how
long it took for screen-based
|
hackernews
|
The major objective of my laboratory is to identify host factors that contribute to infectious and other complex diseases. The tremendous impact of infectious diseases on global health, and the association of many human pathogens with common cancers, call for multiple research strategies to elucidate the mechanisms of infection and pathogenesis. Our strategy is to search for genetic variants that differentially affect rates of infection, or the course of pathogenesis, and which thereby identify the gene containing the variant as participating in the process of infection or pathogenesis, increasing knowledge of the mechanisms
|
nih_exporter
|
[Lymph node metastases of unknown primary tumors. Sense and nonsense of a complicated search].
Malignant neoplasms are quite frequently (5% in our material) first diagnosed from their metastases. Detecting the site of the primary usually involves a time-consuming and costly work-up unpleasant for the patient. In a retrospective analysis of 60 cases of supraclavicular, cervical and axillary lymph node metastases, an attempt is made to establish guidelines for more economical and rational investigation. The most important
|
pubmed_abstracts
|
She was loaded with aspirin and ticagrelol and she underwent diagnostic angiogram on day 4 post hospital admission.
At the beginning of the procedure, the left main stem was engaged, however dampened pressure was noted and a test shot showed left main stem occlusion with dissection (Fig. [1](#rjy121F1){ref-type="fig"}).
{#rjy121F1}
The patient acutely became hemodynamically unstable and suffered a cardiac arrest. Cardiopulmonary resuscitation was started and the patient was intubated. Return of spontaneous circulation (ROSC) was achieved with inotropes, vasopressors and intra-aortic balloon counterpulsation. Following ROSC, angiographic wires were passed into the coronaries. However, the operator was unable to wire the true lumen of the circumflex artery (Fig. [2](#rjy121F2){ref-type="fig"}).
{#rjy121F2}
At this point, decision was made to transfer the patient to our cardiothoracic unit for emergency coronary artery bypass graft. The patient was transferred to our unit with the angiographic wires left on purpose into the coronaries.
After arrival to our cardiothoracic unit, the patient was immediately taken to the operating room. Transoesaphageal echocardiography demonstrated a poor-left-ventricular-function (ejection fraction 29%) with anterior, antero-septal and antero-lateral regional wall motion abnormalities. Sternotomy was performed and cardiopulmonary bypass established with mild hypothermia (34 C°). Antegrade cardioplegia was administered and asystole was achieved. On visual inspection, the coronaries appeared extensively dissected therefore the arteriotomies were elongated proximally and distally until the true lumen could be identified. Subsequently two saphenous vein grafts were grafted onto the LAD and OM1, respectively. In order to identify the true lumen, the arteriotomy was extended past the dissection point in case of the OM1 and guided by the wire in case of the LAD. Proximal anastom
|
pubmed_central
|
import java.awt.image.BufferedImage;
import java.io.File;
import java.util.concurrent.TimeUnit;
import javax.imageio.ImageIO;
public class ImageProcessor1 implements Runnable {
BufferedImage tempImg;
public static int blackPixel = 0;
public ImageProcessor1(final String path) throws Exception {
final long start = System.nanoTime();
tempImg = ImageIO.read(new File(path));
// Use tracing, profiling and sampling to proof performance issues and fixes
System.out.println("ImageIO took " + TimeUnit.NANOSECONDS.toMillis(System.nanoTime() - start)
+ " ms.");
}
@Override
public void run() {
long start = System.nanoTime();
final int height = tempImg.getHeight();
System.out.println("Getting height '" + height + "' took "
+ TimeUnit.NANOSECONDS.toMillis(System.nanoTime() - start) + " ms.");
start = System.nanoTime();
final int width = tempImg.getWidth();
System.out.println("Getting width '" + width + "' took "
+ TimeUnit.NANOSECONDS.toMillis(System.nanoTime() - start) + " ms.");
start = System.nanoTime();
// reuse variables
int argb;
int red;
int green;
int blue;
for (int i = 0; i < width; i++) {
for (int j = 0; j < height; j++) {
// HOT LOOP. Do as little as possible. No println calls!
argb = tempImg.getRGB(i, j);
// inline all method calls
red = argb >> 16 & 0xff; // red
green = argb >> 8 & 0xff; // green
blue = argb & 0xff; // blue
if (red < 125 && red > 105 && green < 125 && green > 105 && blue < 125 && blue > 105) {
blackPixel += 1;
}
}
}
|
stackexchange
|
U.S. Pat. No. 3,691,584 (Drew et al.) also discloses an oscillating showerhead, but utilizes a nozzle mounted on a stem that rotates and pivots under forces places on it by water entering through radially disposed slots into a chamber around a stem. Although this showerhead is simpler than those of Brewer and Heitzman, it still includes a large number of piece requiring precise dimensions and numerous connections between pieces. Furthermore, the Drew showerhead relies upon small openings for water passageways and is subject to mineral buildup and plugging with particles.
U.S. Pat. No. 5,467,927 (Lee) discloses a showerhead with an apparatus having a plurality of blades designed to produce vibration and pulsation. One blade is provided with an eccentric weight which causes vibration and an opposite blade is provided with a front flange which causes pulsation by momentarily blocking the water jets. Again, the construction of this showerhead is rather complex and its narrow passageways are subject to mineral buildup and plugging with particulates.
U.S. Pat. No. 5,704,547 (Golan et al.) discloses a shower head including a housing, a turbine and a fluid exit body, such that fluid flowing through the turbine causes rotation of the turbine. The rotating (spinning) turbine can be used to cause rotation of the fluid exit body and/or a side-to-side rocking motion in a pendulum like manner.
U.S. Pat. No. 4,073,438 (Meyer) discloses a sprinkler head having a housing with an inlet, a water distributing structure having a nozzle on one end and a cup shaped element at the opposite end which is operative in response to the tangential flow of water into the housing for effecting the orbital movement of the nozzle. There is also disclosed a disk that rotates in rolling contact with a surface within the housing for effecting the fractional rotation of the nozzle. The cup shaped element rotates about the longitudinal axis in response to the flow of water from the inlet.
A particularly useful action for a showerhead is referred to as "wobbling." The term "wobbling" may be defined as the motion of a circular member rolling on its edge along a surface following a circular path. A common example of wobbling is what occurs when a coin is spun on its edge over a smooth surface. The coin begins spinning or rotating in a vertically upright position, but as the coin
|
uspto_backgrounds
|
On 21 February 2020, it was confirmed by the couple that they would not use the "Sussex Royal" brand name "in any territory" following their withdrawal from public life in spring 2020 and all the applications filed for trademarking the name were removed. Meanwhile, a spokesperson for the couple added that they would continue to work with their existing patronages in addition to establishing a non-profit organisation.
On 27 February 2020, Bill Blair, the Canadian Minister of Public Safety and Emergency Preparedness announced that it would cease providing security for the couple on 31 March, "in keeping with their change in status." In the same announcement, it was confirmed that the Royal Canadian Mounted Police provided security for the couple on an as needed basis, since their arrival to Canada in November 2019.
Reactions
In Britain
The initial British reactions to the 8 January announcement was of surprise, and concern whether the decision was properly thought through; the story dominated the British news cycle. The Washington Post noted several British polls that showed general support for the couple's desire to move, but with concern over the future exposure of the British exchequer to the couple (and issues of the renovation costs of Frogmore Cottage), and with unhappiness that the Queen's approval had not been sought for their announcement.
British prime minister Boris Johnson distanced himself from the news, stating: "The royal family is one of the great, great assets of this country. I’m sure they are going to sort it out and I don’t think it’s necessarily helped by commentary from me." NBC News reported on analysis implying that the impact to the British economy from the loss of the couple could be material. Madame Tussauds immediately moved its waxwork figures of Harry and Meghan away from the display including the other members of the British royal family to a separate area.
On 19 January, The Daily Telegraph described the final agreement between the couple and the Royal Family as "the hardest possible Megxit", a view shared by many other British news sources; and that "Royal history was made". The Guardian reported that the "outcome is, perhaps, not the half-in, half-out role the couple appear to have anticipated". On 20 January 2020, royal biographer Penny Junor also told The New York Times that "The family is trying to prevent a half-in, half-out arrangement, which doesn’t work". On 22 January, The Guardian published a cartoon
|
wikipedia_en
|
Hence, we shall prove two different statements. One is that the main body of [$\kappa$-]{}indeed reduces ${\mathcal{R}}$ to the sequence ${\mathcal{S}}$ with an optimal merge cost, up to some error that we shall evaluate. The other one is that the sequence ${\mathcal{S}}$, although it might not be a border of any merge tree induced by ${\mathcal{R}}$ for an optimal stable merge policy, is still good enough that the cost penalty incurred by using ${\mathcal{S}}$ as an intermediate state is not too high.
For the sake of readability, and given a sequence of runs ${\mathcal{R}}= (R_1,\ldots,R_\rho)$, we identify below every sub-interval $X$ of $\{1,\ldots,\rho\}$ with the run obtained by merging those runs $R_k$ such that $k \in X$. Accordingly, we have $R_{\{k\}} = R_k$, and we also set $r_X = \sum_{k \in X} r_k$, and so on. Furthermore, if $X = \{x_1,\ldots,x_k\}$, we denote by ${\mathsf{mc}}_X$ the minimal merge cost of a stable merge policy that would sort the sequence $(R_{x_1},\ldots,R_{x_k})$ and merge these runs into the run $R_X$.
\[def:diff:partition\] Let $\mathbf{I} = (I_1,\ldots,I_n)$ and $\mathbf{J} = (J_1,\ldots,J_m)$ be two partitions of the set $\{1,\ldots,\rho\}$ into intervals, and such that $\mathbf{J}$ refines $\mathbf{I}$, i.e., that every interval $J_j$ is contained in some interval $I_i$.
For all $i \leqslant n$, we set $\mathsf{d}_i = \#\{j \colon J_j \subseteq I_i\}$, i.e., $\mathsf{d}_i$ is the number of intervals $I_i$ in which $J_j$ is subdivided. We say that $\mathbf{J}$ is a *$\mathsf{d}$-refinement* of $\mathbf{I}$ if $\mathsf{d}_i \leqslant \mathsf{d}$ for all $i \leqslant n$.
Finally, we call *distortion* between $\
|
arxiv
|
; RUN: opt < %s -newgvn | llvm-dis
target datalayout = "e-p:32:32:32-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:32:64-f32:32:32-f64:32:64-v64:64:64-v128:128:128-a0:0:64-f80:128:128"
target triple = "i386-apple-darwin7"
define i32 @main(i32 %argc, i8** %argv) nounwind {
entry:
br label %bb84
bb41: ; preds = %bb82
%tmp = load i8, i8* %opt.0, align 1 ; <i8> [#uses=0]
%tmp1 = getelementptr i8, i8* %opt.0, i32 1 ; <i8*> [#uses=2]
switch i32 0, label %bb81 [
i32 102, label %bb82
i32 110, label %bb79
i32 118, label %bb80
]
bb79: ; preds = %bb41
br label %bb82
bb80: ; preds = %bb41
ret i32 0
bb81: ; preds = %bb41
ret i32 1
bb82: ; preds = %bb84, %bb79, %bb41
%opt.0 = phi i8* [ %tmp3, %bb84 ], [ %tmp1, %bb79 ], [ %tmp1, %bb41 ] ; <i8*> [#uses=3]
%tmp2 = load i8, i8* %opt.0, align 1 ; <i8> [#uses=0]
br i1 false, label %bb84, label %bb41
bb84: ; preds = %bb82, %entry
%tmp3 = getelementptr i8, i8* null, i32 1 ; <i8*> [#uses=1
|
github
|
She added: "These concessions do not respect the will of the people... we must not let them down".
Although she is not a minister, Mrs Trevelyan is a staunch Brexiteer who said she could not support the draft deal because the negotiations have been built on "the UK trying to appease the EU".
Mrs Trevelyan, who protested for fishermen with Nigel Farage on a boat in the Thames, said the deal would prevent the UK "from independently negotiating access and quota shares" for fishing.
15 November 10am
Esther McVey, work and pensions secretary
Image:Esther McVey reportedly had a contretemps with Mrs May
The Tatton MP was the second cabinet minister to resign on Thursday - and described the draft Brexit agreement as "a risk I cannot be party to".
One of the most vocal opponents of the deal, Ms McVey reportedly had a massive "bust-up" with Mrs May during the five-hour meeting in which the cabinet agreed to the draft text.
15 November 8:50am
Dominic Raab, Brexit secretary
Image:Dominic Raab resigned hours after cabinet agreed on the proposal
Mr Raab, Theresa May's second Brexit secretary, was the first cabinet minister to resign on Thursday morning after the draft was agreed on by cabinet - saying he cannot support it in "good conscience".
15 November 7:20am
Shailesh Vara, Northern Ireland minister
Image:Shailesh Vara was the first Tory to resign after the agreement was passed by cabinet
Mr Vara was the first member of the government to resign after the cabinet approved the draft Brexit agreement.
The morning after it was rubber-stamped he said he could not support the agreement, adding: "This leaves the UK in a halfway house with no time limit on when we will finally be a sovereign nation."
10 November
Jo Johnson, transport minister
Image:Jo Johnson backed another referendum
Proving that Brexit can divide families just as much as the rest of politics, Jo Johnson, brother of Brexit campaigner Boris Johnson, quit as a transport minister last Friday.
He warned the UK was "barrelling towards an incoherent" divorce and called for another referendum on the final terms of Brexit.
A Remain-supporting minister in Orpington, where a majority
|
pile-cc
|
-3
Let s be 7 - (-8)/((-2)/1). Suppose 0 = -3*c - s - 0. Let v = 1 + c. Solve 6*k - k = v for k.
0
Let x = -10 + 8. Let g be (x - (-3)/3) + 4. Solve -3*a = -2*a + g for a.
-3
Let k(x) be the third derivative of -x**6/24 - x**5/60 - x**4/24 - 20*x**2. Let t be k(-1). Solve t*i = -5 - 0 for i.
-1
Let u(r) = -3*r - 16. Let g be u(-8). Suppose z - 2*s = 3 + 1, 2*s = -3*z - 12. Let q be z*1 - g/(-2). Solve q*m + 12 = -m for m.
-4
Suppose 0 = 2*u + u - 24. Suppose 41 = 5*w - 59. Solve u*x = 3*x - w for x.
-4
Suppose 2*d = 3*n + 25 + 5, -3*d - 4*n = -11. Let x(o) = -3*o - 7*o + 2*o**2 - 2 + 0*o**2 - 3*o**2. Let i be x(-9). Solve d = 4*y - i*y for y.
-3
Let f(i) = i**3 + 8*i**2 + 9*i + 16. Let u be f(-7). Solve -8 = -u*l - 4 for l.
2
Suppose 0*b = -3*r + 5*b + 18, 0 = 2*r + 3*b - 12. Let s be 1/(-3) + 14/r. Suppose s*a = f - 2, -3*f = -4*a + 2 - 12. Solve -y - 2*y = f for y.
-2
Let g(n) = n**3 + 16*n**2 + 21*n + 11. Let u be g(-15). Let m = -79 - u. Solve 3*x + 0*x = m for x.
|
dm_mathematics
|
USA: Houston economy seen weathering major layoffs.
By Ellen Chang
11/23/2001
Reuters English News Service
(C) Reuters Limited 2001.
HOUSTON, Nov 23 (Reuters) - Houston's economy, buffered by a broad and diverse tax base, should be able to weather thousands of layoffs from some of the city's major corporations, including energy powerhouse Enron Corp., economists and analysts said.
Financially ailing Enron Corp.
|
enron_emails
|
Merit Systems Protection Board—Litigating
Authority (5 U.S.C. § 1205)
This responds to Assistant Attorney General Babcock’s May 10, 1979,
request for our views concerning the scope o f litigating authority given the
Merit Systems Protection Board under the Civil Service Reform Act,
§ 202(a), 92 Stat. 1111, 5 U .S.C . § 1205(h) (Supp. II, 1978). The relevant
portion o f that subsection o f the Act provides:
Except as provided in section 518 o f title 28, relating to litigation
before the Supreme C ourt, attorneys designated by the Chair
man o f the Board may appear for the Board, and represent the
Board, in any civil action brought in connection with any func
tion carried out by the Board pursuant to this title or as otherwise
authorized by law.
We are asked whether that subsection, despite its broad language, might
properly be interpreted to allow the Board to represent itself only where
the Board takes a legal position in litigation adverse to that o f another
Federal agency. We have reviewed the statute and its legislative history
and conclude that the provision granting litigating authority to the Board
must be read more expansively, in accordance with its plain meaning.
The congressional grant o f litigating authority to the Board had its
origins in § 202(a) o f the Senate bill, S. 2640. The House bill, H. 11280,
contained no comparable provision. The only discussion o f the litigating
authority provision that we have found in the reports and floor debates on
the Reform Act appears in the report o f the Senate Governmental Affairs
Committee, S. Rept. No. 969, 95th Cong., 2d sess. (1978). That report
states that:
[t]he Board is to be represented by its own attorneys whenever
the Board is a party to any proceeding in court, except that the
Board is to be represented by the Solicitor General o f the United
357
States in any proceeding before the Supreme C ourt. This will in
clude instances where the Board is involved in court proceedings
under any provision o f this title, including defending disciplinary
actions * * * intervening in appellate proceedings * * * or
|
freelaw
|
4\. Consider that if you don't have a free tier you won't need to subsidise
your free users, so you might be able to lower prices. But also consider that
the price you start with will be the highest you ever charge. Users don't like
increases in prices. But you can always grandfather old price points in.
5\. Ultimately, until you launch, it's all speculation really. Just get it out
there and get data to make proper decisions with.
I have no tips about money collection because I'm in the UK.
Actually I do: "Don't use Paypal."
~~~
jmbmxer
First, thank you for the thoughtful feedback. Second, pitcher.io looks great,
it inspired me to think about some potential features.
I have spent the last two days doing some research and visiting lots of "paid"
web applications and I came to the conclusion that maybe having a way for
customers to try out the application without even having to sign up is a great
way to gain traction. I am still considering a very limited "free" version but
will for sure be focusing on the paid tiers even if they are relatively
inexpensive upon release.
Oh yea, Stripe seems to be the way to go for my application.
Best of luck to you and pitcher.io!
------
lifeisstillgood
1\. Yes form a limited liability company (I think a C-corp in Delaware. You
should probably pay no more than 150-250 bucks but never done this outside UK)
2\. Be tax efficient / aware. In the UK certainly you are best off drawing the
majority of income as dividend. Of salary. If you have a wife strongly
consider having her own half the business and draw salary too - this however
more applicable of you are a contractor
3\. Sensibly estimate a portion of your revenue as chafgebacks and related
support costs - start at 10% and work down as you get enough real customers.
4\. If this is B2C ask is it a good idea? It's a tough market
5\. If it is B2B I strongly suggest not doing a free plan - in fact start at
something like 49.99/ mth and discount at rly and yearly. Basically you want
people who have both money a d are serious enough that they
|
hackernews
|
The general hypothesis of this grant proposal is that intestinal subepithelial myofibroblasts (ISEMF) are the source of soluble factors that modulate epithelial growth, differentiation, and repair and play a pivotal role in mucosal immunophysiology and cancer. Located at the interface between the epithelium and lamina propria, ISEMF modulate information transfer between these tissue compartments. Through elaboration of basement membrane components, prostaglandins (PGs). and growth factors, ISEMF modulate processes of epithelial cell
|
nih_exporter
|
Biochemically purified and F(ab')2 immunoglobulin fractions were prepared from several antisera, including a human serum, which contained anti-zona pellucida activity. Anti-zona activity was monitored either by the formation of the antibody produced precipitation layer on the zona following antiserum treatment and/or by the indirect fluorescent antibody method. No changes in anti-zona activity were observed when the purified and the digested immunoglobulin preparations from each antiserum were compared to their whole serum counterparts.
|
pubmed_abstracts
|
Simple reaction simulation
--------------------------
It is difficult to distinguish the SR strategy from true entrainment because the SR simulated birds maintained a consistent phase relationship with the stimuli over the course of the trials ([Fig. 3](#f3){ref-type="fig"}).
However, the phase-matching rates of the real and simulated birds differed under the 450--1,200-ms-IOI conditions, although the pecks could phase-match with the stimulus onset under the 1,500-ms- and 1,800-ms-IOI conditions ([Table 1](#t1){ref-type="table"}). As the IOI elongated, the hit period became longer and both stimulus onset and ERT were located in a relatively narrow range. Therefore, the circular distribution logically concentrated on the period including both ERT and stimulus onset. Nevertheless, the responses of one real bird remained phase-matched with stimulus onset but not with ERT under the 1,500-ms-IOI condition, showing that the rate at which real and simulated birds phase-matched with ERT differed.
Moreover, NMA was extremely rare in the simulated birds, and the simulated subjects had far fewer failures than did the real birds (*P* \< 0.0125).
Taken together, none of the four possible models provided a sufficient explanation for the real birds\' behaviour. The budgerigars\' pecks maintained a consistent phase relationship with the stimuli based on anticipation, and this pecking pattern was not the outcome of simple reactions. Consequently, the original idea, that the budgerigars anticipated the stimuli and entrained to the metronome, survived.
Tapping to auditory stimuli
---------------------------
In the main part of our study, we presented the budgerigars with auditory and visual cues simultaneously to facilitate the association between the LED key and the reward as per the operant conditioning protocol[@b10][@b11][@b12]. However, it is important to test entrainment to auditory stimuli alone because this is the modality of interest in the vocal learning and rhythmic synchronization hypothesis[@b5].
To this end, isochronous tapping to auditory stimuli alone was tested in three female budgerigars. Tapping was measured as they were alternately exposed to IOIs of 600 ms and 1,500 ms. The experiment was repeated twice (see Methods section).
The birds quickly learned to perform the task without special training. Their pecks were phase matched with
|
pubmed_central
|
Q:
FFMPEG: Extracting 20 images from a video of variable length
I've browsed the internet for this very intensively, but I didn't find what I needed, only variations of it which are not quite the thing I want to use.
I've got several videos in different lengths and I want to extract 20 images out of every video from start to the end, to show the broadest impression of the video.
So one video is 16m 47s long => 1007s in total => I have to make one snapshot of the video every 50 seconds.
So I figured using the -r switch of ffmpeg with the value of 0.019860973 (eq 20/1007) but ffmpeg tells me that the framerate is too small for it...
The only way I figured out to do it would be to write a script which calls ffmpeg with a manipulated -ss switch and using -vframes 1 but this is quite slow and a little bit off for me since ffmpegs numerates the images itself...
Any suggestions or directions?
Thanks,
Vapire
A:
I know I'm a bit late to the party, but I figured this might help:
For everyone having the issue where ffmpeg is generating an image for every single frame, here's how I solved it (using blahdiblah's answer):
First, I grabbed the total number of frames in the video:
ffprobe -show_streams <input_file> | grep "^nb_frames" | cut -d '=' -f 2
Then I tried using select to grab the frames:
ffmpeg -i <input_file> -vf "select='not(mod(n,100))'" <output_file>
But, no matter what the mod(n,100) was set to, ffmpeg was spitting out way too many frames. I had to add -vsync 0 to correct it, so my final command looked like this:
ffmpeg -i <input_file> -vsync 0 -vf "select='not(mod(n,100))'" <output_file>
(where 100 is the frame-frequency you'd like to use, for example, every 100th frame)
Hope that saves someone a little trouble!
A:
I was trying to find the answer to this
|
stackexchange
|
2. Description of the Related Art
A conventional printing apparatus such as a digital copying machine, a laser beam printer (LBP), a facsimile apparatus is connected to a network and printout is executed by sending documents or images from a personal computer connected to the network to the printing apparatus. The printing apparatus can be set so that when it is not manipulated and operated within a predetermined time, for example, on the operation panel, power supply is stopped to a fixing device or the like which has high power supply, and the printing apparatus transits to a sleep state (power saving mode) which is configured to suppress power consumption for the overall apparatus.
In a conventional print output system, since the conditions for shifting to power saving mode vary depending on each apparatus, comprehensive power saving management of a printing apparatus connected to a specified network has been difficult. For example, it is assumed that there are two printers connected to a plurality of personal computers, one printer is operating and the other printer is in power saving mode. When a print output signal is output from another personal computer, normally, the printer in power saving mode is operated. The image processing apparatus proposed in Japanese Patent Application Laid-Open No. 2001-197297 determines a sleep condition for a printer, and when print output is not urgent, waits for completion of the current print job (JOB) performed by the currently operating printer. Thereafter the plurality of printing apparatuses connected to the network is controlled to execute new printing jobs.
Although the conventional technique takes the state of the printing apparatus into account, the characteristics of the printing apparatus are not considered. Thus when a plurality of printing apparatuses with mutually different characteristics are present on a network, there is the situation that overall power consumption actually increases. For example, currently, a fixing device constituting a digital copying machine employs the fixing method illustrated in FIG. 3A or the fixing method illustrated in FIG. 3B as described hereafter. The fixing method in FIG. 3A is of a roller type and the fixing method in FIG. 3B is of an on-demand type.
FIG. 13 illustrates the characteristics of the fixing device and the relationship between temperature and printing for each fixing method. FIG. 13A illustrates the characteristics of an on-demand type and a roller type. Generally, a roller type has high power consumption and a high printing speed. An on-demand type has low power consumption and a low printing speed. FIG. 13B conceptually illustrates the relationship between printing and the temperature of a fixing device in a digital copying
|
uspto_backgrounds
|
Early life
Stanislav Messing was born into a Jewish family, the child of a musician and a midwife (accoucheuse). Due to financial difficulties, he only finished four classes in grammar school, after which he studied to become a locksmith. He eventually began working in a printing house.
Career
In 1908, he joined the Social Democratic Party of Poland, where he met Felix Dzerzhinsky and Józef Unszlicht, who had given him patronage after the Great Revolution of 1917. He was arrested several times and imprisoned in the Warsaw Fortress. In the same year, he was sentenced to administrative deportation to Belgium, where he earned his livelihood as an unskilled laborer. In 1911, Messing returned to his homeland and continued to participate in the activities of the Social Democratic Party of Poland. He was arrested again and then released.
In 1913, he was drafted into the army and served in Turkestan as a common soldier of the 17th Turkestan Regiment, which had been based at the Caucasian Front since 1914. In 1917, he was elected a member of the regimental soldiers' committee.
Petrograd and Moscow
In the spring of 1917, during the Russian revolution, Messing was in Moscow and participated in street unrest. Immediately after the revolution he was appointed secretary of the Sokolniki Executive Committee and chairman of the Sokolniki District Cheka. Beginning in December 1918, Messing was the head of the secret operations department of the Moscow Cheek. In July 1920, he was approved a member of the VChK Council. On January 3, 1921, he was appointed chairman of the Moscow Cheka. and in November of that year become chairman of Leningrad, then still called Petrograd
Petrograd
In November 1921, Felix Dzerzhinsky, who directed the Red Terror during post-revolution Russia, appointed Messing as chairman of the Petrograd Cheka. He held this rank from November 3, 1921, to February 6, 1922. Petrograd was a capital of Russia until 1922; in 1922, Moscow became the capital again.
Moscow
In 1929, implicated in Bukharin-Kamenev affair and the poor health conditions of Mezhinsky, Trilisser lost out against Messing and Messing was appointed as second deputy chairman of OGPU.
References
Category:1890 births
Category:1937
|
wikipedia_en
|
Let $\{E_i\}$ be a MIC on $d$-dimensional Hilbert space, and assume that this MIC is equal-weight, that is, $E_i = (1/d) \rho_i$ for some rank-1 projection operators $\{\rho_i\}$. Consider the quantity $$F := \sum_{ij} \left(\delta_{ij} - \tr E_i E_j\right)^2,$$ which is the squared Frobenius distance between the MIC’s Gram matrix and the identity. If the MIC could be an orthonormal basis of the operator space, then the distance $F$ would vanish. We can split $F$ into two sums, as follows: $$F = \sum_i \left(1 - \tr E_i^2\right)^2
+ \sum_{i \neq j} \left(\tr E_i E_j\right)^2.$$ The equal-weight and rank-1 conditions let us simplify the first sum, yielding $$F = d^2 \left(1 - \frac{1}{d^2}\right)^2
+ \sum_{i \neq j} \left(\tr E_i E_j\right)^2.$$ Applying the Cauchy–Schwarz inequality to the remaining sum, we get that $$F \geq d^2 \left(1 - \frac{1}{d^2}\right)^2
+ \frac{1}{d^4 - d^2}
\left(\sum_{i \neq j} \tr E_i E_j\right)^2,$$ with equality iff all the terms in the sum are equal, i.e., $\tr E_i
E_j$ is constant for all $i \neq j$. Because the $\{E_i\}$ must sum to the identity, $$\sum_{i \neq j} \tr E_i E_j
= \sum_i \tr E_i (I - E_i)
= d - 1.$$ Consequently, $$F \geq \left(d-\frac{1}{d}\right)^2
+ \frac{d-1}{d^4 - d^2},$$ with equality iff the MIC is symmetric, i.e., $\tr E_i E_j$ is constant for all $i \neq j$. The value of this constant is fixed by dividing its sum evenly across all contributions: $$\tr E
|
arxiv
|
// We need to expose() any then()ed promises recursively
var qThen = promise.then;
promise.then = function () {
return expose(qThen.apply(this, arguments));
};
}
return promise;
}
// Wrap functions that return a promise
angular.forEach([ 'when', 'all', 'reject'], function (name) {
var qFunc = $delegate[name];
$delegate[name] = function () {
return expose(qFunc.apply(this, arguments));
};
});
// Wrap defer()
var qDefer = $delegate.defer;
$delegate.defer = function () {
var deferred = qDefer();
expose(deferred.promise);
return deferred;
}
return $delegate;
});
});
function testablePromise(promise) {
if (!promise || !promise.then) throw new Error('Expected a promise, but got ' + jasmine.pp(promise) + '.');
if (!isDefined(promise.$$resolved)) throw new Error('Promise has not been augmented by ngMock');
return promise;
}
function resolvedPromise(promise) {
var result = testablePromise(promise).$$resolved;
if (!result) throw new Error('Promise is not resolved yet');
return result;
}
function resolvedValue(promise) {
var result = resolvedPromise(promise);
if (!result.success) throw result.error;
return result.value;
}
function resolvedError(promise) {
var result = resolvedPromise(promise);
if (result.success) throw new Error('Promise was expected to fail but returned ' + jasmin.pp(res.value) + '.');
return result.error;
}
beforeEach(function () {
this.addMatchers({
toBeResolved: function() {
return !!testablePromise(this.actual).$$resolved;
}
});
});
// Misc test utils
function caught(fn) {
try {
fn();
|
github
|
FakeGifts
A store selling replica Chanel, Gucci, Louis Vuitton and Tiffany once appeared on this domain. The site owners were ordered to transfer the domain name as a result of a civil contempt order to stop the sale of replicas.
THE UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF FLORIDA
CASE NO.: 09-20810-CIV-HUCK/O'SULLIVAN
IT IS HEREBY ORDERED that Plaintiffs’ Motion for Final Default Judgment is GRANTED, and judgment is entered in favor of Plaintiffs, Chanel, Inc., a New York corporation, with its principal place of business in the United States located at Nine West 57th Street, New York, New York 10019; Gucci America, Inc., with its principal place of business in the United States located at 685 Fifth Avenue, New York, New York 10022; Louis Vuitton, S.A., a foreign business entity with its principal place of business at 22, Avenue Montaigne 75008 PARIS; and Tiffany (NJ) LLC, with its principal place of business in the United States located at 15 Sylvan Way, Parsippany, New Jersey 07054; and against Defendant Jennifer XXXXXX;
IT IS FURTHER ORDERED AND ADJUDGED:
1. In order to give practical effect to the Permanent Injunction, the domain names www.GlobalReplica.com, www.FancyFakes.com, www.BlueFakes.com, www.JennyBags.com, www.AllFakes.com, www.FakeGifts.net are hereby ordered to be immediately transferred by the Defendant, her assignees and/or successors in interest or title, and the Registrar to Plaintiffs’ control. To the extent the current Registrar does not facilitate the transfer of the domain name to Plaintiffs’ control within ten (10) days of receipt of this judgment, the United States based Registry shall, within thirty (30) days of receipt of this judgment, transfer the domain names to a United States based Registrar of Plaintiffs’ choosing, and that Registrar shall transfer the domain name to Plaintiffs; and
2. Upon Plaintiffs’ request, the top level domain (TLD) Registry for the Subject Domain Names, Verisign, Inc., within thirty (30) days of receipt of this Order shall place the Subject Domain Names on
|
pile-cc
|
Solve 15*j = 1890 - 1800 for j.
6
Solve 104 = 30*b + 22*b for b.
2
Solve 0 = -34*o + 103*o + 207 for o.
-3
Solve 15 - 3 = 4*k for k.
3
Solve 336*b - 340*b - 40 = 0 for b.
-10
Solve 23*b - 56 = 36 for b.
4
Solve 2*f + 2*f + 8 = 0 for f.
-2
Solve 261*f = 256*f - 15 for f.
-3
Solve 0*s = -15*s - 45 for s.
-3
Solve 60*b - 57*b = 0 for b.
0
Solve 81*v - 283 - 122 = 0 for v.
5
Solve 108*q + 35 = 113*q for q.
7
Solve 86 - 53 = -3*n for n.
-11
Solve 127*k = 120*k - 7 for k.
-1
Solve 196 = 44*r - 244 for r.
10
Solve 69*t + 66 = 58*t for t.
-6
Solve 15*n - 64 = -17*n for n.
2
Solve 0 = 3*p - 8 + 20 for p.
-4
Solve -710*s + 692*s = -108 for s.
6
Solve 139*x - 131*x = -40 for x.
-5
Solve 114*q - 112*q - 2 = 0 for q.
1
Solve 221*c - 228*c = -28 for c.
4
Solve 150 - 155 = 5*g for g.
-1
Solve 0 = 14*o - 8 - 20 for o.
2
Solve -73*l + 75*l = -4 for l.
-2
Solve 16*y = 44 - 12 for y.
2
Solve 145*l = 151*l - 18 for l.
3
Solve 6*m - 50 = -14 for m.
6
Solve -347 - 129 = 68*i for i.
-7
Solve 59 = -28*c + 171 for c.
4
Solve w = -45 + 42 for w.
-3
Solve 118 =
|
dm_mathematics
|
------------------------------
Auction Information
------------------------------
Auction Site: eBay
Item URL: http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1013259638&ed=1002300969
Auction Title: item# 1013259638
Item Number: 1013259638
Close Date: October 05, 2001
------------------------------
Jason Wolfe's CONFIRMED Address
------------------------------
|
enron_emails
|
Giving the utmost consideration to all of the state's evidence, including the evidence which the state contends corroborates the story of the prosecuting witness, we feel the evidence of the rape was weak. When we speak of corroboration here we do not mean the statutory corroboration which will be dealt with in the next division. We think it important to point to the weaknesses in the evidence of the rape for here, as in most all rape cases, the central question is the sufficiency of other testimony that tends to connect defendant with the crime. With clear and convincing evidence that the crime of rape was perpetrated by someone at a certain fixed time, an accused's connection with the crime can be more easily established. Here there is doubt as to the day the rape occurred. The indictment names June 8th, or Friday, and Betty's *451 testimony leaves it as occurring that day or the next day. Mrs. Lee says she asked Betty if defendant had tried to "make her" before Saturday and she said "that he hadn't."
I. So the state is left with the burden of introducing evidence tending to establish defendant's connection with a rape that occurred on Friday or Saturday. Section 782.4, Code, 1954, I.C.A., provides, stating it affirmatively, that the story of the prosecuting witness must be "corroborated by other evidence tending to connect the defendant with the commission of the offense." The other evidence introduced by the state was the testimony of persons who saw Betty and defendant go in or come out of the trailer.
Thirteen year old Marla Wilson who lived next door to the Keeler home said she saw Betty and Mr. Seales come out of the trailer. She "believed" the date was Saturday, June 9th in the morning. She did not see them go in and she did not remember who came out first.
Marla's eighteen year old brother, Ronald Wilson, testified he remembered seeing Betty Lee and defendant come out of the trailer. He did not remember who came out first and he could not recall whether it was morning or afternoon, the day of the week or month, but he remembered it was during the summer vacation.
Seventeen year old Bob Keeler couldn't remember whether Rose Simmons worked for Mr. Seales before Betty Lee but he remembered both of them and he recalled seeing Betty Lee and defendant go into the trailer house along about noon sometime on a day the previous summer. He said there were curtains over the windows and
|
freelaw
|
~~~
blueprint
Well, it's not strictly a bad idea to name it by some unique name if it turns
out to be the case that another, better, more rigorous theory or set of
observations is developed about the cause and range/extent of morphologies
associated with the torque that makes the concept of Yakolevian Torque
obsolete.
~~~
knolax
If the concept of Yakolevian Torque becomes obselete we'll just stop referring
to it regardless of how it's named. If it only needs to be updated in a way
that obseletes the older descriptional name we can just give it a newer more
apt descriptional name.
~~~
blueprint
Kind of like Newtonian mechanics?
~~~
knolax
You mean Classical Mechanics? Plus your example doesn't make sense because the
term "Newtonian Mechanics" was likely coined only after Relativistic Mechanics
were discovered[0][1], Newton himself referred to it as "Natural Philosophy".
In addition "Newtonian Mechanics" isn't even the preferred name, Wikipedia
refers to it as "Classical Mechanics"[2] while the Webster's definition of
"Newtonian Mechanics"[3] is just the words "Classical Mechanics", which
themselves have a much longer entry[4]. The fact that we do not in fact refer
to "Classical Mechanics" as "Philosophiae Naturalis" actually supports my
point: as our understanding of Physics improved we renamed the field, with
older concepts/terms falling out of use and being renamed when they are
reused.
[0]
[https://books.google.com/ngrams/graph?content=Newtonian+Mech...](https://books.google.com/ngrams/graph?content=Newtonian+Mechanics&year_start=1800&year_end=2000&corpus=15&smoothing=3&share=&direct_url=t1%3B%2CNewtonian%20Mechanics%3B%2Cc0#t1%3B%2CNewtonian%20Mechanics%3B%2Cc0)
[1]
[https://books.google.com/ngrams/graph?content=Natural+Philos...](https://books.google.com/
|
hackernews
|
Activation of the innate immune system upon pathogen recognition results in a rapid and definitive microbicidal response to invading microorganisms that is fine-tuned to prevent deleterious deficiencies or excesses in the response. Increasing evidence indicates that immune responses are rapidly coordinated by neural circuits that operate reflexively. However, given the complexity of the nervous and immune systems of mammals, the precise mechanisms by which the two systems influence each other remain understudied. This proposal describes experiments designed to elucidate the mechanism by which the nervous
|
nih_exporter
|
Twitch contraction properties of plantar flexor muscles in pre- and post-pubertal boys and men.
This study compared electrically evoked twitch contraction characteristics of the plantar flexor muscles in pre-pubertal (11-year-old) and post-pubertal (16-year old) boys, and young (19- to 23-year-old) men. The posterior tibial nerve was stimulated by supramaximal square-wave pulses of 1 ms duration
|
pubmed_abstracts
|
We designed a screen to identify genes involved in phospholipid anabolism and catabolism that might have an impact on ageing. For this purpose, we performed chronological ageing experiments with a subset of yeast strains deleted for non-essential genes known to be involved in phospholipid metabolism. At day 3 of the chronological ageing experiment, we measured the levels of reactive oxygen species (ROS) by assessing the ROS-driven oxidation of non-fluorescent dihydroethidium (DHE) to fluorescent ethidium by cytofluorometry. This screening procedure led to the identification of three genes whose deletion caused an ageing-dependent raise in ROS generation ([Figure 1a](#fig1){ref-type="fig"}): *isc1*Δ, *psd1*Δ and *psd2*Δ. *ISC1* encodes an inositol phosphosphingolipid phospholipase, which produces ceramide. Interestingly, deletion of *ISC1* has been previously reported to decrease chronological lifespan,^[@bib30]^ thus validating our screen results. *PSD1* and *PSD2* encode phosphatidylserine decarboxylases, which similarly convert PS to PE, and are located in distinct cellular organelles (see Introduction). As these two enzymes have not been associated with yeast aging, we decided to focus our study on these enzymes and their products.
We confirmed the premature ageing phenotype of the *PSD1* and *PSD2* knock outs by clonogenic survival plating ([Figure 1b](#fig1){ref-type="fig"}) and assessed the PE- and PC-abundance at day 3 of ageing by HPLC-assisted analyses of lipid extracts ([Figure 1c](#fig1){ref-type="fig"}). *PSD1* deletion had a more pronounced inhibitor effect on both PE synthesis and yeast ageing. This is consistent with a previous report underscoring that, at least in standard culture conditions, Psd1 is the predominant phosphatidylserine decarboxylase, the abrogation of which disturbs homeostasis of PE and a number of phospholipid species including PS and PI which can be overcome by the administration of ethanolamine.^[@bib31]^
As previous works have also shown that *PSD1* deletion has a strong impact on mitochondrial function,^[@bib32],\ [@bib33]^ we examined to which extent the reduction in survival upon chronological ageing might be a consequence of general mitochondrial dysfunction or specific to the deletion of PSD activity. We thus generated *psd1
|
pubmed_central
|
I'm running with VS-2013 Ultimate. While executing my code, I'm getting this error message box:
An exception has been encountered. This may be caused by an extension
When entering the log file (the path is mentioned on the message), I'm get this exception:
<entry>
<record>905</record>
<time>2014/08/22 15:46:25.494</time>
<type>Error</type>
<source>Editor or Editor Extension</source>
<description>
System.NullReferenceException: Object reference not set to an instance of an object.

at Microsoft.VisualStudio.Debugger.Parallel.UI.ThreadMarkerGenerator.LocationMatchesTagger(DocumentContext location, MarkerTagger tagger)

at Microsoft.VisualStudio.Debugger.Parallel.UI.ThreadMarkerGenerator.<>c__DisplayClass1.<GetMarkersForTagger>b__0(ThreadMarker marker)

at System.Linq.Enumerable.WhereListIterator`1.MoveNext()

at Microsoft.VisualStudio.Debugger.Parallel.Extension.MarkerTagger.<GenerateTagList>d__a.MoveNext()

at System.Linq.Buffer`1..ctor(IEnumerable`1 source)

at System.Linq.Enumerable.ToArray[TSource](IEnumerable`1 source)

at Microsoft.VisualStudio.Debugger.Parallel.Extension.MarkerTagger..ctor(ITextBuffer buffer, ITextDocument document)

at Microsoft.VisualStudio.Debugger.Parallel.Extension.MarkerTaggerProvider.CreateTagger[T](ITextBuffer buffer)

at Microsoft.VisualStudio.Text.Tagging.Implementation.TagAggregator`1.GatherTaggers(ITextBuffer textBuffer)
</description>
</entry>
I
|
stackexchange
|
PG in the figure is a pressure gauge to measure a pressure in the filtering vessel 8.
When the filtering apparatus is in normal liquid filtering operation, only the valves V1 and V2 are opened with all the other open/close valves closed out of a plural number of open/close valves. Under the condition, the pump P is put in operation. The nonfiltered liquid L to be filtered is sucked into the pump P through the valve V1 and is discharged from the pump P to flow into the nonfiltered liquid chamber 83 through the check valve V7. The nonfiltered liquid L in the nonfiltered liquid chamber 83 flows into the filtered liquid chamber 84 under a discharging pressure of the pump through the precoat filtering layer 82 formed beforehand with the filter aid. At this time, the nonfiltered liquid is filtered. The filtered liquid Lxe2x80x2 flows to a predetermined location (not shown) out of the filtered liquid outlet port 841 of the filtered liquid chamber 84 and through the open/close valve V2.
The liquid in the filtering vessel 8 starts to flow back to the pump P when filtering operation is ended with stoppage of the pump P or when the pump is stopped due to an electric power outage. The flow, however, is stopped by the check valve V7, so that the liquid in the filtering vessel 8 stays in the vessel.
The precoat filtering layer 82 is formed, for example, in such a manner as follows:
The open/close valve V2 of the filtered liquid outlet line 2, the open/close valve V3 of the bypass line 3 for precoating and the sixth open/close valve V6 of the line 5 are closed, when the filtering vessel 8 is free from any liquid inside as immediately after installation of the filtering apparatus, or is cleaned and free from any liquid. On the other hand, the open/close valve V1 of the nonfiltered liquid introduction line 1 and the fifth open/close valve V5 of the line 5 are opened. Under this condition, the pump P is started, when prime water W is introduced into the filter aid addition tank t and the valve V6 is opened.
The pump P, while sucking the prime water W, begins to suck the nonfiltered liquid L. The nonfiltered liquid is thus introduced into the filtering vessel 8 this way, letting out air in the filtering vessel 8 through the precoating liquid outlet port 85 and also from the pipe 51. The filtering vessel is filled with the liquid in
|
uspto_backgrounds
|
Pro Evolution Soccer 2016
Pro Evolution Soccer 2016 (abbreviated as PES 2016, marketed as Winning Eleven 2016 in Japan) is a football simulation game developed by PES Productions and published by Konami for Microsoft Windows, PlayStation 3, PlayStation 4, Xbox 360, and Xbox One. It is the fifteenth edition of the Pro Evolution Soccer series and marks PES Productions' 20th year of producing football games. The cover of the game features Neymar Jr (seen wearing his Brazil national team kit). The name of the game has been changed from "World Soccer: Winning Eleven" to "Pro Evolution Soccer" in Asia, except Japan where it is titled "Winning Eleven". PES 2016 was succeeded by Pro Evolution Soccer 2017.
Leagues and cups
At E3 2015, it was announced that Konami had extended their license for the UEFA Champions League, the UEFA Europa League and the UEFA Super Cup until 2018. At Gamescom 2015, it was announced that Konami had acquired the exclusive license for the upcoming UEFA Euro 2016; however, it was not going to be a part of the game from the beginning, and was eventually released in an update on 24 March 2016. Pro Evolution Soccer 2016 includes Ligue 1, La Liga, AFC Champions League, UEFA Champions League, UEFA Europa League, UEFA Super Cup, Copa Libertadores, Copa Sudamericana (2014 and 2015 seasons), Recopa Sudamericana, an unlicensed Serie A with 19 licensed teams, an unlicensed Premier League, with only Manchester United licensed, 3 teams from Bundesliga (Bayern Munich, Wolfsburg and Borussia Mönchengladbach) but still not a stand-in for the league, an unlicensed Football League Championship, an unlicensed Serie B, an unlicensed Portuguese League (only Benfica, Sporting CP and Porto were licensed), Ligue 2, Liga Adelante, an unlicensed Brazilian League, an unlicensed Chilean League (with only the teams competing in Copa Libertadores and Copa Sudamericana licensed), Eredivisie, an unlicensed Argentine League (with only the teams competing in Copa Libertadores and Copa Sudamericana licensed) and 4 teams from Brazilian Second Division (Vitória, Bahia, Botafogo and Criciúma).
Demo Teams
The PES 2016 Dem
|
wikipedia_en
|
To select weak CSS sources from the FIRST catalogue we made the following steps:
1. From the source list based on Green Bank (GB) surveys at 21 and 6 cm @wb92 we selected those sources lying within the then current limits of the FIRST survey when FIRST covered the area of declination $28\degr$ — $42\degr$, having steep spectra ($\alpha >0.5$) and being stronger than 150 mJy at 6 cm. (This flux density limit was chosen in order to produce a sample of manageable size.) The above declination limits indicate that the overlap between our sample and the B3-VLA survey based sample of F2001 (their limits are $37\degr 15\arcmin$ — $47\degr 37\arcmin$) is not large.
2. We identified FIRST sources with those GB survey sources. We found, quite expectedly, that thanks to a dramatic difference in the resolution, the majority of sources appearing as single in the GB survey turn out to be double (or multiple) on FIRST maps and so they are represented either as compact pairs or clusters of pointlike sources in the FIRST catalogue.
3. We rejected all such cases i.e. we selected only those sources that are single entities in the FIRST catalogue i.e. more compact than the FIRST beam (54) and surrounded by an empty field. We adopted 1 arcmin as a radius of that field. Such a procedure allows us to make sure that we deal with isolated objects and not parts of larger objects.
4. We, again, checked whether our targets fulfill the spectrum steepness criterion: instead of GB-survey flux densities at 21 cm we used more accurate values from FIRST. We rejected candidates with flat spectra ($\alpha \leq 0.5$).
5. We found that all already known CSS sources lying within our R.A. and declination limits have been correctly selected so far. Obviously we rejected them.
6. We rejected the Gigahertz Peaked Spectrum (GPS) sources because — in our opinion — they constitute a separate class. The main reason for this is that GPSs are an order of magnitude more compact than CSSs and their spectra have a different shape. Our research was focused on “true” CSSs and not GPSs[^2] To this end we identified our preliminary candidates with objects listed in 365 MHz Texas catalogue [@doug
|
arxiv
|
Comment=Configure window movement options
Comment[az]=Pəncərə yerdəyişdirilməsinin tənzimlənməsi
Comment[ca]=Configura les opcions de moviment de les finestres
Comment[cs]=Nastavit volby pohybu oken
Comment[da]=Indstil flytning af vinduer
Comment[en_GB]=Configure window movement options
Comment[es]=Configurar las opciones del movimiento de las ventanas
Comment[et]=Akende liigutamise seadistamine
Comment[eu]=Konfiguratu leiho mugimenduaren aukerak
Comment[fi]=Ikkunoiden siirtämisen asetukset
Comment[fr]=Configurer les options de déplacement des fenêtres
Comment[gl]=Configurar o movemento das xanelas
Comment[ia]=Configura optiones de movimento de fenestra
Comment[id]=Konfigurasikan opsi pemindahan window
Comment[it]=Configura opzioni di spostamento delle finestre
Comment[ko]=창 이동 옵션 설정
Comment[lt]=Konfigūruoti langų perkėlimo parinktis
Comment[nl]=Opties voor vensterverplaatsing configureren
Comment[nn]=Set opp vindaugsflytting
Comment[pl]=Ustawienia opcji przesuwania okien
Comment[pt]=Configurar as opções de movimentação das janelas
Comment[pt_BR]=Configure as opções de movimento da janela
Comment[ru]=Настройка поведения при перемещении окон
Comment[sk]=Nastavenie spôsobu presunu okien
Comment[sl]=Nastavi možnosti premikanja okna
Comment[sv]=Anpassa alternativ för fönsterförflyttning
Comment[uk]=Налаштовування параметрів пересування вікон
Comment[x-test]=xxConfigure window movement optionsxx
Comment[zh_CN
|
github
|
In her absence, he also fears for his own sanity. He decides to fix their bedroom fan—it only worked on the highest setting and was missing the face of its cage—after hearing a story about a man sticking his penis into a fan and letting the blade chop it up. The reader is led to wonder, Was Bud really worried about sticking his own penis into a fan? Doesn’t matter—he fixed the fan so it’s a non-issue, but these are the darker moments that bring a nice depth to the writing and make the reader wonder more about the inner workings of Smith’s brain based on the surface-level actions we’re presented with.
The book is filled with drawings from Rae Buleri, Bud Smith’s wife, and presumably the focus of his writing in Dust Bunny City. This partnership again reinforces the bond they have as a couple. The drawings reminded me of Shel Silverstein which added a level of whimsy to the poems I don’t think would have been apparent without them. The drawings levity also connect the poems to the relationship enough to avoid a self-deprecating tone that could have potentially made the writing collapse upon itself.
In the end, this is a book about optimizing life with your perfect partner. Though it’s not a codependent relationship, because when his wife gets the job opportunity, he tells her to go without hesitation, and when he gets called into work, she doesn’t try to stop him. They are both individuals that know what the other person needs and will step aside if they aren’t able to provide that for them—companionship at its finest. Smith knows himself and is comfortable enough laying out his relationship for us all to see.
One of the last poems, “Reunion Featuring Tulip Tree,” he and his wife look across the street and remark about how a man “is looking up at the sky / and singing himself a song at that sky / he seems to be doing fine / he is out of his mind, all of his problems / are invisible in the daylight.” Bud Smith has shown us his own daylight problems in Dust Bunny City and, by extension, made me want to show mine too.
Joseph Edwin Haeger is the author of Learn to Swim (University of Hell Press, 2015). His writing has appeared in The Pacific NW Inlander, RiverLit, Hippocampus Magazine, and others. He lives in Spokane, Washington
|
pile-cc
|
True
Let i(h) = 2*h**2 - 4. Is i(-9) composite?
True
Let m(c) = 253*c - 7. Is m(6) composite?
False
Let b be (-1 - 5)/(54/(-6228)). Let a = b + -475. Is a composite?
True
Let k = 1028 + -357. Is k composite?
True
Let w = 3 + -1. Suppose 0 = -w*m + 3*b + 583, -m + 4*b = -289 - 0. Is m a composite number?
False
Let c(q) = q - 3. Let l be c(-3). Let v = l - -8. Suppose -v*n - 110 = -4*n. Is n a composite number?
True
Let i(v) = v**2 - 6*v + 4. Let o be i(5). Let t be -1 - 1/o - -2. Suppose -3*x = -t*l - 11, -4*x = -5*x + 5. Is l composite?
False
Let u(z) = 214*z**2 - 4*z - 3. Let r be u(-3). Suppose -2*g - g = -r. Suppose -2*j + g = 5*s, -2*s + 0*s + 244 = -2*j. Is s prime?
True
Let w(v) = 8*v**3 + v**2 - v + 1. Let u be w(2). Let g be (0 + 2)/1 + 32. Let h = u - g. Is h a composite number?
True
Let s = 6 - 1. Let t(k) = 24*k + 3. Let r be t(s). Suppose 2*x - 4*w = 42, -4*x - 29 = 2*w - r. Is x a prime number?
True
Suppose -17396 + 5558 = -6*o. Is o composite?
False
Let z(r) = r**3 + r - 2. Let m be z(2). Let y be 39/12 - 2/m. Suppose 0 = o + y*l - 4*l - 56, 5*l = -5. Is o
|
dm_mathematics
|
I am in need of several more contract copies. Could you please forward me
contract:
96037261
96049419
96001003
96045391
Also, you had mentioned earlier that GISB contracts should not have been used
on some of the contracts I earlier received. Are the appropriate contracts
going to be sent out, or are we stuck with the ones in place.
Call with questions.
|
enron_emails
|
STATE OF OHIO, :
Plaintiff-Appellee, : CASE NOS. CA2015-09-018
CA2015-09-019
: CA2015-09-020
- vs -
: DECISION
3/14/2016
JAMES E. GRUBB, JR., :
Defendant-Appellant. :
CRIMINAL APPEAL FROM PREBLE COUNTY COURT OF COMMON PLEAS
Case No. 14CR011569
Martin P. Votel, Preble County Prosecuting Attorney, Preble County Courthouse, 101 East
Main Street, Eaton, Ohio 45320, for plaintiff-appellee
Matthew J. Barbato, 2625 Commons Boulevard, Suite A, Beavercreek, Ohio 45431, for
defendant-appellant
Per Curiam.
{¶ 1} This cause came on to be considered upon a notice of appeal, the transcript of
the docket and journal entries, the transcript of proceedings and original papers from the
Preble County Court of Common Pleas, and upon the brief filed by appellant's counsel.
{¶ 2} Counsel for defendant-appellant, James E. Grubb, has filed a brief with this
court pursuant to Anders v. California, 386 U.S. 738, 87 S.Ct. 1396 (1967), which (1)
indicates that a careful review of the record from the proceedings below fails to disclose any
Preble CA2015-09-018
CA2015-09-019
CA2015-09-020
errors by the trial court prejudicial to the rights of appellant upon which an assignment of
error may be predicated; (2) lists two potential errors "that might arguably support the
appeal," Anders, at 744, 87 S.Ct. at 1400; (3) requests that this court review the record
independently to determine whether the proceedings are free from prejudicial error and
without infringement of appellant's constitutional rights; (4) requests permission to withdraw
as counsel for appellant on the basis that the appeal is wholly frivolous; and (5) certifies that
a copy of both the brief and motion to withdraw have been served upon appellant.
{
|
freelaw
|
------
cableshaft
Took a graphic arts class in high school, was deep in the flash animation/game
scene for a long time, then made my own UI's for my own games, tackled
multiple different designs for websites over the years, did some mobile app
design, now I've gone more analog and designing physical card games with
Illustrator. So yeah, I've been using design skills pretty much my whole life.
That being said, I'm not great at creating art, just putting together existing
art assets or assets provided to me. I'm kind of glad the current trend is
flat simple colors for everything. It makes design so much easier for me. I do
still struggle with overall composition and brainstorming different visuals
for how something can look, though.
------
siquick
Most definitely, this book has been a god-send for me.
[http://www.amazon.com/Design-Hackers-Reverse-Engineering-
Bea...](http://www.amazon.com/Design-Hackers-Reverse-Engineering-
Beauty/dp/1119998956)
------
Cypher
Yes its quite fascinating, I focus more on the physical engineering side of
design such as a car dash board or what design makes an awesome umbrella
instead of colour and UI placement.
------
wprapido
i'm a designer who gone developer way and being able to understand both helps
me a lot, even when i don't do them both
developers, learn some design
designers, learn some development
~~~
kleer001
Same here. Nearly 20 years in the vfx industry. Finally getting some time to
catch up with the latest advancements (and some old friends, oh hello python
2.7) in computer vision, machine learning, and automation.
It's funny. I used to think IFTT was pretty great. But once I spent a little
time with cron and launchd (thanks zerowidth.com!) I was like, what? that's
all it can do? I'm sure there's a lot of overhead with a bunch of users and
such and so many services. But still, really limited against a dinky XML file
and 20 lines of python.
------
artur_makly
IMHO..It
|
hackernews
|
The goal of the proposed research is to understand how adhesion regulates cell proliferation. The focus will be on the Abl tyrosine kinase as a transducer of the growth regulatory signal. The ubiquitous c-Abl is localized in the cytoplasm and the nucleus. The nuclear c-abl binds DNA and regulates transcription. The cytoplasmic c-abl interacts with both G and F-actin. Recently, a collaboration between two units of this program has demonstrated that the kinase activity and the subcellular localization of c-Abl is
|
nih_exporter
|
Beclin 1-mediated autophagy in hepatocellular carcinoma cells: implication in anticancer efficiency of oroxylin A via inhibition of mTOR signaling.
Autophagy is a tightly-regulated catabolic process that involves the degradation of intracellular components via lysosomes. Although the pivotal role of autophagy in cell growth, development, and homeostasis has been well understood, its function in cancer prevention and intervention remains to be delineated. The aim of this study was to investigate the function and mechanism of autophagy induced by oroxyl
|
pubmed_abstracts
|
Swine were randomly allocated to either of two groups: Standard resuscitation or standard resuscitation (Shock group) and inhaled CO (CO group). Randomization was done in blocks of 10 animals. Of the 10 animals, one was allocated blindly to receiving sham surgery, which consisted of cannulation as previously described, without hemorrhage. Given that blinding was not possible, allocation to either group was disclosed to the investigators performing the study only after 55 minutes into the hypotensive period in order to avoid any bias during the surgical or hemorrhage phases. Animals allocated to CO received a pre-mixed gas containing 250 parts per million (ppm) in 40% oxygen after 60 minutes into the shock period delivered through the anesthesia circuit.
### Myeloperoxidase (MPO) activity {#sec013}
MPO activity in the lungs in the murine moderate shock model was determined four hours after resuscitation as described by Anderson et al\[[@pone.0135032.ref015]\]. Lungs were excised, washed in saline, and frozen in liquid nitrogen. Samples were thawed and homogenized in 20 mM/L potassium phosphate (pH 7.4). Samples were centrifuged at 15,000*g* for 30 min at 4°C. The pellet was then resuspended in 50 mM/L potassium phosphate (pH 6.0) containing 0.5% hesadecyltrimethylammonium bromide. Samples were sonicated and then centrifuged 15,000*g* for 10 min at 4°C. Supernatant (5 mircoliters) was then added to 196 microliters of reaction buffer containing 530 nM/L *O*-dianisidine and 150 nM/L H~2~O~2~ in 50 mM/L potassium phosphate (pH 6.0). Light absorbance at 490 and 620 nm was read and compared with standards. Protein content in the samples was determined by bicinchoninic acid assay. Results were corrected per microgram of protein.
### Murine serum cytokine, ALT measurements, and arterial blood gas measurements {#sec014}
Serum levels of the cytokines IL-6 and TNF-alpha were measured in the murine moderate shock model four hours after resuscitation using enzyme-linked immunoabsorbant assay (ELISA; R&D Systems, Minneapolis, MN) according to the manufacturer's instructions. Alanine aminotransferase (ALT) was determined using an iSTAT Analyzer (Abbott, Princeton, NJ). Arterial blood gases were obtained from the femoral
|
pubmed_central
|
Q:
Error while XOR ing C++
I have problem, when i compile this code
#include <iostream>
using namespace std;
int main(){
const unsigned long box[256]= { 0xD1310BA6, 0x98DFB5AC, 0x2FFD72DB, 0xD01ADFB7,
0xB8E1AFED, 0x6A267E96, 0xBA7C9045, 0xF12C7F99,
0x24A19947, 0xB3916CF7, 0x0801F2E2, 0x858EFC16,
0x636920D8, 0x71574E69, 0xA458FEA3, 0xF4933D7E,
0x0D95748F, 0x728EB658, 0x718BCD58, 0x82154AEE,
0x7B54A41D, 0xC25A59B5, 0x9C30D539, 0x2AF26013,
0xC5D1B023, 0x286085F0, 0xCA417918, 0xB8DB38EF,
0x8E79DCB0, 0x603A180E, 0x6C9E0E8B, 0xB01E8A3E,
0xD71577C1, 0xBD314B27, 0x78AF2FDA, 0x55605C60,
0xE65525F3, 0xAA55AB94, 0x57489862, 0x63E81440,
0x55CA396A, 0x2AAB10B6, 0xB4CC5C34, 0x1141E8CE,
0xA15486AF, 0x7C72E993, 0xB3EE1411, 0x636FBC2A,
0x2BA9C55D, 0x741831F6, 0xCE5C3E16, 0x9B87931E,
0xAFD6BA33, 0x6C24CF5C, 0x7A325381, 0x28958677,
0x3B8
|
stackexchange
|
Sampled metric data can be used to build performance models for analysis and capacity planning. However, less frequent sampling can result in inaccurate models and data uncertainty, especially regarding the duration of events or processes and the number of events or processes. The present invention is directed to reducing said uncertainty. Uncertainty arises from two primary sources: the unsampled segment of a seen process or event, and the unseen process or event. A seen process is a process that is sampled at least once; therefore, its existence and starting time are known. However, the residual time or utilization between the last sampling of the process or event and the death of the process or the termination of the event is unsampled and unknown. An unseen process is shorter than the sample interval and is not sampled at all, and therefore its entire utilization is unknown. Nevertheless, the total unsampled (i.e., residual) utilization and the total unseen utilization can be estimated with the system and method of the present invention.
In determining the total unsampled utilization, a quantity of process service time distributions are determined, and each of the seen processes are assigned respective process service time distributions. For each distribution, a mean residual time is calculated using equations provided by the system and method. The total unsampled utilization is the sum of the mean residual time multiplied by the number of seen processes for each distribution, all divided by the measurement interval.
In determining the total unseen utilization, first the total captured utilization is determined to be the sum of the sampled utilizations of all seen processes over the measurement interval. Next the total measured utilization, or the xe2x80x9cactualxe2x80x9d utilization over the measurement interval, is obtained from the system software or monitoring software. The difference between the total measured utilization and the total captured utilization is the uncertainty. Because the uncertainty is due to either unsampled segments or unseen events, the total unseen utilization is calculated to be the uncertainty (the total measured utilization minus the total captured utilization) minus the total unsampled utilization.
When the total measured utilization is not available, the total unseen utilization is estimated with an iterative bucket method. A matrix of buckets are created, wherein each row corresponds to the sample interval and each bucket to a gradation of the sample interval. Each process is placed into the appropriate bucket according to how many times it was sampled and when in the sample interval it began. Starting with the bucket with the longest process(es) and working iteratively back through the other buckets,
|
uspto_backgrounds
|
After the arrest of Mafia boss Totò Riina in January 1993, the remaining bosses, among them La Barbera, Giuseppe Graviano, Matteo Messina Denaro, Giovanni Brusca, Leoluca Bagarella, and Antonino Gioè, came together a few times (often in the Santa Flavia area in Bagheria, on an estate owned by the mafioso Leonardo Greco). They decided on a strategy to force the Italian state to retreat. That resulted in a series of bomb attacks in 1993 in the Via dei Georgofili in Florence, in Via Palestro in Milan and in the Piazza San Giovanni in Laterano, and Via San Teodoro in Rome, which left 10 people dead and 93 injured as well as damage to centres of cultural heritage such as the Uffizi Gallery.
On March 23, 1993, La Barbera, Antonino Gioè and Salvatore Bentivegna were arrested in Milan. The police taped them while they were planning bomb attacks. La Barbera started to collaborate with the authorities in November 1993.
La Barbera confessed his participation in the slaying of Antimafia judge Giovanni Falcone. He followed Falcone's car as it sped toward Palermo, keeping in constant touch with Leoluca Bagarella, Antonino Gioè and Giovanni Brusca on the hillside near Capaci. Brusca set off the explosion.
He also admitted to have been involved in the killing of Salvo Lima, the former mayor of Palermo.
His father Girolamo La Barbera (born in 1925) was murdered on June 10, 1994, because he defended the choice of his son to become a pentito. The killing was staged as a suicide. Among the killers were Michele Traina and Domenico Raccuglia. The order came from Giovanni Brusca. Traina and Raccuglia received life sentences for the killing in June 2005, while Brusca was sentenced to 13 years.
In October 1997, the pentito La Barbera was rearrested. Although a key witness in several important trials under way, he had returned home and recommenced his criminal activities and avenge atrocities carried out on family members.
References
Jamieson, Alison (2000), The Antimafia. Italy’s Fight Against Organized Crime, London: MacMillan Press
Category:
|
wikipedia_en
|
Josephson junctions are building elements of many electronic and electromagnetic devices as well as a candidate for quantum computers[@BaroneBook]. In practical applications, one usually integrates large arrays of junctions on a chip to enhance the performance, thus coherent operations in these junctions are crucial. The synchronization between junctions can be realized by coupling them to a common resonator, most frequently through electromagnetic coupling. The common resonator establishes long-range interaction between junctions, which then synchronizes them under appropriate condition. The junctions arrays have become an extremely important playground to understand the synchronization mechanism for large population of nonlinear oscillators, partially because of the relatively easy experimental realization.[@Hadley88; @Jain84; @Wiesenfeld96; @Durala99; @Filatrella00; @Grib02; @Grib06; @Filatrella07; @Madsen08].
The successful observations of coherent emission from cuprate superconductors renew the interests in understanding the synchronization of arrays of Josephson junctions [@Bae07; @Ozyuzer07; @kadowaki08; @Wang09; @Wang10; @Tsujimoto10; @Krasnov10]. Cuprate superconductors, such as $\rm{Bi_2Sr_2CaCu_2O_{8+\delta}}$ (BSCCO), are a natural realization of a stack of Josephson junctions of atomic thickness [@Kleiner92; @Kleiner94], known as intrinsic Josephson junctions (IJJs). Because of the large supercoducting energy gap, these build-in Josephson junctions can be operated at frequencies in the terahertz region, where the electromagnetic waves have wide applications [@Ferguson02; @Tonouchi07].
Radiation from IJJs occurs in the resistive state. Such a state is reached by increasing the bias current above the Josephson critical current and then diminishing it down to the voltage $V$ corresponding to the target frequency according to the Josephson relation $\omega=2eV/\hbar $. The resistive state is preserved down to the retrapping current below which the system undergoes transition into the zero-voltage state. Such a procedure is possible because the resistivity of IJJs is very large, i.e. junctions are strongly underdamped. Thus the hysteretic behavior allows us, in principle, to reach a quite low voltage of the order of that corresponding to the Josephson frequency ($\sim 0.1\rm{THz}$ for BSCCO
|
arxiv
|
insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id)
values (LOOKUP_CHANNEL_ARCH('channel-s390'), LOOKUP_CHANNEL_ARCH('channel-s390'));
insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id)
values (LOOKUP_CHANNEL_ARCH('channel-s390-deb'), LOOKUP_CHANNEL_ARCH('channel-s390-deb'));
insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id)
values (LOOKUP_CHANNEL_ARCH('channel-s390x'), LOOKUP_CHANNEL_ARCH('channel-s390'));
insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id)
values (LOOKUP_CHANNEL_ARCH('channel-s390x'), LOOKUP_CHANNEL_ARCH('channel-s390x'));
insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id)
values (LOOKUP_CHANNEL_ARCH('channel-iSeries'), LOOKUP_CHANNEL_ARCH('channel-iSeries'));
insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id)
values (LOOKUP_CHANNEL_ARCH('channel-pSeries'), LOOKUP_CHANNEL_ARCH('channel-pSeries'));
insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id)
values (LOOKUP_CHANNEL_ARCH('channel-x86_64'), LOOKUP_CHANNEL_ARCH('channel-ia32'));
insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id)
values (LOOKUP_CHANNEL_ARCH('channel-x86_64'), LOOKUP_CHANNEL_ARCH('channel-x86_64'));
insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id)
values (LOOKUP_CHANNEL_ARCH('channel-amd64-deb'), LOOKUP_CHANNEL_ARCH('channel-ia32-deb'));
insert into rhnChildChannelArchCompat (parent_arch_id, child_arch_id)
values (LOOKUP
|
github
|
2017
MPI for Intelligent Systems and University of Tübingen, 2017 (phdthesis)
Abstract
Computer vision can be understood as the ability to perform 'inference' on image data. Breakthroughs in computer vision technology are often marked by advances in inference techniques, as even the model design is often dictated by the complexity of inference in them. This thesis proposes learning based inference schemes and demonstrates applications in computer vision. We propose techniques for inference in both generative and discriminative computer vision models.
Despite their intuitive appeal, the use of generative models in vision is hampered by the difficulty of posterior inference, which is often too complex or too slow to be practical. We propose techniques for improving inference in two widely used techniques: Markov Chain Monte Carlo (MCMC) sampling and message-passing inference. Our inference strategy is to learn separate discriminative models that assist Bayesian inference in a generative model. Experiments on a range of generative vision models show that the proposed techniques accelerate the inference process and/or converge to better solutions.
A main complication in the design of discriminative models is the inclusion of prior knowledge in a principled way. For better inference in discriminative models, we propose techniques that modify the original model itself, as inference is simple evaluation of the model. We concentrate on convolutional neural network (CNN) models and propose a generalization of standard spatial convolutions, which are the basic building blocks of CNN architectures, to bilateral convolutions. First, we generalize the existing use of bilateral filters and then propose new neural network architectures with learnable
bilateral filters, which we call `Bilateral Neural Networks'. We show how the bilateral filtering modules can be used for modifying existing CNN architectures for better image segmentation and propose a neural network approach for temporal information propagation in videos. Experiments demonstrate the potential of the proposed bilateral networks on a wide range of vision tasks and datasets.
In summary, we propose learning based techniques for better inference in several computer vision models ranging from inverse graphics to freely parameterized neural networks. In generative vision models, our inference techniques alleviate some of the crucial hurdles in Bayesian posterior inference, paving new ways for the use of model based machine learning in vision. In discriminative CNN models, the proposed filter generalizations aid in the design of new neural network architectures that can handle sparse high-dimensional data as well as provide a way for incorporating prior knowledge into CNNs.
Hand motion capture with an RGB-D sensor gained recently a lot of
|
pile-cc
|
What is the thousands digit of 4247?
4
What is the hundreds digit of 1421?
4
What is the units digit of 1541?
1
What is the ten thousands digit of 68599?
6
What is the units digit of 78?
8
What is the units digit of 18584?
4
What is the units digit of 325?
5
What is the units digit of 1355?
5
What is the ten thousands digit of 14135?
1
What is the hundreds digit of 1919?
9
What is the units digit of 2483?
3
What is the units digit of 431?
1
What is the units digit of 1760?
0
What is the thousands digit of 3773?
3
What is the hundreds digit of 164563?
5
What is the thousands digit of 4138?
4
What is the tens digit of 604?
0
What is the tens digit of 1449?
4
What is the units digit of 142331?
1
What is the thousands digit of 27324?
7
What is the tens digit of 675?
7
What is the units digit of 1089?
9
What is the units digit of 7834?
4
What is the units digit of 1717?
7
What is the hundreds digit of 1119?
1
What is the tens digit of 675?
7
What is the thousands digit of 12128?
2
What is the tens digit of 531?
3
What is the ten thousands digit of 50517?
5
What is the hundreds digit of 2294?
2
What is the units digit of 715?
5
What is the hundreds digit of 4967?
9
What is the tens digit of 301?
0
What is the hundreds digit of 1915?
9
What is the units digit of 805?
5
What is the hundreds digit of 2651?
6
What is the tens digit of 1277?
7
What is the units digit of 9721?
1
What is the thousands digit of 2368?
2
What is the units digit of 2757?
7
What is the tens digit of 5141?
4
What is the ten thousands digit of 23826?
2
What is the tens digit of 29199?
9
|
dm_mathematics
|
Hello Vince,
I stopped by to see you today 03/28/01. However, Mrs. Shirley notified me
that you were out of the country. Look, I need another favor. My wife, whom
you met last summer, and I have been living in The Woodlands about a month
now. We have tried, to no avail, to get her in the local school district as
a speech pathologist or a K-
|
enron_emails
|
3
On November 2, 1984, the United States District Court for the Western District of Wisconsin ordered the state election officials to preserve any ballots received from overseas citizens between the time the polls closed on election day and November 16, 1984. Election officials eventually received 329 ballots which had been timely applied for during this period. On November 14, 1984, the State of Wisconsin moved to dismiss the complaint for failure to state a claim, arguing that it was in full compliance with both federal voting acts. The state agreed that if this motion was denied, it would count all absentee ballots received before November 16, 1984, in the federal elections.
4
On November 30, 1984, the district court denied the motion to dismiss the complaint, finding that it stated a cause of action under the federal voting statutes. The district court reasoned that although neither statute specifically stated how long before an election absentee ballots must be mailed to voters, a state could defeat the express purposes of the statutes by mailing the ballots without sufficient time for their valid return. The court therefore entered the agreed order to count the ballots in the elections for federal offices. On February 26, 1985, the Wisconsin Board of State Canvassers issued a supplemental certification of the election results for federal offices which included the late ballots, thereby complying with the district court's order. The late ballots did not affect the outcome of any race. The State of Wisconsin then filed this appeal.
5
Article III, Section 2 of the Constitution limits federal jurisdiction to actual cases and controversies. See Nebraska Press Ass'n v. Stuart, 427 U.S. 539, 546, 96 S.Ct. 2791, 2796, 49 L.Ed.2d 683 (1976). It is clear, as the United States admits, that there is no longer a controversy between the parties. Appellee's br. at 2. The State of Wisconsin counted the disputed ballots, thereby complying in full with the district court's order. These ballots made no difference in any race. No other relief was ordered. The United States argues, however, that this court has jurisdiction because the dispute between the parties is "capable of repetition, yet evading review." Southern Pacific Terminal Co. v. ICC, 219 U.S. 498, 515, 31 S.Ct. 279, 283, 55 L.Ed.2d 310 (1911). We disagree. There is no indication that
|
freelaw
|
[1] [https://github.com/GN-OS/Bloard](https://github.com/GN-OS/Bloard)
------
aloknnikhil
This includes the iPhone Xs and 11 (and presumably all A12 and A13 devices).
Was there a new exploit found on these chips? Last I checked only devices with
chips older than the A12 were vulnerable to the checkra1n exploit.
~~~
judge2020
new exploit:
> using a 0day kernel vulnerability from @Pwn20wnd
[https://twitter.com/unc0verteam/status/1263260302713524225?s...](https://twitter.com/unc0verteam/status/1263260302713524225?s=21)
------
dang
The baity title and the coming-soonness are two strikes against this
submission. Does anyone want to argue in its favor? and if so, what should we
change the title to?
~~~
mike_d
The actual news here is that an iOS 13.5 kernel 0day is going to be released
publicly. The exploit was paid for by a phone case manufacturer.
It isn't a great source, but the original tweet actually has more detail than
the website:
[https://twitter.com/unc0verTeam/status/1263260302713524225?s...](https://twitter.com/unc0verTeam/status/1263260302713524225?s=20)
Edit: I'd suggest pointing here for context -
[https://9to5mac.com/2020/05/20/jailbreak-for-all-
ios-13-5-de...](https://9to5mac.com/2020/05/20/jailbreak-for-all-
ios-13-5-devices-expected-soon-due-to-new-kernel-exploit/)
~~~
dang
Doesn't it make sense to wait until it's released?
------
RyanShook
Are iOS exploits becoming more common? Feels like a few years ago they were
rare but now they’re being released more often.
~~~
praseodym
Apparently they are, Zerodium has even stopped accepting new iOS privilege
|
hackernews
|
Worldwide, cancer is a leading cause of death and the most common killer of adult Americans. For the individual, the diagnosis is accompanied by extreme stress. Multiple randomized clinical trials (RCTs) of psychological interventions have shown efficacy in reducing stress for the "typical" patient-newly diagnosed with local or regional disease. Unfortunately, only two (N=2) RCTs have focused upon the patient with recurrent disease, leaving this patient group adrift in the sea of previous and present day
|
nih_exporter
|
Investigation of cosmic rays and their secondaries at aircraft altitudes.
A very extensive study of the radiation field at aircraft altitudes has been carried out over the last few years. These investigations formed part of a European wide collaboration involving several laboratories with extensive experience in cosmic ray research and/or dosimetry. Among the main topics investigated were the charge spectra, LET spectra, anisotropy and dose values. The measurements were performed on subsonic and supersonic flights covering a wide range of altitudes
|
pubmed_abstracts
|
Kunnen we dat laatste nog wel voldoende ondersteunen, nu we gedwongen worden om de \'fysieke contacten\' zoveel mogelijk te beperken? Hoe gaan de mensen bewegen als sportscholen en sportverenigingen hun deuren gesloten moeten houden uit angst voor verspreiding van het virus?
\'Dit vergt veel van iedereen en vraagt om creativiteit en saamhorigheid\'
Samenwerken {#Sec1}
===========
Maar een nog groter probleem is of we voldoende \'gezonde\' zorgprofessionals hebben om de kwetsbaren te helpen. Ook zonder de dreiging van het coronavirus is het al een hele klus om die grote groep mensen die kwetsbaar is van de juiste zorg te voorzien. Zo is in Apeldoorn het Zorgpad ondervoeding bij kwetsbare ouderen ontwikkeld door professionals uit het sociale en het medische domein om ondervoeding sneller te herkennen en te behandelen. Juist de samenwerking is belangrijk: gebruikmaken van elkaars kwaliteiten en elkaar aanvullen.
Initiatief tot samenwerking zien we ook als het om *TPO De Praktijk* gaat. De beroepsverenigingen V&VN pvk/poh en de Nederlandse vereniging voor praktijk- ondersteuners (NVvPO) zijn de laatste jaren steeds hechter gaan samenwerken. Hierover vertellen voorzitters Gertrud van Vulpen en Petra Portengen in het interview op pagina 26.
V&VN pvk/poh, NVvPO en NHG gaan samen één tijdschrift voor praktijkondersteuning uitgeven. Dit nummer van *TPO de Praktijk* zal het laatste zijn in deze vorm. Zelf heb ik besloten te stoppen met mijn werk als redactielid. Ik blijf werkzaam als praktijkverpleegk
|
pubmed_central
|
I have uploaded my blog to pythonanywhere. On my localhost everything is working fine, but on pythonanywhere it is not working.
I configured pythonanywhere like i did on my localhost, installed everything (Tinymce is also installed), but im getting this Error:
2019-05-16 12:24:14,263: Error running WSGI application
2019-05-16 12:24:14,264: ImportError: No module named 'tinymce'
2019-05-16 12:24:14,264: File "/var/www/urosdobricic_pythonanywhere_com_wsgi.py", line 15, in <module>
2019-05-16 12:24:14,264: application = get_wsgi_application()
2019-05-16 12:24:14,264:
2019-05-16 12:24:14,265: File "/home/UrosDobricic/.virtualenvs/urosdobricic.pythonanywhere.com/lib/python3.5/site-packages/django/core/wsgi.py", line 12, in get_wsgi_application
2019-05-16 12:24:14,265: django.setup(set_prefix=False)
2019-05-16 12:24:14,265:
2019-05-16 12:24:14,265: File "/home/UrosDobricic/.virtualenvs/urosdobricic.pythonanywhere.com/lib/python3.5/site-packages/django/__init__.py", line 24, in setup
2019-05-16 12:24:14,265: apps.populate(settings.INSTALLED_APPS)
2019-05-16 12:24:14,266:
2019-05-16 12:24:14,266: File "/home/UrosDobricic/.virtualenvs/urosdobricic.pythonanywhere.com/lib/python3.5/site-packages/django/apps/registry.py", line 91, in populate
2019-05-16 12:24:14,266: app_config = AppConfig.create(entry)
2019-05-16 12:24:14,266
|
stackexchange
|
Regulatory sequences may also be useful in controlling temporal and/or spatial expression of endogenous DNA. For example, specialized tissues are involved in fertilization and seed development. Identification of promoters which are active in these seed tissues is of interest.
In grain crops of agronomic importance, seed formation is the ultimate goal of plant development. Seeds are harvested for use in food, feed, and industrial products. The quantities and proportions of protein, oil, and starch components in those seeds determine their utility and value.
The timing of seed development is critical. Environmental conditions at any point prior to fertilization through seed maturation may affect the quality and quantity of seed produced. In particular, the first 10 to 12 days after pollination (the lag phase) are critical in maize seed development. Several developmental events during the lag phase are important determinants of the fate of subsequent seed growth and development. (Cheikh, N. et al., Plant Physiology 106:45-51 (1994)) Therefore, a means to influence plant development, particularly in response to stress during this phase of growth, is of interest. Identification of a promoter sequence active in tissues of developing seeds exposed to abiotic stresses would be useful.
Specialized plant tissues are central to seed development. Following fertilization, developing seeds become sinks for carbon translocated via the phloem from sites of photosynthesis. However, developing cereal seeds have no direct vascular connections with the plant; instead, a short-distance transport mechanism operates to move the assimilates from the vascular tissues to the endosperm and embryo. For example, in maize, photosynthate enters the seed via the pedicel; in wheat, via the nucellar projection and the aleurone layer. It is possible that this short-distance assimilate pathway between the phloem and the endosperm can operate to regulate the rate of sucrose transport into the grain. (Bewley, J. D., and M. Black. Seeds: Physiology of Development and Germination. N.Y., Plenum Press, 1985. pp. 38-39) Therefore, a promoter active in gene expression within these specialized tissues, such as the pedicel, may have significant effects on grain development.
During rapid seed growth, sucrose is unloaded passively from the phloem into the apoplast of the pedicel parenchyma and inverted to hexose sugars by a cell-wall-bound acid invertase. The hydrolysis of sucrose in the apoplast maintains a favorable gradient for continued un
|
uspto_backgrounds
|
The line "deserts of vast eternity" is used in the novel Orlando: A Biography, by Virginia Woolf, which was published in 1928.
Archibald MacLeish's poem "", alludes to the passage of time and to the growth and decline of empires. In his poem, the speaker, lying on the ground at sunset, feels "the rising of the night". He visualizes sunset, moving from east to west geographically, overtaking the great civilizations of the past, and feels "how swift how secretly / The shadow of the night comes on."
B. F. Skinner quotes "But at my back I always hear / Time's wingèd chariot hurrying near", through his character Professor Burris in Walden Two, who is in a confused mood of desperation, lack of orientation, irresolution and indecision. (Prentice Hall 1976, Chapter 31, p. 266). This line is also quoted in Ernest Hemingway's novel A Farewell to Arms, as in Arthur C. Clarke's short story, The Ultimate Melody.
The same line appears in full in the opening minutes of Michael Powell and Emeric Pressburger's A Matter of Life and Death (1946), spoken by the protagonist, pilot and poet Peter Carter: 'But at my back I always hear / Time's wingèd chariot hurrying near; And yonder all before us lie / Deserts of vast eternity. Andy Marvell, What a Marvel'.
The line "A fine and private place, but none, I think, do there embrace" appears in Stephen King's novel Pet Sematary.
The line "My vegetable love should grow / Vaster than empires, and more slow" is quoted by William S. Burroughs in the last entry of his diary (July 29, 1997).
The line "I would Love you ten years before the Flood, And you should, if you please, refuse Till the conversion of the Jews. My vegetable love should grow Vaster than empires, and more slow." Is used as the preamble to part three of Greg Bear's Nebula award winning novel "Moving Mars".
References
External links
To His Coy Mistress: A Study Guide With an Annotated Copy of the Poem
Discworld & Terry Pratchett Wiki
Category:1650s poems
Category:1681 poems
Category:Po
|
wikipedia_en
|
Since we have a finite number of particles, the jet volume is only partially patched by the volume occupied by such Lagrangian particles, [i.e., the volume filling factor is smaller than one]{}. [ Increasing]{} the number of particles [brings it closer]{} to one. To test the volume filling method, we produce an “image” of the jet at an observer time $t_{\rm obs}=0$ with a $90^\circ$ viewing angle, accumulating in each pixel the contributions corresponding to a laboratory frame time interval $\Delta T=2 R_{\rm b}/c$. However, instead of summing up the emissivity, we add up the length of the intersection of each particle’s volume with each pixel in the $(x_{\rm
obs}, y_{\rm obs})$ plane (as described above). The idea behind the substitution of the emissivity by the intersection length is that, at $90^\circ$ the intersection length and the intersection volume of the particles are proportional and, thus, measuring lengths or volumes is equivalent.
Since we accumulate in every pixel all contributions in the range $[-\Delta T/2, \Delta T/2]$, the intersection length with each particle equals the size of the particle perpendicular to the LoS ($2\Delta r$). [Hence,]{} the value accumulated in a pixel ${\cal
P}:=(x_{\rm obs}, y_{\rm obs})$, namely $L_{\rm px}$, [is]{} $$L_{\rm px} = \sum_i \frac{A_i}{A_{\rm px}} 2\Delta r\, ,
\label{eq:Lpx}$$ where $A_i$ and $A_{\rm px}$ are the area of intersection of a particle with a pixel and the pixel area, respectively. The sum in Eq. (\[eq:Lpx\]) extends over all particles that are intersected by the line of sight that departs from ${\cal P}$. In the limit $\Delta r
\rightarrow 0$ (equivalently, $N_{\rm p} \rightarrow \infty$) $A_i
\rightarrow 4(\Delta r)^2$. On the other hand, the number of particles intersected by the LoS departing from ${\cal P}$ and having a cross sectional area $A_{\rm px}$ is $N_{\rm px}= A_{\rm px}/(2\Delta
r)^2$. Therefore, we have $$\lim
|
arxiv
|
<Type>5</Type>
<Period>6</Period>
<MonthItem>8</MonthItem>
<MonthPosition>4</MonthPosition>
<DayWorking>0</DayWorking>
</Exception>
<Exception>
<EnteredByOccurrences>1</EnteredByOccurrences>
<TimePeriod>
<FromDate>2002-01-01T00:00:00</FromDate>
<ToDate>2006-02-04T23:59:00</ToDate>
</TimePeriod>
<Occurrences>8</Occurrences>
<Name>Monthly Relative 6</Name>
<Type>5</Type>
<Period>7</Period>
<MonthItem>9</MonthItem>
<MonthPosition>0</MonthPosition>
<DayWorking>0</DayWorking>
</Exception>
<Exception>
<EnteredByOccurrences>1</EnteredByOccurrences>
<TimePeriod>
<FromDate>2002-01-01T00:00:00</FromDate>
<ToDate>2007-05-13T23:59:00</ToDate>
</TimePeriod>
<Occurrences>9</Occurrences>
<Name>Monthly Relative 7</Name>
<Type>5</Type>
<Period>8</Period>
<MonthItem>3</MonthItem>
<MonthPosition>1</MonthPosition>
<DayWorking>0</DayWorking>
</Exception>
<Exception>
<EnteredByOccurrences>1</EnteredByOccurrences>
<TimePeriod>
<FromDate>2003-01-01T00:00:00</FromDate>
<ToDate>2003-05-01T23:59:00</ToDate>
</TimePeriod>
<Occurrences>3</Occurrences>
<Name>Monthly Absolute 1</Name>
<Type>4</Type>
<Period>2</Period>
<MonthDay>1</MonthDay>
<DayWorking>
|
github
|
grep is a handy tool and I use it every day. But sometimes I wish it had some more features. For instance full featured Perl compatible regular expressions (PCRE) since the current implementation is not complete and I think it will never be, automatic recursive search, exclusion of non-text files etc.
Here a tool called ack comes into play. It's a search tool and grep replacement written in Perl, which is able to do all these things. Guess what!
Adobe Flash has ever been a great source of anger due to many bugs (see here for example) and security vulnerabilities. Anyhow, it has evolved into a widely used technology and many, many websites need it to function correctly (yeah, HTML5 is coming, let's hope it will replace Flash in many places in the near future).
Adobe's bug fixing behavior has never been great and we all know, that Flash for Linux has been permanent beta (or alpha) since we can remember, but enough is enough. There is a severe bug that has now existed for three years, reported by hundreds of users. Adobe closed this report without taking action. Now it has been reported again and I want you to vote for it. Please!
When you freshly set up a Linux distribution by hand, you get a lot of verbose output when booting into your system, but also install'n'go distributions like Ubuntu oder SUSE output some text when loading the kernel. This is not always desired and many people want to suppress these insistent system messages, but it's not as easy as you might think.
The UNIX philosophy is based on the DRY principle which declares: “Don't repeat yourself”. Therefore, a program just does what it's made for and uses libraries or even other programs on your system to do a more advanced job. Some of these auxiliary programs are user definable and probably you already know the EDITOR environment variable, which specifies your default editor for the console. This is used, e.g., for the command visudo, which opens your /etc/sudoers file safely, or by svn to input a commit comment. But another important component is your console pager, which is used to display textual content on the console.
Gnome and KDE come more and more together but there are still some differences which sometimes might lead to incompatibilities between these two large desktop environments. Whereas you have relatively few problems with KDE applications on Gnome there are
|
pile-cc
|
2110
In base 15, what is -559 + -50?
-5a9
In base 16, what is -1 + 1027?
1026
In base 10, what is 1 - -22913?
22914
In base 2, what is 1 - 10111011010100?
-10111011010011
In base 4, what is -1100 - 11313?
-13013
In base 2, what is 11 - 100011011000100?
-100011011000001
In base 8, what is -75 + 120646?
120551
In base 16, what is 437 + -13a?
2fd
In base 2, what is -10001010110100001111 - -11?
-10001010110100001100
In base 2, what is 11001000 - 101111101010?
-101100100010
In base 9, what is 171740 - 3?
171736
In base 12, what is 13b566 - -1?
13b567
In base 8, what is -27746 - -3?
-27743
In base 9, what is -1 - -238238?
238237
In base 8, what is -32 + -12757?
-13011
In base 10, what is 3528 - 9?
3519
In base 7, what is 16 - 20451?
-20432
In base 7, what is 22 + -6324?
-6302
In base 13, what is -312a - -3a?
-30c0
In base 6, what is -50 - -2335?
2245
In base 6, what is 40041 - -3?
40044
In base 4, what is 2203023 - 3231?
2133132
In base 6, what is -25234 + 32?
-25202
In base 4, what is -32 - -133123?
133031
In base 15, what is -6 + -7956?
-795c
In base 13, what is 7 - 10a54?
-10a4a
In base 8, what is 2 - 113062?
-113060
In base 13, what is -1046b3 - -6?
-1046aa
In
|
dm_mathematics
|
---------------------- Forwarded by Marianne Castano/HOU/EES on 08/02/2001 01:01 PM ---------------------------
From: Stacey Bolton/ENRON@enronXgate on 08/02/2001 12:00 PM
To: Marianne Castano/HOU/EES@EES
cc:
Subject: RE: CA BIZMIX Issues
You're welcome. Hope I see you on Monday. My understanding is that surprisingly
|
enron_emails
|
I. Factual Background
Plaintiffs entered into a contract with defendant to reconstruct their home and restore the personal property from the home, both of which were heavily damaged in an April 2003 fire caused by a leaking propane valve. Defendant specializes in the cleaning and restoration of structures and personal property damaged by catastrophic events.
Defendant first performed emergency repairs to the structure of the home so that work crews could enter the home, evaluate the damage, and begin making repairs. Following emergency repairs, plaintiffs elected to demolish the existing structure and build a new home, using a different contractor. As a result, defendant's work thereafter was confined to inventorying, cleaning, and restoring plaintiffs' damaged personal property.
It is undisputed that plaintiffs' homeowners' insurance policy provided $358,000 in coverage for the contents of the home, as well as $25,000 in additional coverage for business personal property contained within the home. The insurance policy provided (1) full replacement value for items deemed "unsalvageable"; and (2) payment for the costs of inventorying, cleaning, and restoring personal property deemed "salvageable." All payments were subject to the total limits of the policy noted above. It is also undisputed that plaintiffs exhausted the limits of the policy in the insurance company's payments for defendant's restorative work and for replacement of unsalvageable property.
The insurance company made two payments related to defendant's work. In August 2003, the insurer issued a third-party check to plaintiffs in the amount of $17,353.22 for emergency repairs. Plaintiffs promptly deposited the check and paid the full amount to defendant. In March 2004, the insurer issued a second third-party check to plaintiffs in the amount of $66,355.02 for the inventorying, cleaning, and restoring of plaintiffs' personal property. This check was also deposited and paid to defendant.
In September 2004, defendant delivered the personal property to plaintiffs that had been cleaned and restored. Defendant had inventoried and sorted the property as either salvageable or unsalvageable. Plaintiffs contend that defendant's work was negligently performed because it had either erred in assessing whether property could be salvaged, improperly restored property, or failed to return property that was salvageable. Plaintiffs also complain that defendant damaged their home's heating system when the emergency repairs were made.
*1257 Evidence adduced at trial indicated that defendant failed to return many of the items that defendant had collected for cleaning and restoration. Many of the items that were returned to
|
freelaw
|
I was tired of games like Mafia Wars and wanted a phone-based MMO Strategy game where hundreds of players could actually engage each other on a 2D map, so I made one.<p>I track the state of the game each night so we can display a visual timeline of territory controlled by each alliance. (example: http://bit.ly/q5CFhU) I use jQuery mobile for the front end so it runs on most phones (via Phonegap) as well as modern web browsers. The server side is handled by Java Servlets and MySQL.<p>This started as a hobby - I'm not a developer by training - so I am very interested in feedback, suggestions, and ideas for improvements.
======
crazyj48s
This caught my eye because I'm a lurker here on Hacker News who actually plays
this game! I'm super excited you are posting here because I really want to
learn more about your server architecture. Can you provide more info on your
java stack as well as the kind of hardware is running the site? Previous games
had 300+ users, so scalability shouldn't be an issue yet, but have you planned
for that?
Once criticism: For the time I've been playing, the game has been evolving
rather quickly, and new features seem to have taken precedence over client
stability.
~~~
wizzo
We've actually taken a pretty homebrew approach and aren't using any external
frameworks - just Tomcat and MySQL. On the hardware side we're using Linode
shared servers so that we can quickly and easily scale up or down as needed.
The game code is pretty efficient - we've run tests with thousands of players
and had no problems, on modest hardware, so we're looking forward to growing
quickly!
It's true that we've had some stability issues at times, but we're trying to
cover a lot of platforms (Android, iOS, webOS, web) and add a lot of new
features to improve the game. Now that we've officially launched (on 10/1)
stability will definitely our #1 priority, though.
~~~
crazyj48s
Interesting - since this started as a hobby, any thoughts on open sourcing the
client or server code or documenting the client/server communication so the
community could build clients? I figure folks would be able to pretty easily
|
hackernews
|
The anthrax lethal factor (LF) is known to be pathogenically important, since anthrax bacilli lacking the LF gene show diminished virulence. Only a single cellular target for LF is known: the host macrophage, which undergoes apoptosis as a result of LF internalization. The killing of macrophages is also believed to be pathogenically important, because macrophage depletion paradoxically protects animals against B. anthracis infection. But the mechanism by which LF kills host macrophages has remained unclear. The events set in motion
|
nih_exporter
|
A sperm antigen corresponding to baboon sperm monoclonal antibody 1A9 was localized in the testis and ejaculated sperm in this animal, using the immunofluorescence technique and immunogold labelling. Immunohistochemical studies of the baboon testis showed that the antigenic determinant was localized in the late spermatid cells and spermatozoa close to the seminiferous tubules. Immunofluorescence studies indicate that the protein was localized on the acrosome region of ejaculated baboon sperm. At the electron-
|
pubmed_abstracts
|
HE
: hematoxylin and eosin
IHC
: immunohistochemistry
MTC
: medullary thyroid carcinoma
P‐gp
: P‐glycoprotein
TCC
: transitional cell carcinoma
TKI
: tyrosine kinase inhibitor
VEGF
: vascular endothelial growth factor
VEGFR‐2
: vascular endothelial growth factor receptor‐2
Thyroid cancer represents 10--15% of all head and neck neoplasms in the dog, and 90% of thyroid tumors detected clinically are carcinomas.[1](#jvim12330-bib-0001){ref-type="ref"}, [2](#jvim12330-bib-0002){ref-type="ref"} Thyroid carcinomas can be classified as follicular cell thyroid carcinomas (FTCs), which arise from follicular thyroid cells, and medullary thyroid carcinomas (MTCs), which arise from the parafollicular C cells and have a neuroendocrine origin. Although thyroidectomy is the preferred treatment modality, invasive nonresectable thyroid tumors are common in dogs, and in up to 38% of dogs, the tumor has already metastasized by the time of diagnosis.[3](#jvim12330-bib-0003){ref-type="ref"}, [4](#jvim12330-bib-0004){ref-type="ref"} Furthermore, almost 50% of dogs undergoing thyroidectomy experience recurrence or metastatic disease within 2 years of surgery.[4](#jvim12330-bib-0004){ref-type="ref"} Therefore, it is important to investigate new treatment modalities for the large number of dogs with inoperable tumors or metastatic disease.
Vascular endothelial growth factor (VEGF) is the main stimulator of angiogenesis in the thyroid gland, and VEGF overexpression has been found in human thyroid cancer.[5](#jvim12330-bib-0005){ref-type="ref"} VEGF is secreted by cancer cells and binds to VEGF tyrosine kinase receptors on the surface of endothelial cells and thyrocytes. In people, vascular endothelial growth factor receptor‐2 (VEGFR‐2) inhibition with tyrosine kinase inhibitors (TKIs) is the most effective new therapeutic strategy developed to date in the treatment of advanced thyroid cancer.[6](#jvim12330-bib-0006){ref-type="ref"} VEGF, angiogenesis, and VEGF‐induced pathway activation may play important roles in the progression of
|
pubmed_central
|
LabWindows: implementing thread safe queues that can handle string
elements
How to use a thread safe queue to store strings
I create a pointer to char in the main thread and allocate storage using malloc(). I copy some data into the storage, and assign the pointer to an array element (CmtWriteTSQData expects an array). This array gets passed to a thread safe queue.
In a secondary thread, the thread safe queue is read. The data is assigned to a new array.
How do I free the memory allocated within the secondary thread, as the pointer variable is no longer in scope?
Can I just call free() on the array element? Or do I need to create another pointer to char in the secondary thread, copy the array element to it, and then call free() on the pointer?
There doesn't appear to be a return value with free(), so I can't figure out how to ensure the call succeeds.
// Main thread
char *ptr = NULL;
char *array1[1] = {0};
ptr = (char *) malloc (3 * sizeof (char));
strcpy (ptr, "hi");
array1[0] = ptr;
CmtWriteTSQData (queue, array1, 1, 0 NULL);
// Secondary thread
char *array2[1] = {0};
CmtReadTSQData (queue, array2, 1, 0, 0);
printf ("%s", array2[0]); // Prints "hi"
free (array2[0]); // Does this work?
A:
The short answer is yes.
When you call malloc(), you are asking the operating system to give you a chunk of usable memory of some minimum size, and the operating system responds by passing you a pointer, which is just an integer representing the virtual address of that chunk of memory.
When a program has multiple threads, this means that several lightweight processes are sharing the same virtual address space, which means if there are several copies of some valid pointer among several threads of the same process, then they must all point to the same memory location.
The operating system does not care which thread asked for the memory, and it does not care which thread gives it back. When malloc() returns a pointer in a process, all of the threads in that process may use it, and
|
stackexchange
|
GLP-1 is secreted from specific cells in the colon following a meal and is a key regulator of glucose homeostasis, linking the gut, brain and pancreas. GLP-1 potentiates insulin secretion, reduces glucagon secretion and preserves 3-cell function whilst also improving satiety. Levels of post-prandial GLP-1 are reduced in Type 2 diabetics and dramatically elevated following gastric by-pass surgery, contributing to the amelioration of Type 2 diabetes in these patients. Approaches that prolong the half-life of GLP-1 (JANUVIA (Merck), GALVUS (Novartis)) or activate the GLP-1 receptor (BYETTA (Amylin)) have been recently approved for use in Type 2 diabetes.
Hyperinsulinemia in patients with Type 2 diabetes mellitus results from peripheral insulin resistance, coupled with inadequate pancreatic insulin secretion and elevated glucagon levels. There is a strong correlation between obesity and peripheral insulin resistance and hyperinsulinemia. Accumulation of free fatty acids in insulin responsive tissues other than fat (i.e. muscle and liver) results in tissue insulin resistance. Additionally, free fatty acids have a direct effect on the pancreas and in the colon and further stimulate glucose-dependent insulin secretion and GLP-1 release with acute exposure whereas chronic exposure of free fatty acids impairs insulin secretion and becomes toxic to the 3-cell. In the liver, hyperinsulinemia per se has been linked to exacerbating insulin resistance by increasing liver fatty acid accumulation and hepatic glucose output creating a vicious cycle of disease progression. Current therapeutic strategies only partially address the complex pathology of free fatty acids in the exacerbation of diabetes. Agents that target both liver and pancreas function, directly or indirectly via GLP-1 release, either individually or in combination with current treatment, could significantly improve blood glucose control while maintaining β-cell function. Agents that potentiate GLP-1 release also have the ability to reduce weight, providing additional benefits.
GPR120 is a seven transmembrane g-protein coupled receptor (GPCR) that is predominantly expressed in the intestine and adipose. GPR120 functions as a receptor for long chain free fatty acids (FFAs). Acute FFA stimulation of GPR120 in GLP-1 expressing cell-lines amplifies GLP-1 release. Administration of α-linolenic acid into the colon of mice increases GLP-1 and potentiates insulin release following a glucose challenge. In contrast to agonists of GPR40, the existing literature suggests
|
uspto_backgrounds
|
John Beckett, Lord Beckett
John Beckett, Lord Beckett, is a Scottish lawyer who was appointed in 2016 as a Senator of the College of Justice, a judge of the Court of Session.
Beckett was Solicitor General for Scotland, the country's junior Law Officer from October 2006 to May 2007. He was appointed by Labour First Minister Jack McConnell on the appointment of former Solicitor General Elish Angiolini to the senior role of Lord Advocate. After the 2007 Scottish election, newly elected Scottish National Party First Minister Alex Salmond replaced Labour Party member Beckett with Frank Mulholland, who later became Lord Advocate. Beckett then became floating sheriff sitting mainly at Glasgow Sheriff Court.
Early life
Beckett was born in Crawley, a town in West Sussex about 28 miles (45 km) south of London. His family moved to Edinburgh in 1968 and he was educated at Edinburgh Academy and Broughton High School before studying at the School of Law of the University of Edinburgh.
Career
Beckett worked initially as a defence solicitor in Edinburgh, and was elected to the Faculty of Advocates in 1993. He was junior defence counsel for Abdelbaset al-Megrahi under William Taylor QC during the Lockerbie trial at the Scottish Court in the Netherlands in 2000. He became an Advocate Depute and Senior Advocate Depute in 2003, and Queen's Counsel (QC) in 2005, and prosecuted the infamous murder case of baby Caleb Ness. He was appointed Principal Advocate Depute from 1 January 2006. On his appointment as Solicitor General that October, he was succeeded by Brian McConnachie.
Solicitor General
Following the resignation of Colin Boyd as Lord Advocate, Solicitor General Elish Angiolini was nominated for the post by First Minister Jack McConnell. Beckett was in turn nominated to succeed Angiolini as Solicitor General. The nomination was met with some criticism due to Beckett's membership of the Labour Party, but was ultimately approved by the Scottish Parliament on 5 October 2006. Beckett, along with Angiolini, was sworn in at the Court of Session in Edinburgh on 12 October 2006 and appointed by the Queen under the royal warrant. Beckett's appointment lasted only eight months however; the 2007 Scottish Parliament election resulted in the Scottish National Party forming a minority government, and new First Minister Alex Salmond replaced Beckett with politically neutral Frank Mulholland QC
|
wikipedia_en
|
Stylized facts of evaluation distributions
------------------------------------------
Figure \[fig:04-ccdfFitsLNLD\] shows the probability density functions of the distributions of the amount of likes and dislikes for items in each of the four datasets. To understand the process that generates these distributions, we fit a set of parametric distributions that provide insights into how likes and dislikes are given to items. Following the categorization of [@Mitzenmacher2004], generative mechanisms produce stylized size distributions that can be traced back to the properties of growth processes. If the appearance of likes and dislikes follows an uncorrelated process and new evaluations are independent of previous ones, likes and dislikes should follow *exponential* distributions. On the other hand, the presence of likes and dislikes can motivate further evaluations through social effects, creating multiplicative growth (also known as preferential attachment in the context of networks). In the presence of multiplicative growth, if items have similar lifespans, likes and dislikes follow *log-normal* distributions. On the other hand if multiplicative growth is combined with heterogeneous lifespans, likes and dislikes follow a *power law* distribution. This power law can be corrected by adding an exponential cutoff if finite size effects limit the growth of likes and dislikes, a case in which the distributions would be better fitted by a *truncated power law*.
![**Probability density function of collective evaluations**. Probability density function of the number of likes (top) and the number of dislikes (bottom) with exponential binning and fits to log-normal distribution $ln\mathcal{N}(\mu,\sigma)$ (red dashed lines). For all datasets, the results of the log-likelihood pairwise comparisons of the four distributions (see text) identified the log-normal distribution as the best fit.[]{data-label="fig:04-ccdfFitsLNLD"}](PDFs.pdf){width="95.00000%"}
For all datasets, the results of pairwise comparisons of the four proposed distributions identified the *log-normal* distribution as the best fit, with significant and positive log-likelihood ratios as shown in Table \[tab:03-ln-ks\] along with the best fitting parameter estimates. The dashed lines in Figure \[fig:04-ccdfFitsLNLD\] show the fitted distributions, revealing the quality of the fit. The cases of [`YouTube`]{} and [`Urban Dictionary`]{} provide very good fits
|
arxiv
|
/*
* Copyright [2017] Wikimedia Foundation
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.o19s.es.ltr.utils;
import com.o19s.es.ltr.ranker.LtrRanker;
import org.elasticsearch.Assertions;
import java.util.Objects;
import java.util.function.Supplier;
public final class Suppliers {
/**
* Utility class
*/
private Suppliers() {}
/**
* @param supplier the original supplier to store
* @param <E> the supplied type
* @return a supplier storing and returning the same instance
*/
public static <E> Supplier<E> memoize(Supplier<E> supplier) {
return new MemoizeSupplier<>(supplier);
}
private static class MemoizeSupplier<E> implements Supplier<E> {
private volatile boolean initialized = false;
private final Supplier<E> supplier;
private E value;
MemoizeSupplier(Supplier<E> supplier) {
this.supplier = Objects.requireNonNull(supplier);
}
@Override
public E get() {
if (!initialized) {
synchronized (this) {
if (!initialized) {
E t = supplier.get();
value = t;
initialized = true;
return t;
}
}
}
return value;
}
}
/**
* A mutable supplier
*/
public static class MutableSupplier<T> implements Supplier<T
|
github
|
Image Via Thetakeout.com
Or Not.
Imagine being an unsuspecting delinquent, opening Slaughterhouse-Five or The Children’s Crusade: A Duty-Dance with Death for the first time: I was blown away by how psychedelic it was. Vonnegut’s prose was irreverent, ridiculous, and, above all, courageous. Vonnegut plunged blindly into the abyss of existential uncertainty and danced in the darkness. One of the most imaginative novels ever written with a minimalist style—Slaughterhouse-Five felt like Vonnegut knew a hell of a lot more about the world and grammar than me and was choosing words that I could understand. Maybe there was nothing to understand? It was pretty damn cool. Vonnegut made literature cool—especially for a kid in detention.
Image Via wrbh.org
In the introduction to Slaughterhouse-Five, Vonnegut explains how he had been trying to write about the firebombing of Dresden during World War II ever since his imprisonment there. This is the reason that Slaughterhouse’s protagonist, Billy Pilgrim, was also in Dresden during the bombing. Billy’s story is an interesting one—the narrative of his life involves just as much love, humor, and tragedy as anything you could probably imagine. What makes it uber unique is that Billy acquires a certain amount of objectivity similar to the reader’s own. Billy is “unstuck” in time as he has no control over where and when in his life he might be at any given moment. One moment, Billy could be at his daughter’s wedding—the next, fornicating with a movie star. It’s all very non-linear. This ability is supposedly a side-effect of his Tralfamadorian kidnapping; extraterrestrial beings teach Billy to see time in a very Matthew McConaughey-like (Interstellar) way. All moments are permanent, always happening, forever. Billy is most definitely an unreliable narrator throughout, and Slaughterhouse-Five‘s chaos can undoubtedly be interpreted in a variety of ways. All I knew at that time was that I needed more Vonnegut.
Image Via Quickmeme.com
Vonnegut is famous for incorporating reoccurring elements into his novels, such as characters, names, and themes. (He also likes to write himself into
|
pile-cc
|
2
Let x(a) be the third derivative of a**6/120 + a**5/4 + 13*a**4/24 - 13*a**3/6 + 9*a**2. Calculate the lowest common multiple of (1 - -11)*(-3)/(-6) and x(-14).
6
Let m = 0 - -9. Suppose 4*t - m = -1. Suppose -4*s = -5*r - 23, -4 = -s + 5*r - t*r. What is the lowest common multiple of 3 and s?
21
Let y = -1722/19 + 12313/152. Calculate the common denominator of ((-50)/18)/((-4)/6) and y.
24
Let q = -4859 + 22972/5. Let u = q - -266. What is the common denominator of 93/2 and u?
10
Let u = -8 - -14. What is the common denominator of ((-1)/u)/(1/25) and 101/4?
12
Find the common denominator of 0 and 11*2/18 + 1.
9
Let d(y) = -y**3 - 4*y + 2. Let r = 1 + -6. Let j be d(r). What is the common denominator of -34/9 and 2/(-3*(-12)/j)?
18
Suppose 0 = 2*d - 21 + 1. What is the lowest common multiple of 54 and d?
270
Suppose -3*i + 6 = -0. Suppose i*s + 12 = 3*s. Suppose 0*v = 2*v - s. What is the smallest common multiple of 4 and v?
12
Suppose -5*d + 20 = 3*r, 2*d = 4*r - 3*r - 3. Suppose 0*t = -r*j + t, 2*j = -4*t. Find the common denominator of (j - (-7)/(-4))/(-2) and 103/20.
40
Let y = 30285277/1160 - 26108. Let g = y + 9399/1160. Find the common denominator of g and -10.
10
Let k = -76 + 40. Let g be k/13*3/(-78). Let j = -2557/3380 + g.
|
dm_mathematics
|
I learned that the proposed draft was up for signature by members of the
association shortly. The vicechairman of ADA indicated that he thought that
it was late to make suggestions for this round but Enron's participation
would be welcome for future developments. He confirmed that the model
agreement is aimed at transactions between residents of Argentina where one
of the parties is a local financial entity, and basically at financial
derivatives. While commodities are mentioned in the draft they are not
|
enron_emails
|
On March 8, 2016, Petitioner filed a petition in the National Vaccine Injury Compensation
Program.2 Petitioner alleged that as a result of receiving an influenza (“flu”) vaccine on October
18, 2013, she suffered a right shoulder injury related to vaccine administration (“SIRVA”). See
Petition (ECF No. 1). An entitlement hearing was held on May 2-3, 2019 in San Francisco,
California, and on July 12, 2019, I issued my Ruling on Entitlement, finding that Petitioner was
1
I intend to post this Ruling on the United States Court of Federal Claims' website. This means the Ruling will be
available to anyone with access to the Internet. In accordance with Vaccine Rule 18(b), petitioner has 14 days to
identify and move to redact medical or other information, the disclosure of which would constitute an unwarranted
invasion of privacy. If, upon review, I agree that the identified material fits within this definition, I will redact such
material from public access. Because this unpublished ruling contains a reasoned explanation for the action in this
case, I am required to post it on the United States Court of Federal Claims' website in accordance with the E-
Government Act of 2002. 44 U.S.C. § 3501 note (2012) (Federal Management and Promotion of Electronic
Government Services).
2
The National Vaccine Injury Compensation Program is set forth in Part 2 of the National Childhood Vaccine Injury
Act of 1986, Pub L. No. 99-660, 100 Stat. 3755, codified as amended, 42 U.S.C. §§ 300aa-1 to -34 (2012) (“Vaccine
Act” or “the Act”). All citations in this decision to individual sections of the Vaccine Act are to 42 U.S.C.A. § 300aa.
entitled to compensation. On September 27, 2019, the parties filed a Proffer, which I adopted as
my decision awarding compensation on September 30, 2019. (ECF No. 93).
On January 30, 2020, Petitioner filed a motion for final attorneys’ fees and costs. Petitioner
requests compensation in the total amount of $100,071.50, representing $69,122.84 in attorneys’
fees and $30,948.61 in costs. Fees App. at 1. Pursuant to General Order No. 9
|
freelaw
|
Who wants cheaper books? (Help the Domino Project) - cgshaw
I've noticed many HN readers mentioning books of all sorts of varieties.<p>I'm a member of the Domino Project Street Team. Seth Godin along with Amazon is trying to disrupt the publication and book distribution process in a big way.<p>One of the things we're experimenting with now is how to build a list and market to folks in a meaningful way. To get people interested in the project and spreading ideas, Seth is offering to lower the price of his first book, "Poke the Box." For every 5,000 people that sign up for the mailing list, he'll drop the price of the Kindle copy by 1.00. Right now the price is 7.99. He'll go all the way to .99. The Kindle version can be read on nearly any device / computer, but if you want a hardcopy, the book is still at a reasonable 9.99.<p>Just for clarification--I'm not here to sell books. I'm here to spread ideas and come up with ways to get better books in our hands faster and cheaper. If you have no desire to read Seth's book, but want to help us validate (or invalidate) ideas on how to better reach people to keep book prices down, please let us know.<p>This is but one experiment. We've got other ideas and eventually other books will be published through the Domino Project. Please comment in here and ask about the project or contact me, my info is in my profile.<p>You can subscribe to the newsletter at http://bit.ly/h3C0vv .<p>More info on the Domino Project at http://thedominoproject.com
======
Raphael
Who wants free books?
I'm a member of the Internet. Web pages have disrupted publishing and text
distribution in a big way.
One of the things we're experimenting with now is how to build links and get
relevant search results. It'll drop the price of all text to $0.00. The text
version can be read on nearly any device, but if you want a hard copy, you can
use a printer.
This is but one experiment. We've got other ideas and eventually text will
lead to images and audio. Please comment anywhere.
More info on the project at <http://w3.org/>
------
|
hackernews
|
Social stress can lead to drug craving and relapse in cocaine-dependent (CD) individuals. In addition, CD individuals often favor drug use over social interactions. Moreover, social avoidance and lack of trust are significant obstacles to effective treatment. Currently, there are no FDA approved medications for the treatment of cocaine dependence and behavioral interventions have had limited success in sustaining abstinence. Data from human neuroimaging studies using blood oxygen level dependent (BOLD) functional magnetic resonance imaging (fMRI) suggest that top-down
|
nih_exporter
|
The chemistry and photochemistry of the compound 4'-iodo-8-methoxyflavylium tetrafluoroborate was studied in solvent mixtures of water and ethanol. The trans-chalcone form (Ct) is always the most stable species at equilibrium. In particular, for the first time, Ct and not the flavylium cation is reported as the most stable species in mixtures containing water at pH 1.0. The rate of Ct formation as a function of the water content exhibits a bell
|
pubmed_abstracts
|
**PURPOSE:** To compare operative times for specific portions of deep inferior epigastric perforator (DIEP) flap harvest as well as perforator selection in cases where preoperative CTA imaging had been reviewed by the harvesting surgeon preoperatively vs. not reviewed.
**METHODS:** This is a prospective pilot study of two patient groups undergoing breast reconstruction using DIEP flaps. We utilize a two-surgeon approach for all DIEP flaps and for the experimental group the harvesting surgeon was blinded to the results of the preoperative CTA, whereas in the control group the harvesting surgeon had assessed the CTA preoperatively. Patients were randomized to the blinded vs. non-blinded group based on surgical day. Operative times were recorded for initial perforator identification, perforator selection, and total flap harvest time and were compared between groups. The choices of perforators (medial, intermediate, or lateral) were also compared between groups. Within the blinded group, perforator selection by the blinded harvesting surgeon was compared to the pre-operative perforator selection by the non-blinded, non-harvesting surgeon based on CTA imaging.
**RESULTS:** From June-November, 2018, 13 DIEP flaps were performed where the surgeon was blinded to the preoperative CTA results, and 49 flaps were not blinded. The mean time to first perforator identification was longer in the blinded vs. the non-blinded group \[29.2 minutes (SD=8.2) blinded group, 15.1 minutes (SD=6.7) non-blinded, p\<0.0001\]. Time to perforator decision-making was also longer in the blinded vs. the non-blinded group \[25.3 minutes (SD=9.11) blinded, 5.75 minutes (SD=11.2) non-blinded, p\<0.0001\]. Mean total harvest time was significantly longer in the blinded vs. the non-blinded group \[114.6 min (SD=32.5) blinded, 72.6 min (SD=23.7) non-blinded, p\<0.0001\]. Medial row perforators were used in 53.4% (7/13) of flaps in the blinded group, and 42.8% (21/49) of flaps in the non-blinded group, p=.479. Intermediate row perforators were used in 15.4% (2/13) of flaps in the
|
pubmed_central
|
Q:
How to create a versioning/history/revision system for contents published by users?
After reading a lot of SO questions about Keeping page changes history or How to version control a record in a database (for example), I can't find a real elegant solution to do the work.
Now, let's try to explain as clear as possible what we need, for this simple revision system, that allows registered users to post some articles, and other users to submit a revision of those articles, and then some moderators users to check those revisions.
MySQL database
The database contains an articles table with the following simplified fields:
ARTICLE(id, id_user, title, content, date);
To implement the revision/history versions, I guess that we'll have the following table:
REVISION(id, id_article, revision_id_user, id_moderator, revision_date,
revision_title, revision_content, revision_description, revision_check);
With the relation : ARTICLE 0,n <---> 1,1 REVISION
Workflow
A user create an ARTICLE, which is inserted in the ARTICLE table (terrific !)
Another user makes an update of this ARTICLE, this update is recorded in the REVISION table, and is queued for the moderator users. (revision_check=0).
A moderator user validate the REVISION(revision_check=1), then the ARTICLE(content) gets the REVISION(revision_content) value.
My questions
Is this workflow seems to be a good way to do it? Because, I see a mistake: if there are several REVISIONs for an ARTICLE:
Should we take the content of the last submitted REVISION or the original ARTICLE?
Or, should we need to block the revisions as no other REVISION could be submitted while the last isn't checked.
Is there a way to record light versioning? By the way, is it possible to insert in the REVISION table, only the updated content through a SQL, PHP or js compare function? And how to display it like SO do it? Because I'm afraid that the REVISION table will be very heavy.
Bonus : how does SO?
Any idea
|
stackexchange
|
The present invention generally relates to a signal processing circuit for slicing binary signals in a receiver. More particularly, the present invention relates to a signal processing circuit that generates an adaptive slicer threshold by using either average amplitude data of both binary ones and binary zeros, or minimum amplitude data of a binary one and maximum amplitude data of a binary zero.
2. Discussion of the Related Art
Data communication using binary signals takes place at high rates in various applications. For example, in optical data systems, data transmission rates of 10 gigabits/second (Gb/s) and higher are utilized. In such binary data communication systems, a receiver is used for receiving the binary signals from a transmitter. In many cases, the signals received are of a low level and are accompanied by noise and/or jitter (see FIG. 2). The true binary nature of a distinct rectangular pulse, usually designating a binary one, sometimes can be partly obscured by noise, and result in data errors that adversely affect signal processing equipment to which the output of the receiver is applied.
To improve the ability to accurately recapture the binary signals passing through the receiver before being supplied to other equipment, a slicing technique is employed. This technique involves slicing the received binary signal at a level about the midpoint of its amplitude, that is, between its maximum and minimum values. The portion of the received binary signal appearing above the slicing level corresponds to a binary one and the portion below the slicing level corresponds to a binary zero (see FIG. 1 and FIG. 2).
In one type of prior art slicer circuit, the slicer threshold is fixed at a certain voltage level. A variable offset voltage is combined with the voltage level of the received binary signal to maintain the midpoint of the binary signal that is applied to the slicer at the fixed slicer threshold. However, adjusting the received binary signal to maintain the midpoint of the binary signal at a fixed level adds complexity to a system.
In another type of prior art slicer circuit, the slicer threshold is varied so as to be at the midpoint of the amplitude of the binary signal, wherein the midpoint is calculated to be the average of the maximum and minimum values of the received binary signal. However, the midpoint that is calculated using the maximum and minimum values of the received binary signal is the midpoint between the outer edges of the data eye 100, 200 (see FIG. 1 and FIG. 2). The data eye 100, 200 is a plot of
|
uspto_backgrounds
|
The advantage of mesocosm studies is that environmental gradients of interest (e.g., warming temperatures) can be controlled or combined to separate and understand the underlying mechanism(s) affecting the growth or survival of species, populations or communities of interest. By manipulating gradients (e.g., climate variables) mesocosm studies can extend beyond available data helping to build better models of the effects of different scenarios. Mesocosm experiments also tend to include replication of different treatment levels.
Manipulating something can give us an idea as to what to expect if something were to occur in that ecosystem or environment. For indoor mesocosms, growth chambers allow us to control the experiment. You can place plants in a growth chamber and manipulate the air, temperature, heat and light distribution and observe the effects when exposed to different amounts of each factor.
Greenhouses also contribute to mesocosm studies although sometimes, it may induce climate change, interfering with the experiment and resulting in inefficient data.
Disadvantages
Using growth chambers for a laboratory experiment is sometimes a disadvantage due to the limited amount of space.
Another disadvantage to using mesocosms is not adequately imitating the environment, causing the organism to avoid giving off a certain reaction versus its natural behavior in its original environment.
Examples
[A] Mazzeo and colleagues examined the eating habits of Hoplias malabaricus fish when exposed to different amounts of phytoplankton, zooplankton, and competition. Three months prior to conducting the experiment, they maintained an average precipitation, air temperature, and overall subtropical environment. Using 12 units, they filled them with aquifer water, sand and plants and kept them in isolation until the environment became suitable for phytoplankton to emerge. After careful preparation, Mazzeo et al. began the experiment dividing those units into categories of a control (zooplankton and phytoplankton) and 3 experiments: (Jenynsia multidentata with zooplankton and phytoplankton), (juvenile Hoplias malabaricus with zooplankton and phytoplankton), and (Large Hoplias malabaricus, Jenynsia multidentata, zooplankton, and phytoplankton) and observed biomass differences within different conditions.
[B] Flanagan and McCauley tested the effects of climate warming on carbon dioxide concentration on shallow ponds by creating an eight-cylinder shaped in situ mesoc
|
wikipedia_en
|
![**Histograms of azimuthal velocities in dense bacterial suspension.** (a and b) individual bacteria swimming near (a) the top oil/water interface and (b) the bottom PDMS interface, (c and d) fluid flow with tracer particles near (c) the top oil/water interface and (d) the middle of PDMS microwell, and (e) PIV velocity field of collective bacterial motion observed under bright field. The blue bars correspond to the probability of CCW rotation while the red bars to CW rotation. We also analyzed collective motion in two different sizes of microwells: $R = \SI{35}{\micro\meter}$ (small blue circle) and $R=\SI{50}{\micro\meter}$. In the larger microwells, we considered two regions: the boundary layer within from the lateral boundary (larger blue diamond), and the bulk that is more than away from the lateral wall (green filled square).[]{data-label="fig.s5"}](figureS5_5.jpg)
solid interface (Fig.\[fig.s4\](a)) Top fluidic interface (Fig.\[fig.s4\](b)) Bottom solid interface (Fig.\[fig.s4\](c))
-------------------------- ------------------------------------- ------------------------------------------- --------------------------------------------
spatial constraint Boundary-free Circular microwell Circular microwell
sample size, N N = 264 N = 1469 N = 876
average angular velocity
: Sample sizes and average velocities of histograms presented in Fig. \[fig.s4\] (PTV (bacteria)).
\[table.s1\]
[|c|c|c|c|ll]{} & **$R$= , boundary** & **$R$= , boundary** & **$R$ = , bulk** &\
PTV (bacteria) TOP & $N = 491$, $\langle v_{\theta}\rangle = \SI{4.24}{\micro\meter}$/s & $N = 784$, $\langle v_{\theta}\rangle = \SI{3.44}{\micro\meter}$/s & $N = 1129$, $\langle v_{\theta}\rangle = \SI{0.369}{\micro\meter}$/s &\
PTV (bacteria) BOTTOM & $N = 619$, $\langle v_{\theta}\rangle =
|
arxiv
|
tc_check_packets "dev $h2 ingress" 102 1
check_err $? "Did not match on correct filter (0x18)"
$MZ $h1 -c 1 -p 64 -a $h1mac -b $h2mac -A 192.0.2.1 -B 192.0.2.2 \
-t ip tos=20 -q
tc_check_packets "dev $h2 ingress" 102 2
check_fail $? "Matched on a wrong filter (0x20)"
tc_check_packets "dev $h2 ingress" 101 1
check_err $? "Did not match on correct filter (0x20)"
tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower
tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower
log_test "ip_tos match ($tcflags)"
}
match_indev_test()
{
RET=0
tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \
$tcflags indev $h1 dst_mac $h2mac action drop
tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \
$tcflags indev $h2 dst_mac $h2mac action drop
$MZ $h1 -c 1 -p 64 -a $h1mac -b $h2mac -A 192.0.2.1 -B 192.0.2.2 \
-t ip -q
tc_check_packets "dev $h2 ingress" 101 1
check_fail $? "Matched on a wrong filter"
tc_check_packets "dev $h2 ingress" 102 1
check_err $? "Did not match on correct filter"
tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower
tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower
log_test "indev match ($tcflags)"
}
setup_prepare()
{
h1=${NETIFS[p1]}
h2=${NET
|
github
|
Beautiful original cover art that is reminiscent of subject matter. Book cover by B-Ro for Tom Maloney.
Striking cover design that uses a single bold color, black silhouette, and typography to make an impression. Book cover by Pulp ART for Alia Tero.
Dramatic cover design that uses a black and white photo, bold typeface, and shadows to suggest a mystery. Book cover by Llywellyn for LIterary Fiction.
Typography
The font for this sci-fi novel is instantly setting the mood, but still totally legible. Book cover by B&J for Red Planet.
The fonts you select communicate more than the words they spell out, so choose based on the content and tone you’re aiming for. Don’t get so creative with fonts that your title and other information is tricky to read. Set the right mood with your font; choose a more flowing font to suggest romance, a whimsical font for humor, and a bold, strong font to create a sense of drama or adventure.
Title
Think like a reader, not as the author. Aim for clarity, not cleverness. Your title is the first (and sometimes the only) thing people read. Does it communicate what the book is about visually? Your goal is to use visual elements and design to show potential readers what the book is about and create a feeling in them that gives them a sense of what reading the book will be like.
This book cover for The Girl on the Train immediately conjures up a sense of mystery and lets you know you’re in for a thrilling page-turner. The blurriness of the typeface may just be the motion of the train—or it could be something more enigmatic about the girl and the story itself. Consider how you can use typography, color, and graphics to create this kind of communicative imagery for your book cover.
Subtitle
Use a subtitle only if it is needed to clarify or elaborate on your book’s topic. Ideally your subtitle compliments the title and adds additional descriptive detail. If it makes sense—and especially if you’re going to be epublishing—include any searchable keywords that are not in your title.
Back cover
–
Your front cover did its job if the shopper made it to the back cover; it got them interested enough to give the book a second look
|
pile-cc
|
Let v(z) be the third derivative of 155*z**8/112 + 103*z**5/30 + z**2 - 99*z. What is the third derivative of v(l) wrt l?
27900*l**2
Let t(v) = 28*v**2 + 19*v. Let j(o) = 0*o + 3*o + 19*o**2 + 10*o. Let w = 46 - 53. Let i(a) = w*j(a) + 5*t(a). Find the second derivative of i(u) wrt u.
14
What is the derivative of 166 + 77*y + 129*y - 63*y + 25*y wrt y?
168
Let n = 16 - -19. Find the second derivative of 10*i - n*i**4 - 2*i**2 + 2*i**2 - 8*i wrt i.
-420*i**2
What is the derivative of 64*s**4 + 2101*s - 2101*s + 479 wrt s?
256*s**3
Let p(t) = 52*t**3 + 32*t**2 + 3. Let d(l) = 103*l**3 + 64*l**2 + 5. Let g(j) = 6*d(j) - 10*p(j). Find the third derivative of g(q) wrt q.
588
Let j(p) be the first derivative of 2*p**6/15 + p**4/2 + 10*p - 9. Let m(f) be the first derivative of j(f). What is the third derivative of m(w) wrt w?
96*w
What is the third derivative of -2*s**2 - 21 + 27 + 4*s**3 + 6*s**2 - 26*s**3 - 7 wrt s?
-132
Let r(f) = -80*f - 66. Let p(z) = -2. Let k(m) = 3*p(m) - r(m). What is the derivative of k(o) wrt o?
80
What is the second derivative of -24*o + 108*o + 20*o + 41*o**5 - 2*o**4 + 23*o
|
dm_mathematics
|
The information provides further details about:
-- the $1.2 billion charge to shareholders' equity announced in the third quarter and the transactions related to that charge;
-- a restatement of prior years' financial statements to reflect this reduction in shareholders' equity, the consolidation of three entities and prior year proposed audit adjustments and reclassifications;
-- the Special Committee appointed by the Enron Board of Directors to review transactions between Enron and related parties;
-- the LJM
|
enron_emails
|
FACTS
The facts most favorable to the judgment reveal that on August 12, 1987, Officer Patrick Tompkins (Officer Tompkins) of the Marion County Sheriff's Department stopped Parker for driving through a red light. Upon observing that Parker appeared intoxicated, Officer Tompkins offered Parker the opportunity to submit to a chemical sobriety test (Breathalyzer). Parker refused. Officer Tompkins then informed Parker of the consequences of his refusal under the Implied Consent Law. Again Parker refused to submit to a chemical sobriety test. Later, at the lock-up, Parker changed his mind and requested to take the alcohol breath test.[2] Officer Tompkins refused to give Parker the test.
ISSUES
The issues presented by Parker are restated as:
1. Was the evidence sufficient to sustain Parker's conviction of operating a vehicle while intoxicated?
2. Were Parker's statutory and constitutional rights violated when the arresting officer refused Parker's request for a chemical sobriety test when Parker had twice refused an offer by the arresting officer?
DECISION
ISSUE ONE Was the evidence sufficient to support Parker's conviction of operating a vehicle while intoxicated?
PARTIES' CONTENTIONS Parker claims the evidence is insufficient to sustain the conviction because his testimony *130 contradicted the testimony of the arresting officer.
The State responds that the evidence is sufficient.
CONCLUSION The evidence is sufficient to sustain the conviction.
If there is substantial evidence of probative value to support the judgment, we will not reverse. Clark v. State (1987), Ind. App., 512 N.E.2d 223. Officer Tompkins testified that Parker had bloodshot eyes, slurred speech, the odor of alcohol on his breath, and difficulty in removing papers from his glove compartment. Parker also failed the field sobriety finger-to-nose test and was unable to recite the alphabet in proper sequence. Parker's failure of these tests supported Officer Tompkins' belief that Parker was intoxicated. Deputy Larry Harding, who was also on the scene, corroborated Officer Tompkins' testimony and additionally noted that Parker was staggering. The fact that Parker drove through a red light was further evidence that the influence of alcohol impaired his thought and action to such an extent as to endanger others. See id. The evidence was sufficient to sustain the conviction for operating a vehicle while intoxicated. See Jennings v. State (1987), Ind. App., 503 N.E.
|
freelaw
|
The truth stops there, the rest is "science" fiction. It would be true if the
lethality was over 5%, which is just not possible (lethality is not yet known
exactly, but will probably be between 0.6% and 3%, probably around 1%.
There is no need to be afraid, however this is still a really dangerous virus
and thousands of peoples will die in each countries.
------
empiricallytrue
Starts speculative, gets fantastical, ends up deeply paranoid.
~~~
DyslexicAtheist
which part did you feel was _fantastical_ or _deeply paranoid_?
I'm actually terrified by doing the math with the most conservative, best case
outcome: under that I will
a) be dead,
b) know somebody who has died,
c) many in my surrounding will struggle because of the socio-economic effects
and lack the reserves to deal with the primary effects (emotional) and
secondary effects (emotional and financial)
... also a/b/c are in no way mutually exclusive
~~~
kaazhan
\- If you have no breathe/heart chronic problems, and you are under 40 y/o,
your death chance, IN CASE YOU DO HAVE the coronavirus, is below 1%. \- There
will not be a strong economic impact that will stop globalisation. Maybe there
will be economics short term changes. Maybe there will be important. But what
is said here is apocaliptic. You should read about the SRAS (15 times more
deadly, less infectious), or about ebola (40-80 times more deadly, less
infectious).
ebola, SRASS, H1N1, H1Z1, mad cow, all of thoses deases have killed a lot of
peoples. Not in EU nor US. only poor non-white people have died. Everybody is
really afraid by this one only because rich countries will have to do
something, not just watch poor black people die on TV. ebola killed 11k
peoples during 2014-2016.
The only really special thing is that you've between 2 and 14 days, if you
caught coronavirus, during which you are infectious. the dease have strong
contagious capabilities because of that. But that's clearly not the most
dangerous
|
hackernews
|
The prevalence, morbidity and mortality of asthma have increased dramatically over the last two decades despite concomitant advances in the understanding of the physiology of asthma and improved treatment modalities. These increases come at great cost in terms of health care dollars spent, school absences, psychosocial adjustment problems and limitations on activities. Experts agree on the importance of asthma education, and asthma education programs are available. However, the lack of trained personnel, time, and funds for such programs remain obstacles to widespread dissemination of asthma education. In
|
nih_exporter
|
One hundred and twenty 30-day-old specific-pathogen-free chickens were inoculated with the liposomal inactivated avian pathogenic Escherichia coli (APEC) vaccine by eye drop or coarse spraying. All of the chickens produced anti-lipopolysaccharide antibodies of the IgG subclass in their sera as well as IgA antibodies in their oral mucus. The results demonstrated a rise in antibodies in the serum of chickens administered the APEC vaccine through nonparenteral mucosal routes. Bacterial counts in the blood decreased,
|
pubmed_abstracts
|
DISCUSSION {#s3}
==========
Since the discovery of Brd4 as an epigenetic regulator, a number of studies have characterized target genes and molecular pathways that are regulated by it \[[@R11]--[@R16], [@R19]\]. Recent studies have suggested a model in which Brd4 acts as a scaffold to recruit multiple regulatory proteins such as the hematopoietic transcription factor CEBPβ through direct protein-protein interactions \[[@R16], [@R19], [@R21]--[@R23]\]. The recent finding that NPMc+ and MLL-fusion AML cell lines and primary leukemic cells have sustained activation of autophagy and that autophagy is reduced with Brd4 inhibition \[[@R10]\] suggested that Brd4 is a regulator of autophagy. The present study provides more direct evidence that Brd4 in conjunction with CEBPβ plays an important role in the transcriptional regulation of autophagy genes in certain AML cells. Inhibition of Brd4 function with both well-validated inhibitors and inducible Brd4 shRNAs reduced the expression of Atg3, Atg7, and CEBPβ, each of which plays an important role in the induction of autophagy. Genome-wide occupancy studies of Brd4 using Brd4-ChIP-seq demonstrated that Brd4 is located at the promoter and enhancer regions of CEBPβ and is present in conjunction with CEBPβ at several other autophagy-associated genes, suggesting an integral role for CEBPβ in autophagy. This result is further supported by the marked reduction of Atg3 and Atg7 expression that follows depletion of CEBPβ. These data, together with those obtained by Roe et al \[[@R19]\], indicate that Brd4 acts as an upstream regulator responsible for the recruitment of CEBPβ to core genes enabling autophagy in select cell types.
Somatic mutations in KEAP1 and NRF2 occur in a variety of cancer types and are important mediators of aberrant anti-oxidant responses \[[@R39], [@R40]\]; however, no such mutations have been reported to date in human leukemia cells (The Cancer Genome Atlas, TCGA, database) \[[@R41]--[@R43]\]. Our study supports a model in which Brd4 increases the expression of Keap1, resulting in down-regulation of the Nrf2-antioxidant pathway and increases in both ROS levels and autophagy in NPMc+ AML cells \[[@R36], [@R37]\]. Conversely, a reduction in Keap1 expression by Brd4 inhibition or CRISPR-cas 9 excision
|
pubmed_central
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.