text
stringlengths 173
4.38k
| subset
stringclasses 13
values |
|---|---|
Ning Security Hole Discovered By Hackers - Millions of Accounts Compromised - yurisagalov
http://thenextweb.com/insider/2012/04/20/ning-security-hole-discovered-by-hackers-as-many-as-100-million-accounts-compromised
======
ohashi
The title is a bit misleading. I don't see any evidence of a hack. Just
because a vulnerability was discovered doesn't mean it was used to compromise
accounts. It is possible, but it was always possible with or without this
vulnerability being disclosed now. If it did occur, this may not have even
been the method used.
------
supereric
I work for Ning and wanted to let anyone who is interested know that there is
some additional info on the Ning Blog about this issue if anyone is
interested: [http://www.ning.com/blog/2012/04/security-updates-on-ning-
pl...](http://www.ning.com/blog/2012/04/security-updates-on-ning-
platform.html).
Hope that helps. Have a great weekend.
E
------
plowman
I work at Ning. I can confirm this hole was recently patched.
------
thezilch
In fact, one of referenced articles [0] states the students disclosed the hack
to Ning in March. It's not clear when the hole was patched, but I have a hard
time believing it has been nearly a month between the hack being demonstrated
to Ning and Ning releasing a solution. Furthermore, it appears the Dutch news
sites and TNW's translation are only reporting on the issue because the
students are comfortable in now releasing this information, only after Ning
has patched the vulnerability, BEFORE millions of accounts could be
compromised. In this regard, I don't understand TNW's tone nor this post's
title.
Of course, Ning should certainly come forward with their findings and what
diligence was made.
[0] [http://webwereld.nl/nieuws/110261/ning-lekt-
accounts-100-mil...](http://webwereld.nl/nieuws/110261/ning
|
hackernews
|
This application is for renewal of a postdoctoral training grant that is focused primarily on sleep/circadian biology and sleep disorders, in particular sleep-disordered respiration. Sleep disorders are increasingly recognized as common disorders that have a significant morbidity and even mortality. Sleep apnea results in excessive daytime sleepiness and an increased risk of vehicular crashes; it is also associated with an increased risk of hypertension, stroke and myocardial infarction. Although sleep disorders are very common, there is limited knowledge about the basic mechanism of
|
nih_exporter
|
MMX mesalamine: a novel high-dose, once-daily 5-aminosalicylate formulation for the treatment of ulcerative colitis.
5-Aminosalicylate (5-ASA) agents are the first-line therapy for ulcerative colitis (UC). A high-dose, once-daily formulation of 5-ASA known as MMX mesalamine has recently been approved for the treatment of UC. To summarize current data on MMX mesalamine and
|
pubmed_abstracts
|
As part of our program which aimed to develop new selective and environmentally friendly methodologies for the preparation of 2-chloroquinolines (Roopan *et al.*, 2010), we report here crystal structure of the title compound, (I).
The title molecule (I), (Fig. 1), except the hydroxyl and methyl H atoms, close to planar (r.m.s deviation 0.017 Å). The values of the geometric parameters in (I) are comparable to those of some similar structures (Khan *et al.*, 2009).
In the solid-state, the molecules are linked *via* intermolecular O---H···O hydrogen bonds (Table 1, Fig. 2). The crystal structure is further stabilized by an intermolecular C--H···π interactions between the methylene H atom of ethenol substituent and the pyridine ring of an adjacent molecule, with a C10--H10A···*Cg*1^ii^ separation of 2.75 Å (Table 1, *Cg*1 is the centroid of N1/C1--C3/C8/C9 pyridine ring; symmetry code: (ii) *x*, *y* + 1, *z*). In addition, the packing mode results in stabilizing π-π stacking interactions \[*Cg*1···*Cg*2^ii^ = 3.661 (2) Å, where *Cg*1 and *Cg*2 are the centroids of the N1/C1--C3/C8/C9 and C4--C9 rings\].
Experimental {#experimental}
============
2-Chloro-8-methylquinoline-3-carbaldehyde (206 mg, 1 mmol), sodium borohydride (38 mg, 1 mmol) and catalytic amount of montmorillonite K-10 were taken in an open vessel and the resulting mixture was irradiating at 500 W for 4 min. Ethylacetate was poured into the reaction mixture and filtered off. The filtrated after removal of solvent ethy lacetate was subjected to column chromatography packed with silica and ethyl acetate/petroleum ether was used as the eluant. Colourless plates of (I) were grown by solvent evaporation from a solution of the compound in chloroform.
Refinement {#refinement}
==========
H atoms were positioned geometrically, with C---H = 0.93- 0.97 Å
|
pubmed_central
|
Userform time format problems
Ok, so i have been working on a project for a while now. And its almost done. But i keep having small issues that i cant solve. This time its a formatting issue.
Short and simple:
I have a table in sheet1(database) of information that i display in a userform (see image)
There are several approaches to add a new line in the database, you can add it manually by filling all the empty text boxes, or you can double click an existing row and the text boxes fill them self. My problem is when i double clicking existing row, time format changes. see image.
I solved that using this code:
Private Sub Reg5_Change()
Reg5.Value = Format(Reg5.Value, "hh:mm")
End Sub
But then i have trouble doing it the manually way. When i try to type in time i end up getting 00:00 and having trouble changing it.
Is there a way to solve this so i can use both methods for adding new row in database?
Other questions:
I want the textbox ETA to contain ETD + EET.
I tried this with a result of 08:02 when ETD = 08:00 and EET = 02:00. Seems like EET is added as minutes.
Private Sub Reg7_AfterUpdate()
Reg7.Value = Reg5.Value + Reg6.Value
end sub
Update:
Private Sub Reg7_Change()
Dim etd As String: etd = Reg5.Value
Dim eet As String: eet = Reg6.Value
Dim detd As date
Dim deet As date
detd = TimeSerial(Split(etd, ":")(0), Split(etd, ":")(1), 0)
deet = TimeSerial(Split(eet, ":")(0), Split(eet, ":")(1), 0)
Reg7.Value = detd + deet
end sub
Getting this error
But as you can see in the image the time is correct and that part is working correct.
hope there is someone out there who can help me out
A:
Concerning the part for "I tried this with a result of 08:02 when ETD = 08:00 and EET =
|
stackexchange
|
As population and cities incessantly grow, and spare land for green area is harder and harder to find. Ordinary people living in a jungle of concrete buildings can only make use of a small space for planting some trees, flowers or green lawn for enjoying and observation, cultivating some lawn on a rooftop or arranging some pot flowers and evergreens, etc. in a house. However, those pot flowers or lawns on rooftops have the following disadvantages and inconveniences.
1. In planting lawns a layer of non-woven cloth is laid on the ground, or a layer of hollow bricks is laid under the layer of non-woven cloth additionally. Then soil is placed on the non-woven cloth for cultivating lawn or flowers in the soil, but this kind of planting is rather suitable for a large area, not suitable for a small room in a house or a small space of outer empty land around a house.
2. As soil is to be brought into a house and laid on a non-woven cloth, it may smear some places in a house during carrying the soil, involving cleaning work of scattered soil.
3. Common lawn is in advance already cultivated and then transplanted to where it is needed, so after the lawn is finished planting, it is not easy to change or supplement other flowers
4. Soil for lawn or green grass cannot hold water always enough, so it has to be watered regularly, resulting in psychological and bodily burden to a person.
A main objective of the invention is to offer a combinable planting plate consisting of a base, a support plate and a planting layer. The base has a plurality of cup-shaped chambers for storing water, or cone-shaped projections to store water in the spaces among the cone-shaped projections. The base has a plurality of projecting square rings and projecting combining studs formed on a circumferential edge for combining more than two bases to increase a planting area. Further, a support plate or a flat net plate is combined on the base, having a plurality of cone-shaped cups with water-absorbing material contained therein for adjusting water volume. The support plate has a circumferential short wall for placing a planting layer in the space surrounded by the wall. Then lawn, green grass or flowers may be planted in the planting layer according to a person"" liking,
Another objective of the invention is to offer a combinable planting plate provided with a support plate, which has a plurality of cone-shaped projections and water-absor
|
uspto_backgrounds
|
In Japan, television advertisements related to religion are generally considered to be taboo, although Buddhist temples, Shintō shrines, Souka Gakkai, etc., have all produced advertisements for television. The Foundation's advertisements were declared "religious propaganda" by Germany's Federal Broadcasting Council in January, 2002, and as such their broadcast is prohibited in Germany.
David Chilton
David Chilton (1951–1997) was a pastor, Christian Reconstructionist, and author of several books on eschatology and preterism. He contributed three books on eschatology: Paradise Restored (1985), Days of Vengeance (1987), and The Great Tribulation (1987).
Gary DeMar
Gary DeMar is an American writer, lecturer and the president of American Vision, an American Christian nonprofit organization. The think-tank has a vision of "an America that recognizes the sovereignty of God over all of life and where Christians are engaged in every facet of society."
Jamie Buckingham
Jamie Buckingham (1932–1992) was the founder of the Tabernacle Church in Melbourne, Florida. He was the author of Run, Baby, Run (with Nickey Cruz), Shout it From the Housetops (with Pat Robertson), Ben Israel (with Arthur Katz) and 34 other books. Buckingham was editor for Charisma Magazine until his death in 1992. More about Jamie can be found at www.JamieBuckinghamMinistries.com.
Controversies
In Japan
Advertisements for a free copy of the book have appeared in Japan on TV Asahi, TV Tokyo, Tokyo Broadcasting System and Nippon Television, but Fuji Television refused to broadcast the ads because of the controversy surrounding them. The advertisements have generated suspicion about the Foundation's origins, activities and purposes, perhaps by the Foundation's failure to declare them to the public precisely.
In Germany
In Germany, TV advertisings for the book were banned because they were considered as "advertising a worldview or religion", which is forbidden by § 7 section 8 of the German state treaty on broadcasting (Rundfunkstaatsvertrag) and European laws on media. For its posters, newspaper adverts and leaflets, however, there was no such problem.
History
1955 - The National Liberty Foundation is established by Arthur S. DeMoss.
1979 - DeMoss dies at age 53.
His wife, Nancy
|
wikipedia_en
|
In this work we focus on the non-studied before regime of global torsional Alfvén nodeless vibrations of neutron star about axis of Ferraro’s magnetic field (\[e1.10\])-(\[e1.12\]). In Section 2, the frequency spectrum of this toroidal mode is derived and compared with the frequency spectrum (\[e1.8\]) of the neutron star model with homogeneous internal magnetic field. In Section 3, the obtained spectral formula for the frequency is analyzed numerically in juxtaposition with data on QPOs during the flare of SGR 1806-20 and SGR 1900+14. Section 4 briefly accounts for the net outcome of this work. Technical details of analytic computations can be found in Appendix.
Global Alfvén torsional nodeless oscillations of neutron star in its own poloidal magnetic field of Ferraro’s form
==================================================================================================================
In the model under consideration a neutron star is identified with a finite spherical mass of an elastic solid, regarded as an incompressible continuous medium of uniform density $\rho$ and an infinite electrical conductivity, whose vibrations under the action of Lorentz magnetic force are governed by equations of magneto-solid-mechanics (\[e1.2\]) which can conveniently be represented in the following equivalent tensor form (e.g. Mestel 1999) $$\begin{aligned}
\label{e2.1}
&&\rho{\ddot u}_i=\nabla_k\, \delta M_{ik},\quad \delta M_{ik} =\frac{1}{4\pi}[B_i\,\delta B_k+B_k\,\delta B_i-(B_j\,\delta B_j)\delta_{ik}], \\
&& \delta B_i({\bf r},t)=(B_k \nabla_k)u_i-(u_k\nabla_k) B_i,\quad \nabla_i u_i=0
\end{aligned}$$ where $\delta M_{ik}$ stands for the Maxwell’s tensor of magnetic field stresses. The energy balance in the process of vibrations is controlled by equation $$\begin{aligned}
\label{e2.2}
&& \frac{\partial }{\partial t}\int \frac{\rho{\dot u}^2}{2}\,d{\cal V}
=- \int \delta M_{ik}\,{\dot u}_{ik}\,d{\cal V}=-\frac{1}{8\pi
|
arxiv
|
[Fact]
[Description("Performs a querystring-based search of the v1 feed. Confirms expected packages are returned.")]
[Priority(0)]
[Category("P0Tests")]
public async Task SearchV1Feed()
{
await SearchFeedAsync(UrlHelper.V1FeedRootUrl, "Json.NET");
}
[Fact]
[Description("Performs a querystring-based search of the v2 feed. Confirms expected packages are returned.")]
[Priority(0)]
[Category("P0Tests")]
public async Task SearchV2Feed()
{
await SearchFeedAsync(UrlHelper.V2FeedRootUrl, "Json.NET");
}
private async Task SearchFeedAsync(string feedRootUrl, string title)
{
var requestUrl = feedRootUrl + @"Search()?$filter=IsLatestVersion&$skip=0&$top=25&searchTerm='newtonsoft%20json'&targetFramework='net40'&includePrerelease=false";
TestOutputHelper.WriteLine("Request: GET " + requestUrl);
string responseText;
using (var httpClient = new HttpClient())
using (var response = await httpClient.GetAsync(requestUrl))
{
TestOutputHelper.WriteLine("Response: HTTP " + response.StatusCode);
responseText = await response.Content.ReadAsStringAsync();
}
var expectedUrl = feedRootUrl + "package/Newtonsoft.Json/";
Assert.True(responseText.Contains(@"<title type=""text"">" + title + @"</title>")
|| responseText.Contains(@"<d:Title>" + title + @"</d:Title>"), "The expected package title '" + title + "' wasn't found in the feed. Feed contents: " + responseText);
Assert.True(responseText.Contains(@"<content type=""application/zip"" src=""" + expectedUrl), "The expected package URL '" + expectedUrl + "' wasn't found in the feed. Feed contents: " + responseText);
Assert.False(responseText.Contains(@"jquery"), "The feed contains non-matching package names. Feed contents: " + responseText);
|
github
|
I love punkrock and metal. That's why my character Noah Milano listens to it and Lenny Parker is a roadie. I love the surfer setting in crime novels, ever since shows like High Tide on TV and the Dawn Patrol book. How cool is it when a writer combines the love of punkrock and surfing and combines it into a PI novel? THIS cool!
Greg Salems used to play in a punkband, Bad Citizen Corporation and became a cop. When he is being investigated for a shooting one of his friends gets killed. He sets out to investigate, delving into is own past as well as that of the victim.
There's some awesome scenes in this book, like the exciting climax that is made for Hollywood and the fantastic scene in a punkrock club that made feel like I was there. I've been to a lot of punkrock shows and that scene described the sounds, the sights AND the feelings perfectly.
The feelings of Greg are written in a very compelling way and the book is as much about a punkrocker in his forties as much as a about a murder mystery. What is so well-done is that one never takes a backseat to the other. If you love crime novels or literary fiction about musicians you need to pick up this book.
Friday, December 4, 2015
You all know Dexter, tight? The serial killer targetting serial killers. If you haven't read the books you will have seen the TV show. What you might not know is that Dexter's creator published a less succesful book in the nineties, featuring fisherman / ex-cop Billy Knight. This is a reprint of that book.
Billy Knight lives in Key West, he moved there after his family got killed in LA. When an old friend from the force asks his help, trying to find out who killed his son during the LA riots Billy isn't planning to help him. He just doesn't want to face the demons he left behind there.
When something happens to his friend he decides to go to LA anyway and investigate. There he falls in love and faces an almost superhuman foe.
There are some pretty good action scenes in this book and Billy is a real knight in tarnished armour, carrying around some deep trauma. The kind of damaged, but tough character that makes for the best protagonist in (unofficial) PI novels.
The good news is that Jeff Lindsay followed up this one with a totally new book
|
pile-cc
|
What is 197 times 2166?
426702
Work out -4 * -1.01191.
4.04764
-2.63835 times 0.8
-2.11068
Product of 3 and 59812.
179436
Calculate 132.831*12.
1593.972
Multiply 1.90948 and -0.2.
-0.381896
-27 times -24.333
656.991
-15.7*0.0129
-0.20253
Multiply -56167 and 9.
-505503
-0.05562 times 1.12
-0.0622944
-8 times -2.59
20.72
What is the product of 0.7 and -6884?
-4818.8
0.07 * -0.0416401
-0.002914807
What is -3 times 8456?
-25368
What is the product of -65 and 8431?
-548015
What is the product of -2 and 580960?
-1161920
-6622*0.19
-1258.18
-66.73917*0.1
-6.673917
What is the product of -153 and -0.3877?
59.3181
Multiply 52.4 and -6.314.
-330.8536
0.30768 * 7
2.15376
31911 * -5.7
-181892.7
What is the product of 0.4 and -9421?
-3768.4
-225 * -0.12
27
Calculate -76*98.46.
-7482.96
-89.486*-0.17
15.21262
What is the product of -1 and 1.486632?
-1.486632
What is 0.66552 times 0.3?
0.199656
What is the product of -0.0484 and 8?
-0.3872
Work out -0.0151 * -0.04.
0.000604
What is 71139 times -0.7?
-49797.3
-0.3 times 0.8012
-0.24036
35
|
dm_mathematics
|
Please forward me an updated list of officers for this entity. I am trying
to update the signatories for this account and upon getting approval, Mr.
Kinneman advised me that he was no longer President of this entity. I obtain
my information from secretariat and as you know is not the most efficient.
Thanks in advance.
Luis A. Gonzalez
luis.a.gonzalez@enron.com
Enron Global Finance
|
enron_emails
|
201 A.2d 754
ESSENTIAL CONSTRUCTION CO., INC., AND HIMOUNT CONSTRUCTORS, LTD., A JOINT VENTURE, PLAINTIFFS-APPELLANTS,
v.
ROYAL CONCRETE FIREPROOFERS, INC., A CORPORATION OF NEW JERSEY, LIMBARDO CONTRACTING LTD., A CORPORATION OF NEW YORK, ANTONIO LIMBARDO, MARY LIMBARDO, LEO MANNO, AND SAUL TABS, DEFENDANTS-RESPONDENTS.
Superior Court of New Jersey, Appellate Division.
Argued May 11, 1964.
Decided June 24, 1964.
*291 Before Judges CONFORD, FREUND and SULLIVAN.
Mr. Allen S. Gutfleish argued the cause for appellants (Messrs. Weitz & Gutfleish, attorneys; Mr. Donald A. Sterling, on the brief).
Mr. Abraham L. Rosenberg argued the cause for respondents (Messrs. Rosenberg, Schmidt & Greenhalgh, attorneys).
The opinion of the court was delivered by CONFORD, S.J.A.D.
This is an attachment action. The Superior Court, Law Division, entered an order quashing plaintiffs' attachment of New Jersey bank accounts of defendant Limbardo Contracting Ltd., a New York corporation ("Limbardo," hereinafter), levied pursuant to an order for attachment dated February 28, 1964. This court granted leave to appeal.
Other defendants are Royal Concrete Fireproofers, Inc., a New Jersey corporation ("Royal," hereinafter), and certain individual stockholders, officers and agents of Limbardo and Royal. Royal and Limbardo are said to be commonly owned and controlled. The complaint charges, in substance, that plaintiffs, constituting a joint venture, contracted with Royal for the latter to provide all concrete work for the construction of a library building in New York City at a stated guaranteed figure, but that Royal defaulted on the contract; that Royal and Limbardo, through common agents and employees, conspired to defraud plaintiffs by diverting labor and material on the library job site, for which plaintiffs had advanced moneys, to construction projects elsewhere wherein Limbardo alone was contractor.
On return of an order to show cause a judge of the Law Division quashed the writ of attachment on the basis of
|
freelaw
|
------
dantiberian
I came across this this week working on the RethinkDB driver for Clojure
([https://github.com/apa512/clj-
rethinkdb/pull/114](https://github.com/apa512/clj-rethinkdb/pull/114)). As
soon as I saw "40ms" in this story I thought "Nagles Algorithm".
One thing I haven't understood fully is that this only seems to be a problem
on Linux, Mac OS X didn't exhibit this behaviour.
~~~
tirumaraiselvan
That might be because Mac OS X implements modified Nagle's algorithm as
mentioned here at the bottom:
[http://www.stuartcheshire.org/papers/NagleDelayedAck/](http://www.stuartcheshire.org/papers/NagleDelayedAck/)
~~~
masklinn
So OSX implements a slightly modified nagle to remove the bad interaction
between nagle and delayed acks?
------
bboreham
Why wouldn't an http client library turn off Nagle's algorithm by default?
------
neduma
Can wireshark/riverbed (application perf tests) profiling help to solve these
kind of problems?
~~~
spydum
Wireshark can show you the delay but it won't tell why it's there. You might
assume it's some quirk of your application.. Most people don't consider the
kernel/network libraries and drivers.. Those are all black magic
------
rjurney
In highschool I carried TCP Illustrated around with me like a bible. I
cherished that book. Knowledge of networks would eventually be incredibly
useful throughout my career.
------
mwfj
This can be generalised. It is also one of my favorite ways of doing developer
interviews. Do they have a working/in-depth knowledge of what keeps the inter
webs running? So many people have never ventured out of their main competence
bubble, and that bubble can be quite small (but focused, I suppose).
For all I know, they believe everything is kept together with the help of
magic. I guess I don't trust people who don't have a natural urge to
understand at least the most basic things of our foundations.
~~~
hue
|
hackernews
|
The VRC has produced the anti-HIV bnAbs VRC01, VRC01LS, VRC07-523LS, N6LS, and 10E8VLS and has several other bnAbs in development, while initiating multiple Phase I clinical trials. VRC01 is currently in a Phase II clinical trial (the Antibody-Mediated Prevention (AMP) Trial (http://www.hvtn.org/en/science/HVTN- studies/AMP
|
nih_exporter
|
Employee empowerment, innovative behavior and job productivity of public health nurses: a cross-sectional questionnaire survey.
Employee empowerment is an important organizational issue. Empowered employees with new ideas and innovative attributes may increase their ability to respond more effectively to face extensive changes in current public health care work environments. The objective of this study was to investigate the relationships between employee empowerment, innovative behaviors and job productivity of public health nurses (PHNs). This study conducted a cross-sectional research design. Purposive sampling
|
pubmed_abstracts
|
It is written in the classical text that when *Vasti Dravya* is sent into the colon, in left lateral position, it may reach the *Grahani*.\[[@ref1]\] The pH of small intestine varies between 7.5 and 8. The pH in the colon varies from 5.5 to 7. It is important to measure the pH of *Vasti Dravya* which is sent into the colon every time because it can alter the pH of gut easily.
The mucosal lining of colon is permeable to the ionized form of a weak acid or weak base. The weakly acidic and basic drugs exist in two forms:
An unionized component predominantly lipid soluble which is absorbed rapidlyAn ionized and often water-soluble component which is absorbed poorly.
Acidic drugs are rapidly absorbed from the stomach. Basic drugs are not absorbed until they reach the alkaline medium of the small intestine. The alkaline environment in which the major component of the drug exists in an unionized form, facilitates their absorption.\[[@ref2]\]
Chemoreceptor cells in the gut are responsible for the pH regulation and substrate concentration. The pH, viscosity, and enzyme content of the chyme are all optimized for rapid enzymatic breakdown. Once the chyme leaves the initial segment of duodenum, no further adjustment can be done. But if *Vasti Dravya* with desirable pH is sent into the gut, it may create a favorable environment for enzymatic activity in the distal segments of intestine.
Studies *in vitro* and vivo have already shown that consumption of carbohydrate substrate and H~2~ production by human colonic bacteria are directly related to luminal pH,\[[@ref3]\] which can be easily altered by the pH of *Vasti Dravya* sent into the colon.
It has been observed that low pH of *Vasti Dravya* has some corrosive action on the mucosa, these symptoms are nothing but the complication of *Vasti* like cutting pain in anal region (*Parikartika*), and anal discharge due to inflammation (*Parisrava*) already mentioned in the Charakasamhita.\[[@ref4]\]
Temperature {#sec2-4}
-----------
Temperature is a measure of hotness or coldness. Regarding *Vasti*, some people advocate that the temperature of *Vasti Dravya* should be same as the rectal temperature; some say that it should be 1°C less than the rectal temperature. Rectal temperature is more accurate than
|
pubmed_central
|
class StaticTest{
static{ System.out.println("static block 1"); }
static SomeClass sc = new SomeClass();
static{ System.out.println("static block 2"); }
public static void main(String[] args) {
new StaticTest();
}
}
output
static block 1
creating SomeClass object
static block 2
Now since enum values are always placed at start of enum type, they will always be called before any static initialization block, because everything else can only be declared after enum values.
BUT initialization of enum values (which happens at class initialization) their constructors are called and as you said non-static initialization blocks are executed at start of every constructor which is why you see them:
for every enum value
and before any static initialization block.
A:
Little late and building up on Pshemo's answer. The output of the (compiling) code below is as follows:
8
10
Foo
static block
Bar
So the enum constant initializations are executed first (as Pshemo said, they are always implicitly static and final, see second blockquote) and then all fields explicitly declared as static are initialized. As mentioned, the language specification says this about the order of execution during class initialization and about enum constants:
Next, execute either the class variable initializers and static initializers of the class, or the field initializers of the interface, in textual order, as though they were a single block.
In addition to the members that an enum type E inherits from Enum, for each declared enum constant with the name n, the enum type has an implicitly declared public static final field named n of type E. These fields are considered to be declared in the same order as the corresponding enum constants, before any static fields explicitly declared in the enum type.
class StaticTest {
enum CoffeeSize {
BIG(8), LARGE(10);
private int ounces;
static Foo foo = new Foo();
static { System.out.println("static block "); }
static Bar bar = new Bar();
private CoffeeSize(int ounces){
this.ounces = ounces;
System.out.println(ounces);
}
}
public static void main(String[] args) {
CoffeeSize cs = CoffeeSize
|
stackexchange
|
A more specific object of the present invention is to provide a toner free from toner melt-sticking onto the latent image-bearing member in a low humidity environment.
Another object of the present invention is to provide a toner free from xe2x80x9crougheningxe2x80x9d of halftone images in a low humidity environment.
Another object of the present invention is to provide a toner free from toner blot-down even after storage in a high temperature environment or during continuous image formation on a large number of sheets.
Another object of the present invention is to provide a toner free from fog even in continuous formation of images with a low percentage of color image on a large number of sheets in a low humidity environment.
Another object of the present invention is to provide a toner free from toner melt-sticking onto the latent image-bearing member even in continuous formation of images with a high percentage of color image in a low humidity environment.
A further object of the present invention is to provide a toner free from re-transfer of toner images.
A further object of the present invention is to provide a toner free from image quality lowering depending on the quality and state of the recording material.
A still further object of the present invention is to provide a process for producing such a toner, and an image forming method and an image forming apparatus using such a toner as described above.
According to the present invention, there is provided a toner, comprising: toner particles, and external additives blended with the toner particles and including (1) first inorganic fine particles having an average primary particle size of 80-800 nm of oxide of a metal selected from the group consisting of titanium, aluminum, zinc and zirconium, (2) second inorganic fine particles other than silica having an average primary particle size of below 80 nm and (3) silica fine particles having an average primary particle size of below 30 nm.
According to another aspect of the present invention, there is provided a process for producing a toner, comprising:
a first blending step of blending and dispersing toner particles containing at least a binder resin and a colorant, and first inorganic fine particles to form a toner precursor, and
a second blending step of blending and dispersing the toner precursor, and second inorganic fine particles and silica fine particles; wherein
the first inorganic fine particles have an average primary particle size of 80-800 nm and comprise an oxide of a metal selected from the group consisting of titanium, aluminum, zinc and zircon
|
uspto_backgrounds
|
Red Sun (French: Soleil rouge, Italian: Sole rosso) is a 1971 Spaghetti Western film directed by Terence Young and starring Charles Bronson, Toshirō Mifune, Alain Delon, Ursula Andress, and Capucine. It was filmed in Spain by the British director Young with a screenplay by Denne Bart Petitclerc, William Roberts, and Lawrence Roman, from a story by Laird Koenig. It was released and released in the United States on June 9, 1972.
Plot
Link Stuart and Gauche are the ruthless co-leaders of a gang of bandits who rob a train of its $400,000 payload. On the train is the Japanese ambassador, on his way to Washington, who has with him a ceremonial tachi, a gift to the American president. Gauche steals the gold-handled sword and shoots dead one of the ambassador's two samurai guards. At the same time, by Gauche's order, other members of the gang double-cross Link by throwing dynamite into the train car he occupies and leaving him for dead. Before the gang departs, the surviving samurai guard, Kuroda, tells Gauche he intends to track him down and kill him, but Gauche is dismissive of the threat.
The Japanese ambassador instructs Link, who was not injured in the attempt to kill him but who has been disarmed, to assist Kuroda in tracking down Gauche. Kuroda is given one week to kill Gauche and recover the sword. If he fails both Kuroda and the ambassador will have to commit seppuku for having lost their honor in allowing the sword to be stolen and the samurai's death to go unavenged. Link reluctantly agrees, but he realizes that Kuroda will kill Gauche immediately, which Link does not want because he knows Gauche will have hidden the loot. Once they set off in pursuit of the gang, Link repeatedly attempts to elude Kuroda, only to be thwarted by the irrepressible samurai.
Sure enough, Gauche and four gang members bury the loot, and then he kills them so only he knows the hiding place. Gauche pays off others, who go their own way, and the remaining gang members remain with him. While tracking Gauche's gang, Link sees Kuro
|
wikipedia_en
|
R. G. Downey and M. R. Fellows. , volume 3. Springer New York, 1999.
F. Effenberger and J. Spreer. simpcomp - a [GAP]{} toolbox for simplicial complexes. , 44(4):186 – 189, 2010.
F. Effenberger and J. Spreer. simpcomp - a [GAP]{} package, [V]{}ersion 1.5.4. <http://code.google.com/p/simpcomp/>, 2011.
. E[ğ]{}ecio[ğ]{}lu and T. F. Gonzalez. A computationally intractable problem on simplicial complexes. , 6(2):85–98, 1996.
R. Forman. Morse theory for cell complexes. , 134(1):90–145, 1998.
D. Gabai, R. Meyerhoff, and P. Milley. Minimum volume cusped hyperbolic three-manifolds. , 22(4):1157–1215, 2009.
M. C. Golumbic, T. Hirst, and M. Lewenstein. Uniquely restricted matchings. , 31(2):139–154, 2001.
D. Günther, J. Reininghaus, H. Wagner, and I. Hotz. Efficient computation of 3[D]{} [M]{}orse-[S]{}male complexes and persistent homology using discrete [M]{}orse theory. , 28:959–969, 2012.
A. G. Gyulassy. . PhD thesis, UC Davis, 2008. Advised by Bernd Hamann.
J. Jonsson. . PhD thesis, KTH, 2005. Advised by Anders Bj[ö]{}rner.
M. Joswig and M. E. Pfetsch. Computing optimal discrete morse functions. , 17:191–195, 2004.
M. Joswig and M. E. Pfetsch. Computing optimal morse matchings. , 20(1):11–25, 2006.
T. Kloks. , volume 842. Springer, 1994.
C. Lange. . PhD thesis, Technische Universit[ä]{}t, Berlin, 2004.
|
arxiv
|
/*
* Copyright (C) 2015, BMW Car IT GmbH
*
* Author: Sebastian Mattheis <sebastian.mattheis@bmw-carit.de>
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
* in compliance with the License. You may obtain a copy of the License at
* http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in
* writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific
* language governing permissions and limitations under the License.
*/
package com.bmwcarit.barefoot.matcher;
import java.io.FileInputStream;
import java.io.FileNotFoundException;
import java.io.IOException;
import java.util.Properties;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import com.bmwcarit.barefoot.matcher.MatcherServer.DebugJSONOutputFormatter;
import com.bmwcarit.barefoot.matcher.MatcherServer.GeoJSONOutputFormatter;
import com.bmwcarit.barefoot.matcher.MatcherServer.InputFormatter;
import com.bmwcarit.barefoot.matcher.MatcherServer.OutputFormatter;
import com.bmwcarit.barefoot.matcher.MatcherServer.SlimJSONOutputFormatter;
import com.bmwcarit.barefoot.roadmap.Loader;
import com.bmwcarit.barefoot.roadmap.RoadMap;
import com.bmwcarit.barefoot.util.SourceException;
/**
* Server control of stand-alone offline map matching server ({@link MatcherServer}).
*/
public abstract class ServerControl {
private final static Logger logger = LoggerFactory.getLogger(ServerControl.class);
private static MatcherServer matcherServer = null;
private static Properties databaseProperties = new Properties();
private static Properties serverProperties = new Properties();
/**
* Initializes stand-alone offline map matching server. Server properties file must include
*
|
github
|
If I had a nickle for every pediatrician, L&D nurse, or mom friend that recommended petroleum jelly for one thing or another, I’d be a rich woman. Petroleum jelly (aka Vaseline) comes from oil (one of those fossil fuel things). As Melissa Breyer, editor of Healthy Living, recounts, it was discovered by a chemist that noticed the residue left on oil drilling rigs. This goop, called “rod wax,” he then distilled to petrolatum. Polycyclic aromatic hydrocarbons (PAHs) are common contaminents in petrolatum and are linked to cancer by many sources, including the EPA. In addition, different (and unregulated) manufacturing processes render what consumers know as petroleum jelly harmful in myriad ways. Fragrance, artificial color, preservatives, parabens and other chemicals are added to Vaseline/petroleum jelly to affect consistency, skin absorbtion, smell and shelf-life.
“But my jar just says 100% ‘petroleum jelly’.”
That’s right, you won’t find these red flag ingredients on the package. Thanks to the lack of regulation of cosmetics and products in the US, they are not required to list all ingredients. See the actual contents of standard Vaseline (Unilever) here, thanks to EWG Skin Deep testing. These additives have been shown to cause cancer, developmental/reproductive toxicity, organ system toxicity (non-reproductive), biochemical and cellular level changes, allergies and other skin irritations.
Under the circumstances, it’s quite disturbing that Tyra Banks started a “Vaseline Frenzy” when she told the world it was her #1 beauty secret and that teens are being advised that Vaseline is their best friend. Add this to the 16 (on average) other toxic beauty and skin products people use on a daily basis and it’s not hard to see why we have sky rocketing infertility, cancer, and allergy rates, in additional to a significant increase in many behavioral disorders. (That’s another topic entirely but check out this simple list of toxins affecting learning and behavior in children from the Healthy Children Project.)
So please, do not slather this on your baby’s butt to prevent diaper rash (this doesn’t work anyway because you’re most likely trapping moisture in if you just used a wipe, which causes … wait for it … diaper rash). Note that popular products like Desitin contain petrolatum
|
pile-cc
|
Let d(o) be the second derivative of -o**5/20 + o**4/12 + 4*o**3 - 21*o**2/2 + 771*o. What is d(5)?
-1
Suppose 0 = 7*h - 3*h - 12. Let f(k) be the first derivative of -11*k**2/2 - 3*k - 43771. Determine f(h).
-36
Let z be (-52)/(-39)*(-3)/(-2). Suppose 4*s = 2*g + 16, -4*s - s = -z*g - 20. Let v(a) = 2*a + 0*a**2 - 3*a + 0*a**2 + a**3 - a**2. Determine v(g).
0
Let o(l) = -l**2 - 5*l + 3. Suppose -1 = -5*a + 19. Let g = -424 - -433. Suppose g*u - a*u = -25. Calculate o(u).
3
Let b(m) = -7*m - 1. Suppose -120 = -3*p - 4*s, -5*s + 164 = 4*p - s. Let r = 52 - p. Suppose -4 = -12*v + r*v. Give b(v).
-8
Let u(m) be the third derivative of -m**6/360 - m**5/120 + m**4/6 + 3*m**3/2 + 20*m**2. Let d(r) be the first derivative of u(r). Determine d(-3).
-2
Let c(q) = 3*q**2 - 20*q + 8. Let x = 18685 + -18680. Determine c(x).
-17
Let d(s) = s**2 + 10*s - 9. Let v be d(-11). Let b(f) = 25*f + 5*f**2 - 20*f - 4*f**v + 8 - 3. Suppose 3*p + 5*u = -7 - 3, 3*p + 4*u = -11. Calculate b(p).
5
Let f(q) be the first derivative of -q**2/2 - 2*
|
dm_mathematics
|
gadgets at the Signature Shop online. Direct your web browser to the
Signature Shop, and then click "eThink Merchandise" to see the complete
line. Happy shopping!
eSpeak is back! Tuesday, December 5 at 10:00 am Houston time, please join
Chairman and CEO Ken Lay for an open-mike eSpeak event. This is your last
chance of the year to
|
enron_emails
|
. . . . [A] cooler was used to pound [D.P.]’s head into the
floor. A coffee table was used to strike [D.P.]’s head. [D.P.]
was kicked and stomped and punched. He was hit with a belt.
He was put in the cellar. His head was submerged in bath
water at [least] three or four times. His head was held under
running water. He was again kicked and burned with
cigarettes.
Tr. p. 86.
Parsons’s two other children, who were seven and eight years old at the time, were
in the household during the beating. At one point, the eight-year-old child woke up from
a nap, looked up from underneath the covers, and saw D.P.’s face covered in blood.
Jones left the residence on June 3, 2011, and spoke with a friend, Kristi Schofner, about
D.P.’s beating; Schofner called the police.
2
Officers from the Greensburg Police Department and the Indiana State Police
along with emergency personnel were dispatched to Parsons’s house and found D.P.
dead. Parsons and her two other children were still in the house. D.P. had injuries over
ninety percent of his body, and the Marion County Coroner later determined that the
cause of death was from “multiple blunt force traumatic injuries from head to toe with
partial thickness thermal burns to the face.” Id. at 43. The officers observed blood in
various places inside the house. Officers transported Parsons to the Greensburg Police
Station for questioning and, after locating Jones, transported him, too. Jones indicated
that Parsons was the one who beat D.P.; he alluded to some participation but then
retracted the statements. During Parsons’s initial interview, she indicated that Jones was
not involved in the death of D.P.; however, during the second interview on June 4, 2011,
Parsons admitted that she and Jones beat D.P. for a period of twelve hours because they
believed that D.P. had hidden some pills.
Jones was initially charged with Class A felony neglect of a dependent. The State
amended the
|
freelaw
|
Renowned Scientist Defects From Belief in Global Warming - Caps Year of Vindication for Skeptics - gibsonf1
http://epw.senate.gov/public/index.cfm?FuseAction=PressRoom.PressReleases&ContentRecord_id=E58DFF04-5A65-42A4-9F82-87381DE894CD
======
timr
This is yet another long, distorted tirade by Senator James Inhofe -- and a
year old, too!
It would take hours to debunk every logical fallacy and twisted fact that
Inhofe uses to justify his silly views; for brevity, let me recommend the book
"The Republican War on Science" for a good overview of the level of
intellectual dishonesty that Inhofe embraces.
------
Caligula
The link you posted is a year old. Stop posting junk please.
~~~
gibsonf1
I guess I'm not clear on the correlation between age of information and
junkiness?
~~~
brlewis
You're correct that the junkiness does not stem from age. It stems from this
piece being mostly name-calling, not information, and from the fact that the
renowned scientist in question misrepresented the research he cited, according
to the researchers.
<http://www.logicalscience.com/skeptics/Claude_Allegre.html>
------
awt
What about the huge chunks of ice breaking off the antarctic ice sheets? That
seems like some sort of warming phenomenon going on in the southern
hemisphere.
~~~
randallsquared
Even the "global warming skeptics" aren't actually skeptical about the fact
that warming has been happening. Rather, they're skeptical that there's a
sudden uptick in the last few decades, and/or that global warming as it exists
is human-caused.
It's well understood that several hundred years ago, it was colder (at least
in the northern hemisphere), simply because of historical records we have that
don't make much sense otherwise. Also, it's well understood (though recently
challenged) that it was warmer than twentieth century levels before that for
some amount of time.
So the controversy is all over
|
hackernews
|
Understanding brain function in healthy and diseased brains requires an understanding of the biochemistry occurring within the neurons and supporting cells making up the brain. It is well known that individual cells in the brain have distinct signaling molecule complements and protein complement, but the effects on the cellular metabolome are much less well understood. What is the cell to cell variation of the cellular metabolome in the mammalian CNS? For most metabolites, the answer is unknown. Using invertebrate models, large differences in the metabolome
|
nih_exporter
|
Induction of ovulation is difficult to achieve in patients with PCOD when they are resistant to therapy with clomiphene citrate; moreover, treatment with human menopausal gonadotropins subjects the PCOD patient to the risk of multifollicular ovulation and hyperstimulation. This article summarizes the hormonal picture and the initial therapeutic approach to the patient with PCOD. The proper administration, usage, and monitoring of conventional ovulation-inducing agents for these patients are discussed. Some of the
|
pubmed_abstracts
|
**Methods:** 250 nasopharyngeal aspirates and sputum samples were collected from clinically diagnosed cases on pneumonia. The samples were inoculated on sheep blood agar. The organism grown was identified with gram staining, hemolysis on sheep blood agar, bile solubility, and sensitivity to optochin. Demographic and clinical details such as age, sex, type of infection, underlying disease, and response to treatment, for all 250 patients were noted. Antibiotic testing was done for pencillin, tetracycline, erythromycin, ciprofloxacin, cotrimoxazole and results interpreted as per Clinical and Laboratory Standards Institute (CLSI) guidelines.
**Results:** Of the 250 specimens, *S. pneumoniae* was isolated in 10 samples. 1 isolate was resistant to penicillin, 2 isolates were penicillin intermediate resistant and rest were sensitive to penicillin. 1 strain was MDR. 30% resistance was seen with tetracycline and cotrimoxazole and 20% strains were erythromycin resistant. All patients responded to antimicrobial therapy and none of the patients died
**Conclusion:** Increasing prevalence and emergence of antibiotic resistant among *S. pneumoniae* in the community set up is a matter of great concern and large scale studies are required to estimate prevalence, antibiotic resistance and serotypes of the isolates so that national guidelines can be formulated regarding prevention and treatment of pneumococcal pneumonia.
**Acknowledgement:** We would like to thank ICMR, New Delhi for providing Short term studentship to Mr. Rahul dev. (REFRENCE ID --- 2013-02134)
No conflict of interest
*ISPPD-0030 Antibiotic Resistance and Clonal Spread*: **ANTIMICROBIAL RESISTANCE AND CLONAL SPREAD OF STREPTOCOCCUS PNEUMONIAE ISOLATED FROM CHILDREN UNDER 5 YEARS OLD IN SUZHOU, CHINA** {#Sec16}
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Q. Geng^1^, T. Zhang^1^, Y. Ding^2^, Y. Tao^2^, Y. Lin^1^, Y. Wang^2^, G. Zhao^1^
^1^Department of Epidemiology School of Public Health, Fudan University, Shanghai, China; ^2^Department of Laboratories, Soochow University Affiliated Children's Hospital, Suzhou, China
**Background and Aims:** Dissemination of non-antimicrobial-susceptible clones was known as an important factor
|
pubmed_central
|
A:
Can a priest resign?
Simply desiring to add a few points of interest on this question, not mentioned in Dick Harfield's excellent answer.
The body of this question leaves me with a little confusion as to what is meant by the resignation of a priest!
First of all, according to the Code of Canon Law (Can. 332 §2) a pope may resign his office.
If it happens that the Roman Pontiff resigns his office, it is required for validity that the resignation is made freely and properly manifested but not that it is accepted by anyone.
When a pope resigns his office as Supreme Pontiff of the Church, he no longer remains pope, but by virtue of his consecration as a bishop, remains a bishop forever.
Secondly bishops must resign their posts at the age of 75. However the pope may or may not accept the resignation in question.
Can. 401 §1 A diocesan Bishop who has completed his seventy-fifth year of age is requested to offer his resignation from office to the Supreme Pontiff, who, taking all the circumstances into account, will make provision accordingly.
§2 A diocesan Bishop who, because of illness or some other grave reason, has become unsuited for the fulfillment of his office, is earnestly requested to offer his resignation from office.
Can. 402 §1 A Bishop whose resignation from office has been accepted, acquires the title 'emeritus' of his diocese. If he so wishes, he may have a residence in the diocese unless, because of special circumstances in certain cases, the Apostolic See provides otherwise.
As for priests most dioceses have rules set up for the resignation for diocesan priests. here is an example taken from the Diocese of San Diego.
The Code of Canon Law (Canon 538 §3) sets the age for retirement of pastors at seventyfive
(75). When a pastor reaches seventy-five (75) years of age he is asked to submit his
resignation to the bishop who, after considering all the circumstances of person and place,
will decide whether to accept or defer the resignation.
All priests who are able to do so are expected to continue in a diocesan assignment until age
seventy-five (75).
For good reason and with permission of the bishop, a priest may retire earlier.
Pastor
|
stackexchange
|
Previously, the use of the vegI promoter alone in B. subtilis has not been described--the use of the veg(comprising the vegI and vegII promoters) (see for example U.S. Pat. No. 4,783,405; U.S. Pat. No. 4,710,464; U.S. Pat. No. 4,559,300) and vegII (see for example Le Grice, F. J., 1990, Methods Enzymol., 185: 201-214) promoters in heterologous protein expression has been described. As a result of the isolation and purification of an unexpected vegI mutant occurring at very low levels (a total of five B. subtilis transformants were found to harbour plasmid DNA containing the mutant vegI promoter in a transformation in which about 300 .mu.g of DNA was used), it has now been found that a B. subtilis endonuclease activity appears to act upon the vegI promoter, causing digestion and subsequent exonuclease digestion of the promoter. The present inventors have succeeded in isolating the putative vegI promoter B. subtilis endonuclease restriction site, allowing the modification of the palindromic restriction site to protect against B. subtilis endonuclease activity and allow the use of the modified vegI promoter. One particular modified vegI promoter is described below but other modifications may be readily made to the vegI promoter to protect against the endonuclease activity whilst still retaining the promoter functionality. This allows the use of the vegI promoter alone with B. subtilis, not previously suggested by the prior art. The identification of the palindromic endonuclease restriction site is particularly surprising since it is an octameric sequence, whereas most endonuclease restriction sites are hexamers.
According to the present invention there is provided an endonuclease-protected vegI promoter, and particularly a B. subtilis endonuclease-protected vegI promoter.
The present inventors have found that the octameric sequence of SEQ ID NO: 20, which forms part of the -10 region of the vegI promoter, is a B. subtilis endonuclease restriction site, meaning that constructs containing the vegI promoter undergo endonuclease (and subsequently, exonuclease) digestion when transformed into B. subtilis. This in turn results in the construct failing to express any coding
|
uspto_backgrounds
|
Ulrich X (also called Ulric or Udalrich) ( –1097) was Count of Bregenz from 1079 to his death in 1097.
Life
Ulrich X was the son of Ulrich IX of Bregenz (d. 1079).
In late 1080 or early 1081 Ulrich married Bertha of Rheinfelden, daughter of Rudolf of Rheinfelden. When he met Bertha, Ulrich was already betrothed to another woman, a daughter of Count Werner of Habsburg (d. 1096). Yet he and Bertha began an affair, and when her relatives found out, they compelled Ulrich to marry Bertha.
During the Investiture Contest, Ulrich was on the papal side, allied with Rudolf of Rheinfelden and Welf I, Duke of Bavaria. With the permission of Pope Gregory VII He founded the abbey of Mehrerau in Bregenz.
Ulrich was also engaged in a long-running dispute with the monastery of Petershausen over property in Bigenhausen which he had appropriated from the monks.
In 1097 Ulrich died while on a hunting trip in Prättigau. Members of the hunting party began rolling stones down a hill and Ulrich, in a show of bravado, tried and failed to jump one of the stones. He died from the injuries he sustained and his body was taken back to Bregenz for burial.
Children
With Bertha, Ulrich X had the following children:
Rudolf I, Count of Bregenz
Ulrich XI
Henry of Kellmünz (d. 1128)
Adelaide (d.28 June 1168), married Ulrich, count of Ramsperg and Hegau (d.c.1155)
Notes
References
Casus monasterii Petrishusensis, ed. O. Abel and L. Weiland, MGH SS XX (1869), pp. 624-683
Historia monasterii Marchtelanensis, MGH SS XXIX, pp. 660-683
Berthold of Zwiefalten, Chronicon, in L. Wallach, ‘Berthold of Zwiefalten's Chronicle,’ Traditio 13 (1957), pp. 187-233.
A.I. Beach, The Trauma of Monastic Reform: Community and
|
wikipedia_en
|
$$\varepsilon = \frac{1}{CR} \int_{-\infty}^{\infty} V(t)dt.
\label{eq1}$$
![Dependences of the total radiation energy on the length of the discharge gap obtained along to the ferrite surface (radiation detectors in positions 2 and 7 in Fig. 1a.). Inset shows the corresponding dependence obtained in the perpendicular direction \[1,2\]](FIG3.pdf){width="80mm"}
Here, $R$ = 75 $\Omega$ is the detector load resistance, $V(t)$ is the instantaneous value of the signal, measured in Volts, at time $t$, $C$ is the detector sensitivity. The duration of the radiation pulse may turn out to be significantly less than the time resolution of the recording channel ($\sim$2 ns), and the pulse duration and shape cannot be obtained by electrical measurements only. Nevertheless, since the signal spectral width (see Table \[tab:table1\]) is scarcely beyond the region of the detector spectral sensitivity (10 eV – 4 keV), relation (1) can be used to estimate the total energy incident on the detector. The value of $\int_{-\infty}^{\infty} V(t)dt$ was determined as the area under the curve $V(t)$ (see Fig. 2a). During measurements, the length of the ferrite working part was varied from 1.5 cm to 7 cm by changing the lenght of the negative electrode. In several series of experiments, the length of the working part was first increased (2, 3, 5, 6, and 7 cm), and next decreased (6.5, 5.5, 4.5, 3.5, 2.5, and 1 cm). At each length in each series, 2 or 3 consecutive shots were made, with the total length of the ferrite sample being constant. For estimates, the beam cross section was considered a rectangle with dimensions $s = 1$ cm (width) and $h = 0.2$ cm (height). The value of h is smaller than the transverse dimensions of the detector crystals (detector active area is of circle shape with the radius $r_{D}\approx3$ mm); consequently, the total energy transferred by the radiation pulse is
$$E = \varepsilon \frac{d}{r_{D}}.$$
Squares in Fig.
|
arxiv
|
import (
"time"
)
// ClientParameters is used to set keepalive parameters on the client-side.
// These configure how the client will actively probe to notice when a
// connection is broken and send pings so intermediaries will be aware of the
// liveness of the connection. Make sure these parameters are set in
// coordination with the keepalive policy on the server, as incompatible
// settings can result in closing of connection.
type ClientParameters struct {
// After a duration of this time if the client doesn't see any activity it
// pings the server to see if the transport is still alive.
// If set below 10s, a minimum value of 10s will be used instead.
Time time.Duration // The current default value is infinity.
// After having pinged for keepalive check, the client waits for a duration
// of Timeout and if no activity is seen even after that the connection is
// closed.
Timeout time.Duration // The current default value is 20 seconds.
// If true, client sends keepalive pings even with no active RPCs. If false,
// when there are no active RPCs, Time and Timeout will be ignored and no
// keepalive pings will be sent.
PermitWithoutStream bool // false by default.
}
// ServerParameters is used to set keepalive and max-age parameters on the
// server-side.
type ServerParameters struct {
// MaxConnectionIdle is a duration for the amount of time after which an
// idle connection would be closed by sending a GoAway. Idleness duration is
// defined since the most recent time the number of outstanding RPCs became
// zero or the connection establishment.
MaxConnectionIdle time.Duration // The current default value is infinity.
// MaxConnectionAge is a duration for the maximum amount of time a
// connection may exist before it will be closed by sending a GoAway. A
// random jitter of +/-10% will be added to MaxConnectionAge to spread out
// connection storms.
MaxConnectionAge time.Duration // The current default value is infinity.
// MaxConnectionAgeGrace is an additive period after MaxConnectionAge after
// which the connection will be
|
github
|
Ning Xi thought for a moment, but decided to tell the truth: “Zhizhi sister, the thing is, I met brother Jiang when we were in school abroad, and that time…… we did date for a period of time, but after a few days we broke up, and we are purely just very good friends! I know that I should have let you know such important things earlier, but initially I mistook you as Jiang Muye’s ex-girlfriend, so I was afraid it would be awkward if I said it, so that’s why I did not say it……”
“Then, we should discuss how to settle this matter now.” After explaining the misunderstanding, Lin Zhizhi started to talk about the serious matter. “Previously, Jiang Muye’s fans disliked you, but that was caused by malicious guidance. Right now, their attitudes have a big change, and most of them have become your CP fans.
That is why, I have discussed it with Brother Ming. You can be ambiguous when you are facing the reporters or making a statement outside. You don’t have to deny it too thoroughly, just say that the two of you are in the same company, your personality can get along well, admire each other and are currently very good friends. Let the fans have some space to imagine further.”
Ning Xi stared at him and snappishly said, “Kissing scene! Don’t tell me that you have not read the script once ever since it had been modified! If I was Brother Ming, I would beat you up at least eight hundred times a day!”
Lin Zhizhi already knew their relationship anyway so Ning Xi don’t have to act so respectfully to Jiang Muye anymore.
Jiang Muye said in sarcasm, “Tsk, didn’t you know that the higher-ups want to air it during summer, and that because there are too many underaged audience, thus it made the scriptwriter delete all the bed and kissing scenes, so where do you find the kissing scene?”
“Yeah the scenes got deleted, but there were still a bit right? The scene of the first kiss,and the bed scene inside the military tent. Even though the kissing scene was forced to stop because of the hail previously, but the director said the front part could still be used, so we just have to retake the kissing part!”
“Alright, noted……” Jiang
|
pile-cc
|
Sort -4, 3514, -5/6, 9620 in increasing order.
-4, -5/6, 3514, 9620
Sort -1, 5, -513, -280, 6, -12, -3 in decreasing order.
6, 5, -1, -3, -12, -280, -513
Sort -8, 7, -0.09, -0.48, 2, -15 in decreasing order.
7, 2, -0.09, -0.48, -8, -15
Sort 4, -3, -29, 5, 15794 in decreasing order.
15794, 5, 4, -3, -29
Sort -839, 2, 37, -2, 1, 0 in decreasing order.
37, 2, 1, 0, -2, -839
Sort -818, -5, -1, 2, -493 in descending order.
2, -1, -5, -493, -818
Sort -0.5, -1/788, 38, -0.8, -0.3.
-0.8, -0.5, -0.3, -1/788, 38
Put 3, -5, 60, -1, -545 in increasing order.
-545, -5, -1, 3, 60
Put -2, 3, 176, 5, -560, 0 in descending order.
176, 5, 3, 0, -2, -560
Sort -446, 6, 2.99, -1.
-446, -1, 2.99, 6
Put 1/9, 8, 22, 0.5, 6570, -9 in increasing order.
-9, 1/9, 0.5, 8, 22, 6570
Sort 5, 308, 618697 in descending order.
618697, 308, 5
Sort 135534, 2, 0, 210 in descending order.
135534, 210, 2, 0
Sort -4, 4, -3, 1, 3, 1968 in descending order.
1968, 4, 3, 1, -3, -4
Sort -1, 23, 2, 289246, -5 in ascending order.
-5, -1, 2, 23, 289246
Put 2/670185
|
dm_mathematics
|
Political Contributions & Activities
? Your company has been very active politically and according to press
reports, Mr. Lay is very close to President Bush. Wasn't your company one
of the biggest donors to the Bush Campaign and the Inaugural Committee? How
much money did your company contribute in soft money to the Bush Campaign
and the RNC? How much money did your executives give in personal money to
the Bush Campaign and the RNC? How much
|
enron_emails
|
court. 2 On October 14, Arnold filed a motion with this court to withdraw his
appeal on the grounds that it was unwarranted and premature. Arnold requested
2
That appeal was assigned docket number 97-4159.
-3-
that this court dismiss the appeal without prejudice. On October 20 this court
granted Arnold’s motion to dismiss his appeal.
On October 30, the district court issued an order, based upon the magistrate
judge’s report and recommendation, denying (1) Arnold’s motion, and renewed
motion, to vacate the restitution order, (2) his petition for Writ of Habeas Corpus,
(3) his motion for production of documents and transcripts and records, and (4)
his alternative motion to withdraw his plea. (See Tr. Rec. Doc. 52.)
On March 12, 1998, Arnold filed with this court an Application for
Certificate of Appealability, which constitutes the basis for the matter before us
now. In his application, Arnold states that this appeal is based upon the district
court’s denial of his motion to vacate its order of restitution.
(See Application for COA at 2.) From our reading of this application and the
record, we construe this appeal to be a request for a certificate of appealability
under § 2255. See 28 U.S.C.A. § 2253(c) (West Supp. 1998).
Under § 2253(c), we examine the appeal of a denial of a § 2255 motion to
determine whether the petitioner has made a “substantial showing of the denial of
a constitutional right.” Id.; see Lennox v. Evans, 87 F.3d 431,433-34 (10th Cir.
1996) (overruled on other grounds by United States v. Kunzman, 125 F.3d 1363,
1364 n.2 (10th Cir. 1997). Moreover, as this court has held, “[a] motion pursuant
to 28 U.S.C.A. § 2255 is not a substitute for direct appeal . . . .” Payton v.
-4-
United States, 436 F.2d 575, 576 (10th Cir. 1970); see United States v. Warner,
23 F
|
freelaw
|
\- - -
Team,
We're cutting our workforce to strengthen Twitter as a company.
The team has been deciding how to best streamline Twitter, Vine, and Periscope
to put their focus on the projects which will have the greatest impact.
Moments, which we launched last week, is a great beginning. It's a peek into
the future of how people will see what's going on in the world.
We plan to cut up to 336 people. This was a tough decision, and we'll offer
each person a generous exit package and help finding a new job. Product and
Engineering are going to make the most changes. Engineering will be smaller
but remain the biggest percentage of the organization, and other departments
will be cut in parallel.
This isn't easy. We'll honor those who we're losing with our service to all
the people who use Twitter. We'll do it with a more purpose-built team. Thank
you all for your trust and understanding here. As always, please reach out to
me directly with any ideas or questions.
Jack
~~~
hitekker
Everyone should take note of this person's excellent structure: he put the
decision first.
If you are writing a decisive message that can greatly impact many people's
lives: write the decision first.
Don't "sandwich" the truth. Sandwiching only makes sense when the decision or
the mistake is not of huge significance. Beating around the bush in matters of
great import will always harm the sincerity of your words.
After you've stated clearly what the decision is, right after that, you can
justify it however you wish.
~~~
rodgerd
> Everyone should take note of this person's excellent structure: he put the
> decision first.
Going by my twitter feed, they _implemented_ the decision first, with people
discovering they were locked out of their twitter accounts and RAS before the
announcement was made.
~~~
skywhopper
It's a hard problem to solve, but given that many of the folks being dismissed
are engineers with elevated access to Twitter's data and services, it makes
sense from a security and privacy perspective to disable access first. There's
no good way to lay off 300 people at once. Hopefully Twitter actually follows
through on the separation package and job
|
hackernews
|
The environment contains far more information than the brain can process at once. To cope with such information overload, humans need to selectively attend to relevant information and prioritize its processing. In many situations, humans need to select arbitrary features and objects in the scene and maintain attention on the selected information. It is often assumed that an attentional priority signal encodes the current focus of attention and its deployment. However, how the brain computes and maintains attentional priority for features and objects is not known. The long-
|
nih_exporter
|
Coexistence of human T-lymphotropic virus types I and II among the Wayuu Indians from the Guajira Region of Colombia.
High prevalences of human T-lymphotropic virus type II (HTLV-II) infection have been found recently among certain Amerindian groups in North, Central, and South America. To determine if the Amerindians of Colombia are similarly affected, 523 sera, collected between 1987 and 1990 from nine culturally distinct Indian groups from widely separated
|
pubmed_abstracts
|
Processes
---------
Under *Processes* the main sub-themes were procedures for conducting assessment, appeal processes, review processes and reflection on the strengths and weaknesses of their systems. Importantly, most organisations reported that their assessment processes and examiners were being continually reviewed. Information about the assessment process, including sample questions, marking criteria etc. were provided to the candidate prior to the assessment process. Written assessments were largely undertaken off-shore, that is, not in Australia. Caution was advised when running examinations off-shore as it was a complex task to have the correct candidate at the correct site sitting the correct examination and receiving the correct results. The organisational difficulty was increased with larger numbers of candidates.
Post-assessment issues including candidate feedback and appeals were also canvassed. Most organisations provided feedback to candidates who failed an element(s) of the assessment process and this assisted in clarifying areas in which the candidate needs to improve and also minimise appeals, ensuring the process is fair and transparent \[[@B8]\]. Organisations were understandably keen on minimising appeals, and in most cases appeals were only available to the candidate if an examination process issue was identified. These steps to minimise appeals would also have an impact on making the assessment defensible from a legal standpoint. Although this was not articulated by participants in the current study, previous research has indicated this is a concern for such organisations \[[@B8]\], and minimised by the use of valid and reliable assessment strategies. When asked to reflect on their processes, organisations identified numerous strengths and weaknesses, and these organisations also presented planned or potential changes to their assessment processes.
Examining
---------
Within the theme *Examining*, there were two sub-themes related to marking (including processes for those who fail) and assessors (selection and training). Marking was undertaken using checklists \[[@B36]\], ensuring that candidates performed required elements, however there was little discussion of the use of global or holistic assessments. The use of holistic assessments is becoming widely reported in the literature as a valid and reliable assessment outcome \[[@B37]-[@B40]\], although it appears that this has yet to make its way into the assessments undertaken by the organisations. The use of global assessments has been demonstrated to improve the reliability and validity of an assessment, particularly where communication skills are assessed \[[@B41],[@B42]\].
Most organisations spent large amounts of time and money on their examiners, in terms of training, recruitment and payments to assess. Examiners were typically selected
|
pubmed_central
|
Make it easier with color changing
How can I simplify this in Delphi?
Procedure colori1
Begin
if Temperatura<=15 then
begin
Form1.Label1.Font.Color:=clBlue;
Form1.Label2.Font.Color:=clBlue;
Form1.Label3.Font.Color:=clBlue;
Form1.Label4.Font.Color:=clBlue;
Form1.Label5.Font.Color:=clBlue;
end;
if (Temperatura>=16) and (Temperatura<=18) then
begin
Form1.Label1.Font.Color:=clAqua;
Form1.Label2.Font.Color:=clAqua;
Form1.Label3.Font.Color:=clAqua;
Form1.Label4.Font.Color:=clAqua;
Form1.Label5.Font.Color:=clAqua;
end;
if (Temperatura>=19) and (Temperatura<=22) then
begin
Form1.Label1.Font.Color:=clLime;
Form1.Label2.Font.Color:=clLime;
Form1.Label3.Font.Color:=clLime;
Form1.Label4.Font.Color:=clLime;
Form1.Label5.Font.Color:=clLime;
end;
if (Temperatura>=23) and (Temperatura<=26) then
begin
Form1.Label1.Font.Color:=clYellow;
Form1.Label2.Font.Color:=clYellow;
Form1.Label3.Font.Color:=clYellow;
Form1.Label4.Font.Color:=clYellow;
Form1.Label5.Font.Color:=clYellow;
end;
if (Temperatura>=27) and (Temperatura<=29) then
begin
Form1.Label1.Font.Color:=$000080FF;
Form1.Label2.Font.Color:=$000080FF;
Form1.Label3.Font.Color:=$000080FF;
Form1.Label4.Font.Color:=$000080FF;
|
stackexchange
|
2. Description of the Background Art
A digital still camera, for example, includes an imaging device implemented as a CCD image sensor. A color filter for separating an R (red), a G (green) and a B (blue) color component pixel by pixel is fitted on the image sensor. Various kinds of color filters are known in the art and include a G stripe, R/B full checker color filter. Considering the noticeable influence of G component signals on resolution, the G stripe, R/B full checker color filter has R filter components, G filter components and B filter components arranged such that a number of G component signals can be detected. For example, the filter components are arranged in a repetitive GRGB pattern. In addition, the filter components are arranged such that the G filter components form vertical stripes while the R filter components and B filter components alternate with each other in the vertical direction. In this condition, the R filter components and B filter components each forms a checker pattern.
An image signal processing device for converting the R, G and B color components output from the above image sensor to luminance signals Y and chrominance signals R-Y and B-Y is conventional. It has been customary with this conventional image signal processing device to determine a luminance signal YL, a component YH of the luminance signal YL lying in a high frequency range and chrominance signals R-Y and B-Y for each pixel by using the color component signals of, e.g., a 2 (vertical)×2 (horizontal) pixel matrix including the pixel under observation. Specifically, when the 2×2 pixel matrix including a pixel whose luminance signal should be determined consists of four color component signals R, G1, G2 and B, the luminance signal YL is determined by use of a formula 0.3R+0.295(G1+G2)+0.11B.
Further, the component YH lying in a high frequency range is produced by a formula (G1+G2)/2 if the color component signal of the pixel whose luminance signal should be determined is a G component signal, or by a formula (R+B)/2 if it is an R or a B component signal. The component YH is subtracted from the luminance signal YL. The resulting difference is passed through a low pass filter to turn out a luminance signal YL1 which is a low frequency component. The component YH is added to the luminance signal YL1 so as to output
|
uspto_backgrounds
|
Cato Zahl Pedersen (born 12 January 1959) is a Norwegian skier and multiple Paralympic gold medal winner. He has won a total of fourteen medals (thirteen gold, one silver) at the Paralympic Games, in both Winter and Summer Paralympics. He has no arms, having lost both in a childhood accident.
He competed in track and field athletics at the 1980 and 1984 Summer Paralympics, winning six gold medals. He took part in the Summer Games again in 2000, this time in sailing, but did not medal. At the Winter Paralympics, he competed in alpine skiing four times, in 1980, 1984, 1988 and 1994. At the 1980 and 1984 Winter Games he also took part in cross-country skiing, winning one gold in 1980.
Pedersen took the athletes' oath on behalf of all competitors at the 1994 Winter Paralympics in Lillehammer.
In 1994/1995, Pedersen took part in a successful four-person Norwegian skiing expedition to the South Pole. He dragged his 200-pound sledge the whole distance, using the prosthetic hook on his right hand to hold a single ski pole.
References
External links
Category:1959 births
Category:Living people
Category:Norwegian amputees
Category:Norwegian male alpine skiers
Category:Norwegian male cross-country skiers
Category:Paralympic athletes of Norway
Category:Athletes (track and field) at the 1980 Summer Paralympics
Category:Athletes (track and field) at the 1984 Summer Paralympics
Category:Paralympic sailors of Norway
Category:Norwegian male sailors (sport)
Category:Sailors at the 2000 Summer Paralympics
Category:Paralympic alpine skiers of Norway
Category:Alpine skiers at the 1980 Winter Paralympics
Category:Alpine skiers at the 1984 Winter Paralympics
Category:Alpine skiers at the 1988 Winter Paralympics
Category:Alpine skiers at the 1994 Winter Paralympics
Category:Paralympic cross-country skiers of Norway
Category:Cross-country skiers at the 1980 Winter Paralympics
Category:Cross-country skiers at the 1984 Winter Paralympics
Category:Paralympic gold medalists for Norway
|
wikipedia_en
|
The friendship paradox can be stated in four different ways on a directed graph:
- *On average, your friends (followees) have more friends than you do.*
- *On average, your followers have more friends than you do.*
- *On average, your friends have more followers than you do.*
- *On average, your followers have more followers than you do.*
------------------------------------------------------------ -------------------------------------------------------------- -------------------------------------------------------------- ----------------------------------------------------------------
{width="0.5\columnwidth"} {width="0.5\columnwidth"} {width="0.5\columnwidth"} {width="0.5\columnwidth"}
{width="0.5\columnwidth"} {width="0.5\columnwidth"} {width="0.5\columnwidth"} {width="0.5\columnwidth"}
($i$) ($ii$) ($iii$) ($iv$)
------------------------------------------------------------ -------------------------------------------------------------- -------------------------------------------------------------- ----------------------------------------------------------------
We empirically validate each statement above. The first statement says that, on average, a user’s friends are better connected than he or she is, i.e., they follow more people than he or she does. To validate this statement, for each user in the dataset we count how many friends she has, i.e., how many other users she follows. Then, for each friend, we count how many other users the friend follows, and average over all friends. Top Figure \[fig:friend\_paradox\]($i$) plots the average number of friends-of-friends (ordinate axis) vs the number of friends (abscissa) a user follows for the users with fewer than 1000 friends. About 99.7% of users had fewer than 1000 friends. The line of unit slope shows equality of connectedness. The probability density function (PDF) of the ratio of the average friend’s connectivity to a user’s connectivity,
|
arxiv
|
// Add Favorite Menu //
menuDef {
name "popupRemoveFavorite"
visible 0
fullscreen 0
rect WINDOW_X WINDOW_Y WINDOW_WIDTH WINDOW_HEIGHT
style WINDOW_STYLE_FILLED
popup
fadeClamp 0.5
fadeAmount 0.075
onOpen {
setitemcolor background backcolor 0 0 0 0 ;
fadein background
}
onESC {
close popupRemoveFavorite ;
open ingame_main
}
// Background //
itemDef {
name "background"
rect 0 0 WINDOW_WIDTH 480
style WINDOW_STYLE_FILLED
background "ui/assets/fadebox.tga"
backcolor 0 0 0 0
visible 1
decoration
}
// Subwindows //
#define SUBWINDOW_WIDTH 250
#define SUBWINDOW_HEIGHT 80
#define SUBWINDOW_X .5*(WINDOW_WIDTH-SUBWINDOW_WIDTH)
#define SUBWINDOW_Y .5*(WINDOW_HEIGHT-SUBWINDOW_HEIGHT)
SUBWINDOWBLACK( SUBWINDOW_X, SUBWINDOW_Y, SUBWINDOW_WIDTH, SUBWINDOW_HEIGHT, _("REMOVE FAVORITE") )
LABEL( SUBWINDOW_X+2, SUBWINDOW_Y+16, (SUBWINDOW_WIDTH)-4, 10, _("Remove this server from your favorites?"), .2, ITEM_ALIGN_CENTER, .5*((SUBWINDOW_WIDTH)-4), 8 )
// note: this isn't set for listen servers
CVARLABEL( SUBWINDOW_X+2, SUBWINDOW_Y+34, (SUBWINDOW_WIDTH)-4, 10, "cl_currentServerIP", .2, ITEM_ALIGN_CENTER, .5*((SUBWINDOW_WIDTH)-4), 8 )
BUTTON( SUBWINDOW_X+6, SUBWINDOW_Y+SUBWINDOW_
|
github
|
Rival Kingdoms Age Of Ruin MOD APK is a strategy online game. this is a new title that is very similar to some recitation clash of clans and other similar titles by it does have is own defense says tried to differentiate up now from crash across the south initially where you go into the game does a million somalis as that be the same and there is also the Baraks odd stronghold is like how hollow and there’s a couple of bob a sense rest emits similar like goal smelter and is like all my and I decide to a pothole is like IP Cam but as you can see a tease apart a listener is actually a cam site for the troops to actually hang out so said she took honey pot signs of the troops to come in and of course there is a the goal story should has actually like the casual craze and there is space awash power he stay all action on call it is across both some sort of us crossbow animation and a sis a spell power guess I’ll use that power and of course there is the builder hots okay so the similarity a site days many different says the first east let’s take a look on the mechanics and if you know a stereotype possum out the Ottoman where you care to destroy.
Pros:
1. You can move multiple buildings quickly in a few taps.
2. There are multiple “heroes” call Ancient that can be upgraded like RPG game with items collect during the war
3. There is an option to battle in “Kingdom” with fellow allies
4. Able to fast forward during a battle
5. No need to wait for troops to be trained to attack next battle
6. Tournament for individual PVP battle
7. The graphics looks stunning
Cons:
1. Obvious “speed up for free” subconscious training people to use the diamonds more often.
2. The artificial intelligence sometimes is a little bit weird, e.g. drag & drop highlighted a building as nearest to attack but sometimes it will attack another building instead.
3. One of the ancient is not a deployable hero? Not sure…that will be pretty boring haha.
4. Builders cost too much diamonds?
5. The small lag after a battle win to show the celebratory shouts by troops can probably be eliminated.
Overall, this game is very playable and can be interesting what the developer can improve next.
It’s not working
|
pile-cc
|
60
How many months are there in eight thirds of a century?
3200
How many millilitres are there in 0.9927775 litres?
992.7775
Convert 90408.76um to meters.
0.09040876
What is 1/10 of a kilometer in millimeters?
100000
What is 3186.038mg in nanograms?
3186038000
What is twenty-nine halves of a meter in millimeters?
14500
Convert 38487.12 grams to micrograms.
38487120000
How many grams are there in 881643.3 milligrams?
881.6433
How many millilitres are there in thirty-one fifths of a litre?
6200
How many minutes are there in 2/45 of a week?
448
What is 696951.5ug in nanograms?
696951500
What is one quarter of a century in years?
25
How many minutes are there in seventeen quarters of a week?
42840
How many milligrams are there in 0.7599676 micrograms?
0.0007599676
How many grams are there in fourty-three quarters of a kilogram?
10750
How many meters are there in 243695.4mm?
243.6954
How many weeks are there in 32158.476 days?
4594.068
What is 231.3298 tonnes in milligrams?
231329800000
How many decades are there in 66.21825 years?
6.621825
What is fourty-nine fifths of a gram in milligrams?
9800
How many milligrams are there in one tenth of a kilogram?
100000
How many micrometers are there in 62123.73 kilometers?
62123730000000
How many years are there in 17/2 of a millennium?
8500
What is one fifth of a kilogram in grams?
200
How many micrometers are there in 3/32 of a meter?
93750
How many grams are there in 25/4 of a kilogram?
6250
Convert 41.39831 millilitres to litres.
0.04139831
Convert 999.6717 months to centuries.
0.83305975
What is 8.561302 centuries in years?
856.1302
How many meters are
|
dm_mathematics
|
With: John Ballentine/FGT/Enron (Chairperson)
Rod Hayslett/FGT/Enron (Invited)
Michael Moran/ET&S/Enron (Invited)
Alicia Goodrow/Corp/Enron (Invited)
James Saunders/FGT/Enron (Invited)
Shashi Patel/FGT/Enron (Invited)
Kim Wil
|
enron_emails
|
7
French argues on appeal that he has been mentally incompetent for the past 16 years, that he was unaware of his entitlement to the disability benefits, and he did not become aware of the benefits until shortly before he applied for disability retirement in 1984. This is disputed. The issue in this case, as we view it, is whether a mental incompetent, without assistance of counsel or conservator, is to be required to establish or allowed to attempt to show his own incompetency for many years in the past. We hold that it is patently unreasonable and fundamentally unfair to require or allow an incompetent to act as advocate in such a setting where even a sane attorney would be confronted with a difficult task. Exercise of the statutory discretion in such a manner is an abuse of discretion.
8
In Marcee v. United States, 455 F.2d 525, 527, 197 Ct.Cl. 363 (1972), one of our predecessor courts attempted to prescribe some kind of fair treatment in a 5 U.S.C. Sec. 8337(b) disability claim so that the present incompetent will not lose out because he failed, without assistance of counsel, to prove his own past incompetence. There was a history of belated filings rejected by the former Civil Service Commission because it ignored the mental condition of the claimant which it knew. Finally a conservator petitioned. In Marcee, the court considered the type of role the government should take in such a disability claim:It might be supposed that the Congress expected the CSC [Civil Service Commission] not to sit passively back and leave the incompetent former employee to prove her incompetence. It could have taken the initiative in looking into the matter so that the obvious desire of Congress should be respected, that former employees disabled in the course of honorable service should not be reduced to penury.
9
Id. at 526.
10
The court remanded the case. Be it noted that Marcee too was a Tucker Act suit and 28 U.S.C. Sec. 2501 was also applicable. We reaffirm the reasoning in Marcee and add that it is also unfair that the full board's decision regarding French's disability was based on the incompetent's testimony at the hearing, with its admissions, rather than on medical evidence regarding his sickness and its duration.
11
This case is unlike Marcee in that there is still no conservator and thus no one competent to pursue
|
freelaw
|
[http://dealbook.blogs.nytimes.com/2009/11/18/hermitage-
capit...](http://dealbook.blogs.nytimes.com/2009/11/18/hermitage-capital-
lawyer-dies-in-russian-jail/?scp=1&sq=hermitage&st=cse)
~~~
dennisgorelik
No capital gain taxes is important for internal Russian businesses. It would
boost Russian economy.
------
endtime
Not sure this is hacker news, but if it is, could we skip the blogspam and
link straight to the article
(<http://news.bbc.co.uk/2/hi/business/10349679.stm>)? The blog post doesn't
add any value.
~~~
boucher
It does embed that absolutely hilarious Cato Institute video.
~~~
chasingsparks
Center for Freedom and Prosperity is not Cato; it is not a Cato Institute
video.
~~~
boucher
The person speaking in the video identifies himself as an employee of the Cato
Institute, it's not hard to imagine why I made the mistake. Not to mention the
fact that half of the board of directors (and some of the listed experts) of
the Center for Freedom and Prosperity work for or have worked for the Cato
Institute.
In any case, you are correct, the video was created by the Center for Freedom
and Prosperity, and I apologize for the error.
------
rms
It's not enough to get me to do business in a country lacking rule of law.
While I respect the functioning of the Chinese economy, I also wouldn't start
a business there for the same reason. Usually I am comfortable with risk, but
shakedown by government under threat of extreme lack of liberty, torture, or
death is a risk that really messes with my expected value calculations.
~~~
fgf
It's misleading to compare china to russia like this[1], commercial law in
general (IP rights being an exception) is paid more respected in China than in
Russia. As a businessman in the former you don't face the risk of "shakedown
by government under threat of extreme lack of liberty,
|
hackernews
|
Apoptotic cell death induced by chemotherapeutics and other cell-damaging agents typically involves release of cytochrome c from the mitochondrial intermembrane space to the cytoplasm, where it induces the oligomerization of Apaf-1 to form the "apoptosome" and activate procaspase 9. Active caspase 9 then activates the executioner caspases 3 and 7 to dismantle the doomed cell. Impaired function or formation of the apoptosome is a hallmark of many cancers, including ovarian cancers, melanoma
|
nih_exporter
|
In this study, we identified lymphocytes and MHC class II positive (MHC-II+) cells in the reproductive tract of female rabbits both before and after ovulation. CD43+ T cells were frequently present in the mucosa of the oviduct, cervix, and vagina, but far fewer positive cells were seen in the endometrium. The induction of ovulation did not change the cell density in these regions. KEN-5+ T cells and MHC-II+ cells were also frequently seen
|
pubmed_abstracts
|
ERAS
: Enhanced recovery after surgery
Hb
: Hemoglobin
HSS
: Hospital for special surgery
IL-6
: Interleukin-6
IV-TXA
: Intravenous TXA
LOS
: Length of stay
NSAIDs
: Nonsteroidal anti-inflammatory drugs
OR
: Odds ratios
PLOS
: Postoperative LOS
POD1
: Postoperative day 1
POD3
: Postoperative day 3
PONV
: Postoperative nausea and vomiting
ROM
: Range of motion
TKA
: Total knee arthroplasty
TXA
: Tranexamic acid
VAS
: Visual analogue scale
The authors sincerely acknowledge the entire staff of the Department of Orthopaedics, West China Hospital, who offered assistance throughout the course of this study.
Funding {#FPar1}
=======
This study was funded by the National Health and Family Planning Commission of the People's Republic of China (CN) program (201302007).
Availability of data and materials {#FPar2}
==================================
Please contact the author for data requests.
Author's contributions {#FPar3}
======================
SYZ and QH reviewed the database, conceived the design of the study, and prepared the manuscript. SYZ and JWX collected the data and carried out the statistical analysis. BX and GRC assisted with the statistical analysis and revision of the manuscript. FXP initiated the study, performed the surgery, obtained IRB approval, and oversaw the engineering efforts. All authors read and approved the final manuscript.
Ethics approval and consent to participate {#FPar4}
==========================================
The study protocol was approved by the Institutional Review Board (IRB) of West China Medical Center of Sichuan University (2012--268). For this type of study, formal consent is not required.
Consent for publication {#FPar5}
=======================
Not applicable.
Competing interests {#FPar6}
===================
The authors declare that they have no competing interests.
Publisher's Note {#FPar7}
================
Springer Nature remains neutral with regard to jurisdictional claims in published maps and
|
pubmed_central
|
System.Data.SqlClient.SqlException (0x80131904): Incorrect syntax near ','.
at System.Data.SqlClient.SqlConnection.OnError(SqlException exception, Boolean breakConnection, Action1 wrapCloseInAction)
at System.Data.SqlClient.SqlInternalConnection.OnError(SqlException exception, Boolean breakConnection, Action1 wrapCloseInAction)
at System.Data.SqlClient.TdsParser.ThrowExceptionAndWarning(TdsParserStateObject stateObj, Boolean callerHasConnectionLock, Boolean asyncClose)
at System.Data.SqlClient.TdsParser.TryRun(RunBehavior runBehavior, SqlCommand cmdHandler, SqlDataReader dataStream, BulkCopySimpleResultSet bulkCopyHandler, TdsParserStateObject stateObj, Boolean& dataReady)
at System.Data.SqlClient.SqlDataReader.TryConsumeMetaData()
at System.Data.SqlClient.SqlDataReader.get_MetaData()
at System.Data.SqlClient.SqlCommand.FinishExecuteReader(SqlDataReader ds, RunBehavior runBehavior, String resetOptionsString)
at System.Data.SqlClient.SqlCommand.RunExecuteReaderTds(CommandBehavior cmdBehavior, RunBehavior runBehavior, Boolean returnStream, Boolean async, Int32 timeout, Task& task, Boolean asyncWrite, SqlDataReader ds, Boolean describeParameterEncryptionRequest)
at System.Data.SqlClient.SqlCommand.RunExecuteReader(CommandBehavior cmdBehavior, RunBehavior runBehavior, Boolean returnStream, String method, TaskCompletionSource`1 completion, Int32 timeout, Task& task, Boolean asyncWrite)
at System.Data.SqlClient.SqlCommand.RunExecuteReader(CommandBehavior cmdBehavior, RunBehavior runBehavior, Boolean returnStream, String method)
at System.Data.SqlClient.SqlCommand.ExecuteReader(CommandBehavior behavior, String method)
at System.Data.SqlClient.SqlCommand.ExecuteReader()
at hamsohbat.Form1.showFriends(Update update) in C:\Users\Soroush\documents\visual studio 2015\Projects\hamsohbat\hamsohbat\Form1.cs:line 327
at hamsohbat.Form1.GetUpdates(Int64 ii, Int32
|
stackexchange
|
Pipe: A portion of memory which is coupled to the output of one process as well as to the input of another process, and allows the process to pass information along to the other process.
Pipeline: A structure comprising multiple sequential stages through which a computation flows as time progresses, wherein at any given time a new operation may be initiated at a starting stage (the start of the pipeline) while one or more other (earlier initiated) operations are in progress and thus at later stages (in the middlexe2x80x94moving toward the end) of the pipeline).
Pour: To send a file or output from a program to another file or to a device using a pipe.
The present invention is provided to improve upon storage subsystems. More specifically, the present invention may be provided to improve upon interfacing subsystems for interfacing a storage media controller to a media access channel which couples the storage media controller to a read/write assembly for writing information to and reading information from the storage media. More specifically, the present invention may improve upon read channel interfacing subsystems which interface a disk controller to the read channel which couples the disk controller to a head disk assembly. In order to achieve these objects, one or more aspects of the present invention may be followed in order to bring about one or more specific objects and advantages, such as those noted below.
The present invention, therefore, is directed to a system or method, or one or more components thereof, involving a non-volatile storage subsystem comprising a media I/O controller, a media access channel, and movable storage media. More specifically, the present invention is directed to a non-volatile disk storage subsystem having a read channel coupling a disk controller to a disk head assembly. A read channel interfacing subsystem is provided as part of the storage subsystem, and the read channel interfacing subsystem interfaces a disk controller to the read channel. The read channel interfacing subsystem comprises a set of process units and a pipeline manager. The set of process units includes first, second and third subsets. The first subset is utilized when a disk read operation is carried out via the read channel. The second subset is utilized when a disk write operation is carried out via the read channel. The third subset is utilized when a disk compare operation is carried out via the read channel. Each process unit comprises mechanisms for entering an idle state and for carrying out an operational state flow. The pipeline manager, for each one of the disk read, disk write and disk compare operations, enables and dis
|
uspto_backgrounds
|
Academic researcher
She obtained her bachelor's degree in Psychology from the University of the Basque Country (UPV/EHU) in 1989 and a PhD from the same university in 1993, winning the Special End of Degree Prize in both cases. On completing her bachelor's degree she began to work as a lecturer at the Faculty of Psychology.
Since 2009 she has held the post of Full Professor of Behavioural Science Methodology. Her research work focuses on methods for drawing up psychological assessment instruments, on the intercultural adaptation of such instruments and on the application of multi-level analysis models to the study of psychosocial phenomena. She has taken part in 42 subsidised research projects, on 9 of which she has been the lead researcher. She is also the lead researcher of the Qualiker research group, which has been assessed as excellent in the Basque university system. She has co-authored more than a hundred scientific papers, 26 books and 9 book chapters. She has contributed to more than 200 domestic and international congresses.
She has directed or co-directed 10 doctoral theses, two of these theses won the first prize and runner-up prize in the Basque Government's Realidad Social Vasca [“Basque Social Reality”] award.
She has spent time as a guest researcher at Arizona State University (1995), the University of California (2005) and the Cathie Marsh Centre for Census and Survey Research at the University of Manchester (2010).
She was a founder member of AEMCCO (Spanish Association for Behavioural Science Methodology) and of the EAM (European Association of Methodology). From 2011 to 2015 she was the editor of the official journal of this last association: Methodology. European Journal of Research Methods for the Behavioral and Social Sciences. She is a member of The Board of the Donostia International Physics Center (DIPC) Foundation.
University management
Nekane has a long track record in university management. She has been Deputy Dean of the Faculty of Psychology (2004-2006), Vice-Rector for Teaching Quality and Innovation (2006-2009), Vice-Rector for Postgraduate Studies and International Relations (2012-2016), and since January 2017 she has been the rector of the University of the Basque Country. She replaced Iñaki Goirizelaia that had been the rector since 2009. She was the first elected women to be the President of the University of the Basque
|
wikipedia_en
|
Denote the image of $[0,1]$ under $\gamma$ by $\Gamma$. From our bounds for the values of $\beta$ at $t=0$ and $t=1$ from property (P1), it follows that we can extend the union $\Gamma\cup (-\Gamma)$ to the image of a closed $C^1$-curve $\bar{\Gamma}$, by gluing arcs $R$ and $-R$ to $\Gamma$ and $-\Gamma$, such that the tangential directions at the gluing points agree, as illustrated in Figure \[fig\_counterex\_4\].
Recall that by property (P1), $\beta$ is injective. Thus, $\bar{\Gamma}$ is a simply closed curve that bounds a strictly convex, antipodally symmetric subset of ${\mathbb{R}}^2$ with non-empty interior. Hence, $\bar{\Gamma}$ defines a norm ${\|{{\mkern 2mu\cdot\mkern 2mu}}\|}$ on ${\mathbb{R}}^2$ by setting $S_{{{}^{\text{\scalebox{0.8}{$\|{{\mkern 2mu\cdot\mkern 2mu}}\|$}}}}}^{1}:=\bar{\Gamma}$. Moreover, since $\beta(t)$ is tangential to $\bar{\Gamma}$ at $\gamma(t)\in \bar{\Gamma}$ for $t\in [0,1]$, the Gauss map $G:S^1_{{{}^{\text{\scalebox{0.8}{$\|{{\mkern 2mu\cdot\mkern 2mu}}\|$}}}}}\to S^1$ of the norm ${\|{{\mkern 2mu\cdot\mkern 2mu}}\|}$ in such points is given by $$\label{eq22}
G(\gamma(t))=R_{\tfrac{\pi}{2}}\beta(t),$$ where $R_{\tfrac{\pi}{2}}$ denotes the counterclockwise rotation about the angle $\tfrac{\pi}{2}$. Recall that by property (P2), ${\mathscr{H}}^1(\beta (K))>0$. Thus, implies that ${\mathscr{H}}^1 G(\gamma(t))>0$, where $G$ denotes the Gauss map of the arc $\Gamma$ parameterized by $\gamma$. This proves Theorem \[thm\_counter\] given properties (P1) and (P2) for $\beta$.\
Thus, we are left to prove that $\beta
|
arxiv
|
that.$element
.addClass('in')
.attr('aria-hidden', false)
that.enforceFocus()
transition ?
that.$element.one($.support.transition.end, function () { that.$element.focus().trigger('shown') }) :
that.$element.focus().trigger('shown')
})
}
, hide: function (e) {
e && e.preventDefault()
var that = this
e = $.Event('hide')
this.$element.trigger(e)
if (!this.isShown || e.isDefaultPrevented()) return
this.isShown = false
this.escape()
$(document).off('focusin.modal')
this.$element
.removeClass('in')
.attr('aria-hidden', true)
$.support.transition && this.$element.hasClass('fade') ?
this.hideWithTransition() :
this.hideModal()
}
, enforceFocus: function () {
var that = this
$(document).on('focusin.modal', function (e) {
if (that.$element[0] !== e.target && !that.$element.has(e.target).length) {
that.$element.focus()
}
})
}
, escape: function () {
var that = this
if (this.isShown && this.options.keyboard) {
this.$element.on('keyup.dismiss.modal', function ( e ) {
e.which == 27 && that.hide()
})
} else if (!this.isShown) {
this.$element.off('keyup.dismiss.modal')
}
}
, hideWithTransition: function () {
var that = this
, timeout = setTimeout(function () {
that.$element.off($.support.transition.end)
that.hideModal()
}, 500)
this.$element.one($.support.transition.end, function () {
clearTimeout(timeout)
that.hideModal()
})
}
, hideModal: function () {
|
github
|
You will receive occasional promotional offers for programs that support The Nation’s journalism. You can read our Privacy Policy here.
Thank you for signing up. For more from The Nation, check out our latest issue.
Subscribe now for as little as $2 a month!
Support Progressive Journalism
The Nation is reader supported: Chip in $10 or more to help us continue to write about the issues that matter.
Fight Back!
Sign up for Take Action Now and we’ll send you three meaningful actions you can take each week.
You will receive occasional promotional offers for programs that support The Nation’s journalism. You can read our Privacy Policy here.
Thank you for signing up. For more from The Nation, check out our latest issue.
Travel With The Nation
Be the first to hear about Nation Travels destinations, and explore the world with kindred spirits.
Sign up for our Wine Club today.
Did you know you can support The Nation by drinking wine?
Something quite odd is going on with media coverage of this war. Critics on all sides of the political equation have historically attacked the media for bias in one direction or another, but rarely were willing to admit that they were doing so on behalf of biases of their own. Weekly Standard executive editor Fred Barnes did just that, however, in a recent cover story celebrating top journalists' willingness to throw the old objectivity rulebook out the window as a result of the attacks of September 11.
Barnes does not have all his facts straight. He seems to think that the media have reached a new low in the eyes of the public. In fact, a recent study by the Pew Research Center demonstrates that just the opposite is true; 77 percent of those surveyed rate the media's coverage as excellent or good. Barnes also calls Geraldo Rivera a "liberal media icon" when, in fact, he is a "liberal media" joke.
Nevertheless, Barnes is quite understandably excited about Dan Rather's post-9/11 appearance on the David Letterman show, when the anchor declared: "Wherever [the President] wants me to line up, just tell me where. And he'll make the call." Given that Presidents routinely lie about matters of war and peace, Rather is volunteering here to be a mindless propagandist rather than a thinking journalist. Rather also explained to Letterman that the terrorists attacked us because they
|
pile-cc
|
-5*(j - 12)*(j - 7)**2*(j - 4)
Factor l**2 + 48374*l + 585010969.
(l + 24187)**2
What is m in -2*m**4/15 - 12*m**3 - 448*m**2/5 - 2624*m/15 = 0?
-82, -4, 0
Suppose 29277*z**2 - 29271*z - 6 = 0. What is z?
-2/9759, 1
Suppose 3*s**2 + 81711*s + 81708 = 0. Calculate s.
-27236, -1
Determine f so that 3*f**2/5 - 38967*f/5 + 38964/5 = 0.
1, 12988
Determine v, given that 654*v**3 + 3374*v**2/5 - 6436*v/5 - 208/5 = 0.
-2, -52/1635, 1
Solve 21*k**4 - 4171761*k**3 + 207188275173*k**2 - 266379221007*k + 59195117574 = 0 for k.
2/7, 1, 99327
Determine g, given that -g**2 + 27459*g - 27458 = 0.
1, 27458
Factor -2*p**3/5 - 898*p**2 - 497200*p + 7661400.
-2*(p - 15)*(p + 1130)**2/5
Let 3*d**4 + 399*d**3 - 5193*d**2 + 3981*d + 9570 = 0. What is d?
-145, -1, 2, 11
Factor -2*y**2 + 12*y + 11534.
-2*(y - 79)*(y + 73)
Factor -31*w**3 + 32*w**2 + 157*w + 94.
-(w + 1)**2*(31*w - 94)
Factor 2*m**4/17 + 6*m**3/17 - 18*m**2/17 + 10*m/17.
2*m*(m - 1)**2*(m + 5)/17
Determine z, given that 2*z**3
|
dm_mathematics
|
Shirley,
Please, forward to the Research Group and confirm I shall come.
Vince
---------------------- Forwarded by Vince J Kaminski/HOU/ECT on 07/10/2000
10:22 AM ---------------------------
Anthony Dayao
07/10/2000 10:07 AM
To: Todd.Busby@enron.com, Edith Cross/HOU/ECT@ECT, Kristin
Albrecht/HOU/ECT@ECT, George
|
enron_emails
|
(Emphasis added.) Relying on Corr, the defendant contends that the drug and wildlife charges were required to be joined under the compulsory joinder statute because they allegedly involved separate acts, albeit unrelated, that occurred on the defendant's property over the same period of time. The defendant misconstrues our opinion in Corr. We have never held that nearness in time and place between several offenses, without more, requires their joinder under section 18-1-408(2). We merely pointed out that under the circumstances of a particular case compulsory joinder may include offenses committed within the same unit of time at the same location. We have repeatedly stated that a closer connection between two or more offenses must be established before they are deemed to arise from "the same criminal episode." See People v. Freeman, 196 Colo. 238, 583 P.2d 921 (1978) (the compulsory joinder rule is designed to prevent the state from bringing successive prosecutions for the same criminal conduct); People v. Tulipane, 192 Colo. 476, 560 P.2d 94 (1977) (the purpose of the compulsory joinder statute is to prevent the bringing of successive prosecutions based upon essentially the same conduct); People v. Walker, 189 Colo. 545, 542 P.2d 1283 (1975) (a trial court is not obligated to sever two counts of assault, where the evidence clearly indicated that the two counts arose out of the same continuous sequence of events and were based on two acts connected together); People v. Cooke, 186 Colo. 44, 525 P.2d 426 (1974) (the statute protects against harassment of the defendant *918 by means of multiple prosecutions for the same act).
Our decision in Brutcher v. District Court, 195 Colo. 579, 580 P.2d 396 (1978), is illustrative. In Brutcher, the petitioner drove through an intersection at a high rate of speed, ignoring a traffic officer's order to stop. As he left the intersection, the petitioner began weaving between two lanes of traffic. Ten minutes later, the petitioner returned to the intersection and struck the traffic officer from behind. Other officers arrived, and the petitioner was arrested after a high-speed chase. The petitioner was charged in county court with failing to drive in a single lane, disregarding a police officer, and attempting to elude a police officer, and charged in district court with vehicular eluding and assaulting a police officer
|
freelaw
|
~~~
thirdtruck
And it _is_ a skill that you can improve with practice. Good luck!
------
alain94040
I had the same problem a few years ago. I solved it by going to coffee shops
to work maybe an hour per day. And in good hacker fashion, I eventually built
an app for that, that lets you find "co-lunchers" (check out
[http://colunchers.com](http://colunchers.com)). Hope you find it useful.
------
LadyMartel
What do you do for fun? I always just go to some meetups related to either my
work or my hobbies. I think any sports (hiking, mountain climbing) or artistic
endeavors (woodworking, photography) type of hobbies make it really easy to
make friends.
~~~
yulaow
I was thinking since months to start a yoga course but I fear that in those
lessons the "let's socialize" part is not considered a lot in comparison to
the physical activity
~~~
LadyMartel
Sure there's time to socialize. Waiting for class to start, walking to and
from class/etc. You won't know until you try. (And if it doesn't work out then
you'll still have done some yoga.)
------
GFischer
Others have suggested it, but:
\- local groups for your preferred hobby (there are lots of tabletop gaming
events, I met some cool people in Europe that way)
\- taking classes is a way I've met lots of people. Even if it's short courses
\- going to events
\- sports and other hobbies - as some mentioned, biking, trekking, climbing,
running. In southern Europe there has to be some kind of sports app.
Other family members use other kinds of social support:
\- couchsurfing (there are local couchsurfing events almost everywhere)
\- churches / NGOs / charities / volunteer work
------
lazyfunctor
Try to find a co-working space in your area. If not maybe work from a cafe for
some time during the day.
I was gonna suggest meetup.com but looks like you do not have interesting
meetups in your area.
Maybe pickup some sport in your free time. Le
|
hackernews
|
Project Summary/Abstract Approximately 4.5 million offenders under community supervision in the U.S. have considerably high rates of substance use and are at increased risk for HIV/HBV/HCV infection after release back to the community. Epidemiological studies of substance use provide information about patterns of use based on drug type; however, there is limited evidence regarding opioid use and decision-making and help-seeking intentions, particularly for related healthcare services (e.g., HIV testing).The proposed administrative supplement
|
nih_exporter
|
The diagnosis of prostatic carcinoma.
The increased incidence of prostatic carcinoma is the result of several factors including increased awareness among clinicians and the public of the significance of carcinoma of the prostate, the aging of the American population, and improvements in diagnostic methods. Most patients in whom prostatic cancer currently is diagnosed are evaluated because of symptoms of bladder outlet obstruction or abnormalities found by digital rectal examination (DRE). Incidentally detected carcinoma of the prostate on simple prostatectomy specimens (transurethral resection or open
|
pubmed_abstracts
|
The skin is the natural site of entry for infective promastigotes transmitted by sand flies obtaining a blood meal. Therefore, interaction with the dermal immune system at the initial stage of infection is likely to be important to disease outcome. Several studies have been conducted to characterise the *in situ* immune response against *Leishmania*. TNF-α, IL-lα, IL-10 and TGF-β were significantly increased in chronic compared to early lesions, suggesting a role of these cytokines in the immunopathogenesis of chronic disease ([@B26]). Moreover, both IL-10 and IL-12 mRNAs were co-expressed in most lesions of individuals with active LCL ([@B27]).
In a recent study, *in situ* gene expression of cytokines (IL-4, IL-10, IL-12, IFN-γ) and chemokines (MCP-1, MIP-1α) was examined in biopsies of *L. (L.) mexicana* active lesions. Additionally, MST biopsies were taken from subjects with healed lesions and those with asymptomatic infection. IL-12 and MCP-1 in the absence of IFN-γ gene expression were predominant in subjects with healed lesions and asymptomatic infections, suggesting that these molecules could play a role in early infection and skin-level outcomes ([@B42]).
The frequency of CD8+ IFN-g+ cells after soluble *Leishmania* antigen stimulation was higher for asymptomatically infected individuals than for CL patients. The frequency of infected monocytes in cells from individuals with asymptomatic infection was lower than in cells from CL subjects ([@B8]).
DISCUSSION
==========
First, asymptomatic infection is the most common outcome after *Leishmania* spp. inoculation by infected *Lutzomya* in New World endemic areas of ACL. The epidemiological studies reviewed support the hypothesis that asymptomatic subjects with a positive MST after inoculation by *Leishmania-*infected sand flies are resistant and capable of controlling the infection without evidence of tissue damage. Nevertheless, the mechanisms involved in controlling the infection and responsible for the absence of clinical signs and symptoms remain to be identified. This knowledge is indeed relevant for better understanding the immune mechanisms that could be useful for vaccine development.
Epidemiological studies evaluating the incidence and prevalence of ACL have mostly focused on passive reporting systems. Commonly, only defined cases of ACL (*i.e.*, patients with active cutaneous lesions) are recorded. Therefore, it is important to note that ACL infection includes not only active
|
pubmed_central
|
class CEO{
Date ceoTillDate;
Person person;
constraints=[//some constraints]
}
class Person{
String name;
int age;
constraints=[//some constraints]
}
Here is the service for the import
class ImportService{
importExcel(){
String errorMsg="";
Zoo.withTransaction { status->
try{
//some other operations
for(int rowNum = excelFile.firstRow; rowNum<=excelFile.lastRow; rowNum++) {
try {
importRow(row);
} catch (Exception e) {
//doSomething
}
} //end for-loop
if (errorMsg != "") {
status.setRollback();
}
} catch(Exception e){
//doSomething with e
status.setRollback();
}
}
}
importRow(Row row){
String name = row.getCell(1).stringCellValue;
Zoo.findAllByName(name).each{
try{
//reads every cell in Excel data and validates the field
it.save() //error occures here in the validation
} catch(Exception e){
//doSomething with e
}
}
}
If i inspect the object, it will have a value for it.ceo.name but the rest will be null inside it.ceo. Also will be the it.ceo.person = null. In the DB there are all values for the attributes.
EDIT: If there are no invalid fields inside the excel file, there are no ValidationException. Everything will be imported fine.
EDIT 2: Added the for-loop inside the importExcel() method.
A:
The problem was, that inside the Zoo.withTransaction closure was a for-loop which looped through all the rows inside the excel file. For the solution, we moved the .withTransaction inside the for-loop and the problem was gone.
Code in ImportService looks now like this:
importExcel(){
String errorMsg="";
//some operations
for(int rowNum = excelFile
|
stackexchange
|
Lap siding is a common type of siding for buildings. Lap siding refers generally to siding in which multiple pieces of siding are attached to the building in a partially overlapping fashion. More specifically, a first piece is attached at the lower extent of the face of the building to be sided and then additional pieces are attached above it, with each additional piece at least partially overlapping the piece below it. The distance from the bottom of a piece to the bottom of the piece above it is referred to as a xe2x80x9creveal.xe2x80x9d A reveal may also be defined as the height of the siding piece less the amount of overlap by the piece installed above it, or more simply, the vertical or generally vertical portion of each siding piece that is seen after installation is complete. Mechanical fastening of siding pieces to the face of a building is most commonly achieved through the use of a pneumatic nail gun or similar device that may be operated with one hand.
A challenge when installing lap siding is to create uniform and level reveals, while at the same time addressing the occasional need to intentionally vary reveal sizes by incremental units to correct for any number of construction variances, such as if the ends of a building vary slightly in height or a window has been installed out-of-level. Another challenge is the ability to hold a siding piece properly and firmly to prevent slippage during mechanical fastening. Further, siding installers face the constant challenge of having to carry and use many individual tools, such as a level, straight edge for marking lines, hammer, tape measure, etc., which tends to be cumbersome and hazardous, particularly when working on scaffolding.
One common installation method used to achieve the desired reveals described above is to manually mark lines at taped intervals at each end of a previously fastened siding piece. The next siding piece to be installed is then aligned visually and hand-held during mechanical fastening. A disadvantage of this method is the added installation time required to measure and mark lines for each siding piece. In addition, measurements and markings of lines, as well as visual alignment of siding pieces to said lines, can vary from person to person, from one end of the piece to the other, and from piece to piece, thus introducing cumulative errors of scale and human error resulting in non-uniform reveals and siding pieces installed out of level. Furthermore, this method requires the installer to hand-position and hold each piece of s
|
uspto_backgrounds
|
Water Street abuts the Allegheny River through most of Manorville. Although along the river, much of the borough is not in a flood zone. Many of the residents have dock access to the river, and one public boat ramp is available for trailering. Two churches are located within the borough (Grace Lutheran Church and Manorville Methodist Church). There is also a post office located towards the center of the town on Water Street.
According to the United States Census Bureau, Manorville has a total area of , of which , or 15.80%, is water.
Demographics
As of the census of 2000, there were 401 people, 180 households, and 106 families residing in the borough. The population density was 4,058.8 people per square mile (1,548.3/km²). There were 191 housing units at an average density of 1,933.2 per square mile (737.5/km²). The racial makeup of the borough was 98.75% White, 0.25% Asian, and 1.00% from two or more races. Hispanic or Latino of any race were 0.50% of the population.
There were 180 households, out of which 26.1% had children under the age of 18 living with them, 49.4% were married couples living together, 6.7% had a female householder with no husband present, and 40.6% were non-families. 33.9% of all households were made up of individuals, and 15.6% had someone living alone who was 65 years of age or older. The average household size was 2.23 and the average family size was 2.93.
The median age of 39 years was slightly less than that of the county of 40 years. The distribution was 21.9% under the age of 18, 8.0% from 18 to 24, 31.4% from 25 to 44, 19.5% from 45 to 64, and 19.2% who were 65 years of age or older. The median age was 39 years. For every 100 females there were 96.6 males. For every 100 females age 18 and over, there were 89.7 males.
The median income for a household in the borough was $34,500, and the median income for a family was $36,250. Males had a median income of $27,109 versus $20,909 for females. The per capita income for
|
wikipedia_en
|
Numerical verification
======================
Numerical simulation is performed to test the mixing cut IMEHC for measuring two-pion Bose-Einstein correlations in reactions with $\pi \pi X$ final state particles. In the simulation, the reaction $\gamma p\to \pi^0 \pi^0 p$ with and without BEC effects is taken as an example to demonstrate the event mixing method. The event samples are generated using a ROOT [@Brun1997] utility named “TGenPhaseSpace” [@James1968]. The details of the event generation can be found elsewhere [@He2016]. Totally six $\gamma p\to \pi^0 \pi^0 p$ event samples with and without BEC effects at incident photon energies of 1.0 GeV, 1.03 GeV, 1.06 GeV, 1.09 GeV, 1.12 GeV, and 1.15 GeV respectively are generated.
Although the obtained correlation functions of the non-BEC samples have not any enhancements at $Q=0$ and have a semi-flat distribution averagely as shown in Fig. \[Fig1\] (a), they exhibit a $Q^2$ dependent pattern. Thus the quadratic function $f(Q)=N(1+αQ^2)$ is used to fit the non-BEC correlation functions. Because of the $Q^2$ dependent pattern of the non-BEC sample correlation functions has a strong association with the BEC-samples correlation function fitting, the later should be fitted by a modified Eq. (\[eqn2\]): $$C_{BEC} (Q)=N(1+\alpha Q^2)(1+\lambda_2 e^{-r_0^2 Q^2}),
\label{eqn3}$$
The ability of the proposed mixing method to measure BEC effects is tested using the six BEC samples with input BEC parameters typically set to be $r_0=0.8$ fm and $\lambda_2=$1.0. As shown in Fig. \[Fig1\] (a), the BEC effects can be successfully observed in the obtained correlation functions using the proposed mixing method.
![(a) Correlation functions of the mixed events ($N_{BEC} (Q)/N_{Mix} (Q)$). For comparison, the correlation functions of the generated BEC samples ($N_{BEC} (Q)/N_{noBEC} (Q)$) and those of the non-
|
arxiv
|
"Info": [
{
"IsSuccess": "True",
"InAddress": "高雄市旗山區中正路197號",
"InSRS": "EPSG:4326",
"InFuzzyType": "[單雙號機制]+[最近門牌號機制]",
"InFuzzyBuffer": "0",
"InIsOnlyFullMatch": "False",
"InIsLockCounty": "True",
"InIsLockTown": "False",
"InIsLockVillage": "False",
"InIsLockRoadSection": "False",
"InIsLockLane": "False",
"InIsLockAlley": "False",
"InIsLockArea": "False",
"InIsSameNumber_SubNumber": "True",
"InCanIgnoreVillage": "True",
"InCanIgnoreNeighborhood": "True",
"InReturnMaxCount": "0",
"OutTotal": "1",
"OutMatchType": "完全比對",
"OutMatchCode": "[高雄市]\tFULL:1",
"OutTraceInfo": "[高雄市]\t { 完全比對 } 找到符合的門牌地址"
}
],
"AddressList": [
{
"FULL_ADDR": "高雄市旗山區湄洲里22鄰中正路197號",
"COUNTY": "高雄市",
"TOWN": "旗山區",
"VILLAGE": "湄洲里",
"NEIGHBORHOOD": "22鄰",
"ROAD": "中正路",
"SECTION": "",
"LANE": "",
"ALLEY": "",
"SUB_ALLEY": "",
"TONG": "",
"NUMBER": "197號",
"X": 120.479888,
"Y": 22.889792
}
|
github
|
Lotus watched it happen, she watched Micheal die, in the hands of his mother, Bellatrix Le'strange, she killed her only son, to make the dark one happy, to get her.Lotus was guilty for murder, even though it was not her full fault, she had saved Micheal, from the oath of Living Death.
Ever since this accident, Lotus was beaten, bruised, hit, by the authorities, tortured for the crimes of the one crying in their last breath, murder. But this was only the smallest pain she had ever felt, more pain comes when she felt it coming back.
She had nowhere to go, nothing to feel, but only for people to see, the scars of her guilty crimes, the one she did not commit, as she turned eleven, the scars burnt her back, but strange things happened to the ones she hated, they would fall, feel pain, and torture themselves, as if by MAGIC.
A letter came in, from a school, saying that her application had been denied, for a strange reason. No control, but her denied application, was keeping her locked away, from her true nature.
But why she was rejected was truly a mystery, as nobody, a witch nor wizard, had ever been rejected into the art of learning and controlling magic, but like I said, it was a complete mystery. There was it one reason, to keep the school safe from those, of Living Death.
The Death Eaters were coming, she sensed it in her scars, but she was locked away from other children, were she was starved, locked away, given only a piece of bread a day, and some tomatoes soup if she was lucky. She couldn't warn anyone, and she couldn't escape, the only exit was through the door, there was bars on the window, and the door was locked. While it was like this, everyone was dead...
And no one could come in, not to talk, or even look at her. That night, they came, the wind howled, and the death attacked, taking two hostages, wand at the others, looking for Lotus. They didn't care for her, they only wanted to see her dead. So they led Bellatrix to me, to my room, she took me with her, in her clouded shadow form, and left, leaving only a mark on a girl's neck.
I was
|
pile-cc
|
False
Suppose 5*z - 4*i - 2334 = 0, -2*z - 241 = -4*i - 1165. Is 0.1 less than or equal to z?
True
Let g = 1.31 + -1.5. Let a = -34.09 - -34. Let i = a - g. Which is smaller: i or 3?
i
Let r = -11 - -39. Let n be (0 - (4 + (-4 - -4))) + 34. Are r and n nonequal?
True
Suppose -38*l + 230 = -15*l. Are l and 128/13 non-equal?
True
Let m = -0.32 + -6.68. Let k = m + 7.06. Let a = k + -0.36. Is a at least as big as -2?
True
Let r = 199269/89 + -2239. Is 2/3 at most r?
False
Suppose -5*g = -g - 72. Suppose 2*k = 6 + g. Suppose v + v - 14 = 5*t, -t + 5*v = k. Is t equal to -1?
False
Let v = -2/61 - -67/183. Let n = -29.87 - -30. Let g = n + -0.03. Which is greater: g or v?
v
Let b(o) = -o**3 - 6*o**2 + 8*o + 6. Let t be (-1 + -6)/(0 + 1). Let k be b(t). Let m be -5 - k*(4 + 0). Which is smaller: m or -1/46?
m
Let g = -2.6 - -6.6. Are -30 and g non-equal?
True
Let b(z) = -5*z**2 + 3*z + 5. Let t be b(-4). Let d be (-1925)/22 + (-17)/34. Which is smaller: d or t?
d
Let f be 2 + 1 + (-1 - 0). Suppose -3*m = -f*m + 49. Let g be (-7)/m - 26/(-112). Is g at least as big as 1?
False
Let s(i) =
|
dm_mathematics
|
- winmail.dat << File: winmail.dat >>
<Embedded Picture (Metafile)>
<Embedded Picture (Metafile)>
<Embedded Picture (Metafile)>
<Embedded Picture (Metafile)>
<Embedded Picture (Metafile)>
<Embedded Picture (Metafile)>
<Embedded Picture (Metafile)>
<Embedded Picture (Metafile)>
<Embedded Picture (Metafile)>
<Embedded Picture
|
enron_emails
|
IN THE INTEREST OF D.G., M.H., R.H., AND C.D.H., CHILDREN
_________________________________
FROM THE 237TH DISTRICT COURT OF LUBBOCK COUNTY;
NO. 2007-541,709; HONORABLE LESLIE HATCH, JUDGE
_______________________________
Before CAMPBELL and HANCOCK and PIRTLE, JJ.
MEMORANDUM OPINION
Appellant, M.H., filed a notice of appeal from the trial court's order terminating his
parental rights to his children. We dismiss this appeal for want of jurisdiction.
An appeal from an order terminating the parent-child relationship is accelerated and
governed by the rules for accelerated appeals in civil cases. See Tex. Fam. Code Ann. §§
109.002(a) and 263.405(a) (Vernon 2009). Rule 26.1(b) of the Texas Rules of Appellate
Procedure provides that in an accelerated appeal, the notice of appeal must be filed within
twenty days after the order is signed. Moreover, neither a motion for new trial, a request
for findings of fact and conclusion of law, nor any other post-trial motion will extend the
deadline for filing a notice of appeal under Rule 26.1(b). See Tex. Fam. Code Ann. §
263.405(c) (Vernon 2009). See also In re K.A.F., 160 S.W.3d 923, 926-27 (Tex. 2005).
The termination order was signed on September 15, 2009, making the notice of
appeal due on or before October 5, 2009. Applying the fifteen-day extension provided by
Rule 26.3 of the Texas Rules of Appellate Procedure, the notice of appeal could have been
filed as late as October 20, 2009. The notice of appeal was filed in the trial court on
October 22, 2009. Pursuant to Rule 42.3(a) of the Texas Rules of Appellate Procedure,
by letter dated November 4, 2009, this Court notified counsel of the untimely filed notice
of appeal and directed counsel to show cause why the appeal should not be dismissed for
want of jurisdiction. Counsel was also notified that a post-judgment motion would not
|
freelaw
|
~~~
campoy
I totally agree with you on this. The code for all three languages is clearly
not optimal.
I wonder how much of this performance difference is C++ being very good at
optimizing your code rather than the runtime being more performant. I don't
have any numbers, but I _feel_ like that's not a negligible factor.
~~~
masklinn
> I totally agree with you on this. The code for all three languages is
> clearly not optimal.
That's not really my point. My point's we have no idea what TFA is trying to
do or see[0], so you may be able to say "this is stupid and nonsensical"
because it is[1], but you can't say "I've got a better version" then provide
something with a completely different behaviour.
[0] most likely they just threw some shit at the wall, ended up with
relatively long runtimes and called that a benchmark
[1] or maybe not, maybe it's a reduction of actual workload in the system
doing computation based on some sort of dynamic number of items so you can't
preallocate the intermediate storage and the point's to compare reallocation
overhead[2]
[2] not very likely though, considering you never need the array in the first
place as you're just summing each item with the previous one, then summing
every 100 item of that… anyway
~~~
jasode
_> , but you can say ""_
I'm guessing you meant to type, " _but you can 't say_"
~~~
masklinn
Correct guess. Fixed.
------
DannyBee
Oh microbenchmarks.
All of this is going to be optimized away by a sufficiently smart compiler or
a compiler you tell you want to spend lots of time optimizing.
In general: don't write microbenchmarks where the results can be easily
statically evaluated by the compiler, unless you are testing whether the
compiler can statically evaluate it (this is a reasonable thing to want to
know of course, but it's not a test of the language).
There are also languages which will pretty much not bother to do a lot of the
the actual work, like haskell.
(Note: In this case, the the C++ compiler being used actually knows
|
hackernews
|
This subproject is one of many research subprojects utilizing the resources provided by a Center grant funded by NIH/NCRR. Primary support for the subproject and the subproject's principal investigator may have been provided by other sources, including other NIH sources. The Total Cost listed for the subproject likely represents the estimated amount of Center infrastructure utilized by the subproject, not direct funding provided by the NCRR grant to the subproject or subproject staff. This core module uses long-standing
|
nih_exporter
|
Renal abscess: an illustrative case and review of the literature.
A patient had pyleonephritis with fever and pain that did not resolve, which prompted an abdominal ultrasound examination that showed an abscess within the renal cortex. Renal abscesses are particularly dangerous because of their location and potential spread to adjacent tissues. Although ultrasound is the best modality for imaging a renal abscess, computed tomography provides better tissue contrast, especially in obese patients. The pathophysiology of renal abscesses has changed during the past 25
|
pubmed_abstracts
|
Shin et al. \[[@B51]\]\ Korea Low back pain 58 (34/24) 38.31 (7.97) Motion style acupuncture (DU16, LR2, LI11; 30 minutes) Local diclofenac sodium injection 30 min NRS
(2013)
Stival et al. \[[@B43]\]\ Brazil Fibromyalgia 36 (5/31) 50.83 (9.51) MA (PC6, HT7, SP6, LI4, LR2, ST36; 20 minutes) Penetrating at SPs Immediately VAS
(2014)
Su et al. \[[@B45]\]\ China Low back pain 60 (35/25) 39.6 (12.71) MA (two ankle points; 30 minutes) Nonpenetrating SA Immediately VAS
(2010)
Yang et al. \[[@B42]\]\ China Sore throat 74 (37/37) 28.87 (13.78) MA (LI4; removing the needle after eliciting the sensation) Penetrating at SP 1 min VAS
(2012)
Zhang et al. \[[@B50]\]\ China Migraine 110 (52/58) 24.50 (3.03) EA (GB20, SJ5, GB8, GB34; 30 minutes) Penetrating at SPs Immediately NRS
(2015)
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
*Notes.* ^*∗*^Mean (standard deviation); CTS: carpal tunnel syndrome; DN: dry needling; EA: electroacupuncture; F: female; M: male; MA: manual acupuncture; *N*: number; SA: sham acupuncture; SP: sham acupoint.
######
|
pubmed_central
|
return {
restrict: 'A',
link: function(scope, element, attrs) {
var expr = objectParser(attrs.pointer);
element.mousemove(function(e) {
var offest = element.offset();
scope.$apply(function() {
expr.assign(scope, {
x: e.pageX - offest.left,
y: e.pageY - offest.top
});
});
});
}
};
});
A:
Isolate scope
The problem is that ng-show uses the scope of the element it's on. If it's on an element that has a directive with isolate scope, then it will use that isolate scope, and not have access to the outside scope.
In this particular case, I suspect that description-popup has isolate scope, which means ng-show only has access to the scope of that directive, which probably doesn't have the item that you're trying to test against.
What is isolate scope?
Isolate scope means the directive has its own scope that does not inherit from the surrounding scope. Normal scopes inherit from the surrounding scopes, so they have access to the data on that surrounding scope. Isolate scope does not.
Why would anyone ever want to use isolate scope?!
Reuse. If a directive is intended to be reused in lots of places, in lots of different scopes with a variety of properties on them, you don't want properties on the directive's scope to collide with the properties of the surrounding scope. And since the directive is supposed to be totally independent and not use the surrounding scope at all, it's often a good idea to give it an isolate scope. There are very few disadvantages to this. Really, the only thing that's likely to go wrong is when someone wants to put an ng-show or ng-hide on that element.
Solution
Put your ng-show on an extra <div> around the description-popup:
<div ng-show="!!item.description && item.show_description">
<div class="description-popup"
style="left: {{item.x}}px; top: {{item.y}}px">
<h2>{{item.label}}</h2>
<p>{{item.description}}</p>
<p>{{
|
stackexchange
|
Shielding gas is directed from a diffuser in. the cylindrical assembly into a chamber defined by an outer nozzle through the nozzle into the area around the contact tip so the shielding gas forms a protective layer between the molten metal of the welding operation and atmosphere. All of these requirements of a torch require complex machined components at the end of the torch which substantially increases the cost and adversely affects the operability of the torch during the welding operation. Furthermore, the welding operation itself creates spatter, especially during short circuit conditions so the forward end of the torch including the contact tip and diffuser is subject to substantial deterioration over time caused by spatter together with the tremendous arc temperature involved in the welding operation.
Shielding gas is directed into the welding operation from diffuser orifices circumferentially spaced around the torch and directed ultimately to the contact tip at the welding operation. Consequently, torches have diffuser orifices for shielding gas; however, these orifices must be oriented to prevent unwanted cavitation. It has been found that these orifices should be as close as possible to the welding operation. Such closeness drastically increases the tendency for spatter to affect the laminar flow of shielding gas from the diffuser orifices.
Robotic assemblies are commonly used with welding guns. Previously, when robotic gun assemblies were dismantled, the down time was extensive because there was no quick and easy means to precisely reassemble the robotic gun. A previous example of a keyed alignment system for a welding torch used with a robotic gun assembly is shown in U.S. Pat. No. 5,451,117. A mounting arm which provides for various methods of changing position of the welding gun with respect to the robotic arm and the position of the gun with respect to its housing as well as providing easy disassembly of the gun from the robotic arm is described in co-pending application Ser. No. 11/178,819, filed on Jul. 11, 2005. Hex end structures for the torch end and welding wire feeder and are shown and described in co-pending application Ser. No. 11/268,085, filed on Nov. 7, 2005.
Furthermore, a welding gun which allows for various positions of the forward end and rear end of the gun is needed without complete disassembly of the gun. Accordingly, it is considered desirable to provide a welding gun which allows various positions of the welding gun with respect to the robotic assembly and with respect to the handle without completely disassembling either the gun
|
uspto_backgrounds
|
The Catacomb of San Pancrazio is not in the most perfect condition: the tunnels are mostly destroyed and therefore the visit to see the Catacomb is very short.
The hypogeous cemetery can be divided into three main regions:
The first region is placed below the left transept of the basilica and behind the apse and its access is still the former entrance, within the left nave. This region was explored in the first half of the 20th century by Father Fusciardi.
In the right nave, a trapdoor gives access to the second region, placed below the square in front of the basilica. In this region it is possible to visit:
The cubicle of Botrys, from the name of the decedent buried in it. The peculiarity of this grave is that, on his headstone, Botrys declares himself as a christianós, an unusual expression in the Christian graveyards.
The cubicle of Saint Felix, dating back to the end of the 3rd and the beginning of the 4th century, decorated with a linear red style and elements referring to the sea (ships and fishes).
The cubicle of Saint Sophia, housing a white-plastered arcosolium with four graves, that are believed to be the martyr Sophia and her three daughters'.
Finally, the third region is placed below the cloister. Within the third region there are widespread Constantinian Christograms, which lead the researchers to believe that this part of the hypogeous cemetery has been built in the 4th century.
Bibliography
De Santis L. - Biamonte G., Le catacombe di Roma, Newton & Compton Editori, Rome 1997, pp. 128–132
Cecchelli M., San Pancrazio, Rome, Marietti 1972
Verrando G. N., Le numerose recensioni della passio Pancratii, in "Vetera Christianorum" 19 (1982) 105-129
Nestori A., La basilica di S. Pancrazio in Roma, in Rivista di Archeologia Cristiana 36 (1960) 213-248
Work Cited
Anonymous. “Pancras of Rome.” Hymns and Chants, .
Teahan, Madeleine, and Carol Glatz. “The Saint Whose Name Was given to a Famous Railway Station.” CatholicHerald.
|
wikipedia_en
|
---
address: |
Department Applied of Mathematics\
I-Shou University\
Kaohsiung, Taiwan\
Republic of China
author:
- Cheng Lien Lang
- Mong Lung Lang
title: Fibonacci Numbers and Identities II
---
[^1]
Introduction
============
Let $a,b, p,q \in \Bbb C$, $q\ne 0$. Define the generalised Fibonacci sequence $\{W_n \} = \{ W_n(a,b\, ; p,q)\}$ by $W_0=a$, $W_1 = b$, $$W_n= pW_{n-1} -qW_{n-2}.\eqno(1.1)$$
Obviously the definition can be extended to negative subscripts ; that is, for $n = 1, 2, 3,\cdots, $ define $$W_{-n} = (pW_{-n+1} -W_{-n+2})/q.\eqno (1.2)$$
In the case $a=0$, $b=1$, following \[Ho\], we shall denote the sequence $\{ W_n
(0,1\,;\, p,q)\}$ by $\{u_n\}$. Equivalently, $$u_n = W_n(0,1\, ; p,q).\eqno(1.3)$$
Note that $u_{-n} = -q^{-n} u_n$. In this article, we will give a unified proof of various identities involving $W_n$. The alternative proof presented in this article (for Melham’s, Howard’s and Horadam’s identities) uses nothing but [*recurrence*]{} which is slightly different from the original proof.
Recurrence Relation
===================
[**Lemma 2.1.**]{} [*$ A(n) = W_{2n}$, $B(n) =W_{n}W_{n+r}$ and $C(n) = q^n$ satisfy the following recurrence relation*]{} [$$X(n+3) = (p^2-q)X(n+2) +(q^2-p^2q)X(n+1)+q^3X(n).\eqno (2.1)$$]{}
[*Proof.*]{} One sees easily that $q^n$ satisfies
|
arxiv
|
/*
* SGI FREE SOFTWARE LICENSE B (Version 2.0, Sept. 18, 2008)
* Copyright (C) 1991-2000 Silicon Graphics, Inc. All Rights Reserved.
*
* Permission is hereby granted, free of charge, to any person obtaining a
* copy of this software and associated documentation files (the "Software"),
* to deal in the Software without restriction, including without limitation
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
* and/or sell copies of the Software, and to permit persons to whom the
* Software is furnished to do so, subject to the following conditions:
*
* The above copyright notice including the dates of first publication and
* either this permission notice or a reference to
* http://oss.sgi.com/projects/FreeB/
* shall be included in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
* OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
* SILICON GRAPHICS, INC. BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
* WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF
* OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*
* Except as contained in this notice, the name of Silicon Graphics, Inc.
* shall not be used in advertising or otherwise to promote the sale, use or
* other dealings in this Software without prior written authorization from
* Silicon Graphics, Inc.
*/
/*
** Author: Eric Veach, July 1994.
**
*/
#ifndef __tessmono_h_
#define __tessmono_h_
/* __gl_meshTessellateMonoRegion( face ) tessellates a monotone region
* (what else would it do??) The region must consist of a single
* loop of half-edges (see mesh.h) oriented CCW. "Monotone" in this
* case means that any vertical line intersects the interior of the
* region in a single interval.
*
* Tessellation consists of adding interior edges (actually pairs of
*
|
github
|
Mandatory alcohol and drug testing is now required of all intrastate truckers, commercial driver's license holders, and other transportation workers. In joint government agreements, the United States, Canada, and Mexico also monitor truckers crossing international borders. More than 70 percent of large private employers require drug and alcohol testing. ACOEM has been the educational provider of choice for MROs since 1990; more than 12,000 physicians have completed ACOEM's highly acclaimed training.
MRO Update is written and edited by Robert Swotinsky, MD, MPH, a certified MRO and Substance Abuse Professional (SAP) who is board certified in occupational medicine. Dr. Swotinsky is affiliated with the University of Massachusetts after practicing clinical medicine at Reliant Medical Group in Worcester, Mass., where he chaired their occupational health department for 11 years. He is coauthor of The Medical Review Officer’s Manual and is on the Medical Review Officer Certification Council’s Examination Development Committee. Dr. Swotinsky also serves on the faculty for ACOEM’s MRO training courses.
Published 10 times a year, MRO Update contains clear, concise, and practical articles on topics such as:
BACK ISSUES – Complete sets from 2007 — 2013 are available through our Product Catalog for $150 per set. You may view each year’s topical index here: 2007, 2008, 2009, 2010, 2011, 2012, 2013, or 2014. Single copies of back issues are also available for $15 each. Call ACOEM Publications Department at 847/818-1800, ext. 387 to place an order or to check on availability of indexes and issues prior to 2007.
Medical Review Officer (MRO) List
This is a free limited e-mail list designed to foster communications regarding drug and alcohol testing and MRO or SAP services between professionals working in the field (BATs, MROs, SAPs, etc.). To subscribe to the list, send an e-mail to MROLISTSERVE@GMAIL.com and put “subscribe" in the subject line and in the message.
This link will take you to the web site of the Medical Review Officer Certification Council (MROCC). The MRO Code of Ethics was established by the MROCC Board of Directors on July 15, 2003, and endorsed by the ACOEM Board of Directors on November 4, 2004.
Public Affairs
Tools and Resources
|
pile-cc
|
Let n(p) = 21876*p - 1591. List the prime factors of n(4).
53, 1621
Let q(x) = -108*x**3 - x**2 - 7. Let y be q(-2). Let k = y - 476. List the prime factors of k.
13, 29
Let p(r) = 4*r - 24. Let g be p(6). Suppose -3*m = -87 - g. Suppose -5*d + 4*w + 392 = 0, -d + m = -4*w - 43. What are the prime factors of d?
2, 5
Let c(z) = -28*z + 14. Let v be c(-7). Suppose 10*p - v = 5*p. List the prime factors of 6/(-9)*-2*p.
2, 7
Let t = -418 - -242. Let z = -140 - t. What are the prime factors of z?
2, 3
Let x(g) = 164 + 33*g + 26*g + 37 - 15*g - 6*g. What are the prime factors of x(36)?
3, 523
Suppose -680 = -36*k + 34*k. Suppose 114*f - 119*f = -k. List the prime factors of f.
2, 17
Suppose 5*z + 161 = 4*p, 59 = p + 3*z - 8*z. Suppose 0*h - 3*h + 2*g + 157 = 0, -3*g = h - 56. Let l = h + p. List the prime factors of l.
3, 29
Suppose -56*u - 220170 = -86*u. List the prime factors of u.
41, 179
Let l(z) = -z**3 + 5*z**2 + 3*z + 3. Let f be l(4). Suppose -36*u = -f*u. Suppose 4*o - x - 79 = 81, -2*o + x + 80 = u. List the prime factors of o.
2, 5
Suppose 4385110 = 96*p + 53*p - 3*p. What are the prime factors of p?
5, 6007
Suppose -124 = o - 127. Suppose -3
|
dm_mathematics
|
https://investing.schwab.com/trading/start?SANC=EAMyAlerts
----------------------------------------------------------------
Notice: All email sent to or from the Charles Schwab corporate
email system may be retained, monitored and/or reviewed
by Schwab personnel. (0801-11478)
Charles Schwab & Co., Inc. ("Schwab") is a member of the NYSE.
Schwab Capital Markets L
|
enron_emails
|
Walter R. SHEPPARD, Jr., Guardian of William L. Sheppard, Incompetent
v.
COMMUNITY FEDERAL SAVINGS AND LOAN and Community Savings and Loan Association.
Walter R. SHEPPARD, Jr., Guardian of William L. Sheppard, Incompetent
v.
COMMUNITY SAVINGS AND LOAN ASSOCIATION, Community Federal Savings and Loan and Judy Hovey.
No. 8629SC241.
Court of Appeals of North Carolina.
February 3, 1987.
*254 Long, Parker, Payne & Warren by Robert B. Long, Jr. and Ronald K. Payne, Asheville, for plaintiff-appellant.
Jackson & Jackson by Frank B. Jackson and Charles Russell Burrell, Hendersonville, for defendant-appellee Community Federal Sav. and Loan Ass'n.
David K. Fox and Hogan and Hogan by Lawrence A. Hogan and Robert L. Hogan, Hendersonville, for defendant-appellee Judy Hovey.
PHILLIPS, Judge.
Of the several contentions that the appellant makes in his quest for a new trial it is necessary to discuss just one, as a new trial is clearly required and the developments that gave rise to the other contentions are not likely to recur. For when Judge Cornelius disregarded Judge Burroughs' prior order directing that plaintiff be examined by a psychiatrist and that a hearing be held on the issue of plaintiff's competency this case took a wrong turn prejudicial to the plaintiff as the foregoing facts indicate. Judge Burroughs' order, entered several months before trial, was based upon a well supported finding that there was "a substantial question" as to *255 the plaintiff's competency and it was error for the court to go forward with the case before that question was properly resolved. Rutledge v. Rutledge, 10 N.C.App. 427, 179 S.E.2d 163 (1971).
When a party to a lawsuit in this state is mentally incompetent he must be represented by his Guardian if he has one, and if not by a Guardian ad litem. Rule 17(b), N.C. Rules of Civil Procedure. As pointed out in Hagins v. Redevelopment Commission, 275 N.C. 90, 165 S.E.2d 490 (1969) and Rutledge, supra: When a question as to a party's competence arises during the course of a civil action
|
freelaw
|
Compiling Ruby, RubyGems, and Rails on Snow Leopard - danbenjamin
http://hivelogic.com/articles/compiling-ruby-rubygems-and-rails-on-snow-leopard/
======
sant0sk1
I don't know why people advise others to splat their compiled 3rd party
software all over /usr/local when /opt is there specifically for that purpose.
Also, enabling pthread on 1.8 has some significant performance problems unless
you're using REE. For more reading on that:
[http://timetobleed.com/fix-a-bug-in-rubys-configurein-and-
ge...](http://timetobleed.com/fix-a-bug-in-rubys-configurein-and-
get-a-30-performance-boost/)
~~~
nudded
i don't see a difference between /opt and /usr/local , I just think it's a
matter of preference
~~~
sant0sk1
The difference is stuff installed in /opt is encapsulated inside its own
folder, whereas everything in /usr/local is shared (one bin dir, one lib dir,
etc).
So if I want to uninstall Ruby from /opt I do something like this:
rm -rf /opt/ruby-1.8.7
To uninstall Ruby from /usr/local is a lot more work.
~~~
nudded
you could actually do the same in /usr/local. all you need to do is install
all packages to their own folder (eg /usr/local/custom/ruby-1.8.7) and then
symlink the binary to /usr/local/bin.
<http://github.com/mxcl/homebrew/tree/> is a package manager that tries to do
just that
~~~
tsally
Seems like you might as well do it in opt then, since it is far less common to
encapsulate things in folders in local.
------
mrinterweb
I have been fighting for hours trying to get the mysql gem installed for Ruby
1.9.1 on snow leopard. If anyone knows some helpful info for getting this to
work please help me.
|
hackernews
|
DESCRIPTION [unreadable] The HST Program resides in the Dept. of Environmental Health Sciences at UCLA's School of Public Health and is under the direction of Dr. Wendie Robbins, Acting Continuing Education Director. It represents a continuing education program offering hazardous materials training within its Region IX target area in response to the title III of CERCLA and the SARA amendments. Courses are offered to meet 8-hour, 24-hours and 40 hours requirements of HAZWOPER (in
|
nih_exporter
|
Knowledge of forces in the glenohumeral joint is essential for understanding normal and pathologic shoulder function. It forms the basis for performing fracture treatment or joint replacement surgery, for optimizing implant design and fixation and for improving and verifying analytical biomechanical models of the shoulder. An instrumented shoulder implant with telemetric data transmission was developed to measure six components of joint contact forces and moments. A patient with humeral head arthrosis achieved good joint function after its implantation. During the first 7 postoperative months,
|
pubmed_abstracts
|
For construction of the targeting vector for *pbhrf* disruption (*PbHRF*; plasmid provided by P. Smooker and K. Taylor, RMIT University, Bundoora, Australia), DNA fragments corresponding to the 5′ untranslated (UTR) and 3′UTR regions of the *pbhrf* gene were amplified by PCR using *P. berghei* NK65 genomic DNA (gDNA) as a template. These primers ([Table S2](http://www.jem.org/cgi/content/full/jem.20151976/DC1){#supp5}) were tailed with restriction sites for ApaI, PstI, KpnI, and EcoRI to facilitate cloning into either side of the *hDHFR* cassette ([@bib8]) in pUC18 backbone. The targeting construct was integrated into the *pbhrf* gene locus by double crossover recombination, resulting in the disruption of *pbhrf* and conferring WR99210 or pyrimethamine resistance. Transfection into a GFP-*Pb*NK65 parasite strain and selection of recombinant parasite clones were performed as previously described ([@bib9]). In brief, after overnight culture (37°C with 10% O~2~ and 5% CO~2~ at 90 rpm) of the blood of infected animals, mature schizonts were purified using a Nycodenz gradient and collected at room temperature. The electroporation mix was composed of 10^7^--10^8^ merozoites resuspended in 50 µl and 100 µl of human T cell Nucleofector solution (Amaxa) and 5 µl DNA (containing 5 µg of digested DNA in water). Parasites were electroporated using the U33 program of the Nucleofector electroporator (Amaxa) and immediately resuspended in PBS and injected intravenously into 3-wk-old female SW mice. Recipient mice were treated with 0.07 mg/ml pyrimethamine in drinking water or with 6 mg/kg WR99210 by subcutaneous injections, starting 24 h after electroporation. At day 6 after electroporation, the emerging parasite population was collected, gDNA was extracted, and genomic integration of the *hDHFR* cassette (within the *pbhrf* locus of GFP-*Pb*NK65 transfectants) was confirmed using specific PCR primers: (a) Apa-5′UTR *Pb*HRF-F and EcoRI-3
|
pubmed_central
|
I am trying to implement the function that compares two files. The function should restore the first lines that differ from each other. If the files are the same, NULL will be returned. The function ends as soon as either of the files ends, and then NULL is returned. I think my if functions doesn't work and so on this function don't return the lines.
Here is my code:
char *difference(const char* file1, const char* file2)
{
char line1[1000];
char line2[1000];
char *a = malloc(1000 * sizeof(char));
FILE *f1 = fopen(file1, "r");
FILE *f2 = fopen(file2, "r");
if (!f1 || !f2) // checking if there is any error
{
return -1;
}
while (fgets(line1, sizeof(line1), file1) != NULL && fgets(line2, sizeof(line2), file1) != NULL)
{
if (strcmp(line1, line2) != 0)
{
strcpy(a, line1);
strcpy(a, line2);
}
else
{
return NULL;
}
}
fclose(f1);
fclose(f2);
return a;
int main(void)
char* diff = difference("testifile.c", "testifile2.c");
printf("\n--- Difference:\n");
printf("%s", diff);
free(diff);
return 0;
}
A:
Yeah that doesn't work so good. Here are the bugs:
return -1;
Does not compile. Did you mean
return (char*)-1;
Also, leaks memory. Do:
if (f1) fclose(f1);
if (f2) fclose(f2);
return (char*)-1;
Oops you read from file1 twice:
while (fgets(line1, sizeof(line1), file1) != NULL && fgets(line2, sizeof(line2), file1) != NULL)
should be
while (fgets(line1,
|
stackexchange
|
The kinases comprise the largest known protein group, a superfamily of enzymes with widely varied functions and specificities. They are usually named after their substrate, their regulatory molecules, or some aspect of a mutant phenotype. With regard to substrates, the protein kinases may be roughly divided into two groups; those that phosphorylate tyrosine residues (protein tyrosine kinases, PTK) and those that phosphorylate serine or threonine residues (serine/threonine kinases, STK). A few protein kinases have dual specificity and phosphorylate threonine and tyrosine residues. Almost all kinases contain a similar 250-300 amino acid catalytic domain. The N-terminal domain, which contains subdomains I-IV, generally folds into a two-lobed structure, which binds and orients the ATP (or GTP) donor molecule. The larger C terminal lobe, which contains subdomains VI A-XI, binds the protein substrate and carries out the transfer of the gamma phosphate from ATP to the hydroxyl group of a serine, threonine, or tyrosine residue. Subdomain V spans the two lobes.
The kinases may be categorized into families by the different amino acid sequences (generally between 5 and 100 residues) located on either side of, or inserted into loops of, the kinase domain. These added amino acid sequences allow the regulation of each kinase as it recognizes and interacts with its target protein. The primary structure of the kinase domains is conserved and can be further subdivided into 11 subdomains. Each of the 11 subdomains contains specific residues and motifs or patterns of amino acids that are characteristic of that subdomain and are highly conserved (Hardie, G. and Hanks, S. (1995) The Protein Kinase Facts Books, Vol 1:7-20 Academic Press, San Diego, Calif.).
The second messenger dependent protein kinases primarily mediate the effects of second messengers such as cyclic AMP (cAMP), cyclic GMP, inositol triphosphate, phosphatidylinositol, 3,4,5-triphosphate, cyclic-ADPribose, arachidonic acid, diacylglycerol and calcium-calmodulin. The cyclic-AMP dependent protein kinases (PKA) are important members of the STK family. Cyclic-AMP is an intracellular mediator of hormone action in all prokaryotic and animal cells that have been studied. Such hormone-induced cellular responses include thyroid hormone secretion, cortisol secretion, progesterone secretion, glycogen breakdown, bone resorption, and regulation of heart rate and force of heart muscle contraction.
|
uspto_backgrounds
|
History
The Order of Isabel the Catholic was instituted by King Ferdinand VII on 14 March 1815 as the Royal American Order of Isabel the Catholic. The original statutes of the Order were approved by Royal Decree of 24 March, with membership made in three classes: Grand Cross, and Knights of First and Second Class. Ferdinand VII was declared the Order's Founder, Head, and Sovereign. On 7 October 1816, at the suggestion of the Chapter of the Order, the Knights of the first class were renamed Commanders and the second class were renamed Knights.
Under the reign of Isabel II, the four royal orders in existence in Spain at the time: the Order of the Golden Fleece, the Order of Saint John of Jerusalem of the Languages of Aragon and Castile, the Order of Charles III, and the Order of Isabella the Catholic was reorganised by royal decree of 26 July 1847. The latter was reserved to reward exclusively the services rendered in the Overseas territories. The classes of the order became Knight, Commander, Commander by Number, and Grand Cross. The concession and tests of nobility was suppressed in all the Royal Orders. By royal decree of 28 October 1851, no concessions of Grand Cross of any orders were to be made without the proposal of the Council of Ministers and concessions for the lower classes with the proposal of the Secretary of State.
After the establishment of the First Republic, the Order was declared to be extinguished by Decree of 29 March 1873 as deemed to be incompatible with the Republican Government. Use of the various insignias was allowed to those who possessed them. When King Alfonso XII ascended to the throne, the Order was reestablished by Decree of 7 January 1875.
During the minority of Alfonso XIII, his mother and Regent, Maria Cristina, signed the royal decrees of 15 April 1889 and 25 October 1900. Among other things, they sought to impose entry into the Order by the category of Knight, to prohibit the use of decorations until the corresponding title was obtained, and to ratify the obligation that the Grand Cross be awarded with the agreement of the Council of Ministers and for conferees to be published in the Official Gazette. By Royal Decree of 14 March 1903, the Silver Cross of the Order was created, and by Royal Decree of 15 April 1907, the Silver and Bronze Medals.
In Royal Decree 1118, of 22 June 1927, the superior grade
|
wikipedia_en
|
We emphasize now the difference between the uncertainty captured by specifying a distribution as the neural network’s output, as discussed here, and the uncertainty in the weight distribution, as discussed in Section \[section:bnn\]. The former corresponds to the irreducible pure randomness, while the latter reflects uncertainty in parameter estimation.
Data and Model
==============
In this section, we describe the data used for our experiments and the proposed model. The dataset used and relevant code are available on GitHub.[^2] The experiments are implemented using the R programming language [@rdevelopmentcoreteamLanguageEnvironment2011] and TensorFlow [@tensorflow2015-whitepaper].
Data
----
We utilize the individual claims history simulator of [@gabrielliIndividualClaims2018] to generate data for our experiments. For each claim, we have the following static information: line of business, labor sector of the injured, accident year, accident quarter, age of the injured, part of body injured, and the reporting year. In addition, we also have 12 years of claim development information, in the form of cash flows and claims statuses (whether the claim is open or not). The generated claims history exhibit behaviors such as negative cash flows for recoveries and late reporting, which mimic realistic scenarios.
Since we only have claims data and not policy level and exposure data, we study only reported claims.
Experiment Setup
----------------
We first simulate approximately 500,000[^3] claims using the simulator, which provides us with the full development history of these claims. The claims cover accident years 1994 to 2005. Since we are concerned with reported claims, we remove claims with report date after 2005, which leaves us with N = 497,516 claims. In this paper, we assume that each claim is fully developed at development year 11 (note that in the dataset the first development year is denoted year 0). More formally, we can represent the dataset as the collection
$$\mathcal{D} = \{ (X^{(j)}, (C_i^{(j)})_{0 \leq i \leq 11}, (S_i^{(j)})_{0 \leq i \leq 11}): j\in {1,\dots, N}\},$$
where $X$, $(C_i)$, and $(S_i)$ denote the static claim features, incremental cash flow sequences, and claim status sequences, respectively, and $j$ indexes the claims.
To create the training and testing sets, we select year
|
arxiv
|
fsnotify is derived from code in the [golang.org/x/exp](https://godoc.org/golang.org/x/exp) package and it may be included [in the standard library](https://github.com/fsnotify/fsnotify/issues/1) in the future. Therefore fsnotify carries the same [LICENSE](https://github.com/fsnotify/fsnotify/blob/master/LICENSE) as Go. Contributors retain their copyright, so you need to fill out a short form before we can accept your contribution: [Google Individual Contributor License Agreement](https://developers.google.com/open-source/cla/individual).
Please indicate that you have signed the CLA in your pull request.
### How fsnotify is Developed
* Development is done on feature branches.
* Tests are run on BSD, Linux, macOS and Windows.
* Pull requests are reviewed and [applied to master][am] using [hub][].
* Maintainers may modify or squash commits rather than asking contributors to.
* To issue a new release, the maintainers will:
* Update the CHANGELOG
* Tag a version, which will become available through gopkg.in.
### How to Fork
For smooth sailing, always use the original import path. Installing with `go get` makes this easy.
1. Install from GitHub (`go get -u github.com/fsnotify/fsnotify`)
2. Create your feature branch (`git checkout -b my-new-feature`)
3. Ensure everything works and the tests pass (see below)
4. Commit your changes (`git commit -am 'Add some feature'`)
Contribute upstream:
1. Fork fsnotify on GitHub
2. Add your remote (`git remote add fork git@github.com:mycompany/repo.git`)
3. Push to the branch (`git push fork my-new-feature`)
4. Create a new Pull Request on GitHub
This workflow is [thoroughly explained by Katrina Owen](https://splice.com/blog/contributing-open-source-git-repositories-go/).
### Testing
fsnotify uses build tags to compile different code on Linux, BSD, macOS, and Windows.
Before doing a pull request, please
|
github
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.