text
stringlengths
173
4.38k
subset
stringclasses
13 values
This is a case report of primary localized amyloidosis of the urinary bladder. The patient was a 73-year-old woman who had relapse of this disease three times. Primary localized amyloidosis of the urinary bladder is an especially rare disease and the prognosis is excellent in most cases. We performed transurethral resection of the bladder tumor (TUR-Bt) each time and we are following up this patient carefully. After the last TUR-Bt, she has had no recurrence for 7
pubmed_abstracts
John Wiley & Sons, Ltd Study treatment discontinuation was only reported in 8 patients with DLBCL and 16 with FL due to disease progression (DLBCL, *n* = 4; FL, *n* = 10), investigator decision (DLBCL, *n* = 0; FL, *n* = 3), patient request/consent withdrawal (DLBCL, *n* = 1; FL, *n* = 1), death (DLBCL, *n* = 1; FL, *n* = 1), or other reasons (DLBCL, *n* = 2; FL, *n* = 1). Safety {#bjh16227-sec-0009} ------ A total of 133 (95·0%) patients experienced at least one of the 1162 AEs reported throughout the study (DLBCL, 93·1%; FL, 95·5%), which most frequently included erythema, neutropenia and asthenia (Table [3](#bjh16227-tbl-0003){ref-type="table"}). AEs were grade ≥3 in 54 (38·6%) patients (DLBCL, 48·3%; FL, 36·0%), most frequently neutropenia and febrile neutropenia, and were considered related to subcutaneous rituximab by the treating physicians in 76 cases (54·3%; DLBCL, 37·9%; FL, 58·6%), most frequently erythema and neutropenia (Table [3](#bjh16227-tbl-0003){ref-type="table"}). Study treatment was delayed in 32 (22·9%) patients due to AEs (DLBCL, 13·8%; FL, 25·2%), interrupted in one (0·7%; DLBCL, 0·0%; FL, 0·9%) and permanently discontinued in one (0·7%; DLBCL, 0·0%; FL, 0·9%); treatment withdrawal in the latter patient was due to pneumonia pneumococcal (Table [3](#bjh16227-tbl-0003){ref-type="table"}). A total of 976 (84·0%) of the 1162 AEs resolved (DLBCL, 83·3%; FL, 84·1%), 17 (1·5%) resolved with sequelae (DLBCL, 1·6%;
pubmed_central
Qt QLCDNumber issue I am making a timer/stopwatch with Qt Creator. But, my reset function (reset button clicked) is not working as I want it to. I want it to stop the timer and set the display (QLCDNumber) to 0. Instead, the timer is stopped but the display numbers stay the same as if the pause button was clicked. Except that when the timer is started (start button clicked) again, it restarts from the original time (as I want it to do). Here is the code. I only included the parts that are part of the problem. void MainWindow::delay() { QTime dieTime = QTime::currentTime().addSecs(1); while (QTime::currentTime() < dieTime && !spause && !sreset) { QCoreApplication::processEvents(QEventLoop::AllEvents, 100); std::this_thread::sleep_for(std::chrono::milliseconds(1)); } } void MainWindow::on_tstart_clicked() { ttime = treset ? 0 : ttime; tpause = treset = false; ttime = ttime == 0 ? (ui->hr->value() * 3600 + ui->min->value() * 60 + ui->sec->value()) : ttime; while (ttime >= 0 && !tpause && !treset) { const unsigned short sec = ttime % 3600 % 60, min = ttime % 3600 / 60, hr = ttime / 3600; ui->tsec2->display(sec % 10); ui->tsec1->display(sec / 10); ui->tmin2->display(min % 10); ui->tmin1->display(min / 10); ui->thr2->display(hr % 10); ui->thr1->display(hr / 10); delay(); if (!tpause && !treset) --ttime; } } void MainWindow::on_tpause_clicked() { tpause = true; } void MainWindow::on_treset_clicked() { treset = true;
stackexchange
When the optical scanning device is constituted using such light source and such optical deflector and the optical scanning of the scanned surface, such as the photoconductor, is carried out, the beam-spot position is not arranged at equal intervals, and the scanning speed is not constant. For this reason, in order to arrange the beam-spot position at equal intervals and set the scanning speed at the fixed level when performing the optical scanning, the uniform optical scanning of the scanned surface is attained by performing the compensation using the scanning/focusing optical system, such as the fθ lens. However, there is the limitation in the compensation of the scanning speed using the fθ lens. The scanning speed cannot be completely set at the fixed level, and the scanning speed variance may arise. Thus, the sparseness or denseness of the beam-spot position spacing takes place, and it is desirable that the beam-spot position spacing be set to the fixed interval. Furthermore, the sparseness or denseness of the beam-spot position spacing is increased according to the manufacture error of the fθ lens. If the sparseness or denseness of the beam-spot position spacing occurs, the distortion of the image arises, which causes the degradation of image quality. Moreover, the color image forming device uses two or more fθ lenses, and, due to the manufacture error of the fθ lens and others, the sparseness or denseness of the beam-spot position spacing which is varied for each of the colors arises, and consequently the color deviation arises. There is the known technique which compensates the sparseness or denseness of the beam-spot position spacing. According to the known technique, the frequency of the pixel clock is varied and the beam-spot position along the scanning line is compensated. Such technique is known from Japanese Laid-Open Patent Applications No. 11-167081 and No. 2001-228415, and Japanese Patent No. 3512397 (which corresponds to Japanese Laid-Open Patent Application No. 2003-098465). However, the conventional technique is directed to the frequency modulation method in which the frequency of the pixel clock is varied. Generally, the pixel clock control unit for the frequency modulation method is complicated in the structure, and there is the problem that when the width of the frequency modulation becomes very small, it is difficult to perform the pixel clock control suitably, and the compensation of the beam-spot position with high accuracy cannot be performed. Moreover, there is the problem that
uspto_backgrounds
UK CD3 "Bachelorette" (RZA Remix) – 5:49 "Bachelorette" (Alec Empire Hypermodern Jazz Remix) – 5:49 "Bachelorette" (Alec Empire the Ice Princess and the Killer Whale Remix) – 6:23 "Bachelorette" (Grooverider Jeep Remix) – 9:11 EU CD "Bachelorette" (radio edit) – 3:37 "Bachelorette" (RZA Remix) – 5:49 "Bachelorette" (Mark Bell Optimism Mix) – 5:49 "Bachelorette" (Mark Bell Zip Remix) – 4:18 "Bachelorette" (Mark Bell Blue Remix) – 2:52 "My Snare" (aka "Nature is Ancient") – 3:37 JP Bachelorette / Jóga EP "Bachelorette" (radio edit) – 3:37 "Bachelorette" (Howie Spread Mix) – 5:49 "Bachelorette" [Mark Bell Zip Remix] – 4:18 "Bachelorette" (Alec Empire Hypermodern Jazz Remix) – 5:49 "Bachelorette" (Grooverider Jeep Remix) – 9:11 "Jóga" (Buzz Water Remix) – 4:21 "Jóga" (Alec Empire Hardcore Mix 1) – 3:02 "Jóga" (Alec Empire Hardcore Mix 2) – 4:15 "Jóga" (album version) – 5:09 "Jóga" (String and Vocal Mix) – 4:25 VHS single "Bachelorette" (music video) – 5:26 Remixes Alec Empire Hypermodern Jazz remix Alec Empire The Ice Princess and the Killer Whale remix Grooverider Jeep remix Howie Spread mix Mark Bell Blue remix Mark Bell Optimism remix Mark Bell Zip remix Radio edit RZA remix Clams Casino – Illest Alive (Sample) VHS single "Bachelorette" (music video) – 5:26 "My Story" by
wikipedia_en
- Two-stream instability II: $$f(0,x,v) = f_{TSII}(v)(1+A\cos(kx)),\quad x\in[0,L],\,v\in[-V_c,V_c],$$ where $A=0.05$, $k=2/13$, $L=13\pi$, $V_c=5$, and $$f_{TSII}(v)=\frac{1}{2v_t\sqrt{2\pi}}\left(\exp\left(-\frac{|u+v|^2}{2v_t^2}\right)+\exp\left(-\frac{|u-v|^2}{2v_t^2}\right)\right),$$ where $u=0.99,\,v_t=0.3.$ In the literature, RKDG schemes for the VP system [@Ayuso2009; @heath2012discontinuous; @cheng_vp] have been extensively studied. They are shown to have superior performance in conservation. Our previous work on sparse grid DG method [@guo_sparsedg] focused on the closely related Vlasov-Ampère (VA) system. The solver in [@guo_sparsedg] successfully reduced the DOFs of the equations while maintaining key conservation properties. However, when $t$ gets large and filamentation becomes severe, the sparse grid method has difficulties resolving the fine structures in the phase space. It is therefore to our interest to investigate if the adaptive multiresolution scheme can achieve a good balance between computational cost and numerical resolution. We apply the adaptive algorithm to the Vlasov equation as outlined in Section \[sec:method\]. The Poisson equation is solved by a standard local DG method [@Arnold_2002_SIAM_DG] on the finest level mesh in the $x$-direction. In the simulations, we use $N=7$, $\varepsilon=10^{-5}$ and $k=3$. First we investigate the conservative properties of the scheme. The VP system is known to preserve many physical invariants, including the particle number $\int_{\mathbf{x}}\int_{{\bf v}}f(t,{\mathbf{x}},{{\bf v}})\,d{\mathbf{x}}d{{\bf v}},$ momentum $\int_{\mathbf{x}}\int_{{\bf v}}{{\bf v}}f(t,{\mathbf{x}},{{\bf v}})\,d{\mathbf{x
arxiv
# Make sure Windows processes exit cleanly OLD_CWD = os.getcwd() atexit.register(lambda: os.chdir(OLD_CWD)) os.chdir(TEST_DIR.name) def close_open_files(): everything = gc.get_objects() for obj in everything: if isinstance(obj, io.IOBase): obj.close() atexit.register(close_open_files) # Example 1 class InputData: def read(self): raise NotImplementedError # Example 2 class PathInputData(InputData): def __init__(self, path): super().__init__() self.path = path def read(self): with open(self.path) as f: return f.read() # Example 3 class Worker: def __init__(self, input_data): self.input_data = input_data self.result = None def map(self): raise NotImplementedError def reduce(self, other): raise NotImplementedError # Example 4 class LineCountWorker(Worker): def map(self): data = self.input_data.read() self.result = data.count('\n') def reduce(self, other): self.result += other.result # Example 5 import os def generate_inputs(data_dir): for name in os.listdir(data_dir): yield PathInputData(os.path.join(data_dir, name)) # Example 6 def create_workers(input_list): workers = [] for input_data in input_list: workers.append(LineCountWorker(input_data)) return workers # Example 7 from threading import Thread def execute(workers): threads = [Thread(target=w.map) for w in workers] for thread in threads: thread.start() for thread in threads: thread.join() first, *rest = workers for worker in rest: first.reduce(worker)
github
Certainly Gates' summary of the MRAP saga in his book skips over the bureaucratic process that had ground on for years before he arrived late in 2006. Gayl and others had, in fact, pushed for the production of hundreds of MRAPs in use in Iraq. Just as certain, Gates couldn't be expected to know about every vehicle program in the sprawling military portfolio. He'd been on the job less than half a year when his military adviser at the time, Lt. Gen. Peter Chiarelli, called his attention to our story about the success that Marines in Anbar province had been having with MRAPs. Did I mention that the wars in Iraq and Afghanistan were going badly, too? Gates had a lot on his plate. Gates notes his book - as we have time and time again - that our story prompted him to push for more MRAPs. There's no reason to doubt that's true. And it's just as true that those MRAPs wouldn't have been in Iraq if it hadn't been for Gayl, et al, pushing for the early shipments. What the MRAP program needed to evolve from a niche truck for troops clearing roads to the workhorse for carrying them to war was a high-profile kick in the pants from somebody like Gates. Walk near his old office today, and you'll see Gates' official portrait. In it, Gates leans against his desk. A model of an MRAP rests on top. Gayl's on much firmer footing in writing that nobody at a high level was held to account for delays in fielding the trucks. His Marine Corps superiors sat on an urgent need request in 2005 resulting in delays that cost countless lives. The Army, too, knew about the Humvee's vulnerability to IEDs since at least the early 1990s. Those who blew the whistle on delays, Gayl writes, watched as their "careers, including mine, were subsequently destroyed by Marine Corps leaders at Gates' Pentagon." Gates was "duty-bound to get to the bottom of the MRAP delay and ensure accountability to prevent 'business as usual' practices, while protecting those who challenge them. He did neither," Gayl writes. In Duty, Gates writes that the "villains were the largely nameless and faceless people - and their leaders - who were wed to their old plans, programs and thinking and refused to change their ways
pile-cc
Let l = 81 - 79. Suppose -4*p = l*i - 172, 5*i + 4*p - 6*p - 406 = 0. Find the second derivative of -18*h**3 + 54*h**3 + 98*h - i*h wrt h. 216*h Let x(y) be the second derivative of -24 + 0*y**4 + 8*y**3 + 3*y + 0*y**2 - 71/20*y**5. Find the second derivative of x(r) wrt r. -426*r Let l(d) be the first derivative of -951*d**4/4 - 3*d**3 + 95*d - 2087. What is the third derivative of l(f) wrt f? -5706 Find the third derivative of -16*m**5 + 6959929*m**3 - 6959905*m**3 - 3*m**4 + 2*m**4 - m + 2258 + m**2 wrt m. -960*m**2 - 24*m + 144 Let a = 89 - 86. Let q be -1*(5/2 - a)*8. Find the second derivative of -2*m**q - 2*m**4 - 36*m + 0*m**4 - 12*m wrt m. -48*m**2 What is the derivative of 2621*k**3 + 4602 - 12*k + 12*k + 39*k**2 - 39*k**2 wrt k? 7863*k**2 Let t = 268 + -228. Differentiate 45*a + t*a + 15*a - 22 - 8*a with respect to a. 92 Let x(v) = -2*v**2 + 49*v + 2. Let p be x(24). What is the first derivative of -p*q**4 - 118 + 15*q**4 - 29*q**4 + 39 wrt q? -160*q**3 Let b be (5/(-10)*3)/(3/(-90)). Find the first derivative of -b*t + 67 + 106 + 117 - 10 - 91 wrt t. -45 What is the derivative of 2889 + 5*t**3 + t + 951 +
dm_mathematics
Angela Davis@ENRON 10/30/2000 06:56 AM To: Sara Shackleton/HOU/ECT@ECT cc: Subject: Re: Enron/Hawaii I Actually, I can't. I just checked my calendar and I have a meeting at 10:00. How about before then? Angela D. Davis Enron North America Corp. 1400 Smith, Suite 3842
enron_emails
*280 MOTION TO QUASH In her first assignment of error, Dillon contends the trial court erred in denying her motion to quash which alleged an illegal stop and arrest. She claims La.R.S. 32:361.1 is unconstitutional, and thus, the stop, search, and eventual arrest based on that statute are illegal. La.R.S. 32:361.1(B) states: Except as provided by R.S. 32:361.1(C), no person may operate a motor vehicle with any object or material placed on or affixed to the front windshield or to front side windows of the vehicle so as to obstruct or reduce the driver's clear view through the front windshield or front side windows, nor place on or affix to the front windshield or the front side windows of a motor vehicle, any transparent material if the material alters the color or reduces the light transmission of the windshield or front side windows. In State v. Gamberella, 633 So.2d 595, 601 (La.App. 1 Cir.1993), writ denied, 94-0200 (La. 6/24/94); 640 So.2d 1341, the court explained: Statutes are presumed to be valid; whenever possible, the constitutionality of a statute should be upheld. State v. Brenner, 486 So.2d 101 (La.1986). Because a state statute is presumed constitutional, the party challenging the statute bears the burden of proving its unconstitutionality. State v. Griffin, 495 So.2d 1306 (La.1986). Attacks on the constitutionality of a statute may be made by two methods. The statute itself can be challenged, or the statute's application to a particular defendant can be the basis of the attack. In the case sub judice, Dillon challenges the statute itself as well as its application to her. She claims this statute is constitutionally illegal for a number of reasons. First, she claims Louisiana does not have a legitimate state interest in regulating the degree of window tinting on cars. She also argues that the law relies upon the visual acuity of the enforcer, and its accuracy is subject to environmental variables, making it a constitutionally unacceptable method of enforcement. She avers the human eye is incapable of determining the degree of tint of any vehicle. Dillon further argues the regulatory scheme of the tint law among the states is dissimilar and, thereby, violates the commerce clause of the United States Constitution
freelaw
====== clhodapp One nice thing that this release does that isn't explicitly mentioned in the release notes is fix matches on instances of tagged types. Previously, the pattern match desugarer assumed that all instances of the tagged type were equal, which meant that the first case where one was used would always match. ------ virtualwhys Heh, Scala point release, will last about another 10 minutes on HN front page O_o Were it Haskell related, well, could be up on HN for days ;-) Maybe Dotty will bring some excitement back to Scala, these days it's just bashed upon endlessly, which is unfortunate. Personally _I love Scala_ , warts and all, it's a wonderful language that often draws criticism without admitting any of its myriad strengths. ~~~ tormeh The one thing I would like is for all functions to be pure by default and we could have something like "impure def" for functions with side-effects and functions that take mutable objects as arguments. It's basically my only complaint about the core language. Well, I would also like iota and defer from Go, but that's minor. ~~~ dpratt Enforcing pureness on the function might be difficult w.r.t. things like IO, due to Java interop, and frankly that's one of the strengths of the platform. Inferring loose immutability constraints on a function would be interesting. You could implement it in the compiler, perhaps something like an annotation on a method that declares all inputs must consist of only final/immutable values, enforced all the way down the chain. This is more of a JVM gripe, but as long as we're talking about Go, I'd _love_ to see actual VM-level coroutine support. It'd make async code in Scala a lot easier to both author and debug. ~~~ tormeh Well, you could just assume that all non-Scala code is impure. Actually, thinking about it, why not just make it illegal to modify arguments, full stop? It's perhaps the worst software practice I can think of. I think Oracle is going to wait a long time until they add that to Java, and it's not going into
hackernews
Coronary arteriography is very essential for evaluating the state of the coronary arteries. It is used to assess the need for bypass surgery and angioplasty. It is also used subsequently for evaluating the success of these procedures on patients. A commercially viable system, called CARDIAC ASSIST, will be developed to provide the image processing, analysis and planning support for the health- care provider in real time. The system will be developed based on three major tasks. 1) The development and parallel
nih_exporter
Aging and sequential resistance exercise bout effects on housekeeping gene messenger RNA expression in human skeletal muscle. The purpose of this study was to investigate how age and 1 week of conventional resistance exercise affects commonly used housekeeping gene (HKG) messenger RNAs (mRNAs) in skeletal muscle. Ten college-aged (18-25 years) and 10 older (60-76 years) men completed 3 lower-body resistance exercise bouts on Monday, Wednesday, and Friday, and muscle samples were obtained
pubmed_abstracts
Quantitative real-time RT-PCR ----------------------------- TaqMan probes and primers for *VIM* (P/N: Hs00185584_m1: Applied Biosystems) were assay-on-demand gene expression products. All reactions were performed in duplicate, and a negative control lacking cDNA was included. We followed the manufacturer's protocol for PCR conditions. Stem-loop RT-PCR (TaqMan MicroRNA Assays; P/N: 002284 for miR-138; Applied Biosystems) was used to quantitate miRNAs according to the earlier published conditions ([@b23-ijo-41-03-0805]). To normalize the data for quantification of *VIM* mRNA and the miRNAs, we used *human GUSB* (P/N: Hs99999908_m1; Applied Biosystems) and *RNU6B* (P/N: 001973; Applied Biosystems), respectively, and we used the ΔΔCt method to calculate the fold-change. As a control RNA, we used Premium total-RNA from normal human kidney (AM 7976; Applied Biosystems). Mature miRNA and siRNA transfection ----------------------------------- As described elsewhere ([@b23-ijo-41-03-0805]), the RCC cell lines were transfected with Lipofectamine™ RNAiMAX transfection reagent (Invitrogen, Carlsbad, CA, USA) and Opti-MEM™ (Invitrogen) with 10 nM mature miRNA molecules. Pre-miR™ (Applied Biosystems) and negative-control miRNA (Applied Biosystems) were used in the gain-of-function experiments, whereas *VIM* siRNA (Cat nos. SASI\_ Hs01_00044033 and SASI_HS01_00044036, Sigma-Aldrich, St. Louis, MO, USA) and negative control siRNA (D-001810-10; Thermo Fisher Scientific, Waltham, MA, USA) were used in the loss-of-function experiments. Cells were seeded in 10-cm dishes for protein extraction (8×10^5^ cells per dish), 6-well plates for wound healing assays (20×10^4^ cells per well), in 24-well plates for the mRNA extraction and Matrigel invasion assays (5×10^4^ cells per well) and in 96-well plates for the XTT assays (3,000 cells per well). Cell morphology --------------- Cells were transfected with *miR-138* and si-*
pubmed_central
X = np.array([[0,0], [0,1], [1,0], [1,1]]) Y = np.array([[0], [0], [0], [1]]) input = Input(shape=(2,)) output = Dense(1, activation='sigmoid')(input) model = keras.Model(input, output) model.compile(keras.optimizers.Adam(1e0), 'binary_crossentropy', metrics=['acc']) model.fit(X, Y, epochs=10, batch_size=4, verbose=1) which produces Epoch 1/10 4/4 [==============================] - 0s 52ms/step - loss: 0.7503 - acc: 0.7500 Epoch 2/10 4/4 [==============================] - 0s 817us/step - loss: 0.5142 - acc: 0.7500 Epoch 3/10 4/4 [==============================] - 0s 732us/step - loss: 0.4353 - acc: 0.7500 Epoch 4/10 4/4 [==============================] - 0s 694us/step - loss: 0.3413 - acc: 1.0000 Epoch 5/10 4/4 [==============================] - 0s 633us/step - loss: 0.2817 - acc: 1.0000 Epoch 6/10 4/4 [==============================] - 0s 679us/step - loss: 0.2299 - acc: 1.0000 Epoch 7/10 4/4 [==============================] - 0s 672us/step - loss: 0.1769 - acc: 1.0000 Epoch 8/10 4/4 [==============================] - 0s 721us/step - loss: 0.1412 - acc: 1.0000 Epoch 9/10 4/4 [==============================] - 0s 694us/step - loss: 0.1193 - acc: 1.0000 Epoch 10/10 4/4 [==============================] - 0s 716us/step - loss: 0.1015 - acc: 1.0000 ...so yes, you can Also note you calculated marginal probabilities, here you want them conditioned on the input variables to
stackexchange
High voltage tolerant input/output pads also have ESD protection circuits that must not operate within the normal operating range of the high voltage signals. In the past, a bipolar device, e.g. a thick field-oxide (TFO) npn device, has been used since such a bipolar device is a good dissipation element to protect against electrostatic discharges and since the voltage at which the TFO begins to conduct current is above the normal operating range of applied signals but below the potential at which damage occurs in the internal circuitry. Prior art FIG. 1 is a partial block diagram, partial schematic diagram of a TFO npn device. In FIG. 1, the TFO npn device 3 provides ESD protection by a well known phenomenon known as bipolar snapback. During bipolar snapback, a parasitic bipolar device formed by a first n+ diffusion 8 coupled to the bondpad 20 (collector) and a second n+ diffusion 7 coupled to the chip V.sub.ss 45 (emitter), where the two diffusions are separated by a TFO 6, can conduct large amounts of ESD discharge current by means of a self-biased mechanism. The self-biasing results from avalanche-breakdown at the collector/base (i.e. n+ pad to p-substrate) diffusion where avalanche-generated electron-hole pairs are created. The holes generated from this effect (I.sub.SUB) migrate through the substrate 4 and its associated resistance (labeled R.sub.SUB) towards the emitter and P+ top-substrate contact. When the product of I.sub.SUB .times.R.sub.SUB &gt;0.7V the base-emitter junction (i.e. n+ V.sub.ss to p-substrate) of the TFO npn device 3 will forward bias, thereby turning the device on. The particular collector-to-emitter voltage where this effect occurs is known as V.sub.T1. Thereafter the collector-to-emitter voltage decreases as the current increases, "snapping back" from V.sub.T1. Later, the trend reverses, causing the collector-to-emitter voltage to rise as the current also rises. Eventually, the bipolar transistor fails at another particular collector-to-emitter voltage V.sub.T2. The destructive failure current threshold associated with V.sub.T2 is I.sub.T2, beyond which, the TFO npn device 3 is permanently damaged
uspto_backgrounds
Ana Belén Álvaro Ana Belén Álvaro Bascuñana (born April 24, 1969) is a former Spanish basketball player, representing Spain from 1988 to 2002 and winning a gold medal at the 1993 European Championship. At club level, she won the 1993 FIBA European Champions Cup and 6 Liga Femenina titles. Club career After playing in her childhood club at Mollet del Vallès, she went to Hospitalet to play for Mecalux in 1984, thus making her debut in Liga Femenina at 15. After Mecalux resigned its position in the top tier, she played for Natural Cusí in nearby El Masnou, where she spent two seasons. As one of the most promising young players of her time, she got transferred to the Caja Toledo - BEX Banco Exterior project, with other young Spanish prospects in order to prepare for the 1992 Summer Olympics. After the Olympic tournament, she won back-to-back leagues with Dorna Godella and Pool Getafe. With Dorna Godella she went to win the 1992-93 FIBA European Champions Cup. She had another successful spell at French club Union Sportive Valenciennes Olympic, where she won one French league, one French cup and became runner-up of the 2000-2001 Euroleague. National team She made her debut with Spain women's national basketball team at the age of 19. She played with the senior team for 14 years, from 1988 to 2002, with a total of 204 caps and 8.5 PPG. She participated in the 1992 Barcelona Olympics, 2 World Championships and in three European Championships: 9th 1985 FIBA Europe Under-16 Championship for Women (youth) 12th 1986 FIBA Europe Under-18 Championship for Women (youth) 6th 1988 FIBA Europe Under-18 Championship for Women (youth) 5th 1989 FIBA Under-19 World Championship for Women (youth) 5th 1992 Summer Olympics 1993 Eurobasket 8th 1994 World Championship 9th 1995 Eurobasket 5th 1997 Eurobasket 5th 1998 World Championship Coaching career She became assistant coach in the French club St. Amaund Leseau in 2003. Back in Spain she continued her coaching career in clubs of the Valencian Community, including her old club Dorna Godella
wikipedia_en
Consider the third level of dynamics. We should find the probability distribution $c(\xi)$ of the fluctuating control parameter $\xi$. This distribution is normalized, $N[\xi]=1$, where $$N[\xi]=\int c(\xi)d\xi.$$ The entropy of the joint probability distribution of $E$, $\beta$, and $\xi$ is determined by analogy with the entropy associated with a superstatistical subsystem \[cf. Eq. \]: $$\label{totalEntropy} S[E,\beta,\xi]=S[\xi]+\int S[E,\beta](\xi)c(\xi)d\xi,$$ where $$\label{controlParameterDistributionEntropy} S[\xi]=-\int c(\xi)\ln c(\xi)d\xi$$ is the entropy associated with the control parameter distribution $c(\xi)$, and $S[E,\beta](\xi)$ is given by Eq. . We may impose a set of $m$ additional constraints by analogy with Eqs.  and : $$\label{thirdLevelConstraintsVector} K[\xi]=K,$$ where $$K[\xi]=\int k(\xi)c(\xi)d\xi,$$ and $k(\xi)=[k_1(\xi),\ldots,k_m(\xi)]$ and $K=(K_1,\ldots,K_m)$ are $m$-dimensional vectors specifying, respectively, the form and values of the constraints. Each $K_i$ is the mean of $k_i(\xi)$ over the fluctuating $\xi$. The Lagrange function is $$L_3(\nu_3,\kappa)=S[E,\beta,\xi]-(\nu_3-1)N[\xi]-\kappa\cdot K[\xi],$$ where we have defined an $m$-dimensional vector Lagrange multiplier $\kappa=(\kappa_1,\ldots,\kappa_m)$, where each $\kappa_i$ is the Lagrange multiplier corresponding to the constraint $K_i[\xi]=K_i$. The condition $\delta L_3=0$ yields the control parameter distribution $$\label{controlParameterDistribution} c(\xi,\kappa)=\frac{Y(\xi)}{X(\kappa)}\exp[-\kappa\cdot k(\xi)+\mu(\xi)\cdot M(\xi)],$$ where the partition function is $$X(\kappa)=\int Y(\xi)\exp[-\kappa\cdot k
arxiv
/* * Copyright 2011 Martin Grotzke * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an &quot;AS IS&quot; BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package de.javakaffee.web.msm; import static org.testng.Assert.assertEquals; import java.util.concurrent.ExecutionException; import java.util.concurrent.ExecutorService; import java.util.concurrent.Executors; import org.testng.annotations.AfterMethod; import org.testng.annotations.BeforeMethod; import org.testng.annotations.Test; /** * Unit test for {@link MemcachedBackupSession}. * * @author @author <a href="mailto:martin.grotzke@javakaffee.de">Martin Grotzke</a> */ public class MemcachedBackupSessionTest { private MemcachedBackupSession cut; private ExecutorService executor; private ExecutorService alternateExecutor; @BeforeMethod public void beforeMethod() { cut = new MemcachedBackupSession(); executor = Executors.newCachedThreadPool(); alternateExecutor = Executors.newCachedThreadPool(); } @AfterMethod public void afterMethod() { executor.shutdown(); alternateExecutor.shutdown(); } @Test public void testRefCount() throws InterruptedException, ExecutionException { assertEquals(cut.getRefCount(), 0); cut.registerReference(); assertEquals(cut.getRefCount(), 1); assertEquals(cut.getRefCount(), 1); cut.releaseReference(); assertEquals(cut.getRefCount(), 0);
github
Over 100 people remain trapped in New Bern, a town on the Neuse River which has been hit hard by rain and flooding. "Nobody expected this," a rescued resident, Tom Ballance, told The Weather Channel. "We were fools." An emergency curfew remains in place in New Bern as rescuers continue to try and access trapped people. The storm was giant when it made landfall: hurricane-force winds extended outward up to 80 miles, and tropical-storm-force winds extended nearly 200 miles from the storm's center. Shayanne Gal/Business Insider "Landfall of a hurricane is never the end of the event," Weather Channel meteorologist and hurricane expert Rick Knabb said on Friday. "Slow-moving Florence is not even close to being done with the coast." Footage from North Carolina shows massive flooding and high winds These images, recorded by a camera maintained by the HurricaneTracker.com website in New Bern, North Carolina, showed the dramatic progress of flooding on Thursday and Friday. Other photos and videos shared on social media also showed dangerous conditions in North Carolina. Although Florence's wind speed means it is now a tropical storm, the NHC has consistently warned that the storm is no less dangerous because the wind speed is lower. The biggest threats come from the rain and floods. REUTERS/Jonathan Drake Branches crashed into this home (below) in Wilmington, North Carolina while three people were inside. One man there was critically injured and taken away on a stretcher. Mark Wilson/Getty Images The wet and windy conditions were less of a problem for this pair of dolphins seen swimming nearby. Tweet Embed: //twitter.com/mims/statuses/1040608518171250688?ref_src=twsrc%5Etfw WATCH: An unexpected sight just after Hurricane Florence made landfall near Wilmington, NC Friday morning. Dolphins were swimming in the rising water near the shore. pic.twitter.com/iTTMGYgyiS But local deer were forced to swim through the floodwater as well. Tweet Embed: //twitter.com/mims/statuses/1040942767877312518?ref_src=twsrc%5Etfw Heard of deer swimming in flood water in Jacksonville,NC! This is real,
pile-cc
Which is the smallest value? (a) 1/10 (b) -1/4 (c) 2 (d) 6738 (e) -1/6 b What is the fifth biggest value in 1/4, 90/17, -1, -3/4, 1/6? -1 What is the third biggest value in 2, -3/5, 3, 0.0523861? 0.0523861 Which is the second smallest value? (a) 2/3 (b) -2 (c) 20813 (d) 37 a Which is the fourth smallest value? (a) 5 (b) -0.2 (c) 420/11 (d) 2/7 (e) 2 (f) 1 (g) 0.4 f What is the fifth biggest value in 0.5, -4, 0.024718, -1/4, 5, 18? -1/4 What is the sixth smallest value in 228.6, -4, -2/21, -1/14, 8, 9? 228.6 Which is the smallest value? (a) -1028830 (b) -2/13 (c) -0.3 (d) 1.4 a What is the second smallest value in -5, -198833, 3, -0.0624? -5 What is the fifth biggest value in -1, 0.5, -2, -0.3, 52/77, -231? -2 Which is the fourth biggest value? (a) 2 (b) -4 (c) -0.1 (d) 13990.6 (e) 1/3 c What is the fifth biggest value in 5, 1.4, 4, 1/3, -0.3, 1.5, -23? 1/3 What is the fifth biggest value in -952, -12, -0.12, -0.3, 0.1, -3? -12 What is the biggest value in 6, -40, 1, 567, -0.2? 567 Which is the third smallest value? (a) -2/7 (b
dm_mathematics
Attached is a paper describing the proposed methodology for pricing the "Bankruptcy Swaps" the Credit Markets group is launching next week. The methodology is intentionally simplistic - the emphasis has been on providing transparent models to give prices in a quick, easy-to-understand manner, rather than create any new "rocket science". Could one or all of you please review the paper, and give feedback on the approach and advice on the areas
enron_emails
No. 10-7420 TRON MANUEL LITTLEJOHN, Petitioner - Appellant, v. CECILIA R. REYNOLDS, Warden, Respondent - Appellee. Appeal from the United States District Court for the District of South Carolina, at Aiken. Terry L. Wooten, District Judge. (1:09-cv-01718-TLW) Submitted: April 26, 2011 Decided: May 23, 2011 Before NIEMEYER and AGEE, Circuit Judges, and HAMILTON, Senior Circuit Judge. Affirmed by unpublished per curiam opinion. Tron Manuel Littlejohn, Appellant Pro Se. Donald John Zelenka, Deputy Assistant Attorney General, Samuel Creighton Waters, Assistant Attorney General, Columbia, South Carolina, for Appellee. Unpublished opinions are not binding precedent in this circuit. PER CURIAM: Tron Manuel Littlejohn appeals the district court’s order accepting the recommendation of the magistrate judge and denying relief on his 28 U.S.C. § 2254 (2006) petition. ∗ On appeal, we confine our review to the issues raised in the informal brief. See 4th Cir. R. 34(b). Because Littlejohn’s informal brief does not challenge the bases for the district court’s dismissal of twenty-one of his claims, Littlejohn has forfeited appellate review of those claims. With regard to Littlejohn’s claim that counsel rendered ineffective assistance by failing to object to an in-court identification (the only claim properly before the court), Littlejohn fails to show any error in the district court’s denial of relief. Accordingly, we affirm that claim for the reasons stated by the district court. Littlejohn v. Reynolds, No. 1:09-cv-01718-TLW (D.S.C. Sept. 16, 2010). We deny Littlejohn’s motion for a transcript at
freelaw
Facebook twitter apps can just scrape twitter for your most recent status update -- if that's the case, they don't even need your twitter password to get updates. (I don't know how that twitter->facebook app works, but given your situation, that's what I'd guess. So there isn't anything Twitter could do to stop it.) ~~~ mahmud No need to scrape: [http://twitter.com/<USERNAME>?format=json](http://twitter.com/<USERNAME>?format=json) ------ ivankirigin I don't understand what is wrong with editing the application settings: <http://www.facebook.com/editapps.php> What magic did you expect to happen to make this right? Should twitter's facebook app have disabled itself? I think that is correct behavior for deactivating an account. On a similar note, you could control the apps on twitter with this tool: <http://twitter.com/account/connections> [unless you've given out your password, then you need to change it] ~~~ hyyypr Which I did, but the fact is that I didn't realize this before a stranger updated my FB status, which could have had some consequences if it happened on a "professional" FB account. ~~~ ivankirigin If you had a professional facebook account, you would also have a better grip over your profiles on other services. You would never abandon a username associated with your online identity. Much more important to professionals is the risk of phishing or breaking into accounts. ------ anamax This is a problem with the twitter api, which makes it easy to use twitter screen names, which are not permanent, and not twitter user ids, which are permanent. ~~~ hyyypr This pretty much answers all other questions. It's not like I was using some third party facebook app, afaik it's twitter's official FB app. And they should definitly use some kind of UID. ------ pmjordan I suspect the facebook app just subscribes to a bunch of giant search feeds for all users and then dishes out any new messages. There's no authentication involved in twitter searches so neither Facebook, nor the author of the FB
hackernews
The long-term goal of this study is to understand the role in pathogenesis and immunity of an environmentally-regulated, in vivo expressed surface polysaccharide of Staphylococcus aureus chemically characterized as poly-N-succinyl-beta-1-6 glucosamine (PNSG). PNSG has previously been determined to be the protective capsular polysaccharide/adhesin (PS/A) antigen of Staphylococcus epidermidis, raising the possibility that PNSG could be used as a "
nih_exporter
Unprecedented advances in the natural sciences and in medical technology bring many moral issues unknown to previous generations. Very often in their medical practice physicians face problems in which the basic role is played by moral commitment. In this context, a set of qualitatively new questions emerges: Should we continue medical treatment when the patient asks that it be discontinued? Must we preserve the life of the irreversibly comatose patients? How to assess moral aspects of various forms of donating organs for transplants in evolving social-
pubmed_abstracts
This study provides a comprehensive description of the distribution of major malaria vector species in Uganda, reporting data from 48 of 121 administrative districts. *Anopheles gambiae* (*s.s.*) was the dominant endophilic vector across the majority of sites in Uganda with *An. funestus* and *An. arabiensis* generally observed at lower densities. *Plasmodium falciparum* infection rates of 5.5% in *An. gambiae* (*s.s.*) and 4.0% in *An. funestus* (*s.s.*) were higher than previously observed in Uganda \[[@CR38]\]. This may partially reflect differences in the assay methods used in this work compared to the previous study, ELISA *vs* Taqman, with the latter having increased sensitivity \[[@CR25]\]. Whilst the Prokopak-based collection method precludes the estimation of entomological inoculation rates, these data suggest high rates of transmission across Uganda despite widespread conventional LLIN use \[[@CR19], [@CR39]\]. These data corroborate early work which has revealed a relatively limited impact of both DDT and pyrethroid based vector control on epidemiological indices \[[@CR14], [@CR15]\] thereby highlighting the need for alternative vector control technologies. Three additional potential vector species were detected: *An. parensis*, *An. pharoensis* and *An. rufipes*. All three species have been recorded in Uganda and in parts of their range they have been found to be sporozoite-positive \[[@CR40]\]. It is possible that these species may be malaria vectors in some of the study locations, and whilst the single specimen of *An. pharoensis* was positive for *P. falciparum* DNA, these species were captured at very low densities in our indoor-collections. It is possible that these species might have a role in the maintenance of residual transmission and in the transmission of filarial and viral infections \[[@CR40]\]. Three known pyrethroid resistance-associated variants were widely distributed across the country. The knockdown resistance mutations (*Vgsc*-1014F/S) were near or at fixation in *An. gambiae* (*s.s.*) populations as expected from earlier studies \[[@CR6], [@CR11], [@CR41], [@CR42]\]. The presence of the Vgsc-1014F mutation has been reported sporadically in the region \[[@CR41], [@CR43]\] and despite evidence that it may confer higher rates of
pubmed_central
Q: Can I set a single thread's priority above 15 for a normal priority process? I have a data acquisition application running on Windows 7, using VC2010 in C++. One thread is a heartbeat which sends out a change every .2 seconds to keep-alive some hardware which has a timeout of about .9 seconds. Typically the heartbeat call takes 10-20ms and the thread spends the rest of the time sleeping. Occasionally however there will be a delay of 1-2 seconds and the hardware will shut down momentarily. The heartbeat thread is running at THREAD_PRIORITY_TIME_CRITICAL which is 15 for a normal priority process. My other threads are running at normal priority, although I use a DLL to control some other hardware and have noticed with Process Explorer that it starts several threads running at level 15. I can't track down the source of the slow down but other theads in my application are seeing the same kind of delays when this happens. I have made several optimizations to the heartbeat code even though it is quite simple, but the occasional failures are still happening. Now I wonder if I can increase the priority of this thread beyond 15 without specifying REALTIME_PRIORITY_CLASS for the entire process. If not, are there any downsides I should be aware of to using REALTIME_PRIORITY_CLASS? (Other than this heartbeat thread, the rest of the application doesn't have real-time timing needs.) (Or does anyone have any ideas about how to track down these slowdowns...not sure if the source could be in my app or somewhere else on the system). Update: So I hadn't actually tried passing 31 into my AfxBeginThread call and turns out it ignores that value and sets the thread to normal priority instead of the 15 that I get with THREAD_PRIORITY_TIME_CRITICAL. Update: Turns out running the Disk Defragmenter is a good way to cause lots of thread delays. Even running the process at REALTIME_PRIORITY_CLASS and the heartbeat thread at THREAD_PRIORITY_TIME_CRITICAL (level 31) doesn't seem to help. Next thing to try is calling AvSetMmThreadCharacteristics("Pro Audio") Update: Scheduling heartbeat thread as "Pro Audio" does work to increase the thread's priority beyond 15 (Base=1, Dynamic=
stackexchange
Gas flowmeters are valuable components of physical and biological systems that require measurement of gas flows for performance monitoring and process control. Gas flow measurement becomes challenging when flowrates are within the low-range regime (0.25 mL/min to 5,000 mL/min). In addition to flowrate, another challenge is the reactivity of gas-vapor components with contact elements in a flowmeter. Gas-vapor systems may be corrosive and non-corrosive. The invention is a solution to the limitations of currently available gas flowmeter systems such as mass flowmeters, rotameters (variable area meters), and other IR-based bubble-through gas flowmeters, as applied to low-flowrate gas systems. A coriolis-type mass flowmeter relies on the vibrations of a tube system to measure the mass flowrate, which is then divided by the fluid density. Fluid density is significantly affected by temperature, pressure and gas composition. Rotameters measures flowrate by passing a gas stream into a variable cross-section area. A floating object is inserted in this flow tunnel to indicate flowrate level against a pre-calibrated graduation. Rotameters are not easily adaptable for electronic signal processing. Finally, a “bubble-through” type gas flowmeter works by passing the gas line through a liquid column; the bubble formation is correlated to gas volume. A bubble-through gas flowmeter utilizes a non-contact sensing mechanism. The detection unit, which is the gas bubble, passes through a detection region and vents out of the liquid column. Although a bubble-through design is the simplest setup that addresses the difficulty at low-flowrate regime, the bubble column of currently available bubble-through gas flowmeters is prone to significant back-flow volume due to pressure head. This effect results in a non-trivial alteration to the kinetics of gas flow. Thus, there is a need for a bubble-through setup that can address the effects of back-flow volume through proper design of the region where gas enters and bubbles form. The sensing mechanism must also include a signaling setup that is not easily disturbed by extraneous effects such as changes in ambient light or vibrations/sound. A reliable signal system for this setup is an infrared beam, which is disturbed or “broken” only when a gas bubble passes through the infrared beam path. A gas flowmeter of this type may also be amenable to field applications, i.e., it may be portable to maximize its utility. There are several potential
uspto_backgrounds
Heiney was born in South Pasadena, California, and grew up in South Pasadena and San Gabriel. He served in the Merchant Marine and the Navy during World War II and afterward earned a B.A. from University of Redlands. He joined the faculty of University of California, Irvine in 1965 and later co-founded UCI's writing program. One of his students was Michael Chabon, who later won the Pulitzer Prize for Fiction. His distinguished colleagues included novelist Oakley Hall, Victorian scholar and poet Robert Peters, and literary critic Hillis Miller. Publishers Weekly has described his work as "known for...metaphysics, hints of magic and the absurd, and a profound preoccupation with the duality of human nature," and the Chicago Tribune Book World called him "a gifted craftsman, a meticulous writer whose powers as a story teller are as compelling as the sexual tensions he imagines." His novel The Balloonist, published in 1976 by Farrar, Straus and Giroux, tells the story of a polar expedition, similar to and possibly inspired by the real journey made by S. A. Andrée. The Balloonist was nominated for the National Book Award in 1977. It was reissued in 2011 by the UK publisher Galileo and in 2012 in the United States by The Overlook Press, with a foreword by Philip Pullman and positive reviews from The Guardian, The Wall Street Journal, and The Washington Post. The Overlook Press also published his previously-unpublished novel The Carp Castle in 2013, and reissued his novel Screenplay (1982) in 2014, reviewed as "the mature work of a writer whose ability to juggle multi-layered concepts seems effortless." The reissued Screenplay was also positively reviewed by OC Weekly and Kirkus Reviews. He received a 1982 Award in Literature from the American Academy of Arts and Sciences for his entire body of work. In 1985 his novel Tenth earned him a Special Achievement Award from the PEN Los Angeles Center. Heiney died in 1993, at age 71, at his home in Newport Beach, California. Bibliography Fiction by MacDonald Harris: 1961 Private Demons. Boston: Houghton Mifflin Co. 1964 Mortal Leap. New York: W. W. Norton & Co. Also London: Michael Joseph Ltd, 1964. 1968
wikipedia_en
On the other hand, [(\[e:qit0\])]{} allows us to apply Lemma \[l:normals\] to get that $$\begin{aligned} \label{e:piax} \Pi_{\text{axis}} ({{\bf{n}}}(q_i)) \to 0 \, . \end{aligned}$$ This contradicts [(\[e:nablaud\])]{}, completing the proof. Proofs of the main results -------------------------- We will prove one direction of Theorem \[t:mcvxRn\] in the following proposition. \[p:mcvxRn\] If $u$ is $C^2$, then 1. There is exactly one singular time $T$ (where the flow becomes extinct). 2. The singular set ${{\mathcal{S}}}$ is a $k$-dimensional closed connected embedded $C^1$ submanifold of singularities where the blowup is a cylinder $\SS^{n-k} \times \RR^k$ at each point. Moreover, ${{\mathcal{S}}}$ is tangent to the $\RR^k$ factor in (2). Fix a point $p \in {{\mathcal{S}}}$. Let $k$ be the dimension of the kernel of ${{\text {Hess}}}_u (p)$, so $p$ is cylindrical of type $\SS^{n-k} \times \RR^k$. Let ${{\mathcal{S}}}_p$ be the component of ${{\mathcal{S}}}$ containing $p$; note that each point in ${{\mathcal{S}}}_p$ must also be cylindrical of type $\SS^{n-k} \times \RR^k$ by Lemma \[l:strata\]. Given $q \in {{\mathcal{S}}}_p$, let $K^{\perp}_q$ be the $k$-dimensional kernel of ${{\text {Hess}}}_u (q)$. Proposition \[p:key\] implies that each point $q$ in ${{\mathcal{S}}}_p$ has an $\epsilon_q > 0$ so that - $B_{\epsilon_q}(q) \cap {{\mathcal{S}}}$ is given as a $C^1$ graph over $K^{\perp}_q$. - $u$ is constant on this graph. Since ${{\mathcal{S}}}_p$ is compact and connected, it follows that ${{\mathcal{S}}}_p$ is a closed connected embedded
arxiv
/* Threshhold for punting to the bytewise iterator. */ #define TOO_SMALL(LEN) ((LEN) < LBLOCKSIZE) #if LONG_MAX == 2147483647L #define DETECTNULL(X) (((X) - 0x01010101) & ~(X) & 0x80808080) #else #if LONG_MAX == 9223372036854775807L /* Nonzero if X (a long int) contains a NULL byte. */ #define DETECTNULL(X) (((X) - 0x0101010101010101) & ~(X) & 0x8080808080808080) #else #error long int is not a 32bit or 64bit type. #endif #endif #ifndef DETECTNULL #error long int is not a 32bit or 64bit byte #endif /* DETECTCHAR returns nonzero if (long)X contains the byte used to fill (long)MASK. */ #define DETECTCHAR(X,MASK) (DETECTNULL(X ^ MASK)) LIBC_ROM_TEXT_SECTION _LONG_CALL_ void * _memchr(const void * src_void , int c , size_t length) { const unsigned char *src = (const unsigned char *) src_void; unsigned char d = c; #if !defined(PREFER_SIZE_OVER_SPEED) unsigned long *asrc; unsigned long mask; u32 i; while (UNALIGNED (src)) { if (!length--) return NULL; if (*src == d) return (void *) src; src++; } if (!TOO_SMALL (length)) { /* If we get this far, we know that length is large and src is word-aligned. */ /* The fast code reads the source one word at a time and only performs the bytewise search on word-sized segments if they contain the search character, which is detected by XORing the word-sized segment with a word-sized block of the search character and then detecting for the presence of NUL in the
github
Onto the good stuff: the glasses receive IR light pulses timed with the movie to black out the appropriate eye with the appropriate frame and producing a 3D effect. With the use of IR Investigator the team grabbed said timings; it was then simply a matter of building their own IR projector, and bringing it back to the theater to annoy the crowd setting it up for their 3D home cinema. This is not how a lot of 3d theaters work. The ones I’ve been in use polarized lenses, and two polarized images on the screen at once so each eye only sees the image it’s supposed to. There are theaters giving out 3d shutter glasses? That’s awesome. I read this site everyday and here people whinning about how “thats obnoxious” or your a jerk or many others….get over it the whole point of this site is to be creative i say have fun with what you create unless it does physical harm to someone If I paid for my family of four to see Avatar, costing at least $50 for tix alone, and some punk wants to screw with our day out, he’s gonna have a problem. Changing the TV at the bar is one thing, wasting my money is another. anon says “I read this site everyday and here people whinning about how “thats obnoxious” or your a jerk or many others….get over it the whole point of this site is to be creative i say have fun with what you create unless it does physical harm to someone” How about I come to your house and cut the electricity, phone, and water off for a laugh. To make it creative, I’ll do it with an autonomous robot. Nobody is physically harmed, so I trust you’ll take it in good humor. Yea, this is pretty weak. There would seem to be a lot of holes with this technique anyway. Also, avatar (and many movies like it) use polarized glasses the two lenses where one is polarized for the vertical and one for the horizontal. The light going out onto the screen is also polarized such that there will essentially two images displayed on the screen where one image gets blocked out for each eye. @David S: They’re not horizontally and vertically polarised, they use circular polarisers. You can test this by wearing a pair of glasses and looking at another pair (both facing same direction) and rotating the
pile-cc
-24650.9 What is -623 + 2? -621 Work out 0.16 - -0.77. 0.93 What is -0.4 plus 592.48? 592.08 Sum 7094 and 1. 7095 -5 + -166.2717 -171.2717 Total of 22 and -0.46396. 21.53604 What is 9.5 - 0.25? 9.25 What is the difference between 27575.4 and 5? 27570.4 What is 59 plus -6042.1? -5983.1 Subtract -5 from 1037807.5. 1037812.5 Work out 16 + -1.2. 14.8 What is 171 less than 7.1? -163.9 Total of 0.2782 and 6. 6.2782 -0.3+836 835.7 Add -0.1 and -3.3494. -3.4494 What is 2 - -223? 225 -1.38 + 10.6 9.22 What is 9.1 less than -1636.8? -1645.9 Sum 1.1 and -1.53. -0.43 What is -5 take away 0.7733? -5.7733 Add together 1.527 and 0.15. 1.677 Work out -4 + 264. 260 What is -0.2 take away -78888? 78887.8 Calculate -279 - 1297. -1576 Calculate -11 - 10. -21 Total of -782012.6 and -0.5. -782013.1 What is -3 less than -1453? -1450 What is -0.52845 less than 0.2? 0.72845 Put together -1.752 and 0.22. -1.532 What is 356 take away 0.88? 355.12 What is 232.7 - -11? 243.7 What is 0 minus 18.1983? -18.1983 Add -0.092 and 70. 69.908 -6495.3
dm_mathematics
This e-mail is never sent unsolicited. If you wish to unsubscribe from this or any other Forexnews.com newsletters, please click here . Any opinions expressed by representatives of Forexnews.com or its affiliates as to the commentary, market information, and future direction of prices of specific currencies reflect the views of the individual analyst, and do not necessarily represent the views of Forexnews.com or its affiliates in any way. In no event shall Forex
enron_emails
199 Neb. 288 STATE of Nebraska, Appellee, v. Walter A. CAREY, Appellant. No. 41286. Supreme Court of Nebraska. October 12, 1977. *142 Padley & Dudden, P. C., Ogallala, for appellant. Paul L. Douglas, Atty. Gen., Steven C. Smith, Asst. Atty. Gen., Lincoln, for appellee. Heard before WHITE, C. J., and SPENCER, BOSLAUGH, McCOWN, CLINTON, BRODKEY and WHITE, JJ. McCOWN, Justice. The defendant, William Anthony Carey, pleaded guilty to a charge of unlawful possession of marijuana with intent to distribute. The District Court imposed a sentence of not less than 1 year nor more than 2 years imprisonment and a fine of $2,000. In this appeal the defendant contends that the sentence was excessive; that it was based upon erroneous information in the presentence report; and that he was therefore denied due process. At the time of his arrest the defendant was the driver of a pickup camper which contained 43 burlap bags of marijuana weighing 2,086 pounds. The defendant knew that the truck contained marijuana and told officers he was to receive $5,000 for driving. Following his guilty plea and the filing of a presentence investigation report, the defendant was sentenced to 1 to 2 years imprisonment and fined $2,000. The statutory penalty provides for a sentence of not less than 1 year and not more than 5 years imprisonment, or a fine of not more than $2,000, or both. The defendant was 26 years old, single, and a resident of Vermont at the time of his arrest. He worked as a carpenter during the summer months and took odd jobs during the off-season. The presentence investigation report discloses one prior conviction for petit theft in California in 1972, for which the defendant was placed on 6 months probation. The focus of defendant's argument on appeal rests on the assertion that the presentence investigation report erroneously failed to mention that the California conviction had been set aside after successful completion of probation. There is nothing in the record to substantiate the claim that the California conviction was, in fact, set aside. There is nothing in the record to indicate that the defendant or his counsel asked to inspect the presentence investigation report, nor that a request was ever denied. The record does establish that the sentencing court treated the offense now before us
freelaw
Also if there are a lot of bloggers out there, chances are greater that "someone" would feel that they have so little to to lose and lots to win from breaking a controversial story, even though some company would sue them. ------ mynameishere _What's left is local news, investigative journalism and intelligent coverage of national news. Perhaps 2% of the cost of a typical paper._ I'd like to see a citation on that "2%". I don't believe it. What will we miss? Obviously, the basic reportage function of newspapers is what we'll miss--the boring research, interviewing, verifying, and so on. This is something that bloggers cannot reproduce without a news infrastructure and being on salary. ~~~ lliiffee 2% seems to me laughably low. I would think it is something like 50%. It might take up 2% of the _space_ of a paper, but the reasons we will miss it is because no one else appears ready to do it. Why not? Expense. ~~~ Alex3917 How many investigative journalists do you think the NY Times employs? IIRC they have about 800 employees, so maybe 100 tops. Let's say the cost of employing them is 20M per year. Last year the NYT made 6 million on revenue of 748 million, which means their costs must be 742 million. This makes Seth's numbers roughly correct. ~~~ lliiffee You seriously believe that 98% of the NYT expenses are consumed by movie reviews, the crossword guy, and David Brooks? Anyway, the fact is, Seth pulled that number out of his ass, and that is irresponsibly sloppy at best. (And, ironically, an excellent example of the kind of thing editors and fact- checkers are for...) ~~~ anamax > You seriously believe that 98% of the NYT expenses are consumed by movie > reviews, the crossword guy, and David Brooks? You're forgetting the actual paper and the cost of distributing it. We know the revenues (roughly) and that the expenses are about the same. How many actual investigative reporters do you think that the NYT has? Multiply that number by your guess of their average burdended cost and compare that to the total expenses.
hackernews
This proposal is a competitive renewal of the Penn State STEP-UP program initially funded in 2007. The program is designed to provide short-term experience and training in biomedical research for undergraduate students from racial/ethnic-underrepresented groups, and for students from disadvantaged backgrounds. W. Brian Reeves, M.D., Vice Chair of Medicine and Chief of Nephrology at Penn State will serve as Program Director. Progress under the current award period has been excellent. 127 students have matric
nih_exporter
Cimiracemosides I-P, new 9,19-cyclolanostane triterpene glycosides from Cimicifuga racemosa. Eight new and 13 known triterpene glycosides, along with the known compounds glyceryl-1-palmitate and daucosterol-6'-linoleate were isolated from the roots/rhizomes of Cimicifuga racemosa. The new compounds, designated as cimiracemos
pubmed_abstracts
Accurate modelling requires apoptotic proteins in parental but mostly NFκB-driven anti-apoptotic proteins in conditioned cells {#Sec5} ------------------------------------------------------------------------------------------------------------------------------ Acquired TRAIL resistance during conditioning of cells to IZI1551 caused severe modifications in expression levels of anti-apoptotic proteins XIAP and FLIP, as well as in the activation status of pro-survival proteins NFκB, IκBα, AKT, ERK, and pro-apoptotic protein PARP over time (1, 2, 4, 8, 16, 24, 48 h) (Fig. [3a](#Fig3){ref-type="fig"} and Figure [S2a](#MOESM1){ref-type="media"} and the heatmap Figure [S2b](#MOESM1){ref-type="media"} which includes the values of the untreated and treated samples). We analyzed the differences in normalized protein expression in parental and IZI1551-conditioned A375 cells for each time point. The largest overall differences between the profiles of parental and IZI1551-conditioned A375 cells were observed at the three different time points that might be referred to as: initiation phase (4 h), execution phase (16 h), and adaption phase (48 h) (Fig. [3b](#Fig3){ref-type="fig"}). To analyze the network modularity within these three phases, we performed systematic in silico protein knock-out experiments in the parental and IZI1551-conditioned cells at 4, 16 and 48 h. We used the Akaike Information Criterion (AIC) as selection criteria to verify if the selective removal of each individual node can be compensated by the network. Based on this analysis mostly pro-apoptotic proteins were shown to play an essential role in the execution and adaption phase of parental cells in response to IZI1551 treatment. In contrast, pro-apoptotic proteins only played a minor role in IZI1551-treated conditioned cells, because right from the initiation phase and through the execution and adaptation phases NFκB-dependent anti-apoptotic proteins were shown to be the most indispensable for accurate modelling of the system (Fig. [3c](#Fig3){ref-type="fig"}).Fig. 3Accurate modelling requires apoptotic proteins in parental but mostly NFκB-driven anti-apoptotic proteins in conditioned cells. **a** The expression pattern of AKT, ERK, FLIP, XIAP, IκBα, NFκB(p65), and
pubmed_central
Tem alguma forma de Pegar o caminho completo para importar um Arquivo csv? Como descrito no título da minha dúvida, gostaria de saber se tem alguma forma de pegar como parametro o caminho ate um arquivo csv, no caso eu preciso desse caminho para importar automaticamente o arquivo. Minha tentativa de fazer isso é essa. form <%= form.file_field :file %> Esse input que estou usando para pegar o arquivo e o simbolo :file como parametro para retornar o caminho. users_controller def create @user = User.new(user_params) binding.pry require 'csv' CSV.foreach(@user.file, col_sep: ',').with_index do |l, i| unless (indice == 0) User.create!(name: l[0], email: l[1], address: l[2]) end end respond_to do |format| if @user.save format.html { redirect_to @user, notice: 'User was successfully created.' } format.json { render :show, status: :created, location: @user } else format.html { render :new } format.json { render json: @user.errors, status: :unprocessable_entity } end end end Usei o Binding.pry para mostrar o resultado que esta me retornando, e também o motivo da minha pergunta. Quando vou verificar os parametros que veio para o user_params é mostrado esse tipo de informação: <ActionController::Parameters {"file"=>#<ActionDispatch::Http::UploadedFile:0xb454db98 @tempfile=#<Tempfile:/tmp/RackMultipart20190710-3063-2ah7nt.csv>, @original_filename="users.csv", @content_type="text/csv", @headers="Content-Disposition: form-data; name=\"user[file]\"; filename=\"users.csv\"\r\nContent-Type: text/csv\r\
stackexchange
FIG. 1 is a table diagram showing an example binary table. When binarization is performed on the absolute value “2” of a coefficient value L using the binary table shown in FIG. 1, for example, such absolute value is converted into binary data “01”. Also, when performing binarization on the absolute value “3” of a coefficient value L, such absolute value is converted into binary data “001”. When arithmetic coding is performed on binary data derived from the absolute value of a coefficient value L, a probability table is switched to another one based on a transition diagram shown in FIG. 2, depending on the absolute value of the previous coefficient value L. FIG. 2 is a transition diagram showing a method of switching between probability tables according to an existing technique. First, arithmetic coding is performed on the absolute value of the first coefficient value L, using a probability table 1. For the subsequent coefficient values L, a probability table is switched to another one depending on the previous coefficient value L of each of such coefficient values L. More specifically, a probability table 2 is used when the absolute value of the previous coefficient value L is 1, a probability table 3 is used when the absolute value of the previous coefficient value L is 2, and a probability table 4 is used when the absolute value of the previous coefficient value L is 3 or a larger value. In this case, a determination on a probability table depends entirely on the absolute value of the previous coefficient value L. Also, each of the probability tables itself is updated depending on whether binary data inputted is “0” or “1”. In this case, each update is performed in a manner in which the probability of “0” is increased when input binary data is “0” and the probability of “1” is increased when input binary data is “1”. Accordingly, adaptations are made on the probability tables so that they will suit the frequency at which binary data is inputted. In the above existing technique, a probability table is switched to another one depending on the absolute value of the previous coefficient value L. Generally, the absolute values of coefficients on which frequency transformation has been performed tend to be larger in the direction from higher frequency components toward lower frequency components. Thus, there is a problem with the use of the aforementioned existing technique that the switching of a probability table cannot support an increase trend of coefficients in a case where the absolute value of a certain coefficient is smaller than that of the previous coefficient, leading to reduced coding efficiency. In
uspto_backgrounds
By July 2000, Black had pleaded guilty to providing loans to college players in Florida, was facing SEC fraud charges, was being sued by several of his players for the money they lost in Cash 4 Titles, and had been indicted in Detroit on money laundering and drug charges related to his involvement in Bryant’s investments in Cash 4 Titles. Black ended up pleading guilty to money laundering. Consequences Black was sentenced to 82 months in prison on the money laundering charges in Michigan. In Florida, he fought the SEC charges but was found guilty of fraud, and obstruction of justice. Four years later, while in jail, Black represented himself in an appeal of a civil suit the SEC had filed against him and won. The court found there was no evidence that Black knew anything about the Cash 4 Titles scheme. In June 2001, the television program “America’s Most Wanted” aired a segment on Dean Parker, a fugitive in the Detroit cocaine case. Black agreed to be interviewed for the program in prison, talking about his relationship with Parker and how he had allowed Parker to use Black's leased jet to escape to Jamaica. Parker committed suicide a few months later as police were about to arrest him in East St. Louis, Illinois. In October 2004, while still in prison, Black sued Vince Carter for $14 million in unpaid agent fees. Black won and to avoid a protracted appeal, settled for $10 million with the Carter family. Black was released from federal prison in December 2007, and from a halfway house in May 2008. Clients Represented Terry Allen (New England Patriots) Reidel Anthony (Tampa Bay Buccaneers) Carl Banks (New York Giants) Eric Bienemy (Philadelphia Eagles) Robert Brooks (Green Bay Packers) Vince Carter (NBA; Toronto Raptors) Mark Clayton (Miami Dolphins) Germane Crowell (Detroit Lions) Rae Carruth (Carolina Panthers) Antuan Edwards (Green Bay Packers) Troy Edwards (Pittsburgh Steelers) Kevin Faulk (New England Patriots) Harold Green (Atlanta Falcons) Jacquez Green (Tampa Bay Buccaneers) Deon Figures (Jacksonville Jaguars) Ike Hilliard (New York Giants) Jevon Kearse (Philadelphia Eagles) Ed McDaniel (Minnesota Vikings
wikipedia_en
C. W. Helstrom and C.-L. Ho, “Analysis of avalanche diode receivers by saddlepoint integration,” [*IEEE Trans. on Communications*]{}, vol. 40, no. 8, pp. 1327–1338, August 1992. A. O. Hero, “Timing estimation for a filtered Poisson process in Gaussian noise,” [*IEEE Trans. Inform. Theory*]{}, vol. 37, no. 1, pp. 92–106, January 1991. C. L. Ho, “Calculating the performance of optical communication systems with modal noise by saddlepoint method,” [*IEEE Journal of Lightwave Technology*]{}, vol. 13, no. 9, pp. 1820–1825, September 1995. T. T. Kadota, “Approximately optimum detection of deterministic signals in Gaussian and compound Poisson noise,” [*IEEE Trans. Inform. Theory*]{}, vol. 34, no. 6, pp. 1517–1527, November 1988. T. Kailath, “A general likelihood–ratio formula for random signals in Gaussian noise,” [*IEEE Trans. Inform. Theory*]{}, vol. IT–15, no. 3, pp. 350–361, May 1969. J. E. Mazo and J. Salz, “On optical data communication via direct detection of light pulses,” [*Bell Systems Technical Journal*]{}, vol. 55, no. 3, pp. 347–369, March 1976. N. A. Olsson, “Lightwave systems with optical amplifiers,” [*IEEE Journal of Lightwave Technology*]{}, vol. 7, no. 7, pp. 1071–1081, July 1989. S. D. Personick, “New results on avalanche multiplication statistics with application to optical detection” [*Bell Systems Technical Journal*]{}, vol. 50, pp. 167–189, January 1971. S. D. Personick, “Statistics of a general class of avalanche detectors with application to optical communication,” [*Bell Systems Technical Journal*]{}, vol. 50, no. 10, pp. 3075–3095, December 1971. S. D. Personick, “Optical detectors and receivers
arxiv
```sig game.askForString("") ``` ## Concept: Names Saving user input in variables is useful, as it allows the values the user inputs into the game to continue to exist - rather than just being ignored. ## Example #1: Storing Your Data 1. Review the code below 2. Identify what **type** of value is returned by ``||game:game.askForString||`` 3. Identify what ``"Give me data!"`` in the function call does ```typescript let userInput: string = game.askForString("Give me data!"); ``` The ``||game:game.askForString||`` function prompts the user to input a string with the phrase "Give me data!", and then the response the user gives is stored in the variable ``||variables:userInput||`` as a ``||text:string||``. ## Student Task #1: Say my Name 1. Start with the code from example #1 2. Change the **prompt** to ask the user for their name (``"What is your name?"``) 3. After asking for their name, use ``||game:game.splash||`` to display their name 4. Add a short message to the ``||game:game.splash||`` to appear before the name (``"hello, "``) 5. **Challenge:** ``||game:ask||`` the user for their favorite color. Respond with a ``||game:game.splash||`` that repeats their favorite color back to them ## Example #2: Immediate Responses ![Animation of user inputting favorite food](/static/courses/csintro3/intro/ask-for-food.gif) 1. Review the code below 2. Identify how the response from ``||game:game.askForString||`` is used 3. Identify whether the response from the user is available to be used again after the ``||game:game.splash||`` ```typescript game.splash("I like " + game.askForString("What food do you like?")); ``` In the above example, the response of ``||game:game.askForString||`` is used **without** storing the result in
github
Guitar Guy » The éminence grise of boardwalk performers is inline-skate-dancing, electric-guitar-playing Harry Perry. Thirty-six years after he first hit the beach, the practicing Sikh is still waiting for his big rock and roll break. Why? “To be a great guitarist you need to play in excess of eight, ten hours a day.” Fantasy: For Live Nation to put out his record and book him on tour. “When I was onstage in Wisconsin once and 30,000 people were cheering, I felt the g-force. I want that.” Peanut gallery: “People in Venice take my picture. In West Hollywood they’re more into the music.” The Walker » For 30 years drivers passing the Silver Lake Reservoir have seen a bare-chested pedestrian, face buried in a newspaper, oblivious to all but the fine print before him. Long walks are a routine from childhood that continued after Marc Abrams set up a medical practice in the San Fernando Valley. Although he’s now retired, he still makes daily 20-mile treks. Why? “I get fresh air, exercise, and sun.” Media diet: “I read the New York Times, L.A. Times, Wall Street Journal, Daily News, and USA Today. Plus about 20 magazines a month, mostly about history and classical music.” Peanut gallery: “Sometimes people say, ‘You must walk because you have a heart condition.’ If I had a heart condition, I’d be dead.” Hula Hoop Lady » Jean Hooper, whose name coincidentally matches her favorite pastime, isn’t shy about her regimen: twirling for up to two hours several days a week outside her condominium on busy Venice Boulevard. If she isn’t waving to motorists, it’s because she’s too caught up in the show tunes playing on her headphones. Hooper brought hula hoops (even the ancient Greeks loved them) into fitness classes at L.A. schools nine years ago, then kept on hooping after she returned to work as a hairstylist. Secret weapon: “I use a Wave Hoop by Maui Toys. It’s got water in it. Those Wham-O hoops with air in them? I am not able to do those at all.” Peanut gallery: “I get gifts—pieces of fruit, a calendar, a
pile-cc
3/38 Calculate prob of sequence qajj when four letters picked without replacement from {u: 2, m: 1, j: 2, a: 2, q: 1}. 1/420 Three letters picked without replacement from {p: 11, f: 2, d: 2, h: 1}. What is prob of sequence dhd? 1/1680 Two letters picked without replacement from {i: 1, e: 1, s: 3}. What is prob of sequence ss? 3/10 What is prob of sequence io when two letters picked without replacement from iyiyyyoitxyyii? 5/182 Two letters picked without replacement from bpbhbbhhp. Give prob of sequence hp. 1/12 Three letters picked without replacement from {i: 1, w: 1, j: 1, d: 1, x: 5}. Give prob of sequence dwi. 1/504 What is prob of sequence rr when two letters picked without replacement from rsssr? 1/10 Three letters picked without replacement from yyytyyyzyyyztzvv. Give prob of sequence ttv. 1/840 What is prob of sequence cs when two letters picked without replacement from {s: 1, t: 2, o: 3, c: 4, w: 3, x: 4}? 1/68 Four letters picked without replacement from {c: 1, o: 3, j: 1}. What is prob of sequence cjoo? 1/20 Calculate prob of sequence lvd when three letters picked without replacement from {l: 1, v: 4, u: 7, d: 1}. 1/429 Four letters picked without replacement from pgioj. Give prob of sequence giij. 0 Two letters picked without replacement from ceeeeceeceeeee. What is prob of sequence ee? 55/91 Calculate prob of sequence tiit when four letters picked without replacement from tttieoioto. 1/210 What is prob of sequence cr when two letters picked without replacement from rccccccrccccmc? 11/91 What is prob of sequence gfkf when four letters picked without replacement from kfggggff? 1/70 Two letters picked without replacement from {q: 18, p: 2}. Give prob of sequence pq. 9/95
dm_mathematics
From: <STouchstone@natsource.com> To: Holst, Keith </O=ENRON/OU=NA/CN=RECIPIENTS/CN=KHOLST> Date: Wednesday, December 12, 2001 5:23:31 GMT Subject: <<Enron price sheet2.pdf>> --------- Inline attachment follows --------- From: <jdeleo@tfsbrokers.com> To:
enron_emails
On December 7, 1943, Jesse executed a grant deed of the property here involved to himself and plaintiff Carrie, as his wife, as joint tenants. On January 13, 1948, Carrie Patterson executed a quitclaim deed thereto to Jesse, reciting a consideration of $10. This is the instrument plaintiff seeks to cancel in this action on the ground of fraud and undue influence. On January 17, 1948, Jesse executed his will in which he devised to defendant Rubie Lee Davis the real property here in question, and for some reason devised therein the adjoining property held by himself and Carrie as joint tenants, to his "wife, Carrie Patterson." It appears that the quitclaim deed here in question and the will were prepared by an attorney and that both Jesse and Carrie were present in his office when their provisions were being discussed and that both parties appeared before a notary public where the quitclaim deed was acknowledged. Plaintiff claims she did not understand the nature of the transaction, that the will was not mentioned, and also claimed that the blanks in the quitclaim deed were not filled in when she signed it; that she did not understand that she was divesting herself of her interest in the property; that she was not familiar with the practices *156 of the business world and did not have the benefit of independent legal advice. As opposed to this claim, the attorney testified that in plaintiff's presence Jesse stated that he wanted to prepare a deed and a will; that he brought plaintiff with him because she had an interest in the matter; that he and his wife Carrie owned this property and that they had agreed that she would transfer her interest in it to him and he would leave a will by which he would devise the property to his niece because he was under obligation to her; that plaintiff participated in the conversation and approved the transfer and offered no objection; that subsequently the deed and will were executed and returned to him and the deed was then recorded; that in 1950, when he learned of Jesse's death, he wrote to plaintiff and Mrs. Davis notifying them of his possession of the will; that these ladies came to his office together and that they discussed the terms of the will and no objection was voiced by either; that plaintiff wanted to know the procedure necessary to obtain title to the house in which she then resided; that he advised her it would come to her under the terms of the joint tenancy deed and she never made any claim to the property here in question. Rubie Lee Davis testified that her uncle practically raised her; that he was unable
freelaw
~~~ monstrado I work regularly with Hadoop users and I there is rarely talks of "shortcomings" of Hadoop. More often than not, rather than Hadoop not giving enough to the user, the user is not giving enough to Hadoop. Once users start understanding the power of the platform, they start to do some really incredible things. Hive and Pig are just applications that interface with Hadoop, although they could be classified as "SQL" or "PigLatin" to Java Map/Reduce, they are also more than that. For example, Hive has a shared metastore so you can treat Hadoop kind of like a shared RDBMS that allows you to map schemas after the data has already been transformed. Most the people I talk to, especially on here, are still pretty wet behind the ears when it comes to Hadoop. It's a very daunting technology, but I can assure you there is nothing but progress and innovation in the community. ~~~ dkhenry I agree that this is a new and daunting technology, but its also technically grounded at this point. I think the problems people have with it ( extensive knowledge needed to use it ) will be fixed iteravly, but will need a major change to the platform. ------ jandrewrogers Linux and Hadoop are not analogous. I've used Linux since the pre-1.0 days and been building distributed computing and database platforms since before Hadoop existed; I've seen both of these ecosystems grow from the inside. Linux won the server wars because it rapidly iterated and evolved in a time when a free UNIX-like operating system was desperately needed. In the early days of the Internet, no operating system was ready to be a heavy duty Internet server OS. FreeBSD, started from a stronger position than Linux but development was carefully controlled by academic purists. Eric Raymond's "The Cathedral and The Bazaar" was about these two communities. Operating systems, like Linux, tend toward natural monopolies. It is extraordinarily expensive to build a competitor. Linux was the most agile and rapidly evolving competitor in an early market that was poorly served by incumbents. While it took the rest of the world years to notice, it was obvious by
hackernews
Minority researchers in the field of nursing are limited. The purpose of this proposal is to advance the principal investigator's (PI) competence in the research process, including research methodology, statistical and epidemiological methods, data management and analysis. The experience gained through this training grant will develop the PI into an independent investigator. Formal educational experiences will be predominately in the area of epidemiology and behavioral research methodologies. The PI will engage in research initiatives that will serve as a vehicle to further develop the necessary research skills
nih_exporter
Leukocyte-reduced blood components in transfusion medicine. Current indications and prospects for the future. Transfusion medicine is a rapidly evolving specialty, and efforts are ongoing to improve the safety and quality of blood component therapy. Leukocytes are known to be the cause of numerous adverse effects of transfusion therapy, and their removal from red cells and platelet components may be desirable in a variety of clinical settings. The various complications of transfusion that can be attributed to contaminating leukocytes and the benefits of leukocyte depletion are
pubmed_abstracts
Dietary antigens play critical roles in the development and induction of IELs. Continued feeding with the antigen-minimized diet to germ-free (GF) mice caused a gradual reduction in the numbers and cytotoxic effects of CD8αβ IELs ([@b18-ksmcb-42-313]). In SPF mice, protein-free diet supplemented with equivalent amounts of amino acid arrested the development of TCRαβ IELs after weaning ([@b26-ksmcb-42-313]). These two reports clearly demonstrated the importance of dietary proteins particularly in the development of CD8αβ IELs in GF and SPF conditions respectively. However, the effect of commensal microbiome in the development of diet induced CD8αβ IELs has not been explored. To address this issue, we deprived commensal microbiota and/or dietary antigens and examined the generation of CD8αβ IELs before or after weaning. As a result, we found that in the absence of commensal flora, the development of CD8αβ IELs specific to dietary antigens was significantly delayed. On the other hand, in the absence of dietary antigens, microbiota could induce only about 10% of the CD8αβ IELs compared to those of SPF mice, indicating that intestinal bacteria cannot substitute dietary antigens. Interestingly, delayed supplementation of microbial and dietary antigens was very inefficient for the induction of CD8αβ IELs. Taken together, these results indicate that the presence of commensal microbiota in early life is essential for the proper development of diet-induced CD8αβ IELs at later time points. MATERIALS AND METHODS ===================== Mice and diet ------------- C57BL/6 (B6) mice were purchased from Jackson Laboratory and maintained in a SPF animal facility at POSTECH. GF B6 mice were kindly provided by Drs. Andrew Macpherson (Bern Univ., Switzerland) and David Artis (Univ. Pennsylvania, USA) and maintained in sterile flexible film isolators (Class Biological Clean Ltd., USA) in GF mouse facility at the POSTECH. We regularly checked the sterility of GF mice by the absence of bacterial colonies in the culture experiment using their fecal pellets. The offspring of GF B6 mice was weaned and raised with an AF diet ad libitum, which contains ultra-filtered low molecular chemically defined elements supplemented with soybean oil containing oil-soluble vitamin A, D3, K and
pubmed_central
Q: If $\{\nabla u_j\}$ is Cauchy in $L^p(\mathbb{R}^n)$ and $\int_{B(0,1)} u_j dx = 0$, does $\{u_j\}$ converge in $L^p_{\text{loc}}(\mathbb{R}^n)$? Let $1 < p < \infty$. Let $\{u_j\}_{j=1}^\infty$ be a sequence of functions in $W^{1,p}_{\text{loc}}(\mathbb{R}^n)$ such that $\nabla u_j \in L^p(\mathbb{R}^n)$ for all $j$, $\int_{B(0,1)} u_j dx = 0$ for all $j$, $\{ \nabla u_j \}_{j= 1}^\infty$ is a Cauchy sequence in $L^p(\mathbb{R}^n)$. I would like to know whether $\{u_j\}_{j=1}^\infty$ is a Cauchy sequence in $L^p_{\text{loc}}(\mathbb{R}^n)$ (and hence convergent in $L^p_{\text{loc}}(\mathbb{R}^n)$ since this space is a Frechet space). That is, I would like to know whether it can be shown that, for any ball $B(0,r)$: $$\|u_j - u_k \|_{L^p(B(0,r))}^p \to 0 $$ as $j$ and $k$ become large. This result is claimed to be true in this paper on arXiv (see Proposition 2.1). The details of the proof are not supplied. If 2. above is replaced by the condition that $\int_{B(0,r)} u_j dx = 0$ for all $r$ and all $j$, then I can get the result by applying Poincare's inequality for a ball (see Theorem 2 in section 5.8 from Evan's PDE book), and then and using 3. However, with only the weaker condition I'm not sure how to proceed. Hints or solutions are greatly appreciated! A: The vanishing integral over the small ball is enough to get a Poincaré-type estimate. Let $B = B(0,1)$ and $\Omega = B(0,r)$. We define $$\|u\|_\star := \big|\int_B
stackexchange
Generally, semiconductor detectors of nuclear radiation operate by exploiting the fact that incident radiation, by interaction in the detector material, will create a charge pulse consisting of holes and electrons that can be separated under the influence of an electric field and the current detected by an external circuit. Because they are readily available, radiation detector materials are generally semiconductor materials such as Si or Ge with lithium introduced into the semiconductor material so that it behaves as an extrinsic semiconductor. However, these materials have less than ideal band gap widths and high dark currents making them unattractive candidates for room temperature radiation detection devices. Further, the need to keep such Si(Li) and Ge detectors cooled to cryogenic temperatures poses significant limitations on the use of these materials in many applications, particularly where portability is desired. Certain nonmetallic, crystalline solids such as mercuric iodide (Hgl2), lead iodide (Pbl2), thallium bromide (TlBr), indium iodide (Inl), thallium bromoiodide (TIBrI), mercuric bromoiodide (HgBrI), and cadmium zinc telluride (CdZnTe) are particularly useful as materials for room temperature radiation detection devices. However, for high radiation detection efficiency it is necessary to have materials that exhibit very low leakage currents (e.g., <10−7 A at electric fields of about 1000 V/cm to about 3000 V/cm) and thus, high electrical resistivity (i.e., 1/σ≧109 ohm·cm). One of the primary problems associated with nonmetallic, crystalline semiconducting materials lies in the presence of charge trapping defect sites and electrical instabilities caused by impurities in the starting material or introduced during subsequent processing. In addition, electrically active impurities may move under the influence of the applied field leading to unpredictable and variable electrical properties including high dark current and spectral distortions. The electrical resistivity of a material is a measure of its purity and defect concentration in the material and for most semiconducting material resistivities much greater than 108 ohm cm require semiconducting materials of the very highest purity and are thus, very difficult to achieve (M. Hage-Ali and P. Siffert, Semiconductors for Room Temperature Nuclear Detector Applications, 43, 245, 1995). An alternative approach to radiation detection, particularly for the detection of neutrons, is the use of a scintillator material that emits visible light when exposed to radiation. The strong interaction of neutrons with hydrogen
uspto_backgrounds
Warwick Hele Sir Warwick Hele (1568 – 15 January 1626) was an English landowner and politician who sat in the House of Commons at various times between 1597 and 1625. Origins Hele was the eldest son of John Hele (died 1608), a money-lender and MP and was a brother of John Hele (died 1605), also MP for Plympton Erle. Career He was a student of Inner Temple in 1581. In 1597 he was elected a Member of Parliament for Plymouth. He was treasurer with Gregory Sprint for maimed soldiers for Devon by 1600 and was a J.P. for Devon from about 1601. He was knighted in 1603. In 1605 he was elected an MP for Plympton Erle. He succeeded to the large local estates of his father in 1608. In 1614 he was elected MP for Plympton Erle again. He was Sheriff of Devon from 1618 to 1619. In 1621 he was re-elected MP for Plympton Erle and was again elected MP for Plympton Erle in 1625. Marriage Hele married firstly Mary Halse, daughter of John Halse of Kenedon and secondly, as her first husband, Margaret Courtenay (d.1628), eldest daughter of Sir William Courtenay (1553–1630), of Powderham in Devon, de jure 3rd Earl of Devon, by his first wife Elizabeth Manners, a daughter of Henry Manners, 2nd Earl of Rutland. Margaret survived him and remarried to Sir John Chudleigh. Her mural monument survives in St Mary Magdalene's Church, Richmond, Surrey, showing kneeling effigies of herself and her second husband Sir John Chudleigh. Death Hele died at the age of about 58. References Category:1568 births Category:1626 deaths Category:Members of the Inner Temple Category:People from Plymouth Category:High Sheriffs of Devon Category:English landowners Category:People of the Tudor period Category:People of the Stuart period Category:English MPs 1597–1598 Category:English MPs 1601 Category:English MPs 1604–1611 Category:English MPs 1614 Category:English
wikipedia_en
[ ]{} $\displaystyle \sum_{I,J\in P\atop (I,J)\text{ \rm $\varepsilon$-irregular}} \hspace*{-4mm} |I||J|\leq\varepsilon |V|^2. $ For Lemma \[28no12a\] we need the following. Consider the matrix space ${{\mathbb{R}}}^{V\times V}$, with the Frobenius norm $\|M\|={{\text{Tr}}}(M{^{\sf T}}M)^{1/2}$ for $M\in{{\mathbb{R}}}^{V\times V}$. For nonempty $I,J\subseteq V$, let $L_{I,J}$ be the $1$-dimensional subspace of ${{\mathbb{R}}}^{V\times V}$ consisting of all matrices that are constant on $I\times J$ and 0 outside $I\times J$. For any $M\in{{\mathbb{R}}}^{V\times V}$, let $M_{I,J}$ be the orthogonal projection of $M$ onto $L_{I,J}$. So the entries of $M_{I,J}$ on $I\times J$ are all equal to the average value of $M$ on $I\times J$. If $P$ is a partition of $V$, let $L_P$ be the sum of the spaces $L_{I,J}$ with $I,J\in P$, and let $M_P$ be the orthogonal projection of $M$ onto $L_P$. So $M_P=\sum_{I,J\in P}M_{I,J}$. Note that if $Q$ is a refinement of $P$, then $L_P\subseteq L_Q$, hence $\|M_P\|\leq\|M_Q\|$. [[**Lemma .**]{}\[28no12a\][ *Let $\varepsilon>0$ and $G=(V,E)$ be a graph, with adjacency matrix $A$. Then each $\varepsilon$-irregular partition $P$ has a refinement $Q$ with $|Q|\leq |P|4^{|P|}$ and $\|A_Q\|^2>\|A_P\|^2+\varepsilon^5|V|^2$.* ]{}]{} [[**Proof.**]{} ]{}Let $(I_1,J_1),\ldots,(I_n,J_n)$ be
arxiv
#ifdef XRGAME_EXPORTS CScriptProcess* sp = ai().script_engine().script_process(ScriptEngine::eScriptProcessorGame); if (sp) res += FillFrom(sp); sp = ai().script_engine().script_process(ScriptEngine::eScriptProcessorLevel); if (sp) res += FillFrom(sp); return res; #else return res; #endif } u32 CDbgScriptThreads::FillFrom(CScriptProcess* sp) { m_threads.clear(); const CScriptProcess::SCRIPT_REGISTRY &vScripts = sp->scripts(); CScriptProcess::SCRIPT_REGISTRY::const_iterator It = vScripts.begin(); for(;It!=vScripts.end(); ++It){ SScriptThread th; // th.pScript = (*It); th.lua = (*It)->lua(); th.scriptID = (*It)->thread_reference(); th.active = (*It)->active(); strcat (th.name, *(*It)->script_name()); strcat (th.process, *sp->name()); m_threads.push_back(th); } return m_threads.size(); } lua_State* CDbgScriptThreads::FindScript(int nThreadID) { xr_vector<SScriptThread>::iterator It = m_threads.begin(); for(;It!=m_threads.end();++It){ if( (*It).scriptID == nThreadID ) return (*It).lua; } return 0; } void CDbgScriptThreads::DrawThreads() { //CScriptDebugger::GetDebugger()->ClearThreads(); m_debugger->ClearThreads(); xr_vector<SScriptThread>::iterator It = m_threads.begin(); for(;It!=m_threads.end();++It){ SScriptThread th; th = *It; m_debugger->
github
“That went up like a scuba-diver’s fart.” If anyone knows the meaning of this expression or when one would use it, please let me know. We ate supper together with other travelers at our hostel in Bariloche every night and one night Tys, a Danish guy who looks like Nick Carter (from the Backstreet Boys), was reading Latin American Spanish sayings and phrases from this book he had with him. Most of them were quite funny and made sense but we couldn’t figure out this one about the scuba-diver. Would the fart go up fast? Or slow? Or unnoticed? Or not go up at all? We had such an awesome time at Moving Travel Bar Hostel that we ended up staying there for 4 nights and not 2 like we originally planned. Julia (pronounced Gulia), the hostel’s owner, is very friendly and helpful. She also makes yummy supper every night and bakes bread so that her guests have fresh bread for breakfast! Her hostel is very clean, in a good location and wifi is fast and free. She made us a ma-te to taste. (It is spelt M-A-T-E, but you say ma-te and not mate as in good day, mate.) Mate is a caffeinated herbal tea which is very popular in Argentina. There is an art to making it and a social and ritual way to drink it. The tea is drunk through a straw with a filter and is usually shared. To me it tasted what I imagine tobacco in boiled water would taste like. I preferred it with some sugar but I’m not the biggest fan of mate quite yet. Marc, Tina and I had a fun time in town yesterday after siesta. We visited Bariloche’s Cathedral and went to a local panaderia (bakery). You have to pay if you want a photo with the gorgeous St.Bernard dogs which the owners walk around town with, but Tina managed to distract the guy so that I could play with the one puppy a bit and Marc took a quick, sneaky shot. After supper we went beer tasting at Mushka, a place recommended by Julia, and had conversations about life and death and that you should not be too hard on yourself. On our way back to the hostel a cute “el perro” (dog) walked us home. Here we are, on a bus again, this time on our way
pile-cc
Let x = 29 - 30. Which is the closest to x? (a) 2 (b) 4/7 (c) -3/5 c Let w = -61/264 - 1/24. What is the nearest to w in 5, -2, -3/4? -3/4 Suppose -4*u - 4*m - 49 = -13, 3*m + 9 = 0. Let p = -6 - u. Let s = 0.7 - 5.7. Which is the closest to p? (a) s (b) 4 (c) -1/2 c Suppose 0*l + 4*l = -16. Let v = 8 - 4. Let z be 2/7 - (-22)/(-28). What is the nearest to z in 1, v, l? 1 Let u = -0.3 - 0.7. Let t = 1 + u. Let x = 0.48 + 0.02. What is the closest to t in x, -2, 0.3? 0.3 Let u = 11 - 11.4. Let z be 2/3*9/12. Which is the closest to z? (a) 3 (b) 0.4 (c) u b Let u = -57 - -54. What is the closest to -12 in u, 3, 0.5? u Suppose 2*y - 92 = -4*k + 194, -k = 0. Let f = y - 1289/9. Let n be 0 + -5 - (1 - 2). Which is the nearest to 2? (a) f (b) n (c) -2/25 c Let u = -1/540 - -5281/540. Let m = -5068862/45 + 112631. Let i = u + m. Which is the closest to 0.1? (a) i (b) 4 (c) -0.3 c Let q = -23 - -23. Let x = 0.13 + 4.87. Which is the closest to q? (a) -0.2 (b) x (c) -2/5 a Let q = 22 + -21.9. Which
dm_mathematics
Hi back! and Happy New Year too! To what do I owe this small pleasure? I'm fine in Texas, still hanging out with Phoebe and Chloe, working hard, etc. Where are you living these days? N.O.? Atlanta? Memphis? Eleuthra? St. Petersburg? Amelia Island Plantation? I've simply lost track! As for me,
enron_emails
I Fairfax first contends Lords violated the requirements of section 2034, specifying the requirements for exchange of expert witness information, and that the trial court erred in allowing him to do so. We agree. Section 2034, subdivision (1) expressly contemplates a "a mutual and simultaneous exchange by all parties of a list containing the name and address of any natural person [whose] expert opinion any party expects to offer in evidence at the trial." Subdivision (f) of section 2034 states, in pertinent part, that "[t]he exchange of expert witness information shall include either of the following: [¶] (A) A list setting forth the name and address of any person whose expert opinion that party expects to offer in evidence at trial. [¶] (B) A statement that the party does not presently intend to offer the testimony of any expert witness." Subdivision (h) of section 2034 allows any party who engaged in the initial exchange to supplement his or her list: "Within 20 days after the exchange described in subdivision (f), any party who engaged in the exchange may submit a supplemental expert witness list containing the name and address of any experts who will express an opinion on a subject to be covered by an expert designated by an adverse party to the exchange, if the party supplementing an expert witness list has not previously retained an expert to testify on that subject." As Fairfax points out, Lords' initial expert witness exchange did neither of the things required by subdivision (f) — it neither listed any experts that he "expected" to call as witnesses, nor did it state that he had no present intention to offer expert testimony. Instead, Lords expressly declined to name any retained experts in the initial exchange, while "reserv[ing] the right to designate experts in rebuttal to [Fairfax's] designations." He did list 26 treating physicians and other healthcare professionals, but none of them was designated as an "expected" witness. Lords *855 merely "reserve[d] the right to call [them] as expert witnesses." The list includes not a single name of any witness Lords "expected" to call. However, once Lords saw Fairfax's expert list, which included one retained witness, he responded with his own "rebuttal" list of two retained experts. The effect of Lords' expert designation was to delay his own list of "expected" witnesses until after he had seen the list put forth by Fairfax. Lords does not deny that this was his
freelaw
So here is our approach to something that will, hopefully, work better: \- it has a feedback system that allows you to indicate why you don't like someone (too old, too male, too boring etc) \- video starts out blurry, and becomes sharper with time (hence the name! ;)) \- you can 'like' people, allowing the other to see when you're online and request to connect with you Could this work? Comments, suggestions? ~~~ nandemo > _\- video starts out blurry, and becomes sharper with time (hence the name! > ;))_ This is a fantastic idea. However, it'd be better if that fact were known from the start. ~~~ sssparkkk The introduction-video shows the effect. However, this might not be enough to communicate this concept to visitors. Will think about how we can improve this. Thanks! ~~~ whimsy For what it's worth, I rarely watch introduction videos... if I need to watch one to use and understand the site, there's probably room for improving your site design. ------ wouterinho There's this Dutch dating site Paiq that has the same technique. When chatting with someone, their profile picture gets unblurred after talking a while and hitting their interest words (eg "watching movies"). It lets you focus less on photos and more on personality. ~~~ NiekvdMaas Funny that you mention this, BlurryPeople was founded by the same people that are running Paiq. ------ yesbabyyes Do you blur the video prior to publishing, on a server or on the receiving side? I like the idea a lot, agree on most previous points about the presentation though! ------ kmfrk I don't know exactly what "too female" and "too male" is meant to describe. At best, this just enforces sexual stereotypes, and at worst, people will use it wrongly with poorer matching results to follow. I understand that this is based on a Dutch concept, but I don't see the too fe/male evaluation working very well. Obviously, it's just beta, and new tags will show up as others disappear. ------ Goosey I
hackernews
Aktiv-Dry LLC, in collaboration with Nabi Biopharmaceuticals, proposes to develop and evaluate in animal models the needle-free respiratory delivery of fine dry powder nicotine vaccine. While syringe and needle have been a common vaccine administration mechanism, international authorities recognize a growing requirement for alternative formulations and delivery systems, especially because of inadvertent disease from needle contamination, accidental needle-sticks, thermal instability of current formulations, and compliance with vaccination regimens. Nicotine is primarily responsible for the psychoactive
nih_exporter
[Therapy of amiodarone-induced thyrotoxicosis and hypothyroidism]. Pathogenesis, diagnostic procedures and therapy of amiodarone-induced thyrotoxicosis (AIT) and hypothyroidism (AIH) are briefly discussed. Diagnosis of AIT and AIT is based on the classical signs and symptoms of thyroid dysfunction, although oligosymptomatic cases may occur, and on laboratory tests such as TSH, fT4 und fT3. In
pubmed_abstracts
RESULTS {#sec1-3} ======= Our patients, 100 males and 30 females, had been newly diagnosed with type II DM. The refraction values and fpg levels were measured twice in all patients. The average values of the initial measurements were as follows: fpg level, 415 mg/dl; average refractive value, +2.5 D (Dioptres). The average end-of-period measurements were fpg, 203 mg/dl; average refractive value, +0.75 D. The refractive values were different between the two measurements ([Table-I](#T1){ref-type="table"}). There is a statistically significant difference between after four weeks measurements with initially measurements (p\<0.05) (paired samples t test). ###### Comparison of fpg levels and refractive error and change. The process The measurements The change (%) ------------------ ------------------ ---------------- ------- FPG level 415mg/dl 203mg/dl 51.08 Refractive Error 2.5D 0.75D 60 Blurred vision 130 patients 0 100 ***Note:*** There is a statistically significant difference between after four weeks measurements with initially measurements of fasting plasma glucose (fpg) levels (p\<0.05) and there is a statistically significant relationship between changes in fpg changes with glasses ID (p\<0.05) and the disappearance of blurred vision (to be greater than 50% success rate) were statistically significant (p\<0.05). The changes were identified; end-of-period measurements average fpg levels, 51.08%; average refractive values, 60% ([Table-I](#T1){ref-type="table"}). These change (end-of-period) were statistically significant (p\<0.05) (spearman correlation). Also were detected upon all these results, the absence of any age and sex effects (p\>0.05). Another noteworthy finding is the detection of blurred vision in all the patients in the first condition that was eliminated with the use of corrective lenses after 4 weeks. The disappearance of blurred vision (to be greater than 50% success rate) were statistically significant (p\<0.05). DISCUSSION {#sec1-4} ========== Hyperglycemia is the major cause of transient refractive changes in diabetic patients. In the 19th century it was recognised that the vision of diabetic patients is influenced by
pubmed_central
Updated SSL certs and now rewrite conditions no longer working for apache2 I'm running an Ubuntu 14.04 server with Apache2 v2.4.7. Recently our site was getting errors from Chrome saying we needed to update our certs. I just completed that earlier this week, updating the SSL Certs and then restarting Apache. A couple of days layer, my client came back and mentioned that certain images and files weren't accessible anymore through their reporting server. The reporting server was using HTTPS to get to the images and files. My conf file has this, which hasn't changed since I inherited this server: <VirtualHost *:80> ServerName abc.example.com DocumentRoot /home/deployer/html/_abc/public RewriteEngine On RewriteCond %{HTTPS} off RewriteCond %{REQUEST_URI} !^/files/ RewriteCond %{REQUEST_URI} !^/images/checksheets/ RewriteRule (.*) https://%{HTTP_HOST}%{REQUEST_URI} [R,L] </VirtualHost> <VirtualHost *:443> ServerName abc.example.com DocumentRoot /home/deployer/html/_abc/public SSLEngine on SSLProtocol all -SSLv2 -SSLv3 SSLCipherSuite ECD....C3-SHA:!DSS SSLHonorCipherOrder on SSLCompression off SSLCertificateFile /etc/ssl/ssl_certificate.crt SSLCertificateKeyFile /etc/ssl/abc_staging.key SSLCertificateChainFile /etc/ssl/IntermediateCA.crt # HSTS (mod_headers is required) (15768000 seconds = 6 months) Header always set Strict-Transport-Security "max-age=15768000" <Directory /home/deployer/html/_abc/public> AllowOverride all Options FollowSymLinks # -MultiViews # Order allow,deny Require all granted </Directory> The only thing I've done on the server has literally been to update the ssl_certificate and IntermediateCAs and restart Apache, so I'm not sure
stackexchange
Decorative plaques and emblems are widely used throughout a number of industries, including the automotive and appliance fields. In the past, a colored vitreous frit was flowed into a bronze substrate and fired at 1250.degree. F. The glass-like vitreous enamel served to beautify the product and protect the decorative substrate from weathering should the plaque or emblem be exposed to the environment. Today, plastics are primarily used for producing such plaques and emblems. For example, the assignee of the present invention has since 1966 produced an emblem having a molded or cast body into which plastic is deposited. A description of such products can be found in a July-August, 1972, duPont Magazine article. Likewise, in Loew (U.S. Pat. No. 3,654,062), there is disclosed a process for injection molding a decorative Mylar facing sheet over a vinyl plastic body. The plaque is coated with a layer of protective varnish on the outer surface of the facing sheet. Gits, U.S. Pat. No. 3,246,066, is similar in that male and female molds are used to form a cavity into which a decorative foil is placed and into which a clear plastic material is injected. Prior to injecting a clear plastic material against the front face of the foil, the foil is precoated. Other molding processes, such as compression molding (either one or two shot), are also well known in the art. See for instance, U.S. Pat. Nos. 2,244,565; 2,931,119; 3,075,249; and 3,114,597. In U.S. Pat. No. 4,100,010, assigned to the same assignee, there is disclosed an improved process for producing decorative emblems. That process involves casting a plastic material onto decorative foil shapes to form a meniscus which when cured gives a lens effect to the top surface of the foil shape. A problem with that process is that the then capped substrate does not usually make up a complete decorative emblem. Normally, the capped substrate will be used as an insert to be placed inside a decorative bezel, which is most commonly a highly polished die casting, or plastic or plated plastic or some other decorative substance. In such a process, it is thus necessary to decorate the substrate, emboss the decorated substrate, if desired, apply a pressure-sensitive adhesive to the back of the substrate
uspto_backgrounds
Rather than a linear narrative, we instead see various scenes and vignettes involving the main characters, such as Julien working at a school for the blind, going to confession, muttering to himself on the streets and imagining conversations with Hitler. Pearl meanwhile learns to play the harp, looks for baby clothes for her soon-to-be-born child, lists her favorite baby names and cuts her father's hair. Chris spends nearly the entire film working out and practicing wrestling moves on trash cans, even having a frustratingly unserious match with Julien. The father recounts historical stories, lambasts Julien and Pearl for "artsy-fartsy" poetry and being "a dilettante and a slut" respectively, and pines for his dead wife. At the film's climax Pearl and Julien are at an ice-skating rink. Julien tries to sell some homemade skates to a Hasidic boy and Pearl takes to the ice despite being heavily pregnant. She trips, landing on her abdomen and causing a miscarriage. At the hospital, Julien convinces a nurse to let him hold the baby, saying it is his. She allows it, but while alone with the baby, Julien escapes home on a bus. Julien goes to his room, hides under the blankets, cradles the baby and mutters prayers. The film ends with ice-skating footage. Cast Ewen Bremner as Julien Chloë Sevigny as Pearl Werner Herzog as Father Evan Neumann as Chris Joyce Korine as Grandma Chrissy Kobylak as Chrissy Victor Varnado as Rapper Brian Fisk as Pond boy Virginia Reath as Gynecologist Alvin Law as Card-playing neighbor Tom Mullica as Magician Ricky Ashley as Hasidic boy Carmela García as Nurse Production Julien Donkey-Boy was the first American film made in accordance with the Danish filmmaking manifesto Dogme 95. It was shot in New York on MiniDV tape, the film was transferred to 16mm film before being blown up to 35mm film for the master print. Korine used this method to give the film a low-definition, grainy aesthetic. The film utilizes several cinematographic styles, including stop-motion photography, parallel cuts, and still photographs in order to tell its story. Dogme 95 K
wikipedia_en
Problem and the related analysis can be extended to any binary alphabet $\{\alpha,\beta\}$ by using $(x-\alpha)(x-\beta)$ as cost functional. Similarly, extensions to any finite alphabet $\{\alpha_1,\dots,\alpha_c\}$, with $\alpha_1<\dots<\alpha_c$ are possible by using the cost functional $\sum_{i=1}^{c-1}[(x-\alpha_i)(x-\alpha_{i+1})]_+$, where $[\cdot]_+$ denotes the positive part. In this last case, the problem is semi-algebraic, and the theory in [@las15] still applies. Such extensions will be object of future work. Complexity reduction via chordal sparsity ----------------------------------------- Proposition \[orderone\] recasts the non-convex problem into SDP, thus its solution can be computed via convex optimization. A drawback of this approach might be the dimension of the SDP problem, which increases with $n$. However, the *chordal sparsity* property reduces the complexity, as described in [@lasspa; @wak06; @fan19]. Briefly, chordal sparsity is defined as follows: if the matrices involved in an SDP problem are sparse, the sparsity pattern can be represented by an undirected graph, see, e.g., [@fan19]. If this graph is chordal, i.e., each cycle composed by at least four nodes has a chord, then the SDP problem can be decomposed into smaller sub-problems (see Theorems 1 and 2 in [@fan19]), which reduces the complexity. As illustrated in [@lasspa], chordal sparsity can be evaluated directly on the original POP as follows. Given a constrained POP with $n$ variables, such as , let us build $p$ sets $I_l\subset\{1,\dots,n\}$, $l=1,\dots,p$, with the following properties: their union is $\{1,\dots,n\}$; the variables $x_i$ contained in each constraint equation are concerned with a single $I_l$; the objective function is sum of monomials such that each monomial is concerned with a single $I_l$. We then define the running intersection property as in [@lasspa]: for every $l=1,\dots,p-1$, $I_{l+1}\cap\left(\cup_{j=1}^l I_j\right)\
arxiv
// Code generated by protoc-gen-go. // source: google.golang.org/appengine/internal/remote_api/remote_api.proto // DO NOT EDIT! /* Package remote_api is a generated protocol buffer package. It is generated from these files: google.golang.org/appengine/internal/remote_api/remote_api.proto It has these top-level messages: Request ApplicationError RpcError Response */ package remote_api import proto "github.com/golang/protobuf/proto" import fmt "fmt" import math "math" // Reference imports to suppress errors if they are not otherwise used. var _ = proto.Marshal var _ = fmt.Errorf var _ = math.Inf type RpcError_ErrorCode int32 const ( RpcError_UNKNOWN RpcError_ErrorCode = 0 RpcError_CALL_NOT_FOUND RpcError_ErrorCode = 1 RpcError_PARSE_ERROR RpcError_ErrorCode = 2 RpcError_SECURITY_VIOLATION RpcError_ErrorCode = 3 RpcError_OVER_QUOTA RpcError_ErrorCode = 4 RpcError_REQUEST_TOO_LARGE RpcError_ErrorCode = 5 RpcError_CAPABILITY_DISABLED RpcError_ErrorCode = 6 RpcError_FEATURE_DISABLED RpcError_ErrorCode = 7 RpcError_BAD_REQUEST RpcError_ErrorCode = 8 RpcError_RESPONSE_TOO_LARGE RpcError_ErrorCode = 9 RpcError_CANCELLED RpcError_ErrorCode = 10 RpcError_REPLAY_ERROR RpcError_ErrorCode = 11 RpcError_DEADLINE_EXCEEDED RpcError_ErrorCode = 12 ) var RpcError_ErrorCode_name = map[int32]string{ 0: "UNKNOWN", 1: "CALL_NOT_FOUND", 2:
github
The Harlem Globetrotters Tickets: The Harlem Globetrotters is a unique American basketball team that plays only exhibition games. The team combines athleticism, theatre and comedy into its performances. Abe Seperstein founded it in 1926 in Chicago, Illinois, as the Savoy Big Five. The team officially changed its name to The Harlem New York Globetrotters in 1927. Throughout the years the members of the team numbered over 520 players and they have played more than 20,000 exhibition games in 118 countries. The executive offices are currently in Phoenix, Arizona, and the team is owned by Shamrock Holdings. The first star of the team was Albert Runt Pullins, who was an incredible dribbler and shooter. Soon Inman Jackson, who played center and had a very good sense of attractive performances and comedy, supported him. Together they marked the two main roles in the team - the showman and the dribbler. During the first years The Harlem Globetrotters was a serious team that struggled in the World Professional Basketball Tournament. The team started with the exhibition matches in 1950. In 1977 Globetrotters celebrated the 50th season. After years of hard work, in 1982 Globetrotters became the first sports team honored with a star on Hollywood's famous Walk of Fame. In 1985 the team signed the first ever-female player - the Olympic Gold Medalist Lynette Woodard. In 2004 she was inducted into Naismith Memorial Basketball Hall of Fame. In 1994 Columbia Pictures produced a feature film focused on the team's early years. Throughout the years the players often were stars in films and TV shows. In 1997 Magic Johnson signed with The Harlem Globetrotters and it was a real feast for the true fens of the team. The team has set many records. In 2000 Michael Wild Thing Wilson set Guinness World Record with 12-hoop dunk. In 2009 Scooter Christensen set two Guinness World Records for ball spinning at NBA All-Star Weekend. In 2010 the team Harlem Globetrotters celebrated its 85th anniversary. "A great big thanks for "MyCityRocks" I had spent a lot of time hoping to find tickets @ a reasonable rate for Alicia Keys. Fortunately, I FINALLY came across your site!! Bought tickets (must admit was a little leery
pile-cc
Sort 134, 4, 42 in decreasing order. 134, 42, 4 Sort -4, 0.1, -156.62 in increasing order. -156.62, -4, 0.1 Sort 2.1, -3/4, 21, -1/9 in ascending order. -3/4, -1/9, 2.1, 21 Sort 100, 10, 238, 0. 0, 10, 100, 238 Put 27, -24, 96 in ascending order. -24, 27, 96 Sort 0.056, -3, 965. -3, 0.056, 965 Put -1017, -1, -37, -2/23, 1 in ascending order. -1017, -37, -1, -2/23, 1 Sort -365, 5, 17, -3 in increasing order. -365, -3, 5, 17 Put -21, 0.5, 0.09191 in descending order. 0.5, 0.09191, -21 Sort -5, 93, -1, -3, 5, 4. -5, -3, -1, 4, 5, 93 Put -384, -1, 0, 34 in increasing order. -384, -1, 0, 34 Put 2/9, -2, -4/59, -12, -36 in decreasing order. 2/9, -4/59, -2, -12, -36 Put -4, -1.1, -109748 in descending order. -1.1, -4, -109748 Sort 0, 1, 431733. 0, 1, 431733 Sort -230/7, -0.4, 0.07, -79 in decreasing order. 0.07, -0.4, -230/7, -79 Put -7, -128, 1, -1 in descending order. 1, -1, -7, -128 Put -3, -0.191, 2/65 in decreasing order. 2/65, -0.191, -3 Sort 0.5, 200, -0.17, 2. -0.17, 0.5, 2, 200 Sort -1, -3,
dm_mathematics
--30--DH/na* CONTACT: Industrialinfo.com, Houston Joseph Govreau, 713/783-5147 KEYWORD: TEXAS INDUSTRY KEYWORD: FOODS/BEVERAGES SOURCE: Industrialinfo.com For the best viewing of the news releases please use the following email settings: Courier 10 point. -Notice of Copyright and General Disclaimer- (c
enron_emails
Burke, J., concurred. McCOMB, J. I concur in Mr. Justice Schauer's dissenting opinion. I am aware of no type of error that is recognized by California's Constitution (art. VI, 4 1/2) as being "necessarily prejudicial" in the sense of automatically requiring or permitting reversal of a superior court judgment. Our court has no power to create a ground for automatic reversal. In cases wherein the solemn death penalty has been adjudicated--certainly no less imperatively than when other consequences are at stake--the question on appeal must always involve a conclusion of relativity based on the entire record, including the evidence. This court should not give the semblance of cheapening its function by even an implication that a reversal can be automatic. The issue is important to the defendant because his life is at stake; it is more important to the people of California because their lives are at stake every day and every night, in their jobs, in their homes, and upon the streets, unless potential killers are deterred by fear of the law. They will fear the law only in proportion to the fidelity of its enforcement. *386 For a more complete account of the reasons for action by the electorate in 1911, and the subsequent near full circle retrogression in decisional law, see People v. Modesto (1963) 59 Cal.2d 722 (dissenting opinion at p. 736 et seq. [31 Cal.Rptr. 225, 382 P.2d 33]); People v. Williams (1861) 18 Cal. 187, 194; People v. Hines (1964) 61 Cal.2d 164 (dissenting opinion at pp. 178-179 [37 Cal.Rptr. 622, 390 P.2d 398]). NOTES [fn. 1] 1. Section 7, subdivision 4, provides: "The words, 'malice' and 'maliciously' import a wish to vex, annoy, or injure another person, or an intent to do a wrongful act, established either by proof or presumption of law." [fn. 2] 2. Section 188 provides: "Such malice may be express or implied. It is express when there is manifested a deliberate intention unlawfully to take away the life of a fellow-creature. It is implied, when no considerable provocation appears, or when the circumstances attending the killing show an abandoned and malignant heart." [fn. *] *. Retired
freelaw
Guarantees, SLAs, and Hollow Promises - nkohari http://kohari.org/2009/12/07/guarantees-slas-and-hollow-promises/ ====== wgj The usefulness of an SLA is not the refund to the customer. It is the cost to the provider, which if painful enough, assures the customer that the provider has incentive to keep the service up. This blog post says, in so many words, they would rather not be bound by such incentives. (and they are seeking customers who have no such requirements.) ~~~ nkohari Sort of... the point was more that the promises are pretty hollow in the first place. We don't need financial penalties being applied to motivate us to keep our service up, at least beyond the natural loss of customers if we were to be down for an extended period of time. I think offering anything beyond that, for a service as low-cost as ours, would be lying to our customers. ~~~ wgj Agreed, and lying is never a great idea. But you also specifically noted that you do not invest in the kind of solutions that help ensure better uptime stats. And other sites that have failover and other HA techniques are not making empty promises. They are showing that they intend to try harder, and your blog post so much as admits they really do try harder (with more expensive architecture, and the willingness to be penalized on failure.) So, regardless of the icing on the cake, you seek customers who do not rely on uptime. That's a valid choice, and I mean no disrespect. I'm just calling it what it is. ~~~ nkohari I suppose you're right. We felt that it was more worthwhile to price our services lower and avoid going overboard with HA, because our application is arguably not "mission-critical". If it's down for awhile, it's bad, but no one dies and money is probably not lost (at least not a lot). The investments we do make in infrastructure are geared more towards disaster recovery, because if we went down and lost our customers' data, it _would_ be a much more critical failure on our part. ~~~ wgj Emphasize low cost then
hackernews
Develop predictive human cardiomyocyte-based all optical assay for cardiotoxicity. Cardiotoxicity is the leading cause of safety-driven withdrawal a all stages and limitation of drug compounds. The current cardiac safety paradigm nonclinical guidance ICH S7B focuses on in vitro hERG assays, which prove to be suboptimal in predicting a compound's cardiotoxicity in human. In the context of high cost and low productivity for new drug discovery, better cardiac safety evaluation becomes a significant public health issue. C
nih_exporter
The focus of this paper is caries in populations. Caries is assessed as a phenomenon and as it occurs in populations. It is observed that in recent literature the notion of causation of caries is restricted to the biological process on the tooth surface. This may be sufficient to explain caries as a phenomenon, but it is argued that a biological causation is insufficient in order to understand caries and its variation in populations. The understanding of the determinants of a population's oral health has been seriously impeded by the absence of
pubmed_abstracts
Although alcoholism often has serious emotional, economic, behavioral, physical, and social consequences for alcohol abusers and their partners, children who live with alcoholic parents often experience negative psychosocial outcomes. In general, the literature supports that COAs are more likely to develop externalizing problems such as conduct disorder, oppositional defiant disorder, delinquency, and attention deficit disorder (e.g., \[[@b21-ijerph-06-03156],[@b22-ijerph-06-03156]\]), and are at elevated risk for internalizing behaviors such as depression and anxiety \[[@b23-ijerph-06-03156],[@b25-ijerph-06-03156]\]. In addition, offspring of alcoholics drink earlier (e.g., \[[@b24-ijerph-06-03156]\]), are more likely to develop alcohol use problems \[[@b25-ijerph-06-03156]--[@b28-ijerph-06-03156]\], progress from initial alcohol use to alcohol use disorder more quickly \[[@b25-ijerph-06-03156],[@b28-ijerph-06-03156]\], and are less likely to mature out of moderate to heavy drinking \[[@b30-ijerph-06-03156]\]. Although, in general, the literature supports an elevated risk for negative psychosocial development among children with a family history of alcoholism (e.g., \[[@b31-ijerph-06-03156]\]), many children who live with an alcohol-abusing parent display normal psychosocial development (e.g., \[[@b32-ijerph-06-03156]--[@b34-ijerph-06-03156]\]). With respect to parental alcohol abuse and IPV, Nicholas and Rasmussen \[[@b33-ijerph-06-03156]\] found that when they controlled for childhood abuse and IPV, parental alcohol use did not predict reports of aggression or depression among college-student adult children of alcoholics (ACOAs). Undoubtedly, characteristics of the family environment contribute to the adjustment of COAs. Thus, the challenge for researchers is to refine the definition of risk by identifying specific mechanisms that lead to diverse outcomes among children raised by alcoholic parents. Although alcohol misuse during gestation has well-documented risk for physical and central nervous system insults that may result in cognitive, affective, growth, and morphologic sequelae \[[@b34-ijerph-06-03156]\], our theoretical explanations focus on factors relevant to alcohol-abusing couples that with intervention may be most amenable to change. 2.1.. The Effects
pubmed_central
<parent> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-parent</artifactId> <version>2.2.2.RELEASE</version> </parent> <groupId>com.xxx.api</groupId> <artifactId>my-sort</artifactId> <version>0.0.1-SNAPSHOT</version> <name>my-sort</name> <properties> <java.version>11</java.version> <kotlin.version>1.3.31</kotlin.version> <opentracing-brave.version>0.34.2</opentracing-brave.version> <reactor.version>3.3.1.RELEASE</reactor.version> <!-- testing libraries versions--> <mockk.version>1.9</mockk.version> <kotlin.junit.version>1.3.41</kotlin.junit.version> <wiremock.version>2.24.1</wiremock.version> <jacoco.version>0.8.4</jacoco.version> <spring-cloud-sleuth.version>2.1.2.RELEASE</spring-cloud-sleuth.version> <brave.version>5.6.11</brave.version> </properties> <build> <finalName>my-sort</finalName> <sourceDirectory>${project.basedir}/src/main/kotlin</sourceDirectory> <testSourceDirectory>${project.basedir}/src/test/kotlin</testSourceDirectory> <extensions> <extension> <groupId>kr.motd.maven</groupId> <artifactId>os-maven-plugin</artifactId> <version>1.6.0</version> </extension> </extensions> <plugins> <plugin> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-maven-plugin</artifactId> </plugin> <plugin> <groupId>org.jet
stackexchange
Intraocular lenses (IOLs) are used as artificial lens implants in eyes from which the natural lens has been removed. A natural lens changes its focal length by deformation, known as accommodation, to provide a focused image. An IOL does not focus in this manner. Monofocal IOLs provide focused vision at only a single distance range. If the focal length is selected to provide a sharp image for a distant object, then an object which is closer, for example at reading distance, will not be sharply focused on the retina. It is possible to sharply image closer objects by selecting a different focal length, but then distant objects would appear out of focus. Bifocal IOLs are advantageous for providing clear vision at two distance ranges. U.S. Pat. No. 5,192,318, issued Mar. 9, 1993, the disclosure of which is incorporated by reference, concerns various bifocal IOL constructions. A bifocal IOL produces two superimposed images with one image always out of focus. Not all people can select between the two images and process the focused image sufficiently to see. Prior to surgery to implant a bifocal IOL in a patient, it is desirable to assure that the patient is a good candidate for a bifocal IOL. Implantation surgery carries inherent risks to the health of the patient, as with any surgery. Additional eye surgery can also damage the eye and compromise the quality of vision after surgery. Removal of an unsatisfactory lens and replacement with a new lens subjects the patient to further risk to vision and health which may be viewed as unacceptable to both the health care professional and the patient. Thus, there is a need for an apparatus and method for testing the ability of a subject to see properly using a bifocal IOL. In addition, there is a need for an apparatus and method to compare a subject's vision through different types of IOLs. Another need in the vision care community is an apparatus and method to monitor over months or years the geometrical and refractive configuration of an eye. The apparatus and methods of the current invention address these needs. Bifocal corneas may be provided by inserting an inlay into the cornea of a patient. Simulating vision through a bifocal cornea is desirable for testing the ability of a subject to see properly using the bifocal cornea, and to test properties of an inlay prior to implantation. The apparatus and methods of the current invention address these needs. There is also a need for testing IOLs and
uspto_backgrounds
In his senior year at CVHS Hull earned First Team All-League honors, amassing over 1,000 yards total offense. In the last game beating Burbank HS, Mike had 137 yds. rushing, on 20 carries, with just 70 yds passing. He also ran the high and low hurdles, long jumped and ran the relays on the Falcon track team. At the close of his career at CVHS Hull was also the Student Body President, and held every Falcon varsity football rushing and total offense record. He was recruited by several university teams but decided to start locally at Glendale College and gain some experience in the T-formation, where he matured into a versatile fullback/halfback. He was named the offensive MVP Running Back, and All-Conference, on Glendale's Western Conference Championship Bowl team, before heading to the University of Southern California in the spring to run track as a Trojan freshman. At USC, Hull converted to full-time fullback, working himself into a starting role for the Trojans for three years, playing on two Rose Bowl teams and the 1967 USC National Championship Team. Between his sophomore year blocking for Heisman Trophy winner, Mike Garrett, and his senior year blocking for future Heisman winner OJ Simpson, Hull led the USC Rose Bowl team in rushing avg. with 6.7 yds. per carry, winning the "Roy Bullet Baker" award as the Trojans' Most Valuable back. He was also selected as the Most Valuable Player in the USC vs. UCLA game, while rushing for 147 yds on 14 carries against the Bruins. Professional career Hull was drafted in the first round of the 1968 NFL draft by the Chicago Bears, the 16th player selected. He played for the Bears for three years, suffering through the Brian Piccolo tragedy, though helping All Pro and future Hall of Famer Gale Sayers, as the lead blocker. In 1971 Hull was traded to the Washington Redskins for three players, joining coach George Allen's "Over-the-Hill-Gang". He played in 86 consecutive games with the Redskins over five NFL seasons, six NFL playoff games, the NFL Championship and the Super Bowl, where he was a Special Teams leader. Law career After seven years in the NFL, Hull started his law school education at Georgetown University Law Center in Washington, D.C., earning his
wikipedia_en
- As displacement begins (once the seventh base pair is formed with the second stator), there is an initial rise in free energy, followed by a plateau. This initial rise is a generic feature of displacement resulting from steric interference at the displacement interface, and is the subject of a forthcoming paper [@Srinivas2012]. - Later stages of displacement, after around 15 base pairs have formed between the cargo and the second stator, involve an increase in free energy of around $4\,k_{\rm B}T$. An unusual feature of the free-energy profile shown in Fig. \[fig\_d8\](b) is the increase in free energy towards the end of displacement. We attribute this to an increase in tension within the system. When the first bond between the cargo and the second stator is formed, the contact point is far away from the nucleotides that are attached to the surface (the $3^\prime$ end of the stators). It is therefore not difficult for the strands to reach each other at the contact point. By contrast, when more bonds have formed between the cargo and the second stator, the contact point is closer to the $3^\prime$ end of the stators. Eventually, the length of DNA between the contact point and the surface attachments gets so short that maintaing the structure causes considerable tension, which is free-energetically unfavourable and results in the observed rise in the profile. ![The free-energy profile of motor stepping for various strengths of attachment to the substrate, all using a stator separation of $7.1 \rm{nm}$. The profile is taken along the path illustrated in Fig \[fig\_d8\](a).[]{data-label="fig_multik"}](NEWF_multik_d829.eps){width="48.00000%"} The role of the attachment of stators to a surface can be tested by changing the spring constant of the attachment to the surface. The results of otherwise identical simulations with different spring constants are shown in Fig. \[fig\_multik\]. Increasing or decreasing the spring constant from $k = 131\,\rm{pN/nm}$ by a factor of about 4 has a very small effect on the free-energy profile. The reason is that in this range the attachment spring is fairly stiff, and the less costly way for the system to come close together is to stretch the single-stranded sections. By decreasing the spring constant by nearly two orders of magnitude, down to $k
arxiv
// For reading from/writing to the CDS archive void serialize(SerializeClosure* soc); uintx base_address() { return (uintx) _base_address; } }; //////////////////////////////////////////////////////////////////////// // // Read/Write the contents of a hashtable textual dump (created by // SymbolTable::dump and StringTable::dump). // Because the dump file may be big (hundred of MB in extreme cases), // we use mmap for fast access when reading it. // class HashtableTextDump { int _fd; const char* _base; const char* _p; const char* _end; const char* _filename; size_t _size; int _prefix_type; int _line_no; public: HashtableTextDump(const char* filename); ~HashtableTextDump(); enum { SymbolPrefix = 1 << 0, StringPrefix = 1 << 1, Unknown = 1 << 2 }; void quit(const char* err, const char* msg); inline int remain() { return (int)(_end - _p); } void corrupted(const char *p, const char *msg); inline void corrupted_if(bool cond, const char *msg) { if (cond) { corrupted(_p, msg); } } bool skip_newline(); int skip(char must_be_char); void skip_past(char c); void check_version(const char* ver); inline void get_num(char delim, int *num) { const char* p = _p; const char* end = _end; u8 n = 0; while (p < end) { char c = *p++; if ('0' <= c && c <= '9') { n = n * 10 + (c - '0'); if (n > (u8)INT_MAX) { corrupted(_p, "Num overflow"); } } else if (c
github
my engagement in conversation with issues and concerns related to my vocation as a seminary lecturer. Opinions expressed in this blog are strictly my personal views and do not represent the official position of the seminary Friday, 14 September 2007 Health and Eucharist Alex Tang gives a review on Joseph Prince's book, Health and Wholeness through the Holy Communion (Singapore: Media, 2006). One of the points highlighted is that “The Holy Communion is God’s solution to offset the decay (ageing). And even your friends will see the results. They will ask you, “Hey, why do you seem to look younger and younger? You never seem to age!”” (p.58). Hmmm....any truth? Well....since coming to STM, I have been having Holy Communion more frequently now - twice a week in the seminary chapel. Could this be the result that when I went to see the doctor last week, he was shocked to find out that I am a lecturer and not a first year student? (BTW - it happened again earlier today when I took my mother to see her doctor. The doctor asked, "Are you a student?") What is happening to the church in Singapore and Malaysia? If you want to stay young, you now have a choice: take frequent Holy Communion, or let your pastor touch your body parts and pray for you! Pick your choice.... 10 comments: One of my customer, who is working in the bookshop at Joseph Prince's church, said that the book is very good and she bought a few as gifts to friends... When i heard that, i tried hard to not rolled my eyeballs. After the hiccups with this year's application, i dont think i would want to do my theological studies in an evangelical seminary at this moment. I need too much space to breathe, space where some evangelicals, sometimes, consider over the borders. If you know what i mean :) Not too sure what u mean by "evangelical sometimes, consider over the borders" that discourage you to study at evangelical seminary at the moment?? Please enlighten. Sounded like u may consider pentecostal seminary, liberal seminary, or Roman Catholic seminaries??!!! About Me I am a Christ-follower by calling, a Lecturer in New Testament Studies and Assistant Director of Postgraduate Studies at
pile-cc
-(t + 3)**2 Suppose 5 = y - 2*y. Let d = -2 - y. Factor c**d + c - c. c**3 Let g = -174 - -179. Factor -1/3*h + 1/3*h**g + 0*h**3 + 2/3*h**2 - 2/3*h**4 + 0. h*(h - 1)**3*(h + 1)/3 Let b(z) = z**3 - 3*z**2 - z - 1 + 3*z - 3. Let f be b(3). Let 9*k**4 + 15*k**3 + k**2 + 3*k**2 + k + 5*k**2 - 2*k**f = 0. Calculate k. -1, -1/3, 0 Let m(w) be the first derivative of 1 + 0*w**3 + 0*w + 0*w**4 - 1/2*w**2 - 1/40*w**5. Let i(n) be the second derivative of m(n). Factor i(t). -3*t**2/2 Let f(w) = -w**4 + 3*w**3 + 5*w**2 + 3*w - 4. Let a be (-29)/9 + (-4)/(-18). Let l(k) = -k**3 - k**2 - k + 1. Let i(b) = a*l(b) - f(b). Solve i(y) = 0 for y. -1, 1 Let b(l) = 3*l**2 - 10*l + 9. Let a be b(1). Solve 1/4*u**a - 1/2*u + 0 = 0. 0, 2 Let f(y) be the third derivative of 1/4*y**5 - 1/24*y**4 + 0*y - 19/120*y**6 - 2*y**2 + 1/30*y**7 - 1/3*y**3 + 0. Let f(m) = 0. Calculate m. -2/7, 1 Solve -16/5*b**2 + 2*b**4 + 0 + 14/5*b**3 - 8
dm_mathematics
-----Original Message----- From: Kapoor, Sumant Sent: Tuesday, November 13, 2001 10:08 AM To: Arora, Harry Subject: Chemist Request in Delhi Hi Harry, The Chemist in Delhi (Kuber Chemist ) has requested for the phone number for New Jersey address. I presume that is required by the courier service in India. He also mentions that the medicines will take about a week
enron_emails
heat in the home was a small electric space heater and the electricity was about to be shut off. The pipes were frozen, which prevented them from having fresh water or being able to use the toilet. There was also very little food in the home. These circumstances occurred because Travis and Stacy were both unemployed and had exhausted community support options. Their only income was from Stacy’s disability check. The case plan, while requiring both Travis and Stacy to work on their communication skills, did require several things either parent could have completed without the other’s cooperation. Travis needed to complete parenting classes with Proctor, to complete a substance abuse assessment and a psychological assessment, to obtain and retain employment, to complete two weeks of GED classes in order to be eligible for food stamps, to obtain stable housing, and to visit with his children. Stacy also needed to complete the parenting classes with Proctor, complete a substance abuse assessment and a psychological assessment, obtain and retain employment or provide a medical excuse why this was not possible, obtain stable housing, and visit with the -13- Case No. 16-09-11, 12, 13 children. Although many of these objectives could have been completed as a couple, there was no requirement that this had to occur. These requirements, if met, would have allowed the children to be placed with either or both of their parents. {¶18} Travis only met with Proctor a few times and appeared for the first half of the psychological assessment. He also missed several visits. Stacy also only met with Proctor a few times and appeared for the first half of the psychological assessment. The testing she did complete was deemed invalid. Additionally, there were concerns raised concerning a possible substance abuse problem with Stacy due to her many trips to emergency rooms for pain killers and statements made by Travis that Stacy was addicted to the pain killers. She also missed several visits. Moreover, neither parent was able to obtain and retain employment nor was either parent able to obtain and retain stable housing. Although they were given substantial financial assistance in locating and obtaining an apartment, they only paid two months rent from Stacy’s disability
freelaw
No evidence at all of Russian hacking Hilary's email if you were paying attention in the last week or so other than from evidence free DNC claims. Maybe they did, sure. And maybe Saddam had WMD - believing that lie, and i did, cost us rather a lot. It would be silly to fall for it again. ------ salmo Heck, I'm impressed that enough people are running an MTA that touches incoming mail for this to be effective. It was never "easy", even in the 90s. Back then it was an issue of having a performant, secure config. But these days, it's way more complex and too much money. I wouldn't think that many people are using fetchmail + local MTA anymore, but maybe I'm wrong. I used to do it for my family, but maintaining an MTA, spam filtering, IMAP/POP, webmail, CalDAV & CardDAV is rough. And supporting folks hooking up their devices that increasingly needed to go 8 menus deep to punch in the settings for something that wasn't gmail/hotmail/outlook was just too much. And then you can't run it out of your house, unless you pay money for static IPs, or you pay for hosting and make sure you keep yourself off blocklists. Just the cost of doing it made it not worth it unless you hit economy of scale number of users. That said, sendmail did improve my M4 skills FWIW. ~~~ wtracy I recently paid for a Debian VPS instance, and when I logged in it had Exim already installed. (I think it was running by default, too, but I don't trust my memory. I uninstalled it pretty quickly.) ------ joshfraser Once again, this feels politically motivated. 1\. It's old news. 2\. They blame Russian hackers, but we rarely ever have full certainty into the true source of an attack. This is due to false flags (for example, the Germans adding some Russian comments to their code) and hackers routing their attacks via a daisy chain of compromised machines all over the world. 3\. The NSA are the worst offenders when it comes to exploiting software vulnerabilities. ~~~ strictnein This isn't some conspiracy
hackernews
This study's long-term objective is to identify effective treatments for with neck pain. Many Americans have found conventional medical treatments ineffective for this common and costly problem and are increasingly trying complementary and alternative treatments, including therapeutic massage. Despite the growing popularity of massage, its effectiveness for treating neck pain remains unclear, largely because of the poor quality of research in this area. A major deficiency of previous studies has been their use of low "doses" of massage that massage therapists consider inadequate. Unfortunately, the numbers
nih_exporter
The long-term patency rate of peripheral artery bypass grafts remains low. Several theories exist which attempt to explain the disease forming mechanisms at the disease prone distal junction of the bypass graft. Common to these theories is that abnormal hemodynamics and wall mechanics contribute to the development of disease at the junction. This study describes a means by which the hemodynamics in the end-to-side anastomosis can be altered by inserting a flow-split into the junction, the function of which is to divert the flow
pubmed_abstracts
Not everyone is happy, however. Gaming industry associations and some mental health professionals and academics have argued that, given the current state of knowledge regarding the impact of gaming on individuals, the inclusion is premature, and is likely to lead to overdiagnosis while also feeding into moral panic about on-line gaming and stigmatization of gamers. Critics making these arguments cite the APA's decision to enter 'internet gaming disorder' as a 'condition for further study', in the 2013 *Diagnostic and Statistical Manual of Mental Disorders* (DSM-5), a designation signifying that further research is required before it can be accepted as a valid diagnostic category. WHO's Pozynak points out that the inclusion of gaming disorder in ICD-11 was based on the conclusions of experts from more than 20 countries, as well as evidence of increasing internet-gaming-related treatment demand. As for concerns regarding over-diagnosis and stigmatization, Poznyak is sceptical. "The inclusion of gaming disorder in ICD-11 will facilitate appropriate diagnosis and treatment as well as the monitoring, surveillance and research required to get a clearer picture of the prevalence and impact of the condition," he says, adding that WHO is currently working with partners on the development of an evidence-based screening and diagnostic interview to support clinicians. According to Dr Charles O\'Brien, Professor of Psychiatry at the University of Pennsylvania, and chair of the APA committee that decided to include internet gaming disorder in DSM-5 under the 'condition for further study' rubric, the classification is currently under review. "There have been a lot of developments since 2013, and we have the option to change the disorder classification if we consider it appropriate," says O'Brien. Higuchi welcomes any move towards clearer diagnosis, and greater recognition of the disorder. "The ICD-11 classification will help with that," he says. He also welcomes WHO's decision to publish guidelines on physical activity for children under 5 years of age, which recommend, among other things, that children in their first year of life should have no screen time and very little in their second, while those aged 2 to 4 years, should spend no more than an hour a day in front of a screen. "It's time to set limits," Higuchi says. ![Staff at the Kurihama Medical and Addiction Centre, Kanagawa Prefecture, Japan.](BLT.19.020
pubmed_central
The Lagrangian for the motion of a particle with mass $m$ and charge $q$ in a constant magnetic field $B$ is given by $$\mathcal{L}(x,v)=\frac{m}{2}\left|v\right|^2-\frac{q}{2c}\left(v\cdot[x\times B]\right).$$ Show that rotations around the $B$-axis leave the Lagrangian invariant, where each rotation is given by $O_{\eta}:=\exp(\eta\,[B\,\times \,.]),\,\eta\in\mathbb{R}$. I can see that $\left|O_{\eta}(v)\right|^2=\left|v\right|^2$, since rotations are supposed to leave the "length" unchanged but that's about as far as I've gotten with this. I'm guessing that one needs to apply some certain identities here regarding the cross product and the $\exp$ function, which I haven't been able to find on Wikipedia or other websites so far. A: you have to show that $\mathcal{L}'=\mathcal{L}$ with: $$\mathcal{L}=\frac{m}{2}\vec{v}^T\,\vec{v}-\frac{q}{2c}\vec{v}^T\,\vec{\omega}$$ where $\vec{\omega}=\vec{x}\times\vec{B}$ $$\mathcal{L}'=\frac{m}{2}\vec{v}'^T\,\vec{v}'-\frac{q}{2c}\vec{v}'^T\,\vec{\omega}'$$ with: $\vec{v}'=O_{\eta}\,\vec{v}$ $\vec{\omega}'=O_{\eta}\vec{\omega}$ $O_{\eta}=\exp(\eta\,[\hat{\vec{B}}\,\times ])$ and $O_{\eta}^T=\exp(-\eta\,[\hat{\vec{B}}\,\times ])\quad $ thus $O_{\eta}^T\,O_{\eta}=I_3$ you obtain : $$\vec{v}'^T\,\vec{v}'=\left(O_{\eta}\,\vec{v}\right)^T\,O_{\eta}\,\vec{v}=\vec{v}^T\,\vec{v}$$ $$\vec{v}'^T\,\vec{\omega}'=\left(O_{\eta}\,\vec{v}\right)^T\,O
stackexchange
1. Field of the Invention The invention relates to devices for transferring signals between buses. More particularly, it relates to voltage translation and address multiplexing between different buses. 2. Description of the Related Art Modern computer systems can permit a variety of memory components to be used in a single computer system. During initialization, the system queries the various memory components to determine their size and configuration, and writes the pertinent information into the appropriate locations for operational use of the memory. This communication is typically performed over a separate bus other than the normal memory bus used for memory read/write operations. FIG. 1 shows a conventional system. During system initialization, system device 6 communicates over bidirectional serial bus 18 with multiple memory components, which are typically synchronous dynamic random access memories (SDRAM) 16. Each SDRAM includes a serial presence detect (SPD) circuit that receives queries from system device 6, and responds with information on the capacity and other parameters of the SDRAM. The information thus received by the system device is then used to configure the system to accommodate the various sizes and types of memory components that may be present. Once the system has been configured, normal read and write operations to memory take place through a different, higher speed data path (not shown). Bus 18 is typically an inter-integrated circuit bus, frequently referred to as an I2C or I2C bus. This is a well-known two-line serial bus with a bi-directional serial data line and a bi-directional clock line. I2C protocol follows a master-slave format, with the master device initiating a transaction and specifying the address of the designated slave device, and the designated slave device responding to it. I2C protocol is fairly simple, with a five-part format: 1) A start bit to initiate a transaction, 2) an address byte, with seven bits denoting the address and the eighth bit denoting a read or write command, 3) data bytes, 4) an acknowledge bit following each 8-bit address or data byte, and 5) a stop bit to terminate the transaction. During the transmission of address and data bits, the data line may change only while the clock line is low. If the data line changes while the clock line is high, this signifies one of two commands: 1) a falling data signal from the master is a START command, and 2) a rising data signal from the master is a STOP command. An ACKNOWLEDGE response from the slave
uspto_backgrounds
Comedy career 1980s Under the name 20th Century Coyote, Edmondson and Mayall became one of the star attractions at The Comedy Store. As their popularity grew, Edmondson, Mayall and other upcoming comedians, including Nigel Planer, Peter Richardson, Alexei Sayle, and French and Saunders moved from the Comedy Store to The Comic Strip club. The Comic Strip soon gained a reputation as one of the most popular comedy clubs in London and soon came to the attention of Channel 4. Edmondson and the others were commissioned to act in 6 self-contained half-hour films, using the group as comedy actors rather than stand-up performers. The series, entitled The Comic Strip Presents... debuted on 2 November 1982 (the opening night of Channel 4). The first episode to be broadcast was "Five Go Mad in Dorset", a parody of Enid Blyton's Famous Five, which drew anger from some viewers for the way it mercilessly satirised a children's classic. Edmondson starred as one of the five. By the same time as The Comic Strip Presents... was being negotiated, the BBC signed Edmondson, Mayall, Richardson, Planer, and Sayle to star in The Young Ones, a sitcom in the same anarchic style as The Comic Strip. (Richardson later decided not to proceed and was replaced by Christopher Ryan.) The show revolved around the shared house where four students lived during their studies at Scumbag College. It was noted at the time of its first airing for its violent slapstick, and the series retains a cult following. During this time, Edmondson also appeared in a bank advertisement in what was basically his "Vyvyan" guise. Following the success of The Comic Strip Presents... and, to a greater extent, The Young Ones, Edmondson and Mayall returned to their "Coyote" dynamic in the double act "The Dangerous Brothers" with Edmondson as "Sir Adrian Dangerous" in Saturday Live (1985–1987). In 1983, he appeared as the lead singer "Vim Fuego" in the spoof heavy metal band called "Bad News" with his Young Ones co-stars Rik Mayall, Nigel Planer, and Peter Richardson of "Comic Strip Presents...". On 11 May 1985, Edmondson married fellow Comic Strip actor Jennifer Saunders
wikipedia_en
We would like to emphasize that the Steinness of each fiber $X_t$ is a superfluous condition. In fact, the condition in Theorem \[thm:DF,S formulas\], which is our main tool, is sufficient. That is, if each $\O_t$ admits a defining function $\rho_t$ such that either ${\overline }{\partial} \omega_{\rho_t} > 0$ on $\Null$ or ${\overline }{\partial} \omega_{\rho_t} < 0$ on $\Null$, then we have the same conclusion. Here, $\omega_{\rho_t}$ is a D’Angelo $(1,0)$-form and $\Null$ is the kernel of the Levi form (see Section \[sec:Preliminaries\]). We refer readers to Corollary 5.4 and Remark 5.6 in [@Adachi-Yum] for the details. **Acknowledgment** {#acknowledgment .unnumbered} ------------------ The authors would like to thank A. Seo for suggesting the problem and M. Adachi for a useful comment on Lemma \[lem:null-space\]. This work was supported by the National Research Foundation (NRF) of Korea grant funded by the Korea government (No. 2018R1C1B3005963). **Preliminaries** {#sec:Preliminaries} ================= In this section, we introduce the D’Angelo $1$-form and the characterizations of Diederich-Forn[æ]{}ss and Steinness indices by the D’Angelo $1$-form due to Adachi and the second named author ([@Adachi-Yum]). First, we recall the definition of D’Angelo 1-form, which was introduced by D’Angelo ([@D'Angelo0], [@D'Angelo]), and developed by Boas and Straube ([@Boas-Straube]). Let $\O$ be a relatively compact, Levi pseudoconvex domain in a complex manifold $X$ with $C^{\infty}$-smooth boundary. Let $\rho$ be a smooth defining function of $\O$. Denote the kernel of the Levi form by $\mathcal{N} = \bigcup_{p \in M} \mathcal{N}_p \subset T^{1,0}(\partial \O)$ where $$\mathcal{N}_p := \{ L_p \in T^{1,0}_p(\partial \O) \mid \Lev
arxiv
<div class="jumbotron"> <h1>SNS Support</h1> <p>This showcase demonstrates the main features provided by the SNS support in Spring Cloud AWS.</p> <p><a href="http://cloud.spring.io/spring-cloud-aws/spring-cloud-aws.html#_sns_support" target="_blank" class="btn btn-primary btn-lg" role="button">Learn more »</a></p> </div> <div class="panel panel-primary" ng-controller="SnsCtrl as sns"> <div class="panel-heading"> <h3 class="panel-title">SNS Support</h3> </div> <div class="panel-body"> <form class="form-horizontal" role="form" name="topicForm"> <div class="form-group"> <label for="subject" class="col-sm-2 control-label">Subject</label> <div class="col-sm-10"> <input type="text" class="form-control" id="subject" placeholder="Subject..." ng-model="sns.model.subject" required> </div> </div> <div class="form-group"> <label for="message" class="col-sm-2 control-label">Message</label> <div class="col-sm-10"> <input type="text" class="form-control" id="message" placeholder="Message..." ng-model="sns.model.message" required> </div> </div> <div class="form-group"> <div class="col-sm-offset-2 col-sm-10"> <button ng-click="sns.send()" class="btn btn-default" ng-disabled="topicForm.$invalid">Send</button> </div> </div> </form> <div class="row"> <table class="table table-striped table-condensed" ng-show="sns.responses.length > 0"> <thead> <tr> <th>Received
github
“I’ve never seen one like that before,” said Boychuk, whose 13th power-play goal of the year gave him sole possession of the league lead and set a new franchise record for most in a single season. “I don’t think anyone knew where it was. The goalie didn’t. I kind of saw it go in and I was kind of surprised. “I’ve had some crazy ones go in off my butt, off my head and off my leg, but that one was just a little floater that nobody saw. It was a lucky one.” The goal was Boychuk’s eighth in his last 10 games, a stretch that includes two hat tricks. “He’s always been a guy that if you give him the puck around the net there’s a good chance he’s going to score,” said Daniels. “Right now his came is a lot more consistent than in the past and it’s showing not only when he’s been here but up in Carolina they’ve been really happy with him. He’s been bringing it every day.” Dolan, who replaced the injured Brody Sutter on a line with Terry and Justin Shugg, had hit a goal post prior to beating Thiessen for the eventual game-winning goal just prior to the five-minute mark of the third period. He also set up Terry for a breakaway chance late in the third as the Checkers peppered Thiessen, who bounced back after Boychuk’s soft goal, with several chances to put the game away before Norfolk got to within one. Dolan, who had taken his usual spot on the fourth line since returning from a prolonged injury on Feb. 7, had found out he would be playing on his new line just prior to the game. “It’s definitely a different game playing with Chris and Justin because they’re two very skilled players,” said Dolan. “It’s fun to get that opportunity and I’m glad we made the most of it.” Daniels said that Brody Sutter, who took Tuesday’s morning skate as usual, was day-to-day and would be fine to play the team’s next game in Texas this Friday. The upcoming two-game set against the Stars and the eight following it will be a tough test for the Checkers, who are now back to the .500 mark at 24
pile-cc
Let l be (-112)/49 - 4/(-14). Let q be 0 + (-22)/(-12) + l. Let b = 1 + -2. Is b at most as big as q? True Let d be (-4)/(-7) - (-4898)/(-6293). Let x be 0/(-2)*(-2)/(-4). Which is greater: d or x? x Let a(v) = 2*v**2 - 10*v + 6. Suppose -f = -3*y - 15, 4*y + 2 = -f - 4. Let o be a(f). Suppose -2*r + o = r. Is 6 less than r? False Let b = 6.67 + 0.13. Let t = -0.8 + b. Is 4 at most as big as t? True Let t be (-993)/9*1/(-2). Which is smaller: 55 or t? 55 Let w = -25 - -13. Which is greater: -144/11 or w? w Suppose 12*n - 365 + 137 = 0. Let w(x) = x**3 - 20*x**2 + 20*x - 18. Let c be w(n). Let h be -1*(-1 + (-26)/(-22)). Which is bigger: c or h? c Let w = -2102 - -1892. Is w bigger than -211? True Let u = 35 - 35. Suppose u = -m - 5*m - 90. Is -16 at most as big as m? True Let k be (-248)/(-54)*93/(-62). Which is bigger: -6 or k? -6 Let w = -0.018 + -19.982. Let r = w + 20.05. Which is bigger: 0.1 or r? 0.1 Let h be (-1 - 0)*4/6. Suppose 3*m = -3*r - 9, 8 = 2*r - 0*r - 5*m. Let t be (-6)/480*-5 + (-1 - r). Which is bigger: h or t? t Let y be (-1)/((-162)/15)*(-136)/(-255). Is 0 at most y? True Let q = 2239 - 3738. Which is bigger: -1498 or
dm_mathematics