text
stringlengths
173
4.38k
subset
stringclasses
13 values
=head1 SYNOPSIS #include <openssl/cms.h> int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, BIO *dcont, BIO *out, unsigned int flags); =head1 DESCRIPTION CMS_decrypt() extracts and decrypts the content from a CMS EnvelopedData structure. B<pkey> is the private key of the recipient, B<cert> is the recipient's certificate, B<out> is a BIO to write the content to and B<flags> is an optional set of flags. The B<dcont> parameter is used in the rare case where the encrypted content is detached. It will normally be set to NULL. =head1 NOTES OpenSSL_add_all_algorithms() (or equivalent) should be called before using this function or errors about unknown algorithms will occur. Although the recipients certificate is not needed to decrypt the data it is needed to locate the appropriate (of possible several) recipients in the CMS structure. If B<cert> is set to NULL all possible recipients are tried. This case however is problematic. To thwart the MMA attack (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) all recipients are tried whether they succeed or not. If no recipient succeeds then a random symmetric key is used to decrypt the content: this will typically output garbage and may (but is not guaranteed to) ultimately return a padding error only. If CMS_decrypt() just returned an error when all recipient encrypted keys failed to decrypt an attacker could use this in a timing attack. If the special flag B<CMS_DEBUG_DECRYPT> is set then the above behaviour is modified and an error B<is> returned if no recipient encrypted key can be decrypted B<without> generating a random content encryption key. Applications should use this flag with B<extreme caution> especially in automated gateways as it can leave them open to attack. It is possible to determine the correct recipient key by other means (for example looking them up in a database) and setting them in the CMS structure in advance using the CMS utility functions such as CMS_set1_pkey(). In this
github
Next course was for me the star of the evening; a complex kombu broth with cod, lobster and a crisp of seaweed. The broth was earthy and well balanced and was a wonderful base for the sweetness of the cod and lobster. The fish was tender and well cooked and I loved the seaweed crisp which provided a good textural contrast. It was a joy to eat. What followed was a quail jelly served with a langoustine cream and an accompanying duck liver crisp. The jelly had herby layers of flavour beneath and the langoustine cream gave a nice sweetness as a contrast to the earthy flavour of the quail. The underlying layer of herbs at the bottom of the jelly was quite strong and you had to take care not to get too much otherwise the mint in the herbs overpowered the whole dish. We were instructed to take one bite of the jelly and then a bite of the crisp and pâté when eating, both dishes had a nice depth of flavour. Next up, the nitro bloody mary. This dish is a definite nod to the chef’s time at the Fat Duck (they used to have a nitro green tea mousse which was served at the beginning of the meal as a fun palate cleanser). So we had the theatre of the tomatoes being prepared in a bowl of liquid nitrogen, thereby freezing them and then served in a glass with a clear preparation of bloody mary and an accompanying fever tree tonic. This was topped with a heritage tomato “pan con tomate”. It was an interesting dish but something more suited to summer rather than the depths of winter. The poussin with duck liver which followed was well cooked but lacked a depth of flavour and was served with asparagus. I love asaparagus, its one of my favourite vegetables, but not when it’s out of season. So for me the dish was a bit disappointing as it didn’t pack the punch I was expecting as I also love poussin. I will preface the following dishes with a profound apology, more so because my camera got it’s knickers in a twist and managed to lose the pictures that I took. The next course was a sucade of beef with parsnip and tonka beans. The beef was slow cooked so it melted in your mouth and was topped
pile-cc
Let n = 7 + 0. Is n a multiple of 7? True Let o be (-1)/3*-3 - 5. Does 7 divide (-1 + 47)*o/(-8)? False Let u be -1*2 - (0 + -5). Suppose -3*z = 3*h - 126, h = -z + 2*h + 32. Suppose -d + z = 4*t, -4*t + d + 13 = -u*t. Is t a multiple of 5? True Let n(f) = -12*f**2 + 2*f. Let g(t) = -t**2 + 1. Let v(q) = 3*g(q) - n(q). Is v(2) a multiple of 10? False Let v(b) = 5*b**2 + b - 13. Is v(-7) a multiple of 15? True Suppose 5*i - 19 = -4. Suppose i*a = 14 + 22. Is 7 a factor of a? False Let b(d) = 4*d**2 + 2*d + 43. Does 4 divide b(0)? False Let o = 144 + 4. Is 9 a factor of o? False Let i(y) = -y**3 - 3*y**2 - 2*y + 2. Let h be i(-2). Let m be 125/(-45) - h/9. Let f(j) = 2*j**2 + 4. Is f(m) a multiple of 9? False Suppose 2*n + 1 = b + 7, 4*b = -5*n + 41. Suppose -b*r - r + 30 = 0. Is r + -1 - (1 - -1) a multiple of 2? False Does 19 divide (9/12)/(4/304)? True Let w(s) be the third derivative of -7*s**4/24 - 4*s**3/3 + s**2. Let o = 3 - 9. Does 17 divide w(o)? True Let s(v) = 2*v**3 - 3*v**2 + 2. Let q be 8/10*(-5)/(-2). Is s(q) a multiple of 2? True Let f be 37
dm_mathematics
David H. Lund, Jr. Assistant General Counsel National Energy Production Corporation 11831 North Creek Parkway N. Bothell, WA 98011 425-415-3138 Fax: 425-415-3032 David.Lund@nepco.com or davidlu@nepco.com -----Original Message----- From: B-Gloria Rivas Sent: Tuesday, November 06, 2001 1
enron_emails
Appeal from the United States Court of Appeals for Veterans Claims in case no. 12-0503, Judge Alan G. Lance, Sr. __________________________ ON MOTION __________________________ Before NEWMAN, LOURIE, and REYNA, Circuit Judges. PER CURIAM. ORDER The Secretary of Veterans Affairs (Secretary) moves to waive the requirements of Fed. Cir. R. 27(f) and to dismiss this appeal. Appellant Louis A. Perez, who is a veteran seeking Department of Veterans Affairs disability compen- Case: 12-7173 Document: 9 Page: 2 Filed: 03/05/2013 LOUIS PEREZ V. SHINSEKI 2 sation benefits, has not responded to the Secretary’s mo- tion. In a September 13, 2011 decision of the Board of Vet- erans Appeals (Board), Mr. Perez was denied entitlement to service connection for a back disorder. On February 13, 2012, 153 days after the issuance of the Board’s decision, he filed a notice of appeal with the Untied States Court of Appeals for Veterans Claims (Veterans Court) seeking review of that decision. In light of the lateness of the appeal, the Veterans Court ordered Mr. Perez to show cause why his case should not be dismissed for lack of jurisdiction, but he failed to respond. In its June 26, 2012 decision dismissing the appeal, the Veterans Court acknowledged that the 120–day filing period for filing an appeal is subject to equitable tolling. However, because Mr. Perez failed to give any reason as to why his appeal should not be dismissed, the Veterans Court held that there was no basis to satisfy the requisites for justifying equitable tolling of the 120-day appeal period. This appeal followed. Our jurisdiction to review decisions of the Veterans Court is limited by statute. Guillory v. Shinseki, 603 F.3d 981, 986 (Fed. Cir. 2010). We have jurisdiction over “all relevant questions of law, including interpreting constitu- tional and statutory provisions.” 38 U.S.C. § 7292(d)(1). We lack jurisdiction, however
freelaw
[http://www.forbes.com/2010/01/20/united-states- debt-10-busin...](http://www.forbes.com/2010/01/20/united-states- debt-10-business-wall-street-united-states-debt.html?feed=rss_popstories) That's pretty bad. Also, I didn't notice any contradictions. Maybe your hyperbolic remarks are true. Maybe Corporations are greedy -- they do have a fiduciary responsibility to increase shareholder wealth. Maybe Globalism is bad -- think global act local right? Globalization is the opposite of that! Also, I think the article said it was pretty much the _leaders_ fault, what with a pic of GWB on one of the pages, or did you read that one? _it seems pretty plain that it's the investment equivalent of a supermarket tabloid_ Is that ad hominem? Which statements the article includes aren't true? ~~~ anigbrowl There's a reason I qualified and contextualized my opinion. I did not allege falsehood but rather complained of shallow and incoherent presentation. ------ dsplittgerber I detest this new format of business "articles" which basically just tries to bait you into loading as many pages as possible (for ad revenue) whilst engaging in the cheapest link bait possible - 20 reasons why the U.S. economy is dying? Seriously? Why not 10, 50? It's tabloid-worthy, basically. Every good graph I have already seen elsewhere and with much better explanation. They basically lump together every statistic they can get their hands on and spin it into a story, without any stringent analysis. Please, read good reporting by The Economist, or articles linked on realclearmarkets.com or any kind of financial blog. The real experts on finance and economics are not to be found among any major off- or online publication anymore. ------ joe_the_user _"The United States of America is very quickly becoming a socialist welfare state."_ The mindless stretching of the term socialism is getting a bit grating, you think? ~~~ fnid2 I think semantic arguments are getting old. You took one sentence
hackernews
The goal of the research is to examine the mechanisms by which the central nervous system mediates various aspects of sociosexual behavior in mammals. There is an emphasis on the hormonal control or modulation of these mechanisms. A region of particular interest is the medial preoptic-anterior hypothalamic area of the basal forebrain because this area appears to be the single most important area in the mediation of male sexual behavior and some other sexually dimorphic behavioral patterns of males. A concept that will be explored is whether this area
nih_exporter
On the first of June, 1996 an environmental accident occurred in Schönebeck, Germany in which free vinyl chloride was evaporated into the atmosphere. Thereby, the human population living in this area was exposed to vinyl chloride and its byproducts. Chromosomal aberrations were measured in peripheral blood lymphocytes from 29 potentially exposed and 29 non-exposed (control) individuals. Both groups were matched regarding age, gender and smoking habits. Two hundred metaphases were analysed for chromosomal aberrations per each individual.
pubmed_abstracts
Finally, our study is an example where weak vdW interactions need to be incorporated in the computational framework to correctly reproduce the experimentally observed phenomena. The fact that this is the case for a strongly bound chemisorbed adsorbate where vdW interactions represent only a small fraction of the adsorption energy is particularly noteworthy. In the PBE+vdW framework, intermolecular vdW interactions tip the balance towards condensation and restructuring, in agreement with the experimental observations. While the pure PBE functional may already include part of the non-local interactions in certain systems[@b43], it does not reproduce the trend for condensation as this transformation would be uphill in energy. In the acetate case, we compare various densities of the same adsorbed molecule and our detailed structure analysis ([Supplementary Fig. 7](#S1){ref-type="supplementary-material"} and [Supplementary Table 6](#S1){ref-type="supplementary-material"}) shows very little configurational variation among the supercells considered. Therefore, we expect even higher accuracy of the computational method in comparing supercell energies. In conclusion, we show that a combination of strong adsorbate--substrate and weak inter-adsorbate interactions leads to the formation of dense acetate islands on Au(110). The associated Au restructuring from Au-(1 × 2) to Au-(1 × 1) where the missing-rows are filled provides the necessary increase in the adsorption site density to switch on the weak acetate--acetate interactions, already at low coverage of acetate on the surface. Using the state-of-the-art DFT calculations with vdW corrections, we demonstrate the critical role of vdW interactions in driving the surface Au displacement. Hence, the present study provides a mechanism of surface restructuring, which is facilitated by the non-covalent collective effects of surface adsorbates and is related to the thermodynamics of the system. These findings may have broad implications in the structural control of surface morphology and the self-assembly of surface adsorbates and stress the counterintuitive importance of vdW corrections in DFT simulations in the case of small chemisorbed adsorbates. Methods ======= Sample cleaning --------------- Two different Au(110) single crystals (Princeton Scientific) were mounted in two separate chambers dedicated to STM and temperature programmed reaction spectroscopy (TPRS). In both cases, samples were cleaned via cycles of sputtering and annealing at 800--900 K until a uniform Au(110)-(1 × 2) (
pubmed_central
Unable to access NAS device I have a 3 site network A, B, and C. Each site has its own DC, that replicates to the others. Each site also has a local NAS (Thecus) device. The NAS devices should be accessible from every other site. I'm having an issue where the NAS device at site A cannot be reached from A's DC, but every other machine everywhere else(and with any login account) can reach the shares. From site A's DC, we can ping that NAS device and we can browse to the admin page. My thought, is there must be some type of group policy restricting that machine from accessing that NAS device. I say the machine, because the login account can access it from the same site, on different machines, and from other sites as well. If we use another login on site A's DC, we still cannot browse to the share. Where is this type of restriction defined in group policy? I haven't had a whole lot of experience with group policy. Thanks! EDIT: I guess I forgot about an error we had received in the event logs. It's error 5722: "The session setup from the computer failed to authenticate. The name of the account referenced in the security database is . The following error occurred: Access is Denied. Update This was resolved by applying a SMB patch for Windows Server 2008 A: Any Group Policy would likely apply to all Domain Controllers, not just the one in Site A. Troubleshooting why one machine can't get to another machine when everything else seems to work just find can get tricky. I don't know those NAS devices at all, so I don't know if they have any useful logging on them; if this were a Windows machine I'd ask to have the security-log turned on and see what it catches for this problem. If there are no useful logging functions to exploit in the NAS, my next step is to try and see what a connection looks like on the wire. Microsoft error reporting is not always useful, and frequently the reason for a connection failure will show up on a network trace. That does take some skill for interpretation, though. One thing to check before delving into packets is the Local Security Policy on that DC. Make sure it looks the same as your other DC's. When talking to non-Windows devices, sometimes that can have a very big effect on
stackexchange
The orifice plate is bonded to an ink barrier layer of the printhead. This barrier layer is made from photosensitive material that is laminated onto the printhead substrate, exposed, developed, and cured in a configuration that defines ink chambers. The chambers have one or more channels that connect the chambers with the reservoir of ink. Each chamber is continuous with one of the orifices from which the ink droplets are expelled. The ink droplets are expelled from each ink chamber by a heat transducer, such as a thin-film resistor. The resistor is carried on the printhead substrate, which is preferably a conventional silicon wafer upon which has been grown an insulation layer, such as silicon dioxide. The resistor is covered with suitable passivation and other layers, as is known in the art and is described, for example, in U.S. Pat. No. 4,719,477, hereby incorporated by reference. To expel an ink droplet, the resistor is driven (heated) with a pulse of electrical current. The heat from the resistor is sufficient to form a vapor bubble in the surrounding ink chamber. The rapid expansion of the bubble instantaneously forces a droplet through the associated orifice. The chamber is refilled after each droplet ejection with ink that flows into the chamber through the channel(s) that connects with the ink reservoir. In the past, the orifice plate and barrier layer were mechanically aligned and bonded together, usually in a high-temperature and high-pressure environment. Inasmuch as the orifice plate and barrier layers are made of different material, the need for precisely aligning these two components is complicated by the differences in their coefficients of thermal expansion. Also, this approach to constructing a printhead limits the minimum thickness of the bonded components to about 25 μm, which thus prevents the use of very small droplet volumes with the attendant high resolution and thermal efficiencies such use would permit. Currently, the notion of an integrally formed orifice plate and barrier layer has been considered. For clarity, an integrated orifice plate and barrier layer will be hereafter referred to as a droplet plate, which is a unitary plate defining both the ink chambers and orifices (the orifices hereafter referred to as nozzles). It will be appreciated that such a plate eliminates the problems associated with the orifice plate and barrier layer construction just mentioned. Manufacture of such a droplet plate may be carried out using photolithographic techniques, which techniques generally offer a high degree of design latitude. It is desirable, however, to arrive
uspto_backgrounds
will.i.am was in a nearby recording studio when he heard Luke, Blanco and Cirkut working with Kesha on the track, and immediately wanted to get involved. He co-wrote the album version and later wrote and recorded a new verse for himself, hoping he would be the featured artist in the song. Initially the record label decided not to include his verse; however, later his verse was included in the single/remix version of the song. In this remix, Kesha's second verse is omitted completely in favor of Will.i.am's verse. It officially impacted Top 40/Mainstream radio on April 29, 2013 and Rhythmic radio on May 7, 2013. It was made available for purchase as a digital download on April 30, 2013. will.i.am produced two other tracks whilst working with Luke, Blanco and Cirkut; they appear on will.i.am's album #willpower. The second official remix, which features rapper Pitbull, follows the same formula as the will.i.am remix. As with the first remix, the song's second verse removed in favor of Pitbull's new verse and also includes Pitbull speaking during the intro. The third remix, featuring rapper Juicy J, was sent to U.S. Rhythmic radio and became available for purchase as a digital download on May 21, 2013. Rap-Up called the Juicy J remix "raucous". Composition "Crazy Kids" combines the genres technopop, rap, trance, and hip hop into what VIBE called "hip-pop". Lyrically, "Crazy Kids" was said to establish dualistic personalities for Kesha. The A.V. Club writer Annie Zaleski said: "On the acoustic guitar-driven choruses, she's sweet and melancholy as she reveals her insanity; on the electronic-dipped verses, she unloads snappy hip-hop boasts ("I'm no virgin or no Virgo / I'm crazy that's my word, though") to assert herself." Over hip hop dub beats, Kesha raps "coochie" with "Gucci", drops several f-bombs, and contributes her famous sing-rap style vocals in addition to traditional singing. The song prominently features whistling in several areas. "Crazy Kids" is composed in the key of G minor at a
wikipedia_en
![\[f03\] (a) Magnetoresistance curves of MgB$_2$ film \#3 for $H \parallel c$-axis at several temperatures. (b) Differential plot of (a).](fig3_noguchi){height="9cm"} ![image](fig4_noguchi){height="9cm"} The magnetoresistance curves of the MgB$_2$ film \#3 at several temperatures for $H \parallel c$-axis are shown in Fig. \[f03\] (a) as a typical example of the experimental data. No hysteresis is observed. The $H_{\rm c2}$’s were defined as the midpoint of the resistive transition and the transition widths were defined as the fields between 10% and 90% of the normal resistance. The differential data $dR/dH$ are plotted as a function of the magnetic field in Fig. \[f03\] (b), where the peak fields coincide with the $H_{\rm c2}$’s at each temperature. The peak width, which are almost proportional to the inverse of the peak heights, is also corresponding to the transition width. So, a maximum in the peak height observed at 26 K means that the transition becomes sharp at that temperature. From the magnetoresistance measurements, we obtained the $H_{\rm c2}(T)$ phase diagrams of six films, which are shown in Fig. \[f04\]. Error bars in the figure correspond to the fields between 10% and 90% of the normal resistance. Superconducting anisotropy parameter $\gamma_H = H_{\rm c2}^{(ab)}/H_{\rm c2}^{(c)}$ as a function of temperature was obtained as shown in the inset of the figure, where $H_{\rm c2}^{(ab)}$ and $H_{\rm c2}^{(c)}$ are the $H_{\rm c2}$ for $H \parallel ab$-plane and $H \parallel c$-axis, respectively. The $\mu_0 H_{\rm c2}^{(ab)}(0)$’s attain to 20$\sim$40 T, which are apparently larger than those for MgB$_2$ single crystal. This indicates that the superconducting coherence length is effectively reduced through the reduction of the electron mean free path due to some kind of disorder in fabricating the films. As for the anisotropy, the values of $\gamma_H$ are between one and three depending on the films, which are
arxiv
// disable the move of section to have column order fixed mHierarchy->header()->setSectionsMovable(false); layout->addWidget(m_searchWidget); layout->addWidget(mHierarchy); setLayout(layout); connect(mHierarchy, &QTreeWidget::itemSelectionChanged, this, &MotionSetHierarchyWidget::UpdateSelection); connect(mHierarchy, &QTreeWidget::itemDoubleClicked, this, &MotionSetHierarchyWidget::ItemDoubleClicked); // connect the window activation signal to refresh if reactivated //connect( this, SIGNAL(visibilityChanged(bool)), this, SLOT(OnVisibilityChanged(bool)) ); SetSelectionMode(useSingleSelection); } // destructor MotionSetHierarchyWidget::~MotionSetHierarchyWidget() { } // update from a motion set and selection list void MotionSetHierarchyWidget::Update(EMotionFX::MotionSet* motionSet, CommandSystem::SelectionList* selectionList) { mMotionSet = motionSet; mCurrentSelectionList = selectionList; if (selectionList == nullptr) { mCurrentSelectionList = &(GetCommandManager()->GetCurrentSelection()); } Update(); } // update the widget void MotionSetHierarchyWidget::Update() { mHierarchy->clear(); mHierarchy->blockSignals(true); if (mMotionSet) { AddMotionSetWithParents(mMotionSet); } else { // add all root motion sets const uint32 numMotionSets = EMotionFX::GetMotionManager().GetNumMotionSets(); for (uint32 i = 0; i < numMotionSets; ++i) { EMotionFX::MotionSet* motionSet = EMotionFX::GetMotionManager().GetMotionSet(i); if (motionSet->GetIsOwnedByRuntime()) { continue; } if (motionSet->GetParentSet() == nullptr) { RecursiveAddMotionSet
github
Extreme conditions tests. “Kicking the tires” of models has been a good idea since the beginning. This is an ingrained SD habit, and Vensim provides Reality Check™ to automate it. It’s not clear that this would have revealed the VaR sum vs. average error, because that’s a matter of numerical sensitivity that might not reveal itself as a noticeable change in behavior. But I bet it would reveal lots of other problems with the model boundary and limitations to validity of relationships. Abstraction. System Dynamics focuses on variables as containers for time series, and distinguishes stocks (state variables) from flows and other auxiliary conversions. Most SD languages also include some kind of array facility, like subscripts in Vensim, for declarative processing of detail complexity. Excel basically lacks such conventions, except for named ranges that are infrequently used. Time and other dimensions exist spatially as row-column layout. This means that an Excel model is full of a lot of extraneous material for handling dynamics, is stuck in discrete time, can’t be checked for DT stability, and requires a lot of manual row-column fill operations to express temporal phenomena that are trivial in SD and many other languages. With less busywork needed, it might have been much easier for auditors to discover the VaR error. Readable equations. It’s not uncommon to encounter =E1*EXP($D$3)*SUM(B32:K32)^2/(1+COUNT(A32:K32)) in Excel. While it’s possible to create such gobbledygook in Vensim, it’s rare to actually encounter it, because SD software and habits encourage meaningful variable names and “chunking” equations into comprehensible components. Again, this might have made it much easier for auditors to discover the VaR error. Graphical representation of structure. JPMorgan should get some credit for having a model audit process at all, even though it failed to prevent the error. Auditors’ work is much easier when they can see what the heck is going on in the model. SD software provides useful graphical conventions for revealing model structure. Excel has no graphics. There’s an audit tool, but it’s hampered by the lack of a variable concept, and it’s slower to use than Vensim’s Causal Tracing™. I think the score’s Forrester 8, Gates 1. Excel is great for light
pile-cc
209 What is the greatest common divisor of 3393059 and 13589? 127 Calculate the greatest common divisor of 802 and 724479883. 401 What is the highest common divisor of 665810 and 1946? 278 Calculate the highest common divisor of 2409682 and 1870. 374 Calculate the highest common divisor of 27608760 and 420. 60 Calculate the highest common factor of 154 and 125711817. 77 Calculate the greatest common factor of 5842059 and 6872. 859 What is the greatest common divisor of 727296 and 37632? 768 What is the highest common divisor of 173149249 and 7? 7 Calculate the highest common factor of 7370 and 70195565. 3685 What is the highest common factor of 266351195 and 55? 55 What is the highest common divisor of 533043880 and 120? 40 Calculate the highest common factor of 18179 and 39004. 49 What is the highest common divisor of 200010 and 84960? 1770 Calculate the greatest common divisor of 96202 and 17746. 934 What is the highest common divisor of 8756823 and 10569? 813 What is the highest common factor of 330 and 141545415? 165 Calculate the highest common factor of 45156 and 116388. 636 Calculate the greatest common factor of 2283752 and 8. 8 Calculate the greatest common divisor of 12315976 and 20294. 146 What is the highest common divisor of 1374224 and 22? 2 What is the highest common divisor of 3339 and 53316039? 1113 What is the highest common factor of 633866 and 1082238? 1138 What is the greatest common divisor of 1410171 and 5830? 53 Calculate the highest common factor of 5067 and 2592667359. 5067 What is the greatest common factor of 120 and 777735? 15 Calculate the highest common divisor of 17265 and 786133. 1151 Calculate the highest common divisor of 26106 and 4404586. 458 What is the highest common factor of 302 and 559555264? 302 Calculate the greatest common divisor of 4763513 and 68689. 461 What is the greatest common divisor of 804500 and 471437
dm_mathematics
Jeff: It was an honor to represent EBS in the Dell meeting this morning. I learned quite a bit about where Dell is on our initiatives and appreciate the platform you provided to advance our causes. Thank you again for having me in the meeting. Sincerely, Marc Graubart Director Wholesale Origination Enron Broadband Services (713) 853-3019 office (713) 515-94
enron_emails
At the time of their divorce, the Ebels owned as tenants in common a nine- hole golf course, a driving range, an adjoining house, and three nearby building lots (“Property”). Since 1987 the Property has been managed by a receiver pending final resolution of the marital property, and earnings derived from the operation of the Property were divided 50/50 between the parties. In 1990, and before a final resolution of the Property could be made, Mr. Ebel filed for bankruptcy. Colorado courts have twice considered the division of the Property and twice awarded the former Mrs. Ebel all the Property, most recently in December 1999. In June 1996, the former Mrs. Ebel reached a settlement agreement with the trustee in Mr. Ebel’s bankruptcy case that would end litigation regarding any claims that Mr. Ebel’s estate might have on the Property or its -2- proceeds. In April 2004, the bankruptcy court approved the settlement agreement and in March 2005, the district court affirmed the agreement. Mr. Ebel makes three challenges to the bankruptcy court’s approval of the settlement, each of which he made to the district court. First, Mr. Ebel claims that the settlement agreement is invalid because his share of the proceeds from the Property following his 1990 bankruptcy filing does not belong to the estate under 11 U.S.C. § 541(a)(6). Second, Mr. Ebel argues that the bankruptcy court did not follow Federal Rule of Bankruptcy Procedure 9019. And finally, Mr. Ebel argues that the bankruptcy court did not make the findings required by the rules of civil and bankruptcy procedure to accept a settlement agreement. The district court thoroughly addressed and rejected each of these arguments. Mr. Ebel’s work on the Property did not exempt proceeds from the Property from the bankruptcy estate. Section 541(a)(6) provides that an estate does not include “earnings from services performed by an individual debtor after the commencement of the case.” The district court noted two problems with Mr. Ebel’s argument that his share of proceeds from the Property is exempt from the estate. First, “it does not appear that [Mr. Ebel] adequately raised this issue
freelaw
~~~ mwexler No, the importance is massive, and you understate it. While we may all want to just believe, the regulatory ecosystem worldwide (where it applies, esp. in financial realm) demands that we provide explanations of why models made certain decisions on certain data. Without this ability, models will not be allowed to drive innovation or decisions in many areas of life, from financial (credit and risk) to medical (recommendations for treatment) to legal (best contract approach or best defense approach for a lawsuit). Saying that humans make mistakes and cannot explain their decisions is, in fact, one of the very reasons we want to have better models. We hope they will do better than most people to create a better world. And their explanations will hopefully provide insight into how we as people make good (and bad) decisions. And sure, we can change the laws over time, but having advanced models which can allow humans to understand decisions and even provide diagnostics to improve the models will be transformative. Until then, we will see massive impact in some areas of our lives, and frustrating holdbacks in others, driven either by the distraction of building for regulatory constraints or by choosing not to build in regulated areas at all. ~~~ zebrafish We know why these models make decisions on data. They're optimizing for lower error rates. The black box unveiled for a convolutional neural network is this: over the course of several thousand rounds of performing the dot product of the RGB values of a given training datum against a weight vector, this network has determined that a weight vector containing _these values_ optimally reduce the error produced by "squashing" the output matrices of said dot products in a softmax function when the "squashed" value is compared against the pre- determined true value. If you would also like to be able to correctly predict whether a given input is part of the class for which this model was optimized for, we suggest your weight vectors also contain _these values_ as this will reduce the number of false positives and false negatives you will produce from your prediction. ~~~ ColanR No. If the machine is telling me what medicine to administer to the patient, then I want to know exactly what data points the machine thought were relevant (i.e., the relevant
hackernews
The sphingolipid ceramide, a bioeffector lipid, is known to regulate anti-proliferative responses in various human cell lines. In particular, it has been shown that various anti-cancer agents cause the elevation of endogenous ceramide levels accompanied by apoptotic cell death in human cancer cells. Preliminary results from this program demonstrate that: i) Treatment of A549 human lung adenocarcinoma cells with chemotherapeutic agents results in the formation of endogenous long-chain ceramide via either the de novo
nih_exporter
Diets high in fruit and vegetable consumption are associated with a decrease in chronic diseases. Dietary factors are linked to 4 of the 10 leading noncommunicable causes of death: cardiovascular disease, some cancers, stroke, and type 2 diabetes. Accurately measuring dietary patterns has many challenges. Dietary intake measurement has traditionally relied on self-report instruments such as 24-hour recall, food record, and food frequency questionnaires to record consumption history. These methods have inherent limitations in detecting small but important changes
pubmed_abstracts
For its size, Shetland has a large public sector, and Shetland Islands Council and National Health Service (NHS) Shetland are the biggest employers. The provision of services across 15 inhabited islands presents unusual challenges and opportunities. Public sector staff work throughout the islands, for example, as teachers, doctors, community workers, nurses or ferry staff. A social worker, nurse, doctor, town planner or customs officer may find that they need to travel by ferry or light aircraft in the course of their work (Shetland.org, [@ref5]). In 2014, under the new Public Bodies (Joint Working) (Scotland) Act 2014, Shetland Islands Council and the Board of NHS Shetland joined forces to form the Integrated Joint Board, which was intended to ensure seamless health and social care provision (Shetland.gov.uk, [@ref4]). Shetland NHS Board provides healthcare for a population of around 23 000. Hospital and community services are provided from the Gilbert Bain Hospital and ten health centres. Visiting consultants from NHS Grampian provide out-patient clinics, as well as in-patient and day-case surgery, to supplement the service provided by the locally based consultants in medicine, surgery, anaesthetics and psychiatry (Shb.scot.nhs.uk, [@ref3]) There are no psychiatric in-patient beds in Shetland. Patients requiring admission are transferred to Aberdeen, and cared for on the medical ward in Shetland while awaiting transfer. The mental health service {#sec6} ========================= The mental health service is made up of the community mental health team (CMHT), the substance misuse and recovery service (SMRS), the talking therapy service (TTS) and the dementia assessment team. The CMHT and SMRS work closely together, especially with those patients with dual diagnoses. The two teams are staffed by community psychiatric nurses. In addition, the SMRS benefits from a general practitioner with a special interest in addictions and recovery workers. There is a small child and adolescent mental health service, which falls under the Children\'s Service directorate. A full-time consultant psychiatrist and middle-grade (specialty doctor) psychiatrist provide clinical leadership for the CMHT and SMRS and share out-of-hours telephone on-call duties. They visit Royal Cornhill Hospital in Aberdeen monthly for academic activities, mentoring, and clinical and management interface, and
pubmed_central
Q: Find the Limit $\lim_{n \to \infty}\sum_{k=1}^{\infty}\frac{k^{n}}{1+k^{n+2}}$ Find $\lim_{n \to \infty}\sum_{k=1}^{\infty}\frac{k^{n}}{1+k^{n+2}}$ My ideas: let $ n \in \mathbb N$ be constant, looking at $\frac{k^{n}}{1+k^{n+2}}$, we know $$\frac{k^{n}}{1+k^{n+2}}\leq\frac{k^{n}}{k^{n+2}}=\frac{1}{k^{2}}$$ but this does not help me because $\sum_{k=1}^{\infty}\frac{1}{k^{2}}=\pi^{2}/6$ any ideas? A: Note that $${1\over k^2}-{k^n\over1+k^{n+2}}={1\over k^2(1+k^{n+2})}$$ and, for $k\ge2$, $${1\over k^2(1+k^{n+2})}\le{1\over2^nk^2}$$ so that $$\sum_{k=1}^\infty{1\over k^2(1+k^{n+2})}={1\over2}+\sum_{k=2}^\infty{1\over k^2(1+k^{n+2})}\le{1\over2}+{1\over2^n}\sum_{k=2}^\infty{1\over k^2}\to{1\over2}+0={1\over2}$$ as $n\to\infty$. It follows that $$\sum_{k=1}^\infty{k^n\over1+k^{n+2}}=\sum_{k=1}^\infty{1\over k^2}-\sum_{k=1}^\infty{1\over k^2(1+k^{n+2})}\to\sum_{k=1}^\infty{1\over k^2}-{1\over2}={\pi^2\over6}-{1\over2}$$ The key step, really, is to realize that the inequality $2^n\le1+k^{n+2}$ is not satisfied for $k
stackexchange
In the past, there has been proposed a power supply device which converts power inputted from an external power supply and outputs converted power and includes a thermistor having a positive temperature property (so-called a PTC thermistor) in order to suppress rush current at the time of activation interposed in a power supply path from such a power supply (e.g., see document 1 [JP 2008-104273 A]). In this regard, when excess current such as rush current flows, Joule heat causes a rise in temperature of the thermistor, and this leads to increase in a resistance of the thermistor. Consequently, such current can be suppressed. The thermistor may have such a temperature property that resistance greatly varies with temperature. For example, a resistance of the thermistor at 160° C. is approximate 100 times as high as a resistance of the thermistor at 25° C. Further, a thyristor is connected in parallel with the aforementioned thermistor and a circuit of the power supply device is configured to keep the thyristor on during stable operation. Rush current is likely to occur only at the time of activation. Therefore, to avoid loss caused by the thermistor, a current is made to flow through the above thyristor during stable operation. Further, there has been proposed a power supply device including multiple buck converters connected in parallel together between output ends of a DC power supply circuit (e.g., see document 2 [JP 2011-78218 A]). For example, a load such as a light emitting diode array is connected between output ends of each buck converter. The aforementioned DC power supply circuit may be, for example, a capacitor for smoothing a pulsating output of a diode bridge, a conventional boost converter, or the like. In this power supply device, the multiple buck converters can share the DC power supply circuit, but can be different from each other in specifications and operations. The power supply device including the DC power supply circuit and the multiple buck converters as with document 2 can be modified so that the parallel circuit of the thermistor and the thyristor is interposed in the power supply path to the DC power supply circuit as with document 1. With regard to the power supply device as modified above, it is assumed that the circuit of the power supply device is designed so that the thyristor is kept on while any of the buck converters operates stably. In this case, even if in one or some of buck converters a switching element may be short-
uspto_backgrounds
Harposporium anguillulae is a member of the genus Harposporium. It is an endoparasitic nematophagous fungus that attacks nematodes and eelworms and is isolated commonly from field and agricultural soils as well as used as an experimental organism in the laboratory. History and taxonomy Harposporium anguillulae was described in the late 1800s as a parasite of nematodes. It has since been commonly reported in the literature. This fungus also traps eelworms. Harposporium anguillulae is one of 26 species in the genus Harposporium in the division Ascomycota. It is a pathogen of eelworms and nematodes, notable for its distinct sickle-shaped conidia that grow in pierce out through the host body. This genus Harposporium was treated initially in the Clavicipitaceae and is thought to be closely related to members of the genus, Tolypocladium. Both genera occur on nematodes and eelworms but rarely insects. The two genera can be differentiated morphologically, as members of the genus Tolypocladium produce more complex conidiophores with narrower conidiogenous cells. Growth and physiology The invasive apparatus of this species consists of non-adhesive, crescent-shaped conidia that are ingested by hosts and lodge in the esophagus or gut. The sickle shape of the conidia is also contributes to the ability of the fungus to pierce through the host cuticle. In the laboratory, cultures of the fungus can be cultivated on agar containing yeast hydrolysate or glucose, though growth is much slower on glucose. The fungus grows rapidly on water-agar and produces chlamydospores, implying an oligotrophic physiology. Habitat and ecology Nematophagous fungi occur in a variety of habitats including leaves entering the decomposition phase, soil samples that contain decomposed leaves or in soil samples from agricultural land and they can also be found in pasture land. The latter possibly relates to the tendency of this species to occur in dung of cow and sheep where its nematode hosts are abundant. The fungus is commonly found in tropical and warm climates. It is more commonly encountered in the spring and fall. The fungus has been isolated from include Brazil, China, Florida, New Zealand, and eastern Canada. The fungus tends to be more commonly reported from climate regions subject to monsoons and does not appear to
wikipedia_en
![The failure of scientific cooperation in the baseline model with single blind reviews (2 random referees) under different editorial policies. Respectively: AP (First Panel), MR (Second Panel), 1P (Third Panel), ER (Fourth Panel). All illustrative simulations concern the baseline model: the population is composed of 1200 individuals initially divided among the 6 possible bundled strategies; simulations run till convergence or until $t_{max}=100000$; papers are assigned in random order to randomly chosen referees; each referee can review up to 4 papers and a maximum of 30% of the papers are publishable in each period.[]{data-label="Baseline_singleblind"}](single_rrrc_ap_userep_0_IFMulti_0_JIF_0_PropBundleStrat.jpg "fig:"){width="24.00000%"} ![The failure of scientific cooperation in the baseline model with single blind reviews (2 random referees) under different editorial policies. Respectively: AP (First Panel), MR (Second Panel), 1P (Third Panel), ER (Fourth Panel). All illustrative simulations concern the baseline model: the population is composed of 1200 individuals initially divided among the 6 possible bundled strategies; simulations run till convergence or until $t_{max}=100000$; papers are assigned in random order to randomly chosen referees; each referee can review up to 4 papers and a maximum of 30% of the papers are publishable in each period.[]{data-label="Baseline_singleblind"}](single_rrrc_mr_userep_0_IFMulti_0_JIF_0_PropBundleStrat.jpg "fig:"){width="24.00000%"} ![The failure of scientific cooperation in the baseline model with single blind reviews (2 random referees) under different editorial policies. Respectively: AP (First Panel), MR (Second Panel), 1P (Third Panel), ER (Fourth Panel). All illustrative simulations concern the baseline model: the population is composed of 1200 individuals initially divided among the 6 possible bundled strategies; simulations run till convergence or until $t_{max}=100000$; papers are assigned in random order to randomly chosen referees; each referee can review up to 4 papers and a maximum of 30% of the papers are publishable in each period.[]{data-label="Baseline_singleblind"}](single_rrrc_1p_userep_0_IFMulti_0_JIF_0_PropBundleStrat.jpg "fig:"){width="24.00000%"} ![The failure of
arxiv
#define PXA25X_UDC_BASE 0x40600000 #define UDCCR_UDE (1 << 0) #define UDCCR_UDA (1 << 1) #define UDCCR_RSM (1 << 2) #define UDCCR_RESIR (1 << 3) #define UDCCR_SUSIR (1 << 4) #define UDCCR_SRM (1 << 5) #define UDCCR_RSTIR (1 << 6) #define UDCCR_REM (1 << 7) /* Bulk IN endpoint 1/6/11 */ #define UDCCS_BI_TSP (1 << 7) #define UDCCS_BI_FST (1 << 5) #define UDCCS_BI_SST (1 << 4) #define UDCCS_BI_TUR (1 << 3) #define UDCCS_BI_FTF (1 << 2) #define UDCCS_BI_TPC (1 << 1) #define UDCCS_BI_TFS (1 << 0) /* Bulk OUT endpoint 2/7/12 */ #define UDCCS_BO_RSP (1 << 7) #define UDCCS_BO_RNE (1 << 6) #define UDCCS_BO_FST (1 << 5) #define UDCCS_BO_SST (1 << 4) #define UDCCS_BO_DME (1 << 3) #define UDCCS_BO_RPC (1 << 1) #define UDCCS_BO_RFS (1 << 0) /* Isochronous OUT endpoint 4/9/14 */ #define UDCCS_IO_RSP (1 << 7) #define UDCCS_IO_RNE (1 << 6) #define UDCCS_IO_DME (1 << 3) #define U
github
Scanning electron microscope image of a trap entrance with a small angle of ∼30° between trapdoor (td) and threshold (th). A longitudinal section of the trap entrance of terrestrial U. longifolia is shown; note the pavement epithelium (pe) and quadrifid glands (qg). Source: Poppinga et al. 2016 The way a bladderwort catches its prey is to wait for prey animals (mainly small crustaceans) to touch trigger hairs situated on the trapdoor which closes the trap watertight. Once this happens, it has a bladder snap open. The inside of the bladder is empty, so water, and anything nearby in it, is sucked in with an acceleration over 600 times the force of gravity. Getting water to flow rapidly into the trap is the key to the bladderwort’s success, but understanding how these traps exactly work is not easy. Simon Poppinga of the research team said: “The bladderwort traps are considered as some of the most complex structures in the plant kingdom. They are tiny, they are ultrafast in their sucking motion and they are complicated to investigate. Though being intensively studied not only since Darwin’s benchmark book about carnivorous plants, there are still many mysteries about how these devices function. With our review we aimed at putting all relevant biophysical and structural information together and to inspire further research on these enigmatic devices.” Recent advances include using scanning electron microscopes that are capable of seeing far more detail than a standard light microscope. While reviewing studies of bladderwort traps, Poppinga and coworkers noted that not all bladderworts are alike. Poppinga said: “You might think that if the selective pressure on the traps is just about an optimized water flow, then the traps would look more or less identical. But when we looked closely into trap architecture during our experimental studies we found that different plants have different structural arrangements, which has also been noted by earlier authors. This is probably caused by the fact that different species of bladderwort live in different environments and, hence, might show structural adaptations to the respective habitat – for example, terrestrial bladderworts often have, in contrast to aquatic species, to cope with seasonal dryness which would make the traps functionless. We think this might also mean the traps are adapted to lure and to catch different kinds of prey, and this is something botanists need to test.” Despite the variety of architecture, the traps all share a similar method of
pile-cc
What is 50 (base 7) in base 5? 120 Convert 4310 (base 6) to base 13. 5a3 -1893 (base 12) to base 3 -11002210 27f (base 16) to base 14 339 -3202 (base 5) to base 13 -26b Convert -898 (base 13) to base 8. -2705 Convert 1585 (base 9) to base 14. 627 What is -1000100 (base 2) in base 11? -62 Convert 202434 (base 6) to base 9. 24134 Convert 100101111110 (base 2) to base 12. 14a6 512 (base 10) to base 2 1000000000 -5869 (base 14) to base 13 -7002 What is -22341 (base 5) in base 2? -11000111100 100d (base 14) to base 11 2087 Convert a86 (base 11) to base 4. 110120 Convert -43182 (base 9) to base 15. -870b -222101 (base 3) to base 6 -3144 2425 (base 10) to base 3 10022211 -376 (base 12) to base 6 -2230 -24 (base 14) to base 3 -1012 -1001101000110011 (base 2) to base 16 -9a33 103 (base 12) to base 15 9c What is -1012201 (base 3) in base 4? -31303 What is -10037 (base 8) in base 14? -170b What is 1f8a (base 16) in base 2? 1111110001010 60500 (base 8) to base 2 110000101000000 -4a9a (base 12) to base 4 -2010112 What is -101000 (base 3) in base 14? -154 Convert 11e5 (base 15) to base 10. 3815 What is 1814 (base 16) in base 12? 3698 What is 100100000110110 (base 2) in base 8? 44066 -1100000 (base 2) to base 16 -60 -2533 (
dm_mathematics
Background: CNG's long-haul contract with Tennessee provides for delivery of natural gas from the Gulf of Mexico, plus reliance on an operational loop of CNG's system, operated by Tennessee, that allows CNG to offer more storage and transportation capacity than CNG could provide on its own. In the aftermath of Order No. 636, however, CNG unbundled its storage and transportation services and exited the merchant function. C
enron_emails
No. 45,503 Supreme Court of Kansas. Opinion filed December 23, 1969. Robert J. O'Connor, of Wichita, argued the cause, and A.W. Hershberger, Richard Jones, H.E. Jones, Jerome E. Jones, Robert J. Roth, William R. Smith, Greer Gsell, Stephen J. Jones, Michael Jones and George D. McCarthy, all of Wichita, were with him on the brief for the appellant and cross appellee, Marinas Heersche, d/b/a Wichita Big River Sand Company. Fred A. Beaty, of Wichita, argued the cause, and E. Lael Alkire, Richard B. Clausing, Robert A. Coldsnow, Aubrey J. Bradley, Jr., Thomas A. Bush, Ronald J. Wilkinson, Gillard Cohen, Harry L. Eddy and Martha R. Hodges, all of Wichita, were with him on the brief for the appellant and cross appellant, Davis Corporation. John C. Frank, of Wichita, argued the cause, and Patrick Kelly and Lloyd M. Kagey, both of Wichita, were with him on the brief for the appellees. *394 The opinion of the court was delivered by SCHROEDER, J.: This is a wrongful death action brought by the parents of two young boys who drowned in a sand pit within the city limits of Wichita, Kansas. The case was tried to a jury on the theory of attractive nuisance and a verdict returned for the plaintiffs in the total sum of $52,024.02. From the judgment thereon appeal has been duly perfected by the defendants assigning various trial errors. Among the trial errors asserted, the appellants challenge the sufficiency of the evidence to support a verdict on the theory of attractive nuisance. The evidence discloses that Dean L. Bartlett, four years old, and Vernon A. (Buddy) Elliott, Jr., five years old, were playmates and resided near each other in the area of Southwest Wichita. The Bartletts were the parents of four other children under ten years of age, and the Elliotts had one other child, a three year old daughter. The Bartletts moved into the neighborhood in August, 1964, and the Elliotts in July of the same year. Both families were buying their homes which were situated in the 4500 block on South Charles Street
freelaw
~~~ gremlinsinc I can see where overt sexualization could be a distraction... like dressed as a model or something...esp when I was younger. Girl next door, or soccer mom might less intimidating as well as the MIL for social anxiety types... A lot of geeks have social anxiety, and are like Raj from big bang theory around the opposite sex -though I think you grow out of it when you're in your 30's esp if married and have to live with a woman. Also dressing like a model could have an air of elitism or superiority if they're wearing like something that cost > $2k obviously. So, I could see that also being a hinderance, people like to deal with people similar to them, or at least I could see it easier to build a rapport. That probably goes both ways though regardless of sex. Like a car salesman in a normal suit with a mickey mouse watch or one in something a boy band artist would wear with an expensive rolex lol. ------ GrayTextIsTruth > it is common practice for male executives to have female subordinates take > responsibility when things go wrong I’m gonna go out in a limb here and say it’s common for _any_ executive to pass the buck to _any_ subordinate. It’s human nature to not want blame. ~~~ xtian > It’s human nature to not want blame. That’s not human nature, it’s a pathological, immature state of mind. ~~~ azangru > it’s a pathological, immature state of mind The word "pathological", presumably, means "deviating from the normal". The word "normal", in its turn, has two distinct meanings: one that is about what is desirable, the other is about what is common. On these grounds, and according to the second meaning of the word "normal", I would argue that fear is not pathological, nor is the desire to escape blame. It's quite normal. Whether some people can control this desire is the question. ~~~ xtian That’s not what pathological means at all… ------ newnewpdro At the relevant companies I've worked this didn't need to be explicitly told to the sales people. The monetary incentives
hackernews
DNA interstrand crosslinks are a particularly lethal form of DNA damage that represent an absolute block to replication and transcription. Chemicals forming crosslinks have proven to be highly toxic when found in nature, uniquely potent as chemotherapeutics in specific cancers, and effective treatments for a range of diseases states involving hyperplastic or displastic conditions. Although several genes have been isolated that, when mutated, render cells hypersensitive to crosslinks, many aspects of how these complex lesions are repaired and processed in cells remain unknown
nih_exporter
A Tipping Point for Measurement-Based Care. Measurement-based care involves the systematic administration of symptom rating scales and use of the results to drive clinical decision making at the level of the individual patient. This literature review examined the theoretical and empirical support for measurement-based care. Articles were identified through search strategies in PubMed and Google Scholar. Additional citations in the references of retrieved articles were identified, and experts assembled for a focus group conducted by the Kennedy Forum were consulted. Fifty-one relevant articles
pubmed_abstracts
DAT {#section22-0269881118783299} --- Friedman test revealed treatment effects of percentage correct detections (hits %) (*x*²(2)=6.68, *p*=0.04), subsequent treatment contrasts revealed that percentage of hits was higher during cocaine as compared with cannabis (*Z*=−2.04, *p*=0.04). Treatment contrasts comparing placebo with cocaine and placebo with cannabis were not significant. GLM repeated measures ANOVA revealed a main effect of treatment on tracking error (*F~2,24~*=4.08, *p=*0.03, *ƞ~p~^2^*=0.25), with subsequent treatment contrasts revealing a reduction in tracking error during cocaine as compared with cannabis (*p*=0.01). Again, treatment contrasts comparing placebo with cocaine and placebo with cannabis were not significant. Polynomial contrasts revealed a linear trend across all treatments (*F~1,12~*=10.29, *p=*0.01), indicating that tracking error was lowest after cocaine, intermediate after placebo and highest following cannabis treatment. Mean (±SE) performance scores for the divided attention task is shown in [Figure 2(b)](#fig2-0269881118783299){ref-type="fig"} and ([c](#fig2-0269881118783299){ref-type="fig"}). Arousal {#section23-0269881118783299} ------- Mean (±SE) arousal levels in every treatment condition are shown in [Figure 2(d)](#fig2-0269881118783299){ref-type="fig"}. GLM repeated measures ANOVA revealed a main effect of treatment on arousal levels (*F~2,28~*=9.71, *p*\<0.00, *ƞ~p~^2^*=0.41), subsequent treatment contrasts revealed higher arousal levels following cocaine administration as compared with placebo (*p*=0.01) and as compared with cannabis (*p\<*0.01). Treatment contrast between cannabis and placebo was not significant. Polynomial contrasts revealed a linear trend across all treatments (*F~1,14~*=13.84, *p*\<0.01), indicating that arousal levels were highest after cocaine, intermediate after placebo and lowest following cannabis treatment. Subjective high {#section24-0269881118783299} --------------- Friedman test revealed treatment effects of subjective high
pubmed_central
Создал простой Таймер function timer() { setInterval(function timer() { var label = document.getElementById('label'); label.innerHTML = parseInt(label.innerHTML) + 1; }, 1000); } Так вот как можно останавливать его внутри другой функции? Без использования Jquery! A: var i = 0; var timerId = 0; function timer() { timerId = setInterval(function () { //Здесь код в цикле console.log(i++); }, 1000); } function stopTimer(){ clearInterval(timerId); } <input type="button" value="StartTimer" onclick="timer()" /> <br> <input type="button" value="StopTimer" onclick="stopTimer()" /> setInterval возвращает id, который нужно передать clearInterval(id), для того чтоб остановилось, см. пример A: Функции setTimeout и setInterval возвращают идентификатор, который можно передать в функции остановки таймеров clearTimeout и clearInterval соответственно. Нужно просто сохранить возвращённый id и, при надобности, передать его в очищающую функцию. Например так: function timer() { // Сохраняем в свойстве объекта функции, индивидуально и внешние переменные не нужны timer.id = setInterval(() => { let label = document.querySelector('#label'); label.innerHTML = (parseInt(label.innerHTML) || 0) + 1; }, 1000); } // По клику запускаем таймер document.querySelector('#start
stackexchange
Plastisol molding materials are used to a large extent in automobile construction for the bonding and sealing of joints and beaded flanges of automobile body work sheeting, both internally and externally. In particular, plastisols based on PVC polymers and/or copolymers are used for this purpose. It is known that such plastisol molding materials comprise fine polymer praticles dispersed in a liquid, non-volatile plasticizer. At ambient temperature, the solid polymer particles are insoluble in the plasticizer, but the plasticizer dissolves them at elevated temperatures, resulting in a homogeneous solution of the polymer in the plasticizer, which solidifies on cooling to a more or less rigid film. The plastisol may contain additional components such as fillers, flow control agents, water-absorbing materials such as calcium oxide, stabilizers, pigments, and bond promoters. The purpose of the bond promoters is to cause a lasting bond between the surfaces of conventional work pieces such as oily steel, galvanised or tinned metal sheets, electrocoated metal sheets, etc. Examples of bond promoters for PVC plastisols are polyaminoamides, polyamines, reaction products of excess polyfunctional amines with monomeric or aligomeric bisphenol-A glycidyl ethers, blocked isocyanates, silanes, mixtures of urotropin with resorcinol, etc. and mixtures thereof. In automobile constructions, plastisols, especially PVC plastisols, are applied either in the body shop to non-degreased crude metal sheets or, following electrocoating, to primed sheets. If plastisol is applied in the body shop, the gelling operation with subsequent hardening takes place in a pre-gelling furnace, prior to the application of the electrocoat, or in the baking furnace for the electrocoat. In the case of application on the electrocoat, the hardening of the plastisol takes place with the baking of the subsequently applied materials, i.e. fillers, primers, and/or a topcoat. In the majority of cases, where fillers or the topcoat are sprayed on, the lacquering is carried out over the previously applied plastisol, whether gelled or not. It is frequently found that white and pastel shade coating lacquers yellow at those places at which they are applied to the plastisols. Such undesirable discoloration can occur regardless of whether the plastisols
uspto_backgrounds
Sansui designed the AU-11000 with the input, output and speaker terminals on the sides of the unit. The rear of the unit has the power cord and outlets only. The AU-11000 has features such as a logarithmic volume control, a 3-position level-set muting, a -20db mute switch, 3-position high & low filters, 3-Band Linear Bass/Midrange/Treble controls, 3 optional frequency settings for Bass & Treble controls, 3-position Tone Selection, A & B Speakers, Tape Input/Output control, 5-position mono-stereo selector switch, Tuner input, 2 Auxiliary inputs, 2 phono inputs, 2 rear 'always on' power outlets and 1 switched power outlet that is controlled by the units main power switch. There is an XLR input for Tape 2, and a spring-loaded ground connection plug. There are a few variations of the Sansui AU-11000. Many units share some of the same internal components as the less-powerful AU-9900, such as the Bias Board [F-2580] and the Power Supply Board [F-2566], though the AU-11000 has much larger power capacitors. Some units have an 'A' at the end of the model number (AU-11000A), indicating it has 120 Watts-per-channel and a linear volume control. There is a lot of discussion among the home audio community about how to properly set the DC Offset & Current Bias within the amplifier. This is not something for the average do-it-yourself'er or handyman, and should be performed by a qualified technician. AU-11000's with the F-2580 bias board can be adjusted using the service manual. AU-11000's with the F-2583 bias board have VR01 & VR03 switched within the circuit. VR02 & VR04 and also switched respectively. This means that the DC Offset & Current Bias trim locations are switched with one-another on the F-2583, compared to the F-2580. The Service Manual depicts proper adjustments of the F-2580 only. The picture on the right shows the proper illustration for the F-2583. The AU-11000 uses 8 TO-3 style power-output transistors, 4 per channel. 2 of the 4 are Sanken 2SC1116 [NP
wikipedia_en
A. N. Baltagiannis, K. E. Papadakis, Equilibrium points and their stability in the restricted four-body problem. Int. J. Bifurc. Chaos 21 (2011) 2179-2193. <https://doi.org/10.1142/S0218127411029707>. Y. D. Medvedev, N. I. Perov, Restricted four-body problem. The case of a central configuration: libration points and their stability. Astron. Lett. 34 (2008) 357-365. <https://doi.org/10.1134/S1063773708050095>. A. N. Baltagiannis, K. E. Papadakis, Families of periodic orbits in the restricted four-body problem. Astrophys. Space Sci. 336 (2011) 357-367. <https://doi.org/10.1007/s10509-011-0778-7>. J. Burgos-García, J. Delgado, On the blue sky catastrophe termination in the restricted four-body problem. Celest. Mech. Dyn. Astron. 117 (2013) 113-136. <https://doi.org/10.1007/s10569-013-9498-3>. C. Simó, Relative equilibrium solutions in the four body problem. Celest. Mech. 18 (1978) 165-184. <https://doi.org/10.1007/BF01228714>. M. Alvarez-Ramírez, E. Barrabés, Transport orbits in an equilateral restricted four-body problem. Celest. Mech. Dyn. Astron. 121 (2015) 191-210. <https://doi.org/10.1007/s10569-014-9594-z>. J. Burgos-García, J. Delgado, Periodic orbits in the restricted four-body problem with two equal masses. Astrophys. Space Sci. 345 (2013) 247-263. <https://doi.org/10.1007/s10509-012-1118-2>. E. E. Zotos, Escape and collision dynamics in the planar equilateral restricted four-body problem. Int. J. Nonlin. Mech. 86 (2016) 66-82. <https://doi.
arxiv
#include <algorithm> /* for std::find */ ossimNitfTagFactoryRegistry::ossimNitfTagFactoryRegistry() { initializeDefaults(); } ossimNitfTagFactoryRegistry::~ossimNitfTagFactoryRegistry() { } void ossimNitfTagFactoryRegistry::registerFactory(ossimNitfTagFactory* aFactory) { if(aFactory&&!exists(aFactory)) { theFactoryList.push_back(aFactory); } } void ossimNitfTagFactoryRegistry::unregisterFactory (ossimNitfTagFactory* aFactory) { std::vector<ossimNitfTagFactory*>::iterator iter = std::find(theFactoryList.begin(), theFactoryList.end(), aFactory); if(iter != theFactoryList.end()) { theFactoryList.erase(iter); } } ossimNitfTagFactoryRegistry* ossimNitfTagFactoryRegistry::instance() { static ossimNitfTagFactoryRegistry inst; return &inst; } ossimRefPtr<ossimNitfRegisteredTag> ossimNitfTagFactoryRegistry::create(const ossimString &tagName)const { std::vector<ossimNitfTagFactory*>::const_iterator factory; ossimRefPtr<ossimNitfRegisteredTag> result = 0; factory = theFactoryList.begin(); while(factory != theFactoryList.end()) { result = (*factory)->create(tagName); if(result.valid()) { return result; } ++factory; } ossimRefPtr<ossimNitfRegisteredTag> tag = new ossimNitfUnknownTag; return tag; } void ossimNitfTagFactoryRegistry::initializeDefaults() { theFactoryList.push_back(ossimNitfRegisteredTagFactory::instance()); theFactoryList.push_back(ossimNitfRpfTagFactory::instance());
github
No. This post is not about Elf. Not really. First, it was inspired by a Christmas song I heard on klove radio the other day. The lyrics went like this: "Empty manger, perfect stranger, about to be born. Into darkness, sadness, desperate madness, creation so torn. We were so lost on earth, no peace, no worth. no way to escape. In fear, no faith, no hope, no grace, and no light but that was the night before Christmas. Warm hay, cold sweat, a mother, not yet." The Night Before Christmas, by Brandon Heath This song, contrasting out lost state before the coming of the Messiah to the hope we now have in him, got me to thinking. Immediately I was so grateful that Jesus is not a stranger to me. In the words of Buddy the elf, "I know him!" We are familiar with each other. We communicate daily. He knows my name, my fears, even my favorite color. (See what I did there? :p) The other day, our advent devotional featured this verse: John 15:14-16 "You are My friends if you do what I command you.I do not call you slaves anymore, because a slave doesn’t know what his masteris doing. I have called you friends, because I have made known to you everything I have heard from My Father.You did not choose Me, but I chose you." God wants you to get to know him. He wants a personal TWO-WAY relationship between you both. He says through Jeremiah, "But the one who boasts should boast in this, that he understands and knows Me— that I am Yahweh, showing faithful love, justice, and righteousness on the earth, for I delight in these things. This is the Lord’s declaration." Is Jesus your friend? Do you know him? Are you seeking to know him better, as he sought you? No comments: Post a Comment About Me Hi. I'm a 25 year old wife to my high school sweet heart (barely) and mother to an almost 4 years old and a 1 and a half year old. I work as a ministry Assistant for Child Evangelism Fellowship, a ministry that has captured my heart and employed me in one way or another for about 12 years. My hobbies include painting, sewing, keeping swallow able
pile-cc
1/4, 0.148, -2/13 Put 43, -2, -4, -55 in descending order. 43, -2, -4, -55 Put -23, -2, 8, -5, 13 in descending order. 13, 8, -2, -5, -23 Sort 1, -10922, -36 in increasing order. -10922, -36, 1 Sort 39/11, -3/2, 40, 4 in descending order. 40, 4, 39/11, -3/2 Sort 211, 58, -2/7 in decreasing order. 211, 58, -2/7 Put -0.5, 2/7, 3/4555 in increasing order. -0.5, 3/4555, 2/7 Sort 0.271, 19/6, 3, -4 in decreasing order. 19/6, 3, 0.271, -4 Sort -31, -30, -3, 2, 4, 1 in increasing order. -31, -30, -3, 1, 2, 4 Sort 322, -3, -53 in ascending order. -53, -3, 322 Sort 4, 122, -1/3, 601, 5. -1/3, 4, 5, 122, 601 Sort 0.3, 49, -1/75, 4, -0.3 in decreasing order. 49, 4, 0.3, -1/75, -0.3 Sort 4, 145, 16, 5 in ascending order. 4, 5, 16, 145 Put 31, 2/11, 2/7, 5, -0.0475 in increasing order. -0.0475, 2/11, 2/7, 5, 31 Put -279, -2, 0.3 in descending order. 0.3, -2, -279 Put 3, 152, -5, -3/8, -1/14 in decreasing order. 152, 3, -1/14, -3/8, -5 Sort -11, 32, 10 in descending order. 32, 10, -11 Sort -1/2, 0, 2.9, 5.573 in decreasing order. 5.573, 2.9, 0,
dm_mathematics
Our goal is to provide you with the fastest, easiest and most convenient way to replace your lenses. That's why: - We are the world's largest contact lens store with over 9 million contacts in stock. - We have delivered over 3 million orders to more than 1 million customers. - We will replace your unopened, unexpired lenses at no charge if your prescription changes. - We never charge a membership fee.
enron_emails
STATE OF NEW JERSEY, Plaintiff-Respondent, v. JAMES R. TODD, a/k/a JAMES RED TODD, and NUNU, Defendant-Appellant. _______________________________ Submitted November 4, 2019 – Decided January 15, 2020 Before Judges Messano and Susswein. On appeal from the Superior Court of New Jersey, Law Division, Essex County, Indictment No. 11-03-0617. Joseph E. Krakora, Public Defender, attorney for appellant (Frank M. Gennaro, Designated Counsel, on the brief). Gubir S. Grewal, Attorney General, attorney for respondent (Lila Bagwell Leonard, Deputy Attorney General, of counsel and on the brief). PER CURIAM Defendant, James Todd, appeals from the revised sentence imposed on his trial convictions for conspiracy to distribute CDS, hindering his own apprehension, and disturbing/desecrating the remains of a gunshot victim. This is not the first time we have considered the sentence defendant received for these crimes. In defendant's initial appeal, we vacated his conviction for unlawful possession of a weapon, affirmed his convictions for conspiracy, hindering, and desecration, and ordered a new sentencing proceeding so that the trial judge could explain the reasons for imposing the maximum sentences on the three remaining convictions. In our initial unreported opinion, we found no reason to disturb the trial court's imposition of consecutive sentences. State v. Todd, No. A-0021-13 (App. Div. Jan. 10, 2018) (slip op. at 16). See generally State v. Yarbough, 100 N.J. 627, 643–44 (1985) (explaining factors for imposing consecutive sentences). We also concluded that the trial judge adequately explained his findings regarding the aggravating sentencing factors. Todd, slip op. at 16. However, we held the trial court at the initial sentencing proceeding did not specifically explain why it imposed the maximum sentences on the convictions for the third-degree crime of hindering apprehension and the second-degree crime of desecrating human remains
freelaw
In-House Languages - jowdones Godwin&#x27;s law: &quot;As an online discussion grows longer, the probability of a comparison involving Nazis or Hitler approaches 100%&quot;.<p>Godwin&#x27;s law for programmers: &quot;As software development grows longer, the probability of emergence of an improvised in-house scripted language (as bad as Nazis or Hitler) approaches 100%&quot;. ====== scarface74 I worked for a company around 2009 where the founder wrote his own bespoke VB like programming environment - IDE, PC emulator, bytecode VM, compiler for ruggedized Windows CE devices used for field services. The company was founded around 1996. I assume he wrote it because there was no easy way to develop for Win CE back then except for C++/MFC. It did allow the company to hire a lot of cheap developers from well known but not well respected private colleges. The same code could also be used for the back end supporting services, but he did at least add support for COM interop on the server so we could use any language to actually do the heavy lifting. They pushed him out around 2011 and I was the only old guy that knew anything about C++/MFC and assembly to maintain it until the company folded. ------ norswap If you're interesting on why homegrown languages can be interesting, I'd recommend "The Rise & Fall of Software Recipes" (1). The book is more of a softeng memoir than an argument piece, but it has some very interesting examples of home-grown languages (& dev environments). (1) [https://www.dariusblasband.com/](https://www.dariusblasband.com/) ------ mtmail I present you an in-house language Yahoo used around year 2000: [https://gist.github.com/simonwistow/3919291](https://gist.github.com/simonwistow/3919291) Working with it got hard after the developer who maintained it quit. ~~~ nieve That is the single worst looking syntax I have ever seen. How did they manage to do any significant amount of development instead of just bug hunting? IDE support? ~~~
hackernews
The aims of this Core are to: 1. Isolate myocytes from non-failing and failing human ventricular muscle at Temple University School of Medicine and supply these myocytes to investigators involved in the SCOR on Sudden Cardiac Death at Johns Hopkins University School of Medicine. 2. Prepare tissue samples from non-failing and failing human ventricular muscle at Temple University School of Medicine for investigators involved in the SCOR on Sudden Cardiac Death at Johns Hopkins University School of Medicine. 3
nih_exporter
This study examined a number of variables which influence radio-immunoassay measurements of prostaglandins in plasma. Comparative assays in specimens obtained from normal subjects and processed by different methods demonstrated that prostaglandin measurements were uniformly lower when blood was anticoagulated with EDTA, aspirin or indomethacin was added to inhibit further synthesis or prostaglandins in vitro, samples were centrifuged at 4 degrees C at speeds which removed platelets from the sample, and assays were performed when plasma was thawed for the first time. Examination
pubmed_abstracts
An experiment with a L/L biphasic system using triethylamine/benzene (no water) was carried and the result was the same: a grey film was formed at the interface characterized as graphene (Fig. S11[†](#fn1){ref-type="fn"}), confirming that any strong Lewis base (and not only water) can be used, corroborating the mechanism proposed in [Fig. 5](#fig5){ref-type="fig"}. Another key analysis was to evaluate the organic phase remaining after the reaction by gas chromatography coupled to mass spectrometry (GC-MS). The chromatograms obtained from the organic phase of the samples GR-BZ and GR-HX are shown in Fig. S12,[†](#fn1){ref-type="fn"} along with the solvents (benzene and *n*-hexane). One important peak could be identified in the chromatogram of GR-BZ and GR-HX at a retention time of 17.7 min with a molecular ion of *m*/*z* = 154. The fragmentation pattern of this peak (shown in ESI, Fig. S13[†](#fn1){ref-type="fn"}) strongly agrees with the structure of biphenyl,[@cit55] a key species in the proposed mechanism. Other aromatic polynuclear species were not observed due to their known difficult detection by GC-MS ionization. Interestingly enough, for GR-HX the same peak attributed to biphenyl was detected at 16.3 min (Fig. S14 and S15[†](#fn1){ref-type="fn"}). The difference in retention time is due to the column change but its characteristic fragmentation pattern was also observed, confirming the proposed oxidative cyclization. In order to further confirm that biphenyl is formed in the synthesis using *n*-hexane and not only due to some residue/impurity of benzene, the organic phase was distilled and reused in a consecutive reaction. The chromatograms for all these steps were obtained (Fig. S14[†](#fn1){ref-type="fn"}) and evidence that upon distillation of the residual *n*-hexane in the synthesis, the signal due to biphenyl disappears, as expected. This distilled residual *n*-hexane is then used in another synthesis of GR-HX and the peak of biphenyl appears again, indicating that biphenyl is indeed formed during the reaction. Another interesting analysis was carried out with the GR-HX sample by electrospray ionization quadrupole
pubmed_central
Q: NullPointerException when calling onClickListener I'm making a login system, and I don't know why this happens. How can I fix this problem? Here's a part of classes regarding NullPointerException. final TextView registerButton = (TextView)findViewById(R.id.registerButton); registerButton.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View view) { Intent registerIntent=new Intent(LoginActivity.this, RegisterActivity.class); LoginActivity.this.startActivity(registerIntent); } }); And the following is a context from logcat. 03-22 10:37:13.066 8500-8500/? E/dex2oat: Failed to create oat file: /data/dalvik-cache/arm/data@app@com.example.gibong.capstone-1@split_lib_dependencies_apk.apk@classes.dex: Permission denied 03-22 10:37:13.141 3897-3897/? E/SDAgentPackageStateReceiver: Not going to handle 'com.example.gibong.capstone'! 03-22 10:37:13.166 6707-6707/? E/Launcher.Model: onPackageAdded :com.example.gibong.capstone 03-22 10:37:13.296 8526-8526/? E/dex2oat: Failed to create oat file: /data/dalvik-cache/arm/data@app@com.example.gibong.capstone-1@split_lib_slice_0_apk.apk@classes.dex: Permission denied 03-22 10:37:13.341 8533-8533/? E/dex2oat: Failed to create oat file: /data/dalvik-cache/arm/data@app@com.example.gibong.capstone-1@split_lib_slice_1_apk.apk@classes.dex: Permission denied 03-22 10:37:13.391 8539-8539/? E/dex2oat: Failed to create oat file: /data/dalvik-cache/arm/data@app@com.example.gibong.capstone-1@split_lib_slice
stackexchange
U.S. Pat. No. 5,811,531 discloses the preparation of a superabsorbent polymer on the basis of polysaccharides, such as xanthan, which contain uronic acid groups by reacting the polysaccharides at the surface with at least two-functional organic crosslinkers. According to the disclosure, the products possess better free-swell absorbing ability against salt solutions than carboxyalkylated polysaccharides where the carboxyl groups are not attached directly to the saccharide units but via alkyl groups. U.S. Pat. No. 5,470,964 discloses a process for preparing a superabsorbent polymer providing improved absorbency under load that is based on polysaccharides containing acid groups and is surface crosslinked by polyvalent metal ions. The disadvantages of this process are that the improved absorbency under load is achieved by the crosslinking of a relatively thick surface layer and that, according to the disclosure, this is only possible through prior incipient swelling of the polysaccharide with a large amount of solvent. The incipiently swollen state then allows sufficiently deep penetration of the polyvalent metal ions into the surface. To achieve this, the polysaccharide is introduced into an excess of the aqueous metal salt solution such that the weight ratio of polysaccharide to water is from 1:2 to 1:40. The thick crosslinked surface layer does provide good absorbency under load values, but the free swell capacity and also the retention capacity of the absorbent are disadvantageously reduced as a result. The process described has the further disadvantage that the polysaccharide portion added last to the crosslinker solution in the course of the manufacturing operation has less time to swell and encounters a lower crosslinker concentration, resulting in an inhomogeneous distribution of the crosslinker on the surface and hence fluctuations in the absorption properties. U.S. Pat. No. 4,043,952 discloses the surface treatment of water-swellable anionic polyelectrolytes with polyvalent metal ions in a dispersing medium in which the polymer is insoluble to improve the dispersibility of the water-absorbent products. The broad object underlying the invention is to overcome the disadvantages arising from the state of the art. It is an object of the present invention to provide biodegradable supersuperabsorbent polymers based on renewable raw materials that are free of the defects described above. More particularly, the superabsorbent polymers shall have very long term storage stability with very substantial retention of the absorption properties. The absorbent
uspto_backgrounds
Status It has been dubbed "NY's most successful bank" by Crain's New York Business and was ranked as the Best Business Bank, Best Private Bank and Best Attorney Escrow Services provider by the readers of The New York Law Journal in the publication's 2018 survey for the third consecutive year; it was also awarded second place in the Best Private Bank category. In 2015, Forbes ranked the bank as No. 1 in its America's Best & Worst Banks evaluation. Forbes''' 2016 ranking of it as No. 6 marked the sixth consecutive year that the bank was among the Forbes'' top ten. As of December 31, 2018, the bank had total assets of $47.36 billion, deposits of $36.38 billion, and loans of $36.42 billion. Community involvement In 2018, the bank's Signature Bank Building Improvement Initiative awarded grants totaling $500,000 to community-based not-for-profits to provide funds to improve housing conditions for those living in low-income housing apartments in New York. Each recipient received $100,000 to be used towards their respective buildings. Controversies Chinacast Education Corporation v. Signature Bank Chinacast Education Corporation filed a $35,000,000 lawsuit against Signature for fraud, money laundering, and failing to stop transfers of money to a fictitious investment holding company in the British Virgin Islands with no legitimate business purpose. Approximately 3 months after the case was opened, Chinacast Education Corporation dropped the case against the three banks named in the lawsuit – Signature Bank, Bank of China, and HSBC Bank. A voluntary dismissal was approved by Judge Swain and the cases against both Signature Bank and Bank of China were dismissed with prejudice. West End Financial Advisors LLC Ponzi scheme In early 2016, some investors filed suit against Signature after the company lost $66 million of investor cash in a Ponzi scheme run by William Landberg, a money manager who pleaded guilty to the crime. They alleged that Signature helped Landberg by ordering him to shift money around dozens of accounts to cover up long-term overdrafts. Landberg was sentenced to three and a half years in federal prison. Tenant harassment Signature Bank has been the center of numerous protests due to mistreatment of tenants by landlords who receive loans from the bank. Despite these accusations, the Association for Neighborhood & Housing Development has applauded the bank's commitment to responsible lending practices as
wikipedia_en
Fig. 3 shows four different template spectra (K3+K7, K0+K7, G8+K7 and G5+K7) (grey curves) together with the average ($a$+$e$) spectrum de-reddened with $E(B-V)$ = 0.3, 0.45, 0.50 and 0.60, values selected to give a best fit to the template spectra. The depth of the Mg$b$ band at $\lambda$5175Å (which was the only late-type feature in the first quiescent spectrum published by Thorstensen et al. [@Thor]) and of the TiO band at $\lambda$4954Å  increase with later spectral types and are too strong in the K3+K7 combination. The ($a$+$e$) de-reddened energy distributions for $E(B-V)$ = 0.60, 0.50 and 0.45 match almost equally well the G5+K7, G8+K7 or the K0+K7 composite templates, respectively, although there are differences at the blue and red ends. In Fig. 4 we show the result of subtracting the synthetic G8 spectrum, assigned to star $a$, from the ($a$+$e$) spectrum, de-reddened for $E(B-V)$ = 0.50. This should approximate the spectrum of star $e$. Also shown (grey line) is our observed K7 V spectrum, normalized to 0.12 at 5500 Å. The main features of this difference spectrum are the emission lines at H$\alpha$, H$\beta$ (weaker) and Ca II K and H(+H$\epsilon$), which appear strong although the signal-to-noise ratio below 4500Å in our spectra is low. Emission at H$\gamma$ is barely detectable and no emission is detected at $\lambda$4686Å. The slight deficit between 4400 and 5000 Å may be of instrumental origin. Our spectrum is different from that taken by Garcia et al. ([@Gar]) when the sum of Aql X-1 plus star $a$ was more than half a magnitude above quiescence ($V$ = 18.68), and which displays a richer emission-line spectrum, including $\lambda$4686Å, a consequence of X-ray heating. Discussion ========== The absorption features present in our spectrum of the sum ($
arxiv
#define FM_EREPORT_ZFS_CHECKSUM "checksum" #define FM_EREPORT_ZFS_AUTHENTICATION "authentication" #define FM_EREPORT_ZFS_IO "io" #define FM_EREPORT_ZFS_DATA "data" #define FM_EREPORT_ZFS_DELAY "delay" #define FM_EREPORT_ZFS_DEADMAN "deadman" #define FM_EREPORT_ZFS_POOL "zpool" #define FM_EREPORT_ZFS_DEVICE_UNKNOWN "vdev.unknown" #define FM_EREPORT_ZFS_DEVICE_OPEN_FAILED "vdev.open_failed" #define FM_EREPORT_ZFS_DEVICE_CORRUPT_DATA "vdev.corrupt_data" #define FM_EREPORT_ZFS_DEVICE_NO_REPLICAS "vdev.no_replicas" #define FM_EREPORT_ZFS_DEVICE_BAD_GUID_SUM "vdev.bad_guid_sum" #define FM_EREPORT_ZFS_DEVICE_TOO_SMALL "vdev.too_small" #define FM_EREPORT_ZFS_DEVICE_BAD_LABEL "vdev.bad_label" #define FM_EREPORT_ZFS_DEVICE_BAD_ASHIFT "vdev.bad_ashift" #define FM_EREPORT_ZFS_IO_FAILURE "io_failure" #define FM_EREPORT_ZFS_PROBE_FAILURE "probe_failure" #define FM_EREPORT_ZFS_LOG_REPLAY "log_replay" #define FM_EREPORT_ZFS_CONFIG_CACHE_WRITE "config_cache_write" #define FM_EREPORT_PAYLOAD_ZFS_POOL "pool" #define FM_EREPORT_PAYLOAD_ZFS_POOL_FAILMODE "pool_failmode" #
github
That's the beauty of twin secondary windings, they are isolated from each other. Separating the transformers simply follows the same isolation. Unfortunately twin transformers also increases the regulation unless you choose very large transformers which have lower regulation. __________________ regards Andrew T. Sent from my desktop computer using a keyboard Q. What kind of improvement do we get by adding an extra power supply? A. By adding another power supply, you make it into a complete mono structure. It also adds more power (does not double though) and current capacity. The result is an airier, deeper soundstage and more authotity through the entire frequency range. __________________www.audiosector.com “Do something really well. See how much time it takes. It might be a product, a work of art, who knows? Then give it away cheaply, just because you feel that it should not cost so much, even if it took a lot of time and expensive materials to make it.” - JC __________________www.audiosector.com “Do something really well. See how much time it takes. It might be a product, a work of art, who knows? Then give it away cheaply, just because you feel that it should not cost so much, even if it took a lot of time and expensive materials to make it.” - JC Lets start with a transformer. I use Plitron 300VA, 2 x 22V AC in all my amps, both stereo and dual mono. It is is approx $100 for a single unit. Getting similar Avel transformer from Partsexpress will cost you $50/pc. If I order custom transformers, I prefer secondary at the core with wire diameter 1.8mm (for 300VA unit). I tested some amorphous core custom transformers and they sounded marginally better than standard core. __________________www.audiosector.com “Do something really well. See how much time it takes. It might be a product, a work of art, who knows? Then give it away cheaply, just because you feel that it should not cost so much, even if it took a lot of time and expensive materials to make it.” - JC If your transformer comes with a standard mounting hardware, that's what you use. Plitrons are epoxy filled and hardware is not included. I increase the hole
pile-cc
1814 What is the remainder when 41208 is divided by 9980? 1288 What is the remainder when 31400 is divided by 1427? 6 Calculate the remainder when 4268287 is divided by 2134100. 87 What is the remainder when 225015 is divided by 795? 30 Calculate the remainder when 379876 is divided by 2150. 1476 Calculate the remainder when 22983748 is divided by 3. 1 What is the remainder when 4010760 is divided by 104? 0 What is the remainder when 4357976 is divided by 1452657? 5 Calculate the remainder when 2674850 is divided by 241. 232 Calculate the remainder when 20622598 is divided by 2577824. 6 What is the remainder when 10916469 is divided by 18854? 3 What is the remainder when 617153 is divided by 154268? 81 What is the remainder when 144581 is divided by 461? 288 Calculate the remainder when 11983548 is divided by 59. 58 Calculate the remainder when 9517334 is divided by 1316. 22 Calculate the remainder when 7717179 is divided by 600. 579 Calculate the remainder when 1004911 is divided by 11042. 89 What is the remainder when 23312 is divided by 5764? 256 Calculate the remainder when 7193952 is divided by 337. 13 What is the remainder when 422132 is divided by 11717? 320 Calculate the remainder when 93576 is divided by 483. 357 Calculate the remainder when 697736 is divided by 22507. 19 Calculate the remainder when 3984538 is divided by 995816. 1274 Calculate the remainder when 226882701 is divided by 141. 24 What is the remainder when 108762 is divided by 359? 344 What is the remainder when 103124 is divided by 51336? 452 What is the remainder when 212616 is divided by 66? 30 What is the remainder when 6998562 is divided by 553? 347 Calculate the remainder when 31688395 is divided by 80. 75 What is the remainder when 49692389 is divided by 298? 293 What is the remainder when 3190836 is divided by 245448? 12 Calculate the remainder when 123
dm_mathematics
Check out eBiz for the scoop on Enron's involvement in U.S. Election 2000. Get the answers to your questions about the Enron PAC and Enron's corporate political contributions! Also in the current issue of eBiz: Enron teams up with the largest energy consumer on the face of the planet What's happening in the PGE/Sierra-Pacific sale See where Houston ranked in a national construction survey What Enron has to do with blues
enron_emails
DISCUSSION Turning to the substantive issues first, we view the case as primarily one of applying the clear, unambiguous and unfettered language of section 1156.7, subdivision (c), which, to repeat, provides: *371 "(c) Upon the filing with the board by an employee or group of employees of a petition signed by 30 percent or more of the agricultural employees in a bargaining unit represented by a certified labor organization which is a party to a valid collective-bargaining agreement, requesting that such labor organization be decertified, the board shall conduct an election by secret ballot pursuant to the applicable provisions of this chapter, and shall certify the results to such labor organization and employer. "However, such a petition shall not be deemed timely unless it is filed during the year preceding the expiration of a collective-bargaining agreement which would otherwise bar the holding of an election, and when the number of agricultural employees is not less than 50 percent of the employer's peak agricultural employment for the current calendar year." (Italics added.) Subdivision (b) of section 1156.7 (fn. 2, ante) establishes that an existing collective bargaining agreement shall bar a petition for election among the employees for so much of the term of the agreement as does not exceed three years. In labor law jargon this is referred to as a contract bar. It is to be noted that neither this section nor any other provision of the ALRA prohibits a one-year contract nor prescribes any other term for a collective bargaining agreement. It simply states that a contract for longer than three years will not act as a contract bar for a period in excess of that time. It does not pretend to prohibit a contract for any shorter period. Subdivision (c) of section 1156.7 (see fn. 2, ante) creates an exception to this contract bar by providing that when 30 percent of the employees in the bargaining unit under the particular contract sign a petition requesting that the labor organization be decertified the ALRB shall direct an election to be held. The crucial language as to timing of a decertification petition specifically states that "such a petition shall not be deemed timely unless it is filed during the year preceding the expiration of a collective-bargaining agreement which would otherwise bar the holding of an election. ..." (Italics added.) This language on its face explicitly permits a decertification petition to be filed at any time during the term of a one-year contract and
freelaw
If you ever plug in a charging cable and get the prompt, you know something is wrong. ~~~ zokier That is exactly what TB has. The problem is that the device private key (in many(/all?) devices) sits in the flash memory completely unprotected so anyone can clone it. ~~~ redactions It is not like ssh at all. It is a problem that secrets are kept in the flash and it is also a problem that those secrets are sent over the untrusted channel. ~~~ zokier The key is transferred only on the initial connection, after that a challenge/response mechanism is used. So from UX point of view it achieves similar TOFU, even if the technical details vary a bit. Sure, its bit worse but it is still very much trust on first use. ~~~ redactions After the device is connected, use looks like a key consistency aware system like an ssh client. It is as you note very different in the first protocol run. To extract the device secret value, an attacker needs to connect the target device to an attacker device. As you note, the thunderbolt device leaks the secret value over the untrusted channel. Impersonation of that device after that moment is trivial as a result. The entire cryptographic protocol is broken from the start. ~~~ zokier > To extract the device secret value, an attacker needs to connect the target > device to an attacker device. As you note, the thunderbolt device leaks the > secret value over the untrusted channel. If victin device is connected to attacker host, then only responses to challenges are potentially leaked. That might allow active mitm, but not cloning the key. That's the whole reason TFA needed to go poking around in flash to get the keys. Not saying that TB is the best security protocol in the universe, but as far as I can tell the vulnerabilities exposed here are mostly implementation flaws rather than protocol level issues. ~~~ redactions ssh uses asymmetric keys and the cache on the client has a three tuple (host,ip,public key) which allows a client to notice a difference in any of the three elements. By comparison, Thunderbolt leaks the entire secret as the first step and subsequent steps use derived values. ssh
hackernews
Chronic allograft rejection is the leading cause of renal and cardiac allograft failure. The Long term goal of this core is to assist investigators in acquiring the experimental data necessary for the successful investigation of this disease process. In this program project human cardiac biopsies will be extensively utilized, as well as murine cardiac grafts, for the investigation of chronic rejection; however, meaningful studies with model will require the use of standardized tissue sections, special stains, and quantitative morphometric measurements. Therefore, the short term goals of
nih_exporter
Bacteremia due to Mycobacterium abscessus, a rapid grower, belonging to the Runyon group IV, occurred in an inpatient with fever of unidentified origin in Shinshu University Hospital. To the best of our knowledge, this is the first documented case of M. abscessus bacteremia in Japan. The organism initially grew on Sheep blood agar plates after terminal-subculturing from the BacT/Alert SA aerobic blood culture bottles with no positive signal, and was subsequently
pubmed_abstracts
Polymerase chain reaction (PCR) techniques used to diagnose malaria infections include single-step, nested, multiplex and quantitative, conventional or real-time PCR formats. Other NAATs do not require thermal cyclers, the most common being loop-mediated isothermal amplification (LAMP) and nucleic acid sequence-based amplification. The sensitivity of LAMP method is reported to approach that of nested PCR \[[@CR19]\] and unlike PCR, samples for LAMP do not require extensive preparation \[[@CR20]\]. The main objective of our study was to assess the diagnostic performance of the illumigene Malaria DNA Amplification assay^®^ (Meridian Bioscience, Inc., Cincinnati OH, USA), compared to microscopy, RDT and real-time PCR for *Plasmodium* spp. detection. Methods {#Sec2} ======= Study design {#Sec3} ------------ In this study, the diagnostic performance of the illumigene assay was assessed. In the retrospective part of the study, the assay was assessed against a selection of stored samples (n = 103) obtained from international travellers, collected from June 2015 to June 2016 and external quality controls (EQC) (n = 12). The malaria RDT, microscopic evaluation and real-time PCR \[[@CR1]\] were carried out at the reference laboratory of the Institute of Tropical Medicine (ITM) Antwerp, Belgium. The illumigene assay was performed retrospectively at the clinical laboratory of the Ghent University Hospital (GUH). Furthermore, the illumigene assay was prospectively assessed between July 2016 and September 2016 on 30 samples obtained from patients suspected to have malaria infection at the clinical laboratory of the Ghent University Hospital (GUH). The malaria RDT, microscopic evaluation and illumigene assay were completed at the GUH. Thereafter, all positive and discordant samples were sent to ITM for species identification and determination of parasite density. This study complied with the standards for the reporting of diagnostic accuracy studies (STARD). Clinical samples (retrospective and prospective) {#Sec4} ------------------------------------------------ A panel of stored EDTA-anticoagulated venous whole blood diagnostic samples (n = 103) and EQC samples (n = 12) was analysed. Blood samples were obtained from returned travellers who presented at the outpatient clinic of the ITM or were submitted by diagnostic laboratories for malaria confirmation to the Central Laboratory of Clinical Biology of ITM (the Belgian reference laboratory for *
pubmed_central
I'm working on a site that has several hundred pdf files uploaded over the course of a few months. All uploads are organised in the uploads directory by year/month. The client has just decided they don't want dates in their pdf urls. Instead of having the URL site.com/app/uploads/2019/06/whatever.pdf they want the url site.com/app/uploads/pdf/whatever.pdf. Note that this only applies for pdf files. For new uploads this is easy enough. I added a filter for wp_handle_upload_prefilter that checks if the extension is pdf and changes the upload directory to uploads/pdf accordingly. However I'm not sure how to change the URL for all existing pdfs. I looked into moving all pdfs into the uploads/pdf directory and then modifying the wp_posts GUID field to reflect the new location with UPDATE `wp_posts` SET guid = CONCAT( SUBSTRING_INDEX(guid, '/uploads', 1), '/uploads/pdf/', SUBSTRING_INDEX(guid, '/', -1) ) WHERE post_mime_type = 'application/pdf' ..but this didn't work. (done on a test site). The GUIDs were changed but the URLs remained the same. How can I update the URLs of all pdf uploads without modifying URLs of any other upload type? A: It turns out the value that points to the PDFs' locations on disk is stored in the wp_postmeta table, under the meta_value field. For example a media item located at site.com/app/uploads/2019/06/whatever.pdf would have a meta_value value of 2019/06/whatever.pdf. To change the location of all PDFs I first found the IDs of all PDFs (from the ID column in the wp_posts table, selecting where post_mime_type='application/pdf) and then, for each of those IDs, found the corresponding row in the wp_postmeta table using the post_id column and updated that row's meta_value field, replacing the year/month/ with pdf/. I used a PHP script: $ids = $wpdb->get_results( "SELECT * FROM `wp_posts` WHERE post_mime_type='application/
stackexchange
However, in a case of universal-frequency networking, there is a strong interference between neighboring cells with the same frequency (hereinafter referred to as neighboring universal-frequency cells) and this kind of interference influence very much on the system performance. Especially when multiple code channels are working at a boundary between the neighboring universal-frequency cells, the universal-frequency interference is the most important interference. And at this time, the single cell joint-detection method is incapable of suppressing the neighboring universal-frequency cell interference. If the structure information of neighboring universal-frequency cells is used to expand the joint-detection method from a single cell to the universal-frequency multiple cells, the performance of the time-slotted CDMA system in universal-frequency networking will be greatly improved. The Chinese patent application 200410080196.6 proposes “a method for performing multi-user joint-detection in a neighboring cell in a TDD-CDMA system” in which channel estimation results of neighboring cells are obtained according to a multiple code set channel estimation method and code channels of neighboring cells are grouped and then the joint-detection is performed according to the channel estimation result of neighboring cells and the result of code channel grouping. If this joint-detection method is applied in the time-slotted CDMA system with multiple universal-frequency cells, the MAI between neighboring universal-frequency cells is greatly suppressed and the performance of the time-slotted CDMA system when working in neighboring universal-frequency cells is improved. This technical solution is applicable to cases when user signals in different cells are synchronous or near synchronous or with little comparative delay. Generally, there is a comparative delay between signals of universal-frequency cells. If only the interference from the cell nearest cell is taken into account, the comparative delay is small so if the channel response window of each user in different cells is obtained in its own cell, the main path can be guaranteed to be in the window and the influence of the comparative delay can be neglected. However, in a large-scale networking, the universal-frequency interference from peripheral cells should be taken into account and in a layered networking, the universal-frequency interference between macro cells and micro cells should be taken into account. For example, in a schematic diagram showing relations between main paths in the channel estimation results of users in neighboring cells and home cell shown in FIG. 2, neighboring cell 1 has a comparatively small delay □T1 with the home cell and if the channel estimation result of each user in the cell is intercepted according to the present method it can
uspto_backgrounds
Muflih al-Saji Muflih al-Saji was a Muslim commander and governor of Adharbayjan (Iranian Azerbaijan) from c. 929 to c. 935. Biography As his nisba indicates, he was a military slave of the Sajid ruler of Adharbayjan, Yusuf ibn Abi'l-Saj. After Yusuf died in 928, he was succeeded briefly as ruler by his nephew, and then by Wasif al-Shirvani in 929 as governor of Adharbayjan for the Abbasid Caliphate. He in turn was followed, likely in the same year, by Muflih. Muflih is first mentioned by Ibn al-Athir in office in 931, and held the post at least until 935, when the last coins struck in his name appear. After him the province was taken over by the Khariji Daysam ibn Ibrahim, likewise a former officer of Yusuf ibn Abi'l-Saj, in 937/8. In 929, Muflih defeated the Byzantine Domestic of the Schools, John Kourkouas, in battle. The victorious Muflih then pursued the Byzantines into their own territory. In 931, the Byzantines were engaged in southern Armenia, aiding the ruler of Vaspurakan, Gagik I, who had rallied the local Armenian princes and allied himself with the Byzantines against the local Muslim emirates; the Christian forces raided the Kaysite emirate and razed Khliat and Berkri to the ground, before marching into Upper Mesopotamia and capturing Samosata. Learning of this, Muflih assembled a "large army" and himself invaded Armenia, defeating Gagik and his Byzantine allies in a battle that according to Ibn al-Athir cost 100,000 Armenians their lives. When Daysam took power in Adharbayjan, Muflih fled to Shirvan and sought refuge with the local autonomous ruler, Abu Tahir Yazid, but the latter handed him over to Daysam to avoid trouble. References Sources Category:10th-century Arabs Category:Ghilman Category:Azerbaijan under the Abbasid Caliphate
wikipedia_en
\[sec:GRAFS\]Quantum Optimal control and Gradient Ascent in Function Space ========================================================================== For a closed, finite dimensional quantum system, the state dependence of the Schrödinger equation is often removed and the dynamics are equivalently lifted to a differential equation on the space of special unitary matrices $U \in SU(d), $ that act on the $d-$dimensional Hilbert space of quantum states. In this representation, the quantum control system is given by $$\label{system1} \dot{U}(t) = -\frac{i}{\hbar} \left( H_d + \sum_{j=1}^M \Omega_j(t)H_j \right) U(t)$$ where $H_d$ is the time-independent drift Hamiltonian and the $H_j$ are the control Hamiltonians that capture the coupling of the qubits to an externally applied control field. Denote the controlled Hamiltonian with drift as $$\label{H_Omega} H_\Omega(t) = H_d + \sum_{j=1}^M \Omega_j(t)H_j$$ The solution to (\[system1\]) must account for the non-commuting operators $\left[ H_\Omega(t_\ell) \, , \, H_\Omega(t_\ell) \right] \neq 0 \, \, \text{for} \, \, k \neq \ell $ and is formally given by the time-ordered integral $$\label{time-integral} U_\tau(\Omega) = {\mathbf T} \exp \left[ -\frac{i}{\hbar} \int_0^\tau H_\Omega(t) dt\right]$$ With initial conditions given by the identity matrix, $U_0 = \boldsymbol{1} \, , $ the solution of (\[system1\]) simply propagates the state by matrix-vector multiplication $\psi_\tau = U_\tau \cdot \psi_0 \, . $ . \[grape\_and\_GRAFS\] The quantum gate synthesis problem is to determine the control functions $\left\{ \Omega_j(t) \right\}_{j=1}^M$ that generate a desired target unitary $U_{targ}$ at some time $\tau \, . $ Optimal control typically defines an objective function that is optimized subject to a dynamical constraint and initial and final conditions on the state of the system. In quantum gate synthesis, this methodology is employed to determine
arxiv
m_is_mem_addr_addr, m_is_mem_addr, m_is_IO_addr_addr, m_is_IO_addr, m_is_near_mem_IO_addr_addr, m_is_near_mem_IO_addr, m_pc_reset_value, m_mtvec_reset_value, m_nmivec_reset_value); input CLK; input RST_N; // value method m_near_mem_io_addr_base output [63 : 0] m_near_mem_io_addr_base; // value method m_near_mem_io_addr_size output [63 : 0] m_near_mem_io_addr_size; // value method m_near_mem_io_addr_lim output [63 : 0] m_near_mem_io_addr_lim; // value method m_plic_addr_base output [63 : 0] m_plic_addr_base; // value method m_plic_addr_size output [63 : 0] m_plic_addr_size; // value method m_plic_addr_lim output [63 : 0] m_plic_addr_lim; // value method m_uart0_addr_base output [63 : 0] m_uart0_addr_base; // value method m_uart0_addr_size output [63 : 0] m_uart0_addr_size; // value method m_uart0_addr_lim output [63 : 0] m_uart0_addr_lim; // value method m_boot_rom_addr_base output [63 : 0] m_boot_rom_addr_base; // value method m_boot_rom_addr_size output [63 : 0] m_boot_rom_addr_size; // value method m_boot_rom_addr_lim output [63 : 0] m_boot_rom_addr_lim; // value method m_mem0_controller_addr_base output [63 :
github
Rate This : Nail Art Designs For Toes Images At Home And Pictures 46 out of 100 based on 288 user ratings 1 stars2 stars3 stars4 stars5 stars Nail Color. Tuesday , September 03rd , 2019 - 21:10:53 PM. Quote from angry birds nail art : You may receive an easy manicure and with the assistance of a couple accents you’re able to infuse plenty of life into it. Negative-space manicures have actually been among the significant nail design art choices for a great deal of men and women in the past couple of calendar year, as they’ve thrilled people around the world by using their innovation and beauty. A french manicure by means of a lavender rather than a white is what you will need. Stick a bit of scotch tape on a single portion of the nail and apply a yellow color on the opposite side. With wonderful nail art ideas for each exceptional occasion you’ve got or day-to-day use. Alternatively, you can opt for the safe alternatives that guarantee the successful results of your manicure session. You can also locate the alternatives of toenails tinted with flowery styles in addition to, rhinestone styles that’s a kind of 3-D toe nail style. Fashion choices will be precisely the surface of the animal or an individual pattern on every finger. Another elegant decision to finish a festive look is going to be cat eye manicure. The benefit of gel nail polish is that it’s very easy to deal with, and stays longer. Nail painting isn’t a type of art, but a craze among girls to seem cool and appealing. Then you can begin painting! It’s practical to use an acrylic paint that’s water-based so that it is easy to modify your art as you cooperate. If you adore colors and understand how to draw, then this design might be your favorite too. Matte nail colors are getting more and more popular. Silver glitter polish is an excellent investment. Unlike the prior tutorials, you are going to be using a readymade glitter polish to produce this glitter nail art design look during its very best. Any content, trademark/s, or other material that might be found on this site that is not this site property remains the copyright of its respective owner/s. In no way does LocalHost claim ownership or responsibility for such items and you should
pile-cc
-40 What is a (base 12) in base 7? 13 What is -2 (base 15) in base 6? -2 What is 0 (base 4) in base 6? 0 What is -8 (base 15) in base 16? -8 Convert 213 (base 6) to base 3. 10000 -102 (base 11) to base 7 -234 Convert -1323 (base 4) to base 13. -96 What is 12 (base 15) in base 2? 10001 Convert 313 (base 4) to base 3. 2001 Convert -1212 (base 3) to base 8. -62 Convert 1011 (base 2) to base 7. 14 What is 122 (base 8) in base 12? 6a What is 10000011 (base 2) in base 10? 131 -1 (base 16) to base 4 -1 What is -2 (base 10) in base 12? -2 Convert e (base 15) to base 16. e -10 (base 3) to base 14 -3 Convert 2 (base 10) to base 15. 2 Convert 1 (base 15) to base 9. 1 -2 (base 7) to base 11 -2 What is 7a (base 12) in base 10? 94 115 (base 9) to base 5 340 Convert -221 (base 3) to base 4. -121 10 (base 11) to base 16 b What is -2 (base 10) in base 11? -2 What is -302 (base 5) in base 9? -85 What is 2 (base 8) in base 3? 2 What is 0 (base 10) in base 13? 0 What is -1a (base 11) in base 16? -15 What is 42 (base 10) in base 9? 46 10 (base 2) to base 8 2 24 (base 10) to base 4 120 5 (base 9) to base 5 10 Convert 20 (base 3) to base 4. 12 -221 (base 3) to base 6 -41 What is -10 (base 5) in base 4? -11 Convert 0 (base 2) to
dm_mathematics
NT: No Scheduled Outages. OS/2: No Scheduled Outages. OTHER SYSTEMS: Impact: EBS Time: Fri 4/27/2001 at 8:00:00 PM CT thru Fri 4/27/2001 at 9:00:00 PM CT Fri 4/27/2001 at 6:00:00 PM PT thru Fri 4/27/2001 at 7:00:00 PM
enron_emails
See also State v. Atkinson, 279 N.C. 386, 183 S.E.2d 106 (1971); State v. Roseboro, 279 N.C. 391, 183 S.E.2d 108 (1971); State *82 v. Sanders, 279 N.C. 389, 183 S.E.2d 107 (1971); State v. Williams, 279 N.C. 388, 183 S.E.2d 106 (1971); State v. Atkinson, 279 N.C. 385, 183 S.E.2d 105 (1971). The record in the present case discloses that Judge Martin on 9 August 1971 proceeded exactly as this Court subsequently directed the Superior Court to do in Atkinson, Hill, Roseboro, Sanders, Williams, and Atkinson. Notice was issued by Judge Martin on 30 July 1971 to counsel of record for defendant Childs that on 9 August 1971, ten days from the date of the notice, further proceedings would be conducted in accordance with the mandate of the Supreme Court of the United States. On 9 August 1971 defendant, represented by counsel James E. Ferguson, II, was present in Buncombe Superior Court. While present in open court and represented by counsel, Judge Martin sentenced defendant to life imprisonment in each case pursuant to the mandate of the Supreme Court of the United States, based upon the verdicts of guilty of rape and first degree burglary returned by the jury at defendant's trial at the November 1965 Criminal Session of Buncombe Superior Court. In the imposition of these judgments, after notice and hearing, and in accordance with the mandate of the Supreme Court of the United States, we find no error. No error. BOBBITT, Chief Justice (concurring). The dissenting opinion in the present case, and the dissenting opinions of Justice Lake in State v. Hill, 279 N.C. 371, 183 S. E.2d 97; State v. Atkinson (rape), 279 N. C. 385, 183 S.E.2d 105; State v. Atkinson (murder in the first degree), 279 N.C. 386, 183 S.E.2d 106; State v. Williams, 279 N. C. 388, 183 S.E.2d 106; State v. Sanders, 279 N.C. 389, 183 S.E.2d 107; State v. Roseboro, 279 N.C. 391, 183 S.E.2
freelaw
~~~ chancho > To accommodate peak demand, Netflix would have to do what Blockbuster does: > order a metric truckload of Wolverine, then either let it suck up shelf > space or dispose of it somehow after the spike was over Or just burn more copies. The cost of a disc is probably less than the postage. But they'd have to get a license for that, which leads back to same reason: studios charge more for popular movies. Renting good movies on Netflix is hard for the same reason it's hard on iTunes, which has no inventory problem. ~~~ jrockway Netflix doesn't even need to burn discs, they already have the video streaming infrastructure in place. The studios don't want people to watch their movies. They want people to pay for the discs. ------ tlb And? Of course popular movies are in high demand, so the rental queue is longer. They avoid showing you movies that would cause a long wait. The movies on Netflix's list are probably better than the new releases. In fact, the real manipulation is the idea of new releases, that half the demand should be for this season's movies. The actual best movies of all time are probably not on this week's best sellers list. It's a Hollywood marketing artifact: because buzz causes a superlinear advertising conversion rate, it works best to promote movies in short bursts. New releases also skew revenue from rental stores towards Hollywood (since rental stores have to buy enough for peak demand) so you can't blame Hollywood for doing it. ~~~ icefox After hacking on the netflix contest it was fun to sign up for netflix and give the recommendation system a try. After putting in several hundred movies I now typically only choose recommendations that it thinks I would rate a 4 or 5. Most are good and rank about what they think I will. This includes plenty of older movies including some silent films which I absolutely loved after seeing them where before I would have never even considered watching them. On the flip side the brand new movie of the month that I _must see_ and added to the top of my que I end up ranking much lower on average. So I would very much agree, on a given week I don't want to watch the new dvd/movie that just came out as it probably
hackernews
Abstract The long-term goal of this project is to develop a noninvasive treatment for hypertrophic obstructive cardiomyopathy (HOCM). Focused ultrasound (FUS) is a promising technique for noninvasive thermal ablation. The effort proposed here addresses the main technical challenges to using focused ultrasound therapy in the heart. Specifically, we aim to 1) evaluate the efficacy of magnetic resonance (MR) guided phased array focused ultrasound (FUS) therapy to non- invasively ablate the myocardium, including strategies
nih_exporter
It is known affective disorders are changing the perception of time. The study of time perception in patients with affective disorders enables researchers to make early diagnostic criteria for these conditions, as well as to shed light on possible mechanisms for the development of affective disorders. 20 patients with bipolar affective disorder type II in accordance with the DSM-5 criteria (10 patients with a predominance of anxiety and 10 patients with a predominance of psychomotor retardation) and 10 healthy subjects were recruited to the study. Test for measuring
pubmed_abstracts
The size and size distribution of the micelles were determined by a dynamic light scattering (DLS) spectrometer (Zetasizer Nano ZS; Malvern Instruments, Malvern, UK) at 25°C. Each sample was measured three times to attain the average size. The morphology of NPs was observed by scanning electron microscopy (SEM) and transmission electron microscopy (TEM). Synthesis of star-shaped biodegradable 4sPLMBz random polymer ------------------------------------------------------------- In brief, prescribed amounts of pentaerythritol benzyl (0.03 g, 0.27 mmol), [l]{.smallcaps}-LA (2.14 g, 14.82 mmol), and RS-β-benzyl malolactonate (1.15 g, 5.58 mmol) with 0.1 wt% (respect to the total weight of monomers) stannous octoate as a catalyst were added into polymerization tubes under nitrogen atmosphere. The tubes were then sealed under vacuum and placed into an oil bath at 120°C for 24 hours. The viscous liquid (4sPLMBz) was dissolved in chloroform and precipitated into ethyl ether. The white precipitates were obtained after removing the solvents. The product was confirmed using ^1^H-NMR. Synthesis of biodegradable star-shaped mPEG-4sPLMBz copolymers -------------------------------------------------------------- mPEG2000 (1 g, 0.5 mmol), 4sPLMBz (1.5 g, 2.5 mmol), and DMAP (0.015 g, 0.123 mmol) were dissolved in anhydrous dichloromethane (DCM) (20 mL) under nitrogen atmosphere, and DCC (5 g, 0.0243 mol) was dissolved in DCM (10 mL) and added dropwise into the mixture in an ice bath and stirred for 1 hour. After being stirred for 48 hours, the reaction solution was filtered, saturated, and precipitated in cold anhydrous diethyl ether. To remove the excess mPEG, the solution was packaged into a dialysis bag (Mw =3,500 g/mol) and was dialyzed exhaustively against DCM. Finally, the powder was dried under vacuum. Synthesis of cRGD and disulfide-bearing PEG-ss-4sPLMBz copolymers ----------------------------------------------------------------- Synthesis was done in two steps. First, the disulfide-functionalized PEG2000 (Mal-PEG2000-ss-COOH)
pubmed_central
How to find out the cause of an Oracle deadlock When testing my application with multiple users, I have encountered an ORA-00060 deadlock error. I'm not sure how to determine the cause of this error, so if anyone could help me it would be greatly appreciated. I looked in the trace file generated for this event and it shows me which query caused this: UPDATE TABLE_A SET CK=CK+1 WHERE A_ID=( SELECT A_ID FROM TABLE_B WHERE SOME_COLUMN=:SOMECOLUMN ) It also generated this: [Transaction Deadlock] The following deadlock is not an ORACLE error. It is a deadlock due to user error in the design of an application or from issuing incorrect ad-hoc SQL. The following information may aid in determining the deadlock: Deadlock graph: ---------Blocker(s)-------- ---------Waiter(s)--------- Resource Name process session holds waits process session holds waits TM-0002a675-00000000 51 200 SX SSX 52 22 SX SSX TM-0002a675-00000000 52 22 SX SSX 51 200 SX SSX session 200: DID 0001-0033-0000014A session 22: DID 0001-0034-0000005A session 22: DID 0001-0034-0000005A session 200: DID 0001-0033-0000014A Rows waited on: Session 200: obj - rowid = 0002A6B1 - AAAqaxAAUAAAAFTAAA (dictionary objn - 173745, file - 20, block - 339, slot - 0) Session 22: obj - rowid = 0002A6B1 - AAAqaxAAUAAAAFTAAA (dictionary objn - 173745, file - 20, block - 339, slot - 0) How do I use the above information to find out what caused the problem? There aren't any unindexed foreign keys on either TABLE_A or TABLE_B (which I believe is commonly the cause of this type of error). When I run this query: SELECT OWNER, OBJECT_NAME, OBJECT_TYPE FROM DBA_OBJECTS
stackexchange
Axial and radial holding assemblies for blades, such as that described in French Pat. No. 2 345 605, consisting of a block that is placed between the blade foot and the bottom of the groove so as to hold the upper part of the blade foot dovetailed against the side teeth of the groove, with the block being held axially by a U-shaped lock cooperating with corresponding notches provided in the blade foot and in the teeth of the groove, are well-known and the system shown therein is simple and effective. To facilitate or even make possible the assembly and dismantling of the unit, there nonetheless is some play between the block, the blade foot and the bottom of the groove (at least for most blades). This play proves to be harmful from the viewpoint of wear. Indeed, during self-rotation or low-speed rotation of the rotor, the centrifugal force exerted on the blades is no longer sufficient to keep the blade feet pressed against both oblique faces of the grooves. With each turn, the blades go from a position of resting on one side of the seating to a position of resting on the other side. This produces chatter and, what is more serious, hammering, which does serious damage to the surfaces in contact with one another. If such hammering is difficult to accept even for parts that are easily replaceable, such as the blocks or even the blades, it is impossible for the rotor disk, for which such damage is entirely unacceptable. Hence, French Pat. Nos. 2 300 215 and 2 426 151 offer solutions that make use of blocks having an elastic part able to maintain permanent contact between the blade foot and the groove. The block described in the first patent cited consists of three lengthwise, independent parts, two lateral parts, and one central part. The two lateral parts have on the ends of two adjacent faces a plurality of flanges provided so as to be able to press against the front or rear face of the disk, on either side of the groove and against the radial ends of the blade feet. These two symmetrical parts are introduced into the space between the blade foot and the bottom of the groove and are held apart by the central part having a shape approximately complementary to the remaining space. This part includes a housing that receives an elastic member resting against the bottom of the groove. The three parts are unitarily connected with a bolt after being put in place. The second patent cited describes a block having two lateral parts identical to those of the preceding patent, but a central part consisting of two
uspto_backgrounds
Fighters Uncaged Fighters Uncaged is a fighting video game for the Xbox 360 Kinect system. It was developed by AMA Studios and published by Ubisoft in November 2010. Fighters Uncaged was one of the first twelve games released for the Kinect. The game has the player control Simon, a man who is attempting to win an illegal fighting tournament to help get his father out of trouble with a crime lord. It has one game mode and features many different fighting moves and different settings and opponents. Simon is able to go up in leagues by obtaining certain numbers of points, which in turn unlock more scenarios and opponents. Following its release, Zuffa filed a lawsuit against Ubisoft for the usage of a trademarked term. Fighters Uncaged received poor reviews from critics, with many criticizing the tutorial and visuals, and citing its motion control system as the biggest issue they had with the game, which many considered to be broken. Gameplay Fighters Uncaged is a single-player-only fighting game controlled using the Kinect, a motion sensing input device. The player controls the protagonist of the game, Simon, through his attempts to win an illegal fighting tournament to help get his father out of trouble with a crime lord. The game features one gamemode called "Fight" which is only accessible after completing the tutorial. Fighters Uncaged is played in an over-the-shoulder perspective, with the opponent being on the opposite side. Simon is able to do a range of different actions, including short and long punches, kicks, blocks, dodges, and headbutts. The player can execute special moves via shouting in the direction of the Kinect, once the corresponding bar is full. Fighting consists of looking for telegraphs in the movements of one's opponents to figure out when to dodge or block attacks, then hitting them while they are vulnerable. In the early stages of Fighters Uncaged, it is made less difficult to read the telegraphs of the opponent, but as the player progresses, they become increasingly imperceptible. The moves Simon can complete depend on where the opponent is at the time, and therefore only certain moves will land hits at particular moments. Fighters Uncaged features different leagues, with higher leagues being reached by having a certain number of points. Points are obtained by defeating the opponent, while having a good score. Good scores are attained by accomplishing counteratt
wikipedia_en
For the second term on the right of , the argument in the proof of Proposition \[prop6a\], together with Theorem \[thm4a\], gives that, for any $q>2$ and $p$ conjugate to $q$, $$\begin{aligned} &&{\operatorname{E}\left[\left|\left(\d h(X_t)-\Pi_{\gamma_{X_t,Y_t}}\d h(Y_t)\right)(V_t)\right|\right]}\\ &\leqslant&C_1(h){\operatorname{E}\left[\rho(X_t,Y_t)^p\right]}^{1/p}{\operatorname{E}\left[|V_t|^q\right]}^{1/q}\\ &\leqslant&C_1(h)\rho(x,y)e^{-\kappa t}{\operatorname{E}\left[|V_t|^q\right]}^{1/q}.\end{aligned}$$ The condition for $\kappa$ implies in particular that $\kappa>11c_2^2/6$. Then, there is $q\in(2,3)$ such that $$5\kappa\geqslant(4q-2)c_2^2\,\,\,\hbox{ and }\,\,\,3\kappa\geqslant(2q-2+m)c_2^2+mc_2+(5\sqrt mc_2^2+c_2C_0(\phi)+C_2(\phi))/2.$$ For such a choice of $q$, we have that $\tilde\alpha_{2q}$ is bounded above by $\kappa/2$ and $\lambda_1+\tilde\alpha_{2q}-c_2^2$ in Lemma \[lem7\] is bounded above by $\kappa$, so that the corresponding $\tau_q$ is bounded by $\kappa$. In addition, $$\begin{aligned} &&\tilde\alpha_{2q}-(\lambda_1-c_2^2)\leqslant\tilde\alpha_{2q}+c_2^2-\frac{7}{2}c_2^2<-2\kappa+6c_2^2-\frac{7}{2}c_2^2\\ &=&-2\kappa+\frac{5}{2}c_2^2\leqslant-2\times\frac{11}{6}c_2^2+\frac{5}{2}c
arxiv
// possiblyAtEnd checks whether the decoder may be at the end of the stream. func (d *rangeDecoder) possiblyAtEnd() bool { return d.code == 0 } // DirectDecodeBit decodes a bit with probability 1/2. The return value b will // contain the bit at the least-significant position. All other bits will be // zero. func (d *rangeDecoder) DirectDecodeBit() (b uint32, err error) { d.nrange >>= 1 d.code -= d.nrange t := 0 - (d.code >> 31) d.code += d.nrange & t b = (t + 1) & 1 // d.code will stay less then d.nrange // normalize // assume d.code < d.nrange const top = 1 << 24 if d.nrange >= top { return b, nil } d.nrange <<= 8 // d.code < d.nrange will be maintained return b, d.updateCode() } // decodeBit decodes a single bit. The bit will be returned at the // least-significant position. All other bits will be zero. The probability // value will be updated. func (d *rangeDecoder) DecodeBit(p *prob) (b uint32, err error) { bound := p.bound(d.nrange) if d.code < bound { d.nrange = bound p.inc() b = 0 } else { d.code -= bound d.nrange -= bound p.dec() b = 1 } // normalize // assume d.code < d.nrange const top = 1 << 24 if d.nrange >= top { return b, nil } d.nrange <<= 8 // d.code < d.nrange will be maintained return b, d.updateCode() } // updateCode reads a new byte into the code. func (d *rangeDecoder) updateCode() error { b, err := d.br.ReadByte() if
github
warmth; redness; oozing; or pain. Less serious side effects may include mild irritation around the catheter. This is not a complete list of side effects and others may occur. Call your doctor for medical advice about side effects. You may report side effects to FDA at 1-800-FDA-1088. Sodium Chloride (Generic) Interactions Follow your doctor's instructions about any restrictions on food, beverages, or activity. Avoid becoming overheated or dehydrated during exercise and in hot weather. Follow your doctor's instructions about the type and amount of liquids you should drink. In some cases, drinking too much liquid can be as unsafe as not drinking enough. Follow your doctor's instructions about any restrictions on food, beverages, or activity. Tell your doctor about all medicines you use, and those you start or stop using during your treatment with sodium chloride, especially: potassium supplements; a diuretic or "water pill"; a steroid such as prednisone, fluticasone, mometasone, dexamethasone, and others; blood pressure medication; or medication that contains sodium, such as Alka-Seltzer or Zegrid (omeprazole and sodium bicarbonate). This list is not complete. Other drugs may interact with sodium chloride, including prescription and over-the-counter medicines, vitamins, and herbal products. Not all possible interactions are listed in this medication guide. There may be other drugs that can interact with sodium chloride. Tell your doctor about all medications you use. This includes prescription, over-the-counter, vitamin, and herbal products. Do not start a new medication without telling your doctor. It is not likely that other drugs you take orally or inject will have an effect on sodium chloride used to flush your catheter. But many drugs can interact with each other. Tell your doctor about all medications you use. This includes prescription, over-the-counter, vitamin, and herbal products. Do not start a new medication without telling your doctor. Sodium Chloride (Generic) Dosage Follow all directions on your prescription label. Do not use this medicine in larger or smaller amounts or for longer than recommended. Sodium chloride inhalation is given using a nebulizer. You will inhale the medication through a face mask, mouth piece, or
pile-cc
What is thirty-seven halves of a millennium in centuries? 185 How many hours are there in 715.8406 days? 17180.1744 Convert 0.5160768 nanograms to milligrams. 0.0000005160768 What is one fifth of a meter in millimeters? 200 How many grams are there in 7/4 of a kilogram? 1750 How many microseconds are there in 66.72109 days? 5764702176000 How many micrometers are there in 0.8783048 kilometers? 878304800 How many millennia are there in 59135.76 months? 4.92798 How many nanometers are there in 209415.3 centimeters? 2094153000000 What is 3/50 of a millimeter in nanometers? 60000 How many milliseconds are there in 1.358812 nanoseconds? 0.000001358812 How many millennia are there in 741.45 months? 0.0617875 What is 53/5 of a kilogram in grams? 10600 Convert 858086.3cm to meters. 8580.863 How many meters are there in 6/5 of a kilometer? 1200 How many nanograms are there in 723935.2g? 723935200000000 How many years are there in 0.2671376 decades? 2.671376 What is 5/8 of a litre in millilitres? 625 Convert 222210.8mm to meters. 222.2108 How many milliseconds are there in 0.2579328 hours? 928558.08 How many grams are there in seventeen halves of a kilogram? 8500 What is 1/5 of a litre in millilitres? 200 How many hours are there in 69078.77 weeks? 11605233.36 Convert 13369.91nm to kilometers. 0.00000001336991 How many nanometers are there in 80.31603 micrometers? 80316.03 How many micrograms are there in 92.81581 nanograms? 0.09281581 What is three fifths of a centimeter in micrometers? 6000 Convert 0.545462l to millilitres. 545.462 What is 7/3 of a
dm_mathematics
I am getting increasingly concerned about the MetGas equity sale and the pace at which it is proceeding. We discussed this last week and I thought the consensus was to slow this process down and exclude partners who could impede our strategic global LNG interests -- for example Petronas and BP Amoco. I now understand that we are making presentatations on the equity sale to potential investors next week in Singapore (BP, Petronas
enron_emails
909 F.2d 1482 Unpublished DispositionNOTICE: Sixth Circuit Rule 24(c) states that citation of unpublished dispositions is disfavored except for establishing res judicata, estoppel, or the law of the case and requires service of copies of cited unpublished dispositions of the Sixth Circuit.Stanley BOSWELL, Plaintiff-Appellant,v.Lou MYERS; Hael Miller, Defendants-Appellees. No. 89-2159. United States Court of Appeals, Sixth Circuit. Aug. 9, 1990. 1 Before MILBURN and RALPH B. GUY, Jr., Circuit Judges; and LEON JORDAN, District Judge.* ORDER 2 Stanley Boswell, a pro se Michigan prisoner, moves for the appointment of counsel and appeals the district court's dismissal of his civil rights complaint filed pursuant to 42 U.S.C. Sec. 1983. This case has been referred to a panel of the court pursuant to Rule 9(a), Rules of the Sixth Circuit. Upon examination of the record and the briefs, this panel unanimously agrees that oral argument is not needed. Fed.R.App.P. 34(a). 3 Seeking monetary relief, Boswell sued two state officials at the Huron Valley Men's prison alleging that while he was confined in segregation they violated his eighth amendment rights and a prison policy directive by not allowing him any out-of-cell movement (yard time). Boswell was on loss-of-privileges status because of six major misconduct charges. Defendants filed a motion to dismiss and plaintiff filed a response. In a comprehensive report, the magistrate construed defendants' motion as one for summary judgment and recommended the motion be granted, finding that Miller had no personal involvement in the alleged deprivation, and that Myers did not violate Boswell's rights because the yard time restrictions were reasonable and in accord with prison regulations given the nature of Boswell's misconduct record. Upon de novo review, the district court adopted the magistrate's recommendation and granted the defendants summary judgment, thereby dismissing the complaint. 4 Boswell did not file specific objections to the magistrate's report as required by United States v. Walters, 638 F.2d 947, 949-50 (6th Cir.1981). He has therefore waived his right to appeal. 5 Accordingly, the motion for counsel is denied and the district court
freelaw
~~~ Lazare Your argument is circular. You're saying that we shouldn't talk about pay, because when we talk about pay we get paid like Buffer devs do, which you think is obviously low compared to other salaries, which we can't actually prove because _we don 't talk about pay_. It's a bit like telling someone that you're giving them $100 in a box, but not to open the box, because if you open it, it'll turn into $20. "You can only have a high salary if you have no way to verify that it's high." Even if true, where does that leave us? ~~~ morgante > which we can't actually prove because we don't talk about pay. Just because salaries aren't public doesn't mean you can't get any salary information. Just go on a few interviews, set up an auction, and see what you can get. > It's a bit like telling someone that you're giving them $100 in a box, but > not to open the box, because if you open it, it'll turn into $20. It's a cute analogy, but the more complete version would include a box market, where other people with insight into the box market are interested in buying the box I've been given. In such a scenario, I could shop around my box to see what it's actually worth without having to open it up. ~~~ Lazare I dunno, let's try the more complete version: "There's $100 in this box. You can't open it, or look inside it, but trust me, it's there. Now you need to go over to my mate George, and give him the box, and he'll give you $100 for it. But only if you haven't opened it!" Now it just sounds like you're being recruited as a drug mule. :) Okay, granted, in your scenario their are multiple box dealers who are willing to bid on your unopened-but-totally-contains-$100 box. If you work at it, it's quite possible that you might even get some semblance of a fair offer. But should you need to work at it? And this still feels like a system which lends itself to collusion, uncertainty, and unfairness
hackernews
TOR was discovered as the largest of Rapamycin; the latter is a potent and clinically important immunosuppressive and potential antiproliferative drug. All of rapamycins pharmacologic actions appear to he due to its ability to inhibit TOR function. TOR is a giant protein kinase in the PIK family, whose catalytic domain is closely related to the Ataxia Teleangiectasia gene product (ATM). TOR was first identified in S. Cerevisiae where it controls cell growth
nih_exporter
Nursing is a profession that has always been accompanied with common ethical concerns. There are some evidences which indicate that narrative writing on traumatic experiences may improve an individual's emotional health. This study aimed to determine the effectiveness of narrative writing on moral distress of nurses working in intensive care unit. This study was a clinical trial with pre- and post-test design. The frequency and intensity of moral distress was measured by a valid and reliable questionnaire (Corely) at baseline and after 8 weeks. The
pubmed_abstracts
It is important to apply a discrete choice experiment (DCE) in prioritizing the characteristics according to patients' perspective. DCE potentially is useful to extract the priorities in providing health care. This method estimates the importance of different features that health has and overall it measures satisfaction or benefit from the services. Discrete choice experiment can estimate the characteristics of the various services and how we evaluate these characteristics and their replacements (substitution).DCE depends on the following assumptions first, it assumes that each service can be described by different attributes and second they serve different characteristics depending on their nature. DCE compared with direct measurement of willingness to pay have more important data acquired because it detects characteristics of products or services and shows how these characteristics affect the utility, and due to characteristics compared QALY has a better and wider framework for measuring the utility ([@A12851R6]). 2. Objectives {#sec25599} ============= Due to the uniqueness of characteristics of the health centers, and the importance of patient's opinion and their association in the decision-making process, this research prioritizes the hospital services quality according to the patients' point of view in terms of measuring the patients attitude and by also applying the logistic model. fo 3. Materials and Method {#sec25600} ======================= The main objective of this study is recognizing the patients' priority to receive hospital services applying the Logit econometric model. The Logit(logistic regression)model is simply a non-linear transformation of the linear regression. The \"logistic\" distribution is an S-shaped distribution function which is similar to the standard-normal distribution (which results in a probit regression model) but easier to work with in most applications (the probabilities are easier to calculate). The logit distribution constrains the estimated probabilities to lie between 0 and 1. In the formula Y stands for utility and is our dependent variable; X is our independent variable; X~1~ stands for waiting time from arrival until hospital admission; X~2~is for the handling of patients by medical staff at the hospital;X~3~ is for examination type;X~4~is for personnel behavior; and X~5~ is for sector and toilets cleaning; and α is the Intercept. This study is a descriptive cross-sectional study, and in term of the results it can be classified to an applied study, where the data were collected by a questionnaire. Designing of the questionnaire, characteristics, and different level
pubmed_central
else { ba = Double.valueOf(kwhDisplay1.getText().toString()); ea = Double.valueOf(kwhDisplay2.getText().toString()); zwischen = ((ea-ba)/differ)*30.41666666666667; textView5.setText(String.valueOf(formatter.format(zwischen))); } } //Methode zur Berechnung der kWh-Differenz im Zeitraum für vierteljahr private void berechnequarter(){ if (kwhDisplay1.getText().toString().isEmpty() || kwhDisplay2.getText().toString().isEmpty()) { Toast.makeText(getActivity(), R.string.beideeingeben, Toast.LENGTH_SHORT).show(); } else if (dateDisplay1.getText().toString().isEmpty() || dateDisplay2.getText().toString().isEmpty()){ Toast.makeText(getActivity(), R.string.hintdateset, Toast.LENGTH_SHORT).show(); } else { ba = Double.valueOf(kwhDisplay1.getText().toString()); ea = Double.valueOf(kwhDisplay2.getText().toString()); zwischen = ((ea-ba)/differ)*91.25; textView5.setText(String.valueOf(formatter.format(zwischen))); } } //Methode zur Berechnung der kWh-Differenz im Zeitraum für Halbjahr private void berechnehalf(){ if (kwhDisplay1.getText().toString().isEmpty() || kwhDisplay2.getText().toString().isEmpty()) { Toast.makeText(getActivity(), R.string.beideeingeben, Toast.LENGTH_SHORT).show(); } else if (dateDisplay1.getText().toString().isEmpty() || dateDisplay2.getText().toString().isEmpty()){ Toast.makeText(getActivity(), R.string.hintdateset, Toast.LENGTH_SHORT).show(); } else { ba = Double.valueOf(kwhDisplay1.getText().toString()); ea = Double.valueOf(kwhDisplay2.getText().toString());
stackexchange
Various conventional methods for monitoring or limiting the duration of a call exist. For example, many conventional business-style phones, such as those connected to private branch exchanges (PBX), include a timer, which is activated when a phone call begins. By monitoring the display, a caller can determine the running duration of the call and end the call when the desired duration has expired. However, the phone itself includes no mechanism to limit the duration of the call and neither does the underlying telecommunications system. The phone merely provides an indication of the length of the call. For a subscriber wishing to limit the duration of calls by other parties, an indicator provides little value. Another indicator of call duration is the periodic phone bill. The phone bill provides feedback to the subscriber of the duration of calls to various directory numbers. However, the phone bill is historical and provides no ability to limit the duration of currently-occurring calls. Other methods exist for limiting the actual duration of calls. For example, the patent granted Nguyen, et. al., U.S. Pat. No. 5,815,561, describes “a method and system for apprising the parties to a communication of the duration of the communication while the communication is in progress.” Nguyen dismisses having a caller set up a call demarcation as inefficient and time-consuming. Also, Nguyen does not teach demarcation for a call terminating at the subscriber's phone. Conventional methods and systems also provide for limiting a call placed using a prepaid calling card. A subscriber provides the prepaid calling card number when placing the call. Based on the billing rate for a particular phone call, an the duration of the call is calculated as a time period equal to the monetary value on the prepaid card divided by the billing rate for the call. If the time period expires during the call, the call is disconnected. In any event, when the call ends, the duration of the call is deducted from the prepaid card balance. In comparison to a caller-controlled demarcation, several limitations exist when using prepaid cards. One obvious limitation of a prepaid calling card is that the card must be purchased before a call can be placed using the card. Also, the card must be replaced or have value added when the monetary value of the card is depleted. Additionally, a caller may apply the monetary value of the prepaid card to any call. No system or method exists to limit specific calls to only a portion of the prepaid card or to only specific directory numbers
uspto_backgrounds
Lord Brennan is the Bar representative on the Council of the International Bar Association. He is also a member of the bars of the Republic of Ireland and Northern Ireland. In 2000, The Lawyer Magazine described him as Barrister of the Year. Lord Brennan is Chair of the APPG on Legal and Constitutional Affairs, which is a cross party grouping of MPs and Peers with Parliament focussed on discussing issues relating to the legal profession and the reform of the law and constitution. He has an environmental, product liability and medical negligence practice involving multi-party actions such as the insurance claims from the Paddington rail crash, the combined oral contraceptive pill litigation and, in the past, the local residents' claims arising from the Canary Wharf development scheme, the HIV/haemophiliac claims against the UK government and the Herald of Free Enterprise disaster. Most recently he has appeared in the 'designer baby' appeal in the House of Lords. He was created Baron Brennan, of Bibury in the County of Gloucestershire on 2 May 2000 and is president of the Catholic Union of Great Britain. In 2006 Lord Brennan was appointed Delegate for Great Britain and Ireland of the Sacred Military Constantinian Order of Saint George in succession to Anthony Bailey. On 19 November 2007 Brennan collapsed in the House of Lords shortly after concluding a speech on the Human Fertilisation and Embryology Bill. He was given heart massage in the House of Lords by, among others, Ara Darzi, Baron Darzi of Denham, the health minister. He had urged the creation of a National Bioethics Commission. Lord Brennan spent time recovering at St Thomas' Hospital, London. On 3 December 2007 Lord Brennan again became unwell in the Chamber of the House of Lords. Having been fitted with a pacemaker at St Thomas' Hospital, he was thanking peers and staff who had been involved in the occasion when he was last taken ill, when he fell back in his seat. Personal life In 1968 he married a Spanish national, Pilar Sánchez Moya, with whom he has four sons. Affiliations Lord Brennan is the chairman of the board of directors of the Washington-based think-tank Global Financial Integrity. Arms References Category:1942 births Category:Living people Category:Labour Party (UK) life peers Category:Alumni of the University of Manchester Category:British Queen
wikipedia_en
![ Characterization of the device. (a) Logarithmic two-terminal conductance as a function of the left and right finger gate (middle finger gate is unbiased). The conductance map can be divided into four regions: The single-dot regime () with a zoom-in show in (c), the two pn-double-dot regimes () and () with zoom-ins shown in (b) and (e), respectively, and the pnp-triple-dot regime () with a zoom-in shown in (d). Schematics on top of (b-d) indicate n-type (red) and p-type (blue) QDs connected to n-type source (S) and drain (D). Dashed lines in (b,e) outline the hexagonal structure of the charge stability diagram in the double-dot regimes. Inset: Scanning force micrograph of the split gate (brown) forming the channel and finger gate (yellow) structure on top of the encapsulated bilayer graphene flake (dashed lines). Grayed-out gates are not used, while the voltages applied to gates labeled L, M, and R are varied. ](Fig1_v2.pdf){width="45.00000%"} When a p-type QD forms below both gates L and R, we reach the pnp-triple-dot regime in quadrant . The zoom-in shown in Fig. 1(d) shows three distinct sets of resonances: vertical (horizontal) resonances of the p-type QD below gate L (R) and diagonal resonances of the n-type QD in the middle. The schematic in Fig. 2(a) shows the situation for a triple-dot formed along the channel. The positive back-gate voltage ($V_{BG} = 5 \ \mathrm{V}$) induces a finite electron density inside the channel. By applying a negative voltage to any of the finger gates, the electron density underneath the respective gate can be reduced. At some point, the electron gas below the finger gate is completely depleted (Fig.2(b)) and transport through the channel is pinched off. Reducing the finger gate voltage further, a finite hole density is induced, forming small p-type island inside the n-type channel (Fig.2(c)). The resulting pn-junctions provide natural tunnel barriers such that a p-type QD can be formed under each of the finger gates [@eich_spin_
arxiv
//@import "~@microsoft/sp-office-ui-fabric-core/dist/sass/SPFabricCore.scss"; // exporting all these variables allows us to pick-up // these values from within the code // (we're trying to avoid hard-coding styles in the code) :export { defaultFontColor: $ms-color-neutralSecondary; defaultFontFamily: $ms-font-family-fallbacks; defaultFontSize: $ms-font-size-m; lineColor: $ms-color-neutralLighter; titleColor: $ms-color-neutralSecondary; titleFont: $ms-font-family-fallbacks; titleFontSize: $ms-font-size-m; legendColor: $ms-color-neutralTertiary; legendFont: $ms-font-family-fallbacks; legendFontSize: $ms-font-size-s; tooltipFontSize: $ms-font-size-s; tooltipFont: $ms-font-family-fallbacks; tooltipBodyColor:$ms-color-white; tooltipTitleFont: $ms-font-family-fallbacks; tooltipTitleColor: $ms-color-white; tooltipTitleFontSize: $ms-font-size-s; tooltipFooterColor: $ms-color-white; tooltipFooterFont: $ms-font-family-fallbacks; tooltipFooterFontSize: $ms-font-size-s; tooltipBackgroundColor: $ms-color-neutralPrimary; tooltipBorderColor: $ms-color-neutralPrimary; scaleFontColor: $ms-color-neutralSecondary; scaleFont: $ms-font-family-fallbacks; scaleFontSize: $ms-font-size-s; } .chartComponent { &.themed { background-color: "[theme: bodyBackground, default: #ffffff]"; } } // Renders an invisible table to everyone but people who use a screen reader .accessibleTable { position: 'absolute'; left: -10000; top: 'auto'; width: 1;
github
John Phillip Santos, the first Latino Rhodes Scholar, is a San... Photo-390751.70913 - San Antonio Express-News Image 11 of 18 Isabel Allende, the author of such best-sellers as "The House of the Spirits" and "Daughter of Fortune," has written 20 books that have been translated into 35 languages. Allende has sold more than 57 million books. They've been adapted for movies, plays, musicals, operas and ballets. She created the Isabel Allende Foundation in 1992 to empower women and girls worldwide. A native of Chile, Allende's cousin was President Salvador Allende, who died in 1973 in a military coup led by dictator Gen. Augusto Pinochet. She fled Chile in 1975 and ultimately immigrated to the United States.– Elaine Ayala less Isabel Allende, the author of such best-sellers as "The House of the Spirits" and "Daughter of Fortune," has written 20 books that have been translated into 35 languages. Allende has sold more than 57 million ... more Isabel Allende, the author of such best-sellers as "The... Photo-676320.70913 - San Antonio Express-News Image 12 of 18 Victor Villaseñor's best-known works are the memoir "Burro Genius," and the highly acclaimed novel, "Rain of Gold," a family saga set during the Mexican Revolution. The Los Angeles Times compared his early novel,"Macho!" to "the best of John Steinbeck."– Elaine Ayala less Victor Villaseñor's best-known works are the memoir "Burro Genius," and the highly acclaimed novel, "Rain of Gold," a family saga set during the Mexican Revolution. The Los Angeles Times compared his early ... more Photo: Brett Coomer, Staff Victor Villaseñor's best-known works are the memoir... Photo-3746965.70913 - San Antonio Express-News Image 13 of 18 Domingo Martinez. Raised in Brownsville, Domingo Martinez is the Seattle-based author of the memoir “The Boy Kings of Texas,” which was a finalist for the 2013 National Book Award, the 2013 Pushcart Prize and was a Gold Medal Winner for the Independent Publisher Book Awards. – Steve Bennett less Domingo Martinez. Raised in Brownsville, Domingo Martinez is
pile-cc
8 Suppose -351*u - 127*u + 14818 = 0. Solve 23*x = u*x - 56 for x. 7 Let g = 9 - 5. Suppose -23*t + 20*t - 3 = 0, -5*v + 42 = -2*t. Suppose 2*m + v = 4*d, 0 = 7*d - 8*d - 4*m + 20. Solve 4*k = d + g for k. 2 Suppose 578 = 4*w + 43*w - 4592. Solve -73*j + w = -18*j for j. 2 Let n(h) = 6*h**2 + 2*h + 1. Let c be n(-1). Let j be (-1)/(45/10 - c). Solve j*r + 0*r = 4 for r. 2 Let p(b) = b**3 - 3*b**2 - 14*b + 1. Let y be p(8). Let z = y - 196. Solve l - 14 = -z for l. 1 Suppose -37*t = -7*t - 30. Let h be (t - (-5)/3)*105/70. Solve 0 = -f + h - 3 for f. 1 Suppose -2907 - 310 = -59*j + 4748. Solve 38*z = 11*z + j for z. 5 Suppose -10*k + 9*k + 3*g = 18, k + 4*g + 11 = 0. Let x be 6/10 + (-81)/k. Solve x*a + 8 = -22 for a. -5 Let f = 19 - 14. Suppose f*w = 7*w. Solve 2*s + w*s = -6 for s. -3 Suppose -3*f - 29 = -4*t + 21, -5*t + 2*f + 66 = 0. Solve t*q = -89 + 131 for q. 3 Suppose -5*c + 5*v = -1100, 2*v = 5*c - 1196 + 99. Let k = c + -217. Solve 2*p = -k*p - 20 for p. -5 Let p be (-7 - -4)*(-4 + (-1
dm_mathematics
The Federal Energy Regulatory Commission rejected two key elements of Southern Company Services, Inc.'s proposed Regional Transmission Organzation (RTO) and encouraged the company to explore joining neighboring utilities in an RTO for the Southeast. The Commission did not act on other issues raised by Southern. Southern's proposal for a for-profit gridco (grid company) that would include only new wholesale transmission services and have the benefits of certain rate
enron_emails
UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT WESTERN WATERSHEDS PROJECT , a No. 11-35705 nonprofit organization; GLENN MONAHAN , in his individual D.C. No. capacity and as a member of 4:10-cv-00004- Western Watersheds Project; NANCY SEH SCHULTZ, in her individual capacity and as a member of Western Watersheds Project, OPINION Plaintiffs - Appellants, v. BOB ABBEY , in his official capacity as Director of the Bureau of Land Management, an agency of the United States; GARY SLAGEL, in his official capacity as Manager of the Upper Missouri River Breaks National Monument; GENE R. TERLAND , in his official capacity as BLM Montana State Director; GARY L. BENES, in his official capacity as Field Manager of BLM’s Lewistown Field Office; BUREAU OF LAND MANAGEMENT , an agency of the United States Department of Interior, Defendants - Appellees, 2 WESTERN WATERSHEDS PROJECT V . ABBEY and BLAINE COUNTY ; CHOUTEAU COUNTY ; FERGUS COUNTY ; MISSOURI RIVER STEWARDS; PHILLIPS COUNTY , Intervenor-Defendants - Appellees. Appeal from the United States District Court for the District of Montana Sam E. Haddon, District Judge, Presiding Argued and Submitted February 5, 2013—Seattle, Washington Filed June 7, 2013 Before: Raymond C. Fisher, Ronald M. Gould, and Richard A. Paez, Circuit Judges. Opinion by Judge Gould WESTERN WATERSHEDS PROJECT V . ABBEY 3 SUMMARY* Environmental Law The panel affirmed in part and reversed in part the district court’s summary judgment in favor of United States agencies and officials in an action challenging the Bureau of Land Management’s management of grazing within the Upper Missouri River Breaks National Monument in Montana. The panel held that BL
freelaw
#include <stdchecked.h> void read_next(int *b, int idx, checked int *out) { int tmp = *(b+idx); *out = tmp; } ------ saagarjha The problem here is you’re not writing C, you’re writing a language that kind of resembles C but is nonportable. So you might as well just use a different, memory safe language at that point. ~~~ chubot I think you're missing an important point: _Checked C’s design is distinguished by its focus on backward-compatibility, incremental conversion, developer control, and enabling highly performant code_ The problem is that there is a huge body of decades-old C code out there that we all depend on. A typical Docker container with a web app contains maybe 10K lines of your own code in Python/Ruby/JS, 100K lines of framework code, and 1M or 10M lines of C code (i.e. the interpreter itself, the web server, SSL, the base image, etc.) So I welcome new languages focused on incremental conversion. That's what I'm doing with Unix shell: [http://www.oilshell.org/blog/2018/01/28.html](http://www.oilshell.org/blog/2018/01/28.html) I applaud projects like Corrode, a C to unsafe-Rust translator, although undoubtedly they would have an easier time if Rust was designed in the first place for conversion. [https://github.com/jameysharp/corrode](https://github.com/jameysharp/corrode) So Checked C seems like a great idea to me. I've noticed that most programmers seem to wildly overestimate the rate at which code gets rewritten. I think it's more accurate to say that code piles up over time. And unfortunately when the foundations are unstable, what you build on top is also unstable. ~~~ bluejekyll There is also a new tool, c2rust, [https://c2rust.com](https://c2rust.com) that I believe was inspired by Corrode.
hackernews
Platelet aggregation and platelet adhesion to components of the extracellular matrix are control events in hemostasis and thrombosis and are regulated through the binding of a set of adhesive proteins including fibrinogen, fibronectin and von Willebrand factor all which contain Arg- Gly-Asp (RGD) sequences. GPIIb-IIIa is a component of a common receptor for these adhesive proteins and binds to peptides containing the RGD sequence. Moreover, GPIIb-IIIa is a member of the
nih_exporter
Three-dimensional mapping of fluorescent nanoparticles was performed by using incoherent digital holography. The positions of the nanoparticles were quantitatively determined by using Gaussian fitting of the axial- and lateral-diffraction distributions through position calibration from the observation space to the sample space. It was found that the axial magnification was constant whereas the lateral magnification linearly depended on the axial position of the fluorescent nanoparticles. The mapping of multiple fluorescent nanoparticles fixed in gelatin and a single fluorescent nanoparticle manipulated with optical tweezers in water were demonstrated
pubmed_abstracts
Peptide and protein drugs are usually available for parenteral use in the market. Their conventional oral administration is not possible due to enzymatic degradation in GI tract. Repeated parenteral administration is necessary since their half-lives are too short (a few minutes). To solve the problems, improve patient compliance and provide an effective treatment, researchers have studied non-parenteral administration routes such as transdermal and nasal for years. As an alternative, the development of parenteral drug carriers, which will provide controlled drug release over a month or longer, has been attempted. SLN are promising colloidal drug carriers among many other carriers such as their polymeric counterparts and liposomes. [@b120-ijn-2-289] intensively reviewed parenteral use of SLN. SLN are very suitable for systemic delivery because they consist of physiologically well-tolerated ingredients and they have good storage capabilities after lyophilization and/or sterilization. When injected intravenously, SLN are sufficiently small to circulate in the microvascular system and prevent macrophage uptake in case of hydrophilic coating. Therefore, SLN have been suggested for viral and non-viral gene delivery. Cationic SLN has been demonstrated to bind genes directly via electrostatic interactions, and to have potential benefits in targeted gene therapy in treatment of cancer. The charge of particles can also be modulated via the composition, thus allowing binding of oppositely charged molecules ([@b77-ijn-2-289]; [@b106-ijn-2-289]; [@b83-ijn-2-289]). Moreover, coating of SLN with PEG increases stability and plasma half life of SLN in order to decrease phagocytic uptake, and therefore improves the biovailability of drugs. Treatment of central nervous system diseases such as brain tumors, AIDS, neurological and psychiatric disorders is often constrained by the inability of potent drugs to pass blood-brain barrier (BBB), which is formed by the endothelium of the brain vessels, the basal membrane and neurological cells. Hydrophilic coating of colloids improves the transport of these through BBB and tissue distribution ([@b52-ijn-2-289]; [@b116-ijn-2-289]). Various researchers also reported that tumor microvessels were more permeable to macromolecules than normal blood vessels, and their lower selectivity to permeability was presumably due to larger pores in the vessel walls ([@b124-ijn-2-289]). [@b27-ijn-2-289] prepared doxorubicin loaded stealth and non-ste
pubmed_central