text
stringlengths 173
4.38k
| subset
stringclasses 13
values |
|---|---|
Q:
Is a vector space a subspace of itself?
We know that a subspace (of a vector space $V$) is a vector space that follows the same addition and multiplication rules as $V$, but is a vector space a subspace of itself?
Also, I'm getting confused doing the practice questions, on when we prove that something is a vector space by using the subspace test and when we prove V1 - V10, which are the ten axioms of vector spaces. So for example in $\Bbb R^2$, we have that $\vec{x} + \vec{y} = \vec{y} + \vec {x}$, etc..
A:
Yes, every vector space is a vector subspace of itself, since it is a non-empty subset of itself which is closed with respect to addition and with respect to product by scalars.
A:
I'm guessing that V1 - V10 are the axioms for proving vector spaces.
To prove something is a vector space, independent of any other vector spaces you know of, you are required to prove all of the axioms in the definition. Not all operations that call themselves $+$ are worthy addition operations; just because you denote it $+$ does not mean it is (for example) associative, or has an additive identity.
There is a lot to prove, because there's a lot to gain. Vector spaces have a simply enormous amount of structure, and that structure gives us a really rich theory and powerful tools. If you have an object that you wish to understand better, and you can show it is a vector space (or at least, related to a vector space), then you'll instantly have some serious mathematical firepower at your fingertips.
Subspaces give us a shortcut to proving a vector space. If you have a subset of a known vector space, then you can prove just $3$ properties, rather than $10$. We can skip a lot of the steps because somebody has already done them previously when showing the larger vector space is indeed a vector space. You don't need to show, for example, $v + w = w + v$ for all $v, w$ in your subset, because we already know this is true for all vectors in the larger vector space.
I'm writing this, not as a direct answer to your question (which Jose Carlos Santos has answered already), but because confusion like this often stems from some sloppiness on the
|
stackexchange
|
Among the various video display systems available in the art, an optical projection system is known to be capable of providing a high quality display in a large scale. In such an optical projection system, light from a lamp is uniformly illuminated onto an array of, e.g., M.times.N, actuated mirrors such that each of the mirrors is coupled with each of the actuators. The actuators may be made of an electrodisplacive material such as a piezoelectric or an electrostrictive material which deforms in response to an electric field applied thereto.
The reflected light beam from each of the mirrors is incident upon an aperture of a baffle. By applying an electrical signal to each of the actuators, the relative position of each of the mirrors to the incident light beam is altered, thereby causing a deviation in the optical path of the reflected beam from each of the mirrors. As the optical path of each of the reflected beams is varied, the amount of light reflected from each of the mirrors which passes through the aperture is changed, thereby modulating the intensity of the beam. The modulated beams through the aperture are transmitted onto a projection screen via an appropriate optical device such as a projection lens, to thereby display an image thereon.
In FIG. 1, there is shown a cross sectional view of an array 10 of M.times.N thin film actuated mirrors 5 for use in an optical projection system, disclosed in a copending commonly owned application, U.S. Ser. No. 08/331,399, entitled "THIN FILM ACTUATED MIRROR ARRAY AND METHOD FOR THE MANUFACTURE THEREOF", comprising: an active matrix 11 including a substrate 12, an array of M.times.N transistors (not shown) and an array 13 of M.times.N connecting terminals 14; an array 15 of M.times.N thin film actuating structures 16, each of the actuating structures 16 having at least a thin film layer 17 of a motion-inducing material, a first electrode 18 and a second electrode 19, the first and second electrodes being placed on top and bottom of the thin film motion-inducing layer 17, respectively; an array 20 of M.times.N supporting members 21, each of the supporting members 21 being used for holding each of the actuating structures 16 in place by cantilevering each of the actuating structures 16 and also for electrically connecting each of the actuating structures 16 and the active matrix 11; and an array 22 of
|
uspto_backgrounds
|
Background
In 1991 the Tamil Tigers (LTTE) made their first attempt to take the Elephant Pass base. The attack was a failure, as troops led by Col. Sarath Fonseka held on despite overwhelming odds and the subsequent Operation Balavegaya. The Tigers suffered over 1,000 casualties. Given these circumstances, LTTE leader Prabakaran changed his strategy to take Elephant Pass by gradually encircling and weakening the troops inside, cutting off supplies and, in effect, strangling the base. The idea was to avoid a frontal assault that would have led to the loss of many LTTE lives, since the army had numerical and logistical superiority. The Elephant Pass isthmus is of strategic importance, as it links the northern mainland known as Wanni with the Jaffna Peninsula. The Jaffna-Kandy road, the A-9 Highway and the railway line to Jaffna run through Elephant Pass, making the narrow strip of land in a sense the gateway to Jaffna. Elephant Pass was thought to be an impregnable military complex. Before the battle the LTTE seized the southern defenses around the base and then severed the sea link to it by capturing the area around Vettilaikerny and cutting the main northern highway, threatening to completely isolate the base.
Battle
The first stage of the LTTE campaign to take control of the peninsula was launched on 11 December 1999. The camps at Vettilaikerny and Kattaikadu on the east coast and Pullaveli to the north of Elephant Pass were taken in a joint land/sea operation. Meanwhile, the 53rd Division of the Sri Lanka Army was brought in to relieve the pressure on the 54th Division deployed in the Elephant Pass sector. The 53rd was an elite force that had been trained by the United States and Pakistan. It had a series of commanding officers, including Brig. Gamini Hettiaratchy, Gen. Sisira Wijeysinghe, Brig. Sivali Wanigaseker and Brig. Egodawela. On 22 April 2000 the LTTE attacked the twin complexes of Iyakachchi and Elephant Pass, pounding the government positions. The LTTE's veteran Black Tiger units stormed into the Iyakkachchi military base in the early hours of the morning in a multi-pronged assault and overran the well-fortified camp
|
wikipedia_en
|
Pier J.R., et al., 2003, AJ, 125, 1559
Press W.H., Teukolsky S,A., Vetterling W.T., Flannery B.P., 1992, Numerical recipes in C. The art of scientific computing, Second edition, Cambridge: University Press.
Reid B.A., et al., 2010, MNRAS, 404, 60
Reid B.A., et al., 2012, MNRAS submitted
Riess A. G. et al., 1998, AJ, 116, 1009
Riess A. G., et al., 2011, ApJ, 730, 119
Ross A. J., et al., 2011, MNRAS, 417, 1530
Ross A. J., et al., 2012, MNRAS submitted
Samushia L., et al., 2012, in prep.
Sanchez, A. G., Baugh, C. M., Angulo, R. 2008, 390, 1470
Sanchez, A. G., et al., 2009, MNRAS, 400, 1643
Sanchez, A. G., et al., 2012, MNRAS submitted
Schlafly E.F., Finkbeiner D.P., 2011, ApJ, 737, 103
Schlegel D.J., Finkbeiner D.P., Davis M., 1998, ApJ, 500, 525
Schlegel D., White M., Eisenstein D., 2009, The Astronomy and Astrophysics Decadal Survey, Science White Papers \#314 \[arxiv:0902.4680\]
Scoccimarro R., Sheth R.K., 2002, MNRAS, 329, 629
Seo H.-J., Siegel, E. R., Eisenstein, D. J., White, M., 2008, ApJ, 686, 13
Seo H.-J., et al., 2010, ApJ, 720, 1650
Seo H.-J., et al., 2012, ApJ submitted, \[arXiv:1201:2172\]
Smith J.A., et al., 2002, AJ, 123, 2121
Smith R.E., et al., 2003, MNRAS, 341, 1311
Stoughton C., et al., 2002, AJ, 123, 485
Strauss M.A., et al.,
|
arxiv
|
[BeeUIStyleManager loadDefaultStyleResource:@"default.css"];
return YES;
}
+ (void)loadDefaultStyleFile:(NSString *)fileName
{
[[BeeUIStyleManager sharedInstance] setDefaultFile:fileName];
}
+ (void)loadDefaultStyleResource:(NSString *)resName
{
[[BeeUIStyleManager sharedInstance] setDefaultResource:resName];
}
- (void)setDefaultFile:(NSString *)fileName
{
BeeUIStyle * style = [self fromFile:fileName useCache:YES];
if ( style )
{
self.defaultStyle = style;
}
}
- (void)setDefaultResource:(NSString *)resName
{
BeeUIStyle * style = [self fromResource:resName useCache:YES];
if ( style )
{
self.defaultStyle = style;
}
}
- (id)init
{
self = [super init];
if ( self )
{
_cache = [[NSMutableDictionary alloc] init];
}
return self;
}
- (void)dealloc
{
[_cache removeAllObjects];
[_cache release];
[super dealloc];
}
- (BeeUIStyle *)fromResource:(NSString *)resName
{
return [self fromResource:resName useCache:YES];
}
- (BeeUIStyle *)fromResource:(NSString *)resName useCache:(BOOL)flag
{
if ( flag )
{
BeeUIStyle * cachedStyle = [_cache objectForKey:resName];
if ( cachedStyle )
{
return cachedStyle;
}
}
NSString * extension = [resName pathExtension];
NSString * fullName = [resName substringToIndex:(resName.length - extension.length - 1)];
NSString * resPath = nil;
NSString * resPath2 = nil;
NSString * resDefaultPath = [[NSBundle mainBundle] pathForResource:fullName ofType:extension];
if ( NSNotFound == [full
|
github
|
Deuteronomy 4:1-49
DISPLAY
PLAY
4 “And now, O Israel, listen to the regulations and the judicial decisions that I am teaching YOU to do, in order that YOU may live+ and may indeed go in and take possession of the land that Jehovah the God of YOUR forefathers is giving YOU.2 YOU must not add to the word that I am commanding YOU, neither must YOU take away from it,+ so as to keep the commandments of Jehovah YOUR God that I am commanding YOU.3 “YOUR own eyes are the ones that saw what Jehovah did in the case of the Ba′al of Pe′or,*+ that every man who walked after the Ba′al of Pe′or was the one whom Jehovah your God annihilated from your midst.+4 But YOU who are cleaving+ to Jehovah YOUR God are all of YOU alive today.5 See, I have taught YOU regulations+ and judicial decisions,+ just as Jehovah my God has commanded me, for YOU to do that way in the midst of the land to which YOU are going to take possession of it.6 And YOU must keep and do them, because this is wisdom+ on YOUR part and understanding+ on YOUR part before the eyes of the peoples who will hear of all these regulations, and they will certainly say, ‘This great nation is undoubtedly a wise and understanding people.’+7 For what great nation+ is there that has gods* near to it the way Jehovah our God is in all our calling upon him?+8 And what great nation is there that has righteous regulations and judicial decisions like all this law that I am putting before YOU today?+9 “Only watch out for yourself and take good care of your soul,+ that you may not forget the things that your eyes have seen+ and that they may not depart from your heart all the days of your life;+ and you must make them known to your sons and to your grandsons,*+10 the day that you stood before Jehovah your God in Ho′reb,*+ when Jehovah said to me, ‘Congregate* the people together to me that I may let them hear my words,+ that they may learn to fear+ me all the days that they are alive on the soil and that they may teach their sons.’+11 “So YOU people came near and stood at the base of the mountain, and the mountain was burning with
|
pile-cc
|
Let h = 245196361.938065 - 245195587. Let p = h + -777.038. Let d = p + 2.1. What is d rounded to five dps?
0.00007
Let n = 56 + -56.76. Round n to one decimal place.
-0.8
Let c = -11.415 - -0.335. Let o = c - -0.68. Let z = o + 10.341. What is z rounded to 2 dps?
-0.06
Let p = -48 - -47.9995. Round p to three dps.
-0.001
Let b = 2.941 + -3. Let q = b + 0.0641. What is q rounded to 3 decimal places?
0.005
Let i = 3.35000161 - 3.35. What is i rounded to 7 dps?
0.0000016
Let a = 63 + -63.0000043. Round a to six decimal places.
-0.000004
Let q = 23 - 22.99999997. Round q to seven dps.
0
Let w = -30243 + 30243.39998. Let n = w - 0.4. Round n to four decimal places.
0
Let p = -5 - -12. Let d = 6.9999992 - p. Round d to six dps.
-0.000001
Let m = 17 - 17.035. Let j = m - -0.114. Round j to 2 decimal places.
0.08
Let t = -14 - -48. Let n = 33.9954 - t. Round n to three dps.
-0.005
Let j = 1 - 1. Let y = j + 0.00002. What is y rounded to 4 decimal places?
0
Let u(b) = b + 7. Let d be u(-4). Suppose -12 - 3 = -d*j, 0 = 4*r - 2*j + 202. Round r to the nearest ten.
-50
Suppose 2*w = -3*c - 4530006, 0 = -5*w - 4 - 11. Round c to the nearest one hundred thousand.
-1500000
Let n = -0.4 - -1.12. What is n rounded to 1 dp?
|
dm_mathematics
|
If you have a spot for him. I am also going to send it along to the IT HR
contact.
---------------------- Forwarded by David Baumbach/HOU/ECT on 05/19/2000
02:42 PM ---------------------------
AORR@dynegy.com on 05/19/2000 02:28:26 PM
To: David.Baumbach@enron.com
cc:
Subject: Re:
Here is
|
enron_emails
|
conclusion that the Court did not intend to alter the typical summary judgment requirements by
9
declaring a bright-line rule that vicarious liability claims must always go to a jury in the context
of a broker-agent relationship, even when there is no genuine issue of material fact as to the
broker’s vicarious liability. In Osborne, the Supreme Court recognized, as it did in Auer, that
scope of employment generally is a question of fact. Osborne, 63 Ohio St.3d at 330. However,
the Court explained that “scope of employment becomes a question of law” when “reasonable
minds can come to but one conclusion * * * regarding scope of employment.” Id.
{¶26} Relying on Byrd, another of the Supreme Court’s prior decisions, the Auer Court
specified the type of evidence necessary to establish that a tortious act was committed within the
scope of employment. When (as here) an intentional tort is alleged, a determination that the
conduct was within the scope of employment requires evidence that the employee’s conduct
“’giving rise to the tort’” was “’calculated to facilitate or promote the business for which the
servant was employed * * *.’” Auer, 140 Ohio St.3d 276, 2014-Ohio-3632 at ¶ 22, quoting
Byrd, 57 Ohio St.3d at 58. “[A]n employer is not liable for independent self-serving acts of his
employees which in no way facilitate or promote his business.” Byrd at 59. “[I]f an employee’s
actions are self-serving or have no relationship to the employer’s business, then the conduct is
‘manifestly outside the scope of employment’ * * *.” Theobald v. University of Cincinnati, 111
Ohio St.3d 541, 2006-Ohio-6208, ¶ 28, quoting R.C. 9.86.
{¶27} Here, CBH Realty presented evidence that Gerbec did not intend for her property
management activities for Carter to “facilitate or promote” CBH Realty’s real estate business.
See Byrd at 59. Gerbec signed an agreement with CBH Realty that she would not perform
property management functions on behalf of, or in the
|
freelaw
|
Hack allows linux users to play OnLive games - riledhel
http://onliveinformer.com/2011/09/04/community-hack-allows-linuxwine-users-to-experience-onlive/
======
Karunamon
The slashdotters already got to this and eviscerated it in typical
"Proprietary anything is automatically bad" fashion.
I for one think this is awesome. You can play some cool things with online for
cheap if your system can't handle the latest and greatest.
~~~
wccrawford
I think it's a great idea, too, except for 2 things:
1) If you buy the game, you pay the same price as getting it at a store, but
with no recourse if the company goes under.
2) The video is pretty bad. It's 720p with a lot of lossy compression. I tried
it for one of the Lego games (which I'm quite familiar with on my consoles)
and it felt really fuzzy and indistinct. It wasn't a very pleasant experience.
I could forgive both of them if the games were cheaper, but they aren't. (And
can't be, really, since the game publishers aren't going to give them a
break... At least, not until they realize their DRM is unhackable.)
~~~
motdiem
Personally I've found two things great about onlive :
1/ It's an alternative to downloading demo - 30mn is enough to see if I like a
game, and saves me the hassle of downloading, installing/uninstalling etc - I
don't understand why every new game demo is distributed this way now
2/ Their $4 for a week-end rental - for a lot of games, this is enough for me
to play and get out of
Video quality is good for playing on a laptop - not on a gaming desktop.
Note though that many of the games on onlive are very aggressively discounted
on steam at every steam sale - so I usually end up buying them from steam
instead.
~~~
teamonkey
> Note though that many of the games on onlive are very aggressively
> discounted on steam at every steam sale - so I usually end up buying them
> from steam instead.
They're doing pretty well at matching Steam. For
|
hackernews
|
The use of implantable cardioverter defibrillator (ICD) as a primary prevention strategy for sudden cardiac death (SCD) has dramatically reduced mortality in selected patient populations. Randomized controlled trials have shown that in heart failure (HF) patients with reduced left ventricular ejection fraction (LVEF), prophylactic ICD implantation improves survival compared with standard medical therapy by detection and treatment of malignant ventricular arrhythmias. However because ICD implantation poses significant risk and is costly, the use and outcomes associated with this therapy
|
nih_exporter
|
RP-30A is a radioactive tracer being evaluated for the detection of regional myocardial blood flow. This study compares RP-30A to technetium 99m pertechnetate as radioactive tracers for the detection of testicular blood flow changes in early testicular torsion. The left testis of adult male Sprague-Dawley rats was subjected to either thirty or sixty minutes of 720 degrees torsion. Injections of RP-30A or 99mTc-pertechnetate followed by sacrifice and scintillation
|
pubmed_abstracts
|
{#F1}
The same procedure was done in both patients. Patients were monitored by transesophageal echocardiography (TEE) during operation. Operation was carried out via a median sternotomy with standard cardiopulmonary bypass through aortic and bicaval cannulations. An intermittent antegrade tepid blood cardioplegia infusion was used for myocardial protection. After aortic cross-clamping, the ascending aorta was resected and sectioned at the level about 1 cm above the STJ (**[Fig. 2D](#F2){ref-type="fig"}**). A left atriotomy along the right interatrial groove was performed. Mitral valve was repaired by posterior annuloplasty with an annuloplasty semi-rigid band (Cosgrove-Edwards, 34 mm, Edwards Lifesciences, LLC). Body temperature was cooled to 20°C. Distal ascending aorta up to the proximal arch was resected and replaced with a one-branch aortic polyester graft (Gelweave, 26mm, Terumo, Vascutek, UK; **[Fig. 2E](#F2){ref-type="fig"}**) during deep hypothermic circulatory arrest. Retrograde cerebral perfusion was used for de-airing. After completion of distal aorta anastomosis, the arterial cannulation was shifted to the side branch of the aortic graft. Cardiopulmonary bypass was restarted and the patient was rewarmed.
![(**A** and **B**) showed the J-shape line and keyhole mark for coronary artery on the Valsava graft. (**C**) showed the position of six anchoring sutures which located at 3 nadirs of the aortic valve annulus and 3 the upper margin of each commissure. (**D**) showed the resection margin of aortic
|
pubmed_central
|
Can it be done with recursion?
im trying to make my program run as i want it to, but i have some trouble with that, hope someone can help with that.
I wrote a program that takes a list of chars and assembles them to create words. Word ends when there is a " " in list. So it looks like that:
inp = ['r','e', 'e', 'l', ' ', 'y', 'e', 'l', 'l', 'o', 'w', ' ', 'g', 'e', 'l',' ', 'p','e','e','k']
outp = ['reel', 'yellow', 'gel', 'peek']
The code looks like this:
def mer(inp, outp=[]):
tail = 0
for item in inp:
if item == (" "):
inp[:tail] = ["".join(inp[:tail])]
outp.append(inp.pop(0))
inp.remove(item)
if ((" ") in inp) == False:
inp[:] = ["".join(inp[:])]
outp.append(inp.pop(0))
tail +=1
And now to get the output (in the case with the input like on top) i need to call mer two times. Is there a way to make it run untill the input list is empty, or maybe use a recursion?
It's just a programming exercise, so it can be probably all done better, but for now thats all i need.
A:
You can use join and split:
>>> ''.join(inp).split()
['reel', 'yellow', 'gel', 'peek']
# recursion
from itertools import takewhile
def fun(x):
if not x:
return
y = list(takewhile(lambda i:i!=' ', x))
yield ''.join(y)
for z in fun(x[len(y)+1:]):
yield z
list(fun(['r','e', 'e', 'l', ' ', 'y', 'e', 'l', 'l', 'o', 'w', ' ', 'g', 'e', 'l
|
stackexchange
|
It is easily removable, allowing the proper elimination of water and fluids which may be dropped on its surface.
Comprising mainly paired pieces: a bottom piece as a base or support made of a plastic material and a top piece made essentially of a ceramic material, the two being joined together by their faces in contact with one another, each pair of pieces comprising a tile assembly which is anchored with the adjacent ones by means of ancillary attachment elements located on the perimetric edges of the plastic base piece.
One objective of this invention is a new arrangement of the attachment elements which makes it possible to connect any adjacent edges of the tiles assembly to one another such that the decorative motifs of the ceramic pieces may be combined in different ways.
Another objective of this invention focuses on a new structure of the attachment elements, thus achieving a better connection of the pieces with a greater degree of stability, whilst also making the vertical removal of each tile assembly easier.
Also innovative is the placement of the starting point of the attachment elements, by means of which sturdier, stronger anchorings are achieved.
Means are also included for centering the top piece with respect to the bottom piece, these means also allowing for a physical separation between the different tile assemblies.
Different floor coverings currently exist, special mention being made of those which are applied to exterior surfaces for facilitating the elimination of rainwater and also in swimming pool areas.
In some cases, the coverings comprise pieces made of a plastic material which are of a hollow structure of a certain thickness forming a water-removal chamber underneath.
These coverings can entail hygiene-related problems, which aesthetically also leaves much to be desired.
In other cases, the coverings comprise bodies manufactured using porous materials, which, although it be true that they are capable of eliminating a certain flow of water, do become saturated at higher flowrates. The porosity of such bodies also facilitates, in some cases, the proliferation of fungi and bacteria.
Spanish Patent No. P-200402065 consists of a covering for surfaces comprising the combination of certain bottom draining support elements and top plaques which are attached to said supporting bodies such that when water falls on this covering, be it rainwater, pool water or other types of water, this fluid does not remain on the outer exposed surface, but rather runs into the bottom chamber formed by the draining supporting elements through separating grooves between the plaques when they are made of a ceramic or similar material.
All of these coverings, including that of Spanish
|
uspto_backgrounds
|
In 1998, the company acquired Intersolv Inc, an applications enablement business, for and the combined business was renamed Merant. The same year the company acquired XDB Systems with their XDB Enterprise Server relational database management system. In 2001 the business was demerged from Merant with help from Golden Gate Capital Partners and once again became Micro Focus. It was listed on the London Stock Exchange in 2005.
In June 2008, the company acquired the Israeli NASDAQ listed software company NetManage for .
In July 2008, the company acquired the privately held Austin, Texas-based Liant Software Corporation for its RM/COBOL and PL/I product lines. Liant Software owned the assets of Ryan-McFarland Corporation, a Micro Focus competitor in the 1980s.
In July 2009, the company acquired Borland, a developer of application lifecycle management tools, as well as the Quality Solutions part of Compuware, including the automation tool TestPartner.
In 2011, the company alleged that the New South Wales Police Force and other agencies were using 16,500 copies of its ViewNow software on various computers when police and other agencies were only ever entitled to 6,500 licences. The group initially alleged in damages but later increased this to after reviewing the results of a court-ordered audit of the police force's computer systems. The police force maintained during the court proceedings that it had paid for a site licence that entitled it to unlimited installations of the software for all of its officers. Despite this, it settled the matter out of court in 2012, for an undisclosed sum. The other agencies previously settled the matter out of court, also for undisclosed sums.
In December 2013, Micro Focus acquired the Orbix, Orbacus and Artix software product lines from Progress Software. These market-leading implementations of the CORBA standard were originally developed by IONA Technologies.
On 15 September 2014, Micro Focus announced that it would acquire The Attachmate Group for in shares, which would give it ownership of the Attachmate, NetIQ, Novell, and SUSE product lines. Attachmate's parent company Wizard Parent LLC—consisting of the investment groups Elliott Management Corporation, Francisco Partners, Golden Gate Capital, and Thoma Bravo, would hold a 40% stake in Micro Focus post-acquisition.
In 2015, Micro Focus acquired Authasas, which produces authentication middleware.
|
wikipedia_en
|
$N_x \times N_y$ $\Delta t \text{[min]}$ $l_1(h)$ $l_2(h)$ $l_{\infty}(h)$ $q_2^{emp}$
--------------------------- ------------------------- ----------------------- ----------------------- ----------------------- -------------
$12 \times \hspace{2mm}6$ 20 $8.19 \times 10^{-4}$ $1.08 \times 10^{-3}$ $5.90 \times 10^{-3}$ -
$24 \times 12 $ 10 $1.49 \times 10^{-4}$ $2.08 \times 10^{-4}$ $1.92 \times 10^{-3}$ 2.4
$48 \times 24 $ 5 $2.88 \times 10^{-5}$ $4.25 \times 10^{-5}$ $8.40 \times 10^{-4}$ 2.3
: Relative errors on $h $ at different resolutions, isolated mountain wave test case, $t_f=5$ days.[]{data-label="tab:t5convrate_h"}
$N_x \times N_y$ $\Delta t \text{[min]}$ $l_1(u)$ $l_2(u)$ $l_{\infty}(u)$ $q_2^{emp}$
--------------------------- ------------------------- ----------------------- ----------------------- ----------------------- -------------
$12 \times \hspace{2mm}6$ 20 $4.33 \times 10^{-2}$ $5.81 \times 10^{-2}$ $1.39 \times 10^{-1}$ -
$24 \times 12 $ 10 $5.70 \times 10^{-3}$ $7.33 \times 10^{-3}$ $1.06 \times 10^{-1}$ 2.9
$48 \times 24 $ 5 $1.11 \times 10^{-3}$ $1.72 \times 10^{-3}$ $1.56 \times 10^{-2}$ 2.2
: Relative errors on $u $ at different resolutions, isolated mountain wave test case, $t_f=5$ days.[]{data-label="tab:t5convrate_u"}
$N_x \times N_y$ $\Delta
|
arxiv
|
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:19741103T024500
RDATE:19741103T024500
RDATE:19891008T024500
TZNAME:CHADT
TZOFFSETFROM:+1245
TZOFFSETTO:+1345
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:19750223T034500
RDATE:19750223T034500
TZNAME:CHAST
TZOFFSETFROM:+1345
TZOFFSETTO:+1245
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:19751026T024500
RRULE:FREQ=YEARLY;UNTIL=19881029T140000Z;BYDAY=-1SU;BYMONTH=10
TZNAME:CHADT
TZOFFSETFROM:+1245
TZOFFSETTO:+1345
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:19760307T034500
RRULE:FREQ=YEARLY;UNTIL=19890304T140000Z;BYDAY=1SU;BYMONTH=3
TZNAME:CHAST
TZOFFSETFROM:+1345
TZOFFSETTO:+1245
END:STANDARD
BEGIN:STANDARD
DTSTART:19900318T034500
RRULE:FREQ=YEARLY;UNTIL=20070317T140000Z;BYDAY=3SU;BYMONTH=3
TZNAME:CHAST
TZOFFSETFROM:+1345
TZOFFSETTO:+1245
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:19901007T024500
RRULE:FREQ=YEARLY;UNTIL=20060930T140000Z;BYDAY=1SU;BYMONTH=10
TZNAME:CHADT
TZOFFSETFROM:+1245
TZOFFSETTO:+1345
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070930T024500
RRULE:FREQ=YEARLY;BYDAY=-1
|
github
|
Screening, Assessment, and Referral Practices in Adult Correctional Settings: A National Perspective
A national survey of adult prisons, jails, and community correctional agencies was conducted to examine the practices used to place offenders in appropriate treatment services. 289 administrators of adult facilities completed the survey (34% from prisons, 14.2% from jails, 24.6% from state-run community correctional facilities, and 27.2% from locally-run community correctional facilities). 58.2% of survey respondents reported the use of a standardized substance abuse-screening tool, and 34.2% reported use of an actuarial risk tool. The provision of higher intensity treatment programs, the use of standardized risk tools, and the provision of more community referral services were all independently associated with the use of a standardized substance abuse-screening tool. Taxman, F., Cropsey, K., Young, D., and Wexler, H. Screening, Assessment, and Referral Practices in Adult Correctional Settings: A National Perspective. Criminal Justice and Behavior, 34(9), pp. 1216-1234, 2007.
Review of Office-Based Maintenance Treatment of Opioid Dependence
The increasing global public health burden of heroin dependence and prescription opioid dependence warrants further expansion of treatment models. The most effective intervention for opioid dependence remains maintenance with methadone, a full mu-opioid receptor agonist, or buprenorphine, a partial mu-opioid receptor agonist. A growing body of evidence supports the use of opioid receptor agonist maintenance in office-based settings. Office-based opioid treatment (OBOT) can expand treatment access in a less stigmatized environment, which enables integrated care of co-morbid conditions. The authors discuss clinical and practical considerations when providing treatment for opioid dependence in traditional versus office-based settings include patient selection and monitoring, health economics, management of co-morbid conditions, and access to ancillary psychosocial treatment. OBOT provides an additional opportunity to help address the tremendous public health impact of opioid dependence. Gunderson, E. and Fiellin, D. Office-Based Maintenance Treatment of Opioid Dependence: How Does it Compare With Traditional Approaches? CNS Drugs, 22(2), pp. 99-111, 2008.
Treatment Attitudes, perceived social norms, and intentions were assessed for 376 counselors and 1083 clients from outpatient, methadone, and residential drug treatment programs regarding
|
pile-cc
|
18
Suppose 23 = 3*w + 3*c - 43, -39 = -2*w - c. Calculate the highest common divisor of 85 and w.
17
Let x(q) = -q. Let m be x(0). Let n(s) = -s + 1. Let g be n(m). What is the greatest common divisor of g and 9?
1
Suppose 4*z + 22 = -138. Let k = 64 + z. Suppose 4*l + 4*y = 16, 0 = 3*l - 2*y - 4 - 3. What is the greatest common divisor of l and k?
3
Suppose -5*g + 4*g + 95 = 0. What is the greatest common factor of 38 and g?
19
Let u(s) = -4*s - 12. Let g be u(-10). What is the highest common divisor of g and 7?
7
Let i(h) = -2*h - 8. Let n be i(-10). Calculate the greatest common divisor of 2 and n.
2
Let v = 96 + -138. Let n be 1*v*3/(-6). Calculate the greatest common factor of 147 and n.
21
Suppose 2*c + 11 = 3*p + 33, 3*c = 2*p + 33. What is the greatest common factor of c and 11?
11
Let b = 101 + -59. Calculate the greatest common factor of 6 and b.
6
Let k(y) = -44*y**3 - 2*y**2 - 3*y + 2. Let i be k(-2). What is the highest common divisor of 32 and i?
32
Let c(a) = a**3 + 8*a**2 + 8*a - 4. Let s be c(-6). Let b be (0 - -1)/((-2)/(-20)). What is the greatest common divisor of b and s?
10
Let r(b) be the third derivative of 7*b**5/30 - b**4/24 + b**3/6 - b**2. Let i be r(2). Let h = 53 - 31. Calculate the greatest common factor of i and h.
11
Let d(m) = m**2 + m - 1. Let v be d(-3). Suppose
|
dm_mathematics
|
Click on the following URL....and then hit New Product! about the middle of
the screen. You can now enter in city ids and get current weather
observations from those cities. It will automatically update as new
information comes in.
http://ecthou-webcl1.nt.ect.enron.com/research/Weather/WeatherMain.htm
If you need help with station identifiers, let me know.
Jay
|
enron_emails
|
On November 5, 2010, petitioners submitted the report of Dr. Chone Ken Chen, a
physician who practices pediatric neurology at New York University Downtown Hospital and at
the Chang Comprehensive Health Center. On January 14, 2011, respondent filed a responsive
expert report from Dr. Russell Snyder. Petitioners filed a supplemental report from Dr. Chen on
March 28, 2011. During a status conference held on April 25, 2011, the parties indicated that
they were ready to proceed to hearing.
A hearing was held on October 24, 2011, in New York City. Dr. Chen and Dr. Snyder
provided in-person testimony at the hearing. Each party submitted prehearing and posthearing
briefs. On November 13, 202, the undersigned issued a decision denying compensation, but
noted that Mr. Christiansen, acting pro se, handled this case with diligence and competence, and
that “it is extremely unlikely that a licensed attorney could have achieved a different result for
W.C.” Decision, 2012 WL 6766650, at *16.
Even though compensation was denied, a petitioner who brings a petition in good faith
and who has a reasonable basis for the petition may be awarded attorneys’ fees and costs. See 42
U.S.C. § 300aa–15(e)(1).1 Here, the petitioners, acting pro se, gathered and filed medical
records, participated in numerous status conferences, obtained an expert witness to testify on
their behalf, produced two substantial briefs, and argued their case at a hearing. Thus, because
petitioners acted in good faith and because there was a reasonable basis for proceeding,
petitioners are eligible for reimbursement of costs. Respondent does not contend that petitioners
failed to satisfy these criteria.
Petitioners seek a total of $4,496.80 in costs incurred while pursuing this claim, to which
respondent has no objection. After reviewing the request, the court awards a check made
payable to petitioners in the amount of $4,496.80 for litigation costs. The court thanks the
parties for their cooperative efforts in resolving this matter.
The Clerk shall enter judgment accordingly.2
IT IS SO ORDERED.
____________________________
Christian J. Moran
Special Master
1
Petitioners did not incur any attorneys’ fees, as they were not represented by an attorney.
2
Pursuant to
|
freelaw
|
~~~
na85
>... hardware that is 100 million miles away is an interesting experience.
Having a read-eval-print loop running on the spacecraft proved invaluable in
finding and fixing the problem
So...
How exactly does it work to have a repl on the spacecraft?
Doesn't the system halt while it's waiting for user input?
~~~
lisper
No. We used a multi-threaded Lisp. One thread ran the REPL, and other threads
ran the RAX code.
------
codr4life
" One of the reasons I stayed at JPL for twelve years was that I was appalled
at what the software industry had become. The management world has tried to
develop software engineering processes that allow people to be plugged into
them like interchangeable components. The "interface specification" for these
"components" usually involves a list of tools in which an engineer has
received "training." (I really detest the use of the word "training" in
relation to professional activities. Training is what you do to dogs. What you
should be doing with people is educating them, not training them. There is a
big, big difference.)
To my mind, the hallmark of the interchangeable component model of software
engineers is Java. Without going into too many details, I'll just say that
having programmed in Lisp the shortcomings of Java are glaringly obvious, and
programming in Java means a life of continual and unremitting pain. So I vowed
I would never be a Java programmer, which pretty much shut me out of 90% of
all software engineering jobs in the late 90's."
Word, this needs to be seen for what it has turned into if we're ever going to
get out. I've tried every kind of paid software dev setup, it's all abusive
business bullshit these days.
~~~
pjmlp
These days, companies like Google think that even Java is too advanced for cog
developers.
~~~
planteen
What do they push instead? Python? Go? JS?
~~~
notduncansmith
Many language decisions in Go (e.g. lack of generics, baked-in magic
concurrency primitives, extensive focus on imperative looping, baked-in
formatting conventions) are arguably designed to homogenize developer output.
This is essentially making
|
hackernews
|
Thrombin cleavage of osteopontin (OPN), an RGD-containing proinflammatory cytokine, greatly augments its cell interactive properties by the exposure of a new alpha4beta1and alpha9beta1 integrin binding site SVVYGLR at its C-terminus. Both OPN and alpha4beta1 integrin are important in experimental autoimmune encephalitis (EAE), a mouse model of multiple sclerosis. We hypothesize that thrombin-cleavage of OPN, with its resultant enhanced
|
nih_exporter
|
Consequences to water suppliers of collecting rainwater on housing estates.
The collection, storage and use of rainwater from roofs reduce the need for potable water. However, if water suppliers are to decrease their infrastructure costs as well as their operational costs (due to water savings), the rainwater system has to provide most of the time a significant percentage of the water demand. This paper adopts the viewpoint of the water suppliers and investigates how reliable this source of water is in the case of a housing
|
pubmed_abstracts
|
10.1371/journal.pone.0104013.t004
###### Concentration of PM~10~ in cities of different continents.
{#pone-0104013-t004-4}
Continent Country(time period) Mean PM~10~ concentration (mg m^−3^) Scale Reference
--------------- ------------------------------- -------------------------------------- -------------- -------------------------------
Asia China(2003--2010) 0.1056±0.0259 National This study
Japan (2007--2008) 0.0151±0.0078 Yokohama [@pone.0104013-Khan1]
India (1998--1999,2002) 0.2317±0.0815 New Delhi [@pone.0104013-Monkkonen1]
Africa South Africa (winter of 1997) 0.0933±0.0188 National [@pone.0104013-Engelbrecht1]
Tanzania (2005) 0.0510±0.0210 National [@pone.0104013-Mkoma1]
Guinea (2004) 0.1453±0.1092 Conakry [@pone.0104013-Weinstein1]
South America Brazil (2008) 0.064±0.0190 São Paulo [@pone.0104013-Vasconcellos1]
Argentina (2008) 0.0470±0.0120 Buenos Aires
Columbia (2008) 0.0640±0.0490 Bogotá
Europe (1992--2009) 0.0306±0.0084 Continental [@pone.0104013-Wang3]
Netherlands (1985--2008) 0.0180 Rotterdam [@pone.0104013-Keuken1]
Greece (1999--2000) 0.0755±0.0275 Athens, [@pone.0104013-Chaloulakou1]
German (2002--2005) 0.0663±0.0105 National [@pone.0104013-Buns1]
North
|
pubmed_central
|
Q:
Maintain order of time series with group_by
Suppose my time series consists only of two columns: signal and day
The signal variable is supposed to repeat itself in a cycle of 1 to 6. So I need to insert empty rows for each implicit missing Signal but with signal counting from 1 to 6. (Suppose I have more columns that should also be empty (NA)).
In other words, for each unique day, there should be 6 rows with signal counting from 1 to 6.
My dataframe:
df = structure(list(data.Signal = c(2, 3, 4, 5, 6, 1, 2, 3, 4, 6,
1, 3, 4, 5, 6, 1, 2, 3, 4, 5, 6, 1, 1, 2, 3, 4, 5, 6, 2, 3, 4,
5, 6, 1, 3, 4, 5, 6, 2, 3, 4, 5, 6, 3, 4, 6, 1, 3, 4, 5, 6, 1,
2, 3, 4, 5, 6, 1, 2, 3, 4, 6, 1, 2, 3, 4, 5, 6, 1, 2, 3, 4, 5,
6, 1, 2, 3, 4, 5, 1, 2, 3, 4, 6, 2, 3, 6, 3, 4, 5, 6, 1, 3, 4,
5, 6, 1, 1, 2, 3, 4, 5, 3, 4, 1, 2, 3, 4, 5, 5, 1, 2, 3, 4),
data.day = c(18, 18, 18, 18, 18, 19, 19, 19, 19, 19, 20,
20, 20, 20, 20, 21, 21, 21, 21, 21, 21, 22, 23, 23, 23, 23,
23, 23, 24, 24, 24, 24, 24, 25, 25, 25, 25, 25, 26, 26, 26,
26, 26, 27, 27, 27, 28, 28, 28, 28, 28, 29, 29, 29, 29, 29,
29, 30, 30, 30, 30, 30, 1, 1, 1, 1, 1,
|
stackexchange
|
A combine is an agricultural vehicle used in the harvesting of crops. The combine is typically self-propelled and is comprised of a forward header assembly and an aft drive and processing section. The header assembly typically is substantially wider than the aft portion of the combine and includes a plurality of spaced corn or row crop heads which are adapted for engaging the crops and removing the grain therefrom. The thus removed grain, in combination with crop residue such as husks in the case of corn harvesting, is then automatically delivered to the aft drive and processing section of the combine. In addition to housing the source of propulsion, such as a diesel engine and operator controls, the aft portion of the combine also includes a complicated threshing system for further separating the grain from the crop residue and for offloading the thus separated grain from the combine into a transport vehicle such as a truck. The crop residue is then exhausted from an aft portion of the combine and deposited in the field being harvested.
The threshing system includes many stages for separating the grain from the husk or leafy portion of the plant. An early stage of the threshing system typically includes a rotating cylinder operating in conjunction with a concave structure positioned adjacent to and below the cylinder to initiate grain-crop residue separation. The thus separated grain is then subjected to additional processing for further separation, while the crop residue, or chaff, is exhausted from the combine.
The additional processing to which the grain is subjected typically includes a vibrating sieve arrangement upon which the grain and chaff mixture is deposited. This sievelike structure, frequently referred to as a "chaffer", allows the grain to fall under the influence of gravity, while retaining chaff in separating the grain and chaff. Because the grain and chaff are frequently deposited upon the chaffer in a thick, mat-like mass, air is directed upward through the chaffer to break up this mat-like mass and blow the chaff upward for removal. While facilitating grain and chaff separation to some extent, this prior art approach has produced undesirable effects which actually retard the threshing operation. For example, the upward air blast through the sieve-like chaffer creates turbulence within the threshing stages which not only inhibits chaff removal from the combine, but also frequently recirculates the chaff from later to earlier threshing stages. This increases the time required for grain-chaff separation, slowing down the threshing operation, and necessitates
|
uspto_backgrounds
|
Gideon Clifford Jeffrey Davidson Haigh (born 29 December 1965) is an English-born Australian journalist who writes about sport (especially cricket) and business. He was born in London, was raised in Geelong, and lives in Melbourne.
Career
Haigh began his career as a journalist, writing on business for The Age newspaper from 1984 to 1992 and for The Australian from 1993 to 1995. He has since contributed to over 70 newspapers and magazines, both on business topics and on sport, mostly cricket. He wrote regularly for The Guardian during the 2006-07 Ashes series and has featured also in The Times and the Financial Times.
Haigh has authored 19 books and edited seven more. Of those on a cricketing theme, his historical works includes The Cricket War and Summer Game. His biographies are The Big Ship (of Warwick Armstrong) and Mystery Spinner (of Jack Iverson), the latter was The Cricket Society's "Book of the Year", short-listed for the William Hill Sports Book of the Year and dubbed "a classic" by The Sunday Times; anthologies of his writings Ashes 2005 and Game for Anything, as well as Many a Slip (the humorous diary of a club cricket season) and The Vincibles, his story of the South Yarra Cricket Club of which he is life member and perennate vice-president and for whose newsletter he has written about cricket the longest. He has also published several books on business-related topics, such as The Battle for BHP, Asbestos House (which details the James Hardie asbestos controversy) and Bad Company, an examination of the CEO phenomenon. He mostly publishes with Aurum Press. He has won the annual Jack Pollard Trophy for the best Australian cricket book six times.
Haigh was appointed editor of the Wisden Cricketers' Almanack Australia for 1999–2000 and 2000–01. Since March 2006, he has been a regular panellist on the ABC television sports panel show Offsiders. He was also a regular co-host on The Conversation Hour with Jon Faine on 774 ABC Melbourne until near the end of 2006.
Haigh has been known to be critical of what he regards as the deification of Sir Donald Bradman and "the cynical exploitation of his name by the mediocre and the greedy". He did so in a September 1998 article in Wisden Cricket Monthly entitled "Sir Donald Brandname". Haigh has been critical of Bradman's biographer
|
wikipedia_en
|
The effect of the nonuniform detector acceptance is corrected by evaluating the cumulants of $Q$-vector products [@Selyuzhenkov:2007zi]. While the correction is found to be negligible for the $\gamma_{112}$ and $\delta$ correlators, there is a sizable effect of 5–10% correction to the $\gamma_{123}$ correlator.
Event shape engineering {#subsec:analysis_ese}
-----------------------
In the ESE analysis, within each multiplicity range of [$\text{pPb}$]{}or centrality range of [$\text{PbPb}$]{}data, events are divided into different $q_{2}$ classes, where $q_2$ is defined as the magnitude of the $Q_{2}$ vector. In this analysis, the $q_2$ value is calculated from one side of the HF region within the range $3 < \eta < 5$ for both [$\text{pPb}$]{}and [$\text{PbPb}$]{}collisions (weighted by the tower ), where in [$\text{pPb}$]{}collisions only the [$\mathrm{Pb}$]{}-going side of HF is used because of the poor resolution from a relatively low charged-particle multiplicity on the proton-going side. In each $q_2$ class, the $v_2$ harmonic is measured with the scalar product method using a common resolution term ($v_{2,c}$) as in the $\gamma_{112}$ correlator. Therefore, the $v_{2}$ from the tracker region can be expressed in terms of the Q-vectors as
$$v_{2} = \frac{\left\langle Q_{2,\alpha}Q^{*}_{2,{\mathrm{HF}\pm}} \right\rangle}{\sqrt{\frac{\left\langle Q_{2,{\mathrm{HF}\pm}} Q^*_{2,{\mathrm{HF}\mp}}\right\rangle \left\langle Q_{2,{\mathrm{HF}\pm}} Q^*_{2,\text{trk}}\right\rangle}{\left\langle Q_{2,{\mathrm{HF}\mp}} Q^*_{2,\text{trk}}\right\rangle} }},
\label{v2_SP}$$
where particles from the HF are selected from the same region as particle $c$ in the $\gamma_{112}$ correlator.
In [$\text{PbPb}$]{}collisions, the particle $c$ in the $\gamma_{112}$ correlator is taken from
|
arxiv
|
ISftpFileReader CreateSftpFileReader(string fileName, ISftpSession sftpSession, uint bufferSize);
ISftpResponseFactory CreateSftpResponseFactory();
/// <summary>
/// Creates a shell stream.
/// </summary>
/// <param name="session">The SSH session.</param>
/// <param name="terminalName">The <c>TERM</c> environment variable.</param>
/// <param name="columns">The terminal width in columns.</param>
/// <param name="rows">The terminal width in rows.</param>
/// <param name="width">The terminal height in pixels.</param>
/// <param name="height">The terminal height in pixels.</param>
/// <param name="bufferSize">Size of the buffer.</param>
/// <param name="terminalModeValues">The terminal mode values.</param>
/// <returns>
/// The created <see cref="ShellStream"/> instance.
/// </returns>
/// <exception cref="SshConnectionException">Client is not connected.</exception>
/// <remarks>
/// <para>
/// The <c>TERM</c> environment variable contains an identifier for the text window's capabilities.
/// You can get a detailed list of these cababilities by using the ‘infocmp’ command.
/// </para>
/// <para>
/// The column/row dimensions override the pixel dimensions(when non-zero). Pixel dimensions refer
/// to the drawable area of the window.
/// </para>
/// </remarks>
ShellStream CreateShellStream(ISession session,
string terminalName,
uint columns,
uint rows,
uint width,
uint height,
IDictionary<TerminalModes, uint> terminalModeValues,
int bufferSize);
/// <summary>
/// Creates an <see cref="IRemotePathTransformation"/> that encloses a path in double quotes, and escapes
/// any embedded double quote with a backslash.
/// </summary>
/// <returns>
/// An <see cref="IRemotePathTransformation"/> that encloses a path in double quotes, and
|
github
|
Cons
Only one piece for top and bottom
Puts pressure on gums
Boiling needs to be done just right to get proper fit
Unit is slightly large for some
Does not allow jaw movement
Summary
The Brain-Pad is designed to protect the teeth and jaw from impact during low-impact sporting activities but is designed in a way that allows those with sleep problems to use it as well. It has a one piece form that can be molded to fit your mouth and also allows air through.
This makes it work well for sporting because even when the teeth are clenched it keeps them from grinding together. When it comes to sleep apnea the unit keeps the teeth apart and provides a small opening in the center that allows for breathing.
Made in three different colors, you can use this unit for a variety of different purposes and also don’t have to worry about it slipping or sliding. This is one of the drawbacks that have been mentioned because it does not allow for movement of the jaw, however it’s also important for overall usage if you are trying to keep yourself from grinding your teeth or losing that gap in the center that allows for better breathing throughout the night. The Brain-Pad unit also includes a warranty and an anti-microbial case to keep it protected when not in use.
Possible Alternatives
If you’re looking for something a little more unique, SnoreDoc is a great method of relieving sleep apnea and also eliminating snoring and teeth grinding. It uses a small bulb that is placed inside the mouth and suctioned to the tongue, therefore clearing the airway and then provides plenty of space to keep the teeth apart and still get air in and out of the airway without problem.
The Intelliguard Pro is a more expensive option that is designed in separate pieces that connects in your choice of configurations. This allows the jaw to move more freely and allows you to decide how far open you want your mouth to be during sleep. This way it’s designed to work for those with sleep apnea as well as other problems.
One final option is mouth props. These are simple to use and inexpensive to buy but they are generally not good for long term use or use throughout the night as the pieces are small. These simply fit in the corners of the mouth and keep it open to ensure that there are no obstructions when breathing. They are not fitted however and only stay as long as you continue to cl
|
pile-cc
|
15
Let u = -3 + 29. What is the greatest common divisor of 104 and u?
26
Suppose -3*b - 48 = -7*b. Let o be (0 + 4)*10/(-8). Let w = o + 23. What is the highest common factor of w and b?
6
Suppose 0*g + 5*g - 20 = 0. Suppose -2*c + p = -4*p - 14, -g*c + 4*p = -16. Calculate the highest common divisor of c and 14.
2
Suppose -2*b + 2*v + 84 = 4*v, -5*v + 10 = 0. Calculate the greatest common divisor of 10 and b.
10
Let r = 9 - 18. Let n = r + 13. Calculate the greatest common divisor of 2 and n.
2
Suppose 8*g - 3*g - w = 180, -2*w = 5*g - 165. What is the greatest common factor of 14 and g?
7
Let u be (-1)/(-3) - 816/18. Let z = u + 85. What is the highest common factor of z and 16?
8
Let f(b) = b**2 - 4*b - 1. Let j be f(8). Suppose -j + 9 = 2*c. Let q = 1 - c. What is the highest common divisor of q and 8?
4
Let m(c) = c + 42. Let w be m(-12). Calculate the highest common factor of w and 270.
30
Suppose a - 67 - 90 = 5*r, -3*a = -2*r - 445. Calculate the greatest common divisor of 21 and a.
21
Let t(q) be the second derivative of 5*q**3/6 - q**2 + 2*q. Let v be t(2). Suppose 0 = -5*g + v + 102. What is the highest common divisor of 55 and g?
11
Let k be 25 + 3/2*22/33. What is the highest common factor of k and 65?
13
Let t(c) = -8 + 1 + c + 7*c - 6*c**2 + c**3. Let n be t(5). Let s = -3 + n. What is the
|
dm_mathematics
|
---------------------- Forwarded by Maureen McVicker/NA/Enron on 08/21/2000
11:43 AM ---------------------------
"Elizabeth A. VanDersarl" <liz@luntz.com> on 08/21/2000 09:18:16 AM
To: "'skean@enron.com'" <skean@enron.com>
cc:
Subject: RE: Luntz Focus Groups (3 of 4)
|
enron_emails
|
In August 2000, Andrew Matthews filed a petition to dissolve the LLC. The court granted
the petition to dissolve the LLC and, instead of liquidating the assets and liabilities, ordered a sale
of the LLC by auction limiting the bidders to the two brothers. Eddie Matthews’ bid of $312,500
was the highest bid, thus he purchased the LLC. The successful auction, however, did not resolve
all issues between the brothers. It merely provided an opportunity for yet another dispute.
The new dispute arose when the parties submitted their proposed orders to confirm the sale
of the LLC. The proposed order submitted by Andrew Matthews provided that the LLC’s liabilities
included the indebtedness owing on the promissory note while Eddie Matthews submitted an order
which provided that the brothers, not the LLC, were each liable for one-half of the outstanding
indebtedness owing on the note. The order submitted by Andrew Matthews was entered. It provided
in pertinent part that, “The business entity known as Crossroads Market, LLC, is hereby sold to
defendant E. E. Matthews III and all of the plaintiff’s right, title, and interest in and to said LLC,
being all of his 50% membership interest in and to said company, is hereby divested from plaintiff
[Andrew Matthews] upon completed payment of the purchase price as indicated below [$312,500].”
The order also provided that, “[T]he successful bidder, E.E. [Eddie] Matthews III, must continue to
pay all obligations established by the parties during the time they jointly operated the venture known
as Crossroad Market, LLC, which would include the total payment of the outstanding promissory
note at issue.” However, Eddie Matthews filed a motion to amend the order to delete all findings
of fact and conclusions of law regarding the obligations of the LLC under any note, property
mortgage or security deed related to the realty. He contended that the issue was not properly before
the court. Following yet another hearing, the trial court granted Eddie Matthews’ motion and set for
1
W hether or not the LLC assumed the liability on the note does not relieve the brothers of their individual
liability on the note because the holder of the note, originally the parents, has not released either brother from liability
on the note. Thus, the question is whether the LLC is additionally liable on the note. The current holder of the note is
|
freelaw
|
\- etc.
~~~
jacquesm
I like the 'life wars', that's a clever one.
I'll raise your glider one f-pentomino.
Set it up so that you only have to agree to the number of life cells you can
both place, as soon as the last cell is placed the game fires and runs to
completion.
Two sliders, starting at 50 cells or so, both players can lower the slider as
long as the cells have not been all places. Each player sets a cell to their
colour in turn.
Excellent little idea, it won't make you any money in the short run but it has
a fair chance of going viral.
Core wars for life.
Really neat little idea.
edit: and now the Hacker News variation on this, set it up so there is an API
where hackers can pit their skills against each other, a sort of face off
arena for cellular automaton placement strategies.
There is your machine learning angle.
For extra points provide a schedule and a way for spectators to follow the
action.
I'd help you build it / host it :)
~~~
project_idea
Thanks, these are very nice ideas, especially the API for agents. I'd like to
build this sometime, as it should be really fun to play... There are some
issues in gameplay that I couldn't figure out yet, though. for example running
until completion could be quite hard to detect, as there can be oscillators
with a long period. Also, not sure if the board should be circular, to allow
re-entry or not... I was thinking whether players can place their cells
anywhere or just in their own restricted "corners" of the board. My main
concern however is whether the whole thing would be predictable enough to
allow some sort of strategy or it would just be too chaotic... I also sent you
a private message if you'd like to discuss...
~~~
jacquesm
No cells live or die in x generations = end of game.
Anywhere, one after the other.
~~~
project_idea
I meant one of these: <http://en.wikipedia.org/wiki/Oscillator_(CA)>
So cells keep dying and being born forever, yet the game is stable.
~~~
jacquesm
|
hackernews
|
Sensorineural hearing loss (SNHL), the most common type of deafness affecting more than 30 million Americans, is largely untreatable . When hair cells die, spiral ganglion neurons also may lose their peripheral axons and degenerate. In birds, but not mammals, supporting cells re-enter the cell cycle, divide and differentiate into new hair cells. A promising gene therapy for hair cell regeneration from non-sensory cells that remain in damaged cochlea has been accomplished in mammals for the first
|
nih_exporter
|
The reversible, ultrafast, and multistimuli responsive phase transition of vanadium dioxide (VO2 ) makes it an intriguing "smart" material. Its crystallographic transition from the monoclinic to tetragonal phases can be triggered by diverse stimuli including optical, thermal, electrical, electrochemical, mechanical, or magnetic perturbations. Consequently, the development of high-performance smart devices based on VO2 grows rapidly. This review systematically summarizes VO2 -based emerging technologies by classifying different stimuli (inputs)
|
pubmed_abstracts
|
As I write this preface in April 2020, the world is in the grip of a hitherto unimagined coronavirus pandemic which has turned all our lives upside down and sadly ended the lives of many thousands. My wife and I have been in lockdown, along with many millions of others, for over 4 weeks, and this is set to continue for some while, perhaps until the pandemic abates. By some miracle the authors of this volume have all managed to complete their individual chapters, so I will start by thanking them and their families for their tremendous efforts at this extraordinary time.
That most of us will emerge intact is in no small measure due to the bravery, hard work, and dedication of countless medical and clinical staff. They and the politicians of many countries have been guided by the insights of the scientific community, who have been rapidly learning what a hard target COVID-19 has proved to be. Once the world enters, what will undoubtedly be a long period of economic and social recovery, then will be the time for nations to reassess where their scientific priorities are best directed. It is safe to assume that much future effort will be focused on innovative therapies for communicable diseases, and it is to end that the concepts presented in this book are directed. Hitherto, quadruplex targeting by small molecules has in large part been applied to human cancers, and we are beginning to see the fruits of this with compounds coming into clinical trial. This effort will surely continue, but as shown in several chapters in this book, application of the concept to viral and other diseases can work, at least in the laboratory. Medicinal chemistry is crucial in ensuring that a compound that starts off with potency against its targets and in cells, can realistically be developed into a therapeutic agent for human use.
The quadruplex therapeutic concept, detailed by Laurence Hurley in his Foreword, is just 23 years old. In 2006, Shankar Balasubramanian and I edited a book on quadruplexes, comprehensively covering both fundamental and more applied aspects of the field. This level of coverage is no longer possible, with currently over 6000 primary publications in the literature. The field has also moved on, from being initially mostly chemistry-based, to one in which the role of quadruplexes in biological processes are the focus of much investigation. This book aims to illustrate both to those new to the topic and experienced practitioners, how chemistry and biology is coming together to create effective ways of targeting quadruplexes. It highlights a number
|
pubmed_central
|
//CSS
.price-fall {
background-color: #FFB0C4;
}
.price-rise {
background-color: #B0FFC5;
}
EDIT:
There is a way of doing this with:
function change(val){
if(val > 0){
return '<div class="x-grid3-cell-inner" style="background-color:#B0FFC5;"><span style="color:green;">' + val + '</span></div>';
}else if(val < 0){
return '<div class="x-grid3-cell-inner" style="background-color:#FFB0C4;"><span style="color:red;">' + val + '</span></div>';
}
return val || 0;
}
and then just:
...
{header: 'Change', width: 75, sortable: true, renderer: change, dataIndex: 'change', align: 'center'}
...
but this way grid gets deformed on changes from white to colored background... ???
any other ideas?
EDIT
After custom css is applyed to the column, how to remove the same in a short period of time, so it appears to blink once when the value has changed? Something like setTimeout("remove-css()",1000); or with Ext.Function.defer(remove-css, 1000);
Any ideas?
A:
I suggest using getRowClass with applying extra cls to needed columns:
Ext.create('Ext.grid.Panel', {
columns: [
// ...
{ header: 'Change', dataIndex: 'change', tdCls: 'x-change-cell' },
// ...
],
viewConfig: {
getRowClass: function(record, index) {
var c = record.get('change');
if (c < 0) {
return 'price-fall';
} else if (c > 0) {
return 'price-rise';
}
}
},
// ...
});
CSS:
.price-fall .x-change-cell {
background-color: #FFB0C4;
color:red;
}
.price-
|
stackexchange
|
The present invention is directed to an interconnect for making temporary electrical connections with semiconductor components having terminal contacts in the form of bumps, pins or springs.
In accordance with the present invention, an improved interconnect for testing semiconductor components is provided. Also provided, are a test system incorporating the interconnect, a method for fabricating the interconnect, and a testing method employing the interconnect.
The interconnect includes a substrate, and a plurality of interconnect contacts on the substrate configured to electrically engage terminal contacts on the components, such as bumped contacts, pin contacts or spring contacts. Several different embodiments of the interconnect contacts are provided including: metallized recesses sized and shaped to retain the terminal contacts; metallized penetrating projections configured to penetrate the terminal contacts; metallized recesses with penetrating projections; and metal leads on polymer tape cantilevered over metallized recesses.
The interconnect also includes one or more cavities in the substrate configured to form flexible segments of the substrate, that allow the interconnect contacts to flex, and to move independently of one another, to accommodate variations in the size, location and planarity of the terminal contacts. A location and size of the cavities can be selected to form the flexible segments, with a desired compliancy, or spring constant. In addition, the cavities can be in flow communication with a pressurized fluid or gas source, such that a flexure of the interconnect contacts can be adjusted as required, for a particular testing application. Also, the pressurized cavities permit a variable backside biasing force to be exerted on the flexible segments, to counteract a biasing force applied from a front side of the interconnect by a testing apparatus such as a wafer prober or test carrier. Alternately, the cavities can be filled with an elastomeric material, selected to provide a desired compliancy, or spring constant, for the flexible segments and the substrate.
In a first embodiment the cavities comprise separate pockets, aligned with individual interconnect contacts. In a second embodiment the cavities comprise elongated grooves aligned with multiple interconnect contacts. In a third embodiment the cavity comprises a single pocket large enough to encompass a periphery of multiple interconnect contacts.
The interconnect can be configured for die level testing of discrete components, such as bare dice or chip scale packages, or alternately for wafer level testing of multiple components contained on a common substrate, such as a wafer, a panel, a circuit board, or an electronic assembly. For a die level test system, the interconnect is configured for assembly in a testing apparatus, such as a carrier, configured to retain one
|
uspto_backgrounds
|
Volleyer
A serve and volleyer has a great net game, is quick around the net, and has fine touch for volleys. Serve and volleyers come up to the net at every opportunity when serving. They are almost always attackers and can hit many winners with varieties of volleys and drop volleys. When not serving, they often employ the "chip-and-charge", chipping back the serve without attempting to hit a winner and rushing the net. The serve-and-volleyers' strategy is to put pressure on the opponent to try to hit difficult passing shots. This strategy is extremely effective against pushers.
Serve-and-volleyers benefit from playing on fast courts, such as grass or fast concrete. The quick bounce and faster pace of play give them an advantage because opponents have less time to set up for a passing shot. However, the number of serve-and-volley players is decreasing in today's professional tennis, because this strategy requires more experience to master and defeat other playing styles (as well as changes in racquet technology that have improved players' passing shots). In addition to this, there has been a trend toward the slowing down of tennis surfaces over the past few years. The serve-and-volley technique works better on faster surfaces because the volleyer is able to put more balls away without the baseliner being able to chase them down. Although serve and volleyers may be a dying breed, there are still some great players who employ this tactic. The Frenchman Michaël Llodra has been considered by many to be the best pure serve and volleyer of today's game.
Bill Tilden, the dominant player of the 1920s, preferred to play from the back of the court, and liked nothing better than to face an opponent who rushed the net — one way or another Tilden would find a way to hit the ball past him. In his book Match Play and the Spin of the Ball, Tilden propounds the theory that by definition a great baseline player will always beat a great serve-and-volleyer. Some of the best matches of all time have pitted great baseliners such as Björn Borg, Mats Wilander or Andre Agassi against great serve-and-volleyers such as John McEnroe, Boris Becker, Stefan Edberg, or Pete Sampras.
Some players, such as Tommy Haas, Roger Federer and Andy Rod
|
wikipedia_en
|
In this paper we calculate the angular diameter of the shadow for a non-rotating black hole that is surrounded by a non-magnetized pressure-less plasma. Although we are mainly interested in the Schwarzschild case, in large parts of the paper we work in an unspecified spherically symmetric and static spacetime, so the results can be applied, e.g., also to charged black holes or to wormholes.
In our work the plasma manifests itself as a refractive and dispersive medium, which leads to a change of the light rays in comparison with vacuum. As a result, the geometrical size of the shadow is changed. We do not take into account the processes of absorption and scattering of the photons by plasma electrons. Also, we neglect the gravitational field of the plasma particles.
The paper is organized as follows. In Section \[sec:eom\] we work out the equation of motion for light rays in a plasma on a spherically symmetric and static spacetime. In Section \[sec:circular\] we determine the circular light orbits which are of crucial relevance for the formation of the shadow. In Section \[sec:shadow\] we calculate the angular diameter of the shadow. We specify the results in Section \[sec:thin\] to the case of a low-density plasma and in Section \[sec:accretion\] to the case that the plasma has the particular density profile that corresponds to spherically symmetric accretion of a dust onto a Schwarzschild black hole. In the same section we also discuss the perspectives of actually observing the influence of a plasma on the shadow of a supermassive black hole.
We use units such that $G=c=1$, so the Schwarzschild radius is $R_S=2M$. Our choice of signature is $\{-,+,+,+\}$. We use Einstein’s summation convention for latin indices which take the values $i,k,$ $\dots$ $= t, r, \vartheta, \varphi$.
Equations of motion for light rays in a non-magnetized plasma {#sec:eom}
=============================================================
We consider a spherically symmetric and static metric $$\label{eq:g}
g_{ik}dx^{i} dx^{k}
= - A(r) dt^2 + B(r) dr^2 +
D(r) \big( d \vartheta ^2 + \mathrm{sin} ^2 \vartheta \,
d \varphi ^2
|
arxiv
|
private:
template <class Archive>
void serialize(Archive& ar, const unsigned int) {
ar& socket_fd;
ar& blocking;
}
friend class boost::serialization::access;
};
class SOC_U final : public ServiceFramework<SOC_U> {
public:
SOC_U();
~SOC_U();
private:
void Socket(Kernel::HLERequestContext& ctx);
void Bind(Kernel::HLERequestContext& ctx);
void Fcntl(Kernel::HLERequestContext& ctx);
void Listen(Kernel::HLERequestContext& ctx);
void Accept(Kernel::HLERequestContext& ctx);
void GetHostId(Kernel::HLERequestContext& ctx);
void Close(Kernel::HLERequestContext& ctx);
void SendTo(Kernel::HLERequestContext& ctx);
void RecvFromOther(Kernel::HLERequestContext& ctx);
void RecvFrom(Kernel::HLERequestContext& ctx);
void Poll(Kernel::HLERequestContext& ctx);
void GetSockName(Kernel::HLERequestContext& ctx);
void Shutdown(Kernel::HLERequestContext& ctx);
void GetPeerName(Kernel::HLERequestContext& ctx);
void Connect(Kernel::HLERequestContext& ctx);
void InitializeSockets(Kernel::HLERequestContext& ctx);
void ShutdownSockets(Kernel::HLERequestContext& ctx);
void GetSockOpt(Kernel::HLERequestContext& ctx);
void SetSockOpt(Kernel::HLERequestContext& ctx);
// Some platforms seem to have GetAddrInfo and GetNameInfo defined as macros,
// so we have to use a different name here.
void GetAddrInfoImpl(Kernel::HLERequestContext& ctx);
void GetNameInfoImpl(Kernel::HLERequestContext& ctx);
/// Close all open sockets
void CleanupSockets();
/// Holds info about the currently open sockets
std::unordered_map<u32, SocketHolder>
|
github
|
Merchants participating in Amazon.com's much-advertised "Prime Day" sale saw an 80 percent rise in U.S. sales from a year earlier, according to preliminary data from e-commerce researcher ChannelAdvisor, although the event also drew ire from some shoppers.
Merchants participating in Amazon.com's much-advertised "Prime Day" sale saw an 80 percent rise in U.S. sales from a year earlier, according to preliminary data from e-commerce researcher ChannelAdvisor, although the event also drew ire from some shoppers.
The one-day sale on Wednesday, which did not apply to Irish shoppers, was for members of Amazon's $99 per year Prime subscription service and is similar to an annual sale by China e-commerce merchant Alibaba.
Wal-Mart Stores Inc also launched an online sale on Wednesday, a sign that the nation's largest retailer was concerned that Amazon was gaining market share, Gilford Securities analyst Bernard Sosnick said.
Discounts on products ranging from storage sets to robotic vacuum cleaners sent orders per minute at the peak higher than on "Black Friday, the term for the day after Thanksgiving, which traditionally has been the top retail sales day in the United States, Amazon said. It did not give detailed sales numbers but said it sold 35,000 Lord of the Rings Blu-Ray sets in 15 minutes and that a Kate Spade handbag was sold out in a minute.
Some Amazon shoppers vented on Twitter that Prime Day deals were selling out too quickly and complained that deals were not attractive enough.
Adobe Digital Index said that 50 percent of overall sentiment related to Prime Day on social media was about disappointment.
"Much of the disappointed chatter focused on the lack of blockbuster deals," it said, adding that users cited sales of less desirable items like socks and towels.
An Amazon spokeswoman said the retailer was listening to its customers and planned to add more deals like TVs.
ChannelAdvisor calculated the 80 percent rise in U.S. sales as of 12 p.m. ET (1600 GMT) based on sales by partner retailers that sell on Amazon.com.
Sales rose 40 percent in Amazon Europe, ChannelAdvisor said.
Amazon declined to comment on the data.
Wal-Mart launched a three-month online sale of some 2,000 items on Wednesday. The company said customers "shouldn't have to pay a
|
pile-cc
|
What is the closest to 5 in 1/1184, -1/2, -1/32, 1/7?
1/7
Which is the closest to -3189? (a) 1042/5 (b) 0.1 (c) -1
c
What is the closest to -625 in -2, 1, 5, 2/2109?
-2
Which is the nearest to 0? (a) 3/2 (b) 4 (c) 0.5 (d) 114 (e) -1/56
e
Which is the closest to -2/9? (a) 184 (b) 23 (c) 0 (d) -4/3 (e) 11
c
What is the closest to -2 in -596, 1/2, 31, 1, -4?
-4
Which is the nearest to -46? (a) -2/5 (b) 1/7 (c) -2 (d) -47/23
d
What is the nearest to 289 in 7/2, -3, 0.05, -2/19?
7/2
What is the closest to 56 in 2/5, -6065, -43?
2/5
Which is the closest to 2/9? (a) -1/4 (b) 4 (c) 1/5 (d) 587360 (e) -5 (f) -2/11
c
What is the closest to -4/46363 in -1/3, 0.5, 14, 5, 2/13?
2/13
Which is the closest to 11/3? (a) 0.5 (b) -95 (c) 17
a
Which is the closest to 0.2? (a) -714 (b) 1332/17 (c) -1/3 (d) -0.3 (e) -2/3
d
What is the closest to 0 in -5/21, 51, -0.3, -3, 5, -274?
-5/21
What is the closest to 4 in 1/3, 2278, -8.3, 3, -1/6?
|
dm_mathematics
|
**********************************************************************
This e-mail is the property of Enron Corp. and/or its relevant affiliate and may contain confidential and privileged material for the sole use of the intended recipient (s). Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender or reply to Enron Corp. at enron.messaging.administration@enron.com and delete all copies of the message. This e
|
enron_emails
|
Similarly, in Lewis v. Fowler, supra, the Court held that the withholding of funds from the plaintiff's wages pursuant to a garnishment would not support a conversion action in a situation where the funds had not been paid to the garnishor. In Covington v. *1387 Exxon Co. U.S.A., supra, the Court held that a conversion action would not lie where escrow funds had been commingled and deposited in numerous banks nationwide. In Johnson v. Life Ins. Co. of Alabama, 581 So.2d 438, 443 (Ala.1991), the Court held that an action would not lie for the alleged conversion of life insurance premiums paid by the plaintiffs, because "there was no specific, identifiable coin or bill [and no] evidence that the money had been placed into a separate account." In Greene County Bd. of Educ. v. Bailey, 586 So.2d 893, 899-90 (Ala.1991), the Court reversed a Rule 12(b)(6), Ala.R.Civ.P., dismissal of an action because "The allegations of the complaint suggest that the plaintiff may be able to prove that the defendants... converted to their own use funds that had been specifically deposited in the `[Paramount High School] lunchroom account' to pay for the high school's breakfast and lunch programs."
In this case, there is no evidence of money placed in an account at all, much less money placed in a specific account for the benefit of Tunstall. According to the evidence, Green Tree maintained a zero balance in its account and at the end of each day would borrow against its line of credit the amount needed to pay the checks presented that day. It wrote a check to Graves for $1200, but it never delivered the check and never deposited any money into an account to pay it. Tunstall does not argue that Green Tree converted the check itself; aside from any other impediments to such a claim, we do not see how Tunstall could argue that he had title to, or an immediate right to possession of, a check made payable to Graves.
Green Tree became a creditor of Tunstall, whether through its initial approval of the loan or through its purchase of the installment sales contract from Graves. Although it assigned a number to Tunstall's loan, it did not set aside funds to an account with this number. Any funds it held that might be used to fund this loan or to pay for the air condition
|
freelaw
|
~~~
lawl
Thanks, you answered some questions, but I still have some question marks.
I've bookmarked the website and will check back for the (white)paper.
------
gnarcoregrizz
So this is like a decentralized keybase? Are the identities and associated
public keys stored in a decentralized manner? It wasn't clear to me when I
registered an identity, because I figured if it's decentralized, then I would
have to pay for it in some manner with a cryptotoken. I always thought this
would be a good use case for Ethereum (and indeed, there seem to be a few
projects working on it). It would be extra cool if it could integrate into
existing wallet/dapp software so you don't need to juggle extra keys. Anyway,
cool stuff. I'm hoping more people adopt end to end encryption
edit* looks like the identities are stored in a decentralized manner, and that
all of this should integrate with blockstack's keychain and browser
~~~
prabhaav
Yes, the blockstack node package running on your machine generates the key
pairs for you and thus the keys are stored on your local machine, not a
centralized authority.
The reason you need an .id is because we have to register your identity on the
blockchain and propagate your zonefiles.
We can help you register a .stealthy.id that gives you access to the tool if
you create an account today :)
------
kodablah
Pardon my Blockstack ignorance, but are keys deterministically created via
some kind of KDF w/ some factors I provide or are the users expected to handle
key management? IMO the latter significantly restricts adoption, especially in
a multi-device-same-identity world.
~~~
prabhaav
Users have to back up a 12-word mnemonic phrase, a la BIP39. We also email
users an encrypted copy of their phrase (where their password is the key)
~~~
kodablah
I think email is a reasonable place to do this since it's one of the few
storage places people keep around across devices (sadly, other services with
no centralization at all can't easily send SMTP). Could also consider a
printable QR code I guess. I assume the Blockstack browser or whatever makes
it easy
|
hackernews
|
This subproject is one of many research subprojects utilizing the resources provided by a Center grant funded by NIH/NCRR. The subproject and investigator (PI) may have received primary funding from another NIH source, and thus could be represented in other CRISP entries. The institution listed is for the Center, which is not necessarily the institution for the investigator. Herpes simplex virus type-2 (HSV-2) infection enhances the transmission and acquisition of human immunodeficiency virus (HIV). This
|
nih_exporter
|
Phase III trial of cyclophosphamide versus cyclophosphamide, doxorubicin, and methotrexate in hormone-refractory prostatic cancer. A Hoosier Oncology Group study.
Between August 1984 and November 1989, the Hoosier Oncology Group conducted a Phase III study comparing cyclophosphamide (CTX) with cyclophosphamide, doxorubicin, and methotrexate (CAM) in patients with hormone-refractory metastatic prostatic cancer to determine whether the addition of doxorubicin and
|
pubmed_abstracts
|
Additional insights into the timing and importance of inflammasomes in CNS injury have been gained from recent TBI studies. In an FPI model, inflammasome components, such as ASC and caspase-1, were shown to be upregulated in cortical neurons for up to 24 h post-injury ([@B110]). Co-immunoprecipitation of inflammasome proteins also demonstrated that NLRP1 and ASC could be detected in multiprotein complexes in the brain. Treatment with an ASC-neutralizing antibody reduced caspase-1 activation and IL-1β production while also decreasing lesion volume, suggesting beneficial effects of targeting inflammasome activity. Liu et al. also recently showed that TBI results in upregulated expression of NLRP3, ASC, and caspase-1. Moreover, they report that the expression of these inflammasome-associated proteins can remain elevated out to 7 days post-injury ([@B111]). Importantly, inflammasome components in this model localized not only to neurons, but also to astrocytes and microglia, suggesting a wide range of inflammasome activation across cell types. Measurements of IL-1β and IL-18 protein levels also demonstrated that while IL-1β peaks around 6 h after injury and subsequently decreases over time, IL-18 expression remains elevated through 7 days after injury. In agreement with these findings, a separate study also reported elevated IL-18 production for at least a week post-TBI in both humans and experimental animals ([@B112]). These data suggest that early inflammasome production of IL-1β may be involved in acute inflammation and tissue damage, while inflammasome-driven IL-18 may contribute to the perpetuation of TBI-induced inflammation. It should be noted, however, that in a more recent study neither NLRP1 nor ASC knockout mice exhibited any improvements in lesion volume, histopathology, cell death, or motor function following CCI injury ([@B81]). It is possible that differences in the extent of caspase-1 abrogation and/or the timing of inflammasome inhibition or differences in injury models may help explain the disparate results that were reported in these studies.
Although key roles for inflammasomes have been clearly identified in other models of sterile inflammation and trauma, the specific contributions of inflammasome activation to TBI pathogenesis have only recently been investigated and multiple questions remain. For instance, although the formation of inflammasome complexes has been reported following TBI, the roles that specific inflammasomes play in driving TBI-associated pathology and neurological dysfunction have not
|
pubmed_central
|
library ieee;
use ieee.std_logic_1164.all;
entity stackoverflow_edges is
port ( clk : in std_ulogic;
rst : in std_ulogic;
sig1 : in std_ulogic;
sig2 : in std_ulogic;
bito : out std_ulogic );
end entity stackoverflow_edges;
architecture rtl of stackoverflow_edges is
signal sig1_d1 , sig2_d1 : std_ulogic;
signal sig1_rise, sig2_rise : std_ulogic;
begin
-- Flops to store a delayed version of the control signals
-- If the contorl signals are not synchronous with clk,
-- consider using a bank of 2 delays and using those outputs
-- to generate the edge flags
delay_regs: process ( clk ) is
begin
if rising_edge(clk) then
if rst = '1' then
sig1_d1 <= '0';
sig2_d1 <= '0';
else
sig1_d1 <= sig1;
sig2_d1 <= sig2;
end if;
end if;
end process delay_regs;
-- Edge flags
edge_flags: process (sig1, sig1_d1, sig2, sig2_d1) is
begin
sig1_rise <= sig1 and not sig1_d1;
sig2_rise <= sig2 and not sig2_d1;
end process edge_flags;
-- Output control bit
output_ctrl: process (clk) is
begin
if rst = '1' then
bito <= '0';
elsif sig1_rise = '1' then
bito <= '1';
elsif sig2_rise = '1' then
bito <= '0';
end if;
end process output_ctrl;
end rtl;
I'm a lot more comfortable in verilog, so double check this VHDL (any comments appreciated).
waveforms http://img33
|
stackexchange
|
1. Field of the Invention
The present invention relates to an image data communication apparatus such as a network facsimile apparatus, and a method of communicating the image data.
2. Background Information
When a user sends data through a facsimile machine, the data generally contains a transmitter's identification. The transmitter's identification is usually registered at the facsimile machine, and is overwritten on image data or printed on the upper end of the image data received by a recipient. The transmitter's identification is generally input to the facsimile machine through its operation panel. Identification data created by a personal computer (PC) can be also sent into a facsimile machine via the PSTN (Public Switched Telephone Network). On the other hand, registration through E-mail (electronic mail) can be practiced in a network facsimile that communicates through a network such as the Internet.
As discussed above, using a regular facsimile machine, a recipient can identify who sent a message even it has no name in a “From:” line, because the transmitter's identification is overwritten on the message or printed on the upper end of the received paper. However, in the case of the network facsimile, a message does not always arrive at a facsimile machine, but it may arrive at a terminal of a PC or a workstation, which is capable of receiving E-mail. In such a case, the terminal confirms the arrival of data with E-mail browsing software, and because the message is sent as a file attached to the E-mail, a recipient cannot identify who sent the message until the recipient reads the attached file. When the recipient answers the message through a reply function of the browsing software, the answer is always sent back to the facsimile machine that has sent the message. Therefore, if an intended person does not watch the machine for the arrival of an answer, or another person is present at the machine, the answer is sometimes misplaced or delivered to a wrong address.
Further, a facsimile machine's operation panel does not easily register multi-digit data such as a mail address, and further, such registering is time consuming. On the other hand, registration through the PSTN requires a dedicated program at a PC side, and this method thus has not become popular. Registration through E-mail allows a simple input operation; however, a format readable by a facsimile machine must be employed. Thus, the operator must be furnished with some knowledge before registering a mail
|
uspto_backgrounds
|
List of directors of Teylers Stichting
This list contains a list of the directors of Teylers Stichting (Teylers Foundation) - there are five directors at the Foundation, which together make up the Board. Appointments were for life, although directors can resign. The years indicate their membership.
Original appointed directors
The directors appointed in the testament of Pieter Teyler van der Hulst:
Jacobus Barnaart (1778 - 1780)
Isaac Brand (1778 - 1782)
Gerard Hugaart (1778 - 1791)
Antoni Kuits (1778 - 1789)
Willem van der Vlugt Sr. (1778 - 1807)
Co-opted directors
Replacements were added by cooptation.
Adriaan van Zeebergh (1780 - 1824)
Jan Herdingh (1782 - 1822)
Bartel Willem van der Vlugt (1789 - 1839)
Abraham Hugaart Heems (1791 - 1827)
Koenraad Hovens (1807 - 1817)
Willem van der Vlugt (1817 - 1849)
Vincent Loosjes (1822 - 1841)
Laurens van Oukerke (1824 - 1835)
Sybren Klazes Sybrandi (1827 - 1854)
Vincent van der Vlugt (1835 - 1867)
Willem van Walré (1839 - 1872)
Vincent Pzn Herdingh (1841 - 1858)
Laurens van Hulst (1850 - 1851), resigned
Jan van der Vlugt (1851 - 1889)
Carel Godfried Voorhelm Schneevoogt (1854 - 1877)
Klaas Sybrandi (1858 - 1872)
Alexander Herdingh (1867 - 1906)
Willem van Oorde (1872 - 1888)
Louis Paul Zocher (1872 - 1915)
Pieter Loosjes (1877 - 1910)
Daniel de Haan (1889 - 1895)
Anthonie Wilhelm Thöne (1889 - 1921)
Jacobus Johannes van Oorde (1895 - 1924), resigned
Jan Adriaan
|
wikipedia_en
|
Here we have used the same notation for the fractional Mellin amplitudes $M_{\kappa (i_4\dots i_1)}$ as in [@mack2009] and assumed that they are to be known from OPE, generalising them to the free parameter $\kappa$. These amplitudes are functionals of the functions $F$ and the kinematic relations on $\omega_i$. Determination of the fractional Mellin amplitudes is no trivial matter as it also is not in using the ordinary Mellin transform. At this stage one may return to the procedures of using the kinematic relations between the different exponents $\xi_{ij}^0$ and the identification of the Mellin amplitudes from field theory, methods that have meanwhile been described in extension in the literature. The calculation parallels that [cf., e.g., @fitz2012] for the ordinary Mellin analogue. It is clear that in taking the limit $\kappa\to\infty$ after having performed all calculations reproduces the result that would be obtained applying the ordinary Mellin transform.
The possible advantage of the approach given in this brief note is that in the last expression the complex integration variables appear merely as variables in the denominator of the inverse fractional Mellin transform $\mathcal{M_\kappa}^{-1}$. In addition to the freedom gained which is buried in the arbitrary, possibly even complex parameter $\kappa$, they have got rid of their property of being complex powers, a property that should substantially simplify the application to CFT and the CFT/AdS duality. The second form of the Mellin transform lacks this obvious advantage.
[99]{} Treumann R A & Baumjohann W. (2014) Fractional Laplace transforms – a perspective, Front. Phys. 2:29. doi:10.3389/fphy.2014.00029
Mack G. (2009) D-independent representation of conformal field theories in D dimensions via transformation to auxiliary dual resonance models. Scalar amplitudes, arXiv:0907.2407v1 \[hep-th\]
Mack G. (2010) D-dimensional conformal field theories with anomalous dimensions as dual resonance models, arxiv:0909.1024v1 \[hep-th\]
Maldacena J M. (1998) The large N limit of superconformal field theories and supergravity, Adv. Theor. Mathemat. Phys. 2:231
Osterwalder K & Schrader R. (1973) Axioms for e
|
arxiv
|
for _, tt := range tests {
s := trans.FmtDateShort(tt.t)
if s != tt.expected {
t.Errorf("Expected '%s' Got '%s'", tt.expected, s)
}
}
}
func TestFmtNumber(t *testing.T) {
tests := []struct {
num float64
v uint64
expected string
}{
// {
// num: 1123456.5643,
// v: 2,
// expected: "1,123,456.56",
// },
// {
// num: 1123456.5643,
// v: 1,
// expected: "1,123,456.6",
// },
// {
// num: 221123456.5643,
// v: 3,
// expected: "221,123,456.564",
// },
// {
// num: -221123456.5643,
// v: 3,
// expected: "-221,123,456.564",
// },
// {
// num: -221123456.5643,
// v: 3,
// expected: "-221,123,456.564",
// },
// {
// num: 0,
// v: 2,
// expected: "0.00",
// },
// {
// num: -0,
// v: 2,
// expected: "0.00",
// },
// {
// num: -0,
// v: 2,
// expected: "0.00",
// },
}
trans := New()
for _, tt := range tests {
s := trans.FmtNumber(tt.num, tt.v)
|
github
|
People who have saved this event:
Prior to their appearance at the Istanbul Biennial 2015, drawings by Christine Taylor Patten will be exhibited at Leyden Gallery. The micro/macro drawings are part of a continuum of 2000 2.5 cm crowquill and black ink drawings made over 40 years. Curated by Art Historian Griselda Pollock.
About
Because my eyes are drawing eyes, I sometimes see things that others might not think of as drawings. Christine Taylor Patten
These drawings are part of the artist’s micro/macro series, which she began in 1998. This series consists of 2,001 works: a continuum of 2,000 one-by-one-inch drawings and 1 seven-by-twenty-four-feet drawing. This exhibition will consist of 250 of the intricately wrought, crow quill and ink micros as well as a large scale study for the macro entitled imagine2. The micro/macro drawings on display are crowquill and black ink drawings that progress from a single dot in space that breaks apart and then evolves into myriad movements, each one referencing the previous drawing and promising new possibilities for another. Patten says that she is ‘fascinated by the interconnections that happened as the series progresses, exposing familiar form caused by what has come before. The images reiterate each other yet they are changing from one movement to another, ad infinitum, with each pen stroke responding to what has already happened in the drawing. At each point of convergence the direction of the image is arbitrary, unplanned, evolving amongst the infinite possibilities generated by the process.’
The show is co-curated by Adriana Cerne and the esteemed Art Historian Griselda Pollock who will give a talk on the work of Christine Taylor Patten at Leyden Gallery on the 13th March. Pollock is also an advisor to the Istanbul Biennale in 2015, where Christine Taylor Patten’s work will be exhibited following its appearance at Leyden Gallery.
As Griselda Pollock has said of this work, it is ‘Abstract, yet akin to contemporary scientific researches into chaos theory and turbulence, Christine Taylor Patten's work resonates with contemporary physics but also with music and the visual arts. Bach and Vermeer are invoked by the artist as her mentors and models, the one endlessly fascinated with the very possibilities of musical form yet deeply and passionately ethical and spiritual, the other quiet
|
pile-cc
|
Let y(h) = 2*h. Let g(p) = 30*p - 68. Let l(w) = 49*w - 147. Let r(m) = 7*g(m) - 4*l(m). Determine r(y(k)).
28*k + 112
Let k(m) = -7*m**2 + 3. Let s be ((-1)/3)/((-30)/6390). Let w(n) = -68*n**2 + 214*n**2 - 74*n**2 - s*n**2. Determine w(k(a)).
49*a**4 - 42*a**2 + 9
Let s(m) = m**2 + 2*m - 6. Let l(z) = 8*z**2 + 18*z - 54. Let u(k) = 2*l(k) - 18*s(k). Let i(f) = -106*f + 5. Give i(u(b)).
212*b**2 + 5
Let n(x) = x**2 - 2990*x - 1. Let u(l) = 224*l**2. What is n(u(k))?
50176*k**4 - 669760*k**2 - 1
Let j(o) be the first derivative of 3*o**2 + 1. Let c(q) = -1164*q**2 + 597*q**2 + 571*q**2. Determine j(c(b)).
24*b**2
Let j(t) = -2*t. Let s(d) = -12*d**2 + 5023*d + 5. What is j(s(f))?
24*f**2 - 10046*f - 10
Let z(y) = 2*y**2 + 23*y. Let g be (-10)/(-6) + 12/36. Let h(o) = -37*o**2 + 12*o**g + 7*o**2 + 16*o**2. Determine z(h(n)).
8*n**4 - 46*n**2
Let l be (320/(-60) + 7)/((-1)/3). Let p(m) = 9*m - 5. Let n(t) = 2
|
dm_mathematics
|
I hope you are all doing well. Maman told us of your struggles to get the
medication you need. I hope things work out. How are the kids doing? Kali
and Michael are very excited that school is almost out--just two more weeks.
They can't wait for Alexia and Sebastien to get here.
See you soon..
Love,
Susan
"Janis Pereira"
|
enron_emails
|
I. BACKGROUND
On April 1, 1997, Paul Green ("Green"), predecessor in interest to PG 1044, entered into a ten-year agreement for de Nails, LLC, to rent the second floor of 1044 Madison Avenue in Manhattan (the "Premises"). Trial transcript ("Tr.") at 9; Plaintiff's Trial Exhibit ("PX") 1 (Lease Agreement, dated April 1, 1997, hereinafter also referred to as "Lease"). The Lease included an exhibit listing certain salon-related items. According to the Lease:
Upon the expiration or other termination of the term of this Lease, Tenant shall quit and surrender to Owner the demised premises, broom clean, in good order and condition except fixtures listed on Exhibit 1.
PX 1 at ¶ 22. The Lease also provided that:
In addition to the payment of rent and additional rent provided for in this Lease, Tenant shall pay the Landlord at the signing of Lease the sum of Fifty Thousand Dollars ($50,000) in consideration of the right to use during the term of this Lease equipment as per the list of equipment attached as Exhibit 1.
Id. The Lease set the base monthly rental as $8,333 for the first three years, $9,167 for the following four years, and $10,083 until March 31, 2007. Id. The Lease was amended on June 30, 1998, to name Sirene One as the tenant, and included a limited guaranty establishing Karen Wu ("Wu") as guarantor for Sirene One. Tr. at 11, 29-30; PX 2. In relevant part, Wu guaranteed to Green
the full payment, performance and observance of all agreements to be performed and observed by Tenant in the attached lease, including the "Rules and Regulations" as therein provided, and including the payment of any of Landlord's *514 legal expenses pertaining to Landlord's legal actions against Tenant.
PX 2. On January 4, 1999, Green deeded the building in which the Premises are located to PG 1044.
Sirene One opened a beauty salon at 1044 Madison Avenue named "Karen Wu: Beauty and Wellness Spa." In 2001, Siren One failed to make a number of rental payments. Tr. at 12-13. After making several verbal and written demands, PG 1044 commenced eviction proceedings. Tr. at 12, 15. The parties entered into a stipulation of
|
freelaw
|
~~~
cylinder
It matters because it matters to people. It's completely arbitrary, but
sometimes humans just work that way. Like it or not, there are going to be
individuals watching the nightly news tonight and will hear about the Dow
crossing 16,000, and they will think "Wow, it's going up, I need to get in on
this," and/or it will affect their confidence as consumers going into an
important time of year for consumer spending.
------
dev1n
The non-energy activity sector of the economy has been growing at a rate much
faster than the physical, energy-related activity sector of the economy. This
type of decoupling is terrible and can only last for so long. I would suggest
checking out Tom Murphy's blog Do The Math where he examines this decoupling
in awesome depth [1]
[1]: [http://physics.ucsd.edu/do-the-math/2011/07/can-economic-
gro...](http://physics.ucsd.edu/do-the-math/2011/07/can-economic-growth-last/)
------
hansjorg
An interesting article about the Dow Jones Industrial Average by Adam
Davidson: Why Do We Still Care About the Dow?
[http://www.nytimes.com/2012/02/12/magazine/dow-jones-
problem...](http://www.nytimes.com/2012/02/12/magazine/dow-jones-
problems.html?pagewanted=all&_r=0)
------
iYuzo
Forget the Dow. The point is that the markets are doing well, despite all the
negative coverage it gets from the media and so called pundits. Corporate
profits are near all time highs. Companies are becoming more lean and mean.
Innovation and the proliferation of new technology is shifting the paradigms
of every industry at an unprecedented rate. Europe is finally starting to see
a bottom. China has enormous potential of becoming a consumer market not only
for itself but for the rest of the world. South America (Brazil mainly) is
taming inflation and spurring healthier economic growth. I'm not going to go
through the list of countries that are doing better than they were 3-4 years
ago, the B
|
hackernews
|
Since our discovery, published in 1965, that macromolecular binding of radioactivity from labeled cortisol could be an intermediate step in the hormonal induction of liver enzymes, like tyrosine aminotransferase, we have provided evidence for 6 proteins, including the hormone receptor, in liver cytosol which bind glucocorticoids or their anionic metabolites (primarily mono- and disulfates). This application for continued support is sought for research focused to three of these proteins: the glucocorticoid receptor, ligandin and a new glucocorticoid anion
|
nih_exporter
|
PMMA-based bioactive cement: effect of glass bead filler content and histological change with time.
A new bioactive bone cement (designated GBC), which is a polymethyl methacrylate (PMMA)-based composite consisting of bioactive glass beads as an inorganic filler and high molecular-weight PMMA as an organic matrix, has been developed. The purpose of the present study was to evaluate the effect of the filler content on the mechanical properties and osteoconductivity of GBC, to decide the
|
pubmed_abstracts
|
Samples were prepared according to an established procedure[@b41]. Briefly, cells were fixed in a solution containing 2% paraformaldehyde, 2.5% glutaraldehyde, 0.2 M sodium cacodylate for 1 h. Fixed cells were suspended in a buffered solution containing 1% osmic acid for 1 h, followed by dehydration in a graded ethanol series, washing with acetone and embedding into EPON epoxy resin. Ultrathin sections (60--80 nm) were prepared on an ultramicrotome and double-stained with uranyl acetate and lead citrate. All sections were examined and photographed with a Hitachi H-600 transmission electron microscope (Hitachi, Tokyo, Japan).
Statistical Analysis
--------------------
All data are presented as means ± S.D. obtained from three independent experiments. Statistical differences were calculated using Student's *t-test*, with the following symbols of significance level: \**P* \< 0.05, \*\**P* \< 0.01.
Additional Information
======================
**How to cite this article**: Bai, L.-Y. *et al*. A triterpenoid from wild bitter gourd inhibits breast cancer cells. *Sci. Rep.* **6**, 22419; doi: 10.1038/srep22419 (2016).
Supplementary Material {#S1}
======================
###### Supplementary Information
This work was supported in part by grants from the National Science Council (NSC 101-2320-B-039-029-MY2), and Ministry of Science and Technology (MOST 103-2320-B-039-023-MY3). The authors would like to thank Core Facility Center, Office of Research and Development (Taipei Medical University) for the technical support of transmission electron microscope.
**Author Contributions** L.-Y. and J.-R. wrote the main manuscript, C.-F. and S.-J. prepared Figures 4 and 5. W.-Y. and P.-C. provided advice on the experiments. All authors reviewed the manuscript.
![Antiproliferative effects of 3β,7β,25-trihydroxycucurbita-5,23(*E*)-dien-19-al (TCD) in breast cancer cells, normal human breast epithelial cells, and primary bone marrow cells.\
(**A**) The chemical structure of TCD. (**B**) Dose-dependent supp
|
pubmed_central
|
Q:
.NET Design: Bubbling up exceptions to better refactor entity consumers, is it a good practice?
Not sure it's best place to discuss this question since it's kinda broad so I'm gonna attempt to narrow down the scope a bit.
My Background
Back the other day, I asked a couple of questions about some design decisions in to the manager of the team I recently joined. I'm working on a trading application for a corporate investment bank and there is quite a lot of legacy code (like in any other software application that has survived to changes for more than 5 years).
To make it short, it seems a common practice here to not throw any exception and not really checking the arguments passed to a method or to a constructor. While I agree that there are cases where arguments check is worthless, it might help to throw an exception when certain types or range of values cannot work with you method.
People are using TDD here and I'm fine with that but I don't think everything can be prevented with that practice. But swallowing exceptions and letting other disasters happen in silence is in no way any better, tests help in many to prevent this kind of problem to occur, but not always.
It's always a matter a context, but in my past a job putting exceptions helped my team a lot to improve the code quality, by bubbling up all the problems we got, mostly by pointing out the exceptional values passes to some entities, ah legacy code... again) and proceeding to an appropriate refactoring.
Problem / Scenario
Say if I have a type A used by a type B, generally-speaking to throw up an exception from A in the face of B in the case of B is misusing A (e.g. value out of range, etc.), is that really a bad practice? It's supposed to help B to process A in the right way (e.g. passing right arguments to the constructor, etc.). When you look at the .NET framework there are plenty of exceptions when you misuse classes then exceptions are raised and let you know that it's not supposed to work with this or that.
Again, exceptions are supposed to be exceptional but if we take an example of a very simple entity or method parsing an IP address, the .NET Framework gently let you know that the string passed is not okay for that:
var address = IPAddress.Parse(@"It makes sense =]");
// An unhandled exception of type
|
stackexchange
|
In a SAD method, partial images are cut off from a base image and a comparative image respectively by using a rectangular window, and the total sum of absolute values of difference between luminance values of the partial images is calculated. Characteristics values here, such as a SAD value, indicate a level of difference in luminance of images. The position of the rectangular window of the comparative image is then shifted on a per pixel basis in the baseline direction to find a alignment at which the SAD value is minimized, which is defined as “pixel level disparity (i.e. partial displacement)”. Thereafter, three SAD values around the minimum value (i.e. the minimum, the second minimum, and the third minimum of SAD values) are used to calculate “sub-pixel level disparity (i.e. partial displacement)” by isometric linear fitting.
Such a SAD method has traditionally been used and characterized by relatively high analytical resolution with less computation. However, the SAD method suffers from low accuracy of sub-pixel level disparity calculation; the SAD method can determine disparity (i.e. partial displacement between images) only on the order of ¼ to 1/16 pixel accuracy and is difficult to satisfy the need for highly accurate disparity calculating functions.
Recently, therefore, the POC method draws attention for its high accuracy in disparity calculation. In the POC method, partial images are cut off from a base image and a comparative image respectively by using a window function for reducing an effect from harmonics occurring when a Hanning window or the like is used to cut off an image, and a 2D Fourier transformation is performed on the partial images. The 2 pieces of Fourier image data are combined and the amplitude component is normalized. A 2D inverse Fourier transformation is then performed on the data to determine a phase-limited correlation coefficient. The amount of partial displacement between images is then determined based on a correlated peak.
Such a POC method, which is referred to as a 2D POC method, has an advantage of very high accuracy in disparity calculation. However, the 2D POC method requires a large amount of computation in disparity calculation, and it is difficult to compute in a short time. In addition, the 2D POC method is inferior to the SAD method in terms of analytical resolution, which is the quantity on a screen at which isolated objects can be distinguished and the distance can be measured.
Recently, a 1D POC method is proposed (see Patent Literature 1), which requires less
|
uspto_backgrounds
|
The African long-fingered bat (Miniopterus africanus) is a species of vesper bat in the family Vespertilionidae.
It is found only in Kenya.
It is found in subtropical or tropical moist montane forests. This species is often considered a synonym of Miniopterus inflatus.
The holotype was collected in October 1926 by A. M. Bailey.
It was described as a new species in 1936 by Colin Campbell Sanborn.
Description
It is similar in appearance to the Natal long-fingered bat, but it is much larger.
Its dorsal fur is light brown, with the bases of individual hairs darker than their tips.
Its ventral fur is lighter than the dorsal fur, with individual hairs brown at the base and gray at the tip.
Its forearm is long.
The greatest length of the skull is long.
Biology
It is known to be infected with the parasite Polychromophilus melanipherus, which helps support the hypothesis that Haemosporidiasina transitioned from avian hosts to bat hosts in a single evolutionary event.
The 2016 study concluded that it was likely that malaria parasites affecting humans and rodents evolved from parasites affecting bats.
The African long-fingered bat's evolutionary lineage diverged from other long-fingered bats approximately 20 million years ago.
In 2013, an individual from this species tested positive for polyomaviruses.
However, bats are unlikely to be the source of polyomavirus infection in humans, as none of the lineages found in bats so far is known to infect humans.
Range and habitat
It has only been documented in Kenya.
Its type locality is Sanford's Ranch in Mulo, Kenya, which is to the northwest of Addis Ababa.
It was collected at above sea level.
It has been documented roosting in limestone-rich coral caves on the eastern coast of the country.
Conservation
It is currently evaluated as least concern by the IUCN.
However, the last formal evaluation of this species occurred in 2004.
Some of the caves that it roosts in are threatened by human activities, such as burning and cutting vegetation growing at the mouths of the caves.
Some Kenyans do not understand that bats are important, and may view them as a nuisance or take direct actions to harm them.
Caves are also threatened by expanding human population.
Ken
|
wikipedia_en
|
To derive the closed equations for $n^{(s)}_{q\omega}$, first integrate Eq. with respect to $p$: $$\begin{aligned}
\label{conteq}
\omega e n^{(s)}_{q\omega} + q j^{(s)}_{q\omega} = &\frac{\alpha}{2 \hbar} q s e n_0 F_{q\omega}\\
&{}+\frac{\alpha q s e}{2\hbar} \left[ 2 E n^{(s)}_{q\omega} + E_q n_0 \sum_{\varsigma} n^{(\varsigma)}_{q\omega}\right]\,.\notag\end{aligned}$$ Substitute $j^{(s)}_{q\omega}$ from Eq. to Eq. , express $f^{(s)}_1(q,p,\omega)$, and integrate the latter with respect to $p$ to get $n^{(s)}_{q\omega}$.
Further notations will be simplified by introducing the dimensionless variables as $\tilde{\alpha} = \dfrac{2}{\pi}\dfrac{\alpha n_0}{e a_B}$, $\mathcal{U}_q = \dfrac{U_q}{\pi \hbar v_F}$, $\mathcal{E} = \dfrac{E}{e n_0^2}$, $\mathcal{E}_q = \dfrac{E_q}{e n_0}$, $\mathcal{F}_{q\omega} = \dfrac{F_{q\omega}}{e n_0}$, and $v_q = \dfrac{\omega}{v_F q}$, with $v_F = \dfrac{\hbar k_F}{m}$ and $a_B$ being the Bohr radius in the material.
The system response to the external perturbation is governed by the following equations ($s = \pm 1$), $$\begin{aligned}
\label{linearsystem}
&n^{(s)}_{q\omega} \left((\mathcal{E} + \mathcal{E}_q/2 )\mathcal{E}_q \tilde{\alpha}^2 - \mathcal{U}_q + v_q^2 - 1- \tilde{\alpha} s v_q \mathcal{E}_q\right) \notag \\
&{} + n^{(-s)}_{q\omega}\left( (\mathcal{E} + \mathcal{E}_q/2 )\mathcal{
|
arxiv
|
# save the ancestors for a block, as well as updating the height
# note: this is internal/private so make it into a macro
macro m_saveAncestors($blockHashArg, $hashPrevBlockArg):
with $blockHash = $blockHashArg:
with $hashPrevBlock = $hashPrevBlockArg:
self.internalBlock[self.ibIndex] = $blockHash
m_setIbIndex($blockHash, self.ibIndex)
self.ibIndex += 1
m_setHeight($blockHash, m_getHeight($hashPrevBlock) + 1)
# 8 indexes into internalBlock can be stored inside one ancestor (32 byte) word
$ancWord = 0
# the first ancestor is the index to hashPrevBlock, and write it to ancWord
$prevIbIndex = m_getIbIndex($hashPrevBlock)
m_mwrite32(ref($ancWord), $prevIbIndex)
# update ancWord with the remaining indexes
with $i = 1:
while $i < NUM_ANCESTOR_DEPTHS:
with $depth = m_getAncDepth($i):
if m_getHeight($blockHash) % $depth == 1:
m_mwrite32(ref($ancWord) + 4*$i, $prevIbIndex)
else:
m_mwrite32(ref($ancWord) + 4*$i, m_getAncestor($hashPrevBlock, $i))
$i += 1
# write the ancestor word to storage
self.block[$blockHash]._ancestor = $ancWord
# private (to prevent leeching)
# returns 1 if 'txBlockHash' is in the main chain, ie not a fork
# otherwise returns 0
def priv_inMainChain__(txBlockHash):
if msg.sender != self:
~invalid()
txBlockHeight = m_getHeight(txBlockHash)
# By assuming that a block with height 0 does not exist, we can do
# this optimization and immediate say that txBlockHash is not in the main chain.
# However, the consequence is that
# the
|
github
|
Farm Bill: Congress is now keeping farmer’s hours to avert the dairy cliff
Submitted by admin on Mon, 12/31/2012 - 11:18
Hoard's Dairyman:
Farm Bill: Congress is now keeping farmer’s hours to avert the dairy cliff
Date:
Mon, 12/31/2012
As 2012 comes to a close, the halls of Congress will look like a well-lighted dairy barn.
by Corey Geiger, Hoard’s Dairyman Assistant Managing Editor
Late December is traditionally the time of year when Americans spend time with their families. Not so if you are a congressional staffer, an elected national official . . . or even a dairy farmer. The halls of Congress are filled with late-year hustle and bustle as national leaders try to avoid the self-created fiscal cliff. Dairy also has its own cliff.
Even President Obama has joined the discussion because on New Year’s Day the 1949 Permanent Farm Bill law would go into effect. It would require USDA to begin buying dairy products at the equivalent of $38 per hundredweight. That would not be healthy for consumers or the long-term balance of the dairy industry. However, it is that threat of the 1949 Permanent Farm Bill law that is causing the late-year debate on dairy policy.
All that said, today could be the day long-term dairy policy gets passed or we may just kick the can down the road. If it has any chance, you better get on the phone and call your legislators, in both the House and Senate, to let them know your opinion on dairy legislation.
What are the current options? There are three (3) House Bills that have been filed:
1. There is a 78-page draft bill that has been posted which includes an extension of the farm bill through next September 30. Since dairy really has no national program in place, this potential legislation also includes the Dairy Security Act (DSA) with its margin protection program. This option has the support of the Agriculture Committee Chairs: Senator Stabenow (D-Mich.) and Representative Lucas (R-Okla.)
For dairy, this is basically the bill that was passed by the Senate and House Ag Committee earlier this year. As David Rogers of Politico wrote on December 30, the legislative process to pass this version has been stopped by Speaker John Boehner (
|
pile-cc
|
1/19
Calculate prob of sequence kmj when three letters picked without replacement from {d: 4, w: 3, k: 2, y: 1, j: 4, m: 1}.
4/1365
Three letters picked without replacement from {a: 3, z: 2, h: 1, i: 6, n: 1}. What is prob of sequence zii?
5/143
Two letters picked without replacement from {s: 4, q: 1, r: 3, a: 11}. What is prob of sequence ra?
11/114
Calculate prob of sequence addo when four letters picked without replacement from {o: 5, d: 4, a: 2}.
1/66
What is prob of sequence mhm when three letters picked without replacement from hmhhhmhmhhmhhh?
5/91
Calculate prob of sequence ava when three letters picked without replacement from {n: 2, v: 2, a: 5, w: 3, f: 3}.
4/273
What is prob of sequence ror when three letters picked without replacement from rooorrorroorrrooooor?
11/95
Three letters picked without replacement from pieyyyyi. What is prob of sequence yii?
1/42
Two letters picked without replacement from {d: 1, g: 1, j: 1, b: 1, a: 1}. What is prob of sequence bg?
1/20
Three letters picked without replacement from {z: 7, m: 3}. Give prob of sequence mzm.
7/120
Calculate prob of sequence oo when two letters picked without replacement from oooooocceo.
7/15
Four letters picked without replacement from {w: 2, x: 1, r: 3, p: 1, q: 2, b: 3}. Give prob of sequence xbwp.
1/1980
Four letters picked without replacement from {s: 2, e: 3, n: 4, x: 8, j: 2, a: 1}. What is prob of sequence xsjj?
4/14535
Two letters picked without replacement from hhpm. What is prob of sequence pm?
1/12
What is prob of sequence cqcj when four letters picked without replacement from {c: 6, t: 1, q: 3, j: 2}?
1/66
Three
|
dm_mathematics
|
As he passed Seventh Street, he again felt the urge, "Turn down that
street." This is crazy he thought and drove on past the intersection.
Again, he felt that he should turn down Seventh Street. At the next
intersection, he turned back and headed down Seventh. Half jokingly, he
said out loud, "Okay, God, I will."
He drove several blocks, when suddenly, he felt like he should stop.
He pulled over to
|
enron_emails
|
3
The jury returned a verdict for plaintiff for $65,000.00 on which judgment was entered. The defendants appealed contending that the district court erred (1) in admitting evidence concerning plaintiff's payment of hospital and medical expenses of its injured employees, (2) in the admission of certain evidence concerning the cost of repairs to damaged equipment and property, (3) in the exclusion of evidence concerning the design of the diesel locomotive, and (4) in giving certain instructions tendered by plaintiff and refusing certain instructions requested by defendants.
4
The main contested issues are (1) whether plaintiff, as a matter of law, had a right to recover for amounts expended in payment of hospital and medical bills of its injured employees, and (2) whether evidence of percentage increases added to the amounts paid for labor and materials under a formula utilized by twenty-five major railroads in charging each other for repairs was admissible in proving the cost to plaintiff of repairs it made to its damaged property and equipment.
5
The trial court permitted the introduction of evidence, over defendants' objection, that plaintiff paid hospital and medical bills of injured members of the train crew, together with the amount of such expenditures. Defendants objected to admission of evidence of such payments as elements of damages. They do not question the fairness or reasonableness of the amounts involved but contend that the plaintiff was under no legal obligation to pay these bills, was a mere volunteer in doing so, and is therefore, as a matter of law, not entitled to recover such amounts from defendants.
6
In a similar situation this court rejected the contention that a railroad was a mere volunteer and held it entitled to indemnification for amounts paid for medical services to its employees for injuries caused by the negligent third party. Chicago, Rock Island & Pacific Railway Company v. United States, 7 Cir., 220 F.2d 939. Similar holdings were made in St. Louis-San Francisco Ry. Co. v. United States, 5 Cir., 187 F.2d 925 and United States v. Chicago, Rock Island & Pacific Ry. Co., 10 Cir., 171 F.2d 377. In the cases cited settlements had been made with the employee compromising his claim against the railroad. Such factor, however, does not in our opinion serve to alter the legal principle involved nor afford a basis for distinguishing the cases cited. Settlement does not affect legal liability. The district court did not err in admitting evidence concerning payment of
|
freelaw
|
[https://www.xda-developers.com/xda-huawei-decision-stop-
boot...](https://www.xda-developers.com/xda-huawei-decision-stop-bootloader-
unlocking)
[https://www.xda-developers.com/huawei-mate-30-google-play-
st...](https://www.xda-developers.com/huawei-mate-30-google-play-store-
challenges)
You won't be able to root Huawei phones, much less customize the stock OS to
any meaningful extent. You also won't be able to change the OS (to something
like LineageOS).
------
thefounder
I guess that's a feature..plus the iPhone camera seems a joke in comparison
with mate pro.
~~~
bdcravens
Ditto for the Galaxy Note 10
------
lph
Did Huawei not see what happened with the Amazon Fire Phone or Windows Phone?
If you launch a phone with an anemic ecosystem, it will fail.
~~~
dragonelite
They are pressured to do this, if the US wasn't so dickish about it they would
just release a certified Android.
------
londons_explore
Will it have a locked bootloader?
Previous Huawei phones have all had a fairly robustly locked bootloader. Now
it seems there is quite some incentive for them to make the bootloader
unlockable to make inserting GMSCore easier...
One could imagine an underground network of US based people reflashing these
phones to have Google services.
~~~
bubblethink
You don't need an unlockable bootloader for that. They ship stub packages that
can be updated later by the user [1].
[1]: [https://www.xda-developers.com/huawei-mate-30-google-play-
st...](https://www.xda-developers.com/huawei-mate-30-google-play-store-
challenges/)
------
xster
[https://twitter.com/cybnox/status/1174722533377085444](https://twitter.com/cybnox/status/1174722533377085444)
This
|
hackernews
|
Summary of work: The pattern of regional cerebral blood flow assessed during PET activation with a face matching task was correlated with performance accuracy in both healthy young and elderly subjects. The pattern showed higher activity in the left fusiform and lingual gyri and right frontal association regions with relatively lower activity in lateral occipitotemporal regions, bilaterally. Two cerebral metabolic patterns characteristic of Alzheimer's disease (AD) were identified using regional covariance analysis of resting state brain glucose metabolism (rCMRglc
|
nih_exporter
|
The additional lateralizing and localizing value of the postictal EEG in frontal lobe epilepsy.
The aim of this study was to describe the additional lateralizing and localizing value of the postictal EEG in frontal lobe epilepsy (FLE). The ictal EEG in FLE is frequently challenging to localize. We identified patients investigated for epilepsy surgery with unilateral FLE based on consistent semiology, a clear lesion and/or with frontal onset on intracranial EEG. A one hour section of
|
pubmed_abstracts
|
The authors have declared that no competing interests exist.
Consent was obtained by all participants in this study. Northwell Health Institutional Review Board issued approval 16-944. To: Stephen M Cohn, MD 475 SEAVIEW AVENUE STATEN ISLAND, NY 10305 From: Hallie Kassan, MS, CIP Director, Human Research Protection Program Date: February 01, 2017 RE: IRB \#: 16-944 Protocol Title: Etiology of Lower Gastrointestinal Bleeding in the 21st Century, Has it Changed? Approval Date: February 01, 2017 Expiration Date: January 31, 2018 Dear Dr. Cohn The above referenced project meets the criteria outlined in 45 CFR 46.110 and 21 CFR 56.110 for EXPEDITED REVIEW and has been approved. The following category(ies) apply(ies) to the project: 45 CFR 46.110 (5): Research involving materials (data, documents, records, or specimens) that have been collected, or will be collected solely for nonresearch purposes (such as medical treatment or diagnosis) Expedited Approval of this project includes: 1. Application for Chart Review xform submitted to the IRB on: 1/4/2016 2. This study has been issued a waiver of informed consent and HIPAA authorization. 3. The following study personnel are authorized to participate in the study: Stephen Cohn, Leen Khoury, Melissa Panzo, David Hill, Miroslav Kopp. The study cannot begin until you receive institutional approval. The Institutional Review Board will be notified of this action at its meeting. This study has not been approved for the inclusion of pregnant women, children, or prisoners. If you would like to include these populations, please notify the IRB for further instruction. The IRB approval expiration date is listed above. As a courtesy, approximately 60 to 90 days prior to expiration of this approval, the Office of the IRB will send an e-mail reminding you to apply for continuing review. Failure to receive renewal notification does not relieve you of your responsibility to provide the Progress Report to the IRB in time for the request to be processed and approved prior to your expiration date. It is your responsibility to apply for continuing review and receive continuing approval for the duration of the study. Lapses in approval should be avoided to protect the safety and welfare of enrolled subjects. Subject recruitment methods for enrollment are appropriate, there is equitable selection of subjects, and there are provisions
|
pubmed_central
|
The question boils down to the distinction between an attributive (the auspicious day) and predicate (the day is auspicious) adjective. I think it is necessarily a predicate adjective, as Browne/Swallow have it. I see two reasons.
The word order and position of the article in ἡ ἀρχὴ δεξιὰ are that of a subject/predicate noun clause rather than an nominal phrase with an attributive adjective.
If the noun is articular but the adjective is anarthrous...then the adjective is functioning as a predicate adjective.1
Recall that the constructions that are acceptable representations of an attributive relationship (if at least one article is present) are
ἡ δεξιὰ ἀρχὴ (=first attributive position, ~=English); and
ἡ ἀρχὴ ἡ δεξιὰ (=second attributive position); and
ἀρχὴ ἡ δεξιὰ (=third attributive position, uncommon).
It’s hard for me to see how a nominative phrase could make a semantically agreeable sentence.
?It is Resurrection Day, and the auspicious beginning, and let us keep the Festival...
I suppose you’re thinking of an appositive relationship (?). (It is Resurrection Day, that is, the auspicious beginning...) The lack of concordance in definiteness is a bit disconcerting, although I’m not sure that’s (for lack of a better word) definitive. The introjection of καὶ is also unusual for simple apposition.
Primarily for the first reason, and supported by the second, I read this clause as a predicate adjective, according with the Browne/Swallow translation quoted above.3
1. Admittedly, my grammar is about 300 years outdated for this question, but I offer it anyway as possibly helpful.
2. William D. Mounce. Basics of Biblical Greek. Zondervan, 2009: pp 67-68.
3. The details of how it is construed as auspicious and mine are not totally transparent to me, but that doesn’t seem to be bothering you. I suspect there is a semantic association between ἡμέρα and δεξιὸς that pushes the latter in the direction of “ausp
|
stackexchange
|
One of the major causes of death in the United States is heart disease produced by atherosclerosis. In atherosclerosis, a plaque forms in the arteries which may involve only a segmental portion of the artery or can involve its entire circumference. This plaque is a "putty-like" or rock-hard material which, if allowed to accumulate, can completely occlude the artery. Also, the plaque can become dislodged from the artery wall and thereby serve as an embolus, or pieces of it may break off and embolize. If complete blockage occurs, and the individual survives, sometimes small new vessels recanalize the area, but the ability of these small vessels to supply any appreciable volume of blood beyond the area of blockage is doubtful.
Coronary athersclerotic narrowing or occlusion has been corrected in recent years most frequently by revascularization of the myocardium. This bypass surgery has become one of the most common surgical procedures performed in the United States. However, the exorbitant cost of myocardial bypass and the associated one to two week morbidity associated with such procedure has led to a procedure termed angioplasty in which an inflatable "balloon" at the end of a catheter is introduced at a selected point in the vascular system and passed into the coronary artery to the site of the occlusion and the plaque compressed by inflating the balloon. Angioplasty, however, is limited in scope of its use because of the variability and the texture of the atherosclerotic plaques and in the inherent limitations of the balloon itself. Moreover, angioplasty is not viewed as a permanent treatment and can result in complications such as artery blow-out, distal emboli spasms, etc.
Development of laser technology for treatment of atherosclerotic plaques is now being conducted, but such a technique, even if successfully developed, has significant limitations.
In a population where average age continues to increase, with a corresponding increase in atherosclerotic heart disease, there is an urgent need for an inexpensive, efficient, safe and effective means for the treatment of atherosclerosis. This urgent need is dictated by the fact that approximately one-fourth of those with atherosclerotic heart disease have as a first symptom sudden death, and each year in the United States alone a million people are diagnosed as having atherosclerotic heart disease. Moreover, a relatively small percentage of those affected with atherosclerotic heart disease are treatable surgically, and there is no indication that there will ever be developed any effective, preventative, pharmacologic treatment of atherosclerotic heart disease.
There is, therefore, a definite and almost urgent need for any technique or
|
uspto_backgrounds
|
The board is one of 18 medical specialty certifying boards of the American Osteopathic Association Bureau of Osteopathic Specialists (AOABOS) of the American Osteopathic Association (AOA). Established in 1941, the AOBNP is responsible for examining DOs who have completed an AOA-approved residency training in neurology and/or psychiatry. The purpose of the certification examination is to ensure that physicians who have completed the required training have a high level of competency and therefore can safely provide services to their patients which meets a well established standard of care. Physicians who successfully pass both parts of the examination are recommended by the AOBNP to the AOABOS for certification. The AOABOS holds the ultimate authority in conferring board certification.
The AOBNP is one of two certifying boards for neurologists and psychiatrists in the United States. The other certifying authority is the American Board of Psychiatry and Neurology, Inc. (ABPN), a member board of the American Board of Medical Specialties. As of December 2011, there are 486 osteopathic neurologists and psychiatrists who hold active primary board certification with the AOBNP. A total of 38 physicians hold a Certificate of Special Qualifications in Child Psychiatry and 3 physicians hold a Certificate of Special Qualification in Child Neurology. 41 physicians hold a Certificate of Added Qualification in at least one of the five subspecialty areas of neurology and psychiatry.
Organization
There are ten elected members of the AOBNP. Each member is an AOA board-certified physician, certified through the AOBNP. Membership includes a representative from each area of neurology (4), psychiatry (4), child neurology (1), child psychiatry (1) and a representative from each of the time divisions of the United States whenever possible. The administrative responsibilities of the Board rest with the Executive Director, with the day-to-day functioning carried out by the Administrator.
Board certification
AOBNP certification requires: the Doctor of Osteopathic Medicine degree from an AOA accredited college of Osteopathic Medicine, at least 2 years of AOA membership, completion of 3 years of training in an AOA approved neurology or psychiatry residency program following 1 year of training in a AOA approved rotating internship program, an active and unrestricted medical license in at least one state in the United States and passing of required board examinations after payment of required fees. Although the ABPN has formally eliminated the
|
wikipedia_en
|
Del Sarto, D., 2015, private communication
Furth, H. P., Killeen, J., & Rosenbluth, M. N. 1963, Phys. Fluids [20]{}, 459
Grauer, R. & Marliani, C. 2000, PRL, 84, 4850
Huang, Yi-Min, Bhattacharjee, A. 2010, Phys. of Plasmas, 17, 062104
Jemella, B. D., Shay, M. A., & Drake, J. F., 2003, Phys. Rev. Lett. [91]{}, 125002
Landi, S., Velli, M., & Einaudi, L. 2005, ApJ [624]{}, 392
Landi, S., Del Zanna, L., Papini, E. , Pucci, F., [et al.]{} 2015, [806]{}, 131
Lapenta, G. 2008, Phys. Rev. Lett. [100]{}, 235001
Loureiro, N. F., Cowley, S. C., Dorland, W. D., Haines, M. G., [et al.]{} 2005, Phys. Rev. Lett. [95]{}, 235003
Loureiro, N. F., Schekochihin, A. A., & Cowley, S. C. 2007, Phys. Plasmas, 14, 0703
Loureiro, N. F., Samtaney, R., Schekochihin, A. A., & Uzdensky, D. A. 2012, Phys. Plasmas, 19, 042303
Loureiro, N. F. , Schekochihin, A. A., & Uzdensky, D. A. 2013, Phys. Rev. E [879]{}, 013102
Malara, F., Veltri, P., & Carbone, V. 1991, Phys. Fluids B [3]{}, 1801
Pucci, F. & Velli, M. 2014, ApJL, [780]{}, L19
Rappazzo, A.F., & Parker, E. N. 2013, ApJL, [773]{}, L2
Rutherford, P. H. 1973, Phys. Fluids [16]{}, 1903
Samtaney, R., Loureiro,
|
arxiv
|
{
"outputFile": "/usr/local/google/home/benweiss/Android/pi-dev/developers/build/prebuilts/gradle/AutofillFramework/Application/build/intermediates/incremental/mergeDebugResources/merged.dir/values-zh-rHK/values-zh-rHK.xml",
"map": [
{
"source": "/usr/local/google/home/benweiss/.gradle/caches/transforms-1/files-1.1/appcompat-v7-28.0.0-alpha1.aar/c05028a6d48feb825ed288e49596b8db/res/values-zh-rHK/values-zh-rHK.xml",
"from": {
"startLines": "2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19",
"startColumns": "4,4,4,4,4,4,4,4,4,4,4,4,4,4,4,4,4,4",
"startOffsets": "105,200,293,393,475,572,680,756,832,910,1006,1102,1197,1294,1389,1487,1638,1732",
"endColumns": "94,92,99,81,96,107,75,75,77,95,95,94,96,94,97,150,93,77",
"endOffsets": "195,288,388,470,567,675,751,827,905,1001,1097,1192,1289,1384,1482,1633,1727,1805"
}
},
{
"source": "/usr/local/google/home/benweiss/.gradle/caches/transforms-1/files-1.1/support-compat-28.0.0-alpha1.aar/77db225a0fb1340c5ceeaf0bca144d6f/res/values-zh-rHK/values-zh-rHK.
|
github
|
In House of Cards, Frank Underwood, the character incarnated by the one and only Kevin Spacey, keeps trying to deal with his smoking addiction and, in the scene below, has already found the solution explaining, in just a single sentence, what vaping is all about in his eyes: “Addiction without the consequences”:
Late Show with David Letterman
If you really want to know more about vaping we suggest you read a study like this one, and not let Katherine Heigl explain it all to you.
You see, as she admitted on the Late Show with David Letterman, she doesn’t really know how e-cigarettes work but she, at least, knew that it is “a fun, not-that-bad-for-you addiction.” Luckily, a study published two years later by the British government proved her right.
David Letterman, who, as he has said to Oprah in the past, has not smoked in 30 years, also had three puffs describing Heigl’s e-liquid flavor as, “remarkable.”
The Tourist
We are sure you remember The Tourist, the 2010 movie in which Angelina Jolie and Johnny Depp played the spies that everybody wanted to sleep with. In the scene below, Depp’s character, Frank, is enjoying his e-cig on a train when Elise Clifton-Ward (Angelina Jolie) spots him.
Of course, he forgot about his e-cigarette after this contact. Come on, who wouldn’t?
Off- to On-Screen
In fact, many movie stars have switched to vaping as a healthier alternative, with Jack Nicholson, John Cusack, Lindsay Lohan, Leonardo DiCaprio and many more, using their e-cigarettes daily.
For example, Zac Efron, who used to be one of Hollywood’s heaviest smokers, now vapes and his character, Teddy, on the movie Neighbors, was a vaper as well. The same goes for the extraordinary Sienna Miller, who was vaping during the Golden Globes Awards, in a room full of people where the use of e-cigarettes—of course—was permitted.
Hard Out Here
And let’s not forget about music videos. The vaping industry is getting bigger and bigger as time goes by, and it has
|
pile-cc
|
-3/7
Let d = -6 - -4. Let h = 1.67 - 2.596. Let s = -0.074 + h. Which is the nearest to d? (a) -4/3 (b) -2/11 (c) s
a
Let g = 2.75 + -2.45. Which is the closest to 24? (a) g (b) 0.4 (c) 0.5 (d) -1
c
Let x = 0.459 + 0.001. Let m = x + -0.16. Let p = 0.36 + 0.04. What is the closest to 0 in p, -2, m?
m
Suppose -3*x = -7*x - 20. Let m = 0.347 + 0.153. Let u = 0.04 - -0.06. Which is the closest to 1/2? (a) u (b) m (c) x
b
Let q be (-3)/(-12) + (-58)/16. Let l = q + 33/8. Let p = -19/6 - -121/42. What is the closest to 1/4 in p, l, -0.5?
l
Let m = -0.284 + 0.12. Let n = m + -0.036. Which is the closest to 2/3? (a) 1 (b) n (c) 4/5
c
Let q = 7721/4 + -1930. Which is the closest to q? (a) 50 (b) 4 (c) 1/4
c
Let u = -2 + 1.9. Suppose 0*s + 18 = 3*s. Let d be (-72)/(-126)*s/(-8). Which is the nearest to 2/3? (a) d (b) u (c) -1/6
b
Let s be (365/(-50) - -7)/((-6)/8). Which is the nearest to s? (a) 4 (b) 12 (c) 2
c
Let b = 704 + -2815/4. What is the closest to b in 1/4, -0.8, 1/3?
1/4
Suppose
|
dm_mathematics
|
Sue -
I'm Tom Thompson. Kent was a long-time friend, a fishing buddy, and a bad
golf mate (but lots of fun). When Gary Ackerman announced at services for
Kent the creation of the award, I was deeply touched and impressed.
My good friend Jeff Dasovich told me this weekend that you received the very
first award, and well, I must say I became a bit teary-eyed.
|
enron_emails
|
The first opinion of the district court showed an awareness of the problem in rejecting the estimates of the reproduction cost, less depreciation, of the facilities in question, and particularly in an acute analogy it drew to the loss of earnings by a person seeking recovery for personal injuries. But in its later acceptance of the somewhat reduced estimates of the defendants' expert, accompanied as they were by an accumulation of imprecise theory in what we may say is the strong tradition of American judicial valuation, it got itself into the position of assuming a loss before one was proven and of measuring it by the extent of curtailment of the facilities. For that in last analysis was at the bottom of Mr. Scharff's tests, even though he strove for a standard based upon the best modern and economical or ideal equipment. Obviously with his yardstick the result varied according to the shortening of the gas mains or the electric distributing cables. Such a rule means of course that a utility is sure to receive a substantial award upon any shift in use of its facilities forced by governmental authority, even though such a shift may be a great advantage to it, or its previous business a losing one. Pressed to its logical conclusion, this would even mean that an award should be *397 made for the shutting off of outlets on the condemnation of buildings fronting on a street containing public utility facilities a position clearly unsupportable in theory or on authority. Kellettville Gas Co. v. United States, D.C., W.D.Pa., 56 F.Supp. 919; Deepe v. United States, 103 Colo. 294, 86 P.2d 242; Fix v. City of Tacoma, 171 Wash. 196, 17 P.2d 599; In re Fort Greene Houses, Borough of Brooklyn, 177 Misc. 101, 29 N.Y.S.2d 980, affirmed 266 App.Div. 795, 41 N.Y.S.2d 859, Id., 291 N.Y. 788, 53 N.E.2d 367.
The error becomes emphasized when it is taken in connection with the court's refusal to consider evidence offered by the United States that the expansion of the Brooklyn Navy Yard had resulted in a substantial increase in business to the utilities so that actually no loss had been incurred. As the cases cited above show, evidence as to prospective earnings from the franchise is highly important. Of course gains from operation in one part of a city, due to natural growth or
|
freelaw
|
News conference:
[http://www.ustream.tv/recorded/48346813](http://www.ustream.tv/recorded/48346813)
"Current technology for decelerating from the high speed of atmospheric entry
to the final stages of landing on Mars dates back to NASA's Viking Program,
which put two landers on Mars in 1976. The basic Viking parachute design has
been used ever since -- and was successfully used again in 2012 to deliver the
Curiosity rover to Mars."
Viking program:
[https://en.wikipedia.org/wiki/Viking_program](https://en.wikipedia.org/wiki/Viking_program)
------
fjarlq
Intro video specifically about this test:
LDSD: The Great Shakeout Test For Mars
[https://www.youtube.com/watch?v=3YwSXAba6Ik](https://www.youtube.com/watch?v=3YwSXAba6Ik)
~~~
malkia
Is this Mark Adler - one of the author of zlib? According to this it looks
like it's him:
[http://en.wikipedia.org/wiki/Mark_Adler#Mars_Exploration_Rov...](http://en.wikipedia.org/wiki/Mark_Adler#Mars_Exploration_Rover_mission)
~~~
Intermernet
Yes, that would be him, he's amazing. He not only works on making Mars
habitable, he's also partly responsible for the most popular image format on
the web today.
Full respect.
------
geerlingguy
The video feed is raw, no commentary and little editing, just FYI. If you want
to figure out what's going on, you need to read up on background info and also
listen for 10-20 minutes :P
As of 4:32 EST, it looks like a live video feed should start coming from the
vehicle soon (within minutes), but timelines are changing every few minutes. I
think the parachute deployment is still on schedule for 4:51 EST.
[Edit: There are now commentators, so it's a bit easier to figure out what's
going on and follow the progress.]
------
ortusdux
|
hackernews
|
The general objective of this work is to define carefully the endocrine milieu that is required to maintain normal testicular function in men. In particular, we are concerned with the gonadotropin and steroid environment necessary to stimulate human spermatogenesis and steroidogenesis. We will be experimentally manipulating the hormonal environment of the testis in normal men and determining the resultant effects on spermatogenesis and steroid production. More specifically, the objectives of this work are to anser questions in four areas: 1. What are the physiological roles of follic
|
nih_exporter
|
Gaining perspective on the allergenicity assessment of genetically modified food crops.
Genetically modified plants are created by the insertion of foreign genes into plant cells followed by the generation of reproductively stable stock plants for rapid and precise improvements in agricultural crops. Current products provide resistance to insect pests, plant viruses or herbicides. Future products include nutritionally enhanced crops, salt and draught tolerant crops and plant produced industrial enzymes or pharmaceuticals. The risk that a newly expressed protein might cause serious allergic
|
pubmed_abstracts
|
Refinement {#tablewraprefinementdatalong}
==========
---------------------------------------------------------------- -------------------------------------------------------------------------------------------------
Refinement on *F*^2^ Secondary atom site location: difference Fourier map
*R*\[*F*^2^ \> 2σ(*F*^2^)\] = 0.040 Hydrogen site location: inferred from neighbouring sites
*wR*(*F*^2^) = 0.109 H-atom parameters constrained
*S* = 1.10 *w* = 1/\[σ^2^(*F*~o~^2^) + (0.0651*P*)^2^ + 0.1805*P*\] where *P* = (*F*~o~^2^ + 2*F*~c~^2^)/3
1906 reflections (Δ/σ)~max~ \< 0.001
127 parameters Δρ~max~ = 0.29 e Å^−3^
0 restraints Δρ~min~ = −0.64 e Å^−3^
Primary atom site location: structure-invariant direct methods
---------------------------------------------------------------- -------------------------------------------------------------------------------------------------
Special details {#specialdetails}
===============
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Refinement. Refinement was performed using all reflections. The weighted *R*-factor (*wR*) and goodness of fit (*S*) are based on *F*^2^. *R*-factor (gt) are based on *F*. The threshold expression of *F*^2^ \> 2.0 σ(*F*^2^) is used only for calculating *R*-factor (gt).
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fractional atomic coordinates and isotropic or equivalent isotropic displacement parameters (Å^2^) {#tablewrapcoords}
==================================================================================================
----- -------------- -------------- -------------- -------------------- --
*x* *y* *z* *U*~iso~\*/*U*~eq~
Cl1 1.39536 (6) 0.20927 (6) 0.08023 (4) 0.01987 (16)
O1 0.69076 (17) 0.31098 (18) 0.46559 (11) 0.0144 (3)
O2 1.29992 (18) 0.1926 (2) 0.61081 (12)
|
pubmed_central
|
I have rewritten this problem exactly as it appears in a recreational math book I have, but it is driving me crazy. I feel like there isn't enough information. The answer is claimed to be $34$, but no step-by-step solution is offered any assistance would be appreciated.
A:
Let's say the man's age is M, his wife's W, his son's S, and his daughter's D. Then we have $M = W + 1$, so $W = M - 1$. The product of their ages is $17$ times the product of the ages of their son and their daughter: $M(M-1) = 17SD$. $D = S - 1$. So we have $M(M-1) = 17S(S-1)$.
One significant factor is that $M$ and $S$ must be whole numbers, and $M(M-1)$ must be divisible by $17$, which means either $M$ or $M - 1$ is divisible by $17$. So $M$ must be $17, 18, 34, 35, 51, 52, 68, 69, 85, 86$ (or a few more options, depending on the man's lifespan).
The next relevant issue is divisibility by $3$. Modulo $3$, $n(n - 1)$ must be either $0$ or $2$. If $S(S-1)$ is $2$ mod $3$, then $17S(S-1)$ is $1$ mod $3$ and no value of $M$ will work; so it must be that $S(S-1)$ is divisible by $3$ (so $M(M-1)$ is as well). Now our options for $M$ are reduced to $18, 34, 51, 52, 69,$ or $85$. This is small enough to check.
$18(18 - 1) = 18 \cdot 17$, so $S(S - 1) = 18$. No integer $S$ works for this.
$34(34 - 1) = 66 \cdot 17$, so $S(S - 1) = 66$. No integer $S$ works for this.
$51(51 - 1) = 150 \cdot 17$, so $S(S - 1) = 150$. No integer $S$ works for this, either.
$52(52 - 1
|
stackexchange
|
The present invention is also directed to a stackable shipping container formed from a blank. The blank comprises a substantially rectangular bottom wall having two perpendicularly arranged pairs of opposed side edge regions. First and second pairs of opposed first sidewalls emanate from the two perpendicularly arranged pairs of opposed side edge regions. One pair of opposed second sidewalls emanate from first edge regions of the first pair of opposed first sidewalls. Pairs of first minor flaps emanate from second edge regions of each of the first pair of opposed first sidewalls. Pairs of second minor flaps are connected to third edge regions of each of the pair of opposed second sidewalls. Non-rectangular gusset panels are disposed substantially between the second minor flaps and the respective adjacent end edge regions of the respective second sidewalls. The first and second pairs of opposed first sidewalls, the pair of opposed second sidewalls, and the pairs of first minor flaps and pairs of second minor flaps are operably configured, upon articulation, so that each of the second sidewalls is folded inwardly, in juxtaposed overlying relation to an inside surface of a respective one of the first pair of first sidewalls, each of the first minor flaps is in juxtaposed overlying relation to an inside surface of a respective adjacent one of the second pair of first sidewalls, and each of the second minor flaps is in juxtaposed overlying relation to an inside surface of a respective one of the first minor flaps. Each of the non-rectangular gusset panels being defined by pairs of fold lines, each of which extend substantially obliquely with respect to fold lines separating the opposed first sidewalls from the bottom wall.
The present invention is also directed to a stackable shipping container formed from a blank. The blank comprises a substantially rectangular bottom wall having two perpendicularly arranged pairs of opposed side edge regions. First and second pairs of opposed first sidewalls emanate from the two perpendicularly arranged pairs of opposed side edge regions. One pair of opposed second sidewalls emanate from first edge regions of the first pair of opposed first sidewalls. Pairs of first minor flaps emanate from second edge regions of each of the first pair of opposed first sidewalls. Pairs of second minor flaps are connected to third edge regions of each of the pair of opposed second sidewalls. Rectangular gusset panels are disposed substantially between the second minor flaps and the respective adjacent end edge regions of the respective second sidewalls. The first and second pairs of opposed first side
|
uspto_backgrounds
|
COMPAS, an acronym for Correctional Offender Management Profiling for Alternative Sanctions, is a case management and decision support tool developed and owned by Northpointe (now Equivant) used by U.S. courts to assess the likelihood of a defendant becoming a recidivist.
COMPAS has been used by the U.S. states of New York, Wisconsin, California, Florida's Broward County, and other jurisdictions.
Risk Assessment
The COMPAS software uses an algorithm to assess potential recidivism risk. Northpointe created risk scales for general and violent recidivism, and for pretrial misconduct. According to the COMPAS Practitioner's Guide, the scales were designed using behavioral and psychological constructs "of very high relevance to recidivism and criminal careers."
Pretrial Release Risk scale: Pretrial risk is a measure of the potential for an individual to fail to appear and/or to commit new felonies while on release. According to the research that informed the creation of the scale, "current charges, pending charges, prior arrest history, previous pretrial failure, residential stability, employment status, community ties, and substance abuse" are the most significant indicators affecting pretrial risk scores.
General Recidivism scale: The General Recidivism scale is designed to predict new offenses upon release, and after the COMPAS assessment is given. The scale uses an individual's criminal history and associates, drug involvement, and indications of juvenile delinquency.
Violent Recidivism scale: The Violent Recidivism score is meant to predict violent offenses following release. The scale uses data or indicators that include a person's "history of violence, history of non-compliance, vocational/educational problems, the person’s age-at-intake and the person’s age-at-first- arrest." An individual's risk score for violent recidivism is calculated as follows:Violent Recidivism Risk Score = (age∗−w)+(age-at-first-arrest∗−w)+(history of violence∗w) + (vocation education ∗ w) + (history of noncompliance ∗ w), where w is weight, the size of which is "determined by the strength of the item’s relationship to person offense recidivism that we observed in our study data."
Critiques and legal rulings
In July 2016, the Wisconsin Supreme Court ruled that COMPAS risk scores can be considered by judges during sentencing, but there
|
wikipedia_en
|
**Update**: We use the Adam algorithm [@kingma2014adam] with the step size of $0.01$ to update the learning parameters. The Adam algorithm requires $\frac{\partial \mathcal{D}}{\partial \bm{A}}$ obtained in the backward step and it performs $\mathcal{O}(NK)$ arithmetic operations to update the parameters, where $NK$ is the number of learning parameters.
**Computational Complexity of TTW –** Calculating Equation (12) is the most computationally expensive step in the TTW algorithm. Time and space complexities needed to calculate this step is $\mathcal{O}(KNT)$. We run this step in a loop for $I$ iterations ($I=100$ in our experiments); therefore, time and space complexities of TTW are $\mathcal{O}(IKNT)$ and $\mathcal{O}(KNT)$ respectively. According to our experiments, a good choice for $K$ is a number between $8$ and $16$ for the datasets of the UCR archive.
Experiments
===========
\[sec:experiments\]
We use the UCR (University of California, Riverside) time-series classification archive to conduct experiments of this paper [@UCRArchive]. This archive contains $85$ datasets from a wide variety of applications (e.g., medical imaging, geology and astronomy). Each dataset is split into train and test sets and both sets contain class labels up to 60 classes. All time-series in a dataset of UCR have the same length; for different datasets this length varies from 24 to 2,709 samples.
**Baseline System**: We implement the GTW algorithm, proposed by Zhou et al. [@zhou2012generalized], as the baseline method for comparison. The basis functions and other parameters of the implemented GTW are consistent with Section 5.4 of their paper [@zhou2012generalized].
\[tab:DTW\_avg\] \[tab:test\_ccc\_sewa\]
[c|cccc;[3pt/1pt]{}c]{} TTW & K = 4 & K = 8 & K = 16 & K = 32 & Optimal K\
AVG & (65-13)% & (66-15)% & [(72-19)]{}% & (62-26)% & ***(82-4)***%\
GTW & (49-31)% & [(53-31)]{}
|
arxiv
|
/* Lzma86Dec.c -- LZMA + x86 (BCJ) Filter Decoder
2016-05-16 : Igor Pavlov : Public domain */
#include "Precomp.h"
#include "Lzma86.h"
#include "Alloc.h"
#include "Bra.h"
#include "LzmaDec.h"
SRes Lzma86_GetUnpackSize(const Byte *src, SizeT srcLen, UInt64 *unpackSize)
{
unsigned i;
if (srcLen < LZMA86_HEADER_SIZE)
return SZ_ERROR_INPUT_EOF;
*unpackSize = 0;
for (i = 0; i < sizeof(UInt64); i++)
*unpackSize += ((UInt64)src[LZMA86_SIZE_OFFSET + i]) << (8 * i);
return SZ_OK;
}
SRes Lzma86_Decode(Byte *dest, SizeT *destLen, const Byte *src, SizeT *srcLen)
{
SRes res;
int useFilter;
SizeT inSizePure;
ELzmaStatus status;
if (*srcLen < LZMA86_HEADER_SIZE)
return SZ_ERROR_INPUT_EOF;
useFilter = src[0];
if (useFilter > 1)
{
*destLen = 0;
return SZ_ERROR_UNSUPPORTED;
}
inSizePure = *srcLen - LZMA86_HEADER_SIZE;
res = LzmaDecode(dest, destLen, src + LZMA86_HEADER_SIZE, &inSizePure,
src + 1, LZMA_PROPS_SIZE, LZMA_FINISH_ANY, &status, &g_Alloc);
*srcLen = inSizePure + LZMA86_HEADER_SIZE;
if (res != SZ_OK)
return res;
if (useFilter == 1)
{
UInt32 x86State;
x86_Convert_Init(x86State);
x86_
|
github
|
Matt Schmitz of Cars.com highlights risks children face in and around cars and how to keep them safe in this week’s segment of Driving Smart.
Author:
Matt Schmitz, Cars.com , TEGNA
Published:
7:16 AM CDT September 15, 2017
MORE
Heart disease. Cancer. Chronic lower respiratory disease. These are the leading causes of death for the average American.
But for some our most vulnerable citizens — children age 1 to 13— it’s car crashes.
Child Passenger Safety Week in September is as good an excuse as any to remind ourselves of the dangers kids face in and around cars — and with annual traffic fatalities projected to hit a decade high, it’s an even better one.
In 2015, 663 children 12 or younger died in car crashes. While that was less than half that of 40 years earlier, it was the highest since 2009 following four consecutive years of decreases.
Meanwhile, studies show that some 600,000 infants to 12-year-olds rode in vehicles without a car seat, booster seat or seatbelt. Among those who died in collisions, 35 percent were not properly secured.
What’s more, among those who were in a car seat or booster seat, nearly half the devices were used incorrectly, diminishing their effectiveness. Proper child restraint use reduces the risk of serious or fatal injuries by 45 to 71 percent.
So what’s proper?
Using a correctly installed restraint appropriate to the child passenger’s age, height and weight.
Another issue that remains important even as summer gives way to fall and beyond: Vehicular heatstroke spiked last year with nearly 40 deaths of children in hot cars. Keep in mind that in-car temperatures can rise from 80 to 110 degrees in just 20 minutes, and that children’s body temperature can rise as much as five times faster than an adult’s on its way to a deadly 104 degrees.
Leaving a reminder in the backseat so you don’t forget they’re back there — like your smartphone or purse — can help. Some automakers have begun offering automated rear-seat reminders that sound chimes and even honk the horn if a child is left in the back seat.
And if you see a child alone in a car, call 911. Afraid causing a scene or getting someone in trouble?
With a child’s life at stake
|
pile-cc
|
Let s be (4/(-5))/((-2)/5). Suppose -3*u = z - 10, -s*u - 2*u - 3*z + 10 = 0. Suppose 3*c + 9 = u*a, 20 = 5*c + a + 4*a. Sort -4, -2, c.
-4, -2, c
Let v = 4 - 5. Put v, 3, -3 in ascending order.
-3, v, 3
Let s = -0.62 - -0.22. Let v = -1/6 + -1/6. Put s, -3/2, v in decreasing order.
v, s, -3/2
Let k = -8.3 - -8. Let w = 8 + -5. Let b = -2.7 + w. Put 2, k, b in decreasing order.
2, b, k
Suppose 2*u + 3 + 7 = 4*v, -v = u + 2. Sort 0, 9, v.
0, v, 9
Let n = -2.2 - -2.7. Put -7, -2/9, n in descending order.
n, -2/9, -7
Let w(u) = 17*u**2 - u + 1. Let t be w(1). Suppose -3 = -5*n + t. Sort 3, -2, n in descending order.
n, 3, -2
Let t = 3 - 3. Let k = -50 - -47. Sort t, k, 1 in ascending order.
k, t, 1
Suppose -6 - 6 = -3*f. Suppose 3*a - a = f. Let j = -1 - -1. Put j, a, -4 in descending order.
a, j, -4
Let k = -84 - -417/5. Put 2, k, 3 in decreasing order.
3, 2, k
Let g = -40 - -39.89. Sort g, -5, -3 in ascending order.
-5, -3, g
Let d(f) = -3*f + 1. Let k be d(-1). Suppose -4 = 2*a - s, 5*s - 4*s = -2*a - 4.
|
dm_mathematics
|
4. Please call Credit (ext. 31803) with details on every OTC transaction.
We need to track all new positions with PG&E Energy Trading on an ongoing
basis. Please ask the traders and originators on your desks to notify us
with the details on any new transactions immediately upon execution. For
large transactions (greater than 2 contracts/day or 5 BCF total), please call
for approval before transacting.
|
enron_emails
|
JOINT OR SUCCESSIVE LIABILITY
Before reaching the other issues before us, we must cross a threshold hurdle first erected by the City and now positioned by Burke. Although this case was tried on a theory of joint and several liability, the City argued in a post-trial motion, and again before the appellate court, that it was a successive tortfeasor, and should thus be liable for only its proportionate share of the damages. In responding to the City's motion, Burke, on the other hand, argued that the jury was properly instructed to find joint and several liability. The appellate court correctly found that, where the City's position before that court was inconsistent with its stance in an earlier court proceeding, the City had waived its right to complain of an error in the jury instructions. (209 Ill.App.3d at 201, 154 Ill.Dec. 80, 568 N.E.2d 80; see Auton v. Logan Landfill, Inc. (1984), 105 Ill.2d 537, 543, 86 Ill.Dec. 438, 475 N.E.2d 817.) Now Burke argues before this court that the defendants were successive tortfeasors, while the City maintains that it and Rothschild's acted jointly. We deem the argument to be waived by Burke as well as by the City. However, as this court has previously noted, the waiver rule exists as an admonition to litigants rather than as a limitation upon the jurisdiction of the reviewing court. (American Federation of State, County & Municipal Employees, Council 31 v. County of Cook (1991), 145 Ill.2d 475, 480, 164 Ill.Dec. 904, 584 N.E.2d 116.) Thus we shall address the issue briefly in order to reaffirm and clarify Illinois law.
Plaintiff argues that separate acts of misconduct by the defendants at wholly separate times demonstrate that the City was a successive tortfeasor. To support his theory, plaintiff cites Gertz v. Campbell (1973), 55 Ill.2d 84, 302 N.E.2d 40. In Gertz, the plaintiff suffered a broken leg due to the negligent driving of a motorist. The defendant motorist then alleged in a third-party complaint that the treating physician's negligence in delaying surgery led to the necessity of amputating plaintiff's leg. Thus, the motorist asked for indemnity and judgment against the physician for the damages caused by the new injury and aggravation of the original injury. In determining
|
freelaw
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.