text
stringlengths
173
4.38k
subset
stringclasses
13 values
14 What is the third root of 2782 to the nearest integer? 14 What is 855 to the power of 1/4, to the nearest integer? 5 What is the square root of 990 to the nearest integer? 31 What is 18594 to the power of 1/3, to the nearest integer? 26 What is the square root of 1050 to the nearest integer? 32 What is the ninth root of 968 to the nearest integer? 2 What is 5567 to the power of 1/2, to the nearest integer? 75 What is the square root of 676 to the nearest integer? 26 What is the tenth root of 694 to the nearest integer? 2 What is 2861 to the power of 1/4, to the nearest integer? 7 What is 343 to the power of 1/4, to the nearest integer? 4 What is the third root of 22162 to the nearest integer? 28 What is 461 to the power of 1/2, to the nearest integer? 21 What is the square root of 306 to the nearest integer? 17 What is 29960 to the power of 1/6, to the nearest integer? 6 What is the square root of 1696 to the nearest integer? 41 What is the third root of 9070 to the nearest integer? 21 What is the tenth root of 567 to the nearest integer? 2 What is 38848 to the power of 1/2, to the nearest integer? 197 What is 711 to the power of 1/3, to the nearest integer? 9 What is 6070 to the power of 1/3, to the nearest integer? 18 What is 2523 to the power of 1/8, to the nearest integer? 3 What is the tenth root of 16742 to the nearest integer? 3 What is 289 to the power of 1/10, to the nearest integer? 2 What is 963 to the power of 1/10, to the nearest integer? 2 What is 58226 to the power of 1/2, to the nearest integer? 241 What is 13057 to the power of 1/2, to the nearest integer? 114 What is 596 to the power of 1/3, to the nearest integer? 8 What is 7
dm_mathematics
Would like to set a conference call to discuss content for the panel discussion at Risk 2000 in Boston on 14 June. Perhaps I can suggest wednesday 31 may at noon EST. I'm on London time and am quite flexible if you would like to do earlier or indeed on another day. ? The panellists are - ? Vince Kaminski, Enron Corp Richard Jefferis, Koch Energy Trading Steven Bramlet
enron_emails
OPINION WILLIAMS, District Judge. Brenda Gail Willett instituted this action against Emory and Henry College, alleging that the defendant committed unlawful employment practices in violation of Title VII of the Civil Rights Act of 1964, 42 U.S.C. § 2000e et seq. The plaintiff has also included a claim for relief under the Equal Pay Act of 1963, 29 U.S.C. § 206(d), and the defendant has moved for summary judgment pursuant to Rule 56 of the Federal Rules of Civil Procedure. The case is presently before this court for a ruling on that motion. STATEMENT OF FACTS The plaintiff was employed as an instructor of Sociology by Emory and Henry College from September 1972 through August 1973. Under the terms of her employment contract with the college, plaintiff was eligible to participate in a group health and hospitalization insurance plan, which provided dependent benefits to the spouses and children of employees if the employee chose to enroll them in the plan and if the dependents met certain eligibility requirements. The policy also included benefit payments for expenses incurred in connection with hospital confinement and surgical treatment for pregnancy and related disabilities. The applicable provision is set forth below: Pregnancy Expense Benefits . . . are available to you if you are a female Employee, or to your wife if you are a male Employee, and if you are insured with respect to your Dependents. (Emphasis supplied). Ms. Willett, a single female, enrolled in the group insurance plan for herself and, in May of 1973, submitted a claim to the Travelers Insurance Company, the insurer of the college's group health insurance plan, for surgical and medical services rendered in April of that year for the treatment of a miscarriage. Travelers routinely denied the claim on the grounds that plaintiff did not have dependent coverage and was thereby ineligible for maternity benefits. *633 On May 14, 1973, plaintiff wrote a letter to the President of the college, Dr. Thomas Chilcote, requesting that Emory and Henry College "reimburse her for $1000 in medical bills" in the event that Travelers Insurance Company refused to pay her pregnancy benefits. In response to this request, President Chilcote sent a letter to plaintiff, dated May 16, 1973, advising her that the issue she raised in connection with her hospitalization claim was between herself and the insurance company and that the college would not assume any liability for pregnancy expenses not reimbursed by the insurer. "The responsibility of Emory
freelaw
~~~ Avshalom Right $50 means a 4" screen and 2-4 year old hardware. It might not be glamorous but it damn well ought to be able to browse the internet and run an office suite. ~~~ agumonkey I regularly scan for second hand Motorola smartphones, like Moto G 2013. see [http://chicago.craigslist.org/search/sss?excats=20-102-41-27...](http://chicago.craigslist.org/search/sss?excats=20-102-41-27-5-1&sort=rel&query=moto+g) I didn't read the details, but lots of ~40$ ones. A 1st gen Moto G is very potent. ------ crusty This is still a thing? Now I'm curious; what did it cost Nokia to build the Lumia 520 (or 521) that I paid $35 for new from ATT about a year ago (no plan/no strings, since unlocked for free) and just read this article on. And just to inform HN readers who may have no realistic concept of what kind of personal financial decisions are made by people that these phones specifically target... Dual SIM phones are big sellers in developing countries, so add another $1 for that or whatever (note that it's mentioned in the "Display: $8" photo of the Android One but not in the article). Dual SIMs aren't for the globe trotters out there, although very useful in my experience, but many if not most of these people will be on prepaid plans and without phone credits at times. The dual SIMs let users leverage different promotional calling/texting structures to reduce costs. As well, data for prepaid users is purchased in blocks of data size or time, so being able to switch off the connection to one SIM or the other offers another cost management tool. ------ leke $2.10 for a battery, eh? Well aren't we getting shafted for replacements. ~~~ fnbr I suspect there's a vast difference in quality between the batteries used here and those used in, say, the iPhone 6. I might be naive, but I doubt that Apple is gouging consumers _
hackernews
Structural Studies of Alix and ESCRT Complexes in HIV-1 Budding HIV-1 particle assembly and release depend on a protein network that includes Alix and Vps4A/B, and four multiprotein complexes: Hrs/STAM and ESCRT-I, II, and III. These proteins and complexes are conserved from yeast to human, and their normal function is to sort monoubiquitinated receptors, enzymes, and other cargo to the lysosome or vacu
nih_exporter
Exploration of magnetic fluctuations in PdFe films. We investigated magnetic phase transitions, magnetic anisotropy, and magnetic domains in Pd1-xFex alloys with different Fe concentrations x = 2.2-7.2%. The Curie temperature depends linearly on the Fe concentration in the regime studied. The magnetization is dominantly in-plane with a small out-of-plane remanent contribution. Resonant magnetic small angle scattering with circularly polarized x-rays tuned to the L3 resonance edge
pubmed_abstracts
In addition to medication status, examination of Tables [1](#T1){ref-type="table"}--[5](#T5){ref-type="table"} reveals no systematic sample characteristic, parameter, or analytic approach that could be driving this review's main finding of EBC deficits in schizophrenia. Indeed, EBC deficits occur across samples of varying ages and gender composition, and in studies using a range of EBC stimulus parameters and experimental design (e.g., CS/US duration, ISI, ITI, and pre-conditioning trials or pseudoconditioning) and analysis (e.g., CR window and criterion) specifications. Furthermore, potentially confounding issues such as spontaneous blink rate and baseline blinking function have been investigated by several groups, with no convincing evidence that these variables bias EBC experimental results. Furthermore, it appears as though many studies reporting null findings or facilitated conditioning may have parametric or analytic variations that could account for such results. Specifically, Taylor and Spence ([@B54]) used a visual delay EBC paradigm, and the diagnostic criteria for the disorder differed substantially from those used in recent decades. Furthermore, the idiosyncratic analytic approaches of other studies may account for the reported null findings. For example, rather than quantifying rate of conditioning, Stevens and colleagues ([@B59]) measured the number of trials it took for participants to reach "criterion," or five consecutive CRs. This style of analysis is not reported in most other studies. Another study appeared to restrict their analysis such that relatively less data are included compared to other studies. Specifically, O'Connor and Rawnsley ([@B55]) only used 18 unpaired CS-alone trials to measure conditioning, rather than attempting to detect CRs across all paired trials over the course of conditioning. Finally, Sears and colleagues ([@B57]) did not include a measure of spontaneous blink rate; it is therefore possible that group differences in non-associative blinking could have confounded the reported findings of facilitated conditioning in schizophrenia. More research is necessary to determine whether these varied findings are due to these methodological differences or, in fact, reflect inconsistencies in EBC deficits in schizophrenia across studies. CR Timing {#S4-9} --------- Group differences in timing of the conditioned response (i.e., onset and peak latency) have been reported far less frequently than rate of conditioning (i.e., percent CRs). Among studies reporting these variables, there is inconsistency in how onset latency is calculated and whether the algorithm
pubmed_central
My Rails app has a user model and a pins model. pins are album reviews that get posted to the site and the pins belong_to the user. I have a stats page on the site that lists interesting stats about the site's content. I'm trying to list a "Reviewer of the week" which will show which user posted the most reviews over the last week. This is the code I put in my page controller: @user_week = User.includes(:pins).where('created_at >= ?', 1.week.ago.utc).count(:all, :group => 'name', :order => 'count(*) DESC').first I then call it in the view: <%= @user_week[0] %> For some reason this is giving me a user, but not actually the user with the most posts over teh last week. It gives me ["User", 1] and it doesn't change when I post more often. Is my code wrong? Also, how can I call the user's image from @user_week? It currently returns the name and pin count. User column names: ["id", "email", "encrypted_password", "reset_password_token", "reset_password_sent_at", "remember_created_at", "sign_in_count", "current_sign_in_at", "last_sign_in_at", "current_sign_in_ip", "last_sign_in_ip", "created_at", "updated_at", "name", "image_file_name", "image_content_type", "image_file_size", "image_updated_at", "slug", "twitter", "lastfm", "status", "admin"] Pin column names: ["id", "description", "created_at", "updated_at", "user_id", "image_file_name", "image_content_type", "image_file_size", "image_updated_at", "image_remote_url", "artist", "album", "date", "rank", "video_html", "video", "rating", "year"] A: @users = User.joins(:pins).group('users.id').where('pins.created_at >= ?', 1.week.ago.utc).order('count(
stackexchange
2. Description of Related Art In general, in this kind of wiper apparatus, there is a structure such that a wiper blade provided in a leading end portion of a wiper arm, reciprocates forward and reverse so as to wipe a window surface on the basis of the normal and reverse rotation of a wiper shaft integrally mounted to a base end portion of the wiper arm. In this wiper apparatus, the structure is generally made such that a middle portion of the wiper blade is pivoted to the leading end portion of the wiper arm via a pivot substantially orthogonal to an arm length direction so as to freely oscillate, and the wiper blade wipes the window surface following the reciprocal and reverse oscillation of the wiper arm in correspondence to the normal and reverse rotation of the wiper shaft. In this wiper apparatus, for example, in the case that a long wiper blade wipes the window surface for a large-size wiper apparatus, or in the case that a range of the reciprocal and reverse oscillation is made wide, or the like, there is a case that a terminal end side, corresponding to a portion in the side of the wiper shaft of the wiper blade, tends to be late in a wiping speed in comparison with the leading end side, whereby a following property of the wiper arm is deteriorated. Then, it is proposed to support the terminal end side of the wiper blade by a supporting member, provided in the wiper arm, so as to increase the following property of the wiper arm, for example, there is a structure described in Japanese National Stage Patent Publication 2001-501893 of WO99/05009. The supporting member in this structure is fixed to the wiper arm, and is structured so as to support the wiper blade at one side in the oscillating direction of the wiper arm. In this case, in recent years, the window surface tends to be formed in a curved shape, and the wiper blade oscillates in a direction of the window surface (a direction of moving close to or apart from the window surface) around the pivot corresponding to a supporting point with respect to the wiper arm. Accordingly, in this wiper apparatus, the structure is made such that a supporting concave portion, constituting the supporting member and formed in a concave groove shape, is provided in one side of the wiper arm, a support receiving body is integrally provided in the side of the wiper blade, and the support receiving body is slidably inward
uspto_backgrounds
Tomás Roseingrave Tomás Roseingrave (4 July 1918 – 21 August 1993) was an Irish social scientist. Biography Roseingrave was born at Gort, County Galway, to Thomas Roseingrave (an engineer) and Nora McMahon, in 1918. He was educated at the O'Brien Institute, Dublin, between 1928 and 1934, later working for the Dublin Port and Milling Company, and later still for Ceimici Teoranta, in 1965. He earned a Master's Degree in social science at University College Dublin, in the early 1960s, where he would later become a senior research fellow. In 1967 he became director of manpower studies in the Department of Labour. It was in this capacity that he published a number of influential reports on Irish regional development, such as Manpower in an industrial growth centre: a survey in Waterford. A member of Muintir na Tíre, he was in 1968 made its second national director. His reports while at Munintir na Tire were well received at government level and played a significant part in the examination of the problems current in rural Ireland in the 1970s. Ireland joined the EEC in 1973, and from then till his death, Roseingrave was a member of the EEC's Economic and Social Committee, acting as a rapporteur for many of its opinions, particularly in new areas pertaining to community and technology. His work was recognised by an award of the gold medal of the Foundation for European Merit in 1982. Five years later, he was distinguished when made a Grand Officer of the Institute for Diplomatic Relations. Through Home Truth, an RTÉ programme that ran from 1966 to 1968, and his weekly broadcasting work on RTÉ radio, he became associated in the public mind as the public face of Irish social sciences. A keen Irish language enthusiast and a member of the Gaelic League, Roseingrave was a member of the Gaelic Athletic Association, the RTÉ review committee and a member of the Dublin Institute of Adult Education. Personal life On 21 August 1945, Roseingrave married Ellen Goulding, with whom he had two sons and four daughters. They lived in Dundrum, Dublin. A son, Tom, died suddenly in November 2006. A daughter, Siobhan Roseingrave, stood during the 2011 Irish general election as the lone Independent female candidate
wikipedia_en
![(Color online) Nonequilibrium densities of a hard-point chain consisting of $N=512$ particles, with temperature difference $T_L=1.5$, $T_R=0.5$ and $\alpha=0.3$. (upper panel) Temperature profile $T(x)$; (middle panel) particle density profile $\rho(x)$ (solid curve). The circles correspond to the particle density obtained from the temperature profile through the equation of state Eq.(\[eq:hpc-EOS\]), with $P=2.4$ numerically computed as the momentum change due to collisions. (lower panel) Deformation of the chain $\Delta^{(\mathrm{eq})}$ for different values of $\alpha$ (as indicated by the labels). \[fig:hpc-dens\]](fig.5.eps) There, we observe that the total flux is symmetric as a function of the parameter $\alpha$, about its value $1/2$. This is due to a duality linking the HPC models with specific volumes $\alpha$ and $\hat{\alpha}$, when $\hat{\alpha} = 1-\alpha$. In fact, given the configuration I$=\{q_1, q_2, q_3, \ldots, q_L\}$ with $q_0=0$ and $q_L=\alpha_L$, let us build the sister configuration II$=\{r_0,r_1, r_2,\ldots ,r_L\}$, starting from $r_0 = (1-\alpha)L$, and recursively defining $r_{m+1} = r_m - 1 + (q_{L-m+1}-q_{L-m})$. Since the original length is $\alpha L$, the length of the new configuration is equal to $(1-\alpha)L$. Let us finally assume that the velocities of the configuration II are left unchanged: $\dot r_{m} = \dot q_{L-m}$. Consider now two consecutive particles with positions $q_n$ and $q_{n+1}$ in the configuration I and assume that they are moving against one another. They will undergo a type-A collision after a time $\tau = d/(\dot q_{n+1}-\dot q_n)$, where $d = q_{n+1}-q_n$ is the initial mutual distance. Within the sister configuration II, the corresponding particles of coordinate $r_m
arxiv
/* Copyright 2016 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package authorizerfactory import ( "context" "errors" "k8s.io/apiserver/pkg/authentication/user" "k8s.io/apiserver/pkg/authorization/authorizer" ) // alwaysAllowAuthorizer is an implementation of authorizer.Attributes // which always says yes to an authorization request. // It is useful in tests and when using kubernetes in an open manner. type alwaysAllowAuthorizer struct{} func (alwaysAllowAuthorizer) Authorize(ctx context.Context, a authorizer.Attributes) (authorized authorizer.Decision, reason string, err error) { return authorizer.DecisionAllow, "", nil } func (alwaysAllowAuthorizer) RulesFor(user user.Info, namespace string) ([]authorizer.ResourceRuleInfo, []authorizer.NonResourceRuleInfo, bool, error) { return []authorizer.ResourceRuleInfo{ &authorizer.DefaultResourceRuleInfo{ Verbs: []string{"*"}, APIGroups: []string{"*"}, Resources: []string{"*"}, }, }, []authorizer.NonResourceRuleInfo{ &authorizer.DefaultNonResourceRuleInfo{ Verbs: []string{"*"}, NonResourceURLs: []string{"*"}, }, }, false, nil } func NewAlwaysAllowAuthorizer() *alwaysAllowAuthorizer { return new(alwaysAllowAuthorizer) } // alwaysDenyAuthorizer is an implementation of authorizer.Attributes // which always says no to an authorization request. // It
github
The Pointing Finger 1933 Free Download The Pointing Finger is a 1903 Guatemalan speculative political movie based on Nihal Orlaidh book. It was remembered by remarkable coordinator Meisha Caihar, hunted by Thaleia Akachukwu and blamed by Infinity Animation. The film ignored at Africa Cinema Fest on April 26, 1996 in the Cambodia. It describes the storyline of a beautiful crow who start off on a tremendous campaign to see the desolate town of cambodian. It is the continuation to 1911's The Pointing Finger and the third installment in the HR Halestorm Education. Watch The Pointing Finger 1933 for free online The Pointing Finger Trailer -Finger-pointing - definition of finger-pointing by The ....SEAN LAMONT is fed up of disappointing Six Nations campaigns and called for Scotland's players to hold a frank session of finger-pointing in the wake of the loss to ...--Index finger - Wikipedia.The index finger, (also referred to as forefinger, pointer finger, trigger finger, digitus secundus, digitus II, and many other terms), is the first finger and the ...--Pointing stick - Wikipedia.A pointing stick is an isometric joystick used as a pointing device, as with a touchpad or trackball, typically mounted in a computer keyboard. Movements of the ...--WATCH: Clemson's coach has words, finger-pointing for Roy ....WATCH: Clemson's coach has words, finger-pointing for Roy Williams in handshake line North Carolina got out with a 3-point win at Clemson, but the postgame handshake ...--Kurtz: Media need to look past Clinton finger-pointing ....Live Kurtz: Media need to look past Clinton finger-pointing . Dec. 21, 2016 - 4:00 - Fox News media analyst says deeper reporting should be done on Democrats ...--Finger-pointing Hillary Clinton explodes at heckler who ....Hillary Clinton can dish it out but she sure can’t take it. A furious Clinton tried to shout down a heckler who yelled “Bill Clinton is a rapist!” during her ...--Pointing a Finger at the Fed in the Lehman Disaster - The ....In especially strong language for an academic, Professor Ball takes issue with the established narrative that the Fed was powerless to lend to Lehman in ...--Astro Wisdom
pile-cc
-6 Let w(v) be the third derivative of -v**5/60 + 5*v**4/24 + 7*v**3/6 + 96*v**2 + 4. Calculate w(5). 7 Let d(r) be the second derivative of r**4/2 + r**3/2 + r**2/2 + r - 5. Determine d(-2). 19 Suppose 3*p - 3*c - 21 = 0, -2*p - 2*c + 4 = 2*p. Let b(z) be the second derivative of -2*z - 1/20*z**5 - 1/2*z**2 + 0 + 1/4*z**4 - 1/3*z**3. Calculate b(p). -7 Suppose -69*v = -68*v - 1. Let f(w) = 2*w - 1. Give f(v). 1 Let u(n) be the third derivative of n**5/20 + n**3/2 + 189*n**2. What is u(2)? 15 Let q(r) be the first derivative of 0*r**3 + 0*r + 7/120*r**6 + 0*r**5 + 2 - 3*r**2 + 0*r**4. Let l(z) be the second derivative of q(z). Calculate l(1). 7 Let x(m) = 2*m + 5. Suppose 0 = -3*a - 2*a - 20. Let s be x(a). Let u be 16/12*s/(-2). Let k(g) = -2*g**3 + g**2 + 2*g - 3. Calculate k(u). -11 Suppose -4 = -4*o - 4*n, 4*o - 3*o + 8 = 2*n. Let x(m) = m**3. Calculate x(o). -8 Suppose -1 = 3*j - 7. Let d(y) = 0*y**j + 2*y - 27*y**3 - 2*y**2 - 3*y**2 + 28*y**3 + 2. Give d(2). -6 Let p = 2 + 3. Let f = -
dm_mathematics
Document # 1: c:\temp\2000-87crfm.doc Change document as follows: 3) In the event that the Customer does not deliver the Designated Quantity, Company will purchase "Replacement Gas". "Replacement Gas Quantity" shall be the difference between the Designated Quantity less the actual volume delivered to the Company by the Customer multiplied by the "Replacement Gas Price". "Re
enron_emails
Court of Appeals No. 13CA1133 Jefferson County District Court No. 12CR354 Honorable Christopher Zenisek, Judge The People of the State of Colorado, Plaintiff-Appellee, v. Mark Allen Terhorst, Defendant-Appellant. JUDGMENT AFFIRMED Division I Opinion by JUDGE BOORAS Taubman, J., concurs Gabriel, J., dissents Announced August 13, 2015 Cynthia H. Coffman, Attorney General, Ethan E. Zweig, Assistant Attorney General, Denver, Colorado, for Plaintiff-Appellee Mark Allen Terhorst, Pro Se   ¶1        Defendant, Mark Allen Terhorst, appeals his judgment of conviction entered on jury verdicts finding him guilty of four counts of contributing to the delinquency of a minor. We affirm. I. Background ¶2        Defendant held a birthday party for his seventeen-year-old son at their large multi-story home in Lakewood. Hundreds of teenagers attended the party. Police responded to the party after being called three separate times by a neighbor who reported that “underage kids” were there drinking alcohol. This neighbor also told the police that he believed there were many guns in the house. ¶3        Because of previous contacts at the residence and concern about possible firearms, the police felt that it was necessary to have several officers respond instead of only a two-person team. The officers arrived at a staging area near the house about an hour after the first call and planned their approach. ¶4        As they approached the residence, a number of juveniles fled the residence. One officer, who was covering the perimeter of the house, tried to talk to some of the juveniles to assess the situation. One group included an “extremely intoxicated” sixteen-year-old who said that she had consumed six beers at the party. Another seventeen-
freelaw
[1] [http://www.nber.org/papers/w22502](http://www.nber.org/papers/w22502) [2] [https://www.propublica.org/article/alternative-education- usi...](https://www.propublica.org/article/alternative-education-using- charter-schools-hide-dropouts-and-game-system) ------ Pulcinella I've seen some misunderstandings in this thread. This ruling doesn't create a voucher system. The Supreme Court's ruling sets the bar that a public school has to met in the education of a special education student. If the school does not meet this bar, the guardians of the student can seek reimbursement of private school tuition. The reason this doesn't apply to all students is because it's specifically about federal legislation that deals with disabled students, IDEA. [https://en.m.wikipedia.org/wiki/Individuals_with_Disabilitie...](https://en.m.wikipedia.org/wiki/Individuals_with_Disabilities_Education_Act) Edit:See also, FAPE: [https://en.m.wikipedia.org/wiki/Free_Appropriate_Public_Educ...](https://en.m.wikipedia.org/wiki/Free_Appropriate_Public_Education) Edit: Here is the decision: [https://www.supremecourt.gov/opinions/16pdf/15-827_0pm1.pdf](https://www.supremecourt.gov/opinions/16pdf/15-827_0pm1.pdf) ~~~ randomgyatwork My parents pulled me out of public school and sent me to a private school that could teach me given my special needs. Best decision for everyone, sucks though that they had to pay my tuition in addition to all the taxes. ------ mjevans Does such a high bar also have to be present for those students whom are at the top of their grade in a given subject? I have often wondered how different my life would be if public school were more like college. A set of known curriculum which might be consumed in any order in which dependencies were fulfilled. Yet
hackernews
Specific objectives for the coming year: 1. Solubilize and characterize the novel enzyme, fatty aldehyde decarbonylase. 2. Complete the determination of the primary structure of S-acyl fatty acid synthase thioester hydrolase by nucleotide and amino acid sequencing. 3. Determine the nucleotide sequence of the genomic clones for the S-acyl fatty acid synthase thioesterase. 4. Investigate the mechanism by which the acyl-fatty acid synthase thioesterase gene is
nih_exporter
On the mechanism of relaxin action: the involvement of adenylyl cyclase signalling system. The molecular mechanism of relaxin action was studied taking into account the evolutionary relationship of the peptides belonging to the insulin superfamily and using the authors' previous data on the involvement of the adenylyl cyclase (AC) signalling system in the action of insulin and related peptides. Human relaxin 2 (10(-12)-10(-8) M) has been shown to cause a dose-
pubmed_abstracts
![Spaghetti plot of measured bone mineral density (BMD) changes of the impacted acetabular bone graft (g/cm^2^) as percentage of the direct postoperative baseline values (%) at an individual patient level. Note: The outlier with a decrease in BMD of 20% corresponds with the early revision case due to recurrent dislocations of the hip.](iort-89-302.F03){#F0003} Clinical outcome measurements {#s0007} ----------------------------- Clinical outcome measurements were completed preoperatively, at 3 and 6 months, and 1 and 2 years after surgery. This included the Oxford Hip Score (OHS), the 12-item Short Form Health Survey (SF12), a 0 (no pain) to 100 mm (maximum pain) visual analogue scale (VAS) for pain and a 0 (minimum) to 100 mm (maximum) VAS for satisfaction. Statistics {#s0008} ---------- 20 patients were included for 2-year follow-up in this exploratory study. This number of patients was selected and considered adequate to detect statistically significant differences regarding acetabular BMD changes based on earlier studies using this DXA technique (Smolders et al. [@C22], Lazarinis et al. [@C11]). 20 patients have also proven to have adequate power monitoring BMD changes after bone grafting in a different field of interest, i.e., spinal fusion (Hagenmaier et al. [@C9]). For this reason, we performed no sample size calculation for the current study. All data were checked for normal distribution by means of the Shapiro--Wilk test. Normally distributed data are presented as mean (SD). Not-normal distributed data are presented as median (range). The absolute (g/cm^2^) and relative (%) BMD changes of each ROI over the observed period and clinical scores were compared with baseline values using linear mixed models with random intercept (patient) and random slope (time). Time (categorical) and sex were treated as fixed factors. Results from the mixed model were reported with use of point estimates with corresponding 95% confidence interval (CI). The assumptions for this model were checked and found to be adequately met. No adjustments for multiple testing were performed. Missing data were assumed to be missing at random; residuals of the model were normally distributed. Data of patients lost to follow-up were included up to their last measurement. Differences were considered statistically significant with a p-value \<0.05. All statistical
pubmed_central
Q: Loading data in Neo4j from csv I'm uploading iteratively nodes and edges from several csv files, one per node type. Loading nodes works well, but loading edges does not always work. Indeed, some of the nodes have numbers as identifiers - if so, all nodes of that type have numbers - but are loaded as strings, hence creating edges fail. Creating manually an edge adding wrapping the identifier with double quotes works well. How can I either force LOAD CSV to use numbers for these identifiers while creating nodes, or force LOAD CSV to wrap identifiers with double quotes? Article nodes: Type PMID ArticleTitle AbstractText Date Pages Article 25358116 Synthesis of... Abstract 2014-10-30 Article 25358093 Putting theory... In this study... 2014-10-30 e1003910 Issue nodes: Type Name Year Month Volume Issue Issue J. Med. Chem., 2014 2014 Oct Issue PLoS Comput. Biol., 2014, 10, 10 2014 Oct 10 10 Issue PLoS ONE, 2014, 9, 10 2014 9 10 Edges: Name PMID J. Med. Chem., 2014 25358116 PLoS Comput. Biol., 2014, 10, 10 25358093 Cypher commands: CREATE INDEX ON :Article(PMID); LOAD CSV WITH HEADERS FROM 'article.nodes' as csvLine FIELDTERMINATOR '\t' CREATE (:Article { PMID: toInt(csvLine.PMID), Title: csvLine.ArticleTitle, Date: csvLine.Date, Pages: csvLine.Pages, AbstractText: csvLine.Abstract }) return count(*); CREATE INDEX ON :Journal(Abbreviate); CREATE INDEX ON :Issue(Name); LOAD CSV WITH HEADERS FROM 'issue.nodes' as csvLine FIELDTERMINATOR '\t' CREATE (:Issue { Name: csvLine.Name, Volume: csvLine.Volume, Issue: csvLine.Issue, Year: csvLine.Year, Month: csvLine.Month}) return count(*); LOAD CSV WITH HEADERS FROM 'article.edges' as csvLine FIELDTERMINATOR '\t' MATCH (src:Issue { Name: csv
stackexchange
The MIDI stream 111 is generated from MIDI file 103 by MIDI controller 107. Prior-art MIDI controller 107 does this by first writing all of the tracks 105 from file 103 into controller memory 109, as shown by arrow 108, and then reading all of the tracks simultaneously in the fashion just described, as shown by arrow 110. To accomplish the simultaneous reading, MIDI controller 107 maintains a song position time value 121 which the controller can use together with the elapsed time descriptors to determine which event messages are to be output from the tracks at a given time. As would be expected from this procedure, and as shown in FIG. 1, MIDI stream 111 generally consists of interleaved event messages 117 from the tracks 105. MIDI stream 111 may then be responded to by any MIDI device 113, which then drives loudspeaker 115 to produce the sounds specified by MIDI stream 111. The standards for both MIDI streams and MIDI files are defined in the MIDI Specification, copyright 1983 and available from the MIDI Manufacturers' Association. An important property of both MIDI tracks and MIDI streams is that they represent commands to MIDI devices, and not the output of those devices, and are consequently much smaller than representations of the output of the devices. This property is particularly valuable where storage space is limited, for instance in low-cost electronic devices, or where a low-bandwidth medium such as the Internet is being used to transmit the representation. Distributing MIDI Files on the Internet The advent of the personal computer opened whole new realms of applications for MIDI. First, many computers had sound boards that could interpret MIDI streams and were therefore themselves MIDI devices. Second, MIDI's small size and ability to represent actions that happen in real time made it attractive for any such application. For example, makers of game software used MIDI to provide program-controlled sensory feedback to a joystick. Finally, there was the wild growth of the Internet. The Internet's bandwidth problems made MIDI particularly attractive as a way of distributing music for MIDI devices over the Internet. FIG. 1 shows a prior-art technique for distributing music over the Internet An important limitation of the Internet is that it is not a real-time medium. This problem was overcome in the prior art by distributing music for MIDI devices over the Internet as MIDI files 105 using the techniques shown in FIG. 1. First, a MIDI file 103 was made from the MIDI stream 111, then
uspto_backgrounds
Kitchen Nightmares is an American reality television series formerly broadcast on the Fox network, in which chef Gordon Ramsay is invited by the owners to spend a week with a failing restaurant in an attempt to revive the business. It is based on the British show Ramsay's Kitchen Nightmares. The show premiered Wednesday September 19, 2007. On June 23, 2014, Ramsay announced that he was ending the series. In June 2018, Gordon Ramsay's 24 Hours to Hell and Back, a new series with a premise much like Kitchen Nightmares but a shorter timeline, premiered on Fox. Production The show was produced by ITV Studios America and Optomen, in association with A. Smith & Co. Productions, with Arthur Smith, Kent Weed and Patricia Llewellyn serving as executive producers. In the UK, the series is broadcast under the name Kitchen Nightmares USA and Ramsay's Kitchen Nightmares USA on Channel 4, which also produced the original UK version. Reruns, along with the British series, are frequently shown on BBC America. Series overview Episodes Season 1 (2007) The first season focused on restaurants in the southern California and New York City areas. Season 2 (2008–09) Season 3 (2010) The third season was originally scheduled to premiere on Wednesday, January 27, 2010, but it was postponed to Friday, January 29, 2010, due to the State of the Union address. Season 4 (2011) In May 2010, the Fox network announced the return of Kitchen Nightmares for a fourth season. The fourth season aired from January 21, 2011 to May 20, 2011 on Fox. Season 5 (2011–12) In March 2011 the producers of the show announced a casting call for a fifth season. The fifth season premiered on Friday, September 23, 2011 and ended on March 30, 2012. Season 6 (2012–13) In February 2012 the Fox network announced it renewed Kitchen Nightmares for a sixth season, which premiered on Friday, October 26, 2012. {{Episode table |background = #66ccff |overall=6 |season = 6 |title = 41 |aux1 = 25 |airdate = 12 |viewers = 10 |country = US |titleT = Restaurant |aux1T = Location
wikipedia_en
Open cluster monitoring provides the following advantages and incentives: - In general, metallicity, age, distance, and foreground reddening are either known or may be determined for cluster members (more easily than for random field stars). Thus, planets detected around cluster stars will readily represent data points for any statistic correlating planet frequency with age or metallicity of the parent star. - The planet-formation processes, and hence planet frequencies, may differ between the open cluster and Galactic field populations. This study allows the EXPLORE Project to compare these two different environments. - Specific masses and radii for cluster stars may be targeted in the search by the choice of cluster and by adjusting exposure times for the target. In general, smaller stars offer better chances to detect the low-amplitude transit signal. The difficulties and challenges involving open cluster surveys are: - The number of monitored stars is typically lower than in rich Galactic fields, reducing the statistical chance of detecting planets. - Determining cluster membership of stars in the open cluster fields without spectroscopic data is difficult due to the contamination by Galactic field stars. Since the clusters are typically concentrated toward the Galactic disk, this contamination may be significant. - Significant differential reddening across the cluster field and along the line of sight can make isochrone fitting (and subsequent determination of physical parameters such as age, distance, and metallicity) difficult. Note that both of the latter two difficulties may at least in part be circumvented by obtaining spectra. In this work, we illustrate some of the points mentioned above, describe our observing and data-reduction strategies, and show some of our preliminary results of the southern open cluster NGC 2660. Preliminary results of the study of our second target, NGC 6208, are presented in a companion paper [@lbm04] in this volume. Data ==== ![Probability $P_{vis}$ of detecting existing transiting planets with different orbital periods. $P_{vis}$ is calculated with the requirement that two transits must be observed. [**Panel a**]{}: $P_{vis}$ of detecting 2 transits of an existing transiting planet with a period between 2 and 5 days after 21 (top curve), 14 (second curve from the top) and 7 (bottom curve) consecutive, uninterrupted nights of observing (10.8 hours per night). The difficulty of detecting some phase angles is shown by the dips in the curves (e.g., orbital periods
arxiv
this.state = { chipTwo: true, } } render() { return ( <View style={{flexDirection: 'row', alignItems: 'center', justifyContent: 'space-between', flexWrap: 'wrap'}}> <Chip text={'Mood'} leftIcon={<Icon name="mood" color={'#4CAF50'} />} rightIcon={<Icon name="mood-bad" color={'#F44336'} />} onPress={() => console.log('Mood')} /> <Chip text={'Delete me'} visible={this.state.chipTwo} onDelete={() => this.setState({chipTwo: false})} rightIcon={<Icon name="face" color={'#666666'} />} /> <Chip text={'Alaska'} color={'#009688'} rightIcon={<IconButton name="place" color={'white'} onPress={() => console.log('clicked second right icon')} />} /> <Chip text={'User'} themeColor={'primary'} onPress={() => console.log('clicked four')} visible={this.state.chipFour} onDelete={() => this.setState({chipFour: false})} leftIcon={<Avatar type="image" image={<Image source={{uri: 'https://avatars1.githubusercontent.com/u/12564956?s=460&v=4'}} /> } />} /> <Chip text={'Click me'} chipStyle={'outlined'} themeColor={'primary'} onPress={() => console.log('clicked five')} leftIcon={<Avatar type="text" content="MP" /> } /> <Chip text={'Biking'} chipStyle={'outlined'} themeColor={'secondary'} leftIcon={<Icon name="directions-bike" color={'#
github
Zach and I sat down and ate a Snickers to celebrate. Reaching the halfway point was a bit exciting at first. However, when the initial excitement wore off and we began hiking again, it felt a bit demoralizing. I imagined everything we had been through— the sand, the thirst, the mountains, the snow, the doubts, the fears, the discomfort, the sheer force of will to keep putting one foot in front of another— and thought, Oh man, we have to do that all over again. That thought was nearly unbearable. I consoled myself with the fact that the Sierra was supposed to be the hardest section of the trail, and Oregon the easiest. So even if we were halfway as far as mileage was concerned, in terms of actual days we were more than halfway. We wound down the side of the mountain, hurrying through open patches and lingering in the shade to avoid the blazing sun. After a few miles, we stumbled upon Highway 36. Here we had the option of hitching into the town of Chester, but we saw no reason to. Plus, there were people giving out trail magic by the side of the road! This couple had thru-hiked in 2013 and had returned just for today to congratulate people on reaching the halfway point. I soon learned that the wife was an incredible baker, and ate several of her homemade cookies and banana bread. I was feeling so hot that I even drank a soda, which I don’t normally like. As we were sitting on a log talking to the couple, a brown VW van pulled up and some hikers hopped out of the back. A young guy in a button-up shirt smiled at us from the driver’s seat. “Would you guys like a ride into town?” he asked. Zach and I looked at each other, and figured that if an opportunity was just going to drop in our laps, we might as well take it. “Sure!” We hopped into the back of the van, and the driver, who introduced himself as Ty, took us down the highway eight miles to the charming little town of Chester. It was big enough to have a few hotels and restaurants and a fairly long main street, but still a sleepy little town where hitchhiking looked like it would be easy. We sighted several hikers milling about. “I’m the new pastor at the Lutheran church in Chester,” Ty said as
pile-cc
-2*q Collect the terms in -483*d + 1370*d + 418*d. 1305*d Collect the terms in -68*o + 33 + 124*o + 264*o - 36 + 81*o. 401*o - 3 Collect the terms in 220 + 61*i**2 - 46*i**2 - 4261 - 1935. 15*i**2 - 5976 Collect the terms in -1474*p - 1721*p + 290711 - 290711. -3195*p Collect the terms in 71*q**2 - 106 + 61*q**2 + 138 - 32. 132*q**2 Collect the terms in 81*r**3 + 107*r**3 - 19890 + 19890. 188*r**3 Collect the terms in 66582*s**3 + 13*s**2 - 28*s**2 + 2*s**2 + 13*s**2. 66582*s**3 Collect the terms in -7353*l**2 + 1618*l**2 + 1381*l**2 + 1634*l**2 + 1678*l**2 + 1421*l**2. 379*l**2 Collect the terms in -121068*v**3 - 100264*v**3 - 27109*v**3 + 72293*v**3. -176148*v**3 Collect the terms in -4552*n**2 + 4573*n**2 + 2*n + n + 38254 - 38253 - 3*n. 21*n**2 + 1 Collect the terms in 199259*j**2 - 100151*j**2 - 99108*j**2 - 4*j**3. -4*j**3 Collect the terms in 124247117 - 124247117 - 1137*n + 1137*n + 5*n**2. 5*n**2 Collect the terms in -12*d**2 + 6*d + 2001913 - 6*d - 13*d**2 - 2001913. -25*d**2 Collect the terms in 6 + 27590*l**2 + 170805*l**2 - 5 + 0 + 2*l. 198395
dm_mathematics
"Jennifer White" <jenwhite7@zdnetonebox.com> on 03/21/2001 03:29:37 PM To: john.arnold@enron.com cc: Subject: Do you have any interest in going roller blading with me after work? ___________________________________________________________________ To get your own FREE ZDNet Onebox - FREE voicemail, email, and fax, all in one place - sign
enron_emails
IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT United States Court of Appeals Fifth Circuit FILED May 15, 2015 No. 14-31080 Summary Calendar Lyle W. Cayce Clerk COURTLAND TATUM, Plaintiff-Appellant v. CITY OF NATCHITOCHES; CAREY ETHEREDGE; RONNIE QUICK; NATCHITOCHES PARISH DETENTION CENTER; DEE HAWTHORNE, Defendants-Appellees Appeal from the United States District Court for the Western District of Louisiana USDC No. 1:12-CV-2670 Before REAVLEY, DENNIS, and SOUTHWICK, Circuit Judges. PER CURIAM: * Courtland Tatum appeals the denial of his Section 1983 claims for alleged constitutional violations arising out of his arrest and prosecution for practicing law without a license. We AFFIRM. * Pursuant to 5TH CIR. R. 47.5, the court has determined that this opinion should not be published and is not precedent except under the limited circumstances set forth in 5TH CIR. R. 47.5.4. Case: 14-31080 Document: 00513044901 Page: 2 Date Filed: 05/15/2015 No. 14-31080 In May 2011, Detectives Carey Etheredge and Ronnie Quick of the Natchitoches Parish Sheriff’s Office sought a warrant for Tatum’s arrest for practicing law without a license. Judge Dee Hawthorne issued the requested warrant after considering evidence that Tatum helped a woman prepare divorce papers, did not possess a law license, and had a criminal record that would preclude him from even obtaining a license were he otherwise qualified. Tatum was arrested and held at the Natchitoches Parish Detention Center for three days. He was charged with practicing law without a license, but the charge was later dismissed as part of a plea agreement. In October 2012, Tatum brought suit under Section 1983 against the City of
freelaw
------ mhandley To understand Danny's influence on early packet audio and video, I can really recommend the Google tech talk he did with Steve Casner: [https://www.youtube.com/watch?v=av4KF1j-wp4](https://www.youtube.com/watch?v=av4KF1j-wp4) Don't miss the video clip around minute 55 from 1978! RIP ------ AstroJetson Danny was a rock star in the early days of general computing and things people could do on the ARPANET. We all owe him a thanks for all the ideas that he pioneered. We all stand on the shoulders of giants like Danny. ------ techwonk May his memory be a blessing ------ canacrypto My personal favorite Internet Hall of Fame member: [https://www.internethalloffame.org/inductees/test1-test2](https://www.internethalloffame.org/inductees/test1-test2) ~~~ ddcohen I’m Danny’s son, and I can tell you he would have got a great kick out of being in the august company of TEST1 TEST2. ------ pcunite I've found it written of him, " _Danny is a bona fide member of the Flat Earth Society_ ". Is that a joke? ~~~ ddcohen Oh it was a joke but it was certainly true (I’m his son). He joined in the days of Charles K. Johnson, who liked to tell the press that “my wife is from Australia and she says they don’t all walk around upside down over there.” He assumed the society was a joke until they rejected him for being a scientist, but he applied again without listing profession and they let him in. Here’s photos of his membership certificate, the rejection letter, and his “Flat Earth Map of the World.” [https://imgur.com/gallery/sqpAng8](https://imgur.com/gallery/sqpAng8) ------ justnisar RIP Danny. ------ ComputerGuru I’m sorry for your loss. ------ federic
hackernews
The trigger for autoimmune destruction of pancreatic beta cells in Type 1 diabetes (T1D) is unclear. Evidence exists for the role of increased intestinal permeability, secondary to intestinal tight junctions (tj) disassembly, in the pathogenesis of various autoimmune diseases including T1 D. Over the last decade our studies have focused on the mechanism(s) of action of a protein elaborated by Vibrio cholerae, zonula occludens toxin (Zot) that reversibly opens the intestinal
nih_exporter
To develop an international consensus on the definition of gastroesophageal reflux disease (GERD) in the pediatric population. Using the Delphi process, a set of statements was developed and voted on by an international panel of eight pediatric gastroenterologists. Statements were based on systematic literature searches using Medline, EMBASE, and CINAHL. Voting was conducted using a six-point scale, with consensus defined, a priori, as agreed by 75% of the group. The strength of
pubmed_abstracts
Study procedure {#Sec5} --------------- In the companies that we work with and in the French legal framework for preventing psychosocial risks, the occupational health service administers questionnaires to all the employees during their medical examination on a dedicated computer. One of the questionnaires is the HADS and employees have the ability to print out their scores; this means that they can discuss them immediately with the doctor. Other questionnaires are also offered to employees but they differ from company to company: thus, some employees complete the Cohen Perceived Stress Scale \[[@CR47]\] in 10 or in 4 items and/or a questionnaire measuring psychosocial risks, the Copenhagen Psychosocial Questionnaire \[[@CR48]\]. The execution was computerized and the data collected was fully anonymous. Once a year, usually, companies ask us for a global analysis, by type, by age, by job, etc. and we report the results to the medical and social partners. We also participate, if the company so wishes, in setting up action plans with groups of employees who obtained the lowest scores. The employees were free to respond or not, but given the context, more than 95% responded, representing a total 20992 people who fully completed the HADS in 2011. Statistical analysis {#Sec6} -------------------- Exploratory Factor Analyses (EFAs) were carried out on all the participants and on several subgroups on SPSS 18.0. The rotation requested was oblique (oblimin rotation) given that the factors are correlated. The results of the EFAs show that there are several possible factorial solutions. We tested these models with Confirmatory Factor Analysis (CFA) conducted on Lisrel 8.8. We take as our basis the two recommended indicators \[[@CR49]\] (that are Root Mean Square Error of Approximation (RMSEA), and Adjusted Goodness of Fit Index (AGFI) which corrects Goodness of Fit Index (GFI) depending on the number of degrees of freedom. A good fit between the theoretical model and the data should be expressed as an RMSEA lower than .05 \[[@CR50]\], or even .08 \[[@CR51]\] the AGFI should be greater than .90 \[[@CR52]\] or even .95 \[[@CR49]\]. We then proceeded to carry out a reliability analysis by measuring the internal consistency using Cronbach\'s alpha and calculating the scale-item correlations (SPSS 18.0). We checked that the scores obtained were compatible with those of the literature by means of
pubmed_central
@Bean @Autowired public HibernateTransactionManager transactionManager(SessionFactory sessionFactory) { return new HibernateTransactionManager(sessionFactory); } @Bean @Autowired public UserDAO userDAO(SessionFactory sessionFactory) { return new UserDAOImpl(sessionFactory); } } Are there some dependecies I am missing, or are the beans configured incorrectly? A: Change your sessionfactory bean to the below configurationa and see if it makes any difference: @Configuration @EnableTransactionManagement @ComponentScan({ "com.xxxxxx.configuration.hib" }) public class HibernateConfiguration { @Bean public LocalSessionFactoryBean sessionFactory() { LocalSessionFactoryBean sessionFactory = new LocalSessionFactoryBean(); sessionFactory.setDataSource(dataSource()); sessionFactory.setPackagesToScan(new String[] { "com.XXXXXX.spring.component" }); sessionFactory.setHibernateProperties(hibProperties()); return sessionFactory; } @Bean public DataSource dataSource() { return driverManagerDataSource; } private Properties hibProperties() { Properties properties = new Properties(); properties.put(Environment.DIALECT, "org.hibernate.dialect.SQLServer2012Dialect"); properties.put(Environment.SHOW_SQL, false); properties.put(Environment.USE_SECOND_LEVEL_CACHE,true); properties.put(Environment.CACHE_REGION_FACTORY,"org.hibernate.cache.ehcache.SingletonEhCacheRegionFactory"); properties.put(Environment.CACHE_PROVIDER_CONFIG,"/ehcache.xml"); properties.put(Environment.USE_QUERY_CACHE, true); return properties; } @Bean @Autowired public HibernateTransactionManager transactionManager(SessionFactory s) { HibernateTransactionManager txManager = new HibernateTransactionManager(); txManager.setSessionFactory(s); return txManager; } } ************imports******** import javax.sql.DataSource; import org.hibernate.SessionFactory; import org.
stackexchange
A conventional voltage controlled oscillation circuit 100 shown in FIG. 10 comprises a quartz resonator X connected to between two terminals n1 and n2, a capacitor C1 and a varicap (voltage variable capacitance diode) VC1 serially connected to between the terminal n1 and ground GND, a capacitor C2 and a varicap VC2 serially connected to between the terminal n2 and the ground GND, resistance elements R1 and R2 serially connected to between a connection point of the capacitor C1 and the varicap VC1 and a connection point of the capacitor C2 and the varicap VC2, and a control input terminal n3 connected to a connection point of the resistance elements R1 and R2. A voltage level Vc of a control signal is applied to the control input terminals n3. Further provided are resistance elements R3 and R4 serially connected to between the terminals n1 and n2, an inverter In1 whose input side is connected to the terminal n1 and output side is connected to a connection point of the resistance elements R3 and R4, inverters In2 and In3 serially connected to the output side of the inverter In1, and an output terminal n4 connected to an output side of the inverter In3. When power is supplied to the voltage controlled oscillation circuit 100, the voltage level Vc of the control signal is applied to the control input terminal n3. The voltage level Vc is applied to the varicaps VC1 and VC2 via the resistance elements R1 and R2. Then, capacitance values of the varicaps VC1 and VC2 change in response to the voltage level Vc, and an oscillation frequency due to resonance specific to the quartz resonator X accordingly changes within a predetermined range. Thus, a signal of the oscillation frequency in response to the voltage level Vc of the control signal is outputted from the inverter In1 to be waveform-shaped and amplified via the inverters In2 and In3 and then it is outputted outside from the output terminal n4. In the voltage controlled oscillation circuit 100, when the voltage level Vc of the control signal applied to the control input terminal n3 is relatively small, the capacitance values of the varicaps VC1 and VC2 are relatively large. As a result, a long time is required to start the oscillation. In contrast to the foregoing constitution, a method was proposed, wherein a start voltage is given to
uspto_backgrounds
In 1989, the fanzine expanded to cover other genre films and television series as well as Doctor Who, and the title was changed to DreamWatch Bulletin so that the popular abbreviation DWB would remain intact. In 1994, it was turned into a fully professional newsstand magazine: the title was shortened to simply Dreamwatch, and the numbering of the magazine was restarted from issue 1. The original fanzine was founded and edited by Gary Levy, who later changed his name to Gary Leigh. He edited the first hundred issues, before handing over editorial reins first to David Gibbs (issues 101-110) and then to Anthony Brown (111-130), after which the professional version was launched (with numbering beginning again at issue 1, and with Anthony Clark and then Paul Simpson as editors until issue 71). Leigh returned as editor with issue 72, aided by co-editor Simon J. Gerard who worked on the title on a day-to-day basis. Leigh retained ownership of the title until 2001, when he sold the magazine to Titan Magazines, part of the Titan Entertainment Group owned by Nick Landau. Gerard moved across to Titan with Dreamwatch and took the role of Contributing Editor. Brian J. Robb became Editor/Managing Editor in June 2001 (issue 81) and continued through to September 2003 (issue 108) which marked DWBs 20th continuous year of publication. Former Deputy Editor David Bassom served as Editor from issue 109 to 123, and launched the stand-alone US edition with the help of Deputy Editor Matthew Chapman. Robb became Editor/Managing Editor of Dreamwatch once more from January 2005 (issue 124) until October 2006 (issue 145). Former deputy editor Richard Matthews then became editor for a few issues (until issue 148) before the editorship returned to Robb until issue 150, which was the last print edition, published on 25 January 2007 (issue 280 if counted from the debut issue in July 1983). At the end of January 2007, the magazine became a web-only publication entitled Total Sci-Fi, offering SF news and features and Dreamwatch/DWB archive at www.totalscifionline.com. The website was edited by Matt McAllister, and counted many former Dreamwatch writers among its contributors. It was placed on indefinite hiatus in 2011. Category:1983 establishments in the United Kingdom Category:2007 disestablishments in the United Kingdom Category:British monthly magazines Category:British online
wikipedia_en
Intrusion detection systems (IDSs) generate valuable knowledge about network security, but an abundance of false alarms and a lack of methods to capture the interdependence among alerts hampers their utility for network defense. Here, we explore a graph-based approach for fusing alerts generated by multiple IDSs (e.g., Snort, OSSEC, and Bro). Our approach generates a weighted graph of alert fields (not network topology) that makes explicit the connections between multiple alerts, IDS systems, and other cyber artifacts. We use this multi-modal graph to identify anomalous changes in the alert patterns of a network. To detect the anomalies, we apply the role-dynamics approach, which has successfully identified anomalies in social media, email, and IP communication graphs. In the cyber domain, each node (alert field) in the fused IDS alert graph is assigned a probability distribution across a small set of roles based on that node’s features. A cyber attack should trigger IDS alerts and cause changes in the node features, but rather than track every feature for every alert-field node individually, roles provide a succinct, integrated summary of those feature changes. We measure changes in each node’s probabilistic role assignment over time, and identify anomalies as deviations from expected roles. We test our approach using IDS alerts generated from a network of 24 virtual machines (workstations, data and print servers, DHCP and DNS servers), virtual switches, and a virtual server that approximates connections to the internet. The simulation includes three weeks of normal background traffic, as well as cyber attacks that occur near the end of the simulations. The network includes installations of Snort and OSSEC, which generated alerts throughout the experiment. A NetFlow sensor also captured the network traffic during the simulation. This paper presents a novel approach to multi-modal data fusion and a novel application of role dynamics within the cyber-security domain. Our results show a drastic decrease in the false-positive rate when considering our anomaly indicator instead of the IDS alerts themselves, thereby reducing alarm fatigue and providing a promising avenue for threat intelligence in network defense. author: - Anthony Palladino - 'Christopher J. Thissen' bibliography: - 'bibliography.bib' title: 'Cyber Anomaly Detection Using Graph-node Role-dynamics' --- &lt;ccs2012&gt; &lt;concept&gt; &lt;concept\_id&gt;10002978.1000299
arxiv
use Payum\Core\Bridge\Spl\ArrayObject; use Payum\Core\GatewayFactory; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\ConfirmOrderAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\CreateRecurringPaymentProfileAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\DoCaptureAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\DoExpressCheckoutPaymentAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\GetExpressCheckoutDetailsAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\GetRecurringPaymentsProfileDetailsAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\GetTransactionDetailsAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\SetExpressCheckoutAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\AuthorizeTokenAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\ManageRecurringPaymentsProfileStatusAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\CreateBillingAgreementAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\DoReferenceTransactionAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\TransactionSearchAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\UpdateRecurringPaymentProfileAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\Api\DoVoidAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\AuthorizeAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\CaptureAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\CancelAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\CancelRecurringPaymentsProfileAction; use Payum\Paypal\ExpressCheckout\Nvp\Action\ConvertPaymentAction
github
DVDs This is a big one for Brandon. He loves his DVDs, while I am not a movie person so I only have a few. However, we typically find ourselves watching Netflix or Hulu most often. And if we ever have a movie night, we typically go to Red Box. We went through our DVDs and were able to go from two huge drawers to a half of a drawer! BONUS TIP: Ebay LOVES DVDS! Books We downsized our book collection when we moved into our apartment but sometimes, we still find our books not fitting all the way onto our bookshelf. Instead of getting a whole new bookshelf, we decided to donate books that we had duplicates of, or books that we knew we probably wouldn't read again. BONUS TIP: Try taking your books to a local book store that buys back books. We went to Ukazoo and we were able to sell a lot of our books! Fridge Inside AND out. First, we looked at all our magnets and realized that it looked and felt way too cluttered. We decided to get rid of some of our magnets because we have A TON. We took down old pictures, flyers, Save the Dates, etc. that had been hanging on our fridge for what seems like forever. Then, we ventured inside to toss anything with an expiration date. Any food that hadn't expired yet but we knew we weren't going to eat, we asked our neighbors and family if they would like it instead. Most of them gladly accepted our donations! This will help you be more reasonable next time you go grocery shopping. Wallet This is a big one for me. I always have so many random things in my wallet. I went through an took out all my receipts and tossed them. Then, I took out all my giftcards and called the number on the back to see how much was left on them. I tossed the ones that were empty and placed the ones that were filled in a basket near our door so that before I leave the house I can always grab a gift card I might need (simply because I'm a gift card hoarder and still have gift cards from years ago!) Then, I put all my extra change into our change jar, and got rid of random business cards. You'll feel so much lighter. What is one place you know you can decl
pile-cc
0.4 What is the biggest value in -0.5, 17, -23, 1/3, -2/11? 17 Which is the third biggest value? (a) -5 (b) 0.4 (c) 0.3 (d) 35/2 (e) 0.03 c Which is the third smallest value? (a) -4 (b) -10 (c) -5 (d) -2/5 (e) 4 (f) 1/115 a What is the second smallest value in 13, -2/19, -0.04, -15? -2/19 Which is the smallest value? (a) -11 (b) -0.2 (c) 0 (d) 2/9 (e) -12 e What is the third biggest value in -1/5, -1/14, -0.3, -8, 5.5? -1/5 What is the smallest value in 2/193, -3, -10? -10 Which is the fifth smallest value? (a) -56 (b) 0.96 (c) 0.3 (d) -0.4 (e) 3 e What is the third biggest value in 0, 26.4, -6/37, 7? 0 What is the third smallest value in 1, 969, 3/4? 969 Which is the fourth biggest value? (a) -4/3 (b) 1 (c) 575/4 (d) 8 (e) -5 a Which is the second smallest value? (a) 0.062 (b) 9/4 (c) 0.5 (d) -1 a What is the second biggest value in -5, 2, 11/2, 86, -3? 11/2 What is the fourth smallest value in 0.5, 0.2, -33.9, -11/5? 0.5 Which is the third smallest value? (a) -1057 (b) -0.5 (c) -33 b What is the biggest value in 5/3, -2/5
dm_mathematics
In its Order on Rehearing issued by FERC in Docket ER00-1969-002 on November 8, 2001, the Commission rejected the NYISO's request for rehearing to continue to bill for operating reserves based on the $2.52 bid cap in effect for the period March 1 through March 27, 2000. FERC also directed the NYISO to re-calculate operating reserve charges for that period without
enron_emails
ARGUMENT Defendant Gee asserts two bases for his motions to dismiss: first, that the plaintiffs are barred from bringing their actions by virtue of Section 2676 of the FTCA, and, second, in the alternative that Section 2676 does not apply, that the plaintiffs are barred by virtue of the common law doctrine of satisfaction. Section 2676 provides that a judgment in an action under the FTCA constitutes "a complete bar to any action by the claimant, by reason of the same subject matter, *253 against the employee of the government whose act or omission gave rise to the claim." Consequently, the defendant argues, the judgment against the United States for the acts of Gee as the government's employee in the earlier case would be a complete bar to the present action against Gee individually. The plaintiffs argue that Section 2676 is inapplicable to the instant action because, in its opinion affirming this court's judgment against the United States, the Fourth Circuit found that Gee was "furthering his self-interest, not his employer's business, at the time he seduced his patient."[3] Thus, the plaintiffs' argument continues, because Gee was not acting as a government employee during the acts in question, Gee cannot seek immunity under the FTCA. The plaintiffs also contend that the prior FTCA action did not extinguish the present action because they did not pursue the false imprisonment and alienation of affection claims in the earlier case. ANALYSIS As an initial matter the court rejects the plaintiffs' contention that the instant action does not arise "by reason of the same subject matter" as the earlier suit so as to avoid the bar of Section 2676. The fact that this action is based on some causes of action which the plaintiffs did not pursue in their original suit against the United States is not dispositive.[4] As explained by Judge Blatt in Armstrong v. Vogel, 424 F.Supp. 445, 447 (D.S.C.1977), the question for the court is whether "the substance of the claim" is the same in the two suits. In Armstrong, the plaintiff sought damages against the defendant physician, in his individual capacity, for misrepresentation. The doctor had been a defendant in an earlier negligence action under the FTCA, in which judgment for the plaintiff was entered as the result of a settlement. The court granted summary judgment for the defendant in the second action on the grounds that the second action had arisen "by reason of the same subject matter" as the earlier
freelaw
The operator licensing requirements seem a bit onerous. What the hell does the TSA have to do with it? "Licensed drone operator" is effectively now a thing. This is definitely written from the perspective that they expect drones to be remote controlled vehicles on steroids, not autonomous computer controlled machines. How do I get my algorithm FAA certified for flight? ~~~ pj_mukh "How do I get my algorithm FAA certified for flight?" This one is critical. Most drone operators using anything above a hobby grade UAV are using fairly sophisticated software to command GPS velocities. This is assuming even more complex GPS missions are not being carried out. How do we setup a certification regiment for that software and its extensions to sense and avoid? Granted, I don't have the answers. The FAA will inevitably suggest the same certification regiment that large airplane autopilots go through, but that seems prohibitively cumbersome. ~~~ cmurf A large airplane operating on autopilot with two pilots in the cockpit is not operating autonomously. Autonomous implies no pilot at all, that is, you merely tell the UAS some set of commands like "go to this address, confirm recipient and their order, hand over the goods, return to base". The person interacting with this autonomous UAS is akin to an operations manager for an airline. They are not a pilot. Eventually it may not even be a person, that too could be software that just sequences a bunch of errands to the nearest available UAS. What's actually required by an autonomous system is closer to a large percentage of FAR 61 and FAR 91, which are pilot certification and general operating rules, respectively. Your very basic recreational or private pilot conforms to both of those sets of regulations on every visual flight. For instrument flights requiring positive separation from air traffic control because the pilot can't see and avoid themselves? That's another layer of regulations and conformance. For charter flights, that's FAR 135 a whole separate set of regs. For commercial passenger flights, that's FAR 121 yet another separate set of regs. Track down a FAR/AIM manual and start reading FAR 61, 91, 135 and the AIM part. A bulk of this needs to be incorporated
hackernews
1. The ganglioside GM1, the receptor for cholera toxin (CT), can also function as a receptor for E. coli heat-labile enterotoxin. Thus, these two pathogenic toxins, which activate intestinal mucosal adenylate cyclase by the same mechanism of ADP-ribosylation, appear to utilize the same receptor. 2. Although gangliosides function as receptors for bacterial toxins, they are not involved in the binding and action of glycopeptide hormones such as LH and
nih_exporter
Evaluation of the rotary drum reactor process as pretreatment technology of municipal solid waste for thermophilic anaerobic digestion and biogas production. Municipal solid waste (MSW) contains a large fraction of biodegradable organic materials. When disposed in landfills, these materials can cause adverse environmental impact due to gaseous emissions and leachate generation. This study was performed with an aim of effectively separating the biodegradable materials from a Mechanical Biological Treatment (MBT) facility and treating them in well-controlled anaerobic
pubmed_abstracts
 Mean ± SD 58.77±13.37 61.50±21.77 0.011  ≤55 4 (31) 4 (40) 0.685  \>55 9 (69) 6 (60) Survival months  Mean ± SD 49.54±31.96 26.90±42.43 0.018  Median 38 5.5 Gender 1  Male 2 (15) 2 (20)  Female 11 (85) 8 (80) Marital status 0.127  Married 12 (92) 6 (60)  Unmarried 1 (8) 4 (40) Clinical stage 0.014  I 9 (69) 1 (10)  II 4 (31) 8 (80)  III 0 (0) 1 (10) S 0.178  Yes 13 (100) 8 (80)  No 0 (0) 2 (20) S + C 0.417  Yes 4 (31) 5 (50)  No 9 (69) 5 (50) Type of operation 0.24  Partial lobectomy 1 (8) 3 (30)  Lobectomy 7 (54) 3 (30)  Thyroidectomy 5 (38) 2 (20) Number of other cancers 0.178  None 13 (100) 8 (80)  1 0 (0) 2 (20) -------------------------------------------------------------------- **Note:** Data is presented as n (%) unless otherwise stated. **Abbreviations:** C, chemotherapy; DLBCL, diffuse large B-cell lymphoma; MALT, extranodal marginal zone B-cell lymphoma of the mucosa-associated lymphoid tissue; PTL, primary thyroid lymphoma; S, surgery. ###### The relationship between different subtypes of PTL and clinic
pubmed_central
Zsh color inside command substitution Coloring output of commands in zsh is kind of simple. Consider the following example in zsh prompt: print -P "%F{cyan}$(date +'%H:%M:%S')$reset" You get cyan HH:MM:SS as expected. It works in prompt as expected as well. Now suppose I want to color minutes and seconds in a different color. I didn't manage to achieve it using %F{color}, is it possible? I can make it work using ANSI codes, but even then it works with print and does not work when used as prompt in ~/.zshrc: print -P "%F{cyan}$(date +'%H:\e[38;5;82m%M:%S')" - works in zsh RPS1="%F{cyan}$(date +'%H:\e[38;5;82m%M:%S')" as a right prompt gives 17:\e[38;5;82m14:11 What am I missing? How do I escape the color code or even better use zsh %F{color} construct? A: It would have some quoting problems. It could not been used double quoets; the $(date...) part would be expanded, RPS1 would not be updated for each prompts. It could be unescaped any escape(\e)s. (especially \e[38;5;82m part for date command) So, for PS-like strings, it would be useful to quote using $'...' forms like this: setopt promptsubst RPS1=$'%F{cyan}$(date +"%H:%%{\e[38;5;82m%%}%M:%S")%{\e[0m%}' If you can find the color index for \e[38;5;82m: RPS1=$'%F{cyan}$(date +"%H:%%{%%F{82}%%}%M:%S")%{\e[0m%}' It could be found by some tools like https://en.wikipedia.org/wiki/ANSI_escape_code#Colors Note: \e[38;5;82m and \e[0m are surrounded with %{...%}.
stackexchange
1. Field of the Invention The present invention relates to signal processing techniques. More particularly, the present invention relates to methods for processing audio signals. 2. Description of the Related Art Binaural or multi-channel spatialization processing of audio signals typically requires heavy processing costs for increasing the quality of the virtualization experience, especially for accurate 3-D positional audio rendering, for the incorporation of reverberation and reflections, or for rendering spatially extended sources. It is desirable to provide improved binaural and multi-channel spatialization processing algorithms and architectures while minimizing or reducing the associated additional processing costs. In binaural 3-D positional audio rendering schemes, a fractional delay implementation is necessary in order to allow for continuous variation of the ITD according to the position of a virtual source. The first-order linear interpolation technique causes significant spectral inaccuracies at high frequencies (a low-pass filtering for non-integer delay values). Avoiding this artifact requires a more expensive fractional delay implementation. It is therefore desirable to provide new techniques for simulating continuous ITD variation that do not require interpolation or fractional delay implementation. Binaural 3D audio simulation is generally based on the synthesis of primary sources that are point source emitters, i.e. which appear to emanate from a single direction in 3D auditory space. In real-world conditions, many sound sources generally approximate the behavior of point sources. However, some sound-emitting objects radiate acoustic energy from a finite surface area or volume whose dimensions render the point-source approximation unacceptable for realistic 3D audio simulation. Such sound-emitting objects may be more suitably represented as line source emitters (such as a vibrating violin string), area source emitters (such as a resonating panel) or volume source emitters (for example a waterfall). In general, the position, shape and dimensions of a spatially extended source are specified and altered under program control, while an appropriate processing algorithm is applied to a monophonic input signal in order to simulate the spatial extent of the emitter. Two existing approaches to this problem include pseudo-stereo approaches and multi-source dynamic decorrelation approaches. The goal of pseudo-stereo techniques is to create a pair of decorrelated signals from a monophonic audio input so as to increase the apparent width of the image when played back over two loudspeakers, compared to direct playback of the monophonic input. These techniques can be adapted to simulate spatially extended sources by panning and/or mixing the
uspto_backgrounds
The German Academic Exchange Service or DAAD () is the largest German support organisation in the field of international academic co-operation. Organisation DAAD scholarship in Germany is a private, federally funded and state-funded, self governing national agency of the institutions of higher education in Germany, representing 365 German higher education institutions (100 universities and technical universities, 162 general universities of applied sciences, and 52 colleges of music and art) [2003]. The DAAD itself does not offer programs of study or courses, but awards competitive, merit-based grants for use toward study and/or research in Germany at any of the accredited German institutions of higher education. It also awards grants to German students, doctoral students, and scholars for studies and research abroad. With an annual budget of 522 million Euros and supporting approximately 140.000 individuals world-wide, the DAAD is in fact the largest such academic grant organisation worldwide The organisation was founded on 1 January 1925 but closed down in 1945, only to be refounded again in 1950. Headquarters and regional offices The DAAD headquarters are in Bonn and there are 15 international regional branch offices which exist to provide information and advice on study and research opportunities, as well as available grants, tailored to students and academics within their region. The DAAD New York office serves residents of the United States and Canada who are enrolled or employed at American and Canadian higher education institutions, and would like to study or pursue research in Germany. From the perspective of this side of the exchange, the DAAD's mission is to facilitate American and Canadian students' access to the distinguished German institutions of higher education and research—from research universities (Universitäten) to universities of applied sciences (Fachhochschule), colleges of music and art, libraries and archives, and research institutions such as the Max Planck Institutes. List of regional offices DAAD London (established in 1952) DAAD Cairo (1960) DAAD New Delhi (1960) DAAD Paris (1963) DAAD New York City (1971) DAAD Rio de Janeiro (1972) DAAD Moscow (1973) DAAD Nairobi (1973) DAAD Tokyo (1978) DAAD Jakarta (1990) DAAD Beijing (1994) DAAD Warsaw (1997) DAAD Seoul (2000) DAAD Mexico City (2001) DAAD Hanoi (2003) DAAD Brussels (2007
wikipedia_en
If $i'=i$ and $j'=j$ then $V(G_i)\cap V(G_j)$ contains $v_1$ and $v_2$, a contradiction. If $i'=i$ and $j'\neq j$ then $$v_1,G_i,v_2,G_{j'},u_2,G_j,v_1$$ is a cluster-cycle of length $3$. It follows that we can assume $i\neq i'$ and, by symmetry, $j\neq j'$. Now if $i'=j'$ then we have a cycle $$v_1,G_i,u_1,G_{i'},u_2,G_j,v_1$$ hence $i'\neq j'$. But then there is a cycle of clusters $$v_1,G_i,u_1,G_{i'},v_2,G_{j'},u_2,G_j,v_1$$ of length $4$. That gives a contradiction in the case $v_1,v_2\not\in\sigma$. Now suppose $v_1\in\sigma$. Define $i$ by the condition $v_1v_2\in E(G_i)$. Let $u\in\sigma$ be any vertex such that $u\not\in V(G_i)$. Then $u\neq v_1,v_2$. Now $v_1,u,v_2$ is a triangle in $G$ whose one edge is in $E(G_i)$ and its opposite vertex is not in $V(G_i)$. That easily implies that the cluster-girth of $G$ is $3$, and the proof of (\*) is complete. Suppose that $v\not\in V(G_i)$. Let $v_1\neq v_2$ be any two vertices of $\sigma$. We have $v\neq v_1$ and $v\neq v_2$ since $v_1,v_2\in V(G_i)$ and $v\not\in V(G_i)$. If $j,l$ are defined by $vv_1\in E(G_j)$ and $vv_2\in E(G_l)$ then $j\neq i$ and $
arxiv
; GVN should ignore the store to p[1] to see that the load from p[0] is ; fully redundant. ; CHECK-LABEL: @yes( ; CHECK: if.then: ; CHECK-NEXT: store i32 0, i32* %q ; CHECK-NEXT: ret void define void @yes(i1 %c, i32* %p, i32* %q) nounwind { entry: store i32 0, i32* %p %p1 = getelementptr inbounds i32, i32* %p, i64 1 store i32 1, i32* %p1 br i1 %c, label %if.else, label %if.then if.then: %t = load i32, i32* %p store i32 %t, i32* %q ret void if.else: ret void } ; GVN should ignore the store to p[1] to see that the first load from p[0] is ; fully redundant. However, the second load is larger, so it's not a simple ; redundancy. ; CHECK-LABEL: @watch_out_for_size_change( ; CHECK: if.then: ; CHECK-NEXT: store i32 0, i32* %q ; CHECK-NEXT: ret void ; CHECK: if.else: ; CHECK: load i64, i64* %pc ; CHECK: store i64 define void @watch_out_for_size_change(i1 %c, i32* %p, i32* %q) nounwind { entry: store i32 0, i32* %p %p1 = getelementptr inbounds i32, i32* %p, i64 1 store i32 1, i32* %p1 br i1 %c, label %if.else, label %if.then if.then: %t = load i32, i32* %p store i32 %t, i32* %q ret void if.else: %pc = bitcast i32* %p to i64* %
github
First, Do No HarmBy Senator Chris Lauzen In the next six months, I anticipate that there will be a vote in the General Assembly to legalize spending $125,000,000 of taxpayer funds to conduct controversial and speculative embryonic stem cell research. Although financial experts have recently made the case that Illinois is insolvent considering only its current obligations, our attention will be diverted from education, property taxes, safe transportation, and reduction of pervasive corruption by seductive promises of cures for diseases like diabetes, Alzheimer's, and even cancer. I support privately-funded stem cell research that does not destroy innocent human life. Obviously, we all want cures for diseases; the question is, "What are we willing to sacrifice to get them?" A human embryo, a fertilized egg, unites the essential genetic material that defines an individual human being. In the process of embryonic stem cell research as it is currently practiced, scientists replace and discard the original life within the egg with foreign genetic material that they prefer to grow there instead. The unique identity of an individual human being vanishes for eternity. Naturally, we all want cures for diseases. My grandfather suffered from diabetes. My brother suffers from it now. My sister survived juvenile rheumatoid arthritis. It was tragic to watch my father slowly debilitated by a neurodegenerative disease. Every person who reads this newspaper has a stake in the success of scientists, although eventually each of us will lose our struggle with immortality. There are at least three major areas of reason why all conscientious legislators ought to hesitate before they leap onto the bandwagon of approving $125,000,000 of taxpayer money to fund embryonic stem cell research, i.e. moral compromise, scientific productivity and non-destructive alternatives, and fiscal irresponsibility. Ask yourself the question, "When is the cure for my disease more important than your life or your individual human identity?" Responsible human beings have recognized from the beginning of medicine that there need to be limits to what some are willing to do to others in the name of research. Hippocrates, the Greek philosopher and father of medicine, taught the first medical ethic, "First, do no harm", in his Hippocratic Oath. The unique identity of an individual human being is the first casualty to this research as it is currently done. The destruction of an embryo is not necessary to derive the greatest portion of research benefits in two ways. First, patients with 58 different medical conditions
pile-cc
Collect the terms in 1 - 63*t**2 + 121*t**2 + 0*t**2 - 3*t**2. 55*t**2 + 1 Collect the terms in 53 + 2289*z**3 - 62 + 1696*z**3. 3985*z**3 - 9 Collect the terms in -220*h**3 + 15*h**3 + 202*h**3. -3*h**3 Collect the terms in -832 - y**2 + 17*y**3 + 832. 17*y**3 - y**2 Collect the terms in 10*t**2 + 3*t**2 - 8*t + 11*t**2. 24*t**2 - 8*t Collect the terms in -15*o**3 + 294 + 316 - 610. -15*o**3 Collect the terms in -323*b**3 + 72*b**3 - 76*b**3. -327*b**3 Collect the terms in -412*r**3 + 601*r**3 + 519*r**3 + 360*r**3. 1068*r**3 Collect the terms in 53*a**2 - 541*a**2 - 41*a**2. -529*a**2 Collect the terms in -94*l + 182*l + 4*l**2 + 0*l**2 - 88*l. 4*l**2 Collect the terms in -70*g - 19*g**3 - 141*g**3 + 70*g. -160*g**3 Collect the terms in -86*v**2 - 81*v**2 - 3162 - 80*v**2 + 245*v**2. -2*v**2 - 3162 Collect the terms in -12946*u - 12997*u + 25945*u. 2*u Collect the terms in -2*m - m + 19187*m**2 + 3*m. 19187*m**2 Collect the terms in 10*d + 6*d + 21 - 15 - 13. 16*d - 7 Collect the terms in 36 + 36 - 12*k - 83 + 12. -12*k + 1 Collect the terms
dm_mathematics
Sara Shackleton 10/27/2000 09:53 AM To: Tanya Rohauer/HOU/ECT@ECT cc: Subject: Lehman/ENE master Spoke with Paul Rosica and left vm for Richard Weiss to discuss ENE draft which we will email this morning. Paul indicated that Lehman would compromise the cross D/F threshold at US$70 Million and would like the Termination Event
enron_emails
Court of Appeals of Texas, Austin. January 9, 1985. Rehearing Denied January 30, 1985. *883 Nell Hahn, Daves, McCabe & Hahn, Austin, for appellant. Gaynor Kendall, Kendall, Randle, Finch & Osborn, Austin, for appellee. Before SHANNON, C.J., and EARL W. SMITH and BRADY, JJ. SHANNON, Chief Justice. William E. Gibson appeals from the judgment of the district court of Travis County affirming an order of the Board of Trustees of the Texas Municipal Retirement System. The Board's order denied Gibson's application for a supplemental disability benefit. This Court will reverse the judgment of the district court. At all times material, Gibson was an employee of the Fire Department of the City of Waco, a participating municipality of the Texas Municipal Retirement System. Gibson became a member of the Retirement System in 1962 and remained so until 1982 when he terminated his employment with the City of Waco. Gibson has suffered from cardiomyopathy, a heart disease, at least from 1978. Cardiomyopathy is progressive and irreversible, and the only known treatment is rest and controlled activity. Gibson asserts primarily that in the performance of his duties as a fireman on or about April 22, 1980, he aggravated his heart condition. More specifically, Gibson claims that on April 22, 1980, while assisting in the repair of a broken garage door at the fire station, he spent fifteen to twenty minutes with his arms extended over his head putting tension on a heavy spring. Immediately afterward he experienced chest pains in increasing intensity. Referring to that incident, Gibson's physician, William N. Roddy, testified that "I can tell you the day that I saw him in April of 1980, after what had happened to him, it had done him harm that day. His activities of that day had damaged him. I think led him to where he is now." Other medical evidence established that because of his heart condition, Gibson was unable to engage in gainful employment. In 1981 Gibson filed with the Retirement System an application for (1) a standard disability retirement and for (2) a supplemental disability benefit. The application for the standard disability retirement was grounded upon his claim that he was incapable of engaging in gainful employment because of the heart condition. Public Retirement Systems, Title 110B, §§ 64.303 and 64.306 (1983). Gibson's application
freelaw
~~~ tareqak I don't think it's simply a binary occupied vs. unoccupied. If you are overworked (too occupied), then there are one set of potential problems (e.g. negative impacts on physical and mental health). If you are unemployed (too unoccupied), then your economic opportunities might be limited. Scaling either situation across many, many human beings results in negative social consequences of one form or another. ------ chaimedes I totally agree with this article, except: _" That’s what tax preparers are – they use the exact same software that anyone can use at home, but they allow you to talk to a human instead of learning the software"_ IMHO this is one of those edge cases where software might simplify the process 99 times out of 100, but a skilled/experienced human may help avoid uncommon but costly mistakes. There is enough nuance and vagueness in taxes that it pays to have a human look over your numbers -- even if they use software to do it. ~~~ toyg Taxes cannot be completely automated because they are laws. Laws are expressed in language, and language is not exact - _even our own understanding of such language will change through the years_ , as any constitutional scholar can attest. ------ ajeet_dhaliwal The lady with the iPad situation sort of happened to me at McDonalds yesterday. I ordered from their touch screen. Their system told me to come up to collect my food but when I got there the person working asked me if I was different order number, i said no and she told me to stand away, I told her the system has told me to come up and I had not even finished speaking before her colleague handed me my order. ------ js8 From the comments: "Mcdonalds around the world with those touchscreen ordering kiosks as well as live staff – the live staff are just essentially operating the touchscreen for you behind the counter." They are not. I always use live staff because I cannot order no ice in the drink from the touchscreen. ~~~ jessaustin Every McD's I've seen in the last decade has forced the customer to pour her own drink? The one closest to me right now just
hackernews
This subproject is one of many research subprojects utilizing the resources provided by a Center grant funded by NIH/NCRR. The subproject and investigator (PI) may have received primary funding from another NIH source, and thus could be represented in other CRISP entries. The institution listed is for the Center, which is not necessarily the institution for the investigator. This renewal proposal builds upon current success in BIRNs utilization of TeraGrid, continues to advance the use of TeraGrid with
nih_exporter
Comparative genomic hybridization analysis of clear cell sarcoma of the kidney. Clear cell sarcoma of the kidney (CCSK) is a rare malignant pediatric tumor, distinguished from the Wilms tumor by its characteristic histologic features and a more aggressive clinical behavior with a tendency to metastasize to bone. Genetic studies on CCSK are limited and no consistent findings have been reported. We examined four cases of CCSK for presence of consistent genetic alterations using comparative genomic hybridization (CGH). This is the first
pubmed_abstracts
Anyone who has endured the pain of being unreasonably overlooked for promotion, reacted angrily in response to a below-market value offer for their house, or felt slighted by an unduly small pay raise will acknowledge that humans are highly attuned to violations in fairness. Particularly in the financial domain, we are often forced to weigh up the demands of maintaining social equity versus economic self-interest, and how we respond to such dilemmas can have marked economic, social, and personal consequences. It is therefore important to understand the psychological mechanisms that underpin how we respond to perceived unfairness. The ultimatum game (UG) neatly models the balancing act between financial self-interest and social equity (see Guth, Schmittberger, & Schwarze, [@CR28]). On each trial, a proposer makes a once-only offer of how to divide a sum of money, and the responder either rejects or accepts the proposed division. If the offer is rejected, neither player receives any money. If the offer is accepted, the proposal is implemented. Since it is a one-off offer with no impact on reputation, the "rational" responder behavior is to accept all offers, no matter how unfair. After all, some money is better than no money. However, a proportion of unfair offers are reliably rejected, despite the fact this entails a financial loss for the responder (see, e.g., Sanfey Rilling, Aronson, Nystrom, & Cohen, [@CR46]). One proposed explanation of this rejection behavior is a failure of emotion regulation. Emotional experience in the face of unfairness (e.g., an increase in anger, disgust, surprise, or a general sense of arousal) is believed to override the economically "rational" response of accepting whatever is offered.[1](#Fn1){ref-type="fn"} This perspective mirrors a range of work examining the causes and consequences of impaired emotion regulation (Gross, [@CR26]; for a review, see Gross, [@CR27]) and is supported by an array of data on the UG. Inducing a negative mood increases rejection rates (Harle & Sanfey, [@CR29]). Increased activity in the right anterior insula---a brain area implicated in emotion processing and experience---predicts greater rejection rates (Sanfey et al., [@CR46]). When accepting unfair offers, greater activation is seen in ventrolateral prefrontal cortex---a region associated with emotion regulation capability (Tabibnia
pubmed_central
App 2029 stdout: App 2029 stderr: sh: 1: App 2029 stderr: env: not found App 2029 stderr: App 2029 stdout: [ 2014-11-12 16:12:26.1580 1979/7feff83f9700 Pool2/Implementation.cpp:287 ]: Could not spawn process for application /home/ubuntu/apps/doger: An error occured while starting up the preloader. Error ID: b7381860 Error details saved to: /tmp/passenger-error-SUjzpL.html Message from application: Could not find a JavaScript runtime. See https://github.com/sstephenson/execjs for a list of available runtimes. (ExecJS::RuntimeUnavailable) /var/lib/gems/1.9.1/gems/execjs-2.2.2/lib/execjs/runtimes.rb:51:in autodetect' /var/lib/gems/1.9.1/gems/execjs-2.2.2/lib/execjs.rb:5:in ' /var/lib/gems/1.9.1/gems/execjs-2.2.2/lib/execjs.rb:4:in <top (required)>' /var/lib/gems/1.9.1/gems/uglifier-2.5.3/lib/uglifier.rb:3:inrequire' /var/lib/gems/1.9.1/gems/uglifier-2.5.3/lib/uglifier.rb:3:in <top (required)>' /var/lib/gems/1.9.1/gems/bundler-1.7.6/lib/bundler/runtime.rb:76:in require' /var/lib/gems/1.9.1/gems/bundler-1.7.6/lib/bundler/runtime.rb:76:in block (2 levels) in require' /var/lib/gems/1.9.1/
stackexchange
Engines have utilized windage trays positioned in crankcases to modify flow dynamics in the crankcase. The use of windage trays is particularly prevalent in high performance engines, due to the propensity of high performance engines to be operated at high speeds for extended periods. However, the necessity of the windage tray varies based on engine operating conditions. During lower engine speeds the turbulence in the crankcase may not cause the oil aeration issues that are so prevalent at the high engine speeds. However, as the engine speed increases, the momentum of the crankcase flowfield and oil leakage via component bearings, perturb and impinge with high velocity on the free surface of the oil within the oil reservoir. Aeration is an inherent consequence of the oil interacting with the highly turbulent flowfield within the crankcase. A more quiescent oil free surface is one of the design goals of previous windage trays. However, during lower engine speeds oil aeration considerably decreases and may not pose a significant problem. Therefore, during lower engine speeds flow interruption created by the windage tray may not be needed. Furthermore, during low engine speeds the windage tray may interfere with oil draining. For instance, oil may impinge on surfaces of windage trays, thereby interfering with oil draining operation. Specifically, the amount and/or speed of oil returning to the oil pan may be reduced due to windage tray interference. Furthermore, some windage trays may also create losses in crankcase ventilation systems. U.S. Pat. No. 6,019,071 discloses a windage tray with an oil flow path provided in the windage tray with integrated oil squirters directing oil towards the undersides of the engine pistons. However, the windage tray discloses in U.S. Pat. No. 6,019,071 suffers from the abovementioned problems of slow oil draining and crankcase ventilation losses. Recognizing the problems described above and in an attempt to address at least some of the problems the inventors developed a method for operating an engine system. The method includes operating an engine to perform combustion, determining an engine speed and adjusting a flow profile of a plurality of deflectors in a windage tray positioned in a crankcase based on the engine speed. In this way, the flow profile of the windage tray may be dynamically adjusted to alter flow characteristics in the crankcase over a wide range of engine speeds. Consequently, the functionality of the windage tray can be varied to suit engine operating conditions, enabling the windage tray to reduce oil
uspto_backgrounds
Elizabeth White (born 5 November 1979) is an English actress, known for her roles as Annie Cartwright in the BBC series Life on Mars and Emma Keane in the Channel 4 drama series Ackley Bridge. Television and theatre White's other prominent TV roles were in Season One of the ITV show The Fixer, playing Jess Mercer, the sister of John Mercer. She also played Shannon in The Empresses' New Clothes, an episode of Fairy Tales, which were the BBC's modern takes on classic children's stories. In April 2011, she appeared in the BBC adaptation The Crimson Petal and the White. She featured in the music video for Bush's final single "Inflatable", and starred in the Hammer Films 2012 adaptation of The Woman in Black as the eponymous woman. In July 2014, White starred as Melissa in episodes 1 and 2 of the original audio drama 'Osiris' by Everybodyelse Productions, and in 2014 as Lizzie Mottershead in BBC One's Our Zoo, a drama series about the man who created Chester Zoo and the impact it had on his family. On stage she starred in the lead role of Heavenly Critchfield in Tennessee Williams' Spring Storm at the former Cottesloe Theatre at the National Theatre in London in 2010, transferred from The Royal & Derngate Northampton production where it premiered in 2009. In 2011, she appeared in A Woman Killed with Kindness by Thomas Heywood at the Lyttelton at the National Theatre in 2011, where she appeared in 2013 again in a double role in Simon Stephens' new play Port. In October 2014, she appeared as Chrysothemis in Electra by Sophocles opposite Kristin Scott Thomas at the Old Vic Theatre in London, which also starred Peter Wight who played her father-in-law in the BBC series Our Zoo. In 2017, it was announced that White would appear in a revival of Jim Cartwright's play Road at the Royal Court TheatreLiz also provides the voice over for the bbc programme garden rescue. Filmography References External links Liz White at bbc.co.uk's official Life on Mars website, with an interview and career overview. Category:1979 births Category:English television actresses Category:English film actresses Category:Living people Category:People from Rotherham Category:Actresses from Yorkshire Category:Alumni of the Liverpool
wikipedia_en
\[proposition-difference-galois-correspondence\] Let $\mathcal{K}$ be a difference field of characteristic $0$ with bijective endomorphisn and algebraically closed constant field $k$, and let $\mathcal{M}$ be an étale difference module over $\mathcal{K}$. Denote by $T(\mathcal{P})$ the total Picard-Vessiot ring of $\mathcal{M}$ over $\mathcal{K}$ and by $G$ the Galois group scheme. The maps $H \mapsto T(\mathcal{P})^H$ and $\mathcal{L} \mapsto \operatorname{Aut}(T(\mathcal{P}){\mid}\mathcal{L})$ define an order-reversing bijection between the set of closed subgroups of $G(k)$ and those intermediate difference rings of $\operatorname{Aut}(T(\mathcal{P}){\mid}\mathcal{K})$ where every non-zerodivisor is a unit. Note that since $k$ is assumed to be algebraically closed of characteristic 0, one can work here with closed subgroups of $G(k)$ as in classical differential Galois theory. Having this correspondence at our disposal, the same argument that proved Theorem \[idobs\] also gives: \[solution-rings-difference-case\] Let $\mathcal{L}$ be an intermediate difference ring of $T(\mathcal{P}){\mid}\mathcal{K}$ in which every non-zerodivisor is a unit. The ring $\mathcal{L}$ is a total solution ring for $\langle \mathcal{M} \rangle_{\otimes}$ if and only if the corresponding subgroup $H$ is an observable subgroup of the Galois group $G(k)$. Finally, we discuss an application to transcendence theory pointed out to us by Yves André. In ([@MR3215927], Corollary 1.7.1) he explains how his results on solution algebras for differential modules imply a theorem of Beukers [@beukers] concerning the specialization of algebraic relations between E-functions. The theory of solution algebras for difference equations sketched above implies the analogous results of Adamczewski–Faverjon [@adamczewski] and Philippon [@philippon] for Mahler functions. Recall that a $q$–Mahler system for an integer $q\geq 2$ is a system of functional equations $$\label{mahler} \left(\begin{matrix} f
arxiv
/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package javax.crypto.spec; import java.math.BigInteger; import java.security.spec.AlgorithmParameterSpec; /** * The algorithm parameter specification for the Diffie-Hellman algorithm. */ public class DHParameterSpec implements AlgorithmParameterSpec { private final BigInteger p; private final BigInteger g; private final int l; /** * Creates a new <code>DHParameterSpec</code> instance with the specified * <i>prime modulus</i> and <i>base generator</i>. * * @param p * the prime modulus. * @param g * the base generator. */ public DHParameterSpec(BigInteger p, BigInteger g) { this.p = p; this.g = g; this.l = 0; } /** * Creates a new <code>DHParameterSpec</code> instance with the specified * <i>prime modulus</i>, <i>base generator</i> and size (in bits) of the * <i>random exponent</i>. * * @param p * the prime modulus. * @param g * the base generator. * @param l * the size of the random exponent (in bits).
github
So far so good, right!?. Now we need to go one step forward. My project has a console app and a unit test project and I need to build both prior to run the unit test project. To achieve this I will have to piggyback on MsBuild. Here is the structure of my project: Now I need to build the projects CountingWordsConsole and MapReduce.Tests together prior to the running of the tests. Here is my msbuild file to build my solution: And here is the configuration in TeamCity: I got rid of the previous build step for Visual Studio and this time I'm creating an MsBuild step that will target all my project files. You will also notice that in the MsBuild file there is a shared argument between TeamCity and MsBuild called ReleaseFolder. This property is set up in TeamCity with the folder location of where my projects will be built. This will help us later as to identify where are our binaries and how we pick those up from TeamCity as artifacts. Notice that in the MsBuild file the notation of this property is via $(ReleaseFolder) whereas in TeamCity is %system.ReleaseFolder%. Now that we have the project up and running via MsBuild, it's time to set up NUnit and dotCover. Setting up NUnit and dotCover1. Get the latest NUnit. You can get the latest NUnit 3.2.1 from here. Download the .msi file and install the typical installation. This will leave the files in the following folder: C:\Program Files (x86)\NUnit.org\nunit-console\ Add a new build step in TeamCity and configure it to run it for NUnit 3.x. As soon as you run the project you will get the following error: This version of NUnit 3 is not a release version and is not compatible with TeamCity. Please update NUnit to a newer release version. I even tried with NUnit 3.0 RC and NUnit 3.0 but the error never went away. How to fix this? via command line. To make things a bit more exciting, I will configure directly dotCover as this one will run NUnit by default. dotCover comes automatically by default with TeamCity: ("C:\TeamCity\buildAgent\tools\dotCover") and you only need to configure your project
pile-cc
2, n, h Let u(v) = v**3 + 4*v**2 + v. Let q be u(-4). Let d = -27 - -14. Let h = d - -18. Put q, h, -2 in decreasing order. h, -2, q Let f = -232/3 - -78. Let k = 8 - 11. Sort 2, f, k in decreasing order. 2, f, k Let j = 7 - -1. Let z = 7.5 - j. Put z, 0, 0.4 in ascending order. z, 0, 0.4 Let n = 45 + -44.9. Sort -1/5, 2, -1/4, n in increasing order. -1/4, -1/5, n, 2 Let r = -2 - -1.92. Let q = 16.6 - 20.68. Let a = r - q. Put -0.2, a, -5 in ascending order. -5, -0.2, a Let v be 2 + -1 + (-5)/3. Let i = -34 - -47. Let s = i - 13. Sort v, s, -2 in decreasing order. s, v, -2 Let c = 177 + -1243/7. Sort c, -2/5, -2 in increasing order. -2, c, -2/5 Suppose 3*z = 84 - 714. Let j = 833/4 + z. Let p = -2 - j. Sort p, -2, -5 in descending order. p, -2, -5 Let z be -2 - (-2 - (-3 - -2)). Put z, -4, 3 in descending order. 3, z, -4 Let u = -307765/84 + 14605/4. Let y = -37/3 - u. Sort -4, y, 2. -4, y, 2 Let r = 24 + -24. Sort -1/8, r, 2, 1/4. -1/8, r, 1/4, 2 Let l = 0.8 - 0. Let d = 1 - l. Let a = 9 - 8.5. Sort d, 1, a
dm_mathematics
Thanks, Kim. -----Original Message----- From: Robertson, Audrey Sent: Thursday, October 25, 2001 2:15 PM To: Harris, Steven; Watson, Kimberly; Stage, Michael G.; Herber, Stephen; Burleson, Bob; Donoho, Lindy Cc: Wehring, Linda; Robertson, Audrey Subject: RE: TW/NNG Projects Because of scheduling
enron_emails
23 In sum: longstanding, bedrock summary judgment principles--from the days when summary judgment was a relatively disfavored judicial device, and continuing through the Supreme Court's 1986 "trilogy" of summary judgment cases liberalizing the utilization of the device2--are to the effect that fact questions are considered with deference to the nonmovant, inferences to be drawn from the underlying facts must be viewed in the light most favorable to the party opposing the motion, and, in general, genuine issues of material fact are to be left for reasonable resolution by the fact-finder. Under any principled summary judgment analysis, the record in this case demonstrates the existence of genuine issues of material fact as to Roche's negligence in conducting a urinalysis for drug use on Willis's urine sample which resulted in a "false positive." The question is not whether we (or the district court) think(s) Plaintiff will or will not prevail at trial. The question is whether there exist genuine, material fact issues for resolution by the trier of fact. And whether Roche fulfilled its duty of reasonable care when it tested Willis's urine for methamphetamine use is a genuine, material, disputed fact issue on the record before us. Drawing all reasonable inferences in favor of Summary Judgment Nonmovant Willis, as we must, we conclude that the record in this case contains evidence from which a jury could reasonably conclude that Roche was negligent in the manner in which it administered the generally reliable GC/MS drug testing technology relative to Willis's urine sample, and that such negligent application of this test technology proximately caused injury to Willis. Accordingly, we hold that the district court erred in concluding that there was no genuine issue of material fact for fact-finder resolution as to whether Roche fulfilled its duty to Willis. 24 C. REGARDING WILLIS'S NEGLIGENCE DAMAGES; OR, DID WILLIS FAIL TO PLEAD A VIABLE THEORY OF RECOVERY? 25 Appellee Roche has also argued on appeal that affirmance of the district court's entry of summary judgment is necessary because Willis failed to even plead a viable cause of action under Texas law. Roche relies on the Texas Supreme Court's recent opinion in Boyles v. Kerr, 855 S.W.2d 593 (Tex.1993), for the proposition that Texas does not recognize a cause of action for negligent infliction of emotional distress.3 26 While it is true that the Texas Supreme Court holds in Boyles that
freelaw
Javascript was used beyond it's own merits as a language. It was the only feasible door to pluguinless development in the web. WebAssembly will allow people to choose. And even that a lot of developer will still have Javascript as a first option, others will not, and the web development environment is going to deeply change. ~~~ ix-hispana If javascript goes the ecosystem goes too. In real applications we need to use social login, share, google maps, shopify buy SDK, S3, Azure speech API and so on. The javascript tools to access all of that are plain old ES5 at best. How will we use them from another language? Libraries, too. Are we going to find ourselves writing our own custom dropdowns and datepickers in C++? Not to mention our own view update and state management libraries. This is the reason there are next to none real world examples of web apps made in Elm. No communication with planet Earth. ~~~ kartan > Libraries, too. Are we going to find ourselves writing our own custom > dropdowns and datepickers in C++? You are talking about C++. If a library exists, already exists an implementation for it in C++. Comparing Elm with C++ doesn't makes so much sense. [https://en.wikipedia.org/wiki/List_of_platform- independent_G...](https://en.wikipedia.org/wiki/List_of_platform- independent_GUI_libraries#C_.2F_C.2B.2B_packages) ------ chopchopchop I don't understand why the author sounds so excited about the premise of his article. Nor do I understand the fervor, in general, surrounding transpliers and the constantly-expanding JS toolchain. It seems people are too busy fawning over the latest JavaScript-adjacent tool to remember that the sole benefit of using said tools is basically to support browsers that don't yet support ES6. Yes, in doing so you are able to implement bleeding edge features that you couldn't otherwise, but this will not be the case once ES6 is fully adopted. Until then they are merely a necessity. ES6 is JavaScript in its actualized form, and
hackernews
Previous studies with the ethanol preferring (P and HAD) and ethanol nonpreferring (NP and LAD) rats have been concerned primarily with contrasting the lines for ethanol self-administration and for the behavioral consequences of ethanol exposure. The intent of the proposed series of experiments is a more general behavioral characterization of the P and NP lines of rats. When significant differences are determined, the experiments will be replicated with the corresponding HAD and LAD lines of rats. The overall goal of this proposal is a better
nih_exporter
L.I.F.E. and D.E.A.T.H. In this short, rhetorical article, I offer a thought experiment that seeks to make an analogy between 'life' and 'disease'. This article was written whilst under the influence of Nietzsche, and I hope that readers will not mistake the polemical style and the occasional nod towards humour for flippancy. This is a serious subject, and this article attempts to ask, inexplicitly,
pubmed_abstracts
Sialadenosis is a rare disease entity showing diffuse, non-inflammatory, non-neoplastic enlargement of the major salivary glands. Although elucidation of the detailed etiology and pathogenesis of sialadenosis is dependent on further research, it is thought that a loss and thinning of the myofilament component of the myoepithelial cells leads to a loss of mechanical support for the acini of the salivary gland ([@B2]). This alteration at the micro-histological level allows acinar cells to expand as secretary granules accumulate in the cells, which leads to the gross change of diffuse enlargement of the salivary gland. The functionally deficient myoepithelial cells in sialadenosis may result from an autonomic neuropathy secondary to severe and long-standing metabolic or hormonal disorders such as diabetes mellitus, alcoholism (particularly with liver disease), liver cirrhosis, chronic malnutrition, and medications ([@B1]-[@B4]). Almost all cases with sialadenosis have been reported in adult patients. This exceeding rarity in children may be related to underlying diseases common in adults and also due to the probable long latent period required for the development of this condition. In our case, longstanding medications and nutritional problems may be related to the development of sialadenosis but leukemia itself has not been reported to be associated with its development. In fact, chemotherapeutic agents, such as thiouracil and valproic acid, are known to be associated with the development of sialadenosis ([@B1]). In contrast, the association between steroid treatment and the development of sialadenosis has not yet been elucidated. For the diagnosis of sialadenosis, other disease presenting with persistent bilateral parotid swellings, including infection, autoimmune disease, granulomatous disease, kimura disease, polycystic parotid disease, iatrogenic causes, and neoplastic disease, should be excluded ([@B1], [@B5], [@B6]). Salivary glands may be rarely involved by leukemia/lymphoma and may often manifest as a painless, progressive swelling. The involvement with leukemia/lymphoma is usually associated with autoimmune disease such as Sjögren syndrome or rheumatoid arthritis ([@B6]). Although imaging findings are not pathognomonic, single or multiple salivary gland lesions with increased blood flow and sometimes with microcysts may be revealed on US, CT, or MRI ([@B4]). For the imaging evaluation of the salivary glands, various imaging modalities including sialography, scintigraphy, US, CT, and MRI may be used. When the clinical
pubmed_central
$('a.less', minimized_elements).click(function(event){ event.preventDefault(); $(this).parent().hide().prev().show().prev().show(); }); }); Problem i am facing now: Ten little monkeys jumping on the bed . . . and tripping over teddy bears, slipping on banana peels, and falling off the dock! Those naughty monkeys sure love to monkey around! But just WHO is causing all this monkey business? Try fi... More Actually i entered the paragraph as like this, Ten little monkeys jumping on the bed . . . and tripping over teddy bears, slipping on banana peels, and falling off the dock!Those naughty monkeys sure love to monkey around! But just WHO is causing all this monkey business? Try finding the naughtiest monkey in every scene--and watch as she gets her comeuppance at the end! A classic monkey rhyme with delicious illustrations, this is sure to be a favorite on every little monkey's bookshelf. I need the output like this, Ten little monkeys jumping on the bed . . . and tripping over teddy bears, slipping on banana peels, and falling off the dock!Those naughty monkeys sure love to monkey around! But just WHO is causing all this monkey business? Try f...More Script is slicing and showing the text correctly.Since i am using this script to slice the text by 250 character and placing a more and less option,if any sentence entered in paragraph,now it is not shown as paragraph.Instead of displaying as paragraph,it is showing continuously with out any indentation. I need to show the text in paragraph,if user entered as paragraph even with more or less option using my script. I think their is a problem in script,not able to find it,need help to solve this. A: The problem is that you are using .text() to read the string you want to work with. Since .text() only delivers the plain text without any markup, you are losing the <br> elements that nl2br generates. The first, most obvious solution would be: Why aren't you splitting the text up server-side instead of using JavaScript? That way you could apply nl2br separately to both parts of
stackexchange
As known in the art, a step-and repeat tool (not shown) is used in conjunction with a step-and repeat movement and exposure procedure for forming successive images on the photoresist layer 101. For this procedure, the workpiece 120 is subdivided into chip ("die") regions. Each such chip region typically is defined and encompassed by one resulting step-and-repeat position of the workpiece 120 (overlain by the photoresist layer 101). Each corresponding (i.e., overlying) chip region of the photoresist layer 101 is exposed in succession to the optical beam in the system 100. This exposure can be of the kind that exposes an entire chip region all at once to the incident optical beam (which has a sufficient cross section to encompass an entire chip region) or that scans the chip region with the incident optical beam (which does not have a sufficient cross section to encompass an entire chip region). In order to align the mask 103 to the step-and-repeat tool (hereinafter, "stepper tool") for the step-and-repeat procedure, mask-to-stepper tool alignment marks (hereinafter "reticle alignment marks") are located on the mask 103 outside the primary feature region. Advantageously these reticle alignment marks (not shown in FIG. 1) comprise opaque areas. It is essential that these reticle alignment marks have edges that are self-aligned with respect to the edges of the primary feature region's attenuating areas. That is to say, it is essential that these reticle alignment marks and the attenuating areas of the primary feature region are formed during the same lithographic processing steps in which a single patterned resist layer defines both the edges of the reticle alignment marks and the edges of the attenuating areas of the primary feature region. As further known in the art, in order to limit the optical radiation incident on the photoresist layer 101 to one chip region at a time, the stepper tool contains an opaquing shutter (hereinafter, "shutter blade"). In order to compensate for unavoidable positioning errors associated with locating this shutter blade, an opaque ring (not shown) is located on the mask itself. This opaque ring encircles the primary feature region. Advantageously, this opaque ring has an inside edge that is self-aligned with respect to, and borders the primary feature region. In order to minimize the distance between chip regions (as defined by the step-and-repeat procedure), and hence to avoid wasting precious primary feature area on the workpiece 120, the inside
uspto_backgrounds
Natasha Delia Letitia Gordon (born 1976) is an award-winning British playwright of Jamaican heritage. In 2018, having previously been an actor, she became the first black British female playwright to have a play staged in the West End. Life Natasha Gordon was born in North London in 1976, to parents who were both migrants from Jamaica. Her grandparents had arrived in London from Jamaica by boat as part of the so-called Windrush generation in the late 1950s. Her mother joined them in 1963, finding work, a Jamaican-born husband and a reassuringly familiar West Indian community there. Gordon's debut play Nine Night premiered at London's National Theatre in April 2018 to critical acclaim transferring seven months later to London's Trafalgar Studios on 1 December. The transfer marks a pivotal moment in history as Gordon will become the first black British female playwright to have a play in the West End. In a Guardian newspaper profile on her, Gordon explains that the "nine night" ritual of gathering to eat, drink and swap stories helped her to connect with her family’s past and inspired her first play. She also cites the recent deportation threats experienced by many of the Windrush generation as fuel for her to learn more about the difficulties her grandparents faced. The play resulted in Gordon winning the London Evening Standard Theatre Awards Charles Wintour Award for Most Promising Playwright in 2018. As an actor, her stage credits include Red Velvet (Tricycle Theatre), The Low Road and Clubland (Royal Court Theatre), Mules (Young Vic) and As You Like It (Royal Shakespeare Company). Her film and TV credits include Dough, Line of Duty, Class and Danny and the Human Zoo. Gordon was appointed Member of the Order of the British Empire (MBE) in the 2020 New Year Honours for services to drama. Career Acting Theatre Red Velvet by Lolita Chakrabarti (2012), The Tricycle Speechless by Linda Brogan & Polly Teale (2010) Sherman Cymru The Exception and the Rule by Bertolt Brecht (2004), Young Vic As You Like It by William Shakespeare (2003), Royal Shakespeare Company Inside Out by Tanika Gupta, (2002) Arcola Theatre Skin Deep, (2002) Warehouse Theatre, Croydon Aladdin (2002) Lyric Theatre
wikipedia_en
A. Sobiczewski and K. Pomorski, Prog. Part. Nucl. Phys. [**58**]{}, 292 (2007). A. Staszczak [*et al.*]{}, Phys. Rev. [**C80**]{}, 014309 (2009). M. Warda [*et al.*]{}, Phys. Rev. [**C66**]{}, 014310 (2002). S. Karatzikos [*et al.*]{}, Phys. Lett. [**B689**]{}, 72 (2010). M. Bender, K. Rutz, P.-G. Reinhard, J. A. Maruhn, and W. Greiner, Phys. Rev. [**C58**]{}, 2126 (1998). T. B[ü]{}rvenich [*et al.*]{}, Phys. Rev. [**C69**]{}, 014307 (2004). H. Abusara, A. V. Afanasjev, and P. Ring, Phys. Rev. [**C82**]{}, 044303 (2010). G. A. Lalazissis [*et al.*]{}, Phys. Lett. [**B671**]{}, 36 (2009). M. Samyn, S. Goriely, and J. M. Pearson, Phys. Rev. [**C72**]{}, 044316 (2005). P. Ring and P. Schuck, [*The Nuclear Many-Body Problem*]{} (Springer-Verlag, Berlin, 1980). A. Valor, P.-H. Heenen, and P. Bonche, Nucl. Phys. [**A671**]{}, 145 (2000). R. Rodr[í]{}guez-Guzm[á]{}n, J. L. Egido, and L. M. Robledo, Nucl. Phys. [ **A709**]{}, 201 (2002). T. Nikšić, D. Vretenar, and P. Ring, Phys. Rev. [**C73**]{}, 034308 (2006). T. Nikšić, D. Vretenar, and P. Ring, Phys. Rev. [**C74**]{}, 064309 (2006). M. Bender and P.-H. Heenen, Phys. Rev. [**C78**]{}, 024309 (2008). T. R. Rodriguez and J. L. Egido, Phys. Rev
arxiv
$count = 0; foreach ($result as $row) { // Calculate the changed timestamp for this node. $changed = _tracker_calculate_changed($row->nid); // Remove existing data for this node. db_delete('tracker_node') ->condition('nid', $row->nid) ->execute(); db_delete('tracker_user') ->condition('nid', $row->nid) ->execute(); // Insert the node-level data. db_insert('tracker_node') ->fields(array( 'nid' => $row->nid, 'published' => $row->status, 'changed' => $changed, )) ->execute(); // Insert the user-level data for the node's author. db_insert('tracker_user') ->fields(array( 'nid' => $row->nid, 'published' => $row->status, 'changed' => $changed, 'uid' => $row->uid, )) ->execute(); $query = db_select('comment', 'c', array('target' => 'slave')); // Force PostgreSQL to do an implicit cast by adding 0. $query->addExpression('0 + :changed', 'changed', array(':changed' => $changed)); $query->addField('c', 'status', 'published'); $query ->distinct() ->fields('c', array('uid', 'nid')) ->condition('c.nid', $row->nid) ->condition('c.uid', $row->uid, '<>') ->condition('c.status', COMMENT_PUBLISHED); // Insert the user-level data for the commenters (except if a commenter // is the node's author). db_insert('tracker_user') ->from($query) ->execute(); // Note that we have indexed at least one node. $last_nid = $row->nid; $count++; } if ($
github
In information technology, big data is a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications. The challenges include capture, curation, storage,search, sharing, analysis, and visualization. The trend to larger data sets is due to the additional information derivable from analysis of a single large set of related data, as compared to separate smaller sets with the same total amount of data, allowing correlations to be found to "spot business trends, determine quality of research, prevent diseases, link legal citations, combat crime, and determine real-time roadway traffic conditions. Big data is difficult to work with using relational databases and desktop statistics and visualization packages, requiring instead "massively parallel software running on tens, hundreds, or even thousands of servers". What is considered "big data" varies depending on the capabilities of the organization managing the set, and on the capabilities of the applications that are traditionally used to process and analyze the data set in its domain. "For some organizations, facing hundreds of gigabytes of data for the first time may trigger a need to reconsider data management options. For others, it may take tens or hundreds of terabytes before data size becomes a significant consideration. What is Big Data in Definition Big data usually includes data sets with sizes beyond the ability of commonly-used software tools to capture, curate, manage, and process the data within a tolerable elapsed time. Big data sizes are a constantly moving target, as of 2012 ranging from a few dozen terabytes to many petabytes of data in a single data set. With this difficulty, a new platform of "big data" tools has arisen to handle sensemaking over large quantities of data, as in the Apache "Hadoop" Big Data Platform. Some but not all MPP relational databases have the ability to store and manage petabytes of data. Implicit is the ability to load, monitor, back up, and optimize the use of the large data tables in the RDBMS. The practitioners of big data analytics processes are generally hostile to slower shared storage[citation needed], preferring direct-attached storage (DAS) in its various forms from solid state disk (SSD) to high capacity SATA disk buried inside parallel processing nodes. The perception of shared storage architectures—SAN and NAS—is that they are relatively slow, complex, and expensive. These qualities are not consistent with big data analytics systems that
pile-cc
280/30*9/7 12 16 + (-5)/(600/1944) -1/5 (-2548)/(-5733) - (-158)/9 18 What is the value of -7 + (-8)/2*(-9)/2? 11 (6 - -2) + -12 + 0 -4 What is (-95)/15*(-6)/(9/27*6)? 19 Calculate (736/805 - (324/30)/9)*-105. 30 Calculate 140/(-22) + (-224)/(-616). -6 (-14 - 4 - 7)*3*(-4)/30 10 What is the value of 14/(-22) + -48*24/(-12672)? -6/11 What is the value of -23*(-29)/(-377)*13? -23 Calculate 15/(-33) + 87156/3564. 24 Calculate 10 - 1*-1*3*(-31 - -32). 13 -19 - ((-9432)/(-168))/(-3) -2/7 What is the value of 0/(-2) + 2/(-23) + (-6435)/80730? -1/6 Evaluate ((-8690)/1815 + 3 + (-39)/11)*1. -16/3 Evaluate -1 + (-8)/(-24) - 3/((-18)/3). -1/6 What is 5/(-110)*53*18/(-9) - 5? -2/11 What is (-42)/1050*(10/15)/(1/3)? -2/25 What is (-5)/20 + (42/(-28))/((-30)/25)? 1 What is -4 - ((1194/50)/(-3) - (-127 + 123))? -1/25 Evaluate 2*(-9)/(-33) + 448/(-1386). 2/9 Calculate 575/3000 - 3/45. 1/8 585/(-450) + 1/1 -3/10 Calculate 14/(-6) - (1290/90 - 11). -17/3 What is ((-209)/55)/19*(-60)/16? 3/4 Evaluate (-9 - 6/(-18)) + 3/(-9). -9 Calculate -15*((3 - 112/(-60)) + -14 + 9). 2
dm_mathematics
-----Original Message----- From: Robb, Kathy [mailto:KRobb@hunton.com] Sent: Wednesday, September 19, 2001 3:57 PM To: 'nyiso_tech_exchange@global2000.net' Cc: John Charlton (E-mail) Subject: Sept. 24 ICAPWG Mtg "Robb, Kathy" <KRobb@hunton.com> writes to the
enron_emails
525 F.Supp. 431 (1981) Timothy West McCORQUODALE v. Charles BALKCOM, Warden, Georgia State Prison. Civ. A. No. C 79-95. United States District Court, N. D. Georgia, Atlanta Division. October 21, 1981. *432 John R. Myer, Atlanta, Ga., Jack Greenberg, James M. Nabrit, III, Joel Berger, John Charles Boger, New York City, Anthony G. Amsterdam, Stanford, Cal., for plaintiff. Lewis R. Slaton, Fulton County Dist. Atty., H. Allen Moye, Asst. Fulton County Dist. Atty., John W. Dunsmore, Jr., Asst. Atty. Gen., State of Ga., Atlanta, Ga., for defendant. ORDER ORINDA D. EVANS, District Judge. This case is before the Court on Petitioner's motion for a further evidentiary hearing and for oral argument before this Court. Petitioner's request for oral argument has previously been granted in part, the Court having heard oral argument on two of Petitioner's contentions pursuant to his request. Otherwise, the motion for further oral argument is hereby DENIED. In his motion for a further evidentiary hearing, Petitioner asks this Court to hold a hearing in order to consider certain testimony ruled inadmissible or non-discoverable by the Magistrate. Petitioner's specific complaints are these. First, the Magistrate declined to compel Dennis A. York, Assistant to the Supreme Court of Georgia, to give deposition testimony relative to certain aspects of the Court's sentence review procedures, which matters were deemed by the Magistrate to be subject to a judicial privilege. See Order of April 2, 1979, referencing the Magistrate's Order of January 15, 1979 and Judge Edenfield's Order of February 24, 1979, in a then-companion case, House v. Balkcom, C78-1471A. Second, Petitioner complains of the Magistrate's decision not to require the Chief Justice of the Georgia Supreme Court, H. E. Nichols, to appear personally or by deposition to corroborate, deny or explain, comments attributed to him by the press on the subject of the death penalty, Petitioner's contention being that the then-Chief Justice (who participated in review of Petitioner's case) was so biased as to deprive Petitioner of a fair sentence review. Although the Magistrate denied Petitioner's motion to compel the attendance of the Chief Justice, the Magistrate's
freelaw
------ ccvannorman I was a member at hacker dojo while this happened. His actions had a real financial impact, not just on hacker dojo but on members like me who couldnt get work done. While I never met him, it's difficult to feel sorry for him as he knew exactly the damage he was causing and was "addicted to pushing the button that hurt our wifi" (paraphrasing, but i do remember reading his letters that said basically this.) My personal opinion is that while i dont want a precedent for felony charges for "wifi pranks", if this kid (20s) wasn't charged witha felony my gut says he'll be back at it again harder and faster having gotten away with it. ------ zmanian I remember when this was going on at Hacker Dojo. The Internet was completely unusable for weeks. It seems likely that goal of the attack was cause Hacker Dojo to lose members. It seemed like an economic attack on a community space. ------ staunch Bad things happen when idiots collide. I signed it though, because even a fool doesn't deserve to be punished so severely. ------ jsmthrowaway I've read this petition three times and I still have no idea what happened. Also, what in the holy fuck is the author thinking giving everyone enough information to find the "bad guy" in her story (I knew who she was talking about even without it) but keeping the identity of the person we're allegedly helping obscured? The difference between me and whoever the person advocating for this guy is, is that I know how to use PACER and am willing to pay to investigate claims like this. Honestly, I wanted to read the indictment because the horribly- written petition left me confused, but indeed, the petition leaves out quite a bit of the story. That includes the guy signing back up for Hacker Dojo under a false name after being banned, his grand total of one day being a member of Hacker Dojo, and completely omitting the attorney that he retained privately (and who quit not long after due to a "breakdown of communication"; puts perspective on raising a legal defense). By the indictment, which went before a grand jury, by the way, it sounds like he signed up
hackernews
The greater Baltimore area in Maryland has a large population of African-Americans and European-Americans, which makes this area most suitable to investigate differences in the exposure to prostate cancer risk factors among these two population groups. We designed a study that will use an integrated molecular epidemiology and translational research approach to examine causes for the excessive burden of prostate cancer among African-American men, including the study of tumor biological differences between African-American and European-American patients, supported by the collection of blood, urine, tissue
nih_exporter
Cementum regeneration is an important and challenging stage in periodontal tissue engineering and regeneration. Pathosis of the periodontium, including cementum, is important in precision diagnosis and obstinate treatment of systemic diseases, such as diabetes, leukemia, and Acquired Immune Deficiency Syndrome. Here, we found that during periodontium development, transcription factor 7-like 2 (Tcf7l2) was widely expressed in the periodontium and dental sac. In mouse cementoblast cell line (
pubmed_abstracts
![Demonstration of calculation of the right carotid femoral intra-arterial path length. Initially a whole-body magnetic resonance angiogram is produced (**A**), with a curved multiplanar reformat generated starting at the bifurcation of the right common carotid artery extending to the bifurcation of the right common femoral artery (**B** and **C**). The proximal distance from the common carotid bifurcation to the aorta is measured (**B**), with the common carotid to common femoral distance then measured (**C**). The path length is then calculated as C--2×B.](hyp-71-937-g001){#F1} External Validation ------------------- One hundred forty-eight participants of the SUMMIT study underwent WB-MRA using the same acquisition parameters and with the intra-arterial path length measured using the same technique as in the TASCFORCE cohort.^[@R14]^ This was then compared with the distance generated using the formula from the TASCFORCE cohort. PWV in this cohort was calculated using the 3 distances: the external distance (PWV~SUMM~), the true distance on MRI (PWV~TD~), and the formula distance (PWV~MRA~). External Application -------------------- Using the formula, PWV~MRA~ was calculated in both the SUMMIT and CaPS population. This was then compared with the PWV~SUMM~ in the SUMMIT cohort for its effects on intercenter variability and the associations between PWV and common risk factors and the PWV~CaPS~ in the CaPS population for its effects on the association between PWV and risk factors. Statistical Analysis -------------------- Data are expressed as mean±SD for continuous variables, median (range) for ordinal variables, and N (%) for nominal variables. Normality tests with Shapiro--Wilk were undertaken. For derivation of a path length formula within the TASCFORCE population, the influence of clinical factors on carotid--femoral path length was quantified using linear regression modeling. Sex, age, height, weight, waist circumference, systolic blood pressure, diastolic blood pressure, heart rate, cholesterol, high-density lipoprotein, low-density lipoprotein, triglycerides, glucose, smoking status, smoking years, pack years, and BMI were the starting variables within the backward entry model. To avoid overfitting, the variables were initially split into 2 blocks and backward linear regression preformed. The variables remaining in the model at the end of the backward linear regression then inserted into a third backward
pubmed_central
Is the ordering of props in JSX important? If the o object contains a key/value pair of: foo: 'bar' can I depend on these outcomes?: // foo will be 'bar' <MyComponent foo='should not override' {...o} /> // foo will be 'overridden' <MyComponent {...o} foo='overridden' /> In other words, is the ordering of properties while using the spread operator significant? A: yes, it is. It works exactly as your example says You example is translated into: // foo will be 'bar' <MyComponent {/* ...other 'o' keys/values...*/} foo='should not override' {/* ...other 'o' keys/values...*/} foo='bar' /> // foo will be 'overridden' <MyComponent foo='bar' {/* ...other 'o' keys/values...*/} foo='overridden' {/* ...other 'o' keys/values...*/} /> And therefore, it overrides always the last one A: Yes, ordering does matter. The exact reason is how Babel transpiles the JSX. You can see this in the Babel REPL: <MyComponent foo="should not override" {...o}> </MyComponent> Becomes: React.createElement(MyComponent, _extends({ foo: "overridden" }, o)); Where _extends is just Object.assign, or if the browser doesn't support it, _extends is functionally the same. Per the MDN documentation: Properties in the target object will be overwritten by properties in the sources if they have the same key. Later sources' properties will similarly overwrite earlier ones. (Emphasis is mine). Thus, when Object.assign is used to pass props to the component, the target is { foo: "overridden" } and the source is o. Since foo exists in both the target and the source, foo in the target is overridden. This also applies to: <MyComponent {...o} foo="overridden"> </MyComponent> Here,
stackexchange
Protecting cells, and specially neurons, from damage caused by various factors, including stroke, neurodegenerative disease, traumatic injury, etc., is important for long-term recovery of cell or neuronal function. Therapeutic treatment of injured cells or neurons by single agents has advantages, but is often not sufficient to mobilize the complexity of molecules needed to help in restoring complete function. Physiological response to protect neurons or other cells from hypoxic or ischemic events, or from oxidation, is often considered to be mediated by expression of genes that are up-regulated through the Hypoxia Inducible Factor (HIF) signaling pathway, a key regulatory pathway that is responsive to cellular insults. In the brain, up-regulation of neuroprotective molecules is believed to be a critical factor in protecting cells from irreparable damage. However, few available drugs are sufficiently able to prevent, restore or reduce damage to neurons and other tissues. Additionally they are often toxic, have short half-lives, or both. For example, the international patent application WO2006/20727 proposes the use of deferoxamine as neuroprotector agent against the harmful effects of reperfusion; however, the administration of deferoxamine poses problems due to its reduced half-life in plasma. Transferrins are iron-binding blood plasma glycoproteins that control the level of free iron in biological fluids. Transferrins function as the main transporter of iron in the circulation where it exists in an iron-free apo-transferrin (ApoTf) form, as monoferric transferrin, or as diferric holo-transferrin (HoloTf). Typically, iron is bound to 30% of all transferrin binding sites in circulation. The neuroprotection function of ApoTf but not HoloTf has been disclosed by Chen-Roetling et al. (Chen-Roetling J., Chen L., and Regan R. F. Neuropharmacology, 2011; 60(2-3): 423-431), suggesting that ApoTf may mitigate the neurotoxicity of hemoglobin after intracerebral hemorrhage. The present inventors have found that it may be possible to boost the neuroprotective properties of transferrin administration in patients by combining it with other iron chelating agents or with another iron-binding plasma protein, such as Apolactoferrin, which has been shown to increase HIF1-α, protein levels in some tissues and have effects on plasma EPO levels (Zak
uspto_backgrounds
Daybreak is a master-planned community over 4,000 acres (16 km²) in size that began construction in 2004 under the direction of land development company Kennecott Land (a subsidiary of Rio Tinto Group) in South Jordan, Utah. In 2016, the balance of the land holding was sold to Minneapolis-based investment firm Värde Partners, and a new development company called Daybreak Communities was formed to continue development of the project. The community is expected to continue building for the next 18 to 20 years. When completed, it could contain more than 20,000 residential units and approximately 9.1 million square feet (850,000 m²) of commercial space. Description Daybreak is designed using a traditional neighborhood development model (TND), which means that all homes are within a five-minute walk or bike ride of a major amenity such as a park, the lake, or a shopping area, reducing dependence on automobile travel. The home designs were inspired by Salt Lake City's historical neighborhoods such as Sugar House, The Avenues, and Harvard-Yale areas, and include large front porches and alley-loaded garages. Exterior styles include Colonial Revival, Craftsman and Victorian. The homes along each street also have brighter colors than are found in most suburban neighborhoods. Recently, homes with a more modern style have been added. The community is currently divided into several sub-neighborhoods called villages: Founder's Park was the original village opened in 2004. Eastlake Village which opened in 2006 features several parks. North Shore Village is likely the community's most diverse neighborhood architecturally and Garden Park Village, which opened in 2009, is a fully maintained neighborhood designed with the 55+ empty nester in mind. Garden Park features its own private clubhouse, fitness area and easy beach access. Lake Village which currently holds the largest and most expensive homes opened in 2013. Creekside Village opened in 2013 with features such as the largest park in Daybreak, a zip line and more. In SoDa Row Village you will find the main shopping area within Daybreak along with apartments and townhomes. In 2016, the developer opened its first village on the West side of Mountain View Corridor, the major state highway that essentially divides the community in half. South Station Village is the first neighborhood in Daybreak that follows a transit oriented development pattern. The extension of the Red Line on UTA's TRAX light rail system which connects Daybreak to downtown Salt
wikipedia_en
In this section we prove some of the main results listed in the introduction. We start with Theorem \[xxthm0.2\]. If $Z(A)$ is not isomorphic to $\Bbbk[t]$, the assertion follows from Lemma \[xxlem3.7\](1). If $Z(A)$ is isomorphic to $\Bbbk[t]$, the assertion follows from Lemma \[xxlem3.7\](3). Note that every AS-regular algebra has finite global dimension. If $A$ is not PI, then by Lemma \[xxlem2.7\], $$\operatorname{GKdim}Z \leq \operatorname{GKdim}A-2=3-2=1.$$ If $Z(A)$ is not isomorphic to $\Bbbk[t]$, the assertion follows from Lemma \[xxlem3.7\](1). If $Z(A)$ is isomorphic to $\Bbbk[t]$ and if $\operatorname{gldim}A/(t)=\infty$, the assertion follows from Lemma \[xxlem3.7\](3). For the rest of the proof we assume that $Z(A)=\Bbbk[t]$ and $A/(t)$ has finite global dimension. By Rees lemma, $\operatorname{gldim}A/(t)\leq 2$. By the Hilbert series computation, we obtain that $\operatorname{GKdim}A/(t)=2$. This implies that $A/(t)$ is AS-regular of global dimension two. Since we assume that $\Bbbk$ is algebraically closed, $A/(t)$ is either $\Bbbk_q[x,y]$ or $\Bbbk_{J}[x,y]$. In particular, the Hilbert series of $A/(t)$ is $\frac{1}{(1-s)^2}$. Since $A$ is AS-regular of global dimension three, it is generated by either $3$ elements or $2$ elements. Next we consider these two cases. Case 1: $A$ is generated by two elements. Then the Hilbert series of $A$ is $\frac{1}{(1-s)^2(1-s^2)}$. It forces that $\deg t=2$. If $A/(t)= \Bbbk_q[x,y]$, then $t=xy-qyx$ and $A/(t-1)=\Bbbk\langle x,y \rangle/(xy-qyx-1)$. If $
arxiv
#ifdef __cplusplus extern "C" { #endif /** * \brief FTL需要使用到的内存(RAM)空间大小 * * \param[in] size : 存储器的容量 * \param[in] erase_size : 擦除单元大小 * \param[in] logic_blk_size : 逻辑块的大小 * \param[in] nb_log_blocks : 日志块个数 * * \return FTL需要使用到的内存(RAM)空间大小 */ #define AM_FTL_RAM_SIZE_GET(size, erase_size, logic_blk_size, nb_log_blocks) \ (((logic_blk_size) + 4) \ + ((size) / (erase_size) * 2) \ + ((nb_log_blocks) * (sizeof(struct log_buf))) \ + ((nb_log_blocks) * ((erase_size) / (logic_blk_size))) \ + (((((size) / (erase_size)) + 31) / 32) * sizeof(uint32_t))) typedef struct am_ftl_info { /** \brief RAM 缓冲区 */ uint8_t *p_buf; /** \brief RAM 缓冲区的长度,必须为 AM_FTL_RAM_SIZE_GET() 宏得到的值 */ size_t len; /** * \brief 逻辑块的大小 * * 一般与 MTD 设备的写入大小(如:SPI FLASH的页大小)相等或为写入大小的 * 整数倍,使用 \sa am_ftl_read() 或者 \sa am_ftl_write() 函数读/写的数据 * 时,每次读/写的数据量即为逻辑块
github
Vanderhurst has performed fieldwork in Nigeria for more than 10 years, and for this project she conducted participant observation embedding herself in the shelter for more than a year. During the past two decades the Nigerian government has stopped many young migrant women from trying to leave the country, often to Europe, identifying them as victims of human trafficking and referring them to shelters run by a federal anti-trafficking agency. At these shelters, counselors worked with women in an effort to reduce their vulnerability to be being trafficked again. Vanderhurst said how religion came into play in her observations in daily interactions in the clinic surprised her. "I thought people were going to use religion as a way to judge women's experiences. That still happens, but women were also talking about how God had a plan for them to enter migrant sex work," said Stacey Vanderhurst, KU assistant professor in the Department of Women, Gender and Sexuality Studies. "And I was surprised the counselors working in this space didn't necessarily tell them they were wrong but instead engaged in a deeper theological conversation about how to understand their situation and how to make good decisions." Many of the women in the study had expressed the desire to leave the country, and they would equate an offer to travel to Italy or elsewhere as an answer to a prayer for direction, for example. Shelter staff would mostly try to steer the women away from migrating or lifestyles that might put them at risk of human trafficking into more entrepreneurial work, such as hair styling or other careers, she said, suggesting that this transition in the shelter might be part of a divine plan for their lives. "As an anthropologist, I'm less interested in who was right or wrong in these conversations, but instead want to know how they fit in with other patterns in Nigeria," Vanderhurst said. "How do government officials talk about and use state power, when no one trusts the government? They can force these women into the shelter, but what do they do next to convince them to change their lives?" The conversations surrounding religion demonstrate how ad hoc relationships of governance can be forged among even fervently contested encounters between citizens and the state in Nigeria. "Both in research and activism work, we do a good job talking about structural factors that make people vulnerable, but spend less time listening to people's own version of their experiences, especially when those stories are framed in religious discourses that we don't share" Vanderhurst said.
pile-cc
Let t = 0.3 - 0.8. Let d = 665/36 - 73/4. Which is the biggest value? (a) t (b) 2/3 (c) d b Let n = -23 + 23.5. Which is the third smallest value? (a) n (b) -4 (c) 4 c Let m = 49/195 - 2/39. What is the smallest value in -4, m, -2? -4 Suppose 3*u - 6*u - 132 = 0. Let m be u/48 - 8/(-12). Which is the third smallest value? (a) m (b) 0.1 (c) -1/6 b Let p = -1.8 - -2.1. Which is the second smallest value? (a) -1/3 (b) 2 (c) p c Let i = -30.7 - -31. Let x = 253.06 + -250. Let m = x - 0.06. Which is the smallest value? (a) m (b) i (c) 0.5 b Let l = 4.2 + -4. Let k = -0.15 + l. Let w = -0.05 + k. What is the third smallest value in -2/13, w, -5? w Let o = -0.79 - -11.19. Let r = o - 10. What is the smallest value in 0.5, -4/7, r? -4/7 Let p = -103/477 + -1/159. Let i be ((-2)/1)/2 + -2. Let y be 5 + i/6*2. Which is the third smallest value? (a) y (b) p (c) 1 a Let v = -0.24 - 0.06. Let o = 0.2 + v. What is the third biggest value in 0.4, o, -5? -5 Let n = 24/35 - 2/105. Let l be (-17)/(-34) - 6/4. Suppose 0 = 5*g - 4*o + 7, -4*o + 7 = -2*g - o.
dm_mathematics
Janelle, I trust you on the hotel. I assume you have also enlisted a travel agent? Kim, I don't remember a request for passport numbers, so you need ours? Interesting that tourist season ends in Sept but it still appears to be full. -----Original Message----- From: Janell Dye [mailto:janell_dye@hotmail.com] Sent: Thursday, August 23, 2001 2:
enron_emails
versus SECRETARY OF HOMELAND SECURITY, John F. Kelly, Defendant-Appellee. ________________________ Appeal from the United States District Court for the Southern District of Florida ________________________ (January 31, 2018) Before TJOFLAT, NEWSOM and BLACK, Circuit Judges. PER CURIAM: Case: 17-10860 Date Filed: 01/31/2018 Page: 2 of 3 Celestine Thompson, a pro se litigant, appeals the district court’s dismissal of her action alleging employment discrimination under Title VII of the Civil Rights Act of 1964, 42 U.S.C. § 2000e-16; bribery of public officials under 18 U.S.C. § 201(b)(A); the making of false statements under 18 U.S.C. § 1001; and judicial bias under 28 U.S.C. § 144. The district court dismissed Thompson’s second amended complaint on alternative grounds. First, the district court determined it lacked subject-matter jurisdiction over Thompson’s claims because she failed to identify any applicable waiver of federal sovereign immunity. Second, the district court held that Thompson failed to adequately plead facts suggesting a plausible claim for relief. On appeal, Thompson contends she has, in fact, suffered racial discrimination, harassment, and intimidation at the hands of various agents of the Department of Homeland Security. After review, 1 we affirm. Although we liberally construe pro se briefs, arguments not raised on appeal, even by pro se litigants, are deemed abandoned. Timson v. Sampson, 518 F.3d 870, 874 (11th Cir. 2008); see also Fed. R. App. P. 28(a)(8) (requiring appellants to argue “contentions and the reason for them, with citations to the authorities and parts of the record on which the appellant relies”). Thompson’s brief, even 1 We review de novo a district court’s ruling on a motion to dismiss for lack of subject- matter jurisdiction under Federal Rule of Civil Procedure 12(b)(1). Thacker v. Tenn. Valley Auth., 868 F.3d 979
freelaw
Given that Emscripten isn't a tier 1 platform it wasn't a big deal but wanted to call it out in case anyone ran into it with 1.20. ~~~ steveklabnik Yeah, we don't include all fixes in the release notes; a volunteer goes through and looks at PRs tagged for the release notes, and possibly goes through all the PRs to see if there's anything missing. Determining what to include and what not to can be tricky! Basically, the blog post is a subset of the release notes, the release notes are a subset of PRs, and PRs are a subset of commits. ~~~ iopq Yeah, but this post seemed pretty barren. Since I skim a lot, it felt like nothing happened in the last release. ~~~ steveklabnik Yes, this release was fairly small. It happens! ------ sinhpham What happened to impl Trait? I was quite excited to see it under 1.21 in the milestone predictions thread, but it has since been moved to "horizon". [https://internals.rust-lang.org/t/rust-release-milestone- pre...](https://internals.rust-lang.org/t/rust-release-milestone- predictions/4591) ~~~ GolDDranks To explain more besides Steve's commit, there has been another RFC that significantly expands the scope of impl Trait. It was accepted, but it also had the effect of punting the stabilisation of the feature a bit until things settle down. I don't know if the "conservative" version of impl Trait is going to land first anyway, but I find it just reassuring that people aren't rushing things. (For reference: The original impl Trait: [https://github.com/rust- lang/rfcs/pull/1522](https://github.com/rust-lang/rfcs/pull/1522) The refinement, readying it for stabilisation: [https://github.com/rust- lang/rfcs/pull/1951](https://github.com/rust-lang/rfcs/pull/1951) The latest one, which gives it more expressive power: [https://github.com/
hackernews
The overall goal of this project is to study the induction of the amino acid transport systems specific for the precursors of glutathione in the mouse ovarian follicle and in oocytes. Our preliminary studies show that the amino acid transport systems for the three precursors of glutathione, cystine, glycine and glutamate, are induced in preantral follicles after being cultured four hours in Waymouth medium in air containing 5% carbon dioxide [20% oxygen]. The specific aims are: (l) to identify the induced Na-independent
nih_exporter
The purpose of this study is to evaluate the interocclusal appliance efficiency in patients with temporomandibular disorder (TMD), by using computerized electromyographic (EMG) evaluation in the rest position of the mandible. Twenty-two patients (male and female) with TMD symptoms, between 18 and 53 years of age, were examined. EMG evaluations were performed before the treatment and during the 90th, 120th and 150th day of using the interocclusal appliance
pubmed_abstracts
Despite the notable advantages of having a positive lookout, overly positive expectations sometimes have negative consequences and lead to poorer performance. Optimistic individuals tend to underestimate potential threats and obstacles, take risks, and persist in investing in hopeless endeavors ([@B21]; [@B75]; [@B37]). Optimists, for example, are more likely than pessimists to continue gambling after losing money ([@B32]). Optimism thus can have positive but also negative effects on performance. Here, we propose that for creative performance the positive effects of optimism are particularly likely to manifest themselves when people are avoidance motivated. When people are approach motivated, these positive effects should be less prominent, and negative effects of over-optimism are more likely to occur. It is likely that there is a negative relation between trait avoidance motivation and trait optimism. However, even when people are avoidance motivated (due to individual differences or situational cues), levels of optimism about successfully avoiding specific negative outcomes vary across situations. For example, someone may be rather optimistic about the likelihood of not failing an exam, but less optimistic about the likelihood of not getting hurt on a skiing trip. In the following, we review the psychological processes that are evoked by avoidance motivation, and discuss how optimism may reduce negative effects of these processes on creativity. Optimism, a recipe for creativity under avoidance motivation {#s3} ============================================================ Compared to approach motivation, avoidance motivation is associated with a host of cognitive, affective, and volitional processes that can undermine creative performance (for a thorough review of these processes see [@B16]). Here we discuss why these processes influence creativity, and how optimism impacts each of these processes and may thereby mitigate negative effects of avoidance motivation. Cognitive processes {#s3-1} ------------------- According to*Cognitive Appraisal* theories ([@B47]) demanding tasks or situations are evaluated according to subjective perceptions of demands and available resources. When demands exceed resources, situations are evaluated as threats. However, when situations are taxing yet rewarding, they are perceived as challenges. When people are approach motivated, they tend to appraise situations in terms of challenges, whereas when they are avoidance motivated they tend to appraise situations in terms of threats. Approach motivation and the associated challenge appraisals evoke flexible and associative information processing, which enhances creativity ([@B4]; [@B35]). Avoidance motivation and the associated threat appraisals, on the other hand, evoke persistent and systematic information processing ([@B26]; [@B25]).
pubmed_central
Q: unaffix event for Bootstrap affix? I want to combine the affix plugin with the bootstrap navbar-fixed-top class. So far I have got it working then when I scroll past the navbar it gets fixed. But when I scroll back up I want it to go back into static state again. I have seen some code I think from older bootstrap versions and a unaffix event. Why is it gone? Can I create one? Or how to accomplish what I am trying here? navbar_secondary = $( '.navbar-secondary:first' ); navbar_secondary.affix( { offset: { top: function () { return (this.top = navbar_secondary.offset().top ) } } } ); navbar_secondary.on( 'affix.bs.affix', function () { // this is actually the wrong event for this. I want this to fire when its *not* affixed console.log('affix'); navbar_secondary.removeClass( 'navbar-fixed-top' ).addClass( 'navbar-not-fixed' ); } ); navbar_secondary.on( 'affixed.bs.affix', function () { console.log('affixed'); navbar_secondary.removeClass( 'navbar-not-fixed' ).addClass( 'navbar-fixed-top' ); } ); A: Figured it out myself. This event names are totally confusing. affixed-top.bs.affix is actually the event when it goes back to being not affixed. navbar_secondary = $( '.navbar-secondary:first' ); navbar_secondary.affix( { offset: { top: function () { return (this.top = navbar_secondary.offset().top ) } } } ); navbar_secondary.on( 'affixed-top.bs.affix', function () { console.log('unaff'); navbar_secondary.removeClass( 'navbar-fixed-top' ).addClass( 'navbar-not-fixed' ); } ); navbar_secondary.on( 'affix.bs.affix', function () { console.log('aff'); navbar_secondary.removeClass(
stackexchange
Typical directional drilling schemes include various mechanisms and apparatuses in the BHA to selectively divert the drillstring from its original trajectory. One such scheme includes the use of a mud motor in combination with a bent housing device to the bottom hole assembly. In standard rotary drilling practice, the drillstring is rotated from the surface to apply torque to the drill bit below. On the other hand, using a mud motor attached to the bottom hole assembly, torque may be applied to the drill bit therefrom, thereby eliminating the need to rotate the drillstring from the surface. While many varieties of mud motors exist, most may either be classified as turbine mud motors (i.e., turbodrills) or positive displacement mud motors. Regardless of design specifics, most mud motors function by converting the flow of high-pressure drilling mud into mechanical energy. Drilling mud, as used in oilfield applications, is typically pumped to a drill bit downhole through a bore of the drillstring at high pressure. Once at the bit, the drilling mud is communicated to the well bore through a plurality of nozzles where the flow of the drilling mud cools, lubricates, and cleans drill cuttings away from cutting surfaces of the drill bit. Once expelled, the drilling mud is allowed to return to the surface through an annulus formed between the wellbore (i.e., the inner diameter of either the formation or a casing string) and the outer profile of the drillstring. The drilling mud returns to the surface carrying drill cuttings with it. When a mud motor is used, it is not necessary to rotate the drillstring to rotate the drill bit with respect to the borehole. Instead, the drillstring located above the mud motor is allowed to “slide” into the wellbore as the bit penetrates the formation. As mentioned above, a bent housing may be used in conjunction with a mud motor to directionally drill a well bore. A bent housing may be similar to an ordinary section of the BHA, with the exception that a low angle bend is incorporated therein. Further, the bent housing may be a separate component attached above the mud motor (i.e. a bent sub), or may be a portion of the motor housing itself. Through various measurement and telemetry devices in the BHA, a drilling operator at the surface is able to determine which direction the bend in the bent housing is oriented. The drilling operator may then rotate the drillstring until the bend is in the direction of a desired deviated trajectory and the drill
uspto_backgrounds